From cherilynligiash at feist.com Wed Dec 1 02:40:16 2010 From: cherilynligiash at feist.com (Cherilyn Ligia) Date: Wed, 01 Dec 2010 03:40:16 -0700 Subject: No RX-Required to Order, Codeine 30/15mg for $203.70, 60/15mg for $385.80, 90/15mg for $562.50 jsu In-Reply-To: Message-ID: <4CF62610.31CFBEE8@feist.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://pillvergil63d.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 642 bytes Desc: not available URL: From felix at openflows.com Wed Dec 1 02:08:38 2010 From: felix at openflows.com (Felix Stalder) Date: Wed, 1 Dec 2010 11:08:38 +0100 Subject: Wikileaks: State Pulls the Plug On SIPRNet Message-ID: Seems like Assange's 'secrecy tax' is making itself felt. Felix State Pulls the Plug On SIPRNet November 29, 2010 at 9:26 pm http://swampland.blogs.time.com/2010/11/29/state-pulls-the-plug-on-siprnet/ Late last week, after Secretary of State Hillary Clinton informed the White House of the likely fall-out from the WikiLeaks cable dump, the White House came back with a question: bWhat's our corrective action?b Clinton's undersecretary for management, Patrick Kennedy, had a simple suggestion: pull the plug on SIPRNet [1], the classified DoD network that PFC Bradley Manning reportedly used to download the cables from State's inhouse classified database. bThe White House said do it,b says a senior administration official. The publication by WikiLeaks of more than 250,000 diplomatic cables, many of them classified, is forcing an administration-wide intelligence retrenchment as agencies reconsider how to balance the need to share with the need to know. With its third major dump of controversial classified information in nine months, WikiLeaks is single-handedly tipping the balance back towards inter-agency "stovepiping", or walling off information from other departments. Post 9.11 the imperative from Congress and the White House was to break down the bstovepipesb that prevented sharing across the so-called intelligence communitybthe sprawling collection of intelligence offices in more than a dozen different agencies across the U.S. government and around the world. At State, they created the bNet-Centric Diplomacy" database or NCD, where State stored classified information up to the top secret level. Agencies across government had access to that database through their own secure networks. In DoD's case the network, created in 1995, was called the Secure Internet Protocol Router Network, or SIPRNet. Late last week, at Kennedy's recommendation and the White House's approval, State disconnected SIPRNet from the NCD, senior administration officials tell Time. bObviously there were some gaps within SIPRNet that DoD is actively correcting,b the senior administration official says, bAnd as a temporary precaution we have disconnected SIPRNet from the NCD.b How long is temporary? DoD is investigating how Manning managed to download all those cables and get them to WikiLeaks, the senior administration officials tell Time. So far they have concluded that the failure came at Dod's Central Command, the combatant command responsible for the middle east, which employed Manning in Iraq. Prior to Manning's download, users of SIPRNet had been blocked from downloading data to removable media. But at some point that restriction was lifted across all of CentCom. DoD has been reimposing restrictions since the July dump of Afghanistan war documents by WikiLeaks. DoD has blocked the use of removable media; they have required in some cases a bdual keyb system that requires a second user to approve moving data from a higher classification system to a lower classification system; and they are installing software programs to monitor unusual activity. DoD is not completely cut off from State's database. A separate system for the transmission of top secret information, the Joint Worldwide Intelligence Communications System or JWICS [2], is still linked to the NCD. And State may reconnect SIPRNet in the future. bOnce DoD has gone through and made its corrections on SIPRNet we'll reevaluate whether to reconnect,b the senior administration official says. [1] http://www.fas.org/irp/program/disseminate/siprnet.htm [2] http://www.fas.org/irp/program/disseminate/jwics.htm --- http://felix.openflows.com ----------------------- books out now: *|Deep Search.The Politics of Search Beyond Google.Studienverlag 2009 *|Mediale Kunst/Media Arts Zurich.13 Positions.Scheidegger&Spiess2008 *|Manuel Castells and the Theory of the Network Society. Polity, 2006 *|Open Cultures and the Nature of Networks. Ed. Futura/Revolver, 2005 # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Dec 1 02:49:53 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 1 Dec 2010 11:49:53 +0100 Subject: Wikileaks: State Pulls the Plug On SIPRNet Message-ID: <20101201104953.GZ9434@leitl.org> ----- Forwarded message from Felix Stalder ----- From eugen at leitl.org Wed Dec 1 03:27:26 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 1 Dec 2010 12:27:26 +0100 Subject: Arm Release 1.4.0 Message-ID: <20101201112726.GG9434@leitl.org> ----- Forwarded message from Damian Johnson ----- From 0-tp01jackson at email.uophx.edu Wed Dec 1 07:28:05 2010 From: 0-tp01jackson at email.uophx.edu (HolidayLuxurySale) Date: Wed, 1 Dec 2010 12:28:05 -0300 Subject: Half Off on Everything in Stock Message-ID: <8192481009.IWAN8LZE286807@lhepctn.avvbysavefu.biz> http://tuaurl.com/b43e3e7 http://urlzen.com/2877 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 219 bytes Desc: not available URL: From coderman at gmail.com Wed Dec 1 13:35:24 2010 From: coderman at gmail.com (coderman) Date: Wed, 1 Dec 2010 13:35:24 -0800 Subject: any moment now ... In-Reply-To: <20101130223458.GY9434@leitl.org> References: <20101130112447.GV9434@leitl.org> <20101130204625.GX9434@leitl.org> <20101130223458.GY9434@leitl.org> Message-ID: On Tue, Nov 30, 2010 at 2:34 PM, Eugen Leitl wrote: > ... > This is interesting to me personally. How would you run > a Tor node anonymously, without breaking the bank? > > Apart from offshore incorporation or finding a host that > takes cash or anonymous prepaid cards it appears not obvious. there are a lot who do take anonymous pre-paid cards. i've been using this method for years for servers and other services. purchase the cards with cash or barter. you can load up to $500 without difficulty. you pay a $5 or so fee per card; avoid anything that charges percentages loaded. you have a year to use it, usually, before fees start whittling down the balance. you can register the cards on-line with privacy preserving billing detail. be sure to consider country/state of billing address if this matters for your purchase. (note that Tor is not the only anonymous option for this :) once registered with card holder name, address, use as you would any other Visa/MC/Amex... (there once was a company called CoinStar. they let you feed bills into a kiosk to load cash onto Visa plastic which it spat out right there. you could add currency to an existing card just the same. alas, they had to change their model due to pressures. while it is hard to find prepaid systems this convenient and privacy empowering, they do come round now and then. still, point-of-sale purchase is not so bad compared to the alternatives...) From gogo at bak.ru Wed Dec 1 00:57:17 2010 From: gogo at bak.ru (Quinn Caron) Date: Wed, 1 Dec 2010 14:27:17 +0530 Subject: =?koi8-r?B?9PXy+SDJIPD19OX36+kgLSDM1d7bycUgw8XO2SDOwSDU1dLZINMg5OX0?= =?koi8-r?B?+O3pICjwwcvF1NkgLSAxKzEsIDErMiwgMisxLCAyKzIpLiAg?= Message-ID: <77408FEAEBD644D1A9FD5B742B66F3F7@krina> ГОРЯЩИЕ ТУРЫ И СПЕЦИАЛЬНЫЕ ПРЕДЛОЖЕНИЯ от 350 туристических операторов по лучшим ценам Сеть офисов в Москве ТЕЛЕФОННЫЙ ЦЕНТР - +7 (495) 646 85 36 (КРУГЛОСУТОЧНО / БЕЗ ВЫХОДНЫХ) Офисы работают с 10:00 до 21:00. Лента туров обновляется каждые 15 минут. Всегда в наличии более 1000 горящих туров и специальных предложений ПРЕДЛОЖЕНИЯ ДО 500 У.Е. - Египет, Шарм-Эль-Шейх - 390 у.е - Турция, Белек - от 320 у.е - Индия, ГОА - от 470 у.е. - Чехия, Прага - от 280 евро - Италия, Рим - от 480 евро - Австрия, Вена - от 320 евро - Франция, Париж - от 490 евро ЭКЗОТИЧЕСКИЕ ТУРЫ - Тайланд, Паттайя - от 490 у.е - Шри-Ланка - от 750 у.е - Доминикана - Пунта-Кана - 920 у.е - Куба - Варадеро - от 980 у.е - Мальдивы - от 1 300 у.е - Бали - от 1 250 у.е СПЕЦИАЛЬНЫЕ ПРЕДЛОЖЕНИЯ НА НОВЫЙ ГОД И РОЖДЕСТВО - ГОА, ДОМИНИКАНА,КУБА, ПРАГА, ГОРНОЛЫЖНЫЕ ТУРЫ - БОЛЕЕ 300 ПРЕДЛОЖЕНИЙ ГОРНОЛЫЖНЫЕ ТУРЫ (скидка на группы от 6 человек) - Австрия - от 600 евро - Болгария - от 390 евро - Италия - от 550 евро - Россия - от 6000 рублей - Турция - от 450 у.е - Финляндия - от 380 евро - Франция - от 630 евро - Швейцария - от 670 евро Сеть офисов в Москве ТЕЛЕФОННЫЙ ЦЕНТР - +7 (495) 646 85 36 (КРУГЛОСУТОЧНО / БЕЗ ВЫХОДНЫХ) Офисы работают с 10:00 до 21:00. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2874 bytes Desc: not available URL: From eugen at leitl.org Wed Dec 1 06:14:28 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 1 Dec 2010 15:14:28 +0100 Subject: The Pirate Bay Co-Founder Starting A P2P Based DNS To Take On ICANN Message-ID: <20101201141428.GL9434@leitl.org> (So what's wrong with http://127.0.0.1:3456/uri/URI%3ADIR2%3Adjrdkfawoqihigoett4g6auz6a%3Ajx5mplfpwexnoqff7y5e4zjus4lidm76dcuarpct7cckorh2dpgq/ ?) http://digitizor.com/2010/12/01/the-pirate-bay-co-founder-starting-a-p2p-based-dns-to-take-on-icann/ The Pirate Bay Co-Founder Starting A P2P Based DNS To Take On ICANN Written by Ricky on December 1st, 2010 Link to this post The Pirate Bay Co-Founder, Peter Sunde, has started a new project which will provide a decentralized p2p based DNS system. This is a direct result of the increasing control which the US government has over ICANN. The recent seizures of around 80 domains by the US authorities only goes on to show the amount of influence the government have over the internet. There is a fear that if the US Senate passes the Combating Online Infringement and Counterfeits Act, such instances will increase b becoming a threat to an open internet. As long as there is a centralized root, there is always the possibility of interference from government and other agencies. To counter this threat what Peter Sunde is suggesting is a new Domain Name System based on peer to peer technology. Such a system will be completely decentralized and hence almost impossible for the government or any other agencies to control. The P2P-DNS is the name of the project which aims to do this. According to the projectbs wiki, this is how the project is described: P2P-DNS is a community project that will free internet users from imperial control of DNS by ICANN. In order to prevent unjust prosecution or denial of service, P2P-DNS will operate as a distributed and less centralized service hosted by the users of DNS. Temporary substitutes, (as Alpha and Beta developments), are being made ready for deployment. A network with no centralized points of failure, (per the original design of the internet), remains our goal. P2P-DNS is developing rapidly. This system will work only with a .p2p TDL, other TDLs will be passed through to be handled by the default DNS server. This is stated in the projectbs goal as: Create an application that runs as a service and hooks into the hostbs DNS system to catch all requests to the .p2p TLD while passing all other requests cleanly through. Requests for the .p2p TLD will be redirected to a locally hosted DNS database. While the idea of a completely decentralized internet free from the governmentbs interference is a very tempting one, it is not without its own sets of problems. One of them has to do with trust. With the current setup, we are putting our trust in the DNS servers like OpenDNS, Google DNS etc. to point us to the right direction when we want to access a website. With the scheme that P2P-DNS is proposing, we will have to rely on others in the network to direct us. It is one thing to trust OpenDNS, Google etc. but completely another thing to do the same with a random computer. Such a system is also harder to secure and tends to be slower. This is not the first time that an alternative Domain Name System has been proposed. Starting with AlterNIC in 1997, alternative DNS has had a controversial history. Many have ceased to function now because of the lack of adoption from users. However, coming right after the controversial seizure of 80 domains by the US government, P2P-DNS might just get enough support to make it a success. From buhg at ss53.ru Wed Dec 1 06:49:57 2010 From: buhg at ss53.ru (=?koi8-r?B?4sXMwdEg2sHS0MzB1ME=?=) Date: Wed, 1 Dec 2010 16:49:57 +0200 Subject: =?koi8-r?B?1c3FztjbwcXNINPU0sHIz9fZxSDX2s7P09k=?= Message-ID: <000d01cb9167$05b99ae0$6400a8c0@buhg> I3 Декабря 2010г. Методы оптимизации расходов на выплату белой зарплаты: уменьшаем страховые взносы +7 (код Москвы) 4Ч5*32_66 **** ЧЧ5/З968 Цель: С 2010 года единый социальный налог (ЕСН) отменен √ он заменен обязательными страховыми взносами в ФОМС, ФСС и ПФР, ставка которых с 2011 года составит 34% почти для всех налогоплательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала взносов заменена отменой их уплаты, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь √ назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1.Обзор изменений законодательства, связанных с заменой ЕСН обязательными страховыми взносами. Cколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2010-2011 гг. Какие схемы стали или станут невыгодными; у каких налогоплательщиков положение даже улучшается; в каком случае выплата зарплаты на спецрежимах сохраняет свою актуальность. 2.Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц, которые рассматриваются на семинаре. 3.Использование специальных налоговых режимов: * дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с кассовой дисциплиной и политикой ЦБ. Текущая ситуация с обложением таких доходов НДФЛ. 4.Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5.Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Страхование жизни работников и ДМС за счет предприятия. 6.Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. 7.Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 8.Использование процентных займов от физлиц. Расчет эффективности. 9.Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 10.Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, 11.Создание недоимки по налогам с ФОТ на фирме, не обремененной активами √ пример "серой" схемы (как нельзя "оптимизировать"!), 12.Способы подтверждения источников крупных расходов физлиц и когда это необходимо. Продажа имущества физическими лицами без НДФЛ через вклад в уставный капитал и ЕНВД. 13.Ответы на вопросы. По желанию √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. За более подробной информацuей обpащайтеcь по тел: 8 (495) 7-9-2/2_i*2_2 \\// 742/9l98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6799 bytes Desc: not available URL: From interoil at hunter-poliv.com.ua Wed Dec 1 03:53:25 2010 From: interoil at hunter-poliv.com.ua (=?koi8-r?B?7MXHxc7EydLP18HOycU=?=) Date: Wed, 1 Dec 2010 17:23:25 +0530 Subject: =?koi8-r?B?9cjPxMnNIM/UIM/U18XU09TXxc7Oz9PUySDTINDPzc/d2MAgzMXHxc7E?= =?koi8-r?B?ydLP18HOydE=?= Message-ID: <6FCE8F085E9049069DFC840804DA23BF@dinesh> 0З Декабря Модели построения легенды в налоговых схемах. Как избегать явные признаки налоговой схемы. Конкретные примеры Московский код; ЧЧ5/3968 \\// Ч/Ч5*Ч*0/95 Цель: Изучить понятие аффилированности: признаки, негативные последствия, способы ухода. Программа: Общие понятия. "Черные", "серые" и "белые" схемы. Деловые цели и легенды для обоснования "белых" схем, Постановление ВАС № 53. Для чего нужна "легенда" и кому ее рассказывать? Когда никакая "легенда" не спасет. Что такое аффилированность (взаимозависимость) лиц. Признаки аффилированности - прямые и косвенные. Негативные последствия аффилированности и когда она допустима. "Искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу", примеры его использования после собственно ЮКОСа, применение к "однодневкам"). Деловые цели, обосновывающие деление бизнеса. Что делать если аффилированность уже есть: три возможных модели поведения. Примеры из практики. Способы ухода от аффилированности. Использование номинальных учредителей и директоров компаний, ИП. Кто может быть номиналом? Номиналы-нерезидеты: юридические и физические лица. Траст: номиналы по закону, а не "по понятиям". Как защититься от номинала: юридические и экономические способы. Простое товарищество с физлицом-номиналом? Две модели построения легенды: "инициатива сверху" и "инициатива снизу". Косвенное документальное подтверждение легенды. Примеры. Явные признаки налоговой схемы и как их избегать. Примеры деловых целей и типовых обосновывающих их легенд для разных схем, в т.ч. для: отношений с недобросовестными поставщиками; завышенных или заниженных цен реализации; любого аутсорсинга; управляющей компании (или управляющего); ИП-бывших работников, в т.ч. для перевода коммерческого персонала в отдельное юрлицо или на ИП; выделения транспортного подразделения в отдельное юрлицо; разбиения ранее единого бизнеса - объяснение прямой или косвенной аффилированности  в прошлом или настоящем; посреднического договора или договора простого товарищества; платежей от нерезидентных компаний на счета физлиц; перехода на УСН; высоких процентов по долговым обязательствам или штрафных санкций; крупных расходов физлиц ("откуда деньги?"). Ответы на вопросы. По желанию – экспресс-анализ и разработка индивидуальных легенд для компаний-участниц семинара. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 Моск. код: 7.Ч2/9l_98 : 742*9i*98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3906 bytes Desc: not available URL: From edrigram at edri.org Wed Dec 1 09:41:33 2010 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 1 Dec 2010 19:41:33 +0200 Subject: EDRi-gram newsletter - Number 8.23, 1 December 2010 Message-ID: ============================================================ EDRi-gram biweekly newsletter about digital civil rights in Europe Number 8.23, 1 December 2010 ============================================================ Contents ============================================================ 1. Internet blocking - key decisions to be made by 3 February 2011 2. Data protection authorities call for a strict EU-US privacy agreement 3. The Pirate Bay founders lost their appeal in the Swedish Appeals Court 4. ICO started applying fines for Data Protection Act breaches 5. Azeri bloggers released from prison 6. Ireland: reshaping the law for the digital economy 7. Lack of net neutrality and open standards threaten the web 8. ENDItorial: EC Internal Security Strategy - My dog is a cat 9. Recommended Action 10. Recommended Reading 11. Agenda 12. About ============================================================ 1. Internet blocking - key decisions to be made by 3 February 2011 ============================================================ The legislative process on Internet blocking is about to move from almost standstill to almost completed between now and the beginning of February. In the Council of Ministers, an informal agreement is planned for the Justice Council in December, while the MEP in charge in the Parliament will present her draft report on 10 January 2011 with an informal orientation vote just three weeks later. Every civil society organisation that wants to stop web blocking and the damage that this will do for child protection must focus all available resources on the Civil Liberties Committee of the European Parliament between now and early February. Afterwards, it will be too late. The risk of damage to child protection is abundantly clear from the Working Document prepared by the MEP in charge of the dossier, Roberta Angelilli (Italy). She says: "We have to bear in mind that our priority is to eliminate these images for public access as quick as possible." The priority is not to identify the children, not to investigate the criminals, but to avoid public access via blocking, which does not even serve the purpose of stopping deliberate access. Bizarrely, Ms Angelilli also suggests that "the providers would be promptly informed about their rights to appeal against the decision". This assumes that there would be no immediate investigation - having been accused of having a website containing images of gross violations of children, the suggestion is a polite notice to the alleged criminal that he may wish to complain. In the Parliament, MEPs remain divided but the argument that blocking is a "complementary" measure, to be implemented with other measures (such as deletion and prosecution), rather than instead of them, is successful with many parliamentarians. The argument is working, despite the fact that there is no evidence of this being the case in countries that already have blocking. In the Council, Germany and Romania are fighting hard for blocking to remain optional for Member States. However France and Italy (coincidentally, countries that also have blocking for gambling and intellectual property) are campaigning for obligatory blocking with what one negotiator described as "missionary fervour". Most countries are remaining silent on the issue, meaning that they are passively having blocking imposed on them by the larger countries. The only large country to remain silent is Poland, and this silence will be crucial for the success of mandatory blocking, if it is maintained. In the Council, the current negotiating text reads as follows: "2. Where the removal of webpages containing or disseminating child pornography is not possible within a reasonable time, Member States shall take the necessary measures, including through non-legislative measures, to ensure that the blocking of access to webpages containing or disseminating child pornography is possible towards the Internet users in their territory. The blocking of access shall be subject to adequate safeguards, in particular to ensure that the blocking, taking into account technical characteristics, is limited to what is necessary, that users are informed of the reasons for the blocking and that content providers, as far as possible, are informed of the possibility of challenging it." This text raises three interesting points. Firstly, blocking through non-legislative measures has already been described as illegal by the European Commission in the impact assessment it prepared to accompany the proposals. In that text, the Commission assessed extra-judicial blocking as follows: "More problematic may be the compliance with the requirement that the interference in this fundamental right must be "prescribed by law", which implies that a valid legal basis in domestic law must exist" (page 30) before coming to the conclusion that "such measures must indeed be subject to law, or they are illegal" (page 37). The illegality of this approach is quite clear from the European Convention on Human Rights, which states that "the exercise of these freedoms, since it carries with it duties and responsibilities, may be subject to such formalities, conditions, restrictions or penalties as are prescribed by law and are necessary." The second interesting point refers to the last lines of the draft text. It suggests that a legal obligation is necessary for Member States to take the step of contacting the alleged criminals, accused of publishing pictures of children being abused on the Internet, and politely informing them that their page has been blocked and giving them the opportunity to complain, if they so wish. The final point is that Member States should do what they consider necessary, which means that, strictly speaking, this text places no obligations on anyone. Its only real purpose is to give Member States an excuse to introduce blocking, even via "self-regulatory" measures that are in breach of the European Convention on Human Rights and the Commission's own assessment of the legality of the measure. The civil society in Poland is pushing hard to demand that the government have the courage to take a position. EDRi-member the Panoptykon Foundation, along with representatives of the Kidprotect Foundation, the Modern Poland Foundation, the Foundation for Free and Open Source Software and the Interactive Advertising Bureau Poland appealed to the Prime Minister to ensure that Polish representation to the European Council takes a critical stance on the Child Exploitation Directive. In their appeal, the groups demanded proper action against the abuse, rather than the childish act of placing its hands before its eyes in the hope that the monsters would disappear. Illegal content must be removed and not hidden by the creation of a censorship infrastructure. Working document - Roberta Angelilli, Rapporteur - Proposal for a Directive of the European Parliament and of the Council on combating the sexual abuse, sexual exploitation of children and child pornography http://www.edri.org/files/angelilli_wd.pdf Proposal for a Directive of the European Parliament and of the Council on combating the sexual abuse, sexual exploitation of children and child pornography, repealing Framework Decision 2004/68/JHA http://www.europarl.europa.eu/meetdocs/2009_2014/documents/com/com_com%282010%290094_/com_com%282010%290094_en.pdf "Impact assessment": Accompanying document to the Proposal for a Council Framework Decision on combating the sexual abuse, sexual exploitation of children and child pornography, repealing Framework Decision 2004/68/JHA http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52009SC0355:EN:NOT Commission official explains the Commission's research (7.09.2010) http://www.youtube.com/watch?v=EpFpoXIdRQc Cybercriminals thank Commissioner Malmstrvm http://www.cybercriminalsociety.eu/index.php We are writing to the Prime Minister: Do not to block the Internet! (only in Polish, 30.11.2010) http://www.panoptykon.org/content/piszemy-do-premiera-nie-dla-blokowania-internetu Civil Society Appeal (only in Polish, 29.11.2010) http://panoptykon.org/sites/default/files/Panoptykon_List%20do%20premiera%20blokowanie_29.11.2010.pdf Council draft negotiating text (26.11.2010) http://www.statewatch.org/news/2010/nov/eu-council-sexual-exploitation-16958-10.pdf (contribution by Joe McNamee - EDRi) ============================================================ 2. Data protection authorities call for a strict EU-US privacy agreement ============================================================ As the European Commission prepares to conclude a deal with the US on the protection of personal data exchanged in police and criminal justice cooperation matters, the European privacy watchdogs call for a strict and clear privacy agreement. Article 29 Data Protection Working Party (WP) sent a letter on 18 November 2010 to the three European main institutions (Council, Commission and Parliament) expressing its concerns for not having been consulted on the development of the discussion within the Council and European Parliament over the draft negotiation mandate presented by the European Commission on 25 May 2010, voicing certain concerns and giving its recommendations. Referring to the agreement as "an umbrella agreement" that should cover all existing and future deals between the EU and the US and any other state as well as between EU member states, the WP emphasizes the fact that it should comply with the EU data protection framework including the Charter of Human Rights. WP recommends that the agreement be widely applicable for a "coherent and high level of data protection" and a clear purpose limitation be imposed. "This means the agreement should be applicable to all transfers of personal data to prevent, detect, investigate and prosecute serious transnational crime and terrorist acts. This purpose should be clearly defined by the agreement, preferably including a definition of 'law enforcement purposes'". In the WP's opinion, a national security exception for the transfer of data concerning "essential national security interests and specific intelligence activities in the field of national security" should not be considered. Furthermore, the WP urges the Commission to obtain the retroactive application of the future agreement to cover "all existing multilateral and bilateral agreements between the EU and/or its Member States and the US, unless the current level of data protection is higher than the level of protection offered by the EU-US general agreement." A maximum 3-year transition period could be acceptable. Having in view the privacy issues raised by the TFTP II Agreement (so called SWIFT) allowing the US to obtain access to information on international bank transfers, the WP stresses the need for data protection safeguards in the future agreement, including "full, effective and enforceable rights for all individuals, including both administrative and judicial redress, and limitations to bulk transfers." On 24 November, LIBE (Civil Liberties, Justice and Home Affairs) Committee of the European Parliament Chairman also sent a letter to the EU Council on the future EU-US agreement regarding the protection of personal data that are transferred and processed in the framework of police and judicial cooperation in criminal matters. The letter reiterates the support of the European Parliament for the data protection agreement draft mandate and reminds the urgent need of such an agreement between the EU and US that should cover personal data exchanges as well as an "early start to negotiations on enforceable data protection rights" in compliance with the EU Charter of Fundamental Rights and EU Data Protection Directive. LIBE held on 25 October 2010 a public hearing on Data Protection in a Transatlantic Perspective - Future EU-US data protection agreement in the framework of police and judicial cooperation in criminal matters - with MEP Sophia In't Veld as chairperson. While the US Ambassador to the EU assured that the US believed both parties had to "safeguard their citizens' security to the same degree to which they protect their liberties" and there was "no need to sacrifice privacy for security", he showed concern that the proposed mandate might "jeopardize the several hundred treaties, agreements, conventions, and arrangements underpinning every facet of Europe's and the United States' robust cooperation in justice and law enforcement" and believed that a retrospective application of the mandate would create "confusion among the law enforcement and legal authorities." One of the most important interventions was that of Mr Rotenberg's from EPIC (Electronic Privacy Information Center) who pointed out that in the US, personal data is often "used for inappropriate purposes, there is no transparency and rights are violated". In his opinion, the US data protection laws should be amended. The Privacy Act of 1974, which refers to the collection of personal data by the US federal agencies, does not include non-US citizens or non lawful permanent residents. Also the Patriot Act "has reduced the privacy standards for US and non-US citizens limiting at the same time the power of the courts' authority in the matter." Rotenberg considers that the data protection agreement could bring global benefits influencing other countries in adopting stronger privacy acts to protect the transfer of personal data. Dr. Patrick Breyer from the German Working Group on Data Retention was very firm in stating that the transfer of personal data to the US created the risk of a violation of human rights and that no agreement could eliminate that risk. However, an international agreement with the US could improve the present situation if applied "exclusively to the information sharing that is taking place under existing agreements, thus reducing the amount of information shared and providing for more safeguards". The negotiating mandate for the beginning of the talks between the European Commission and the US is expected to be adopted at the Justice and Home Affairs Council on 3 December 2010. Article 29 Data protection working party - Data protection authorities call for strict general privacy agreement with United States (19.11.2010) http://ec.europa.eu/justice/policies/privacy/news/docs/pr_19_11_10_en.pdf Article 29 Data protection working party Letter to Vice-President Viviane Reding Commissioner for Justice, Fundamental Rights and Citizenship European Commission on EU-US General Agreement (19.11.2010) http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/others/2010_11_19_letter_art29wp_commissioner_reding_agreement_eu_us_en.pdf EP LIBE - Future EU-US data protection agreement in the framework of police and judicial cooperation in criminal matters (25/10/2010) http://www.statewatch.org/news/2010/nov/ep-report-on-eu-usa-data-transfer-hearing-25-10-10.pdf Letter of the Committee of Civil Liberties, Justice and Home Affairs Chairman on the future EU-US agreement on the protection of personal data to Stefaan De Clerck of the EU Council (24.11.2010) http://www.statewatch.org/news/2010/nov/ep-libe-eu-usa-agreement-letter-to-council.pdf ============================================================ 3. The Pirate Bay founders lost their appeal in the Swedish Appeals Court ============================================================ Peter Sunde, Carl Lundstrvm and Fredrik Neij, who, in April 2009, were found guilty of copyright infringement through their file-sharing website, The Pirate Bay (TPB), have recently lost their appeal in Svea Court of Appeal. Although the court has decided to reduce their imprisonment sentence of one year to 8, 4 and 10 months respectively, it has however increased their individual fines from about 3,45 million Euro to about 5 million Euro each. A separate hearing will take place later for the forth TPB founder, Gottfrid Svartholm Warg who was ill and could not take part in the proceedings with the other three men. Rick Falkvinge, leader of the Swedish Pirate Party, considers the trial was politically-motivated and believes that: "The copyright laws have strayed so far from the public's perception of justice that copyright cannot survive without drastic reform. In such a reform, there is no place for today's copyright industry." La Quadrature du Net called the decision "both absurd and unfair. It illustrates how an obsolete copyright law and its indiscriminate application are harmful to society as a whole." Christian Engstrom, member of the European Parliament for the Pirate Party has told Deutsche Welle that the ruling only proved that the influence corporations have on the Swedish coursts is too large.. "The lawyers for the record companies are friends with the judges, both in the lower court and in the appeals court. They belong to the same societies for copyright, which is a lobby organization for copyright lawyers. This corruption unfortunately leads to the fact that you can't get a fair trial in copyright-related issues in Sweden today," he said. He also expressed his concern as to the damage this kind of ruling might do to the Internet. "It's potentially very damaging to the Internet as a whole that the providers of infrastructure can't know if they will be held liable for what other people do." Obviously, the music industry welcomed the ruling. "Today's judgement confirms the illegality of The Pirate Bay and the seriousness of the crimes of those involved." was the statement of the International Federation of the Phonographic Industry's CEO Fances Moore. The court had found that TPB "has facilitated illegal file sharing in a way that results in criminal liability for those who run the service." However, Pirate Bay facilitates the exchange of so-called Bit Torrent data but only provides the links to content that is already available online. "This decision amounts to condemning a library catalogue instead of the author of some infringing content or activity" underlined La Quadrature du Net. The defendants had claimed they could not be liable for the material exchanged via their site, because the copyrighted material was not stored on its servers and there was no actual exchange of files. But the prosecution argued that, through TPB, the four men encouraged the infringement of copyrights. Sunde said on Twitter that the case would now go to the Swedish Supreme Court. Pirate Bay verdict: Three operators lose appeal- Prison sentences reduced but fines jacked up (26.11.2010) http://www.theregister.co.uk/2010/11/26/pirate_bay_appeal_verdict/ Swedish court turns down Pirate Bay appeal (26.11.2010) http://www.dw-world.de/dw/article/0,,6271356,00.html The Pirate Bay Decision, or the Political Persecution of Sharing (29.11.2010) http://www.laquadrature.net/en/the-pirate-bay-decision-or-the-political-persecution-of-sharing Pirate Bay appeal failure spawns more DoS attacks - Revenge of Anonymous (29.11.2010) http://www.theregister.co.uk/2010/11/29/pirate_bay_revenge_ddos/ EDRi-gram: The Pirate Bay founders considered guilty by the first Swedish court (22.04.2009) http://www.edri.org/edri-gram/number7.8/the-pirate-bay-court-decision ============================================================ 4. ICO started applying fines for Data Protection Act breaches ============================================================ After having received increased powers in April 2010, the UK Data protection authority (Information Commissioner Office - ICO) has recently used these powers to fine an organisation and a local authority for having breached the Data Protection Act. Hertfordshire County Council has been fined with about 120 000 Euro for the fact that its employees sent highly sensitive information by fax to the wrong recipients twice, once in June to a member of the public instead of a barrister and the second time, 13 days later, to the office of an unconnected barrister instead of the Watford County Court. "The Commissioner ruled that a monetary penalty of 100,000 pounds was appropriate, given that the Council's procedures failed to stop two serious breaches taking place where access to the data could have caused substantial damage and distress," was the ICO's statement. The Commissioner considered that the council did not take the necessary measures to reduce the risk of another incident, after the first one. Employment services company A4e was also fined with about 72 000 Euro for having given a laptop with the unencrypted personal information of 24 000 people to an employee to take home. The laptop was stolen from the employee's home and there was an unsuccessful attempt to access the information. The information included individuals' names, dates of birth, postcodes, employment status, income level, information about alleged criminal activity and whether an individual had been a victim of violence. ICO is also concerned about Google's collection of personal data with its Street View vehicles. Initially, ICO considered it was unlikely that Google had gathered too much information through its service but after it was revealed that the company had gathered entire emails, user names and passwords by mistake, ICO decided to make an audit of "Google's internal privacy structure, privacy training programs and its system of privacy reviews for new products." "It is a significant achievement to have an undertaking from a major multinational corporation like Google Inc. that extends to its global policies and not just its UK activities. We will be keeping a close watch on the progress Google makes and will follow up with an extensive audit," stated The Information Commissioner Christopher Graham. Others are sceptic regarding ICO's influence on Google. "The Information Commissioner is ineffective and is widely held in contempt," said Ross Anderson, a professor of computer science at Cambridge University who believes that the Information Commissioner is not feared by the companies he is supposed to regulate." Mr. Anderson places more hope in the German authorities which, in his opinion, " will have much more influence, and indeed Google now does its privacy research in Munich. (...) They know that if they can sell their privacy policies there, they will work everywhere else." ICO issues first ever data protection fines (24.11.2010) http://www.out-law.com//default.aspx?page=11569 Google allows ICO to check privacy practices (22.11.2010) http://www.out-law.com//default.aspx?page=11563 Google's agreement to delete British WiFi data does not impress experts (22.11.2010) http://www.dw-world.de/dw/article/0,,6256109,00.html EDRi-gram: Google admits it was gathering passwords and emails via StreetView (3.11.2010) http://www.edri.org/edrigram/number8.21/street-view-collects-emails ============================================================ 5. Azeri bloggers released from prison ============================================================ After a long and continuous pressure from several civil society groups and European international organisations such as the European Parliament, the Presidency of the European Union, the Parliamentary Assembly of the Council of Europe (PACE), the Organization for Security and Cooperation in Europe (OSCE), Human Rights Watch and Reporters Without Borders, the US President Barack Obama and Secretary of State Hilary Clinton, the two Azeri bloggers arrested in 2009 on false pretences of hooliganism, have been finally released from prison. A Baku court released Emin Milli on 18 November 2010, one day after his friend Adnan Hajizade's release. The court however did not release them on account of their innocence; it just suspended the rest of their sentence (14 months out of the entire 30 and 24 months sentence respectively). The decision was welcomed by Reporters Without Borders which, however, expressed its disappointment for the fact that the bloggers had not been cleared. "We nonetheless regret that his conviction has not been quashed as we have always insisted that he was arrested for exercising the right to free expression and was jailed on grotesque charges after a sham trial. The vigilance must not let up and the campaigning must continue in order to protect him from any kind of harassment or intimidation by the authorities and to obtain the release of Milli and Fatullayev," stated the organisation. After his release, Hajizade reaffirmed his innocence and said he would remain in Azerbaijan and continue his blogging. "I am not guilty and will demand full rehabilitation. Freedom is my right," he said. Adnan Hajizade and Emin Milli's lawyers have submitted their case to the European Court of Human Rights hoping to overturn their conviction and be declared innocent. On this occasion, pressure for all sides continues for the release of newspaper editor Eynulla Fatullayev who has been imprisoned since April 2007 for his political convictions, on false pretences as well. On 22 April 2010, the European Court of Human Rights ruled that the journalist had been illegally detained and asked for his immediate release. The Azeri supreme court partially complied with the European Court ruling by rejecting his conviction on charges of terrorism and inciting hatred. Yet, the court still retained the earlier conviction on charges of tax fraud and possession of heroin. Blogger Emin Milli freed in his turn (only in French, 19.11.2010) http://fr.rsf.org/azerbaidjan-le-blogueur-adnan-hadjizade-18-11-2010,38840.html Azerbaijan: 'Donkey bloggers' released (19.11.2010) http://advocacy.globalvoicesonline.org/2010/11/19/azerbaijan-donkey-bloggers-released/ Second blogger freed, one day after his colleague (19.11.2010) http://en.rsf.org/azerbaijan-blogger-released-on-parole-after-18-11-2010,38841.html Supreme court partially accepts European court ruling but refuses to free journalist (12.11.2010) http://en.rsf.org/azerbaidjan-in-latest-humiliation-newspaper-05-11-2010,38761.html EDRi-gram: Azeri bloggers appeal rejected by the Supreme Court (25.08.2010) http://www.edri.org/edrigram/number8.16/azeri-bloggers-appeal-rejected ============================================================ 6. Ireland: reshaping the law for the digital economy ============================================================ EDRi-member Digital Rights Ireland, Google and the Institute of International and European Affairs co-sponsored an event in Dublin on 19 November 2010 which presented suggestions for the reform of Irish law to promote digital innovation. Speakers were Niall O'Riordan (Google) who called for developing fair use at the Irish and European level, Kate O'Sullivan (UPC) who spoke on the topic of the difficulties faced by ISPs due to the music industry demands that they act as copyright police, Johnny Ryan (IIEA) who placed the growth of interactive media in a historical context, Nick Kelly (musician and author) who spoke about the challenges he has faced in selling music online since moving from a major label, and Darragh Doyle (Boards.ie) who discussed the problems online forums face under Irish law. Chairing the event was TJ McIntyre from Digital Rights Ireland who concluded with a presentation which called for reform of defamation law and for greater immunities to be given to intermediaries under the Irish law. Copyright and defamation law is repelling investors (26.11.2010) http://www.irishtimes.com/newspaper/finance/2010/1126/1224284166846.html Reshaping the Law for the Digital Economy - I (23.11.2010) http://www.cearta.ie/2010/11/reshaping-the-law-for-the-digital-economy-i/ Reshaping the Law for the Digital Economy - II - the liability of intermediaries (24.11.2010) http://www.cearta.ie/2010/11/reshaping-the-law-for-the-digital-economy-ii-the-liability-of-intermediaries/ (contribution by TJ McIntyre - EDRi-member Digital Rights Ireland) ============================================================ 7. Lack of net neutrality and open standards threaten the web ============================================================ "The Web is critical not merely to the digital revolution but to our continued prosperity-and even our liberty. Like democracy itself, it needs defending." This is the subtitle of a recent article of Tim Berners-Lee published in the Scientific American Magazine on 22 November 2010 where he focuses on the new threats of the current developments of the world wide web: lack of Internet neutrality, social networking, closed standards and attempts from governments to snoop on web communications. The articles titled "Long Live the Web: A Call for Continued Open Standards and Neutrality" gives the opportunity to the inventor of the WWW in 1990 to focus on the core design principles of the web and how they are endangered today by new policies from private and public actors on the Internet. Sir Tim Berners-Lee points to Internet neutrality as one of the core issues that needs to be preserved in order to allow the unhindered development of the WWW, based on its principles of universality and de-centralization. The author is clear in emphasizing why legislation is needed to protect these principles: "A neutral communications medium is the basis of a fair, competitive market economy, of democracy, and of science. Debate has risen again in the past year about whether government legislation is needed to protect net neutrality. It is. Although the Internet and Web generally thrive on lack of regulation, some basic values have to be legally preserved. " The father of the WWW also explains what the open standards are key to keep innovation at maximum in the Internet: "By 'open standards' I mean standards that can have any committed expert involved in the design, that have been widely reviewed as acceptable, that are available for free on the Web, and that are royalty-free (no need to pay) for developers and users. Open, royalty-free standards that are easy to use create the diverse richness of Web sites, from the big names such as Amazon, Craigslist and Wikipedia to obscure blogs written by adult hobbyists and to homegrown videos posted by teenagers." Sir Tim Berners-Lee also points to stupid EU legislation, such as the Hadopi law in France or the Digital Economy Bill in the UK to prove that the normative processalso needs to be under scrutiny to ensure the respect of human rights in the online environment as well: "In these cases, no due process of law protects people before they are disconnected or their sites are blocked. Given the many ways the Web is crucial to our lives and our work, disconnection is a form of deprivation of liberty. " Long Live the Web: A Call for Continued Open Standards and Neutrality (22.11.2010) http://www.scientificamerican.com/article.cfm?id=long-live-the-web Social networking is undermining the web, says web inventor (22.11.2010) http://www.out-law.com/default.aspx?page=11567 ============================================================ 8. ENDItorial: EC Internal Security Strategy - My dog is a cat ============================================================ The European Commission (EC) recently published its "Internal Security Strategy" - a wide-ranging security programme covering international crime networks, radicalisation, cybersecurity, border management and crisis/disaster management. One almost amusing element is how it included "piracy" (meaning unauthorised downloads) as a security issue. The logic is very reminiscent of the 1980s British comedy "Yes Prime Minister" where a senior civil servant explains to a colleague how to argue to stop power being put in the hands of citizens. "All cats have four legs, so does my dog. So my dog is a cat". Counterfeiting is sometimes carried out by criminal gangs, who are a security threat. Counterfeiting is an intellectual property infringement. "Piracy" is an intellectual property infringement, so "piracy" is a security threat. Meanwhile, some elements that are missing are also interesting. For example, the Strategy argues that "security should be integrated in relevant strategic partnerships" but, having accused major trading partners like the USA of failing to take action against online child abuse and international trade in abuse images, the strategy prioritises "trafficking in human beings, drugs trafficking and terrorism" for this action. Indeed, while the strategy covers, in the Commission's own words "seemingly petty crimes", the child abuse that was such a priority when tackling the symptoms via blocking, fails to get a single mention in the document. With regard to cybercrime, the Strategy suggests the creation of a "cybercrime centre" to build operational and technical capacity, working with national Computer Emergency Response Teams (CERTs) and the European Network and Information Security Agency (ENISA). The proposal to have a centralized hub for reporting of all forms of illegal material (useful for creating multiple blocking lists for Internet access providers), which was first made under the French Presidency of the EU, is made again. However, this still does not have adequate political support, so the Strategy says that this will be introduced "if appropriate". Even though no progress has been made on the Commission's proposals for an industry agreement for extra-judicial deletion of websites accused of child abuse, xenophobia or terrorism since the summer, the Strategy suggests that this will be achieved by 2011. The Commission has organised a meeting on 15 December 2010 with the industry to push its draft agreement, with a separate informal meeting the week before to discuss "outstanding issues". Communication: The EU Internal Security Strategy in Action: Five steps towards a more secure Europe (22.11.2010) http://www.statewatch.org/news/2010/nov/eu-com-internal-security-strategy-nov-10.pdf Draft Agreement on Notice and Takedown http://www.edri.org/files/Draft_Recommendations.pdf Joint EDRI/EuroISPA response to Commission proposal (9.07.2010) http://www.edri.org/files/090710_dialogue_NTD_illegal_content_EuroISPA-EDRI.pdf Yes Minister http://www.youtube.com/watch?v=kpwSaiY_Ehk EDRI-gram: EDRi and EuroISPA attack EC's demands for notice and takedown (28.07.2010) http://www.edri.org/edrigram/number8.15/edri-euroispa-notice-takedown-comission (contribution by Joe McNamee - EDRi) ============================================================ 9. Recommended Action ============================================================ Consultation on a future EU Culture programme Deadline: 15 December 2010 http://ec.europa.eu/culture/our-programmes-and-actions/doc2805_en.htm ============================================================ 10. Recommended Reading ============================================================ IViR: Moving Towards Balance - A study into duties of care on the Internet (2010) http://www.ivir.nl/publications/vaneijk/Moving_Towards_Balance.pdf OSCE FOM Preliminary report: Study of legal provisions and practices related to freedom of expression, the free flow of information and media pluralism on the Internet in the OSCE participating States. (26.11.2010) http://www.osce.org/documents/rfm/2010/11/47857_en.pdf EU Counter-Terrorism policy: EDPS calls for a systematic and consistent approach to avoid unnecessary restrictions to privacy (24.11.2010) http://www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/PressNews/Press/2010/EDPS-2010-16_EU%20counter-terrorism%20policy_EN.pdf http://www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/Consultation/Opinions/2010/10-11-24_EU_counter-terrorism_EN.pdf Antitrust: Commission probes allegations of antitrust violations by Google (30.11.2010) http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/1624&format=HTML&aged=0&language=EN&guiLanguage=en The Kids Are Alright* - A survey of the privacy habits and preferences of teens and their parents on social networks http://safekids.com/documents/truste_survey.pdf ============================================================ 11. Agenda ============================================================ 3 December 2010, Brussels, Belgium Taking on the data retention directive http://www.dataretention2010.net/init.xhtml?event=31 15-16 December 2010, Brussels, Belgium. "Lift-off Towards Open Government" http://www.opengov2010.be/ 27-30 December 2010, Berlin, Germany 27th Chaos Communication Congress (27C3) http://events.ccc.de/congress/2010 25-28 January 2011, Brussels, Belgium The annual Conference Computers, Privacy & Data Protection CPDP 2011 European Data Protection: In Good Health? http://www.cpdpconferences.org/ 23-28 February 2011, Gosier, Guadeloupe, France ICDS 2011- 5th International Conference on Digital Society http://www.iaria.org/conferences2011/ICDS11.html 11-12 March 2011, Ankara, Turkey ICEGEG-2011- 3rd International Conference on E-Government and E-Governance http://www.icegeg.com/index.html 1 April 2011, Bielefeld, Germany Big Brother Awards Germany Nominations open until 31 Dec 2010 http://www.bigbrotherawards.de/index_html-en ============================================================ 12. About ============================================================ EDRI-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRI has 27 members based or with offices in 17 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRI-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and are visible on the EDRI website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edri/2.html - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Dec 1 11:26:34 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 1 Dec 2010 20:26:34 +0100 Subject: EDRi-gram newsletter - Number 8.23, 1 December 2010 Message-ID: <20101201192634.GU9434@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From measl at mfn.org Wed Dec 1 18:27:19 2010 From: measl at mfn.org (J.A. Terranson) Date: Wed, 1 Dec 2010 20:27:19 -0600 (CST) Subject: Wikileaks kicked off of Amazon EC2 Message-ID: http://www.reuters.com/article/idUSTRE6B05EK20101202 By Jeremy Pelofsky WASHINGTON | Wed Dec 1, 2010 7:28pm EST WASHINGTON (Reuters) - Amazon.com Inc has stopped hosting WikiLeaks' website after an inquiry by the U.S. Senate Homeland Security Committee amid anger about the release of classified U.S. government documents on the site. WikiLeaks turned to Amazon to keep its site available after hackers tried to flood it and thus prevent users from accessing the classified information posted. WikiLeaks said Wednesday it was now being hosted by servers in Europe. Staff for Senate Homeland Security Committee Chairman Joe Lieberman had questioned Amazon about its relationship with WikiLeaks Tuesday and called on other companies that provide web-hosting services to boycott WikiLeaks. "I wish that Amazon had taken this action earlier based on WikiLeaks' previous publication of classified material," Lieberman, an independent, said in a statement. "I call on any other company or organization that is hosting WikiLeaks to immediately terminate its relationship with them." WikiLeaks has said since Sunday, when the first of its latest cache of U.S. government documents were published by media outlets, that its site was the target of a "distributed denial of service" attack, which is a computer attack meant to overwhelm a website and render it unavailable. A representative for Amazon, which is widely known for its Internet retail business but also offers smaller Internet-hosting services, did not respond to requests for comment. WikiLeaks slammed Amazon for dropping it, saying via the social media network Twitter that if Amazon was "so uncomfortable with the First Amendment (of the U.S. Constitution), they should get out of the business of selling books." WikiLeaks obtained scores of internal U.S. State Department communications, some of which were classified and included candid and embarrassing assessments of world leaders, and released them via media outlets and its own website. Earlier this year, the website also released thousands of U.S. classified documents related to the wars in Iraq and Afghanistan, drawing condemnations that the information could endanger U.S. forces and those helping the war efforts there. The U.S. Justice Department and Defense Department are investigating how the treasure trove of documents wound up in WikiLeaks hands. The prime suspect has been a former U.S. Army intelligence analyst, Bradley Manning. Even though Amazon has stopped providing the web-hosting services to WikiLeaks, Lieberman suggested that his problem with the company was not fully resolved. "I will be asking Amazon about the extent of its relationship with Wikileaks and what it and other web service providers will do in the future to ensure that their services are not used to distribute stolen, classified information," Lieberman said. Ryan Calo, a lecturer at Stanford University's Center for Internet and Society, said that under U.S. law, Amazon would likely have been shielded from any possible prosecution by the government over the WikiLeaks document dump. "It would set a dangerous precedent were companies like Amazon to take down things merely because the senator or another government entity started to ask question about them," Calo said. (Additional reporting by Alexandria Sage in San Francisco, Alex Dobuzinskis in Los Angeles and Tim Castle in London; Editing by Doina Chiacu and Cynthia Osterman) //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From cristallatriceuf at adolfo-toledo.com Wed Dec 1 21:33:43 2010 From: cristallatriceuf at adolfo-toledo.com (Cristal Latrice) Date: Wed, 01 Dec 2010 22:33:43 -0700 Subject: Discount Brand Watson - 10/325 mg: 30 - $199 / 120 - $588, NoPrescription Required, gr9 In-Reply-To: Message-ID: <4CF72FB7.048D4095@adolfo-toledo.com> Hydrocodone/Vicodin ES/Brand Watson Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 10/325 mg: 30 - $199 / 120 - $588 FREE Express FedEx (3-5 days Delivery) for over $200 order NoPrescription Required Major Credit Cards + E-CHECK ORDER HERE ... LowestPrices Online! http://cvjkhhss.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 783 bytes Desc: not available URL: From tatyanahk at c21kasten.com.jfet.org Wed Dec 1 22:49:23 2010 From: tatyanahk at c21kasten.com.jfet.org (Jeanene Tatyana) Date: Wed, 01 Dec 2010 23:49:23 -0700 Subject: Codeine (Methylmorphine) is a narcotic pain reliever, 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 sh In-Reply-To: <476f01cb90a9$08a6fef5$b35a586a@2ppnfrh> Message-ID: <4CF74173.F87A34CB@c21kasten.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://drugsmano18f.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 654 bytes Desc: not available URL: From StealthMonger at nym.mixmin.net Wed Dec 1 16:12:03 2010 From: StealthMonger at nym.mixmin.net (StealthMonger) Date: Thu, 2 Dec 2010 00:12:03 +0000 (GMT) Subject: any moment now ... References: <20101130112447.GV9434@leitl.org> <20101130204625.GX9434@leitl.org> <20101130223458.GY9434@leitl.org> Message-ID: <20101202001203.A9E7981508@fleegle.mixmin.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 John Case writes: >>> But unning a Tor node anonymously is trivial... > First, there are a LOT of co-location/vps/webhost resellers > operating in the US, and almost no regulation of them as "ISPs".... > ... if you can find a joe-blow VPS reseller or datacenter reseller > and call them up like any other vendor, they will bend over > backwards to take your money. They're not going to ask for your > drivers license or a credit check or anything like that. You can > just mail them a postal money order or two and be done with it. Earlier he wrote > Even without anything interesting, like packet inspection, or state > inspection, it's easy to assume that all Internet traffic is logged > somewhere - just connection logs and so on - a trivial amount of > data to save, and gets more trivial every six months when bigger > drives come out. > So _today_ your actions might be benign, and tomorrow they might > also be benign, but what about next year or next decade or ... > When you have a permanent record of all of your transactions in > Internet-space, it's just a matter of time before that is mined for > something that you never intended... So, what can be done with that Tor node once it's set up? It can't be used interactively (i.e. with low latency) because that "permanent record of all of your transactions in Internet-space" can be used today or tomorrow or "next year or next decade or ..." to correlate packet timings and destroy whatever anonymity the Tor node might otherwise have had. And if the Tor node is configured to respond to instructions anonymized by a remailer network, the remailer network might as well have by used by itself in the first place, without the Tor node in the picture at all. -- StealthMonger Long, random latency is part of the price of Internet anonymity. uinmyn: Is this anonymous surfing, or what? http://groups.google.com/group/alt.privacy.anon-server/browse_thread/thread/089c8f2f251c207e?fwc=1 stealthmail: Hide whether you're doing email, or when, or with whom. mailto:stealthsuite at nym.mixmin.net?subject=send%20index.html Key: mailto:stealthsuite at nym.mixmin.net?subject=send%20stealthmonger-key -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.8+ iEUEARECAAYFAkz2ty8ACgkQDkU5rhlDCl5UuwCYiWFCq487jiwKEWJ5+JTZ5eYM kgCfTriJZWDJ1j0jfxdC+AKpMEyu5tc= =Z0jC -----END PGP SIGNATURE----- From mlonnanu at publicis-usa.com Thu Dec 2 02:03:38 2010 From: mlonnanu at publicis-usa.com (Minna Lonna) Date: Thu, 02 Dec 2010 03:03:38 -0700 Subject: Rep1icaRo1ex :: Breitling Rep1icaWatch :: CartierRep1ica & more. Best Rep1icaWatches from $150 dhe0 Message-ID: <4CF76EFA.F8316E20@publicis-usa.com> SwissRep1ica Luxury Watches from $150 Each ** 85% OFF RETAIL SELLING PRICE! ** RolexDaytona RolexExplorer II RolexGMT master II RolexSpecial Collection RolexSubmariner RolexYachtmaster RolexCellini RolexDatejust RolexDaydate Buy Best Quality Rep1icaWatches here http://articulatetime.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 696 bytes Desc: not available URL: From letitia_elyse_jt at flowergallery.com Thu Dec 2 03:07:35 2010 From: letitia_elyse_jt at flowergallery.com (Letitia Elyse) Date: Thu, 02 Dec 2010 04:07:35 -0700 Subject: You Have Everything To Gain! 3-4 inches more to yourPenis, 100% MoneyBack Guaranteeed 4dt In-Reply-To: Message-ID: <4CF77DF7.AEF6CB6C@flowergallery.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://sellermassive.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 858 bytes Desc: not available URL: From checker at panix.com Thu Dec 2 01:40:13 2010 From: checker at panix.com (Premise Checker) Date: Thu, 2 Dec 2010 04:40:13 -0500 (EST) Subject: [tt] Tech Republic: You are probably breaking at least one law with your computer right now Message-ID: You are probably breaking at least one law with your computer right now http://blogs.techrepublic.com.com/window-on-windows/?p=3389&tag=nl.e064 * Date: November 24th, 2010 * Author: Deb Shinder For many years, the Internet was the "final frontier," operating largely unregulated--in part because of the jurisdictional nightmare involved in trying to enforce laws when communications crossed not just state lines but also national boundaries. That was then; this is now. Legislation that affects the use of Internet-connected computers is springing up everywhere at the local, state and federal levels. You might be violating one of them without even knowing. In this article, we'll take a look at some of the existing laws and some of the pending legislation that can influence how we use our computers and the Internet. Nothing in this article should be construed as legal advice; this is merely an overview of some of the legislation that's out there, how it has been interpreted by the courts (if applicable), and possible implications for computer users. Note: This article is also available as a [49]PDF download and was originally published in the [50]10 Things Blog in March 2010. 1: Digital Millennium Copyright (DMCA) Act Most computer users have heard of this law, signed in 1998 by President Clinton, implementing two World Intellectual Property Organization (WIPO) treaties. The DMCA makes it a criminal offense to circumvent any kind of technological copy protection--even if you don't violate anyone's copyright in doing so. In other words, simply disabling the copy protection is a federal crime. There are some exemptions, such as circumventing copy protection of programs that are in an obsolete format for the purpose of archiving or preservation. But in most cases, using any sort of anti-DRM program is illegal. This applies to all sorts of copy-protected files, including music, movies, and software. You can read a summary of the DMCA [51]here. If you're a techie who likes the challenge of trying to "crack" DRM, be aware that doing so--even if you don't make or distribute illegal copies of the copyrighted material--is against the law. 2: No Electronic Theft (NET) Act This is another U.S. federal law that was passed during the Clinton administration. Prior to this act, copyright violations were generally treated as civil matters and could not be prosecuted criminally unless it was done for commercial purposes. The NET Act made copyright infringement itself a federal criminal offense, regardless of whether you circumvent copy-protection technology and whether you derive any commercial benefit or monetary gain. Thus, just making a copy of a copyrighted work for a friend now makes you subject to up to five years in prison and/or up to $250,000 in fines. This is the law referred to in the familiar "FBI Warning" that appears at the beginning of most DVD movies. You can read more about the NET Act [52]here. Many people who consider themselves upstanding citizens and who would never post music and movies to a P2P site think nothing of burning a copy of a song or TV show for a friend. Unfortunately, by the letter of the law, the latter is just as illegal as the former. 3: Anti-Counterfeiting Trade Agreement (ACTA) This treaty is still in negotiation between the United States, European Commission, Switzerland, Japan, Australia, Canada, Jordan, Mexico, Morocco, New Zealand, the Republic of Korea, Singapore, and the United Arab Emirates. The most recent round of negotiations took place in Mexico in January 2010, and the next is scheduled for April 2010 in New Zealand. As with the DMCA, many regard the ACTA as a workaround for governments to impose regulations and penalties through international treaties that they would not be able to pass into law through their regular legislative processes. ACTA covers a number of areas, including counterfeit products and generic medicines, but the part that affects computer users is the chapter titled "Enforcement of Intellectual Property Rights." Although the treaty negotiations are conducted in secret, a leaked document indicated that one provision in the treaty would force ISPs to give information about customers suspected of copyright infringement without requiring a warrant. According to reports, another provision would allow customs agents to conduct random searches of laptops, MP3 players, and cell phones for illegally downloaded or ripped music and movies. Not surprisingly, the Recording Industry Association of America (RIAA) is a supporter of the treaty. The Electronic Frontier Foundation (EFF) opposes it, as does the Free Software Foundation. You can read the EFF's stance on ACTA [53]here. 4: Court rulings regarding border searches Most Americans are aware of the protections afforded by the U.S. Constitution's fourth amendment against unreasonable searches and seizures. In general, this means that the government cannot search your person, home, vehicle, or computer without probable cause to believe that you've engaged in some criminal act. What many don't know is that there are quite a few circumstances that the Courts, over the years, have deemed to be exempt from this requirement. One of those occurs when you enter the United States at the border. In April 2008, the Ninth Circuit Court of Appeals upheld the right of Customs officers to search laptops and other digital devices at the border (the definition of which extends to any international airport when you are coming into the country) without probable cause or even the lesser standard of reasonable suspicion. The Electronic Frontier Foundation (EFF) and other groups strongly disagree with the ruling. You can [54]read more on the EFF Web site. Meanwhile, be aware that even though you've done nothing illegal and are not even suspected of such, the entire contents of your portable computer, PDA, or smart phone can be accessed by government agents when you enter the Unites States. So if you have anything on your hard drive that could be embarrassing, you might want to delete it before crossing the border. Stay on top of the latest Microsoft Windows tips and tricks with TechRepublic's Windows Desktop newsletter, delivered every Monday and Thursday. [55]Automatically sign up today! 5: State and federal laws regarding access to networks Many states have criminal laws that prohibit accessing any computer or network without the owner's permission. For example, in Texas, the statute is Penal Code section 33.02, Breach of Computer Security. It says, "A person commits an offense if the person knowingly accesses a computer, computer network or computer system without the effective consent of the owner." The penalty grade ranges from misdemeanor to first degree felony (which is the same grade as murder), depending on whether the person obtains benefit, harms or defrauds someone, or alters, damages, or deletes files. The wording of most such laws encompass connecting to a wireless network without explicit permission, even if the Wi-Fi network is unsecured. The inclusion of the culpable mental state of "knowing" as an element of the offense means that if your computer automatically connects to your neighbor's wireless network instead of your own and you aren't aware of it, you haven't committed a crime. But if you decide to hop onto the nearest unencrypted Wi-Fi network to surf the Internet, knowing full well that it doesn't belong to you and no one has given you permission, you could be prosecuted under these laws. [56]A Michigan man was arrested for using a cafi's Wi-Fi network (which was reserved for customers) from his car in 2007. Similar arrests have been made in Florida, Illinois, Washington, and Alaska. The federal law that covers unauthorized access is Title 18 U.S.C. Section 1030, which prohibits intentionally accessing a computer without authorization or exceeding authorized access. But it applies to "protected computers," which are defined as those used by the U.S. government, by a financial institution, or used in or affecting interstate or foreign commerce. In addition to fines and imprisonment, penalties include forfeiture of any personal property used to commit the crime or derived from proceeds traceable to any violation. You can read the text of that section [57]here. In [58]a recent case regarding unauthorized access, a high profile lawsuit was filed against a school district in Pennsylvania by students who alleged that district personnel activated their school-issued laptops in their homes and spied on them with the laptops' webcams. The FBI is investigating to determine whether any criminal laws were broken. Because the school district owned the computers, there is controversy over whether they had the right to remotely access them without the permission of the users. 