Back to the main page

Mailing List Logs for ShadowRN

Message no. 1
From: Simon and Fiona sfuller@******.com.au
Subject: Intelligence Methods Part 1: Collection [LONG!]
Date: Wed, 2 Feb 2000 15:52:08 +1100
-----Original Message-----
From: DemonPenta@***.com <DemonPenta@***.com>
To: shadowrn@*********.com <shadowrn@*********.com>
Date: Wednesday, August 02, 2000 3:23 PM
Subject: Re: Intelligence Methods Part 1: Collection [LONG!]



>>Well of course nothing prevents them from getting allies to do the dirty
>>work. Much like the NSA circumvents restrictions on monitoring US citizens
>>by having their friends in Canada or Britain do it. Echelon is a perfect
>>example of this circumvention of US law and policy by various agencies.
"For
>>our own good of course. fnord"
>
> The problem arises..what if it IS someone like Castro that nobody else
>hates enough? Or, what if some idiot US official gets the idea to kill the
>Pope or something?
>
>John


Funny you should say that. Pope John Paul II's predescessor, Pope John (some
number) was a noted communist, and spoke out for communism in Europe. On the
night of his canonisation, he was having drinks with some high up friend
(archdeacon?) Anyway, the other guy drank first, and keeled over dead. At
first they said that it was poison, but the story quickly changed to heart
failure. A week later, the Pope also died of heart failure, vital evidence
vanished (like his bedside water jug), and an ambulance arrived on the scene
within minutes, even though the nearest ambulance centre was about 40
minutes away (Rome and the Vatican being very covoluted street-wise).
Anyway, up stepped John Paul II, not even Italian, but a staunch
anti-communist with US endorsement. In a couple of years JP quashed the
communist rumblings in Europe, especially in his native Poland, where they
were strongest. KGB files (which are on sale a dollar to the kilo these
days) said that not only did they endorse John XYZ and tried to off JP, but
they knew the US killed John XYZ to stop communism's spread.
I saw this on a show hosted by William Shatner, so it must be true :?)
Message no. 2
From: Tzeentch tzeentch666@*********.net
Subject: Intelligence Methods Part 1: Collection [LONG!]
Date: Tue, 1 Aug 2000 19:50:28 -0700
From: <DemonPenta@***.com>
> OK Tzeentch...beautiful. But what's all those classification thingies
> mean?:-) (If we're going to use such stuff in SR....EXPLAIN THAT!)

I posted a somewhat condensed version a while back during the first big
threads on the Matrix and Richard Swen gave you the Cliff Notes version as
well. I'll go into a bit more depth in this article and if I can swing it
show how the US government/military routes classified material over the
internet via SIRP/TIPRNet and what equipment like TROJAN SPIRIT does (other
then kill birds that fly in the path of the microwave uplink!). Hell I'll go
into more detail then even whats in Delta Green (which is pretty good stuff
BTW!). I can also provide scans of the actual cover sheets if you're REALLY
hard up for realistic looking docs. As in so real you'll probably be busted
by the Feds ;)~ But Shadowruns a game about PLAYING criminals, not be locked
up for playing said pseudo-criminals so I think I'll skip that! ;)

The following information is compile from MANY sources on the web and in
various books I have. Especially "The US Intelligence Community" (see
biography at end). If you see something totally screwed up or have
amplifying information let me know!

1.0 INTELLIGENCE
Intelligence is defined as the "product resulting from the collection,
evaluation, analysis, integration and interpretation of all available
information which concerns one or more aspects of foreign nations or of
areas of operation which is immediately or potentially significant for
planning."

1.1 COLLECTION
This is the purposeful acquisition of any information that might be desired
by analyst, consumer, or operator. Collection activity can come from various
sources, open source, clandestine, human source, or technical.

1.1.1 OSINT (Open-Source Intelligence)
Open source intelligence involves the use of materials available in the
public domain by intelligence agencies. Examples include newspapers,
television broadcasts, magazines, technical and scholarly journals, books,
the Internet, and government reports. Foreign service officers and attaches
also report on public activities.

