From lreed at west.cscwc.pima.edu Wed Jul 1 00:58:35 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Wed, 1 Jul 1998 00:58:35 -0700 (PDT)
Subject: http://bureau42.ml.org
Message-ID: <009C8814.0F703E40.5@west.cscwc.pima.edu>
I have been getting a lot of requests from people who want to
know how to get more of the manuscripts of the 'True Story of
the InterNet' series which is sometimes spammed to the CypherPunks
Disturbed Male LISP through my account by some inconsiderate psycho
who has no respect for Bob, who asks only that he be given 'space'
NOT 'SPACE ALIENS' you
stupid fucks!!!
try http://bureau42.ml.org
Please quit bothering me (except for Attila-I like my sex 'rough',
whereas the Author seems toli
like hisorher sex 'ruff, ruff').
Linda Lou Reed
"If you meet the Author on the road, KILL HIM!!!"
From dave at bureau42.ml.org Wed Jul 1 03:16:25 1998
From: dave at bureau42.ml.org (David E. Smith)
Date: Wed, 1 Jul 1998 03:16:25 -0700 (PDT)
Subject: http://bureau42.base.org
In-Reply-To: <009C8814.0F703E40.5@west.cscwc.pima.edu>
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160
On Wed, 1 Jul 1998, Linda Reed--PCC West Campus CSC wrote:
> I have been getting a lot of requests from people who want to
> know how to get more of the manuscripts of the 'True Story of
> the InterNet' series which is sometimes spammed to the CypherPunks
> Disturbed Male LISP through my account by some inconsiderate psycho
> who has no respect for Bob, who asks only that he be given 'space'
...
> try http://bureau42.ml.org
For the love of God, please, don't. That goes over my phone line.
Use http://bureau42.base.org/ instead.
...dave
-----BEGIN PGP SIGNATURE-----
Version: GNUPG v0.3.0 (GNU/Linux)
Comment: This is an alpha version!
iQEeBAEUAwAGBQI1mgotAAoJEJKCwqQDooIFjcED/R4EPP0jKh3LMJdIm1orYc308Dvl+31v
1nd1poiv+OD2jCNjcSk/CcKnG1+S2WWrMFnhdyGn9MyAzSX44N/v7eota8yNmtrld0JZG91J
F+cwkrdZ524qj7HHllerOnitQ2GRef92/3f+Iql6KJkE7gCj0A5cokqgKSiJvIn3Kt85A/0Y
WfnvLEyLtmZXT2f/wILQ638r+oHMQ/hZeRxlYxXTpWB4kcqF9xu4NmgPdkjVpAPTf4mwah76
4p4DeBAeBiJbaDoaHbIvioPU7MHipxu1TVq3vocgBXfvEDSMvdNHcQ9eR9WUVe8f1R0yubeB
q9/E7Hr2tuCxj9BlT51tLdeuQQ==
=Q8mn
-----END PGP SIGNATURE-----
From lreed at west.cscwc.pima.edu Wed Jul 1 04:04:35 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Wed, 1 Jul 1998 04:04:35 -0700 (PDT)
Subject: Anarchy Is Our Only Hope... - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C882E.0B003B20.1@west.cscwc.pima.edu>
~NOTE: If this article is digitally signed, then it is not
guaranteed by the Electronic Forgery Foundation to
be Genuine FUD.
The Electronic Forgery Foundation, as a matter of
policy, accepts no responsibility for digitally
signed manuscripts which may actually be MainStream
News Articles containing factually accurate and
officially verifiable lies.
Bienfait Nutly News
"ANARCH IS OUR ONL HOPE"
Christmas Special
*****************
by King Author and the Dark&Stormy
Knights of the Magic RoundTable
[College Station Nudist Colony]IT WAS A STARK NAKED AND COLLEGE
dormy night...
[Prudential Annex, Alcatraz]JIM BELL STRUGGLED TO HOLD BACK THE
small bead of sweat that was beginning to form on his brow as
he feigned indifference while the Warden reviewed his application
to form a prison swim team...
[Oklahoma City]amADbOMBERtObEnAMEDlATER CREPT UNDER THE FENCE
surrounding the former site of the Murrah Federal Building. As
he placed the explosive charges at strategic points among the
rubble, he couldn't shake the feeling that government spin-
doctors were already preparing to issue a statement clarifying
that BATF agents were absent from the site at the time of the
explosion as a result of having moved to new offices, while
the innocent children, air-lifted to the sight shortly before
the tragic act of terrorism, were part of an educational tour
that had been scheduled months previously.
He shook off his fears, reminding himself that Louis Freeh,
Janet Reno and Michael Fortier had planned everything down
to the last detail...
[Austin, Texas]THE BARMAID AT THE HEB CENTRAL MARKET CAFE WAS
certain that she had seen all of those attending the alleged
Austin CypherPunks Physical Meeting in a variety of local
theatrical productions over the years.
It didn't make sense. Why would someone hire a rag-tag group
of actors to impersonate members of an anarchistic, crypto-
privacy InterNet mailing list?
And who was the strange character from the Bay Area who
occassionally attended the meetings? She remembered seeing
him at Stanford during the visit of the SexCriminal and his
MainSqueeze to convince their daughter, Chelsea, that dating
a man who was stalking her father with a Stihl chainsaw could
have negative political reprecussions, and that she didn't
need that fucking psycho's reassurances as to her sexuality,
since daddy also thought she had a great ass, and was not just
saying that because she was his daughter.
Stanford wasn't the first time she had seen the Bay Area
visitor to the CypherPunks meetings. She had also seen him
leaving the Texas Book Depository in Dallas, shortly after...
Anarchy is our only hope...
Lone gunmen and unabombers are Dog's way of telling us,
as we stare at a meaningless election ballot, that we could
have had a V-8, pretending that we were drinking the blood
of a single innocent child we had slaughtered in an act of
random violence with an M-16, or in the bombing of TWA-800,
or any one of a variety of mind-numbing reminders that we,
as well as the cargo on our flight, are just numbers, that
can be erased with the stroke of a pen, or a flash of light
and a loud bang...
Anarchy is our only hope...
Face it, the System isn't working...
We need to Democratize murder, once again putting it in
the hands of the common people. People with wooden or stone
clubs; people with Saturday Night Specials; people with
knives in kitchen drawers, directly behind the freezer
door that their fat, lazy spouse is staring into, wondering
which gallon of ice-cream to eat first; people with access
to both the drug-cabinet and the maternity ward, who realize
that the solution to child-crime is stopping it at its very
source...
The process of natural selection, which decrees that only
the strong AND lucky survive, has been derailed by social
and government interference that leads to genocidal policies
which mark our fellow humans for deletion on the basis of
race, religious and/or ethnic background, political beliefs,
ownership of land which has oil or mineral reserves underneath
it, use and development of strong crypto, ad infinitum...
It used to be that those with strong survival instincts,
finding themselves short of funds, could beat up and/or
murder a Jew, pulling out their gold fillings in order to
make it to their next paycheck.
Once government got involved, the average Joe and Jane
couldn't hope to compete with the streamlined merger of
thousands of ignorant thugs into a single giant bully.
It was a step backward for the JesusKillers, as well,
since they had a fighting chance against the more ignorant
members of the light-skinned races, who didn't realize
that it didn't really help for them to hide in dark alleys,
as well as members of the dark-skinned races who couldn't
resist smiling in the dark when a potential victim approached.
Once ethnic discrimination was declared to be a function
of government, there was no need for Official Thieves Thugs
And Murderers to hide in dark alleys, since they could herd
their victims into railway cattle-cars by use of official
government brochures promoting Auschwitz as a Health Spa
with state of the art shower systems guaranteeing not only
hygenic cleansing, but also eugenic cleansing. Those who
enquired as to the meaning of 'eugenic cleansing' were
told that it would become clear upon their arrival...
Anarchy is our only hope...
A passage in a work by one of the true literary genius'
of the InterNet (whose name I can't remember, but the work
was titled, "InfoWar") pointed out a period during which
violent crime was rapidly decreasing at the same time that
public perception of the rate of violent crime was reaching
an all-time high.
A parallel poll, commissioned by the People Against
Humanity division of the Synics Cociety, revealed that not
a single person taking part in the other poll believed
themself to be an ignorant, societally programmed moron,
incapable of anything beyond sucking up whatever slop
MainDream News Farces chose to throw into the public
media troughs for consumption by those who believe that
the High Cost Of Rational Thought is an unbearable burden
that will leave them too poor to add the 24-Hour Drooling
And Slobbering Channel to their cable package.
Anthropologists specializing in the rise of civilized
society have discovered that a solitary recluse living
alone in the wild, will, upon drooling and slobbering on
HimOrHerSelf, instinctively realize that, if they continue
to do so, then the chance of their ever developing the
ability to walk upright becomes radically diminished.
At the same time, modern research indicates that if test
subjects from current society are exposed to pictures of
Michael Jordan drooling on his shoes, that manufacturers
can add a hundred dollars to the price of their sneakers
by adding artificial saliva-stains to them.
Anarchy is our only hope...
*************************************************************
WE ARE INTERRUPTING THIS PREVIOUSL SCHEDULED
BROADCAST TO BEING OU AN IMPORTANT NEWS FLASH
The Author, undoubtedly affected by solar flaring
reflecting off of the early evening moon, suddenly
realized why Leslie Stahl seemed so nervous during
last night's '60 Minutes' piece on InterNet FUD,
titled, 'The Rumor Mill.'
It was not, as he originally suspected, Ms. Stahl
psychically picking up on his efforts to peek up
her skirt, and was, in fact, not the Scent of a
Woman, but the Scent of Fear...
Fear that Jane and Joe Sheeple, empowered by InterNet
Search Engines capable of catering to their true
desires, instead of attempting to mold their desires
to fit the hidden agendas of Stahl's CBS controllers,
might actually choose to access J. Orlin Grabbe's
'World's 50 Greatest Conspiracies' website, and
compare his 'information' with the 'information'
provided by '60 Minutes'.
Fear that a generation of people who had grown up
believing Walter Cronkite when he ended his news
casts with "That's the way it is...", would suddenly
begin wondering why Wally never told them that Jack
Kennedy, their beloved President, was screwing the
living shit out of Marilyn Monroe, ending his news
cast by making a circle with the forefinger and
thumb of his left hand, poking his right index
finger back and forth through the circle, and
saying, "That's the way it is..."
Fear that Marilyn Manson, whining on Public Radio
about 'The Rumor Mill' on the InterNet spreading
'lies' and 'disinformation' about HisOrHer tour,
would be recognized by those paying attention as
being strikingly similar to Ms. Stahl's whining
on '60 Minutes' about the 'lies' and 'disinformation'
being spread by people who had different beliefs
about Reality and Truth than those that she held.
Fear that vague hints about "Junk," "Regulation"
and "Online Policemen" were not strong enough to
truly get her point across, while indulging in
violent screaming calling for hanging J. Orlin
Grabbe by his hairy balls for disagreeing with
her WorldView would only confirm viewer suspicions
that she was in the same league, although on a
different team, as Marilyn Manson, who believed
that some kind of "censorship" was needed, to
prevent the ChoirBoys at Ms. Stahl's church from
spreading Christian Right lies about HisOrHer
tour on the InterNet, while waiting their turn
to insert their young, hard, throbbing cocks
into a member of the congregation who was a
regular correspondent on a major television news
magazine show.
Fear that the Author, currently working on the
development of a forged Leslie Stahl's HomePage,
had a 50-50 chance of correctly guessing whether
or not she was wearing panties...
**************************************************************
WE NOW RETURN OU TO THE REGULARL SCHEDULED BROADCAST
**************************************************************
NO WE DONT...
**************************************************************
Someone drinking Dirty Mothers wrote the stuff above, last
night. Maybe it was me...maybe it wasn't...I woke up with a
headache.
Regardless, reading today's posts to the CypherPunks list,
it soon became apparent that my clever ruse, pretending to
be intellectually superior to the other list members, worked!
The real purpose of my egoistical diatribe was to ferret out
the list members not truly deserving of being on the same list
as the rest of us, who are using 11% of our potential brainpower.
I knew that the Pretenders to our elitist level of being, being
insecure, insecure enough to avoid repeating repeating their
words, would accuse *me* of being insecure.
Sure enough, the Pretender was exposed, and now we *all* know
that the Pretender on the list, whom we are all superior to,
is...
Nobody!
In retrospect, we were fools not to realize it long ago. All
of the signs were there...
The self-effaceing alias, 'Nobody'.
The inability to reflect a CypherPunks Consistent Net Persona.
Always posting from different accounts: Juno, Replay,
HugeCajones, CypherPunks, Dev.Null...
The propensity for taking wildly varying stances on the same
issue.
Overcompensating for HisOrHer lack of self-worth by always
demanding credit for HisOrHer posts, and never posting
Anonymously...
I was surprised that the rest of the list members never
figured it out.
I guess I'm smarter than the rest of you...
**************************************************************
OK, *NOW* WE RETURN OU TO THE REGULARL SCHEDULED
BROADCAST--*REALL*-I *MEAN* IT THIS TIME!!!
**************************************************************
ACTUALL, I FORGOT WHAT I WAS TALKING ABOUT, SO
I THINK I'LL JUST TR TO EXPLAIN A CONCEPT I WAS
THINKING ABOUT ESTERDA, BUT NEGLECTED TO ADDRESS:
ANARCH IS OUR ONL HOPE...
**************************************************************
Uhhh...
I hate to appear to be a fucking idiot, incapable of
sustaining a logical train of thought, but I just reached
the PointOfEnlightenment that comes around 4 a.m., when
one is out of beer and beginning to sober up, and looks
at the orange sitting on their desk and sees...an orange!
Not the cosmically meaningful macrocosm/microcosm orange
that seems to hold the key to the secrets of the universe
when one is high on acid. Not the orange with a bit of
green-stuff starting to show on its surface when you look
at it at the end of another long, hard day at the Salt
Mine, whereupon you chastise yourself for letting it go
bad before eating it, because your tired, acheing bones
remind you that you are living in a cold, hard world.
No, it is the orange that both the pragmatist and the
mystic see at 4 a.m., about an hour after the last beer
is gone, and the liquor store doesn't open for another
few hours. The *real* orange...
Anyway, 'Anarchy Is Our Only Hope...' is one of those
Deep Truths (TM) that are important to attempt to explain
to the unenlightened, who quit doing acid in '72, and now
have regular jobs.
But, Fuck It (TM)!
SPACE ALIENS HIDE M DRUGS!!! was always intended to be
my autobiography, but somebody else started it (although
I'm not complaining, because the FUD generated helped to
cover my ass on the original TruthMonger SoftTarget Tour)
and I think I have the right to be a little self-indulgent
(like it's the first time...right!) and put off finishing
the Bienfait Nutly News "ANARCH IS OUR ONL HOPE!"
Chrismas Special for a day or so.
So I think I'll sink into one of my undermedicated, ill-
advised rants about my personal issues, history and problems
which only remotely relate to the goals and purposes behind
the creation of the CypherPunks list.
Unless you have a lot of idle time on your hands, you might
just want to go ahead and delete the next chapter of SAHMD,
since it will undoubtedly be a semi-coherent, rambling diatribe
with little relevance to your life and/or your interests.
On the other hand, given my present state of mind, and the
fact that I just found a warm beer in the back of my truck,
the next chapter may well turn out to be one of those classic
works of literature that can only be produced by someone who
finds themself in the Desolate Place, an hour after they have
finished the LastBeerInTheWholeWorld (like Job), and then
is reborn, resurrected, refurbished by the discovery that,
not only is there a God AND a Dog, but there is also another
beer...
Smoke 'em if you got 'em...
From stuffed at stuffed.net Wed Jul 1 09:44:44 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Wed, 1 Jul 1998 09:44:44 -0700 (PDT)
Subject: Daily News Wed Jul 1 '98
Message-ID: <19980701142321.2253.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 267 bytes
Desc: not available
URL:
From CTIA_Daily_News at um2.unitymail.com Wed Jul 1 09:53:57 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Wed, 1 Jul 1998 09:53:57 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 1, 1998
Message-ID: <199807011650.LAA31630@mailstrom.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon / attachment
for the most important news in wireless communications today.
=============================================
From jackson at usenix.ORG Wed Jul 1 10:12:10 1998
From: jackson at usenix.ORG (Jackson Dodd)
Date: Wed, 1 Jul 1998 10:12:10 -0700 (PDT)
Subject: 1998 USENIX Annual Technical Conference - Call for Papers
Message-ID: <199807011714.KAA16480@usenix.ORG>
USENIX 1999 Annual Technical Conference
June 7-11, 1999
Monterey Conference Center
Monterey, California, USA
For the full call for submissions, see
http://www.usenix.org/events/usenix99
Papers due: December 2, 1998
Author notification: January 20, 1999
Camera-ready final papers due: April 27, 1999
Registration materials available: March, 1999
The 1999 USENIX Technical Conference Program Committee seeks
original and innovative papers about the applications, architecture,
implementation, and performance of modern computing systems.
As at all USENIX conferences, papers that analyze problem areas
and draw important conclusions from practical experience are
especially welcome. Some particularly interesting application
topics are:
Availability
Distributed caching and replication
Embedded systems
Extensible operating systems
File systems and storage systems
Interoperability of heterogeneous systems
Mobile code
Mobile computing
Multimedia
New algorithms and applications
Personal digital assistants
Quality of service
Reliability
Security and privacy
Ubiquitous computing and messaging
Web technologies
TUTORIALS
We are also accepting proposals for tutorials. USENIX's well-respected
tutorial program offers intensive, immediately practical tutorials on
topics essential to the use, development, and administration of advanced
computing systems. Skilled instructors, who are hands-on experts in
their topic areas, present both introductory and advanced tutorials
covering topics such as:
System and network administration
Java and Perl topics
High availability, scalability, and reliability
Programming tools and program development
Portability and interoperability
System and network security
Client-server application design and development
Sendmail, DNS, and other networking issues
GUI technologies and builders
WWW and CGI technologies
Performance monitoring and tuning
Freely distributable software
INVITED TALKS
The Invited Talks coordinators welcome suggestions for topics and
requests proposals for particular talks. In your proposal state
the main focus, include a brief outline, and be sure to emphasize
why your topic is of general interest to our community. Please submit
via email to ITusenix at usenix.org.
For the full call for submissions, see
http://www.usenix.org/events/usenix99
====================================================================
USENIX is the Advanced Computing Systems Association. Since 1975,
USENIX has brought together the community of engineers, system
administrators, and technicians working on the cutting edge of the
computing world. For more information about USENIX:
1. URL: http://www.usenix.org
2. Email to office at usenix.org
3. Fax: 510.548.5738
4. Phone: 510.528.8649
From billp at nmol.com Wed Jul 1 14:10:18 1998
From: billp at nmol.com (bill payne)
Date: Wed, 1 Jul 1998 14:10:18 -0700 (PDT)
Subject: Warning to court clerk
Message-ID: <359AA4DA.CCD@nmol.com>
Wednesday 7/1/98 2:59 PM
John Young
I will fax the two sheets from the clerk to you later this afternoon.
Morales and I will try to meet on his way home from work
to get his signature.
http://www.jya.com/sec062998.htm
http://www.jya.com/whp063098.htm
will likely cause MUCH MORE UNPLEASANTNESS .. for clerks and judges.
Let's hope this matter is promptly settled before it gets WORSE.
Later
bill
From schneier at counterpane.com Wed Jul 1 15:49:58 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Wed, 1 Jul 1998 15:49:58 -0700 (PDT)
Subject: Security Newsletter from Bruce Schneier
Message-ID: <199807012249.RAA08149@mixer.visi.com>
I've just started a crypto newsletter: CRYPTO-GRAM is a free monthly
email newsletter on cryptography from Bruce Schneier (author of
Applied Cryptography, inventor of Blowfish, general crypto pundit
and occasional crypto curmudgeon).
You can subscribe to CRYPTO-GRAM:
on the WWW, at http://www.counterpane.com/crypto-gram.html
by sending e-mail to crypto-gram-subscribe at chaparraltree.com
In the May issue:
The Secret Story of Non-Secret Encryption. The story
behind the British claim that they invented public-key
cryptography first.
Advanced Encryption Standard. How the government
is replacing DES.
In the June issue:
Side Channel Attacks. What's the big idea behind the
recent press announcements about breaking smart
cards by analyzing the power line?
Risks of Key Recovery, Key Escrow, etc. Why
implementing a FBI-style key recovery scheme will
do more to hurt national security than simply letting
people communicate.
Other regular features include:
News. Links to the interesting crypto stories.
War Stories. There are security lessons to learn
from all over, not just from computer geeks.
Resources. Summaries of the good Web resources
on privacy, security, and encryption.
We understand and respect your right to privacy. You are
receiving this email only because you have demonstrated an
interest in the areas of privacy, security and encryption.
You should also know that we would not sell, rent or share
our mailing list should you decide to subscribe. Our goal
is to maintain and develop a relationship of integrity and
trust with our subscribers. The members of this list are
not for sale. Period.
If you have any questions, don't hesitate to contact me.
Otherwise, I hope you'll take a moment to subscribe to
CRYPTO-GRAM at:
http://www.counterpane.com/crypto-gram.html
or mailto:crypto-gram-subscribe at chaparraltree.com
Regards,
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis, MN 55419 Fax: 612-823-1590
http://www.counterpane.com
From lreed at west.cscwc.pima.edu Wed Jul 1 16:07:22 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Wed, 1 Jul 1998 16:07:22 -0700 (PDT)
Subject: Statist Changes - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C8893.06B8B280.5@west.cscwc.pima.edu>
Statist Change - SPACE ALIENS HIDE M DRUGS!!!
______________________________________________
"The more you make change, the more your balance books
remain the same."
~ Chevy Change
Founder - Saturday Night Live Change Manhatten Bank
"Statist Change In The SidePocket - ou Can Bank On It."
Delbert McClinton, a paid media informant for a shell of
the former Time Bandits, the Nutly Noose, sent me a private
email, the contents of which which ethics and propriety
forbid me to disclose, although it can be PartyPhrased as,
"So why the fuck do you keep sending your goddamn SPAM to
the CypherPunks list, you illiterate, drunken asshole?!?!?"
The Real (TM) Answer #436-C.2:
"Because I'm a CypherPunk, ShitForBrains!!!...!!!"
"I don't care what they say about me, as long as they spell
my name wrong."
~ Declan McCaulkin
Former OldSpiceBoy who recently cut a solo album, "ArmGlue"
Declan McCullagh (ever notice that I only get his name right
when I'm insulting him?), who used to be an unread, but lightly
respected journalist for the Netly News (it is better to remain
unread and thought a Tool, than to get a byline and remove all
doubt) sold the soles of his shoes to pay the piper, only to
discover that his Controllers at Time Magazine, a subsiduary
of a fidicuary corporation, Slime, Inc., wholly owned by the
MainStream Enquirer (Gyrating Minds Want To Be Snowed) had
already paid the 'fiddler', and thus got to NameThatTune, since
they were astute enough to realize that the 'original' quote
was, "Those who learn from the mistakes of the past, can
profitably repeat them."
So now Declan, currently only a part-time employee of the
CIA/FBI/DEA/NSA (and ASecretThreeLetterOrganizationWhich-
SecretlyControlsTheWholeWorldToBeNamedLater) as a result of
being fired as a Cuspected CypherPunks Cpy, but rehired on
a consultancy basis to be a Shadow of his former self...
Damn...lost my train of thought, again. I guess that's why
they don't pay me the BigBucks...
Anyway, if Declan had been one of the original coconspirators
(sometimes spelled with a hyphen) in the Secret Plot Against
The CypherPunks List, instead of a JohnnyComeLately trying to
jump on the bandwagon, after believing Jim Bell when he told
Declan how great prison food is, he would be aware that a
chapter of a previous 'True Story Of The InterNet' manuscript
pointed out that a member of an elite group of dribblers
who wore green bibs with numbers on them, the CelticPunks,
Kevin McHale (if that is his *real* name...), said of a
fellow CelticPunks member, Danny Angst, "Sure, he's actually
a slobberer, but he's *our* slobberer!"
This quote was used to illustrate my point that the late
Dr. Dimitri Vulis, KOTM, an IgnorantInsaneInconsiderateIgnoble
Asshole, was a 'CypherPunks' IgnorantInsaneInconsiderateIgnoble
Asshole (TM). PissAnt Dale Thorn was a 'CypherPunks' PissAnt.
Cocksucker John Gilmore was a 'CypherPunks Cock Cucker' (not
to be confused with the Criminal Cocksucker of Canada). Statist
GuberMint Chill, Kent Crispin, was a 'CypherSpooks' Statist
DoubleMint Chill, and a secret member of the Circle of Eunuchs.
The veteran elitists on the list accused me of being a
elitist neophyte who was bitter over not having received a
CecretSypherPunksDecoderRing (TM), but none of this really
has anything to do with the point I am trying to make...
"When Outlaws are outlawed, only Outlaws will be outlaws."
~ An Inlaw of Billy the Kid (aka-BadBillyG, BadBillyC, Bill
Frantz, Bill Stewart, William Geiger III, Bill C. May, etc.)
(Anyone complaining about the foregoing not making any sense
is obviously hanging around with David Byrne because he is
rich and famous, and not because they truly love and understand
his music.)
Why I Am Spamming The CypherPunks List #A-497-2.3:
I am the TruthMonger.
The dedication of my life to becoming one with the MadDog-
InPossessionOfTheLastFalseSmile resulted in my being forcefully
unbriscrived from the Jack Nicholson Fan Club Mailing List,
because "THE CAN'T *HANDLE* THE TRUTH!"
In loneliness and depravation, I decided to sribvive to the
Suicide Mailing List, but it turned out to be just a corporate-
sponsored pimple on the butt of the InterNet, created as a means
to feature the Nike 'Just Do It' logo. (Besides, there was only
one other member on Suicide Mailing List, and she only sent a
single post, a suicide note, helping me to realize that she had
really belonged on the list, while I was just a rubbernecker.
I then subscribed to the AIDS Support List, but was kicked off
when they discovered that I didn't have AIDS, and was just there
to try and meet women.
On advice of legal counsel, and Jerry Falwell, I will refrain
from describing my experiences on the Christian Pre-Teen Mailing
List, since charges are still pending.
Why did I subscribe to the CypherPunks Mailing List? It was
the last one...I had been kicked off of all the others.
I thought that this time, I might be accepted for who I
really pretend to be, since I believed that the other list
members would be delighted to know that I had 'broken PGP,'
although I couldn't provide any proof of it, at the time.
Also, I had just completed work on a totally unbreakable
encryption system, although I was hesitant to share details
with others, in fear that someone might figure out how it
worked, thus compromising the total security it provided.
When the rest of the list suckbikers attacked me in fits of
RayCharlesRage, I realized that they, like myself, suffered
from Tourette Syndrome, and were not just pretending to,
like Andrew Dice Clay. I suddenly realized that encryption
was a science that had come about as a result of hundreds of
years of misdiagnosis of Dyslexia and Attention Deficit
Disorder (not to be confused with Federal Deficit Disorder,
which causes politicians peering into taxpayer pockets to
see a Bottomless Pit).
I realized that these people were sick motherfuckers...
I was home...
If ou Can't Kill The List ou Love, Kill The One ou're On:
I have never been fond of the CypherPunks Mailing List, or
its subscribers. The list and list members are a constant
reminder that I am a mental misfit and a social outcast,
chased by the torch-bearing angry mob of decent, law-abiding
NetiZensComeLately back to the CypherPunks Cecret Castle,
cleverly disguised as a Mailing List.
It is indeed a great irony that I, a pretentious interloper
on the list, was ultimately responsible for single-handedly
rescuing the CypherPunks list from death and oblivion.
I know what you're thinking: "Drop the crack pipe, and slowly
back away from the keyboard..."
But it's True (TM), I swear to Dog.
I'm not claiming to be some kind of Hero, or to be Dustin
Hoffman, or anything, since it came about quite by accident.
At the time of the Legendary CypherPunks Censorship Crisis
(not to be confused with the CypherPunks Moderation Experiment),
I did everything I could to forment dissent, cause fractious
fractal fractures between the list members, shooting and pissing
at everyone and everything in sight, even myself, suffering
several serious foot-wounds in the process.
It was only later, when it became obvious that the CypherPunks
list was going to survive, and prosper, and that, in fact, a
beautiful Toad had been transformed, by the KissOfDeath, into
a plethora of ugly PrincesAndPrincesses, that I realized that
the CypherPunks Censorship Crisis had been an attempt to destroy
the list, by making it just another bland, everyday imitation
of PoliticallyCorrectMasturbation that would make our mothers
proud of us, as long as we didn't stain the sheets too badly.
In retrospect I realized that I had inadvertently saved the
list from a Zombie-like future as just another sidestreet on
the Information Highway by using my posts to promote and
glorify violent anarchy against reason, common sense, and
everything that my mother and father taught me in the hope
of saving me from being a bad influence on myself, little
realizing that I was actually epitomizing what the CypherPunks
Disturbed Male LISP was really about.
I realize that I am enclosing myself in an aura of grandoise
self-importance once again, since most of the list subscribers
fell into the same knee-jerk reactions as I did, even the ones
who were calling the loudest for censorship, but doing so by
shitting and pissing on the OfficiallyPerceivedTroubleMakers
on the list, so, in actual fact, one might surmise that the
CypherPunks Mailing List was not so much 'saved' by anyone,
as merely confirming itself to be an IndestructibleEntity that
would survive as long as their was a single individual on the
face of the earth who continued to respond to a perfectly
reasonable and valid statement with, "Oh yeah? Sez who?", or
a pair of bickering children screaming, "Did so!/Did not!/Did
so!/Did not!"
Still, I think I deserve a CypherPunksSecretDecoderRing...
"Question Anonymity!"
~ Janet Renal
Department of Blow Jobs
"Why not? Are you 'gay', or something?"
[I am going to take a BeerBreak, and give you a chance to
check the archives, in order to confirm that the next
chapter of SAHMD, which deals with the concepts underlying
the formation of the Army of Dog, was first mentioned on
the CypherPunks list by Tim C. May, who really did invent
everything, including the Wheel (doing it in his sleep),
making the rest of us just dirt under his CypherPunks Elitist
Feet (TM).]
From 8tIBa9867 at thegrid.net Wed Jul 1 21:53:02 1998
From: 8tIBa9867 at thegrid.net (8tIBa9867 at thegrid.net)
Date: Wed, 1 Jul 1998 21:53:02 -0700 (PDT)
Subject: THE BEST ADULT WEBMASTER PRODUCTS
Message-ID: <199807020452.VAA08105@toad.com>
UPDATED! DUE TO POPULAR DEMAND WE HAVE
A NEW EMAIL ADDRESS FOR YOU TO SEND REQUESTS
AND A TELEPHONE NUMBER! (818) 881-2679
THE FIVE HOTTEST ADULT WEBMASTER PRODUCTS
PREVIOUSLY OFFERED ONLY NOW TO SELECT SITES
CAN NOW BE YOURS AT AFFORDABLE PRICES!
BETTER ACT NOW OR YOU LOSE OUT!
THE FIRST 20 SITES CAN GET THESE GREAT PRODUCTS:
1. PornholioVision: Over 2000 10 minute Straight Clips, with Full screen option and 3 fps on a 28.8 modem. Includes a search engine and full descriptions of all clips.
2. GayholioVision: Same as Pornholio, except all Gay clips, and
descriptions!
3. Voyeur Vision: Over 50 Hidden Camera's with full color cameras inside toilets, looking up at the girls pussy!! also we have gyno cams inside doctors offices, and mall cams inside changing rooms.
4. Cyberfold: A full site dedicated to one model each and every month. Contains over 300 images, 1 hour of video clips, and interactive sections where you tell the girl where you tell the girl what to do with the toys and where to put them. Each month has a different theme, and totally awesome graphics. You can download them yourself, or we can serve them for you.
You get 6 issues for the price of 1 this month!!!
5. Guyberfold: Same as Cyber fold but with a Gay film star each month. (this product is designed by gay producers for gay members!!!
If you are interested in these hot products,
send an email to pornholiodave at youwonthis.com
Any problems sending mail, call me at (818) 881-2679
during business hours Pacific Time (California)
and tell me what products you would like to see.
Tell me your url (http://??) of your website too, please
FREE SAMPLES AND FREE TRIALS
FOR QUALIFIED ADULT WEBMASTERS.
You have seen our products all over the web, and now it's time to get them for yourself.
Dave
This list has been filtered with the list at
http://remove-list.com (a free service
to remove your email address permanently
from mailings like this). Please excuse the
intrusion for this important correspondence.
From aqwsc1a at cpckor.com.tw Wed Jul 1 23:55:23 1998
From: aqwsc1a at cpckor.com.tw (aqwsc1a at cpckor.com.tw)
Date: Wed, 1 Jul 1998 23:55:23 -0700 (PDT)
Subject: Email 57 Million People for $99
Message-ID: <199807013333AAA37317@post.cpckor.com.tw>
��������� 57 MILLION
EMAIL ADDRESSES
FOR ONLY $99
������
� You want to make some money?
I can put you in touch with over 50 million people at virtually no cost.
Can you make one cent from each of theses names?
If you can you have a profit of over $500,000.00
����� That's right, I have 57 Million� Fresh� email
addresses that I will sell for only $99. These are all
fresh addresses that include almost every person
on the Internet today,� with no duplications. They are
all sorted and ready to be mailed.� That is the best
deal anywhere today !� Imagine selling a product for
only $5 and getting� only a 1/10% response.�� That's�
$2,850,000� in your pocket !!!
Don't believe it? People are making that kind of
money right now by doing the same thing, that is
why you get so much email from people selling you
their product....it works !� I will even tell you how to
mail them with easy to follow step-by-step
instructions I include with every order.� These 57
Million email addresses are yours to keep, so you
can use them over and over and they come on 1 CD.�
This offer is not for everyone.
If you can not see the just how excellent the
risk / reward ratio in this offer is then there is
nothing I can do for you.
To make money you must stop dreaming
and TAKE ACTION.
****************************************
THE BRONZE MARKETING SETUP
57,000,000 email addresses on CD
These name are all in text files
ready to mail!!!
$99.00
****************************************
THE SILVER MARKETING SETUP
57,000,000 email addresses on CD
These name are all in text files
ready to mail!!!������ AND
8 Different Bulk email programs
and tools� to help with your mailings
and list management.
$ 139.00
****************************************
THE GOLD MARKETING SETUP
VIRTUALLY EVERYTHING!!
57,000,000 email addresses on CD
These name are all in text files
ready to mail!!!������ AND
8 Different Bulk email programs
and tools� to help with your mailings
and list management.
������������ AND
Over 500 different Business Reports
now being sold on the Internet for up to
$100 each. You get full rights to resell these reports.
With this package you get the email addresses,
the software to mail them AND ready to sell�
information products.
AND ......
.. a collection of the 100 best money making
adds currently floating around on the Internet.
$ 189
****************************************
THE PLATINUM MARKETING SETUP
FOR THOSE READY TO "OWN THE NET"
57,000,000 email addresses on CD
These name are all in text files
ready to mail!!!������ AND
8 Different Bulk email programs
and tools� to help with your mailings
and list management.
������������ AND
Over 500 different Business Reports
now being sold on the Internet for up to
$100 each. You get full rights to resell these reports.
With this package you get the email addresses,
the software to mail them AND ready to sell�
information products.
AND ......
.. a collection of the 100 best money making
adds currently floating around on the Internet.
AND ......
FLOODGATE & GOLDRUSH FULLY REGISTERED SOFTWARE!!
This is the Number 1 most powerful mass mailing software in the world today.
There is nothing that can compare for speed, reliability, performance, and the
ability to use "stealth" functions.
This is the package that will allow you to use the net as your own personal
"money tree" at will!!!
$ 379
****************************************
SEVERAL WAYS TO ORDER !!!
IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 57 MILLION + NAMES
WITHIN 12 HOURS OF YOUR ORDER!!!
� 1) WE ACCEPT:� AMERICAN EXPRESS OR
���
������������������������������ VISA <> MASTERCARD
���� TYPE OF CARD� AMX / VISA / MC??_______________
����� EXPIRATION DATE�� ___________________________
���� NAME ON CREDIT CARD________________________
���� CREDIT CARD #________________________________
���� BILLING ADDRESS ____________________________
���� CITY_________________________________________
��� STATE________________ZIP_____________________
�� PHONE INCLUDE AREA CODE___________________
��
��� EMAIL ADDRESS______________________________
������� WE WILL BILL selected amount to your account plus the following
shipping costs
������� SHIPPING� COST OF 3.85 FIRST CLASS MAIL
������� SHIPPING COST OF� 15.00� 24 HOUR EXPRESS MAIL /� FEDERAL EXPRESS
������� SALES TAX� added to AR residents
� >>> Send correct amount in cash, check or money
order to:
� >>> FIRE POWER!!
� >>> 1320 N. "B" St., Suite 112-24
� >>> Fort Smith, AR� 72901
�� 2) Send the same above requested credit card
information to above address.
��
�� 3) Call phone # 530-876-4293.� This is a 24 hour phone
number to place a CREDIT CARD order.
FIRE POWER! is a private company and is not affiliated with, or endorsed by,
AOL, MSN, or any other Internet Service Provider.
Copyright 1998
All rights res
From jya at pipeline.com Thu Jul 2 04:26:04 1998
From: jya at pipeline.com (John Young)
Date: Thu, 2 Jul 1998 04:26:04 -0700 (PDT)
Subject: IE Frees Crypto
Message-ID: <199807021125.HAA06437@camel7.mindspring.com>
Source: http://go2.guardian.co.uk/paper.html
Thanks to IB
The Guardian Online, Microfile, July 2, 1998
ANNOUNCING the most liberal national policy yet on
the encoding of data sent over the Internet, the Irish
government last week showed it has every intention
of being an international centre for electronic commerce.
Ireland listened to its many resident technology companies,
rather than bowing to pressure from the US, which wants
access to encrypted messages. Ireland places no
restrictions on the use, import or export of encryption
products. Individuals can choose to offer a plain text
version of the encrypted document or hand over a key,
if a search warrant is proffered. The document was
released to coincide with the Irish visit of President
Clinton�s Internet tsar, senior trade advisor Ira Magaziner,
who hinted that his views on encryption diverge from
those of his boss. "Within the next year, there�ll be such
an availability of high-level encryption that the market
will take over," he said.
-----
Leads on getting this paper would be appreciated.
From declan at well.com Thu Jul 2 07:11:16 1998
From: declan at well.com (Declan McCullagh)
Date: Thu, 2 Jul 1998 07:11:16 -0700 (PDT)
Subject: Statist Changes - SPACE ALIENS HIDE MY DRUGS!!!
In-Reply-To: <009C8893.06B8B280.5@west.cscwc.pima.edu>
Message-ID:
This is one of the better rants I've read in a while. You left out my
Trilateral connection, though.
-Declan
> So now Declan, currently only a part-time employee of the
> CIA/FBI/DEA/NSA (and ASecretThreeLetterOrganizationWhich-
> SecretlyControlsTheWholeWorldToBeNamedLater) as a result of
> being fired as a Cuspected CypherPunks Cpy, but rehired on
> a consultancy basis to be a Shadow of his former self...
From mok-kong.shen at stud.uni-muenchen.de Thu Jul 2 08:58:30 1998
From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen)
Date: Thu, 2 Jul 1998 08:58:30 -0700 (PDT)
Subject: IE Frees Crypto
In-Reply-To: <199807021125.HAA06437@camel7.mindspring.com>
Message-ID: <359BAE16.58832781@stud.uni-muenchen.de>
John Young wrote:
>
> Source: http://go2.guardian.co.uk/paper.html
>
> The Guardian Online, Microfile, July 2, 1998
>
> access to encrypted messages. Ireland places no
> restrictions on the use, import or export of encryption
> products. Individuals can choose to offer a plain text
> version of the encrypted document or hand over a key,
> if a search warrant is proffered. The document was
I have a language problem. Does this mean that the authority
depends on the honesty of the individual who hands over
a plain text saying that it corresponds to the ciphertext
or else how is the intent of the authority to obtain the
true plain text to be achieved?
M. K. Shen
From CTIA_Daily_News at um2.unitymail.com Thu Jul 2 11:04:21 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Thu, 2 Jul 1998 11:04:21 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 2, 1998
Message-ID: <199807021753.MAA07657@mailstrom.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon / attachment
for the most important news in wireless communications today.
=============================================
From jmcc at hackwatch.com Thu Jul 2 11:14:38 1998
From: jmcc at hackwatch.com (John McCormac)
Date: Thu, 2 Jul 1998 11:14:38 -0700 (PDT)
Subject: IE Frees Crypto
In-Reply-To: <199807021125.HAA06437@camel7.mindspring.com>
Message-ID: <359BCD11.30DEF3CD@hackwatch.com>
Mok-Kong Shen wrote:
>
> John Young wrote:
> >
> > Source: http://go2.guardian.co.uk/paper.html
The Guardian article is probably not as good as the real thing :-) and
so I've quoted excerpts from it here. The full document is on:
http://www.irlgov.ie/tec/html/signat.htm
(John, it would be better to quote the actual document on your page as
the Guardian article is only a limited view.)
Ira Magaziner was in negotiation with the Irish government over this and
some meetings were held in secret. I am still trying to get all the
facts on this one.
� Users shall have the right to access strong and secure encryption to
ensure the confidentiality, security and reliability of stored data and
electronic communications.
� Users shall have the right to choose any cryptographic method.
� The production, import and use of encryption technologies in Ireland
shall not be subject to any regulatory controls other than obligations
relating to lawful access.
� The export of cryptographic products is to continue to be regulated in
accordance with the relevant EU Regulations and Decisions and Irish
national legislation which reflect the Wassenaar Arrangement on Export
Controls for Dual-Use Goods and Technologies and Conventional Arms.
This one is worrying as the gobshites in the EC are capable of really
banjaxing the situation. Since EU Directives are law when they are
published, they could well cause a bit of legal conflict. Under EU
legislation, at least one of my books could be banned.
� In order to enable lawful access to encrypted data, legislation will
be enacted to oblige users of encryption products to release, in
response to a lawful authorisation, either plaintext which verifiably
relates to the encrypted data in question or the keys or algorithms
necessary to retrieve the plaintext. Appropriate sanctions will be put
in place in respect of failure to comply.
This seems to be carefully considered in that the user could be asked to
prove the encrypted document contains the encrypted form of the
plaintext. But the most important thing is that a search warrant would
be required to force the user to give up the plaintext or the key.
Surprisingly it could be interpreted so that the user only has to prove
the link rather than giving up his or her key.
2. Electronic Signatures
� Legislation will be enacted to facilitate the use of electronic
signatures through the establishment of a framework for the
authorisation of bodies to act as nationally accredited Certification
Authorities.
This is unusual - could this mean that each Irish citizen would have
their own Cert/sig? Everyone who works in Ireland or avails of any state
services seems to have an RSI number (just like the SS number in the
US). They introduced mag strip cards for unemployment benefits a few
years ago.
I am currently working on an article about this proposal on crypto and
will post it when I finish it.
Regards...jmcc
--
********************************************
John McCormac * Hack Watch News
jmcc at hackwatch.com * 22 Viewmount,
Voice: +353-51-873640 * Waterford,
BBS&Fax: +353-51-850143 * Ireland
http://www.hackwatch.com/~kooltek
********************************************
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6
mQCNAzAYPNsAAAEEAPGTHaNyitUTNAwF8BU6mF5PcbLQXdeuHf3xT6UOL+/Od+z+
ZOCAx8Ka9LJBjuQYw8hlqvTV5kceLlrP2HPqmk7YPOw1fQWlpTJof+ZMCxEVd1Qz
TRet2vS/kiRQRYvKOaxoJhqIzUr1g3ovBnIdpKeo4KKULz9XKuxCgZsuLKkVAAUX
tCJKb2huIE1jQ29ybWFjIDxqbWNjQGhhY2t3YXRjaC5jb20+tBJqbWNjQGhhY2t3
YXRjaC5jb20=
=sTfy
-----END PGP PUBLIC KEY BLOCK-----
From jya at pipeline.com Thu Jul 2 15:29:31 1998
From: jya at pipeline.com (John Young)
Date: Thu, 2 Jul 1998 15:29:31 -0700 (PDT)
Subject: Code Wizard Frank Rowlett Dies
Message-ID: <199807022229.SAA20296@camel8.mindspring.com>
Frank Rowlett, a founder of NSA's National Cryptologic School,
has died at 90. The New York Times has an obituary on the
"code wizard" today:
http://jya.com/nsa-rowlett.htm
Rowlett was one of three earliest recruits of William Friedman,
head of the the US Army Signal Intelligence Service, a 1930s
forerunner of NSA's "massive cryptologic system today" (Kahn).
After a long career in Army cryptology Rowlett served with the
CIA and was special assistant to the DIRNSA at the end of his
service in the 1960s.
He is credited with helping to break the Japanese RED and
PURPLE codes, efforts unlerlying the Allies World War II
MAGIC cryptanalysis system.
He was also an inventor, following work of others, of the
SIGABA machine, the US Army's version of Hebern's
cipher device, and held other cryptologic patents.
David Kahn has tart remarks in The Codebreakers about
how Friedman, and to a lesser extent, Rowlett, got national
awards for work done by others, through "well-situated
friends, picayune mechanical differences, and a great but
totally irrelevant record." (page 392)
From free at church.com Thu Jul 2 16:40:52 1998
From: free at church.com (free at church.com)
Date: Thu, 2 Jul 1998 16:40:52 -0700 (PDT)
Subject: GIVING AWAY $432,000 ... For FREE !
Message-ID: <199807022340.QAA04430@toad.com>
Hello
**Note this is not a bulk email. This is sent out to only serious
non-profit/profit organizations interested in what we have to
offer.
My name is Sharon Haley.
I am a representative for The INDIANA JONES Corporation.
We have created a program that will allow your family,
business, church or organization, an opportunity to receive
THOUSANDS of dollars Each and EVERY MONTH
by simply signing up as a customer to try our service.
For FREE...
Indiana Jones has joined the
600 Billion dollar Telecommunications Industry.
And We will donate up to 8% of our profits to YOU.
You could receive
$10,000....$100,000....$400,000 Dollars or more
EACH and EVERY MONTH
If you have a large organization, you could use our program
as a Fundraiser to generate
Tens of thousands of Dollars
or as much as
Six Million Dollars ($6,000,000.00)
to support your group or research programs
for Cancer, Aids, and other good causes.
You can also sign-up your business and use this money to
support all the events and organizations that you sponsor
throughout the year; such as corporate conventions,
little league groups, girl scouts, boy scouts
and even your local community...
the list goes on.
We are reuniting families all across the country by
donating money to help them get their dreams back,
spend more time with their love ones and support their
children's education.
Many are already using our program to generate funds for
their family reunion occasions, anniversaries, weddings and
even more...
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
Learn How your Family, Business, Church / Organization can receive
thousands of dollars month-after-month, year-after-year.
There is
ABSOLUTELY NO INVESTMENT COST TO YOU.
Free...CONTINUOUS REVENUE in 30 days.
Visit our website:
http://www.indianajonescorp.com/html/unidial-free.html
The Indiana Jones Corporation
Midwest Corporate Headquarters
Portage, Indiana 46368
phone (219) 764-2515
fax (219) 763-2692
From ericm at lne.com Thu Jul 2 16:46:11 1998
From: ericm at lne.com (Eric Murray)
Date: Thu, 2 Jul 1998 16:46:11 -0700 (PDT)
Subject: IE Frees Crypto
In-Reply-To: <359BCD11.30DEF3CD@hackwatch.com>
Message-ID: <199807022345.QAA07915@slack.lne.com>
John McCormac writes:
[about Irish crypto legislation]
>
> � In order to enable lawful access to encrypted data, legislation will
> be enacted to oblige users of encryption products to release, in
> response to a lawful authorisation, either plaintext which verifiably
> relates to the encrypted data in question or the keys or algorithms
> necessary to retrieve the plaintext. Appropriate sanctions will be put
> in place in respect of failure to comply.
>
>
> This seems to be carefully considered in that the user could be asked to
> prove the encrypted document contains the encrypted form of the
> plaintext. But the most important thing is that a search warrant would
> be required to force the user to give up the plaintext or the key.
It says "lawful authorisation" not "search warrant".
That means that sometime later they can go back and
pass another law that says that "lawful authorisation" for
forcing one to reveal one's plaintext or keys is something
much less stringent than a search warrant.
Most proposed US crypto regulations have similar weasel-words.
--
Eric Murray Chief Security Scientist N*Able Technologies www.nabletech.com
(email: ericm at lne.com or nabletech.com) PGP keyid:E03F65E5
From mmotyka at lsil.com Thu Jul 2 16:59:31 1998
From: mmotyka at lsil.com (Michael Motyka)
Date: Thu, 2 Jul 1998 16:59:31 -0700 (PDT)
Subject: Finally... a One-Time-Pad implementation that works!!!
Message-ID: <359C1F2B.5DF4@lsil.com>
Hmmm...good thing we don't step in it...
--
..............................
. Michael Motyka .
. LSI Logic Corporation .
. 5050 Hopyard Rd. Suite 300 .
. Pleasanton, CA 94588 .
. .
. mmotyka at lsil.com .
. Voice 925.730.8801 .
. FAX 925.730.8700 :) .
..............................
From jmcc at hackwatch.com Thu Jul 2 17:04:24 1998
From: jmcc at hackwatch.com (John McCormac)
Date: Thu, 2 Jul 1998 17:04:24 -0700 (PDT)
Subject: IE Frees Crypto
In-Reply-To: <199807022345.QAA07915@slack.lne.com>
Message-ID: <359C200A.C113F0BA@hackwatch.com>
Eric Murray wrote:
>
> John McCormac writes:
>
> [about Irish crypto legislation]
>
> >
> > � In order to enable lawful access to encrypted data, legislation
> will
> > be enacted to oblige users of encryption products to release, in
> > response to a lawful authorisation, either plaintext which
> verifiably
> > relates to the encrypted data in question or the keys or algorithms
> > necessary to retrieve the plaintext. Appropriate sanctions will be
> put
> > in place in respect of failure to comply.
> >
> >
> > This seems to be carefully considered in that the user could be
> asked to
> > prove the encrypted document contains the encrypted form of the
> > plaintext. But the most important thing is that a search warrant
> would
> > be required to force the user to give up the plaintext or the key.
>
> It says "lawful authorisation" not "search warrant".
>
> That means that sometime later they can go back and
> pass another law that says that "lawful authorisation" for
> forcing one to reveal one's plaintext or keys is something
> much less stringent than a search warrant.
> Most proposed US crypto regulations have similar weasel-words.
Yep Eric,
I think that most people have jumped the gun here on this one. These are
not the actual regulations. They are only part of a framework proposal
so the eventual legislation could be lightyears removed from these
principles. (In fact given that most of the discussions between Ira
Magaziner and the Irish government were carried out in secret, I think
that the eventual legislation will be riddled with loopholes. Guess we
may have become the 51st state and we didn't even know. :-) ) The
problem is that most of the journos who wrote about it are relatively
clueless on the crypto aspect of things. There was some input from
Electronic Frontier Ireland (Irish version of EFF) on the principles so
that is a good thing.
Regards...jmcc
--
********************************************
John McCormac * Hack Watch News
jmcc at hackwatch.com * 22 Viewmount,
Voice: +353-51-873640 * Waterford,
BBS&Fax: +353-51-850143 * Ireland
http://www.hackwatch.com/~kooltek
********************************************
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6
mQCNAzAYPNsAAAEEAPGTHaNyitUTNAwF8BU6mF5PcbLQXdeuHf3xT6UOL+/Od+z+
ZOCAx8Ka9LJBjuQYw8hlqvTV5kceLlrP2HPqmk7YPOw1fQWlpTJof+ZMCxEVd1Qz
TRet2vS/kiRQRYvKOaxoJhqIzUr1g3ovBnIdpKeo4KKULz9XKuxCgZsuLKkVAAUX
tCJKb2huIE1jQ29ybWFjIDxqbWNjQGhhY2t3YXRjaC5jb20+tBJqbWNjQGhhY2t3
YXRjaC5jb20=
=sTfy
-----END PGP PUBLIC KEY BLOCK-----
From lreed at west.cscwc.pima.edu Thu Jul 2 18:20:39 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Thu, 2 Jul 1998 18:20:39 -0700 (PDT)
Subject: Army of Dog - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C896E.CFA3F8E0.5@west.cscwc.pima.edu>
Army of Dog - SPACE ALIENS HIDE M DRUGS!!!
___________________________________________
Bienfait Nutly News
"ANARCH IS OUR ONL HOPE"
Christmas Special
*****************
by King Author and the Dark&Stormy
Knights of the Magic RoundTable
A Personal Note From An Army of Dog Prisoner Of War:
To: remailer-operators at dev.null
From: DaltonGang at Dev.Null
Since my meatspace body is currently hanging on a
federal meathook, my consistent meatspace identity
is currently available for those who wish to rent
it.
Given the high value of the BadReputationCapital
currently connected to my consistent meatspace
identity, I don't feel I am remiss in requiring both
a small monetary remittance to:
James Bell #26906086
Federal Detention Center
P.O. Box 68976
Seattle WA 98168
as well as Executive Editor credits on any InterNet
website or email account that uses my consistent
meatspace persona to send threatening letters to
goverment agencies, officials and employees, to
run Assassination Politics Bots, or to engage in
activities which violate the conditions of my parole,
including, it seems...breathing.
James Dalton Bell
"They also serve, who only bend over and wait."
-----Pretty Monitored Privacy Public Cell Key-----
OuCh#$!tHAthuRts*&^nOOooOnotSAnd!!!OKwhO'SNexT????
--------------------------------------------------
Questionable Quotes #37:
"If the Army of God can kill so many people from the
Missionary Position, where the risk of transmitting
AIDS is comparitively low, then the Army of Dog
should be that much more effective, working Doggie
Style..."
~The Unknown CypherPunk (aka TCM)
CypherPunks Cult of One
Bay Area Addition
The recent phenomena of the Army of Dog, which has had a
long history of never before existing, is rumored by many
to be a splinter group of the Circle Of Eunuchs, which had
come into existence as a result of an announcement on
December 7, 1989, by Bubba Rom Dos, that the existence such
a group would be extremely dangerous to those involved, and
that everyone assembled should immediately disband and have
no further contact with one another.
The Circle of Eunuchs, a wholly owned subsiduary of the
Magic Circle, headquartered nowhere, has managed to keep
their heads, as well as avoid being drawn and quartered,
by never really existing. Although consisting of 3-member
Gorilla Cells whose manner and method of their use of
bananas is totally up to the individuals involved, based
on their personal ethics and morals, none of the members
can ever really be certain that the CoE actually exists,
although it is pretty hard to deny the existence of the
bananas, if you have made the mistake of choosing your
fellow CoE Gorilla Cell members randomly from ads in
the free magazines widely available in San Franciso.
The Army of Dog operates much along the same lines, with
the major difference being that more of the members choose
to act alone, in solitary Cult of One units, with the more
moderate members generally requiring reading glasses, while
the more radical members eventually go blind.
Seasoned warriors, they refuse to ask for pity or sympathy,
having only themselves to blame, 'cause momma tried...
Questionable Quotes #896:
"ou don't have to have a bottle of Mercetan to know
which way Janet Reno is blowing."
~JDB
BellWeatherMen Cult of One
Seattle AboveGround Cell
Army of Dog recruits, going one step further than the
Army of God members who have so successfully avoided being
hunted down like dogs by LEA's around the country, perform
many of their nefarious activities on behalf of causes that
they have little or no connection to, little or no interest
in, and do not necessarily believe in.
For example, an Army of Dog Virtual Warrior who is very
passionate in their feeling regarding the demonization and
persecution of Kevin MitNikita, but who thinks that Jerome
Dalton Bell is an asshole who got what he had coming to him,
would naturally gravitate toward performing subversive
actions which violated the conditions of Bell's parole.
(If that AoD Warrior was a minor, they might even be bold
enough to join with other minors in small Saskatchewan
towns, acting in concert with NineInchNails, knowing they
would not have to worry about being tried as an adult,
since they could prove that their uncle, the Author, was
not even an adult.)
On the other hand, a CypherPunks Army of Dog Virtual
Warrior, who feels indebted to Jim Bell for the blow jobs
while awaiting trial (even though he *did* have to hold
a knife to Jim's throat, since Jim was playing 'hard to
get'), would perform their subversive activities on
behalf of the UnaBomber, who they thought was a fucking
lunatic who was better off locked up.
(For instance, they might perform a variety of low-key
meatspace crimes, such as setting the Dumbarton bridge
on fire, just before the UnaBomber's trial, and then
notify the President by email that they were ready to
step in and take the UnaBomber's place if he was
executed. Natually, they would do this from a hacked
account...)
Questionable Quotes #486:
"Give them Flack, John."
~Bob
Church of the SubGenius Cult of One
Davis-Monathan Division
Many Army of Dog recruits are LEA's and paid government
informants who tried to infiltrate the AoD, but who got
a little carried away and eventually ended up performing
some act of meatspace violence so atrocious that they had
to quickly find a scapegoat such as Timoth McVeigh, to
take the fall.
(Although the agent code-named Defcon McCullagh Chainsaw
claims he was just there to cover the bombing, in a
free-lance assignment for the Oklahoma Nutly News, he
has thus far failed to adequately explain submitting
a receipt for breakfast with the BATF shortly before
the explosion, or why the BATF would be having champagne
and caviar for breakfast, saying only, "Eggs is eggs...")
Questionable Quotes #8:
"I never minded about the little things."
~Bridget Fonda
The Author's Secret Lover Cult of One
Although both Army of Dog Virtual Warriors and MeatSpace
Warriors are quick to point out that sex after plugging a
strangers parking meter, or setting off the fire alarm
at the local school via modem, is phenomenal, they also
point out that it doesn't hurt to have a co-conspirator
(sometimes spelled without the hyphen).
One Army of Bitch WarriorGoddess, speaking about her
long-time relationship with an AoD programmer, said,
"Although he starts with a relatively small value of 'c',
he always increments it, and sometimes puts it through
what seems to be an endless loop."
(For the non-computer oriented, that loosely translates
as, "He may not touch bottom, but he sure raises hell
with the sides.")
Questionable Quote #1:
"Bite them all, and let the Veteranarian sort them out."
~Rabid WarMongrelBat
Marisupial Cult of One
If ou Can't Erase The Hard Drive Of The One ou Hate,
Erase The Hard Drive Of The One ou're With:
'The Book of Big Mischief' (not to be confused with a much
better work, with a similar name), advises that any Army of
Dog member who plans to throw a serious, possibly traceable
Hex/Screw into the Back(Door) of a government, corporate,
religious or social entity/system via the tools of their
own workplace, should take great pains to make certain
that their office space contains:
1. American Flag
2. Apple Pie (preferrably baked by your mother)
3. Bible (*not* the New Age Aquarian version)
4. "I Love MicroSoft" Stickers
5. Pictures of the President AND Newt Gingrich
6. A Timothy McVeigh Dartboard
7. A Shrink-Wrapped Copy Of CyberNanny
8. An unfinished, hand-written letter to Louis Freeh,
stating that you suspect your supervisor of being
an anti-government radical.
9. Bail Money
Questionable Quote #2-A:
"A little Byte goes a long way, particularly if you don't
let go."
~Baby TruthMonger
Army of Bitch
Questionable Quote #2-B:
"Something small is going to happen...but it's going to
happen a lot of times...July 5, 1998, 07:09"
~The Arthur
Army of Dog / Cult of Nun
One For ou, One For Me...Two For ou, One, Two For Me:
Craperate and Goobermint BeanCounters *do* mind about the
little things, but these things are unlikely to come to their
attention if the DataEntryOperator and/or the Auditor are
Army of Dog recruits.
A multitude of mistaken credits to your own account is
fraud. A multitude of fraudulent credits to the account of
a charitable or subversive organization to which you have
no connection is a mistake.
If ou Don't Unnerstan Nuthin Else, Understand This:
Joe Montana was a Dan Fouts with a front line.
General Eisenhower was a General Lee with a front line.
Winston Churchill was a Neville Chamberlain with a back door.
Censorship Czars aren't afraid of quarterbacks, generals and
leaders. They are afraid of men and women in trenches, behind
data-entry screens, and people with flashlights, peering into
the dark and hidden places.
The Enemies of Freedom of Speech are not afraid of someone
yelling "Fire" in a crowded theater--that is a StrawDog they
use to prevent someone yelling "Fire" before their agents are
clear of the Reichstag, or the Murrah Federal Building.
Friends of the Destroyer can whack a King, a Kennedy, or a
KonspiratorToBeNamedLater, but they can't whack out things
they can't see--like concepts, ideals, values and free
thought--but they are trying...
If the Voices of Kings, Kennedys and Konspirators are not
reaching the far walls of the ElectroMagnetic Curtain, and
echoing throughout the Tao of CyberSpace, then the Friends
of the Destroyer, the Enemies of Freedom, will prevail.
The Voice of the Tao Whispers...
The Voice of Infinity Thunders...
The Voice of Censorship is Silent...
The Voice of Freedom is ou!
The Most Dangerous Person On Television:
ou...the viewer.
The Most Dangerous Person On The InterNet:
ou...the participant.
Anarchy Is Our Only Hope...
Army of Dog Prisoners of War:
Tim Bell
Jim McVeigh
Nelson Ghandi
Mahatma Mandella
Avery Body
Elsie Mittnick
Human Gus-Peter
Free Army of Dog Warriors:
Us...except for you and me
The rEvolution isn't tomorrow...that will be too late.
The rEvolution wasn't yesterday...the battle lines have moved.
The rEvolution Is NOW!
Questionable Quote #709:
"Close ranks, every man for himself!"
~Chief CypherPunks SpokesPerson
Army of DoGod, Cult of Nun
Anarchy Is Our Only Hope...Together, We Can Make It Happen
From hippyman at alltel.net Thu Jul 2 20:38:32 1998
From: hippyman at alltel.net (hippyman)
Date: Thu, 2 Jul 1998 20:38:32 -0700 (PDT)
Subject: Between A Rat And A Hard Place
In-Reply-To: <009C8971.590B87E0.3@west.cscwc.pima.edu>
Message-ID: <199807030338.WAA28893@client.alltel.net>
At 08:40 PM 7/2/98 , Linda Reed--PCC West Campus CSC
wrote:
>X-URL: mailto:cypherpunks at cyberpass.net
>X-Mailer: Lynx, Version 2-4-2
>
>
>What are the implications of tossing a moltov cocktail
>through the window of banks that require those cashing
>checks to be treated like common criminals, being
>fingerprinted and having their picture taken, with a
>number attached to it?
>
>What are the implications of a Cult Of One legal system
>that pronounces those guilty of treating the individual
>as a criminal to be sentenced to a punch in the schnozz?
>
>What are the implications of refusing to provide a
>fingerprint sample, but offering to provide a sperm
>sample on the face of the check, in full view of
>all the customers who can act as witnesses?
>
>What are the implications of asking the bank teller
>if she minds undoing the first couple of buttons on
>her blouse, if you are having a little trouble
>supplying the sample?
>
>If you think _I_ am crazy, then you should have seen
>the lunatic in my bank today who acted like a criminal
>in order to get them to cash his check, by giving them
>a fingerprint--HAA!HAA!HAA!
>It used to be that you had to act _honest_ in order to
>get a check cashed.
>
>TroubleMakerMonger
Is this bitch just a fucking republican or plain crazy?
hippyman
ICQ: 11517383
PGP Fingerprint: E3C3 35C8 0FD9 6F36 2ADD 0541 B58C F6BD D347 BD0A
From blkjck at gate.net Thu Jul 2 20:39:35 1998
From: blkjck at gate.net (blkjck at gate.net)
Date: Thu, 2 Jul 1998 20:39:35 -0700 (PDT)
Subject: Win At Blackjack
Message-ID: <>
"This is a one time mailing, if you are not interested, simply hit 'delete'."
Win at Blackjack
Fed up at losing your hard earned money in a casino?
Fed up with the loser's drive home?
Fed up with being in a multimillion dollar luxury casino and wondering which part you helped finance?
Well learn how to play the game! Give yourself a fighting chance...
I am a twenty-seven year veteran of the Casino Industry and I paid for my computer amongst many other items by playing Blackjack using this method.
Its simple to understand, no card counting involved, and will take minutes to learn........ Good Luck!
Send $21 and your mailing address to : (Free Shipping):
J.R.Nyman
8401 South Wood Circle
Apt #13
Fort Myers, FL 33919
Thank you for your time....
From blkjck at gate.net Thu Jul 2 20:39:35 1998
From: blkjck at gate.net (blkjck at gate.net)
Date: Thu, 2 Jul 1998 20:39:35 -0700 (PDT)
Subject: Win At Blackjack
Message-ID: <>
"This is a one time mailing, if you are not interested, simply hit 'delete'."
Win at Blackjack
Fed up at losing your hard earned money in a casino?
Fed up with the loser's drive home?
Fed up with being in a multimillion dollar luxury casino and wondering which part you helped finance?
Well learn how to play the game! Give yourself a fighting chance...
I am a twenty-seven year veteran of the Casino Industry and I paid for my computer amongst many other items by playing Blackjack using this method.
Its simple to understand, no card counting involved, and will take minutes to learn........ Good Luck!
Send $21 and your mailing address to : (Free Shipping):
J.R.Nyman
8401 South Wood Circle
Apt #13
Fort Myers, FL 33919
Thank you for your time....
From nobody at remailer.ch Thu Jul 2 21:22:40 1998
From: nobody at remailer.ch (Anonymous)
Date: Thu, 2 Jul 1998 21:22:40 -0700 (PDT)
Subject: jeopardize law enforcement and national security objectives
Message-ID: <19980703044220.28128.qmail@hades.rpini.com>
SKIPJACK Review
Interim Report
The SKIPJACK Algorithm
Ernest F. Brickell, Sandia National Laboratories
Dorothy E. Denning, Georgetown University
Stephen T. Kent, BBN Communications Corporation
David P. Maher, AT&T
Walter Tuchman, Amperif Corporation
July 28, 1993
(Copyright � 1993)
_________________________________________________________________
Executive Summary
The objective of the SKIPJACK review was to provide a mechanism
whereby persons outside the government could evaluate the strength of
the classified encryption algorithm used in the escrowed encryption
devices and publicly report their findings. Because SKIPJACK is but
one component of a large, complex system, and because the security of
communications encrypted with SKIPJACK depends on the security of the
system as a whole, the review was extended to encompass other
components of the system. The purpose of this Interim Report is to
report on our evaluation of the SKIPJACK algorithm. A later Final
Report will address the broader system issues.
[...]
We examined the internal structure of SKIPJACK to determine its
susceptibility to differential cryptanalysis. We concluded it was
not possible to perform an attack based on differential
cryptanalysis in less time than with exhaustive search.
[...]
SKIPJACK algorithm is classified SECRET NOT RELEASABLE TO FOREIGN
NATIONALS. This classification reflects the high quality of the
algorithm, i.e., it incorporates design techniques that are
representative of algorithms used to protect classified
information. Disclosure of the algorithm would permit analysis
that could result in discovery of these classified design
techniques, and this would be detrimental to national security.
However, while full exposure of the internal details of SKIPJACK
would jeopardize law enforcement and national security objectives,
it would not jeopardize the security of encrypted communications.
This is because a shortcut attack is not feasible even with full
knowledge of the algorithm. Indeed, our analysis of the
susceptibility of SKIPJACK to a brute force or shortcut attack was
based on the assumption that the algorithm was known.
Conclusion 3: While the internal structure of SKIPJACK must be
classified in order to protect law enforcement and national
security objectives, the strength of SKIPJACK against a
cryptanalytic attack does not depend on the secrecy of the
algorithm.
From nobody at replay.com Fri Jul 3 00:35:17 1998
From: nobody at replay.com (Anonymous)
Date: Fri, 3 Jul 1998 00:35:17 -0700 (PDT)
Subject: Beginning of process of decrypting net-nanny files (fwd)
Message-ID: <199807030736.JAA07229@basement.replay.com>
Article 425292 of alt.religion.scientology:
Newsgroups: alt.religion.scientology
Subject: Beginning of process of decrypting net-nanny files
Date: Thu, 02 Jul 1998 00:28:03 -0700
Lines: 100
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
There are three files with the netnanny, called d32l.dll,
n32l.dll, and p32l.dll.
These are not really dlls, but are almost certainly the
database of words and phrases that the netnanny is interested
in.
If you look at these files, there is a total of 1037 lines,
each of which has from 10 or so to 60 or so characters.
It turns out (see below) that two characters in the data file
almost certainly map to 1 character of the plaintext, so
the phrases are 5 to 30 characters long. 1037 phrases of
5 to 30 characters seems about right.
If you look closely at the text, you'll see that they letters
alternate between the ranges of 32-63 and 96-127 (decimal).
That is, a line begins "1{7}.f#f". The 1, 7, ., and #
are all in the range 32-63, and the {, }, f, and f are in the
range 96-127. Each of these letters, then, can take one of
32 values, or five bits. If you combine these, you find that
there are only 512 combinations used of the pairs of letters,
instead of the expected 1024 (=2^10). It turns out that if
you construct a 10 bit word with the first 5 bits from the
first character and the second 5 from the second character,
then you find that the middle two bits are always either both
0 or both 1. So, there are 512 possibilities.
These 512 numbers are fairly uniformly distributed, so this is
not a simple substitution cipher. Interestingly, though, again,
using the above construction of a 10 bit number from the two five
bit pairs, you find that the high order bits change very slowly
if at all from character to character. This is the beginning of
d32l.dll (fair use quotation of two lines from the file)
1101110001
1100110100
1100110011
0011001110
0011110000
0001110101
0010000000
0010000001
0010001111
0011001010
0001000100
0001001101
0000001110
0010000101
0000001000
0111110101
0110110111
0110001111
0111111110
0110000101
0110111110
0110110010
0101110110
0101000010
0101111000
0110001110
0100001110
0100111011
1011000001
1011111000
1011111000
1001110010
1010000111
1010110111
1010001000
1000111000
1011001111
1011111101
1010001011
1010111001
1101000111
1101110101
1100000011
1100110001
1100111111
1111001101
1111111011
1110001001
Note that the middle two bits are always the same, and the high
order bits seem to be changing slowly, but slowly upwards.
My guess is that some value is being added to the plaintext character,
and this value is incremented every plaintext character. Further,
perhaps, there is a exclusive or being performed. In any case, I hope
that this gets other people moving in the right direction.
Suggested words to look for, that seem to have tweaked the nanny, are
xenu hemet zinjifar helena kobrin mark ingber grady ward mirele
rnewman wollersheim andreas heldal-lund operation clambake
"gilman hot springs" motherfucker cocksucker
From hippyman at alltel.net Fri Jul 3 00:36:47 1998
From: hippyman at alltel.net (hippyman)
Date: Fri, 3 Jul 1998 00:36:47 -0700 (PDT)
Subject: #cypherpunks is happening
In-Reply-To:
Message-ID: <199807030736.CAA12730@client.alltel.net>
At 12:02 AM 7/3/98 , you wrote:
>On efnet.
Nope, it's usually pretty boring.
Been there many times when I'm on irc, nothing happening.
BUT, if you show up - I can make it interesting!!
Logins and passes to play with!
Catch me in there.
hippyman
ICQ: 11517383
PGP Fingerprint: E3C3 35C8 0FD9 6F36 2ADD 0541 B58C F6BD D347 BD0A
From Mia.Westerholm at DataFellows.com Fri Jul 3 05:01:52 1998
From: Mia.Westerholm at DataFellows.com (Mia Westerholm)
Date: Fri, 3 Jul 1998 05:01:52 -0700 (PDT)
Subject: Data Fellows Secures the World's Largest Computer Demo Event
Message-ID: <3.0.2.32.19980703131632.00a4a9c0@smtp.DataFellows.com>
For immediate release
3 July 1998
Data Fellows Secures the World's Largest Computer Demo Event
Assembly '98 Sponsored by F-Secure Data Security Products
Data Fellows, one of the world�s leading data security development
companies, is proud to support Assembly '98, the world's largest computer
demo event. Data Fellows will also maintain data security during the
happening.
Assembly is an annual computer multimedia event, celebrated in Helsinki,
Finland. It gathers amateurs and professionals from all over the world to
meet other demo experts and compete in the art of demo making. A demo binds
thrilling graphics and animations with massive sound effects to form a
multimedia presentation of computer programming.
Assembly '98 will be held during 7th - 9th of August 1998 and is expecting
3000 visitors. Prizes worth more than $25,000 USD will be awarded.
The F-Secure Anti-Virus product will be used to protect the main file
servers of Assembly '98 against viruses. Copies of the product will also be
distributed to all participants. The F-Secure Network Encryption products
will be used to protect the network traffic of the ad-hoc Assembly network
- which is hooked live to the Internet.
"Protecting a happening like Assembly is certainly a challenge", comments
Data Fellows' Manager of Anti-Virus Research, Mr. Mikko Hypp�nen. "However,
we've been co-operating with Assembly organizers all along since 1993, and
I'm sure of yet another success."
"We do realise that the stereotype of a demo coder and the stereotype of a
virus writer are pretty close to each other - both are often male teenagers
who are experts with low-level programming." Continues Hypp�nen. "That's
why we want to promote a happening like Assembly, which shows these young
people a way to use their programming talents in a safe and productive
way."
More information about Assembly '98 at http://www.assembly.org
About Data Fellows
Data Fellows is the world's leading data security development company with
offices in San Jose, California, and Espoo, Finland. Its innovative, award
winning F-Secure product range consists of a unique combination of strong
encryption and revolutionary anti-virus software. Data Fellows has a
support, training and distribution network covering over 80 countries
around the world.
Data Fellows is privately held. The annual growth in net sales has been
close to 100% since the company was founded in 1988. Data Fellows belongs
to an elite group of companies that have a triple-A credit rating from
Dun&Bradstreet.
For further information, please contact
USA:
Data Fellows Inc.
Tel. (408) 938 6700
Fax. (408) 938 6701
Europe:
Data Fellows Ltd.
Tel. +358 9 859 900
Fax. +358 9 8599 0599
Also, visit the Data Fellows web site at http://www.DataFellows.com/
����������������������������������������������������
Mia.Westerholm at DataFellows.com
http://www.DataFellows.com
Data Fellows Ltd.
PL 24
FIN-02231 ESPOO, FINLAND
Tel. +358 9 859 900
Fax. +358 9 8599 0599
From nobody at remailer.ch Fri Jul 3 07:40:21 1998
From: nobody at remailer.ch (Anonymous)
Date: Fri, 3 Jul 1998 07:40:21 -0700 (PDT)
Subject: Lotus Notes signature / encryption
Message-ID: <19980703150004.1789.qmail@hades.rpini.com>
Hi list members:
Could someone kindly tell me about the drawbacks of the Lotus Notes signature / encryption system (export version)?
Cheers.
From one4evil at juno.com Fri Jul 3 07:52:58 1998
From: one4evil at juno.com (Nalus Optic)
Date: Fri, 3 Jul 1998 07:52:58 -0700 (PDT)
Subject: Linda Reed--PCC West Campus CSC : Re: Army of Dog - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <19980703.104911.10094.0.one4evil@juno.com>
I was asked to forward this message to the Cypherpunks list by Linda
Reed...Who sent it to me as a responce to one of my e-mails...I know that
by doing so, I risk being kicked, stomped, beated siverly amongst the
neck and shoulders, and even flamed...But I think so many of us are not
looking at the true messages involved in these 'spams'. Reed is makeing
several REALLY good points...Given, Reed does rant a bit...And some of
what is writen is just so much bullshit...But all of it, taken in
context, is Truth (TM)...
Let me make a suggestion to Reed and all others involved...There is a
time and place for everything...The time for rEvolution, as Reed puts it,
is _NOW!_ However, Cypherpunks is not the place...So does anyone know of
any good e-lists that would love to get the ALIANS posts? Maybe your
five minute's of thought on a way to help Reed will make everyone happy,
Vs the hours some of us are spending complaining about the damn thing.
D
___________________________________________________________________
---Begin Forward Message---
The Geezinslaw Brothers, from Austin, TX, had a song called,
"If You Think I'm Crazy Now, You Should Have Seen Me When
I Was A Kid."
I envy today's youngsters, who have the opportunity to
participate in a Virtual Revolution that is every bit
as serious, and will have consequences just as great as,
any so-called World War that has ever been fought in
the history of human evolutionary development.
I envy them because they have, if they seize the
opportunity, a chance to engage in rEvolutionary acts
of Virtual anarchy, derring-do, war & violence which will
not threaten the lives of those whose only crime is to
be in the wrong place at the wrong time, physically,
but will threaten only those whose crime is to be in
their own mindspace, at the right time for them to
be there, but refusing to allow others the same right.
I do not pass judgement on Timothy McVeigh, any more
than I pass judgement on Che Guerva, Louis Riel,
Leonard Pelltier, or Ho Chi Min.
They did what they had to do, and they used what they
thought was the best judgment and tools of their day.
Anyone who claims to judge a moral differnce between
them and those they opposed is a fucking BeanCounter,
and should be in line behind the lawyers when the
firing squads line up.
I wish that Timothy McVeigh could have done what he did
within the confines of Digital Reality, on the InterNet,
perhaps blowing a hole in the ElectroMagnetic Curtain
that would allow the children to survive, but also allow
them to glimpse what was on the other side of the wall,
so that it could not be denied once the hole was closed.
That was not to be...
[KFor all of the sincere intent underlying my TruthSPAMing
and RealityBlathering, I find myself at a loss to truly
describe what I see as the importance of those entering
the Digital/Global/Interactive Age that is being born to
realize that *they* will be the ones who either allow the
dinosaurs of the past to usurp the current rEvolution of
human development, or to act as the Founding Fathers ojf
a Global/Digital Democracy, recognizing that the dinosaurs
are wearing red, marching in straight lines, and cussing
out the shit-disturbers as cowards for hiding behind
Digital Trees known as Remailers.
The Great Myth is that there isn't enough to go around.
Enough *what*?
Money? - There's as much as we agree there is...
Time? - I spent a good part of the day sitting on my ass...
Love? - I love Janet Reno and Louis Free. They're great targets...
Cadillacs? - Any President who proposed to block communism in
southeast Asia would have been laughed out of office. It turns
out that it would have saved us money and invigorated the
auto industry.
Cadillacs? - Any President who proposed to block communism in
southeast Asia by buying everyone a Cadillac would have been
laughed out of office. It turns out that it would have saved
the US money and invigorated the auto industry.
Freedom & Privacy? - Like Cadillacs, there is as much as we
are willing to pay for. We are not going to be able to have
it, however, until we are ready to make the giant leap of
faith it takes to trust that $30,000 is better spent in
promoting Freedom & Privacy, than buying another toilet
seat for the Censorship CCoommiittee executive restroom.
If there is enough BullShit to go around, then, according to
the Eternal Laws of the Tao, there is enough Reality to go
around, as well.
Those who recognize the Reality that I profess as the
TruthMonger might get the impression that I am attempting
to hoard the Truth, because their isn't enough to go around.
Nothing could be further from the Truth (TM)...
I'm willing to share... As a matter of fact, I could use
some of yours, since I'm starting to run a bit low, as a
result of begining to believe my own press when others
indicate that I am something special, because they agree
with me, and thus I run the risk of becoming a Spokesperson
For Consensus, franchising the TruthMonger persona, and
speaking the EasyTruths in order to capture the mass-market
when, in reality, I could retire quite comfortably from
the income I receive from having Truth (TM) trademarked,
since everyone who speaks the Truth (TM) currently has
to send me a nickle, or I'll sue their sorry ass...
One more beer, and I'll be losing it...so NoMoreMrNiceGuy...
The Cold Hard Truth:
Truth, Freedom, Privacy, Love, ad infinitum...all have a Cost!
The LIE:
That which we have an inherent Right to, should be Free!
The Reality:
Virtual/Conceptual/Idealistic Reality have a physical cost,
but they also have spiritual earning power.
Humans are both physical and spiritual beings...
It 'costs' you $1.00 not to knock someone over the head with
a rock when they are standing beside you at a bus stop with
a dollar in your hand.
Your soul appreciates $1.00 if you refrain from doing so...
The choice is yours, and yours, alone.
(Although my personal *opinion* as to the ethics/morality of
your decision might vary depending on whether or not *I* am
the person standing next to you at the bus stop.)
I don't know how many soul-credits it cost Tim McVeigh to
bomb the Murrah Federal Building, and I don't know how
many soul-credits he earned for waking up government
employees to the fact that their actions have consequences,
as well.
That is between Tim McVeigh and his Accountant.
There is a Cost to telling the truth, to taking a stand, to
refusing to be be oppressed/repressed in Virtual Reality.
I have had my possessions confiscated and criminal charges
filed against me as a result of speaking what I consider to
be the truth, within the confines of CyberSpace.
Freely speaking my mind has led to physical retribution against
me. I can vouch for the fact that Freedom of Speech has a Cost.
I am willing to pay that Cost...
I am more than happy to pay whatever price it requires to
be the TruthMonger, because that what is important to me.
I'm not doing anyone any favors...I am doing what I feel it
is my role to do.
My definition of a Hero, is a person who does what they can,
who fulfills the role that they have the capacity to fulfill.
A man who charges a hill, and dies in the process, is a Hero
if he does it because he looks around him and sees that it is
his role, his time, his destiny.
A man who charges a hill, and lives in the process, because
of the expectations of others, is a fool.
I have seen Heroes who charged the hill because they looked
around them and saw Warriors who had families waiting for
them, while they had none. I have seen Heroes who charged
the hill when they knew it would likely result in their
families waiting in vain for their return, because they
knew that their actions would result in a dozen families
not having to grieve the loss of a loved one.
I don't expect todays CyberWarriors to get their asses shot
off for thumbing their noses at authority--that is foolish.
However, if you're sitting at your desk at the HeadQuarters
of the Great Oppressor, and HeOrShe walks in, hands you the
latest model of DeathRay, asking your opinio, and you decide
to do something very, very foolish...I'll understand.
All I'm saying is that Values, Concepts, Ideals, Ethics, all
have a cost. Whatever you can contribute in the physical realm
to help cover that cost is 100% deductible in the esoteric
realm.
Andy Warhol prophecied that everyone would receive their
fifteen-minutes of Fame, in *his* future.
TruthMonger's Prophecy is that, in HisOrHer future, everyone
will get a shot at the Great Oppressor.
Use it, or lose it...
Love,
Toto
***********************
p.s. - I am currently writing on an early Sperry computer which
has 128K of RAM, and can barely run WordPerfect 4.1, and then
having to transfer it to Windows 3.0, to clean it up, before
sending it to a hacked Unix account and transferring it via
a VAX system to its destination.
Thus I cannot cc: this without fucking it up, and I would
appreciate it if you could send it to cypherpunks at toad.com
so that I could download it tomorrow.
p.p.s. - I have had a long, hard life, in which I have done
some stupid things, some evil things, and some mindless things,
but I've also done some things that are beyond fucking belief.
Overall, life has been incredible, but I look upon the coming
generation with envy, because there is a transition coming
that--LOVEorHate/WARorPEACE/WINorLOSE--will give each and
every particpant in the experience a chance to exit this
mortal plane with a smile, and the words,
"It's been Real (TM)."
--------- End forwarded message ----------
_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]
From jya at pipeline.com Fri Jul 3 08:02:49 1998
From: jya at pipeline.com (John Young)
Date: Fri, 3 Jul 1998 08:02:49 -0700 (PDT)
Subject: FBI Tesla Files
In-Reply-To: <199807030022.TAA10819@einstein.ssz.com>
Message-ID:
Jim,
Maybe you know that the FBI offers about 256 pages of
docouments related to Nikola Tesla on its FOIA Web site:
HTTP://www.fbi.gov/foipa/hisfigs.htm#tesla
They are in two large PDF files of 4.8MB and 5.8MB.
In case you've not seen them here's a brief:
None of the papers are by Tesla himself, and most
relate to various inquiries about Tesla's "missing papers,"
based on O'Neil's book claim that the FBI confiscated
Tesla's papers and effects shortly after his death. The FBI
claims that it was the Alien Property Office which had Tesla's
effects and that the FBI had not been involved.
Several focus on Tesla's famous "Death Ray" of the 1940s,
with requests for access to the scientific papers on it, or
warn of its possible use by foreign enemies. To most the
FBI sends a standard disavowal.
However, one is of interest: a Feb 1981 inquiry by the
Defense Department which stated in a then-classified
paragraph:
"(C) We believe that certain of Tesla's papers may contain
basic principles which would be of considerable value to
ongoing research within the DoD."
The FBI answers that it never had Tesla's papers but
reports that a review of those at the Alien Property Office
by an MIT scientific team found that none of the papers
contained significant scientific information of national
security interest. Yet, the FBI goes on, the Alien Property
Office told the FBI in the 1950s that in the only recorded
visit to the Tesla archive in January 1943 (shortly after
Tesla's death) an unidentified "Federal authority"
microfilmed numerous papers, film whose whereabouts
the FBI knows nothing.
There's a bit more about electronic research at Wright
Paterson AFB. And a DoD thank you letter on behalf
of Dr. S. L. Zeiburg, Deputy Undersecretary
(Strategic and Space Systems).
A once-secret 1983 series investigated a claim that
Margaret Cheney's biography of Tesla, "Tesla: Man
Out of Time," points to national security threats
based on allegations of Soviet development of his
experiments using papers possibly obtained through
his nephew, Sava Kosanovic, a high Yugoslav official.
Many pages of Cheney's book marked at threatening
passages on the "missing papers" are in the file.
From stuffed at stuffed.net Fri Jul 3 08:45:03 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Fri, 3 Jul 1998 08:45:03 -0700 (PDT)
Subject: Daily News Thu Jul 2 '98
Message-ID: <19980703111406.19186.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 268 bytes
Desc: not available
URL:
From lharrison at dueprocess.com Fri Jul 3 14:02:20 1998
From: lharrison at dueprocess.com (Lynne L. Harrison)
Date: Fri, 3 Jul 1998 14:02:20 -0700 (PDT)
Subject: DOT and SSN's
Message-ID: <3.0.5.32.19980703170726.007e9170@pop.mhv.net>
The Government Has Our Numbers
by Lori Patel
4:00am 3.Jul.98.PDT
Your banker has it. Your employer has it. Your insurer, the IRS, and,
frankly, you can't remember who else has it. So what difference does it
make if the US Department of Transportation joins the crowd asking to see
your Social Security number?
Recently, the department published its intention to require all states to
verify Social Security numbers before issuing or renewing drivers'
licenses. Depending on who one asks, the significance of this decision can
swell or shrink like a top-notch
special effect.
"Fear of crime and terrorism has caused us to let down our guard against
excessive intrusion into the lives of the law abiding. The ease of minor
borrowing and the transformation of shopping into recreation has addicted
us to credit cards," wrote
New York Times columnist William Safire. "Taken together, the fear and the
ease make a map of our lives available to cops, crazies, and con men alike."
. . .
http://www.wired.com/news/news/email/other/politics/story/13441.html
From 61w34v at ibm.net Fri Jul 3 16:27:54 1998
From: 61w34v at ibm.net (--Bull*sEye_)
Date: Fri, 3 Jul 1998 16:27:54 -0700 (PDT)
Subject: No Subject
Message-ID: <19943672.886214@relay.comanche.denmark.eu>
Authenticated sender is <61w34v at ibm.net>
Subject: __Bull*s-Eye-Targeting-Software
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
EMAIL MARKETING WORKS!!
Bull's Eye Gold is the PREMIER email address collection tool.
This program allows you to develop TARGETED lists of email
addresses. Doctors, florists, MLM, biz opp,...you can collect
anything...you are only limited by your imagination! You can
even collect email addresses for specific states, cities, and
even countries! All you need is your web browser and this program.
Our software utilizes the latest in search technology called
"spidering". By simply feeding the spider program a starting
website it will collect for hours. The spider will go from website
to targeted website providing you with thousands upon thousands of
fresh TARGETED email addresses. When you are done collecting, the
spider removes duplicates and saves the email list in a ready to
send format. No longer is it necessary to send millions of ads to
get a handful of responses...SEND LESS...EARN MORE!!!
A terrific aspect of the Bull's Eye software is that there is
no difficult set up involved and no special technical mumbo-jumbo
to learn. All you need to know is how to search for your targeted
market in one of the many search engines and let the spider do the
rest! Not familiar with the search engines? No problem, we provide
you with a list of all the top search engines. Just surf to the
location of a search engine on your browser then search for the
market you wish to reach...it's that easy!
For instance if you were looking for email addresses of Doctors
in New York all you would do is:
1) Do a search using your favorite search engine by typing in
the words doctor(s) and New York
2) Copy the URL (one or more)...that's the stuff after the
http://... for instance it might look like
http://www.yahoo.com/?doctor(s)/?New+York
3) Press the START button
THAT's IT!!! The Bull's Eye spider will go to all the websites
that are linked, automatically extracting the email addresses
you want.
The spider is passive too! That means you can let it run all
day or all night while you are working on important things or
just having fun on your computer. There is no need to keep a
constant watch on it, just feed it your target market and give
it praise when it delivers thousands of email addresses at
the end of the day!
Features of the Bull's Eye Software:
* Does TARGETED searches of websites collecting the email
addresses you want!
* Collects Email addresses by City, State, even specific
Countries
* Runs Automatically...simply enter the Starting information,
press The Start Button, and it does the rest
* Filters out duplicates
* Keeps track of URLs already visited
* Can run 24 hours per day, 7 days per week
* Fast and Easy List Management
* Also has built in filtering options...you can put in words
that it "Must" have while searching,...you can even put in
criteria that it "Must NOT Have"...giving you added flexibility
* Also imports email addresses from any kind of files (text
files, binary files, database files)
* List editor handles Multiple files to work on many lists
simultaneously
* Has a Black-Book feature... avoid sending emails to people
who do not want to receive it
* Built-in Mail program...send email directly on the internet
with just a click of your mouse
* Personalized Emails...if the email address has the user's
name when it is collected,..you can send Personalized emails!!!
* Sort by Location, Server, User Name, Contact Name
* Advanced Operations:
� Email address lists export in many different formats
(HTML, Comma delimited, text file)
� Advanced editing...Transfer, Copy, Addition, Delete, Crop,
Move to Top/Bottom
� Operations between lists...Union, Subtraction, Comparison
* Program is Passive,...meaning you can run other programs at
the same time
CALL FOR MORE INFORMATION 213-969-4930
CALL FOR MORE INFORMATION 213-969-4930
ORDERING INFORMATION
Customer Name
Company Name
Address
City
State Zip
Phone Fax
Email Address
______ BULL'S EYE SOFTWARE $259.00
Includes Software, Instructions, Technical Support
______ Shipping & Handling (2-3 Day Fedex) $10.00
(Fedex Overnite) $20.00
______ TOTAL
(CA Residents add applicable sales tax)
*All orders are for Win 95 and Win NT
*****CREDIT CARDS ACCEPTED*****
MASTERCARD VISA AMEX
PLEASE CALL 213-969-4930 to process your order
9am-5pm Pacific Time
Checks or Money Orders send to:
WorldTouch Network Inc.
5670 Wilshire Blvd. Suite 2170 Los Angeles, CA 90036
Please note: Allow 5 business days for all checks to
clear before order is shipped.
*If you would like your email address removed, please
write us at the above address.
From twaweb at inet2.twa.com Fri Jul 3 18:05:27 1998
From: twaweb at inet2.twa.com (Trans World Specials)
Date: Fri, 3 Jul 1998 18:05:27 -0700 (PDT)
Subject: Trans World Specials Fare Sales
Message-ID: <19980703202326.12254.qmail@inet2.twa.com>
SUPER MILEAGE OFFER
Take Advantage of TWA's New Website
As a frequent traveler, you're constantly on
the go. So we've made it easy to access your
Aviators portfolio information via the Internet.
Just point your web browser at the all-new TWA
website(http://www.twa.com), select "Frequent
Traveler Information", and provide your Aviators
portfolio number when prompted. You can check
your portfolio balance, verify mileage credit,
and more.
To celebrate our new website, when you use Trans
World Access, TWA's online booking system, to
book and travel on or before December 31, 1998,
you'll earn bonus miles for your round-trip
flights. With each round-trip flight, you'll
earn an even bigger bonus - up to 15,000 miles in all!
1st Flight - 1,000 miles
2nd Flight - 2,000 miles
3rd Flight - 4,000 miles
4th Flight - 8,000 miles
And these bonuses are in addition to all other mileage -
actual miles flown, privilege-level bonus and class-of-
service bonus.
The new TWA website. It's quick, convenient and rewarding.
See for yourself at http://www.twa.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
* HOW TO SUBSCRIBE
http://www.twa.com/odpairs/
Your email address will not be distributed or sold to any company or
organization which is not an Aviators program partner.
For information about the Aviators program and its member benefits see our
program overview at:
http://www.twa.com/frq_trav_info/ft_aviators_prog.html
* HOW TO UNSUBSCRIBE
Reply to this message and place the word REMOVE
in the Subject line. We will promptly remove you from the database.
From vjb at gil.com.au Fri Jul 3 19:50:49 1998
From: vjb at gil.com.au (Global Web Builders)
Date: Fri, 3 Jul 1998 19:50:49 -0700 (PDT)
Subject: One Nation web site temporarily off-line
Message-ID: <1.5.4.32.19980704020846.0072baac@mail.ipswich.gil.com.au>
Dear One Nation supporter in NSW
You will note from my email that I am not using the normal gwb at gwb.com.au
address.
Last night at about 6.30pm Optus "pulled the plug" on my Internet Service
Provider (Pronet) who I have NOW been informed are facing financial
difficulties. (I only found out today after making enquiries as to why I
could not access my ISP.)
This has caused all contact with the "gwb" web sites (which includes One
Nation) to be cut off. If you try to contact them you will come up with a
"DNS error".
I am currently relocating the web site and will be seeking a new ISP who can
offer One Nation "the best deal". This will take some time, perhaps a few
days, and in the mean time I apologise for any inconvenience.
As soon as the One Nation website is up and running I will advise you.
Please note that the Internet address will remain the same as it was.
In the meantime be assured that One Nation being "off air" is not related to
any conspiracy, lack of support from our part or any other misinformation
that might be fed to you through the media.
As always GWB stands 100% behind Pauline Hanson and her competent team.
GWB
Scott Balson
From mts2 at volg15.mmtel.msk.su Fri Jul 3 22:18:46 1998
From: mts2 at volg15.mmtel.msk.su (mts2 at volg15.mmtel.msk.su)
Date: Fri, 3 Jul 1998 22:18:46 -0700 (PDT)
Subject: YOUR CLASSIFIED - AD / 333 NEWSPAPERS !!!!!!!!!
Message-ID: <199807040527.OAA01790@axp3400.kyungpook.ac.kr>
YOUR AD IN 333 NEWSPAPERS !!!!!!!!!!
***********************************************
Seven years ago, I learned how to place my Classified Ad in
several hundred newspapers, with just one telephone call. And, my
cost was $0.51 per newspaper. The total circulation was well over
1.5 Million. I could reach just about any market, anywhere in this
country. Since then, my small mail-order company has exploded.
And, I use this same time tested and true method week after week.
I would like to share this powerful information and show you
how to save hundreds, even thousands of dollars on advertising that
works. The average cost of a classified ad in a newspaper is about
$15.00 to $20.00 dollars. Multiply that by 333 and your total cost is
well over $6,000.00 Dollars. By using our amazing method, your
total cost is only $170.00. Not to mention the time and money you
save by placing one call, instead of 333 long distance calls.
You can limit your promotion to a Single State or place your
ad in Several States around the country, all with just one phone call.
You can reach One Million Readers on the East-Cost today and a
Million on the West-Coast tomorrow. It's that simple !!!!
Your cost for this priceless information, is only $17.00 !!!
You will make that back on your first promotion. WE are so confident that
this type of advertising will boost your profits, we will guarantee your
satisfaction with our Money Back Guarantee !! So, you have nothing
to lose. Now, order our amazing classified ad method today !!!!!!
PRINT ORDER FORM
Ship To: **************************
*********
NAME____________________________________________
ADDRESS________________________________________
CITY______________________________________________
STATE__________________ ZIP_____________________
E-MAIL__________________________________
Don't Delay, ORDER TODAY!!!!!!!
**********************************************************************
Mail Payment $17.00 CASH, money order, or check TO:
********************
INFORMATION, Ltd.
P. O. Box 515019
St. Louis, MO 63151-5019
U.S.A.
WE will ship your complete KIT directly to you !!!!
**************************************************************
OPTIONAL / OVERNIGHT SHIPPING - ADD $15.00
**************************************************************
Thank you for your kind attention, and have a nice day !!!
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Admin
Internet Services
This message is not intended for residents in the
State of Washington, screening of addresses has been done
to the best of our technical ability.
If you are a Washington resident or otherwise wish to be
removed from this list, go to global remove site if you want
your address removed from future mailing.
http://209.84.246.162/remove.htm
This Global Communication has been sent to you by:
PAVILION INTERNATIONAL SERVICES
Offices: London, Paris, Berlin, Hong Kong
From may42 at cosimo.die.unifi.it Sat Jul 4 03:05:44 1998
From: may42 at cosimo.die.unifi.it (may42 at cosimo.die.unifi.it)
Date: Sat, 4 Jul 1998 03:05:44 -0700 (PDT)
Subject: No Subject
Message-ID: <19980704832AAA28582@127.23.8.238>
100% ALL TEEN ADULT WEB SITE
FREE ACCESS FOR THE NEXT WEEK ONLY !!!
http://209.84.246.106/amateur/
CHECK IT OUT TODAY!!!!
�
From puudio96 at prodigy.com Sat Jul 4 04:35:24 1998
From: puudio96 at prodigy.com (puudio96 at prodigy.com)
Date: Sat, 4 Jul 1998 04:35:24 -0700 (PDT)
Subject: Earn a NO COST Pentium 266 Computer!! EVERYONE Approved!!
Message-ID: <199807044322XAA19326@power.interserver.com.ar>
What are YOUR answers to these questions??
Afraid your credit wouldn't allow you
to get the computer you want?
Have you been wanting a new computer,
but were wondering if you can afford it?
Do you want to learn more about:
** The Internet
** Your Computer
** Building your own web sites for
personal or business use
and then selling them for a profit?
. but don't want to pay for those costly courses?
If you answered YES to one or more of these questions, then this is the
opportunity for YOU !!
Not only can you indulge yourself with a new computer (regardless of your
credit history)
and provide yourself with ongoing, online education,
you can also earn money doing so!!
Sound interesting???
HIT REPLY
and ask for more info!!!
on this INCREDIBLE opportunity!!!!
Or Send Email To
goodidea at dreamer.net
Everyone is accepted regardless of credit -
even people who have filed bankruptcy!
Some specific Information on the computer itself...
Your "COMPUTER MANIA" package SHIPS WITH:
NOW EVEN MORE UPGRADES
Microsoft Office 97 Professional (Pre-installed, licensed version, CD
Rom Disk Included!!!) 266 MHZ Pentium Processor- Upgraded (from 200 MMX) on
All Shipments!!! 64 Meg
SD-Ram, 10ns (Upgraded to SD Ram) 4.3 Gig IDE HD - Upgraded (from 2.1
Gig) on All Shipments!!!
(4.0+ Gig available after preloaded software) 56k Flex - Fax Modem
24X IDE CD Rom 4 Mb 64 bit SVGA Video (Upgraded from 2 Meg) 16 Bit 3d
Stereo Sound (Upgraded to 3D) 80 Watt Amplified Speakers / Headphones /
Microphone 512 L2 Cache w/ TX Pro Motherboard 15" SVGA Color Monitor,
1024x768 .28dp Mini Tower Case (Upgraded - Sturdy) 3.5 Floppy Drive
Keyboard and Mouse Windows 95 + 70 Software Titles
Technical support provided by 1-800 #, by Computer Support Line.
ALSO INCLUDES: NEC 1000 printer:
300x300 dpi Single Cartridge Prints
B&W and Color
Parallel Port Interface
WHAT ARE YOU WAITING FOR ?
EVERYONE IS APPROVED !!
HIT REPLY AND ASK FOR MORE INFO!!!
Or send email to
goodidea at dream
From your_success at global.com Sat Jul 4 05:48:01 1998
From: your_success at global.com (your_success at global.com)
Date: Sat, 4 Jul 1998 05:48:01 -0700 (PDT)
Subject: FINAL NOTICE!
Message-ID: <199807041247.FAA11090@toad.com>
This is your WAKE-UP call...
...INTRODUCING "THE BREAKFAST CLUB"
A ONE-TIME $39 PURCHASE CAN CONCEIVABLY EARN
OVER $100,000 ANNUALLY FOR ANYONE WHO WILL
WORK THIS PROGRAM!
DID I SAY WORK? HA! ...LET'S CHECK IT OUT!!!
What you are holding in your hand is perhaps the most exciting networking
opportunity to come down the pike, EVER!
There are numerous reasons why this is so, but lets first look at the most obvious....
... 30 BOXES OF CEREAL FOR $39,00........
The vehicle for this outstanding bargain is a coupon book with 30 vouchers, each
good for a box of your favorite Name Brand cereal delivered to your door with no
shipping charges.
That translates into the lowest price for Brand Name Cereal on the
planet! Period!!
Couple this with a networking opportunity using the most advanced compensation
plan in the industry, namely a 3 X 5 forced matrix with double matching bonus,
and it's a can't miss!!!!
Here are some other reasons that even for non-networkers spell BIG BUCKS!
1) A $39 one time purchase, one of the lowest in the industry.
2) Product recognition! A product almost everyone in the country is already
using, and paying too much for.
3) Mass appeal. Networkers have been searching for years to find a product
that would appeal to the masses. Breakfast cereal is as good as it gets! Our own
local study showed 65 interested people out of 80 interviews! Many signed up
on the spot!!!
4) Finally a product in MLM that offers real savings! The average box of cereal
costs over $3 in the store, with many topping the $4 mark. Do the math. With our
deal, the price for any cereal delivered to your door is $1.62. Yes, that's right,
one dollar and sixty-two cents!!
WELL, THERE IT IS... ...I CAN ONLY SAY THAT THIS
ONE IS GOING TO GO INTO HYPER-DRiVE IN A BIG
HURRY, SO YOU BETTER GET YOUR TICKET AND
HANG ON!!! SIGN UP BELOW!
*********************************************************
"THE BREAKFAST CLUB"
7267 AIRPORT ROAD
BATH, PA 18014
WHAT IS THE "BREAKFAST CLUB"?
"The Breakfast Club" is a network marketing company combining a substantial
savings on a commodity which, almost all Americans use, with the income potential of
network marketing!
This commodity is the Breakfast Cereals which we are all familiar with,
PRODUCT:
The current product is a "Name Brand" cereal coupon book. This coupon book
offers "BIG" savings on your favorite cereals. Almost any cereal, delivered to your
door with no shipping charge to you, for the low price of $1.62 (this price includes
the cost of the coupon and the cost of the postage to send the order, blank for
redemption)
EVEN CEREAL THAT COSTS OVER $4.00 IN THE GROCERY STORE
CAN BE DELIVERED TO YOUR DOOR FOR $1.62
The coupon book contains 30 coupons, each good for a box of name brand cereal.
What this means is that this is a guaranteed value of up to $120.00 for the cost of
only $39 to you!
HOW DO I TAKE ADVANTAGE OF THIS OPPORTUNITY?
The answer is simple, as is the entire concept of this program. Just fill in the
application / order form and send it with the proper payment to the address above.
We will ship your coupon book to you within a few days, and you can send for your
first box of cereal.
WHAT IS THE COMPENSATION PLAN?
Again, the answer is simple.
The compensation plan is a 3 x 5 forced matrix, with a double matching bonus
feature, The matching bonus is earned when you personally sponsor 3 people, and the
double matching feature kicks in when your second level is completed, not necessarily
personally sponsored. This means that you would have 12 total people on these two
levels in your organization. You would then match the matrix checks, of the three
people whom you personally sponsored, and the matrix checks of those who they
personally sponsored.
There is $1 on each level of the matrix which means that a complete matrix has a
potential payout of $363, which is the total number of people. Therefore, the
matching bonus feature gives you 3 more matrix payouts, or an additional $1,089
when your personally sponsored people complete their matrix. The double match
bonus will give you any number of additional matching checks, based entirely on the
number of people that your personally sponsored people sponsor. Note: You match
only the matrix payout of your sponsored and their sponsored. You never match a
matching bonus!
The potential with this plan is awesome. If you follow this scenario you will see that
the more people whom you sponsor, and whom they sponsor, will give you matching
check after check, with almost no limit if you continue to sponsor. This program
could literally pay out over $100,000 on only a $39 purchase.
"THE BREAKFAST CLUB"
TERMS AND CONDITIONS
1) The price for the coupon book is $39.00. The coupon books are numbered and
registered, and tracking goes into effect at first redemption.
2) The accepted form of payment will be by money order only. No personal checks,
no credit cards. All payments sent other than money order will be returned.
3) The compensation plan is a 3 x 5 forced matrix, there will be no placement. The
computer will fill automatically left to right, based on personal sponsorship. This will
allow for significant spillover.
4) This program will be basically a mail-order program. There will be no customer
service by phone. Any questions which you may have which are not answered by this
document you may address to the Company by mail or by fax. We will respond in the
same manner.
5) Since there is no placement, a genealogy report will only be important when you
receive a check. You will automatically receive one when a check is cut for you.
6) "The Breakfast Club' will calculate revenue share weekly, and pay weekly. The
week shall run from Monday through Saturday, and the revenue share will be
calculated on Monday for the previous week's activity.The check will be cut and
mailed by Wednesday every week.
7) A check will not be printed until the accrued revenue share is at least $12.00.
There will be a charge of $2.00 assessed for each check. This will defray the cost of
the check, bank charges, and the cost of the genealogy which will be sent with each
check. Therefore, on accrued revenue of $12.00, after the charge, the check will be
$10.00. This charge will remain at $2.00 as long as the genealogy is only one page.
As your organization grows, the charge will be .50 for each additional page.
8) You will receive complete instructions on how to use the program, and how to
order your cereal with your kit.
9) Our refund policy is very simple. We have a revenue share program, so money
earned is not commission but profit sharing. This means that if you wish to leave the
program at any time within 90 days, the following rules apply:
a) The coupon book must be in salable condion, with NO coupons missing.
b) The book registration fee and shipping is NOT refundable, totaling $9.00. Refunds
will be $30.00 only.
c) If you have been paid any revenue share money, that will be deducted also. If you
have been paid more money than the cost of the book(s), there will be no refund.
d) After 90 days, there is no refund.
10) There will be company sponsored conference calls. Times and phone numbers
will be announced when you receive your kit.
I 1) You must sign and return this "Terms and Conditions' document with your
application/order form.
12) I have read and fully understand the terms and condtions of "The Breakfast
Club."
SIGNED____________________________ DATE________________
*******************************************************
"THE BREAKFAST CLUB"
"CEREAL FOR LESS" ORDER FORM
7267 AIRPORT ROAD
BATH PA 18014
FAX 610 837-1589
NAME:_________________________________________________
PHONE #_______________________________________________
STREET________________________________________________
CITY_____________________ STATE_______ ZIP____________
YOUR SS#__________________ (needed for ID#-cannot issue
checks without it)
SPONSORS NAME: Front Desk Marketing
SPONSORS ID#: 11151
WE ACCEPT MONEY ORDERS ONLY
OTHER FORMS OF PAYMENT WILL BE RETURNED
PLEASE INDICATE QUANTITY OF BOOKS ORDERED BELOW.
(please refer to rules and regulations.)
REMIT AS FOLLOWS: QTY _____ NAME BRAND CEREAL COUPON
BOOK(S) @$39.00 EACH (includes S&H & book registration fee)
TOTAL AMOUNT OF MONEY OPDER $_________
IMPORTANT: MONEY ORDERS SHOULD BE MADE PAYABLE TO:
THE BREAKFAST CLUB
BRIEF LIST OF CEREAL BRANDS OFFERED:
GENERAL MILLS, KELLOGG'S, POST, QUAKER OATS,
AND RALSTON
COMPLETE LISTS WILL BE INCLUDED WITH YOUR
CERTIFICATE ORDER
--------------------------------------------------------
REMEMBER 3 CERTIFICATE BOOKS ARE THE MAXIMUM
NUMBER OF BOOKS FROM WHICH YOU CAN BE ACTIVELY
REDEEMING CERTIFICATES AT ANY ONE TIME.
------------------------------------------------------
THERE ARE 75 CEREALS TO CHOOSE FROM PLUS YOU MAY WRITE
IN A SELECTION NOT LISTED AND THE REDEMPTION CENTER
WILL TRY TO ACCOMODATE YOUR REQUEST.
INCOME OPPORTUNITY OFFER REMINDER
DON'T FORGET, TO SHARE THIS OPPORTUNITY WITH OTHERS
AND RECEIVE AN ON-GOING INCOME FROM THEIR PURCHASES
YOU MUST INCLUDE YOUR SOCIAL SECURITY NUMBER ABOVE.
PLEASE REMEMBER, WE ACCEPT MONEY ORDERS ONLY
AND YOU MUST SEND IN BOTH FORMS:
1. ORDER FORM WITH YOUR $39.OO MONEY ORDER
2. A �SIGNED� TERMS AND CONDITIONS FORM
MOST COMMONLY ASKED QUESTIONS ABOUT
"THE BREAKFAST CLUB"
Q. How can anyone deliver breakfast Cereal to your door for this price?
($1.62)
A. The cereal is merely a vehicle for advertising. With the cost of direct mail
advertising skyrocketing, and the readerslip relatively low for what is considered by
most to be junk mail, this method of lost leader marketing is extremely desirable.
Because people are waiting for their cereal, and they will be looking for their next
order blank, the readership of the piggy-back advertising in the box is very high. Due
to this fact, advertisers are willing to pay handsomely for this type of direct mail
program.
Q. Is that why I can only use one coupon at a time, and must wait for my
cereal to arrive before I can order again?
A. Yes. The advertising would do little good for anyone, nor could the cost of the loss
leader be amortized if too much of the advertisers material should go to the same
address in too short a time.
Q. Wasn't this program tried before, like around two years ago? What
happened to it then?
A- Yes, it was tied in late 1995 into early 1996. The firm that was behind the concept
did not anticipate the overwhelming response which they received. Coupled with the
fact that they did not have the advertising dollars in place that they represented,
collapse was inevitable.
Q. Why is it any different now?
A. The Company that is running this campaign is fully aware of the importance of
keeping up with the demand. So much so, in fact, they have already put the data
processing in place to scan the coupons into the system instead of waiting until they
are overwhelmed. Also, and more importantly, they have the contracts in place from
many advertisers to offset the cost of delivering the cereal. In other words, they have
enough advertising dollars to cover the cost of every delivery.
Q. What about the network marketing part of this program? Does "The
Breakfast Club" have control, or will there be competition?
A- Not only does "'The Breakfast Club" have an exclusive network marketing
contract, but we will be collaborating with The Majestic Group, owners of the cereal
book, on future books. There is a very bright future ahead for our distributors.
Q. Why is there no telephone customer service provided by "The Breakfast
Club" for its distributors?
A. It boils down to one word, COST! This is not a high ticket, and until other
products are ready to offer to the distributor base, we must control the expense of
operation. This is not a complicated business, and most questions can be answered
by this document. However, we anticipate that there could be questions that we can
not answer to a distributors satisfaction here, so we will answer questions either by
fax, mail or on a live conference call which will be conducted one hour each day,
Monday through Friday. The number and time for this call is at the end of this
document.
Q. The compensation plan is a 3 x 5 forced matrix with a "double matching
bonus" feature. What is a double matching bonus and how does it work?
A. Double matching bonus simply means that you match the matrix checks earned by
the people whom you sponsor personally, and those who they sponsor as well. This,
of course, depends on your reaching the criteria which determine whether or not you
will earn matching and double matching bonus.
Q. What is the criteria to earn matching and double matching bonus, and how
does it fit into the marketing plan?
A. The criteria for matching and double matching bonus is really very easy to
understand, and not difficult to attain. In fact, the entire marketing plan is so simple
you could explain it on a napkin in a restaurant. Here it is in a nutshell...... you sign up
and purchase a coupon book for Name Brand Cereal. You personally sponsor 3
who do the same and you qualify for matching bonus. Fill your second level, a total of
9 more people, whether or not they are your personally sponsored, and you now
qualify for double matching bonus.
Just by signing up and making your first purchase of a coupon book for $39, you are
entitled to a revenue share of $1 per level, for each of 5 levels of purchasers just like
yourself A 3 x 5 matrix has the potential when full to hold 363 customers, which will
pay $363. Now here is where the fun starts. For every person whom you personally
sponsor into the program you will match every revenue share check which they are
paid, provided that you sponsor a total of 2 distributors personally. That means that if
they fill their matrix, you will earn an additional check of $363. Here is the best part!
If your personally sponsored distributor goes out and sponsors any number of other
people, providing you meet the criteria for double match, you will be paid a revenue
share equal to whatever they are paid, even if it is 5, 10, 50 or 100 people. This
means that you can make many times the value of a full matrix in this program by
sponsoring only 1 person who goes out and sponsors ma!
ny!! Do the math. Awesome!
Q. When will checks be issued?
A. We will caculate weekly, and pay revenue share weekly. The week will begin on
Monday, and end on Friday. Checks will be cut and mailed by Wednesday every
week.
Q. Why is there a charge for issuing checks?
A. Again the answer is COST. Because of the sheer number of checks which we
anticipate sending out, we must make allowance for this expense. Remember, this is a
low cost program with a relatively high revenue share potential. Consequently we will
only send checks when they have calculated to be at least $12. After deducting the
$2 check charge, we would be sending a net of $10. Also, since there will be a
genealogy sent with every check, this charge will help cover it as well. Note: the
charge will remain $2 as long as the genealogy is only one page. It will be an
additional .50 for every page after the first.
Q. Are we required to sign and send in the "Terms and Conditions"
document?
A. Yes, The terms and conditions of our program will be upheld, and it is important
that you agree to them in writing or your application will not be accepted. Note: the
newer application has a disclaimer which states that you have read and agree to the
terms and conditions. This will allow someone to fax an application to a third party
before they send in the actual signed document to the Company.
Q. What about our identification number for sponsoring purposes?
A. We will use your Social Security Number as your temporary ID# A new number
will be issued to you and sent with your book. Our program can identify you either
with your temporary number or your company issued number, so you can sponsor
even before you actually receive your new number,
LOOK FOR YOUR ID# ON YOUR ADDRESS LABEL AND ON YOUR
WELCOME LETTER.
1) No applications will be accepted without the signed terms and
conditions document, unless a new form is used and the disclaimer is signed.
2) No applications will be accepted if all the information is not present to allow
proper entry into the computer system. Any applications received with incomplete
information will be returned to sender. We are not mind readers nor are we
omniscient. Also, applications which are illegible will be returned. We will not guess
what is written on them.
3) Since there is no placement in this program there will be no orphan file created by
placement problems. However, there could be occasions when someone sends in an
application expecting their sponsor to do likewise, but he or she does not. We will
hold the appplication for 5 business days, and if the sponsor application does not
materialize, we will return the orphan application back to the sender.
4) Another situation which could sometimes happen is mail being lost. Here again, if
the sponsor application does not arrive within 5 business days, we will be forced to
return the orphan application.
5) We will always attempt to answer all questions in a timely and diligent fashion.
However, we anticipate rapid growth and understand that there will be times when
we cannot. We encourage you to get on the conference calls, or turn to your upline
whenever you need information that you carmot get from the Company.
6) We will absolutely not tolerate any misrepresentation of our products or our
program from any distributor. This will be grounds for immediate termination
and loss of any revenue share.
7) Whenever we are about to release a new product into the matrix, we will notify
everyone at least a month before. This notification will be as an announcement in
your check envelope, with your cereal delivery, or as a fax on demand document.
8) Revenue share will only be paid on a product if you yourself own it. In other
words, as we release different products into the matrix, if you do not own that
product, you will not earn revenue share on it from downfine purchases. Remember, it
is not a requirement to own all our products, but it will be your decision as to whether
or not you wish to earn additional revenue share based on the new products,
9) You may note that on your genealogy reports, persons whom you sponsored
yourself may show up as being sponsored by someone else. That is not a mistake in
the program! In order for the computer to place people in the matrix, it must assign
sponsorship. This does not take sponsorship away from you, but is merely the way in
which the computer builds the matrix. When this occurs, you now become the
enroller, which keeps the credit for personal sponsorship with you, where it belongs.
GOOD LUCK AND SEE YOU AT THE TOP!
From lreed at west.cscwc.pima.edu Sat Jul 4 06:34:50 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 4 Jul 1998 06:34:50 -0700 (PDT)
Subject: CypherPunks CensorShip Crisis II - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C8A9E.8996F560.3@west.cscwc.pima.edu>
Beyond The Valley Of The Planet Of The Return Of The Son
Of The Uncle Of The Mother Of All Censorship Crisies II
SPACE ALIENS HIDE M DRUGS!!!
_____________________________
* To: cypherpunks at toad.com
* Subject: Linda Reed--PCC West Campus CSC
: Re: Army of Dog
SPACE ALIENS HIDE M DRUGS!!!
* From: one4evil at juno.com (Nalus Optic)
* Date: Fri, 3 Jul 1998 10:49:09 -0700
* Sender: owner-cypherpunks at Algebra.COM
I was asked to forward this message to the Cypherpunks list by Linda
Reed...Who sent it to me as a responce to one of my e-mails...I know that
by doing so, I risk being kicked, stomped, beated siverly amongst the
neck and shoulders, and even flamed...But I think so many of us are not
looking at the true messages involved in these 'spams'. Reed is makeing
several REALL good points...Given, Reed does rant a bit...And some of
what is writen is just so much bullshit...But all of it, taken in
context, is Truth (TM)...
Let me make a suggestion to Reed and all others involved...There is a
time and place for everything...The time for rEvolution, as Reed puts it,
is _NOW!_ However, Cypherpunks is not the place...So does anyone know of
any good e-lists that would love to get the ALIANS posts? Maybe your
five minute's of thought on a way to help Reed will make everyone happy,
Vs the hours some of us are spending complaining about the damn thing.
[Gnat From The Author:
As the Author, We personally believe that
should forcefully unsubscibe itself from the CypherPunks
Distributed Node Mailing Lists, since it is the website
which the Author is currently using to read the list posts.
As well, We feel that Linda Reed
should take steps to block her email account from being sent
to any site on the InterNet, as it is being used, with or
without her consent, to generate UCE/SPAM.
In addition, We feel that all CypherPunks Distributed Node
Mailing List members should forcefully unsubscribe themselves
from the lists, as spammers, since it is enevitable that there
is someone on the list who considers their posts irrelevant,
off-topic, or SPAM, at one point or another.
In the future, the Author would be happy to provide a filtered
version of the CypherPunks Distributed Node Mailing List which
would be distributed freely to all CypherPunks whose non-union
dues are currently paid up to date.
The filtered version would contain complete copies of all posts
routed through the current CypherPunks Distributed Mailing List
Nodes, without any deletions or censorship, in accordance with
CypherPunks Goals and Traditions.
For a slight extra fee, the Authors would also be happy to
provide special, Enhanced Editions of the CypherPunks Filtered
Mailing List:
1. ASCII Art Edition: Containing classic reprints of Timmy
C. Mayonnaise ASCII-Art SPAMS, complete with Forged Digital
Signatures of Dr. Dimitri Vulis, KOTM, along with a Certificate
of Genuine Authenticity Digitally Signed with the Electronic
Forgery Foundation's Pretty Lousy Privacy Key.
2. Censorship Crisis II Edition: Offers the convenience of
recreating the original posts for and against censorship
of the CypherPunks list, substiuting the names, email
addresses and digital signatures of current list members,
saving list members hours of rehashing old issues, while
maintaining the emotionally volatile atmosphere regarding
an argument that is logically ridiculous to argue about
in the first place, given the nature of the CypherPunks
list.
!!!PLUS!!! As An Added Bonus: (At No Extra Charge!)
* A complete pro-censorship and anti-censorship thread
dealing specifically with the SPAMing of SAHMD chapters
to the CypherPunks list, with each post written and
autographed the the Author HimOrHerSelf!
* A Classic Collection of past posts by both legendary
and long-forgotten CypherPunks, quoting and misquoting
the "Doomed to Learn From the Mistakes of the Past"
(or whatever) quote.(A 5MB package, by itself, alone!)
* A Superb Collection of Lame-AND/OR-Offensive Posts
categorized under such headings as UNSCRIBIBVE, LAME,
RACIST, CHILDISH, 'I BROKE PGP!', 'NEW UNBREAKABLE
ENCRPTION ALGORERHTHM', , RE: ,
STUPID, AOL, 'I THINK WE SHOULD ALL SEND TEN COPIES
OF THIS POST BACK TO DIMITRI', and one of the all-time
favorites of many Veteran Elitist CypherPunks List
Members, 'TEST'.
3. Pre-Checked Archive Edition: Each post is marked with
a special flag to indicate whether or not the post is
duplicative of a subject discussed, or a point made by,
Tim C. May at some time in the history of the CypherPunks
list, as well as a flag indicating whether or not the
post agrees with Mr. May's past theories and views, so
that they can be efficiently deleted in order not to
waste the reader's time with BadInformation, one way
or the other.
Those pre-dating their orders for an Enhanced Edition
of the Author's Filtered CypherPunks Mailing List to
December 7, 1989, or forging Tim C. May's digital
signature to their order, will receive copies of
Nalus Optic's coming post to list, whining about how
HisOrHer original post *NEVER* called for censorship,
Tim C. May's future reply that this is obviously the
work of that asshole, Toto, again, Robert Hettinga's
future post that he *loves* this list, another post
from Tim C. May, obviously forged by Toto, saying that
he can't find his shoes *or* his goddamn dentures, and
a variety of future posts from various list members
stating:
"Just ignore him."
"Don't you people have delete keys?"
"Happy Fourth of July!"
"I'm putting Toto back in my KillFile!"
"I never took him out of mine, I just read his posts
by accident when I read all of the posts in my KillFile,
to make sure I'm not deleting anything important."
""
"Have a good Labor Day!"
"Unscrrvive"
"Unrivcribe cypherpunks "
"Unsvribe cypherpunks"
"Uncribive cypherpunks"
"Unsrivribe "
"Merry Chrismas Everybody!"
"Take me off this goddamn list!"
"TAKE ME OFF THIS LIST! I MEAN IT!!!"
"Happpy Holidays and a Happy New ear"
"Please take me off this list, ok? Please, somebody?"
"OK OU ASHOLES! IM GOING TO KEEP THIS UP UNTIL OU..."
DISCLAIMER: The Author is in no way implying that those
who do not wish to take advantage of this tremendous
offer are not free to just contine their involvement in
the Cypherpunks list and use methods of subscribing and
posting pretty much the same as they did before deleting
this offer without reading it.
However, HeOrShe reserves the right to bill all who
receive this offer the full amount of the CypherPunks
current non-union dues, if this offer is not returned
to the CypherPunks mailing list they received it from,
in it's original condition, with full message headers,
within thirty minutes or less of its original posting.]
From billp at nmol.com Sat Jul 4 12:58:21 1998
From: billp at nmol.com (bill payne)
Date: Sat, 4 Jul 1998 12:58:21 -0700 (PDT)
Subject: NSA , FBI, and Sandia labs - and stolen weapons
Message-ID: <359E887A.6EDB@nmol.com>
Saturday 7/4/98 1:20 PM
Laszlo Baranyi
I read http://www.qainfo.se/~lb/crypto_ag.htm
I will look in my files for a paper published in the Association
of Computing Machinery authored by G. J. Simmons on the COVERT CHANNEL.
Then e-mail you an exact reference.
Information FORCED on me by Sandian James Gosler funded by NSA was about
the COVERT CHANNEL. Similar to what I read at
http://www.aci.net/kalliste/ricono.htm
Gosler made the point to us that the 'black hats' could spike a device,
either through hardware or software.
A 'white hat' group could not discover how the covert channel worked
[was spiked].
Gosler later wanted to assign me to an NSA project. I refused. I would
not sign the required papers - which effectively makes the signer give
up their civil rights.
See http://www.qainfo.se/~lb/crypto_ag.htm
RIGGING THE GAME" Baltimore Sun, December 10, 1995. This article can be
ordered on-line
http://www.sunspot.net/archive/search/
for details what NSA requires employees to sign.
Sandia reassigned me to break electronic locks for the FBI.
http://www.fbi.gov/
and http://www.fbi.gov/fo/nyfo/nytwa.htm
I attach results, which the FBI blieves is SECRET/NSI, on how to
counterfeit Wiegand wire access
credentials funded by the FBI.
Perhaps the following quotation and reference might be valuable to
you.
Spy agencies are also dabbling in hacker warfare. The
National Security Agency, along with top-secret
intelligence
units in the Army, Air Force, has been researching
ways to infect enemy computer systems with particularly
virulent strains of software viruses that already plague
home
and office computers. Another type of virus, the logic
bomb,
would remain dormant in an enemy system until a
predetermined
time, when it would come to life and begin eating data.
Such
bombs could attack, for example, a nation's air-defense
system
or central bank. The CIA has a clandestine program that
would insert booby-trapped computer chips into weapons
systems
that a foreign arms manufacturer might ship to a
potentially
hostile country - a technique called "chipping". In
another
program, the agency is looking at how independent
contractors
hired by arms makers to write software for weapons systems
could be bribed to slip in viruses.
"You get into the arms manufacturer's supply network,
take the stuff off-line briefly, insert the bug, the let it
go
to the country," explained a CIA source who specializes in
information technology. "When the weapons system goes into
a
hostile situation, everything about it seems to work, but
the
warhead doesn't explode."
weapons may be even more exotic than computer viruses.
Los Alamos National Laboratory in New Mexico has developed
a
suitcase-sized device that generates a high-powered
electromagnetic pulse. Commandos could sneak into a
foreign
capitol, place the EMP suitcase next to a bank and set it
off.
The resulting pulse would burn out all electronic
components
in the building. ...
[TIME, August 21, 1995, by Douglas Waller]
The US was super-concerned when stinger missiles, AFTER THE US GAVE THEM
TO THE AFGHANIS, that the stingers might be used against the US.
So the idea is to spike weapons so that the US remains in ELECTRONIC
CONTROL - if physical
control is lost.
There are, of course, hazards in powering-up a stolen foreign weapon.
My wife Patty [Implementing Basics : How Basics Work William H. and
Patricia Payne /
Published 1982 http://www.amazon.com]and I were in Zurich in April
1997.
I spoke to Hans Buehler on the phone from the airpont.
Buehler gave me ideas on how to get my case settled TOO.
I JUST WANT MY MONEY AND OUT OF THIS MESS!
http://www.jya.com/sec062998.htm
Best. And I look forward to reading more about what you discover.
bill
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
Coauthor Lewis in the above is one of my former MS and PhD students in
computer science.
http://www.friction-free-economy.com/
Counterfeiting Wiegand Wire Access Credentials
Bill Payne
October 16,1996
Abstract
Wiegand wire access credentials are easy and
inexpensive to counterfeit.
Access Control & Security Systems Integration magazine, October
1996 [http://www/securitysolutions.com] published the article,
Wiegand technology stands the test of time
by PAUL J. BODELL, page 12
Many card and reader manufacturers offer Wiegand (pronounced
wee-gand) output. However, only three companies in the
world make Wiegand readers. Sensor Engineering of Hamden
Conn., holds the patent for Wiegand, and Sensor has licensed
Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
Germany, to manufacture Wiegand cards and readers. ... A
Wiegand output reader is not the same thing as a Wiegand
reader, and it is important to understand the differences.
In brief, Wiegand reader use the Wiegand effect to
translate card information around the patented Wiegand
effect in which a segment of a specially treated wire
generates an electronic pulse when subjected to a specific
magnetic field. If the pulse is generated when the wire is
near a pick-up coil, the pulse can be detected by a circuit.
Lining up several rows of wires and passing them by a cold
would generate a series of pulses. Lining up two rows of
wires - calling on row "zero bits" and the other "one bits"
- and passing them by two different coils would generate two
series of pulses, or data bits. These data bits can then be
interpreted as binary data and used to control other
devices. If you seal the coils in a rugged housing with
properly placed magnets, and LED and some simple circuitry,
you have a Wiegand reader. Carefully laminate the special
wires in vinyl, and artwork, and hot-stamp a number on the
vinyl, and you have a Wiegand card.
IN THE BEGINNING
Wiegand was first to introduce to the access control
market in the late 1970s. It was immediately successful
because it filled the need for durable, secure card and
reader technology.
Embedded in the cards, Wiegand wires cannot be altered or
duplicated. ...
Bodell's Last statement is incorrect.
Tasks for EASILY counterfeiting Wiegand wire cards are
1 Locate the wires inside the card to read the 0s and 1s.
2 Build an ACCEPTABLE copy of the card.
Bodell's clear explanation of the working of a Wiegand card can
be visualized
zero row | | |
one row | |
binary 0 1 0 0 1
representation
Solutions to Task 1
A X-ray the card
B MAGNI VIEW FILM, Mylar film reads magnetic fields ...
Edmunds Scientific Company, catalog 16N1, page
205, C33,447 $11.75
is placed over the top of the Wiegand card.
COW MAGNET, Cow magnetics allow farmers to trap metal in the
stomachs of their cows. Edmunds, page 204, C31,101 $10.75
is placed under the card.
Location of the wires is easily seen on the green film.
Mark the position of the wires with a pen.
Next chop the card vertically using a shear into about 80/1000s
paper-match-sized strips.
Don't worry about cutting a wire or two.
Note that a 0 has the pen mark to the top. A 1 has the pen mark
at the bottom.
Take a business card and layout the "paper match"-like strips to
counterfeit the card number desired.
Don't worry about spacing. Wiegand output is self-clocking!
Tape the "paper-match - like" strips to the business card.
Only the FUNCTION of the card needs to be reproduced!
History
Breaking electronic locks was done as "work for others" at Sandia
National Laboratories beginning in 1992 funded by the Federal
Bureau of Investigation/Engineering Research Facility, Quantico,
VA.
The FBI opined that this work was SECRET/NATIONAL SECURITY
INFORMATION.
Details of the consequences of this work are covered in
Fired Worker File Lawsuit Against Sandia
Specialist Says He Balked When Lab Sought Electronic
Picklock Software, Albuquer Journal, Sunday April 25, 1993
State-sanctioned paranoia, EE Times, January 22, 1996
One man's battle, EE Times, March 22, 1994
Damn the torpedoes, EE Times, June 6, 1994
Protecting properly classified info, EE Times, April 11,
1994
DOE to scrutinize fairness in old whistle-blower cases,
Albuquerque Tribune, Nov 7 1995
DOE boss accelerates whistle-blower protection, Albuquerque
Tribune, March 27, 1996
DOE doesn't plan to compensate 'old' whistle-blowers with
money, Albuquerque Tribune September 27, 199
From stuffed at stuffed.net Sat Jul 4 19:52:34 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Sat, 4 Jul 1998 19:52:34 -0700 (PDT)
Subject: Daily News Fri 3 Jul '98
Message-ID: <19980705021020.20755.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 268 bytes
Desc: not available
URL:
From stuffed at stuffed.net Sat Jul 4 23:49:38 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Sat, 4 Jul 1998 23:49:38 -0700 (PDT)
Subject: Daily News Sat Jul 4 '98
Message-ID: <19980705043205.15645.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 268 bytes
Desc: not available
URL:
From mgraffam at mhv.net Sun Jul 5 05:51:13 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Sun, 5 Jul 1998 05:51:13 -0700 (PDT)
Subject: corvette/BXA
Message-ID:
For all those watching the watchers, BXA recently changed their
configuration. corvette.bxa.doc.gov is now known as jade.bxa.doc.gov.
The IP addresses are different, but look at the configuration.. looks
like they just swapped two machines:
$ ftp corvette.bxa.doc.gov
Connected to corvette.bxa.doc.gov.
220-Proxy first requires authentication
220 jade FTP proxy (Version 2.0) ready.
Name (corvette.bxa.doc.gov:anonymous):
$ ftp jade.bxa.doc.gov
Connected to jade.bxa.doc.gov.
220-Proxy first requires authentication
220 corvette.bxa.doc.gov FTP proxy (Version 3.2) ready.
Name (jade.bxa.doc.gov:anonymous):
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"..the isle is full of noises, sounds and sweet airs that give delight and
hurt not. Sometimes a thousand twangling instruments will hum about mine
ears, and sometimes voices.." Caliban, Shakespeare's "The Tempest"
From rj5d at geocities.com Sun Jul 5 06:13:00 1998
From: rj5d at geocities.com (rj5d at geocities.com)
Date: Sun, 5 Jul 1998 06:13:00 -0700 (PDT)
Subject: Llama al exterior a mitad de precio
Message-ID: <13579305_69336672>
05/07/1998
You can read de same message in Spanish at the bottom
Ud. puede leer el mismo mensaje en Castellano donde finaliza en ingles.
LLamadas al exterior hasta 80% m�s baratas y gratis a los 0800
========================================================================
This FREE software as opposed to the other products, allows the user to call a normal telephone anywhere in the world realizing fantastic savings.
========================================================================
You call toll free numbers in the United States or Canada from anywhere in the world, free.
This software is the newest technological breakthrough in telecommunications that makes possible long distance calls from your computer to any telephone in the world. We are the representatives of a software that is worldwide leader and uses the most advanced Internet telephony system available today by a long shot.
Most communications applications over the Internet, allow voice and even video transmittal, require that both the originator and the recipient of the call have fast, multimedia-ready computers, connected to the Internet at the same time and running the same communications software. Products like Net Meeting and Internet Phone are very sophisticated, but are not telephony applications.
You can call anywhere in the world by means of a multimedia computer and a Dial-up Internet service. The call is initiated from your computer after you connect to your Internet Service Provider (ISP) and is then transmitted through the web into a telephony central switch in the US. The switch instantly and automatically completes the call via the US public telephony network and through it reaches its final destination. The result is a real-time call, uninterrupted and full-duplex.
What are the benefits?
It reduces the cost of long distance calls by as much as 95% or even 100% when dialing into a toll-free (1-800 or 1-888) number in the US and Canada. For more information please refer to our home page at:
http://members.tripod.com/~rksistemas and
http://www.visitweb.com/rksistemas
Rates are completely independent from the country of origin of the call. In fact, all calls originate in reality from the US, signifying that World Wide users will actually call the world using US rates, currently the most competitive in the world.
Any telephone in the world may be called via a computer and a modem. This renders PC to PC technologies useless since they require both users to be connected to the Internet, have multimedia computers, the same software running and meet in the same place at the same time.
Visit us and download free the software at:
http://members.tripod.com/~rksistemas and
http://www.visitweb.com/rksistemas
or send your mail for questions to rksis at geocities.com
Thanks
=====================================================
SPANISH VERSION - SPANISH VERSION - SPANISH VERSION -
=====================================================
LLamadas al exterior hasta 80% m�s baratas y gratis a los 0800
�Como funciona ?��� usalo y ahorr� �
El destinatario no tiene que estar usando su PC sino que llam�s directo a su tel�fono. Cualquier usuario de Internet, con una computadora multimedia, puede iniciar llamadas desde su PC a cualquier tel�fono del mundo pero con tarifas que son incre�bles. �
Esto no es la charla por voz en Internet. No hay que ponerse de acuerdo ni nada,� disc�s con la PC y listo, as� de f�cil suena el tel�fono de quien est�s llamando.
-------------------------------------------------------
ADEM�S LLAM�S GRATIS A TODOS LOS 0800 DE EE.UU Y CANAD�
-------------------------------------------------------
Baj�te el software gratuitamente, prob�lo y ya que est�s consult� todos los servicios que ofrecemos
http://members.tripod.com/~rksistemas y de
http://www.visitweb.com/rksistemas
Podes tener "privacidad en tus llamadas",� porque a donde sea que llames, en nuestro pa�s s�lo queda registrada la llamada local a tu proveedor de Internet, y la llamada se origina desde EE.UU. a la tarifa m�s competitiva del mercado.
La tecnolog�a de este software incorpora los m�s recientes avances t�cnicos en materia de comunicaciones. Para realizar una comunicaci�n a cualquier lugar del mundo, te conect�s a tu proveedor de Internet y mediante el software (que lo podes bajar gratuitamente�de nuestra Web) te conect�s a un servidor en Nueva Jersey y este, de manera autom�tica e instant�nea entrega la llamada a la red p�blica de tel�fonos de los Estados Unidos.
El destinatario no necesita tener una conexi�n a un proveedor de Internet
Para vos es tan simple que disc�s en la pantalla usando el software y se llega al destino final, el tel�fono marcado.
El resultado es una llamada en tiempo real, full-d�plex (doble v�a: hablo y escucho a la vez) entre dos personas.
Debido a que la se�al es enviada por el Internet en el primer tramo del trayecto, hasta llegar a la central, las tarifas se vuelven�independientes del pa�s de origen.�
Consult� los productos y servicios que ofrecemos y bajate el soft gratuitamente y probalo desde
http://members.tripod.com/~rksistemas y de
http://www.visitweb.com/rksistemas
Por consultas: e-mail: rksis at geocities.com
Gracias.
From stuffed at stuffed.net Sun Jul 5 18:08:51 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Sun, 5 Jul 1998 18:08:51 -0700 (PDT)
Subject: Daily News Sun Jul 5 '98
Message-ID: <19980706000211.443.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 268 bytes
Desc: not available
URL:
From Yours at HCHY.Now.com Sun Jul 5 18:10:28 1998
From: Yours at HCHY.Now.com (Freedom)
Date: Sun, 5 Jul 1998 18:10:28 -0700 (PDT)
Subject: Freedom Is Not Free! -PBKF
Message-ID: <199807060110.SAA03549@toad.com>
FREEDOM REQUIRES MONEY!!
I know what you are thinking "Another one of those Scams!" Well guess what? You're
Wrong! Have you ever invested in the stock market, gone into business for yourself,
made a friendly wager on a game or played the lottery. I think that most of us have
gambled on one thing or another. This is so easy! This is truly the easiest and most
effective way of making money I've ever seen! YOU HAVE SO LITTLE TO LOSE AND SO
MUCH TO GAIN! Please print this and read it carefully. You'll be glade you did!
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
This is a , LOW-COST,PHENOMENON.
PRINT this letter, read the directions, THEN
GET STARTED TODAY!
You are about to embark on the most profitable and unique
program you may ever see. Many times over, it has
demonstrated and proven its ability to generate large amounts
of CASH. This program is showing fantastic appeal with a
huge and ever-growing on-line population desirous of
additional income.
This is a legitimate, LEGAL, money-making opportunity.
It does not require you to come in contact with
people, do any hard work, and best of all, you
never have to leave the house, except to get
the mail and go to the bank!
This truly is that lucky break you've been waiting for!
Simply follow the easy instructions in this letter,
and your financial dreams will come true!
When followed correctly, this electronic, multi-level marketing program
works perfectly... 100% OF THE TIME!
Thousands of people have used this
program to:
Raise capital to start their own business
Pay off debts
Buy homes, cars, etc.,
Even retire!
This is your chance, so read on and get started today!
---------------------------------------------------------
-------------------------
OVERVIEW OF THIS EXTRAORDINARY
ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
----------------------------------------------------------------------
------
------
Basically, this is what we do:
We send thousands of people a product for $5.00 that
costs next to nothing to produce and e-mail. As with
all multi-level businesses, we build our business by
recruiting new partners and selling our products. Every
state in the U.S. allows you to recruit new multi- level
business online (via your computer).
The products in this program are a series of four business
and financial reports costing $5.00 each. Each order you
receive via "snail mail" will include:
$5.00 cash
The name and number of the report they are ordering
The e-mail address where you will e-mail them the report they ordered.
To fill each order, you simply e-mail the product to the buyer. The $5.00 is yours!
This is the EASIEST electronic multi-level marketing business
anywhere!
FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE
BENEFITS!
*******
I N S T R U C T I O N S
*******
This is what you MUST do:
1. Order all 4 reports shown on the list below (you can't sell
them if you
don't order them).
For each report, send $5.00 CASH, the
NAME & NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL
ADDRESS, and YOUR NAME & RETURN ADDRESS (in case of a problem) to the
person whose name appears on the list next to the report.
MAKE SURE YOUR RETURN ADDRESS IS ON YOUR
ENVELOPE IN CASE OF ANY MAIL PROBLEMS!
When you place your order, make sure you order each of the four reports. You will
need all four reports so that you can save them on your computer and resell them.
Within a few days you will receive, via e-mail, each of the four
reports. Save them on your computer so they will be accessible
for you to send to the 1,000's of people who will order them
from you.
2. IMPORTANT�DO NOT alter the names of the people who are
listed
next to each report, or their sequence on the list, in any way other
than is instructed below in steps "a" through "f" or you will lose
out on the majority of your profits.
Once you understand the way this works, you'll also see how
it doesn't work if you change it.
Remember, this method has been tested, and if you alter it, it will not work.
( I talked to a friend last month who has also done this
program. He said he had tried "playing" with it to change
the results. Bad idea.... he never got as much money as
he did with the UN-altered version.
Remember, it's a proven method!
a. Look below for the listing of available reports.
b. After you've ordered the four reports, take this advertisement
and remove the name and address under REPORT #4. This person
has made it through the cycle and is no doubt counting their
50 grand!
c. Move the name and address under REPORT #3 down to REPORT #4.
d. Move the name and address under REPORT #2 down to REPORT #3.
e. Move the name and address under REPORT #1 down to REPORT #2.
f. Insert your name/address in the REPORT #1 position.
Please make sure you copy every name and address ACCURATELY!
3. Take this entire letter, including the modified list of names,
and save it to your computer. Make NO changes to the instruction
portion of this letter.
4. Now you're ready to start an advertising campaign on the
INTERNET! Advertising on the 'Net is very, very inexpensive,
and there are
HUNDREDS of FREE places to advertise.
Another avenue which you could use for advertising is e-mail
lists. You can buy these lists for under $20/2,000 addresses
or you can pay someone a minimal charge to take care of it
for you.
BE SURE TO START YOUR AD CAMPAIGN
IMMEDIATELY!
5. For every $5.00 you receive, all you must do is e-mail them
the
report they ordered. THAT'S IT!
ALWAYS PROVIDE SAME-DAY SERVICE ON ALL
ORDERS!
This will guarantee that the e-mail THEY send out, with YOUR
name and address on it, will be prompt because they can't
advertise until they receive the report!
------------------------------------------
AVAILABLE REPORTS:
------------------------------------------
*** Order Each REPORT by NUMBER and NAME ***
Notes:
-
ALWAYS SEND $5 CASH (U.S. CURRENCY) FOR EACH
REPORT CHECKS NOT ACCEPTED
ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL
Make sure the cash is concealed by wrapping it in at least two
sheets of paper
On one of those sheets of paper, include: (a) the number & name
of the report you are ordering, (b) your e-mail address, and
� your name & postal address.
PLACE YOUR ORDER FOR THESE REPORTS NOW:
_______________________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH
MULTI-LEVEL SALES"
ORDER REPORT #1 FROM:
MS
3919 BETHEL BLVD.
HOUSTON, TEXAS 77092
_________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTI-
LEVEL SALES"
ORDER REPORT #2 FROM:
JD
311 SOUTH STATE RD. 301
BLUFFTON, INDIANA 46714
_____________________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING
LISTS"
ORDER REPORT #3 FROM:
GS
3939 S. HARRISON STREET
FORT WAYNE, INDIANA 46807-2417
_____________________________________________________________________
>
REPORT #4 "EVALUATING MULTI-LEVEL SALES
PLANS"
ORDER REPORT #4 FROM:
SAM
P.O. BOX 13492
CHESAPEAKE,VA 23325-0492
_____________________________________________________________
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$:
Let's say you decide to start small just to see how
well it works. Assume your goal is to get 10 people
to participate on you're first level. (Placing a lot of
FREE ads on the Internet will EASILY get a larger response.)
Also assume that everyone else in YOUR ORGANIZATION gets
ONLY 10 downline members. Follow this example to achieve
the STAGGERING results below.
1st level�your 10 members with
$5............................................$50
2nd level--10 members from those 10 ($5 x 100).....................$500
3rd level--10 members from those 100 ($5 x 1,000)............$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
THIS TOTALS: $55,550
Remember friends, this assumes that the people who
participate only recruits 10 people each. Think for
a moment what would happen if they got 20 people to
participate! Most people get 100's of participants!
THINK ABOUT IT!
Your cost to participate in this is practically
nothing (surely you can afford $20). You obviously
already have an Internet connection and e-mail is
FREE!
REPORT#3 shows you the most productive methods for bulk
e-mailing and purchasing e-mail lists. Some list & bulk
e-mail vendors even work on trade!
About 50,000 new people get online every month!
******* TIPS FOR SUCCESS*******
TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and
follow the directions accurately.
Send for the four reports IMMEDIATELY so you will have them
when the orders start coming in because:
When you receive a $5 order, you MUST send out the requested
product/report to comply with the U.S. Postal & Lottery Laws,
Title 18,Sections 1302 and 1341 or Title 18, Section 3005 in
the U.S. Code, also Code of Federal Regs. vol. 16, Sections
255 and 436, which state that "a product or service must be
exchanged for money received."
ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
Be patient and persistent with this program. If you follow the
instructions exactly, your results WILL be SUCCESSFUL!
ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL
SUCCEED!
******* YOUR SUCCESS GUIDELINES*******
Follow these guidelines to guarantee your success:
If you don't receive 10 to 20 orders for REPORT #1 within
two weeks, continue advertising until you do. Then, a couple
of weeks later you should receive at least 100 orders for
REPORT #2. If you don't, continue advertising until you do.
Once you have received 100 or more orders for REPORT #2,
YOU CAN RELAX, because the system is already working for
you, and the cash will continue to roll in!
THIS IS IMPORTANT TO REMEMBER:
Every time your name is moved down on the list, you are
placed in front of a DIFFERENT report. You can KEEP
TRACK of your PROGRESS by watching which report people
are ordering from you. If you want to generate more income,
send another batch of e-mails and start the whole process
again! There is no limit to the income you will generate
from this business!
******* T E S T I M O N I A L S *******
This program DOES work, but you must follow it EXACTLY!
Especially the rule of not trying to place your name in a different
position, it won't work and you'll lose a lot of potential income.
I'm living proof that it works. It really is a great opportunity to
make relatively easy money, with little cost to you. If you do
choose to participate, follow the program exactly, and you'll be
on your way to financial security.
Sean McLaughlin, Jackson, MS
My name is Frank. My wife, Doris, and I live in Bel-Air, MD.
I am a cost accountant with a major U.S. Corporation and I
make pretty good money. When I received the program I
grumbled to Doris about receiving "junk mail." I made fun of
the whole thing, spouting my knowledge of the population
and percentages involved. I "knew" it wouldn't work. Doris
totally ignored my supposed intelligence and jumped in with
both feet. I made merciless fun of her, and was ready to lay
the old "I told you so" on her when the thing didn't work...
well, the laugh was on me! Within two weeks she had
received over 50 responses. Within 45 days she had received
over $147,200 in $5 bills! I was shocked! I was sure that I had
it all figured and that it wouldn't work. I AM a believer now. I
have joined Doris in her "hobby." I did have seven more years
until retirement, but I think of the "rat race" and it's not for me.
We owe it all to MLM.
Frank T., Bel-Air, MD
I just want to pass along my best wishes and encouragement to
you. Any doubts you have will vanish when your first orders
come in. I even checked with the U.S. Post Office to verify that the
plan was legal. It definitely is! IT WORKS!!!
Paul Johnson, Raleigh, NC
The main reason for this letter is to convince you that this system
is honest, lawful, extremely profitable, and is a way to get a large
amount of money in a short time. I was approached several times
before I checked this out. I joined just to see what one could expect
in return for the minimal effort and money required. To my astonishment,
I received $36,470.00 in the first 14 weeks, with money still coming in.
Sincerely yours, Phillip A. Brown, Esq.
Not being the gambling type, it took me several weeks to make up
my mind to participate in this plan. But conservative that I am,
I decided that the initial investment was so little that there was just
no way that I wouldn't get enough orders to at least get my money
back. Boy, was I surprised when I found my medium-size post office
box crammed with orders! For awhile, it got so overloaded that I had
to start picking up my mail at the window. I'll make more money this
year than any 10 years of my life before. The nice thing about this
deal is that it doesn't matter where in the U.S. the people live. There
simply isn't a better investment with a faster return.
Mary Rockland, Lansing, MI
I had received this program before. I deleted it, but later I wondered
if I shouldn't have given it a try. Of course, I had no idea who to contact
to get another copy, so I had to wait until I was e-mailed another program...
11 months passed then it came...I didn't delete this one!...I made more
than $41,000 on the first try!!
D. Wilburn, Muncie, IN
This is my third time to participate in this plan. We have quit our
jobs, and will soon buy a home on the beach and live off the interest on our
money. The only way on earth that this plan will work for you is if you
do it. For your sake, and for your family's sake don't pass up this golden
opportunity. Good luck and happy spending!
Charles Fairchild, Spokane, WA
ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO
FINANCIAL FREEDOM!
NOW IS THE TIME FOR YOUR TURN!
DECISIVE ACTION YIELDS POWERFUL RESULTS !!
DO IT TODAY AND YOU WILL SEE!!
From awzoie at ixleic.com Sun Jul 5 19:46:13 1998
From: awzoie at ixleic.com (awzoie at ixleic.com)
Date: Sun, 5 Jul 1998 19:46:13 -0700 (PDT)
Subject: YOUR INDEPENDENCE DAY ARRIVES IN 90 DAYS!!
Message-ID: <199807060241.AA20526@althea.ucs.uwplatt.edu>
Are you interested in making a substantial part-time income working from the comfort of your home on your computer, never having to speak to anyone? What if I told you this business only required one hour or less of your time each day? And if you knew that you could secure your financial independence in the next 3-6 months, would you be interested? I THOUGHT SO! Listen to this...
If you have seen the chain letters that abound on the internet, you might think this is just another one of them. Well, surprise! It is NOTHING like them! This program incorporates powerful marketing concepts that will make you HUGE amounts of money using an information product that is actually useful, unlike useless "reports" that are promoted in chain letter scams. If making up to $100,000 or more in the next 6 months interests you, read on...
"I'm Buying The Home of Our Dreams With CASH From The Proceeds I Received After Reading This Email!"
Hello!
My name is Marilyn Potter; I'm a 32 year-old wife, mother of two and a part-time medical transcriptionist. Normally I delete all "junk" email immediately when I receive it and use my email account primarily for my business that I do at home. I received a similar email numerous times over the past 2 years and deleted it every time.
I again received this email four months ago and since it had a catchy title I finally read it. The concept was so compelling that I finally said, "OK, I give in. I'll give this a try. Investing $40 is something I can afford and the chance to make some serious money would certainly not hurt either!" I mailed four $10 bills right away and after receiving all four chapters of the informative "CREDIT SECRETS REVEALED" book, I paid a friend of mine a small sum of money to email my ad to 20,000 people. The person who sent me the first chapter of the book also sent me a message that showed me how to market this valuable information with my computer for free.
I was hardly prepared for the results! For the past 90 days I have received more money than I have made in the past 5 years combined. The cash continues to roll in and at times I have to pick up my mail from the window at the post office because it won't fit in the medium-sized post office box I rented! And the cash just continues to flood my mailbox!
My husband Jeff and I have been saving every penny over the past 7 years to purchase a new home for our family with a large downpayment. Well, we now have enough money to purchase the home of our dreams with CASH! We are also going to spend a MONTH in Hawaii to celebrate! I owe it all to this incredible program that I finally decided to try after deleting it so many times.
I promise you, if you follow the directions in this e-mail and be prepared to eventually set aside about an hour each day to follow up (and count your money!), you will make at least as much money as we did. You don't need to be a whiz at the computer, but I'll bet you already are. If you can open an envelope, remove the money, and send an e-mail message, then you're on your way to the bank. Take the time to read this so you'll understand how easy it is. If I can do this, so can you!
Don't Delay, Start Living Your Dreams TODAY!!
Marilyn Potter
The following is a copy of the e-mail I read:
********************************************************
THIS IS THE VERY LATEST AND MOST PROFITABLE MONEY-MAKING PHENOMENON YOU WILL EVER SEE.
Do NOT mistaken this for the many chain letter SCAMS that you may have seen lately. This program offers VERY VALUABLE information in addition to the chance to make more money than you have ever seen before!
Read this email carefully and then print it out for reference. Follow the simple directions and get started TODAY!
With this new program, your financial dreams can come true. Are you sick of living paycheck to paycheck? Would you like to be able to go on vacation wherever and whenever you like? Does getting up on Monday morning without the stress of running off to work to a job that you dislike make you want to hear more about this business? Your dreams CAN come true but you MUST take action in order for your life to change. This COMPLETELY LEGITIMATE, LOW COST business can put you in the driver's seat financially for life. Don't waste another minute living your life for other people. Start TODAY living it for you and your family.
What's even better, this business NEVER requires you to talk to or come in contact with anyone and allows you to work from the privacy of your own home. No more deadlines to meet! No more worrying if your boss will still like you and keep you on his payroll for another month. All you need to do is to go to the post office and pick up your money every day and then take it to the bank! THAT'S IT!! No hard work and you can feel good because you are providing VALUABLE information that EVERYONE NEEDS!!
This business is automatic and keeps money rolling in even if you are not working at it. What could be better? It is so simple to start and doesn't require you to train anyone. This initial email does all of that for you! When followed correctly, this electronic, multilevel marketing program works perfectly... 100% OF THE TIME!
Thousands of people have used this program to:
Buy houses for CASH
Pay off DEBT
Put large downpayments on new homes
Finance existing businesses
Pay for education
Raise capital to start new businesses
Pay cash for new cars
MUCH, MUCH MORE!!
You must be interested by now, or you wouldn't have read this far! Now is your chance to discover financial freedom like you have never had before! Keep on reading, you will not be sorry.
OVERVIEW OF THIS AMAZING PROGRAM:
Here is how it works:
We sell the book "CREDIT SECRETS REVEALED" via email to thousands of customers for a one-time total cost of $40. Here is what makes this so exciting! The book is divided into 4 chapters which are sold individually. By purchasing the book and adding your name to the list, your name will move from the top to the bottom automatically and as it does the MONEY you make will increase exponentially.
As with all multilevel businesses, we build our business by recruiting new partners and selling our product. Every state in the U.S. allows you to recruit new multilevel business online (via your computer).
Here is the difference between this exciting program and "chain letter" scams. We market a book that contains VERY USEFUL information that EVERYBODY needs, not some useless report. When you order this book (which retails for $72.95), you will find how:
* To find the LOWEST credit card rates
* To manage your finances using credit cards to your advantage.
* To obtain MULTIPLE credit cards
* To consolidate your debt
* To obtain credit if you are financially challenged
* To get rich using other people's money
* To avoid the pitfalls of credit card usage
* To contact banks offering the best loan deals today
* To obtain business loans
* To find credit card companies offering matching airline miles
* To be successful when applying for credit and how to get the highest possible limit.
Each order you receive via "snail mail" will include:
1) $10.00 CASH 2) The name and number of the chapter they are ordering 3) The e-mail address where you will e-mail them the chapter they ordered.
To fill each order, you simply e-mail the product to the buyer. THAT'S IT! The $10.00 is yours! This is the EASIEST electronic multilevel marketing business anywhere!
READ THE FOLLOWING CAREFULLY AND THEN REAP THE HUGE REWARDS!
******* I N S T R U C T I O N S *******
This is what you MUST do:
1. Order all 4 chapters shown on the list below (you can't
sell the book if you don't order all 4 chapters).
* For each chapter, send $10.00 CASH, the NAME & NUMBER OF THE CHAPTER YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR NAME & RETURN ADDRESS (in case of a problem) to the person whose name appears on the list next to the chapter. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE IN CASE OF ANY MAIL PROBLEMS!
* When you place your order, make sure you order each of the four chapters. You will need all four so that you will have the entire book to sell.
* Within a few days you will receive, via e-mail, each of the four chapters. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. MAKE SURE TO PRINT THEM AS WELL IN CASE OF PROBLEMS!
2. IMPORTANT-- DO NOT alter the names of the people who
are listed next to each chapter, or their sequence on
the list, in any way other than is instructed below in
steps "a" through "f" or you WILL LOSE OUT on the
majority of your profits! Once you understand the way
this works, you'll also see how it doesn't work if you
change it. Remember, this method has been tested, and
if you alter it, it will NOT work.
a. Look below for the listing of chapters.
b. After you've ordered the four chapters, take this advertisement and remove the name and address under chapter #4. This person has made it through the cycle and is no doubt counting their $100,000!
c. Move the name and address under CHAPTER #3 down to CHAPTER #4.
d. Move the name and address under CHAPTER #2 down to CHAPTER #3.
e. Move the name and address under CHAPTER #1 down to CHAPTER #2.
f. Insert your name/address in the CHAPTER #1 position.
Please make sure you copy every name and address ACCURATELY!
3. Take this entire letter, including the modified list of names, and save it on your computer. Make NO changes to the instruction portion of this letter. PRINT OUT THE LETTER AS WELL!
4. Now you're ready to start an advertising campaign on the INTERNET! Advertising on the 'Net is very, very inexpensive, and there are HUNDREDS of FREE places to advertise. The marketing email you will receive with chapter 1 will explain internet advertising in greater detail. BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!
5. For every $10.00 you receive, all you must do is e-mail them the chapter they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This will guarantee that the e-mail THEY send out, with YOUR name and address on it, will be prompt because they can't advertise until they receive the chapter!
CHAPTERS TO PURCHASE
*** Order Each CHAPTER by NUMBER and NAME ***
Notes:
- ALWAYS SEND $10 CASH (U.S. CURRENCY) FOR EACH CHAPTER. CHECKS NOT ACCEPTED - ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL - Make sure the cash is concealed by wrapping it in at least two sheets of paper - On one of those sheets of paper, include: (a) the number & name of the chapter you are ordering, (b) your e-mail address, and (c) your name & postal address.
PLACE YOUR ORDER FOR THESE CHAPTERS NOW:
_________________________________________________
CHAPTER #1 "SECRETS FOR THOSE WITH CREDIT CHALLENGES"
ORDER CHAPTER #1 FROM:
L&S Enterprises
P.O. Box 11665
Eugene, OR 97440
CHAPTER #2 "THE LOWEST RATES IN CREDIT CARDS TODAY"
ORDER CHAPTER #2 FROM:
Unlimited Enterprises
PO Box 1516
Eugene, OR 97440
CHAPTER #3 "DEBT MANAGEMENT TO YOUR ADVANTAGE"
ORDER CHAPTER #3 FROM:
Bergman & Associates
PO Box 1083
Oakridge, OR 97463
CHAPTER #4 "OBTAINING LOANS FOR YOUR BUSINESS"
ORDER CHAPTER #4 FROM:
Dream Merchants
P.O. Box 1850
Bonner's Ferry, ID 83805
_________________________________________________
***IMPORTANT!!*** YOU WILL RECEIVE A MARKETING LETTER WITH CHAPTER ONE. YOU WILL NEED TO SEND THIS TO ANYONE WHO ORDERS CHAPTER ONE FROM YOU. THIS WILL EXPLAIN HOW TO MARKET THIS BOOK EFFECTIVELY.
You might wonder how this program can make you so much money. Well, keep reading and you will see how powerful this AUTOMATIC online business actually is!
Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people to participate on your first level. (Placing a lot of FREE ads on the internet will EASILY get a larger response.) Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline members. Follow this example to achieve the STAGGERING results below.
1st level--your 10 members with $10.................$100
2nd level--10 members from those 10 ($10 x100).....$1000
3rd level--10 members from those 100 ($10 x 1,000).$10,000
4th level--10 members from those 1,000 ($10x10,000).$100,000
TOTALS ----------->$111,100!
Remember, this assumes that the people who participate only recruit 10 people each. Think for a moment what would happen if they got 20 people to participate! Most people get 100's of participants! THINK ABOUT IT!
Your cost to participate in this is relatively very little (surely you can afford $40). You obviously already have an Internet connection and e-mail is FREE!
About 50,000 new people get online every month!
******* TIPS FOR SUCCESS *******
* TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the directions accurately.
* Send for the four chapters IMMEDIATELY so you will have them when the orders start coming in because:
When you receive a $10 order, you MUST send out the requested product to comply with the U.S. Postal & Lottery Laws, Title 18,Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money received."
* ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
* Be PATIENT and PERSISTENT with this program. If you follow the instructions exactly, your results WILL be SUCCESSFUL!
* ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!
******* YOUR SUCCESS GUIDELINES *******
Follow these guidelines to guarantee your success:
If you don't receive 10 to 20 orders for chapter #1 within two weeks, continue advertising until you do. Then, a couple of weeks later you should receive at least 100 orders for chapter #2. If you don't, continue advertising until you do.
Once you have received 100 or more orders for chapter #2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to roll in!
THIS IS IMPORTANT TO REMEMBER:
Every time your name is moved down on the list, you are placed in front of a DIFFERENT chapter. You can KEEP TRACK of your PROGRESS by watching which chapter people are ordering from you. If you want to generate more income, send another batch of e-mails and start the whole process again! There is no limit to the income you will generate from this business!
******* T E S T I M O N I A L S *******
My name is Scott Hampton and I live in Portland, Oregon. I am an airline pilot and make very good money doing what I do. Unfortunately I have built up a HUGE debt load from poor business transactions over the past 5 years. I am now living paycheck to paycheck even though I make over $60,000 per year as a pilot. I received this email approximately 6 months ago and decided to try it. I promptly ordered the useful book "CREDIT SECRETS REVEALED" and began marketing it aggressively. I was surprised when I found my post office box filled with over 300 orders in less than 30 days. Over the course of the next 3 months I have personally made $113,540! I have been able to pay off my debts quickly and have taken a much needed vacation. The money continues to roll in and I am preparing to do another mailing in about 30 days. All I can say is that I was skeptical but now I am a believer!
Scott Hampton, Portland, Oregon
I received this email about 1 year ago and immediately tossed it out stating to my wife that I was going to track down the person who sent it to me and give them a piece of my mind. I forgot about it and about 7 months later received it again. However this time I was in very high debt because my son was just accepted to a prestigious school and the tuition was astronomical. I viewed this opportunity differently and decided to try it. I figured I could certainly afford the $40 and had little to lose. Well, I am pleased to say that my son now has a "free" education as a result of this incredible program. I have never seen anything like it in my life. Routinely my PO box has 50-100 letters in it at a time. You MUST try it to believe it. It is like opening a present every day!
Walter Hickman Denver, Colorado
My wife and I have been married for 3 years now and we just had our second child Heather. We have been living in a 700 square foot apartment with very basic living necessities. We are both working and making ends meet is nearly impossible. My school bills were nearly $30,000 and the monthly payment was making it hard to find money to buy food. In addition to that, I was spending my 12 hour workdays away from my family, putting a strain on them. Late one evening about 10 months ago I received this email. I felt things could not get much worse and decided to at least give it a try. I mailed for the book and began marketing as the instructions indicated. Well, the rest is history. We are now purchasing a new home with 30% down and I am happy to say that my school bill will be paid off in 3 months. I owe it all to this incredible online MLM program!
Jeremy Bass, Providence, Rhode Island
Believe me, your efforts will certainly be rewarded with this easy, automatic money making wonder! I started about 2 months ago and now have enough money to purchase a new Mercedes convertible. I never thought I'd ever have enough money to purchase the car of my dreams but now I do. This program has made me believe in MLM again!
Larry Lancaster, Dallas, Texas
All my life I have wanted to retire early. Well, here I was, nearly 65 years old with not a cent in my savings account. I had never been able to save money because of high medical bills that I have had since my bypass surgery. I am in debt over $74,000 and must keep working the rest of my life. My stressful corporate life lead to my heart problems and now I am stuck with paying my health bills. Needless to say, I jumped at the chance when I read this email. I mailed out the 4 $10 bills right away and started advertising when I received the complete book. I guess all I can say is that I never dreamed I'd be in a position like I am now. I have paid off my medical bills and have put over $30,000 into savings. I plan to advertise this program about every 4 months and build up my savings account to over $500,000 so I can retire in about 3 years or less. Believe me, without this amazing MLM program I'd never be in such an enviable position!
Frank Statton, Los Angeles, California
My name is Mary and I have lived alone since my husband Allen passed away 3 years ago. I have 4 young children and was constantly depending on Welfare and our church family to help get us through our financial crisis. There was always more month at the end of the money and it seems like there was absolutely no way out of this disaster. Even though all our friends have been wonderful to us I finally decided to do something about it. I received this email on the computer I share with my friend. She looked at it and told me it would never work. I decided to at least see how it would work if I tried it. That was about 5 months ago and my life will never be the same again. After one month I was able to purchase a much needed Dodge Caravan for getting the kids around in. I figured that was the end of the money but then the money volume went up by around 4 times! I could not believe it! We now are totally self sufficient and are purchasing a moderate sized home so we can!
stretch out some. The product it
self was very helpful and showed me how to improve my financial well-being considerably. You have to try it to see that it works! Go for it today!
Mary Romero, Washington, DC
ORDER THE BOOK "CREDIT SECRETS REVEALED" TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM!
WITHOUT ACTION YOUR FUTURE CANNOT CHANGE! TAKE CONTROL OF YOUR FINANCIAL FUTURE NOW!!
From b00kszz at hotmail.com Sun Jul 5 23:43:06 1998
From: b00kszz at hotmail.com (b00kszz at hotmail.com)
Date: Sun, 5 Jul 1998 23:43:06 -0700 (PDT)
Subject: 750 How-To Books:UNDER $50.00750 How-To Books:UNDER $50.00
Message-ID: <199807060628.PAA22897@extra.caelum.co.jp>
We have over 750 high quality How-To Books & Reports
that you can own, read, or even re-sell yourself.
PRICE: Under $50.00!!!
Popular Titles:
Government Auctions, How to Get a Patent, Stop Smoking,
Web Marketing, Business Start-ups, Legal Documents, Novels,
many "Making Money" titles and more!
For many FREE PREVIEWS and other FREEBIES go here:
http://srsinfo.com/books.htm
VERY WELL WRITTEN, QUALITY INFORMATION!
RESALE RIGHTS INCLUDED.
From fojiizoi93 at prodigy.com Mon Jul 6 02:39:16 1998
From: fojiizoi93 at prodigy.com (fojiizoi93 at prodigy.com)
Date: Mon, 6 Jul 1998 02:39:16 -0700 (PDT)
Subject: Email 57 Million People for $99
Message-ID: <199807061031HAA6919@pimiaia5y.accuweb.nb.ca>
��������� 57 MILLION
EMAIL ADDRESSES
FOR ONLY $99
������
� You want to make some money?
I can put you in touch with over 50 million people at virtually no cost.
Can you make one cent from each of theses names?
If you can you have a profit of over $500,000.00
����� That's right, I have 57 Million� Fresh� email
addresses that I will sell for only $99. These are all
fresh addresses that include almost every person
on the Internet today,� with no duplications. They are
all sorted and ready to be mailed.� That is the best
deal anywhere today !� Imagine selling a product for
only $5 and getting� only a 1/10% response.�� That's�
$2,850,000� in your pocket !!!
Don't believe it? People are making that kind of
money right now by doing the same thing, that is
why you get so much email from people selling you
their product....it works !� I will even tell you how to
mail them with easy to follow step-by-step
instructions I include with every order.� These 57
Million email addresses are yours to keep, so you
can use them over and over and they come on 1 CD.�
This offer is not for everyone.
If you can not see the just how excellent the
risk / reward ratio in this offer is then there is
nothing I can do for you.
To make money you must stop dreaming
and TAKE ACTION.
****************************************
THE BRONZE MARKETING SETUP
57,000,000 email addresses on CD
These name are all in text files
ready to mail!!!
$99.00
****************************************
THE SILVER MARKETING SETUP
57,000,000 email addresses on CD
These name are all in text files
ready to mail!!!������ AND
8 Different Bulk email programs
and tools� to help with your mailings
and list management.
$ 139.00
****************************************
THE GOLD MARKETING SETUP
VIRTUALLY EVERYTHING!!
57,000,000 email addresses on CD
These name are all in text files
ready to mail!!!������ AND
8 Different Bulk email programs
and tools� to help with your mailings
and list management.
������������ AND
Over 500 different Business Reports
now being sold on the Internet for up to
$100 each. You get full rights to resell these reports.
With this package you get the email addresses,
the software to mail them AND ready to sell�
information products.
AND ......
.. a collection of the 100 best money making
adds currently floating around on the Internet.
$ 189
****************************************
THE PLATINUM MARKETING SETUP
FOR THOSE READY TO "OWN THE NET"
57,000,000 email addresses on CD
These name are all in text files
ready to mail!!!������ AND
8 Different Bulk email programs
and tools� to help with your mailings
and list management.
������������ AND
Over 500 different Business Reports
now being sold on the Internet for up to
$100 each. You get full rights to resell these reports.
With this package you get the email addresses,
the software to mail them AND ready to sell�
information products.
AND ......
.. a collection of the 100 best money making
adds currently floating around on the Internet.
AND ......
FLOODGATE & GOLDRUSH FULLY REGISTERED SOFTWARE!!
This is the Number 1 most powerful mass mailing software in the world today.
There is nothing that can compare for speed, reliability, performance, and the
ability to use "stealth" functions.
This is the package that will allow you to use the net as your own personal
"money tree" at will!!!
$ 379
****************************************
SEVERAL WAYS TO ORDER !!!
IF YOU ORDER BY PHONE WE WILL SHIP YOUR CD CONTAINING THE 57 MILLION + NAMES
WITHIN 12 HOURS OF YOUR ORDER!!!
� 1) WE ACCEPT:� AMERICAN EXPRESS OR
���
������������������������������ VISA <> MASTERCARD
���� TYPE OF CARD� AMX / VISA / MC??_______________
����� EXPIRATION DATE�� ___________________________
���� NAME ON CREDIT CARD________________________
���� CREDIT CARD #________________________________
���� BILLING ADDRESS ____________________________
���� CITY_________________________________________
��� STATE________________ZIP_____________________
�� PHONE INCLUDE AREA CODE___________________
��
��� EMAIL ADDRESS______________________________
������� WE WILL BILL selected amount to your account plus the following
shipping costs
������� SHIPPING� COST OF 3.85 FIRST CLASS MAIL
������� SHIPPING COST OF� 15.00� 24 HOUR EXPRESS MAIL /� FEDERAL EXPRESS
������� SALES TAX� added to AR residents
� >>> Send correct amount in cash, check or money
order to:
� >>> FIRE POWER!!
� >>> 1320 N. "B" St., Suite 112-24
� >>> Fort Smith, AR� 72901
�� 2) Send the same above requested credit card
information to above address.
��
�� 3) Call phone # 530-876-4293.� This is a 24 hour phone
number to place a CREDIT CARD order.
FIRE POWER! is a private company and is not affiliated with, or endorsed by,
AOL, MSN, or any other Internet Service Provider.
Copyright 1998
All rights reserv
From rah at shipwright.com Mon Jul 6 06:39:56 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Mon, 6 Jul 1998 06:39:56 -0700 (PDT)
Subject: IP: "CyberCash can't oust credit cards"
Message-ID:
Hettinga's three laws of internet payment technology investment:
1. Geodesic, peer-to-peer transactions.
2. Three orders of magnitude cost reduction.
3. Nothing but net.
The application of the above to Cybercash, or SET, for that matter, I leave
as an exercise for the reader...
Cheers,
Bob Hettinga
--- begin forwarded text
Delivered-To: ignition-point at majordomo.pobox.com
X-Sender: believer at telepath.com
Date: Sun, 05 Jul 1998 13:53:40 -0500
To: believer at telepath.com
From: believer at telepath.com
Subject: IP: "CyberCash can't oust credit cards"
Mime-Version: 1.0
Sender: owner-ignition-point at majordomo.pobox.com
Precedence: list
Reply-To: believer at telepath.com
Source: Charlotte (N.C.) Observer (printing a Washington Post article)
Posted at 3:32 p.m. EDT Friday, July 3, 1998
CyberCash can't oust credit cards
By MARK LEIBOVICH
The Washington Post
WASHINGTON -- Two years ago, CyberCash
Inc. walked tall as a pioneer in the seemingly vast
frontier of Internet commerce. Today, the Reston,
Va., firm and its software that lets merchants
receive payments over the Internet offers a
cautionary lesson in how social habits in the digital
age are difficult to predict -- and dicey to stake a
business on.
On Tuesday, CyberCash announced that its
second-quarter revenue would be below
expectations, and that it would lay off 20 percent
of its staff. The news sent its stock price into a
decline -- the latest to strike the company. Once
trading in the $60 range, it fell steadily this week to
finish at $11.12 1/2.
The hard times come even as CyberCash has tried
to tone down its aspirations and diversify into a
more conventional business, the processing of
credit-card transactions in ordinary stores. The
moral, said Ulric Weil, a technology analyst at
investment bank Friedman, Billings Ramsey Co. in
Arlington, Va., is: ``It's always hard to bet on the
purchasing mores of consumers.''
William N. ``Bill'' Melton, one of Northern
Virginia's most accomplished technology
entrepreneurs, envisioned a world of paperless
purchasing when he founded CyberCash in August
1994. In this world, Internet users would purchase
goods and services using new ``virtual currencies,''
such as CyberCoin, a CyberCash product that
allows online purchases of up to $20 at a time by
transferring funds from a credit card or bank
account to an account that CyberCash oversaw.
Few people bought anything with this virtual
currency at first, but the market was patient. In the
speculative world of Internet stocks, the potential
for this commerce seemed limitless, and
CyberCash was an instant Wall Street hit.
Company shares, first offered to the public for $17
in February 1996, were trading at more than $60
by that June.
But today, investors are tired of waiting. The
predicted rush to electronic currency remains a
mere trickle and what little there is generally uses
plain-old credit card transactions, not a fancy new
currency. For now, consumers shopping online
merely want to use something they know and trust
for payment, the credit card, not an entirely new
form of currency.
After this week's layoff, which involved about 20
positions in the Washington area, CyberCash has
about 200 employees. It remains unprofitable,
having reported a loss of $5.67 million on sales of
$1.14 million in the January-March quarter.
If life weren't uncertain enough in Reston,
speculation was rampant this week among analysts
who follow the company that its low stock price
was making it a ripe takeover target. These
predictions were fueled further by the company's
announcement Tuesday that its board of directors
had adopted a new shareholders rights, or
``poison pill,'' plan, which companies typically use
to deter unwanted takeover bids.
In this case, if an outside entity attempted to
purchase a stake in CyberCash that exceeded 15
percent, the company board could invoke the
provision -- at which point CyberCash
shareholders would win the right to purchase
company shares at a greatly discounted price. For
a potential buyer, this would make CyberCash far
more expensive.
Russ Stevenson, CyberCash's general counsel,
said the new provision was not related to the
company's recent struggles, and that the timing of
its adoption was coincidental. In a statement,
CyberCash said the poison pill did not come in
response to an acquisition proposal.
James J. Condon, the company's chief operations
officer, would not comment on whether
CyberCash was in discussions to be acquired,
citing a company policy ``never to comment'' on
potential acquisitions. Melton, CyberCash's
president and chief executive, was traveling
Thursday and could not be reached for comment.
CyberCash's recent woes stem in part from its
May acquisition of ICverify Inc., an Oakland,
Calif., company that makes credit-card processing
software. CyberCash, which purchased ICverify
for $57 million in cash and stock, hoped to
complement its own technology with ICverify's
more conventional ``point of sale'' software, which
helps retailers process credit card transactions in
shops and other commercial establishments.
Entering the ``point of sale'' market was a way for
CyberCash to hedge its bets against the uncertain
future of electronic commerce, analysts said. ``This
gave (CyberCash) a piece of the physical point of
payment, as well as the electronic point of
payment,'' said Scott Smith, an Internet commerce
analyst at Current Analysis Inc. in Sterling.
With the addition of ICverify, Condon said,
CyberCash could now offer a full package of
payment software to potential customers. They
could now provide, say, a clothing retailer, the
tools to process both in-person credit card
transactions as well as Internet credit card
purchases.
But the ICverify acquisition proved a difficult
transition. In recent months, analysts said, some
customers of both companies have frozen their
accounts, saying they were unsure about which
transaction software they would deploy in the
future.
``The ICverify transaction resulted in customers
taking a close look at what direction they wanted
to go in,'' said Weil.
Condon said he expects this to be a short-term
problem. He said he has spoken to several
customers who plan to continue their accounts
shortly.
People who follow CyberCash generally agree on
two things: that if the company can hang on long
enough for electronic payments to become a
widespread phenomenon, it will be well positioned
to cash in.
They also say the company has a strong, tenacious
management team in place, led by Melton. ``He is
the rock the company is built on, and he's
committed to the company's success,'' said Smith.
``I don't see anyone there who is ready to back
down.''
But in the end, Weil said, the future of CyberCash
might rest with forces beyond its control. ``You
can't change the psyche of consumers,'' he said.
``CyberCash doesn't have that kind of influence.''
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only.
-----------------------
**********************************************
To subscribe or unsubscribe, email:
majordomo at majordomo.pobox.com
with the message:
(un)subscribe ignition-point email at address
**********************************************
www.telepath.com/believer
**********************************************
--- end forwarded text
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
July 23-24, 1998:
From jag.privat at home.se Mon Jul 6 07:07:46 1998
From: jag.privat at home.se (barBEARian)
Date: Mon, 6 Jul 1998 07:07:46 -0700 (PDT)
Subject: easy remailing tool for MacIntosh ?
Message-ID: <19980706140648.19437.qmail@m2.findmail.com>
does anybody know of any nice, easy and convenient tool for the MacOS platform to do this complicated set-up for a chain of anonymous remailers ?
TIA, Harley
From jya at pipeline.com Mon Jul 6 07:40:52 1998
From: jya at pipeline.com (John Young)
Date: Mon, 6 Jul 1998 07:40:52 -0700 (PDT)
Subject: NYT Hits GAK, Boosts GAKS
Message-ID: <199807061440.KAA21885@camel14.mindspring.com>
The New York Times, July 6, 1998, p. A10.
