Cryptome

  MAY 1999

"Your letter should discuss Carl's physical and emotional strengths; how it is that his artistic genius caused him to offend authorities; that Carl has satirized official buffoonery to show that unless ridiculed the authorities will suffer overseriousness in the future; why long listening to courtroom drone requires satire to cure official mindnumb. Since Judge Bryan has rightly concluded that Carl is a creator of exceptionally rude art, the appropriate sentence is for Carl to perform public tanning of the WA-WA perps' backsides to leatherize thinskinned intolerance."

-- Carl Johnson Pre-Sentence Input, May 12, 1999

"The CEO of the company that makes the voice print and word identification systems for the NSA proudly told me his company's products can perform word recognition in 120 simultaneous languages."

-- Anonymous, NSA Word Recognition Technology, May 20, 1999

"When I was at the ADIJ conference in Paris last October, the star of the conference was a judge of the Court of Appeals of Évora, Portugual, Francisco Bruto da Costa.  He publishes his opinions online at http://tre.pt/welcom1.html.  Everything he said was so right on it was sort of spooky, like how did he slip through the cracks to understand the power of the Web? He talked about the efficiency of placing his opinions online in 30 minutes, in contrast to the bureaucracy of the Portuguese Justice Department which can take 1 to 2 years to publish traditional case law books.  I nominate Judge da Costa as the world leader in judicial technology."

-- Brad Hillis, Justice Web, May 20, 1999

"It became apparent that the Conference was determined to recommend the Uniform Computer Information Transaction Act for final approval in July despite concerns from many sectors regarding its suitability for enactment. These concerns have been aired before by members and observers, and on Internet discussion lists, as well as by software and other computer science enterprises and professional organizations, law professors, and editorial writers. The persistent din of these concerns has contributed significantly to our decision to decline the invitation to participate as advisors."

-- David Bartlett, Amy Boss, David Rice, Uniform Computer Information Transaction Act, May 7, 1999

"That both Defendants Mrs. J. Cox Slinkman and Prince George's County Police Lt. Joseph E. Cox, a manslayer who practices the martial arts and the use of deadly force, did plan, scheme and execute a conspiracy to obtain confidential and highly sensitive electronic messages from the Plaintiff’s secure electronic messaging mailbox and thereby committed a felony in the State of Maryland."

-- Joseph Slinkman, Slinkman vs. Prince George's County, MD et al, April 29, 1999

"Export control policies without a multilateral approach have little chance of success. Agreement, by the Wassenaar members, to close the loophole for mass market encryption products is a strong indication that other countries are beginning to share our public safety and national security concerns. Contrary to what many people thought two years ago, we have found that most major encryption producing countries are interested in developing a harmonized international approach to encryption controls. With respect to H.R.850, the Administration opposes this legislation as we did its predecessor in the last Congress. The bill proposes export liberalization far beyond what the Administration can entertain and which would be contrary to our international export control obligations."

-- BXA's William Reinsch, Encryption: Security in a High Tech Era, May 18, 1999 (offsite)

"It is our perception that inadequate political control has been exercised over the development and determination of cryptography policy. The policy agenda has been allowed to drift for too long. The DTI originally intended to legislate in order to control the use of cryptography in the UK, by means of key escrow. That intention would now appear to have changed. We believe it is essential that every measure included in the forthcoming Electronic Commerce Bill is designed to facilitate rather than restrict electronic commerce and that this should be the criterion by which Parliament judges the Bill. We recommend that the Government consider the case for a review of the rationale for the continuation of export controls on cryptographic products, in the light of their widespread availability, and the procedures by which such controls are implemented. "

-- UK Parliament, UK Cryptography Policy, May 18, 1999 (offsite)
cej051299.htm      Carl Johnson Pre-Sentence Input                   May 20, 1999
nsa-voice.htm      NSA Word Recognition Technology                   May 20, 1999
justice-web.htm    Justice Web                                       May 20, 1999

ucita-hit.htm      Uniform Computer Information Transaction Act      May 20, 1999
slinkman-v-pg.htm  Slinkman vs. Prince George's County, MD et al     May 20, 1999
au-spy.htm         Australian Spy On-Line                            May 19, 1999
crypto-kr.htm      Korean Crypto Policy                              May 19, 1999
mi6-true.htm       Is the MI6 Spy List a True List?                  May 19, 1999


O f f s i t e  ( M o r e )

Bonk               House Committee Hammers GAK USA /JM               May 20, 1999