6: "Tools of a crime" laws Some states have laws that make it a crime to possess a "criminal instrument" or the "tool of a crime." Depending on the wording of the law, this can be construed to mean any device that is designed or adapted for use in the commission of an offense. This means you could be arrested and prosecuted, for example, for constructing a high gain wireless antenna for the purpose of tapping into someone else's Wi-Fi network, even if you never did in fact access a network. Several years ago, a California sheriff's deputy made the news when he declared [59]Pringles can antennas illegal under such a statute. 7: Cyberstalking and Cyberbullying laws Stalking is a serious crime and certainly all of us are in favor of laws that punish stalkers. As Internet connectivity has become ubiquitous, legislatures have recognized that it's possible to stalk someone from afar using modern technology. Some of the "cyberstalking" laws enacted by the states, however, contain some pretty broad language. For example, the Arkansas law contains a section titled "Unlawful computerized communications" that makes it a crime to send a message via email or other computerized communication system (Instant Messenger, Web chat, IRC, etc.) that uses obscene, lewd, or profane language, with the intent to frighten, intimidate, threaten, abuse, or harass another person. Some of the lively discussions on mailing lists and Web boards that deteriorate into flame wars could easily fall under that definition. Or how about the furious email letter you sent to the company that refused to refund your money for the shoddy product you bought? Closely related are the [60]laws against cyberbullying. Such laws have been passed by some states and local governments. In April 2009, the [61]Megan Meier Cyberbullying Prevention Act (H.R. 1966) was introduced in the U.S. Congress. The act would make it a federal crime to "intimidate, harass, or cause substantial emotional distress to another person, using electronic means to support severe, repeated and hostile behavior." Subcommittee hearings have been held and the bill is continuing through the legislative process. Opponents of the proposed law point out that the language is open to interpretation, and could be construed to apply to someone who merely gets into heated discussions on a web board or email list. The best policy is to watch your language when sending any type of electronic communications. Not only can a loss of temper when you're online come back to embarrass you, it could even get you thrown in jail. 8: Internet gambling laws Like to play poker online or bet on the horse races from the comfort of your home? The federal [62]Unlawful Internet Gambling Enforcement Act of 2006 criminalizes acceptance of funds from bettors--but what about the bettors themselves? Are they committing a crime? Under this federal law, the answer is no, but some state laws do apply to the person placing the bet. For example, a Washington law passed in 2006 makes gambling on the Internet a felony. The King County Superior Court just [63]recently upheld that law, although challengers have vowed to take it to the Supreme Court. Be sure to check out the state and local laws before you make that friendly online bet. 9: Child pornography laws We all want to protect children and keep pedophiles away from them, but could you be arrested for possession of child pornography or for exposing children to pornography even though you would never voluntarily indulge in such a thing? Unfortunately, as the laws are written and enforced, the answer is "yes." In January 2007, a substitute teacher in Norwich, CT, was convicted of four felony pornography charges, although she claimed the offending pictures were the result of pop-ups and that she did not knowingly access the Web sites in question. The [64]conviction was set aside after forensics and security experts examined her hard drive and found the school's antivirus software was out of date and the computer had no anti-spyware, firewall, or pop-up blocking technology. The teacher ended up pleading guilty to a misdemeanor charge. Pornographic images of children are illegal to possess. This includes not just photographs of actual children, but also computer-generated pictures and drawings in which no real people are involved and photos of models who are of adult age but look like children. There are many ways such images can get on a computer. Viruses can infect your system and allow another person to remotely access your hard drive. Your computer can be taken over to become a bot, controlled by someone else without your knowledge. Someone can email you an illegal image. You can click a link on a non-pornographic Web site that takes you to a site where the illegal images are displayed, and they're then downloaded into your Web cache on your hard drive. In another 2007 case, [65]a 16-year-old was charged with possession of child pornography and got 18 months probation and over a quarter of a million dollars in legal fees, even though he passed polygraph tests in which he denied knowledge of the images and an examination of the hard drive found more than 200 infected files and no firewall. 10: Pro IP Act Returning to the copyright front, the Prioritizing Resources and Organization for Intellectual Property Act (Pro IP Act), which was signed into law in 2008, imposes stricter penalties for copyright infringement. It created a new position of "copyright enforcement czar" (formally called the Intellectual Property Enforcement Coordinator) in the federal bureaucracy and gives law enforcement agents the right to seize property from copyright infringers. This may all sound fine in theory, but when you look at the way other seizure and forfeiture laws have been applied (for instance, the ability of drug enforcement officers to seize houses, computers, cars, cash, and just about everything else that belongs to someone tagged as a suspected drug dealer--and in some cases, not returning the property even when the person is acquitted or not prosecuted), it makes many people wary. Read more about the bill [66]here. Some local jurisdictions have also established [67]seizure authority for piracy. In September 2009, Victoria Espinel was appointed as the [68]first copyright czar. She has asked for public input by March 24, 2010. References 49. http://downloads.techrepublic.com.com/abstract.aspx?docid=1623817 50. http://blogs.techrepublic.com.com/10things/ 51. http://www.copyright.gov/legislation/dmca.pdf 52. http://www.gseis.ucla.edu/iclp/hr2265.html 53. http://www.eff.org/issues/acta 54. http://www.eff.org/deeplinks/2008/04/no-cause-needed-search-laptops-border 55. http://nl.com.com/MiniFormHandler?brand=techrepublic&list_id=e064 56. http://arstechnica.com/news.ars/post/20070522-michigan-man-arrested-for-using-cafes-free-wifi-from-his-car.html 57. http://www.law.cornell.edu/uscode/18/1030.html 58. http://news.cnet.com/8301-17852_3-10457126-71.html 59. http://www.engadget.com/2005/07/25/wifi-cantennas-now-illegal/ 60. http://www.cio-today.com/news/Teen-Suicide-Spurs-Cyberbullying-Law/story.xhtml ?story_id=12000B111K60 61. http://www.govtrack.us/congress/bill.xpd?bill=h111-1966 62. http://www.gambling-law-us.com/Federal-Laws/internet-gambling-ban.htm 63. http://seattletimes.nwsource.com/html/localnews/2004418390_gambling16m.html 64. http://www.wired.com/threatlevel/2008/11/proof-porn-pop/ 65. http://www.foxnews.com/story/0,2933,244009,00.html 66. http://arstechnica.com/news.ars/post/20080508-house-overwhelmingly-passes-controversial-pro-ip-act.html 67. http://arstechnica.com/news.ars/post/20080509-piracy-now-public-nuisance-in-los-angeles-county.html 68. http://www.whitehouse.gov/blog/2010/02/23/intellectual-property-and-risks-public _______________________________________________ tt mailing list tt at postbiota.org http://postbiota.org/mailman/listinfo/tt ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From measl at mfn.org Thu Dec 2 03:26:24 2010 From: measl at mfn.org (J.A. Terranson) Date: Thu, 2 Dec 2010 05:26:24 -0600 (CST) Subject: FWD: Wikileaks: State Pulls the Plug On SIPRNet (fwd) Message-ID: ---------- Forwarded message ---------- Date: Wed, 1 Dec 2010 11:08:38 +0100 From: Felix Stalder To: nettime-l at kein.org Subject: Wikileaks: State Pulls the Plug On SIPRNet Resent-Date: Wed, 1 Dec 2010 11:05:11 +0100 Resent-From: nettime at kein.org Resent-To: Nettime Seems like Assange's 'secrecy tax' is making itself felt. Felix State Pulls the Plug On SIPRNet November 29, 2010 at 9:26 pm http://swampland.blogs.time.com/2010/11/29/state-pulls-the-plug-on-siprnet/ Late last week, after Secretary of State Hillary Clinton informed the White House of the likely fall-out from the WikiLeaks cable dump, the White House came back with a question: What's our corrective action? Clinton's undersecretary for management, Patrick Kennedy, had a simple suggestion: pull the plug on SIPRNet [1], the classified DoD network that PFC Bradley Manning reportedly used to download the cables from State's inhouse classified database. The White House said do it, says a senior administration official. The publication by WikiLeaks of more than 250,000 diplomatic cables, many of them classified, is forcing an administration-wide intelligence retrenchment as agencies reconsider how to balance the need to share with the need to know. With its third major dump of controversial classified information in nine months, WikiLeaks is single-handedly tipping the balance back towards inter-agency "stovepiping", or walling off information from other departments. Post 9.11 the imperative from Congress and the White House was to break down the stovepipes that prevented sharing across the so-called intelligence communitythe sprawling collection of intelligence offices in more than a dozen different agencies across the U.S. government and around the world. At State, they created the Net-Centric Diplomacy" database or NCD, where State stored classified information up to the top secret level. Agencies across government had access to that database through their own secure networks. In DoD's case the network, created in 1995, was called the Secure Internet Protocol Router Network, or SIPRNet. Late last week, at Kennedy's recommendation and the White House's approval, State disconnected SIPRNet from the NCD, senior administration officials tell Time. Obviously there were some gaps within SIPRNet that DoD is actively correcting, the senior administration official says, And as a temporary precaution we have disconnected SIPRNet from the NCD. How long is temporary? DoD is investigating how Manning managed to download all those cables and get them to WikiLeaks, the senior administration officials tell Time. So far they have concluded that the failure came at Dod's Central Command, the combatant command responsible for the middle east, which employed Manning in Iraq. Prior to Manning's download, users of SIPRNet had been blocked from downloading data to removable media. But at some point that restriction was lifted across all of CentCom. DoD has been reimposing restrictions since the July dump of Afghanistan war documents by WikiLeaks. DoD has blocked the use of removable media; they have required in some cases a dual key system that requires a second user to approve moving data from a higher classification system to a lower classification system; and they are installing software programs to monitor unusual activity. DoD is not completely cut off from State's database. A separate system for the transmission of top secret information, the Joint Worldwide Intelligence Communications System or JWICS [2], is still linked to the NCD. And State may reconnect SIPRNet in the future. Once DoD has gone through and made its corrections on SIPRNet we'll reevaluate whether to reconnect, the senior administration official says. [1] http://www.fas.org/irp/program/disseminate/siprnet.htm [2] http://www.fas.org/irp/program/disseminate/jwics.htm --- http://felix.openflows.com ----------------------- books out now: *|Deep Search.The Politics of Search Beyond Google.Studienverlag 2009 *|Mediale Kunst/Media Arts Zurich.13 Positions.Scheidegger&Spiess2008 *|Manuel Castells and the Theory of the Network Society. Polity, 2006 *|Open Cultures and the Nature of Networks. Ed. Futura/Revolver, 2005 # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org From case at sdf.lonestar.org Wed Dec 1 21:58:21 2010 From: case at sdf.lonestar.org (John Case) Date: Thu, 2 Dec 2010 05:58:21 +0000 (UTC) Subject: any moment now ... In-Reply-To: References: <20101130112447.GV9434@leitl.org> <20101130204625.GX9434@leitl.org> <20101130223458.GY9434@leitl.org> Message-ID: On Wed, 1 Dec 2010, coderman wrote: > you can load up to $500 without difficulty. you pay a $5 or so fee > per card; avoid anything that charges percentages loaded. you have a > year to use it, usually, before fees start whittling down the balance. > > you can register the cards on-line with privacy preserving billing > detail. be sure to consider country/state of billing address if this > matters for your purchase. (note that Tor is not the only anonymous > option for this :) > > once registered with card holder name, address, use as you would any > other Visa/MC/Amex... http://www.simon.com/giftcard/ From case at sdf.lonestar.org Wed Dec 1 22:05:26 2010 From: case at sdf.lonestar.org (John Case) Date: Thu, 2 Dec 2010 06:05:26 +0000 (UTC) Subject: any moment now ... In-Reply-To: <20101202001203.A9E7981508@fleegle.mixmin.net> References: <20101130112447.GV9434@leitl.org> <20101130204625.GX9434@leitl.org> <20101130223458.GY9434@leitl.org> <20101202001203.A9E7981508@fleegle.mixmin.net> Message-ID: On Thu, 2 Dec 2010, StealthMonger wrote: > So, what can be done with that Tor node once it's set up? It can't be > used interactively (i.e. with low latency) because that "permanent > record of all of your transactions in Internet-space" can be used > today or tomorrow or "next year or next decade or ..." to correlate > packet timings and destroy whatever anonymity the Tor node might > otherwise have had. And if the Tor node is configured to respond to > instructions anonymized by a remailer network, the remailer network > might as well have by used by itself in the first place, without the > Tor node in the picture at all. Oh - a very interesting question, and something I didn't think of, for reasons I will expain now ... You see, if you have the ability to set up an anonymous Tor node, then you wouldn't be using Tor _yourself_. By definition, Tor usage is only for people that can't safely set up their own Tor node. Make sense ? If you are running a Tor node, you're doing it for altruistic reasons - for people that have an immediate, right now need for privacy, and need to tweet the next meet-up spot, future risk be damned. You, yourself, on the other hand, do not need this - you're a rich, well educated computer savvy type that can set up all kinds of interesting infrastructure for yourself and defeat the threat model I am talking about - not with Tor, but with (insert interesting privacy architecture here). If you can run your own Tor node anonymously, you've got tunnels within tunnels, exiting at random points around the world ... right ? Right. From mararosette_ww at gbusiness.com Thu Dec 2 06:12:45 2010 From: mararosette_ww at gbusiness.com (Mara Rosette) Date: Thu, 02 Dec 2010 07:12:45 -0700 Subject: CheapestViagra, CialisLevitre $1.38/tab. Free Combo Pack with Order. No tablet splitting hassle! sg In-Reply-To: <047601cb8ffe$6c73d84b$7cc1f2a9@rniyke3> Message-ID: <4CF7A95D.2A9A2B2E@gbusiness.com> OrderCializViagra Online & Save 75-90% 0nline Pharmacy NoPrescription required Buy Canadian Drugs at Wholesale Prices and Save 75-90% FDA-Approved drugs + Superb Quality Drugs only! Accept all major credit cards Order Today! From $1.38 http://zdvbv.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 538 bytes Desc: not available URL: From 0-kotlarova at ppl.cz Wed Dec 1 21:55:00 2010 From: 0-kotlarova at ppl.cz (BlowOut_Sale) Date: Thu, 2 Dec 2010 07:55:00 +0200 Subject: Free Shipping on All Orders from our Luxury line! Message-ID: <3022279626.824TUK4W495085@dyzqysxns.tacmnjkfudgvkw.net> http://p.gs/dpenb http://www.alertbury.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 209 bytes Desc: not available URL: From eugen at leitl.org Thu Dec 2 02:10:02 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 2 Dec 2010 11:10:02 +0100 Subject: Wikileaks kicked off of Amazon EC2 In-Reply-To: References: Message-ID: <20101202101002.GZ9434@leitl.org> On Wed, Dec 01, 2010 at 08:27:19PM -0600, J.A. Terranson wrote: > http://www.reuters.com/article/idUSTRE6B05EK20101202 Presumably, this is about as much as DDoS as it was political pressure. I wonder how well Tahoe would scale as a leaker platform. > > > By Jeremy Pelofsky > > WASHINGTON | Wed Dec 1, 2010 7:28pm EST > > WASHINGTON (Reuters) - Amazon.com Inc has stopped hosting WikiLeaks' > website after an inquiry by the U.S. Senate Homeland Security Committee > amid anger about the release of classified U.S. government documents on > the site. > > WikiLeaks turned to Amazon to keep its site available after hackers tried > to flood it and thus prevent users from accessing the classified > information posted. WikiLeaks said Wednesday it was now being hosted by > servers in Europe. > > Staff for Senate Homeland Security Committee Chairman Joe Lieberman had > questioned Amazon about its relationship with WikiLeaks Tuesday and called > on other companies that provide web-hosting services to boycott WikiLeaks. > > "I wish that Amazon had taken this action earlier based on WikiLeaks' > previous publication of classified material," Lieberman, an independent, > said in a statement. "I call on any other company or organization that is > hosting WikiLeaks to immediately terminate its relationship with them." > > WikiLeaks has said since Sunday, when the first of its latest cache of > U.S. government documents were published by media outlets, that its site > was the target of a "distributed denial of service" attack, which is a > computer attack meant to overwhelm a website and render it unavailable. > > A representative for Amazon, which is widely known for its Internet retail > business but also offers smaller Internet-hosting services, did not > respond to requests for comment. > > WikiLeaks slammed Amazon for dropping it, saying via the social media > network Twitter that if Amazon was "so uncomfortable with the First > Amendment (of the U.S. Constitution), they should get out of the business > of selling books." > > WikiLeaks obtained scores of internal U.S. State Department > communications, some of which were classified and included candid and > embarrassing assessments of world leaders, and released them via media > outlets and its own website. > > Earlier this year, the website also released thousands of U.S. classified > documents related to the wars in Iraq and Afghanistan, drawing > condemnations that the information could endanger U.S. forces and those > helping the war efforts there. > > The U.S. Justice Department and Defense Department are investigating how > the treasure trove of documents wound up in WikiLeaks hands. The prime > suspect has been a former U.S. Army intelligence analyst, Bradley Manning. > > Even though Amazon has stopped providing the web-hosting services to > WikiLeaks, Lieberman suggested that his problem with the company was not > fully resolved. > > "I will be asking Amazon about the extent of its relationship with > Wikileaks and what it and other web service providers will do in the > future to ensure that their services are not used to distribute stolen, > classified information," Lieberman said. > > Ryan Calo, a lecturer at Stanford University's Center for Internet and > Society, said that under U.S. law, Amazon would likely have been shielded > from any possible prosecution by the government over the WikiLeaks > document dump. > > "It would set a dangerous precedent were companies like Amazon to take > down things merely because the senator or another government entity > started to ask question about them," Calo said. > > (Additional reporting by Alexandria Sage in San Francisco, Alex > Dobuzinskis in Los Angeles and Tim Castle in London; Editing by Doina > Chiacu and Cynthia Osterman) > > > //Alif > > -- > "Never belong to any party, always oppose privileged classes and public > plunderers, never lack sympathy with the poor, always remain devoted to > the public welfare, never be satisfied with merely printing news, always > be drastically independent, never be afraid to attack wrong, whether by > predatory plutocracy or predatory poverty." > > Joseph Pulitzer, 1907 Speech -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Dec 2 02:11:01 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 2 Dec 2010 11:11:01 +0100 Subject: [tt] Tech Republic: You are probably breaking at least one law with your computer right now Message-ID: <20101202101101.GA9434@leitl.org> ----- Forwarded message from Premise Checker ----- From ira at baranovichy.by Thu Dec 2 00:11:08 2010 From: ira at baranovichy.by (Flora Morton) Date: Thu, 2 Dec 2010 12:41:08 +0430 Subject: =?koi8-r?B?8sXHydPU0sHDydEg0NLFxNDSydHUycogKPfTxSDSxcfJz87ZIPLmKQ==?= Message-ID: <000d01cb91f8$794e4280$6400a8c0@ira> ЛИКВИДАЦИЯ ПРЕДПРИЯТИЙ без проверок (Все регионы России) Вариант ликвидации компании, который предлагаем мы - перевод предприятия на наших учредителей с заменой генерального директора на иностранную управляющую компанию, либо на иностранного директора. Перерегистрация ООО - 2 900 рублей Подготовка документов в течение 1 рабочего дня Возможна сдача документов в ГНИ-46 без директора +7(495) 211-17-11 - круглосуточно / без выходных Полный комплекс услуг по регистрации и перерегистрации предприятий Юридический адрес - от 10 000 рублей 1. Регистрация ООО √ от 2 900 рублей 2. Регистрация Индивидуального предпринимателя - 1 500 рублей 3. Регистрация ОАО, ЗАО - 15 000 рублей 4. Аккредитация представительств √ от 6 000 рублей 5. Регистрация изменений (без внесения изменений в УД) √ от 2 900 рублей Регистрация оффшоров Ликвидация ООО и ЗАО Юридические услуги, АРБИТРАЖ +7(495) 211-17-11 - круглосуточно / без выходных ПЕРЕЧЕНЬ ДОКУМЕНТОВ И ИНФОРМАЦИЯ НЕОБХОДИМАЯ ДЛЯ ПЕРЕРЕГИСТРАЦИИ ООО: Предоставить простые (не заверенные) ксерокопии (можно выслать по факсу или электронной почте) - устав + все изменения к ним (если были); - свидетельство о постановке на налоговый учет (ИНН); - справка о присвоении статистических кодов (ОКВЭД); - протоколы (решения) о создании и назначении исполнительных органов (Директора); - паспортные данные участников и директора; -выписка из ЕГРЮЛ (для подготовки документов нам можно предоставить старую, но актуальную выписку, а для заверения Заявления у нотариуса, необходимо предоставить выписку сроком не более месяца v можете получить сами или заказать получение у нас (получение выписки за сутки 1500 рублей) From marco.isernia at scegroup.it Wed Dec 1 23:20:13 2010 From: marco.isernia at scegroup.it (Kathleen Rollins) Date: Thu, 2 Dec 2010 12:50:13 +0530 Subject: =?koi8-r?B?7MXHwczYzs8gySDC2dPU0s8hIPvFzsfFztPLycUg98na2SEg79QgMyDS?= =?koi8-r?B?wcIuxM7FyiEg4sXaIMzJ3s7Px88g0NLJ09XU09TXydEh?= Message-ID: <000d01cb91f1$5c969770$6400a8c0@marco.isernia> КРУПНЕЙШИЙ ЛЕГАЛЬНЫЙ ВИЗОВЫЙ ОПЕРАТОР. +7 (495) 229 11 97 (круглосуточно / без выходных) Телефон нашего колл-центра - +7 (495) 229 11 97 Шенгенские ДЕЛОВЫЕ мульти-визы (Италия, Швейцария, Франция, Германия) Мульти-виза за 3 РАБОЧИХ ДНЯ Среднесрочные - 1 год - 950 у.е, 6 месяцев - 750 у.е, 3 месяца - 550 у.е. (сбор включен) Долгосрочные - 2 года - 1800 у.е, 3 года - 2 650 у.е, 4 года - 3 200 у.е. (сбор включен) Шенгенские мультивизы для уроженцев и жителей Северного Кавказа и паспортов с отказами (граждане России). Мы также поможем с визой в: США, Великобритания, Кипр, Китай. Найдете ДЕШЕВЛЕ - мы дадим СКИДКУ !!! ОПЛАТА только ПОСЛЕ ВЫХОДА ВИЗЫ. ГАРАНТИЯ. +7 (495) 229 11 97 (круглосуточно / без выходных) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2217 bytes Desc: not available URL: From coderman at gmail.com Thu Dec 2 13:22:21 2010 From: coderman at gmail.com (coderman) Date: Thu, 2 Dec 2010 13:22:21 -0800 Subject: any moment now ... In-Reply-To: References: <20101130112447.GV9434@leitl.org> <20101130204625.GX9434@leitl.org> <20101130223458.GY9434@leitl.org> Message-ID: there are a lot of them; it's a $24,000,000,000+ industry after all, ... i have not seen a privacy oriented comprehensive index of prepaid systems. that would be useful, if anyone has seen such a thing. On Wed, Dec 1, 2010 at 9:58 PM, John Case wrote: > ... > http://www.simon.com/giftcard/ From coderman at gmail.com Thu Dec 2 13:27:41 2010 From: coderman at gmail.com (coderman) Date: Thu, 2 Dec 2010 13:27:41 -0800 Subject: any moment now ... In-Reply-To: References: Message-ID: On Mon, Nov 29, 2010 at 12:01 PM, John Case wrote: > ... and wikileaks will be officially classified as a terrorist organization. if this did happen, a more interesting question is what happens to the US citizens who are or would be providing material support to Wikileaks. (you may not remain a US citizen, for example :) From eugen at leitl.org Thu Dec 2 05:21:24 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 2 Dec 2010 14:21:24 +0100 Subject: Race Is On to 'Fingerprint' Phones, PCs Message-ID: <20101202132124.GG9434@leitl.org> http://online.wsj.com/article/SB10001424052748704679204575646704100959546.html#printMode WHAT THEY KNOW NOVEMBER 30, 2010 Race Is On to 'Fingerprint' Phones, PCs By JULIA ANGWIN And JENNIFER VALENTINO-DEVRIES IRVINE, Calif.bDavid Norris wants to collect the digital equivalent of fingerprints from every computer, cellphone and TV set-top box in the world. Companies are developing digital fingerprint technology to identify how we use our computers, mobile devices and TV set-top boxes. WSJ's Simon Constable talks to Senior Technology Editor Julia Angwin about the next generation of tracking tools. Listen: Jennifer Valentino-DeVries discusses the next generation of online tracking tools. He's off to a good start. So far, Mr. Norris's start-up company, BlueCava Inc., has identified 200 million devices. By the end of next year, BlueCava says it expects to have cataloged one billion of the world's estimated 10 billion devices. Advertisers no longer want to just buy ads. They want to buy access to specific people. So, Mr. Norris is building a "credit bureau for devices" in which every computer or cellphone will have a "reputation" based on its user's online behavior, shopping habits and demographics. He plans to sell this information to advertisers willing to pay top dollar for granular data about people's interests and activities. Device fingerprinting is a powerful emerging tool in this trade. It's "the next generation of online advertising," Mr. Norris says. It might seem that one computer is pretty much like any other. Far from it: Each has a different clock setting, different fonts, different software and many other characteristics that make it unique. Every time a typical computer goes online, it broadcasts hundreds of such details as a calling card to other computers it communicates with. Tracking companies can use this data to uniquely identify computers, cellphones and other devices, and then build profiles of the people who use them. Until recently, fingerprinting was used mainly to prevent illegal copying of computer software or to thwart credit-card fraud. BlueCava's own fingerprinting technology traces its unlikely roots to an inventor who, in the early 1990s, wanted to protect the software he used to program music keyboards for the Australian pop band INXS. View Full Image Michal Czerwonka for The Wall Street Journal BlueCava CEO David Norris plans to fingerprint billions of devices. Tracking cookies 'are a joke,' he says. More from Digits 'Evercookies' and 'Fingerprinting': Are Anti-Fraud Tools Good for Ads? How to Prevent Device Fingerprinting A New Type of Tracking: Akamai's 'Pixel-Free' Technology Tracking companies are now embracing fingerprinting partly because it is much tougher to block than other common tools used to monitor people online, such as browser "cookies," tiny text files on a computer that can be deleted. As controversy grows over intrusive online tracking, regulators are looking to rein it in. This week, the Federal Trade Commission is expected to release a privacy report calling for a "do-not-track" tool for Web browsers. Ad companies are constantly looking for new techniques to heighten their surveillance of Internet users. Deep packet inspection, a potentially intrusive method for peering closely into the digital traffic that moves between people's computers and the broader Internet, is being tested in the U.S. and Brazil as a future means to deliver targeted advertising. Akamai Technologies Inc., an Internet-infrastructure giant that says it delivers 15% to 30% of all Web traffic, is marketing a technique to track people's online movements in more detail than traditional tools easily can. It's tough even for sophisticated Web surfers to tell if their gear is being fingerprinted. Even if people modify their machinesbadding or deleting fonts, or updating softwarebfingerprinters often can still recognize them. There's not yet a way for people to delete fingerprints that have been collected. In short, fingerprinting is largely invisible, tough to fend off and semi-permanent. How to 'Fingerprint' a Computer A typical computer broadcasts hundreds of details about itself when a Web browser connects to the Internet. Companies tracking people online can use those details to 'fingerprint' browsers and follow their users. View Full Image Device fingerprinting is legal. U.S. Rep. Bobby Rush (D.,Ill.), proposed legislation in July that would require companies that use persistent identifiers, such as device fingerprints, to let people opt out of being tracked online. Fingerprinting companies are racing to meet the $23 billion U.S. online-ad industry's appetite for detailed consumer behavior. Previously, the companies focused on using device fingerprints to prevent software theft or to identify computers making fraudulent transactions, in hopes of preventing future attempts. Mr. Norris's firm, BlueCava, this year spun off from anti-piracy company Uniloc USA Inc. to start offering services to advertisers and others. One of the leading e-commerce fraud-prevention firms, 41st Parameter Inc., has begun testing its device-fingerprinting techniques with several online-ad companies. Another anti-fraud company, iovation Inc. of Portland, Ore., says it is exploring the use of device profiles to help websites customize their content. BlueCava says the information it collects about devices can't be traced back to individuals and that it will offer people a way to opt out of being tracked. Still, Mr. Norris says it's tough to figure out how to alert people their devices are being fingerprinted. "We don't have all the answers, but we're just going to try to be really clear" about how the data is used, he says. View Full Image Melanie Tjoeng for The Wall Street Journal Ric Richardson, BlueCava's secret sauce, in Byron Bay, Australia. Neither BlueCava nor 41st Parameter explicitly notified the people whose devices have been fingerprinted so far. Both companies say the data-gathering is disclosed in the privacy policies of the companies they work with. BlueCava says it doesn't collect personal information such as people's names. Its privacy policy says it gathers "just boring stuff that most people couldn't care less about." Ori Eisen, founder of 41st Parameter, says using fingerprinting to track devices is "fair game" because websites automatically get the data anyway. Some advertisers are enthusiastic about fingerprinting. Steel House Inc., a Los Angeles-based ad company, has been testing 41st Parameter's technology for three months on websites of its clients, which include Cooking.com Inc. and Toms Shoes Inc. (Clients weren't notified of the test, and fingerprints weren't used to display ads.) In its examination of 70 million website visits, 41st Parameter found it could generate a fingerprint about 89% of the time. By comparison, Steel House was able to use cookies for tracking on only about 78% of visits, because some people blocked or deleted cookies. More From the Series A Web Pioneer Profiles Users by Name Web's New Goldmine: Your Secrets Personal Details Exposed Via Biggest Sites Microsoft Quashed Bid to Boost Web Privacy On Cutting Edge, Anonymity in Name Only Stalking by Cellphone Google Agonizes Over Privacy On the Web, Children Face Intensive Tracking 'Scrapers' Dig Deep for Data on Web Facebook in Privacy Breach Insurers Test Data Profiles to Identify Risky Clients Shunned Profiling Technology on the Verge of Comeback The Tracking Ecosystem Complete Coverage: What They Know "It's almost like a revolution," says Mark Douglas, founder and CEO of Steel House. "Our intent is that it can completely replace the use of cookies." Steel House offers people a way to opt out of its current cookie-based ads and says it would do the same if it adopts fingerprints. "I definitely don't want to be in the sights of the privacy people," Mr. Douglas says. Computers need to broadcast details about their configuration in order to interact smoothly with websites and with other computers. For example, computers announce which specific Web browsers they use, along with their screen resolution, to help websites display correctly. There are hundreds of parameters. "We call them the 'toys on the table,'" says Mr. Norris of BlueCava. "Everyone has the same toys on the table. It's how you rearrange them or look at them that is the secret sauce" used to fingerprint a specific computer. BlueCava's secret sauce hails from Sydney, Australia, in the early 1990s. Back then, inventor Ric Richardson was helping musicians including the band INXS to use new software for playing their electronic keyboards. "They'd say what sound they wanted, and I'd do it," says Mr. Richardson, who today works out of a van parked near an Australia beach. Mr. Richardson was frustrated when he tried to sell the music software, because there was no way to let people test it before buying. So he designed a "demonstration" version of the software that would let people test it, but not copy it. View Full Image Philip Montgomery for The Wall Street Journal Ori Eisen, founder of 41st Parameter His idea: Configure his software to work only after it was linked to a unique computer. So, he developed a way to catalog each computer's individual properties. He found many subtle variations, among even outwardly similar machines. "It was amazing how different they were," he says. "There are literally hundreds of things you can measure." In 1992, he borrowed $40,000 from his parents, filed a patent application for a "system for software registration" and founded a company, Uniloc Corp. This year, Uniloc started trying to broaden its business away from software-piracy prevention. It recruited Mr. Norris, then running a company that provided photos for advertisers, to seek new uses for its technology. "What I saw was this different way of looking at things on the Web," Mr. Norris says. Mr. Norris became CEO and spun off BlueCava to market device fingerprinting both to fraud-prevention and online-ad firms. Eventually, he hopes Blue Cava can fingerprint everything from automobiles to the electrical grid. In October, Texas billionaire Mark Cuban led a group of investors who put $5 million into BlueCava. BlueCava embeds its technology in websites, downloadable games and cellphone apps. One of its first customers was Palo Alto, Calif.-based IMVU Inc., which operates an online game where 55 million registered players can build virtual identities and chat in 3-D. It wanted to combat fraudsters who were setting up multiple accounts to buy virtual clothing and trinkets with stolen credit-card numbers. Kevin Dasch, a vice president at IMVU, says BlueCava's technology "has led to a significant decline in our fraud rates." View Full Image Melanie Tjoeng for The Wall Street Journal Ric Richardson uses this van as his office. Later this year, BlueCava plans to launch its reputation exchange, which will include all the fingerprints it has collected so far. Unlike most other fraud-prevention companies, BlueCava plans to merge its fraud data with its advertising data. Rivals say they don't mix the two types of data. Greg Pierson, chief executive of iovation, says the company will never disclose specific information about people's Web-browsing behavior, "because it's unnecessary and it's dangerous. It's close to spying." Mr. Norris says collecting that data is "standard practice" in the online-ad business. Mr. Dasch of IMVU says he doesn't mind fingerprints of IMVU customers being added to the exchange, provided that they don't contain personally identifiable information such as user names, and that his company can use other exchange data in return. The idea behind BlueCava's exchange is to let advertisers build profiles of the people using the devices it has identified. For instance, BlueCava will know that an IMVU fingerprint is from someone who likes virtual-reality games. Other advertisers could then add information about that user. BlueCava also plans to link the profiles of various devicesbcellphones, for instancebthat also appear to be used by the same person. Blue Cava also is seeking to use a controversial technique of matching online data about people with catalogs of offline information about them, such as property records, motor-vehicle registrations, income estimates and other details. It works like this: An individual logs into a website using a name or e-mail address. The website shares those details with an offline-data company, which uses the email address or name to look up its files about the person. The data company then strips out the user's name and passes BlueCava information from offline databases. BlueCava then adds those personal details to its profile of that device. As a result, BlueCava expects to have extremely detailed profiles of devices that could be more useful to marketers. In its privacy policy, BlueCava says it plans to hang onto device data "for the foreseeable future." Advertisers are starting to test BlueCava's system. Mobext, the U.S. cellphone-advertising unit of the French firm Havas SA, is evaluating BlueCava's technology as a way to target users on mobile devices. "It's a better level of tracking," says Rob Griffin, senior vice president at Havas Digital. Phuc Truong, managing director of Mobext, explains that tracking on cellphones is difficult because cookies don't always work on them. By comparison, he says, BlueCava's technology can work on all phones. "I think cookies are a joke," Mr. Norris says. "The system is archaic and was invented by accident. We've outgrown it, and it's time for the next thing." Write to Julia Angwin at julia.angwin at wsj.com and Jennifer Valentino-DeVries at jennifer.valentino-devries at wsj.com From 0-596035-1-nifty_com at jmb.jal.com Thu Dec 2 13:13:36 2010 From: 0-596035-1-nifty_com at jmb.jal.com (~Canadian Pharm.) Date: Thu, 2 Dec 2010 18:13:36 -0300 Subject: Relieve your stress with Xanax Message-ID: <6370958332.HLHB73B5272752@dmmnciwwrqdr.gnythovhowc.ua> Why not try it out? Dozens of Products http://www.jailcoach.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 249 bytes Desc: not available URL: From elena at ekobak.ru Thu Dec 2 12:02:49 2010 From: elena at ekobak.ru (=?koi8-r?B?88/CydLBxc0gxsHL1A==?=) Date: Thu, 2 Dec 2010 22:02:49 +0200 Subject: =?koi8-r?B?MiDEztEgy8/N0NjA1MXSztnKIMvMwdPTLCDT1NLPyc0gwsDE1sXULg==?= Message-ID: Тема: Методы разработки и анализа бизнес плана, тэо, инвестиционных проектов. код: (четыре девять пять) Ч.45.Ч-0-95 и 7.9-2.2/1/2/2 Суть обучения!!! очень проста: Вас приглашают в компьютерный класс, где 2 дня с вами занимаются, супер профессионалы (тяжеловесы в финансовом планировании), все два дня Вы являетесь настоящими участниками практического семинара, получаете знания и для закрепления тем выполняете задания, выполняете их на компьютере оснащенным специализированным программным комплексом. Все пробуете Сами, и только Сами. По Окончании курса Вас оснащают лицензионной, полнорабочей специализированной версией программы, для разработки бизнес планов и инвестиционных проектов, Вы прибываете на предприятие, устанавливает продукт на свой компьютер и начинаете сразу работать (без всякой головной боли) - Вот так! Просто! мы делает профессионалов! Краткая информация о предстоящем мероприятии: Дата проведения: I3-IЧ декабря 2010г. Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. Сочетание методов обучения с практикой - позволит достичь максимальных результатов в освоении материала. Все наглядно и просто. На первом этапе излагается теория, на втором рассматриваются закономерности, почему теория не совместима с практикой, на третьем этапе формируется задача и рассматриваются фин. методы ее решения, на четвертом участник самостоятельно решает задачу используя компьютер оснащенный специализированным ПО. Рассмотрение финансовых методов для каждого рода деятельности в отдельности, усиление восприятия информации с помощью специализированного расширенного методического материала. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: * Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. * Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). * Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. * Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него участник семинара может эффективно разрабатывать свои сценарии финансовых проектов. По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 Московский код: 4Ч5/ЧО95 \\\/// ЧЧ5/З2_66 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4222 bytes Desc: not available URL: From ken at sizone.org Thu Dec 2 20:19:24 2010 From: ken at sizone.org (Ken Chase) Date: Thu, 2 Dec 2010 23:19:24 -0500 Subject: wikileaks dns (was Re: Blocking International DNS) Message-ID: On Thu, Dec 02, 2010 at 10:16:23PM -0600, Jorge Amodio said: >On Thu, Dec 2, 2010 at 10:05 PM, Ken Chase wrote: >> All our topics of discussion are merging... (soon: "does >> Wikileaks run on 208V?" :) > >If they keep going that way, soon they will be running on nuclear >power from the hidden centrifuges in some cave. or p2p or tor or torrents of *.tbz's the other day bloomberg was having issues in their db only for stories about wikileaks and assange as per my quick testing, quite annoying, are major news mediae seeing ddos attempts at censorship (or just leaking at the seams infrastructure issues with the big hits on the topic?) /kc -- Ken Chase - ken at heavycomputing.ca - +1 416 897 6284 - Toronto CANADA Heavy Computing - Clued bandwidth, colocation and managed linux VPS @151 Front St. W. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Dec 2 14:20:42 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 2 Dec 2010 23:20:42 +0100 Subject: any moment now ... In-Reply-To: References: Message-ID: <20101202222042.GW9434@leitl.org> On Thu, Dec 02, 2010 at 01:27:41PM -0800, coderman wrote: > On Mon, Nov 29, 2010 at 12:01 PM, John Case wrote: > > ... and wikileaks will be officially classified as a terrorist organization. > > if this did happen, a more interesting question is what happens to the > US citizens who are or would be providing material support to > Wikileaks. (you may not remain a US citizen, for example :) I'm quite looking forward to what will happen when I have to take a transatlantic flight the next time. Not that I intend to, but one can never know. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From lshyla_qa at ieconomy.com Fri Dec 3 01:35:47 2010 From: lshyla_qa at ieconomy.com (Latanya Shyla) Date: Fri, 03 Dec 2010 02:35:47 -0700 Subject: No RX-Required to Order, Codeine 30/15mg for $203.70, 60/15mg for $385.80, 90/15mg for $562.50 0d In-Reply-To: Message-ID: <4CF8B9F3.FCE9A7FB@ieconomy.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://drugsmano18f.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 653 bytes Desc: not available URL: From mardi at decorkamin.ru Fri Dec 3 06:11:25 2010 From: mardi at decorkamin.ru (=?koi8-r?B?88jFzdkg2sHU0sHU?=) Date: Fri, 3 Dec 2010 06:11:25 -0800 Subject: =?koi8-r?B?89TSwdTFx8nRINrB1NLB1CDEzNEgz9DUyc3J2sHDyckg7uTzIMkgzsHM?= =?koi8-r?B?z8fBIM7BINDSycLZzNg=?= Message-ID: <000d01cb92f3$f89ce090$6400a8c0@mardi> 14 Декабря ЗАТРАТНЫЕ МЕХАНИЗМЫ В НАЛОГОВЫХ СХЕМАХ ДЛЯ ОПТИМИЗАЦИИ НДС И НАЛОГА НА ПРИБЫЛЬ (код Москвы) ЧЧ5-40_95 или ЧЧ5.З2_66 Цель: Курс посвящен изучению затратых механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Участники получат краткие индивидуальные консультации по тематике данного курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные","серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов √ ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. 4. Виды приемлимых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 5. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 6. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 7. Ответы на вопросы. По желанию и при наличии возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. По вопpоcам pегucтаpацuu обpащайтеcь по тел: (Ч95) 4*45_Ч.О_95 <<<>>> ЧЧ5/З.9*6/8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6566 bytes Desc: not available URL: From jmamodio at gmail.com Fri Dec 3 07:37:37 2010 From: jmamodio at gmail.com (Jorge Amodio) Date: Fri, 3 Dec 2010 09:37:37 -0600 Subject: wikileaks unreachable Message-ID: > 'they' is a multicast address ... dyn/everydns or wikileaks? which is > the 'they' that is doing the twittering? wikileaks. seems that they (wikileaks) got the message, following tweets included their IP address and the new .ch domain. The current IP address for the cablegate stuff is 213.251.145.96 which is RIPE block assigned to wikileaks, the RIPE WHOIS entry shows 213.251.128.0/18 with AS16276 as originwhois AS16276 (OVH in Paris France), mtr from here (SATX) seems to go through Dallas and enter Global Crossing network or hosting services, currently <2% packet loss. Server seems to be configured to return IP address based URLs. -J ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Dec 3 01:23:01 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Dec 2010 10:23:01 +0100 Subject: wikileaks dns (was Re: Blocking International DNS) Message-ID: <20101203092301.GD9434@leitl.org> ----- Forwarded message from Ken Chase ----- From eugen at leitl.org Fri Dec 3 01:24:01 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Dec 2010 10:24:01 +0100 Subject: wikileaks dns (was Re: Blocking International DNS) Message-ID: <20101203092401.GE9434@leitl.org> ----- Forwarded message from Randy Bush ----- From eugen at leitl.org Fri Dec 3 01:25:08 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Dec 2010 10:25:08 +0100 Subject: wikileaks unreachable Message-ID: <20101203092508.GF9434@leitl.org> ----- Forwarded message from Randy Bush ----- From jgreco at ns.sol.net Fri Dec 3 08:50:19 2010 From: jgreco at ns.sol.net (Joe Greco) Date: Fri, 3 Dec 2010 10:50:19 -0600 (CST) Subject: Wikileaks moved to cave bunker in Iran, Mr. Assange reportedly offered asylum by North Korea... Message-ID: > On Thu, Dec 2, 2010 at 10:05 PM, Ken Chase wrote: > > All our topics of discussion are merging... (soon: "does > > Wikileaks run on 208V?" :) > > If they keep going that way, soon they will be running on nuclear > power from the hidden centrifuges in some cave. And just announced via Twitter ... no, just kidding. However, the events here are troublesome. On one hand, it's kind of predictable. You have some things in the real world, like the arrest alert and being placed on Interpol's "most wanted" for what appears to be not even a case of rape [*1], getting booted from EC2 for "intellectual property" reasons (when the materials in question are not and cannot be copyrighted), having their DNS service disrupted, etc. Assange has irritated a large beast: the US Government. On the other hand, this is the same government that has repeatedly fought to reduce and minimize privacy laws, seen recently in cases such as the GPS tracking fun out in the western states [*2]. None of that might seem relevant to netops, of course, but at some point, we're going to see, and maybe already are seeing, deliberate interference with the network in an effort to make the Internet work the way that the US Government would prefer. We've already seen some examples of this in seizures of domain names [*3], an activity that would doubtlessly explode under COICA, etc., which at the moment is probably the most vulnerable aspect of the Internet, but will this move on to more insidious things, such as redirection of or null routing of Wikileaks IP space "in response to a congressman's request", while simultaneously waving a patriotic flag? And at what point does that stop? Just for "big bad" things like Wikileaks? We seem to be sailing into an interesting new set of challenges. I'm not sure that it'll be healthy for the net for the government to be providing lists of IP addresses that have to be blocked; our routing tables are already quite challenged. [*1] http://www.aolnews.com/world/article/sex-by-surprise-at-heart-of-julian-assange-criminal-probe/19741444 [*2] http://www.wired.com/threatlevel/2010/10/fbi-tracking-device/ [*3] http://www.eff.org/deeplinks/2010/11/us-government-seizes-82-websites-draconian-future ... JG -- Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net "We call it the 'one bite at the apple' rule. Give me one chance [and] then I won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN) With 24 million small businesses in the US alone, that's way too many apples. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Dec 3 02:05:58 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Dec 2010 11:05:58 +0100 Subject: Feds Warrantlessly Tracking =?utf-8?Q?Amer?= =?utf-8?B?aWNhbnPigJk=?= Credit Cards in Real Time Message-ID: <20101203100558.GH9434@leitl.org> http://www.wired.com/threatlevel/2010/12/realtime/ Feds Warrantlessly Tracking Americansb Credit Cards in Real Time * By Ryan Singel * December 2, 2010 | * 5:06 pm | * Categories: Surveillance Federal law enforcement agencies have been tracking Americans in real-time using credit cards, loyalty cards and travel reservations without getting a court order, a new document released under a government sunshine request shows. The document, obtained by security researcher Christopher Soghoian, explains how so-called bHotwatchb orders allow for real-time tracking of individuals in a criminal investigation via credit card companies, rental car agencies, calling cards, and even grocery store loyalty programs. The revelation sheds a little more light on the Justice Departmentbs increasing power and willingness to surveil Americans with little to no judicial or Congressional oversight. For credit cards, agents can get real-time information on a personbs purchases by writing their own subpoena, followed up by a order from a judge that the surveillance not be disclosed. Agents can also go the traditional route b going to a judge, proving probable cause and getting a search warrant b which means the target will eventually be notified they were spied on. The document suggests that the normal practice is to ask for all historical records on an account or individual from a credit card company, since getting stored records is generally legally easy. Then the agent sends a request for bAny and all records and information relating directly or indirectly to any and all ongoing and future transactions or events relating to any and all of the following person(s), entitities, account numbers, addresses and other mattersb&b That gets them a live feed of transaction data. DOJ powerpoint presentation on Hotwatch surveillance orders of credit card transactions Itbs not clear what standards an agent would have to follow to get a bHotwatchb order. The Justice Department told Sogohian the document is the only one it could find relating to bhotwatchesb b which means there is either no policy or the department is witholding relevant documents. The Justice Department did not return a call for comment. Every year, the Justice Department does have to report to Congress the numbers of criminal and national security wiretaps undertaken, as well as the number of National Security Letters issued. Tens of thousands of NSLs are issued yearly b most with gag orders that forbid ISPs or librarians from ever saying they have ever been served with such a subpoena. But the Justice Department does not report or make public the number of times it got real time or historic cell phone location information, nor how often it is using these so-called bhotwatchb orders. From eugen at leitl.org Fri Dec 3 04:18:15 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Dec 2010 13:18:15 +0100 Subject: in case someone wants to play analyst Message-ID: <20101203121815.GL9434@leitl.org> ...and not write code. http://www.reddit.com/r/WikiLeaksAnalysis/ -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From randy at psg.com Thu Dec 2 21:26:35 2010 From: randy at psg.com (Randy Bush) Date: Fri, 03 Dec 2010 14:26:35 +0900 Subject: wikileaks dns (was Re: Blocking International DNS) Message-ID: so, if the site to which a dns entry points suffers a ddos, everydns will no longer serve the domain. i hope they apply this policy even handedly to all sufferers of ddos. if not, as a registrar, i guess i can no longer accept registrations where everydns is the ns delegatee. randy ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From randy at psg.com Thu Dec 2 22:15:33 2010 From: randy at psg.com (Randy Bush) Date: Fri, 03 Dec 2010 15:15:33 +0900 Subject: wikileaks unreachable Message-ID: > Message from twitter @wikileaks: > WikiLeaks,org domain killed by US everydns.net after claimed mass > attacks. as someone who has done a lot of tunneling, uucping, funny routing relays, ... for democratic movements in lots of countries, i am not pleased at seeing the need arise in the so-called democratic states. randy ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Dec 3 06:44:50 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Dec 2010 15:44:50 +0100 Subject: U.S. 'Connects The Dots' To Catch Roadside Bombers Message-ID: <20101203144450.GO9434@leitl.org> http://www.npr.org/2010/12/03/131755378/u-s-connects-the-dots-to-catch-roadside-bombers U.S. 'Connects The Dots' To Catch Roadside Bombers by TOM GJELTEN EnlargeDavid Gilkey/NPR Marines on patrol in Afghanistan's Helmand province walk near a blast crater from a homemade explosive device. Roadside bombs are the leading killer of U.S. troops in Iraq and Afghanistan. The American military has turned to mathematics and social network analysis to help identify bombers and their supporters. December 3, 2010 With his doctorate from Princeton, Army Gen. David Petraeus, the U.S. commander in Afghanistan, has become the prime example of a special breed of soldier: the warrior-scholar, trained in history and politics as well as how to fight wars. Now there's a variation on the theme: the warrior mathematician, adept in the complex modeling that has become a key part of military planning. The Problem: Assessing The Enemy Soldiers who will be involved in the effort to prevent roadside bombs, known as improvised explosive devices, or IEDs, are presented with the following scenario. You are an infantry patrol leader and your unit encounters the following chain of events: Raheim, a known enemy operative, was found carrying a cell phone which he has used to maintain constant contact with two individuals, Jalil Al Tikrit and Farrah Imir. Text messages on Raheim's phone reveal a plot by Jalil Al Tikrit and another unknown individual to place an IED in a culvert along a supply route commonly used by U.S. forces. Raheim is immediately taken into custody and handed over to local authorities. Hours later, a local shopkeeper named Ibraheem is seen talking to a man named Habib Muhammed, but Ibraheem was not seen with anyone else. Later, an unidentified individual and Habib Muhammed are captured in a culvert. Habib Muhammed was found to be carrying a credit card owned by Farrah Imir along with a list of supplies in Farrah Imir's handwriting that seems to be a manifest for building and placing an IED. As you ponder the events of the day, it dawns on you that the unknown individuals are not unknown at all. You know their identities. The task: Build a model of the network of individuals and use it as part of your analysis to develop a target. To see the answer, scroll down the page. Course Guide, Advanced Network Analysis and Targeting: A Social Networks Approach to Targeting, by Ian McCulloh, Anthony Johnson, and Helen Armstrong. Used by permission. With roadside bombs the leading killer of U.S. troops in Iraq and Afghanistan, military commanders have turned increasingly to the use of social network analysis to identify the key players in the groups responsible for the bombs, which the military calls improvised explosive devices, or IEDs. The approach is rooted in the belief that a roadside bomb is never the work of one individual alone. 'Attack The Network' "Someone has to build it, someone has to place it, someone has to do surveillance on the place where you place it," said Kathleen Carley, a professor of computer science at Carnegie Mellon University and the unofficial godmother of social network analysis as applied to the IED problem. "If you're trying to defeat IEDs, what you're talking about is understanding that whole process b who is involved, how they are connected to each other b so that you can figure out where the best place is to intervene," Carley said. The idea is that an analysis of the social network behind roadside bombing attempts will make it possible to identify which members of the group are most vital to the operation and most important to stop, in order to disrupt the entire network. "Any organization has relationships," said Army Maj. Ian McCulloh, deputy director of the Counter-IED Operations Integration Center in Baghdad and one of Carley's former students. "Civilian firms have used social network analysis for decades to map out those relationships and identify the organization's vulnerabilities. The same principles apply to threat networks. This helps us identify their vulnerabilities," he said. The U.S. military's biggest success so far in the use of network analysis was the capture of Saddam Hussein in December 2003. He was found after soldiers diagrammed the social networks of his chauffeurs and others close to him. The technique is now used extensively to identify the key figures in insurgent groups in both Iraq and Afghanistan. "Attack the Network" is the motto of the anti-IED effort. Much is at stake. Of 3,486 U.S. service members killed in Iraq since 2003 by hostile action, 2,196 have died as a result of IED explosions, according to figures released by the Pentagon and other sources. In Afghanistan, nearly 90 percent of U.S. military deaths due to hostile action b 1,075 as of Dec. 2 b have been caused by IEDs. Connecting The Dots McCulloh, who received his doctorate in network science from Carnegie Mellon, is an expert in the application of relational algebra to the study of IED networks. He teaches other soldiers in the analytical techniques. While on leave last month from his post in Baghdad, McCulloh taught a one-week class in "Advanced Network Analysis and Targeting" to a group of Iraq-bound soldiers at Fort Bragg in North Carolina. Each of the soldiers was to be involved with the anti-IED effort in Iraq, primarily in the selection of targets for military operations. Answer: The Network In the exercise above and the solution below, each individual is a "node," displayed as a dot linked by lines to other dots. Some nodes are more important than others, depending on their "betweenness" scores, determined, basically, by how well connected an individual is to others in the network. When a "highly central node" emerges, that is a person the military may try to capture or kill. Courtesy of Kathleen Carley In this case, Habib Muhammed, who is connected to three others in the network, is the "most central" node. One of the goals listed in McCulloh's course guide is to help soldiers "mathematically quantify influential network nodes ... in order to provide warfighters with objective measures for the relative values of various potential targets." For many of the soldiers in the course, the mathematics instruction was daunting. "I took some math in high school, but mainly it was statistics," said Chief Warrant Officer John Fleshman, an 18-year Army veteran. "Fortunately, Major McCulloh breaks it down to high school level." Fleshman, an artillery targeting officer, said the mathematics he learned in his Fort Bragg class made it easier to identify the most important targets for anti-IED and other counterinsurgency operations. "You have to know where to look, and this helps you know where to look," he said. In McCulloh's class, "connecting the dots" is taken literally. He shows his students how to visualize a network of all of the people involved in an IED cell. On a computer screen, each individual is a "node," displayed as a dot linked by lines to other dots. Some nodes are more important than others, depending on their "betweenness" scores, determined, basically, by how well connected an individual is to others in the network. "From these guys and these guys, it's a lot shorter to go through D than it is to go through E and F," McCulloh points out to one of his soldier students. "So that's what gives D high betweenness centrality. He also has an average shorter distance to everybody, so in many ways, D is the highly central node." When the U.S. military is looking for key people to capture or kill, you do not want to be identified as "a highly central node." Same Conclusions, But Faster Military commanders and intelligence analysts have long understood the need to study relationships among individuals on the enemy side. What's new is how sophisticated and mathematical the process has become. McCulloh, a brainy young officer who also teaches at West Point, thinks the Army needs more warrior-mathematicians like himself. Still, the lanky redhead had to learn some humility when he went to work a couple of years ago in Afghanistan alongside grizzled intelligence veterans. "I thought I was going to go in there with my network analysis and my academic background, and I was going to find all of the hidden nodes, the key guys," McCulloh says. "I was going to find bin Laden and all the guys that were leading the terrorism. And I was actually a little disappointed to find that everybody I found in any of the data sets that I looked at, we already knew about." EnlargeTom Gjelten/NPR Chief Warrant Officer Michael Kanabrocki (left) attends a class led by Maj. Ian McCulloh at Fort Bragg, N.C., on using mathematical modeling and social network analysis to identify key players in groups responsible for roadside bombs in Iraq and Afghanistan. The veterans had used hunches and intuition to figure out the networks. But McCulloh says his math and computer science training did help him work more quickly than the old-timers could. "The first network I looked at probably had about 200 to 300 nodes in it," he says. "It took an analyst with 26 years of experience about five days to look through it and identify where they felt the key vulnerabilities were. I was able to put it into the software that I use and do some basic network analysis and in about 15 to 20 minutes I had the same conclusion." Advantages To Mathematical Precision As with any computer operation, the quality of the analysis depends on the quality of the data going in. Carley, the Carnegie Mellon University professor who has been working with the military since she got out of college, says if soldiers are to understand a roadside bombing network, they need information b from people they capture, from informants and from intercepted phone calls. "You try to find things about who else they know," Carley says, "who they're related to, where they've been in the past, where were they trained, what other kind of groups did they belong to, things like that." In this regard, Carley says, network analysis presents yet another advantage. A computer-generated network diagram can help soldiers "see" what data they are missing and still need to gather. The mathematical precision that comes with this analysis also gives soldiers more confidence in their judgments than might be the case with hunches and intuition. That's important to military lawyers who have to approve an operation to capture or kill someone. Maj. Eugene Vindman, a JAG officer, or judge advocate general, says McCulloh's network analysis course put him and other military lawyers in a better position to carry out oversight responsibilities in Iraq. "[You could] maybe do a little bit of analysis on your own or ask some intelligent questions of the targeteers," Vindman says, "to make sure that the target they've identified is not a guy that might have made a wrong phone call to a bad guy but actually has enough links to that bad guy through other activities to actually be a bad guy and therefore be a legal military target." From bortzmeyer at nic.fr Fri Dec 3 06:49:22 2010 From: bortzmeyer at nic.fr (Stephane Bortzmeyer) Date: Fri, 3 Dec 2010 15:49:22 +0100 Subject: wikileaks dns (was Re: Blocking International DNS) Message-ID: On Fri, Dec 03, 2010 at 08:27:57AM -0600, Dan White wrote a message of 28 lines which said: > Their A records on Sunday were: (No longer working.) Several people are keeping track of working IP addresses and avertise them in the DNS (wikileaks.something.example). Other have full mirrors. A current list: http://etherpad.mozilla.org:9000/wikileaks copy it, so you can access the DNS mirrors even if mozilla.org is taken down... It's a very interesting exercice in resiliency. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Dec 3 06:58:15 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Dec 2010 15:58:15 +0100 Subject: wikileaks dns (was Re: Blocking International DNS) Message-ID: <20101203145815.GP9434@leitl.org> ----- Forwarded message from Stephane Bortzmeyer ----- From eugen at leitl.org Fri Dec 3 07:53:35 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Dec 2010 16:53:35 +0100 Subject: wikileaks unreachable Message-ID: <20101203155335.GQ9434@leitl.org> The French have declared war on OVH, though, so it won't be there for long. http://news.netcraft.com/archives/2010/12/03/french-minister-declares-war-on-wikileaks.html Of course the torrents are up, so the cat is quite firmly out of the bag. ----- Forwarded message from Jorge Amodio ----- From eugen at leitl.org Fri Dec 3 08:53:19 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Dec 2010 17:53:19 +0100 Subject: Wikileaks moved to cave bunker in Iran, Mr. Assange reportedly offered asylum by North Korea... Message-ID: <20101203165319.GT9434@leitl.org> ----- Forwarded message from Joe Greco ----- From eugen at leitl.org Fri Dec 3 08:56:18 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Dec 2010 17:56:18 +0100 Subject: shearing firesheep with the cloud Message-ID: <20101203165618.GU9434@leitl.org> (old hat, but posting the recipe doesn't hurt) http://www.stratumsecurity.com/blog/2010/12/03/shearing-firesheep-with-the-cloud/ Shearing FireSheep with the Cloud Friday 3 December 2010 - Filed under Apple + Cloud + EC2 + Encryption + Privacy + wireless If your laptop ever connects to a network behind enemy lines (e.g. hhonors, attwifi, panera), this post is for you. The step-by-step directions below allow you to stand up a portable, cloud-based private VPN that you can use from anywhere b for around $0.50 a month. Once you get everything setup, you can feel good connecting to a hotspot and laugh at the guy running FireSheep. Speaking of Firesheep, Ibve actually had some people close to me (including my wife) ask how they can prevent these types of attacks from happening. There are some nice boff-the-shelfb solutions like HTTPS Everywhere and BlackSheep but as a security professional I wanted to give a recommendation that would provide broader coverage than these solutions. Enter Amazonbs recently introduced Free Tier for EC2. Ibll save my thoughts and comments on bThe Cloudb and security for a later date (and after a couple of beers), but for the purposes of this solution, it works great to help you increase your security while using open wireless networks. Quite simply, the solution I came up with was to create an EC2 instance with Ubuntu 10.04 LTS server and setup OpenVPN and SideStep. This allows me to route all of my traffic over an SSL or SSH VPN to my EC2 instance and then out to the Internet. ... From chara_hiedivo at homesweb.com.jfet.org Fri Dec 3 17:44:59 2010 From: chara_hiedivo at homesweb.com.jfet.org (Chara Hiedi) Date: Fri, 03 Dec 2010 18:44:59 -0700 Subject: Discount CialisViagra from $1.38, Express delivery, 90000+ Satisfied US, UK, CANADIAN Customers! 73 In-Reply-To: <089901cb8fe4$5dae7df8$0791582e@ev6b0n1> Message-ID: <4CF99D1B.1F108BC0@homesweb.com> OrderCializViagra Online & Save 75-90% 0nline Pharmacy NoPrescription required Buy Canadian Drugs at Wholesale Prices and Save 75-90% FDA-Approved drugs + Superb Quality Drugs only! Accept all major credit cards Order Today! From $1.38 http://wyfsy.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 509 bytes Desc: not available URL: From patrice at xs4all.nl Fri Dec 3 10:08:36 2010 From: patrice at xs4all.nl (Patrice Riemens) Date: Fri, 3 Dec 2010 19:08:36 +0100 Subject: Daniel Henninger: Wikileaks R Us (Wall Street Journal) Message-ID: original to: http://online.wsj.com/article/wonder_land.html (will probably change - Google for actual URL) * WONDER LAND * DECEMBER 2, 2010 WikiLeaks R Us We can't put the Internet genie back in the bottle. By DANIEL HENNINGER There is one certain fix for the WikiLeaks problem: Blow up the Internet. Short of that, there is no obvious answer. This summer I was in a movie line behind two guys, and one said: "I hate Facebook. I wish it had never been invented. But I can't live without it." Welcome to the WikiLeaks problem, which was born along with the Internet itself. What we can't live without may kill us. In October, the Secret Service arrested a Malaysian man in New York who had 400,000 bank-card numbers. He'd hacked them out of the Cleveland Federal Reserve and other financial institutions. Last year a contractor remotely inserted a potentially destructive "logic bomb" on Fannie Mae's servers that could have erased a lot of its data. What about your co-worker? Two years ago, a worker in the City of San Francisco's technology department created a password that let him access virtually all the city's files and business on its FiberWAN network, while blocking access to everyone else. They caught him, but for a while he held the city hostage, refusing to give up his key to the city. Can Bank of America say with certainty they haven't been robbed of the data Julian Assange claims to possess? No, they can't. Once you input anything into the digital ethers, it will never be "safe" or "private." Sun Microsystems' co-founder Scott McNealy famously said: "You have zero privacy. Get over it." We know that. What we don't know, or won't admit, is that the idea of confidentialityState Department cables, the design for weapons systems, health recordshas eroded, perhaps permanently. We can't put the Internet genie back in the bottle. Everyone from Hillary Clinton on down is "shocked" at the cables dump. But if last year one had polled experts on the architecture of data systems about the probability of this event, most would have said it surely would happen, eventually. The Government Accountability Office has released survey after survey on this problem, all singing the same song printed on the front of this June's report: "Cybersecurity: Key Challenges Need to Be Addressed." Congress has thrown dozens of bills at cybersecurity. Is WikiLeaks Obama's fault? No. You could throw the entire IQ capacity of Google's work force at the problem. They might devise a solution, but it wouldn't be the answer. Like the Web itself, it's complicated. Private companies already offer solutions to protecting data systems. "Data-at-rest" and "data-in-motion" programs look for anomalies in emails and other data moving through networks or resting on hard drives. SIM (security information management) software tracks network intrusions. It's pretty good, the way climatology is pretty good. But there's a maddening paradox that this technology poses to any organized group of people trying to use it for good ends: How to set up protocols that will haul in the bad guys without hampering the creative work of everyone else? If the U.S. (or Europe) has one big comparative advantage left, it is an information advantage. Out of the organized serendipity of many smart people bouncing information-laden ideas off each other, good things happen here. Whether workers in a knowledge society are creating advances on cancer or software for the pilotless drones killing our worst enemies, they need lots of information, need it now, and need to "talk" about it on the network with colleagues. That means "odd" but legitimate events are going to occur on one's data network. Separating all the odd from one bad is hard. China's security solution is to suppress the flow of information, let creativity be damned, and steal from us. (The New York Times's Thomas Friedman yesterday asked: "What if China had a WikiLeaker?" The three-word answer: They'd execute him.) The Pentagon, State Department and our banks are at risk because it is hard to define who or what should be monitored. Then each institution would have to create an Orwellian "monitoring" office. Oh wait, we already did thatthe Department of Homeland Security. Problem solved. After 9/11, non-communicating, "stove-piped" federal agencies emerged as a top problem. To open the cross-agency information flow of classified information they created SIPRNet. Now the State Department has pulled the plug on SIPRNet. Ponder this: The CIA never joined SIPRNet and took heat for that. Count me as glad that Assange doesn't have access to data on the agency's anti-Taliban drone program. Two big things transformed the postwar world: nuclear fission and the Internet. Nuclear fission gave us clean energy and the atomic bomb. The Internet? With WikiLeaks, we arrive at the Internet version of putting the nuclear genie back in the bottle. There may be no obvious fix for the paradoxes of this inherently vulnerable technology. But we also can't survive in a digital state of nature. The Internet "A-bomb" will go off eventually. Here's a thought for our befuddled national leadership: The first time humans concluded that they needed to deter bad people from taking advantage of civilization, they set common rules. If people broke them, they put them away. Pfc. Bradley Manning, charged with downloading all that data for Assange, is sitting in a Quantico jail. He could get 52 years. He should. And that's just for starters, if we hope to live with the Internet genie. Write to henninger at wsj.com # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From 0-grafted at jerusalem.jp Fri Dec 3 04:20:17 2010 From: 0-grafted at jerusalem.jp (Your Perfect-RX) Date: Fri, 3 Dec 2010 20:20:17 +0800 Subject: Valium can help reduce your stress Message-ID: <2883624521.U1OFB4VH901834@lnacfpnp.ctjgsjcwcwcymek.biz> Dont let your relationship become Stale, keep it exciting! Satisfaction Guaranteed! http://www.jailcoach.