Editorial
Privacy in the Digital Age
As more and more Americans communicate and do business
electronically, the fear is spreading that information they
transmit can be seized by hackers or criminals and used for
illegal or unsavory purposes. Fortunately, the technology
to thwart such invasions already exists. It is called
encryption, or the encoding of digital information to
secure its privacy. But the Federal Bureau of Investigation
is trying hard to prevent the growing use of encryption,
both in the United States and abroad, because of fears that
the protective technology itself will get into the wrong
hands. That shortsighted stand will undermine efforts to
protect commercial transactions and may actually hamper law
enforcement rather than help it.
The Clinton Administration's current policies toward
encryption have been largely dictated by the F.B.I. and the
Justice Department. These two agencies now block encryption
makers from exporting their most advanced technology unless
they agree to develop a method allowing law enforcement
agencies to gain access to it. The method favored by the
F.B.I. is known as the key escrow, in which the key to
cracking a code is kept with a third party that could hand
it over quickly if law enforcement agencies demanded it.
But the key escrow method poses tremendous threats to
privacy. There is a danger that access to keys for the code
could be abused by law enforcement agencies and others.
Worse, the United States would be required to share key
escrow information with law enforcement agencies of other
countries, and giving access to private communications to
countries with poor human rights records could lead to
crackdowns on dissidents using encryption for their own
communications.
According to industry officials, the export controls are
already backfiring. More and more foreign companies are
supplying encryption technologies without key escrow
arrangements, making it virtually impossible for the F.B.I.
to eavesdrop and stealing business from American firms. The
growing foreign role diminishes the ability of the F.B.I.
to demand new safeguards or ways to penetrate the
communications of criminals who use encryption.
President Clinton might normally be more sympathetic to
concerns over maintaining privacy in the digital world. But
since Attorney General Janet Reno has protected Mr. Clinton
from an independent counsel on campaign finance, the White
House is said to be loath to oppose either her or Louis
Freeh, the F.B.I. Director, on this issue.
On Capitol Hill, the debate over encryption has created
some unusual political alliances. Many conservative
Republicans have stood with leaders of the high-tech
industry to oppose any kind of ban on encryption within the
United States and to support a loosening of export controls
on encryption technology. It has been odd to see Trent
Lott, the Senate majority leader, and Dick Armey, the House
majority leader, stand with civil libertarians against the
demands of the F.B.I. But the F.B.I. is not without
influence. House Speaker Newt Gingrich, more friendly to
the agency, has prevented a bill encouraging greater use of
encryption from coming to a vote in the House.
The concerns of law enforcement agencies are legitimate.
But smart criminals are already using encryption, some of
which is readily available on the Internet. That was the
message conveyed only a few weeks ago by such unlikely
allies as Bill Gates of Microsoft and Jim Barksdale of
Netscape, who are on opposite sides in the Justice
Department's antitrust lawsuit against Microsoft but agree
on this issue.
The F.B.I. should give up its losing fight against
encryption and work with industry to develop new means to
catch criminals who use it. One approach under discussion
would be to develop software technology that could be
surreptitiously placed in a suspect's computer to capture
keystrokes before they are encrypted. Any such operation
would have to be carried out under strict court control as
the electronic equivalent of a search warrant. But law
enforcement agencies have to find a legal and ethical way
to stay ahead of technology, rather than stand in the way
of it. Trying to block advances in the digital age is
futile.
[End]
From jya at pipeline.com Mon Jul 6 07:50:40 1998
From: jya at pipeline.com (John Young)
Date: Mon, 6 Jul 1998 07:50:40 -0700 (PDT)
Subject: Gov Access to Key Strokes
Message-ID: <199807061450.KAA11968@camel14.mindspring.com>
Would any of the members of the NAS CRISIS panel know
if keystroke surveillance one of the technologies proposed
for the FBI as an alternative to GAK?
Could this technology to be covertly placed in all keyboards
for activation say, by remote control, or via a program/device
on the Internet?
Recall the various proposals for putting hardware encryption
in keyboards, with the possibility of covert GAK.
From rlpowell at calum.csclub.uwaterloo.ca Mon Jul 6 09:59:17 1998
From: rlpowell at calum.csclub.uwaterloo.ca (Robin Lee Powell)
Date: Mon, 6 Jul 1998 09:59:17 -0700 (PDT)
Subject: Code for Crypto for Work...
Message-ID: <19980706165904Z204413-2874+14@calum.csclub.uwaterloo.ca>
I need a crippleable cypher for work (i.e. one that can be done in 40-bit and
something-reasonable modes), and I'm thinking rc5 might be a good choice.
Anyone know where I could find source for this, or have other suggestions?
For the record, I and my company are in Canada.
-Robin
From rlpowell at calum.csclub.uwaterloo.ca Mon Jul 6 10:01:28 1998
From: rlpowell at calum.csclub.uwaterloo.ca (Robin Lee Powell)
Date: Mon, 6 Jul 1998 10:01:28 -0700 (PDT)
Subject: Nevermind... :-)
Message-ID: <19980706170121Z204409-2875+15@calum.csclub.uwaterloo.ca>
OK, I poked around some more and RC5 is an exceptionally sucky choice. Anyone
know of any good variable-length algorithms?
-Robin
PS: Sorry for the pseudo-off-topic-ness.
From CTIA_Daily_News at um2.unitymail.com Mon Jul 6 10:27:36 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Mon, 6 Jul 1998 10:27:36 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 6, 1998
Message-ID: <199807061726.MAA12238@mailstrom.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon / attachment
for the most important news in wireless communications today.
WIRELESS IT '98, The Next Generation in Personal
Computing & Communications October 12-14,
Las Vegas, Nevada Call (202) 785-0081 for more information!
=============================================
From die at pig.die.com Mon Jul 6 11:43:02 1998
From: die at pig.die.com (Dave Emery)
Date: Mon, 6 Jul 1998 11:43:02 -0700 (PDT)
Subject: Gov Access to Key Strokes
In-Reply-To: <199807061450.KAA11968@camel14.mindspring.com>
Message-ID: <19980706144246.A3940@die.com>
On Mon, Jul 06, 1998 at 10:46:27AM -0400, John Young wrote:
>
> Could this technology to be covertly placed in all keyboards
> for activation say, by remote control, or via a program/device
> on the Internet?
>
> Recall the various proposals for putting hardware encryption
> in keyboards, with the possibility of covert GAK.
John, I have on occasion mentioned on the net the possibility of
doing this via secret back doors in Microsoft OS kernels (W98/NT),
backdoors hidden by encrypted code (and that damn new WIPO treaty) that
would only be decrypted inside the CPU using a chip key not available to
the user. Given passage of WIPO I fully expect such technology to
become common as a means of copyright protection with very severe
penalties for those who would chose to peek inside the "technological
means" or alter it in any way. And once one has created this secret
space inside the core OS and protected it by draconian criminal laws, it
doesn't take much for someone to add a little extra feature in there
that logs and transmits back to Big Brother user keystrokes or keys used
with the encryption routines or other such privilaged and private user
information. This could be added by the FBI or by Microsoft under
federal pressure (which they certainly are). And interfering with or
disconnecting this nice little brother feature might well be considered
to be tampering with a "technological means" of copyright protection and
subject the user to 5 years in prison. Certainly public dissemination of
tools and information (such as code listings) that would allow access to
and alteration of this secret space would very likely result in criminal
prosecution, even if such legal action was not common for individual users.
In fact, under WIPO it would already be illegal to just
disassemble and debug the relevant part of the OS to check to see if
there was code in there to log and report keystrokes even if it was not
encrypted or otherwise protected. And no doubt at all but that the
rights enforcement software will be encrypted and otherwise protected
just to make sure that anyone tampering with it or even just examining
it for security flaws (such as keystroke recorders) would clearly be
flagrantly violating WIPO in an unambiguous as possible way.
What this means is that due to well meaning anti piracy measures
carried to extremes - WIPO , it is likely to be impossible for a user of
standard shrink wrapped commercial software to legally vet that software
to determine that it does not contain deliberate (courtesy the FBI)
means to grossly compromise the security of information on his computer
system. He will have no legal recourse but to trust the provider of the
software, as even the analysis required to prove such a deliberate
security hole exists would be serious federal felonies...
One wishes that Congress would see the light and allow
circumvention of copyright protections for legitimate security analysis
and audits (and for any purpose which would be construed as fair use
under copyright law), but so far this hasn't happened.
--
Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
From jya at pipeline.com Mon Jul 6 12:08:32 1998
From: jya at pipeline.com (John Young)
Date: Mon, 6 Jul 1998 12:08:32 -0700 (PDT)
Subject: fwd from spyking@thecodex.com
In-Reply-To: <35A111DE.9C6DDDBB@brainlink.com>
Message-ID: <199807061908.PAA07802@camel14.mindspring.com>
Answering Spyking's questions Ray posted in reverse:
The Bronx incident started off as a major CB case,
with barricades and plastic suits galore, in accord
with the push for scare the beans out of the public
with imaginary terrorism (another WMD terrorism trial is
due to start in NYC shortly).
It turns out that what was found were a couple of
take-home, mildly radioactive elements (properly
contained and marked) of a recently deceased
employee of a plant that used them. The story
died quickly. NYT covered it twice, once hot,
once tepid.
Second, what's driving the nationwide push to train First
Responders and emergency room staff is Clinton's
funding the program with billions, after he read
Richard Preston's recent novel on biological
terrorism (so said news reports), and got a few
heart-thumping briefings from if you only knew
blackhearts.
Right now preparing for domestic defense against
Weapons of Mass Destruction is the hottest
career-jumpstart in the nation, and there's a frenzy of
competition passing as cooperation among the
military, National Guards, intel, FBI, FEMA, state
and local cops, EMS, sawbones, Red Cross,
CB weapons experts (US and RU), mercenaries,
manufacturers, vets and revolving doorers of all the
above, and, to be sure, the never-fake-it media
goading and exaggerating (our straight-shooting
members here excepted, well, except Y2Kites).
Like many state and local officials relishing the vital
national security role being porked to domestic forces,
neatly bypassing the military's limitations, NYC's mayor
is happy as a pig in shit with his plan for a new $16m
anti-terrorist bunker on the 23rd floor of a buddy's office
building across the street from the World Trade Center --
one RPG shot from the 23rd WTC into his impenetrable
C4I nest. Rudy loves to watch "Patton" clad only in a
Kevlar jockstrap.
Of course, he's a "former federal prosecutor," the most
common subtitle on TV of disembodied talking heads.
From vjb at gil.com.au Mon Jul 6 13:56:05 1998
From: vjb at gil.com.au (Global Web Builders)
Date: Mon, 6 Jul 1998 13:56:05 -0700 (PDT)
Subject: Update on status of Pauline Hanson's One Nation web sites
Message-ID: <1.5.4.32.19980706204122.00729e64@mail.ipswich.gil.com.au>
G'day One Nation supporters in NSW
I am Scott Balson, Pauline Hanson's web master and the moderator of the now
defunct discussion forum mentioned in a recent news letter. You will notice
that I am not using my normal "gwb" email.
I apologise for the demise of the very successful discussion forum, but may
I say that nothing surprises me any more.
The forum was run on a third party web site and the owner took two weeks
leave on Sunday - the day before the forum "shut down".
Quite simply it was hacked by an unknown person because it was so
successful. This is the face of free speech in Australia. NOTE: The hacker
was not the site owner.
To make matters worse, last Friday, the One Nation pages went down after the
ISP we used, Pronet, had their link closed by Optus because of financial
difficulties... we have taken remedial action and hope to have the site
fully operational in the next 48 hours at:
http://www.gwb.com.au/onenation
The last few weeks I have seen, heard of and personally faced a growing
number of personal attacks aimed at those involved in the One Nation party.
In my case this has included being followed while driving my car (last week)
and phone calls from the media wanting me to comment on "anonymous",
unsubstantiated and trumped-up allegations that were made personally against
me. (For example, when questioned about his call to me on Sunday Rory
Callinan from "The (News Limited) Courier Mail" confirmed that they would
not normally bother with allegations made on this basis but my role within
the party had made an anonymous allegation "newsworthy" and worth pursuing.)
This follows the party's success in the Queensland state elections.
May I just say that this makes me realise that One Nation is obviously
having a big impact on those who have got the most to lose and through their
actions they have just increased my resolve to do all that I can to ensure
Pauline Hanson and the party get a "fair go" on the Internet even if this
right is denied by the mainstream media.
The events and incidents against the party will continue to be covered on my
Australian National News of the Day (anotd) which should be live again soon
(also temporarily closed because of the Pronet collapse) The address for
anotd is: http://www.gwb.com.au/gwb/news
The agenda for getting One Nation back on-line and the discussion form up
and running again is as follows:
One Nation web site and anotd fully operation by Friday 10th July (probably
before)
http://www.gwb.com.au/onenation
Discussion forum (through GWB) fully operational by end of July.
I will keep this group informed when the discussion forum is again
operational and once again apologise for the temporary loss of our forum in
which to discuss issues.
Please do not respond to this temporary account unless it is on a matter of
urgency.
The gwb at gwb.com.au email address will be up and running again by this weekend.
GWB
Scott Balson
Pauline Hanson's Web Master
From jya at pipeline.com Mon Jul 6 17:34:59 1998
From: jya at pipeline.com (John Young)
Date: Mon, 6 Jul 1998 17:34:59 -0700 (PDT)
Subject: Gov Secrecy Reform Act of 1998
Message-ID: <199807070034.UAA12735@camel7.mindspring.com>
We've transcribed a fax of Senator Thompson's
Amendment as Substitute for S.712, "Government
Secrecy Reform Act of 1998," passed by the
Governmental Affairs Committee on June 17:
http://jya.com/s712-amend.htm (37K)
Here's a report on the amendment and vote:
NCC Washington Update, vol. 4, #25 July 1, 1998
[National Coordinating Committee for the Promotion of History]
Senate Committee Adopts Substitute Bill for
Moynihan's Government Secrecy Reform Act
Senate Committee Adopts Substitute Bill for Moynihan's Government
Secrecy Reform Act -- On June 17 the Senate Governmental Affairs Committee
met to consider a substitute bill for S.712, the Government Secrecy Reform
Act of 1998. By voice vote, with no negative votes heard, the Committee
passed the substitute bill proposed by Senator Fred Thompson (R-TENN), the
chair of the Committee, and Senator Susan Collins (R-ME). The original
bill had provided a framework for reform but had lacked the specifics
which this bill provides.
The substitute bill make four major changes from the bill that was
originally introduced. First, this bill eliminates the section calling
for the establishment of a National Declassification Center in an existing
agency -- which many had thought could be the National Archives -- and
instead expands the functions and oversight responsibilities of the
existing Information Security Oversight Office (ISOO) and moves that
office from the National Archives to the Executive Office of the
President. Second, the bill states that classified information must be
declassified after 25 years unless, as the bill summary states,
"extraordinary circumstances" require that it remain classified. The
original bill had a 30 year time limit for most information to remain
classified. Third, the substitute bill retains the balancing test of the
original bill; however, the revised bill establishes criteria to guide
agency classification decisions for weighing the concerns of national
security and the public interest in disclosure. The national security
criteria are taken directly from President Clinton's E.O 12958 and the
public interest criteria are newly developed for the substitute bill.
Fourth, the substitute bill establishes a Classification and
Declassification Review Board composed of 5 public members to hear agency
and individual appeals regarding classification and declassification
decisions.
Once the report for the amended S. 712 is filed, which is expected to
happen in mid-July, then the substitute bill will be referred to the
Senate Select Committee on Intelligence for 30 days for their
consideration. It is anticipated that the Intelligence Committee may hold
hearings and may have objections to the balancing test provision of the
bill. Since there appears to be little attention in the House to this
legislation and since there are not many legislative days remaining before
adjournment, it is doubtful that this legislation will pass in the 105th
Congress.
From stuffed at stuffed.net Mon Jul 6 17:49:05 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Mon, 6 Jul 1998 17:49:05 -0700 (PDT)
Subject: Secret World of Spice/Freeway of Love
Message-ID: <19980706235722.1066.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 252 bytes
Desc: not available
URL:
From jkthomson at bigfoot.com Mon Jul 6 19:06:30 1998
From: jkthomson at bigfoot.com (jkthomson)
Date: Mon, 6 Jul 1998 19:06:30 -0700 (PDT)
Subject: Junger et al.
Message-ID: <3.0.3.32.19980706191157.006b9468@dowco.com>
Reuters
3:40pm 6.Jul.98.PDT WASHINGTON -- A district court has dismissed a law
professor's challenge to US regulations strictly limiting the export of
computer data-scrambling technology.
Judge James Gwin ruled late Friday that the export limits, which prevented
Case Western Reserve University Law School professor Peter Junger from
posting the text of encryption programs on the Internet, did not violate
the constitutional right to free speech.
The Ohio court's ruling contradicts a California district court ruling last
August that said source code -- the instructions a person writes telling
the computer what actions to perform -- constitutes a form of speech
subject to First Amendment protection.
"Unlike instructions, a manual or a recipe, source code actually performs
the function it describes," Gwin wrote. "While a recipe provides
instructions to a cook, source code is a device, like embedded circuitry in
a telephone, that actually does the function of encryption."
Neither ruling gave speech protection to compiled code, a version of source
code converted into an actual software program that could be run on a
computer.
The US government appealed the California decision and the issue may
ultimately be decided by the Supreme Court.
Civil libertarians and high-tech companies had hoped the court would
overturn the export limits on encryption technology, which uses
mathematical formulas to scramble information and render it unreadable
without a password or software "key."
Once the realm of spies and generals, encryption has become an increasingly
critical means of protecting electronic commerce and global communications
over the Internet.
But law enforcement agencies, fearing encryption will be used by terrorists
and international criminals to hide their activities, have instituted
strict controls to limit the export of strong scrambling products.
Lawyers opposed to the export rules said the Ohio court misunderstood the
difference between source code and compiled code.
"The Ohio court clearly doesn't understand the communicative nature of
software," said Shari Steele, an attorney with the Electronic Frontier
Foundation. "It's true that software helps to perform functions, but it
does so by telling computers what to do.... It certainly is speech
deserving of the highest levels of First Amendment protection."
-----------------------------------------------------------------------
james 'keith' thomson www.bigfoot.com/~ceildh
jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D [06.07.98]
ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9 [05.14.98]
ICQ:746241 at pgp.mit.edu ...and former sysop of tnbnog BBS
-----------------------------------------------------------------------
Technology is introduced, utilized, depended upon, obsolete,
standardized, and understood, in that order
=======================================================================
From Hua at teralogic-inc.com Mon Jul 6 19:30:22 1998
From: Hua at teralogic-inc.com (Ernest Hua)
Date: Mon, 6 Jul 1998 19:30:22 -0700 (PDT)
Subject: Junger et al.
Message-ID: <413AC08141DBD011A58000A0C924A6D52C359A@mvs2.teralogic-inc.com>
I don't understand ...
Did anyone demonstrate the "functionalness" of any arbitrary language
via a scanner and a compiler?
Why doesn't Gwin understand that the moment one successfully claims that
a specific class of source code is not speech by the virtue of the fact
that a compiler can transform it automatically into executable code
which performs a function, then ANY speech of ANY sort is fundamentally
vulnerable to being classified as functional as soon as a compiler can
transform it into real machine code.
So today, I can write the following:
1. Find a container.
2. Fill container with explosive substance.
3. Move container to target location.
4. Detonate container.
As soon as I have a compiler and a target machine that can execute these
instructions, suddenly this is not speech. However, before this
compiler and machine combo exists, event the electronic form of this is
speech!
How could this be?
Ern
-----Original Message-----
From: jkthomson [SMTP:jkthomson at bigfoot.com]
Sent: Monday, July 06, 1998 7:12 PM
To: cypherpunks at toad.com
Subject: Junger et al.
Reuters
3:40pm 6.Jul.98.PDT WASHINGTON -- A district court has
dismissed a law
professor's challenge to US regulations strictly limiting the
export of
computer data-scrambling technology.
Judge James Gwin ruled late Friday that the export limits, which
prevented
Case Western Reserve University Law School professor Peter
Junger from
posting the text of encryption programs on the Internet, did not
violate
the constitutional right to free speech.
The Ohio court's ruling contradicts a California district court
ruling last
August that said source code -- the instructions a person writes
telling
the computer what actions to perform -- constitutes a form of
speech
subject to First Amendment protection.
"Unlike instructions, a manual or a recipe, source code actually
performs
the function it describes," Gwin wrote. "While a recipe provides
instructions to a cook, source code is a device, like embedded
circuitry in
a telephone, that actually does the function of encryption."
Neither ruling gave speech protection to compiled code, a
version of source
code converted into an actual software program that could be run
on a
computer.
The US government appealed the California decision and the issue
may
ultimately be decided by the Supreme Court.
Civil libertarians and high-tech companies had hoped the court
would
overturn the export limits on encryption technology, which uses
mathematical formulas to scramble information and render it
unreadable
without a password or software "key."
Once the realm of spies and generals, encryption has become an
increasingly
critical means of protecting electronic commerce and global
communications
over the Internet.
But law enforcement agencies, fearing encryption will be used by
terrorists
and international criminals to hide their activities, have
instituted
strict controls to limit the export of strong scrambling
products.
Lawyers opposed to the export rules said the Ohio court
misunderstood the
difference between source code and compiled code.
"The Ohio court clearly doesn't understand the communicative
nature of
software," said Shari Steele, an attorney with the Electronic
Frontier
Foundation. "It's true that software helps to perform functions,
but it
does so by telling computers what to do.... It certainly is
speech
deserving of the highest levels of First Amendment protection."
-----------------------------------------------------------------------
james 'keith' thomson
www.bigfoot.com/~ceildh
jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D
[06.07.98]
ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9
[05.14.98]
ICQ:746241 at pgp.mit.edu ...and former sysop of
tnbnog BBS
-----------------------------------------------------------------------
Technology is introduced, utilized, depended upon, obsolete,
standardized, and understood, in that order
=======================================================================_
From PELUCHE-10 at worldnet.att.net Mon Jul 6 21:02:07 1998
From: PELUCHE-10 at worldnet.att.net (VICTOR HERRERA)
Date: Mon, 6 Jul 1998 21:02:07 -0700 (PDT)
Subject: No Subject
Message-ID: <01bda95c$e2e22a00$1e83400c@edson>
can u help me� thank
u
From egerck at laser.cps.softex.br Mon Jul 6 21:09:02 1998
From: egerck at laser.cps.softex.br (Ed Gerck)
Date: Mon, 6 Jul 1998 21:09:02 -0700 (PDT)
Subject: Junger et al.
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359A@mvs2.teralogic-inc.com>
Message-ID:
On Mon, 6 Jul 1998, Ernest Hua wrote:
>So today, I can write the following:
>
>1. Find a container.
>2. Fill container with explosive substance.
>3. Move container to target location.
>4. Detonate container.
>
>As soon as I have a compiler and a target machine that can execute these
>instructions, suddenly this is not speech. However, before this
>compiler and machine combo exists, event the electronic form of this is
>speech!
>
>How could this be?
Gwin has written a phrase which deserves more analysis, IMO -- free
from political overtones if we want to be impartial. The phrase can
be reworded as:
"source code is a device, that actually does a function"
The difference and importance here is between syntatic and semantics.
Your 4-instruction source code above is not a device today -- it
cannot perform any function. It has only syntatics, not the "how to".
But, if there were a machine that could supply the proper semantics
(ie, actually perform the functions 1-4) then your source code above
would be a device. Further, your source code may not be a device
today but be a device tomorrow.
As another example, bringing together one pound of inert metal with
another one pound of the same inert metal was not considered to be
explosive -- until U235 was used for the inert metal and properly
compressed. The difference is semantic, not syntatic.
In that, Gwin is correct. Can the source code actually perform a
function? Then, it is a device. Irrespective of the needed platform,
in the same way that an electric shaver is a device irrespective of
the local availablity of an appropriate power outlet.
IMO, even though I consider Gwin to be correct to a very large
extent, widespread use of crypto will not come from lifiting such
bans ... but from real need -- which does not outweigh the hassle,
today. The EFF has a wrong target there.
Do you know how much Internet e-mail traffic is encrypted today? Can
you believe less than 10%? Notwithstanding the rethoric exercises and
limelight it may provide, talking about encryption export bans may
not be as effective as desigining better and easier uses of strong
crypto -- that can then really drive market, legislation and courts.
Need to use is a better key than need to know, it seems.
Cheers,
Ed Gerck
>
>Ern
>
> -----Original Message-----
> From: jkthomson [SMTP:jkthomson at bigfoot.com]
> Sent: Monday, July 06, 1998 7:12 PM
> To: cypherpunks at toad.com
> Subject: Junger et al.
>
>
>
> Reuters
>
> 3:40pm 6.Jul.98.PDT WASHINGTON -- A district court has
>dismissed a law
> professor's challenge to US regulations strictly limiting the
>export of
> computer data-scrambling technology.
>
> Judge James Gwin ruled late Friday that the export limits, which
>prevented
> Case Western Reserve University Law School professor Peter
>Junger from
> posting the text of encryption programs on the Internet, did not
>violate
> the constitutional right to free speech.
>
> The Ohio court's ruling contradicts a California district court
>ruling last
> August that said source code -- the instructions a person writes
>telling
> the computer what actions to perform -- constitutes a form of
>speech
> subject to First Amendment protection.
>
> "Unlike instructions, a manual or a recipe, source code actually
>performs
> the function it describes," Gwin wrote. "While a recipe provides
> instructions to a cook, source code is a device, like embedded
>circuitry in
> a telephone, that actually does the function of encryption."
>
> Neither ruling gave speech protection to compiled code, a
>version of source
> code converted into an actual software program that could be run
>on a
> computer.
>
> The US government appealed the California decision and the issue
>may
> ultimately be decided by the Supreme Court.
>
> Civil libertarians and high-tech companies had hoped the court
>would
> overturn the export limits on encryption technology, which uses
> mathematical formulas to scramble information and render it
>unreadable
> without a password or software "key."
>
> Once the realm of spies and generals, encryption has become an
>increasingly
> critical means of protecting electronic commerce and global
>communications
> over the Internet.
>
> But law enforcement agencies, fearing encryption will be used by
>terrorists
> and international criminals to hide their activities, have
>instituted
> strict controls to limit the export of strong scrambling
>products.
>
> Lawyers opposed to the export rules said the Ohio court
>misunderstood the
> difference between source code and compiled code.
>
> "The Ohio court clearly doesn't understand the communicative
>nature of
> software," said Shari Steele, an attorney with the Electronic
>Frontier
> Foundation. "It's true that software helps to perform functions,
>but it
> does so by telling computers what to do.... It certainly is
>speech
> deserving of the highest levels of First Amendment protection."
>
>
>
>
>-----------------------------------------------------------------------
> james 'keith' thomson
>www.bigfoot.com/~ceildh
> jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196 122D
>[06.07.98]
> ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4 6BC9
>[05.14.98]
> ICQ:746241 at pgp.mit.edu ...and former sysop of
>tnbnog BBS
>
>-----------------------------------------------------------------------
> Technology is introduced, utilized, depended upon, obsolete,
> standardized, and understood, in that order
>
>=======================================================================_
>
______________________________________________________________________
Dr.rer.nat. E. Gerck egerck at novaware.cps.softex.br
http://novaware.cps.softex.br
--- Meta-Certificate Group member, http://www.mcg.org.br ---
From Hua at teralogic-inc.com Mon Jul 6 21:44:11 1998
From: Hua at teralogic-inc.com (Ernest Hua)
Date: Mon, 6 Jul 1998 21:44:11 -0700 (PDT)
Subject: Junger et al.
Message-ID: <413AC08141DBD011A58000A0C924A6D52C359C@mvs2.teralogic-inc.com>
I think we are in violent agreement here ...
Except that it seems odd that speech is no longer 1st amendment
protected as soon as it can be interpreted by a machine to do something.
So, then, if I want to deny you first amendment protections for
something, I can simply write a compiler to turn your words into machine
executable code, and suddenly, your words are no longer protected
speech. How could that be a reasonable interpretation of functional
versus not?
Secondly, Gwin said that encryption is a special class of software which
is MORE functional. This is definitely a misunderstanding, to say the
least. I don't see how any particular class of software is necessarily
more or less functional than other classes of software. In the
functional sense, all software, when compiled and executed is
functional, period (whether it performs according to its original design
is irrelevant).
Ern
-----Original Message-----
From: Ed Gerck [SMTP:egerck at laser.cps.softex.br]
Sent: Monday, July 06, 1998 9:09 PM
To: Ernest Hua
Cc: cypherpunks at toad.com; 'cryptography at c2.net'
Subject: RE: Junger et al.
On Mon, 6 Jul 1998, Ernest Hua wrote:
>So today, I can write the following:
>
>1. Find a container.
>2. Fill container with explosive substance.
>3. Move container to target location.
>4. Detonate container.
>
>As soon as I have a compiler and a target machine that can
execute these
>instructions, suddenly this is not speech. However, before
this
>compiler and machine combo exists, event the electronic form of
this is
>speech!
>
>How could this be?
Gwin has written a phrase which deserves more analysis, IMO --
free
from political overtones if we want to be impartial. The phrase
can
be reworded as:
"source code is a device, that actually does a function"
The difference and importance here is between syntatic and
semantics.
Your 4-instruction source code above is not a device today -- it
cannot perform any function. It has only syntatics, not the "how
to".
But, if there were a machine that could supply the proper
semantics
(ie, actually perform the functions 1-4) then your source code
above
would be a device. Further, your source code may not be a
device
today but be a device tomorrow.
As another example, bringing together one pound of inert metal
with
another one pound of the same inert metal was not considered to
be
explosive -- until U235 was used for the inert metal and
properly
compressed. The difference is semantic, not syntatic.
In that, Gwin is correct. Can the source code actually perform a
function? Then, it is a device. Irrespective of the needed
platform,
in the same way that an electric shaver is a device irrespective
of
the local availablity of an appropriate power outlet.
IMO, even though I consider Gwin to be correct to a very large
extent, widespread use of crypto will not come from lifiting
such
bans ... but from real need -- which does not outweigh the
hassle,
today. The EFF has a wrong target there.
Do you know how much Internet e-mail traffic is encrypted today?
Can
you believe less than 10%? Notwithstanding the rethoric
exercises and
limelight it may provide, talking about encryption export bans
may
not be as effective as desigining better and easier uses of
strong
crypto -- that can then really drive market, legislation and
courts.
Need to use is a better key than need to know, it seems.
Cheers,
Ed Gerck
>
>Ern
>
> -----Original Message-----
> From: jkthomson [SMTP:jkthomson at bigfoot.com]
> Sent: Monday, July 06, 1998 7:12 PM
> To: cypherpunks at toad.com
> Subject: Junger et al.
>
>
>
> Reuters
>
> 3:40pm 6.Jul.98.PDT WASHINGTON -- A district court has
>dismissed a law
> professor's challenge to US regulations strictly
limiting the
>export of
> computer data-scrambling technology.
>
> Judge James Gwin ruled late Friday that the export
limits, which
>prevented
> Case Western Reserve University Law School professor
Peter
>Junger from
> posting the text of encryption programs on the Internet,
did not
>violate
> the constitutional right to free speech.
>
> The Ohio court's ruling contradicts a California
district court
>ruling last
> August that said source code -- the instructions a
person writes
>telling
> the computer what actions to perform -- constitutes a
form of
>speech
> subject to First Amendment protection.
>
> "Unlike instructions, a manual or a recipe, source code
actually
>performs
> the function it describes," Gwin wrote. "While a recipe
provides
> instructions to a cook, source code is a device, like
embedded
>circuitry in
> a telephone, that actually does the function of
encryption."
>
> Neither ruling gave speech protection to compiled code,
a
>version of source
> code converted into an actual software program that
could be run
>on a
> computer.
>
> The US government appealed the California decision and
the issue
>may
> ultimately be decided by the Supreme Court.
>
> Civil libertarians and high-tech companies had hoped the
court
>would
> overturn the export limits on encryption technology,
which uses
> mathematical formulas to scramble information and render
it
>unreadable
> without a password or software "key."
>
> Once the realm of spies and generals, encryption has
become an
>increasingly
> critical means of protecting electronic commerce and
global
>communications
> over the Internet.
>
> But law enforcement agencies, fearing encryption will be
used by
>terrorists
> and international criminals to hide their activities,
have
>instituted
> strict controls to limit the export of strong scrambling
>products.
>
> Lawyers opposed to the export rules said the Ohio court
>misunderstood the
> difference between source code and compiled code.
>
> "The Ohio court clearly doesn't understand the
communicative
>nature of
> software," said Shari Steele, an attorney with the
Electronic
>Frontier
> Foundation. "It's true that software helps to perform
functions,
>but it
> does so by telling computers what to do.... It certainly
is
>speech
> deserving of the highest levels of First Amendment
protection."
>
>
>
>
>-----------------------------------------------------------------------
> james 'keith' thomson
>www.bigfoot.com/~ceildh
> jkthomson:C181 991A 405C EAFB 2C46 79B5 B1DC DB78 8196
122D
>[06.07.98]
> ceildh :1D79 59AF ED75 5945 6003 8240 DA34 ACCA 9DE4
6BC9
>[05.14.98]
> ICQ:746241 at pgp.mit.edu ...and former
sysop of
>tnbnog BBS
>
>-----------------------------------------------------------------------
> Technology is introduced, utilized, depended upon,
obsolete,
> standardized, and understood, in that order
>
>=======================================================================
_
>
______________________________________________________________________
Dr.rer.nat. E. Gerck
egerck at novaware.cps.softex.br
http://novaware.cps.softex.br
--- Meta-Certificate Group member, http://www.mcg.org.br ---
From egerck at laser.cps.softex.br Mon Jul 6 22:28:14 1998
From: egerck at laser.cps.softex.br (Ed Gerck)
Date: Mon, 6 Jul 1998 22:28:14 -0700 (PDT)
Subject: Junger et al.
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359C@mvs2.teralogic-inc.com>
Message-ID:
On Mon, 6 Jul 1998, Ernest Hua wrote:
>I think we are in violent agreement here ...
>
>Except that it seems odd that speech is no longer 1st amendment
>protected as soon as it can be interpreted by a machine to do something.
>So, then, if I want to deny you first amendment protections for
>something, I can simply write a compiler to turn your words into machine
>executable code, and suddenly, your words are no longer protected
>speech. How could that be a reasonable interpretation of functional
>versus not?
>
By the same reasoning as in my posting:
>>
>>As another example, bringing together one pound of inert metal with
>>another one pound of the same inert metal was not considered to be
>>explosive -- until U235 was used for the inert metal and properly
>>compressed. The difference is semantic, not syntatic.
>>
Thus, your instructions to bring together those two one-pound pieces
would be your right to free speech -- maybe it is poetry -- as long
as that is not recognized as a federal crime! After it boooms the
first time... it is a device, and it is immediately recognized to be
an unlawful one.
>Secondly, Gwin said that encryption is a special class of software which
>is MORE functional. This is definitely a misunderstanding, to say the
I could not find that quote -- "more functional".
BTW, I think that Gwin was struggling to express the notion that
source code (syntax) is a device whenever there is a clear binding
between that source code and known semantics, together with proper
pragmatics (the enviroment, as defined in semiotics), in order to
perform the desired function.
This is called a Just In-Iime Compiler ... and Gwin is 100% right
when he affirms that the difference between source code and compiled
code is null regarding its effects -- its desired function.
Thus, if the device is unlawful then it must be unlawful both as a
source code and as a compiled code.
Cheers,
Ed Gerck
______________________________________________________________________
Dr.rer.nat. E. Gerck egerck at novaware.cps.softex.br
http://novaware.cps.softex.br
--- Meta-Certificate Group member, http://www.mcg.org.br ---
From nobody at REPLAY.COM Mon Jul 6 23:35:05 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Mon, 6 Jul 1998 23:35:05 -0700 (PDT)
Subject: no subject!Anti-National ID Bill
Message-ID: <199807070635.IAA08822@basement.replay.com>
Where is this? Stalled. Looks dead in the water. Any further insights?
H.R.3261
SPONSOR: Rep Paul (introduced 02/25/98)
SUMMARY:
(AS INTRODUCED)
Privacy Protection Act of 1997 (sic) - Amends title II (Old Age, Survivors
and Disability Insurance) of the Social Security Act and the Internal
Revenue Code to prohibit any Federal, State, or local government agency or
instrumentality from using a social security account number or
any derivative as the means of identifying any individual, except for
specified social security and tax purposes.
Amends the Privacy Act of 1974 to prohibit any Federal, State, or local
government agency or instrumentality from requesting an individual to
disclose his social security account number on either a mandatory or a
voluntary basis.
Prohibits any two Federal agencies or instrumentalities from implementing
the same identifying number with respect to any individual, except as
authorized under this Act.
----
STATUS: Detailed Legislative Status
House Actions
Feb 25, 98:
Referred to the Committee on Ways and Means, and in addition to the
Committee on Government Reform and Oversight, for a period to
be subsequently determined by the Speaker, in each case for
consideration of such provisions as fall within the jurisdiction of the
committee concerned.
Mar 2, 98:
Referred to the Subcommittee on Government Management,
Information and Technology.
Feb 25, 98:
Referred to the Committee on Ways and Means, and in addition to the
Committee on Government Reform and Oversight, for a period to
be subsequently determined by the Speaker, in each case for
consideration of such provisions as fall within the jurisdiction of the
committee concerned.
From mgraffam at mhv.net Tue Jul 7 00:21:04 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Tue, 7 Jul 1998 00:21:04 -0700 (PDT)
Subject: Junger et al.
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359A@mvs2.teralogic-inc.com>
Message-ID:
On Mon, 6 Jul 1998, Ernest Hua wrote:
> Did anyone demonstrate the "functionalness" of any arbitrary language
> via a scanner and a compiler?
Indeed.. what we need is for someone to testify to the court about
natural and computer language, and maybe some relevent material from
information theory.
Pseudo-code from any computer programming textbook would be helpful
in making this point too.
What about English in a voice recognition system? In this case, English
can actually perform functions too, just as C does.
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"Enlightenment is man's emergence from his self-incurred immaturity.
Immaturity is the inability to use one's own understanding without the
guidance of another. . .Sapere aude! Have the courage to use your own
understanding!" - Immanuel Kant "What is Enlightenment?"
From reinhold at world.std.com Tue Jul 7 05:46:16 1998
From: reinhold at world.std.com (Arnold G. Reinhold)
Date: Tue, 7 Jul 1998 05:46:16 -0700 (PDT)
Subject: IP: "CyberCash can't oust credit cards"
In-Reply-To:
Message-ID:
At 9:13 AM -0400 7/6/98, Robert Hettinga wrote:
>Hettinga's three laws of internet payment technology investment:
>
>1. Geodesic, peer-to-peer transactions.
>2. Three orders of magnitude cost reduction.
>3. Nothing but net.
>
>The application of the above to Cybercash, or SET, for that matter, I leave
>as an exercise for the reader...
>
Three orders of magnitude cost reduction as compared to what? I can
believe that much improvement over running my credit card thru an imprinter
and processing the paper slip. But I doubt you can get anything like1000X
over SET, ugly as it is.
Arnold Reinhold
From Donotreply at 28806.com Tue Jul 7 05:55:49 1998
From: Donotreply at 28806.com (DOnotreply)
Date: Tue, 7 Jul 1998 05:55:49 -0700 (PDT)
Subject: Best Free XXX on the net!!!!
Message-ID: <199807071254.FAA18182@toad.com>
I have compiled a list of the best free XXX sites on the net!!
Take a look at:
Best ever
You will save a lot!
From billp at nmol.com Tue Jul 7 06:49:46 1998
From: billp at nmol.com (bill payne)
Date: Tue, 7 Jul 1998 06:49:46 -0700 (PDT)
Subject: keystrokes and crooked judges
Message-ID: <35A22681.7F5D@nmol.com>
I am reading http://www.jya.com/gaks-de.htm
Perhaps this e-mail may interest you
Best
bill
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
Monday 6/8/98 7:53 AM
John Young
I am reading http://jya.com/sitesec.htm a bit more carefully.
You have NEVER WRITTEN SO MUCH.
Fishing was great.
I used a
$10 THE INSTANT CALLING CARD [TM]
VOCALL COMMUNICATIONS CORP
The World's Most advanced prepaid Calling Card
which allows access with a pin of 718-2455-7091-xxx [my SECRET]
in ENGLISH, SPANISH, ARABIC, URDU, KOREAN, JAPANESE, GERMAN,
FRENCH, ITALIAN to call you TWICE on Saturday. At only $.14/min.
I left one message about Xandi and spiking computer keyboards.
Xandi MADE low-power transmitters,
http://www.gernsback.com/HyperNews/get/forums/resource/226.html
like the kind I MIGHT use IF I were going to spike a keyboard [most
which use an 8051
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2]
so that the keystrokes would be broadcast.
This, of course, defeats crypto attempts to cipher keystrokes.
But I DO NOT DO, or have to do, ILLEGAL THINGS for the FBI or any other
government agency.
I, as a DOE contractor employee, was protected under 10 CFR 708.
http://av.yahoo.com/bin/query?p=10+cfr+708&hc=0&hs=0
But 10 CFR 708 does not appear to be working well in my case.
Therefore, we had to try other remedies.
VOCALL is getting real close to digital cash, one of Orlin Grabbe's
interests. http://www.aci.net/kalliste/dcguide.htm
I have to do mostly technical work on the digital FX this week but will
try to
get two notices of appeal to the Tenth circuit written.
http://jya.com/whp043098.htm
Morales and I, with all the publicity you and Orlin have given us, can
go all the way to the Supreme Court with our genocide and crypto
deficiency lawsuits. http://jya.com/whpfiles.htm
Pro se, of course.
Too bad NSA did not take my criticisms of its shift register work
more constructively. http://jya.com/da/whpda.htm, click on Appendix S
Perhaps NSA should have worked with some of us at Sandia to come-up
with fixes to overcome deficiencies. This unpleasantness could have been
avoided.
I've had ideas to improve shift register algorithm operation before.
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
Let's all hope for settlement of this UNFORTUNATE matter before it
gets worse.
Later
bill
And this too.
Subject:
FBI agents and Junger
Date:
Tue, 07 Jul 1998 07:32:36 -0600
From:
bill payne
To:
jy at jya.com
CC:
art morales , whitfield diffie
, tom carpenter - halcyon ,
marc rotenberg , national employee rights
institute , mab at research.att.com,
mejudson at mail.wdn.com, lwirbel at aol.com, klayman
, john gilmore ,
jpcarson at mindspring.com,
jdelia at gnn.com, jeff debonis <76554.133 at compuserve.com>, jay
coughlan , jason vest ,
j orlin grabbe , david sobel ,
Cindy at McGlashan.com
Tuesday 7/7/98 7:28 AM
John Young
I am reading http://www.jya.com/pdj10.htm
FBI agents Perez, Rodrigues, and Silva warned us about the crooked
judges at the appellate level.
The FBI blackmailed Perez, Rodrigues, and Silva into a cheap settlement
of their race discrimination lawsuit win in Lucius Bunton's West Texas
court.
They all lost money. And all got divorced.
Perez is a buddy of Morales and Gonzales.
Gonzales and Armenta are buddies of Silva.
Hugo Rodrigues moved to Florida.
This information is VERY VALUABLE to Morales and me.
It shapes our response to the two letters from the Tenth I put
in the mail to you yesterday.
NO FUTURE IN ARGUING POINTS OF LAW WITH CROOKED JUDGES.
bill
Counterfeiting Wiegand Wire Access Credentials
Bill Payne
October 16,1996
Abstract
Wiegand wire access credentials are easy and
inexpensive to counterfeit.
Access Control & Security Systems Integration magazine, October
1996 [http://www/securitysolutions.com] published the article,
Wiegand technology stands the test of time
by PAUL J. BODELL, page 12
Many card and reader manufacturers offer Wiegand (pronounced
wee-gand) output. However, only three companies in the
world make Wiegand readers. Sensor Engineering of Hamden
Conn., holds the patent for Wiegand, and Sensor has licensed
Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
Germany, to manufacture Wiegand cards and readers. ... A
Wiegand output reader is not the same thing as a Wiegand
reader, and it is important to understand the differences.
In brief, Wiegand reader use the Wiegand effect to
translate card information around the patented Wiegand
effect in which a segment of a specially treated wire
generates an electronic pulse when subjected to a specific
magnetic field. If the pulse is generated when the wire is
near a pick-up coil, the pulse can be detected by a circuit.
Lining up several rows of wires and passing them by a cold
would generate a series of pulses. Lining up two rows of
wires - calling on row "zero bits" and the other "one bits"
- and passing them by two different coils would generate two
series of pulses, or data bits. These data bits can then be
interpreted as binary data and used to control other
devices. If you seal the coils in a rugged housing with
properly placed magnets, and LED and some simple circuitry,
you have a Wiegand reader. Carefully laminate the special
wires in vinyl, and artwork, and hot-stamp a number on the
vinyl, and you have a Wiegand card.
IN THE BEGINNING
Wiegand was first to introduce to the access control
market in the late 1970s. It was immediately successful
because it filled the need for durable, secure card and
reader technology.
Embedded in the cards, Wiegand wires cannot be altered or
duplicated. ...
Bodell's Last statement is incorrect.
Tasks for EASILY counterfeiting Wiegand wire cards are
1 Locate the wires inside the card to read the 0s and 1s.
2 Build an ACCEPTABLE copy of the card.
Bodell's clear explanation of the working of a Wiegand card can
be visualized
zero row | | |
one row | |
binary 0 1 0 0 1
representation
Solutions to Task 1
A X-ray the card
B MAGNI VIEW FILM, Mylar film reads magnetic fields ...
Edmunds Scientific Company, catalog 16N1, page
205, C33,447 $11.75
is placed over the top of the Wiegand card.
COW MAGNET, Cow magnetics allow farmers to trap metal in the
stomachs of their cows. Edmunds, page 204, C31,101 $10.75
is placed under the card.
Location of the wires is easily seen on the green film.
Mark the position of the wires with a pen.
Next chop the card vertically using a shear into about 80/1000s
paper-match-sized strips.
Don't worry about cutting a wire or two.
Note that a 0 has the pen mark to the top. A 1 has the pen mark
at the bottom.
Take a business card and layout the "paper match"-like strips to
counterfeit the card number desired.
Don't worry about spacing. Wiegand output is self-clocking!
Tape the "paper-match - like" strips to the business card.
Only the FUNCTION of the card needs to be reproduced!
History
Breaking electronic locks was done as "work for others" at Sandia
National Laboratories beginning in 1992 funded by the Federal
Bureau of Investigation/Engineering Research Facility, Quantico,
VA.
The FBI opined that this work was SECRET/NATIONAL SECURITY
INFORMATION.
Details of the consequences of this work are covered in
Fired Worker File Lawsuit Against Sandia
Specialist Says He Balked When Lab Sought Electronic
Picklock Software, Albuquer Journal, Sunday April 25, 1993
State-sanctioned paranoia, EE Times, January 22, 1996
One man's battle, EE Times, March 22, 1994
Damn the torpedoes, EE Times, June 6, 1994
Protecting properly classified info, EE Times, April 11,
1994
DOE to scrutinize fairness in old whistle-blower cases,
Albuquerque Tribune, Nov 7 1995
DOE boss accelerates whistle-blower protection, Albuquerque
Tribune, March 27, 1996
DOE doesn't plan to compensate 'old' whistle-blowers with
money, Albuquerque Tribune September 27, 199
From zida27 at aol.com Tue Jul 7 07:26:27 1998
From: zida27 at aol.com (Your Home Town)
Date: Tue, 7 Jul 1998 07:26:27 -0700 (PDT)
Subject: Your Home Town Provides Everything You Need
Message-ID: <19980706199GAA18653@base.staffs.ac.uk>
YOUR HOME TOWN
WILL DO 100% OF THE WORK FOR YOU
WE OFFER:
You the chance to own your own Home Based Business.
WE OFFER:
To build your Home Based Business for you.
WE OFFER
You financial independence.
WE OFFER:
You life saving and life changing products.
WE OFFER:
You the easiest way we know to, improve your Health, your
Wealth and your Happiness.
For more information Call:
Our toll free 24 hr message center at 888-771-9338
Our toll free 24 hr recorded message at 888-771-9340.
Reference # 1007698
our research showed you would be interested in this
subject. If this is not true and you would like to be
removed from our data base please call 888-771-9338
and leave your e-mail address for removal. Thank You.
From rah at shipwright.com Tue Jul 7 07:40:04 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Tue, 7 Jul 1998 07:40:04 -0700 (PDT)
Subject: IP: "CyberCash can't oust credit cards"
In-Reply-To:
Message-ID:
At 8:47 AM -0400 on 7/7/98, Arnold G. Reinhold wrote:
> Three orders of magnitude cost reduction as compared to what? I can
> believe that much improvement over running my credit card thru an imprinter
> and processing the paper slip.
Yes. SSL and HTML does that to paper, even telephone, credit card
transactions. As long as you're using the net anyway. :-).
> But I doubt you can get anything like1000X
> over SET, ugly as it is.
Actually, it's *SET's* burden to proove that it's 1000X cheaper (including
the cost of fraud) than SSL, the status quo ante of internet payment
systems.
I don't think SET is cheaper, much less three orders of magnitude cheaper,
than SSL.
Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
July 23-24, 1998:
From jya at pipeline.com Tue Jul 7 08:17:39 1998
From: jya at pipeline.com (John Young)
Date: Tue, 7 Jul 1998 08:17:39 -0700 (PDT)
Subject: US to Ease Crypto Export
Message-ID: <199807071517.LAA25263@dewdrop2.mindspring.com>
7 July 1998
Source:
http://www.washingtonpost.com/wp-srv/WPlate/1998-07/07/064l-070798-idx.html
Thanks to FT
U.S. to Ease Limits on Export of Data-Scrambling Technology
By Elizabeth Corcoran
Washington Post Staff Writer
Tuesday, July 7, 1998; Page E04
Commerce Secretary William Daley plans to announce today
that the government will give U.S. software companies new
freedom to export their most sophisticated data-scrambling
technology to financial institutions chartered in 45 countries,
according to Clinton administration sources.
Under the new rules, which officials said are likely to take
effect in late summer, eligible banks, securities firms,
brokerage houses and credit-card companies will need to
receive approval only once from the Commerce Department
before they can license the most sophisticated "encryption," or
data-scrambling, technology.
Once they receive approval, those institutions will be
permitted to share the technology with any of their branch
offices, except for those located in terrorist states.
Government sources estimate that the new rules will include
about 70 percent of the world's banks, including the 100
largest (ranked by assets).
For years, the government has closely regulated export of
encryption software, on the grounds that terrorists or hostile
governments might use it to cloak their communications. The
software industry argues that the rules are unworkable and
unfairly block foreign sales. Unfriendly parties wanting to use
encryption already can obtain it overseas, industry executives
said.
The new rules on banks are "a move in the right direction,"
said one industry executive familiar with the regulations. "But
we're still leaving some groups out. Basically, we need to keep
spreading the circle wider," to include the growing number of
businesses offering financial services, such as insurance
companies.
"What we've heard sounds great," said Kawika Daguio, a
lobbyist for the American Bankers Association. "We've been
arguing [for several years] that the regulatory structure we
have guarantees we're good citizens" who wouldn't make illicit
use of the technology, he said.
Now the government appears to have agreed.
Current regulations require that U.S. companies apply for
permits before exporting anything but the simplest versions of
encryption products. To export more sophisticated
technology, organizations must have a plan for creating
so-called "spare keys." That way, law enforcement officials
who have obtained a court order would be able to unlock the
information.
In May 1997, the Commerce Department said it would not
restrict the sophistication of the data-encryption technology
sold to financial institutions. But it required spare keys and
case-by-case licensing. Approvals have been slow. Now the
government is doing away with the key requirement, defining
more precisely which financial institutions qualify and pledging
to end case-by-case approval.
Because of concerns about money laundering, the government
will grant the new permission only to financial institutions
chartered in countries that have agreed to take steps against
money-laundering. If U.S. companies want to sell to financial
institutions chartered in other countries, they will have to
apply for licenses from the Commerce Department.
Such provisions still fall short of the demands of U.S.
companies. "To take a piecemeal approach [to loosening
encryption restrictions] is the wrong direction," said Ed
Gillespie, executive director of Americans for Computer
Privacy, a lobbying group. "We need a blanket lifting of
restrictions with individual prohibitions," such as bans on
sending such technology to terrorist states, he said.
In a related development, a federal court in Ohio ruled on
Friday that posting the text of an encryption program on the
Internet, where people all over the world could see it, was not
protected by the constitutional right to free speech.
The ruling, made late Friday, contradicts a ruling made by a
California district court last August. Privacy advocates predict
that the issue will be taken up by the U.S. Supreme Court.
� Copyright 1998 The Washington Post Company
From CTIA_Daily_News at um2.unitymail.com Tue Jul 7 09:13:58 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Tue, 7 Jul 1998 09:13:58 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 7, 1998
Message-ID: <199807071605.LAA11317@mailstrom.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon / attachment
for the most important news in wireless communications today.
=============================================
From info at homebusinesscentral.net Tue Jul 7 09:56:42 1998
From: info at homebusinesscentral.net (info at homebusinesscentral.net)
Date: Tue, 7 Jul 1998 09:56:42 -0700 (PDT)
Subject: MAKE MORE MONEY ONLINE
Message-ID: <199807071656.JAA23629@toad.com>
Dear Friend and Internet Entrepreneur,
Discover little known ways of how to promote virtually any product,
service or idea online and see income within 24 hours. Guranteed!
It's finally here!
**ALL NEW** E-Mail Marketing Home Study Course reveals
how to use responsible, targeted, e-mail marketing in your business
to boost Web site traffic, generate leads, sell products, and make
more sales online.
Learn totally new information about how to e-mail your sales message to
prospects and sell your products and services online without getting flamed.
Discover detailed techniques for using opt-in marketing,
compiling mailing lists, the secrets of writing ad copy, and much more.
You will learn:
How to create targeted e-mail lists of prospects who
are as much as 5 times more responsive than names you can rent or buy.
Discover which e-mail management and sending software is best.
(And Receive A FREE 10 Day Trial Version Of The Best One)
Discover which teaser ads and subject lines get your mail opened and
responded to quickly.
How to use e-mail to generate qualified traffic to a Web site.
And Much Much More....
You will receive an extensive step by step
course guiding you every step of the way!
Plus as part of this national marketing test if you ACT NOW! you are
going to receive as a bonus gift:
"The Secrets To Successful Search Engine Submission" Audio series
Learn how to get on top and stay on top!
"I generated 19 brand new paying customers in less than a week with this
course" Thank You
To learn more about this exciting course please visit us at
http://www.homebusinesscentral.net/emarket.html
This is a very limited offer, so act now!
To be removed from this list please respond with "remove" in
the subject field
World Tek Inc.
7210 Jordan Ave.
Canoga Park CA. 91303
1-818-718-9429
From bill.stewart at pobox.com Tue Jul 7 10:07:12 1998
From: bill.stewart at pobox.com (bill.stewart at pobox.com)
Date: Tue, 7 Jul 1998 10:07:12 -0700 (PDT)
Subject: Private-enterprise wiretapping
Message-ID: <3.0.5.32.19980707100633.0090d580@popd.ix.netcom.com>
STOLEN NUMBERS -- [New York Times, p. 31, 7/5.]
Federal investigators said the scam was ingenious in its simplicity:
Five people in New York City would tap into public pay phones at major airports
across the country, then steal calling-card numbers
punched in by unsuspecting travelers. The scheme ended last month
with the arrests of four men and one woman. But the case is
only the latest machination in a $4-billion-a-year telephone fraud
industry that keeps reinventing itself. "This is something we have
not seen before," said Boyd Jackson [of] network security at AT&T,
one of the industry experts who helped Federal investigators on
the case. "And there is nothing I am aware of that customers can do
to fully protect themselves." The Secret Service was tipped off
by AT&T, Bell Atlantic and MCI after they received an unusually
high number of complaints from customers who had recently used
their calling cards in airports.
[Also San Jose Mercury News, 1C; Rocky Mountain News, 33A; Sun-Sentinel, 3A, 7/4.]
From caj at math.niu.edu Tue Jul 7 10:53:49 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Tue, 7 Jul 1998 10:53:49 -0700 (PDT)
Subject: Junger et al.
In-Reply-To:
Message-ID:
On Tue, 7 Jul 1998 mgraffam at mhv.net wrote:
> Indeed.. what we need is for someone to testify to the court about
> natural and computer language, and maybe some relevent material from
> information theory.
What we need, IMO, is a well-placed stunt or two.
On sci.crypt a while ago I mentioned that if perl-RSA got
any smaller, one could make it the *subtitle* of one's next
book: "Blah blah blah: what ``/usr/bin/perl blah blah blah
...'' means."
The result would be a book, with book-like 1st amendment
protections, but which would turn ONLINE library card
catalogs into online repositories for strong crypto. Need RSA?
Look up the book, cut and paste into a shell. Ta Daaaa!
You're an evil terrorist.
The point of this is to drive home the fact that while
source code is something that *does* (i.e., a device),
it's also something that *says*. It's information, even
if executable information, and cannot be dispatched as
easily as a gun or a bomb. Should the government attempt
to declare a book title a munition, it'll fer sure end up
in CNN fringe.
> Pseudo-code from any computer programming textbook would be helpful
> in making this point too.
You'd need to prove it easily runnable. What's the tech
status of OCR via, say, a minicam? If you could just
hold a page of _Applied Crypto_ up to your computer and
have it gleen C source (much easier than gleening English),
It'll demonstrate the fuzziness of these things (again, IMO)
in much starker terms than would just using a scanner.
Another project would be to collect all our number theory
and abstract algebra books, and type in verbatim the sections
on RSA. These usually contain instructions somewhere between
pseudocode and conversational English. If someone could
for a Masters thesis develop a program capable of reading
that stuff...
-Caj
From Cindy at mcglashan.com Tue Jul 7 11:15:45 1998
From: Cindy at mcglashan.com (Cindy Cohn)
Date: Tue, 7 Jul 1998 11:15:45 -0700 (PDT)
Subject: Junger decision
Message-ID: <199807071759.KAA28716@gw.quake.net>
For those who haven't yet heard,
Judge Gwin in the District Court in Ohio has granted the government summary
judgment in the Junger case. Judge Gwin apparently agreed with the
government that the "functionality" of encryption source code, and the
government's claims that it only intends to regulate that "functionality"
mean that the regulations are not "narrowly and directed at expressive
conduct" and so do not merit prior restraint analysis. The Judge then held
that the regulations were content neutral, applied the intermediate scrutiny
tests and found that the export restrictions meet those tests.
I haven't had the opportunity to review the decision yet. As soon as I
have, I will post some brief comments.
Still no decision from the 9th Circuit in Bernstein.
Cindy
******************************
Cindy A. Cohn, Cindy at McGlashan.com
McGlashan & Sarrail, P.C.
177 Bovet Road, 6th Floor
San Mateo, CA 94402
(650) 341-2585 (tel)
(650) 341-1395 (fax)
From johnl at iecc.com Tue Jul 7 11:20:03 1998
From: johnl at iecc.com (John R Levine)
Date: Tue, 7 Jul 1998 11:20:03 -0700 (PDT)
Subject: IP: "CyberCash can't oust credit cards"
In-Reply-To:
Message-ID:
> >2. Three orders of magnitude cost reduction.
CyberCash's entire business model for e-cash is wrong. They ask for a 4%
slice of each transaction, which is absurd. How much do issuers of real cash
ask per transaction? Zero, of course.
As I've mentioned before, the way you make money with money is seignorage,
that is you print it and make your profit on the float and on coins that are
never redeemed. Works great for travellers checks. I suspect that Bob H.
would agree.
Regards,
John Levine, johnl at iecc.com, Primary Perpetrator of "The Internet for Dummies",
Information Superhighwayman wanna-be, http://iecc.com/johnl, Sewer Commissioner
Finger for PGP key, f'print = 3A 5B D0 3F D9 A0 6A A4 2D AC 1E 9E A6 36 A3 47
From root at ssds.com Tue Jul 7 11:29:21 1998
From: root at ssds.com (Jim Burnes)
Date: Tue, 7 Jul 1998 11:29:21 -0700 (PDT)
Subject: Junger et al.
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359C@mvs2.teralogic-inc.com>
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Mon, 6 Jul 1998, Ernest Hua wrote:
> I think we are in violent agreement here ...
>
> Except that it seems odd that speech is no longer 1st amendment
> protected as soon as it can be interpreted by a machine to do something.
> So, then, if I want to deny you first amendment protections for
> something, I can simply write a compiler to turn your words into machine
> executable code, and suddenly, your words are no longer protected
> speech. How could that be a reasonable interpretation of functional
> versus not?
>
Obviously there is no difference between 10 lines of PERL and
1500 lines of assembler (or machine code). Executability is in the
eye of the beholder. I can create an interpreter to execute english
(and in fact have done so in LISP). Does that mean english is no longer
protected?
By the same argument, DNA is also a device. The federal government
can now determine who you can reproduce with. (eugenics?)
DNA strands are instructions, code if you will, that describe to
cellular automata (literally ;-), how to (1) create a human being
(that could be dangerous -- they've been known to kill) and
(2) through fantastic complexity generate a fully functioning
human being, with all the behavioral patterns and biological
operations necessary to sustain said human being.
Imputing "deviceness" to code is missing the point. There is
"deviceness" in all information. It just depends on the context.
I would argue that it is specifically this "deviceness" that is protected
in the first amendment. Speech isn't just about yammering on about
abstract concepts. The imperative form of speech is probably the
most necessary to protect in a free society.
The most sacred form of democratic speech is probably the
vote. Does it contain "deviceness"? Absolutely. The vote
is democratic force.
Is it not protected speech?
Speech in action is code in action. When they can make code
illegal, they can make comittees to un-elect illegal and they
can make talking about impeaching the president illegal.
Think about that.
PostScript: It seems its not so much speech they don't like.
They don't like us talking to our computers, because there are
some things that computers do that are very powerful. Maybe
more powerful than the state can handle.
In other words, I can tell Jan Hammer in Germany exactly how
to do what PGP does. It might take him an infinity to actually
do it, but that speech is protected. When I tell Jan's computer
how to do it, its illegal.
So speech is ok as long as its ineffective. If it can actually
effect change then its illegal.
Interesting notion of free speech.
jim
-----BEGIN PGP SIGNATURE-----
Version: PGP 5.0i
Charset: noconv
iQA/AwUBNaJpoulhVGT5JbsfEQJU/gCgziy0U50OJXycwYNZPd4XsUuQfP8An3NY
BiWWWH8zvcvdVgKf2AM9ANu6
=6abs
-----END PGP SIGNATURE-----
From nobody at REPLAY.COM Tue Jul 7 11:41:03 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 7 Jul 1998 11:41:03 -0700 (PDT)
Subject: Junger et al.
Message-ID: <199807071841.UAA18158@basement.replay.com>
Nevermind that source code is suppose to be "human readable" material that
is _translated_ into function instructions of machine code.
A play is normally considered 'protected' free speech under US law, but
what if robot was created which acted out the play and Gwin's argument was
extended to apply the situtation where a play performed. Would the play
itself no longer be a protected form of free speech, because it is seen as
"functional" instructions to the robot actor? Would the playwrite become
responsible for the robot's actions, such as killing a character/actor?
As a programmer, I have "acted out" source code myself, as part of the
debugging process. It is normally called "a walkthrough," so the difference
between source code and a play is not as broad as some people may view it.
I have followed the source code like a script, acting out the instructions
like stage directions in a play.
Does it matter who might 'read' the material, in regards to the protection
of free speech? Whether it is written so that Russians or computers might
be able to read it? If source code is written on a napkin, it can be
currently exported, but what if tomorrow a vendor announces a 'napkin
computer' which can directly read from napkins akin to a super-low densiy
floppy disc.
At 07:20 PM 7/6/98 -0700, Ernest Hua wrote:
>Did anyone demonstrate the "functionalness" of any arbitrary language
>via a scanner and a compiler?
>
>Why doesn't Gwin understand that the moment one successfully claims that
>a specific class of source code is not speech by the virtue of the fact
>that a compiler can transform it automatically into executable code
>which performs a function, then ANY speech of ANY sort is fundamentally
>vulnerable to being classified as functional as soon as a compiler can
>transform it into real machine code.
>
>Ern
>
> -----Original Message-----
> From: jkthomson [SMTP:jkthomson at bigfoot.com]
> Sent: Monday, July 06, 1998 7:12 PM
> Reuters
>
>3:40pm 6.Jul.98.PDT WASHINGTON -- A district court has dismissed a law
>professor's challenge to US regulations strictly limiting the export of
>computer data-scrambling technology.
>
>Judge James Gwin ruled late Friday that the export limits, which prevented
>Case Western Reserve University Law School professor Peter Junger from
>posting the text of encryption programs on the Internet, did not violate
>the constitutional right to free speech.
>
>The Ohio court's ruling contradicts a California district court ruling last
>August that said source code -- the instructions a person writes telling
>the computer what actions to perform -- constitutes a form of speech
>subject to First Amendment protection.
>
>"Unlike instructions, a manual or a recipe, source code actually performs
>the function it describes," Gwin wrote. "While a recipe provides
>instructions to a cook, source code is a device, like embedded circuitry in
>a telephone, that actually does the function of encryption."
From nobody at REPLAY.COM Tue Jul 7 12:27:01 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 7 Jul 1998 12:27:01 -0700 (PDT)
Subject: A note on the latest randomness quarrel
Message-ID: <199807071927.VAA23471@basement.replay.com>
* Never use "the lowest few bits" or (t1>t2)?1:0 for the actual random
number generation.
You only use things like that for estimating the amount of entropy in a
source. The number of bits of entropy in a pile of bits is one more than
the base-two logarithm of the average number of guesses required of a
badguy knowing your condidtioning routine, observing what it can, and
interfering with your generator to figure out the value of the bits in the
pile, so if your studies and statistical analyses estimate that it
requires 2^127 guesses to guess the output of your conditioning routine,
good for you, you've estimated that somewhere in its input are 128 bits of
entropy.
Um, I digress...point is, don't use that output straight. Take twice as
much unconditioned input, non-random-looking stuff and all, as you
estimate your conditioning routine needs to produce a key's worth of
entropy and _hash_it_. Your conditioning routine can introduce some little
bias you didn't see or make some unnoticed mistake that lets through
predictable bits. Hashing can, too, but we've studied the hash functions
to make sure they're good a lot more than we've studied your conditioning
procedure.
* A badguy's introduction of extra events doesn't poison your randomness.
A badguy could introduce a multitude of predictable-but-random-looking
events to make your generator close shop before it has enough
unpredictable events to get its entropy. However, that only works if extra
events make your generator stop collecting earlier. The amount of time it
spends collecting randomness shouldn't depend on _any_ output of the
generator, because that needlessly leaks entropy.
Also, a badguy could introduce two nearly-simultaneous events near the
beginning of the process, when it can be fairly sure that the wait between
its events and the previous event will make a zero or make the lowest few
bits of the delay between the bits match a certain value. (Interpreting
that sentence is left as an exercise to the reader :) However, you can
only do this in a system where your conditioning routine allows extra
events to cause the routine to output bad bets. However, if you hash your
raw data rather than using one of those conditioning routines, it's nearly
-- nearly, that's your cue to say it has to be always -- impossible to
weaken the output without knowing the other data hashed.
Third, el badguy could introduce so many events that the gap between
events was always less than the measurement threshhold. However, note that
the Geiger counter, the computer, and the operator would all fail under
these circumstances.
Therefore, pretty much any strategy allowing extra events to kill entropy
is flawed.
================================================================================
/// anonymous : nobody at replay.com : http://replay.com ///
================================================================================
From stuffed at stuffed.net Tue Jul 7 13:36:45 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Tue, 7 Jul 1998 13:36:45 -0700 (PDT)
Subject: Kings & Queens/George Michael/Knocked up with NyQuil
Message-ID: <19980707193242.4256.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 252 bytes
Desc: not available
URL:
From jya at pipeline.com Tue Jul 7 14:04:16 1998
From: jya at pipeline.com (John Young)
Date: Tue, 7 Jul 1998 14:04:16 -0700 (PDT)
Subject: US to Ease Crypto Export
In-Reply-To: <199807071517.LAA25263@dewdrop2.mindspring.com>
Message-ID: <199807072104.RAA13648@dewdrop2.mindspring.com>
There's a bit more on this from the Dept of Commerce.
A press release that outlines the new policy and
lists the 45 select countries:
http://jya.com/doc-ease.htm
Secretary Daley's speech today on broad export policy
that touches on the crypto relaxation:
http://jya.com/daley-expo.htm
BXA Under Secretary Reinsch's speech today:
http://www.bxa.doc.gov/press/98/BillUPDS.html
The specific guidelines for easing of controls have not
yet been issued, as far as we can learn.
--------
The Junger decision is being scanned, later this evening
Peter will announce it.
From nobody at REPLAY.COM Tue Jul 7 16:32:49 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 7 Jul 1998 16:32:49 -0700 (PDT)
Subject: Apology
Message-ID: <199807072332.BAA17497@basement.replay.com>
Might have just posted a message intended for coderpunks to the list,
depending on whether toad still forwards. Sorry.
From billp at nmol.com Tue Jul 7 18:07:45 1998
From: billp at nmol.com (bill payne)
Date: Tue, 7 Jul 1998 18:07:45 -0700 (PDT)
Subject: thinking about you and http://www.qainfo.se/~lb/crypto_ag.htm
Message-ID: <35A2C56C.6A03@nmol.com>
Tuesday 7/7/98 6:57 PM
Laszlo Baranyi
You DID NOT mention the Swiss radio international radio broadcasts.
http://www.qainfo.se/~lb/crypto_ag.htm
Rep McKinney and Sen Grassley now have copies.
Send me a snail mail address and I will send you a copy.
Using postcard, of course
pob 14838
abq, nm 87191
usa
Gustavus J Simmons
Cryptanalysis and Protocol Failures
COMMUNICATIONS OF THE ACM, November 1994, vol 37, no 11, page 56
The 'spiking' story, in obscure language.
Simmons and R J Hanson http://sina.tcamc.uh.edu/~haskell/rjh/rjhres.html
were two of the most responsible people for me coming to Sandia from
Washington State U.
Here are two of my former Ph.D. students in computer science from wsu.
http://www.mhpcc.edu/general/john.html
http://www.friction-free-economy.com
NSA employee PAUL BRIDGE in about 1987 told me that Simmons was a
security risk and that I should not talk to Simmons.
In about 1992 I figured out something was fishy and began to talk to
Simmons again.
Simmons told me that he asked NSA employees Morris and Proto
1 NSA is sorry it delegated responsibility for implementation
of electronic locks in the us nuclear arsenal to Sandia.
2 NSA wants the business back.
Simmons told me neither Morris or Proto would respond to his question.
Let's ALL http://www.wpiran.org/ hope for settlement of this
UNFORTUNATE MESS.
bill
From listmaster at extensis.com Tue Jul 7 18:54:17 1998
From: listmaster at extensis.com (listmaster at extensis.com)
Date: Tue, 7 Jul 1998 18:54:17 -0700 (PDT)
Subject: Announcing Extensis Preflight Pro 2.0
Message-ID:
The Award-Winning, Preflighting Tool from Extensis Just Got Better.
http://www.extensis.com/products/pfp2/
� New! Now supports all major graphics applications!
� Inspect, correct and collect print jobs for perfect prepress delivery.
� Advanced features include profiles, PDF creation, and AppleScript Automation.
� FREE! 5 free copies of Collect Pro 2.0 with each copy of Preflight Pro 2.0!
In May, Preflight Pro 1.0 received the 1998 Apple Design Award for
Best Look and Feel.
Just wait 'til they try 2.0.
The best just got better.
Extensis Preflight Pro is a comprehensive preflight solution designed
to save prepress professionals significant time, money and materials.
Preflight Pro inspects your documents and corrects problems to ensure
they are error-free prior to printing.
With an interface that mimics the traditional prepress workflow,
Preflight Pro 2.0 provides you with a familiar environment to efficiently
review files prior to printing. Further, Preflight Pro now supports
documents in all the major graphics applications including Adobe
PageMaker, Illustrator, Photoshop, QuarkXPress, Macromedia FreeHand,
and Multi-Ad Creator2.
New in Preflight 2.0 is the capability to automate the preflight
process. Based on your custom settings for pass/fail, Preflight Pro
uses 'watch folders' to determine which files are complete and ready
for printing. Users can set the automation window for tasks, such as
collecting a job or running an AppleScript.
For greater utility, Preflight Pro now includes 5 free copies of
Collect Pro 2.0. Give Collect Pro to any creative professional you
work with to help them perfectly collect a job for hand-off to the
prepress house. Collect Pro eliminates the problems of missing file
information that can delay a job.
Extensis Preflight Pro 2.0 will dramatically streamline your preflight
workflow, saving you time, materials, headaches and money.
In the world of preflighting, the best just got better.
Introducing your Extensis PREFLIGHT SPECIALIST! For personal service
or for more information, please contact your Preflight Specialist at
(503) 274-2020 Ext. 167 or email to: mmoragne at extensis.com .
For more information, to order, or to download a FREE, 30-day demo of
Extensis Preflight Pro, please visit our web site at
http://www.extensis.com/products/pfp2/
Or call at (800) 796-9798 or (503) 274-2020.
* Preflight Pro is available for Macintosh users for $399.95
(includes 5 free copies of Collect Pro 2.0).
* Special Extensis Customer Offer: Buy Preflight Pro for only $349.95
(SAVE $50! Includes 5 free copies of Collect Pro 2.0).
* Special Upgrade Offer for PreFlight Pro 1.0 owners: Upgrade to
Preflight Pro 2.0 for only $99.95 (SAVE $300! Includes 5 free copies
of Collect Pro 2.0).
Preflight Pro 2.0 and Collect Pro 2.0 are compatible with
QuarkXPress 3.31 or later, including QuarkXPress 4.0, Adobe
PageMaker 6.5 and later, Adobe Illustrator 5.5 and later,
Adobe Photoshop 3.0.4 and later, Macromedia FreeHand 5.5 and later,
and Multi-Ad Creator2 version 1.0.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PS. We have made every effort to ensure this message is being sent
only to people who have expressed interest in Extensis products.
If we have sent this to you in error, please accept our apologies
and reply with REMOVE in the subject line for automatic exclusion
from future communications. If you know someone who would like to
be on our mailing list have them send an email to
listmaster at extensis.com with ADD in the subject line and their email
address in the body.
From rah at shipwright.com Tue Jul 7 19:16:11 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Tue, 7 Jul 1998 19:16:11 -0700 (PDT)
Subject: IP: "CyberCash can't oust credit cards"
In-Reply-To:
Message-ID:
At 2:19 PM -0400 on 7/7/98, John R Levine wrote:
> CyberCash's entire business model for e-cash is wrong. They ask for a 4%
> slice of each transaction, which is absurd. How much do issuers of real cash
> ask per transaction? Zero, of course.
>
> As I've mentioned before, the way you make money with money is seignorage,
> that is you print it and make your profit on the float and on coins that are
> never redeemed. Works great for travellers checks. I suspect that Bob H.
> would agree.
Pretty much. Actually, the model I like is one where transactions on the
net are free, but putting money *on* the net costs some smidge of money,
just like buying traveller's checks cost money, something like one or two
percent, I think.
You can't get any network effects, oddly enough, if you charge to take it
*off* the net, because merchants have to *pay* to participate. It would be
as if you had to pay to redeem a traveller's check. If that were the case
nobody would accept them. Pretty serious seignorage loss that would cause.
:-).
Again, I've a white paper on this. If anyone's interested, I'll send it to
them offline. And, again, the dbs list folks have already seen it. :-).
Speaking of gratuitous plugs ;-), there are only two more days until I
close the subscription book on the symposium, and I still have some room.
See and register now, if you
want to go.
Cheers,
Bob
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
July 23-24, 1998:
From webmaster at nudevision.com Tue Jul 7 20:12:57 1998
From: webmaster at nudevision.com (webmaster at nudevision.com)
Date: Tue, 7 Jul 1998 20:12:57 -0700 (PDT)
Subject: FREE XXX VIDEO for your site !!
Message-ID: <03024203507064@nudevision.com>
Thats right FREE XXX VIDEO for your website....
- increase traffic
- increase banner sales
- BOOST your profit
- Can be used by FREE SITE and PAY SITES
FREE SITE webmasters go to http://free.nudevision.com
MEMBERSHIP SITE webmasters go to http://www.nudevision.com/webmasters/index.htm
We are offering PAY SITE website webmasters 90 MINUTE FULL LENGTH MOVIES which
means SALES SALES SALES !!
EARN 10 BUCKS A RAW CLICK AND GET FREE TRAFFIC !!
"WHAT? Are you guys nuts?"
Well maybe a little..... go to http://www.traffictraders2.com for
more details.
GAY SITE webmasters click here: http://www.studvision.com/webmasters/index.html
Best Regards,
The Cytron Gang
Cytron Technologies Ltd.
Cytron Communications Ltd.
From mok-kong.shen at stud.uni-muenchen.de Wed Jul 8 01:26:34 1998
From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen)
Date: Wed, 8 Jul 1998 01:26:34 -0700 (PDT)
Subject: Junger et al.
In-Reply-To: <199807071841.UAA18158@basement.replay.com>
Message-ID: <35A32D1C.C9CE9598@stud.uni-muenchen.de>
Anonymous wrote:
> Does it matter who might 'read' the material, in regards to the protection
> of free speech? Whether it is written so that Russians or computers might
> be able to read it? If source code is written on a napkin, it can be
> currently exported, but what if tomorrow a vendor announces a 'napkin
> computer' which can directly read from napkins akin to a super-low densiy
> floppy disc.
Put the source code on a neuro-disk and you can export it under
any crypto law that can ever be invented till eternity.
M. K. Shen
From StanSqncrs at aol.com Wed Jul 8 02:05:26 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Wed, 8 Jul 1998 02:05:26 -0700 (PDT)
Subject: New Page!
Message-ID: <634411ef.35a3361e@aol.com>
I made another page, which details what Capital records did to Dark Side of
the Moon when they reissued on cd. Guess what they covered-up. :-) Check it
out,
Stan,
The Desecration of 'The Dark Side of the Moon'
http://members.tripod.com/StanSqncrs/DarkSide/darkside.html
From mgraffam at mhv.net Wed Jul 8 02:43:42 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Wed, 8 Jul 1998 02:43:42 -0700 (PDT)
Subject: Junger et al.
In-Reply-To: <35A32D1C.C9CE9598@stud.uni-muenchen.de>
Message-ID:
On Wed, 8 Jul 1998, Mok-Kong Shen wrote:
> Put the source code on a neuro-disk and you can export it under
> any crypto law that can ever be invented till eternity.
Maybe.. or we'll all be outlaws.. one of the two.
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"86% of conspiracy theories have some basis in truth... but, oddly enough,
it's that last 14% that usually gets you killed."
--Talas (http://cadvantage.com/~algaeman/conspiracy/public.htm)
From aba at dcs.ex.ac.uk Wed Jul 8 03:32:02 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Wed, 8 Jul 1998 03:32:02 -0700 (PDT)
Subject: RSA in perl illegal to export (Re: Junger et al.)
In-Reply-To:
Message-ID: <199807081004.LAA13983@server.eternity.org>
Jim Burnes writes:
> Obviously there is no difference between 10 lines of PERL and
> 1500 lines of assembler (or machine code).
One of Peter Junger's examples (I think used in the case) is the RSA
in 2/3 lines. He actually obtained the US export administrations
written decisions on which of a small collection of titchy programs
was exportable. RSA in 3 lines of perl they stated was illegal to
export.
So fun things with RSA are possible because they have decided that it
is not exportable, so perhaps you could export it on a floppy, or as
your .signature, with media cameras rolling, and try to get yourself
arrested for willful violation of dumb export laws.
Adam
--
Have you exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: <199807081041.GAA16194@tana.mit.edu>
Bob Hettinga wrote:
> At 2:19 PM -0400 on 7/7/98, John R Levine wrote:
>
>
> > CyberCash's entire business model for e-cash is wrong. They ask for a 4%
> > slice of each transaction, which is absurd. How much do issuers of real
> > cash
> > ask per transaction? Zero, of course.
> >
> > As I've mentioned before, the way you make money with money is seignorage,
> > that is you print it and make your profit on the float and on coins that are
> > never redeemed. Works great for travellers checks. I suspect that Bob H.
> > would agree.
>
> Pretty much. Actually, the model I like is one where transactions on the
> net are free, but putting money *on* the net costs some smidge of money,
> just like buying traveller's checks cost money, something like one or two
> percent, I think.
>
> You can't get any network effects, oddly enough, if you charge to take it
> *off* the net, because merchants have to *pay* to participate. It would be
> as if you had to pay to redeem a traveller's check. If that were the case
> nobody would accept them. Pretty serious seignorage loss that would cause.
> :-).
Haven't you said in the past that the *consumer* can't be charged anything to
use the system in the way of fees (consumer being the party bringing money into
the system), and that all fees need to get charged to the merchant (or whoever
the party is who removes money from the system)?
Certainly, at first order, the fee *should* be on removing money from the
system, from a selfish point of view on the part of Ivan the Issuer -- if
you're making money on seignorage, you're making money when people add money
to the system *and leave it there*. Thus, you want to provide incentives for
people to buy money and leave it there -- charging no "on" fees and minimal
"off" fees would do it. To ensure that people have faith in the cheap
convertability of electronic cash to real money, you could provide a highly
regressive fee structure for taking money out of the system -- if people
end up only redeeming their stuff through middlemen in huge batches, the
fees will go down very fast, and so will your costs. The percentage cost
of shipping a billion dollars to a major customer in exchange for a billion
dollar token is much lower than shipping one billion one dollar bills to
a bunch of holders of one dollar tokens. (This is an argument for regressive
fees, not for charging out rather than in, since it would apply just as well
to those who bought a billion tokens and then resold them, of course)
>From a *technical* standpoint, it makes sense to design an electronic cash
system to allow cheap coin-for-coin exchanges. The marginal cost of a
transaction like this *is* 3 orders of magnitude less than one involving
a back-office system and wire transfer. *This* is why electronic cash is
3 orders of magnitude cheaper than existing systems. If you kludge a back
office system, a debit card system, and a wire transfer system onto the
backend, transactions going through that system don't get any cheaper than they
wold be in an unregulated traditional offshore bank. As an issuer, you want
as few back-office processed transactions as possible, and those you do have,
should be as large as possible.
A better example is the credit card, rather than the traveler's check. I've
*never* used a traveler's check, since I'm fundamentally annoyed by the idea
that I'd have to pay a fee to put my money into the system. The *vast*
majority
of consumers are unwilling to pay a fee to conduct a transaction they can
conduct in another way for free -- credit cards, cash, personal checks, wire
transfer, or whatever. Merchants *already* pay money to handle money -- it's
just another cost of doing business. For a merchant, processing *cash* costs
money, credit cards cost 1-4%, and I'm sure traveler's checks cost *something*
to handle. I think it's a fundamental principle of financial psychology that
the resistance in going from a free service to a slightly charged service is
far higher than even a much larger increase in a service that already costs
money.
I think the ideal fee structure for an electronic cash issuer is:
* No cost to exchange coin-for-coin. These cost you microcents anyway.
* Minimal (zero) cost to the public to issue cash. This could be done by
selling large blocks of tokens at cost to issuers who are already in contact
with the public, and who get some kind of tangible benefit from processing
the transaction for the customer -- a pre-existing banking relationship that
wants a value-add, a retail store, a web site with advertising, whatever.
Primary market cash issuing might have a highly regressive fee structure, to
force secondary markets to come into being, but this is not essential.
* Secondary market redemption costs which *also* go to zero due to many
players,
for the same reason as issuance. Primary market should charge enough to
recoup redemption costs (charge for the wire transfer, or whatever), and
potentially a regressive structure to help pay for operations costs.
Optionally, the issuer could link through a proprietary and cheap protocol
their own bank accounts to the redemption of cash, making it much cheaper for
customers of the issuer's bank to redeem cash. This is related to seignorage,
if these bank accounts are at the same bank which holds the backing accounts
for the currency.
A lot of people have discussed this fee structure, and I agree with them that
it is the best.
AFAIK, Mark Twain had a somewhat opposite fee structure, and look at how
successful they were...
This model is not really the credit card model (charge per transaction), nor
it is the traveler's check model. It is the *cash* model -- banks and cash
handling companies charge handling fees for dealing with large quantities of
paper bills. Think of user-to-user transactions as secondary market,
withdrawing cash from the bank as primary market withdrawal, and exchanging
electronic cash for fiat money as the (currently hypothetical) step of
redeeming bank notes for their backing, or something similar to taking physical
cash from retailer tills and getting it deposited to a cash management account.
It is electronic *cash*, after all.
--
Ryan Lackey
rdl at mit.edu
http://sof.mit.edu/rdl/
From rah at shipwright.com Wed Jul 8 05:17:29 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 8 Jul 1998 05:17:29 -0700 (PDT)
Subject: IP: "CyberCash can't oust credit cards"
In-Reply-To:
Message-ID:
At 6:41 AM -0400 on 7/8/98, Ryan Lackey wrote:
> Haven't you said in the past that the *consumer* can't be charged anything to
> use the system in the way of fees (consumer being the party bringing
>money into
> the system), and that all fees need to get charged to the merchant (or
>whoever
> the party is who removes money from the system)?
Nope, and, if I did, I was wrong. :-).
You probably can't bootstrap things on seignorage alone, I don't
think, but if you did, again, you would kill your digital
cash issue anyway, because of lack of merchant acceptance, especailly in
the early phases.
Note, in my canonical example, cash, that people already pay a fee for
"foreign" ATM withdrawls anyway, and people are used to doing things that
way. That's great, because I expect that margins on a net.ATM withdrawl
through an underwriter would be significantly higher than what a bank makes
on their non-customer ATM transactions. Three orders of magnitude cheaper?
I wouldn't be surprised.
> Certainly, at first order, the fee *should* be on removing money from the
> system, from a selfish point of view on the part of Ivan the Issuer -- if
> you're making money on seignorage, you're making money when people add money
> to the system *and leave it there*. Thus, you want to provide incentives for
> people to buy money and leave it there -- charging no "on" fees and minimal
> "off" fees would do it.
Yup. But, oddly enough, that was Mark Twain's (final) fee structure, too.
Didn't save them in the end, though.
I just think that if merchants are the key to acceptance of digital bearer
cash, much less fully anonymous blinded digital bearer cash :-), then you
shouldn't charge merchants anything to accept the stuff. If a merchant can
download a wallet or registerware free or very cheap, and instantly start
taking cash payments for whatever they sell over the net, and, when it came
time to take that cash and put it into their own bank it didn't cost them
anything to do it, then they would probably accept the stuff a heartbeat.
The cost of anything is the foregone alternative, three orders of
magnitude, and all that and "free" comes pretty close to three orders of
magnitude in cost reduction from merchant credit card fees in my book. :-).
The other beneficiary, in terms of cost, of course, is both the
underwriter, who's issuing cash for rediculously cheaper than a
corresponding volume of noncustomer.meat.ATM transactions would cost, not
to mention *some* seignorage :-), and the trustee, who's getting a share of
both for something they do already for the mutual fund and stock/bond
transfer markets.
I see seignorage as a tasty long-view source of income, certainly, but I
expect the half-life of a given dollar of digital cash to be measured in
days, if not hours, in the early stages. Frankly, I don't see seignorage
showing up significantly on the income statement of an underwriter until
there are other bearer instruments (stocks, bonds, and especially mutual
fund shares) to invest that cash in, keeping it on the net.
I think that that's one of the reasons that the Fed, among other people,
aren't too worried about the immediate macroeconomic effects of digital
cash. That and that the Fed's seignorage income, in the overall scheme of
Fed revenues, is pretty small, and probably dwarfed by other things like
printing and handling costs, etc. Greenspan himself is/was a free banking
advocate, certainly, and has said publically (see last September's Official
Cypherpunk Forbes issue :-)) that he thinks that private electronic
banknote issue is not a scary proposition at all.
Anyway, by the time that there are other digital bearer instruments out
there, and the money supply gets affected by digital cash seignorage, much
less fractional reserve accounts, (which *will* happen as competition heats
up and, someday even traveller's-check-type purchase premia on digital cash
will go away [*some*day!]), then the central bankers will have other things
to worry about besides just the impact if digital bearer settlement on
their money supply. Problems like why have *national* instead of private,
currencies, anyway. :-).
Nice problem to have, I figure.
Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
July 23-24, 1998:
From jya at pipeline.com Wed Jul 8 05:37:28 1998
From: jya at pipeline.com (John Young)
Date: Wed, 8 Jul 1998 05:37:28 -0700 (PDT)
Subject: Initial summary/analysis: Junger v. Daley
In-Reply-To:
Message-ID: <199807081237.IAA10722@camel7.mindspring.com>
Thanks to Greg for the excellent summary and analysis.
Responses by Peter Junger and his attorneys, those
involved with Bernstein and Karn, and others on the
technical and legal interpretation would be welcome.
On the interplay among the three cases: We have heard
that there was meeting in DC of the three teams with the
US side. And that there may have been a report on this
meeting at the recent DC security conference. Is there a
public report available?
Note: Greg meant to quote Judge Gwin on source code:
"all but *un*intelligible to most people."
The contrast between Patel and Gwin remind of the
campaign of Wassenaar members to claim relaxation
of crypto controls while not truly doing so, as in the
recent Irish and US press release deceptions. More
are expected as the US trade and crypto czars make
their global rounds to arrange overt-covert deals for
marketing munitions. The complicity of the banks
and giant corps is not surprising with their legacy of
doing just that -- as one defense expert says, expect
ex-gov crypto watchdogs to aid the market titans to lure
government buyers while peddling cheap knockoffs
to voters.
Amazing that the NYT sent up that trial balloon for
government access to key strokes in lieu of GAK.
Who's pushing that, working on the technology?
From egerck at laser.cps.softex.br Wed Jul 8 06:49:14 1998
From: egerck at laser.cps.softex.br (Ed Gerck)
Date: Wed, 8 Jul 1998 06:49:14 -0700 (PDT)
Subject: Ephemeral, was RE: Junger et al.
Message-ID:
Regarding my comment below:
>Ed Gerck writes:
>[...]
> > BTW, I think that Gwin was struggling to express the notion that
> > source code (syntax) is a device whenever there is a clear binding
> > between that source code and known semantics, together with proper
> > pragmatics (the enviroment, as defined in semiotics), in order to
> > perform the desired function.
>
I received some private postings which questioned it by questioning
its logical consequences, as for example:
>So the judge should forbid publishing/export of Applied Cryptography
>and the PGP Book with source code, right ?
>
First, IMO, this subject is hard to discuss because it is politically
involved and also applies just to a particular set of countries -- so
it is not based on a "universal" ruling.
Further, I also think it is absurd to try to outlaw cryptography
because it is essential and not just to obtain privacy (as in my
posting on logical semantics and crypto, some months ago [1]).
In fact, I think that cryptography is needed to provide *secure
routing* [1] (a property that is more basic than secure content and
which I think will be impossible to forbid in the future). However, I
also think that the arguments being thought by each side may carry
their own intrinsic worth.
Further, even though the whole subject is IMO ephemeral because
unworkable, some of those arguments may have a far reaching
consequence and transcend the issue. Should we overlook that? IMO,
no. Even thrash can be recycled ;-)
My remark above was in this line of reasoning. So, it ought not to be
extrapolated to printed books -- I am not at all concerned about the
legal aspects. In fact, laws can be wrong and IMO this is a clear
example.
But, regarding printed books -- yes, the comment above (and others in
that line) are right. If this logic exercise is carried to its fully
immoral end, then books should not be allowed to carry complete and
workable source code. Which does not show that the argument is
illogical, just immoral. Technically, the argument is sound.
As Hume pointed out a long time ago, if we were guided only by reason
and logic then surely I should prefer to destroy the rest of the
world instead of enduring even a small pain in one of my fingers.
While this shows that logic is not all, it also shows that one cannot
deny logic by moral or ethics but rather define what precedes what in
case of conflict, for each society.
While this can have different answers for different societies, eg
where in some suicide is moral, the cryptography issue may take a
different twist if the link to secure routing is further investigated
and cryptography is not only used just for secure content as it is
today.
Thanks,
Ed Gerck
===========
Reference:
[1] http://www.mcg.org.br/trustdef.htm#A.4.1
______________________________________________________________________
Dr.rer.nat. E. Gerck egerck at novaware.cps.softex.br
http://novaware.cps.softex.br
--- Meta-Certificate Group member, http://www.mcg.org.br ---
From ptrei at securitydynamics.com Wed Jul 8 06:52:54 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Wed, 8 Jul 1998 06:52:54 -0700 (PDT)
Subject: Junger et al.
Message-ID:
> -----Original Message-----
> From: Mok-Kong Shen [SMTP:mok-kong.shen at stud.uni-muenchen.de]
> Anonymous wrote:
>
> > Does it matter who might 'read' the material, in regards to the
> protection
> > of free speech? Whether it is written so that Russians or computers
> might
> > be able to read it? If source code is written on a napkin, it can be
> > currently exported, but what if tomorrow a vendor announces a 'napkin
> > computer' which can directly read from napkins akin to a super-low
> densiy
> > floppy disc.
>
> Put the source code on a neuro-disk and you can export it under
> any crypto law that can ever be invented till eternity.
>
> M. K. Shen
[Trei, Peter]
Tell that to the thousands forbidden to leave the nations
which claim or claimed to own them, on the basis that they
once had access to state secrets.
The thankfully defunct Soviet Union regularly forbade
dissidents to emigrate, on the basis that at some point
in their lives they had had access to 'sensitive' information.
I have no doubt that similar restrictions could be put in
place in other nations.
Peter Trei
From mok-kong.shen at stud.uni-muenchen.de Wed Jul 8 07:26:19 1998
From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen)
Date: Wed, 8 Jul 1998 07:26:19 -0700 (PDT)
Subject: Junger et al.
In-Reply-To:
Message-ID: <35A38178.4B276D1F@stud.uni-muenchen.de>
Trei, Peter wrote:
>
> > -----Original Message-----
> > From: Mok-Kong Shen [SMTP:mok-kong.shen at stud.uni-muenchen.de]
> > Put the source code on a neuro-disk and you can export it under
> > any crypto law that can ever be invented till eternity.
> Tell that to the thousands forbidden to leave the nations
> which claim or claimed to own them, on the basis that they
> once had access to state secrets.
I know the unfortunate truth of that. But I was excluding the
exceptions and referring to disks that are new.
> I have no doubt that similar restrictions could be put in
> place in other nations.
It is my conjecture that the chance of that happening in some
countries that are not considered to be democratic is lower.
M. K. Shen
From jya at pipeline.com Wed Jul 8 08:10:47 1998
From: jya at pipeline.com (John Young)
Date: Wed, 8 Jul 1998 08:10:47 -0700 (PDT)
Subject: Junger Press Release
Message-ID: <199807081510.LAA01265@camel14.mindspring.com>
To: jvd-announce at samsara.law.cwru.edu
Subject: Press Release: Judge holds software is not protected speech
Date: Wed, 08 Jul 1998 09:39:36 -0300
From: "Junger v. Daley Announcements"
Federal District Court Holds That
Software Publishers Are Not Protected by the First Amendment
Government Wins Summary Judgment in Junger v. Daley
Judge Gwin's Opinion Is Available on Line
----------------------------------------------------------------
Cleveland, Ohio, Wednesday, July 8, 1998
For Immediate Release
For More Information Contact:
Peter D. Junger (216) 368-2535
Raymond Vasvari (216) 662-1780
Or see URL: http://samsara.law.cwru.edu/comp_law/jvd/
To be added to, or removed from, the list of those who were sent this
press release, please send e-mail to .
_________________________________________________________________
Cleveland, Ohio, July 8 --
On July 3, 1998 Judge Gwin of the United States District Court of the
Northern District of Ohio held that computer programs are not writings
protected by the constitution because they are ``inherently
functional'' and granted summary judgment dismissing a suit
challenging regulations that forbid the publication of encryption
programs on the Internet or the World Wide Web.
The suit was brought by Peter Junger, a law professor at Case Western
Reserve University in Cleveland, to enjoin the enforcement of export
regulations on encryption software that prevent him from publishing
his class materials and articles for his course in Computing and the
Law on the Internet because they contain some encryption programs.
Junger claimed in his suit that those encryption programs were
writings that were entitled to the full protection of the First
Amendment. ``Of course they are writings,'' Junger says, ``I know
because I wrote some of them. And I need to be able to publish them
if I am ever going to be able to explain to lawyers and law students
how computers work and how the law should be applied to computing.''
The government, on the other hand, argued that its export regulations,
which require that one obtain a license from the Commerce Department
before publishing materials containing encryption software on the
Internet or the World Wide Web, seek only to restrict the distribution
of encryption software itself, not ideas on encryption. And Judge
Gwin agreed with the government, finding that: ``the Export
Regulations are constitutional because encryption source code is
inherently functional, because the Export Regulations are not directed
at source code's expressive elements, and because the Export
Regulations do not reach academic discussions of software, or software
in print form.''
In a related case in California brought by mathematics professor
Daniel Bernstein, Federal District Court Judge Patel held that
computer programs are speech that is protected by the First Amendment,
but Judge Gwin rejected that argument, saying: ``The Bernstein court's
assertion that `language equals protected speech' is unsound. `Speech'
is not protected simply because we write it in a language.'' It is
Judge Gwin's position that computer source code is a purely functional
device: ``The court in Bernstein misunderstood the significance of
source code's functionality. Source code is `purely functional,' in a
way that the Bernstein Court's examples of instructions, manuals, and
recipes are not. Unlike instructions, a manual, or a recipe, source
code actually performs the function it describes. While a recipe
provides instructions to a cook, source code is a device, like
embedded circuitry in a telephone, that actually does the function of
encryption.''
There is thus a clear split between the two courts: Judge Patel
holding that computer software is protected by the First Amendment and
Judge Gwin holding that it isn't. The Bernstein case is on appeal and
Professor Junger says that he intends to appeal Judge Gwin's decision:
``We have had almost no financial support for this case, but the issue
of whether encryption software and software in general is protected
like other writings under the First Amendment, or whether it is to be
treated as a special exception like obscenity and fighting words as Judge
Gwin held, is so important that we will have to scrape up the
resources somehow to bring an appeal.''
Judge Gwin's opinion is now available at
and is mirrored at .
-30-
From Charlie_Kaufman at iris.com Wed Jul 8 08:26:32 1998
From: Charlie_Kaufman at iris.com (Charlie_Kaufman at iris.com)
Date: Wed, 8 Jul 1998 08:26:32 -0700 (PDT)
Subject: Lotus Notes signature / encryption
Message-ID: <8525663B.005553FE.00@arista.iris.com>
>Could someone kindly tell me about the drawbacks of the Lotus Notes
>signature / encryption system (export version)?
I guess my first question would be "compared to what?".
Compared to the Lotus Notes domestic version, the crypto is weaker
in two ways. First, there is a backdoor by which all but 40 bits of
each symmetric key is encrypted under a public key whose private half
is known to the U.S. government. This encrypted value is included in
all messages where the key is passed aroung. Depending on how you feel
about breaking 40 bit keys, this means it is somewhere between easy and
trivial for the U.S. government to eavesdrop on your communications
It also uses 512 bit RSA keys for distribution of encryption keys,
which makes it attackable by attackers other than the U.S. government.
While no one has ever publicly demonstrated breaking a 512 bit RSA key
(last I heard), the workfactor is well understood and it's clearly
feasible (and in fact overdue).
Compared to exportable versions of S/MIME or SSL, the crypto is
considerably stronger. Against attackers other than the U.S. government
(and even a paranoid would admit there are other attackers to be
concerned about (e.g. the French government)), the workfactor to
attack the symmetric keys is 64 bits - a little shakey but not the
weakest link in most systems. Further, RSA signature keys are 630 bits,
which is better than most exportable systems.
Compared to non-exportable (but internationally available) systems, like
PGP and strong S/MIME and SSL, the crypto is substantially weaker.
Another aspect to consider is the strength of the PKI. Lotus Notes uses
an organizationally based PKI, meaning that to a large degree your
security depends on the trustworthiness and competence of your system
administrator. With PGP, your security is under your own control to a
much larger degree. For people who are more security aware than their
administrators (as most PGP users are), the PGP PKI offers better security.
For people who are less security aware than their administrators (as
most Lotus Notes users are), the Lotus Notes PKI offers better security.
Finally, a "drawback" that might be relevant to this group is the fact
that because the Lotus Notes export version has a key-escrow-like
backdoor, using it offers tacit political endorsement for the
U.S. government's contention that key escrow is a technically practical
compromise between the needs of users for privacy and the "needs" of
government to know all the secrets of everyone on the planet. In my
mind, this argues strongly in favor of using real strong crypto if
that is an option, but using weak crypto as an alternative is offering
tacit political endorsement for the even more dangerous contention that
weak crypto is good enough. Your mileage may vary.
--Charlie Kaufman
(charlie_kaufman at iris.com)
From rdl at MIT.EDU Wed Jul 8 09:44:13 1998
From: rdl at MIT.EDU (Ryan Lackey)
Date: Wed, 8 Jul 1998 09:44:13 -0700 (PDT)
Subject: IP: "CyberCash can't oust credit cards"
In-Reply-To:
Message-ID: <199807081624.MAA18073@tana.mit.edu>
Bob Hettinga wrote:
> At 6:41 AM -0400 on 7/8/98, Ryan Lackey wrote:
> You probably can't bootstrap things on seignorage alone, I don't
> think, but if you did, again, you would kill your digital
> cash issue anyway, because of lack of merchant acceptance, especailly in
> the early phases.
>
I think you can bootstrap things on "value-add" to a bank, and on seignorage,
taken together. It is *good business* for a bank to provide a service like
this. It is one of those services, like online banking, ATMs, ubiquitous
branch locations (mmm, BankBoston...), private banking personnel, etc. which
make customers happier. It is a good business case for a bank.
> Note, in my canonical example, cash, that people already pay a fee for
> "foreign" ATM withdrawls anyway, and people are used to doing things that
> way. That's great, because I expect that margins on a net.ATM withdrawl
> through an underwriter would be significantly higher than what a bank makes
> on their non-customer ATM transactions. Three orders of magnitude cheaper?
> I wouldn't be surprised.
My banks eat the foreign ATM costs as a customer value-add expense.
For the cash example, banks don't generally charge users to withdraw or
deposit money at a teller window, or at their own ATMs. I think an online
bank dealing with electronic cash is more dealing with "internal" transactions
than with "foreign" transactions -- AFAIK, a lot of the foreign ATM charges
are charged by the foreign bank, which has no real interest in the user
doing anything but switching banks, anyway.
>
> > Certainly, at first order, the fee *should* be on removing money from the
> > system, from a selfish point of view on the part of Ivan the Issuer -- if
> > you're making money on seignorage, you're making money when people add money
> > to the system *and leave it there*. Thus, you want to provide incentives
> > for
> > people to buy money and leave it there -- charging no "on" fees and minimal
> > "off" fees would do it.
>
> Yup. But, oddly enough, that was Mark Twain's (final) fee structure, too.
> Didn't save them in the end, though.
I argue that they had already shot their feet full of holes to the extent that
nothing they did would have saved them by that point, but Mark Twain is a
complex enough example that it might be worth just ignoring. I don't know
if their experiment will even be a footnote to the footnote to history that
is DigiCash.
>
> I just think that if merchants are the key to acceptance of digital bearer
> cash, much less fully anonymous blinded digital bearer cash :-), then you
> shouldn't charge merchants anything to accept the stuff. If a merchant can
> download a wallet or registerware free or very cheap, and instantly start
> taking cash payments for whatever they sell over the net, and, when it came
> time to take that cash and put it into their own bank it didn't cost them
> anything to do it, then they would probably accept the stuff a heartbeat.
> The cost of anything is the foregone alternative, three orders of
> magnitude, and all that and "free" comes pretty close to three orders of
> magnitude in cost reduction from merchant credit card fees in my book. :-).
I've already shown why it is in the best interest of the issuer to participate.
The next step is to convince merchants it is worth doing. Merchants, I
believe,
are willing to accept a percentage redemption fee for a new payment system
if their customers demand it. They fundamentally want to make their customers
happy. If a lot of customers request a new payment scheme, or they are
convinced customers want to use it, they will happily use a new payment scheme.
I think resistance to new payment schemes on the part of a merchant is in
cost and effort to set up. Having a free apache commerce plugin which handles
a variety of payment systems, including electronic cash, so the systems
integration costs for adding electronic cash to an operation are zero, and
they end up being cheaper than credit cards to process -- a 1% primary market
fee, or a going-to-zero percent secondary market fee. Or, provide non-fee
incentives for merchants to accept the system -- loyalty points, tax-free
accounting in offshore bank accounts, the Amex approach of marketing merchants
who accept the system to their client base directly, etc.
For a directed payment system, going from customer to merchant to bank, then
you definitely need merchants before you can get customers, which turns this
on its head. *However*, a good electronic cash system is user-to-user, the
Mondex model, rather than DigiCash's model. This means the system can
bootstrap
as soon as a single pair of people want to exchange money. People already
want to exchange money user-to-user on the net -- there's a huge unsatisfied
demand. That's more than enough to get it in place. Making it anonymous
adds even more incentive.
>
> I see seignorage as a tasty long-view source of income, certainly, but I
> expect the half-life of a given dollar of digital cash to be measured in
> days, if not hours, in the early stages. Frankly, I don't see seignorage
> showing up significantly on the income statement of an underwriter until
> there are other bearer instruments (stocks, bonds, and especially mutual
> fund shares) to invest that cash in, keeping it on the net.
The half-life of a given dollar of digital cash will be *infinite* if there
is an expanding base of users, a cheaper secondary market for getting
electronic
cash than the cash out and cash back in system, and there is never a big panic.
The holding time for a particular user might be pretty short, but I think
from the beginning a large amount of money will just be left on the net, since
it's far cheaper for a consumer to buy cash from a merchant directly than
for the merchant to cash out and the user to buy them on the primary market.
>
> I think that that's one of the reasons that the Fed, among other people,
> aren't too worried about the immediate macroeconomic effects of digital
> cash. That and that the Fed's seignorage income, in the overall scheme of
> Fed revenues, is pretty small, and probably dwarfed by other things like
> printing and handling costs, etc. Greenspan himself is/was a free banking
> advocate, certainly, and has said publically (see last September's Official
> Cypherpunk Forbes issue :-)) that he thinks that private electronic
> banknote issue is not a scary proposition at all.
I thought seignorage was a net profit for the Fed, after printing/handling.
They *do* give the Treasury a kickback for this, and I'm not sure how the
budget
actually works, but I think they pay all distribution/printing/etc. costs
themselves, and thus this is actually spare money.
It doesn't really apply here, since many of those costs are fundamentally
different in the electronic cash world than in the printed cash world.
Greenspan is/was a libertarian, and would probably be ok with private
electronic
banknotes putting him out of business, as long as it was better for the economy
and people as a whole.
--
Ryan Lackey
rdl at mit.edu
http://sof.mit.edu/rdl/
From howree at cable.navy.mil Tue Jul 7 19:40:31 1998
From: howree at cable.navy.mil (Reeza!)
Date: Wed, 8 Jul 1998 10:40:31 +0800
Subject: Rats in the Walls
In-Reply-To: <199807021721.TAA23458@basement.replay.com>
Message-ID: <3.0.5.32.19980703155145.008b4820@205.83.192.13>
At 07:21 PM 02 07 98 +0200, Anonymous wrote:
>"Reeza!" wrote:
>
>> At 04:41 PM 02 07 98 +0200, Anonymous wrote:
>> >and there are indeed safe havens elsewhere,
>> >
>> >"Educate, don't Agitate"
>> >
>>
>> Tell me more,,,
>
>You and who's army?
>
What army?
I'm in the navy, and I'm getting sick of it.
From CTIA_Daily_News at um2.unitymail.com Wed Jul 8 10:51:21 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Wed, 8 Jul 1998 10:51:21 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 8, 1998
Message-ID: <199807081644.LAA14528@mailstrom.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon / attachment
for the most important news in wireless communications today.
=============================================
From jya at pipeline.com Wed Jul 8 11:03:21 1998
From: jya at pipeline.com (John Young)
Date: Wed, 8 Jul 1998 11:03:21 -0700 (PDT)
Subject: Covert Access to Data and ID
Message-ID: <199807081736.NAA11731@camel14.mindspring.com>
Froward From: Anonymous
To: die at pig.die.com
Cc: jy at jya.com
Subject: Intel plans for world domination
Date: Wed, 8 Jul 1998 10:51:04 -0500
Good afternoon gentlemen,
I've been reading the correspondence on the possibility of govt
keystroke access with some interest. I'm in a slightly odd position as
I'm responsible for security in one of the larger wintel companies. As
such I've been getting quite a feeling of deja vu reading your mails.
Intel and others are moving in exactly this direction with a number of
initiatives, most notably the PC98, PCXX, and "Wired For Management".
WfM in particular is very scary - one of the components is a facility
for PC's to download and run digitally signed software before the OS is
booted - between "the end of BIOS initialisation and when control is
transferred to a high-level OS" in the words of one Intel document. The
code is verified by routines embedded in the BIOS and will allegedly use
some subset of X.509v3 and PKCS#1.
As so often happens in circumstances like this I can't risk passing
documents directly as I can't be sure of their provenance - I really
have no idea which ones are now considered trade secrets and which have
been made public. Instead I recommend you have a look at the Intel WfM
site http://www.intel.com/ial/wfm/ with particular reference to the
"Pre-Boot Execution Environment" (PXE) and "System Management BIOS"
(SMBIOS). The Microsoft pc98 site is at
http://www.microsoft.com/hwdev/pc98.htm
and the Intel one at
http://developer.intel.com/design/pc98/.
----------
And, DM reminds of the DIRT program Ray Arachelian first posted
here:
There's an article on page 37 of the July 6, 1998 issue of
NetworkWorld about a new software product for Windows machines
that is basically a trojan horse that allows access to all
keystrokes and files on a system from a remote "America's
Most Wanted"-type HQ. I can't find the article online
at www.networkworld.com, but you can go the the company's
site at
http://www.thecodex.com/dirt.html
to see it. Sale of DIRT is "restricted to military, government, and law
enforcement agencies", the article says.
From hizaici72 at prodigy.com Wed Jul 8 11:28:13 1998
From: hizaici72 at prodigy.com (hizaici72 at prodigy.com)
Date: Wed, 8 Jul 1998 11:28:13 -0700 (PDT)
Subject: Join StarDates.com, The Internet's Best FREE Dating Service!
Message-ID: <199807081009OAA45295@pimaia7y.csd.unbsj.ca>
That's right! Stardates.com is the
internet's best FREE dating service.
No gimmicks, no free trials that expire, just FREE
Click the link below:
http://209.2.134.99/
and select JOIN FREE from the menu options to fill out our on-line application.
All personal information is kept strictly confidential.
We even have an anonymous email system to keep your email address private.
So if your your looking to meet people, join Stardates.com
Hey, what do you
have to lose?
Sincerely,
Michael Sole
Vice-President
StarDates
****************************************************
Bulk Email Advertising Works Best!!
This Could Have Been Your AD !!!
For Advertising Information Please Calll
1-510-653-4709 Evenings PST
**********************************************
From jya at pipeline.com Wed Jul 8 12:07:14 1998
From: jya at pipeline.com (John Young)
Date: Wed, 8 Jul 1998 12:07:14 -0700 (PDT)
Subject: Jim Bell Message
Message-ID: <199807081600.MAA05747@camel14.mindspring.com>
Forwarded from a long-time cpunk who received a call
from Jim Bell yesterday. Jim asked that this message be
publicized:
7/7/98
By this post he is publically accusing the Federal Government
of having spied on him from two physical addresses. These are
two houses to the North & to the East of his parent's house.
The government moved in within 6 months (approx) of the time
before his arrest.
One of the addresses is 7217 Mississippi, which is listed as
"Billy King", who died a couple of years ago. The house is
ostensibly being occupied by his widow (or that is the
impression). It is listed as being as owned by Alverna King,
but he has his doubts.
The other is address is 7302 Corregidor, purchased about 2.5 - 3
years ago by someone. Listed as being the address of Sundown
Development, a small business company. A second floor was added
soon after it was acquired by the company. They aren't listed as
the owners on record, but they are listed as being at that address.
Thinks this is a sham.
The govmt was basically next door spying on him for at least a
year, before it started provoking him. In response to his using
the internet for freewheeling debate, they engaged in some
bugging that is illegal under Washington State law. It is illegal
to use bugging without the knowledge of the participants.
He has developed a technique for identifying when someone is
tailing him. Found this on Father's day when some people got a
little too close to him. He drove to his Sister's party on Hayden
Island in Oregon, and noticed the tails. Identified them as Rixen
Marine, which he thinks is a sham, another front organization. One
of the reasons he was arrested (though they're not willing to admit
it) is because was way too successful in tailing _them_. A few
more days and he would have blown their entire operation.
He couldn't go into the details of how he found out these things.
Did research & sophisticated observation. Will be getting friends
to do searches in databases, etc. to gather more info to substantiate
his suspicions.
He said his recent arrest was on a probation violation charge -
failure to pay a fine or something, wasn't clear on the specifics.
There will be a hearing on his case this Friday the 10th.
Prosecutors last year didn't know what the govmt was up to - not
told of the spying (a "black operation"). Their method of spying
on him are techniques which are possible, though rarely used. If
people knew they would be very surprised. It will be a big story -
big as Watergate - when it comes out. Their usage of these high-tech
methods for access is difficult, so not used often. The government
is trying to cover up their reaction to what he wrote in his essays.
-------------------
From rah at shipwright.com Wed Jul 8 12:10:31 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Wed, 8 Jul 1998 12:10:31 -0700 (PDT)
Subject: IP: "CyberCash can't oust credit cards"
In-Reply-To:
Message-ID:
At 12:24 PM -0400 on 7/8/98, Ryan Lackey wrote:
> My banks eat the foreign ATM costs as a customer value-add expense.
Yes, but what do they do for customers of *other* banks? They *charge* them
for it. Which is exactly what any underwriter should do to put money onto
the net. There is no difference between an underwriter of digital cash and
a provider of a third-party cash machine, be it at a bank other than your
own, or, more equivalent, those private ATM machines you see all over the
place now.
> I argue that they had already shot their feet full of holes to the extent
>that
> nothing they did would have saved them by that point, but Mark Twain is a
> complex enough example that it might be worth just ignoring. I don't know
> if their experiment will even be a footnote to the footnote to history that
> is DigiCash.
Well, certainly no more than Otto Lillienthal was... :-).
> I've already shown why it is in the best interest of the issuer to
>participate.
> The next step is to convince merchants it is worth doing.
By making it so cheap for them to use that it becomes ubiquitous? ;-).
> The half-life of a given dollar of digital cash will be *infinite* if there
> is an expanding base of users, a cheaper secondary market for getting
> electronic
> cash than the cash out and cash back in system, and there is never a big
>panic.
Big pile of "ifs" there. I expect that all you really need are other
digital bearer assets which provide a better return than cash. :-).
> I thought seignorage was a net profit for the Fed, after printing/handling.
> They *do* give the Treasury a kickback for this, and I'm not sure how the
> budget
> actually works, but I think they pay all distribution/printing/etc. costs
> themselves, and thus this is actually spare money.
Okay. Since the actual, financial definition of seignorage is in fact the
difference between what money's worth and what it costs to produce it,
you're probably right. :-). Nonetheless, income on seignorage is miniscule
to other income that the Fed makes, and that's a fact. Greenspan has gone
on record (see the Forbes article) as saying that it would be no skin off
his nose if the Fed never saw any of it.
> It doesn't really apply here, since many of those costs are fundamentally
> different in the electronic cash world than in the printed cash world.
Well, yeah, to the extent that the cost structure is somewhat :-)
different. Unique, non-replicable money-bits *are* easier to print and
control than paper ones after all. Some people say three orders of
magnitude cheaper. ;-).
> Greenspan is/was a libertarian, and would probably be ok with private
> electronic
> banknotes putting him out of business, as long as it was better for the
>economy
> and people as a whole.
Agreed, and he's said as much, like I've said. Controlling the money
supply's more what Greenspan's interested in, and, frankly, given the
amount of eurodollars (the "other" e$ :-)) held in dollar-denominated
accounts in foriegn banks, it's probably safe to say that that's going to
be more of a problem for him as time goes on. And, of course, the physical
cash sitting in some Russian mattresses is, well, seignorage.
Cheers
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
July 23-24, 1998:
From daveb-lists at mail.hyperion.co.uk Wed Jul 8 12:10:46 1998
From: daveb-lists at mail.hyperion.co.uk (Dave Birch)
Date: Wed, 8 Jul 1998 12:10:46 -0700 (PDT)
Subject: IP: "CyberCash can't oust credit cards"
Message-ID: <1312194872-63102733@hyperion.co.uk>
Ryan Lackey said
>I think resistance to new payment schemes on the part of a merchant is in
>cost and effort to set up. Having a free apache commerce plugin which
>handles
>a variety of payment systems...
What's wrong with this model is that it imports historical physical
models that are irrelevant on the Net. Why does the merchant take
payments at all?
Imagine this scenario: you go into the Good Guys and buy a Walkman. The
clerk gives you a ticket. You go round to your branch of Wells Fargo and
get a cashiers cheque made out to the merchant, walk round to the
merchant's branch of BankAmerica -- or BankBank, or whatever it's called
now :) -- and deposit the cheque in the merchants account. BankBank gives
you a receipt which you take back to the Good Guys and pick up your
Walkman. Now, apart from all of the walking around, this is not a bad
system. The Good Guys don't need cash registers, links to First Data etc
etc. The Good Guys don't need to put up stickers saying "we take Visa",
because the bank takes everything. The Good Guys don't care how you paid.
The bank is much better placed than the merchant to handle the risks
associated with payments and therefore the information asymmetries
associated with the payment are significantly reduced (there's a good
article about this in the Federal Reserve Bank of Atlanta's Economic
Review, 1Q98). On the Net, there's no walking around.
In the physical world, it clearly makes no sense for every bank to build
a network out to every merchant: hence it makes sense to have physical
payment instruments (e.g. notes, cheques) and credit/charge cards. On the
Net, though, every participant is connected. When you buy a book from
Amazon, what is the point of sending your credit card details to Amazon
just so that they can send the details on to an acquiring network,
third-party processor etc. Surely it makes more sense for merchants to
have deals with payment agents (this is the model in OTP, Smart Access
etc). When you press the button marked "Pay" on your browser, wouldn't it
be more natural for a message to go to your bank than to the merchant?
Thus, I get a "ticket" from Amazon saying "you owe $20 for this book". I
pass the ticket to a payment agent (which may be a bank) and pay them
(the negotiation being between my wallet and the agent"). The agent sends
me a receipt to keep: I send the receipt to Amazon and they send me a
book. Alternatively, perhaps the receipt let's me play Doom for a month
or get ten upgrade to an item of software or whatever.
All Amazon care is that the money has been paid: what do they care
whether I used DigiCash or Mondex, Visa or MasterCard? You might argue
that the merchant would discount for cleared funds (pay by Mondex and get
2% off) but I think that its frankly too much bother for them to work out
N different prices by M different payment methods. I would imagine that
just a merchants run loyalty schemes ("double points if you buy
cornflakes") then so would payment agents ("double points for DigiCash")
but each could operate their business independently.
I would argue that the idea that merchants take payments is outdated.
Since merchants don't care about cypherpunk favourites such as bearer
instruments and anonymity, they'll be perfectly happy to have an
acquiring account with BigBank and get a statement at the end of the
month that details the payments taken and says "Money collected $1000,
our fee $50, deposited to your account $950". Now, the merchant hasn't
had to buy a commerce server, negiotiate 10 different acquiring
agreements, implement SET or do anything else. Hey, so it's 5%: so what?
Regards,
Dave Birch.
=== mailto:daveb at hyperion.co.uk ===== http://www.hyperion.co.uk/ ===
From jya at pipeline.com Wed Jul 8 12:12:17 1998
From: jya at pipeline.com (John Young)
Date: Wed, 8 Jul 1998 12:12:17 -0700 (PDT)
Subject: Covert Access to Data and ID
Message-ID: <199807081547.LAA21623@camel14.mindspring.com>
Dave Emery's remarks on government access to
keystrokes (proposed by the NYT as an alternative
to GAK) points to the probable increase of intrusive
devices to counter increasing use of encryption
and other privacy and anonymity measures.
This topic comes up here now and then, with
mentions of a slew of methods to protect privacy of
data during transmission or storage. But the possibility
of logging the initial creation or manipulation of data is
not as often discussed, nor how to tie a person to
the data, as now being asked in legal and law
enforcement fora to identify, catch, convict and
jail computer culprits.
That the NYT floated the idea surely means someone
is testing public response to an idea that seems to
be more intrusive than GAK: the logging of initial
data and any manipulation of it, prior to encrypting,
and maybe including a means to link the actions to
the user.
If this is logging (and related retrieval) is done covertly,
encryption could thereby become a falsely reassuring
cloak of privacy.
Dave thinks devices like these are surely in the works,
and he can say more about their sponsors, technologies
and implementations.
One driving force, as he previously noted, is the desire
for devices to assure copyright protection, backed by the
WIPO treaty, which now being considered for approval.
See the House report on it at:
http://jya.com/hr105-551.txt (141K)
And the EFF and ACLU opposition to it:
hr2281-opp.htm
Other forces, though, are employers who want to snoop,
law enforcement, government, marketers, actually the
same groups who dislike privacy protection measures,
but often prefer to snoop covertly while loudly proclaiming
support for privacy.
Thus, the more general question Dave has raised is how
widespread is the development and implementation of
technolgies for covert surveillance on the Web and in
desktop boxes -- happily spreading quietly while attention
is focussed on the very encryption which it will circumvent?
And what are these devices, or what might they be, what
might be countermeasures and who might be working for
and against them. SDA must have insights to share.
Over to Dave Emery and those more knowledgeable.
For those who missed his earlier message we've put it, with a
follow-up at:
http://jya.com/gaks-de.htm
From xena at best.com Wed Jul 8 12:25:44 1998
From: xena at best.com (Xena - Warrior Princess)
Date: Wed, 8 Jul 1998 12:25:44 -0700 (PDT)
Subject: U.S. relaxes licensing grip on encryption
Message-ID:
(From the Mercury News, see subject line)
http://www.sjmercury.com/business/center/encrypt070898.htm
It's a start, at least.
From StanSqncrs at aol.com Wed Jul 8 13:44:29 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Wed, 8 Jul 1998 13:44:29 -0700 (PDT)
Subject: A Mirror - 'Don't be blue if you should be green'
Message-ID:
Sorry, that server that address I gave you on earlier seems to be all locked
up, so I created a mirror, check it out,
Stan,
The Desecration of 'The Dark Side of the Moon'
http://members.aol.com/RealityWal/DarkSide/darkside.html
From nobody at REPLAY.COM Wed Jul 8 14:29:06 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Wed, 8 Jul 1998 14:29:06 -0700 (PDT)
Subject: No Subject
Message-ID: <199807082129.XAA00872@basement.replay.com>
I made another page, which details what Capital records did to Dark Side of
the Moon when they reissued on cd. Guess what they covered-up. :-) Check it
out,
Stan,
The Desecration of 'The Dark Side of the Moon'
http://members.tripod.com/StanSqncrs/DarkSide/darkside.html
From adam at homeport.org Wed Jul 8 14:38:58 1998
From: adam at homeport.org (Adam Shostack)
Date: Wed, 8 Jul 1998 14:38:58 -0700 (PDT)
Subject: Covert Access to Data and ID
In-Reply-To: <199807081547.LAA21623@camel14.mindspring.com>
Message-ID: <199807082138.RAA12934@homeport.org>
John Young wrote:
| If this is logging (and related retrieval) is done covertly,
| encryption could thereby become a falsely reassuring
| cloak of privacy.
|
| Dave thinks devices like these are surely in the works,
| and he can say more about their sponsors, technologies
| and implementations.
Keystroke logging technology exists commercially as a result
of the shit reliability of commercial OSs. Turning one of them
quite stealth wouldn't be hard; they're very innocous as is.
Also note things like the recent MS 'send chunks of ram in
Word documents' bug in Word for the Mac. (Actually an OLE bug.)
The benefit to encryption is not that it makes your data
secure, but that it allows you to communicate safely in the presense
of adversaries. (Rivest's definition.)
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
From cds at mcmurdo.gov Wed Jul 8 15:37:10 1998
From: cds at mcmurdo.gov (Chris Liljenstolpe)
Date: Wed, 8 Jul 1998 15:37:10 -0700 (PDT)
Subject: RSA in perl illegal to export (Re: Junger et al.)
In-Reply-To:
Message-ID: <19980708223047.H93@erebus.mcmurdo.gov>
Greetings,
There are t-shirts out there with both human readable and
machine readable (bar code) versions of the RSA in 3 code.... Wear it
when boarding an international flight.... They even state that they
are a munition and ITAR controlled in BIG letters on the back...
Chris
On Wed, Jul 08, 1998 at 11:04:44AM +0100, Adam Back wrote:
>
> Jim Burnes writes:
> > Obviously there is no difference between 10 lines of PERL and
> > 1500 lines of assembler (or machine code).
>
> One of Peter Junger's examples (I think used in the case) is the RSA
> in 2/3 lines. He actually obtained the US export administrations
> written decisions on which of a small collection of titchy programs
> was exportable. RSA in 3 lines of perl they stated was illegal to
> export.
>
> So fun things with RSA are possible because they have decided that it
> is not exportable, so perhaps you could export it on a floppy, or as
> your .signature, with media cameras rolling, and try to get yourself
> arrested for willful violation of dumb export laws.
>
> Adam
> --
> Have you exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
>
> print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
I still have a few of those shirts left (I ate the cost ... along with a
few copies of Secret Power).
If anyone wants to do this, I will be happy to donate the T-shirt (and
be an "arms" supplier).
In fact, one of the people who expressed an interest in buying the
T-shirt wanted to send one to Dave Letterman (Letterman was hot at the
time). Did you ever do it?
Ern
-----Original Message-----
From: Chris Liljenstolpe [SMTP:cds at mcmurdo.gov]
Sent: Wednesday, July 08, 1998 3:31 PM
To: Adam Back; jim.burnes at ssds.com
Cc: Ernest Hua; egerck at laser.cps.softex.br;
cypherpunks at toad.com; cryptography at c2.net
Subject: Re: RSA in perl illegal to export (Re: Junger et
al.)
Greetings,
There are t-shirts out there with both human readable
and
machine readable (bar code) versions of the RSA in 3 code....
Wear it
when boarding an international flight.... They even state that
they
are a munition and ITAR controlled in BIG letters on the back...
Chris
On Wed, Jul 08, 1998 at 11:04:44AM +0100, Adam Back wrote:
>
> Jim Burnes writes:
> > Obviously there is no difference between 10 lines of PERL
and
> > 1500 lines of assembler (or machine code).
>
> One of Peter Junger's examples (I think used in the case) is
the RSA
> in 2/3 lines. He actually obtained the US export
administrations
> written decisions on which of a small collection of titchy
programs
> was exportable. RSA in 3 lines of perl they stated was
illegal to
> export.
>
> So fun things with RSA are possible because they have decided
that it
> is not exportable, so perhaps you could export it on a floppy,
or as
> your .signature, with media cameras rolling, and try to get
yourself
> arrested for willful violation of dumb export laws.
>
> Adam
> --
> Have you exported RSA today? -->
http://www.dcs.ex.ac.uk/~aba/rsa/
>
> print pack"C*",split/\D+/,`echo
"16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
test
From caj at math.niu.edu Wed Jul 8 17:00:17 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Wed, 8 Jul 1998 17:00:17 -0700 (PDT)
Subject: RSA in perl illegal to export (Re: Junger et al.)
In-Reply-To: <19980708223047.H93@erebus.mcmurdo.gov>
Message-ID:
On Wed, 8 Jul 1998, Chris Liljenstolpe wrote:
> Greetings,
>
> There are t-shirts out there with both human readable and
> machine readable (bar code) versions of the RSA in 3 code....
RSA in 3 or RSA in 5? Is there a new version?
Now, all *real* Nettites know that the original
shirts were by Joel Furr, are no longer for sale,
and have an X-ed out Bill of Rights (or excerpts
thereof) on the back, rather than any of this ITAR
stuff. And!! It glows in the dark. Rock rock.
-Caj
"This shirt is a ... " [squints] "... munchkin?"
From Jeff.Nisewanger at Eng.Sun.COM Wed Jul 8 17:02:24 1998
From: Jeff.Nisewanger at Eng.Sun.COM (Jeff Nisewanger)
Date: Wed, 8 Jul 1998 17:02:24 -0700 (PDT)
Subject: RSA in perl illegal to export (Re: Junger et al.)
Message-ID: <199807090001.RAA20366@puuoo.eng.sun.com>
> There are t-shirts out there with both human readable and
> machine readable (bar code) versions of the RSA in 3 code.... Wear it
> when boarding an international flight.... They even state that they
> are a munition and ITAR controlled in BIG letters on the back...
Or take out a classified ad (so to speak) in the New York Times
and have it published on paper.
Jeff
From Hua at teralogic-inc.com Wed Jul 8 17:18:22 1998
From: Hua at teralogic-inc.com (Ernest Hua)
Date: Wed, 8 Jul 1998 17:18:22 -0700 (PDT)
Subject: RSA in perl illegal to export (Re: Junger et al.)
Message-ID: <413AC08141DBD011A58000A0C924A6D52C35AE@mvs2.teralogic-inc.com>
Would someone who has actually scanned this T-shirt in please let us
know how you did it (which equipment, what software, etc.)?
Thanks!
Ern
From jya at pipeline.com Wed Jul 8 17:37:02 1998
From: jya at pipeline.com (John Young)
Date: Wed, 8 Jul 1998 17:37:02 -0700 (PDT)
Subject: DoD Plans Global Domestic Invasion
Message-ID: <199807090036.UAA06849@dewdrop2.mindspring.com>
DoD released today the text of a June 11 speech which
describes how the military is planning for the first time
in US history to establish a homeland defense command,
to operate inside US borders for protection against terrorism
and weapons of mass destruction:
http://jya.com/dsd061198.htm
A special unit will handle cyber threats.
The CINC-US will be a vast increase over the traditional
role of domestic law enforcement by FBI, ATF and other
federal, state and local authorities, lately supplemented
by the National Guard, FEMA, PCCIP, and the newly
formed COIA at Commerce and the President's special
office on domestic terrorism.
Deputy Secretary of Defense Hamre said the command
will work with the newly formed Defense Threat Reduction
Agency (DTRA) which will be under C4I of DoD.
Another press release today covered Hamre's June 22
speech in Vienna where he outlined similar measures for
European defense through NATO:
http://jyacom/dsd062298.htm
Finally, the Wash Post had a report today on DoD's
attempt to come up with workable plans for offensive
cyberwar -- which is claimed to be the serious first
serious competitor for the nuclear threat in fifty years:
http://jya.com/cyber-how.htm
It says that a component of cyberwar offense is regular prowling
of other countries networks and military command systems
for the purpose of "pre-planning the battlefield."
That this is the way DoD justifies ignoring the limitations of
intel agencies' need to get presidential approval for invading
the borders of other countries. "Cyberspace is borderless,"
says the Pentagon.
Many covert prowling, surveilling and crashing tools
are in operation or poised to take down systems like those
of the nuclear command and control systems of
Pakistan and India should the need arise. One guy
brags that any one of a dozen experts in the US
"could take out a country in six hours" by disrupting
cyber infrastructure, and that might be looming for
the US.
Is it true infowar, or is it whistling in the dark psy war:
"my megaherz-death bombers are sneakier than yours"?
So, it appears that key stroke logging and MS/Intel's vicious
"wired for management" are kidstuff cheapskate knockoffs of
far worse invasive technology pouring dollars into Wintel
labs and fabs.
From e9710041 at unitele.com.my Wed Jul 8 18:14:43 1998
From: e9710041 at unitele.com.my (RAPHAEL_PHAN_CHUNG_WEI)
Date: Wed, 8 Jul 1998 18:14:43 -0700 (PDT)
Subject: No Subject
Message-ID:
From jya at pipeline.com Wed Jul 8 18:19:26 1998
From: jya at pipeline.com (John Young)
Date: Wed, 8 Jul 1998 18:19:26 -0700 (PDT)
Subject: DoD Plans Global Domestic Invasion
In-Reply-To: <199807090036.UAA06849@dewdrop2.mindspring.com>
Message-ID: <199807090119.VAA03382@dewdrop2.mindspring.com>
To not accuse only follow-the-leaders Wintel, that last paragraph
should have been:
So, it appears that key stroke logging and MS/Intel's vicious
"wired for management" are kidstuff cheapskate knockoffs of
far worse invasive technology pouring dollars into much
DIRTier than Wintel labs and fabs.
From stuffed at stuffed.net Wed Jul 8 21:25:38 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Wed, 8 Jul 1998 21:25:38 -0700 (PDT)
Subject: Elvis stole my panties/Whip me please!
Message-ID: <19980709010446.28505.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 270 bytes
Desc: not available
URL:
From sales at electronicpromotion.com Wed Jul 8 22:04:43 1998
From: sales at electronicpromotion.com (sales at electronicpromotion.com)
Date: Wed, 8 Jul 1998 22:04:43 -0700 (PDT)
Subject: INCREASE YOUR CASHFLOW NOW!!!!!
Message-ID: <199807090504.WAA14973@toad.com>
Do you wish there was a way to easily communicate directly with
potential customers who already have an interest in your particular
product or service? Now with ElectronicPromotion Direct Email
you can!
ElectronicPromotion offers this highly targeted alternative that quickly
delivers your email to individuals who are more likely to respond to an
email regarding a topic they have made a post about in a newsgroup
or in a webpage.
http://www.electronicpromotion.com
or Call 813.781.9782 for more info
Because individuals have an interest in specific topics, they are more
likely to read the message. Response rates to ElectronicPromotion Direct Email
are exceptional.. This results in the recipient actually visiting your web site because
they have an active interest in your product or service. Compared to
postal mailings, direct email is both less expensive and more effective.
***Did you know?
Nearly 50 percent of the U.S. population, or 135 million
people, will communicate via email by 2001. Fifteen percent
of the U.S. population (approximately 30 million adults 16 and over)
use email now. (Forrester Research)
Why wait your target market is on the net now send your ElectronicPromotion
Announcement TODAY!!!
We also offer 100% Guaranteed Results so please visit
http://www.electronicpromotion.com
Or call 813.781.9782 to get started ASAP
==============================================================
If you would like to be blocked from any further mailings reply with "REMOVE"
as the subject. You will be promtly removed.
===============================================================
From caj at math.niu.edu Wed Jul 8 22:47:28 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Wed, 8 Jul 1998 22:47:28 -0700 (PDT)
Subject: "Classified" Ads (Was Re: RSA in perl illegal to export)
In-Reply-To: <199807090001.RAA20366@puuoo.eng.sun.com>
Message-ID:
On Wed, 8 Jul 1998, Jeff Nisewanger wrote:
> > There are t-shirts out there with both human readable and
> > machine readable (bar code) versions of the RSA in 3 code.... Wear it
> > when boarding an international flight....
>
> Or take out a classified ad (so to speak) in the New York Times
> and have it published on paper.
Woo! This sounds like an easily doable, easily managable
mass protest.
We start a mailing list or website (a website would be better)
of volunteers and the newspapers they intend to place ads in.
Major papers would hopefully get multiple copies of the ad in
multiple sections. All on the same day.
But then, they often charge per word, and one gigantic string
of nonsense might not obey any newspaper's rules.
But I like the idea of organizing a classified add campaign,
or such. Blitzing the nationwide press with a large number
of tiny notes, all one day. Maybe instead they could all
contain a URL, pointing to a carefully written, agreed-upon,
readable and fairly exhaustive collection of info about the
issues at hand. Well, maybe they shouldn't all point to
the same machine....
Ferget just signing petitions, dammit. Petitions are for
wimps. Ask folks to participate by buying an ad.
I mean, communication is what a lot of us here specialize
in. And in our protocols, we have Alice and Bob writing out
hundreds of anonymous money orders, broadcasting public
keys via radio from prison, and hiding love letters in
GIFs of farm animals. Surely there's enough imagination
here to turn even a small fund into a very effective PR
campaign.
-Caj
> Jeff
,oooooooo8 o ooooo at math.niu.edu -- http://www.math.niu.edu/~caj/
o888' `88 ,888. 888
888 ,8'`88. 888 "The user's going to pick dancing pigs
888o. ,oo ,8oooo88. 888 over security every time."
`888oooo88 o88o o888o 888 -Bruce Schneier
____________________8o888'_________________________________________________
From melliott at ncsa.uiuc.edu Wed Jul 8 07:56:40 1998
From: melliott at ncsa.uiuc.edu (Matt Elliott)
Date: Wed, 8 Jul 1998 22:56:40 +0800
Subject: Tracking: iButton (fwd)
In-Reply-To: <3.0.5.32.19980708002919.00950100@popd.ix.netcom.com>
Message-ID:
>What's to prevent someone from doing that?
time...
Matt
From ricki514 at msn.com Wed Jul 8 23:09:25 1998
From: ricki514 at msn.com (ricki514 at msn.com)
Date: Wed, 8 Jul 1998 23:09:25 -0700 (PDT)
Subject: Go for the gold.
Message-ID: <199807090609.XAA19899@toad.com>
Adults Only Website !
CHECK TO SEE IF YOU ARE A WINNER!!!!!
CLICK HERE
From vjb at gil.com.au Wed Jul 8 23:35:28 1998
From: vjb at gil.com.au (Global Web Builders)
Date: Wed, 8 Jul 1998 23:35:28 -0700 (PDT)
Subject: One Nation going back on-line
Message-ID: <1.5.4.32.19980709054803.0073c9b8@mail.ipswich.gil.com.au>
Dear Pauline Hanson's One Nation supporter in NSW
We are pleased to be able to advise that the problems faced following the
financial collapse of our Internet Service Provider (ISP), Pronet, have now
been resolved.
During the last week we have:
=============================
- re-directed the "gwb" and "onenation" domain's to our new ISP.
- established 170 mBytes of data including several hundred images and
hundreds of related One Nation web pages and thousands of links on the new host.
- begun the process of establishing a moderated discussion board at our new
ISP (under our direct control).
It is important to realise that the DNS re-delegation of the "gwb" and
"onenation" domain names will "filter through" over the next 48 hours. In
the meantime establishing a link with:
onenation.com.au
or
gwb.com.au/onenation
might be a temporary problem until your DNS look-up is updated on your ISP.
If you come across links that do not work on our new ISP please contact GWB
with the URL that you tried to access the link from and the link "caption"
(eg 'take this link to see...'). Your assistance in this regard would be
greatly appreciated.
By Sunday, 12th July, you should be able to access the full One Nation web
site and Australian News of the Day web sites USING YOUR OLD BOOKMARKS.
Please Note: A summary of news on this week's Australian National News of
the Day (anotd) will be available on fax back number: 1902 211037 from
tomorrow (Friday) afternoon. Last week's summary of the anotd is currently
available at that number for Australian based recipients of this email.
The cost is 75 cents per minute.
Email:
======
The email currently address being used (vjb at gil.com.au) has been on a
temporary basis and will no longer be used by the writer after the end of July.
The "gwb at gwb.com.au" email address will be active when you are able to
access the One Nation web sites through your old bookmarks.
Once again we apologise for this break in providing you Pauline Hanson's One
Nation on-line and thank you for your patience and support.
GWB
Scott Balson
Pauline Hanson's Web Master
From mok-kong.shen at stud.uni-muenchen.de Thu Jul 9 01:14:25 1998
From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen)
Date: Thu, 9 Jul 1998 01:14:25 -0700 (PDT)
Subject: Covert Access to Data and ID
In-Reply-To: <199807081547.LAA21623@camel14.mindspring.com>
Message-ID: <35A47BD1.1F51A0D5@stud.uni-muenchen.de>
John Young wrote:
> Thus, the more general question Dave has raised is how
> widespread is the development and implementation of
> technolgies for covert surveillance on the Web and in
> desktop boxes -- happily spreading quietly while attention
> is focussed on the very encryption which it will circumvent?
I don't know whether it is relevant but there is recently an
announcement of a conference on intrusion detection. Perhaps
one gets some relevant research results there presented.
M. K. Shen
From finances at softhome.net Thu Jul 9 02:28:30 1998
From: finances at softhome.net (finances at softhome.net)
Date: Thu, 9 Jul 1998 02:28:30 -0700 (PDT)
Subject: Make Money From Our National Television Infomercial!
Message-ID: <199807090928.CAA28650@toad.com>
There is over 400 BILLION DOLLARS IN UNCLAIMED money in North America.
We want to help return this money to its rightful owners!
To do this we are launching a NATIONAL INFOMERCIAL ON TELEVISION.
We are looking for 300 INDEPENDENT AGENTS who will become a part of
this infomercial. NO SELLING IS REQUIRED!!!
Each Agent will own an exclusive territory and will receive a
percentage of the money generated from the television informercial!
Your involvement will be very finacially rewarding.
Find out more about the opportunity and how you can get involved.
Visit our website at http://205.152.190.238/opp
From announce at dmail1.real-net.net Thu Jul 9 07:46:29 1998
From: announce at dmail1.real-net.net (RealNetworks News)
Date: Thu, 9 Jul 1998 07:46:29 -0700 (PDT)
Subject: Speed Up Your Dial-up Connection!
Message-ID: <199807091446.HAA24275@dmail3.real-net.net>
Dear RealPlayer User,
I'm excited to tell you about a great software
product that will dramatically speed up your
dial-up connection for faster Internet access and
the availability of the RealPlayer and RealPlayer
Plus G2 'pre-beta' preview releases.
TWEAKDUN ACCELERATES YOUR INTERNET CONNECTION
By optimizing your Windows 95 Registry internet
settings, TweakDUN by Patterson Design Systems
eliminates fragmentation of data packets allowing
for faster Internet data transfer rates.
This means faster browsing, quicker downloads, and
improved Internet performance.
TweakDUN won ZDNet Editors' Pick with a 5-star rating!
"TweakDUN is the most-cost efficient option
available for boosting your 'net speed."
-- Stroud's Consummate Winsock
Applications Review 4/21/98
You can order and download your copy of TweakDUN,
from RealStore simply by visiting:
http://www.realstore.com/specials/tweakd.html
TweakDUN is guaranteed to speed up your dial-up connection
or your money back. (Return required within 30 days of purchase
for refund.)
-------------------------------------------------------
NEW REALPLAYER AND REALPLAYER PLUS G2 NOW AVAILABLE
I also wanted to tell you about the 'pre-beta' preview
release of RealPlayer and RealPlayer Plus G2. These new
G2 players deliver dramatic quality improvements,
including entirely new features like a 10-channel
graphic equalizer and more. To download now, visit:
--> http://www.real.com/50/tweakpre.html
-------------------------------------------------------
Thank you for using RealNetworks products,
Maria Cantwell
Senior Vice President
RealNetworks, Inc.
Seattle, WA USA
---------------------------------------------
ABOUT THIS E-MAIL
This e-mail was sent to users of RealPlayer
software who indicated a preference during
the download or installation process to receive
notification of new RealNetworks products or
services via e-mail.
For information about subscribing to or
unsubscribing from future announcements, visit
http://www.real.com/mailinglist/index.html
From CTIA_Daily_News at um2.unitymail.com Thu Jul 9 10:13:32 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Thu, 9 Jul 1998 10:13:32 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 9, 1998
Message-ID: <199807091702.MAA14127@mailstrom.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM. Please click on the icon / attachment
for the most important news in wireless communications today.
WIRELESS IT '98, The Next Generation in Personal
Computing & Communications October 12-14,
Las Vegas, Nevada Call (202) 785-0081 for more information!
=============================================
From Fr0gFAQ at aol.com Thu Jul 9 10:43:03 1998
From: Fr0gFAQ at aol.com (Fr0gFAQ at aol.com)
Date: Thu, 9 Jul 1998 10:43:03 -0700 (PDT)
Subject: Hey!
Message-ID:
�
To: Fr0gFAQ at aol.com
Subject: Hey!
From: Fr0gFAQ at aol.com
Date: Thu, 9 Jul 1998 11:30:53 EDT
Hello,
Click Here Please!
Thanx
From MCROACH at delphi.com Thu Jul 9 12:32:54 1998
From: MCROACH at delphi.com (MCROACH at delphi.com)
Date: Thu, 9 Jul 1998 12:32:54 -0700 (PDT)
Subject: journalist seeking help...
Message-ID: <01IZ79RMKJWI8ZYMJZ@delphi.com>
Dear Cypherpunks:
I write for the New York Times Magazine. My editor
wants to profile, as he put it, "a group of hackers
who've gone legit" and now do consulting for
corporations. Paul Kocher of Cryptography Research
thought you guys might have a couple suggestions. He
mentioned a co-op in Boston, but couldn't recall their
name. Also -- anyone know what Robert Morris Jr. is up
to? Or how to contact him?
Thanks very much.
Mary Roach
From attila at hun.org Thu Jul 9 12:37:00 1998
From: attila at hun.org (attila)
Date: Thu, 9 Jul 1998 12:37:00 -0700 (PDT)
Subject: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To:
Message-ID:
On Thu, 9 Jul 1998, Declan McCullagh forwarded from TIME:
>...
> The revolution will not be televised -- at least not in Afghanistan.
> The Taliban government today banned TV, and gave Afghans 15 days to
> get rid of all sets and VCRs. After that, if the organization's
> enforcers find one in your house, it will be destroyed and you will be
> punished.
>...
sounds good to me; I've raised 5 children who know how to _read_.
I've never owned a television, never saw the need to bring cancer
into the home. TV could have been one of the greatest educational
tools in the existence of mankind --and, what is it? nothing more
than bread and circus for the mass, a tool for social reoganization
and the destruction of the family.
babysitter? momma's little helper? not really; a creator of a
vast unthinking social wasteland --which, of course, fits the
policy goals of Hillay's Global Village where everybody is just
another butterscotch pudding to her recipe.
__________________________________________________________________________
go not unto usenet for advice, for the inhabitants thereof will say:
yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__
From lithron at bellsouth.net Thu Jul 9 12:38:25 1998
From: lithron at bellsouth.net (lithron)
Date: Thu, 9 Jul 1998 12:38:25 -0700 (PDT)
Subject: "Classified" Ads (Was Re: RSA in perl illegal to export) (fwd)
In-Reply-To: <199807091306.IAA03984@einstein.ssz.com>
Message-ID: <35A51BD8.4378ADC9@bellsouth.net>
This does sound like a fun way to protest. I'd be willing to donate
a little cash if people would send me copies of the papers that it
gets
put in. Heh.. it would be good for a laugh to visit an airport on
that
day just to see all the people taking news papers with them on
international flights :)
Anyone want to take a stab at a date?
lithron at bellsouth dot net
Jim Choate wrote:
>
> Forwarded message:
>
> > Date: Thu, 9 Jul 1998 00:47:18 -0500 (CDT)
> > From: Xcott Craver
> > Subject: "Classified" Ads (Was Re: RSA in perl illegal to export)
[snip snip snip]
> [text deleted]
>
> I like this idea a lot also. I'm definitely interested...
>
> Let me look into it but I suspect I could cover Austin, Houston, Dallas, Ft.
> Worth, & El Paso in Tx. To ensure accuracy the actual text should be faxed in
> if not sent via email.
>
> Other than a list of current objectionable issues what else should be sent
> in? It would be worth a point or two to have it signed 'Publius'.
From ericm at lne.com Thu Jul 9 13:28:00 1998
From: ericm at lne.com (Eric Murray)
Date: Thu, 9 Jul 1998 13:28:00 -0700 (PDT)
Subject: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To:
Message-ID: <199807092027.NAA02656@slack.lne.com>
attila writes:
>
> On Thu, 9 Jul 1998, Declan McCullagh forwarded from TIME:
>
> >...
> > The revolution will not be televised -- at least not in Afghanistan.
> > The Taliban government today banned TV, and gave Afghans 15 days to
> > get rid of all sets and VCRs. After that, if the organization's
> > enforcers find one in your house, it will be destroyed and you will be
> > punished.
> >...
>
> sounds good to me; I've raised 5 children who know how to _read_.
>
[rant against tv deleted]
While I agree that TV is a brain-sucking void, banning any
form of dissemination of information is a Bad Thing and
a sign of serious government oppression.
First the came for the TV sets, and I didn't say anything because
TV is merely bread and circuses for the masses.
Then they came for my radio, and I didn't complain because
I can't get Rush very good anyhow.
Then they came for the newspaper, and that really pissed me off, so
I wanted to protest. I wanted my protest to get a lot of exposure, so
I went to call the TV and radio stations but they don't exist any more.
> policy goals of Hillay's Global Village where everybody is just
> another butterscotch pudding to her recipe.
I'd rather be dealing with Hillary than the Talliban.
--
Eric Murray Chief Security Scientist N*Able Technologies www.nabletech.com
(email: ericm at lne.com or nabletech.com) PGP keyid:E03F65E5
From pooh at efga.org Thu Jul 9 13:34:22 1998
From: pooh at efga.org (Robert A. Costner)
Date: Thu, 9 Jul 1998 13:34:22 -0700 (PDT)
Subject: "Classified" Ads (Was Re: RSA in perl illegal to export)
In-Reply-To: <199807090001.RAA20366@puuoo.eng.sun.com>
Message-ID: <3.0.3.32.19980709163207.03355c8c@mail.atl.bellsouth.net>
At 12:47 AM 7/9/98 -0500, Xcott Craver wrote:
> We start a mailing list or website (a website would be better)
> of volunteers and the newspapers they intend to place ads in.
> Major papers would hopefully get multiple copies of the ad in
> multiple sections. All on the same day.
If there is any real interest in doing this as a group, I'll be happy to
setup a web site and a mail list for this.
Does newsprint from most major US papers still qualify as "A small group
of internet users manufacturing and distributing tons of high end munitions
for export overseas?"
-- Robert Costner Phone: (770) 512-8746
Electronic Frontiers Georgia mailto:pooh at efga.org
http://www.efga.org/ run PGP 5.0 for my public key
From hrook at exchange.microsoft.com Thu Jul 9 14:27:38 1998
From: hrook at exchange.microsoft.com (Harvey Rook (Exchange))
Date: Thu, 9 Jul 1998 14:27:38 -0700 (PDT)
Subject: FC: Forget Internet restrictions -- how about banning TV?
Message-ID: <2FBF98FC7852CF11912A00000000000108A78AE3@DINO>
So attila, Afghanistan will be a better place because they've banned
television?
I think you miss the point.
Harv.
From: attila [mailto:attila at hun.org]
> Sent: Thursday, July 09, 1998 12:37 PM
> To: Declan McCullagh; cypherpunks
> Subject: Re: FC: Forget Internet restrictions -- how about banning TV?
>
>
> On Thu, 9 Jul 1998, Declan McCullagh forwarded from TIME:
>
> >...
> > The revolution will not be televised -- at least not in
> Afghanistan.
> > The Taliban government today banned TV, and gave Afghans
> 15 days to
...deletia...
>
> sounds good to me; I've raised 5 children who know how to _read_.
>
> I've never owned a television, never saw the need to bring cancer
> into the home.
...deletia...
From mgraffam at mhv.net Thu Jul 9 14:31:00 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Thu, 9 Jul 1998 14:31:00 -0700 (PDT)
Subject: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To:
Message-ID:
On Thu, 9 Jul 1998, attila wrote:
> On Thu, 9 Jul 1998, Declan McCullagh forwarded from TIME:
>
> >...
> > The revolution will not be televised -- at least not in Afghanistan.
> > The Taliban government today banned TV, and gave Afghans 15 days to
> > get rid of all sets and VCRs. After that, if the organization's
> > enforcers find one in your house, it will be destroyed and you will be
> > punished.
> >...
>
> sounds good to me; I've raised 5 children who know how to _read_.
>
> I've never owned a television, never saw the need to bring cancer
> into the home. TV could have been one of the greatest educational
> tools in the existence of mankind --and, what is it? nothing more
> than bread and circus for the mass, a tool for social reoganization
> and the destruction of the family.
I suspect one day someone will be saying something similar about the
net.
I have a small TV and cable, which sits a few feet away from my computer.
If I could, I'd just fly around the country going to Mets and Yankees
games.. and of course during the "slow season" I can always go to football
games.
TV is what you make of it. I suppose if a kid sits in a room by himself
and vegges out in front of it, it does more harm than good.. on the
other hand, when you're 15 years old and can't talk to your dad about
much because its just that time in life, I'd be willing to bet baseball
or sports is still neutral enough territory. I don't see much wrong
with crowding around the idiot box as a family or group, if it gives
people something to talk about. Politics and religion can be fun now and
then, but we all get weary of fighting the same battles.
Sure, lots of TV is garbage.. but hell.. look around.. a whole lot of
the net is too.
It isn't TV's fault, and it isn't the net.. the reason why so many things
suck is because we made them. More often than not, we're the garbage.
hmm.. I had hoped this message might be uplifting. Guess not.
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
Be a munitions trafficker: http://www.dcs.ex.ac.uk/~aba/rsa/rsa-keygen.html
#!/bin/perl -sp0777i
Message-ID:
On Thu, 9 Jul 1998, Eric Murray wrote:
> [snip]
>
>Then they came for the newspaper, and that really pissed me off, so
>I wanted to protest. I wanted my protest to get a lot of exposure, so
>I went to call the TV and radio stations but they don't exist any more.
>
point duly noted. however, TV as a degenerative (self eating
watermelon) force is an option --which I took by refusing it
the privilege of its one eyed stare. never owned one as the
fraction of worthwhile programming is overwhelmed by mind-fuck.
>> policy goals of Hillay's Global Village where everybody is just
>> another butterscotch pudding to her recipe.
>
>I'd rather be dealing with Hillary than the Talliban.
>
by all means. Hillary is an unprincipled, amoral automan who
expects her comforts.
the Talliban/Taleban/or_however_whichever_network_spells_it is
religious fanaticism; no worse than the Catholic Inquisition I
would expect, but that's not saying much.
Hillary can be beaten back into her cage... Taleban fanaticism
ends only with their death(s).
There is no safety this side of the grave. Never was; never will be.
________________________________________________________________attila__
From attila at hun.org Thu Jul 9 14:53:07 1998
From: attila at hun.org (attila)
Date: Thu, 9 Jul 1998 14:53:07 -0700 (PDT)
Subject: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To: <2FBF98FC7852CF11912A00000000000108A78AE3@DINO>
Message-ID:
On Thu, 9 Jul 1998, Harvey Rook (Exchange) wrote:
>So attila, Afghanistan will be a better place because they've banned
>television?
>
>I think you miss the point.
>
>Harv.
>
I didnt miss the point, Harv...
at least I am free to choose whether or not I grant the one-eyed
beast an audience, the Taleban have precluded that choice.
TV _had_ enormous potential; it has been squandered. ergo, I chose.
__________________________________________________________________________
To be a ruler of men, you need at least 12 inches....
_________________________________________________________________ attila__
From jya at pipeline.com Thu Jul 9 15:52:29 1998
From: jya at pipeline.com (John Young)
Date: Thu, 9 Jul 1998 15:52:29 -0700 (PDT)
Subject: Bye Homeland Liberty
Message-ID: <199807092252.SAA07453@camel14.mindspring.com>
Note the single mention of cyber warfare, hooked to chemical
and biological dangers.
http://www.defenselink.mil/news/
Remarks by Deputy Secretary of Defense John J. Hamre
Commemorating the 200th Anniversary of the Recall of
George Washington to Active Duty
Mount Vernon, Virginia
Saturday, July 4, 1998
[Snip]
Two hundred years ago, Washington was called back to service
to prepare America's defenses. Today, the American homeland
faces a new and different danger. The threat is not from overt
invasion, but from the sinister dangers of chemical, biological
and cyber warfare. Chemical and biological weapons are a poor
man's atomic bomb. They are easier to build, to hide, and to
deliver to their targets. They are especially appealing to
small terrorist cells and known individuals who can not challenge
American military superiority on the battlefield.
As in Washington's time, America is not yet fully prepared for this
new challenge. We too must organize, plan, and act anew. We too
must recognize that complacency and delay is dangerous. President
Clinton and Secretary of Defense Cohen have made preparing the
American homeland against chemical and biological weapons a top
priority. The continental United States has not confronted a
direct threat to its territory in this century precisely because
we have confronted threats before they touched our shores. But
this is a new era, where adversaries can bring their fight to our
doorstep. National security now must assume a new dimension.
The Department of Defense and the intelligence community must work
hand in hand with law enforcement to deal with this far-reaching
threat. We are taking steps to improve our knowledge of hostile
elements and their plans. We are reorganizing the Defense
Department to integrate our approach to counter-proliferation of
these terrible new weapons, and we are launching new programs to
help local emergency response forces to mitigate the effects of
chemical and biological attack.
[Snip]
Shortly, we will commemorate this day by planting a new tree,
adding to Washington's beloved "shades of Mount Vernon." We place
it here as a mark of gratitude to a leader who accepted the burdens
of public service to defend our young republic. We also place it
here to mark our commitment to ensure future generations will live
in peace and security. One hundred years from now we will not be
here, but I hope Americans will gather under this tree to celebrate
the 300th anniversary of Washington's act of patriotic sacrifice.
And I hope they will also say, of us, that we too left a measure
of our day and, by our deeds, we too preserved the safety of this
sweet land of liberty.
Thank you all for coming today.
-END-
From aba at dcs.ex.ac.uk Thu Jul 9 16:19:26 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Thu, 9 Jul 1998 16:19:26 -0700 (PDT)
Subject: "Classified" Ads (Was Re: RSA in perl illegal to export)
In-Reply-To: <3.0.3.32.19980709163207.03355c8c@mail.atl.bellsouth.net>
Message-ID: <199807092311.AAA07749@server.eternity.org>
Robert writes:
> If there is any real interest in doing this as a group, I'll be happy
> to setup a web site and a mail list for this.
and Jim Choate said similar.
A constructive comment: in my obeservation setting up mailing lists
for mini-projects is a sure way to reduce the number of participants
in the project.
A few years back when we were all cracking RC4, it was done right here
on the cypherpunks list. There were no new lists created. I suspect
that the CPU resoureces contributed benefitted orders of magnitude due
to this as people got swept up in the fun of it and joined in. (I
won't volunteer Perry's list as he tries to keep it focussed and I
suspect a few hundred posts on adverts and PR would result in him
turning up the squelch). So I suggest use cypherpunks list (*).
(subscribe to majordomo at cyberpass.net with message: subscribe
cypherpunks, for those on cryptography).
If we had on the other hand started a list, I suspect a few dozen
might have subscribed, and the rest of us would have forgotten about
it, and heard no more feedback on it.
Lets go for it, I'll join in also, but please in the interests of it's
chances of success, keep it to the cypherpunks list.
Some comments on the thread of what would be most effective:
Anyone with a tame PR expert they can quiz about the best way to
maximise publicity:
- what stunt would create most publicity
- who in the press should be contacted
- which computer companies and who to contact with in them to donate
funds if funds are required (eg advert)
it may be for example that plenty of publicity can be had for free
with a suitable stunt, if media can be interested.
Perhaps (or perhaps not) Peter Junger could be involved, or
referrenced to tie the two togther in the presses mind, and he would
perhaps make a good person for media hacks to interview also.
Adam
(*) Or if someone gets keen perhaps a filtered version of cypherpunks
selecting only posts on this topic might be useful to a few people --
cpunks is high volume.
From stuffed at stuffed.net Thu Jul 9 18:25:24 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Thu, 9 Jul 1998 18:25:24 -0700 (PDT)
Subject: Larry Flynt hustles Congress/Monica Lewinskookies
Message-ID: <19980709233913.21088.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 269 bytes
Desc: not available
URL:
From whgiii at invweb.net Thu Jul 9 20:22:07 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Thu, 9 Jul 1998 20:22:07 -0700 (PDT)
Subject: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To:
Message-ID: <199807100325.WAA005.93@geiger.com>
-----BEGIN PGP SIGNED MESSAGE-----
In , on 07/09/98
at 09:47 PM, attila said:
>Hillary can be beaten back into her cage... Taleban fanaticism
> ends only with their death(s).
Yes, but more importantly: Is there a bag limit?
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: OS/2: Windows with bullet-proof glass.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNaWJx49Co1n+aLhhAQFqhQP/QudW4N6LjfI1gbIdQ852BG17R8xhhe3f
mLpBzL3jmTndNbp80Gve4MOLi5Nu73j1G/FANPK5qPmmG0CIs03emgV0gpe0ow3s
wrel8TcUV4ugFc5SjQd9qEpZt+4DOrYnhk7oHEQFZJeW/QSfpRRSdYGMWN51dMlf
66BNE01a9QI=
=k2kr
-----END PGP SIGNATURE-----
From jerry at weboneinc.net Thu Jul 9 20:49:25 1998
From: jerry at weboneinc.net (Jerry)
Date: Thu, 9 Jul 1998 20:49:25 -0700 (PDT)
Subject: no subject
Message-ID: <199807092321.XAA23250@steve1.weboneinc.com>
------------------------------------------------------------------
This is a targeted mailing to adult webmasters or persons involved
in the adult internet entertainment industry. If you have received
this message by mistake, please delete it and accept our apologies.
------------------------------------------------------------------
Just wanted to let you know about the highest paying Gay referral program:
GAY CASH NETWORK
$25 per member, online realtime stats, high signup ratios and more!
For more info please go to:
http://208.156.131.103/gay/
Also if you have straight sites check out X-CASH at:
http://208.156.131.103/xtv/
From attila at hun.org Thu Jul 9 21:01:25 1998
From: attila at hun.org (attila)
Date: Thu, 9 Jul 1998 21:01:25 -0700 (PDT)
Subject: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To: <199807100325.WAA005.93@geiger.com>
Message-ID:
On Thu, 9 Jul 1998, William H. Geiger III wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>In , on 07/09/98
> at 09:47 PM, attila said:
>
>>Hillary can be beaten back into her cage... Taleban fanaticism
>> ends only with their death(s).
>
>Yes, but more importantly: Is there a bag limit?
>
bag limit? heavens, no! in fact, the last I heard there was a $5/ear
bounty. and someone else told me they, like lawyers, taste "just
like chicken" --bok-bok--
__________________________________________________________________________
go not unto usenet for advice, for the inhabitants thereof will say:
yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__
From eva654 at hotmail.com Thu Jul 9 21:23:56 1998
From: eva654 at hotmail.com (eva654 at hotmail.com)
Date: Thu, 9 Jul 1998 21:23:56 -0700 (PDT)
Subject: Now See Amazing World Record Sex!
Message-ID:
Attention!
Warning! Adults Only! Warning! Adults Only!
If you are under 21 years of age, or not interested in sexually
explicit material... please hit your keyboard delete button now
and please excuse the intrusion. Removal instructions appear
at the end of this email.
Available NOW for only $9.95! Next 10 Days Only!
WORLD RECORD SEX!
Be There! See It Now On Video! Unbelievable ...But True!
You Won't Believe Your Eyes!!! [As Seen on the Howard Stern Show]
"The World's Biggest Gang Bang"
See sexy Annabel Chong as she sets the world Gang Bang Record
in this fantastic video documentary that chronicles her 24 hour
sexathon with 251 men engaging in sexual intercourse and oral
sex with her! Don't worry, you won't have to stay up 24 hours
to watch it all. We've selected only the most exciting and red
hot scenes for you...all in breathtaking living color with plenty of
extreme close-ups! This video is guaranteed to knock your socks
off and leave you breathless! You've never seen anything like it!
Annabel takes on five men at a time! 90 minutes! Order Today!
Only $9.95 plus $3 shipping and handling [Total $12.95].
"GANG BANG II"
The Record Breaker!!! Starring Jasmin St. Claire!
See Beautiful and Voluptious Jasmin St. Claire shatter Annabel's
gang bang record by taking on 300 men in one 24 hour sex session!
You won't believe your eyes at all the hot firey action that you will
see as the new world record is established before your eyes as
Jasmin takes on five men at a time for sexual intercourse and
oral sex! Your friends will break down your door to see this video!
You'll be the most popular guy in town! The action is truly unreal
and you will see the best of it in living life-like color! Order Today
and see Jasmin break the record! 90 minutes. Only $9.95 plus
$3 shipping and handling [total $12.95].
Also Available...
The Uncensored Authentic Underground...
Pamela Anderson Lee & Tommy Lee
Sex Video Tape!
Everyone is talking about this exciting video! See Pam and
Tommy engaging in sexual intercourse and oral sex in the car,
on the boat and much, much more! A real collectors video! 30 minutes.
Only $9.95 plus $3 shipping and Handling [total $12.95]
"Tonya Harding Wedding Night Sex Video"
Now see the beautiful Ice Skating Shame of the Olympics
Tonya Harding engaging in sexual intercourse and oral
sex on her wedding night with husband Jeff Gillooly!
This "Bad Girl" is Hot! Don't miss this video! 30 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]
"Traci...I Love You" Starring Traci Lords
Now see the most beautiful and popular porn star in her last
adult video before she hit the big time! It's the blockbuster of
the year...sensual...fiery and exposive! Traci Lords in her most
erotic and controversial film ever! Don't Miss It! 90 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]
EMAIL SPECIAL!
ORDER ANY FOUR VIDEOS AND GET THE FIFTH ONE FREE!!!
Your order will be shipped via First Class Mail. All Shipments in plain unmarked wrapper.
For Priority Mail - Add $5
For Overnight Express - add $15
You can order by Phone, Fax, Mail or Email.
We accept all Major Credit Cards and checks by phone or fax.
Visa - MasterCard - American Express - Discover
10 Day Money Back Guarantee! We know that you will be pleased with these Videos!
To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD
Send email to our special email address below:
connie274 at juno.com
[Note: If you order by email and do not receive an email acknowledgement within 24 hours, please phone our office at
718-287-3800]
Phone our office 9am to 10 pm [eastern time]
[718] 287-3800 to Order By Phone for FASTEST SERVICE!
We can accept your credit card or check by phone
Fax Your Order 24 hours per day to [718] 462-5920
You can fax your credit card information or your check
Order by mail by sending $12.95 per video, cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to
TCPS, INC.
4718 18th Ave. Suite 135
Brooklyn, NY 11204
Make Checks & Money Orders Payable to TCPS, Inc.
New York State Residents Please Add 85 cents for Sales Tax per Video!
You must be over 21 years of age to order and give us your date of birth with your order!
The Following Order Form is for Your Convenience!
.............................................................................................................
Please ship me the following video tape[s]!
Qty___________Annabel Chong "World's Biggest Gang Bang"
Qty__________"Gang Bang II" Jasmin St. Claire
Qty___________"Pamela & Tommy Lee Sex Video Tape"
Qty_________ "Tonya Harding Wedding Night Sex Video Tape"
Qty__________"Traci I Love You" Traci Lords
at $9.95 each plus $3.00 for shipping and handling per tape
[$12.95 per video or "SPECIAL $51.80 for ALL FIVE"!
Credit Card #______________________________Exp Date___
I hereby represent that I am over 21 years of age.
My date of birth is_________________________________
Signature______________________________________________
Ship to: Name_______________________________________
Address____________________________________________
City________________________State___________Zip________
Area Code and Home Phone [ ]___________________________
Fax # [ ]______________________________________________
Email Address___________________________________________
To remove your name from our mailing list, send us an email with
remove in the subject line. This is a one time offer and you should not hear from us again!
FOREIGN ORDERS -Add $15us if you desire Air Parcel Post Shipment. We ship all over the world.
By deleting your unwanted E-Mail you waste one keystroke, yet
by throwing away paper mail you waste our planet! SAVE THE
TREES and support internet E-Mail instead of paper mail!
[C] Copyright TCPS 1998
From dformosa at cit.nepean.uws.edu.au Fri Jul 10 04:48:20 1998
From: dformosa at cit.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Fri, 10 Jul 1998 04:48:20 -0700 (PDT)
Subject: FC: Forget Internet restrictions -- how about banning TV?
In-Reply-To:
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
On Thu, 9 Jul 1998, attila wrote:
> On Thu, 9 Jul 1998, Eric Murray wrote:
> > [snip]
> >
> >Then they came for the newspaper, and that really pissed me off, so
> >I wanted to protest.
[...]
> point duly noted. however, TV as a degenerative (self eating
> watermelon) force is an option --which I took by refusing it
> the privilege of its one eyed stare.
However you have the right to choose not to watch TV, and we have the
right to watch TV. Its not weather TV is good or bad, but do we have the
ablity to make that decistion on our own. Indeed if I wish to do
something that is degenerative and self-destructive I should be allowed
to.
- --
Please excuse my spelling as I suffer from agraphia see the url in my header.
Never trust a country with more peaple then sheep. ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQCVAwUBNaXwk6QK0ynCmdStAQFFDQQA0JH1omnj/kAsjG9y8pADYpwSfwXs0CvR
10LvVcplpHz4XECKmnvzkccT8zG1qBpyDAHH5QFfpwbO6RG0Ig5E9JvEFHMY5aLG
z0WYq3hEATH07ivaVADTa+H/9dI0k9nJxFc8i1jFDNpDm8JR8o3aF7tSP0F/uja1
3osAe406fNY=
=ZBGz
-----END PGP SIGNATURE-----
From 24893232 at 03820.com Fri Jul 10 06:01:37 1998
From: 24893232 at 03820.com (Lisa)
Date: Fri, 10 Jul 1998 06:01:37 -0700 (PDT)
Subject: For Your Eyes Only
Message-ID: <007801bda6a2$0673b140$37ab9dcc@ativg.co>
Hi...
I would like to inform you of a great sex site on the web. it contains everything you will ever dream of.
There is also a Live Sex Show from Amsterdam, with sound and a chat box.
Go check it out
http://members.xoom.com/moonshine_81/index.html
Loads of Free Videos and Free Pictures
Love
Lisa
From Mia.Westerholm at DataFellows.com Fri Jul 10 07:02:52 1998
From: Mia.Westerholm at DataFellows.com (Mia Westerholm)
Date: Fri, 10 Jul 1998 07:02:52 -0700 (PDT)
Subject: Data Fellows Premiers F-Secure VPN+
Message-ID: <3.0.2.32.19980710155153.00a4b7c0@smtp.DataFellows.com>
For immediate release
10 July 1998
DATA FELLOWS PREMIERES F-SECURE VPN+
New Software Line Offers IPsec-Based Strong Security for Mission Critical
Networks
Helsinki, Finland, July 10, 1998 -- Data Fellows, the global leader in
Internet security solution development, has begun shipping its new F-Secure
VPN+ product family.
Compliant with the IEFT's (Internet Engineering Task Force) latest IPsec
standards (Internet Protocol Security standard), F-Secure VPN+ provides a
peerless software - only solution for both large corporate networks and remote
or small office networking. The product line supports several different
encryption algorithms, including triple DES (168-bit), DES (56-bit), Blowfish
(40-446 bit), and CAST128 (40-128 bit). All VPN+ products are centrally
administered with an easy-to-use policy management tool and they also
support centrally managed automated installation.
F-Secure VPN+ operates at the network (IP protocol) level, which is invisible
at the application and end-user level. The product line does not require
special hardware, and the ordinary user does not even notice its presence
since it requires no changes to network applications or their configurations.
F-Secure VPN+ works in conjunction with existing routers and firewalls, off-
loading encryption functions from those devices. By combining the products in
the F-Secure VPN+ line, companies of any size can use either the Internet or
cost-effective public networks to create virtual private networks without
requiring special hardware.
The F-Secure VPN+ family consists of the following products:
- F-Secure VPN+ Client, which operates in Windows and Solaris workstations
and encrypts all data traffic from such a workstation to an F-Secure VPN+
Gateway, a server equipped with F-Secure VPN+ Server, or another
workstation equipped with F-Secure VPN+ Client.
- F-Secure VPN+ Server, which operates in Windows NT or Solaris
servers and encrypts all data traffic from the server to workstations equipped
with F-Secure VPN+ Client.
- F-Secure VPN+ Gateway, which encrypts all data traffic from a LAN
through a WAN using the IPsec protocol to other LANs, or to workstations
equipped with encryption software. A user can connect to a VPN+ Gateway
using either another VPN+ Gateway or VPN+ Client.
- F-Secure VPN+ Enterprise Gateway, which encrypts all data traffic from a
Local Area Network (LAN) through a Wide Area Network (WAN) using the IPsec
protocol to other LANs, and to workstations equipped with encryption software.
The Enterprise version allows simultaneous connections from both VPN+
Clients and VPN+ Gateway devices.
"What is revolutionary about F-Secure VPN+ is that a virtual
private network can now be built cost-effectively between just two
workstations," says Mr. Teemu Lehtonen, Product Manager for Data Fellows.
"This is great news for small and medium sized organizations. Large
organizations can also utilize F-Secure VPN+ to extend their corporate network
to sites outside the corporate domain."
F-Secure VPN+ integrates fully with the recently-introduced Data Fellows'
F-Secure FileCrypto and F-Secure Anti-Virus products. Together, these
products offer the most complete security solution for modern corporations.
The products support centralized policy based management.
F-Secure VPN+ is available from Data Fellows' resellers around the world.
The products have been tested for interoperability with almost 20 other
vendors' (including Cisco Systems, IBM and Check Point) IPsec-standardized
products.
About Data Fellows
Data Fellows is one of the world�s leading developers of data security
software. The company�s groundbreaking F-Secure products provide a unique
combination of globally available strong encryption and revolutionary
anti-virus software. The integrated F-Secure software family provides
complete security solutions for enterprises of any size. It includes file
encryption and IPsec communication encryption products, VPN gateways,
SSH-based secure remote management software, easy-to-use solutions for
distributed DNS management, and a full range of anti-virus products for
workstations, servers and gateways. Data Fellows is also the developer of
the award-winning F-PROT Professional anti-virus engine, which is now an
integral part of the multiple engine structure of F-Secure Anti-Virus.
Data Fellows has offices in San Jose, California, and Helsinki, Finland. In
addition, it offers a worldwide network of technical support, training and
distribution in over 80 countries.
Since the company was founded in 1988, its annual net sales growth has
consistently been over 80%. Data Fellows belongs to an elite group of
companies with a triple-A rating from Dun&Bradstreet. The company is
privately owned.
For further information, please contact:
USA:
Data Fellows Inc.
Mr. Pirkka Palomaki, Product Manager
Tel. +1 408 938 6700
Fax +1 408 938 6701
E-mail: Pirkka.Palomaki at DataFellows.com
Finland:
Data Fellows Ltd.
Mr. Teemu Lehtonen, Product Manager
Tel. +358 9 859 900
Fax. +358 9 8599 0599
E-mail: Teemu.Lehtonen at DataFellows.com
or visit our web site at http://www.DataFellows.com
����������������������������������������������������
Mia.Westerholm at DataFellows.com
http://www.DataFellows.com
Data Fellows Ltd.
PL 24
FIN-02231 ESPOO, FINLAND
Tel. +358 9 859 900
Fax. +358 9 8599 0599
From billp at nmol.com Fri Jul 10 07:31:34 1998
From: billp at nmol.com (bill payne)
Date: Fri, 10 Jul 1998 07:31:34 -0700 (PDT)
Subject: FOIA, Navajo code talkers, Rule 54(b) and PROGRESS
Message-ID: <35A624DB.328F@nmol.com>
Friday 7/10/98 7:39 AM
John Young
I am reading http://www.jya.com/nsa-foia-req.htm
This FOIA stuff appears to be catchy.
Will you do a pro se lawsuit in case NSA does not come across?
There is some great stuff on the web on on that subject.
http://jya.com/whpfiles.htm
I just found
navahode.htm Navaho Code Expert Dies
June 26, 1998 http://www.jya.com/navahode.htm
NavaJo is spelled different in the southwest.
Carpet intaller George Chavez junior told me yesterday that his father
George senior was a code talker.
I told Chavez I would send him a copy of what you posted.
Chavez told me that Carl Gorman, RC Gorman's father
http://www.iwaynet.net/~sabrina/gorman.html
was also a code talker.
Chavez commented that RC is a 'bit wierd.'
Chavez is an UNMISTAKABLE Navajo native American - complete with LONG
pony tail.
Native Americans in the southwest frequently have TWO names. One an
anglo or hispanic
name and one their native American name. Like Star Road or White Sun
made famous by Taos NM
artist Blumenschein.
I'll have to ask Chavez if he has another name.
Life is to short to do everything in line.
I lead multiple lives, that is why I have more adventures.
Adam Fortunate Eagle, New Mexican, Sunday, 21 Aug 94
Morales and I believe we are going to win our lawsuits a result of
technical legal mistakes made both in district court and the two SHOW
CAUSE orders I mailed to you. Partial rulings can cause problems.
Rule 54(b) is VERY COMPLEX.
Life is ABOUT back to normal.
First there was PATTY'S floor tile project in about March.
Then the trip to Austin to see our kids and new granddaughter
Then there was THE FLOOD. Which was CAUSED BY A MICROCONTROLLER
SOFTWARE
DESIGN AND IMPLEMENTATION ERROR - blunder! And perhaps some DEFICIENT
washing machine hardware design too.
Next was the about month delay caused by getting the Allstate insurance
adjuster to come around to the carpet sellers, our, and the Allstate
insurance agent way of thinking about how much Allstate should pay.
Next was the several week delay ordering the carpet.
Last Thursday the downstairs carpet got installed.
Thursday, also, I spent in the ER - which stopped the Friday carpet
completion project.
So yesterday the carpet installers finished.
Looks GREAT! And both the carpet installers were real nice guys.
And some legal filings while all of the other above was going on.
So the next two orders of business are
1 finish the digital FX
2 conclude our legal fights with SETTLEMENT - before things get WORSE.
On your NSA FOIA I suggest that you seek a waiver of fees since the
material you seek
benefits the public.
I just saw http://www.jya.com/crypto.htm
DoE: Pay Bill Payne
DoJ: Free Jim Bell
DoJ: Free Kevin Mitnick
THANK YOU.
