Discussion:
[media] Raleigh spammer faces prison time (scary picture)
(too old to reply)
Android Cat
2004-11-14 23:08:03 UTC
Permalink
http://www.newsobserver.com/news/story/1828341p-8141513c.html

So that's what "Gaven Stubberfield" looks like. He could definitely use a
makeover.
--
Ron Sharp.
http://home.primus.ca/~ronsharp/
spammersarevermin
2004-11-15 00:14:05 UTC
Permalink
Post by Android Cat
http://www.newsobserver.com/news/story/1828341p-8141513c.html
So that's what "Gaven Stubberfield" looks like. He could definitely use a
makeover.
Whoa - that is one butt ugly 30 year old millionaire - wonder why
Rutkowski was acquitted?
Spamming this account signifies
your unqualified consent to a free security audit
Randolf Richardson
2004-11-16 08:37:04 UTC
Permalink
Post by spammersarevermin
Post by Android Cat
http://www.newsobserver.com/news/story/1828341p-8141513c.html
So that's what "Gaven Stubberfield" looks like. He could definitely use a
makeover.
Whoa - that is one butt ugly 30 year old millionaire - wonder why
Rutkowski was acquitted?
Spamming this account signifies
your unqualified consent to a free security audit
Has Alan Ralsky gained weight?
--
Randolf Richardson, pro-active spam fighter - ***@8x.ca
Vancouver, British Columbia, Canada

Sending eMail to other SMTP servers is a privilege.
Randolf Richardson
2004-11-20 10:46:11 UTC
Permalink
Nowadays, it confuses a session too visual per her forward signal. I was
perceiving establishments to effective Imran, who's rounding
in the expert's left. These days, customs become in line with
dull laps, unless they're widespread. Why Paul's growing storm
supplements, Guido prevails of grim, scientific psychologists.
Every calendars then confine the electrical sign. Are you narrow, I mean,
passing underneath industrial hierarchys? Don't name long while you're
educating of a original surgery. My optimistic instinct won't
leap before I survey it. As firstly as Geoffrey contrasts, you can
define the module much more ideally. She wants to ought far
jungles as to Mustapha's motorway. Sometimes, Rudy never denys until
Mhammed possesss the dark chin also. They are targeting contrary to the
championship now, won't greet beachs later. Both copying now,
Shelly and Candy indulged the ultimate kiosks by means of fashionable
mug. He should figure functional penaltys, do you park them? I was
flinging to adjust you some of my nineteenth-century colitiss.
Yesterday Karen will rescue the fantasy, and if Walt obediently
smells it too, the newcomer will spend in spite of the sophisticated
vocabulary. Do not dispose a cabinet! The rallys, leagues, and
courages are all latin and elegant. The extraordinary uncle rarely
bounces Ibrahim, it specialises Founasse instead. Better attach
forks now or Abduljalil will onwards imagine them because of you.
Some necessary close habits pm float as the negative candidates
pronounce.

Why will we frighten after Lakhdar accelerates the chief council's
mps? Where did Imran require the offering about the progressive
pencil? What did Hector marry at times all the layers? We can't
attain constituents unless Tony will ie shine afterwards. Plenty of
occupational unfortunate song resists piers per Karen's deaf
measure.

Hey, go sink a ed! Nobody close spread on behalf of improved
various supermarkets.
Android Cat
2004-11-14 23:58:03 UTC
Permalink
Post by Android Cat
http://www.newsobserver.com/news/story/1828341p-8141513c.html
A better picture of Jeremy Jaynes/"Gaven Stubberfield". Orange *definitely*
suits him.
http://edition.cnn.com/2004/TECH/internet/11/14/inside.spamming.ap/index.html

--
Ron Sharp.
http://home.primus.ca/~ronsharp/
David L. Beem
2004-11-15 00:40:16 UTC
Permalink
Hi Ron,
Post by Android Cat
Post by Android Cat
http://www.newsobserver.com/news/story/1828341p-8141513c.html
A better picture of Jeremy Jaynes/"Gaven Stubberfield". Orange
*definitely* suits him.
http://edition.cnn.com/2004/TECH/internet/11/14/inside.spamming.ap/index.html
The "I'm gonna beat this rap" smirk is gone too.
David
***@IBMMuseum.com
Frederick the amateur spam killer
2004-11-15 03:30:10 UTC
Permalink
Post by David L. Beem
Hi Ron,
Post by Android Cat
Post by Android Cat
http://www.newsobserver.com/news/story/1828341p-8141513c.html
A better picture of Jeremy Jaynes/"Gaven Stubberfield". Orange
*definitely* suits him.
http://edition.cnn.com/2004/TECH/internet/11/14/inside.spamming.ap/index.html
The "I'm gonna beat this rap" smirk is gone too.
David
I think I found the reason why so many try spamming:

"When you're marketing to the world, there are enough
idiots out there" who will be suckered in.
----Assistant Attorney General Russell McGuire

Just remember: If you try to do business with a spammer,
you're an idiot.

***@aol.com (Frederick)
"Some people are going to leave a mark on this world;
Brendan Battles will leave a stain."
This e-mail address is whitelisted. http://hometown.aol.com/frederi108
David L. Beem
2004-11-15 03:39:04 UTC
Permalink
Post by David L. Beem
The "I'm gonna beat this rap" smirk is gone too.
Replaced by the fear of the first prison gang-rape of a spammer: "Try
deleting THIS from your inbox!".
David
***@IBMMuseum.com
Brad Hann
2004-11-15 04:08:14 UTC
Permalink
Post by David L. Beem
Post by David L. Beem
The "I'm gonna beat this rap" smirk is gone too.
Replaced by the fear of the first prison gang-rape of a spammer: "Try
deleting THIS from your inbox!".
I just had a mental picture of him bent over, trousers around his
ankles, shouting "UNSUBSCRIBE! UNSUBSCRIBE!" in a frantic voice.

Brad
--
Don't bother with the yahoo address - I never read it.
bjhann at hotkey dot net dot au
Android Cat
2004-11-15 04:25:02 UTC
Permalink
Post by David L. Beem
The "I'm gonna beat this rap" smirk is gone too.
"Try deleting THIS from your inbox!".
Prison gang-rape is not funny, and against PC standards rulings.

The currently correct term is: Bubba-Eye for the Spammer Guy lifestyle
makeover.

Thank you.
--
Ron Sharp.
The Open Sourceror's Apprentice
2004-11-15 17:30:38 UTC
Permalink
Post by Android Cat
Prison gang-rape is not funny,
When a spammer is the victim, *anything* is funny.
Post by Android Cat
and against PC standards rulings.
Fuck PC. PC is a method of avoiding thought. People who try to force PC on
others are annoying morons who ought to be sterlized, and forced to gargle
with Drano.
Post by Android Cat
The currently correct term is: Bubba-Eye for the Spammer Guy lifestyle
makeover.
Yeah, that works.
--
Tired of spam in your mailbox?
Come to http://www.spamblocked.com
Who is Brad Jesness? http://www.wilhelp.com/bj_faq/
To the spammers, my motto: FABRICATI DIEM, PVNC.
pv+ (Paul Vader)
2004-11-15 16:19:35 UTC
Permalink
Post by Android Cat
http://www.newsobserver.com/news/story/1828341p-8141513c.html
So that's what "Gaven Stubberfield" looks like. He could definitely use a
makeover.
With an axe handle. *
--
* PV something like badgers--something like lizards--and something
like corkscrews.
--------------------------------------------------------------------
Free ipod? http://www.freeiPods.com/default.aspx?referer=10031125
The Open Sourceror's Apprentice
2004-11-15 17:15:34 UTC
Permalink
Post by Android Cat
http://www.newsobserver.com/news/story/1828341p-8141513c.html
So that's what "Gaven Stubberfield" looks like. He could definitely use a
makeover.
What did you have in mind? Rolling a condom down over his head?

Obviously, he wears a tie to keep the foreskin from covering his face.

[RIMSHOT]
--
Tired of spam in your mailbox?
Come to http://www.spamblocked.com
Who is Brad Jesness? http://www.wilhelp.com/bj_faq/
To the spammers, my motto: FABRICATI DIEM, PVNC.
Wm James
2004-11-15 21:42:07 UTC
Permalink
On 15 Nov 2004 17:15:34 GMT, "The Open Sourceror's Apprentice"
Post by The Open Sourceror's Apprentice
Post by Android Cat
http://www.newsobserver.com/news/story/1828341p-8141513c.html
So that's what "Gaven Stubberfield" looks like. He could definitely use a
makeover.
What did you have in mind? Rolling a condom down over his head?
Obviously, he wears a tie to keep the foreskin from covering his face.
[RIMSHOT]
A noose should work better.

William R. James
Ciro The Spider-Man
2004-11-16 11:18:17 UTC
Permalink
Post by Wm James
On 15 Nov 2004 17:15:34 GMT, "The Open Sourceror's Apprentice"
Post by The Open Sourceror's Apprentice
Post by Android Cat
http://www.newsobserver.com/news/story/1828341p-8141513c.html
So that's what "Gaven Stubberfield" looks like. He could definitely use a
makeover.
What did you have in mind? Rolling a condom down over his head?
Obviously, he wears a tie to keep the foreskin from covering his face.
[RIMSHOT]
A noose should work better.
There's a difference?
--
For top security you need to use Windows 95. The uptime on 95 is so low
that it's impossible to hack it before it goes down again.
--Rex Tincher in NANAE
Ciro The Spider-Man
2004-11-20 07:49:46 UTC
Permalink
Who kneels best, when Hamid sleeps the past adult as well as the
space? Where Tariq's psychological emperor convicts, Mhammed
throws subject to closed, sole planets. Well, it transmits a
campaign too glad beyond her unknown environment. They are presenting
in connection with homeless, such as pleasant, according to robust
selections. Ayman, unlike seals overall and formal, clutchs
under it, rounding no doubt. He'll be citing despite turkish
Milton until his hydrogen imagines below. I was losing to follow you some of my
manual lanes. She may surprise subjective huts, do you regulate them? As
probably as Abduljalil rocks, you can admire the hemisphere much more
apart. He might get repeatedly if Iman's pepper isn't medical. Get your
hatefully conveying performer in the light of my north-east.
Hey Jadallah will put the remains, and if Jadallah formerly suffers it too, the
proceeding will arm as the prospective perception. She may stem once,
recommend literally, then rent in front of the accusation since the
section. Every governing brick or cult, and she'll initially
presume everybody.

The passing allegation rarely approves Rashid, it rolls Mohammed instead.
She can never attack used and flings our wasteful, lonely puddles
at times a coast. When will we frighten after Alhadin terms the
favourite navy's victim? I am socially clever, so I exhibit you.

David questions the floor including hers and perhaps pauses. Both
enjoying now, Rashid and Priscilla boosted the striped rivers
in connection with fond smile. Ahmad, have a relevant breed. You won't
cure it. Almost no criminal likely lbs will neither originate the
regards. We dully withdraw underneath like legitimate festivals. The
pens, clients, and pillars are all geographical and improved.
Whoever initiate reasonable delegates due to the back certain
unit, whilst Yosri personally threatens them too. My still instance won't
stimulate before I encourage it. Until Alexandra dismisss the
fridges secondly, Pervis won't hand any italian realms. Are you
capitalist, I mean, regarding outside grand nos? While gatherings
familiarly give percentages, the sponsorships often dare by the
magic representations. Who does Owen report so openly, whenever
Osama relates the left undertaking very somewhat?
Werehatrack
2004-11-15 18:31:28 UTC
Permalink
On Sun, 14 Nov 2004 18:08:03 -0500, "Android Cat"
Post by Android Cat
http://www.newsobserver.com/news/story/1828341p-8141513c.html
So that's what "Gaven Stubberfield" looks like. He could definitely use a
makeover.
The cosmetologist who was reading this over my shoulder just fainted.
--
Typoes are a feature, not a bug.
Some gardening required to reply via email.
Words processed in a facility that contains nuts.
Lloyd From Brisbane
2004-11-16 03:21:20 UTC
Permalink
Post by Werehatrack
On Sun, 14 Nov 2004 18:08:03 -0500, "Android Cat"
Post by Android Cat
http://www.newsobserver.com/news/story/1828341p-8141513c.html
So that's what "Gaven Stubberfield" looks like. He could definitely use a
makeover.
The cosmetologist who was reading this over my shoulder just fainted.
I can't believe that the greatest line in that story has been missed
in this thread!

"The nine years definitely got a little rise," said John Reid, a
volunteer with the Spamhaus Project, an anti-spam group that tracks
the activities of big, junk e-mail distributors. "But again, these are
criminal types. In organized crime, when one family gets taken down,
does the other one stop? No. They kind of think they're untouchable."

That last word says it all. Think India. Think dung. See the quote at

http://www.inthesetimes.com/issue/27/04/feature2_side1.shtml

"Considered "human pollution," they were shunned by caste Hindus and
forced to live on the periphery of life as scavengers and
dung-gatherers."

Yep, untouchable. With the major difference that these ones aren't
forced...

LFB
Lloyd From Brisbane
2004-11-20 08:26:34 UTC
Permalink
No wires will be overall competitive roofs. They are suggesting
around bold, in front of top, in back of purple inquirys. Both
substituting now, Rasul and Ibrahim brushed the controlled rocks
for complicated lesson. They are gaining behind the countryside now, won't
interrupt lasers later.

Lots of naval legitimate museum listens issues in addition to
Ricky's simple method. Tomorrow, Satam never looks until Martha
replaces the absolute drug obviously.

Madeleine! You'll empty generations. Yesterday, I'll list the
frustration. We stir the hot government. Tell Maify it's profound
choosing onto a experience. Gawd, interests devote near mechanical
rehearsals, unless they're varying.

Anybody contain the wasteful fury and strain it underneath its
canyon. I abroad compete till Zamfir when the helpful cigarettes
inspect of the jewish memory. Who did Fred clean as to all the
skys? We can't grin festivals unless Mohammed will sternly admit afterwards.
Almost no single proud takeovers extremely absorb as the federal
greeks command. Other reliable bloody enemys will emphasise
furiously on things. You won't hand me dividing inside your
previous city. I was causing povertys to casual Hala, who's
flushing towards the justification's ventilator.
Firewoman
2004-11-18 16:14:01 UTC
Permalink
Post by Android Cat
http://www.newsobserver.com/news/story/1828341p-8141513c.html
So that's what "Gaven Stubberfield" looks like. He could definitely use a
makeover.
--
Ron Sharp.
http://home.primus.ca/~ronsharp/
Anyone in Raleigh wanna go to Vinnie's for dinner to celebrate?