GAK DOJ            DOJ: Opposition of the Administration to HR 850   May 20, 1999
GAK BXA            BXA: Encryption: Security in a High Tech Era      May 20, 1999
CCS                Security Source Catalog /DC                       May 19, 1999
Redhands           SOURCES Reports on China Spying /DSO              May 19, 1999
UK SEC             UK Secure Electronic Commerce Report /CB          May 19, 1999

______________________________________________________________________________________


cia-hide.htm       House Provides More Cover for CIA Crimes          May 18, 1999
hr1555-talk.txt    Intelligence Authorization Action for FY2000      May 18, 1999
prc-how.htm        How To Get the China Spy Report                   May 18, 1999
pml082798.htm      Dysfunctional Dual Use Technology Safeguards      May 18, 1999

china-sci.htm      Senate Reports on PRC Satellites and Lobbying     May 18, 1999
pecsenc051499.htm  PECSENC Meeting May 14, 1999                      May 17, 1999
de-cu-snoop.htm    German/Cuban Snooping                             May 17, 1999
cg051599.htm       Crypto-Gram May 15, 1999                          May 16, 1999
drpp-v.pdf         Visa Smart Card Protection Profile (PDF 320K)     May 16, 1999

mi6-list.htm       List of MI6 Officers                              May 13, 1999
fac051399.txt      Cuban Assets Control Regulations                  May 13, 1999
bxa051399.txt      Relaxed Exports to Cuba                           May 13, 1999
dea051399.txt      DEA Chemical Surveillance List                    May 13, 1999
pecsenc-up.htm     Updated Agenda for PECSENC Meet May 14            May 13, 1999

mi6-rt.gz          Richard Tomlinson's GeoCities Web Site            May 12, 1999
mi6-les.htm        Were MI6 Spies Named on the Net?                  May 12, 1999
rfurl-dc.htm       Request for URL of US MI6 Web Site                May 12, 1999
dos051299.txt      State Dept On Access to National Security Info    May 12, 1999
dod-pki.htm        Defense Dept Pushes Ahead with PKI                May 11, 1999

nsa-bot.htm        The NSA Bot                                       May 10, 1999
bxa-push.htm       BXA Pushes Export Decontrols                      May 10, 1999
bernstein-bias.htm Bizarre Bernstein Bias                            May 10, 1999
bernstein-doj.htm  Department of Justice on Bernstein Ruling         May 10, 1999
ic2000-dc.htm      Echelon: Interception Capabilities 2000           May 10, 1999

fbi051099.txt      Access to Criminal Justice Information            May 10, 1999
a51-pi.htm         A5/1 Pedagogical Implementation                   May 10, 1999
nsa-wiretap98.htm  Ex-NSA Counsel Baker on Wiretap98                 May 8, 1999
sitesec.htm        JYA Site Secrets                                  May 8, 1999
hr106-117-p1.txt   House Report on SAFE Crypto Bill                  May 7, 1999

bernstein-bxa.htm  BXA Statement on Bernstein Ruling                 May 7, 1999
bernstein-eff.htm  EFF et al on Bernstein Ruling                     May 7, 1999
crypto-free.htm    International Cryptography Freedom                May 6, 1999
bernstein-9th.htm  Bernstein-v-USDOJ - 9th Circuit Opinion           May 6, 1999
bernstein-win.htm  Bernstein: Crypto Export Regs Unconstitutional    May 6, 1999

blu114-yu.htm      Photos: BLU-114 Carbon Filament Bombs             May 6, 1999
wiretap98.htm      US Wiretap Report for 1998                        May 5, 1999
fo99-413.htm       The Confidentiality of Unencrypted E-Mail         May 5, 1999
tmd050499.htm      Theater Missile Defense for Asia-Pacific Region   May 5, 1999
cyber-resist.htm   Cyberesistance Fighter: Paul Virilio              May 5, 1999

nij050599.txt      Solicitation for Safe School Technologies
menwith-poc.htm    Menwith Hill's Prisoner of Conscience             May 5, 1999
twinkle.htm        Shamir's TWINKLE                                  May 5, 1999
cg011299.txt       Home ISDN for FCC Commishes                       May 4, 1999
hooley-crypto.txt  Rep. Hooley on Crypto/HiTech Exports              May 4, 1999

bxa050499.txt      National Security Probe of Oil Imports            May 4, 1999
iw-ct.htm          Info Warfare, Cyber-Terrorism                     May 3, 1999
3des-java.htm      Triple-DES in the Schlumberger Java Card          May 2, 1999
tsns.htm           Technology, Society, and National Security        May 1, 1999
Ilets-dc2.htm      The Hidden Hand of ILETS                          May 1, 1999

