|
This file is available on a Cryptome DVD offered by Cryptome. Donate $25 for a DVD of the Cryptome 10-year archives of 35,000 files from June 1996 to June 2006 (~3.5 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, cryptome2.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost. | |||
21 June 1997
Source: William H. Payne
See related documents: http://jya.com/whpfiles.htm
FILED
UNITED STATES DISTRICT COURT
DISTRICT OF NEW MEXICO
97 JUN -4 1:55
Robert M. March
CLERK-ALBUQUERQUE
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEW MEXICO
William H. Payne )
Arthur R. Morales )
)
Plaintiffs, )
v ) CIV N0 97 0266 SC/DJS
)
Lieutenant General Kenneth A. Minihan, USAF )
Director, National Security Agency )
National Security Agency )
)
Defendant )
MOTION FOR SUMMARY JUDGMENT
1 COMES NOW plaintiffs Payne [Payne] and Morales [Morales]
[Plaintiffs], pro se litigants to exercise their right
guaranteed under the Rules of Civil Procedure,
Rule 56 Summary Judgment
(a) For Claimant. A party seeking to recover upon a
claim, ... or to obtain a declaratory judgment may, at
any time after the expiration of 20 days from the
commencement of the action or after service of a motion
for summary judgment by the adverse party, move with or
without supporting affidavits for a summary judgment in
the party's favor upon all or any part thereof. ...
(c) Motion and Proceeding Thereon. The motion shall be
served at least 10 days before the time fixed for the
hearing. The adverse party prior to the day of hearing
may serve opposing affidavits. The judgment sought shall
be rendered forthwith if the pleading, deposition, answer
to interrogatories, and admission on file, together with
the affidavits, if any, show that there is no genuine
issue as to any material fact and that the moving party is
entitled to a judgment as a matter of law.
2 Sandia National Laboratories [Sandia] has as it main charter
duties development and maintenance of the non-nuclear parts
of nuclear weapons. This includes implementation of the
electronic cryptographic locks used to secure the weapons.
The National SecuritY AGency [NSA] supplies the
1
algorithms and implementation guidelines to Sandia. But delegated
implementation to Sandia at about the start of the Cold War.
As a result some Sandian, including Payne, had access to NSA
crypto algorithms and implementation guidelines.
3 At issue in this FOIA lawsuit is the release of documents
showing
1 deficient NSA crypto technical expertise and
ability,
2 spy sting tactical battlefield messages given
to Iraq during the Iran/Iraq war.
NSA got caught in this spy sting. Swiss and other crypto units
were spiked so that the crypto key was transmitted with the
cipher text.
4 There is NO GENUINE ISSUE AS TO ANY MATERIAL FACT and
THE MOVING PARTY IS ENTITLED TO A JUDGMENT AS A MATTER OF LAW.
NSA merely seeks to hide behind the veil of classification abuse
or improper influence of the court.
5 The view that NSA and the government attempts to improperly
control cryptography but lacks ability and expertise in this field
is supported by lawyer from Electronic Privacy Information Center,
Marc Rotenberg. Rotenberg writes,
Date: Tue, 3 Jun 1997 09:13:29 -0500
From: Marc Rotenberg <rotenberg@epic.org>
http://www.wired.com/wired/4.05/idees.fortes/eurocrats.html
Eurocrats Do Good Privacy
Marc Rotenberg
Late last November, David Chaum received the Information
Technology European Award for 1995. The prize, given for
DigiCash's ecash technology, consisted of a trophy plus
2
200,000 ecu (approximately US$250,000). Chaum is best known
for the development of anonymous payment schemes that are
becoming increasingly popular in Europe for everything from
online commerce to highway toll systems.
At about the same time that Chaum received the prestigious
award, Phil Zimmermann, inventor of the popular Pretty Good
Privacy encryption program, sat in his Boulder, Colorado, home
wondering whether the US government would make good on its
threat to prosecute him for trafficking in munitions. Although
federal prosecutors announced recently that they will drop
the case against Zimmermann, the prospects that he will get
a big cash award from the US government anytime soon are less
than slim.
The contrast between a decorated cryptographer in Europe and
one trying to avoid prosecution in the United States is more
than curious. It shows that governments, at least some
governments, can be a force for progress in the crypto world.
Reread that sentence. It is not conventional wisdom in the
United States. Cyberlibertarians have been unrelenting in their
opposition to any federal role in crypto policy. Free marketers
argue simply that there is no place for government in the
development of high-tech products. ...