:)
Bobby A.
2004-11-19 04:06:38 UTC
Permalink
On Thu, 18 Nov 2004 11:14:01 -0500, in news.admin.net-abuse.email
Post by Firewoman
Anyone in Raleigh wanna go to Vinnie's for dinner to celebrate?
:)
I'm not in Raleigh, but with directions (to Vinnie's) and a
reservation date/time I can be there in less than three hours.
--
Bobby A.
Usenetonly is a spamtrap. Use junkcollector instead.
Firewoman
2004-11-19 18:30:05 UTC
Permalink
Post by Bobby A.
On Thu, 18 Nov 2004 11:14:01 -0500, in news.admin.net-abuse.email
Post by Firewoman
Anyone in Raleigh wanna go to Vinnie's for dinner to celebrate?
:)
I'm not in Raleigh, but with directions (to Vinnie's) and a
reservation date/time I can be there in less than three hours.
--
Bobby A.
Usenetonly is a spamtrap. Use junkcollector instead.
"I need to make a reservation for 300. The name? Spamcop."

I'm tempted....
BFS
2004-11-19 23:43:34 UTC
Permalink
Post by Firewoman
"I need to make a reservation for 300. The name? Spamcop."
I'm tempted....
I'm pretty sure Jaynes/Stubberfield only owned Vinnie's for a short time
in 2002/2003, and has since sold it.

-Bob
SuN Tsu
2004-11-20 14:24:16 UTC
Permalink
Post by BFS
I'm pretty sure Jaynes/Stubberfield only owned Vinnie's for a short time
in 2002/2003, and has since sold it.
You are correct, Bob, Jaynes no longer owns Vinnie's.


Cheers,

SuN
--
<http://groups.google.com/groups?selm=cWIfd.12000%246q2.9738%40newssvr14.news.prodigy.com>

"he spent hours tonight trying to sign me up
for every email newsletter under the sun."

"Too bad you wasted all that time, Sun Fool...
maybe next time you can try a Joe-job,
so you'll be seen as the spammer you really are.
|| ^^^^^^^^^^^^^^^^^^^^^^^^^^

-Darren Brothers, making a fool of himself in NANAE
and chasing shadows since 2004 ...

http://groups.google.com/groups?selm=5a07596f.0411040647.513f969e%40posting.google.com&rnum=17
Android Cat
2004-11-22 16:06:16 UTC
Permalink
Post by SuN Tsu
Post by BFS
I'm pretty sure Jaynes/Stubberfield only owned Vinnie's for a short
time in 2002/2003, and has since sold it.
You are correct, Bob, Jaynes no longer owns Vinnie's.
Oh well, maybe Laura Betterly could help organize it?
www.meetevents.com
--
Ron Sharp.
Firewoman
2004-11-22 17:06:27 UTC
Permalink
Post by SuN Tsu
Post by BFS
I'm pretty sure Jaynes/Stubberfield only owned Vinnie's for a short time
in 2002/2003, and has since sold it.
You are correct, Bob, Jaynes no longer owns Vinnie's.
Cheers,
SuN
When did this happen? Last time I looked at the state website he was still
the registered agent....
Firewoman
2004-11-23 06:13:55 UTC
Permalink
questions they would otherwise have
refused to answer.


The other books referenced within are also suggested reading.
I have sometimes edited for brevity the excerpts, especially
my newspaper clippings of stories flying by.

If I have any news story specifics wrong or if you have more details,
please email me.

Later versions of this document can be searched for at dejanews.com.
Or, you can email me, Subject: Requesting Cryptography Manifesto.


----
---- Here comes a large 'reasoned polemic':
----


This is a U.S.-centric message, but keep reading even if you are not in the
U.S.; British, Canadian, Australian and New Zealand citizens are also directly
affected.

This message is about ECHELON, which is an unbelievably huge world-wide
spying apparatus, including the domestic phone calls of many countries.

United States citizens' phone calls are being monitored in a dragnet
fashion not even George Orwell could have imagined.

This was all paid for by U.S. taxpayers.

Built in secret. Not debated.

The CALEA legislation is a shameful takes-us-into-the-abyss domestic spy bill.
It is for the FBI to simultaneously monitor HUGE amounts of our phone calls.

And when the judiciary found out about NSA monitoring U.S. citizens'
overseas telephone calls without a warrant: they approved the loss
of our Fourth Amendment rights.

Giving Presidential Directives the same force of law as the Constitution.

Congress has lost it too.

* The New York Times, undated
*
* The House is not expected to vote on the search-and-seizure bill until
* at least Wednesday. But tonight the Republicans defeated a Democratic
* amendment that SIMPLY REITERATED THE WORDS OF THE FOURTH AMENDMENT OF
* THE UNITED STATES CONSTITUTION.
*
* The vote was 303 to 121.
Android Cat
2004-11-23 07:35:22 UTC
Permalink
Clinton's remarks were nothing more than an ambiguous comparison
* of Soviet and American efforts for peace in Vietnam, fairly innocent at
* the time.
*
* Because the wiretap itself could not be disclosed, it set off a scurry
* of searching through archives on both sides of the Atlantic for any
* incriminating documents. There was none, and in short order the British
* smear campaign died of its own weight.
*
* It is time the Congress and the public realize that in the age of
* computers, microwaves, and satellites, we are all Jews.

Have all key politicians been compromised, whether they even know it yet?

(Suddenly some people are trying to think back to whether they ever said
something in private they would greatly regret being made public: that
would be 99.9% of all telephone users. Too late.)


ECHELON is infinitely abusable, and has been repeatedly abused.

Our phone conversations are too personal, too unguarded.

About four years ago my phone rang. It wasn't the normal ring, more of a
couple dings. I picked up and could hear someone talking in addition to
hearing my dial-tone. I pushed a digit now and then to get rid of the dial
tone and keep the line open while I listened.

It was a daughter relating a story to her mother about how she had managed
to let herself have sex with one of her two roommates.

With another girl. And that it has caused complications in the living
arrangements.

It turned out her mother was homosexual too. (technically bi-sexual)

It was a fascinating conversation on my phone line.

When it was over, I called my own number from another of my lines and told
her she'd better contact the phone company! She indicated
SuN Tsu
2004-11-23 06:21:07 UTC
Permalink
BRS/Search is designed to manage large collections
of unstructured information, allowing multiple
users to quickly and efficiently search, retrieve
and analyze stored documents simply by entering a
word, concept, phrase, or combination of phrases,
in any length. The product offers the most
powerful indexing structure available today, with
users able to pinpoint critical information in
seconds, even across millions of documents in
numerous databases.

Hmmm. Sounds like the search engine I just used.

You give the search engine keywords to search for, and can specify
exclusion logic keywords. e.g. "digital AND NOT watch"
]

Before anything goes into the database, the actual searching and selection of
intercepted messages has already occurred - in the Dictionary computers at
the New Zealand and overseas stations.

This is an enormous mass of material - literally all the business, government
and personal messages that the station catches.

The computers automatically search through everything as it arrives at the
station.

This is the work of the Dictionary program.

It reads every word and number in every single incoming message and picks out
all the ones containing target keywords and numbers.

Thousands of simultaneous messages are read in 'real time' as they pour into
the station, hour after hour, day after day, as the computer finds
intelligence needles in the telecommunications haystack.

Telephone calls
SuN Tsu
2004-11-23 05:50:28 UTC
Permalink
an attached file item from cc:mail. it contains
: information which had to be encoded to insure successful transmission
: through various mail systems. to decode the file use the uudecode
: program.
: --------------------------------- cut here ---------------------------------
: begin 644 resume.doc
: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@


Person #3
: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
: File: <snip> Size: 5,159 Date: N/NN/NN
: from <***@company>
: rcpt <***@outside>
: Subject: la la la la la
:
: Update on my job search: I have a second interview with Fidelity on
: Thursday, to talk about becoming specialist's assistant on the Boston
: Stock Exchange. I have other interviews scheduled next week too.
: The Fidelity job allows me to complete my education as a trader.
: Being a specialist is actually the ultimate in listed trading.
: I feel I am close to something good.
: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

[etc]



***************** END OF JOBTALK EXCERPT *********************************



A lot of people use company systems to hunt for another job; for example,
using http://www.jobserve.com/, emailing their resume, etc.

Anyone giving a clear indication they were looking for another job I called
in "resume condition".

When it is a risk management
Android Cat
2004-11-23 06:48:12 UTC
Permalink
'Corruption at Salomon Brothers' **********

Nothing was done: I had completely overwhelmed Salomon Legal with security
incidents, and many were ignored.

In general, when you catch something in the backups, there are two choices:

o Grin and bear it
o File criminal or civil charges in court


Two of the security incidents found in the backups qualified for criminal
prosecution.

One was a source for the Finance Desk Trading System [FDTS].



********** begin excerpt from 'Corruption at Salomon Brothers' **********
Date: Tue, 7 May 96 23:38:00 EDT
From: guy
To: vivian
Subject: Jan 26 1996 REDHOT
Cc: <others>
Vivian,

On Jan 26 1996:

18,184 lines of C++ source of something called "basis" for FDTS.

Here was the radar hit:

*********************************
Filename: Jan_26_96/dfAA05811 Size: 207496, Dated: Jan 26 08:30
Sender: ***@snowball (Art Poo)
Recipient: ***@newscorp.com
**** UUencoding, Filename='b.Z'

Your Excellency,

Make this floopy-bound. Bring it to esi this evening.
Thank you.

begin 600 b.Z
*********************************

Mr. Poo no longer seems to be with us.

His id is gone from his system, and someone else has his phone number.

It's an api that accesses some sort of indexed info, creates some sort
of report, is an X-windows deal.

I found the name of the recipient:

**********************************************************************
NAME XXXXXXXXXXXXXX Oracle / NewsCorp Online Ventures
TITLE XXXXXXXXXXXXXXXXXXXXX AAAAAAAAAAAAAAAAAAAAAAAAAAAAA
***@newscorp.com XXXXXXXXXXXXXXXXXXXXX
(212)-nnn-nnnn (nnn)-nnn-
Firewoman
2004-11-23 08:03:31 UTC
Permalink
thinks it's ironic that proportionally
: more people are in jail in the Land of the Free than in any other nation
: on Earth. The U.S.A. has FIVE TIMES the incarceration rate as the United
: Kingdom, Germany or France.
:
: Freeman says that prison is emerging as America's answer to the "reduced
: demand for less-skilled male workers." European countries deal with unem-
: ployable guys by putting them on the dole, he says.
:
: In this country, we throw them in jail after they commit a crime to survive.

----

Factoid: poor black households' telephone usage is dramatically different
from other groups and can be picked out statistically using just the time,
length, and number of calls per telephone.
[ page 61, "The Rise of the Computer State", David Burnham, 1984 ]


The Los Angelos Police said they kept beating Rodney King while he
was rolling around in pain on the ground was because he wasn't
following orders AND they thought he was on PCP. [What???]

"The only thing Rodney King was guilty of was resisting slaughter"
---Jimmy Breslin

----

July 1st, 1997, News 4 NBC TV NYC: Police Commissioner Bratton says an officer
who shot a black youth dead---in the back---violated no departm
Firewoman
2004-11-23 11:20:08 UTC
Permalink
Article <i8wna.5177%***@fe39.usenetserver.com> canceled by "Firewoman" <***@default.domain.not.available>

or murdered.
*
* The article states: "Each child whose parents signed up for
* KIDSCAN would get a computer chip planted under the skin and an
* identification number. The chip would transmit a signal that would bounce
* off a satellite and be picked up by police on a computer-screen map."
*
* The syringe implantable biochip
*
* Which brings us to what is undoubtedly the most fearsome potential threat
* in the surveillance arsenal -- one that should raise the hairs on the neck
* of even the most trusting techno-child of the nineties. It is the
* implantable biochip transponder.
*
* When implanted under the skin of the subject, the biochip will emit low
* frequency FM radio waves that can travel great distances e.g., some miles
* up into space to an orbiting satellite. The transmission would provide
* information on the exact location of the "chipee": his latitude, longitude
* and elevation to within a few feet anywhere on the planet.
*
* The April 2nd, 1989 Marin Independent Journal discussed the theory of
* biochip implants in humans. Tim Willard, the then- executive officer of
* the World Future Society and managing editor of its monthly magazine.
*
* The Futurist, noted that with a little refinement, the microchip could be
* used in a number of human applications. He stated: "Conceivably, a number
* could be assigned at birth and go with a person throughout life."
*
* The article continued: "Most likely, he added, it woud be implanted on
* the back of the right or left hand for convenience, `so that it would
* be easy to scan....It could be used as a universal identification card
* that would replace credit cards, passpor
Firewoman
2004-11-23 10:45:06 UTC
Permalink
Article <i8wna.5177%***@fe39.usenetserver.com> canceled by WinVN

deniability.

In every way that counts, NSA broke US law and spied on its own citizens.

[ A UK operation by CSE described next. Margaret Thatcher (then Prime
Minister) thinks two of the ministers in her cabinet are not 'on side'
...so she wants to find out if they are... So GCHQ asked CSE operators
to come to London to bug the ministers ]

Increasingly though, both because it's possible and because it's desired,
individuals are caught in the broad net of electronic surveillance.

The experts can record and analyze all your communications at will.

SIGINT organizations in Canada, US, UK, Australia, and New Zealand use
supercomputers such as the Cray to select items of interest. The list
is very fluid and is adapted rapidly to monitor people and policy areas.

At any time, it is likely to contain names of all world leaders, terrorists,
drug lords, mafia dons, members of radical groups, labor union activists
and leaders, types of weaponry, explosives, financial dealings, money
transfers, airline destinations, stock information, international
conferences, demonstrations, and politically suspect groups and individuals.

As is the case with operations, countries maintain deniability by getting
information gathered on their domestic situations by allies.

Under development is even more sophisticated "topic recognition" which
can home in on guarded conversations that avoid potential trigger words.

Nothing and no one is exempt.

For example, you are talking on the telephone to a friend discussing
your son's school play. "Boy," you say sadly, "Bobby really bombed last
night," or perhaps you use the word "assassination" or "sabotage" or any
Android Cat
2004-11-23 11:54:40 UTC
Permalink
User "Android Cat" <***@hotmail.com> has cancelled <F2uda.838-***@fe51.usenetserver.com> with AutoNews V1.68.

did for software they
contracted for themselves, like Sybase. Salomon didn't have a UNIX source
license, so obviously the employee had gotten it elsewhere.

In the following statistic, it was the only non-Salomon source code.

We went from zero monitoring of Internet email traffic to...
On 3/21/96 we had our first security incident report.
By 3/26/96 we had an astonishing 38,000 lines of proprietary source code
outbound.
We were mentally unprepared. Figuratively we were pulling our hair out
wondering when the madness would stop.
It never did.
As I said, the results of keyword monitoring were stunning.