Electronic information services and databases, as well as advanced data
mining tools have made the job of collating and analyzing large amounts of
data easier. Through these new tools and other, more conventional, OSINT
means the information gained can provide information on organizational
dynamics, technical processes, and research activities not available in any
other form. When open source data is compiled, it is often possible to
derive classified data or trade secrets, or fill in gaps left from technical
collection methods. This is particularly true in the case of studies
published in technical journals. A significant understanding of research and
development efforts can often be derived by analyzing journal articles
published by different members of a research organization. Finally, open
source information is generally more timely and may be the only information
available in the early stages of a crisis or emergency.

Open source intelligence collection does have limitations. Often articles in
military or scientific journals represent a theoretical or desired
capability rather than an actual capability. Censorship may also limit the
publication of key data needed to arrive at a full understanding of an
targets actions, or the press may be used as part of a conscious deception
effort.

1.1.2 HUMINT (Human Intelligence)
Human intelligence is derived from human sources. To the public, HUMINT
remains synonymous with espionage and clandestine activities, yet, in
reality, most HUMINT collection is performed by overt collectors such as
diplomats, military attaches, and even troops in the field. HUMINT includes
overt, sensitive, and clandestine activities and the individuals who
exploit, control, supervise, or support these sources.

Overt activities are performed openly. Overt HUMINT collectors can include
military attaches, diplomatic personnel, members of official delegations,
and debriefers at refugee centers. Overt HUMINT activities may include:
exploiting unclassified publications, conference materials, and government
hearings; operating interrogation centers for refugees and prisoners of war;
and debriefing travelers who visited countries of interest to a nation's
intelligence service.

Sensitive HUMINT activities may depend upon the same methods as overt
activities, however, the sponsor of the activity must be protected from
disclosure. Disclosure of the sponsor's identity may result in political
embarrassment, compromise of other intelligence operations, or security
threats to the sponsoring nation.

Clandestine HUMINT sources include agents who have been recruited or have
volunteered to provided information to a foreign nation, and foreign
nationals who successfully infiltrate an organization with a cover story,
such as using the guise of political refugees.

Even with the capabilities of technical intelligence gathering capabilities,
HUMINT can still provide information that even the most proficient technical
collectors cannot, such as access to internal memoranda and to compartmented
information. Most importantly, human collectors can provide key insights
into the intentions of an adversary, whereas technical collection systems
are often limited to determining capabilities. HUMINT can be used to reveal
adversary plans and intentions, or uncover scientific and weapons
developments before they are used or are detected by technical collection
systems. HUMINT can also provide documentary evidence such as blueprints of
facilities, copies of adversary plans, or copies of diplomatic or policy
documents. Finally, HUMINT is extremely cost effective compared with
technical collection systems and does not require a significant
technological production base for support.

1.1.3 SIGINT (Signals Intelligence)
Signals intelligence is derived from signal intercepts comprising, either
individually or in combination, of communications intelligence (COMINT) and
electronic intelligence (ELINT)

Signals intelligence collection can be performed from a variety of
platforms. Examples include overt ground collection sites, ships and
aircraft; and covert locations inside the target country or area. SIGINT
facilities can monitor transmissions from communications satellites, as well
as terrestrial facilities. Space-based collection systems can also collect
COMINT, FISINT, and ELINT.

COMINT is intelligence obtained by the interception, processing, and
analysis of communications transmissions. This includes voice and
teleprinter traffic, video, Morse code, and facsimile messages. Assuming
access is possible, COMINT can be collected from the air waves, cable, fiber
optics, or any other transmission medium. These transmissions may either be
encrypted or transmitted in the clear. COMINT targets are varied, ranging
from diplomatic communications to intercepting communications between
different components or individuals of a single organization. Aside from
governments, a growing target for COMINT are multinational corporations and
narcotics trafficers.

ELINT includes the interception and analysis of noncommunications
transmissions from military and civilian hardware, such as radar. ELINT is
used to identify the location of an emitter, determine its characteristics,
and infer the characteristics of supported systems. Most intelligence
agencies concerned with ELINT store these signals and analysis information
in reference files for future use.

