Terrorist caught in Wisconsin

The Associated Press reports this story as a “river ambush”.

Was this an act of terror?

A dragnet ended Friday with the arrest of a man accused of emerging from woods in camouflage and opening fire with an assault rifle on a group of young swimmers who had gathered at a river. Three were killed and another wounded.

Scott J. Johnson, 38, was in camouflage as he walked out of some woods near the scene of the shooting and dropped his weapon as officers approached, said Jerry Sauve, chief’s sheriff’s deputy in Marinette County.

Seems to have been a terror motive but perhaps it is too early to tell.

Brings to mind the recent shooting in Tennessee, where the attacker killed two people in a church for being too liberal

[Police Chief] Owen said at a Monday news conference that police had recovered a four-page letter in which accused gunman Jim Adkisson, 58, expresses his hatred of liberals and indicated he would keep shooting until police killed him.

Another US veteran who turns to terrorism at home? Joe Lauria seems to say yes. Given that the killer’s house was filled with material associated with well-known anti-liberal groups, the question should become 1) how culpable a group becomes when and if they advocate action against another group and 2) how all the new domestic surveillance will come into play. Humor and commentary of speech obviously plays a confusing role here, as does the privacy of one’s reading choices. If we can ever get beyond those quagmire issues, the shotgun was purchased only a month before the attack. Tragedy, yes. Terrorism?

Symmetric Key Services Markup Language 1.0

Our Enterprise Key Management Infrastructure (EKMI) Technical Committee (TC) has finally been approved by OASIS to release our specification to the public.

Symmetric Key Services Markup Language (SKSML) Version 1.0 public review started July 24 2008 and will end 23 September 2008.

Comments may be submitted to our TC by anyone on the OASIS TC comment system .

Submitted comments (for this work as well as other works of that TC) are
publicly archived. Please note that comments submitted to OASIS are subject to the OASIS Feedback License, which ensures that the feedback you provide carries the same obligations at least as the obligations of the TC members.

The specification document and related files are available here:

Editable Source (Authoritative):
http://docs.oasis-open.org/ekmi/sksml/v1.0/pr01/SKSML-1.0-Specification.odt

PDF:
http://docs.oasis-open.org/ekmi/sksml/v1.0/pr01/SKSML-1.0-Specification.pdf

HTML:
http://docs.oasis-open.org/ekmi/sksml/v1.0/pr01/SKSML-1.0-Specification.html

Schema:
http://docs.oasis-open.org/ekmi/sksml/v1.0/pr01/schema/

Abstract:
This normative specification defines the first (1.0) version of the Symmetric Key Services Markup Language (SKSML), an XML-based messaging protocol, by which applications executing on computing devices may request and receive symmetric key-management services from centralized key-management servers, securely, over networks. Applications using SKSML are expected to either implement the SKSML protocol, or use a software library – called the Symmetric Key Client Library (SKCL) – that implements this protocol. SKSML messages are transported within a SOAP layer, protected by a Web Services Security (WSS) header and can be used over standard HTTP securely.