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 288 bytes Desc: not available URL: From iryona at portal-shelkovo.ru Fri Dec 3 12:41:20 2010 From: iryona at portal-shelkovo.ru (=?koi8-r?B?7sXEz8LSz9PP18XT1M7P09TYINDP09TB193Jy8/X?=) Date: Fri, 3 Dec 2010 21:41:20 +0100 Subject: =?koi8-r?B?7sXEz8LSz9PP18XT1M7ZxSDQz9PUwdfdycvJ?= Message-ID: IО декабря 2010г. Тема: (Недобросовестные поставщики.) Практические рекомендации как отвечать налоговой инспекции в случае проверки недобросовестных контрагентов и как можно уйти от НДС без последствий +7 (Ч95) 4Ч/53-96-8 <> 44_5_ЧО*-95 курс даст слушателям ответ на то, как правильно заключать договоры и что делать, если он ошибся, но при этом хотел бы сохранить свои налоговые обязательства без изменений. Слушатели будут точно знать что и как отвечать налоговой инспекции в случае проверки таких контрагентов. Поймут как можно уйти от НДС без последствий. Практика свидетельствует, что практически все проверки налогоплательщиков применяющих ОСН затрагивают данный вопрос с негативными для налогоплательщика последствиями. При этом налоговый орган исключает из состава затрат НП и вычетов по НДС суммы по контрагентам, которые, например, просто не отвечают на запрос в рамках встречных проверок, либо не заплатили налоги и т.п. Подчас очень тяжело отстоять свою правоту в спорах с налоговым органом. Обучающий курс посвящен вопросу защиты налогоплательщика, призван помочь ему как не погрязнуть в тотальных проверках своих контрагентов, так и в последствии защитить свои права по взаимоотношениям я такими компаниями. На семинаре не только будут показаны способы противодействия придиркам налоговой, но и будут разобраны способы заключения договоров, которые в принципе исключают возможность признания лица недобросовестным, а также законные способы снижение налоговой нагрузки по НДС в том случае, если налогоплательщик в этом заинтересован. Программа: 1.Методические указания Минфина о назначении выездных налоговых проверок. 2.Методические указания Минфина по поиску недобросовестных контрагентов. 3.Основания признания налоговой выгоды необоснованной (на основании судебной практики, писем Минфина, практики проверок). 4.Что необходимо сделать, чтобы проявить разумную осмотрительность. Какие документы и какую информацию о контрагенте необходимо собрать. 5.Как защититься от претензий налогового органа о том, что контрагент: * не платит налоги и не сдает отчетность; * не отвечает на встречные проверки; * не находиться по месту регистрации, либо зарегистрирован по адресу массовой регистрации; * директор БОМЖ, ничего не подписывал, его подпись подделали и т.п. * директор является "массовым", в отношении руководителя проводятся розыскные мероприятия; * проведенный осмотр показал, что компания не могла отгрузить товар с адреса, указанного в накладной, счете-фактуре; * коды ОКВЭД контрагента не позволяют ему произвести действия, которые он якобы произвел по отношению к налогоплательщику (не может выполнять работы, поставлять товар и т.п., так как создан для иных целей); * иные претензии. 6.Способ ухода от признания налоговой выгоды необоснованной при заключении договоров с поставщиками при помощи посредника. Как построить договор, чтобы претензии по поставщикам нельзя было предъявить. 7.Уход от признания налоговой выгоды необоснованной путем особого способа заключения договоров. 8.Уход от уплаты НДС с наценки путем: * заключения договора с дополнительной выгодой; * заключение договора с предварительной куплей-продажей опциона; * включение условий о неустойки. 9.Кто отвечает за работу с недобросовестными контрагентами (директор или бухгалтер) и в какой части. 10.Потеря документов по недобросовестным поставщикам. Налоговые последствия. Указания Минфина по привлечению к ответственности в таком случае. Способ защиты от налоговых претензий. Является ли потеря документов защитой от претензий правоохранительных органов. 11.Ответы на индивидуальные вопросы. Cтоимоcть: 7900 руб. Информацию можно получить по телефонам: (код Москвы) 7_9-2-2*I_2_2 \\// 4Ч-539_68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5287 bytes Desc: not available URL: From eugen at leitl.org Fri Dec 3 13:28:11 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Dec 2010 22:28:11 +0100 Subject: Daniel Henninger: Wikileaks R Us (Wall Street Journal) Message-ID: <20101203212811.GX9434@leitl.org> (a load of bollocks) ----- Forwarded message from Patrice Riemens ----- From helenevanita_xc at christian.com Sat Dec 4 01:57:16 2010 From: helenevanita_xc at christian.com (Helene Vanita) Date: Sat, 04 Dec 2010 02:57:16 -0700 Subject: Discounts Anxiety Meds: XanaxValiun, Ativan, K1onopiin.. VISA, AMEX, E-Check Accepted. Buy Now! 39g In-Reply-To: <1c1f01cb8f63$ed4c994f$3d44ddfa@m0f3tc3> Message-ID: <4CFA107C.8270E978@christian.com> Discounts! Buy Cheap AnxietyMedz w/o Rx XanaxValiun, Diazepam, K1onopiin, Ativan, Lorazepam etc No Rx Required Fast 3-5 Days Shipping Available (USPS)! VISA, AMEX, E-Check Accepted. Buy Now! http://onlinegifford17z.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 624 bytes Desc: not available URL: From m.tennilleje at acbs.com Sat Dec 4 11:00:33 2010 From: m.tennilleje at acbs.com (Rhiannon Tennille) Date: Sat, 04 Dec 2010 12:00:33 -0700 Subject: WHY buy original? we sell at 8-10% of ORIGINAL PRICE: BvlgariRolexRado, Dior, IWC, Longines & LV + Gucci Bags 0oqi Message-ID: <4CFA8FD1.68EC4790@acbs.com> Replica watches On Sale - Best Replica Watches Online Shop We offer a wide selection of cheap replica watches including Rolex, Gucci, Chanel and more. Nobody will even know you are wearing a fake ... Buy Best Quality Replica on our site http://checknote.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 606 bytes Desc: not available URL: From tme at americafree.tv Sat Dec 4 09:27:17 2010 From: tme at americafree.tv (Marshall Eubanks) Date: Sat, 4 Dec 2010 12:27:17 -0500 Subject: U.S. officials deny technical takedown of WikiLeaks Message-ID: On Dec 4, 2010, at 10:45 AM, andrew.wallace wrote: > Washington (CNN) -- U.S. officials at the Pentagon and State Department denied Friday knowing of any efforts to take down the WikiLeaks website or asking companies to do so. > > http://edition.cnn.com/2010/POLITICS/12/03/wikileaks.takedown/index.html > Yes, that is what both spokesmen literally did "I am not aware of any conversations by the United States government" - said State Department spokesman P.J. Crowley. "I am not aware that the Department of Defense is behind any of the problems that WikiLeaks is experiencing," Col. Dave Lapan, Pentagon spokesman. Not the Department, not the Secretary, not the Joint Chiefs, just the lowly old spokesman, all by himself, who is "not aware." A weaker and less convincing denial can scarcely be imagined this side of the divorce court. And the CNN headline, while technical true : U.S. officials deny they are urging technical takedown of WikiLeaks would be more accurate as Minor U.S. officials deny they are personally urging technical takedown of WikiLeaks which would have not nearly had the same punch. Regards Marshall > Andrew > > > > > ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bill.stewart at pobox.com Sat Dec 4 13:16:23 2010 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 04 Dec 2010 13:16:23 -0800 Subject: U.S. officials deny technical takedown of WikiLeaks In-Reply-To: <20101204181026.GE9434@leitl.org> References: <20101204181026.GE9434@leitl.org> Message-ID: <6.2.1.2.1.20101204131324.02eea908@pop.sonic.net> > > Washington (CNN) -- U.S. officials at the Pentagon and State Department > denied Friday knowing of any efforts to take down the WikiLeaks website > or asking companies to do so. > > http://edition.cnn.com/2010/POLITICS/12/03/wikileaks.takedown/index.html > >Yes, that is what both spokesmen literally did >"I am not aware of any conversations by the United States government" - >said State Department spokesman P.J. Crowley. >"I am not aware that the Department of Defense is behind any of the >problems that WikiLeaks is experiencing," Col. Dave Lapan, Pentagon spokesman. Well, if the spokescritters for the State Department or the DoD are not aware of the conversations their departments are having, I've got a good suggestion for a website where they can find out.... From 0-t_operations at business-post.com Fri Dec 3 20:54:50 2010 From: 0-t_operations at business-post.com (World's Top-Pharma) Date: Sat, 4 Dec 2010 13:54:50 +0900 Subject: Get the same Phentermine online as you would from a weight loss clinic Message-ID: <2247425792.G0UBNTSM586888@vvmhlrwjdcgswo.seprjglrgwdqqh.tv> Low Priced Excitement for both the man and the woman! Results Guaranteed http://www.jailcoach.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 285 bytes Desc: not available URL: From selma.thorakt at pelicanhotel.com Sat Dec 4 13:03:57 2010 From: selma.thorakt at pelicanhotel.com (Selma Thora) Date: Sat, 04 Dec 2010 14:03:57 -0700 Subject: Rep1icaRo1ex :: Breitling Rep1icaWatch :: CartierRep1ica & more. Best Rep1icaWatches from $150 oq In-Reply-To: <6bac01cb9319$788380d0$00ba11ed@t8ex3aa> Message-ID: <4CFAACBD.33086542@pelicanhotel.com> SwissRep1ica Luxury Watches from $150 Each ** 85% OFF RETAIL SELLING PRICE! ** RolexDaytona RolexExplorer II RolexGMT master II RolexSpecial Collection RolexSubmariner RolexYachtmaster RolexCellini RolexDatejust RolexDaydate Buy Best Quality Rep1icaWatches here http://articulatetime.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 684 bytes Desc: not available URL: From fphu at vip-mebel.ru Sat Dec 4 07:13:57 2010 From: fphu at vip-mebel.ru (=?koi8-r?B?88XS2cUg88jFzdk=?=) Date: Sat, 4 Dec 2010 17:13:57 +0200 Subject: =?koi8-r?B?68HLINbJ1NggwsXaIM/CzsHMyd7LySDJIMbJ0s0tz8TOz8TOxdfPyw==?= Message-ID: <897466561.44236146643665@vip-mebel.ru> 15 Декабря Московский код; Ч4/5Ч/095 **** 7/Ч2/9I_98 Налоговое планирование в условиях кризиса: как жить без обналички и фирм-однодневок и не разориться 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности┘); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей Вся информация по тел: (495) 7Ч2.9l_98 ; 4Ч5/3968 From eugen at leitl.org Sat Dec 4 10:10:26 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 4 Dec 2010 19:10:26 +0100 Subject: U.S. officials deny technical takedown of WikiLeaks Message-ID: <20101204181026.GE9434@leitl.org> ----- Forwarded message from Marshall Eubanks ----- From camera_lumina at hotmail.com Sat Dec 4 18:05:26 2010 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sat, 4 Dec 2010 21:05:26 -0500 Subject: Hooray for Wikileaks, boo for Assange In-Reply-To: References: , Message-ID: Well, I think that's certainly a reasonable argument. On the other hand, note that Cryptome has done largely the same thing for, what, well over 10 years now. But Young has kept a far lower profile, with the emphasis on the material, as opposed to generating a lot of publicity. Would Manning have sent his materials to Cryptome in the absence of Wikileaks? I don't think so. Call that bullshit but that's the way most people actually function. Sometimes, you need an obvious figure in order to garner sufficient attention. You could also argue that Assange isn't really in this for much other than his own glory, but I don't care much. Indeed, when the furor over Wikileaks dies down, one can easily see a flotilla of similar though truly anonymous sites operating. But Wikileaks will have been the site that brought such ideas into common thinking. -TD > Date: Mon, 29 Nov 2010 16:49:37 +0000 > From: case at sdf.lonestar.org > To: camera_lumina at hotmail.com > CC: cypherpunks at al-qaeda.net > Subject: Re: Hooray for Wikileaks, boo for Assange > > On Sun, 28 Nov 2010, Tyler Durden wrote: > > > John Young mourned the death of crypto and cypherpunks, but here we are > > precisely in a situation in which a government couldn't bomb or assassinate or > > otherwise throw some jackbooted tantrum or threat in order to get its' way. > > > > It's cute too that, just like "rendition", Assange and Wikileaks operate in a > > nebulous amalgam of jurisdictions. Is it illegal for them to do what they did? > > In which country? OK, what about another country and its' mirror sites? And > > could they shut down the TOR networks and other means by which the info-dumps > > are received and transmitted? No, this cat is out of the bag. Hopefully > > Assange is smart enough to have established dead-man protocols, also. > > > Everything that wikileaks has accomplished could have been done completely > anonymously, with the public never having heard the name Assange. > > If you are optimizing for leaks, you don't put yourself out there. > > The fact that we know his name shows that he is optimizing for something > else. If the government really wanted to shut Assange up, they would give > him a record deal or a starring role in a hollywood film. From camera_lumina at hotmail.com Sat Dec 4 18:16:55 2010 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sat, 4 Dec 2010 21:16:55 -0500 Subject: Wikileaks: State Pulls the Plug On SIPRNet (fwd) In-Reply-To: References: Message-ID: This goes back to that old argument: If I make a product with a completely defective security model, shouldn't I be held complicit in its compromise? In other words, this was bound to happen. Was the only protection the promise of some form of punishment? Is that sufficient for state secrets? > Date: Thu, 2 Dec 2010 05:26:24 -0600 > From: measl at mfn.org > To: cypherpunks at al-qaeda.net > Subject: FWD: Wikileaks: State Pulls the Plug On SIPRNet (fwd) > > ---------- Forwarded message ---------- > Date: Wed, 1 Dec 2010 11:08:38 +0100 > From: Felix Stalder > To: nettime-l at kein.org > Subject: Wikileaks: State Pulls the Plug On SIPRNet > Resent-Date: Wed, 1 Dec 2010 11:05:11 +0100 > Resent-From: nettime at kein.org > Resent-To: Nettime > > > > Seems like Assange's 'secrecy tax' is making itself felt. > > Felix > > > State Pulls the Plug On SIPRNet > November 29, 2010 at 9:26 pm > > http://swampland.blogs.time.com/2010/11/29/state-pulls-the-plug-on-siprnet/ > > > Late last week, after Secretary of State Hillary Clinton informed the White > House of the likely fall-out from the WikiLeaks cable dump, the White House > came back with a question: What's our corrective action? > > Clinton's undersecretary for management, Patrick Kennedy, had a simple > suggestion: pull the plug on SIPRNet [1], the classified DoD network that > PFC Bradley Manning reportedly used to download the cables from State's > inhouse classified database. The White House said do it, says a senior > administration official. > > The publication by WikiLeaks of more than 250,000 diplomatic cables, many > of them classified, is forcing an administration-wide intelligence > retrenchment as agencies reconsider how to balance the need to share with > the need to know. With its third major dump of controversial classified > information in nine months, WikiLeaks is single-handedly tipping the > balance back towards inter-agency "stovepiping", or walling off information > from other departments. > > Post 9.11 the imperative from Congress and the White House was to break > down the stovepipes that prevented sharing across the so-called > intelligence communitythe sprawling collection of intelligence offices in > more than a dozen different agencies across the U.S. government and around > the world. > > At State, they created the Net-Centric Diplomacy" database or NCD, where > State stored classified information up to the top secret level. Agencies > across government had access to that database through their own secure > networks. In DoD's case the network, created in 1995, was called the Secure > Internet Protocol Router Network, or SIPRNet. > > Late last week, at Kennedy's recommendation and the White House's approval, > State disconnected SIPRNet from the NCD, senior administration officials > tell Time. Obviously there were some gaps within SIPRNet that DoD is > actively correcting, the senior administration official says, And as a > temporary precaution we have disconnected SIPRNet from the NCD. > > How long is temporary? DoD is investigating how Manning managed to download > all those cables and get them to WikiLeaks, the senior administration > officials tell Time. So far they have concluded that the failure came at > Dod's Central Command, the combatant command responsible for the middle > east, which employed Manning in Iraq. Prior to Manning's download, users of > SIPRNet had been blocked from downloading data to removable media. > > But at some point that restriction was lifted across all of CentCom. DoD > has been reimposing restrictions since the July dump of Afghanistan war > documents by WikiLeaks. DoD has blocked the use of removable media; they > have required in some cases a dual key system that requires a second user > to approve moving data from a higher classification system to a lower > classification system; and they are installing software programs to monitor > unusual activity. > > DoD is not completely cut off from State's database. A separate system for > the transmission of top secret information, the Joint Worldwide > Intelligence Communications System or JWICS [2], is still linked to the > NCD. And State may reconnect SIPRNet in the future. Once DoD has gone > through and made its corrections on SIPRNet we'll reevaluate whether to > reconnect, the senior administration official says. > > > > [1] http://www.fas.org/irp/program/disseminate/siprnet.htm > [2] http://www.fas.org/irp/program/disseminate/jwics.htm > > > > > --- http://felix.openflows.com ----------------------- books out now: > *|Deep Search.The Politics of Search Beyond Google.Studienverlag 2009 > *|Mediale Kunst/Media Arts Zurich.13 Positions.Scheidegger&Spiess2008 > *|Manuel Castells and the Theory of the Network Society. Polity, 2006 > *|Open Cultures and the Nature of Networks. Ed. Futura/Revolver, 2005 > > > > > > # distributed via : no commercial use without permission > # is a moderated mailing list for net criticism, > # collaborative text filtering and cultural politics of the nets > # more info: http://mail.kein.org/mailman/listinfo/nettime-l > # archive: http://www.nettime.org contact: nettime at kein.org From diann_sammie_el at globalbiz.net Sat Dec 4 20:31:12 2010 From: diann_sammie_el at globalbiz.net (Diann Sammie) Date: Sat, 04 Dec 2010 21:31:12 -0700 Subject: Rep1icaRo1ex :: Breitling Rep1icaWatch :: CartierRep1ica & more. Best Rep1icaWatches from $150 pe In-Reply-To: Message-ID: <4CFB1590.994FA13C@globalbiz.net> SwissRep1ica Luxury Watches from $150 Each ** 85% OFF RETAIL SELLING PRICE! ** RolexDaytona RolexExplorer II RolexGMT master II RolexSpecial Collection RolexSubmariner RolexYachtmaster RolexCellini RolexDatejust RolexDaydate Buy Best Quality Rep1icaWatches here http://articulatetime.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 681 bytes Desc: not available URL: From rsw at jfet.org Sat Dec 4 20:12:07 2010 From: rsw at jfet.org (Riad S. Wahby) Date: Sat, 4 Dec 2010 23:12:07 -0500 Subject: Wikileaks kicked off of Amazon EC2 In-Reply-To: <20101202101002.GZ9434@leitl.org> References: <20101202101002.GZ9434@leitl.org> Message-ID: <20101205041207.GA9108@sp.serverpronto.com.serverpronto.com> Eugen Leitl wrote: > Presumably, this is about as much as DDoS as it was > political pressure. Amazon's official statement, http://aws.amazon.com/message/65348/ claims that the DDOS wasn't an issue. " There have also been reports that it was prompted by massive DDOS attacks. That too is inaccurate. There were indeed large-scale DDOS attacks, but they were successfully defended against. " Of course, they're also claiming that the gubmint had nothing to do with the takedown, so salt to taste. Relatedly, Wikileaks is asking for mirrors: http://46.59.1.2/mass-mirror.html Of course, you can also help by seeding the relevant torrents. -=rsw From ken.gilmour at gmail.com Sat Dec 4 15:03:19 2010 From: ken.gilmour at gmail.com (Ken Gilmour) Date: Sun, 5 Dec 2010 00:03:19 +0100 Subject: U.S. officials deny technical takedown of WikiLeaks Message-ID: Now Sarah Palin is suggesting Wikileaks are terrorists and should be taken offline with technical capabilities http://www.golem.de/1012/79848.html or for anyone who can't speak German: http://translate.google.ie/translate?u=http%3A%2F%2Fwww.golem.de%2F1012%2F79848.html&sl=de&tl=en&hl=&ie=UTF-8 (The translation is about as coherent as Sarah Palin herself). ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From hirose at ontec.co.jp Sat Dec 4 14:12:50 2010 From: hirose at ontec.co.jp (=?koi8-r?B?4sXaz9DB087P09TYIMnOxs/SzcHDyc/OztnIINPJ09TFzQ==?=) Date: Sun, 5 Dec 2010 03:12:50 +0500 Subject: =?koi8-r?B?+sHdydTBIMnOxs/SzcHDyckgzsEg0NLFxNDSydHUyck=?= Message-ID: ------------------------------------------------------------------------- | ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ: |инновационный подход, современные технологии и практические решения |в условиях экономической нестабильности ------------------------------------------------------------------------- 07 Декабря > (Ч95) 4Ч5/ЧО*95 <<>> 792*2I22 > ПPОГРАММА 1.Актуальность вопроса защиты информации •Актуальность проблемы защиты информации. Защита информации как составная часть общей системы безопасности организации (предприятия) •Основные понятия, термины и определения в области защиты информации •Основные направления защиты информации •Законодательная и нормативная база правового регулирования вопросов защиты информации •Требования к организации защиты конфиденциальной информации на предприятии (организации) •Составные части (основа) системы защиты информации 2.Коммерческая тайна •Понятие "коммерческой тайны" в предпринимательской деятельности. Законодательство РФ в области защиты коммерческой тайны •Методика составления Перечня сведений, содержащих коммерческую тайну •Внутренние нормативные документы, регламентирующие деятельность компании в области защиты коммерческой тайны 3.Угрозы информации. Возможные каналы утечки информации •Виды угроз информационной безопасности •Определение предмета и объекта защиты. •Технические каналы утечки информации. Их классификация. Механизмы образования •Организационные, организационно-технические меры и технические средства защиты информации от утечки по техническим каналам • Угрозы несанкционированного доступа (НСД) к информации. Источники угроз. Классификация угроз •Возможная тактика использование программных и аппаратных закладных устройств (ЗУ). Уязвимость современных технических средств обработки информации (проводные и беспроводные системы, Интернет, мобильные средства связи и пр.) 4.Мероприятия по защите информации. Противодействие промышленному шпионажу. Технические средства защиты информации •Формирование организационной структуры системы защиты информации на предприятии. Принципы формирования, факторы и критерии принятия решения •Технические средства промышленного шпионажа •Защита информации от утечки по техническим каналам •Меры и средства защиты информации от технических средств ее съема •Приборы обнаружения технических средств промышленного шпионажа •Общие требования по защите помещений и технических средств •Организационные мероприятия по защите информации. Допуск, доступ, учет, хранение •Организационно- технические мероприятия защиты информации •Человеческий фактор в утечке информации. Превентивные мероприятия по предупреждению возможной утечки защищаемой информации. 5.Методы и средства защиты компьютерных систем •Возможные способы утери, искажения, изменения компьютерной информации или получения к ней несанкционированного доступа. •Вирусная угроза компьютерной информации. •Возможность защиты информации при работе в сети Internet. Межсетевое экранирование. •Активный аудит. •Основы криптографической защиты информации. Классификация методов криптографического закрытия информации. Шифрование (симметричные криптосистемы и криптосистемы с открытым ключом). Кодирование и сжатие информации. Стеганография. •VPN (виртуальная частная сеть). Преимущества организации виртуальных частных сетей на основе Internet. •Электронная цифровая подпись. Электронная цифровая подпись как базовый механизм обеспечения юридической силы документа при электронном документообороте. •Практические примеры применения криптографических методов защиты информации. 6.Аудит информационной безопасности компании. Политика информационной безопасности •Анализ внутренних и внешних угроз информационной безопасности компании. Общие подходы •Методика разработки политики информационной безопасности в компании •Международные и российские стандарты безопасности информационных систем (ISO 17799, ГОСТ Р ИСО/МЭК 17799-2005) •Американская концепция системного подхода к обеспечению защиты конфиденциальной информации (OPSEC Operation Security) 7.Организация работы Службы информационной безопасности (СИБ) предприятия. Практический опыт •Процедура создания СИБ на предприятии. Разделение функций между СИБ и IT-подразделением. Место СИБ в структуре предприятия •Организация взаимодействия с Руководством и руководителями структурных IT-подразделений компании. Стоимость участия 9853 рублей Информацию можно получить по телефонам: Московский код; 7/9.2*2-1.2_2 ; Ч45/З9_68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8232 bytes Desc: not available URL: From 0-tel at brascobra.com.br Sat Dec 4 17:11:08 2010 From: 0-tel at brascobra.com.br (~C1alis~) Date: Sun, 5 Dec 2010 08:11:08 +0700 Subject: Life doesn't need to be stressful. Xanax can help. Message-ID: <6358883835.LNYBJN7F178441@hkbzqiuywgmlg.pxbwbhvbzo.net> Why not try a sample and spice up the bedroom?:) We Care about your Health http://www.jailcoach.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 280 bytes Desc: not available URL: From eugen at leitl.org Sun Dec 5 00:36:24 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 5 Dec 2010 09:36:24 +0100 Subject: U.S. officials deny technical takedown of WikiLeaks Message-ID: <20101205083624.GL9434@leitl.org> ----- Forwarded message from Ken Gilmour ----- From eugen at leitl.org Sun Dec 5 00:48:23 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 5 Dec 2010 09:48:23 +0100 Subject: Wikileaks Saga Reveals Governments' Hypocrisy, Deep Fear of Internet Message-ID: <20101205084823.GN9434@leitl.org> http://lauren.vortex.com/archive/000788.html December 04, 2010 Wikileaks Saga Reveals Governments' Hypocrisy, Deep Fear of Internet Greetings. The quotes from mainstream media pundits are all over the news. "Wikileaks' Julian Assange should be assassinated -- Obama should order a drone hit!" "Assange is like a James Bond villain!" "Assange should be hung by his balls in a public square!" And so on. Meanwhile, Internet domain and hosting companies, PayPal, and presumably nearly everyone else who has either gotten a private call from one or more government officials -- or are trying to head off those calls -- are pulling domain names and payment mechanisms out from under Wikileaks faster than you can say "Sensitive Compartmented Information." A cynical observer might almost imagine that there was an orchestrated plan afoot to focus attention on the messenger -- rather than the messages. And yet, if we step back a bit and survey this situation with a bit of objectivity, we can see that the reaction to the latest Wikileaks saga is probably far more important in the long run than the content of the leaked diplomatic cables themselves. Various commentators have noted that successfully prosecuting Assange for anything related to this release is definitely not a slam dunk. Forget about treason -- he's not a U.S. citizen. The 1917 Espionage Act has -- as far as I know -- never been successfully used against a media release of classified information, and attempts to declare mainstream media (who are also releasing this data) as immune, but a primarily Internet-based operation like Wikileaks to be culpable, seem problematic at best. The politicians and "political analysts" from both major parties are piling on of course. As usual, Sen. Joe Lieberman is demonstrating his "we don't need no stinkin' civil liberties" attitude by launching new legislative efforts to criminalize information releases. Over on CNN, a pair of left/right-wing talking heads maligned Republican Congressman Ron Paul -- calling him a "nut" and a "Martian" among other things -- in response to Paul's suggestion that there might be some free speech issues involved in the Wikileaks case. And a spin right out of the Twilight Zone has already begun as well, with Secretary of State Hillary Rodham Clinton now suggesting that the leaked cables show how professional U.S. diplomacy really is (fascinating, though I will agree that many of the documents show very high quality writing skills indeed!) Also from Fantasyland, we have the U.S. government ordering government workers not to look at any of the leaked information now widely publicly available -- even from their personal, home computers. Perhaps at the last minute the government removed text also ordering workers not to think about pink elephants, either. Assange has quite a swagger, and does not come across as a particularly likable fellow, which both play into the hands of his adversaries, and helps them minimize facts like Wikileaks' prior outreach to governments offering to redact aspects of the materials before release. If you make yourself easily demonized, you shouldn't be surprised when you find your yearbook image released to the media complete with Photoshopped horns and pointed tail. Amidst all this, the secondary attacks have already begun. Media commentators have expressed disdain that various bloggers and tech world "luminaries" have publicly noted concerns about the manner in which attacks on Wikileaks have unfolded. Whether those concerns are focused on Wikileaks itself, or on the free speech implications of trying to shut down Wikileaks' domain names and sites, the implication is that anyone not enthusiastically volunteering to personally pull the electrocution switch on Assange is obviously either an idiot, un-American, or both. There is indeed considerable concern in the technology community -- especially the Internet community per se -- about the reactions to Wikileaks. I personally suspect that there are at least two aspects to this. On one hand, there are many in the Internet community who feel very strongly that free speech in most situations should get highest priority, unless genuine, imminent danger would be associated with such speech. Given that the material released by Wikileaks from SIPRNET was all classified Secret or lower -- and had been made officially available en masse to hundreds of thousands, perhaps millions, of Defense Department operatives, it seems difficult to realistically argue about horrendous, imminent threats to result from the leaking of those materials. If they were so critical, why were they given such low security classifications? Why were they made so widely and easily stolen by low-level personnel -- almost guaranteeing a leak of some sort at some point given the nature of the Internet. What those leaked cables mainly represent is an embarrassment. And a key reason they are so embarrassing is that they expose the deep and enduring hypocrisies of governments around the world -- including the U.S. -- not only in the ways that they deal with each other, but in the manner of the subtle fibs and outright lies that they disseminate to their own citizenries. Naturally though, governments consider it their prerogative to publicly leak whatever aspects of such information their deem useful in the furtherance of their own objectives. But woe to anyone else who dares to assume such an aspect uninvited and unapproved. And this may best describe what could be the second reason many in the Internet tech community are concerned about the reaction to the Wikileaks disclosures. My own sense is that tech types -- geeks -- whatever you want to call them (including myself), often have a lower tolerance to hypocrisy than many persons in the general population. Perhaps that's from spending so much time dealing with the more "absolute" world of software and systems, where the sort of "fabric of lies" that seems to underly so much of international diplomacy would be utterly unacceptable and disastrous. Some may argue that such falsehoods are necessary to the smooth functioning of diplomacy itself. If that's true, the Internet indeed poses enormous problems for the diplomatic corps. In this context, we can actually begin to "connect the dots" in interesting and perhaps enlightening ways. The Internet virtually guarantees that information once leaked can never be effectively blocked -- a fact that holds true for Wikileaks data of course, but Wikileaks is just the tip of the iceberg moving forward. Overall this is an utterly terrifying concept to governments, in a manner that has never existed before in human history. Even the invention of the printing press, for all the furor surrounding it, did not so utterly decimate the ability to control the flow of information. In many parts of the world -- now increasingly including the U.S. as well -- any entity that creates information, releases information, or organizes and helps people find information -- and who doesn't also strictly toe the government line, risks being declared, if not an enemy of the state, at least a subject of suspicion. So we see governments striking back, attempting to get the Internet "under control" -- in a desperate push to bring back the good old days of information authority. The domain name system is being increasingly used as a law enforcement and censorship tool. Governments around the planet are demanding that the Internet and all systems associated with the Internet be modified or purpose-built to enable easy government wiretapping and disabling of any associated encryption systems. Calls for government-issued Internet access credentials wouldn't only help to reveal who downloaded a movie without paying for it, but also whose roving eyes have peered at the latest information leak or other unapproved forbidden fruits of the Net. We seem to be approaching something of a "perfect storm" of events, where the technology and policies of the Internet are colliding head-on with many traditional sensibilities of government. While we can always hope for a reasoned "meeting of the minds" to amicably deal with such controversies, the realities of politics today, and in particular the reactions to the ongoing Wikileaks saga, make this something considerably less than a comfortable bet. Julian Assange is not a hero. Nor does he appear to be a devil -- the requisite evil intent seems absent. Even many free speech advocates would call his methodology misguided. Whether or not his methods are criminal is thankfully not for me to determine (however if they are indeed determined to be criminal, mainstream media may wish to consider seriously ramping up their legal teams, post haste). Regardless of how you feel about the Wikileaks data itself -- the actual content of those cables -- and no matter where you stand regarding the propriety or recklessness of Assange's methods, he may well have done us all an enormous favor. Through his actions, and critically through the resulting publicly visible reactions of government, media, and their associates and minions, the coming conflict between media, government, and the Internet has been drawn into starker relief than perhaps ever before. But what will we learn from this? Where do we go from here? How many really care? Do you? --Lauren-- From jya at pipeline.com Sun Dec 5 07:44:04 2010 From: jya at pipeline.com (John Young) Date: Sun, 05 Dec 2010 10:44:04 -0500 Subject: Twitter fails to jump to Dept of State's defence. Message-ID: WL dark observers want what Twitter offers without signing up, one follower, one cable. A honeypot. SOP. WL knows that and pads the tweets, thumb on the scale. The gaga Assange boytoy promotion is a marketing ploy, him witting or unwitting as his Mom ear-licked her little man, as did Obama's, pretending teenage-grade bedazzle for the horny-pud. No need to recount how age-old this narcotic is. Civilizing begets over-uncivilizing, to wit, obedience innerly driven concealed with high-faluting faux resistance. Higher standards of ethics and morals the advertisements. Could Assange be clearer about what he is up to, an authoritative terrified of being not-god. Same shit is used to hypnotize teenage soldiers and college-bred pilots to RL kill-slaughter with relish -- ever in the national interest or sumpin glorious. Same shit is used to hypnotize suicide bombers and IED mechanics and State Department and CIA pussyfooting vainglory wankers. Panetta a feeble emulator of Hillary as an auto-speed-twatler victim and prick-teasing victimizer, channeling age-old god-fucked Eves and Marys the guys bellow, the girls yelling god's a dickless motherfucker honey. The hoary debate between parental liberty and tweenie freedom is two-backed. The first demands order within constraints of authority, the second, if not a subterfuge or suck-up of authority, bites the hand offered in threatening peace and beneficence, then kisses the hand's mangy ass with mouthngs of ways to kill former friends and supporters who told all to BFF. Insurance pre-positioned is the rat's surefire investment. The WL vile practice of redaction is a sign the fix is in, bribes have been paid to act "responsibly," future celebrity assured. Old timers call that turncoat, themselves having done just that and then paid and pensioned and best-sellered, if not tenured and lecture- circuited, to condemn it. Ellsburg. Chomsky. Sy Hersh. Ex-spies, aka unicorns. None suffer after coming in from the cold. Fake moans of the beastliness known but dare not reveal. To protect the unknowing. To foster unknowiness. To keep the secrets of how sweet it is to be a keeper. Hoo-hah. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From tandyby at kelleroffice.com Sun Dec 5 11:27:47 2010 From: tandyby at kelleroffice.com (Nerissa Tandy) Date: Sun, 05 Dec 2010 12:27:47 -0700 Subject: Certified OnlinePharmacy. Viagra100mg x 60pills ONLY $96, Free shipping for orders over 200USD, 15% off discount for patrons j0xk In-Reply-To: Message-ID: <4CFBE7B3.B03A516C@kelleroffice.com> Cheap ViagraPills start fr $1.85 30 pills - $ 78 270 pills - $499 Optional: Delivery Insurance (Guaranteeed reshipment if delivery failed) Order more products & get free Regular Airmail shipping! http://perplexvisions.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 620 bytes Desc: not available URL: From biohazarddd at dimmy.ru Sun Dec 5 03:07:47 2010 From: biohazarddd at dimmy.ru (=?koi8-r?B?4sDE1sXUydLP18HOycU=?=) Date: Sun, 5 Dec 2010 14:07:47 +0300 Subject: =?koi8-r?B?8M/T1NLPxc7JxSDcy8/Oz83J3sXTy8/KIM3PxMXMySDQ0sXE0NLJ0dTJ?= =?koi8-r?B?0S4=?= Message-ID: <000d01cb946c$a60a9000$6400a8c0@biohazarddd> ТЕМА: Реструктуризация бюджета предприятия в условиях кризиса и экономической зависимости -------------------------------------------------------------------- В течение 3х дней с Вами занимаются практики в компьютерном классе. Преподавательский состав является экспертами в области управления проектами и их стабилизации. Вся информация по тел: 8 (Ч95) 742*9l98 \\// 7-42-91_98 Каждый участник обеспечивается персональным компьютером на весь срок проведения семинара. По окончании курса Вас оснащают лицензионной, полнофункциональной специализированной версией программы, для разработки и реструктуризации бюджета предприятия. По прибытию на предприятие Вы просто устанавливаете программный продукт на свой компьютер и начинаете сразу работать и получать результаты. Дата проведения: 13-15 Декабря Информация об учебном курсе: * В последствии решений для предприятий! это самое главное распознать и просчитать в условиях плановых задач факторы, которые, дестабилизируют деятельность предприятия, не только в условиях кризиса но и финансовой неопределенности. * Вы не поверите, но за 3 дня занятий Вы получите все ответы на вопросы, которые возникли у Вас и Вашего предприятия. Данной серией семинаров мы занимаемся с 2000г. и обучили уже более 4000 специалистов. * В условиях неопределенности рынка возникает необходимость поиска решений. Мы знаем, как помочь Вам, так как, начиная еще с прошлого века девяносто седьмого года, наша компания разрабатывает пакет программ (интегрирует их с методическими материалами и подготавливает обучающие курсы) для планирования бюджета, анализа текущего, сравнения плана и факта, поиска и принятия решений, отслеживания выполнения намеченных программ. * В итоге обучения на семинаре Вы сможете определить и найти решения по вопросам, которые в условиях кризиса возникают у компаний, а именно: Оборачиваемость капитала его недостаток, как обеспечить покрытие; как распорядиться текущими поступлениями (куда надо тратить, а куда нет); стоит ли привлекать процентные и иные дорогостоящие средства? если да, то минимизировать период использования за счет выделения собственных, то есть оптимизировать оборотные ср-ва. Рассмотрение возможных периодов с повышенными рисками используя многопараметральный экономический анализ для поиска решений; выявление нестабильности денежных средств, определение их дефицита, разработка сценария для ожидаемых трудностей, принятие сценария что следует сокращать а что увеличивать. Обучение методу от обратного для рассмотрения постатейного анализа бюджета, использование метода точки ╚0╩ для стабилизации не только затрат но и управление доходами предприятия и ценообразованием; как разработать плановый бюджет максимально приближенный к фактическому проанализировать его и принять за основу в ближайшем периоде. И еще множество других вопросов, на которые Вы услышите ответы. Около 4ОО их будет рассмотрено на семинаре. * В результате обучения, Вы, как профессионал сможете управлять любой формой финансовых отношений. Быть подготовленным к любым неожиданностям. 1 день * Создание первого тестового проекта, используя полученное задание. Знакомство программным комплексом. Изучение и рассмотрение на практике фин. методов, выбор для создаваемого проекта. Использование программ для выполнения полученного задания. Первые шаги в отборе полученных результатов используя фин. контрольные точки. Поэтапное построение проекта и анализ его при помощи выбранного метода. 2 день * Получение отчетов по проекту, знакомство, изучение. Изучение финансового анализа (показатели) практическое применение, рассмотрение в текущей ситуации. Финансовый контролинг для изучения и исправления ошибок в созданном проекте. Поиск ошибок рассмотрение и исправление. Последовательность применение метода. Для фиксирования темы и ее лучшего понимания создание II го проекта при помощи ПО. Созданный проект начинаем анализировать. 3 день * При помощи новых технологий анализа и программы, реструктурируем проекты с новыми параметрами, проводим отбор и проверяет на устойчивость. Описываем все риски, отклонения для проекта, помещаем в виртуальную реальность, получаем результаты, ищем оптимальное решение. Отбор планового проекта, загрузка фактических данных и сравнение проектов. Эмулирование риск-факторов влияющих на бюджет пр. Создание модели управления потоками. Поиск оборотных средств за счет перераспределения потоков. Постатейные отклонения в проекте, оптимизация конечных результатов. Выявления дефицита ден. ср-в и поиск средств на покрытие, создание оптимальной схемы. Решения в управлении с использованием новых полученных результатов. Каждому участнику курсов: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: 1. Специализированная программа-профессиональная разработка фин. проектов! Программный продукт способен не только разрабатывать финансовую документацию на профессиональном уровне, в новой версии реализованы значительные возможности для планирования текущего бюджета предприятий. 2. Программа для построения, развития и управления экономической моделью предприятия. Управления инвестиционными проектами, сравнение план/факт, мониторинг бюджета предприятия в реальном времени Возможность написания собственных формул, сценария диагностики проекта, перепрограммирование и настройка программы. 3. Программа экспресс подготовки экономического проекта. Позволяет всего за пару часов создать очень приличный проект для принятия решений по глобальным разработкам. 4. Материал методический: печатный для самостоятельной разработки и подготовки экономической документации, бизнес планов, ТЭО, инвестиционных проектов. 5. Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него обучающийся специалист может эффективно разрабатывать свои сценарии финансовых проектов. ------------------------------------------------------------------------- Информацию можно получить по телефонам: 8 (Ч95) 445/Ч0*95 ; Ч454095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9288 bytes Desc: not available URL: From 0-olav.hensing at aarsen.com Sun Dec 5 11:26:27 2010 From: 0-olav.hensing at aarsen.com (RX_ComboPack_$69.95) Date: Sun, 5 Dec 2010 14:26:27 -0500 Subject: Private Online Pharmacy Message-ID: <2886693938.L19D3N5F485660@fkolnqwwgq.xdreuedu.ua> The #1 Reason Relationships fail is in the bedroom Dozens of Products http://www.jailcoach.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 282 bytes Desc: not available URL: From l_stefaniast at kendallgroup.com Sun Dec 5 17:45:52 2010 From: l_stefaniast at kendallgroup.com (Lillian Stefania) Date: Sun, 05 Dec 2010 18:45:52 -0700 Subject: TOP SELLING WATCHES! Rep1icaBrand Watches Promotion! 95% Off retail price, Best quality swiss and japanese Rep1icaWatches 170y In-Reply-To: <511f01cb90c8$ceba97ee$28658190@ho4nha3> Message-ID: <4CFC4050.909F1362@kendallgroup.com> SwissRep1ica Luxury Watches from $150 Each ** 85% OFF RETAIL SELLING PRICE! ** RolexDaytona RolexExplorer II RolexGMT master II RolexSpecial Collection RolexSubmariner RolexYachtmaster RolexCellini RolexDatejust RolexDaydate Buy Best Quality Rep1icaWatches here http://elitecouture.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 691 bytes Desc: not available URL: From measl at mfn.org Sun Dec 5 17:43:34 2010 From: measl at mfn.org (J.A. Terranson) Date: Sun, 5 Dec 2010 19:43:34 -0600 (CST) Subject: Wikileaks Saga Reveals Governments' Hypocrisy, Deep Fear of Internet In-Reply-To: <20101205084823.GN9434@leitl.org> References: <20101205084823.GN9434@leitl.org> Message-ID: "We seem to be approaching something of a "perfect storm" of events, where the technology and policies of the Internet are colliding head-on with many traditional sensibilities of government." Ahhh... An Instant-Replay of the early 90's crypto wars: we didn't win the war, just the first few battles. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From eugen at leitl.org Sun Dec 5 11:59:35 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 5 Dec 2010 20:59:35 +0100 Subject: Twitter fails to jump to Dept of State's defence. Message-ID: <20101205195935.GR9434@leitl.org> ----- Forwarded message from John Young ----- From camera_lumina at hotmail.com Sun Dec 5 19:06:16 2010 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sun, 5 Dec 2010 22:06:16 -0500 Subject: Wikileaks Saga Reveals Governments' Hypocrisy, Deep Fear of Internet In-Reply-To: References: <20101205084823.GN9434@leitl.org>, Message-ID: Isn't it the other way around? We won the war, but battles still rage. Even Lieberman's call to Amazon to shut down Wikileaks is archaic and merely punative: the documents were already out, shutting down Wikileaks did...nothing. And I see no way for similar actions to be prevented in the future. Tim May is cackling from his grave. Seems Assange already announced some kind of dead-man protocol, though the way the news is describing it, the "256 bit code" will be released if something happens to him. I'm thinking it would be far better (in addition) for the "nuclear" dump to automatically spooge if he does not check in at some point. -TD > Date: Sun, 5 Dec 2010 19:43:34 -0600 > From: measl at mfn.org > To: cypherpunks at al-qaeda.net > Subject: Re: Wikileaks Saga Reveals Governments' Hypocrisy, Deep Fear of Internet > > "We seem to be approaching something of a "perfect storm" of events, where > the technology and policies of the Internet are colliding head-on with > many traditional sensibilities of government." > > Ahhh... An Instant-Replay of the early 90's crypto wars: we didn't win the > war, just the first few battles. > > //Alif > > -- > "Never belong to any party, always oppose privileged classes and public > plunderers, never lack sympathy with the poor, always remain devoted to > the public welfare, never be satisfied with merely printing news, always > be drastically independent, never be afraid to attack wrong, whether by > predatory plutocracy or predatory poverty." > > Joseph Pulitzer, 1907 Speech From eugen at leitl.org Sun Dec 5 13:11:07 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 5 Dec 2010 22:11:07 +0100 Subject: mass-mirroring wikileaks Message-ID: <20101205211107.GW9434@leitl.org> http://213.251.145.96/mass-mirror.html -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From measl at mfn.org Sun Dec 5 21:26:12 2010 From: measl at mfn.org (J.A. Terranson) Date: Sun, 5 Dec 2010 23:26:12 -0600 (CST) Subject: Hundreds of Wikileaks Mirror Sites Appear [Fwd: NYT] Message-ID: http://www.nytimes.com/2010/12/06/world/europe/06wiki.html?partner=rss&emc=rss Hundreds of WikiLeaks Mirror Sites Appear By RAVI SOMAIYA Published: December 5, 2010 LONDON . The battle lines between supporters of the whistle-blowing Web site WikiLeaks and its detractors began to form on Sunday, as supporters erected numerous copies of the site on the Internet and the United States put pressure on Switzerland not to offer a haven to the site.s founder, Julian Assange. Since several major Internet companies cut off services to WikiLeaks in recent days, activists have created hundreds of mirror sites, Web sites that host exact copies of another site.s content, making censorship difficult. The collective Anonymous, an informal but notorious group of hackers and activists, also declared war on Sunday against enemies of Mr. Assange, calling on supporters to attack sites companies that do not support WikiLeaks and to spread the leaked material online. Meanwhile, the American ambassador to Switzerland, Donald S. Beyer Jr., responded to signs that Mr. Assange and WikiLeaks might seek refuge in that country, warning in the weekly magazine NZZ am Sonntag that the Swiss .should very carefully consider whether to provide shelter to someone who is on the run from the law.. Since the release of classified diplomatic cables a week ago, from a batch of more than 250,000 obtained by WikiLeaks, the Web site has been bombarded by cyberattacks and abandoned by Internet companies like PayPal, an online payment service that had accepted donations for the site, and Amazon, which had rented it server space. WikiLeaks said that PayPal had .surrendered to U.S. government pressure,. but the government has not acknowledged involvement in efforts to try to disable the site. On Friday, WikiLeaks sought refuge in a diffuse web of financial and Internet infrastructure spread across Europe, particularly in Switzerland. It moved to wikileaks.ch, a domain registered to the Swiss Pirate Party, a political organization that shares many of Mr. Assange.s aims. A Swiss-Icelandic company, Datacell, will process donations instead of PayPal, and the WikiLeaks site shows that Mr. Assange is accepting direct donations into a Swiss bank account held with the financial arm of the Swiss postal service. But that solace may be short lived: a spokesman for the financial arm of Swiss Post, Marc Andrey, also told NZZ am Sonntag on Sunday that it was .reviewing. its relationship with Mr. Assange subject to proof that he has Swiss residency, owns property or does business in the country. A message seeking comment from Mr. Assange.s British lawyer was not immediately returned. The Internet group Anonymous, which in the past has taken on targets as diverse as the Church of Scientology and Iran, disseminated a seven-point manifesto via Twitter and other social networking sites pledging to .kick back for Julian.. Gregg Housh, a prominent member of the group, said by telephone from Boston that an orchestrated effort was under way to attack companies that have refused to support WikiLeaks and to post multiple copies of the leaked material. The Anonymous manifesto singled out PayPal, which cut off ties with WikiLeaks for .a violation. of its policy on promoting illegal activities, a company statement said. .The reason is amazingly simple,. Mr. Housh said of the campaign. .We all believe that information should be free, and the Internet should be free.. By late Sunday, there were at least 208 WikiLeaks mirror sites up and running. .Cut us down,. said a message on the WikiLeaks Twitter feed on Sunday, .and the stronger we become.. From ixrhpeak at shmandex.ru Sun Dec 5 15:03:39 2010 From: ixrhpeak at shmandex.ru (Jeffery Larkin) Date: Mon, 6 Dec 2010 02:03:39 +0300 Subject: =?koi8-r?B?68/OxsnExc7DycHM2M7PxSDExczP0NLPydrXz8TT1NfP?= Message-ID: <5DEFD5D7B23840C491BD84933DB177A9@microsof004dd8> КОНФИДЕНЦИАЛЬНОЕ ДЕЛОПРОИЗВОДСТВО 17 Декабря 8 (Ч95) 7922i/22 \\// Ч45.32_66 Цель: формирование у слушателей целостных знаний и умений по организации и обеспечению эффективного функционирования конфиденциального делопроизводства в компании. Задачи: * изучение принципов построения конфиденциального делопроизводства; * изучение средств криптографической защиты информации; * изучение методов обучения сотрудников компании правилам конфиденциального делопроизводства; Программа мероприятия: 1. Конфиденциальное делопроизводство – составная часть системы безопасности компании; 2. Конфиденциальное делопроизводство как элемент режима защиты коммерческой тайны; 3. Принципы построения конфиденциального делопроизводства; 4. Порядок взаимодействия открытого и конфиденциального делопроизводства; 5. Материальный (бумажный) документ и документ представленный в электронном виде, общие черты и принципиальные отличия, материальный (бумажный) и электронный документооборот, а также системы их сопряжения; 6. Конфиденциальный документооборот и конфиденциальное информационное хранилище как составные части системы конфиденциального делопроизводства; 7. Возможности, которыми должны обладать электронный конфиденциальный документооборот и электронное конфиденциальное информационное хранилище; 8. Этапы создания конфиденциального делопроизводства, практические рекомендации по порядку создания; 9. Способы и средства защиты конфиденциального делопроизводства; 10. Применение средств криптографической защиты информации как наиболее эффективный способ защиты электронного документа; 11. Электронная цифровая подпись как наиболее эффективное средство подтверждения авторства и подлинности электронного документа; 12. Создание инструктивных документов для обеспечения устойчивого функционирования конфиденциального делопроизводства; 13. Обучение сотрудников компании правилам конфиденциального делопроизводства, виды ответственности за нарушение режима защиты коммерческой тайны и правил ведения конфиденциального делопроизводства; 14. Автоматизированная система конфиденциального информационного хранилища как вариант систематизации и защиты материальных документов. Назначение, принцип построения, функциональные возможности, демо-версия системы. Вся информация по тел: (код Москвы)/74_29I_98 <<>> 792_21/2-2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4349 bytes Desc: not available URL: From bisque at gantry.ru Sun Dec 5 15:27:09 2010 From: bisque at gantry.ru (=?koi8-r?B?MTktMjEgzs/RwtLRINfZxdrEzs/FIM/C1d4u?=) Date: Mon, 6 Dec 2010 02:27:09 +0300 Subject: =?koi8-r?B?99nF2sTOz8Ugz8LV3sXOycUg1yBGT1JFU1RBIEZFU1RJVkFMIFBBUks=?= Message-ID: <8D87D03A3A2B44C5BD3FF3CE37DF926D@microsof0632a9> FORESTA TROPICANA HOTEL (Выездное обучение) "Актуальные вопросы организации работы с персональными данными. Применение Федерального закона РФ № 152 "О персональных данных" 17-19 Декабря 8 (495)* 792*2l22 >> Ч45_ЧО.95 Цель обучения: Формирование у слушателей: системно-целостного видения проблем обработки и обеспечения безопасности персональных данных в компании; понимания необходимости обеспечения защиты персональных данных; понимания природы возникновения угроз безопасности персональным данным и возможные риски в случае реализации этих угроз; умений практической реализации организационных и технических мероприятий по защите персональных данных. анализ основных проблем обработки и обеспечения безопасности персональных данных в компании; анализ международного, российского законодательства и нормативно-методической базы в области защиты персональных данных; изучение действий оператора персональных данных по приведению своих информационных систем персональных данных в соответствие с требованиями законодательства; изучение основных этапов проведения работ по созданию комплексной системы защиты персональных данных и подготовка алгоритмов решений, исходя из существующих угроз; изучение программно-аппаратных средств защиты информации, в том числе средств криптографии (шифрования); обобщение современных подходов к созданию системы защиты персональных данных в компании. Программа мероприятия: Общие вопросы обработки и обеспечения защиты ПДн в компании. Международное и российское законодательство в области обработки ПДн. Общие вопросы проведения работ по комплексной защите ПДн. Порядок проведения работ по защите ПДн. Общие вопросы согласования документов с регуляторами. Обзор основных мероприятий и программно-аппаратных средств защиты информации, применяемых при создании системы защиты ПДн. РЕГЛАМЕНТ: Пятница, 17 Декабря 2010 г. 10.00 – 13.00 Консультационные услуги по теме "Актуальные вопросы организации работы с персональными данными" 13.00 – 14.30 Обед 14.30 – 15.00 Посадка в автобус, отправление в FORESTA TROPICANA HOTEL 17.00 – 17.30 Заезд и регистрация, размещение в номерах 17.30 – 19.00 Свободное время 19.00 – 20.30 Ужин в ресторане после 21.00 Свободное время: бассейн, сауна, тренажерный зал Суббота, 19 Декабря 2010 г. 10.00 – 11.00 Завтрак в ресторане 11.00 – 14.00 Консультационные услуги по теме "Актуальные вопросы организации работы с персональными данными" 14.00 – 15.00 Обед в ресторане 15.00 – 19.00 Свободное время 19.00 – 20.30 Ужин в ресторане Воскресенье, 20 Декабря 2010 г. 10.00 – 11.00 Завтрак в ресторане 11.00 – 13.00 Свободное время 13.00 – 14.30 Обед в ресторане 14.30 – 15.00 Выезд в Москву Стoимoсть: 26 196 руб. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: Московский код; 7Ч2_9I_98 \\// Ч_4/5/3*2//6-6 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6708 bytes Desc: not available URL: From bella_lg at buhusluga.ru Mon Dec 6 06:42:19 2010 From: bella_lg at buhusluga.ru (=?koi8-r?B?7sXEz8LSz9PP18XT1M7P09TYINDP09TB193Jy8/X?=) Date: Mon, 6 Dec 2010 06:42:19 -0800 Subject: =?koi8-r?B?68HLIM3P1s7PINXK1Mkgz9Qg7uTzIMLF2iDQz9PMxcTT1NfJyi4=?= Message-ID: <000d01cb9553$c8965270$6400a8c0@bella_lg> 10 Декабря Тема: Недобросовестные поставщики. Как сохранить вычеты, уйти от ответственности +7 (495) 792*2|*2-2 \\\/// 7.Ч2*9|_98 курс даст слушателям ответ на то, как правильно заключать договоры и что делать, если он ошибся, но при этом хотел бы сохранить свои налоговые обязательства без изменений. Слушатели будут точно знать что и как отвечать налоговой инспекции в случае проверки таких контрагентов. Поймут как можно уйти от НДС без последствий. Практика свидетельствует, что практически все проверки налогоплательщиков применяющих ОСН затрагивают данный вопрос с негативными для налогоплательщика последствиями. При этом налоговый орган исключает из состава затрат НП и вычетов по НДС суммы по контрагентам, которые, например, просто не отвечают на запрос в рамках встречных проверок, либо не заплатили налоги и т.п. Подчас очень тяжело отстоять свою правоту в спорах с налоговым органом. Обучающий курс посвящен вопросу защиты налогоплательщика, призван помочь ему как не погрязнуть в тотальных проверках своих контрагентов, так и в последствии защитить свои права по взаимоотношениям я такими компаниями. На семинаре не только будут показаны способы противодействия придиркам налоговой, но и будут разобраны способы заключения договоров, которые в принципе исключают возможность признания лица недобросовестным, а также законные способы снижение налоговой нагрузки по НДС в том случае, если налогоплательщик в этом заинтересован. Программа: 1.Методические указания Минфина о назначении выездных налоговых проверок. 2.Методические указания Минфина по поиску недобросовестных контрагентов. 3.Основания признания налоговой выгоды необоснованной (на основании судебной практики, писем Минфина, практики проверок). 4.Что необходимо сделать, чтобы проявить разумную осмотрительность. Какие документы и какую информацию о контрагенте необходимо собрать. 5.Как защититься от претензий налогового органа о том, что контрагент: * не платит налоги и не сдает отчетность; * не отвечает на встречные проверки; * не находиться по месту регистрации, либо зарегистрирован по адресу массовой регистрации; * директор БОМЖ, ничего не подписывал, его подпись подделали и т.п. * директор является "массовым", в отношении руководителя проводятся розыскные мероприятия; * проведенный осмотр показал, что компания не могла отгрузить товар с адреса, указанного в накладной, счете-фактуре; * коды ОКВЭД контрагента не позволяют ему произвести действия, которые он якобы произвел по отношению к налогоплательщику (не может выполнять работы, поставлять товар и тп., так как создан для иных целей); * иные претензии. 6.Способ ухода от признания налоговой выгоды необоснованной при заключении договоров с поставщиками при помощи посредника. Как построить договор, чтобы претензии по поставщикам нельзя было предъявить. 7.Уход от признания налоговой выгоды необоснованной путем особого способа заключения договоров. 8.Уход от уплаты НДС с наценки путем: * заключения договора с дополнительной выгодой; * заключение договора с предварительной куплей-продажей опциона; * включение условий о неустойки. 9.Кто отвечает за работу с недобросовестными контрагентами (директор или бухгалтер) и в какой части. 10.Потеря документов по недобросовестным поставщикам. Налоговые последствия. Указания Минфина по привлечению к ответственности в таком случае. Способ защиты от налоговых претензий. Является ли потеря документов защитой от претензий правоохранительных органов. 11.Ответы на индивидуальные вопросы. Cтоимоcть: 7900 руб. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: \Моск. код/ ЧЧ5.32_66 \\\/// ЧЧ_54_О95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5219 bytes Desc: not available URL: From jya at pipeline.com Mon Dec 6 04:37:38 2010 From: jya at pipeline.com (John Young) Date: Mon, 06 Dec 2010 07:37:38 -0500 Subject: FW: [IP] WikiLeaks sold classified intel, claims website's co-founder Message-ID: This should not be news to those who have followed the world of hackers -- religion and NGOs. They have been selling restricted information from the beginning of their enterprises. Some do it as employees and off-the-books agents of governments and business and individuals, some do it as rogue entrepreneurs like Wikileaks, or more commonly, investigative reporters, private eyes and holy workers -- and, ahem, high-minded scholars. It is an ancient industry, as old as human intercourse where cheating and hoodwinking and treachery are obligatory to survive against those who do the same. Nearly all who do it claim it to be necessary "because others do it," to protect our tribe, to protect our hordes of food, wealth, faith and means and methods of counterspying. And as ever, because we are superior and thus have the right to be worse than our imputed enemies -- mostly imaginary, often our own villainous agents plotting with others of their kind pretending to be enemies to keep their racket lucrative. Religious warfare had to be invented to excuse the slaughter of infidels. Messianism of Wikileaks is comical but it has worked multitudes for millennia with imaginary danger and protection. Do tithe. Kissinger and Giuliani and Chertoff and thousands of insiders -- call them ph d candidates -- go on to greater wealth outside, switching back and forth to keep the flim-flam flowing. All intelligence operations -- "knowledge industry" -- are illicit by design to exaggerate significance and risk, that way law (the most devious of all), mundane and heavenly, blesses them with powerful advertizing. They are all in cahoots. Wikileaks emulates an eternal business model, that is to lie and exaggerate about what it is doing. Every academic is familiar with these means and method, avid promoters of it, get some of that old time higher education, a certificate for excellence, a license to recruit and train newcomers, a pretense of opposition ie, high-level critique, ever plotting and dealing for perqs and advantages of salary, space, reputation, rank, and showtime. Selling classified information is what the knowledge industry was invented for. Now Wikileaks is a challenge to the highly organized operations of state, church, university, military, corporation, NGO (spit), media and unaffiliated (watch out for these cutthroat mercenaries alway betraying those stupid enough to outsource to the temps stealing the jewels). Assange stated at the beginning of Wikileaks it expected to make big bucks, $5M the first year he wrote on a private mail list -- among other pimping messages later published on Cryptome. The free stuff is meant lure volunteers and promote high-profile public service, lipsticked with risk, with the enterprise funded by selling costly material sold on the black market of worldwide spying in the tradition of public benefit ops, id, spies and ever more spies. No better customers for illicit information that those with depthless pockets. Soros and the Kochs have their lesser-known Internet promoters backing Wikileaks generously. And they expect good return on their investment, not just the freebies used to attact attention. Watch out for the public interest data miners of the Internet, and leakers and whistleblowers, bandits stealing data, marking it up with glamorous titles, ie deeply researched, classified, actionable, nation threatening, liberating, etc, reselling publicly thourgh gadzillion press operations and secretly through those who pretend to avoid limelight. Think Archive.org, think Wikipedia, think Google, think this list and your crafty mangy boil-ridden carcass. Mea culpa. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From a_keila_vf at blazenetme.net Mon Dec 6 08:02:36 2010 From: a_keila_vf at blazenetme.net (Alayna Keila) Date: Mon, 06 Dec 2010 09:02:36 -0700 Subject: Be a LONG-man, buy this effective herbal EnlargementPills c6 In-Reply-To: Message-ID: <4CFD091C.A52A0EE3@blazenetme.net> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://boastknot.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 718 bytes Desc: not available URL: From rdobbins at arbor.net Mon Dec 6 01:19:38 2010 From: rdobbins at arbor.net (Dobbins, Roland) Date: Mon, 6 Dec 2010 09:19:38 +0000 Subject: Over a decade of DDOS--any progress yet? Message-ID: On Dec 6, 2010, at 2:50 PM, Sean Donelan wrote: > Other than buying lots of bandwidth and scrubber boxes, have any other DDOS attack vectors been stopped or rendered useless during the last > decade? These .pdf presos pretty much express my view of the situation, though I do need to rev the first one: The bottom line is that there are BCPs that help, but which many folks don't seem to deploy, and then there's little or no thought at all given to maintaining availability when it comes to server/service/app architecture and operations, except by the major players who'd been through the wringer and invest the time and resources to increase their resilience to attack. Of course, the fundamental flaws in the quarter-century old protocol stack we're running, with all the same problems plus new ones carried over into IPv6, are still there. Couple that with the brittleness, fragility, and insecurity of the DNS & BGP, and the fact that the miscreants have near-infinite resources at their disposal, and the picture isn't pretty. And nowadays, the attackers are even more organized and highly motivated (OC, financial/ideological) and therefore more highly incentivized to innovate, the tools are easy enough for most anyone to make use of them, and tthe services/apps they attack are now of real importance to ordinary people. So, while the state of the art in defense has improved, the state of the art and resources available to the attackers have also dramatically improved, and the overall level of indifference to the importance of maintaining availability is unchanged - so the overall situation itself is considerably worse, IMHO. The only saving grace is that the bad guys often make so much money via identity theft, click-fraud, spam, and corporate/arm's-length governmental espionage that they'd rather keep the networks/services/servers/apps/endpoints up and running so that they can continue to monetize them in other ways. ----------------------------------------------------------------------- Roland Dobbins // Sell your computer and buy a guitar. