Cryptome | |
MAY 1999 |
"Your letter should discuss Carl's physical and emotional strengths; how it is that his artistic genius caused him to offend authorities; that Carl has satirized official buffoonery to show that unless ridiculed the authorities will suffer overseriousness in the future; why long listening to courtroom drone requires satire to cure official mindnumb. Since Judge Bryan has rightly concluded that Carl is a creator of exceptionally rude art, the appropriate sentence is for Carl to perform public tanning of the WA-WA perps' backsides to leatherize thinskinned intolerance."
-- Carl Johnson Pre-Sentence Input, May 12, 1999
"The CEO of the company that makes the voice print and word identification systems for the NSA proudly told me his company's products can perform word recognition in 120 simultaneous languages."
-- Anonymous, NSA Word Recognition Technology, May 20, 1999
"When I was at the ADIJ conference in Paris last October, the star of the conference was a judge of the Court of Appeals of Évora, Portugual, Francisco Bruto da Costa. He publishes his opinions online at http://tre.pt/welcom1.html. Everything he said was so right on it was sort of spooky, like how did he slip through the cracks to understand the power of the Web? He talked about the efficiency of placing his opinions online in 30 minutes, in contrast to the bureaucracy of the Portuguese Justice Department which can take 1 to 2 years to publish traditional case law books. I nominate Judge da Costa as the world leader in judicial technology."
-- Brad Hillis, Justice Web, May 20, 1999
"It became apparent that the Conference was determined to recommend the Uniform Computer Information Transaction Act for final approval in July despite concerns from many sectors regarding its suitability for enactment. These concerns have been aired before by members and observers, and on Internet discussion lists, as well as by software and other computer science enterprises and professional organizations, law professors, and editorial writers. The persistent din of these concerns has contributed significantly to our decision to decline the invitation to participate as advisors."
-- David Bartlett, Amy Boss, David Rice, Uniform Computer Information Transaction Act, May 7, 1999
"That both Defendants Mrs. J. Cox Slinkman and Prince George's County Police Lt. Joseph E. Cox, a manslayer who practices the martial arts and the use of deadly force, did plan, scheme and execute a conspiracy to obtain confidential and highly sensitive electronic messages from the Plaintiffs secure electronic messaging mailbox and thereby committed a felony in the State of Maryland."
-- Joseph Slinkman, Slinkman vs. Prince George's County, MD et al, April 29, 1999
"Export control policies without a multilateral approach have little chance of success. Agreement, by the Wassenaar members, to close the loophole for mass market encryption products is a strong indication that other countries are beginning to share our public safety and national security concerns. Contrary to what many people thought two years ago, we have found that most major encryption producing countries are interested in developing a harmonized international approach to encryption controls. With respect to H.R.850, the Administration opposes this legislation as we did its predecessor in the last Congress. The bill proposes export liberalization far beyond what the Administration can entertain and which would be contrary to our international export control obligations."
-- BXA's William Reinsch, Encryption: Security in a High Tech Era, May 18, 1999 (offsite)
