Saturday, August 18, 2001

Congratulations john... I wish you the best. Welcome to my country.
posted by Barrie , 5:04 AM Þ 
Friday, August 17, 2001

Say hi to Terrence & Philip and Brett Hart for us ay john :]
posted by Irdial , 6:47 PM Þ 

nyc smile on me....as i'm leaving!!!

off to canada today for good. bye bye imperalist
pigdogs! as soon as i cross the peace arch
i plan to shoot the finger right back east at
washington.

thank god i no longer have to feel the embarressment of
being american. and for those of you still in the states
beware the coming fall of the empire. i can gaurentee you it
won't go down without kicking and screaming....or worse.
posted by john , 5:41 PM Þ 

http://www.villagevoice.com/issues/0133/meyers.php
NYC Village Voice
Week of August 15 - 21, 2001


Motley Crew Beams No-Cost Broadband to New York
High Speed, Freed
by Peter Meyers


"This is why I love New York," says Anthony Townsend, standing in
the middle of Washington Square Park, holding his laptop computer
like a butler's tray and scanning the adult playground the place
becomes on hot summer evenings. Where else, he asks, can you
walk around with a computer, surf the Web, and go utterly
unnoticed?

As if to prove his invisibility, or perhaps to demonstrate that he belongs, he
hoists his machine like some digital prayerbook and begins chanting: "Jesus!
Jesus! Thank you!"

No one—not the guy playing the Ramones on acoustic guitar, not the tonguing
teenage lovers—notices this modern miracle worker or the cybernet he has cast
around them. Along with some 30 other volunteers in a group called NYCwireless,
Townsend's on a crusade to set up wireless Internet access zones: small areas,
often called free networks, where people can tap into high-speed connections,
without cables or phone lines, at no cost.


Call it a marriage of the Web and pirate radio, forged even as big telecom
interests bicker over the rights to wireless-spectrum licenses. Last week, the
White House announced it would ask the Supreme Court to uphold the seizure of
licenses from Next-Wave, which bought them at auction but failed to make
payments.

Meanwhile, the Washington Square network already exists—thanks to a homemade
setup Townsend rigged in late July in his nearby office at NYU, where he's a
fellow at the Taub Urban Research Center. Townsend, 27, used an antenna to
broadcast his connection a few hundred feet out into the park. So far only a
handful of these networks have been activated in New York. But if the group has
its way, zones like these will soon be springing up everywhere, spreading Net
connections like streetlamp light to anyone willing to put a cheap plug-in card
into a computer.

Aside from the opportunity to perform evangelical chants, why, you might ask,
would Townsend and his friends do this?

For starters, they have an earnest desire to share, a hacker's love of all
things jury-rigged, and an almost quixotic yen to make connections—human links,
as it were—in an impersonal city. Yet the simplest explanation is that they do
it because they can.

Building a free network requires some expertise, but using one is almost easy.
Those who wish to log on simply need to slip a "WiFi" card—which contains a
mini-antenna, costs about $100, and is available at computer shops—into a slot
on their machine and enter a few basic settings. Then they can cruise the
Internet and send e-mail as they normally would. The NYCwireless Web site,
www.nycwireless.net, lists a handful of the currently active networks.

Sharing resources like this is a longstanding tradition within the technology
world, from kids swapping music to programmers teaming up to improve Linux.
That's what attracted Terry Schmidt, an independent consultant, who joined
forces with Townsend this spring. Schmidt, 25, says he wanted to contribute his
know-how to a group effort. "I wanted to give something back," he says.

But free things draw suspicion these days, now that share-the-wealth movements
like Napster have acquired the taint of the mass-looting spree. Schmidt, who
along with Townsend acts as an informal spokesperson for NYCwireless, firmly
rejects the Napster comparison and says his group is simply giving the bandwidth
they pay for to anyone who happens to be nearby. "I'm sharing it with people,"
he says. "I'm not selling it. I'm not making a profit off it."