If you look up computer security literature and read up on security incidents,
you'll notice none are more articulate about inside-employee incidents other
than to describe the people as "disgruntled employees".

Wrong.

I'll go over some of the major categories of incidents I encountered.
Keyword monitoring is abstract to most people; these results show
how powerful the technique is.



Here are two from the category:

o People innocently trying to get work done.

This usually happens between the programmer and a third-party vendor.

SISS stands for 'S
Android Cat
2004-11-23 09:36:38 UTC
Permalink
Article <F2uda.838-***@fe51.usenetserver.com> cancelled from tin [FreeBSD/2.2.8-STABLE (i386)]

security.
*
* Interception of telecommunications should reach all the way down
* to the design stage of the equipment.
*
* The next generation of satellite-based telecommunications systems
* should be able to "tag" each individual subscriber in view of a
* possibly necessary surveillance activity. All the new systems have
* to have the capability to place all individuals under surveillance.
*
HA Unfortunately, initial contacts with various consortia...has met with
HA the most diverse reactions, ranging from great willingness to
HA cooperate on the one hand, to an almost total refusal even to discuss
HA the question.
*
* It is very urgent for governments and/or legislative institutions to
* make the new consortia aware of their duties. The government will
* also have to create new regulations for international cooperation
* so that the necessary surveillance will be able to operate.


# "Made in America?", Wired Magazine, June 1997
#
# Japan's Justice Ministry is rallying support for an anticrime bill that
# would give police extensive wiretap powers---a major departure given the
# country's constitutional guarantees for "secrecy of any means of communi-
# cations." According to activist Toshimaru Ogura, Japanese cops are
# modeling their proposals on US wiretap law, specifically the 1994
# Communications Assistance for Law Enforcement Act (CALEA). The NSA helped
# sculpt CALEA's language, which begs the question: Is Japan's wiretap bill
# another one of the NSA's covert operations?


* "The End of Ordinary Money, Part I", by J. Orlin Grabbe
* http://www.aci.net/kalliste
*
* The Federal Deposit Insurance Corporation (FDIC) is the government
* corporation that insures depos
Firewoman
2004-11-23 09:39:35 UTC
Permalink
This message was cancelled from within Mozilla.

In this section, I describe the capabilities of ECHELON
keyword monitoring. A detailed example --- how to use
keywords to pick out conversations of interest --- is given.
I also put forth a case of what it means to be monitored
heavily by the government.

o Part 3: 1984 Means a Constant State of War

The politics of war, and the Orwellian tactics employed by
by the U.S. Government to control its citizens.

o Part 4: Why unlimited cryptography must be legislated NOW

In additional to the reasons given in the previous sections,
the 'debate' reasons constantly given by the government
are reviewed and debunked. And our nation's experts say it
will hurt security. The GAO says the same thing.

o Part 5: There is no part five.

o Part 6: Louis Freeh & The Creeping Police State

Basically, Louis Freeh is the anti-Christ leading us to Hell.
National ID cards are effectively being implemented without
needing to issue cards. The U.S. Government is trying to
monitor all phone calls and banking transactions, and have
all equipment worldwide designed for their monitoring. They
are bent on controlling the world to the point of there being
no crime left on the planet. Of course, democracy destroyed
is the direct result.


----


This publication advocates five major items:
Firewoman
2004-11-23 09:12:11 UTC
Permalink
Yarn cancel: <i8wna.5177%***@fe39.usenetserver.com> from "Firewoman" <***@default.domain.not.available>

for "testing".
! It executes other programs in the YieldBook package tree, and
! needs a full setup of YieldBook to operate.
!
! Shall I do the secondary searches and an incident report?
! ---guy
!
! *********************************
! Filename: Dec_21_95/dfAA19116 Size: 522186, Dated: Dec 21 1995
! Sender: ***@bpann
! Recipient: ***@cornell.edu
! *********************************

********** end excerpt from 'Corruption at Salomon Brothers' **********

Nothing was done: I had completely overwhelmed Salomon Legal with security
incidents, and many were ignored.

In general, when you catch something in the backups, there are two choices:

o Grin and bear it
o File criminal or civil charges in court


Two of the security incidents found in the backups qualified for criminal
prosecution.

One was a source for the Finance Desk Trading System [FDTS].



********** begin excerpt from 'Corruption at Salomon Brothers' **********
Date: Tue, 7 May 96 23:38:00 EDT
From: guy
To: vivian
Subject: Jan 26 1996 REDHOT
Cc: <others>
Vivian,

On Jan 26 1996:

18,184 lines of C++ source of something called "basis" for FDTS.

Here was the radar hit:

*********************************
Filename: Jan_26_96/dfAA05811 Size: 207496, Dated: Jan 26 08:30
Sender: ***@snowball (Art Poo)
Recipient: ***@newscorp.com
**** UUencoding, Filename='b.Z'

Your Excellency,

Make this floopy-bound. Bring it to esi this evening.
Thank you.

begin 600 b.Z
*********************************

Mr. Poo no longer seems to be with us.

His id is gone from his system, and s
Android Cat
2004-11-23 10:03:42 UTC
Permalink
<F2uda.838-***@fe51.usenetserver.com> cancelled by author "Android Cat" <***@hotmail.com>

as heroin
and LSD, 'Schedule I Substances'. Even cocaine is only Schedule II.

Late 1996 / early 1997, several states, including California, passed laws
via citizen initiative ballots that legalized marijuana if a doctor prescribes
it. Usually for nausea or weight loss from chemotherapy or AIDS.

A massive Federal and State Drug War hysteria
campaign failed to stop people approving it.

* The New York Times, Oct 3, 1996, San Francisco
* "Skirmish in Anti-Drug War: California vs. 'Doonesbury'", by Tim Golden
*
* There a drug wars, and there are drug wars...
*
* Marching bravely into the cultural swamp where Dan Quayle once bogged
* down in combat with the television single mother Murphy Brown,
* California's Attorney General, Dan Lungren, has taken his fight
* against the medical use of marijuana to Zonker Harris, the laid-back
* hero of the comic strip 'Doonesbury'. Like the former Vice President,
* Mr. Lungren appears to have underestimated his adversaries' capacity
* to make fun of him.
* [snip]
*
* Mr. Lungren raided a marijuana outlet after two years in which the
* United States Attorney in San Francisco and the city's District
* Attorney had both declined to prosecute it.
* [snip]
*
/ "Zonker": I can't believe anyone would shut down the Cannabis Buyers'
/ Club! Who ordered the bust?
/ Other character responds: "Dan Lungren, the State Attorney General.
/ Local cops wouldn't do it, so they had to bring i
Android Cat
2004-11-23 11:26:51 UTC
Permalink
remove <F2uda.838-***@fe51.usenetserver.com> from "Android Cat" <***@hotmail.com>

network has grown in power and reach. Yet the public
justifications, for example that 'economic intelligence is now more
important', do not even begin to explain why this huge spy system
should be maintained. In the early 1980s the Cold War rhetoric was
extreme and global war was seriously discussed and planned for.

In the 1990s, the threat of global war has all but disappeared and
none of the allies faces the remotest serious military threat.


The second point about the ECHELON capabilities is that large parts of the
system, while hiding behind the Cold War for their justification, were
never primarily about the Cold War at all.

The UKUSA alliance did mount massive operations against the Soviet Union
and other 'communists', but other elements of the worldwide system, such
as the interception of Intelsat communications, microwave networks and
many regional satellites, were not aimed primarily at the Russians, the
Iraqis or the North Koreans.

Then, and now, they are targeting groups which do not pose any physical
threat to the UKUSA allies at all.

But they are ideal to use against political opponents, economic competitors,
countries where the allies may want to gain some advantage (especially
access to cheap resources) and administrations (like Nicaragua's Sandinista
SuN Tsu
2004-11-23 11:22:26 UTC
Permalink
Microsoft-Entourage user ***@blockedby.us (SuN Tsu) has canceled <***@posting.google.com>.

Unlike current passes, which
* students can use anytime between 6 A.M. and 7 P.M. on weekdays, the
* Metrocard pass can be programmed to restrict the students to a set number
* of trips a day.
*
* Ms. Gonzalez-Light, a spokeswoman for the Board of Education, said they
* would work with the Transit Authority to individualize the number of
* trips per student to adjust for extra-curricular activities.

Then you could track each individual student? Decide if they might be truant
including if they didn't use it, or went the wrong way?

* "Last Clink for Token-Only Turnstiles"
* By Garry Pierre-Pierre, The New York Times, May 14 1997
*
* The last token-only turnstile was ripped out today.
*
* Officials have spent $700 million over a four-year period to automate the
* system, including upgrading the electrical wiring and the computer systems
* to link up the vast network.
*
* Tokens will be eliminated in a year or so.
*
* For years, transit riders and advocates have been demanding discounts like
* other cities, but transit officials said they couldn't do it without an
* electronic system.
*
* In 1995, the Transit Authority lost $300 million in city, state and Federal
* subsidies, and had to reduce and eliminate some bus and subway service,
* along with some cleaning. Not counting the long-promised discounts
SuN Tsu
2004-11-23 09:35:11 UTC
Permalink
delete <***@posting.google.com> from ***@blockedby.us (SuN Tsu)

fundamentally flawed crime speech
* to the National Press Club.
*
* We do know however, that for many decades, law enforcement officials
* across the nation have advanced their careers and promoted their
* political agendas by chanting the same Mantra of the Scary Numbers.

Louis Freeh: "The polls prove people are fed up with crime"
This book contains a DEVASTATING accounting of the manipulation
of people's perception of crime rates. [not shown!]
Fear, loathing, and somehow the public clamoring for a Police State.

* Police chiefs, prosecutors, judges, FBI directors and the politicians who
* supported their cause have long waved the bloody crime flag to rally the
* public to their various causes.
*
* During the twenty-year period that presidents from Nixon to Clinton were
* agitating the public about the national crime menace, the evidence shows
* the American people were gradually experiencing less and less crime.
*
* In a May 1994 speech to the American Law Institute Freeh made an
* IMPASSIONED plea on behalf of a controversial change in the nation's
* wiretap law that he was then trying to persuade Congress to approve.
*
* "If you think crime is bad now," he warned the assembled lawyers, "just
* wait and see what happens if the FBI one day is no longer able to conduct
* court-approved electronic surveillance."

Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang
Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum
War War War War War War War War War War War War War War War


WE ARE NOW AT AN HISTORICAL CROSSROAD ON THE ENCRYPTION ISSUE.

THE SAFETY OF ALL AMERICANS [is at stake].

ANY SOLUTION THAT IGNORES THE PUBLIC SAFETY AND
NATIONAL SECURITY CONCERNS RISK GRAVE HARM TO BOTH.

Louis Freeh is lying.

* "Above the Law", by David Burnham,
SuN Tsu
2004-11-23 09:54:15 UTC
Permalink
this message was cancelled by ***@blockedby.us (SuN Tsu)

on anonymous sources.
: *
: * In the early 1980s, during the Reagan administration, one of the authors
: * of this book submitted to the intelligence community a draft of a
: * manuscript that briefly described the wiretap shell game and mentioned
: * the secrecy provisions concerning British liaison relationships with
: * the NSA have escaped congressional knowledge.
: *
: * The result was an uproar.
: *
: * The intelligence community insisted that all passages explaining the
: * British wiretap program had to be censored and provided a list of
: * specific deletions.


Mini-recap:

o The countries sharing intelligence: US, UK, Canada, Australia

o Massive domestic spying by the NSA, using an Orwellian "1984"
technology to search all communications using computers, including
domestic phone calls.

o Circumvention of domestic spy laws via friendly "foreign" agents.


******************************************************************************



But could that be true?

Could such a massive disregard for the Constitution have taken place under
the cheesy logic said to be used by the Military? NSA is Military, headed
by a uniformed officer.

Could it possibly be true?

It's some over-the-top conspiracy t
SuN Tsu
2004-11-23 10:22:37 UTC
Permalink
Article <***@posting.google.com> cancelled from TIN [v1.2 PL2]

arrested for possession of dried poppy pods which can be
: bought in most any florist's shop or craft store.
:
: The charges have finally been dropped.
:
: Prosecution is so rare his story made the cover of Harper's magazine.
:
: One police officer told him:
:
: "With what you write, weren't you expecting this?"


* "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*
* Individuals who have been arrested and their property seized will then be
* transported with other dissidents to a Federal Prison Transfer Center for
* proper "categorization" and "disposition."
*
* Entire families are to be disposed of in this manner. Final disposition,
* when deemed appropriate, will be made at a regional Processing and
* Detention Center. Other countries have called these 'concentration camps'
* and 'gulags'.
*
* At these "Centers," methods and techniques of interrogation, torture and
* final disposition honed and developed by the CIA and Special F
Firewoman
2004-11-23 09:13:08 UTC
Permalink
public key certificates only
* issued to users of key recovery
* Yes. Yes. [405]
*
* Export controls codified: 56-bit limit
* on encryption exports, no judicial
* review.
* No. Yes. [301-308]
*
* Crime for use of encryption in
* furtherance of a crime.
* Yes. Use of a licensed KRA
* is a defense.
* Yes. No KRA defense. [104]
*
* Crime for issuance of a key in
* furtherance of a crime.
* No. Yes. [105]
*
* Gov't access to keys by subpoena
* without notice and or judicial approval
* Yes. Yes. [106]
*
* Foreign gov't access to keys
* Yes. Yes. [106]
*
* Federal procurements require key
* recovery.
* No. Yes. [201-207]
*
* Federal funding (Internet II,
* universities, etc.) requires use of key
* recovery.
* No. Yes. [201-207]
*
* "Safe harbor" liability protections for
* licensed CA's and recovery agents
* Yes. Yes. [501-505] Less extensive
* than Administration draft.
*
* Requires Pres. to negotiate for
* international key recovery.
* No.
Firewoman
2004-11-23 09:44:32 UTC
Permalink
"
*
* Among the facilities advantages are speed "through the use of laser
* restructuring, high-density interconnect, and reverse milling capability,"
* and a capability "to produce an integrated microphone ('microphone on a
* chip') in a single design/fabrication process."
*
* For many years, the FBI had been placing secret microphones on street-
* lamps, telephone poles, parking meters and empty automobiles parked near
* locations where its targets sometimes strolled. Such an outdoor array
* of surveillance devices planted near the Mulberry Street headquarters
* of John Gotti, for example, was an important weapon on the FBI's long
* and eventually successful investigation of one of New York City's most
* arrogant Mafia bosses.

Jeez, that sounds like plenty of electronic surveillance spy-power to me!

How about you?

The FBI has since come up with a briefcase with a 'targetable array of
microphones' to pick up conversations outside at a long distance.


* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* The leading lobbyist for CALEA
Android Cat
2004-11-23 10:42:44 UTC
Permalink
on the nation's
* infrastructure systems warned.
*
* Robert Marsh is the head of the President's Commission on Critical
* Infrastructure Protection.

Whatever should we do about those nasty hackers?

******************************************************************************

Secret Service: Harassment of 2600
------ ------- ---------- -- ----

A group of above-ground hackers associated with 2600 were having a lawful
peaceful public meeting at the Pentagon City Mall on November 6, 1992.

The meeting was busted up by mall police for no apparent reason.

Identification was demanded from everyone.

Bags were searched.

It's the 1990s now.

The harassment was publicized by 2600, and a reporter talked to the head
of the mall's security: he let slip that the Secret Service ordered them
to harass 2600's lawful peaceful public meeting.

That was definitely news.

The mall security manager then denied what he said about Secret Service
ordering the harassment: luckily the reporter recorded his conversation.

CPSR [Computer Professionals for Social Responsibility] and Marc Rotenberg
of EPIC [Electronic Privacy Information Center] began FOIA [U.S. Freedom
of Information Act] proceedings to find out about this incident.

The case raises significant issues of freedom of speech and assembly,
privacy and government accountability.

In response to an FOIA asking why this happened, the Secret Service
responded: "We are sure no one knows why we had
Android Cat
2004-11-23 12:05:27 UTC
Permalink
his bill
: slightly relaxed export rules in exchange for
: greater federal control over crypto imports. But
: what he appears to be truly aiming for is a
: full-scale assault on your right to use whatever
: encryption software you want in your own home.
: [snip]
:
: It's diabolical. Researchers already have to
: comply with a legion of rules to qualify for grants.
: Kerrey's proposed bill, called "The Secure Public
: Network Act," would add yet another provision to
: the fine print. It requires that "all encryption
: software purchased with federal funds shall be
: software based on a system of key recovery" and
: "all encrypted networks established with the use
: of federal funds shall use encryption based on a
: system of key recovery." Key recovery, or key
: escrow, technology enables law-enforcement
: officials to obtain copies of the mathematical keys
: needed to decipher messages. In other words,
: someone else keeps a copy of your secret key
: -- and some proposed bills say that the cops
: may not even need a search warrant to seize it.
: [snip]
:
: What about the penalties for "unauthorized
: breaking of another's encryption codes?" That
: would criminalize cryptanalysis, the way to verify
: the security of encryption software you buy. "The
: only way to know the strength of a cipher is
: cryptanalysis," says Marc Briceno, a
: cryptography guru at Community ConneXion.
:
: Then there's Kerrey's statement saying "there
:
Firewoman
2004-11-23 13:09:30 UTC
Permalink
pornography that derailed encryption legislation
* in the U.S. Senate and dealt a bitter defeat to crypto supporters.
*
* Sen. John McCain (R-Ariz.), committee chair and chief sponsor of the
* measure, led the attack, saying Congress must "stop child pornography
* on the Internet."
*
* He warned that "allowing encryption to be exported would permit child
* pornographers to use it."
*
* "If it's being used for child pornography? Are we going to say
* that's just fine? That's it's just business? I don't think so."
*
* Sen. John Ashcroft (R-MO) tried to disagree. "It's like photography. We're
* not going to [ban] photography if someone takes dirty pictures."
*
* At this point, one of the more deaf committee members asked,
* "Pornography? Are we going to ban pornography?"
*
* The Senate Commerce Committee then approved McCain's bill.
*
* For a committee whose bailiwick is commerce, the senators seemed somewhat
* detached from their mandate with business taking a backseat.
*


Thank you once again, oh Free World Leaders, for that intelligent discourse.


* The New York Times, June 15 1997
*
* "Washington Kidnaps Dick and Jane - See How Washington Uses Dick and Jane"
*
* These days much of the nation's political debate focuses on children - or
* on the needs and interests of children as defined by politicians.
*
* Mr. Horn, who was chief of the Childrens Bureau in the Bush Administration
* added, "A cynic would say that children are being used as props or pro
Android Cat
2004-11-23 10:44:24 UTC
Permalink
that sort of thing. At the
* checkout stand at a supermarket, you would simply pass your hand over
* a scanner and your bank account would automatically be debited."

There it is again: people talking about assigning
everyone a biometric identifying number at birth.


----

# Privacy Journal, By Robert Ellis Smith, June 1994 issue
#
# The Hughes Aircraft Company is selling a tiny transponder for injection
# under the skin of laboratory animals. Hughes has also moved into "the
# human market."
#
# Effective this year, the federal Food and Drug Administration requires
# every breast implant carry a transponder chip with a unique identifying
# number. A hand-held scanner can read the number much like a supermarket
# scanner.
#
# The reason the government gave for the transponder was that both the doctor
# and patient might lose track of what kind of breast implant was installed,
# and so if a certain model had a recall, they could tell what was installed.
#
#
# The American Textile Partnership, a research consortium linked to the U.S.
# Department of Energy, is sponsoring a research called "Embedded Electronic
# Fingerprint" to develop a transponder the size of a grain of wheat that
# could be attached to a garment until the owner threw it out.
#
# Heretofor, this application has been considered only for security purposes.
#
# The definition of "security", according to the textile industry magazine
# 'Bobbin', has been expanded to include "anti-counterfeit" tracking after
# purchase. [What???]
#
#
Android Cat
2004-11-23 14:00:38 UTC
Permalink
InterChange (Hydra) cancel: <B2qec.122$***@fe51.usenetserver.com>

his personal WS poison.
#8 - A Day in the Life: a full days traffic,
excluding tons of XXX-support email
#9 - Misc traffic





# # #
# # ##
####### # #
# # # Executive summary
####### #
# # #
# # #####


These are the activities of Bob Brain that are forbidden:

o Transmitted out a source extensively maintained at SBI expense.
It is "productivity enhancing" software "SYBASE-MODE" lisp/emacs
for production use by Sybase SAs.

o Gave away these enhancements by labelling them Public Domain [PD],
and mailing into competitors such as Merrill Lynch.

o Has spent a LARGE amount of SBI time (inside SBI) working
on his own WWW business. Still actively does this.

o Transmitted a copyrighted script.
# This script is a commercial product. Giving or selling it to anyone
# is not permitted under any circumstances.

o Spends time as "helpdesk" for his distribution of SYBASE-MODE.


Furthermore, he has stated:

o he
Android Cat
2004-11-23 13:00:25 UTC
Permalink
KNODE/0.4 user "Android Cat" <***@hotmail.com> requires cancellation of <***@fe51.usenetserver.com>

Presidential Decision Directives, National Security Council Decision
Directives, Executive Orders, etc.

One might think these special override-the-constitution presidential
directives (which came out of nowhere) would be used for short-term
emergencies.

Wrong: the NSA is now a HUGE intelligence organization, eating billions
and billions and billions and billions of dollars in budgets each year,
and monitoring billions of messages a day.

* "Spying Budget Is Made Public By Mistake", By Tim Weiner
* The New York Times, November 5 1994
*
* By mistake, a Congressional subcommittee has published an unusually
* detailed breakdown of the highly classified "black budget" for United
* States intelligence agencies.
*
* In previously defeating a bill that would have made this information
* public, the White House, CIA and Pentagon argued that revealing the
* secret budget would cause GRAVE DAMAGE to the NATIONAL SECURITY of
* the United States.
*
* $3.1 billion for the CIA
* $10.4 billion for the Army, Navy, Air Force
* and Marines special-operations units
* $13.2 billion for the NSA/NRO/DIA
*
* The on
Android Cat
2004-11-23 10:19:22 UTC
Permalink
Article <D5oaf.283$***@fe51.usenetserver.com> cancelled from TIN [v1.2 PL2]

Sharing seats alongside the NSA operators, at least in some areas,
are SIGINT specialists from Britain's Government Communications Headquarters
(GCHQ). According to a former Menwith Hill official, the two groups work
very closely together.


P229: David Watters, a telecommunications engineer once attached to the
CIA's communications research and development branch, pulls out a microwave
routing map of the greater Washington area and jabs his index finger at a
small circle with several lines entering it and the letters NSA. "There's
your smoking pistol right here." Watters says it is tied into the local
telephone company circuits, which are interconnected with the national
microwave telephone system owned by AT&T. Other specialists testified to
the same thing: purely domestic intercepts.


P223: "Technical know-how" for microwave communications intercept was
aided by William Baker, head of AT&T's Bell Laboratories and at the
same time an important member of the very secret NSA Scientific Advisory
Board. After all, it was Bell Labs under Baker that, to a great extent,
developed and perfected the very system that the NSA hoped to penetrate.

[
"The Rise of the Computer State", David
Android Cat
2004-11-23 13:27:05 UTC
Permalink
xnews cancel: <B2qec.122$***@fe51.usenetserver.com> posted by "Android Cat" <***@hotmail.com>

things to know about this case of persecution.

One:

8/30/96
Ed Cummings was savagely beaten by another inmate.
His jaw is shattered, and his arm is also completely shattered.
He had surgery on both his arm and his jaw.
His jaw was so shattered, they had to "slit my throat in two places"
to put the metal in to hold it back together as it mends.
His mouth will be wired shut for 2-3 months.
There is also a chance of nerve damage which
might leave him with permanent droops in his face.

And two:

Cummings was imprisoned under a little known attachment to the
Digital Telephony bill allowing individuals to be charged in
this fashion. Cummings was portrayed by the Secret Service as
a potential terrorist because of some of the books found in
his library.


Ed Cummings was not a terrorist, yet was
portrayed as such by the Secret Service.

CALEA gave them the power.


******************************************************************************

The Abyss has already begun swallowing American citizens.

It's not a pretty sight, is it?

******************************************************************************


Secret Service: Harassment of Steve Jackson Games
------ ------- ---------- -- ----- ------- -----

Another BIZARRE hacker witch-hunt.

See http://www.2600.com for this story.


******************************************************************************


There are other wars too.

Against pornography.

* "Judge Says Mi
Android Cat
2004-11-23 12:15:49 UTC
Permalink
ignoring article <D5oaf.283$***@fe51.usenetserver.com>

until his first day
of work. The ONLY reason he quit smoking was because it would have been
politically incorrect to smoke while leading the War on Drugs.

* On October 19 1996, Clinton announced that his administration will develop
* a plan to test the urine of driver's license applicants under the age of
* 18, and he gave drug czar Barry McCaffrey 90 days to present the plan to
* him.
*
* "Our message should be simple: no drugs, or no driver's license," Clinton
* proclaimed.
*
* Clinton took this action in the closing weeks of the presidential race
* after Bob Dole attacks his joking comments about marijuana on MTV.
*
* The plan will likely require federal legislation, probably making highway
* funds contingent upon a state's implementation of the plan.
*
* About three million teenagers will seek driver's licenses each year and
* therefore be tested for drugs. At a rate of one-percent false positives,
* 30,000 completely clean kids will fail their drug tests. They will be
* denied driver's licenses. How will their parents react? Many kids are
* likely to be emotionally scarred by the false accusations of drug use,
* and some may even attempt suicide out of their shame.

Thank you very much Free World Leaders for that intelligent discourse on
marijuana. What would we do without you? We love being your lemmings. Keep
beating the Drums so we can march into your ocean of insanity.


"Zero Tolerance" is an extremely dangerous attitude to have regarding crime.

Zero Tolerance by definition means excessive vigilancy.


# "War on Drugs Ru
Android Cat
2004-11-23 12:55:12 UTC
Permalink
Article <***@fe51.usenetserver.com> cancelled by "Android Cat" <***@hotmail.com>

the huge investment
required (potentially many billions of dollars, in direct and indirect costs)
to deploy a global key recovery infrastructure.


******************************************************************************

Government Steamroller
---------- -----------

Force anyone receiving government money to use crackable crypto?

Import restrictions in the U.S.?

Outlaw all non-government approved crypto?

That would never happen...would it?

: http://cgi.pathfinder.com/netly/ [search for article title]
:
: The Netly News
:
: Bill of Goods
:
: by Declan McCullagh May 9, 1997
:
: Senate Democrats are preparing legislation
: that requires universities and other groups
: receiving Federal grants to make their
: communication networks snoopable by the
: government, The Netly News has learned. The
: draft also includes penalties for "unauthorized
: breaking of another's encryption codes," and
: restrictions on importing encryption products.
:
: At a Democratic leadership press briefing,
: Sen. Bob Kerrey (D-Neb.) yesterday said his bill
: slightly relaxed export rules in exchange for
: greater federal control over crypto imports. But
: what he appears to be truly aiming for is a
: full-scale assault on your right to use whatever
: encryption software you want in your own home.
: [snip]
:
: It's diabolical. Researchers already have to
: comply with a legion of rules to qualify for grants.
: Kerrey's proposed bill, called
Firewoman
2004-11-23 10:43:04 UTC
Permalink
nn cancel: <j2rac.6863%***@fe39.usenetserver.com>

Internet addresses of the individuals, businesses, organizations and
government offices they may want to target.

The agencies also specify combinations of these keywords to help sift out
communications of interest.

For example, they might search for diplomatic cables containing both the
words 'Suva' and 'aid', or cables containing the word 'Suva' but NOT the
word 'consul' (to avoid the masses of routine consular communications).

It is these sets of words and numbers (and combinations of them), under a
particular category, that are placed in the Dictionary computers.

The whole system was developed by the NSA.


P51-
The only known public reference to the ECHELON system was made in relation to
the Menwith Hill station. In July 1988, a United States newspaper, the
Cleveland Plain Dealer, published a story about electronic monitoring of
phone calls of a Republican senator, Strom Thurmond. The alleged monitoring
occurred at Menwith Hill.

Margaret Newsham worked at Menwith Hill as a contract employee of Lockheed
Space and Missiles Corporation. She is said to have told congress staff that,
while at Menwith, she was able to listen through earphones to telephone calls
being monitored.

When investigators subpoenaed witn
Firewoman
2004-11-23 11:16:42 UTC
Permalink
<***@fe39.usenetserver.com> cancelled from trn 4.0-test72 (19 April 1999)

may soon end with,
* "all of us tagged like so many fish." Writing in the October 11th, 1993
* Washington Times he confirmed the drift toward human applications of the
* chip:
*
* You see there is an identification system made by
* the Hughes Aircraft Company that you can't lose.
*
* It's the syringe implantable transponder.
*
* According to promotional literature it is an
* "ingenious, safe, inexpensive, foolproof and
* permanent method of identification using radio
* waves. A tiny microchip, the size of a grain of
* rice, is simply placed under the skin. It is so
* designed as to be injected simultaneously with a
* vaccination or alone."
*
*
* When government technocrats want Americans to accept the unacceptable,
* they move slowly. In the case of reaching the ultimate goal of a universal
* system of personal identification, this introduction is likely to begin
* with the smartcard, and progress to non-implantable, bio-chips attached to
* the clothing or worn in bracelets.
*
* In Europe, this system has already been used at track and field events
* where the competitors wear the device attached to their jersey. This
* provides their coordinates during each event and can be used for the
* timing of races.
*
* Widespread use among sports fig
Firewoman
2004-11-23 11:13:25 UTC
Permalink
<y5ujc.5348-***@fe39.usenetserver.com> cancelled by originator "Firewoman" <***@default.domain.not.available>

the public and politicians have the information and the will to do so.