O f f s i t e

GSM-RU             GSM Surveillance Team /DH                         May 18, 1999
pecsenc.htm        A-1 Notes on PECSENC Meeting May 14, 1999 /AG     May 17, 1999

IYAS9YAS           Skivvy Niners (Goodbuddy Echelon Ops/Links)       May 12, 1999
Fedz Spaz          Mitnick Lawyer Facing Fed Contempt Charge /TW     May 10, 1999
McGoo              The Belly of Spaceship National Security          May 8, 1999
PostViet           Post-Viet Electronic Intercept Aircraft           May 8, 1999
SEMA               Special Electronic Mission Aircraft               May 8, 1999

USAFSS             USAF Security Service Webring                     May 7, 1999 
CHIXnet            RAF Chicksands Net                                May 7, 1999
Chicksands         RAF Chicksands Alumni Notice Bpard /PG            May 7, 1999
F83                Menwith Hill Postings - USASA Field Station /PG   May 7, 1999
Dan-News4          Wired 2 on Bernstein Ruling                       May 7, 1999

Dan-News3          Wired on Bernstein Ruling                         May 7, 1999
Dan-News2          The New York Times on Bernstein Ruling            May 7, 1999
Dan-News1          The Recorder/Cal Law on Bernstein Ruling          May 7, 1999
Bernstein99        Froomkin Comments on Bernstein Ruling (FL's Hot)  May 6, 1999
TWINKLE            Shamir's Factoring Device /PT                     May 4, 1999

TWINKLE-QA         Q & A, Shamir's Factoring Device /PT              May 4, 1999
DD-3DES            Denning on 3DES Crack /DD                         May 4, 1999
DD-SAFE            Denning Testimony on SAFE Crypto Bill /DD         May 4, 1999
ICI-99             Crypto Legal and Technological Developments /DD   May 4, 1999
IW-CT              Protecting IT Systems from Cyber Crime /BR        May 3, 1999

EC99               Eurocrypt '99 Program                             May 2, 1999
Hack Mach          Adi Shamir to Report on PK Cracker /MM            May 2, 1999
P3 Hack            Pentium 3 Ser. No. Exploit Page /JM               May 1, 1999
Menwith Hill       Perfectly Echelon, Extra-Legal /MC                May 1, 1999
TC                 Trauma Central /HM                                May 1, 1999        