Which doesn't make Internet service providers any happier. Though most broadband
companies don't seem much aware of free networks, a Time Warner Cable
spokesperson says such sharing could violate the terms of its residential-
subscriber agreement.

In any case, Schmidt says he spends lots of time attempting to explain that this
is not some new dotcom business idea, that there is no commercial hook beneath
the giveaway lure. At a recent tech convention in Las Vegas, he tried again.
"They would ask, 'What's the business model?' " he recalls, "and we'd say,
'There is no business model. It's free.' "

Those in the free-network community, both in New York and elsewhere, treat the
project mostly as a hobby. Part of this reluctance stems from wanting to avoid
the responsibilities of running a business. If no one gets charged, then no one
can complain when things don't work. And by not charging, they're much less
likely to draw the attention of those supplying the bandwidth they're sharing.
But it's also evident that a communitarian impulse powers their most ambitious
vision, of a city blanketed with public Internet access.

"I want to make it an attractive thing for everybody to use. I want to make it
easy," says Schmidt, who thinks broadband connectivity is close to becoming as
necessary as water or electricity, and as such should be in public places, as
available as drinking fountains.

On May 3, Schmidt got the first NYCwireless network up and running in a coffee
shop near his Upper East Side apartment. "Basically, that was a nightmare," he
says, sounding as genuinely disturbed as a horror movie fan spooked by a scary
flick. Convincing the shop was not a problem. As he told the management, the
project would cost them nothing, require no work on their part, and enable their
customers to surf the Web for free. The problem was that between Schmidt's place
and the café—a distance of about 100 feet as the crow flies—stood several 16-
inch-thick brick walls and enough curves to exhaust even the strongest radio
wave.

First, Schmidt experimented with a variety of powerful antennas and signal
amplifiers, all of which, given unobstructed views, can be used to propel a
signal many miles. No luck. Then the brainstorm hit. The handiest solution to
the wireless network, he realized, was to run a wire. Off he went to Home Depot,
where he bought 250 feet of Ethernet cable to pipe the broadband connection from
his apartment to an access point in the coffee shop, which would in turn
distribute the signal. After securing permission from his landlord—who also
owned the coffee shop's building—he set about finding a means to get the cable
through those walls.

Enter Schmidt's friend who works as a metal fabricator. He customized the bit
needed to bore a slender channel through such thick walls, leaving only the
matter of drilling the actual hole. For this Schmidt used a hammer drill, which
is kind of like a jackhammer for the do-it-yourself crowd. Schmidt was then able
to run the cable from his apartment to the shop, where he snaked it into a
Rubbermaid container that held the miniature broadcast antenna.

In some ways that's when the real work started, as group members were forced to
grapple with the question of what their wireless network might evolve into and
how it might be used. Townsend, the urban planner, has visions of location-based
services delivering information to people according to where they are. But he
admits to not knowing exactly how a large-scale system of free networks will
function. "What we're doing is building an infrastructure," he says, confident
that once it's in place people will figure out things to do with it—especially
once they start carrying handheld computers with wireless connections.


Creating a truly widespread system will take more than a handful of volunteers.
The most optimistic members of NYCwireless talk of a "cloud" of free WiFi
networks filling the skies of New York City with Internet connectivity. As it
turns out, thousands of private corporate networks already exist, having been
designed to give employees wireless broadband connections.

Those in NYCwireless know this is so because a member recently went out "war
driving," a method for detecting active WiFi networks that involves outfitting a
car with global positioning technology, a hood-mounted antenna, and a suite of
special software. The term comes from "war dialing" (popularized in the Matthew
Broderick movie War Games), in which phone number after phone number is
automatically dialed in the search for a modem.

War driving is of interest to the free-network movement for two reasons: It
helps demonstrate the ubiquity of WiFi networks and exposes the security
problems that need to be addressed for the networks to be secure and,
potentially, more popular. The drive through Manhattan, which covered only a
portion of midtown, identified approximately 1400 WiFi networks.