Of course, the Clipper debacle provides plenty of
ammunition for these arguments. Clipper combined in
equal measure government arrogance, technological
incompetence, and profound disregard for the rights
of citizens. As an exercise in public policy, it ranks
somewhere between the Bay of Pigs and the CIA's
experiments with psychics.
And this is one of the subject of the FOIA lawsuit.
NSA "technological incompetence" also discovered at Sandia
National Laboratories.
6 Payne, in a Sandia-approved unclassified report, took the
opportunity to also point out generic deficiencies in NSA crypto
algorithms and implementation guidelines.
Sunday June 1 the report, in its entirety including schematics,
source code. and mechanical drawings, was posted on Internet at
jya.com, click Cryptome at,
whpda.htm Data Authenticator for the Deployable Seismic
Verification System, Rev. June 1, 1997 (98K)
3
About 2,500 International readers access jya.com EACH DAY.
7 Payne, who helped Sandia build the Missile Secure Cryptographic
Unit [MSCU], wrote a Sandia-approved book on the software
technology Payne's group used for that task. And that Payne used
for the Comprehensive Test Ban Treaty data authenticator.
Source code and documentation accompanying Payne book was
posted at jya.com at,
whpf86.htm Payne: Embedded Controller Forth for the
8051 Family, May 31, 1997
Code from Payne's book was previously posted on computer bbss
all over the world.
A fellow from Nova Scotia told Payne he downloaded the code and
documentation from a computer bbs located in Portugal.
8 Payne, after his wrote this book, learned from NSA employee
Donald Simard that the Forth was used by the former USSR to
program it bombs and other weapon systems.
9 Thursday April 3, 1997, Switzerland, Zurich, Sood-
Oberleimbach, Payne speaks to many Germans, some Belgians, a
few Swiss, and one Russian about technical details in high tech
espionage.
10 Sunday April 6, 1997, Zurich airport, Payne has a phone long
talk with Hans Buehler at his home in Oerlikon.
Buehler spent 9.5 months in an Iranian military prison as a
result of getting snared in the NSA crypto spiking spy sting
against Iran.
Payne and Buehler speak of settlement techniques.
11 The technical world knows the details of the uncovered NSA spy
sting.
4
12 Summary judgment should be awarded the Plaintiffs as a result
of good business sense, in addition to law, too.
If the US is hit with a retaliatory anti-terrorist attack, then
aggrieved relatives of US victims will hold the US government
responsible for not having settled with the aggrieved its
aggrieved victims.
13 The aggrieved victims, too, would surely consider a
financial settlement superior to some other sort of settlement.
Other forms of settlements, might bring another retaliatory
military strike by the US, similar to those made against Libya
'terrorist centers' for allegedly bombing PAN AM 103 and Iraq
for allegedly trying to kill former President Bush.
13 Payne, too, was caught in a NSA operation.
James Bamford in his book, The Puzzle Palace, writes,
Meanwhile, as the Agency [NSA] continued it public campaign,
it was also making significant headway on its second front -
the quiet, behind-the-scenes effort to gain control from the
National Science Foundation of all cryptographic funding.
By controlling the dollars, the NSA would control the
research. ...
On Thursday, August 14, Leonard Adelman, a theoretical
computer scientist at MIT and one of the fathers of
public-key cryptography received a telephone call from Bruce
Barns of the NSF. To his surprise Barns told him that the NSF
had decided not to fund part of his grant proposal. When asked
why, Barns merely said something about an "interagency matter."
14 April 1978, Communications of the ACM publishes [copy attached
as Exhibit A] Orderly Enumeration of Nonsingular Binary Matrices
Applied to Text Encryption by W. H. Payne and K. L. McMillen.
Footnote reads, Work funded by NSF Grant DCR75-08822.
Bruce Barns was NSF monitor of grant DCR75-08822.
Grant DCR75-08822 was not renewed.
5
WHEREFORE, Plaintiffs pray this court to,
15 GRANT summary judgment to Plaintiffs for release of documents
so that documents can be posted at jya.com.
This posting will serve as an admission by NSA of an unfortunate
event. And that the NSA now wishes to begin settlement with the
aggrieved relatives of its victims.
16 DIRECT defendant to issue a written letter of apology to the
aggrieved victims of NSA's spy stings. This letter will, of course,
be posted on jya.com.
17 AWARD Plaintiff Payne $500,000 for his more than 10 year effort
at Sandia to penetrate, then expose, NSA for deficient crypto work,
lost wages, and legal work.
18 AWARD Plaintiff Morales $20,000 his about four years legal work
with Payne to bring this lawsuit.
19 CONSIDER the alternatives of failure to settle.
20 GRANT such other relief as the Court may deem just and
proper.