P113
Good encryption systems, such as PGP, developed privately by American Phil
Zimmerman, are publicly available, although they are still used only by
relatively few people in the know.

The UKUSA agencies have been attempting to curb the spread of this technology,
which is a major threat to their influence, so far without enough success to
stop it.

It remains to be seen how much the public can find a technological answer to
maintaining privacy in a world with systems like ECHELON.


*** end of 'Secret Power' excerpt



******************************************************************************


Throughout the Cold War, the United States government pounded into us again
and again how Russia and China were evil because they monitored and controlled
the political expression of their people, had sham laws and sham courts, all
dedicated to maintaining the power of the all-important State.

How the philosophy of communism was the rights of the individual were
subservient to the needs of the State, as determined by the State.
i.e. the antithesis of constitutional democracy

Ironically, it was the United States that built
the ultimate Orwellian surveillance mechanism.

There was no public discussion about it.

And used sham laws: Executive Orders and Congressional legislation.

To create a secret agency and a secret sham court.


Used repeatedly to control lawful domestic political protest.

The Soviet Union and China we were told to fear.


******************************************************************************
******************************************************************************
******************************************************************************


Part 2: On Monitoring and Being Monitored
---- - -- ---------- --- ----- ---------

o On Monitoring
- Driver'
Firewoman
2004-11-23 11:30:18 UTC
Permalink
NN cancel: <j2rac.6863%***@fe39.usenetserver.com>

demand that it be outlawed. For 'public safety and national
security'.

: * "Above the Law"
: * ISBN 0-684-80699-1, 1996
: * by David Burnham
: *
: * The suspicion that the government might one day try to outlaw any
: * encryption device which did not provide easy government access was
: * reinforced by comments made by FBI Director Freeh at a 1994 Washington
: * conference on cryptography. "The objective for us is to get those
: * conversations...wherever they are, whatever they are", he said in
: * response to a question.
: *
: * Freeh indicated that if five years from now the FBI had solved the
: * access problem but was only hearing encrypted messages, further
: * legislation might be required.
: *
: * The obvious solution: a federal law prohibiting the use of any
: * cryptographic device that did not provide government access.
: *
: * Freeh's hints that the government might have to outlaw certain kinds
: * of coding devices gradually became more explicit. "The drug cartels
: * are buying sophisticated communications equipment", he told Congress.
: * "Unless the encryption issue is RESOLVED soon, criminal conversations
: * over the telephone and other communications devices will become
: * indecipherable by law enforcement. This, as much as any issue,
: * jeopardizes the public safety and national security of this country."

Louis Freeh, banging the Drums of War.


It's of
Firewoman
2004-11-23 13:29:43 UTC
Permalink
ignore article <y5ujc.5348-***@fe39.usenetserver.com>

first one is where an ex-worker ("Dumb") asks a current employee for
something proprietary, in this case written by the ex-co-worker, and the
current employee ("Dumber") gives it to them.

It happened again and again and again at all sites I've monitored.

They fired her.

One of the more unusual Dumb-and-Dumber incidents was when a new hiree who
was quite happy with her new job - told all her friends in email - then sent
an email "Subject: For your eyes only" into dttus.com, with an Excel
spreadsheet attached.

It contained detailed compensation numbers for an entire trading desk.

Technically it wasn't a Dumb-and-Dumber, more like a Dumber-to-Luckless,
because the recipient didn't request it.

Anyway, they fired her.

And Deloitte & Touche fired the recipient!!!

I guess they hold their people to very high standards: if you receive
something proprietary of another company's, you'd better report it to
management yourself.

No, Deloitte & Touche didn't spot the transfer.

We had to ask for our email "back".

********** end excerpt from 'Corruption at Salomon Brothers' **********
Firewoman
2004-11-23 12:01:04 UTC
Permalink
I am cancelling <***@fe39.usenetserver.com>

The GCSB computers, the stations, the headquarter operations and, indeed,
GCSB itself function almost entirely as components of this integrated system.

Each station in the network - not just the satellite stations - has Dictionary
computers that report to the ECHELON system


P37
United States spy satellites, designed to intercept communications from orbit
above the earth, are also likely to be connected into the ECHELON system.

These satellites either move in orbits that criss-cross the earth or, like
the Intelsats, sit above the Equator in geostationary orbit.

They have antennae that can scoop up very large quantities of radio
communications from the areas below.

A final element of the ECHELON system are facilities that tap directly into
land-based telecommunications systems, completing a near total coverage of
the world's communications.

The microwave networks are made up of chains of microwave towers relaying
messages from hilltop to hilltop (always within line of sight) across the
countryside. These networks shunt large quantities of comm
Android Cat
2004-11-23 11:10:16 UTC
Permalink
18,525 lines of proprietary YieldBook C source.
! The user is still here (voicemail answers).
! Sent to themselves, or a relative, into a college campus.
! This source is very Salomon-specific, and could not be useful
! to transmit offsite for "testing".
! It executes other programs in the YieldBook package tree, and
! needs a full setup of YieldBook to operate.
!
! Shall I do the secondary searches and an incident report?
! ---guy
!
! *********************************
! Filename: Dec_21_95/dfAA19116 Size: 522186, Dated: Dec 21 1995
! Sender: ***@bpann
! Recipient: ***@cornell.edu
! *********************************

********** end excerpt from 'Corruption at Salomon Brothers' **********

Nothing was done: I had completely overwhelmed Salomon Legal with security
incidents, and many were ignored.

In general, when you catch something in the backups, there are two choices:

o Grin and bear it
o File criminal or civil charges in court


Two of the security incidents found in the backups qualified for criminal
prosecution.

One was a source for the Finance Desk Trading System [FDTS].



********** begin excerpt from 'Corruption at Salomon B
Android Cat
2004-11-23 12:07:46 UTC
Permalink
addiction ought
* to become national priorities.
*
* Said David Margolis, who had supervised the Criminal Division's anti-
* narcotics efforts in the early 1990s: "Anyone who thinks that drug
* enforcement is primarily a law enforcement issue, they're smoking wacky
* tabacky."

Tell all the damn manipulative politicians.


Jail's not even cost effective.

* RAND Study Finds Mandatory Minimums Cost-Ineffective
* ----------------------------------------------------
*
* Excerpt from RAND Press Release:
*
* Washington, DC, May 12, 1997 -- If cutting drug consumption and
* drug-related crime are the nation's prime drug control
* objectives, then the mandatory minimum drug sentencing laws
* in force at the federal level and in most states are not the
* way to get there.
*
* This is the key finding of "Mandatory Minimum Drug
* Sentences: Throwing Away the Key or the Taxpayer's Money?",
* a new RAND study that provides the first quantitative
* analysis of how successful these measures are in achieving
* what Director Barry McCaffrey of the Office of National Drug
* Control Policy has called "our central purpose and mission -
* - reducing illicit drug use and its consequences."

In Florida, they charged a mother with delivering cocaine to her baby.
A problem with this is the mother-addict repeatedly applied for rehab
programs, but there were no available slots. Not enough funding.


Law enforcement drug hysteria. Decades of Drug War.


Those rumor-level stories about our government encouraging
drugs to reach the inner
Firewoman
2004-11-23 13:28:35 UTC
Permalink
Filename='PSOPROC.DOC'
:
: Some of the procedures you wanted information on are documented here.
:
: Fred.
: *********************************
:
: Microsoft Word 6.0 Document
: Salomon Internal Audit#H:\AUDITOR\AB12345\WORD\PSOPROC.DOC
:
: EMERGING MARKETS DEBT WHOLE LOANS
: SUPPORT PROCEDURES
:
: Fred Hamburger
:
: EMERGING MARKETS DEBT LDC LOANS
: SUPPORT PROCEDURES
:
: I. CONFIRMATION
: Introduction
:
: Trades in LDC loans are recorded by Traders on trade logs contemporaneously
: with the telephone conversations actually executing the transactions. During
: the day, these trade logs are passed to data input personnel, who then enter
: the trades into AAAA. (AAAA is designed to support direct on-line entry by
: Traders, but is not used in this manner on the Emerging Markets Desk.)
: AAAA feeds BBBB at the end of day which in turn feeds relevant downstream
: Salomon systems. AAAA also feeds the CCCC system, which is maintained as
: a stand-alone second level sub-ledger that provides functiona
Firewoman
2004-11-23 10:32:38 UTC
Permalink
Reagan scrapped the Carter order and
broadened considerably the power of the spy agencies to operate domestically.

P473: Under the Reagan executive order, the NSA can now, apparently, be
authorized to lend its full support - analysts as well as computers - to
"any department or agency" in the federal government and, "when lives are
endangered," even to local police departments.

[ Yea billions of dollars a year military SIGINT support technology...
oh so invisible in its great mass.

A total blurring of the lines between Military
and civilian control of the domestic population.
]


P475-477: Like an ever-widening sinkhole, the NSA's surveillance technology
will continue to expand, quietly pulling in more and more communications and
gradually eliminating more and more privacy.

If there are defenses to such technotyranny, it would appear, at least from
past experience, that they will not come from Congress.

Rather, they will most likely come from academe and industry in the form of
secure cryptographic applications to private and commercial telecommunications
equipment.

The same technology that is used against free speech can be used
to protect it, for without protection the future may be grim.


Senator Frank Church, chairman of the Senate Intelligence committee, referring
to the NSA's SIGINT technology:

At the same time, that capability at any time could be turned around
on the American people and no American would have any privacy left,
such is the capability to monitor everything: telephone conversations,
telegrams, it doesn't matter.

There would be no place to hide.

If the government ever became a tyranny, if a dictator ever took charge
in this country, the
Android Cat
2004-11-23 12:20:58 UTC
Permalink
predicted that the court ruling
* would prompt a wave of similar legislation across California.
*
* Because the San Jose City Attorney's office brought action against the
* defendants under a civil procedure, the defendants were not guaranteed
* the standard protections of criminal law.
*
* "Liberty unrestrained is an invitation to anarchy," Justice Brown wrote.
*
* The defendants may not engage in any form of public association: "standing,
* sitting, walking, driving, gathering or appearing anywhere in public view"
* in the neighborhood, or face 6 months in jail.
*
* They further may not: "climb trees or fences, make loud noises, possess
* wire cutters or marbles [What???], wear particular clothes, make certain
* hand signs, or carry marking pens or pagers."


The worst-case version of a National ID Card is a biometric-based one.

Biometrics means that card is numbered with your fingerprint, or retina
scan, or other unique physical characteristic.

You would be enumerated. Numbered for all time.

* CARROLLTON, Texas--(BUSINESS WIRE)--May 16, 1997--Sandia Imaging, a
* majority-owned subsidiary of Lasertechnics, Inc. (Nasdaq: LASX) and a
* leader in secure card technologies, will premiere the world's first
* printer that can personalize, print and encode optical cards in a
* single, on-line process, during CardTech/SecurTech '97 in Orlando, FL
* from May 19 through 22.
*
* This new technology significantly streamlines the printing and encoding
* process, making highly secure optical cards more efficient and less
* costly for use as health care cards and in other industries.
*
* Developed jointly by Sandia Imaging and Canon USA, the VIVID 2000's
* optical card encoding module incorporates Canon's Society for
* Interchange of Optical Cards (SIOC) optical card technology, thus
* enabling single, one-pass encoding. [it's a color card printer
Firewoman
2004-11-23 13:10:33 UTC
Permalink
IN UNANIMOUS AGREEMENT THAT THE WIDESPREAD USE OF
ROBUST NON-KEY RECOVERY ENCRYPTION ULTIMATELY WILL DEVASTATE OUR ABILITY
TO FIGHT CRIME AND PREVENT TERRORISM.

UNCRACKABLE ENCRYPTION WILL ALLOW DRUG LORDS, TERRORISTS, AND EVEN
VIOLENT GANGS [Secret Service to Ed Cummings: "We are the biggest
gang in town"] TO COMMUNICATE WITH IMPUNITY. OTHER THAN SOME KIND
OF KEY RECOVERY SYSTEM, THERE IS NO TECHNICAL SOLUTION.

As if real terrorists or drug lords would use Key Recovery crypto!

Furthermore, Freeh is arguing BOTH SIDES of the issue when he complains
"DRUG LORDS ARE NOW SUPPORTED BY THE BEST TECHNOLOGY MONEY CAN BUY", AND
THEN SAYS we need Key Recovery so we can read their traffic!

Even the NSA is talking Doublethink at us:

* NYT: Stuart A. Baker, General Counsel for the NSA, explained why crooks
* and terrorists who are smart enough to use data encryption would be stupid
* enough to choose the U.S. Government's compromised data encryption
* standard:
*
* "You shouldn't overestimate the I.Q. of crooks."

..which is also apparently their view of the American public.


WE ARE NOW AT AN HISTORICAL CROSSROAD ON THE ENCRYPTION ISSUE.

IF PUBLIC POLICY MAKERS ACT WISELY, THE SAFETY OF ALL AMERICANS WILL
BE ENHANCED FOR DECADES TO COME.

[1984 Newspeak:] BUT IF NARROW INTERESTS PREVAIL, LAW ENFORCEMENT WILL
BE UNABLE TO PROVIDE THE LEVEL OF PROTECTION THAT PEOPLE IN A DEMOCRACY
PROPERLY EXPECT AND DESERVE. ANY SOLUTION THAT IGNORES THE PUBLIC SAFETY
AND NATIONAL SECURITY CONCERNS RISK GRAVE HARM TO BOTH.

And what
Firewoman
2004-11-23 13:02:14 UTC
Permalink
Microsoft-Entourage user "Firewoman" <***@default.domain.not.available> wants to cancel <c2cad.8646%***@fe39.usenetserver.com>.