Though many of these networks were inaccessible to the average WiFi card-
carrying computer user, anyone with a little networking savvy could likely break
in. Security flaws are as much a concern to free-network operators as they are
to their corporate counterparts, since network abuse—sending out spam or
threatening e-mail—could lead to their being shut down. War driving helps raise
awareness within the tech community that these networks are not yet secure.

Ultimately, a more pressing question is whether ordinary people will start using
these free networks. According to Schmidt, three months after establishing the
access point, only about one person per day taps the connection. Hooking up,
after all, requires someone with not only the wherewithal to buy a wireless card
but also the desire to play with what many people see as a work tool.

Whether these free zones flourish remains to be seen. But by another measure the
effort is already a success. Adam Shand, a Portland, Oregon-based advocate of
the movement, observes that "computers are fundamentally an isolating
technology."

Because the Internet helps connect people at a distance, the computer-dependent
have spent less time hanging around each other. Wireless free networks—both
because of the work required to build them and the signal's limited range—could
bring back the fun of being together. Rather than seeking an escape from 24/7
Web access, people could leave their desks and wander out to the digital
commons, no longer isolated.

Back in Washington Square Park, Townsend's just happy everything checks out. He
tests the first live feed of streaming video. It's of a teenage girl on CNN,
talking about what Ecstasy did to her. "I didn't care about anything except
doing X," she says. "I didn't want to wake up unless it was to do X."

Townsend stares at the screen. "This is fucking cool," he says. "This is better
than 3G"—the high-speed network cell phone companies are hyping. "That's not
even half the speed of what we're getting. And it
works."
posted by Josh Carr , 3:51 PM Þ 

This looks pretty awesome...
http://www.cncd.fi/aeeben/
posted by Irdial , 1:25 PM Þ 

Dont upgrade to IE5.5 SP2

This concerns Internet Explorer 5.5 SP2. For those of you who don't know:
"SP" is Microsoft lingo for "service pack", which is their stupid code
phrase for upgrade. This is different from IE 6 (which is currently in
beta).

Short version: with no warning to the dev community, MS is covertly
dumping support for any plugins that do not support their own proprietary
model -- which is a lot of damned plugins. Quicktime is perhaps the most
prominent one but, as you can see from the last paragraph below, this also
impacts some database applications and other mission-critical
implementations of online tech. Methinks other problems will also be
discovered before long.

It's obviously part of their endgame strategy to finally kill Netscape,
Mozilla and other browsers.

---

from http://www.macfixit.com/

IE for Windows blocks QuickTime

Robin Walker found that Internet Explorer 5.5 SP2 for Windows is
incompatible with QuickTime: "It will not play QuickTime movies, or work
with any other function that requires the QuickTime plug-ins. QuickTime
plug-ins play QT movies in other versions of MSIE up to and including MSIE
5.5 SP1, but SP2 just gives a blank frame or broken graphic icon. This has
been verified here with Win98, WinME, WinNT, and Win2K. The same problem
with QuickTime is reported to be present in the previews of MSIE 6.0 for
Windows. The QuickTime plug-ins continue to function correctly in Netscape
and other browsers." In addition, MacNN has posted an item which appears
to confirm Robin's observation. It states that "A note from Apple
engineering staff to the QuickTime VR mailing list says that 'IE 5.5 SP2
[for Windows] will not use the QuickTime plug-in no matter what you do.'"