"It is our perception that inadequate political control has been exercised over the development and determination of cryptography policy. The policy agenda has been allowed to drift for too long. The DTI originally intended to legislate in order to control the use of cryptography in the UK, by means of key escrow. That intention would now appear to have changed. We believe it is essential that every measure included in the forthcoming Electronic Commerce Bill is designed to facilitate rather than restrict electronic commerce and that this should be the criterion by which Parliament judges the Bill. We recommend that the Government consider the case for a review of the rationale for the continuation of export controls on cryptographic products, in the light of their widespread availability, and the procedures by which such controls are implemented. "
-- UK Parliament, UK Cryptography Policy, May 18, 1999 (offsite)
cej051299.htm Carl Johnson Pre-Sentence Input May 20, 1999 nsa-voice.htm NSA Word Recognition Technology May 20, 1999 justice-web.htm Justice Web May 20, 1999 ucita-hit.htm Uniform Computer Information Transaction Act May 20, 1999 slinkman-v-pg.htm Slinkman vs. Prince George's County, MD et al May 20, 1999 au-spy.htm Australian Spy On-Line May 19, 1999 crypto-kr.htm Korean Crypto Policy May 19, 1999 mi6-true.htm Is the MI6 Spy List a True List? May 19, 1999 O f f s i t e ( M o r e ) Bonk House Committee Hammers GAK USA /JM May 20, 1999 GAK DOJ DOJ: Opposition of the Administration to HR 850 May 20, 1999 GAK BXA BXA: Encryption: Security in a High Tech Era May 20, 1999 CCS Security Source Catalog /DC May 19, 1999 Redhands SOURCES Reports on China Spying /DSO May 19, 1999 UK SEC UK Secure Electronic Commerce Report /CB May 19, 1999 ______________________________________________________________________________________ cia-hide.htm House Provides More Cover for CIA Crimes May 18, 1999 hr1555-talk.txt Intelligence Authorization Action for FY2000 May 18, 1999 prc-how.htm How To Get the China Spy Report May 18, 1999 pml082798.htm Dysfunctional Dual Use Technology Safeguards May 18, 1999 china-sci.htm Senate Reports on PRC Satellites and Lobbying May 18, 1999 pecsenc051499.htm PECSENC Meeting May 14, 1999 May 17, 1999 de-cu-snoop.htm German/Cuban Snooping May 17, 1999 cg051599.htm Crypto-Gram May 15, 1999 May 16, 1999 drpp-v.pdf Visa Smart Card Protection Profile (PDF 320K) May 16, 1999 mi6-list.htm List of MI6 Officers May 13, 1999 fac051399.txt Cuban Assets Control Regulations May 13, 1999 bxa051399.txt Relaxed Exports to Cuba May 13, 1999 dea051399.txt DEA Chemical Surveillance List May 13, 1999 pecsenc-up.htm Updated Agenda for PECSENC Meet May 14 May 13, 1999 mi6-rt.gz Richard Tomlinson's GeoCities Web Site May 12, 1999 mi6-les.htm Were MI6 Spies Named on the Net? May 12, 1999 rfurl-dc.htm Request for URL of US MI6 Web Site May 12, 1999 dos051299.txt State Dept On Access to National Security Info May 12, 1999 dod-pki.htm Defense Dept Pushes Ahead with PKI May 11, 1999 nsa-bot.htm The NSA Bot May 10, 1999 bxa-push.htm BXA Pushes Export Decontrols May 10, 1999 bernstein-bias.htm Bizarre Bernstein Bias May 10, 1999 bernstein-doj.htm Department of Justice on Bernstein Ruling May 10, 1999 ic2000-dc.htm Echelon: Interception Capabilities 2000 May 10, 1999 fbi051099.txt Access to Criminal Justice Information May 10, 1999 a51-pi.htm A5/1 Pedagogical Implementation May 10, 1999 nsa-wiretap98.htm Ex-NSA Counsel Baker on Wiretap98 May 8, 1999 sitesec.htm JYA Site Secrets May 8, 1999 hr106-117-p1.txt House Report on SAFE Crypto Bill May 7, 1999 bernstein-bxa.htm BXA Statement on Bernstein Ruling May 7, 1999 bernstein-eff.htm EFF et al on Bernstein Ruling May 7, 1999 crypto-free.htm International Cryptography Freedom May 6, 1999 bernstein-9th.htm Bernstein-v-USDOJ - 