Respectfully submitted,
[Signature]
William H.Payne
13015 Calle de Sandias NE
Albuquerque, NM 871111
[Signature]
Arthur R. Moralles
1024 Los Arboles NW
Albuquerque, NM 87107
Pro se litigants
CERTIFICATE OF SERVICE
I HEREBY CERTIFY that a copy of the foregoing demand was mailed
6
to Lieutenant General Kenneth A. Minihan, USAF, Director,
National Security Agency, National Security Agency, 9800 Savage
Road, Fort George G. Meade, MD 20755-6000 and hand delivered to
John J. Kelly, US Attorney, 525 Silver SW, ABQ, NM 87102 this
Wednesday June 4, 1997.
[Signature: W H Payne]
7
Communications of the ACM, April 1978, Volume 21, Number 4, pp. 259-263.
Scientific Applications
F.N. Fritsch Editor
W. H. Payne and K. L. McMillen
Washington State University
[Abstract]
Nonsingular binary matrices of order N, i.e., nonsingular over the field {0, 1), and an initial segment of the natural numbers are placed in one-to-one correspondence. Each natural number corresponds to two intermediate vectors. These vectors are mapped into a nonsingular binary matrix. Examples of complete enumeration of all 2 x 2 and 3 x 3 nonsingular binary matrices were produced by mapping the intermediate vectors to the matrices.
The mapping has application to the Vernam encipherment method using pseudorandom number sequences. A bit string formed from bytes of text of a data encryption key can be used as a representation of a natural number. This natural number is transformed to a nonsingular binary matrix. Key leverage is obtained by using the matrix as a "seed" in a shift register sequence pseudorandom number generator.
Key Words and Phrases: binary matrices, combinatorics, combinations, nonsingular matrices, encryption, Vernam, pseudorandom numbers, feedback shift register sequences, random numbers.
CR Categories: 3.7, 5.3
___________________________
General permission to make fair use in teaching or research of all or part of this material is granted to individual readers and to nonprofit libraries acting for them provided that ACM's copyright notice is given and that reference is made to the publication, to its date of issue, and to the fact that reprinting privileges were granted by permission of the Association for Computing Machinery. To otherwise reprint a figure, table, other substantial excerpt, or the entire work requires specific permission as does republication, or systematic or multiple reproduction.
Computer time and supplies were purchased with NSF money from Finch's Wheatland Realty, Pullman, Washington. Work funded by NSF Grant DCR75-08822.
Authors' Address: Department of Computer Science, Washington State University, Pullman, WA 99164.
© 1978 ACM 0001-0782/78/0400-0259 $00.75
Introduction
Functions that map combinatorial configurations onto the integers are often useful. The Julian Day Number is a map of the Gregorian calendar onto the integers. The inverse function which maps the Julian Day Number onto the Gregorian calendar is also known [13]. Less well known are functions which map permutations and combinations onto the integers [6]. Such maps usually require that the permutation or combination first be mapped onto an intermediate vector. This vector is then mapped onto the integers. In the case of permutations the vector is the factorial digits. For combinations the digits are the combinatorial digits of given nome, [6].
Algorithms which map combinatorial configurations onto the intermediate vectors are generally not unique. Many algorithms are known which map permutations onto the factorial digits [4, 6]. Similarly, many algorithms are known which map combinations onto the combinatorial digits of given nome and conversely [2, 3, 5, 6, 8, 12].
The purpose of this paper is to establish a one-to-one correspondence between an initial segment of the natural numbers and nonsingular binary matrices or order N. That is, matrices of order N which are nonsingular over the Galois field of order 2, GF(2). Each such integer is first mapped onto two intermediate vectors. An algorithm is presented which maps the two intermediate vectors onto a unique nonsingular zero-one matrix of order N. The map of successive integers gives the orderly enumeration of all nonsingular binary matrices of order N. The algorithm has application to text encryption using the Vernam encipherment method employing pseudorandom number sequences.
A nonsingular binary matrix is used as a "seed" for generalized feedback shift register pseudorandom number generator. The integer representation of a text string key is mapped into a seed matrix.
Vernam encipherment uses a randomly generated stream of bits. Encoding of the message is accomplished by exclusive-or'ing the random bit stream and the message text. Decrypting the cipher text requires knowledge of the random bit stream. The cipher key is the entire random bit stream.
Pseudorandom number sequences are often substituted for the random bit stream for the Vernam encryption method. The encryption key is the starting "seed" required by the pseudorandom number generator.
*****
[Balance of 5-page article omitted.]