Update: Jim Gaynor writes: "IE 5.5 SP2, apparently, isn't singling out
QuickTime. It seems that Microsoft dropped support for plug-ins written to
the Netscape standard, and is now only supporting ActiveX plug-ins. Here
at the University of Washington, several groups have been told not to
upgrade, as certain plug-ins that are used for our in-house databases
break under IE 5.5 SP2."
posted by Irdial , 11:09 AM Þ 

Tee Hee
Read it carefully - it's not what it looks like at first...!
posted by captain davros , 9:42 AM Þ 

Oh, something else I wanted to post. I was listening to the radio this evening and there was a neat story going on.
I think this is happening in austria. A man is gathering together 200 random people with digital cellphones. He's going to have them all turned on. What he's doing is gathering the numbers, and will be uploading new ringtones to all the phones. The ring tones will be different pitches, timbres, etc. He will then have a program calling the phones at set intervals to make a chorus of ringtone music! It will be insane! He's even calculated in the calling delays and posibilies of cellphones actually ringing (as in a real call). It sounds really quite interesting. Couldn't find a story on it. Help?
posted by Barrie , 7:33 AM Þ 

Your diptycha sounds really cool, ha ly. Sadly I don't think I can participate because I am indeed an "artist" going to art school. But it looks exciting. Keep us posted, eh?
I'd also like to say that I am craving woman. Really. Dammit. Must find woman. Help?
posted by Barrie , 7:29 AM Þ 

another thing...i got that warp email with the exclusive aphex track off the upcoming new album. dunno bout everyone else, but i was deeply disappointed. didnt do much fer me...*sigh*
posted by ha , 3:05 AM Þ 

id fergotten my username and password so i lost motivation. you asked fer it:

been wanting to teach myself webdesign. so....im starting one in which ive called >>diptycha<< with the purpose of showcasing non-artists' photography -- for folks who take photographs for personal self-expression or mere candid fun amongst friends. ive gotten arguments with using the term 'non-artist'... but what i wanted to convey is not a negativity towards the idealist concept of an 'artist', but moreso the whole state of the professional fine arts world. in the music industry, there is obviously the mainstream and the underground (whatever the term you prefer......you get my jist). the listener has the option and the access to either. but as music is made to be heard, photography/paintings/sculptures is made to be viewed. but there is no one-stop access to view the 'underground' artwork. only one pretentious gallery after another pretentious gallery to another... most exhibitions being total wanker shit anyways. getting to my point, the purpose of diptycha is to showcase photography thats been taken with no agendas of impressing a viewer or being a 'successful artist'. not that striving to be a successful artist is wrong. but this is strictly for photographs taken for the sake of photographs that just turns out BRILLIANT! why only share amongst your friends? why not the rest of world? i know the concept is simple and this has become more wordy than necessary....ah well.

sooooooooooooooo.....contribute! aiming fer a september launch. eventually there will be similar sites dedicated to painting and writing... oh and the name diptycha...every page will feature 2 photos that compliment/contradict each other. very simple. some sample pages for anyone who wants to get a better idea of whats it about >> > http://zoppoldesign.com/ha/HTML

eventually there will be sites dedicated to painting and writing...
posted by ha , 2:56 AM Þ 
Thursday, August 16, 2001

All you what got "post more" emails:
post whatever you want here.
fire and forget
fire in the hole
fire in the belly
you dont have to do anything here
you have nothing to fear
and nothing to answer
no obligation to anyone or anything
just post at least once a week
posted by Irdial , 8:06 PM Þ 

I'm the cream of the great utopian dream.
posted by Aaron , 7:57 PM Þ 

holy geez!!!
posted by john , 6:29 PM Þ 

House music causes impotence


Italian psychologists

House music causes temporary impotence, Italian researchers claim.

Research conducted by psychologists at the Help Me association in Rome found 66% of Italian youngsters suffer sexual problems after listening to the music.

The survey was conducted on 500 Italian clubbers aged 16 to 24.

Psychologist Willy Pasini told the News 2000 website: "The strong rhythmic component, and the almost total lack of melody do not inspire sexual thoughts in one's mind."

The researchers claim house music cause "mental impotence" because it doesn't leave room in the brain for sexual desire.

"Music heard in the clubs causes an alternate state of consciousness, which distracts the brain from taking care of its vital functions", researcher Chiara Simonelli said.