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jya at pipeline.com Mon Dec 6 07:07:50 2010 From: jya at pipeline.com (John Young) Date: Mon, 06 Dec 2010 10:07:50 -0500 Subject: Wikileaks Saga Reveals Governments' Hypocrisy, Deep Fear of Internet In-Reply-To: References: <20101205084823.GN9434@leitl.org> Message-ID: Tim is cackles from his hilltop fortress that he expects Assange to be found fatally injected with drugs in a gutter. Just being disappeared or Gitmo'd comfortably or Hollywoodized does not send the right warning to the world's tax authorities to boost budgets. A show trial would be perfect. Assange is willing and eager. Ellsberg pissing his britches, Wales kicking Ellsberg's shoe hoping a bust for publicity. The Internet would go over the top with delirium at being finally top featured as godawfully threatening as promised early on by its pimps and whores. Kelly, Gilmore, The Well, The Archive, EFF, the globe's privacy hustlers -- what, you snoozed through week's of cryptoanarchy. Julian was wide awake taking notes. No credit to the mastermind of superiority, narcissitic Nietzsche (and those he stole his best gat from). Tim wrote a provocative long essay a couple of months ago but barred publication, well, never answered a permission request. He may be now violently executed -- that was foretold in the essay to happen immanently along with a gaggle of executioners. Assange promises to do the same. Lessons learned. Most likely a faked execution is in the offing, see Cryptoanarchy under multiple personas used by Nazis in Brazil where Julian has arranged a bunker (fuck Mike for banning Nazi too). From 0-ohen at cea.eop.gov Mon Dec 6 05:16:25 2010 From: 0-ohen at cea.eop.gov (World's Top-Pharma) Date: Mon, 6 Dec 2010 10:16:25 -0300 Subject: Save 80% with our internet pharmacy Message-ID: <5591050192.M09E6MBM643864@ukienonubtubj.imijvdztxhkp.org> Keep the Bedroom exciting We Care about your Health http://www.nicescrub.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 264 bytes Desc: not available URL: From teddks at gmail.com Mon Dec 6 08:15:11 2010 From: teddks at gmail.com (Ted Smith) Date: Mon, 06 Dec 2010 11:15:11 -0500 Subject: Wikileaks Saga Reveals Governments' Hypocrisy, Deep Fear of Internet In-Reply-To: References: <20101205084823.GN9434@leitl.org> , Message-ID: <1291652111.30810.8.camel@anglachel> On Sun, 2010-12-05 at 22:06 -0500, Tyler Durden wrote: > Isn't it the other way around? We won the war, but battles still rage. > > Even Lieberman's call to Amazon to shut down Wikileaks is archaic and merely > punative: the documents were already out, shutting down Wikileaks > did...nothing. And I see no way for similar actions to be prevented in the > future. > > Tim May is cackling from his grave. > > Seems Assange already announced some kind of dead-man protocol, though the way > the news is describing it, the "256 bit code" will be released if something > happens to him. I'm thinking it would be far better (in addition) for the > "nuclear" dump to automatically spooge if he does not check in at some point. That's probably referring to the file they put up around the time of the Collateral Murder videos by the name of 'insurance.aes256'. [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From zbeeble at gmail.com Mon Dec 6 08:39:25 2010 From: zbeeble at gmail.com (Zaphod Beeblebrox) Date: Mon, 6 Dec 2010 11:39:25 -0500 Subject: [tor] Softlayer finally kicks us from their data center Message-ID: On that note, I'm an ISP. I'm not in the US. I buy my network from tier 1/2. So... my comments? On the cost side, Cogent and Hurricane Electric both sell 100 meg in the $400 to $500 range in top tier data centers. You can easily get Gigabit for $1500 from them (unmetered). So add $500/month for half a rack and another $200 for power, and you've got your own (tiny) colo company. Add a few l2tp connections to carriers and you have your own internet service company. But the DMCA notices go to the ARIN contact for the block. If you just get service, you may not be set as the "owner" (according to ARIN) of the block. I've been ignoring DMCA notices for 10 years (again, I'm not in the US) for both my subscribers, and (for the last year) TOR. The "new" thing has been RCMP calls about child porn (nice users TOR has :). I also get a DDOS every couple of months. Luckily, I can absorb most of them. Really, though, there's only 86 days of IPv4 allocation left (see HE's status page or gadget). The time for you to set up a company, get raw bandwidth and speak BGP with your peers is likely come and gone. TOR needs to think about IPv6. On Mon, Dec 6, 2010 at 1:07 AM, grarpamp wrote: >> Bad news: We have received another DMCA complaint yesterday, and today >> Softlayer told our ISP Midphase that they want our server removed from > > Another note for long term planning... > It may be worthwhile to shop for a circuit from a Tier-1/2 > network entity. Such circuits are provisioned from NAP's > where they have presence. You then need to rent only a > rack. > Benefit: No longer have colo/server companies as > middlemen. The pipe is entirely yours, you're renting > strictly real estate as real estate in a neutral facility. > Drawback: The Tier-1/2's still have AUP's to research. > Cost, mostly because there's nobody but you paying > the missing oversubscription. > Bonus: By then you pretty much need to be, and should be, > your own colo/server compan[y/ies] as well, partly to get > back some oversubscription. Also, in the corporate > "structuring" to skin the cat :) > Hello, yes, I'd like to report copyr... ticket, unable to process. Next hop... > Hello, yes, I'd like to report copyr... ticket, unable to process. Next hop... > Hello, yes, I'd like to report copyr... ticket, unable to process. Next hop... > Hello, yes, I'm giving up. > > Example: Cogent used to sell 100Mb dedicated for $1000/mo. I've seen > them at $7-$6/Mb recently for 100Mb-1Gb, full term. One could find any > list of Tier-1's and check them. > > Also you should look at where the PirateBays, WikiLeaks, > Torrent/Warez, free/hate speech, drug, RapidShare's, etc > sites are hosted and the pipes behind them. > > Unfortunately, short of laying fiber and becoming a Tier-1, > life may wind up being a series of hops. Even if you were > a Tier-1, the others could just gang up and de-peer you. > I'm still hoping for a worldwide net of conjoined community > nets that are simply too big a profit userbase to de-peer > from the commercial net. > ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From shamrock at cypherpunks.to Mon Dec 6 11:43:24 2010 From: shamrock at cypherpunks.to (Lucky Green) Date: Mon, 06 Dec 2010 11:43:24 -0800 Subject: Relay flooding, confirmation, HS's, default relay, web of trust Message-ID: On 2010-12-06 09:18, John Case wrote: > > On Mon, 6 Dec 2010, grarpamp wrote: [...] >> Maybe there would also be benefit in a web of trust amongst nodes >> not unlike a keysigning party. As with social networking, people >> vouch for each other in various ways and strengths based on how >> they feel that person meets them. I don't see any reason why node >> operators [descriptors] could not keysign and have that web encoded >> into the descriptors, directories, DHT, etc. > > > I proposed early in the previous thread that not only should a web of > trust be considered, but that this was indeed a classic case of a web of > trust ... I didn't see any comment on this from the Big Names on the > list, though... The Web of Trust (WoT) concept provides for marginal security benefits and then only in a very narrow set of circumstances that are unlikely to hold true for the larger community of Tor node operators. Starting with the second point, the WoT concept presumes that trust between its members precedes the codification of that trust into attestations attached to digital certificates. In other words, the WoT might provide (but likely will not) security benefits to a group of users that have pre-existing social relations and trust. For example, members of a human rights group that have personally known each other, or at least the bulk of each other, for years. The WoT cannot provide security benefits to a group of users with no pre-existing social trust relationship, such as the set of "Tor node operators". The thousands of Tor node operators, a tiny percentage of which have an existing social relationship, have no inherent trust amongst each other. And how could they? Absent an existing real-life WoT, there is no digital WoT to codify. Even within a group that has a strong existing trust and social graph in real life, the digital codification of a WoT offers security benefits only at the extreme margins. This fact is easiest explained by example: o Fire up your preferred OpenPGP software. (If you don't have OpenPGP software, then your understanding of how a WoT works is likely different from what a WoT actually does). o Eliminate all public keys for users with whom you do not intend to communicate. (No communication security system can provide security benefits to communications that will never take place). o List the public keys that show as valid. (Meaning they are signed by one or more keys that you trust to some degree). o Eliminate all the public keys that are signed by your key. (Those keys are not authenticated by the WoT, they were authenticated by you directly). o Eliminate all the public keys that are signed by keys that you chose to trust because they are the equivalent of CA root keys. This includes Debian distribution signing keys, the keys of any commercial CA, and the signing keys of auto-responder key servers such as the PGP Global Directory. (Signatures performed by such keys do not employ the WoT). o Look at the small number of public keys remaining. The keys are likely from deep inside your social circle. Now eliminate all the public keys that you could trivially authenticate directly, such as by asking a key holders, who are well known to you, to provide you with their key's fingerprint at work, at the next security conference, or the next time you meet at the pub. (The WoT may have authenticated those keys, but the WoT was not necessary to do so since you could have trivially authenticated those few keys yourself). o Lastly, count the remaining public keys. The number will likely be zero (no real life benefit to the WoT) or close to zero (benefit only in the extreme margins). In summary, the WoT is not a suitable solution to increasing the security of the Tor network. --Lucky Green *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Dec 6 03:19:49 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 6 Dec 2010 12:19:49 +0100 Subject: Over a decade of DDOS--any progress yet? Message-ID: <20101206111949.GB9434@leitl.org> ----- Forwarded message from "Dobbins, Roland" ----- From c_kandy_qg at dyckes.com Mon Dec 6 11:37:15 2010 From: c_kandy_qg at dyckes.com (Catharine Kandy) Date: Mon, 06 Dec 2010 12:37:15 -0700 Subject: Ativan, Lorazepam, XanaxValiun, Diazepam, K1onopiin - no rx required fast shipping available 0m In-Reply-To: <06c701cb91ff$bdda3a8b$7381dc3a@ueshfk1> Message-ID: <4CFD3B6B.AEF06FFC@dyckes.com> Discounts! Buy Cheap AnxietyMedz w/o Rx XanaxValiun, Diazepam, K1onopiin, Ativan, Lorazepam etc No Rx Required Fast 3-5 Days Shipping Available (USPS)! VISA, AMEX, E-Check Accepted. Buy Now! http://onlinegifford17z.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 621 bytes Desc: not available URL: From eugen at leitl.org Mon Dec 6 05:26:11 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 6 Dec 2010 14:26:11 +0100 Subject: FW: [IP] WikiLeaks sold classified intel, claims website's co-founder Message-ID: <20101206132610.GD9434@leitl.org> ----- Forwarded message from John Young ----- From bear at sonic.net Mon Dec 6 16:39:35 2010 From: bear at sonic.net (Ray Dillinger) Date: Mon, 06 Dec 2010 16:39:35 -0800 Subject: [p2p-hackers] .p2p domain Message-ID: On Mon, 2010-12-06 at 14:23 -0800, David Barrett wrote: > But any real system needs some ability for *somebody* to revoke/change > the mapping (eg, if a trademark violation in the jurisdiction of the TLD > owner), so any real system is no better than the current one in terms of > defense against government seizure. Agreed, FWIW. It's not the place of DNS to try to defend against government seizure. What we need to be preventing is criminal authentication fraud -- that is, when someone follows a false DNS record and winds up at a site that pretends to be the registrant's site, but which is not in fact controlled by the registrant. At this point every spammer and malware author in the world has a CA root key or two; and the CA's themselves never check crap, they just collect the money and sign whatever for whoever. And DNS nodes often accept "updates" that originate with criminals rather than registrants, and cannot be traced - so the extant authentication mechanisms are deeply broken. It's hard to imagine a proper fix that will work for the people and institutions whose cooperation would be required to implement it. Bear _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Dec 6 08:42:02 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 6 Dec 2010 17:42:02 +0100 Subject: [tor] Softlayer finally kicks us from their data center Message-ID: <20101206164202.GG9434@leitl.org> ----- Forwarded message from Zaphod Beeblebrox ----- From grarpamp at gmail.com Mon Dec 6 15:28:57 2010 From: grarpamp at gmail.com (grarpamp) Date: Mon, 6 Dec 2010 18:28:57 -0500 Subject: [tor] Softlayer finally kicks us from their data center Message-ID: > On the cost side, Cogent and Hurricane Electric both sell 100 meg in > the $400 to $500 range in top tier data centers. You can easily get > Gigabit for $1500 from them (unmetered). Didn't know Cogent had gone that low yet, thx. HE is more a provider of mixed services (colo/host/transit) than traditional pipe though. > But the DMCA notices go to the ARIN contact for the block. If you > just get service, you may not be set as the "owner" (according to > ARIN) of the block. Sure. I guess my mention of being an ISP should have said it was for purposes of going naturally alongside direct allocation. In a former life, I did send notices to upstream pipe as needed. ie: If there was an issue requiring it... traceroute, lookup and mail. So even an independant ISP, in their own room, buying circuit from L3/etc, could have a ticket lodged at L3. That was also the point about structuring. Companies layer and silo things as suits them. > I've been ignoring DMCA notices for 10 years As would many rightly do, laws of other countries don't apply. Business seeks to minimize cost, ignoring saves cost with minimal risk. > Really, though, there's only 86 days of IPv4 allocation left (see HE's > status page or gadget). The time for you to set up a company, get raw > bandwidth and speak BGP with your peers is likely come and gone. TOR > needs to think about IPv6. Yep, I left that part out of my prior note. That's a big problem as far as opening up shop as a new ISP. For this or any other purpose. Especially if you want to keep it private [held and funded] with organic growth... no time left for that. Save for givebacks and if IANA/etc brokers private swaps, direct v4 allocation simply won't exist, everything will be SWIP. The v6 net, current OS's, DNS are all ready. A fair number of popular apps, certainly opensource ones, do v6. So yes, Tor needs to become v6 capable. The v4 game may be played out. But given that true global v6 adoption vs NAT everywhere has what maybe a 50/50 chance?... early v6 ISP's could make a killing. Maybe we'll be among them :) Oh well, kindof off topic. Cheers. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From contact at patenty.ru Mon Dec 6 08:21:15 2010 From: contact at patenty.ru (=?koi8-r?B?88/L0sHdxc7JxSDT1NLByM/X2cgg19rOz9PP1w==?=) Date: Mon, 6 Dec 2010 19:21:15 +0300 Subject: =?koi8-r?B?wsXMwdEg2sHS0MzB1MEg0NXUxc0g1c3Fztjbxc7J0SDT1NLByM/X2cgg?= =?koi8-r?B?19rOz9PP1w==?= Message-ID: <7826A0520D5A4D2684ED19BD943EB8C9@microsof621043> 13 Декабря Методы оптимизации расходов на выплату белой зарплаты: уменьшаем страховые взносы код: (четыре девять пять)*74_291_98 и Ч_4.5/3_2./6_6 Цель: С 2010 года единый социальный налог (ЕСН) отменен – он заменен обязательными страховыми взносами в ФОМС, ФСС и ПФР, ставка которых с 2011 года составит 34% почти для всех налогоплательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала взносов заменена отменой их уплаты, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1.Обзор изменений законодательства, связанных с заменой ЕСН обязательными страховыми взносами. Cколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2010-2011 гг. Какие схемы стали или станут невыгодными; у каких налогоплательщиков положение даже улучшается; в каком случае выплата зарплаты на спецрежимах сохраняет свою актуальность. 2.Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц, которые рассматриваются на семинаре. 3.Использование специальных налоговых режимов: * дивидендные схемы – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с кассовой дисциплиной и политикой ЦБ. Текущая ситуация с обложением таких доходов НДФЛ. 4.Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5.Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Страхование жизни работников и ДМС за счет предприятия. 6.Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. 7.Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 8.Использование процентных займов от физлиц. Расчет эффективности. 9.Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 10.Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, 11.Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!), 12.Способы подтверждения источников крупных расходов физлиц и когда это необходимо. Продажа имущества физическими лицами без НДФЛ через вклад в уставный капитал и ЕНВД. 13.Ответы на вопросы. По желанию – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Вся информация по тел: \Моск. код/ ЧЧ5*4О.95 <<<>>> Ч45.З266 From rena_niaeq at stjohnprospect.com Mon Dec 6 19:19:50 2010 From: rena_niaeq at stjohnprospect.com (Rena Nia) Date: Mon, 06 Dec 2010 20:19:50 -0700 Subject: ViagraDiscounts, CheapCialis & Much More. Discreet Packaging and Fast Shipping 9hb In-Reply-To: Message-ID: <4CFDA7D6.D263F969@stjohnprospect.com> OrderCializViagra Online & Save 75-90% 0nline Pharmacy NoPrescription required Buy Canadian Drugs at Wholesale Prices and Save 75-90% FDA-Approved drugs + Superb Quality Drugs only! Accept all major credit cards Order Today! From $1.38 http://swjtl.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 525 bytes Desc: not available URL: From eugen at leitl.org Mon Dec 6 12:28:10 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 6 Dec 2010 21:28:10 +0100 Subject: Relay flooding, confirmation, HS's, default relay, web of trust Message-ID: <20101206202810.GJ9434@leitl.org> ----- Forwarded message from Lucky Green ----- From tbyfield at panix.com Mon Dec 6 22:41:27 2010 From: tbyfield at panix.com (t byfield) Date: Tue, 7 Dec 2010 01:41:27 -0500 Subject: FW: [IP] WikiLeaks sold classified intel, claims website's co-founder Message-ID: almost at riseup.net (Mon 12/06/10 at 10:13 AM +0100): > Also I didn't realize Cryptome was ever the first to leak anything. They > typically just linked to stuff that was already out there - and I thought > that was the point. Show how damaging publicly available information can > be. The 'first' to leak anything is a needlessly huge claim, but Cryptome was very early and very focused. It began in the context of the Cypherpunks list, which served that time as a kind of coordination point for, amidst lots of ravings, efforts to make cryptography more 'open' (I'm ever-more reluctant to use that word, and in the context of 'opening' techniques that primarily serve to *close* things the irony becomes very poignant). This mainly consisted of challenging its militarization (and consequent criminalization by anyone not sanctioned by the ~military), but it led to some other astounding projects -- for example distributed-computing projects like SETI at home[1] can all trace their origins to Lucky Green's wish that he could exploit all the CPU cycles wasted worldwide running Windows screensavers. [1] http://en.wikipedia.org/wiki/List_of_distributed_computing_projects ...though Vernor Vinge's name was regularly invoked on the list (esp _True Names_), so even then the issue wasn't 'F1RST!!!'. Rather, the ethic of the list was something more like the IETF's 'rough consensus and running code,' just without the consensus bit. Let's just say it wouldn't take long to come up with a "How many cypherpunks does it take to screw in a lightbulb?" joke. Your assumption that Cryptome typically linked to stuff is completely off, but in a useful way, one that says a lot about where the net has drifted over all these years: from a society of 'maintainer'-driven sites, to a delusional 'ecology' of eden where things magically just seem to 'be' there (until they're not!), to lately this mystified 'cloud' stuff (I'll merely gesture in the direction the analogy points, toward an 'environment'). Actually storing the documents, rather than merely linking to them, has been central to Cryptome's logic from day one. Any fool can link to any fool document, a truth that goes a long way toward unravel the mass of 'clicktivist' rubbish; but physically possessing documents -- whatever that means -- involves much more serious risks. I should probably add that I'm not privy to Cryptome's inner workings in any way. Cheers, T # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jya at pipeline.com Tue Dec 7 02:26:18 2010 From: jya at pipeline.com (John Young) Date: Tue, 07 Dec 2010 05:26:18 -0500 Subject: FW: [IP] WikiLeaks sold classified intel, claims website's co-founder Message-ID: At 10:49 AM 12/7/2010 +1100, you wrote: >> Do you have a pointer to this stuff? The early private Wikileaks email messages, leaked: http://cryptome.org/wikileaks/wikileaks-leak.htm http://cryptome.org/wikileaks/wikileaks-leak2.htm The goal to raise $5M in a half-year is in the first URL, near the bottom, 7 Jan 2007. Lately, that goal appears realistic -- Julian claims over $1m donated in the few months after the gun ship video and war logs release -- and thanks to inducing the MSM to launder WL's rising profits through its approved channels for selling leaked classified information after checking with officials about what will keep the mutually beneficial leaks flowing. Nobody comes close to profiting as much by selling leaks like governments and other authoritatives. Leaks were invented for that purpose, insider spin, press offices obligatory, research grants, conferences, tete a tetes, hot sheets, lost laptops, Lady Gaga CD burnings. There will be stings to entrap extortionists. Bank of America hard disks. Swedish honeys. Rats inside and outside WL. On Ted's point about Cryptome: it is a library of sorts not a hot sheet. 90 per cent of its traffic is for archived material. Totally untrustworthy. Damaging to seekers of authoritativeness. Not worth a centavo. Don't go there. Fuck off. Fuck yourself. Fuck me. Fuck WL. Fuck this. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From rendahannahcc at de.opel.com Tue Dec 7 06:12:00 2010 From: rendahannahcc at de.opel.com (Renda Hannah) Date: Tue, 07 Dec 2010 07:12:00 -0700 Subject: High Qua1ityMedications + Discount On All Reorders = Best Deal Ever! Viagra50/100mg - $1.85 m4 In-Reply-To: <04e401cb957e$1ba7ef69$2da1cefb@lge33eq> Message-ID: <4CFE40B0.0C6D2E58@de.opel.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://gpmun.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 529 bytes Desc: not available URL: From basile at opensource.dyc.edu Tue Dec 7 04:50:07 2010 From: basile at opensource.dyc.edu (Anthony G. Basile) Date: Tue, 07 Dec 2010 07:50:07 -0500 Subject: tor-ramdisk 20101207 released Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi everyone I want to announce to the list that a new release of tor-ramdisk is out. Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Security is enhanced by hardening the kernel and binaries, and privacy is enhanced by forcing logging to be off at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key, which may be exported/imported by FTP or SSH. Changelog: This release adds scp functionality using openssh-5.6p1 to export/import the configuration file and private RSA key. The build system was reworked to build dynamically linking binaries rather than static. Also, tor was updated to 0.2.1.27, busybox to 1.17.4, and the kernel to 2.6.32.25 plus Gentoo's hardened-patches-2.6.32-30.extras. i686: Homepage: http://opensource.dyc.edu/tor-ramdisk Download: http://opensource.dyc.edu/tor-ramdisk-downloads x86_64: Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads MIPS: Homepage: http://opensource.dyc.edu/tor-mips-ramdisk Download: http://opensource.dyc.edu/tor-mips-ramdisk-downloads - -- Anthony G. Basile, Ph. D. Chair of Information Technology D'Youville College Buffalo, NY 14201 (716) 829-8197 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.16 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAkz+LX8ACgkQl5yvQNBFVTUBRwCdHba3FDApV6IYlPsRKMO+bVQi picAoKQWkpUr/fZvHYylsxTUTniRfkIZ =T0CU -----END PGP SIGNATURE----- *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Dec 7 01:29:28 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Dec 2010 10:29:28 +0100 Subject: FW: [IP] WikiLeaks sold classified intel, claims website's co-founder Message-ID: <20101207092928.GL9434@leitl.org> ----- Forwarded message from t byfield ----- From 0-usericardoparker at fellowes.com Mon Dec 6 23:34:52 2010 From: 0-usericardoparker at fellowes.com (_Canadian Pharm._) Date: Tue, 7 Dec 2010 10:34:52 +0300 Subject: Trustworthy Meds Overnighted To You Message-ID: <0170535410.I3NR7M6O739210@szkir.fdjzkst.ua> The #1 Reason Relationships fail is in the bedroom Satisfaction Guaranteed! http://www.nicescrub.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 289 bytes Desc: not available URL: From nettime at kein.org Tue Dec 7 03:11:28 2010 From: nettime at kein.org (nettime's avid reader) Date: Tue, 7 Dec 2010 12:11:28 +0100 Subject: The lawless Wild West attacks WikiLeaks Message-ID: Choice Quote: "Remember: this is all being done not only without any charges or convictions, but also any real prospect of charging them with a crime, because they did nothing illegal." The lawless Wild West attacks WikiLeaks Monday, Dec 6, 2010 12:07 ET http://www.salon.com/news/opinion/glenn_greenwald/2010/12/06/wikileaks/index.html Just look at what the U.S. Government and its friends are willing to do and capable of doing to someone who challenges or defies them -- all without any charges being filed or a shred of legal authority. They've blocked access to their assets, tried to remove them from the Internet, bullied most everyone out of doing any business with them, froze the funds marked for Assange's legal defense at exactly the time that they prepare a strange international arrest warrant to be executed, repeatedly threatened him with murder, had their Australian vassals openly threaten to revoke his passport, and declared them "Terrorists" even though -- unlike the authorities who are doing all of these things -- neither Assange nor WikiLeaks ever engaged in violence, advocated violence, or caused the slaughter of civilians. This is all grounded in the toxic mindset expressed yesterday on Meet the Press (without challenge, naturally) by GOP Sen. Minority Leader Mitch McConnell, who said of Assange: "I think the man is a high-tech terrorist. Hebs done an enormous damage to our country, and I think he needs to be prosecuted to the fullest extent of the law. And if that becomes a problem, we need to change the law." As usual, when wielded by American authorities, the term "terrorist" means nothing more than: "those who impede or defy the will of the U.S. Government with any degree of efficacy." Anyone who does that is, by definition, a Terrorist. And note McConnell's typical, highly representative view that if someone he wants to punish isn't a criminal under the law, then you just "change the law" to make him one. But that sort of legal scheming isn't even necessary. The U.S. and its "friends" in the Western and business worlds are more than able and happy to severely punish anyone they want without the slightest basis in "law." That's what the lawless, Wild Western World is: political leaders punishing whomever they want without any limits, certainly without regard to bothersome concepts of "law." Anyone who doubts that should just look at what has been done to Wikileaks and Assange over the last week. In this series of events, there are indeed genuine and pernicious threats to basic freedom and security; they most assuredly aren't coming from WikiLeaks or Julian Assange. People often have a hard time believing that the terms "authoritarian" and "tyranny" apply to their own government, but that's because those who meekly stay in line and remain unthreatening are never targeted by such forces. The face of authoritarianism and tyranny reveals itself with how it responds to those who meaningfully dissent from and effectively challenge its authority: do they act within the law or solely through the use of unconstrained force? * * * * * Yahoo News!' Michael Calderone has a very good article documenting how major American media outlets -- as always -- snapped into line with the authorities they serve by ceasing to use the term "whistle-blower" to describe WikiLeaks. One encouraging development is the emergence of hundreds of "mirror- WikiLeaks" sites around the world which make abolishing WikiLeaks pointless; that's a good model for how to subvert Internet censorship efforts. Those interested in doing that can find instructions here. And here is a well-done site which asks: "Why is WikiLeaks a Good Thing?" UPDATE: Just to underscore the climate of lawless initmidation that has been created: before WikiLeaks was on many people's radars (i.e., before the Apache video release), I wrote about the war being waged on them by the Pentagon, interviewed Assange, and urged people to donate money to them. In response, numerous people asked -- both in comments and via email -- whether they would be in danger, could incur legal liability for providing material support to Terrorism or some other crime, if they donated to WikiLeaks. Those were American citizens expressing that fear over an organization which had never been remotely charged with any wrongdoing. Similarly, I met several weeks ago with an individual who once worked closely with WikiLeaks, but since stopped because he feared that his country -- which has a very broad extradition treaty with the U.S. -- would arrest him and turn him over to the Americans upon request. He knew he had violated no laws, but given that he's a foreigner, he feared -- justifiably -- that he could easily be held by the United States without charges, denied all sorts of basic rights under the Patriot Act, and otherwise be subject to a system of "justice" which recognizes few limits or liberties, especially when dealing with foreigners accused of aiding Terrorists. All the oppressive, lawless policies of the last decade -- lawless detention, Guantanamo, disappearing people to CIA black sites, rendition, the torture regime, denial of habeas corpus, drones, assassinations, private mercenary forces, etc. -- were designed, first and foremost, to instill exactly this fear, to deter any challenge. Many of these policies continue, and that climate of fear thus endures (see this comment from today as but one of many examples). As the treatment just thus far of WikiLeaks and Assange demonstrates, that reaction -- though paralyzing and counter-productive -- is not irrational. And one thing is for sure: there is nothing the U.S. Government could do -- no matter how lawless or heinous -- which (with rare exception) would provoke the objections of the American establishment media. UPDATE II: Those wishing to donate to WikiLeaks can still do so here, via Options 2 (online credit card) or 3 (wire to bank in Iceland). UPDATE III: One more, from CNET, roughly 30 minutes ago: As the article says, this is "a move that will dry up another source of funds for the embattled document-sharing Web site." Remember: this is all being done not only without any charges or convictions, but also any real prospect of charging them with a crime, because they did nothing illegal. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Dec 7 03:44:53 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Dec 2010 12:44:53 +0100 Subject: The lawless Wild West attacks WikiLeaks Message-ID: <20101207114452.GO9434@leitl.org> ----- Forwarded message from nettime's avid reader ----- From eugen at leitl.org Tue Dec 7 03:45:27 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Dec 2010 12:45:27 +0100 Subject: FW: [IP] WikiLeaks sold classified intel, claims website's co-founder Message-ID: <20101207114527.GP9434@leitl.org> ----- Forwarded message from John Young ----- From MiniFunPeople at psl.to Tue Dec 7 12:50:07 2010 From: MiniFunPeople at psl.to (Peter Langston) Date: Tue, 07 Dec 2010 12:50:07 -0800 Subject: No subject Message-ID: ... Subject: Live With the WikiLeakable World or Shut Down the Net. It's Your Choice Reply-To: psl at acm.org Organization: Mini Fun_People User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.12) Gecko/20101027 Thunderbird/3.1.6 MiniFunPeople........................................ISSN 1098-7649 Forwarded-by: Peter Langston http://www.commondreams.org/view/2010/12/06-9 /Published on Monday, December 6, 2010 by The Guardian UK/ *Live With the WikiLeakable World or Shut Down the Net. It's Your Choice* Western political elites obfuscate, lie and bluster b and when the veil of secrecy is lifted, they try to kill the messenger by John Naughton "Never waste a good crisis" used to be the catchphrase of the Obama team in the runup to the presidential election. In that spirit, let us see what we can learn from official reactions to the WikiLeaks revelations . The most obvious lesson is that it represents the first really sustained confrontation between the established order and the culture of the internet. There have been skirmishes before, but this is the real thing. And as the backlash unfolds b first with deniable attacks on internet service providers hosting WikiLeaks , later with companies like Amazon and eBay and PayPal suddenly "discovering" that their terms and conditions preclude them from offering services to WikiLeaks, and then with the US government attempting to intimidate Columbia students posting updates about WikiLeaks on Facebook b the intolerance of the old order is emerging from the rosy mist in which it has hitherto been obscured. The response has been vicious, co-ordinated and potentially comprehensive, and it contains hard lessons for everyone who cares about democracy and about the future of the net. There is a delicious irony in the fact that it is now the so-called liberal democracies that are clamouring to shut WikiLeaks down. Consider, for instance, how the views of the US administration have changed in just a year. On 21 January, secretary of state Hillary Clinton made a landmark speech about internet freedom, in Washington DC, which many people welcomed and most interpreted as a rebuke to China for its alleged cyberattack on Google. "Information has never been so free," declared Clinton. "Even in authoritarian countries, information networks are helping people discover new facts and making governments more accountable." She went on to relate how, during his visit to China in November 2009, Barack Obama had "defended the right of people to freely access information, and said that the more freely information flows the stronger societies become. He spoke about how access to information helps citizens to hold their governments accountable, generates new ideas, and encourages creativity." Given what we now know, that Clinton speech reads like a satirical masterpiece. One thing that might explain the official hysteria about the revelations is the way they expose how political elites in western democracies have been deceiving their electorates. The leaks make it abundantly clear not just that the US-Anglo-European adventure in Afghanistan is doomed but, more important, that the American, British and other Nato governments privately admit that too. The problem is that they cannot face their electorates b who also happen to be the taxpayers funding this folly b and tell them this. The leaked dispatches from the US ambassador to Afghanistan provide vivid confirmation that the Karzai regime is as corrupt and incompetent as the South Vietnamese regime in Saigon was when the US was propping it up in the 1970s. And they also make it clear that the US is as much a captive of that regime as it was in Vietnam. The WikiLeaks revelations expose the extent to which the US and its allies see no real prospect of turning Afghanistan into a viable state, let alone a functioning democracy. They show that there is no light at the end of this tunnel. But the political establishments in Washington, London and Brussels cannot bring themselves to admit this. Afghanistan is, in that sense, a quagmire in the same way that Vietnam was. The only differences are that the war is now being fought by non-conscripted troops and we are not carpet-bombing civilians. The attack of WikiLeaks also ought to be a wake-up call for anyone who has rosy fantasies about whose side cloud computing providers are on. These are firms like Google, Flickr, Facebook, Myspace and Amazon which host your blog or store your data on their servers somewhere on the internet, or which enable you to rent "virtual" computers b again located somewhere on the net. The terms and conditions under which they provide both "free" and paid-for services will always give them grounds for dropping your content if they deem it in their interests to do so. The moral is that you should not put your faith in cloud computing b one day it will rain on your parade. Look at the case of Amazon, which dropped WikiLeaks from its Elastic Compute Cloud the moment the going got rough. It seems that Joe Lieberman, a US senator who suffers from a terminal case of hubris, harassed the company over the matter. Later Lieberman declared grandly that he would be "asking Amazon about the extent of its relationship with WikiLeaks and what it and other web service providers will do in the future to ensure that their services are not used to distribute stolen, classified information". This led the New Yorker's Amy Davidson to ask whether "Lieberman feels that he, or any senator, can call in the company running the New Yorker's printing presses when we are preparing a story that includes leaked classified material, and tell it to stop us". What WikiLeaks is really exposing is the extent to which the western democratic system has been hollowed out. In the last decade its political elites have been shown to be incompetent (Ireland, the US and UK in not regulating banks); corrupt (all governments in relation to the arms trade); or recklessly militaristic (the US and UK in Iraq). And yet nowhere have they been called to account in any effective way. Instead they have obfuscated, lied or blustered their way through. And when, finally, the veil of secrecy is lifted, their reflex reaction is to kill the messenger. As Simon Jenkins put it recently in the Guardian, "Disclosure is messy and tests moral and legal boundaries. It is often irresponsible and usually embarrassing. But it is all that is left when regulation does nothing, politicians are cowed, lawyers fall silent and audit is polluted. Accountability can only default to disclosure." What we are hearing from the enraged officialdom of our democracies is mostly the petulant screaming of emperors whose clothes have been shredded by the net. Which brings us back to the larger significance of this controversy. The political elites of western democracies have discovered that the internet can be a thorn not just in the side of authoritarian regimes, but in their sides too. It has been comical watching them and their agencies stomp about the net like maddened, half-blind giants trying to whack a mole. It has been deeply worrying to watch terrified internet companies b with the exception of Twitter, so far b bending to their will. But politicians now face an agonising dilemma. The old, mole-whacking approach won't work. WikiLeaks does not depend only on web technology. Thousands of copies of those secret cables b and probably of much else besides b are out there, distributed by peer-to-peer technologies like BitTorrent . Our rulers have a choice to make: either they learn to live in a WikiLeakable world, with all that implies in terms of their future behaviour; or they shut down the internet. Over to them. _______________ B) Guardian News and Media Limited 2010 John Naughton is professor of the public understanding of technology at the Open University Article printed from www.CommonDreams.org URL to article: http://www.commondreams.org/view/2010/12/06-9 -- ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Dec 7 04:57:01 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Dec 2010 13:57:01 +0100 Subject: tor-ramdisk 20101207 released Message-ID: <20101207125701.GQ9434@leitl.org> ----- Forwarded message from "Anthony G. Basile" ----- From almost at riseup.net Tue Dec 7 07:23:37 2010 From: almost at riseup.net (almost at riseup.net) Date: Tue, 7 Dec 2010 16:23:37 +0100 Subject: Julian Assange Captured by World's Dating Police Message-ID: http://www.huffingtonpost.com/naomi-wolf/interpol-the-worlds-datin_b_793033.html?ref=tw Dear Interpol: As a longtime feminist activist, I have been overjoyed to discover your new commitment to engaging in global manhunts to arrest and prosecute men who behave like narcissistic jerks to women they are dating. I see that Julian Assange is accused of having consensual sex with two women, in one case using a condom that broke. I understand, from the alleged victims' complaints to the miedia[1] , that Assange is also accused of texting and tweeting in the taxi on the way to one of the women's apartments while on a date, and, disgustingly enough, 'reading stories about himself online' in the cab. Both alleged victims are also upset that he began dating a second woman while still being in a relationship with the first. (Of course, as a feminist, I am also pleased that the alleged victims are using feminist-inspired rhetoric and law to assuage what appears to be personal injured feelings. That's what our brave suffragette foremothers intended!). Thank you again, Interpol. I know you will now prioritize the global manhunt for 1.3 million guys I have heard similar complaints about personally in the US alone -- there is an entire fraternity at the University of Texas you need to arrest immediately. I also have firsthand information that John Smith in Providence, Rhode Island, went to a stag party -- with strippers! -- that his girlfriend wanted him to skip, and that Mark Levinson in Corvallis, Oregon, did not notice that his girlfriend got a really cute new haircut -- even though it was THREE INCHES SHORTER. Yours gratefully, Naomi Wolf [1] http://www.dailymail.co.uk/news/article-1336291/Wikileaks-Julian-Assanges-2-night-stands-spark-worldwide-hunt.html # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jan.wildeboer at gmx.de Tue Dec 7 07:36:47 2010 From: jan.wildeboer at gmx.de (Jan Wildeboer) Date: Tue, 07 Dec 2010 16:36:47 +0100 Subject: Umberto Eco: Not such wicked leaks Message-ID: On 12/07/2010 03:38 PM, almost at riseup.net wrote: > What nonsense. How does WL confirm that? It could only do so if it > released every file..... Or at least a LOAD of files... None were > released (or presumably leaked) of the highest classifications. #cablegate consists of content distributed via SIPRnet[1] - this network carries information up to the SECRET level. The TOP SECRET content is not distributed via SIPRnet, hence it cannot show up in the 250k cables WL is publishing. Jan [1] http://en.wikipedia.org/wiki/SIPRNet # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Dec 7 07:47:38 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Dec 2010 16:47:38 +0100 Subject: [tor] Softlayer finally kicks us from their data center Message-ID: <20101207154738.GG9434@leitl.org> ----- Forwarded message from grarpamp ----- From eugen at leitl.org Tue Dec 7 07:50:36 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Dec 2010 16:50:36 +0100 Subject: [p2p-hackers] .p2p domain Message-ID: <20101207155036.GI9434@leitl.org> ----- Forwarded message from Ray Dillinger ----- From tor-admin at privacyfoundation.de Tue Dec 7 08:12:57 2010 From: tor-admin at privacyfoundation.de (Karsten N.) Date: Tue, 07 Dec 2010 17:12:57 +0100 Subject: Chrome and Safari IP leak Message-ID: Hi, a warning for using Google Chrome, Safari or other Webkit based browsers with Tor. Because of a bug in the FTP proxy settings user can deanonymized by FTP links. The Anonymity test of JonDonym checks FTP connections too and you can test it very simple. See: http://what-is-my-ip-address.anonymous-proxy-servers.net/ JonDos has published a warning for JonDonym users, https://anonymous-proxy-servers.net/blog/archives/230-Chrome-and-Safari-leak-IP-address.html May be, Torproject.org can blog a warning for Tor users too. Greetings Karsten N. *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bevan84341 at karnegi.ru Tue Dec 7 01:14:35 2010 From: bevan84341 at karnegi.ru (Charles Burt) Date: Tue, 7 Dec 2010 17:14:35 +0800 Subject: =?koi8-r?B?8sXHydPU0sHDydEgySDsycvXycTBw8nRIO/v7w==?= Message-ID: <614226856.74794822001520@karnegi.ru> ЛИКВИДАЦИЯ ПРЕДПРИЯТИЙ без проверок (Все регионы России) Вариант ликвидации компании, который предлагаем мы - перевод предприятия на наших учредителей с заменой генерального директора на иностранную управляющую компанию, либо на иностранного директора. Перерегистрация ООО - 2 900 рублей Подготовка документов в течение 1 рабочего дня Возможна сдача документов в ГНИ-46 без директора +7(495) 211-17-11 - круглосуточно / без выходных Полный комплекс услуг по регистрации и перерегистрации предприятий Юридический адрес - от 10 000 рублей 1. Регистрация ООО √ от 2 900 рублей 2. Регистрация Индивидуального предпринимателя - 1 500 рублей 3. Регистрация ОАО, ЗАО - 15 000 рублей 4. Аккредитация представительств √ от 6 000 рублей 5. Регистрация изменений (без внесения изменений в УД) √ от 2 900 рублей Регистрация оффшоров Ликвидация ООО и ЗАО Юридические услуги, АРБИТРАЖ +7(495) 211-17-11 - круглосуточно / без выходных ПЕРЕЧЕНЬ ДОКУМЕНТОВ И ИНФОРМАЦИЯ НЕОБХОДИМАЯ ДЛЯ ПЕРЕРЕГИСТРАЦИИ ООО: Предоставить простые (не заверенные) ксерокопии (можно выслать по факсу или электронной почте) - устав + все изменения к ним (если были); - свидетельство о постановке на налоговый учет (ИНН); - справка о присвоении статистических кодов (ОКВЭД); - протоколы (решения) о создании и назначении исполнительных органов (Директора); - паспортные данные участников и директора; -выписка из ЕГРЮЛ (для подготовки документов нам можно предоставить старую, но актуальную выписку, а для заверения Заявления у нотариуса, необходимо предоставить выписку сроком не более месяца v можете получить сами или заказать получение у нас (получение выписки за сутки 1500 рублей) From eugen at leitl.org Tue Dec 7 08:41:30 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Dec 2010 17:41:30 +0100 Subject: Umberto Eco: Not such wicked leaks Message-ID: <20101207164130.GK9434@leitl.org> ----- Forwarded message from Jan Wildeboer ----- From eugen at leitl.org Tue Dec 7 08:41:46 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Dec 2010 17:41:46 +0100 Subject: Chrome and Safari IP leak Message-ID: <20101207164146.GL9434@leitl.org> ----- Forwarded message from "Karsten N." ----- From eugen at leitl.org Tue Dec 7 13:36:11 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Dec 2010 22:36:11 +0100 Subject: Live With the WikiLeakable World or Shut Down the Net. It's Your Choice Message-ID: <20101207213611.GR9434@leitl.org> ----- Forwarded message from Peter Langston ----- From eugen at leitl.org Tue Dec 7 13:39:03 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Dec 2010 22:39:03 +0100 Subject: Julian Assange Captured by World's Dating Police Message-ID: <20101207213903.GU9434@leitl.org> Ok, that should be the last one. Mostly. But it's funny. ----- Forwarded message from almost at riseup.net ----- From t_stephany_wp at tnt.com Tue Dec 7 21:59:24 2010 From: t_stephany_wp at tnt.com (Terrie Stephany) Date: Tue, 07 Dec 2010 22:59:24 -0700 Subject: We have 15mg & 30mg Codeine pills - 30/15mg for $203.70 - 60/15mg for $385.80 zods In-Reply-To: <7ae701cb9653$13f4ec77$d9f2280a@q0g2ngi> Message-ID: <4CFF1EBC.3AC2846A@tnt.com> --- Codeine 15mg -- 30 for $203.70 -- VISA Only!!! -- -- Codeine (Methylmorphine) is a narcotic (opioid) pain reliever -- We have 15mg & 30mg pills - 30/15mg for $203.70 - 60/15mg for $385.80 - 90/15mg for $562.50 -- VISA Only!!! --- No RX-Required to Order http://pillurbanus15a.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 644 bytes Desc: not available URL: From mysidia at gmail.com Tue Dec 7 22:21:11 2010 From: mysidia at gmail.com (James Hess) Date: Wed, 8 Dec 2010 00:21:11 -0600 Subject: Over a decade of DDOS--any progress yet? Message-ID: On Mon, Dec 6, 2010 at 1:50 AM, Sean Donelan wrote: > February 2000 weren't the first DDOS attacks, but the attacks on multiple > Other than buying lots of bandwidth and scrubber boxes, have any other DDOS > attack vectors been stopped or rendered useless during the last decade? Very little, no, and no. Not counting occasional application bugs that are quickly fixed. Even TCP weaknesses that can facilitate attack are still present in the protocol. New vectors and variations of those old vectors emerged since the 1990s. So there is an increase in the number of attack vectors to be concerned about, not a reduction. SYN and Smurf are Swords and spears after someone came up with atomic weaponry. The atomic weaponry named "bot net". Which is why there is less concern about the former types of single-real-origin-spoofed-source attacks. Botnet-based DDoS is just "Smurf" where amplification nodes are obtained by system compromise, instead of router misconfiguration, and a minor variation on the theme where the chain reaction is not started by sending spoofed ICMP ECHOs. Since 2005 there are new beasts such as "Slowloris" and "DNS Reflection". DNS Reflection attacks are a more direct successor to smurf; true smurf broadcast amplification points are rare today, diminishing returns for the attacker, trying to find the 5 or 6 misconfigured gateways out there, but that doesn't diminish the vector of spoofed small request large response attacks. Open DNS servers are everywhere. SYN attacks traditionally come from a small number of sources and rely on spoofing to attack limitations on available number of connection slots for success. New vectors that became most well-known in the late 90s utilize botnets, and an attacker can make full connections therefore requiring zero spoofing, negating the benefit of SYN cookies. In other words, SYN floods got supplanted by TCP_Connect floods. -- -JH ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From loreedenaeuh at execulink.com Wed Dec 8 05:42:37 2010 From: loreedenaeuh at execulink.com (Loree Denae) Date: Wed, 08 Dec 2010 06:42:37 -0700 Subject: 100% herbal, 100% Natural, 100% Safe, The proven NaturalPenisEnhancement that works! gu Message-ID: <4CFF8B4D.22B430D6@execulink.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://queensizing.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 839 bytes Desc: not available URL: From jya at pipeline.com Wed Dec 8 04:33:33 2010 From: jya at pipeline.com (John Young) Date: Wed, 08 Dec 2010 07:33:33 -0500 Subject: Over a decade of DDOS--any progress yet? In-Reply-To: <20101208111205.GG9434@leitl.org> Message-ID: Indeed, the use of rogue and banal programs and technology to conceal novel penetrations and takeovers or covertly aid their success is venerable subterfuge. Most of them taught at Ft Huachuca to the Bradley Mannings and deployled by hotshit newbies at Cyberwarcom. Beta tested in the wild, say like the Lady Gaga download stratgem. Some go haywire and escape control or have unintended consequences like Morris's worm. Shh, national security at stake. Bizarre and comical behavior to hide the diabolical and malign. Jesters and courtesans and priests and housekeepers and grunts were always the best insider spies and spreaders of undermining disinfo, and SDT mental and corporeal. Disengineering strong crypto, a variation on stuxnetting. A bit of code inserted on PGP servers or PGP users via key verification. Weak attacks to assay powerful defenses. SOP in the military to boost budgets way beyond need. Covertly clouding illicit archives and snoops on systems of clueless users of Skype, IM, social media, any commercial or Internet operational software. Backflowing program updates used to plant snoopers on the updater systems. Prepositioned tick-tickers at IANA, CERT, Cyberwarcom, IRS, eop.gov and vatican.org. Thanks to Tesla, no thanks to Edison who kept it quiet, anything electromagnetic can be taken over, especially those which foolishly aim for asymmetrical control. Following Tesla's roguosity, the Internet is a vast reverse spying machine, with bountiful EM inititative hiding places beneath those listed handily by those who warn only of threats they want to sell protection for and try like hell to dismiss the others as amateurish. You try to patent any of these, it will be classified upon receipt. Look, it would be appreciated if you didn't put this on the Internet. From company at kolovada.ru Tue Dec 7 16:44:38 2010 From: company at kolovada.ru (=?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxQ==?=) Date: Wed, 8 Dec 2010 09:44:38 +0900 Subject: =?koi8-r?B?7sHMz8fP18/FINrBy8/Oz8TB1MXM2NPU188g1yAyMDExxy4uIPPU0s/J?= =?koi8-r?B?zSDOwczPx8/X2cUg08jFzdku?= Message-ID: 13-14 Декабря ТЕМА: Оптимальные налоговые схемы с учетом изменений налогового законодательства. Оптимизируем НДФЛ, страховые взносы. Готовим затратные механизмы в налоговых схемах. 8 (495) 792.2|-22 <> 44*539/68 День1: СНИЖЕНИЕ СТРАХОВЫХ ВЗНОСОВ внедряем допустимые схемы снижения выплат налогов на доходы физических лиц в условиях кризиса и замены ЕСН страховыми взносами. С 2010 года единый социальный налог (ЕСН) отменен – он заменен обязательными страховыми взносами в ФОМС, ФСС и ПФР, ставка которых с 2011 года составит 34% почти для всех налогоплательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала взносов заменена отменой их уплаты, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: * Обзор изменений законодательства, связанных с заменой ЕСН обязательными страховыми взносами. Cколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2010-2011 гг. Какие схемы стали или станут невыгодными; у каких налогоплательщиков положение даже улучшается; в каком случае выплата зарплаты на спецрежимах сохраняет свою актуальность. * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц, которые рассматриваются на семинаре. * Использование специальных налоговых режимов. * Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. * Использование вспомогательных организаций: * Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. * Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. * Использование процентных займов от физлиц. Расчет эффективности. * Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. * Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, * Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!), * Способы подтверждения источников крупных расходов физлиц и когда это необходимо. Продажа имущества физическими лицами без НДФЛ через вклад в уставный капитал и ЕНВД. ----------------------------- День2: Налоговое планирование. Затратные механизмы для оптимизации НДС и налога на прибыль Программа: * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги сучетом будущих изменений законодательства, судебной практики и тенденцийразвития правоприменения. "Черные", "серые" и "белые"схемы. * Кто может быть участником "затратных" схем. Незаконные варианты: "недобросовестныеналогоплательщики" и контактирующие с ними риск-структуры ("белая"- "серая" - "черная" фирмы). Примеры "серых" схемс применением затратных механизмов (как нельзя "оптимизировать"!). Как нестать "недобросовестным". * Варианты затратных механизмов: * Виды приемлимых услуг и работ: Распространенные "плохие" варианты "виртуальных"услуг и работ (информационные, консультационные, маркетинговые, рекламные,ремонт...). Когда они все же допустимы. * Минимизация рисков "затратных" схем. "Явныепризнаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличиеделовых целей, "легенда", отсутствие дублирующихся функций. Грамотноеобоснование расходов и цен. Неаффилированность, прямые и косвенные признакиаффилированности, ее негативные последствия и когда она допустима; "искусственноедробление бизнеса с целью уклонения от уплаты налогов" (подход "как кЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельностьучастников "затратных" схем. * Иностранные низконалоговые компании в "затратных"схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п.Выбор низконалоговых юрисдикций. * Ответы на вопросы. По желанию и при наличиивозможности – индивидуальное экспресс-моделирование схем налоговогопланирования для компаний-участниц семинара. Информацию можно получить по телефонам: Московский код; 792_21_2*2 ; 445ЧО95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8249 bytes Desc: not available URL: From eugen at leitl.org Wed Dec 8 01:14:52 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Dec 2010 10:14:52 +0100 Subject: Over a decade of DDOS--any progress yet? Message-ID: <20101208091452.GA9434@leitl.org> ----- Forwarded message from James Hess ----- From 0-0-prometal at prometal.fr Tue Dec 7 21:07:46 2010 From: 0-0-prometal at prometal.fr (Replica Rolex_and_Others) Date: Wed, 8 Dec 2010 10:37:46 +0530 Subject: We offer Every Brand imaginable! Message-ID: <3392085031.7PIERRB5924398@tydohogo.ugmnotpmqgv.tv> http://knifeend.com http://knifeend.com -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 213 bytes Desc: not available URL: From gmaxwell at gmail.com Wed Dec 8 07:50:18 2010 From: gmaxwell at gmail.com (Gregory Maxwell) Date: Wed, 8 Dec 2010 10:50:18 -0500 Subject: leaker-optimized versions of Tor Message-ID: On Wed, Dec 8, 2010 at 10:11 AM, Mitar wrote: > Hi! > >> Relaxing the realtime constraint, adding random delays, more >> hops and also chaff trafic in a Tor derivate would arguably >> make such attacks more difficult. > > I am asking just about more hops. Why would more hops be necessary? It > is enough that one node introduces random delay and this is it? It is strictly necessary that the bad guy not control 100% of the forwarding nodes. On a realtime onion network anonymity is bounded by timing attacksb even if you could tolerate the delay of having a zillion middle nodes the attacker could just watch the entrances an exits and correlate timing. So adding a great many hops would not significantly increase security. A mix network can tolerate higher delays and, hopefully, eliminates the timing attacks. So additional hops can be beneficial. The down side is increased vulnerability to DOS attacks if flooders can generate cheap round-the-world messages. The creating a hidden service based overlay network, as was suggested here by Karsten N., was what I thought when I read the threadb but I was concerned that if the network identity of all/most of the nodes is hidden that an attacker could spin up thousands of fake mix nodes without even needing a lot of network resources. They could make it far more likely that all your hops were controlled by one party. Although the risk exists for non hidden service based designs, it's probably much easier with an anonymity layer in between. Any design using hidden services would specifically need to address this risk. *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bmanning at vacation.karoshi.com Wed Dec 8 02:58:38 2010 From: bmanning at vacation.karoshi.com (bmanning at vacation.karoshi.com) Date: Wed, 8 Dec 2010 10:58:38 +0000 Subject: Over a decade of DDOS--any progress yet? Message-ID: actually, botnets are an artifact. claiming that the tool is the problem might be a bit short sighted. with the evolution of Internet technologies (IoT) i suspect botnet-like structures to become much more prevelent and useful for things other than coordinated attacks. just another PoV. --bill On Wed, Dec 08, 2010 at 04:46:13AM +0000, Dobbins, Roland wrote: > > On Dec 8, 2010, at 11:26 AM, Sean Donelan wrote: > > > Other than trying to hide your real address, what can be done to prevent DDOS in the first place. > > > DDoS is just a symptom. The problem is botnets. > > Preventing hosts from becoming bots in the first place and taking down existing botnets is the only way to actually *prevent* DDoS attacks. Note that prevention is distinct from *defending* oneself against DDoS attacks. > > ----------------------------------------------------------------------- > Roland Dobbins // > > Sell your computer and buy a guitar. > > > > > ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Dec 8 03:12:05 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Dec 2010 12:12:05 +0100 Subject: Over a decade of DDOS--any progress yet? Message-ID: <20101208111205.GG9434@leitl.org> I sure hope so. ----- Forwarded message from bmanning at vacation.karoshi.com ----- From shamrock at cypherpunks.to Wed Dec 8 13:55:26 2010 From: shamrock at cypherpunks.to (Lucky Green) Date: Wed, 08 Dec 2010 13:55:26 -0800 Subject: leaker-optimized versions of Tor Message-ID: On 2010-12-08 06:30, Eugen Leitl wrote: > On Wed, Dec 08, 2010 at 03:15:24PM +0100, Mitar wrote: >> Hi! >> >> On Wed, Dec 8, 2010 at 2:17 PM, Eugen Leitl wrote: >>> It should default to a much larger number of hops, >> >> Why? Is this really necessary? > > Tor as is wasn't designed to resist TLA-level adversaries (which > have no issues instrumenting each Tor node upstream with realtime > network probes, and dedicate enough resouces for traffic analysis). There are no low-latency anonymizing system designs known to science today that can protect a user's privacy against a determined, global, TLA-level adversary. Considerable and by no means unreasonable doubt exist in the community if such a design is even theoretically possible, a question for which I refrain from forming an opinion solely due to the impressive progress science has made over the millennia. The picture is less clear when it comes to high-latency systems, such as anonymous remailers. No rational doubt exists in the community that the systems so far fielded fail to protect against this treat model. But the question if we know how to design a high-latency system that defends against the proposed threat model largely remains unanswered. This is in part due to the fact that the bulk of recent research has focused primarily on low-latency systems. That said, it is my belief that if a low-latency system protecting privacy in the face of TLA-level actors were to be identified, I suspect the design will be based on PIR, not MIX. It is for this reason that I encourage high-latency anonymity researchers to focus on PIR designs. --Lucky Green *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Dec 8 05:17:08 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Dec 2010 14:17:08 +0100 Subject: leaker-optimized versions of Tor Message-ID: <20101208131708.GI9434@leitl.org> I'm thinking about high-latency (suitable for nonrealtime things like leaking and email/messaging) anonymity-enhanced versions of Tor. Delays from hours to days are tolerable here, provided the result is reliable. It would obviously have to be run as a private Tor network, though perhaps with gateways to Tor and other networks. A fraction of total nodes should be unlisted bridge relays. It would probably profit from a botnet-like approach, especially if global scrutiny increases. It should default to a much larger number of hops, introduce random delays and chaffing. Each node should come with a hidden service to Tahoe-LAFS or similar. A version should come as a convenient and containable virtual appliance, or packaged as plug computers. Comments, other suggestions? -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Dec 8 05:51:37 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Dec 2010 14:51:37 +0100 Subject: leaker-optimized versions of Tor In-Reply-To: <6CDF49B0-DE86-4125-AC50-A512F000B3CE@coderpunks.org> References: <20101208131708.GI9434@leitl.org> <6CDF49B0-DE86-4125-AC50-A512F000B3CE@coderpunks.org> Message-ID: <20101208135137.GM9434@leitl.org> On Wed, Dec 08, 2010 at 02:40:51PM +0100, Ralf Philipp Weinmann wrote: > The technology you're looking for is called 'remailer'. Used be be popular in the 90s. Mixmaster is still around, though. I've used to run a remailer a while ago, and, no, this are not the droids I'm looking for. > Taking my tongue out of the cheek: > > High-latency doesn't make sense on the TCP layer, sessions will time > out before you get anything through. SMTP is a nice-enough protocol DTN seems to be able to handle that. > on the application layer, so why not go with it? Publishing via SMTP is a good idea, actually. Access is not critical, publishing is. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From tor-admin at privacyfoundation.de Wed Dec 8 07:37:01 2010 From: tor-admin at privacyfoundation.de (Karsten N.) Date: Wed, 08 Dec 2010 16:37:01 +0100 Subject: leaker-optimized versions of Tor Message-ID: Am 08.12.2010 14:17, schrieb Eugen Leitl: > I'm thinking about high-latency (suitable for nonrealtime things > like leaking and email/messaging) anonymity-enhanced versions of Tor. The I2P project have an addon like this. See http://i2pbote.net/ It uses the anonymity network only for transports and adds a higher level protokoll for storage an delivery of mails. The I2P-Bote mails are stored 20x and encrypted in a DHT. Bevor storing the message, it can be send over 3,5... I2P nodes to hide the sender. (Tahoe-LAFS stores 7x and can restore with 3 storage nodes.) May be, it is more easy to use the Tor hidden services in a way like TorChat and add a higer lever service for asynchronous messaging? Best regards Karsten N. *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Dec 8 08:00:34 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Dec 2010 17:00:34 +0100 Subject: leaker-optimized versions of Tor Message-ID: <20101208160034.GQ9434@leitl.org> ----- Forwarded message from "Karsten N." ----- From eugen at leitl.org Wed Dec 8 08:04:40 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Dec 2010 17:04:40 +0100 Subject: leaker-optimized versions of Tor Message-ID: <20101208160440.GR9434@leitl.org> ----- Forwarded message from Gregory Maxwell ----- From nelson_mikel at yahoo.com Wed Dec 8 18:14:22 2010 From: nelson_mikel at yahoo.com (Michael Nelson) Date: Wed, 8 Dec 2010 18:14:22 -0800 (PST) Subject: Julian Assange Captured by World's Dating Police Message-ID: <393255.84805.qm@web63106.mail.re1.yahoo.com> Dating police indeed. And as for this extra accusation, apparently admitted, that the sex was "unprotected"... A condom wouldn't have been that much use anyway -- when you're f*ck*ng with Assange there's always the possibility of a leak. Mike From albina-oe at hotsheet.com Wed Dec 8 13:06:15 2010 From: albina-oe at hotsheet.com (=?koi8-r?B?5tXOy8PJySDTxcvSxdTB0tE=?=) Date: Wed, 8 Dec 2010 21:06:15 +0000 Subject: =?koi8-r?B?79POz9fZIMTPy9XNxc7Uz8/Cz9LP1ME=?= Message-ID: <000d01cb971b$c055a2e0$6400a8c0@albina-oe> ТЕМА: Секретарь, офис-менеджер, помощник руководителя Информацию можно получить по телефонам: +7 (Ч95) 79221_22 ; 7Ч_29I-98 2О Декабря 2010г. Внешний и внутренний консультант по управлению предприятием и работе с персоналом, практик-консультант по реструктуризации и построению управленческих структур, сертифицированный специалист по ИСО стандартам, постановщик задач по вопросам оценки и аттестации для программы Босс-кадровик. Программа: 1.Основные функции помощника руководителя: * Работа с документами организации -общий документооборот √ номенклатура дел √ архив предприятия * Работа с входящей и исходящей документацией * Телефонные переговоры 2.Дополнительные функции: * Планирование рабочего дня руководителя * Контроль заданий руководителя * Организация деловых совещаний, встреч * Ведение протоколов заседаний * Перевод 2.Образцы документов 4.Пример распорядка дня помощника руководителя √ элементы тайм-менеджмента 5.Нормативные документы и требования 6.Имидж помощника руководителя Cтоимоcть: 7 200 руб. По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (495) 4Ч53266 <<>> Ч45_4О95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2073 bytes Desc: not available URL: From 0-4 at elistas.net Wed Dec 8 14:33:18 2010 From: 0-4 at elistas.net (Luxury BlowoutSale) Date: Thu, 9 Dec 2010 00:33:18 +0200 Subject: Impress your peers with a Rolex, starting at $129.99. Free Shipping Message-ID: <0540029161.0193K7P4919578@wgdclhrkucdoa.osmyuaczwfmhl.info> http://www.knifeend.com http://www.knifeend.com -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 215 bytes Desc: not available URL: From akstcbarabakamnsdgs at barabaka.ru Thu Dec 9 07:15:42 2010 From: akstcbarabakamnsdgs at barabaka.ru (=?koi8-r?B?4sXMwdEg2sHS0MzB1ME=?=) Date: Thu, 9 Dec 2010 07:15:42 -0800 Subject: =?koi8-r?B?7sHMz8fP19nFINPIxc3ZINMg1d7F1M/NIDIwMTHHLg==?= Message-ID: 1314 Декабря ТЕМА: Налоговое планирование в 2011 г. с учетом изменений законодательства (НДФЛ, страховые взносы, затратные механизмы в налоговых схемах) (2 дня) +7 Московский код: 792.*21//22 <> 742/9-1*9.8 День1: СНИЖЕНИЕ СТРАХОВЫХ ВЗНОСОВ внедряем допустимые схемы снижения выплат налогов на доходы физических лиц в условиях кризиса и замены ЕСН страховыми взносами. С 2010 года единый социальный налог (ЕСН) отменен – он заменен обязательными страховыми взносами в ФОМС, ФСС и ПФР, ставка которых с 2011 года составит 34% почти для всех налогоплательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала взносов заменена отменой их уплаты, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: * Обзор изменений законодательства, связанных с заменой ЕСН обязательными страховыми взносами. Cколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2010-2011 гг. Какие схемы стали или станут невыгодными; у каких налогоплательщиков положение даже улучшается; в каком случае выплата зарплаты на спецрежимах сохраняет свою актуальность. * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц, которые рассматриваются на семинаре. * Использование специальных налоговых режимов. * Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. * Использование вспомогательных организаций: * Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. * Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. * Использование процентных займов от физлиц. Расчет эффективности. * Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. * Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, * Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!), * Способы подтверждения источников крупных расходов физлиц и когда это необходимо. Продажа имущества физическими лицами без НДФЛ через вклад в уставный капитал и ЕНВД. ----------------------------- День2: Затратные механизмы в налоговых схемах для оптимизации НДС и налога на прибыль Программа: * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги сучетом будущих изменений законодательства, судебной практики и тенденцийразвития правоприменения. "Черные", "серые" и "белые"схемы. * Кто может быть участником "затратных" схем. Незаконные варианты: "недобросовестныеналогоплательщики" и контактирующие с ними риск-структуры ("белая"- "серая" - "черная" фирмы). Примеры "серых" схемс применением затратных механизмов (как нельзя "оптимизировать"!). Как нестать "недобросовестным". * Варианты затратных механизмов: * Виды приемлимых услуг и работ: Распространенные "плохие" варианты "виртуальных"услуг и работ (информационные, консультационные, маркетинговые, рекламные,ремонт...). Когда они все же допустимы. * Минимизация рисков "затратных" схем. "Явныепризнаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличиеделовых целей, "легенда", отсутствие дублирующихся функций. Грамотноеобоснование расходов и цен. Неаффилированность, прямые и косвенные признакиаффилированности, ее негативные последствия и когда она допустима; "искусственноедробление бизнеса с целью уклонения от уплаты налогов" (подход "как кЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельностьучастников "затратных" схем. * Иностранные низконалоговые компании в "затратных"схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п.