1.1.4 MASINT (Measurement and Signature Intelligence)
Measurement and Signature Intelligence (MASINT) is a collective term
bringing together disparate intelligence elements that do not fit within the
definitions of SIGINT, IMINT, or HUMINT. These disparate elements consist of
intelligence activities and technologies such as acoustic intelligence (non
compressible fluids (ACINT), compressible fluids (ACOUSTINT)); laser
intelligence (LASINT); radar intelligence (RADINT); nuclear radiation
detection (NUCINT); infrared intelligence (IRINT); electro-optical
intelligence (ELECTRO-OPTINT); radio frequency (RF/EMPINT), unintentional
radiation (RINT); materials, effluent, and debris sampling; and electro
optical and spectro-radiometric sources. MASINT also uses Signals
Intelligence or Imagery Intelligence data and subjects the data to
specialized processing, using analysis otherwise not utilized by traditional
SIGINT and IMINT processing.

Radar Intelligence (RADINT) is intelligence obtained from the use of
non-imaging radar - like ELINT there is no interception of communications
involved. RADINT does not depend on does not depend on interception of
another objects emanations. The radar itself emits the signals - radio
waves - and it is the analysis of the deflection of those signals that
allows intelligence to be derived. Information from RADINT includes flight
paths, velocity, manuevering, trajectory, and angle of descent.

Foreign Instrumentation Signals Intelligence (FISINT) is an example of
MASINT, consisting of intercepts of electromagnetic emissions from testing
and operational deployment of aerospace, surface, and subsurface systems.
Such signals include telemetry, beaconing, electronic interrogation,
tracking, and video links. A further subcategory under FISINT is Telemetry
Intelligence (TELINT). Telemetry is the set of signals by which a missile,
missile stage, or missile warhead sends data about its performance back to a
ground station during test flights. This includes data on structural stress,
thrust, fuel consumption, guidance system performance, and the ambient
environment. Intercepted and decrypted telemetry can provide information on
a system's guidance system operation, fuel usage, staging, and other
parameters vital for understanding operational characteristics.

1.1.5 IMINT (Imagery Intelligence)
IMINT is a product of imagery analysis. Imagery includes representations of
objects reproduced electronically or by optical means on film, electronic
display devices, or other media. Imagery can be derived from visual
photography, radar sensors, infrared sensors, lasers, and electro-optics.

Imagery can be obtained from both the visible and near-infrared portions of
the electromagnetic spectrum. In both cases it relies on the absence of
cloud cover and can only be conducted in daylight since they rely on the
reflective properties of objects and not their emission of radiation.
Thermal infrared imagery is obtained from the mid to far-infrared portions
of the electromagnetic spectrum and produces images by deteching the objects
heat. Since this does not require reflected radiation it can be obtained at
night (but still requires no cloud cover).

One method of producing imagery in the face of cloud cover uses radar. By
analyzing the returning radio waves an image of the area can be assembled.
Since radio waves are not attenuated by atmospheric water vapor they well
penetrate cloud cover.

1.1.6 TECHNICAL SURVEILLANCE
This includes the use of "bugs", wiretapping, and mail-opening.

1.1.7 MATERIAL EXPLOITATION AND RECOVERY
Quite simply this is the acquisition of new or used systems of intelligence
significance (typically weapon systems). These programs are conducted in a
variety of ways, ranging from outright buying the equipment on the open
market, theft, bribery, defection, or locating disabled systems.

1.1.8 CI (Counter-Intelligence)
Counterintelligence is information gathered and activities conducted with
the purpose of disrupting and neutralizing the activities of hostile
intelligence services. There are four basic functions of
counterintelligence:
-Collect information on foreign intelligence and security services
-Evaluate defectors
-Conduct research and analyis on the structure, personnel, operations, and
capabilities of foreign intelligence and security services.
-Disrupt and neutralize the activities of hostile intelligence and security
services.

1.1.9 COVERT ACTION ("Special Activities")
Any operation or activity designed to influence foreign governments,
persons, or events in support of policy objectives while keeping the
sponsoring governments support of the operation secret.

There are several types of covert action: black propaganda (propaganda which
purports to come from an source other then the real one), gray propaganda
(in which the true sponsorhsip is not acknowledged), paramilitary or
political acts designed to destabilize or overthrow the countries
government, support of individuals or organizations with aid, arms, or
training, economic operations, disinformation, and assassination.

1.2 ANALYSIS
Analysis involves the integration of collected information into a finished
intelligence product. This product may be a statement of facts, estimates of
capability, or projections of likely events.



Information for this brief overview was collected from many sources,
including:

Richelson, Jeffrey. The U.S. Intelligence Commununity, Second Edition. ISBN
0-88730-226-2. Ballinger Publishing 1989 (Now in its Fourth Edition!)

