This site is at the moment not updated regularly.

Regarding E5: The security mailing list is "by invitation only", addressing a closed group of friends and security professionals.

(edited 2008-09-30)

All telecommunications and automated information systems and related equipment are for the  communication, transmission, processing, and storage of information only. The systems and equipment are subject to authorized monitoring to ensure proper functioning, to protect against unauthorized use, and to verify the presence and performance of applicable security features. Such monitoring may result in the acquisition, recording, and analysis of all data being communicated, transmitted, processed, or stored in this system by a user. If monitoring reveals possible evidence of criminal activity, such evidence may be provided to law enforcement personnel. Anyone using this system expressly consents to such monitoring.