Claus, I HAD to post this; its just TOO FUNNY!
posted by Irdial , 4:58 PM Þ 

I spoke to a fruity cellular telephone company today about integrating SMS into P2PQ.

When I got through to the switchboard, the woman said to me; "Can you tell me what SMS is? I've only been here two weeks"

I then was put through to another woman, who, after putting me on hold three times, gave me the free number that is used to sign up to Orange!
posted by Irdial , 3:55 PM Þ 
posted by Claus Eggers , 2:40 PM Þ 

**** **** MAJOR PROTON EVENT IN PROGRESS **** ****

A category S2 (Moderate) Solar Radiation Storm is in progress. This
event began with high energy proton flux above event levels at 7:05
p.m. Mountain Daylight Time (MDT) on August 15, 2001.


Current proton fluxes are at a level equivalent to S2 (Moderate) on the
NOAA Solar Radiation Storm scale. Effects may include, but are not
limited to, single-event upsets on satellites in earth orbit, and
degradation of high frequency radio communications at polar latitudes,
also known as Polar Cap Absorption (PCA). The NOAA S-scale is defined
by the lower energy proton flux (10 MeV), but because this event also
includes a significant higher energy flux component (100 MeV), other
effects are also possible, including increased radiation exposure for
manned space flight operations, more widespread radio communication
effects, and a wider range of potential impacts on satellites, such as
"snow" in imaging systems and degradation of satellite components due
to radiation exposure.


Major proton events generally follow energetic x-ray flares from active
sunspot regions on the visible side of the sun. This event was
somewhat unusual in that no notable x-ray enhancement was seen on
satellite monitors prior to its occurrence, suggesting a more unusual
"backside" event, from a sunspot region that has rotated beyond the
side of the sun facing Earth.


Subsequent imagery received from the LASCO instrument on the SOHO
satellite, operated by NASA/ESA, confirm that a major coronal mass
ejection (CME) emerged from a backside source starting at about 5:54
p.m. MDT on August 15th. Proton enhancements were first observed on
the SOHO SIS instrument at 6:25 p.m. MDT, indicating that these
particles were ejected from the sun at a velocity near 30% of the speed
of light. By 7:05 p.m. MDT, the flux of energetic protons observed on
the NOAA GOES-8 satellite had risen to the threshold for a major proton
event (as determined by 100 MeV proton flux). A second threshold for
lower energy protons (10 MeV proton flux) was reached at 7:35 p.m. MDT.
An associated Polar Cap Absorption (PCA) began at 8:10 pm MDT.


The last S2 (Moderate) event with flux levels similar to the one in
progress occurred on 18 April 2001, and lasted for about two days.
Interestingly, that event was also caused by a backside CME.
posted by Irdial , 9:01 AM Þ 
Wednesday, August 15, 2001

in the These records catalog posted on the Irdial site:
This Heat records "Blue & Yellow" and "Deceit" are listed as "due later in the year... compact disc and vinyl remasters / repackage"

does any one know the status of these?

i've gotten _some_ of the mp3s from Gnutella, but would love to get my hands on physical releases...
posted by Josh Carr , 8:16 PM Þ 

My vacation
I'm going to stay at this place for most of the next two weeks (Incha Allah). Only the owners have a phone, but it's soundless. No TV. No net. No alcohol. No music and NO ADVERTISING. Only days, the sun and the ocean. I love, love, love it!
posted by Claus Eggers , 3:57 PM Þ 

You've all probably heard this but if you haven't this is the first officially released tune off drukqs
posted by > parge , 10:10 AM Þ 

so bt openworld desides to go down for a few hours! what better to try out wireless.blogger.com from the comfort of my palm!
posted by alex_tea , 2:42 AM Þ 
Tuesday, August 14, 2001
posted by Claus Eggers , 8:40 PM Þ 
posted by > parge , 10:30 AM Þ 

check this out. google stats!