Выбор низконалоговых юрисдикций. * Ответы на вопросы. По желанию и при наличиивозможности – индивидуальное экспресс-моделирование схем налоговогопланирования для компаний-участниц семинара. По вопpоcам pегucтаpацuu обpащайтеcь по тел: (код Москвы) 4Ч5-32_66 и 44_5-Ч0-*95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8218 bytes Desc: not available URL: From eugen at leitl.org Thu Dec 9 02:23:52 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 9 Dec 2010 11:23:52 +0100 Subject: leaker-optimized versions of Tor Message-ID: <20101209102352.GI9434@leitl.org> ----- Forwarded message from Lucky Green ----- From michael.holstein at csuohio.edu Thu Dec 9 10:08:12 2010 From: michael.holstein at csuohio.edu (Michael Holstein) Date: Thu, 09 Dec 2010 13:08:12 -0500 Subject: Mastercard problems Message-ID: > The tool makes HTTP/1.0 requests, most browsers make HTTP/1.1 requests. > Realistically, if the folks from Anonymous wanted to really cause trouble, they'd be doing (legitimate looking) SSL requests against the actual payment gateways. The force-multiplier there is the computational effort it takes to negotiate a DH key exchange. For bonus points, call the voice auth service simultaneously and just sit on hold. Cheers, Michael Holstein Cleveland State University ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From tifoso.michael at gmail.com Thu Dec 9 10:19:04 2010 From: tifoso.michael at gmail.com (Michael Smith) Date: Thu, 9 Dec 2010 13:19:04 -0500 Subject: [Operational] Internet Police Message-ID: My question is what architectural recommendations will you make to your employer if/when the US Govt compels our employers to accept our role as the "front lines of this "cyberwar"? I figure once someone with a relevant degree of influence in the govts realizes that the "cyberwar" is between content/service controllers and eyeballs. With involuntary and voluntary botnets as the weapons of "the eyeballs", relying exclusively on a line of defense near to the content (services) leaves a great expanse of "battlefield". I would expect the content/service controllers to look for means to move the battleline as close to the eyeballs as possible (this community) So... if/when our employers are unable to resist the US Govt's demand that we "join in the national defense", wouldn't this community be the ones asked to guard the border? Assuming the govt won't send federal agents into each of our NOCs, won't our employers ask us "what can we do?" If inspecting and correlating every single packet/flow for attack signatures is not feasible (on scale), are there name/address registration/resolution measures that could effectively lock-down the edge? ...will we look toward China/Saudi Arabia/etc for lessons learned in there 'great firewalls' to develop a distributed version where central control pushes policy out to the edge (into the private networks that currently provide the dreaded "low barrier for entry")? Obviously the environment is created by layers 8/9, but I'm interested in the layer 1-7 solutions that the community would consider/recommend. -Michael ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From darren.greer3 at gmail.com Thu Dec 9 09:36:32 2010 From: darren.greer3 at gmail.com (Darren Greer) Date: Thu, 9 Dec 2010 13:36:32 -0400 Subject: [ExI] Wikileaks. Message-ID: Anders wrote: >No, nutters are common. It is just that most of they do not matter. (proud recipient of two crazy missives today)< Since 2001 it's been very difficult to determine who may be nutters and who may not. Someone mentioned the likelihood of people on this group being on enemy lists (can't find the post now but I know I read it.) I can say from experience it doesn't take much to make them. After the U.S. invaded Iraq I began writing some unflattering essays on U.S. foreign and domestic security policy and published some of them in a book of essays released in 2005 in Canada. It was then that I began to notice some unusual traffic on my .ca website -- U.S. government agencies, including the FBI, were regularly crawling it. Hardly anyone read or bought that book, but someone apparently noticed it. I took the site down eventually. A few years later when living in California I became friends with an infamous gay pornographer who had been called by a Tuft's University professor in a lecture on 21st century morality "the embodiment of the post-human." Because of this friendship, I again went on the U.S. intelligence radar. I am now the proud owner of an FBI file. I would not even have known this much if I hadn't been introduced in San Francisco to an ex-FBI agent who was a friend of a friend. I really don't understand the world of intelligence and enemy lists and national security anyway. The lines between what is considered subversive activity, and even thinking, and what is civically acceptable are so blurred that the whole thing has become one big, sinister mess. It was easier in the old days, when you could be black-listed for carrying a copy of Das Capital across the border but the kind of sex you preferred would only affect your chances for getting elected to public office. Darren On Thu, Dec 9, 2010 at 10:49 AM, Anders Sandberg wrote: > Eugen Leitl wrote: > >> >> It's pretty well known that TLAs do FOAF network clustering, >> and of course if persecution level is dialed up sufficiently high >> such lists act as a self denial of service, which would be self >> defeating, unless you're into tabula rasa approaches a la >> Mr. Dzhugashvili. And these typically take some setup time, >> so there's plenty of warning. >> >> > > I wonder how sensitive these algorithms are to salting? Suppose each of us > joins a randomly selected sinister group/mailinglist, or a random group in > general, what would that do to the network clustering? From what I know of > network clustering algorithms, this could mess up statistics with noise > fairly well. Of course, TLAs and network sociologists are working on robust > estimators and pattern finding. But even against robust algorithms, in some > data mining domains it is known that an aware enemy can mess up > classification (even when the algorithm is unknown). > > It is fun to run this kind of network analysis. One can use it against > one's enemies too - I am somewhat worried about "DIY illuminati software" > making it so easy to mine and attack social networks that we get a lot of > social noise. > > > So apart from nutters, which are rare, I wouldn't worry too much >> > > No, nutters are common. It is just that most of they do not matter. (proud > recipient of two crazy missives today) > > -- > Anders Sandberg, > Future of Humanity Institute > Philosophy Faculty of Oxford University > _______________________________________________ > extropy-chat mailing list > extropy-chat at lists.extropy.org > http://lists.extropy.org/mailman/listinfo.cgi/extropy-chat > -- "In the end that's all we have: our memories - electrochemical impulses stored in eight pounds of tissue the consistency of cold porridge." - Remembrance of the Daleks _______________________________________________ extropy-chat mailing list extropy-chat at lists.extropy.org http://lists.extropy.org/mailman/listinfo.cgi/extropy-chat ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jumborecommend at psymeds.ru Thu Dec 9 04:23:59 2010 From: jumborecommend at psymeds.ru (=?koi8-r?B?987FxNLRxc0gwsDE1sXU?=) Date: Thu, 9 Dec 2010 15:23:59 +0300 Subject: =?koi8-r?B?IvDSwcvUyd7F08vPxSDGyc7BztPP18/FIM3PxMXMydLP18HOycUsINDP?= =?koi8-r?B?09TSz8XOycUgz9DUyc3BzNjOz8og08jFzdkgwsnazsXTINDSz8PF09PB?= =?koi8-r?B?Lg==?= Message-ID: Тема: Как правильно разработать Бизнес план, ТЭО? – практикум 2 дня в компьютерном классе \Моск. код/ 742-9I_98 <<>> 792/2i22 Суть обучения!!! очень проста: Вас приглашают в компьютерный класс, где 2 дня с вами занимаются, супер профессионалы (тяжеловесы в финансовом планировании), все два дня Вы являетесь настоящими участниками практического семинара, получаете знания и для закрепления тем выполняете задания, выполняете их на компьютере оснащенным специализированным программным комплексом. Все пробуете Сами, и только Сами. По Окончании курса Вас оснащают лицензионной, полнорабочей специализированной версией программы, для разработки бизнес планов и инвестиционных проектов, Вы прибываете на предприятие, устанавливает продукт на свой компьютер и начинаете сразу работать (без всякой головной боли) - Вот так! Просто! мы делает профессионалов! Краткая информация о семинаре: Дата проведения занятий: I3-IЧ декабря 2010г. Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. Сочетание методов обучения с практикой - позволит достичь максимальных результатов в освоении материала. Все наглядно и просто. На первом этапе излагается теория, на втором рассматриваются закономерности, почему теория не совместима с практикой, на третьем этапе формируется задача и рассматриваются фин. методы ее решения, на четвертом участник самостоятельно решает задачу используя компьютер оснащенный специализированным ПО. Рассмотрение финансовых методов для каждого рода деятельности в отдельности, усиление восприятия информации с помощью специализированного расширенного методического материала. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: * Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. * Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). * Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. * Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него участник семинара может эффективно разрабатывать свои сценарии финансовых проектов. По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 Московский код: 792/2l.2/2 \\\/// 445ЧО95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4461 bytes Desc: not available URL: From eugen at leitl.org Thu Dec 9 07:08:03 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 9 Dec 2010 16:08:03 +0100 Subject: CRITICAL FOREIGN DEPENDENCIES (CRITICAL INFRASTRUCTURE AND KEY RESOURCES LOCATED ABROAD) Message-ID: <20101209150803.GW9434@leitl.org> http://213.251.145.96/cable/2009/02/09STATE15113.html#par15 INFO LOG-00 MFA-00 EEB-00 AF-00 AGRE-00 AIT-00 AMAD-00 AOP-00 AEX-00 AS-00 A-00 ACQ-00 CIAE-00 CIP-00 COME-00 CCOE-00 CPR-00 INL-00 DNI-00 DIM-00 DODE-00 DOEE-00 WHA-00 PERC-00 DS-00 EAP-00 DHSE-00 EUR-00 FBIE-00 VCI-00 FSI-00 OBO-00 TEDE-00 INR-00 IO-00 CAC-00 MED-07 MFLO-00 MMP-00 MOFM-00 MOF-00 M-00 CDC-00 VCIE-00 NEA-00 DCP-00 NRC-00 NSAE-00 ISN-00 OES-00 OIG-00 NIMA-00 PM-00 P-00 ISNE-00 DOHS-00 FMPC-00 IRM-00 SSO-00 SS-00 MR-00 TRSE-00 CBP-00 EPAE-00 SCRS-00 PMB-00 DSCC-00 PRM-00 DRL-00 G-00 ALM-00 SCA-00 SAS-00 FA-00 PMA-00 SWCI-00 /007R P 182318Z FEB 09 FM SECSTATE WASHDC TO PAGE 02 STATE 015113 182333Z ALL DIPLOMATIC POSTS COLLECTIVE PRIORITY AMEMBASSY TRIPOLI PRIORITY S E C R E T STATE 015113 NOFORN, NOT FOR INTERNET DISTRIBUTION E.O. 12958: DECL: 1/29/2019 TAG PTER, PGOV, ASEC, EFIN, ENRG, KCIP SUBJECT: REQUEST FOR INFORMATION:CRITICAL FOREIGN DEPENDENCIES (CRITICAL INFRASTRUCTURE AND KEY RESOURCES LOCATED ABROAD) REF: STATE 6461 PLEASE PASS TO RSO, POLOFF, ECON, and MANAGEMENT (GSO and IT). Classified by S/CT DAS, Susan F. Burk, Reason: 1/4 (B), (D), (E), and (G) 61. (U//FOUO) This is an action request; see Para. 13. 62. (U//FOUO) Under the direction of the Department of Homeland Security (DHS), the National Infrastructure Protection Plan (NIPP) was written to provide the unifying structure for the integration of critical infrastructure and key resources (CI/KR) protection into a single national program. The overarching goal of the NIPP is to build a safer, more secure, and more resilient America by enhancing protection of the nation's CI/KR to prevent, deter, neutralize or mitigate the effects of deliberate efforts by terrorists to destroy, incapacitate or exploit them; and to strengthen national preparedness, timely response, and rapid recovery in the event of an attack, natural disaster or other emergency. 63. (U//FOUO) In addition to a list of critical domestic CI/KR, the NIPP requires compilation and annual update of a comprehensive inventory of CI/KR that are located outside U.S. borders and whose loss could critically impact the public health, economic security, and/or national and homeland security of the United States. DHS in collaboration with State developed the Critical Foreign Dependencies Initiative (CFDI)to identify these critical U.S. foreign dependencies -- foreign CI/KR that may affect systems within the U.S. directly or indirectly. State is coordinating with DHS to develop the 2009 inventory, and the action request in Para. 13 represents the initial step in this process. 64. (U//FOUO) The NIPP does not define CI/KR. Homeland Security Presidential Directive 7 (HSPD 7) references definitions in two separate statutes. In the USA Patriot Act of 2001 (42 U.S.C. 5195(e)) "critical infrastructure" is defined as systems and assets, whether physical or virtual, so vital to the United States the incapacitation or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters. In the Homeland Security Act of 2002 (6 U.S.C. 101(9)) "key resources" are defined as publicly or privately controlled resources essential to the minimal operations of the economy and government. 65. (U//FOUO) The NIPP identifies 18 CI/KR sectors: agriculture and food; defense industrial base; energy; healthcare and public health; national monuments and icons; banking and finance; drinking water and water treatment systems; chemical; commercial facilities; dams; emergency services; commercial nuclear reactors, materials, and waste; information technology; communications; postal and shipping; transportation and systems; government facilities; and critical manufacturing. Obviously some of these sectors are more likely to have international components than other sectors. 66. (U//FOUO) Department is surveying posts for their input on critical infrastructure and key resources within their host country which, if destroyed, disrupted or exploited, would likely have an immediate and deleterious effect on the United States. We expect posts, after consultation among all sections and agencies, will in many instances immediately recognize whether such CI/KR exist in their host country. Posts are not/not being asked to consult with host governments with respect to this request. 67. (U//FOUO) Building upon the initial survey completed in 2008, Department requests each post reassess and update information about infrastructure and resources in each host country whose loss could immediately affect the public health, economic security, and/or national and homeland security of the United States. This reassessment may include suggestions from posts for removing, modifying, or adding CI/KR to the list developed in 2008 (see the list of CI/KR identified in 2008 in Para. 15 below). 68. (U//FOUO) The following three categories should be considered when determining whether critical foreign dependencies exist in the host country: 1) direct physical linkages (e.g., pipelines, undersea telecommunications cables, and assets located in close enough proximity to the U.S. border their destruction could cause cross-border consequences, such as damage to dams and chemical facilities); 2) sole or predominantly foreign/host-country sourced goods and services (e.g., minerals or chemicals critical to U.S. industry, a critical finished product manufactured in one or only a small number of countries, or a telecom hub whose destruction might seriously disrupt global communications); and 3) critical supply chain nodes (e.g., the Strait of Hormuz and Panama Canal, as well as any ports or shipping lanes in the host-country critical to the functioning of the global supply chain). 69. (U//FOUO) Although they are important issues, Department is not/not seeking information at this time on second-order effects (e.g., public morale and confidence, and interdependency effects that might cascade from a disruption). 610. (U//FOUO) Posts do not need to report government facilities overseas managed by State or war fighting facilities managed by other departments or agencies. 611. (U//FOUO) The following general information should be addressed when nominating elements for inclusion, removal, or modification: -- (U//FOUO) Name and physical location of the asset, system, or supply chain node. -- (U//FOUO) Post's rationale for including, modifying, or removing an asset, system, or supply chain node. -- (U//FOUO) Any information Post has regarding conditions in country causing Post to believe the CI/KR is an active target or especially vulnerable due to natural circumstances. -- (U//FOUO) Any information Post has regarding CIP activities in country and who/what agency is responsible for those activities. 612. (U//FOUO) Questions can be directed to Sharri R. Clark in S/CT: ClarkSR at state.sgov.gov; ClarkSR at state.gov; 202-647-1514. Alternatively, questions can be directed to S. Gail Robertson in S/CT: RobertsonSG2 at state.sgov.gov; RobertsonSG at state.gov, 202-647-3769. 613. (U//FOUO) ACTION REQUEST: Posts are requested to report by March 20, 2009 on CI/KR in their host country meeting the criteria outlined above and a brief explanation of why posts believes the asset meets the criteria. Due to the potential sensitivity of assets identified, posts are asked to consider the necessity of classifying their responses appropriately. Please note the list in its entirety is classified S/NF. If post determines there are no such CI/KR in its host country, a negative report is requested. Please send replies to the attention of Sharri R. Clark in S/CT and use the subject line "CI/KR Response for S/CT". 614. (U//FOUO) Posts' assistance with providing input to the first list created in 2008 was invaluable, and Department appreciates Posts' continuing cooperation. 615. (S//NF) Following is the 2008 Critical Foreign Dependencies Initiative (CFDI) list (CI/KR organized by region): [BEGIN TEXT OF LIST] AFRICA Congo (Kinshasa): Cobalt (Mine and Plant) Gabon: Manganese - Battery grade, natural; battery grade, synthetic; chemical grade; ferro; metallurgical grade Guinea: Bauxite (Mine) South Africa: BAE Land System OMC, Benoni, South Africa Brown David Gear Industries LTD, Benoni, South Africa Bushveld Complex (chromite mine) Ferrochromium Manganese - Battery grade, natural; battery grade, synthetic; chemical grade; ferro; metallurgical grade Palladium Mine and Plant Platinum Mines Rhodium EAST ASIA AND THE PACIFIC Australia: Southern Cross undersea cable landing, Brookvale, Australia Southern Cross undersea cable landing, Sydney, Australia Manganese - Battery grade, natural; battery grade, synthetic; chemical grade; ferro; metallurgical grade Nickel Mines Maybe Faulding Mulgrave Victoria, Australia: Manufacturing facility for Midazolam injection. Mayne Pharma (fill/finish), Melbourne, Australia: Sole suppliers of Crotalid Polyvalent Antivenin (CroFab). China: C2C Cable Network undersea cable landing, Chom Hom Kok, Hong Kong C2C Cable Network undersea cable landing Shanghai, China China-US undersea cable landing, Chongming, China China-US undersea cable landing Shantou, China EAC undersea cable landing Tseung Kwan O, Hong Kong FLAG/REACH North Asia Loop undersea cable landing Tong Fuk, Hong Kong Hydroelectric Dam Turbines and Generators Fluorspar (Mine) Germanium Mine Graphite Mine Rare Earth Minerals/Elements Tin Mine and Plant Tungsten - Mine and Plant Polypropylene Filter Material for N-95 Masks Shanghai Port Guangzhou Port Hong Kong Port Ningbo Port Tianjin Port Fiji: Southern Cross undersea cable landing, Suva, Fiji Indonesia: Tin Mine and Plant Straits of Malacca Japan: C2C Cable Network undersea cable landing, Chikura, Japan C2C Cable Network undersea cable landing, Shima, Japan China-US undersea cable, Okinawa, Japan EAC undersea cable landing Ajigaura, Japan EAC undersea cable landing Shima, Japan FLAG/REACH North Asia Loop undersea cable landing Wada, Japan FLAG/REACH North Asia Loop undersea cable landing Wada, Japan Japan-US undersea cable landing, Maruyama, Japan Japan-US undersea cable landing Kitaibaraki, Japan KJCN undersea cable landing Fukuoka, Japan KJCN undersea cable landing Kita-Kyushu, Japan Pacific Crossing-1 (PC-1) undersea cable landing Ajigaura, Japan Pacific Crossing-1 (PC-1) undersea cable landing Shima, Japan Tyco Transpacific undersea cable landing, Toyohashi, Japan Tyco Transpacific undersea cable landing Emi, Japan Hitachi, Hydroelectric Dam Turbines and Generators Port of Chiba Port of Kobe Port of Nagoya Port of Yokohama Iodine Mine Metal Fabrication Machines Titanium Metal (Processed) Biken, Kanonji City, Japan Hitachi Electrical Power Generators and Components Large AC Generators above 40 MVA Malaysia: Straits of Malacca New Zealand: Southern Cross undersea cable landing, Whenuapai, New Zealand Southern Cross undersea cable landing, Takapuna, New Zealand Philippines: C2C Cable Network undersea cable landing, Batangas, Philippines EAC undersea cable landing Cavite, Philippines Republic of Korea: C2C Cable Network undersea cable landing, Pusan, Republic of Korea. EAC undersea cable landing Shindu-Ri, Republic of Korea FLAG/REACH North Asia Loop undersea cable landing Pusan, Republic of Korea KJCN undersea cable landing Pusan, Republic of Korea Hitachi Large Electric Power Transformers 230 - 500 kV Busan Port Singapore: C2C Cable Network undersea cable landing, Changi, Singapore EAC undersea cable landing Changi North, Singapore Port of Singapore Straits of Malacca Taiwan: C2C Cable Network undersea cable landing, Fangshan, Taiwan C2C Cable Network undersea cable landing, Tanshui, Taiwan China-US undersea cable landing Fangshan, Taiwan EAC undersea cable landing Pa Li, Taiwan FLAG/REACH North Asia Loop undersea cable landing Toucheng, Taiwan Kaohsiung Port EUROPE AND EURASIA Europe (Unspecified): Metal Fabrication Machines: Small number of Turkish companies (Durma, Baykal, Ermaksan) Austria: Baxter AG, Vienna, Austria: Immune Globulin Intravenous (IGIV) Octapharma Pharmazeutika, Vienna, Austria: Immune Globulin Intravenous (IGIV) Azerbaijan: Sangachal Terminal Baku-Tbilisi-Ceyhan Pipeline Belarus: Druzhba Oil Pipeline Belgium: Germanium Mine Baxter SA, Lessines, Belgium: Immune Globulin Intravenous (IGIV) Glaxo Smith Kline, Rixensart, Belgium: Acellular Pertussis Vaccine Component GlaxoSmithKline Biologicals SA, Wavre, Belgium: Acellular Pertussis Vaccine Component Port of Antwerp Denmark: TAT-14 undersea cable landing, Blaabjerg, Denmark Bavarian Nordic (BN), Hejreskovvej, Kvistgard, Denmark: Smallpox Vaccine Novo Nordisk Pharmaceuticals, Inc. Bagsvaerd, Denmark: Numerous formulations of insulin Novo Nordisk Insulin Manufacturer: Global insulin supplies Statens Serum Institut, Copenhagen, Denmark: DTaP (including D and T components) pediatric version France: APOLLO undersea cable, Lannion, France FA-1 undersea cable, Plerin, France TAT-14 undersea cable landing St. Valery, France Sanofi-Aventis Insulin Manufacturer: Global insulin supplies Foot and Mouth Disease Vaccine finishing Alstrom, Hydroelectric Dam Turbines and Generators Alstrom Electrical Power Generators and Components EMD Pharms Semoy, France: Cyanokit Injection GlaxoSmithKline, Inc. Evreux, France: Influenza neurominidase inhibitor RELENZA (Zanamivir) Diagast, Cedex, France: Olympus (impacts blood typing ability) Genzyme Polyclonals SAS (bulk), Lyon, France: Thymoglobulin Sanofi Pasteur SA, Lyon, France: Rabies virus vaccine Georgia: Baku-Tbilisi-Ceyhan Pipeline Germany: TAT-14 undersea cable landing, Nodren, Germany. Atlantic Crossing-1 (AC-1) undersea cable landing Sylt, Germany BASF Ludwigshafen: World's largest integrated chemical complex Siemens Erlangen: Essentially irreplaceable production of key chemicals Siemens, GE, Hydroelectric Dam Turbines and Generators Draeger Safety AG & Co., Luebeck, Germany: Critical to gas detection capability Junghans Fienwerktechnik Schramberg, Germany: Critical to the production of mortars TDW-Gasellschaft Wirksysteme, Schroebenhausen, Germany: Critical to the production of the Patriot Advanced Capability Lethality Enhancement Assembly Siemens, Large Electric Power Transformers 230 - 500 kV Siemens, GE Electrical Power Generators and Components Druzhba Oil Pipeline Sanofi Aventis Frankfurt am Main, Germany: Lantus Injection (insulin) Heyl Chemish-pharmazeutische Fabrik GmbH: Radiogardase (Prussian blue) Hameln Pharmaceuticals, Hameln, Germany: Pentetate Calcium Trisodium (Ca DTPA) and Pentetate Zinc Trisodium (Zn DTPA) for contamination with plutonium, americium, and curium IDT Biologika GmbH, Dessau Rossiau, Germany: BN Small Pox Vaccine. Biotest AG, Dreiech, Germany: Supplier for TANGO (impacts automated blood typing ability) CSL Behring GmbH, Marburg, Germany: Antihemophilic factor/von Willebrand factor Novartis Vaccines and Diagnostics GmbH, Marburg, Germany: Rabies virus vaccine Vetter Pharma Fertigung GmbH & Co KG, Ravensburg, Germany (filling): Rho(D) IGIV Port of Hamburg Ireland: Hibernia Atlantic undersea cable landing, Dublin Ireland Genzyme Ireland Ltd. (filling), Waterford, Ireland: Thymoglobulin Italy: Glaxo Smith Kline SpA (fill/finish), Parma, Italy: Digibind (used to treat snake bites) Trans-Med gas pipeline Netherlands: Atlantic Crossing-1 (AC-1) undersea cable landing Beverwijk, Netherlands TAT-14 undersea cable landing, Katwijk, Netherlands Rotterdam Port Norway: Cobalt Nickel Mine Poland: Druzhba Oil Pipeline Russia: Novorossiysk Export Terminal Primorsk Export Terminal. Nadym Gas Pipeline Junction: The most critical gas facility in the world Uranium Nickel Mine: Used in certain types of stainless steel and superalloys Palladium Mine and Plant Rhodium Spain: Strait of Gibraltar Instituto Grifols, SA, Barcelona, Spain: Immune Globulin Intravenous (IGIV) Maghreb-Europe (GME) gas pipeline, Algeria Sweden: Recip AB Sweden: Thyrosafe (potassium iodine) Switzerland: Hoffman-LaRoche, Inc. Basel, Switzerland: Tamiflu (ted Kingdom: Critical to the F-35 Joint Strike Fighter BAE Systems Operations Ltd., Southway, Plymouth Devon, United Kingdom: Critical to extended range guided munitions BAE Systems RO Defense, Chorley, United Kingdom: Critical to the Joint Standoff Weapon (JSOW) AGM-154C (Unitary Variant) MacTaggart Scott, Loanhead, Edinburgh, Lothian, Scotland, United Kingdom: Critical to the Ship Submersible Nuclear (SSN) NEAR/MIDDLE EAST Djibouti: Bab al-Mendeb: Shipping lane is a critical supply chain node Egypt: 'Ayn Sukhnah-SuMEd Receiving Import Terminal 'Sidi Kurayr-SuMed Offloading Export Terminal Suez Canal Iran: Strait of Hormuz Khark (Kharg) Island Sea Island Export Terminal Khark Island T-Jetty Iraq: Al-Basrah Oil Terminal Israel: Rafael Ordnance Systems Division, Haifa, Israel: Critical to Sensor Fused Weapons (SFW), Wind Corrected Munitions Dispensers (WCMD), Tail Kits, and batteries Kuwait: Mina' al Ahmadi Export Terminal Morocco: Strait of Gibraltar Maghreb-Europe (GME) gas pipeline, Morocco Oman: Strait of Hormuz Qatar: Ras Laffan Industrial Center: By 2012 Qatar will be the largest source of imported LNG to U.S. Saudi Arabia: Abqaiq Processing Center: Largest crude oil processing and stabilization plant in the world Al Ju'aymah Export Terminal: Part of the Ras Tanura complex As Saffaniyah Processing Center Qatif Pipeline Junction Ras at Tanaqib Processing Center Ras Tanura Export Terminal Shaybah Central Gas-oil Separation Plant Tunisia: Trans-Med Gas Pipeline United Arab Emirates (UAE): Das Island Export Terminal Jabal Zannah Export Terminal Strait of Hormuz Yemen: Bab al-Mendeb: Shipping lane is a critical supply chain node SOUTH AND CENTRAL ASIA Kazakhstan: Ferrochromium Khromtau Complex, Kempersai, (Chromite Mine) India: Orissa (chromite mines) and Karnataka (chromite mines) Generamedix Gujurat, India: Chemotherapy agents, including florouracil and methotrexate WESTERN HEMISPHERE Argentina: Foot and Mouth Disease Vaccine finishing Bermuda: GlobeNet (formerly Bermuda US-1 (BUS-1) undersea cable landing Devonshire, Bermuda Brazil: Americas-II undersea cable landing Fortaleza, Brazil GlobeNet undersea cable landing Fortaleza, Brazil GlobeNet undersea cable landing Rio de Janeiro, Brazil Iron Ore from Rio Tinto Mine Manganese - Battery grade, natural; battery grade, synthetic; chemical grade; ferro; metallurgical grade Niobium (Columbium), Araxa, Minas Gerais State (mine) Ouvidor and Catalao I, Goias State: Niobium Chile: Iodine Mine Canada: Hibernia Atlantic undersea cable landing Halifax , Nova Scotia, Canada James Bay Power Project, Quebec: monumental hydroelectric power development Mica Dam, British Columbia: Failure would impact the Columbia River Basin. Hydro Quebec, Quebec: Critical irreplaceable source of power to portions of Northeast U. S. Robert Moses/Robert H. Saunders Power, Ontario: Part of the St. Lawrence Power Project, between Barnhart Island, New York, and Cornwall, Ontario Seven Mile Dam, British Columbia: Concrete gravity dam between two other hydropower dams along the Pend d'Oreille River Pickering Nuclear Power Plant, Ontario, Canada Chalk River Nuclear Facility, Ontario: Largest supplier of medical radioisotopes in the world Hydrofluoric Acid Production Facility, Allied Signal, Amherstburg, Ontario Enbridge Pipeline Alliance Pipeline: Natural gas transmission from Canada Maritime and Northeast Pipeline: Natural gas transmission from Canada Transcanada Gas: Natural gas transmission from Canada Alexandria Bay POE, Ontario: Northern border crossing Ambassador Bridge POE, Ontario: Northern border crossing Blaine POE, British Columbia: Northern border crossing Blaine Washington Rail Crossing, British Columbia Blue Water Bridge POE, Ontario: Northern border crossing Champlain POE, Quebec: Northern border crossing CPR Tunnel Rail Crossing, Ontario (Michigan Central Rail Crossing) International Bridge Rail Crossing, Ontario International Railway Bridge Rail Crossing Lewiston-Queenstown POE, Ontario: Northern border crossing Peace Bridge POE, Ontario: Northern border crossing PmithKile Biologicals, North America, Quebec, Canada: Pre-pandemic influenza vaccines French Guiana: Americas-II undersea cable landing Cayenne, French Guiana Martinique: Americas-II undersea cable landing Le Lamentin, Martinique Mexico: FLAG/REACH North Asia Loop undersea cable landing Tijuana, Mexico Pan-American Crossing (PAC) undersea cable landing Mazatlan, Mexico Amistad International Dam: On the Rio Grande near Del Rio, Texas and Ciudad Acuna, Coahuila, Mexico Anzalduas Dam: Diversion dam south of Mission, Texas, operated jointly by the U.S. and Mexico for flood control Falcon International Dam: Upstream of Roma, Texas and Miguel Aleman, Tamaulipas, Mexico Retamal Dam: Diversion dam south of Weslaco, Texas, operated jointly by the U.S. and Mexico for flood control GE Hydroelectric Dam Turbines and Generators: Main source for a large portion of larger components Bridge of the Americas: Southern border crossing Brownsville POE: Southern border crossing Calexico East POE: Southern border crossing Columbia Solidarity Bridge: Southern border crossing Kansas City Southern de Mexico (KCSM) Rail Line, (Mexico) Nogales POE: Southern border crossing Laredo Rail Crossing Eagle Pass Rail Crossing Otay Mesa Crossing: Southern border crossing Pharr International Bridge: Southern border crossing World Trade Bridge: Southern border crossing Ysleta Zaragosa Bridge: Southern border crossing Hydrofluoric Acid Production Facility Graphite Mine GE Electrical Power Generators and Components General Electric, Large Electric Power Transformers 230 - 500 kV Netherlands Antilles: Americas-II undersea cable landing Willemstad, Netherlands Antilles. Panama: FLAG/REACH North Asia Loop undersea cable landing Fort Amador, Panama Panama Canal Peru: Tin Mine and Plant Trinidad and Tobago: Americas-II undersea cable landing Port of Spain Atlantic LNG: Provides 70% of U.S. natural gas import needs Venezuela: Americas-II undersea cable landing Camuri, Venezuela GlobeNet undersea cable landing, Punta Gorda, Venezuela GlobeNet undersea cable landing Catia La Mar, Venezuela GlobeNet undersea cable landing Manonga, Venezuela [END TEXT OF LIST] 616. (U//FOUO) Minimize considered. CLINTON From lisandrabeatricewn at amd.com Thu Dec 9 15:36:28 2010 From: lisandrabeatricewn at amd.com (Lisandra Beatrice) Date: Thu, 09 Dec 2010 16:36:28 -0700 Subject: ViagraDiscounts, CheapCialis & Much More. Discreet Packaging and Fast Shipping 271 In-Reply-To: <270b01cb92c6$71208a68$2430b5c8@d71mh23> Message-ID: <4D0167FC.E5704F21@amd.com> OrderCializViagra Online & Save 75-90% 0nline Pharmacy NoPrescription required Buy Canadian Drugs at Wholesale Prices and Save 75-90% FDA-Approved drugs + Superb Quality Drugs only! Accept all major credit cards Order Today! From $1.38 http://vbgme.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 522 bytes Desc: not available URL: From nelson_mikel at yahoo.com Thu Dec 9 17:39:13 2010 From: nelson_mikel at yahoo.com (Michael Nelson) Date: Thu, 9 Dec 2010 17:39:13 -0800 (PST) Subject: [ExI] Wikileaks. In-Reply-To: <20101209215451.GM9434@leitl.org> Message-ID: <174300.7868.qm@web63104.mail.re1.yahoo.com> --- On Thu, 12/9/10, Eugen Leitl wrote: --- Darren Greer wrote: > It was easier in the old days, when you could be black-listed for > carrying a copy of Das Capital across the border but the kind of > sex you preferred would only affect your chances for getting > elected to public office. Er, not quite. Back in the McCarthy era they were purging homosexuals in government office as well as communists. It was said that at one point people were so self-conscious that when someone bought a banana in the State Department cafeteria they'd eat it like corn on the cob. Mike From hvidricoskarhvidric at planeta-tvorchestvo.ru Thu Dec 9 10:28:04 2010 From: hvidricoskarhvidric at planeta-tvorchestvo.ru (=?koi8-r?B?987FxNLRxc0g0MzBzg==?=) Date: Thu, 9 Dec 2010 19:28:04 +0100 Subject: =?koi8-r?B?5snOwc7Tz9fPxSDNz8TFzMnSz9fBzsnF?= Message-ID: <28DABC8C4FB44AE8B86DA37C94D70940@pcf82b0b30c2cc> Тема: Разработка финансовой документации (бизнес – плана, ТЭО) практическая реализация. (код Москвы) 445_З968 <<>> 792*2i/22 Суть обучения!!! очень проста: Вас приглашают в компьютерный класс, где 2 дня с вами занимаются, супер профессионалы (тяжеловесы в финансовом планировании), все два дня Вы являетесь настоящими участниками практического семинара, получаете знания и для закрепления тем выполняете задания, выполняете их на компьютере оснащенным специализированным программным комплексом. Все пробуете Сами, и только Сами. По Окончании курса Вас оснащают лицензионной, полнорабочей специализированной версией программы, для разработки бизнес планов и инвестиционных проектов, Вы прибываете на предприятие, устанавливает продукт на свой компьютер и начинаете сразу работать (без всякой головной боли) - Вот так! Просто! мы делает профессионалов! Информация об учебном курсе: Дата проведения занятий: I3-IЧ декабря 2010г. Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. Сочетание методов обучения с практикой - позволит достичь максимальных результатов в освоении материала. Все наглядно и просто. На первом этапе излагается теория, на втором рассматриваются закономерности, почему теория не совместима с практикой, на третьем этапе формируется задача и рассматриваются фин. методы ее решения, на четвертом участник самостоятельно решает задачу используя компьютер оснащенный специализированным ПО. Рассмотрение финансовых методов для каждого рода деятельности в отдельности, усиление восприятия информации с помощью специализированного расширенного методического материала. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: * Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. * Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). * Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. * Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него участник семинара может эффективно разрабатывать свои сценарии финансовых проектов. По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (код Москвы)* 792_2i22 <> Ч45_32-66 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4385 bytes Desc: not available URL: From 0-l at telefonicaonline.com Thu Dec 9 07:08:26 2010 From: 0-l at telefonicaonline.com (Purchase R_x) Date: Thu, 9 Dec 2010 20:38:26 +0530 Subject: Non-Prescription Medication Message-ID: <1346833615.GRA52GTV070867@qtaiv.knqwcdvc.ru> We offer MANY products that will do wonders for your Sex-Life! We Care about your Health http://www.jailcoach.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 292 bytes Desc: not available URL: From eugen at leitl.org Thu Dec 9 12:43:14 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 9 Dec 2010 21:43:14 +0100 Subject: Mastercard problems Message-ID: <20101209204314.GA9434@leitl.org> ----- Forwarded message from Michael Holstein ----- From eugen at leitl.org Thu Dec 9 13:35:08 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 9 Dec 2010 22:35:08 +0100 Subject: [Operational] Internet Police Message-ID: <20101209213508.GB9434@leitl.org> ----- Forwarded message from Michael Smith ----- From tien_hassie_mm at swpc.siemens.com Thu Dec 9 21:46:04 2010 From: tien_hassie_mm at swpc.siemens.com (Tien Hassie) Date: Thu, 09 Dec 2010 22:46:04 -0700 Subject: Cheap Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570, NoPrescription Required 02e In-Reply-To: Message-ID: <4D01BE9C.E329CE1D@swpc.siemens.com> Hydrocodone/Vicodin ES/Brand Watson Vicodin ES - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 7.5/750 mg: 30 - $195 / 120 $570 Brand Watson - 10/325 mg: 30 - $199 / 120 - $588 FREE Express FedEx (3-5 days Delivery) for over $200 order NoPrescription Required Major Credit Cards + E-CHECK ORDER HERE ... LowestPrices Online! http://xcjkhsjs.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 783 bytes Desc: not available URL: From eugen at leitl.org Thu Dec 9 13:54:51 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 9 Dec 2010 22:54:51 +0100 Subject: [ExI] Wikileaks. Message-ID: <20101209215451.GM9434@leitl.org> ----- Forwarded message from Darren Greer ----- From albina-er at hotsheet.com Thu Dec 9 19:43:30 2010 From: albina-er at hotsheet.com (=?koi8-r?B?68/N0NjA1MXSztnKIMvMwdPT?=) Date: Fri, 10 Dec 2010 00:43:30 -0300 Subject: =?koi8-r?B?8M/T1NLPxc7JxSDGyc7BztPP18/KIM3PxMXMySDQ0sXE0NLJ0dTJ0Q==?= Message-ID: <7E69E80295CE4A33A4FEAA594B7BE228@Marcio> Дата проведения занятий: 1314 Декабря +7 (Ч95) 7_Ч2.9I.98 ; Ч4_539_68 Как правильно разработать Бизнес план, ТЭО? – практикум 2 дня в компьютерном классе Суть Курса!!! очень проста:Вы как участник приглашаетесь в компьютерный класс, где 2 дня с вами занимаются, высококвалифицированные практики, тяжеловесы в финансовом планировании, профессионалы своего дела. На протяжении всех дней Участник является «настоящим участником практического семинара», все пробует Сам, получает задания решает их учится искать допущенные ошибки, использует методы финансового анализа. Весь процесс происходит на компьютере который оснащен специализированным программным комплексом. По Окончании учебного курса все Участников оснащают лицензионным, полнорабочим ПО, для разработки инвест-проектов бизнес-планов ТЭО. По прибытии на предприятие устанавливается комплекс на свой компьютер и сразу начинается работа без дополнительных затрат по времени. - Вот так! Просто! мы готовим профессионалов! Информация об учебном курсе: Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. В основе подготовки участников заложены профессиональные методы фин. планирования. Обучение будет осуществляться на пр. комплексе с использованием технологий (аналитического ядра) "L J 3000" Использование пр. комплекса принципиально меняет подходы к обучению, каждый участник становится объективным именно "участником", а не второстепенным слушателем. Дополнительные методические материалы существенно расширят знания специалиста и новичка. Методы практического обучения позволят получить профессиональные навыки в разработке экономической модели предприятия, осознавать процессы формирования проектов. Суть очень простая! все собирается своими руками. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). Материал методический: печатный для самостоятельной разработки бизнес планов, ТЭО, инвестиционных проектов. На CD диске электронную версию метод. материала для разработки финансовых проектов. Вся информация по тел: Московский код; 7Ч2_9/l/9/8 79221_22 Тема: Бизнес план, ТЭО – практические методы разработки 8 (Ч95) ЧЧ_53-96_8 \\\/// 742.9_|-9*8 Суть обучения!!! очень проста: Вас приглашают в компьютерный класс, где 2 дня с вами занимаются, супер профессионалы (тяжеловесы в финансовом планировании), все два дня Вы являетесь настоящими участниками практического семинара, получаете знания и для закрепления тем выполняете задания, выполняете их на компьютере оснащенным специализированным программным комплексом. Все пробуете Сами, и только Сами. По Окончании курса Вас оснащают лицензионной, полнорабочей специализированной версией программы, для разработки бизнес планов и инвестиционных проектов, Вы прибываете на предприятие, устанавливает продукт на свой компьютер и начинаете сразу работать (без всякой головной боли) - Вот так! Просто! мы делает профессионалов! Краткая информация о семинаре: Дата учебного курса: С Тринадцатого по четырнадцатое декабря Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. Сочетание методов обучения с практикой - позволит достичь максимальных результатов в освоении материала. Все наглядно и просто. На первом этапе излагается теория, на втором рассматриваются закономерности, почему теория не совместима с практикой, на третьем этапе формируется задача и рассматриваются фин. методы ее решения, на четвертом участник самостоятельно решает задачу используя компьютер оснащенный специализированным ПО. Рассмотрение финансовых методов для каждого рода деятельности в отдельности, усиление восприятия информации с помощью специализированного расширенного методического материала. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: * Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. * Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). * Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. * Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него участник семинара может эффективно разрабатывать свои сценарии финансовых проектов. За более подробной информацuей обpащайтеcь по тел: +7 (код Москвы)*74-29|/98 : 4Ч-539_68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4592 bytes Desc: not available URL: From catherinate at tasmail.com.jfet.org Fri Dec 10 09:20:55 2010 From: catherinate at tasmail.com.jfet.org (Tisha Catherina) Date: Fri, 10 Dec 2010 10:20:55 -0700 Subject: 80% Discount WatchStore. Save on Watchesfor Men & Women at Great Prices. Brand Name Styles vfav In-Reply-To: Message-ID: <4D026177.8FBDB44B@tasmail.com> Replica watches On Sale - Best Replica Watches Online Shop We offer a wide selection of cheap replica watches including Rolex, Gucci, Chanel and more. Nobody will even know you are wearing a fake ... Buy Best Quality Replica on our site http://waitoffer.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 588 bytes Desc: not available URL: From mluis_hp at garnerengr.com Fri Dec 10 09:25:25 2010 From: mluis_hp at garnerengr.com (Marilynn Luis) Date: Fri, 10 Dec 2010 10:25:25 -0700 Subject: Ambien$2.70, Vicodin ES $4.40, Hydrocodone $4.40, Prescription is NOT Required, Safe, Free Shipping in the USA and Canada 4f In-Reply-To: Message-ID: <4D026285.5E8CD27B@garnerengr.com> "If You Are In Pain You Will Qualify" Hydrocodone $4.40 Vicodin ES $4.40 Xanax$1.90 ValiumROCHE $2.15 Ativan(� Wyeth) $2.15 Ambien$2.70 Prescription is NOT Required, Safe, Free Shipping in the USA and Canada All Orders Guaranteeed to be Approved or Your Money Back http://discounts-forrx.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 701 bytes Desc: not available URL: From eugen at leitl.org Fri Dec 10 03:20:47 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 10 Dec 2010 12:20:47 +0100 Subject: Gov't crackdown spurs initiatives to route around DNS Message-ID: <20101210112047.GP9434@leitl.org> http://www.itworld.com/print/129947 Gov't crackdown spurs initiatives to route around DNS by Keith Dawson December 7, 2010 b Over the Thanksgiving holiday weekend, US Immigration and Customs Enforcement (ICE), the principal investigative arm of the Department of Homeland Security (DHS), led an alphabet soup of government agencies in seizing the domain names of 82 Web sites (PDF) that ICE said were "engaged in the illegal sale and distribution of counterfeit goods and copyrighted works" (See: Operation In Our Sites v. 2.0). The seizures were accomplished by getting the VeriSign registry, owner of the .com and .net top-level domains, to change the authoritative domain-name servers for the seized domains to servers controlled by DHS. Regardless of the supposed criminal intent of the affected systems, the seizure without notice of these domain names by US authorities sent shock-waves around the Internet world. It got people's attention in a much stronger way than version 1 of this enforcement operation had b the first iteration late last June seized the names of nine sites selling pirated first-run movies. Many people woke up to the reality of how vulnerable the DNS is to government meddling. (More recently, the uproar caused by the WikiLeaks publication of US diplomatic cables b and subsequent attempts to censor the site and/or to hound it off the Internet b have resulted in what developer Dave Winer calls "a human DNS" implemented "in a weird sneaker-net sort of way," via Twitter and ad hoc bulletin-board sites.) Within days of the ICE/DHS seizures, at least three separate initiatives to work around the DNS had been announced, and several existing alternatives were highlighted in the ensuing discussion. Let's take a look at some of these proposals b two to route around and one to supplant the DNS b and some of the obstacles they face. 1. 4LW: 4 Little Words This new alt-DNS project got a quick boost from the developer communities at Hacker News and Reddit. The idea is to map each of the four numbers in an IPv4 address to one of 256 "little words," in the Mad Libs-inspired pattern adjective noun verb noun. For example, using an online 4LW generator, 208.101.51.56 (the IP address of the seized domain name torrent-finder.com) becomes simple hair climbs cup. Reddit user armooo created an open source DNS server that returns "A" records using the 4LW protocol. For the example above, visiting http://simple.B-hair.B-climbs.B-cup.B-4lw.org takes you straight to the site formerly pointed to by the seized domain name. This scheme should continue to work unless 4lw.org itself is compromised, in which case others could copy the source code and put up their own servers; meta-servers could emerge to distribute requests among known 4LW servers; and so on. 2. P2P DNS: Peering Around It This project has gotten the lion's share of press attention, because it was initially suggested by Peter Sunde, co-founder of The Pirate Bay. The idea is to create a peer-to-peer alternative to the DNS, and beyond that nothing has been announced. Sunde's blog post has garnered over 100 comments, most pledging help and some offering concrete suggestions or pointing out similar efforts across the Net. There are active brainstorms in various media and a code repository, which is currently empty. Sunde has promised a press release soon. 3. Project IDONS: Internet Distributed Open Name System This proposal is by Lauren Weinstein, one of the early developers of what became the Internet and the long-time moderator of the PRIVACY forum (which predates even the widespread existence of email). Weinstein's vision is of "an alternative Internet name to address mapping system b fully distributed, open source, fault-tolerant, secure, flexible, and not subject to centralized constraints, meddling, and censorship." Other high-level goals include "no central registries, no registrars, no fees nor charges necessary for any name or address operations across IDONS." Weinstein adds in his introduction to IDONS: "Ad hoc attempts to bypass the existing system (such as those newly proposed by Pirate Bay) are likely to create fragmentation and confusion, and therefore ironically tend to further entrench the existing systemb& ad hoc won't fly for this." In an interview, Weinstein told me he has had a "couple of thousand" responses to the IDONS proposal, ranging from substantive technical suggestions to "Yes I'd like to help." Weinstein said, "The point is not just to replace the DNS with another DNS. It's to get out from under a completely limiting condition. Technology is full of these kinds of situations in which we have to get out from under bad early decisions. In the case of DNS, the mistake was centralization. That enables not only censorship, but also the whole gigantic mess that has grown up around domain registrations" b what Weinstein has taken to calling the "domain industrial complex." He continued, "This is not just a technical project, it's an attempt to change the underlying mechanisms we use for names on the Internet. It involves policy and politics as well as technology." And it's likely to be a 10-year effort or longer. At this point the project does not have a website or a mailing list. Interested parties can contact Weinstein via his blog. Operation In Our Sites v. 2.0 Mere weeks ago, rights activists and users concerned about Internet censorship were mounting opposition to the proposed Combating Online Infringement and Counterfeits Act b a law that would give the Justice Department the power to seize domain names from sites around the globe that are "dedicated to infringing activities." That bill is now sidelined in the Senate. Now, with "Operation In Our Sites v. 2.0," the DoJ is asserting that it already has the authority, under the 2008 PRO-IP law (PDF), to turn off DNS service for sites that rely on US-resident domain-name registries, even if the sites are based outside the US. (The court orders for seizure were served on VeriSign, the Virginia company that runs the .com and .net registries.) While most of the seized sites sold counterfeit goods such as sports equipment, shoes and handbags, at least one sold nothing and did not even store pointers to contraband. Torrent-finder.com is a meta-search engine that returns results from other search engines, in response to user queries, and according to TorrentFreak.com "is not encouraging or even facilitating copyright infringement any more than other search engines such as Google." There has been no official comment on this apparent anomaly. The EFF and the CDT have raised questions about the "nuke-the-whole-website approach," and the EFF has vowed to fight the actions. The operation that was torrent-finder.com has reopened at torrent-finder.info; its owner, who lives in Egypt, has also vowed to fight the seizure. Drawbacks to trying to route around the DNS Any alternative to or replacement for the DNS must begin by acknowledging the existing system's strengths: it is ubiquitous, it is built in to many aspects of the way the Internet functions, it is distributed and scaleable (and in fact has scaled by 5 or 6 orders of magnitude since its introduction in the 1980s), and it establishes a hierarchy of trust so that you have some assurance (not 100%) that you're visiting the site you think you are. A major concern for any DNS alternative b especially one that stands beside the existing DNS b must be "breaking the Internet" into Balkanized islands, unreachable one from the other. In practice this means that any alt-DNS must somehow allow access to all Internet resources. Past attempts at establishing an alternate DNS root, such as AlterNIC.net (begun in 1995), required tweaking configuration files in domain name servers b clearly a non-starter for widespread adoption. AlterNIC faded away after its founder was convicted in the US of wire fraud, and the Internet Architecture Board spoke out strongly against alternate roots in RFC 2826. Nonetheless, other attempts at setting up an alternate root have sprung up. These depend on a Web browser to decide which name resolver to use: for example, Unified Root provides its own browser, called Sundial and based on Firefox; and DASHWORLDS offers a browser plug-in for Internet Explorer on Windows. A drawback to routing-around proposals such as 4LW is the assumption of one domain name per IP address. Such one-to-one mapping is by no means universal, and may be getting less common as IPv4 addresses dwindle to exhaustion. I run a server in the cloud with a dozen or more sites on each of several IP addresses. The server is set up to provide the correct content to the visitor based on which domain name was requested b Apache configuration files for that purpose are generated by the (Plesk) site management software. A visitor who types in one of my server's IP addresses, or goes there via e.g. the 4LW protocol, will get a default Apache page. Presumably some deep juju could be developed for the Apache server's rewrite engine, but it would have to be custom-made for each alt-DNS scheme. It would have to be added by hand to each site's Apache configuration file, as the site management software (such as Plesk or cPanel) won't know about it b and therefore will tend to overwrite it. And ditto for sites running Microsoft's IIS or any of numerous other Web servers. Another issue that alt-DNS schemes will face is that websites use non-relative internal links, hard-coded with fully qualified domain names. Any such links will work as long as the official DNS points to where the site expects it to, but break in case of domain-name compromise. Perhaps the biggest obstacle any aspiring DNS workaround or replacement faces is getting to critical mass. I spoke to one alt-DNS developer, Chris Brainard, who is working on a concept called FreeLayer. In his opinion, "Most people won't switch if what they are using is working. Plus you have tight integration with browsers and search engines and code. So in a way the only people who are really interested in this are those who wish to have more privacy, have an interest in the technology, want domains for free, or are doing something illegal." Lauren Weinstein acknowledges that the scope of the IDONS project "may perhaps be reasonably compared with the scale of IPv6 deployment" b in other words, massive. From 0-rra at losnotros.com Fri Dec 10 03:14:27 2010 From: 0-rra at losnotros.com (Direct to-you_RX) Date: Fri, 10 Dec 2010 18:14:27 +0700 Subject: Save Huge On Pharm Message-ID: <9427700364.FBLFD4JL647584@lvnzqxysvbfly.pboaymk.su> Keep your bedroom EXOTIC at night Dozens of Products http://www.jailcoach.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 268 bytes Desc: not available URL: From albina-zy at hotsheet.com Fri Dec 10 14:21:20 2010 From: albina-zy at hotsheet.com (=?koi8-r?B?8sXO1MHCxczYzs/T1Ngg0NLPxMHW?=) Date: Fri, 10 Dec 2010 19:21:20 -0300 Subject: =?koi8-r?B?89TS1cvU1dLO2cosIMTJzsHNyd7F08vJyiDJINTSxc7Ez9fZyiDBzsHM?= =?koi8-r?B?ydo=?= Message-ID: <24C60E9230F6477097A9C3A7F32353B8@usuariopc> Тема: Основные вопросы финансового анализа (Интенсивный семинар) За более подробной информацuей обpащайтеcь по тел: +7 Московский код: 792*.2i-.22 и 7-9*2_2.|-2.2 23 Декабря Основные знания и умения по измерению, анализу, оценке финансовых результатов и финансового состояния можно получить, посетив однодневный интенсивный семинар "Основные вопросы финансового анализа". Это – Ваш антикризисный шанс: возможность быстро, за один день узнать все главное об анализе рентабельности, прибыльности, ликвидности, устойчивости и оборачиваемости. Программа: * Назначение и возможности финансового анализа * Структурный, динамический и трендовый анализ получение основной информации из финансовых отчетов. * Коэффициентный анализ возможность получения дополнительной информации * На предмет чего нужно анализировать финансовые отчеты? Важнейшие аспекты: o Рентабельность капитала и рентабельность продаж o Ликвидность баланса оценка краткосрочной платежеспособности o Финансовая устойчивость балансовая информация o Выручка при достижении безубыточности. o Оборачиваемость чем больше, тем лучше? o Дебиторы и сомнительная дебиторская задолженность * Ответы на вопросы. При желании захватите отчеты своей компании! Каждый участник: * получит методические материалы полезные подсказки в практической деятельности; * овладеет инструментарием анализа финансовых документов; * сможет более эффективно разрешать те сложные вопросы, перед которыми предприятие оказывается в условиях кризиса; * повысит личную эффективность! Cтоимоcть: 7999 руб. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 Московский код: ЧЧ5_3266 и 7_9/2_2_l*2.2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2701 bytes Desc: not available URL: From nettime at kein.org Fri Dec 10 12:01:20 2010 From: nettime at kein.org (nettime's avid reader) Date: Fri, 10 Dec 2010 21:01:20 +0100 Subject: "A new WikiLeaks" revolts against Assange Message-ID: http://www.dn.se/nyheter/varlden/a-new-wikileaks-revolts-against- assange-1.1224764 Uppdaterat 2010-12-09 22:17. Publicerat 2010-12-09 22:16 The pressure on WikiLeaks is increasing. DN.se reveals that several key figures behind the website that publishes anonymous submissions and leaks of sensitive governmental, corporate, organizational or religious documents have resigned in protest against the controversial leader Julian Assange only to launch a new service for the so-called whistleblowers. The goal: to leak sensitive information to the public. The new project, bOpenleaks,b has been under way for some time and will be launched Monday. DN.se has spoken to individuals behind the new site and the message is clear. bOur long term goal is to build a strong, transparent platform to support whistleblowers--both in terms of technology and politics--while at the same time encouraging others to start similar projects,b says a colleague wishing to remain anonymous. bAs a short-term goal, this is about completing the technical infrastructure and ensuring that the organization continues to be democratically governed by all its members, rather than limited to one group or individual.b The news comes in turbulent times for WikiLeaks. Thousands of documents infuriating global leaders and policy-makers have been unveiled to the public via Cablegate. Meanwhile, Julian Assange has been arrested in Great Britain on suspected rape charges based in Sweden. News about WikiLeaks has been over-shadowed by Assange's personal problems. Earlier this year, WikiLeaks experienced accessibility issues. According to information revealed to DN.se, the problem was not linked to outsiders trying to sabotage, but came from the inside as a signal to Julian Assange to step down. The colleagues were dissatisfied with the operation's association with Assange's personal problems and how he used the organization in his explanation of the criminal charges. It is the top-down management style which is under critique. On the other hand, the DN.se source emphasizes the fact that the new website is supportive of WikiLeaks purpose and goal. bThe two organizations are similar in that aspect that both are focusing on providing means for whistleblowers to anonymously provide the public with information,b one insider says. Unlike WikiLeaks, Openleaks will not receive and publish information directly for the public eye. Instead, other organizations will access the Openleaks system and in turn, present their audience with the material. Documents will be processed and published by various collaborating organizations. bWe intend to split the work in a way where we handle only the anonymity and receiving end of the information,b says another colleague. According to the internal documents shared with DN.se, Openleaks intends to establish itself as a neutral intermediary bwithout a political agenda except from the dissemination of information to the media, the public, non- profit organizations, trade- and union organizations and other participating groups.b bAll editorial control and responsibility rests with the publishing organization. We will, as far as possible, take the role of the messenger between the whistleblower and the organization the whistleblower is trying to cooperate with,b says one anonymous informant. Another intended consequence is to avoid the pressure from world leaders that WikiLeaks has experienced. bAs a result of our intention not to publish any document directly and in our own name, we do not expect to experience the kind of political pressure which WikiLeaks is under at this time. In that aspect, it is quite interesting to see how little of politicians' anger seems directed at the newspapers using WikiLeaks sources.b Translation: Majsan BostrC6m. Ossi Carp, ossi.carp at dn.se # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From case at sdf.lonestar.org Fri Dec 10 14:25:54 2010 From: case at sdf.lonestar.org (John Case) Date: Fri, 10 Dec 2010 22:25:54 +0000 (UTC) Subject: isn't sharkfinn / rt10 (insert NSA eavesdropping acronym here) just a boondoggle ? Message-ID: (from Bob Woodward: Obamas Wars) "On the technical side, McConnell explained, the National Security Agency (NSA), which he had headed from 1992 to 1996, had developed a breakthrough eavesdropping capability. It had begun years before with a project code-named SHARKFINN that was designed to speed the acquisition, storage, dissemination and availability of intercepted communications, including cell phone calls and e-mails. The project advanced and was soon referred to as RT10, which increased the speed in real time to factors of up to 10 to the 10th power, or 10 billion times faster. It was now called RTRGReal Time, Regional Gateway. RTRG meant there was a way to capture all the data, store it, and make it instantly available to intelligence analysts and operators, allowing the U.S. to react quickly in response to the enemy." This is like developing a foolproof way to kill every mosquito in just your own backyard. It means nothing if you don't change the actual landscape within which you are working. In a landscape where I can lease an IP address, anonymously, at any street corner (worldwide), and where my entry and exit points are completely arbitrary and fungible ... nevermind the availability of strong crypto ... So this is just a subsidy to SAIC and Raytheon and Boeing (and Cisco and Juniper and Oracle) and has no meaning to anyone but the most inept and technically illiterate lawbreakers. Meanwhile, your Apple iPic photo gallery of this weekend in San Diego spins on a disk somewhere underground... From eugen at leitl.org Fri Dec 10 14:04:13 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 10 Dec 2010 23:04:13 +0100 Subject: "A new WikiLeaks" revolts against Assange Message-ID: <20101210220413.GJ9434@leitl.org> ----- Forwarded message from nettime's avid reader ----- From eugen at leitl.org Fri Dec 10 15:26:27 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 11 Dec 2010 00:26:27 +0100 Subject: The 24-hour Athenian democracy Message-ID: <20101210232627.GO9434@leitl.org> http://www.economist.com/blogs/babbage/2010/12/more_wikileaks The 24-hour Athenian democracy Dec 8th 2010, 11:48 by B.G. | WASHINGTON I'M AWARE of your need to stay anonymous, but I have to be able to describe the scope of this movement. Can any of you tell me where you're typing from? I am talking to members of a group called bAnonymousb, using a web-based collaborative text-editing service. It is the first such interview for all of us, and their answers begin to collide on the page. One member comes from Norway; another shows surprise, then offers that she is from New Zealand. Another writes that group members come from Nepal and Eastern Russia. They all speak through pseudonyms, but I don't even know which psuedonym comes from what country because shortly after I read these answers, someone who calls himself bTuxb erases them all and writes We are Everywhere. We are everyone. We are Anonymous. Members of Anonymous, whoever they are, have in the last week taken offline websites run by Postfinance, a Swiss bank that closed the account of Julian Assange, founder of WikiLeaks; PayPal, an online payments processor that halted donations to WikiLeaks; and the Swedish prosecutor who has brought a case against Mr Assange. As I followed some "anons" over internet relay chat (IRC) on Tuesday, they voted among themselves not to attack the bUK metro policeb. I'm not sure which website they were referring to. After I left the chat, they turned their attention to lieberman.senate.gov, the website of the American senator Joe Lieberman. According to Sean-Paul Correll, a threat researcher at Panda Security, that site was down, briefly, at 7:11 US Eastern time on Tuesday. Logs from the chat room the group was using indicate that for some time all of senate.govbthe website of every American senatorbwas either down completely or slow in many parts of the world. What all of these sites have in common is that their owners have in some way impeded the work of WikiLeaks or its founder, Julian Assange. Anonymous is not WikiLeaks, and the more famous whistle-blower does not seem to be pulling the strings. Nor, in fact, does anyone. At any point, anybody can show up in one of several IRC conversations and make a case for a target. Whoever else is there registers a vote, or an argument. During the attack on Mr Lieberman's site, anons argued that America's .gov domains would be difficult to take offline, and therefore were not a worthwhile target. One anon pointed out that the Senator does not do business through his website. One wrote, simply, that the site was down in Germany, and that they were all going to jail. But there is order, of a sort, within Anonymous. Anons, though they know each other only by their pseudonyms, develop trust over time through constant participation in the organising chats. The power of the group lies in a piece of software called a blow-orbit ion cannonb. Do not be put off by this scrap of jargon; an ion cannon is a fictional weapon used in fictional space epics. But the very real software allows someone to volunteer his own computer and network connection as part of a distributed denial-of-service (DDoS) attack, a coordinated mass of requests that can crash a web server. Traditionally, a DDoS comes from personal computers that have been illegally loaded with software and tethered to a single command server as part of a bbotnetb. The low-orbit ion cannon is, essentially, a volunteer botnet that Anonymous uses to take down websites. About ten people, called bOPsb, are able to launch an attack. If any OP abuses his powerbif he fails to heed what anons call bthe hive mindb in IRC conversationsb the other OPs can lock him out of the chat. If any anon fails to be inspired by the target, she can remove her own computer from the volunteer botnet, reducing its effect. Anonymous is a 24-hour Athenian democracy, run by a quorum of whoever happens to be awake. It's hard even to define Anonymous as a bgroupb, since not all members participate in all projects. The attempt to take down Mr Lieberman's site, for example, is part of an effort called boperation paybackb, a demonstration of support for Mr Assange. According to Mr Correll, Anonymous does not have a typical hierarchical government, but each mission does have a self-appointed dedicated organising body. This organizing body begins the process of setting up the necessary infrastructure, recruiting new members, researching/identifying vulnerable targets, media outreach, and more. However, the organizing body is free to change (and has changed) as the mission evolves day to day. I have observed at least one takeover when the greater group was not happy about what the organisers were doing. Steve (from TheTechHerald) and I had asked the Pirate Party to issue a statement asking Operation Payback to stop their attacks and resort to legal measures of protest. Many organisers agreed, but the greater bulk of the Anonymous group did not. They became extremely angry at the organisers and temporarily took control of the entire campaign, even releasing their own statement to the media. Anons do understand their limitations. The ones I talked to know that to take down a Swedish prosecutor's website does not halt the prosecution in Sweden. They described their motivations, variously, as trying bto raise awarenessb, bto show the prosecutor that we have the ability to actb and bdamage and attentionb. This is all that a denial-of-service attack can do: register protest. It is not cyberwar. It is a propaganda coup. And it's limited to a limited set of websites: vulnerable, but important. Or, as an anon put it while discussing targets yesterday, Paypal and visa are unbeatable, so do is Everydns, and interpol will rape all of us, Postfinance is the most able to suffer our rage, who the **** is lieverman? He's just a senator. Almost became vice-president, once. It was years ago. From arica.josephina_mw at playstation.sony.com Sat Dec 11 07:28:59 2010 From: arica.josephina_mw at playstation.sony.com (Arica Josephina) Date: Sat, 11 Dec 2010 08:28:59 -0700 Subject: Amazing increase in thickness of yourPenis, up to 30% with our miracle pills m5 In-Reply-To: <9a0b01cb946f$41a1eb67$45b93e66@wcjn232> Message-ID: <4D0398BB.78D15B0E@playstation.sony.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://foresmost.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 836 bytes Desc: not available URL: From latarshabrookye at onlymail.com Sat Dec 11 09:21:10 2010 From: latarshabrookye at onlymail.com (Latarsha Brook) Date: Sat, 11 Dec 2010 10:21:10 -0700 Subject: Viagra100mg x 60pills ONLY $96, 30 pills x 100mg for $60; Free airmail shipping. Accept VISA/MC 83kb Message-ID: <4D03B306.6B3BD21E@onlymail.com> Cheap ViagraPills start fr $1.85 30 pills - $ 78 270 pills - $499 Optional: Delivery Insurance (Guaranteeed reshipment if delivery failed) Order more products & get free Regular Airmail shipping! http://foresmost.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 613 bytes Desc: not available URL: From 0-bajo at renault.com Fri Dec 10 20:21:08 2010 From: 0-bajo at renault.com (~MediTrust~) Date: Sat, 11 Dec 2010 12:21:08 +0800 Subject: Are you a fatty? Lose weight with Ph/ntermine Message-ID: <9384527116.4LKQW120672343@umztgdsgjhmncbe.aqyolqbobczun.com> Our Product does wonders in the bed-room... Satisfaction Guaranteed! http://www.nicescrub.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 277 bytes Desc: not available URL: From jna at retina.net Sat Dec 11 12:52:41 2010 From: jna at retina.net (John Adams) Date: Sat, 11 Dec 2010 12:52:41 -0800 Subject: LOIC tool used in the "Anonymous" attacks Message-ID: It's hard to believe that it took eight people to run wireshark and write this simplistic paper about LOIC. The analysis is weak at best (it seems they only had a few days to study the problem), and never analyzes the source code which has been widely available at https://github.com/NewEraCracker/LOIC A cursory analysis of HTTPFlooder.cs would give you all you need to know to understand the attack and block the tool; If you find your network attacked by this tool, you'll immediately discover a large volume of HTTP requests with no User-Agent or Accept: headers. Drop those requests at the border. You can also compile requests of that nature to analyze the size of the swarm that is attacking you. In analysis, I've found this to be on the order of 2000-3000 hosts. It's a decently sized ACL to place on your ingress routers, but these attacks can be thwarted. -j On Sat, Dec 11, 2010 at 7:19 AM, Marshall Eubanks wrote: > Interesting analysis of the 3 "LOIC" tool variants used in the "Anonymous" Operation Payback attacks on Mastercard, Paypal, etc. > > http://www.simpleweb.org/reports/loic-report.pdf > > LOIC makes no attempt to hide the IP addresses of the attackers, making it easy to trace them if they are using their own computers. > > Regards > Marshall > > > ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From frank_fox at simonscompany.ru Sat Dec 11 15:56:04 2010 From: frank_fox at simonscompany.ru (=?koi8-r?B?8sXO1MHCxczYzs/T1Ngg0NLPxMHW?=) Date: Sat, 11 Dec 2010 15:56:04 -0800 Subject: =?koi8-r?B?5snOwc7Tz9fZyiDBzsHMydo6IM/Tzs/XztnFIMHT0MXL1Nk=?= Message-ID: <0160FC1B7CDF46618A1DC38FE445E2A8@homedbaf756cfb> Тема: Основные вопросы финансового анализа (Интенсивный семинар) За более подробной информацuей обpащайтеcь по тел: (код Москвы) 44*5._З2.66 <<>> ЧЧ5Ч053 Двадцать третьего декабря Основные знания и умения по измерению, анализу, оценке финансовых результатов и финансового состояния можно получить, посетив однодневный интенсивный семинар "Основные вопросы финансового анализа". Это – Ваш антикризисный шанс: возможность быстро, за один день узнать все главное об анализе рентабельности, прибыльности, ликвидности, устойчивости и оборачиваемости. Программа: * Назначение и возможности финансового анализа * Структурный, динамический и трендовый анализ получение основной информации из финансовых отчетов. * Коэффициентный анализ возможность получения дополнительной информации * На предмет чего нужно анализировать финансовые отчеты? Важнейшие аспекты: o Рентабельность капитала и рентабельность продаж o Ликвидность баланса оценка краткосрочной платежеспособности o Финансовая устойчивость балансовая информация o Выручка при достижении безубыточности. o Оборачиваемость чем больше, тем лучше? o Дебиторы и сомнительная дебиторская задолженность * Ответы на вопросы. При желании захватите отчеты своей компании! Каждый участник: * получит методические материалы полезные подсказки в практической деятельности; * овладеет инструментарием анализа финансовых документов; * сможет более эффективно разрешать те сложные вопросы, перед которыми предприятие оказывается в условиях кризиса; * повысит личную эффективность! Cтоимоcть: 7999 руб. По вопpоcам pегucтаpацuu обpащайтеcь по тел: (код Москвы) 445.