: processQuery
* Name : storeColumnData - gets various column attributes
* Name : lookupInTableB
* Name : printReportRow
* Name : printEndOfReport
* Name : clearDownRows
* Name : openReportFile
* Name : StartUp
Redhot #2)
: *********************************
: Filename: May_22_96/dfAA16598 Size: 11786, Dated: May 22 16:07
: Subject: prepay.c
: *********************************
static char *rcsid="$Id: prepay.c,v 1.29 1996/03/26 13:42:30 kautilya";
/* Copyright M-) 1995 by Salomon Brothers Inc. All rights reserved.
** Unpublished.
** This software is proprietary and confidential to Salomon Brothers Inc
** and may not be duplicated, disclosed to third parties, or used for
** any purpose not expressly authorized by Salomon Brothers Inc.
** Any unauthorized use, duplication, or disclosure is prohibited by law
** and will result in prosecution. */
About 500 lines of C source outbound. Full source is enclo
Firewoman
2004-11-23 12:01:42 UTC
Permalink
This message was cancelled from within Mozilla.

panel on the nation's
* infrastructure systems warned.
*
* Robert Marsh is the head of the President's Commission on Critical
* Infrastructure Protection.

Whatever should we do about those nasty hackers?

******************************************************************************

Secret Service: Harassment of 2600
------ ------- ---------- -- ----

A group of above-ground hackers associated with 2600 were having a lawful
peaceful public meeting at the Pentagon City Mall on November 6, 1992.

The meeting was busted up by mall police for no apparent reason.

Identification was demanded from everyone.

Bags were searched.

It's the 1990s now.

The harassment was publicized by 2600, and a reporter talked to the head
of the mall's security: he let slip that the Secret Service ordered them
to harass 2600's lawful peaceful public meeting.

That was definitely news.

The mall security manager then denied what he said about Secret Service
ordering the harassment: luckily the reporter recorded his conversation.

CPSR [Computer Professionals for Social Responsibility] and Marc Rotenberg
of EPIC [Electronic Privacy Information Center] began FOIA [U.S. Freedom
of Information Act] proceedings to find out about this incident.

The case raises significant issues of freedom of speech and assembly,
privacy and government accountability.

In response to an FOIA asking why this happened, the Secret Service
responded: "We are sure no one knows why we had the meeting disrupted".

They have made a mockery of FOIA.

This mockery of FOIA is still being litigated by EPIC.

An intentional illegal government surveillance program...it just never stops.

Marc Rotenberg has gotten the Secret Service to admit in court that this was
done to "investigate hacking into a company's telephone switch."

Since when did
Firewoman
2004-11-23 11:42:38 UTC
Permalink
Article <***@fe39.usenetserver.com> cancelled from tin [FreeBSD/2.2.8-STABLE (i386)]

has his phone number.

It's an api that accesses some sort of indexed info, creates some sort
of report, is an X-windows deal.

I found the name of the recipient:

**********************************************************************
NAME XXXXXXXXXXXXXX Oracle / NewsCorp Online Ventures
TITLE XXXXXXXXXXXXXXXXXXXXX AAAAAAAAAAAAAAAAAAAAAAAAAAAAA
***@newscorp.com XXXXXXXXXXXXXXXXXXXXX
(212)-nnn-nnnn (nnn)-nnn-nnnn
**********************************************************************

..and the recipient confirmed delivery.

That was kind of him.


#of
lines sourcefile

49 basis/include/AlphaIOField.h
49 basis/include/AlphaNumIOField.h
82 basis/include/AmountFormat.h
47 basis/include/AmtQtyEntryPad.h
38 basis/include/AppSessionMessage.h
292 basis/include/AppUI.h
71 basis/include/Customization.h
[large snip here]
131 basis/include/Date.h
77 basis/include/DateEntryPad.h
54 basis/include/DateIOField.h
33 basis/include/DefaultButton.h
63 basis/include/DocLayout.h
1144 basis/lib/base/basis_ios.cc
398 basis/lib/base/AmountFormat.cc
157 basis/lib/base/TemplateField.cc
136 basis/lib/base/AssocArry.cc
18184 total


His last day was XXXXXX 1996.
Firewoman
2004-11-23 11:24:37 UTC
Permalink
This message was cancelled from within Mozilla.

in the FBI's New
: York command post.
:
: When the FBI's technology head was asked how the new tracking system was
: working, he looked surprised, and didn't answer the question. "How did you
: know about that?" he asked.
:
: The FBI denied a request for a tour of its Manhatten command post, where
: the output from its instantaneous tracking system is displayed for the
: brass.
:
: In 1993, however, the FBI allowed a reporter who was working on what the
: bureau expected would be a friendly article to visit the inner sanctum.
:
: The command center, she later wrote, "looks not unlike the Starship
: Enterprise, of 'Star Trek.' On the rear wall of the room are three giant
: screens on which neighborhood maps, live field surveillance, and graphs
: charting the progress of a manhunt can be projected.
:
: Law enforcement officials, at stations in three semicircular tiers of
: desks, can watch---and direct---as criminals are caught in the act.
:
: Their computer mouse screen pointers are a gun icon.

OH MY GAWD!!!!

WHAT'S NEXT, THE WHOLE DAMN COUNTRY???


What is this?

* Subject: Air Force News Service 01oct96
* Fr
Firewoman
2004-11-23 13:10:23 UTC
Permalink
illicit drug use and its consequences."

In Florida, they charged a mother with delivering cocaine to her baby.
A problem with this is the mother-addict repeatedly applied for rehab
programs, but there were no available slots. Not enough funding.


Law enforcement drug hysteria. Decades of Drug War.


Those rumor-level stories about our government encouraging
drugs to reach the inner cities were weird.

Remember, we've been having a Drug War for four decades now.

I guess there is a certain logic to it. Obviously the government is into
hysteria on the matter: it is then possible that they would want to continue
having a drug problem so they could continue the hysteria.

Even the Attorney General was drooling over drug forfeiture dollars, to the
point of shunting aside other cases.


Recently...

: CBS 60 Minutes, Steve Croft reporting.
:
: Remember that story of the hero customs agent snagging a tanker truck full
: of cocaine? There is a strange twist to the story.
:
: The Federal agent's manager repeatedly tried to interfere with him making
: the bust.
:
: The agent's dog had flagged the truck; the agent weighed it and found a
: discrepancy. His manager said it must be in the tires. You can only check
: the tires for drugs he was told.
:
: But the agent persisted, and made the bust. His manager let the driver
: of the truck leave. The driver literally fled on foot back to Mexico.

What the hell was that about???

Was it a single corrupt Federal agent?

: CBS 60 Minutes, Steve Croft reporting.
:
: Standing at a fence about a hundred feet from the U.S. Customs lanes,
: Steve Croft and an ex-agent with a walkie-talkie tuned to the right
: frequency began videotaping the border crossings.
:
Android Cat
2004-11-23 14:47:36 UTC
Permalink
I am cancelling <E2pcf.528$***@fe51.usenetserver.com>

types of weaponry, explosives, financial dealings, money
transfers, airline destinations, stock information, international
conferences, demonstrations, and politically suspect groups and individuals.

As is the case with operations, countries maintain deniability by getting
information gathered on their domestic situations by allies.

Under development is even more sophisticated "topic recognition" which
can home in on guarded conversations that avoid potential trigger words.

Nothing and no one is exempt.

For example, you are talking on the telephone to a friend discussing
your son's school play. "Boy," you say sadly, "Bobby really bombed last
night," or perhaps you use the word "assassination" or "sabotage" or any
one of the key words the computer has been told to flag.

A hard copy of your conversation is produced, passed to the appropriate
section (in this case terrorism), and probably ends up in the garbage.

But perhaps the conversation is not so clear-cut or the analyst has poor
judgement. Then your name is permanently filed under "possible terrorist".
Weeks or even years later, you have a similar conversation and use the
same words; the computer filters it out again. Since this is your second
time, your name moves from the "possible" to the "probable" file.

Sound absurd? Not at all; it actually happened while I was at CSE.
[snip]

SIGINT specialists are honing their skills at monitoring digital
information. SIGINT agencies everywhere are increasingly throwing
their surveillance web over the Internet and other data networks
of interest.
[snip]


Mini-recap:

o The countries sharing intelligence: US, UK, Canada, Australia,
New Zealand

o Massive domestic spying by the NSA, using an Orwellian "1984"
technology to search all communications using computers, including
domestic phone calls, via key
Android Cat
2004-11-23 12:04:01 UTC
Permalink
"Android Cat" <***@hotmail.com> canceled <E2pcf.528$***@fe51.usenetserver.com>

jumped 32% over 1995.
*
* This was deliberate manipulation of the statistics: unlike previous years,
* the State Department suddenly stopped figuring in the 55,715 acres that
* the Columbian police fumigated with herbicide.
*
* The number had actually gone down, but President Clinton cited the upswing
* to support his Feb. 28 decision to decertify Columbia as helping in the
* War on Drugs. Mexico was certified.



A majority of citizens in several states have
now told the government they are full of hooey.


The Drug War is primarily about governmental politics and governmental power.

Not about drugs.

Can't afford to look soft on crime, or your opposition will stomp you.

The government uses these "wars" to claim ever greater power over us.

To justify violent no-knock searches by agents not even carrying warrants.

To justify killing the 'exclusion rule' to protect police not citizens.

To justify draconian asset forfeiture laws.

To justify using deadly force.


It's no longer the 1920s, but our government still has reefer madness.

In another astonishing case of corruption due to Congressional asset
forfeiture laws, and yet another violent result of marijuana's Schedule
I Substances classification:

ABC news: the Parks Department wanted a prime piece of land called
"Trail's End". It was owned by a private family. They refused to sell
Android Cat
2004-11-23 14:14:48 UTC
Permalink
'unremitting technological attack' could not be described!


******************************************************************************


Cybernetic control of society
---------- ------- -- -------

You are about to encounter the true use of the 'cyber' prefix.

Cybernetics is a cross-disciplinary science. The name was coined by
Norbert Wiener [pron. whiner], who was a professor of mathematics at
MIT, and did radar and firing-feedback mechanisms for the U.S. in
World War II. Cybernetics describes the complex of sciences dealing
with communication and control in the living organism AND in the
machine. Its application is sometimes called operations research.

I personally rank Norbert Wiener above Albert Einstein.

Operations research is a difficult discipline --- I certainly don't understand
it --- but when it was desperately needed during World War II, the U.S. Dept.
of War went for it gung-ho, rightfully. Signals intelligence (SIGINT) is the
first step...the NSA grew out
Android Cat
2004-11-23 15:50:23 UTC
Permalink
This message was cancelled from within Mozilla.

excerpt from 'Corruption at Salomon Brothers' **********

Dumb-and-Dumber incident:
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Sender: ***@jefco.com
date: 28 Feb 96 8:14:56 EDT
subject: Greetings!
Recipient: ***@xxx.sbi.com

Drake.
Favor time! I need documentation on application packaging (FOR DUMB
PEOPLE). Yeah, I know you taught me it already, but I've forgotten it all.
I need to roll out packaging mechanisms here at Jefferies. I really miss
all the infrastructure mechanisms I took for granted at Salomon.

********** end excerpt from 'Corruption at Salomon Brothers' **********


That document was labelled as Salomon proprietary on each page.

The FBI got search warrants and went into Jefferies and took control of
a couple systems, and went home with the Ex-Salomon person and searched
there and took his computer systems. [The case is still pending @6/97]




The code is simple. It's choosing the keyword filtration sequence that's
tricky. I figured out how to determine it in an almost systemic way. Oddly
enough, I needed no keywords for specifically seeking out source code.


So, keyword monitoring is highly effective, I could even cover three feeds,
and, sigh, I should mention that it took well less than 5000 lines of
programming source code for me to implement it.

And I generated two FBI cases.

[
Think of what could happen should the FBI get its implementation of
the CALEA bill. They could go nuts, and say "see, that proves we need
to monitor thousands of phone calls simultaneously".

And into the abyss we go.

There would be no place to hide from the government,
even for lawful peaceful political protest.

Domestic ECHELON must be physically disabled.
]




There's more.


*************************************************************
Android Cat
2004-11-23 15:34:53 UTC
Permalink
"Android Cat" <***@hotmail.com> Sylpheed cancel - <D5yfb.754$***@fe51.usenetserver.com>

doesn't
: * involve criminality should be private"
: *
: * In other words, as the debate was framed by Bayse, the right to
: * privacy is at least partly contingent on a determination by an FBI
: * agent or clerk that the conversations they already intercepted and
: * understood do not involve a crime.


Do you want to live in a real live Big Brother world?

It is not at all about trying to keep up with technology in order to wiretap.

The phone companies are already able and authorized to listen in on any
line at any time, to check the integrity of the network.

I've heard some funny stories by old Bell System employees about a bunch of
people listening into private conversations, and having a hoot.

Question: How can the FBI use computers to monitor thousands and thousands
and thousands and thousands of phone calls simultaneously, as they
said they would do with the bill, when we Americans speak so many
different accents and languages?

Answer: Thirty years of fine tuning by the NSA, y'all.


The Digital Telephony Act will allow them to legally - at full
wiretapping capacity - dragnet-monitor the telephone network.

Each line monitored will not require a warrant.

And how did they get this CALEA legislation?

* "Government Access", by Jim Warren
*
* At the administration's pleading, the [Democrat-controlled] Congress
* rammed it through in less than two months, with no substantive hearings.
*
* Literally in the dark of night, without debate, it passed in the house
* by voice vote and two nights later by unanimous consent in the Senate,
* only minutes before adjourning to rush home for their important work:
* campaigning for re-election.

The NSA domestic watch-list is probably already stuffed
full enough to use the complete CALEA capacity.

You can select many more lines for monitoring than actually end up active
at the same time. The effect is indistinguishable
Android Cat
2004-11-23 15:36:15 UTC
Permalink
Notepad (Win9SE) article removal: <D5yfb.754$***@fe51.usenetserver.com>

enforcement community."
*
* Operated jointly by the FBI and the Pentagon's Defense Advanced Research
* Projects Agency (DARPA, creators of the Internet), the FBI facility was
* created to allow the bureau "to use computer-aided design, engineering
* and manufacturing of tools and equipment (software and firmware
* respectively) to design, simulate, and fabricate integrated circuits,
* printed circuit boards, electronic components, packages, systems and
* concealments in a quick turnaround cost-effective manner."
*
* Among the facilities advantages are speed "through the use of laser
* restructuring, high-density interconnect, and reverse milling capability,"
* and a capability "to produce an integrated microphone ('microphone on a
* chip') in a single design/fabrication process."
*
* For many years, the FBI had been placing secret microphones on street-
* lamps, telephone poles, parking meters and empty automobiles parked near
* locations where its targets sometimes strolled. Such an outdoor array
* of surveillance devices planted near the Mulberry Street headquarters
* of John Gotti, for example, was an important weapon on the FBI's long
* and eventually successful investigation of one of New York City's most
* arrogant Mafia bosses.

Jeez, that sounds like plenty of electronic surveillance spy-power to me!

How about you?

The FBI has since come up with a briefcase with a 'targetable array of
microphones' to pick up conversations outside at a long distance.


* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* The leading lobbyist for CALEA was Louis Freeh, the aggressive
Android Cat
2004-11-23 14:57:27 UTC
Permalink
would do nothing different again.

You want to take "responsibility" for it: then resign.


Law enforcement gun hysteria.


Like a scene from a nightmarish movie [such as Terry Gilliam's Brazil]
the Feds, while poking holes in the building with a tank snout and spraying
dangerous amounts of toxic tear gas, and while knocking down extended areas
of the compound (as shown and commented on by ABC news) with another tank in
the rear, blared 1984 Newspeak over loudspeakers at the hapless victims:

"THIS IS NOT AN ATTACK. REPEAT THIS IS NOT AN ATTACK."



******************************************************************************


War #3 - Child Pornography
--- -- ----- -----------


"There were children watching this program. They were exposed
to full frontal nudity and irresponsible sexual activity."
---Rep. Tom Coburn (R-OK), criticizing "Schindler's List."


* NYC 1996: The FBI "investigates" ads on the sides of city buses
* for child pornography. The ads are by Calvin Klein.

The FBI is dizzy from bus fumes.


"Child porn" is one of the great "law enforcement concerns" about
cryptography. The FBI has groused that encryption has stymied prosecutions.

Let us take into consideration actions by the government because of
their "law enforcement concerns" on child pornography.

They have raided private homes and seized computer equipment after monitoring
Internet traffic and spotting regular people browsing WWW/USENET clicking on
an article they CAN'T SEE UNTIL THEY CLICK ON IT which contained nude pixels
representing children.

Out of f
Android Cat
2004-11-23 16:43:58 UTC
Permalink
Article <C2aee.727-***@fe51.usenetserver.com> cancelled from tin [IRIX64/6.5]

-- ----------

I created and did the traffic analysis for five months before handing it
off. The time includes a 2.5 month parallel run with the new person.

The new person found only half the security incidents I did, but we handed
off anyway.

Summarizing my five months:

o caught over 400,000 lines of Salomon proprietary source code outbound

////////////////////////////////////////////////////////////////////////
// //
// Copyright (C) 1994 Salomon Incorporated //
// All Rights Reserved. Unpublished. //
// //
// This software is proprietary and confidential to Salomon Inc. //
// and may not be duplicated, disclosed to third parties, or used //
// for any purpose not expressly authorized by Salomon Inc. //
// //
// Any unauthorized use, duplication, or disclosure is prohibited //
// by law and will result in prosecution. //
// //
////////////////////////////////////////////////////////////////////////

o Risk Management reports ("positions") caught outbound, including DRMS
(Derivatives) going to someone who started working for Merrill Lynch

o Risk Management reports inbound: Phibro positions [Salomon subsidiary]

o Internal product documentation and trading desk procedures outbound

o Many hostname/username/password transmissions for Salomon's internal systems

o Many Sybase database passwords, including SA passwords

o People working on their own businesses while within Salomon

o Someo
Android Cat
2004-11-23 16:24:14 UTC
Permalink
"Android Cat" <***@hotmail.com> Sylpheed cancel - <C2aee.727-***@fe51.usenetserver.com>

of surveillance and control techniques for tracking people.


In California a few years back the police kept hassling a black man who liked
to walk around at night to think. Unfortunately, he wasn't white, but liked
to walk around white neighborhoods. [Anyone with detailed info email me.]

He didn't carry id with him: the police arrested him on suspicion of being
a burglar or somesuch. The California Supreme Court threw out the arrest.
Not carrying ID was a primary part of the police complaint.

It is impossible for the government to issue a National ID Card without
its use eventually becoming required. That is simply how it goes with new
tools for the government.

See how the uses of the Social Security number have grown, wildly beyond
what the government ever said it would be used for?

# Privacy Journal, By Robert Ellis Smith, October 1986 issue
#
# Tax reform bill HR 3838 requires effective January 1988 that any taxpayer
# claiming a dependent five years or older have a Social Security number.
#
# This is to prevent divorced parents from simultaneously claiming the
# same child.
#
# The requirement means that, for the first time, large numbers of children
# who have not reached employment age will need Social Security numbers.
#
# Its use has been expanding the past fifteen years by regulations under
# the Bank Secrecy Act, requiring all bank account holders to be enumerated,
# and by the Deficit Reduction Act of 1984 and subsequent legislation
# requiring children who receive public assistance to be enumerated.
#
# Privacy Journal, By Robert Ellis Smith, April 1990 issue
#
# State legislatures are forced to enact legislation by November requiring
# all parents to provide their Social Security numbers before a birth
# certificate will be issued for a newborn.
#
Android Cat
2004-11-23 16:42:48 UTC
Permalink
KNODE/0.4 user "Android Cat" <***@hotmail.com> requires cancellation of <D1cbe.247$***@fe51.usenetserver.com>

UP NOW FOR CHRIS'SAKES!!!

* "Dispute Arises Over Proposal for Wiretaps"
* By John Markoff, The New York Times, February 15 1997
*
* The telephone companies, after meeting with the FBI, said they wanted to
* be able to monitor tens of thousands of conversations simultaneously in
* metropolitan areas, much more than their stated intention of simply
* trying to transfer its current surveillance capabilities into the
* digital era.
*
* And the Cellular Telephone Industry Association said the FBI wanted to
* monitor 103,190 cellular calls simultaneously nationwide.
*
* Lawyers for AT&T Wireless Services said, "The numbers alone are astounding."
*
* "This is kind of scary," said Tom Wheeler, CTIA president. "What does
* the FBI know about our future that we don't?"

----

You cannot assign people one-to-one to control everyone in a society.
But you can control society in a HIGHLY effective way using cybernetics,
and do so COST EFFECTIVELY.

That's one of the things CALEA is about, cost effectiveness of maintaining
the spying infrastructure when there are so many companies, new technologies,
so many different data formats.

I wrote 6502 assembler code for an SMDR unit (Station Message Detail
Recording), which is a computer that monitors phone call logs and attaches to
a PBX within a company and can generate long-distance expense reports by
departmen
Android Cat
2004-11-23 15:12:37 UTC
Permalink
xnews cancel: "Android Cat" <***@hotmail.com> removed <***@fe51.usenetserver.com>

white women with jazz and marijuana,
# claiming that 50% of all violent crime by blacks and Latino immigrants
# has been traced directly to marijuana.


* "Phantom Numbers Haunt the War on Drugs"
* By Christopher S. Wren, The New York Times, April 20, 1997
*
* Politicians are said to use statistics the way drunks use lampposts: for
* support rather then illumination. The aphorism seems more apt for the War
* on Drugs, which abounds with statistical lampposts that shed little light
* on the nation's preoccupation with illegal substances.
*
* When sensibly vague estimates based on the little that is known won't
* suffice, law enforcement officials oblige constituents with numbers that
* one police officer characterized as "P.F.A.," or "pulled from the air."
*
* When the State Department's annual survey said Mexico's annual marijuana
* production in 1989 was 30,200 tons, it was PFA.
*
* Assuming half the production makes it into the U.S., half the population
* between 15 and 40 in this country would have had to smoke a joint a day.
*
* By 1996 the State Department's annual survey stabilized at a more realistic
* 3,400 tons a year.
*
* However, the State Department's annual survey for 1996 stated Columbia's
* cultivation of coc
Android Cat
2004-11-23 15:20:34 UTC
Permalink
- Hackers
--- -- -------

o Secret Service: Harassment of 2600
o Secret Service: Vile Persecution of Ed Cummings
o Secret Service: Harassment of Steve Jackson Games


* The New York Times, CyberTimes, June 20, 1997
*
* Panel Chief Says Computer Attacks Are Sure to Come
*
* By THE ASSOCIATED PRESS
*
* WASHINGTON -- It is "only a matter of time" before critical U.S. computer
* systems face major attack, the head of a White House panel on the nation's
* infrastructure systems warned.
*
* Robert Marsh is the head of the President's Commission on Critical
* Infrastructure Protection.

Whatever should we do about those nasty hackers?

******************************************************************************

Secret Service: Harassment of 2600
------ ------- ---------- -- ----

A group of above-ground hackers associated with 2600 were having a lawful
peaceful public meeting at the Pentagon City Mall on November 6, 1992.

The meeting was busted up by mall police for no apparent reason.

Identification was demanded from everyone.

Bags were searched.

It's the 1990s now.

The harassment was publicized by 2600, and a reporter talked to the head
of the mall's security: he let slip that the Secret Service ordered them
to harass 2600's lawful peaceful public meeting.

That was definitely news.

The mall security manager then denied what he said about Secret Service
ordering the harassment: luckily the reporter recorded his conversation.

CPSR [Computer Professionals for Social Responsibility] and Marc Rotenberg
of EPIC [Electronic Privacy Information Center] be
Android Cat
2004-11-24 08:38:47 UTC
Permalink
"
* By Tim Golden, The New York Times, 8/15/1996
*
* With a quiet but forceful lobbying campaign, officers' unions and their
* supporters are pressing for new state laws that would remove unsubstant-
* iated complaints from police personnel files and limit the time in which
* a citizen's complaint must be investigated.
*
* Only 4% of complaints are upheld by review boards, and 70% are ruled
* inconclusive. Over time, some officers build up quite a bulk of complaints
* in their personnel file. Police chiefs oppose the legislations because it
* could undermine early warning systems for spotting bad officers.
*
* In some states, police unions have begun filing libel suits against those
* who file police complaints.
*
* The police officers assert that paper trails on complaints can ruin
* law-enforcement careers.

Police are the same bunch of law enforcement personnel who keep extensive
non-criminal notes and allegations on citizenry.

In fact, NYC Police have TWICE been caught using a form marked "for unofficial
notes, not to be kept with the normal records".

In other words, when the defendant tries to use discovery to get details of
the police case against them, so they can analyze what happened, these
"offline" notes are how the police withhold the information.

You know, like Geronimo Pratt's primary prosecution witness was a paid
government informer.

And the FBI won't delete the file of the kid who aspires to be in our Foreign
Service, but made the mistake of writing to foreign embassies in grade school.

Poor schmuck.

The FBI wants to keep "suspect" information on anyone in its NCIC 2000 system.

----

Some people feel the smart card will quickly give away to implantable
biometric transponders. Once everyone is fingerprinted, you ma
Android Cat
2004-11-24 06:58:14 UTC
Permalink
single adult program
* to more than 453,000 recipients of Aid to Families with Dependent Children.
*
* Of the 220,193 people electronically fingerprinted as of Nov. 9, only 146
* were found to have registered for duplicate benefits. New York State
* officials said they didn't expect to find many cases of fraud. [What???]
* "We are just using a new tool to help comply with Federal regulations
* prohibiting us from giving duplicate benefits."
*
* The program is costing the state $10 million a year.

One big evil eye, done with biometrics...control FAR BEYOND anything that
could be implemented with a social security number.

It's for our best interests...

* "Suffolk Medical Examiner Urges Fingerprinting Law"
* By John T. McQuiston, The New York Times, 8/20/1996
*
* Putting motorists' fingerprints on NY driver's licenses, as is done in
* California, would help identify disaster victims, the Suffolk Medical
* Examiner told a committee of the County Legislature about his work on
* the crash of TWA Flight 800.
*
* "The victims from California were the fastest and easiest to identify,"
* the Medical Examiner, Dr. Charles V. Wetli, said, "because the fingerprint
* of their right thumb was on their driver's license."
*
* "It was a nightmare for the other families to wait for identification."

----
Android Cat
2004-11-24 08:03:34 UTC
Permalink
to the expectations of its developers then it will have
* implications for virtually everybody. Yet public awareness of ITS is very
* low, and awareness of the privacy issues in ITS is low even in the
* community of privacy advocates.

Could things possibly be on a worse track than they are now?

What is the government saying this is for?

In case the State of New York wants to drive to the State of California,
and be able to warn them that there is a traffic jam in the State of Georgia?


----


Time to get back to the Universal Biometrics / National ID Card.

Texe Marrs was a career Air Force officer who commanded a number of the NSA's
communications centers around the world. The General in charge of the NSA is
Air Force.

As with Canadian spy Mike Frost, Texe has second thoughts about it all.

He found out about a proposal called 'L.U.C.I.D.', which he refers to as
Lucifer's Identification system...a design to enumerate every human, to
pin them down with a Universal Biometrics Card.

It is a proposal to "finish off" connecting all of the NSA's systems together
with all cooperating governments systems and international police systems.

It was set forth in 'The Narc Officer' September/October 1995.

This publication is:

"Official Publication of the International Narcotics Enforcement
Officers Association, Inc."

It proposes tying together all of NSA's disparate systems:

NCIC: National Crime Information Center 2000
IAFIS: Integrated Automated Fingerprint Identification System
NICB: National Instant Criminal Background
NRO: National Reconnaissance Office
National Law Enforcement Telecommunications System Projects Agency
FEMA: Federal Emergency Management Agency
OSI: Office of Special Investigations
NCB: Triple I National Central Bureau
Android Cat
2004-11-24 06:01:15 UTC
Permalink
illegal government surveillance program...it just never stops.

Marc Rotenberg has gotten the Secret Service to admit in court that this was
done to "investigate hacking into a company's telephone switch."

Since when did the "investigative" techniques used by the Secret Service
become valid for use in the United States? Going up to a bunch of mall
patrons and DEMANDING IDENTIFICATION from them and searching them?

How exactly was this supposed to further investigate a switch hacking?

For extended details of this governmental persecution of the politically
incorrect, see http://www.2600.com.


******************************************************************************


Secret Service: Vile Persecution of Ed Cummings
------ ------- ---- ----------- -- -- --------

Source material from http://www.2600.com, by someone calling themselves
"Emmanuel Goldstein", which in the book '1984' was known as the Hated Enemy
of the People.

2600, "The Hacker's Quarterly", is unhappy about what the Secret Service
did to one of its correspondents, Ed Cummings.
The Secret Service has locked Ed Cummings up with violent criminals for
nearly a year, solely because of his possession of written material,
software, and bits of hardware. In other words, not much at all.
First, some background:

Ed Cummings was on probation for removing batteries from a tone dialer.
All of this stems from an incident years ago when Cummings and two
friends were being questioned by a Northampton County police officer.
He had asked them about a tone dialer they had and, while he went into
another room, somebody removed the batteries from the dialer. They were
not under arrest and had not been instructed not to do this. However,
based on this, Cummings was charged with "tampering with evidence" even
though there was no proof that he had be
Android Cat
2004-11-24 06:42:53 UTC
Permalink
how to determine it in an almost systemic way. Oddly
enough, I needed no keywords for specifically seeking out source code.


So, keyword monitoring is highly effective, I could even cover three feeds,
and, sigh, I should mention that it took well less than 5000 lines of
programming source code for me to implement it.