http://www.google.com/press/zeitgeist.html

they have to be one of the best internet companies out there. a service that everyone uses, a service that never fails, and the most tacky, but best part, service with a smile; i can't see msn or yahoo letting me search in hacker language, or slagging off bill gates or george bush!

but have you tried searching for "smart motherfucker"?

what i think is more interesting though is how the internet develops, in this endless sea of tides... the way google works, means that searching for something one day will get you something completely different the next. or at least, not exactly the same. especially if the search term starts off as something quite obscure and then picks up pace, with bigger ranking websites such as wired.com or zdnet including the search terms in their articles.

for example, the AI web game, which i can't be arsed to follow... at the start searching for these people's names would have returned a very narrow array of results, maybe just the specific sites created by the people behing the marketing scam. but now, you will probably get a few news stories before you get to what you really want.

what could be really interesting though, is using this and playing tricks with it. for example you could make a website and place it somewhere out of the way. maybe not even link to it. title the page with something unique. do a search and record the results. now spread this url around. links from message boards try and get your friends to link it from their blogs, hopefully it may end up blogdex, maybe see if you can somehow get it in wired or slashdot or ntk (maybe there's some interesting content on there). everyday at the same time search for this specific term and record your results.

you could plot a graph of the number of returned results, the depth of your targeted result, etc... to get a high rank on google you need to link to a lot of sites, and be linked, so maybe fill your page with links.

maybe this would work, maybe not. maybe akin could try it with p2pq, as it's still in beta, it hasn't got it's name around yet, and it would be a nice way to plot it's growth.

you wouldn't even need to do this manually, i'm sure someone clever could write a perl or apple script to automate this process...
posted by alex_tea , 6:23 AM Þ 

wow that really is quite hardcore. haven't had tim to look into it yet, but is this software freely available? a rush of ideas enters my brain... artwork and music containing subliminal messages.. wicked... finally a project sutible for R107!!

i found us on blogdex too!!!
http://blogdex.media.mit.edu/browseSource.asp?url=http://www.ntk.net/

and i've finally got wireless internet sorted on my palm... data wasn't enabled on my phone...
posted by alex_tea , 6:02 AM Þ 
Monday, August 13, 2001

http://www.hindustantimes.com/nonfram/100801/platefrm.asp

August 10, 2001
Ravi Visvesvaraya Prasad


THE LASHKAR-e-Tayyeba militants responsible for the Red Fort attack
were running a cybercafe and using electronic mail to receive
instructions from abroad.

When the Delhi Police seized their computers and hundreds of encrypted
e-mail messages, they found a vast amount of pornographic films and
photographs on the hard disks. Thinking that the militants had amassed
their pornographic collection for personal enjoyment, the police
turned it over to the maalkhana as case property.

A few weeks later, a police officer in Delhi read in the USA Today
about the testimony furnished by George Tenet, Director, CIA, to the
US Congress. Tenet said that Islamic extremists were hiding their
messages within pornographic and sports images and movies, as well as
in music files, and were utilising heavily-visited electronic chat
rooms and bulletin boards as drop sites.

The intended recipient would download the file and decrypt the hidden
message. To all others who would download that file, it would seem to
be an innocuous image. Tenet was alarmed that the extremists had
successfully evaded the SIGINT (signals intelligence) and COMINT
(communications intelligence) interception operations of Americas
National Security Agency.

Hence, it occurred to this alert policeman in Delhi that the
pornography seized from the militants could contain hidden
instructions.

These developments have drawn attention to the recondite field of
steganography, the science of concealing encrypted messages within
innocuous cover messages, pictures or music in such a manner that an
interceptor or other recipients of the cover file would not even
suspect that hidden within it was an encrypted message.

In the simpler field of cryptography, an interceptor would be able to
discern that the encrypted message existed, and his challenge would be
merely to crack the code and decrypt the secret message; even this
simple task would take the best security agencies several weeks to
perform. The US Air Force Research Laboratory has forecast the future
information warfare technologies and the counter measures to fight it.
Steganography topped the list.