Best
bill
From CTIA_Daily_News at um2.unitymail.com Fri Jul 10 09:53:00 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Fri, 10 Jul 1998 09:53:00 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 10, 1998
Message-ID: <199807101642.LAA11829@mailstrom.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.� Please click on the icon /
attachment
for the most important news in wireless
communications today.
WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
=============================================
From sales at no-isp.com Fri Jul 10 11:04:46 1998
From: sales at no-isp.com (sales at no-isp.com)
Date: Fri, 10 Jul 1998 11:04:46 -0700 (PDT)
Subject: New Way to Access Internet
Message-ID: <899909450@no-isp>
Dear User,
We do not wish to send e-mail to anyone who does not want to receive it.
If you are not interested , please reply to sales at no-isp.com with "REMOVE"
in the subject line and you will be promptly removed from our database.
Thank you for your patience and we apologize for intruding on your time
and privacy.
If, however, you are looking for a fast and easy way to dial into the
Internet whenever you want and from wherever you are, then read on.
Our *Instant Access* service gives you *Internet-on-demand* and you DON'T
need to subscribe to an Internet Service Provider !!
No monthly charges and no setup fee
No registration of any kind required
No Proxy in the way
Absolute ANONYMOUS login !!
Unlimited personal access duration
Fast connection
Access from all over the world
Nothing is censored on this network
Visit our site at www.no-isp.com for full details now.
Happy surfing!
From howree at cable.navy.mil Fri Jul 10 11:52:51 1998
From: howree at cable.navy.mil (Reeza!)
Date: Fri, 10 Jul 1998 11:52:51 -0700 (PDT)
Subject: no subject
In-Reply-To: <199807092321.XAA23250@steve1.weboneinc.com>
Message-ID: <3.0.5.32.19980710205216.0089ed30@205.83.192.13>
At 11:21 PM 09 07 98 GMT, Jerry wrote:
--snip--
Message-ID:
On Fri, 10 Jul 1998, Declan McCullagh wrote:
> Remember when your underage friend ginned up that fake driver's
> license to go bar-hopping? Soon it may be a federal crime, punishable
> by serious fines and up to 15 years in the slammer. The Senate
> Judiciary Committee yesterday unanimously approved the "Identity Theft
> and Assumption Deterrence Act," a clunkily named bill that bans
> obtaining, possessing or using ID "other than that issued lawfully for
> the use of the possessor."
> [...remainder snipped...]
>
oh, shit. does that mean I will be forced to tell everyone my real
name is FUD? or TruthMonger? or, even HugeCajones? at least it's
not DV_KOTM!
speaking of the late, lamentable foul mouth... whatever happened to
dmitri?
attila out... while I can still be outing attila.
From ulf at REPLAY.COM Fri Jul 10 13:26:22 1998
From: ulf at REPLAY.COM (ulf at REPLAY.COM)
Date: Fri, 10 Jul 1998 13:26:22 -0700 (PDT)
Subject: Mixmaster protocol
Message-ID: <199807102025.WAA06967@basement.replay.com>
I'd like to get feedback on the clarity of this draft describing the
Mixmaster protocol.
I'll post the proposed extensions for version 3 later.
Mixmaster Protocol
==================
Abstract
Most e-mail security protocols only protect the message body, leaving
useful information such as the the identities of the conversing
parties, sizes of messages and frequency of message exchange open to
adversaries. This document describes Mixmaster, a mail transfer
protocol designed to protect electronic mail against traffic analysis.
Table of Contents
1. Introduction
2. The Mix-Net Protocol
2.1 Message Creation
2.2 Remailing
3. Message Format
3.1 Cryptographic Algorithms
3.2 Packet Format
3.2.1 Header Chart Format
3.2.2 Body Format
3.3 Mail Transfer Encoding
3.5 Transfer through Socket Connections
4. Key Format
5. References
1. Introduction
This document describes a mail transfer protocol designed to protect
electronic mail against traffic analysis. Most e-mail security
protocols only protect the message body, leaving useful information
such as the the identities of the conversing parties, sizes of
messages and frequency of message exchange open to adversaries.
Message transmission can be protected against traffic analysis by the
mix-net protocol. A mix (remailer) is a service that forwards
messages, using public key cryptography to hide the correlation
between its inputs and outputs. If a message is sent through a
sequence of mixes, one trusted mix is sufficient to provide anonymity
and unobserveability of communications against a powerful
adversary. Mixmaster is a mix-net implementation for electronic mail.
This document describes version 2 of the Mixmaster message format.
2. The Mix-Net Protocol
The mix-net protocol [Chaum] allows to send messages while hiding the
relation of sender and recipient from observers (unobserveability). It
also provides the sender of a message with the ability to remain
anonymous to the recipient (sender anonymity). If anonymity is not
desired, authenticity and unobserveability can be achieved in the same
time by transmitting digitally signed messages.
This section gives an overview over the protocol used in
Mixmaster. The message format is specified in section 3.
2.1 Message Creation
To send a message, the user agent splits into parts of fixed size,
which form the bodies of Mixmaster packets. If sender anonymity is
desired, care should be taken not to include identifying information
in the message. The message may be compressed.
The sender choses a sequence of up to 20 remailers for each
packet. The final remailer must be identical for all parts of the
message.
The packet header consists of 20 charts. For a sequence of n
remailers, header charts n+1, ... , 20 are filled with random
data. For all charts i := n down to 1, the sender generates a
symmetric encryption key, which is used to encrypt the body and all
following header charts. This key, together with other control
information for the remailer, is included in the i-th header chart,
which is then encrypted with the remailer's public key.
The message is sent to the first remailer in an appropriate transport
encoding.
To increase reliability, multiple copies of message may be sent
through different paths. The final remailer must be identical for all
paths, so that duplicates can be detected and the message is delivered
only once.
2.2 Remailing
When a remailer receives a message, it decrypts the first header chart
with its private key. By keeping track of a packet ID, the remailer
verifies that the packet has not been processed before. The integrity
of the message is verified by checking the packet length and verifying
message digests included in the packet. Then the first header chart is
removed, the others are shifted up by one, and the last chart is
filled with random padding. All header charts and the message body are
decrypted with the symmetric key found in the header. This reveals a
public key-encrypted header chart for the next remailer at the top,
and obscures the old top header chart. Transfer encoding is applied to
the resulting message.
The remailer collects several encrypted messages before sending the
resulting messages in random order. Thus the relation between the
incoming and outgoing messages is obscured to outside adversaries even
if the adversary can observe all messages sent. The message is
effectively anonymized by sending it through a chain of independently
operated remailers.
2.3 Message Reassembly
When a packet is sent to the final remailer, it contains a flag
indicating that the chain ends at that remailer, and whether the
packet contains a complete message or part of a multi-part message. If
the packet contains the entire message, the body is decrypted and
after reordering messages the plain text is delivered to the
recipient. For partial messages, a packet ID is used to identify the
other parts as they arrive. When all parts have arrived, the message
is reassembled and delivered. If the parts do not arrive within a time
limit, the message is discarded.
Only the last remailer in the chain can determine whether packets are
part of a certain message. To all the others, they are completely
independent.
If necessary, the reassembled message is decompressed before sending
it to the recipient.
When anonymous messages are forwarded to third parties, the final
remailer should ensure that the sender cannot supply header lines that
indicate a false identity or send Usenet control messages that may
have security implications. Appropriate information about the origin
of the message should be inserted in the Comments: header line of the
message.
If the recipient does not wish to receive anonymous messages, the
remailer can ensure authenticity be verifying that the message is
cryptographically signed [RFC 1991, RFC 2311] by a known sender.
3. Message Format
3.1 Cryptographic Algorithms
The asymmetric encryption operation in Mixmaster version 2 uses RSA
with 1024 bit RSA keys and PKCS #1 padding [RFC 2313]. The symmetric
encryption uses EDE 3DES with cipher block chaining (24 byte key, 8
byte initialization vector) [Schneier]. MD5 [RFC 1321] is used as the
message digest algorithm.
3.2 Packet Format
A Mixmaster packet consists of a header containing information for the
remailers, and a body containing the payload. To ensure that packets
are undistinguishable, the size of these encrypted data fields is
fixed.
The packet header consists of 20 header charts (specified in section
A.2) of 512 bytes each, resulting in a total size of 10240 bytes. The
header charts and the body are encrypted with symmetric session keys
specified in the first header chart.
3.2.1 Header Chart Format
Public key ID [ 16 bytes]
Encrypted session key length [ 1 byte ]
RSA-encrypted session key [ 128 bytes]
Initialization vector [ 8 bytes]
Encrypted header section [ 328 bytes]
Padding [ 31 bytes]
Total size:
512 bytes
A random 24 bit Triple-DES key is encrypted with RSA, resulting
in 1024 bit of encrypted data.
The header section encrypted with this session key is:
Packet ID [ 16 bytes]
Triple-DES key [ 24 bytes]
Packet type identifier [ 1 byte ]
Packet type 0:
19 Initialization vectors [152 bytes]
Remailer address [ 80 bytes]
Packet type 1:
Message ID [ 16 bytes]
Initialization vector [ 8 bytes]
Packet type 2:
Packet number [ 1 byte ]
Number of packets [ 1 byte ]
Message ID [ 16 bytes]
Initialization vector [ 8 bytes]
Timestamp [ 7 bytes] (optional)
Message digest [ 16 bytes]
Total size:
Type 0: 297 bytes (+ 7 if timestamp is used)
Type 1: 81 bytes (+ 7 if timestamp is used)
Type 2: 83 bytes (+ 7 if timestamp is used)
This data structure is padded to 328 bytes.
Packet ID: randomly generated packet identifier.
Key: symmetric key used to encrypt the following header charts and the
body.
Packet type identifier:
Intermediate hop 0
Final hop 1
Final hop, partial message 2
Initialization vectors: For packet type 1 and 2, the IV is used to
symmetrically encrypt the body. For packet type 0, there is one IV for
each of the 19 following header charts. The IV for 19th header chart
is also used for the body.
Remailer address: address of next hop.
Message ID: randomly generated identifier unique to (all packets of)
this message.
Packet number: Sequence number used in multi-packet messages.
Number of packets: Total number of packets.
Timestamp: A timestamp is introduced with the byte sequence (48, 48,
48, 48, 0). The following two bytes specify the number of days since
Jan 1, 1970, given in little-endian byte order. A random number of up
to 3 may be substracted from the number of days in order to obscure
the origin of the message.
Digest: MD5 digest computed over the preceding elements of the
encrypted header section.
Header charts 2 .. 20 and the body each are decrypted separately using
the respective initialization vectors.
3.2.2 Body Format
Number of destinations [ 1 byte]
Destination addresses [ 80 bytes each]
Number of header lines [ 1 byte]
Header lines [ 80 bytes each]
Payload [ any size]
Destination addresses are Internet mail addresses. Additionally,
the following special destinations are defined:
null: Dummy message, will be discarded by the final mix.
post: newsgroup Message will be posted to Usenet.
The payload may be compressed using GZIP [RFC 1952] if the
capabilities attribute of the final remailer contains the flag
"C". When compressing the message, the operating system field must be
set to Unix, and file names must not be given. The remailer treats
messages beginning with the GZIP identification header (31, 139) as
compressed.
The resulting message is split into chunks of 10236 bytes. To each chunk,
its length is prepended as a 4 byte little-endian number to form the body
of a Mixmaster packet.
3.3 Mail Transfer Encoding
Mixmaster packets are sent as text messages [RFC 822]. The body has
the following format:
::
Remailer-Type: Mixmaster [version number]
-----BEGIN REMAILER MESSAGE-----
[message length]
[message digest]
[encoded message]
-----END REMAILER MESSAGE-----
The length field always contains the decimal number "20480", since the
size of Mixmaster messages is constant. The MD5 message digest [RFC
1321] of the message is encoded as a hexadecimal string.
The message itself is encoded in base 64 encoding [RFC 1421] and
broken into lines of 40 characters.
4. Key Format
Remailer public key files consist of a list of attributes and a
public RSA key:
[attributes list]
-----Begin Mix Key-----
[key ID]
[length]
[encoded key]
-----End Mix Key-----
The attributes are listed in one line separated by spaces:
identifier: a human readable alphabetical string identifiying the remailer
address: the remailer's Internet mail address
key ID: public key ID
version: the Mixmaster version number
capabilities: flags indicating additional capabilites of the remailers
The identifier consists of alphanumeric characters, begining with an
alphabetic character. It must not contain whitespace.
The encoded key packet consists of two bytes specfying the key length
(1024 bits) in little-endian byte order, and of the RSA modulus and
the public exponent in big-endian form using 128 bytes each, with
preceding null bytes where necessary. The packet is encoded in base
64, and broken into lines of 40 characters each. Its length (258
bytes) is given as a decimal number.
The key ID is the MD5 message digest of the reprentation of the RSA
public key (not including the length bytes). It is encoded as a
hexadecimal string.
The capabilities field is optional. Clients should ignore unknown flags.
The following flags are used in version 2.0.4:
C accepts compressed messages.
M will forward messages to another mix, when used as the final hop.
Nm supports posting to Usenet throught a mail-to-news gateway.
Np supports direct posting to Usenet.
Digital signatures [RFC 1991] should be used to ensure the
authenticity of the key files.
5. References
[Chaum] Chaum, D., "Untraceable Electronic Mail, Return Addresses, and
Digital Pseudonyms", Communications of the ACM 24 (1981) 2.
[RFC 822] Crocker, D., "Standard for the Format of ARPA Internet Text
Messages", STD 11, RFC 822, August 1982.
[RFC 1321] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321,
April 1992.
[RFC 1421] Linn, J., "Privacy Enhancement for Internet Electronic
Mail: Part I -- Message Encryption and Authentication Procedures", RFC
1421, February 1993.
[RFC 1952] Deutsch, P., "GZIP file format specification version 4.3",
RFC 1951, May 1996.
[RFC 1991] Atkins, D., Stallings, W. and Zimmermann, P., "PGP Message
Exchange Formats", RFC 1991, August 1996.
[RFC 2311] Dusse, S., Hoffman, P, Ramsdell, B, Lundblade, L. and
Repka, L., "S/MIME Version 2 Message Specification", RFC 2311, March
1998.
[RFC 2313] Kaliski, B., "PKCS #1: RSA Encryption, Version 1.5", RFC
2313, March 1998.
[Schneier] Schneier, B., "Applied Cryptography", 2nd Edition, Wiley,
1996.
From stuffed at stuffed.net Fri Jul 10 13:53:51 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Fri, 10 Jul 1998 13:53:51 -0700 (PDT)
Subject: Tit 'n' Run/Man sues self/World's worst liar
Message-ID: <19980710190741.21988.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 270 bytes
Desc: not available
URL:
From pay83 at hotmail.com Fri Jul 10 15:19:41 1998
From: pay83 at hotmail.com (Lenders Plus Network)
Date: Fri, 10 Jul 1998 15:19:41 -0700 (PDT)
Subject: Get Cash You need Right Away!!
Message-ID: <1998071094ZAA4803@post.net>
GET THE MONEY YOU NEED RIGHT NOW!
Here's your chance to...
> Eliminate Credit Card Debt!
> Take advantage of LOW INTEREST RATES!
> Escape from High Monthly Payments!
> Get Relief and Have the Money You Need!
> Cash in Your Pocket Usually within 7 to 14 days!
> Make Home Improvements You've Always Wanted!
> Take the Vacation You Deserve!
How? Simply CLICK HERE TO VISIT OUR WEBSITE -->
http://www.bighitter.holowww.com/american107.htm
Would you like money for...
~ A New Car?
~ College Tuition?
~ Taxes?
~ Consolidate Your Credit Cards?
~ A Dream Vacation?
~ Home Improvements?
Now It Can Be Yours! What are you waiting for?
For a FREE evaluation please visit our website by...
CLICKING HERE (http://www.bighitter.holowww.com/american107.htm
or type or cut & paste: http://www.bighitter.holowww.com/american107.htm
Especially if you're a homeowner, we can help you. Try us!
n+4 iden
From remove00012 at usa.net Fri Jul 10 20:59:51 1998
From: remove00012 at usa.net (remove00012 at usa.net)
Date: Fri, 10 Jul 1998 20:59:51 -0700 (PDT)
Subject: Spend Extra Time With Your Family.
Message-ID: <94691665_60884038>
Dear Prospective Entrepreneur;
I have been an attorney for 26 years, but recently I
joined a company which is only 3 years old, and is
growing at a fantastic rate; in fact, after only 10
months old, it was featured in SUCCESS MAGAZINE, and
it has been the #1 rated network marketing opportunity
for the last three years.
What makes this company and this opportunity I am
offering you so great, is the fact that we (Marketing
Executives) have "EXCLUSIVE" marketing rights in the
United States to new miracle products that are
providing dramatic benefits to people who have two of
the worst diseases known to mankind. Americans who
learn about and need our products, can only get
them through us, and not from other companies, or the
corner drug store.
After getting into other companies in the last several
years, and going from company to company, and product
to product (mostly companies that failed, or had falsely
advertised products), I finally found this company that
is truly "CREDIBLE," has tremendous products, a great
compensation plan, and, best of all, my customers are
calling me back month after month.
Since the products actually sell themselves, I'm NOT
constantly on the phone, or forever hustling all my
relatives and friends. Products that make people feel
better (especially natural products that have no side
effects, and do have a 60 day money back guarantee)
cause people to call me every month, instead of me
calling them.
Our "exclusive" and "patented" all natural products
have also gone through the double blind clinical
studies and have produced unbelievable sales in foreign
markets, and have only recently been introduced into
the United States, so our timing is also perfect.
If you are interested in trying our products and/or
looking at this business opportunity, call me toll-free
at 888-203-6668 and leave your name, telephone number,
and/or your address if you want more information. You
also can respond to this e-mail if you so wish.
If you are ready to make some changes in your life, free
up some time to spend with your family, and make some
extra money, call me or e-mail me. WHAT HAVE YOU GOT TO
LOSE? I made that same call a few months ago, and I
promise, you will be happy to hear more about this tre-
mendous company, its great products, and about how easy
it will be for you to make that extra money.
Thanks,
Clyde Fontenot
This message is brought to you from Clyde Fontenot,
Attorney, 504 W. Main St., Ville Platte,LA.70586,
318-363-5535. If you would like to be removed from
future e-mails, please "reply" with the word
REMOVE in the subject of your reply message.
From bill.stewart at pobox.com Fri Jul 10 21:13:29 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 10 Jul 1998 21:13:29 -0700 (PDT)
Subject: no subject!
In-Reply-To: <199807070635.IAA08822@basement.replay.com>
Message-ID: <3.0.5.32.19980710170837.008f0990@popd.ix.netcom.com>
At 08:35 AM 7/7/98 +0200, Anonymous wrote:
>Where is this? Stalled. Looks dead in the water. Any further insights?
Dr. Ron Paul often introduces good bills that will never get anywhere,
because he's _not_ a mainstream Congressscritter.
He was a conservative Republican Congresscritter from Houston,
quit the GOP in ~1986/1987, ran for President as a Libertarian, (lost),
and a couple of years ago decided to re-emerge as a Republican.
He's generally in favor of personal and economic freedom,
though he seems to believe that the US government owns the country
and therefore has the right to ban immigrants; I took the Ron Paul
bumper sticker off my car a few years after the election when he
endorsed Pat Buchanan for the Republican nomination instead of
the also-bad George Bush. He's also rabidly against the U.N.,
and borders on Black-Helicopter paranoia on occasion :-)
He's willing to take a strong stand against the Republicrats
when there are issues of principle, and therefore doesn't have a
lot of support - often he and Bernie Sanders, the Vermont Socialist,
are about the only members opposing a bill. So no surprise if the bill dies.
>H.R.3261
>SPONSOR: Rep Paul (introduced 02/25/98)
>
>SUMMARY:
>
>(AS INTRODUCED)
>
>Privacy Protection Act of 1997 (sic) - Amends title II (Old Age, Survivors
>and Disability Insurance) of the Social Security Act and the Internal
>Revenue Code to prohibit any Federal, State, or local government agency or
>instrumentality from using a social security account number or
>any derivative as the means of identifying any individual, except for
>specified social security and tax purposes.
>
>Amends the Privacy Act of 1974 to prohibit any Federal, State, or local
>government agency or instrumentality from requesting an individual to
>disclose his social security account number on either a mandatory or a
>voluntary basis.
>
>Prohibits any two Federal agencies or instrumentalities from implementing
>the same identifying number with respect to any individual, except as
>authorized under this Act.
>
>
>----
>STATUS: Detailed Legislative Status
>
> House Actions
>
>Feb 25, 98:
> Referred to the Committee on Ways and Means, and in addition to the
>Committee on Government Reform and Oversight, for a period to
> be subsequently determined by the Speaker, in each case for
>consideration of such provisions as fall within the jurisdiction of the
> committee concerned.
> Mar 2, 98:
> Referred to the Subcommittee on Government Management,
>Information and Technology.
>Feb 25, 98:
> Referred to the Committee on Ways and Means, and in addition to the
>Committee on Government Reform and Oversight, for a period to
> be subsequently determined by the Speaker, in each case for
>consideration of such provisions as fall within the jurisdiction of the
> committee concerned.
>
>
>
>
>
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From bill.stewart at pobox.com Fri Jul 10 21:14:19 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 10 Jul 1998 21:14:19 -0700 (PDT)
Subject: Junger et al.
In-Reply-To: <413AC08141DBD011A58000A0C924A6D52C359A@mvs2.teralogic-inc.com>
Message-ID: <3.0.5.32.19980710171121.008f33f0@popd.ix.netcom.com>
At 03:11 AM 7/7/98 -0400, mgraffam at mhv.net wrote:
>On Mon, 6 Jul 1998, Ernest Hua wrote:
>> Did anyone demonstrate the "functionalness" of any arbitrary language
>> via a scanner and a compiler?
>Indeed.. what we need is for someone to testify to the court about
>natural and computer language, and maybe some relevent material from
>information theory.
>
>Pseudo-code from any computer programming textbook would be helpful
>in making this point too.
>
>What about English in a voice recognition system? In this case, English
>can actually perform functions too, just as C does.
A particularly relevent language is the Algorithmic Language, Algol,
which was designed for mathematicians to describe algorithms to each other,
though it was also designed in a way to support compilers,
such as ALGOL-60.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From hugh at east.toad.com Fri Jul 10 21:25:35 1998
From: hugh at east.toad.com (Hugh Daniel)
Date: Fri, 10 Jul 1998 21:25:35 -0700 (PDT)
Subject: ANNOUNCE: Bay Area Cypherpunks, Sat.July 11, 12-6, KPMG Mountain View
Message-ID: <199807110201.TAA03498@east.toad.com>
The July Bay Area Cypherpunks Meeting will be Saturday July 11 198
from 12-6, at KPMG, 500 E. Middlefield Rd., Mountain View.
Sameer Parekh will talk about the SSL / PKCS#1 crack and repair.
Dinner after the meeting will be at some restaurant on Castro
St. Mtn.View.
Directions: KPMG is a relatively-unmarked building at the corner of
Middlefield Rd. and Ellis St. in a Netscape-infested section of
Mountain View.
The lobby entrance is on the Ellis St. side.
The Ellis exit on 101 is between 85 and 237.
http://www.mapblast.com/mapblast/blast.hm?CMD=MAP&GC=X%3A-122.05265%7CY%3A37.39603%7CLT%3A37.39603%7CLN%3A-122.05265%7CLS%3A20000%7Cc%3AMountain_View%7Cs%3ACA%7Cz%3A94043%7Cd%3A807%7Cp%3AUSA&LV=3&IC=37.39603%3A37.39603&IC=5&IC%3A=KPMG&GAD2=500+E+Middlefield+Rd&GAD3=Mountain+View%2C+CA++94043-4008&W=600&H=350&MA=1&zoom.x=28&zoom.y=172
Probable speakers for next month:
- Sue Bardakos from Entrust
- Paul Kocher talking about differential power analysis
-----------
Mailing list administrivia - this announcement has been sent to
cypherpunks at cyberpass.net
cypherpunks-announce at toad.com
coderpunks at toad.com
cryptography at c2.net
If you want to get off one of the lists, send mail to
listname-request at machine.domain (probably majordomo!)
for the listserver that sent you the mail.
-----------
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From mminow at yahoo.com Fri Jul 10 23:58:04 1998
From: mminow at yahoo.com (Martin Minow)
Date: Fri, 10 Jul 1998 23:58:04 -0700 (PDT)
Subject: Junger et al.
Message-ID: <19980711065637.27355.rocketmail@send1a.yahoomail.com>
My declaration for the Junger lawsuit (available on jya.com) touched
on these issues, but the court chose not to accept my reasoning. My
quick reading of the decision is that the court took note that sourc
and object code are functional (they control a computer), and chose
to ignore their ability to express an algorithm and, hence, to
communicate
the substance of an encryption algorithm to another human being.
The court also appears to assume that, because computer source code
requires
technical skill and training understand, it somehow loses its First
Amendment privileges: this I find confusing.
Martin Minow (minow at pobox.com)
---Bill Stewart wrote:
>
> At 03:11 AM 7/7/98 -0400, mgraffam at mhv.net wrote:
> >On Mon, 6 Jul 1998, Ernest Hua wrote:
> >> Did anyone demonstrate the "functionalness" of any arbitrary
language
> >> via a scanner and a compiler?
> >Indeed.. what we need is for someone to testify to the court about
> >natural and computer language, and maybe some relevent material from
> >information theory.
> >
> >Pseudo-code from any computer programming textbook would be helpful
> >in making this point too.
> >
> >What about English in a voice recognition system? In this case,
English
> >can actually perform functions too, just as C does.
>
> A particularly relevent language is the Algorithmic Language, Algol,
> which was designed for mathematicians to describe algorithms to each
other,
> though it was also designed in a way to support compilers,
> such as ALGOL-60.
> Thanks!
> Bill
> Bill Stewart, bill.stewart at pobox.com
> PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
>
>
==
Please reply to minow at pobox.com
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com
From stuffed at stuffed.net Sat Jul 11 08:49:40 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Sat, 11 Jul 1998 08:49:40 -0700 (PDT)
Subject: My date with a dwarf/Nice guys come first
Message-ID: <19980711145448.24797.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 272 bytes
Desc: not available
URL:
From tne1870 at hotmail.com Sat Jul 11 11:20:15 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Sat, 11 Jul 1998 11:20:15 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID:
INFORMATION ONLY
The Pre-Press Brokerage Company brokers used pre-press
equipment for the newspaper industry.
Our web address: http://www.pe.net/~pbc
Our email address: pbc at pe.net
You may call our office at 909.686.2875.
Thank you for your consideration.
Geoff McPartlin
Sales Director
From tne1870 at hotmail.com Sat Jul 11 11:39:28 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Sat, 11 Jul 1998 11:39:28 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID:
INFORMATION ONLY
The Pre-Press Brokerage Company brokers used pre-press
equipment for the newspaper industry.
Our web address: http://www.pe.net/~pbc
Our email address: pbc at pe.net
You may call our office at 909.686.2875.
Thank you for your consideration.
Geoff McPartlin
Sales Director
From tne1870 at hotmail.com Sat Jul 11 12:02:58 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Sat, 11 Jul 1998 12:02:58 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID:
INFORMATION ONLY
The Pre-Press Brokerage Company brokers used pre-press
equipment for the newspaper industry.
Our web address: http://www.pe.net/~pbc
Our email address: pbc at pe.net
You may call our office at 909.686.2875.
Thank you for your consideration.
Geoff McPartlin
Sales Director
From jrsd3424 at hotmail.com Sat Jul 11 12:09:19 1998
From: jrsd3424 at hotmail.com (jrsd3424 at hotmail.com)
Date: Sat, 11 Jul 1998 12:09:19 -0700 (PDT)
Subject: News Release....
Message-ID: <9807091526.AA15333@pharmdec.wustl.edu>
NEWS RELEASE
NuOncology Labs Inc
Symbol: NLAB
Trades: OTC BB
July 9, l998
NUONCOLOGY LABS COMPLETES ACQUISITION
Virginia Beach, VA - NuOncology Labs, Inc.
(OTC BB: NLAB), a Florida Corporation, announced
today that it has acquired all the outstanding and
issued shares of NuOncology Labs, Inc. (Nulab),
a private Virginia Corporation. The new combined
entity will maintain the name NuOncology Labs Inc.
NuOncology Labs, Inc's Senior Medical Director is
R. Michael Williams, Ph.D, the co-founder, Senior
Medical Director and Chief Medical Officer of Cancer
Treatment Centers of America. The company's
Scientific Director is Fraser S. Baker, Ph. D., co-
founder and Director of Baker-Sanger Laboratory,
Inc., a Houston based chemosensitivity testing
laboratory.
NuOncology Labs, Inc. participates in the multi-
billion dollar cancer treatment industry by supporting
the research and marketing of a promising cancer
treatment along with the delivery of predictive tests
for the optimization of contemporary cancer
treatment. Both activities could greatly improve
clinical outcomes while reducing treatment costs.
NuOncology Labs Inc has a "dramatically effective
cancer treatment" in trials with over 200 patients
at this time. This project as well as NuOncology
Labs Inc is being lead by a "very distinguished
research and management team".
To receive a complete investor package on
NuOncology Labs Inc, as well as a FREE
subscription to our newsletter that profiles
specially selected companies in the "New
Economy" we feel have the potential for
tremendous growth potential PLEASE CLICK
HERE:
Free Info
Please note that by sending an e-mail to this
address you are requesting additional information
on NuOncology Labs Inc as well as a FREE
no obligation subscription to our newsletter.
You may unsubscribe at any time.
We profile these companies at the time they
initially go public - before they have been
discovered by 'the Street' and financial media
and already doubled or tripled in price.
end.
From tne1870 at hotmail.com Sat Jul 11 12:25:06 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Sat, 11 Jul 1998 12:25:06 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID:
INFORMATION ONLY
The Pre-Press Brokerage Company brokers used pre-press
equipment for the newspaper industry.
Our web address: http://www.pe.net/~pbc
Our email address: pbc at pe.net
You may call our office at 909.686.2875.
Thank you for your consideration.
Geoff McPartlin
Sales Director
From tne1870 at hotmail.com Sat Jul 11 12:49:45 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Sat, 11 Jul 1998 12:49:45 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID:
INFORMATION ONLY
The Pre-Press Brokerage Company brokers used pre-press
equipment for the newspaper industry.
Our web address: http://www.pe.net/~pbc
Our email address: pbc at pe.net
You may call our office at 909.686.2875.
Thank you for your consideration.
Geoff McPartlin
Sales Director
From tne1870 at hotmail.com Sat Jul 11 13:10:17 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Sat, 11 Jul 1998 13:10:17 -0700 (PDT)
Subject: Pre-Press Pre-owned Equipment
Message-ID:
INFORMATION ONLY
The Pre-Press Brokerage Company brokers used pre-press
equipment for the newspaper industry.
Our web address: http://www.pe.net/~pbc
Our email address: pbc at pe.net
You may call our office at 909.686.2875.
Thank you for your consideration.
Geoff McPartlin
Sales Director
From gwb at gwb.com.au Sat Jul 11 14:33:30 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Sat, 11 Jul 1998 14:33:30 -0700 (PDT)
Subject: The Australia/Israel Review list and Jetset Travel
Message-ID: <1.5.4.32.19980711210318.007236b8@gwb.com.au>
Dear One Nation supporter in NSW,
It should be noted by One Nation supporters that the man behind the
Australia/Israel Review, Mr Leibler, is one of the men behind Jetset Travel.
When booking your next holiday trip I would ask you to consider what
Leibler's views are on the publication of the list of the names and Suburbs
of 2000 One Nation members and donors in the Australia/Israel Review.
Mr Leibler said the decision to publish the list of members and donors was
in the interests of "political transparency". He said concerns about privacy
had been met by not publishing full addresses and telephone numbers.
What Leibler failed to mention is that they published the suburbs that
members live in. Many One Nation members had phone calls from the media -
contacts made directly through the list published by the Australia/Israel
Review.
The Australia/Israel Review has since shelved plans to publish the names of
One Nation's remaining 8,000 members. Mr Leibler said: "We feel we have made
our point."
Perhaps it is time for One Nation supporters to make their point?
Jetset can be contacted on: info at jetset.com.au
GWB
Scott Balson
From StanSqncrs at aol.com Sat Jul 11 23:21:47 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Sat, 11 Jul 1998 23:21:47 -0700 (PDT)
Subject: A Note to 'Nobody'
Message-ID: <490d1a8.35a855ce@aol.com>
Hey 'Nobody' (tcmay at got.net (Tim May)), you may as well stop sending me all
your junk mail. Since you've resorted to attempting to get me kicked off of
AOL for responding to individual pieces of it (Cypherpunks, that's a lie. He
did that attempt in an attempt to get my website kicked off of AOL), I'm
simply deleting everything that comes in from all the anon. remailing services
without reading it.
If you don't have enough guts to put a return address on your mail, obviously,
you aren't worth reading.
Stan,
Stan and the Sequencers
http://members.aol.com/StanSqncrs/
From stuffed at stuffed.net Sun Jul 12 04:18:45 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Sun, 12 Jul 1998 04:18:45 -0700 (PDT)
Subject: World's dumbest gunslinger/Exclusive: Are her tits real?
Message-ID: <19980712093021.24392.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 270 bytes
Desc: not available
URL:
From StanSqncrs at aol.com Sun Jul 12 04:26:15 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Sun, 12 Jul 1998 04:26:15 -0700 (PDT)
Subject: A Note to 'Nobody'
Message-ID:
In a message dated 7/12/98 2:33:18 AM Central Daylight Time, tcmay at got.net
writes:
<< ... Further proof that AOL is the dumping ground for the incompetent. >>
And Tim expects AOL to listen to his complaint with that at the end of it?
Ha!
Stan
From jya at pipeline.com Sun Jul 12 08:38:25 1998
From: jya at pipeline.com (John Young)
Date: Sun, 12 Jul 1998 08:38:25 -0700 (PDT)
Subject: DirFBI: Danger of Encryption
Message-ID: <199807121538.LAA18345@camel14.mindspring.com>
The New York Times, July 12, 1998:
Danger of Encryption
To the Editor:
Re "Privacy in the Digital Age" (editorial, July 6): No law
enforcement agency is "trying hard to prevent the growing
use of encryption." But encryption represents a serious
public safety concern. We are open to any solution that
recognizes that it is the ability to collect electronic
evidence that has allowed us to prevent airliners from
being bombed and to put major drug dealers behind bars.
Key escrow is one possible solution. There are others, and
certainly a statutory scheme can be devised that will all
but eliminate any risk of abuse by law enforcement. But if
we do not allow for court-ordered access, for the first time
in the history of this country a court order for seizure of
evidence will be an absolute nullity.
We want to work with industry on a real solution, recognizing
that those who acquire encryption over the Internet or from
abroad naively make assumptions about the security it affords.
We are not fighting encryption, but we know what will happen
if technology cannot be made to work for law enforcement as
it works for criminals and terrorists.
Louis J. FREEH
Dir., Federal Bureau of Investigation
Washington, July 10,1998
From Webroot at ix.netcom.com Sun Jul 12 18:38:01 1998
From: Webroot at ix.netcom.com (Webroot at ix.netcom.com)
Date: Sun, 12 Jul 1998 18:38:01 -0700 (PDT)
Subject: Cancer Treatment BREAKTHROUGH!!!!
Message-ID: <199807060040.TAA11965@cityatlas.com>
DRAMATICALLY EFFECTIVE CANCER
TREATMENT IN FINAL DEVELOPMENT
FOR SOFT TISSUE CANCERS OF THE
LIVER, BREAST AND LUNGS -
by a company that just went public last week!
Now you can participate in the multi-billion
dollar cancer treatment industry by owning
stock in this company before the "Wall Street
Analysts" discover it. The company is in
the final stages of researching and
developing this new drug to help cure soft
tissue cancers of the liver, breast and lungs.
This company is led by a very distinguished
team of Cancer Research Specialists who have
studied this disease for the last two decades.
The company holds the worldwide manufacturing
and marketing rights (except for the former
Soviet Union) for this drug.
The company is called :
NuOncology Labs Inc.
Trading Symbol: NLAB
Trades: OTC BB
'NLAB' started trading last Thursday,July 9,
at: $5 15/32
At the market close Friday, July 10, it was:
$6 1/8
Trials are now being conducted on over 200
human cancer patients with this new drug and
some very important announcements are
expected to come from NuOncology over the
next few weeks.
To have complete investor information sent to
you via e-mail on this innovative new
pharmaceutical research and development
company just :
Click Here
You will get back complete information via
e-mail within the next 24 hours on :
NuOncology Labs, Inc.
We profile companies at the time they initially
go public - before they have been discovered
by 'The Street' and financial media and have
by that time already doubled or tripled in price.
By requesting additional information on
NuOncology Labs, Inc., you are also requesting
a subscription to our newsletter that profiles
emerging new companies. There is no obligation
and absolutely no cost to you. You may
unsubscribe at any time.
From trei at ziplink.net Sun Jul 12 20:19:04 1998
From: trei at ziplink.net (Trei Family)
Date: Sun, 12 Jul 1998 20:19:04 -0700 (PDT)
Subject: RSA DES Challenge starting!
Message-ID: <35A989DA.C1246441@ziplink.net>
I'd like to remind people that Monday, July 13th,
1998, RSA Data Security is releasing the challenge
data for the next RSA DES Challenge (the brute force
solution of a DES encrypted message).
For more information on this challenge, please see
http://www.rsa.com. The prize stands at 10,000 USD
for the first solution found within 10 days.
If wish to attempt the challenge by yourself, I
reccomend that you look at Svend Mikkelsen's
Bryddes (http://inet.uni2.dk/~svolaf/des.htm),
which is by far the fastest Intel implementation
I know of - considerably better than my own
Deskr.
If you're interested in a joint effort, you could
do worse than look at http://distributed.net. This
group won the RC5-56 and January 1998 DES challenges,
and are currently working on RC5-64. Their clients
will automatically switch over to DES Monday
morning. It looks like they should attain around
86 billion keys/second, which will exhaust the
keyspace in under 10 days. However, only a fraction
of the prize money goes to the person who finds
the key.
Cracking DES in these challenges serves a higher
purpose than winning a prize or gaining bragging
rights.
Single DES (the kind used in this challenge) is the
strongest general purpose encryption which Americans
are currently permitted to send overseas without
special and rarely granted waivers.
As a result, the US government is turning over the
world market in high quality cryptography to
non-US firms, with a cost of billions of dollars a
year to the US economy, thousands of American jobs,
and increased crime and terrorism resulting from the
poor security this policy promotes.
Demonstrating how vulnerable US 'export quality'
encryption actually is creates pressure to remove
those restrictions entirely.
I regard this as a desirable goal.
Peter Trei
trei at ziplink.net
From caj at math.niu.edu Sun Jul 12 22:22:33 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Sun, 12 Jul 1998 22:22:33 -0700 (PDT)
Subject: DirFBI: Danger of Encryption
In-Reply-To: <199807121538.LAA18345@camel14.mindspring.com>
Message-ID:
On Sun, 12 Jul 1998, John Young wrote:
> The New York Times, July 12, 1998:
>
[...]
> but eliminate any risk of abuse by law enforcement. But if
> we do not allow for court-ordered access, for the first time
> in the history of this country a court order for seizure of
> evidence will be an absolute nullity.
This is an interesting claim. Surely it's only been
in this century that law enforcement has ever had
the kind of systematic access to communication that presently
does. I'd say Louis Freeh is lacking in the history department
if he really believes that Americans have never possessed
as much privacy as strong crypto offers.
I'd also say he's missed a few history classes if he
thinks that the world will blow up without him listening
in.
-Xcott
From 58577650 at bluewin.ch Sun Jul 12 22:34:50 1998
From: 58577650 at bluewin.ch (58577650 at bluewin.ch)
Date: Sun, 12 Jul 1998 22:34:50 -0700 (PDT)
Subject: IIIII=Email Advertising?=IIIII
Message-ID: <199807130528.AAA24174@mail-gw2adm.rcsntx.swbell.net>
WE REALLY SEND IT !
* We use remove systems
* We use addresses recently collected
* Recently Improved System Produces More Responses
Now offering targeted lists! 10 cents per address, 4000 address minimum.
General Mailing :
Only $350 per 1 million. Introductory offer :
Get the first million for only $250 !
" Test Drive " Special ! Try our service for $55, we send 250,000
of your ads.
Click here to reply back about this offer
Or, type in this address in your web browser if you are not html compatible:
http://209.84.246.162/bmform.htm
Admin
Internet Services
[ This message is not intended for residents in the state of Washington,
screening of addresses has been done to the best of our technical ability.
Per Section 301, Paragraph (a)(2)(C) of S. 1618, further transmissions to you
by the sender of this email may be stopped at no cost to you by using the
following link:
If you are a Washington resident or otherwise wish to be removed from this
list,
Click here to go to global remove site if you want your address removed from
mailing
....
From stuffed at stuffed.net Mon Jul 13 04:38:55 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Mon, 13 Jul 1998 04:38:55 -0700 (PDT)
Subject: Woman saved by sex/Dog chewed my balls off
Message-ID: <19980713092147.6142.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 830 bytes
Desc: not available
URL:
From paulmerrill at acm.org Mon Jul 13 07:48:21 1998
From: paulmerrill at acm.org (Paul H. Merrill)
Date: Mon, 13 Jul 1998 07:48:21 -0700 (PDT)
Subject: DirFBI: Danger of Encryption
In-Reply-To:
Message-ID: <35AA4A36.1EB56250@acm.org>
Actually, his statement was interesting and a masterpiece. While it is
true that the access to communications is recent, the court orders for
evidence have been around. What he "failed to mention" was that they have
access currently which is unheard of in the past and that it is only that
slice of life that would have "absolute nullity".
Gee, don't they teach Propoganda 101 anymore?
PHM
Xcott Craver wrote:
> On Sun, 12 Jul 1998, John Young wrote:
>
> > The New York Times, July 12, 1998:
> >
> [...]
>
> > but eliminate any risk of abuse by law enforcement. But if
> > we do not allow for court-ordered access, for the first time
> > in the history of this country a court order for seizure of
> > evidence will be an absolute nullity.
>
> This is an interesting claim. Surely it's only been
> in this century that law enforcement has ever had
> the kind of systematic access to communication that presently
> does. I'd say Louis Freeh is lacking in the history department
> if he really believes that Americans have never possessed
> as much privacy as strong crypto offers.
>
> I'd also say he's missed a few history classes if he
> thinks that the world will blow up without him listening
> in.
>
> -Xcott
From whgiii at invweb.net Mon Jul 13 08:22:46 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Mon, 13 Jul 1998 08:22:46 -0700 (PDT)
Subject: DirFBI: Danger of Encryption
In-Reply-To: <35AA4A36.1EB56250@acm.org>
Message-ID: <199807131528.KAA013.84@geiger.com>
-----BEGIN PGP SIGNED MESSAGE-----
In <35AA4A36.1EB56250 at acm.org>, on 07/13/98
at 10:56 AM, "Paul H. Merrill" said:
>Actually, his statement was interesting and a masterpiece. While it is
>true that the access to communications is recent, the court orders for
>evidence have been around. What he "failed to mention" was that they
>have access currently which is unheard of in the past and that it is only
>that slice of life that would have "absolute nullity".
>Gee, don't they teach Propoganda 101 anymore?
Sure they do, it's part of the on the job training for all government
employees.
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: Dos: Venerable. Windows: Vulnerable. OS/2: Viable.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNaonpY9Co1n+aLhhAQEgMAQAy+xSgY6m3cAS4M3ccqqNgGYA4uuSBNE6
Ik4SzG+GW2I0whBcqcS4hICPCgTKIMqDFvZ6dL2MLnV2HeFnpgwhVyAETa/Sd7rj
CwEDiUqw38rUzUmahjFR1VWBqe90SjWBklLSMlcwIoigreV5QusutU4izadnmD0e
jKO+VzFu15U=
=P8VS
-----END PGP SIGNATURE-----
From Sergey.Bobok at p3.f9.n4646.z2.fidonet.org Mon Jul 13 08:32:37 1998
From: Sergey.Bobok at p3.f9.n4646.z2.fidonet.org (Sergey Bobok)
Date: Mon, 13 Jul 1998 08:32:37 -0700 (PDT)
Subject:
Message-ID: <900340977@p3.f9.n4646.z2.FIDOnet>
From jya at pipeline.com Mon Jul 13 08:53:09 1998
From: jya at pipeline.com (John Young)
Date: Mon, 13 Jul 1998 08:53:09 -0700 (PDT)
Subject: Home/Officeland Defense
Message-ID: <199807131553.LAA07422@camel14.mindspring.com>
Thanks to DT
http://www.fcw.com/pubs/fcw/1998/0713/fcw-newscyber-7-13-98.html
The Defense Department plans to create a new military organization
to spearhead DOD's effort to protect the nation's critical computer
systems against information warfare attacks, marking the first time
DOD has taken responsibility for protecting infrastructure within
the United States. ...
The Pentagon also is considering the formation of a reserve cadre
of "cyberdefense warriors," who would have hands-on responsibility
for protecting the nation's sensitive information networks and
systems from information warfare attacks. According to an industry
source familiar with the project, about 300 Ph.D.-carrying
reservists would work from home computers that would be tied into
high-speed communications links. DOD has budgeted $10 million to
jump-start the effort, the source said. ...
From wombat at mcfeely.bsfs.org Sun Jul 12 18:32:44 1998
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Mon, 13 Jul 1998 09:32:44 +0800
Subject: web site on 18 yr olds losing virginity
In-Reply-To: <199807120303.UAA02103@netcom18.netcom.com>
Message-ID:
Either "stopthis1" is a clever marketer drumming up interest in this
site, or the christian coalition has become inbred to the point of
unbelievable stupidty. Any bets?
On Sat, 11 Jul 1998, Vladimir Z. Nuri wrote:
> hmmmmmmm, just to show you the possibilities of cyberspace and
> what it's coming to
>
>
> From: stopthis1 at juno.com
> Date: Sat, 11 Jul 1998 02:25:08
> Subject: 2 kids to lose "virginity" LIVE on the Internet
>
> Please join me in shutting this website down.
>
> http://www.ourfirsttime.com
>
> I caught my grandson and his friends giggling over this website
> where it says two 18 year old kids are going to lose their
> virginity - LIVE on the Internet.
>
> Just because these two idiot kids saw a woman give birth LIVE on
> the Internet, they have decided that anything goes and will have
> sex for the first time on the Internet. What has the world come to
> when people can do absolutely any lewd and deviant thing they want
> to, and let innocent children watch on their computers.
>
> They are mocking the sanctity of marriage. What concerns me the
> most is there are no controls on this website to keep children
> out. Please send a protest email to your congressman or senator,
> and ask them to "SHUT THIS OBSCENE WEBSITE DOWN" !!!
>
> Click here to go to the Christian Coalition's page of email
> address for all Congressmen and Senators. Find your representative
> and demand their help to stop the Internet from being prostituted
> by brain damaged sex maniacs.
>
> http://www.christian-coalition.org/
> Email Guide to Congress from the Christian Coalition
>
> Also send emails to the following individuals asking for their
> help to shut this site down -
>
> President Clinton - president at whitehouse.gov
>
> Jesse Helms - jesse_helms at helms.senate.gov
>
> Newt Gingrich - georgia6 at hr.house.gov
>
> Jerry Falwell - chancellor at liberty.edu
>
> Pat Robertson - cbnonline at cbn.org
>
> Christian Coalition - coalition at cc.org
>
> Praise the Lord and pass this on to all.
>
>
>
>
>
>
>
>
>
From tne1870 at hotmail.com Mon Jul 13 09:33:31 1998
From: tne1870 at hotmail.com (tne1870 at hotmail.com)
Date: Mon, 13 Jul 1998 09:33:31 -0700 (PDT)
Subject: Pre-Press Pre-Owned Equipment
Message-ID:
INFORMATION ONLY:
The Pre-Press Brokerage Company brokers used pre-press
equipment for the printing industry.
Our web address: http://www.pe.net/~pbc
Our e-mail address: pbc at pe.net
You may call: 909.686.2875
Thank you for your consideration.
Geoff McPartlin, Sales Director
From CTIA_Daily_News at um2.unitymail.com Mon Jul 13 09:42:12 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Mon, 13 Jul 1998 09:42:12 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 13, 1998
Message-ID: <199807131633.LAA24664@mailstrom.revnet.com>
=============================================
Welcome to today's edition of the CTIA
Daily News
from WOW-COM.� Please click on the
icon / attachment
for the most important news in wireless
communications today.
WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for
more information!
=============================================
From nobody at replay.com Mon Jul 13 10:14:58 1998
From: nobody at replay.com (Anonymous)
Date: Mon, 13 Jul 1998 10:14:58 -0700 (PDT)
Subject: DirFBI: Danger of Encryption
Message-ID: <199807131715.TAA06057@basement.replay.com>
On Sunday, July 12, 1998, in The New York Times, Louis J. Freeh
had the unmitigated gall of a lying Nazi Fuck to write:
> To the Editor:
>
> Re "Privacy in the Digital Age" (editorial, July 6): No law
> enforcement agency is "trying hard to prevent the growing
> use of encryption."
In the face of such overwhelming evidence as virtually
litters the landscape and graces more than one court docket,
how can Louis Fuck-the-Free open with such a bald-faced lie,
unsupported by any data or argument whatsoever? His own
agency, not to mention several "non-law-enforcement" agencies
(is this the lawyer's catch in his assertion?) have been
lobbying _vigorously_ and without letup for several years
now to "prevent the growing use of encryption." The whole
export control regime for encryption has as its sole purpose
to "prevent the growing use of encryption."
I'm all for a constitutional amendment that would put this
kind of bald-faced lying by high public officials on the same
footing as treason, with the same penalties.
> But encryption represents a serious public safety concern.
It sure does! The lack of widely available, fully functional
strong crypto is a national and individual weakness that
allows control freak fucks like Louis to make a reach for
the ultimate levers of control and cement us into the
ultimate surveillance state, from which there will be no
return.
> We are open to any solution that recognizes that it is
> the ability to collect electronic evidence that has
> allowed us to prevent airliners from being bombed and
> to put major drug dealers behind bars.
Right! Like you prevented TWA 800, Lockerbee, and
the ValuJet eaten in midair by illegally transported live
oxygen canisters? Just HOW MANY AIRLINERS HAVE YOU SAVED,
you lying Nazi fuck?
Don't talk to us about the drug dealers... the ones who
wouldn't be able to earn a penny if it weren't for the
War on Drugs in the first place. We already know that the
pharmaceutical market value of a dose of heroin is something
like 25 cents, and that the only reason those addicts are
breaking into our homes and killing us on the streets is
because the GOVERNMENT has made it illegal for them to
obtain their sleepytime meds at reasonable prices that even
a minimum-wage burger flipper could afford if he wanted to
waste himself that way.
> Key escrow is one possible solution.
No it isn't. It's not a solution to anything at all. It's
the destruction of privacy through more heavy-handed tactics
and intrusion into private affairs. It's the police state's
wet dream, second only to full, real time monitoring of
everything and everything. One step at a time, though, eh,
lying Nazi fuck?
> There are others, and certainly a statutory scheme can
> be devised that will all but eliminate any risk of abuse
> by law enforcement.
You must be taking some of those drugs your agents seize! If
there is one constant, one unchangeable feature of government
landscape, it is that NO POWER can be safeguarded against
abuse, and that EVERY POWER will be abused, just some more
than others. This claim is an insult to the intelligence of
even the most retarded, obedient American. Your mother
clearly didn't wash your mouth with a strong enough brand of
laundry soap to make an impression on your little proto-Nazi
mind.
We should really suspend the ENTIRE debate right now, pending
the prosecution and imprisonment of the thousands of FBI
personnel involved in past, DOCUMENTED violations of rights.
Before we even take you seriously I want to see the asses of
the SAs who have done "black bag jobs", who have killed and
maimed men, women and children, who have instigated unlawful
acts by incompetents through agents provocateurs, AND their
SACs, AND their authorizing DDs, etc., ALL LANGUISHING IN
LEVEL 6 FACILITIES doing the the HARD TIME of multiple life
terms they so richly deserve for having arrogantly and
systematically violated their oaths of office and the laws
of the land. Then and ONLY THEN can we "talk," you strutting,
lying little Nazi fuck!
> But if we do not allow for court-ordered access, for the
> first time in the history of this country a court order
> for seizure of evidence will be an absolute nullity.
Utter Nazi rubbish! The truth is that if you _do_ get what
you want, for the first time in the history of this country
it will be unlawful or even impossible for Americans to secure
their communications as they could in 1789 when the Constitution
was ratified. It is _not_ the ability to protect communications
and writings that is new -- it is the invasive technology and
the windfall to you of communications and records being handled
by third parties that is new. Your claim of being locked out by
new technology not contemplated by the Constitution is false.
What was not contemplated and now needs to be remedied is that
conversations easily secured against eavesdroppers in 1789
are now easily overheard, and communications easily secured
in 1789 are now easily violated. THAT'S what needs to be
fixed, NOT your inability to continue and expand your
totalitarian invasion of the natural rights of Americans
and others.
> We want to work with industry on a real solution,
More bullshit! You want what you want when you want it and
you have been vigorously campaigning for new and expanded
powers to every ear on Capitol Hill that would listen, even
conducting closed briefings to make your one-sided case out
of the light of public scrutiny. Admit it -- you're a
thorough-going weasel, and proud of it!
> recognizing that those who acquire encryption over the
> Internet or from abroad naively make assumptions about
> the security it affords.
Oh, PLEASE! You have the security of naive Internet users
at heart? Is that what we're supposed to believe? Do you
really think we just fell off the turnip truck? The very
encryption you fear most, strong public key encryption that
you can't break and won't be able to break within the
predicted lifetime of the universe, is presently available
over the Internet, AND THAT IS PRECISELY WHAT YOU DON'T LIKE,
you lying Nazi fuck!
> We are not fighting encryption,
HAVE YOU NO SHAME AT ALL, uttering bald-faced lies like that?
> but we know what will happen if technology cannot be made
> to work for law enforcement as it works for criminals
> and terrorists.
We know, too: freedom will continue to have a chance. You
need to take a deep breath and consider that many people now
understand the sham in which you are involved. More and more
people are wondering why you don't just nail the truly bad
guys the way they have been nailed for millenia -- by good,
conventional police work. Bad guys have been apprehended since
time immemorial without resort to data-mining the databases and
eavesdropping on all forms of communication. Now, just because
technology allows you means of invasion never contemplated by
the Constitution, suddenly you can't do your job without
them? Utter nonsense! Lying Nazi fuck nonsense!
Louis J. FREEH
(Louis J. FUCK-THE-FREE)
Dir., Federal Bureau of Investigation
(Generalisimo, Federal Bureau of Absolute Control)
Washington, July 10,1998
(Disneyland-on-the-Potomac)
TruthIsAsPlainAsTheNoseOnYourLyingNaziFuckFaceMonger II
From SupportOnlineStaff_000926 at news.newswire.microsoft.com Mon Jul 13 11:31:29 1998
From: SupportOnlineStaff_000926 at news.newswire.microsoft.com (Support Online Staff)
Date: Mon, 13 Jul 1998 11:31:29 -0700 (PDT)
Subject: Developer Support News Watch - July 13, 1998
Message-ID: <199807131831.LAA05698@toad.com>
Developer Support News Watch
============================
As a subscriber to Developer Support News Watch, you receive e-mail
twice each month that highlights some of the new articles recently
published on Support Online, Microsoft's award-winning technical support
web site.
Table of Contents
=================
(1) Announcements
(2) New Knowledge Base Articles
(3) Requesting Articles via E-Mail
(4) Developer Product FAQs & Support Resources
(5) Additional Resources
(1) Announcements
Integrated Solutions: Microsoft Business Applications Conference 98
-------------------------------------------------------------------
At the Microsoft Business Applications Conference, the content will
be technical, but the focus will be on how you can build the best
integrated solutions for your most common business problems.
Sign up today -- see http://www.microsoft.com/events/bizapps/
Southern California Developers
------------------------------
Attention all Developers in Southern California :
On July 21 & 22, attend the FREE Microsoft TechNet Quarterly Briefing and
gain the know-how to implement the latest technology. Keynote on the Windows
desktop plus a developer must: the Developer Track covering Windows DNA and
3-tier app development. Use VIP CODE LSMTS.
New Features Make Finding Your Answers on Support Online Even Easier
--------------------------------------------------------------------
Support Online recently released a number of new features to make it
even easier to find the answers you need. The following highlights some of
the enhancements you'll see on Support Online at http://support.microsoft.com/.
For information about how to use these new Support Online features, see
http://support.microsoft.com/support/howto/.
- Specify an article ID number. If you know the ID number of the
Knowledge Base article you want, you can enter the ID number
to find that specific article.
- Search for troubleshooting tools. Now you can customize your
search to include troubleshooting tools only.
- Search for specific drivers and other downloadable files. If you
know the name of the driver or download file you want, enter the
full file name to find the file on Support Online.
- See what's new. If you want to see the latest information about
a product and/or a topic, use the What's New option and select
the number of days you want to review. You can select 1, 3, 7,
14, or 30 days.
- Toggle between Advanced View and Basic View. Advanced View
offers additional search options and other features. Now you
can easily toggle between Advanced View and Basic View.
Need help using these features? See http://support.microsoft.com/support/howto/.
(2) New Knowledge Base Articles
===============================
In addition to the FAQ documents mentioned below, the
following articles were recently updated in the Microsoft Knowledge Base:
ActiveX Data Objects
--------------------
PRB: Decimal Values Passed to a Stored Procedure Get Truncated (Q188574)
http://support.microsoft.com/support/kb/articles/Q188/5/74.asp
ActiveX SDK
-----------
INFO: Internet Explorer designMode Property Is Not Supported (Q188864)
http://support.microsoft.com/support/kb/articles/Q188/8/64.asp
Active Server Pages
-------------------
PRB: Request.ServerVariables("LOGON_USER") Returns Empty String (Q188717)
http://support.microsoft.com/support/kb/articles/Q188/7/17.asp
PRB: Implements Keyword Fails in VB DLL called from ASP (Q188716)
http://support.microsoft.com/support/kb/articles/Q188/7/16.asp
HOWTO: Change Information in a Database from ASP (Q188713)
http://support.microsoft.com/support/kb/articles/Q188/7/13.asp
Automation/VBA
--------------
BUG: Starting Word Manually Uses Same Instance as Automation (Q188546)
http://support.microsoft.com/support/kb/articles/Q188/5/46.asp
Internet Development
--------------------
PRB: The File Upload Control Cannot Publish Your Files (Q188953)
http://support.microsoft.com/support/kb/articles/Q188/9/53.asp
BETA-INFO: DHTML Behaviors Limited to One Per HTML Element (Q188866)
http://support.microsoft.com/support/kb/articles/Q188/8/66.asp
PRB: Forms 2.0 CommandButton Fires Click Event When Disabled (Q188766)
http://support.microsoft.com/support/kb/articles/Q188/7/66.asp
BETA-PRB: Type Mismatch for Document.parentWindow (Q188764)
http://support.microsoft.com/support/kb/articles/Q188/7/64.asp
BUG: document.readyState Not in Sync with Download in IFrame (Q188763)
http://support.microsoft.com/support/kb/articles/Q188/7/63.asp
HOWTO: Show Web Page Source from a Hyperlink (Q188762)
http://support.microsoft.com/support/kb/articles/Q188/7/62.asp
Java
----
BUG: KEY_PRESSED Event Not Generated for Some Controls (Q188808)
http://support.microsoft.com/support/kb/articles/Q188/8/08.asp
FIX: Setting Colors for List/Choice Control Fails (Q188448)
http://support.microsoft.com/support/kb/articles/Q188/4/48.asp
FIX: AFC Deadlock May Occur When Setting UIFrame's Cursor. (Q188446)
http://support.microsoft.com/support/kb/articles/Q188/4/46.asp
MAPI Programming
----------------
HOWTO: Use BatchExport to Specify Which Attributes to Export (Q188960)
http://support.microsoft.com/support/kb/articles/Q188/9/60.asp
PRB: Error 2001 Linking Simple MAPI Applications (Q188959)
http://support.microsoft.com/support/kb/articles/Q188/9/59.asp
INFO: Possible Causes for Memory Leaks in MAPI Clients/Providers (Q188958)
http://support.microsoft.com/support/kb/articles/Q188/9/58.asp
PRB: Transport Causes MAPI Spooler to Shutdown Unexpectedly (Q188653)
http://support.microsoft.com/support/kb/articles/Q188/6/53.asp
PRB: CDO Rendering Library Not Available Outside of ASP (Q188599)
http://support.microsoft.com/support/kb/articles/Q188/5/99.asp
HOWTO: Open the Global Profile Section (Q188482)
http://support.microsoft.com/support/kb/articles/Q188/4/82.asp
Mastering Series
----------------
PRB: Troubleshooting Active Movie Problems in Mastering Series (Q188660)
http://support.microsoft.com/support/kb/articles/Q188/6/60.asp
PRB: Marisa.dll Causes Movie Clip Errors in Mastering Series (Q188445)
http://support.microsoft.com/support/kb/articles/Q188/4/45.asp
ODBC Programming
----------------
PRB: Stored Procedure Invocation Returns "Protocol Error in TDS" (Q188558)
http://support.microsoft.com/support/kb/articles/Q188/5/58.asp
Internet Scripting Languages
HOWTO: Use Internet Transfer Control in ASP or in WSH Script (Q188955)
http://support.microsoft.com/support/kb/articles/Q188/9/55.asp
Visual Basic
------------
BUG: Incorrect Localized Strings Display in the Visual Basic IDE (Q189056)
http://support.microsoft.com/support/kb/articles/Q189/0/56.asp
PRB: ITC Cannot Perform ASCII-type FTP Transfer (Q188956)
http://support.microsoft.com/support/kb/articles/Q188/9/56.asp
HOWTO: Use the Remote Data Control to Pass Bookmarks (Q188861)
http://support.microsoft.com/support/kb/articles/Q188/8/61.asp
FILE: VB5SP3DS.EXE Contains Visual Basic SP3 Debugging Symbols (Q188588)
http://support.microsoft.com/support/kb/articles/Q188/5/88.asp
HOWTO: Expedite the Visual Basic Support Process (Q188586)
http://support.microsoft.com/support/kb/articles/Q188/5/86.asp
BUG: UserControl's ContainedControls Do Not Inherit ScaleMode (Q188552)
http://support.microsoft.com/support/kb/articles/Q188/5/52.asp
INFO: Visual Basic Requirements for Using Exported DLLs (Q188541)
http://support.microsoft.com/support/kb/articles/Q188/5/41.asp
Visual C++
----------
BUG: Calling CHttpFile::ErrorDlg Function Causes Errors 127 & 2 (Q189094)
http://support.microsoft.com/support/kb/articles/Q189/0/94.asp
BUG: Step 2 of the MFC AppWizard Does Not Set Macro Values (Q189073)
http://support.microsoft.com/support/kb/articles/Q189/0/73.asp
PRB: WinDBG for WinCe 2.0 Does Not Support Named Pipes (Q189036)
http://support.microsoft.com/support/kb/articles/Q189/0/36.asp
HOWTO: VC++ MFC Client for the ComCallingJava Sample (Q188817)
http://support.microsoft.com/support/kb/articles/Q188/8/17.asp
BUG: AV Using ios-Derived Type in Multithreaded Apps (Q188721)
http://support.microsoft.com/support/kb/articles/Q188/7/21.asp
PRB: Error Executing ~vcecho!Compiling (Q188720)
http://support.microsoft.com/support/kb/articles/Q188/7/20.asp
BUG: Error C1083 Building Large Projects with Browse Info (Q188708)
http://support.microsoft.com/support/kb/articles/Q188/7/08.asp
INFO: Visual C++ and the Year 2000, Years that Cause an Overflow (Q188707)
http://support.microsoft.com/support/kb/articles/Q188/7/07.asp
BUG: Memory Leak with Jet 3.51 and Remote ODBC Data Sources (Q188579)
http://support.microsoft.com/support/kb/articles/Q188/5/79.asp
Visual FoxPro
-------------
HOWTO: Determine the Operating System Build Number (Q188987)
http://support.microsoft.com/support/kb/articles/Q188/9/87.asp
HOWTO: Use the Win32 API to Access File Dates and Times (Q188977)
http://support.microsoft.com/support/kb/articles/Q188/9/77.asp
HOWTO: Setting the System Date and Time Programmatically (Q188897)
http://support.microsoft.com/support/kb/articles/Q188/8/97.asp
BUG: "String is too long to fit" Error Passing Variables to COM (Q188888)
http://support.microsoft.com/support/kb/articles/Q188/8/88.asp
PRB: "Cannot Open File" Message Building FoxPro 2.6 Project (Q188536)
http://support.microsoft.com/support/kb/articles/Q188/5/36.asp
HOWTO: Sharing Data Between Processes Using Memory-Mapped Files (Q188535)
http://support.microsoft.com/support/kb/articles/Q188/5/35.asp
HOWTO: Use API Calls to Detect Other Running Applications (Q188404)
http://support.microsoft.com/support/kb/articles/Q188/4/04.asp
HOWTO: Modify Report Fields Programmatically (Q188403)
http://support.microsoft.com/support/kb/articles/Q188/4/03.asp
PRB: ACCESS Cannot Import/Link Table if Index Contains Function (Q188401)
http://support.microsoft.com/support/kb/articles/Q188/4/01.asp
Visual InterDev
---------------
BUG: Executing "SP_PrimaryKey" results in no primary key (Q188719)
http://support.microsoft.com/support/kb/articles/Q188/7/19.asp
HOWTO: Troubleshoot IUSR_machine Permissions Problem (Q188712)
http://support.microsoft.com/support/kb/articles/Q188/7/12.asp
Win32 SDK
---------
HOWTO: Programmatically Trigger a SNMP Trap (Q189131)
http://support.microsoft.com/support/kb/articles/Q189/1/31.asp
FIX: ICMP API Header & Library Files Missing from Windows CE (Q189120)
http://support.microsoft.com/support/kb/articles/Q189/1/20.asp
HOWTO: Create Context-Sensitive HTML Help in a Visual Basic App (Q189086)
http://support.microsoft.com/support/kb/articles/Q189/0/86.asp
HOWTO: Use the SetupAPI's SetupIterateCabinet() Function (Q189085)
http://support.microsoft.com/support/kb/articles/Q189/0/85.asp
HOWTO: Create a Tri-pane Window with HTML Help Workshop (Q189084)
http://support.microsoft.com/support/kb/articles/Q189/0/84.asp
BUG: LoadPerfCounterTextString Fails with Error 87 (Q188769)
http://support.microsoft.com/support/kb/articles/Q188/7/69.asp
INFO: Working with the FILETIME Structure (Q188768)
http://support.microsoft.com/support/kb/articles/Q188/7/68.asp
HOWTO: Specify Access Control on Window NT Container Objects (Q188760)
http://support.microsoft.com/support/kb/articles/Q188/7/60.asp
INFO: UserDomain Method Does Not Work Under Win95 with WSH (Q188602)
http://support.microsoft.com/support/kb/articles/Q188/6/02.asp
BUG: ADSI NDS Provider Does Not Support Extension of NDS Schema (Q188510)
http://support.microsoft.com/support/kb/articles/Q188/5/10.asp
BUG: Editing MAP or ALIAS in the HTML Help Workshop Causes Error (Q188444)
http://support.microsoft.com/support/kb/articles/Q188/4/44.asp
(3) Requesting articles via e-mail
==================================
You can also receive these articles (and others) in e-mail by sending a message to mshelp at microsoft.com. In the Subject line of your message, enter the Article-ID number (Qnnnnnn). For example to receive Q162721, your Subject line should resemble the following example:
Subject: Q162721
You can have multiple articles sent to you in e-mail by typing multiple Article-ID numbers separated by a comma. For example:
Subject: Q178049, Q174914, Q174062
To receive an index of articles, enter "Index" (without quotation marks) in the Subject line. For example:
Subject: Index
The MSHelp Index is updated monthly. For more information about MSHelp, see http://support.microsoft.com/support/kb/articles/q183/1/21.asp.
Visit Support Online
--------------------
We also encourage you to visit Support Online at http://support.microsoft.com/support/ to see our complete selection of helpful articles designed to answer questions about using Microsoft products.
(4) Developer Product FAQs & Support Resources
==============================================
Here's some highlights and pointers to the latest information on
Microsoft Developer Tools:
Visual Studio Service Pack Released: Visual Studio 97 Service Pack 3
contains bug fixes for many tools, and is now available for developers
who use any of the Visual Studio tools. See
http://www.microsoft.com/vstudio/sp/ for the latest information.
Visual BASIC Frequently Asked Questions:
For pointers to the latest Visual BASIC FAQ's, see
http://support.microsoft.com/support/vbasic/faq/default.asp
Visual C++ 5.0 (Professional & Enterprise)
Frequently Asked Questions - FAQ (Q167654), see
http://support.microsoft.com/support/kb/articles/Q167/6/54.asp
Visual FoxPro 5.0 Frequently Asked Questions (FAQ), see
http://support.microsoft.com/support/vfoxpro/content/faq
/vfoxpro/vfp50win/default.asp
Visual J++ Frequently Asked Questions - FAQ (Q169173), see
http://support.microsoft.com/support/kb/articles/Q169/1/73.asp
Visual InterDev Troubleshooting Guide:
Look through this guide to help you quickly troubleshoot and overcome
the most common technical issues you may encounter when first setting up
your Microsoft Visual InterDev working environment.
See http://support.microsoft.com/support/vinterdev/content/tsguide.asp
Microsoft SourceSafe Frequently Asked Questions (FAQ) (Q134369), see
http://support.microsoft.com/support/kb/articles/Q134/3/69.asp
Microsoft Developer Support Messaging Frequently Asked Questions (FAQ)
http://support.microsoft.com/support/messagingsdk/faq/default.asp
Multimedia Sample Projects:
Add multimedia functionality to your Visual Basic program by using the
techniques in these Visual Basic sample projects. See
http://support.microsoft.com/support/vbasic/vbmm.asp
Active Template Library (ATL) Frequently Asked Questions (Q166480), see
http://support.microsoft.com/support/kb/articles/Q166/4/80.asp
Popular MFC Samples--created by support engineers for MFC developers.
See http://support.microsoft.com/support/visualc/atlmfc/samples.asp
OLE Automation Using MFC
For the latest articles about automating Microsoft Office 97 components
using the Microsoft Foundation Classes (MFC), see
http://support.microsoft.com/support/visualc/atlmfc/oleatmfc.asp
VBA Software Development Kit Frequently Asked Questions - FAQ (Q170298)
http://support.microsoft.com/support/kb/articles/Q170/2/98.asp
COM Security Frequently Asked Questions - FAQ (Q158508), see
http://support.microsoft.com/support/kb/articles/Q158/5/08.asp
ADC 1.0 FAQ Available for Download (Q165292), see
http://support.microsoft.com/support/kb/articles/Q165/2/92.asp
Or download directly from:
http://support.microsoft.com/download/support/mslfiles/ADC10FAQ.EXE
Visual Modeler 1.0 Frequently Asked Questions (FAQ)(Q166395), see
http://support.microsoft.com/support/kb/articles/Q166/3/95.asp
ActiveX Data Objects (ADO) Frequently Asked Questions (Q183606)
http://support.microsoft.com/support/kb/articles/Q183/6/06.asp
Microsoft Internet Finance Server Toolkit (MIFST) Frequently Asked
Questions (Q182448)
http://support.microsoft.com/support/kb/articles/Q182/4/48.asp
Developing with the ActiveX SDK - FAQ (Q158264), see
http://support.microsoft.com/support/kb/articles/Q158/2/64.asp
Developing with the Internet Client SDK - FAQ (Q167435), see
http://support.microsoft.com/support/kb/articles/Q167/4/35.asp
SDK for Java Frequently Asked Questions - FAQ (Q168942), see
http://support.microsoft.com/support/kb/articles/Q168/9/42.asp
Microsoft SDK for Java Release:
Go to this page to download the latest released Microsoft SDK for
Java (2.02), which contains the Java VM from IE 4.01, support
for JDK 1.1, J/Direct, AFC, samples, the latest Java compiler,
and documentation. See http://www.microsoft.com/java/download.htm
The latest Microsoft VM for Java: Easily upgrade to the latest VM,
See http://www.microsoft.com/java/vm/dl_vmsp2.htm
Java/COM/DCOM Frequently Asked Questions - FAQ (Q168935), see
http://support.microsoft.com/support/kb/articles/Q168/9/35.asp
CAB Files Frequently Asked Questions - FAQ (Q168941), see
http://support.microsoft.com/support/kb/articles/Q168/9/41.asp
AFC Frequently Asked Questions - FAQ (Q168943)
http://support.microsoft.com/support/kb/articles/Q168/9/43.asp
(5) Additional Resources
========================
In addition, the following resources might prove helpful:
Check out the MSDN "Buzz" for the latest information on Microsoft's
developer tools and strategies: http://www.microsoft.com/msdn/
For the latest and greatest information about Internet technologies,
the Microsoft SiteBuilder Network can be found at:
http://www.microsoft.com/workshop/default.asp
For links to specific developer tools products and technologies, refer to:
Products: http://www.microsoft.com/msdn/products/
Technologies: http://www.microsoft.com/msdn/techsite/
TechNet has a new site, ITHome, which offers comprehensive resources for
corporate developers: http://www.microsoft.com/ithome/
Sincerely,
The Microsoft Developer Support team
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://www.microsoft.com/events/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.
Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This document may be copied and distributed subject to the following conditions:
1. All text must be copied without modification and all pages must be included
2. All copies must contain Microsoft's copyright notice and any other notices provided therein
3. This document may not be distributed for profit
From list at 1800birks4u.com Mon Jul 13 11:35:41 1998
From: list at 1800birks4u.com (The Birkenstock Store)
Date: Mon, 13 Jul 1998 11:35:41 -0700 (PDT)
Subject: Birkenstocks on Sale Now!!
Message-ID:
Hi
Visit www.BirksonSale.com to learn not only which Birkenstocks are on sale
now, but which are in stock for immediate delivery. Updated daily,
Monday-Friday.
We have just added hundreds of pairs!
Order on line and Save at least 20%!
For example, Save $21.00 today on the Arizona in Sand, Mink and Violet
Suede BirksonSale price $68.95 (Catalog Price $89.95)
Your order is secure, including encryption of your credit card information,
using the latest in SSL technology.
Log on today and Save!
If you know someone that would also like to save on Birkenstocks forward
this message to them!
____________________________________________________________________________
_
If you would like to be removed from this list email us at
list at 1800birks4u.com and include the word remove in the subject line.
From rubin at research.att.com Mon Jul 13 12:34:37 1998
From: rubin at research.att.com (Avi Rubin)
Date: Mon, 13 Jul 1998 12:34:37 -0700 (PDT)
Subject: Cipher: IEEE TC on Security & Privacy Newsletter is online
Message-ID: <199807131932.PAA01744@mgoblue.research.att.com>
Newsgroups: sci.crypt,alt.security,comp.security.misc,alt.security.pgp
Subject: Cipher: IEEE TC on Security & Privacy Newsletter is online
Summary:
Expires:
Sender:
Followup-To:
Distribution: world
Organization: AT&T Labs, Florham Park, NJ
Keywords:
Cc:
Cipher is the electronic newsletter of the IEEE Technical Committee on
Security & Privacy. We put out a newsletter by e-mail every couple of
months. There is also a companion web site at:
http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/
Below is the table of contents of our latest issue. You can find subscription
information on the web site, or just visit back from time to time.
_/_/_/_/ _/_/_/ _/_/_/_/ _/ _/ _/_/_/_/ _/_/_/_/
_/ _/ _/ _/ _/ _/ _/ _/ _/
_/ _/ _/_/_/_/ _/_/_/_/ _/_/ _/_/_/_/
_/ _/ _/ _/ _/ _/ _/ _/
_/_/_/_/ _/_/_/ _/ _/ _/ _/_/_/_/ _/ _/
====================================================================
Newsletter of the IEEE Computer Society's TC on Security and Privacy
Electronic Issue 28 July 13, 1998
Avi Rubin and Paul Syverson, Editors
Bob Bruen, Book Review Editor
Hilarie Orman, Assoc. Editor
Mary Ellen Zurko, Assoc. Editor
Anish Mathuria, Reader's Guide
====================================================================
http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/
Contents: [3037 lines total]
o Letter from the TC Chair
o Letter from the Editor
Security and Privacy News Briefs:
o LISTWATCH: Items from security-related lists, by Mary Ellen Zurko
o Microsoft Plans for FIPS 140-1 Compliance
o Common Criteria Full-use Version 2.0 Completed
o Purdue CERIAS Opens
o US Government Announces Comprehensive Privacy Plan
o Controversial Intellectual Property Law Headed Towards Enactment
o SKIPJACK and KEA declassified, Biham et al. Announce Cryptanalysis
o AES Submissions All In
o DataFellows Reports On Word Macro Virus
o Industry coalition pushes for new Encryption policy
Commentary and Opinion: Book Reviews by Bob Bruen
o Virtual Private Network.
by Charles Scott, Paul Wolfe & Mike Erwin. Reviewed by Robert Bruen
o Java Security.
by Gary McGraw and Edward Felten. Reviewed by Robert Bruen
o Java Security.
by Scott Oaks. Reviewed by Robert Bruen
o Java Cryptography.
by Jonathan Knudsen. Reviewed by Robert Bruen
o Protecting Networks with Satan.
by Martin Freiss. Translated by Robert Bach. Reviewed by Robert Bruen
Conference Reports:
o IEEE Symposium on Security and Privacy (Oakland '98) by Mary Ellen Zurko
o IEEE Computer Security Foundations Workshop (CSFW11) by Levente Buttyan
o LICS98 Workshop on Formal Methods and Security Protocols by Scott Stoller
Conference announcements:
o ACM Conference on Computer and Communications Security
o ASIACRYPT'98
New reports available via FTP and WWW: several
New Interesting Links on the Web
Who's Where: recent address changes
Calls for Papers: NDSS, DCCA, ASSET, FC, PKC, S&P (Oakland), JCS, DPS
Reader's guide to recent security and privacy literature
o Conference Papers
o Journal and Newsletter articles
Calendar
List of Computer Security Academic Positions, maintained by Cynthia Irvine
Publications for Sale -- S&P and CSFW proceedings available
TC officers
Information for Subscribers and Contributors
*********************************************************************
Aviel D. Rubin rubin at research.att.com
Secure Systems Research Dept. Adjunct Professor at NYU
AT&T Labs - Research
180 Park Avenue http://www.research.att.com/~rubin/
Florham Park, NJ 07932-0971 Voice: +1 973 360-8356
USA FAX: +1 973 360-8809
--> Check out http://www.clark.net/pub/mjr/websec/ for a new
book on web security (The Web Security Sourcebook).
*********************************************************************
From powergal at polbox.com Mon Jul 13 19:16:49 1998
From: powergal at polbox.com (Power & Prosperity)
Date: Mon, 13 Jul 1998 19:16:49 -0700 (PDT)
Subject: UCE - I am a real Person sending you a real
Message-ID: <419.435989.92825289powergal@polbox.com>
I'm not here on the Internet to burden you with unsolicited advertising
solicitations. If I've offended you in any way, I am sorry. If you do not wish to
receive any more information, then do not respond to this message and you
won't hear from me again. I do not re-use email addresses. After they are
used ONCE, they are deleted.
My point is brief.
The reason I am writing to you is that I am overwhelmed with Leads.
I would like to find just a few quality people to work with who have
the desire to make six-figure results so that I can help them get started.
I will not sell to anyone, nor will I do any convincing, and neither will you.
If you would like more information, just say the words (words=GPG in the
subject line of your return email) and I'll email a free, helpful file that will
give you more information.
Sincerely,
Dobbin
PS - Yes, I do read all your responses and I'll handle each one personally.
Note: To comply with all Federal and State Laws, the following information is
included. This message is sent by Dobbin Cashman (me) domiciled at 1064
Bunn Hill Road in Vestal, NY. (800) 350-5426.
From SupportOnlineStaff_000929 at news.newswire.microsoft.com Mon Jul 13 19:32:30 1998
From: SupportOnlineStaff_000929 at news.newswire.microsoft.com (Support Online Staff)
Date: Mon, 13 Jul 1998 19:32:30 -0700 (PDT)
Subject: No Subject
Message-ID: <199807140232.TAA09439@toad.com>
Microsoft Office Support News Watch
===================================
As a subscriber to the Microsoft Office Support News Watch, you receive e-mail twice each month that highlights some of the new articles recently published on Support Online, Microsoft's award-winning technical support web site.
Office
======
For the latest information about Microsoft Office 97 SR-1 see these Knowledge Base articles.
Q172475 OFF97: How to Obtain and Install MS Office 97 SR-1
http://support.microsoft.com/support/kb/articles/Q172/4/75.asp
Q174422 OFF97: Microsoft Office 97 Service Release 1 Patch Update
http://support.microsoft.com/support/kb/articles/Q174/4/22.asp
Q150613 OFF97: Microsoft Office 97 Service Release 1 Patch
http://support.microsoft.com/support/kb/articles/Q150/6/13.asp
Q173990 OFF97: Troubleshooting the Microsoft Office 97 SR-1 Patch
http://support.microsoft.com/support/kb/articles/Q173/9/90.asp
Q156542 OFF97: Microsoft Office 97 Service Release 1 Enterprise Update
http://support.microsoft.com/support/kb/articles/Q156/5/42.asp
Q171749 OFF97: How to Determine If SR-1 Is Installed
http://support.microsoft.com/support/kb/articles/Q171/7/49.asp
Q172387 OFF97: Files Installed and Updated in MS Office 97 SR-1 Patch
http://support.microsoft.com/support/kb/articles/Q172/3/87.asp
Q172476 OFF97: Contents of the Microsoft Office 97 SR-1 Patch Readme
http://support.microsoft.com/support/kb/articles/Q172/4/76.asp
Net Show and the Microsoft Media Player
=======================================
The Net Show Player has been replaced by the new Microsoft Media Player. The latest Net Show and Microsoft Media Player support information is available at:
http://support.microsoft.com/support/NetShow/
Download the new media player at:
http://www.microsoft.com/windows/mediaplayer/
Microsoft Chat
==============
The latest support information for Microsoft Chat, version 2.5 is available at:
http://support.microsoft.com/support/chat/
Get Support Online Articles by E-mail
=====================================
You can also receive these articles (and others) in e-mail by sending a message to mshelp at microsoft.com. In the Subject line of your message, enter the Article-ID number (Qnnnnnn). For example to receive Q162721, your Subject line should resemble the following example:
Subject: Q162721
You can have multiple articles sent to you in e-mail by typing multiple Article-ID numbers separated by a comma. For example:
Subject: Q178049, Q174914, Q174062
To receive an index of articles, enter "Index" (without quotation marks) in the Subject line. For example:
Subject: Index
The MSHelp Index is updated monthly. For more information about MSHelp, see http://support.microsoft.com/support/kb/articles/q183/1/21.asp.
Sincerely,
The Support Online team
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://www.microsoft.com/events/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.
Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This document may be copied and distributed subject to the following conditions:
1. All text must be copied without modification and all pages must be included
2. All copies must contain Microsoft's copyright notice and any other notices provided therein
3. This document may not be distributed for profit
From jf_avon at citenet.net Mon Jul 13 20:28:03 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Mon, 13 Jul 1998 20:28:03 -0700 (PDT)
Subject: [humor] Fwd: Win98's README.1ST
Message-ID: <199807140342.XAA12447@cti06.citenet.net>
==================BEGIN FORWARDED MESSAGE==================
>Subject: Win98's README.1ST
Did you intend to upgrade to Win98?
If you do, here's a preview of the READ ME FIRST page
-------------------------------------------------------------------
Congratulations on your purchase of Windows 98 (c),
the latest version of the world's #1 computer operating
system from Microsoft.
A) Before using your new software, please take the time to read these
instructions carefully. Failure to do so may further limit the terms of the
limited warranty. Windows 98 (c) represents a significant
technological improvement over Microsoft's previous operating
system, Windows 95 (c).
You'll notice immediately that
* "98" is a higher number than "95,"
* a better than 3 percent increase.
But that's not all. Windows 98 (c) contains many features not found in
Windows 95 (c), or in any competing computer operating system, (if
there are any of course).
Among the improvements: faster storing and
retrieving of files (not in all models), enhanced "Caps Lock" and
back-space functionality, smoother handling, less knocking and
pinging, an easy-to-follow 720-page User's Guide, and rugged
weather-resistant shrink wrap around the box. Most important,
Windows 98 (c) offers superior compatibility with all existing
Microsoft products. We're betting that you'll never use another
company's software again.
Windows 98 (c) comes factory-loaded with the latest version of
Microsoft Explorer, the world's most popular Internet browser. And
despite what you may have heard from the U.S. Department of
Justice, Windows 98 (c) offers you the freedom to select the
Internet browser of your choice, whether it's the one produced by
the world's largest and most trusted software producer, or by a
smaller company that will either go out of business or become part
of the Microsoft family.
Configuring Windows 98 (c) to use a browser OTHER than Microsoft
Explorer is easy. Simply open the "Options" folder, click on the
"time bomb" icon, and select "Load Inferior Browser." A dialog box
will ask "Are you sure?" Click "yes." This question may be asked
several more times in different ways and in 12 different languages
; just keep clicking "yes." Eventually, the time-bomb icon will
enlarge to fill the entire screen, signifying that the browser is
being loaded. You'll know the browser is fully loaded when the fuse
on the time bomb "runs out" and the screen "explodes." If at any
time after installation you become disappointed with the slow speed
and frequent data loss associated with other browsers, simply tap
the space bar on your keyboard. Microsoft Explorer will automatically be
re-installed- permanently.
Windows 98 (c) also corrects, for the first time anywhere, the "Year
2000" computer problem. As you may know, most computers store
the current year as a two-digit number and, as a result, many will
mistake the year 2000 for 1900. Windows 98 (c) solves the
problem by storing the year as a four-digit number and, in theory,
you won't have to upgrade this part of the operating system until the
year 10000.
However, the extra memory required to record the year in four digits
has prompted a few minor changes in the software's internal
calendar. Henceforth, Saturday and Sunday will be stored as single
day, known as "Satsun," and the month of June will be replaced by
two 15-day months called "Bill" and "Melissa." Please also take the
time to complete the online registration form. It only takes a few
minutes and will help us identify the key software problems our
customers want addressed. Be assured that none of the
information you provide, whether it's your Social Security number,
bank records, fingerprints, retina scan or sexual history, will be
shared with any outside company not already designated as a
Microsoft DataShare partner.
We've done our best to make using Windows 98 (c) as trouble-free
as possible. We want to hear from you if you're having any
problems at all with you software. Simply call our toll-free Helpline
and follow the recorded instructions carefully. (The Helpline is open every
day but Satsun, and is closed for the entire month of Bill.)
If we don't hear from you, we'll assume your software is working
perfectly, and an electronic message to that effect will be forwarded
to the Justice Department. We'll also send, in your name, a letter to
the editor of your hometown newspaper, reminding him or her that
American consumers want software designed by companies that
are free to innovate, not by government bureaucrats.
Again, thanks for choosing Windows 98 (c).
===================END FORWARDED MESSAGE===================
Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
DePompadour, Soci�t� d'Importation Lt�e
Limoges fine porcelain and french crystal
JFA Technologies, R&D physicists & engineers
Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From michael at nudevision.com Tue Jul 14 00:30:47 1998
From: michael at nudevision.com (Michael)
Date: Tue, 14 Jul 1998 00:30:47 -0700 (PDT)
Subject: FREE XXX VIDEO for your site !!
Message-ID: <18330673314336@nudevision.com>
Thats right FREE XXX VIDEO for your website....
- increase traffic
- increase banner sales
- BOOST your profit
- Can be used by FREE SITE and PAY SITES
FREE SITE webmasters go to http://free.nudevision.com
MEMBERSHIP SITE webmasters go to
http://www.nudevision.com/webmasters/index.htm
We are offering PAY SITE website webmasters 90 MINUTE FULL LENGTH MOVIES which
means SALES SALES SALES !!
EARN 10 BUCKS A RAW CLICK AND GET FREE TRAFFIC !!
"WHAT? Are you guys nuts?"
Well maybe a little..... go to http://www.traffictraders2.com for
more details.
GAY SITE webmasters click here:
http://www.studvision.com/webmasters/index.html
Best Regards,
The Cytron Gang
Cytron Technologies Ltd.
Cytron Communications Ltd.
From jya at pipeline.com Tue Jul 14 05:06:45 1998
From: jya at pipeline.com (John Young)
Date: Tue, 14 Jul 1998 05:06:45 -0700 (PDT)
Subject: Jim Bell Request
Message-ID: <199807141206.IAA28181@camel8.mindspring.com>
A forwarded message from Jim Bell:
Jim is requesting that cpunks try to get the Oregon
newspaper to write up another story on his case.
John Branton is the "crime reporter" for the Columbian
newspaper (editors at columbian.com). Jim asks that people
send Branton a note saying they would like to see a
story on the issue of Jim's being spied on. This reporter
already knows what the allegations are, but Jim wants
to prod him into covering his story, because he thinks
it's important enough for the public to know about it.
Jim also would like any reporters on the list who are
interested in talking to him, to send him their phone
number and he will give them a call.
BTW, the next hearing date is set for the 7/30/98. In
the meantime, he's hanging around shooting pool, reading
magazines, etc.
[End Jim message]
----------
Jim's address:
James Bell #26906086
Federal Detention Center
P.O. Box 68976
Seattle WA 98168
----------
Latest court docket entries:
6/30/98 50 MINUTE ORDER by Judge Franklin D. Burgess that the
Probation Revocation hrg is rescheduled to 1:30 p.m. on
7/10/98 for James Dalton Bell (cc: counsel, Judge) (car)
[Entry date 06/30/98]
7/8/98 -- PROPOSED Supplemental Violations (car) [Entry date 07/08/98]
7/10/98 51 PROBATION PETITION/ORDER by Judge Franklin D. Burgess as to
James Dalton Bell re: Supplemental Violations (cc:
counsel, Judge, USPO) (car) [Entry date 07/10/98]
[END OF DOCKET: 3:97cr5270-0]
----------
Documents on Jim Bell:
http://jya.com/jdbfiles.htm
From CTIA_Daily_News at um2.unitymail.com Tue Jul 14 10:08:41 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Tue, 14 Jul 1998 10:08:41 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 14, 1998
Message-ID: <199807141700.MAA32024@mailstrom.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.� Please click on the icon /
attachment
for the most important news in wireless
communications today.
WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
=============================================
From ian at deepwell.com Mon Jul 13 20:33:58 1998
From: ian at deepwell.com (Ian Briggs)
Date: Tue, 14 Jul 1998 11:33:58 +0800
Subject: No Subject
Message-ID: <199807140330.UAA13890@rigel.infonex.com>
Well since it looks like its a valid converstation peace here, I might as
well give ya my 2 bits worth.
>>http://www.ourfirsttime.com
>>
>>aww... ain't 'dat sweet....
>>
>
>I'd appreciate it more if I hadn't been spammed twice already by
>self-proclaimed born-again Christians attempting to mobilize people
>against those two kids...
Or by one of the weaselly marketers in a while.
Think of it.
You creat a site based on a recent headline making Internet first .
Then you spam the shit out of everyone faking like your the oposition.
You don't get nailed for spamming
you give your opisition a black eye
you artificially create a media blitz, since the news runs to cover this
confrontation between the relegious right and the new internet morality.
You get about a billion hits
you add one or two click through adds
or some other such thing to the web page
Here comes the big day
Bingo, a quick 30,000$ in your bank account.
You sell the rights to porn companies to include in their feeds
since there is so much product recognition.
;)
smart little bastard
not that I am saying that is what is going on.
not that im cynical or anything....
Ian
From jya at pipeline.com Tue Jul 14 14:18:19 1998
From: jya at pipeline.com (John Young)
Date: Tue, 14 Jul 1998 14:18:19 -0700 (PDT)
Subject: NSA on Sat Crypto Device
Message-ID: <199807142118.RAA25583@camel7.mindspring.com>
This is a DoD fax of an NSA-brief on the Chinese satellite crypto device.
It was prepared for July 8 testimony by DoD's Franklin Miller before the
Senate Subcommittee on International Security, Proliferation and Federal
Affairs. Miller's testimony was cancelled but DoD has provided the one-
page brief to the media upon request.
JUL-14-1998 12:51 DEPARTMENT OF DEFENSE PA 703 697 3501 p.02
JUL 8 1998
Question: What happened to the encryption device that was aboard the
failed INTELSAT launch in 1996?
Answer: The U.S. personnnel present searched the site for two days after
the launch failure. Despite extremely hazardous conditions that made
recovery very difficult, the U.S. personnel believed that they recovered
all recoverable U.S. parts and components that survived the launch
failure.
No identifiable parts or components associated with the Telemetry
Tracking and Control Encryption devices [TT&C], and the circuit board on
which it was mounted, were recovered. We have been advised by Loral that
the devices were embedded on a tray mounted within the Command Processor
Box of the satellite. lf this is the case, it is highly unlikely that
the devices survived the crash because of the crash impact and high
temperatures produced by the burning rocket propellants. According to
Loral, the Command Processor Box was located adjacent to the propellant
tanks and U.S. personnel at the site recovered only 30% of the box.
The COMSEC circuit board consisted of a printed wiring board and forty
plus, off-the-shelf and semi-custom discrete small sca]e integrated
circuit chips. The COMSEC board is somewhat large and relatively fragile
(about 6x10 inches), with interconnecting "tracks" on the board which
interconnect the many logic devices into the COMSEC algorithm. As such
a whole circuit board, its whole composite set of pieces, and the whole
set of logic chips need to be recovered to succeed in reengineering the
design of the device. If Loral's assessment of the physical
implementation of the two COMSEC devices aboard INTELSAT 708 and the
extent of damage to the command processor from the crash, impact and
fire are correct, NSA and DTSA believe that it is highly unlikely that
these items could have been recovered in sufficient detail to reverse
engineer.
In the unlikely event that the Chinese were able to recover all the
items fully intact, it is important to note that the encryption board
involved many embedded devices. Any loss of the chips and associated
encryption algorithm would have have only minimal impact on national
security because the INTELSAT 708 satellite was uniquely keyed.
[End fax]
From teezi62 at nimbus.rz.uni-konstanz.de Tue Jul 14 15:06:39 1998
From: teezi62 at nimbus.rz.uni-konstanz.de (Jorge Boback)
Date: Tue, 14 Jul 1998 15:06:39 -0700 (PDT)
Subject: Here's the password you wanted....Don't pass it on
Message-ID: <199807143027VAA7354@post.agri.ch>
What's up Gary,
Here's the password.
Don't, I repeat don't give it to anyone
Remember press enter once you get there.
USR: harry
PWD: balls
CLICK HERE>> http://www.hpic.com/public-bin/redirect.cgi?file=dick&clickline=0&cookie=no_cookie
Jorge
From nobody at remailer.ch Tue Jul 14 16:44:27 1998
From: nobody at remailer.ch (Anonymous)
Date: Tue, 14 Jul 1998 16:44:27 -0700 (PDT)
Subject: FC: Why not to have "Privacy Commissioners"
In-Reply-To:
Message-ID: <19980715000720.2548.qmail@hades.rpini.com>
> Declan, These articles (unfortunately in German) are excellent
> examples of the true purpose of EU-style "Privacy
> Commissioners". Their purpose of course being to provide a whitewash
> to privacy violating activities by the government.
> Anyone want to translate 'em?
Here's a very quick translation. I loved that bit where AltaVista
translated "crackle" as "kneeling asterisk", anyway I hope this is
more readable than those miracles of machine translation.
SonntagsZeitung Online, July 12, 1998:
The movement profiles do exist
A confidential report by the data protection commissioner unveils:
Swisscom collects the complete Natel cell phone data every three hours
BY NIKLAUS RAMSEYER AND DENIS VON BURG
BERNE - a secret report by data protection commissioner Odilo Guntern
proves: Swisscom locates all powered-on Natel phones in Switzerland
with an accuracy of 100 meters every three hours and stores these data
for seven days.
Things are not as bad as all that, it's all legal, and there's no
problem whatsoever, the Swiss federal data protection commissioner
Odilo Guntern appeased the public last Monday. Swisscom AG apparantly
has "the possibility of locating every powered-on Natel at any time",
he admitted. That however only within the so-called Location Areas
comprising of 50 kilometers each - and certainly not down to the 2,500
a few kilometers small radio cells in the country "as claimed by the
SonntagsZeitung", Guntern said.
What the public did not learn: Gunterns lean three-page paper is only
the tip of the iceberg. Hidden behind it there is a 30 pages long
secret report that Guntern delivered only to "the parties involved",
as he calls it. "Involved" are Swisscom, Leuenberger's
(communications) and Koller's (justice and police) departments and the
parliament's revisions delegation.
Gunterns confidential report not only contains the crucial information
to the Natel issue. It partly contradicts the public remarks and to a
large extent confirms the SonntagsZeitung article of 28 December
1997. In particular Guntern concealed that the 800,000 Natel users in
Switzerland can not only "be located", but are subject to a fully
automatted Periodic Location Updating (PLU). PLU means: Every active
Natel will announce itself to the closest antenna every three hours,
then Swisscom will register its location.
Each Natel owner can verify that himself: It is sufficient to put the
switched-on mobile telephone next to a transistor radio. It then will
emit a clearly audible galloping crackle.
Movement data in some cases are stored for many weeks
The location information covers not only "one of only 30 location
areas" in the country, as Guntern wanted to make believe, it descends
down to "radio cell level". In cities it has a precision of a few 100
meters - in open rural areas still a precision of max. 10
kilometers. At least that is what experts from a leading Natel company
assure. Thus the quite precise Natel location is registered every
three hours. Worse yet: Swisscom stores the cell phones' corresponding
"movement data" for seven days - in some cases even for weeks and
months.
SVP member of parliament Bernhard Seiler, who is president of the
parliament's GPK delegation, confirms these facts to the
SonntagsZeitung. Data Protection commissioner Odilo Guntern too
admits: "The subject PLU is discussed in detail in my report." He will
not talk about "technical details" however.
It is quick to calculate. Eight location reports from 800,000 cell
phones per day, stored for one week: Swisscom permanently has more
that 40 million data available on where and how the 800,000 Natels are
moving through the country. They only serve for making connections, is
said officially. But whoever has access to this information can
immediately print out a "movement profile" and learn where exactly the
Natel (and thus, its owner) has been during the past seven
days. Guntern: "That is not impossible." Using radiogoniometics (see
graphics) Swisscom can even locate each Natel to an exactness of 50
meters and tap the conversations.
That also applies to the controversial Natel D Easy: "we have movement
data and operational data for these devices as well", Odilo Guntern
assures. That explains why the Conferedate Justice and Police
Department and Federal Attorney General Carla Del Ponte demand that
buyers of such devices should be registered systematically. If
necessary the police would like to know whom the movement profile of a
given Natels belongs to.
And why did the Guntern report remain secret? The "parties involved"
blame each other for the secretiveness. Guntern: "I didn't even ask
them if they would like to publish the report, and decided myself that
it was not public."
The controlling authorities at the Swiss parliament are not going to
accept that: "We were of the opinion that the entire Guntern report
would be presented in public", says the SP deputy Werner Carobbio from
Tessin, who also is a member of the GPK delegation. "We will bring up
the issue of "movement profiles of Natel users" for deepened
discussion", he promises.
---------------------------------------------------------------
Les Temps Online, July 7, 1998:
COMMUNICATION
TELECOMS. Yesterday the federal data protection commissioner presented his
annual report
Odilo Guntern: �Natel owners must be able to remain anonymous�
By Gabriel Sigrist
In Switzerland, every citizen can walk into a store and acquire a
smard part to be inserted into a portable telephone for 120
francs. Swisscom's system Natel D Easy does not require any
subscription and thus the user can remain anonymous. This anonymity
disturbs the Attorney General of the Confederation, Carla Del Ponte,
who on several occasions set her face against a system �used by all
the criminals�. According to the department of public prosecution, the
new ordinance on telecommunications imposed identification of Natel D
easy users beginning January 1st. The federal data protection
commissioner's report completely contradicts this assertion. �There is
no legal base for keeping records of Natel easy customers�, Odilo
Guntern concludes in his annual report. The data protection
commissioner goes even further: �In our society, protection of the
individual requires the possibility to talk on the phone without being
recorded in files, he stated towards Les Temps. Record the purchasers
of �easy� cards does not make sense because the criminals use other
means to remain anonymous, such as foreign cards but also call-back
services or simply phone booths.� In the neighbour countries however
the purchasers of such cards must declare their identity. �It is
because the laws are different, explains Odilo Guntern. In
Switzerland, identification is obligatory only when there is a
long-term customer provider relation, which is not the case with
pre-paid cards.� The card easy is thus legally comparable to a CFF
multicourse subscription or a phone card to use in booths. Goods which
can be acquired anonymously.
However the debate is not closed: �In our opinion the legal base is
sufficient to impose registration of the users, explains J�rg Blaser,
spokesman of the department of public prosecution. It is essential for
the security of our country to be able to identify the holders of
portable telephones.� The federal Office of communications (Ofcom)
will decide. According to Odilo Guntern, it currently remains
�perfectly legal� to acquire a card easy without giving your
name. Swisscom however encourages the purchasers to identify
themselves: the operator offers a small gift to those who reveal their
personal data.
The comissioner also occupied himself with in the possibilities of
tracing mobile telephones. According to his report, Swisscom can
locate a simply powered-on portable in a relatively large zone, but
not to the cell (a circle of ten kilometers). There too, opinions
diverge.
According to Christian Masson, enthusiastic activist of the freedom of
circulation, the GSM system used by Swisscom's Natel stores the
precise localization of the devices every three hours, for maintenance
purposes. Odilo Guntern does not mention such a process in his
report. According to Swisscom, the users' positions are erased
during their movement.
The report also puts emphasis on customer fidelity cards such as the
M-Cumulus by Migros. �Any holder of such a card must be informed of
the various discounts of which he can profit, as well as of the data
processing relating to it�, indicates the report.
On the Internet:
The full report of the federal data protection commissionser on
www.edsb.ch
The site of Mr. Masson on www.iimel.com/interception/mobile_trace.htm
From Cindy at mcglashan.com Tue Jul 14 18:07:21 1998
From: Cindy at mcglashan.com (Cindy Cohn)
Date: Tue, 14 Jul 1998 18:07:21 -0700 (PDT)
Subject: No Subject
Message-ID: <199807150056.RAA09720@gw.quake.net>
Hi all,
I've now had a chance to review the decision in the Junger case. I think it
contains many flaws, but will just highlight a few here.
The most striking thing about the opinion is how much the judge's willfully
ignored the undisputed factual record. Plaintiffs submitted voluminous
declarations from programmers, computer science professors and others
confirming that they often communicate using source code. The Declarants
included Professor Abelson of MIT, author of the key introductory textbook
of computer science, as well as Professor Appel from Princeton and several
prominent cryptographers and general computer scientists. All of them
confirmed the need to read, write and share source code as part of their
work, and as part of the development of science. They also testified to the
fact that many, many other people communicate using source code, and that
higher level languages are developed to allow humans to write, read and
develop each others ideas.
The Judge does quote the Supreme Court ruling that speech must be protected
by the First Amendment unless it is "so far removed from any exposition of
ideas, and from truth, *science,* morality, and arts in general . . . "
Yet despite these clear facts and despite the Supreme Court's clear
inclusion of scientific speech as protected expression, Judge Gwin states:
1. "encryption source code may *occasionally* be expressive (p.12)
2. that in the "overwhelming majority of circumstances" encryption source
code is exported to transfer functions, not to communicate ideas." (p.13)
3. "For the broad majority of persons receipting such source code, the
value comes from the function" (p.13-14).
4. "encryption source code is rarely expressive" (p. 15).
5. "source code is conduct that can occasionally have communicative
elements." (p.16)
6. "Source code is a set of instructions to a computer that is *commonly*
distributed for the wholly non-expressive purpose of controlling a
computer's operation." (page 17)
7. "encryption software is not typically expression" (page 18)
There are similar statements of fact throughout the decision, none of which
contain citations to anything in the record to support them.
So where is the evidence to support his conclusions? The government
submitted no empirical studies of source code "exports" from which one
could conclude how often source code is "expressive." Certainly this is not
the kind of thing which can be judicially noticed. At a minimum, the
declarations create a triable issue of material fact as to how often source
code is used to communicate ideas. This alone should preclude summary
judgment.
Also, I know of know authority which holds that the number of people who
communicate in a given language is the basis on which we decide whether that
communication is speech. Judge Gwin certainly cited none, but his opinion
assumes that this is relevant.
He also says that "certain software is inherently expressive" (page 13)
without stating what he thinks that kind of software is and how it differs
from encryption software. The Junger team argued that the "functionality"
of encryption software, allowing privacy of speech, makes the software
subject to the First Amendment on its own, just as the regulations of
printing presses and newspaper racks violate the First Amendment even though
the item itself may not be speech. The Judge ignored this argument
entirely.
Once the judge has decided that source code is not *sufficiently*
expressive, he ignores the settled analysis for prior restraints in order to
avoid applying the tests. The easiest mistake to see is his reliance on the
9th Circuit Roulette decision for his holding that prior restraint review
shouldn't apply. Roulette was *not* a prior restraint case. It considered
an ordinance which allowed the police to arrest citizens for sitting on the
sidewalks. In Roulette, a person didn't have to apply for a license to sit
on the sidewalks, he or she simply did it. The question of whether the act
was expressive or not would always be reviewed by a Judge, as part of the
criminal process. In the case of cryptography,in contrast, one of the key
issues has been the fact that the cryptography regulations do not allow for
a judge to review agency decisions denying or requiring a license. Thus,
applying Roulette as the standard to judge whether prior restraint analysis
applies is just plain wrong.
Having dispensed with prior restraint by relying on a non-prior restraint
case, the Court then considers overbreadth. Again, he ignores the record
entirely. He claims, again without any citation to the record, that Junger
has failed to show that "the resulting injury to other academics is the very
same injury that Junger allegedly suffered."
But Junger included Declarations from people who were *not* academics who
have been injured by the export restrictions. He included declarations from
Mr. Liebman (concerning some O'Reilly software) and Mr. Behlendorf
(concerning the Apache server) demonstrating that even those whose software
contains no encryption capability whatsoever have been injured by the
encryption regulations. The record contains plenty of evidence that people
other than Junger, attempting to do different kinds of things than he does,
have suffered different kinds of injury due to the regulations. Similarly,
Judge Gwin states that the regulations are not vague, ignoring the record
evidence that many, many people do not understand them and have been chilled
as a result.
Next, Judge Gwin finds content neutrality based upon the argument that
government is controlling the "functionality" of the software rather than
its content. Acceptance of this phony distinction requires that a person
have no understanding of computer programming. The content and the
functionality of a computer program are synonymous. They have to be. There
is no way to change or limit the functionality without also changing the
content of the source code. To mandate key recovery is to mandate that
computer programs have different content than they would otherwise; its'
like saying that the government wants to control the "taste" of chocolate
cake rather than the recipe. Change one, you must change the other.
Judge Gwin also relies on the fact that the Government allows "export" of
software on paper, thus defining "functionality" as based upon the fact that
source code can be converted into object code which can be run. But this
analysis also ignores the existence of scanners and typists. Software on
paper isn't any less "functional" than software in electronic form. It
simply requires one more, simple, step to make it functional. In the case
of the single page of source code which is Snuffle, in the Bernstein case,
the difference cannot be more than ten minutes worth of typing or a few
minutes to scan and correct errors prior to compiling. *This* is the
difference our national security rests upon?
Judge Gwin then applies intermediate scrutiny, quickly finding that the test
is met.
In the end, Judge Gwin decided, despite the evidence, that source code isn't
often read by anyone and so shouldn't really deserve First Amendment
protection. The rest of the analysis flows from there, with no regard for
the actual facts in the record. The result is that we have a new category
of lesser protected expression, speech which is also "functional," without
any clear or understandable definition of the term "functional." And all
those computer scientists and their settled methods of communicating with
each other apparently don't count when it comes to the First Amendment.
The larger ramifications of this holding, if it becomes law for the rest of
us, are frightening. Taken to its extreme, this holding could be the
exception that swallows the rule of Reno v. ACLU. If the fact that
something can "function" means it is not speech, every web page written in
HTML could be held not protected, since at some level each page is a
"functioning" computer program. Certainly any web page or other electronic
publication which contains a Java applet is a "functioning" program.
As I noted above, there are other criticisms which can be leveled as well.
These are simply a few that I've found so far.
Cindy
******************************
Cindy A. Cohn, Cindy at McGlashan.com
McGlashan & Sarrail, P.C.
177 Bovet Road, 6th Floor
San Mateo, CA 94402
(650) 341-2585 (tel)
(650) 341-1395 (fax)
From stuffed at stuffed.net Tue Jul 14 18:48:27 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Tue, 14 Jul 1998 18:48:27 -0700 (PDT)
Subject: Can't keep it DOWN/Man gets breasts by mistake
Message-ID: <19980714234348.22245.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 831 bytes
Desc: not available
URL:
From remailer at htp.org Tue Jul 14 18:55:41 1998
From: remailer at htp.org (Anonymous)
Date: Tue, 14 Jul 1998 18:55:41 -0700 (PDT)
Subject: Stan & Tim
Message-ID: <19980715015501.29920.qmail@nsm.htp.org>
Hints that an anonymous poster is Tim may be red herrings. Given Stan's recent "research" into Xian conspiracy,
he may have other enemies than Tim...
[cypherpunk issue: how do you tell that anonymous posts aren't really anonymous?]
That said, I'm surprised at the number of "SPANK" emails directed at Stan. (Especially since they're from
anonymous accounts which he just said he has killfiled. Duh!)
I find some of his posts amusing, some edifying, some boring, but mostly not "clueless", unlike the following
cascade which I've paraphrased slightly:
some nobody said:
> another nobody said:
>> yet another nobody said:
>>> still more nobody said:
>>>> I think Stan is clueless
>>> Me Too.
>> Me Too!
> Me Too!!!
From webmaster at mountainkeep.com Tue Jul 14 20:11:01 1998
From: webmaster at mountainkeep.com (webmaster at mountainkeep.com)
Date: Tue, 14 Jul 1998 20:11:01 -0700 (PDT)
Subject: Herbal Remedies
Message-ID: <199807150310.UAA27242@toad.com>
Dear Internet Friends,
If you want to learn about how to provide your family with herbal remedies from the garden to the medicine
cabinet, please visit our website at www.mountainkeep.com Thank you.
This message complies with the proposed United States Federal requirements for commercial email bill,
Section 301.
For additional info see:
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html
Mountainkeep Publishing
2510 N. 47th St. #204
Boulder, CO 80301
(303)545-5452
Per Section 301, Paragraph (a)(2)(C) of S. 1618,
further transmissions to you by the sender of this
email may be stopped at no cost to you by
sending a reply to this email address with theword "remove" in the subject line.
From remove5050 at usa.net Tue Jul 14 20:19:35 1998
From: remove5050 at usa.net (remove5050 at usa.net)
Date: Tue, 14 Jul 1998 20:19:35 -0700 (PDT)
Subject: Status
Message-ID: <265046_24589591>
reply to
remove5050 at usa.net
Please excuse this intrusion.
Your Name Has ALREADY BEEN DELETED from our database.
I would like to let you in on a good idea...
I NEVER THOUGHT I'D BE THE ONE TELLING YOU THIS....
I ACTUALLY READ & ACTED ON THIS PIECE OF E-MAIL,
AND THEN WENT TO EUROPE FOR THE HOLIDAYS, PAYING
FOR IT IN CASH!
My name is Matthew Forti ; I'm a 42-year-old father, husband, and
full time scientist. As a rule, I delete all unsolicited "junk"
e-mail and use my account primarily for business. I received what
I assumed was this same e-mail countless times and deleted it each time.
About two months ago I received it again and, because of the catchy
subject line, I finally read it. Afterwards, I thought, "OK, I give
in, I'm going to try this. I can certainly afford to invest $20 and,
on the other hand, there is nothing wrong with creating a little
excess cash." I promptly mailed four $5 bills and, after receiving the
reports paid a friend of mine a small fee to send out some e-mail
advertisements for me. After reading the reports, I also learned how
easy it is to bulk e-mail for free!
I was not prepared for the results. Everyday for the last six weeks,
my P.O. box has been overflowing with $5 bills; many days the excess
fills up an extra mail bin and I've had to upgrade to the corporate-size
box! I am stunned by all the cash that keeps rolling in!
I promise you, if you follow the directions in this e-mail and be
prepared to eventually set aside about an hour each day to follow
up (and count your money!), you will make at least as much money
as we did. You don't need to be a whiz at the computer, but I'll
bet you already are. If you can open an envelope, remove the money,
and send an e-mail message, then you're on your way to the bank.
Take the time to read this so you'll understand how easy it is.
Believe me, it works!
GO FOR IT NOW!
Sincerely,
Matthew Forti
* * * * * * * * *
* * *
**************************************************
You are about to make up to $50,000 - In less than 90 days
Read the enclosed program...THEN READ IT AGAIN!
**************************************************
This is the letter that got my attention. Read on and I'm sure
you will agree that this is a great plan!
Dear Friend,
The enclosed information is something I almost let slip through
my Fingers. Fortunately, sometime later I re-read everything and
gave some thought and study to it. Please do the same. It's so
simple to do.
And you won't be left out in the cold to figure it all out yourself.
Look further down in this letter for the information you will
receive from JNC Marketing. They give you the locations of the best
software
(FREE SOFTWARE) to send out large quantities of email.
(normally this kind of software is several hundred dollars)
They even give you easy to understand, proven, step by step
instructions for success with this program. In fact, they helped
me get started and I'm so thankful. It's hard to believe that this
is as simple as it is, but it really is SIMPLE. You will even get
support from them to send out a mailing (if you need it). You won't
get this kind of help from other programs of this nature. It
makes all the difference in the world.
_____________________________________________________________
My name is Anne Bowman. I am 31-year-old graduate student
desperately trying to finish my degree and begin working in
my chosen field--that is, if I am lucky enough to find a job in
the crowded market. Like most people in this day and age, it
is hard to make ends meet, and being a student does not help
the situation at all ( If I ever have to buy one more box of
macaroni and cheese I think I would have to scream). I
returned to school after having worked for several years
with little potential for achieving what I had expected
out of life. I figured if I returned to school and received my
Ph.D. there would be several opportunities for me out there
to achieve my goals. After seeing my fellow graduate students
receive their degrees and, depressingly, not find respectable
positions in their chosen field I began to think, "Oh no not
again!" Four extra years in school and an extra $20,000 in
student loans on top of the first $18,000, what will I do if the
same happens to me?" I began to doubt my patience for the
long term investment in schooling, and decided enough was
enough, "Why can't I make real money now instead of waiting
to graduate with no guarantee of a lucrative return for all of my
efforts!" I am writing to share my experience with other hopeful
students out there, as well as ANYONE looking for an opportunity
to take their financial situation into their own hands. I hope you
will consider this opportunity seriously and that this will change
your life FOREVER!.., FINANCIALLY!!! And once you get
started it takes so little of your time.
In mid October '97, I received this program. I didn't send for
it, or ask for it, they just got my name off a mailing list. I TOOK
THIS AS A SIGN!!! After reading it several times, to make
sure I was reading it correctly, it made perfect sense. Here was
a MONEY-MAKING PHENOMENON. I could invest as much
as I wanted to start (about as much as it costs for a pizza!),
without putting me further in debt. After I got a pencil and paper
and figured it out, I would at least get my money back. After
determining that the program is LEGAL and NOT A CHAIN
LETTER, I decided "I HAVE NOTHING TO LOSE".
Initially I sent 15,000 emails, (without any costs to me) only a
couple of hours of my time on-line. The great thing about email
is that I didn't need any money for printing to send out the
program, only the time to fulfill my orders. There is a vast
on-line market available to everyone who owns a computer.
Following the advice of the person from whom I received this
letter, I am telling you like it is, and I hope it doesn't turn you
off, but I promised myself I would not "rip-off" anyone, no
matter how much money it cost me! After you receive the
reports they explain everything to you.
In one week, I was starting to receive orders for REPORT #1.
By mid November, I had received 40 orders for REPORT #1.
When you read the GUARANTEE in the program you will
see that "YOU MUST RECEIVE 15 TO 20 ORDERS FOR
REPORT #1 WITHIN 2 WEEKS IF YOU DON'T SEND
OUT MORE PROGRAMS UNTIL YOU DO!" My first step
In making $50,000 in 20 to 90 days was done. By the beginning
of December, I had received 174 orders for REPORT #2. If you
go back to the GUARANTEE. "YOU MUST RECEIVE 100 OR
MORE ORDERS FOR REPORT #2 WITHIN TWO WEEKS.
IF NOT SEND OUT MORE PROGRAMS UNTIL YOU DO.
ONCE YOU HAVE 100 ORDERS, THE REST IS EASY, RELAX,
YOU WILL MAKE YOUR $50,000 GOAL". Well, I had 174 orders
for REPORT #2, 74 more than I needed. So I sat back and relaxed.
By January 20th, of my emailing of 15,000, I received $54,000 with
more coming in ever day. The great thing about this program
is you can begin the process over and over again without any limit
on potential income!
I paid off ALL my student loans, and together with everything
I have learned in school, I am now saving in order to open up my
own business related to my field as soon as I graduate. Please take
time to read the attached program. IT WILL CHANGE YOUR LIFE
FOREVER! Remember, it won't work if you don't try it. This program
does work, but you must follow it EXACTLY! Especially the rules
of not trying to place your name in a different place on the list. It
doesn't work, you'll lose out on a lot of money! REPORT #2 explains
this. ALWAYS follow the guarantee, 15 to 20 orders of REPORT #1
and 100 or more orders for REPORT #2 and you will make $50,000
or more in 20 to 90 days. I AM LIVING PROOF THAT IT WORKS!!
If you choose not to participate in this program, I'm sorry, It really
is
a great opportunity with little cost or risk to you. If you choose to
participate, follow the program and you will be on your way to financial
security.
To my fellow graduate students out there, good luck to you and I
sympathize. And to all other persons in financial trouble consider this
letter a sign and please take advantage of this opportunity. YOU WON'T
BE DISAPPOINTED!
Sincerely,
Anne Bowman
The following testimonial was at the bottom of this letter but it was
too good to leave down there so I moved it up here. It is exactly how
I felt at first and feel now.
"The first week after I started this program was torture. I couldn't
wait to see if it was really going to work after I mailed out my first
batch of letters. I chuckle every day now when I walk out of the
post office with my envelopes. This is so easy, I still can't believe
it's happening!"
Don Masterson, Troy, NY
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
>From here down is the instruction portion of this letter...
This is a LEGAL, LOW-COST, MONEYMAKING PHENOMENON.
PRINT this letter, read the directions, THEN GET STARTED TODAY!
You are about to embark on the most profitable and unique program
you may ever see. Many times over, it has demonstrated and proven
its ability to generate large amounts of cash. This program is showing
fantastic appeal with a huge and ever-growing on-line population
desirous of additional income.
This is a legitimate, LEGAL, moneymaking opportunity. It does not
require you to come in contact with people, do any hard work, and
best of all, you never have to leave the house, except to get the mail
and go to the bank!
This truly is that lucky break you've been waiting for! Simply follow
the easy instructions in this letter, and your financial dreams will
come true! When followed correctly, this electronic, multi-level
marketing program works perfectly... 100% OF THE TIME!
Thousands of people have used this program to:
- Raise capital to start their own business
- Pay off debts
- Buy homes, cars, etc.,
- Even retire!
This is your chance, so read on and get started today!
----------------------------------------------------------------------------------
OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC
MULTI-LEVEL MARKETING PROGRAM
----------------------------------------------------------------------------------
Basically, this is what we do:
We send thousands of people a product for $5.00 that costs next to
nothing to produce and e-mail. As with all multi-level businesses, we
build our business by recruiting new partners and selling our products.
Every state in the U.S. allows you to recruit new multi-level business
online (via your computer).
The products in this program are a series of four business and financial
reports costing $5.00 each. Each order you receive via "snail mail"
will
include:
* $5.00 cash
* The name and number of the report they are ordering
* The e-mail address where you will e-mail them the report they
ordered.
To fill each order, you simply e-mail the product to the buyer. The
$5.00 is yours!
This is the EASIEST electronic multi-level marketing business anywhere!
FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!
******* I N S T R U C T I O N S *******
This is what you MUST do:
1. Order all 4 reports shown on the list below (you can't sell them if
you
don't order them).
* For each report, send $5.00 CASH, the NAME & NUMBER OF THE
REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
RETURN POSTAL ADDRESS (in case of a problem) to the person whose
name appears on the list next to the report.
* When you place your order, make sure you order each of the four
reports. You will need all four reports so that you can save
them
on your computer and resell them.
* Within a few days you will receive, via e-mail, each of the four
reports. Save them on your computer so they will be accessible
for you to send to the 1,000's of people who will order them
from you.
2. IMPORTANT-- DO NOT alter the names of the people who are listed
next to each report, or their sequence on the list, in any way
other
than is instructed below in steps "a" through "d" or you will lose
out
on the majority of your profits. ONCE YOU UNDERSTAND THE WAY THIS
WORKS, YOU WILL UNDERSTAND WHY IT DOESN'T WORK IF YOU CHANGE IT.
Remember,
this method has been tested, and if you alter it, it will not work.
a. Look below for the listing of available reports.
b. After you've ordered the four reports, replace the name and
address
under REPORT #1 with your name and address, moving the one that
was there down to REPORT #2.
c. Move the name and address that was under REPORT #2 down to
REPORT #3.
d. Move the name and address that was under REPORT #3 down to
REPORT #4.
e. The name and address that was under REPORT #4 is removed from
the list and has NO DOUBT collected their 50 grand.
Please make sure you copy everyone's name and address ACCURATELY!!!
3. Take this entire letter, including the modified list of names, and
save
it to your computer. Make NO changes to the INSTRUCTION portion of
this letter.
4. Now you're ready to start an advertising campaign on the
Internet! Advertising on the Internet is very, very
inexpensive, and there are HUNDREDS of FREE places to
advertise, but email has, by far, proven itself to be the best
medium for
this program. And the emailers best friend is e-mail lists.
You can buy these lists for under $20/20,000 addresses or you can
pay
someone a minimal charge to take care of the mailing for you. BE
SURE TO START
YOUR AD CAMPAIGN IMMEDIATELY! Each day that passes while you think
about
it is a day without profit.
5. For every $5.00 you receive, all you must do is e-mail them the
report
they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE
ON ALL ORDERS! This will guarantee that the e-mail THEY send out,
with YOUR name and address on it, will be prompt because they can't
advertise until they receive the report!
------------------------------------------
AVAILABLE REPORTS
------------------------------------------
***Order Each REPORT by NUMBER and NAME***
Notes:
- ALWAYS SEND $5 CASH FOR EACH REPORT
- ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL
- Make sure the cash is concealed by wrapping it in at least two sheets
of
paper
- On one of those sheets of paper, include: (a) the number & name of
the
report you are ordering, (b) your e-mail address, and � your postal
address. (using your printer is the best way to do this)
_________________________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES"
ORDER REPORT #1 FROM:
Stat Services, Inc.
PO Box 72
Long Green, MD 21092-9998
_________________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"
ORDER REPORT #2 FROM:
JNC Marketing of Maryland
P.O. Box 25070
Baltimore, MD 21224-5707
*****IMPORTANT NOTE*****
Our success is due to sending out emails to prospective participants, we
are happy to help you get started by giving you the location of several
free programs that will allow you to send out large quantities of e-mail
easily. Also, we can help you email to huge lists. We will email the
information to you the same day we receive your report request. Just
jot down "help please" on the report request that you send with your
$5. You will receive our real email address when we send you this
report and you can contact us for any questions you may have. (program
participants, you may leave this offer with us as we are moved down the
list. We will honor it for the duration of the program. Just move it
down, with the name, to the next position when you send out your first
mailings).
_________________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:
Capital H Ventures
P.O. Box 8029
Jacksonville, FL 32239
_________________________________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 FROM:
Abot Marketing
PO BOX 2523
Chapel Hill, NC 27515-2523
----------------------------------------------------------------------------
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
----------------------------------------------------------------------------
Let's say you decide to start small just to see how well it works.
Assume
your goal is to get 10 people to participate on your first level.
(Placing
a lot of FREE ads on the Internet will EASILY get a larger response.)
Also
assume that everyone else in YOUR ORGANIZATION gets ONLY 10 down line
members. Follow this example to achieve the STAGGERING results below.
1st level--your 10 members with$5...................................$50
2nd level--10 members from those 10 ($5 x 100)..................$500
3rd level--10 members from those 100 ($5 x 1,000)..........$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
THIS TOTALS----------->$55,550
Remember friends, this assumes that the people who participate only
recruit 10 people each. Think for a moment what would happen if they
got 20 people to participate! Most people get 100's of participants!
THINK ABOUT IT!
Your cost to participate in this is practically nothing (surely you can
afford $20 for a chance to make $ 55,000). You obviously already have
an Internet connection and e-mail is FREE!!! REPORT# 3 shows you the
most productive methods for bulk e-mailing and purchasing e-mail lists.
Some list & bulk e-mail vendors even work on trade!
About 50,000 new people get online every month!
*******TIPS FOR SUCCESS*******
* TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow
the directions accurately.
* Send for the four reports IMMEDIATELY so you will have them when
the orders start coming in because:
When you receive a $5 order, you MUST send out the requested
product/report to comply with the U.S. Postal & Lottery Laws, Title
18, Sections 1302 and 1341 or Title 18, Section 3005 in the U.S.
Code,
also Code of Federal Regs. Vol. 16, Sections 255 and 436, which
state that "a product or service must be exchanged for money
received."
* ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
* Be patient and persistent with this program. If you follow the
instructions exactly, the results WILL undoubtedly be SUCCESSFUL!
* ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!
*******YOUR SUCCESS GUIDELINE*******
Follow these guidelines to guarantee your success:
I CAN'T STRESS ENOUGH HOW IMPORTANT THIS NEXT SECTION IS!!!!
If you don't receive 10 to 20 orders for REPORT #1 within two weeks,
continue advertising until you do. Then, a couple of weeks later you
should receive at least 100 orders for REPORT #2. If you don't,
continue
advertising until you do. Once you have received 100 or more orders
for REPORT #2, YOU CAN RELAX, because the system is already working
for you, and the cash will continue to roll in!
THIS IS IMPORTANT TO REMEMBER:
Every time your name is moved down on the list, you are placed in front
of
a DIFFERENT report. You can KEEP TRACK of your PROGRESS by watching
which report people are ordering from you. If you want to generate more
income,
send another batch of e-mails and start the whole process again! There
is
no limit to the income you will generate from this business!
NOTE: If you need help with starting a business, registering a business
name, how income tax is handled, etc., contact your local office of the
Small
Business Administration (a Federal agency) for free help and answers to
questions. Also, the Internal Revenue Service offers free help via
telephone
and free seminars about business taxes.
*******T E S T I M O N I A L S*******
The first week after I started this program was torture. I couldn't
wait
to see if it was really going to work after I mailed out my first batch
of letters. I chuckle every day now when I walk out of the post office
with my envelopes. This is so easy, I still can't believe it's
happening!
Don Masterson, Troy, NY
This program does work, but you must follow it EXACTLY! Especially
the rule of not trying to place your name in a different position, it
won't
work and you'll lose a lot of potential income. I'm living proof that
it works.
It really is a great opportunity to make relatively easy money, with
little
cost to you. If you do choose to participate, follow the program
exactly,
and you'll be on your way to financial security.
Sean McLaughlin, Jackson, MS
My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a
cost accountant with a major U.S. Corporation and I make pretty good
money. When I received the program I grumbled to Doris about receiving
"junk mail." I made fun of the whole thing, spouting my knowledge of the
population and percentages involved. I "knew" it wouldn't work. Doris
totally ignored my supposed intelligence and jumped in with both feet.
I made merciless fun of her, and was ready to lay the old "I told you
so"
on her when the thing didn't work... Well, the laugh was on me! Within
two weeks she had received over 50 responses. Within 45 days she had
received over $147,200 in $5 bills! I was shocked! I was sure that I
had
it all figured and that it wouldn't work. I AM a believer now. I have
joined
Doris in her "hobby." I did have seven more years until retirement,
but I
think of the "rat race" and it's not for me. We owe it all to MLM.
Frank T., Bel-Air, MD
I just want to pass along my best wishes and encouragement to you. Any
doubts you have will vanish when your first orders come in. I even
checked
with the U.S. Post Office to verify that the plan was legal. It
definitely is!
IT WORKS!!!
Paul Johnson, Raleigh, NC
The main reason for this letter is to convince you that this system is
honest, lawful, extremely profitable, and is a way to get a large amount
of
money in a short time. I was approached several times before I checked
this out. I joined just to see what one could expect in return for the
minimal
effort and money required. To my astonishment, I received $36,470.00 in
the first 14 weeks, with money still coming in.
Sincerely yours, Phillip A. Brown, Esq.
Not being the gambling type, it took me several weeks to make up my
mind to participate in this plan. But conservative that I am, I decided
that
the initial investment was so little that there was just no way that I
wouldn't
get enough orders to at least get my money back. Boy, was I surprised
when
I found my medium-size post office box crammed with orders! For awhile,
it
got so overloaded that I had to start picking up my mail at the window.
I'll
make more money this year than any 10 years of my life before. The nice
thing
about this deal is that it doesn't matter where in the U.S. the people
live. There
simply isn't a better investment with a faster return.
Mary Rockland, Lansing, MI
I had received this program before. I deleted it, but later I wondered
if I shouldn't have given it a try. Of course, I had no idea who to
contact
to get another copy, so I had to wait until I was e-mailed another
program.
11 months passed then it came...I didn't delete this one!...I made more
than
$41,000 on the first try!!
Wilburn, Muncie, IN
This is my third time to participate in this plan. We have quit our
jobs,
and will soon buy a home on the beach and live off the interest on our
money. The only way on earth that this plan will work for you is if you
do
it. For your sake, and for your family's sake don't pass up this golden
opportunity. Good luck and happy spending!
Charles Fairchild, Spokane, WA
When you have made your money and want to travel, find great cruises,
tours and airline tickets at our favorite on-line travel site at
http://www.NeTrip.com. This program works. IT WILL CHANGE YOUR LIFE FOR
THE BETTER AND GIVE YOU FINANCIAL FREEDOM. It has given our marriage the
freedom to travel the world.
Steve and Eileen, Chicago, IL
ORDER YOUR REPORTS TODAY AND GET
STARTED ON YOUR ROAD TO
FINANCIAL FREEDOM!!!
From lreed at west.cscwc.pima.edu Tue Jul 14 20:32:47 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Tue, 14 Jul 1998 20:32:47 -0700 (PDT)
Subject: No Subject
Message-ID: <009C92EF.3F4221C0.5@west.cscwc.pima.edu>
~ BUMGIRL ~
Entertainment for NastyGirls July 1998 * $7.09
____________________________
Trojan Horse Sucking
Anniversary Issue
BumGirl Interview:
Wham! Bam! Thank ou Ma'am!
T.C. BUTTSLAM
{AKA-T.C. May, FifteenInchNails, Human Gus-Peter Sr.,
AConsistentNetPersonaToBeNamedLater, CypherPunks
Philosopher King, The Last True CypherPunk,
The Only Real CypherPunk, ad infinitum}
VIAGRA AND SALTPETER
Jim Belushi's Untold Story
Mick
Jagger
GIVES GREAT LIP!
_____________________________________________________________
DEAR BUMGIRL
BUMMED BO
"I was devastated to learn that the June, 1998, issue of
BumBoy Magazine was nothing more than a fraudulent ruse
by the Electronic Forgery Foundation.
"Were the terrible things said about Tim C. May in the
BumBoy Interview with C-J VAN DAMNNED actually true?"
~Eric Cordial, T.O.T.O.
{ou will find out in this month's BumGirl Interview,
as we bend you over and 'give it to you'--straight
from the Horse's Ass. - BG}
THE BUMGIRL ADVISOR
THE DOORS OF DEPTH PERCEPTION
"I gagged Linda Lovelace. What do I do with the body?"
~ William GagHer III,
Dawn Long Juan of the CypherPunks Disturbed Male LISP
{Wake up! (and smell Jennifer Flowers...) - BG}
MOVIES
TERMINATING RESISTOR 3
TR3 completes the Magic Circle of Eunuchs with a bizzare, if
somewhat predictable twist, as ACyborgToBeNamedLater begins
to materialize on the SilverSceenOfVirtualReality in the form
of TheRealGuy...naked, as usual.
It turns out that the Author, sent back in VirtualRealityTime
by John Parker, in order to ensure the safety of Captain John
Parker, thus preserving the course of history taken by the
American Revolution, got drunker than a skunk on cheap Scotch,
and ended up embroiled in the Legendary CypherPunks Moderation
Revolution/Anti-Censorship CounterRevolution of 1997, instead.
The Author, again predictably, spills Scotch on his Digital
Implant during his journey through time, frying the Radio
Shack circuitry that resulted in HimOrHer being dubbed, "The
Six Million Peso ManOrWoman ($42.00/U.S.)" and becomes a
Taoist AuthorBot working for both the Farces of Light and
the Farces of Darkness, thus saving the movie producers the
expense of paying an extra actor in this low-budget, B-grade
Film BlancNoire.
The movie quickly degenerates into a pornographic monstrosity,
with Sarah Parker, unsure as to who the father of John Parker
actually is, since the little glue-sniffing prick was conceived
during an alcoholic binge, fucks everyone in sight, to make
sure the little bastard gets conceived. The Author, obsessive-
compulsive tit-man that he is, invariably throws his hands over
her boobs at the slightest sign of danger, claiming, "John's a
growing boy...he needs his milk."
Investigating the Church of the SubGenius, the AuthorBot soon
discovers that the movie is being produced by a group of non-
union UnderGroundReptilianNazis, as a result of overhearing
several of the producer's phone conversations, which they
always end by saying, "Let's do Earth."
The AuthorBot develops an obsession with Little Timmy Mayonnaise
after becoming sexually excited by the Evil Dr. Vulis's ASCII
Art Spams, begins wearing a CoonSkin hat made from the hide of
Medgar Evans and drunkenly mumbling, "Remember Los Alamos...
Chop, Chop!" at every opportunity.
The saving grace of the movie is the soundtrack, courtesy of
Al Fowl And The Snakes, a Tucson ReptilianChickenBot Band
of ill-repute, featuring their Number 1 With a HollowPoint-
TeflonTipped-CopKillerBullet song, "If ou Can't Kill The
Authority Figure ou Love/Hate, Kill The One In our Cross-
Hairs."
BUMGIRL RATING - One Long, Hard Prick Up our Butt
__________________________________________________________
BumGirl Interview: T.C. BUTTSLAM
A LindaLoveLaceInDepthInterview with one of the original
Flounders ("I may smell like fish, but don't call me
chicken.") of the CypherPunks Disturbed Male LISP, Timothy
C. "No! It doesn't stand for 'cocksucker'!" May.
After checking the Andy WhoreHole Mailing List archives,
and finding that it was who originally
posted the concept that, in the future, every CypherPunk
would have 15" of fame, BumGirl EditWhores decided to change
the cover of the July, 1998, edition to feature a picture
of a variety of current CypherPunks wearing only athletic-
support cups with long, long, long bar-codes on them.
{ANastyBumGirlToBeReamedLater, caught in a cross-fire on
Mayonnaise Mountain between Timothy C. May, the Philosopher
Marksman of the CypherPunks Disturbed Male LISP, and LEA's
who were badly outmanned and outgunned by the Cult Of One
CypherPunk who owns a variety of weaponry registered in
the names of a plethora of CypherPunks Consistent Net
Personas, bent over and stuck her head in the sand, hoping
that if she took one in the butt, it would be a long, hard
one, Teflon-tipped, in order to penetrate her new Kevlar
panties.
The BumGirl interview took place during lulls in the action,
when LEA agents carried off their dead and wounded, while
LittleBigTimmy and Dust'em Hoffman argued over their Pretty
Lousy Privacy CryptoPhones as to how many dead IRS agents
it takes to spell, "I *told* you Jim Bell is a CypherPunk!"}
BumGirl: our Tim C. May CypherPunks Consistent Net Persona
has such long and well-documented history of raising hell with
the sides of the Bleeding Edge of InterNet Freedom and Privacy
Technology (TCM) that it is hard to know where to begin.
TCM: Let's talk about the Author, instead.
BumGirl: Shit! Is this interview just another piece of mindless
trash from the Electronic Forgery Foundation?
TCM: ou don't understand...*I* am the Author!
BumGirl: Well, bend me over and pretend we're married! Are
you serious?
TCM: Nuke DC!
But seriously...Nuke DC!
BumGirl: If you are really the Author, as you claim, then why
aren't you trying to peek up my skirt, to see if I am wearing
panties?
TCM: That's Toto's schtick...pardon the pun...uuhhh...if it
*was* one...
Where was I? Hey! There's my shoes...
Anyway...
That's how the reader can tell which chapters of 'The True
Story of the InterNet' manuscripts are authentic, and which
ones are forgeries...by the perverted diatribes about peeking
up women's skirts that form an integral part of the forgeries
of that fucking asshole interloper on my...I mean...'the'...
CypherPunks list.
Besides, I read the above intro to this BumGirl interview, so
I know you're wearing Kevlar panties. That makes me *hot*...
BumGirl: Don't! Stop! Just because I have my head in the sand,
like your typical AOL'er, doesn't mean I can't tell what you're
trying to do back there...
Why did you stop? I'm Catholic, so I *have* to tell you to stop.
Don't! Stop! Don't stop! Don't stop!
TCM: Hey! That's not a diaphragm...that's a *badge*
Jesus H. 'Fucking' Christ! ou're Janet ReamHole...
DogFacedLyingMurderingNaziCunt!
No wonder you've got your head in the sand...
[There was a loud popping sound on the audio tape that
the BumGirl EditWhores received from some anonymous
coward, via snailmail with no return address on the
envelope.
The freelance BumGirl ReportWhore sent to do the
interview mysteriously failed to return, causing us
to wonder if we'd been duped, when the head of the
DOBJ suddenly became 'unavailable for comment' at
the same time our ReportWhore disappeared. A few days
later, however, the head of the DOBJ was spotted by
the MainDream press as she exited a secret underground
lavoratory suspected to be involved in cloning-related
technology.
Once an anonymous email arrived from Mark Hedges, who
really should learn to use learn remailers properly if
he's going to claim to be a CypherPunk (hint: delete
your digital signature before sending the fucking thing,
dude...), BumGirl EditWhores couldn't help but notice
that, when she removed her glasses, she *did* look a lot
like Buddy...]
BUMGIRL DISCLAIMER:
There is absolutely no truth to the slanderous rumors being
spread by the Church of SubScientology (an affiliate of the
Norman Church--more commonly referred to as 'The Church of
Jesus H. 'Fucking' Christ of Labor Day Chincs'--headquartered
in SaltLick City, China, and long rumored to be the secret
lair of the Cult of One Dead Cow, Army of DogEaters Division),
turned over the violently abused and sexually violated carcass
of our missing BumGirl ReportWhore (dropped off at our offices
by a barefoot, toothless old fart wearing a T-shirt with three
lines of Perl code on the front) to local Ferral Bureau42 of
Instigation foreskinsic axespurts.
The truth is, after our own exspurts performed DNA/RSA tests
on the body, to determine the exact nature of the bizarre
acts of cryptophilia performed upon her after her death, we
simply dumped her body next to several others down an old
mining shaft at a popular shooting range outside of Tucson,
where, unbeknownst to BumGirl, FBI agents were busy going
through the pockets of a witness to the Vincent Price/Phiszt
Foster parking-lot-car-drowning, having inadvertantly disposed
of the body without removing identifying signs such as large
diamond rings, expensive watches, folding money and loose
change.
As the two MotorCycleMommaDykesOnSpikes, hired by BumGirl to
dispose of the body, fled the scene, they overheard one of
the FBI agents, who had been trained by Lieutenant Calley not
to waste perfectly good pussy, exclaim, upon lifting our dead
ReportWhore's skirt, "Jesus H. 'Fucking' Christ, it's Jimmy
FuckingGodamnn Hoffa!" Apparently, another FBI agent, after
performing a street-sniff test on our dead ReportWhore's
dick, contended that it was not Hoffa, but J. Edgar Hoover,
with another agent confirming his suspicions by giving the
dick a long, involved taste-test to preclude any possibility
of the dick being a Cirle Of Eunuchs transplant meant to
disguise the body as that of the recently missing caterer
to the Bay Area CypherPunks physical meetings.
The MotorCycleMommaDykesOnSpikes told BumGirl EditWhores,
as we paid them the agreed-upon fee of 'as many rolls of
quarters as you can carry without using your hands', "We
couldn't pass up the opportunity to commit oral sodomy on
your dead ReportWhore before dumping HimOrHer down the
mind shaft, and, well...she tasted a lot like Buddy..."
Although it *is* true that BumGirl hired the current head
of the DOBJ to finish the BumGirl interview with TCM, (not
to be confused with Turner Classic Movies), we told HimOrHer
that the best approach would be to show up unannounced on
Mayonnaise Mountain, flash HisOrHer badge, and announce
that she was just taking him downtown, 'to answer a few
questions."
BumGirl EditWhores do not expect the T.C. BUTTSLAM interview
to be completed, but we are making plans to include a photo-
special in our next edition, titled, "Beware the Ides of May"
complete with never-before-seen scenes of oft-rumored but
never confirmed Secret CypherPunks Social Activities known
only to 34th Degree Masons and Greek immigrant HodCarriers.
Also In The August, 1998, Edition Of BumGirl:
Army of Bitch Hostage Disposal - "Smoke 'em if you got 'em!"
Cult of One Dead Cow Mission Statement & Barbeque Recipe
CypherPunks Activity Project #327 - "Test (No Reply)"
BumGirl Interview: Buddy
"I should have suspected something when the SexCriminal had
the WhiteHouse VeteranAryan, Attila T. Hun, pull *all* of
my teeth..."
CenterFold: Blanc Weber
"WhiteLipstick Power in MicroSoft Village"
[WAS: MicroHard Victim of Friendly MakeOver--Corporate
Assettes Down 2" As BadBillyG Emerges From Closet Dressed
For SuckSession, With Micro$not DC NaziSpinLobbyists
Standing Firmly Behind Him]
[NEVERWAS: CypherPunks Come Out Of Closet -- EmBareAssed
Gay Activists Force Them Back In...]
From lreed at west.cscwc.pima.edu Tue Jul 14 20:33:39 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Tue, 14 Jul 1998 20:33:39 -0700 (PDT)
Subject: BumGirl - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C92EF.5F68B900.7@west.cscwc.pima.edu>
~ BUMGIRL ~
Entertainment for NastyGirls July 1998 * $7.09
____________________________
Trojan Horse Sucking
Anniversary Issue
BumGirl Interview:
Wham! Bam! Thank ou Ma'am!
T.C. BUTTSLAM
{AKA-T.C. May, FifteenInchNails, Human Gus-Peter Sr.,
AConsistentNetPersonaToBeNamedLater, CypherPunks
Philosopher King, The Last True CypherPunk,
The Only Real CypherPunk, ad infinitum}
VIAGRA AND SALTPETER
Jim Belushi's Untold Story
Mick
Jagger
GIVES GREAT LIP!
_____________________________________________________________
DEAR BUMGIRL
BUMMED BO
"I was devastated to learn that the June, 1998, issue of
BumBoy Magazine was nothing more than a fraudulent ruse
by the Electronic Forgery Foundation.
"Were the terrible things said about Tim C. May in the
BumBoy Interview with C-J VAN DAMNNED actually true?"
~Eric Cordial, T.O.T.O.
{ou will find out in this month's BumGirl Interview,
as we bend you over and 'give it to you'--straight
from the Horse's Ass. - BG}
THE BUMGIRL ADVISOR
THE DOORS OF DEPTH PERCEPTION
"I gagged Linda Lovelace. What do I do with the body?"
~ William GagHer III,
Dawn Long Juan of the CypherPunks Disturbed Male LISP
{Wake up! (and smell Jennifer Flowers...) - BG}
MOVIES
TERMINATING RESISTOR 3
TR3 completes the Magic Circle of Eunuchs with a bizzare, if
somewhat predictable twist, as ACyborgToBeNamedLater begins
to materialize on the SilverSceenOfVirtualReality in the form
of TheRealGuy...naked, as usual.
It turns out that the Author, sent back in VirtualRealityTime
by John Parker, in order to ensure the safety of Captain John
Parker, thus preserving the course of history taken by the
American Revolution, got drunker than a skunk on cheap Scotch,
and ended up embroiled in the Legendary CypherPunks Moderation
Revolution/Anti-Censorship CounterRevolution of 1997, instead.
The Author, again predictably, spills Scotch on his Digital
Implant during his journey through time, frying the Radio
Shack circuitry that resulted in HimOrHer being dubbed, "The
Six Million Peso ManOrWoman ($42.00/U.S.)" and becomes a
Taoist AuthorBot working for both the Farces of Light and
the Farces of Darkness, thus saving the movie producers the
expense of paying an extra actor in this low-budget, B-grade
Film BlancNoire.
The movie quickly degenerates into a pornographic monstrosity,
with Sarah Parker, unsure as to who the father of John Parker
actually is, since the little glue-sniffing prick was conceived
during an alcoholic binge, fucks everyone in sight, to make
sure the little bastard gets conceived. The Author, obsessive-
compulsive tit-man that he is, invariably throws his hands over
her boobs at the slightest sign of danger, claiming, "John's a
growing boy...he needs his milk."
Investigating the Church of the SubGenius, the AuthorBot soon
discovers that the movie is being produced by a group of non-
union UnderGroundReptilianNazis, as a result of overhearing
several of the producer's phone conversations, which they
always end by saying, "Let's do Earth."
The AuthorBot develops an obsession with Little Timmy Mayonnaise
after becoming sexually excited by the Evil Dr. Vulis's ASCII
Art Spams, begins wearing a CoonSkin hat made from the hide of
Medgar Evans and drunkenly mumbling, "Remember Los Alamos...
Chop, Chop!" at every opportunity.
The saving grace of the movie is the soundtrack, courtesy of
Al Fowl And The Snakes, a Tucson ReptilianChickenBot Band
of ill-repute, featuring their Number 1 With a HollowPoint-
TeflonTipped-CopKillerBullet song, "If ou Can't Kill The
Authority Figure ou Love/Hate, Kill The One In our Cross-
Hairs."
BUMGIRL RATING - One Long, Hard Prick Up our Butt
__________________________________________________________
BumGirl Interview: T.C. BUTTSLAM
A LindaLoveLaceInDepthInterview with one of the original
Flounders ("I may smell like fish, but don't call me
chicken.") of the CypherPunks Disturbed Male LISP, Timothy
C. "No! It doesn't stand for 'cocksucker'!" May.
After checking the Andy WhoreHole Mailing List archives,
and finding that it was who originally
posted the concept that, in the future, every CypherPunk
would have 15" of fame, BumGirl EditWhores decided to change
the cover of the July, 1998, edition to feature a picture
of a variety of current CypherPunks wearing only athletic-
support cups with long, long, long bar-codes on them.
{ANastyBumGirlToBeReamedLater, caught in a cross-fire on
Mayonnaise Mountain between Timothy C. May, the Philosopher
Marksman of the CypherPunks Disturbed Male LISP, and LEA's
who were badly outmanned and outgunned by the Cult Of One
CypherPunk who owns a variety of weaponry registered in
the names of a plethora of CypherPunks Consistent Net
Personas, bent over and stuck her head in the sand, hoping
that if she took one in the butt, it would be a long, hard
one, Teflon-tipped, in order to penetrate her new Kevlar
panties.
The BumGirl interview took place during lulls in the action,
when LEA agents carried off their dead and wounded, while
LittleBigTimmy and Dust'em Hoffman argued over their Pretty
Lousy Privacy CryptoPhones as to how many dead IRS agents
it takes to spell, "I *told* you Jim Bell is a CypherPunk!"}
BumGirl: our Tim C. May CypherPunks Consistent Net Persona
has such long and well-documented history of raising hell with
the sides of the Bleeding Edge of InterNet Freedom and Privacy
Technology (TCM) that it is hard to know where to begin.
TCM: Let's talk about the Author, instead.
BumGirl: Shit! Is this interview just another piece of mindless
trash from the Electronic Forgery Foundation?
TCM: ou don't understand...*I* am the Author!
BumGirl: Well, bend me over and pretend we're married! Are
you serious?
TCM: Nuke DC!
But seriously...Nuke DC!
BumGirl: If you are really the Author, as you claim, then why
aren't you trying to peek up my skirt, to see if I am wearing
panties?
TCM: That's Toto's schtick...pardon the pun...uuhhh...if it
*was* one...
Where was I? Hey! There's my shoes...
Anyway...
That's how the reader can tell which chapters of 'The True
Story of the InterNet' manuscripts are authentic, and which
ones are forgeries...by the perverted diatribes about peeking
up women's skirts that form an integral part of the forgeries
of that fucking asshole interloper on my...I mean...'the'...
CypherPunks list.
Besides, I read the above intro to this BumGirl interview, so
I know you're wearing Kevlar panties. That makes me *hot*...
BumGirl: Don't! Stop! Just because I have my head in the sand,
like your typical AOL'er, doesn't mean I can't tell what you're
trying to do back there...
Why did you stop? I'm Catholic, so I *have* to tell you to stop.
Don't! Stop! Don't stop! Don't stop!
TCM: Hey! That's not a diaphragm...that's a *badge*
Jesus H. 'Fucking' Christ! ou're Janet ReamHole...
DogFacedLyingMurderingNaziCunt!
No wonder you've got your head in the sand...
[There was a loud popping sound on the audio tape that
the BumGirl EditWhores received from some anonymous
coward, via snailmail with no return address on the
envelope.
The freelance BumGirl ReportWhore sent to do the
interview mysteriously failed to return, causing us
to wonder if we'd been duped, when the head of the
DOBJ suddenly became 'unavailable for comment' at
the same time our ReportWhore disappeared. A few days
later, however, the head of the DOBJ was spotted by
the MainDream press as she exited a secret underground
lavoratory suspected to be involved in cloning-related
technology.
Once an anonymous email arrived from Mark Hedges, who
really should learn to use learn remailers properly if
he's going to claim to be a CypherPunk (hint: delete
your digital signature before sending the fucking thing,
dude...), BumGirl EditWhores couldn't help but notice
that, when she removed her glasses, she *did* look a lot
like Buddy...]
BUMGIRL DISCLAIMER:
There is absolutely no truth to the slanderous rumors being
spread by the Church of SubScientology (an affiliate of the
Norman Church--more commonly referred to as 'The Church of
Jesus H. 'Fucking' Christ of Labor Day Chincs'--headquartered
in SaltLick City, China, and long rumored to be the secret
lair of the Cult of One Dead Cow, Army of DogEaters Division),
turned over the violently abused and sexually violated carcass
of our missing BumGirl ReportWhore (dropped off at our offices
by a barefoot, toothless old fart wearing a T-shirt with three
lines of Perl code on the front) to local Ferral Bureau42 of
Instigation foreskinsic axespurts.
The truth is, after our own exspurts performed DNA/RSA tests
on the body, to determine the exact nature of the bizarre
acts of cryptophilia performed upon her after her death, we
simply dumped her body next to several others down an old
mining shaft at a popular shooting range outside of Tucson,
where, unbeknownst to BumGirl, FBI agents were busy going
through the pockets of a witness to the Vincent Price/Phiszt
Foster parking-lot-car-drowning, having inadvertantly disposed
of the body without removing identifying signs such as large
diamond rings, expensive watches, folding money and loose
change.
As the two MotorCycleMommaDykesOnSpikes, hired by BumGirl to
dispose of the body, fled the scene, they overheard one of
the FBI agents, who had been trained by Lieutenant Calley not
to waste perfectly good pussy, exclaim, upon lifting our dead
ReportWhore's skirt, "Jesus H. 'Fucking' Christ, it's Jimmy
FuckingGodamnn Hoffa!" Apparently, another FBI agent, after
performing a street-sniff test on our dead ReportWhore's
dick, contended that it was not Hoffa, but J. Edgar Hoover,
with another agent confirming his suspicions by giving the
dick a long, involved taste-test to preclude any possibility
of the dick being a Cirle Of Eunuchs transplant meant to
disguise the body as that of the recently missing caterer
to the Bay Area CypherPunks physical meetings.
The MotorCycleMommaDykesOnSpikes told BumGirl EditWhores,
as we paid them the agreed-upon fee of 'as many rolls of
quarters as you can carry without using your hands', "We
couldn't pass up the opportunity to commit oral sodomy on
your dead ReportWhore before dumping HimOrHer down the
mind shaft, and, well...she tasted a lot like Buddy..."
Although it *is* true that BumGirl hired the current head
of the DOBJ to finish the BumGirl interview with TCM, (not
to be confused with Turner Classic Movies), we told HimOrHer
that the best approach would be to show up unannounced on
Mayonnaise Mountain, flash HisOrHer badge, and announce
that she was just taking him downtown, 'to answer a few
questions."
BumGirl EditWhores do not expect the T.C. BUTTSLAM interview
to be completed, but we are making plans to include a photo-
special in our next edition, titled, "Beware the Ides of May"
complete with never-before-seen scenes of oft-rumored but
never confirmed Secret CypherPunks Social Activities known
only to 34th Degree Masons and Greek immigrant HodCarriers.
Also In The August, 1998, Edition Of BumGirl:
Army of Bitch Hostage Disposal - "Smoke 'em if you got 'em!"
Cult of One Dead Cow Mission Statement & Barbeque Recipe
CypherPunks Activity Project #327 - "Test (No Reply)"
BumGirl Interview: Buddy
"I should have suspected something when the SexCriminal had
the WhiteHouse VeteranAryan, Attila T. Hun, pull *all* of
my teeth..."
CenterFold: Blanc Weber
"WhiteLipstick Power in MicroSoft Village"
[WAS: MicroHard Victim of Friendly MakeOver--Corporate
Assettes Down 2" As BadBillyG Emerges From Closet Dressed
For SuckSession, With Micro$not DC NaziSpinLobbyists
Standing Firmly Behind Him]
[NEVERWAS: CypherPunks Come Out Of Closet -- EmBareAssed
Gay Activists Force Them Back In...]
From nobody at REPLAY.COM Tue Jul 14 21:00:00 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 14 Jul 1998 21:00:00 -0700 (PDT)
Subject: Message From Jim Bell
Message-ID: <199807150400.GAA00984@basement.replay.com>
Jim would like to thank those of you who have sent him
hidden files, as he requested.
However, he would appreciate it if you clueless fucks
would send the hidden files in *cakes*, not in floppy
disks.
[I told him it was a mistake to post to the Cypherpunks
AOL Distributed Node.]
Nobody Juno, eh?
From optinnow at latinmail.com Tue Jul 14 21:39:53 1998
From: optinnow at latinmail.com (optinnow at latinmail.com)
Date: Tue, 14 Jul 1998 21:39:53 -0700 (PDT)
Subject: Fast Growing Home Based Business...
Message-ID: <199807150441.NAA07224@age-ns.agesystem.co.jp>
This message complies with the proposed United States Federal
requirements for commercial e-mail bill, Section 301. For additional
information see:
http://www.senate.gov/~murkowski/commercialemail/EMailAmendText.html
Required Sender Information
Richard Eastburn
8535 Tanglewood Square, Suite 5108
Chagrin Falls, OH 44023-6401
1-440-564-2084
To: Savvy Network Marketer
RE: NEW FAST GROWING HOME BUSINESS
From: Richard Eastburn
This is an advertisement for a Home Business. We hope you will find the
information we provide useful in achieving your financial, personal,
and family goals. If we have mailed this to you in error, please click
remove below. You are on our list because you emailed me or I read a
classified ad of yours. Thank you for your consideration
Unbelievable Growth In This Company Expected: Now. . .Future
Get in on the early stage of a new dynamic business started in April
'98. Since April, people have joined by the thousands!. We expect thousands
more to be coming!�.. Yes, I did say thousands!!
Why is this company attracting so many people?
� Solid leadership to help you learn and gain success.
� Networking leaders bring in their downlines.
� Excellent products of value YOU will use.
� The best of compensation plans.
� Free suite of Internet business and marketing tools.
In the next few months this company has the strong potential to
double--triple--and more. The spillover will be incredible; AND that
benefits you'if you get in now. If you get TWO people into the 2X6
matrix you are qualified. Most people get EXCITED and get new people to join.
Many people are bringing their whole family into this business. When
was the last time you saw a Home Business that you or others wanted lots of
family in the business??
Take a look-.over 65% of all people who look like it and join. This is
your chance for a truly unique business opportunity that can create your
financial independence.
If you are interested in creating your financial independence
CALL: 1-440-564-2084
or
WRITE: Financial Independence, Suite 5108
8535 Tanglewood Square
Chagrin Falls, OH 44023-6401
Thank you. . . . .Richard Eastburn
>>> Per Section 301, Paragraph (a) (2) (C) of S. 1618, <<<
>>> further transmissions to you by the sender of this <<<
>>> email may be stopped at no cost to you by sending a <<<
>>> reply to this email address with the word "Remove" <<<
>>> in the subject line. Thank you for your time <<<
From gwb at gwb.com.au Wed Jul 15 01:45:14 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Wed, 15 Jul 1998 01:45:14 -0700 (PDT)
Subject: Aboriginal voting and the 1967 Referendum
Message-ID: <1.5.4.32.19980715075812.00734c6c@gwb.com.au>
Dear One Nation supporter in NSW
I would draw your attention to the following press release by Pauline Hanson
today:
Aboriginal voting and the 1967 Referendum
It is clear Pauline Hanson is often misrepresented by the press and the
recent headlines headlines that suggest she questioned Aboriginal
Australian's rights to vote is yet another example of selective reporting.
Is this because of the search for what will be the most inflammatory or is
it just that some members of the press pick out of context what they believe
will do the most damage to Pauline Hanson?
"I have not and would not question the right to vote of any Australian
citizen. What I question is whether Australians would have thought twice
about their vote in the 1967 referendum if they had known their attempt to
bring about equality was going to cause the pendulum to go the other way.
"The main point of the 1967 referendum was the change of section 51 of the
constitution that allowed the government to make special laws with respect
to Aborigines. It is from this that successive governments have created race
based policies such as Abstudy and 1.5% loans for Aboriginals starting
businesses.
"Aboriginal Australians like all Australians should and do have the right to
vote but no one should be treated differently on the basis of race - all
Australians should be treated equally and the same. I am quite certain that
if Australians had understood
where the 1967 referendum would lead, many would have voted differently.
"These special laws based on race have led to reverse discrimination and the
rorting of taxpayers money without helping the Aborigines in most need. We
must assist Aborigines, but as Australians in need, not on the basis of
race. We must not make
laws that set Australians apart and are open to abuse by those who pretend
to look after the Aboriginal people.
"It is often reported that I want to take benefits from Aboriginal people,
that is not correct and never was correct. It is true many Aboriginal people
are seriously disadvantaged but they do not have a monopoly on being
disadvantaged and should not
be singled out on the basis of race. Everyone should be assisted on the
basis of need."
Statement issued by Pauline Hanson MP, member for Oxley
-----------
GWB
Scott Balson
From email at helmy.com Wed Jul 15 05:18:21 1998
From: email at helmy.com (HELMY Enterprises, Inc.)
Date: Wed, 15 Jul 1998 05:18:21 -0700 (PDT)
Subject: Hi
Message-ID: <199807150518420530.012FA568@server03.option.net>
>From HELMY Enterprises, Inc.
Dear Webmaster,
Offer daily updated 'Headline News' (and more) and look like one of the big boys!
To learn more please visit us at:
http://www.helmy.com/dc/index.html
From CTIA_Daily_News at um2.unitymail.com Wed Jul 15 09:48:43 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Wed, 15 Jul 1998 09:48:43 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 15, 1998
Message-ID: <199807151630.LAA20849@mailstrom.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.� Please click on the icon /
attachment
for the most important news in wireless
communications today.
WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
=============================================
From Charlie_Kaufman at iris.com Wed Jul 15 11:14:46 1998
From: Charlie_Kaufman at iris.com (Charlie_Kaufman at iris.com)
Date: Wed, 15 Jul 1998 11:14:46 -0700 (PDT)
Subject: GAK 4 -- For whom the Doorbell tolls
Message-ID: <85256642.0064AF8F.00@arista.iris.com>
GAK4 is technically inaccurate but very good metaphor by which to consider
this proposal. I believe this is a minor skirmish in the war between civil
libertarians and Big Brother with industry playing the role of arms
merchant. It is not Government Access to Keys, it is Government Access to
Encrypted Data, which for everyones purposes is the same thing.
In answer to the question: "Should Cisco and friends be allowed to export
this technology?", of course they should. People should be allowed to
export whatever they want. Even if you're Big Brother, this proposal
enables all the same capabilities as GAK, so there is no reason to oppose
it.
In answer to the question: "Is this a 'compromise' that addresses the
issues of civil libertarians?", not a bit. The devil is in the details, of
course, in issues of whether the government can ask the encryption points
for copies of the data in real time, in an unaudited fashion, and/or with
what kind of "trusted third party" intermediaries. But these questions are
exactly akin to the details to be worked out with GAK and self-escrow.
In answer to the question: "Is there anything at all different between this
proposal and GAK?", the answer is some, and the differences might be
relevant to some. This proposal is a little better than GAK for law
enforcement because it would be easier to use and they tend to be
technically unsophisticated. It is a little worse than GAK for the NSA
because the extra data flows mean that it is harder to conduct surveillance
in a totally undetectable way. It favors some vendors over others because
it favors those who want to encrypt at firewalls over those who want to
encrypt end-to-end. It might slow overall progress in network security
because end-to-end encryption is technically superior (though harder to
deploy) and universal firewall to firewall encryption might reduce the
demand for it.
In answer to the question: "Would approval of this proposal be a good or a
bad thing?", the answer is ambiguous for the civil libertarian side. Any
time a new thing is allowed to be exported, it increases the flexibility of
vendors in crafting solutions and is likely to increase overall security.
On the other hand, anything which makes continuation of export controls
less in-your-face-painful will decrease pressure to repeal them and
therefore may in the long run decrease overall security. And anything which
makes it easier to make systems secure against all attackers other than Big
Brother brings closer the disasterous day when non-GAK crypto can be
outlawed.
If you're Big Brother, approval seems to be uniformly a good thing. It
garners political points among the unsophisticated as being willing to make
"technical compromises". It costs nothing in terms of access. And it may
bring closer the glorious day when non-GAK crypto can be outlawed.
--Charlie Kaufman
From stuffed at stuffed.net Wed Jul 15 12:17:18 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Wed, 15 Jul 1998 12:17:18 -0700 (PDT)
Subject: Could the world turn lesbian?/Men's privates enlarging
Message-ID: <19980715161601.28080.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 833 bytes
Desc: not available
URL:
From jya at pipeline.com Wed Jul 15 14:41:58 1998
From: jya at pipeline.com (John Young)
Date: Wed, 15 Jul 1998 14:41:58 -0700 (PDT)
Subject: NYT Crypto OpEd
Message-ID: <199807152141.RAA24473@camel7.mindspring.com>
The NYT has a fairly good OpEd on encryption today,
written by a novelist, who makes a good case for
the citizen's need for the privacy protection, now that
there are a zillion ways computers pry into private
affairs.
http://www.nytimes.com
For those outside the US: NYT today began its free
worldwide online service, so the whole world can log
on to its prying computers. (Non-USes heretofore
had to pay for privacy loss.) It claims to have 4 million
daily online consumers and is happy to run an advertiser
drivern operation to suck in millions more around the
planet.
Take note, Slate.
From eric at clever.net Wed Jul 15 15:17:32 1998
From: eric at clever.net (Cyberdog)
Date: Wed, 15 Jul 1998 15:17:32 -0700 (PDT)
Subject: Whitehouse Bastards want my name named.
Message-ID:
Blumenthal Discovery requests both the Email subscriber list to
Drudge Report AND contributor list to Drudge Legal Defense
Fund...
From howree at cable.navy.mil Wed Jul 15 20:14:47 1998
From: howree at cable.navy.mil (Reeza!)
Date: Wed, 15 Jul 1998 20:14:47 -0700 (PDT)
Subject: BumGirl - SPACE ALIENS HIDE MY DRUGS!!!
In-Reply-To: <009C92EF.5F68B900.7@west.cscwc.pima.edu>
Message-ID: <3.0.5.32.19980716120515.00902370@205.83.192.13>
Didn't this start out as
SPACE ALIENS ATE MY DRUGS!
Reeza!
From jf_avon at citenet.net Wed Jul 15 20:24:46 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Wed, 15 Jul 1998 20:24:46 -0700 (PDT)
Subject: [humor]
Message-ID: <199807160338.XAA02713@cti06.citenet.net>
In Computer Heaven:
The management is from Intel,
The design and construction is done by Apple,
The marketing is done by Microsoft,
IBM provides the support,
Gateway determines the pricing.
In Computer Hell:
The management is from Apple,
Microsoft does design and construction,
IBM handles the marketing,
The support is from Gateway,
Intel sets the price.
Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
DePompadour, Soci�t� d'Importation Lt�e
Limoges fine porcelain and french crystal
JFA Technologies, R&D physicists & engineers
Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From antons at jps.net Wed Jul 15 21:12:04 1998
From: antons at jps.net (Anton Sherwood)
Date: Wed, 15 Jul 1998 21:12:04 -0700 (PDT)
Subject: your papers please
Message-ID: <35AD7D5B.31E5@jps.net>
An embedded message was scrubbed...
From: unknown sender
Subject: no subject
Date: no date
Size: 31089
URL:
From 14633260 at msn.com Wed Jul 15 21:34:32 1998
From: 14633260 at msn.com (14633260 at msn.com)
Date: Wed, 15 Jul 1998 21:34:32 -0700 (PDT)
Subject: Make $1000's Weekly ! --- First Check Next Week !
Message-ID:
***** All You Do Is Advertise OUR phone number !!! *****
**** WE DO THE REST !!! ****
(800) 811-2141 ID# 55916
- GET PAID EVERY FRIDAY !!!
- NO PHONE CONVERSATIONS !!!
- NO SELLING !!!
- NO EXPLANING !!!
- NO CONVINCEING !!!
- NO TALKING TO ANYONE !!!
- NO ONGOING MEMBERSHIP FEES !!!
- NO COMPLICATED BUSINESS TO RUN !!!
- You do nothing but advertise Our Phone Number !!!
- Send Bulk Email, Flyers, Little Classified Ads, Whatever You Like!
- OUR Live Operators handle all your calls professionally & courteously,
then WE Pay You !
A successful, honest, & proven Home Based Business Opportunity !
People are already making in excess of $1000 per week doing
doing nothing more than advertising OUR Toll Free Number and
your personal ID Number !!!!
Need Additional Income? You owe it to yourself to just listen.
Toll Free Testimonials: (888) 703-5389, (888)731-3457, (888)446-6951
For More Information, Call Us Today: (800) 811-2141 ID# 55916
---------
Per Section 301, Paragraph (a)(2)(C) of S. 1618, further transmissions to you
by the sender of this email may be stopped at no cost to you by use of the
following link:
Click here to go to global remove site if you want your address removed from
mailing
From lreed at west.cscwc.pima.edu Wed Jul 15 22:14:24 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Wed, 15 Jul 1998 22:14:24 -0700 (PDT)
Subject: Atilla Remailer Down...
Message-ID: <009C93C6.999133A0.1@west.cscwc.pima.edu>
From: MX%"Postmaster at west.cscwc.pima.edu" "SMTP delivery agent" 15-JUL-1998 22:13:46.82
To: MX%"lreed at west.cscwc.pima.edu"
CC:
Subj: SMTP delivery error
Return-Path: <>
Date: Wed, 15 Jul 1998 22:13:44 MST
From: SMTP delivery agent
To:
Subject: SMTP delivery error
X-Report-Type: Nondelivery; boundary="> Error description:"
Note: this message was generated automatically.
An error was detected while processing the enclosed message. A list of
the affected recipients follows. This list is in a special format that
allows software like LISTSERV to automatically take action on incorrect
addresses; you can safely ignore the numeric codes.
--> Error description:
Error-For: attila at prime.net
Error-Code: 2
Error-Text: %MX_SMTP-F-GENERIC_FAILURE, unknown failure status
-(Via prime.net)
-Transcript:
-Rcvd: 220 webm4.ntx.net ESMTP Sendmail 8.8.5/8.8.5; Wed, 15 Jul 1998 21:58:47 -0700 (PDT)
-Sent: HELO west.cscwc.pima.edu
-Rcvd: 250 webm4.ntx.net Hello west.wc.pima.edu [144.90.64.14], pleased to meet you
-Sent: MAIL FROM:
-Rcvd: 250 ... Sender ok
-Sent: RCPT TO:
-Rcvd: 571 ... [144.90.64.14] not permitted to relay from to
Error-End: 1 error detected
------------------------------ Rejected message ------------------------------
Received: by west.cscwc.pima.edu (MX V4.2 VAX) id 21; Wed, 15 Jul 1998 22:13:22 MST
Date: Wed, 15 Jul 1998 22:13:22 MST
From: Linda Reed--PCC West Campus CSC
To: attila at prime.net
Message-ID: <009C93C6.3E06C0E0.21 at west.cscwc.pima.edu>
Subject: Sure, you *claim* you're a Deacon...
"Evangelists do more than lay people."
From katt at nbn.net Thu Jul 16 00:10:58 1998
From: katt at nbn.net (dennis e strausser jr)
Date: Thu, 16 Jul 1998 00:10:58 -0700 (PDT)
Subject: show me
Message-ID: <35ADD147.713B@nbn.net>
I will not say much
give me what you have
From N.Robidoux at massey.ac.nz Thu Jul 16 00:50:02 1998
From: N.Robidoux at massey.ac.nz (Nicolas Robidoux)
Date: Thu, 16 Jul 1998 00:50:02 -0700 (PDT)
Subject: [humor]
In-Reply-To: <199807160338.XAA02713@cti06.citenet.net>
Message-ID: <9807160740.AA28593@ma-kaka.massey.ac.nz>
Nicolas' homebrewed quip (vive Linux!):
I really like the Natural Keyboard, but I would never trust a keyboard
manufacturer to put together an operating system.
nicolas
From stuffed at stuffed.net Thu Jul 16 05:03:17 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Thu, 16 Jul 1998 05:03:17 -0700 (PDT)
Subject: My wife shagged the pool team/Swedish hooker sues clients
Message-ID: <19980716110827.14015.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 832 bytes
Desc: not available
URL:
From nobody at samson.ml.org Thu Jul 16 08:07:12 1998
From: nobody at samson.ml.org (Samson)
Date: Thu, 16 Jul 1998 08:07:12 -0700 (PDT)
Subject: Whitehouse Bastards want my name named.
Message-ID:
Cyberdog wrote:
>
> Blumenthal Discovery requests both the Email subscriber list to
> Drudge Report AND contributor list to Drudge Legal Defense
> Fund...
mailto:help at nym.alias.net - don't subscribe without it.
From announce at dmail1.real-net.net Thu Jul 16 08:44:53 1998
From: announce at dmail1.real-net.net (RealNetworks News)
Date: Thu, 16 Jul 1998 08:44:53 -0700 (PDT)
Subject: FREE! Brilliant Audio With New RealPlayer G2
Message-ID: <199807161544.IAA27433@dmail3.real-net.net>
Dear RealPlayer User,
I'm very excited to announce the beta release of
RealPlayer G2 and RealPlayer Plus G2, available
for download now.
With RealPlayer G2 you'll get a quantum leap in
RealAudio and RealVideo quality, including an 80%
improvement in RealAudio's frequency response and
smoother, sharper RealVideo.
RealPlayer G2 technology dramatically reduces
rebuffering, which means less break-up in RealAudio
and RealVideo streams. With this new feature you'll
notice increased performance over your modem -- even
under poor network conditions.
RealPlayer G2 allows you to reach a universe of
programming directly through your player. With the
touch of a button through RealChannels you can access
great channels like CNN, Screening Room (movie
previews), ABC, NPR, Comedy Central, and more.
To download now, visit:
--> http://www.real.com/50/rg26a.html
We are also releasing a new version of the premium
RealPlayer, RealPlayer Plus G2. With RealPlayer Plus
G2 you'll receive:
* Even better RealAudio and RealVideo quality
* Hi-fi audio display with spectrum analyzer
* 10 channel graphic equalizer for tuning treble, bass,
and mid-range
* Video controls which work just like your TV set --
you control brightness, contrast, and saturation
All of this with a 30-day money back guarantee -- just
$29.99. To download now, visit:
--> http://www.real.com/50/plusg26a.html
+===+===+===+===+===+===+===+===+===+===+===+===+===+
"RealPlayer G2 from RealNetworks is the next generation
of streaming media players. End users can now experience
high quality audio and video..." - ZDNet, 5/1998
"Overall, RealPlayer is a class-act, this is one
application you'll definitely want to have for your online
daily web surfing..." - Strouds Review, 5/1998
84% of our users say RealPlayer G2 sounds better. 86%
say the new RealPlayer G2 interface is better. They also
use RealPlayer G2 to stay informed everyday! We hope
you'll try for yourself -- and ENJOY!
+===+===+===+===+===+===+===+===+===+===+===+===+===+
Thank you for continuing to use RealNetworks products,
Maria Cantwell
Senior Vice President
RealNetworks, Inc.
Seattle, WA USA
---------------------------------------------
ABOUT THIS E-MAIL
This e-mail was sent to users of RealPlayer
software who indicated a preference during
the download or installation process to receive
notification of new RealNetworks products or
services via e-mail.
For information about subscribing to or
unsubscribing from future announcements, visit
http://www.real.com/mailinglist/index.html
From real at freenet.edmonton.ab.ca Thu Jul 16 10:16:27 1998
From: real at freenet.edmonton.ab.ca (Graham-John Bullers)
Date: Thu, 16 Jul 1998 10:16:27 -0700 (PDT)
Subject: FREE! Brilliant Audio With New RealPlayer G2
In-Reply-To: <199807161544.IAA27433@dmail3.real-net.net>
Message-ID: <199807161715.LAA14028@freenet.edmonton.ab.ca>
Date sent: Thu, 16 Jul 1998 08:44:35 -0700
To: cypherpunks at toad.com
Subject: FREE! Brilliant Audio With New RealPlayer G2
From: RealNetworks News
Send reply to: RealNetworks News
> Dear RealPlayer User,
>
> I'm very excited to announce the beta release of
> RealPlayer G2 and RealPlayer Plus G2, available
> for download now.
>
> With RealPlayer G2 you'll get a quantum leap in
> RealAudio and RealVideo quality, including an 80%
> improvement in RealAudio's frequency response and
> smoother, sharper RealVideo.
>
> RealPlayer G2 technology dramatically reduces
> rebuffering, which means less break-up in RealAudio
> and RealVideo streams. With this new feature you'll
> notice increased performance over your modem -- even
> under poor network conditions.
>
> RealPlayer G2 allows you to reach a universe of
> programming directly through your player. With the
> touch of a button through RealChannels you can access
> great channels like CNN, Screening Room (movie
> previews), ABC, NPR, Comedy Central, and more.
>
> To download now, visit:
>
> --> http://www.real.com/50/rg26a.html
>
> We are also releasing a new version of the premium
> RealPlayer, RealPlayer Plus G2. With RealPlayer Plus
> G2 you'll receive:
>
> * Even better RealAudio and RealVideo quality
> * Hi-fi audio display with spectrum analyzer
> * 10 channel graphic equalizer for tuning treble, bass,
> and mid-range
> * Video controls which work just like your TV set --
> you control brightness, contrast, and saturation
>
> All of this with a 30-day money back guarantee -- just
> $29.99. To download now, visit:
>
> --> http://www.real.com/50/plusg26a.html
>
> +===+===+===+===+===+===+===+===+===+===+===+===+===+
> "RealPlayer G2 from RealNetworks is the next generation
> of streaming media players. End users can now experience
> high quality audio and video..." - ZDNet, 5/1998
>
> "Overall, RealPlayer is a class-act, this is one
> application you'll definitely want to have for your online
> daily web surfing..." - Strouds Review, 5/1998
>
> 84% of our users say RealPlayer G2 sounds better. 86%
> say the new RealPlayer G2 interface is better. They also
> use RealPlayer G2 to stay informed everyday! We hope
> you'll try for yourself -- and ENJOY!
> +===+===+===+===+===+===+===+===+===+===+===+===+===+
> Thank you for continuing to use RealNetworks products,
>
> Maria Cantwell
> Senior Vice President
> RealNetworks, Inc.
> Seattle, WA USA
>
> ---------------------------------------------
> ABOUT THIS E-MAIL
>
> This e-mail was sent to users of RealPlayer
> software who indicated a preference during
> the download or installation process to receive
> notification of new RealNetworks products or
> services via e-mail.
>
> For information about subscribing to or
> unsubscribing from future announcements, visit
> http://www.real.com/mailinglist/index.html
From CTIA_Daily_News at um2.unitymail.com Thu Jul 16 10:38:56 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Thu, 16 Jul 1998 10:38:56 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 16, 1998
Message-ID: <199807161726.MAA04271@mailstrom.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.� Please click on the icon /
attachment
for the most important news in wireless
communications today.
WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
=============================================
From SupportOnlineStaff_000988 at news.newswire.microsoft.com Thu Jul 16 13:21:25 1998
From: SupportOnlineStaff_000988 at news.newswire.microsoft.com (Support Online Staff)
Date: Thu, 16 Jul 1998 13:21:25 -0700 (PDT)
Subject: Windows and Internet Explorer Support News Watch - July 13, 1998
Message-ID: <199807162021.NAA27346@toad.com>
Windows and Internet Explorer Support News Watch
================================================
As a subscriber to the Windows and Internet Explorer Support News Watch, you receive e-mail twice each month that highlights some of the new articles recently published on Support Online, Microsoft's award-winning technical support web site. The following are new Support Online articles that answer frequently asked questions about using Windows and Internet Explorer:
Contents
--------
- Microsoft Windows 98
- Microsoft Internet Explorer 4.0 for Windows 95 and Windows NT 4.0
- Microsoft Windows CE
Microsoft Windows 98
--------------------
Troubleshooting Windows 98 Startup Problems and Error Messages (Q188867)
http://support.microsoft.com/support/kb/articles/q188/8/67.asp
Cannot Connect to America Online or Install America Online 4.0 (Q188654)
http://support.microsoft.com/support/kb/articles/q188/6/54.asp
Err Msg: There Is No WinModem Found in Your Computer, But... (Q188601)
http://support.microsoft.com/support/kb/articles/q188/6/01.asp
Err Msg: Not Enough Memory to Convert to FAT32. To Free Up... (Q188561)
http://support.microsoft.com/support/kb/articles/q188/5/61.asp
DVD Support in Windows 98 (Q188513)
http://support.microsoft.com/support/kb/articles/q188/5/13.asp
Error Message: Error 745: An Essential File Is Missing (Q174579)
http://support.microsoft.com/support/kb/articles/q174/5/79.asp
Error Message "Invalid System Disk" After Setup Reboots (Q128730)
http://support.microsoft.com/support/kb/articles/q128/7/30.asp
"Earlier Version of MSN Detected" Using Inbox Icon (Q189077)
http://support.microsoft.com/support/kb/articles/q189/0/77.asp
"Call to Undefined Dynalink" Message During Windows 98 Setup (Q188970)
http://support.microsoft.com/support/kb/articles/q188/9/70.asp
"Internal Error Occurred" Error Message Using Internet Explorer (Q188952)
http://support.microsoft.com/support/kb/articles/q188/9/52.asp
Error Message: Not Enough Memory to Load RamDrive (Q188886)
http://support.microsoft.com/support/kb/articles/q188/8/86.asp
Err Msg: This Software Does Not Support Windows 98 and... (Q188865)
http://support.microsoft.com/support/kb/articles/q188/8/65.asp
Err Msg: This Version of Windows Does Not Run on MS-DOS 7.0... (Q188795)
http://support.microsoft.com/support/kb/articles/q188/7/95.asp
Err Msg: There Is No WinModem Found in Your Computer, But... (Q188601)
http://support.microsoft.com/support/kb/articles/q188/6/01.asp
Err Msg: Windows Cannot Find Program.exe, Which Is Needed... (Q188592)
http://support.microsoft.com/support/kb/articles/q188/5/92.asp
Cannot Gain Access to Multiple CD-ROM Drives Using Startup Disk (Q188391)
http://support.microsoft.com/support/kb/articles/q188/3/91.asp
Err Msg: The Microsoft Dial-Up Adapter Is in Use or Not... (Q188141)
http://support.microsoft.com/support/kb/articles/q188/1/41.asp
Minimum Hardware Requirements for Windows 98 Installation (Q182751)
http://support.microsoft.com/support/kb/articles/q182/7/51.asp
Microsoft Internet Explorer 4.0 for Windows 95 and Windows NT 4.0
-----------------------------------------------------------------
Err Msg: Internet Explorer Cannot Open the Site ... (Q189057)
http://support.microsoft.com/support/kb/articles/q189/0/57.asp
Internet Explorer Issues Extra Challenge with NTLM (Q189033)
http://support.microsoft.com/support/kb/articles/q189/0/33.asp
Check Boxes and Option Buttons on Web Page Are Not Printed (Q188988)
http://support.microsoft.com/support/kb/articles/q188/9/88.asp
Err Msg: Internet Explorer Cannot Open the Internet Site... (Q188839)
http://support.microsoft.com/support/kb/articles/q188/8/39.asp
Problems with Internet Explorer and the Safe Passage Program (Q188706)
http://support.microsoft.com/support/kb/articles/q188/7/06.asp
Microsoft Windows CE
--------------------
WinCE: Cannot Connect Handheld PC Using Dial-Up Networking (Q189122)
http://support.microsoft.com/support/kb/articles/q189/1/22.asp
WinCE 2.0: Terminal Connection Settings Spontaneously Change (Q189097)
http://support.microsoft.com/support/kb/articles/q189/0/97.asp
WinCE: Infrared Connection Disconnects During Synchronization (Q189058)
http://support.microsoft.com/support/kb/articles/q189/0/58.asp
WinCE: System Tool in Control Panel Lists Only One PC Card (Q188980)
http://support.microsoft.com/support/kb/articles/q188/9/80.asp
WinCE: Remote Networking Connection Preferences Are Not Saved (Q188894)
http://support.microsoft.com/support/kb/articles/q188/8/94.asp
Summary of Known Issues in Pocket Word on a Handheld PC (Q188782)
http://support.microsoft.com/support/kb/articles/q188/7/82.asp
Summary of Issues in Note Taker on a Palm-Size PC (Q188505)
http://support.microsoft.com/support/kb/articles/q188/5/05.asp
InstallShield Hangs When You Install Windows CE Services (Q188485)
http://support.microsoft.com/support/kb/articles/q188/4/85.asp
Get Support Online Articles by E-mail
-------------------------------------
You can also receive these articles (and others) in e-mail by sending a message to mshelp at microsoft.com. In the Subject line of your message, enter the Article-ID number (Qnnnnnn). For example to receive Q162721, your Subject line should resemble the following example:
Subject: Q162721
You can have multiple articles sent to you in e-mail by typing multiple Article-ID numbers separated by a comma. For example:
Subject: Q178049, Q174914, Q174062
To receive an index of articles, enter "Index" (without quotation marks) in the Subject line. For example:
Subject: Index
The MSHelp Index is updated monthly. For more information about MSHelp, see http://support.microsoft.com/support/kb/articles/q183/1/21.asp.
Visit Support Online
--------------------
We also encourage you to visit Support Online at http://support.microsoft.com/support/ to see our complete selection of helpful articles designed to answer questions about using Microsoft products.
New Features Make Finding Your Answers on Support Online Even Easier
====================================================================
Support Online recently released a number of new features to make it even easier to find the answers you need. The following highlights some of the enhancements you'll see on Support Online at http://support.microsoft.com/. For information about how to use these new Support Online features, see http://support.microsoft.com/support/howto/.
- Specify an article ID number. If you know the ID number of the
Knowledge Base article you want, you can enter the ID number
to find that specific article.
- Search for troubleshooting tools. Now you can customize your
search to include troubleshooting tools only.
- Search for specific drivers and other downloadable files. If you
know the name of the driver or download file you want, enter the
full file name to find the file on Support Online.
- See what's new. If you want to see the latest information about
a product and/or a topic, use the What's New option and select
the number of days you want to review. You can select 1, 3, 7,
14, or 30 days.
- Toggle between Advanced View and Basic View. Advanced View
offers additional search options and other features. Now you
can easily toggle between Advanced View and Basic View.
Need help using these features? See http://support.microsoft.com/support/howto/.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Microsoft-sponsored events:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For information on all Microsoft-sponsored events, please visit:
http://www.microsoft.com/events/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to use this mailing list:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You received this e-mail newsletter as a result of your registration on the Microsoft.com Personal Information Center. You may unsubscribe from this e-mail newsletter, or subscribe to a variety of other informative e-mail newsletters, by returning to the Personal Information Center at
http://register.microsoft.com/regwiz/personalinfo.asp
and changing your subscription preferences.
Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THIS DOCUMENT IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to change in market conditions, it should not be interpreted to be a commitment on the part of Microsoft and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED 'AS IS' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND FREEDOM FROM INFRINGEMENT.
The user assumes the entire risk as to the accuracy and the use of this document. This document may be copied and distributed subject to the following conditions:
1. All text must be copied without modification and all pages must be included
2. All copies must contain Microsoft's copyright notice and any other notices provided therein
3. This document may not be distributed for profit
From jya at pipeline.com Thu Jul 16 13:47:28 1998
From: jya at pipeline.com (John Young)
Date: Thu, 16 Jul 1998 13:47:28 -0700 (PDT)
Subject: Senate Talks Crypto Law
Message-ID: <199807162047.QAA20692@dewdrop2.mindspring.com>
Thanks to Greg Garcia, ACP:
"Congress Needs to Act on Encryption Legislation,"
In July 15 Congressional Record.
An encryption colloquy among Senators Lott, Leahy, Craig,
Burns, Ashcroft, Abraham, and Shelby:
http://jya.com/cr071598.htm
Private doorbell is gummed.
From abcdefg at mindspring.com Thu Jul 16 14:01:37 1998
From: abcdefg at mindspring.com (abcdefg at mindspring.com)
Date: Thu, 16 Jul 1998 14:01:37 -0700 (PDT)
Subject: Steve Langford for Governor
Message-ID:
FOUR REASONS TO VOTE FOR STEVE LANGFORD
HE IS PRO-BUSINESS
Steve Langford is the only candidate for Governor who has paid the bills of a business and passed
bills in the General Assembly. Langford Construction, his family business, was awarded the Family
Business of the Year Award for 1995 by the Michael J. Coles School of Business at Kennesaw State
University. Steve Langford was given a score of 92% by the National Federation of Independent
Business (the only other Democratic candidate for Governor in the General Assembly got 67%).
HE IS PRO-CHOICE
Steve Langford opposes any government interference in your right to make decisions about
reproductive health--and he has the voting record to prove it:
- Voted against state-mandated lectures and forced waiting periods.
- Voted against--and took the Senate well to speak against--Senate Bill 357, which would have
banned certain abortion procedures. The Ohio version of this bill was recently ruled unconstitutional
by the U.S. Supreme Court.
HE IS PRO-ENVIRONMENT
Steve Langford's Senate Bill 500 is the bill that made the City of Atlanta pay fines for polluting the
Chattahoochee--and finally got the city moving toward a solution to the persistent problems of
Atlanta's water and sewer systems. Why does it matter? Each time it rains more than 1/10 inch,
Atlanta sewers overflow into the Chattahoochee. Of course, if you live downstream of Atlanta, you
already knew that.
HE IS PRO-TAXPAYER
Steve Langford introduced a bill in the 1998 General Assembly that would give you a rebate when
the state has a surplus (if you owed $1,000 in Georgia income taxes last year, you would have
gotten a $100 rebate on your taxes). No surplus? No rebate. Makes sense, doesn't it?
LIKE WHAT YOU SEE? INTERESTED IN LEARNING MORE?
VISIT STEVE LANGFORD'S WEBSITE AT www.steve-langford.org
GOT SOMETHING TO SAY? E-MAIL STEVE LANGFORD AT stevelangford at mindspring.com
THOSE YET TO ENTER THE COMPUTER AGE CAN CALL STEVE LANGFORD AT (770)984-
1998, OR WRITE HIM AT:
FRIENDS OF STEVE LANGFORD
1955 LOWER ROSWELL ROAD, SUITE A
MARIETTA, GA 30068
From abcdefg at mindspring.com Thu Jul 16 14:22:14 1998
From: abcdefg at mindspring.com (abcdefg at mindspring.com)
Date: Thu, 16 Jul 1998 14:22:14 -0700 (PDT)
Subject: Steve Langford for Governor
Message-ID:
FOUR REASONS TO VOTE FOR STEVE LANGFORD
HE IS PRO-BUSINESS
Steve Langford is the only candidate for Governor who has paid the bills of a business and passed
bills in the General Assembly. Langford Construction, his family business, was awarded the Family
Business of the Year Award for 1995 by the Michael J. Coles School of Business at Kennesaw State
University. Steve Langford was given a score of 92% by the National Federation of Independent
Business (the only other Democratic candidate for Governor in the General Assembly got 67%).
HE IS PRO-CHOICE
Steve Langford opposes any government interference in your right to make decisions about
reproductive health--and he has the voting record to prove it:
- Voted against state-mandated lectures and forced waiting periods.
- Voted against--and took the Senate well to speak against--Senate Bill 357, which would have
banned certain abortion procedures. The Ohio version of this bill was recently ruled unconstitutional
by the U.S. Supreme Court.
HE IS PRO-ENVIRONMENT
Steve Langford's Senate Bill 500 is the bill that made the City of Atlanta pay fines for polluting the
Chattahoochee--and finally got the city moving toward a solution to the persistent problems of
Atlanta's water and sewer systems. Why does it matter? Each time it rains more than 1/10 inch,
Atlanta sewers overflow into the Chattahoochee. Of course, if you live downstream of Atlanta, you
already knew that.
HE IS PRO-TAXPAYER
Steve Langford introduced a bill in the 1998 General Assembly that would give you a rebate when
the state has a surplus (if you owed $1,000 in Georgia income taxes last year, you would have
gotten a $100 rebate on your taxes). No surplus? No rebate. Makes sense, doesn't it?
LIKE WHAT YOU SEE? INTERESTED IN LEARNING MORE?
VISIT STEVE LANGFORD'S WEBSITE AT www.steve-langford.org
GOT SOMETHING TO SAY? E-MAIL STEVE LANGFORD AT stevelangford at mindspring.com
THOSE YET TO ENTER THE COMPUTER AGE CAN CALL STEVE LANGFORD AT (770)984-
1998, OR WRITE HIM AT:
FRIENDS OF STEVE LANGFORD
1955 LOWER ROSWELL ROAD, SUITE A
MARIETTA, GA 30068
From nobody at REPLAY.COM Thu Jul 16 14:48:47 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 16 Jul 1998 14:48:47 -0700 (PDT)
Subject: DES-II-2 contest finished already!
In-Reply-To: <199807161906.VAA05449@basement.replay.com>
Message-ID: <199807162149.XAA27444@basement.replay.com>
Will RSA pay if the DES-gilmo was used? Or was
RSA playacting john?
From kevin.stephenson at pobox.com Thu Jul 16 23:30:37 1998
From: kevin.stephenson at pobox.com (Kevin Stephenson)
Date: Thu, 16 Jul 1998 23:30:37 -0700 (PDT)
Subject: NYT Crypto OpEd
In-Reply-To: <199807152141.RAA24473@camel7.mindspring.com>
Message-ID: <199807170630.XAA13442@mail2.deltanet.com>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
At 05:36 PM 7/15/98 -0400, you wrote: >The NYT has a fairly good OpEd
on encryption today, >written by a novelist, who makes a good case for
>the citizen's need for the privacy protection, now that >there are a
zillion ways computers pry into private >affairs. > >=A0=A0
http://www.nytimes.com > >For those outside the US: NYT today began
its free >worldwide online service, so the whole world can log >on
to its prying computers. (Non-USes heretofore >had to pay for privacy
loss.) It claims to have 4 million >daily online consumers and is happy
to run an advertiser >drivern operation to suck in millions more around
the >planet. > >Take note, Slate. > How many smaller sites
will be able to break even with advertising subsidies, let alone make a
profit? Advertisers are going to head to the big sites and you'll see a
media concentration on the Internet just like TV and print, unless small
sites can find a creative way to charge for content. If people aren't
willing to pay for on-line New York Times, they sure as hell aren't going
to pay much if anything for Mom and Pop's Independent Media/Content. If
they were willing to pay, they probably wouldn't want to use an unfamiliar
and exotic technology like digital cash and they don't want to ring up
$1.00 charges on their Visa for the smaller bits of content wanted from
these other providers. How about consolidated third-party content billing,
with monthly payment to the billing company by any form (check, cash,
digital cash, credit card, gold coins)? Full anonimity available when
paying with cash or the like. Give the consumer easy credit and they will
come.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.2
iQA/AwUBNa7vh3boo5vy7gslEQIdrgCgt4pceZMvqLApbKHt/y/yhDZeTY4AoMQe
+6rV1sFP4mGmJXNd/lNa3WTR
=fc8V
-----END PGP SIGNATURE-----
From gnu at toad.com Fri Jul 17 00:16:30 1998
From: gnu at toad.com (John Gilmore)
Date: Fri, 17 Jul 1998 00:16:30 -0700 (PDT)
Subject: "EFF DES Cracker" machine brings honesty to crypto debate
Message-ID: <199807170716.AAA04031@toad.com>
FOR IMMEDIATE RELEASE
July 17, 1998
CONTACTS:
Alexander Fowler, +1 202 462 5826, afowler at eff.org
Barry Steinhardt, +1 415 436 9333 ext. 102, barrys at eff.org
John Gilmore, +1 415 221 6524, gnu at toad.com
"EFF DES CRACKER" MACHINE BRINGS HONESTY TO CRYPTO DEBATE
ELECTRONIC FRONTIER FOUNDATION PROVES THAT DES IS NOT SECURE
SAN FRANCISCO, CA -- The Electronic Frontier Foundation (EFF) today
raised the level of honesty in crypto politics by revealing that the
Data Encryption Standard (DES) is insecure. The U.S. government has
long pressed industry to limit encryption to DES (and even weaker
forms), without revealing how easy it is to crack. Continued adherence
to this policy would put critical infrastructures at risk; society
should choose a different course.
To prove the insecurity of DES, EFF built the first unclassified
hardware for cracking messages encoded with it. On Wednesday of this
week the EFF DES Cracker, which was built for less than $250,000,
easily won RSA Laboratory's "DES Challenge II" contest and a $10,000
cash prize. It took the machine less than 3 days to complete the
challenge, shattering the previous record of 39 days set by a massive
network of tens of thousands of computers. The research results are
fully documented in a book published this week by EFF and O'Reilly and
Associates, entitled "Cracking DES: Secrets of Encryption Research,
Wiretap Politics, and Chip Design."
"Producing a workable policy for encryption has proven a very hard
political challenge. We believe that it will only be possible to
craft good policies if all the players are honest with one another and
the public," said John Gilmore, EFF co-founder and project leader. "When
the government won't reveal relevant facts, the private sector must
independently conduct the research and publish the results so that we
can all see the social trade-offs involved in policy choices."
The nonprofit foundation designed and built the EFF DES Cracker to
counter the claim made by U.S. government officials that governments
cannot decrypt information when protected by DES, or that it would
take multimillion-dollar networks of computers months to decrypt one
message. "The government has used that claim to justify policies of
weak encryption and 'key recovery,' which erode privacy and security
in the digital age," said EFF Executive Director Barry Steinhardt. It
is now time for an honest and fully informed debate, which we believe
will lead to a reversal of these policies."
"EFF has proved what has been argued by scientists for twenty years,
that DES can be cracked quickly and inexpensively," said Gilmore.
"Now that the public knows, it will not be fooled into buying products
that promise real privacy but only deliver DES. This will prevent
manufacturers from buckling under government pressure to 'dumb down'
their products, since such products will no longer sell." Steinhardt
added, "If a small nonprofit can crack DES, your competitors can too.
Five years from now some teenager may well build a DES Cracker as her
high school science fair project."
The Data Encryption Standard, adopted as a federal standard in 1977 to
protect unclassified communications and data, was designed by IBM and
modified by the National Security Agency. It uses 56-bit keys,
meaning a user must employ precisely the right combination of 56 1s
and 0s to decode information correctly. DES accounted for more than
$125 million annually in software and hardware sales, according to a
1993 article in "Federal Computer Week." Trusted Information Systems
reported last December that DES can be found in 281 foreign and 466
domestic encryption products, which accounts for between a third and
half of the market.
A DES cracker is a machine that can read information encrypted with
DES by finding the key that was used to encrypt that data. DES
crackers have been researched by scientists and speculated about in
the popular literature on cryptography since the 1970s. The design
of the EFF DES Cracker consists of an ordinary personal computer
connected to a large array of custom chips. It took EFF less than
one year to build and cost less than $250,000.
This week marks the first public test of the EFF DES Cracker, which
won the latest DES-cracking speed competition sponsored by RSA
Laboratories (http://www.rsa.com/rsalabs/). Two previous RSA
challenges proved that massive collections of computers coordinated
over the Internet could successfully crack DES. Beginning Monday
morning, the EFF DES Cracker began searching for the correct answer to
this latest challenge, the RSA DES Challenge II-2. In less than 3
days of searching, the EFF DES Cracker found the correct key. "We
searched more than 88 billion keys every second, for 56 hours, before
we found the right 56-bit key to decrypt the answer to the RSA
challenge, which was 'It's time for those 128-, 192-, and 256-bit
keys,'" said Gilmore.
Many of the world's top cryptographers agree that the EFF DES Cracker
represents a fundamental breakthrough in how we evaluate computer
security and the public policies that control its use. "With the
advent of the EFF DES Cracker machine, the game changes forever," said
Whitfield Diffie, Distinguished Engineer at Sun Microsystems and famed
co-inventor of public key cryptography. "Vast Internet collaborations
cannot be concealed and so they cannot be used to attack real, secret
messages. The EFF DES Cracker shows that it is easy to build search
engines that can."
"The news is not that a DES cracker can be built; we've known that for
years," said Bruce Schneier, the President of Counterpane Systems.
"The news is that it can be built cheaply using off-the-shelf technology
and minimal engineering, even though the department of Justice and the FBI
have been denying that this was possible." Matt Blaze, a cryptographer
at AT&T Labs, agreed: "Today's announcement is significant because it
unambiguously demonstrates that DES is vulnerable, even to attackers with
relatively modest resources. The existence of the EFF DES Cracker proves
that the threat of "brute force" DES key search is a reality. Although
the cryptographic community has understood for years that DES keys are
much too small, DES-based systems are still being designed and used
today. Today's announcement should dissuade anyone from using DES."
EFF and O'Reilly and Associates have published a book about the EFF
DES Cracker, "Cracking DES: Secrets of Encryption Research, Wiretap
Politics, and Chip Design." The book contains the complete design
details for the EFF DES Cracker chips, boards, and software. This
provides other researchers with the necessary data to fully reproduce,
validate, and/or improve on EFF's research, an important step in the
scientific method. The book is only available on paper because
U.S. export controls on encryption potentially make it a crime to
publish such information on the Internet.
EFF has prepared a background document on the EFF DES Cracker, which
includes the foreword by Whitfield Diffie to "Cracking DES." See
http://www.eff.org/descracker/. The book can be ordered for worldwide
delivery from O'Reilly & Associates at http://www.ora.com/catalog/crackdes,
+1 800 998 9938, or +1 707 829 0515.
**********
The Electronic Frontier Foundation is one of the leading civil liberties
organizations devoted to ensuring that the Internet remains the world's
first truly global vehicle for free speech, and that the privacy and
security of all on-line communication is preserved. Founded in 1990 as a
nonprofit, public interest organization, EFF is based in San Francisco,
California. EFF maintains an extensive archive of information on
encryption policy, privacy, and free speech at http://www.eff.org.
From stuffed at stuffed.net Fri Jul 17 03:05:53 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Fri, 17 Jul 1998 03:05:53 -0700 (PDT)
Subject: Sex industry takes on US govt/Hormones improve whore moans http://stuffed.net
Message-ID: <19980717084625.28072.qmail@eureka.abc-web.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 830 bytes
Desc: not available
URL:
From gwb at gwb.com.au Fri Jul 17 04:01:20 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Fri, 17 Jul 1998 04:01:20 -0700 (PDT)
Subject: HANSON BEING BANNED: PLEASE ACT ON THIS EMAIL
Message-ID: <1.5.4.32.19980717102002.0073f0f4@gwb.com.au>
Dear One Nation supporter in NSW,
Pauline Hanson has been banned from using council facilities in her
electorate of Blair.
The Labor-dominated Ipswich City Council, the heart of Pauline Hanson's seat
of Blair, has returned to their old politically motivated tricks against the
One Nation party.
With the recent Queensland State Election turning the mainstream parties on
their heads the word has gone out - do anything that you can to deny One
Nation their right to a "fair go".
The Council allowed One Nation to use their facilities after a 6 month long
ban following the breaking of a council hall window at the party's launch by
protesters in April 1997. The ban was imposed on the basis of "protecting
council staff from danger".
http://www.gwb.com.au/gwb/news/onenation/launch.html
An example of recent (1998) pre-state election use by Pauline Hanson of the
Ipswich City Council facilities can be seen at:
http://www.gwb.com.au/onenation/qldstate/polaunch/index.htm
at the above link Pauline Hanson launched One Nation's state policies
without any security problems or risk to council staff.
One Nation used Ipswich City Council facilities on several occasions this
year without any protesters even making an appearance.
The basis of "fair go" and "freedom of assembly" is equity in decision making.
At a recent Labor Party meeting One Nation members demonstrated peacefully
outside the council venue yet no such threat or withholding of council
facilities to Labor has been suggested - nor should it.
Following the State Election the rules have apparently changed.
The Ipswich City Council this week rejected an application by Pauline
Hanson's One Nation to use council facilities on the basis of "concern for
the safety of staff".
The mayor of Ipswich, John Nugent, was one of those voting against One
Nation's use of council facilities.
This is laughable as the last time protesters appeared at a One Nation
meeting was over a year ago in June 1997.
One Nation has (to ensure council staff safety) offered to supply private
security and ensure that sufficient police are on standby - this offer has
been rejected.
The link below will take you to an image of one of the chief protagonists,
Councillor Paul Tully, a Labor supporter who has made it his life ambition
to destroy what Pauline Hanson and you stand for.
http://www.gwb.com.au/gwb/news/onenation/gold/tully.jpg
Can we let him win?
I don't think so.
I appeal to you to write, in the strongest terms possible, to the local
Ipswich paper, The Queensland Times.
Their email address is:
qt at gil.com.au
Remember to keep your letter to under 200 words to ensure publication.
Issues to look at:
==================
1) The damage to Ipswich's reputation through these undemocratic antics.
2) Freedom of speech.
3) Labor's underlying undemocratic motives.
4) What role the ratepayers who voted Hanson have been allowed in on this
decision by the Labor council?
I encourage you to send the Queensland Times an email letting them know how
YOU FEEL about the Ipswich City Council's decision to prevent Pauline Hanson
from using ratepayer's facilities.
GWB
Scott Balson
From BUFFU at aol.com Fri Jul 17 08:37:02 1998
From: BUFFU at aol.com (BUFFU at aol.com)
Date: Fri, 17 Jul 1998 08:37:02 -0700 (PDT)
Subject: Civil disobediance only gets you an invitation to the anarchist's big bash
Message-ID: <89904731.35af6f4d@aol.com>
We are sending you an invitation to be one of our special guests this
year, big harry ass lawsuits are always of interest. Bring a friend if you
like, but I have to warn you, Liberatarians are not welcome. This years menu
includes red meat and poptarts. Clothing is optional.
Sincerely,
Beth
From KMHAsfaha at aol.com Fri Jul 17 10:26:46 1998
From: KMHAsfaha at aol.com (KMHAsfaha at aol.com)
Date: Fri, 17 Jul 1998 10:26:46 -0700 (PDT)
Subject: kmha@aol.com
Message-ID: <90f10915.35af77d7@aol.com>
please i need some suggestions with topics for my informative speech, or may
some
infromative speeches already outlined to use it for refrence.
thankyou.
From jf_avon at citenet.net Fri Jul 17 10:46:30 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Fri, 17 Jul 1998 10:46:30 -0700 (PDT)
Subject: New Computer Software for Police
Message-ID: <199807171800.OAA05948@cti06.citenet.net>
Date: Thu, 16 Jul 1998 18:14:18 -0600
From: rmcreat at istar.ca (BC NFA)
Subject: New Computer Software for Police
NATIONAL FIREARMS ASSOCIATION
BRITISH COLUMBIA BRANCH
Announced on the 6 o'clock news July 15, 1998.
I ask you to read this please; while reading keep in mind
this is easily adaptable to observe firearms owners patterns.
Const. Oscar Ramos and Const. Raymond Payette of the
Vancouver City Police made announcement of their new
"Shame the Johns" software. It is designed to share
information with all levels of police in the Lower Mainland
and elsewhere.
This software allows the tracking of vehicle movements
and buying patterns. It allows police to predict when and
where you will be at anytime. It is designed to collect
name, date of birth, license number, discription of vehicle
- -and-other-information. It will automatically generate
a letter to send to the persons home informing other
family members of the persons activities.
Michelle Traver
SSAC
NFA-BC
1706 E. 1st Ave., Van., BC V5N 1B1
1877-254-2100, local 604-254-2100
fax 604-255-2202
Jean-Francois�Avon,�B.Sc.�Physics,�Montreal,�Canada
��DePompadour,�Soci�t�d'Importation�Lt�e
�����Limoges�fine�porcelain�and�french�crystal
��JFA�Technologies,�R&D�physicists�&�engineers
�����Instrumentation�&�control,�LabView�programming
PGP�keys:�http://bs.mit.edu:8001/pks-toplev.html
PGP�ID:C58ADD0D:529645E8205A8A5E�F87CC86FAEFEF891�
PGP�ID:5B51964D:152ACCBCD4A481B0�254011193237822C
From announce at inbox.nytimes.com Fri Jul 17 11:16:53 1998
From: announce at inbox.nytimes.com (The New York Times on the Web)
Date: Fri, 17 Jul 1998 11:16:53 -0700 (PDT)
Subject: Great News...
Message-ID: <199807171854.NAA3471112@inbox.nytimes.com>
Dear Subscriber,
The New York Times on the Web has made it easier for you to stay
current and to make your way around our site, with a newly redesigned
home page and the addition of two features, Quick News and Page One Plus.
*** OUR NEW HOME PAGE ***
CONTINUOUS NEWS. Our new home page gives you an instant look at the
top news from The Times, with updates throughout the day reflecting
news judgments from the editorial team of The Times on the Web. Breaking
news from the Associated Press, refreshed every 10 minutes, gives you
an immediate take on the changing world. And a new ticker brings you
a quick look at the current state of the market.
IMPROVED NAVIGATION. We've also made it simpler to get around our site,
with an easy to find, easier to use navigation panel that takes you
directly to the major news and feature sections with fewer clicks.
MORE LINKS TO MORE STORIES. Top features from around the site are now
highlighted on the home page as well, giving you faster access to news
and features from The New York Times.
http://www.nytimes.com
*** QUICK NEWS ***
QUICK NEWS. Our new Quick News page is your best source for what's
happening right now. Regularly updated by the editors of The Times
on the Web, this page highlights and summarizes the top stories
developing at the moment, with links to other major news of the day.
http://www.nytimes.com/yr/mo/day/late/index.html
*** PAGE ONE PLUS ***
PAGE ONE PLUS. We've improved the presentation of the articles that
appear on the front page of the printed New York Times, with quick
links to the major sections of the newspaper.
http://www.nytimes.com/yr/mo/day/front/
We hope you'll make a point of visiting the site soon and letting
us know what you think.
Sincerely,
Rich Meislin
Editor in Chief
The New York Times Electronic Media Company
***********************************************************************
When you registered with The New York Times on the Web you indicated
that you wished to receive information about new features and services.
For assistance please consult The New York Times on the Web's Help
Center, where you can remove yourself from the mailing list on the
page "View or Edit Your Subscriber Profile", at:
http://www.nytimes.com/subscribe/help/email.html
Please do not reply to this e-mail.
From zxq_5 at hotmail.com Fri Jul 17 11:17:11 1998
From: zxq_5 at hotmail.com (zxq_5 at hotmail.com)
Date: Fri, 17 Jul 1998 11:17:11 -0700 (PDT)
Subject: 2 Free copies...
Message-ID: <199807171817.LAA02198@toad.com>
The time is now to reach out to all the people on the
Internet.
It's your business,how are you going to advertise your
product or service over the Internet?
Direct email puts you in front of millions of people who want to
know about your product or service.The most cost effective way
to make your business explode!
Never before has it been possible to reach so many for so
little.
We are the leaders in direct email because we do what we
say.Our data banks have email buyers for every business.
Don't worry we will help you with a subject and letter that
will work for you.
.
Guaranteed
CALL 1-800-600-0343 ext,1669 leave message.
CALL 1-702-796-6123 speak to a consultant.
From Charlie_Kaufman at iris.com Fri Jul 17 12:39:12 1998
From: Charlie_Kaufman at iris.com (Charlie_Kaufman at iris.com)
Date: Fri, 17 Jul 1998 12:39:12 -0700 (PDT)
Subject: GAK 4 -- For whom the Doorbell tolls
Message-ID: <85256644.006C6CB1.00@arista.iris.com>
I believe there is nothing really good, really evil, or even really novel
about the Cisco et al proposal. That makes it hard for a technical
community like this one to evaluate it.
The controversy should not be around the technology, but around the
spin-doctoring. It is both wrong and dangerous to portray this as a step
forward in resolving the crypto export debate. It is comparable to the
Lotus Notes 64/40 encryption scheme or the Microsoft/Netscape and later
Lotus scheme for making strong cryptography available between exportable
browsers and international banks. These may be significant to some
customers and to some vendors, but they are not steps toward resolving the
controversy. They are more likely to extend the controversy, since they
decrease the urgency of the debate for some of the players.
There is no reason to believe this controversy will be settled anytime
soon. The battle continues with no plausible resolution because both sides
believe they will win if they hold out long enough. Civil Libertarians
believe that the public will not stand for the sorts of draconian controls
that will be necessary to enable universal snooping and that the courts
will rule such controls unconstitutional. The argument against this view is
that the American people are sheep and the Constitution says what the
Supreme Court says it does and have you looked at the makeup of the Supreme
Court lately? Big Brother thinks he will win because he has the pictures.
And because he always does.
So think of these confusing technological tweaks as sending food aid to the
starving peasants in the war zone. It might extend the war by masking some
of its most painful effects, and hence might in the long run be a bad
thing. But the effect is ambiguous at worst, and it's difficult to argue
with the humanitarian groups that want to do it.
I was involved with choosing the wording of the Lotus press release around
64/40. It was a constant effort to restrain the enthusiasm of the
marketeers who wanted to talk about how wonderful it was. I think we
overall did a good job of making it clear that this was not a great thing,
and that we hoped it would not be a long term thing. It was a small
improvement for a limited set of customers while we continued the war.
If you read Cisco's publications, they have been fairly restrained in their
enthusiasm. But some of their partners and some of the press coverage has
gotten completely out of hand. The most offensive testimonial is from
Novell:
"This solution represents a real step forward for U.S. encryption policy,"
said Eric Schmidt, CEO of Novell. "At last, we have a market solution that
meets the needs of consumers, corporations, law enforcement and national
security."
This seems like a case where we need to shoot the messenger.
--Charlie Kaufman
From Charlie_Kaufman at iris.com Fri Jul 17 12:39:47 1998
From: Charlie_Kaufman at iris.com (Charlie_Kaufman at iris.com)
Date: Fri, 17 Jul 1998 12:39:47 -0700 (PDT)
Subject: EFF Announces GAK 5
Message-ID: <85256644.006C6F08.00@arista.iris.com>
Given that the EFF has demonstrated hardware capable of breaking DES in a
short period of time, they should now form an industry alliance asking for
general export permission for DES. If law enforcement ever needs to access
any encrypted data, they can bring it to EFF, along with a court order, and
EFF will "recover" the key. This should be allowed under the existing Key
Recovery exception, which says things are exportable if you provide the
government with a mechanism for getting at the keys!
Of course, some will claim that EFF is selling out to Big Brother by
manufacturing this technology, and that granting export permission for DES
will only prolong the pain of export controls. Others will claim that it is
wonderful that we have finally developed a technology that solves once and
for all the crypto debate. Flames will ensue.
[Note: In case it is not obvious to everyone, this note is a lame attempt
at sarcasm. Please don't hang me.]
--Charlie Kaufman
From jf_avon at citenet.net Fri Jul 17 13:26:02 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Fri, 17 Jul 1998 13:26:02 -0700 (PDT)
Subject: No Subject
Message-ID: <199807172040.QAA09454@cti06.citenet.net>
The original paper is available at:
http://www.cisco.com/warp/public/146/july98/2.html
For any precise analysis, use the original document at the aforementionned address.
------------- begin "cut and paste" text ---------------
White Paper
The Export of Certain Networking Encryption Products under ELAs As An Alternative to
"Key Escrow/Recovery Products" under KMI: A Networking Industry White Paper on
Encryption Export Controls
by
Elizabeth Kaufman, Cisco Systems, Inc. and
Roszel C. Thomsen II, Thomsen & Burke LLP
Encryption Press Release
PR Contact: Doug Wills, (408) 527-9475, dwills at cisco.com
Executive Summary
The Clinton Administration's export control policy is designed to promote development of cryptographic products that provide law enforcement agencies with
access to encrypted data. Products that implement key escrow/recovery to provide such access are broadly exportable under License Exception KMI.
Although some customers have indicated interest in products that implement key escrow/recovery for stored data, customers generally oppose mandatory key
escrow/recovery for data in transit. This White Paper proposes that certain networking encryption products that provide for authorized access without key
recovery should also be eligible for broad export under appropriate Encryption Licensing Arrangements.
The Administration's export control policy must also reflect the equities of the intelligence community. Therefore, the proposed Encryption Licensing
Arrangements should be approved subject to riders and conditions designed to prevent the export of strong encryption products to military end-users, for
military end-uses, or to any government ministry, agency or department of certain countries.
The operational characteristics of networking encryption products to be eligible for export under appropriate Encryption Licensing Arrangements are not
complex. Simply stated, the operator action model delivers a 'private door-bell,' not a 'house-key' to parties lawfully seeking access to data. Qualifying
products must incorporate an operator-controlled management interface that enables dynamic, real-time access to specified network traffic prior to
encryption, or after decryption, at a designated access point.
Background
In Executive Order 13026 of November 15, 1996, President Clinton said that cryptographic products implementing the Key Management Infrastructure
("KMI") would be eligible for export without licenses after a one-time technical review.1 On December 30, 1996, the Commerce Department's Bureau of
Export Administration ("BXA") published an interim rule amending the Export Administration Regulations ("EAR", 15 CFR Part 730 et seq.) that implements
Executive Order 13026.2
The better-known provision of this interim rule states that "key escrow or key recovery products" are exportable under License Exception KMI. The term
"key escrow or key recovery products" is defined in great detail in Section 740.8(d)(1)(i) and Supplement No. 4 to Part 742 of the EAR.
A lesser-known provision of this interim rule states that "other recoverable encryption products" shall receive "favorable consideration" for export. The term
"other recoverable encryption items" is defined briefly in Section 740.8(d)(1)(ii) of the EAR, and the type of "favorable consideration" that should be accorded
to such products is not defined at all. The ambiguity of this provision provides an opportunity to explore new approaches to exporting cryptographic products.
Overview
Industry has studied the technical, market and policy issues surrounding the KMI. These studies suggest that there may be market demand for products
implementing key escrow/recovery techniques for retrieval of encrypted stored data. Such products would also appear to meet law enforcement's
requirements for retrieval of encrypted stored data. However, no market demand exists for products implementing key escrow/recovery techniques for
retrieval of encrypted transient data. Eminent cryptographers have argued that key escrow/recovery techniques create unnecessary risks for encrypted
transient data.3 The National Security Agency ("NSA") has confirmed these findings.4
The networking industry proposes that certain networking encryption products described in this White Paper may receive wide market acceptance and meet
the requirements of law enforcement with respect to transient data without implementing key recovery. The intelligence community's equities, though not
reflected in the EAR, must be respected as well.
Analysis of Market Requirements
In order to meet market requirements, networking encryption products must: (1) provide strong security, (2) adhere to open standards, and (3) support an
operator-controlled management mechanism to specify encrypted flows.
Strong security is essential for products that encrypt transient data. Customers, particularly service providers, have stated repeatedly and emphatically that they
will not purchase products that encrypt transient data, if those products also facilitate unauthorized, covert surveillance by third parties. The government should
encourage the deployment of products that implement strong security, because such products will deter certain kinds of crimes, like theft of trade secrets by
third parties.
Deployment of products that encrypt transient data requires open standards. Without open standards, different vendors' products will not inter-operate, and
broad deployment will not be possible. The government should encourage the deployment of standards-compliant products, because it has a shared interest in
a common cross-vendor solution and the rapid deployment of strong new viable technologies.
Some customers also have indicated that operator-control of encryption flows is a useful feature for network diagnostics and reporting, and for allowing the
efficient transmission of non-sensitive data. Customers in regulated industries, such as banking and securities, also may need to monitor their employees'
communications from time-to-time. Most customers also desire the ability to respond to a court order without exposing all of their data across the Internet or
the public switched telephone network.
Analysis of Government Requirements
The EAR describes key escrow/recovery products primarily in terms of their utility to law enforcement. The government's interests, however, are not
monolithic. The law enforcement and intelligence communities have different requirements.
Law enforcement's main priority has been to establish procedures for access to encrypted data in transit that are comparable to existing procedures for voice
communications and therefore capable of introduction into evidence in a court of competent jurisdiction. The technical characteristics of the networking
encryption products described in this White Paper will be of greatest interest to law enforcement, because these technical characteristics are the key to
meeting law enforcement's requirements for access to plaintext.
The intelligence community, on the other hand, has not shown much confidence that key escrow/recovery will meet its requirements since the secret Skipjack
algorithm and governmental escrow agents featured in the original Clipper Chip were abandoned in favor of vendor-selected algorithms and commercial
escrow agents. Its primary concern currently appears to be the broad deployment of encryption technology that does not interfere with current best
operational practices. In this regard, the technical characteristics of qualifying products may be of secondary importance to the intelligence community, and
proposed riders and conditions on the ELA may be of greater importance.
An Alternative to Key Escrow/Recovery for Networking Products
Although key escrow/recovery is not acceptable for data in transit, some customers require a mechanism that can reveal real-time plaintext for network
diagnostics and reporting, the transmission of non-sensitive data, occasional employee monitoring, and to support law enforcement. The proposed alternative
to key escrow/recovery does not require weakened cryptography, yet provides access similar to that currently available for voice communications.
Packet switched data networks handle traffic differently than circuit-switched voice networks. Circuit switched voice networks are characterized by the
opening of a dedicated circuit where communications are transferred in "real time." Packet switched networks are a statistically-multiplexed environment where
communications are routed packet-by-packet, so that data is fragmented but delivered in near real time. In spite of these differences, packet switched data
networks can, with some limitations, enable real-time access to plaintext. The proposed alternative to key recovery provides customers with full-strength
encryption, while simultaneously enabling the dynamic creation of an access point that allows real-time interception of plaintext based upon the target's source
or destination, whether the product is located within an enterprise or at a service provider's premises.
Two Access Scenarios: Access in the Enterprise, and Access at a Service Provider's Premises
The access point concept is not a perfect solution for all products. For example, it does not easily apply to user-to-user desktop applications. However, it
does appear to offer a reasonable alternative to key recovery on many classes of network applications and platforms. Specifically, it is a viable approach to
access to plaintext for devices where the individual responsible for data creation/reception is not the same individual responsible for platform operation. Such
devices constitute a significant percentage of the available networked platforms, including firewalls, routers, switches and other networking devices.
Classes of Network Devices
Self-managed
3rd party-managed
Single-user
Home PC
Enterprise desktop
Enterprise telephone
Set-top box
Service Provider VPN
Outsourced firewall
Multi-user
Enterprise network
Enterprise server
Multi-user workstation
Can provide access to plaintext without the end user's knowledge
Meeting Law Enforcement Requirements
In order to be exportable under the proposed Encryption Licensing Arrangements, networking encryption products must contain a management interface that
dynamically controls encryption by source and destination address, and by network protocol, to enable real-time access to selected network traffic prior to
encryption or after decryption. The operational characteristics of these products may be summarized below:
a) A qualifying network encryption product must incorporate an encryption management interface that:
i) is remotely accessible;
ii) controls the encryption configuration of the platform;
iii) configures encryption policy by source and destination network address;
iv) enables a remote operator to modify the encryption configuration dynamically;
v) enables the interception of network traffic between a specific source and destination either prior to encryption or after decryption at a defined access
point;
b) A qualifying network encryption product may:
i) be hardware, software, or a combination of hardware and software;
ii) encrypt any network protocol and/or at any network layer;
iii) support any
a) encryption algorithm
b) key length
c) key generation mechanism
d) key management scheme;
iv) be standalone, or integrated with other functions;
v) be a single user, multi-user or infrastructure platform;
vi) enable interception on the wire, on media (such as a hard disk), via a specialized communications port, or at another defined access point.
Two figures that illustrate how qualifying products may provide access to plaintext are set forth in Figures 1 and 2 of this paper.
Meeting Intelligence Community's Requirements
Current best operational practices are not widely understood by the public, and they may be compromised by the broad deployment of networking encryption
products, whether of US or of foreign manufacture. However, the possible loss of access to plaintext communications due to use of commercial cryptography
must be analyzed within the broader framework of advances in new technologies. As one eminent cryptographer testified before the Senate Judiciary
Subcommittee on Technology and the Law, "Advances in emitter identification, network penetration techniques, and the implementation of cryptanalytic or
crypto-diagnostic operations within intercept equipment are likely to provide more new sources of intelligence than are lost as a result of commercial use of
cryptography."5
In further recognition of and deference to the intelligence community's equities, industry is not requesting authorization to export products with key lengths
exceeding 56 bits to military end-users or for military end-uses, or to any government ministry, agency or department of the countries listed in "Tier 3" (as
defined for purposes of computer export controls). Exports of products exceeding 56 bits to these end-users would require a separate license issued by BXA
after full inter-agency review under applicable Executive Orders. The differences between the proposed ELA and export under License Exception KMI are
summarized in the chart below:
License Exception KMI
Proposed ELA
Eligible Products
Key recovery products
Products providing access to plaintext at intermediate stations of the data network
Territory
All except Cuba, Iran, Iraq, Libya, North Korea,
Sudan and Syria
Same as KMI
Eligible End-users
All end-users are eligible
(1) All end-users are eligible for 56 bit products,
HOWEVER,
(2) Products exceeding 56 bits would not be eligible for government agencies and
military end-users in Tier 3 countries
Duration
Indefinite
Three years, renewable in three year increments
Reporting
Biannual
Same as KMI
Conclusion
This White Paper has defined a class of networking encryption products that should be authorized for export under appropriate Encryption Licensing
Arrangements. The operational characteristics of qualifying products ensure that law enforcement will continue to enjoy authorized real-time access to plaintext
References:
1. 61 FR 58767.
2. 61 FR 68572.
3. The Risk of Key Recovery, Key Escrow and Trusted Third Party Encryption,
H.Abelson et al. on June, 1998.
4. Threat and Vulnerability Model for Key Recovery (KR), NSA, X3
on February 18, 1998.
5. Key Escrow: Its Impact and Alternatives, testimony of Dr. Whitfield Diffie,
Distinguished Engineer, Sun Microsystems, Inc. before the Senate Judiciary
Subcommittee on Technology and Law on May 3, 1994.
Cisco Systems
Cisco Systems, Inc. (NASDAQ: CSCO) is the worldwide leader in networking for the Internet. News and information are available at
http://www.cisco.com.
For more information visit Cisco PR Contacts
All contents copyright � 1992--1998 Cisco Systems Inc. Important notices.
---------- end of "cut and paste" text ---------------
Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
DePompadour, Soci�t� d'Importation Lt�e
Limoges fine porcelain and french crystal
JFA Technologies, R&D physicists & engineers
Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From rah at shipwright.com Fri Jul 17 13:38:09 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Fri, 17 Jul 1998 13:38:09 -0700 (PDT)
Subject: John Gilmore and the Great Internet Snake Drive
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
Congrats to Mr. Gilmore, EFF, et. al. for a very impressive DES crack.
It seems that Gilmore and Moore's Law have just turned the
once-respected DES into cryptographic snake-oil. He keeps hurting
snakes like that, he's gonna get himself canonized. ;-).
Seriously. Many thanks to Mr. Gilmore for proving, once again, that
lobbying is pointless, and that physics is not optional.
Outstanding. Marvellous.
Cheers,
Bob Hettinga
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.5
iQEVAwUBNa+x3cUCGwxmWcHhAQFZAQgArKCN418IA1MXwfpXeJ4IF93j9f3G3skH
OotWP5dcoHOaUvbgTcOWP9YBAj77jzaazrtfK3wJD634ehLbf5N+gzmBHQVnXtXR
Vf/JMe24EyI3xCqvRptSTtrik8d+oi3Wy7ZZEwBzLPd0A+XE4LdsClgE2C4ns3ZK
Lq12mUmRQaZvc4++oakIAOT+Llx9TnnUHYqVMSjDT8QJoJ7vEFBEqcOea1Qzk1u9
leZlyrLs1ivbhcthXNBOyhN6RTwJgRyF3nFxpl/uY0tEvNvgFl+/aZZTJkwvvhmm
0MTSfzFfy9I+7BT5FD1iFC+i8JAVd4CDeI+9I6c6/LCAppfrKy5FBg==
=Zeyp
-----END PGP SIGNATURE-----
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
July 23-24, 1998:
From jf_avon at citenet.net Fri Jul 17 13:53:06 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Fri, 17 Jul 1998 13:53:06 -0700 (PDT)
Subject: Politicians...
Message-ID: <199807172107.RAA09933@cti06.citenet.net>
you wrote in the Canadian Firearms Digest V2 #498
>Date: Fri, 17 Jul 1998 09:33:52 -0600
>From: Gordon
>Subject: politiians
>
>Politicians and diapers should be changed regularly. and for the same
>reasons!
ROTFL!
I took the liberty to Cc this message to a few friends. :-)
Mind if I use it in one of my .sig file?
Ciao
jfa
Jean-Francois�Avon,�B.Sc.�Physics,�Montreal,�Canada
��DePompadour,�Soci�t�d'Importation�Lt�e
�����Limoges�fine�porcelain�and�french�crystal
��JFA�Technologies,�R&D�physicists�&�engineers
�����Instrumentation�&�control,�LabView�programming
PGP�keys:�http://bs.mit.edu:8001/pks-toplev.html
PGP�ID:C58ADD0D:529645E8205A8A5E�F87CC86FAEFEF891�
PGP�ID:5B51964D:152ACCBCD4A481B0�254011193237822C
From CTIA_Daily_News at um2.unitymail.com Fri Jul 17 16:20:54 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Fri, 17 Jul 1998 16:20:54 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 17, 1998
Message-ID: <199807172205.RAA30430@mailstrom.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.� Please click on the icon /
attachment
for the most important news in wireless
communications today.
WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
=============================================
From StanSqncrs at aol.com Fri Jul 17 16:44:08 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Fri, 17 Jul 1998 16:44:08 -0700 (PDT)
Subject: Politicians...
Message-ID: <2bc02f8e.35afe1a5@aol.com>
In a message dated 7/17/98 5:48:16 PM Central Daylight Time,
jf_avon at citenet.net quotes:
<< >Politicians and diapers should be changed regularly. and for the same
reasons! >>
It's the easy way out (and I mean DOWN and OUT)! I mean, if we're simply
going to change them out everytime, why bother to figure out which ones aren't
evil/stupid (I mean, out of all those politicians, there's got to be 1 or 2!
I think. ;-) )?
See, if we just simply change politicians at every chance, then we throw the
baby out with the bathwater, so to speak. The simple solutions aren't always
the best ones.
Stan,
http://members.aol.com/whtsametau/camel/index.htm
From gnu at toad.com Fri Jul 17 17:11:31 1998
From: gnu at toad.com (John Gilmore)
Date: Fri, 17 Jul 1998 17:11:31 -0700 (PDT)
Subject: ZDTV and CNN coverage of DES Cracker
Message-ID: <199807180011.RAA02044@toad.com>
ZDTV will have me on the 8PM news tonight, and Barry Steinhardt on
their "Silicon Spin" program today.
CNN took pictures earlier today, I don't know when they'll use them.
John
From bill.stewart at pobox.com Fri Jul 17 17:53:58 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 17 Jul 1998 17:53:58 -0700 (PDT)
Subject: FWD: new MIT SPKI software release
Message-ID: <3.0.5.32.19980717173912.00929100@popd.ix.netcom.com>
fredette at theory.lcs.mit.edu (Matt Fredette) writes:
==================================================
Subject: new MIT software release
A new release of the MIT SDSI/SPKI C software distribution is
available. Go to
http://theory.lcs.mit.edu/~cis/sdsi.html
and follow the software distribution links in the paragraph about
SDSI/SPKI 2.0. Note that you must be a US or Canadian citizen, etc.,
to get this software.
The following binary builds are available:
sdsi20-0.4.0-sparc-sun-sunos4.1.4.tar.gz
sdsi20-0.4.0-sparc-sun-solaris2.5.1.tar.gz
sdsi20-0.4.0-i386-pc-solaris2.6.tar.gz
sdsi20-0.4.0-i386-unknown-netbsd1.1.tar.gz
sdsi20-0.4.0-mips-sgi-irix5.3.tar.gz
An Intel Linux build will hopefully be available soon.
These are all built from the source distribution:
sdsi20-0.4.0.tar.gz
As usual, many bugs were fixed in this release. See ChangeLog in the source
distribution for the details.
More general notes from the 0.4.0 README:
Release 0.4.0
-------------
This code now requires (sequence )s to conform to the expected grammer
in the structure-06 draft, i.e., it supports the macro "def" and "ref"
mechanism, and, if threshold subject support is compiled in, the
"process-threshold" mechanism. It will reject sequences that use
the old (do hash ) or old (do k-of-n) directives.
DSA support has been finished, and is compiled into the library by
default. This means that SDSI2_FEATURE_STRUCTURE6_SIGS is defined by
default; since this changes the grammar for signatures to match what
is expected in the structure-06 draft, earlier signatures will break.
See the applicable blurb in the 0.3.0 notes of the README for details.
PGP support has been extended to handle what I believe to be the
majority of PGP 5.0 keyrings. If your PGP private keyring uses IDEA
or CAST5 with MD5 or SHA1 to seal the secrets, sdsi2sh should be able
to read it. PGP DSA keys are fully supported.
The SDSI distribution now includes MIT-written multi-precision integer
and DES libraries. This means that you don't have to track down and
compile GNU MP and Eric Young's libdes if you don't want to. If you
do still want to compile with one or both of these other libraries,
you can - see the main documentation for instructions on when you may
want to, and how.
The reduction code has been completely rewritten. It's separated out
from sequences, in its own little internal API. You step a reduction
with rules until you run out of them, and then you can get out the
conclusion that results from those rules. It's possible to reduce
a whole (sequence ) into its equivalent (cert ), or to just reduce
two (cert )s into one.
The cache API has changed considerably, to present the face of a
generic S-expression cache. sdsi2_cache_add_search_term is a single
function used for incrementally building a cache query, that works a
lot more intuitively than the old add_search_.._term functions did.
The actual cache format has not changed.
The ugly story of unparsing S-expressions, or filling a sdsi2Sexp, has
been completely retold. It is now possible to allocate a new
sdsi2Stream, simply "push" canonical elements (like whole sdsi2Sexp *,
sdsi2ByteString *, integers, etc.) onto it, and then just call
sdsi2_sexp_parse to have it parse that into a new sdsi2Sexp.
Two new commands have been added to sdsi2sh: "load" and "save" allow
you to load a variable from and save a variable to a file.
Matt
--
Matt Fredette
fredette at bbnplanet.com, fredette at mit.edu, fredette at theory.lcs.mit.edu
http://mit.edu/fredette/www
"The first time the Rolling Stones played, three people came."
From philo at devoted.net Fri Jul 17 18:01:12 1998
From: philo at devoted.net (philo)
Date: Fri, 17 Jul 1998 18:01:12 -0700 (PDT)
Subject: http://www.devoted.net/
Message-ID: <35AFF3E6.51E80BBC@devoted.net>
From COMPUTERTIME12 at yahoo.com Fri Jul 17 19:12:47 1998
From: COMPUTERTIME12 at yahoo.com (COMPUTERTIME12 at yahoo.com)
Date: Fri, 17 Jul 1998 19:12:47 -0700 (PDT)
Subject: EARN A PENTIUM II 300 MMX WITHOUT 1 PENNY OUT OF POCKET..
Message-ID: <199807180215.LAA01415@naka0.midland.co.jp>
GET A FULLY LOADED 266 mmx or 300 mmx Pentium II
or a
Pentium II 266 LAPTOP NOTEBOOK
with $0 COST OUT OF POCKET !!!
NOTHING DOWN !!! 100% FINANCING !!!
A,B,C, or D credit, NO PROBLEM !!!
99.99% APPROVAL !!!
YOU WILL RECEIVE THE FOLLOWING:
COMPUTER
PLUS:
2 yr's Internet Svc.
2 yr's Dist. Website
2 yr's Business Website
2 yr's Virtual Shopping Mall
at NO COST !!
PAID FOR TOTALLY,
and not take one thin dime out of your pocket !!!
Our Company pays off your Computer with the proven plan that we have in place. We will share that with you when we call you back.
The company has been around for 4 1/2 years.
And started this NEW program about 12 weeks
ago and it is absolutely EXPLODING !!!
Some people are paying their computer
off in 1 HOUR with our plan in place. Take advantage of our group and we will show you how!!!
---------------------------------
In the 2 Packages
You get the following:
* A 266mmx or 300mmx Pentium II
* 32 or 64 Megs of Ram
* 4 Meg Video Card w/ TV Output
* 4.3 or 6.4 Gig HD
* 3.5 Floppy Drive
* 56k Flex-Fax Modem
* 32x CD Rom
* 16 Bit Soundcard
* 60 or 200 Watt Speakers
* 104 Keyboard & Mouse
* 15" or 17" SVGA Color Monitor
* LexMark Color Inkjet Printer
* Microsoft Windows 95
* Plus additional Software
FOR INFORMATION ...CALL TOLL FREE..
1-888-588-3713 (24 hrs / 7 days a week)
TOLL FREE NUMBER
Fax on Demand 415.273.3995 (24hrs.)
REMEMBER THIS:
Just refer 5 and you earn $1500 in commisions
PLUS......the company sends you a MONTHLY BONUS, which you can use to pay off
your computer/lease balance , then.... with 5 more sales
IT'S YOURS AT NO COST !!! Not a DIME OUT OF YOUR POCKET...
.....................................................................................................................
From verify at nytimes.com Fri Jul 17 22:12:27 1998
From: verify at nytimes.com (New York Times subscription robot)
Date: Fri, 17 Jul 1998 22:12:27 -0700 (PDT)
Subject: Welcome to The New York Times on the Web
Message-ID: <199807180512.BAA12197@content9a.nytimes.com>
Welcome, cypherpunk6,
Thank you for registering for The New York Times on the Web.
****************************
ABOUT YOUR REGISTRATION
****************************
Your subscriber ID is cypherpunk6
You selected your password at registration.
Your e-mail address is cypherpunks at toad.com
We encourage you to print this message and save it for
future reference. If you have any questions about your
registration we can find your account using the ID
and e-mail address listed above.
Unless you chose otherwise, your ID and password
have been saved on your computer so that you do not have to
enter them each time you visit our site. Please keep in mind
that you can enter this ID and password on any computer
to reach our Web site, so if you change computers or
install a new browser, there is no need to re-register. If you
forget your password, please do not re-register. You can retrieve
your password in the Help Center by clicking "Help" anywhere
on the site.
For more information about the site and your registration, please
visit the Help Center at:
http://www.nytimes.com/subscribe/help/
*****************************************
ABOUT THE NEW YORK TIMES ON THE WEB
*****************************************
The New York Times on the Web combines the quality
news coverage, authority and integrity of The New York Times
with the immediacy, utility and depth of the Internet. Our site
includes daily contents from The Times, news updates
every ten minutes from the Associated Press and throughout
the day from New York Times editors, a low-cost 365-day
archive of New York Times articles, and original reporting
exclusive to the Web in CyberTimes.
The Times on the Web also features:
** Up-to-the-minute sports scores and statistics
** Current weather conditions and 5-day forecasts for over
1,500 cities worldwide
** A searchable library of more than 50,000 book reviews
** Custom stock portfolios
** Searchable Real Estate and Help Wanted listings
** Subscription service to the Crossword Puzzle, Bridge
and Chess columns
Thank you for registering.
Visit us again soon at: http://www.nytimes.com
*****************************************
Please do not reply to this message. If you did not
authorize this registration, someone has mistakenly
registered using your e-mail address. We regret
the inconvenience; please FORWARD this message
to cancel at nytimes.com and we will remove it from
our records.
From lreed at west.cscwc.pima.edu Fri Jul 17 22:31:20 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Fri, 17 Jul 1998 22:31:20 -0700 (PDT)
Subject: Live At The CypherMore - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C955B.4C2DE0E0.1@west.cscwc.pima.edu>
Live At The CypherMore East - THEM...LIVE! - SAHMD!!!
_____________________________________________________
Actually, the movie, produced in 1988, and released just
in time to throw the Author into a hysterical state of Termial
Paranoia, was called, "They Live, and still is. (called that,
I mean).
[EditWhore's Node: The reason the Author never bothers to
go back and correct his spelling, syntax (whatever that
is) and miscarriage-returns of linguistic justice, is
that her mentor, who was as equally good a pitcher as she
was a catcher, told her, "Never rewrite, the reader might
be gaining on you."]
It was a dark and normal night...
Until the Author booted up SCO Xenix at 4 a.m. in a sleazy
little motel room in ButtFuck, North Dakota. Then, as the
Daemons, Zombies, Orphan Zombies and the dreaded Cron were
released to wreak their havoc in ToshibaWorld, in the heart
of the Author's 5200C portable computer, LadyLuck, not having
a date for the evening, intervened to provide mitigating
circumstances which would eventually become evidence in the
Court Of Public Opinion as to the mitigating circumstances
which needed to be considered before sentencing the Author
to a lifetime of Hard Labor, trying to give birth to a new
perceptive world-view paridigm in which WeTheSheeple felt
perfectly comfortable returning a judgement of, "Guilty,
by reason of insanity." (As well as a guilty verdict on the
misdemeanor charge of, "I don't care if the people from the
Justice Department *are* reaming you a new cornhole on my
living room floor, I don't want you using that kind of
language in front of my children.")
For the Author, as his (or her...or their) mind began to break
under the strain of trying to hold back the Forces of Evil
that escaped from Bell Laboratories, hidden in the carry-on
baggage of the Unix Operating System, the only hope of sanity
seemed to lie in turning on the BoobTube (even though they
visually bleep out the naked boobs on TV in North Dakota),
and trying to defend HimOrHer self with the technological
opiate of the asses...Gilligan's Island.
It was not to be...
Instead, despite the fact that TV goes off the air around
10 p.m. in the smaller northern states, the Author found
himself finding himself foundering in a flow of Taoist
synchronicity which goes far beyond the temporal concerns
of everyday life, resulting in him living a schizophrenic
existence, torn between Arizona and Saskatchewan, neither
of which adheres to the Daylight Saving Time standard that
decent, God-fearing Americans and Canadians hold sacred,
whereupon the movie, "They Live" sprung on to the Midget
Silver Screen sitting atop a faded yellow table with
cigarette burns around the edges, completely out of
visual harmony with the vile-green colored rug with a
multitude of cigarette burns dotting its nearly threadbare
surface.
The Author found HimOrHerSelf battling the Mutant Monsters
created by 'our engineers' talking to 'their engineers'
(without ever managing to discover why your hard drive only
crashes just before your job-performance review), as well
as simultaneously drinking in the sights and sounds of a
movie showing on a TV set which had not yet been plugged
in--a movie in which a pair of "men who love men, every
now and then" [WAS: Male Bonding In America - I Think Some
People Are Going Just A Little Too Far] found themselves,
on a dark and stormy night [(c) Snoopy], discovering a
box of dark glasses which enabled them to see the scum-
sucking aliens living in humanity's midst, without our
knowledge.
The Author, for the first time realizing the dire warning
hidden in ZZ Top's classic musical offering, 'Cheap Sun
Glasses,' decided that, given the fact that the theme of
his last music album, "Please! Stop Me Before I Sing
Again," had been embraced by the music-loving public to
such a degree that he was hounded out of the industry,
SheOrHe's only realistic course of action, in order to
warn others about the frightening dangers to be found
lurking within the heart of the Unix Operating System,
was to use the Medium to proclaim the Message (even though,
according to Marshal McClueHandLuke, they are identical
twins, although in a microcosm-macrocosm sort of way,
like Danny DeVito and Arnold Schwartzenager).
Thus was born, "The Xenix Chainsaw Massacre - The True
Story Of The InterNet - Part I."
The rest is history...
Well, not *all* of it is history, since we are currently
writing some of it, now...which you are reading...now.
And the rEvolution is NOW!, too, so...
Lying Awake In Bed At 4 a.m. Burning Question #38679:
"Was the key invented by a sorry, drunken
asshole who could never keep track of the point he
was trying to make?"
Wait here, I'll be back...
"Shit!"
"Fuck! Godamnn it!"
'o'
OK, like I was saying...
MultiMedia...
The Author, in 1989, had discovered and explored the
first, true VirtualRealityMultiMediaExperience, in
which HeOrShe could no longer distinguish between the
Medium, the Message, the Meaning, the MeanderingMind,
or the voices inside her head which told her that
the Messages From Mars coming through the fillings
in her teeth were FUD, disseminated by an insurance
sales activist with a hidden agenda.
Worried about the fact that some egoistical, elitist
fuckwad might, at some point in the future, try to
claim credit for the Author's discovery of MultiMedia,
HeOrShe set Stanley's WayBack Machine to a point which
corresponded to the exact Time-Space-Mind equivalent
of the Nadir Point between alpha and omega, and could
distinctly hear Tim C. May hollering,
"I'm going to write about MultiMedia in the CypherPunks
archives on the first day the list exists, and you will
*never* get credit for the concept."
The Author, realizing that the preceeding makes little
sense, suddenly realized that all HeOrShe really wanted
to point out in this chapter is that, despite the fact
that it is a B-grade movie in which Meg Foster never
shows her tits, the movie 'They Live' speaks a Truth
which needs to be understood by any individual who
professes an interest in journeying beyond an imaginary
world-view in which he believes that buying the Jeep
seen sitting on top of the mountain peak will really
result in him getting to fuck the living shit out of
the large-breasted blonde bombshell lying across the
hood of the vehicle. (Or, alternatively, her thinking
that purchasing New Lemon Joy Dish Detergent will
really lead to her lifemate doing his share of the
dishes, and becoming more romantic, instead of just
humping her and then rolling over and going to sleep.)
ONE-TIME OFFER!!! [NOT TO BE REPEATED IN THE FUTURE]
Any 'True Story of the InterNet' reader who undertakes
to watch, and believe the message of, 'They Live', is
hereby Officially Absolved of any guilt they may feel
in the future, over automatically deleting any post
sent to the CypherPunks Disturbed Male LISP by the
Author, despite any uneasy feeling they may have that
HeOrShe, in spite of the obvious lunacy inherent the
MeatSpace Manifestation of the maunuscripts, is truly
from the GovernmentHomeForTheCriminallyInsane, and is
here to Help (TM) them...
From Saxgrim at aol.com Fri Jul 17 22:39:44 1998
From: Saxgrim at aol.com (Saxgrim at aol.com)
Date: Fri, 17 Jul 1998 22:39:44 -0700 (PDT)
Subject: d
Message-ID: <4282906a.35b034bf@aol.com>
d
From aytsd9238 at sprynet.com Fri Jul 17 23:26:28 1998
From: aytsd9238 at sprynet.com (aytsd9238 at sprynet.com)
Date: Fri, 17 Jul 1998 23:26:28 -0700 (PDT)
Subject: Earn $100 every time OUR phone rings...
Message-ID: <199807180626.XAA09707@toad.com>
ALL YOU DO IS ADVERTISE THIS 800 NUMBER! THAT'S ALL!!
$100 goes to you for EVERY sale that the company closes!
Does the idea of making at least $1,000 per week
beginning your 2nd week of doing business excite you?
How about never having to sell a thing to your customer
and never having to talk to ANYONE to make money? I don't
know how this could get any easier.
EVERY aspect of selling or talking to someone is DONE
COMPLETELY by the company!
The number one home based business for the 2nd year in
a row, Top Secrets is a member of the Better Business
Bureau and the U.S. Chamber of Commerce.
WHAT THIS BUSINESS WILL DO FOR YOU:
* Handles all your calls, closes your sales, and
sends you WEEKLY commission checks!
* It pays you a $100 commission (that's over 50% of the total
sale)
for EVERY sale. CHECKS put $$$ in your pocket in less than your
first
week or two... Quick commission earnings build and maintain
motivation.
ALL YOU DO IS ADVERTISE the toll-free number and your ID
number.
* You can get STARTED TODAY. Just advertise the business
toll-free
number with your ID # and let this business CLOSE YOUR SALES
every day...
They do all the work and YOU GET PAID FOR IT!
* You may advertise any way you choose: Bulk E-Mail, Flyers,
Classifieds,
Postcards, etc. Suppose you use bulk E-Mail, as I am: 100,000
E-Mails
with a 1/10th of a percent (0.1%) sales rate at $100 per sale
nets
$10,000... not too bad.
There is nothing else out there that will provide you with an
immediate
income beginning THIS WEEK with minimal effort.
Before you call, I want you to think about the quality of the
live
operators handling your call. I am convinced you will not find a
better
team of closers for your own personal sales. You will clearly
understand
what I am talking about once you call.
PLEASE DON'T LET THIS PASS YOU BY. MAKE THE CALL!!
1-800-811-2141
You will be asked for ID #56130 when you call.
(Live operators are available from 8 AM-10 PM CST Monday through
Saturday and will be able to answer any questions you may have.)
Call one of the 24hr TESTIMONIAL lines at 888-703-5389,
888-446-6949, 888-446-6951 or 888-731-3457 (all toll free).
From StanSqncrs at aol.com Fri Jul 17 23:48:18 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Fri, 17 Jul 1998 23:48:18 -0700 (PDT)
Subject: Live At The CypherMore - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <9e46edbf.35b043a1@aol.com>
This is an interesting, coincidence? ;-)
In a message dated 7/18/98 12:58:15 AM Central Daylight Time,
lreed at west.cscwc.pima.edu writes:
<< The Author, for the first time realizing the dire warning
hidden in ZZ Top's classic musical offering, 'Cheap Sun
Glasses,' ... >> << ... Worried about the fact that some egoistical, elitist
fuckwad might, at some point in the future, try to
claim credit for the Author's discovery of MultiMedia,
HeOrShe set Stanley's WayBack Machine to a point which
corresponded to the exact Time-Space-Mind equivalent
of the Nadir Point between alpha and omega, and could
distinctly hear Tim C. May hollering,
"I'm going to write about MultiMedia in the CypherPunks
archives on the first day the list exists, and you will
*never* get credit for the concept." >>
ROFLOL! What's coincidental? The latest tune that my band, Nobody's Business
(in which I play bass and sing) has learned, is Cheap Sunglasses by ZZ Top.
If it ain't coinicidence, I got a 'scarecrow' in my band.
Someone tell me if it's good or bad to be in the 'Space Aliens Hide My Drugs'
series. ;-)
Stan,
Nobody's Business
http://members.aol.com/stansqncrs/nobiz.html
From lreed at west.cscwc.pima.edu Sat Jul 18 01:33:08 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 18 Jul 1998 01:33:08 -0700 (PDT)
Subject: There ARE NO Coincidences...
Message-ID: <009C9574.B7195CE0.13@west.cscwc.pima.edu>
* From: StanSqncrs at aol.com
This is an interesting, coincidence? ;-)
In a message dated 7/18/98 12:58:15 AM Central Daylight Time,
lreed at west.cscwc.pima.edu writes:
<< The Author, for the first time realizing the dire warning
hidden in ZZ Top's classic musical offering, 'Cheap Sun
Glasses,' ... >>
ROFLOL! What's coincidental? The latest tune that my band, Nobody's Business
(in which I play bass and sing) has learned, is Cheap Sunglasses by ZZ Top.
If it ain't coinicidence, I got a 'scarecrow' in my band.
Someone tell me if it's good or bad to be in the 'Space Aliens Hide My Drugs'
series. ;-)
Stan,
~ ~ ~ ~
It's no coincidence, Stan...we've been keeping an eye on you.
Toto
~~~~
p.s. - ou've got something hanging from your lip.
p.p.s. - No...the *left* side...
From RAEDS at email.msn.com Sat Jul 18 02:37:16 1998
From: RAEDS at email.msn.com (RAED SALAH)
Date: Sat, 18 Jul 1998 02:37:16 -0700 (PDT)
Subject: PLEASE SEND ME FREE STUFF
Message-ID: <000101bdb22f$6838c580$2a4c2499@default>
MY NAME IS BRENDA SALAH AND MY ADRESS IS PO BOX 218624 HOUSTON TX 77218 AND
MY E MAIL ADRESS IS RAEDS at MSN.COM I WOULD LIKE TO START RECEVING FREE STUFF
PLEASE E MAIL ME BACK AND LET ME KNOW HOW TO GET STARTED THANK YOU BRENDA
SALAH RAEDS at MSN.COM
From RAEDS at email.msn.com Sat Jul 18 02:39:45 1998
From: RAEDS at email.msn.com (RAED SALAH)
Date: Sat, 18 Jul 1998 02:39:45 -0700 (PDT)
Subject: MORE
Message-ID: <000101bdb22f$c0e0b1c0$2a4c2499@default>
MY NAME IS BRENDA SALAH AND I WOULD LOVE TO GET FREE STUFF MY ADDRESS IS PO
BOX 218624 HOUSTON TX 77218 AND MY E MAIL ADDRESS IS RAEDS at MSN.COM THANK YOU
From StanSqncrs at aol.com Sat Jul 18 02:56:16 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Sat, 18 Jul 1998 02:56:16 -0700 (PDT)
Subject: There ARE NO Coincidences...
Message-ID:
In a message dated 7/18/98 3:56:56 AM Central Daylight Time,
lreed at west.cscwc.pima.edu writes:
<< It's no coincidence, Stan...we've been keeping an eye on you. >>
That's why I suggest listening to I Robot by Alan Parson's Project.
Stan
From jya at pipeline.com Sat Jul 18 04:41:43 1998
From: jya at pipeline.com (John Young)
Date: Sat, 18 Jul 1998 04:41:43 -0700 (PDT)
Subject: Scanning the DES Cracker
Message-ID: <199807181138.HAA10065@camel7.mindspring.com>
>From the EFF Web site:
"Cracking DES" has been published only in print because
US export controls on encryption make it a crime to
publish such information on the Internet, but the book is
designed to be easy to scan into computers.
John Gilmore has written that he is unable to provide
the digitized text of the book sitting on his desk due to
export controls, and that Chapter 4 of the book explains
what EFF expects to happen. EFF will link to an offshore
URL as soon as the volume has been scanned and
posted.
We'll commence scanning the book as soon as it arrives
here next week and will provide the exportable parts to
those working on the US-forbidden.
From dumitru at ycaar.com Sat Jul 18 05:34:19 1998
From: dumitru at ycaar.com (Dumitru Tudor)
Date: Sat, 18 Jul 1998 05:34:19 -0700 (PDT)
Subject: Oi!
Message-ID: <35B092AD.23F5B3DC@ycaar.com>
We grew up with anger and violence...
Is it a smart thing to use those things that destroyed our
lives and planet to get what's right?
I would really wanna hear what you think it's right.
Lots of @narchy from,
Pukie
My E-mail:pukie at d3tudor.demon.nl
From cwci at d-int.com Sat Jul 18 06:51:27 1998
From: cwci at d-int.com (cwci at d-int.com)
Date: Sat, 18 Jul 1998 06:51:27 -0700 (PDT)
Subject: VERY IMPORTANT !!!
Message-ID: <032c64945061178POPSRVRES@popline.com>
Dear Friend:
This is an extremely IMPORTANT announcement for you!
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
IMPORTANT ANNOUNCEMENT
IMPORTANT ANNOUNCEMENT
'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
Your Future May Depend on it!!!
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
BUT FIRST, please read the following Editorial Excerpts from some
important publications in the United States:
New York Times: "In concluding our review of financial organizxations
'''''''''''''''''''''''''''''''''''''''' to effect change in the 90's, special attention should
be called to 'World Currency Cartel' organization based in California. The
members of this organization are amassing hundreds of millions of dollars
in the currency market using a very LEGAL method which has NEVER
been divulged to the general public. While their purpose is not yet known,
their presence has most certainly been felt".
NBC Nightly News: "Members of the World Currency Cartel organization,
''''''''''''''''''''''''''''''''''''''''''''' who always keep Low Profile of themselves, are some
of the most powerful and wealthiest people in this hemisphere".
More Excerpts later, but first let us give you this "Important Announcement":
```````````````````````````````````````````````````````````````````````````````````````````````````````````
We are glad to announce that for the very first time, the World Currency
Cartel organization will instruct a LIMITED number of people worldwide on
HOW TO CONVERT $25 INTO ONE HUNDRED OF LEGAL CURRENCY.
We will transact the first conversion for you, after that you can quickly and
easily do this on your own hundreds or even thousands of times each and
every month. TAKE ADVANTAGE OF THIS "SECRET FLAW" !
==================================
It is even more explosive than we have yet disclosed. While currency does
fluctuates daily, we can show you HOW TO CONVERT $99 INTO $580 as
many times as you want. That means, you will be able to CONVERT $99
American Legal Currency Dollars for $580 OF THE SAME. You can do this
as many times as you wish, every day, every week, every month. All very
LEGALLY and effortlessly!
It only takes about 5 to 10 minutes each time you do this. You can do this
from your home, your office or even while travelling. All you need is an access
to a phone line and an address. Best of all, you can do this from ANY CITY
ON THIS EARTH!!!
Again, we must reiterate, anyone can do this and the source is Never-Ending.
For as long as the global financial community continues to use different curr-
encies with varying exchange rate, this "SECRET FLAW" will exist.
''''''''''''''''''''''''''''''''''''''''''''''''''''
As we have said earlier, we will do the first transaction for you and will also
show you exactly how to do this on your own over and over again.
The amount of exchange you would do each time is entirely up to you.
Working just 2 to 10 hours a week, you can soon join the list of Millionaires
who do this on a daily basis several times a day. The transaction is so
simple that even a high school kid can do it!
We at the World Currency Cartel organization would like to see a uniform
global currency backed by Gold. But, until then, we will allow a LIMITED
number of individuals worldwide to share in the Unlimited Profits provided
for by the world currency differentials.
We will espouse no more political views nor will we ask you to do so. We
can say however, that our parent organization Diamond International
benefits greatly by the knowledge being shared as we ourselves alongwith
YOU benefit likewise. Your main concern surely will be, how you will benefit.
As soon as you become a member, you can start making transanctions
from your home, office, by telephone or through the mail and even while
travelling. As said earlier, we will do the first transanction for you and
will show you exactly how to do this on your own over and over again.
No one can stop you from earning hundreds of thousands and even millions
of dollars each year for as long as this "SECRET FLAW" exists.
''''''''''''''''''''''''''''''''''''''''''''''''''''''''
Don't believe us, experience it for yourself!
================================ Unlike anyone else, we will
assure you a great financial freedom and you will add to our quickly growing
base of supporters and you may join the list of Millionaires being created
using the "SECRET FLAW" in the world currency market.
==============
DON'T ENVY US, JOIN US TODAY!!!
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
There is a one time membership fee of only $195.00. BUT, if you join us by
AUGUST 10, 1998; which is our company's 2nd Anniversarry date, you can
join us for only $35 administrative cost. Your important documents, instructions,
contact name & addresses, phone numbers and all other pertinent information
will be mailed to you immediately. So, take advantage of our Anniversarry date
and join us today.
If you are replying AFTER AUGUST 10, 1998; you must pay $195.00 for the
membership fee. NO EXCEPTIONS and no more e-mail enquiries please!
Upon becoming a member, you promise to keep all infos CONFIDENTIAL.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Should you choose to cancell your membership for any reason, you must
return all documents for a refund within 60 days.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IMPORTANT:
*****************
1.....Write your name & mailing address VERY CLEARLY on paper
2..... Below your address, please write your E-mail address (Optional)
3..... At the top Left Hand corner, write the word "New Member"
4..... Attach a CHECK or M.O. for $35 plus $3 for postage & shipping
(TOTAL = US$ 38.00)
5..... Please make the Check/M.O. payable to "Diamond Int." and mail to:
DIAMOND INTERNATIONAL
9903 SANTA MONICA BLVD;
SUITE # 405
BEVERLY HILLS,
CA 90212. U.S.A.
( Outside U.S.A. Must add US$10 EXTRA for shipping). US$ FUNDS ONLY!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Here are some more Editorial Excerpts:
Wall Street : "A discreet group of Americans, operating under the guise
of World Currency Cartel have recently begun making
rumbles in the world finance market. While at this time, their game is not
completely known, they certainly be watched by those making major moves
in the currency contracts".
Financial Week : "Watch them, monitor them, extract their knowledge
and try to become one of them. That is the soundest
financial advice we could give to someone".
National Business Weekly : "While this reporter has been left in the cold
as to its method of operation, we have been
able to confirm that World Currency Cartel and its members are literally
amassing a great furtune overnight".
$$$$$$$$$$$$$$$$$$$$$$$$$$$$ E N D $$$$$$$$$$$$$$$$$$$$$$$$$$$$
From GayWeb at GayWeb.Net Sat Jul 18 11:54:07 1998
From: GayWeb at GayWeb.Net (GayWeb.Net)
Date: Sat, 18 Jul 1998 11:54:07 -0700 (PDT)
Subject: Request To Submit A URL!
Message-ID: <419.435994.48982095GayWeb@GayWeb.Net>
Hi Guys
I love your site and wanted to see if I could get a link from your web
site to our web site. If you would like to have your web site listed at
our web site go to http://www.gayweb.net/GayLinks/submit.html and
add your web site automatically!
For Our Link Please use the information below or feel free to grab our
banner at .
GayWeb.Net - Web Hosting Services For The Gay Community!
http://www.gayweb.net/
Thank You,
The GayWeb.Net Staff - Staff at GayWeb.Net
From eg_ckw at stu.ust.hk Sat Jul 18 13:56:41 1998
From: eg_ckw at stu.ust.hk (eg_ckw at stu.ust.hk)
Date: Sat, 18 Jul 1998 13:56:41 -0700 (PDT)
Subject: L I N K !
Message-ID:
Please add my site to your pages links, below is the code:
APHRODISIACS "REAL" (VIAGRA/GHB/TESTOSTERONE) - THE GREY MARKET WEB MALL
Cut and paste this link onto your website. Also, please send us a link
to your webpage using the same code. We then will immediately place it
on our links page.
Our Web-Site is currently recieving
approximatley 1000-1500 hits per/day.
Thanks,
Dan Amato - President
SAMSON powerlifting / Bodybuilding co.
1-888-256-6785 (Toll Free Phone Call)
email - samson at samson-1.com
web address - www.samson-1.com
From Friend at nubiankg.com Sat Jul 18 14:36:42 1998
From: Friend at nubiankg.com (Friend at nubiankg.com)
Date: Sat, 18 Jul 1998 14:36:42 -0700 (PDT)
Subject: " COMPLETE HOME BUSINESS KIT!!"
Message-ID: <199807181935.EAA25874@storage.pailing.net>
EARN OVER $70,000 A MONTH
IN YOUR OWN HOME BASED BUSINESS
AND LEGALLY PAY VERY LITTLE TAXES!!
This is NOT, I repeat, This is not MLM or Chainletter junk!!!
Friend;
Those are strong words, I know. But if you're not making at least a TENTH of this every month you need to pay attention because I have an IMPORTANT MESSAGE on how you can make what I'm earning and do it within the next 90 days!!
For years I have spun my wheels in various Home Based Business Opportunities with little success. A few MONTHS ago I finally found the key to making bundles of money, right from my home, selling a product everyone in the world needs and wants... INFORMATION!
I'm going to help you do the same if you JUST listen to learn how
to make over $70,000 a month with one of Hottest Selling reports
in the world today!
1) I will set you up in your own Home Based Business for only $50.00!
2) I will GIVE you one of the FASTEST selling products in the world you can
reproduce YOURSELF for pennies!
3) I will show you how you can become a Self Publisher & sell one of the most
Powerful & Provocative Reports ever written - right from your own home!
4) I will let you keep ALL the money you make selling this product!
You don't need to spend thousands of dollars, bear enormous risk and work hundreds of hours a week to start this legitimate business from your home.
In a matter of hours you can start working at HOME, from your KITCHEN TABLE, making from $50 to $1,000 a day!!
Here is all you will need...
#1. The Hottest Selling Publication In The World Today Called Offshore Special
Report Number 5599.
#2. A Copy Machine Or A Quick Copy Service That Can Duplicate OFS's Offshore
Special Report.
#3. A Quality Mailing List Or A Local Or National Publication to Run A SIMPLE Four
Line Classified Ad!
#4. A Mail Box To Collect The Hundreds Of Orders You Will Be Receiving Everyday -
Six Days A Week!
#5 This letter, which you obviously already have, just save it..
______________________________________________________________________
The Key To Any Business Success Is To Have A Product Or Service Everyone In The World Needs And Wants. That Product Should Be Inexpensive To Produce & Easy To Ship. You Will Have That Product With OFS's Offshore Special Report Number 5599!!
______________________________________________________________________
OFS's Offshore Special Report Number 5599 will change peoples lives throughout the world by showing them how they can make and save money by removing themselves from the strict rules, regulations and tax burdens their government has imposed on them in the last few years.
BRACE YOURSELF - most people are taken aback by what I am about to tell you regarding OFS's Offshore Special Report Number 5599.
In OFS's Offshore Special Report Number 5599 You will find out that...
UNFAIR & DISCRIMINATORY Divorce settlements are made obsolete in this report!
RUTHLESS Creditors will CRINGE if they know you have read this report!
BLOOD SUCKING Lawyers May Go Broke By You Reading This Report!
HEARTLESS Tax agencies see RED when they read this report!
SNEAKY Politicians use the information in this report everyday!
Your GREEDY banker does not want you to read this report!
This report is BLACKBALLED by Most Government Agencies!
BACK STABBING relatives HATE this report!
You will also learn & Or Have Access To...
Ways POLITICIANS & THE RICH get even richer using TRUSTS and HOW you can do the same!
Incorporate offshore - Completely private and away from your government's regulations!
Your own secret offshore mailing address - no one will know your real address.
Offshore private checking account - deposit money and pay your bills from offshore - no paper trails.
Save up to 50% on printing & mail & have your sales material mailed from Jamaica - Are you in the mail order business? Here's a money saving opportunity no one else can offer!
Offshore investors - Do you have a viable funding project?
Offshore tax havens - legally delay or eliminate taxes - no one knows - not even your government!
Offshore IBC's & Trusts - Asset protection from creditors and your government!
Offshore Phone answering service - more privacy - more protection!
Offshore Self-liquidating loans - if structured right, never needs to be paid back!
High yield offshore investment opportunities - Find out how the rich make from 1% to 4% a week on their money - offshore and tax free - you can do the same!
Offshore visa card regardless of credit - no paper trails - works in any ATM worldwide!
Up to 100% financing on residential and commercial property - Hard to place mortgage sources!
Bill consolidation regardless of credit rating - stop those harassing creditors within days using this credit source!
Lines of credit up to $15,000 regardless of credit - these credit cards are major bankcards!
Secret money - secrecy is a thriving industry - you will have access to these secret money sources!
______________________________________________________________________
With All This Valuable Information In Report number 5599, Do You See Why It's The Hottest Selling Report In The World Today? This Information Is Not Accessible Just Anywhere! Information Like This Can Not Be Found At Your Local Library. It Is Well Worth $50.00 - In Fact Its Well Worth Thousands Of Dollars By Showing People How They Can Save A Hundred Times That Amount In Taxes Alone! The Best Deal Of All Is That You Will Have FULL REPRINTS RIGHTS And The Permission To Sell OFS's Offshore special Report Number 5599. YOU Keep ALL The Money!
______________________________________________________________________
Information is the perfect product. It's easy to reproduce, easy to ship and easy to sell especially when it's as powerful as Report #5599. The market is unlimited in that you can sell Report #5599 to anyone, anyplace in the world. The potential is unlimited because there are billions of people throughout the world who need Report #5599 and are being introduced to Report #5599 this minute. Everyone...I mean everyone needs Report #5599....
People who have a J.O.B. and have "More Month Than Money" - You know "Just over broke" !!
People who are self-employed - paying that "Self Employment Tax" and are prime candidates for Law suits from every direction!
People who are sick and tired of frivolous law suits - Did you know that in the U.S. there are 2.67 lawyers for every 1,000 people? Most lawyers are HUNGRY and need to sue someone for any reason to survive!
Professional people such as doctors, engineers, technicians, architects, stock- brokers, accountants,and YES even lawyers! - You know those people in the HIGHER THAN AVERAGE tax brakets!
People who are getting married or are married and plan on living happily ever after - Now back to reality - the U.S. has a divorce rate that exceeds 60% every year!
Partners who want to make sure their partnership is a true 50-50 deal now and in the future!
People who live in a country that has strict rules and regulations limiting where and how they can run their business and manage their money!
People who are retired and at the MERCY of their governments' rules concerning Social Security Income and Medical Benefits!
People who WANT to retire but cannot afford to because of lack of income or the rules forced upon them by their government restricting them from receiving a decent income!
People who are HIGH audit risks or have been audited by their governments' Dictatorial Tax Agency - You know "Guilty Until Proven Innocent"!
People who are paying their government 40% to 60% in taxes and are sick and tired of doing so!
People who are close to Bankruptcy and need to find a solution as soon as possible - 20% to 40% of the people in the United States are a paycheck away from Bankruptcy - Yes those people!
People who want to make sure their children receive 100% of their inheritance without the government stealing it away!
People who need credit and have been turned down through traditional sources, such as their local FRIENDLY bank!
People who want to keep their business and personal affairs PRIVATE-Hard to do this day and age with all the computers!
People who have the dream of financial independence and want to make thousands a day running their own Home Based Business!
You must agree with me there is a tremendous market throughout the world; of people who are breathing and paying taxes which are prime candidates for Report #5599!
____________________________________________________________________
Since We Have Determined The Entire World Is A Prime Candidate For Report #5599 Let Me Show You How Easy It Is To Sell Report# 5599 working From Your Kitchen Table! ______________________________________________________________________
HOLD ON!! How Rude Of Me! I Have Been Talking To You From The beginning of this email, without Officially Introducing Myself! So let me officially introduce myself - I'm one of several OFS Independent Associates making FIVE DIGITS every month! I'll be your sponsor - I'm the person who you will pay the $50.00 to and receive Report# 5599! I'm the person who will change your life forever! I'm the person who wants to see you succeed because if you succeed - I succeed!
I want to make sure YOU succeed and see YOU sell hundreds, even thousands of reports every week.
The more you sell the more money I can make! Its' TRUE that you keep ALL of the $50.00 when you sell a report. You pay me NOTHING other than the initial $50.00 for the report - Not one single dollar - you keep it all. Sell only 10 reports a week and make $500 - You keep it all! Sell 100 Reports a week and you make $5,000 - You keep it all! Sell 500 Reports a week and make $25,000 - YOU KEEP IT ALL!!!
Before I tell you how and why I make money every time you sell a report, let me show you how easy it is to advertise and sell "The Hottest Selling Report In the World" - OFS's Offshore Special Report Number 5599!.
This report has been designed to be self-contained with all the marketing concepts on how to sell the report RIGHT INSIDE. In your copy of Report# 5599 you will have access to the following marketing strategies and tools...
Sample of proven classified ads you can place in local or national publications that will make you FILTHY RICH!
A POWERFUL photo ready copy of a postcard you can put YOUR name & address on and have the $50.00 sent directly to you - AUTOMATICALLY. I will show you how you can Print and Mail that Postcard - FIRST CLASS - for as little as Twelve Cents (U.S) Each!
Once you send in your Certificate of Registration from Report#5599 you will also receive...
Additional DYNAMITE Classified and Display Ads that will generate hundreds, even thousands, of responses guaranteed to fill your mail box with $50.00 orders!
Places to advertise for as little as seven cents (U.S.) Per word reaching over 73,000,000 People! A co-op advertising program sharing the leads and sales generated from National Television Infomercials!
A Photo Ready Copy of This ORDER PULLING Sales Letter for YOUR use to mail to the respondents of your ads!
Duplicatable Copy of an Audio Cassette Tape of this ORDER PULLING Sales Letter!
______________________________________________________________________
Become An Offshore Broker And Make More Money Than Most Dream Of Helping Others Find And Save Money! OFS's Offshore Special Report Number 5599 has a variety of money making opportunities and the "Offshore Broker" is just one of them!
______________________________________________________________________
I'M NOT GREEDY - I JUST LOVE WHAT MONEY
DOES FOR ME & MY FAMILY!
As the person who introduced YOU to Report# 5599 I have the opportunity to make over-rides on every Report# 5599 you sell. You see, I'm not happy JUST making $50.00 on the report I sold you. I would like to retire in the near future, sit back and receive hundreds, even thousands, of dollars a week for my past efforts of selling Report# 5599. In Report# 5599 there are additional money-making opportunities by having people establishing what are called International Business Corporations, Asset Protection Trusts(among other Offshore Business Support Services) and I can receive commissions and over-rides having people buying these services whether I personally sell them myself or you sell them through the initial sale of Report# 5599. That's why I'm interested in YOUR success.
I want you to become a MILLIONAIRE by selling thousands of reports.
Here are a few of the additional money making opportunities contained in Report# 5599 from which I can make over-rides by becoming an "Offshore Broker"...
=> First, I make $50.00 on Report# 5599(I initally sold to you) in addition...
=> I can make up to $100 helping people set up an offshore checking account!
=> I can make up to $240 for every international business corporation established!
=> I can make up to $1,000 for every trust set up - Domestic or offshore!
=> I can make up to $50 for every self-liquidating loan manual sold!
=> I can make up to $100 for every offshore print & mail order!
=> I can make up to $100 for every offshore visa card established!
=> I can make up to $100 for everyone who receives a $15,000 Unsecured Line of
credit through a Major Bank Credit Card!
=> If I feel really energetic I can set up and run a TRUST AGENCY in my area and
have people sell TRUSTS for me (somewhat like an Insurance Agency)! The
money-making potential is tremendous by hiring several people who work in my
area.
I'm your sponsor and because of my efforts in selling YOU Report# 5599, I have the opportunity to make Lifetime Residuals from your efforts in selling Report# 5599 to others! I'm truly amazed at the marketing concept offered through OFS's Offshore Special Report Number 5599. The concept is so simple and it is COMPLETELY DUPLICATABLE! By making sure YOU MAKE thousands of dollars a week I'm going to get FILTHY STINKING RICH off your success!
If it seems like I am BRAGGING and RUBBING it in about how I'm going to make bundles of money from your efforts it's TRUE!! You should be as EXCITED as I am because Report# 5599 allows YOU to DUPLICATE MY EFFORTS! When you sell a report to others you will then be in my position - to make ALL the over-rides and commissions I have just talked about - on those who then sell Report# 5599!
______________________________________________________________________
The Following Questions & Answers are designed to answer most of the concerns you may have. This should give you enough information to determine if OFS's Offshore Special Report# 5599 is your tool for making thousands of dollars a week in a home based business...
______________________________________________________________________
Q. Do I have to personally sell the report & the other offshore business support services to people who respond to my ads?
A. NO! This is really a two fold question. Let's talk about the selling of Report# 5599 first. All you have to do is place an ad, mail the postcards or send bulk email. If you place an ad send the respondent THIS SALES LETTER and let THIS SALES LETTER do the rest for you - no need to talk to anyone!! If you mail the postcards or use bulk emailing your job is done!
The postcard will ask the respondent to send $50.00 to your mailing address. Email will work for you if you send it to as many people as you can.
If you decide to become an Offshore Broker and qualify to receive over-rides and commission on the Offshore Business Support Services the PARENT COMPANY will do the selling for you if you wish. This is a "NO BRAINER" and can be as simple or as complicated as you want to make it... Talk to the people if you wish or don't - Report# 5599 sells itself!
Q. How many hours a week will I have to devote to my business?
A. One to sixty hours a week! Here's a question I will answer with a question...How much money do you want to make? Common sense says the more ads you run and the more mailings you do the more money you will make! The statistics show that for every 100 responses you receive from your ads, and you mail THIS SALES LETTER, you will sell five to ten reports making you $250.00 to $500.00 (US). Your ad responses will vary depending on the place you advertise and the circulation of the publication. The more ads you run or the more emails you send out the more time you will need to devote to your Home Based Business.
Q. Just how much money will I need to start my home based business?
A. $50.00! Yeah I know - You're thinking you will need money for ads and mailing. Well - I've had people start with $50.00 (U.S) and make ten copies of the report and sold them to their associates and friends giving them $500.00(US). That gave them enough money to start running ads and to buy stamps. In looking at all the money making opportunities offered in the world today I really don't think you can get started for any less than $50.00 and have a BETTER LEGITIMATE money-making opportunity than the one offered in Report# 5599!
Q. If I have additional questions who will answer them for me?
A. I will or the parent company will! No package of information, no matter how complete, can possibly answer every question that may come up. I do not want you to lose money seeking out the answers. I want you to succeed! You will receive a phone number in Report# 5599 where you can either reach me or someone from the parent company for any question or help you need!
______________________________________________________________________
Here's a valuable bonus for ordering within 5 days....Your's absolutely FREE!!
______________________________________________________________________
I have persuaded the parent company - Offshore Financial Services, Ltd. - to give you their OFS Offshore Business Journal - Volume I - FREE OF CHARGE - as a bonus for ordering Report# 5599 within 5 days of receiving this email. You will receive the Journal when you send in your "Certificate of Registration" found in the report. The information in this Journal is priceless and can NOT be found anywhere but RIGHT HERE!!
Here's a sample of that information:
Bonus #1 OFS's Offshore Business Journal
>Your IRS returns are suppose to be private - Not so!
> Funds through on-line computer services!
> Raising capital without borrowing from the bank!
> How to get medicines before they're approved by the FDA!
> Airlines will handle your baggage with special care if you know the secret!
> You can borrow money from your IRA. Just don't call it a loan
> How to get free subscriptions to over 60 magazines!
> Establish AAA credit in 30 days!
> Why Americans are mad as hell!
> Sources for quick cash loans.
Bonus #2 Report #5599 Support Package.
> How to reach over 73,000,000 people for as little as 7 cents per word!
> How to set up voice mail and never talk to anyone who responds to your ads.
> To use or not to use a mailing list?
> How to receive free names to mail to.
> How to mail your postcards & sales flyers "First Class" for a low as 12 cents each-
includes printing!
> How to collect $5 from people who want to receive this sales letter!
Bonus #3 Bulk-Emailer's Dream Package.
By ordering within the next 5 days, you will also receive a floppy disk
packed full of online marketing tips from two of the nation's top electronic
marketers. I have previously offered this disk for $79.95, but by purchasing
Report #5599 through this special offer within the next 5 days, it will be
yours for FREE!! I will also include another floppy disk with over 150 Hot Money
Making reports that you can sell together or individually!
Bulk-email has been proven to be the most effective way to market on the
internet. By ordering within the next 5 days; I will include a program that collects
names from aol chat rooms at a maximum rate of over 10,000 per Hour!! You will
receive high response rates marketing to these fresh names that you have
collected yourself. Now all you will need is a bulk-email program, you will
receive a link where you can download a free fully working demonstration bulk-
email program that will allow you to begin earning profits the day you receive my
package. You will not need to be concerned with losing your ISP because I will
show you exactly how to send hundreds of thousands of emails per day while
cloaking your ISP's mail server and your identity at the same time!!
STOP THE PRESSES!!, I'm not finished giving away Free Extras yet! I have
just learned of a Brand New ISP that is offering FREE ACCESS!!! That's right
TOTALLY FREE unlimited internet access!! If your Order is received via Fax
within the next 24HRS I will tell you how to sign up for this free service which
is a $240/yr value ORDER NOW!!
With all that I will be providing you, your success is guaranteed. You will not
receive this offer again; by ordering Report #5599 within the next 5 days all of the
above information will be yours for a measly US$50.00. ORDER TODAY!!
Why am I giving away so much for so little? Good question... It is my personal
belief that any responsible hardworking person can achieve financial security
given the proper opportunity and information.. The Rich have kept opportunities
and information to themselves that would allow anyone of us to achieve
unparalleled success easily. That is why I am giving away a solid product, plus
all the information needed to successfully sell that product, for only US$50.00
to anyone with enough interest and patience to read this letter.
Sincerely,
YOUR SPONSOR
OFS Independent Associate
RISK FREE GUARANTEE
If you are not completely satisfied after reading Report #5599 and its Support Package simply return them both within 120 Days for a full refund. No questions asked. You keep the floppy disks, Business Journal and Dream Package. You have NOTHING to risk and a FORTUNE to make. Here's your RISK FREE opportunity to change your financial situation forever!!
{cut}==========================================================
Special Report #5599 Order Form
___ Please rush me a copy of OFS's Offshore Special Report# 5599 and all Bonuses. I understand I have Full Reprint Rights and can sell Report# 5599 for $50.00 (U.S.) Keeping ALL THE MONEY!
___ I have enclosed a CHECK /MONEY ORDER for $50.00
Please mail the report to (PLEASE PRINT CLEARLY)
Your Name: _______________________________________________________________
Address: __________________________________________________________________
City: ______________________________________________________________________
State: ______ Zip: ________________
Phone: (___) ______-___________ Fax: (___) ______-___________
Email Address ___________________________
Mail This form & The check or money order for US$50.00 to the Address below:
Dynamic Communications
P.O. Box 373-356
Decatur, GA 30037-3356
Fax: (770) 234-4241
Phone: (404) 274-8669
Or, if you prefer, you may also pay by faxing your credit card information or copy of your check to the number above along with the information requested on the order form.
Please Note: If ordering by credit card be sure to include card type, number and expiration date. After dialing you will be prompted to press 2 for fax.
Sorry, Report #5599 is too big for us to email it to you, we will send it Priority Mail within 24 hrs of receipt of your order.
From stuffed at stuffed.net Sat Jul 18 14:41:35 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Sat, 18 Jul 1998 14:41:35 -0700 (PDT)
Subject: I had sex with Bigfoot/Married to the slob
Message-ID: <19980718205409.6227.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/18/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From howree at cable.navy.mil Sun Jul 19 04:35:13 1998
From: howree at cable.navy.mil (Reeza!)
Date: Sun, 19 Jul 1998 04:35:13 -0700 (PDT)
Subject: Request To Be Phlamed
In-Reply-To: <419.435994.48982095GayWeb@GayWeb.Net>
Message-ID: <3.0.5.32.19980719203408.00838a50@205.83.192.13>
At 11:53 AM 18 07 98 -0700, GayWeb.Net wrote:
>Hi Guys
GO THE FUCK AWAY. NOW.
From Life.Without.Debt Sun Jul 19 05:41:51 1998
From: Life.Without.Debt (Life.Without.Debt)
Date: Sun, 19 Jul 1998 05:41:51 -0700 (PDT)
Subject: No Subject
Message-ID: <199807191241.FAA07929@toad.com>
Get Out Of Debt For Life Program
******************************************************
If I have offended you in any way I apoligize.
This list is meant for people who are interested in
making money or business opportunities. Simply reply
with Remove and our software will block you from further
mailings!!
****************************************************
Hello,
I am the mailer of this invitation, and just one of the
many people in the Easy Money, Compound Leveraging,
Educational Program, who is determined to help YOU
become financially independent!
..... Have you ever wished that you could find a money
creating, mail order program that is simple enough, and
cheap enough to promote, that all you need to do,
is get in, tell a few friends about it and get Rich Quick,
without leaving the comfort of your own home?
Well, my friend, .................You have finally found it!
I recently became involved in this plan, by responding
to a flyer just like the one below this letter. I spent
only $5 out of my pocket to get started, and began receiving
envelopes with money inside them, just a few days
after entering the program.
... I could not believe my eyes, at first, because I
had not even had time to tell anyone about the program,
so I dug through the pile of other mail order junk on
my desk, and I found the information on the Life Without
Debt Plan, that I had received the previous week and I
Re-read every word trying to find a catch, because I was
sure there must be one!
Guess What,!!! The catch is there is no catch!
... I also called the person who mailed me the plan,
to ask how this happened so fast! He explained the plan,
as best he could, but said he did not know much, except
that he to was receiving money in the mail almost daily,
yet he had only started advertising, by mailing a few
flyers each week.
..... He told me to advance to the next steps as
instructed in the information kit, because that was
what he had done, and my envelopes of money would have
larger sums in them, from that point on!
.. I advanced to the additional plans, and behold,
believe it or not, the envelopes of money come to my
mail box daily, and they get fatter and fatter, every
single day, with more money in each envelope!
.. I know the plan can work for YOU too! Give it a try!
You have nothing to loose and everything to gain!
...Return your completed Form Below, and $5 cash, to the
computer center as soon as possible, so the data entry folks
can place some of the folks responding to my mailings
under you!
..They only accept cash because they turn it around immediately and send it out to the people already in the program. They don't have time to deal with cashing checks and tracking down bad ones which is time consuming and costly.
......... If you need to contact me to ask questions,
Email me at
iglooy at postmaster.co.uk
... I will be happy to answer any question you have,
About this fantastic opportunity, If I can, although
I'm new to the program, and to tell you the truth,
I don't care how it works, because I know it works,
Even if I don't understand everything! Lord Knows,
What would happen, if I knew how it works!!
Sincerely,
John Ball
----------------------------------------------------------------
NO SPONSORING REQUIRED!!!!!
"Life Without Debt"
Easy Money Educational Training Course For 1998
-----------------------------------------------------------------
WE SHOW YOU HOW TO:
***Compound $5 weekly into $780 weekly to start!
***Then we show you how to compound $25 into $3,900 per week!
***Compound Leverage Your Way to Complete Financial Independence!
***Eliminate Your Debts From Creditors and Banks!
Simply print out and return this letter with $5 CASH ONLY,
In an envelope. We will then mail our "Life Without Debt",
INSTRUCTION GUIDE to you and place you into our $5
Easy Money Plan, to illustrate how the plan works!
IF MONEY IS ALL YOU WANT, That's easy!
This program is all about MONEY!
It Appeals to the Masses....
*No Sponsoring Required! *Pays out 80% PLUS on all levels!
*Teaches you how to take control of your finances
And get out of debt FAST! Topics of the educational package
Cover Money, Credit, Debt, Taxes, Federal Reserve, Corruption
In Administrative Agencies of Government, Corruption in the courts,
And the U.C.C. "UNIFORM COMMERCIAL CODE for THEFT BY THE GOVERNMENT"
*SOLID, 9-year-old debt free company, Has an established
Customer base of over75,000+!
*Has an excellent support system to guide you, step by step
Through the pay plans!
*Best of all, you can GET STARTED on an Affordable
"Shoestring Budget" of only $5 weekly! Then advance through the
Entire system at your own pace.
Let us HELP you get on an Extra income path without leaving
Your "Comfort Zone" Get Started Today!
Print out this letter, complete the details below and mail
this letter along with $5 CASH ONLY to:
Computer center
P.O. BOX 1511
Grapevine, Texas 76051
NOTE: MEMBERS RESIDING OUTSIDE OF U.S.A MUST SEND $10.00
....Please send CASH ONLY, as it is used to pay the upline daily,
and ILLUSTRATE HOW the plan works! NO CHECKS!
Your Name:______________________________________________________
Address:________________________________________________________
City:____________________ State:________ Zip______________
Phone#:________________
Mailers I.D.# 022 05 2198 1 John Ball
-----------------------------------------------------------------
_________________________________________________________
From jya at pipeline.com Sun Jul 19 07:44:19 1998
From: jya at pipeline.com (John Young)
Date: Sun, 19 Jul 1998 07:44:19 -0700 (PDT)
Subject: `Vulis terminator' full of crap (Re: net.cop revs up again)
In-Reply-To: <199807182302.AAA15438@server.eternity.org>
Message-ID: <199807191444.KAA23892@dewdrop2.mindspring.com>
This is fact, not the media kind: I've tried to reach Dimitri
by phone a few times since Termination, indeed Mr. T.
helped me find a working number (forwarded to his own).
A lady sounding like Guy there took my name, number
and request for DM to call. But he hasn't. He just keeps posting
as Guy, as Tim, as Nuri, muliple Adams, Johns, Jims, Peters,
anons, and so on, each of the imposters posing as others.
Remember this fact, Tim/Dimitri were in cahoots to nuke the
legacy toaderpunks from day one, pretending to be halves
of evil twins. (Note the overlapping name spelling.)
Still, shifting back to media, the five of us in Manhattan --
Perry, Dimitri, Guy, Duncan (Ray's in Brooklyn -- hundreds
more don't openly affinity) hate each other's guts with infinite
passion as is the duty of citizens competing for dole here,
especially since 20 millions of us are on the dole, thank you
Mr. Roosevelt for legalizing taxing/extoriting/wall streeting
the rest of the globe beyond the Hudson and Fire Island,
from itzy-ritzy bankers to scum of the media sapoid.
Primarily, though, our full-time role is to hide from each other
and the vengeful planet, have our machines say things like,
speak to my agent, my lawyer, my mate, then flip a switch
to the voice of the referent saying things like, he's not in, he's
traveling, he's away, his son's just been killed skiing, he'll
get back, cackle like Freddie.
Shifting back to fact: Dimitri's lady who took my name was:
Dimitri, Guy, Perry, Duncan, Ray, any of Dimitri's manifold
enemies and friends, any of you. Who knows who's here?
Nothing I've seen proves cypherpunks exists: I've seen Ray
twice and he wasn't the same. I've seen Duncan twice and
he wasn't the same. Neither recognized me either. We've
all introduced ourselves to Jim Kallstrom as one another,
and did the same to several of Kallstrom's stand-ins.
Mark this: "Perry Metzger" for certain is non-existent, it's only
a mail drop, a chalk mark, a can by the road, a highly paid
fictional security scam: Pay or plonk. Cooped cops and
holed-up criminals do, up the kazoo.
I say for a fact the crypto/cypherpunk/cops/spooks game's
one bird doing a solo dance. Who that bird is, works for,
remains to be reported reliably: an impossibility by definition.
100 to 1 it's a rogue bot, buried in a bridge caisson, powered
by tidal flow or planetary rotation, unstoppable until earth freezes,
burns or implodes to infinite deception.
Dimitri was not terminated, can't be, he never was, like the rest
of us highly classified phantasms. Adam Back got the story
right, he's exchanging messages with a bot mirroring his inner
evil, call that Tim, call it Dimitri, he'll call back as the One True
Terminator you don't want to meet, ever, but will.
From jdhays at castle.net Sun Jul 19 07:45:20 1998
From: jdhays at castle.net (John D. Hays)
Date: Sun, 19 Jul 1998 07:45:20 -0700 (PDT)
Subject: ZDTV and CNN coverage of DES Cracker
Message-ID: <3.0.3.32.19980719114335.0079eb20@mail.castle.net>
>Date: Sat, 18 Jul 1998 22:06:31 -0400
>To: John Gilmore
>From: "John D. Hays" <@>
>Subject: Re: ZDTV and CNN coverage of DES Cracker
>In-Reply-To: <199807180011.RAA02044 at toad.com>
>
>At 05:11 PM 7/17/98 -0700, you wrote:
>>ZDTV will have me on the 8PM news tonight, and Barry Steinhardt on
>>their "Silicon Spin" program today.
>>
>>CNN took pictures earlier today, I don't know when they'll use them.
>>
>
> Congratulations to you and the EFF. I caught some of Silicon Spin.
Everyone seemed to agree that DES was weak and the government is going
about things all wrong. But CNN doesn't get it.
>
>To paraphrase:
>"A popular method of scrambling data was dealt a blow today... by a
specially built cracking machine... a BANKER was quoted as admonishing
these efforts as reckless for it will only benefit _criminals_."
>
> I don't remember it verbatim but I remember the impression I got from
CNN. Now, this was only a news brief, not a report or a panel, but it
illustrates the ignorance (or bias) of big media.
>
> They never said "encryption". Instead referring to it as "method of
scrambling data". Encryption is a geeky Big Word that CNN thinks normal
people won't know. They completely ignored the social and political
implications of cracking DES. Using encryption to secure your
correspondence, for authentication, or to protect Freedom and Liberty are
geeky Big Concepts that CNN thinks normal people won't understand.
>
> Now I don't expect an in-depth report on a complex issue in thirty
seconds. But to completely ignore the real issues and give us a half assed
uncited falsehood? Did anyone see any good coverage of the DES crack on
CNN, ABC, NBC or any other big corporate news program?
>
>
From lisa at yahoo.com Sun Jul 19 08:21:50 1998
From: lisa at yahoo.com (lisa at yahoo.com)
Date: Sun, 19 Jul 1998 08:21:50 -0700 (PDT)
Subject: HOT FREE PHONESEXrere
Message-ID: <199807191527.PAA15081@uecnet.uecnet.com>
hi baby!
CALL +1-(767)-445-2199 For HOT HOT PHONE SEX!!!
Get Off With Our Live Teen Sluts,
HOT ORGY PHONE SEX!
CALL OUR FREE PHONE SEX SERVICE NOW! 24 hrs / 7 Days
NO CREDITCARD, 100% FREE!!
Don't Make Me WAIT! CALL NOW!
CALL +1-(767)455-2199 NOW!
From chrisharwig at hetnet.nl Sun Jul 19 09:36:18 1998
From: chrisharwig at hetnet.nl (kryz)
Date: Sun, 19 Jul 1998 09:36:18 -0700 (PDT)
Subject: No Subject
Message-ID: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++U59
From lreed at west.cscwc.pima.edu Sun Jul 19 09:48:02 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sun, 19 Jul 1998 09:48:02 -0700 (PDT)
Subject: Leftist Nutly News - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9683.02D72A40.1@west.cscwc.pima.edu>
Leftist Nutly News - SPACE ALIENS HIDE M DRUGS!!!
__________________________________________________
The Royal Canadian Mounted Police have a major, major problem
on their hands.
They finally got their man, and now have absofuckinglutely
no idea what to do with HimOrHer.
Well...*two* major problems, actually.
They've started believing their own press--a deadly step which
leads down a long, torturous path of, in this case, mutually
assured nuclear individual and group self-destruction.
Uuhhh...make that 'two-and-a-half' major problems. (I forgot
to 'carry the two,' realized that things didn't quite add up
in the reader's mind, and realized that there is a natural-born
corollary to the mathematically logical theorem I have proposed
above, which I shall henceforth erudite to you.)
[EditBore's (Left) Nut: The AuthWhore, ALegendInHisOwnSlime as
a result of his earthly eruditions and epistles on everything
under the sun (not to mention the son) as a result of his rather
questionable contributions to the Bienfait Nutly News and The
True Story of the InterNet manuscripts, also happens to be, by
an amazing stroke of coincidence noted by Stan SequinWearer
recently, a MathematicalLegendInHisOwnMind as the result of
imagining that she is a respected member of an internationally
recognized elit/e/ist group of renowned mathematical military
genius members of a ThreeNumberedAgencyToBeDividedLater which
is uncommonly known as the CypherPunks Distributed Nuts.
In all modesty (since I am writing this myself, only as if in
the third person--an old writer's trick...), the Arthur is
indeed one of the formost authorities of our era on the 'New
Age Math,' which is an Einsteinian Fusion of LogicAndReason
with a BeerSteinIan QuantumLeap beyond any semblance of normal
propriety and/or common-sense, in which one's traditional
mathematical results on the BlackBoard are combined with a
psychic reading of the results of mixing last night's pizza
with a morning half-finished-stale-beer-with-a-butt-in-it,
now residing in the WhitePorcelainBowl, in order to be able
to offer firm proof to the President's Commission On Propping
Up A Decaying American Educational System that the FoolsOn
TheHill can safely legislate the value of Pi to be 3.0, in
order to avoid discrimination against the Mathematically
Challenged, without adversely affecting
"NATIONAL SECURIT" , since all circles,
save one, can be forced back into the shape that the Judo/
Christian God of Moses, Abraham, and Lot's wife, had intended
for them, by a conscientiously applied plan of good oral
hygene and the abandonment of any further pretense of paying
the slightest bit of attention to the HumanRightsWhichBelong
ToEveryIndividualOnTheFaceOfTheEarthAsANaturalBirthrightAnd
NotAsAResultOfBeingAllegedlyBESTOWEDUPONTHEMByWordsWritten
OnAPieceOfParchment.
The Author, in HisOrHer latest work, "What Value of Pie Does
A 500 Pound Gorilla Get For Breakfast?"--free to the first
three million subscribers to this weekend's InterNet Pay Per
View MultiMedia Extravaganza, where HeOrShe masturbates, for
the first time, at the age of 93, for a virtually live
audience of sicko's and perverts--explains that many of the
underprivileged youth of today have pawned their calculators
to buy crack-pipes, and their only education in mathematical
sciences has come from their attorney's attempts to explain
'five to ten' to them.]
Like I was saying, before I was so *rudely* interrupted...
The second half of the second problem is that, not only are
the RCMP in mortal danger of believing their own press, but they
also face the even more mortal danger (A coward dies a thousand
deaths--but more on *that* later...) of the reverse parallax
corollary of their ArchieEnemy, the Bienfait Nutly Noose, being
found believable, despite the OneManFullCourtPress's constant
claims of conniving, conspiratorial lunacy fed by a wide variety
of widely recognized atmospheric brainwave disturbances which
are caused by such things as solar flare-ups, moon phases, and
astroids approaching the earth with space ships hiding behind
them (so it was a comet...so sue me!), resulting in HeOrShe
having to fill in the parts of the MessagesFromMars that were
not entirely legible due to the Voices screaming inside HisOrHer
head.
In short, the poor dumb bastards who bought into the Dudley
DoRight Mythology (TM), only to find themselves becoming trained
animals in a MusicalRide that embodied one Horse'sAss sitting
atop another one and going in circles where the Music had no
Magic...
Well, let's just say that, somewhere deep inside, the poor
buggers recognize that, no matter how many of them there are,
or how many guns they acquire (while hiding the citizen's guns
under a Rock), being trained to obey, instead of think, may
prove to be their ultimate undoing.
What I am getting at, here, is that there is undoubtedly not
a single member of the RoyalHorseHumpers who has crossed my
path in the last half-decade who has not taken one look at
me and instinctively realized that I needed to be put down
like a filthy dog, despite the admonishons of their superiors
that the all-important Image (TM) must be maintained, for
appearances sake.
Now...it is too late.
A member of a Canadian mainstream community cult known as
the Estevanites, Brad Parker (no relation to himself), once
replied, upon being asked his name by a member the Royal
HorseHumpers, "Fuck ou! My name is Fuck ou!"
Being, at the time, your AverageCanadianWhiteBoyPussy, it
took me years to realize that, far from being a beligerant,
ignorant fool, too stupid to forsee the consequences of his
actions, Brad had astutely assessed the situation which he
found himself in, and realized that being taken to jail,
instead of being severly beaten and left lying in a back
alley, was the superior option only when one did not have
a friend who had promised to meet him at home with a case
of beer after the bars closed.
He made the right choice...
{Let's have a big, big round of applause for broken, bleeding
Brad, an inspiration to *serious* drinkers everywhere, who
are not only in it for the pissing away of their money and
the lack of glory (or even respect, for that matter).}
Well, to make a long story even incredibly longer, the
LittleFucker that the RCMP, Canadian Customs and Immigration
and the Canadian Justice System threatened to ButtHole (TM)
at the tender age of five ("If it threatens the life of a
single child..."), finally wised-up, and became the BigFuckou!
{Change the name on my warrants, boys and girls, because
I have my Johnson so far up your butts that I'm going to
be able to tell you *how* I fucked you and *why* I fucked
you, and there's not a Dogammed thing you can do about
it.}
Details? ou want *details*?
Gee, gang, I'm a little thirsty, and I think I'll take a
break, have a couple of beers and relax.
Having had the Government's Richard up my butt for a
half-century, I don't think there's any big rush for me
to get my nut, now that it's *my* turn...
[ Important Announcement For Law Enforcement Agencies:
"James Bell polls for *you*..." ]
From stuffed at stuffed.net Sun Jul 19 10:57:34 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Sun, 19 Jul 1998 10:57:34 -0700 (PDT)
Subject: Tit's a victory: Twany Peaks not a boob basher/White House zombie sex
Message-ID: <19980719170949.16692.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/19/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From attila at hun.org Sun Jul 19 12:29:13 1998
From: attila at hun.org (attila)
Date: Sun, 19 Jul 1998 12:29:13 -0700 (PDT)
Subject: Covert Access to Data and ID
In-Reply-To: <199807081547.LAA21623@camel14.mindspring.com>
Message-ID:
there is no such word as "can not" in terms of covert surveillance;
however, if the method is to be universal, the gubmnt will need to
1. enforce drastic standardization of hardware systems if the
logging functions are to be effective.
this might Intel rather happy and Intel is the type of
organization which would perform the function with glee,
if they are not already developing it. for instance,
I just installed a ATX-BX-AGP motherboard which consists
of a "few" VLSI support chips for the SLot 1 processor:
PCI, PCI to ISA, IDE, USB, and power management (5 chips,
all Intel) plus adaptec SCSI and Intel's 100M ethernet.
it would be easy enough to embed the keystroke function
since the PC98 spec calls for total implementation of the
USB controlled.
2. enforce drastic standardization of operating systems to support
the hardware --which makes MickeySnot ideal in so much as they
do not publish source code.
my question would be whether or not Gate$ was doing the
SIGINT or the government. embedding WIPO is a wet dream
on the part of the same publishers which are trying to
ram home the draconian M$ software license in the UCC
revisions up for vote in Cleveland later this month.
why M$? they are almost universal.
I, for one, refuse to run _anything_ branded by
Gate$ encroaching sloth --never have, never will. I can see
the government trying to slip their code into freeBSD
distributions --welcome to the anarchists... likewise,
Linux, netBSD, BSDI, etc. and, I would say the government's
interest is significantly more advanced for the known
dedicated hackers, operating systems tweakers, and other
assorted non-conformists who do not subscribe to M$.
bottom line is a proprietary OS --and getting everyone to
run it --good luck, other than by unenforcable fiat; there
will be ways to circumvent any clamp although the feds will
certainly thin our ranks.
3. provide some means of transparently piggy-backing the information
(presumably in raw form) on the network.
again, the cooperation of the operating system is required;
not everyone is on line, and many connections are slow. if the
data collection is limited to keystokes only, the data require-
ment is relatively low, but the holding tank is still required.
the alternative is to short range transmit the information
and wire the neighborhoods with the receivers. one of their
objective is to have everyone instantly "tappable".
4. establish data collection centers
60 million current net users --consider the data quantity
5. establish prescreen and select for analysis data processing
consider the intelligence required
6. analysis software
NSA may try to scan all international traffic in real time
with key word recognition, etc. but keystroke, including
dealing with editing, mistakes, corrections, etc, which
confuse the input?
bottom line: we aint there yet. however, a van outside in the
street can pick up the signals from hundreds of machines.
[ lost most of my recent files on a tape crash --there was
a project at OxBridge which generated hash interferance
which made scanning rather difficult - more effective than
Tempest --can anyone refresh the pointer? ]
there is no question the government expects intrusive technology. the
burrow-critters are running on high-octane paranoia and they intend
to preserve the status quo of governing without our consent. their
historical means of controlling the news is running out of headroom;
the internet gossip lines are faster than their reaction times.
I certainly would not want to say the feds could not initiate and/or
enforce any or all of the above requirements, but there is a point
where even the American sloths will rise up and start the process
of creating martyrs for the cause.
a more probable approach is to limit the desemination of information
by "known" opponents of government actions (trivial by blocking their
network access once the control the ISPs; and
maybe a few high profile trials with lead jacket incarcerations to
scare off some of the less vociferous (dont say they cant jail us all).
lastly, I look at it this way: for every measure, there is a counter-
measure. if I can not determine the existence of SIGINT transmissions
from my hardware/software, I'll be hanging up my spurs. after all,
listening to gubmnt propoganda in both ears is redundent, who needs it?
attila out...
_________
On Wed, 8 Jul 1998, John Young wrote:
>Dave Emery's remarks on government access to
>keystrokes (proposed by the NYT as an alternative
>to GAK) points to the probable increase of intrusive
>devices to counter increasing use of encryption
>and other privacy and anonymity measures.
>
>This topic comes up here now and then, with
>mentions of a slew of methods to protect privacy of
>data during transmission or storage. But the possibility
>of logging the initial creation or manipulation of data is
>not as often discussed, nor how to tie a person to
>the data, as now being asked in legal and law
>enforcement fora to identify, catch, convict and
>jail computer culprits.
>
>That the NYT floated the idea surely means someone
>is testing public response to an idea that seems to
>be more intrusive than GAK: the logging of initial
>data and any manipulation of it, prior to encrypting,
>and maybe including a means to link the actions to
>the user.
>
>If this is logging (and related retrieval) is done covertly,
>encryption could thereby become a falsely reassuring
>cloak of privacy.
>
>Dave thinks devices like these are surely in the works,
>and he can say more about their sponsors, technologies
>and implementations.
>
>One driving force, as he previously noted, is the desire
>for devices to assure copyright protection, backed by the
>WIPO treaty, which now being considered for approval.
>See the House report on it at:
>
> http://jya.com/hr105-551.txt (141K)
>
>And the EFF and ACLU opposition to it:
>
> hr2281-opp.htm
>
>Other forces, though, are employers who want to snoop,
>law enforcement, government, marketers, actually the
>same groups who dislike privacy protection measures,
>but often prefer to snoop covertly while loudly proclaiming
>support for privacy.
>
>Thus, the more general question Dave has raised is how
>widespread is the development and implementation of
>technolgies for covert surveillance on the Web and in
>desktop boxes -- happily spreading quietly while attention
>is focussed on the very encryption which it will circumvent?
>
>And what are these devices, or what might they be, what
>might be countermeasures and who might be working for
>and against them. SDA must have insights to share.
>
>Over to Dave Emery and those more knowledgeable.
>
>For those who missed his earlier message we've put it, with a
>follow-up at:
>
> http://jya.com/gaks-de.htm
>
>
>
__________________________________________________________________________
go not unto usenet for advice, for the inhabitants thereof will say:
yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__
To be a ruler of men, you need at least 12 inches....
There is no safety this side of the grave. Never was; never will be.
From JackeI466 at aol.com Sun Jul 19 13:19:29 1998
From: JackeI466 at aol.com (JackeI466 at aol.com)
Date: Sun, 19 Jul 1998 13:19:29 -0700 (PDT)
Subject: send me the book
Message-ID:
send me the book (e/mail me back
From honig at m7.sprynet.com Sun Jul 19 14:20:55 1998
From: honig at m7.sprynet.com (David Honig)
Date: Sun, 19 Jul 1998 14:20:55 -0700 (PDT)
Subject: IDEA chip evaluation?
Message-ID: <3.0.5.32.19980719142031.007c2d60@m7.sprynet.com>
Anyone actually received the IDEA chip eval board from ASCOM?
How long does this take?
honig at alum.mit.edu
Speech is not protected simply because we write it in a language
Federal Judge Gwin on the Bernstein case
From ceoyoung at mail.atl.bellsouth.net Sun Jul 19 20:42:23 1998
From: ceoyoung at mail.atl.bellsouth.net (Rahsaan Young)
Date: Sun, 19 Jul 1998 20:42:23 -0700 (PDT)
Subject: magic codes
Message-ID: <35B2BC74.3662@mail.atl.bellsouth.net>
looking for magic codes for cellphones know of any please send
From customerservice at amesperf.com Sun Jul 19 23:07:34 1998
From: customerservice at amesperf.com (Customer Service)
Date: Sun, 19 Jul 1998 23:07:34 -0700 (PDT)
Subject: Ames Performance Engineering: Catalog
Message-ID: <199807200604.CAA13057@crossroads.monad.net>
On Monday, July 20, 1998 at 02:04:27 you responded to our Catalog form.
Thank you for requesting our catalog
Regards,
Customer Service
mailto:customerservice at amesperf.com
---------------------------------------------------------------------------
Ames Performance OnLine - http://www.amesperf.com
From Masterweb at mail.kc.net Mon Jul 20 00:10:13 1998
From: Masterweb at mail.kc.net (Masterweb at mail.kc.net)
Date: Mon, 20 Jul 1998 00:10:13 -0700 (PDT)
Subject: AGGRESSIVE INVESTING
Message-ID: <<199807160000.UAA01620@sdanet.org>
Announcing -
An exciting, new service that will provide you with
information on dynamic new companies that have just
gone public and could very well become tomorrows
hot stocks. There is no cost or obligation - - all
we need is your e-mail address. To start your FREE
subscription call this toll-free 24 hour phone
number now and leave your e-mail address on the tape:
800-935-5171 extension 3157
From lreed at west.cscwc.pima.edu Mon Jul 20 01:34:07 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 20 Jul 1998 01:34:07 -0700 (PDT)
Subject: BackDoors - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9707.23105320.3@west.cscwc.pima.edu>
I've Got BackDoors Coming Out My AssHole! - SAHMD!!!
____________________________________________________
I am not a sick, degenerate asshole who likes to beat up
people in wheelchairs, although I have been known to kick
the ass of a one-armed man, given the fact that he may well
be the guy who murdered Richard Kimble's wife...
Thus, I feel it incumbent upon myself to give an honest
account of my life of crime, so that the Law Enfarcement
Offals and Persecuting Attorneys who have, so far failed
miserably over the years in bringing me to Officially
Recognized Justice (TM), will have a fighting chance of
throwing my sorry ass in a dark hole until Hell freezes
over, by portraying me as the sorry, pathetic, psychotic,
monstrous, criminal, scum-bag piece of shit that I am, in
Reality (TM).
First, however, I would like to insert an totally upaid
advertisement for the DigitalRainbowRevolutionaryFamily
gathering at the Plaza Hotel in Lost Wages at the end of
July (I think).
It's some kind of hacker's conference (I think), and they
have a Spot The Narc (or somesuch) contest (I think) during
the conference.
I have all the details on a faded copy of an email to
the CypherPunks list that I printed out, but all of my
valueable research material is currently fused together,
due to it being hastily thrown into the back of my truck,
and then rained on, during my Fright From Fleedom Japanese
Toulist Tlap that was inspired by my receiving indications
that the abundant overgrowth that Government Authorities
intended to mow down was not, as I had thought, in my back
yard, but on my butt. [WAS: Stick Around, Pal, And our Ass
Is Grass!]
Anyway, despite the fact that I cannot even remember
the proper name or date of the conference (although I
have no problem remembering the name of the Plaza Hotel,
since it is the home of the Penny Slot Machines which
enable one to gamble feverishly for hours with the
loose change they have scraped off the floor of their
vehicle, after having lost all the money they got by
pawning their grandmother's wedding ring), I have made
arrangements, during my recent Soft Kmart Tour Of
America, to have the winner of the conference's Spot
The Snark contest awarded a highly polished and fully
functional BackDoor into the Royal Canadian Mounted
Police computer system.
The award, to be presented by the Offical Mascot of the
Spot The Snark contest, "Spot, the Snipe," unfortunately
does not have the immense value that one might think,
since it has been devalued by the recent proliferation
of a large number of BackDoors into Canadian Government
computer systems. Nonetheless, it will undoubtedly be
the source of countless hours of entertainment for the
lucky winner.
The award to be presented in Lost Wages has officially
been named the 'Jim Bell InterNetional Back Door Revenge
Scholarship To The School Of Hard Knocks Cafe."
It is an Army of Dog Scholarship meant to impress on
the Controllers that PayBack, like Oppression, has now
entered the Global Information Monitoring Age, and that
the New Secret Squirrel Disorder is alive and well in
ButtFuck, Canada.
{ If you can't fuck the one that fucked you, fuck someone
that fucked someone else, and vice-versa, ad infinituum.}
In short, any ShortLimpDickedPrick in ButtFuck, Canada,
can no longer be certain that HisOrHer violation of both
the laws of the land and the laws of human decency will
go unpunished, or that the Anonymous Avenger will not be
an entity totally unknown to them, from a distant place
such as Seattle, with little known connection to the
time and place of a monstrous crime against Monstrous
Oppressors.
And, on the other hand (which has warts), when strange
things begin to happen in the Seattle Court computer
system, strangely connected to the StrangeButTrue!
persecrotchion of a StrangeBedFellow of the Author,
James C. "The 'C' Stands For Dalton" Bell, the only
thing that Sharon can guarantee in Stone, is that the
obvious suspects at ASIX, the adopted parents of the
Author's SparCard II, have absolutely nothing to do
with the eerie laugh of Vincent 'Cate' Price echoing
through their system, since the Army of Dog doesn't
shit in it's own back yard (although it sometimes
pees in its kitchen sink, when the oung is occupied).
In honor of the Royal Rogers Stuffed & Mounted Police
currently celebrating their 150th birthday, I recently
decided to present them with the ultimate gift.
Realizing that I was far from alone in my position of
never being convicted of something I was actually guilty
of (we may not be guilty of breaking the law, but we are
all guilty of *something*--that's in the Bible, I think),
I came to the conclusion that the perfect birthday present
to the RCMP, on the occasion of being awarded their 150th
consecutive 'Fascist Oppressor With The Best Public Image
Award,' would be to hand them my head on a silver platter,
enabling them to convict me on a charge of which I am
completely innocent (from a technical, legal standpoint),
and provide them with all of the information necessary
to ensure my Public Labelization (I won a game of Scrabble
with that word, once) as an Officially Recognized Monster,
as seen on 'Cops,' '60 Minutes,' 'Canada's Least Wanted,'
and 'World's Slowest Police Chases: The Return Of Beyond
The Valley Of The Planet Of Al Cowling.'
I had originally intended for my gift to the RCMP to be
a professional, polished MultiMedia Entertainment Special,
but, since the thieving fucks stole my Toshiba Tecra in
order to attempt to shut me the fuck up, I am forced to
hoist myself on my own petard in a strictly ASCII computer
environment (without a spell checker or thesaurus, so there
is little likelihood of my being able to discover, through
inference, what a petard actually is, or whether I have
spelled it ccoorreeccttllyy).
Accordingly, the passages of the following chapters which
will describe in perverse, grotesque and disgusting detail
the nature of my crimes against sexual normality, will *not*
be accompanied with graphic, color illustrations, leaving
the reader to use their own imagination, or to pay $ .01 per
minute by dialing 1-800-EAT-T0T0, to hear a heavy-breathing
tape-loop which provides excellent background stimulation
for the sexual imagination, as long as you can ignore the
fact that it is the tape of the Author, a sex-pack a day
chain-smoker, climbing a single flight of stairs.
In the following chapter, the Author, still suffering
under the delusion that someone, somewhere, is reading
this tripe (besides college students attempting to gain
extra credits in a summer session psycho-ology class
titled, "An Analysis Of The Results Of Extensive Brain
Damage Caused By MKULTA Experiments On The Half-Unwitting
Author--Current Technology Cannot Detect Any Difference"),
provides complete details of HisOrHer first annual major
drug-deal, just as Canadian Authorities always suspected,
but could never prove.
Smoke 'em if you got 'em...
[ou may leave a message for the Author, at the sound of
the Bong.]
From gendexer at technologist.com Mon Jul 20 06:27:16 1998
From: gendexer at technologist.com (gendexer at technologist.com)
Date: Mon, 20 Jul 1998 06:27:16 -0700 (PDT)
Subject: Fwd: GENDEX.NET TO REORGANIZE CIVILIZATION rev. 18
Message-ID: <199807201327.JAA14281@web02.globecomm.net>
INTRODUCTION
>
> First there were pocket calculators, then personal memory
> organizers (PMO's), and next fully operating computers the size of a
> personal check book.
> Now the latest device to join the personal electronic evolution
> is a palm sized unit that fits easily in a shirt or purse pocket and
> is unlike anything you've seen before. Called a GENDEX, it not only
> keeps track of people data and personal appointments, it can also
> track personal or business expenses and serve as a depository
> and dispensary for real time monetary transactions over the Internet.
> And for those with email, just have it forwarded directly to your
> GENDEX.
> What strikes you first about the GENDEX is its size - just
> seven inches by 3.5" and 3/8" deep - small enough to be carried almost
> anywhere - like an "electronic wallet". The second thing that you
> notice is its unusual keyboard - again, unlike anything else you've
> ever seen or used.
> At first, the keyboard seems strange and undecipherable -
> instead of the usual QWERTY layout in rows, the keys are arranged in a
> circle on the small, one-finger keyboard, with the most common letters
> in the inner circle. It's strange until you begin to use it. As you
> catch on to the pattern, you begin to see the benefit of the
> one-handed, one-finger layout, and most people quickly attain fairly
> high data entry rates with very little practice.
> But it's not only this unusual keyboard that make the GENDEX
> different - and useful. Its the fact that the GENDEX can store,
> receive, and transmit financial data and monetary units over any
> financial network, including secure radio and Internet transmissions.
> Imagine being anywhere, buying or selling anything, and being able to
> complete the transaction with you hand-held personal bank. (In the
> future, it will even include a bar code reader to scan in any item or
> price!)
> The GENDEX has been designed with the computer illiterate in
> mind. The keypad is simple looking with a minimum of entry keys, and
> every action and transaction is prompted for the next step. Just
> "follow the bouncing ball" and it steps you through anything you want
> to do with a minimum of learning time.
> It's also designed to be used in any weather, dropped, sat on,
> stepped on, etc. The unique patentable self locking case is
> waterproof, shock proof, breakproof and, most importantly, idiot
> proof...instead of reaching for your wallet, in the future, many
> thousands of people will be reaching for their GENDEX. Programmed in
> JAVA with user replaceable chip sets, the GENDEX is easily upgradable
> as new features and uses come out.
> The universally-usable GENDEX Java software will hopefully be
> available by the year's end. Until then, you'll just have to stay with
> using old fashioned credit cards, hand written checks, and nearly
> obsolete cash and currency. To check out a live demonstration of the
> GENDEX and its functions, visit the GENDEX website at http://gendex.net.
>
>
> ORGANIZER LOGIC REACHES UNDENIABLY EASY TO USE STATE
>
> Gendex organizer logic is now the most idiotproof and clearly easy
> to understand organizer logic in the world. Thanks to the efforts of
> an entrepreneurial team, a logical prototype has been crafted in the
> Java programming language and is open for testing at
> http://gendex.net. This was finally accomplished after many years of
> logic design by some clearly ingenious persons.
> This new logic works with the seventeen key input and
> classification system developed by DEXCOM over numerous iterations.
> There are 4 main memory keys, 7 system keys, 4 arrow keys that move
> the cursor or scroll the display, and YES & NO keys. Each of the main
> memory keys opens with a table containing all the main functions you
> can do in that division of the memory organizer. Each of the
> functions, when selected, opens into a list of variations. These are
> called TABLES, and there are four, AGENDA, PEOPLE, MONEY and NOTES.
> Ease-of-use comes from consistent application of ENTRY, INDEX and
> FIND system keys. HELP is ready to pop-up at any time to give the user
> easy to understand directions and options.
> By keying SYSTEM, Utilities like e-mail in/out, secure-unviolatable
> memory storage upload, communications carrier select, edit
> scratchpads, output port control, e-bank selection, proper
> calculators, smart power monitors, thesaurus/dictionary, and language
> translation are accessible within any memory function.
> The demonstration on the website can be played with manually using
> the selecting device and keying functional buttons. Soon a new control
> panel will be added, so that the demonstration can be played
> automatically by pressing the purposefully direct logic sequence keys.
> The automatic links shall have a
> player piano effect - eventually more than 111 functional logic
> strings so that even the passive websurfer can instruct himself about
> many things this unit does.
> The logical prototype works in newest browsers, and there is a
> download assist button on the website to bring the latest browser into
> your own computer.
> What is happening now in DEXCOM is a team of five time-investing
> engineers are working toward completing a logical prototype. That is
> leading to completion of a working software product.
> The next step for the company will be to license the Gendex logic
> system for use to the makers of the many hard-to-use and complicated
> handheld and PDA systems already in user's hands. The first company
> product is a software disk that adds the friendly usable gendex
> functions to products like the H-P 620 handheld.
>
>
> Interested Parties:
>
> DEXCOM USA Inc. is introducing its ultimate electronic personal memory
> organizer (Gendex EPMO). Gendex keeps track of Agenda, Money, People
> and Notes, and more. Gendex is the perfect vehicle for financial
> networks sending money via secure data radio, and over the internet.
> Gendex software will be available for purchase. It has all the
> easy-to-use logical prompts, and on-line real-time help functions to
> assist in all
> forms of transactions and memory recording. No other product in the
> market has all the ease of use and understandability built into it
> that Gendex does. This is the breakthru. Nearly all the others are
> expert systems requiring extensive training to use all functions.
> Gendex hardware will be available before the year 2000. It is
> waterproof, breakproof, and pocket sized. Its multichip module design
> will be widely licensed for lowest cost to the consumer. The company
> will brand name its own highest quality unit, and grade and distribute
> components made by world class manufacturers working under our
> lisences. Our designs utilize the latest technologies that can be made
> accessible to mass markets.
> On the website is a fully animated gendex shell opening; it also now
> working logical prototype.
> Price per privately issued share of DEXCOM USA Inc. stock just
> quadrupled to $4, and is approaching IPO, with the potential for an
> eight way stock split.
>
>
> GENDEX.NET TO REORGANIZE CIVILIZATION
>
> NEVER BE LATE
> The advanced timekeeping and AGENDA scheduling functions that make it
> possible to schedule and remember one-time events, recurring events,
> and even place events in someone else's schedule (if they don't
> prevent you from doing so). This will eliminate a lot of potential
> embarassment to those who may forget about where they said they would
> be.
>
> TELEPHONES
> Thanks to internet telephony, and the presence of speaker & microphone
> on the unit, and headsets for the pocketsized gendex, both cellular
> phones and home phones, and their networks, will have a lot less to
> do. This is because internet telephony is practically free, even for
> long distance calls.
>
> PAPER MONEY
> The hazards and time consuming processes of making change will be
> replaced with the ease of sending money optically to smart cash
> registers and vending machines, parking meters etc., with optical
> interfaces to money registrars with radio outputs. (Of course, 'users'
> are subject to national banking laws.)
>
> ELECTRONIC FUNDS TRANSFER
> People will be able to receive and pay bills, and send each other
> money over secure data networks. Gendex has all necessary logic to
> set-up and actualize transactions.
>
> CREDIT CARDS
> Credit organizations will become E-BANKs using Gendex hardware and
> software, because it cuts costs. Until then, Gendex hardware has the
> power to directly write money to mag stripe cards. Ultimately,
> Gendex.net will send a lot of plastic to the scrap heap.
>
> RIDECALL
> Eliminates superfluous automobiles by providing people you like (based
> on lifestyle) with rides to where they need to go, as you make money.
> This is coordinated by Gendex.net. Meet new friends, too.
>
> MONITORING THE HONESTY OF YOUR LOCAL BANK
> Those who maintaing their files in CONVENTIONAL BANK ACCOUNTS
> MANAGEMENT will be able to keep track of interest they should be
> paying you, ATM costs, other banking costs and penalties to monitor
> accuracy of your local bank.
>
> TRADING AND SELLING OVER THE NET
> Every kind of service or material goods will eventually be listed in
> the Bought,Buy,Sell&Trade INDEX. Gendex logic will enable everybody to
> sell or trade their goods and services, through Indexers who are
> already specialists in their respective fields. These Indexers do not
> work for gendex.net, rather they remain independant, while gendex.net
> takes a very small commission each time electronic banks transfer money.
>
> FORMATS
> Prompted data entry of frequently repeated questions, coupled with
> radio access to remote data bases will eliminate clipboards and paper
> forms used in all repetitive data entry used in professional purposes.
> Gendex.net will create a library of tens of thousands of different
> formats for use by government, industry, military, courts, medical,
> and professionals in every walk of life. And these can be sent by
> radio to the Thousands of typists working in data entry jobs will need
> to find something else to do.
>
> TAX DEDUCTIONS
> Every taxpayer who can write off business expenses will never lose
> expense records, and find many advantages with Gendex' advanced
> recording capabilities.
>
> PHARMACY.NET
> Gendex prompted data entry and secure verification will eliminate the
> problem of reading doctor's cryptic handwriting. From NOTES, doctors
> specify treatments. A pharmacist in a van will come driving up to your
> house to serve the prescription rendered by doctors.
>
> MEDICAL HISTORY
> Whatever ails you, and when, and how, can be recorded so that after
> you're dead, and they do the autopsy, they will have something to go on.
>
> TELEVISION INTERNET REMOTE CONTROL
> Gendex EPMO hardware, with its highpowered bidirectional infrared
> port, can replace the intelligent aspect of internet boxes designed to
> bring internet via cable to people's living room televisions.
>
> SMART LOCKS ACCESS
> In the future, metal door locks will be replaced with a glass plate
> guarding an optically activated solenoid. This will enable smart
> systems in buildings to record who passed thru a door, when, and/or to
> execute decisions about who is authorized to pass. It can even require
> remittance of money, or act as a time clock for workers. Gendex EPMO
> hardware, with its bidirectional infrared port can handle all these
> transactions.
>
> TRUCKERS LOGBOOK
> Over the road drivers will be able to accurately maintain records of
> how much time they spent driving, and what happened at points of
> delivery. With GPS attachment, trucker will always know where he is.
>
> PROFESSIONAL TIME LOG
> Consultants who charge in small increments for time spent advising
> clients will benefit readily by the functions provided in this logic.
>
> SPEAKING TRANSLATOR
> An issued unit of Gendex hardware or software will typically handle as
> many languages in its interface as one chooses to download.
> Ultimately, Gendex is intended to be able to handle all of input of
> characters in the users language, translation to another language like
> English or Japanese, and speaking that language via its speaker to
> listening "barbarians".
>
> You may argue that all these things are happening anyway, and indeed,
> some of them are. The difference here is that gendexes can be given
> away free to customers by financial institutions, in exchange for
> placing cash on deposit.
>
>
>
> WHAT MAKES US DIFFERENT
>
> The automatic logical demonstration on the website displays more than
> 59 logical functions. Actually, the number which will be programed is
> about 385, well organized and all totally accessible. Our "nearest
> competitor" in hardware (really, predecessor) 3COM PALM PILOT has only
> 4 logical functions.
> Not only that, our hardware product exceeds all others because it is
> pocketsized, waterproof, breakproof and most importantly, idiotproof.
> Gendex hardware is an email machine that goes with you everywhere,
> even underwater. It's application specific electronic design is user
> serviceable and infinitely upgradeable.
> Gendex hardware is designed with a microphone and a speaker to make
> telephone calls free over the internet. There is also a headset that
> attaches to the lower bidirectional optical ports.
> Logically speaking, it is far easier to use Gendex than those
> products which are not as well designed and thought out. Gendex
> software has prompted data entry and on-line help, being designed for
> the computer-illiterate, thus will replace QUICKEN and most any
> organizer programs.
> Gendex Software, and later hardware, includes prompted logic to
> handle electronic money transactions for on-line banks, and the user
> can make transactions safely. The palm Gendex is being designed with
> completely integrated dataradio (like a pager) and complete TCPIP for
> transmissions of email and e-money over private networks, the
> internet, wherever he goes, with no fear of losing his money
> (depending on what security software is available and what e-bank he
> uses).
>
>
> MAD VENTURE CAPITALIST WANTED
>
> No sane venture capitalist would ever invest in DEXCOM.
> Sane venture capitalists believe that the publication of this website,
> http://gendex.net, will awaken a giant sleeping gorilla. Its pretty
> obvious that the moment DEXCOM begins to succeed, some giant Japanese
> conglomerate or even Microsoft will create all sorts of knockoffs and
> circumvent all of DEXCOM's patent rights, earned in 14 years on R & D
> unsupported by all but the scantiest investments from people who
> should have known better than to waste their money on this, and loads
> of sweat equity. The very-innovative big established companies, with
> their risk taking daredevil unconventional creative engineers, would
> rather do it themselves, than license the technology, in order to get
> it all for themselves. Even Microsoft knows, it can walk all over
> little companies with complete impunity. The sane partners of any MAD
> venture capitalist who would even consider investing in this little
> startup, will wisely tell them that this is a considerable risk with
> little possible outcome in the way of capital gains. Its pretty
> obvious that there is no more to this website that meets the eye at a
> superficial glance. Not worth considering more because the sane
> venture capitalist sees that if its not a complete fake, that this
> must be just another remake, just another failure in the field of
> personal electronic organizers. It's a shame that so many
> unsophisticated people believe that DEXCOM could succeed. While its
> true that the little company continues to draw support from advance
> orders for its units, coming from little, uneducated and
> unsophisticated future customers, every savvy high class venture
> capitalist knows that its not little buyers who make money for a
> company in the long run, its the money that venture capitalists waste
> on entrepreneurs with sure-fire conventional ideas that makes them
> rich. Don't invest in DEXCOM - you will not regret it!
>
> Please return email to webmaster at gendex.net
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> _________________________________________________________
> DO YOU YAHOO!?
> Get your free @yahoo.com address at http://mail.yahoo.com
-----------------------------------------------------
Get free personalized email at http://email.lycos.com
From jya at pipeline.com Mon Jul 20 06:44:24 1998
From: jya at pipeline.com (John Young)
Date: Mon, 20 Jul 1998 06:44:24 -0700 (PDT)
Subject: National Health ID Plan
Message-ID: <199807201344.JAA30199@dewdrop2.mindspring.com>
Lead story, The New York Times, July 20, 1998:
Clinton Plans to Assign Codes, as Law Requires, to
Create Giant Medical Database
As legislation that would protect patient privacy languishes
in Congress, the Clinton Administration is quietly laying
plans to assign every American a "unique health identifier,"
a computer code that could be used to create a national
database that would track every citizen's medical history
from cradle to grave.
The electronic code was mandated by a 1996 law and would be
the first comprehensive national identification system since
the Social Security number was introduced in 1935. Although
the idea has attracted almost no public attention, it is so
contentious that Federal health officials who were supposed
to propose a plan for the identifier by February, have made
little headway and are instead holding hearings beginning on
Monday to solicit public comment.
Proponents, including insurance companies and public health
researchers, say the benefits would be vast. Doctors and
hospitals would be able to monitor the health of patients as
they switch from one insurance plan to the next. Patients
would not have to wade through a cumbersome bureaucracy to
obtain old records. Billing would be streamlined, saving money.
A national disease database could be created, offering
unlimited opportunities for scientific study.
But opponents, including privacy advocates and some doctors'
groups, say the code smacks of Big Brother. They warn that
sensitive health information might be linked to financial data
or criminal records and that already tenuous privacy protections
would be further weakened as existing managed care databases,
for example, are linked. They say that trust in doctors, already
eroded by managed care, would deteriorate further, with patients
growing reluctant to share intimate details. And in a world
where computer hackers can penetrate the Pentagon's computer
system, they ask, will anyone's medical records be safe?
Full story: http://www.nytimes.com
Mirror: http://jya.com/privacy-hit.htm
----------
There's also a short report on House Commerce Committee
passage of the WIPO copyright act (which limits encryption
testing) by setting temporary provisions for "fair use" for
education with bi-annual review by the Commerce Department
to extend or let lapse:
Mirror: http://jya.com/wipo-hit.htm
From billp at nmol.com Mon Jul 20 07:40:30 1998
From: billp at nmol.com (bill payne)
Date: Mon, 20 Jul 1998 07:40:30 -0700 (PDT)
Subject: USCA and Out of Order
Message-ID: <35B3557F.152D@nmol.com>
Monday 7/20/98 8:07 AM
John Young
Saw Payne/Morales v. NSA: Response to USCA Orders July 19, 1998
http://www.jya.com/whp071598.htm
Thank you and your helpers for all of the scanning work.
Morales and I talked on the phone last night about the next step.
We are going to move on the criminal privacy act violation.
http://www.jya.com/snlhit.htm
Ninth Circuit judge Proctor Hug has not responded.
However, Ninth circuit Senior Case Expiditer Gwen Baptiste returned
my complaint.
This, of course, has earned Baptiste a criminal complaint affidavit to
be filed with Hug again.
Morales was very insistant last night about the seriousness about the
judiciary not doing their jobs.
Reason is that improper handling of valid complaints can lead to
frustrated
citizens - some of who might resort to socially unacceptable expressions
of
displeasure towards the judiciary.
Like ARTICLES RELATED TO OKLAHOMA CITY BOMBING seen at
http://www.aci.net/kalliste/
Morales and I believe in using the law to fix the problem - now with
some
help from congress.
A Washington DC DOI whistleblower pointed me to the book,
Out of Order : Arrogance, Corruption and Incompetence on the Bench -
Max Boot; Hardcover
http://www.amazon.com/exec/obidos/ASIN/0465054323/o/ref=qid_900944492/002-2724971-2249850
I read the Forward by Bjork on Friday afternoon.
I sure wish we could avoid unpleasantness I see coming by getting this
matter SETTLED.
Later
bill
Friday 5/1/98 9:48 AM
Certified Return receipt requested
Cathy A Catterson, Clerk
Ninth Circuit Court of Appeals
121 Spear Street
POB 193939
San Francisco, CA 94119-9800
415 744 9800
Dear Clerk Catterson:
Purpose of this letter is to discover the REASON the criminal complaint
addressed to Ninth circuit judge Proctor Hug Jr dated Wednesday 4/1/98 11:02 AM was
returned to me WITHOUT COVER LETTER.
I attach a copy of the envelope the above material was enclosed.
Return address is
CLERK, U.S. COURT OF APPEALS
P.O. BOX 547
SAN FRANCISCO, CA 94101-0547
OFFICIAL BUSINESS
PENALTY FOR PRIVATE USE, 300
Postmark is SAN FRANCISCO, CALIF APR 24 98 U.S. POSTAGE $2.62
METER 504753.
The envelope is hand-addressed and stamped CONFIDENTIAL.
Since no cover letter was enclosed to explain the return of what I believe is
both a valid and lawful criminal complaint affidavit supported by WRITTEN
EVIDENCE, some even in FILED court documents, I feel we must investigate
to discover the REASON.
All of the accused are federal employees or contractor employees.
Possibility exists that return of the enclosed criminal complaint affidavit without
cover letter stating the REASON may indicate violation of Title 18
� 1512. Tampering with a witness, victim, or an informant
[(b)] Whoever knowingly ... corruptly persuades another person, or attempts to do so, or engages in
misleading conduct toward another person, with intent to - ...
(2) cause or induce any person to -
(A) withhold testimony, or withhold a record, document, or other object, from an
official proceeding; ...
(3) hinder, delay, or prevent the communication to a law enforcement officer or judge of the United
States of information relating to the commission or possible commission of a Federal offense ...
shall be fined under this title or imprisoned not more than ten years, or both.
(c) Whoever intentionally harasses another person and thereby hinders, delays, prevents, or dissuades any
person from - ...
(2) reporting to a law enforcement officer or judge of the United States the commission or possible
commission of a Federal offense ... or attempts to do so, shall be fined under this title or imprisoned not
more than one year, or both.
Clerk Catterson, you may be aware that under � 1512
(d) In a prosecution for an offense under this section, it is an affirmative defense, as to which the defendant
has the burden of proof by a preponderance of the evidence, that the conduct consisted solely of lawful
conduct ...
Therefore, I ask that you investigate to discover WHO returned the enclosed criminal complaint affidavit to
me.
And report the REASON the criminal complaint affidavit was returned to me.
I ask that you respond within 30 days.
Sincerely,
William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
Wednesday 4/1/98 11:02 AM
Certified Return receipt requested
Proctor Hug Jr
Chief Judge, Ninth Circuit
50 West Liberty
Street
Reno, NV 89501-1948
(702) 784-5631
784-5166 fax
Dear judge Hug:
Purposes of this letter-affidavit are to file criminal complaint affidavits against
1 judge Marilyn Hall Patel for not properly processing a criminal violation of the Privacy Act,
2 former Ninth Circuit chief judge J Clifford Wallace for not properly processing criminal complaint affidavits for
a felony perjury violation by Sandia National Laboratories lawyer Gregory Cone,
b judge Fern Smith for not properly processing a felony perjury violation by Sandia National Laboratories
lawyer Gregory Cone.
c Albuquerque FBI special agent in charge Thomas Kneir for sending FBI agents Kohl and Schum to my
home in an attempt to intimidate me from exercising my civil rights.
d Margret D. Thomas, Judicial Assistant to the Honorable Marilyn Hall Patel, for not forwarding a valid
criminal complaint affidavit regarding a criminal violation of the Privacy Act to Patel.
Brief history would be valuable for your understanding of this matter.
Sandia has long been involved with the security of America's nuclear arsenal. As they announce on their website: "We are funded primarily by the U.S. Department of Energy to design all the non-nuclear opponents of the nation's nuclear weapons"
http://www.sandia.gov/">http://www.sandia.gov/).
This includes the cryptographic locks used to secure the nukes.
NSA supplies the algorithms and implementation guidelines to Sandia.
http://www.aci.net/kalliste/nukearse.htm
In about 1982 I became project leader of the Missile Secure Cryptographic Unit [MSCU].
The MSCU was funded by the National Security Agency [NSA].
As a result of my about 4 year work with NSA, I was given access to its cryptographic algorithms by one document and many electronic schematics.
I wrote a book
ISBN: 0125475705
Title: Embedded Controller Forth For The 8051 Family
Author: Payne
Cover: Hardback/Cloth
Imprint: Academic Press
Published: September 1990
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
about the software technology we used for the MSCU.
In 1986 I transferred to build the data authenticator for the Department of Energy's Deployable Seismic Verification System [DSVS]for the Comprehensive Test Ban Treaty [CTBT].
NSA liaison for the DSVS/CTBT project offered information to me that NSA regarded former president Reagan as one of the US's foremost traitors for the reason
First, U.S. President Ronald Reagan informed the world on national television that the United States was
reading Libyan communications. This admission was part of a speech justifying the retaliatory bombing of
Libya for its alleged involvement in the La Belle discotheque bombing in Berlin's Schoeneberg district,
where two U.S. soldiers and a Turkish woman were killed, and 200 others injured. Reagan wasn't talking
about American monitoring of Libyan news broadcasts. Rather, his "direct, precise, and undeniable proof"
referred to secret (encrypted) diplomatic communication between Tripoli and the Libyan embassy in East
Berlin.
http://www.aci.net/kalliste/speccoll.htm
which is further explained at http://caq.com/CAQ/caq63/caq63madsen.html
It may be the greatest intelligence scam of the century: For decades, the US has routinely intercepted and
deciphered top secret encrypted messages of 120 countries.
In early 1992 a Sandia labs director decided that he and his subordinates were going to enter the data authentication business.
The director transferred me to break electronic locks for the Federal Bureau of Investigation.
This work was funded by the FBI/Engineering Research Facility [FBI/ERF], Quantico, VA.
I ordered about $200,000 of the FBI/ERF's money buying two copies of electronic locks.
One lock I ordered was the Hirsch Scramblepad electronic lock.
In about 1991 I was following progress of lawsuits in the district of Northern California,
The first two cases to directly address the issue of intermediate copying both originated in California's
Northern District Court. They are Atari v. Nintendo and Sega v. Accolade. In both cases, the district court
found that intermediate copying was NOT fair use.
[The New Use of Fair Use: Accessing Copyrighted Programs Through
Reverse Engineering, Stephen B. Maebius, Journal of the Patent and
Trademark Office Society, June 1993, 75, n6, p433]
Judge Fern Smith presided in both cases.
Reason I was following Atari v Nintendo was that I my Forth book I have two chapters on reverse engineering software.
One chapter contains a computer program which copied a ROM BIOS to diskette.
Smith's decisions made my intermediate copying program illegal.
In a strong opinion she [Fern Smith] wrote in March 1991, when granting Nintendo's request for a
preliminary injunction against Atari, she lambasted Atari's lawyers for thievery.
I was given the job assignment to copy the ROMs of Hirsch's 8051-based Scramblepad electronic lock to reverse engineer them to hopefully allow me to modify the locks for allow surreptitious entry.
I refused to engage in illegal activity for the FBI.
The termination letter seen at http://jya.com/whpfiles.htm states
This is to advise you that effective July 27, 1992, you will be terminated from Sandia National Laboratories.
This action is the results of your flagrant attack on a valued Sandia customer and repeated insensitivity to
security/classification requirement. These acts violate Sandia National Laboratories Code of Conduct,
specifically the Personal Conduct section,, and the Safeguarding Information and Records Section. ...
for my whistleblowing SAND report on the National Security Agency's deficient work and refusing to mark classified on a report I and Danny Drummond wrote on how to fake Wiegand Wire access entry credentials for the FBI.
Both I and my EEOC complaint officer Ray Armenta were never able to determine exactly why I was fired.
However March 22, 1997 I received copies of the enclosed
1 April 15, 1994 letter to EEOC director Charles Burtner from Sandia Diversity Leadership director
Michael G. Robles.
2 July 27, 1997 Termination of Employment memorandum containing my signature.
3 DISCIPLINARY REVIEW COMMITTEE MINUTES, July 16, 1992.
4 DISCIPLINARY REVIEW COMMITTEE MINUTES, July 6, 1989.
5 September 6, 1995 letter from EEOC Investigator Larry J.
Trujillo to Richard Gallegos.
from Sandian Richard Gallegos.
Sandia lawyer Harold Folley previously stated that no documents existed.
The Privacy Act states
(d) Access to Records.--Each agency that maintains a system
of records shall--
(1) upon request by any individual to gain access
to his record or to any information pertaining to him
which is contained in the system, permit him and upon
his request, a person of his own choosing to accompany
him, to review the record and have a copy made of all
or any portion thereof in a form comprehensible to him,
except that the agency may require the individual to
furnish a written statement authorizing discussion of
that individual's record in the accompanying person's
presence;
The Sandia Disciplinary Review Committee NEVER interviewed me to check the veracity of their statements.
The Privacy Act states
(2) permit the individual to request amendment of a record pertaining to
him and--
The statements in the SDRC are incorrect. I followed all Sandia procedures known to me. I did nothing wrong.
I had no opportunity to defend myself. My rights guaranteed under the Constitution, Bill of Rights, Article XIV.
Section 1. All persons born or naturalized in the United States, and
subject to the jurisdiction thereof, are citizens of the United States
and of the State wherein they reside. No State shall make or enforce any
law which shall abridge the privileges or immunities of citizens of the
United States; nor shall any State deprive any person of life, liberty,
or property, without due process of law; nor deny to any person within
its jurisdiction the equal protection of the laws.
have been violated.
C My permission was never asked to release these records to Gallegos.
As you may realize about the Privacy Act
(b) Conditions of Disclosure.--No agency shall disclose any
record which is contained in a system of records by any means
of communication to any person, or to another agency, except
pursuant to a written request by, or with the prior written
consent of, the individual to whom the record pertains ...
The Privacy Act allows imposition of criminal penalties for those like members of the SDRC, Robles, Burtner, and Trujillo who
(i)(1) Criminal Penalties.--Any officer or employee of an
agency, who by virtue of his employment or official position,
has possession of, or access to, agency records which contain
individually identifiable information the disclosure of which
is prohibited by this section or by rules or regulations
established thereunder, and who knowing that disclosure of the
specific material is so prohibited, willfully discloses the
material in any manner to any person or agency not entitled to
receive it, shall be guilty of a misdemeanor and fined not more
than $5,000.
(2) Any officer or employee of any agency who willfully
maintains a system of records without meeting the notice
requirements of subsection (e)(4) of this section shall be
guilty of a misdemeanor and fined not more than $5,000.
I forward criminal complaint affidavits on the above individuals to selected magistrate judge Marilyn Hall Patel.
Patel ignored my complaints.
I return to the subject of breaking electronic locks for the FBI/ERF.
Smith's two decisions were overturned on appeal.
However, both cases have been overruled on appeal. In the
ground-breaking Atari decision, the Federal Circuit held
that intermediate copying was a fair use. The Sega
decision, which was appealed to the Ninth Circuit Court of
Appeals, similarly overruled the district court and held
that intermediate copying may be fair use.
Sandia patents and trademark lawyer Gregory A. Cone in the enclosed affidavit for a ADEA lawsuit I filed in the District of New Mexico stated
AFFIDAVIT OF GREGORY A. CONE
Gregory A. Cone, being duly sworn, deposes and states:
1. I am employed by Sandia Corporation. I am an attorney
admitted to practice law in the State of California and before the
U. S. Patent and Trademark Office and concentrate on legal issues
related to patent and copyright law. In that capacity, I am
familiar with activities at the Sandia National Laboratories
("Sandia") as they related to what is sometimes referred to as
"reverse engineering ." ...
[I]t is the general view at Sandia that disassembly of "object
code" under such circumstances constitutes a "fair use" of
copyrighted software under 17 U.S.C. article 107 and is thus
permissible. Sandia bases its view on Sega Enterprises v.
Accolade, Inc. 977 F.2d 1510, 24 U.S.P. Q. 2d 1561 (9th Cir.
1992), amended, 1993 U. S. App. LEXIS 78, and Atari Games Corp
v. Nintendo of America, Inc, 975 F.2d 832 (Fed. Cir.
1992). ...
FURTHER, Affidavit sayeth naught.
(signed)
GREGORY A. CONE
SUBSCRIBED, SWORN TO and ACKNOWLEDGED before me on this 12th
day of August, 1993, by Gregory A. Cone."
(signed)
Mary A. Resnick
Notary Public
My Commission Expires:
2-7-94
Cone has the two citations reversed. The U. S. Patent Quarterly references the Atari v Nintendo lawsuit 1510 should be corrected to 1015.
Cone issued the above affidavit to District of New Mexico federal court in attempt to show that I had no legal reason to refuse to reverse engineer the Hirsch Scramblepad electronic lock.
I was covered under 10 C.F.R. 708 - DOE CONTRACTOR EMPLOYEE PROTECTION PROGRAM for my refusal to reverse engineer the Hirsch Scramblepad code.
708.1 Purpose,
This part establishes procedures for timely and effective
processing of complaints by employees of contractors performing
work at sites owned or leased by the Department of Energy (DOE),
concerning alleged discriminatory actions taken by their employers
in retaliation for the disclosure of information relative to health
and safety, mismanagement, and other matters as provided in 708.5(a),
for participation in proceeding before Congress, or for the refusal
to engage in illegal or dangerous activities." ...
Cone's affidavit attempts to create the appearance that reverse engineering was legal before July 27, 1992, the date of my firing.
Title 18, Chapter 79, Article 1623 felony perjury.
Article 1623 - False declarations before grand jury or court
(a) Whoever under oath (or in any declaration, certificate,
verification, or statement under penalty of perjury as permitted
under section 1746 of title 28, United States Code) in any
proceeding before or ancillary to any court or grand jury of
the United States knowingly make any false material declaration
or makes or uses any other information, including any book, paper,
document, record, recording, or other material, knowing the same
to contain any false material declaration, shall be fined not more
than $10,000 or imprisoned not more than five years, or both.
Decision of the Atari Games Corp. v. Nintendo of America appeal cited at page 1016 from 24 USPQ 2d was Decided SEPTEMBER 10, 1992.
I was fired JULY 27, 1992 so my work assignment was illegal at the time I refused.
Therefore, Cone committed felony perjury IN WRITING filed with New Mexico District Federal Court.
Chronological review of criminal complaint affidavits would be valuable before I present the current criminal complaint affidavits.
1 Monday March 11, 1996 10:05 I wrote judge Fern Smith a certified return receipt requested letter to ask her to either arrange or personally indict Sandia lawyer Cone for felony perjury.
Smith did not respond.
2 Friday May 31, 1996 08:58 I write the criminal complaint affidavit for the arrest of Sandia lawyer Cone and appoint judge Fern Smith as magistrate.
3 Thursday June 13 on orders of Smith and Albuquerque FBI special agent in charge Thomas Kneir FBI agents Kohl and Schum visited my home at 17:08 to investigate me for sending letters referenced in 1 and 2 to Smith.
4 In response to 3 on Tuesday July 9, 1996 06:52 I filed criminal complaint affidavit against Cone, again, for felony perjury with J. Clifford Wallace, chief judge, Ninth Circuit Court of Appeals.
Smith for
� 4. Misprision of felony
Whoever, having knowledge of the actual commission of a felony cognizable
by a court of the United States, conceals and does not as soon as possible make
known the same to some judge or other person in civil or military authority under the
United States, shall be fined under this title or imprisoned not more than three years,
or both.
for Smith's failure to properly process Cone's felony perjury and
� 241. Conspiracy against rights
If two or more persons conspire to injure, oppress, threaten, or
intimidate any person in any State, Territory, or District in
the free exercise or enjoyment of any right or privilege secured to him
by the Constitution or laws of the United States, or because of his
having so exercised the same; ...
for sending, with Knier, FBI agents Kohl and Schum to my home in an attempt to intimidate me.
Knier for Conspiracy against rights for his complicity with Smith.
5 Monday July 15, 1996 06:23 I write Wallace again inquiring why he has not
responded.
6 August 15, 1996 Thursday Ms. Corina Orozco, Deputy Clerk, Ninth Circuit
Court of Appeals writes me to tell me
In the future, all correspondence should be addressed to the
Clerk of the Court. Do not address any correspondence to
any one specific judge of this court.
7 September 12, 1996 06:20 I inform Orozco by letter that she is obstructing justice. I ask Orozco to desist.
8 July 25, 1996 Senior Case Expeditor [sic], Gwen Baptiste from the Office of the Clerk, United States Court of Appeals for The Ninth Circuit, writes
Re: Complaint of Judicial Misconduct
We have received your complaint of judicial misconduct.
Pursuant to the Rules of the Judicial Council of the Ninth
Circuit Governing Complaints of Judicial Misconduct or
Disability, you complaint is being returned to you for
compliance with the above rules. A copy of these rules is
enclosed. To understand the purpose of the procedure and
who may be complaint about please refer to Rules 1 and 2.
9 Wednesday September 18, 1996 11:05 by certified, return receipt requested mail I write Wallace again told tell him
Lawyer Wallace, I did not intend to file or did I file a
complaint of judicial misconduct.
Lawyer Wallace, I filed a criminal complaint affidavit as I have
a right to as a citizen of the United States of America when the
criminal acts are committed by government personnel, their
contractors, Department of Justice and judicial personnel.
10 Wednesday November 27, 1996 09:18 I wrote certified, return receipt requested letter to inform Wallace
Purpose of this letter is to inform you of consequences of your failure
to perform your duties as required by law as magistrate judge. You are
committing felony violations of law.
and
If I have not complied with all applicable rules, then I ask that you
inform me of any non-compliance so that I can correct my criminal
complaints and re-submit them.
I satisfied the requirement of the Constitution and Rules 3 and 4, and
issued written and sworn complaints that set forth the essential facts
constituting the offenses charged against Smith, Kneir, and Cone. I
also showed facts showing that the offenses were committed by Smith,
Kneir and Cone and these individuals committed them.
So I ask that you do your job and proceed with supervision of the
arrest and prosecution of Smith, Kneir, and Cone for title 18 felony
violations of law.
11 Monday March 24, 1997 17:57 I write a certified - return receipt requested letter to Marilyn Hall Patel, District Judge; California, Northern to inform her she has been selected as magistrate to process the criminal complaint affidavit against Sandia Diversity Director Michael G. Robles for sending the enclosed SDRC report to Burtner of EEOC.
Robles did this without my written permission and without checking the accuracy of the information. The information contained in the SDRC report is false and defaming.
12 Monday April 21, 1997 13:44 I write Patel a certified - return receipt requested letter containing a criminal complaint affidavit against Charles L Burtner, Director, U.S. Equal Employment Opportunity Commission [EEOC] Larry J. Trujillo, Investigator, Phoenix District Office for sending the false and libelous enclosed documents to Richard Gallegos in Albuquerque without my written consent.
13 Thursday May 8, 1997 06:30 I write a certified - return receipt requested to Patel containing
Purpose of this letter is to file a criminal complaint
affidavit against Sandia National Laboratories [Sandia]
Disciplinary Review Committee members and attendees G. H.
Libman, R.A. Polocasz, D. B. Davis, M. E. Courtney,
W. R. Geer, C. A. Searls, J. D. Giachino, R. L. Ewing,
A. M. Torneby, R. B. Craner, C. W. Childers, E. Dunckel,
D. S. Miyoshi, J. J McAuliffe, J. D. Martin, and R. C.
Bonner for violation of the criminal penalties section of
the Privacy Act, 5 USC 552a(i)(2) and Title 18 felony
violations of Civil Rights, Section 241, Conspiracy against
right to citizens.
for their roles in maintaining an illegal system of records.
Sandia refused to acknowledge existence of the enclosed SDRC report and for denying my rights guaranteed under the Constitution.
I was never interviewed by the SDRC committee or had any chance to defend my self against the false and defaming claims of the SDRC.
14 Friday June 13, 1997 12:41 I write a certified, return receipt requested to Wallace containing a criminal complaint affidavit against Margret D. Thomas, Judicial Assistant to the Honorable
Marilyn Hall Patel for violating
� 1512. Tampering with a witness, victim, or an informant ...
(C) prevent the communication by any person to a law enforcement officer
or judge of the United States of information relating to the commission
or possible commission of a Federal offense ...
(3) hinder, delay, or prevent the communication to a law enforcement
officer or judge of the United States of information relating to the
commission or possible commission of a Federal offense ...
shall be fined under this title or imprisoned not more than ten years, or
both.
for writing on May 9, 1997
Dear Mr. Payne:
We are in receipt of your recent letters. Please
be advised that we do not issue warrants on criminal
proceeding absent an indictment, information or complaint
initiated by the United States Attorney. For this reason,
and by copy of this letter, we are referring this matter
to that office. Any future correspondence concerning these
events should be sent to the United States Attorney and not
to judge Patel. Thank you.
Very truly yours,
MARGARET D. THOMAS
Judicial Assistant to the Honorable
Marilyn Hall Patel
cc: Joel Levin
Criminal Section
Assistant United States Attorney
Judge Hug, Rule 3 of the Federal Rules of Criminal Procedure, entitled the Complaint provides:
The complaint is a written statement of the essential facts constituting the offense charged. It shall be
made upon oath before a magistrate.
As you may be aware,
An individual may "make a written complaint on oath before an examining and committing magistrate, and
obtain a warrant of arrest." This is in conformity with the Federal Constitution, and "consonant with the
principles of natural justice and personal liberty found in the common law."
[United States v Kilpatrick (1883, DC NC) 16G 765, 769]
You may also be aware,
A complaint though quite general in terms is valid if it sufficiently apprises the defendant of the nature of
the offense with which he is charged.
[United States v Wood (1927, DC Tex) 26F2d 908, 910, affd
(CA5 Tex) 26 F2d 912.]
And for your edification,
The commission of a crime must be shown by facts positively stated. The oath or affirmation required is of
facts and not opinions or conclusion.
[United States ex rel. King v Gokey (1929, DC NY) 32 F2d
93, 794]
The complaint must be accompanied by an oath.
[Re Rules of Court (1877, CC Ga) 3 Woods 502, F Cas No
2126]
A complaint must be sworn to before a commissioner or other officer empowered to commit persons
charged with offenses against the United States.
[United States v Bierley ( 1971, WD Pa) 331 F Supp 1182]
Such office is now called a magistrate.
A complaint is ordinarily made by an investigating officer or agent, and where private citizens seek
warrants of arrest, the practice recommended by the Judicial Conference of the United
States is to refer the complaint to the United States Attorney. However, further reference to him is
rendered futile where a mandamus proceeding is brought to compel him to prosecute and
he opposes the proceeding.
[Pugach v Klein (1961, SD NY) 193 F Supp 630, citing Manual
for United States Commissioners 5 (1948)]
Any attempt to bring criminal complaints to government authorities would, of course, be futile.
I am a citizen of the United States and, judge Hug, you are the assigned magistrate.
In order to satisfy the requirement of the Constitution and Rules 3 and 4, a written and sworn complaint
should set forth the essential facts constituting the offense charged and also facts showing that the offense
was committed and that the defendant committed it.
And,
As to the requirement that the complaint be made on personal knowledge of the complainant, it is enough
for the issuance of a warrant that a complainant shows it to be on the knowledge of the complainant.
[Giordenello v United States (1958) 357 US 480, 2 L Ed. 2d
1503, 78 S Ct 1245, rev. (Ca5 Tx) 241 F2d 575, 579 in accord
Rice v Ames (1901) 180 US 371, 45 L Ed 577, 21 S ct 406, and
United States v Walker, (1952, CA2 NY) 197 F 2d 287, 289,
cert den 344 US 877, 97 L Ed 679, 73 S Ct 172]
So as to keep contiguous the requirements of the law ad the criminal complaint affidavit, I will include these complaints in this letter to you.
CRIMINAL COMPLAINT AFFIDAVIT: J Clifford Wallace
Essential material facts are:
1 Tuesday July 9, 1996 06:52 Payne files criminal complaint affidavit on Sandia lawyer Cone for felony perjury with J Clifford Wallace, chief judge, Ninth Circuit Court of Appeals and judge Fern Smith for
Misprision of felony for failure to prosecute Cone and Conspiracy against rights for sending, with FBI Albuquerque agent-in-charge Knier, FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne.
2 Repeated attempts by certified return receipt requested mail to urge Wallace to do his job enumerated to 5-10 and 14 above in this letter go unanswered.
Count 1 Wallace made no attempt to bring lawyer Cone to justice despite possessing WRITTEN evidence of criminal activity. Therefore, Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process criminal complaint affidavit.
Count 2 Wallace made no attempt to bring judge Fern Smith to justice despite possessing WRITTEN evidence of misprision of felony for not properly processing the criminal complaint affidavit against lawyer Cone and � 1512. Tampering with a witness, victim, or an informant for sending FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. Therefore , Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit.
Count 3 Wallace made no attempt to bring FBI agent-in-charge to justice for violation of � 1512. Tampering with a witness, victim, or an informant for sending FBI agents Kohl and Schum to Payne's home in an attempt to intimidate Payne. Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit.
Count 4 Wallace made no attempt to bring MARGARET D. THOMAS to justice for violation of � 1512. Tampering with a witness, victim, or an informant ... for writing Thomas' May 9, 1997 to Payne. Wallace is charged with Title 18 � 4. Misprision of felony for Wallace's failure to properly process a criminal complaint affidavit.
VERIFICATION
Under penalty of perjury as provided by law, the undersigned certifies pursuant to 28 USC section
1746 that material factual statements set forth in this criminal complaint are true and correct, except
as to any matters therein stated to be information and belief of such matters the undersigned certifies
as aforesaid that the undersigned verily believes the same to be true.
Date William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
505-292-7037
CRIMINAL COMPLAINT AFFIDAVIT: Marilyn Hall Patel
Essential material facts are:
1 Patel failed to respond to certified return receipt requested criminal complaint affidavits specified in 11 - 13 in this letter.
