Re: JED II Manifesto
From
"Big (Bug Brother) Band" <bigband@bugbrother.com>
Date
Sun, 16 Jul 2000 17:51:36 +0200
[: hacktivism :]
b!
--
The Manifesto : I quite remember how Phil Zimerman explained why to
use PGP, his texts were so much simple, and well-written, why would
JEDII launch another ??? Just have to cut'n paste a digest, nope ?
But the buzz can't be effective only with an explanation of How
To, & why, use cryptography (PGP, and stegano, remailers, etc.),
JEDII needs also to be fun, or scary, like JEDI, in the aim to
be forwarded from people to people.
Another point would be to focus on the recent report made by Duncan
Campbell and Paul Lashmar : "Revealed : 30 more nations with spy
stations" (see http://cryptome.org/echelon-30.htm). Echelon is only
one (small) part of this Global Surveillance. JEDII could focus on
all those threats, i.e. update JEDI and engage people to use
crypto, as France, Germany, Switzerland, Holland and Denmark have
their own eavesdropping programs. A summary of those international
threats, country per country, with relevant links, could be
effective.
The buzz could also be some kind of Jim Warren's interpretation of
the feb's DDoS attack :
> On January 27th, Clinton said he wants to make
> electronic "law enforcement" a high priority, in his
> State of the Union speech.
>
> By January 30th, the *always*-silent National Security
> Agency suddenly *alleges* very publicly, that its main
> computers had inexplicably crashed from January 24th to the 28th.
>
> Escalating the issue, in the first week of February,
> Clinton's budget proposes to spend $240-million to
> massively expand his undetectable, at-a-keystroke,
> remote wiretapping facilities, to be able to secretly
> snoop on any phone in the nation.
& then came the DDoS attacks.
see
http://listserv.syr.edu/scripts/wa.exe?A2=ind0002&L=foi-l&amp;F=&S=&P=9484
http://www.2600.com/news/2000/0209.html
http://www.wired.com/news/politics/0,1283,34285,00.html
http://www.cnn.com/2000/TECH/computing/02/09/cyber.attacks.02/
As we know that electronic eavesdropping don't focus on "words",
like JEDI said, but on syntaxic analysis (+ many other things :),
JEDII could propose one or more texts of this kind. JEDI
proposed a special program designed to create a random list of
eavesdropped words, it could also be designed to propose a creation
of random texts, in ROT13 (+ translation ?) or anything else.
==================?)
bb! U, G° brother !)
Big
http://www.bugbrother.com
mailto:bigband@bugbrother.com
[: hacktivism :]
[: for unsubscribe instructions or list info consult the list FAQ :]
[: http://hacktivism.tao.ca/ :]