From: attila@primenet.com
To: cypherpunks <cypherpunks@toad.com>
Message Hash: c7dc38029513a0e753de8cc1456053feadd7fe80bbfd1e81667eb78263db4c37
Message ID: <199611291933.MAA05426@infowest.com>
Reply To: N/A
UTC Datetime: 1996-11-29 19:33:02 UTC
Raw Date: Fri, 29 Nov 1996 11:33:02 -0800 (PST)
From: attila@primenet.com
Date: Fri, 29 Nov 1996 11:33:02 -0800 (PST)
To: cypherpunks <cypherpunks@toad.com>
Subject: denial of service and government rights
Message-ID: <199611291933.MAA05426@infowest.com>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
- ----------------------------------------------------------------------
read the last line. the usual rules of evidence which give
the feds the right to anything they well please --constitutional
or not! if seizure of a victims property can by obtained a
search and sieze warrant for the victimized "object," a whole
new mode of regulation has begun.
all the government will do to suppress sites as they please,
is to initiate a few attacks themselves --and they will.
I got tired of paying Lexus $150 for idle months after dumping
West for almost $500/month --otherwise I would run down the Feds
kangaroo ruling which seems to grant them this absurd right.
Several on the list are still maintaining accounts... ?
====== begin forwarded text ======
Computer Attacks Show New Patterns
The major trends in computer break-ins involve denial of service
and data-driven attacks, says a Department of Justice lawyer.
Denial of service occurs when an attacker "bombs" an Internet
service provider with so many e-mail messages that the server
becomes overloaded and shuts down. Data-driven attacks occur when
a virus program is disguised as a data-only file. The file can be
hidden in a Java program on a Web page, and when a visitor clicks
on the site, he or she unwittingly downloads the virus. A computer
crime consultant with SAIC warns that these attacks can be launched
on an innocent party's Web server, but once that happens, the server
can become the subject of a wiretap and a search warrant. "The title
of your computer vests with the government as soon as a hacker uses
it to commit a crime," he says.
[BNA Daily Report for Executives 25 Nov 96 A20]
====== end forwarded text ======
- --
"In nature, stupidity gets you killed.
In the workplace, it gets you promoted.
In politics, it gets you re-elected."
--attila
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: Encrypted with 2.6.3i. Requires 2.6 or later.
iQCVAwUBMp83lr04kQrCC2kFAQFYuAP/bLbraU6rFFLQZpFfsvxiGrbm7W26p3t9
GffgoN/LA6OBqIEUpAdPxGoVqco7RDpHHprhObEV4MorR3BsK6pl5EVNbc3Xp7OC
pxFThx0O08bscdmVBSYAUsU2hXMuW2AiuAkxBwCRdaG0bxswr97JQI9ye+pjKTPw
cARrd7QLmz4=
=vUe3
-----END PGP SIGNATURE-----
Return to November 1996
Return to “attila@primenet.com”
1996-11-29 (Fri, 29 Nov 1996 11:33:02 -0800 (PST)) - denial of service and government rights - attila@primenet.com