While the fundamentals of steganography were enunciated by Johannes
Trithemius of Frankfurt, it is in the last 18 months that
technological advances have taken place, mainly at German, Austrian,
Swiss, Italian and Finnish universities, Cambridge University in the
UK, and Carnegie Mellon and George Mason Universities in the US.
Security agencies have been rendered impotent by the inexpensive
steganographic software packages which conceal information in digital
audio, video and image files.

The first organisations to recognise the utility of steganographic
algorithms developed in European universities were Pakistani hacker
groups, the Palestinian cells of Hamas and Hizbollah, Osama bin Ladens
Al Qaida, and the LTTE. Al Qaida heeded bin Ladens directive that
mastering advanced technologies was integral to jehad. It was the
first to practise the research results of Professors Ross Anderson and
Fabien Petitcolas of Cambridge University, and conceal its messages in
dense packet internet traffic, and large bandwidth uncompressed audio,
video and image files.

These would be located at heavily visited pornographic sites, music
download sites, chat rooms and bulletin boards. Al Qaida began to use
these as message drop sites for their agents. A security analyst
detected steganographic activity even on heavy-traffic commercial
portals such as Amazon and eBay, who were not even aware that their
websites were being used for such purposes.

A security analyst recounted the case of a suspected Islamic militant.
The FBI in the US, which had placed him under surveillance using its
packet-sniffing tool Carnivore, was intrigued that while he kept
e-mailing photographs of his family to e-mail addresses that appeared
to be those of relatives, he never received any replies. He was found
to be sending instructions to his agents using DEMCOMs Steganos, which
was undetectable by FBIs Carnivore.

Packages that combine technical excellence with human psychological
factors to avoid suspicion are Texto, developed in Finnish
universities, which converts messages into blank verse poetry, and
Spam Mimic, developed by Peter Wayner, which encodes messages into
what looks like a junk e-mail.

While round one has gone to the terrorists, Indian security agencies
can fight back. Compressed video, music and image files have
predictable patterns that would be disrupted when a message is
inserted. It is possible to develop a stegoscanner program, akin to a
virus scanner, to examine hard drives and identify the electronic
fingerprints and signatures left behind by steganographic
applications.

A US steganography expert has formulated a roadmap for future efforts:
First, derive the signatures/indicators associated with each
steganographic package and write a scanner. The harder part is picking
up the dead drops. This would require thousands of police officers to
continuously monitor the websites, bulletin boards and chat rooms. The
next stage is difficult. Once all possible nodes are identified, one
should write a Trojan horse that would sit in the machines and scan
all activity.

Indias security agencies should utilise the latest steganographic
technologies for their internal communications, in contrast to the
insecure channels they use at present. They should also develop the
futuristic science of detecting these hidden messages and decrypting
them, in order to trace sensitive information being leaked out under
innocuous guises. For these, they should work together with the IITs,
just as the Center for Secure Information Systems in the US is a joint
venture between the National Security Agency and the George Mason
University. The Pentagon and CIA are funding steganalysis research at
the Carnegie Mellon.

If Osama bin Laden and the LTTE can put into practice the latest
technological breakthroughs from European universities, there is no
reason why India should not use its academia and industry. The
intelligence agencies should, for instance, examine the hard drives of
those Sudanese associates of bin Laden whom they caught some time
back.
posted by Irdial , 2:43 PM Þ 
Home
 
People
 
Services
 
Articles
 
News
 
About


Subscribe to “Irdial-List” Our Mailing List.
The Blarchives are here.
The Blogs on irdial.com are powered by WordPress.
Here is the Blogdial Atom XML feed.
Here is the Blogdial Feedburner XML feed.
Open Content 1995-2005 Irdialani Limited. All Rights Relinquished where applicable.
Links: STAND FIPR PI PF NUFORC M2M SB FTT FFF RMS A-SCROB ONGAKU Blogroll BLOGDIAL WOE CHEZ MANNING