1998-09-09 - usa-v-cej-wc.htm (fwd)

Header Data

From: Jim Choate <ravage@EINSTEIN.ssz.com>
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Message Hash: 963463ba745c66cf2292b9d934812ced4e9bcfafd8ccb198d0df48d528fbf4aa
Message ID: <199809090053.TAA12423@einstein.ssz.com>
Reply To: N/A
UTC Datetime: 1998-09-09 00:40:57 UTC
Raw Date: Wed, 9 Sep 1998 08:40:57 +0800

Raw message

From: Jim Choate <ravage@EINSTEIN.ssz.com>
Date: Wed, 9 Sep 1998 08:40:57 +0800
To: cypherpunks@EINSTEIN.ssz.com (Cypherpunks Distributed Remailer)
Subject: usa-v-cej-wc.htm (fwd)
Message-ID: <199809090053.TAA12423@einstein.ssz.com>
MIME-Version: 1.0
Content-Type: text



Notice: mucho text deleted.

Forwarded message:

> X-within-URL: http://jya.com/usa-v-cej-wc.htm

>    criminal threats to kill, injure, obstruct, impede, threaten and
>    intimidate IRS

>    and other Government employees. I have also conducted numerous
>    investigations involving the use of computers and the Internet. Since

>    Western District of Washington. In the investigation of Mr. Bell, it
>    was discovered that he had posted a plan (titled "Assassination
>    Politics") on the Internet, offering users of the Internet a method
>    for anonymously funding the assassinations of IRS and other Government

>    Internet group known as the "Cypherpunks." During the investigation of

This guy has experience with the Internet and doesn't know the difference
between a group and a mailing list, what a maroon.

>    Bell I noted that Bell exchanged both private and public e-mail
>    messages with an unidentified person using the name "Toto."

Implying Bell was under surveillance.

>    residence. Shortly thereafter, a member of the Cypherpunks group
>    stated via the Internet that he had obtained a copy of the warrant and
>    return, and publicly posted them on the Internet.

And the point is?

>    Bell was arrested and charged with Corruptly Obstructing and Impeding

So I can non-corruptly obstruct and impede?

>    4. On June 23, 1997, an anonymous message was posted to the
>    Cypherpunks Internet mailing list. [A "mailing list" consists of the

Well, finaly got the terms right.

>    5. Based on my training and experience, I know that "Bot" is a slang
>    term for an automated computer program. I also know that "e$" and
>    "eCa$h" are slang terms for electronic or digital cash, which was a
...
>    maker or indorser [as written]. [By analogy, digital cash is like a
>    digital "poker chip" issued by a particular casino.]

Oh well, I knew he couldn't keep it straight.

>    6. On September 4, 1997, a second message involving "Dead Lucky" was
>    anonymously posted to the Cypherpunks group. This message stated in

This guy keeps using 'group' instead of 'mailing list', there is the
potential implication of conspiracy here...I wouldn't be surprised if just
about all of us weren't under surveillance at this point.

>    8. On December 9, 1997, an anonymous message was posted to the
>    Cypherpunks Internet mail group with the subject listed as "Encrypted
>    InterNet DEATH THREAT!!! / ATTN: Ninth District Judges / PASSWORD:
>    sog"[.] The body of the message was encrypted with the publicly
>    available encryption software PGP, and was initially unreadable. Using
>    PGP software and the password shown in the subject line of the
>    message, I was able to decrypt the message, which contained a
>    rambling, five-page statement, including the following:

>      I can also be tied into Jim Bell's Worldwide Conspiracy to
>      assassinate government authorities, through my implementation of an
>      Assassination Bot ..."

See I told you there was a conspiracy buried in there somewhere!

>    9. I noted that this message contained a PGP digital signature. From
>    my training and experience, I am aware that this digital signature is
>    used as a way to authenticate digital documents to make sure that they
>    are authored by the purported author and that no one has tampered with
>    them. When I checked the signature using only PGP software, the PGP
>    program was unable to identify it.

>    Only July 1, 1998, Royal Canadian
>    Mounted Police (RCMP) Investigator Steve Foster provided me with a PGP
>    "Secret Key Ring" which he stated he had obtained from a computer
>    which Canadian Customs authorities had seized from an individual by
>    the name of CARL EDWARD JOHNSON. [A "secret key ring" is a
>    user-generated code which allows for the encryption (and later
>    authentication) of computer-generated documents.] When I checked the
>    digital signature on the Internet death threat using the PGP software
>    and JOHNSON'S secret key ring, the computer identified the signature
>    as one of the signature keys stored in JOHNSON'S computer. Because
>    both the "private" and "public" portions of the "key" were stored on
>    JOHNSON'S computer, the message can be authenticated as having been
>    generated by the person who possessed this "secret key" and knew the
>    correct password. In other words, only the person possessing the
>    secret key found on JOHNSON'S computer could have generated the "death
>    threat" message.

>    10. I have also spoken by phone with Special Agent Jeremy Sheridan of
>    the United States Secret Service. Sheridan told me that on July 31,
>    1998, he located and interviewed Carl JOHNSON at 1800 West Magee, in
>    Tucson, Arizona. The address belongs to a Linda Reed, who, according
>    to Canadian police authorities, is a friend of JOHNSON'S. During this
>    interview JOHNSON admitted that he often wrote on the Internet and
>    among the names he used were Toto, C.J. Parker, and TruthMonger.
>    Johnson also stated that he had been using the Internet account of
>    Linda Reed. Sheridan showed JOHNSON a decrypted copy of the December
>    9, 1997 Internet message entitled "Encrypted InterNet DEATH THREAT!!!
>    / ATTN: Ninth district Court Judges / PASSWORD: sog." JOHNSON
>    acknowledge that he wrote it. JOHNSON also stated that he had
>    significant psychological problems.

Probably not a wise move, don't know about psychological problems but it
certainly demonstrates a lack of intelligence.

>    bomb that was discovered in the basement of the Estevan courthouse on
>    June 3, 1998. Block advised me that Carl JOHNSON has been formally
>    charged with placing the bomb and that a warrant for his arrest has
>    been issued in Canada. Block advised me that he believes that JOHNSON
>    fled to the United States after placing the bomb in the Estevan
>    courthouse.

That's impressive if true.

>    15. On June 10, 1998, an anonymous message was posted to the
>    Cypherpunks Internet group. In the message, it is stated that the
>    bomber "placed the bomb before embarking on a middle-leg of the

So that's why he came to Austin?


    ____________________________________________________________________

                            The seeker is a finder.

                                     Ancient Persian Proverb

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------





Thread