9th Circuit Opinion May 6, 1999 bernstein-win.htm Bernstein: Crypto Export Regs Unconstitutional May 6, 1999 blu114-yu.htm Photos: BLU-114 Carbon Filament Bombs May 6, 1999 wiretap98.htm US Wiretap Report for 1998 May 5, 1999 fo99-413.htm The Confidentiality of Unencrypted E-Mail May 5, 1999 tmd050499.htm Theater Missile Defense for Asia-Pacific Region May 5, 1999 cyber-resist.htm Cyberesistance Fighter: Paul Virilio May 5, 1999 nij050599.txt Solicitation for Safe School Technologies menwith-poc.htm Menwith Hill's Prisoner of Conscience May 5, 1999 twinkle.htm Shamir's TWINKLE May 5, 1999 cg011299.txt Home ISDN for FCC Commishes May 4, 1999 hooley-crypto.txt Rep. Hooley on Crypto/HiTech Exports May 4, 1999 bxa050499.txt National Security Probe of Oil Imports May 4, 1999 iw-ct.htm Info Warfare, Cyber-Terrorism May 3, 1999 3des-java.htm Triple-DES in the Schlumberger Java Card May 2, 1999 tsns.htm Technology, Society, and National Security May 1, 1999 Ilets-dc2.htm The Hidden Hand of ILETS May 1, 1999 O f f s i t e GSM-RU GSM Surveillance Team /DH May 18, 1999 pecsenc.htm A-1 Notes on PECSENC Meeting May 14, 1999 /AG May 17, 1999 IYAS9YAS Skivvy Niners (Goodbuddy Echelon Ops/Links) May 12, 1999 Fedz Spaz Mitnick Lawyer Facing Fed Contempt Charge /TW May 10, 1999 McGoo The Belly of Spaceship National Security May 8, 1999 PostViet Post-Viet Electronic Intercept Aircraft May 8, 1999 SEMA Special Electronic Mission Aircraft May 8, 1999 USAFSS USAF Security Service Webring May 7, 1999 CHIXnet RAF Chicksands Net May 7, 1999 Chicksands RAF Chicksands Alumni Notice Bpard /PG May 7, 1999 F83 Menwith Hill Postings - USASA Field Station /PG May 7, 1999 Dan-News4 Wired 2 on Bernstein Ruling May 7, 1999 Dan-News3 Wired on Bernstein Ruling May 7, 1999 Dan-News2 The New York Times on Bernstein Ruling May 7, 1999 Dan-News1 The Recorder/Cal Law on Bernstein Ruling May 7, 1999 Bernstein99 Froomkin Comments on Bernstein Ruling (FL's Hot) May 6, 1999 TWINKLE Shamir's Factoring Device /PT May 4, 1999 TWINKLE-QA Q & A, Shamir's Factoring Device /PT May 4, 1999 DD-3DES Denning on 3DES Crack /DD May 4, 1999 DD-SAFE Denning Testimony on SAFE Crypto Bill /DD May 4, 1999 ICI-99 Crypto Legal and Technological Developments /DD May 4, 1999 IW-CT Protecting IT Systems from Cyber Crime /BR May 3, 1999 EC99 Eurocrypt '99 Program May 2, 1999 Hack Mach Adi Shamir to Report on PK Cracker /MM May 2, 1999 P3 Hack Pentium 3 Ser. No. Exploit Page /JM May 1, 1999 Menwith Hill Perfectly Echelon, Extra-Legal /MC May 1, 1999 TC Trauma Central /HM May 1, 1999nsa-ttfs.htm NSA Technology Transfer Fact Sheets April 30, 1999 fbi-wmd.htm FBI on WMD Combat April 30, 1999 terrorism7.htm U.S. Names Terrorism7 April 30, 1999 keynote-v2.htm KeyNote v2 Trust Management Toolkit Available April 30, 1999 3des-cryptix.htm Triple-DES with the Cryptix Class Library April 30, 1999 lott042999.txt Sen. Lott on E-Commerce Panel April 30, 1999 VA-crypto.txt Virginia Boosts Crypto April 30, 1999 smith-crypto3.txt Rep. Smith on Crypto/Hi Tech Economy April 30, 1999 stu-otp.htm OTP to Improve Security of Cordless Phones April 30, 1999 cia-wmd.htm CIA on WMD Proliferation April 30, 1999 Ilets-dc.htm Intercepting the Internet April 29, 1999 eu-digsig3.htm Latest EU Directive for Electronic Signatures April 29, 1999 net-v-1A.htm The Internet vs. the First Amendment April 28, 1999 bxa042799.txt Crypto Export Panel (PECSENC) Meet April 27, 1999 echelon-ermes.htm Echelon v. Ermes April 25, 1999 pdj-usa-brief.htm Junger v. Daley, et al -- USA Proof Brief April 24, 1999 cej-us-brief.htm Carl Johnson: US Trial Brief April 24, 1999 nsa-pecsenc.htm Ex-DIRNSA to Head PECSENC April 22, 1999 all-sim.htm Simulating Cyber Attacks, Defenses, and More