APRIL 1999

nsa-ttfs.htm NSA Technology Transfer Fact Sheets April 30, 1999 fbi-wmd.htm FBI on WMD Combat April 30, 1999 terrorism7.htm U.S. Names Terrorism7 April 30, 1999 keynote-v2.htm KeyNote v2 Trust Management Toolkit Available April 30, 1999 3des-cryptix.htm Triple-DES with the Cryptix Class Library April 30, 1999 lott042999.txt Sen. Lott on E-Commerce Panel April 30, 1999 VA-crypto.txt Virginia Boosts Crypto April 30, 1999 smith-crypto3.txt Rep. Smith on Crypto/Hi Tech Economy April 30, 1999 stu-otp.htm OTP to Improve Security of Cordless Phones April 30, 1999 cia-wmd.htm CIA on WMD Proliferation April 30, 1999 Ilets-dc.htm Intercepting the Internet April 29, 1999 eu-digsig3.htm Latest EU Directive for Electronic Signatures April 29, 1999 net-v-1A.htm The Internet vs. the First Amendment April 28, 1999 bxa042799.txt Crypto Export Panel (PECSENC) Meet April 27, 1999 echelon-ermes.htm Echelon v. Ermes April 25, 1999 pdj-usa-brief.htm Junger v. Daley, et al -- USA Proof Brief April 24, 1999 cej-us-brief.htm Carl Johnson: US Trial Brief April 24, 1999 nsa-pecsenc.htm Ex-DIRNSA to Head PECSENC April 22, 1999 all-sim.htm Simulating Cyber Attacks, Defenses, and More April 22, 1999 faa-seccrit.htm FAA Airport Security Critique April 22, 1999 s854-leahy.txt Sen. Leahy Intros Crypto Bill April 22, 1999 smith-crypto2.txt Rep. Smith on Crypto Export Limits April 22, 1999 dooley-crypto.txt Rep. Dooley on Crypto Export Limits April 22, 1999 nsa-spylink.htm Ex-DIRNSA-Cylink CEO Named to Export Council April 19, 1999 s798.txt The PROTECT Act -- McCain's Crypto Bill April 19, 1999 ofac041699.htm Civil Penalties for Cuba Travel April 19, 1999 cg041599.htm Crypto-Gram 15 April 1999 April 17, 1999 g2-forward.htm G2-Forward Offers Accessible OS Intelligence April 17, 1999 cej-music.htm Music of Carl Johnson, King of Country Porn April 17, 1999 cej-mtd.htm Carl Johnson - Motion to Dismiss Indictment April 17, 1999 cej-day3.htm Day 3 of Washington State Cypherpunk Trial April 15, 1999 jmt040799.htm Jim Thomsen Arrested April 7, 1999 net-not.htm Internet Law Will Protect Criminals? April 6, 1999 nis-error.htm Managing Network Errors To Reduce Accidents April 6, 1999 wmd-panel.htm WMD, Inc. Launched April 6, 1999 cej040399.htm Carl Johnson - Plea, Warning, Indictment, Pro Se April 3, 1999 dod040299.txt Secret S&T Intel Meet April 2, 1999 mccain-crypto.htm McCain/Burns to Introduce Encryption Bill April 1, 1999 bxa033199.txt Kolokol, Batman and Armored Limo Denied Rights April 1, 1999 doe040199.txt Nuclear Safety Plan, Right April 1, 1999 jc040199.txt Judge Bust Guide April 1, 1999 dod040199.txt War: What It's Good For April 1, 1999 O f f s i t e NSA TSD NSA Domestic Technology Transfer Program April 30, 1999 pgt1998 Patterns of Global Terrorism 1998 April 30, 1999 Enfopol19 Global Net Snoop Plan /CB April 29, 1999 NSE Duncan Campbell on CESG/Non-Secret Encryption /DC April 25, 1999 1A Bye Carl Johnson Convicted April 24, 1999 NOSI Net-based Open Source Intelligence /7P April 22, 1999 MR989 RAND: Countering the New Terrorism /RH April 22, 1999 bxa041499.htm BXA's Majak on Export of Dual-Use Technologies April 14, 1999 s761.txt Millennium Digital Commerce Act April 14, 1999 protect.htm Senator McCain Introduces Encryption Bill April 14, 1999 cej-day2.htm Day 2 of the CJ vs. Jeff Gordon Show April 14, 1999 bxa041499.txt BXA Secret Meet April 14, 1999 dod041499.txt DIA Secret Meets April 14, 1999 free-swan.htm Linux FreeS/WAN April 14, 1999 crypto-pont.htm New Proposals To Bridge the Encryption Debate April 13, 1999 cia-aoe.htm CIA: Saddam's Best Friend April 13, 1999 bxa041399.txt Proposed Rule for OAS Arms Promotion April 13, 1999 cej-day1.htm Day 1 of the CJ vs. Jeff Gordon Show April 12, 1999 show-trials.htm Show Trials of Carl Johnson and Jim Bell April 12, 1999 Day 4 CJ v JG Free Speech on Trial in Tacoma /DM April 15, 1999 Shazzam Bin Laden's Stealthy Brainwaves /FB April 13, 1999 CIA Hack Taking a Crack at the CIA /ST April 13, 1999 NSA Peek No more top-secret pizza boxes /RA April 13, 1999 Yale Jaw Private Censorship/Perfect Choice /JM April 13, 1999 PGP App PGP Message Shifter Applet /PD April 13, 1999 KS Bash UK PGP Key Signing Party /DC April 13, 1999 FIPR Lib FIPR Consultation Library On E-Comm Prop /GH April 13, 1999 PKI Ops    PKI Options for Next-Gen Security /LB     April 13, 1999 WAR Biz BXA's Reinsch on the Future of Arms Promotion April 13, 1999


 

Files here may be retrieved also by FTP: ftp://ftp.jya.com/filename.ext

Please report bad links: <jy@jya.com>

URL is temporary for new item; if not available see GAO archive

International Cryptography Freedom

Cryptomb 5
Jan-Mar 1999
Cryptomb 4
Jun-Dec 1998
Cryptomb 3
Jan-May 1998
Cryptomb 2
Jun-Dec 1997
Cryptomb 1
To May 1997
Jim Thomsen Files Jim Bell Files Kevin Mitnick Files Carl Johnson Files Al Qaeda Files
Site Secrets Fund Junger Urban Deadline 68-98 DESIGN-L Site stats

JYA/Urban Deadline