Tynes, John and Detwiller, Dennis. Delta Green. ISBN 1-887797-08-4. Pagan
Publishing 1997

Operations Security Intelligence Thread Handbook.
http://www.fas.org/irp/nsa/ioss/threat96/index.html

NCIS Counterintelligence.
http://www.ncis.navy.mil/activities/Counterintel/Counterintel.html

USAF Intelligence Targeting Guide.
http://www.fas.org/irp/doddir/usaf/afpam14-210/index.html

Kenneth
"On two occasions I have been asked, 'Pray, Mr. Babbage, if you put into the
machine wrong figures, will the right answers come out?' I am not able to
apprehend the kind of confusion of ideas that could provoke such a
question."
-- Charles Babbage
Message no. 3
From: DemonPenta@***.com DemonPenta@***.com
Subject: Intelligence Methods Part 1: Collection [LONG!]
Date: Tue, 1 Aug 2000 23:44:03 EDT
In a message dated 8/1/00 11:01:35 PM Eastern Daylight Time,
tzeentch666@*********.net writes:

> posted a somewhat condensed version a while back during the first big
> threads on the Matrix and Richard Swen gave you the Cliff Notes version as
> well. I'll go into a bit more depth in this article and if I can swing it
> show how the US government/military routes classified material over the
> internet via SIRP/TIPRNet and what equipment like TROJAN SPIRIT does (other
> then kill birds that fly in the path of the microwave uplink!). Hell I'll
go
> into more detail then even whats in Delta Green (which is pretty good stuff
> BTW!). I can also provide scans of the actual cover sheets if you're REALLY
> hard up for realistic looking docs. As in so real you'll probably be busted
> by the Feds ;)~ But Shadowruns a game about PLAYING criminals, not be
locked
> up for playing said pseudo-criminals so I think I'll skip that! ;)
>
Nice info. I wait to see the rest, especially since I'm kinda confused as
how to use all this in an actual game of SR.:-) However... a note for
EVERYONE..As of current, the US government (not just the CIA, but EVERY intel
agency, and the US military) is prohibited from carrying out assassinations
and similar. (If they were..I assure you. 10:1, Saddam Hussein and such would
have exited thy coil mortalis a long time ago.) The US is the ONLY nation
that prohibits its operatives from engaging in that. Why, I do not have a
clue. Why we don't let them, I don't know. After recent years, we really
should. BUT ANYWAY...
Message no. 4
From: Tzeentch tzeentch666@*********.net
Subject: Intelligence Methods Part 1: Collection [LONG!]
Date: Tue, 1 Aug 2000 20:54:52 -0700
From: <DemonPenta@***.com>
> Nice info. I wait to see the rest, especially since I'm kinda confused as
> how to use all this in an actual game of SR.:-)

Well these first articles will simply be background and tech info then I'll
post the pure-Shadowrun information including possibly what amounts to a
mini net.book on running intelligence campaigns in Shadowrun. Either Delta
Green style ops or more conventional direct action missions (ie shadowruns).

> However... a note for
> EVERYONE..As of current, the US government (not just the CIA, but EVERY
intel
> agency, and the US military) is prohibited from carrying out
assassinations
> and similar. (If they were..I assure you. 10:1, Saddam Hussein and such
would
> have exited thy coil mortalis a long time ago.)

That's actually a very recent restriction. There have been many
assassination attempts on Castro and Saddam. They just fail for a wide
variety of reasons, mainly for reasons of sheer incompetence or an wierd
desire to overcomplicate things. Now the Mossad, they have their heads
screwed on tight when it comes to black ops.

> The US is the ONLY nation
> that prohibits its operatives from engaging in that. Why, I do not have a
> clue. Why we don't let them, I don't know. After recent years, we really
> should. BUT ANYWAY...