Count 1 Patel made did not properly process criminal complaint affidavits despite being in possession of documents showing criminal violations of the Privacy Act and violation of civil rights. Therefore, Patel is charged with Title 18 � 4. Misprision of felony for Patel's failure to properly process criminal complaint affidavits.
VERIFICATION
Under penalty of perjury as provided by law, the undersigned certifies pursuant to 28 USC section
1746 that material factual statements set forth in this criminal complaint are true and correct, except
as to any matters therein stated to be information and belief of such matters the undersigned certifies
as aforesaid that the undersigned verily believes the same to be true.
Date William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
505-292-7037
Judge Hug, I have been extremely patient with judges and clerks of the district of Northern California and Ninth Circuit.
Criminal compliant affidavits were filed between March 11, 1996 and June 13, 1997.
Nothing has happened as of April 1, 1998.
I ask that you
1 issue warrants of arrest or
2 inform me why you cannot proceed to do what I request
within 60 calendar days.
Smith's case is particularly egregious.
Smith and Albuquerque FBI agent in charge James K. Weber, who replaced Kneir, sent US Marshals Lester and Lopez to my home on January 24, 1997 in a second attempt to intimidate me.
Anotin Scalia was appointed magistrate to process criminal complaint affidavits against Smith and others for the second intimidation attempt.
Sincerely,
William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
VERIFICATION
Under penalty of perjury as provided by law, the undersigned certifies pursuant to 28 USC section
1746 that material factual statements set forth in this criminal complaint are true and correct, except
as to any matters therein stated to be information and belief of such matters the undersigned certifies
as aforesaid that the undersigned verily believes the same to be true.
Date William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
505-292-7037
Enclosures
Privacy Act criminal violation documents, 11 pages
AFFIDAVIT OF GREGORY A. CONE, 4 pages
May 9, 1997 letter from MARGARET D. THOMAS, 1 page
13
From sunder at brainlink.com Mon Jul 20 08:24:11 1998
From: sunder at brainlink.com (Ray Arachelian)
Date: Mon, 20 Jul 1998 08:24:11 -0700 (PDT)
Subject: `Vulis terminator' full of crap (Re: net.cop revs up again)
In-Reply-To: <199807182302.AAA15438@server.eternity.org>
Message-ID: <35B35FE8.51386FBD@brainlink.com>
John Young wrote:
> Still, shifting back to media, the five of us in Manhattan --
> Perry, Dimitri, Guy, Duncan (Ray's in Brooklyn -- hundreds
> more don't openly affinity) hate each other's guts with infinite
Not quite. I've never lived in Brooklyn. Try again. :)
> Nothing I've seen proves cypherpunks exists: I've seen Ray
> twice and he wasn't the same. I've seen Duncan twice and
> he wasn't the same. Neither recognized me either. We've
> all introduced ourselves to Jim Kallstrom as one another,
> and did the same to several of Kallstrom's stand-ins.
I've seen John Young twice and he was the same. And IMHO, I've
been the same person as far as I know. :) IMHO, JYA has seen me
and can recognize me, so I'd say either he's been smoking/drinking
something (or forgot to do so) when posting this, or it's Mr. oToT,
or Dr. V pretending to be JYA. So yeah, the post I'm replying to
isn't much like JYA.
> Mark this: "Perry Metzger" for certain is non-existent, it's only
> a mail drop, a chalk mark, a can by the road, a highly paid
> fictional security scam: Pay or plonk. Cooped cops and
> holed-up criminals do, up the kazoo.
Total Bullshit. I've seen Perry more than thrice, once at a speech
he gave for the Libertarian Party where Duncan also was, and also
at PC Expo a few years ago, and at a few NYC Cpunx meets. Perry
does exist.
> I say for a fact the crypto/cypherpunk/cops/spooks game's
> one bird doing a solo dance. Who that bird is, works for,
> remains to be reported reliably: an impossibility by definition.
Nobody gives a rats ass who the TLA spook 'bot, tentacle, or other
happens to be. We all know and expect that this list is monitored
heavily by many TLA's including the NSA, FBI, and IRS. There were
several IRS subscribtions to my filtered list a while back. I guess
they couldn't deal with all the flaming and decided to get info on
the tax evaders without the flames... I suppose either the NSA and
FBI know enough to have bought AOL or netcom accounts, or read the
list unfiletered.
IMHO, this is a well known fact, and I welcome them on this list.
Let'em sniff all they want, there's very little here that goes on
that isn't considered public knowledge anyway. Heck, who knows after
reading much of Tim's posts, maybe their points of view will be
swayed and maybe they'll figgure it out for themselves. Whatever.
> Dimitri was not terminated, can't be, he never was, like the rest
> of us highly classified phantasms. Adam Back got the story
> right, he's exchanging messages with a bot mirroring his inner
> evil, call that Tim, call it Dimitri, he'll call back as the One True
> Terminator you don't want to meet, ever, but will.
IMHO, I've never met Vulis, so I can't say for sure. It would interesting
if Tim/Dimitry were the same, but I doubt it. For that to happen, Tim
would need to know a lot about NYC and be here a lot. Although it would
be possible for Tim (as you propose) to do "Dimitry", from my experiences
of Dimitry, that's highly unlikely. Dimitry did quite a bit of social
engineering of Earthweb to get info on me. He also tried several
attempts at calling me at home and getting info. There was also an
NYC meeting where someone very suspicious (i.e. almost demented)
showed up on his behalf, and mentioned lots of stuff about Xenix and
massacres....
So IMHO, "Vulis" had to be in NYC. A while back a few folks said they
met him in person. I'll let them comment on his description.
I will also add that I heavily complained to dm.com's upstream provider
and didn't get too far. It's possible that by the time Guy had complined,
that there were so many complaints against Vulis that psynet decided
to yank the coor. Or, could be that Guy=Vulis. :) Whatever. Either
way I don't give a rats ass.
I've never met Tim, but have spoken with him since the early days of
the Cypherpunks list, back when Vulis didn't exist. While I'm not
saying that Tim isn't a 'nym, I am saying that he's got far more
reputation capital than Vulis, or Guy. Based on this, I do not believe
that Tim=Vulis. Again, that's my belief, and have no evidence for or
against.
--
=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run |\/|\/
../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were.... |.....
======================= http://www.sundernet.com ==========================
From jlowry at bbn.com Mon Jul 20 08:51:20 1998
From: jlowry at bbn.com (John Lowry)
Date: Mon, 20 Jul 1998 08:51:20 -0700 (PDT)
Subject: John Gilmore and the Great Internet Snake Drive
In-Reply-To:
Message-ID: <3.0.3.32.19980720114859.009997f0@dave.bbn.com>
Oh please ...
As you point out, physics is not optional. This is predictable and was
predicted. Yawn.
I predict that 3DES will fall too - actual time it takes is left to the
student.
More interesting, how about a supposition that DNA computers will be able
to factor
interesting numbers within 5 years ? Does that make certain other
algorithms into snake-oil ?
At the heart of this is the idea that "strong" cryptography is a fixed and
finite
set over time and that a change in that set will result in a change in the
policy restricting export. It doesn't necessarily follow. Lobbying is
necessary.
Perhaps all that happens is that DES now joins the crowd of exportable
algorithms :-)
One lesson I plan to observe - don't encrypt known plaintext unless you
have to !
John Lowry
At 04:20 PM 7/17/98 -0400, Robert Hettinga wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>Congrats to Mr. Gilmore, EFF, et. al. for a very impressive DES crack.
>
>It seems that Gilmore and Moore's Law have just turned the
>once-respected DES into cryptographic snake-oil. He keeps hurting
>snakes like that, he's gonna get himself canonized. ;-).
>
>
>Seriously. Many thanks to Mr. Gilmore for proving, once again, that
>lobbying is pointless, and that physics is not optional.
>
>Outstanding. Marvellous.
>
>Cheers,
>Bob Hettinga
>
>-----BEGIN PGP SIGNATURE-----
>Version: PGP for Personal Privacy 5.5.5
>
>iQEVAwUBNa+x3cUCGwxmWcHhAQFZAQgArKCN418IA1MXwfpXeJ4IF93j9f3G3skH
>OotWP5dcoHOaUvbgTcOWP9YBAj77jzaazrtfK3wJD634ehLbf5N+gzmBHQVnXtXR
>Vf/JMe24EyI3xCqvRptSTtrik8d+oi3Wy7ZZEwBzLPd0A+XE4LdsClgE2C4ns3ZK
>Lq12mUmRQaZvc4++oakIAOT+Llx9TnnUHYqVMSjDT8QJoJ7vEFBEqcOea1Qzk1u9
>leZlyrLs1ivbhcthXNBOyhN6RTwJgRyF3nFxpl/uY0tEvNvgFl+/aZZTJkwvvhmm
>0MTSfzFfy9I+7BT5FD1iFC+i8JAVd4CDeI+9I6c6/LCAppfrKy5FBg==
>=Zeyp
>-----END PGP SIGNATURE-----
>-----------------
>Robert A. Hettinga
>Philodox Financial Technology Evangelism
>44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>The Philodox Symposium on Digital Bearer Transaction Settlement
> July 23-24, 1998:
>
>For help on using this list (especially unsubscribing), send a message to
>"dcsb-request at ai.mit.edu" with one line of text: "help".
>
>
From CTIA_Daily_News at um2.unitymail.com Mon Jul 20 09:53:20 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Mon, 20 Jul 1998 09:53:20 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 20, 1998
Message-ID: <199807201639.LAA14590@mailstrom.revnet.com>
=============================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.� Please click on the icon /
attachment
for the most important news in wireless
communications today.
WIRELESS IT '98, The Next Generation in
Personal
Computing & Communications October
12-14,
Las Vegas, Nevada Call (202) 785-0081 for more
information!
=============================================
From rdl at mit.edu Mon Jul 20 10:32:50 1998
From: rdl at mit.edu (Ryan Lackey)
Date: Mon, 20 Jul 1998 10:32:50 -0700 (PDT)
Subject: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...)
Message-ID: <199807201732.NAA25239@denmark-vesey.MIT.EDU>
[recipients list trimmed somewhat]
I think it is always reasonable to be cautious, but there is a point where
overcautiousness is counterproductive. Believing 3DES weak because DES is
so strong that it has thusfar withstood more analysis than any other
cipher and only falls to brute force is, I believe, one of these cases
of excessive paranoia.
Assumptions:
* Brute forcing DES with a 56-bit key took $50k in materials in today's money.
* 3DES with 3 keys is strong enough to resist everything weaker than
a 112-bit brute force attack (due to the meet-in-the-middle attack)
* Physics, as you say, is not optional.
* The notation 2**56 is two raised to the fifty sixth power.
At first approximation, doing the same thing to a 112bit 3DES problem would
require 2**56 more chips. and thus 2**56 more money, to do in the same amount
of time. My copy of gnu bc tells me this is "3602879701896396800000", or
three and a half sextillion dollars. This is more than a billion times the
current world industrial output.
This is somewhat of a naive calculation, though. Those chips were not
ideal. There's a general rule about chips doubling in transistor count (and
for this application, performance) every 1.8 years. Assuming this
rate of improvement, and let's say a random factor of a million for better
design, and a fabrication improvement rate (due to buying all your
raw-materials suppliers, them becoming more efficient, etc.) which together
with Moore's law doubles performance every year (mostly for ease of
calculation).
Let's assume the target is to be able to complete the calculation within
ten centuries. It is better to wait until this is possible before
starting than to start and run a calculation for a billion years waiting for
it to catch up, as few things are of value that far in the future, and also
there is the time value of money to worry about.
Let's also place a budget cap of $20t US today's money on the problem at
the start of calculation.
(2**56)*50000/1000000 == 3602879701896396 dollars today
1000*365/3 == 121660 gilmore-kocher periods in a 1000 years
3602879701896396/121660 == 2961433258175568 dollars today to crack in 1000
years
log(2,2961433258175568) == slightly more than 51 years
So, this *highly* optimistic calculation says that even if we are willing to
assume an *incredible* performance speedup due to better technology and
vertical integration that continues unabated (and exceeds reality), *and*
we're willing to wait 1000 years for our answer, *and* are willing to spend
$20t to build the machine, it is at least 51 years before you should start.
This also doesn't take into account the incredible power consumption of
such a machine -- about half a million times more than the gilmore-kocher
machine. I assume their chips drew 5 watts each -- it would need 3 GW, which
is a major nuclear facility with multiple reactors. Cost of power is *not*
going down, so it's about $250 billion dollars a year in electricity, for
1000 years.
This doesn't take into account the potential for a "technology refresh"
throughout the 1000 year calculation period. It's a long enough period of
time to make this significant.
I'd say the odds of an analytic attack against DES or a fundamental
breakthrough
in quantum computing or something in 50 years, let alone 1050 years, are
far higher than the chances anyone would go through this much trouble.
While I agree that data intended to remain secure should be secured with
something other than 3DES, it is for the potential of a breakthrough in
algorithms, not speedup in brute force techniques, which is worrisome. Brute
force techniques are basically public knowledge. A secret analytic
breakthrough, however, could be completely black. The solution some people
have come up with is multiple ciphers used in such a way as to be as strong
as the strongest link. The increase in keysize is not a major issue for
something intended to last this long.
If you can get a cipher which has as its weakest point a brute force attack,
you have won. If you can get a *system* which has as its weakest point a brute
force attack on a 112 bit key, you've probably killed everyone in the world
already several times over in a preemptive strike, especially everyone who
ever had any knowledge of the keys or data. Humint, monitoring hardware, etc.
are
far more appealing than a brute force attack against any real system.
--
Ryan Lackey
rdl at mit.edu
http://sof.mit.edu/rdl/
From rah at shipwright.com Mon Jul 20 10:51:22 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Mon, 20 Jul 1998 10:51:22 -0700 (PDT)
Subject: John Gilmore and the Great Internet Snake Drive
In-Reply-To:
Message-ID:
At 11:48 AM -0400 on 7/20/98, John Lowry wrote:
> Oh please ...
Okay, I'll say it again: Yes, Virginia, DES is now officially Snake Oil.
As much snake oil as if someone tried to sell a Ceasar cipher -- a
perfectly good prechristian military messaging technology, mind you :-) --
for use in modern internet financial cryptography.
So, Virginia, DES is DED. Game over. Kaput.
Get used to it.
> As you point out, physics is not optional. This is predictable and was
> predicted. Yawn.
Actually my point. It may have been predicted, but it has now happend. DES
is now Snake Oil.
BTW, try getting your gingivitis fixed before you go yawning in someone's
face. ;-).
> I predict that 3DES will fall too - actual time it takes is left to the
> student.
I see. In *your* lifetime? Splendid. I'd love to see *that* happen. And, of
course, *you're* going to do it, Mr. Lowry? Yawn, yourself.
> More interesting, how about a supposition that DNA computers will be able
> to factor
> interesting numbers within 5 years ?
Probably not in your lifetime, bunky, no matter how many 5-gallon buckets
of slime you can grow. Burden of proof's on you, here. My claim that DES is
snakeoil is based on proven fact. Your claim that DNA can economically
factor numbers fast has yet to be demonstrated, and I challenge you to
prove otherwise with a straight face.
> Does that make certain other
> algorithms into snake-oil ?
Anything that is broken, like DES now is, and is still claimed by others to
be safe, and sold by them as such, is, in my book, snake-oil.
> At the heart of this is the idea that "strong" cryptography is a fixed and
> finite
> set over time and that a change in that set will result in a change in the
> policy restricting export. It doesn't necessarily follow.
No, it doesn't follow, because that's not what I said. I said that because
it is now demonstrably trivial to break DES messages, especially DES
financial messages (the kind with *money* in them, for those in Loma
Linda), DES is now Snake Oil. Just like the Ceasar cipher.
> Lobbying is
> necessary.
Lobbying is only necessary for those who want to use force to maintain
market share -- geographic, or otherwise. :-). Lobbying itself is the
profession of con men who use the threat of government force to extort
money from people who work, and give it to those who don't, in particular
said con men.
The only way to avoid government's propensity to dynasticize :-) is to
innovate faster than they can regulate. In Loma Linda, they call it
"progress", bunky. And, crypto has just progressed to such a point that
formerly presumed peekware like DES has just been proven to be such, and is
now, quite fairly, snake oil. Moore's law is not optional, At least in
DES's case.
Lobbying is not necessary if you change the world faster than they can
control it. Gilmore, et. al., just proved that.
Lobbying to change the "legal" keysize is a waste of time. Physics causes
economics, which causes law, which causes "policy". It's never the other
way around, regardless of the beltway's daydreams to the contrary.
> Perhaps all that happens is that DES now joins the crowd of exportable
> algorithms :-)
I would claim that, your disengenous ":-)" aside (yeah, I know, pot,
kettle, black), that any "exportable" algorithm is in fact snake oil. And
Gilmore just proved it.
> One lesson I plan to observe - don't encrypt known plaintext unless you
> have to !
Wha? Security through obscurity? How exactly can you encrypt a message you
don't know the contents of?
Oh. I get it. Statist humor. (Yeah, I know about blinding, I just hate
sophistry...)
Feh.
Cheers,
Bob Hettinga
-----------------
Robert A. Hettinga
Philodox Financial Technology Evangelism
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The Philodox Symposium on Digital Bearer Transaction Settlement
July 23-24, 1998:
From rdl at mit.edu Mon Jul 20 11:16:12 1998
From: rdl at mit.edu (Ryan Lackey)
Date: Mon, 20 Jul 1998 11:16:12 -0700 (PDT)
Subject: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...)
In-Reply-To: <199807201732.NAA25239@denmark-vesey.MIT.EDU>
Message-ID: <199807201816.OAA25266@denmark-vesey.MIT.EDU>
Sigh. One should not do math before coffee.
Let's try this again:
If you assume 2^56 requires $50k and 3 days, and are willing to take
2^8 times longer and spend 2^16 times more, and want to break a 2^112 bit
key, and assume technology doubles in performance for this particular
operation per year, then the calculation is easy to do.
112 - 56 - 16 - 8 = 32
If you wait 32 years, and have *incredible* performance gains in excess of
what we have now (but which I think could be possible for worst-case crypto
breaking chips, since they have relatively little in the way of communication,
and have small units), and have a budget of 16 times what the DES cracker
had (about $3b, which is totally reasonable), and are willing to wait about
2 years, you can brute force 3DES in the year 2030.
There is still very little that is relevant in 32 years, and there is still
a far better chance that some analytic attack will be discovered, a fundamental
breakthrough in computation will happen, etc. before that time.
112 bits is below the "physical impossibility" point as far as key size goes
(I like the calculation based on free energy in the universe in Applied
Crypto).
Chapter 7 in Applied Crypto is probably a far better analysis than mine,
especially as it includes the caveat emptor section.
Perhaps it is correct, "It's time to bring on those 128, 192, and 256-bit
keys",
at least for some systems, although I'd definitely prefer multiple ciphers
separately keyed with long keys than n-DES for such long-term use.
Calculating future key lengths really *is* a losing game.
--
Ryan Lackey
rdl at mit.edu
http://sof.mit.edu/rdl/
From mkyleen at sturgis.com Mon Jul 20 11:37:30 1998
From: mkyleen at sturgis.com (Mkyleen)
Date: Mon, 20 Jul 1998 11:37:30 -0700 (PDT)
Subject: Persuasive speech topics
Message-ID: <35B38D70.2590@sturgis.com>
I can't think of anything fun to do a persuasive speech on, can you?
From BUFFU at aol.com Mon Jul 20 11:39:42 1998
From: BUFFU at aol.com (BUFFU at aol.com)
Date: Mon, 20 Jul 1998 11:39:42 -0700 (PDT)
Subject: Nomination of Lyndon Larouche to the UNITED NATIONS OF THE FRINGE
Message-ID: <267b60e9.35b38e90@aol.com>
Hey Punks,
As a United Nations OF the Cyber Fringe Member, I am asking for
your input on giving Lyndon a nomination. So far his war crimes only include
insanity and stupidity. Being as Presidential elections will be coming in the
next few years, and I can't vote for my granpa again because he died. And
Captain Kangaroo and Mr. Green Jeans arn't interested in being endorsed by
anyone, that leaves us without a candidate. If we vote in Lyndon and his
crew, we would have gophers during our UN meetings. I'm trying to get a web
page for the UNOCF but until then I'm winging it. Consult all your Homies and
let me know.
Sincerely,
Beth
From new7898 at yahoo.com Mon Jul 20 11:59:44 1998
From: new7898 at yahoo.com (new7898 at yahoo.com)
Date: Mon, 20 Jul 1998 11:59:44 -0700 (PDT)
Subject: NEED MONEY NOW
Message-ID: <74019590_23312217>
THIS IS THE ONE!!!
NEED MONEY NOW??
Turn a one time $39 investment into
a steady stream of $20 bills paid
directly to you, each and every
Friday for the rest of your life!!
(START NOW AND HAVE A CHECK IN YOUR
HAND NEXT FRIDAY)
NO SELLING INVOLVED!
No stocking merchandise or inventory
of any kind! Could you advertise a
TOLL FREE number? That's all there is
to it. Our system does everything else
for you! SO SIMPLE A CHILD COULD DO IT!
Why not call and see for yourself?!
(Be sure and have a pen and paper handy)
$$1-800-368-3561$$
(24 hours)
USE ID # 18266
From jya at pipeline.com Mon Jul 20 12:15:29 1998
From: jya at pipeline.com (John Young)
Date: Mon, 20 Jul 1998 12:15:29 -0700 (PDT)
Subject: More on WIPO Copyright Amendment
Message-ID: <199807201915.PAA03490@camel14.mindspring.com>
To amplify the earlier NY Times report on the July 17
passage of the Krug amendment to the WIPO copyright act,
which once banned encryption analysis, Reuters today says:
The committee also approved an amendment allowing
cryptography researchers to crack anti-piracy safeguards
as part of their work. And an amendment was added
allowing Internet users to disable such measures to
prevent the collection of personal information.
The Reuters report:
http://jya.com/wipo-hit2.htm
-----
Thanks to DM.
From mgraffam at mhv.net Mon Jul 20 12:17:07 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Mon, 20 Jul 1998 12:17:07 -0700 (PDT)
Subject: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...)
In-Reply-To: <199807201732.NAA25239@denmark-vesey.MIT.EDU>
Message-ID:
On Mon, 20 Jul 1998, Ryan Lackey wrote:
> So, this *highly* optimistic calculation says that even if we are willing to
> assume an *incredible* performance speedup due to better technology and
> vertical integration that continues unabated (and exceeds reality), *and*
> we're willing to wait 1000 years for our answer, *and* are willing to spend
> $20t to build the machine, it is at least 51 years before you should start.
Humrph .. your calculations came in just before I was gonna send mine out
.. bc is a nice utility, ain't it? :)
> While I agree that data intended to remain secure should be secured with
> something other than 3DES, it is for the potential of a breakthrough in
> algorithms, not speedup in brute force techniques, which is worrisome.
Well, I disagree here.. unless the "something other than 3DES" is an OTP,
of course. I don't see anything that looks better than DES, minus the
key-size issue. DES has had the fiercest analysis done on it for the
longest amount of time. If we are worried about a breakthrough in
the algorithmics, then it seems to me we ought to use DES based on the
fact that it has been analyzed longer, and has proved itself strong.
We've covered the new vs. old algorithm debate here recently, so I'll
shut up.. suffice it to say, I fall in line with the 'old' school.
I don't find it useful to worry about possible new general cryptanalytic
breakthroughs: it is basically impossible to defend against them. In
the face of an attacker who has infinite secret cryptanalytic ability
(within the bounds of what can be done brute-force wise) only an OTP
would be useful, but we are talking long-term archival here.. I don't
see how an OTP helps us. If we have a secure vault to lock the pads up
in until either a) the heat death of the universe, or b) the Big Crunch
then we may as well just put the plaintext in there and be done with
it. As I see it, OTP are only workable in communications, and then
obviously in a limited manner.
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
I think that we should be men first, and subjects afterward. It is not
desirable to cultivate a respect for the law, so much as for the right.
Henry David Thoreau "Civil Disobedience"
From KDAGUIO at aba.com Mon Jul 20 12:40:58 1998
From: KDAGUIO at aba.com (Kawika Daguio)
Date: Mon, 20 Jul 1998 12:40:58 -0700 (PDT)
Subject: 3DES weak because DES falls to brute-force? (was Re: JohnGilmore...)
Message-ID:
If you listen to those in the exploitation community you might hear that 3DES provides less comparable security relative to DES than you know or have stated. Either way, however, it is more than sufficiently strong to secure any kind of traffic one might contemplate sending over a network. 3DES should work for a while, but I would prefer something more elegant and efficient.
We have pushed 3DES forward as an interim standard, and are moving 3DES out into the world and the AES (128 and 256) forward to provide us another long-term solution. We told NIST that we hoped the AES could serve as a 20-30 year solution and are pushing algorithm agnostic standards to avoid similar obstacles to a transition in the far off future.
One of the reasons we so aggressively pursued the negotiations over export control with the Administration and have pushed the AES, and our PKI is the collateral damage from the export control legislative debate. When the AES is finalized it will be followed closely by an ANSI X9 standard. Once these standards and infrastructure are established, the concerns about brute force attacks should be largely behind us.
kawika
daguio
my views only
>>> Ryan Lackey 07/20/98 02:16PM >>>
Sigh. One should not do math before coffee.
Let's try this again:
If you assume 2^56 requires $50k and 3 days, and are willing to take
2^8 times longer and spend 2^16 times more, and want to break a 2^112 bit
key, and assume technology doubles in performance for this particular
operation per year, then the calculation is easy to do.
112 - 56 - 16 - 8 = 32
If you wait 32 years, and have *incredible* performance gains in excess of
what we have now (but which I think could be possible for worst-case crypto
breaking chips, since they have relatively little in the way of communication,
and have small units), and have a budget of 16 times what the DES cracker
had (about $3b, which is totally reasonable), and are willing to wait about
2 years, you can brute force 3DES in the year 2030.
There is still very little that is relevant in 32 years, and there is still
a far better chance that some analytic attack will be discovered, a fundamental
breakthrough in computation will happen, etc. before that time.
112 bits is below the "physical impossibility" point as far as key size goes
(I like the calculation based on free energy in the universe in Applied
Crypto).
Chapter 7 in Applied Crypto is probably a far better analysis than mine,
especially as it includes the caveat emptor section.
Perhaps it is correct, "It's time to bring on those 128, 192, and 256-bit
keys",
at least for some systems, although I'd definitely prefer multiple ciphers
separately keyed with long keys than n-DES for such long-term use.
Calculating future key lengths really *is* a losing game.
--
Ryan Lackey
rdl at mit.edu
http://sof.mit.edu/rdl/
From waters at ultimateprivacy.com Mon Jul 20 13:24:01 1998
From: waters at ultimateprivacy.com (Bryan Waters)
Date: Mon, 20 Jul 1998 13:24:01 -0700 (PDT)
Subject: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...)
In-Reply-To: <199807201732.NAA25239@denmark-vesey.MIT.EDU>
Message-ID: <199807202023.QAA08696@omniwork.com>
>I don't find it useful to worry about possible new general cryptanalytic
>breakthroughs: it is basically impossible to defend against them. In
>the face of an attacker who has infinite secret cryptanalytic ability
>(within the bounds of what can be done brute-force wise) only an OTP
>would be useful, but we are talking long-term archival here.. I don't
>see how an OTP helps us. If we have a secure vault to lock the pads up
>in until either a) the heat death of the universe, or b) the Big Crunch
>then we may as well just put the plaintext in there and be done with
>it. As I see it, OTP are only workable in communications, and then
>obviously in a limited manner.
>
Are we talking long-term archival? I'm more concerned about someone
grabbing communications in transit, storing them and throwing chips and
mathematicians at it.
If the government comes with the search warrant, then I should have already
deleted the file if I didn't want it available. If someone wants to face
security guards or a gun by my bedside they can steal the archive. It's
the same rules as always. (except the theif must also have the math and
chips).
In the case of archive you have the protection of physical security and in
most cases the knowledge of when it has been breached -- It's a lot
friendlier than in communications where who knows what is going on between
the sender and recipient.
OTP is a pain, and is not effective for archival -- but it is the only way
I've seen to protect communications in excess of ~30 years.
Bryan Waters http://www.ultimateprivacy.com
Director of Marketing Voice: 512-305-0505 Fax: 512-305-0506
Ultimate Privacy Corporation 3925 W Braker Ln #305, Austin, TX, 78759
From corvuscorvax at hotmail.com Mon Jul 20 13:39:45 1998
From: corvuscorvax at hotmail.com (Corvus Corvax)
Date: Mon, 20 Jul 1998 13:39:45 -0700 (PDT)
Subject: Request To Be Phlamed
Message-ID: <19980720203908.28197.qmail@hotmail.com>
> What some of them seem to want would appear to be _me_ (and you).
Only because you'd look so absolutely luscious in leather, darling.
Kiss kiss,
Diva! von Future Prime
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
From Craz8Grl at aol.com Mon Jul 20 16:21:14 1998
From: Craz8Grl at aol.com (Craz8Grl at aol.com)
Date: Mon, 20 Jul 1998 16:21:14 -0700 (PDT)
Subject: please respond
Message-ID:
Hello:
My name is Enisa, I'm 13 years old. I write an online e-zine that for teens.
We have over 150+ members. We just started a few days ago. We are looking for
sponsors to sponsor our contests. These are some of the things we are able to
do for you...
* A banner on our page
* Repeated mentioning in our newsletters
* And anything else that you would like
These are the things I would like in return:
*2-3 prizes for our contest
And nothing more.
If you are interested please e-mail me
so we can discuss this further.
Please respond.
Thank you for your time.
Sincerely,
Enisa
http://members.aol.com/Craz8Grl/
From LrdWill at aol.com Mon Jul 20 16:27:53 1998
From: LrdWill at aol.com (LrdWill at aol.com)
Date: Mon, 20 Jul 1998 16:27:53 -0700 (PDT)
Subject: you got that PGP program?
Message-ID: <99c9c87.35b3d24d@aol.com>
you got it?
From lreed at west.cscwc.pima.edu Mon Jul 20 16:49:22 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 20 Jul 1998 16:49:22 -0700 (PDT)
Subject: If You Think I'm Crazy Now... - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C977E.807CD340.3@west.cscwc.pima.edu>
If ou Think I'm Crazy Now
ou Should Have Seen Me When
I Was A Kid
~Geezinslaw Brothers
SPACE ALIENS HIDE M DRUGS!!!
_____________________________
From: MX%"chrisharwig at hetnet.nl" "kryz"
To: MX%"bleed at west.cscwc.pima.edu"
Subj: Re: Leftist Nutly News - SPACE ALIENS HIDE M DRUGS!!!
I think you're a bit out of line. Wish you well and all of that.
Strength that is.
----------
A "bit" out of line?
I'm trying to be *way* out of line, but I guess I'm a failure
at that, too .
Children of the 60's can all remember where they were when they
heard about JFK being shot. Many of them can remember where they
were when they bought their first pound of pot, and most of them
can remember where they were when they sold their first pound of
pot (particularly if they got busted in the process.)
I bought my first pound of pot in a public park in Edmonton,
Alberta. I needed to sell it to get the money to pay a fine for
drug possession, and I couldn't, in good conscience, pay it with
money that I'd earned by working for a living at my regular job.
Let me explain...
It was the summer of 1969...
[Debitor's Bad Note: If 90% of the events in the Author's life
seem to have somehow occurred in 1969, this might be the result
of the massive electroshock and hypnosis treatments HeOrSheOrIt
underwent under the...care...of an MKULTA physician in Saskatoon,
Saskatchewan, Abram Hoffer, who undoubtedly appears as only a
minor, peripheral figure, if at all, in most literature on the
subject...likely as a result of great care being taken by shadowy
background figures to keep him out of the limelight, ala Kim
Philby, due to the fact that the record of his 'personal history'
seems to be unable to withstand close scrutiny once one begins to
investigate the time periods preceding the end of WWII.
Hhhmmmm...]
Quit interrupting, Dogamnnit!
Anyway, I was working in orkton, Saskatchewan and living with a
sixteen year old high school student with no parents, no job, no
source of income, who always paid his share of the rent, and always
had better clothes and more spending money than me. [It turned out
that he had two motto's in life. 1)Everything that isn't nailed down,
is mine. 2)Anything I can pry loose, isn't nailed down...]
The apartment we shared tended to be a hang-out for a variety of
local high-school kids, who would invariably bring by any interesting
characters passing through town on the couch circuit, who needed a
place to crash for the night. One of these characters was Frank
Skanks, an older fellow.
The drug scene in orkton was basically a Virtual Drug Scene, where
most people knew somebody who knew somebody who had once copped a
bag of weed on a trip with their parents to Vancouver, and shared
it with a few close friends on their return.
Upon Franks arrival, however, things picked up, and a few of the
local kids suddenly seemed to have access to a fair amount of smoking
dope. There even seemed to be some acid floating around.
I returned home one evening to find a bottle of wine in the fridge,
and had several large glasses before 'the gang' returned from a trip
to the Dairy Queen, whereupon they became dismayed to find that I
had consumed such a large portion of a concoction they had prepared
in accordance with Ken Kesey's directions in 'The Electric Kool-Aid
Acid Test.'
That seemed to explain the fact that I was able to pick up Messages
>From Mars through the fillings in my teeth, which I had always had
trouble doing before...
I found it to be a fairly pleasant experience, even though I did
feel a slight bit of guilt, knowing that I had inadvertantly setback
the plans of a dozen or so people who had hoped to get high with the
portion of Dr. Skank's Magic Elixir which I had unwittingly consumed.
I didn't mind being 'dosed,' since I had already figured on trying
LSD on the proverbial SomeDay. When my enlightened reverie was
interrupted, however, by the sight of Frank Skanks teaching a group
of thirteen-to-fifteen year olds how to tie-off and shoot up, my
pleasant experience took on a rather sour note.
When my efforts to put a stop to the proceedings failed, largely
due to the rush of young children knocking me down in order to get
a good place in the line that was forming, waiting for Frank to find
one of his few remaining good veins, I decided that, in the interests
of saving at least a single child, I would call on Dudley DoRight
for help.
I walked to the local RCMP station, dodging the dinosaurs and
hobbits which seemed to be everywhere, in a multitude of colors,
and proceeded to inquire as to whether they might be interested
in helping to postpone a group of young teenagers' entry into the
world of needles and spoons and basement rooms until a later age,
when they might be in a position to make better judgements in that
regard.
After throwing me in a jail cell, and grabbing a wide variety of
heavy weaponry, a quickly assembled RCMP assault force rushed out
the door, to 'save the children.' I had the uneasy feeling that they
were intent on saving them even if it meant killing them.
I didn't get any sleep that night, undoubtedly as a result of the
fact that I was 'tripping for twelve,' and I could hear a lot of
muffled, semi-legible conversations taking place on the far side
of the walls, or door. They didn't seem to make sense, and I assumed
that it was because of my temporary residence of planets of another
galaxy.
The clearest verbal communication I heard, as the door to the jail
cells was opened, was, "Wrong door!"
I don't know who spoke those words, but I imagine that it was one
of the Mounties in the company of Frank Skanks, who was staring at
me with extremely wide eyes, and with excrement obviously filling his
shorts in less time that it take to utter, "Can you say *cop*! Sure
you can..."
I was totally dumbfounded, as well as still extremely wasted, but
I still managed to smile, and say, "Nice suit, Frank." before the
door closed and the conference which had apparently just broken up
was quickly reconvened.
Being young and naieve, I thought that this was the end of the
story, an interesting story I would someday be able to tell my
grandchildren, after DNA testing showed my denials of paternity to
be outright lies.
What I didn't understand, at the time, was that my surprise at
finding that the Great Canadian Hero, Dudley DoRight, was somehow
involved in something which seemed to run contrary to the Official
Movie Mythology, would soon be supplanted by total incredulity that
the spot of shit I had observed on the end of Dudley's Dick would
soon prove to be a massive amount of shit covering the RCMP members'
members all the way to their pelvis, and dripping down off thier
balls into their rubber boots.
And the shit would smell an awful lot like mine...
The Official Story was that, after performing a search of my
apartment, and finding nothing, the RCMP returned with members
of the force who were more 'experienced' in this area, who, lo
and behold, found a single joint in a suit-jacket pocket.
I was charged with possession of marijuana.
Tiny, a member of the Apollos Motorcycle Club in Regina, who Frank
had travelled into town with, had apparently told Frank to 'fuck off'
when asked to introduce him to individuals throughout the province,
with Frank paying travelling expenses and providing spending money
during the trips. Tiny was willing to testify in court as to Franks
apparent instigation of illegal activities on behalf of some entity
who seemed to be funding him.
A few days before the trial, we were pulled over by the Mounties,
who took Tiny into their police car to have a chat with him. Upon
his return, Tiny told me that it was suggested to him that if I got
off on the charge, that they would have to find someone else to take
the fall, and that he was next in line. Tiny assured me that he would
still be there for the trial.
Bye, Tiny...
In order to convict me of possession of a single joint, the RCMP
sent two Mounties to my hometown for a week or so to investigate me,
as well as contacting everyone I have known since birth.
Although my lawyer had assured me that the case would undoubtedly
be thrown out of court as a result of the RCMP's tacit admission
that a wide variety of individuals had been seen coming and going
from my apartment between the first and second searches (while I
was still in jail), I was convicted, receiving a criminal record
and a $ 300.00 fine (at a time when other people were getting $ 50.00
fines and conditional discharges--no criminal record).
Being a well-programmed True Believer in Truth, Justice, The Flag,
The National Anthem, Dudley DoRight, Mom's Apple Pie, ad infinituum,
it took me quite a while to fully understand that I had been screwed,
blued and tattoo'd for the crime of...seeing something that I wasn't
meant to see.
Those who have found themselves subjected to my insane, inane,
wild-eyed rants on the CypherPunks Disturbed Male LISP might be
surprised to know that I didn't, at the time, get 'a bit out of
line,' as might say.
As a matter of fact, I pretty much retained my naievity, somehow
convincing myself that this event in my life obviously had to be
some kind of aberration of TheWayThingsAre (TM), or that the RCMP
detachment in orkton had been taken over and subverted by the
Body Snatchers, and that I should just mark it all up to having a
BadHairDay.
{I have not come by my cynicism easily, having had it pounded into
me over the course of the years by a variety of members of our
Officially Recognized Authorities who deemed that, once I had
become an OfficiallyLabledBadGuy, I was fair game for anyone who
was in need of 'someone doing something dirty, decent folks can
frown on.'}
Although I will freely admit that I remained, for the time being,
an ignorant, well-programmed middle-class Canadian white boy, I am
rather proud of the fact that I showed a spark of future promise as
an individual capable of evolving into AManWorthyOfBeingCalledAMan,
as Gurdjieff would say, by listening to the voice inside which told
me that there was a line I could not cross and still retain any
semblance of integrity and self-respect.
I could not, in good conscience, allow these thieves to take my
hard earned money, in payment of the court-ordered fine.
I was met, after my conviction, on the steps of the courhouse, by
a group of local teenagers, most of whom I did not know, who were
aware that I had never smoked a joint in my life, and had decided
that if I had to do the time, I might as well do the crime.
The first joint I ever smoked was on the courthouse steps in
orkton, Saskatchewan, after having been railroaded into a criminal
conviction in order to prevent my being in a position to speak out
about my inadvertantly gained knowledge of RCMP malefeasance.
The first pound of weed I ever bought was in a public park in
Edmonton, Alberta, which I sold in orkton, Saskatchewan, in order
to pay a fine that resulted for conviction of possession of a drug
I had not only never before done, but had never before seen.
So, Constable McClean and Corporal Esau, swear out some new
warrants and take me to court. I've already confessed...
Sincerely,
Mr. BigFuckou
From schear at lvcm.com Mon Jul 20 17:14:02 1998
From: schear at lvcm.com (Steve Schear)
Date: Mon, 20 Jul 1998 17:14:02 -0700 (PDT)
Subject: 3DES weak because DES falls to brute-force? (was Re: John Gilmore...)
In-Reply-To:
Message-ID:
>One of the reasons we so aggressively pursued the negotiations over export
>control with the Administration and have pushed the AES, and our PKI is
>the collateral damage from the export control legislative debate. When
>the AES is finalized it will be followed closely by an ANSI X9 standard.
>Once these standards and infrastructure are established, the concerns
>about brute force attacks should be largely behind us.
I think it likely, biological computation based brute force attacks will be
available much sooner than many think.
--Steve
---------------------------------------------------------------------
reply to schear - at - lvcm - dot - com ---
PGP mail preferred, see http://www.pgp.com and
http://web.mit.edu/network/pgp.html
RSA fingerprint: FE90 1A95 9DEA 8D61 812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------
From success26 at apexmail.com Mon Jul 20 02:20:33 1998
From: success26 at apexmail.com (success26 at apexmail.com)
Date: Mon, 20 Jul 1998 17:20:33 +0800
Subject: Need Large Income Fast??
Message-ID: <46788335@merits494.net>
Dear Prospective Entrepreneur;
I have been an attorney for 26 years, but recently I
joined a company which is only 3 years old, and is
growing at a fantastic rate; in fact, after only 10
months old, it was featured in SUCCESS MAGAZINE, and
it has been the #1 rated network marketing opportunity
for the last three years.
What makes this company and this opportunity I am
offering you so great, is the fact that we (Marketing
Executives) have "EXCLUSIVE" marketing rights in the
United States to new miracle products that are
providing dramatic benefits to people who have two of
the worst diseases known to mankind. Americans who
learn about and need our products, can only get
them through us, and not from other companies, or the
corner drug store.
After getting into other companies in the last several
years, and going from company to company, and product
to product (mostly companies that failed, or had falsely
advertised products), I finally found this company that
is truly "CREDIBLE," has tremendous products, a great
compensation plan, and, best of all, my customers are
calling me back month after month.
Since the products actually sell themselves, I'm NOT
constantly on the phone, or forever hustling all my
relatives and friends. Products that make people feel
better (especially natural products that have no side
effects, and do have a 60 day money back guarantee)
cause people to call me every month, instead of me
calling them.
Our "exclusive" and "patented" all natural products
have also gone through the double blind clinical
studies and have produced unbelievable sales in foreign
markets, and have only recently been introduced into
the United States, so our timing is also perfect.
If you are interested in trying our products and/or
looking at this business opportunity, call me toll-free
at 888-203-6668 and leave your name, telephone number,
and/or your address if you want more information. You
also can respond to this e-mail if you so wish.
If you are ready to make some changes in your life, free
up some time to spend with your family, and make some
extra money, call me or e-mail me. WHAT HAVE YOU GOT TO
LOSE? I made that same call a few months ago, and I
promise, you will be happy to hear more about this tre-
mendous company, its great products, and about how easy
it will be for you to make that extra money.
Thanks,
Clyde Fontenot
This message is brought to you from Clyde Fontenot,
Attorney, 504 W. Main St., Ville Platte,LA.70586,
318-363-5535.
From cons0005 at *algonquinc.on.ca Mon Jul 20 17:42:21 1998
From: cons0005 at *algonquinc.on.ca (Your Yashy)
Date: Mon, 20 Jul 1998 17:42:21 -0700 (PDT)
Subject:
In-Reply-To:
Message-ID: <199807210042.UAA17311@deathstar.comnet.ca>
Priority: Normal
To: "Ciferpunx"
From: "kryz"
Date sent: Tue, 21 Jul 98 00:12:26 -0000 (DST)
> -----BEGIN PGP PUBLIC KEY BLOCK-----
> Version: 2.6.2i
>
> s0mepeOplEarErEtarDeDanDsomeUsEtHeirHeAdD8ol2NI3s5E9ftasLOs0NBckLFwiHsZW
> 9ogW6D+/Y7Uyx+dIGf45Fv6XTIjuMCIhvO44sg2QR84chTuHgrv2yRm2da9FcZUm
> 6yM7dBk0iCJuj/nvtTXUZ/hT3X/6CUBr/9PyzvquECNqYX8ALmczfReY6s/SF4jA
> zReU9IjbbX05MUDzMiNL54BrT71p4fZ+25oBDuzqZl8hRmVx16CjgxrEDbXoJZPU
> ojTX/kNsQ60XZzIaww5eQS6p19TFIXt4op3lq8vBsieaLjzjdVjQsU3I4eR5J1z/
> Prp7836tlAggO3dbJflY3Ah1dB+oDTFb1ulR9BEABRGwAYe0G0NocmlzIEhhcndp
> ZyBTYWxvcGV0dGUgMjUxMbABAw==
> =mTz7
> -----END PGP PUBLIC KEY BLOCK-----
>
>
>
>
HTTP://www.comnet.ca/~yashy
100 YashDollars to first person to try every link.
(including links derived from links)
p.s. SPAM PROOF Email address. Remove the "*" to reply.
From Marketing at departs.co.il Mon Jul 20 17:44:05 1998
From: Marketing at departs.co.il (Marketing Dept.)
Date: Mon, 20 Jul 1998 17:44:05 -0700 (PDT)
Subject: De'Parts - The Parts locating highway...
Message-ID: <19980720221402671.AAA450@www.departs.co.il@departs.co.il>
To: General Manager.
Purchasing Director
Marketing Director.
Re: Boost your sales to High-Tech industries.
Dear Sir/Madam;
* If you need to find parts or stock as fast as possible... You need De'Parts.
* If you are looking to sell surplus parts or stock (in bulk)... You need De'Parts.
* If you are a manufacturer or a distributor and you want to boost sales... You need De'Parts.
Share your database with others, and join the De'Parts family at:
WWW.DEPARTS.COM
**********************************************
De'Parts is an Internet-based information services center that provides an inventory database to potential buyers and suppliers of industrial products.
De'Parts enables you to publish and locate parts at the stroke of a key.
Both supply and demand are met at the De'Parts site, where all parties can find exactly what they need.
Your parts or surplus stock could be just the solution for someone else's needs.
De'Parts will help reduce your costs, improve inventory control and save valuable storage space.
All members of the De'Parts network are able, free of charge:
* To search our database;
* To use our Email robot;
* To submit Requests for Quotations (RFQ's); and
* To download files.
Publishing members can advertise an unlimited number of parts or lists of stock, on our database for the benefit of all De'Parts site visitors.
Publishing membership costs less than the price of an advertisement in your local newspaper.
Just follow the steps below and you are on your way to a substantial increase in sales:
1. Log in to De'Parts and Register to the system. Be aware if
You want to sale all your stock as a batch or to sell it Part
by Part (It means that you may have to provide a quotation for
each part).
2. Create a file to publish, include all your parts for sale, and
follow the instructions that describe how to "Upload a File" in
"Manage D.B.".
3. Upload your file to the system (Step 1 - to Publish the file
as a batch. Step 2 - To publish and quote each part).
4. Check your Email frequently.
For detailed information, please read the "About" section at: WWW.DEPARTS.COM
Thank you for your time and we hope that you enjoy the advantages provided by our system.
Wishing you a lot of success,
S. Avishai
V.P. Marketing
De'Parts
-------------------------------------------------------------------------------------------------
*** Take a part in De'Parts...the parts locating highway ***
-------------------------------------------------------------------------------------------------
From Marketing at departs.co.il Mon Jul 20 17:44:08 1998
From: Marketing at departs.co.il (Marketing Dept.)
Date: Mon, 20 Jul 1998 17:44:08 -0700 (PDT)
Subject: De'Parts - The Parts locating highway...
Message-ID: <19980720221916421.AAA603@www.departs.co.il@departs.co.il>
To: General Manager.
Purchasing Director
Marketing Director.
Re: Boost your sales to High-Tech industries.
Dear Sir/Madam;
* If you need to find parts or stock as fast as possible... You need De'Parts.
* If you are looking to sell surplus parts or stock (in bulk)... You need De'Parts.
* If you are a manufacturer or a distributor and you want to boost sales... You need De'Parts.
Share your database with others, and join the De'Parts family at:
WWW.DEPARTS.COM
**********************************************
De'Parts is an Internet-based information services center that provides an inventory database to potential buyers and suppliers of industrial products.
De'Parts enables you to publish and locate parts at the stroke of a key.
Both supply and demand are met at the De'Parts site, where all parties can find exactly what they need.
Your parts or surplus stock could be just the solution for someone else's needs.
De'Parts will help reduce your costs, improve inventory control and save valuable storage space.
All members of the De'Parts network are able, free of charge:
* To search our database;
* To use our Email robot;
* To submit Requests for Quotations (RFQ's); and
* To download files.
Publishing members can advertise an unlimited number of parts or lists of stock, on our database for the benefit of all De'Parts site visitors.
Publishing membership costs less than the price of an advertisement in your local newspaper.
Just follow the steps below and you are on your way to a substantial increase in sales:
1. Log in to De'Parts and Register to the system. Be aware if
You want to sale all your stock as a batch or to sell it Part
by Part (It means that you may have to provide a quotation for
each part).
2. Create a file to publish, include all your parts for sale, and
follow the instructions that describe how to "Upload a File" in
"Manage D.B.".
3. Upload your file to the system (Step 1 - to Publish the file
as a batch. Step 2 - To publish and quote each part).
4. Check your Email frequently.
For detailed information, please read the "About" section at: WWW.DEPARTS.COM
Thank you for your time and we hope that you enjoy the advantages provided by our system.
Wishing you a lot of success,
S. Avishai
V.P. Marketing
De'Parts
-------------------------------------------------------------------------------------------------
*** Take a part in De'Parts...the parts locating highway ***
-------------------------------------------------------------------------------------------------
From stuffed at stuffed.net Mon Jul 20 17:57:26 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Mon, 20 Jul 1998 17:57:26 -0700 (PDT)
Subject: World Exclusive: I was a lesbo virgin/Bigger balls are better
Message-ID: <19980720234547.27548.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/20/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From lreed at west.cscwc.pima.edu Tue Jul 21 00:08:20 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Tue, 21 Jul 1998 00:08:20 -0700 (PDT)
Subject: Canadian Shock Radio - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C97C4.5E586D60.1@west.cscwc.pima.edu>
Canadian Shock Radio - SPACE ALIENS HIDE M DRUGS!!!
____________________________________________________
Lest anyone think that my rendidion of 'Dudley's Dick In D-Sharp"
might be a bit of sour grapes on my part, let me state, for the record,
that I hold no ill will against the poor, ignorant Nazis in the orkton
division of the RCMP, since basically all they really did was to totally
fuck up their own Karma, while giving me a valuable life-lesson which
may well have been responsible for my making a very important and far-
reaching decision later in my life.
ears later, as a result of knowing what awaits TheManWhoKnowsTooMuch
I decided to keep my fucking mouth shut about the people and events that
I observed from my position on the ceiling, while looking down on my
body and the rest of the room during a particularly intensive electro-
shock experience.
Something told me that I was, once again, inadvertently observing
something that would result in 'measures' needing to be taken by the
RecognizedAndRespectedMembersOfSociety (of which I was not one), in
order to ensure that I did not share with others what I had seen while
peeking under the skirt of the GreatWhoreWhoWasWearingNoPanties.
One of the more disturbing things I perceived while listening to the
rather enlightening conversations taking place among the gathered
civilian and military medical personnel, was something that I have come
to understand rather recently, as a result of research that was begun
after something Tim May mentioned in one of his posts to the CPUNX list.
I thought it odd, at the time, to observe my being given a long series
of electroshocks in a single session, since it was my understanding that
They (TM) just gave a person one, quick whack, and then hosed the shit
off your sheets and wheeled you into another room to make way for the
next lucky winner. Recent research, however, seems to indicate that
this was a special technique pioneered in Canada by Dr. Ewen Cameron,
MKULTRA's resident wanna-be-Nazi-doctor, in order to wipe his patients'
minds (and identities) 'clean,' in order to prepare them for a rebuilding
of their personality, through a technique called Psychic Driving (which
turns out to be a kindlier, gentler form of Brainwashing--as long as you
are only comparing it to bamboo-shoots under the fingernails and rats
in cages placed over one's face).
Of course, Dr. Cameron, who retired to great accolade, recognized as
a Titan in Canadian Medical History, as opposed to being tried by an
International Court and sentenced to be hung, like his predecessors at
Dachau, was really only being used as an expendable shill to take the
heat if the shit hit the fan over Rockerfeller Foundation funded CIA/
Military experiments obliterating the minds of women being treated for
such devastating mental disabilities as 'menopause' and 'post-partum
depression.' After all, one could hardly expect the CIA to risk exposure
of the players in the Canadian MKULTRA scene whose pre-WorldWarII alleged
'histories' could not withstand close scrutiny.
Accordingly, after the shit hit the fan, it was Dr. Cameron who fell
off a cliff while 'climbing' , while my physician
continued to practice...and practice...and practice...
Delving into the history of CIA mind-control experiments cleared up a
few things that had been somewhat of a mystery in regard to my medical
treatment over the years, such as how I had ended up being treated with
hypnosis and heavy doses of electroshock when I had originally gone to
see the doctor in regard to a particularly nasty hangnail, and what the
fuck all of those Navy people were doing two thousand miles from the
ocean.
I'm just kidding, of course...
The fact is, I *already* knew *what* the fuck all of those Navy people
were doing in Saskatchewan. They were there conferring with Dr. Hoffer's
alleged 'research assistant,' MJ. What I *didn't* know, at the time,
was *why*.
I was not surprised to recently find out, after a modicum of research,
that Ms. MJ Callbeck left the Navy as a nurse lieutenant, specializing
in psychiatric nursing, receiving most of her postgraduate training at
Allan Memorial Hospital in Montreal, from phychiatrists who were, to
put it as delicately as possible...PostWar Refugees From Hitler's Nazi
Germany. (With 'refugee' apparently being defined as a physician who
had escaped trial and hanging at Nuremburg, as a result of having a
wealth of information and 'practical experience' in areas that were of
interest to American and Canadian intelligence agencies.)
Ms. Callbeck became a 'research nurse' for a research team formed in
Saskatchewan with huge grant from the CIA's Canadian funding front,
the Rockerfeller Foundation, and was awarded a training grant to
visit two U.S. research units funded by the CIA's American funding
front, the Human Ecology Foundation, at Tulane University, in New
Orleans, and the Psychiatric Institute in New ork.
After MJ's return from the HeartOfMentalDarkness of the MKULTRA
mind-control establishments in the U.S., she created a psychiatric
researching nursing team to 'control' all clinical research for the
team, and to ensure that research protocols would be followed.
Ms. Callbeck's and Dr. Hoffer's careers were closely intertwined with
Dr. Humphry Osmond, a British Naval doctor sent to Canada to look after
British Naval Intelligence's interests in the North American mind-control
research arena being fronted by the CIA, with their MKULTRA Project, and
Captain Al Hubbard, the Johnny Appleseed of LSD, whose hallucinogenic
pecker-tracks throughout the OSS and the Manhattan Project led to him
receiving a Presidential Pardon from Harry Truman, as well as opening
doors for him to a wide variety of employment with such agencies as the
CIA and the Canadian Special Services.
As a matter of fact, the chronolgy of the U.S. mind-control experiments
moving beyond U.S. borders, to countries such as Canada, when publicity
and legal technicalities (such as the murder of innocent victims who had
been dosed with hallucinogenic drugs without their knowledge) became a
bit of a 'sticky wicket,' was mirrored in Canada by the careers of Hoffer,
Osmond, Callbeck and Hubbard, who seemed to be at the center of much
of the 'progressive' psychiatric research funded by American and Canadian
military intelligence agencies, but who always managed to somehow exit
the scene just before the shit hit the fan, and, as a result, "not get
any fon 'em."
{e.g. - Just as Hubbard (who looks surprisingly like my step-grandfather,
Ray Hubbard) managed to slip out the back door of the Hollywood Hospital
in Vancouver, just as "the Canadian Medical Association was becoming
increasingly suspicious of Hollywood Hospital in the wake of publicity
surrounding MK-ULTRA" (with the Canadian Citizen's Commission on Human
Rights doing a distincly audible "Hhhmmmm..." over discovering a CIA
contract psychiatrist, Dr. Harold Abramson, being on the Board Of
Directors of the hospital superintendent's Psychedelic Therapy Assn.),
Dr. Hoffer always seemed to manage to call a 'slant-right' at the
exact time that a hole in the line seemed to open up, closing behind
him and leaving the more dispensable players behind to face a legal
and media blitz(krieg) that was more interested in kicking ass and
taking names, than who actually had the ball.
Naturally, after 1966, when overt legal research into hallucinogenic
therapy was stopped/banned, Dr. Hoffer, who was then Associate Professor
(Research) Psychiatry, College of Medicine, University of Saskatchewan,
suddenly deemed it time to go into 'private practice,' where his work/
research would not be subject to the scrutiny of his peers and his
employers, who might take a dim view of any connection to what was
now illegal research.
Ms. Callbeck, Navy Lieutenant, MKULTRA research trainee, also found
it a convenient time to depart the Research Unit at the University of
Saskatchewan, and assist Dr. Hoffer in the research he was pursuing.
As always, what one finds upon inquiry into JustTheFactsMa'am never
seems to be quite as intruiging as what one *does*not* find...
For instance, one would expect a person who held such an esteemed
position as Director General Technical Assistance, United Nations,
to include this accolade on his or her Curriculum Vitae, but Dr. Hoffer
does not seem to have done so.
As well, all research into the details of the position seem to lead
nowhere, except when one makes personal inquiries through people who
were involved with closely connected areas of the UN agency at the
time, and, even then, when one begins to ask more detailed questions
about the involvement-of/relationship-with Kurt Waldheim, etc., people's
memories suddenly get much worse, and, by golly it seems that they can't
seem to remember hardly anything at all, and think that maybe they were
mistaken about what they already told you.
Of course, when one looks under the dustbins of history, one invariably
finds a few dustballs that remain, as a result of someone forgetting to
do a thourough cleaning, and one finds such gems as a letter from The
Commission For The Study Of Creative Imagination, with such notables/
suspects such as Hoffer, Hubbard, Osmond, Huxley. Smythies, on the Board
of Directors (with Hoffer's UN position highlighted), making inquiries
into the Urantia manuscripts which Hitler's Deaths Head troops found
so enamoring.
"Our little planet, Urantia, is poised on the brink of an enthralling
epoch of social readjustment, moral quickening, and spiritual
enlightenment -- the threshold of true civilization."
{Of particular interest is the lack of any mention of Reptilian Nazis,
even though it seems to be common knowledge that Jesus descended into
the bowels of the earth during his three days of being incommunicado.
Were there 'basement stairs' in his 'burial' cave?}
Also curiously missing from all references to the history of psychiatry
and/or hallucinogenic mind-control experimentation in Canada is mention
of an individual whose name I encountered many times in Saskatchewan, and
always in relation to communities which contained major mental health
hospitals or facilities--Frank Skanks.
The above, of course, is just the tip of the iceberg that one discovers
upon doing a bit of research into known and documented human figures in
the history of mental health research and practice in Saskatchewan.
If one begins investigations into some of the more shadowy figures who
are usually encountered only when viewing their electroshock treatments
from the ceiling above, or by following them from one's doctor's office
and eavesdropping on them during their lunch, etc., then things get, as
Alice noted, "curiouser and curiouser..."
Stan, you've still got something hanging from your lip...
From yjia at sz.utl.com.hk Tue Jul 21 01:25:06 1998
From: yjia at sz.utl.com.hk (Jia Yan)
Date: Tue, 21 Jul 1998 01:25:06 -0700 (PDT)
Subject: where...
Message-ID: <19980721071954.AAA9474@pc-230>
Hi:
Does anybody can tell me in which ftp site i can find the specifications
about the CCITT's X.400 and X.500 protocol sets?
Thanx!
From nobody at REPLAY.COM Tue Jul 21 02:12:56 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 21 Jul 1998 02:12:56 -0700 (PDT)
Subject: Thanks, phlamers!
Message-ID: <199807210913.LAA13592@basement.replay.com>
* To: cypherpunks at toad.com
* Subject: Re: Request To Be Phlamed
* From: Reeza!
At 11:53 AM 18 07 98 -0700, GayWeb.Net wrote:
>Hi Guys
GO THE FUCK AWA. NOW.
______________________
I would like to thank all of you who helped to test my new
PresidentialDeathThreatRemailer by sending your flames to
the above address, to be forwarded to the BlancHouse.
[Please note that the PresidentialDeathThreatRemailer logs
and forwards all headers with the messages.]
I put the PresidentialDeathThreatRemailer into operation only
after receiving assurances from Jim Bell's public defender
attorney that I am legally free to help people exercise their
right of free speech in this manner, and that it would not
adversely affect my military career, as long as I was careful
to forward only flames and death threats, while deleting any
pictures of officers fucking the living shit out of non-coms.
All donations to the PresidentialDeathThreatRemailer will be
donated to the IRS Jalapeno Vaseline Fund.
Reezone Ozone
From whgiii at invweb.net Tue Jul 21 03:37:58 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Tue, 21 Jul 1998 03:37:58 -0700 (PDT)
Subject: where...
In-Reply-To: <19980721071954.AAA9474@pc-230>
Message-ID: <199807211036.GAA07241@users.invweb.net>
-----BEGIN PGP SIGNED MESSAGE-----
In <19980721071954.AAA9474 at pc-230>, on 07/21/98
at 04:25 PM, "Jia Yan" said:
>Hi:
> Does anybody can tell me in which ftp site i can find the specifications
> about the CCITT's X.400 and X.500 protocol sets?
> Thanx!
Well this one was a real bitch to find.
The CCITT is now the ITU: http://www.itu.ch
The Specs are at: http://www.itu.ch/publications/itu-t/itut.htm
The X.400 specs are actually located under F.400 as this spec has been
givien a dual designation of F.400/X.400
Seems that you have to *pay* for a copy of this spec, 39 Swiss Francs,
whatever that is in real money.
X.500 is the same deal but it is only 20 Swiss Francs.
The specs seem to be in postscript, adobe, and word formats. Engilsh,
French, and Spanish versions available.
They are set-up for online ordering and downloading. After you pay you are
given a username and password to download the file(s).
I think if you hunt around the site you may be able to pick up a copy of
all the specs on a CD but no idea what it costs.
Hopw this helps,
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: "640K ought to be enough for anybody." - Bill Gates, 1981
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNbRwoY9Co1n+aLhhAQHMwAP8CUhzUwC1RnUHKH4IWt+x6Qc2cgoLFoe/
9/+mQcG2ai84yQiyCAqjkcDhukBYgCfpEGFNwqrqcMyuofP/PrkaEdjTigCHS7kd
xvm0+mPv9O6CPJCkkvj12/I9iZI5jMXWwmuO3CpQwzcfBgJ/M45UdkZpF8AwvLjz
EN5A3lFhayM=
=WCIU
-----END PGP SIGNATURE-----
From lreed at west.cscwc.pima.edu Tue Jul 21 05:14:27 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Tue, 21 Jul 1998 05:14:27 -0700 (PDT)
Subject: I95 - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C97EF.202780A0.1@west.cscwc.pima.edu>
I(95)'m An Asshole - SPACE ALIENS HIDE M DRUGS!!!
__________________________________________________
Been an asshole all my life...
I suppose I should keep my obligation to be true to my word and provide
the RCMP with details of my life of crime, in order to help the Canadian
Justice system to compensate for the ignorant incompetence of Canada's
National Internal Police Force.
I guess it was kind of mean of me to 'confess' to a crime I committed
over a quarter-century ago, on which the Statute Of Limitations has
undoubtedly run out.
So I'm a belligerant, smart-alec asshole...so sue me!
Regardless, I feel obligated to give up the Real Goods this time, by
confessing to a more recent crime for which I can undoubtedly be charged,
tried and convicted, without anything remotely resembling True Justice
standing in the way...
Get out the warrant and lick your pen, Dudley, because I confess to
being guilty of none other than...Accessory After The Fact To Grand
Theft Auto!
Less than two years ago, nonetheless!
Personally, I think that Officer Besalt should get the honour of
throwing the cuffs on me for this charge, since the actual perpetrator
of the car theft was his good BumBuddyAidsInfestedDrugAddictedInformant,
Ian Wasacase, on whose behalf Officer Besalt, a SorryScumBagPieceOfShit
ThievingPrick (TM) robbed me at gunpoint in full public view, at the
CoalDust Saloon, in Bienfait Saskatchewan.
RCMP Officer AJ Besalt, a piece of Human Garbage who has the conscience
and intellect of a Slug, not only seems incapable of feeling any sense of
shame in dressing up in his neatly pressed uniform, with his shiny badge
and shoes, and telling a judge, with a straight face, nonetheless, that,
despite his incompetence in being able to produce the proper paperwork
on a DogAtLarge charge that he commanded the plaintiff to appear in court
on, under the threat of armed, physical violence, the case should be
continued, with a new date set, in order for him not to feel like an
incompetent moron for being able to handle a simple DogAtLarge case any
better than he did an attempted DrugBust, ending up having to retrieve
their government informant/agent's DrugBuyFrontMoney at gunpoint from
a citizen who had committed no crime.
Oh, pardon me...I would hate for anyone to get the *wrong* impression,
here...
OffalSir Besalt didn't actually mention the part about using a career
criminal and police informant to attempt to frame a disabled person on
a drug charge by using the threat of violence to get him to sell some of
his medication in return for marked money.
I guess he didn't want to take up the Court's valueable time with
insignificant details.
Lest the reader believe, Dog forbid, that I am stringing out my sincere
confession in order to torture a poor, pathetic excuse for a human being
by including facts and details that never quite seem to make it into the
Offical Police Reports, I guess I had best get on with supplying the
details of my HeinousCrime.
I was very young as a child...
OK, really, now...
Ian Wasacase, former preacher , had come to Estevan to
bestow his blessed presence on his brother, Gilbert, and his family.
He had driven down with his NewImprovedDrugAddictedOldLady and a couple
of friends who were apparently his apprentices in his life of crime.
As overjoyed as Gilbert and his wife, Peggy, were to see Gilbert's
beloved brother, Ian, they nonetheless that, in the interest of saving
the life of several single children, their own, that it would be best
if Ian and his SpoonFed Roadies were to depart, and thus not further
endangering the lives of the family's children by shooting their AIDS
infested blood all over the floor, walls and ceiling of the bathroom
and the children's bedrooms.
In consternation with the difficulty of getting the FamilyJunkie and
friends out of his home, Gilbert offered to pay my expenses to make a
trip to Regina, which he knew I needed to do anyway, in return for
leading his brother to believe that I had a medical prescription that
was waiting for me in Regina, which I would be interested in selling
to pick up a little cash.
It worked like a charm...
Ian and the SpoonFed Roadies had their belongings packed and were
waiting outside, by the vehicles, in 32-seconds flat. (A new world
record!)
Ian's old lady and two friends climbed into my motorhome, explaining
that the heater in the car they had brought didn't work very well, and
we proceeded down the highway, toward Regina, with me following Ian's
car with my motorhome.
Well, not exactly...
It turns out that it wasn't Ian's car. It wasn't his old lady's car.
It wasn't either of his friends' car.
I pretty much figured that out when he pulled over by the side of the
road, motioning for me to stop, and then turned onto a small snow-filled
side road which received no winter maintenance, and proceeded to put the
pedal to the metal, going up and over a railway crossing, and down the
other side into a deep snowbank where the car would be hidden until spring
thaw. My instincts were further confirmed when he appeared, walking back,
with a hammer, a large screwdriver, and the license plates off the car.
Did I inform the police of this? Did I turn him in?
Nope...I'm AnAccessoryAfterTheFact.
To tell the truth, being AnAccessoryAfterTheFact has, thus far, resulted
in far less jail time than any of the attempts I have made during my life
to provide information and/or assistance to those who are officially sworn
to uphold the law.
It always seems that those who perpetrate crimes are much more informed
on the legal technicalities regarding crimes and criminal proceedings than
those who happen to be standing nearby with their thumb up their ass,
committing crimes only against themselves.
In the end, it always seems to end up that the person who murdered a
few hundred babies in their crib gets probation in return for turning
State's Evidence against the person who wanders into the room and says,
"Uuuhhh...I really don't think you should be doing this."
Cynical? Moi?
Eat my shorts...I'm talking about Real Life (TM) here, boys and girls,
not about Matlock, OK?
So, there you have it, Dudley.
A full confession that can be used to convict me, coming from my own
lips (so to speak, although I actually type with my tongue).
No longer will you have to haul my ass repeatedly into court in vain
attempts to convict me of crimes of which I am not guilty, as a result
of sloppy investigative work and a propensity to ignore the fact that
your witnesses are lying scumbag sacks of shit who would testify against
their own mothers to get out of their own criminal charges.
[EditWhore's Gnote: Since the confession, per se, is complete, members of
Royal Canadian Mounted Police may want to forgoe reading the rest of my
diatribe, since it will merely fill in a few small details regarding
the incompetent, criminal and unconsionable actions of Officer Besalt.]
Upon reaching Regina, after the commission of my Heinous Crime of
AnAccessoryAfterTheFactToGrandTheftAuto, I decided that I would drop
the GrandTheftAutoPerpetrator, et al, off at their place of residence,
purporting to go pick up my medications and return, to make my fortune
selling them my medications at outrageously low prices.
Instead, I seemed to get stuck in the driveway behind their house, even
though the snow was not very deep, and I had little trouble driving in.
After going in the house to warm up and get a shovel, which it turns
out they didn't have, Ian took my winter coat to go get a shovel, or some
friends to help, or somesuch. He soon returned without the jacket, without
a shovel, and without any friends. Since it was thirty or forty below zero
and they had no phone, I quickly began to suspect that, since I obviously
wasn't going anywhere, Ian & Company had come to the conclusion that a
bird in the hand is worth two in the bush, and that once they were in
possession of the medication I currently had, then they could look forward
to a bright future in which there might actually be another bird out there
somewhere, in the form of a prescription for further medication.
Although I would be the last one to heap praise upon Ian for the choices
he has made in his life, neither would I be the first to heap huge amounts
of abuse on him for his character, or lack thereof.
The reason for this is quite simple...he didn't kill me.
Ian is a drug addict, with a ferocious habit to feed, and little stength
of character left with which to attempt to avoid falling into total moral
depravity. However, he chose to scam me, steal from me while I slept, and
the like, over the course of several days, instead of just whacking me
over the head with an axe and taking all of my medication.
This small bit of self-restraint on his part allowed me to split my
supply of medication into small stashes which I could allow him to find
and steal at a rate suitable for keeping his habit in check, and buy me
time for the temperature to rise to a scorching twenty below zero, at
which time I made a break for a friend's house some distance away, and
suffered only minor frostbite in the process.
As far as Officer Besalt, RCMP, is concerned, however...Fuck That
Sorry Criminal ScumSucking Piece Of Crap In His Dirty Little Asshole!
Officer Besalt, too ignorant to realize who was grinding the organ,
and who was dancing with the funny hat and the tin cup, brought Ian
down to Estevan in an attempt to bust me for selling my medication.
ou see, Ian had been working as an informant for the RCMP in other
Saskatchewan districts, enabling the Mounties to arrest and convict
a number of desperados, some of whose crime seemed to be wanting to
kick Ian's ass for fucking their sisters while being AIDS infested,
without telling them.
{In all fairness to the Mounties, Ian's bragging about the people who
he had screwed over as a police informant indicated that half of them
were probably guilty of *something*...}
Thus it was that Ian and his old lady appeared on my doorstep in the
small hamlet of Bienfait, late one night, wanting to purchase some of
my medication. He pulled a wad of money out of his pocket, and seemed
fully prepared to make a buy...
[Note by AnEditorToBeBustedLater: What it is essential to understand,
here, is that any individual on the face of the earth, no matter how
dim-witted, could immediately take one look at Ian, seeing him for
the first time, and instinctively realize that no matter how desperate
he was for a fix, even if he had a million dollars in his pocket, he
would first try every scam in the world to steal whatever drugs a
person had before he would finally break down and actually *buy* them
in an honest, straightforward deal.]
I stood there looking at the cash in his hand, mentally visualizing
a picture of Dudley DoRight where the Queen's picture normally is, and
immediately came to three quick conclusions:
1) The motherfucker *owed* me for the several hundred dollars that it
took for me to replace my tires and get my motorhome mobile again.
(Not to mention the thousand or so dollars of damage he did to the
interior while tearing it apart, looking for drugs.)
2) Ian was only holding forth $ 40.00, out of the several hundred in
his possession, obviously intending to purchase a couple of pills,
stash the rest of the money in his sock, and pick up a couple of hundred
bucks in spare change, over and above what the RCMP were paying him to
help frame innocent people.
3) Since Ian was totally incapable of going more than a few hours without
drugs, he undoubtedly had some in his possession (probably provided by
the Dudley DoRight Pharmacutical Company), and that if I didn't do a
deal with him, he might very well stash the forty bucks in my house on
his way out, and turn over a few pills of his private stash as evidence
against me.
I don't like jail...never have...never will...
Regardless, there was not a snowball's chance in hell that I was going
to pass up an opportunity to fuck Ian out of forty bucks.
I snatched the $ 40.00 out of his hand, and said, "OK! I'll meet you
at the CoalDust Saloon in ten minutes. I've got the shit stashed outside."
Ian knew I was scamming him, but he wasn't sure how. Neither was I, but
I had ten minutes to figure it out...
Basic Rules Of Life #238:
If your's is the strength of ten, because your heart is pure, and you are
working for the Forces of Light...never pull your scams in a dark alley.
Dark alleys are for criminals, and the criminal with the badge and the
gun invariably win the battle.
Basic Rules Of Life #239:
Criminals are afraid of the light...even criminals with badges and guns.
"Sunshine is the best disinfectant." ~ Judge Louis Brandeis
I went to the CoalDust Saloon, and used one of the twenties to buy a
beer for myself and Ian. Ian wanted me to give him the drugs, and I told
him to hold on for a minute.
I walked over to the change machine by the Video Lottery Terminals and
put the other twenty and the beer change in, turning them into loonies.
I gave Ian ten of the Loonies.
I proceeded to put the rest of the Loonies into a VLT machine and begin
gambling.
Ian asked me where the drugs were. I told him to fuck off. He looked
hurt and hung around like a kicked puppy, while his old lady made a call
on the pay phone.
Officer Besalt walked through the door of the CoalDust Saloon a few
minutes later.
[eah, yeah, it's me again: The RCMP cover a lot of territory in a thinly
populated area, around Estevan, and thus it takes them a considerable
amount of time to respond to calls. It may take them several hours to
respond to a traffic accident, or thirty minutes to an hour to respond
to serious crimes late at night. If they walk through the door five
minutes after being called, it is because they were sitting around
the corner, and waited for four minutes before getting out of their
vehicle and coming in.]
Officer Besalt needed to get the Mountie's DrugFrontMoney back while
pretending it was Ian's money.
Lottsa luck...
We discussed the situation, as I sat playing the VLT, and I quite simply
told the OffalSir that Ian had offered me money to buy drugs from me and
that I had taken it, since he owed me hundreds of dollars for having
slashed my tires in order to hold me hostage and steal my drugs in Regina.
Unfortunately, I didn't use the word 'taken.' I told OffalSir Besalt
that I had 'snatched' the money from Ian's hand, whereupon both Besalt
and I knew that he was now free to fuck with me if I did not return the
money, since I had implied that Ian might not have relinquished the money
totally voluntarily.
Although I was between a rock and a hard place, not having the money,
there *is* a Dog! I hit a minor jackpot that gave me forty bucks.
As I waited for the barmaid to cash in my ticket and bring me the money,
I made a point of going into great detail, loud enough for everyone nearby
to hear, about how the person on whose behalf the RCMP Officer was shaking
me down was a drug addict who was attempting to make a drug buy from me,
and how I was unwilling to commit the crime, desiring only to receive the
money that he owed me for slashing my tires and holding me hostage in
severe winter conditions in the BigCity.
"Sunshine is the best disinfectant."
The Bottom Line:
OffalSir Besalt is a sorry, scumbag Nazi piece of shit with no better
morals or conscience than to try to use a lying, conniving criminal scam-
artist who has provided countless Canadian youth with hard drugs while
working as a paid RCMP agent/informant, to attempt to entrap a mentally
disabled individual into committing a crime by selling his medications
in order to prevent once again being victimized by a lifetime criminal.
Oh, yeah...and *I* have never murdered anyone by giving them AIDS
while being under the legal protection of the RCMP.
_____________________
Non-Adobe PostScript:
One of the more humorous aspects of the Ian Wasacase Saga was a news
story in the Regina Leader Post in regard to the RCMP's ultra-secret
informant/witness in the trial of four(?) men accused of armed robbery
(and murder?).
After describing the individual's identity being cloaked by his
participation in the Witness Protection Program, the Leader Post, toward
the end of the article, revealed Ian's name.
Duuhhh...
Ian is now serving hard time in a Manitoba prison as a result of a
multitude of armed robberies he committed while working under the
protective umbrella of the RCMP.
{Undoubtedly hoping that his cellmates don't have a subscription to
the Regina Leader Post.}
Officer Besalt is serving hard time as a result of being trapped in
the mind and body of an Ignorant Nazi Fuck (TM).
{Undoubtedly too fucking ignorant to realize that he would be much better
off being Ian Wasacase.}
Attention Law Enforcement Agents:
"Smoke 'em if you confiscated 'em..."
From howree at cable.navy.mil Tue Jul 21 06:50:14 1998
From: howree at cable.navy.mil (Reeza!)
Date: Tue, 21 Jul 1998 06:50:14 -0700 (PDT)
Subject: Requests
In-Reply-To: <19980720203908.28197.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980721224922.0084d980@205.83.192.13>
At 01:39 PM 20 07 98 PDT, Corvus Corvax wrote:
>
>> What some of them seem to want would appear to be _me_ (and you).
>
>Only because you'd look so absolutely luscious in leather, darling.
>
>Kiss kiss,
>
>Diva! von Future Prime
>
Luscious in leather is something nice,
BUT:
"Luscious" does not suit me.
Lusty, vigorous and virile, perhaps, but not luscious.
DID YOU SEE THAT?
IT was FREE SPEECH! On a UFO~!
Reeza!
From jya at pipeline.com Tue Jul 21 08:31:00 1998
From: jya at pipeline.com (John Young)
Date: Tue, 21 Jul 1998 08:31:00 -0700 (PDT)
Subject: NSA's Long Strong Arm
Message-ID: <199807211530.LAA08035@camel8.mindspring.com>
>From a series in Network World, July 20, 1998,
"The Long, Strong Arm of the NSA," about the
Agency's methods of enforcing export obedience
with intimidation, delay and obfuscation:
User manual: Dodging the rules
By Ellen Messmer Network World,
The National Security Agency (NSA) wrote the export rules
on encryption. But from the point of view of corporations
that want to ship U.S. software to their foreign offices,
getting around the U.S. export rules is a top priority.
And even for those who used to work at the NSA, it's still
a challenge.
"Well, I wrote those export rules when I was at the NSA,"
confessed Russell Davis, now chief of information technology
security at SBC Warburg Dillon Read, a division of Swiss Bank
Corp., which operates in 77 countries. Since joining the
corporate life, Davis has used his knowledge of the NSA to
find ways to work around the export system on behalf of his
customer, the bank, which uses a lot of encryption-based
security gear.
"It took 17 months to figure out how to get crypto-based
smart cards to Swiss facilities and elsewhere," Davis said.
"But I wrote the rules on all this, and I know how to get
around them." Would he ever consider using government-
approved data-recovery?
"Never," Davis declared. "My customers come first!"
"Our customers just aren't going to buy these types of
products," said Tom Carty, vice president of business
development for GTE CyberTrust. He agreed the government is
leading industry down a path to build products few users
will willingly buy.
---------
More at Network World:
http://www.nwfusion.com/news/0720nsa.html (requires sign-up)
Mirror:
http://jya.com/nsa-lsa.htm
Thanks to MO.
From jya at pipeline.com Tue Jul 21 09:28:15 1998
From: jya at pipeline.com (John Young)
Date: Tue, 21 Jul 1998 09:28:15 -0700 (PDT)
Subject: Hooray Mondex
In-Reply-To: <199807211516.LAA14338@homeport.org>
Message-ID: <199807211628.MAA31959@camel8.mindspring.com>
Here's a Chase-Mondex user's report from Manhattan's upper
west side test bed:
1. We got about 20 of the first cards and sent them around the
globe to crackers. None shared the fruits but a few came back
with requests, see 2 :
2. By special request of sweettalking crackers who had heard
about the first batch, we got a few more, and knowing these folks
were honest, we loaded the cards with a few bucks from our
bank account as they asked, "for testing." Days later we were broke.
3. Chase refilled our account and apologized for insufficient
protection from electronic bandits. The bandits sent us 50%
of what they stole: $12.00. Rudely wrote: get a job.
4. Recently, we got two of Citibank's cards with $5.00 each on
them. Tried for days to get local merchants to take them, none
would because they lacked a unique magnetic stripe they'd
been advised to watch for, which, we later learned, once swiped
could tap into global data banks on the user, clean their
accounts, screw their records, erase the institutionalized mugging,
leave an audit showing it was the irresponsible military-site
crackers who did it.
5. We got $5,000,000 digi-cash for that info from SDA, who
got it from the institutions running the Mondex banditry:
those ACP recommends the Commerce Department grant
license exceptions for the export of encryption products of
any strength that have been determined to be "legitimate
and responsible."[*]
Happily Legitimate and Responsible
----------
* http://jya.com/acp-dier.htm
From CTIA_Daily_News at um2.unitymail.com Tue Jul 21 10:38:10 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Tue, 21 Jul 1998 10:38:10 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 21, 1998
Message-ID: <199807211729.MAA16881@mailstrom.revnet.com>
==========================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.� Please click on the icon /
attachment
for the most important news in wireless
communications today.
A new multi-billion dollar industry is here!
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications
converge!
Don't Miss Your Chance -- October 12-14,
1998
Bally's Las Vegas, Las Vegas, NV
Call 202-785-0081 for more information.
===========================================
From leo at supersex.com Tue Jul 21 11:10:43 1998
From: leo at supersex.com (Leo)
Date: Tue, 21 Jul 1998 11:10:43 -0700 (PDT)
Subject: you got that PGP program?
In-Reply-To: <99c9c87.35b3d24d@aol.com>
Message-ID:
On Mon, 20 Jul 1998 LrdWill at aol.com wrote:
> you got it?
>
Not since the penicillin shots, no.
From stuffed at stuffed.net Tue Jul 21 12:38:20 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Tue, 21 Jul 1998 12:38:20 -0700 (PDT)
Subject: Donkey Dick: Man tries penis swap with Donkey/Springer's 'love child'
Message-ID: <19980721174201.1221.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/21/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From "cognitus" at earthlink.net Tue Jul 21 13:34:04 1998
From: "cognitus" at earthlink.net (Richard Storey)
Date: Tue, 21 Jul 1998 13:34:04 -0700 (PDT)
Subject: NSA's Long Strong Arm
In-Reply-To: <199807211530.LAA08035@camel8.mindspring.com>
Message-ID: <35B4FBC9.F5E75026@earthlink.net>
John Young wrote:
>
> >From a series in Network World, July 20, 1998,
> "The Long, Strong Arm of the NSA," about the
> Agency's methods of enforcing export obedience
> with intimidation, delay and obfuscation:
At http://jya.com/nsa-lsa.htm,
the first article is the most interesting. It demonstrates what I have
always believed, that the state's reason for limiting encryption was
mainly to pressure corporations, who are driven by profits, to adopt the
state's desired encryption features. These NSA-approved products from
American corporations should be seen as contaminated, tainted and
poisoned.
Would you purchase hardware or software that meets the government's
export standards--approved by NSA?
"Never," Davis declared. "My customers come first!"
Richard Storey
From mla39 at gte.net Tue Jul 21 13:46:27 1998
From: mla39 at gte.net (mla39 at gte.net)
Date: Tue, 21 Jul 1998 13:46:27 -0700 (PDT)
Subject: Put your subject line here
Message-ID: <199807212040.PAA12975@smtp1.mailsrvcs.net>
___________________________________________________________
This Message was Composed using Extractor Pro '98 Bulk E- Mail Software. If
you wish to be removed from this advertiser's future mailings, please reply
with the subject "Remove" and this software will automatically block you
from their future mailings.
E-Source is pleased to announce that they are a Channel Parnter with TAVA, developers of the
Plant Y2KOne Software System. As a Channel Parnter, E-Source can reduce the costs and the
risk associated with manufacturing plant conversions for the year 2000.
Visit www.tava.com for a review of the product. Then contact E-Source directly at mla39 at gte.net for a technical visit or review. We have trained computer engineers ready to assist you on
Y2K compliance issues.
Mel Arendt
EVP- E-Source
mla39 at gte.net
From yjia at sz.utl.com.hk Tue Jul 21 17:57:00 1998
From: yjia at sz.utl.com.hk (Jia Yan)
Date: Tue, 21 Jul 1998 17:57:00 -0700 (PDT)
Subject: where...
Message-ID: <19980721234852.AAA14790@pc-230>
Thank you very much!
but i think i can work out sum better ones with the money.
----------
> From: William H. Geiger III
> To: Jia Yan
> Cc: cypherpunks at toad.com
> Subject: Re: where...
> Date: Tuesday, July 21, 1998 6:28 PM
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> In <19980721071954.AAA9474 at pc-230>, on 07/21/98
> at 04:25 PM, "Jia Yan" said:
>
> >Hi:
> > Does anybody can tell me in which ftp site i can find the
specifications
> > about the CCITT's X.400 and X.500 protocol sets?
> > Thanx!
>
> Well this one was a real bitch to find.
>
> The CCITT is now the ITU: http://www.itu.ch
>
> The Specs are at: http://www.itu.ch/publications/itu-t/itut.htm
>
> The X.400 specs are actually located under F.400 as this spec has been
> givien a dual designation of F.400/X.400
>
> Seems that you have to *pay* for a copy of this spec, 39 Swiss Francs,
> whatever that is in real money.
>
> X.500 is the same deal but it is only 20 Swiss Francs.
>
> The specs seem to be in postscript, adobe, and word formats. Engilsh,
> French, and Spanish versions available.
>
> They are set-up for online ordering and downloading. After you pay you
are
> given a username and password to download the file(s).
>
> I think if you hunt around the site you may be able to pick up a copy of
> all the specs on a CD but no idea what it costs.
>
> Hopw this helps,
>
> - --
> - ---------------------------------------------------------------
> William H. Geiger III http://users.invweb.net/~whgiii
> Geiger Consulting Cooking With Warp 4.0
>
> Author of E-Secure - PGP Front End for MR/2 Ice
> PGP & MR/2 the only way for secure e-mail.
> OS/2 PGP 5.0 at: http://users.invweb.net/~whgiii/pgp.html
> - ---------------------------------------------------------------
>
> Tag-O-Matic: "640K ought to be enough for anybody." - Bill Gates, 1981
>
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3a-sha1
> Charset: cp850
> Comment: Registered_User_E-Secure_v1.1b1_ES000000
>
> iQCVAwUBNbRwoY9Co1n+aLhhAQHMwAP8CUhzUwC1RnUHKH4IWt+x6Qc2cgoLFoe/
> 9/+mQcG2ai84yQiyCAqjkcDhukBYgCfpEGFNwqrqcMyuofP/PrkaEdjTigCHS7kd
> xvm0+mPv9O6CPJCkkvj12/I9iZI5jMXWwmuO3CpQwzcfBgJ/M45UdkZpF8AwvLjz
> EN5A3lFhayM=
> =WCIU
> -----END PGP SIGNATURE-----
From jf_avon at citenet.net Wed Jul 22 09:53:53 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Wed, 22 Jul 1998 09:53:53 -0700 (PDT)
Subject: FLASH: Fwd: Modification to ITAR under way: Will it affect crypto too?
Message-ID: <199807221424.KAA02460@cti06.citenet.net>
Hi Cypherpunks.
I fell on that text in the Canadian Firearms Digest, V2 #506 today.
Maybe somebody will want to look into it to see what part of ITAR was modified and if it will affect crypto...
Please feel free to forward to every possibly interested party.
Ciao
jfa
=============================================================
Date: Wed, 22 Jul 1998 06:29:54 -0600
From: Rod Regier
Subject: US Export controls saga update
(http://www.pmdtc.org/oas.PDF) indicates that US State Dept. expects
the current exemption of Canada from the ITAR export permit
requirements for firearms and ammunition (and parts thereof)
to be rescinded soon.
When I spoke to a US State Department employee, they indicated they
were being told it is going to happen in a few days.
They gave me a Canadian government employee counterpart contact
information (?Dept of Foreign Affairs?).
I spoke with the Canadian government contact, and was pleasantly
surprised for a change.
I was told that Canada plans to contest this threatened action, since
in part it could have wider trade implications outside the firearms
and ammunition realm. This is certainly refreshing, since on the
whole the current Canadian administration has generally leapt at any
chance to put it to the Canadian firearms community.
My contact expressed the belief that a change in Canada's ITAR permit
exemption status by the United States cannot be accomplished solely by
Executive branch action, but must be cleared thru the Legislative
branch (Congress) too. If that is indeed the case, it is much less
certain of approval, since the anti-gunners may control the US
Executive branch, but they don't control US Congress at this time.
- --
Rod Regier, Software Development bus: (902)422-1973 x108
Dymaxion Research Ltd., 5515 Cogswell St., fax: (902)421-1267
Halifax, Nova Scotia, B3J 1R2 Canada email: RRegier at dymaxion.ca
corporate url: http://www.dymaxion.ca
Jean-Francois�Avon,�B.Sc.�Physics,�Montreal,�Canada
��DePompadour,�Soci�t�d'Importation�Lt�e
�����Limoges�fine�porcelain�and�french�crystal
��JFA�Technologies,�R&D�physicists�&�engineers
�����Instrumentation�&�control,�LabView�programming
PGP�keys:�http://bs.mit.edu:8001/pks-toplev.html
PGP�ID:C58ADD0D:529645E8205A8A5E�F87CC86FAEFEF891�
PGP�ID:5B51964D:152ACCBCD4A481B0�254011193237822C
From CompSec01 at aol.com Wed Jul 22 10:08:40 1998
From: CompSec01 at aol.com (CompSec01 at aol.com)
Date: Wed, 22 Jul 1998 10:08:40 -0700 (PDT)
Subject: Tempest computers
Message-ID: <4da466f2.35b58852@aol.com>
If you would like information about tempest monitors, computers, printers or
secure fax machines, please contact me.
Tempest tecnology prohibits the electronic monitoring of electromagnetic
emissions from the above listed devices. This is the core of our business.
Sincerely,
Karen Azoff
Computer Security Solutions, Inc.
6190 Grovedale Ct.,#200
Alexandria, VA 22310 ph. US 703 922-0633 fax US 703 922-0963
email; kte4mpest at aol.com
From stuffed at stuffed.net Wed Jul 22 10:16:03 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Wed, 22 Jul 1998 10:16:03 -0700 (PDT)
Subject: Losing it on the web/Man wins $90,000 by getting breasts
Message-ID: <19980722153518.253.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/22/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From ZeroInt.at.birmingham.crosswinds.net Wed Jul 22 10:21:19 1998
From: ZeroInt.at.birmingham.crosswinds.net (ZeroInt)
Date: Wed, 22 Jul 1998 10:21:19 -0700 (PDT)
Subject: (fwd) Topic is Internet server stalkers AKA Cyberpunks
Message-ID: <35bb70fa.5628631@mail.zebra.net>
Thought this might be of interest.
On Tue, 21 Jul 1998 12:40:48 -0500, in misc.survivalism "~The Seventh
Sign~" said:
>Nobody important wrote
>
>Hello people I will address this in an off topic way to many of you but you must learn about the
>type of individual we have been dealing with.
>
>1.)Has plenty of time on his hands and may be something else in his had is you catch my drift.
>2.)Thinks it is a cool thing to try to shut down servers and hack into systems. Use to have his own
>web site but not now.
>3.)Has use of library computers so he thinks he won't get caught.
>4.)Mad at his Dad for not being there for him. Making him made at the world.
>5.)Has been posting sollog crap trying to shut down servers that burned him.
>6.)Thinks 'Archangle'(A well known name in the hackers sites.) is his mentor.
>7.)Has probably send hate mail to you and other members of the group using the anonymous remailers
>rigging the response to finger the other member of the group.
>
>
>Who's servers is he trying to shut down you ask.
>www.theasi.com (Hacking (Don't get your info here a page cost you $9.95USA), sollog and other
>bullshit)
>www.theeunderground.net Ditto the above!
>www.replay.com Anonymous remailers that he has been abusing like rubber gloves after hemorrhoid
>surgery. You could send the stuff to abuse at replay.com but I think the little punk wants you to mail
>bomb his account. or you could send your complaints to postmaster at nym.alias.net but you would play
>into the little punks hand like I did.
>
>DEFENSE AGAINST THIS ANTAGONIST IS SIMPLE:
>whatshitten will be his name from this point on.
>Solagged would be good too.
>A profit prophet is what sollog is no predictions have ever come true.
>
>Just take my message and repost it under all of his post thank you!
>
>
>
>
>
From shamrock at netcom.com Wed Jul 22 10:30:05 1998
From: shamrock at netcom.com (Lucky Green)
Date: Wed, 22 Jul 1998 10:30:05 -0700 (PDT)
Subject: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <199807221318.GAA03684@cygint.cygnus.com>
Message-ID: <000801bdb583$b8b736c0$931daace@default>
John,
Do you plan on renting out the use of the cracker on a per-key basis and if
so, how much do you anticipate charging for cracking a message?
Thanks,
--Lucky
> -----Original Message-----
> From: e$@vmeng.com [mailto:e$@vmeng.com]On Behalf Of John Gilmore
> Sent: Wednesday, July 22, 1998 6:19 AM
> To: John Lowry
> Cc: Robert Hettinga; gnu at toad.com; cryptography at c2.net;
> coderpunks at toad.com; cypherpunks at toad.com; e$@vmeng.com;
> dcsb at ai.mit.edu; gnu at cygnus.com
> Subject: Re: John Gilmore and the Great Internet Snake Drive
>
>
> > One lesson I plan to observe - don't encrypt known plaintext unless you
> > have to !
>
> The EFF DES Cracker cracks more than just known plaintext (though it's
> the easy case). It also cracks plaintexts whose likely byte values
> are known (e.g. all alphanumeric), winnowing the keyspace down to a
> size that software or humans can search. Such a search runs in very
> close to the time required for an ordinary known-plaintext search.
> See the book for details (www.oreilly.com).
>
> We successfully cracked a DES-encrypted Eudora saved-mail file
> provided by Bruce Schneier during our debugging period. He gave us
> the top byte of the key so we could focus on debugging rather than on
> waiting to get to the right block of keyspace. The machine located
> the key within that 49-bit keyspace after we fixed a few software
> bugs.
>
> John
>
>
> ----------------------------------------------------------------------
> Where people, networks and money come together: Consult Hyperion
> http://www.hyperion.co.uk/ info at hyperion.co.uk
> ----------------------------------------------------------------------
> Full-Strength Cryptographic Solutions for Worldwide Electronic Commerce
> http://www.c2.net/ stronghold at c2.net
> ----------------------------------------------------------------------
> Like e$? Help pay for it!
> For e$/e$pam sponsorship or donations,
> ----------------------------------------------------------------------
>
>
From gnu at om.toad.com Wed Jul 22 10:40:12 1998
From: gnu at om.toad.com (John Gilmore)
Date: Wed, 22 Jul 1998 10:40:12 -0700 (PDT)
Subject: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <3.0.3.32.19980720114859.009997f0@dave.bbn.com>
Message-ID: <199807221318.GAA03684@cygint.cygnus.com>
> One lesson I plan to observe - don't encrypt known plaintext unless you
> have to !
The EFF DES Cracker cracks more than just known plaintext (though it's
the easy case). It also cracks plaintexts whose likely byte values
are known (e.g. all alphanumeric), winnowing the keyspace down to a
size that software or humans can search. Such a search runs in very
close to the time required for an ordinary known-plaintext search.
See the book for details (www.oreilly.com).
We successfully cracked a DES-encrypted Eudora saved-mail file
provided by Bruce Schneier during our debugging period. He gave us
the top byte of the key so we could focus on debugging rather than on
waiting to get to the right block of keyspace. The machine located
the key within that 49-bit keyspace after we fixed a few software
bugs.
John
From eureka at eureka.abc-web.com Wed Jul 22 11:27:06 1998
From: eureka at eureka.abc-web.com (Eureka Daily News)
Date: Wed, 22 Jul 1998 11:27:06 -0700 (PDT)
Subject: -> Eureka! Wed Jul 22 '98
Message-ID: <19980722075733.27465.qmail@eureka.abc-web.com>
<<< No Message Collected >>>
From eliner at departs.co.il Wed Jul 22 11:53:31 1998
From: eliner at departs.co.il (eliner at departs.co.il)
Date: Wed, 22 Jul 1998 11:53:31 -0700 (PDT)
Subject: De'Parts - The Parts locating highway...
Message-ID: <199807202200.PAA16669@toad.com>
To: General Manager.
Purchasing Director
Marketing Director.
Re: Boost your sales to High-Tech industries.
Dear Sir/Madam;
* If you need to find parts or stock as fast as possible... You need De'Parts.
* If you are looking to sell surplus parts or stock (in bulk)... You need De'Parts.
* If you are a manufacturer or a distributor and you want to boost sales... You need De'Parts.
Share your database with others, and join the De'Parts family at:
WWW.DEPARTS.COM
**********************************************
De'Parts is an Internet-based information services center that provides an inventory database to potential buyers and suppliers of industrial products.
De'Parts enables you to publish and locate parts at the stroke of a key.
Both supply and demand are met at the De'Parts site, where all parties can find exactly what they need.
Your parts or surplus stock could be just the solution for someone else's needs.
De'Parts will help reduce your costs, improve inventory control and save valuable storage space.
All members of the De'Parts network are able, free of charge:
* To search our database;
* To use our Email robot;
* To submit Requests for Quotations (RFQ's); and
* To download files.
Publishing members can advertise an unlimited number of parts or lists of stock, on our database for the benefit of all De'Parts site visitors.
Publishing membership costs less than the price of an advertisement in your local newspaper.
Just follow the steps below and you are on your way to a substantial increase in sales:
1. Log in to De'Parts and Register to the system. Be aware if
You want to sale all your stock as a batch or to sell it Part
by Part (It means that you may have to provide a quotation for
each part).
2. Create a file to publish, include all your parts for sale, and
follow the instructions that describe how to "Upload a File" in
"Manage D.B.".
3. Upload your file to the system (Step 1 - to Publish the file
as a batch. Step 2 - To publish and quote each part).
4. Check your Email frequently.
For detailed information, please read the "About" section at: WWW.DEPARTS.COM
Thank you for your time and we hope that you enjoy the advantages provided by our system.
Wishing you a lot of success,
S. Avishai
V.P. Marketing
De'Parts
-------------------------------------------------------------------------------------------------
*** Take a part in De'Parts...the parts locating highway ***
-------------------------------------------------------------------------------------------------
From lreed at west.cscwc.pima.edu Wed Jul 22 12:14:53 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Wed, 22 Jul 1998 12:14:53 -0700 (PDT)
Subject: Arty Farcer - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C98E6.6753AF60.5@west.cscwc.pima.edu>
Arty Farcer, Intelligence - SPACE ALIENS HIDE M DRUGS!!!
_________________________________________________________
Professer Stephen Grossman, chief cognitator at Boston University's
Department of Cognitive and Neural Systems, has created Thing1 and
Thing2--robots which can adapt to their environment by mastering
approach and avoidance behavior.
He states, "The networks we're building here learn from examples and
exhibit some capability for generalization beyond the training data
we've put into them."
Brian Fitzgerald, in the Summer 1998 issue of Bostonia, points out that
the "neural networks enable the robots to teach themselves...predict
impending impacts, and use the same patterns to suppress movements that
would cause collisions."
It seems to me that the same technology could be used to instigate
movements that would *cause* collisions...
Let's say, for instance, that AMadScientistFromEstevanNamedEarlier
had developed a program which could use data from the power usage of
oil-well pumping stations to predict approaching mechanical failure,
and enable the owners to schedule maintenance, thus saving the major
cost of down-time and mechanical failures which were costly due to
breakdown affecting more than the original faulty part.
Let's also say that a Fucking Idiot who swatted a fly on top of his
exposed hard drive, with a newspaper, fucking it up, mechanically, also
discovered that he could 'fix' the internal arms of the hard drive by
writing a program that made the skinny little internal arms of the
drive work their way, over and over again, toward the faulty area, from
alternating sides of the bad spot.
Let's further speculate that the Fucking Idiot speculated that any
computer part that could be mechanically 'fixed' by a repetitive program
could also be mechanically 'fucked' by a repetitive program, and that
the SickFuck had friends who knew everything there is to know about
the internal workings of computer hardware peripherals, mean-time between
failures, and all manner of little-known facts about good and bad design
techniques in a wide range of computer hardware fields.
Lastly, let's speculate that some very BadMenAndWomen with BigGuns
had stolen the SickFucker's computer, and his nephew's computer, and
that he had access to the ThievingPricks' computer systems.
Thus, if it came to pass that the SickFuck could supply his friends
with the details of the computer hardware and peripherals used by the
BadMenAndWomenWithBigGuns, then his friends could write programs which
would put extra strain on the known weak points of the system, drastically
lowering the mean-time between failures.
If the SickFuck had already tested his friend's programs on $ 50.00
used computers he had purchased in Regina, Saskatchewan, then they would
have already been able to tweak the programs into little SickFuck Digital
Roe&WadeBots which would be able to perform mechanical abortions at any
stage of DigitalLabor, thus being able to control the failure rate in
imperceptible increments over a wide range of systems, so that, over the
course of a year, it would cost the BadMenAndWomenWithBigGuns millions of
dollars by the time they figured out that the SickFuck had his Richard
shoved up their asshole.
If the SickFuck's friends in LostAlamo were BrilliantSickFucks, they
might even take it upon themselves to develop a program capable of keeping
track of how the maintainers of various computer systems would deal with
different problems (e.g. 'fixing' vs. 'replacing') and create their little
BrilliantSickFuckPrograms to learn how to force the computer maintainers
to 'replace' the hardware shortly after they had spent their time and
resources 'fixing' the hardware.
Lastly, if the BrilliantSickFucks were very grateful to the SickFuck
for providing them with information which would enable them to write
what one would think would be incredibly complex programs in the space
of a few short hours, the BrillianSickFucks might provide the SickFuck
with simple device-drivers which could use such unlikely hardware as
printers and programmable keyboards to automatically renew backdoors
into compromised systems in the event the backdoor was found and removed.
[Debitor's Note: T. Arthur, after working with the first version of M$
Word which made use of macro's, realized the potential for using them
for distributing Ribbed Trojan Horses, and Digital Simplex Viruses.
T. Arthur, being a nice fellow, took the time and trouble to phone
M$ Support, wait on the line for 342 hours, and inform them that there
was a possible problem with their program being able to transmit RTH's
and DSV's.
The M$ UnSupportive RepresentativeOfTheM$AttitudeAtTheTime, was gracious
enough to take time out of his busy schedule to launch into a long and
acidic beration of T. Arthur as a neophyte computer idiot who was unaware
that everyone in the industry *knew* that "you can't get a virus from
opening a text file."
When T. Arthur related this incident to a group of LostBoys&Girls who
were solving all of the problems of the computer industry, for all of
eternity, using pitchers of Margueritas at the Holiday Inn Bar in
Albuquerque to keep their GreyMatterCPU's from overheating, more than
one of those gathered pointed out that T. Arthur's brain was running
on 12-Volts/DC, because most of them had figured out the potential for
the 'Macro Virus' (to be 'discovered' years later), "before the program's
shrink-wrap had hit the floor."]
Doc Watson, on a grand summer day in Austin, Texas, walked into the
Armadillo Beer Garden while I was playing a song he wrote, 'Tennessee
Stud,' which has a classic guitar riff, which everyone imitates.
Doc complimented me on my rendition of his tune, noting that he was
impressed with my unique 'interpretation' of his famous riff, and that
he found it refreshing to hear someone doing something other than the
standard autobot version.
Being the TruthMonger, I was forced to admit to him that I had first
tried to 'rip off' his licks from the album, but, being a really crappy
guitar player, I was forced to improvise.
It's the story of my life...
Although it is True (TM) that I am TheWorld'sForemostComputerExpert,
I am pretty much only 'expert' in very bizarre areas of computer hardware
and software technology. (In the 'regular' areas of technology, I am only
'expert' in the sense of availing myself of tools, such as those that are
produced by Peter Norton, that allow one to fix the most complicated of
computer problems by following the instructions on the screen, and hitting
the button.)
I had the good fortune to learn about computers from a gentleman who
helped design the Adam motherboards, and to learn about how computers
and softwear 'think' by working with retarded and otherwise disabled
children for many years.
Thus I realize the flaw in the widespread notion that certain computers
or programs are 'intuitive.' No...they are fucking retarded, OK?
Aside from neural networks, and other forms of artificial intelligence,
computers and programs are only 'intuitive' in a situational-specific
way. A database program designed to help you balance your books is quite
simply programmed to anticipate such things as your desire to use integers
and decimals, etc. It is not 'intuitive' if you try to use it to program
your breakfast schedule. Neither is a database program designed to help
you program your breakfast schedule likely to be 'intuitive' as to whether
you might want to eat 1.3 eggs, as opposed to offering you a window which
allows you to choose between poached, fried or scrambled.
To confuse the issue of what I am getting at, here, I would like to
point out that, although I am 'learned' in the C-Programming Language,
having studied it in various systems of higher education, I can't write
a single fucking line of code...
Offer me a million dollars to properly write and compile the standard
'hello.c' program, and a week of work will result in my coming up, best
case scenario, a program which echo's, "Nice try, ShitForBrains."
et, give me a backup tape-drive which is 'Supported' by SCO Unix,
but which doesn't actually work, for myself or for anyone else on the
face of the earth, and I can go through a thousand lines of source code
to find and fix the problem (three years ahead of the SCO engineers who
are 'talking to' Colorado Systems engineers, who will 'fix' the problem
exactly one week before the model becomes obsolete).
Another example which doesn't really connect to any of the other things
I am talking about here (unless you already know what I am talking about,
which *I* don't), is the fact that I found a lot of the early password
programs to be easily breakable merely by noting how long it took the
program to return results after checking various values input.
Similarly, I couldn't help but notice that accessing certain 'hacking'
websites on the InterNet results in a 'loading-time' which is way out of
sync with the amount of data, etc., being transferred. (Or that some of
these websites seem to result in a lot of hard drive activity which can
only be noticed by paying attention to the 'sound' of the hard drive,
since the hard drive light doesn't seem to go on, at all. Hhmmm...)
My point?
Read the original Sun Operating System Manuals...the Writing Device
Drivers manuals, in particular.
ou will be left with the distinct impression that AbsoluteSecurity (TM)
is impossible! et, if you peruse later versions of the manuals, right up
to the current versions, you might notice that they no longer leave the
reader with the impression that AbsoluteSecurity (TM) is VaporWare.
What has changed? Nothing...
While resurrecting my Opus SparCardII after years of disuse, I found
that the little-bitty BatteryGremlins that reside within the CPU chips
had passed away from old-age.
Thus I had to become an EEPROM expert over the next few days, in order
to learn how to tell it to do things like remember its own name, etc.
("What's your name, Bob? Starts with a 'B' and ends with a 'B'...you've
got five seconds, Bob.")
I'm dense/stupid/ignorant/clueless, added to which, I am usually loaded
while working on my computers late at night.
Thus, I make a lot of mistakes. And I find out some of the most amazing
fucking things!
(e.g. In the DOS 3.3 days, before most of you were born, my Drunken
Fingers (TM) discovered that 'dir *.' would list directories and files
without an extension, although this didn't seem to be documented
anywhere. I was pretty impressed with myself until I discovered that
if my Drunken Fingers accidentally added a certain other keystroke to
this combination, then something happened which did irreplaceable
damage to a certain version of BIOS. I was once again impressed with
myself upon finding that, although most programs would no longer run
on the computer, database programs 'smoked' at about ten times the
speed they usually ran. Why? Don't know...don't care.)
What I'm really-really getting at, here, is this:
Except e become as a little, drunken child...
The reason that it is the teens and pre-teens that are hacking into
'secure' government and corporate computers is that they can't afford
to take the $ 5,000.00 computer classes/seminars that 'teach' them what
can, and cannot, be done.
The reason I can roam at will through Canadian Government 'secure'
computer systems is that I am a sorry, fucking asshole, whose Drunken
Fingers know more about computers than my Drunken Mind ever will.
The reason that Echelon can monitor and analyze all of the electronic
communications on the face of the earth, is that they know that the
nature of BIOS, EEPROM, Device-Drivers, etc., is such that, given even
the slightest amount of influence over standards and procedures in the
design and implementation of these things, they will contain series
of MasterKeys which can open a variety of BackDoors, no matter how
complex and well-designed the features of hardware and software that
overlay the basic computer technology and processes.
The reason that I can use RCMP printers to do my bidding on thier
computer systems is that I don't make them do things that they are
not supposed to do, thereby creating SoreThumbs that stick out where
they shouldn't and exhibit signs of dysfunctional pain and suffering
when new programs or updates are added to the mix, but rather, I ask
them to do things that they are *supposed* to do, but haven't been
asked in the manner which I ask them, because those who designed them
only wanted them to do silly, useless tasks, like print words on a sheet
of paper.
Read This Again:
Professer Stephen Grossman, chief cognitator at Boston University's
Department of Cognitive and Neural Systems, has created Thing1 and
Thing2--robots which can adapt to their environment by mastering
approach and avoidance behavior.
He states, "The networks we're building here learn from examples and
exhibit some capability for generalization beyond the training data
we've put into them."
Brian Fitzgerald, in the Summer 1998 issue of Bostonia, points out that
the "neural networks enable the robots to teach themselves...predict
impending impacts, and use the same patterns to suppress movements that
would cause collisions."
Now Think About This:
If I can find ways to make/enable computer hardware and software
perform a wide variety of tasks that was not envisioned by those who
designed them, honestly being merely a semi-computer-literate dweeb
without the sense Dog gave a Goose, then what is to prevent people
who are learned and competent in computer technology and processes
from adapting the capability and functions of computer technology
and processes to ends which go far beyond the simplistic techniques
which they have been programmed/trained to apply to the tasks they
undertake?
More importantly, if, with my own limited knowledge and computer
literacy/competency, I can find ways to route around the damage caused
by the secrecy/censorship of information that others are using to cause
me problems in my life, then what are the possibilities for those who
are involved in the design and implementation of computer technologies
and processes, to design and develop hardware and software that can
be modified/circumvented/paralyzed/compromised if their use becomes
usurped by the Controllers in order to provide Power&Control to an
Elite Segment of Society?
There is currently a thread on the CypherPunks Mailing List which is
discussing the Perjury of RecognizedAuthority being treated differently
than that of Jane and Joe Citizen.
Perusing Perry Mezger's post, I was impressed with the thoughtfulness
and insight that he displayed on the issue, and the quality of questions
he raised in regard to ethics and public attitudes in this area.
Nonetheless, if you ask Tim C. May to check the archives, I think he
will find that I previously dealt with this issue in a simple and a
succinct manner.
I stated, quite simply, that what I found most disturbing was not that
our elected political representatives and a wide variety of government
employees, public, private and corporate figures were in the habit of
lying, but that they no longer even bothered to tell GoodLies (TM).
The bottom line is that it doesn't matter whether you've wrecked daddy's
car, or you are cheating on your spouse, the cost of telling the Truth
grows faster than the interest you owe on a loan from a guy named 'Big
Al.'
The longer that the citizenry avoids confronting THE LIE, in order to
prevent rocking the boat, since "Things aren't really that bad." (ET!),
then the larger the weight of the BadLies will become, and the more they
will become an 'accepted' part of our everyday reality.
The longer that those involved in computer design and implementation
deliver products which reflect only what they are asked to produce to
meet certain, narrow goals, then the greater will become the end-user's
reliance on, and vulnerability to, those who have the money and the
power to set standards and influence the directions and goals of future
computer use.
In effect, what I am saying, is that if those involved in the design
and the implementation of computer hardware and software technology,
standards and processes are not able to "learn from examples and exhibit
some capability for generalization beyond the training data...put into
them," as well as to "predict impending impacts, and use the same
patterns to suppress movements that would cause collisions," then
they might as well pledge allegience to Thing1 and Thing2, because
they will do whatever the GreatBeast programs them to do, and it will
be little comfort to those crushed underfoot to know that those who
fed the GreatBeast at the expense of WeThePeople were "just following
orders."
"They wanted to come for the Jews, and I wasn't a Jew, so I wrote the
program..."
Surprisingly, most of the people I know who are most concerned about
designing hardware and software that resembles a two-sided coin which
can be turned against its Masters, if they become rabid and frothing at
the mouth, work for high-security government and corporate agencies
who go to great lengths to implement 'access enhancement features' in
their products.
The common consensus among them seems to be that the average designer
and programmer can implement sane and effective 'enhancements' to their
products with very little effort, simply by being consious of the myriad
of opportunities, that are constantly present, to 'add' certain features
which lend themselves to include user-friendly control of the product.
As well, they recognize that those who actually *do* the programming
are often much more aware of what design features they can include that
will allow other programmers to produce add-ons or tie-ins which will
allow the end-user to be a participant in their software's functionality,
as opposed to riding a one-way train whose ultimate destination will be
Government and Corporate Auschwitz.
I currently have what might be considered Unauthorized Access to a
variety of computer systems, which could theoretically result in my
being subject to a few million years in prison.
However, thanks to the wisdom and foresight of a few Computer Angels
who design and program high-security government and corporate systems,
I was able to gain access by doing nothing more than simply give myself
the same 'network privileges' as held by those who chose to make my
computer a part of their network, in order to read my files and put in
place programs of their choosing.
{Ownership of my computer bestows upon me the right to set my privileges
to whatever level I desire, and if that allows me the same privileges
throughout a computer network I was linked to with the full consent
of those in charge of it, then I can hardly be faulted for assuming
that I have authorization to use the resources and information that is
available on 'our' network.}
The bottom line, as far as I am concerned, is that the InterNet, by
definition, is an InterActive Medium.
Those who choose to participate in the InterActivity of the Medium
must be prepared to encounter individuals who wish to exercise their
right to participate in the exchange of resources and information, as
opposed to being a passive recipient of whatever the other party, in
their egoistical imaginings of superior position and authority, wish
to bestow upon them.
Anyone who wishes to join their computer to mine in order to check for
dirt under my fingernails had best wash the shit off of their dick before
they do so...
It is understandable that those who design computer hardware and
software would take pains to provide their employers with a product
which empowers them.
However, if they ignore, or pass upon, available opportunities to
empower the end-users, clients and customers of their employers, then
the public becomes, not *beneficiaries* of the designers efforts, but
*victims* of their efforts.
The rEvolution is NOW!
From CTIA_Daily_News at um2.unitymail.com Wed Jul 22 12:53:55 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Wed, 22 Jul 1998 12:53:55 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 22, 1998
Message-ID: <199807221801.NAA05529@mailstrom.revnet.com>
==========================================
Welcome to today's edition of the CTIA Daily
News
from WOW-COM.� Please click on the icon /
attachment
for the most important news in wireless
communications today.
A new multi-billion dollar industry is here!
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications
converge!
Don't Miss Your Chance -- October 12-14,
1998
Bally's Las Vegas, Las Vegas, NV
Call 202-785-0081 for more information.
===========================================
From mmttpx001 at hotmail.com Wed Jul 22 12:56:43 1998
From: mmttpx001 at hotmail.com (mmttpx001 at hotmail.com)
Date: Wed, 22 Jul 1998 12:56:43 -0700 (PDT)
Subject: Look At This
Message-ID: <199807221950.AA02312@atina.ar>
AMERICA'S # HOME BUSINESS
TELEMARKETING GOES MLM
No Selling
No recruiting
Great Income
Call Now,
You have nothing to Lose
I am making $1,000.00 per day, this is my
second day
Call
1 888 443 8971
ID# 2085
The Mailing List that you are being mailed from was filtered against the Global Remove List at: http://remove-list.com
Remove-List is a free public service offering to help the general public get removed from bulk mailings lists and has not sent this message. If you want their help, please add your name to their list and you will not receive a bulk email from us or any other ethical bulk emailer
From ZeroInt.at.birmingham.crosswinds.net Wed Jul 22 13:02:45 1998
From: ZeroInt.at.birmingham.crosswinds.net (ZeroInt)
Date: Wed, 22 Jul 1998 13:02:45 -0700 (PDT)
Subject: (fwd) Topic is Internet server stalkers AKA Cyberpunks
Message-ID: <35b97056.5464309@mail.birmingham.crosswinds.net>
Though this might be of interest
On Tue, 21 Jul 1998 12:40:48 -0500, in misc.survivalism "~The Seventh
Sign~" said:
Nobody important wrote
Hello people I will address this in an off topic way to many of you
but you must learn about the
type of individual we have been dealing with.
1.)Has plenty of time on his hands and may be something else in his
had is you catch my drift.
2.)Thinks it is a cool thing to try to shut down servers and hack into
systems. Use to have his own
web site but not now.
3.)Has use of library computers so he thinks he won't get caught.
4.)Mad at his Dad for not being there for him. Making him made at the
world.
5.)Has been posting sollog crap trying to shut down servers that
burned him.
6.)Thinks 'Archangle'(A well known name in the hackers sites.) is his
mentor.
7.)Has probably send hate mail to you and other members of the group
using the anonymous remailers
rigging the response to finger the other member of the group.
Who's servers is he trying to shut down you ask.
www.theasi.com (Hacking (Don't get your info here a page cost you
$9.95USA), sollog and other
bullshit)
www.theeunderground.net Ditto the above!
www.replay.com Anonymous remailers that he has been abusing like
rubber gloves after hemorrhoid
surgery. You could send the stuff to abuse at replay.com but I think the
little punk wants you to mail
bomb his account. or you could send your complaints to
postmaster at nym.alias.net but you would play
into the little punks hand like I did.
DEFENSE AGAINST THIS ANTAGONIST IS SIMPLE:
whatshitten will be his name from this point on.
Solagged would be good too.
A profit prophet is what sollog is no predictions have ever come true.
Just take my message and repost it under all of his post thank you!
From lreed at west.cscwc.pima.edu Wed Jul 22 13:26:20 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Wed, 22 Jul 1998 13:26:20 -0700 (PDT)
Subject: Robot Tears - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C98FD.02B18AC0.3@west.cscwc.pima.edu>
Robot Tears - SPACE ALIENS HIDE M DRUGS!!!
___________________________________________
If you XOR digital copies of Brave New World, 1984, Terminator and
Terminator 2, They Live, Mein Kamf and One Flew Over The Cuckoo's Nest,
then you end up with copies of Part V, Part VI and Part VII of 'The
True Story Of The InterNet':
Part V - Tears Of A Robot
Part VI - The Day The Screen Came Alive
Part VII - Don't Crush That End-User, Hand Me The Pliars
I have always been much more comfortable transmorgifying the effluvia
excreted from my GreyMatter into ScienceLess Fiction than A Factual
Treatise On A WorldWide Conspiracy To Promote The Belief In The Existence
Of A WorldWide Conspiracy.
As Trooper said, "We're here for a good time, not a long time, so have
a good time, the sun doesn't shine every day."
The reason that the general public is absolutely terrified of being
confronted with the Truth (TM) and Reality (TM) is that they know that
it is a Horrifying Beast capable of ripping their Perceived World View
to shreds and destroying any hope they might have of attaining peace
of mind and tranquillity of soul in this lifetime.
What the average person doesn't realize, however, is that when you make
the supreme effort to face the Truth, whatever it may be, you will find
yourself laughing like a fucking banshee.
our Body, Mind and Soul *will* be subjected to a violent, excruciating
pain beyond human endurance, but your Spirit will laugh its ass off...
When I first read about the InterNet being created by the military, in
order for scientists, researchers, et al, to be able to freely exchange
information in a secure environment, I recognized that they were doing
so with the goal of being able to totally access the complete spectrum
of educational and scientific progress and development.
I took it as a given that their purpose in providing a communal forum
for exchange of information was to have complete access to, and control
over, that information.
To me, this is as plain as night and day. I think it is ludicrous for
supposedly intelligent individuals to have failed to recognized this fact
until the presence of Echelon became public. Well, to be more precise,
until Official Government Recognition of the reality of Echelon's wide-
ranging presence became public.
Of course, I had the advantage of having had the opportunity to become
acquainted with the military's attitude toward, and plans for, the public
and its individual citizens by finding myself at the forefront of their
experimentation in monitoring and controlling the minds of the citizenry,
as well as directing their thoughts, beliefs and attitudes according to
their own desires and goals.
My original insight into this arena of life came from a perspective of
watching and listening, from the ceiling, the medical and scientific
researchers who were below me, casually engaged in manipulating and
modifying the physical tool which they seemed to believe held the secret
to control of my mind.
I gained additional insight into the aims of the Controllers by making
a point of developing self-hypnosis tapes which I used to override the
subconsious suggestions of Dr. Fogel, one of Dr. Hoffer's associates,
before submitting to his hypnosis 'treatments.'
If anyone finds some of the things I say a bit odd, then think about
how 'odd' they would have sounded twenty-or-so years ago.
I have recently read much of the InterNet literature on CIA and military
mind-control experiments, etc., and found it quite humorous the lengths
to which those providing information went to document and verify each and
every instance of what they were describing, and the claims that they were
making, yet still maintaining a subtle undercurrent of "No! Really! I
wouldn't shit you! This stuff is *true*, I tell you! TRUE!!!"
I find it equally humorous that so many of those who have obviously
spent a great deal of time, effort and resources to uncover/discover
the enormous extent of government research and experiments into mind-
control somehow manage to keep from screaming "BullShit!" at the claims
of those involved that they spend decades and millions of dollars in this
area without making any progress, whatsoever, and that they just happened
to have stopped all research and experimentation in mind-control the very
Tuesday before a Congressional (or whatever) investigation decided it was
not a good thing, and they shouldn't be doing it.
And now, the IRS wants to be our best friend...
When I taught for the Bartonian Metaphysical Society and the Institute
of Applied Metaphysics, an agency of the Canadian government that was
involved in PSI research at a university in Toronto used to plant
'spotters' in the classes, to target potential experimentation and
research subjects. According to one of the spotters who had difficulty
holding his liquor and his tongue at the same time, our Saskatoon group
was considered 'untouchable' as a result of a visit by 'friends' of the
organization that was funding their research.
The evening after I read Robert Munroe's 'Journeys Out Of The Body,' I
astral travelled. After reading a book on Lucid Dreaming, I did lucid
dreaming. Upon reading Carlos Castenada's various works, I entered into
many of the same experiences he wrote about. When my mother's persona/
soul went AWOL during her bout with cancer, I bought a book on Shamanism
that told how to travel into the Underworld and retrieve a person's
'animal/animus' and place it back in their body, and I did so.
This is my life...it is not a matter for belief/disbelief or debate.
To me, my life and my capabilities are simply the way it is, and I don't
consider them particularly extraordinary. To me, what is extraordinary is
the fact that pedal-steel players can actually make wonderful music with
those instruments. I tried like hell, and all I could make was noise.
My only real purpose in telling you all of this is to impress upon you
the fact that there is much more going on in the background of government,
life, society, science, etc., than what is readily apparent, not only to
the general public, but even to those who research secret government
activity and projects from the outside, as well as many who work on them
from the inside.
Anyone the least bit familiar with the world of secret intelligence is
aware that it is composed of concentric circles-within-circles, with each
layer remaining mostly a mystery to the layers external to it.
The CIA's involvement in mind-control research was merely the second
inner layer, with the public/private research community being the outer
layer. As mind-boggling and incredulous as the details of the CIA's
involvement may seem, they are merely grunt-workers for inner layers of
agencies and organizations who expand and develop the techniques and
information that filters down into practical applications on both a
macrocosmic and microcosmic level.
To believe that the most essential research and development in military
intelligence is being done by people that you can call or visit at the
local CIA office is naieve, at best.
The CIA, according to my understanding of the military personnel who
were involved with the Saskatchewan Cabal of mind-research, are little
more than heavy-handed amateurs whose chief asset is their willingness
to get involved in projects which have the potential of blowing up in
their faces and requiring complex damage control.
It is my impression that the psychiatric butchery epitomized by Canada's
Dr. Ewen Cameron is typical of operations that are delegated to the CIA,
since the military prefers to experiment on their own personell and
subjects with methods that are unlikely to destroy their minds, to no
apparent purpose.
Although the mind-wiping electroshock techniques used by Dr. Cameron
were apparently used in my 'treatment,' it is my recollection that, rather
than being wheeled into a room with some amateurish, inane, tape-loop
used to 'reconstruct' my mind, there were a variety of psychological and
medical professionals who spent a great deal of time involved in activity
designed to restore/restructure what had previously existed, as well as
creating a variety of new mental paridigms which were designed to be able
to function in a fashion similar to the interlinkable modular structure
of the C-Programming Language.
To tell the truth, although the research and experimentation that I was
subjected to was undoubtedly invasive and unethical, I could see it as
being beneficial to the evolutionary human equation if it was done in an
above-board manner, as opposed to being hidden in the private enclave of
secret agencies, to be used with the goal of outside control of the
minds and behavior of others, without their consent.
Mind-control, as described in terms of the MKULTRA ET AL Projects, is
actually only a single arm of secret-government efforts to monitor and
control the citizenry.
The ultimate goal of the research and experiments in this arena of
human evolution is the combination of an interdisciplinary combination
of methods, processes and techniques which will enable a globalization
of control over humanity--affectionately known by wild-eyed conspiracy
theorists as the New World Order.
If I can restrain myself, for a few hours, from breaking into screaming
fits of rage calling for the public execution of all members of the Royal
Canadian Mounted Police, forthwith, I might just share with you some of
the things that one learns when they read the file which was accidentally
attached to an email from Kent Crispin, which contains a download of the
complete hard drive of the top secret military facility at which he works.
{Hey! Really! Do you think I would just make that up?}
From ILovToHack at aol.com Wed Jul 22 13:43:52 1998
From: ILovToHack at aol.com (ILovToHack at aol.com)
Date: Wed, 22 Jul 1998 13:43:52 -0700 (PDT)
Subject: INTELLIGENT VIRUS
Message-ID:
******************************************************************************
**************************
******************************************************************************
**************************
THIS IS TO BRING OUT THE TRUTH AND INFORM THE PUBLIC ABOUT A POTINTAL THREAT
******************************************************************************
**************************
******************************************************************************
**************************
I was recently informed from sorces who choose to remain annomous about a viri
that uses macafe's update tool to detect when it is found then it modifys its
code and forms a new strain of the virus this pattern continues although it
has only been tested through a clone of macafees server to 100 mutations it
looks like it could be a big problem I will inform you of any more information
i learn about it
but for now "THE TRUTH IS OUT THERE"
From juagarknight at msn.com Wed Jul 22 14:24:01 1998
From: juagarknight at msn.com (juagarknight at msn.com)
Date: Wed, 22 Jul 1998 14:24:01 -0700 (PDT)
Subject: Truth will make us free!
Message-ID: <199807222123.OAA10856@toad.com>
We are an American social activist group called Las Americas, and
we need your help. It is time to end the lies that everyone
publishes about the Chiapas situation. We have to stop the war
now!
We are tired of not being believed: the truth needs your help.
The truth has to be told. Our main purpose is to show what is
really going on in Chiapas. We want the world to know how
neglected the people in Chiapas are.
In order for us to accomplish this mission, we need to provide
tangible proof of all the events. We need pictures, sounds and
video testimonies.
We all have some kind of photographic equipment we don't use
anymore. Right now, send us any type of new or old recording
material:
* Cameras
* Videos
* Tapes
* Cassettes
* Film
* Typewriters
* All kinds of recorders
All of these materials will be distributed to the indigenous
communities so that they will be able to provide proof of their
living conditions. The collected information will make up a huge
and raw testimonial, which will convince even the skeptics that
the war in Chiapas must end.
We are tired of lies being said about Chiapas.
We need your support for this effort.
Take your chances, don't waste this great opportunity to
participate and make a difference.
Send the materials to:
LAS AMERICAS
Attn. President Ronald Granados
12501 East Imperial Highway
Norwalk, CA 90650
You may also remit your suggestions and comments to our
president.
We thank you in advance for your generous contribution and please
forward this e-mail to as many people as you can.
P.S. If you are planning on making a personal visit, please find
information enclose and don't forget to send us your
testimonies!!
http://www.adventours.com
http://www.derechos.org
http://www.globalexchange.org
http://www.NONVIOLENCE.ORG
From ptrei at securitydynamics.com Wed Jul 22 15:19:14 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Wed, 22 Jul 1998 15:19:14 -0700 (PDT)
Subject: Thoughts on the demise of DES
Message-ID:
Well, I'm a happy camper. Single DES is dead as a
credible cipher. I feel *very* vindicated.
I called for the hit, RSA bankrolled it, and the
EFF pulled the trigger. DESChall and
Distributed.net did severe damage, but the Deep
Crack machine was the fatal blow.
While the possiblity of bruting DES has been
discussed at various times in and out of cpunks
for years (for example, see Adam Back's message
of 17 August 1995), my involvement started 22 July
1996, when I proposed a DES crack as a follow on
to the previous autumn's RC4-40 attack:
------------------------------
>Subject: Re: Borders *are* transparent
>Date: Mon, 22 Jul 1996 10:32:47 -6
[...]
>Any one up for a distributed brute force attack on
>single DES? My back-of-the-envelope calculations
>and guesstimates put this on the hairy edge of
>doability (the critical factor is how many
>machines can be recruited - a non-trivial cash
>prize would help).
>Peter Trei
>trei at process.com
---------------------------
This got a flurry of responses, mostly positive,
including some in which Matt Blaze announced his
intention to build a hardware DES cracker.
-----------
Later that day, I had run some more numbers:
>Subject: Re: Brute Force DES
>From: "Peter Trei"
>Date: Mon, 22 Jul 1996 16:55:17 -6
>[...]
>The fastest general purpose, freely available des
>implementation I'm aware of is libdes. by Eric
>Young. With this, I can do a set_key in 15.8 us,
>and an ecb_encrypt in 95 us/block. That adds up to
>about 9,000 keytests/sec (this is on a 90 MHz P5,
>running NT).
[...]
---------------
This looked much too slow, and discussion trailed
off. I was still interested, and grabbed some x386
assembler by Phil Karn, and worked on optimizing
it for the Pentium.
It worked well. A few months later:
http://infinity.nus.edu.sg/cypherpunks/dir.96.09.26-96.10.02/msg00567.html
>Subject: Can we kill single DES?
> From: "Peter Trei"
> Date: Tue, 1 Oct 1996 16:27:18 -6
>[...]
>Unlike many cypherpunks, I actually write code
>(:-). I took Phil Karn's DES386 as a starting
>point, and modified it to run effiiciently on the
>Pentium. The code I've written will run 14 round
>DES (all that is required for a key test app) at
>254,000 crypts/sec on a 90 MHz Pentium.
>[...]
I had managed a better than 25x speedup. My
biggest innovation was a new method of producing
key schedules, which when applied for key search
purposes was a hundred times faster than the
canonical method [Perry doubled the speed by
suggesting the use of Gray codes.]
Later that month, I wrote to Jim Bidzos at RSA,
suggesting a DES challenge, using my prototype's
speed to demonstrate feasibility. He was
interested, and the Symmetric Key Challenges were
born.
Soon other programmers (notably Svend Mikkelsen in
Dennmark) substantially improved on my speed - by
better optimization, and by clever shortcuts which
allowed earlier rejection of bad keys. A major
innovation was use of Eli Biham's 'bitslice'
algorithm, which tested large blocks of keys in
parallel. The speed of his initial implementation
was doubled by the work of Matthew Kwan in
Australia and Andrew Meggs, et. al. at
distributed.net.
By the end of the latest challenge, the fastest
software search engines had speeds (in clock
cycles per test) well over 100x as fast as my
original 10,000 cycle/key estimate.
Here's one more quote from the archives:
>From: "Peter Trei"
>Date: Fri, 7 Jun 1996 12:55:24 -6
[...]
>Prediction: By the millenium, we'll have made
>single DES look about as silly as 40 bit RC4 is
>today.
Written well before I started to think about a DES
crack, this, at least, has come true.
Peter Trei
ptrei at securitydynamics.com
Disclaimer: This has nothing to do with my work
at my employer.
From nobody at remailer.ch Wed Jul 22 17:20:52 1998
From: nobody at remailer.ch (Anonymous)
Date: Wed, 22 Jul 1998 17:20:52 -0700 (PDT)
Subject: INTELLIGENT VIRUS
Message-ID: <19980723004604.645.qmail@hades.rpini.com>
On Wed, 22 Jul 1998 ILovToHack at aol.com wrote:
...
> THIS IS TO BRING OUT THE TRUTH AND INFORM THE PUBLIC ABOUT A POTINTAL THREAT
...
> I was recently informed from sorces who choose to remain annomous about a viri
> that uses macafe's update tool to detect when it is found then it modifys its
> code and forms a new strain of the virus this pattern continues although it
> has only been tested through a clone of macafees server to 100 mutations it
> looks like it could be a big problem I will inform you of any more information
> i learn about it
Oh, this is that virus I heard about which introduces typos and makes
email incoherent! That's old news. AOL users were infected with that years
ago.
From gandalf at waverly.net Wed Jul 22 17:49:54 1998
From: gandalf at waverly.net (Ric V. Carvalho)
Date: Wed, 22 Jul 1998 17:49:54 -0700 (PDT)
Subject: PGP security?
Message-ID:
Hello all,
A friend and I have been going around about the security of PGP.
I believe it to be unbreakable at this point in time. I also recall
recently reading an article which stated that to break a PGP encrypted
message, using today's technology, unlimited computer core availability,
unlimited $$$, it would take the lifetime of 200 Suns.
What is the security of PGP? How secure is it? Are there backdoors that
you know of?
Does the govt. possess any kind of keys capable of opening a PGP encrypted
message?
Thanks in advance for your time and attention.
-Ric
Below is a message I received today concerning what my friend believes
about PGP.
Does anyone know anything to substantiate this claim?
*************************Message Separator********************************
Hi again ric,
PGP stands for "Pretty Good Privacy" (you know that).. but it called
"PRETTY GOOD" because it has several back doors for LEO and government
agencies... I have a masters degree in Electrical Engineering with a
minor in Software design... I think I know a little about computers
also. While at WVU, we routinely broke PGP messages in Under 2 hours.
The government can open them with their key as fast as you can open them
with yours. Just a fact... since it aint bullet proof, Camoflage your
messages.
-War
From ILovToHack at aol.com Wed Jul 22 18:08:30 1998
From: ILovToHack at aol.com (ILovToHack at aol.com)
Date: Wed, 22 Jul 1998 18:08:30 -0700 (PDT)
Subject: INTELLIGENT VIRUS
Message-ID: <8593e6bd.35b68ce8@aol.com>
In a message dated 7/22/98 8:40:15 PM Eastern Daylight Time,
nobody at remailer.ch writes:
<< On Wed, 22 Jul 1998 ILovToHack at aol.com wrote:
...
> THIS IS TO BRING OUT THE TRUTH AND INFORM THE PUBLIC ABOUT A POTENTIAL
THREAT
...
> I was recently informed from sources who choose to remain anonymous about a
viri
> that uses McAfee's update tool to detect when it is found then it modifies
its
> code and forms a new strain of the virus this pattern continues although it
> has only been tested through a clone of McAfee's server to 100 mutations it
> looks like it could be a big problem I will inform you of any more
information
> i learn about it
<>
This is a new version of the viri it makes your computer WIN98 or 95 shutdown
every 5 minutes
From jya at pipeline.com Wed Jul 22 18:36:01 1998
From: jya at pipeline.com (John Young)
Date: Wed, 22 Jul 1998 18:36:01 -0700 (PDT)
Subject: Netscape FOIA Docs
Message-ID: <199807230135.VAA16726@camel7.mindspring.com>
We offer the FOIA docs EPIC got on Netscape's
presentation for export of cryptographic products
which was cited in the July 20 Network World report
on NSA's long, strong arm:
http://jya.com/nscp-foia.htm
From pooh at rboc.net Wed Jul 22 19:13:34 1998
From: pooh at rboc.net (Robert A. Costner)
Date: Wed, 22 Jul 1998 19:13:34 -0700 (PDT)
Subject: INTELLIGENT VIRUS
In-Reply-To: <8593e6bd.35b68ce8@aol.com>
Message-ID: <3.0.3.32.19980722221137.03a4f034@mindspring.com>
At 09:07 PM 7/22/98 EDT, ILovToHack at aol.com wrote:
>This is a new version of the viri it makes your computer WIN98 or 95 shutdown
>every 5 minutes
Sounds more like an operating system design feature to me.
From billp at nmol.com Wed Jul 22 19:54:03 1998
From: billp at nmol.com (bill payne)
Date: Wed, 22 Jul 1998 19:54:03 -0700 (PDT)
Subject: NSA willfully and knowingly attempted to sabotage DOE/Sandia cryptographic projects
Message-ID: <35B6A3FB.3CAD@nmol.com>
Wednesday 7/22/98 8:39 PM
Softwar
Charles R. Smith follows the money trail of U.S. crypto policy.
http://www.aci.net/kalliste/
7707 Whirlaway Dr. Midlothian, VA 23112
TOLL FREE 1 - 877 - 639 - 1608
softwar at us.net
http://www.us.net/softwar/
Smith
I will send by snail mail a copy of July 6, 1998 FOIA request
951102002 response from Herbert Richardson for
all investigative report authored at DOE in to my allegations
that NSA willfully and knowingly attempted to sabotage DOE/
Sandia cryptographic projects.
plus enclosures.
I will phone later for your input on what I should do for further
action. Other than appeal, of course.
Some at Sandia got into a crypto battle with NSA.
http://jya.com/whpfiles.htm
Let's all hope for settlement before matters get WORSE.
And matters are GETTING WORSE. http://www.jya.com/whp071598.htm
bill
From gustavoh at sysadmin.com.br Wed Jul 22 19:59:17 1998
From: gustavoh at sysadmin.com.br (Gustavo Henrique)
Date: Wed, 22 Jul 1998 19:59:17 -0700 (PDT)
Subject: pgp fingerprint
Message-ID: <3.0.5.32.19980722235815.00b8e780@208.30.28.18>
I've just started studying pgp and crypo and I have a doubt that
maybe you can answer.
Correct me if I'm wrong:
the fingerprint was invented so you can check with the owner of the
public key if his key is correct. Since the fingerprint is something
small, you can check it over the phone or some other way.
The question is: why people put their fingerprints on a mail signature ?
Some one could have changed his public key and changed his message, so
that fingerprint will match a wrong public key.
Isn't it the same nonsense as putting the public key in an email message
(without
signing nor encrypting it) ?
Thanks for the attention,
Gustavo Henrique
=============================================================
Gustavo Henrique Maultasch de Oliveira Sysadmin.com.br
gustavoh at sysadmin.com.br http://www.sysadmin.com.br
=============================================================
From freenow2000 at mailexcite.com Wed Jul 22 20:02:30 1998
From: freenow2000 at mailexcite.com (CF ASSOCIATES)
Date: Wed, 22 Jul 1998 20:02:30 -0700 (PDT)
Subject: ...Are You In Need Of A Lifestyle Change...?
Message-ID: <419.435998.95964178freenow2000@mailexcite.com>
Now for the first time ever you have the opportunity to join the most
extraordinary and most powerful wealth building program in the world!
Because of your desire to succeed, you have been given the opportunity
to take a close look at this program.
If you're skeptical, that's okay. Just make the call and see for
yourself. My job is to inform you, your job is to make your own
decision.
If You Didn't Make $200,000.00 Last Year...
You Owe It To Yourself And Your Family To Give Our Program
Serious Consideration!
Also, when you start making this kind of money within weeks, after
joining our team, you will actually learn how you can preserve it and
how to strategically invest it!
I invite you to call me for more details at 1-800-781-7046 Ext 4766.
This is a free 2 minute recording, so call right now!
Prosperous regards,
Michael Simmons
This Is Not Multi Level Marketing/Serious Inquiries Only
This is a one-time mailing. When you visited one of our webpages you indicated
that you would be interested in this information, if not please excuse
the intrusion and simply delete this message.
Thank you
From gandalf at waverly.net Wed Jul 22 21:23:37 1998
From: gandalf at waverly.net (Ric V. Carvalho)
Date: Wed, 22 Jul 1998 21:23:37 -0700 (PDT)
Subject: PGP 5.0 AND 5.5.5/ RSA/DSS SECURITY
Message-ID:
I have a question.
I have been using PGP since version 2. I recently picked up the shareware
version of PGP 5.0/5.5.5
I have both. I was wondering how secure DSS is? Also, I was interested in
knowing if the RSA encrytion method used in 5.0 or 5.5.5 is in anyway
different from say version 2.6.3 Is it looser, more penetrable? How
vulnerable are these versions compared to the older versions?
Thanks in advacne for your time and cosideration.
Life, Liberty, Property,
-Ric
--
Alpha Group Web Site
Http://www.mindspring.com/~warlord1
Encryption, use it or lose it!
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGPfreeware 5.5.5 for non-commercial use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=Lykr
-----END PGP PUBLIC KEY BLOCK-----
"To see tomorrow's PC, look at today's Macintosh."
--Byte Magazine
" There can be no compromise on basic principles.
There can be no compromise on moral issues. There can be no compromise
on matters of knowledge, of truth, of rational conviction." -Ayn Rand
"The government has no source of revenue, except the taxes paid by the
producers. To free itself -for a while- from the limits set by reality,
the government initiates a credit con game on a scale which the private
manipulator could not dream of. It borrows money from you today, which is
to be repaid with money it will borrow from you day after tomorrow, and so
on. This is known as "deficit financing." It is made possible by the fact
that the government cuts the connection between goods and money. It issues
paper money, which is used as a claim check on actually existing goods-but
that money is not backed by any goods, it is not backed by gold, it is
backed by nothing. It is a promissory note issued to you in exchange for
your goods, to be paid by you (in the form of taxes) out of your future
production." -Ayn Rand
From maxinux at bigfoot.com Wed Jul 22 22:37:45 1998
From: maxinux at bigfoot.com (Max Inux)
Date: Wed, 22 Jul 1998 22:37:45 -0700 (PDT)
Subject: pgp fingerprint
In-Reply-To: <3.0.5.32.19980722235815.00b8e780@208.30.28.18>
Message-ID:
I dont quite understand your question, but in PGP 6.0, they will use
pictures aswell.. It is all fakeable.. but verify all info somehow verify
key-id, fingerprint, picture etc.
-- Max Inux (MaxInux at bigfoot.com) UIN: 207447, http://khercs.chipware.net
Strong Cryptography makes the world a safer place- PGP: 0x5CCFCA59
Or Kinky sex makes the world go round- Christie: Your in my sig too
^^ If Cryptography is outlawed, only outlaws will have cryptography ^^
On Wed, 22 Jul 1998, Gustavo Henrique wrote:
>
> I've just started studying pgp and crypo and I have a doubt that
> maybe you can answer.
>
> Correct me if I'm wrong:
> the fingerprint was invented so you can check with the owner of the
> public key if his key is correct. Since the fingerprint is something
> small, you can check it over the phone or some other way.
>
> The question is: why people put their fingerprints on a mail signature ?
> Some one could have changed his public key and changed his message, so
> that fingerprint will match a wrong public key.
> Isn't it the same nonsense as putting the public key in an email message
> (without
> signing nor encrypting it) ?
>
>
> Thanks for the attention,
>
> Gustavo Henrique
>
> =============================================================
> Gustavo Henrique Maultasch de Oliveira Sysadmin.com.br
>
> gustavoh at sysadmin.com.br http://www.sysadmin.com.br
> =============================================================
>
>
From bill.stewart at pobox.com Thu Jul 23 01:16:06 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Thu, 23 Jul 1998 01:16:06 -0700 (PDT)
Subject: PGP security?
In-Reply-To:
Message-ID: <3.0.5.32.19980723010758.00b9a920@popd.ix.netcom.com>
The message from your friend is a purely fabricated troll;
don't worry about it.
At 06:41 PM 7/22/98 GMT, Ric V. Carvalho wrote:
>A friend and I have been going around about the security of PGP.
>I believe it to be unbreakable at this point in time. I also recall
>recently reading an article which stated that to break a PGP encrypted
>message, using today's technology, unlimited computer core availability,
>unlimited $$$, it would take the lifetime of 200 Suns.
Is that 200 Sun Microsystems Computers, or 200 of those big yellow things? :-)
Some previous versions of PGP had some weaknesses.
PGP version 1 had the cool "Bass-O-Matic" algorithm, before
Phil learned cryptography; read his discussion of Snake Oil in the manuals.
I think some of the early versions had weaknesses in their random
number generators used for session keys, but I may be mixing
that up with Netscape, which definitely used to have that problem.
One of the current concerns is that the popular version 2.6.2 et al
use the MD5 hash, which is starting to show some theoretical weaknesses,
though none of them are known to be exploitable against PGP,
but the newer versions prefer to use SHA-1 as a hash just in case.
There was also a serious problem which allowed an attacker to
create a public/private key pair with the same keyID as a target
(much shorter key, so quick to create, and who checks key length?),
so the newer versions use a different method for creating keyIDs
that's hard to spoof. Early versions also used shorter KeyIDs,
so it was possible to get a collision by brute force, so the keyIDs
were made longer. Impersonating a KeyID makes it possible to fake
signatures, and also possible to trick PGP or the user into trusting the
wrong key, which is always bad.
The secret key ring file has two current weaknesses,
which matter if somebody can access your file (so don't let that happen!)
One is that if you have wimpy passphrases, a dictionary attack can
crack the record containing your private key, at which point you lose -
so don't use a wimpy passphrase, AND do protect your secret keyring well.
Another, less serious is that the file contains the user name in plaintext -
so if you're trying to hide your secret identity, someone reading the file
will see that you not only have keys for Clark Kent, but also for Superman;
in some environments, this can be more dangerous than cracking the
passphrase, because the guys with rubber hoses can get your passphrase
once they know they want it.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From lreed at west.cscwc.pima.edu Thu Jul 23 01:45:35 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Thu, 23 Jul 1998 01:45:35 -0700 (PDT)
Subject: TR3 - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9964.46C72D20.1@west.cscwc.pima.edu>
Terminating Resistor III - SPACE ALIENS HIDE M DRUGS!!!
________________________________________________________
IMPORTANT NEWS FLASH!!!
_______________________
I HAVE JUST LEARNED, FROM A RELIABLE SOURCE, THAT SECRET GOVERNMENT
AGENCIES ENGAGE IN ACTIVITIES THAT ARE FORBIDDEN TO / ILLEGAL FOR
THE AVERAGE CITIZEN TO ENGAGE IN!
OK, so it doesn't come as a major surprise to anyone.
Nevertheless, our world-view tends to be limited to, and shaped by, the
information that we are 'allowed' to access. Even if we are aware of the
fact that the government is undoubtedly going full-steam ahead in areas
such as cloning research and merger of artificial intelligence with
artificial life forms, we don't give much thought to the implications
and possible consequences of exotic, secret research and experimentation,
because we don't have enough information about what is going on behind
closed government doors to make any judgements.
The information that we *do* get about out-of-control government actions
and policies invariably comes after-the-fact, or at a time that we are
*told* is after-the-fact.
("We stopped doing that years ago. Joe doesn't work here, anymore. We
got rid of the bad apples, and now it's just us GoodGuys left...")
A friend of mine did computer work for an Arizona neurologist who put
electrodes and steel plates in the skulls of monkeys, rabbits, etc., in
order to do brain-mapping (one of the major areas of mind-control
research), in order to study Parkinson's Disease.
The neurologist was approached by a research foundation that was very
interested in giving him a grant to work with children, instead of with
animals. This has become an acceptable area of experimentation (a quick
study of those involved easily links them to a variety of intelligence
agencies). Their offer was refused as a result of the format and structure
of the proposal obviously being geared more toward providing information
and results that had more to do with learning methods to control aberrant
behavior than with benefitting the proposed child subjects.
After his refusal, his current grant was canceled, and he was again
made the offer, which he accepted.
Dr. Ewen Cameron, the Canadian MKULTRA mind-butcherer, was instrumental
in helping the CIA to see the benefit of taking an 'interdisciplinary'
approach to mind-control.
Although Dr. Cameron's basic method was to combine a wide variety of
medical, biological, psychiatric, anthropological, et al, methods using
his own limited knowledge, in your basic VoodooLeeches methodology, the
CIA and military intelligence agencies began consolidating the various
arenas of mind/human-conditioning research and experimentation by helping
to sychronize the research of a wide body of educational and research
professionals in divergent fields of expertise.
As a result of directing the focus and evolution of the majority of
scientific and psychological research in North America through control
of the funding mechanisms and access to research publishing, the American
intelligence community has managed to merge the research community into
an integrated tool for delivering the information and results desired
by the Controllers for their own grand designs.
John Lily, a respected cutting-edge researcher told the intelligence
community to "Fuck off!" when they approached him with an offer to fund
his research on the condition that it become secret/classified.
Lily suddenly found most doors in the scientific community being slammed
in his face, not able to even getting a job sweeping-up after conferences
that he previously had been begged to attend. (In essence, he quickly
found that he couldn't even get elected ScientificDogCatcher.)
Not to worry, there were researchers standing in line to take Lily's
pioneering mind-mapping research to new heights, using experimentation
techniques on human subjects that Lily had too much compassion and
integrity to use on dolphins.
The "Dont ask...don't tell..." military policy on homosexuality in the
armed services has long been an unspoken understanding in the research
community, where the players long ago learned that making an issue of
the ethics of the researchers down the hall throwing niggers off the
roof, to see it they really do have thick skulls, could have negative
reprecussions on their own position and funding.
Many researchers find themselves doing what they consider to be needed
and pertinent research in their projects on their own time, after they
have satisfied the wants and needs of those funding their project.
Of course, if you ask most researchers about the veracity of what I
have just claimed, you will meet with sincere denials, and perhaps even
genuine laughter. However, a relative of mine who is engaged in providing
seminars on effective philanthropic fund-raising makes no bones about the
fact that the success of his seminars revolves around teaching people to
sell their souls while remaining blissfully ignorant of the fact that
they are doing so.
("If murdering a thousand children in my research saves the life of a
single child...")
While I am not in any way suggesting that the majority of researchers
are NaziMonsters, having allowed themselves to be maneuvered into a
position where their research is driven by the goals of those funding it,
their research in 'turning on the gas' is irrevocably linked to research
by loosely connected entities who are being funded to research 'putting
them in the ovens.'
Intelligence agencies' interdisciplinary approach to developing the
ability to monitor and control the minds, beliefs, attitudes, actions
and behavior of the citizenry (in the interests of National Security,
of course), has resulted in what has been openly known by many as the
New Manhattan Project. Just as the Nuclear/Atomic Manhattan Project
was an all-out, top priority effort engaging the premiere players in
a variety of scientific fields, the New Manhattan Project involves a
consolidation of research and activity spanning such diverse arenas
as mind-control, emotional-manipulation, behavioral conditioning,
citizen surveillance-monitoring-classification, and even encryption.
The research and experiments in Artificial Intelligence and Human
Intelligence are intricately linked.
Neural Network models and implementations are based on understanding
and imitating human "operant conditioning, the form of learning in which
animals and humans learn the effects of their actions," as Professor
Stephen Grossberg states.
The Artificial Intelligence approach of Neural Networks is based on
the processing of symbolic information, as opposed to numerical data.
The Controllers have mastered the art of 1984'ish manipulation of the
public mind through media control and spin doctoring, now able to
gather the citizens into an angry torch-carrying mob, chasing the
U.S.ConstitutionMonster back to the castle to defend themselves against
the NewImprovedFourHorsemenOfTheApocalypse. (Any Congressman who is
caught dorking a teenage girl and cheating on his taxes has a fighting
chance of surviving if he can convince the electorate he is 'tough on
crime,' or whatever the current TenSecondSoundByteFadOfTheDay is.)
The Controllers efforts to control access to information are centered
around their need to control the EmotionalSymbolism by which they have
learned to lead the public around by our noses.
The grand Artificial Intelligence push to "develop principled theories
of brain and behavior and incorporating them into machines," as Brian
Fitzgerald writes in 'Bravo New World,' is really part-and-parcel of the
Controllers' designs to guide the future development of the InterNet into
a WorldWideStickyWeb wherein the Medium is capable of manipulating the
user into the position of controlled stooge, rather than a participant,
by being able to monitor, log and analyze the user's basic operant
conditioning, via his or her responses, thus being able to provide the
user with only those options which will lead them in the direction that
is desired by the Controllers.
(An example is the feature of allowing the user to 'customize' the
interfaces they are interacting through, according to their personal
interests, with the AutoBot then serving up generous helpings of pointers
and information beneficial to the provider, instead of a genuine cross-
section of what is actually available on the InterNet.)
{Interest #1 - Anarchy: Today we are providing you with Newt Ginrich's
essay, entitled "What Anarchy Means To Me."
Interest #2 - SPACE ALIENS HIDE M DRUGS!!! Manuscripts: Click on the
provided link to read Ms. Manners Politically Correct Revision of the
manuscripts, which are rated Family Entertainment by CyberNanny.}
The federal government proclaimed the 1990's the Decade of the Brain.
What they neglected to mention is that Military Intelligence has been
put in charge of monitoring, analyzing and shaping the Brain...
CNS (Cognitive Neural Systems) research and development has become a
wholly owned subsiduary of the Air Force super laboratories, the Office
of Naval Research, DARPA (Defense Advanced Research Projects Agency),
the National Science Foundation, and the rest of the Usual Suspects.
ou remember DARPA, don't you--those wonderful folks who gave us the
InterNet which routes all communications through military channels?
ou remember the Office of Naval Research, don't you--those wonderful
folks who developed products and techniques for monitoring all of the
communications on the face of the earth?
Fitzgerald notes, in 'Bostonia,' that "Graduates of CNS work in a
plethora of fields, including psychology, neuroscience, telecommun-
ications, software engineering, economics, finance...medicine...and,
of course, robotics.
Strip away the thin veneer of reliance on the research being conducted
by RespectableInstitutions and what you have is MKULTRA cross-breeding
with Artificial Intelligence to produce a DemonChild whose NeuralNetworks
are a fusion of GrayMatter and a DigitalThisIsWhereouAreGoingToGoToday
AutoBot.
Julia Schickedanz, an MIT professor, remarks on the fact that the
professors involved in CNS research and development "specialize in
seemingly unrelated areas of research."
Right...and the New World Order will result in the globalization of
"seemingly unrelated areas" of the world...
Grossberg, speaking of the 'interdisciplinary' approach to the study
and implementation of Artificial Intelligence, says, "such an approach
is absolutely necessary to theoretically investigate fundamental issues
of mind and brain processes."
I am certain that it is just a 'coincidence' that
two champions of the 'interdisciplinary' approach to research in the
understanding of how the mind works and how it can be manipulated, Dr.
Ewen Cameron, Canadian mind-butcherer, and Professor Grossberg CyBorg
Creator, are each a Rockerfeller GoldenChild.
Grossberg apparently spent decades and millions of dollars discovering
what he could have learned by forking over a sawbuck for a book by the
GrandaddyOfInterActiveMediaUnderstanding, Marshal McCluhan, 'The Medium
Is The Message,' as he informs us, belatedly, "What we perceive depends
on how the nervous system processes messages."
And those wonderful folks who provided us with an interactive medium
which they are capable of monitoring and controlling, are now involved
in a priority funding of research which will enable the medium to be
able to process/provide messages which are intricately linked with the
structure and functioning of our own nervous system.
More importantly, the ability of the computer to monitor our habits and
the most infinitesimal details of our personal lives, when combined with
a neural network capable of learning and adapting to our thoughts, our
desires and our habits, essentially has the capacity to transform itself
into a Mythological Siren of the Deep, luring us to our destruction,
regardless of whether or not we know it to be an Illusion.
(If you think I am overstating my case, here, remind yourself how easy
it is for Charlie CorporateMonger to get JoeSixPack to provide every
detail of his life in order to get a SuperMarketValueCard that gets
him a nickle off on a can of beans. If they had a record of your visits
to and file accesses on the BigBreastedBlonde Web Site, they would have
a Swedish Masseuse bring you the card to fill out, and end up with your]
wallet, your car and your house, as well, and you'd be eating your beans
out behind the dumpster.)
In essence, Artificial Intelligence researchers are attempting to find
ways to incorporate the ability to understand and incorporate human
behavior and response mechanisms into programmed machines/environments,
thus rendering them capable of fulfilling functions which humans normally
require decades of experience and application to acquire competence in.
During my last entry into the U.S. through the Vancouver Customs port,
my sister was horrified to learn that the devices in each lane were
visually and auditorily monitoring those who passed through. License
plates are auto-scanned and run through the computer to flag people of
interest to Border Authorities (and I suspect that visual recognition
technology of humans is also being used/tested).
The vehicle in front of us contained your typical middle-class American
family, and was passed through with only perfunctory attention being
given to them, yet the Customs Officer thumped on the top and side of
their car before waving them to proceed, as if checking to make sure that
they didn't have a few hundred kilos of heroin stashed away.
My sister was puzzled as to why he did that, whereupon I explained that
he was not interested in *their* reaction, but in *mine*, since I was next
in line, the computer had flagged me, and someone inside was undoubtedly
listening to see if I told her, "Are you sure you hid the dope?"
Some of the Artificial Intelligence AutoBots of the future will no
doubt be MultiMedia HumanResponse LieDetectors.
Rather than measuring your pulse, breathing rate and electrical
tension, they will measure variations in your Personally Categorized
Basic Neural Network Profile.
Just as gun ownership can be denied today on the basis of a history
of mental problems or criminal activity, certain activities, rights,
or access to information, in the future, will be based on your meeting
guidelines/profiles as judged by your interactions with AutoBots that
are designed to analyze and categorize your mind and behavior.
Grossberg maintains, "All conscious states are resonant states.
And resonance can join cognition to emotion in a unified conscious
experience."
The implication of this is that the Artificial Intelligence that is
being developed to work in parallel with the human brain and the elements
of human behavior will be capable of becoming a 'partner' in our thoughts,
emotions, and consciousness, and thus be an integral part of that which
influences the direction and processes of our mind, psyche and behavior.
Take a moment to think about the full import of the technology which
will shape our future being shaped and directed almost wholly by Military
Intelligence agencies and their associates.
Advertising psychology and MKULTRA mind-control research are barely
poor-cousins to the Cognitive Neural Systems technology that is being
prepared to not only monitor, analyze and categorize even the most
minute areas of our mind, emotions, psyche and behavioral patterns,
but also to have the capacity to adapt *their* behavior to our own
personal psychological structure and, as in the case of Thing1 and
Thing2, "predict" our "impending impacts" with the desires of the
Controllers, and direct us toward "avoidance behaviors" which will
"suppress movements that will cause collisions" with the goals and
designs of the Controllers.
It can't be long before the Trilateral Commission is replaced by
the Trilateral CPU...
From howree at cable.navy.mil Thu Jul 23 04:01:26 1998
From: howree at cable.navy.mil (Reeza!)
Date: Thu, 23 Jul 1998 04:01:26 -0700 (PDT)
Subject: Iz thiz real?
In-Reply-To: <009C9964.46C72D20.1@west.cscwc.pima.edu>
Message-ID: <3.0.5.32.19980723200049.00867400@205.83.192.13>
This reads as real, not the mindless rehashing of almost'was that typically
characterizes the posts from "Linda Reed".
Linda, are you sure you didn't eat the drugs, and imagine you were a space
alien?
Reeza!
Text follows:
> A friend of mine did computer work for an Arizona neurologist who put
>electrodes and steel plates in the skulls of monkeys, rabbits, etc., in
>order to do brain-mapping (one of the major areas of mind-control
>research), in order to study Parkinson's Disease.
> The neurologist was approached by a research foundation that was very
>interested in giving him a grant to work with children, instead of with
>animals. This has become an acceptable area of experimentation (a quick
>study of those involved easily links them to a variety of intelligence
>agencies). Their offer was refused as a result of the format and structure
>of the proposal obviously being geared more toward providing information
>and results that had more to do with learning methods to control aberrant
>behavior than with benefitting the proposed child subjects.
> After his refusal, his current grant was canceled, and he was again
>made the offer, which he accepted.
>
> Dr. Ewen Cameron, the Canadian MKULTRA mind-butcherer, was instrumental
>in helping the CIA to see the benefit of taking an 'interdisciplinary'
>approach to mind-control.
> Although Dr. Cameron's basic method was to combine a wide variety of
>medical, biological, psychiatric, anthropological, et al, methods using
>his own limited knowledge, in your basic VoodooLeeches methodology, the
>CIA and military intelligence agencies began consolidating the various
>arenas of mind/human-conditioning research and experimentation by helping
>to sychronize the research of a wide body of educational and research
>professionals in divergent fields of expertise.
> As a result of directing the focus and evolution of the majority of
>scientific and psychological research in North America through control
>of the funding mechanisms and access to research publishing, the American
>intelligence community has managed to merge the research community into
>an integrated tool for delivering the information and results desired
>by the Controllers for their own grand designs.
>
From marketinfo at imarket.cc Thu Jul 23 05:06:11 1998
From: marketinfo at imarket.cc (marketinfo at imarket.cc)
Date: Thu, 23 Jul 1998 05:06:11 -0700 (PDT)
Subject: Discover Your Family History - Rated "Cool Site of the Week"
Message-ID: <199807221748.NAA26766@smtp.leading.net>
Discover Your Family History - Rated "Cool Site of the Week"
Come visit our website at,
Free
Search
(if the above link is busy please use...)
Free
Search
Do you know WHO your ancestors are and WHAT they did?
Do you know WHEN your surname first appeared?
Are you curious about WHERE your family roots originate?
Now you can fill in the missing pieces of this puzzle.
Join the satisfied multitudes who have discovered their complete Family Surname History.
All Nationalities. It's easy. Just key your last name into our online
index, and in seconds we will tell you it's origin and much MORE. See if we've researched your complete family name history during our 25 years of professional research.
Read a sample history, plus - FREE Coat of Arms keychain with your
family's most ancient coat of arms & crest. All in full color. Your
family name history parchment is 11 x 17", approximately 1700 words. It is beautifully ILLUMINATED by your most ancient Coat of Arms in full authentic Heraldic Colors. Over 500 URLs on family and heraldic
history.
Please come visit our website at,
Free
Search
(if the above link is busy please use...)
Free
Search
Hall of Names International Inc.
1-888-My-Roots (1-888-697-6687)
[remhon at yahoo.com]
Come Visit.
From lego at sbccom.com Thu Jul 23 07:59:57 1998
From: lego at sbccom.com (Todd Bowers)
Date: Thu, 23 Jul 1998 07:59:57 -0700 (PDT)
Subject: No Subject
Message-ID: <19980723145638736.AAA266@oemcomputer>
cool ..... i am 13
From billp at nmol.com Thu Jul 23 08:15:21 1998
From: billp at nmol.com (bill payne)
Date: Thu, 23 Jul 1998 08:15:21 -0700 (PDT)
Subject: allahu akbar crowd
Message-ID: <35B7527E.B9@nmol.com>
Thursday 7/23/98 9:06 AM
John Young
Nice to talk to you last night.
I am concerned too about what may happen. http://caq.com/cryptogate
So was Hans Buehler. He phoned me from Zurich to discuss
his concerns several years ago.
Getting things settled is up to congress.
Rep McKinney and Sen Grassley are the contact points. Both got
copies of the Swiss Radio International tapes.
Buehler, later, on the phone seemed resigned to what may happen.
Nothing he can do about it.
But there is something congress can do about it.
GET IT SETTLED!
bill
From Skoitch at aol.com Thu Jul 23 09:22:16 1998
From: Skoitch at aol.com (Skoitch at aol.com)
Date: Thu, 23 Jul 1998 09:22:16 -0700 (PDT)
Subject: W.A.Y.
Message-ID:
WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?
From mctaylor at mta.ca Thu Jul 23 10:34:30 1998
From: mctaylor at mta.ca (M Taylor)
Date: Thu, 23 Jul 1998 10:34:30 -0700 (PDT)
Subject: Pegasus email, internal DES encryption?
Message-ID: <3.0.5.16.19980723142953.295f0d66@mailserv.mta.ca>
I've been sent this requst indirectly, and thought it best to forward it to
these lists, anonymously. I will forward any replies to the original sender.
-M Taylor
-------------------
Hi guys.
Sorry that this is a little off topic, but I figure that here is my best
chance to find this information, all other resources (save damned
reverse engineering) having been exhausted.
If you have used Pegasus mail before, you would know that it provides an
internal encryption function. This is some form of DES, accourding to
their web site, and is presumably < 40 bits, as they quite happily allow
worldwide downloads of the binard from the US. However, actual details
on which form of DES, and how they turn an input password into a key
were not supplied.
Now, my company decided that this encryption was just dandy for
security, and that everyone should use it for all encrypted mail. This,
along with their idiocies about passwords used have me quite annoyed -
but that is *far* from the point of this.
What I am wanting to do, so as not to have to give up my nice, efficient
unix mailer, while retaining the abilitiy to work with others is
implement (or locate an implementation of) the Pegasus encryption, and
then do a little hacking and add that to my mailer.
The main problem is: no idea what the format of the DES used is.
So, if anyone could supply me with a simple answer to this question, I
would be very apreciative.
Thanks,
xxxx
From CTIA_Daily_News at um2.unitymail.com Thu Jul 23 11:44:32 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Thu, 23 Jul 1998 11:44:32 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 23, 1998
Message-ID: <199807231746.MAA01562@mailstrom.revnet.com>
==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.� Please click on the icon / attachment
for the most important news in wireless communications today.
A new multi-billion dollar industry is here!
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!
Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV
For more information, visit http://www.wirelessit.com
===========================================
From billp at nmol.com Thu Jul 23 12:11:15 1998
From: billp at nmol.com (bill payne)
Date: Thu, 23 Jul 1998 12:11:15 -0700 (PDT)
Subject: encryption devices, radiation-hardened devices , Forth and an INTELLIGENT UPS
Message-ID: <35B789A8.CD9@nmol.com>
Thursday 7/23/98 12:16 PM
John Young
I am looking at http://www.jya.com/cr072298.txt
REASON we did the 8051 Forth at Sandia is that I was ORDERED by
department manager Kent Parsons to port Forth from the 8085
to the 8051.
Sandia built a radiation-hardened 8085 chip set.
However, the 8085 took up lots of room and did not have timers, serial
expansion, bit-addressable registers/memory, on-board UART, etc.
Parsons helped convince Sandia upper management to build the 8051 as
a rad-hard part.
The guys doing the 8051 testing of the Sandia rad-hard part were writing
SIMPLE machine language programs to test the part.
Like hooking an LED to a port, flashing the LED, to see when it quit
while being irradiated.
We pointed out that running Forth itself exercises much of the 8051.
In addition writing test code for the instructions and hardware not
directly exercised by Forth was easy, in comparison to other software
technologies. Either in high-level Forth or Forth assembler.
I managed a contract for Jerry Boutelle, author of the Nautilus II
metacompiler, to write test code for Sandia's 8051 rad-hard part.
Then, of course, I wrote a SANDIA-APPROVED book about our port of 8085
FIG Forth to the 8051.
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
And we shared the source code and documentation with anyone interested
in learning what we did.
http://jya.com/f86/whpf86.htm
http://jya.com/whpfiles.htm
While writing this note, I am watching an 8051 Forth run the test code
: XX 2 BASE ! 0
BEGIN DUP U. 1+ ?TERMINAL
UNTIL ;
to see how many 8051 machines still work.
Let�s switch subject to A NEW INNOVATION in Uninterruptable Power
Supplies.
Yesterday I bought a CyberPower Power 98/250VA for all for $59.95! at
Best Buy. http://www.cyberpowersystems.com/
Previously I looked at CompUSA at a APC 250 which had a rebate making
the final cost $79.99. But NO MICROCONTROLLER and, thus, no brains.
CyberPower has a MICROCONTROLLER in it.
http://www.cyberpowersystems.com/products.cfm
Here is what you get.
1 lead/acid battery
2 SERIAL PORT in the UPS
3 Three UPS sockets - one for a transformer
4 Three surge-protected sockets - one for a transformer 450 joule
5 3.5 diskette containing Win 3.xx/9x software
6 One 9 pin rs232 cable
7 One 6 foot rj11 cable
8 Two rj11 surge-protected sockets.
Here is the idea.
The UPS monitors the line voltage.
When the line voltage fails, then the UPS switches to battery.
The UPS then sends a message to your PC over the rs232.
The CyberPower software then closes all open files then turns
off your PC.
I am only running our PC and 15 inch screen from the battery backed up
supply. Modem and printer go to the surge-protected sockets.
I pulled out the plug to the CyberPower Power 98/250VA and
it switched over to battery.
I noticed some lines across the screen. I attribute the lines to dc/ac
conversion and voltage step-up.
UNFORTUNATELY, I am using com1 for our mouse and com2
for our external modem.
Therefore, I am not able to try the software yet.
Alternative I have to fix this problem are get a
1 PS2 mouse and free-up com1
2 get another serial card for about $20.
Green return receipt request card received today indicated that
http://www.jya.com/whp071598.htm was received on Friday July 17, 1998
Let�s all hope this HORRIBLE matter gets settled soon so we can all move
on to OTHER constructive projects.
Later
bill
From carol.woolley at lmco.com Thu Jul 23 12:35:18 1998
From: carol.woolley at lmco.com (Woolley, Carol)
Date: Thu, 23 Jul 1998 12:35:18 -0700 (PDT)
Subject: crypto on extranet questions
Message-ID:
We are designing an extranet for our non-employees, customers, and partners
to work on program information. All users will be authenticated by personal
digital certificates that we will issue from our Netscape Certificate
Server.
It is my understanding that users from Canada, Italy, and Norway must have a
certificate encrypted at 56 bit. Are you aware of any other
restrictions/requirements?
The crypto law survey mentions use of Trusted 3rd parties for Italy and
Norway. Are there commercial companies that act as Trusted 3rd parties?
look forward to hearing from you.
carol
carol.woolley at lmco.com
From Ant6menace at aol.com Thu Jul 23 12:52:28 1998
From: Ant6menace at aol.com (Ant6menace at aol.com)
Date: Thu, 23 Jul 1998 12:52:28 -0700 (PDT)
Subject: Pipe bombs r better
Message-ID: <3d259bf6.35b79455@aol.com>
they rule!
From listmaster at extensis.com Thu Jul 23 14:57:18 1998
From: listmaster at extensis.com (listmaster at extensis.com)
Date: Thu, 23 Jul 1998 14:57:18 -0700 (PDT)
Subject: Get the most of Quark 4.0 - with Extensis QX-Tools
Message-ID:
Announcing Extensis QX-Tools 4.0 for QuarkXPress 4.0
Now, get the most out of QuarkXPress 4.0 - with Extensis QX-Tools 4.0
http://www.extensis.com/qxtoolsp
� Now available for Mac and Windows.
� NEW! Convert EPS, PostScript, and PDF files into editable Quark Objects.
� NEW! Create and apply styles to objects.
� Improved! Re-scale groups of objects- without losing the option to undo.
� Plus, 5 other must-have tools that get the most out of QuarkXPress 4.0
On July 10, 1998 QX-Tools 4.0 Won "Best of Show" at MacWorld.
Here's what they've been talking about�.
Extensis QX-Tools gets the most out of QuarkXPress 4.0 by putting
your creative ideas to work - faster. QX-Tools 4.0 incorporates 8
different tools that use the familiar interfaces you already know.
Spend your time designing, not learning new software.
With NEW QX-VectorEdit, convert any PostScript file into an editable
Quark object. Word tables, Excel charts, Illustrator, FreeHand, and
PDF files now become Quark objects. Edit them, correct them, trap
them or fix their colors - right in QuarkXPress. Once edited, assign
the object to a layer with QX-Layers. Yes, layers ARE possible in
QuarkXPress. Create, show, hide, reorder and assign any object to
any layer in your document.
Improved QX-Scaler lets you size and resize groups of objects - with
precision- without ever losing the option to undo. Once applied, you
can change any of the object attributes with NEW QX-ItemStyles.
Create and apply item styles to OBJECTS- using over 50 different
attributes. Now, quickly navigate through your documents with
QX-Viewer, a full-color, multi-spread preview. Then, apply the same
QX-ItemStyle to objects throughout your document for speed and
consistency.
With three other useful tools-QX-FineTune (tweak characters and
objects), QX-Palettes (they're dockable!) and QX-Find-Change (search
and replace for objects by attribute)-QX-Tools will put your creative
ideas to work in QuarkXPress- in no time.
Now, make QuarkXPress 4.0 work the way you REALLY want - with
Extensis QX-Tools 4.0.
SPECIAL OFFER:
Order QX-Tools 4.0 NOW for only $149.95
To ORDER, download a free demo, or for more information, please visit:
http://www.extensis.com/qxtoolsp
Or call Extensis at (800) 796-9798 or (503) 274-2020.
Extensis QX-Tools 4.0 is available for both Mac and Windows.
Extensis QX-Tools 4.0 is compatible with QuarkXpress � 4.03.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PS. We have made every effort to ensure this message is being sent
only to people who have expressed interest in Extensis products.
If we have sent this to you in error, please accept our apologies
and reply with REMOVE in the subject line for automatic exclusion
from future communications. If you know someone who would like to
be on our mailing list have them send an email to
listmaster at extensis.com with ADD in the subject line and their
email address in the body.
P.P.S. This message is intended for North American customers.
If you are located outside of North America and have received this
message, please visit www.extensis.com/purchase/ to find the nearest
local distributor in your country.
From intl-sales at installshield.com Thu Jul 23 15:54:36 1998
From: intl-sales at installshield.com (InstallShield International Sales)
Date: Thu, 23 Jul 1998 15:54:36 -0700 (PDT)
Subject: InstallShield Important Download Information
Message-ID:
Hello,
Thank you for visiting the InstallShield Website.
We would like to let you know that you can contact us for
information you may require about our company, our
products or our websites.
We also have an international network of resellers and distributors
that maintain stock and can provide the software
to you quickly. They offer the convenience of
acquiring the product in local currency and support in
your local language.
In Czech Republic you can obtain products from the following company:
Unicorn Distribution
Rohacova 83
Praha, 3 130 00
Czech Republic
Phone: +420 (2) 697 2202
Fax: +420 (2) 697 11 95
Email: jaros at unicorn.cz
If you find that you are not happy with our resellers, please
hit REPLY and let us know immediately.
We are here to assist you in any way that we can to get the
most from our products, our company, our partners and our website.
Any comments, questions or concerns you may have are more
than welcome. Just let us know if there is anything we can do for you.
Once again, thank you for visiting the InstallShield Website.
The password for the InstallShield5.1 evaluation is "AlbertCamus"
Regards,
International Sales Department
intl-sales at installshield.com
+1-(847) 517-8191 voice
+1-(847) 240-9138 fax
From ODL at odlink.com Thu Jul 23 17:24:55 1998
From: ODL at odlink.com (ODL at odlink.com)
Date: Thu, 23 Jul 1998 17:24:55 -0700 (PDT)
Subject: Grand Opening Computer Sale
Message-ID: <989.283923.689449 ODL@odlink.com>
We apologize if this electronic mail was an inconvenience, if you
would like to be removed from future mailings please send your
email address to remove at odlink.com
If you would like to be emailed monthly on special closeout items
send your email address to yes at odlink.com
If you're a geek like me and want weekly updates send your email
address to geek at odlink.com
For more information email request to sales at odlink.com
Check out our web site at www.odlink.com it's under construction
but you will see where we are headed!
SUPER SALE!!!
AMD K6 233 MHZ COMPUTER
CASE, KEYBOARD, MOUSE, 1.44 FLOPPY DRIVE,
S3 2MB VIDEO CARD, MOTHERBOARD, 233 MHZ CPU,
32xCDROM, 100watt speakers,32mb SDRAM,3.2 GIG HD
Yamaha 3D soundcard
LOTUS SMARTSUITE SOFTWARE ($149 value)
MICROSOFT WORD 97
MICROSOFT WORKS 4.5
MICROSOFT PUBLISHER 98
MICROSOFT BOOKSHELF 98 ($199.00 value)
All for the unbelievably LOW PRICE of $499.00
AMD K6 266 MHZ COMPUTER
CASE, KEYBOARD, MOUSE, 1.44 FLOPPY DRIVE,
S3 2MB VIDEO CARD, MOTHERBOARD, 266 MHZ CPU,
32xCDROM, 100watt speakers,32mb SDRAM,3.2 GIG HD
Yamaha 3D soundcard
LOTUS SMARTSUITE SOFTWARE ($149 value)
MICROSOFT WORD 97
MICROSOFT WORKS 4.5
MICROSOFT PUBLISHER 98
MICROSOFT BOOKSHELF 98 ($199.00 value)
All for the unbelievably LOW PRICE of $539.00
AMD K6 300 MHZ COMPUTER
CASE, KEYBOARD, MOUSE, 1.44 FLOPPY DRIVE,
S3 2MB VIDEO CARD, MOTHERBOARD, 300 MHZ CPU,
32xCDROM, 100watt speakers,32mb SDRAM,3.2 GIG HD
Yamaha 3D soundcard
LOTUS SMARTSUITE SOFTWARE ($149 value)
MICROSOFT WORD 97
MICROSOFT WORKS 4.5
MICROSOFT PUBLISHER 98
MICROSOFT BOOKSHELF 98 ($199.00 value)
All for the unbelievably LOW PRICE of $589.00
OFFICE DIRECT LINK, llc
531 W. Arapaho, Suite 101
Richardson, TX. 75080
phone (972) 680-1700
fax (972) 680-1698
From Gvtgrantz at sprintmail.com Thu Jul 23 18:09:56 1998
From: Gvtgrantz at sprintmail.com (Gvtgrantz at sprintmail.com)
Date: Thu, 23 Jul 1998 18:09:56 -0700 (PDT)
Subject: Free Government Grants
Message-ID: <199807232351.IAA13191@JingXian.xmu.edu.cn>
The US Government sets aside Billions of dollars each year in
the form of grants and loans for entrepreneurs and the American
public. Your tax dollars are not all spent by the Defense Department.
