From: Risto Lankinen on
and cheerleading
$ jamboree, "And they'd have only one chance to appeal, then we'd kill them
$ within 18 months."

On January 7, 1997, Gingrich introduced H.R. 41, "Drug Importer Death Penalty
Act of 1997", which "mandates that a person convicted of bringing into the
United States '100 usual dosage amounts' of several illicit substances --
including two ounces of marijuana -- be sentenced to federal prison for life
without parole; a second offense brings the death penalty."

# "Dole Calls for Wider Military Role in Fighting Drugs"
# By Katherine Q. Seelye, The New York Times, August 26, 1996
#
# "I want the Military to expand its use of technology, including
# reconnaissance and satellites and area surveillance and listening
# posts...and call the National Guard to move in," said Presidential
# candidate Bob Dole.
#
# "In the Dole Administration, we're going to return to what works. We're
# going to replace the President's inattention to dangerous drugs with a
# clear and forceful policy of zero tolerance."
#
# "That's ZERO TOLERANCE."
#
# "ZERO TOLERANCE for drug smugglers. ZERO TOLERANCE for drug pushers.
# ZERO TOLERANCE for drugs in the workplace and drugs in school. And
# ZERO TOLERANCE for illegal drugs, period."
#
# "ZERO! ZERO! ZERO!"
#
# "We will REDOUBLE our efforts to put drug criminals behind bars."
#
# "We will only appoint judges who will throw them in jail."

Thank Gawd he didn't become President.

* July Fourth, 1997, C-SPAN Congressional Television
*
* Mark Klaas, father of 12-year-old Polly Klaas, who was murdered by a
* repeat-offender that was paroled from prison, said in support of prevention
* programs: "Building more prisons to fight crime is like building more
* cemeteri


From: Pubkeybreaker on
nausea. He weighed only 93 pounds.
*
* However, first as state Attorney General then governor, George Deukmejian
* deliberately refused to carry out the program passed by California
* legislators.

So, elected officials first thwarted the law, and then thwarted the citizens'
direct vote on the matter. What a bunch of...

* "Medical Use of Marijuana To Stay Illegal in Arizona", by Tim Golden
* The New York Times, 4/17/97
*
* Acting together, the Arizona Senate, Legislature and Governor have
* neutralized a citizens' initiative that would have allowed doctors
* to prescribe marijuana to sick or dying patients. It came four days
* after a Federal judge in San Francisco blocked the Clinton administrations
* plan to sanction doctors who recommeded marijuana under the terms of a
* similar initiative in California.
*
* Arizona politicians are allowed to modify the decisions of voters if the
* law is not approved by the majority of all registered voters, not just
* the people who actually voted. [What???] No proposition has ever met that
* criterion.
*
* Arizona voters approved proposition 200 last November by a ratio of 2 to 1.


D


From: S.C.Sprong on
Security numbers before a birth
# certificate will be issued for a newborn.
#
# The Family Support Act of 1988 forces a state to forfeit a portion of
# federal funds if it does not impose the requirement, which is intended
# to lead parents to believe the government will be able to chase them
# down later if they do not support their children.
#
# Ontario, Canada: Each newborn infant will now receive an ID number at
# birth and a plastic ID card to go with it.
#
# Privacy Journal, By Robert Ellis Smith, September 1991 issue
#
# A California taxpayer has successfully filed a tax return without
# providing Social Security numbers for her three children, as required
# by a 1986 federal law, but the IRS is quite happy if nobody knows about
# the case.
#
# The woman claims that the enumeration is a violation of her religious
# beliefs. Like many fundamental Christians, she relies on a Biblical
# passage warning that whoever worships a Satanic beast that issues a mark
# OR NUMBER to all persons will incur the wrath of God.
#
# Initially, the IRS disallowed her claims and child care deductions.
#
# The woman claimed that just because she didn't provide numbers for her
# children did not mean that the children did not exist. An appeals officer
# agreed and overruled the auditor,


From: JSH on
Whitfield Diffie[6]
John Gilmore[7]
Peter G. Neumann[8]
Ronald L. Rivest[9]
Jeffrey I. Schiller[10]
Bruce Schneier[11]

Final Report -- 27 May 1997[12]

Executive Summary

A variety of ``key recovery,'' ``key escrow,'' and ``trusted third-party''
encryption requirements have been suggested in recent years by government
agencies seeking to conduct covert surveillance within the changing environ-
ments brought about by new technologies. This report examines the fundamental
properties of these requirements and attempts to outline the technical risks,
costs, and implications of deploying systems that provide government access to
encryption keys.

The deployment of key-recovery-based encryption infrastructures to meet law
enforcement's stated specifications will result in substantial sacrifices in
security and greatly increased costs to the end-user. Building the secure
c


From: Risto Lankinen on
keyword spotting exclusion logic.

I call this software: the Internet Risk Management Analytics.

The NSA calls theirs DICTIONARY.

The results of monitoring were stunning.

Absolutely stunning.


If you would like a full copy of the tail, email me with Subject line "Request
Monitoring Tale". It is in the form of a complaint against Salomon Brothers.

I went public with it after the five attempts to handle the problem internal
to Salomon failed, and then the SEC failed to even contact me about the
complaint.

Anyway, I take advantage of the screwed up situation to explain to you what
it means to be monitored by powerful keyword monitoring software.

All company names are real.

All people's names in security incident reports are changed, as are any
proprietary data/numbers.

Any personal-personal traffic (the person's own words with outside friends)
is changed so it is not the actual traffic that went across, but it will have
the same visceral-word impact as the original.

Picture yourself inside a company. You are an office worker. Like everyone
else you have a desktop computer. It is on the company network. The company
has an Internet connection. You can send/receive email over the Internet.

Ready?

Ready to keyword monitor roughly seven thousand people?


Driver's Seat
-------- ----

Both sites started with a bang.

The smaller site had two security incidents within the first three hours.

Two different format (Microsoft Access DB, Excel spreadsheet) copies of
employee