April 22, 1999 faa-seccrit.htm FAA Airport Security Critique April 22, 1999 s854-leahy.txt Sen. Leahy Intros Crypto Bill April 22, 1999 smith-crypto2.txt Rep. Smith on Crypto Export Limits April 22, 1999 dooley-crypto.txt Rep. Dooley on Crypto Export Limits April 22, 1999 nsa-spylink.htm Ex-DIRNSA-Cylink CEO Named to Export Council April 19, 1999 s798.txt The PROTECT Act -- McCain's Crypto Bill April 19, 1999 ofac041699.htm Civil Penalties for Cuba Travel April 19, 1999 cg041599.htm Crypto-Gram 15 April 1999 April 17, 1999 g2-forward.htm G2-Forward Offers Accessible OS Intelligence April 17, 1999 cej-music.htm Music of Carl Johnson, King of Country Porn April 17, 1999 cej-mtd.htm Carl Johnson - Motion to Dismiss Indictment April 17, 1999 cej-day3.htm Day 3 of Washington State Cypherpunk Trial April 15, 1999 jmt040799.htm Jim Thomsen Arrested April 7, 1999 net-not.htm Internet Law Will Protect Criminals? April 6, 1999 nis-error.htm Managing Network Errors To Reduce Accidents April 6, 1999 wmd-panel.htm WMD, Inc. Launched April 6, 1999 cej040399.htm Carl Johnson - Plea, Warning, Indictment, Pro Se April 3, 1999 dod040299.txt Secret S&T Intel Meet April 2, 1999 mccain-crypto.htm McCain/Burns to Introduce Encryption Bill April 1, 1999 bxa033199.txt Kolokol, Batman and Armored Limo Denied Rights April 1, 1999 doe040199.txt Nuclear Safety Plan, Right April 1, 1999 jc040199.txt Judge Bust Guide April 1, 1999 dod040199.txt War: What It's Good For April 1, 1999 O f f s i t e NSA TSD NSA Domestic Technology Transfer Program April 30, 1999 pgt1998 Patterns of Global Terrorism 1998 April 30, 1999 Enfopol19 Global Net Snoop Plan /CB April 29, 1999 NSE Duncan Campbell on CESG/Non-Secret Encryption /DC April 25, 1999 1A Bye Carl Johnson Convicted April 24, 1999 NOSI Net-based Open Source Intelligence /7P April 22, 1999 MR989 RAND: Countering the New Terrorism /RH April 22, 1999 bxa041499.htm BXA's Majak on Export of Dual-Use Technologies April 14, 1999 s761.txt Millennium Digital Commerce Act April 14, 1999 protect.htm Senator McCain Introduces Encryption Bill April 14, 1999 cej-day2.htm Day 2 of the CJ vs. Jeff Gordon Show April 14, 1999 bxa041499.txt BXA Secret Meet April 14, 1999 dod041499.txt DIA Secret Meets April 14, 1999 free-swan.htm Linux FreeS/WAN April 14, 1999 crypto-pont.htm New Proposals To Bridge the Encryption Debate April 13, 1999 cia-aoe.htm CIA: Saddam's Best Friend April 13, 1999 bxa041399.txt Proposed Rule for OAS Arms Promotion April 13, 1999 cej-day1.htm Day 1 of the CJ vs. Jeff Gordon Show April 12, 1999 show-trials.htm Show Trials of Carl Johnson and Jim Bell April 12, 1999 Day 4 CJ v JG Free Speech on Trial in Tacoma /DM April 15, 1999 Shazzam Bin Laden's Stealthy Brainwaves /FB April 13, 1999 CIA Hack Taking a Crack at the CIA /ST April 13, 1999 NSA Peek No more top-secret pizza boxes /RA April 13, 1999 Yale Jaw Private Censorship/Perfect Choice /JM April 13, 1999 PGP App PGP Message Shifter Applet /PD April 13, 1999 KS Bash UK PGP Key Signing Party /DC April 13, 1999 FIPR Lib FIPR Consultation Library On E-Comm Prop /GH April 13, 1999 PKI Ops PKI Options for Next-Gen Security /LB April 13, 1999 WAR Biz BXA's Reinsch on the Future of Arms Promotion April 13, 1999
APRIL 1999
Files here may be retrieved also by FTP: ftp://ftp.jya.com/filename.ext Please report bad links: <jy@jya.com> URL is temporary for new item; if not available see GAO archive |
||||
Cryptomb
5 Jan-Mar 1999 |
Cryptomb
4 Jun-Dec 1998 |
Cryptomb
3 Jan-May 1998 |
Cryptomb
2 Jun-Dec 1997 |
Cryptomb
1 To May 1997 |
Jim Thomsen Files | Jim Bell Files | Kevin Mitnick Files | Carl Johnson Files | Al Qaeda Files |
Site Secrets | Fund Junger | Urban Deadline 68-98 | DESIGN-L | Site stats |