From: fortune.bruce on 18 Apr 2008 23:22 o Government Steamroller o Feds' Wacky Pro-GAK Logic - Business Will Demand It - To Safeguard Your Privacy * C-SPAN [U.S. Congressional television coverage], Friday June 20, 1997 * Marc Andreessen, Netscape Co-founder * * "The McCain-Kerrey bill is completely flawed. Unlimited strength crypto * has been available for years worldwide over the Internet and from some * companies. Terrorists and other criminals already have it. * * The genie is out of the bottle. * * The only thing the McCain-Kerrey bill does is cripple American companies' * abilities to compete worldwide." As FBI director Louis Freeh said: "We are at a crossroads." Indeed we are. Netscape has had to ink a deal with a German crypto company. Sun has arranged a third-party deal in Europe too. RSA has announced similar plans. It is estimated the U.S. crypto companies and employees will lose four billion dollars by the year 2000. But as you know, there is a larger concern too. The level of our nakedness before the government's massive surveillance systems. * Privacy: Experience, Understanding, Expression * by Orlo Strunk, Jr., 1982, ISBN 0-8191-2688-8 * * I make decisions and commitments on the basis of my own inner subjective * feelings --- not regarding popular opinion or the requirements of social * role very much. I tend to keep the nature of my personal relationships * very private --- I don't bring my family life, love life, etc into public * view. * * When I invite others into my home for social occasions, it means an of
From: Pubkeybreaker on 18 Apr 2008 22:23 secure storage backup. Several authorized people can have a copy of the key, and they can each use their own password to get access to the key. The key is backed up not only by being on several different machines, it is also backed up in the off-line backups for these machines. After JUST ONE WEEK, you'll have 24 total copies of the key (3 + 3*7). After the first month: 214 copies. The government somehow thinks you'll clamor for THEM to backup your key by giving them a copy of the key, and if you lose all of yours... contact the Federal Secretary of Lost Keys. And for this great benefit, they want you to give them Key Recovery access to your cryptographic key. We know what Key Recovery means... By the way, the Government is restricting *communications* products, which use public key cryptography. BY DEFINITION the SENDER will NEVER expect to decrypt the traffic once they've encrypted it; that's the basis for public key cryptography. That's how it works mathematically. By design. So this "spare key" argument makes no sense whatsoever. I shudder to think that most Americans will not understand these admittedly technocratic basic details of computer systems and cryptography. If they knew, they would be STUNNED that our leaders would lie so boldly to us, including Mr. Kantor, to protect ECHELON. That the public would misunderstand Kantor and Clinton to think they are offering a "reasonable compromise"...even though what is actually happening is our government demanding you lose all right to privacy, that we must give the government a copy of our personal security key. ****************************************************************************** ****************************************************************************** *****************************************************
From: Matthew T. Russotto on 18 Apr 2008 21:27 had to ink a deal with a German crypto company. Sun has arranged a third-party deal in Europe too. RSA has announced similar plans. It is estimated the U.S. crypto companies and employees will lose four billion dollars by the year 2000. But as you know, there is a larger concern too. The level of our nakedness before the government's massive surveillance systems. * Privacy: Experience, Understanding, Expression * by Orlo Strunk, Jr., 1982, ISBN 0-8191-2688-8 * * I make decisions and commitments on the basis of my own inner subjective * feelings --- not regarding popular opinion or the requirements of social * role very much. I tend to keep the nature of my personal relationships * very private --- I don't bring my family life, love life, etc into public * view. * * When I invite others into my home for social occasions, it means an offer * of great intimacy to me and is not a casual event to be taken lightly. My * possessions and living area are private to me --- that is, very personal. * I feel offended when I find someone has been handling them or looking at * them without invitation. * * I am often offended by information requested of me by government, school, * employer: identification n
From: Rotwang on 18 Apr 2008 22:48 and did radar and firing-feedback mechanisms for the U.S. in World War II. Cybernetics describes the complex of sciences dealing with communication and control in the living organism AND in the machine. Its application is sometimes called operations research. I personally rank Norbert Wiener above Albert Einstein. Operations research is a difficult discipline --- I certainly don't understand it --- but when it was desperately needed during World War II, the U.S. Dept. of War went for it gung-ho, rightfully. Signals intelligence (SIGINT) is the first step...the NSA grew out of these wartime operations research efforts. To seek out information from noise, then act on the information. Target accuracy for precision high altitude bombing requires a complex feedback mechanism to control deployment (pre-GPS WW II). * My dad: * * Norden bombsights revolutionized aerial bombing. * * They were so accurate we stopped putting explosives * in the bombs and just aimed for people. Communications, Command and Control. The above wasn't really the best example of OR, but I did get to quote my dad again. ;-) * "The Future of War - Power, Technology, and American World Dominance in * the 21st Century", by George & Meredith Friedman, 1996, ISBN 0-517-70403-X * * A discipline named operations research had begun to develop prior to World * War II that aspired to use quantitative methodo
From: tchow on 18 Apr 2008 20:57
where > I met an okay looking girl with a smokin' body. To shorten the story, we > go to her place at 60th St. between Park and Lex. All night she kept > bugging me about not having any idea who she was. So right when we're > getting naked she finally tells me: she is Kurt Russel's little sister. > Of course I thought she was pulling my leg, but she pulls a photo book > out and sure enough, she is Kurt Russel's little sister! I got her phone > number, but boy she is a big LOSER. This email didn't contain his age, yet I knew it and many other things about him simply from collecting them over time. I had no special need to do so, but found it could add important detail to a security incident report. As previously shown, for an incident report on someone working on their own job within the firm I compared the capabilities of the code he sent out to his own job description which he transmitted in his resume many months prior. Why waste information that's just flying by for the taking? Care for a fun conspiracy theory? If I were pro-ECHELON, I would monitor all the Senators and ALL their staff AND all their families. That's ju |