З266 <<<>>> 742-9_I-9/8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2632 bytes Desc: not available URL: From 0-0-0-0-commerce_paris at mzv.cz Sat Dec 11 13:36:50 2010 From: 0-0-0-0-commerce_paris at mzv.cz (RX_Shipped_WorldWide) Date: Sat, 11 Dec 2010 18:36:50 -0300 Subject: Increase your libido Message-ID: <8528713345.96W4Z38Z816939@nhqhweibbwxy.ekopm.biz> Dont let your relationship become Stale, keep it exciting! We Care about your Health http://www.jailcoach.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 292 bytes Desc: not available URL: From foxtema at ratingtour.ru Sat Dec 11 16:27:38 2010 From: foxtema at ratingtour.ru (=?koi8-r?B?98HbIMHO1MnL0snaydPO2cog28HO0w==?=) Date: Sat, 11 Dec 2010 21:27:38 -0300 Subject: =?koi8-r?B?9M/Sx8/X2cog0MXS08/OwcwgliDQz8TCz9IsIM/C1d7FzsnFLCDPw8XO?= =?koi8-r?B?y8Eg3MbGxcvUydfOz9PUyQ==?= Message-ID: <000d01cb998a$ffac4e50$6400a8c0@foxtema> Тема: Практические рекомендации подбора, обучения и оценки эффективности торгового персонала Внешний и внутренний консультант по управлению предприятием и работе с персоналом, практик-консультант по реструктуризации и построению управленческих структур, сертифицированный специалист по ИСО стандартам, постановщик задач по вопросам оценки и аттестации для программы "Босс-кадровик". Московский код; 4Ч53266 \\// 742_9_i.9.8 2З декабря 2010г. (продолжительность 8 часов) Цель: Торговый персонал отличается большой текучестью. Там где есть такая категория работников, никогда не перестают искать и принимать новых сотрудников. Большая часть вновь принятых увольняются в первые три месяца работы. Как минимизировать ошибки при приеме торгового персонала и отсечь на этапе подбора совершенно неподходящие кандидатуры, какие приемы при собеседовании помогут выявить полную профнепригодность кандидатов. И как не потерять потенциально хороших работников в начале их работы на предприятии Кого, когда и чему следует обучать Как узнать результативность обучения Для чего нужны периодические и внеплановые оценки (аттестации) Как организовать оценку, чтобы она прошла с наименьшим отвлечением персонала, но в то же время дала практические результаты Программа мероприятия: Подбор торгового персонала: 1.1 Особенности торгового персонала 1.2 Виды торгового персонала 1.3 Как минимизировать ошибки при приеме: 1.3.1 Тесты 1.3.2 Проверка на стрессоустойчивость 1.3.3 "Плохие" вопросы 1.4 Коллективные испытания 1.5 Испытательный срок: 1.5.1 Конкретные задания 1.5.1 Шефство 1.5.1 Выводы по результатам испытательного срока 1.6 Образцы документов по подбору и приему Обучение: 2.1 Непрерывность обучения 2.2 Категории обучающихся 2.3 Программы обучения 2.4 Плюсы и минусы внешнего и внутреннего обучения 2.5 Оценка результативности обучения 2.6 Образцы документов по обучению (повышению квалификации) Оценка, аттестация торгового персонала: 3.1 Подготовка процедуры оценки: 3.1.1 Вопросы 3.1.2 Практические задания 3.1.3 Отзывы 3.1.4 Тесты 3.1.5 Анонимный покупатель 3.2 Сроки и частота оценки 3.3 Цели оценки 3.4 Результаты оценки 3.5 Действия после оценки: 3.5.1 Резерв 3.5.2 Перемещение 3.5.3 Обучение 3.5.4 Увольнение 3.6 Образцы документов по подготовке и проведению оценки (аттестации) Практические рекомендации, ответы на вопросы слушателей Cтоимоcть: 7 900 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (код Москвы) 7Ч2.9l98 <> 4Ч5.4095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5388 bytes Desc: not available URL: From freeman-m at medhelp-vrn.ru Sat Dec 11 06:41:48 2010 From: freeman-m at medhelp-vrn.ru (Tiffany Mccain) Date: Sat, 11 Dec 2010 22:41:48 +0800 Subject: =?koi8-r?B?68/OxsnExc7DycHM2M7PxSDExczP0NLPydrXz8TT1NfP?= Message-ID: КОНФИДЕНЦИАЛЬНОЕ ДЕЛОПРОИЗВОДСТВО 17 Декабря код: (четыре девять пять). 792*2l22 **** 445Ч095 Цель: формирование у слушателей целостных знаний и умений по организации и обеспечению эффективного функционирования конфиденциального делопроизводства в компании. Задачи: * изучение принципов построения конфиденциального делопроизводства; * изучение средств криптографической защиты информации; * изучение методов обучения сотрудников компании правилам конфиденциального делопроизводства; Программа мероприятия: 1. Конфиденциальное делопроизводство – составная часть системы безопасности компании; 2. Конфиденциальное делопроизводство как элемент режима защиты коммерческой тайны; 3. Принципы построения конфиденциального делопроизводства; 4. Порядок взаимодействия открытого и конфиденциального делопроизводства; 5. Материальный (бумажный) документ и документ представленный в электронном виде, общие черты и принципиальные отличия, материальный (бумажный) и электронный документооборот, а также системы их сопряжения; 6. Конфиденциальный документооборот и конфиденциальное информационное хранилище как составные части системы конфиденциального делопроизводства; 7. Возможности, которыми должны обладать электронный конфиденциальный документооборот и электронное конфиденциальное информационное хранилище; 8. Этапы создания конфиденциального делопроизводства, практические рекомендации по порядку создания; 9. Способы и средства защиты конфиденциального делопроизводства; 10. Применение средств криптографической защиты информации как наиболее эффективный способ защиты электронного документа; 11. Электронная цифровая подпись как наиболее эффективное средство подтверждения авторства и подлинности электронного документа; 12. Создание инструктивных документов для обеспечения устойчивого функционирования конфиденциального делопроизводства; 13. Обучение сотрудников компании правилам конфиденциального делопроизводства, виды ответственности за нарушение режима защиты коммерческой тайны и правил ведения конфиденциального делопроизводства; 14. Автоматизированная система конфиденциального информационного хранилища как вариант систематизации и защиты материальных документов. Назначение, принцип построения, функциональные возможности, демо-версия системы. Информацию можно получить по телефонам: (495) Ч45/З2*66 или 7Ч2*9i*98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4318 bytes Desc: not available URL: From eugen at leitl.org Sat Dec 11 15:17:04 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 12 Dec 2010 00:17:04 +0100 Subject: LOIC tool used in the "Anonymous" attacks Message-ID: <20101211231704.GV9434@leitl.org> ----- Forwarded message from John Adams ----- From oleg at nelika.ru Sun Dec 12 02:23:08 2010 From: oleg at nelika.ru (=?koi8-r?B?9cLP0svBINPOxcfB?=) Date: Sun, 12 Dec 2010 15:23:08 +0500 Subject: =?koi8-r?B?887FxyDQz8fS1drLwSwg19nXz9osIPDJ1MXS?= Message-ID: <0EBC0DE308FA49818D76775182D23AEE@ragu94e60c393d> Профессиональная уборка снега в Санкт-Петербурге. Быстро и качественно! Звоните: +7 (812) 948-40-09 +7 (921) 948-40-09 From bigstu42 at abramovsky.ru Sun Dec 12 04:00:51 2010 From: bigstu42 at abramovsky.ru (=?koi8-r?B?88/X0sXNxc7O2cogz8bJ0y3Nxc7FxNbF0g==?=) Date: Sun, 12 Dec 2010 17:30:51 +0530 Subject: =?koi8-r?B?8NLB18nMwSDPxs/SzczFzsnRIMTPy9XNxc7Uz9cu?= Message-ID: ТЕМА: Функциональные Обязанности Помощника Руководителя (Основные И Дополнительные) По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (Ч95) 44*53_96-8 ; 445З266 20 Декабря Внешний и внутренний консультант по управлению предприятием и работе с персоналом, практик-консультант по реструктуризации и построению управленческих структур, сертифицированный специалист по ИСО стандартам, постановщик задач по вопросам оценки и аттестации для программы Босс-кадровик. Программа: 1.Основные функции помощника руководителя: * Работа с документами организации -общий документооборот – номенклатура дел – архив предприятия * Работа с входящей и исходящей документацией * Телефонные переговоры 2.Дополнительные функции: * Планирование рабочего дня руководителя * Контроль заданий руководителя * Организация деловых совещаний, встреч * Ведение протоколов заседаний * Перевод 2.Образцы документов 4.Пример распорядка дня помощника руководителя – элементы тайм-менеджмента 5.Нормативные документы и требования 6.Имидж помощника руководителя Cтоимоcть: 7 200 руб. По вопpоcам pегucтаpацuu обpащайтеcь по тел: (код Москвы) 44.5**З2_66 <<>> ЧЧ5.4095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1991 bytes Desc: not available URL: From nfo at eridania.ee Sun Dec 12 09:00:52 2010 From: nfo at eridania.ee (=?koi8-r?B?7sHMz8fP19nFINPIxc3Z?=) Date: Sun, 12 Dec 2010 18:00:52 +0100 Subject: =?koi8-r?B?+sHU0sHUztnFINPIxc3ZLiDtyc7JzcnawcPJ0SDOwczPx8/X?= Message-ID: <000d01cb9a1e$21fc7280$6400a8c0@nfo> IЧ декабря 2010г. Тема: Затратные механизмы в налоговых схемах для оптимизации НДС и налога на прибыль (Ч95) 445ЧО95 и 44/5З/96*8 Цель: Курс посвящен изучению затратых механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Участники получат краткие индивидуальные консультации по тематике данного курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные","серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов √ ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. 4. Виды приемлимых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 5. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 6. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 7. Ответы на вопросы. По желанию и при наличии возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Информацию можно получить по телефонам: \Моск. код/ ЧЧ5З9/68 \\// 7922|/22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6722 bytes Desc: not available URL: From hillmen at tramway.ru Sun Dec 12 09:47:22 2010 From: hillmen at tramway.ru (=?koi8-r?B?79DUyc3J2sHDydEgzsHMz8fP1w==?=) Date: Sun, 12 Dec 2010 20:47:22 +0300 Subject: =?koi8-r?B?89TSwdTFx8nRINrB1NLB1CDEzNEg1c3Fztjbxc7J0SDOwczPx8/XLg==?= Message-ID: <000d01cb9a24$a1257d80$6400a8c0@hillmen> 14 Декабря Тема: Налоговое планирование. Затратные механизмы для оптимизации НДС и налога на прибыль код: (четыре девять пять) 7Ч2/9i_98 : Ч45*ЧО95 Цель: Курс посвящен изучению затратых механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Участники получат краткие индивидуальные консультации по тематике данного курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные","серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов √ ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. 4. Виды приемлимых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 5. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 6. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 7. Ответы на вопросы. По желанию и при наличии возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 (495) 4_45-4*О-95 <> Ч453266 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6727 bytes Desc: not available URL: From juliennemeghanpb at tasmail.com.jfet.org Sun Dec 12 23:33:15 2010 From: juliennemeghanpb at tasmail.com.jfet.org (Julienne Meghan) Date: Mon, 13 Dec 2010 00:33:15 -0700 Subject: Best BuyViagra Generic Online 100% Satisfaction Free Pills Shipping xp1u Message-ID: <4D05CC3B.6A298CF5@tasmail.com> Cheap ViagraPills start fr $1.85 30 pills - $ 78 270 pills - $499 Optional: Delivery Insurance (Guaranteeed reshipment if delivery failed) Order more products & get free Regular Airmail shipping! http://twoapenny.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 618 bytes Desc: not available URL: From jya at pipeline.com Mon Dec 13 04:25:56 2010 From: jya at pipeline.com (John Young) Date: Mon, 13 Dec 2010 07:25:56 -0500 Subject: Wikileaks and spam Message-ID: Robtex.com shows a wondrous slew of brazen Net predators for 92.241.190.202. Some might even be real criminals rather than cops and their hired hackers on the prowl to steal data and call it freedom of information. Recall that Wikileaks in its earlier promotional material bragged of predating, sorry, liberating, over 1 million files through Tor siphoning, aided and abetted by the noble-branded bandits "Chinese dissidents." After an outcry of betrayal of the trust of Tor, and Tor's own tut-tut to keep its gaping security quiet, WL dropped that ad of the daring hacker outlaw campaign but several recent news reports continue to recycle it. Wikileaks like cops and hackers cannot overstate numbers, to wit, WL's recent promotion of the number of words in upcoming releases. Next, the count of alphanumerics, punctuation and spaces to match the sock-puppeted WL followers on Twitter and Facebook and holiest of all, Google hits. Circling back to the start: Mirror.wikileaks.info has an about page which tells, or pretends to tell, how the site got started and how it distances itself with a Russian-Chinese dissident bear hug from "The Original Wikileaks." http://mirror.wikileaks.info/about.html Malware in the Wikileaks releases is a provocative suggestion. Certainly the technology for that is readily available and the practice obligatory, usually as a "security feature," sometimes called a hash or cookie or watermark or copyright-tracker or privacy protection. Wait a minute, did you say privacy protection. Get out of here, Demosthenes, there exists nonesuch except self-throttling. Phoenix University Professor Cynic proclaims the insurance.aes256 file is nothing but malware ready to explode red-dye onto decrypters. Kaplan Most Venerable Counterprofessor Agnostic retorts: fie on your mendacious contra-idealism, knuckle rapping the Auth lockbox. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From mmaud_pg at pctel.com Mon Dec 13 06:59:22 2010 From: mmaud_pg at pctel.com (Miss Maud) Date: Mon, 13 Dec 2010 07:59:22 -0700 Subject: .PenisLong, used & recommended by Sex industry professionals, Buy this effective herbal EnlargementPills fcbw In-Reply-To: Message-ID: <4D0634CA.541829D7@pctel.com> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://occurtreat.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 720 bytes Desc: not available URL: From network-problems at tdmx.rutgers.edu Sun Dec 12 17:50:39 2010 From: network-problems at tdmx.rutgers.edu (=?koi8-r?B?4dLIydcg1yDLz83Qwc7JyQ==?=) Date: Mon, 13 Dec 2010 09:50:39 +0800 Subject: =?koi8-r?B?4dLIydcsIM/Sx8HOydrBw8nRIMkgyNLBzsXOycU=?= Message-ID: <000d01cb9a68$24a3c520$6400a8c0@network-problems> 21 Декабря ТЕМА: Делопроизводство: создаем архив предприятия \Моск. код/ Ч4/54_О95 ; Ч45/32_66 Цель: Со временем на каждом предприятии накапливается большое количество документов - по роду деятельности, переписка, периодика, типографские издания и пр. В последнее время многие документы существуют в электронном виде. Однако любые документы имеют свой жизненный цикл √ сначала они актуальны, их создают, используют, потом они теряют свою актуальность или товарный вид. Но по требованию российского законодательства или по производственной необходимости эти документы должны быть сохранены. Для хранения их создают архив предприятия. Посетив наш семинар Вы узнаете: * Как создать архив предприятия с минимальными затратами * Кого назначить ответственным за архив * Как правильно отобрать документы на хранение * Что делать с документами при реорганизации, ликвидации или слиянии предприятия * Как правильно взаимодействовать с государственными архивами Программа: 1. Необходимость сохранности документов. Плюсы наличия архива на предприятии. Ответственность предприятия за сохранность документов 2. Понятие "документ", "делопроизводство", "архив" 3. Виды документов 4. Законодательная база 5. Внутренние регламентирующие документы √ инструкция по ведению документооборота, положение об архиве, должностные обязанности ответственных за архив (архивы) предприятия лиц 6. Виды архивов предприятия √ общий, кадровый, бухгалтерский (финансовый), производственный; комплектование архивов 7. Электронный архив 8. Лица, ответственные за хранение документов 9. Экспертно-проверочные комиссии 10. Требования к условиям хранения документов 11. Использование документов из архива предприятия 12. Архив предприятия и госархивы, их взаимодействие и сотрудничество. Сдача документов на госхранение 13. Практические рекомендации слушателям, образцы документов 14. Ответы на вопросы слушателей, обсуждение Вся информация по тел: (код Москвы) ЧЧ*5__З2_66 \\\/// 742-9|98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3208 bytes Desc: not available URL: From jya at pipeline.com Mon Dec 13 07:34:10 2010 From: jya at pipeline.com (John Young) Date: Mon, 13 Dec 2010 10:34:10 -0500 Subject: A thesis on WL theses and a suggestion Message-ID: Locations of nukes worldwide, their count, their megadeath capacity, their factories and bases, have been available for decades, thanks to the Federation of American Scientists (fas.org), the National Resources Defense Council (nrdc.org), National Security Archive (Google its vast collection), Cuill.org, and others of these large repositiories of leaked and hard-dugged information which Wikileaks deliberately, vaingloriously, ignores as if ex nihilo. Petty bullshitters driven by PR. Perfect for new media and old media wanting an injection. Otherwise, what else is new medical in the daily dose of cables. Catch a breath, derush adrenline, peruse a few of those hundreds which preceded the virgin birth of Wikileaks in Sensitive Information Security Sources and Breaches: http://cryptome.org/0002/siss.htm Har, the MSM being stooged by WL are also parading the wee he-devils as if the first to defy Olympus, well, merely re-invent fire aka freedom of information. Forbes today milking its "inside sources" avidly as Time aiming for yearly virginal sacrifice. Silly vainglorious names of media: The Guardian, Le Monde, Der Spiegel, The Times iterations galore, News beyond count, El Pais, The Nation, Gawker, Raw Story, Inside Sources, Pro-Publica, The People's Daily, Granma, Pravda, bleh. Mea culpa, a brand always outsells the honest truth told by individuals, oops, that's the brand of thousands of mail lists and their bastard ego-blogs. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ivickjackherer at kostagas.ru Sun Dec 12 21:49:40 2010 From: ivickjackherer at kostagas.ru (Alyson Flowers) Date: Mon, 13 Dec 2010 11:19:40 +0530 Subject: =?koi8-r?B?7NXe28HRIMPFzsEhISEg88HOwdTP0snJICLwz9LF3tjFIiwi8sHNxc7T?= =?koi8-r?B?y8/FIiDyz9bExdPU188g1yDwz8TNz9PLz9fYxSEhIQ==?= Message-ID: Тел.: 637-21-28, 695-28-04 Новый год 2011 год!!! РОЖДЕСТВО САНАТОРИЙ "ПОРЕЧЬЕ" Расположение: в 45 км от Москвы в пригороде Звенигорода, в лесном массиве на берегу Москвы-реки. Размещение: Трехэтажные кирпичные корпуса № 5, 7. Лечение: опорно-двигательного аппарата, сердечно-сосудистой и нервной систем, органов пищеварения и органов выделения. К услугам отдыхающих: сауна с мини-бассейном, бильярд, кинозал, настольный теннис, дискотеки, бар, ресторан, охраняемая стоянка. Экскурсии за дополнительную плату. Питание: 3-х разовое в столовой санатория. Категория номера Стоимость с 01.01.2011г. по 09.01.2011г. в рублях на 1 человека. 01.01.(уж.) - 08.01.(об.)2011г. 02.01.(об.) - 09.01.(зв.)2011г. 02.01.(об.) - 08.01.(зв.)2011г. 1 сутки 7 дней 6 дней Корпус № 5, 7 Одноместный 1 930 13 510 11 580 Двухместный 1 600 11 200 9 600 Двухкомнатный двухместный 2 030 14 210 12 180 Дополнительное место 990 6 930 5 940 Корпус № 6 Двухместный 1 этаж - при размещении 1 человека 2 640 18 480 15 840 - при размещении 2 человек 1 930 13 510 11 580 Двухместный 2, 3-й этаж - при размещении 1 человека 3 100 21 700 18 600 - при размещении 2 человек 2 030 14 210 12 180 Двухкомнатный двухместный, 1, 2, 3-й этаж. - при размещении 1 человека 4 200 29 400 25 200 - при размещении 2 человек 2 500 17 500 15 000 Дополнительное место 1 100 7 700 6 600 В стоимость входит: проживание, питание, лечение, праздничная анимационная программа, охраняемая автостоянка. Скидки: детям до 12 лет на основное место – 10%. Расчетный час: заезд 01.01.2011г. в 16.30; выезд 08, 09 или 10.01.2011г. в 16.30. заезд 02.01.2011г. в 12.00; выезд 08, 09 или 10.01.2011г. в 12.00. САНАТОРИЙ "Дружба" Расположение: на берегу Клязьминского водохранилища, в 10 км. от Москвы по Дмитровскому шоссе. Размещение: Современный 4-этажный кирпичный корпус. 1-комнатный 2-местный «Стандарт» - душ, туалет, телевизор, холодильник и балкон. Лечение: заболеваний сердечно-сосудистой системы, органов дыхания, опорно-двигательного аппарата, нервной системы. К услугам отдыхающих: 25-метровый бассейн с сауной, спортивный зал, пункт проката лыж и коньков. Разнообразные развлекательные программы, кинозал, библиотека, танцевальные вечера, концерты, дискотеки, экскурсии. Питание: 4-разовое в столовой санатория. Категория номера Стоимость за заезд на человека в рублях. "Новый год" 31.12 (об.)–03.01.(зв.) 4 дня / 3 ночи "Рождество" 03.01 (уж.) -10.01 (об.) 7дней / 6 ночей 2-х местный номер 10 900 13 650 В стоимость входит: проживание, 3-х разовое питание, Новогодний банкет, программа. Скидки: Дети: от 3 до 14 лет на дополнительном месте – 50%. Расчетный час: "Новый год" - 12.00 часов, "Рождество" - 17-00 часов. Тел.: 637-21-28, 695-28-04 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 14776 bytes Desc: not available URL: From bilivbiliv at lpbp.lviv.ua Mon Dec 13 00:29:55 2010 From: bilivbiliv at lpbp.lviv.ua (=?koi8-r?B?7sHMz8fP19nFINPIxc3Z?=) Date: Mon, 13 Dec 2010 12:29:55 +0400 Subject: =?koi8-r?B?+sHU0sHUztnFINPIxc3ZIMTM0SDP0NTJzcnawcPJySDOwczPx8/X?= Message-ID: <000d01cb9a9f$ebc2f090$6400a8c0@bilivbiliv> IЧ декабря 2010г. Тема: Затратные механизмы в налоговых схемах для оптимизации НДС и налога на прибыль (495)*7Ч.29i-98 : ЧЧ54О95 Цель: Курс посвящен изучению затратых механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Участники получат краткие индивидуальные консультации по тематике данного курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные","серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов √ ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. 4. Виды приемлимых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 5. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 6. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 7. Ответы на вопросы. По желанию и при наличии возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: (код Москвы) 4Ч5/4О95 : ЧЧ5/З266 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6728 bytes Desc: not available URL: From 0-3732-003gjgoct-net.ne.jp at bma.mpse.jp Mon Dec 13 01:35:17 2010 From: 0-3732-003gjgoct-net.ne.jp at bma.mpse.jp (Affordable-Luxury) Date: Mon, 13 Dec 2010 12:35:17 +0300 Subject: Budget Minded Gifts for your Family & Friends! Message-ID: <6052092586.TPI2MR2Q701469@ejmbriumig.icalbta.ua> http://www.owemix.ru http://www.owemix.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 216 bytes Desc: not available URL: From khalilahisadora_sg at golden.net Mon Dec 13 12:42:01 2010 From: khalilahisadora_sg at golden.net (Khalilah Isadora) Date: Mon, 13 Dec 2010 13:42:01 -0700 Subject: Let's grow your smallDick with this Effective PenisEn1argement pill dstc In-Reply-To: Message-ID: <4D068519.96C26705@golden.net> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://fixburn.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 698 bytes Desc: not available URL: From kragen at canonical.org Mon Dec 13 12:45:26 2010 From: kragen at canonical.org (Kragen Javier Sitaker) Date: Mon, 13 Dec 2010 15:45:26 -0500 Subject: Everyone and no one wants to save the world Message-ID: I was reading the Reuters piece today on Julian Assange by Mark Hosenball, "Special Report: Julian Assange versus the world", which I would link to if Reuters provided stable URLs. He gives mixed reviews to Assange's published writings: > His blog entries, which can still be found on the web, are a mixture > of pseudo-scientific and philosophical gibberish, cultural and > literary observations ("Kurt Vonnegut is dead."), extremely technical > computer coding sequences and often jumbled political statements. Pseudo-scientific and philosophical gibberish? That hardly seems in character with the hard-nosed, unflappable public figure we see today. I wondered which writings Hosenball meant. He goes into more detail a bit later: > In an essay entitled "Jackboots," Assange describes how he felt that > his own personal travails were comparable to the experiences of Gulag > prisoners in Alexander Solzhenitsyn's novel "The First Circle" -- the > story of a brilliant mathematician imprisoned by Stalin and forced to > choose between aiding the state or being transferred to a Siberian > camp. > "To feel that home is the comraderie (sic) of persecuted, and infact > (sic) prosecuted, polymaths in a Stalinist slave labor camp! How close > the parallels to my own adventures!" Another essay, this one almost > incomprehensible, is headlined: "Everyone and no one wants to save the > world." Almost incomprehensible, eh? I googled up a copy at . It turns out to be perfectly clear and lucid, although it contains a number of debatable and unsupported assertions. My conclusion: Hosenball merely cannot tell the difference between material beyond his own rather mediocre reading level, and gibberish. Here's the essay, with spelling and punctuation improved because the original hurts my eyes: > Everyone and no one wants to save the world > ------------------------------------------- > When the world extended to onebs surrounding hills and mountains and > over them was only legend, saving the world was approachable, and a > natural activity to all of independent character. > You do not need to justify the possession of these noble instincts. > Such attributes are normally distributed. You have a constellation of > these attributes and that makes you who you are. Recognise that the > substantial ones are invariant. > You must satisfy your invariant instincts or you will be at odds with > your own character. It is only when we are not at odds with our basic > makeup that we can find life meaningful. > To exercise your instinct for saving the world requires saving what > you perceive to be the world. > Being modern, educated and wordly, the world you perceive is immense > and this is disempowering compared to the valley world of your > ancestors, where your feelings were forged, and where saving 10 people > saved 10% of the bworldbbs population. > Here lies the difficulty in actualising your character. Your > perception is of a world so vast that that you can not envisage your > actions making a meaningful difference. > People try to fool themselves and others into believing that one can > bthink globally and act locallyb; however, to anyone with a sense of > proportion b not most people, btw b thinking globally makes acting > locally seem to be a marginal activity. Itbs not setting the world to > rights. > To meaningfully interact with the world, you have to either constrain > your perception of what it is back to valley proportions by eschewing > all global information (most of us here have engaged on just the > opposite course, which is what has provoked this discussion), losing > your sense of perspective b or start seriously engaging with the modern > perception of the world. > That latter path can be hard to find, because it is only satisfied by > creating ideas or inventions that have a global impact. Perhaps I have > found one, and therebs others out there, but for most people of your > character, a combination of eschewing knowledge of those parts of the > world they canbt change, and robust engagement with the parts they > can, is probably optimal. > Do not be concerned about when one is to do good, who defines good, > etc. Act in the way you do because to do otherwise would to be at > odds would to be at odds with yourself. Being on a path true to your > character carries with it a state of flow, where the thoughts about > your next step come upon waking, unbidden, but welcome. > I support similarly minded people, not because they are moral agents, > but because they have common cause with my own feelings and dreams. > -- To unsubscribe: http://lists.canonical.org/mailman/listinfo/kragen-tol ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Dec 13 07:02:46 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 13 Dec 2010 16:02:46 +0100 Subject: Wikileaks and spam Message-ID: <20101213150246.GE9434@leitl.org> ----- Forwarded message from John Young ----- From satoshin at gmx.com Mon Dec 13 08:11:53 2010 From: satoshin at gmx.com (Satoshi Nakamoto) Date: Mon, 13 Dec 2010 16:11:53 +0000 Subject: [bitcoin-list] Bitcoin 0.3.19 is released Message-ID: This is a minor release to add some DoS protection. Changes: - Added some DoS limits, though it's still far from DoS resistant. - Removed "safe mode" alerts. http://www.bitcoin.org/smf/index.php?topic=2228.0 Download: http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.3.19/ ------------------------------------------------------------------------------ Oracle to DB2 Conversion Guide: Learn learn about native support for PL/SQL, new data types, scalar functions, improved concurrency, built-in packages, OCI, SQL*Plus, data movement tools, best practices and more. http://p.sf.net/sfu/oracle-sfdev2dev _______________________________________________ bitcoin-list mailing list bitcoin-list at lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-list ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Dec 13 09:19:48 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 13 Dec 2010 18:19:48 +0100 Subject: A thesis on WL theses and a suggestion Message-ID: <20101213171948.GF9434@leitl.org> ----- Forwarded message from John Young ----- From eugen at leitl.org Mon Dec 13 09:34:05 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 13 Dec 2010 18:34:05 +0100 Subject: [bitcoin-list] Bitcoin 0.3.19 is released Message-ID: <20101213173405.GG9434@leitl.org> ----- Forwarded message from Satoshi Nakamoto ----- From rdobbins at arbor.net Mon Dec 13 11:11:42 2010 From: rdobbins at arbor.net (Dobbins, Roland) Date: Mon, 13 Dec 2010 19:11:42 +0000 Subject: Over a decade of DDOS--any progress yet? Message-ID: On Dec 14, 2010, at 2:04 AM, Bill Bogstad wrote: > A single data point on current DDOS traffic levels. In the 2009 Arbor WWISR, the largest attack reported was 49gb/sec. We're currently wrapping up the 2010 WWISR, and the largest attack report was considerably larger. ----------------------------------------------------------------------- Roland Dobbins // Sell your computer and buy a guitar. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From idella.ronaldle at goldenware.com Mon Dec 13 19:16:24 2010 From: idella.ronaldle at goldenware.com (Idella Ronald) Date: Mon, 13 Dec 2010 20:16:24 -0700 Subject: Let's grow your smallDick with this Effective PenisEn1argement pill sg In-Reply-To: <87de01cb9a11$47f59d86$33c78597@ciyvbh2> Message-ID: <4D06E188.06748091@goldenware.com> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://curlblot.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 707 bytes Desc: not available URL: From eugen at leitl.org Mon Dec 13 13:36:18 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 13 Dec 2010 22:36:18 +0100 Subject: Over a decade of DDOS--any progress yet? Message-ID: <20101213213618.GK9434@leitl.org> ----- Forwarded message from "Dobbins, Roland" ----- From eugen at leitl.org Mon Dec 13 13:39:29 2010 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 13 Dec 2010 22:39:29 +0100 Subject: Everyone and no one wants to save the world Message-ID: <20101213213929.GN9434@leitl.org> ----- Forwarded message from Kragen Javier Sitaker ----- From beefranks at buhusluga.ru Mon Dec 13 13:48:24 2010 From: beefranks at buhusluga.ru (=?koi8-r?B?5MzRIMLVyMfBzNTF0sE=?=) Date: Mon, 13 Dec 2010 22:48:24 +0100 Subject: =?koi8-r?B?78LOwcwsINrBy8/OztnFIMHM2NTF0s7B1MnX2Q==?= Message-ID: I5 Декабря 2010г. +7 Московский код: 7-42*9i/98 \\\/// ЧЧ.5./32*66 Налоговое планирование в условиях кризиса: как жить без обналички и фирм-однодневок и не разориться 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности…); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) – как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП – легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей За более подробной информацuей обpащайтеcь по тел: +7 (код Москвы) 445/32*66 <> 7/9/2.2-i-2*2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3963 bytes Desc: not available URL: From 0-isc at pmcflash.com Mon Dec 13 17:19:18 2010 From: 0-isc at pmcflash.com (Free Shipping) Date: Tue, 14 Dec 2010 03:19:18 +0200 Subject: Come on in and Have a Look at our record breaking gift sales Message-ID: <7683052798.NSWW98LU297987@wygtwxbof.mhmztfalzbnallp.com> http://www.owemix.ru http://www.slapsteer.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 214 bytes Desc: not available URL: From tlouettapz at rbs.com Tue Dec 14 03:06:55 2010 From: tlouettapz at rbs.com (Tameika Louetta) Date: Tue, 14 Dec 2010 04:06:55 -0700 Subject: Discount CialisViagra from $1.38, Express delivery, 90000+ Satisfied US, UK, CANADIAN Customers! un In-Reply-To: Message-ID: <4D074FCF.45935D19@rbs.com> OrderCializViagra Online & Save 75-90% 0nline Pharmacy NoPrescription required Buy Canadian Drugs at Wholesale Prices and Save 75-90% FDA-Approved drugs + Superb Quality Drugs only! Accept all major credit cards Order Today! From $1.38 http://fzvna.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 520 bytes Desc: not available URL: From columlungu at goroda.su Tue Dec 14 00:08:05 2010 From: columlungu at goroda.su (Blair Downey) Date: Tue, 14 Dec 2010 10:08:05 +0200 Subject: =?koi8-r?B?7sXWyczZxSDQz83F3cXOydEgz9Qg08/C09TXxc7OycvB?= Message-ID: <65615C97E50D4F00B20372B7871EC6D0@user991e5331ee> НЕЖИЛЫЕ ПОМЕЩЕНИЯ ОТ СОБСТВЕННИКА Продажа/Аренда ул. Коломенская, д. 21, к. 3, м.Коломенская, 7 мин. транспортом Помещения свободного назначения (банк, магазин, офис) в жилом доме бизнес класса, 1-2 этажи, 2 отдельных входа Общая площадь 1608,3 кв. м Все помещения с ремонтом в рабочем состоянии.  Цена продажи: 85 000 за кв. м Цена аренды: 10 500 руб/м2 Контакты (495) 969-32-95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1468 bytes Desc: not available URL: From kinaethelst at ge-smart.com Tue Dec 14 09:08:37 2010 From: kinaethelst at ge-smart.com (Kina Ethel) Date: Tue, 14 Dec 2010 10:08:37 -0700 Subject: *BUY Hydrocodone $4.40, Vicodin ES $4.40, Ambien$2.70, fast shipping! cove In-Reply-To: Message-ID: <4D07A495.2E612872@ge-smart.com> "If You Are In Pain You Will Qualify" Hydrocodone $4.40 Vicodin ES $4.40 Xanax$1.90 ValiumROCHE $2.15 Ativan(� Wyeth) $2.15 Ambien$2.70 Prescription is NOT Required, Safe, Free Shipping in the USA and Canada All Orders Guaranteeed to be Approved or Your Money Back http://medonlinestock.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 723 bytes Desc: not available URL: From 0-donrad at tampachamber.com Tue Dec 14 11:48:34 2010 From: 0-donrad at tampachamber.com (Worldwide Pharma) Date: Tue, 14 Dec 2010 19:48:34 +0000 Subject: World's Top Pharma Message-ID: <6168385579.YYGQT9D6184253@xulsqfks.btyclncj.tv> What do you have to lose by something that can increase your pleasure in bed with the one you love, night after night!? Satisfaction Guaranteed! http://www.wailstop.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 351 bytes Desc: not available URL: From 0-1y at cancer.org Tue Dec 14 08:48:51 2010 From: 0-1y at cancer.org (dawer@infotech.com.pk) Date: Tue, 14 Dec 2010 20:48:51 +0400 Subject: Watches and Luxury Products on the CHEAP Message-ID: <4323438049.I4PYF294079026@rhbahfnrfa.qmfuiesl.ua> http://www.owemix.ru http://www.slapsteer.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 216 bytes Desc: not available URL: From com at protera.by Tue Dec 14 07:50:30 2010 From: com at protera.by (=?koi8-r?B?7cXOxcTWxdLVINDPIPf85A==?=) Date: Tue, 14 Dec 2010 21:20:30 +0530 Subject: =?koi8-r?B?8yAwMSDRztfB0tEgMjAxMSDJ2s3FzsXOydEg1yDUwc3P1sXOzs/NIMvP?= =?koi8-r?B?xMXL08Uu?= Message-ID: <0C2E2F38D44543D7B315FBA76C286B86@studentmhus29x> 22-23 Декабря > Внимание изменения! Нововведения в таможенном законодательстве: новые формы таможенных деклараций и новый порядок декларирования, контроля и корректировки таможенной стоимости товаров с 01 января 2011 года < код: (четыре девять пять) Ч4/539*68 ; 742_9_i/9.8 Образование Таможенного союза и единой таможенной территории привело к значительным изменениям в таможенном законодательстве. С 1 июля 2010 года вступил в силу Таможенный кодекс Таможенного союза. С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: * новые формы бланков декларации на товары (решение Комиссии таможенного союза №257 от 20 мая 2010 года) и транзитной декларации (решение Комиссии таможенного союза № 289 от 18 июня 2010 года) * инструкция о порядке заполнения декларации на товары (утвержденная в окончательной редакции решением Комиссии таможенного союза №379 от 20 сентября 2010 года) * инструкция о порядке заполнения транзитной декларации (решение Комиссии таможенного союза №289 от 18 июня 2010 года) * новые классификаторы, используемые для заполнения таможенных деклараций (решение Комиссии таможенного союза №378 от 20 сентября 2010 года) * новый порядок декларирования таможенной стоимости и новые формы бланков декларации таможенной стоимости (ДТС и ДТС-1) и корректировки таможенной стоимости и таможенных платежей (КТС) (решение Комиссии таможенного союза № 376 от 20.09.2010 года) Цель: * ознакомить участников ВЭД с особенностями заполнения новых форм деклараций, изменениями в классификаторах, используемых для заполнения таможенных деклараций. * подготовить участников ВЭД к практической работе в условиях действия новых нормативно-правовых документов таможенного союза, регламентирующих вопросы определения, декларирования, контроля и корректировки таможенной стоимости товаров * обсудить проблемы правоприменительной практики по вопросам таможенной стоимости, в том числе дать ответы на вопросы участников ВЭД по актуальным проблемам определения и контроля таможенной стоимости товаров Программа: 1. Новая форма таможенной декларации: особенности заполнения * Изменения в порядке заполнения декларации на товары (ДТ) при декларировании товаров, ввозимых (ввезенных) на таможенную территорию Таможенного союза * Особенности заполнения новой формы декларации на товары, вывозимые с таможенной территории Таможенного союза * Порядок внесения изменений и (или) дополнений в сведения, заявленные в декларации на товары, до и после выпуска товаров * Особенности заполнения графы 47 "Исчисление платежей" 2. Классификаторы и перечни нормативно-справочной информации, используемые для заПолнения таможенных деклараций. Основные изменения. 3. Транзитная декларация: новая форма и правила ее заполнения. 4. Особенности электронного и интернет декларирования. 5. Законодательство Таможенного союза по вопросам таможенной стоимости товаров * Таможенный кодекс Таможенного союза * Соглашение по определению таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза; * Решения Комиссии таможенного союза по вопросам таможенной стоимости товаров: * порядок декларирования таможенной стоимости товаров * порядок контроля таможенной стоимости товаров * порядок корректировки таможенной стоимости товаров * новые формы бланков декларации (ДТС и ДТС-1) и корректировки таможенной стоимости (КТС). 6. Практические проблемы заявления, контроля и корректировки таможенной стоимости товаров * решения, принимаемые таможенными органами в ходе таможенного контроля * дополнительная проверка заявленной таможенной стоимости товаров * корректировка таможенной стоимости товаров * порядок обжалования в арбитражных судах решений таможенных органов по вопросам корректировки таможенной стоимости Информацию можно получить по телефонам: +7 (Ч95) Ч4/5З9/68 \\\/// ЧЧ5_З2_66 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7383 bytes Desc: not available URL: From case at sdf.lonestar.org Tue Dec 14 15:36:01 2010 From: case at sdf.lonestar.org (John Case) Date: Tue, 14 Dec 2010 23:36:01 +0000 (UTC) Subject: OpenBSD IPSEC backdoor(s) Message-ID: http://marc.info/?l=openbsd-tech&m=129236621626462&w=2 From company at library.madi.ru Tue Dec 14 22:04:55 2010 From: company at library.madi.ru (Charley Ash) Date: Wed, 15 Dec 2010 08:04:55 +0200 Subject: =?koi8-r?B?IvDP0sXe2MUiLCLywc3FztPLz8UiINPBzsHUz9LJySDwz8TNz9PLz9fY?= =?koi8-r?B?0Swg8s/WxMXT1NfPISEh?= Message-ID: Тел.: 637-21-28, 695-28-04 Новый год 2011 год!!! РОЖДЕСТВО САНАТОРИЙ "ПОРЕЧЬЕ" Расположение: в 45 км от Москвы в пригороде Звенигорода, в лесном массиве на берегу Москвы-реки. Размещение: Трехэтажные кирпичные корпуса № 5, 7. Лечение: опорно-двигательного аппарата, сердечно-сосудистой и нервной систем, органов пищеварения и органов выделения. К услугам отдыхающих: сауна с мини-бассейном, бильярд, кинозал, настольный теннис, дискотеки, бар, ресторан, охраняемая стоянка. Экскурсии за дополнительную плату. Питание: 3-х разовое в столовой санатория. Категория номера Стоимость с 01.01.2011г. по 09.01.2011г. в рублях на 1 человека. 01.01.(уж.) - 08.01.(об.)2011г. 02.01.(об.) - 09.01.(зв.)2011г. 02.01.(об.) - 08.01.(зв.)2011г. 1 сутки 7 дней 6 дней Корпус № 5, 7 Одноместный 1 930 13 510 11 580 Двухместный 1 600 11 200 9 600 Двухкомнатный двухместный 2 030 14 210 12 180 Дополнительное место 990 6 930 5 940 Корпус № 6 Двухместный 1 этаж - при размещении 1 человека 2 640 18 480 15 840 - при размещении 2 человек 1 930 13 510 11 580 Двухместный 2, 3-й этаж - при размещении 1 человека 3 100 21 700 18 600 - при размещении 2 человек 2 030 14 210 12 180 Двухкомнатный двухместный, 1, 2, 3-й этаж. - при размещении 1 человека 4 200 29 400 25 200 - при размещении 2 человек 2 500 17 500 15 000 Дополнительное место 1 100 7 700 6 600 В стоимость входит: проживание, питание, лечение, праздничная анимационная программа, охраняемая автостоянка. Скидки: детям до 12 лет на основное место – 10%. Расчетный час: заезд 01.01.2011г. в 16.30; выезд 08, 09 или 10.01.2011г. в 16.30. заезд 02.01.2011г. в 12.00; выезд 08, 09 или 10.01.2011г. в 12.00. САНАТОРИЙ "Дружба" Расположение: на берегу Клязьминского водохранилища, в 10 км. от Москвы по Дмитровскому шоссе. Размещение: Современный 4-этажный кирпичный корпус. 1-комнатный 2-местный «Стандарт» - душ, туалет, телевизор, холодильник и балкон. Лечение: заболеваний сердечно-сосудистой системы, органов дыхания, опорно-двигательного аппарата, нервной системы. К услугам отдыхающих: 25-метровый бассейн с сауной, спортивный зал, пункт проката лыж и коньков. Разнообразные развлекательные программы, кинозал, библиотека, танцевальные вечера, концерты, дискотеки, экскурсии. Питание: 4-разовое в столовой санатория. Категория номера Стоимость за заезд на человека в рублях. "Новый год" 31.12 (об.)–03.01.(зв.) 4 дня / 3 ночи "Рождество" 03.01 (уж.) -10.01 (об.) 7дней / 6 ночей 2-х местный номер 10 900 13 650 В стоимость входит: проживание, 3-х разовое питание, Новогодний банкет, программа. Скидки: Дети: от 3 до 14 лет на дополнительном месте – 50%. Расчетный час: "Новый год" - 12.00 часов, "Рождество" - 17-00 часов. Тел.: 637-21-28, 695-28-04 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 14776 bytes Desc: not available URL: From jlucina_gw at pelicanhotel.com Wed Dec 15 07:41:41 2010 From: jlucina_gw at pelicanhotel.com (Jenice Lucina) Date: Wed, 15 Dec 2010 08:41:41 -0700 Subject: .PenisLong, used & recommended by Sex industry professionals, Buy this effective herbal EnlargementPills dl Message-ID: <4D08E1B5.64066D06@pelicanhotel.com> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://joinpark.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 717 bytes Desc: not available URL: From jya at pipeline.com Wed Dec 15 08:23:52 2010 From: jya at pipeline.com (John Young) Date: Wed, 15 Dec 2010 11:23:52 -0500 Subject: The inhumane conditions of Bradley Manning's detention In-Reply-To: <20101215151737.GI9434@leitl.org> Message-ID: Greenwald is a humorist at best, and a publicist at worst, a trained shark advocating his client's interest by the media. Same as those shilling for Assange to promote their services -- which never involve going to jail and discomfort except when attention wane. A full-blown, no pun, Media Ho. Military brigs are that, not civilian prisons, not movies and pederastic fantasies. Their regulations are online, including that for Quantico Marine Brig, nothing secret about them. Glenn seems not to have read the regs, or found them too inmate-considerate and is lying as trained to do. Manning is not in the kind of comical isolation Greenwald hoots. He receives regular visits from his family and his legal team. He sees medical staff, janitorial staff, guards and their overseers, the military legal team and its Inspector General. Visits from gawking officers and civilians eyeing the celebrity inmate to be sure there will be no grounds for neglect or abuse, which is media-driven defense SOP. What Manning luckily avoids is guard duty, kitchen police, vile MREs and miscooked slop, foot and crotch rot, lice, bedbugs and scabies, STDs if fatihful to his hands and does not pig-kiss the guards for favors, parades and field marches and bivouacs, getting coffee for his hung-over officers, enduring homophobes, unit inspections, armaments practice, stenching squad rooms, sadistic harassment by non-com and officer lifers, sand storms and leaking and muddy tent cities, burning fecal waste and scrubbing latrines, dropping the soap taunts, incoming fire and IEDs, trooper drunks, thieves, rapists, murderers, smokers and weightlifters. Visiting generals and politicians, inane work and toxic working conditions, on and on, kind of like what Glenn experienced in torturous law school, slave-driving law firm and neurotic love shack in Brazil. This is not to suggest that Manning should not be out of jail, but is threatened by those who want him there for their own purposes, his supporters and opponents. To them he is more valuable outside than in to these predators as Assange now appreciates. Manning and Assange share the ambition for jail time as premium PR, both have bragged about that, claim to have studied the success of a long-line of role models. Manning confessed to Lamo with that in mind. Did Assange use the women for that, nah, too obvious. The trials will be shows of prolonged ecstacy among the hordes, uh, Hos. From eugen at leitl.org Wed Dec 15 06:34:25 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 15 Dec 2010 15:34:25 +0100 Subject: US prof behind EVM study deported on arrival Message-ID: <20101215143425.GY9434@leitl.org> ----- Forwarded message from Frederick Noronha ----- From moritz at torservers.net Wed Dec 15 06:43:38 2010 From: moritz at torservers.net (Moritz Bartl) Date: Wed, 15 Dec 2010 15:43:38 +0100 Subject: Visualization: Tor nodes on Google Maps and Google Earth Message-ID: Hi, I wrote a small ugly Python script to visualize Tor relays on Google Maps and Google Earth. You can see the result here: * Open KML file in Google Maps: http://maps.google.com/maps?q=http:%2F%2Fwww.torservers.net%2Fmisc%2Ftormap%2Ftormap.kml * Download tormap.kml for Google Earth http://www.torservers.net/misc/tormap/tormap.kml The KML standard is being pushed by Google and should work for OpenStreetMap, too, but I couldn't get it to load there. Feel free to modify the script to generate other outputs. The initial idea was to scale the marker size to show the relay's bandwidth, but Google Maps does not support this. The markers might give a false impression of accuracy. Most IPs can only be tracked to city level (or even region), ie. the markers are somewhat near, not necessarily at the real location of the relay. You can download the script here: http://www.torservers.net/misc/tormap/tormap.py (LGPL) This is a one-time snapshot and I will not update it regularly, unless there is public interest to do so. The bandwidth categories are based on the reported "observed bandwidth" at the time of creation, so the actual number of high bandwidth nodes will fluctuate every time the script is run. It would be nice to extend this script to use longer-term bandwidth calculation like TorStatus does, and to generate a map over time using all the consensus data provided at http://archive.torproject.org/. An example of what this could look like is Vis4Net's Wikileaks Mirror World Map at http://labs.vis4.net/wikileaks/mirrors/ . ( Mostly copied from my blog at http://moblog.wiredwings.com/archives/20101213/Visualization-Tor-nodes-on-Google-Maps-and-Google-Earth.html ) -- Moritz http://www.torservers.net/ *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Dec 15 06:47:34 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 15 Dec 2010 15:47:34 +0100 Subject: Visualization: Tor nodes on Google Maps and Google Earth Message-ID: <20101215144734.GE9434@leitl.org> ----- Forwarded message from Moritz Bartl ----- From eugen at leitl.org Wed Dec 15 07:17:37 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 15 Dec 2010 16:17:37 +0100 Subject: The inhumane conditions of Bradley Manning's detention Message-ID: <20101215151737.GI9434@leitl.org> http://www.salon.com/news/opinion/glenn_greenwald/2010/12/14/manning The inhumane conditions of Bradley Manning's detention By Glenn Greenwald * The inhumane conditions of Bradley Manning's detention Reuters/Jonathon Burch/AP/Salon (updated below) Bradley Manning, the 22-year-old U.S. Army Private accused of leaking classified documents to WikiLeaks, has never been convicted of that crime, nor of any other crime. Despite that, he has been detained at the U.S. Marine brig in Quantico, Virginia for five months -- and for two months before that in a military jail in Kuwait -- under conditions that constitute cruel and inhumane treatment and, by the standards of many nations, even torture. Interviews with several people directly familiar with the conditions of Manning's detention, ultimately including a Quantico brig official (Lt. Brian Villiard) who confirmed much of what they conveyed, establishes that the accused leaker is subjected to detention conditions likely to create long-term psychological injuries. Since his arrest in May, Manning has been a model detainee, without any episodes of violence or disciplinary problems. He nonetheless was declared from the start to be a "Maximum Custody Detainee," the highest and most repressive level of military detention, which then became the basis for the series of inhumane measures imposed on him. >From the beginning of his detention, Manning has been held in intensive solitary confinement. For 23 out of 24 hours every day -- for seven straight months and counting -- he sits completely alone in his cell. Even inside his cell, his activities are heavily restricted; he's barred even from exercising and is under constant surveillance to enforce those restrictions. For reasons that appear completely punitive, he's being denied many of the most basic attributes of civilized imprisonment, including even a pillow or sheets for his bed (he is not and never has been on suicide watch). For the one hour per day when he is freed from this isolation, he is barred from accessing any news or current events programs. Lt. Villiard protested that the conditions are not "like jail movies where someone gets thrown into the hole," but confirmed that he is in solitary confinement, entirely alone in his cell except for the one hour per day he is taken out. * Continue reading In sum, Manning has been subjected for many months without pause to inhumane, personality-erasing, soul-destroying, insanity-inducing conditions of isolation similar to those perfected at America's Supermax prison in Florence, Colorado: all without so much as having been convicted of anything. And as is true of many prisoners subjected to warped treatment of this sort, the brig's medical personnel now administer regular doses of anti-depressants to Manning to prevent his brain from snapping from the effects of this isolation. Just by itself, the type of prolonged solitary confinement to which Manning has been subjected for many months is widely viewed around the world as highly injurious, inhumane, punitive, and arguably even a form of torture. In his widely praised March, 2009 New Yorker article -- entitled "Is Long-Term Solitary Confinement Torture?" -- the surgeon and journalist Atul Gawande assembled expert opinion and personal anecdotes to demonstrate that, as he put it, "all human beings experience isolation as torture." By itself, prolonged solitary confinement routinely destroys a personbs mind and drives them into insanity. A March, 2010 article in The Journal of the American Academy of Psychiatry and the Law explains that "solitary confinement is recognized as difficult to withstand; indeed, psychological stressors such as isolation can be as clinically distressing as physical torture." For that reason, many Western nations -- and even some non-Western nations notorious for human rights abuses -- refuse to employ prolonged solitary confinement except in the most extreme cases of prisoner violence. "Itbs an awful thing, solitary," John McCain wrote of his experience in isolated confinement in Vietnam. bIt crushes your spirit." As Gawande documented: "A U.S. military study of almost a hundred and fifty naval aviators returned from imprisonment in Vietnam . . . reported that they found social isolation to be as torturous and agonizing as any physical abuse they suffered." Gawande explained that Americabs application of this form of torture to its own citizens is what spawned the torture regime which President Obama vowed to end: This past year, both the Republican and the Democratic Presidential candidates came out firmly for banning torture and closing the facility in GuantC!namo Bay, where hundreds of prisoners have been held in years-long isolation. Neither Barack Obama nor John McCain, however, addressed the question of whether prolonged solitary confinement is torture. . . . This is the dark side of American exceptionalism. . . . Our willingness to discard these standards for American prisoners made it easy to discard the Geneva Conventions prohibiting similar treatment of foreign prisoners of war, to the detriment of Americabs moral stature in the world. In much the same way that a previous generation of Americans countenanced legalized segregation, ours has countenanced legalized torture. And there is no clearer manifestation of this than our routine use of solitary confinement . . . . It's one thing to impose such punitive, barbaric measures on convicts who have proven to be violent when around other prisoners; at the Supermax in Florence, inmates convicted of the most heinous crimes and who pose a threat to prison order and the safety of others are subjected to worse treatment than what Manning experiences. But it's another thing entirely to impose such conditions on individuals, like Manning, who have been convicted of nothing and have never demonstrated an iota of physical threat or disorder. In 2006, a bipartisan National Commission on America's Prisons was created and it called for the elimination of prolonged solitary confinement. Its Report documented that conditions whereby "prisoners end up locked in their cells 23 hours a day, every day. . . is so severe that people end up completely isolated, living in what can only be described as torturous conditions." The Report documented numerous psychiatric studies of individuals held in prolonged isolation which demonstrate "a constellation of symptoms that includes overwhelming anxiety, confusion and hallucination, and sudden violent and self-destructive outbursts." The above-referenced article from the Journal of the American Academy of Psychiatry and the Law states: "Psychological effects can include anxiety, depression, anger, cognitive disturbances, perceptual distortions, obsessive thoughts, paranoia, and psychosis." When one exacerbates the harms of prolonged isolation with the other deprivations to which Manning is being subjected, long-term psychiatric and even physical impairment is likely. Gawande documents that "EEG studies going back to the nineteen-sixties have shown diffuse slowing of brain waves in prisoners after a week or more of solitary confinement." Medical tests conducted in 1992 on Yugoslavian prisoners subjected to an average of six months of isolation -- roughly the amount to which Manning has now been subjected -- "revealed brain abnormalities months afterward; the most severe were found in prisoners who had endured either head trauma sufficient to render them unconscious or, yes, solitary confinement. Without sustained social interaction, the human brain may become as impaired as one that has incurred a traumatic injury." Gawande's article is filled with horrifying stories of individuals subjected to isolation similar to or even less enduring than Manning's who have succumbed to extreme long-term psychological breakdown. Manning is barred from communicating with any reporters, even indirectly, so nothing he has said can be quoted here. But David House, a 23-year-old MIT researcher who befriended Manning after his detention (and then had his laptops, camera and cellphone seized by Homeland Security when entering the U.S.) is one of the few people to have visited Manning several times at Quantico. He describes palpable changes in Manning's physical appearance and behavior just over the course of the several months that he's been visiting him. Like most individuals held in severe isolation, Manning sleeps much of the day, is particularly frustrated by the petty, vindictive denial of a pillow or sheets, and suffers from less and less outdoor time as part of his one-hour daily removal from his cage. This is why the conditions under which Manning is being detained were once recognized in the U.S. -- and are still recognized in many Western nations -- as not only cruel and inhumane, but torture. More than a century ago, U.S. courts understood that solitary confinement was a barbaric punishment that severely harmed the mental and physical health of those subjected to it. The Supreme Court's 1890 decision in In re Medley noted that as a result of solitary confinement as practiced in the early days of the United States, many "prisoners fell, after even a short confinement, into a semi-fatuous condition . . . and others became violently insane; others still, committed suicide; while those who stood the ordeal better . . . [often] did not recover sufficient mental activity to be of any subsequent service to the community." And in its 1940 decision in Chambers v. Florida, the Court characterized prolonged solitary confinement as "torture" and compared it to "[t]he rack, the thumbscrew, [and] the wheel." The inhumane treatment of Manning may have international implications as well. There are multiple proceedings now pending in the European Union Human Rights Court, brought by "War on Terror" detainees contesting their extradition to the U.S. on the ground that the conditions under which they likely will be held -- particularly prolonged solitary confinement -- violate the European Convention on Human Rights, which (along with the Convention Against Torture) bars EU states from extraditing anyone to any nation where there is a real risk of inhumane and degrading treatment. The European Court of Human Rights has in the past found detention conditions violative of those rights (in Bulgaria) where "the [detainee] spent 23 hours a day alone in his cell; had limited interaction with other prisoners; and was only allowed two visits per month." From the Journal article referenced above: International treaty bodies and human rights experts, including the Human Rights Committee, the Committee against Torture, and the U.N. Special Rapporteur on Torture, have concluded that solitary confinement may amount to cruel, inhuman, or degrading treatment in violation of the International Covenant on Civil and Political Rights and the Convention against Torture and other Cruel, Inhuman, and Degrading Treatment or Punishment. They have specifically criticized supermax confinement in the United States because of the mental suffering it inflicts. Subjecting a detainee like Manning to this level of prolonged cruel and inhumane detention can thus jeopardize the ability of the U.S. to secure extradition for other prisoners, as these conditions are viewed in much of the civilized world as barbaric. Moreover, because Manning holds dual American and U.K. citizenship (his mother is British), it is possible for British agencies and human rights organizations to assert his consular rights against these oppressive conditions. At least some preliminary efforts are underway in Britain to explore that mechanism as a means of securing more humane treatment for Manning. Whatever else is true, all of this illustrates what a profound departure from international norms is the treatment to which the U.S. Government is subjecting him. * * * * * The plight of Manning has largely been overshadowed by the intense media fixation on WikiLeaks, so it's worth underscoring what it is that he's accused of doing and what he said in his own reputed words about these acts. If one believes the authenticity of the highly edited chat logs of Manning's online conversations with Adrian Lamo that have been released by Wired (that magazine inexcusably continues to conceal large portions of those logs), Manning clearly believed that he was a whistle-blower acting with the noblest of motives, and probably was exactly that. If, for instance, he really is the leaker of the Apache helicopter attack video -- a video which sparked very rare and much-needed realization about the visceral truth of what American wars actually entail -- as well as the war and diplomatic cables revealing substantial government deceit, brutality, illegality and corruption, then he's quite similar to Daniel Ellsberg. Indeed, Ellsberg himself said the very same thing about Manning in June on Democracy Now in explaining why he considers the Army Private to be a "hero": The fact is that what Lamo reports Manning is saying has a very familiar and persuasive ring to me. He reports Manning as having said that what he had read and what he was passing on were horrible -- evidence of horrible machinations by the US backdoor dealings throughout the Middle East and, in many cases, as he put it, almost crimes. And let me guess that -- hebs not a lawyer, but I'll guess that what looked to him like crimes are crimes, that he was putting out. We know that he put out, or at least it's very plausible that he put out, the videos that he claimed to Lamo. And that's enough to go on to get them interested in pursuing both him and the other. And so, what it comes down, to me, is -- and I say throwing caution to the winds here -- is that what I've heard so far of Assange and Manning -- and I haven't met either of them -- is that they are two new heroes of mine. To see why that's so, just recall some of what Manning purportedly said about why he chose to leak, at least as reflected in the edited chat logs published by Wired: Lamo: what's your endgame plan, then?. . . Manning: well, it was forwarded to [WikiLeaks] - and god knows what happens now - hopefully worldwide discussion, debates, and reforms - if not, than [sic] we're doomed - as a species - i will officially give up on the society we have if nothing happens - the reaction to the video gave me immense hope; CNN's iReport was overwhelmed; Twitter exploded - people who saw, knew there was something wrong . . . Washington Post sat on the videob& David Finkel acquired a copy while embedded out here. . . . - i want people to see the truthb& regardless of who they areb& because without information, you cannot make informed decisions as a public. if i knew then, what i knew now - kind of thing, or maybe im just young, naive, and stupid . . . im hoping for the former - it cant be the latter - because if it isb& were fucking screwed (as a society) - and i dont want to believe that webre screwed. Manning described the incident which first made him seriously question the U.S. Government: when he was instructed to work on the case of Iraqi "insurgents" who had been detained for distributing so-called "insurgent" literature which, when Manning had it translated, turned out to be nothing more than "a scholarly critique against PM Maliki": i had an interpreter read it for meb& and when i found out that it was a benign political critique titled "Where did the money go?" and following the corruption trail within the PMbs cabinetb& i immediately took that information and *ran* to the officer to explain what was going onb& he didnbt want to hear any of itb& he told me to shut up and explain how we could assist the FPs in finding *MORE* detaineesb& i had always questioned the things worked, and investigated to find the truthb& but that was a point where i was a *part* of somethingb& i was actively involved in something that i was completely againstb& And Manning explained why he never considered the thought of selling this classified information to a foreign nation for substantial profit or even just secretly transmitting it to foreign powers, as he easily could have done: Manning: i mean what if i were someone more malicious- i could've sold to russia or china, and made bank? Lamo: almost as reviled around the world, as the waterboard, hypothermia and other Bush-era tactics that caused so much controversy. What all of this achieves is clear. Having it known that the U.S. could and would disappear people at will to "black sites," assassinate them with unseen drones, imprison them for years without a shred of due process even while knowing they were innocent, torture them mercilessly, and in general acts as a lawless and rogue imperial power created a climate of severe intimidation and fear. Who would want to challenge the U.S. Government in any way -- even in legitimate ways -- knowing that it could and would engage in such lawless, violent conduct without any restraints or repercussions? That is plainly what is going on here. Anyone remotely affiliated with WikiLeaks, including American citizens (and plenty of other government critics), has their property seized and communications stored at the border without so much as a warrant. Julian Assange -- despite never having been charged with, let alone convicted of, any crime -- has now spent more than a week in solitary confinement with severe restrictions under what his lawyer calls "Dickensian conditions." But Bradley Manning has suffered much worse, and not for a week, but for seven months, with no end in sight. If you became aware of secret information revealing serious wrongdoing, deceit and/or criminality on the part of the U.S. Government, would you -- knowing that you could and likely would be imprisoned under these kinds of repressive, torturous conditions for months on end without so much as a trial: just locked away by yourself 23 hours a day without recourse -- be willing to expose it? That's the climate of fear and intimidation which these inhumane detention conditions are intended to create. * * * * * Those wishing to contribute to Bradley Manning's defense fund can do so here. All of those means are reputable, but everyone should carefully read the various options presented in order to decide which one seems best. UPDATE: I was contacted by Lt. Villiard, who claims there is one factual inaccuracy in what I wrote: specifically, he claims that Manning is not restricted from accessing news or current events during the proscribed time he is permitted to watch television. That is squarely inconsistent with reports from those with first-hand knowledge of Manning's detention, but it's a fairly minor dispute in the scheme of things. From fredericknoronha at gmail.com Wed Dec 15 03:56:10 2010 From: fredericknoronha at gmail.com (Frederick Noronha) Date: Wed, 15 Dec 2010 17:26:10 +0530 Subject: US prof behind EVM study deported on arrival Message-ID: US prof behind EVM study deported on arrival 13 Comments An American computer scientist, J Alex Halderman, who had co-authored a study titled bIndiabs EVMs are vulnerable to fraudb, was not allowed to enter the country after landing at the Indira Gandhi International (IGI) Airport here on Sunday evening. Airport sources said he would be deported, but offered no reason for the action. Speaking to The Indian Express from the airport, Halderman said: bI am about to be thrown out of this country and there is no reason anyone is giving me. There is just no explanation, they are not letting me enter.b Halderman, an assistant professor of electrical engineering and computer sciences at the University of Michigan, was here to attend a technical conference in Gujarat. In February this year, top researchers from India, US and Netherlands, had come up with a study which said that EVMs are prone to tampering. Halderman and his Indian co-author, Hari K Prasad, were part of the group. Earlier, the Election Commission had challenged Prasad to demonstrate how EVMs could be tampered with. The EC, however, withheld access to the EVMs. In his blog about the study, Halderman wrote: bDespite widespread reports of election irregularities and suspicions of electronic fraud, the Election Commission has never permitted security researchers to complete an independent evaluation. Hari and others in India repeatedly offered to collaborate with the Election Commission to better understand the security of the machines, but they were not permitted to complete a serious review.b He added: bIndian election authorities have repeatedly claimed that the machines are btamperproof,b but we demonstrated important vulnerabilities by studying a machine provided by an anonymous source. The story took a disturbing turn when my co-author, Hari Prasad, was arrested by Indian authorities demanding to know the identity of that source.b http://www.indianexpress.com/news/us-prof-behind-evm-study-deported-on-arrival/723897/0 # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From 0-ka at pogo.com Wed Dec 15 07:55:12 2010 From: 0-ka at pogo.com (Buy_~V1agra~Here) Date: Wed, 15 Dec 2010 17:55:12 +0200 Subject: Are you running out of Pineetmhrne? Message-ID: <7072587062.4YD2IIJH937499@ymkhsxjfkbgq.czdcbcfau.tv> Why not try it out? Follow the link to Order http://www.wailstop.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 248 bytes Desc: not available URL: From hunter_911 at reankom.ru Wed Dec 15 08:13:37 2010 From: hunter_911 at reankom.ru (=?koi8-r?B?5cbSz9PJzsnR?=) Date: Wed, 15 Dec 2010 18:13:37 +0200 Subject: =?koi8-r?B?8M/e1M/XwdEgxM/T1MHXy8Eg0MnTxc0=?= Message-ID: Предлагаем качественную доставку рекламы Базы адресов постоянно обновляются Очень гибкая система скидок постоянным клиентам до 50% При заказе 2х рассылок, 3я бесплатная; Подготовка макета бесплатно; Быстрый выход рассылки, по желанию день в день; Самый массовый охват целевой аудитории Пробив фильтров. Любые формы оплаты; Каждая рассылка перед отправкой тестируется; Москва от 2 тыс руб. Россия от 3000 руб. Страны СНГ от 2,5 тыс руб. Наши цены самые альтернативные, закажите у Нас и Вы будете удивлены качеством обслуживания. Формируем базы под каждое направление, продукт реализации. Фокусировка себя полностью оправдывает. тел: +7 (964) 7О2-3685 From eugen at leitl.org Wed Dec 15 11:54:26 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 15 Dec 2010 20:54:26 +0100 Subject: EDRi-gram newsletter - Number 8.24, 15 December 2010 Message-ID: <20101215195426.GL9434@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From edrigram at edri.org Wed Dec 15 11:24:36 2010 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 15 Dec 2010 21:24:36 +0200 Subject: EDRi-gram newsletter - Number 8.24, 15 December 2010 Message-ID: ============================================================ EDRi-gram biweekly newsletter about digital civil rights in Europe Number 8.24, 15 December 2010 ============================================================ Contents ============================================================ Bonus EDRi-gram 1. Rule of law in the hands of private companies.Wikileaks is just the start 2. Data Retention Directive evaluation: expect the unexpected? 