A large percentage of your tax dollars are set up for domestic
assistance to help individuals, entrepreneurs and businesses create
jobs whether the company is large or small. Steven Jobs received
government help with his company Apple Computers, Donald Trump,
Ross Perot , Lee Iaccoca are just to name a few of the individuals
who used this program to start billion dollar corporations.
Each year the government gives out hundreds of millions of dollars
to companies,individuals and entrepreneurs, homemakers and the likes.
Currently, less than 2% of the population applies for grants and
loans while a large percentage around 4 Billion remains unclaimed
when it could help an entrepreneur, company or someone in need.
Most Americans do not know these programs exist for their benefit.
The government wants you to succeed in hopes of stimulating the
economy. Take a look at some of the programs available.
Direct Grants to $800,000 Direct Loans to $2,200,000. Over 300 grants
for business and loans that are easier to obtain than conventional
loans. All grants and some loans require no credit check and no
collateral because you are actually borrowing your tax dollars set
aside for business start-up and development. You live in the
greatest country in the world "Only in America" You hear the term
spoken but without comprehension. More immigrants call for assistance
than US citizen,s they see the opportunity and if not first successful
they try back when they become citizen,s. Are they successful?
Eventually.
The government means business ,to help you they have hired over
1500 professionals to help you if only you would call. The area
of expertise falls under marketing, consultation,import,export
and anything pertaining to business that might help you succeed.
This could mean the difference in success or failure of your
business. The business endeavor does not matter the government
has the money and an expert to help you whether you are in farming,
real estate, retail,daycare or any legal money making opportunity.
If you are a tax paying citizen you owe it to yourself to take a
look at these programs immediately.
Just for ordering, you will receive:
1."How to Write a Business Plan" approved by the Chamber of Commerce,
2.The HUD Home Ownership Program ( Guarantee you will qualify for at
least 5)
3.Government Auctions,
4.Education Grants
5.Free Credit Repair
6.Bad Credit Loans-Categories A,B,C and D
7.and lots of other freebies from the government
All applications, SBA forms, All legal forms for business start-up are
included.Organizations and Schools-Quantities of 10 or more deduct 15%
To order by mail send check or money order for $19.95 plus $3.00
shipping and handling to:
Government Publications
2120 L. St NW ste 210
Washington DC 20037
Info: (202) 298- 9673
-------------------------Cut Here---------------------------
Yes, I want to purchase your guide to government grants and loans
for $19.95 plus $3.00 S&H (US Dollars). 30 day money back guarantee.
All money orders shipped in 3 days.
I've enclosed my:
_____ Check _____Money Order _____Credit Card Information
If paying by credit card:
Please Circle: VISA or MasterCard or American Express
Account #:
__________ - __________ - __________ - __________
Exp. Date:
______________________
Signature:
_____________________________________________
Today's
Date:
______________________
Your Mailing Address:
Name:
________________________________________
Address:
________________________________________
City:
________________________________________
State:
________________________________________
Zip:
________________________________________
E-mail:
________________________________________
Mail to:
Government Publications ; 2120 L. St NW ste 210 ; Washington DC 20037
From lreed at west.cscwc.pima.edu Thu Jul 23 18:52:13 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Thu, 23 Jul 1998 18:52:13 -0700 (PDT)
Subject: THEY - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C99F3.93CF4780.32@west.cscwc.pima.edu>
Where Do THE (TM) Want our Mind To Go Today? - SAHMD!!!
_________________________________________________________
"ou're not really an anarchist if you don't have your Anarchist Union
dues paid up-to-date."
~Anna R. Christ, U.S. Government Department of Anarchy Czar
Even those who dismiss, as ridiculous, the conspiracist theory that the
entire world is controlled by a small, Secret Cabal of individuals, with
me at its head, recognize that over the course of history, the media
began encroaching on the traditional role of religion and community as
the source of beliefs about the world around them, as well as increasingly
influencing opinions and attitudes, and that the news media was originally
controlled by a very small enclave of individuals with powerful financial
and political connections.
Thus, the front-page newspaper story about the completion of this or
that railway was more likely to be accompanied by a picture of a Railway
Czar chomping on a fat cigar as he drove the last spike, rather than a
picture of 30,000 Dead Chincs, since the LittleellerFellers didn't get
a lot of dinner invitations to the publisher's estate.
Far from being a Secret Conspiracy, the control of the newpaper media
by a few individuals was a well-established Open Conspiracy, regarded
as SimplyTheWayThingsAre in an era when the money, power and connections
of the OldBoyNetwork trumped poverty, insignificance and a cousin named
Louie who could get you a good deal on a pair of used shoes.
Regardless of the fact that the public knew that the news was a fixed
game, even if there was a 'competing' newsrag from a different member
of the RichAndPowerfulOldBoysNetwork, it was the only game in town, and
those in control of the news that got reported were the ones who named
the game and framed whatever debate took place.
The newspaper publishers of yesteryear were, like todays car salesmen,
masters of manipulating their customers into choosing between the 'models'
of news/opinion/reality that *they* were offering. Even today, for all
of the lip-service paid to 'competition' in the mainstream media, I doubt
that there was a single person in America who bought copies of *all* the
major mainstream newspapers in order to find the one with the headline,
"Freedom Fighter Timothy McVeigh Takes A Bite Out Of Government Crime."
In 1937, by which time America had more radios than indoor toilets,
the Rockerfeller Foundation started funding early mind-control research
into the social effects of new forms of mass media, such as radio, and
their potential for effecting social control of the masses.
The main headquarters for the research, which was carried out by
several universities, was at the Office of Radio Research, at Princeton.
It was headed by Paul Lazersfeld, an influential figure in a Marxist
ThinkTank, the Institute for Social Research (I.S.R.), commonly known
as the Frankfurt School.
Interestingly, the goals of the Bolshevik Intelligentsi of I.S.R.--to
undermine the Judeo-Christian legacy of Western Civilization through an
"abolution of culture," and to determine new cultural forms which would
increase the alienization of the population--were very similar in concept
to the techniques that Canadian mind-butcherer, Dr. Ewen Cameron, would
pioneer decades later in the field of psychiatry--creating 'Differential
Amnesia' through electroshock mind-wiping, and recreating persona/
personality through the use of 'Psychic Driving'--with the main difference
seeming to be that the Radio Project's Lazersfeld didn't have access to
the technology to pump thousands of volts through the brains of the
masses, so had to settle for giving them extended treatments with low-
power radio waves, as well as using repetitive formatting instead of
Dr. Cameron's "I am a good person who is going to assassinate the Prime
Minister" tape-loops.
At the time, Communism was Semi-Fashionable, not yet having been
magically transformed, overnight, into the GreatEvil, and among the
entities taking an interest in using the Comintern created thinktank
to learn how to use Bolshevik techniques to put the masses in their
back pocket were, besides the Rockerfeller Foundation, the Columbian
Broadcasting System, several American intelligence services, and the
International Labour Organization.
As Michael J. Minnicino notes, in 'The New Dark Age,' "Despite the
official gloss, the activities of the Radio Project make it clear that
its purpose was to test empirically the (I.S.P.) Adorno-Benjamin thesis
that the net effect of the mass media could be to atomize and increase
lability--what people would later call "brainwashing."
[EditWhore's Note: If you are incapable of making the connection between
TV/Advertising and Hypnosis, because the programs and ads don't begin
with, "ou are growing veerrryyy sleepy," or between TV/Advertising and
Brainwashing, because a BigRat doesn't jump out of the TV and eat your
face, then just try to equate TV/Advertising with your mother's attempts
to convince you that broccoli tastes good, or the teacher who tried to
trick you into thinking that Math was more fun than looking out the
window and watching the dogs fucking in the schoolyard.]
Frank Stanton, an industrial psychology Ph.D., later to become the
President of the CBS News Division, President of CBS, and Chairman of
the Board of the RAND Corporation, was the Radio Project's research
director.
Herta Herzog would later use the propaganda skills she developed as
a Radio Project researcher to become the first director of research
for Voice of America.
The course of the whole developing radio industry would shortly be
affected in a major way by the Rockerfeller/Intelligence/Broadcaster's
Radio Project research into the use of the radio medium as a tool for
Social/Mind Control.
In a 1939 Journal of Applied Psychology quarterly edition, the Radio
Project published their conclusion that Americans had become "radio
minded" (think about that phrase...), and that "their listening had
become so fragmented that repetition of format was the key to popularity,"
as Minnicino points out. "The play list determined the 'hits'...and
repetition could make any form of music or any performer...a 'star.'"
("ou got your dead skunk in the middle of the road, dead skunk in the
middle of the road...")
ou Want Regular Vanilla, Or Vanilla Regular?
[WAS - Beyond The Valley Of The Mountain Of The Planet Of The Apes /
Parts 1 Through 2,987,746,376,802,413]:
"Not only are hit songs, stars, and soap operas cyclically recurrent and
rigidly invariable types, but the specific content of the entertainment
itself is derived from them and only appears to change. The details are
interchangeable."
~Theodor Adorno, Chief of the Radio Project's Music Section, and an
instrumental, decades-long member of the Communist Institute For Social
Research, to which we owe a debt of gratitude for ensuring that audio
pictures of Chairman Rockerfeller would dominate our audio landscape,
and that quotations from the BigBankBook of Chairman Rockerfeller would
fall on our ears, day and night.
[EditWhore's Note: Today, of course, Corporations are getting in on
the act by turning arts and sports events into an advertising medium
in their own right (e.g. The Nike Bolshoi Ballet Company, and the
Ravage Realty Desert Golf Classic), not to mention Chairman Pepsi
purchasing the rights to the high-school Proletariat from their
bourgeois SchoolMasters.]
Shut The Fuck Up And Give Me our Gut-Feeling About This Program:
Next time that you're having a highly-intellectual discussion (drinking
cafe-latte with your little pinkie raised), about the philosophical and
conceptual themes of a given program, think about "Little Annie" aka
the Stanton-Lazersfeld Pogrom ( <--meaninful typo ) Analyzer.
It was designed to allow test-audience members to register the intensity
of their likes-dislikes on a moment-to-moment basis during a program. This
allowed the operators to determine which situations or characters produced
a momentary, positive feeling state.
Michael Minnicino notes that "Little Annie transformed radio, film,
and ultimately television programming." He adds that Little Annie, in
updated formats, is still what drives mainstream programming today.
[Note From T. Arthur: Basically, Little Annie is the human equivalent
of the Pavlovian drool-cup, measuring the flow of body juices when
the DoggieFoodLight goes on, or you watch an ad for edible panties.
The VoicesInsideMyHead that claim, "Everything since the BigBang has
been plagarism," when translated from Analog Wave to Digital Format,
say, "The only movie/program that really exists is 'The ogi Berra
Story'...everything else is DejaVuReRunsAllOverAgain.]
Our Story So Far:
OK, so we got your small Non-Secret Cabal of NewsRag Czars going about
their business of exercising their InGodWeTrust-Given Right to decide
what people with less money should know and think.
And then we got your Radio Media Medium starting to cut-in on the
NewsRag Czar's RealityCreationRacket, as a result of there being more
of them than indoor toilets, so as how people now get their RealityInput
even when they ain't on the Crapper, making room for what they is reading
by engaging in ExcessRealityOutput (A RetroTech version of GarbageIn-
GarbageOut), and then wiping their OutputDevice with their InputDevice.
And then we got your basic RichGuyFoundation using TaxDeductibleDollars
to hire your basic GodLessCommies to figure out how the RichGuys can use
the rEvolutionary New Commi-Tel Bolshevik Marketing System to get the
Radio Proletariat to pony-up $ 19.95 (plus shipping and handling) for
the SilverPlatter upon which their "new cultural forms" (Translation:
ConsumerIsm) will be handed to them, making the RichGuy even richer (by
using TaxDeductibleDollars, nonetheless--pretty tricky, eh?).
And we got your WhiteReds telling us that if they play a CountryBlues
song as many times as there is pictures of Stalin in Moscow, then, not
only can they make some Drifter a star, but they can measure how many
times JoeSixPack's blood rushes to his brain or his penis while he's
thinking about how *his* baby done left him, too, and that if more blood
is rushing back and forth when Luke the Drifter is singing the words
'baby' and 'yeah,' then they can take a song called, "Baby, Baby, eah-
eah, eah, eah, Baby eah-eah," and get Joe SixPack's blood flowing
in and out of his penis so fast that he'll need a Pavlovian Drool-Cup
underneath his Pecker, and that they can have the song performed by some
oungStud who they put on TV and have him wiggle his pelvis around like
some BigDickedDarkie, and get the blood flowing back and forth in the
women's private parts too, which would *really* result in "new cultural
forms which would increase the alienation of the populace," because Daddy
don't want his LittlePrincess (TM) getting her LittleNastyParts (TM) all
juiced up by some WhiteNiggerLoverBoy.
Oh...except I guess I haven't mentioned the part about TeleVision, yet.
Anyway, you got to remember that the reason that your RunOfTheMillBasic
GodLessCommie is Godless, is that if you're going to start a rEvolution,
then you can't have your Proletariat all junked-out on Religion, or they
are going to be too laid-back to help you torch the Palace. So you have
to create your basic NewBarbarism, getting rid of anything that smacks
of Universal Truth or Natural Law, and get people to trade in their old
PopeMobile for a SnowmobileRacingAcrossTheTundra, with a BigTittedNun
stroking Nietzsche's IceWeasle in glossy-color ads telling the Prolotariat
that there's no need to stick to the straight-and-narrow path when you've
got an off-road philosophical vehicle that can go BeyondGoodAndEvil in
sex-seconds flat.
This appeals to a lot of people who never had seconds on sex because
they could only fuck once in the backseat of their PopeMobile, since it
was supposed to be for making babies, and not for having fun, but they
can play HideTheSalami as many times as they want on the seat of a
snowmobile, with God-and-everybody watching (only there is not really
any God).
What is important to realize is that one of the main Keys to making the
BullShitVic's Schtick work, has to do with shit-canning the creative act
and making creativity historically-specific.
[Author's Note: Although this is important, I don't really know exactly
how to explain why it is so, since I don't really understand it and I
am, in large part, merely plagarizing excerpts from 'The New Dark Age'
by Michael J. Minnicino, on this point.
I think Tim C. May and some of the other CypherPunks understand this
crap, though, so maybe you could ask them about it...]
But I *do* understand *why* it is important to Marxist rEvolutionaries
to burn up and toss out all of the old writings and art, and stuff, in
order to take control of the hearts and minds of the Proletariat, since
it is like moving in with a NewOldLady, and she's got pictures of her
old boyfriend around, and loveletters and stuff, and you don't want her
thinking about him while you're sticking your dick in her.
So, anyway...
It's not like Rockerfeller ain't 'getting any,' since he's already a
part of the OldBoyNetwork that's GangBangingReality with their OfficalNews
/WorldView Schlongs, but Radio is the NewKidInTown and you don't want him
stealing your chicks, so you're going to join up with his gang, too, and
you figure it won't hurt to try and pick up a few new pointers on putting
your MeatInMotion from Stalin's BumBuddies, since Stalin is, like, the
JohnnyWadd of Social Control.
So Stalin's BumBuddies tell you that first, you got to get Prolotariat
Chicks a little tipsy and disoriented by culturing them with a little bit
of Absolut, you set some new cultural forms (make their nipples hard) by
sweet-talking them a bit, and then create a NewBarbarism by talking nasty
to them.
Of course, once you have the attention of their orfice, then you keep
driving home your point, repeatedly, and if you can find the spots on
their body that make them feel good or bad, and give them the proper
combination of each, then you can whisper 'give me all your money' in
their ear while they are in the throes of passion, and they will hardly
notice, but they will *do* it.
{Excuse me, but I've got to go have a smoke...be right back...}
In reality, as the GodLessCommies from the Institute for Social Research
undoubtedly explained to Rocky, after he had a shower, was that the same
basic rules applied, whether you were using your real name or using an
alias, such as Reverend Sun Moon, Jim Baker, Jim Jones, Dr. Cameron,
or Richard Helms.
As a matter of fact, one of the main reasons for the intensity of the
Rockerfeller Foundation's interest in the use of Radio for Social/Mind
Control was that one of Rocky's financial and political associates,
Adolf Hitler, had begun 'stealing the show,' so to speak, with the
vivacity of his powerful presence in the medium.
Another factor in the Rockerfeller Foundations quest to learn the
secret of using Radio as a tool of social and mind control was the
emergence of Radio's younger cousin, Television, which showed promise
of being able to surpass Radio's ClitLicking talents, and go straight
for the G-spot.
Theodor Adorno wrote, in regard to TeleVision, in 1944,
"Its consequences will be quite enormous and promise to intensify the
impoverishment of aesthetic matter so drastically that by tomorrow the
thinly veiled identity of all industrial culture products can come
triumphantly out in the open, derisively fulfilling the Wagnerian dream
of the Gesamtkunstwerk--the fusion of all the arts into one work."
(The New World ArtEr)
In other words, TeleVision was seen by the I.S.P, the Rockerfellers,
Military Intelligence Agencies, et al, FROM ITS VER INCEPTION, as a
useful tool in using intellectually lame, but emotionally significant
content, as an instrument of social control which could be used to
significantly influence the minds/thought/beliefs/opinions of the
public. (In other words, TV wasn't born 'retarded' by 'accident.')
So, whether or not one believes in a single individual, or group of
individuals, who is secretly running the world and controlling the whole
of our reality, it seems that there are certainly a number of people who
are *trying* to do so.
The techniques of mind-control are nothing new--they are centuries old
and are only being 'refined' in our time, through research and experiment-
ation, to be applical over a wider range of geography than simply the
local village, and over a greater spectrum of ethnicity than the members
of closely related tribes.
The future of TeleVision was set a half-century ago by people of wealth
and power who had gone to great pains to research the best way to develop
the electronic media as a tool of social control via mind control. Even
the most cursory of checks indicates that members of Military Intelligence
agencies were as 'thick as thieves' in the creation and management of
the Television Industry.
These people have had over a half-century to develop and refine their
control of and use of electronic media to meet their own ends.
Wouldn't it be terrifying if they had not only developed the means to
put their witting and unwitting shills *anywhere* they wanted in our
societies, corporations, governments and educational institutions, but
also had a means to use their shills in every area of our life, in order
to influence what we see, think and the way in which we perceive our
world...?
[WATCH THIS SPACE]ALIEN
From ILovToHack at aol.com Thu Jul 23 19:11:10 1998
From: ILovToHack at aol.com (ILovToHack at aol.com)
Date: Thu, 23 Jul 1998 19:11:10 -0700 (PDT)
Subject: Pipe bombs r better
Message-ID: <285f3dfa.35b7ec4c@aol.com>
In a message dated 7/23/98 10:05:06 PM Eastern Daylight Time, ILovToHack
writes:
<< << > they rule!
In your ass, that is...
>>
pipe bombs rule how ever puting them there could be hazardous to your health
#
*i*
__!__
I I Mr pipe bomb
I I
I I
l_ _ _l
To: chrisharwig at hetnet.nl
Subject: Re: Pipe bombs r better
From: ILovToHack at aol.com
Date: Thu, 23 Jul 1998 22:05:06 EDT
<< > they rule!
In your ass, that is...
>>
pipe bombs rule how ever puting them there could be hazardous to your health
#
*i*
__!__
I I Mr pipe bomb
I I
I I
l_ _ _l
From bogus@does.not.exist.com Thu Jul 23 20:25:44 1998
From: bogus@does.not.exist.com ()
Date: Thu, 23 Jul 1998 20:25:44 -0700 (PDT)
Subject: Creating Wealth In America
Message-ID: <19980723359FAA6701@interbiz.chi.swissbank.com>
Creating Wealth in America
>From the desk of Robert Allen, The Author of 2 Mega Best-Sellers,
Nothing Down and Creating Wealth in America
San Diego, California
11:29 P.M.
"I can't sleep until I get this off my chest."
"I'm extremely frustrated".
Odds are that nine out of ten people who receive this letter will discard
it without a second thought. Yet, I know that I have discovered a secret
that could change your financial life forever! And I'm willing to share
it with you for FREE.
Do you want to end your money pressures forever?
Do you want to double your income?
Do you want to build an extra stream of income quickly?
If you answered yes, then let me show you how you can begin living your
dreams, this year before it's too late. I'll get right to the point.
As it says on the letterhead, my name is Robert Allen. I'm famous for
My two #1 New York Times best-selling books. Nothing Down and Creating
Wealth in America. There are lots of millionaires who credit their
success to one of my books or seminars. So when I share this secret
with you, I want you to know that I've done my homework. Here it comes.
I have discovered what I believe is the perfect home-based business.
Although I'm well known for real-estate investment books and seminars,
this new business has absolutely nothing to do with real-estate. In fact,
it's much easier and far less risky.
It involves:
-No employees
-Little risk
-Little start up cash
-It's so simple, anyone can do it
You could be earning $1,000 a week in as little as 90 days. One person I
know went from zero to $3,000 a week in 60 days. That's $150,000 a year
extra, hassle-free income!
In my 20 years of research, I can honestly say, "I've never seen a faster,
easier way to create a stream of income".
I know this sounds too good to be true. Frankly, I didn't believe it
myself at first. Finally, I agreed to check it out. As a test, I
selected a small group of people and introduced them to this incredible
opportunity. Almost immediately, many of them started earning profits.
Within a week, many were earning incomes of $4,000 per month in net cash
flow. Now, some of them are cashing checks for $3,000 a week. And this
is just the beginning! Their earning potential could be unlimited!
Would you like to learn how to do that? I'd love to show you how. But
only if you're interested enough to make one telephone call. The number
to call immediately is 1-888-310-6470. It's a 3-minute, 24-hour recorded
message. This may be the answer you have been seeking.
Warmly,
Robert G. Allen
P.S. I want to show you how to create extra streams of income quickly,
Go to the phone and call now 1-888-310-6470.
//
From stuffed at stuffed.net Thu Jul 23 20:49:11 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Thu, 23 Jul 1998 20:49:11 -0700 (PDT)
Subject: Exclusive: Sex & drugs in a tropical paradise/Russians paid in dildos
Message-ID: <19980724020226.17637.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/23/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From nobody at replay.com Thu Jul 23 23:05:22 1998
From: nobody at replay.com (Anonymous)
Date: Thu, 23 Jul 1998 23:05:22 -0700 (PDT)
Subject: Todd Bowers: Dumbass
Message-ID: <199807240605.IAA00062@replay.com>
On Thu, 23 Jul 1998, Todd Bowers wrote:
>
> cool ..... i am 13
>
>
Actually, your being a complete dumbass overshadows your being 13.
From frantz at netcom.com Thu Jul 23 23:31:53 1998
From: frantz at netcom.com (Bill Frantz)
Date: Thu, 23 Jul 1998 23:31:53 -0700 (PDT)
Subject: where...
In-Reply-To: <19980721071954.AAA9474@pc-230>
Message-ID:
At 2:28 AM -0800 7/21/98, William H. Geiger III wrote:
>The Specs are at: http://www.itu.ch/publications/itu-t/itut.htm
>
>The X.400 specs are actually located under F.400 as this spec has been
>givien a dual designation of F.400/X.400
>
>Seems that you have to *pay* for a copy of this spec, 39 Swiss Francs,
>whatever that is in real money.
>
>X.500 is the same deal but it is only 20 Swiss Francs.
Those prices are a lot better than the last X.25 spec I priced. My local
paper says that 1 Swiss Franc is worth about 66 US cents ($0.66). That is
about the same exchange rate as when I was in Switzerland last summer. As
one of the world's more stable currencies, I would indeed consider the
Swiss Franc to be "real money".
-------------------------------------------------------------------------
Bill Frantz | If hate must be my prison | Periwinkle -- Consulting
(408)356-8506 | lock, then love must be | 16345 Englewood Ave.
frantz at netcom.com | the key. - Phil Ochs | Los Gatos, CA 95032, USA
From update at annex.liveupdate.com Fri Jul 24 01:15:49 1998
From: update at annex.liveupdate.com (LiveUpdate News)
Date: Fri, 24 Jul 1998 01:15:49 -0700 (PDT)
Subject: Crescendo News - July 1998
Message-ID: <00bec2615081878ANNEX@annex.liveupdate.com>
CRESCENDO NEWS - July 1998
Hello from the editors of the July 1998 edition of the LiveUpdate
Crescendo Newsletter. You're receiving this email because you
downloaded Crescendo in the past, and we want to keep you up to date with
some of the exciting things that are happening at LiveUpdate.
We hope you are enjoying Crescendo!
These are some of the items included in this newsletter:
* LiveUpdate launches real-time "SoundChat" chat service
* Crescendo version 3.0 appears on Netscape's SmartUpdate site
* Using Crescendo and Crescendo PLUS version 3.0 with Windows 98
* What is streaming MIDI, and why would I want it?
* What would you like to see in future versions of Crescendo?
* Subscribing / Unsubscribing
----------------------------------
LIVEUPDATE LAUNCHES REAL-TIME "SOUNDCHAT" SERVICE
On July 21st, LiveUpdate opened the "SoundChat" General Discussion
real-time chat Forum. This is the first of many free chat areas which
LiveUpdate is providing to allow you to chat in real time with fellow
Crescendo users around the world. Over time, we will be opening new
rooms for surfers, webmasters, and musicians to congregate and discuss
specific issues relating to player installation, adding music to your
web site, MIDI file creation, and much more. We will also be hosting
live events where you will be able to chat with world-class experts
on these various topics.
As an added bonus, chatters are now being given early access to our
newest technology, Crescendo Forte. To sign up and start chatting,
point your web browser to http://soundchat.com/chat.
----------------------------------
CRESCENDO VERSION 3.0 APPEARS ON NETSCAPE'S SMARTUPDATE SITE
We are proud to announce that Netscape has chosen Crescendo as one
of the few elite add-on components for inclusion in the new SmartUpdate
area of the Netscape site. SmartUpdate is a free service that allows
you to automatically download and install the latest versions of
Navigator add-on components, now including Crescendo. The latest full
versions of Crescendo and Crescendo PLUS will continue to be available
from the LiveUpdate site at http://www.liveupdate.com/dl.html.
----------------------------------
WHAT IS STREAMING MIDI, AND WHY WOULD I WANT IT?
"Streaming" is the ability to listen to music while it is being sent to
you over the Internet. In much the same way that web images fill in as
they are downloading, our patent-pending streaming MIDI technology
starts playing and "fills in" the music as it downloads, allowing you to
hear the music long before the entire MIDI file has finished downloading.
In most cases, streaming MIDI music will start to play almost immediately.
Crescendo PLUS is the only MIDI player available in the world that will
stream all types of MIDI files from any Internet source. Crescendo PLUS
is available for immediate purchase ($19.95) and download at the LiveUpdate
on-line store (https://secure.liveupdate.com).
If you are a web site author, and you would like to add streaming MIDI
to your web site, we offer a product called "Crescendo StreamSite" which
consists of a key for your web server that unlocks the streaming
feature which is included in the free versions of Crescendo. The StreamSite
key is completely compatible with all web servers, and doesn't require
any intervention from your service provider. Installation of the StreamSite
key involves uploading a single binary file to your web site, and can
be easily completed in less than 5 minutes. Personal StreamSite keys
are available for immediate purchase ($49.95) and download at the LiveUpdate
on-line store.
You can experience streaming MIDI without purchasing anything at all.
Just download the latest version of the free Crescendo player and
visit the Crescendo StreamSites listed at
http://www.liveupdate.com/streamsites.html. These sites have all purchased
StreamSite keys so that you can enjoy streaming MIDI as you visit their
sites.
----------------------------------
USING CRESCENDO AND CRESCENDO PLUS VERSION 3.0 WITH WINDOWS 98
To the best of our knowledge, Crescendo and Crescendo PLUS are completely
compatible with Windows 98. If Crescendo has worked for you in the but
you are having trouble after installing Windows 98, we have found that
re-installing Crescendo will most likely solve any problems you may be
experiencing. If you still see problems after re-installing, send a
message to helpdesk at liveupdate.com and we will try to help.
----------------------------------
WHAT WOULD YOU LIKE TO SEE IN FUTURE VERSIONS OF CRESCENDO?
We are constantly looking for new ideas to be included in future
versions of the Crescendo player. If you have any cool ideas of
things you would like to see added to Crescendo, send them to
feedback at liveupdate.com. Who knows - maybe your suggestion will
makes its way into the next version of Crescendo!
----------------------------------
SUBSCRIBING / UNSUBSCRIBING
Note: Messages from LiveUpdate to this list will not be sent any more
frequently than once a month, and your information has not and will not
be given to others or sold. If you wish to unsubscribe from this list,
or if this message has been forwarded to you by a friend and you would
like to subscribe to our newsletter, please send a message to
newsletter at liveupdate.com.
*******************************************
Spread the Music!
From wioca62 at galaxylink.com.hk Fri Jul 24 06:53:01 1998
From: wioca62 at galaxylink.com.hk (jumiel)
Date: Fri, 24 Jul 1998 06:53:01 -0700 (PDT)
Subject: stop paying those inflated airfare prices
Message-ID: <199807241044SAA15312@humkoipoio.hujk.saar.de>
USA Today has reported that business fares rose approximately 20%
in 1998. This is on top of a 15% gain from 1997.
EXCURSION OR VACATION FARES CANNOT BE FAR BEHIND.
Many people believe that they can find the cheapest airfares by
surfing through the many on-line reservation systems available on the
Internet. DON'T BE FOOLED These reservation systems are owned,
operated and maintained by the airlines themselves and are often slow
to be updated. They also don't include many of the deeply discounted
fare programs offered by the airlines.
How often have you called the Airlines or your local Travel Agent and
asked them to give you their cheapest fare, only to find that the
person sitting next to you has gotten his seat for much less. "The
Insider's Guide to Cheaper Airfares" will introduce you to other
ticketing alternatives and strategies that the Major Airlines don't
want you to know. These sources offer deeply discounted seats that
are on the same flights that airlines are charging other passengers
twice as much. Among the Things this valuable book will show you are:
*** How to get Airlines to notify you about discounts
BEFORE they go public.
*** Ticket strategies Airlines don't want you to know.
*** How to save at least 50% on International Travel.
*** Which reservation systems work best with which Hubs and Airlines.
*** How to get domestic tickets for 40% to 60% off.
Whether your goal is to go on that vacation of a lifetime or to
bring a loved one home to the family, "The Insider's Guide to
CheaperAirfares" will show you that reasonable airfares from anywhere
in the country are easily and affordably within your reach. Why give
all of your hard earned money to the airlines when you can spend that
money on fun once you arrive?
Our Book normally sells for $12.95 plus $2.00 for shipping and
handling. But if you order by August 31, 1998 you will pay only
$9.95 and we'll pay for shipping. That is a $5.00 savings.
Send $9.95 (cash, check, or money order)
Make Check Payable To:
Travel Guide$
16787 Beach Blvd. Suite #225
Huntington Beach, CA 92647
DON'T DELAY, SAVE ON YOUR NEXT TRIP TODAY
=================Please Complete==================
Yes Travel Guide$, I wish to take you up on your Special Offer,
Please rush me "The Insider's Guide to Cheaper Airfares" today. I
have filled out this form for you to help expedite my order.
Name:
Address:
City:
State: Zip:
E-mail Address:
(for order confirmation)
Send Your Order for $9.95
Travel Guide$
16787 Beach Blvd Suite#225
Huntington Beach, Ca 92647
^^^^^^^
gend
From 0_rcummi at funrsc.fairfield.edu Fri Jul 24 07:45:40 1998
From: 0_rcummi at funrsc.fairfield.edu (Bob Cummings)
Date: Fri, 24 Jul 1998 07:45:40 -0700 (PDT)
Subject: W.A.Y.
In-Reply-To:
Message-ID:
On Thu, 23 Jul 1998 Skoitch at aol.com wrote:
>
> WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?
>
>
Reason 1: You're from AOL
Reason 2: You don't know where the caps lock key is
Reason 3: You're looking on the cypherpunks list for music.
Reason 4: You're from AOL
From icollins at scotland.net Fri Jul 24 09:05:18 1998
From: icollins at scotland.net (Iain Collins)
Date: Fri, 24 Jul 1998 09:05:18 -0700 (PDT)
Subject: W.A.Y.
In-Reply-To:
Message-ID: <000d01bdb71c$6c3dd200$c7f3b094@webadmin.sol.co.uk>
>
> WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?
>
Try tidying up!
Try asking your brother if be 'borrowed' them all!
Try looking in a record store!
Iain,
PS: I'd like to ask how on earth so many people manage to subscribe to this
list, solely in order to churn out stuff like this? How do they manage to
use the e-mail software to actually send a message to this group? How do
they remember to breathe? AGH!!!!!!!!!
From CTIA_Daily_News at um2.unitymail.com Fri Jul 24 10:31:59 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Fri, 24 Jul 1998 10:31:59 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 24, 1998
Message-ID: <199807241706.MAA19229@revnet2.revnet.com>
==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.� Please click on the icon / attachment
for the most important news in wireless communications today.
A new multi-billion dollar industry is here!
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!
Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV
For more information, visit http://www.wirelessit.com
===========================================
From stuffed at stuffed.net Fri Jul 24 15:13:07 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Fri, 24 Jul 1998 15:13:07 -0700 (PDT)
Subject: Sex was just blow good/Fart demolishes house
Message-ID: <19980724200551.12388.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/24/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From lreed at west.cscwc.pima.edu Fri Jul 24 15:49:03 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Fri, 24 Jul 1998 15:49:03 -0700 (PDT)
Subject: Is that real?
Message-ID: <009C9AA3.421B6260.5@west.cscwc.pima.edu>
X-URL: mailto:cypherpunks at toad.com
X-Mailer: Lynx, Version 2-4-2
X-Personal_name: Linda Reeza
X-From: obvious at forgery.eff
Reeza,
Stop hacking those military computer accounts, and quit backtalking
to your teacher, or you'll never get out of grade 4...
Yes, the passage of SAHMD, regarding putting electronic probes into the
brains of children and other monkeys was Real (TM), as is almost every
other 'example' used in the True Story manuscripts, although there is
often small 'liberties' taken with the details, names, etc., for reasons
of protecting someone's ass (usually mind) for disseminating classified
material without proper authorization from an officially recognized law-
breaker/news-leaker, or just because I'm drunk.
It is often left as an ExerciseForTheReader, if they are interested, to
do a websearch, or whatever, and see if they can uncover such details as,
say, a person who might be named, lets say, for the sake of argument...
E.B. Montgomery, who was engaged in giving MonkeyBrains direct electronic
subscriptions to Wired Magazine, and who recently moved to Chicago, to
continue his work on a new level.
Linda Lou Reeza
{The *real* owner of the military account that the little grade 4
troublemaker is hacking and posting through, as well as forging
chapters of SAHMD under the alias, LREED.}
From lreed at west.cscwc.pima.edu Fri Jul 24 16:16:47 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Fri, 24 Jul 1998 16:16:47 -0700 (PDT)
Subject: mailto:cypherpunks@toad.com
Message-ID: <009C9AA7.2778B3A0.8@west.cscwc.pima.edu>
X-URL: mailto:cypherpunks at toad.com
X-Mailer: Lynx, Version 2-4-2
X-Personal_name: Dog Day Afternoont
From lreed at west.cscwc.pima.edu Fri Jul 24 19:53:04 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Fri, 24 Jul 1998 19:53:04 -0700 (PDT)
Subject: A Thousand Points Of Fight
Message-ID: <009C9AC5.59A235E0.9@west.cscwc.pima.edu>
Breakthrough Texts
Leaderless Resistance
An Essay by Louis Beam
"Leaderless Resistance" -- Part One
[IMAGE] The concept of leaderless resistance was proposed by Col.
Ulius Louis Amoss, who was the founder of International Service of
Information Incorporated, located in Baltimore, Maryland. Col. Amoss
died more than 15 years ago, but during his life he was a tireless
opponent of Communism, as well as a skilled intelligence officer.
[INLINE] Col. Amoss first wrote of leaderless resistance on April
17, 1962. His theories of organization were primarily directed
against the threat of eventual Communist takeover in the United
States. The present writer, with the benefit of having lived many
years beyond Col. Amoss, has taken his theories and expounded on
them.
[INLINE] Col. Amoss feared the Communists. This author fears the
federal government. Communism now represents a threat to no one in
the United States, while federal tyranny represents a threat to
EVERYONE. The writer has joyfully lived long enough to see the dying
breaths of Communism, but may unhappily remain long enough to see
the last dying gasps of freedom in America.
[INLINE] In the hope that, somehow, America can still produce the
brave sons and daughters necessary to fight off ever-increasing
persecution and oppression, this essay is offered. Frankly, it is
too close to call at this point. Those who love liberty, and believe
in freedom enough to fight for it, are rare today; but within the
bosom of every once great nation, there remains secreted the pearls
of former greatness.
[INLINE] They are there. I have looked into their sparkling eyes;
sharing a brief moment in time with them as I passed through this
life. Relished their friendship, endured their pain, and they mine.
We are a band of brothers native to the soil, gaining strength one
from another as we have rushed headlong into battle that all the
weaker, timid men say we can not win. Perhaps not... but then again,
perhaps we can. It's not over till the last freedom fighter is
buried or imprisoned, or the same happens to those who would destroy
their liberty.
[INLINE] Barring any cataclysmic events, the struggle will yet go on
for years. The passage of time will make it clear to even the more
slow among us that the government is the foremost threat to the life
and liberty of the folk. The government will no doubt make today's
oppressiveness look like grade school work compared to what they
have planned in the future. Meanwhile, there are those of us who
continue to hope that somehow the few can do what the many have not.
[INLINE] We are cognizant that before things get better they will
certainly get worse as government shows a willingness to use ever
more severe police state measures against dissidents. This changing
situation makes it clear that those who oppose state repression must
be prepared to alter, adapt, and modify their behavior, strategy,
and tactics as circumstances warrant. Failure to consider new
methods and implement them as necessary will make the government's
efforts at suppression uncomplicated. It is the duty of every
patriot to make the tyrant's life miserable. When one fails to do so
he not only fails himself, but his people.
[INLINE] With this in mind, current methods of resistance to tyranny
employed by those who love our race, culture, and heritage must pass
a litmus test of soundness. Methods must be objectively measured as
to their effectiveness, as well as to whether they make the
government's intention of repression more possible or more
difficult. Those not working to aid our objectives must be
discarded, or the government benefits from our failure to do so.
[INLINE] As honest men who have banded together into groups or
associations of a political or religious nature are falsely labeled
"domestic terrorists" or "cultists" and suppressed, it will become
necessary to consider other methods of organization, or as the case
may very well call for: non- organization.
[INLINE] One should keep in mind that it is not in the government's
interest to eliminate all groups. Some few must remain in order to
perpetuate the smoke and mirrors for the masses that America is a
"free democratic country" where dissent is allowed. Most
organizations, however, that possess the potential for effective
resistance will not be allowed to continue. Anyone who is so naive
as to believe the most powerful government on earth will not crush
any who pose a real threat to that power, should not be active, but
rather at home studying political history.
[INLINE] The question as to who is to be left alone and who is not,
will be answered by how groups and individuals deal with several
factors such as: avoidance of conspiracy plots, rejection of
feebleminded malcontents, insistence upon quality of the
participants, avoidance of all contact with the front men for the
federals - the news media - and, finally, camouflage (which can be
defined as the ability to blend in the public's eye the more
committed groups of resistance with mainstream "kosher" associations
that are generally seen as harmless).
[INLINE] Primarily though, whether any organization is allowed to
continue in the future will be a matter of how big a threat a group
represents. Not a threat in terms of armed might or political
ability, for there is none of either for the present, but rather,
threat in terms of potentiality. It is potential the federals fear
most. Whether that potential exists in an individual or group is
incidental. The federals measure potential threat in terms of what
might happen given a situation conducive to action on the part of a
resistive organization or individual. Accurate intelligence
gathering allows them to assess the potential. Showing one's hand
before the bets are made is a sure way to lose.
[INLINE] The movement for freedom is rapidly approaching the point
where, for many people, the option of belonging to a group will be
non-existent. For others, group membership will be a viable option
for only the immediate future. Eventually, and perhaps much sooner
than most believe possible, the price paid for membership will
exceed any perceived benefit. But for now, some of the groups that
do exist often serve a useful purpose either for the newcomer who
can be indoctrinated into the ideology of the struggle, or for
generating positive propaganda to reach potential freedom fighters.
It is sure that, for the most part, this struggle is rapidly
becoming a matter of individual action, each of its participants
making a private decision in the quietness of his heart to resist:
to resist by any means necessary.
[INLINE] It is hard to know what others will do, for no man truly
knows another man's heart. It is enough to know what one himself
will do. A great teacher once said "know thyself." Few men really
do, but let each of us promise ourselves not to go quietly to the
fate our would-be masters have planned.
[INLINE] The concept of leaderless resistance is nothing less than a
fundamental departure in theories of organization. The orthodox
scheme of organization is diagrammatically represented by the
pyramid, with the mass at the bottom and the leader at the top. This
fundamental of organization is to be seen not only in armies, which
are, of course, the best illustration of the pyramid structure, with
the mass of soldiery (the privates) at the bottom responsible to
corporals; who are in turn responsible to sergeants, and so on up
the entire chain of command to the generals at the top. But the same
structure is seen in corporations, ladies' garden clubs, and in our
political system itself. This orthodox "pyramid" scheme of
organization is to be seen basically in all existing political,
social, and religious structures in the world today, from the
Federal government to the Roman Catholic Church.
[INLINE] The Constitution of the United States, in the wisdom of the
Founders, tried to sublimate the essential dictatorial nature
pyramidal organization by dividing authority into three: executive,
legislative, and judicial. But the pyramid remains essentially
untouched.
[INLINE] This scheme of organization, the pyramid, is not only
useless, but extremely dangerous for the participants when it is
utilized in a resistance movement against state tyranny. Especially
is this so in technologically advanced societies where electronic
surveillance can often penetrate the structure, thus revealing its
chain of command. Experience has revealed over and over again that
anti-state political organizations utilizing this method of command
and control are easy prey for government infiltration, entrapment,
and destruction of the personnel involved. This has been seen
repeatedly in the United States where pro-government infiltrators or
agent provocateurs weasel their way into patriotic groups and
destroy them from within.
[INLINE] In the pyramid form of organization, an infiltrator can
destroy anything which is beneath his level of infiltration, and
often those above him as well. If the traitor has infiltrated at the
top, then the entire organization from the top down is compromised
and may be traduced at will.
"Leaderless Resistance" -- Part Two
[IMAGE] A recent example of the cell system taken from the left wing
of politics are the Communists. The Communists, in order to get
around the obvious problems involved in pyramidal organization,
developed to an art the cell system. They had numerous independent
cells which operated completely isolated from one another and
particularly with no knowledge of each other, but were orchestrated
together by a central headquarters. For instance, during WWII, in
Washington, it is known that there were at least six secret
Communist cells operating at high levels in the United States
government (plus all the open Communists who were protected and
promoted by President Roosevelt), however, only one of the cells was
rooted out and destroyed. How many more actually were operating, no
one can say for sure.
[INLINE] The Communist cells which operated in the U.S. until late
1991 under Soviet control could have at their command a leader who
held a social position which appeared to be very lowly. He could be,
for example, a busboy in a restaurant, but in reality a colonel or a
general in the Soviet Secret Service, the KGB. Under him could be a
number of cells, and a person active in one cell would almost never
have knowledge of individuals who were active in other cells; in
fact, the members of the other cells would be supporting that cell
which was under attack and ordinarily would lend very strong support
to it in many ways. This is at least part of the reason, no doubt,
that whenever in the past Communists were attacked in this country,
support for them sprang up in many unexpected places.
[INLINE] The effective and efficient operation of a cell system
after the Communist model is, of course, dependent upon central
direction, which means impressive organization, funding from the
top, and outside support, all of which the Communists had.
Obviously, American patriots have none of these things at the top or
anywhere else, and so an effective cell organization based upon the
Soviet system of operation is impossible.
[INLINE] Two things become clear from the above discussion. First,
that the pyramid form of organization can be penetrated quite easily
and it thus is not a sound method of organization in situations
where the government has the resources and desire to penetrate the
structure, which is the situation in this country. Secondly, that
the normal qualifications for the cell structure based upon the Red
model does not exist in the U.S. for patriots. This understood, the
question arises "What method is left for those resisting state
tyranny?"
[INLINE] The answer comes from Col. Amoss who proposed the "Phantom
Cell" mode of organization which he described as Leaderless
Resistance. A system of organization that is based upon the cell
organization, but does not have any central control or direction,
that is in fact almost identical to the methods used by the
committees of correspondence during the American Revolution.
Utilizing the Leaderless Resistance concept, all individuals and
groups operate independently of each other, and never report to a
central headquarters or single leader for direction or instruction,
as would those who belong to a typical pyramid organization.
[INLINE] At first glance, such a form of organization seems
unrealistic, primarily because there appears to be no organization.
The natural question thus arises as to how are the "Phantom Cells"
and individuals to cooperate with each other when there is no
inter-communication or central direction?
[INLINE] The answer to this question is that participants in a
program of leaderless resistance through "Phantom Cell" or
individual action must know exactly what they are doing and how to
do it. It becomes the responsibility of the individual to acquire
the necessary skills and information as to what is to be done. This
is by no means as impractical as it appears, because it is certainly
true that in any movement all persons involved have the same general
outlook, are acquainted with the same philosophy, and generally
react to given situations in similar ways. The previous history of
the committees of correspondence during the American Revolution
shows this to be true.
[INLINE] Since the entire purpose of leaderless resistance is to
defeat state tyranny (at least in so far as this essay is
concerned), all members of phantom cells or individuals will tend to
react to objective events in the same way through usual tactics of
resistance. Organs of information distribution such as newspapers,
leaflets, computers, etc., which are widely available to all, keep
each person informed of events, allowing for a planned response that
will take many variations. No one need issue an order to anyone.
Those idealists truly committed to the cause of freedom will act
when they feel the time is ripe, or will take their cue from others
who precede them. While it is true that much could be said against
this kind of structure as a method of resistance, it must be kept in
mind that leaderless resistance is a child of necessity. The
alternatives to it have been shown to be unworkable or impractical.
Leaderless resistance has worked before in the American Revolution,
and if the truly committed put it to use themselves, it will work
now.
[INLINE] It goes almost without saying that Leaderless Resistance
leads to very small or even one-man cells of resistance. Those who
join organizations to play "let's pretend" or who are "groupies"
will quickly be weeded out. While for those who are serious about
their opposition to federal despotism, this is exactly what is
desired.
[INLINE] From the point of view of tyrants and would-be potentates
in the federal bureaucracy and police agencies, nothing is more
desirable than that those who oppose them be UNIFIED in their
command structure, and that EVERY person who opposes them belong to
a pyramid style group. Such groups and organizations are easy to
kill. Especially in light of the fact that the Justice (sic)
Department promised in 1987 that there would never be another group
to oppose them that they did not have at least one informer in!
These federal "friends of government" are ZOG or ADL intelligence
agents. They gather information that can be used at the whim of a
federal D.A. to prosecute. The line of battle has been drawn.
[INLINE] Patriots are REQUIRED, therefore, to make a conscious
decision to either aid the government in its illegal spying (by
continuing with old methods of organization and resistance), or to
make the enemy's job more difficult by implementing effective
countermeasures.
[INLINE] Now there will, no doubt, be mentally handicapped people
out there who will state emphatically in their best red, white, and
blue voice, while standing at a podium with an American flag draped
in the background and a lone eagle soaring in the sky above, that,
"So what if the government is spying? We are not violating any
laws." Such crippled thinking by any serious person is the best
example that there is a need for special education classes. The
person making such a statement is totally out of contact with
political reality in this country, and unfit for leadership of
anything more than a dog sled in the Alaskan wilderness. The old
"Born on the Fourth of July" mentality that has influenced so much
of the Aryan-American Patriot's thinking in the past will not save
him from the government in the future. "Reeducation" for
non-thinkers of this kind will take place in the federal prison
system where there are no flags or eagles, but an abundance of men
who were "not violating any laws.".
[INLINE] Most groups who "unify" their disparate associates into a
single structure have short political lives. Therefore, those
movement leaders constantly calling for unity of organization,
rather than the desirable Unity of Purpose, usually fall into one of
three categories:
1. They may not be sound political tacticians, but rather, just
committed men who feel unity would help their cause, while not
realizing that the government would greatly benefit from such
efforts. The Federal objective, to imprison or destroy all who
oppose them, is made easier in pyramid organizations.
2. Or, perhaps, they do not fully understand the struggle they are
involved in, and that the government they oppose has declared a
state of war against those fighting for faith, folk, freedom,
property and constitutional liberty. Those in power will use any
means to rid themselves of opposition.
3. The third class calling for unity, and let us hope this is the
minority of the three, are men more desirous of the supposed power
that a large organization would bestow, than of actually achieving
their stated purpose.
[INLINE] Conversely, the LAST thing federal snoops want, if they had
any choice in the matter, is a thousand different small phantom
cells opposing them. It is easy to see why. Such a situation is an
intelligence nightmare for a government intent upon knowing
everything they possibly can about those who oppose them. The
Federals, able to amass overwhelming strength of numbers, manpower,
resources, intelligence gathering, and capability at any given time,
need only a focal point to direct their anger [ie Waco]. A single
penetration of a pyramid style organization can lead to the
destruction of the whole. Whereas, leaderless resistance presents no
single opportunity for the Federals to destroy a significant portion
of the resistance.
[INLINE] With the announcement of the Department of Justice (sic)
that 300 FBI agents formerly assigned to watching Soviet spies in
the U.S. (domestic counter-intelligence) are now to be used to
"combat crime," the federal government is preparing the way for a
major assault upon those persons opposed to their policies. Many
anti-government groups dedicated to the preservation of the America
of our Forefathers can expect shortly to feel the brunt of a new
federal assault upon liberty.
[INLINE] It is clear, therefore, that it is time to rethink
traditional strategy and tactics when it comes to opposing state
tyranny, where the rights now accepted by most as being inalienable
will disappear. Let the coming night be filled with a thousand
points of resistance. Like the fog which forms when conditions are
right, and disappears when they are not, so must the resistance to
tyranny be.
Leaderless Resistance first appeared in The Seditionist in 1992. The
author, Louis Beam, is one of the most respected racialist leaders
in the world (within racialist circles, that is), and has
established his own homepage to distribute his work.
_______________________________________________________________
Texts Archive: Breakthrough Texts
From StanSqncrs at aol.com Sat Jul 25 00:42:12 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Sat, 25 Jul 1998 00:42:12 -0700 (PDT)
Subject: W.A.Y.
Message-ID: <62deae62.35b98c1a@aol.com>
In a message dated 7/24/98 10:12:55 AM Central Daylight Time,
0_rcummi at funrsc.fairfield.edu writes:
<< > WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?
>
>
Reason 1: You're from AOL
Reason 2: You don't know where the caps lock key is
Reason 3: You're looking on the cypherpunks list for music.
Reason 4: You're from AOL >>
Tee, hee hee.
I didn't find it on Cypherpunks (I didn't even check Cypherpunks for it :-) ),
it's from some media article. It described a incident that happened when
someone complained about someone elses loud music -
<< Patrol officers had
to bang on Joseph W. Wedemeyer's door for about
15 minutes before getting his attention, Capt. Robert
Linardi said. They charged him with disorderly conduct.
The next afternoon, Linardi said, Wedemeyer confronted
his neighbor on the street. Linardi said Wedemeyer,
who is white, called the neighbor, who is black, a
racial epithet and said, "I'm going to kill you." ... >>
That's the kind of music you're talking about, 'right'?
I heard they were after Tom('s) DeLay(ed Resignation), but they missed.
Direct hits to his brains and his heart, though! ;-)
Stan
From lreed at west.cscwc.pima.edu Sat Jul 25 03:32:48 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 25 Jul 1998 03:32:48 -0700 (PDT)
Subject: Tarantula Day Afternoon - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9B05.95BB8AA0.5@west.cscwc.pima.edu>
Tarantula Day Afternoon - SPACE ALIENS HIDE M DRUGS!!!
_______________________________________________________
* To: Linda Reed--PCC West Campus CSC
* Subject: Iz thiz real?
* From: Reeza!
* Sender: owner-cypherpunks at Algebra.COM
__________________________________________________________________
This reads as real, not the mindless rehashing of almost'was that typically
characterizes the posts from "Linda Reed".
Linda, are you sure you didn't eat the drugs, and imagine you were a space
alien?
Reeza!
__________________________________________________________________
As Carlos S. Thompson and Hunter Castenada would no doubt agree,
keeping track of what Was/!Was (TM), when surfing a Digital Mind
Wave on a hacked machine with both MultiMedia and MultiReality
capabilities, can sometimes leave one confused as to where OneSelf
(1) ends, and where the Other/GreatVoid (0) begins.
Adding to the confusion is the fact that the normal True/False
values returned by IfAndOrWhoTheFuckWantsToKnowConditionalParole
Statements, is (1) for True, and (0) for False, making it very
easy for graduates of the Richard Nixon School of Reality to
believe that OneSelf is always right, while the Other is always
wrong, and that thus, They (TM) are out to get you, and that if
they succeed, They won't have Little Jimmy Hacker's Sack to kick
around anymore.
On the other hand, the recent proliferation of rattlesnakes and
tarantulas showing up, out of the blue, on the doorstep of the
abode in which I am currently residing, as well as underneath the
desk from which I am currently canning the small squares of pink,
digital flesh being marketed on the CypherPunks Disturbed Male
LISP, leads me to believe that, unless I am picking up visions
of pre-release Stephen King novels through the fillings in my
teeth, then some part of what I am writing must be true enough
to be pissing *someone* off...
Regretfully, although I have been driving the tarantulas out
into the desert and releasing them (next to the mayor's house),
I have not checked to see if they actually contain little, tiny
brain electrodes in their skulls, whereby they may be directed
by remote control toward me, specifically, by the children of
spooks who really haven't gotten the hang of the new technology,
yet, and who seize the opportunity to grease the family income
by putting their relatives on the payroll.
Now, as far as the posts to the CypherPunks list purporting to
be from thirteen year-old nymphomaniacs and pipe-bomb avacados,
far be it from me to imagine, even in my deepest fits of raging
paranoia, that these might be some cheap attempt at getting me
to reply, given my past long, ramblind diatribes on young boys'
hardware, and young girls' software, not to mention the silly
allegations about Canada-wide warrants out for my arrest on Mad
Bomber charges.
As I will soon extrapolate (this is the *wrong* word to use,
here, but it sounds so much like it has to do with leather, and
bondage, that I couldn't help myself...) on, any Spook/LEA who
took the time and trouble to run previous editions of my many
public eruditions through their ComputerizedPersonalProfiling
System would undoubtedly find that any entrapment aimed toward
me, personally, should use bait which smelled like BitchInHeat
sprayed on a NuclearSuitcaseMoustrap.
[Not to mention, as I will explain in more detail, early next
week, trolling for interest/information on the on-site preparation
of anthrax-related types of substances which could be safely
created without risk of self-exposure, if one were to have an
interest in, let's say, for the sake of argument, wiping out all
of the members of an enemy training camp, leaving nothing but a
PileOfBones where a GangOfOppressors previously existed.]
Of course, any wild-eyed conspiracy theory involving a group
of individuals capable of monitoring the populace and having
agents in place throughout society who were in a position to
use detailed, effective personality profiles to control, fuck
with or entrap an astounding number of individual members of the
citizenry, would have to include hard evidence of research and
experimentation in these areas.
No problem...
The OfficiallyDeclaredGoodGuys working for GodBlessAmerica
SecretSpyAgencies, as opposed to SecretSpyAgencies of EvilForeign
GovernmentsofDarkerSkinnedPeople, always seem to find themselves
forced to, in order to develop the capacity to be here to help
us, study, in detail, the techniques and methods of the most vile,
depraved monsters on the face of the earth.
Thus CIA brainwashing researchers such as psychologist John
Gittinger, in order to prepare to 'help' us, needed not only to
study the records of the Nazi medical butchers at Dachau, and the
techniques of Communist Chinese brainwashing methods, but even to
pore over ancient documents which went as far back as the Spanish
Inquisition.
[Note From The Author: I would be the last to cast aspirsions on
Mr. Gittinger doing his job, any more than I would do so on the
Allan Memorial Institute Staff Members who chased an escaping
Lauren G. up Mount Royal, in her attempts to escape the mind-
butchery of Dr. Ewen Cameron, and, after dragging back, "shot her
full of sedatives, attached electrodes to her temples, and gave
her a dose of electroshock," or, even cast aspersions on those
nice folks at the Murrah Federal Building in Oklahoma City who
were only doing their jobs--and if a few people get their minds
destroyed, or children are burned alive in an agonizing, horrible
death as a result of these people doing their jobs, who am I to
complain, since things are OK for me...I'm eating regularly, TV
has been pretty good this week, and I was only beaten by guys
who looked a lot like Mounties, with a member of the Pima County
Sheriff's Department looking on, a single time this week.]
In order to put the efforts of our GodBlessAmerica SecretSpys
to crack open the secrets of the BadMindControllers, as well as
the minds of their own test subjects, into proper perspective,
we must take note that, according to Harold Wolff, a professor of
neurology and psychology at Cornell University,
"The problem faced by the physician is quite similar to that
faced by the Communist interrogator."
John Marks explains that,
"Both would be trying to put their subject back *in*harmony*
with*his*environment*, whether the *problem* was headache or
*ideological*dissent*." and that,
"He felt he could help his patients by putting them into an
isolated, disoriented state, from which it would be easier to
create new behavior patterning."
[EditWhore's Note: A quick perusal of the Mission Statements of
a wide variety of groups, organizations and agencies, such as
the Moonies, the Mafia, the CIA, the Political Party Machines,
the American Psychiatric Association, our Mothers and Fathers,
Teachers and Principals, were all trying to use 'Differential
Amnesia/PsychicDriving' because they were from SelfDeclared
Authority, and they were there to Help (TM) us...]
[Note From T. Arthur: I, personally, have had so much Help (TM)
during my lifetime, that I have had to have reconstrutive surgery
on my ButtHole six times.]
Anyway...
The *BadNews*, for those concerned about the 'potential' for
current InterNet/Computer Technology to be used in putting us all
in little digital boxes (for future herding into little digital
feeding pens, to eventually be heavily salted and spit out into
snack-bowls on the counters of Reptilian Nazi bars, during Happy
For*Some*OfUsHour), is that the work towards eventually being
able to take polls of the *average* public mind, as well as making
the public mind *average*, has been going on at a hectic pace for
over a half-century, and that Computer/InterNet technology is
merely icing on the cake for the Controllers who already know
that the 'MineSweeper' game in Windows is even more fun when
played in the MeatSpace of ThirdWorldCountries, using children
as playing pieces, to guess where the mines are.
("OK, Raoul, now take two steps to the left...")
In the late thirties and early forties, a variety of university
educators/researchers were involved in the twin areas of devising
ways to measure/categorize the populace and influence/program the
citizenry, as well.
General Donovan enlisted Harvard psychology professor H. Murray
to devise a testing program to help sort through the recruits
being rushed through the OSS. This systematic effort to evaluate
an individual's personality, in order to predict his future
behavior, would soon be used in large corporations, starting
with AT&T.
Around the same time, Erich Fromm's 1930's questionnaire, which
had been devised to psychoanalyze German workers as being either
"authoritarian," "revolutionary," or "ambivalent," was changed
by Theodor Adorno to be used in a more politically correct manner,
measuring the "democratic personality," rather than measuring the
"revolutionary personality." (TroubleMakers, all of them...)
The end-goal of this fixation on 'measuring,' of course, is
to weed out the misfits, and to recognize which individuals would
benefit from a 'reeducation' of their basic world view.
Madison Avenue would fund much of the public-opinion survey
development used to guage and measure different categories of
the citizenry, while the Office of Radio Research at Columbia
University would emerge from the MindControlCloset as the Bureau
of Applied Social Research, with Cominterns' Lazersfeld turning
his attentions to psychoanalyzing American voting behavior.
Naturally, the first American President elected with the Madison
Avenue and Social Research agencies in full control of the his
campaign, was a military man, former General, Dwight Eisenhower.
By the time that MassMindControl techniques were sufficiently
developed to enable them to be used influence the election of our
political leaders, MKULTRA resident psychologist, John Gittinger,
had apparently learned enough about interrogation from his study
of the Spanish Inquisition, Dachau, Communist China, etc., to
create a unique system for assessing personality and predicting
future behavior.
His 'Personality Assessment System' (PAS), has not only been
described as "the key to the whole clandestine business," but was
quickly integrated into government, education, military, cororate
and societal arenas as a means of determining the future, and the
positions to be held, by those who had been categorized by the
plethora of variations that were generated from Gittinger's work.
One of the keys to Gittinger's PAS, was it's ability to reveal,
with "uncanny accuracy," how well people were able to "adapt their
social behavior to the demands of the culture they lived in."
In essence, it was the perfect tool for weeding out the trouble
makers and misfits who were incapable or unwilling to 'adapt' to
whatever elements of society and culture which were deemed to
be 'important' by those in charge of developing the tests.
Gittinger was funded under the cover of the Human Ecology Found-
ation, and CIA officials considered his work to be such a major
triumph in mind-control technology, that they moved his base of
operations to a CIA proprietary company, Psychology Assessment
Associates, in Washington.
They provided psychological services for American corporations
overseas, with branch offices in Hong Kong, Europe, and throughout
the Far East, enabling them to influence the nature and types of
the 'personalities' that would move into positions of influence
in American firms around the world.
The Human Ecology Foundation literally inundated the research
and educational community with hundreds of thousands of dollars
in grants to expand the range of the PAS to include a wide variety
of government, educational, corporate and social arenas, including
a grant to the Educational Testing Service, which prepares the
College Board Exams which decides who advances in the American
system of higher education.
David Saunders, in charge of the ETS's research, studied the
correlation between brain (EEG) patterns and the College Board
Exams results, as well as helping Gittinger apply the system to
other countries and cultures.
Gittinger, who was "building a unique database on all phases
of human behavior" (Gee, I wonder what for...), was able to do
a bang-up job in this area, as a result of the Human Ecology
Foundation being able, as the project funder of most research
in this area, to require the researchers to provide them with
the gathered data.
John Marks tells us,
"Gittinger collected Wechslers of businessmen, students, high-
priced fashion models, doctors, and just about any other discrete
group he could find a way to have tested. In huge numbers, the
Wechslers came flowing in, 29,000 sets, in all, by early 1970's,
each one accompanied by biographic data."
Gettinger particularly sought out results on deviant forms of
personality--people who had rejected the values of their society
or who had some hidden vice--since, although the PAS had become
the darling of the psychological research community, it's chief
purpose was to expand, into the public sector, the clandestine
art of "assessing and exploiting human personality and motivations
for ulterior purposes," as the CIA Inspector General said in 1963,
while giving high marks to the PAS meeting the "prime objectives"
of "control, exploitation, or neutralization," while recognizing
that "These objectives are innately anti-ethical rather than
therapeutic in their intent."
As John Marks succinctly states, "In other words...the business
of the PAS, like that of the CIA, is control."
Those who are particularly enamored of themselves, due to how
superiorly they performed on their College Entrance Exams, will
be happy to know that, if they find themselves unemployed, they
may well have a position waiting for them in Uruguay, where John
Gittinger took a personal hand in using the PAS to help the CIA
select members of an anti-terrorist police unit known for their
incredibly brutal methods, including torture.
A former CIA psychologist states, "If you put a lot of money out
there, there are many people who are lacking the ethics even of
the CIA." He adds that the U.S. has become an extremely control-
oriented society from the classroom to politics to television
advertising.
John Marks notes, "Spying and the PAS techniques are unique only
in that they are more systematic and secret."
Another CIAMindControlJustifyingAngel, a Technical Services
Section (capable of writing *real* 'poison pen letters') scientist
speaks of the CIA 'behavioral research' being, as Marks describes
it, "a logical extension of the efforts of American psychologists,
psychiatrists,and sociologists to change behavior," with their
motivation being to "manipulate their subjects in trying to make
mentally disturbed people well, in turning criminals into law-
abiding citizens, and in pushing poor people to get off welfare."
The CIAMindControlJustifyingAngel cites these as examples of
"behavior control modification for socially acceptable reasons
which...change from time to time" in regard to the public's
attitude.
What the scientist fails to mention, is that virtually all of
the research and experimentation in the above areas has resulted
from the work being funded and directed by secret government
agencies who *direct* the work into these areas.
(e.g. - Psychedelic therapy being wholly instigated by the CIA
and Military Intelligence, until they pulled the plug overnight,
after their own needs had been met, at which time all of the
doctors, patients and research subjects could GoFuckThemselves!)
Not only are minimum-wage employees at the local Circle-K
convenience store chosen by CIA proxy, but also an amazing number
of current research subjects in experiments which, on the surface,
seem to be perfectly legitimate.
A great deal of this mind-control experimentation has been done
under the guise of research on alcoholism and mental illness.
For instance, one of the first external applications of John
Gittinger's CIA/PAS work was the Hoffer-Osmond Diagnostic Test
for Schizophrenia.
Hoffer and Osmond had received a lot of CIA funding to do work
with alcoholics, who were good subjects for mind-control work, as
their was no real 'treatment' involved, which would only interfere
with the true purposes of the experiments and research.
Once the PAS made it possible for the CIA to efficiently and
effectively test subjects for their suitability for MKULTRA mind-
control work, the Hoffer-Osmond Diagnostic Test was miraculously
born, wherein a wide range of people who would have ordinarily
received varying diagnoses, were suddenly classified under the
umbrella of Schizophrenia, which, lo and behold, CIA/Rockerfeller
Foundation grantee physicians had discovered could be 'treated'
with OrthoMolecular (Vitamin) Therapy, which, conveniently, would
also not interfere with the methods and goals of the current mind-
control experiments, since the MKULTRA was no longer interested
in finding out the potential of mind-control techniques dependent
on the subjects being whacked-out on heavy drugs.
In the end, we are left with a disturbing picture of American
Military and Government Secret Intelligence Agencies being the
driving force behind the instigation of almost all modern research
into a wide variety of Scientific Arenas which are coordinated
under the universal umbrella of the Controllers, the goal being
to have access to the information and tools necessary to herd us
all into categories from which we can then be spit out into the
system into a predesignated position in society, or just plain
spit out...
ou remember the BadNazis, don't you? ou know, the ones who
were sentenced to be hung at the Nuremberg trials, for engaging
in research that U.S. Military Intelligence immediately grabbed,
in order to 'study'?
Well, it turns out that many of the BadNazis were magically
turned into GoodNazis, by the waving of a DeNazification Wand.
And who was 'waving' this DeNazification Wand?
The UsualSuspects, of course...
Dr. Ewen Cameron, the man who butchered the minds of women who
were suffering from nothing more than menopause or post-partum
depression, was a DeNazification WandWaver.
A variety of Commintern's I.S.P. were involved in deciding who
got WavedAt with the DeNazification Wands, and who got Whacked
by them, including I.S.P.'s Marcuse, Neumann and Kirchheimer,
who wrote the Denazification Guide.
Most amazingly of all, many of those chosen as being suitable
candidates for DeNazification, were hand-picked for eligibility
for entry into the U.S. under new identities, as part of Project
PaperClip, by one of the main BumBuddies of the AngelOfDeath,
Josef Mengeles.
[Note from T. Arthur: Although the actual whereabouts of the
AngelOfDeath have remained a matter of speculation and debate
over the years, I have reason to believe, as a result of the
information I received from attaching a 9V battery to the
electrodes implanted in the skull of yet another Tarantula
who emerged from under my computer desk, scant minutes ago,
that Dr. Mengeles is currently living next door to me, with
his rent being paid by the RCMP and the CIA.
Those who wish to verify this information for themselves will
be able to locate the Tarantula in Tucson, outside of the
mayor's home, in about an hour.]
While the Controllers continue to yank the mental and emotional
chains of the general public, through use of OfficiallyRecognized
BadGuys, and the 4HorseMen, etc., they seem to have absolutely no
qualms about importing the Monsters into America and setting them
up with the best of what the country has to offer, in order to
further government interest in activities which have resulted
in death sentences to those on the 'losing' end of various wars,
as well as giving high-level positions to those capable of helping
the GoodGuys to tweak the MindControl technology used by the Bad
Guys, to exercise BadSocialControl, so that the GoodGuys can use
that same technology to exercise GoodSocialControl.
[I've got to go now. I just finished filling out the application
for my Fresh Values Card, from Smith's, which gives me a nickle
off on a can of beans for informing them which of my neighbors
have Jewish blood coursing through their veins. (ou need to turn
in five Jews, and I only know three, so I fudged on a couple of
the entries...) - T. Arthur]
Jews - Smoke 'em if you got 'em...
From howree at cable.navy.mil Sat Jul 25 04:49:21 1998
From: howree at cable.navy.mil (Reeza!)
Date: Sat, 25 Jul 1998 04:49:21 -0700 (PDT)
Subject: Todd Bowers: Dumbass
In-Reply-To: <199807240605.IAA00062@replay.com>
Message-ID: <3.0.5.32.19980725214751.0087d210@205.83.192.13>
At 08:05 AM 24 07 98 +0200, Anonymous wrote:
>On Thu, 23 Jul 1998, Todd Bowers wrote:
>
>> cool ..... i am 13
>>
>
>Actually, your being a complete dumbass overshadows your being 13.
>
Not to mention you forgot to use 3l33t zp33l1n6.
Reeza!
From info at digfrontiers.com Sat Jul 25 04:49:43 1998
From: info at digfrontiers.com (Digital Frontiers Info)
Date: Sat, 25 Jul 1998 04:49:43 -0700 (PDT)
Subject: HVS Toolkit 25% Discount Offer
Message-ID: <199807250327.WAA26488@digfrontiers.>
Hi --
We would like to thank you for your download of an HVS Series demo. First,
we apologize to those of you who received multiple copies of a recent
mailing from us as a result of our email server meltdown. We've now
implemented an email notification system that should prevent such woeful
circumstances from happening again. If you don't wish to receive more
information about Digital Frontiers special offers please reply to
info at digfrontiers.com and ask to be removed.
As a gesture of thanks and appreciation, we would like to offer you a 25%
discount on our HVS Toolkit Pro, which includes the latest versions of the
award-winning HVS ColorGIF, HVS JPEG and HVS Animator Pro, through August
30th 1998. HVS Tooolkit Pro regularly retails at $208 but you may purchase
it for $156 (more than 50% off separate retail prices) for this limited
time only.
Because this offer is only available to demo registrants, it will not be
available on our commerce server. Individual products are available at a
10% discount from our commerce server at
http://www.digfrontiers.com/purchase.html as part of our summer sale. For
product information, please visit http://www.digfrontiers.com, or reply to
this email.
To take advantage of the 25% offer, please email, fax or call us with the
following information:
First Name:
Last Name:
Billing Address:
Email: (if faxed):
Phone Number:
Credit Card Type:
Credit Card Number:
Expiration Date:
Platform: (Mac or Windows):
Yes, I would like to order the HVS Toolkit Pro at $156. Please send me my
download codes by to:
Signature ( or type name):
Digital Frontiers, LLC
http://www.digfrontiers.com
voice: 847-328-0880
fax: 847-869-2053
info at digfrontiers.com
From howree at cable.navy.mil Sat Jul 25 05:27:59 1998
From: howree at cable.navy.mil (Reeza!)
Date: Sat, 25 Jul 1998 05:27:59 -0700 (PDT)
Subject: Iz that real?
In-Reply-To: <009C9AA3.421B6260.5@west.cscwc.pima.edu>
Message-ID: <3.0.5.32.19980725222452.00886100@205.83.192.13>
At 03:50 PM 24 07 98 MST, Linda Reed--PCC West Campus CSC wrote:
>X-URL: mailto:cypherpunks at toad.com
>X-Mailer: Lynx, Version 2-4-2
>X-Personal_name: Linda Reeza
>X-From: obvious at forgery.eff
>
>Reeza,
> Stop hacking those military computer accounts, and quit backtalking
>to your teacher, or you'll never get out of grade 4...
>
Dear Linda:
I'm not hacking a military account.
Sincerely,
Reeza!
ps- which school of mine did you sub in?
From stuffed at stuffed.net Sat Jul 25 07:47:55 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Sat, 25 Jul 1998 07:47:55 -0700 (PDT)
Subject: My mom is a stripper/Sporty Spice killed my dog
Message-ID: <19980725132052.8397.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/25/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From lreed at west.cscwc.pima.edu Sat Jul 25 09:07:15 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 25 Jul 1998 09:07:15 -0700 (PDT)
Subject: Freddy Does Teleco
Message-ID: <009C9B34.4F0CB5A0.2@west.cscwc.pima.edu>
_________________________________________________________________
* To: Cypherpunks
* Subject: [Fwd: Tarantula Day Afternoon - SPACE ALIENS HIDE MY
DRUGS!!!]
* From: Frederick Burroughs
_________________________________________________________________
Linda Reed--PCC West Campus CSC wrote:
> On the other hand, the recent proliferation of rattlesnakes and
> tarantulas showing up, out of the blue, on the doorstep of the
> abode in which I am currently residing, as well as underneath the
> desk from which I am currently canning the small squares of pink,
> digital flesh being marketed on the CypherPunks Disturbed Male
> LISP, leads me to believe that, unless I am picking up visions
> of pre-release Stephen King novels through the fillings in my
> teeth, then some part of what I am writing must be true enough
> to be pissing *someone* off...
The abundance of black widow spiders, timber rattlers and copperheads here in
the yeastern US doesn't bother me. It's the incessant patterned interference
displayed on the TV, the fact that all the light fixtures and wall sockets are
loose and missing screws, and all my new neighbors are young retirees wearing
dark blue baseball caps (how'd they find this god forsaken snake pit?), that
brother me so much.
It's queer how much telephone maintenance is required in this rural setting. If
there's as much maintenance in the rest of the service area as there is around
my residence and place of employment, then why is the line quality so poor
(constant clicks, echoes and tone changes)? Granted most of these telephone
maintenance guys aren't doing anything when I pass them, they're all wearing
dark glasses and seem to be listening for something in their air conditioned
utility vans.
_________________________________________________________________
Freddy,
I find it interesting that shortly after taking up residence at a
lady friend's house in Tucson, her phone went out and had to be 'fixed'
by the local Teleco.
Naturally, the guy who came to 'fix' the phone was, as you point out,
wearing dark glasses, and, after messing with the box on the side of
the house, declared that the problem was at the Teleco end, and that
the phone would work after he returned downtown to finish 'fixing' the
problem.
Also interesting is the fact that there are two other residences which
have feeds on the same line, and the only one that had a 'problem' was
the one I am at.
I took the liberty of popping open the Teleco box on the side of the
house, and found a wiring scheme which is very creative in the way
that it routes the transmissions.
Tojohoto
p.s. - Have you got the 10 kilos of heroin ready to ship?
From k4t at beachaccess.com Sat Jul 25 10:38:56 1998
From: k4t at beachaccess.com (Kirk Fort)
Date: Sat, 25 Jul 1998 10:38:56 -0700 (PDT)
Subject: my thoughts for this list
Message-ID: <01bdb7f2$32c9da60$f0763bcf@interpath.net>
I have been getting this list for a few days. I subscribed to this list in
the hopes I could learn something about crypto, in particular the GPG
project. So far I have seen pretty much nothing about crypto or anything a
person who is not high or crazy could understand. This list is so messed up
its hillarious. I didn't want to add to the string of useless messages, but
it doesn't look like anyone cares anyway. I will be monitoring the list for
any signs of intelligent conversation.
kfort
From lreed at west.cscwc.pima.edu Sat Jul 25 11:04:11 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 25 Jul 1998 11:04:11 -0700 (PDT)
Subject: Beans - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9B44.962BDA00.5@west.cscwc.pima.edu>
Beans, Beans, They're Good For The Heart - SAHMD!!!
___________________________________________________
But they are very, very bad for the lungs.
By popular request, as a result of a plethora of requests being
forwarded to me by , even though I had no idea
that so many subscribers to the CypherPunks list were aware of
the true existence of the DevNullServer, I will expand a bit on
the simplicity of the on-site creation of biochemical substances
with the capacity to neutralize ExcessivelyAcidicAuthoritarians.
Reading the literature on the production of such biochemical
agents as Rincin, etc., one is struck by the need to go to great
lengths to prevent being struck by the end-results of one's own
experimentation in the creation of such substances.
The need for outrageously complex security precautions in the
preparation of biochemical agents makes the task prohibitive for
those with limited access to funds and/or proper tools for the
job. Or so it would seem...
The fact of the matter is, if one pays close attention to the
methods and processes of producing these agents, it quickly becomes
apparent that eliminating the need for the transporting of these
substances thereby eliminates much of the need for expensive and
time-consuming safeguards against self-exposure to these deadly
agents.
In effect, if one can develop a mechanism to produce these
biochemical agents at the site at which one wishes them to be
released, then he or she can be relaxing on a beach at Honolulu
while the little spores are busy taking care of business.
MadBombers use timing mechanisms which delay the triggering of
their products until they have had time to start making tracks
toward the car that their government coconspirators have taken
the rear license-plate off of.
The spawning process of biochemical agents is a natural trigger-
delay system which can be used to effectively create the desired
substances while one is using the time to beat feat to an exotic
island paradise.
Spawning biochemical agents where 'a little goes a long way,' means
that, once the mechanism kicks in, the results will be dramatic and
far-reaching.
Another advantage of on-site production is that dogs which are
trained to recognize the scent of biochemical agents are unlikely
to be trained to set off barking-flags over the scent of the basic
ingredients used to create those substances.
The down-side, of course, is that one cannot be certain that the
desired substance will not be created/disseminated at a time when
a local grade-school class is visiting the site as part of an LEA
propagand exercise.
However, if one is capable of taking the position that a government
organization which consciously places a day-care center in a federal
building known to be a soft-target for anti-government radicals, the
responsibilty for their deaths falls on the government, then c'est la
vie...
Personally, I am of the opinion that any goverment that has no qualms
about letting hundreds of poor, black men suffer the vile consequences
of untreated syphilus, burning out the brains of average citizens to
further the cause of mind-control research, expose unwitting citizens
to radiation and hallucinogenic experiments without their consent, ad
infinituum, can pretty much go fuck themselves if they attempt to
decry those who attack them as Monsters, as a result of so-called
innocents suffering as a result of the government's complacency and
audacity in deeming themselves above retribution by those they are in
the habit of so casually oppressing and persecuting.
Anyone who wishes to attend the grand spectacle of the RCMP's
Musical Ride, during the celebration of their 150th anniversary of
keeping the average citizen from rising up against the rich and
powerful, is welcome to do so.
However, if they find their ass getting scorched as a result of
the efforts of those being fucked in the ass by Dudley DoWrong taking
it upon themselves to throw a serious fuck back towards whence it
came, they should refrain from whining.
Pardon me for sounding just a tad 'callous,' but I have had the
opportunity to peruse private emails and memos between various
members of Canada's Finest, and I find it rather disgusting that
they can so casually discuss the probability of their attempts to
pressure a mentally disabled person into 'cracking' resulting in
HimOrHer committing physical destruction on the local schoolchildren
(based on HisOrHer publication of a 'KILL THE CHILDREN!!!' Bienfait
Nutly News Special), so that they will be able to step in as the
GoodGuys who bring HimOrHer to Justice (TM), without suffering any
personal losses in the process.
Skeptical? Ask the RCMP to provide you with a copy of the files on
the computer which they stole from me, after monitoring my website
and emails, which made it clear that my computer fulfilled an essential
role in researching my medical condition, and maintaining effective
treatment for it. Once you receive the files, read one that is named
'warning.sog,' in which Bianca forwards a file purloined from a
Canadian government computer system, which contains a discussion as
to the desirability of putting pressure on me at a time when I am
short on my medications. Do a text search on a file which suggests
that, due to my Tourette Syndrome, it is inadvisable for LEA's to
work me over for merely shouting and cursing, but that if I begin
waving my arms around, they can consider themselves in danger, and
do anything they desire to my sorry ass.
Think I'm kidding?
Thanks to the incredible ignorance of LEA's who believe that they
are free to monitor the communications of the citizenry, while the
reverse is illegal and unacceptable, I was afforded the opportunity
to BeatFeet across the U.S. border the day before the Mounties appeared
on my doorstep to steal my computers as punishment for speaking the
Truth, and bury backup copies of my complete hard drive, which contain
information which makes the above 'allegations' seem trite, by
comparison.
What I find hilarious is that copies of extremely culpatory and
embarassing files/emails were forwarded to a variety of those from
who they originated, yet monitoring of the ongoing investigation
in this regard indicates that the FuckWads are as conscientious
about fucking over the internal investigators as they are about
fucking over the citizenry.
Equally hilarious is the fact that whoever is in charge of running
the Official RCMP WebSite seems to be unaware that any directory
without an 'index.html' file, when accessed, gives the user access
to *all* of the files in the directory, which makes them a very,
very bad place to wittingly or unwittingly store sensitive files.
In case you haven't already guessed, I am currently drunk, onery
and mean.
Any tarantula that bites me is in for a big surprise...
From lreed at west.cscwc.pima.edu Sat Jul 25 11:05:21 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 25 Jul 1998 11:05:21 -0700 (PDT)
Subject: A Thousand Points Of Fight
Message-ID: <009C9B44.CC4026A0.7@west.cscwc.pima.edu>
Breakthrough Texts
Leaderless Resistance
An Essay by Louis Beam
"Leaderless Resistance" -- Part One
[IMAGE] The concept of leaderless resistance was proposed by Col.
Ulius Louis Amoss, who was the founder of International Service of
Information Incorporated, located in Baltimore, Maryland. Col. Amoss
died more than 15 years ago, but during his life he was a tireless
opponent of Communism, as well as a skilled intelligence officer.
[INLINE] Col. Amoss first wrote of leaderless resistance on April
17, 1962. His theories of organization were primarily directed
against the threat of eventual Communist takeover in the United
States. The present writer, with the benefit of having lived many
years beyond Col. Amoss, has taken his theories and expounded on
them.
[INLINE] Col. Amoss feared the Communists. This author fears the
federal government. Communism now represents a threat to no one in
the United States, while federal tyranny represents a threat to
EVERYONE. The writer has joyfully lived long enough to see the dying
breaths of Communism, but may unhappily remain long enough to see
the last dying gasps of freedom in America.
[INLINE] In the hope that, somehow, America can still produce the
brave sons and daughters necessary to fight off ever-increasing
persecution and oppression, this essay is offered. Frankly, it is
too close to call at this point. Those who love liberty, and believe
in freedom enough to fight for it, are rare today; but within the
bosom of every once great nation, there remains secreted the pearls
of former greatness.
[INLINE] They are there. I have looked into their sparkling eyes;
sharing a brief moment in time with them as I passed through this
life. Relished their friendship, endured their pain, and they mine.
We are a band of brothers native to the soil, gaining strength one
from another as we have rushed headlong into battle that all the
weaker, timid men say we can not win. Perhaps not... but then again,
perhaps we can. It's not over till the last freedom fighter is
buried or imprisoned, or the same happens to those who would destroy
their liberty.
[INLINE] Barring any cataclysmic events, the struggle will yet go on
for years. The passage of time will make it clear to even the more
slow among us that the government is the foremost threat to the life
and liberty of the folk. The government will no doubt make today's
oppressiveness look like grade school work compared to what they
have planned in the future. Meanwhile, there are those of us who
continue to hope that somehow the few can do what the many have not.
[INLINE] We are cognizant that before things get better they will
certainly get worse as government shows a willingness to use ever
more severe police state measures against dissidents. This changing
situation makes it clear that those who oppose state repression must
be prepared to alter, adapt, and modify their behavior, strategy,
and tactics as circumstances warrant. Failure to consider new
methods and implement them as necessary will make the government's
efforts at suppression uncomplicated. It is the duty of every
patriot to make the tyrant's life miserable. When one fails to do so
he not only fails himself, but his people.
[INLINE] With this in mind, current methods of resistance to tyranny
employed by those who love our race, culture, and heritage must pass
a litmus test of soundness. Methods must be objectively measured as
to their effectiveness, as well as to whether they make the
government's intention of repression more possible or more
difficult. Those not working to aid our objectives must be
discarded, or the government benefits from our failure to do so.
[INLINE] As honest men who have banded together into groups or
associations of a political or religious nature are falsely labeled
"domestic terrorists" or "cultists" and suppressed, it will become
necessary to consider other methods of organization, or as the case
may very well call for: non- organization.
[INLINE] One should keep in mind that it is not in the government's
interest to eliminate all groups. Some few must remain in order to
perpetuate the smoke and mirrors for the masses that America is a
"free democratic country" where dissent is allowed. Most
organizations, however, that possess the potential for effective
resistance will not be allowed to continue. Anyone who is so naive
as to believe the most powerful government on earth will not crush
any who pose a real threat to that power, should not be active, but
rather at home studying political history.
[INLINE] The question as to who is to be left alone and who is not,
will be answered by how groups and individuals deal with several
factors such as: avoidance of conspiracy plots, rejection of
feebleminded malcontents, insistence upon quality of the
participants, avoidance of all contact with the front men for the
federals - the news media - and, finally, camouflage (which can be
defined as the ability to blend in the public's eye the more
committed groups of resistance with mainstream "kosher" associations
that are generally seen as harmless).
[INLINE] Primarily though, whether any organization is allowed to
continue in the future will be a matter of how big a threat a group
represents. Not a threat in terms of armed might or political
ability, for there is none of either for the present, but rather,
threat in terms of potentiality. It is potential the federals fear
most. Whether that potential exists in an individual or group is
incidental. The federals measure potential threat in terms of what
might happen given a situation conducive to action on the part of a
resistive organization or individual. Accurate intelligence
gathering allows them to assess the potential. Showing one's hand
before the bets are made is a sure way to lose.
[INLINE] The movement for freedom is rapidly approaching the point
where, for many people, the option of belonging to a group will be
non-existent. For others, group membership will be a viable option
for only the immediate future. Eventually, and perhaps much sooner
than most believe possible, the price paid for membership will
exceed any perceived benefit. But for now, some of the groups that
do exist often serve a useful purpose either for the newcomer who
can be indoctrinated into the ideology of the struggle, or for
generating positive propaganda to reach potential freedom fighters.
It is sure that, for the most part, this struggle is rapidly
becoming a matter of individual action, each of its participants
making a private decision in the quietness of his heart to resist:
to resist by any means necessary.
[INLINE] It is hard to know what others will do, for no man truly
knows another man's heart. It is enough to know what one himself
will do. A great teacher once said "know thyself." Few men really
do, but let each of us promise ourselves not to go quietly to the
fate our would-be masters have planned.
[INLINE] The concept of leaderless resistance is nothing less than a
fundamental departure in theories of organization. The orthodox
scheme of organization is diagrammatically represented by the
pyramid, with the mass at the bottom and the leader at the top. This
fundamental of organization is to be seen not only in armies, which
are, of course, the best illustration of the pyramid structure, with
the mass of soldiery (the privates) at the bottom responsible to
corporals; who are in turn responsible to sergeants, and so on up
the entire chain of command to the generals at the top. But the same
structure is seen in corporations, ladies' garden clubs, and in our
political system itself. This orthodox "pyramid" scheme of
organization is to be seen basically in all existing political,
social, and religious structures in the world today, from the
Federal government to the Roman Catholic Church.
[INLINE] The Constitution of the United States, in the wisdom of the
Founders, tried to sublimate the essential dictatorial nature
pyramidal organization by dividing authority into three: executive,
legislative, and judicial. But the pyramid remains essentially
untouched.
[INLINE] This scheme of organization, the pyramid, is not only
useless, but extremely dangerous for the participants when it is
utilized in a resistance movement against state tyranny. Especially
is this so in technologically advanced societies where electronic
surveillance can often penetrate the structure, thus revealing its
chain of command. Experience has revealed over and over again that
anti-state political organizations utilizing this method of command
and control are easy prey for government infiltration, entrapment,
and destruction of the personnel involved. This has been seen
repeatedly in the United States where pro-government infiltrators or
agent provocateurs weasel their way into patriotic groups and
destroy them from within.
[INLINE] In the pyramid form of organization, an infiltrator can
destroy anything which is beneath his level of infiltration, and
often those above him as well. If the traitor has infiltrated at the
top, then the entire organization from the top down is compromised
and may be traduced at will.
"Leaderless Resistance" -- Part Two
[IMAGE] A recent example of the cell system taken from the left wing
of politics are the Communists. The Communists, in order to get
around the obvious problems involved in pyramidal organization,
developed to an art the cell system. They had numerous independent
cells which operated completely isolated from one another and
particularly with no knowledge of each other, but were orchestrated
together by a central headquarters. For instance, during WWII, in
Washington, it is known that there were at least six secret
Communist cells operating at high levels in the United States
government (plus all the open Communists who were protected and
promoted by President Roosevelt), however, only one of the cells was
rooted out and destroyed. How many more actually were operating, no
one can say for sure.
[INLINE] The Communist cells which operated in the U.S. until late
1991 under Soviet control could have at their command a leader who
held a social position which appeared to be very lowly. He could be,
for example, a busboy in a restaurant, but in reality a colonel or a
general in the Soviet Secret Service, the KGB. Under him could be a
number of cells, and a person active in one cell would almost never
have knowledge of individuals who were active in other cells; in
fact, the members of the other cells would be supporting that cell
which was under attack and ordinarily would lend very strong support
to it in many ways. This is at least part of the reason, no doubt,
that whenever in the past Communists were attacked in this country,
support for them sprang up in many unexpected places.
[INLINE] The effective and efficient operation of a cell system
after the Communist model is, of course, dependent upon central
direction, which means impressive organization, funding from the
top, and outside support, all of which the Communists had.
Obviously, American patriots have none of these things at the top or
anywhere else, and so an effective cell organization based upon the
Soviet system of operation is impossible.
[INLINE] Two things become clear from the above discussion. First,
that the pyramid form of organization can be penetrated quite easily
and it thus is not a sound method of organization in situations
where the government has the resources and desire to penetrate the
structure, which is the situation in this country. Secondly, that
the normal qualifications for the cell structure based upon the Red
model does not exist in the U.S. for patriots. This understood, the
question arises "What method is left for those resisting state
tyranny?"
[INLINE] The answer comes from Col. Amoss who proposed the "Phantom
Cell" mode of organization which he described as Leaderless
Resistance. A system of organization that is based upon the cell
organization, but does not have any central control or direction,
that is in fact almost identical to the methods used by the
committees of correspondence during the American Revolution.
Utilizing the Leaderless Resistance concept, all individuals and
groups operate independently of each other, and never report to a
central headquarters or single leader for direction or instruction,
as would those who belong to a typical pyramid organization.
[INLINE] At first glance, such a form of organization seems
unrealistic, primarily because there appears to be no organization.
The natural question thus arises as to how are the "Phantom Cells"
and individuals to cooperate with each other when there is no
inter-communication or central direction?
[INLINE] The answer to this question is that participants in a
program of leaderless resistance through "Phantom Cell" or
individual action must know exactly what they are doing and how to
do it. It becomes the responsibility of the individual to acquire
the necessary skills and information as to what is to be done. This
is by no means as impractical as it appears, because it is certainly
true that in any movement all persons involved have the same general
outlook, are acquainted with the same philosophy, and generally
react to given situations in similar ways. The previous history of
the committees of correspondence during the American Revolution
shows this to be true.
[INLINE] Since the entire purpose of leaderless resistance is to
defeat state tyranny (at least in so far as this essay is
concerned), all members of phantom cells or individuals will tend to
react to objective events in the same way through usual tactics of
resistance. Organs of information distribution such as newspapers,
leaflets, computers, etc., which are widely available to all, keep
each person informed of events, allowing for a planned response that
will take many variations. No one need issue an order to anyone.
Those idealists truly committed to the cause of freedom will act
when they feel the time is ripe, or will take their cue from others
who precede them. While it is true that much could be said against
this kind of structure as a method of resistance, it must be kept in
mind that leaderless resistance is a child of necessity. The
alternatives to it have been shown to be unworkable or impractical.
Leaderless resistance has worked before in the American Revolution,
and if the truly committed put it to use themselves, it will work
now.
[INLINE] It goes almost without saying that Leaderless Resistance
leads to very small or even one-man cells of resistance. Those who
join organizations to play "let's pretend" or who are "groupies"
will quickly be weeded out. While for those who are serious about
their opposition to federal despotism, this is exactly what is
desired.
[INLINE] From the point of view of tyrants and would-be potentates
in the federal bureaucracy and police agencies, nothing is more
desirable than that those who oppose them be UNIFIED in their
command structure, and that EVERY person who opposes them belong to
a pyramid style group. Such groups and organizations are easy to
kill. Especially in light of the fact that the Justice (sic)
Department promised in 1987 that there would never be another group
to oppose them that they did not have at least one informer in!
These federal "friends of government" are ZOG or ADL intelligence
agents. They gather information that can be used at the whim of a
federal D.A. to prosecute. The line of battle has been drawn.
[INLINE] Patriots are REQUIRED, therefore, to make a conscious
decision to either aid the government in its illegal spying (by
continuing with old methods of organization and resistance), or to
make the enemy's job more difficult by implementing effective
countermeasures.
[INLINE] Now there will, no doubt, be mentally handicapped people
out there who will state emphatically in their best red, white, and
blue voice, while standing at a podium with an American flag draped
in the background and a lone eagle soaring in the sky above, that,
"So what if the government is spying? We are not violating any
laws." Such crippled thinking by any serious person is the best
example that there is a need for special education classes. The
person making such a statement is totally out of contact with
political reality in this country, and unfit for leadership of
anything more than a dog sled in the Alaskan wilderness. The old
"Born on the Fourth of July" mentality that has influenced so much
of the Aryan-American Patriot's thinking in the past will not save
him from the government in the future. "Reeducation" for
non-thinkers of this kind will take place in the federal prison
system where there are no flags or eagles, but an abundance of men
who were "not violating any laws.".
[INLINE] Most groups who "unify" their disparate associates into a
single structure have short political lives. Therefore, those
movement leaders constantly calling for unity of organization,
rather than the desirable Unity of Purpose, usually fall into one of
three categories:
1. They may not be sound political tacticians, but rather, just
committed men who feel unity would help their cause, while not
realizing that the government would greatly benefit from such
efforts. The Federal objective, to imprison or destroy all who
oppose them, is made easier in pyramid organizations.
2. Or, perhaps, they do not fully understand the struggle they are
involved in, and that the government they oppose has declared a
state of war against those fighting for faith, folk, freedom,
property and constitutional liberty. Those in power will use any
means to rid themselves of opposition.
3. The third class calling for unity, and let us hope this is the
minority of the three, are men more desirous of the supposed power
that a large organization would bestow, than of actually achieving
their stated purpose.
[INLINE] Conversely, the LAST thing federal snoops want, if they had
any choice in the matter, is a thousand different small phantom
cells opposing them. It is easy to see why. Such a situation is an
intelligence nightmare for a government intent upon knowing
everything they possibly can about those who oppose them. The
Federals, able to amass overwhelming strength of numbers, manpower,
resources, intelligence gathering, and capability at any given time,
need only a focal point to direct their anger [ie Waco]. A single
penetration of a pyramid style organization can lead to the
destruction of the whole. Whereas, leaderless resistance presents no
single opportunity for the Federals to destroy a significant portion
of the resistance.
[INLINE] With the announcement of the Department of Justice (sic)
that 300 FBI agents formerly assigned to watching Soviet spies in
the U.S. (domestic counter-intelligence) are now to be used to
"combat crime," the federal government is preparing the way for a
major assault upon those persons opposed to their policies. Many
anti-government groups dedicated to the preservation of the America
of our Forefathers can expect shortly to feel the brunt of a new
federal assault upon liberty.
[INLINE] It is clear, therefore, that it is time to rethink
traditional strategy and tactics when it comes to opposing state
tyranny, where the rights now accepted by most as being inalienable
will disappear. Let the coming night be filled with a thousand
points of resistance. Like the fog which forms when conditions are
right, and disappears when they are not, so must the resistance to
tyranny be.
Leaderless Resistance first appeared in The Seditionist in 1992. The
author, Louis Beam, is one of the most respected racialist leaders
in the world (within racialist circles, that is), and has
established his own homepage to distribute his work.
_______________________________________________________________
Texts Archive: Breakthrough Texts
From dulac at ip.pt Sat Jul 25 11:53:23 1998
From: dulac at ip.pt (Dutra de Lacerda)
Date: Sat, 25 Jul 1998 11:53:23 -0700 (PDT)
Subject: Larry King
In-Reply-To:
Message-ID: <4.0.1.19980725194807.00f85580@mail2.ip.pt>
At Saturday, you wrote:
>Some whisper that Larry King is the incarnation of the frog, mentioned in
>the book Some Like It Green, written by William Chutov.
>Can this be true? I have bad dreams about it.
>Please, help me out!
Wrong assumption.
Frogs are no aliens.
Ergo IT (Larry) is no frog.
Dulac.
- - -
Antonio Manuel Melo de Carvalho Dutra de Lacerda
Morada : Rua Rodrigues Cabrilho, 5 - 5 Esq.
1400 Lisboa, PORTUGAL
Telefone : +351-(1)-3013579
FAX & BBS : +351-(1)-3021098
From StanSqncrs at aol.com Sat Jul 25 17:42:22 1998
From: StanSqncrs at aol.com (StanSqncrs at aol.com)
Date: Sat, 25 Jul 1998 17:42:22 -0700 (PDT)
Subject: my thoughts for this list
Message-ID: <8ef13d67.35ba7b33@aol.com>
In a message dated 7/25/98 6:45:41 PM Central Daylight Time,
k4t at beachaccess.com writes:
<< I have been getting this list for a few days. I subscribed to this list in
the hopes I could learn something about crypto, in particular the GPG
project. So far I have seen pretty much nothing about crypto or anything a
person who is not high or crazy could understand. >>
Both help to make a hacker, from what I understand. :-)
<< This list is so messed up
its hillarious. I didn't want to add to the string of useless messages, but
it doesn't look like anyone cares anyway. I will be monitoring the list for
any signs of intelligent conversation. >>
It may be because there are certain hackers getting inbetween those that want
to actually say something, and the list. Fact is, I just unsubscribed from
this list, but my e-mail apparently didn't make it to the server.
Must be because I'm on AOL, 'right'? ;-)
Stan,
The MOST Important Page on the Net -
http://members.aol.com/whtsametau/camel/index.htm
From mix at anon.lcs.mit.edu Sat Jul 25 20:00:08 1998
From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer)
Date: Sat, 25 Jul 1998 20:00:08 -0700 (PDT)
Subject: my thoughts for this list +
Message-ID: <19980726030004.11032.qmail@nym.alias.net>
In a message dated 7/25/98 6:45:41 PM Central Daylight Time, k4t at beachaccess.com writes:
<< I have been getting this list for a few days. I subscribed to this list in
the hopes I could learn something about crypto, in particular the GPG
project. So far I have seen pretty much nothing about crypto or anything a
person who is not high or crazy could understand. >>
Both help to make a hacker, from what I understand. :-)
<< This list is so messed up
its hillarious. I didn't want to add to the string of useless messages, but
it doesn't look like anyone cares anyway. I will be monitoring the list for
any signs of intelligent conversation. >>
It may be because there are certain hackers getting inbetween those that want to actually say something, and the list. Fact is, I just unsubscribed from this list, but my e-mail apparently didn't make it to the server.
Must be because I'm on AOL, 'right'? ;-)
Here's another post that didn't seem to make it through-
======
In a message dated 7/24/98 10:12:55 AM Central Daylight Time, 0_rcummi at funrsc.fairfield.edu writes:
<< > WHY CANT I FIND ANY WHITE AMERICAN YOUTH ALBUMS ANYWHERE?
>
>
Reason 1: You're from AOL
Reason 2: You don't know where the caps lock key is
Reason 3: You're looking on the cypherpunks list for music.
Reason 4: You're from AOL >>
Tee, hee hee.
I didn't find it on Cypherpunks (I didn't even check Cypherpunks for it :-) ), it's from some media article. It described a incident that happened when someone complained about someone elses loud music -
<< Patrol officers had
to bang on Joseph W. Wedemeyer's door for about
15 minutes before getting his attention, Capt. Robert
Linardi said. They charged him with disorderly conduct.
The next afternoon, Linardi said, Wedemeyer confronted
his neighbor on the street. Linardi said Wedemeyer,
who is white, called the neighbor, who is black, a
racial epithet and said, "I'm going to kill you." ... >>
That's the kind of music you're talking about, 'right'?
I heard they were after Tom('s) DeLay(ed Resignation), but they missed. Direct hits to his brains and his heart, though! ;-)
=====
Stan (StanSqncrs at AOL.com)
The MOST Important Page on the Net -
http://members.aol.com/whtsametau/camel/index.htm
From gwb at gwb.com.au Sun Jul 26 02:39:57 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Sun, 26 Jul 1998 02:39:57 -0700 (PDT)
Subject: One Nation August Newsletter
Message-ID: <1.5.4.32.19980726083414.00743588@gwb.com.au>
Issue 2.3, August 1998
----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return this message
in the body.
----------------------------------------------------------------------------
Dear One Nation supporter in NSW
Pauline Hanson has just completed a whirlwind tour of Australia.
The tour has been an enormous success - although this aspect of her rallies
has been largely ignored by the media.
You will have noted the coverage given to the protests and for this reason
we would like to draw your attention to the following web pages.
The first demonstrates the links between extremists within the Labor party
and the violence perpetrated by protesters at One Nation meetings:
http://www.gwb.com.au/gwb/news/onenation/left/meljul98.html
The second looks at the organisation behind the student protests:
http://www.gwb.com.au/onenation/school.html
We would draw your attention to the new moderated on-line discussion forum
which you are encouraged to join and participate in.
This can be found at: http://plato.itsc.adfa.edu.au/politics/
Finally, to make your navigation of the large One Nation web site easier we
have installed a theme based 'site map' which can be found at:
http://www.gwb.com.au/onenation/site
GWB
Scott Balson
Pauline Hanson's Web Master
From lreed at west.cscwc.pima.edu Sun Jul 26 04:42:18 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sun, 26 Jul 1998 04:42:18 -0700 (PDT)
Subject: GodLess - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9BD8.781EFBC0.1@west.cscwc.pima.edu>
GodLess Capitalists - SPACE ALIENS HIDE M DRUGS!!!
___________________________________________________
"Centralism is dead," says Hayek; however, according to Friedman, it
is not so much centralism that is dead, but rather the futility, and
subsequent genre, of centralism. Dialectic construction states that
government is capable of truth, given that culture is distinct from
sexuality. Gonzalo implies that we have to choose between the textual
paradigm of discourse and dialectic cultural theory. It could be said
that the primary theme of Fielding's essay on Saussurean semiotics is
the failure, and hence the rubicon, of patriarchialist truth.
"Class is part of the collapse of reality," says Lyotard. In a sense,
the example of dialectic construction prevalent in JFK is also evident
in Heaven and Earth, although in a more mythopoetical sense. Habermas
promotes the use of the textual paradigm of discourse to attack
colonialist perceptions of language.
In the works of Vinge, a predominant concept is the concept of
neocapitalist consciousness. But Lacan uses the term 'Saussurean
semiotics' to denote the role of the observer as participant. The
subject is interpolated into a structuralist paradigm of expression
that includes truth as a totality.
If one examines the textual paradigm of discourse, one is faced with
a choice: either accept dialectic construction or conclude that
expression must come from the masses, but only if the premise of
semiotic theory is valid; otherwise, truth is part of the praxis of
sexuality. Hughes holds that we have to choose between Saussurean
semiotics and dialectic construction.
Milhon's critique of the textual paradigm of discourse suggests
that the task of the reader is social comment.
--Herr Doktor Prof. T.C. May, Ing.
See, I told you Tim May knew about that sort of crap.
Now, Greg Broiles told me that he knew T.C. May, and I'm no Tim May,
and I don't know all those fancy, intellectual words, but I've never
found anything that couldn't be adequately described using the eight
words you can't say on the InterNet, so I'm going to tell you all
about why the GodLess Commies kicked the MindsOfTheMassesAsses so bad
that that RockyFeller figured that if he could discover the secret of
the BullShitVic Schtick, he could finally realize his dream of having
more Dogamned money than the Pope.
Marx and Stalin and Lenin and Chairperson Mao knew all about that
1984 stuff about controlling the people by controlling the language
and symbolism.
They also understood, like I explained before, that you don't want
your NewOldLady looking at a picture of her old boyfriend while you're
sticking your dick in her, so all of his crap, like his old love-
letters and the shirts he left behind, has got to go.
Even more, the GodLess Commies knew that it wasn't enough to just
throw the OldBoyfriend's shit out, you had to 'deconstruct' your
NewOldLady's memory of him, even if you had to wipe her fucking mind
out with electroshock and make her listen to tape-loops.
That RockyFeller kind of knew that, since he was doing the couch-
circuit with all of the Movers&Shakers around the globe, no matter
what their schtick was, but wasn't smart enough to figure out all of
that stuff on his own, and besides, he was pretty busy counting his
money, and that's why he paid the I.S.P.'s GodLess Commies to figure
out the best way to put the BullShitVic Schtick up the butts of the
masses via the medium of the media of Radiating Radio Waves.
The Radio Project's GodLess Commies didn't have much money to count,
so it didn't take them long to figure out the obvious, which is that
you don't fuck with a winning game. So they figured that 'abolution
of culture' could be accomplished by making intellectual content of
the medium as close to zero as possible, and that they could 'determine
the new cultural forms' of the listeners by Pavlovian repetition which
would eventually lead to the listeners drooling on command.
Of course, as always, the increasing 'alienation of the population'
remained important, since people with a strong sense of belonging in
a family, community, social structure, etc., still had a picture of
their BoyFriend by their beside, figuratively speaking.
The techniques to make people increasingly 'radio-minded' was to
reach it's epitome in later years, with the invention of the TV-tray,
which enabled families to abandon any pretense, whatsoever, of their
family ties being stronger than their imaginary bond to Lucille Ball
and Ricky Ricardo. [WAS: Fuck mom! I LOVE LUC!]
It was no coincidence that one of Franklin Delanor Roosevelt's main
avenues of application of Madison Avenue Plain Folk Imagery was his
FireSideChats on the medium which had become a RichCommieFeller tool
for seizing the hearts and minds of the masses.
After all, FDR owed much of his power and success to Elanor knowing
whose ear to blow into in the Eclectic Communist Community of the day.
The main difference between the Bolshoi Political Ballet in Russia,
and the Communist TakeOver Of America, was that there was no need to
remove the heads of the politicians in power and the capitalist Money
Mongers, because the politicians and the MoneyMongers *were* the head
of the Commie/Fascist TakeOver Of America.
* To: cypherpunks at einstein.ssz.com (Cypherpunks Distributed
Remailer)
* Subject: A Thousand Points Of Fight (fwd)
* From: Jim Choate
Forwarded message:
> From: Linda Reed--PCC West Campus CSC
> Subject: A Thousand Points Of Fight
> federal government. Communism now represents a threat to no one in
> the United States, while federal tyranny represents a threat to
> EVERONE.
An all powerful federal government IS communism. Communism is the
political theory that property ownership and management must be
centralized under a single authority. While our current state is
moving more toward a fascist approach, private ownership & central
mananagement, with the increasingly extensive federal management of
private business & behaviour.
See, I told you so...
An Exercise For The Reader #487:
Call up an international arms dealer and tell HimOrHer that you
need some guns and tanks, and stuff, to start a war or a revolution,
and that you don't have any money, but you'll pay HimOrHer after you
win.
Right...
The Movers&Shakers (TM) don't fall for the old GoodLeader/BadLeader
crap that is pushed to the public. They have a foot in the door of
all of the major players backrooms and merely switch their 'allegiance'
to one or another of the players once the final outcome of the game
becomes obvious.
Neither Lenin nor Hitler borrowed money from 'dad' to start their
war/revolution. They got the money from the ever-present SugarDaddies
who have adopted children scattered all over the globe.
Likewise, SugarDaddy's BigKids in the Military and Intelligence
Agencies may fight among themselves over who sits on SugarDaddy's
knee, but when those outside the family start butting in, then
the CIA and the Mafia, for instance, call a truce to take care of
family business.
SugarDaddy loves his GoodKids and BadKids equally...
Neither do the BigKids in SugarDaddy's CorporateEmpires let petty
little details like wars that their own children are fighting interfere
with BusinessAsUsual.
("Be careful out there, son, we just sold the Nazis ball-bearings
for their tanks, through Brazil of course, after you bombed their
ball-bearing factories.
"Here's some extra spending cash for next time you get leave. ou've
earned it..")
* To: Cypherpunks
* Subject: Re: A Thousand Points Of Fight (fwd)
* From: Frederick Burroughs
* Sender: owner-cypherpunks at Algebra.COM
Jim Choate wrote:
> An all powerful federal government IS communism. Communism is the
> political theory that property ownership and management must be
> centralized under a single authority. While our current state is
> moving more toward a fascist approach ,private ownership & central
> mananagement, with the increasingly extensive federal management of
> private business & behaviour.
Indeed, Marx's final stage of classless society, "from each according
to their ability to each according to their needs", implies a level of
government management that was all but impossible during his lifetime.
The technology required for this level of management now exists, and
is being implimented.
"Classless society" has been achieved, not by the dissolution of
classes, but by the development of technology to a level that can
assign each individual into his own class. Technology now allows the
optimum utilization of each individual by the state.
Loners can voice their objections at the US Capitol...
Fast Freddy 'Son of Speed' Burroughs illustrates that paying the
extra few bucks for a priority connection to the ClueServer pays off,
in the long run.
He recognizes that somewhere, in an underground bunker, a Reptilian
Nazi is humoring his ScaleOfTen buddies by using the latest in secret
lavoratory developed technology to create a cross-clone being that
has the MindOfMarx, the BallsOfHitler, and the LipsOfGeorgeBush,
which are intoning, "We *have* the technology!"
All this shit was in 'The Xenix Chainsaw Massacre' in 1989, but
hardly anybody knew what the fuck was being talked about.
(I could insert quotes that illustrate this, except I don't have
any copies of it, since ThievingFuckingMountieCriminalPricks stole
my computers, which is why I am in the middle of fucking them so
bad that they will never be the same, afterwards. I was minding my
own business, sitting at home telling the Truth over the InterNet,
when they decided they just had to fuck with me, so fuck them in
thier dirty, crimininal little assholes...)
Anyway, what TXCSM said, in a nutshell, was that the success of
TotalWorldDomination being achieved by the Controllers was merely
dependent on development of the right tools, and tweaking them, and
that TV and the InterNet were the right tools.
WebWorld & The Mythical Circle of Eunuchs was just written as a
fun look at a possible FutureTimeLine&SpaceWave, since The Xenix
Chainsaw Massacre had already said everything that needed to be
said, if one chose to listen.
InfoWar was written mostly as a cross-communication tool between
Circle of Eunuchs Gorilla Cells, keeping one another updated on
each other's progress.
Space Aliens Hide My Drugs is just a rambling, nonsensical diatribe
that results when you finally snap, and decide that any Reptilian
Nazi that fucks with you is going to be repaid in Spades, perhaps
even Aces&Eights, since I am playing with a deck that is a little
*too* full, if you know what I mean.
Regardless, to get back to answering the question that Declan,
GodLessSchill of the TrilateralCPU, asked, about why I send this
crap to the CypherPunks...it is because those who make this list
their home instinctively know what I have been preaching since
1989--and no doubt some of them have been preaching it since
long before that--the InterNet is going to be the Final Frontier
of the Battle for Freedom and Privacy between the Controllers
and the Citizenry.
The CypherPunks understand:
"THE (TM) *have* the technology."
WeTheSheeple have been getting their asses kicked on the
Frontiers of Rights & Freedoms, without even seeming to
realize, for the most part, that they are in a fight.
Fresh From The ClueServer:
Even the Nazis didn't start the CattleCars openly rolling
to the Auschwitz Spa & Resort until they were in a position
of total control.
It is *not* OK that the government is taking away our rights
and freedoms, as well as our means to defend ourselves against
them, because they are *our* government, because they are the
GoodGuys, because they have GoodIntentions, because they are
only FuckingUsALittleBit(ForNow), because we are *comfortable*
and ThingsAren'tReallyAllThatBad(et)...
Think about what *you* have done, personally, to guarantee
the continuation of your rights and freedoms.
Think about whether you deserve any rights or freedoms.
(es, *deserve*...they ain't, contrary to popular opinion,
free for the taking...)
Think about why the government continues a WarOnDrugs which
has been completely ineffective in stopping drug use, in the
least, and has only resulted in the imprisonment of more of
our citizens than the most evil of dictators that the RoyalWe
point our fingers at, as well as high crime rates, and the
wholesale slaughter of our youth.
Could it be because the government knows exactly what they
are doing, and *desire* these results? Good Guess!!!
The same goes for the majority of the ills and evils that
are part and parcel of the road that our political leaders
have led us willingly down. They are no more a mistake than
the technology of Radio and TeleVision being directed towards
mindless drivel, mass hypnosis and social control programming.
While WeTheSheeple sell our souls, our independence, our
rights and freedoms, for the comfort and security of being
spoon-fed our reality, while being 'protected' from the
GreatEvils that the Controllers have promoted or invented
in both our MeatSpace and our MindSpace, They (TM) have
been busy little beavers, butchering minds and lives in a
quest to gain an extra inch, here or there, in the battle
for the minds of all of humanity.
I want you to all rise from your chairs, open your windows,
and scream, as loud as you can,
"I've got a DICK, and I'm not afraid to use it!"
Well, OK, maybe that's not such a good idea, but you know
what I'm talking about, eh?
Anthrax - Smoke 'em if you got it...
From nobody at nsm.htp.org Sun Jul 26 05:05:25 1998
From: nobody at nsm.htp.org (nobody at nsm.htp.org)
Date: Sun, 26 Jul 1998 05:05:25 -0700 (PDT)
Subject: noneRe: read please.....
In-Reply-To: <55592c1.35ba9c3b@aol.com>
Message-ID: <19980726120503.1157.qmail@nsm.htp.org>
On Sat, 25 Jul 1998 23:02:18 EDT AT666IND at aol.com wrote:
>HELLO, IS THERE ANY WAY TO GET MY HANDS ON S BOOK THAT SHOWS THE REAL BASEBALL
>PEOPLE AUTOGRAPHS AND THE FAKES SO I KNOW WHAT TO LOOK FOR???
At last!! Something on-topic for cypherpunks! And in k-RaD caps too. AOL fucking rocks man!
Where's Toto?
From stuffed at stuffed.net Sun Jul 26 05:16:39 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Sun, 26 Jul 1998 05:16:39 -0700 (PDT)
Subject: Nympho Spice/I was bonked on the golf course
Message-ID: <19980726104909.1894.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/26/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From jya at pipeline.com Sun Jul 26 06:04:54 1998
From: jya at pipeline.com (John Young)
Date: Sun, 26 Jul 1998 06:04:54 -0700 (PDT)
Subject: Jim Bell Rage
Message-ID: <199807261304.JAA14297@camel14.mindspring.com>
Received from anonymous July 26, 1998:
The Columbian (Oregon), No date.
Written by John Branton, Columbian staff writer
Eleven months in prison - and counting - haven't muzzled
James Dalton Bell's rage about what he calls government
"black operations" against him. "This story has more
government misbehavior than Watergate", Bell wrote in a
recent letter to The Columbian.
He added in a phone call"I'm in a little bit of danger.
These people don't want me talking to you."
Bell is the 39-year-old McLoughlin Heights man who wrote
an Internet essay, "Assassination Politics", that
proposed the bounty-driven murder of "government
slimeballs". The former electronics engineer hadn't
spoken to The Columbian for about a year, until recently.
He was released from federal prison in April.
Bell served 11 months after pleading guilty to using
false Social Security numbers and obstructing the
Internal Revenue Service by trying to intimidate agents
and stink bombing their Vancouver office. Bell returned
to his parents' home this spring but was free only
about two months. Currently, Bell is back in a federal
prison in Seattle, awaiting a July 31 hearing on charges
that he violated his probation conditions. He's alleged
to have refused a court-ordered mental-health evaluation
and search of his parents' home.
Who is this man, many people have asked, who lives in our
midst when he isn't in prison - and if the IRS is to be
believed, dabbled with things such as nerve gas, botulism
toxin and sodium cyanide? IRS agents say Bell published a
"hit list" of agents' home addresses on the Internet for
his anti-government "patriot" friends, and discussed
contaminating water supplies with a buddy.
Is IRS Inspector Jeff Gordon correct in comparing Bell to
Timothy McVeigh and Theodore Kaczynski and saying the IRS
interrupted him in plans to commit murder? No, says Bell.
"They knew I wasn't planning to kill federal agents",
Bell said this month. "They were scared because I had
written something that shows a way to eliminate
government. They were afraid I could convince the public
that I could replace existing government for no more than
a 10th or 20th of its current cost."
His wariness of the federal government is understandable
- they put him in prison. But his words reveal a view of
governmental duplicity like the fictional world of X-
Files agents Mulder and Scully. "Paranoid would be a good
word", said Bell's federal probation officer, Matthew
Richards. Bell, asked why he doesn't obey his court-
ordered probation terms to stay out of prison, made a
reference to the political imprisonment of Nelson
Mandela, South Africa's president. "I believe that when
the federal government decided to spy on me, simply
because of my political opposition to their tyranny and
terrorism, it dramatically diverged from what the average
American citizen would be inclined to tolerate", Bell
wrote recently.
Beginning in late 1995 or early 1996, Bell said, federal
agents read his "Assassination Politics" essay, posted on
the Internet. The essay described a computerized system
to ward "untraceable digital cash" to anyone who
correctly predicted the exact time of a federal agent's
murder. In Bell's words, "Imagine for a moment that, as
ordinary citizens were watching the evening news, they
see an act by a government employee or officeholder that
they feel violates their rights, abuses the public's
trust or misuses the powers that they feel should be
limited. What if they could go to their computers, type
in the miscreant's name, and select a dollar amount. If
0.1 percent of the population, or one person in a
thousand, was willing to pay $1 to see some government
slimeball dead, that would be in effect, a $250,000
bounty on his head."
Alarmed, Bell says, federal agents used two homes near
his parent's home, one on Corregidor Road and the other
on Mississippi Drive, for a clandestine and possibly
illegal surveillance operation. Agents supposedly
installed thousands of dollars worth of sophisticated
equipment, possibly using microwave technology, to spy on
Bell. "None of that occurred", said federal probation
officer Richards. "Absolutely not true", said the owner
of one of the houses. "I wouldn't let the feds in my
house."
Bell said he suspects the agents bugged his phone
illegally - and followed him when he got out of prison
briefly in April. "We never bugged his phone", Richards
said. "No tailing whatsoever". Once, Bell said, he
spotted someone following him and turned the tables on
them. Bell followed the car to Rixen's Enterprises, 2700
N. Hayden Island Drive, which he suspects is a secret
front for a federal "black operation".
"No spooks here", said the owner, Jim Rixen, 40, who said
he deals in heating systems for boats and recreational
vehicles. "I've had this company for 13 years. You can
ask anybody on this island. You're more than welcome to
come here and go through everything I've got. He might
have followed some customer of mine here. I've never
heard anything about it."
In his upcoming hearing in the U.S. District Court in
Tacoma, the government will charge Bell with additional -
so far undisclosed - probation violations, Richards said.
If Bell has any actual evidence of illegal practices by
the government, that would be the place to bring it up.
=end of article=
From lreed at west.cscwc.pima.edu Sun Jul 26 11:30:17 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sun, 26 Jul 1998 11:30:17 -0700 (PDT)
Subject: TruthChapter - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9C11.75915C20.5@west.cscwc.pima.edu>
TruthChapter -- SPACE ALIENS HIDE M DRUGS!!!
_____________________________________________
OK, so it's a slow day and you don't have much going on.
our sister is out of town for the weekend, your dog is
on the rag and your Visa is maxed-out. Thus, sex is not a
viable option for killing a little spare time (now a felony).
So what the hell...
ou're going through the posts to the CypherPunks list and
you notice that the asshole who forged posts to the list in
your name (claiming that fucking two nine year-olds is just
as legal as fucking an 18 year-old) has spammmed yet another
chapter of the rambling, semi-coherent saga "The True Story
Of The InterNet" to the list.
ou've read bits and pieces of the manuscripts (on company
time), every now and again (more out of boredom than because
of any socially or coupon redeeming content), and it bothers
you that the Author has taken concepts, themes and issues
that are important to you and put a bizarre, insane/inane
twist on them that somehow degrades and defiles them, in
spite of the fact that he sometimes supplies a remarkable
amount of documented facts and viewpoints from 'respectable
sources' in support of his vague claims and wild-eyed
theories.
ou take great care to avoid being 'caught' reading the
manuscripts by others and you wouldn't dream of admitting
in public that you view them as anything but mindless
trash, but you keep finding yourself thinking about some
of the underlying views expressed by the Author of the
manuscripts.
ou've begun to realize that what troubles you about
the 'True Story Of The InterNet' manuscripts is reflective
of what bothers you about the InterNet, in general, as a
Medium/Message--the ongoing battle between order and chaos
that reins supreme within a Virtual Reality where Jane and
Joe Average can avail themselves of the same technology as
Established Authority (TM) in the battle for your attention.
Ms. Information Highway is a Eunuch who embodies the
divergent and seemingly contradictory yin/yang qualities
that would result from a cross-cloning of Walter Cronkite
and the BlondeBimbo that everyone tells the jokes about.
It's like the 'science' of UFOlogy...the 'experts' in
the field often provide a well-documented trail of facts
and figures from recognized sources and authorities. The
problem, of course, is that the facts and figures are
used to 'prove' a wide range of Plausible Theories (TM)
ranging from highly-evolved beings with a superior
intelligence to humans, to Reptilian Nazis living deep
within the bowels of Mother Earth who are cultivating
SurfaceDwellers such as ourselves to provide a FoodFarm
for Alien GreyHound Tourists passing through on their
way to another galaxy.
The Problem (TM) posed by the InterNet is Taoist in
Nature.
The Total Access To All Information which is inherent
in the Physical Manifestation Of Virtual Reality which
we know as the InterNet opens a Dangerous Door Of
Perception leading to an environment within which we
have the possibility of being...free!
The Freedom represented by Unrestricted Access To
Information comes from having the ability to exercise
one of the most basic of all human qualities, which is
to 'seek' knowledge in our quest for an expanding
evolutionary wisdom. The Freedom is to be able to
Search for Knowledge according to one's own personal
predilictions and desires, and to Choose from All
Available Information/Knowledge what one will use
as tools in building one's Perceived Reality.
In a world where we have become accustomed to being
spoon-fed the information, perceptions and viewpoints
which comprise our Perceived Reality (by Officially
Recognized Authority), we suddenly find ourselves
faced with the possibility of using the technological
tools of the InterNet to direct our Attention/Perception
along vectors of our own choosing, rather than being
subjected to forced herding into the fenced pastures
and feeding pens designed by the Controllers to keep
us in an environment which is the most suitable and
convenient for their purposes.
The Freedom is freedom from a Reality created and
governed by Official Government Pamphlets handed to us
in every area of our life.
The Freedom is the freedom to peruse the colored charts
and diagrams provided by the Pentagon to lead us through
a maze where Gulf War Syndrome is an imaginary being that
is always just around the corner, and then to direct our
attention to the private WebSite of a Gulf War Vetran
who provides the details of his personal experience in
regard to the war and its effect on his or her life and
health.
The Freedom is the freedom to read the wildly rambling,
nonsensical diatribes contained in the 'True Story Of The
InterNet' manuscripts and say, "Bullshit! I'm going to
check these wild-eyed claims out for myself."
The Freedom is freedom to chaff and winnow the original
Seed Of Knowledge in a manner that suits your desires, and
to seek out InterNet venues and personas which make your
Quest for Knowledge more complete or efficient. The
Freedom is the freedom to change the direction or the
parameters of your Quest for a specific reason, or on a
momentary whim, solely to view your Perceived Reality
from the outside, in order to get a more objective view
of the WorldReality you have constructed.
It is in this spirit that the 'TruthChapter' is being
dedicated.
TruthChapter FAQ
----------------
1. What you are currently reading is *not* the TruthChapter.
2. The Author has not written, and has no intention of
writing, the TruthChapter.
3. The Author is full of shit! Regardless of the ultimate
level of personal and professional ethics that the Author
brings to the manuscripts that pass through his or her
space-time continuum of MuseDom, his or her attitudes,
facts, figures, beliefs, values, etc., are completely
irrelevant to your path in life, except to the extent
that you, personally, evaluate and apply the concepts
and ideas expressed for your consideration.
4. Writing the TruthChapter is *your* job! This is true
whether you choose to participate in the activity which
is described below in 'An Exercise For The Reader', or
whether you choose to curl up in bed with Playboy, Time,
The Wall Street Journal, Beer and Bloating In Lost Wages,
or A Physically Manifested Expression Of Mind To Be
Named Later.
=============================
TruthChapter FAQ Intermission
Make some popcorn, grab a beer, and think about the
following...
At some point in 'InfoWar - Part III of the True Story
Of The InterNet', there was a statement, quote, or some
reference documented reference to the Fact (TM) that,
during a period when violent crime statistics showed a
significant 'decrease' in violent crimes, that public
perception viewed violent crime as being very much on
the 'increase' (and a 'growing' problem).
The reader of the manuscript has no way of personally
knowing whether the Author is passing along real, existing
facts and/or information in this regard, whether he or
she is lying in order to promote a private agenda, or
whether the Author dreamed or imagined the 'information'
during drunken drug-withdrawal seizures.
The same concept holds true even if you can verify
through personal research that the fact/information came
from an established, respectable, documented source.
(i.e. - "Oswald acted alone." / "We, the jury, find
OJ Simpson 'not guilty'." / "We, the 'civil jury', find
OJ Simpson 'guilty'." / "We, the Court Of Public Opinion,
made up our minds long before the trial began." /
"The Mormon Tabernacle Choir acted alone..." )
My point?
The Author makes no bones about being a drunken, insane,
drug-addicted, infantile pervert. The fact that past and
present Presidents, Dictators, Titans of Industry, Media
Moguls, Religious Leaders, Politicians, etc., etc., ad
infinitum, choose to claim that they smoked pot but didn't
inhale, that they drank liquor but never swallowed, that
they had sex but didn't cum...
Well, the bottom line is, "ou pays your money, you takes
your chance."
Although the reality of the time-space continuum requires
that we develop structures and processes by which we can
navigate life's diverse paths, delegating many of our
daily thoughts, feelings and activities to pre-programmed
reactions and responses that are based on our previous
experience and analysis of life, we can never truly escape
the reality that 'Life is a crapshoot' and that failure to
exercise our capacity for conscious awareness results in
our becoming submerged in a robotic humanity/persona which
leaves us vulnerable to automatically travelling along the
path of least resistance.
Our being Real (TM) is not a question of 'truthfully'
answering our employer's question in regard to our opinion
on the Vietnam war, whether our employer is the Pentagon
or the Peace Coalition. Gurdjieff once said that in one's
inner life, one is free to say, 'The King is shit!', but
in one's outer life, it is often wise to say, 'All hail
the King!'. Our being Real (TM) is mostly a question of
being aware of the difference between our inner and our
outer lives.
My definition of a 'truthful' person is one who does
not lie to others more than he or she lies to oneself,
except as necessary.
As far as when it is 'necessary' to lie, and what it
is 'necessary' to lie about...that is a matter of personal
conscience for every individual. It is dependent on one's
personal wisdom and understanding, as well as on their
beliefs and values in life.
(i.e. - It is up to each individual to decide whether
they are comfortable with lying when the Gestapo ask
if they are hiding Jews in the attic.)
In a world where there is increasing pressure to conform
completely to a constantly narrowing societal paridigm, it
is important to resist sinking into a primordal swamp of
group consciousness that submerges our individual creative
spirit, or spark of life.
I regard it as an absolute anathema to the human spirit
that opinions of OJ's guilt or innocence is split so
radically along racial lines, far beyond what differences
in social exposure and experience alone would dictate
among people of thought and reason.
Everyone who was present when Nicole Simpson and Ronald
Goldman were murdered, raise your hand...
Although it is encumbent upon us, in our daily lives, to
judge ourself and our life based on the best possible
information, to the best of our ability, we too often tend
to do so from a perspective of a biased, angry mob outside
of the courtroom, than from a perspective of a juror sworn
to high standards of objectivity in viewing our own life
and our personal knowledge/belief systems.
The tragedy of the OJ trial was that the blatant racism,
corruption and lack of professional ethics of those who
are employed to be objective, unbiased investigators made
it impossible for an objective juror to place a man's fate
in the hands that gathered the evidence.
The tragedy of life's trials is that there is so much
intrigue and subterfuge in our environment, as a result
of private and group agendas driven by human weaknesses
and character defects, that it is now a monumental task to
analyze and evaluate the information we receive, in order
to feel confident in our ability to structure our beliefs
and pre-programmed reactions and feelings in a manner that
will allow us to feel our spiritual integrity has remained
intact during the process.
The point I am leading up to is that it is difficult,
yet exceedingly important, to overcome our human foibles
and our tendency to become robotic Sheeple in the present
societal environment which puts great pressure upon us
to abandon freedom of thought and spirit, in the interest
of the comfort of conformity.
We live in a society where we are required by law and
custom to nod our belief and approval when our elected
political leader says, "Read my lips...no new taxes!",
even though there is not a person on the face of the
earth who doesn't understand it is a meaningless lie.
It doesn't matter whether it is the political arena,
the religious arena, the media, the press, the justice
system, or whatever--The Lies Flow Like Water! We have
become so numbed by the assault on the Truth that it is
an easy task merely to fall into a deep slumber where
we cease resisting the constant attacks on our inherent
sensibility and our desire for increased knowledge and
wisdom.
Gurdjieff posited that it is 'impossible' for a human
to 'consciously do evil'.
Although the truth of this is most easily seen in the
group descent into unthinking madness that was epitomized
by the rise and fall of the Third Reich, I believe that
it is equally true in the smaller areas of daily life,
where we learn to robotically 'fool' ourselves, often
in the interests of survival, into believing that it is
Right, instead of merely Expedient, to believe that
requiring certain ethnic groups to sit at the back of
the bus is 'the way it is', instead of consciously
maintaining awareness that it is Wrong, if that is our
true personal feeling and belief.
It is my belief that Right & Wrong (TM) have little
or no meaning without a Conscious Objective Awareness
that can only result from an individual having the
freedom to explore all of the information and experience
that life has to offer, without unreasonable, intrusive
censorship from various elements of their environment.
Which brings us back to...the TruthChapter...
=============================
TruthChapter FAQ (continued)
----------------------------
5. The Medium Is The Message... The information that comes
into our range of perceptive attention is shaped, shaded
and molded in a manner dependent upon the medium of
communication by which it is transmitted.
This is true whether the Information is transmitted by
genetics, analog or digital emmissions, is a moving and
flowing energy, or is captured in a static, stable form.
Fish find their way back to their birthplace by a different
method than humans because of the difference in the mediums
by which they receive the necessary information.
6. Salmon don't have to show a passport to an armed fish
representing the Stream Government. Salmon don't have to
have approval of the Church of Salmon in order to spawn.
Salmon don't get a ticket for swimming on the wrong side
of the stream, or for swimming too fast.
Big fish eat little fish...in one gulp. They don't nibble
them to death with Fish Taxes. They don't drown them at
the stake for believing the earth is round. Fish are not
as 'smart' or 'creative' as humans--they do not mentally
build Empires out of Imaginary Sand Castles In The Sky
and then eat each other in an argument over what color
to paint the walls.
7. If Salmon could write, they would probably write a FAQ
with Facts, instead of embellishing the information with
vague, semi-rational references that seem to be putting
a confusing spin on their World Of Perceived Reality for
no other reason than fear of falling off if it ceases
turning.
OK, so instead of using the TruthChapter FAQ to provide
you with accurate, unbiased information with which to
construct your own WorldView (TM), I ended up getting a
little carried away, using my Substance Abuse Enhanced
Creativity (TM) to try to suck the reader into a WorldView
constructed by myself for the sole purpose of making it
the Reader's turn to buy the next round of drinks.
Although you might regard this as merely another 'proof'
of my freely admitted diabolicallity (don't bother looking
it up in the dictionary), it is my contention that you are
only fooling yourself if you are of the belief that you
can take the facts/opinions of *anyone* at face value,
without asking questions such as:
"Had Saint Peter already signed a BookDeal with a Bible
publisher before authoring the Epistles which he asks
us to take as fact, based on Faith?"
"Did Moses have inside information that there were vast
reserves of oil in the Promised Land?"
"Did Job belong to an S&M cult?"
"Was St. John the Divine 'on something' when he had his
'Revelation' ?"
"When Jesus performed his 'miracles', did he work with
scantily clad, sexy assistants, in order to divert the
attention of the crowd?"
The point I am trying to make is that, even in the arena
of religious belief, there is a difference between Faith
and a Lobotomy. Likewise in the arenas of Politics, Family,
Business, Sports and Relationships.
For example:
"WaterGate FAQ" by Richard Nixon
"Curfew Time FAQ" by our Mom & Dad
"MicroSoft FAQ" by Saint William Gates
"Sports FAQ" by Jimmy the Greek & Marge Shott
"Relationship FAQ" by A Pregnant Woman Who Claimed To Be
On The Pill And Now Demands ou Marry Her
"TruthChapter FAQ" by A Cheap Drunk To Be Named Later
In the interests of using the True Story Of The InterNet
manuscripts as a vehicle to increase the Reader's ability
to analyze and evaluate the proffered 'information' in a
manner that utilizes the evolving technological tools of
the medium by which the manuscripts are being disseminated,
the Author is making freely available the information with
which he was planning to generate/construct a chapter with
the title, 'son of The Mother Of All Chapters'.
By providing the Reader with the information gleaned from
the InterNet for constructing the 'son of The Mother Of All
Chapters', as well as revealing HisOrHer's secret designs
and hidden agendas culminating in the final, manifested
form of the chapter, the Author is offering you, the highly
esteemed Reader of the 'True Story Of The InterNet', an
opportunity to InterActively Participate in the process of
the construction of your personal News & Entertainment
Paridigm.
The reality of the time-space continuum dictates that we
must apply our time and resources in gathering and analyzing
the information by which we construct our WorldView in a
manner that best utilizes the tools at our disposal to
shape, color and mold available information, including
taking advantage of the MiniPre-Fab Realities that are
offered to us by our fellow RealityBuilders.
Although Manufacturing Reality can be done with greater
quality control and efficiency through the sharing of
our individual Reality Products, basic economics dictates
that there are often HiddenCosts associated with believing
RealityAdvertising claims that something is 'free', in
the overall scheme of things.
There is little difference between being a HeatedSpoonFed
Heroin Addict and in being a SpoonFed News/Information/
Entertainment Junkie. Once you are hooked, the price goes
up, and you end up on Information Welfare and still having
to steal your own integrity in order to pay an increasing
price for a diluted/cut product, in order to feed your
habit/need with an inferior product.
The TruthChapter is being presented as an opportunity
to explore the possibility of weaning yourself to a
realistically supportable level of addiction to incoming
information in order to strike a balance between suffering
the pangs and arrows of outrageous fortune, in the course
of your evolution, and becoming Irrevocably Comfortably
Numb through overuse of the current OpiateOfTheMasses.
Despite the fact that the inspiration for the process of
completing 'son of The Mother Of All Chapters' was largely
the result of the Author having his computers and notes
stolen by Officially Recognized Authorities (TM), as well
as HimOrHer descending into a depressing, primordial pit
of dysfuntional drug withdrawal, this does not, in reality,
automatically preclude the possibility that the LoftyGoals
professed by the Author in regard to the purpose of the
TruthChapter *could* be true...
An Exercise For The Reader:
~~~~~~~~~~~~~~~~~~~~~~~~~~~
1. Read 'Son.doc' in order to familiarize yourself
with the all-too-predictable paranoid conspiracy
theory slant that the Author had planned to put upon
the information gathered for the assembly of the
'son of The Mother of All Chapters'.
The Son.doc attachment is an incomplete preliminary
summary/first-draft of the 'son of The Mother Of All
Chapters', as envisioned by the Author.
2. Read 'ThePlot.txt' in order to get the general gist
of the Spin that the Author had planned to put on
the analysis and evaluation of the information that
had been gathered.
3. Read 'FDR.doc' and 'FDR2.doc' to familiarize yourself
with the building blocks with which the Author had
planned to construct 'son of The Mother Of All Chapters',
as well as HisOrHer notes regarding HisOrHer personal
knowledge and experience that could be added to support
HisOrHer's personal WorldView.
4. Write the fucking chapter yourself!
5. Disseminate the chapter to whomever you please, in any
manner you please. (e.g. - snailmail to your mom, email
to the CypherPunks Distributed Mailing List, or as an
email reply to those who bless you with 'Make $$$ Fast!"
UCE/Spams.)
"The Answer To Noise, Is More Noise!"
~ CypherPunks Chief SpokesPerson #238
Fuck the Author!
Fuck Time Magazine, The Wall Street Journal, America's
Most Wanted, Paul Harvey and A 'No Loitering' Sign To Be
Named Later!
Write your own goddamn chapter and tell it the way that
*you* see it.
Fuck TruthMonger! *BE* the TruthMonger.
Put your own accurate or inaccurate spin or twist on the
'son of The Mother Of All Chapters' information base. Add
to it with items gleaned from your own research, or from
your own personal accumulated knowledge and experience.
Throw all of the provided information out and completely
write the chapter from scratch, with the same theme or a
different theme.
Write the chapter, type the chapter, or just think about
how you would approach writing the chapter in order to make
manifest the expression of the knowledge and wisdom that you
have to share with your fellow Prisoners Of A Group Reality
as to how to best break the Chains Of Free Thought wrapped
around our brains by the Reality Police.
Don't use your physical tools merely to receive and to
retransmit Noise.
Create Noise!
If anyone complains or criticizes your Noise, fuck 'em!
ou're the TruthMonger!
ou're the Author of 'son of The Mother Of All Chapters'.
Don't lose any sleep over the whining of ignorant pissants
who are unable or unwilling to accept the fact that your world
is flat, and that's the way GoDoG intended it to be.
Intelligent people, like oursleves, know the world is flat.
That's the Truth (TM).
From lreed at west.cscwc.pima.edu Sun Jul 26 11:42:43 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sun, 26 Jul 1998 11:42:43 -0700 (PDT)
Subject: Son
Message-ID: <009C9C13.311F2A20.13@west.cscwc.pima.edu>
Son of Mother Of All Chapters -- SPACE ALIENS HIDE M DRUGS!!!
_________________________________________________________
July, 1948:
The moment has come when the costumes, the grease paint, the falsely
colored scenery, the technicolored spotlights and all the other artifices
of
makeYDup should be put aside and, in the interest of truth, the solid
facts
about the play and the players revealed to the people.
~ The Roosevelt Myth, Preface to the Popsvox PublishingR edition
Dec. 7, 1941
The Lake of Life has started to turn over. The bottom is rising to
the top, the
top is descending to the bottom, and everything is becoming the opposite
of
what it seems to be.
~ Vice-Admiral B. D'Shauneaux, USN
~~~
~~~
Version 1.7, Rev B:
Saturday morning, March 4, 1933...the conquering Democrats poured into
the city...
Only a week before an assassin's bullet had barely missed Roosevelt.
It
struck Anton Cermak, the Bohemian mayor and boss of Chicago, who with
Al Smith, had opposed Roosevelt's nomination...and died a few days
later.
Version 2.7, Rev. 3:
On February 1, 1933, in Miami, Florida Giuseppe Zangara fired five
shots a President-elect Franklin D. Roosevelt, who was making an
impromptu speech while sitting in an open car that had stopped momentarily.
Although none of the shots hit President Roosevelt, Zangara mortally
wounded Anton Cermak, the Mayor of Chicago, and hit four other people,
including a Secret Service agent.
Version 3.9, Rev. 2-B:
On February 15, 1933, Zangara attended a speech given by Roosevelt
at
Bayfront Park in Miami, Florida.
When Roosevelt had finished his talk and was preparing to leave, Zangara
pulled out a pistol and opened fire.
Zangara wounded five people who had been near the president-elect,
two of
them seriously. Most critically injured was Chicago Mayor Anton Cermak,
who was struck by the bullet in the chest which then lodged in his
spine.
Version 4.9, Rev. 8C:
The parade car moved slowly down the street as President-elect Roosevelt
and Mayor Cermak smiled and waved. The car stopped and President-elect
Roosevelt gave a speech while sitting on the back of the car. A man
named
Guiseppe Zangara pushed through the crowd. He fired five shots at the
President-elect. The bullets hit four people and Mayor Cermak.
Version 15.6, Rev. 7:
On March 6, Mayor Cermak died from complications stemming
from the shooting. The same day Zangara was indicted by a
grand jury and charged with first degree murder in the death of
Cermak. His trial began on March 9 and ended on March 11
with a guilty verdict and a death sentence. The prisoner was
transported to the Florida State Prison at Raiford, where he was
executed on March 20, 1933.
Version 18.9, Rev. 5D:
Mayor Anton J. Cermak died three weeks later, on March 8, 1933. His
body was taken back to Chicago and buried in the Bohemian National
Cemetery.
Guiseppe Zangara was executed in the electric chair on March 21, 1933.
That was only 13 days after Mayor Cermak died.
Version 32.9, Rev. 12:
Consider the case of Guiseppe Zangara, who was executed in 1933 for
the
attempted assassination of President-elect Franklin D. Roosevelt in
which
Chicago Mayor Anton J. Cermak was fatally shot. Zangara pleaded guilty
in
state court on March 10, was sentenced to death, and was executed on
March 20 -- an interval of 10 days!
Version 82, Rev. 5Q:
After Roosevelt had delivered a speech in Florida on February 14, 1938,
Guiseppe Zangara, an unemployed bricklayer, fired six shots from a
handgun
at Roosevelt from twelve yards away. The president-elect, who was sitting
in an open car, was uninjured but five other people were shot, including
Chicago mayor Anton Cernak, who was killed.
Version 95, Rev. 8:
On February 15, 1933, Guiseppe Zangara rose early...
From lreed at west.cscwc.pima.edu Sun Jul 26 11:43:08 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sun, 26 Jul 1998 11:43:08 -0700 (PDT)
Subject: The Plot
Message-ID: <009C9C13.3FFFC220.15@west.cscwc.pima.edu>
The Plot of son of ?ThePlatypus
-------------------------------
Gathered information reveals:
1. US Presidents and important political figures count
on the Secret Service for protection. Secret Service
agents are in the employee of the MoneyMongers who
rule the US Treasury Department.
Thus, if the MoneyMongers don't approve of a powerful
individual's political policy and actions...
2. Presidents and other political figures seem to die at
particular junctures of time wherein they have already
served their purpose to the Controllers. (Note: 'die'
either physically or politically.
i.e. - FDR croaking shortly after getting Truman
elected as the hand-picked replacement of shadowy
figures.
3. Ronald Reagan and FDR were both 'front men' for their
wives, and/or those in their wives shadowy background.
FDR, through the efforts of Elanor and her cohorts,
was paid A QUARTER OF A MILLION DOLLARS in order to
enter the New ork governor's race.
4. Accounts of the life and times of FDR inevitably contain
a generous sprinkling of references to Luck!
(e.g. - Fortuitous Circumstances as opposed to PART OF
AN EVIL PLOT B THE SECRET CONTROLLERS WHO RULE THE
WORLD FROM BEHIND THE SCENES!!!)
5. Hitler and his Evil Empire was no more a 'fluke of nature'
than Lenin and his Evil Empire.
The 'infiltration' of the American political scene by a
wide variety of people with socialist or communist beliefs
and agendas was not some mysterious, unplanned 'accident'.
The rise of Eugenics, with the resulting implications of
a Master Race embodied in genetic control, was a worldwide
phenomena promoted by intellectuals and leaders in all
nations, not just in the nation which gave Eugenics a
'bad name' by instituting the end result of a Planned
Society a little too fast to prevent disturbing the
average persons natural pace of increasing moral compromise.
6. Neither Oswald nor Hitler 'acted alone.'
Try starting a World War without the backing and support
of the MoneyMongers and the PowerBrokers. Lots of luck...
7. After Pavlov discovered biological mechanisms for the
control of when dogs drool, his research did not come
to a halt.
Political and Military Czars who had a hand in developing
and researching brainwashing techniques epitomized by 'The
Manchurian Candidate' did *not* decide it would be wrong
to use the techniques, just to increase their money and
power.
oung boys in the throes of publerty do *not* refrain
from imagining what their large-breasted teacher would
look like, naked, after reading 'The Invisible Man'.
8. Viewing the life and times of FDR (and probably any other
political/religious leader) is *scary* if one lets their
mind contemplate the 'possibility' of deep, dark conspiracy
theories being True!!
Why? Because one can construct a Dark Theory that makes
as much (if not *more*) sense than the Standard Authorized
View Of History And Reality promoted in educational
materials, government pamphlets and corporate advertising.
(i.e. - The Allies burned a few Jews, but they didn't
inhale...)
9. Nobody acts alone...Anonymous acts secretly.
From jf_avon at citenet.net Sun Jul 26 12:54:09 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Sun, 26 Jul 1998 12:54:09 -0700 (PDT)
Subject: Computing with DNA...
Message-ID: <199807262009.QAA21570@cti06.citenet.net>
Hi everybody!
Have a look at Scientific American August 1998 for an article by L. Adleman (of RSA fame) about how he
solved a computationnally gigantic problem in less than a second with a few drops of stinking liquid
:-) Unfortunately, the article is not available from www.sciam.com, so you'll have to buy the paper
version of the magazine. *FASCINATING*
Also, have a look at
http://cwis.usc.edu/dept/News_Service/chronicle_html/1995.10.23.html/Supercomputing_with_DNA_.html
Ciao
jfa
Jean-Francois Avon, Pierrefonds (Montreal), Canada
Unregistered Firearms in the hands of honest citizens: Liberty's Teeth
Strong Cryptographic tools in the hands of honest citizens: Liberty's Voice
He who beats his sword into a ploughshare will get coerced to plow for
those who don't...
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From marlin1374 at juno.com Sun Jul 26 14:21:39 1998
From: marlin1374 at juno.com (marlin1374 at juno.com)
Date: Sun, 26 Jul 1998 14:21:39 -0700 (PDT)
Subject: Did I get the right email address?
Message-ID: <199807262120.OAA22954@mail1.eni.net>
"SHOW ME THE MONEY!"............Not a problem!
I am about to share with you a unique opportunity to start a very successful
business or take an existing one to new heights. By taking advantage of the
following breakthrough knowledge in marketing trends, you will soon discover
the art of . . .
"How to Really Make Money on the Information Superhighway!"
Some of you may already be marketing a product online. Maybe you are even
making a sizeable profit! Whatever the case may be, no matter how successful
you are right now, my guess is that your bank account is still not overflowing
and MORE MONEY with LESS WORK peaks your interest.
FACT 1 : ANYONE WHO HAS THE DRIVE TO SUCCEED CAN ACTUALLY MAKE
A SIZABLE PROFIT ON THE INTERNET.
FACT 2 : FEW PEOPLE ARE WILLING TO TAKE THE TIME TO ACTUALLY DO IT.
FACT 3: THESE PEOPLE ARE CRAZY!!
Seriously friends...Why would people want to pass up an extremely valuable
money making opportunity?
Many people think that Marketing on the Internet takes more time than any
human being can spare. "There is so much to learn" some say. "I can't even
find the time to check my E-mail, how will I ever learn enough about the internet
to make money?" others quote. The fact is that in many cases this us true, there
is a wealth of information on the internet about how to "market" this and how
to "sell" that. Unless you know what to look for, it can become an endless maze
of dead ends and wasted time.
Now think about this...
WHAT IF? I could provide YOU with an incredible Marketing Package
that encompasses all the "How To" information you need to be a success
on the Internet. This phenomenal package includes DETAILED Internet
SECRETS (we don't hold anything back, its all here folks!!), which explains
in detail how to Profit from the Internet Explosion. Whether you have a
business of your own or you want to start one. It's filled with over 45
packed pages revealing the secrets about electronic marketing so many
other online marketers DON'T want you to know.
I thought that might interest YOU.
Let me explain.
<><><><><><><><><><><><><><><><><><><><><><><><>
Right now there are over eighty million people surfing the Internet. By
the year 2000, that figure is expected to more than double. With so many
people using the Internet, smart "net"repreneur's are taking advantage
of what this new (in terms of true commercial application) and exciting
medium has to offer.
The Internet presents one of the best ways to make money that has
ever been introduced. On any given day you have the opportunity to
present your message to more than eighty million people! That's right...
EIGHTY MILLION people. That is more people than one multi million
dollar advertisment reaches at the Super Bowl. This is the reason so
many businesses are scrambling to make their presence known on the
Internet. Not only does the internet let you reach these people, it lets
you pitch these people on your product or services. That means it gives
you the abillity to sell..sell..sell!! it also gives you the resurces you
need to MAKE EXCELLENT MONEY. And we do mean excellent money!!!
CONSIDER THE POSSIBILITIES: You wake up each morning at your
leisure and put on a pot of coffee. As you sip on your cup of hot "brew"
you saunter over and turn your computer on. Then, as your monitor
glows from dim to bright, you find that you have inquiries from all sorts of
people requesting what you have to offer. Later, after you have
finished reading your inquiries, you stroll out to your mailbox. You
find it is filled with letters from people from all across the world!
What's even better though, is that the letters are FILLED WITH
MONEY; cash, checks, and money orders. Then, after tallying
up the totals, you find that you have made anywhere between
$200 to $1,000 and it isn't even one o'clock in the afternoon.
Think of it: NO boss, NO traffic, and NO annoying Co-workers.
Wouldn't it feel great to wake up in the morning knowing you
are going to be making excellent money but don't have to leave
your house to do it!?! Wouldn't your life be far less complicated?
The truth is, you can be one of those who become financially
independent via the Internet. AND THE BEST PART IS...IT
DOESN'T REQUIRE A LOT OF MONEY!!
What it does require is the knowledge of how, what, and where
to do it. That is where we can help. Here at Natural Instincts, we
provide you with the knowledge of how to begin earning substantial
income from your computer via the "information superhighway".
We can remember how overwhelming the Internet seemed when we
were first introduced to it. We realized the marketing and profit
potential the Internet holds, but really had no idea how to pursue it.
In our thirst for answers and knowledge, we purchased everything
we could find that had information on the How, What, and Where.
We spent thousands of dollars, but we now know what works and
what doesn't. No where, in all of our searching, could we find a
complete packet of information for all of our questions. That is why
we decided to write this report. We have compiled every proven
method and secret that we have learned along the way into one
complete, easy to understand report.
This PROVEN REPORT makes believers of skeptics!
Sound too good to be true? That's what others have said. That is,
until they received their reports and saw for themselves just how easy
it is to make money on the net! Check out these satisfied customers...
Hi NI,
I received your report and free bonuses last Saturday and wanted to
congratulate you on a job well done. I read through your report "How
To Profit From The Internet" and I'm very impressed. I have bought
other books and manuals about Online Marketing, Direct Marketing,
E-mail, Mail Order, etc. Yours is the only one that explains the
subject in an easy to understand language. I finally found the
secrets I've been looking for.
Once again, Great Job!
Sincerely,
John Strand - Satisfied Customer
My father has always told me, "remember, Michele, there is no free
lunch in life. You get out of life what you put into it." Through trial
and error and a somewhat slow frustrating start, I purchased your
report and finally figured out how to start a very profitable business
from my home. Your report is great, you give the average person
the tools and secrets to succeed. I know my dad is very proud of
me now.
I can't thank you enough =)
Michele B from Oregon
Good Morning,
I hope this finds you well. I received your program yesterday after-
noon and read it cover to cover. You have put together a very
valuable resource indeed. I have finally found the program that
tells all! Your program has given me the tools I need to succeed.
Your program could truly end up being the best $39.95 I ever spent!
Your the best, I'm making your manual into my internet Bible!!
Thanks a million!
Best Regards,
Mary W
Florida
To whom it may concern-
I'm usually the first person to write a negative criticism about a product,
being a "consumer Advocate" columnist for a well respected newspaper.
To tell you the truth, I ordered your product to do an expose on Internet
scams. But, as I was reading through your manual, I discovered what
truly valuable information your company has put together, and for an
affordable price. It is very rare for a "complaint columnist" to give a
good review, but for the first time, I need to tell you that your manual
you have put together is OUTSTANDING!!! I have wanted for the last
few years to start a business on the Net, but have been deathly scared of
taking that step to get started. But then I discovered your manual and put
the tips and secrets to work. I haven't been able to keep up with the orders,
and it's only my second month!!! I can't wait to see where I will be in six
months!
Thank you,
Rick Johnson
Alabama
This is a wonderful opportunity, we urge you to take advantage of it.
You won't find too many people that will give away ALL of their
secrets!! The majority of the rich people today have copied what
someone else is or has been doing. That is what we are offering
you now--a chance to copy our success!! It is very easy and we
ARE for REAL!
Here's a little more incentive to check this out...
~IF YOU ORDER WITHIN 3 DAYS~
We will send you:
**** FREE $400 Bulk e-mail Software ****
**** FREE $200 Check by phone, fax, E-mail Software ****
**** FREE $10 Calling Card ****
----PLUS----
We will send you a list of over 100 major search engines ready to
surf on the Internet or to place a free link to your web page. Also,
you will receive a list of 98 of the best inexpensive newspapers to
advertise in (U.S. orders only). The list is complete with papers name,
city, phone number, circulation and frequency (Daily or Weekly).
We will also include five free BONUS reports that include these topics:
� How to Protect your PC from Viruses
� How to get 300+ Quality Prospect to E-mail you Weekly
� Tips and Secrets to Advertising with the major Online Services
� What's wrong with the World Wide Web
� Tax Advantages for the Home Business Owner.
You will find that these five reports by themselves are worth
thousands of dollars to you. These bonuses alone are worth several
times the cost of the report.
We will also give you a secret list of over 1500 of the best Web sites
where you can place a FREE advertisement. This is a list we use
every day to run our business and we are giving it to you! Imagine
what a great offering we are giving you for FREE!
And we're not through, if you order RIGHT NOW, we will give you
15 FREE "How to Reports" that you are free to market and sell on the
Internet or through mail order for $15-30 each. They are 45-60
informational packed pages each. A great way to start your own
Net based business! The topics are;
1) Earn Extra Dollars with a Home Based Answering Machine
2) How to Buy a Car with Bad Credit
3) How to Make Thousands of Dollars Winning Contests
4) U.S. Government Auction Sales
5) An Insider's Guide to Finding and Obtaining Grant Money
6) Home Based Business for Fun and Profit
7) How to Get a Job Fast
8) How to Make Money Without Leaving Your House
9) How to Turn the Hobby of Photography into Thousands
10) Making Money at Garage Sales, Swap Meets, and Flea Markets
11) How to Get Paid for Watching TV
12) Getting Your Start in Theater, Television, and Movies
13) Wills or Trusts? The Case for Living Trusts
14) How To Find Work with the Federal Government
15) How to Write Almost Anything and Get Paid for it!
50,000 EMAIL ADDRESSES FOR FREE
That's right, we will give you our BEST private list of 50,000 email addresses.
This list of addresses has been put through our remove and undeliverable lists
so that it is fresh and responsive. We are constantly adding and taking
addresses out of it. It is absolutely the best 50,000 email addresses you will
ever get your hands on, BAR NONE!
(please note: we are only giving this bonus to the first 50 people, so Don't Wait!!!)
So you are probably thinking to yourself, this is wonderful, but how much?
$149.95, $99.95 maybe even $79.95? You may have seen other companies
marketing "How To" information on the Internet and charging these prices.
People are actually buying these packages at these prices. Why? People
want to know how to market a product or service the "Right" way on the
Internet. "How to Profit from the Internet" could easily sell for any of the
above prices. However, we feel that we would rather help those who
may not have the ability to pay such a price in order to be successful.
That is why we are offering "How to Profit from the Internet" at the low
price of $39.95.
That's right, that was not a typo...$39.95.
I have sold this package at much higher prices in the recent past and will be
forced to raise my prices in the very near future. One of the things
you will learn in my course is to constantly test your market. I am
currently in the price testing phase of this marketing campaign.
On Augast 15th, 1998, I will be raising the price of this package
back up to $49.95 and eventually up to $79.95 to test the upscale market.
If you act quickly, you have the opportunity to get these materials today
for the unbelievable low price of $39.95.
Still skeptical??? Lets put that to rest right now. We will make this
completely risk free for you. If you are not 100% satisfied with the
information you receive, and believe that you cannot use it to start a
successful business or increase your current business profits, return it
within 30 days and we will refund your money. No questions asked!!
Are we nuts?
No, it just shows how confident we are that you'll be delighted with
the information you'll have...just like the others who are already using
the information and making money. You will be surprised how quickly
you can be earning money on the Internet!
So, if you are seriously interested in learning how to acquire wealth
by being online, ACT NOW!! This won't last for long!
Print out this form and mail it to the address below, with your $39.95
cash, check, money order or credit card information.
Natural Instincts
4676 Commercial St. SE Suite 201
Salem, Oregon 97302
Thank you =)
****Please print out the order form and mail it along with your payment****
************************************************************************
ORDER FORM
************************************************************************
NAME______________________________________________________
ADDRESS___________________________________________________
CITY_______________________ STATE__________ ZIP__________
Website Address____________________________________________
Deliver "How to Profit from the Internet" to the following email address:
E-MAIL ADDRESS____________________________________________
(please note, all orders must include an email address incase we encounter a
problem with processing. The 50,000 email addresses will be sent to you by email)
Area code and Phone number:
Day time __________________ Evening: ________________________
[ ] If you prefer to have the report on disk, please check here. Please
include an additional $3.00 for shipping and handling, thank you.
(If you reside outside the United States, please include $2.00 extra)
Please check one of the following:
[ ] I'm ordering within 3 days, please send my FREE software, $10.00
calling card, 15 How to Reports, "How To Profit From The Internet"
and FREE BONUSES including 50,000 email addresses for the
unbelievably low price of $39.95 today.
[ ] I'm not ordering within the first 3 days of receiving this letter, so I
agree to pay $39.95 for "How to Profit from the Internet" by itself,
less the bonus package.
[Internal code 138702A] This code must be on order form to be processed!!!
Payment Method:
[ ] Check
[ ] Cash
[ ] Money Order
[ ] Credit Card, please make sure to include the mailing address above!
[ ] Visa [ ] MasterCard [ ] American Express [ ] Discover
Name of Credit Card: _____________________________
Name as it appears on Card: _________________________________
Card Number: __________________________________
Expiration Date: _____ / _____
Signature of Card Holder: _________________________.
************************************************************************
"In mail-order work, anyone with imagination, determination, and a
willingness to study and experiment may have very little difficulty
getting started. A number of the most successful one-man operations
obtain an income as high as $40,000 to $100,000 a year."
- U.S. Department of Commerce
************************************************************************
THE MARKET IS HERE - TODAY! TAKE ADVANTAGE OF IT!!!!!
After you receive your report, I'll answer any questions time permits
via email. I'm looking forward to helping you succeed!
From loanuorao22 at msn.com Sun Jul 26 16:21:57 1998
From: loanuorao22 at msn.com (loanuorao22 at msn.com)
Date: Sun, 26 Jul 1998 16:21:57 -0700 (PDT)
Subject: NEED TO KNOW HIS OR HER BACKGROUND
Message-ID: <199807272706BAA10623@public.opgk.krakow.pl>
INFORMATION SERVICES.........
Your Source For Information
LOCATE DEADBEAT DADS,JUDGEMENT DEBTORS,LOST LOVED ONES,OLD FRIENDS
Business & Individuals in the USA
Assets SEARCHES (CHECKING & SAVINGS ACOUNTS) STOCKS BONDS AND SAFE DEPOSIT BOXES
Local, State, National & International
Information needed varies, sometimes just a name. Helpful information would be Last Known Address, Social Security Number, Date of Birth and any other information you feel would be of use. Provide us with everything you have and let the Professionals at Information USA do the rest.
Information SERVICES has the most competitive prices in the industry! Call today for a free price quote.
Other Services Available
*Criminal Background *Civil Court Records *Bankruptcy & Liens & Judgments
*National Real Property *Business Credit Reports *Corporate Profiles
*National Bank Asset Information *Stocks & Bonds & Mutual Fund Search
*Safe Deposit Box Search *Social Security Death Records *Marriage & Divorce
*Workers Compensation Records *Non-Published Numbers *Drivers License Records *Vehicle Records Search *Water & Aircraft Search *Pre-Trial Comprehensive Reports
*Pre-Employment Background *Verify Education *Verify Professional License
*Verify Employment
Call for additional Services
Information SERVICES
Call Toll Free
1-888-370-9112
Ask for Ken Wagner
Visa, MasterCard & Discove
From users1 at comports.com Sun Jul 26 18:31:17 1998
From: users1 at comports.com (users1 at comports.com)
Date: Sun, 26 Jul 1998 18:31:17 -0700 (PDT)
Subject: Dear Prospective Entrepreneur
Message-ID: <199807270113.SAA23863@helix.pathology.ubc.ca>
Dear Prospective Entrepreneur;
I have been an attorney for 26 years, but recently I
joined a company which is only 3 years old, and is
growing at a fantastic rate; in fact, after only 10
months old, it was featured in SUCCESS MAGAZINE, and
it has been the #1 rated network marketing opportunity
for the last three years.
What makes this company and this opportunity I am
offering you so great, is the fact that we (Marketing
Executives) have "EXCLUSIVE" marketing rights in the
United States to new miracle products that are
providing dramatic benefits to people who have two of
the worst diseases known to mankind. Americans who
learn about and need our products, can only get
them through us, and not from other companies, or the
corner drug store.
After getting into other companies in the last several
years, and going from company to company, and product
to product (mostly companies that failed, or had falsely
advertised products), I finally found this company that
is truly "CREDIBLE," has tremendous products, a great
compensation plan, and, best of all, my customers are
calling me back month after month.
Since the products actually sell themselves, I'm NOT
constantly on the phone, or forever hustling all my
relatives and friends. Products that make people feel
better (especially natural products that have no side
effects, and do have a 60 day money back guarantee)
cause people to call me every month, instead of me
calling them.
Our "exclusive" and "patented" all natural products
have also gone through the double blind clinical
studies and have produced unbelievable sales in foreign
markets, and have only recently been introduced into
the United States, so our timing is also perfect.
If you are interested in trying our products and/or
looking at this business opportunity, call me toll-free
at 888-203-6668 and leave your name, telephone number,
and/or your address if you want more information. You
also can respond to exclusive at apexmail.com.
If you are ready to make some changes in your life, free
up some time to spend with your family, and make some
extra money, call me or e-mail me. WHAT HAVE YOU GOT TO
LOSE? I made that same call a few months ago, and I
promise, you will be happy to hear more about this tre-
mendous company, its great products, and about how easy
it will be for you to make that extra money.
Thanks,
Clyde Fontenot
This message is brought to you from Clyde Fontenot,
Attorney, 504 W. Main St., Ville Platte,LA.70586,
318-363-5535.
From CEr1942929 at aol.com Sun Jul 26 20:26:55 1998
From: CEr1942929 at aol.com (CEr1942929 at aol.com)
Date: Sun, 26 Jul 1998 20:26:55 -0700 (PDT)
Subject: Brother
Message-ID: <41c2b3b5.35bbf35d@aol.com>
I am trying to find my brother, "Allen Thomas Taylor" I am not sure what year
he was born but I think it was l922, l923. We have the same Father, "Alva
Thomas Taylor", my name is Christine (Taylor) Ernest, I was born l935, in Mt.
Vernon, Mo.. I have not seen my brother in 60yrs. The last I heard he was
working for the civil service in Washington, DC, and got married in Maryland.
Any information I would appreciate.
Thank you
Sincerely
Christine Ernest
From bbt at mudspring.uplb.edu.ph Sun Jul 26 21:13:48 1998
From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado)
Date: Sun, 26 Jul 1998 21:13:48 -0700 (PDT)
Subject: enc....
In-Reply-To:
Message-ID:
Is it cheaper to install an encryption software
than an encryption hardware?
Will encryption reduce the speed of my pc?
A virus uses encryption to hide itself (correct?),
but will the files in a pc be safe from virus when encrypted? why?
(Correct me if I'm wrong) It is easier to crack (let us say) a 56 bit
technique than a 64 bit
(correct ?).
===============================================================================
You give the words you have spoken,
it is not lended and are not taken back.
It is like what The Corrs sung "...your forgiven not forgotten...."
bbt at mudspring.uplb.edu.ph
bbt at peak-two.uplb.edu.ph
metaphone at altavista.net
From cory4321 at yahoo.com Sun Jul 26 21:42:14 1998
From: cory4321 at yahoo.com (Cory)
Date: Sun, 26 Jul 1998 21:42:14 -0700 (PDT)
Subject: enc....
Message-ID: <19980727043530.4083.rocketmail@send1d.yahoomail.com>
"Bernardo B. Terrado" wrote:
> A virus uses encryption to hide itself (correct?),
> but will the files in a pc be safe from virus when encrypted? why?
a virus can be encrypted or it could leave itself open. usaually the
first.
it all depends on the combination of what virus and encryption
software you use.
Many times a virus will infect by waiting for you to open a file (run,
copy, move)
when it sees a file open it will add itself to the end and then move
the start
of the program to the virus. When the program is executed it jumps to
the virus who loads itself
into memory and then jumps seamlessly to the beginning of the program,
unperceptibly( if done right)
If your files are encrypted by a program that stays in memory and lets
programs run like normal a virus will run like
normal. If you have an uninfected file PGPed when you extract a copy
it will become infected like a normal file
however the pgp file will not be infected. If the encryption is built
into the program and has a checksum
you will be notified if it is infected but if it just runs a
decryption routine and then starts the program then it
could be infected before the decryption routine.
in general if you can read/write a file so can a virus.
If you are worried about infection, get an uninfected copy and
make a detached pgp .sig then run it on your computer in a batch file
so
pgp checks the signature before it runs. if pgp fails the sig. your
program is infected
each virus is unique and acts differently, remember they are just
written like normal programs.
If you are indepth interested, search for a virus authors page.
Anti-virus people are vague so
you don't figure out how to make one but a virus author will probably
have guides on how to make
a virus. This gives you intimate knowledge of a virus's abilities.
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com
From jf_avon at citenet.net Sun Jul 26 23:09:10 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Sun, 26 Jul 1998 23:09:10 -0700 (PDT)
Subject: short comment from Adleman on DNA computing, DES and RSA
Message-ID: <199807270624.CAA29170@cti06.citenet.net>
Hi Cypherpunks and e$-ers.
After having read Adleman's Sci Am article, I couldn't help but ask him... :-)
The following message is re-posted with his permission
Ciao
jfa
==================BEGIN FORWARDED MESSAGE==================
From: Len Adleman
To: Jean-Francois Avon
Subject: Re: Your article in Scientific American and RSA
Thank you for the kind words regarding the Sci Am article. I have thought about
using DNA for breaking cryptosystems. It does appear convievable that a code like
DES could be broken. However, because RSA can simply increase the size of keys to
overcome whatever computing power DNA provides, I do not think it represents a
threat to RSA.
We of course have a long way to go to see whether we can actually get DNA to live
up to its potential.
If you are unfamiliar with quantum computation I think you might enjoy reading
about it - it, at least in theory, could represent a threat to RSA. I believe that
you can find info on the www.
-Len
Jean-Francois Avon wrote:
> Greetings.
>
> Your article in SciAm blew my mind!
>
> I bought the magazine after having seen it because of my interest/inquietude
> of new computing ways that could break RSA (and similar public key) encryption
> schemes.
>
> The most fantastic thing is that I bought the magazine after having browsed
> the article but without even having read who was the author of the article!
> [laughs]
>
> Now, here is my question, which you *surely* figured out: can a method could
> be devised (using DNA computing) that would decrease the security of RSA? And
> if yes, what would it imperil ( keys, individual cyphertext, etc?)
>
> I could not see a trivial way of effecting multiplication and division, but
> then, maths have never been my forte... ;-)
>
> Any comments?
>
> Highest regards
>
> jfa
===================END FORWARDED MESSAGE===================
Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
DePompadour, Soci�t� d'Importation Lt�e
Limoges fine porcelain and french crystal
JFA Technologies, R&D physicists & engineers
Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
From lreed at west.cscwc.pima.edu Sun Jul 26 23:50:54 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sun, 26 Jul 1998 23:50:54 -0700 (PDT)
Subject: FDR.doc and FDR2.doc
Message-ID: <009C9C78.E5ED3900.9@west.cscwc.pima.edu>
It seems that the forementioned files never made it to the list
(at least as echoed by infinity.nus.sg), as a result of being
filtered out somewhere along the way due to their excessive size.
Realizing that this was likely the result of filtering for the
benefit of list members, so that they would not be stuck with
wasting their resources downloading large amounts of tripe by]
spamming assholes, I consulted John Gilmore as to what action
to take on this matter.
John informed me that one thing he learned from Dimitri was that,
"The Spammer interprets filtering as common-sense, and routes
around it."
Accordingly, I have broken the files down into FDR1.txt --> FDR8.txt,
so that the lack of AOL'ers competent enough to seriously piss off
list members would not lead to VeteranAryan CypherPunks forgetting
about the GoodOldDays (TM), when we had Sandy Sandfort to kick around
for attempting to put a stop to this kind of bullshit.
Sincerely,
"Flame me, I dare you!"
From lreed at west.cscwc.pima.edu Mon Jul 27 00:13:16 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 27 Jul 1998 00:13:16 -0700 (PDT)
Subject: FDR1
Message-ID: <009C9C7C.0C6CD880.1@west.cscwc.pima.edu>
As to the President, it is an account of an image projected upon the
popular mind which came to be known as Franklin D. Roosevelt. It is
the author's conviction that this image did
not at all correspond to the man himself and that it is now time to
correct the lineaments of this synthetic figure
created by highly intelligent propaganda, aided by mass illusion and
finally enlarged and elaborated out of all
reason by the fierce moral and mental disturbances of the war.
The moment has come when the costumes, the grease paint, the falsely
colored scenery, the technicolored
spotlights and all the other artifices of makeYDup should be put aside
and, in the interest of truth, the solid facts
about the play and the players revealed to the people.
July, 1948
Preface to the Popsvox PublishingR edition
Someone once said that Washington DC is a place where history is taken
for granted and granite mistaken for
history. The new FDR "memorial" is notable for what it forgets. John
T. Flynn, active columnist and author
throughout the Roosevelt years and beyond, made an enormous contribution
to accurate reporting and
genuine understanding of the New Deal. Unfortunately, Flynn's work
has been out of print for decades while
the politically correct elite have not only preserved the myth, they
have now literally cast it in stone.
Do not despair. The technology of the information age provides a remedy.
Flynn is back, facts, footnotes and
all, and in an electronically enhanced form unimagined in the age when
journalists scribbled on notepads with
pencil stubs. As a MicrosoftR WindowsR help file, it can be searched,
annotated, printed out . . . or even read,
page by pungent page. Even better for students, editorialists or online
newsgroup debaters, the electronic
version is only a mouse-click away when a citation is needed. No more
flipping through paper texts in search of
a passage about the Democratic National Committee or the $3,000.000
income Eleanor took down as First Lady.
Find what you want when you want it. Add your own annotations and memory
joggers. Tools are the human
heritage, as are words and ideas.
This revived book is produced for the Historical Research Foundation
in New ork whose mission is the
conservation of truth in history.
- Ed.
Saturday morning, March 4, 1933...the conquering Democrats poured into
the city, hastening to take over after so many hungry
years in the wilderness.
{Hitler/1933?-sog}
Only a week before an assassin's bullet had barely missed Roosevelt.
It
struck Anton Cermak, the Bohemian mayor and boss of Chicago, who with
Al Smith, had opposed Roosevelt's
nomination.
he got the bullet intended for Roosevelt {BIG Assumption - sog}and
died a few days later.
Later, as Roosevelt's train sped from New ork to Washington carrying
himself and
his family, word came to him that aboard another train carrying the
65YDyearYDold Senator Thomas J. Walsh and
his bride of two days, the aged groom dropped dead in his Pullman drawing
room. He was speeding to the
capital to be sworn in as Attorney General.
Two weeks before the lameYDduck Congress had turned a
somersault and voted the amendment to the Constitution ending Prohibition.
FortyYDone legislatures were in
session waiting eagerly for the chance to approve the wet amendment
and to slap taxes on beer and liquor to
save their empty treasuries.
The country, the states, the towns needed money YD something
to tax. And liquor was the richest target. "Revenue," said one commentator,
"unlocked the gates for Gambrinus
and his foaming steed."
first of all, let me assert my firm belief that the only thing we have
to fear is fear
itself."
"The means of exchange are frozen in the streams of trade."
"et our distress comes from no failure of substance. We are stricken
by no
plague of locusts3,300,000,000 YD in
addition to all the other specific appropriations for government, into
his hands to be spent at his sweet will in
any way he desired. The great purse YD which is the greatest of all
the weapons in the hands of a free parliament
to oppose the extravagances of a headstrong executive YD had been handed
over to him. The "spendthrift"
Hoover was in California at his Palo Alto home putting his own affairs
in order, while the great Economizer who
had denounced Hoover's deficits had now produced in 100 days a deficit
larger than Hoover had produced in
two years.
Roosevelt had no wish to stem the
panic. The onrushing tide of disaster was sweeping the slate clean
for him YD at the cost of billions to investors
and depositors. The greater the catastrophe in which Hoover went out
of power the greater would be the
acclaim when Roosevelt assumed power.
For this drastic decision there could be, of course, but one excuse,
namely that Mr. Roosevelt had a definite
plan and that such a plan could be better carried out with a full disaster.
What, then, was his plan? We shall see
presently.4
the crisis had assumed a terrifying
aspect. To this was added the fear of inflation and of irresponsible
and even radical measures by the new
President. One of these, of course, was the agitation which went on
behind the scenes for the nationalization of
the whole banking system. Men close to the President-elect were known
to be for this.
Then Glass asked Roosevelt what he was going to do.
To Glass' amazement, he answered: "I am planning to close them, of
course." Glass asked him what his
authority was and he replied: "The Enemy Trading Act" YD the very act
Hoover had referred to and on which
Roosevelt had said he had no advice from Cummings as to its validity.
Glass protested such an act would be
unconstitutional and told him so in heated terms. "Nevertheless," replied
Roosevelt, "I'm going to issue a
proclamation to close the banks."
After delivering his inaugural address, Roosevelt issued a proclamation
closing all banks.
They decided that the action
must be swift and staccato for its dramatic effect; that the plan,
whatever it might be, must be a conservative
one, stressing conventional banking methods and that all leftYDwing
presidential advisers must be blacked
out during the crisis; and finally that the President must make almost
at the same time a tremendous gesture in
the direction of economy.
w it is difficult to believe that it could
ever have been uttered by a man who before he ended his regime would
spend not merely more money than
President Hoover, but more than all the other 31 Presidents put together
YD three times more, in fact, than all the
Presidents from George Washington to Herbert Hoover. This speech was
part of the plan Moley and Woodin
had devised to sell the banking plan in a single package with the great
economy program.
To the great audience that listened to the fireside chat, the hero
of the drama YD the man whose genius had led
the country safely through the crisis of the banks YD was not any of
the men who had wrestled with the problem,
but the man who went on the radio and told of the plan he did not construct,
in a speech he did not write. Thus
Fate plays at her ageYDold game of creating heroes.
a Great Man attended by a Brain Trust to bring understanding first
and then order out of
chaos.
Actually there are no big men in the sense in which Big Men are sold
to the people. There are men who are
bigger than others and a few who are wiser and more courageous and
farseeing than these. But it is possible
with the necessary pageantry and stage tricks to sell a fairly bright
fellow to a nation as an authentic BIG Man.
Actually this is developing into an art, if not a science. It takes
a lot of radio, movie, newspaper and magazine
work to do it, but it can be done.
{FDR/Hitler - sog}
For the farmer the New Deal would encourage cooperatives and enlarge
government lending agencies. But the
greatest enemy of the farmer was his habit of producing too much. His
surplus ruined his prices. The New Deal
would contrive means of controlling the surplus and ensuring a profitable
price.
As for business the New Deal proposed strict enforcement of the antiYDtrust
laws, full publicity about security
offerings, regulation of holding companies which sell securities in
interstate commerce, regulation of rates of
utility companies operating across state lines and the regulation of
the stock and commodity exchanges.
Roosevelt in his preelection speeches had stressed all these points
YD observing the rights of the states so
far as to urge that relief, oldYDage pensions and unemployment insurance
should be administered by them, that
the federal government would merely aid the states with relief funds
and serve as collection agent for social
insurance.
First of all, his central principle YD his party's traditional principle
of war upon BIG government YD was reversed.
And he set out to build a government that in size dwarfed the government
of Hoover which he denounced. The
idea of a government that was geared to assist the economic system
to function freely by policing and
preventive interference in its freedom was abandoned for a government
which upon an amazing scale
undertook to organize every profession, every trade, every craft under
its supervision and to deal directly with
such details as the volume of production, the prices, the means and
methods of distribution of every
conceivable product. This was the NRA. It may be that this was a wise
experiment but it was certainly the very
reverse of the kind of government which Mr. Roosevelt proposed in his
New Deal.
Enforcement of the antiYDtrust act was a longtime pet of his party and
it was considered as an essential
instrument to prevent cartels and trusts and combinations in restraint
of trade which were supposed to be
deadly to the system of free enterprise. The New Deal had called loudly
for its strict enforcement. et almost at
once it was suspended YD actually put aside during the experiment YD
in order to cartelize every industry in
America on the Italian corporative model.
{Fascism! - sog}
First, and most important, was the NRA and its dynamic ringmaster,
General Hugh Johnson. As I write, of
course, Mussolini is an evil memory. But in 1933 he was a towering
figure who was supposed to have
discovered something worth study and imitation by all world artificers
everywhere.
The NRA provided that in
America each industry should be organized into a federally supervised
trade association. It was not called a
corporative. It was called a Code Authority. But it was essentially
the same thing. These code authorities could
regulate production, quantities, qualities, prices, distribution methods,
etc., under the supervision of the NRA.