Well of course nothing prevents them from getting allies to do the dirty
work. Much like the NSA circumvents restrictions on monitoring US citizens
by having their friends in Canada or Britain do it. Echelon is a perfect
example of this circumvention of US law and policy by various agencies. "For
our own good of course. fnord"

Kenneth
"On two occasions I have been asked, 'Pray, Mr. Babbage, if you put into the
machine wrong figures, will the right answers come out?' I am not able to
apprehend the kind of confusion of ideas that could provoke such a
question."
-- Charles Babbage
Message no. 5
From: DemonPenta@***.com DemonPenta@***.com
Subject: Intelligence Methods Part 1: Collection [LONG!]
Date: Wed, 2 Aug 2000 00:23:31 EDT
In a message dated 8/2/00 12:09:36 AM Eastern Daylight Time,
tzeentch666@*********.net writes:

> > However... a note for
> > EVERYONE..As of current, the US government (not just the CIA, but EVERY
> intel
> > agency, and the US military) is prohibited from carrying out
> assassinations
> > and similar. (If they were..I assure you. 10:1, Saddam Hussein and such
> would
> > have exited thy coil mortalis a long time ago.)
>
> That's actually a very recent restriction. There have been many
> assassination attempts on Castro and Saddam. They just fail for a wide
> variety of reasons, mainly for reasons of sheer incompetence or an wierd
> desire to overcomplicate things. Now the Mossad, they have their heads
> screwed on tight when it comes to black ops.

I thought it's existed since 1976? And...Mossad has the advantage of some
SKILLED agents. They've been sloppy lately; Caught bugging Hamas in
switzerland a while back, and botched a relatively simple assassination
attempt a while back.

> >The US is the ONLY nation
> >that prohibits its operatives from engaging in that. Why, I do not have a
> >clue. Why we don't let them, I don't know. After recent years, we really
> >should. BUT ANYWAY...

>Well of course nothing prevents them from getting allies to do the dirty
>work. Much like the NSA circumvents restrictions on monitoring US citizens
>by having their friends in Canada or Britain do it. Echelon is a perfect
>example of this circumvention of US law and policy by various agencies. "For
>our own good of course. fnord"

The problem arises..what if it IS someone like Castro that nobody else
hates enough? Or, what if some idiot US official gets the idea to kill the
Pope or something?

John
Message no. 6
From: Sidhe tirnanog@****.com
Subject: Intelligence Methods Part 1: Collection [LONG!]
Date: Tue, 1 Aug 2000 21:53:26 -0700
||[mailto:shadowrn-admin@*********.com]On Behalf Of DemonPenta@***.com
||Sent: 01 August 2000 20:44
||To: shadowrn@*********.com
||Subject: Re: Intelligence Methods Part 1: Collection [LONG!]

<SNIP>

|| Nice info. I wait to see the rest, especially since I'm kinda
||confused as
||how to use all this in an actual game of SR.:-) However... a note for
||EVERYONE..As of current, the US government (not just the CIA, but
||EVERY intel
||agency, and the US military) is prohibited from carrying out
||assassinations
||and similar. (If they were..I assure you. 10:1, Saddam Hussein
||and such would
||have exited thy coil mortalis a long time ago.) The US is the ONLY nation
||that prohibits its operatives from engaging in that. Why, I do not have a
||clue. Why we don't let them, I don't know. After recent years, we really
||should. BUT ANYWAY...

i believe that Canada also does not allow it's agents to carry out
assassinations, etc, though i could be wrong.

also, on the saddam hussein note, i dont think they would actually
assassinate him. he is too useful locked down where he is a threat, but not
a significant or overt one, just sitting there in the background. he is a
convenient excuse to start a small contained war whenever the US economy
needs a boost, and he is also a convenient scapegoat for many things....ppl
can point to him as an example of evil incarnate <:)> and they feel safer
knowing he lives 'way over there'.

.me
Message no. 7
From: Sidhe tirnanog@****.com
Subject: Intelligence Methods Part 1: Collection [LONG!]
Date: Tue, 1 Aug 2000 21:54:19 -0700
||[mailto:shadowrn-admin@*********.com]On Behalf Of DemonPenta@***.com
||Sent: 01 August 2000 21:24
||To: shadowrn@*********.com
||Subject: Re: Intelligence Methods Part 1: Collection [LONG!]

<SNIP>

||I thought it's existed since 1976? And...Mossad has the advantage of some
||SKILLED agents. They've been sloppy lately; Caught bugging Hamas in
||switzerland a while back, and botched a relatively simple assassination
||attempt a while back.

hehehe, Mossad has even posted want ads in papers in Israel openly
advertising for jobs in Mossad.
this is because of the screw ups. they are looking for patriotic
professsionals who can think.
i can't remember or find the link but it's a news story on CNN.com from
within the last week.