[End 4 June 1997 Motion]
FILED
UNITED STATES DISTRICT COURT
DISTRICT OF NEW MEXICO
97 JUN -9 1:08
Robert M. March
CLERK-ALBUQUERQUE
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEW MEXICO
William H. Payne )
Arthur R. Morales )
)
Plaintiffs, )
v ) CIV N) 97 0266
) SC/DJS
)
Lieutenant General Kenneth A. Minihan, USAF )
Director, National Security Agency )
National Security Agency )
)
Defendant )
MOTION TO ACCEPT DISCOVERY PLAN OF PLAINTIFFS
AS AN UNOPPOSED MOTION BEFORE THE COURT
1 COMES NOW plaintiffs Payne [Payne] and Morales [Morales]
[Plaintiffs], pro se litigants to exercise their rights
guaranteed under the Constitution and the Rules of Civil
Procedure.
2 INITIAL SCHEDULING ORDER FILED May -2 1997 stated,
The parties, appearing through counsel or pro se, shall "meet
and confer" no later than May 14, 1997 to formulate a provisional
discovery plan. Fed.R.Civ.P.26(f). The time for discovery,
generally 120 and 150 days, will run from the Rule 16 initial
scheduling conference. The provisional discovery plan shall be
filed with the Court no later than May 23, 1997. The parties
will cooperate in preparing an Initial Pre-Trial Report (IPTR)
which will follow the IPTR form obtainable from the Court Clerk.
The blanks for dates should not be filled in
3 Assistant US Attorney Jan Elizabeth Mitchell [Mitchell] declined
to meet with Plaintiffs.
4 MINUTE ORDER, FILED 97 JUN stated,
IT IS ORDERED that the Initial Pre-Trial Report filed by
Plaintiff,William Payne, on May 23, 1997, be and hereby is,
stricken and returned to William Payne for failure to comply with
the Scheduling Order filed by Magistrate Svet.
ROBERT M. MARCH, Clerk
1
By: Margret Montoya
Courtroom Clerk
5 Thursday June 5 Magistrate judge Svet [Svet] learns that Mitchell
did not sign Payne's IPTR.
6 Svet orders parties to file signed IPTR with five days.
7 5/23/97, Item 9, docket sheet, 97cs266, June 5, 1997 10:10 logs
MOTION by plaintiff to accept discover plan [MOTION].
8 MOTION includes the quotations and statements
1 Admissions
Rule 36. Request for admission (a) A party may serve upon
any other party a written request for the admission, for the
purposes of the pending action only, of the truth of any
matters within the scope of Rule26(b) set forth the request
that relate to statements or opinions of fact or of the
application of law to fact including the genuineness of any
documents described in the request. Copies of documents shall
be served with the request unless they have been or
otherwise furnished or made available for inspection and
copying. The request may WITHOUT LEAVE OF THE COURT,
be served upon the plaintiff after commencement of the action
and upon any other party with or after service of the summons
and complaint upon that party. ...
I capitalize WITHOUT LEAVE OF THE COURT.
2 Interrogatories Rule 33 Interrogatories to Parties
(a) Availability; Procedures for Use. Any party may serve upon
any other party written interrogatories to be answered by the
party served or, if the party served is a public or private
corporation or a partnership or association or governmental
agency, by any officer or agent, who shall furnish such
information as is available to the party. Interrogatories may
WITHOUT LEAVE OF THE COURT, be served upon the plaintiff after
commencement of the action and upon any other partY with
or after service of the summons and complaint upon that party. ...
I, again, capitalize WITHOUT LEAVE OF THE COURT.
3 Depositions
Rule 30 Deposition Upon Oral Examination (a) When Depositions
May be Taken. After commencement of the action, any party may
take the testimony of any person, including a party, by deposition
upon oral examination. Leave of court, granted with or without
notice, must be obtained ONLY if the plaintiff seeks to take a
deposition prior to the expiration of 30 days after service of the
summons and complaint upon any defendant or service made under
2
Rule 4(e), ...
I capitalize ONLY
9 Rule 26(f) Discovery Conference states,
(5) A statement showing that the attorney making the motion
has made reasonable effort to reach agreement with opposing
attorneys on the matters set forth in the motion. Each party
and each party's attorney are under a duty to participate
in good faith in the framing of a discovery plan if a plan is
opposed by the attorney for any party. Objections or additions
to matters set forth in the motion shall be served not later
than 10 days after the service of the motion.
10 Since MOTION was filed 5/23, this leaves 8 days in May. As of
Friday June 6 June NO,
Objections or additions to matters set forth in the motion
shall be served not later than 10 days after the service of
the motion.
means that US Attorney Mitchell has ACCEPTED plaintiffs' MOTION
by non-response since at least 14 days has elapsed.