This was fascism. The antiYDtrust laws forbade such organizations. Roosevelt
had denounced Hoover for not
enforcing these laws sufficiently. Now he suspended them and compelled
men to combine.
In spite of all the fine words about industrial democracy, people began
to see it was a scheme to permit business men to combine to put up
prices and keep them up by direct decree or
through other devious devices. The consumer began to perceive that
he was getting it in the neck.
. A tailor named Jack Magid in New Jersey was arrested, convicted,
fined and sent to jail. The crime was that he had pressed a suit of
clothes for 35 cents when the Tailors' Code
fixed the price at 40 cents. The price was fixed not by a legislature
or Congress but by the tailors.
The NRA was discovering it could not enforce its rules. Black markets
grew up. Only the most violent police
methods could procure enforcement. In Sidney Hillman's garment industry
the code authority employed
enforcement police.8 They roamed through the garment district like
storm troopers. They could enter a man's
factory, send him out, line up his employees, subject them to minute
interrogation, take over his books on the
instant. Night work was forbidden. Flying squadrons of these private
coatYDandYDsuit police went through the
district at night, battering down doors with axes looking for men who
were committing the crime of sewing
together a pair of pants at night. But without these harsh methods
many code authorities said there could be
no compliance because the public was not back of it.
"Mob rule and racketeering had a considerable
degree displaced orderly government."9
On May 27, 1935, the Supreme Court, to everybody's relief, declared
the
NRA unconstitutional. It held that Congress at Roosevelt's demand had
delegated powers to the President and
the NRA which it had no right to delegate YD namely the power to make
laws. It called the NRA a Congressional
abdication. And the decision was unanimous, Brandeis, Cardozo and Holmes
joining in it.
But of course he had imposed it not as a temporary expedient but as
a new order and he boasted of it. He had
done his best to impose the dissolution of the antiYDtrust laws on the
country.
Curiously enough, while Wallace was paying out hundreds of millions
to kill millions of hogs, burn oats, plow
under cotton, the Department of Agriculture issued a bulletin telling
the nation that the great problem of our
time was our failure to produce enough food to provide the people with
a mere subsistence diet.
Oliphant was a lawyer whose reformist addictions overflowed into every
branch of public affairs. A
devout believer in rubber laws, it was easy for him to find one which
could be stretched to include rubber
dollars.
We are thus continuing to move toward a managed
currency."
Roosevelt's billions, adroitly used, had broken down every
political machine in America. The patronage they once lived on and
the local money they once had to disburse
to help the poor was trivial compared to the vast floods of money Roosevelt
controlled. And no political boss
could compete with him in any county in America in the distribution
of money and jobs.
The poll indicated that Long could corral 100,000 voted in New ork
State, which could, in a close
election, cost Roosevelt the electoral vote there. Long became a frequent
subject of conversation at the White
House.
Dr. Carl Austin Weiss, a young physician,
eluded the vigilance of Long's guards and shot him.
" A monument stands to the memory of this arch demagogue in the Hall
of Fame of the
Capitol building in Washington and his body rests in a crypt on the
state capitol grounds YD a shrine to which
crowds flock every day to venerate the memory of the man who trampled
on their laws, spat upon their
traditions, loaded them with debt and degraded their society to a level
resembling the plight of a European
fascist dictatorship.
The Treasury and the Department of Justice went into action and before
long there were income tax
indictments against at least 25 of the Long leaders and henchmen.
When little men think about large problems the boundary between the
sound and the unsound is very thin and vague. And when some idea is
thrown out which corresponds with
the deeply rooted yearnings of great numbers of spiritually and economically
troubled people it spreads like a
physical infection and rises in virulence with the extent of the contagion.
The spiritual and mental soil of the
masses near the bottom of the economic heap was perfect ground for
all these promisers of security and
abundance.
They had cooked up for themselves that easy, comfortable potpourri
of socialism
and capitalism called the Planned Economy which provided its devotees
with a wide area in which they might
rattle around without being called Red.
But the time would come when they would approach much closer
to their dream of a planned people. We shall see that later.
He was a man literally without any fundamental philosophy. The positions
he took on political and economic
questions were not taken in accordance with deeply rooted political
beliefs but under the influence of political
necessity.
NRA and the AAA. This was a plan to take the whole industrial and agricultural
life of the country under
the wing of the government, organize it into vast farm and industrial
cartels, as they were called in Germany,as they were called in Italy,
and operate business and the farms under plans made and carried out
under the supervision of government.
As for the Reds, they did not move in heavily until the second term
and not en masse until the third
term, although the entering wedge was made in the first. And then the
point of entry was the labor movement.
This thing called revolutionary propaganda and activity is something
of an art in itself.
It has been developed to a high degree in Europe where revolutionary
groups have been active for half a
century and where Communist revolutionary groups have achieved such
success during the past 25 years. It
was, at this time of which I write, practically unknown to political
and labor leaders in this country and is still
unknown to the vast majority of political leaders.
He vetoed that but had
an arrangement with the Democratic leadership that they would pass
it over his head. Thus the President could
get credit for trying to kill it while the Democrats would get credit
for actually passing it.
Their chief reliance was
upon the charge that the President had usurped the powers of Congress,
attacked the integrity of the courts,
invaded the constitutional prerogatives of the states, attempted to
substitute regulated monopoly for free
enterprise, forced through Congress unconstitutional laws, filled a
vast array of bureaus with swarms of
bureaucrats to harass the people and breed fear in commerce and industry,
discourage new enterprises and
thus prolonged the depression, had used relief to corrupt and intimidate
the voters and made appeals to class
prejudice to inflame the masses and create dangerous divisions.
Their chief reliance was
upon the charge that the President had usurped the powers of Congress,
attacked the integrity of the courts,
invaded the constitutional prerogatives of the states, attempted to
substitute regulated monopoly for free
enterprise, forced through Congress unconstitutional laws, filled a
vast array of bureaus with swarms of
bureaucrats to harass the people and breed fear in commerce and industry,
discourage new enterprises and
thus prolonged the depression, had used relief to corrupt and intimidate
the voters and made appeals to class
prejudice to inflame the masses and create dangerous divisions.
. From the moment the
gavel fell to open that wild conclave to the knock of the adjourning
gavel everything that was said and done or
that seemed to just happen was in accordance with a carefully arranged
and managed scenario. The delegates
were mere puppets and answered to their cues precisely like the extras
in a movie mob scene.
the South had both arms up to its shoulder blades in Roosevelt's relief
and
public works barrel. National politics was now paying off in the South
in terms of billions. When Alf Landon
talked about Roosevelt's invasions of the Constitution, the man on
relief and the farmer fingering his subsidy
check replied "ou can't eat the Constitution."
As to the public debt he said we
borrowed eight billions but we have increases the national income by
22 billions. Would you borrow $800 a
year if thereby you could increase your income by $2200, he asked.
That is what we have done, he answered,
with the air of a man who has easily resolved a tough conundrum. And
though the figures were false and the
reasoning even more so it was practically impossible for a Republican
orator to reason with voters against
these seemingly obvious and plausible figures.
The President's victory was due to one thing and one thing only, to
that one great rabbit YD the spending rabbit YD
he had so reluctantly pulled out of his hat in 1933. This put into
his hands a fund amounting to nearly 20 billion
dollars with which he was able to gratify the appetites of vast groups
of people in every county in America
. Without the revival of investment there could
be no revival of the economic system. The system was being supported
by government spending of borrowed
funds.
Roosevelt's unwillingness to compromise now angered his own supporters
who were being forced to carry this
unpopular cause. In the end he had to assure Robinson that he would
have the appointment, and then to
crown Roosevelt's difficulties, Robinson was stricken with a heart
attack in the Senate and died shortly after,
alone in his apartment.
The Treasury made a practice of keeping tricky books and producing
phony results. It had merely shifted relief payments to other accounts.
They were, in fact, larger than the year
before.
Then he revealed the extent of his plans YD they
would have to step up spending, forget about balancing the budget and
get along with a two or three billion
dollar a year deficit for two years. Then a conservative would come
into office. That administration would do
what Roosevelt had been promising he would do YD quit government spending.
And then the whole thing would
go down in a big crash.
Then he revealed the extent of his plans YD they
would have to step up spending, forget about balancing the budget and
get along with a two or three billion
dollar a year deficit for two years. Then a conservative would come
into office. That administration would do
what Roosevelt had been promising he would do YD quit government spending.
And then the whole thing would
go down in a big crash.
What could he spend on? That was the problem.
There is only a limited number of things on which the federal government
can spend.
The one big thing the federal government can spend money on is the
army and navy.
The depression which assaulted our unprepared society in 1929 was by
no means a mysterious phenomenon to
those who had given any attention to the more or less new studies in
the subject of the business cycle. It was,
first of all and essentially, one of those cyclical disturbances common
to the system of private enterprise. That
economic system has in it certain defects that expose it at intervals
to certain maladjustments. And this was
one of those intervals. Had it been no more than this it could have
been checked and reversed in two or three
years. But this cyclical depression was aggravated by additional irritants:
1. The banking system had been gravely weakened by a group of abuses,
some of which arose out of the
cupidity of some bankers and others out of ignorance.
2. A wild orgy of speculation had intruded into the system stimulated
by a group of bad practices in the
investment banking field.
3. A depression in Europe arising out of special causes there had produced
the most serious repercussions
here.
The great, central consequence of these several disturbances was to
check and then almost halt completely,
the flow of savings into investment. All economists now know what few,
apparently, knew then YD that in the
capitalist system, power begins in the payments made by employers to
workers and others in the process of
producing goods. And this must be constantly freshened by an uninterrupted
flow of savings into investment
YD the creation of new enterprises and the expansion of old ones. If
this flow of savings into investment slows
down the whole economic system slows down. If it is checked severely
the whole economic system goes into a
collapse.
throughout Hoover's term one of these YD the ruthless operation of gamblers
in the stock market with the
dangerous weapon of short selling YD continued to add at intervals spectacular
crashes in the market which
intensified the declining confidence of the people.
But Hoover had against him, in addition to those natural, international
and social disturbances, an additional
force, namely a Democratic House of Representatives which set itself
with relentless purpose against
everything he attempted to do from 1930 on. It had a vested interest
in the depression.
and generally to do all those things he had denounced in Hoover without
the slightest foundation for
the charges.
It was always easy to sell him a plan that involved giving away government
money.
It was always easy to interest him in a plan which would confer some
special benefit upon some special class in
the population in exchange for their votes. He was sure to be interested
in any scheme that had the appearance
of novelty and he would seize quickly upon a plan that would startle
and excite people by its theatrical
qualities.
He did not dream of the
incredible miracle of government BANK borrowing. He did not know that
the bank lends money which it
actually creates in the act of making the loan. When Roosevelt realized
this, he saw he had something very
handy in his tool kit. He could spend without taxing people or borrowing
from them, while at the same time
creating billions in bank deposits. Wonderful!
Roosevelt
discovered what the Italian Premier Giolitti had discovered over 50
years before, that it was not necessary to
buy the politicians. He bought their constituents with borrowed money
and the politicians had to go along.
Those who, in their poverty and helplessness, refused to surrender
their independence, paid for it. A man in
Plymouth, Pa., was given a whiteYDcollar relief job before election
at $60.50 a month. He was told to change his
registration from Republican to Democratic. He refused and very soon
found himself transferred YD transferred
from his whiteYDcollar job to a pickYDaxe job on a rock pile in a quarry.
There he discovered others on the rock pile
who had refused to change their registration. This was in America,
the America of the men who were chanting
and crooning about liberty and freedom 365 days a year, who were talking
about democracy and freedom for all
men everywhere.
These primaries of 1938, of course, were the scenes of the great Roosevelt
purge, when distinguished
Democratic senators and congressmen were marked for annihilation.
It had already become a crime for a Democrat to disagree with the administration
From lreed at west.cscwc.pima.edu Mon Jul 27 00:13:35 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 27 Jul 1998 00:13:35 -0700 (PDT)
Subject: FDR2
Message-ID: <009C9C7C.1770AB80.5@west.cscwc.pima.edu>
They were eager
for America to get into a war if it came. But they felt the people
had to be drawn along a little at a time. They
wanted the President to frighten the people a little as a starter.
But he increased the recommended dose. The
reaction was so violent that they felt it put back by at least six
months the purpose they had in mind YD rousing
America to a warlike mood.
However, following the Panay
incident, Mr. Hull began to churn up as much war spirit as possible
and through the radio and the movies
frantic efforts were made to whip up the anger of the American people.
There never has been in American politics a religion so expansively
and luminously righteous as the New Deal.
>From the beginning to the end it was constant in one heroic enterprise
YD war to the death upon evil, upon greed,
poverty and oppression. It had, in fact, one monstrous enemy against
which it tilted its shining spear seven
days a week and that was SIN. If you criticized the New Deal, you were
for sin.
There is no vast sum of money in holding
office. The riches are in the perquisites, the graft, legal and illegal,
often collected by men who do not hold
office but who do business with those who do. Some Democratic chieftains
of the newer stripe began to drift
into vice rackets of various sorts.
It was this Tammany at its lowest level which surrendered to the New
Deal and became finally the political tool
of Mr. Roosevelt in New ork. From an oldYDfashioned political district
machine interested in jobs and
patronage, living on the public payroll and on various auxiliary grafts,
some times giving a reasonably good
physical administration of the city government, some times a pretty
bad one, some times very corrupt, some
times reasonably honest, it became a quasiYDcriminal organization flying
the banner of the Free World and the
Free Man.
Cermak fought Roosevelt's nomination at Chicago, and went to Miami
in February, 1933 to make his peace with
Roosevelt where the bullet intended for Roosevelt killed him.
{Who fired the shot? - sog}
d before the House Committee Investigating UnYDAmerican Activities.
Frey, in a
presentation lasting several days, laid before the Committee a completely
documented account of the
penetration of the CIO by the Communist Party. He gave the names of
280 organizers in CIO unions
It was the Communists who were engineering the sitYDdown strikes and
who instigated and organized the
Lansing Holiday when a mob of 15,000 blockaded the state capitol and
2,000 of them, armed with clubs, were
ordered to march on the university and bring part of it back with them.
At the Herald Tribune forum in New
ork City about this time the President delivered one of the bitterest
attacks he had ever made on a government
official. It was against Martin Dies for investigating these Communist
influences in the sitYDdown strikes.
Sidney Hillman would become not only its
dominating mind but Roosevelt's closest adviser in the labor movement
and in the end, though not himself a
Democrat, the most powerful man in the Democratic party.
Sidney Hillman28 was born in Zargare, Lithuania, then part of Russia,
in 1887. He arrived here in 1907 after a
brief sojourn in England.
it is entirely probable that Hillman, while not a Communist, was at
all times
sympathetic to the Communist philosophy. He was a revolutionist
It is certain that the Russian revolution set off a very vigorous flame
in Hillman's bosom. In 1922 he hurried
over to Russia with a plan. He had organized here what he called the
RussianYDAmerican Industrial Corporation
with himself as president. Its aim was to operate the "textile and
clothing industry of Russia." Hillman's
corporation sold to labor organizations at $10 a share a quarter of
a million dollars of stock. The circular letter of
the corporation soliciting stock sales among labor unions said: "It
is our paramount moral obligation to help
struggling Russia get on her feet." Hillman went to Russia to sell
the idea to Lenin. He cabled back from
Moscow: "Signed contract guarantees investment and minimum 8 per cent
dividend. Also banking contract
permitting to take charge of delivery of money at lowest rate. Make
immediate arrangements for transmission of
money. Had long conference with Lenin who guaranteed Soviet support."
Hillman was never an outright exponent of Communist objectives. He
was, however, deeply sympathetic to the
Communist cause in Russia and to the extreme leftYDwing ideal in America,
but he was an extremely practical man
who never moved upon any trench that he did not think could be taken.
He never pressed his personal
philosophy into his union and his political activities any further
than practical considerations made wise.
He was a resolute man who shrank from no instrument that could be used
in his plans. He was a cocksure,
selfYDopinionated man and he was a bitter man, relentless in his hatreds.
He had perhaps one of the best minds
in the labor movement YD sharp, ceaselessly active and richly stored
with the history and philosophy of the labor
struggle and of revolutionary movements in general. When Lewis and
Dubinsky at a later date would leave the
CIO, Hillman would be supreme and would reveal somewhat more clearly
the deep roots of his revolutionary
yearnings that had been smothered for a while under the necessities
of practical leadership.
There is no doubt that Hillman was one of the first labor leaders to
use the goon as part of his enforcement
machinery.
Why should LaGuardia want to scuttle the investigation of a notorious
murder? Why should the President of
the United States refuse to deliver Lepke to Dewey and thus save him
from going to the chair? Why save the
life of a man convicted as the leader of a murder syndicate? Who was
the leading politician supposed to be
involved? Who was the nationally known labor leader?
The murder for which Lepke was convicted and wanted for execution by
Dewey and shielded by Roosevelt
was, as we have seen, that of Joseph Rosen. Rosen was a trucking contractor
who was hauling to nonYDunion
factories in other states for finishing, clothing cut under union conditions
in New ork. He was put out of
business by Lepke in the interest of a local of Hillman's Amalgamated
and Rosen was threatening to go to the
district attorney and tell how this was done.
But for some reason there rose to the surface at this
time a lawless element, some of them criminal, some of them lawless
in the excess of their revolutionary zeal,
some of them just plain grafters. And these elements constituted the
most powerful section of those groups
that were supporting the President. This was in no sense the Army of
the Lord, as it was so widely advertised.
He wanted
ambassadors from their own countries to tell them that other governments
were "looking to Roosevelt as the
savior of the world," as he put it himself. Farley admits this was
done and says it was a mistake and that he said
so at the time.
With the rise of the New Deal, however, a vast
army of persons appeared on the payroll of the federal government and
because some of the payrolls were
flexible and had no connection whatever with the Civil Service, it
was a simple matter for the government to use
this ancient but now enormously enhanced tool to control votes in particular
localities.
The story of the third term campaign which we shall now see is the
story of dealing with all these
groups, and the feasibility of doing so successfully was enormously
enhanced by the fact that in September,
1939, just about the time the active work for the coming convention
was under way, Hitler marched into Poland.
{Just happens to fit right in with Planned Government/Economy - sog}
On July 17, 1940, Franklin D. Roosevelt was nominated for the presidency
for the third time. The prologue to
this event was supplied by Europe.
When the convention met, Willkie
seemed the most unlikely of these candidates, but his strength grew.
Dewey was eliminated on the fourth ballot
and on the sixth, in a contest between Taft and Willkie, the latter
was nominated in one of the most amazing
upsets in convention history.
The Democrats believed that Willkie would make a formidable opponent.
But from the moment he was
nominated the result of the election could no longer be in doubt. Charles
McNary, Republican leader in the
Senate, was nominated for the vice presidency. The joining of these
two men YD Willkie and McNary YD was so
impossible, they constituted so incongruous a pair that before the
campaign ended McNary seriously
considered withdrawing from the race.
There was a moment in that convention when one voice was lifted in
solemn warning, the full meaning of which
was utterly lost upon the ears of the delegates. Former President Hoover,
in a carefully prepared address, talked
about the "weakening of the structure of liberty in our nation." He
talked of Europe's hundredYDyear struggle for
liberty and then how Europe in less than 20 years surrendered freedom
for bondage. This was not due to
Communism or fascism. These were the effects. "Liberty," he said, "had
been weakened long before the
dictators rose." Then he named the cause:
"In every single case before the rise of totalitarian governments there
has been a period dominated by
economic planners. Each of these nations had an era under starryYDeyed
men who believed that they could plan
and force the economic life of the people. They believed that was the
way to correct abuse or to meet
emergencies in systems of free enterprise. They exalted the State as
the solvent of all economic problems.
These men
shifted the relation of government to free enterprise from that of
umpire to controller. Directly or indirectly
they politically controlled credit, prices, production or industry,
farmer and laborer. They devalued,
pumpYDprimed and deflated. They controlled private business by government
competition, by regulation and by
taxes. They met every failure with demands for more and more power
and control ...
societies oneYDfourth socialist, threeYDfourths
capitalist, administered by socialist ministries winding the chains
of bureaucratic planning around the strong
limbs of private enterprise.
Mr. Hoover then undertook to describe the progress of this baleful
idea here in a series of headlines: Vast
Powers to President; Vast Extension of Bureaucracy; Supreme Court Decides
Against New Deal; Attack on
Supreme Court; Court Loaded with Totalitarian Liberals; Congress Surrenders
Power of Purse by Blank Checks
to President; Will of Legislators Weakened by Patronage and Pie; Attacks
on Business Stirring Class Hate;
Pressure Groups Stimulated; Men's Rights Disregarded by Boards and
Investigations; Resentment at Free
Opposition; Attempts to Discredit Free Press.
e State Planned and Managed Capitalism
Roosevelt executed a political maneuver that beyond doubt caused great
embarrassment to the Republicans. He announced the appointment of Henry
L. Stimson, who had been
secretary of State under President Hoover, as Secretary of War, and
Frank Knox, candidate for vice president
with Landon in 1936, as Secretary of the Navy.
He was laying his plans cunningly to have himself "drafted." The
movement began some time in 1939 and the leaders in it were Ed Kelly
of Chicago and Frank Hague of New
Jersey.
The debacle was the plan Roosevelt was engineering to
literally put the party out of business by inducing its leaders not
to contest his election. Commentators like
Dorothy Thompson and H.V. Kaltenborn and other proYDwar writers were
calling on the Republicans not to
contest the election. And Roosevelt schemed to induce the presidential
candidates of the party in 1936 to
become Secretaries of War and Navy respectively in his cabinet.
Wallace
He has been pictured as a vague
and impractical mystic, half scientist, half philosopher, with other
ingredients that approach the pictures in the
comic strips of the professor with the butterfly net.
Wallace brought men like Tugwell into the Department as his UnderYDSecretary
of Agriculture
To understand what made this thoroughly dangerous man tick it is necessary
to look at another widely
advertised side of his nature YD his interest in mysticism.
Some time in the 'twenties, a gentleman by the name of Nicholas Constantin
Roerich appeared on the American
scene. Roerich was a highly selfYDadvertised great philosopher on the
Eastern Asiatic model. He gathered
around himself a collection of admirers and disciples who addressed
him as their "Guru" YD a spiritual and
religious person or teacher. He dispensed to them a philosophic hash
compounded of pseudoYDogism and
other Oriental occult teachings that certain superior beings are commissioned
to guide the affairs of mankind.
Roerich wrote a long string of books YD "In Himalaya," "Fiery Stronghold,"
"Gates Into the Future," "The Art of
Asia," "Flame in Chalice," "Realm of Light."
Logvan and Logdomor
were the names by which Horch was known in this mystic circle.
stories in English language newspapers in China indicated that
Roerich applied to the 15th U.S. Infantry in Tientsin for rifles and
ammunition and that the expedition had
mysterious purposes.
He cried out in ecstasy in a speech: "The people's revolution is on
the march and the devil and all his angels
cannot prevail against it. They cannot prevail because on the side
of the people is the Lord." Now he was
fighting not George Peek and Hugh Johnson and Harold Ickes. He was
fighting the devil and the bad angels.
And he had on his side the lord, Franklin D. Roosevelt, and the good
angels YD the Democrats and the CIO and,
in good time, he would be joined by Joe Stalin and Glen Taylor, the
singing Senator from Idaho. He would
begin making world blueprints YD filling all the continents with TVAs,
globeYDcircling sixYDlane highways, world
AAAs, World Recovery Administrations, World Parliaments and International
Policemen.
This was the man chosen for Vice President by Roosevelt who had warned
that his health was not too good
and who forced this strange bird upon his party in the face of a storm
of angry protest.
. One of Roosevelt's early
acts in foreign affairs was to recognize Soviet Russia. Three months
later YD February 28, 1934 YD Elliott went into a
deal with Anthony Fokker to sell the Soviet government 50 military
planes for a price which would leave a
commission of half a million dollars for Elliott and the same for Fokker
It is estimated that she has received during the 15 years
since she entered the White House at least three million dollars YD
which is not very bad for a lady who had no
earning power whatever before she moved her desk into the Executive
Mansion, a lady whose husband spent a
good deal of time denouncing the greed of men who made less for directing
some of the greatest enterprises in
America.17
Nevertheless, in spite of these defiances of all the amenities, all
the laws imposed by decency, all the traditional
proprieties and all that body of rules which highYDminded people impose
upon themselves, the Roosevelt family,
through a carefully cultivated propaganda technique not unlike that
which is applied to the sale of quack
medicines, imposed upon the American people the belief that they were
probably the most highYDminded beings
that ever lived in the White House. Behind this curtain of moral grandeur
they were able to carry on in the field
of public policy the most incredible programs which our people, unaccustomed
to this sort of thing, accepted
because they believed these plans came out of the minds of very noble
and righteous beings.
Why did the President permit his wife to carry on in this fantastic
manner and why did the Democratic leaders
allow her to do it without protest? ou may be sure that whenever you
behold a phenomenon of this character
there is a reason for it. The reason for it in this case was that Mrs.
Roosevelt was performing an important
service to her husband's political plans.
There were never enough people in the country belonging to the more
or less orthodox
Democratic fold to elect Mr. Roosevelt. It was necessary for him to
get the support of groups outside this
Democratic fold.
In the election of 1944,
Governor Dewey got nearly half a million votes more on the Republican
ticket than Roosevelt got on the
Democratic ticket, but Roosevelt was the candidate of two other parties
YD the American Labor Party of the
Communists and the Liberal Party which was a collection of parlor pinks,
technocrats, pious fascists and
American nonYDStalinist Communists. These two parties gave him over
800,000 votes and it was this that made
up his majority in New ork. The same thing was true in Illinois, in
New Jersey, Connecticut, Massachusetts,
and other large industrial states, although the fact was not so obvious
because the radicals operated inside the
Democratic party where they could not be so easily identified.
It was in this field that Mrs. Roosevelt performed her indispensable
services to the President. It was she who
fraternized with the Reds and the pinks, with the RedYDfascists and
the technocrats and the crackpot fringe
generally, gave them a sense of association with the White House, invited
their leaders and their pets to the
White House and to her apartment in New ork, went to their meetings,
endorsed their numerous front
organizations
Finally in 1899 when she was 15 years old she was sent to a school
called Allenwood, outside of London. It
was a French school kept by an old pedagogist named Madame Souvestre
who has taught Eleanor's aunt in
Paris before the FrancoYDPrussian war
After Roosevelt was stricken with infantile paralysis in 1921, she
suddenly found herself for the first time in her
life in a position approaching power on her own feet. While she, with
her rather stern sense of formal
responsibility, made every effort to bring about her husband's recovery,
she also saw the necessity of keeping
alive his interests in public affairs and his contacts and she set
herself about that job. She had already fallen
into acquaintance with leftYDwing labor agitators and she brought these
people as frequently as she could to her
imprisoned husband where they proceeded to work upon a mind practically
empty so far as labor and economic
problems were concerned. The moment a person of Mrs. Roosevelt's type
exposes herself to these infections,
the word gets around radical circles, whose denizens are quick to see
the possibilities in an instrument of this
kind. During Roosevelt's term in Albany she was extensively cultivated
by these groups, so that when she
went to Washington in 1933 they had easy and friendly access to her.
I think it must be said for her that at this point YD in 1933 YD the
country, including its public men, were not too well
informed about the peculiar perils involved in Red propaganda activities.
The Reds seized upon three or four
very popular American democratic cults YD (1) freedom of speech, (2)
the defense of the downtrodden laborer YD
the forgotten man, (3) the succor of the poor. They also began to penetrate
the colleges in both the teaching
staffs and the student bodies through their various front organizations
dominated by Reds. The first attempt to
expose these designs was made by the House Committee on UnYDAmerican
Activities. The attacks upon Martin
Dies and the Dies Committee, as it was known, were engineered and carried
out almost entirely by the
Communist Party. But the Communist Party itself was powerless to do
anything effective and it used some of
the most powerful and prominent persons in the country to do its dirty
work
{Does this not also apply to all other organizations/religions? -
sog}
oung Communist League and a group of workers including William W.
Hinckley
(Roosevelt/Cremac - Reagan/Brady -- 2 Hinkleys? - sog}
. Here
was the wife of the President of the United States, a separate department
of the government, using the White
House as a lobbying ground for a crowd of young Commies and Pinkies
against a committee of Congress.19
At this very moment, Joe Lash was living in the
White House as Mrs. Roosevelt's guest, while Joe Cadden and Abbot Simon
were occasional boarders there.
. Joe Lash had been the leader of the
movement in the American Student Union. Lash worked in collaboration
with the Communist Party. After this,
the American Student Union became a mere tool of the Red organization
in America.
the assembled
young philosophers gave the President and Mrs. Roosevelt a hearty Bronx
cheer. And now, of course, Mrs.
Roosevelt felt they were Communists, although she had rejected all
of the overwhelming evidence before that.
Booing the President suddenly turned them into Communists.
. A member of Congress, and
ardent New Dealer, visited the White House one morning. While there
he saw Abbot Simon of the national
board of the American outh Congress, come out of one of the bedrooms.
He couldn't believe his eyes. He
asked the White House usher if he was mistaken. The usher assured him
he was not, that this little Commie tool
had been occupying that room for two weeks and sleeping in the bed
Lincoln had slept in.
These are probably not more than 80,000 or 90,000 in number, if that.
But there are
several hundred thousand, perhaps half a million, men and women in
America, but chiefly in New ork and the
large eastern industrial states, who string along with the Communists
without being members of the party.
The President's father was a sixth generation Roosevelt who played
out decently
the role of a Hudson River squire. He was a dull, formal and respectable
person moving very narrowly within
the orbit set by custom for such a man. By 1900, however, the name
Roosevelt had become a good one for
promotional purposeyYYYY".Y~Y~^Y~SoY~Y~ Y-YYY~Y|Y~Y~cY~Y.Y*YDRY~YxYqY}Y~'YfY~YyY~Y~Yx
Y/Y,Y+Y~Y(AAAAYYYY EYEEIIIIDNOOOOYxOUUUYY~YaYY YaYYYYY
YYY Y
!YYY~Y$YY"YoYYvYmYY#YYypYs,
because it had become illustrious by reason of Theodore Roosevelt who
belonged to a
very different branch of the family.
On Franklin D. Roosevelt's mother's side there was certainly nothing
distinguished in the blood. Her father was
a crusty old China Sea trader and opium smuggler. The family had much
of its fortune in soft coal mines
Roosevelt was born and grew up in the midst of a baronial estate, surrounded
by numerous acres and many
servants and hemmed about with an elaborate seclusion. What sort of
boy he was we do not know, save that
he was carefully guarded from other boys and grew up without that kind
of boyhood association usual in
America.
The only books that really
interested him were books on the Navy, particularly old books such
as appeal to a collector. He did amass a
considerable library in this field. It is to be assumed he read many
of them. But the history of the Navy and its
battles is not the history of the United States or of Europe or of
their tremendous and complex political and
social movements.
They never elected anybody. They offered the nomination to young Roosevelt
and he took it reluctantly. But this was an auspicious year for the
New ork Democrats.
In 1912, with the Republicans split in the great TaftYDRoosevelt feud,
the Democrats swept the country and
Roosevelt, though in bed throughout the campaign with typhoid, was
reelected State Senator. When Wilson
entered the White House and someone suggested it would be a good idea
to have a Democratic Roosevelt in
the administration, Franklin Roosevelt was offered the post of Assistant
Secretary of the Navy,
When the First World War ended he was
36. Apparently his service in the Department was satisfactory, though
I have never seen anywhere any
authentic evidence about it one way or the other.
Actually he was not very well known and had absolutely no record of
his own to justify the
nomination. But luck dogged his heels.
{Luck/good fortune/auscpicious circumstances/ad infinitum - sog}
Then in August, 1921 Roosevelt was stricken with infantile paralysis,
which put an end to his career in politics
for the next seven years.
During his Harvard days, shortly after his marriage, he and his bride
took a trip to Europe YD a regular tourist's
wandering from city to city. He had not been in Europe since save twice
when he went as Assistant Secretary
during the war on a naval inspection tour for about a month, and at
the end of the war on another tour in
connection with the demobilization of naval forces in Europe.
et somehow his promotion managers whipped up the myth that he
possessed some kind of intimate and close knowledge of
Life up to this had been
a long succession of gifts from Lady Luck, whose attendance he had
come to think of as a settled and
dependable affair. And she had failed him. The visitation of the terrible
sickness had perhaps effaced from his
character the assumption of superior fortune that made him hold his
head so high
In his efforts at recovery he had gone to Warm
Springs, Ga., and spent several years there.
But Warm Springs became the subject of one of the most curious deals
in the nomination of a man to high
office
he said "one of the reasons he could not stand for governor was because
he had put a great deal
of his personal fortune into Warm Springs, and he felt he should stay
and manage the enterprise so that it
would eventually become a paying proposition."
"Confirming
my telephone message I wish much that I might consider the possibility
of running for governor." Roosevelt
then gave two reasons why he could not: (1) "our own record in New
ork is so clear that you will carry the
state no matter who is nominated" and (2) "My doctors are definite
that the continued improvement in my
condition is dependent on avoidance of a cold climate" and "daily exercise
in Warm Springs during the winter
months." He added: "As I am only 46 years old I owe it to my family
and myself to give the present constant
improvement a chance to continue ... I must therefore with great regret
confirm my decision not to accept the
nomination."31
{Roosevelt trying to 'back out' of his role as schill... -sog}
Mrs. Roosevelt was in Rochester as a member of the Women's Committee
for Al Smith. So were Ed Flynn and
John J. Raskob, recently named chairman of the National Democratic
Committee to manage Al Smith's campaign
for the presidency.
{...but Elanor is in deep. - sog}
But Flynn told Smith that he believed Roosevelt could be induced to
accept, that his health
treatments were not the real reason for his refusal, that the real
reason was the financial obligations he had
outstanding at Warm Springs, that he was facing a heavy personal loss
but that if this could be gotten out of
the way he might yield. Smith told Flynn to tell Roosevelt they would
take care of his financial problem. "I don't
know how the hell we can do it, but we'll do it some way," he said.32
Flynn suggested that the problem be put
up to Raskob. This was done. Smith asked Raskob to telephone Roosevelt.
Raskob thought it over but decided
to talk to Mrs. Roosevelt about it.
He asked Mrs. Roosevelt for
her frank opinion. She replied that if her husband were to say his
health would permit him to run then Raskob
could rely on it and that the real reason was the financial problem
at Warm Springs. Everybody got the
impression that Mrs. Roosevelt wanted her husband to run.
Raskob then asked him to say frankly
what they amounted to. Roosevelt replied: "Two hundred and fifty thousand
dollars." Raskob then brought the
whole matter to a head by saying: "All right. our nomination is important
in New ork State. I am in this fight
to get rid of Prohibition which I believe to be a terrible social curse
and I think the only way to do it is to elect
Al Smith. I am willing therefore to underwrite the whole sum of $250,000.
ou can take the nomination and
forget about these obligations. ou can have a fundYDraising effort
and if it falls short of the total I will make up
the difference." Roosevelt was a little flabbergasted at the offer.
{Elanor was not? - sog}
Roosevelt was built by propaganda, before the war on a small scale
and after the war upon an incredible scale,
into a wholly fictitious character YD a great magnanimous lover of the
world, a mighty statesman before whom
lesser rulers bowed in humility, a great thinker, a great orator YD
one of the greatest in history YD an enemy of evil
in all its forms.
In his first administration someone was responsible for a very effective
job of selling Roosevelt
to the public.
But over and above this some cunning techniques were industriously
used to
enhance the picture. For instance, Mrs. Roosevelt took over the job
of buttering the press and radio reporters
and commentators. They were hailed up to Hyde Park for hamburger and
hot dog picnics. They went swimming
in the pool with the Great Man. They were invited to the White House.
And, not to be overlooked, it was the
simplest thing in the world for them to find jobs in the New Deal for
the members of their families.
*** sog ***
The most powerful propaganda agencies yet conceived
by mankind are the radio and the moving pictures. Practically all of
the radio networks and all of the moving
picture companies moved into the great task of pouring upon the minds
of the American people daily YD indeed
hourly, ceaselessly YD the story of the greatest American who ever lived,
breathing fire and destruction against
his critics who were effectually silenced, while filling the pockets
of the people with billions of dollars of war
money. The radio was busy not only with commentators and news reporters,
but with crooners, actors, screen
stars, soap opera, comedians, fan dancers, monologists, putting over
on the American mind not only the
greatness of our Leader but the infamy of his critics, the nobility
of his glamorous objectives and the sinister
nature of the scurvy plots of his political enemies. The people were
sold first the proposition that Franklin D.
Roosevelt was the only man who could keep us out of war; second that
he was the only man who could fight
successfully the war which he alone could keep us out of; and finally
that he was the only man who was
capable of facing such leaders as Churchill and Stalin on equal terms
and above all the only man who could
cope successfully with the ruthless Stalin in the arrangements for
the postYDwar world.
*** sog ***
The ordinary man did not realize that Hitler and Mussolini were made
to seem as brave, as strong, as wise and
noble to the people of Germany and Italy as Roosevelt was seen here.
Hitler was not pictured to the people of
Germany as he was presented here. He was exhibited in noble proportions
and with most of those heroic
virtues which were attributed to Roosevelt here and to Mussolini in
Italy and, of course, to Stalin in Russia. I
do not compare Roosevelt to Hitler. I merely insist that the picture
of Roosevelt sold to our people and which
still lingers upon the screen of their imaginations was an utterly
false picture, was the work of false propaganda
and that, among the evils against which America must protect herself
one of the most destructive is the evil of
modern propaganda techniques applied to the problem of government.
{Eugenics was in vogue here, as well as Germany, and would have formed
the
science of the future *immediately* if Hitler had not been linked to
its 'final
outcome', giving it a bad name. - sog}
There
was really nothing complex about Roosevelt. He was of a wellYDknown
type found in every city and state in
political life. He is the wellYDborn, rich gentleman with a taste for
public life, its importance and honors, who finds
for himself a post in the most corrupt political machines, utters in
campaigns and interviews the most pious
platitudes about public virtue while getting his own dividends out
of public corruption one way or another.
e NRA Act
provided an appropriation of $3,300,000,000 which the President was
given to be spent for relief and recovery at
his own discretion. He now had in his hands a sum of money equal to
as much as the government had spent in
ten years outside the ordinary expenses of government. He decided how
it should be spent and where. If a
congressman or senator wanted an appropriation for his district, instead
of introducing a bill in Congress, he
went up to the White House with his hat in his hands and asked the
President for it. All over the country,
states, cities, counties, business organizations, institutions of all
sorts wanted projects of all kinds. Instead of
going to Congress they went to the President. After that congressmen
had to play along with the President or
they got very little or nothing for their districts. This was the secret
of the President's power, but it was also a
tremendous blow at a very fundamental principle of our government which
is designed to preserve the
independence of the Congress from the Executive.
In the same way, blankYDcheck legislation led to the subservience of
Congress and the rise of the bureaucracy.
Under our traditional system, Congress alone could pass laws. The executive
bureau merely enforced the law.
But now Congress began to pass laws that created large bureaus and
empowered those bureaus to make
"regulations" or "directives" within a wide area of authority. Under
a law like that the bureau became a
quasiYDlegislative body authorized by Congress to make regulations which
had the effect of law. This practice
grew until Washington was filled with a vast array of bureaus that
were making laws, enforcing them and
actually interpreting them through courts set up within the bureaus,
literally abolishing on a large scale within
that area the distinction between executive, legislative and judicial
processes.
Many of these bureaus were never even authorized by Congress. Even
the Comptroller General of the United
States, who audits the government's accounts, declared he had never
heard of some of them. They were
created by a new method which Roosevelt exploited. Instead of asking
Congress to pass a law, set up a bureau
and appropriate money, the President merely named a group of men who
were authorized by him to organize a
corporation under the laws of the states. This done, there was a government
corporation instead of a bureau
and a group of corporation directors instead of commissioners. The
Reconstruction Finance Corporation was
given a blanket appropriation by Congress and authority to borrow money.
It borrowed twenty or more billions.
The RFC would buy the stock of a new corporation and lend it money
YD ten, fifty or a hundred million, billions in
some cases. Thus the President bypassed Congress and the Constitution
and engaged in activities as
completely unconstitutional as the imagination can conceive, such as
operating business enterprises in Mexico
and Canada. By means of the blankYDcheck appropriations, the blankYDcheck
legislation and the government
corporation, there is no power forbidden to the government by the Constitution
which it cannot successfully
seize. And if these techniques are permitted to continue the Constitution
will be destroyed and our system of
government changed utterly without a vote of the people or any amendment
to the Constitution. Roosevelt by
his various hit or miss experiments all designed to get power into
his hands, prepared a perfect blueprint for
some future dictator of the modern school to usurp without very much
difficulty all the powers he needs to
operate a firstYDclass despotism in America.
Having changed the Neutrality Act, given a million army rifles to England
and increased the army to 1,500,000,
the President took the next step YD he handed over to Britain 50 destroyers
belonging to the American navy
without authority of Congress. Those men and women who formed the various
committees to induce this
country to go into the war approved these moves. They were honest about
it and logical, because they were
saying openly we should give every aid, even at the risk of war. But
the President was saying he was opposed
to going to war and that he was doing these things to stay out of war.
I do not here criticize his doing these
things. I criticize the reason he gave, which was the very opposite
of the truth. At the time he did these things,
83 per cent of the people month after month were registering their
opposition to getting in the war.
After the 1940 election, in fact early in 1941, the President's next
decision was the LendYDLease proposal. Senator
Burton K. Wheeler declared that this was a measure to enable the President
to fight an undeclared war on
Germany.
The truth is that the President had made up his mind to go into the
war as early as October, 1940. To believe
differently is to write him, our naval chiefs of staff and all our
high military and naval officers down as fools.
The answer must be that Roosevelt lied to the people for their own
good. And if
Roosevelt had the right to do this, to whom is the right denied? At
what point are we to cease to demand that
our leaders deal honestly and truthfully with us?
There must be a thorough philosophical inquiry into the limits within
which this convenient discursive weapon
can be used. It has been generally supposed that our diplomats are
free to lie to foreign diplomats, also that in
war and on the way into war we are free to lie ad libitum to the enemy.
The right of the President YD and maybe
certain lesser dignitaries YD to lie to our own people and, perhaps,
in certain defined situations, to each other
ought to be explored and settled. Thus it may be used impartially by
the representatives of all parties. It does
not seem fair to limit the right of lying only to good and truthful
men.
(TruthMonger Lives!!! - sog}
President and the
Prime Minister issued what they called a Joint Declaration. The most
important parts of that document were the
first three paragraphs:
"First, their countries seek no aggrandizement, territorial or otherwise.
"Second, they desire to see no territorial changes that do not accord
with the freely expressed desires of the
peoples concerned.
"Third, they respect the right of all peoples to choose the form of
government under which they will live and
they wish to see sovereign rights and selfYDgovernment restored to those
who have been forcibly deprived of
them."
From lreed at west.cscwc.pima.edu Mon Jul 27 00:13:56 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 27 Jul 1998 00:13:56 -0700 (PDT)
Subject: FDR3
Message-ID: <009C9C7C.2368A280.7@west.cscwc.pima.edu>
There was no reason for meeting at sea save
the purely spectacular features which Roosevelt always loved. The dramatic
effect of the meeting was very
great. It made a thunderous radio story and massive headlines. But,
as was so characteristic of Roosevelt, the
great declaration of principles was a mere incident of the meeting.
The purpose was wholly military.
Three weeks after Pearl Harbor, Roosevelt sent for all the representatives
in America of these occupied
countries and said to them:
"Be assured, gentlemen, that the restoration of the countries occupied
by Germany and suffering under the
Axis yoke is my greatest concern, which is shared in like degree by
Mr. Churchill. We promise that all will be
done to insure the independence of these countries."
Churchill was present. He turned to the Polish Ambassador and said:
"We will never forget what glorious Poland has done and is doing nor
what heroic Greece and Holland have
done in this war. I hope I need not add that Great Britain has set
herself the aim of restoring full independence
and freedom to the nations that have been overrun by Hitler."
These reassurances were to be repeated many times with varying oratorical
flourishes. And as for the "Atlantic
Charter," which was nothing more than a screen to hide what had actually
been done at Placentia Bay, a
handsome copy of it was made, bearing the names of Churchill and Roosevelt,
and placed on exhibition in the
National Museum in Washington, where crowds viewed it with reverence
as one of the great documents of
history.
. On November 27, just ten
days before the attack, the President told Secretary Stimson, who wrote
it in his diary, that our course was to
maneuver the Japanese into attacking us. This would put us into the
war and solve his problem.
The Board of Economic Warfare was created to control the export of
all materials seeking private
export and to look after the procurement of all materials essential
to the war effort, except arms and munitions.
Vice President Wallace was named chairman of the Board of Economic
Warfare (BEW).
There was an element of "cloak and dagger" in this institution. It
was at war with Hitler and Hirohito in the
markets of the world. It bought things we needed. But it also bought,
where necessary, things we did not need
in order to preclude the enemy getting them. This was called "preclusive"
buying. It issued thousands of
export licenses every day. It was quite a bureau and it bulged with
bureaucrats. At the top, next to Wallace,
was a somewhat cheaper edition of Wallace YD an authentic New Deal bureaucrat,
if there ever was one. He was
Milo Perkins, executive director.
Perkins was a man with a soul YD one of
those souls that keeps making a lot of noise inside his body. He went
in for art and music and finally
Theosophy. The New Republic said of him that "for nine years at nine
every Sunday morning, he donned his
priestly robes, took along his sons and acolytes and preached to a
congregation of fifty people."
By 1943 the BEW had 200 economic commandos in the field fighting Hitler
in the market places of the world and
around 3,000 in Washington directing their weird operations
Although this outfit spent $1,200,000,000, no law ever authorized it,
and the Senate never confirmed the
appointment of Wallace or Perkins. The President "grabbed the torch"
and created it by edict.
Of course, a great legion of economic soldiers had to have a chief
economist. How they picked him I do not
know. But these two great geopolitical warriors YD Wallace and Perkins
YD came up with a gentleman named Dr.
Maurice Parmalee, born in Constantinople.
Parmalee wrote another book labeled "Bolshevism, Fascism and the Liberal
Democratic State." In this
he renders it feasible to introduce a planned social economy much more
rapidly than has been the case in the
U.S.S.R. ...The superficial paraphernalia of capitalism can be dispensed
with more quickly than in the Soviet
Union." But the doctor had strayed into much lighter fields of literature.
He had also written a book called
"Nudism in Modern Life" which is secluded in the obscene section of
the Library of Congress. In it the doctor
revealed his interest in a science called Gymnosophy, a cult of the
old gymnosophists who it seems were
ancient Hindu hermit philosophers who went around with little or no
clothing.
"these gymnosophist nudist colonies furnish excellent opportunities
for experiments
along socialist lines ... Customary nudity is impossible under existing
undemocratic, social and economic and
political organization."
A new chief economist was brought in YD Dr. John Bovingdon.
Bovingdon was no fool. He went to Harvard and graduated with honors,
which is more than Mr. Roosevelt did.
But he, too, was one of those free spirits of the wandering winds who
had managed to live for a while in the
Orient, three years in Europe and England, two years in Russia and
for smaller terms in 22 other countries. His
Harvard class reunion book said he "engaged in art activities, painting
on fabrics, poetry, dancing, acting,
consultant on the Moscow Art Theater, oneYDman commercial monodrama
programs, weaving, sandalYDmaking"
and so on. In 1931 the police in Los Angeles raided a Red pageant for
a Lenin Memorial which Bovingdon was
staging. The experience shook Mr. Bovingdon terribly and he went to
Russia. He got a job in Moscow as a
director of the International Theatre. He worked as a journalist in
the world of free Russian speech, wrote radio
scripts and plays. He decided to return to the United States to make
us understand Russia.
In January, 1938, he appeared in Long Beach,
California, at the town's first "Communist Party celebration on the
14th anniversary of Lenin's death."
By what curious movement of the stars did these weird ideological brothers
turn up on posts of the
greatest importance in the councils of the New Deal? As fast as one
was pushed out another moved in. It could
not be by chance, since this happened in practically every important
bureau.
{Can you say 'conspiracy?...sure you can... - sog}
These two strange birds were not isolated cases. The UnYDAmerican Activities
Committee gave Wallace a list of
35 Communists in the BEW. That information was merely brushed aside
with some insulting smear against the
Committee.
It mattered not what the New Dealer touched, it became a torch to be
grabbed, it became an instrument for use
in his adventures in social engineering, and after June, 1941 when
Hitler turned on his partner Stalin, these
bureaus became roosting places for droves of Communist termites who
utilized their positions as far as they
dared to advance the interests of Soviet Russia and to help "dispense
with the superficial paraphernalia of
capitalism" in this country under cover of the war.
By no means a basically bad person, he was
congenitally incapable of resisting the destructive personal effects
of power.
*** sog ***
>From the four corners of the land, as well as from the pink and Red
purlieus of New ork and Chicago and
every big city, came the molders of the Brave New World.
*** sog ***
They put their busy fingers into everything. They dictated women's
styles, the shapes of women's stockings;
they told butchers how to carve a roast; they limited the length of
Santa Claus' whiskers in department stores.
At one time there was an almost complete breakdown of food distribution
throughout the United States. The
paper work required of an ordinary small merchant was so extensive
that it was practically impossible to comply
with.
These rules and regulations became so irksome that people ignored them.
Then the OPA set up a nationwide
network of courts before which citizens could be hauled up and tried
for breaking laws enacted by OPA
bureaucrats. If convicted, they could, under OPA rulings, have their
ration cards taken away from them YD
sentenced to starve.
One may talk about the profits of war, but there were in truth
little profits for honest men because the government YD and rightly
YD during the war drained away in drastic taxes
most of the profits.
In the financing and supervision of the war effort from
Washington practically every fiscal crime was committed. And the plain
evidence of that is before us in the bill
for the war. Few realize how vast it was. For the mind, even of the
trained financier, begins to lose its capacity
for proportion after the figures pass beyond the limit of understandable
billions. The war cost I reckon at 363
billion dollars.
Chapter Eight - The Thought Police
1.
If there is one department of human struggle which the radical revolutionist
understands and loves it is the war
that is waged on the mass mind; the war that is carried on with poisons
distilled in the mind to produce bias
and hatred. It would be strange indeed if we did not find some of the
practitioners of this dark art from New
ork and some of the offYDscourings of Europe's battered revolutionary
emigres numerously entrenched in that
thoroughly unYDAmerican institution during the war which was known as
the OWI YD the Office of War
Information.
It began with a thing called the Office of Facts and Figures.
a drove of writers and journalists whose souls were enlisted in the
great crusade to bring on the Brave
New World of the Future. It was in fact an agency for selling Roosevelt's
Third New Deal and Roosevelt
himself to the people under the guise of "maintaining public morale"
and conducting "psychological warfare."
, OWI spent $68,000,000 and had 5,561
agents scattered all over the world.
But OWI had other tasks than selling America to the Arabs. It was also
busy selling Russia to the Americans.
The chief of the Foreign Language Section of OWI was a young gentleman
28 years old who had spent his
entire life on New ork's East Side, who spoke no foreign language
and yet had the decision on whether news
should be released to Europe or not. Anybody who disagreed with his
high admiration for our Soviet ally was
labeled a fascist. There was another child wonder YD 23 years old YD
who was the Russian expert of the OWI and
who saw to it that nothing went out that was displeasing to the objectives
of our noble ally YD including
grabbing ugoslavia. OWI's broadcasts to Poland ended not with the
Polish national anthem but with a song
adopted by the Polish emigres in Moscow who were known as Stalin's
"Committee of Liberation." The expert in
charge of the Polish section was actually born in Poland, but left
there and spent the rest of his life in France
where he was notorious as a Communist. He fraternized with the Vichy
government while Hitler and Stalin were
pals, but when Hitler invaded Russia he came to America and quickly
became OWI's expert in explaining
American democracy to the people of Poland.51
The deputy director of the Pacific and Far Eastern Area was a British
subject until he got a government job in
Washington in 1942. While running this important bureau for OWI, he
wrote a play which was produced at
Hunter College. Burton Rascoe, reviewing it, said: "Its most conspicuous
purpose is to idealize the Red Army
in China, to defame the Chungking government under Chiang KaiYDshek
and to ridicule the political, social and
educational ideas of the vast majority of the American people."52
The men, material, cable and wireless time used up by OWI were immense.
It ran 350 daily radio programs and
had a daily cableYDwireless output of 100,000 words. It was the world's
largest pamphlet and magazine publisher
and a big movie producer, sending shorts to every country in the world.
It sent out 3,500 transcribed
recordings a month and turned out 50 movie shorts a year. The content
of most of this material was pure drivel.
All of this work was not just naive. OWI printed 2,500,000 pamphlets
called "The Negro in the War,"54 with
pictures of Mr. and Mrs. Roosevelt, the Negroes' friends, in preparation
for the fourthYDterm campaign. It printed
a handsome volume called "Handbook of the United States"55 and gave
a British firm the right to publish it.
This gave a history of America, with the story from Leif Ericson's
discovery up to 1932 in four and oneYDhalf
pages. The rest of the history was devoted to Roosevelt and his New
Deal. This was in 1944 and a national
election was coming and England was jammed with American soldiers who
could vote.
It had a department that supplied the pulp paper magazines with direction
and suggestions on how to slant
mystery and love stories. Western story writers were told how to emphasize
the heroism of our allies YD you
know which one. Writers were told to cast their soap operas with silent,
dogged Britons, faithful Chinese and
honest Latins. They must portray Japanese as having set out to seize
our Western seaboard and the sly and
treacherous characteristics of the Jap must be contrasted with the
faithfulness of the Chinese. They suggested
that Sax Rohmer's Fu Manchu be turned into a Jap instead of a Chinese.
When the war began the government, recognizing the need for protecting
our military operations from leaks
through careless or uninformed press reporting, organized the Office
of Censorship headed by Byron Price, an
able official of the Associated Press. To this bureau was given the
power to monitor all communications. It set
up a censorship organization which all publishers and broadcasters
voluntarily cooperated with. It worked
admirably and Mr. Price won the unstinted approval of the press for
his capable and tactful, yet firm, handling
of this difficult problem. No other government agency had any authority
whatever to engage in this activity.
And it was never intended that anybody should have the power to attempt
to interfere with the rights of
citizens to discuss with freedom all political questions, subject only
to the obligation not to divulge information
that would aid the enemy or defeat our military operations.
Nevertheless, the OWI and Federal Communications Commission (FCC) took
upon themselves the power to
carry on the most extensive propaganda among, and the most dangerous
interference with, the
foreignYDlanguage broadcasting stations. Of course the ordinary American
official was hardly aware of the
opportunities this kind of thing gave to those who had political or
ideological axes to grind.
It was important to see that nothing subversive and nothing that would
adversely affect the war effort
was used. And for this purpose the Office of Censorship was admirably
equipped and managed. But the FCC
decided that it would take a hand, not merely in monitoring the stations
but in literally directing and controlling
them. The OWI similarly arrived at the same conclusion. It also set
up a division for dealing with the problems
of the foreignYDborn through radio.
Mr. Eugene L. Garey, chief counsel of the Congressional Select Committee
Investigating the FCC, speaking of
these conditions said:
"From the record thus far made it appears that, in one foreign language
broadcasting station in New ork City,
the program director, the announcer, the script writer, the censor,
and the monitor of the ItalianYDlanguage
programs are all aliens or persons owing their positions to the Office
of War Information, with the approval of
the FCC.
"The situation thus portrayed is not peculiar to this single station,
or to this one city. Information in our
possession indicates that the same situation prevails generally in
the foreign language stations throughout the
country. Every such key position in each of the three radio stations
presently under investigation are found to
be similarly staffed. These staffs select the news, edit the script,
and announce the program. The program, in
turn, is censored by them, monitored by them, and is presented under
the direction of a program director of
similar character.
"From these apparently unrelated facts the picture must be further
developed.
"OWI had the men and the material. It had the proper dye to color the
news. It also had the desire to select and
censor the news. What it lacked was the power, or perhaps more accurately
stated, even the color of power, to
carry their designs into effect. Hence the need to enlist the Federal
Communications Commission in its purpose.
"True it is that the Federal Communications Commission had no such
lawful power, but the Federal
Communications Commission did have the power to license and hence the
power to compel obedience to its
directions. The record now shows their unlawful use of this power.
"Working together in a common purpose, the Federal Communications Commission
and the Office of War
Information have accomplished a result that compels pause YD and presents
the solemn question of 'Whither are
we going?'
"A division called the War Problems Division was created by the Federal
Communications Commission, and a
staff of attorneys began to function.
"This division was not a regulatory body. It was not formed to instruct,
or supervise, or to correct. It was
formed for the avowed purpose of unlawfully liquidating all of the
radio personnel in the foreignYDlanguage field
that did not meet with its favor. A real gestapo was created and a
lawless enterprise was launched.
"It is suggested that we accept this unlawful situation as a benevolent
expedient of the moment, but no such
purpose as we find here disclosed, however benevolently cloaked, can
justify the practices we find. All tyranny
begins under the guise of benevolence.
"The voices of these aliens go into our homes, and the unwary are led
to believe that they speak with authority
and official approval. They even censor our Christmas and Easter religious
programs, and tell us what music we
may hear. The FCC is alarmed about whether we will react properly to
news furnished by our national news
agencies. Apparently we can still read the news in our press, but we
can only hear what these aliens permit us
to. What next medium of communications will receive the benevolent
attention of these misguided zealots?
Obviously, the press.
"These interpreters of our national policy YD these slanters of our
news YD these destroyers of free speech YD are
alien in birth, alien in education, alien in training and in thought.
"And still these are the people who are permitted to mold our thoughts
YD to tell us what America's war aims and
purposes are. These people are in position to color, to delete, or
to slant, as they see fit, in accordance with
their own peculiar alien views and ideologies.
"Persons are being accused of being proYDfascist, and that without proof
and without trial. Persons suspected of
being proYDfascist, and without proof, have been removed from the air
and replaced by wearers of the Black Shirt
...
"If the radio can thus be controlled in August, 1943, there is nothing
to prevent the same control from slanting
our political news and nothing to prevent the coloring of our war aims
and purposes when peace comes."57
In the presence of a government which had enlarged its power over the
lives and the thoughts and opinions of
citizens and which did not hesitate to use that power, the whole citizenry
was intimidated. Editors, writers,
commentators were intimidated. Men whose opinions did not conform to
the reigning philosophy were driven
from the air, from magazines and newspapers. While American citizens
who were moved by a deep and
unselfish devotion to the ideals of this Republic YD however wrongYDheaded
that may be in the light of the new
modes of "freedom" YD were forced into silence, the most blatant and
disruptive revolutionary lovers of the
systems of both fascism and Communism and that illegitimate offspring
of both YD Red fascism YD were lording it
over our minds.
All this was possible for one reason and one reason only YD because
the President of the United States
countenanced these things, encouraged them and in many cases sponsored
them, not because he was a
Communist or fascist or held definitely to any political system, but
because at the moment they contributed to
his own ambitions.
When a nation is at war, its leaders are compelled by the necessities
of practical administration to use every
means at hand to sell the war to the people who must fight it and pay
for it. As part of that job it is usual to
include the leader himself in the package. He is therefore portrayed
in heroic proportions and colors in order to
command for his leadership the fullest measure of unity. War, as we
have seen, puts into the hands of a leader
control over the instruments of propaganda and opinion on an everYDincreasing
scale. In our day the press, the
radio, the movies, even the schoolroom and the pulpit are mobilized
to justify the war, to magnify the leader and
to intimidate his critics. The citizen who is hardy enough to question
the official version of the leader and his
policies may find himself labeled as a public enemy or even as a traitor.
Hence as the war proceeds, amidst all
the trappings which the art of theater can contribute, it is possible
to build up a vast fraud, with an
everYDmounting torrent of false news, false pictures, false eulogies
and false history. After every war many years
are required to reduce its great figures to their just proportions
and to bring the whole pretentious legend back
into focus with truth.
the public was treated to the royal spectacles off the coast
of Newfoundland aboard the Augusta, at Quebec, Casablanca, Moscow,
Cairo, Teheran and finally at alta.
Eloquent communiques pretended to inform the people of what had been
agreed on.
We now know that these communiques told us little of what had happened;
that the whole story lay, for long,
behind a great curtain of secrecy; that much YD though not all YD has
now been painfully brought to light and that
what stands revealed is a story very different from that heroic chronicle
of triumphs with which we were regaled
at the time.
As Roosevelt saw it, Stalin was his great target. He began by completely
deceiving himself about Stalin. First of
all, he decided he must cultivate Stalin's good will and to do this
he convinced himself he must sell Stalin to our
people. Accordingly the instruments of propaganda which he could influence
YD the radio and the movies and to
a considerable degree, the press YD were set to work upon the great
task.
Under the influence of this benevolent atmosphere the Reds in New ork
and their compliant dupes, the
fellowYDtravelers, swarmed into Washington and presently were sitting
in positions of power or influence in the
policyYDmaking sections of the government. Joe Davies had been induced
to go to Moscow, wrote his notorious
"Mission to Moscow," a jumble of obvious fictions which were later
transferred to the screen several times
exaggerated and shot into millions of minds in movie houses.
We know now from the election returns
of 1944 that the Reds had in their hands enough support to have turned
the tide against Roosevelt. In New
ork State, for instance, Roosevelt won its 47 electoral votes by a
majority of 317,000. But he got 825,000 votes
from the Red American Labor Party dominated by the Communists, which
had also nominated him, and the
American Liberal Party made up of the pinks, which also nominated him.
Without these votes he would have
lost the state. He dared not defy these two powerful groups. On the
other hand, he was in a very deep hole
with the votes of the Polish, Lithuanian, Serbian and other Baltic
and Balkan peoples living in America who
were citizens. He had betrayed the Poles, the Serbs and the Baltic
peoples. But he had managed to keep it dark.
Somehow he must avoid any publication of the truth until after the
election.
They made a decision at Quebec which has up to this moment paralyzed
utterly the
making of a stable peace in Europe and is pregnant with consequences
so terrible for the future that the mind
draws away from them in consternation.
Secretary Hull said: "This was a plan of blind vengeance ... It failed
to see that in striking at Germany it was
striking at all Europe." The proposals "that the mines be ruined was
almost breathtaking in its implications for
all Europe."
Beyond all this, of course, was our dignity as a civilized
people. The barbarians could sweep into enemy countries and ravage
their fields, burn their cities and murder
their leaders. This is a job from which a civilized people must recoil
if they have not lost their souls.
Roosevelt agreed to the Morgenthau Plan to destroy German industry
and to reduce Germany to a country
primarily agricultural and pastoral. Secretaries Hull and Stimson did
not know anything about it until four days
after it was done.
e the contents of the Morgenthau Plan leaked to the papers and
Roosevelt became alarmed at the violence of the reaction, a fine evidence
of the fundamentally decent nature of
the majority of Americans.
In the end the President was persuaded to get out of this appalling
agreement so far as destroying the mines of
the Ruhr were concerned. But Stimson declares "the same attitude remained,"
and the whole world now knows
of the frightful wreckage that was carried on in Germany and the blow
to the economy of all Europe that was
delivered in the name of "blind vengeance" and immortal hatred.
The administration was now the hopeless prisoner of these demanding
and ruthless radical labor
leaders, who had shown their ability to elect or defeat the Democratic
party, who had filled all the departments
and bureaus with their agents and who had insinuated their experts
into the CIO labor unions and their
propagandists into the radio, the movies and all the great instruments
of communication and opinion YD a fact
which Mr. Roosevelt's successors would have to face when the war ended.
What had become of the Atlantic Charter? On December 20, 1944, the
President at a press conference was
asked about the Charter which he and Churchill had signed. His reply
literally bowled over the correspondents.
There was not and never had been a complete Atlantic Charter signed
by him and Churchill, he replied. Then
where is the Charter now, he was asked. He replied: "There wasn't any
copy of the Atlantic Charter so far as I
know." It was just a press release. It was scribbled on a piece of
paper by him and Churchill and Sumner Welles
and Sir Alexander Cadogan. It was just handed to the radio operator
aboard the British and American warships
to put on the air as a news release. Further inquiry revealed that
Stephen Early had handed it out on his own
with the signatures of Churchill and Roosevelt attached. And over on
the wall of the National Museum in
Washington, beautifully framed and illuminated after the manner of
an ancient document YD like Magna Carta or
the Declaration of Independence YD was the great Atlantic Charter itself,
with the signatures of Roosevelt and
Churchill. Daily visitors stood before it as before some great historic
document. John O'Donnell, of the New
ork Daily News, asked the curator where he got it. He answered that
it came from the Office of War
Information. They had "loaned" the precious document to the National
Museum. By inquiry at the OWI YD that
prolific fountain of phony news YD O'Donnell learned that OWI had gotten
it up and affixed the names of
Roosevelt and Churchill. They had printed 240,000 copies of it. O'Donnell
went back to the Museum with this
information. And lo! the great Charter was gone. An attendant told
him it had been ordered off the wall twenty
minutes before. Thus ended the story of this wretched fraud. The fake
document which was never signed and
was nothing more than a publicity stunt to conceal the real purposes
of the Atlantic meeting had been slain by
its chief sponsor and, of course, all its highYDsounding professions,
after Teheran, had become as sounding
brass or a tinkling cymbal.
On January 20, 1945, Roosevelt was sworn in as President of the United
States for a fourth term. Three days
later he left Norfolk on the heavy cruiser Quincy for what was to be
his last act in the hapless drama of peace.
From lreed at west.cscwc.pima.edu Mon Jul 27 00:14:27 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 27 Jul 1998 00:14:27 -0700 (PDT)
Subject: FDR4
Message-ID: <009C9C7C.37572C80.9@west.cscwc.pima.edu>
The Polish question was "settled." The formal proposal to hand over
eastern Poland YD east of the Curzon line YD
was made by Roosevelt himself.102 As to western Poland, Stalin already
had a government there named by him
and composed of Communists representing no one but Stalin himself.
Russia wanted the amount to be 20 billion dollars of which she would
take half. It
was agreed that labor might be taken as a possible source of reparations.
This was just a diplomatic way of
authorizing the seizure of human beings to work as slaves after the
war ended and is the basis of that dreadful
crime perpetrated after hostilities ceased to which the President of
the United States agreed.
As the conference ended, Roosevelt remained an extra day because Stalin
wanted to talk with him. He did so
alone. What he wanted settled was "the political aspects of Russia's
participation" in the Pacific. This he was
able to do very quickly and to his complete satisfaction. In return
for Russian participation in the Pacific,
Roosevelt agreed that the Kuriles Islands would be handed to Russia,
who would also get Sakhalin Island,
internationalization of the Port of Darien, the lease of Port Arthur
as a naval base and joint operation with China
of the Eastern and Southern Manchurian railroads. And Roosevelt promised
to use his influence with Chiang
to force him to agree. This secret agreement, like the one supporting
the use of slave labor, was not made
public and was concealed even from Byrnes who was Roosevelt's adviser
at alta. He did not hear of it until
after Mr. Roosevelt's death. Then he saw a reference to it in a Russian
dispatch. By that time he was Secretary
of State. He asked President Truman to have the White House records
searched for this and any other secret
outstanding I.O.U.'s.105
He did
suggest that to avoid criticism at home the United States be given
three votes too. And Stalin agreed. When
Byrnes got back to the United States he found a note from Roosevelt
instructing him not to discuss this
agreement even in private. Later Roosevelt decided not to ask for the
three votes for the United States. Byrnes
says he never discovered the reason.106
On the way home
General Watson, his military secretary, died suddenly of heart disease.
Roosevelt reached Washington the end
of February. On March 1 he appeared before a joint session of Congress.
He told the Congress that "more than
ever before the major allies are closely united," that "the ideal of
lasting peace will become a reality." There was
no hint that the surrender which was now formally announced with respect
to eastern Poland was in fact a
major defeat. The disappearance of the Baltic states and practically
all the Balkans behind Stalin's iron curtain
was not announced in any other terms than as a great forward step in
the liberation of Europe. As for western
Poland, there were heavy overtones of guilt and frustration unintentionally
evident.
In two months Roosevelt was dead. Truman became President. Shortly
after, in May, the German Army
surrendered. The fighting was in the West was over.
"Silent, mournful, broken Czechoslovakia recedes into the darkness.
She
has suffered in every respect by her association with the Western democracies."
Chamberlain appeased Hitler
and averted war. Churchill got for England both a war and appeasement.
Stalin had merely to sit tight, to make known
his wishes and Roosevelt laid them in his lap with eager compliance
in the notion that he could thus soften
Stalin. It is all the more incredible when we remember that the things
he was laying in Stalin's lap were the
existence of little nations and the rights of little peoples we had
sworn to defend. And when Truman and
Byrnes went to Potsdam what confronted them was an appalling mess.
Roosevelt not only made agreements secret from the people but secret
from his
closest advisers in the government. He made agreements with Stalin
hostile to the objectives of Churchill and
kept secret from Churchill. He made secret agreements with Chiang KaiYDshek,
secret from both Churchill and
Stalin, and secret agreements in derogation of Chiang KaiYDshek's interests
without his knowledge. And he made
many secret agreements which no one in our State Department knew about
until his death and then learned
about them the hard way, by having them flung in their faces at embarrassing
moments by Molotov.
At the end of all this, Russia held in her hands a vast belt of land
running from the Baltic sea in the north to the
Black Sea in the south, comprising eleven nations with a population
of 100 million people. These she held, not
as parts of the Soviet Union, but as puppet states, presided over by
Red Quislings of Stalin's own selection
who represented him and not the people they governed, any more than
Quisling represented the people of
Norway.
The truth is that Roosevelt was a dying man when he was elected, that
many of those around him knew it, that
the most elaborate care was exercised to conceal the fact from the
people and that the misgivings of those who
observed it were justified by events, since he died less than three
months after his fourth inauguration. The
progress of that illness and the means employed to deceive the people
must be examined.
Rear Admiral Ross T. McIntire, his official physician, felt called
upon to put in a book his formal apologia.
He was a naval officer employed by the people to watch
over the President's health and these statements had the effect of
deceiving the employers of the President and
of the Admiral YD namely the people.
What disease Roosevelt suffered from at Hyde Park and later, that produced
such grave consequences, we do
not know save upon the statements of Dr. McIntire. Many other doctors
were called in to examine the patient,
but none of these men has ever made any statements. However, while
the illness seemingly began at Hyde Park
after the return from Teheran, there is at least some evidence that
he was far from sound before that time. Three
men have written about the trip to Cairo and Teheran YD Dr. McIntire,
Mike Reilly, chief of the President's Secret
Service guard, and Elliott Roosevelt. The President went to Cairo by
sea. But he wanted to fly from there to
Teheran. Reilly tells us that Admiral McIntire "did not want to submit
some of the members of the party to the
rigors of high altitude flight" but that "the President was not one
of these members."112 And McIntire
volunteers the information that Roosevelt suffered no discomfort on
high altitude flights and had shown no
signs of anoxemia when flying at altitudes of 10,000 to 12,000 feet.113
ou might suppose from this Roosevelt
was quite a flier. et he had never been in a plane since he flew to
Chicago for his first acceptance speech 11
years before until he made the trip to Casablanca YD his only flight
while President before Teheran. However,
Elliott Roosevelt in his book defeats these yarns. He tells how McIntire
was worried about Father's projected
flight. "I'm serious, Elliott," says McIntire. "I think he could fly
only as far as Basra and then go on by train."
Elliott wanted to know what height his father might fly, to which McIntire
replied: "Nothing over 7500 feet YD and
that's tops."114
Elliott talked to the President's proposed pilot, Major Otis Bryan
who, with Mike Reilly, made an inspection
flight from Teheran to Basra and back and reported that the trip could
be made without going higher than 7000
feet, which, says Elliott, "pleased Father very much."115 Thus McIntire
and Reilly are both caught redYDhanded
misleading their readers. This was before Teheran.
Elliott talked to the President's proposed pilot, Major Otis Bryan
who, with Mike Reilly, made an inspection
flight from Teheran to Basra and back and reported that the trip could
be made without going higher than 7000
feet, which, says Elliott, "pleased Father very much."115 Thus McIntire
and Reilly are both caught redYDhanded
misleading their readers. This was before Teheran.
Whatever malady struck Roosevelt down at Hyde Park in December and
kept him pretty much out of circulation
until nearly the middle of May, 1944, we know that McIntire at that
time caused a heart specialist from Boston
to be inducted into the service to remain continuously at Roosevelt's
side and that this heart specialist, Dr.
Howard Bruenn, said a year later at Warm Springs that he "never let
Roosevelt out of his sight," which is a
most unusual performance in the case of a patient whose "stout heart
never failed him," as Dr. McIntire puts it
A great mystery surrounded this illness.
. He was dying slowly at first, rapidly later. And at his side as his
chief adviser was
another dying man YD Harry Hopkins. Hopkins had had a portion of his
stomach removed for ulcers and what
was known as a gastroYDenterotomy performed. After this his liver troubled
him and the gall bladder failed to
supply satisfactorily the essential bile necessary to digestion.
These two dying men, floating slowly out of life, were deliberately
put into power through a fourthYDterm election by a carefully arranged
deception practiced upon the American
people and upon some, at least, of the party leaders. Here was a crime
committed against a great nation which
had made tremendous sacrifices and against the peace and security of
the world in a moment of the gravest
danger. History will pronounce its verdict upon all who were guilty.
Dr. McIntire was immediately notified of the stroke in
Washington and he, Mrs. Roosevelt and Steve Early left at once by plane
for Warm Springs, arriving there at
11 P.M. They immediately decided to have no autopsy. The body was consigned
to its coffin and orders issued
not to open it. It was taken from Warm Springs next morning at 9 o'clock.
It reached Washington next day YD the
14th YD and after lying for a few hours without ever being opened was
taken that night to Hyde Park for
interment next day. It has been the custom in the past for the remains
of deceased Presidents to lie in state in
the Capitol. This was not done.
Present in the cottage when the President was stricken were the artist,
Mrs.
Schoumantoff, who was painting his portrait, his two cousins, his valet
and several others. The artist, a
Russian, was ordered to leave at once. She took a train without delay
and was not located until two days later
at Locust Valley, L.I.
At St. Helena the British government provided its illustrious
prisoner, Napoleon I, with a physician. He was Dr. Francesco Antomarchi,
a Corsican, who however, did not
seem particularly fond of his fallen countryman and who failed signally
to win Napoleon's confidence. Dr.
Antomarchi persisted to the end in the belief that his royal patient
was not seriously ill. Napoleon convinced
himself that his physician did not know what he was doing and that
the medicines he was prescribing were
actually injuring him. Napoleon watched his chance and when the doctor's
back was turned, handed the mixture
just prepared for him to an aide who swallowed it and was immediately
taken with a violent internal disturbance.
The Emperor denounced Antomarchi as an assassin. Dr. MacLaurin,126
who has written interestingly of this
case, observes that from the symptoms now known to be present and even
in the then state of medical
knowledge at that period, the veriest blockhead would have known that
the Emperor was seriously ill.
Napoleon died shortly after the incident described above of cancer
of the stomach. In this case, instead of
passing up the autopsy, Antomarchi performed one himself in order to
prove that there were no symptoms
present to inform him of the presence of cancer and he wrote a book
upon the subject.
He did not restore our economic system to vitality. He
changed it. The system he blundered us into is more like the managed
and bureaucratized, stateYDsupported
system of Germany before World War I than our own traditional order.
Before his regime we lived in a system
which depended for its expansion upon private investment in private
enterprise. Today we live in a system
which depends for its expansion and vitality upon the government. This
is a preYDwar European importation YD
imported at the moment when it had fallen into complete disintegration
in Europe. In America today every
fourth person depends for his livelihood upon employment either directly
by the government or indirectly in
some industry supported by government funds. In this substituted system
the government confiscates by
taxes or borrowings the savings of all the citizens and invests them
in nonYDwealthYDproducing enterprises in
order to create work. Behold the picture of American economy today:
taxes which confiscate the savings of
every citizen, a public debt of 250 billion dollars as against a preYDRoosevelt
debt of 19 billions, a government
budget of 40 billions instead of four before Roosevelt, inflation doubling
the prices and reducing the
lowerYDbracket employed workers to a state of pauperism as bad as that
of the unemployed in the depression,
more people on various kinds of government relief than when we had
11 million unemployed, Americans
trapped in the economic disasters and the political quarrels of every
nation on earth and a system of permanent
militarism closely resembling that we beheld with horror in Europe
for decades, bureaucrats swarming over
every field of life and the President calling for more power, more
priceYDfixing, more regulations and more billions.
Does this look like the traditional American scene? Or does it not
look rather like the system built by Bismarck
in Germany in the last century and imitated by all the lesser Bismarcks
in Europe?
He changed our political system with two weapons YD blankYDcheck congressional
appropriations and blankYDcheck congressional legislation. In 1933,
Congress abdicated much of its power when
it put billions into his hands by a blanket appropriation to be spent
at his sweet will and when it passed general
laws, leaving it to him, through great government bureaus of his appointment,
to fill in the details of legislation
He used it to break down the power of
Congress and concentrate it in the hands of the executive. The end
of these two betrayals YD the smashing of
our economic system and the twisting of our political system YD can
only be the Planned Economic State, which,
either in the form of Communism or Fascism, dominates the entire continent
of Europe today. The capitalist
system cannot live under these conditions. The capitalist system cannot
survive a Planned Economy. Such an
economy can be managed only by a dictatorial government capable of
enforcing the directives it issues. The
only result of our present system YD unless we reverse the drift YD must
be the gradual extension of the fascist
sector and the gradual disappearance of the system of free enterprise
under a free representative government.
how has it advanced the cause of democracy? We liberated Europe
from Hitler and turned it over to the mercies of a far more terrible
tyrant and actually tried to sell him to the
people as a savior of civilization. Behold Europe! Does one refer to
the wreckage there as liberation and
salvation? Is anyone so naive as to suppose that democracy and free
capitalism have been restored in Europe?
Fascism has departed from Germany, but a hybrid system of socialism
and capitalism in chains has come to
England, which is called social democracy but is on its way to Fascism
with all the controls without which such
a system cannot exist. And in America the price of the war is that
fatal deformity of our own economic and
political system which Roosevelt effected under the impact of the war
necessities.
The war rescued him and he seized upon it like a drowning man. By leading
his country into the fringes of the war at first and then deep into
its center all over the world he was able to do
the only things that could save him YD spend incomprehensible billions,
whip up spending in the hot flames of
war hysteria, put every man and his wife and grandparents into the
war mills, while under the pressure of
patriotic inhibitions, he could silence criticism and work up the illusion
of the war leader.
Look up the promises he made, not to our own people, but to the Chinese,
to Poland, to
Czechoslovakia, to the Baltic peoples in Lithuania and Latvia and Estonia,
to the Jews out of one side of his
mouth and to the Arabs out of the other side. He broke every promise.
The figure of Roosevelt exhibited before the eyes of our people is
a fiction. There was no such being as that
noble, selfless, hardYDheaded, wise and farseeing combination of philosopher,
philanthropist and warrior which
has been fabricated out of pure propaganda and which a small collection
of dangerous cliques in this country
are using to advance their own evil ends.
~~~~~~~~~~~~~~~~~~~~~~~~~~~
In June the longYDawaited invasion of the continent was launched. With
this we will not concern ourselves. The
other subject that occupied Roosevelt's mind was his plan to have himself
renominated for a fourth time.
The President had lost his head, at least a little. Congress was slipping
away from him. A growing section of his
party, particularly in the Senate, was moving out of that collection
of incongruous elements called the Third
New Deal. It was crawling with Reds and their gullible allies who got
themselves into key positions in all the
bureaus and were talking with great assurance about what they were
going to do with America and the world.
The Communists had all become antiYDfascists and everybody who was against
the Communists was, therefore,
a fascist. A group of organizations financed by undisclosed benefactors
was riding roughshod through the
country smearing everybody who questioned the grandiose plans of the
Great Leader for remaking America
and the world. Nobody was getting a hotter dose of this smearing than
the American Congress. The radio and
the frightened press and magazines kept up a barrage against the members
of the President's own party in both
houses.
It was a Democratic bill and the blast that exploded in his face brought
him up with a jerk. In the upper house, Senator Barkley, Democratic
leader, Roosevelt's own representative
there, rose to upbraid him. He said the message was "a calculated and
deliberate assault upon the legislative
integrity of every member of Congress." He cried: "I do not propose
to take it lying down," as Democratic and
Republican senators united in a roar of applause. He ended his philippic
with an announcement that made
headlines in every paper in the country. He declared that after seven
years of carrying the New Deal banner for
the President, he now resigned his post as Democratic majority leader
and he called on every member of the
Congress to preserve its selfYDrespect and override the veto. The Senate
overrode it 72 to 14 and the House 299
to 95. It brought Roosevelt tumbling off his high horse. He sent Steve
Early running to Barkley's home that
very night to beg him not to quit. Barkley yielded.
McIntire was a naval doctor in 1932 and was recommended to
Roosevelt as White House physician by Admiral Grayson. McIntire was
an eye, ear and nose specialist. He got
along famously with Roosevelt, was elevated by him to the grade of
admiral and made head of the Naval
Hospital Service.
Thus once again the problem of disease entangled itself in the making
of history.
It had happened after the First World War when the President was stricken
by a brain
hemorrhage that paralyzed his body and impaired his mind and, worse
than this, disturbed his normal mental
balance. What might have been the course of history had Woodrow Wilson's
mental and physical powers
survived must be a matter of speculation.
We have seen how the Communist party had successfully penetrated the
unions organized by the Congress of
Industrial Organizations YD the CIO YD and how John L. Lewis and David
Dubinsky had got out of it for this
reason, leaving Sidney Hillman in complete control. We have also seen
how the war brought Hillman to the top
in White House circles when he and William Knudsen became the directors
of the economic war effort.
Knudsen departed in good time, but Hillman remained close to the White
House.
. By 1943, Earl Browder, Communist
leader, had about completed the discovery that there was no hope for
a proletarian revolution in America. The
party got nowhere preaching Communism. The people just wouldn't listen.
But it learned that it could getyYYY
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXZ[\]^_`abcdefghijklmno
pqrstuvwxyz{}yYYY~Y~
very
far by using a different technique. After all, Communist revolutionaries
know that before they can introduce
Communism they must destroy the political and economic system of the
country in which they conspire.
t fascism YD the Planned Capitalist Economy
YD is merely a decadent phase of capitalism. For this reason the Communist
party had been promoting with great
success RedYDfront organizations and inducing the most important people,
like Mrs. Roosevelt, Henry Wallace
and scores of prominent leaders in education and public life, to work
with them.
As 1944 opened, Browder decided to liquidate the Communist party. It
would go out of politics. It would
become a mere educational association. This was done, and Browder and
Sidney Hillman teamed up to capture
the American Labor Party. This had been formed originally in New ork
City to provide a political vehicle for
Fiorello LaGuardia in his local politics. It had all sorts of people
in it. There were a lot of Reds, a lot of socialists
and a lot of parlor and campus pinks of all sorts, plus a lot of social
reformers and welfare reformers. It had
corralled a lot of votes YD enough to swing an election in New ork
State YD by giving or withholding its vote
from the Democrats. It supported Lehman in 1940 and elected him on
the Democratic ticket. It refused to
endorse the Democratic candidate, Bennett, for governor in 1942 and
the Democratic vote, without it, was
insufficient and thus Dewey became governor. Now Browder and Hillman
joined forces and decided to take
over the American Labor Party. They met resistance from the mixed collection
of pinks who had control, but in
a bitter battle Browder and Hillman took it over. Actually Browder
dominated this team because it was
Communist votes that did the trick.
In addition to this, Hillman had organized in 1943 a new political
labor group called the CIO Political Action
Committee. The CIO had violated the law by supporting candidates in
various primary elections and to get
around this Hillman formed this Political Action Committee and pressure
was put on members of CIO unions to
compel them to join. This organization was now being used as a club
in the Democratic party to bludgeon
Democratic congressmen and officials generally to play ball with Hillman,
Wallace and their crowd, while
Hillman and Browder did business as a team in New ork State in the
newly reYDformed Communist American
Labor Party.
The Democratic party could win if it could carry the Southern states
and in addition New ork, Massachusetts,
Illinois, Michigan and New Jersey. These states could be carried with
the support of Sidney Hillman's Political
Action Committee and Browder's American Labor Party, but not without
them and Roosevelt was the only
possible candidate who could get this support. The Democrats had to
nominate Roosevelt or lose the election.
There were some Democrats who thought it was better to lose the election,
but not enough of them.
Accordingly when the convention assembled in Chicago on July 19, Sidney
Hillman was there, not as a
delegate YD he was not even a member of the party YD but to see that
the subservient Democrats behaved to his
satisfaction and to the satisfaction of his friend and partner, Browder.
To this pass had Roosevelt's personal
political ambitions brought the Democratic party of Jefferson, Cleveland
and Wilson. Hillman had a
headquarters there. He wasn't worried about Roosevelt's nomination.
That was settled. He wasn't worried about
the platform. That was written to his satisfaction before the convention
assembled by Sam Rosenman. He had
one more demand. He wanted Henry Wallace nominated again for Vice President.
Harry Hopkins and Henry Wallace and, of course, Sidney Hillman
knew. They knew that Roosevelt was doomed and that if they could name
Henry Wallace Vice President this
time, the government would be in their hands.
But Chicago had a visitor about whom nothing was known until later.
On the evening of July 14, Roosevelt left
Washington with great secrecy on a special train. It reached Chicago
on Saturday the 15th. That same day,
Robert E. Hannegan, Democratic national chairman, got to Chicago. Reporters
awaited him at the station. But
he slipped out through a rear door of his train and into Mayor Kelly's
policeYDescorted automobile and vanished.
Reporters frantically hunted him all over town. He remained out of
sight until the next day. But in the meantime
he had made a visit to Roosevelt's train, secretly parked on a remote
railroad siding. There poor Wallace's
goose was cooked. Hannegan, too, got a letter. It said the President
would be happy to have either Harry
Truman or William Douglas as his running mate. And as Hannegan was
leaving the train, Roosevelt warned
him "to clear everything with Sidney." The Presidential approval of
Truman was no good until Sidney O.K.'d it
Truman was nominated with 1100 votes to only 66 for
Wallace. But not until Sidney Hillman had approved the change.
His first speech was not made until September 24 to a dinner given
by the International Teamsters'
Union dominated by Daniel Tobin YD an AFL union. Its purpose was to
put some emphasis on the support of the
AFL in view of the bitter feeling among AFL leaders because of the
dominant role Sidney Hillman's CIO was
playing in Roosevelt's councils and particularly in its favored position
before Roosevelt's Labor Board
~~~~~~~~~
Secret Service Page-
The first occurred on February 1, 1933, in Miami, Florida Giuseppe
Zangara fired five
shots a President-elect Franklin D. Roosevelt, who was making an impromptu
speech while sitting
in an open car that had stopped momentarily. Although none of the shots
hit President Roosevelt,
Zangara mortally wounded Anton Cermak, the Mayor of Chicago, and hit
four other people,
including a Secret Service agent.
On February 15, 1933, Zangara attended
a speech given by Roosevelt at Bayfront Park in Miami, Florida.
When Roosevelt had finished his talk and was preparing to leave,
Zangara pulled out a pistol and opened fire. A bystander
deflected the assassin's aim by pushing his arm into the air.
Zangara wounded five people who had been near the
president-elect, two of them seriously. Most critically injured was
Chicago Mayor Anton Cermak, who was struck by the bullet in
the chest which then lodged in his spine.
Zangara was immediately charged with four counts of attempted
murder. He was not charged initially with the wounding of
Cermak, as authorities waited to see if the mayor's wounds
would prove fatal. The State charged Zangara for attempting to
murder Franklin Roosevelt, Russell Caldwell, Margaret Kruise,
and William Sinnott. Zangara was found guilty on each count and
sentenced to four consecutive twenty year terms.
On March 6, Mayor Cermak died from complications stemming
from the shooting. The same day Zangara was indicted by a
grand jury and charged with first degree murder in the death of
Cermak. His trial began on March 9 and ended on March 11
with a guilty verdict and a death sentence. The prisoner was
transported to the Florida State Prison at Raiford, where he was
executed on March 20, 1933.
The parade car moved slowly down the street as President-elect Roosevelt
and Mayor Cermak
smiled and waved. The car stopped and President-elect Roosevelt gave
a speech while sitting on
the back of the car. A man named Guiseppe Zangara pushed through the
crowd. He fired five
shots at the President-elect. The bullets hit four people and Mayor
Cermak. The mayor fell out of
the car and called out "The President, get him away!" But Roosevelt
ordered his car to stop and
that Mayor Cermak be put in with him. President-elect Roosevelt held
Mayor Cermak all the way
to the hospital.
Mayor Anton J. Cermak died three weeks later, on March 8, 1933. His
body was taken back to
Chicago and buried in the Bohemian National Cemetery.
Guiseppe Zangara was executed in the electric chair on March 21, 1933.
That was only 13 days
after Mayor Cermak died.
It was not always thus. Consider the case of Guiseppe Zangara, who
was executed in 1933 for the
attempted assassination of President-elect Franklin D. Roosevelt in
which Chicago Mayor Anton
J. Cermak was fatally shot. Zangara pleaded guilty in state court on
March 10, was sentenced to
death, and was executed on March 20 -- an interval of 10 days! Kenneth
J. Davis, FDR: The
New ork ears 1928-1933 (Random House, 1985) at 427-435.
After Roosevelt had delivered a
speech in Florida on February 14, 1938, Guiseppe Zangara, an unemployed
bricklayer, fired six
sbots from a handgun at Roosevelt from twelve yards away. The president
elect, who was sitting
in an open car, was uninjured but five other people were shot, including
Chicago mayor Anton
Cernak, who was killed. Zangara, who had a pathological hatred for
rich and powerful figures,
was found guilty of murder and electrocuted.February 15, 1933, Guiseppe
Zangara rose early in Miami, Florida to assassinate Franklin
Delano Roosevelt, president-elect. In the past weeks, FDR's popularity
had increased. That
warm, reassuring voice, that ready grin and tilted cigarette holder,
had reached out to touch
millions of folks all over America. Zangara did not share these emotions.
Pushing his way through
the crowd, Zangara shouted out "There are too many people starving
to death!" He fired shot after
shot at FDR, but a woman's quick move knocked the gun upward. The bullets
hit several
bystanders and mortally wounded Mayor Cermak of Miami.
From lreed at west.cscwc.pima.edu Mon Jul 27 00:14:49 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 27 Jul 1998 00:14:49 -0700 (PDT)
Subject: FDR5
Message-ID: <009C9C7C.4404B7E0.11@west.cscwc.pima.edu>
On March 21, 1933, Zangara marched into the execution chamber shouting
against the
"capitalists" and expressing disappointment that no news camera-men
were permitted to witness
his execution. "Goodbye, adios to the world," were his last words.
3
FDR's Looking Forward published
FDR is shot at in assassination attempt in Miami, Florida, by Guiseppe
Zangara, 15
February
Giuseppe Zangara was sentenced to serve 80 years for shooting at President
elect Franklin
Roosevelt in 1933. Though Roosevelt was missed, five bystanders, including
Chicago Mayor
Anton Cermak, were struck. Three weeks after the attack, Cermak died
of complications.
Zangara's sentence was then changed to death sentence. Thirty-three
days after the attack,
Zangara was strapped into the electric chair at Florida's Raiford Prison.
He glared at his
executioners and declared, "Goodbye, adios to all the world." His unclaimed
body was buried
in an unmarked prison grave.
In 1989, as part of an effort by court officials to recover missing
court files of
historical significance, he filed an FOIA request with the U.S. Secret
Service
seeking to get back court files concerning assassin Giuseppe Zangara.
Zangara, a 32-year-old bricklayer, fired four shots at President-elect
Franklin
Roosevelt's motorcade in 1933 in Miami. Chicago Mayor Anton Cermak
was
killed and four people were wounded. Roosevelt escaped unharmed. Zangara
was found guilty of murder and was executed about a month later.
Winslow said a Miami court order showed that a Secret Service agent
had
checked out Zangara's death warrant and some other court documents
in 1954
but never had returned them. Unfortunately, he said, the FOIA request
failed to
turn up the missing documents.
GIUSEPPE
ZANGARA
pleaded guilty and
was executed
March 20, 1933 for
the March 7, 1933
death of Chicago
Mayor Anton
Cermak, who was
fatally wounded in
an attempt on the
life of
President-elect
Franklin D.
Roosevelt in
Miami on Feb. 15,
1933.
LE MONDE DIPLOMATIQUE - May 1998
by DOMINIQUE VIDAL
National and/or social liberation movements worldwide are equally affected.
The
ideology and power bloc which used to be their mainstay, whether they
liked it or
not, has disappeared. The various movements and causes have dropped
out of the
international spotlight and are no longer up for grabs in the East
West confrontation.
In fact, amid general indifference, they have largely forfeited their
means of action and
political leverage.
With its main enemy out of the way, along with the economic, ideological
and military
threat it represented, the West, led by the United States, has now
become the master
of the world. A damaging result of this new world order has been the
beginning of the
process of globalisation. It is no paradox to say it probably began
on 9 November
1989 with the fall of the Berlin Wall, or in August 1991 when Mikhail
Gorbachev
rallied to the American crusade in the Gulf, or indeed on 8 December
1991, the date
of the dissolution of the Soviet Union
For decades, every socialist project was contrasted with its only existing
embodiment: so-called "real" socialism. And, among revolutionary forces
themselves,
the process of devising a plausible radical alternative was tragically
limited by the
Soviet horizon.
So, despite the consequences described at the beginning, the fall of
communism
removes a severe handicap. Far from presaging the end of history and
the irrelevance
of radical thought, it actually gives a whole new lease of life to
ideas of utopia. Future
generations will have the freedom to conceive a different kind of society
without
having to define themselves in terms of a communist model. Of course,
there is no
going back to a clean slate. However, with the passing of time, it
should be possible
to learn lessons from the failure of communism and - in other forms
and for other
reasons - social-democratic reformism. The human imagination must find
a new way
of thinking based on what men and women need, rather than theoretical
or dogmatic
concepts to be "implemented".
The questions we must ask ourselves may have a familiar ring. How are
democracy,
pluralism, rights and freedoms to be revitalised, but sheltered from
totalitarian intent?
How is equality of opportunity and social justice to be guaranteed
and the security to
which people are entitled assured, without a general "dumbing down"
and stifling of
initiative? How can the fulfilment of basic social needs be made into
a priority for the
economy without affecting its development? How can the necessary resources
be
found for a new balance between work, training, family and community
life, and
leisure activities when people's time is at last freed up? How can
the ground be laid
for a distribution of wealth which, worldwide, respects the right of
all peoples to
development? How can the role of the state be made to serve all these
objectives
while at the same time the independence of each citizen and each local
community is
assured? In short, how is the relationship between individuals and
society to be
reinvented? To these and many other questions, there are no longer
any ready-made
answers.
However, the way is now open and the ground ready to be cleared. At
last.
Translated by Sally Blaxland
IGNACIO RAMONET
Last January, the corridors of a number of European airports were adorned
with a
poster in the style of the Chinese cultural revolution. It showed a
row of
demonstrators at the head of a march, their faces shining, their colourful
banners
blowing in the wind. The slogan they were chanting was "Capitalists
of the world,
unite!" For Forbes, America's magazine for millionaires, this was more
than a jibe at
the 150th anniversary of the publication of Marx and Engels' Communist
Manifesto.
It was a way of making two things clear. Apparently without fear of
contradiction, as
the posters were not torn down or defaced. The first is that nobody
is afraid of
communism any longer. The second is that capitalism has gone over to
the attack.
capitalism's new-found arrogance.
The triumphal tone became apparent after the fall of the Berlin Wall,
when the Soviet
Union collapsed in a welter of political obtuseness reflecting the
emptiness of
shattered illusions. The sudden revelation of the full consequences
of decades of state
control in the countries of the former Eastern bloc produced a sort
of mental
upheaval. The tragic absurdity of a system lacking basic freedoms and
a market
economy was starkly exposed, as were all the injustices that had followed
in its
wake. Socialist thinking seemed to subside, along with the belief in
progress and a
future subject to rational planning.
The sole ideological basis of the traditional right had been its anti
communism. The
collapse of the Soviet system and the implosion of socialism cut the
ground from
under its feet. Neoliberalism, which had been flagging since the beginning
of the
century, was left alone in the field, the sole victor of the East-West
confrontation.
With its main rivals removed, it has re-emerged on all sides, stronger
than ever. Its
supporters dream of imposing their vision - a neoliberal utopia admitting
of no
alternative - on the whole world.
This campaign of conquest goes by the name of globalisation. It is
the outcome of the
increasing interdependence of all countries, brought about by the lifting
of all controls
on the movement of capital, the removal of customs barriers and administrative
restrictions, and the intensification of international commerce and
free trade; all this
under the auspices of the World Bank, the International Monetary Fund,
the
Organisation for Economic Cooperation and Development, and the World
Trade
Organisation.
The financial economy has become entirely divorced from the real economy.
The sum
total of daily financial transactions throughout the world is about
$1,500 billion, but a
mere 1 % involves the creation of new wealth.
Even in the most developed countries, the dramatic advance of neoliberalism
has
significantly reduced the role of parliaments and other public players.
At the same time, the growth of new information technologies is proceeding
without
any reference to the idea of social progress. The enormous strides
in molecular
biology since the early 1960s, coupled with the immense calculating
power provided
by computer science, have shattered the stability of the technological
matrix which
public authorities are finding it harder and harder to control. Politicians
can no longer
assess the risks involved in the acceleration of science and technology
(1). Here too,
they are increasingly dependent on unelected experts, who direct the
government
decision-making process behind the scenes.
The information revolution has torn our society apart. It has overturned
the
established pattern of trade, opening the way for the expansion of
the global and
information economy. Not all the countries of the world have yet been
forced into
one unit. But the global economy is imposing a single economic model
by networking
the entire planet. In this new system of liberal social relations,
humankind has been
reduced to a collection of isolated individuals stranded in a universe
of
hypertechnology.
These brutal changes are causing us to lose our bearings; there is
ever-growing
uncertainty, the world appears unintelligible and history seems to
defy rational
interpretation. The crisis we are experiencing is what Gramsci had
in mind when he
spoke of the old order dying while the new hesitates to be born. We
are reminded of
Tocqueville's phrase: "When the past no longer illuminates the future,
the spirit walks
in darkness."
And yet, many people are trying to inject some measure of humanity
into the
relentless machinery of neoliberalism. They feel the need for responsible
involvement
and collective action. In an age when power has become abstract, invisible,
distant
and impersonal, they want to confront those responsible face to face,
to direct their
anger, fears and frustration at clearly identified adversaries of flesh
and blood. They
would still be prepared to believe that politics has an answer to everything,
even
though politicians find it increasingly difficult to propose straightforward
solutions to
the complex problems of society. And they all feel the need to erect
a barrier against
the tidal wave of neoliberalism in the form of a coherent ideology
that can be
opposed to the currently dominant model.
To formulate that ideology is no easy matter. There is practically
nothing left to build
on. Previous utopias based on the idea of progress have all too often
sunk into
authoritarian rule and oppression.
Once again, there is a need for dreamers who can think and thinkers
who can dream.
The answer will not be a neatly packaged, custom-built project. It
will be a way of
looking at things, of analysing society, leading gradually to the development
of a new
ideology that will break the stranglehold of anarcho-liberalism.
*** sog ***
Neoliberal ideology is busily building a society of selfishness based
on fragmentation.
To preserve the future, we have to strengthen the collective dimension
(3). And
collective action is now as much a matter of single-issue campaigns
as of parties and
unions.
*** AoD ***
France has seen a proliferation of campaigning groups in recent years.
The
issues range from food for the homeless (les Restos du Coeur) and the
fight against
AIDS (Act Up), to unemployment (Action contre le ChYmage - AC!) and
housing
rights (Droit au Logement - DAL). There has also been considerable
growth in local
branches of large NGOs like Greenpeace, Amnesty International, MYdecins
du
Monde and Transparency.
Political parties have two particular attributes which detract from
their credibility.
First, they are all-embracing, claiming to be able to solve all society's
problems.
Second, they are geographically restricted, i.e. they can act only
within the frontiers
of a single country. Campaigning groups have exactly the opposite properties.
On the
one hand they are thematic, i.e. concerned with single issues such
as unemployment,
housing and the environment. On the other, they are international,
i.e. their field of
action is the whole planet (4).
For many years the supporters of these two different approaches have
been at odds
with each other, but recently there have been signs of convergence.
It is vital that they
join forces. This is one of the key problems of political renewal.
Campaigning groups
are grass-roots organisations, testifying to the richness of social
initiative.
{John Doe Society - sog}
It is
therefore essential to build strong links between campaigning organisations
and
political parties.
Campaigning organisations have preserved the belief in the possibility
of changing the
world, a belief based on a radical conception of democracy. They are
the probable
source of a renewal of political activity in Europe.
. "Today's utopia is tomorrow's
reality", as Victor Hugo said. Lamartine agreed that utopias are simply
"realities
whose time is not yet ripe." It is the committed activists of campaigning
organisations
who are likely to prove them right. They will resurface tomorrow under
other
banners.
They will be involved in struggles to restore the United Nations' role
as the central
instrument of international law, to turn it into an organisation that
can take real
decisions, act decisively and impose lasting peace; to establish international
tribunals
that can judge crimes against humanity, democracy and the common good;
to prevent
manipulation of the masses and to end discrimination against women.
They will be
present in campaigns to secure new legislation on protection of the
environment and
to establish the principle of sustainable development. In the fight
to ban tax havens
and promote an economic system based on solidarity. And in many others.
Translated by Barry Smerin
Return of the Rebels
The working classes have not given up the fight despite both overt
and covert repression, a
weakened and divided trade union movement and media indifference or
outright hostility.
by CHRISTIAN DE BRIE
Alongside the trade union movement, an astonishing wealth and diversity
of
associations is springing up to challenge the new world order. From
local community
groups to international non-governmental organisations - there are
several hundred
thousand of them in all - mobilising hundreds of millions of activists.
As the Peoples'
Global Action against "Free" Trade and the World Trade Organisation,
which met in
Geneva in February 1998, stated in their manifesto, direct action against
globalisation
is the most important thing. "Only a global alliance of peoples' movements,
respecting
autonomy and facilitating action-oriented resistance, can defeat this
... monster. ...
We assert our will to struggle ... against all forms of oppression"
(3).
Translated by Sally Blaxland
THERE IS ANOTHER, BETTER WORLD
The hazards of internationalism
Billions of men and women, rendered powerless by the
fragmentation of the social struggle, are pinning their hopes on a
new universalism that does not leave the delicate fabric of the
world entirely in the hands of the money men.
by ALAIN GRESH
We live in extraordinary times. Globalisation is carrying all before
it, our means of
communication allow us contact in real time with any place you care
to name, more
people than ever before are travelling the world, yet paradoxically
the media space
devoted to "foreign affairs" is shrinking to vanishing point. All the
research bears this
out. Be it in Paris, Washington (1), London or Madrid, television and
press coverage
of international problems has been substantially reduced. However,
there is an
exception to every rule and we are informed instantly of any drop in
the Nikkei index
in Tokyo, invited to rejoice at the new heights reached by the Dow
Jones on Wall
Street or worry about exchange rate fluctuations in Seoul. Stock exchange
news has
become the only social glue binding the global village together.
Alain Badiou observes in a stimulating reflection on universalism (3),
this "process of
fragmentation into separate and isolated identities" is only another
aspect of a "world
that has finally been given a configuration, as a market, a world market.
Nothing", he
continues, "lends itself more to the invention of new patterns for
a uniform monetary
system than a community and its territory or territories. What endless
opportunities
for trade and investment" these innumerable new communities offer as
they arise. The
many separate states that have replaced ugoslavia or the Soviet Union
offered no
resistance to the juggernaut of the free market economy.
As Alain Badiou observes, "at a time of general movement and the dream
of instant
cultural exchange, more and more laws and regulations are being introduced
everywhere to curtail people's freedom of movement ... Free movement
for things
that can be counted, by all means, especially for capital, the very
essence of such
things. But free movement for things that cannot be counted, for the
infinite value
represented by an individual human life, never! As regards the real
life of people and
what happens to them", there is - and we must never forget it - "a
detestable
complicity between the globalised logic of capital and the French mania
to preserve
their identity".
the nation-state - a recent and transitory historical
phenomenon (7) - is clearly not the symbolic ideal construct some sentimental
elements of the left like to imagine. It has been a key factor in colonial
wars,
opposition to the labour movement, enforcing moral order, discrimination
against
women, the marginalisation of minorities, and so on and so on. And
the current drift
into authoritarian attitudes vis-Y-vis "dangerous elements" and immigrants
is
unacceptable, even in the name of a self-styled "republican order".
How are we to find new forms of rebellion, of dissidence, to meet the
new global
challenges?
With
modern means of communication, especially the Internet, it is easy
to establish
worldwide networks, mobilise, act.
But to act locally and on a world scale, to "think global", it is necessary
to rediscover
universalism, a universalism that is not confined to the values of
Western White men,
who fall into a trance at the sight of a young girl in a veil and whose
real aim in life, to
quote Alain Badiou, is "the uniform imposition of what they imagine
to be modern".
Humanitarian action or laissez-faire?
The stagnation of the Soviet system and the collapse of the communist
utopia brought
discredit on a certain version of internationalism. Even the humanitarianism,
which
rallied millions of men and women to the cause of emergency aid in
time of war and
natural disaster, rapidly ran out of steam. No-one was quicker than
the organisers of
M_dicins sans fronti_res, the organisation that exemplifies that approach,
to condemn
the political authorities' use of "humanitarian" aid to justify a laissez
faire attitude
towards the crimes in Bosnia or the genocide in Rwanda.
And yet, in the face of fundamentalism, hardening attitudes on identity,
or
confrontations between increasingly insulated ethnic groups (which
do not prevent
their foot-soldiers from drinking Coca Cola, their intellectuals from
using Microsoft
software, and their leaders from calling on the resources of international
capital), the
peoples of the world have got to find new ways of "living together"
and "fighting
together". They have nothing to lose from embracing this ideal and,
to quote Marx
and Engels, "they have a world to win".
Translated by Barbara Wilson
The US is, in fact, operated as a fascist state by bureaucrats.
~ Bill Payne
~ John Hancock
Security to
the persons and properties of the governed is so obviously the design
and
end of civil government, that to attempt a logical proof of it would
be like
burning tapers at noonday, to assist the sun in enlightening the world;
and it
cannot be either virtuous or honorable to attempt to support a government
of which this is not the great and principal basis; and it is to the
last degree
vicious and infamous to attempt to support a government which manifestly
tends to render the persons and properties of the governed insecure.
Some boast of being friends to government; I am a friend to righteous
government, to a government founded upon the principles of reason and
justice; but I glory in publicly avowing my eternal enmity to tyranny.
They have declared that they have
ever had, and of right ought ever to have, full power to make laws
of
sufficient validity to bind the Colonies in all cases whatever. They
have
exercised this pretended right by imposing a tax upon us without our
consent; and lest we should show some reluctance at parting with our
property, her fleets and armies are sent to enforce their mad pretensions.
it was easy to foresee
the consequences which so naturally followed upon sending troops into
America to enforce obedience to acts of the British Parliament, which
neither God nor man ever empowered them to make. It was reasonable
to
expect that troops, who knew the errand they were sent upon, would
treat
the people whom they were to subjugate, with a cruelty and haughtiness
which too often buries the honorable character of a soldier in the
disgraceful name of an unfeeling ruffian.
they thought it not enough to violate our civil
rights, they endeavored to deprive us of the enjoyment of our religious
privileges, to vitiate our morals, and thereby render us deserving
of
destruction.
But what, my
countrymen, withheld the ready arm of vengeance from executing instant
justice on the vile assassins? Perhaps you feared promiscuous carnage
might ensue, and that the innocent might share the fate of those who
had
performed the infernal deed. But were not all guilty? Were you not
too
tender of the lives of those who came to fix a yoke on your necks?
From lreed at west.cscwc.pima.edu Mon Jul 27 00:15:12 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 27 Jul 1998 00:15:12 -0700 (PDT)
Subject: FDR6
Message-ID: <009C9C7C.5221FFE0.13@west.cscwc.pima.edu>
And though the
murderers may escape the just resentment of an enraged people; though
drowsy justice, intoxicated by the poisonous draught prepared for her
cup, still nods upon her rotten seat, yet be assured such complicated
crimes will meet their due reward.
Standing armies are sometimes (I would by no
means say generally, much less universally) composed of persons who
have rendered themselves unfit to live in civil society; who have no
other
motives of conduct than those which a desire of the present gratification
of
their passions suggests; who have no property in any country; men who
have given up their own liberties, and envy those who enjoy liberty;
who
are equally indifferent to the glory of a George or a Louis; who, for
the
addition of one penny a day to their wages, would desert from the
Christian cross and fight under the crescent of the Turkish Sultan.
From
such men as these, what has not a State to fear? With such as these,
usurping Caesar passed the Rubicon; with such as these, he humbled
mighty Rome, and forced the mistress of the world to own a master in
a
traitor. These are the men whom sceptred robbers now employ to frustrate
the designs of God, and render vain the bounties which his gracious
hand
pours indiscriminately upon his creatures. By these the miserable slaves
in
Turkey, Persia, and many other extensive countries, are rendered truly
wretched, though their air is salubrious, and their soil luxuriously
fertile. By
these, France and Spain, though blessed by nature with all that administers
to the convenience of life, have been reduced to that contemptible
state in
which they now appear
But since standing armies are so hurtful to a State, perhaps my
countrymen may demand some substitute, some other means of rendering
us secure against the incursions of a foreign enemy. But can you be
one
moment at a loss? Will not a well-disciplined militia afford you ample
security against foreign foes? We want not courage; it is discipline
alone in
which we are exceeded by the most formidable troops that ever trod
the
earth.
A well-disciplined militia is a safe, an
honorable guard to a community like this, whose inhabitants are by
nature
brave, and are laudably tenacious of that freedom in which they were
born.
>From a well-regulated militia we have nothing to fear; their interest
is the
same with that of the State. When a country is invaded, the militia
are
ready to appear in its defense; they march into the field with that
fortitude
which a consciousness of the justice of their cause inspires; they
do not
jeopard their lives for a master who considers them only as the instruments
of his ambition, and whom they regard only as the daily dispenser of
the
scanty pittance of bread and water. No; they fight for their houses,
their
lands, for their wives, their children; for all who claim the tenderest
names,
and are held dearest in their hearts; they fight pro aris et focis,
for their
liberty, and for themselves, and for their God.
I cannot here forbear noticing the
signal manner in which the designs of those who wish not well to us
have
been discovered. The dark deeds of a treacherous cabal have been
brought to public view. ou now know the serpents who, whilst cherished
in your bosoms, were darting the envenomed stings into the vitals of
the
constitution. But the representatives of the people have fixed a mark
on
these ungrateful monsters,
Surely you never will tamely suffer this country to be a den of thieves.
Break in sunder, with noble disdain, the bonds with which the
Philistines have bound you. Suffer not yourselves to be betrayed, by
the
soft arts of luxury and effeminacy, into the pit digged for your destruction.
Despise the glare of wealth. That people who pay greater respect to
a
wealthy villain than to an honest, upright man in poverty, almost deserve
to
be enslaved; they plainly show that wealth, however it may be acquired,
is,
in their esteem, to be preferred to virtue.
The virtuous asserter of the rights of
mankind merits a reward, which even a want of success in his endeavors
to
save his country, the heaviest misfortune which can befall a genuine
patriot,
cannot entirely prevent him from receiving.
{Timothy McVeigh - sog}
~~~~~~~~~~~~~~~~~~
Secret Service
the start of the Spanish-American War led to the first legal use of
the Secret
Service for Presidential protection. A detail of four agents, operating
under special emergency was
fund, was assigned to the Executive Mansion to guard McKinley around
the clock. They were
stationed on the first and second floors of the Mansion and on the
White House grounds. [13]
[13 During the Spanish-American War, the Secret Service also served
as the primary intelligence
agency for the War Departnent. It gathered intelligence and conducted
counter espionage activities
both domestically and abroad.]
72
After the war, Secret Service operatives continued to serve at the
White House at least part
of the time. In addition, operatives regularly accompanied McKinley
during his travels. With the
expiration of the emergency war fund these activities once again exceeded
the Secret Service's
statutory authority. However, Secret Service Chief John Wilkie felt
obligated to provide the
protection anyway. President McKinley received a large number of threats,
which seemed
particularly credible in light of a series of political assassinations
that took place in Europe during
this period.
In 1901, President McKinley was shot and fatally wounded by anarchist
Leon Czolgosz
while standing in a receiving line at the Pan American Exposition in
Buffalo, New ork. Three
Secret Service operatives were guarding him at the time, along with
eighteen exposition policemen,
eleven members of the Coast Guard, and four Buffalo city detectives.
One of the Secret Service
operatives was out of position when Czolgosz approached President McKinley,
because the
president of the exposition d requested the spot directly next to MdCinley,
where the operative
normally stood.
, in 1906, Congress quietly included language in the Sundry Civil Expenses
Act authorizing
the Secretary of the Treasury to use funds for "the protection of theperson
of the President of the
United States."
{Treasury=Money=Illuminatti - sog}
Since the Secret Service was officially
authorized to provide protective services in 1906, only one person
has been killed under its watch
- President John F. Kennedy, who was fatally wounded by Lee Harvey
Oswald while riding in a
motorcade through Dallas, Texas, on November 22, 1963.
Since the inception of the Secret Service, however, there also have
been six other
potentially deadly assaults on Secret Service protectees.
The first occurred on February 1, 1933, in Miami, Florida Giuseppe
Zangara fired five
shots a President-elect Franklin D. Roosevelt, who was making an impromptu
speech while sitting
in an open car that had stopped momentarily. Although none of the shots
hit President Roosevelt,
Zangara mortally wounded Anton Cermak, the Mayor of Chicago, and hit
four other people,
including a Secret Service agent.
From lreed at west.cscwc.pima.edu Mon Jul 27 00:15:36 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 27 Jul 1998 00:15:36 -0700 (PDT)
Subject: FDR7
Message-ID: <009C9C7C.5CABC0E0.15@west.cscwc.pima.edu>
The Manchurian Candidate
~ Raymond Shaw
1901
McKinley is assassinated by anarchist; he is succeeded by Theodore
Roosevelt
1911
FDR receives degree of Master Mason conferred by Holland Lodge No.
8, New ork
City, 28 November
1913
FDR is appointed assistant secretary of the Navy, April
1919
FDR travels to Europe to supervise naval establishment, January-February
1919 -- Adolph Hitler joins the Thule Society in Germany. In the
Thule Society, the 'black sun' played a prominent role as a 'sacred'
symbol of the Aryans. The inner core within the Thule Society are
all Satanists.
1927
FDR founds the Georgia Warm Springs Foundation, therapy center for
the treatment of
polio victims
Stalin becomes Soviet dictator
{FDR given quarter-million to run - sog}
1928
FDR again placed in nomination at Democratic National Convention B
Governor Alfred
E. Smith
FDR is elected governor of New ork, opposed by Alfred Ottinger, by
50.3 percent of the
vote, 6 November
1933
FDR is shot at in assassination attempt in Miami, Florida, by Guiseppe
Zangara, 15
February
FDR is inaugurated as 32nd president, 4 March
U.S. recognizes the USSR and resumes trade
The Twenty-First Amendment repeals prohibition
1945
FDR dies, Warm Springs, Georgia, 12 April; buried Hyde Park, New ork,
15 April
Mussolini is killed
Hitler commits suicide, Germany surrenders
He fired shot after
shot at FDR, but a woman's quick move knocked the gun upward. The bullets
hit several
bystanders and mortally wounded Mayor Cermak of Miami.
{Cermak was standing *beside* FDR-gun knocked upward would not change
hit targets - sog}
In assassination cases, there has always existed the dilemma of establishing
the murderer's
sanity. Authorities are uncomfortable to admit that sane people kill
government leaders. At the
same time, many feel that if the assassin is deemed insane, he will
escape "proper" punishment.
It is much easier to lock upon the assassin as a steely-eyed, cold
blooded killer, who is a threat
to society...and only half crazy.
Nineteen days after Fromme's failed attempt, Sara Jane Moore fired
a shot at President Ford,
but missed. Prior to the attack, she wrote the following poem:
"Hold-Hold, still my hand.
Steady my eye, chill my heart,
And let my gun sing for the people.
Scream their anger, cleanse with their
hate,
And kill this monster."
While most assassins have deep, emotional problems, few are truly insane,
unable to distinguish
between right and wrong. Defendants are presumed to be sane and responsible
for their crimes
until the contrary can be proven. In order to establish insanity, it
must be proved that, at the time
of the offense, the defendant was laboring under such a defect or disease
of the mind so as not
to know the nature and quality of the act or did not know that it was
wrong. This is referred to
as the McNaughton Rule, and it is based on an 1843 assassination case.
John Schrank was convicted of shooting former-President Theodore Roosevelt
in 1912.
Roosevelt recovered from the wound and carried Schrank's bullet in
his chest for the rest of his
life
John W. Hinckley Jr. was acquitted by reason of insanity for shooting
President Ronald Reagan
in 1981. He has been held in St. Elizabeth's Hospital since his trial
and has petitioned the courts
to win his release.
{Cermak-Brady - sog}
In 1935, Dr. Carl Weiss shot and killed Senator Huey Long outside the
governor's office of the
Louisiana State Capitol Building in Baton Rouge. Long's bodyguards
opened fire on Weiss,
killing him instantly. He suffered more than 50 bullet wounds. There
is evidence that suggests
Long was accidentally shot and killed by one of his own guards.ods
are those with high rates of female-headed
families, welfare dependency and labor force and school dropouts.
In 1990, in the typical
"bad behavior" white underclass tract, 55 percent of the men did not
participate in the work force
and 42 percent of the residents had dropped out of school; the corresponding
figures for black
tracts were 62 percent and 36 percent...
They are easy for politicians to manipulate and are no threat to do
anything very imaginative or even act in concert in defense of their
own interests without outside
leadership. They also constitute a talking point. Politicians can talk
about taking steps to correct
the problem and improve conditions for these "victims of society."
Humans are social beings, they require an emotional and spiritual bond
to their
society, with that society viewed as a collective entity. Intellectuals
spend their lives constructing
and tinkering with their identities.
the educational system of the United States. It is
clearly inadequate, since ordinary people in an advanced industrial
society should be able to handle
abstract reasoning
It is not that the system has failed at what it set out to
do. One cannot be said to have failed at something one has never attempted.
It is important to keep ordinary people in their place
If ordinary people were able to reason effectively and draw conclusions
about matters outside of
their day to day experience, then they might start asking questions
that politicians would have
difficulty answering.
t the belief in lack of ability tends to bring about that lack of ability.
What one must keep in mind in regard to this stereotype is that it
constitutes an assertion as to fact.
In other words, it is not a moral principle, it is not a value judgement,
and it is not, in itself, an
expression of prejudice. If one were to assert it, knowing and believing
that it was false, then it
would be an expression of prejudice.
One can only be truly equal if one accepts the same burdens and responsibilities
as everyone else.
. One, of course, needs to throw in the sexual stereotypes also, since
they played a similar role in building identity. The main problem is
to understand the function of
ethnic identity in a society.
sense of duty and obligation. One cannot feel
such a sense of duty without a clear understanding of one's place in
the world. That is what identity
is all about. The collective identity, which the people of Oaxaca have,
is what makes each
individual accountable to society. Peer pressure, as one sees in operation
in the case of Mr.
Santiago, is the means by which a fully functional society influences
and modifies the behavior of its
members.
In the United States, such outpourings of ethnic sentiment on the part
of the dominant culture are
discouraged
There is to be no
expression of ethnic identity not approved by the intellectual establishment.
The government must
seek to suppress any alternative means of social control. All legitimate
power must be held by the
government, even to the point of making every member of society a criminal.
*** {TCM tag-line - sog} ***
e sum total of the effort. Attacks on certain forms of religious expression
are part of it also, but it
is the "Civil Rights Movement" that provides an excuse for government
to intrude into all kinds of
interpersonal relationships. The more the government can do this, the
more people are alienated
from society. People are no longer accountable to one another but to
a vast impersonal
bureaucracy. One must recall that this is the basic premise of Totalitarian
social organization.
The purpose of this effort is to crush all opposition to the agenda
of the ruling oligarchy. The
democratic forms are meaningless in the absence of a willingness on
the part of the population in
general to assume collective responsibility for the maintenance of
social order. All power ultimately
lies in the hands of those who perform that function. The people in
general can only do this by
means of imposing their collective identity in the ways the author
has described. If one can destroy
the emotional and spiritual bonds that provide the sort of collective
identity which U.S. society
once had, then one has only millions of sheep and a few wolves.
. From a recent book on the human brain one has:
The sexes are different because their brains are different. The brain,
the chief administrative and
emotional organ of life, is differently constructed in men and in women;
it processes information in
a different way, which results in different perceptions, priorities
and behavior.
human behavior in general is much more biologically driven than was
believed previously.
What this means, among other things, is that human behavior cannot
be modified beyond certain
limits. It is not possible, for instance, to fundamentally change the
nature of the male/female
relationship
The problem in this Detroit neighborhood is not that welfare benefits
are too low. After all, these
people are very wealthy compared to Mr. Santiago. What they have not
received from society is a
strong sense of ethnic identity. As a result, they have rejected society
and have set out to make
their own. One sees them assuming the responsibility for the maintenance
of social order but in an
antisocial context. The gang symbols and mode of dress are a typical
male effort to impose their
identity on the environment, just as Mr. Santiago was doing in placing
flowers at the statue of the
patron saint. In the matter of the gang symbols, however, one sees
a pattern of social
disintegration.
In the case of Americans, great efforts are made in the form of entertainment,
bizarre
religious activities (The Branch Davidians, for example), appeals to
great collective efforts (Save
the Whale), self improvement (lose weight), and many other artificial
undertakings to give life
meaning and purpose.
The problem with American society is precisely this artificiality.
If one rejects ethnic identity and
the social cohesion that it provides, then one must resort to coercion.
Unfortunately, there is an end to that twisted path. In order to survive,
a society must conform itself
to the psychological needs of the average person and not attempt to
coerce people into
conforming to some false ideology.
the government is a big
part of the cause of the problem in that it has set out to undermine
identity
1927
Despite international protest and allegations of perjury,
evidence tampering, and judicial prejudice, Anarchists
Nicola Sacco and Bartolomeo Vanzetti are executed for
robbery and murder.
1966
Eagle Scout and ex-Marine Charles Whitman opens fire
from atop the 27-story tower at the University of Texas at
Austin. He kills 21 people and wounds nearly 30 before
being killed by police.
THE OMEGA FILE:
[Greys, Nazis, Underground Bases, and the New World Order]
by Branton
they have taken control of much of the 'underground black budget empire'
-- a vast network of interconnected underground military-industrial
bases and cities that have been constructed with the assistance of
TRILLIONS [yes, I said TRILLIONS] of dollars siphoned from the American
economy via taxes, drugs, organized crime, etc., money which has literally
gone 'down the tubes', leaving our economy in a state of chaos.
{Is it reasonable to believe that those who monitor 'all'
communications, and control banking & finance become 'stupid'
when it comes to Trillions of dollars of black-market income?
Duhhh... - sog}
510410 - Truman relieves General MacArthur of his command and replaces
him with Gen. Ridgeway, a CFR member. MacArthur earlier disobeys U.N.
directives by initiating a secret attack on the Communist stronghold
at Inchon [leading to a quick end of the war], after he and other military
leaders suspected the pro-Socialist U.N. officials of betraying their
battle plans to the North Koreans. Truman goes into hiding at Camp
David for two weeks following MacArthur's return, fearing that the
highest-ranking military general in the United States would arrest
him for treason. After Truman fires MacArthur for his unauthorized
military action, he recieves much condemnation from confused and angered
patriotic Americans who criticize Truman for his decision.
521104 - NSA: Presidential Executive Orders exempts NSA from all laws.
National Security Agency imputed with even more power and influence
than CIA.
530000 - Dwight Eisenhower becomes president. Eisenhower appoints
Nelson Rockefeller to group on Govt. reorganization. It was Rockefeller,
in collaboration with 'Nazi' agents, who assisted in the establishment
of MJ-12, the NSA and CIA as fronts for Bavarian Intelligence, a 'secret
government' within the Constitutional government. Many who have gotten
close to the CIA's ultimate secret -- that is the Nazi S.S. controlling
factor -- are murdered by CIA assassins. Allan Dulles, CIA Director,
approves mind control project MKDELTA.
{Post-War Presidents / Navy / CIA / NSA - sog}
740000 - Gerald Ford becomes President. Nelson Rockefeller becomes
Vice-president. (Note: Here is an alternative to a famous parable:
"A fool and his money are soon elected"! - Branton)
1919 -- Adolph Hitler joins the Thule Society in Germany. In the
Thule Society, the 'black sun' played a prominent role as a 'sacred'
symbol of the Aryans. The inner core within the Thule Society are
all Satanists.
1919
FDR travels to Europe to supervise naval establishment, January-February
1934 -- the vast Rockefeller financial empire, in an effort to back
German racial superiority and eugenics, financially supports Nazi Germany
in collaboration with Prescott Bush [George Bush's father]. In 1929
the German Ernst Rudin enacts German Sterilization Laws.
{Eugenics was Policy forerunner of Planned ParentHoods - sog}
1943 -- General Reinhard Gehlen infiltrates Soviat intelligence.
Gehlen forms a partnership with Allen Dulles [a Bavarian Illuminist
and American 'Nazi'], which results in the creation of the CIA [and
some years later the more powerful NSA] from a core of Nazi SS intelligence
officers brought to the US under the auspices of Operation Sunrise,
Overcast, and Paperclip
On April 12, Roosevelt dies and Harry Truman, a high Mason as was Roosevelt,
becomes President of the United States. On May 7, 1945, Germany surrenders.
Whether Truman was directly aware of the fact that his sponsors, the
German-American Rockefellers, had financed the Bolshevik and Nazi revolutions,
is uncertain.
1952 -- Reinhard Gehlen and Allen Dulles are dubbed Knights of Malta
by the VATICAN.
Jesus of Nazareth - the Christ - or Melchizedek
The following are some of the subjects that radio personality David
Emory has covered on his talk-radio broadcasts in California:
-- The pivotal role that Nazi and fascist elements played in the assassination
of President Kennedy... evidence that American and German "Neo-Nazis",
the Gehlen spy organization and Nazi rocket specialists working under
Werner Von Braun figured prominently in the killing.
-- The support American industrialists and financiers gave to Hitler's
Germany and how this affected the allied military policy during the
war as well as the incorporation of the Third Reich's intelligence
forces into the CIA at the conflict's conclusion.
-- The SS origin of the Green Berets, the re-establishment of Nazi
elements in West Germany after the war, as well as Nazi influences
on Senator Joe McCarthy, Interpol and the Alger Hiss case.
-- The pivotal role in the Cold War played by Hitler's most important
spymaster and his Nazi Eastern Front intelligence organization... the
Gehlen organization's incorporation into the CIA; its role in establishing
Radio Free Europe AND the first Palestinian terrorist groups as well
as Gehlen's personal political ideology.
-- The evolution of American fascism from the 1930's to the present...
-- The assassination program which eliminated the democratic leadership
of Weimar Germany paving the way for Hitler's rise to power... the
formation of the Nazi Party as a front for German military intelligence.
-- The Third Reich's extermination programs from the "mercy killing"
of handicapped children to the Auschwitz death factory. The Nazi liquidation's
are exposed as a direct outgrowth of the international eugenics and
mental hygiene movements, both mainstream movements with important
implications for contemporary society.
-- Circumstantial evidence suggesting that then vice-president George
Bush may have been involved with the attempt on the life of former
President Reagan... the close connections between the family of convicted
would-be assassin John Hinckley and the Bush family as well as Hinckley's
Nazi background.
-- Livin' In The USA: The Search for Nazi War Criminals. In 1985,
the San Francisco Examiner listed ten Third Reich fugitives considered
to be the "most wanted" of all war criminals... the fact that most
of them worked for U.S. intelligence after the war.
-- Adolf Hitler's escape from Germany at the end of World War II using
information contained in previously classified U.S. intelligence archives,
accessed by a London Times journalist and discussed in a military history
quarterly.
--(Note: It is indeed curious that the American Psychiatric Association
initially contained over 2,000 German 'immigrant' members following
World War II. The APA also was/is involved in GUN CONTROL lobbying.
Branton)
-- From the www.buildfreedom.com website we read: "A principle player
in the 1974 foundings of both HCI [then called the National Council
to Control Handguns] and the NCBH [National Coalition to Ban Handguns,
now renamed the Coalition Against Gun Violence] was Ed Wells, who was
A 25-EAR VETERAN OF THE COVERT OPERATIONS DIVISION OF THE CIA... There
was also a fund raiser for NCBH hosted by the man Nixon appointed as
CIA Director, William Colby... HCI spokesman Greg Risch -- incredibly
-- admitted that "SURE THERE ARE A LOT OF CIA PEOPLE IN IT [HCI]",
and also stated that there are quite a few "EX-CIA WHO DONATE TO US."
-- Several reasons for American's lack of awareness of fascism, its
history and its methodology: lowering American educational standards
and the deliberate obfuscation of the historical connection between
powerful industrial and financial interests and fascism. Both have
significantly undermined contemporary understanding of the political
forces which produced Hitler and Mussolini...
-- the clandestine methodology of fascism, in particular the underground
organizational structure of fascist movements and its effectiveness
in subverting established democracies...
In the aftermath of World War I, the German Nazis learned that anti
communism could be used to achieve strategic leverage over Germany's
prospective enemies such as Great Britain and the United States.
The Third Reich sought to escape the full consequences of military
defeat in World War II by playing the anti-Communist card again.
Although a few of the more obvious and obnoxious elements of Nazism
were removed, Nazis were returned to power at virtually every level
and in almost every capacity in the Federal Republic of Germany.
In its American incarnation, liberation theory called for "rolling
back" communism out of Eastern Europe and the break-up of the Soviet
Union into its constituent ethnic Republics.
{We give half of Europe to the Soviets and then immediately
declare them the Great Enemy, and strive to 'free' the same
countries we handed them. Duuhhh... -sog}
the United States badly compromised its democratic institutions during
the Cold War, possibly beyond repair.
Mind Control - or if the phrase "remember to forget" has a great significance
to you, you may want to read on & consider contacting me.
{Elvis / "I Forgot To Remember To Forget" - sog}
"Oswald Acted Alone, But Elvis Was Part Of The Conspiracy"
Although Texas law
required an immediate autopsy in Dallas, the site of the crime, Crenshaw
insisted that a swarm of Secret Service agents entered the hospital
and demanded that the autopsy be performed out of state. It is interesting
that the Secret Service of the U.S. and other countries are reportedly
patched directly into the highest levels of Scottish Rite Masonry,
or the Bavarian Illumiati.
Every witness who could shed light on the Kennedy murders has been
systematically hunted down and murdered. [I seek information from
those who were in it. I believe I already know one who was. ou might
know something about it if you recognize the code name BLACKHAWK.
Other victims of assassination by the Group whose names will be recognized
include Franklin D. Roosevelt, Marilyn Monroe, Mahatma Gandhi, Anwar
Sadat & Olof Palme. There have been many thousands more.
Dwight D. Eisenhower -- whose campaign was sponsored by the Rockefellers
and through whose administration many of the national socialist policies
of the Rockefellers were implemented within the U.S. Intelligence Agencies
They want to impose on this planet a centralized world oligarchy -
not a democracy -- akin to a FASCIST state in which there will be genocide
on a massive scale, total state control over all aspects of human behavior
and communication and control of the human mind and spirit through
manipulation of the world's major religions, genetic engineering, drugs,
tightly-controlled media and by other means.
{We are 'part-time' defenders against genocide,etc. - sog}
{Part-time defenders against DrugLordsWhoHaveConnectionsToBush - sog}
Brave New World. Huxley apparently knew about the plan from his brother.
In addition, a good part of the funding over the years has come from
large-scale diversions of funds from all major treasuries in the western
world.
The 'skim' appears to be about .5% of all incoming funds.
one of Gen. Gehlen's specialties in WWII Nazi intelligence -- divert
attention to the "Red menace."
What the Group wanted by the time of the "incubation period" [1995
2000] was a society that was uneducated, amoral, uncommitted to democratic
institutions, living in fear, with a sudden and very drastic reduction
in spendable income simultaneous with societal chaos.
dramatically increased media [TV] portrayal of violence and joblessness
[role models have no jobs, bad guys live in big houses, etc.; begin
your reading with 'The Early Window', by Liebert & Sprafkin], reduced
the standards of education and early training for rational thought
{Roosevelt's Spending War --> Cold Spending War --> War Spending
On Drugs --> War On InterNetCrimePedophileTerrorists - sog}
(Remember that the 'root' of the 'New World Order' agenda can be traced
back to the secret occultic societies connected to Bavaria, Germany
-- the Illuminati, Thule, Nazis, Vril, Rosicrucian, Black Gnostics,
Skull & Bones, Cult of the Serpent, Templars, Babylon Mystery Cult,
O.T.O., Golden Dawn, Jesuits, and all of the many lesser-known inter
locking secret societies which grew out of the occult-military core
of the early Roman Empire and the later 'Holy Roman Empire' [HO.R.E.]
-- a core that had its center of power not only in Rome but also in
Germany. - Branton)
They kill on command. THE ARE ARTIFICIALL-PRODUCED 'MULTIPLE' PERSONALITIES.
One of the top people in their development appears to have been Sirhan
Sirhan's psychiatrist, DR. DIAMOND.
the United Nations Organization or UNO is deeply involved in this fascist
global conspiracy. Just note the controversy surrounding former U.N.
Secretary General and Austrian Kurt Waldheim concerning his Nazi past
and allegations that he is a war criminal
secret Nazi S.S.-connected Society which reputedly has retrieved the
"Spear of Destiny" which so fascinated Adolph Hitler
On the outside Nazism and Communism may seem to be in conflict, however
it was the Rockefellers and the German Black Nobility cults who created
BOTH movements. Tyranny is tyranny, whether it be National Socialism
or Global Socialism. Perhaps the Bavarians created two types of Socialism:
Global Socialism -- as a means to tear down the international competition;
and National Socialism -- as a means to build up the German empire.
We should NEVER forget that Lenin, the Communist Revolutionist, was
an agent of the GERMAN government. What is not commonly known is that
Stalin murdered nearly 6 million Jews during the World War II period,
as did Hitler.
the Rockefeller's -- according to Economics expert and advisor Antony
Sutton and others -- had financially backed BOTH the Bolsheviks AND
the Nazis
We must remember that National Socialism [Nazism] IS 'Socialism'
Col. W.J. Heimlich, former Chief, United States Intelligence, at Berlin,
stated for publication that he was in charge of determining what had
happened to Hitler and after a thorough investigation his report was:
"There was no evidence beyond that of HEARSA to support the THEOR
of Hitler's suicide." He also stated, "On the basis of present evidence,
no insurance company in America would pay a claim on Adolph Hitler."
I still have the September, 1948, issue of a magazine called "The
Plain Truth" with the headline article: "IS HITLER ALIVE, OR DEAD?,"
subtitled: "Here is summarized the conclusions of an exhaustive three
year investigation -- together with reasons for believing Hitler may
be alive and secretly planning the biggest hoax of all history."
Another article in November, 1949, says "The Nazis went underground,
May 16, 1943!" and details a meeting at the residence of Krupp von
Bohlen-Halbach, the head of I.G. FARBEN, etc., at which they planned
"FOR WORLD WAR III."
The June, 1952, issue of "The Plain Truth" is headlined: "HITLER 'May
Be Alive!'" The article states: "Now, NEW FACTS, or purported facts,
leak out. It's reported now that in 1940 the Nazis started to amass
tractors, planes, sledges, gliders, and all sorts of machinery and
materials IN THE SOUTH POLAR REGIONS -- that for the next 4 years Nazi
technicians built, on an almost unknown CONTINENT, Antarctica, the
Fuhrer's SHANGRILA -- a new Berchtesgaden."
{HWA/GTA/SOG - sog}
in spite of Glasnost and the new freedom of access to Russian files,
the files on Hitler are still some of the most
highly classified items of the Soviets.
{The citizen as Schillple...we let Them hide the Truth and
then ridicule anyone with an opinion/view which contadicts
the Official Story. - sog}
{Even when The Facts obviously/blatantly contradict the
Official Story...as per, Hitler not proven dead...ever
see *that* in the school history books? - sog}
Harry Dexter White [real name Weiss] under Henry Morgenthau
When J. Edgar Hoover went to President Truman with all the evidence
that the Assistant Secretary of the Treasury was a Communist spy and
thief, TRUMAN of course removed Weiss [White] from his job -- and PROMOTED
HIM to head of the International Monetary Fund. I kid you not, look
it up. (This tells you whose side Truman was really on. - Branton)
The story has a rather common ending -- when a controversy developed
in the press concerning this incident, Weiss became a "suicide."
{AKA/VFoster/SOP - sog}
"Martin Bormann, Nazi in Exile" by Paul Manning
The Russians were NATIONALISTS, as opposed to [the] Bolsheviks who
took their country away from them. The [so-called] Bolsheviks were
trained in the lower East Side of New ork City and financed by New
ork and London bankers.
They invaded Russia, killed the Tzar and many Nationalists and took
over the government.
{Those with $ and planning win...EoStory. Where do honest people
get funding and support in a corrupt worlds? - sog}
In 1932, the British-led "Eugenics'' movement designated the Rockefellers'
Dr. Rudin as the president of the worldwide Eugenics Federation. The
movement called for the killing or sterilization of people whose HEREDIT
made them a public burden.
A few months later, Hitler took over Germany and the Rockefeller-Rudin
apparatus became a section of the Nazi state. The regime appointed
Rudin head of the Racial Hygiene Society. Rudin and his staff, as
part of the Task Force of Heredity Experts chaired by SS chief Heinrich
Himmler, drew up the sterilization law. Described as an American Model
law, it was adopted in July 1933 and proudly printed in the September
1933 Eugenical News [USA] with Hitler's signature. The Rockefeller
group drew up other race laws, also based on existing Virginia statutes.
The 'T4'' unit of the Hitler Chancery, based on psychiatrists led
by Rudin and his staff, cooperated in creating propaganda films to
sell mercy killing [euthanasia] to German citizens. The public reacted
antagonistically: Hitler had to withdraw a tear-jerker right-to-die
film from the movie theaters. The proper groundwork had not yet been
laid.
Under the Nazis, the German chemical company I.G. FARBEN and Rockefeller's
STANDARD [EXXON] OIL of New Jersey were effectively a SINGLE FIRM,
merged in hundreds of cartel arrangements. I.G. FARBEN was led up
until 1937 by the Warburg family, Rockefeller's partner in banking
and in the design of Nazi German eugenics.
Following the German invasion of Poland in 1939, Standard Oil pledged
to keep the merger with I.G. Farben going even if the U.S. entered
the war. This was exposed in 1942 by Sen. Harry Truman's investigating
committee, and President Roosevelt took hundreds of legal measures
during the war to stop the Standard - I.G. Farben cartel from supplying
the enemy war machine.
In 1940-41, I.G. Farben built a gigantic factory at Auschwitz in Poland,
DR. MENGELE...
In 1943, Otmar Verschuer's assistant Josef Mengele was made medical
commandant of Auschwitz. As wartime director of Rockefeller's Kaiser
Wilhelm Institute for Anthropology, Eugenics and Human Heredity in
Berlin, Verschuer secured funds for Mengele's experiments at Auschwitz
from the German Research Council.
(Remember, the Rockefellers were originally German immigrants to America.
- Branton)
In 1936, Rockefeller's Dr. Franz Kallmann interrupted his study of
hereditary degeneracy and emigrated to America because he was half
Jewish. Kallmann went to New ork and established the Medical Genetics
Department of the New ork State Psychiatric Institute. The SCOTTISH
RITE of Freemasonry published Kallman's study of over 1,000 cases of
schizophrenia, which tried to prove its hereditary basis. In the book,
Kallmann thanked his long-time boss and mentor Rudin.
Kallmann's book, published in 1938 in the USA and Nazi Germany, was
used by the T4 unit as a rationalization to begin in 1939 the murder
of mental patients and various "defectives"
{ForeRunner to genetic/cloning/'grafting' technology - sog}
{Hitler was *scapegoat* for excesses of SOP - sog}
From lreed at west.cscwc.pima.edu Mon Jul 27 00:15:56 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 27 Jul 1998 00:15:56 -0700 (PDT)
Subject: FDR8
Message-ID: <009C9C7C.68C856E0.17@west.cscwc.pima.edu>
In the 1950s, the Rockefellers reorganized the U.S. eugenics movement
in their own family offices, with spinoff population-control AND abortion
groups The Eugenics Society changed its name to the "Society for the
Study of Social Biology", its current name.
With support from the Rockefellers, the Eugenics Society [England]
set up a sub-committee called the INTERNATIONAL PLANNED PARENTHOOD
FEDERATION, which for 12 years had no other address than the Eugenics
Society.
(Note: Margaret Sanger plays a central role in this PLANNED PARENTHOOD
network.
In her book 'PIVOT OF CIVILIZATION', in reference to free MATERNIT
care for the poor, Sanger states: "Instead of DECREASING and aiming
to ELIMINATE THE STOCKS that are most detrimental to the future of
the race and the world it tends to render them to a menacing degree
dominant.")
{PILOT Of Civilization(?) - sog}
Rockefellers, who played a major role in grooming the agents of the
Communist-Socialist revolution in Russia AND the agents of the National
Socialist revolution in Germany. Whether it is left-handed Socialism
or right-handed Socialism -- Socialism either way you look at it is
TOTALITARIANISM! - Branton).
"...How many of you have seen the book 'BLANK CHECK'?... It is not
a UFO book. I strongly recommend that you read the book 'BLANK CHECK'
so that you can understand something about how these projects are funded
without your say so, indeed WITHOUT THE SA SO OF CONGRESS.
Garrison might have convicted Clay Shaw if not for the fact that Garrison's
star witness David Ferry was killed a few days before he was to testify
at Clay Shaw's trial.
*** FEMA / FEMA / FEMA ***
(Most do not realize that Adolph Hitler's second book, after he wrote
MEIN KAMPF, was titled -- believe it or not -- "THE NEW WORLD ORDER".
- Branton)
SPECULATE NO MORE ON THE SUSPICIOUS SUICIDE OF ADMIRAL MICHAEL BOORDA
[FORMER DIRECTOR OF THE U.S. NAVAL FORCES]. I WAS INFORMED HE WAS
TERMINATED BECAUSE OF HIS REFUSAL TO COOPERATE IN THE COVERT PLAN B
OUR TRAITOROUS NWO FORCES WITHIN OUR OWN GOVERNMENT TO ASSIST IN THE
COMING INVASION OF AMERICA.
{America is in perfect position to serve as the Great Beast of the
World which must be destroyed, like Nazi Germany. - sog}
The following information is c1997, Andrew H. Hochheimer, and may not
be reposted without written permission.
{es it can... - sog}
I think it is important that people start reading 'The Full Story'
when pursuing any fringe topic like
Ufology, the Bermuda Triangle, etc. There are plenty of paranoid delusionists
writing books like
"Aliens told me 'Humans taste like chicken...'"
file:///C|/New Deal/Dave Emory/Nazi Roosevelt.txt
Topic 203 Hitler won
gn:peacenews News from War Resisters International 7:18 PM Apr
25, 1995
by MILAN RAI
First the empire, second the war against Nazism -- and even that
only to secure "our interests". The historical record after the war
bears out these priorities. Throughout the world, the British and
US governments installed those willing to cater to their
"interests", even when these were fascists or collaborators who the
war had supposedly been against. Throughout the world, Britain and
the USA destroyed those who stood in the way of their plans for
control, even when these resisters were the democrats and
anti-fascists who had fought alongside the Anglo-American forces.
Subject:
"... would cause us to look at this person as a threat"
Date:
Tue, 12 May 1998 11:45:14 -0700
From:
Tim May
To:
cypherpunks at cyberpass.net
I just saw this on one of the newsgroups:
"A cultist is one who has a strong belief in the Bible and the Second
Coming of Christ; who frequently attends Bible studies; who has a high
level of financial giving to a Christian cause; who home schools for
their children; who has accumulated survival foods and has a strong
belief in the Second Amendment; and who distrusts big government.
Any
of these may qualify [a person as a cultist] but certainly more than
one
[of these] would cause us to look at this person as a threat, and his
family as being in a risk situation that qualified for government
interference."
-Attorney General Janet Reno, Interview on 60 Minutes, June 26, 1994
No wonder the government views so many people as threats.
How does "qualified for government interference" square with the First,
Second, and Fourth Amendments?
(No doubt Janet also believes that belief in that pesky Fifth Amendment,
not to mention the rest of the Constitution, will cause the government
to
look at these wackos as threats and worth of "government interference."
I'm looking forward to the ear 2000 Meltdown. This fucked up country
needs
a low-level reformatting. And a million government criminals and welfare
addicts sent to the wall.
--Tim May
"The tree of liberty must be watered periodically with the blood of
tyrants...."
---------:---------:---------:---------:---------:---------:------
--:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms,
zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Licensed Ontologist | black markets, collapse of governments.
Long ago and far away, Adolf Hitler was talking to Hermann Rauschning
and
said, "The people about us are unaware of what is really happening
to them:
They gaze fascinated at one or two familiar superficialities, such
as
possession and income and rank and other outworn conceptions. As long
as
these are kept intact, they are quite satisfied. But in the meantime
they
have entered a new relation: a powerful social force has caught them
up.
They themselves are changed. What are ownership and income to that?
Why need
we trouble to socialize banks and factories? We socialize human beings."
I see someone has made a TV movie of "Brave New World." Are we to view
it
as a work of fiction, or a Scribean foreshadowing of what looms in
the very
near future?
Geoff Metcalf
"War is a matter of vital importance for the state;
it is the province of life and death, the road which
leads to survival or elimination. It is essential
to study it in depth".
Sun Tzu, "The Art of War"
http://www.monde-diplomatique.fr/md/en/1997/08-09/marcos.html
The fourth world war has begun
In Chiapas, the Zapatista National Liberation
Army issued no directives about the elections, choosing instead
to withdraw to the sheltering greenery of the Lacandona Forest.
>From this sanctuary the head of the ZNLA, Sub-Commandant
Marcos, sent us this original and geostrategic analysis of the
new world picture.
by Sub-Commandant Marcos
* Zapatista National Liberation Army, Chiapas, Mexico
The defeat of the "evil empire" has opened up new markets, and the
struggle over
them is leading to a new world war - the fourth.
Unlike the third world war, in which the conflict between capitalism
and socialism
took place over a variety of terrains and with varying degrees of intensity,
the fourth
world war is being conducted between major financial centres in theatres
of war that
are global in scale and with a level of intensity that is fierce and
constant.
The third world war showed the benefits of "total war" for its victor,
which was
capitalism. In the post-cold war period we see the emergence of a new
planetary
scenario in which the principal conflictual elements are the growing
importance of
no-man's-lands (arising out of the collapse of the Eastern bloc countries),
the
expansion of a number of major powers (the United States, the European
Union and
Japan), a world economic crisis and a new technical revolution based
on information
technology.
Thanks to computers and the technological revolution, the financial
markets,
operating from their offices and answerable to nobody but themselves,
have been
imposing their laws and world-view on the planet as a whole. Globalisation
is merely
the totalitarian extension of the logic of the finance markets to all
aspects of life.
Where they were once in command of their economies, the nation states
(and their
governments) are commanded - or rather telecommanded - by the same
basic logic
of financial power, commercial free trade. And in addition, this logic
has profited
from a new permeability created by the development of telecommunications
to
appropriate all aspects of social activity. At last, a world war which
is totally total!
The new international capitalism renders national capitalism
obsolete and effectively starves their public powers into extinction.
The blow has
been so brutal that sovereign states have lost the strength to defend
their citizens'
interests.
The fine showcase inherited from the ending of the cold war - the new
world order -
has shattered into fragments as a result of the neoliberal explosion.
It takes no more
than a few minutes for companies and states to be sunk - but they are
sunk not by
winds of proletarian revolution, but by the violence of the hurricanes
of world finance.
The son (neoliberalism) is devouring the father (national capital)
and, in the process,
is destroying the lies of capitalist ideology: in the new world order
there is neither
democracy nor freedom, neither equality nor fraternity. The planetary
stage is
transformed into a new battlefield, in which chaos reigns.
Megalopolises are reproducing themselves right across the planet. Their
favourite
spawning ground is in the world's free trade areas. In North America,
the North
American Free Trade Agreement between Canada, the United States and
Mexico is
a prelude to the accomplishment of an old dream of US conquest: "America
for the
Americans".
Are megalopolises replacing nations? No, or rather not merely that.
They are
assigning them new functions, new limits and new perspectives. Entire
countries are
becoming departments of the neoliberal mega-enterprise.
the financial centres are working on a reconstruction of nation states
and are
reorganising them within a new logic: the economic has the upper hand
over the
social.
In this new war, politics, as the organiser of the nation state, no
longer exists. Now
politics serves solely in order to manage the economy, and politicians
are now merely
company managers.
The world's new masters have no need to govern directly. National governments
take
on the role of running things on their behalf. This is what the new
order means -
unification of the world into one single market.
The unification produced by
neoliberalism is economic: in the giant planetary hypermarket it is
only commodities
that circulate freely, not people.
What we have
here is a destruction of the material bases of nation states, but we
also have a
destruction of history and culture.
Neoliberalism thus imposes the destruction of
nations and of groups of nations in order to fuse them into one single
model. The war
which neoliberalism is conducting against humanity is thus a planetary
war, and is the
worst and most cruel ever seen.
What we have here is a puzzle.
The first of these pieces is the two-fold accumulation of wealth and
of poverty at the
two poles of planetary society. The second is the total exploitation
of the totality of
the world. The third is the nightmare of that part of humanity condemned
to a life of
wandering. The fourth is the sickening relationship between crime and
state power.
The fifth is state violence. The sixth is the mystery of megapolitics.
The seventh is the
multiple forms of resistance which humanity is deploying against neoliberalism.
Piece no. 1: The concentration of wealth and the distribution of poverty
The earth has five billion human inhabitants:
of these, only 500 million live comfortably; the remaining 4.5 billion
endure lives of
poverty.
The gap between rich and poor is enormous: far from decreasing, social
inequalities are growing.
Piece no. 2: The globalisation of exploitation
the world capitalist system is
"modernising" the production, circulation and consumption of commodities.
The new
technological revolution (information technology) and the new revolution
in politics
(the megalopolises emerging from the ruins of the nation state) produce
a new social
"revolution". This social revolution consists of a rearrangement, a
reorganisation of
social forces and, principally, of the workforce.
The world's economically active population (EAP) went from 1.38 billion
in 1960 to
2.37 billion in 1990. A large increase in the number of human beings
capable of
working and generating wealth. But the new world order arranges this
workforce
within specific geographical and productive areas, and reassigns their
functions (or
non-functions, in the case of unemployed and precarious workers) within
the plan of
world globalisation. The world's economically active population by
sector (EAPS)
has undergone radical changes during the past 20 years. Agriculture
and fishing fell
from 22 % in 1970 to 12 % in 1990; manufacture from 25 % to 22 %; but
the
tertiary sector (commercial, transport, banking and services) has risen
from 42 % to
56 %. In developing countries, the tertiary sector has grown from 40
% in 1970 to
57 % in 1990, while agriculture and fishing have fallen from 30 % to
15 % (2). This
means that increasing numbers of workers are channelled into the kind
of activities
necessary for increasing productivity or speeding up the creation of
commodities
this "modern" capitalist production
continues to rely on child labour. Out of 1.15 billion children in
the world, at least
100 million live on the streets and 200 million work
The globalised
market is destroying small and medium- sized companies. With the disappearance
of
local and regional markets, small and medium producers have no protection
and are
unable to compete with the giant transnationals.
All this combines to create a specific surplus: an excess of human
beings who are
useless in terms of the new world order because they do not produce,
do not
consume, and do not borrow from banks. In short, human beings who are
disposable. Each day the big finance centres impose their laws on countries
and
groups of countries all around the world. They re-arrange and re-order
the
inhabitants of those countries. And at the end of the operation they
find there is still an
"excess" of people.
Piece no. 3: Migration, a nightmare of wandering
there is a proliferation of "regional wars" and "internal
conflicts"; capital follows paths of atypical accumulation; and large
masses of workers
are mobilised. Result: a huge rolling wheel of millions of migrants
moving across the
planet. As "foreigners" in that "world without frontiers" which had
been promised by
the victors of the cold war, they are forced to endure racist persecution,
precarious
employment, the loss of their cultural identity, police repression,
hunger, imprisonment
and murder.
The fourth world war - with its
mechanisms of destruction/depopulation and reconstruction/reorganisation
- involves
the displacement of millions of people. Their destiny is to wander
the world, carrying
the burden of their nightmare with them, so as to constitute a threat
to workers who
have a job, a scapegoat designed to make people forget their bosses,
and to provide
a basis for the racism that neoliberalism provokes.
Piece no. 4: Financial globalisation and the generalisation of crime
With the beginning of the fourth world war, organised crime has globalised
its
activities. The criminal organisations of five continents have taken
on board the "spirit
of world cooperation" and have joined together in order to participate
in the conquest
of new markets. They are investing in legal businesses, not only in
order to launder
dirty money, but in order to acquire capital for illegal operations.
Their preferred
activities are luxury property investment, the leisure industry, the
media - and
banking.
According to a UN report,
the involvement of crime syndicates has been facilitated by the programmes
of
structural adjustment which debtor countries have been forced to accept
in order to
gain access to International Monetary Fund loans (3).
So here we have the rectangular mirror within which legality and illegality
exchange
reflections. On which side of the mirror is the criminal? And on which
side is the
person who pursues him?
Piece no. 5: Legitimate violence of illegitimate powers
In the cabaret of globalisation, the state performs a striptease, at
the end of which it is
left wearing the minimum necessary: its powers of repression. With
its material base
destroyed, its sovereignty and independence abolished, and its political
class
eradicated, the nation state increasingly becomes a mere security apparatus
in the
service of the mega-enterprises which neoliberalism is constructing.
Instead of
orienting public investment towards social spending, it prefers to
improve the
equipment which enables it to control society more effectively.
What is to be done when the violence derives from the laws of the market?
Where is
legitimate violence then? And where the illegitimate?
The monopoly of
violence no longer belongs to nation states: the market has put it
up for auction.
However, when the monopoly of violence is contested not on the basis
of the laws of
the market, but in the interests of "those from below", then world
power sees it as
"aggression". This is one of the (least studied and most condemned)
aspects of the
challenges launched by the indigenous peoples in arms and in rebellion
of the
Zapatista National Liberation Army against neoliberalism and for humanity.
The new world police
wants national armies and police to be simple security bodies guaranteeing
order and progress within the megalopolises of neoliberalism.
Piece no. 6: Megapolitics and its dwarfs
But neoliberalism does not conduct its war
solely by "unifying" nations and regions. Its strategy of destruction/depopulati
on
and
reconstruction/reorganisation also produces a fracture or fractures
within the nation
state. This is the paradox of this fourth world war: while ostensibly
working to
eliminate frontiers and "unite" nations, it actually leads to a multiplication
of frontiers
and the smashing apart of nations.
The elimination of trade
frontiers, the explosion of telecommunications, information superhighways,
the
omnipresence of financial markets, international free trade agreements
- all this
contributes to destroying nation states and internal markets. Paradoxically,
globalisation produces a fragmented world of isolated pieces, a world
full of
watertight compartments which may at best be linked by fragile economic
gangways.
Mega-politics globalises
national politics - in other words it ties them to a centre which has
world interests and
which operates on the logic of the market. It is in the name of the
market that wars,
credits, buying and selling of commodities, diplomatic recognition,
trade blocs,
political support, laws on immigration, breakdowns of relationships
between
countries and investment - in short, the survival of entire nations
- are decided.
The world-wide power of the financial markets is such that they are
not concerned
about the political complexion of the leaders of individual countries:
what counts in
their eyes is a country's respect for the economic programme. Financial
disciplines
are imposed on all alike. These masters of the world can even tolerate
the existence
of left-wing governments, on condition that they adopt no measure likely
to harm the
interests of the market. However, they will never accept policies that
tend to break
with the dominant model.
Piece no. 7: Pockets of resistance
"To begin with, I ask you not to confuse resistance with political
opposition.
Opposition does not oppose itself to power but to a government, and
its fully-formed
shape is that of an opposition party; resistance, on the other hand,
cannot be a party,
by definition: it is not made in order to govern but... to resist."
(TomY s Segovia,
"Alegatorio", Mexico, 1996)
The apparent infallibility of globalisation comes up hard against the
stubborn
disobedience of reality. While neoliberalism is pursuing its war, groups
of protesters,
kernels of rebels, are forming throughout the planet. The empire of
financiers with full
pockets confronts the rebellion of pockets of resistance. es, pockets.
Of all sizes,
of different colours, of varying shapes. Their sole common point is
a desire to resist
the "new world order" and the crime against humanity that is represented
by this
fourth world war.
Whereas the ZNLA fights to defend national sovereignty, the Mexican
Federal Army
functions to protect a government which has destroyed the material
bases of
sovereignty and which has offered the country not only to large-scale
foreign capital,
but also to drug trafficking.
The possible shapes are as numerous as the forms of
resistance themselves, as numerous as all the worlds existing in this
world. So draw
whatever shape you like. In this matter of pockets, as in that of resistance,
diversity is
a wealth.
THE WHITE HOUSE
Office of the Press Secretary
________________________________________________________________________
For Immediate Release May 12,
1998
INTERNATIONAL CRIME CONTROL STRATEG
BACKGROUND
International crime is a serious and potent threat to the American
people at home and abroad. Drug and firearms trafficking, terrorism,
money laundering, counterfeiting, illegal alien smuggling, trafficking
in women and children, advanced fee scams, credit card fraud, auto
theft, economic espionage, intellectual property theft, computer
hacking, and public corruption are all linked to international criminal
activity and all have a direct impact on the security and prosperity
of
the American people.
Americans spend billions of dollars annually on cocaine and heroin,
all
of which originates abroad; in 1997, there were 123 terrorist attacks
against U.S. targets worldwide, including 108 bombings and eight
kidnappings; each year, approximately one billion dollars worth of
stolen cars are smuggled out of this country; annually, U.S. companies
lose up to $23 billion from the illegal duplication and piracy of films,
compact discs, computer software, pharmaceutical and textile products,
while U.S. credit card companies suffer losses of hundreds of millions
of dollars from international fraud; and several hundred U.S. companies
and other organizations have already suffered computer attacks in 1998,
resulting in millions of dollars of losses and significant threats
to
our safety and security.
PURPOSE
The International Crime Control Strategy (ICCS) addresses this
increasing threat by providing a framework for integrating all facets
of
the federal government response to international crime. This first
ever
strategy reflects the high priority accorded international crime by
this
Administration and builds on such existing strategies as the National
Drug Control Strategy and the Presidential Directives on alien
smuggling, counter-terrorism and nuclear materials safety and security.
The ICCS is also an important initiative in terms of enhancing the
ability of U.S. law enforcement officials to cooperate effectively
with
their overseas counterparts in investigating and prosecuting
international crime cases. At the upcoming Birmingham Summit, G-8
leaders will discuss international crime as one of the most pressing
issues related to increasing globalization and rapid technological
and
economic change. President Clinton will highlight the new ICCS in
underscoring the U.S. commitment to close cooperation with all nations
who are mobilizing to confront this increasing threat.
OVERVIEW
The ICCS is a plan of action containing eight broad goals with thirty
implementing objectives. The ICCS expresses President Clinton's resolve
to combat international crime aggressively and substantially reduce
its
impact on the daily lives of the American people.
The Strategy's eight goals and related objectives are:
1. Extend the First Line of Defense Beyond U.S. Borders by
(a) preventing acts of international crime planned abroad before
they occur, (b) using all available laws to prosecute select
criminal acts committed abroad, and (c) intensifying activities
of law enforcement, diplomatic and consular personnel abroad.
2. Protect U.S. Borders by (a) enhancing our land border inspection,
detection and monitoring capabilities, (b) improving the
effectiveness of maritime and air smuggling interdiction efforts,
(c) seeking new, stiffer criminal penalties for smuggling
activities, and (d) targeting enforcement and prosecutorial
resources more effectively against smuggling crimes and
organizations.
3. Deny Safe Haven to International Criminals by (a) negotiating
new
international agreements to create a seamless web for the prompt
location, arrest and extradition of international fugitives,
(b) implementing strengthened immigration laws that prevent
international criminals from entering the United States and
provide for their prompt expulsion when appropriate, and
(c) promoting increased cooperation with foreign law enforcement
authorities.
4. Counter International Financial Crime by (a) combating money
laundering and strengthening enforcement efforts to reduce inbound
and outbound movement of criminal proceeds, (b) seizing the assets
of international criminals, (c) enhancing bilateral and
multilateral cooperation against all financial crime, and
(d) targeting offshore centers of international fraud,
counterfeiting, electronic access device schemes and other
financial crimes.
5. Prevent Criminal Exploitation of International Trade by (a)
interdicting illegal technology exports, (b) preventing unfair and
predatory trade practices in violation of U.S. criminal law, (c)
protecting intellectual property rights, (d) countering industrial
theft and economic espionage of U.S. trade secrets, and (e)
enforcing import restrictions on certain harmful substances,
dangerous organisms and protected species.
6. Respond to Emerging International Crime Threats by (a) disrupting
new activities of international organized crime groups,
(b) enhancing intelligence efforts against criminal enterprises,
(c) reducing trafficking in human beings and crimes against
children, (d) increasing enforcement efforts against high tech
and computer-related crime, and (e) continuing to identify and
counter the vulnerabilities of critical infrastructures and new
technologies in high tech areas.
7. Foster International Cooperation and the Rule of Law by
(a) establishing international standards, goals and objectives to
combat international crime and by actively encouraging compliance,
(b) improving bilateral cooperation with foreign governments and
law enforcement authorities, and (c) strengthening the rule of law
as the foundation for democratic government and free markets in
order to reduce societies' vulnerability to criminal exploitation.
8. Optimize the Full Range of U.S. Efforts by (a) enhancing executive
branch policy and operational coordination mechanisms to
the risks of criminal threats and to integrate strategies, goals
and objectives to combat those threats, (b) mobilizing and
incorporating the private sector into U.S. government efforts, and
(c) developing measures of effectiveness to assess progress over
time.
ICCS INITIATIVES
Highlighted below are ten Administration initiatives to further our
efforts to fight international crime.
1. International Crime Control Act of 1998: Proposed legislation
containing significant new law enforcement tools for the fight against
international crime.
2. Comprehensive Threat Assessment: A comprehensive assessment of
the
threat to the American people posed by international crime, to be
completed within six months.
3. International Conference on Upholding Integrity Among Justice and
Security Officials: An international conference to address upholding
integrity among key justice and security officials worldwide, to be
organized by the Vice President within the next six months.
4. High Tech Crime: An action plan, building on the work of the G
8
justice and interior ministers and the creation of the U.S. National
Infrastructure Protection Center, to protect interconnected U.S.
communications and information systems from attack by international
criminals.
5. Border Law Enforcement: A program to enhance border law enforcement
through deployment of advanced detection technology and investment
of
new resources.
6. Financial Crimes: A commitment to employ aggressively new tools
to
deny criminals access to U.S. financial institutions and to enhance
enforcement efforts against financial crimes.
7. International Asset Forfeiture and Sharing: A U.S. call for new
criminal asset forfeiture regimes worldwide and new asset forfeiture
sharing agreements with our international partners.
8. OAS Treaty Against Illicit Trafficking in Firearms: A program
to
work with our OAS partners to implement fully a hemispheric convention
to combat the illicit manufacturing of and trafficking in firearms,
ammunition and explosives.
9. Economic Espionage and Theft of Industrial Property: A commitment
to use the Economic Espionage Act to increase U.S. investigations and
prosecutions of individuals and companies who attempt to steal U.S.
proprietary information.
10. Strategic Communications Plan: A plan to engage the private
sector in assessing the impact of international crime on that sector
and in determining its appropriate role in countering this threat.
From cory4321 at yahoo.com Mon Jul 27 01:11:23 1998
From: cory4321 at yahoo.com (Cory)
Date: Mon, 27 Jul 1998 01:11:23 -0700 (PDT)
Subject: Stego program for jpg or wav? (dos/win)
Message-ID: <19980727080953.16123.rocketmail@send1e.yahoomail.com>
I'm looking for a steganogrophy program for dos/win that
supports wav and one that supports jpg files. Any help?
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com
From alan at clueserver.org Sun Jul 26 10:33:59 1998
From: alan at clueserver.org (Alan Olsen)
Date: Mon, 27 Jul 1998 01:33:59 +0800
Subject: [FP] NHTSA - Digital Image Photo Licenses
In-Reply-To: <3.0.3.32.19980726120135.03892610@rboc.net>
Message-ID: <3.0.5.32.19980726102743.04234220@clueserver.org>
At 12:01 PM 7/26/98 -0400, Robert A. Costner wrote:
>
>The following is taken from today's SCAN newsletter.
>
>======================================================================
>SCAN THIS NEWS
>7/26/98
>
>Following is a brief excerpt from the -
>
>"U.S. Department of Transportation"
>"National Highway Traffic Safety Administration"
>
>"The Highway Safety Desk Book"
>
>regarding digitized driver's license photos.
[snip]
>The implications for law enforcement go far beyond these obvious benefits.
>With a central image database of every driver in a state, the public safety
>community has a ready-made storehouse of photos to be used in criminal
>investigations.....
Oregon already has this. (We seem to be an official beta test site for
every draconian measure or propaganda campaign they want to implement on a
national scale.)
The digital licensing program hear was VERY expensive and full of cost
over-runs. If your state legislature tells you it can be done inexpensivly
or is a "cost cutting measure" they are lying their asses off.
---
| "That'll make it hot for them!" - Guy Grand |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer: |
| mankind free in one-key-steganography-privacy!" | Ignore the man |
|`finger -l alano at teleport.com` for PGP 2.6.2 key | behind the keyboard.|
| http://www.ctrl-alt-del.com/~alan/ |alan at ctrl-alt-del.com|
From mitch at duzen.com.tr Mon Jul 27 01:56:32 1998
From: mitch at duzen.com.tr (S. M. Halloran)
Date: Mon, 27 Jul 1998 01:56:32 -0700 (PDT)
Subject: The Plot
In-Reply-To: <009C9C13.3FFFC220.15@west.cscwc.pima.edu>
Message-ID: <199807270750.KAA15929@ankara.192.168.3.5>
>
>
> 2. Presidents and other political figures seem to die at
> particular junctures of time wherein they have already
> served their purpose to the Controllers. (Note: 'die'
> either physically or politically.
> i.e. - FDR croaking shortly after getting Truman
> elected as the hand-picked replacement of shadowy
> figures.
>
> 3. Ronald Reagan and FDR were both 'front men' for their
> wives, and/or those in their wives shadowy background.
> FDR, through the efforts of Elanor and her cohorts,
> was paid A QUARTER OF A MILLION DOLLARS in order to
> enter the New ork governor's race.
If Linda finds out that you have hacked her mail account and are using it
as a platform in which to be bizarre beyond belief, she just might have
the wherewithal to track you down to the ends of the earth and give us all
cause to believe your demise is yet another conspiracy among those you
have already listed. :)
Mitch Halloran
Research (Bio)chemist
Duzen Laboratories Group
Ankara TURKEY
mitch at duzen.com.tr
Happiness is an activity of the soul in accordance with perfect virtue
--from one translation of Aristotle's Nichomachean Ethics
From Nina.Huupponen at DataFellows.com Mon Jul 27 04:35:27 1998
From: Nina.Huupponen at DataFellows.com (Nina Huupponen)
Date: Mon, 27 Jul 1998 04:35:27 -0700 (PDT)
Subject: Data Fellows Announces F-Secure Workstation Suite 3.0
Message-ID: <3.0.3.32.19980727124728.009eac60@smtp.datafellows.com>
For immediate release
27 July 1998
DATA FELLOWS ANNOUNCES F-SECURE WORKSTATION SUITE 3.0
The World�s First Suite Product with Strong Encryption Provides
Corporations with a Complete Security Solution
HELSINKI, FINLAND, July 27, 1998 -- Data Fellows, a leading developer of
data security solutions, today announced F-Secure Workstation Suite. The
product provides a reliable and easy-to-manage solution for most data
security concerns of modern corporations.
"F-Secure Workstation Suite provides centralized management of most
corporate security aspects," says Mr. Risto Siilasmaa, Chief Executive
Officer of Data Fellows. "It combines world-class protection against
malicious code with unobtrusive file and network encryption. F-Secure
Workstation Suite is easily integrated into the enterprise�s management
system. The Suite is also totally unobtrusive for the corporate end-users."
F-Secure Workstation Suite is the only product to combine world-class
anti-virus protection with strong encryption for network traffic and files
stored on the hard disk. Competing offerings from Network Associates and
Symantec are not available world-wide with strong encryption. They also
lack the centralized policy based management features announced for
F-Secure Workstation Suite 4.0.
Unparalleled Virus Protection
The components of F-Secure Workstation Suite utilize the absolute latest
technology in the field. Malicious code detection and removal is based on
the F-Secure Anti-Virus product line, the first anti-virus in the world to
use multiple scanning engines simultaneously through its revolutionary
CounterSign architecture. Its detection rates are unparalleled, and
automated updates to the whole network further enhance its reliability.
Real-Time File Encryption and IPsec-Based Network Encryption
F-Secure Workstation Suite is the only suite product currently available to
offer strong encryption all over the world. The product uses an encryption
key length of 128 bits or more. The administrator can choose from supported
algorithms, including RSA, 3DES and Blowfish. All the most widely used
authentication methods are supported.
Should the authorized user forget his/her password, the product also
contains a safe and easy administrative key retrieval function.
"The file encryption component of F-Secure Workstation Suite provides
real-time protection for confidential data. F-Secure FileCrypto
automatically encrypts all open and temporary files. Not only is encryption
completely unobtrusive to the end-user, but it is also extremely secure:
there is no way the user can accidentally store confidential information in
plain text," explains Mr. Siilasmaa.
F-Secure Workstation Suite�s network encryption, F-Secure VPN+, is based on
the latest IPsec standards. The F-Secure VPN+ is fully scalable: it
contains three components (Client, Server and Gateway) which can be
combined to build all major types of virtual private networks. These
include connections between organizations and their partners, home offices,
or employees on the road. F-Secure VPN+ is also fully transparent to the
end-user, as it uses IP protocol at the network level, which is invisible
at the application level. The
F-Secure Workstation Suite product contains the client component of
F-Secure VPN+. The Server and Gateway components are available separately.
Availability
The first version of F-Secure Workstation Suite will operate in the
Microsoft Windows NT environment. The product will be available from the
Data Fellows resellers around the world in August 1998. Prices will start
from $68 per seat for a 100-user license.
The 4.0 version will be available in early fourth quarter 1998. This
version will be a fully integrated, policy-based security solution, making
it possible to manage data security issues in accordance with the corporate
security policy. The product will be based on a three tier management
architecture with considerable scalability advantages in a large
organization. In addition to Microsoft Windows NT, it will also operate in
the Microsoft Windows 95 and Windows 98 environments.
All users of F-Secure Workstation Suite 3.0 will receive a free upgrade to
the 4.0 version as it ships.
Easy-to-Use Management and Scalability
The installation of F-Secure Workstation Suite 4.0 requires no work at the
actual workstation, and no configuration from the end-user after the
installation. The entire corporate system can be managed centrally. Thus
the management of vital security issues is effective but completely
transparent to the end-user. F-Secure Workstation Suite supports the
industry-standard SNMP protocol, integrates with Microsoft Systems
Management Server (SMS) and will include agents for leading enterprise
management products, such as CA Unicenter, IBM Tivoli and HP OpenView.
F-Secure Workstation Suite 4.0 comes bundled with F-Secure Administrator, a
Pure Java based graphical console for managing the security policies for
the whole enterprise network.
About Data Fellows
Data Fellows is one of the world�s leading developers of data security
products with offices in San Jose, California and Espoo, Finland. Its
groundbreaking F-Secure product family is a unique combination of globally
available strong encryption and revolutionary anti-virus software. The
integrated F-Secure product range provides complete security solutions for
enterprises of any size. It includes file encryption and IPsec
communication encryption products, VPN gateways, SSH based secure remote
management software, easy-to-use solutions for distributed DNS management,
and a full range of anti-virus products for workstations, servers and
gateways. Data Fellows is also the developer of the award winning F-PROT
Professional anti-virus product, the scanning engine of which is now an
integral part of the multi-engine structure of F-Secure Anti-Virus.
Data Fellows is privately owned. Since its foundation in 1988, the
company�s annual growth in net sales has been 90%. Data Fellows offers a
worldwide network of technical support, training and distribution in over
80 countries. Data Fellows belongs to an elite group of companies with a
triple-A rating from Dun&Bradstreet.
For further information, please contact
USA:
Data Fellows Inc.
Mr. Pirkka Palomaki, Product Manager
Tel. +1 408 938 6700, Fax +1 408 938 6701
E-mail: Pirkka.Palomaki at DataFellows.com
Finland:
Data Fellows Ltd.
Mr. Ari Hypponen, Director of Development
Tel. +358 9 859 900, Fax. +358 9 8599 0599
E-Mail: Ari.Hypponen at DataFellows.com
or visit our web site at http://www.DataFellows.com/
From nobody at replay.com Mon Jul 27 06:16:10 1998
From: nobody at replay.com (Anonymous)
Date: Mon, 27 Jul 1998 06:16:10 -0700 (PDT)
Subject: No Subject
Message-ID: <199807271316.PAA14820@replay.com>
Has anyone consider the possibility that the dude who
shot his way into the Capitol did so as a result of
his mental infirmities being _healed_ by DC water?
Has any family member been quoted as saying,
"Thank God! He's finally come to his senses."
JustWonderingMonger
From lreed at west.cscwc.pima.edu Mon Jul 27 08:07:16 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 27 Jul 1998 08:07:16 -0700 (PDT)
Subject: Quaint Customs Warning - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <009C9CBE.41EC8040.19@west.cscwc.pima.edu>
Canadian Customs Warning - SPACE ALIENS HIDE M DRUGS!!!
________________________________________________________
Although the Reptilian Nazis making preparations in the lavoratories
of their SecretUnderGroundBunkers pose an eventual threat to the safety
and security of humanity itself, there are many more immediate dangers
present in our lives which can bring serious consequences to anyone who
remains unaware of them.
Thus, I feel that it is important for everyday, average citizens to
issue travel warnings for those who may be thinking in venturing into
some of the more corrupt areas of the world, such as Canada, where they
may find themselved subject to arbitrary and capricious actions by the
heavy-handed Canadian Customs BorderGuards before even being allowed to
enter the country, after which they will be subject to whatever illegal
acts and measures that the Royal Canadian Mounted Police choose to
perpetrate upon them.
It is particularly important to be wary of entering through certain
Customs ports, such as Regway, Saskatchewan, which have a long history
of abuse of authority and criminal malefeasance.
Bill Mitchell, a Canadian Customs OffalSlur at the Regway port, has
been known to steal thousands of dollars worth of goods from those passing
through while he is on duty, while being extremely evasive when asked
about the legality of his conduct, as well as being very inept at hiding
the fact that he is a lying, scumbag piece of shit who is not intelligent
enough to tell even halfway believable lies.
Although I normally advise people to make what effort they can to get
whatever measure of Justice they can through normal legal channels, in
the case of countries such as Canada, where even high-ranking political
figures are known to be corrupt, where many of the Judges have histories
of corruption, substance abuse and complicity in the illegal activities
of law enforcement officials, I certainly could not find fault with
anyone who surveyed the situation they found themselves in and decided
that their best option was to used armed force to prevent becoming a
victim of the oppressive, unethical and illegal actions of armed bandits
working under the cover of Canadian Government Authority.
As well, although one might morally and ethically be perfectly justified
in putting a bullet through the brain of armed Canadian Government Bandits
who have been trained to deal violently with any person who resists their
attempts at enforcing their alleged authority, even when doing so in an
unethical and illegal manner, it would be unwise for them to act hastily,
since one must be prepared to follow through in regard to such an action,
by also eliminating any other government agents who may be present and
would constitute an immediate or future threat to the individual who
refuses to be subjected to illegal and unethical government actions.
Although I suppose that one might make a case for being 'better safe
than sorry' when entering Canada through a port such as Regway, and just
going ahead and whacking out the whole lot of them, so that they don't
have a chance to get the jump on you, before proceeding into the country,
I personally think that if one has prepared in advance for dealing with
the danger that the Regway Customs OffalSlurs represent, then this option
should not be necessary.
Of course, I realize that I, myself, am a rather conservative person,
so I would certainly not pass judgement on those who are more of a
'take the BullShit by the horns' type of individual.
Being, as I say, rather conservative by nature, I don't usually feel
it necessary to immediately put to death violent armed Canadian Government
Thugs for their crimes against myself or other citizens, even though doing
so might well help to prevent future criminal abuses by violent, armed
people in positions of authority, since there area variety of other routes
that one might take in extracting a measure of Justice or EqualizationOf
TheAnalSexualBalanceOfTheTao.
As always, anyone who chooses to attempt to receive redress for the
crimes committed against them by those in authoritative government
positions will be fighting a battle in which the Canadian Justice System
is stacked against them. Even though Judge Lee, a notorious drunkard who
has performed GodOnlyKnows how many travesties of justice while rendering
legal judgements while totally ShitFaced, has retired, many of the other
Canadian judges, while perhaps not being as totally out-of-control, are
nonetheless known to rubber-stamp pretty much every instance of criminal]
abuse perpetrated on the citizenry, as a matter of course.