3. Commission finds solution on notice and takedown and it seeks the problem 4. ECJ to discuss the case of eBay & trademark infringement 5. Council text on web blocking - breaking the law to fight crime 6. French law Loppsi 2 under debate again 7. Privacy Platform Meeting 8. Sweden's high court sends IP-data protection conflict to the ECJ 9. ENDitorial: WIPO SCCR 21 session 10. Recommended Action 11. Recommended Reading 12. Agenda 13. About ============================================================ Bonus EDRi-gram ============================================================ This is the last regular issue of EDRi-gram for 2010. For the good boys and girls a special BONUS EDRi-gram will be sent just a few days before Christmas. :-) The next regular issue of EDRi-gram, number 9.1, will be published on 12 January 2011. ============================================================ 1. Rule of law in the hands of private companies.Wikileaks is just the start ============================================================ Private-sector attempts to undermine and attack the ability of WikiLeaks to function on the Internet have attracted much attention. Their domain name (wikileaks.org) was was taken out of service by EveryDNS, their ability to collect funds was restricted by Paypal, Visa and Mastercard while Amazon deleted their website. When did we abandon the rule of law and replace it with summary justice meted out by private companies? How does it happen that private companies can punish a website that has never been convicted of a crime? Why would they do this? The truth is that there have been years of "behind-the-scenes" efforts by (mostly western) governments to persuade, reward or coerce Internet companies into developing censorship structures. Under the harmless-sounding flag of "self-regulation," and demands that Internet providers take more responsibility for illegal online activity, a comprehensive infrastructure is being put in place. The purpose of this infrastructure is to hand over quasi-judicial responsibilities to private companies, which, less bound by the obligations imposed on courts, impose summary justice on those accused of illegal activity online. This action can be to have payments being blocked by payment providers, websites deleted and Internet traffic filtered by Internet providers, slowly and imperceptibly eroding the rule of law. While western governments must respect their constitutions, life becomes much simpler when private companies can take extra-judicial action against uncomfortable online information. Even before WikiLeaks had been heard of by anyone in Europe except geeks, the European Commission had launched proposals for European web hosting companies to take extra-judicial action to delete websites without judicial authority (helpfully suggesting that they give themselves licence to do so in their terms of service), online trading platforms to ban people accused of counterfeiting from online trade, Internet access providers to filter peer to peer traffic in order to delete anything that might not be authorised by copyright owners and mobile phone companies to block alleged illegal content from their networks. This is not just a European phenomenon. The EU negotiated the Anti-Counterfeiting Trade Agreement with countries around the world. This agreement suggests extra-judicial "cooperation" between Internet providers and copyright owners to police and punish alleged infringements. The Organisation for Economic Cooperation and Development has launched a major project on the role of Internet intermediaries in "achieving public policy objectives". The Organisation for Security and Cooperation in Europe actively welcomes an approach where the only punishment for the publication of racist material online is the extra-judicial deletion of the websites containing the material. The list goes on. Unfortunately, this trend for governments to outsource regulation of the Internet is happening at a moment when Internet companies are increasingly open to such requests. Companies like Virgin and Deutsche Telekom/T-Mobile are campaigning for the right to interfere in Internet traffic for their own commercial purposes. Virgin has announced plans to implement technology to open every packet of data sent to or received from its consumers in order to police possible copyright infringements, which would undermine its music business. Deutsche Telekom has also signaled its intention to restrict access of its customers to high-bandwidth sites. Earlier this year, its CEO reportedly demanded that Google be required to pay for the bandwidth used to access its services. The increasing willingness of the largest Internet providers to interfere with their customers' traffic for business purposes obviously creates dangers for competition, innovation and free speech - dangers that would normally inspire government intervention for the good of society. Instead there appears to be a silent agreement - Internet companies will gradually undertake extra policing activities and, in return, they will be left free to slowly dismantle the openness that is at the heart of its value for democratic society. Deutsche Telekom moves against Apple, Google and net neutrality (7.04.2010) http://www.dw-world.de/dw/article/0,,5439525,00.html Virgin Media to trial filesharing monitoring system (26.11.2010) http://www.theregister.co.uk/2009/11/26/virgin_media_detica EDRi-gram: E-Commerce directive: ensure freedom of expression and due process of law (17.11.2010) http://www.edri.org/edrigram/number8.22/edri-e-commerce-directive-consultation EDRi-gram: EDRi and EuroISPA attack EC's demands for notice and takedown (28.07.2010) http://www.edri.org/edrigram/number8.15/edri-euroispa-notice-takedown-comission (Contribution by Joe McNamee - EDRi) ============================================================ 2. Data Retention Directive evaluation: expect the unexpected? ============================================================ The evaluation of the controversial Data Retention Directive takes an unexpected turn, for the worse. At a crucial one-day conference in Brussels on 3 December 2010, aimed at gathering input for the evaluation, long-term critic of the Directive Commissioner Malmstrvm (DG Home Affairs) surprisingly announced that "data retention is here to stay". The statement not only disregards legal developments since 2005, the damage done by telecommunications data retention to 500 million Europeans and the lack of evidence that such a measure is necessary and proportionate. On top of that, the Commissioner undermines the entire evaluation process and the evidence-based decision making itself. To great risk, because our fundamental freedoms and the very nature of our free and open societies is at stake. Nevertheless, the unexpected statements of the Commissioner could turn out to be momentary. Each member of the Commission swore, for the first time in history, a legally binding oath before the European Court of Justice to respect the Fundamental Rights Charter on 3 May of this year. In 2011, the same European Court of Justice will rule on the constitutionality of the principle of data retention, after a referral of this question by the Irish High Court. The Commission might realize in time that it will lose its credibility, once the Court - taking note of the ECJ Schecke ('86) and ECtHR Marper ('119-125) judgements - rules data retention in breach of our fundamental rights to privacy. Better stand up for the rights of 500 million citizens now, than feeling sorry afterwards. "We shouldn't put the privacy of all citizens at risk", Commissioner Reding (Justice, Fundamental Rights and Citizenship) told Dutch newspaper NRC Handelsblad recently. So the Commission is divided on this controversial issue. In the evaluation report, to be published in the first quarter of 2011, the entire Commission will have its say. Is data retention here to stay? We might as well expect the unexpected. Entire report of the conference "Taking on the Data Retention Directive" (8.12.2010) https://www.bof.nl/2010/12/08/data-retention-directive-evaluation-expect-the-unexpected/ EDRi's keynote lecture at the conference "What does the European Commission owe 500 million Europeans?" (3.12.2010) http://www.edri.org/files/Data_Retention_Conference_031210final.pdf Cecilia Malmstrvm Member of the European Commission responsible for Home Affairs Taking on the Data Retention Directive European Commission conference in Brussels (3.12.2010) http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/10/723 (Contribution by Axel Arnbak - EDRi-member Bits of Freedom - Netherlands) ============================================================ 3. Commission finds solution on notice and takedown and it seeks the problem ============================================================ On 15 December 2009, the European Commission held its third meeting on "public private cooperation to counter the dissemination of illegal content in the European Union. The first meeting took place in November 2009 and the second in May 2010. After the previous meeting, the European Commission received written comments jointly from EDRi and EuroISPA as well as a variety of industry players. Six months later, the Commission finally reacted to that feedback, sending participants revised recommendations on the evening before the meeting. The Commission tried to open discussions on its recommendations for extra-judicial takedown of material that has been accused of being illegal, on grounds of containing child abuse, racism/xenophobia or terrorist content. However, both industry and EDRi demanded repeatedly that the Commission finally should define the problems that it believes it is addressing by this initiative. Unfortunately, the Commission steadfastly refused to do this. The Commission also choose not to answer a direct question as to how this initiative complies with either Article 10 of the European Convention on Human Rights (which requires a legal basis for interferences with communication) and the 2003 Interinstitutional Agreement, which obliges the Commission not to promote co- or self-regulatory measures in relation to matters of significance to fundamental rights. In the afternoon session, DG Information Society of the European Commission explicitly stated that some Member States do not devote adequate resources to addressing online child abuse and that it is "at the bottom of the (priority) list" in some European countries. As a result, the Commission is focusing on takedown of the criminal websites and is developing statistical tools to assess the speed with which sites are deleted. Contradicting repeated statements about the "need" to block websites in the USA, Russia and Ukraine, the Commission explained that significant progress was being made in those countries. This may not necessarily be such good news - exporting a system where criminals are "punished" by having their websites deleted rather than facing a judicial procedure in full respect of the rule of law does little to respect the EU's obligation to support democracy and the rule of law internationally. The Commission then invited an anti-spam initiative in order to allegedly demonstrate how Internet intermediaries can regulate the online environment. The meeting closed with industry stressing the lack of clarity about where the process was meant to go, the relevance of the "recommendations" published by the Commission and the fact that lack of resources in law enforcement agencies cannot be solved by industry actions. The Commission may or may not provide more guidance on whatever problem that this process is supposed to solve, but asks for industry input on this. Comments are requested by the end of January, with a working group meeting planned for February and another "plenary" meeting in April. Draft Recommendations http://www.edri.org/files/draft_recommendations.pdf EDRi-gram: Joint EDRi/EuroISPA response to previous round of consultations (28.07.2010) http://www.edri.org/edrigram/number8.15/edri-euroispa-notice-takedown-comission (Contribution by Joe McNamee - EDRi) ============================================================ 4. ECJ to discuss the case of eBay & trademark infringement ============================================================ In the case introduced by L'Oreal against auction site eBay and referred by the High Court of Justice (England and Wales) to the European Court of Justice (ECJ) the Advocate General, Niilo Jaaskinen, published on 9 December 2010 its opinion that the site could not be considered liable for trademark infringement committed by its users in case it was not expressly notified regarding such infringements. However, in case electronic marketplaces, such as eBay, do not take measures to stop a trademark infringement when notified of it, they will no longer be except from liability: "Regarding the same user and the same trade mark an operator of an electronic marketplace has actual knowledge in a case where the same activity continues in the form of subsequent listings and can also be required to disable access to the information the user uploads in the future. In other words, exemption from liability does not apply in cases where the electronic marketplace operator has been notified of infringing use of a trade mark, and the same user continues or repeats the same infringement," says the Advocate General. In 2007, L'Orial notified eBay of its concerns about the sale of its goods on eBay's European websites and, dissatisfied with the site's answer, brought a legal action against eBay in Belgium, Britain, France, Germany and Spain. L'Oreal claimed eBay was equally liable, together with its users, for potential brand infringements which included eBay users selling L'Orial perfumes and cosmetics samples meant for free distribution, removing package boxes from perfumes and cosmetics before selling them via eBay or selling their products intended for markets outside of Europe. eBay argued the were just hosting the auctions and therefore not directly liable, according to the EU E-commerce directive. In an earlier case this year dealing with the conflict between trademark infringement and contextual adevertising brought by a group of luxury goods companies in March 2010, the ECJ ruled that Google could continue selling advertisements linked to searches for brand names. Similarly, the Advocate General now believes eBay can continue to purchase keywords-based advertising in order to direct users of Internet search engines to its site (including L'Orial trademarks) stating that "the use of the disputed trademarks as keywords by eBay does not necessarily result in misleading the consumers as to the origin of the goods offered." Yet, he also expressed himself in favour of L'Orial, stating the company can prohibit the selling of goods with the outer packaging removed if this is damaging for the company's reputation or the function or quality of its products. Also, trade mark protection can be invoked where goods for sale on eBay haven't been put on the market within the EU. It seems both eBay and L'Oreal have received Jaaskinen's opinion positively: "Despite the complexity of the issues and the preliminary nature of the advocate general's opinion, we are encouraged that the ECJ's final judgment will reinforce European consumers' freedom to buy and sell authentic goods online," stated Steve Milton, Director of Corporate Communications at eBay International. L'Orial believes that the opinion is a balanced one and "is overall consistent with the stance that L'Orial has held for several years," and that it also supports "effective combating of internet-based counterfeit product sales." The Advocate general's opinion is not binding for the ECJ but, in most of the cases the Court follows his recommendations. Usually, the ECJ rules between three and six months after the advocate general's opinion. Also, in the US, the Supreme Court refused to hear an appeal in a similar case, thus supporting the ruling made by the Appeal Court on 1 April 2010 in the case brought by jeweller Tiffany against eBay in 2004 and consequently making the ruling definitive. The Court of Appeal's decision was that eBay did not infringe trademarks when allowing counterfeit sales in its auction sales. The court considered that eBay had fulfilled its duty by removing certain items when so asked by Tiffany, and that its obligations went no further than that. However, the Court of Appeal asked the lower court in the case to rule on whether eBay adverts for Tiffany goods were infringing false advertising regulations. Opinion of Advocate Genral Jaaskinen in L'Oreal vs eBay case C 324/09 (9.12.2010) http://curia.europa.eu/jurisp/cgi-bin/form.pl?lang=EN&Submit=rechercher&numaff=C-324/09 ECJ could increase online sellers' liability for trade mark infringements (9.12.2010) http://www.out-law.com//default.aspx?page=11655 US ruling relieving eBay of trade mark liability over fakes will stand (1.12.2010) http://www.out-law.com//default.aspx?page=11631 ============================================================ 5. Council text on web blocking - breaking the law to fight crime ============================================================ The Council of Justice Ministers adopted a text on web blocking at its recent meeting in Brussels on 2-3 December 2010. The Belgian Presidency, for domestic reasons, felt obliged to adopt a text during its term of office. As a result, the outcome is a hastily cobbled together text that makes little legal sense and whose main value is to finally betray the real meaning behind the proposal. The adopted text can be divided into two main parts: 1. "Member States shall take the necessary measures, including through non-legislative measures, to ensure that the blocking of access to webpages containing or disseminating child pornography is possible towards the Internet users in their territory." Under the UN Child Rights Convention, Member States are already under a binding legal obligation to take all appropriate measures to prevent the "exploitative use of children in pornographic performances and materials". If Member States do not feel that blocking is "necessary" to achieve this, the Council's wording would not create an obligation for them to suddenly make a different analysis that would make blocking obligatory. However, the text is very clear about the obligation to create an infrastructure which is capable of implementing the blocking of web pages (Member States shall (...) ensure that the blocking of access to webpages (...) is possible (...) in their territory.) The reference to "non-legislative" measures is particularly interesting because blocking via "self-regulatory" mechanisms by Internet providers is unquestionably illegal. It is illegal under: a. The European Convention on Human Rights - Article 10 "The exercise of these freedoms (...) may be subject to such formalities, conditions, restrictions or penalties as are prescribed by law" b. The European Commission's own impact assessment - "Such measures must indeed be subject to law, or they are illegal." c. The International Covenant on Civil and Political Rights. Article 19.3 "The exercise of the rights provided for in paragraph 2 of this article carries with it special duties and responsibilities. It may therefore be subject to certain restrictions, but these shall only be such as are provided by law and are necessary." d. The 2003 Interinstitutional Agreement on Better Lawmaking - Article 17: "The Commission will ensure that any use of co-regulation or self-regulation is always consistent with Community law (...) These mechanisms will not be applicable where fundamental rights or important political options are at stake or in situations where the rules must be applied in a uniform fashion in all Member States." 2. The second element of the agreement is also noteworthy. It requires that the individuals accused of uploading depictions of serious crimes against children are informed that their site is blocked and "as far as possible, are informed of the possibility of challenging it." Such an obligation would only be necessary if it is assumed that there would be no investigation or prosecution of the individuals that uploaded the site. In Belgium, this is done by providing a fax number on the blocking page that will not be available to the person who, by definition, will be not be in Belgium and therefore not able to see the page. Council text (26.11.2010) http://www.statewatch.org/news/2010/nov/eu-council-sexual-exploitation-16958-10.pdf Interinstitutional agreement on better law making (31.12.2003) http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2003:321:0001:0001:EN:PDF Impact assessment - Accompanying document to the Proposal for a Council Framework Decision on combating the sexual abuse, sexual exploitation of children and child pornography, repealing Framework Decision 2004/68/JHA http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52009SC0355:EN:NOT Convention on the Rights of the Child (20.11.1989) http://www2.ohchr.org/english/law/crc.htm European Convention on Human Rights http://www.hri.org/docs/ECHR50.html (Contribution by Joe McNamee - EDRi) ============================================================ 6. French law Loppsi 2 under debate again ============================================================ The so-called Loppsi 2 draft law (loi d'orientation et de programmation pour la performance de la sicuriti intirieure - law on guidelines and programming for the performance of internal security) is being discussed these days in the French General Assembly in second reading, after having been approved by the Senate in September 2010. The National Assembly is continuing the long and controversial debate on the draft text which might allow the blocking, at the level of ISPs, of websites considered by the authorities as undesirable, without judiciary control and which may give the police authority to install spyware on PCs, without the users' knowledge and without having to justify their actions. Article 4 of the text referring to the blocking of child pornography sites is considered as a Trojan horse. The concerns are that the filtering may be extended to other types of sites out of political reasons as it happened with FNAEG (Fichier National Automatisi des Empreintes Ginitiques - Automated National File of Genetic Prints) which started initially by gathering the DNA data of sexual criminals and ended up in containing the DNAs of more than 1,5 million people. Many organizations (even child protection ones) have expressed several times the idea that, while supporting the fight against child pornography sites, they also believed that the measures proposed by the French government were disproportionate and most of all inefficient. La Quadrature du Net has brought as example the attempts to forbid the hosting of Wikileaks in France. "This shocking maneuver is a new demonstration of the government's will to by-pass the legal authority in order to play the Internet police in contempt of the fundamental rights. The child protection pretext is only a means for the political power to establish a filtering infrastructure for the information on the net" stated the organization. The organisations belonging to CLEJ (Collectif Liberti Egaliti Justice - Collective for Freedom, Equality and Justice), warn over the fact that the draft text "reveals a political line that is particularly worrying: databases, surveillance, control, detention!" The group is worried by the increased surveillance and believes that "in France the goal is to increase the spying of public space to the maximum: the authorities will be able to place video-surveillance devices practically everywhere in public spaces." After going through the National Assembly, the text will go back to the Senate at the beginning of 2011. According to Girard Larcher, President of French Senate the debate next year will be difficult and "fierce". LOPPSI 2: not in our name ! Statement by CLEJ which is open for signatures (only in French, 2.12.2010) http://clej.blog.free.fr/index.php?post/2010/LOPPSI-2-pas-en-notre-nom Loppsi 2, custody, Immigration: Larcher predicted "difficulties" in the Senate (only in French, 9.12.2010) http://www.google.com/hostednews/afp/article/ALeqM5hCLMdWXRYQzs0gMGCkTeCcY3w3nQ?docId=CNG.4f248d6e99e453a5310760a81af36c0b.321 LOPPSI examan delayed, probably towards late December (only in French, 23.11.2010) http://www.numerama.com/magazine/17417-l-examen-de-la-loppsi-repousse-probablement-a-fin-decembre.html Wikileaks, possible target of Loppsi ? (only in French, 9.12.2010) http://www.numerama.com/magazine/17568-wikileaks-cible-potentielle-de-la-loppsi.html EDRi-gram: Blocking websites approved by the French Senate (22.09.2010) http://www.edri.org/edrigram/number8.18/french-law-loppsi-2-senate ============================================================ 7. Privacy Platform Meeting ============================================================ On 1 December 2010, the Privacy Platform held a meeting on the Commission's recent Communication on updating the Data Protection Directive. Hosted by Sophie in't Veld MEP, the panel consisted of: Martin Selmayr, Head of Commissioner Reding's cabinet (who spoke in her absence as the Commissioner was ill), Jacob Kohnstamm, Chairman of the Article 29 WP, and Peter Hustinx, the European Data Protection Supervisor. The meeting was well attended and overall, it followed standard storyline. In regard to the Communication and future steps for the revised Data Protection Directive, Mr. Kohnstamm urged that more ambition was needed, and listed five general principles that should be kept in mind. First that class action is a necessity, the patchwork of data protection rules should be a thing of the past (particularly in the post-Lisbon EU), the duty of controllers should be strengthened, privacy by design should be addressed more thoroughly and that there should be better enforcement powers for data protection authorities (DPA). Peter Hustinx, echoing many statements in support of the Article 29 WP Chairman, emphasized the need to take a bold approach, particularly in terms of enforcement, accountability, harmonisation and including privacy by design into the beginning of the development process rather than tackling it at the end. This approach is outlined in more detail in his recently published policy paper which outlines a more robust approach to data protection. The issue of real consent was discussed throughout the meeting, where Marc Rotenberg from the Electronic Privacy Information Center (EPIC), commented that "consent" is often anti-privacy, as its terms are dictated by the firm in question. Mr. Hustinx agreed, saying that transparency does not equal consent. Sophie in't Veld made the point that consent implies choice, but in reality, "choice" does not really exist. In regard to public authorities taking more responsibility and accountability, Ms. In't Veld pointed to the irony that they are usually the greatest violators of privacy, illustrating another dilemma with regards to attaining adequate data protection in the information society. There was discussion of sanctions and better enforcement measures for the Data Protection Directive and for DPAs. Mr. Kohnstamm agreed that more sanctions are needed, but that the measures also need to expand power and scope in order to logistically take on the added load (adding that currently there are only 80 employees in his DPA). The public consultation on the Communication is open until 15 January 2011. The Commission plans to release the final review of the Data Protection Directive sometime "around" the summer of 2011. Videoclips from the Privacy Platform meeting: Sophie In't Veld: http://www.youtube.com/watch?v=zoRTAK4-rD4 Peter Hustinx, EDPS http://www.youtube.com/watch?v=pjeUl0LJhMc Commission Communication on "a comprehensive strategy on data protection in the European Union" http://www.statewatch.org/news/2010/oct/eu-com-draft-communication-data-protection.pdf EDPS Policy Paper on Monitoring and Ensuring Compliance with Regulation (EC) 45/2001 (13.12.2010) http://www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/Publications/Papers/PolicyP/10-12-13_PP_Compliance_EN.pdf (contribution by Raegan MacDonald - EDRi) ============================================================ 8. Sweden's high court sends IP-data protection conflict to the ECJ ============================================================ The Swedish ISP TeliaSonera has recently received a decision at the Swedish Supreme Court that questions a 2009 court decision forcing it to hand over the identity of SweTorrents BitTorrent site operator. In 2009, four movie studios represented by anti-piracy group Antipiratbyran took TeliaSonera to Svdertvrn District Court which forced the ISP to reveal the identity of the respective file-sharer. The anti-piracy group as well as the court considered that, based on Sweden's IPRED (Intellectual Property Rights Enforcement Directive) legislation, ISPs had the obligation to reveal to rightholders the identity of customers involved in copyright infringement cases. The provider refused to comply arguing that ISPs had the fundamental right to protect their customers' privacy and pointing out the conflicts between IPRED and the European Data Protection Directive. TeliaSonera appealed, but in May 2010, the Court of Appeal upheld the District Court's decision, ruling that the ISP would face a fine amounting to about 80 000 euro in case of non-compliance. TeliaSonera appealed again taking the case to the Supreme Court which has now ruled to postpone the decision and send the case to the European Court of Justice (ECJ) in Luxembourg in order to clarfy the conflict between data protection and IP enforcement provisions. "It is good that the Supreme Court shares our view that there must be a balance between the interests in matters of principle and that court has now therefore decided that TeliaSonera's case should await the ECJ ruling, "said Patrick Hiselius, TeliaSonera's lawyer. This means that a final decision in the matter might take a few years. And, as there is nothing in the Swedish Electronic Communications Law that obliges ISPs to store information about the IP addresses of their customers, Telia, as well as the other ISPs, will be free to stop storing data or delete data in order to protect the privacy of their customers. At least until the data retention directive is implemented in Sweden. ISPs Free To Continue Deleting Evidence Against File-Sharers (7.12.2010) http://torrentfreak.com/isps-free-to-continue-deleting-evidence-against-file-sharers-101207/ Supreme Court decision on IPRED (only in Swedish, updated 6.12.2010) http://www.dn.se/nyheter/sverige/gogsta-domstolen-pausar-ipredmal-1.1222232 EDRi-gram: The new Swedish anti-piracy law stirs things for file sharers (16.12.2009) http://www.edri.org/edrigram/number7.24/sweden-tests-ipred ============================================================ 9. ENDitorial: WIPO SCCR 21 session ============================================================ The present text is a report from the Standing Committee on Copyright and Related Rights 21st meeting in Geneva, Switzerland (SCCR 21). In this report, the debate on the Broadcasting Organizations' protection (except for the NGO statements) is not included due to the fact that the author was not present during these negotiations. The discussions on the matter started during the afternoon of the second day of the meeting. A handy comparison chart of the four previously introduced proposals from 2009 and 2010 was available, from which it was fairly easy to catch up with the current discussion. Brazil, Ecuador and Paraguay (later joined by Mexico - thus the BEMP Treaty proposal) and the African Group made fairly similar proposals, based on a World Blind Union recommendation for the visually impaired (various terminologies were used in various documents, e.g. blind and other reading disabilities or persons with print and other reading disabilities - for the purpose of this document, they mean the same). In their proposals, other disabled people were also mentioned, unlike the US or EU proposals, which were in this and other respects much more restrictive in the exceptions proposed. The exceptions for other disabled were, in the final document, moved to a different meeting, together with the limitations and exceptions for educational and research institutions, libraries and archives. During the meeting, KEI made a statement supporting the BEMP Treaty proposal for extending the exceptions to include other disabled in need than only visually impaired, which I signed on EDRi's behalf. Most of the discussion in the meeting, from Wednesday on, revolved around the issue of limitations and exceptions for the visually impaired. Unfortunately, that left little time for the multitude of other topics that should have been handled. This was recognized, and thus, what the meeting actually ended up in doing on the topics left unhandled was to divide them up between additional working days and the coming SCCR meetings in the following manner: May/June 2011, SCCR 22: three additional working days for limitations and exceptions for persons with print and other reading disabilities, to be presented to the WIPO General Assembly (GA) during September 2011, where a decision is to be taken on the topic. November 2011, SCCR 23: three additional working days for limitations and exceptions for libraries and archives. This was an especially hot topic amongst the NGOs, as it originally seemed that educational and research institutions would have been handled before libraries and archives and all were predicting that to be a much tougher negotiation, possibly having repercussions on the negotiations for libraries and archives. It seems that the limitations and exceptions for archives is going to be a lot easier topic to handle than for libraries. There is little point in limiting the usage of archive material, especially (but not only) in the case of orphan works, by the archives. It is, after all, fairly unlikely that these would be profitable usages nor that they would be "misused", in the sense of the current copyright law or its related rights. The question for libraries is arguably tougher, although, access to information through libraries should be a clear goal to educate the people. May/June 2012, SCCR 24: again, three additional working days to the regular session, now for the limitations and exceptions for education, teaching and research institutions, and, rather surprisingly, persons with other disabilities (than print or reading impaired). There seemed to be no representatives for education, teaching and research NGOs and institutions at the meeting. Maybe they were there, but the NGOs representing visually impaired, libraries, archives and general purpose NGOs such as EDRi, EFF and KEI (although, no FSF, even though they had a seat - unfortunate), and of course the associations representing copyright holders and 'casters were at least much more visible. Both SCCR 23 and SCCR 24 results are to be presented in the following WIPO GA meeting in September 2012. Basically, the exceptions for various disabled are not going to switch the field of copyright much to any direction - nor will the exceptions to archives. And these exceptions are easily justifiable by the mere access to information argument - access to extremely limited amount of information compared to non-disabled, in any case. The exceptions for libraries, schools, higher education and research, on the other hand, might be more meaningful from a copyright perspective. But in a good sense, as in getting access to information for those who, at the moment, are lacking it, especially for education but also for cultural purposes (as is of course true for disabled as well!). As it seems to be becoming more and more common, the meeting stretched until (and past) midnight on the last evening. The final version of the timetable for further negotiations was accepted 7 minutes to midnight - after midnight it would have been too late, and it would have gone to SCCR 22. After that, the paper was still discussed, thanks were given etc., but basically, the result of SCCR 21 was achieved at that point. Standing Committee on Copyright and Related Rights : Twenty-First Session (8-12.11.2010) http://www.wipo.int/meetings/en/details.jsp?meeting_id=20208 Standing Committee on Copyright and Related Rights : Twentieth Session (21-24.06.2010) http://www.wipo.int/meetings/en/details.jsp?meeting_id=17458 Standing Committee on Copyright and Related Rights : Eighteenth Session (25-29.05.2009) http://www.wipo.int/meetings/en/details.jsp?meeting_id=20200 Communication to SCCR delegates regarding the beneficiaries of a new WIPO treaty for copyright exceptions for disabilities (12.11.2010) http://keionline.org/node/1018 (Contribution by Kai K. Kimppa - EDRi-member Electronic Frontier Foundation Finland) ============================================================ 10. Recommended Action ============================================================ Join EFF in Standing up Against Internet Censorship (12.2010) https://www.eff.org/deeplinks/2010/12/join-eff-in-standing-up-against-internet-censorship ============================================================ 11. Recommended Reading ============================================================ Data protection compliance in the EU administration: EDPS adopts comprehensive policy on supervision and enforcement (13.12.2010) http://www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/Publications/Papers/PolicyP/10-12-13_PP_Compliance_EN.pdf The Downside of Data Sharing (10.12.2010) http://www.nytimes.com/roomfordebate/2010/12/09/what-has-wikileaks-started/data-security-in-the-age-of-wikileaks Video Oxcars 2010 http://oxcars10.la-ex.net/en/ ============================================================ 12. Agenda ============================================================ 15-16 December 2010, Brussels, Belgium. "Lift-off Towards Open Government" http://www.opengov2010.be/ 27-30 December 2010, Berlin, Germany 27th Chaos Communication Congress (27C3) http://events.ccc.de/congress/2010 25-28 January 2011, Brussels, Belgium The annual Conference Computers, Privacy & Data Protection CPDP 2011 European Data Protection: In Good Health? http://www.cpdpconferences.org/ 26 January 2011, Brussels, Belgium Cultural Diversity and Europe 2020: Nuisance or necessity? http://conferences.euobserver.com/cultural/index/ 23-28 February 2011, Gosier, Guadeloupe, France ICDS 2011- 5th International Conference on Digital Society http://www.iaria.org/conferences2011/ICDS11.html 24-25 February 2011, Berlin, Germany The First OAPEN Conference http://meetings.copernicus.org/oapen2011/ 11-12 March 2011, Ankara, Turkey ICEGEG-2011- 3rd International Conference on E-Government and E-Governance http://www.icegeg.com/index.html 28 March 2011, Paris, France 5th European eAccessbility Forum: Benefits and costs of e-accessibility http://inova.snv.jussieu.fr/evenements/colloques/colloques/70_index_en.html 1 April 2011, Bielefeld, Germany Big Brother Awards Germany Nominations open until 31 Dec 2010 http://www.bigbrotherawards.de/index_html-en 12-15 June 2011, Bled, Slovenia 24th Bled eConference, eFuture: Creating Solutions for the Individual, Organisations and Society http://www.bledconference.org/index.php/eConference/2011 ============================================================ 13. About ============================================================ EDRI-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRI has 29 members based or with offices in 18 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRI-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and are visible on the EDRI website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edri/2.html - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From albina-ko at hotsheet.com Wed Dec 15 17:31:35 2010 From: albina-ko at hotsheet.com (=?koi8-r?B?+sHU0sHU2Tog0NLRzdnFIMkgy8/T18XOztnF?=) Date: Wed, 15 Dec 2010 22:31:35 -0300 Subject: =?koi8-r?B?78LV3sXOycUgySDPw8XOy8Eg3MbGxcvUydfOz9PUySDUz9LHz9fPx88g?= =?koi8-r?B?0MXS08/OwczB?= Message-ID: Тема: Торговый персонал – подбор, обучение, оценка эффективности Внешний и внутренний консультант по управлению предприятием и работе с персоналом, практик-консультант по реструктуризации и построению управленческих структур, сертифицированный специалист по ИСО стандартам, постановщик задач по вопросам оценки и аттестации для программы "Босс-кадровик". код: (четыре девять пять) 4*45-4*0-95 ; 792_2I/22 Двадцать третьего декабря (продолжительность 8 часов) Цель: Торговый персонал отличается большой текучестью. Там где есть такая категория работников, никогда не перестают искать и принимать новых сотрудников. Большая часть вновь принятых увольняются в первые три месяца работы. Как минимизировать ошибки при приеме торгового персонала и отсечь на этапе подбора совершенно неподходящие кандидатуры, какие приемы при собеседовании помогут выявить полную профнепригодность кандидатов. И как не потерять потенциально хороших работников в начале их работы на предприятии Кого, когда и чему следует обучать Как узнать результативность обучения Для чего нужны периодические и внеплановые оценки (аттестации) Как организовать оценку, чтобы она прошла с наименьшим отвлечением персонала, но в то же время дала практические результаты Программа мероприятия: Подбор торгового персонала: 1.1 Особенности торгового персонала 1.2 Виды торгового персонала 1.3 Как минимизировать ошибки при приеме: 1.3.1 Тесты 1.3.2 Проверка на стрессоустойчивость 1.3.3 "Плохие" вопросы 1.4 Коллективные испытания 1.5 Испытательный срок: 1.5.1 Конкретные задания 1.5.1 Шефство 1.5.1 Выводы по результатам испытательного срока 1.6 Образцы документов по подбору и приему Обучение: 2.1 Непрерывность обучения 2.2 Категории обучающихся 2.3 Программы обучения 2.4 Плюсы и минусы внешнего и внутреннего обучения 2.5 Оценка результативности обучения 2.6 Образцы документов по обучению (повышению квалификации) Оценка, аттестация торгового персонала: 3.1 Подготовка процедуры оценки: 3.1.1 Вопросы 3.1.2 Практические задания 3.1.3 Отзывы 3.1.4 Тесты 3.1.5 Анонимный покупатель 3.2 Сроки и частота оценки 3.3 Цели оценки 3.4 Результаты оценки 3.5 Действия после оценки: 3.5.1 Резерв 3.5.2 Перемещение 3.5.3 Обучение 3.5.4 Увольнение 3.6 Образцы документов по подготовке и проведению оценки (аттестации) Практические рекомендации, ответы на вопросы слушателей Cтоимоcть: 7 900 рублей За более подробной информацuей обpащайтеcь по тел: \Моск. код/ Ч-45-4/0_95 <<>> 44/53*96/8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5414 bytes Desc: not available URL: From alorriane_fy at starstream.net Thu Dec 16 05:54:08 2010 From: alorriane_fy at starstream.net (Alba Lorriane) Date: Thu, 16 Dec 2010 06:54:08 -0700 Subject: WHY buy original? we sell at 8-10% of ORIGINAL PRICE: BvlgariRolexRado, Dior, IWC, Longines & LV + Gucci Bags t4l In-Reply-To: <35fd01cb9bf1$f0716a3f$5ea554b8@9pliz56> Message-ID: <4D0A1A00.5D2A8FA7@starstream.net> Replica watches On Sale - Best Replica Watches Online Shop We offer a wide selection of cheap replica watches including Rolex, Gucci, Chanel and more. Nobody will even know you are wearing a fake ... Buy Best Quality Replica on our site http://blotfence.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 592 bytes Desc: not available URL: From huy at barabaka.ru Thu Dec 16 06:50:40 2010 From: huy at barabaka.ru (=?koi8-r?B?5MzRIMLBzsvP19PLycgg09DFw8nBzMnT1M/X?=) Date: Thu, 16 Dec 2010 11:50:40 -0300 Subject: =?koi8-r?B?98HMwNTOz8Ug0sXH1czJ0s/Xwc7JxSAyMDEw?= Message-ID: <41B2F709DB9743FF900A3C936566E5A3@usuario> Вниманию банков, финансовых, страховых компаний Регулирование валютного законодательства и и валютный контроль Валютное регулирование (ЦБ РФ) \Моск. код/ 4Ч5*3968 <<<>>> 792.2l*2_2 2З декабря 2010г. Лектор: начальник управления Департамента финансового Мониторинга и валютного контроля Банка России. 1. Система валютного регулирования и валютного контроля в Российской Федерации и валютный контроль уполномоченных банков. * Федеральный закон "О валютном регулировании и валютном контроле" № 173-ФЗ, императивные нормы. Регулирование порядка поведения валютных операций резидентами и нерезидентами, открытия и ведения резидентами счетов в банках, расположенных за пределами Российской Федерации. Режим счета, открытого за рубежом. * Репатриация выручки от внешнеэкономической деятельности. * Нормативные акты Банка России и Правительства Российской Федерации. * Контроль за соблюдением Федерального закона и нормативных актов Банка России. 2. Нормативные акты Банка России: Инструкция Банка России от 15 июня 2004 года №117-И "О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации при осуществлении валютных операций, порядке учета уполномоченными банками валютных операций и оформления паспортов сделок" (с изменениями и дополнениями), Положение Банка России от 1 июня 2004 года № 258-П "О порядке представления резидентами уполномоченным банкам подтверждающих документов и информации, связанных с проведением валютных операций с нерезидентами по внешнеторговым сделкам, и осуществления уполномоченными банками контроля за проведением валютных операций" (с изменениями и дополнениями). Основные требования к порядку проведения валютных операций и оформления документов валютного контроля, установленные этими нормативными актами: * кодирование валютных операций, * оформление и представление справок о валютных операциях, о подтверждающих документах, о поступлении валюты Российской Федерации, о расчетах через счета резидентов, открытые в банках, расположенных за пределами Российской Федерации, * Паспорт сделки. Практика применения вышеуказанных нормативных актов Банка России: 3. Паспорта сделок, как документы валютного контроля. Проблемные вопросы оформления и ведения. Документы валютного контроля, учета и отчетности. Действия уполномоченных банков при оформлении и проведении валютных операций. 4. Указание Банка России "О формах учета по валютным операциям, осуществляемым резидентами, за исключением кредитных организаций и валютных бирж" №1950-У и его влияние на квалификацию правонарушений. 5. Регулирование порядка представления информации о нарушениях валютного законодательства. Положение ЦБ РФ от 20.07.2007 N 308-П И практика его применения (с учетом последних изменений). Постановление Правительства РФ от 24 февраля 2009 г. N 166 "О порядке представления органами и агентами валютного контроля в орган валютного контроля, уполномоченный Правительством Российской Федерации, необходимых для осуществления его функций документов и информации". Практика применения Положения Банка России №308-П на примере конкретных нарушений. 6. Валютное регулирование операций физических лиц. Операции физических лиц и валютный контроль уполномоченных банков. Нормы прямого действия Федерального закона № 173-ФЗ. Порядок осуществления переводов денежных средств физическими лицами из Российской Федерации и по территории Российской Федерации. Инструкция Банка России №113-И (с изменениями и дополнениями). Указание Банка России от 20.07.2007 №1868-У "О предоставлении физическими лицами-резидентами уполномоченным банкам документов, связанных с проведением отдельных валютных операций". Изменения в регулировании валютных операций физических лиц. Валютные операции с платежными картами. Положение Банка России №266-П (с изменениями и дополнениями). 7. Ответственность за нарушение валютного законодательства. 8. Перспективы развития валютного регулирования и валютного контроля в Российской Федерации. Стоимость участия в семинаре 9970 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: Московский код; 7922|-22 <> 742/9_l.9-8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6752 bytes Desc: not available URL: From camera_lumina at hotmail.com Thu Dec 16 09:24:06 2010 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 16 Dec 2010 12:24:06 -0500 Subject: Wikileaks Saga Reveals Governments' Hypocrisy, Deep Fear of Internet In-Reply-To: References: ,<20101205084823.GN9434@leitl.org>,, Message-ID: John Young wrote... > Tim wrote a provocative long essay a couple of months ago but > barred publication, well, never answered a permission request. You mean Tim May gathered the few moments of lucidity required to write one of his cogent doozies? Is there any way to get ahold of this? As, I believe, Variola once said, "Pass me that spliff, man". -TD From jolinero at utahrealtors.com Thu Dec 16 11:39:03 2010 From: jolinero at utahrealtors.com (Andree Joline) Date: Thu, 16 Dec 2010 12:39:03 -0700 Subject: Amazing increase in thickness of yourPenis, up to 30% with our miracle pills zvw5 In-Reply-To: Message-ID: <4D0A6AD7.8B1DE562@utahrealtors.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://twoapenny.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 830 bytes Desc: not available URL: From measl at mfn.org Thu Dec 16 11:08:18 2010 From: measl at mfn.org (J.A. Terranson) Date: Thu, 16 Dec 2010 13:08:18 -0600 (CST) Subject: Wikileaks Saga Reveals Governments' Hypocrisy, Deep Fear of Internet In-Reply-To: References: <20101205084823.GN9434@leitl.org> Message-ID: On Mon, 6 Dec 2010, John Young wrote: > Tim wrote a provocative long essay a couple of months ago but > barred publication, well, never answered a permission request. A "last hurrah"? Someone needs to mount an assault on Tim's "Heavily Armored Compound (tm)" and rip that last piece of sanity from it's obscurity: it would make a stunningly good counter to his more recent meditations. Besides, the assault could be televised live (simulstreamed over the intarwebs of course) on pay-per-view, with the proceeds going to Julian's suicidal persecution fund. A double bonus! And here, I thought the lottery was unwinnable? //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From measl at mfn.org Thu Dec 16 11:22:33 2010 From: measl at mfn.org (J.A. Terranson) Date: Thu, 16 Dec 2010 13:22:33 -0600 (CST) Subject: Wireless network modded to see through walls In-Reply-To: <20091001125924.GE27331@leitl.org> References: <20091001125924.GE27331@leitl.org> Message-ID: [Delayed response: sorry.] On Thu, 1 Oct 2009, Eugen Leitl wrote: > Researchers at the University of Utah say that the way radio > signals vary in a wireless network can reveal the movement of people > behind closed doors. > > The basic idea is straightforward. The signal strength > at any point in a network is the sum of all the paths the radio waves can > take to get to the receiver. Any change in the volume of > space through which the signals pass, for example caused by the > movement of a person, makes the signal strength vary. So by > "interrogating" this volume of space with many signals, > picked up by multiple receivers, it is possible to build up a picture > of the movement within it. Isn't this the same premise behind over-the-horizon "passive radar" (yeah, Im pretty sure that's not the formal name for it - its just as close as I can remember)? It sure sounds like it, and if so, it's hardly new - just applied to a different target class. > The advantage of this technique over others is first its cost. The > nodes in such a network are off the shelf and therefore cheap. Other > through-wall viewing systems cost in excess of $100,000. And more importantly, the likely oberservers won't be paying for the networks which will provide all of the wonderful passive imaging: the targets will set up their own imaging nets. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From eugen at leitl.org Thu Dec 16 07:56:43 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 16 Dec 2010 16:56:43 +0100 Subject: weaky leaky Message-ID: <20101216155643.GY9434@leitl.org> http://i.imgur.com/PDnns.jpg -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From 0-0-vbr at navynet.com Thu Dec 16 10:24:17 2010 From: 0-0-vbr at navynet.com (Cialis) Date: Thu, 16 Dec 2010 20:24:17 +0200 Subject: Pmreehintne 37.5 - 180 pills for $690 Message-ID: <7202586106.3Q5J2JY0274611@otvdurrcdygio.dsaxxeslysgm.biz> Try out our trial package if you're still in doubt! Dozens of Products http://www.nicescrub.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 283 bytes Desc: not available URL: From andrekasi_ek at ftdf.com Thu Dec 16 23:14:32 2010 From: andrekasi_ek at ftdf.com (Andre Kasi) Date: Fri, 17 Dec 2010 00:14:32 -0700 Subject: OrderViagra 50mg/100mg x 10/30/60/90/120 Qty, UNBELIEVABLE PRICES! NO HIDDEN FEES. Ship Worldwide. 0kgo In-Reply-To: <5de901cb9a91$0adb982b$84819afc@zabtcqb> Message-ID: <4D0B0DD8.7488D3BF@ftdf.com> OrderCializViagra Online & Save 75-90% 0nline Pharmacy NoPrescription required Buy Canadian Drugs at Wholesale Prices and Save 75-90% FDA-Approved drugs + Superb Quality Drugs only! Accept all major credit cards Order Today! From $1.38 http://ogzbw.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 523 bytes Desc: not available URL: From case at sdf.lonestar.org Thu Dec 16 21:04:01 2010 From: case at sdf.lonestar.org (John Case) Date: Fri, 17 Dec 2010 05:04:01 +0000 (UTC) Subject: amatuer hour... Message-ID: http://www.thinq.co.uk/2010/12/15/designer-arrested-over-anonymous-press-release/ The current and coming generations of "techies" will have no chance if their thought process about underlying technologies is so very, very shallow. From berhater at vaurien.ru Fri Dec 17 12:25:00 2010 From: berhater at vaurien.ru (=?koi8-r?B?8NnWz9c=?=) Date: Fri, 17 Dec 2010 13:25:00 -0700 Subject: =?koi8-r?B?7sHbwSDSxcvMwc3BINLBws/UwcXUIQ==?= Message-ID: <000d01cb9e28$7af09a20$6400a8c0@berhater> Предлагаем качественную доставку рекламы Базы адресов постоянно обновляются Очень гибкая система скидок постоянным клиентам до 50% При заказе 2х рассылок, 3я бесплатная; Подготовка макета бесплатно; Быстрый выход рассылки, по желанию день в день; Самый массовый охват целевой аудитории Пробив фильтров. Любые формы оплаты; Каждая рассылка перед отправкой тестируется; Москва от 2 тыс руб. Россия от 3000 руб. Страны СНГ от 2,5 тыс руб. Наши цены самые альтернативные, закажите у Нас и Вы будете удивлены качеством обслуживания. Формируем базы под каждое направление, продукт реализации. Фокусировка себя полностью оправдывает. тел: +7 (964) 7О2-3685 From 0-c0 at namicoh.co.id Fri Dec 17 12:08:43 2010 From: 0-c0 at namicoh.co.id (_Canadian Pharm.-) Date: Fri, 17 Dec 2010 14:08:43 -0600 Subject: Special M\dication Sample Packs! Message-ID: <9540329878.3WSTPI4I880129@nykvemdw.kvcvnehrgy.su> Why not try it out? Dozens of Products http://www.wailstop.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 251 bytes Desc: not available URL: From jenifer_darline_qa at wmharvey.com Fri Dec 17 13:36:41 2010 From: jenifer_darline_qa at wmharvey.com (Jenifer Darline) Date: Fri, 17 Dec 2010 14:36:41 -0700 Subject: .PenisLong, used & recommended by Sex industry professionals, Buy this effective herbal EnlargementPills 4d In-Reply-To: Message-ID: <4D0BD7E9.1A9BABC2@wmharvey.com> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://needcurl.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 712 bytes Desc: not available URL: From lanita.darceycg at onesource.com Fri Dec 17 16:58:29 2010 From: lanita.darceycg at onesource.com (Lanita Darcey) Date: Fri, 17 Dec 2010 17:58:29 -0700 Subject: ViagraDiscounts, CheapCialis & Much More. Discreet Packaging and Fast Shipping k9n In-Reply-To: <274301cb9c8a$cb576ac4$51d37470@zeyyab3> Message-ID: <4D0C0735.EE077360@onesource.com> OrderCializViagra Online & Save 75-90% 0nline Pharmacy NoPrescription required Buy Canadian Drugs at Wholesale Prices and Save 75-90% FDA-Approved drugs + Superb Quality Drugs only! Accept all major credit cards Order Today! From $1.38 http://qaeex.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 521 bytes Desc: not available URL: From checker at panix.com Fri Dec 17 15:14:26 2010 From: checker at panix.com (Premise Checker) Date: Fri, 17 Dec 2010 18:14:26 -0500 (EST) Subject: [tt] NYT: New Advice for Nuclear Strike: Don't Flee, Get Inside Message-ID: New Advice for Nuclear Strike: Don't Flee, Get Inside http://www.nytimes.com/2010/12/16/science/16terror.html U.S. Rethinks Strategy for the Unthinkable By WILLIAM J. BROAD Suppose the unthinkable happened, and terrorists struck New York or another big city with an atom bomb. What should people there do? The government has a surprising new message: Do not flee. Get inside any stable building and don't come out till officials say it's safe. The advice is based on recent scientific analyses showing that a nuclear attack is much more survivable if you immediately shield yourself from the lethal radiation that follows a blast, a simple tactic seen as saving hundreds of thousands of lives. Even staying in a car, the studies show, would reduce casualties by more than 50 percent; hunkering down in a basement would be better by far. But a problem for the Obama administration is how to spread the word without seeming alarmist about a subject that few politicians care to consider, let alone discuss. So officials are proceeding gingerly in a campaign to educate the public. "We have to get past the mental block that says it's too terrible to think about," W. Craig Fugate, administrator of the Federal Emergency Management Agency, said in an interview. "We have to be ready to deal with it" and help people learn how to "best protect themselves." Officials say they are moving aggressively to conduct drills, prepare communication guides and raise awareness among emergency planners of how to educate the public. Over the years, Washington has sought to prevent nuclear terrorism and limit its harm, mainly by governmental means. It has spent tens of billions of dollars on everything from intelligence and securing nuclear materials to equipping local authorities with radiation detectors. The new wave is citizen preparedness. For people who survive the initial blast, the main advice is to fight the impulse to run and instead seek shelter from lethal radioactivity. Even a few hours of protection, officials say, can greatly increase survival rates. Administration officials argue that the cold war created an unrealistic sense of fatalism about a terrorist nuclear attack. "It's more survivable than most people think," said an official deeply involved in the planning, who spoke on the condition of anonymity. "The key is avoiding nuclear fallout." The administration is making that argument with state and local authorities and has started to do so with the general public as well. Its Citizen Corps Web site says a nuclear detonation is "potentially survivable for thousands, especially with adequate shelter and education." A color illustration shows which kinds of buildings and rooms offer the best protection from radiation. In June, the administration released to emergency officials around the nation an unclassified planning guide 130 pages long on how to respond to a nuclear attack. It stressed citizen education, before any attack. Without that knowledge, the guide added, "people will be more likely to follow the natural instinct to run from danger, potentially exposing themselves to fatal doses of radiation." Specialists outside of Washington are divided on the initiative. One group says the administration is overreacting to an atomic threat that is all but nonexistent. Peter Bergen, a fellow at the New America Foundation and New York University's Center on Law and Security, recently argued that the odds of any terrorist group obtaining a nuclear weapon are "near zero for the foreseeable future." But another school says that the potential consequences are so high that the administration is, if anything, being too timid. "There's no penetration of the message coming out of the federal government," said Irwin Redlener, a doctor and director of the National Center for Disaster Preparedness at Columbia University. "It's deeply frustrating that we seem unable to bridge the gap between the new insights and using them to inform public policy." White House officials say they are aware of the issue's political delicacy but are nonetheless moving ahead briskly. The administration has sought "to enhance national resilience--to withstand disruption, adapt to change and rapidly recover," said Brian Kamoie, senior director for preparedness policy at the National Security Council. He added, "We're working hard to involve individuals in the effort so they become part of the team in terms of emergency management." A nuclear blast produces a blinding flash, burning heat and crushing wind. The fireball and mushroom cloud carry radioactive particles upward, and the wind sends them near and far. The government initially knew little about radioactive fallout. But in the 1950s, as the cold war intensified, scientists monitoring test explosions learned that the tiny particles throbbed with fission products--fragments of split atoms, many highly radioactive and potentially lethal. But after a burst of interest in fallout shelters, the public and even the government grew increasingly skeptical about civil defense as nuclear arsenals grew to hold thousands of warheads. In late 2001, a month after the Sept. 11 attacks, the director of central intelligence told President George W. Bush of a secret warning that Al Qaeda had hidden an atom bomb in New York City. The report turned out to be false. But atomic jitters soared. "History will judge harshly those who saw this coming danger but failed to act," Mr. Bush said in late 2002. In dozens of programs, his administration focused on prevention but also dealt with disaster response and the acquisition of items like radiation detectors. "Public education is key," Daniel J. Kaniewski, a security expert at George Washington University, said in an interview. "But it's easier for communities to buy equipment--and look for tech solutions-- because there's Homeland Security money and no shortage of contractors to supply the silver bullet." After Hurricane Katrina in 2005 revealed the poor state of disaster planning, public and private officials began to question national preparedness for atomic strikes. Some noted conflicting federal advice on whether survivors should seek shelter or try to evacuate. In 2007, Congress appropriated $5.5 million for studies on atomic disaster planning, noting that "cities have little guidance available to them." The Department of Homeland Security financed a multiagency modeling effort led by the Lawrence Livermore National Laboratory in California. The scientists looked at Washington, New York, Chicago, Los Angeles and other big cities, using computers to simulate details of the urban landscape and terrorist bombs. The results were revealing. For instance, the scientists found that a bomb's flash would blind many drivers, causing accidents and complicating evacuation. The big surprise was how taking shelter for as little as several hours made a huge difference in survival rates. "This has been a game changer," Brooke Buddemeier, a Livermore health physicist, told a Los Angeles conference. He showed a slide labeled "How Many Lives Can Sheltering Save?" If people in Los Angeles a mile or more from ground zero of an attack took no shelter, Mr. Buddemeier said, there would be 285,000 casualties from fallout in that region. Taking shelter in a place with minimal protection, like a car, would cut that figure to 125,000 deaths or injuries, he said. A shallow basement would further reduce it to 45,000 casualties. And the core of a big office building or an underground garage would provide the best shelter of all. "We'd have no significant exposures," Mr. Buddemeier told the conference, and thus virtually no casualties from fallout. On Jan. 16, 2009--four days before Mr. Bush left office--the White House issued a 92-page handbook lauding "pre-event preparedness." But it was silent on the delicate issue of how to inform the public. Soon after Mr. Obama arrived at the White House, he embarked a global campaign to fight atomic terrorism and sped up domestic planning for disaster response. A senior official, who spoke on the condition of anonymity, said the new administration began a revision of the Bush administration's handbook to address the issue of public communication. "We started working on it immediately," the official said. "It was recognized as a key part of our response." The agenda hit a speed bump. Las Vegas was to star in the nation's first live exercise meant to simulate a terrorist attack with an atom bomb, the test involving about 10,000 emergency responders. But casinos and businesses protested, as did Senator Harry Reid of Nevada. He told the federal authorities that it would scare away tourists. Late last year, the administration backed down. "Politics overtook preparedness," said Mr. Kaniewski of George Washington University. When the administration came out with its revised planning guide in June, it noted that "no significant federal response" after an attack would be likely for one to three days. The document said that planners had an obligation to help the public "make effective decisions" and that messages for predisaster campaigns might be tailored for schools, businesses and even water bills. "The most lives," the handbook said, "will be saved in the first 60 minutes through sheltering in place." _______________________________________________ tt mailing list tt at postbiota.org http://postbiota.org/mailman/listinfo/tt ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From marshat_fondasi at gtminet.net Fri Dec 17 19:00:44 2010 From: marshat_fondasi at gtminet.net (Marsha Fonda) Date: Fri, 17 Dec 2010 20:00:44 -0700 Subject: TOP SELLING WATCHES! Rep1icaBrand Watches Promotion! 95% Off retail price, Best quality swiss and japanese Rep1icaWatches yh6j In-Reply-To: Message-ID: <4D0C23DC.FF6737A3@gtminet.net> SwissRep1ica Luxury Watches from $150 Each ** 85% OFF RETAIL SELLING PRICE! ** RolexDaytona RolexExplorer II RolexGMT master II RolexSpecial Collection RolexSubmariner RolexYachtmaster RolexCellini RolexDatejust RolexDaydate Buy Best Quality Rep1icaWatches here http://vypujcil.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 673 bytes Desc: not available URL: From 0-ka at datatel.com Fri Dec 17 12:13:07 2010 From: 0-ka at datatel.com (~Canadian Pharm.-) Date: Fri, 17 Dec 2010 20:13:07 +0000 Subject: Thin up with Phent.rmine Message-ID: <6050217406.G6091SA9557292@ztapcm.mwyecimqvix.ua> The #1 Reason Relationships fail is in the bedroom Hot Weekly Special http://www.nicescrub.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 284 bytes Desc: not available URL: From edeirdrevx at toto.net Sat Dec 18 02:00:58 2010 From: edeirdrevx at toto.net (Evonne Deirdre) Date: Sat, 18 Dec 2010 03:00:58 -0700 Subject: Effective PenisEn1argement pill **ROCK SOLID hardness that feels bigger, wider and fuller wd4f In-Reply-To: <1a3301cb9dcb$0888f52b$ed57d71e@2vb3yp1> Message-ID: <4D0C865A.7E8C5C9E@toto.net> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://signmourn.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 715 bytes Desc: not available URL: From jya at pipeline.com Sat Dec 18 06:53:50 2010 From: jya at pipeline.com (John Young) Date: Sat, 18 Dec 2010 09:53:50 -0500 Subject: [Fwd: [Goanet-News] Offtopic: Wikileaks and India] Message-ID: Quite funny listing, if dinky. Consider blovia: Google shows this morning 452 million hits for "Wikileaks." One year ago the hits were about 300,000. Two years ago the hits were about 100,000. Three years the hits were about 5,000. Four years ago, the hits were less than zero, the hit hurrah machine overloaded with richochets, spam, precursors of sock-puppetry and blog-amoebia. Five years ago Julian Assange was being stalked by Asian teens, he says. Looking for squinty gash, he moans. Not appealing, the chicks giggled, he stink. Six years ago Julian Assange had an idea for a leak site, registered the name leak.org. Pounding his IQ.org with thoughts and plans for Ghandian, Gramsian prison redux. Seven years ago Julian Assange was at a loss about what to do with his less than zero life. Not for long. Angry bile was seeping to the noggin top. His hair turning white with skull concussive Eurekas! Hurrahs aborning. Eight years ago Julian Assange was completing a world travel trip during which he wrote essays about what the world needed, a soothseer. Fore and aft SDTs were itching. Home remedies applied, Dr, Gurus galore. Far eastern poultices and hickory stick whacking. Hurt lockering, go down dick. Nine years ago Julian assange was in the midst of a world travel trip. Money almost gone. Pan-sexual services bartered for house and food. Condoms aweigh, youth conquers all. Ten years ago Julian Assange was fed up with online meandering and planned a world trap to clear his mind. Lovelorn, aching with shame, diseased mind and body. Penile weariness, so many hackers, so many holes. Eleven years ago Julian Assange ... and so on with auto-ficitonalization. Now ensconced and ankled bejeweled in a country estate, the media begging for his blovia, Julian is defiant, a century of anger ready for tapping, he keens, he says it again, his media sock-puppets repeats ad nauseum, his precious hornyisms sock-rocketed by Google 500 million times and soon, he warns, thermonuclear armageddon. The aged little girls and guys swoon and scream as if it was the 60s again when Youth reigned futurelessly. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sat Dec 18 03:40:11 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 18 Dec 2010 12:40:11 +0100 Subject: [tt] NYT: New Advice for Nuclear Strike: Don't Flee, Get Inside Message-ID: <20101218114011.GU9434@leitl.org> New advice for nuclear strike: don't keep many people pissed off for too long. ----- Forwarded message from Premise Checker ----- From p.charissapu at irco.com Sat Dec 18 17:55:55 2010 From: p.charissapu at irco.com (Pam Charissa) Date: Sat, 18 Dec 2010 18:55:55 -0700 Subject: Certified OnlinePharmacy. Viagra100mg x 60pills ONLY $96, Free shipping for orders over 200USD, 15% off discount for patrons 3rq In-Reply-To: <99be01cb9c9e$854d7233$df2240c1@6hoy4o3> Message-ID: <4D0D662B.2C14D17A@irco.com> Cheap ViagraPills start fr $1.85 30 pills - $ 78 270 pills - $499 Optional: Delivery Insurance (Guaranteeed reshipment if delivery failed) Order more products & get free Regular Airmail shipping! http://twoapenny.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 626 bytes Desc: not available URL: From eugen at leitl.org Sat Dec 18 12:10:02 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 18 Dec 2010 21:10:02 +0100 Subject: [Fwd: [Goanet-News] Offtopic: Wikileaks and India] Message-ID: <20101218201002.GE9434@leitl.org> ----- Forwarded message from John Young ----- From bender at utwente.nl Sat Dec 18 12:27:04 2010 From: bender at utwente.nl (=?koi8-r?B?7s/X2cog9Osg8uYg0yAgMjAxMSDHLg==?=) Date: Sat, 18 Dec 2010 23:27:04 +0300 Subject: =?koi8-r?B?9/zkIM7P19nKIMvPztTSz8zYIMkgy8/S0sXL1MnSz9fLySDUwc3P1sXO?= =?koi8-r?B?zs/KINPUz8nNz9PUySDUz9fB0s/X?= Message-ID: <000d01cb9ef1$eec3d6f0$6400a8c0@bender> 22-23 Декабря 2О1Ог. > C 01 января 2011 года Новое в таможенном законодательстве: нововведения таможенных деклараций (новые формы) изменен порядок декларирования, контроля и корректировки таможенной стоимости товаров. < Московский код; 4.45*Ч_О-95 <<>> 4Ч5*З266 Образование Таможенного союза и единой таможенной территории привело к значительным изменениям в таможенном законодательстве. С 1 июля 2010 года вступил в силу Таможенный кодекс Таможенного союза. С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: * новые формы бланков декларации на товары (решение Комиссии таможенного союза ╧257 от 20 мая 2010 года) и транзитной декларации (решение Комиссии таможенного союза ╧ 289 от 18 июня 2010 года) * инструкция о порядке заполнения декларации на товары (утвержденная в окончательной редакции решением Комиссии таможенного союза ╧379 от 20 сентября 2010 года) * инструкция о порядке заполнения транзитной декларации (решение Комиссии таможенного союза ╧289 от 18 июня 2010 года) * новые классификаторы, используемые для заполнения таможенных деклараций (решение Комиссии таможенного союза ╧378 от 20 сентября 2010 года) * новый порядок декларирования таможенной стоимости и новые формы бланков декларации таможенной стоимости (ДТС и ДТС-1) и корректировки таможенной стоимости и таможенных платежей (КТС) (решение Комиссии таможенного союза ╧ 376 от 20.09.2010 года) Цель: * ознакомить участников ВЭД с особенностями заполнения новых форм деклараций, изменениями в классификаторах, используемых для заполнения таможенных деклараций. * подготовить участников ВЭД к практической работе в условиях действия новых нормативно-правовых документов таможенного союза, регламентирующих вопросы определения, декларирования, контроля и корректировки таможенной стоимости товаров * обсудить проблемы правоприменительной практики по вопросам таможенной стоимости, в том числе дать ответы на вопросы участников ВЭД по актуальным проблемам определения и контроля таможенной стоимости товаров Программа: 1. Новая форма таможенной декларации: особенности заполнения * Изменения в порядке заполнения декларации на товары (ДТ) при декларировании товаров, ввозимых (ввезенных) на таможенную территорию Таможенного союза * Особенности заполнения новой формы декларации на товары, вывозимые с таможенной территории Таможенного союза * Порядок внесения изменений и (или) дополнений в сведения, заявленные в декларации на товары, до и после выпуска товаров * Особенности заполнения графы 47 "Исчисление платежей" 2. Классификаторы и перечни нормативно-справочной информации, используемые для заПолнения таможенных деклараций. Основные изменения. 3. Транзитная декларация: новая форма и правила ее заполнения. 4. Особенности электронного и интернет декларирования. 5. Законодательство Таможенного союза по вопросам таможенной стоимости товаров * Таможенный кодекс Таможенного союза * Соглашение по определению таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза; * Решения Комиссии таможенного союза по вопросам таможенной стоимости товаров: * порядок декларирования таможенной стоимости товаров * порядок контроля таможенной стоимости товаров * порядок корректировки таможенной стоимости товаров * новые формы бланков декларации (ДТС и ДТС-1) и корректировки таможенной стоимости (КТС). 