11 Thursday June 5, 1997 Svet SUGGESTED,
No deposition will be taken until hearing or filing of
notice or supplemental motion.
Depositions will be taken with leave of court.
12 Plaintiffs took Svet statement in 11 mean that Plaintiffs
could only as conduct discovery approved by Svet.
13 Svet, at the Initial Scheduling Conference on June 5 instructed
Payne to produce a copy of LOCAL CIVIL RULES, UNITED DISTRICT
COURT, DISTRICT OF NEW MEXICO. Payne did this.
14 Payne read Svet from the Federal Civil Judicial Procedure and
Rules,
Rule 83. Rules By District Courts
Each district court by action of a majority of the judges thereof
may from time to time, after giving appropriate notice and an
opportunity to comment, make and amend rules governing its
practice NOT INCONSISTENT WITH THESE RULES.
3
15 LOCAL CIVIL RULES, UNITED DISTRICT COURT, DISTRICT OF
NEW MEXICO, page 11, 26.4 states,
Timing of Discovery and Initial Disclosures.
(a) A party may not seek discovery under these rules or the
Fed.R.Civ.P. before the initial scheduling conference except
except by agreement of all parties or by Court order.
16 Local Rule 26.4 appears to be inconsistent with Rules 83 and
26-37 of the Rules of Civil Procedure.
17 Svet's REQUEST for Plaintiffs to adopt rules for Discovery other
than the Rules 25-37 is UNACCEPTABLE to Plaintiffs.
WHEREFORE,
18 ACCEPT Plaintiffs' May 23, 1997 MOTION as an unopposed MOTION.
19 RESPECTFULLY INFORM Svet that Plaintiffs prefer to adhere to
Rule 26-37 to conduct Discovery.
20 STRIKE Local Rule 26.4 if it inconsistent with the Constitution
and Rules 26-37 of the Federal Civil Procedure.
21 GRANT such other relief as the Court may deem just and proper.
Respectfully submitted,
[Signature]
William H. Payne
13015 Calle de Sandias NE
Albuquerque, NM 87111
[Signature]
Arthur R. Morales
1024 Los Arboles NW
Albuquerque, NM 87107
Pro se litigants
CERTIFICATE OF SERVICE
I HEREBY CERTIFY that a copy of the foregoing demand was mailed
to Lieutenant General Kenneth A. Minihan, USAF, Director,
National Security Agency, National Security Agency, 9800 Savage
4
Road, Fort George G. Meade, MD 20755-6000 and hand delivered to
John J. Kelly, US Attorney, 525 Silver SW, ABQ, NM 87102 this
Monday June 9, 1997.
[Signature: W. H. Payne]
5
[End 9 June 1997 Motion]
COPY
FILED
at Santa Fe NM
JUNE 11 1997
ROBERT M. MARCH Clerk
UNITED STATES DISTRICT COURT
DISTRICT OF NEW MEXICO
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEW MEXICO
WILLIAM H. PAYNE, ARTHUR R. MORALES,
Plaintiffs,
v. CIV. NO. 97-266 SC/DJS
LT GEN. KENNETH A. MINIHAN,
et al.,
Defendants
ORDER
THIS MATTER comes before the Court sua sponte following an
Initial Scheduling Conference held June 5, 1997. The establishment
of deadlines for discovery and pre-trial pleadings is necessary for
the orderly hearing of this case. However, this case is not one in
which an Initial Pre-trial Report will assist the Court.
Accordingly, such a document will not be entered. Further, the
parties will not be permitted to undertake any discovery in this
matter absent Court permission. The parties shall submit any
proposed discovery to the Court for approval, accompanied by a
motion to permit discovery and a memorandum of points and
authorities explaining the need for that discovery.
IT IS THEREFORE ORDERED that the following deadlines are
hereby established:
1. The parties shall complete discovery necessary by
September 3, 1997.
2. Motions relating to discovery shall be filed no
1
later than September 23, 1997.
3. All pretrial motions regarding matters other than
discovery shall be filed by October 3, 1997.
4. The Pre-Trial Order shall be provided as follows:
Plaintiffs to Defendants by November 3, 1997;
Defendants to the Court by November 18, 1997.
IT IS FURTHER ORDERED that discovery in this matter shall only
be undertaken upon obtaining Court permission. The parties shall
submit any proposed discovery to the Court for approval,
accompanied by a motion to permit discovery and a memorandum of
points and authorities explaining the need for That discovery.
[Signature]
DON J. SVET
UNITED STATES MAGISTRATE JUDGE
2
[End 11 June 1997 Order]