Likewise, the Saskatchewan Justice Department is well-known by the
citizens to be a FuckingJoke (TM), and that any person who dares to
file a complaint against members of the Canadian Legal Community can
expect to be subjected to ridicule and abuse by Justice Department
Investigators, as well as perhaps finding themselves the target of
further persecution by those being WhiteWashed by their Justice Department
BumBuddies.
Realizing that any citizen who shot and killed an armed intruder in his
home who was attempting to rob HimOrHer of thousands of dollars worth of
personal propery would likely be regarded as a hero, while a citizen who
shot and killed an ArmedCanadianGovernmentThug who was doing the same,
would be the immediate subject of villification by all arms of Canadian
Opinon/Reality Creating Agencies, my own preference is to set a goal of
returning (1,000)Tit-for-(1)Tat.
Being, as I say, a pretty conservative fellow, I have refrained, for
the most part, over the years, from extracting a large measure of revenge
or retribution for the unethical and illegal TravestiesOfJustice that I
have been subjected to by various CanadianAuthorities. Having gone to
great lengths to act with reason and civility in the face of oppression
and persecution for quite some length of time, and at considerable
personal expense to both my finances and my psyche, I can see no reason
to have any qualms of conscience in regard to henceforth requiring
AThousandEyesForAnEye (TM) as a BalanceOfPayments for acts of thievery
and illegality against my person by ArmedCanadianGovernmentThugs.
Naturally, if anyone feels that they can offer good, solid advice in
regard to why it might be more ethical or justified for me to just keep
on TakingItInTheAssTimeAndTimeAgain without complaint or retribution,
then I would be more than happy to forward them some advice I received
from S.M. Halloran, who works as a Biochemical Researcher at a Spooky
Drug Laboratory in AssassAnkara, Turkey:
_________________________________________________________________
* To: cypherpunks at Algebra.COM
* From: "S. M. Halloran"
* Organization: User RFC 822- and 1123-compliant
_________________________________________________________________
ou are a lunatic. No question about it.
Can you possibly make an appointment with your doctor and make sure your
lithium dose is not greater than it ought to be?
Mitch Halloran
Research (Bio)chemist
Duzen Laboratories Group
AssassAnkara TURKE mitch at duzen.com.tr
_________________________________________________________________
I have been following, with great mirth, a current thread on the CPUNX
list which expresses great concern over the possible implications to the
issues of freedom and privacy by the plans of the Russian Government
and/or Military implimenting a StateOfTheArt Monitoring/Surveillance
System designed to make BigWolfInBigGrandmothersClothing's ears very,
very large indeed.
[WAS: "The better to hear EveryOneAndEveryThing with."]
I find it interesting that there should be such great concern over the
possibility of EvilThings happening in Russia that are already happening
in AmeriKaKa, when few Citizens or NetIzens in this country seem to be
inclined to actually *do* anything in regard to making an effort to hold
accountable those involved in the unethical and criminal persecution of
our own DigitalPrisonersOfWar behind Amerika's ElectroMagnetic Curtain.
What reason is their to be 'concerned' about matters that one is going
to submissively submit to like a LemmingLamb waiting to rush over the
cliff and into the BigMouthBigTeeth of BigBrother?
James Dalton Bell got RailRoaded, ScrewedBluedAndTattoo'd, SetUp, Fucked
Over, and SoldDownTheFuckingRiver for the diabolical crime of openly
discussing the same types of concepts and issues that our Founding Fathers
wrote about (although they were taking their medication regularly and had
the good sense to publish much of their work via anonymous reprinters).
ALunaticWhoLooksALotLikeMe got HisorHer computers, and those of family
members, confiscated, HisOrHer Sympatico WebSite deleted, and subjected
to the threat of years of imprisonment, as a result of putting up an
'RCMP HATE PAGE' parody dedicated the belief that making fun of Dudley
DoRight's abuse, persecution and murder of human beings of Native American
ancestry was less of a crime than the actual performance of those types
of criminal misdeeds.
Unless one is prepared to actually take action to prevent the abuse of
authority, and to hold those responsible for high-handed, unethical and
illegal actions against the Citizens, then the process of 'discussion'
on these issues is mere Philosophical Masturbation.
The rEvolution is NOW!
All that really needs to be said, is "BOOM!"
NEWS FLASH!!!
If, after someone ButtFucks you, you give them a really great BlowJob,
they don't have a whole lot of incentive not to do it again.
If the CriminalFuckers are incapable of understanding that "NO Means NO"
then perhaps they are capable of understanding that "BOOM Means NO."
The willingness of WeTheSheeple to submissivly submit to the atrocious
lies, abuses, criminal and unethical behavior of the Rulers&Contollers
can be explained, to my mind, by nothing other than BrainWashing.
The Truth (TM) of the matter is, the ThugsAndThieves who are in control
of this and other countries, are, for the most part, GutLessCowards who
are capable of maintaining their intrusive and excessive hold over the
lives of the citizenry only by virtue of OrganizedMobRuleOfForce over
a ComplacentCitizenry.
Upon losing the support system of OfficiallyAuthorizedOrganizedCrime,
most of these GutLessCowards fold like a BustedFlush. On the extremely
rare occassions where the GutLessCowards are called to account for their
criminal behavior and abuse of power, They turn in mass fear on one
another, until they have spilled enough of each other's blood, and hacked
off enough internal heads, that the citizens are appeased.
et the MindsOfTheMasses have become so controlled by the PuppetMasters
that, after brief displays of sanity and integrity, they again accept the
dichotomic exhortations of the LeftOverLiars&Thieves that everything is
now "Different/BackToNormal."
"We stopped destroying the minds of unwitting victims of our criminal
mind-control experiments esterDay (TM). The IRS is going to cease
engaging in high-handed, unethical abuse of the citizens Tomorrow (TM)."
The Reason The Government Is Incapable of Dealing With The Present:
"The rEvolution is NOW!"
"The President you elected has been murdered, but you will not be
allowed to know why, or by whom. That is TopSecret information that
can only be accessed by those who may have been involved in his murder."
"We don't have the time or resources to bring to Justice all of the
important and politically connected people who became grotesquely rich
while illegally draining BillionsOfDollars from the Savings and Loan
system, but we *do* have the time and resources to imprison millions
of DarkSkinnedAmericans (and a few LightSkinnedAmericans) for willingly
ingesting pharmecutical substances which our own agents illegally put
into the bodies of *unwilling* people, without a single one of them
being subject to criminal proceedings, even when their actions caused
the death of their unwitting victims."
"es, we Fucked Jim Bell Silly! So the fuck what?
"We got away with it, didn't we? So you can bet your sweet ass that
we're going to do it again, and again, at any time we please, and to
whoever we please.
"If you DumbSchmucks want to sit by placidly while we pick you off
OneAtATime, then it doesn't really matter that we're GutLessCowardlyFucks,
does it?"
From goorio82 at msn.com Mon Jul 27 08:35:49 1998
From: goorio82 at msn.com (ld)
Date: Mon, 27 Jul 1998 08:35:49 -0700 (PDT)
Subject: 7.8 cents/min. Long Distance & 800
Message-ID: <199807272529NAA22376@post.qc.ca>
Act now! 10 cents per minute IS NOT good enough anymore.
.078 CENTS PER MINUTE for Long Distance, 800 Service,
and Cellular Long Distance, and ONLY .012Min for Call Card.
6 Second Call Rounding.
No Setup Fee's or Monthly Charges.
Sign Up Now on-line at http://www.aptg.com
or contact us at sales at aptg.com
FACT: .078 IS 22% LESS THAN .10/MINUTE, AND
48% LESS THAN .15/MIN.
Special promotion: If you sign up now you will receive
90 days of FREE WEBSITE HOSTING SERVICES
through our affiliated company Znetwork. For details
go to:
http://www.znetwork.net/freeweb.htm
******************************************
From stuffed at stuffed.net Mon Jul 27 08:54:31 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Mon, 27 Jul 1998 08:54:31 -0700 (PDT)
Subject: Bitch Spice/Miss Vagina 1998
Message-ID: <19980727132322.14543.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/27/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From mgraffam at mhv.net Mon Jul 27 09:29:27 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Mon, 27 Jul 1998 09:29:27 -0700 (PDT)
Subject: Fw: my thoughts for this list
In-Reply-To:
Message-ID:
On Sun, 26 Jul 1998, kryz wrote:
> I guess you mean PGP?
> Just have patience... maybe a little prayer will help.
And the other guy said ..
> > I have been getting this list for a few days. I subscribed to this list in
> > the hopes I could learn something about crypto, in particular the GPG
> > project.
GPG = GNU Privacy Guard.
GPG is a PGP work-a-like .. doesn't support RSA (yet) due to the patents,
but once they run out, GPG will use it. I think it uses Blowfish (and
CAST?) for the symmetric algorithms, and probably 3DES too. I dunno
about IDEA .. I have my doubts due to the patents.
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"..the isle is full of noises, sounds and sweet airs that give delight and
hurt not. Sometimes a thousand twangling instruments will hum about mine
ears, and sometimes voices.." Caliban, Shakespeare's "The Tempest"
From kimh_26 at hotmail.com Mon Jul 27 09:41:54 1998
From: kimh_26 at hotmail.com (kimh_26 at hotmail.com)
Date: Mon, 27 Jul 1998 09:41:54 -0700 (PDT)
Subject: Oxygen
Message-ID: <199807271641.JAA21978@toad.com>
The time is now to reach out to all the people on the
Internet,with target e-mail.
It's your business,how are you going to advertise your
product or service over the Internet?
Direct email puts you in front of millions of people who want
to know about your product or service.The most cost
effective way to make your business explode!
Never before has it been possible to reach so many for so
little.
We are the leaders in direct email because we do what we
say.Our data banks have email buyers for every business.
Don't worry we will help you with a subject and letter that
will work for you.
.
Guaranteed
CALL 1-800-600-0343 ext,1669 leave message.
From nobody at sind.hyperreal.art.pl Mon Jul 27 09:52:44 1998
From: nobody at sind.hyperreal.art.pl (HyperReal-Anon)
Date: Mon, 27 Jul 1998 09:52:44 -0700 (PDT)
Subject: anonymicer is not trustworthy
Message-ID: <19980727165008.4317.qmail@serek.arch.pwr.wroc.pl>
http://anonymicer.home.ml.org/news
is not trustworthy.
none of the service.
From jf_avon at citenet.net Mon Jul 27 10:01:03 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Mon, 27 Jul 1998 10:01:03 -0700 (PDT)
Subject: Quaint Customs Warning - SPACE ALIENS HIDE MY DRUGS!!!
Message-ID: <199807271716.NAA07974@cti06.citenet.net>
On Mon, 27 Jul 1998 08:08:53 MST, Linda Reed--PCC West Campus CSC wrote:
>Canadian Customs Warning - SPACE ALIENS HIDE MDRUGS!!!
>________________________________________________________
>
> It is particularly important to be wary of entering through certain
>Customs ports, such as Regway, Saskatchewan, which have a long history
>of abuse of authority and criminal malefeasance.
> Bill Mitchell, a Canadian Customs OffalSlur at the Regway port, has
>been known to steal thousands of dollars worth of goods from those passing
>through while he is on duty, while being extremely evasive when asked
>about the legality of his conduct, as well as being very inept at hiding
>the fact that he is a lying, scumbag piece of shit who is not intelligent
>enough to tell even halfway believable lies.
Linda, here is a tidbit of information that you might get interested in...
The National Firearms Association has several times put a leash and curbed thoses rabbid dogs. They procure you with ample legal information; just to point out to any govt bully how, per the letter of the law, they are committing a criminal act and how they could get charged. THe thing is, if somebody comes from the states, it is unlikely that a) he/she will know Kanadian law and b) she/he will lay criminal charges. The pertaining Kanadian laws should be widespread in the USA and maybe a cross-border entity could exist to promote the proper conduct of govt bully?
In any case, I suggest you ask the NFA about the whole thing of goods confiscation and criminal charges at the border. Recently, there was a US citizen that entered Kanada with a handgun in his toolbox in his car trunk. Oh, what a mess. Here in Kanada, where the good Liberal dictators are convinced that Man is an intrinsically rabbid animal that will kill as soon as he has the means to layed criminal charges and seized this poor US chap cars and belongings and put him in the klink for a while. Of course, in the US, a handgun could legitimately be carried in your toolbox and it is normal not to think of it as a *big thing* (tm), so it is legitimate to not think of it at the moment of border crossing. Anyways, that's it, what happenend happened. The NFA, I think, is working on it.
My telling of the story is subject to all sort of distortions and should not be considered reliable... :-) Contact the NFA and the Canadian Firearms Digest home page for more details...
Canadian Firearms Digest: http://www.sfn.saskatoon.sk.ca/
Dave Tomlinson: e-mail: nfadat at telusplanet.net
NFA Calgary e-mail: nfa_calgary at iname.com
Web site: http://nfa.ca/
Ciao
jfa
Jean-Francois�Avon,�Pierrefonds�(Montreal),�Canada
Unregistered�Firearms�in�the�hands�of�honest�citizens:�Liberty's�Teeth
Strong�Cryptographic�tools�in�the�hands�of�honest�citizens:�Liberty's�Voice
He�who�beats�his�sword�into�a�ploughshare�will�get�coerced�to�plow�for�
those�who�don't...
PGP�keys:�http://bs.mit.edu:8001/pks-toplev.html
PGP�ID:C58ADD0D:529645E8205A8A5E�F87CC86FAEFEF891�
PGP�ID:5B51964D:152ACCBCD4A481B0�254011193237822C
From CTIA_Daily_News at um2.unitymail.com Mon Jul 27 10:22:55 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Mon, 27 Jul 1998 10:22:55 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 27, 1998
Message-ID: <199807271659.LAA17200@mailstrom.revnet.com>
==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.� Please click on the icon / attachment
for the most important news in wireless communications today.
A new multi-billion dollar industry is here!
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!
Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV
For more information, visit http://www.wirelessit.com�
===========================================
From ajelder at dylan.imation.com Mon Jul 27 10:28:12 1998
From: ajelder at dylan.imation.com (Angie Elder)
Date: Mon, 27 Jul 1998 10:28:12 -0700 (PDT)
Subject: MORE
Message-ID: <3.0.32.19980727102706.00912150@dylan.luminous.com>
More
From honig at m7.sprynet.com Mon Jul 27 11:05:09 1998
From: honig at m7.sprynet.com (David Honig)
Date: Mon, 27 Jul 1998 11:05:09 -0700 (PDT)
Subject: encrypted FM radio hiss
Message-ID: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
On the subject of RNGs. Thinking about conditioning.
Suppose you have a "poor" random number stream, e.g., FM hiss digitized at
say 8 Ksamples/sec. Can you get a crypto-secure random-number stream by
"whitening" the stream with a good block cipher?
This scheme uses the RNG to "kick" the cipher out of the deterministic
cycle its in, which is determined by the cipher key and initialialization
vector.
Poor RNG ----> XOR ----> BlockCipher ----> improved RNG?
^ |
|____________________|
The output of a good block cipher in feedback mode will pass Diehard tests,
though it is not crypto-secure.
>From an information theoretic perspective, in the above scheme, you are
slowly adding entropy to the output stream, at a rate determined by the
actual number of bits/iteration and the bits/symbol of your poor random
numbers.
If you fed 64 bits of pure random values into a 64 bit cipher you would have
a true RNG, filtered by the xor/ciphering, but still crypto-secure. With
fewer true bits, you have a 'smooth' way to introduce variable amounts of
true entropy.
If your RNG is 'stuck at' a constant value you are back to a deterministic
PRNG.
How do you cryptanalze the mix of a keyed PRNG and a true entropy source here?
Is there any mathematical literature on this?
Thanks
honig at alum.mit.edu
"Speech is not protected simply because it is written in a language"
Federal Misjudge Gwin on the Bernstein Case
From lreed at west.cscwc.pima.edu Mon Jul 27 11:25:18 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Mon, 27 Jul 1998 11:25:18 -0700 (PDT)
Subject: MItSchill Millhouse Holler'in
Message-ID: <009C9CD9.EB1F5DC0.23@west.cscwc.pima.edu>
Mitch Halloran, unwitting schill of the TrilateralCPU, digitized:
> I neglected to take into consideration that this attempt at
> revisionist history of the greatest President of the US in the
> 20th Century, perhaps in US history...this raving and ranting
> to take the name of FDR in vain...this dribble to take all of
> humanity's name in vain...this project to develop the Mother
> of All Conspiracy Theories, including figuring out a way to
> show the Big Bang is/was, all of it, every last bit, a
> conspiracy...
> ...well, it could be ciphertext for which I have not received
> the key for making into plaintext. Someone please forward the
> key to me.
Working in a Drug Lab, I would imagine that the key required
to make sense of SPACE ALIENS HIDE MY DRUGS!!! is easily within
reach...check the 500 ml beaker to your immediate left...
To tell the truth, most of my ranting and raving in regard
to the InfernalTruths EreuIndicted in SAHMD is done out of
kindness towards those who are the target of both my BarbLess
Wit and my WitLess Barbs, since merely revealing the NakedTruth
about many of these individuals might result in the Reader
having an eye put out, although HeOrShe would still have one
good eye left to see that the person who was giving rise to
the BluntNosed Sword of Truth was not the individual's wife.
ReVisionIst, to me, indicates someone who takes another look
at what was previously seen with the aid of colour-glossy photos
and pie-charts provided by the people who threatened to imprison
your parents if they failed to send you to government-sponsered
IndoctrinationCamps justified under the ruse of FreeEducation,
which sometimes seem mostly geared for reinforcing in our minds
how lucky we are to live in a country where the government is
kind enough to provide us with FreeIncomeTaxReturnForms.
Son of Mother Of All Chapters, as presented to the CypherPunks
list, quite simply provides a plethora of Official Versions of
the events surrounding the murder of one of Franklin Roosevelt's
political enemies, Anton Cermak.
Those perusing the material may come to the conclusion that
if a wide variety of official news sources and official law
enforcement agencies don't seem to have a fucking clue as to
the time, date or sequence of events surrounding the murder,
the death of Cermak, the trial or the execution, then perhaps
one would be remiss in too hasty in accepting the same people's
conclusions that Roosevelt, and not Cermak, was the target, it
would be hard to fault their logic.
As far as Roosevelt, or anyone else, being "the greatest
President" of any era, it would be more accurate to describe
their being the GreatestBullShitter of the era, or of having
the GreatestAdvertising/SpinDoctor/PoliticalThugs of the era.
It is a matter of speculation to what extent Roosevelt's
actions were responsible for the recovery of the American
economy after the collapse of the banking sector, but it is
a matter of *fact*, supported by the testimony of even those
who were part of FDR's political entourage, that Roosevelt
took steps to ensure the *complete* collapse of America's
financial institutions while Hoover was still President,
in order to put himself in a position to extort as much
money and power as possible out of Congress.
Perhaps the massive suffering and financial losses that
he caused in his power-grab might be justified as being
'for the greater good,' except that, had he used his position
as President-elect to help restore confidence in the economy,
instead of destroying it, America would not have required
nearly as much 'saving' as it subsequently needed.
It is a shame that I had not been born in an age when I
could have run for President against Roosevelt, and won.
Had I done so, then I, like FDR, would have granted
myself a license to print money, and I also would have
spent three times as much of the taxpayer's money as the
previous 31 Presidents, combined, but *I* would have spent
it all on beer and scotch, thus resurrecting the American
economy without creating a HugeGovernmentMonster filled
with political patronage appointees and employees who I
had bought and owned with imaginary money that taxpayers
would be responsible for repaying.
Also, being drunk all of the time, there would have been
little chance of me turning America into a PlannedSociety
via a New Deal in which all of the cards being dealt were
Red.
> By the way, I'm really one of you guys. I am just working a
> cover among the people who call themselves sane until you guys
> who really know the truth can get into a position reveal these
> eternal truths to the unbelievers. he-he!
We appreciate your efforts. Due to the limited space in
the HomeForTheCriminallyInsane, it is important for us to
have half-witting schills secretly infiltrating organizations
which are too ignorant of Truth&Reality (TM) to realize that
the NewCrayolaColours are part of the WorldWide Plot, even
when spelled without the 'u.'
~
ICould'aBeenAContend'aMonger
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From cons0005 at *algonquinc.on.ca Mon Jul 27 11:35:30 1998
From: cons0005 at *algonquinc.on.ca (Your Yashy)
Date: Mon, 27 Jul 1998 11:35:30 -0700 (PDT)
Subject: Spam Help
Message-ID: <199807271834.OAA16760@deathstar.comnet.ca>
I was wondering if I could get some help setting up a filter. I'd
liketo create a folder called "SPAM". Then all email that are in the
spam folder, I would like forwarded to abuse@ that it
was sent from. I'm using Pegasus Email 3.01b
thnx in advance.
"I, of course, deny I called judge Santiago Campos a FASCIST PIG"
-bill payne June 19, 1998
HTTP://www.comnet.ca/~yashy
100 YashDollars to first person to try every link.
(including links derived from links)
p.s. SPAM PROOF Email address. Remove the "*" to reply.
From attila at hun.org Mon Jul 27 12:02:43 1998
From: attila at hun.org (attila)
Date: Mon, 27 Jul 1998 12:02:43 -0700 (PDT)
Subject: FDR
In-Reply-To: <199807271446.RAA18652@ankara.192.168.3.5>
Message-ID:
On Mon, 27 Jul 1998, S. M. Halloran wrote:
>Actually, attila, or Linda, or whoever you are...you are right.
>
>I neglected to take into consideration that this attempt at revisionist
>history of the greatest President of the US in the 20th Century, perhaps
>in US history...
>
are you really calling this cretinous, brain dead sorry excuse for a
human being who was not worth being spat upon by the crippled camel of
a third-world pepophilic dictator with poor table manners, the
greatest President in our history?
man, you're one sick puppy.
are we talking about the same President? really? FDR? the man who
sold our country into perpetual slavery on 08 Mar 33? 4 days after
he was inaugerated in a speech where he "warned" he was asking for
emergency powers, even stronger than war time powers?
who managed to coerce a Congress, not even given a chance to read
what they were signing, into a declaration of national emergency
so this so called American could suspend the constitution, amend the
WWI "trading with the enemy" act so the citizens of what was once
the USA were also included among the enemy...? who pledged -us- and
all our property into the servitude of the Federal Reserve and its
private owners, of which more than 50% is foreign?
the same man who forfeited our good faith and credit to the bankers
in bamkruptcy so the U.S. is now subject to Admiralty law and flies
the gold fringed flag of martial law in all its courtrooms?
the same man who inaugerated the Executive Order provision which gives
the President and Secretary of the Treasury the power to rule without
Congress? and to enshrine the executive order into part of the US
Code (USC 963, I believe)?
who contracted with the international bankers to print paper money as
Federal Reserve notes for which he owed the bankers the cash he had
just printed plus interest while they used the cash to buy the T-bills
(the instrument of indebtedness)? --and confiscated private gold at
$20 an Oz --later setting the standard at $34/Oz so the insiders made
a killing?
the same man who tried to pack the Supreme Court?
the same man who ran for a third term on an isolationist platform
romising every mother that her sons would not fight a foreign war
then diplomatically left Japan no option but to go to war?
the same man who left Pearl Harbor out of loop with no code books for
the Red or Purple code so the defining act to start America in the war
wasted the Pacific Fleet with its ammo in the warehouses to be blown
up, 2,000+ dead, and battleships lying on the bottom?
the same man who violated the law and defied Congress with the
Lend-Lease program, gave away half of Europe to Russia, handed Russia
Berlin? the same man whose two closest advisers were communists?
I always wanted to believe Alger Hiss was innocent as his son Tony
was in my class at Harvard --he wasnt innocent, nor were the Rosenbergs
as the CIA had cracked the code but would not show it in court --they
even knew who handed over the trigger mechanism (never punished and he
left the U.S. after the Manhattan project and taught for many years at
Oxford).
yep, good Ol' Uncle Joe Stalin's best friend, along with bankers like
Schiff who financed the Russians.
it's no conspiracy that Prescott Bush was complicite, but left holding
the bag. when the U.S. in '42 confiscated Union Bank which was started
by George's grandfather Herbert Walker -that's why George ran away from
home, joined the air corps and became a war hero at 18. why was the
bank grabbed --Union was a front for A.G. Farber and for Hitler
--Walker and his friends had been funding Hitler since the early
twenties --why? greed and power.
it's no conspiracy; it's history, in black and white Universal news
reels.
FDR, the incestuous son of bitch (Eleanor was is cousin) should have
been shot for treason --along with Eleanor. McCarthy, a scum-bag if
there ever was one, was far closer to the truth than he ever knew.
wake up and smell the roses! they've been fertilized by the shit of
Eleanor Roosevelt for many years --she's still crapping in the White
House garden for the first bitch to read the tea rose leaves.
there are no conspiracies, just men behaving like they always do; the
vulture capitalists is that they only back off when their fear exceeds
their greed. politicians arent smart enough to back off their greed
and their thirst for power as they blasphemously take take the oath
of office.
>this raving and ranting to take the name of FDR in
>vain...this dribble to take all of humanity's name in vain...this project
>to develop the Mother of All Conspiracy Theories, including figuring out a
>way to show the Big Bang is/was, all of it, every last bit, a conspiracy...
>
there are no conspiracies; it's nothing more than man fouling his own
nest; the normal progression of history which no-one learns so they
repeat the same mistakes --the well-fed populace is too lazy to take
an interest in their own government until it is too late.
there is no left and right; there is no moral government; it's all
about power and staying in power. ever notice how reformers only
stay reformers until they need to run for reelection and the money
goes to those who play ball?
>...well, it could be ciphertext for which I have not received the key for
>making into plaintext. Someone please forward the key to me.
>
what key? there is no key... except "mene, mene, tikel, upharrison"
(or whatever it was on the wall). just open your eyes and view the
sewer around you. the fertilizer in the fields is now distributing
"radioactive" waste --effluent courtesy of your politicians.
the U.S. is already an oligarchy, next comes the plutocracy, followed
by the triumvirate, and then the emporer (maybe with clothes) -then
there will be a winnowing and anarchy followed by tribal states. welcome
to history, but few will live to see it run its course --America, the
universally hated, will be the first to be plowed under when she can
no longer bully or buy the -pax americanus-. and the men in power know
that a hungry disorganized populace can be subjugated by a well fed
army.
>By the way, I'm really one of you guys. I am just working a cover among
>the people who call themselves sane until you guys who really know the
>truth can get into a position reveal these eternal truths to the
>unbelievers. he-he!
>
>Really.
>
>[if you think you see a crazy person, consider the very real possibility
>that what you are seeing is really a crazy person]
>
sorry, I really am crazy, but it's better to be crazy than insane.
>
>Mitch Halloran
>Research (Bio)chemist
>Duzen Laboratories Group
another Brit/American selling his ass to the world....
>Ankara TURKEY
>mitch at duzen.com.tr
>
>An ass with a golden saddle is still an ass. --Turkish proverb
>
yeah, but he's a rich ass...
__________________________________________________________________________
go not unto usenet for advice, for the inhabitants thereof will say:
yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__
To be a ruler of men, you need at least 12 inches....
There is no safety this side of the grave. Never was; never will be.
From nobody at replay.com Mon Jul 27 12:46:30 1998
From: nobody at replay.com (Anonymous)
Date: Mon, 27 Jul 1998 12:46:30 -0700 (PDT)
Subject: No Subject
Message-ID: <199807271945.VAA26183@replay.com>
From nobody at nsm.htp.org Mon Jul 27 13:05:26 1998
From: nobody at nsm.htp.org (nobody at nsm.htp.org)
Date: Mon, 27 Jul 1998 13:05:26 -0700 (PDT)
Subject: Spam Help
In-Reply-To: <199807271834.OAA16760@deathstar.comnet.ca>
Message-ID: <19980727200504.11080.qmail@nsm.htp.org>
On Mon, 27 Jul 1998 14:35:05 -0400 "Your Yashy"
wrote:
> I was wondering if I could get some help setting up a filter. I'd
>liketo create a folder called "SPAM". Then all email that are in the
>spam folder
For fuck sake. If is isn't AOL, it is some of lame fuck asking for help
with filters. Where do people get the idea that the toaderpunks can help
with all these problems? We've had baseball signatures, lost people and
now some idiot who really wants the pegasus list or something <--hint
cypherpunkseeker
From kent at songbird.com Mon Jul 27 14:13:12 1998
From: kent at songbird.com (Kent Crispin)
Date: Mon, 27 Jul 1998 14:13:12 -0700 (PDT)
Subject: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <3.0.3.32.19980720114859.009997f0@dave.bbn.com>
Message-ID: <19980727141055.63396@songbird.com>
On Wed, Jul 22, 1998 at 06:18:30AM -0700, John Gilmore wrote:
> > One lesson I plan to observe - don't encrypt known plaintext unless you
> > have to !
>
> The EFF DES Cracker cracks more than just known plaintext (though it's
> the easy case).
It occurs to me that an interesting use for the eff des cracker would
be the following: since the government asserts that DES is safe, then
a DES encrypted archive of crypto code should be exportable. So the
next time someone feels the need to export something that is currently
not exportable, simply encrypt it, along with some plaintext, with
DES, trash the key, export it, and send the plaintext and the
encrypted plaintext to the EFF...
This is not a practical use, but it would make an interesting test
case in court.
--
Kent Crispin, PAB Chair "No reason to get excited",
kent at songbird.com the thief he kindly spoke...
PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html
From vicki28 at uswest.com Mon Jul 27 17:32:11 1998
From: vicki28 at uswest.com (vicki28 at uswest.com)
Date: Mon, 27 Jul 1998 17:32:11 -0700 (PDT)
Subject: IN DEBT WE CAN HELP YOU!!!
Message-ID: <199807272323.SAA15776@charon.vitalimages.com>
Subject: Re: Are you in debt?
If you are then we can help. Qualifying is now at your
fingertips and there are no long distance calls to make or travel
plans to arrange.
FREE loan evaluation:http://www.amesconsultants.com/ins/127.html
We are American Capital Mortgage Services, we specialize
in helping homeowners establish ONE easy LOW monthly
payment with the added benefit of not needing any equity in your
home. American Capital is constantly working with other lenders
throughout the U.S. to provide you with the best interest rate
possible. We have a number of different companies that we work
with and this is at NO cost to you EVER. We are simply a referral
agency.
As you may have seen in our ad you can be loaned up to
125% of the value of your home or $100,000.00 even if you have
NO equity in your home. There are no up-front or advanced fees of
any kind. You can be approved within 24 hours and have your cash
in one weeks time.
In order for us to provide you with a FREE loan evaluation,
Please go to http://www.amesconsultants.com/ins/127.html
Put us to the test� I know we can Help You.
Kindest Regards.
From JBrown4330 at aol.com Mon Jul 27 18:08:45 1998
From: JBrown4330 at aol.com (JBrown4330 at aol.com)
Date: Mon, 27 Jul 1998 18:08:45 -0700 (PDT)
Subject: Republicans
Message-ID:
Hey: Who made up the term "Politically Correct"? Not Christians and not
Republicans. Your side did. How does wanting a smaller government, less
taxes, the freedom to CHOOSE to pray in schools, the rights of the un-born( of
course you probably think they have no rights- just as slave owners thought
about their slaves), and who acts like the thought police??????
CHOKE ON IT YOU
HYPOCRITE
From ulf at fitug.de Mon Jul 27 18:26:33 1998
From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Mon, 27 Jul 1998 18:26:33 -0700 (PDT)
Subject: ACM CCCS '98: Anonymity on the Internet
Message-ID:
The ACM CCCS'98 conference (November 1998) has recently been announced
on cryptography at c2.net.
There will be a panel on "Anonymity on the Internet", moderated by
Paul Syverson. There's also a paper discussing the attacks
nym.alias.net has had to face:
David Mazi�res and M. Frans Kaashoek. The design, implementation and
operation of an email pseudonym server. In Proceedings of the 5th ACM
Conference on Computer and Communications Security, 1998.
ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.ps.gz
From mgraffam at mhv.net Mon Jul 27 18:32:55 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Mon, 27 Jul 1998 18:32:55 -0700 (PDT)
Subject: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <19980727141055.63396@songbird.com>
Message-ID:
On Mon, 27 Jul 1998, Kent Crispin wrote:
> It occurs to me that an interesting use for the eff des cracker would
> be the following: since the government asserts that DES is safe, then
> a DES encrypted archive of crypto code should be exportable.
No. Encrypting with DES, or any symmetric cipher
does not destroy the information, which is what is controlled.
Even losing the key does not destroy the information, as we all know:
keys can be recovered it is just a matter of the work involved.
Encrypting with an OTP is interesting at first .. but considering that
distributing a crypto archive or the completed works of Shakespeare
amount to the same thing after an OTP has been used, I am not convinced
it has much meaning.
The _spirit_ of the law is that no crypto device can be exported. Programs
are considered to be devices.. as is evidenced by the recent decision
in the Bernstein case.
We don't need encrypted archives floating around.. we need to show that,
like cars, crypto devices (programs or otherwise!) are useful even if
they can be used by bad people for bad purposes.
Abstract things like exporting a hunk of random crap and arguing about
it don't achieve this, and will never do so in the minds of laymen
with no real interest in crypto.
As for me, I prefer the position of my countryman, Henry David Thoreau ..
civil disobedience:
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
Be a munitions trafficker: http://www.dcs.ex.ac.uk/~aba/rsa/rsa-keygen.html
#!/bin/perl -sp0777i
You have received this message because at some time in the past your name was submitted to our e-mail mailing list database. If you do not wish (or no longer wish) to receive announcements, updates and news concerning the RPK Encryptonite Engine or the RPK InvisiMail e-mail security products, please forward this message to remove at rpkusa.com
----------------------------------------------------------------------------------------------------------
FOR IMMEDIATE RELEASE
CONTACT
Paula Miller Lyn Oswald
Nadel Phelan, Inc. RPK Security, Inc.
408-439-5570 x277 212-488-9891
paulam at nadelphelan.com lynoswald at rpkusa.com
RPK SECURITY ANNOUNCES "ENCRYPTONITE�": THE POWERFUL PUBLIC KEY ENCRYPTION TOOLKIT
The RPK Encryptonite� Software Toolkit Version 3.0 Allows Developers to Easily Add Strong Security to Internet, Software, Hardware and Communications Applications
SAN FRANCISCO, CA. July 27, 1998 � RPK Security, Inc., announced today the release of its RPK Encryptonite Software Toolkit version 3.0. Now with C++ implementations and a Delphi VCL component, the RPK Toolkit provides integrators, developers and engineers with everything they need to quickly and easily incorporate fast public key encryption and strong security into their applications without extensive knowledge of cryptography. RPK Security is a technology leader in strong and fast public key encryption for software, hardware and Internet applications. With development and distribution facilities outside of the U.S., RPK Security is able to provide its customers with a worldwide strong security solution that is available globally unlike competing products that are restricted by U.S. export regulations.
The RPK Toolkit, a software implementation of the RPK Encryptonite Engine, allows developers to build custom applications with embedded strong encryption for information sensitive applications and industries such as the Internet, communications, legal, health care and financial services. The Toolkit provides a dramatic 40 percent improvement in engine initialization (compared with V2.1), which results in remarkably better application response times. In addition, the Toolkit will include in future releases a new "packet encryption" technique which is well suited for broadcast and multi-cast applications, especially on the Internet.
The RPK Toolkit is easy to use and manage, making it an attractive and readily accessible solution for developers of new applications. The RPK Toolkit includes sample applications, complete source code and comprehensive documentation. The core technology of the RPK Toolkit leverages the same mathematics behind Diffie-Hellman Key Exchange, a widely used algorithm for creating secure network-based communications systems, and is highly respected by security experts.
more
RPK RELEASES LATEST VERSION OF ENCRYPTONITE TOOLKIT PG. 2 OF 3
"I have reviewed the RPK public key cryptosystem and believe the algorithm to be secure and suitable for use in secure applications," said Fred Piper, cryptographer, Codes & Ciphers Ltd.
The RPK Encryptonite Engine provides a method of encrypting (also known as encoding) computer data or digital electronic signals to protect its contents against unauthorized surveillance. RPK Encryptonite Engine is unique in that it combines all the benefits of other public key systems (authentication, digital signatures and digital certificates) with the speed of a secret key system into one algorithm. With the superior performance offered by RPK's Encryptonite Engine, applications requiring streaming data, sound, video or large numbers of transactions, such as credit card payments, receive instantaneous responses and secure communication links.
"In response to customer requests for a variety of software implementations as well as custom hardware (chips), we now offer developers and engineers a multi-platform premium encryption product that is easy to use and offers flexible and scalable levels of security and performance," said Jack Oswald, president and CEO of RPK Security. "Because the RPK Toolkit is developed outside of the U.S., it is not subject to U.S. export laws which gives a tremendous advantage to international customers, allowing them to produce secure, fast and flexible systems."
Features of RPK Encryptonite Software Toolkit 3.0:
Eighty different levels of encryption security
Global availability with strong encryption
Faster encryption and decryption of data files and streams
Based on proven mathematics of Diffie-Hellman Key Exchange algorithm
Easy to use object-oriented design
Extremely well suited to embedded applications
Less expensive to implement than competing products
more
RPK RELEASES LATEST VERSION OF ENCRYPTONITE TOOLKIT PG. 3 OF 3
Pricing and Availability:
The RPK Encryptonite Software Toolkit is now available for licensing worldwide. Pricing starts at $695 per developer (development only). Deployment license fees are based upon custom configurations. For sales information, contact Kevin Shannon, vice president, sales at (610) 399-7999, or via e-mail at sales at rpkusa.com
The RPK Encryptonite Software Toolkit includes: highly portable, cross-platform, C++ class libraries with full source code for use with Win 95, 98, NT and Linux, and VCL component for Borland's Delphi 3.0/2.0 running under Microsoft Windows 95 and NT. It was compiled and tested with Microsoft's Visual C++, Borland C++ Builder, gnu/g++ and Borland Delphi 2.0/3.0. Windows DLL and ActiveX will be available by August 15, 1998. C source library, Solaris and HP/UX ports, and Java implementations will be available by August 31, 1998.
ABOUT RPK SECURITY
Founded in 1995, RPK Security, Inc. is a technology leader in fast public key cryptography. Its flagship RPK Encryptonite� Engine, a strong and uniquely fast public key encryption technology, is available worldwide in custom hardware and software toolkits on multiple platforms. RPK solutions are ideal for electronic communications, financial transactions, Internet banking, smart cards, streaming audio-video, telecommunications and more. Developed from widely accepted security mathematics and techniques, the RPK Encryptonite Engine is easily embedded into new and existing hardware and software applications. RPK's cryptographic research and product development is based in New Zealand, Switzerland and the U.K, with worldwide sales and marketing operations in San Francisco, CA. Visit RPK's website at www.rpkusa.com or call (212) 488-9891.
From kent at songbird.com Mon Jul 27 18:46:06 1998
From: kent at songbird.com (Kent Crispin)
Date: Mon, 27 Jul 1998 18:46:06 -0700 (PDT)
Subject: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <19980727141055.63396@songbird.com>
Message-ID: <19980727184320.50687@songbird.com>
On Mon, Jul 27, 1998 at 09:20:10PM -0400, mgraffam at mhv.net wrote:
> On Mon, 27 Jul 1998, Kent Crispin wrote:
>
> > It occurs to me that an interesting use for the eff des cracker would
> > be the following: since the government asserts that DES is safe, then
> > a DES encrypted archive of crypto code should be exportable.
>
> No. Encrypting with DES, or any symmetric cipher
> does not destroy the information, which is what is controlled.
> Even losing the key does not destroy the information, as we all know:
> keys can be recovered it is just a matter of the work involved.
Apparently we are talking at cross purposes.
Currently, there are rather large ftp crypto archives that are
"protected" by a scheme using randomly generated directory names.
This is considered acceptable by the export authorities. The export
authorities would have a hard time, therefore, arguing that an archive
protected by encrypting the files with DES would not be sufficiently
protected.
It would be a stunt, of course. Merely another stunt to illustrate
the inconsistencies in the export laws.
[...]
> We don't need encrypted archives floating around.. we need to show that,
> like cars, crypto devices (programs or otherwise!) are useful even if
> they can be used by bad people for bad purposes.
>
> Abstract things like exporting a hunk of random crap and arguing about
> it don't achieve this, and will never do so in the minds of laymen
> with no real interest in crypto.
I quite disagree. Frequently a clever stunt does engage the layman
-- at least the intelligent laymen.
--
Kent Crispin, PAB Chair "No reason to get excited",
kent at songbird.com the thief he kindly spoke...
PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html
From whgiii at openpgp.net Mon Jul 27 19:43:22 1998
From: whgiii at openpgp.net (William H. Geiger III)
Date: Mon, 27 Jul 1998 19:43:22 -0700 (PDT)
Subject: John Gilmore and the Great Internet Snake Drive
In-Reply-To:
Message-ID: <199807280239.WAA01586@domains.invweb.net>
-----BEGIN PGP SIGNED MESSAGE-----
In , on 07/27/98
at 09:20 PM, mgraffam at mhv.net said:
>The _spirit_ of the law is that no crypto device can be exported.
>Programs are considered to be devices.. as is evidenced by the recent
>decision in the Bernstein case.
That was the Junger case. In the Bernstein case the principles of Free
Speach and the 1st Amendment were upheld by the 9th District court
(Patel).
- --
- ---------------------------------------------------------------
William H. Geiger III http://www.openpgp.net
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: OS/2: Windows done RIGHT!
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNb07gY9Co1n+aLhhAQHstwQApoCNdr8viSr0BSNMz3UE3t2dMKeUTkL8
xGL3u5RQIk/5GQo68Rc+Tvftl/VNsPLoMZISpW6Lx5uPHQLS4zj6VlUaEvfNpc9J
eGba5PEEbQr7XS3/cqjyi2SfpVzihmgd5/808g8uonZK5B/9TAljt7XvIjmiD4Ku
HOoQW/2AAhY=
=D2K7
-----END PGP SIGNATURE-----
From mgraffam at mhv.net Mon Jul 27 19:54:56 1998
From: mgraffam at mhv.net (mgraffam at mhv.net)
Date: Mon, 27 Jul 1998 19:54:56 -0700 (PDT)
Subject: John Gilmore and the Great Internet Snake Drive
In-Reply-To: <199807280239.WAA01586@domains.invweb.net>
Message-ID:
On Mon, 27 Jul 1998, William H. Geiger III wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
>
> In , on 07/27/98
> at 09:20 PM, mgraffam at mhv.net said:
>
> >The _spirit_ of the law is that no crypto device can be exported.
> >Programs are considered to be devices.. as is evidenced by the recent
> >decision in the Bernstein case.
>
> That was the Junger case. In the Bernstein case the principles of Free
> Speach and the 1st Amendment were upheld by the 9th District court
> (Patel).
You're absolutably right. My bad.. I don't know what I was thinking.
I guess this shows my pessimissim and lack of trust in our establishment,
doesn't it :)
Michael J. Graffam (mgraffam at mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
Be a munitions trafficker: http://www.dcs.ex.ac.uk/~aba/rsa/rsa-keygen.html
#!/bin/perl -sp0777i
HERE IT IS!! The earnings pontential you have been looking for! We will
provide you with 1.5 MILLION EMAIL ADDRESSES FOR ONLY $15. These are all
fresh addresses with no duplications. They are all sorted and ready to be
mailed. This is the best deal anywhere today for email lists! Imagine
selling a product for only $10 and getting only a 1/100 response. That's
$150,000!!! Money making plans, reports, lists, jewelry, art, etc. Whatever
you wish to sell! People are making millions of dollars right now by doing
the same thing! That is why you get so much email from people selling you
their product....it works! These 1.5 Million email addresses are yours to
keep, so you can use them over and over and they can be downloaded right from
the internet or sent by mail on disk....your choice.
If you do not have a program capable of sending bulk email, don't worry! We
also send you links to sites where you can download one for free! We will
also show you how you can avoid using your ISP's SMTP mail server for mailing
by using software that turns your personal computer into your very own
personal mail server!
Simply print out and complete this order form and send it to us along with
your check or money order made payable to: FTWI for only $15.
Send addresses via (circle one):
DOWNLOAD MAIL (add $3 for shipping and handling)
Name: _____________________________
Street Address: ________________________City: _______________
State: ________________Zip:_____________
Phone number:__________________________
Email:_______________________________
Returned checks are subject to $25 NSF Fee
Send your order and payment to:
FTWI.
4019 Goldfinch, Ste. J
San Diego, CA 92103
THANK YOU!!!
Thank you!!!
From LookBelow at msn.com Tue Jul 28 00:02:28 1998
From: LookBelow at msn.com (LookBelow at msn.com)
Date: Tue, 28 Jul 1998 00:02:28 -0700 (PDT)
Subject: Beat The IRS & PAY-NO-MORE
Message-ID: <199807280624.BAA05367@sw.crfc.com>
====================================================
- PLEASE READ -
***************
The Founding Fathers of The United States of America wrote our Con-
stitution, Bill of Rights and Declaration of Independence to set us FREE
from TYRANNY and TAXATION.
Our Founding Fathers did not want our government to make you pay
INCOME TAXES. If you study the Constitution, and the IRS tax laws, you
will find that paying income taxes is not mandatory. It is based on a
voluntary system. The LAWS and the SUPREME COURT and the IRS have ruled
that Federal income taxes are VOLUNTARY and FILING A RETURN IS NOT
REQUIRED in many cases if you properly VOLUNTEER OUT OF THE SYSTEM AND
THEIR JURISDICTION..
"Our tax system is based on individual self assessment and
VOLUNTARY COMPLIANCE." - M. Caplin, IRS Commissioner
"OUR TAX SYSTEM IS BASED UPON VOLUNTARY ASSESSMENT AND PAYMENT AND NOT
ON DISTRAINT" -Supreme Court Ruling, Flora v. U.S., 362 U.S. 145
It is very EASY and LEGAL to volunteer out of the IRS tax system, but
you must know the EXACT PROCESS REQUIRED to do this simple task. If
you don�t know the correct way to do this, you could be FINED $500 by
the IRS.
If you will spend JUST $35.00 we will send you our report:
"BEAT THE IRS & PAY-NO-MORE".
Our report will SET YOU FREE LEGALLY!
After reading our report and filling out a simple form you will be
FREE from the IRS BANDITS and the graduated Federal INCOME TAX ...
FOREVER. Our report is guaranteed to STOP FEDERAL INCOME TAX
WITHHOLDING from your pay check!!! You will never have to pay Federal
income taxes again. You will never have to file a 1040 Form again. You
will never have to keep personal expense or income records. You will
be completely FREE from the Federal income tax and the IRS. We send
you absolute PROOF you do not have to file a return.
After reading our report and following simple instructions your pay
check will be free from those nasty income tax deductions. This will
put an extra $20 to $200 in your pocket every week!.
"ISN�T IT ABOUT TIME YOU GET PAID WHAT YOUR WORTH?"
Now is the time to fight back. Please read on!!!
**********************************************
"BEAT-THE-IRS & PAY-NO-MORE"
Our PACKAGE, (Beat The IRS & PAY-NO-MORE) will teach you EXACTLY how
to EASILY: STOP FEDERAL Income Tax Withholding, STOP April filing of
1040 Form, & STOP THE IRS EXTORTION PERMANENTLY! This works for all
Citizens that are not government employes, don't deal in Alcohol,
Tobacco, or fire arms, or own a corporation or own a business where
you are under a duty to withold from your employes paycheck.
-------------------------------------------------------------------
The IRS Federal Income Tax System is based on VOLUNTARY COMPLIENCE...
We will teach you how to legally VOLUNTEER OUT OF THE SYSTEM!
-------------------------------------------------------------------
Your Success is ABSOLUTELY Unconditionally GUARANTEED! Our methods
work every time for everybody if you were born in and live in one of
the 50 Republic States and are not a government employee.
Also you can not live or work on Government Property such as a Mili-
tary base, Washington, D.C., Guam, Semoa, Virgin Islands, etc.
Our method is 100% legal, honest and ethical. We will pay anybody
$1,000 if they can prove our method is ILLEGAL, DISHONEST or
UNETHICAL!!! Our method has worked for every person who has ever
bought this package without exception.
NOBODY HAS EVER FAILED!!!
- Our PACKAGE includes a LIFETIME, FREE, 40% PAY OUT Dealership,
PLUS ALL the marketing material master copies you will ever need.
YOUR PAYCHECKS WILL BE 10% TO 35% BIGGER EVERY WEEK, within 2 weeks
of filing the proper forms and affidavit. WHY NOT GIVE YOURSELF A
RAISE THIS YEAR BY EXERCISING AND ENJOYING MORE OF YOUR CONSTITU-
TIONAL RIGHTS. SET YOURSELF FREE!
-------------------------------------------------------------------
Your package includes unlimited FREE phone consultations, a copy
of the U.S. Constitution, The Bill of Rights, forms, affidavits,
and much, much more!
--------------------- ORDER FORM - CUT ----------------------------
TO ORDER BY MAIL: Send this order form plus your Name, Address,
Phone # and a $35+$3 S&H (Money Order Only) to:
LINKCO --Dept. # 00001 -- POB 66781 -- Phoenix, AZ 85082
Phone: (602)267-9688
Thanks for reading this message!
-(Unconditional Money Back Guarantee)-
- Copyright 1996 Linkco -
==================================================================
To be REMOVED from this list type REMOVE in the subject area of
a new e-mail and send to: Action944 at usa.net
==================================================================
From bill.stewart at pobox.com Tue Jul 28 00:05:04 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Tue, 28 Jul 1998 00:05:04 -0700 (PDT)
Subject: Fw: my thoughts for this list
In-Reply-To:
Message-ID: <3.0.5.32.19980727235810.00934840@popd.ix.netcom.com>
At 12:19 PM 7/27/98 -0400, mgraffam at mhv.net wrote:
>GPG = GNU Privacy Guard.
>
>GPG is a PGP work-a-like .. doesn't support RSA (yet) due to the patents,
>but once they run out, GPG will use it. I think it uses Blowfish (and
>CAST?) for the symmetric algorithms, and probably 3DES too. I dunno
>about IDEA .. I have my doubts due to the patents.
Actually, GPG has been a PGP-look-similar-but-not-interoperate-like
rather tha a workalike. Unless GPG has been updated lately,
GPG keys tend to do Very Crashy Things to my PGP 5.5.x
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From sosechal at easynet.fr Tue Jul 28 01:25:55 1998
From: sosechal at easynet.fr (laurent breton)
Date: Tue, 28 Jul 1998 01:25:55 -0700 (PDT)
Subject: Frozen shrimp and sole from senegal (west africa)
Message-ID: <199807280825.BAA14739@toad.com>
Date : 28/July/98
FIND OFFER ON FROZEN SEAFOOD, SHRIMPS (PENAEUS DUORARUM) AND SOLES
(CYNOGLOSSUS) - ORIGINE SENEGAL (WEST AFRICA)
INVENTORY IN PARIS (FRANCE) - PRICES ARE FOB PARIS, OUR COLSTORE
WE CAN ALSO PRODUCE FOR YOU STARTING SEPT/98.
SHRIMPS
CREVETTES DECORTIQUEES CRUES-DEVEINEES-BLOCK-BOITES DE 2 KGS, MASTER 18 KGS)
PTO RAW - P&D - BLOCK - (MASTER 18KGS, 9 X 2 KGS BOXES)
140/180 KG - 60/80 LB 58.00 FF/KG 4,31$/LB
CREVETTES ENTIERES CUITES - (BOITES DE 2 KGS, MASTER 12 KGS)
SHRIMPS HEAD ON COOKED - (MASTER 12KGS, 6 X 2 KGS BOXES)
80/100/kg - 35/45/lb 39.00 FF/KG 2,90$/LB
100/120/kg - 45/55/lb 35.00 FF/KG 2,60$/LB
CREVETTES DECORTIQUEES CUITES-IQF-(12 SACHETS DE 0.500 KGS, MASTER 6 KGS)
SHRIMPS PUD COOKED IQF - (MASTER 6KGS, 12 X 0.5 KGS PLASTIC BAGS)
110/140 KG - 50/65 LB 57.00 FF/KG 4,24$/LB
140/180 KG - 65/80 LB 52.00 FF/KG 3,87$/LB
180/250 KG - 80/115 LB 47.00 FF/KG 3,49$/LB
250/300 KG - 115/135 LB 42.00 FF/KG 3,12$/LB
CREVETTES DECORTIQUEES CRUE - DEVEINEES - IQF
(12 SACHETS DE 0.5KGS, MASTER 6 KGS)
SHRIMPS PUD RAW IQF - (MASTER 15KGS, 30 X 0.5 KGS PLASTIC BAGS)
140/180 KG - 65/80 LB 67.00 FF/KG 4,98$/LB
POISSONS - FISH
FILET DE SOLE TROPICALE - (BOITES DE 2 KGS, MASTER 12 KGS)
TROPICAL SOLES FILETS - (MASTER 12KGS, 6 X 2 KGS BOXES)
60/90 44.50 FF/KG 3,31$/LB
90/120 45.50 FF/KG 3,38$/LB
FILET DE TURBOT TROPICAL - (BOITES DE 2 KGS, MASTER 12 KGS) L. NAME :
PSETTODES BELCHERI
TROPICAL TURBOT FILET - (MASTER 12KGS, 6 X 2 KGS BOXES)
80/160 29.00 FF/KG 2,16$/LB
TURBOT TROPICAL H&G - (MASTER 22 KGS) L. NAME : PSETTODES BELCHERI - H&G
400/1500g 10.00 FF/KG 0.75$/LB
SOLE PAC - (HEAD ON, PEELED CLEANED, IQF, IWP) - (MASTER 10 KGS)
175/225g 31.00 FF/KG 2,30$/LB
SOLE PAN - (HEAD OFF, PEELED CLEANED, IQF, IWP) - (MASTER 10 KGS)
175/225g 33.00 FF/KG 2,45$/LB
EN ESPERANT VOTRE INTERET
SALUTATIONS
email send by
Mr Laurent Breton
SOSECHAL-CRUSTAGEL
RUE DU COMMERCE
ZIGUINCHOR - SENEGAL
FRENCH OFFICE
RUHLMANN SA
46 ALLEE ST. MALO, MAREE 132
94519 RUNGIS CEDEX
FRANCE
PHONE : 33 1 46 86 40 10
FAX#1 : 33 1 45 60 05 88
FAX#2 : 33 1 46 87 01 99
MOBILE : 33 6 80 84 77 08
E at MAIL : SOSECHAL at EASYNET.FR
From mok-kong.shen at stud.uni-muenchen.de Tue Jul 28 01:41:06 1998
From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen)
Date: Tue, 28 Jul 1998 01:41:06 -0700 (PDT)
Subject: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <35BD8E9A.799466A6@stud.uni-muenchen.de>
David Honig wrote:
> The output of a good block cipher in feedback mode will pass Diehard tests,
> though it is not crypto-secure.
I often see the phrase 'pass Diehard test' though I don't see from
the documents of Diehard how to evaluate the volumenous printout
of Diehard to say exactly whether the test is passed or not. Furthermore
the component asc2bin.exe of Diehard is buggy.
M. K. Shen
From wcts at globalvisionexpo.com Tue Jul 28 03:51:03 1998
From: wcts at globalvisionexpo.com (wcts at globalvisionexpo.com)
Date: Tue, 28 Jul 1998 03:51:03 -0700 (PDT)
Subject: Your literature on our world tour
Message-ID: <199807281050.DAA16195@toad.com>
From: Charles H. Borden
President, GlobalVision
Sarasota, Florida
Please kindly direct to the Sales and Marketing Decision Maker
We are GlobalVision. We'll generate export sales for you while you stay home. Please accept a space for your firm's standard promotional literature on our upcoming World Tour of our exclusive 'Direct from the USA' catalog expos. Your catalog or brochure will be professionally presented to qualified import buyers, distributors, agents, joint venture partners and government purchasing agents in the countries of your choice. This tour includes commercial and World Trade Centers in Australia, Japan, S. Africa, Singapore, Spain, Mexico, Canada, Argentina, Colombia, Venezuela and Brazil.
We have been featured in a Success Magazine cover story and are a "final five" recipient of the 1998 SBA/Chamber of Commerce 'Young Business of the Year' award. We also have an excellent D&B rating of 3A1.
Fees range from just $375-$695 per expo with a money back guarantee. Registration deadline is in
2 1/2 weeks. If you wish to have your products or services promoted in the world's best markets, while you stay home, please respond by E-mail today. Simply hit your reply button and send us a short note. Please be sure to include your NAME, COMPANY, AREA CODE and PHONE NUMBER.
Susan Khrystal, our V.P., will contact you by PHONE during business hours.
If you have received this message in error, please accept our apology. If you wish to be excluded from future mailings, simply press your reply button and send us the word "remove" in the subject line.
Sincerely,
Charles Borden
President, GlobalVision
From nobody at samson.ml.org Tue Jul 28 05:21:38 1998
From: nobody at samson.ml.org (Samson)
Date: Tue, 28 Jul 1998 05:21:38 -0700 (PDT)
Subject: "Where's Toto?"
In-Reply-To:
Message-ID: <381410550f7263fa4eb10ed0cd923f34@samson.ml.org>
On Mon, 27 Jul 1998 17:57:20 -0700 Tim May wrote:
> >Where's Toto?
>
> Toto has been bombing us for weeks. Or did you think "Linda Reed" is really
> a woman, rather than a small dog?
Shit! There goes that fantasy! For weeks I've dreamt about how kewl
it would be to fuck a female cypherpunk.
I guess I'll have to become a fed... at least I can fuck Jim Bell.
gurlmonger
From Vox9869 at aol.com Tue Jul 28 06:21:03 1998
From: Vox9869 at aol.com (Vox9869 at aol.com)
Date: Tue, 28 Jul 1998 06:21:03 -0700 (PDT)
Subject: window stickers
Message-ID: <8a1bc0a4.35bdd008@aol.com>
I'm looking for Lynrd Skynrds Freebird on a window sticker for my car. Do
you know where I can find one?
From stuffed at stuffed.net Tue Jul 28 06:36:56 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Tue, 28 Jul 1998 06:36:56 -0700 (PDT)
Subject: $200,000 pussy for sale/Double Ds make me sneeze
Message-ID: <19980728081100.25776.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/28/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From billp at nmol.com Tue Jul 28 07:20:52 1998
From: billp at nmol.com (bill payne)
Date: Tue, 28 Jul 1998 07:20:52 -0700 (PDT)
Subject: Fisher’s ORDER of July 22, 1998
Message-ID: <35BDDD11.4186@nmol.com>
Tuesday 7/28/98 7:34 AM
John Young
Morales and I met for lunch yesterday.
We formulated our response to Fisher�s ORDER of July 22, 1998.
We will get it out this week.
Wayland wants to meet this morning to talk BUSINESS.
I attach what I wrote for Wayland's and his Texas A&M buddies
SBIR proposal.
I am also working on the techie side of the digital FX.
I am getting 8051 machines working AGAIN.
Thank goodness I wrote a book documenting what we did.
I have to study my own book to TRY TO figure out what is going
wrong!
Our phone conversation when you told me about some SCARY
people you met some years ago reminds me of Sandian James Gosler.
Sandia transferred me into Robert Ewing�s division to break electronic
locks for the FBI.
Gosler was then made Ewing�s projects boss.
It was at this time that Gosler told me that my abilities were being
wasted
breaking locks for the FBI.
Gosler told me he was going to transfer me to an NSA project.
I refused.
NSA requires signed one�s civil liberties away to work on their
projects. http://www.jya.com/nsa-sun.htm
After I just met Bob Wayland, Wayland told me to keep away from Gosler.
Wayland told me - and others too - that one of Gosler�s female employees
invited Gosler to her home after work.
Gosler raped her, I was told.
Gosler threatened to kill her if she revealed the rape, I was told.
My former department manager, Kent Parsons, and Forth advocate told me
that he thought that Gosler
was �one of Sandia�s true crazies.�
Gosler is the supervisor to told me
When Payne balked, his supervisor said Payne "did not choose his jobs.
Rather, Sandia assigns duties to" him. http://www.jya.com/whp1.htm
What scares me is that guys like Gosler are working for our government.
Let�s all hope for settlement before this matter gets WORSE.
Later
bill
WEED KILLER computer interface proposal section 7/27/98 10:11 AM
Solution to controlling and collecting data from the WEED KILLER involves interfacing a personal computer
running a version of the Windows operating system to the WEED KILLER analog/digital hardware.
Windows is not a real-time operating system, therefore microcontroller controller/collector hardware
interface must be installed between a Wintel PC and the WEED KILLER hardware.
Essence of the Wintel data collector problem is that Windows 3.x or 9x responds to a hardware interrupt
usually between 70 to 150 microseconds. In rare occasions the interrupt latency may extend to 1.5
milliseconds or even longer. A microcontroller responds to an interrupt in several microseconds.
Wintel hardware controller interface is even more difficult than collection for the reason that the Windows
operating system only gives control to an application when Windows decides. In the collection, mode at
least a hardware interrupt signals Windows that the application wants control. However, the microcontroller
can send the Wintel an interrupt asking the applications code whether there is any message it needs to
send the microcontroller.
Microcontrollers have specialized timers, serial expansion ports and are, therefore, designed to be interfaced to
analog and digital hardware.
An 80C32 family microcontroller is proposed for the WEED KILLER application for reasons.
1 The 80C32 will do the job.
2 Multiple vendors of 80C32 guarantee future supply at a competitive price. Current suppliers include
Intel, AMD, Winbond, Dallas, Philips, Siemens, OKI, ATMEL, ...
3 High-speed parallel port bi-directional IEEE 1284 enhanced capability port 9 (ecp) communications
hardware between an 80C32 and PC is in the final stage of development.
4 IEEE 1284 hardware drivers are supplied with Windows NT. Custom assembler dll drivers are available
for 9x and 3.x.
5 A public-domain Forth 8051 operating system hosting a high-level language and interactive assembler with
complete source code documentation is available on Internet. http://jya.com/f86/whpf86.htm
Hardcover book further documenting 5 is available from Academic Press.
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
Only a Wintel machine is required for both hardware and software for the WEED KILLER project.
Usually a Forth hardware/software development probject on requres a voltmeter, logic probe, and,
infrequently, an oscilloscope. Reason is the INTERACTIVE control of the hardware and software
from a PC keyboard and diagnostic information easily printed to a PC monitor.
Justification for assertion made in the above paragraph comes from Internet.
NASA uses Forth extensively for its space programs. http://groucho.gsfc.nasa.gov/forth/
Ballard used polyForth http://av.yahoo.com/bin/query?p=polyforth&z=2&hc=0&hs=0
to locate wrecks of the Titanic, Bismarck, and Yorktown.
http://www.nationalgeographic.com/features/98/midway
Sun Microsystems workstation boot into Forth then invokes Solaris. http://playground.sun.com/pub/1275/
Adobe Postscript is a version of Forth.
http://www.mactech.com/articles/mactech/language/forth-postscript.html
Video game software are written mostly in Forth.
The Wintel side of the WEED KILLER project will be most-likely written in a small
amount of assembler interface code and Visual Basic.
While Forth threaded code software technology is extremely valuable in some settings,
it is not in others.
Java is a variation of Forth. http://www.mrl.nyu.edu/meyer/jvmref/
Future of Java on Wintel machines is unclear at this time.
For example,
The hottest items among techies is a browser called Opera.
This is a $40 shareware program that in speed and compact
size buts both IE and Communicator to shame. It has a slightly
different interface from either of the majors - an interface some find
refreshing while other find less than useful. As it's shareware, you can
try and then buy if you like it. One reason for its speed is that it ignores
Java - the Internet's Bandwidth Pig (IBP).
The Rumor Mill by Paul Cassel
ComputerScene Magazine July 1998
Forth executes code High-level at about 10% the speed of a compiled high-level
language.
Speed of execution of small applications is not effected by Forth�s slow execution.
Reason is that initial code is written in high-level Forth.
Inner loops are then translated into Forth assembler.
Speed is maintained with the advantage that data structures are created an maintained in
high-level language while the interactive operating system is retained for trouble shooting
both hardware and software problem.
Hardware cost of building the 80C32 the WEED KILLER boards is estimated at $10k.
Hardware design is estimated at 1 month labor at $50/hr for a total of $8k.
Software development on the 80C32 side in Forth and Forth assembler, software on the
Wintel side in Visual Basic and assembler, documentation, and training is estimated to
be 4 months for a total of $32k
/\/\/\
end
Counterfeiting Wiegand Wire Access Credentials
Bill Payne
October 16,1996
Abstract
Wiegand wire access credentials are easy and
inexpensive to counterfeit.
Access Control & Security Systems Integration magazine, October
1996 [http://www/securitysolutions.com] published the article,
Wiegand technology stands the test of time
by PAUL J. BODELL, page 12
Many card and reader manufacturers offer Wiegand (pronounced
wee-gand) output. However, only three companies in the
world make Wiegand readers. Sensor Engineering of Hamden
Conn., holds the patent for Wiegand, and Sensor has licensed
Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
Germany, to manufacture Wiegand cards and readers. ... A
Wiegand output reader is not the same thing as a Wiegand
reader, and it is important to understand the differences.
In brief, Wiegand reader use the Wiegand effect to
translate card information around the patented Wiegand
effect in which a segment of a specially treated wire
generates an electronic pulse when subjected to a specific
magnetic field. If the pulse is generated when the wire is
near a pick-up coil, the pulse can be detected by a circuit.
Lining up several rows of wires and passing them by a cold
would generate a series of pulses. Lining up two rows of
wires - calling on row "zero bits" and the other "one bits"
- and passing them by two different coils would generate two
series of pulses, or data bits. These data bits can then be
interpreted as binary data and used to control other
devices. If you seal the coils in a rugged housing with
properly placed magnets, and LED and some simple circuitry,
you have a Wiegand reader. Carefully laminate the special
wires in vinyl, and artwork, and hot-stamp a number on the
vinyl, and you have a Wiegand card.
IN THE BEGINNING
Wiegand was first to introduce to the access control
market in the late 1970s. It was immediately successful
because it filled the need for durable, secure card and
reader technology.
Embedded in the cards, Wiegand wires cannot be altered or
duplicated. ...
Bodell's Last statement is incorrect.
Tasks for EASILY counterfeiting Wiegand wire cards are
1 Locate the wires inside the card to read the 0s and 1s.
2 Build an ACCEPTABLE copy of the card.
Bodell's clear explanation of the working of a Wiegand card can
be visualized
zero row | | |
one row | |
binary 0 1 0 0 1
representation
Solutions to Task 1
A X-ray the card
B MAGNI VIEW FILM, Mylar film reads magnetic fields ...
Edmunds Scientific Company, catalog 16N1, page
205, C33,447 $11.75
is placed over the top of the Wiegand card.
COW MAGNET, Cow magnetics allow farmers to trap metal in the
stomachs of their cows. Edmunds, page 204, C31,101 $10.75
is placed under the card.
Location of the wires is easily seen on the green film.
Mark the position of the wires with a pen.
Next chop the card vertically using a shear into about 80/1000s
paper-match-sized strips.
Don't worry about cutting a wire or two.
Note that a 0 has the pen mark to the top. A 1 has the pen mark
at the bottom.
Take a business card and layout the "paper match"-like strips to
counterfeit the card number desired.
Don't worry about spacing. Wiegand output is self-clocking!
Tape the "paper-match - like" strips to the business card.
Only the FUNCTION of the card needs to be reproduced!
History
Breaking electronic locks was done as "work for others" at Sandia
National Laboratories beginning in 1992 funded by the Federal
Bureau of Investigation/Engineering Research Facility, Quantico,
VA.
The FBI opined that this work was SECRET/NATIONAL SECURITY
INFORMATION.
Details of the consequences of this work are covered in
Fired Worker File Lawsuit Against Sandia
Specialist Says He Balked When Lab Sought Electronic
Picklock Software, Albuquer Journal, Sunday April 25, 1993
State-sanctioned paranoia, EE Times, January 22, 1996
One man's battle, EE Times, March 22, 1994
Damn the torpedoes, EE Times, June 6, 1994
Protecting properly classified info, EE Times, April 11,
1994
DOE to scrutinize fairness in old whistle-blower cases,
Albuquerque Tribune, Nov 7 1995
DOE boss accelerates whistle-blower protection, Albuquerque
Tribune, March 27, 1996
DOE doesn't plan to compensate 'old' whistle-blowers with
money, Albuquerque Tribune September 27, 199
From attila at hun.org Tue Jul 28 08:31:11 1998
From: attila at hun.org (attila)
Date: Tue, 28 Jul 1998 08:31:11 -0700 (PDT)
Subject: FDR
In-Reply-To: <9807272025.AA16791@mentat.com>
Message-ID:
On Mon, 27 Jul 1998, Jim Gillogly wrote:
>Woops, cryptography relevance inadvertently embedded in a farrago by Attila:
>
>> I always wanted to believe Alger Hiss was innocent as his son Tony
>> was in my class at Harvard --he wasnt innocent, nor were the Rosenbergs
>> as the CIA had cracked the code but would not show it in court --they
>> even knew who handed over the trigger mechanism (never punished and he
>> left the U.S. after the Manhattan project and taught for many years at
>> Oxford).
>
>For one thing, the CIA didn't crack the VENONA ciphers: it was the
>Signal Intelligence Service at Arlington Hall, a predecessor of the
>NSA, and NSA continued the cracks for the next three decades.
>
you are absolutely correct --my gaffe. CIA has never worked code
to my knowledge. in fact, the old man who was the lead
mathematician on the Verona project just died, did he not?
>While the VENONA decrypts do indeed establish the Rosenbergs' guilt
>beyond reasonable doubt, the evidence about Alger Hiss is more
>tenuous. The only relevant evidence released is a single decrypt at
>http://www.nsa.gov:8080/docs/venona/docs/Mar45/30_Mar_1945_R3_m4_p1.gif
>about an interview with a Communist agent code-named ALES. A footnote
>says ALES is "Probably Alger Hiss". The text of the message says that
>ALES was at the Yalta conference (Alger Hiss was in fact there) and
>went on to Moscow (I don't know whether Hiss did this or not, nor how
>many others of the rather large American team did so).
>
I believe he went on to Moscow since he was one of FDR's two or
three top people. I would need to reread the rather long paper
on the various people involved and just how close McCarthy was
to a truth he could not prove --didn't make McCarthy any less of a
scumbag, though. I read the Alger Hiss portions of the documen-
tation rather carefully because of the personal friendship I had
with Tony who was a very genuine, refined individual (we were
on the Harvard Crimson editorial staff together). I will also
check your reference on Verona, but I believe there is more in
the open records which ties it down.
what is interesting is the number of intelligent individuals who
not only believe in the concept of socialism/communism, but were
essentially apologists for Lenin, Trotsky, Stalin, etc. through
the period 1917-1950. it was if the pain of Russia's people was
just a catharsis on the road to Utopia --by 1950, the apologia
wore rather thin...
the guilt of the man who passed the trigger from White Sands is
confirmed beyond a doubt by Verona also.
>
>In any case, the identification is less than certain, and much less
>definitive than the Rosenberg data.
>
granted, but with the outside information, sufficient I believe
to raise more than an eyebrow and Alger Hiss certainly should not
have been in the position of trust and power that he was. part of
the evidence is based on process of elimination --if not Hiss,
who was standing at FDR's side in incident or "give-up" time and
time again? with or without the McCarthy Red scare, I think the
evidence was sufficient to convict, but then and again, I am known
to be wrong --as above...
__________________________________________________________________________
go not unto usenet for advice, for the inhabitants thereof will say:
yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__
From honig at m7.sprynet.com Tue Jul 28 09:37:57 1998
From: honig at m7.sprynet.com (David Honig)
Date: Tue, 28 Jul 1998 09:37:57 -0700 (PDT)
Subject: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <3.0.5.32.19980728093729.007deb30@m7.sprynet.com>
At 10:40 AM 7/28/98 +0100, Mok-Kong Shen wrote:
>David Honig wrote:
>
>> The output of a good block cipher in feedback mode will pass Diehard tests,
>> though it is not crypto-secure.
>
>I often see the phrase 'pass Diehard test' though I don't see from
>the documents of Diehard how to evaluate the volumenous printout
>of Diehard to say exactly whether the test is passed or not. Furthermore
>the component asc2bin.exe of Diehard is buggy.
>
>M. K. Shen
>
My rough understanding: the 'P' value is a measure on the hypothesis that
the test sample is a truly random sample, where truly random is defined by
the expected
statistical properties being measured. Eg in 100 bits you expect to find
50 1's;
if you count 48, is your 100-bit sample consistant with it being
unpredictable?
If you get values near 1.0 your sample is not likely taken from a random pool.
Try this: generate 10Meg from a block cipher feeding back on itself. Diehard
will pass these. (Diehard needs 10M samples)
Now run FM hiss into your soundcard. Sample this at 8Khz (to avoid
temporal correlation)
and save to a file til you have 10Meg. Diehard will reject this. Make a
larger
file, and then gzip it down to 10Meg. (That it shrinks indicates its symbols
don't carry a full bit.) Run Diehard on this. It will pass more tests but
not all.
Take the FM hiss, feed it into a stream cipher, and start burning those OTPs.
Do this with a detuned *video* tuner for more bandwidth.
honig at alum.mit.edu
"Speech is not protected simply because it is written in a language"
Federal Misjudge Gwin on the Bernstein Case
From mitch at duzen.com.tr Tue Jul 28 09:49:22 1998
From: mitch at duzen.com.tr (S. M. Halloran)
Date: Tue, 28 Jul 1998 09:49:22 -0700 (PDT)
Subject: FDR
In-Reply-To: <199807271446.RAA18652@ankara.192.168.3.5>
Message-ID: <199807281533.SAA25475@ankara.192.168.3.5>
Someone assuming the personality of attila about yesterday (who is he
today? ask him--you might like the answer) wrote while in a mental state
that could be characterized as perceiving reality for only the very
briefest of moments:
[humongous snip of recycled rumors, shameless fabrications, hypocritical
innuendo, outright slander, and maybe a paucity of conceded-by-all-
including-the-man-himself historical fact]
> there is no left and right; there is no moral government; it's all
> about power and staying in power. ever notice how reformers only
> stay reformers until they need to run for reelection and the money
> goes to those who play ball?
So learn to play the game. Yeah, no one, even the icons we build, is a
born angel. There are relative levels of the good and bad in our society.
Do you see the word "relative"? It means no absolutes. If you want
absolutes, check out the Bible readers for whom every word is sacred. One
of my rotating tag lines talks (another Turkish proverb) addresses the
very issue you bring up: power. I hope it shows up at the end of this
message.
>
> the U.S. is already an oligarchy, next comes the plutocracy, followed
> by the triumvirate, and then the emporer (maybe with clothes) -then
> there will be a winnowing and anarchy followed by tribal states. welcome
> to history, but few will live to see it run its course --America, the
> universally hated, will be the first to be plowed under when she can
> no longer bully or buy the -pax americanus-. and the men in power know
> that a hungry disorganized populace can be subjugated by a well fed
> army.
Well, that's what we call human history. Nations and empires rise and
fall, birth and death, a natural progression. The only thing you need
worry about while living in this kennel called the planet Earth is to be
top dog.
> sorry, I really am crazy, but it's better to be crazy than insane.
You're sure about that, are you?
Mitch Halloran
Research (Bio)chemist
Duzen Laboratories Group
Ankara TURKEY
mitch at duzen.com.tr
A woman without a husband is like a horse without reins. --Turkish proverb
From jya at pipeline.com Tue Jul 28 10:10:46 1998
From: jya at pipeline.com (John Young)
Date: Tue, 28 Jul 1998 10:10:46 -0700 (PDT)
Subject: DoD on Infosec and Crypto
Message-ID: <199807281710.NAA25500@camel7.mindspring.com>
DoD released today a July 21 speech by John Hamre to a
gathering of Fortune 500 CIOs of which about half dealt
with infosec and encryption issues:
http://jya.com/dod072198.htm (53K)
Mentioned: the EFF DES crack, PGP, offshore products,
the need for expensive hardware to bolster cheap code,
Eligible Receiver, the difficulty of DoD meshing its legacy
decrepit systems with cutting edge warfighting technology,
concern about foreign Y2K, the need to slaughter when no
one volunteers to help.
DoD boosts strong encryption as the primary means to
protect mil and com info but insists on "balancing"
the needs of privacy and law enforcement. Questioners
bluntly challenged equating the two.
From mitch at duzen.com.tr Tue Jul 28 10:33:21 1998
From: mitch at duzen.com.tr (S. M. Halloran)
Date: Tue, 28 Jul 1998 10:33:21 -0700 (PDT)
Subject: MItSchill Millhouse Holler'in
In-Reply-To: <009C9CD9.EB1F5DC0.23@west.cscwc.pima.edu>
Message-ID: <199807281629.TAA25772@ankara.192.168.3.5>
Someone having looked over the shoulder of one Linda Reed--PCC West Campus
CSC, getting her password, and then using her mail account, drooled with
paralytic tongue as follos:
> ReVisionIst, to me, indicates someone who takes another look
> at what was previously seen with the aid of colour-glossy photos
> and pie-charts provided by the people who threatened to imprison
> your parents if they failed to send you to government-sponsered
> IndoctrinationCamps justified under the ruse of FreeEducation,
> which sometimes seem mostly geared for reinforcing in our minds
> how lucky we are to live in a country where the government is
> kind enough to provide us with FreeIncomeTaxReturnForms.
What color are your glossy glasses, by the way?
In addition to "FreeIncomeTaxReturnForms", they also let me urinate in the
national forests too.
>
> As far as Roosevelt, or anyone else, being "the greatest
> President" of any era, it would be more accurate to describe
> their being the GreatestBullShitter of the era, or of having
> the GreatestAdvertising/SpinDoctor/PoliticalThugs of the era.
Doesn't that count for something? Be all you can be, right? Excellence
in being immoral is certainly better than being mediocre at being immoral.
> It is a matter of speculation to what extent Roosevelt's
> actions were responsible for the recovery of the American
> economy after the collapse of the banking sector, but it is
> a matter of *fact*, supported by the testimony of even those
> who were part of FDR's political entourage, that Roosevelt
> took steps to ensure the *complete* collapse of America's
> financial institutions while Hoover was still President,
> in order to put himself in a position to extort as much
> money and power as possible out of Congress.
Is this sort of like Reagan arranging with the Iranians that the Tehran 52
could come home for Christmas, but not before?
And while having mentioned the cheese head, could you possibly do a piece
on Reagan, by the way? Now *that* is something I could enjoy reading.
And really let loose with the prose, if you please: the more insane, the
more tangential, the better.
> Perhaps the massive suffering and financial losses that
> he caused in his power-grab might be justified as being
> 'for the greater good,' except that, had he used his position
> as President-elect to help restore confidence in the economy,
> instead of destroying it, America would not have required
> nearly as much 'saving' as it subsequently needed.
Well, the implementation never really does live up to the grand design
now, does it? Ask any computer programmer here on this list.
> It is a shame that I had not been born in an age when I
> could have run for President against Roosevelt, and won.
It is a shame that we'll all just have to endure.
> Had I done so, then I, like FDR, would have granted
> myself a license to print money, and I also would have
> spent three times as much of the taxpayer's money as the
> previous 31 Presidents, combined, but *I* would have spent
> it all on beer and scotch, thus resurrecting the American
> economy without creating a HugeGovernmentMonster filled
> with political patronage appointees and employees who I
> had bought and owned with imaginary money that taxpayers
> would be responsible for repaying.
Maybe you're not so crazy after all. You know, it's not too late to enter
the race for 2000. It's a good year to start on, and because of your
intimate connections with people who are information technology-aware, you
could make some programmers fabulously wealthy by scamming people on the
Y2K problem.
> Also, being drunk all of the time, there would have been
> little chance of me turning America into a PlannedSociety
> via a New Deal in which all of the cards being dealt were
> Red.
US Grant was also a lush. How prosperous were those times when he could
pick himself off the floor?
> ICould'aBeenAContend'aMonger
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
I really am enjoying this. I had apparently a great deal of spare time in
the dog days of summer to humor the paranoids of the list although I was
rather dreading the consequences.
*** Object Lesson: NEVER ARGUE WITH AN INSANE INDIVIDUAL ***
1. You can never come to a compromise or even win: it requires that the
two sides be possessed of reason, and you have only half of what you need.
2. There is a risk that you just might start believing what that
individual believes, especially when you start conceding small points that
appear to be the truth. (Don't be fooled.)
3. It reduces you to a less dignified state before your peers. And
appearance is everything. Remember: Style, not substance. Form, not
structure.
Mitch Halloran
Research (Bio)chemist
Duzen Laboratories Group
Ankara TURKEY
mitch at duzen.com.tr
While in substance it is generally all the same, it still amazes
the observer that one will find that smelling one's own is somehow less
disgusting than smelling someone else's. --Anonymous
From attila at hun.org Tue Jul 28 11:19:21 1998
From: attila at hun.org (attila)
Date: Tue, 28 Jul 1998 11:19:21 -0700 (PDT)
Subject: "Where's Toto?"
In-Reply-To: <381410550f7263fa4eb10ed0cd923f34@samson.ml.org>
Message-ID:
y'al are missing the tornado: "Toto" is a small dog. rather
territorial in fact. now, since I have literally made the
acquaintance of both "Toto" and his master/mistress, I shall
leave the reader to solve the exercise of "who is the master?"
clue: it's not attila!
clue: all truth can be found in "Alice in Wonderland"
attila out...
On Tue, 28 Jul 1998, Samson wrote:
>On Mon, 27 Jul 1998 17:57:20 -0700 Tim May wrote:
>
>> >Where's Toto?
>>
>> Toto has been bombing us for weeks. Or did you think "Linda Reed" is really
>> a woman, rather than a small dog?
>
>Shit! There goes that fantasy! For weeks I've dreamt about how kewl
>it would be to fuck a female cypherpunk.
>
>I guess I'll have to become a fed... at least I can fuck Jim Bell.
>
>
>gurlmonger
>
>
>
>
>
>
__________________________________________________________________________
go not unto usenet for advice, for the inhabitants thereof will say:
yes, and no, and maybe, and I don't know, and fuck-off.
_________________________________________________________________ attila__
To be a ruler of men, you need at least 12 inches....
There is no safety this side of the grave. Never was; never will be.
From CTIA_Daily_News at um2.unitymail.com Tue Jul 28 11:56:38 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Tue, 28 Jul 1998 11:56:38 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 28, 1998
Message-ID: <199807281818.NAA13019@mailstrom.revnet.com>
==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.� Please click on the icon / attachment
for the most important news in wireless communications today.
A new multi-billion dollar industry is here!
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!
Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV
For more information, visit http://www.wirelessit.com�
===========================================
From whgiii at openpgp.net Tue Jul 28 12:00:32 1998
From: whgiii at openpgp.net (William H. Geiger III)
Date: Tue, 28 Jul 1998 12:00:32 -0700 (PDT)
Subject: DoD on Infosec and Crypto
In-Reply-To: <199807281710.NAA25500@camel7.mindspring.com>
Message-ID: <199807281900.PAA03283@domains.invweb.net>
-----BEGIN PGP SIGNED MESSAGE-----
In <199807281710.NAA25500 at camel7.mindspring.com>, on 07/28/98
at 01:05 PM, John Young said:
>DoD boosts strong encryption as the primary means to
>protect mil and com info but insists on "balancing"
>the needs of privacy and law enforcement. Questioners
>bluntly challenged equating the two.
You know I almost feel sorry for these guys. They *must* know that they
come off looking like complete fools with this line of "you need strong
crypto but not too strong that we can't snoop".
I did say *almost*. :)
- --
- ---------------------------------------------------------------
William H. Geiger III http://www.openpgp.net
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: OS/2: Logic, not magic.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNb4hUI9Co1n+aLhhAQFG9AQAgB6okm0WN2Ws/t4DAiMf5mXcCmX9i7Oz
mJH7kSwReK0qmCAmnsv3MNP71VjdqZXiYD+mrTGIiiUP4+k8Br6oVBvuPl8DsFot
QcdxWjcGkLFDFPLUCFxV2WYbWju1RcClt2OlwKas/koKtTqUWtRmt2hznZdblC0w
XNjxeRFQEu0=
=esV/
-----END PGP SIGNATURE-----
From attila at hun.org Tue Jul 28 12:22:56 1998
From: attila at hun.org (attila)
Date: Tue, 28 Jul 1998 12:22:56 -0700 (PDT)
Subject: MItSchill Millhouse Holler'in
In-Reply-To: <199807281629.TAA25772@ankara.192.168.3.5>
Message-ID:
On Tue, 28 Jul 1998, S. M. Halloran wrote:
[smoke the balderdash]
>
>I really am enjoying this. I had apparently a great deal of spare time in
>the dog days of summer to humor the paranoids of the list although I was
>rather dreading the consequences.
>
are you paranoid? "dread" is a contributing factor to paranoia.
dog days of summer --are you nuts? or just referring to Toto again?
>*** Object Lesson: NEVER ARGUE WITH AN INSANE INDIVIDUAL ***
>
yes, I see you are arguing with yourself. how do you look in
the mirror? have you found the Mad Hatter and the gerrymanderer?
if the gerrymanderer cuts your "table" in two, which half will
you be?
you did not learn the most important lesson of the series: you
must resort to the state of "crazy" to avoid going "insane".
they give the insane Haldol if they are lucky, a lobotomy if
that doesnt settle them down --witness Ken Kesey's "Cuckoo".
>1. You can never come to a compromise or even win: it requires that the
>two sides be possessed of reason, and you have only half of what you need.
>
you got that one right! why dont you have _any_ reason for your
intransigence?
is it true you're several cards short of a full deck? and, there
was some question as to your response to: "...and you said the
last time you beat your wife was last Saturday?"
>2. There is a risk that you just might start believing what that
>individual believes, especially when you start conceding small points that
>appear to be the truth. (Don't be fooled.)
>
are you trying to imply that small lies are the foundation
blocks of great truths?
cowardly. see Dorothy for counseling.
great truths are built on small truths and fallacies are destroyed
with small lies that the little boy in Holland did not cover with
his finger.
>3. It reduces you to a less dignified state before your peers. And
>appearance is everything. Remember: Style, not substance. Form, not
>structure.
>
aaahh, I see you are the emporer with your new clothes!
>
>While in substance it is generally all the same, it still amazes
>the observer that one will find that smelling one's own is somehow less
>disgusting than smelling someone else's. --Anonymous
>
a disgusting comment which fits a research (bio)chemist in Turkey
where birth control reminds me of:
the father of the bride, who was marrying a Turk, told her that
she was not required to submit to the Turkish indecencies, and
if her about to be husband told her to "roll over", she should
refuse.
everything was fine for about a year until one night the husband
told her to "roll over" --she refused; and when questioned, she
told him what her father had said. his reply was quite simple:
"but you do wish to become pregnant, dont you?"
__________________________________________________________________________
To be a ruler of men, you need at least 12 inches....
_________________________________________________________________ attila__
From attila at hun.org Tue Jul 28 14:42:13 1998
From: attila at hun.org (attila)
Date: Tue, 28 Jul 1998 14:42:13 -0700 (PDT)
Subject: and the number of the beast is....
In-Reply-To: <199807281629.TAA25772@ankara.192.168.3.5>
Message-ID:
see: http://cgi.pathfinder.com/netly/0,2326,201980727-14191,00.html
Paul may be a kook to some, but he has the courage to stand against
the forces who wish to take all our liberties --or should I say, those
few we have been permitted to keep.
Is it only a coincidence that the Social Security Admistration published
the new requirements for the national ID in Section 666 of the code?
"...and I looked, and behold a pale horse: and his name that sat
on him was Death, and Hell followed with him." [RV 6-8]
"and he causeth all, both small and great, rich and poor, free and bond,
to receive a markin their right hand, or in their foreheads; [Rv13-16]
"and that no man might buy or sell, save he that had the mark, or the
name of the beast, or the number of his name; [Rv13-17]
"Here is wisdom. Let him that hath understanding count the number of
the beast: for it is the number of a man; and his number is Six Hundred
threescore and six" [Rv13-18]
OK, Mitch, it says it all in Revelation --and it is happening. See
the article on defending yourself from Federal conspiracy charges
which was posted to the list a few minutes ago by anonymous.
I always define conspiracy as three guys getting drunk at a bar
while discussing the idea of robbing the bank across the street.
one passes out and the other two go across the street and attempt
to rob the bank; all three are tried and convicted: two for robbing
the bank; and three for conspiracy to rob the bank.
so, be careful who you associate with; in Turkey you just might get
rolled over....
attila out... one more time.
From bbt at mudspring.uplb.edu.ph Tue Jul 28 18:20:10 1998
From: bbt at mudspring.uplb.edu.ph (Bernardo B. Terrado)
Date: Tue, 28 Jul 1998 18:20:10 -0700 (PDT)
Subject: Rinda Leed
In-Reply-To:
Message-ID:
What the?!?!
I'm amazed, this site is not only about "encrypt...." but for the creep
also!?
===============================================================================
You give the words you have spoken,
it is not lended and are not taken back.
It is like what The Corrs sung "...your forgiven not forgotten...."
bbt at mudspring.uplb.edu.ph
bbt at peak-two.uplb.edu.ph
metaphone at altavista.net
On Wed, 29 Jul 1998, kryz wrote:
> Guys (and Girls),
> Not looking OverShoulder but BetweenLegs (both "TM") I found out (through
> European North-Sea Channel) that Rinda Leed aka Linda Reed is suffering a
> severe form of Post-Menstruation-Disorder.
> Also her Labia Majora are inflamed and bleedy so she can't sit on her
> keyboard without clottering it while typing.
> FDR... Fucking De Republic?
> Let's pray for Hur.
>
>
> Chris Harwig
> Nieuwegein, United Netherlands
>
>
>
From jf_avon at citenet.net Tue Jul 28 19:35:02 1998
From: jf_avon at citenet.net (Jean-Francois Avon)
Date: Tue, 28 Jul 1998 19:35:02 -0700 (PDT)
Subject: Fw: 1998-07-28 VP Statement on the Growing Digital Divide
Message-ID: <199807290250.WAA11287@cti06.citenet.net>
On Wed, 29 Jul 98 01:19:56 -0000 (DST), kryz wrote:
>> Office of the Vice President
>> ________________________________________________________________________
>> For Immediate Release July 28, 1998
>>
>>
>>
>> STATEMENT BY VICE PRESIDENT GORE
>> ON DEPARTMENT OF COMMERCE REPORT ABOUT
>> THE GROWING DIGITAL DIVIDE
>> The data shows that, although many more Americans now own computers,
>> minorities and low-income households are still far less likely to have
>> personal computers or on-line access to the Internet than white or more
>> affluent households.
Geee... who would have suspected that?!?
>> and Internet access -- with the deepest discounts going to the poorest
>> urban and rural schools.
>
>> In short, the E-Rate program will enable all of our children to mine
>> the riches
Yeah, mine the rich, just like "milk the cows" ...
>> will have access to the same universe of knowledge as a child in the
>> most affluent suburb.
But what about the child of the rich that got just a little less rich for
making the unrich richer and by being unrich, cannot make or affort the
latest "save the world gizmo" who would have made us all more richer?
>> Now is the time to bridge the digital divide, prevent those who can
>> benefit the most from falling through the net, and move forward with the
Three cheers for Komrad Gore!
Ciao
JFA
" There can be no compromise on basic principles. There can be no compromise on moral issues. There can be no compromise on matters of knowledge, of truth, of rational conviction." -Ayn Rand
"The government has no source of revenue, except the taxes paid by the producers. To free itself -for a while- from the limits set by reality, the government initiates a credit con game on a scale which the private manipulator could not dream of. It borrows money from you today, which is to be repaid with money it will borrow from you day after tomorrow, and so on. This is known as "deficit financing." It is made possible by the fact that the government cuts the connection between goods and money. It issues paper money, which is used as a claim check on actually existing goods-but that money is not backed by any goods, it is not backed by gold, it is backed by nothing. It is a promissory note issued to you in exchange for your goods, to be paid by you (in the form of taxes) out of your future production."
-Ayn Rand
From BagbyHtSpg at aol.com Tue Jul 28 20:57:09 1998
From: BagbyHtSpg at aol.com (BagbyHtSpg at aol.com)
Date: Tue, 28 Jul 1998 20:57:09 -0700 (PDT)
Subject: vehicle plate owner registration
Message-ID:
Hi- whether the law has changed or not, what is the status of getting lists of
oregon license plate owner's perhaps from previous sources? If this is either
very illegal, or no longer possible please let me know thank you.
From nobody at nsm.htp.org Tue Jul 28 21:45:30 1998
From: nobody at nsm.htp.org (nobody at nsm.htp.org)
Date: Tue, 28 Jul 1998 21:45:30 -0700 (PDT)
Subject: none
Message-ID: <19980729044501.314.qmail@nsm.htp.org>
BagbyHtSpg at aol.com wrote:
>
> Hi- whether the law has changed or not, what is the status of getting lists of
> oregon license plate owner's perhaps from previous sources? If this is either
> very illegal, or no longer possible please let me know thank you.
Sure, no problem. Just send fifty bucks per plate, money orders only
(do not fill in the "pay to the order of" part) to me, Sammy, at:
Oregon State Penitentiary
2004 Coastal Hwy.
Portland, Oregon 89002
Attn: Sammy Polinski A 44E52J (Block 9)
That's $50.00 per address/plate, no questions asked. Nice doin business withdya.
Sammy
From prolinemarketing at email.msn.com Tue Jul 28 23:15:40 1998
From: prolinemarketing at email.msn.com (Art1Carol)
Date: Tue, 28 Jul 1998 23:15:40 -0700 (PDT)
Subject: Spamming
Message-ID: <000101bdbad1$11dbf180$cd58fed0@default>
I do not spam! I don't think....The Government Lets it's post office's
around the country spam everyone every day, for the postage Don't we wish we
had a delete button for that?
As a matter of fact when Uncle Bill and the henchmen in Washington can
figure out how to make a profit off of email, "and they will" there won't be
any spamming laws because uncle Tax will be making a windfall of money.
I do believe each provider should have a block for unsolicited email and
instruct their customers how to use it, and if they don't, Spam Away...
The people who cry about spamming, don't know what they are going to create,
wait til they send thier loved ones an email and get charged for it, then
they'll wish they would have shut up and used the delete button....Thanks
Art smith
From nulo66 at interaktiv.design.no Wed Jul 29 00:54:47 1998
From: nulo66 at interaktiv.design.no (nulo66 at interaktiv.design.no)
Date: Wed, 29 Jul 1998 00:54:47 -0700 (PDT)
Subject: No Subject
Message-ID: <199807292318UAA12018@127.70.34.15>
They're Young !
They're Fresh !
They're Beautiful !
They're L I V E !!!
And They are yours FREE for 1 week.
Stop by and take a look:
http://207.212.128.4/newteenpics/xxxteen/enter.html
From mok-kong.shen at stud.uni-muenchen.de Wed Jul 29 01:01:46 1998
From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen)
Date: Wed, 29 Jul 1998 01:01:46 -0700 (PDT)
Subject: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <35BED6DF.F2EF9BC5@stud.uni-muenchen.de>
David Honig wrote:
>
> At 10:40 AM 7/28/98 +0100, Mok-Kong Shen wrote:
> >David Honig wrote:
> >
> >> The output of a good block cipher in feedback mode will pass Diehard tests,
> >> though it is not crypto-secure.
> >
> >I often see the phrase 'pass Diehard test' though I don't see from
> >the documents of Diehard how to evaluate the volumenous printout
> >of Diehard to say exactly whether the test is passed or not. Furthermore
> >the component asc2bin.exe of Diehard is buggy.
>
> My rough understanding: the 'P' value is a measure on the hypothesis that
> the test sample is a truly random sample, where truly random is defined by
> the expected
> statistical properties being measured. Eg in 100 bits you expect to find
> 50 1's;
> if you count 48, is your 100-bit sample consistant with it being
> unpredictable?
My concrete problem is: With the bunch of p-values how does one
(in accordance with the intention of the designer of the package)
go about to determine that the test is passed at a certain confidence
level. I don't see anything in the documents instructing the user
to do this. Maybe I indeed missed something. Please point that out
in this case.
M. K. Shen
From cognitus at earthlink.net Wed Jul 29 05:47:38 1998
From: cognitus at earthlink.net (Richard Storey)
Date: Wed, 29 Jul 1998 05:47:38 -0700 (PDT)
Subject: infant SSN assignment (whoops)
In-Reply-To:
Message-ID: <35BF1A96.BC2DBCF5@earthlink.net>
I remember discussing the changes with a friend around 1991. At the time
I was reading the changes noted to the law in IRS publication no. 17. I
believe it is also noted on Form 1040 (look in the area used for
children's SSN, it should be ref. in the instructions). Between the two
of these, you should get a pointer to the code, and all of these are
available online. The IRS is the only agency, that I have know, of using
this law and, again, I think that congress made it law c. '91.
Richard Storey
Mark Hedges wrote:
>
> Could someone kindly point toward an authoritative resource which proves
> assignment of SSN's to newborns is mandatory? Gratzi. -hedges-
From stuffed at stuffed.net Wed Jul 29 07:43:49 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Wed, 29 Jul 1998 07:43:49 -0700 (PDT)
Subject: My hubby smears curry on my breasts/17in willy too heavy to carry
Message-ID: <19980729122608.6650.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/29/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From serpent at rths.rochelle.net Wed Jul 29 09:42:41 1998
From: serpent at rths.rochelle.net (Kurt Wolter)
Date: Wed, 29 Jul 1998 09:42:41 -0700 (PDT)
Subject: Free NNTP server question...
Message-ID: <35BF528E.E3912B86@rths.rochelle.net>
Hi cypherpunks,
I grabbed your email address of an html posting of this newsgroup - in
other words, your my randomly selected answer person(s).
My question: My isp doesn't have an NNTP Server, but I'm under the
impression that I can use a "free" news server somehow. I need to be
pointed in the direction of how to set up news with a server other than
my isp.
Thanks,
serpent at rths.rochelle.net
From cognitus at earthlink.net Wed Jul 29 10:05:21 1998
From: cognitus at earthlink.net (Richard Storey)
Date: Wed, 29 Jul 1998 10:05:21 -0700 (PDT)
Subject: present president
In-Reply-To: <9807291631.AA06499@mentat.com>
Message-ID: <35BF56FA.31872612@earthlink.net>
Jim Gillogly wrote:
>
> However, SSN abuse seems like pretty thin [ice?] grounds, and not specifically attributable to the current President.
> Jim Gillogly
Yes, perjury, conspiracy, and other possible felonies seem to be much
more in evidence--for now.
Richard Storey
From honig at m7.sprynet.com Wed Jul 29 10:45:32 1998
From: honig at m7.sprynet.com (David Honig)
Date: Wed, 29 Jul 1998 10:45:32 -0700 (PDT)
Subject: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <3.0.5.32.19980729104423.007c3780@m7.sprynet.com>
At 10:01 AM 7/29/98 +0100, Mok-Kong Shen wrote:
>
>My concrete problem is: With the bunch of p-values how does one
>(in accordance with the intention of the designer of the package)
>go about to determine that the test is passed at a certain confidence
>level. I don't see anything in the documents instructing the user
>to do this. Maybe I indeed missed something. Please point that out
>in this case.
>
>M. K. Shen
I don't believe the depth of info you want is in Marsaglia's distribution
notes.
You want to talk to a real statistician...
honig at alum.mit.edu
"Speech is not protected simply because it is written in a language"
Federal Misjudge Gwin on the Bernstein Case
From CTIA_Daily_News at um2.unitymail.com Wed Jul 29 11:18:36 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Wed, 29 Jul 1998 11:18:36 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 29, 1998
Message-ID: <199807291804.NAA26214@mailstrom.revnet.com>
==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.� Please click on the icon / attachment
for the most important news in wireless communications today.
A new multi-billion dollar industry is here!
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!
Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV
For more information, visit http://www.wirelessit.com�
===========================================
From jya at pipeline.com Wed Jul 29 14:16:26 1998
From: jya at pipeline.com (John Young)
Date: Wed, 29 Jul 1998 14:16:26 -0700 (PDT)
Subject: NSA Losing Crypto Experts
Message-ID: <199807292116.RAA13371@camel14.mindspring.com>
>From Government Executive, August, 1998:
The National Security Agency is losing ground in the fight
to keep hard-to-find cryptography experts from being lured
to greener pastures.
By Richard Lardner
Price Waterhouse didn't become a force in the consulting
world by ignoring market trends. So it was no surprise when
the firm decided to expand its information security
operation. After all, the Internet has completely changed
the way business is done: Paper is out, electrons are in.
But just as electronic commerce is skyrocketing, so too are
the odds that sensitive corporate information might be
tampered with as it travels through cyberspace.
With the private sector beginning to recognize that the
digital door swings both ways, there's growing demand for
the "risk management" services Price Waterhouse and other
companies are offering to help keep the hackers at bay. To
snare these potential clients, the company needed to hire
hundreds of information technology professionals. Trouble
is, information protection may be a huge growth area, but
the talent pool is mighty shallow.
So officials at Price Waterhouse did what many other
commercial enterprises have done, and continue to do. They
targeted a group of employees at the Defense Department's
secretive National Security Agency, where thousands of the
federal government's best and brightest spend their days
eavesdropping on other countries while at the same time
ensuring that U.S. information networks are secure. Because
of the highly sensitive missions the agency performs,
companies like Price Waterhouse know they are getting
employees who are extremely good at what they do and are
solid citizens too-NSA is picky about whom it hires and
conducts thorough background investigations.
Full text:
http://www.jya.com/nsa-loss.htm
From mmotyka at lsil.com Wed Jul 29 15:38:08 1998
From: mmotyka at lsil.com (Michael Motyka)
Date: Wed, 29 Jul 1998 15:38:08 -0700 (PDT)
Subject: Amused but still looking for...
Message-ID: <35BFA4BF.2A17@lsil.com>
I love the SPACE ALIENS stuff : it's like the X-files on a druggie's
version of a Long Island Iced Tea. The politics are agreeable and
predictable. The up-to-the-minute news and the entertainment is fun but
there's really not much that is technical happening here.
Is there a coderpunks mail archive available anywhere? The URL that I've
found has been down for too long.
How about a list of ongoing projects?
When is the next CP meeting?
Mike
"Just because a taste of freedom made you lose your lunch doesn't mean
it should be removed from the menu."
From remailer at htp.org Wed Jul 29 16:05:31 1998
From: remailer at htp.org (Anonymous)
Date: Wed, 29 Jul 1998 16:05:31 -0700 (PDT)
Subject: Spamming
Message-ID: <19980729230502.23037.qmail@nsm.htp.org>
On Wed, 29 Jul 1998, Art1Carol wrote:
>
> I do not spam! I don't think....The Government Lets it's post office's
> around the country spam everyone every day, for the postage Don't we wish we
> had a delete button for that?
Hello, McFly? Anybody home? McFly!
When somebody sends mail through the postal service, they pay postage. It
costs the recipient nothing and, if anything, is actually useful for
getting a fire started in the winter. When somebody spams through the
Internet, they pay virtually nothing, yet everybody else gets to pay to
deliver, store, and filter the shit. Then there are the morons who connect
to other peoples' machines and use those to relay mail; that's quite
obviously theft.
Take your spam, for instance. You go out and pay MSN a bit of money for
some account. You mail the Cypherpunks list with your ad for porn or
whatever it was. The list operators then have to deliver it to a few
thousand people. You steal the resources of the CDR operators to deliver
it. You steal the resources of the Cypherpunks to store it. You steal CPU
time all over the place to filter it. You steal bandwidth all over the
place to deliver it.
This is obvious to anybody with more than a few dozen brain cells to rub
together. Then again, this kind of grammatically-challenged and logically
invalid garbage is what I've come to expect from users of lame services
like AOL, Prodigy, MSN, Hotmail, et al. It goes with the territory for
sites which cater to the lowest common denominator.
> I do believe each provider should have a block for unsolicited email and
> instruct their customers how to use it, and if they don't, Spam Away...
Right, and they still get to pay for the transmission, temporary storage,
filtering, etc.
Let's see. Say I filter it. My ISP gets the spam. It has to store it. I
log into the POP3 server to get my mail. I have to transfer it. After it's
been stored on the ISP for quite a while, after it's been transmitted,
after it's eaten my bandwidth, and after I've waited around for it to
transfer, I have to blow CPU time to filter it.
Yeah, like in postal junk mail the sender is really the one paying, not
the recipient.
Your clue check has bounced.
[Remainder of drivel snipped.]
Copy to MSN. Copy to the Cypherpunks list for the other lamers who like to
spam it.
From ulf at fitug.de Wed Jul 29 16:18:21 1998
From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Wed, 29 Jul 1998 16:18:21 -0700 (PDT)
Subject: cryptographic signatures
Message-ID:
A few months ago I posted statistics of the types of digital
signatures used on Usenet and in mailings lists. It turns out that the
moderators' signatures in a moderated newsgroup were tabulated for the
individual posters, resulting in somewhat too big figures for one
particular version of PGP.
Here are the current figures:
56.6% PGP 2.*
33.7% PGP 5.*
3.6% other OpenPGP implementations
4.0% S/MIME
The sample contains 249 unique (e-mail address, software version)
pairs taken from various international and local newsgroups and
mailing lists that happen to be available in my news spool (consisting
of some 24,000 articles). Perhaps someone with a full newsfeed
-- whatever that is in these days -- would like to try the same?
These are the PGP Version headers:
55 2.6.2
24 2.6.3i
19 2.6.3ia
17 PGPfreeware 5.5.3i for non-commercial use
15 2.6.3in
14 PGP for Personal Privacy 5.0
10 PGP for Personal Privacy 5.5.3
9 2.6.3a
8 PGPfreeware 5.0i for non-commercial use
7 PGP 5.5.5
6 2.6.2i
4 PGP for Personal Privacy 5.5.5
4 2.6.3a-sha1
3 PGP for Personal Privacy 5.0.1iRu
3 PGP for Business Security 5.5
3 2.6.3
2 PGPfreeware 5.5.5 for non-commercial use
2 PGPfreeware 5.5.3i for non-commercial use
2 PGP for Business Security 5.5.6
2 PGP for Business Security 5.5.2
2 PGP Cyber-Knights Templar build 5.5.3ckt
2 GNUPG v0.3.1 (GNU/Linux)
2 GNUPG v0.3.0 (GNU/Linux)
2 CTCDOS 0.1
1 Version 2.0.0
1 PGPfreeware 5.5.3i for non-commercial use
1 PGPfreeware 5.5.3 for non-commercial use
1 PGPfreeware 5.5.2 for non-commercial use
1 PGPfreeware 5.0 for non-commercial use
1 PGP for Personal Privacy 5.5
1 PGP 5.5.3 It's not only for cool looking messages!
1 PGP 5.0i
1 PGP 5.0
1 GNUPG v0.3.2a (GNU/Linux)
1 GNUPG v0.3.2 (GNU/Linux)
1 GNUPG v0.3.1a (GNU/Linux)
1 4.0 Business Edition
1 2.7.1
1 2.7
1 2.6.i
1 2.6.3uin
1 2.6.1
1 2.6
From CLCTCHR at aol.com Wed Jul 29 18:07:01 1998
From: CLCTCHR at aol.com (CLCTCHR at aol.com)
Date: Wed, 29 Jul 1998 18:07:01 -0700 (PDT)
Subject: MORE!!!!
Message-ID: <407bc87c.35bfc6d9@aol.com>
More!
From Babybee390 at aol.com Wed Jul 29 18:25:14 1998
From: Babybee390 at aol.com (Babybee390 at aol.com)
Date: Wed, 29 Jul 1998 18:25:14 -0700 (PDT)
Subject: vinyl stickers
Message-ID: <57a0eea8.35bfcae7@aol.com>
do you have music vinyl stickers , if so , could i get them wholesale?
From wombat at mcfeely.bsfs.org Wed Jul 29 18:44:35 1998
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Wed, 29 Jul 1998 18:44:35 -0700 (PDT)
Subject: vinyl stickers
In-Reply-To: <57a0eea8.35bfcae7@aol.com>
Message-ID:
No, but we do offer clues. To qualify, you must memorize the
cybernomicon, and help Tim find his shoes.
On Wed, 29 Jul 1998 Babybee390 at aol.com wrote:
> do you have music vinyl stickers , if so , could i get them wholesale?
>
>
From bill.stewart at pobox.com Wed Jul 29 23:45:25 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Wed, 29 Jul 1998 23:45:25 -0700 (PDT)
Subject: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <3.0.5.32.19980729164034.008dc100@popd.ix.netcom.com>
At 11:04 AM 7/27/98 -0700, David Honig wrote, about (Real, not Pseudo) RNGs:
>Poor RNG ----> XOR ----> BlockCipher ----> improved RNG?
> ^ |
> |____________________|
>The output of a good block cipher in feedback mode will pass Diehard tests,
>though it is not crypto-secure.
>From an information theoretic perspective, in the above scheme, you are
>slowly adding entropy to the output stream, at a rate determined by the
>actual number of bits/iteration and the bits/symbol of your poor random
>numbers.
It's an interesting problem, and I doubt there's a consensus on strength,
in particular, on how much randomness is left after you take a
random sample out of the system. I'd feel much better if you
also ran the output through a keyed hash before giving it to anyone
(e.g. run pairs or triples of 64-bit blocks plus a private salt through MD5.)
With a perfectly strong RNG, the output should also be perfectly strong,
though with a weak RNG, the block cypher does add some correlation.
You definitely should trash the initial outputs, until you've added
enough bits of real randomness that the block chaining step has
probably accumulated a whole block's worth of randomness.
Otherwise, the first round of block cypher is an ECB on a small
set of input data (e.g. 64 possible values of one 1 and 63 0s
fed into a DES cracker.)
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From bill.stewart at pobox.com Thu Jul 30 00:22:20 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Thu, 30 Jul 1998 00:22:20 -0700 (PDT)
Subject: Amused but still looking for...
In-Reply-To: <35BFA4BF.2A17@lsil.com>
Message-ID: <3.0.5.32.19980730002024.0095d100@popd.ix.netcom.com>
At 03:39 PM 7/29/98 -0700, Michael Motyka wrote:
>Is there a coderpunks mail archive available anywhere? The URL that I've
>found has been down for too long.
>
>How about a list of ongoing projects?
>
>When is the next CP meeting?
Meetings are the second Saturday of the month (for the Bay Area).
Directions and agenda will be posted early next week;
volunteers for talks are always welcome.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From mok-kong.shen at stud.uni-muenchen.de Thu Jul 30 05:11:58 1998
From: mok-kong.shen at stud.uni-muenchen.de (Mok-Kong Shen)
Date: Thu, 30 Jul 1998 05:11:58 -0700 (PDT)
Subject: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <35C06305.DE28A900@stud.uni-muenchen.de>
David Honig wrote:
> I don't believe the depth of info you want is in Marsaglia's distribution
> notes.
> You want to talk to a real statistician...
It may be of some interest for you to know that the designer of
Diehard has the rather uncommon habit of never answering mails with
questions on his package. A bug report of mine was without answer.
Later I learned that others have had the same experience.
M. K. Shen
From quickfacts9 at hotmail.com Thu Jul 30 06:17:59 1998
From: quickfacts9 at hotmail.com (quickfacts9 at hotmail.com)
Date: Thu, 30 Jul 1998 06:17:59 -0700 (PDT)
Subject: They Can Even Steal Your Identity!
Message-ID:
ARE YOU BEING INVESTIGATED?
Has your personal and credit information been stolen? Has someone
assumed your identity?
Would you like to locate an old friend, relative, military buddy or sweetheart?
Do you want to find a person's assets to collect a debt or judgement?
Would you like to check a person's criminal record before renting
them space or giving them employment?
Would you like to fix up your credit bureau report, create a new
identity or even disappear?
Are you going to have surgery? Would you like to know how many malpractice
suits have been filed against your doctor?
Now you can learn all this plus much, much more with our
brand new 45 page report
"INTERNET SLEUTH"!
Learn the Internet tools and resources that are used to investigate you,
your relatives, friends, neighbors, enemies, employees or anyone else!
We will give you thousands of Internet locations to look up people,
credit, social security, current or past employment, driving records,
criminal records, medical information, military records, addresses,
phone numbers, immigration, divorce, labor and criminal laws!
We will also give you sources to find missing children and parents,
hazardous waste sites, how to do Freedom of Information Act information
searches, how to do skip tracing and backround checks on prospective dates,
brides or grooms, employees, renters, vendors, new clients and competitors!
You will also learn about and where to get surveillance and spy devices,
private mail forwarding and annonymous email forwarding sites, search
for copyrights, patents and court cases and how to make your
assets untraceable! We will show you how to get copies of
credit reports, adoption databases, information on drugs,
poisons and how to get your share of government programs and benefits!
Can you find this information by using the Internet Search Engines?
The answer is MAYBE if you get lucky and if you want to spend many
hours going through 25,000 plus hits per subject! We and our staff
have spent hundreds of hours and many thousands of dollars compiling
this information for you! Now you can have it on a silver platter
for LESS THAN TWENTY BUCKS during this special email promotion!
You frequently hear over the media, television, radio, the newspapers,
how personal information is being used, traded and
sold over the Internet...usually without your permission or knowledge.
Our report will show you HOW IT IS DONE!!!
Would you like to find that old romantic flame...find telephone,
address or email information on almost anyone...even unlisted
phone numbers? How about your family "tree"? We will teach
you how to turn years of work into hours of fun!
Military? Check Army, Navy, Air Force and Marine records.
extensive Vietnamese war records, MIA info, much more!
Looking for a job? Find the job you are seeking...even in another state
or another country! We will teach you how!
Looking for a new love interest or spouse or even sex partner?
We will show you where to look for fast results!
Want up-to-the-minute health and medical information? Learn how to
cure fears and phoebias, the latest drugs and treatments for almost
any ailment or desease from the drug companies themselves as well as
from universities and the Center for Desease Control. Want to learn
the most effective way to loose weight? It's all here in our report!
If you believe that the information compiled about you should be as
available to you as to the people that compile it about you without
your knowledge or permission than you must order "THE INTERNET
SLEUTH REPORT" immediately!
Our "INTERNET SLEUTH REPORT" is normally sold by direct mail for
$39.95 and will soon be in book stores for $29.95. However, to
generate publicity and "get the word out" we are making this
10 day Email Special Offer of our Complete 45 Page Report for
only $19.95 plus $3 for shipping and handling [total $22.95].
Sold with our 10 Day Money Back Guarantee!
This is the biggest bargain on the Internet and the information it
will give to you will give you great power! It can really change your
life in a positive way. Order Now!
The Complete 45 page "INTERNET SLEUTH REPORT" only $19.95 plus
$3 shipping and handling - total $22.95. Shipped in plain wrapper
by First Class Mail.
Add $5 for priority mail delivery. Add $20 for overnight Express!
We accept Visa, MasterCard, American Express or Discover.
We can also accept your check by phone or Fax.
You may order by phone 9 am to 10 pm [NY Time] by phoning
[718] 287-3800
You may order by fax 24 hours per day by phoning our fax line at
[718] 462-5920.
You can fax your credit card information or your check
To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD
Send email to our special email address below:
instantinfo2 at juno.com
[Note: If you order by email and do not receive an email confirmation within
24 hours, please phone our office at 718-287-3800]
You can also order by mail by sending $22.95 cash, check, money order
or major credit card [Visa, MasterCard, American Express or Discover] to
TCPS, INC.
4718 18th Ave. Suite 135
Brooklyn, NY 11204
Make Checks & Money Orders Payable to TCPS, Inc.
New York State Residents Please Add $1.70 for Sales Tax
The Following Order Form is for Your Convenience!
Use it by Mail, Fax or Email!
.............................................................................................................
Please ship me ________copies of the INTERNET SLEUTH Report
at $19.95 each plus $3.00 for shipping and handling [$22.95]
Signature______________________________________________
Credit Card #____________________________Exp date______
Ship to: Name_________________________________________
Address________________________________________________
City________________________State___________Zip________
Area Code and Home Phone [ ]___________________________
Fax # [ ]______________________________________________
Email Address___________________________________________
To remove your name from our mailing list, send us an email with
remove in the subject line. This is a one time offer and you
should not hear from us again!
TCPS,Inc., 4718 18th Ave., Suite 135, Brooklyn, NY 11204
Office [718] 287-3800 Fax [718] 462-5920 24 hours
[9am to 10pm NY Time]
[c] Copyright 1998 TCPS, Inc. All Rights Reserved.
From stuffed at stuffed.net Thu Jul 30 10:14:09 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Thu, 30 Jul 1998 10:14:09 -0700 (PDT)
Subject: In and out brothel/My wife lays eggs like a chicken
Message-ID: <19980730151300.21245.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/30/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From honig at m7.sprynet.com Thu Jul 30 11:23:46 1998
From: honig at m7.sprynet.com (David Honig)
Date: Thu, 30 Jul 1998 11:23:46 -0700 (PDT)
Subject: encrypted FM radio hiss
In-Reply-To: <3.0.5.32.19980727110437.007b8100@m7.sprynet.com>
Message-ID: <3.0.5.32.19980730093354.007bc4d0@m7.sprynet.com>
At 02:11 PM 7/30/98 +0100, Mok-Kong Shen wrote:
>David Honig wrote:
>
>> I don't believe the depth of info you want is in Marsaglia's distribution
>> notes.
>> You want to talk to a real statistician...
>
>It may be of some interest for you to know that the designer of
>Diehard has the rather uncommon habit of never answering mails with
>questions on his package. A bug report of mine was without answer.
>Later I learned that others have had the same experience.
>
>M. K. Shen
Hmm. What packages or tests do any experimentalists out there use
for entropy measurements?
I've used Diehard. Also I look at compressability (gzip). I've found
spectrogramming utilities. I think Walker has a utility, not yet looked at.
honig at alum.mit.edu
"Speech is not protected simply because it is written in a language"
Federal Misjudge Gwin on the Bernstein Case
From CTIA_Daily_News at um2.unitymail.com Thu Jul 30 13:35:06 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Thu, 30 Jul 1998 13:35:06 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 30, 1998
Message-ID: <199807301716.MAA24997@mailstrom.revnet.com>
==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.� Please click on the icon / attachment
for the most important news in wireless communications today.
A new multi-billion dollar industry is here!
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!
Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV
For more information, visit http://www.wirelessit.com
===========================================
From howree at cable.navy.mil Thu Jul 30 17:51:37 1998
From: howree at cable.navy.mil (Reeza!)
Date: Thu, 30 Jul 1998 17:51:37 -0700 (PDT)
Subject: MORE!!!!
In-Reply-To: <407bc87c.35bfc6d9@aol.com>
Message-ID: <3.0.5.32.19980731003949.008bfc60@205.83.192.13>
At 09:05 PM 29 07 98 EDT, CLCTCHR at aol.com wrote:
>More!
>
More What?
Stupidity?
Idiocy?
Spam?
Irrelevant posts with meaningless contextless drivelous foulness?
GO THE FUCK AWAY, ALL AOL'ers.
This list is not about 3l33tnEZZ, or being *K3WL*.
Reeza!
From howree at cable.navy.mil Thu Jul 30 17:51:38 1998
From: howree at cable.navy.mil (Reeza!)
Date: Thu, 30 Jul 1998 17:51:38 -0700 (PDT)
Subject: vinyl stickers
In-Reply-To: <57a0eea8.35bfcae7@aol.com>
Message-ID: <3.0.5.32.19980731005235.008bfc60@205.83.192.13>
At 09:22 PM 29 07 98 EDT, Babybee390 at aol.com wrote:
>do you have music vinyl stickers , if so , could i get them wholesale?
>
This is not the first sticker request to be sent to the CypherPunks list.
Could you please tell us, where did you here about CypherPunks, and what
made you think we could help you with your sticker request?
This is only so we can serve you better,,,,,
Reeza!
From nobody at replay.com Thu Jul 30 23:55:36 1998
From: nobody at replay.com (Anonymous)
Date: Thu, 30 Jul 1998 23:55:36 -0700 (PDT)
Subject: Resources on how to track spammers
Message-ID: <199807310655.IAA08821@replay.com>
These are two address I thought might be useful.
This is a guide on tracking down real addresses in
usenet faked posts. Once you find the real addresses or at least have a
couple good guesses on what provider they use reply to their message and
cc: it to the postmaster and technicle contact of all the ISP's you think
it might be. They can use message ID's and logs to check where the message
originated from.
http://newdata.box.sk/neworder/harmless/GTMHH1-4.TXT
this is the same for forged e-mail.
http://newdata.box.sk/neworder/harmless/GTMHH1-5.TXT
The reason I'm sending this is because of the fact that I almost never get
spam. When I do I respond quickly and appropriately and the spam dies out.
When I joined and then posted to this list I was flooded with mail.
Personally I this has to be one of the stupided lists to spam. How many
technical peopl that are interested in crypto are really gaing to respond
to some of these stupid ads
From jya at pipeline.com Fri Jul 31 06:06:24 1998
From: jya at pipeline.com (John Young)
Date: Fri, 31 Jul 1998 06:06:24 -0700 (PDT)
Subject: Cracking DES 1-4
Message-ID: <199807311306.JAA24187@dewdrop2.mindspring.com>
We offer Chapters 1-4 of EFF's "Cracking DES:"
http://jya.com/cracking-des.htm (110K + 9 images)
URLs to other parts welcomed.
From dac at zurich.ibm.com Fri Jul 31 07:02:07 1998
From: dac at zurich.ibm.com (Marc Dacier)
Date: Fri, 31 Jul 1998 07:02:07 -0700 (PDT)
Subject: RAID98: Call For Registration
Message-ID: <9807311401.AA36670@selun.zurich.ibm.com>
Call For Registration - RAID'98
First International Workshop on the
Recent Advances in Intrusion Detection
Sponsored by
the IBM Emergency Response Service
(http://www.ers.ibm.com)
and
the Joint Research Centre of the EC
(Institute for Systems, Informatics and Safety)
(http://ntsta.jrc.it)
September 14-16, 1998
Louvain-la-Neuve, Belgium
***********************************************************************
Visit our web site
http://www.zurich.ibm.com/~dac/RAID98
for on-line information regarding the preliminary program, the
registration forms, accommodations, maps, etc..
***********************************************************************
RAID'98 is the first in an anticipated annual series of international
workshops that will bring together leading figures from academia,
government, and industry to ponder the current state of intrusion
detection1 technologies and paradigms from the research and commercial
perspectives. Its aim is to further progress in intrusion detection
by promoting the exchange of ideas among researchers, system
developers, and users and by encouraging links between these groups.
RAID'98 will be held in Louvain-la-Neuve, Belgium, on 14-16 September
1998. RAID'98 will be held in the same location as CARDIS'98
(http://www.dice.ucl.ac.be/cardis98) and ESORICS'98
(http://www.dice.ucl.ac.be/esorics98), at the same time as the former
and just prior to the latter. A registration discount is available to
those attending both the ESORICS conference and the RAID workshop.
Registration is now open, and will continue until 21 August 1998. Late
registration will continue until 4 September 1998, but only on a
space-available basis, and will include a penalty of 2000 BEF. If you
need more information regarding registration or accommodations, please
take contact with Catherine Rouyer
E-mail: Rouyer at tele.ucl.ac.be
RAID Secretariat
UCL/TELE (Mrs. Catherine Rouyer)
Place du Levant, 2
B-1348 Louvain-la-Neuve
Belgium
************************** PRELIMINARY PROGRAM *************************
**** html version available: http://www.zurich.ibm.com/~dac/RAID98 ****
MONDAY SEPTEMBER 14,1998
========================
8:00 9:00
Transfers from hotels, coffee service and participant check-in
Session 1 (Session Chair: Kathleen Jackson)
-------------------------------------------
9:00 - 9:20
Welcome and Introduction
Marc Dacier (IBM ZRL, Switzerland), Jean-Jacques
Quisquater (UCL, Belgium).
9:20 - 9:40
The Rome Labs Experience
Kevin Ziese (Cisco Systems, Inc., USA)
9:40 - 10:00
Intrusion Detection and Legal Proceedings
Peter Sommer (London School of Economics and Political Science, UK)
10:00 - 10:20
Lessons Learned in the Implementation of a
Multi-Location Network Based Real Time Intrusion Detection System
Michael Puldy (IBM Emergency Response Service, USA)
10:20 - 10:40
Break - Coffee service
Session 2 (Session Chair: Baudouin Le Charlier)
------------------------------------------------
10:40 - 11:00
GASSATA, A Genetic Algorithm as an Alternative Tool for
Security Audit Trails Analysis
Ludovic Me (SUPELEC, France)
11:00 - 11:20
Using Bottleneck Verification to Find Novel New Attacks
with a Low False Alarm Rate
Richard Lippmann (MIT Lincoln Laboratory, USA)
11:20 - 11:40
The Use of Information Retrieval Techniques for Intrusion Detection
Ross Anderson (University of Cambridge, UK)
11:40 - 12:00
Tools for Intrusion detection: Results and Lessons
Learned from the ASAX Project
Abdelaziz. Mounji (Computer Science Institute, Belgium)
12:00 - 13:30
Lunch
Session 3 (Session Chair: Yves Deswarte)
-------------------------------------------
13:30 - 13:50
Dependability of Large-scale Infrastructures and
Challenges for Intrusion Detection
Marc Wilikens (Institute for Systems, Informatics and Safety, Italy)
13:50 - 14:10
How Re(Pro)active Should An IDS Be?
Richard Overill (King's College London, UK)
14:10 - 14:30
Contribution of Quantitative Security Evaluation to Intrusion Detection
Yves Deswarte (LAAS-CNRS & INRIA, France)
14:30 - 14:50
Intrusion Detection in Telecommunication
Hai-Ping Ko (GTE Laboratories Incorporated, USA)
14:50 - 15:10
Break - Beverages
Session 4 (Session Chair: TBD)
---------------------------------
15:10 - 15:30
Problems with Network�based Intrusion Detection for Enterprise Computing
Thomas Daniels (Purdue University, USA)
15:30 - 15:50
Transitioning IDS Research Into a Viable Product
Mark Crosbie (Hewlett-Packard Corporation, USA)
15:50 - 16:10
Enhanced Network Intrusion Detection in a Smart Enterprise Environment
Ricci Ieong (Hong Kong University of Science and Technology, Hong Kong)
16:10 - 16:30
Integrating Intrusion Detection into the Network/Security Infrastructure
Mark Wood (Internet Security Systems, Inc, USA)
16:30 - 16:50
Break - Refreshments
Session 5 (Panel Chair: Rowena Chester)
---------------------------------------
16:50 - 18:00
The Nature and Utility of Standards Organizations
for the Intrusion Detection Developers Community
Participants
Dick Brackney (NSA)
Rowena Chester (Chair NCITS (ANSI) T4 Committee)
Roger French (Compaq)
Walter Fumy (Chair ISO SC27)
Larry Nelson (AT&T)
Vern Paxson (LBNL)
Gene Spafford (Purdue University)
Mark Zalewski (Chair TC68)
18:00 - 19:30
Transfers to and from hotels
19:30 - 22:00
Banquet
22:00
Transfers to hotels
TUESDAY SEPTEMBER 15,1998
=========================
8:00 9:00
Transfers from hotels and coffee service
Session 6 (Session Chair: Timothy Grance)
--------------------------------------------
9:00 - 9:20
Measuring Intrusion Detection Systems
Roy Maxion (Carnegie Mellon University, USA)
9:20 - 9:40
The 1998 DARPA/AFRL Off-line Intrusion Detection Evaluation
Richard Lippmann (MIT Lincoln Laboratory, USA)
9:40 - 10:00
Securing Network Audit Logs on Untrusted Machines
Bruce Schneier (Counterpane Systems, USA)
10:00 - 10:20
Intrusion Detection and User Privacy - A Natural Contradiction?
Roland Bueschkes (Aachen University of Technology, Germany)
10:20 - 10:40
Break - Coffee Service
Session 7 (Session Chair: Marc Dacier)
----------------------------------------
10:40 - 11:00
Design and Implementation of an Intrusion Detection System
for OSPF Routing Networks
Y. Frank Jou (MCNC, USA)
11:00 - 11:20
Designing IDLE: The Intrusion Data Library Enterprise
Ulf Lindqvist (Chalmers University of Technology, Sweden)
11:20 - 11:40
Design and Implementation of a Sniffer Detector
Stephane Grundschober (IBM Zurich Research Laboratory, Switzerland)
11:40 - 12:00
The Application of Artificial Neural Networks to Misuse Detection:
Initial Results
James Cannady (Georgia Tech Research Institute, USA)
12:00 - 13:30
Lunch
Session 8 (Session Chair: Deborah Frincke)
---------------------------------------------
13:30 - 13:50
AAFID: Autonomous Agents for Intrusion Detection
Diego Zamboni (Purdue University, USA)
13:50 - 14:10
Research Issues in Cooperative Intrusion Detection Between Multiple Domains
Deborah Frincke (University of Idaho, USA)
14:10 - 14:30
A Large-scale Distributed Intrusion Detection Framework
Based on Attack Strategy Analysis
Ming-Yuh Huang (The Boeing Company, USA)
14:30 - 14:50
NIDAR: The Design and Implementation of an Intrusion Detection System
Ong Tiang Hwee (DSO National Laboratories, Singapore)
14:50 - 15:10
Break - Beverages
Session 9 (Session Chair: Peter Sommer)
------------------------------------------
15:10 - 15:30
A UNIX Anomaly Detection System using Self-Organising Maps
Albert Hoeglund (Nokia Research Center, Finland)
15:30 - 15:50
Evaluating a Real-time Anomaly-based Intrusion Detection System
Tobias Ruighaver (University of Melbourne, Australia)
15:50 - 16:10
Audit Trail Pattern Analysis for Detecting Suspicious Process Behavior
Andreas Wespi (IBM Zurich Research Laboratory, Switzerland)
16:10 - 16:30
An Immunological Approach to Distributed Network Intrusion Detection
Steven A. Hofmeyr (University of New Mexico, USA)
16:30 - 16:50
Break - Refreshments
Session 10 (Session Chair: Kevin Ziese)
----------------------------------------
16:50 - 17:10
The Limitations of Intrusion Detection Systems on High Speed Networks
Joe Kleinwaechter (Internet Security Systems, Inc, USA)
17:10 - 17:30
CERN Network Security Monitor
Paolo Moroni (CERN, Switzerland)
17:30 - 17:50
HAXOR - A Passive Network Monitor/Intrusion Detection Sensor
Alan Boulanger (IBM Watson Research Center, USA)
17:50 - 18:10
Using Bro to detect network intruders: experiences and status
Vern Paxson (Lawrence Berkeley National Laboratory, USA)
18:10 - 19:30
Reception
19:30
Transfers to hotels
WEDNESDAY SEPTEMBER 16,1998
===========================
8:00 - 8:40
Transfers from hotels and coffee service
Session 11 (Panel Chair: Gene Spafford)
----------------------------------------
8:40 - 10:00
Intrusion Detection in the Large
Participants
Dick Brackney (NSA)
Deborah Frincke (University of Idaho)
Michel Miqueu (CNES)
Jean-Jacques Quisquater (UCL, Belgium)
Gene Spafford (Purdue University)
Marc Wilikens (Institute for Systems, Informatics and Safety)
Kevin Ziese (Cisco/Wheelgroup)
10:00
Adjourn
From stuffed at stuffed.net Fri Jul 31 07:31:41 1998
From: stuffed at stuffed.net (STUFFED/EUREKA!)
Date: Fri, 31 Jul 1998 07:31:41 -0700 (PDT)
Subject: Better living through masterbation/Digestible Dildos
Message-ID: <19980731081100.3170.qmail@eureka.abc-web.com>
Welcome to today's issue of Stuffed. To read it you should
click on the URL below. If it is not made clickable by your
email program you will need to use your mouse to highlight
the line, copy it and then paste it into your browser (then
press Return).
http://stuffed.net/98/7/31/
If you have an email program that can display web pages you
will find today's front cover should have already been disp-
layed and can be clicked on to take you straight to Stuffed.
This email is never sent unsolicited. Stuffed is the
supplement for the Eureka newsletter you subscribed to. Full
instructions on unsubscribing are in every issue of Eureka!
From beverly357 at hotmail.com Fri Jul 31 07:34:16 1998
From: beverly357 at hotmail.com (beverly357 at hotmail.com)
Date: Fri, 31 Jul 1998 07:34:16 -0700 (PDT)
Subject: World Record Sex!
Message-ID:
Attention!
Warning! Adults Only! Warning! Adults Only!
If you are under 21 years of age, or not interested in sexually
explicit material... please hit your keyboard delete button now
and please excuse the intrusion. Removal instructions appear
at the end of this email.
Available NOW for only $9.95! Next 10 Days Only!
WORLD RECORD SEX!
Be There! See It Now On Video! Unbelievable ...But True!
You Won't Believe Your Eyes!!! [As Seen on the Howard Stern Show]
"The World's Biggest Gang Bang"
See sexy Annabel Chong as she sets the world Gang Bang Record
in this fantastic video documentary that chronicles her 24 hour
sexathon with 251 men engaging in sexual intercourse and oral
sex with her! Don't worry, you won't have to stay up 24 hours
to watch it all. We've selected only the most exciting and red
hot scenes for you...all in breathtaking living color with plenty of
extreme close-ups! This video is guaranteed to knock your socks
off and leave you breathless! You've never seen anything like it!
Annabel takes on five men at a time! 90 minutes! Order Today!
Only $9.95 plus $3 shipping and handling [Total $12.95].
"GANG BANG II"
The Record Breaker!!! Starring Jasmin St. Claire!
See Beautiful and Voluptious Jasmin St. Claire shatter Annabel's
gang bang record by taking on 300 men in one 24 hour sex session!
You won't believe your eyes at all the hot firey action that you will
see as the new world record is established before your eyes as
Jasmin takes on five men at a time for sexual intercourse and
oral sex! Your friends will break down your door to see this video!
You'll be the most popular guy in town! The action is truly unreal
and you will see the best of it in living life-like color! Order Today
and see Jasmin break the record! 90 minutes. Only $9.95 plus
$3 shipping and handling [total $12.95].
Also Available...
The Uncensored Authentic Underground...
Pamela Anderson Lee & Tommy Lee
Sex Video Tape!
Everyone is talking about this exciting video! See Pam and
Tommy engaging in sexual intercourse and oral sex in the car,
on the boat and much, much more! A real collectors video! 30 minutes.
Only $9.95 plus $3 shipping and Handling [total $12.95]
"Tonya Harding Wedding Night Sex Video"
Now see the beautiful Ice Skating Shame of the Olympics
Tonya Harding engaging in sexual intercourse and oral
sex on her wedding night with husband Jeff Gillooly!
This "Bad Girl" is Hot! Don't miss this video! 30 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]
"Traci...I Love You" Starring Traci Lords
Now see the most beautiful and popular porn star in her last
adult video before she hit the big time! It's the blockbuster of
the year...sensual...fiery and exposive! Traci Lords in her most
erotic and controversial film ever! Don't Miss It! 90 minutes.
Only $9.95 plus $3 shipping and handling [total $12.95]
EMAIL SPECIAL!
ORDER ANY FOUR VIDEOS AND GET THE FIFTH ONE FREE!!!
Your order will be shipped via First Class Mail. All Shipments in plain unmarked wrapper.
For Priority Mail - Add $5
For Overnight Express - add $15
You can order by Phone, Fax, Mail or Email.
We accept all Major Credit Cards and checks by phone or fax.
Visa - MasterCard - American Express - Discover
10 Day Money Back Guarantee! We know that you will be pleased with these Videos!
To Email your order - DO NOT HIT REPLY ON YOUR KEYBOARD
Send email to our special email address below:
quickstudy at juno.com
[Note: If you order by email and do not receive an email acknowledgement within 24 hours, please phone our office at
718-287-3800]
Phone our office 9am to 10 pm [eastern time]
[718] 287-3800 to Order By Phone for FASTEST SERVICE!
We can accept your credit card or check by phone
Fax Your Order 24 hours per day to [718] 462-5920
You can fax your credit card information or your check
Order by mail by sending $12.95 per video, cash, check, money order or major credit card [Visa, MasterCard, American Express or Discover] to
TCPS, INC.
4718 18th Ave. Suite 135
Brooklyn, NY 11204
Make Checks & Money Orders Payable to TCPS, Inc.
New York State Residents Please Add 85 cents for Sales Tax per Video!
You must be over 21 years of age to order and give us your date of birth with your order!
The Following Order Form is for Your Convenience!
.............................................................................................................
Please ship me the following video tape[s]!
Qty___________Annabel Chong "World's Biggest Gang Bang"
Qty__________"Gang Bang II" Jasmin St. Claire
Qty___________"Pamela & Tommy Lee Sex Video Tape"
Qty_________ "Tonya Harding Wedding Night Sex Video Tape"
Qty__________"Traci I Love You" Traci Lords
at $9.95 each plus $3.00 for shipping and handling per tape
[$12.95 per video or "SPECIAL $51.80 for ALL FIVE"!
Credit Card #______________________________Exp Date___
I hereby represent that I am over 21 years of age.
My date of birth is_________________________________
Signature______________________________________________
Ship to: Name_______________________________________
Address____________________________________________
City________________________State___________Zip________
Area Code and Home Phone [ ]___________________________
Fax # [ ]______________________________________________
Email Address___________________________________________
To remove your name from our mailing list, send us an email with
remove in the subject line. This is a one time offer and you should not hear from us again!
FOREIGN ORDERS -Add $15us if you desire Air Parcel Post Shipment. We ship all over the world.
By deleting your unwanted E-Mail you waste one keystroke, yet
by throwing away paper mail you waste our planet! SAVE THE
TREES and support internet E-Mail instead of paper mail!
[C] Copyright TCPS 1998
From attila at hun.org Fri Jul 31 07:52:26 1998
From: attila at hun.org (attila)
Date: Fri, 31 Jul 1998 07:52:26 -0700 (PDT)
Subject: FC: Libertarian Party asks for Clinton impeachment
In-Reply-To:
Message-ID:
On Fri, 31 Jul 1998, Declan McCullagh wrote:
>
> Libertarians to Congress: Impeach Clinton for Bad Net Policy
> By Declan McCullagh
>
> [snip]
>
and then they wonder why they received less than 1% of the
vote in '96.
good enough reasons if they do the trick, but I would rather
they not impeach him; an impeachment hearing will put the
ice pack on the market... and by the time the Senate can
get around to finishing the deed, Clinton will have turned
the government over to FEMA for some flim-flam excuse. better
start getting ready to quarter the UN barbarian troops in
your house.
From toto at fhouse.org Fri Jul 31 07:59:41 1998
From: toto at fhouse.org (toto at fhouse.org)
Date: Fri, 31 Jul 1998 07:59:41 -0700 (PDT)
Subject: SECRET.AS7
Message-ID:
*** The Fire House Inn ***
Come visit us
Telnet: fhouse.org
WWW: fhouse.org
***********
SECRET.AS7
-------------- next part --------------
A non-text attachment was scrubbed...
Name: bin00000.bin
Type: application/octet-stream
Size: 11697 bytes
Desc: ""
URL:
From toto at fhouse.org Fri Jul 31 08:05:01 1998
From: toto at fhouse.org (toto at fhouse.org)
Date: Fri, 31 Jul 1998 08:05:01 -0700 (PDT)
Subject: TOP TEN1 / .hfx / PASSWORD: ultimatesecurity
Message-ID:
*** The Fire House Inn ***
Come visit us
Telnet: fhouse.org
WWW: fhouse.org
***********
TOPTEN1.ASC
-------------- next part --------------
A non-text attachment was scrubbed...
Name: bin00001.bin
Type: application/octet-stream
Size: 27203 bytes
Desc: ""
URL:
From toto at fhouse.org Fri Jul 31 08:06:23 1998
From: toto at fhouse.org (toto at fhouse.org)
Date: Fri, 31 Jul 1998 08:06:23 -0700 (PDT)
Subject: Pima Community College / PASSWORD: ibrokepgp
Message-ID:
*** The Fire House Inn ***
Come visit us
Telnet: fhouse.org
WWW: fhouse.org
***********
PIMA1.ASC
-------------- next part --------------
A non-text attachment was scrubbed...
Name: bin00002.bin
Type: application/octet-stream
Size: 6505 bytes
Desc: ""
URL:
From billp at nmol.com Fri Jul 31 08:19:05 1998
From: billp at nmol.com (bill payne)
Date: Fri, 31 Jul 1998 08:19:05 -0700 (PDT)
Subject: Cracking DES earlier
Message-ID: <35C1DF28.4B71@nmol.com>
Friday 7/31/98 8:23 AM
John Young
I am reading parts of http://www.jya.com/cracking-des.htm#foreword.
Bill Goldrick and I talked on the phone several days ago.
Goldrick had been reading about Cracking DES at jya.com.
Goldrick reminded me that in the late 1980s that NSA employee Mark
Unkenholtz told me and others at Sandia that NSA had broken DES.
Unkenholtz is the �Mark� mentioned at http://jya.com/da/whpda.htm
Appendix S.
Amy Johnston, cc, was Mark Unkenholtz�s fiancee.
I faxed the Hern DRAFT letter to her for reason that NSA did not have an
unclassified fax machine readily available.
For those who might want to get Sandia crypto history right "The First
Ten Years of Public Key Cryptography," Proceedings of the IEEE, 76(5),
May 1988. referenced at http://www.aci.net/kalliste/nukearse.htm,
Goldrick
1 was supervisor of Mark Schaefer who build the second CTBT seismic data
authenticator
http://jya.com/da/whpda.htm
I used Schaefer�s TEMPEST design schematics.
2 supervised deployment of the seismic stations in Hamar Norway. This
is detailed
in William Burrows book Deep Black.
3 supervised Jim Walkup who was responsible for placing the CTBT data
authenticator
described at http://jya.com/da/whpda.htm in the field.
date: September 11, 1991
to: Bill Payne, 9236
[Signature]
from: James Walkup, 9233
subject: DSVS authenticator records
4 handled recall of some CLASSIFIED algorithm eprom chips that somehow
made their
way into the field in 3.
NSA believes that the STEP size and non-linear feedback function are
CLASSIFIED SECRET/NSI. http://jya.com/da/whpda.htm
The NSA R register feedback function is classified. For each data bit
processed, both the F and R registers are stepped multiple times. The
number of steps is classified.
But we ALL now know the CLASSIFIED SECRET/NSI value is 31.
http://jya.com/nsasuit.txt
5 rejected NSA employee Donald Simard�s http://jya.com/nsasuit.txt
order to deploy the classified algorithm.
Simard told Goldrick that NSA would DECLASSIFY Benincasa's algorithm
LATER.
Let�s all hope for settlement of the unfortunate matter before it gets
WORSE.
I want to revise my book
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
It has been over about 27 years since I directed any Ph.D. students
http://www-hto.usc.edu/software/seqaln/doc/html/gfsr.3.html
http://www.friction-free-economy.com/
http://www.mhpcc.edu/general/john.html
Perhaps I should get back into the business of directing and
participating in Ph.D thesis work? I have some GREAT Ph.D. thesis topic
ideas in the area of
FORTH is applicable to hardware intensive projects
implemented by one, two, or three workers. Robots,
computer numerical controlled machines, weapons
programmers, cryptographic processors, engine
controllers, unmanned observatories, computer hardware
debuggers, laser printer graphics controllers, video
games, work station device drivers, writing BASICs are
all candidates for FORTH software technology. FORTH is
a one of the top choices for embedded controller
applications.
Later
bill
From toto at fhouse.org Fri Jul 31 10:45:14 1998
From: toto at fhouse.org (toto at fhouse.org)
Date: Fri, 31 Jul 1998 10:45:14 -0700 (PDT)
Subject: CC - SAHMD / Password: convectionalencryption
Message-ID:
*** The Fire House Inn ***
Come visit us
Telnet: fhouse.org
WWW: fhouse.org
***********
COCK1.ASC
-------------- next part --------------
A non-text attachment was scrubbed...
Name: bin00003.bin
Type: application/octet-stream
Size: 3283 bytes
Desc: ""
URL:
From CTIA_Daily_News at um2.unitymail.com Fri Jul 31 10:48:06 1998
From: CTIA_Daily_News at um2.unitymail.com (CTIA Daily News)
Date: Fri, 31 Jul 1998 10:48:06 -0700 (PDT)
Subject: CTIA Daily News from WOW-COM - July 31, 1998
Message-ID: <199807311730.MAA25935@mailstrom.revnet.com>
==========================================
Welcome to today's edition of the CTIA Daily News
from WOW-COM.� Please click on the icon / attachment
for the most important news in wireless communications today.
A new multi-billion dollar industry is here!
Be at CTIA's WIRELESS I.T. '98
where personal computing and communications converge!
Don't Miss Your Chance -- October 12-14, 1998
Bally's Las Vegas, Las Vegas, NV
For more information, visit http://www.wirelessit.com�
===========================================
From toto at fhouse.org Fri Jul 31 10:58:22 1998
From: toto at fhouse.org (toto at fhouse.org)
Date: Fri, 31 Jul 1998 10:58:22 -0700 (PDT)
Subject: Secret Service With A Smile - SAHMD!!!
Message-ID:
The 'Secret Service With A Smile' chapter of SPACE ALIENS HIDE MY
DRUGS!!!
was sent to the CypherPunks Disturbed Male LISP as secret.as1 -->
secret.as7
earlier today. It is a DOS .prn file, which is the only type of copy I
could save
with the FAX software I am using.
I was forced to delete the original text file from the computer I was
using, but
the Secret Service has copies of it, so anyone who wishes the original
text
file can contact:
United States Secret Service
Jeremy A.C. Sheridan
Special Agent
300 West Congress, Room 4V
Tucson, AZ 85701
Phone 520-670-4730
Fax 520-670-4826
Toto
~~~~
*** The Fire House Inn ***
Come visit us
Telnet: fhouse.org
WWW: fhouse.org
***********
From toto at fhouse.org Fri Jul 31 11:07:04 1998
From: toto at fhouse.org (toto at fhouse.org)
Date: Fri, 31 Jul 1998 11:07:04 -0700 (PDT)
Subject: Top Ten - SAHMD!!!
Message-ID:
Top Ten Things You Don't Want To Tell
The Secret Service When They Visit
_____________________________
SPACE ALIENS HIDE MY DRUGS!!!
10. You're here about the VOICES, aren't you?
They *told* me you were coming...
9. Look, pal, I don't even know who the President *was*...
I mean...*is*...
Uuhhh...is it 10:15 in DC yet?
8. Do either of you guys know where the 'yellow' wire goes?
7. The First Lady's butt looks pretty good through a 'scope', eh?
6. You must have me confused with my brother, MadDog...the *good* son...
5. Could you put this around my forearm, give it a twist, and then pull
it really tight?
Hey, don't bump the spoon!
4. *Which* death threat? Unless you're going to be more specific,
you're just wasting my time and yours.
3. 'One Bullet, One Vote' bumperstickers are meant as *humor*?
You're schitting me, right?
2. Next time you're guarding the President at a White House speech,
do you think you could stand just a tad further to the left?
1. "Cuckoo-Cuckoo"
*** The Fire House Inn ***
Come visit us
Telnet: fhouse.org
WWW: fhouse.org
***********
From billp at nmol.com Fri Jul 31 11:13:25 1998
From: billp at nmol.com (bill payne)
Date: Fri, 31 Jul 1998 11:13:25 -0700 (PDT)
Subject: From: dac@zurich.ibm.com (Marc Dacier)
Message-ID: <35C20839.43A1@nmol.com>
Friday 7/31/98 11:40 AM
John Young
I am looking at http://www.jya.com/raid98.htm
Dacier asked me why NSA/Sandia was concerned about what
each bit in an executable image did when I was in his office in
Zurich in April 1997.
Spiking, of course. A SECRET OTHER FUNCTION to a device.
http://caq.com/cryptogate http://www.aci.net/kalliste/speccoll.htm
NSA/Sandia doesn�t trust its own employees!
On the other hand, NSA/Sandia employees don�t trust NSA/Sandia either.
The REAL WORLD again.
IBM Zurich was BIG into Java.
Network World, July 20, 1998 page 6
The incredible shrinking Java alliance
By Chris Nerney and Andy Eddy
A year ago there were four of them, members of a new alliance
touting a potent new weapon designed to end Microsoft Corp.'s
growing dominance in the computing industry.
Now the Java Gang of Four is the Gang of Two and a Half.
Java creator Sun Microsystems, Inc., of course, is still fully
committed to the programming language, as is IBM. ...
Not looking good for Java future.
Java is similar to FORTH. FORTH executes super-slow on high-level
in most machines. About 10% of the speed of a compiled-language
program - such as Visual Basic.
Specialized Forth and Java machine can be made to run fast.
http://groucho.gsfc.nasa.gov/forth/ and http://www.ptsc.com/
But I am not confident Java or Forth machines are going anywhere.
May be hard to get parts in the future.
But I'm confident about the 80C32 supply!
http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
Let's hope this UNFORTUNATE matter http://jya.com/whpfiles.htm gets
settled soon so that we can move on to constructive projects.
Later
bill
/\/\/\
Marc
Since I was working the OTHER SIDE of
Recent Advances in Intrusion Detection
for the FBI, I might be able to give a nice talk about what the US
government is REALLY UP TO on defeating intrusion detection!
I am not reading e-mail.
best
bill
Hi Matthias!
Counterfeiting Wiegand Wire Access Credentials
Bill Payne
October 16,1996
Abstract
Wiegand wire access credentials are easy and
inexpensive to counterfeit.
Access Control & Security Systems Integration magazine, October
1996 [http://www/securitysolutions.com] published the article,
Wiegand technology stands the test of time
by PAUL J. BODELL, page 12
Many card and reader manufacturers offer Wiegand (pronounced
wee-gand) output. However, only three companies in the
world make Wiegand readers. Sensor Engineering of Hamden
Conn., holds the patent for Wiegand, and Sensor has licensed
Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
Germany, to manufacture Wiegand cards and readers. ... A
Wiegand output reader is not the same thing as a Wiegand
reader, and it is important to understand the differences.
In brief, Wiegand reader use the Wiegand effect to
translate card information around the patented Wiegand
effect in which a segment of a specially treated wire
generates an electronic pulse when subjected to a specific
magnetic field. If the pulse is generated when the wire is
near a pick-up coil, the pulse can be detected by a circuit.
Lining up several rows of wires and passing them by a cold
would generate a series of pulses. Lining up two rows of
wires - calling on row "zero bits" and the other "one bits"
- and passing them by two different coils would generate two
series of pulses, or data bits. These data bits can then be
interpreted as binary data and used to control other
devices. If you seal the coils in a rugged housing with
properly placed magnets, and LED and some simple circuitry,
you have a Wiegand reader. Carefully laminate the special
wires in vinyl, and artwork, and hot-stamp a number on the
vinyl, and you have a Wiegand card.
IN THE BEGINNING
Wiegand was first to introduce to the access control
market in the late 1970s. It was immediately successful
because it filled the need for durable, secure card and
reader technology.
Embedded in the cards, Wiegand wires cannot be altered or
duplicated. ...
Bodell's Last statement is incorrect.
Tasks for EASILY counterfeiting Wiegand wire cards are
1 Locate the wires inside the card to read the 0s and 1s.
2 Build an ACCEPTABLE copy of the card.
Bodell's clear explanation of the working of a Wiegand card can
be visualized
zero row | | |
one row | |
binary 0 1 0 0 1
representation
Solutions to Task 1
A X-ray the card
B MAGNI VIEW FILM, Mylar film reads magnetic fields ...
Edmunds Scientific Company, catalog 16N1, page
205, C33,447 $11.75
is placed over the top of the Wiegand card.
COW MAGNET, Cow magnetics allow farmers to trap metal in the
stomachs of their cows. Edmunds, page 204, C31,101 $10.75
is placed under the card.
Location of the wires is easily seen on the green film.
Mark the position of the wires with a pen.
Next chop the card vertically using a shear into about 80/1000s
paper-match-sized strips.
Don't worry about cutting a wire or two.
Note that a 0 has the pen mark to the top. A 1 has the pen mark
at the bottom.
Take a business card and layout the "paper match"-like strips to
counterfeit the card number desired.
Don't worry about spacing. Wiegand output is self-clocking!
Tape the "paper-match - like" strips to the business card.
Only the FUNCTION of the card needs to be reproduced!
History
Breaking electronic locks was done as "work for others" at Sandia
National Laboratories beginning in 1992 funded by the Federal
Bureau of Investigation/Engineering Research Facility, Quantico,
VA.
The FBI opined that this work was SECRET/NATIONAL SECURITY
INFORMATION.
Details of the consequences of this work are covered in
Fired Worker File Lawsuit Against Sandia
Specialist Says He Balked When Lab Sought Electronic
Picklock Software, Albuquer Journal, Sunday April 25, 1993
State-sanctioned paranoia, EE Times, January 22, 1996
One man's battle, EE Times, March 22, 1994
Damn the torpedoes, EE Times, June 6, 1994
Protecting properly classified info, EE Times, April 11,
1994
DOE to scrutinize fairness in old whistle-blower cases,
Albuquerque Tribune, Nov 7 1995
DOE boss accelerates whistle-blower protection, Albuquerque
Tribune, March 27, 1996
DOE doesn't plan to compensate 'old' whistle-blowers with
money, Albuquerque Tribune September 27, 199
From jya at pipeline.com Fri Jul 31 12:09:45 1998
From: jya at pipeline.com (John Young)
Date: Fri, 31 Jul 1998 12:09:45 -0700 (PDT)
Subject: Cracking DES 9-12
Message-ID: <199807311909.PAA21158@camel7.mindspring.com>
We've added Chapters 9-12, same URL:
http://jya.com/cracking-des.htm (146K + 9 images)
No prohibited code, yet.
From cognitus at earthlink.net Fri Jul 31 12:27:43 1998
From: cognitus at earthlink.net (Richard Storey)
Date: Fri, 31 Jul 1998 12:27:43 -0700 (PDT)
Subject: Comments on this Pentagon opinion...not a new debate
In-Reply-To:
Message-ID: <35C21B6F.449E12C1@earthlink.net>
Tim May wrote:
>
> At 10:01 AM -0700 7/31/98, Harvey Rook (Exchange) wrote:
[...body of text snipped...]
>
> The latest crypto proposals have brought nothing new to the debate.
Indeed.
It strikes me as alarming at times, when considering the condition of
civil liberties in this country and just how close government tries to
shave off freedoms that are not *explicit* in the bill of rights, how
poorer our liberties would be defended without those ten, basic
amendments; and further, that they were added as an after thought,
ridiculed by many, demanded by some, but they have proven to be one of
the last lines of defence between our liberties and this centralised,
law making den in Washington. These ten are not nearly enough.
Richard Storey
From nobody at replay.com Fri Jul 31 12:52:54 1998
From: nobody at replay.com (Anonymous)
Date: Fri, 31 Jul 1998 12:52:54 -0700 (PDT)
Subject: Secret Service With A Smile - SAHMD!!! / Pwd: lco
Message-ID: <199807311953.VAA25070@replay.com>
-----BEGIN PGP MESSAGE-----
Version: 2.6.2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=i0Ix
-----END PGP MESSAGE-----
*** The Fire House Inn ***
Come visit us
Telnet: fhouse.org
WWW: fhouse.org
***********
From honig at m7.sprynet.com Fri Jul 31 13:54:05 1998
From: honig at m7.sprynet.com (David Honig)
Date: Fri, 31 Jul 1998 13:54:05 -0700 (PDT)
Subject: Refining entropy
In-Reply-To: <199807302045.WAA19934@replay.com>
Message-ID: <3.0.5.32.19980731134616.007c42d0@m7.sprynet.com>
This essay addresses the question, How can we improve the output of a bad
true RNG? By "true RNG" I mean a source of unpredictability, which
necessarily derives from an analog measurement. By "bad" RNG
I mean that its output does not carry one bit of information per binary
symbol. This means that not all output symbols are equiprobable. Methods
to improve various properties of RNGs are called conditioning algorithms.
I had begun by thinking that, since the output of a block cipher in
feedback mode (ie, a stream cipher) is uniformly distributed ("white") that
it would be sufficient conditioning to feed a bad RNG into a block cipher
with feedback. Here, the bad RNG would kick the cipher out of the fixed,
but key-dependant, sequence it would otherwise generate.
But it bothered me that I was producing more apparently-random bits than I
actually had negentropy.
On cypherpunks, Bill Stewart mentioned using hashes instead of ciphers. A
hash is like a cipher in that
changing any input or key bit changes the output unpredictably, but a hash
is irreversible because there are fewer output bits than input bits. The
simplest hash is a one-bit parity; MD5
is a more expensive keyed hashing function used for message authentication.
Thinking about a hash instead of a cipher was interesting because now we
reduce the number of output bits, which if done right, could improve the
information carried by each binary digit. We take the MAC of an imperfect
random number and toss the original random, retaining the MAC as our better
random value.
Can we get an analytic handle on this?
Let's take Mr. Shannon's measure of information over a discrete alphabet.
The average amount of information per symbol is the (negation of the) sum
of the probabilities of each symbol times the log base 2 of that probability.
If we have two symbols, A and B, and each occurs half the time, we have
1/2 * log (1/2) + 1/2 * log(1/2) = -1 = 1 bit, which is what we expect.
If symbol A occurs, say, 3 times more often than B, we get:
3/4* log(3/4) + 1/4*log(1/4) = 3/4(log 3 - 2) + -2/4 = 3/4 log 3 - 6/4 -
2/4 = 3/4 log 3 - 2 =
2- 3/4*log 3 bits/symbol after handling the minus sign. This is less than
the optimum 1 bit/symbol, achieved when the symbols are equiprobable as above.
So now we have demonstrated how to use Shannon to measure the actual
entropy carried by each imperfectly random symbol. We now use this to
measure the result of XORing two such imperfect values.
We continue to use the imperfect RNG source where A occurs 3/4 time, B
occurs 1/4 time. We take
two of these badbits and XOR them:
A.A=A,
A.B=B,
B.A=B,
B.B=A.
We now compute the liklihood of each output symbol:
A.A 3/4 * 3/4 = 9/16 (A)
A.B 3/4 * 1/4 = 3/16 (B)
B.A 1/4 * 3/4 = 3/16 (B)
B.B 1/4 * 1/4 =1/16 (A)
So the output has symbol A 10/16 of the time, and B 6/16 of the time. The
difference in frequency has decreased; the distribution becomes more
uniform, which means that the information content of the output has
increased. The information content of the whole system can only decrease;
but if you destroy the inputs
the output carries their entropy.
The exact amount of information per symbol in the 10:6 distribution is
10/16 * log(10/16) + 6/16 * log(6/16) = 10/16 * (log10 - 4) + 6/16*(log6
-4) =
10/16 log 10 - 40/16 + 6/16 log 6 - 24/16 =
10/16 log 10 + 6/16 log 6 - 4 the negative of which is
4 - (10log 10 + 6 log 6) / 16
Which is less than 1 but more than the content of each of the 2 bits we
started with.
Intuitively, we have gone from this distribution:
----
------------
crossed with itself, yields this distribution of states:
-
---
---
---------
which when collapsed yields this:
------
----------
So: we can use Shannon's analytic measure to look at entropy collection
through
a combination of imperfect input bits. It shows us that we'll never get
perfectly uniformly
distributed symbols by combining arbitrary quantities of nonuniformly
distributed symbols, but we can get arbitrarily close. All we need is more
input.
Quantity vs. quality.
A video ADC acquires say 8 bits resolution at 4 msamples/sec. This might
condense down to
4 Mbits/sec true negentropy, which is about half the rate of regular Ethernet.
honig at alum.mit.edu
"Speech is not protected simply because it is written in a language"
Federal Misjudge Gwin on the Bernstein Case
From merata at sums.ac.ir Fri Jul 31 14:00:31 1998
From: merata at sums.ac.ir (Anooshiravan Merat)
Date: Fri, 31 Jul 1998 14:00:31 -0700 (PDT)
Subject: From: dac@zurich.ibm.com (Marc Dacier)
In-Reply-To: <35C20839.43A1@nmol.com>
Message-ID: <35C22BB0.398F875A@sums.ac.ir>
STOP SENDING ME EMAILS MR PAYNE
STOOOPPPP IITTTT!!!!!!
bill payne wrote:
> Friday 7/31/98 11:40 AM
>
> John Young
>
> I am looking at http://www.jya.com/raid98.htm
>
> Dacier asked me why NSA/Sandia was concerned about what
> each bit in an executable image did when I was in his office in
> Zurich in April 1997.
>
> Spiking, of course. A SECRET OTHER FUNCTION to a device.
>
> http://caq.com/cryptogate http://www.aci.net/kalliste/speccoll.htm
>
> NSA/Sandia doesn�t trust its own employees!
>
> On the other hand, NSA/Sandia employees don�t trust NSA/Sandia either.
>
> The REAL WORLD again.
>
> IBM Zurich was BIG into Java.
>
> Network World, July 20, 1998 page 6
>
> The incredible shrinking Java alliance
>
> By Chris Nerney and Andy Eddy
>
> A year ago there were four of them, members of a new alliance
> touting a potent new weapon designed to end Microsoft Corp.'s
> growing dominance in the computing industry.
> Now the Java Gang of Four is the Gang of Two and a Half.
> Java creator Sun Microsystems, Inc., of course, is still fully
> committed to the programming language, as is IBM. ...
>
> Not looking good for Java future.
>
> Java is similar to FORTH. FORTH executes super-slow on high-level
> in most machines. About 10% of the speed of a compiled-language
> program - such as Visual Basic.
>
> Specialized Forth and Java machine can be made to run fast.
> http://groucho.gsfc.nasa.gov/forth/ and http://www.ptsc.com/
>
> But I am not confident Java or Forth machines are going anywhere.
> May be hard to get parts in the future.
>
> But I'm confident about the 80C32 supply!
> http://www.apcatalog.com/cgi-bin/AP?ISBN=0125475705&LOCATION=US&FORM=FORM2
>
> Let's hope this UNFORTUNATE matter http://jya.com/whpfiles.htm gets
> settled soon so that we can move on to constructive projects.
>
> Later
> bill
>
> /\/\/\
>
> Marc
>
> Since I was working the OTHER SIDE of
>
> Recent Advances in Intrusion Detection
>
> for the FBI, I might be able to give a nice talk about what the US
> government is REALLY UP TO on defeating intrusion detection!
>
> I am not reading e-mail.
>
> best
> bill
>
> Hi Matthias!
>
> ------------------------------------------------------------------------
> Counterfeiting Wiegand Wire Access Credentials
>
> Bill Payne
>
> October 16,1996
>
> Abstract
>
> Wiegand wire access credentials are easy and
> inexpensive to counterfeit.
>
> Access Control & Security Systems Integration magazine, October
> 1996 [http://www/securitysolutions.com] published the article,
>
> Wiegand technology stands the test of time
>
> by PAUL J. BODELL, page 12
>
> Many card and reader manufacturers offer Wiegand (pronounced
> wee-gand) output. However, only three companies in the
> world make Wiegand readers. Sensor Engineering of Hamden
> Conn., holds the patent for Wiegand, and Sensor has licensed
> Cardkey of Simi Valley, Calif., and Doduco of Pforzheim,
> Germany, to manufacture Wiegand cards and readers. ... A
> Wiegand output reader is not the same thing as a Wiegand
> reader, and it is important to understand the differences.
>
> In brief, Wiegand reader use the Wiegand effect to
> translate card information around the patented Wiegand
> effect in which a segment of a specially treated wire
> generates an electronic pulse when subjected to a specific
> magnetic field. If the pulse is generated when the wire is
> near a pick-up coil, the pulse can be detected by a circuit.
> Lining up several rows of wires and passing them by a cold
> would generate a series of pulses. Lining up two rows of
> wires - calling on row "zero bits" and the other "one bits"
> - and passing them by two different coils would generate two
> series of pulses, or data bits. These data bits can then be
> interpreted as binary data and used to control other
> devices. If you seal the coils in a rugged housing with
> properly placed magnets, and LED and some simple circuitry,
> you have a Wiegand reader. Carefully laminate the special
> wires in vinyl, and artwork, and hot-stamp a number on the
> vinyl, and you have a Wiegand card.
>
> IN THE BEGINNING
>
> Wiegand was first to introduce to the access control
> market in the late 1970s. It was immediately successful
> because it filled the need for durable, secure card and
> reader technology.
> Embedded in the cards, Wiegand wires cannot be altered or
> duplicated. ...
>
> Bodell's Last statement is incorrect.
>
> Tasks for EASILY counterfeiting Wiegand wire cards are
>
> 1 Locate the wires inside the card to read the 0s and 1s.
>
> 2 Build an ACCEPTABLE copy of the card.
>
> Bodell's clear explanation of the working of a Wiegand card can
> be visualized
>
> zero row | | |
>
> one row | |
>
> binary 0 1 0 0 1
> representation
>
> Solutions to Task 1
>
> A X-ray the card
>
> B MAGNI VIEW FILM, Mylar film reads magnetic fields ...
> Edmunds Scientific Company, catalog 16N1, page
> 205, C33,447 $11.75
>
> is placed over the top of the Wiegand card.
>
> COW MAGNET, Cow magnetics allow farmers to trap metal in the
> stomachs of their cows. Edmunds, page 204, C31,101 $10.75
> is placed under the card.
>
> Location of the wires is easily seen on the green film.
>
> Mark the position of the wires with a pen.
>
> Next chop the card vertically using a shear into about 80/1000s
> paper-match-sized strips.
>
> Don't worry about cutting a wire or two.
>
> Note that a 0 has the pen mark to the top. A 1 has the pen mark
> at the bottom.
>
> Take a business card and layout the "paper match"-like strips to
> counterfeit the card number desired.
>
> Don't worry about spacing. Wiegand output is self-clocking!
>
> Tape the "paper-match - like" strips to the business card.
>
> Only the FUNCTION of the card needs to be reproduced!
>
> History
>
> Breaking electronic locks was done as "work for others" at Sandia
>
> National Laboratories beginning in 1992 funded by the Federal
> Bureau of Investigation/Engineering Research Facility, Quantico,
> VA.
>
> The FBI opined that this work was SECRET/NATIONAL SECURITY
> INFORMATION.
>
> Details of the consequences of this work are covered in
>
> Fired Worker File Lawsuit Against Sandia
> Specialist Says He Balked When Lab Sought Electronic
> Picklock Software, Albuquer Journal, Sunday April 25, 1993
>
> State-sanctioned paranoia, EE Times, January 22, 1996
>
> One man's battle, EE Times, March 22, 1994
>
> Damn the torpedoes, EE Times, June 6, 1994
>
> Protecting properly classified info, EE Times, April 11,
> 1994
>
> DOE to scrutinize fairness in old whistle-blower cases,
> Albuquerque Tribune, Nov 7 1995
>
> DOE boss accelerates whistle-blower protection, Albuquerque
> Tribune, March 27, 1996
>
> DOE doesn't plan to compensate 'old' whistle-blowers with
> money, Albuquerque Tribune September 27, 199
From cognitus at earthlink.net Fri Jul 31 14:41:01 1998
From: cognitus at earthlink.net (Richard Storey)
Date: Fri, 31 Jul 1998 14:41:01 -0700 (PDT)
Subject: Comments on this Pentagon opinion...not a new debate
In-Reply-To:
Message-ID: <35C23AA4.4E9C460B@earthlink.net>
Jim Burnes wrote:
>
> Just remember that, in any conceivable interpretation of the
> constitution, the federal government has *already* vastly overstepped
> their allocated powers. Why are you so suprised that they would try
> to eliminate the few remaining liberties the sheeple have?
Irony.
> These ten are more than enough. Jeffeson himself said, paraphrased,
> that when the state starts violating these basic liberties, then
> its time to call out the militia, start putting up tents and making
> war plans.
>
I take a view of liberty as I believe it exists under natural law. Some
people view the constitution and bill of rights as the alpha and omega
of liberty on earth. I am not one of them.
> If Jefferson were alive today he would be arrested for conspiracy
> if he simply thought out loud.
Most likey you're right. In fact, most of the "founders" would be as
well, especially Patrick Henry! ;-)
Richard Storey
From whgiii at openpgp.net Fri Jul 31 17:17:30 1998
From: whgiii at openpgp.net (William H. Geiger III)
Date: Fri, 31 Jul 1998 17:17:30 -0700 (PDT)
Subject: From: dac@zurich.ibm.com (Marc Dacier)
In-Reply-To: <35C20839.43A1@nmol.com>
Message-ID: <199808010015.UAA11260@domains.invweb.net>
-----BEGIN PGP SIGNED MESSAGE-----
In <35C20839.43A1 at nmol.com>, on 07/31/98
at 12:08 PM, bill payne said:
>Java is similar to FORTH. FORTH executes super-slow on high-level in
>most machines. About 10% of the speed of a compiled-language program -
>such as Visual Basic.
FORTH 10% of VB!! ROTHLMAO!!!! Obviously whoever wrote that doesn't have a
clue when it comes to FORTH. I have old FORTH code I wrote years ago and
even running interpreted (and yes FORTH can be compiled) it is faster than
anything the brain-dead Micky$loth crowd could ever dream of writting in
VB. Add to the fact that your average FORTH programmer has a much higher
skill set than your typical VB programmer and is capable of writting fast,
tight code (when have you ever heard fast, tight code used to describe a
VB program?)
why am I not surprised to see yet another "journalist"
clue-impaired.
- --
- ---------------------------------------------------------------
William H. Geiger III http://www.openpgp.net
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
- ---------------------------------------------------------------
Tag-O-Matic: Windows? Homey don't play that!
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNcJf049Co1n+aLhhAQGzCwP/eBpCcTNbaqWTdl7lUVTz7UuV53J3r0FZ
+VZLGBmpJYCo/wZZVMahM4LZ4KFgOGFBBiydapLeaoztT21vRtNwraWe8JQFjmUA
oa6EtM5bdKYBgaaO0kzplCf4e7qLQ8whiVc0PekscZqM6tSV43jJs3wO6LbL54T6
5FpeP2ir+iE=
=hQxK
-----END PGP SIGNATURE-----
From caj at math.niu.edu Fri Jul 31 18:49:38 1998
From: caj at math.niu.edu (Xcott Craver)
Date: Fri, 31 Jul 1998 18:49:38 -0700 (PDT)
Subject: From: dac@zurich.ibm.com (Marc Dacier)
In-Reply-To: <199808010015.UAA11260@domains.invweb.net>
Message-ID:
> >Java is similar to FORTH. FORTH executes super-slow on high-level in
> >most machines. About 10% of the speed of a compiled-language program -
> >such as Visual Basic.
> FORTH 10% of VB!! ROTHLMAO!!!!
Rolling on the hearth? Rolling off the house? Ripping
out tiny hairs?
Running over the hamster?
You sadistic F@#%.
> Obviously whoever wrote that doesn't have a clue when it comes to FORTH.
It reads especially weirdly to anyone who remembers that BASIC
was traditionally interpreted, too. What crazy times we live in.
And anyone who wants to claim VB superior to FORTH has to
earn the right by transferring first a FORTH-made binary, then
a VB-made binary, from one computer to another via floppy
disks.
> VB. Add to the fact that your average FORTH programmer has a much higher
> skill set than your typical VB programmer and is capable of writting fast,
> tight code
That's because writing in FORTH is like spending the day
solving brain-teasers.
Not that that's a bad thing; I figure programmers would get
paid a lot more for much higher quality work if they were required
to be in extreme brain-on mode 24/7. But at least we have C++,
huh?
-Caj
From nobody at replay.com Fri Jul 31 20:59:58 1998
From: nobody at replay.com (Anonymous)
Date: Fri, 31 Jul 1998 20:59:58 -0700 (PDT)
Subject: No Subject
Message-ID: <199808010400.GAA04134@replay.com>
> I had begun by thinking that, since the output of a block cipher in
> feedback mode (ie, a stream cipher) is uniformly distributed ("white") that
> it would be sufficient conditioning to feed a bad RNG into a block cipher
> with feedback. Here, the bad RNG would kick the cipher out of the fixed,
> but key-dependant, sequence it would otherwise generate.
I don't quite parse what you're saying here...?
(more reply below)
...
> On cypherpunks, Bill Stewart mentioned using hashes instead of ciphers.
> A hash is like a cipher in that changing any input or key bit changes the
> output unpredictably, but a hash is irreversible because there are fewer
> output bits than input bits. The simplest hash is a one-bit parity; MD5
> is a more expensive keyed hashing function used for message
> authentication.
>
> Thinking about a hash instead of a cipher was interesting because now
> we reduce the number of output bits, which if done right, could
> improve the information carried by each binary digit. We take the MAC
> of an imperfect random number and toss the original random, retaining
> the MAC as our better random value.
The problem with XORing is that you might have a generator where bits are
interdependent in a way that causes entropy to be lost in the XOR. You
generally don't have this problem with the more involved mixing functions.
If the construction you use for distilling the RNG's output to a random
number works as a collision-free hash function, you can place a lower
bound on the amount of entropy in the output based on how long it takes to
simulate the biases in the RNG (I posted a somewhat confuberated
description of the reasoning to coderpunks -- basically, if the hash of
the simulation's output has little enough entropy, it means you can break
the hash; since you can't break the hash, the output can't have that
little entropy). Normally, though, you can get away with using pretty much
any nonlinear mixing function, even if it's not a good hash function.
An "entropy pool" setup where you can put entropy in and pull keys out at
will gets slightly more hairy...if you want to do that, I suggest you try
to contact someone who knows what he/she's doing. :)
Should that prove infeasible, key a stream cipher with the mixed entropy,
and, when you want to pull a key out, grab some stream cipher output; when
you want to drop entropy in, mix some stream cipher output with your new
entropy and rekey the stream cipher with the result (to save time, I'd
only do the rekeying right before I want a key containing the new
entropy). Probably a lot more complicated and slow than it needs to be,
but I think it lets you add any amount of entropy you want without fear of
an attacker somehow interfering with the generation.
...
From h0uugi93 at galaxylink.com.hk Fri Jul 31 23:20:24 1998
From: h0uugi93 at galaxylink.com.hk (h0uugi93 at galaxylink.com.hk)
Date: Fri, 31 Jul 1998 23:20:24 -0700 (PDT)
Subject: Look At This
Message-ID: <199808010905.CAA16485@palm.telegraph.net>
AMERICA'S # HOME BUSINESS
TELEMARKETING GOES MLM
No Selling
No recruiting
Great Income
Call Now,
You have nothing to Lose
I am making $1,000.00 per day, this is my
second day
Call
1 888 443 8971
ID# 2085
The Mailing List that you are being mailed from was filtered against the Global Remove List at: http://remove-list.com
Remove-List is a free public service offering to help the general public get removed from bulk mailings lists and has not sent this message. If you want their help, please add your name to their list and you will not receive a bulk email from us or any other ethical bulk emailer
From nobody at replay.com Fri Jul 31 23:43:35 1998
From: nobody at replay.com (Anonymous)
Date: Fri, 31 Jul 1998 23:43:35 -0700 (PDT)
Subject: Where do you roam?
Message-ID: <199808010643.IAA15232@replay.com>
SC>At 5:28 AM -0400 7/31/98, Michael Hohensee wrote:
SC>>Source: Handgunner Magazine, Sept./Oct. 1998, page 154:
SC>Paladin sought to reverse the ruling of the U.S. Court of Appeals for the
SC>Fourth Circuit, whichfound that the book Hit Man: A Technical Manual for
SC>Independent Contractors enjoyed no FirstAmendment protection because, in
SC>that court's opinion (based in part on the stipulations of theparties), a
SC>jury could find that the book's content amounted to the aiding and abetting
SC>of criminalconduct.
I've been reading the Bible lately, and it's content has been aiding
and
abetting me in all kinds of criminal misconduct, like murdering a
crapload of
Arabs and other assorted non-Jewish darkies.
Anybody think that the U.S. Court of Appeals for the Fourth Circuit is
prepared to refrain from being hypocritical, and rule that the Bible
does
not enjoy FirstAmendment protection?
Tojohoto,
The ApplePie Murderer
*** The Fire House Inn ***
Come visit us
Telnet: fhouse.org
WWW: fhouse.org
***********
From toto at fhouse.org Fri Jul 31 23:28:30 1998
From: toto at fhouse.org (toto at fhouse.org)
Date: Sat, 1 Aug 1998 14:28:30 +0800
Subject: From: dac@zurich.ibm.com (Marc Dacier)
Message-ID:
ME>STOP SENDING ME EMAILS MR PAYNE
ME>STOOOPPPP IITTTT!!!!!!
ME>bill payne wrote:
ME>> Friday 7/31/98 11:40 AM
ME>>...[EVERYTHING IN THE WHOLE WORLD, NOT LEAVING OUT A SINGLE WORD]...
Yo BadBillyP,
You know, as a result of the massive amounts of on-topic SPAM/RANTS
you send to
the CypherPunks Disturbed Male LISP, many CPUNX are finding it hard to
find time to
find and read the multiple CHAPTER/SPAMS of SAHMD!!! that I hack out
with my
Cleaver, since the Secret Service took away my ChainSaw.
Well, BadBillyP, not only does the Bienfait Nutly News not mind the
competition
you provide for the time and attention of the CypherPunks ReaderShip
Market
(despite the fact that you have a natural advantage, not having spent
six years
getting through Grade 4, as a result of 'problems' with math), but
welcome your
efforts drive other targets of your missives, such as Mr. Merata, Esq.,
crazy enough
to become potential subscribers to the CypherPunks Disturbed Male LISP.
I am prepared to offer you 25% of all CypherPunks Anarchist Union
Dues that
are collected from KmartTargets of your missives who join up and pay
their dues
in Cash/UnmarkedNonSequentialSmallBills.
TruthMonger
p.s. - THE REASON THAT ALL MATHEMATICIANS EVENTUALLY GO !!!CRAZY!!! IS
THAT THEY SPEND THEIR WHOLE LIVES WORKING WITH NUMBERS WHICH
ONLY COME IN !CAPITALS!1234567890!!1234567890!!!1234567890!
p.p.s - I won't send this post directly to you, since I noticed from a
recent post of
yours, that you don't read your email. Go figure...
*** The Fire House Inn ***
Come visit us
Telnet: fhouse.org
WWW: fhouse.org
***********