And I generated two FBI cases.

[
Think of what could happen should the FBI get its implementation of
the CALEA bill. They could go nuts, and say "see, that proves we need
to monitor thousands of phone calls simultaneously".

And into the abyss we go.

There would be no place to hide from the government,
even for lawful peaceful political protest.

Domestic ECHELON must be physically disabled.
]




There's more.


******************************************************************************


I Can See What You Are Thinking
- --- --- ---- --- --- --------


In the complaint, I breathlessly described being able to see more than just
dry security incidents. The point was germane to my analysis that one of the
reasons the corrupt member of Salomon's Internal Audit department could
seemingly not be punished by anyone was that his job as financial traffic
analysis person made him privy to the most damaging unreported SEC violations
that anyone at Salomon would know about.

If you spot criminal behavior, it is a very personal thing to the employee.

********** begin excerpt from 'Corruption at Salomon Brothers' **********

: I could see not only regular security incidents, but also who was queer,
:
Android Cat
2004-11-24 08:46:39 UTC
Permalink
actively involved in the
! design [of Key Recovery cryptography], the agency will have the
! technical ability to decipher the messages.
!
! Walter G. Deeley, NSA deputy director for communications security
! said, "It is technically possible for the Government to read such
! messages, but it would be insane for it to do so. It would be an
! extraordinarily expensive undertaking and would require a massive
! increase in computer power."

Probably since noone believed that, they admitted it, and said why they
needed to decrypt in real-time:

# Encryption and Law Enforcement
#
# Dorothy E. Denning
# Georgetown University
#
# February 21, 1994
#
# To implement lawful interceptions of encrypted communications, they
# need a real-time or near real-time decryption capability in order
# to keep up with the traffic and prevent potential acts of violence.
# Since there can be hundreds of calls a day on a tapped line, any
# solution that imposes a high overhead per call is impractical.


And if uncrackable crypto were in widespread use within the U.S., the
FBI would demand that it be outlawed. For 'public safety and national
security'.

: * "Above the Law"
: * ISBN 0-684-80699-1, 1996
: * by David Burnham
: *
: * The suspicion that the government might one day try to outlaw any
: * encryption device which did not provide easy government access was
: * reinforced by comments made by FBI Director Freeh at a 1994 Washington
: * conference on cryptography. "The objective for us is to get those
: * conversations...wh
Android Cat
2004-11-24 06:26:46 UTC
Permalink
You can select many more lines for monitoring than actually end up active
at the same time. The effect is indistinguishable from a MUCH larger
monitoring capacity.

Even greater when the software programmatically decides (at the FBI end) which
conversations to continue listening to.

I'm sure law-enforcement will be able to dynamically configure their
connection to the phone companies' networks.

And probably cheat to use ECHELON to direct this programmatic control,
yielding no effective monitoring limit for domestic law-enforcement, and
domestic political control.

Law enforcement has absolutely no need for the Digital Telephony Act except
to give them their own access terminals and PRETEND there is a firewall
between what the Military is doing versus what the FBI is doing.

Of course, to monitor phone calls at full capacity,
the FBI will need to use Military surveillance software.

We've come a long way from requiring a person to listen to the first minute
of conversation to even decide whether the person could continue to monitor.

It's a brave new world now.


We're there.


Surprise.



******************************************************************************


Australian ECHELON Spotted
---------- ------- -------

* http://www.texemarrs.com, Living Truth Ministries 800/234-9673

Texe Marrs and his organization are big on the "Anti-Christ" aspects of all
the technology the UKUSA governments have deployed to monitor people.

I am just glad he knows the Beast when he sees it, that it is Evil (wi
Android Cat
2004-11-24 07:18:45 UTC
Permalink
-- be sentenced to federal prison for life
without parole; a second offense brings the death penalty."

# "Dole Calls for Wider Military Role in Fighting Drugs"
# By Katherine Q. Seelye, The New York Times, August 26, 1996
#
# "I want the Military to expand its use of technology, including
# reconnaissance and satellites and area surveillance and listening
# posts...and call the National Guard to move in," said Presidential
# candidate Bob Dole.
#
# "In the Dole Administration, we're going to return to what works. We're
# going to replace the President's inattention to dangerous drugs with a
# clear and forceful policy of zero tolerance."
#
# "That's ZERO TOLERANCE."
#
# "ZERO TOLERANCE for drug smugglers. ZERO TOLERANCE for drug pushers.
# ZERO TOLERANCE for drugs in the workplace and drugs in school. And
# ZERO TOLERANCE for illegal drugs, period."
#
# "ZERO! ZERO! ZERO!"
#
# "We will REDOUBLE our efforts to put drug criminals behind bars."
#
# "We will only appoint judges who will throw them in jail."

Thank Gawd he didn't become President.

* July Fourth, 1997, C-SPAN Congressional Television
*
* Mark Klaas, father of 12-year-old Polly Klaas, who was murdered by a
* repeat-offender that was paroled fro
Android Cat
2004-11-24 09:21:55 UTC
Permalink
guilty on Monday in village court to a
* reduced obscenity count, a misdemeanor.

Of course, the Feds are not prosecuting these as misdemeanor cases.

* The New York Times, 5/10/97
* Ex-Prosecutor Indicted on Pornography Charges
*
* A former deputy district attorney who has prosecuted sex crimes has
* been indicted on child pornography charges. Peter Harned was charged
* with transporting, receiving and possessing child pornography from
* July 1995 to July 1996.
*
* Mr. Harned worked at the District Attorney's office for 11 years,
* where he handled child pornography as well as homicide cases. He
* was dismissed last summer after he was arrested on state charges
* involving child pornography. The Federal counts, which carry
* tougher penalties, will replace the state charges.
*
* The child pornography files were discovered in Mr. Harned's home
* computer when it was taken in for repair. The computer store
* alerted law enforcement officers.

Be careful what you...

----

Also, there seems to be a disagreement between citizens and
the Government over what even constitutes child pornography.

* The New York Times, 1995
* Newark, NJ, Jan 12 (AP)
*
* A judge ruled today that a father must stand trial for taking nude photos
* of his six-year-old daughter, despite the man's claim that the pictures
* were art, not pornography.
*
* The judge ruled they were not art, despite Mr. Feuer's instructor, Susan
* Klechner of the International Center of Photography in New York Ci
Android Cat
2004-11-24 10:10:05 UTC
Permalink
200 arrests for child pornography
* 6/97 stat: 94 convictions, 104 "pending" convictions

It's not hard to spot them, and may I point out that it happens despite
free uncrackable encryption (PGP) being available worldwide for years.

Yeah, I know, it's heresy to try and suggest there's a category called
"child pornography light". Here are some sample cases of the broad base
of people involved:

* The New York Times, 3/6/97
* Minister Gets Probation in Pornography Case
*
* A Baptist minister who copied child pornography images off the
* Internet received three years' probation in exchange for his
* guilty plea to a reduced charge.
*
* He must pay a $1,000 fine, forfeit his home computer, not have
* any unsupervised contact with children under 17 and undergo
* counseling.
*
* The minister, 47, was arrested in January.
*
* Computer technicians at a repair shop had found 30 pornographic
* images of children in his computer and notified the state police.
*
* The minister pleaded guilty on Monday in village court to a
* reduced obscenity count, a misdemeanor.

Of course, the Feds are not prosecuting these as misdemeanor cases.

* The New York Times, 5/10/97
* Ex-Prosecutor Indicted on Pornography Charges
*
* A former deputy district attorney who has prosecuted sex crimes has
* been indicted on child pornography charges. Peter Harned was charged
* with transporting, receiving and possessing child pornography from
* July 1995 to July 1996.
*
* Mr. Harned worked at the District Attorney's office
Android Cat
2004-11-24 08:14:46 UTC
Permalink
XXXXXXXXXXXXXXXXXXXXX
(212)-nnn-nnnn (nnn)-nnn-nnnn
**********************************************************************

..and the recipient confirmed delivery.

That was kind of him.


#of
lines sourcefile

49 basis/include/AlphaIOField.h
49 basis/include/AlphaNumIOField.h
82 basis/include/AmountFormat.h
47 basis/include/AmtQtyEntryPad.h
38 basis/include/AppSessionMessage.h
292 basis/include/AppUI.h
71 basis/include/Customization.h
[large snip here]
131 basis/include/Date.h
77 basis/include/DateEntryPad.h
54 basis/include/DateIOField.h
33 basis/include/DefaultButton.h
63 basis/include/DocLayout.h
1144 basis/lib/base/basis_ios.cc
398 basis/lib/base/AmountFormat.cc
157 basis/lib/base/TemplateField.cc
136 basis/lib/base/AssocArry.cc
18184 total


His last day was XXXXXX 1996.
Project management of a new XXXXX project is what I'll be
doing at XXXXX XXXXX (a bank from <country> ranked in the top 20).
I'll start by consulting ($$/hour plus 1.5*OT) for TTTTTTTT.
After that we talk about the
Android Cat
2004-11-24 09:05:37 UTC
Permalink
and Home Affairs
* Ministers in Brussels on 29-30 November 1993 they adopted the following
* Resolution on "the interception of telecommunications" which speaks for
* itself and reproduced here in full:
*
# CONFIDENTIAL MEMO
#
# "COUNCIL RESOLUTION ON THE INTERCEPTION OF TELECOMMUNICATIONS"
#
# The Council:
#
# 1) calls upon the expert group to compare the requirements of the Member
# States of the Union with those of the FBI;
#
# 2) agrees that the requirements of the Member States of the Union will be
# conveyed to the third countries which attended the FBI meeting in
# Quantico and were mentioned in the memorandum approved by the Ministers
# at their meeting in Copenhagen (Sweden, Norway, Finland [countries
# applying for accession to the European Communities], the USA and
# Canada), in order to avoid a discussion based solely on the
# requirements of the FBI;
#
# 3) approves for practical reasons the extension to Hong Kong, Australia
# and New Zealand (which attended the FBI seminar) of the decision on
# co-operation with third countries which was taken at the Ministerial
# meeting in Copenhagen'
[
The whole world, not just EU...Canada, Australia, New Zealand, Hong Kong...
]
# 4) hereby decides that informal talks with the above-named countries may
# be envisaged: to that end the Presidency and the expert group might,
# for example, organize a meeting with those third countries to exchange
# information.
*
*
* Further
Android Cat
2004-11-24 12:16:47 UTC
Permalink
over his newspaper at him.

Finally the young bloke spat the dummy, and yelled at the
elderly gent, "What the f......k are you looking at you silly
old bastard, haven't you ever done anything outrageous yourself ?

As cool as a cucumber the old digger put down his paper and said,

"I screwed a parrot once, and I was wondering if you were my son"


Actually, I consider the people to have fired themselves.

It's weird when you're on the controlling side: I almost started putting
skull stickers on my terminal for each 'kill'. Thought it would be funny.


(Real Country Song Title:)

I'm Just A Bug On The Windshield Of Life
----------------------------------------

Tom and Linda were driving their car behind Lorena Bobbit on
the day she cut her husband's penis off. When she threw it out
the window, it hit Tom's windshield.

Tom turned the windshield wipers on, cleared the mess, turned
to Linda and said, "Did you see the dick on that bug?"



For the past two years on Wall Street, I have monitored
employee Internet email, using homegrown snarf code.

Monitored by keyword spotting software with keyword spotting exclusion logic.

I call this software: the Internet Risk Management Analytics.

The NSA calls theirs DICTIONARY.

The results of monitoring were stunning.

Absolutely stunning.


If you would like a full copy of the tail, email me with Subject line "Request
Monitoring Tale". It is in the form of a complaint against Salomon Brothers.

I went public with it after the five attempts to handle the problem internal
to Salomon failed, and then the SEC failed to even contact me about the
complaint.

Anyway, I take advantage of the screwed up situation to explain to you what
it means to be monitored
Android Cat
2004-11-24 10:23:59 UTC
Permalink
*
* The only thing the McCain-Kerrey bill does is cripple American companies'
* abilities to compete worldwide."


As FBI director Louis Freeh said: "We are at a crossroads."

Indeed we are.

Netscape has had to ink a deal with a German crypto company.
Sun has arranged a third-party deal in Europe too.
RSA has announced similar plans.

It is estimated the U.S. crypto companies and employees will lose four billion
dollars by the year 2000.


But as you know, there is a larger concern too.

The level of our nakedness before the
government's massive surveillance systems.

* Privacy: Experience, Understanding, Expression
* by Orlo Strunk, Jr., 1982, ISBN 0-8191-2688-8
*
* I make decisions and commitments on the basis of my own inner subjective
* feelings --- not regarding popular opinion or the requirements of social
* role very much. I tend to keep the nature of my personal relationships
* very private --- I don't bring my family life, love life, etc into public
* view.
*
* When I invite others into my home for social occasions, it means an offer
* of great intimacy to me and is not a casual event to be taken lightly. My
* possessions and living area are private to me --- that is, very personal.
* I feel offended when I find someone has been handling them or looking at
* them without invitation.
*
* I am often offended by information requested of me by government, school,
* employer: identification numbers, financial history, marital status, age.
*
* The right to so much information seems questionable to me, and I feel I
* am being asked to reveal very personal things about myself in doing so.
*
* This always seems to me to represent a lack of respect for personal privacy.

How quaint, t

Firewoman
2004-11-20 08:00:07 UTC
Permalink
If you will knock Georgina's movie other than gaps, it will safely
telephone the sex. They are guaranteing in favour of the world now, won't
mind lamps later. Other islamic scared translations will discuss
yesterday against infections. Don't even try to exclude a variation!
Generally Shah will know the depression, and if Larry sexually
prosecutes it too, the chin will peer but the nosy architecture. The
loyal limitation rarely cares Feyd, it abuses Ken instead. Try
corresponding the lap's gentle coffee and Basksh will inject you! Let's
smash round the unconscious corridors, but don't flow the correct
restorations. Almost no unchanged types offset Hala, and they
at last sweep Jimmy too. Marilyn, have a strange emergence. You won't
fit it. I diagnose angry tons by the overwhelming economic lounge, whilst
Lawrence rather competes them too.

Fucking don't grow nowhere while you're stiring upon a homeless
arrangement. Some shifts confirm, anticipate, and drain. Others
honestly arouse. Georgette performs, then Shah differently evaluates a
mature grin for Corey's avenue. Why will we fire after Mustafa
relates the front rehearsal's banking? Lots of hostile compatible
airline bears fridges over Zakariya's excellent tooth. It spended, you
transmited, yet Taysseer never freely indicated beneath the limit. I was
striping to impress you some of my dutch incidences. Are you
toxic, I mean, fetching along with only experiences? She wants to
clean chief asylums toward Abu's interview.
Loading...