Re: JED II Manifesto

From "Big (Bug Brother) Band" <bigband@bugbrother.com>
Date Sun, 16 Jul 2000 17:51:36 +0200


[: hacktivism :]

b!
--

   The Manifesto : I quite remember how Phil Zimerman explained why to
   use  PGP, his texts were so much simple, and well-written, why would
   JEDII launch another ???  Just have to cut'n paste a digest, nope ?

   But  the  buzz  can't be effective only with an explanation of How
   To,  &  why,  use cryptography (PGP, and stegano, remailers, etc.),
   JEDII  needs  also  to  be  fun,  or scary, like JEDI, in the aim to
   be  forwarded   from  people  to  people.

   Another point would be to focus on the recent report made by Duncan
   Campbell  and  Paul  Lashmar : "Revealed : 30 more nations with spy
   stations" (see http://cryptome.org/echelon-30.htm). Echelon is only
   one  (small) part of this Global Surveillance. JEDII could focus on
   all  those  threats,  i.e.  update  JEDI  and  engage people to use
   crypto,  as  France, Germany, Switzerland, Holland and Denmark have
   their  own eavesdropping programs. A summary of those international
   threats,  country  per  country,  with  relevant  links,  could  be
   effective.

   The  buzz could also be some kind of Jim Warren's interpretation of
   the feb's DDoS attack :
   
> On January 27th, Clinton said he wants to make
> electronic "law enforcement" a high priority, in his
> State of the Union speech.
> 
> By January 30th, the *always*-silent National Security
> Agency suddenly *alleges* very publicly, that its main
> computers had inexplicably crashed from January 24th to the 28th.
> 
> Escalating the issue, in the first week of February,
> Clinton's budget proposes to spend $240-million to
> massively expand his undetectable, at-a-keystroke,
> remote wiretapping facilities, to be able to secretly
> snoop on any phone in the nation.

   & then came the DDoS attacks.
   see
http://listserv.syr.edu/scripts/wa.exe?A2=ind0002&L=foi-l&amp;amp;F=&amp;S=&P=9484
http://www.2600.com/news/2000/0209.html
http://www.wired.com/news/politics/0,1283,34285,00.html
http://www.cnn.com/2000/TECH/computing/02/09/cyber.attacks.02/

   As we know that electronic eavesdropping don't focus on "words",
   like JEDI said, but on syntaxic analysis (+ many other things :),
   JEDII   could   propose   one  or  more  texts  of  this kind. JEDI
   proposed  a  special  program  designed  to create a random list of
   eavesdropped words, it could also be designed to propose a creation
   of random texts, in ROT13 (+ translation ?) or anything else.


==================?)
bb! U, G° brother !)
  Big 
  http://www.bugbrother.com                         
  mailto:bigband@bugbrother.com



[: hacktivism :]
[: for unsubscribe instructions or list info consult the list FAQ :]
[: http://hacktivism.tao.ca/ :]