.me
Message no. 8
From: DemonPenta@***.com DemonPenta@***.com
Subject: Intelligence Methods Part 1: Collection [LONG!]
Date: Wed, 2 Aug 2000 10:23:52 EDT
In a message dated 8/2/00 1:53:56 AM Eastern Daylight Time,
sfuller@******.com.au writes:

> Funny you should say that. Pope John Paul II's predescessor, Pope John (some
> number) was a noted communist, and spoke out for communism in Europe. On
the
> night of his canonisation, he was having drinks with some high up friend
> (archdeacon?) Anyway, the other guy drank first, and keeled over dead. At
> first they said that it was poison, but the story quickly changed to heart
> failure. A week later, the Pope also died of heart failure, vital evidence
> vanished (like his bedside water jug), and an ambulance arrived on the
scene
> within minutes, even though the nearest ambulance centre was about 40
> minutes away (Rome and the Vatican being very covoluted street-wise).

<kersnip>

Um. I might note. It was, actually, John Paul I who died...and, oh yeah.
He died after 33 days. Which show was this, anyway? (Keep in mind, most of us
are in the US, deeply remember with frightened thoughts ALL of William
Shatner's acting attempts, etc., and are less than likely, I imagine, to take
anything people have HIM say as truth or near-truth.)

John
Message no. 9
From: James Mick sinabian@********.net
Subject: Intelligence Methods Part 1: Collection [LONG!]
Date: Wed, 2 Aug 2000 10:33:30 -0400
>He died after 33 days. Which show was this, anyway? (Keep in mind, most of
us
>are in the US, deeply remember with frightened thoughts ALL of William
>Shatner's acting attempts, etc., and are less than likely, I imagine, to
take
>anything people have HIM say as truth or near-truth.)
>
>John
>
>
>

Actually his acting wasn't that bad...so long as he wasn't trying to be
anything other than Captain Kirk or William Shatner. He tried funny...sucked
at funny. Tried action (anybody remember TJ Hooker?!? ::voms::)...sucked at
action. Did okay at sci-fi though. It's just his niche. Singing AIN'T!!!
::huge voms::
Message no. 10
From: Simon and Fiona sfuller@******.com.au
Subject: Intelligence Methods Part 1: Collection [LONG!]
Date: Thu, 3 Aug 2000 12:11:01 +1000
-----Original Message-----
From: DemonPenta@***.com <DemonPenta@***.com>
To: shadowrn@*********.com <shadowrn@*********.com>
Date: Thursday, August 03, 2000 12:24 AM
Subject: Re: Intelligence Methods Part 1: Collection [LONG!]


> Um. I might note. It was, actually, John Paul I who died...

It was? I thought he came earlier. Never mind.

>and, oh yeah.
>He died after 33 days. Which show was this, anyway? (Keep in mind, most of
us
>are in the US, deeply remember with frightened thoughts ALL of William
>Shatner's acting attempts, etc., and are less than likely, I imagine, to
take
>anything people have HIM say as truth or near-truth.)
>
It was some conspiracy special about secret agents. It was an American show.
Mr Shatner didn't act that I know of, he just narrated (and I was being
sarcastic). I didn't watch most of it, it was mostly about setting people up
to have sex with women while the secret agents had their cameras rolling,
and subsequent blackmailing. Lots of fuzzy green tinted boobs and other
stuff to titlate the plebs. The pope bit caught my attention when I came
into the room to turn the TV off.
Message no. 11
From: Scott Christian Simmons SCSimmons9@******.com
Subject: Intelligence Methods Part 1: Collection [LONG!]
Date: Thu, 3 Aug 2000 13:15:42 -0700 (PDT)
On Wed, 2 Feb 2000 15:52:08 +1100, Simon & Fiona wrote:

> Funny you should say that.

<snip weird conspiracy theory>

"You know you've been playing too many dark-future and conspiracy games when
..."

-Scott C. Simmons
"Laziness in doing stupid things can be a great virtue." (James Hilton,
_Lost Horizon_)





_______________________________________________________
Say Bye to Slow Internet!
http://www.home.com/xinbox/signup.html

Further Reading

If you enjoyed reading about Intelligence Methods Part 1: Collection [LONG!], you may also be interested in:

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.