6. Практические проблемы заявления, контроля и корректировки таможенной стоимости товаров * решения, принимаемые таможенными органами в ходе таможенного контроля * дополнительная проверка заявленной таможенной стоимости товаров * корректировка таможенной стоимости товаров * порядок обжалования в арбитражных судах решений таможенных органов по вопросам корректировки таможенной стоимости По вопpоcам pегucтаpацuu обpащайтеcь по тел: (код Москвы) 7Ч2/9|98 <<<>>> 792**2I/_22 From blaurettazv at flipag.net Sun Dec 19 02:12:06 2010 From: blaurettazv at flipag.net (Blondell Lauretta) Date: Sun, 19 Dec 2010 03:12:06 -0700 Subject: ViagraDiscounts, CheapCialis & Much More. Discreet Packaging and Fast Shipping 7ki In-Reply-To: <67e801cb9e72$96249729$d8d5b17f@3d6zya0> Message-ID: <4D0DDA76.CA78A77D@flipag.net> OrderCializViagra Online & Save 75-90% 0nline Pharmacy NoPrescription required Buy Canadian Drugs at Wholesale Prices and Save 75-90% FDA-Approved drugs + Superb Quality Drugs only! Accept all major credit cards Order Today! From $1.38 http://sswbt.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 515 bytes Desc: not available URL: From h.micki_oc at currentmail.com Sun Dec 19 03:06:11 2010 From: h.micki_oc at currentmail.com (Hassie Micki) Date: Sun, 19 Dec 2010 04:06:11 -0700 Subject: 80% Discount WatchStore. Save on Watchesfor Men & Women at Great Prices. Brand Name Styles 7l In-Reply-To: Message-ID: <4D0DE723.88A81E65@currentmail.com> Replica watches On Sale - Best Replica Watches Online Shop We offer a wide selection of cheap replica watches including Rolex, Gucci, Chanel and more. Nobody will even know you are wearing a fake ... Buy Best Quality Replica on our site http://nailsnow.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 604 bytes Desc: not available URL: From 0-ka at kofax.com Sun Dec 19 00:02:08 2010 From: 0-ka at kofax.com (Your Perfect-RX) Date: Sun, 19 Dec 2010 11:02:08 +0300 Subject: Your Miidaetcon Is Ready Message-ID: <0816098291.C2YG6PJ9195140@bxqbstodpvuymd.pvmkcpmwab.net> Low Priced Excitement for both the man and the woman! Results Guaranteed http://to.ly/975I -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 293 bytes Desc: not available URL: From margarette.j_lorie_tr at eng.sun.com Sun Dec 19 16:36:30 2010 From: margarette.j_lorie_tr at eng.sun.com (Margarette Lorie) Date: Sun, 19 Dec 2010 17:36:30 -0700 Subject: Xanax$1.90, Valium$2.15, Ativan$2.15, Vicodin ES $4.40, Free Shipping in the USA and Canada 2mwy In-Reply-To: <055f01cb9a5d$fda56b31$c573bc82@9jbj1m2> Message-ID: <4D0EA50E.D3C7ED34@eng.sun.com> "If You Are In Pain You Will Qualify" Hydrocodone $4.40 Vicodin ES $4.40 Xanax$1.90 ValiumROCHE $2.15 Ativan(� Wyeth) $2.15 Ambien$2.70 Prescription is NOT Required, Safe, Free Shipping in the USA and Canada All Orders Guaranteeed to be Approved or Your Money Back http://legitsrxrs.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 709 bytes Desc: not available URL: From belousovalubov at avialiner.ru Sun Dec 19 09:34:30 2010 From: belousovalubov at avialiner.ru (=?koi8-r?B?4dLIydfJ0s/Xwc7JxQ==?=) Date: Sun, 19 Dec 2010 19:34:30 +0200 Subject: =?koi8-r?B?4dLIydcsIM/Sx8HOydrBw8nRIMkgyNLBzsXOycU=?= Message-ID: <9E0DB0529C11424C9E9D4A886EB6174F@481c61ed9dd94c5> 21 декабря 2010г. ТЕМА: Архив, организация хранения информации. +7 Московский код: 792_2i.22 <> ЧЧ5*32*66 Цель: Со временем на каждом предприятии накапливается большое количество документов - по роду деятельности, переписка, периодика, типографские издания и пр. В последнее время многие документы существуют в электронном виде. Однако любые документы имеют свой жизненный цикл – сначала они актуальны, их создают, используют, потом они теряют свою актуальность или товарный вид. Но по требованию российского законодательства или по производственной необходимости эти документы должны быть сохранены. Для хранения их создают архив предприятия. Посетив наш семинар Вы узнаете: * Как создать архив предприятия с минимальными затратами * Кого назначить ответственным за архив * Как правильно отобрать документы на хранение * Что делать с документами при реорганизации, ликвидации или слиянии предприятия * Как правильно взаимодействовать с государственными архивами Программа: 1. Необходимость сохранности документов. Плюсы наличия архива на предприятии. Ответственность предприятия за сохранность документов 2. Понятие "документ", "делопроизводство", "архив" 3. Виды документов 4. Законодательная база 5. Внутренние регламентирующие документы – инструкция по ведению документооборота, положение об архиве, должностные обязанности ответственных за архив (архивы) предприятия лиц 6. Виды архивов предприятия – общий, кадровый, бухгалтерский (финансовый), производственный; комплектование архивов 7. Электронный архив 8. Лица, ответственные за хранение документов 9. Экспертно-проверочные комиссии 10. Требования к условиям хранения документов 11. Использование документов из архива предприятия 12. Архив предприятия и госархивы, их взаимодействие и сотрудничество. Сдача документов на госхранение 13. Практические рекомендации слушателям, образцы документов 14. Ответы на вопросы слушателей, обсуждение Информацию можно получить по телефонам: (код Москвы). 792.2i22 <<>> 4Ч5ЧО53 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3157 bytes Desc: not available URL: From kmargareta_sh at gambhir.com Sun Dec 19 21:53:46 2010 From: kmargareta_sh at gambhir.com (Kayleen Margareta) Date: Sun, 19 Dec 2010 22:53:46 -0700 Subject: CheapestViagra, CialisLevitre $1.38/tab. Free Combo Pack with Order. No tablet splitting hassle! nsyg In-Reply-To: Message-ID: <4D0EEF6A.DD182332@gambhir.com> OrderCializViagra Online & Save 75-90% 0nline Pharmacy NoPrescription required Buy Canadian Drugs at Wholesale Prices and Save 75-90% FDA-Approved drugs + Superb Quality Drugs only! Accept all major credit cards Order Today! From $1.38 http://vtahh.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 520 bytes Desc: not available URL: From measl at mfn.org Mon Dec 20 08:09:55 2010 From: measl at mfn.org (J.A. Terranson) Date: Mon, 20 Dec 2010 10:09:55 -0600 (CST) Subject: [fd] Monitoring America - Full Story [long] Message-ID: http://projects.washingtonpost.com/top-secret-america/articles/monitoring-america/ Monitoring America Monday, December 20, 2010; 1:40 AM Nine years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators. The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing. The government's goal is to have every state and local law enforcement agency in the country feed information to Washington to buttress the work of the FBI, which is in charge of terrorism investigations in the United States. Other democracies - Britain and Israel, to name two - are well acquainted with such domestic security measures. But for the United States, the sum of these new activities represents a new level of governmental scrutiny. This localized intelligence apparatus is part of a larger Top Secret America created since the attacks. In July, The Washington Post described an alternative geography of the United States, one that has grown so large, unwieldy and secretive that no one knows how much money it costs, how many people it employs or how many programs exist within it. Today's story, along with related material on The Post's Web site, examines how Top Secret America plays out at the local level. It describes a web of 4,058 federal, state and local organizations, each with its own counterterrorism responsibilities and jurisdictions. At least 935 of these organizations have been created since the 2001 attacks or became involved in counterterrorism for the first time after 9/11. The months-long investigation, based on nearly 100 interviews and 1,000 documents, found that: * Technologies and techniques honed for use on the battlefields of Iraq and Afghanistan have migrated into the hands of law enforcement agencies in America. * The FBI is building a database with the names and certain personal information, such as employment history, of thousands of U.S. citizens and residents whom a local police officer or a fellow citizen believed to be acting suspiciously. It is accessible to an increasing number of local law enforcement and military criminal investigators, increasing concerns that it could somehow end up in the public domain. * Seeking to learn more about Islam and terrorism, some law enforcement agencies have hired as trainers self-described experts whose extremist views on Islam and terrorism are considered inaccurate and counterproductive by the FBI and U.S. intelligence agencies. * The Department of Homeland Security sends its state and local partners intelligence reports with little meaningful guidance, and state reports have sometimes inappropriately reported on lawful meetings. Job fair Counterterrorism on Main Street In cities across Tennessee and across the nation local agencies are using sophisticated equipment and techniques to keep an eye out for terrorist threats -- and to watch Americans in the process. Launch Gallery ; The need to identify U.S.-born or naturalized citizens who are planning violent attacks is more urgent than ever, U.S. intelligence officials say. This month's FBI sting operation involving a Baltimore construction worker who allegedly planned to bomb a Maryland military recruiting station is the latest example. It followed a similar arrest of a Somali-born naturalized U.S. citizen allegedly seeking to detonate a bomb near a Christmas tree lighting ceremony in Portland, Ore. There have been nearly two dozen other cases just this year. "The old view that 'if we fight the terrorists abroad, we won't have to fight them here' is just that - the old view," Homeland Security Secretary Janet Napolitano told police and firefighters recently. The Obama administration heralds this local approach as a much-needed evolution in the way the country confronts terrorism. Top Secret America is a project two years in the making that describes the huge security buildup in the United States after the Sept. 11, 2001, attacks. Today.s story is about those efforts at the local level, including law enforcement and homeland security agencies in every state and thousands of communities. View previous stories, explore relationships between government organizations and the types of work being done, and view top-secret geography on an interactive map. However, just as at the federal level, the effectiveness of these programs, as well as their cost, is difficult to determine. The Department of Homeland Security, for example, does not know how much money it spends each year on what are known as state fusion centers, which bring together and analyze information from various agencies within a state. The total cost of the localized system is also hard to gauge. The DHS has given $31 billion in grants since 2003 to state and local governments for homeland security and to improve their ability to find and protect against terrorists, including $3.8 billion in 2010. At least four other federal departments also contribute to local efforts. But the bulk of the spending every year comes from state and local budgets that are too disparately recorded to aggregate into an overall total. The Post findings paint a picture of a country at a crossroads, where long-standing privacy principles are under challenge by these new efforts to keep the nation safe. The public face of this pivotal effort is Napolitano, the former governor of Arizona, which years ago built one of the strongest state intelligence organizations outside of New York to try to stop illegal immigration and drug importation. Napolitano has taken her "See Something, Say Something" campaign far beyond the traffic signs that ask drivers coming into the nation's capital for "Terror Tips" and to "Report Suspicious Activity." She recently enlisted the help of Wal-Mart, Amtrak, major sports leagues, hotel chains and metro riders. In her speeches, she compares the undertaking to the Cold War fight against communists. "This represents a shift for our country," she told New York City police officers and firefighters on the eve of the 9/11 anniversary this fall. "In a sense, this harkens back to when we drew on the tradition of civil defense and preparedness that predated today's concerns." ---- >From Afghanistan to Tennessee On a recent night in Memphis, a patrol car rolled slowly through a parking lot in a run-down section of town. The military-grade infrared camera on its hood moved robotically from left to right, snapping digital images of one license plate after another and analyzing each almost instantly. Suddenly, a red light flashed on the car's screen along with the word "warrant." "Got a live one! Let's do it," an officer called out. The streets of Memphis are a world away from the streets of Kabul, yet these days, the same types of technologies and techniques are being used in both places to identify and collect information about suspected criminals and terrorists. The examples go far beyond Memphis. * Hand-held, wireless fingerprint scanners were carried by U.S. troops during the insurgency in Iraq to register residents of entire neighborhoods. L-1 Identity Solutions is selling the same type of equipment to police departments to check motorists' identities. * In Arizona, the Maricopa County Sheriff's Facial Recognition Unit, using a type of equipment prevalent in war zones, records 9,000 biometric digital mug shots a month. * U.S. Customs and Border Protection flies General Atomics' Predator drones along the Mexican and Canadian borders - the same kind of aircraft, equipped with real-time, full-motion video cameras, that has been used in wars in Kosovo, Iraq and Afghanistan to track the enemy. The special operations units deployed overseas to kill the al-Qaeda leadership drove technological advances that are now expanding in use across the United States. On the front lines, those advances allowed the rapid fusing of biometric identification, captured computer records and cellphone numbers so troops could launch the next surprise raid. Here at home, it's the DHS that is enamored with collecting photos, video images and other personal information about U.S. residents in the hopes of teasing out terrorists. The DHS helped Memphis buy surveillance cameras that monitor residents near high-crime housing projects, problematic street corners, and bridges and other critical infrastructure. It helped pay for license plate readers and defrayed some of the cost of setting up Memphis's crime-analysis center. All together it has given Memphis $11 million since 2003 in homeland security grants, most of which the city has used to fight crime. "We have got things now we didn't have before," said Memphis Police Department Director Larry Godwin, who has produced record numbers of arrests using all this new analysis and technology. "Some of them we can talk about. Some of them we can't." One of the biggest advocates of Memphis's data revolution is John Harvey, the police department's technology specialist, whose computer systems are the civilian equivalent of the fancier special ops equipment used by the military. Harvey collects any information he can pry out of government and industry. When officers were wasting time knocking on the wrong doors to serve warrants, he persuaded the local utility company to give him a daily update of the names and addresses of customers. When he wanted more information about phones captured at crime scenes, he programmed a way to store all emergency 911 calls, which often include names and addresses to associate with phone numbers. He created another program to upload new crime reports every five minutes and mine them for the phone numbers of victims, suspects, witnesses and anyone else listed on them. Now, instead of having to decide which license plate numbers to type into a computer console in the patrol car, an officer can simply drive around, and the automatic license plate reader on his hood captures the numbers on every vehicle nearby. If the officer pulls over a driver, instead of having to wait 20 minutes for someone back at the office to manually check records, he can use a hand-held device to instantly call up a mug shot, a Social Security number, the status of the driver's license and any outstanding warrants. The computer in the cruiser can tell an officer even more about who owns the vehicle, the owner's name and address and criminal history, and who else with a criminal history might live at the same address. Take a recent case of two officers with the hood-mounted camera equipment who stopped a man driving on a suspended license. One handcuffed him, and the other checked his own PDA. Based on the information that came up, the man was ordered downtown to pay a fine and released as the officers drove off to stop another car. That wasn't the end of it, though. A record of that stop - and the details of every other arrest made that night, and every summons written - was automatically transferred to the Memphis Real Time Crime Center, a command center with three walls of streaming surveillance video and analysis capabilities that rival those of an Army command center. There, the information would be geocoded on a map to produce a visual rendering of crime patterns. This information would help the crime intelligence analysts predict trends so the department could figure out what neighborhoods to swarm with officers and surveillance cameras. But that was still not the end of it, because the fingerprints from the crime records would also go to the FBI's data campus in Clarksburg, W.Va. There, fingerprints from across the United States are stored, along with others collected by American authorities from prisoners in Saudi Arabia and Yemen, Iraq and Afghanistan. There are 96 million sets of fingerprints in Clarksburg, a volume that government officials view not as daunting but as an opportunity. This year for the first time, the FBI, the DHS and the Defense Department are able to search each other's fingerprint databases, said Myra Gray, head of the Defense Department's Biometrics Identity Management Agency, speaking to an industry group recently. "Hopefully in the not-too-distant future," she said, "our relationship with these federal agencies - along with state and local agencies - will be completely symbiotic." ---- The FBI's 'suspicious' files At the same time that the FBI is expanding its West Virginia database, it is building a vast repository controlled by people who work in a top-secret vault on the fourth floor of the J. Edgar Hoover FBI Building in Washington. This one stores the profiles of tens of thousands of Americans and legal residents who are not accused of any crime. What they have done is appear to be acting suspiciously to a town sheriff, a traffic cop or even a neighbor. If the new Nationwide Suspicious Activity Reporting Initiative, or SAR, works as intended, the Guardian database may someday hold files forwarded by all police departments across the country in America's continuing search for terrorists within its borders. The effectiveness of this database depends, in fact, on collecting the identities of people who are not known criminals or terrorists - and on being able to quickly compile in-depth profiles of them. "If we want to get to the point where we connect the dots, the dots have to be there," said Richard A. McFeely, special agent in charge of the FBI's Baltimore office. In response to concerns that information in the database could be improperly used or released, FBI officials say anyone with access has been trained in privacy rules and the penalties for breaking them. But not everyone is convinced. "It opens a door for all kinds of abuses," said Michael German, a former FBI agent who now leads the American Civil Liberties Union's campaign on national security and privacy matters. "How do we know there are enough controls?" The government defines a suspicious activity as "observed behavior reasonably indicative of pre-operational planning related to terrorism or other criminal activity" related to terrorism. State intelligence analysts and FBI investigators use the reports to determine whether a person is buying fertilizer to make a bomb or to plant tomatoes; whether she is plotting to poison a city's drinking water or studying for a metallurgy test; whether, as happened on a Sunday morning in late September, the man snapping a picture of a ferry in the Newport Beach harbor in Southern California simply liked the way it looked or was plotting to blow it up. Suspicious Activity Report N03821 says a local law enforcement officer observed "a suspicious subject . . . taking photographs of the Orange County Sheriff Department Fire Boat and the Balboa Ferry with a cellular phone camera." The confidential report, marked "For Official Use Only," noted that the subject next made a phone call, walked to his car and returned five minutes later to take more pictures. He was then met by another person, both of whom stood and "observed the boat traffic in the harbor." Next another adult with two small children joined them, and then they all boarded the ferry and crossed the channel. All of this information was forwarded to the Los Angeles fusion center for further investigation after the local officer ran information about the vehicle and its owner through several crime databases and found nothing. Authorities would not say what happened to it from there, but there are several paths a suspicious activity report can take: At the fusion center, an officer would decide to either dismiss the suspicious activity as harmless or forward the report to the nearest FBI terrorism unit for further investigation. At that unit, it would immediately be entered into the Guardian database, at which point one of three things could happen: The FBI could collect more information, find no connection to terrorism and mark the file closed, though leaving it in the database. It could find a possible connection and turn it into a full-fledged case. Or, as most often happens, it could make no specific determination, which would mean that Suspicious Activity Report N03821 would sit in limbo for as long as five years, during which time many other pieces of information about the man photographing a boat on a Sunday morning could be added to his file: employment, financial and residential histories; multiple phone numbers; audio files; video from the dashboard-mounted camera in the police cruiser at the harbor where he took pictures; and anything else in government or commercial databases "that adds value," as the FBI agent in charge of the database described it. That could soon include biometric data, if it existed; the FBI is working on a way to attach such information to files. Meanwhile, the bureau will also soon have software that allows local agencies to map all suspicious incidents in their jurisdiction. The Defense Department is also interested in the database. It recently transferred 100 reports of suspicious behavior into the Guardian system, and over time it expects to add thousands more as it connects 8,000 military law enforcement personnel to an FBI portal that will allow them to send and review reports about people suspected of casing U.S. bases or targeting American personnel. And the DHS has created a separate way for state and local authorities, private citizens, and businesses to submit suspicious activity reports to the FBI and to the department for analysis. As of December, there were 161,948 suspicious activity files in the classified Guardian database, mostly leads from FBI headquarters and state field offices. Two years ago, the bureau set up an unclassified section of the database so state and local agencies could send in suspicious incident reports and review those submitted by their counterparts in other states. Some 890 state and local agencies have sent in 7,197 reports so far. Of those, 103 have become full investigations that have resulted in at least five arrests, the FBI said. There have been no convictions yet. An additional 365 reports have added information to ongoing cases. But most remain in the uncertain middle, which is why within the FBI and other intelligence agencies there is much debate about the effectiveness of the bottom-up SAR approach, as well as concern over the privacy implications of retaining so much information on U.S. citizens and residents who have not been charged with anything. The vast majority of terrorism leads in the United States originate from confidential FBI sources and from the bureau's collaboration with federal intelligence agencies, which mainly work overseas. Occasionally a stop by a local police officer has sparked an investigation. Evidence comes from targeted FBI surveillance and undercover operations, not from information and analysis generated by state fusion centers about people acting suspiciously. "It's really resource-inefficient," said Philip Mudd, a 20-year CIA counterterrorism expert and a top FBI national security official until he retired nine months ago. "If I were to have a dialogue with the country about this . . . it would be about not only how we chase the unknowns, but do you want to do suspicious activity reports across the country? . . . Anyone who is not at least suspected of doing something criminal should not be in a database." Charles Allen, a longtime senior CIA official who then led the DHS's intelligence office until 2009, said some senior people in the intelligence community are skeptical that SARs are an effective way to find terrorists. "It's more likely that other kinds of more focused efforts by local police will gain you the information that you need about extremist activities," he said. The DHS can point to some successes: Last year the Colorado fusion center turned up information on Najibullah Zazi, an Afghan-born U.S. resident planning to bomb the New York subway system. In 2007, a Florida fusion center provided the vehicle ownership history used to identify and arrest an Egyptian student who later pleaded guilty to providing material support to terrorism, in this case transporting explosives. "Ninety-nine percent doesn't pan out or lead to anything" said Richard Lambert Jr., the special agent in charge of the FBI's Knoxville office. "But we're happy to wade through these things." ---- Expert training? Ramon Montijo has taught classes on terrorism and Islam to law enforcement officers all over the country. "Alabama, Colorado, Vermont," said Montijo, a former Army Special Forces sergeant and Los Angeles Police Department investigator who is now a private security consultant. "California, Texas and Missouri," he continued. What he tells them is always the same, he said: Most Muslims in the United States want to impose sharia law here. "They want to make this world Islamic. The Islamic flag will fly over the White House - not on my watch!" he said. "My job is to wake up the public, and first, the first responders." With so many local agencies around the country being asked to help catch terrorists, it often falls to sheriffs or state troopers to try to understand the world of terrorism. They aren't FBI agents, who have years of on-the-job and classroom training. Instead, they are often people like Lacy Craig, who was a police dispatcher before she became an intelligence analyst at Idaho's fusion center, or the detectives in Minnesota, Michigan and Arkansas who can talk at length about the lineage of gangs or the signs of a crystal meth addict. Now each of them is a go-to person on terrorism as well. "The CIA used to train analysts forever before they graduated to be a real analyst," said Allen, the former top CIA and DHS official. "Today we take former law enforcement officers and we call them intelligence officers, and that's not right, because they have not received any training on intelligence analysis." State fusion center officials say their analysts are getting better with time. "There was a time when law enforcement didn't know much about drugs. This is no different," said Steven W. Hewitt, who runs the Tennessee fusion center, considered one of the best in the country. "Are we experts at the level of [the National Counterterrorism Center]? No. Are we developing an expertise? Absolutely." But how they do that is usually left up to the local police departments themselves. In their desire to learn more about terrorism, many departments are hiring their own trainers. Some are self-described experts whose extremist views are considered inaccurate and harmful by the FBI and others in the intelligence community Like Montijo, Walid Shoebat, a onetime Muslim who converted to Christianity, also lectures to local police. He too believes that most Muslims seek to impose sharia law in the United States. To prevent this, he said in an interview, he warns officers that "you need to look at the entire pool of Muslims in a community." When Shoebat spoke to the first annual South Dakota Fusion Center Conference in Sioux Falls this June, he told them to monitor Muslim student groups and local mosques and, if possible, tap their phones. "You can find out a lot of information that way," he said. A book expanding on what Shoebat and Montijo believe has just been published by the Center for Security Policy, a Washington-based neoconservative think tank. "Shariah: The Threat to America" describes what its authors call a "stealth jihad" that must be thwarted before it's too late. The book's co-authors include such notables as former CIA director R. James Woolsey and former deputy undersecretary of defense for intelligence Lt. Gen. William G. Boykin, along with the center's director, a longtime activist. They write that most mosques in the United States already have been radicalized, that most Muslim social organizations are fronts for violent jihadists and that Muslims who practice sharia law seek to impose it in this country. Frank Gaffney Jr., director of the center, said his team has spoken widely, including to many law enforcement forums. "Members of our team have been involved in training programs for several years now, many of which have been focused on local law enforcement intelligence, homeland security, state police, National Guard units and the like," Gaffney said. "We're seeing a considerable ramping-up of interest in getting this kind of training." Government terrorism experts call the views expressed in the center's book inaccurate and counterproductive. They say the DHS should increase its training of local police, using teachers who have evidence-based viewpoints. DHS spokeswoman Amy Kudwa said the department does not maintain a list of terrorism experts but is working on guidelines for local authorities wrestling with the topic. So far, the department has trained 1,391 local law enforcement officers in analyzing public information and 400 in analytic thinking and writing skills. Kudwa said the department also offers counterterrorism training through the Federal Emergency Management Agency, which this year enrolled 94 people in a course called "Advanced Criminal Intelligence Analysis to Prevent Terrorism." ---- A lack of useful information The DHS also provides local agencies a daily flow of information bulletins. These reports are meant to inform agencies about possible terror threats. But some officials say they deliver a never-ending stream of information that is vague, alarmist and often useless. "It's like a garage in your house you keep throwing junk into until you can't park your car in it," says Michael Downing, deputy chief of counterterrorism and special operations for the Los Angeles Police Department. A review of nearly 1,000 DHS reports dating back to 2003 and labeled "For Official Use Only" underscores Downing's description. Typical is one from May 24, 2010, titled "Infrastructure Protection Note: Evolving Threats to the Homeland." It tells officials to operate "under the premise that other operatives are in the country and could advance plotting with little or no warning." Its list of vulnerable facilities seems to include just about everything: "Commercial Facilities, Government Facilities, Banking and Financial and Transportation . . ." Bart R. Johnson, who heads the DHS's intelligence and analysis office, defended such reports, saying that threat reporting has "grown and matured and become more focused." The bulletins can't be more specific, he said, because they must be written at the unclassified level. Recently, the International Association of Chiefs of Police agreed that the information they were receiving had become "more timely and relevant" over the past year. Downing, however, said the reports would be more helpful if they at least assessed threats within a specific state's boundaries. States have tried to do that on their own, but with mixed, and at times problematic, results. In 2009, for instance, after the DHS and the FBI sent out several ambiguous reports about threats to mass-transit systems and sports and entertainment venues, the New Jersey Regional Operations Intelligence Center's Threat Analysis Program added its own information. "New Jersey has a large mass-transit infrastructure," its report warned, and "an NFL stadium and NHL/NBA arenas, a soccer stadium, and several concert venues that attract large crowds." In Virginia, the state's fusion center published a terrorism threat assessment in 2009 naming historically black colleges as potential hubs for terrorism. >From 2005 to 2007, the Maryland State Police went even further, infiltrating and labeling as terrorists local groups devoted to human rights, antiwar causes and bike lanes. And in Pennsylvania this year, a local contractor hired to write intelligence bulletins filled them with information about lawful meetings as varied as Pennsylvania Tea Party Patriots Coalition gatherings, antiwar protests and an event at which environmental activists dressed up as Santa Claus and handed out coal-filled stockings. ---- 'We have our own terrorists' Even if the information were better, it might not make a difference for the simplest of reasons: In many cities and towns across the country, there is just not enough terrorism-related work to do. In Utah on one recent day, one of five intelligence analysts in the state's fusion center was writing a report about the rise in teenage overdoses of an over-the-counter drug. Another was making sure the visiting president of Senegal had a safe trip. Another had just helped a small town track down two people who were selling magazine subscriptions and pocketing the money themselves. In the Colorado Information Analysis Center, some investigators were following terrorism leads. Others were looking into illegal Craigslist postings and online "World of Warcraft" gamers. The vast majority of fusion centers across the country have transformed themselves into analytical hubs for all crimes and are using federal grants, handed out in the name of homeland security, to combat everyday offenses. This is happening because, after 9/11, local law enforcement groups did what every agency and private company did in Top Secret America: They followed the money. The DHS helped the Memphis Police Department, for example, purchase 90 surveillance cameras, including 13 that monitor bridges and a causeway. It helped buy the fancy screens on the walls of the Real Time Crime Center, as well as radios, robotic surveillance equipment, a mobile command center and three bomb-sniffing dogs. All came in the name of port security and protection to critical infrastructure. Since there hasn't been a solid terrorism case in Memphis yet, the equipment's greatest value has been to help drive down city crime. Where the mobile surveillance cameras are set up, criminals scatter, said Lt. Mark Rewalt, who, on a recent Saturday night, scanned the city from an altitude of 1,000 feet. Flying in a police helicopter, Rewalt pointed out some of the cameras the DHS has funded. They are all over the city, in mall parking lots, in housing projects, at popular street hang-outs. "Cameras are what's happening now," he marveled. Meanwhile, another post-9/11 unit in Tennessee has had even less terrorism-related work to do. The Tennessee National Guard 45th Weapons of Mass Destruction Civil Support Team, one of at least 50 such units around the country, was created to respond to what officials still believe is the inevitable release of chemical, biological or radiological material by terrorists. The unit's 22 hazardous-materials personnel have the best emergency equipment in the state. A fleet of navy-blue vehicles - command, response, detection and tactical operations trucks - is kept polished and ready to roll in a garage at the armory in Smyrna. The unit practices WMD scenarios constantly. But in real life, the crew uses the equipment very little: twice a year at NASCAR races in nearby Bristol to patrol for suspicious packages. Other than that, said Capt. Matt Hayes, several times a year they respond to hoaxes. The fact that there has not been much terrorism to worry about is not evident on the Tennessee fusion center's Web site. Click on the incident map, and the state appears to be under attack. Red icons of explosions dot Tennessee, along with blinking exclamation marks and flashing skulls. The map is labeled: "Terrorism Events and Other Suspicious Activity. But if you roll over the icons, the explanations that pop up have nothing to do with major terrorist plots: "Johnson City police are investigating three 'bottle bombs' found at homes over the past three days," one description read recently. ". . . The explosives were made from plastic bottles with something inside that reacted chemically and caused the bottles to burst." Another told a similar story: "The Scott County Courthouse is currently under evacuation after a bomb threat was called in Friday morning. Update: Authorities completed their sweep . . . and have called off the evacuation." Nine years after 9/11, this map is part of the alternative geography that is Top Secret America, where millions of people are assigned to help stop terrorism. Memphis Police Director Godwin is one of them, and he has his own version of what that means in a city where there have been 86 murders so far this year. "We have our own terrorists, and they are taking lives every day," Godwin said. "No, we don't have suicide bombers - not yet. But you need to remain vigilant and realize how vulnerable you can be if you let up." Staff researcher Julie Tate contributed to this story. From alekseishuranov at vodprom.ru Mon Dec 20 03:23:29 2010 From: alekseishuranov at vodprom.ru (Luther Hill) Date: Mon, 20 Dec 2010 12:23:29 +0100 Subject: =?koi8-r?B?++Xu5+Xu8+vp5SD36fr5IPPy7/7u7yAtIDk1MCDVLsUgLyDHz8Q=?= Message-ID: ШЕНГЕНСКИЕ ВИЗЫ - СРОЧНО - 950 у.е / год +7 (495) 646 13 93 (круглосуточно / без выходных) Шенгенские ДЕЛОВЫЕ мульти-визы (Италия, Швейцария, Франция, Германия) Мульти-виза за 3 РАБОЧИХ ДНЯ Краткосрочные - от 3 до 30 дней - 100-220 у.е (+ консульский сбор) Среднесрочные - 1 год - 950 у.е, 6 месяцев - 750 у.е, 3 месяца - 550 у.е. (сбор включен) Долгосрочные - 2 года - 1800 у.е, 3 года - 2 650 у.е, 4 года - 3 200 у.е. (сбор включен) Шенгенские мультивизы для уроженцев и жителей Северного Кавказа и паспортов с отказами (граждане России). Мы также поможем с визой в: США, Великобритания, Канада, Австралия, Мексика, ОАЭ. Найдете ДЕШЕВЛЕ - мы дадим СКИДКУ !!! ОПЛАТА только ПОСЛЕ ВЫХОДА ВИЗЫ. ГАРАНТИЯ. +7 (495) 646 13 93 (круглосуточно / без выходных) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2293 bytes Desc: not available URL: From company at rinex.ru Mon Dec 20 04:03:20 2010 From: company at rinex.ru (=?koi8-r?B?7cXOxcTWxdLVINDPIPf85A==?=) Date: Mon, 20 Dec 2010 15:03:20 +0300 Subject: =?koi8-r?B?7s/Xz9fXxcTFzsnRINcg1MHNz9bFzs7PzSDawcvPzs/EwdTFzNjT1NfF?= Message-ID: <000d01cba03d$e4b3a9e0$6400a8c0@company> 22-23 Декабря > С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: новые формы таможенных деклараций и новый порядок декларирования, контроля и корректировки таможенной стоимости товаров < код: (четыре девять пять) Ч45*40/95 <> Ч45/З2-66 Образование Таможенного союза и единой таможенной территории привело к значительным изменениям в таможенном законодательстве. С 1 июля 2010 года вступил в силу Таможенный кодекс Таможенного союза. С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: * новые формы бланков декларации на товары (решение Комиссии таможенного союза ╧257 от 20 мая 2010 года) и транзитной декларации (решение Комиссии таможенного союза ╧ 289 от 18 июня 2010 года) * инструкция о порядке заполнения декларации на товары (утвержденная в окончательной редакции решением Комиссии таможенного союза ╧379 от 20 сентября 2010 года) * инструкция о порядке заполнения транзитной декларации (решение Комиссии таможенного союза ╧289 от 18 июня 2010 года) * новые классификаторы, используемые для заполнения таможенных деклараций (решение Комиссии таможенного союза ╧378 от 20 сентября 2010 года) * новый порядок декларирования таможенной стоимости и новые формы бланков декларации таможенной стоимости (ДТС и ДТС-1) и корректировки таможенной стоимости и таможенных платежей (КТС) (решение Комиссии таможенного союза ╧ 376 от 20.09.2010 года) Цель: * ознакомить участников ВЭД с особенностями заполнения новых форм деклараций, изменениями в классификаторах, используемых для заполнения таможенных деклараций. * подготовить участников ВЭД к практической работе в условиях действия новых нормативно-правовых документов таможенного союза, регламентирующих вопросы определения, декларирования, контроля и корректировки таможенной стоимости товаров * обсудить проблемы правоприменительной практики по вопросам таможенной стоимости, в том числе дать ответы на вопросы участников ВЭД по актуальным проблемам определения и контроля таможенной стоимости товаров Программа: 1. Новая форма таможенной декларации: особенности заполнения * Изменения в порядке заполнения декларации на товары (ДТ) при декларировании товаров, ввозимых (ввезенных) на таможенную территорию Таможенного союза * Особенности заполнения новой формы декларации на товары, вывозимые с таможенной территории Таможенного союза * Порядок внесения изменений и (или) дополнений в сведения, заявленные в декларации на товары, до и после выпуска товаров * Особенности заполнения графы 47 "Исчисление платежей" 2. Классификаторы и перечни нормативно-справочной информации, используемые для заПолнения таможенных деклараций. Основные изменения. 3. Транзитная декларация: новая форма и правила ее заполнения. 4. Особенности электронного и интернет декларирования. 5. Законодательство Таможенного союза по вопросам таможенной стоимости товаров * Таможенный кодекс Таможенного союза * Соглашение по определению таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза; * Решения Комиссии таможенного союза по вопросам таможенной стоимости товаров: * порядок декларирования таможенной стоимости товаров * порядок контроля таможенной стоимости товаров * порядок корректировки таможенной стоимости товаров * новые формы бланков декларации (ДТС и ДТС-1) и корректировки таможенной стоимости (КТС). 6. Практические проблемы заявления, контроля и корректировки таможенной стоимости товаров * решения, принимаемые таможенными органами в ходе таможенного контроля * дополнительная проверка заявленной таможенной стоимости товаров * корректировка таможенной стоимости товаров * порядок обжалования в арбитражных судах решений таможенных органов по вопросам корректировки таможенной стоимости По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 (Ч95) Ч454095 и 7922l.22 From teddks at gmail.com Mon Dec 20 15:39:59 2010 From: teddks at gmail.com (Ted Smith) Date: Mon, 20 Dec 2010 18:39:59 -0500 Subject: Visualization: Tor nodes on Google Maps and Google Earth In-Reply-To: <20101215144734.GE9434@leitl.org> References: <20101215144734.GE9434@leitl.org> Message-ID: <1292888399.19850.3.camel@anglachel> The KML file works great in Marble (), a free software Google Earth-like program. It's also available in Debian and derivatives under the package "marble". Apologies to anyone who got this twice, but I wanted to make sure that both lists were aware of this (since I don't really like the "look at the Tor network on Google" thing). On Wed, 2010-12-15 at 15:47 +0100, Eugen Leitl wrote: > ----- Forwarded message from Moritz Bartl ----- > > From: Moritz Bartl > Date: Wed, 15 Dec 2010 15:43:38 +0100 > To: or-talk at freehaven.net > Subject: Visualization: Tor nodes on Google Maps and Google Earth > User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7 > Reply-To: or-talk at freehaven.net > > Hi, > > I wrote a small ugly Python script to visualize Tor relays on Google > Maps and Google Earth. You can see the result here: > > * Open KML file in Google Maps: > http://maps.google.com/maps?q=http:%2F%2Fwww.torservers.net%2Fmisc%2Ftormap%2 Ftormap.kml > > * Download tormap.kml for Google Earth > http://www.torservers.net/misc/tormap/tormap.kml > > The KML standard is being pushed by Google and should work for > OpenStreetMap, too, but I couldn't get it to load there. Feel free to > modify the script to generate other outputs. > The initial idea was to scale the marker size to show the relay's > bandwidth, but Google Maps does not support this. > > The markers might give a false impression of accuracy. Most IPs can only > be tracked to city level (or even region), ie. the markers are somewhat > near, not necessarily at the real location of the relay. > > You can download the script here: > http://www.torservers.net/misc/tormap/tormap.py (LGPL) > > This is a one-time snapshot and I will not update it regularly, unless > there is public interest to do so. The bandwidth categories are based on > the reported "observed bandwidth" at the time of creation, so the actual > number of high bandwidth nodes will fluctuate every time the script is > run. It would be nice to extend this script to use longer-term bandwidth > calculation like TorStatus does, and to generate a map over time using > all the consensus data provided at http://archive.torproject.org/. An > example of what this could look like is Vis4Net's Wikileaks Mirror World > Map at http://labs.vis4.net/wikileaks/mirrors/ . > > ( Mostly copied from my blog at > http://moblog.wiredwings.com/archives/20101213/Visualization-Tor-nodes-on-Goo gle-Maps-and-Google-Earth.html > ) > -- > Moritz > http://www.torservers.net/ > *********************************************************************** > To unsubscribe, send an e-mail to majordomo at torproject.org with > unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ > > ----- End forwarded message ----- [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From 0-0-direction at mbhotel.com.jfet.org Mon Dec 20 09:48:54 2010 From: 0-0-direction at mbhotel.com.jfet.org (_Canada Pharm_) Date: Mon, 20 Dec 2010 18:48:54 +0100 Subject: We can ship your medication to you Message-ID: <0011524291.3KYO51HA573206@xeeilzitezsgepq.izvrphjctnkl.biz> Add some Christmas "Joy" into your [Sex~Life] Satisfaction Guaranteed! http://products.treatgroan.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 278 bytes Desc: not available URL: From jura at uks.kiev.ua Mon Dec 20 09:51:23 2010 From: jura at uks.kiev.ua (=?koi8-r?B?68/O09TBztTJzg==?=) Date: Tue, 21 Dec 2010 01:51:23 +0800 Subject: =?koi8-r?B?/NTPINTPzNjLzyDEzNEg2sHLwdreycvP1w==?= Message-ID: <000d01cba06e$84485250$6400a8c0@jura> Предлагаем качественную доставку рекламы Базы адресов постоянно обновляются Очень гибкая система скидок постоянным клиентам до 50% При заказе 2х рассылок, 3я бесплатная; Подготовка макета бесплатно; Быстрый выход рассылки, по желанию день в день; Самый массовый охват целевой аудитории Пробив фильтров. Любые формы оплаты; Каждая рассылка перед отправкой тестируется; Москва от 2 тыс руб. Россия от 3000 руб. Страны СНГ от 2,5 тыс руб. Наши цены самые альтернативные, закажите у Нас и Вы будете удивлены качеством обслуживания. Формируем базы под каждое направление, продукт реализации. Фокусировка себя полностью оправдывает. тел: Девять шесть четыре далее семьсот два тридцать шесть восемьдесят пять From alourdesgl at got.net Tue Dec 21 01:54:08 2010 From: alourdesgl at got.net (Angelika Lourdes) Date: Tue, 21 Dec 2010 02:54:08 -0700 Subject: You Have Everything To Gain! 3-4 inches more to yourPenis, 100% MoneyBack Guaranteeed eros In-Reply-To: <209901cb9e4d$e551d797$475f9d44@brzg112> Message-ID: <4D107940.8DFD8120@got.net> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://twoapenny.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 839 bytes Desc: not available URL: From jvem at alio.ru Tue Dec 21 01:13:28 2010 From: jvem at alio.ru (=?koi8-r?B?1M/XwdIgzsEgx9LBzsnDxQ==?=) Date: Tue, 21 Dec 2010 12:13:28 +0300 Subject: =?koi8-r?B?6drNxc7FzsnRIMTFy8zB0snSz9fBzsnRINTBzc/Wxc7Oz8og09TPyc3P?= =?koi8-r?B?09TJINTP18HSz9c=?= Message-ID: <20FDD727D6E04E6F8261EAFAF23225A7@tanya> 22-2З Декабря > С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: новые формы таможенных деклараций и новый порядок декларирования, контроля и корректировки таможенной стоимости товаров < Московский код;_74-29|_98 <> 792_2l.2*2 Образование Таможенного союза и единой таможенной территории привело к значительным изменениям в таможенном законодательстве. С 1 июля 2010 года вступил в силу Таможенный кодекс Таможенного союза. С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: * новые формы бланков декларации на товары (решение Комиссии таможенного союза №257 от 20 мая 2010 года) и транзитной декларации (решение Комиссии таможенного союза № 289 от 18 июня 2010 года) * инструкция о порядке заполнения декларации на товары (утвержденная в окончательной редакции решением Комиссии таможенного союза №379 от 20 сентября 2010 года) * инструкция о порядке заполнения транзитной декларации (решение Комиссии таможенного союза №289 от 18 июня 2010 года) * новые классификаторы, используемые для заполнения таможенных деклараций (решение Комиссии таможенного союза №378 от 20 сентября 2010 года) * новый порядок декларирования таможенной стоимости и новые формы бланков декларации таможенной стоимости (ДТС и ДТС-1) и корректировки таможенной стоимости и таможенных платежей (КТС) (решение Комиссии таможенного союза № 376 от 20.09.2010 года) Цель: * ознакомить участников ВЭД с особенностями заполнения новых форм деклараций, изменениями в классификаторах, используемых для заполнения таможенных деклараций. * подготовить участников ВЭД к практической работе в условиях действия новых нормативно-правовых документов таможенного союза, регламентирующих вопросы определения, декларирования, контроля и корректировки таможенной стоимости товаров * обсудить проблемы правоприменительной практики по вопросам таможенной стоимости, в том числе дать ответы на вопросы участников ВЭД по актуальным проблемам определения и контроля таможенной стоимости товаров Программа: 1. Новая форма таможенной декларации: особенности заполнения * Изменения в порядке заполнения декларации на товары (ДТ) при декларировании товаров, ввозимых (ввезенных) на таможенную территорию Таможенного союза * Особенности заполнения новой формы декларации на товары, вывозимые с таможенной территории Таможенного союза * Порядок внесения изменений и (или) дополнений в сведения, заявленные в декларации на товары, до и после выпуска товаров * Особенности заполнения графы 47 "Исчисление платежей" 2. Классификаторы и перечни нормативно-справочной информации, используемые для заПолнения таможенных деклараций. Основные изменения. 3. Транзитная декларация: новая форма и правила ее заполнения. 4. Особенности электронного и интернет декларирования. 5. Законодательство Таможенного союза по вопросам таможенной стоимости товаров * Таможенный кодекс Таможенного союза * Соглашение по определению таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза; * Решения Комиссии таможенного союза по вопросам таможенной стоимости товаров: * порядок декларирования таможенной стоимости товаров * порядок контроля таможенной стоимости товаров * порядок корректировки таможенной стоимости товаров * новые формы бланков декларации (ДТС и ДТС-1) и корректировки таможенной стоимости (КТС). 6. Практические проблемы заявления, контроля и корректировки таможенной стоимости товаров * решения, принимаемые таможенными органами в ходе таможенного контроля * дополнительная проверка заявленной таможенной стоимости товаров * корректировка таможенной стоимости товаров * порядок обжалования в арбитражных судах решений таможенных органов по вопросам корректировки таможенной стоимости По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: (код Москвы) ЧЧ-539*68 и 4Ч*539_68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7431 bytes Desc: not available URL: From belmetwest at ligaru.ru Mon Dec 20 22:44:05 2010 From: belmetwest at ligaru.ru (Suzette Brock) Date: Tue, 21 Dec 2010 12:14:05 +0530 Subject: =?koi8-r?B?7sXWyczZxSDQz83F3cXOydEgz9Qg08/C09TXxc7OycvB?= Message-ID: <000d01cba0da$75dddca0$6400a8c0@belmetwest> НЕЖИЛЫЕ ПОМЕЩЕНИЯ ОТ СОБСТВЕННИКА Продажа/Аренда ул. Коломенская, д. 21, к. 3, м.Коломенская, 7 мин. транспортом Помещения свободного назначения (банк, магазин, офис) в жилом доме бизнес класса, 1-2 этажи, 2 отдельных входа Общая площадь 1608,3 кв. м Все помещения с ремонтом в рабочем состоянии.═ Цена продажи: 85 000 за кв. м Цена аренды: 10 500 руб/м2 Контакты (495) 969-32-95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1461 bytes Desc: not available URL: From xlon at Safe-mail.net Tue Dec 21 11:22:40 2010 From: xlon at Safe-mail.net (xlon at Safe-mail.net) Date: Tue, 21 Dec 2010 12:22:40 -0700 Subject: OT: Mixmaster Message-ID: Hello List, I've been mulling over the wisdom of sending this message, finally decided it was the right thing to do. I would like to request that those of you who so generously donate their time and bandwidth running a Tor node to consider also running an instance of that old and venerable ancestor of Tor, mixmaster. With its long and fabled history and stellar record in protecting the anonymity of users, it is a perfect high-latency compliment to Tor's low-latency focus. While development has been negligible over the last few years, the network is still strong and serves the community well. Recently some very simple client software has been developed, making accessibility to the masses much more possible than it has been in the past. If anybody is so inclined, mixmaster may be found at http://sourceforge.net/projects/mixmaster/ Documentation is included, though much more may be found on the Web. A mailing list for mixmaster operators may be found at http://lists.mixmin.net/mailman/listinfo/remops Thank you for your consideration, A Fan of Low-Latency *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From albina-pt at hotsheet.com Tue Dec 21 05:27:24 2010 From: albina-pt at hotsheet.com (=?koi8-r?B?4czFy9PBzsTS?=) Date: Tue, 21 Dec 2010 14:27:24 +0100 Subject: =?koi8-r?B?MTAg0sHT09nMz8sg2sEgMTAg1NnTLiDS1cI=?= Message-ID: <628657736.07729922296650@hotsheet.com> Приближаются Новогодние и Рождественские праздники. Мы приготовили для Вас праздничное предложение и надеемся, что Вам это окажется выгодно. Предложение действительно только с 25 декабря 2010года до 09 января 2011года включительно. Пакетные рассылки: 10 рассылок за 10 тыс. рублей. (Москва самая полная база, доставка на 6-7 млн. за одну рассылку, всего уникальных адресов 17 млн.) Израсходовать нужно в указанные числа, в стоимость входит изготовление только одного макета, каждый последующий 500 руб. или тот который вы изготовите самостоятельно. 10 рассылок за 15 тыс. рублей. (Вся Россия самая полная база, доставка на 12-14 млн. за одну рассылку, всего уникальных адресов 27 млн.) Израсходовать нужно в указанные числа, в стоимость входит изготовление только одного макета, каждый последующий 500 руб. или тот который вы изготовите самостоятельно. ВНИМАНИЕ КОЛИЧЕСТВО ПАКЕТОВ ОГРАНИЧЕНО тел: Девять шесть четыре далее семьсот два тридцать шесть восемьдесят пять From jacquelynelashundats at dadebehring.com Tue Dec 21 18:02:49 2010 From: jacquelynelashundats at dadebehring.com (Jacquelyne Lashunda) Date: Tue, 21 Dec 2010 19:02:49 -0700 Subject: "If You Are In Pain You Will Qualify", Hydrocodone $4.40, Xanax$1.90, Valium$2.15, Ativan$2.15 vpz In-Reply-To: <49bc01cb9d1d$e41451bc$b182c7c5@g00rfc2> Message-ID: <4D115C49.883CB4B8@dadebehring.com> "If You Are In Pain You Will Qualify" Hydrocodone $4.40 Vicodin ES $4.40 Xanax$1.90 ValiumROCHE $2.15 Ativan(� Wyeth) $2.15 Ambien$2.70 Prescription is NOT Required, Safe, Free Shipping in the USA and Canada All Orders Guaranteeed to be Approved or Your Money Back http://bucheapmeds.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 714 bytes Desc: not available URL: From contact at suvorkov.ru Tue Dec 21 12:37:04 2010 From: contact at suvorkov.ru (=?koi8-r?B?5MzRIMLBzsvP19PLycgg09DFw8nBzMnT1M/X?=) Date: Tue, 21 Dec 2010 21:37:04 +0100 Subject: =?koi8-r?B?79TXxdTT1NfFzs7P09TYINrBIM7B0tXbxc7JxSAg18HMwNTOz8fPINrB?= =?koi8-r?B?y8/Oz8TB1MXM2NPU18E=?= Message-ID: <000d01cba14e$d3e48140$6400a8c0@contact> Вниманию банков, финансовых, страховых компаний (ЦБ РФ) Валютное регулирование и валютный контроль на современном этапе Валютное регулирование (ЦБ РФ) 8 Моск. код: 4Ч*5Ч-О95 \\// 792-/2i*_22 23 Декабря Лектор: начальник управления Департамента финансового Мониторинга и валютного контроля Банка России. 1. Система валютного регулирования и валютного контроля в Российской Федерации и валютный контроль уполномоченных банков. * Федеральный закон "О валютном регулировании и валютном контроле" ╧ 173-ФЗ, императивные нормы. Регулирование порядка поведения валютных операций резидентами и нерезидентами, открытия и ведения резидентами счетов в банках, расположенных за пределами Российской Федерации. Режим счета, открытого за рубежом. * Репатриация выручки от внешнеэкономической деятельности. * Нормативные акты Банка России и Правительства Российской Федерации. * Контроль за соблюдением Федерального закона и нормативных актов Банка России. 2. Нормативные акты Банка России: Инструкция Банка России от 15 июня 2004 года ╧117-И "О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации при осуществлении валютных операций, порядке учета уполномоченными банками валютных операций и оформления паспортов сделок" (с изменениями и дополнениями), Положение Банка России от 1 июня 2004 года ╧ 258-П "О порядке представления резидентами уполномоченным банкам подтверждающих документов и информации, связанных с проведением валютных операций с нерезидентами по внешнеторговым сделкам, и осуществления уполномоченными банками контроля за проведением валютных операций" (с изменениями и дополнениями). Основные требования к порядку проведения валютных операций и оформления документов валютного контроля, установленные этими нормативными актами: * кодирование валютных операций, * оформление и представление справок о валютных операциях, о подтверждающих документах, о поступлении валюты Российской Федерации, о расчетах через счета резидентов, открытые в банках, расположенных за пределами Российской Федерации, * Паспорт сделки. Практика применения вышеуказанных нормативных актов Банка России: 3. Паспорта сделок, как документы валютного контроля. Проблемные вопросы оформления и ведения. Документы валютного контроля, учета и отчетности. Действия уполномоченных банков при оформлении и проведении валютных операций. 4. Указание Банка России "О формах учета по валютным операциям, осуществляемым резидентами, за исключением кредитных организаций и валютных бирж" ╧1950-У и его влияние на квалификацию правонарушений. 5. Регулирование порядка представления информации о нарушениях валютного законодательства. Положение ЦБ РФ от 20.07.2007 N 308-П И практика его применения (с учетом последних изменений). Постановление Правительства РФ от 24 февраля 2009 г. N 166 "О порядке представления органами и агентами валютного контроля в орган валютного контроля, уполномоченный Правительством Российской Федерации, необходимых для осуществления его функций документов и информации". Практика применения Положения Банка России ╧308-П на примере конкретных нарушений. 6. Валютное регулирование операций физических лиц. Операции физических лиц и валютный контроль уполномоченных банков. Нормы прямого действия Федерального закона ╧ 173-ФЗ. Порядок осуществления переводов денежных средств физическими лицами из Российской Федерации и по территории Российской Федерации. Инструкция Банка России ╧113-И (с изменениями и дополнениями). Указание Банка России от 20.07.2007 ╧1868-У "О предоставлении физическими лицами-резидентами уполномоченным банкам документов, связанных с проведением отдельных валютных операций". Изменения в регулировании валютных операций физических лиц. Валютные операции с платежными картами. Положение Банка России ╧266-П (с изменениями и дополнениями). 7. Ответственность за нарушение валютного законодательства. 8. Перспективы развития валютного регулирования и валютного контроля в Российской Федерации. Стоимость участия в семинаре 9970 рублей За более подробной информацuей обpащайтеcь по тел: код: (четыре девять пять) 4Ч5/32.66 или 792/2i22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6705 bytes Desc: not available URL: From bebop45st at odezia.ru Tue Dec 21 13:05:06 2010 From: bebop45st at odezia.ru (=?koi8-r?B?5MzRIMLBzsvP19PLycgg09DFw8nBzMnT1M/X?=) Date: Tue, 21 Dec 2010 23:05:06 +0200 Subject: =?koi8-r?B?7s/Xz8Ug1yD3wczA1M7PzSDawcvPzs/EwdTFzNjT1NfFIA==?= Message-ID: Вниманию банков, финансовых, страховых компаний Регулирование валютного законодательства и и валютный контроль Валютное регулирование (ЦБ РФ) +7 (код Москвы) 7Ч2/9|_98 <<>> Ч.Ч_5.3_2--6-6 23 Декабря 2О1Ог. Лектор: начальник управления Департамента финансового Мониторинга и валютного контроля Банка России. 1. Система валютного регулирования и валютного контроля в Российской Федерации и валютный контроль уполномоченных банков. * Федеральный закон "О валютном регулировании и валютном контроле" № 173-ФЗ, императивные нормы. Регулирование порядка поведения валютных операций резидентами и нерезидентами, открытия и ведения резидентами счетов в банках, расположенных за пределами Российской Федерации. Режим счета, открытого за рубежом. * Репатриация выручки от внешнеэкономической деятельности. * Нормативные акты Банка России и Правительства Российской Федерации. * Контроль за соблюдением Федерального закона и нормативных актов Банка России. 2. Нормативные акты Банка России: Инструкция Банка России от 15 июня 2004 года №117-И "О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации при осуществлении валютных операций, порядке учета уполномоченными банками валютных операций и оформления паспортов сделок" (с изменениями и дополнениями), Положение Банка России от 1 июня 2004 года № 258-П "О порядке представления резидентами уполномоченным банкам подтверждающих документов и информации, связанных с проведением валютных операций с нерезидентами по внешнеторговым сделкам, и осуществления уполномоченными банками контроля за проведением валютных операций" (с изменениями и дополнениями). Основные требования к порядку проведения валютных операций и оформления документов валютного контроля, установленные этими нормативными актами: * кодирование валютных операций, * оформление и представление справок о валютных операциях, о подтверждающих документах, о поступлении валюты Российской Федерации, о расчетах через счета резидентов, открытые в банках, расположенных за пределами Российской Федерации, * Паспорт сделки. Практика применения вышеуказанных нормативных актов Банка России: 3. Паспорта сделок, как документы валютного контроля. Проблемные вопросы оформления и ведения. Документы валютного контроля, учета и отчетности. Действия уполномоченных банков при оформлении и проведении валютных операций. 4. Указание Банка России "О формах учета по валютным операциям, осуществляемым резидентами, за исключением кредитных организаций и валютных бирж" №1950-У и его влияние на квалификацию правонарушений. 5. Регулирование порядка представления информации о нарушениях валютного законодательства. Положение ЦБ РФ от 20.07.2007 N 308-П И практика его применения (с учетом последних изменений). Постановление Правительства РФ от 24 февраля 2009 г. N 166 "О порядке представления органами и агентами валютного контроля в орган валютного контроля, уполномоченный Правительством Российской Федерации, необходимых для осуществления его функций документов и информации". Практика применения Положения Банка России №308-П на примере конкретных нарушений. 6. Валютное регулирование операций физических лиц. Операции физических лиц и валютный контроль уполномоченных банков. Нормы прямого действия Федерального закона № 173-ФЗ. Порядок осуществления переводов денежных средств физическими лицами из Российской Федерации и по территории Российской Федерации. Инструкция Банка России №113-И (с изменениями и дополнениями). Указание Банка России от 20.07.2007 №1868-У "О предоставлении физическими лицами-резидентами уполномоченным банкам документов, связанных с проведением отдельных валютных операций". Изменения в регулировании валютных операций физических лиц. Валютные операции с платежными картами. Положение Банка России №266-П (с изменениями и дополнениями). 7. Ответственность за нарушение валютного законодательства. 8. Перспективы развития валютного регулирования и валютного контроля в Российской Федерации. Стоимость участия в семинаре 9970 рублей Вся информация по тел: +7 (код Москвы) Ч45*Ч095 **** Ч*4_5*3-2**6.6 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6783 bytes Desc: not available URL: From 0-k at cancer.org Tue Dec 21 11:51:26 2010 From: 0-k at cancer.org (~Medi-Trust~) Date: Tue, 21 Dec 2010 23:21:26 +0330 Subject: Phent.rmine 37.5 Tablets Available Message-ID: <0841604595.QN40F9UK944979@sxgksrzctlfvc.makxeh.net> Keep eachother happy in the bedroom for Hours! We Care about your Health http://sales.treatgroan.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 274 bytes Desc: not available URL: From h_w.lashaunvv at svm.com Wed Dec 22 06:48:26 2010 From: h_w.lashaunvv at svm.com (Hien Lashaun) Date: Wed, 22 Dec 2010 07:48:26 -0700 Subject: Be a LONG-man, buy this effective herbal EnlargementPills i7w In-Reply-To: Message-ID: <4D120FBA.C702DF61@svm.com> ...Grow Your SmallDick... * ROCK SOLID hardness that feels bigger, wider and fuller (to you and to HER) * THROBBING powerful blood flow to thePenis * ALL-NIGHT staying power You can't go wrong. It's doctor and herbalist endorsed. It's used and recommended bySex industry professionals. Buy This herbal EnlargementPills here http://emptyskip.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 697 bytes Desc: not available URL: From measl at mfn.org Wed Dec 22 05:51:23 2010 From: measl at mfn.org (J.A. Terranson) Date: Wed, 22 Dec 2010 07:51:23 -0600 (CST) Subject: What to expect from running a mix* in the US (was OT: Mixmaster) In-Reply-To: <20101222123744.GP16518@leitl.org> References: <20101222123744.GP16518@leitl.org> Message-ID: On Wed, 22 Dec 2010, Eugen Leitl wrote: > ----- Forwarded message from xlon at Safe-mail.net ----- > > Hello List, > > I would like to request that those of you who so generously donate their > time and bandwidth running a Tor node to consider also running an > instance of that old and venerable ancestor of Tor, mixmaster. With its > long and fabled history and stellar record in protecting the anonymity > of users, it is a perfect high-latency compliment to Tor's low-latency > focus. Before I start, let me make plain that I strongly approve of the idea of Mix*, and used to run a node on a high bandwidth (100m) circuit. Despite my travails with Mix*, I would do it again if the stars were to line up correctly. That said, anyone considering running a mix* needs to know what they are getting themselves into, at least in the USA. (1) Get used to the idea of angry mails from people you don't know, and who seem incapable of groking the concept of an anonymizer: they are *CERTAIN* that it was *you*, the host of a Mix* instance, that sent , nad by god they are going to "have your head" or something similar. You'll get a lot of these, although you *can* safely ignore them (nevertheless, I try to educate them 1 time before doing so); (2) You *may* get visits from the Government (and they are NOT here to help!). I had two visits as a direct result of a Mix* instance: one from the FBI and one from the Secret Service. These folk seem to educable, so if you keep our head and explain the lay of the land, they'll go away. That does *not* mean you won't continue to be watched though, *especially* under the new "See Something, Report It" program established by our friend in "freedom" and "transparency", Obama; (3) You *will* be the target of various sized DDoS attacks. This is what finally forced me to take down my Mix* instance (racheal.mfn.org). If you are running Mix* on a consumer circuit, you can be certain you will not last long after the DDoS begins, if you are on commercial circuits, your size *will* matter: large customers will [obviously] be tolerated longer. I was finally "asked", very nicely I might add, to take mine down after about a year of semi-continuous DDoS (fortunately, most of these were small enough to just take down the Mix* box, but there were several times when the entire mutli-homed domain was down, along with our smaller (<100m) circuits. Ideally, you should have out of band monitoring if you set up a Mix* instance (we used a cell-phone connected modem to our router), so that you can receive real-time notification of attacks; (4) None of the above is true if you are not running an exit node. With this in mind, I would encourage *everybody* to run a non-exit Mix* instance! It's safe, easy, and won't get you in trouble at any speed! (5) Expect to spend a few hours week looking after your Mix* instance. While I know that my experience is considered unique, I had an ongoing issue of resource starvation that required a reboot once a week - minimum. It's been a *long* time since I was running Mix*, so YMMV, and probably *will* vary. Still, a Mix* node is a mid-to-high value target, and should be closely watched; (6) Consider running an NNTP gateway. These are in short supply and are greatly needed. Running an NNTP daemon is non-trivial, requiring a lot of work and some form of ongoing maintenance (variable by the complexity and "connectedness" of your instance, but it's worth it: you'll learn a *lot*! (6a) If you run *any* NNTP tasks, be careful about what groups you process! Running anything with "lolita", "asparagus", "young" or "teen" in the group name is just *begging* for trouble - and it *will* come looking for you! If your NNTP instance has somehow spooled any "kiddie porn", and the fedz come knocking, you are *screwed*: there is virtually no defence to such a charge in the USA (under the Adam Walsh Act, an abominable piece of draconian legislation which is widely seen as "not going far enough" here in the ultra right wing repressive United States of Police). This is true even if you are NOT running an exit node!!! All the best, //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From justkristine at tdshop.ru Wed Dec 22 09:32:13 2010 From: justkristine at tdshop.ru (=?koi8-r?B?4c7B1M/Myco=?=) Date: Wed, 22 Dec 2010 09:32:13 -0800 Subject: =?koi8-r?B?98HbwSDSxcvMwc3B?= Message-ID: Предлагаем качественную доставку рекламы Базы адресов постоянно обновляются Очень гибкая система скидок постоянным клиентам до 50% При заказе 2х рассылок, 3я бесплатная; Подготовка макета бесплатно; Быстрый выход рассылки, по желанию день в день; Самый массовый охват целевой аудитории Пробив фильтров. Любые формы оплаты; Каждая рассылка перед отправкой тестируется; Москва от 2 тыс руб. Россия от 3000 руб. Страны СНГ от 2,5 тыс руб. Наши цены самые альтернативные, закажите у Нас и Вы будете удивлены качеством обслуживания. Формируем базы под каждое направление, продукт реализации. Фокусировка себя полностью оправдывает. тел: Девять шесть четыре далее семьсот два тридцать шесть восемьдесят пять From bunny_logan_hr at europe.eds.com Wed Dec 22 09:14:21 2010 From: bunny_logan_hr at europe.eds.com (Bunny Logan) Date: Wed, 22 Dec 2010 10:14:21 -0700 Subject: You Have Everything To Gain! 3-4 inches more to yourPenis, 100% MoneyBack Guaranteeed xv4 In-Reply-To: <867a01cba050$059476d9$dc0ab151@rnyhjin> Message-ID: <4D1231ED.3AA75D60@europe.eds.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://twoapenny.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 836 bytes Desc: not available URL: From measl at mfn.org Wed Dec 22 11:37:01 2010 From: measl at mfn.org (J.A. Terranson) Date: Wed, 22 Dec 2010 13:37:01 -0600 (CST) Subject: [cryptography] OpenBSD (fwd) Message-ID: //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech ---------- Forwarded message ---------- Date: Wed, 22 Dec 2010 13:39:03 -0500 From: Randall Webmail Reply-To: Crypto discussion list To: Crypto discussion list Cc: dave at farber.net, dewayne at warpspeed.com Subject: [cryptography] OpenBSD OpenBSD Founder Believes FBI Built IPsec Backdoor But Theo de Raadt said it is unlikely that the Federal Bureau of Investigation's Internet protocol security code made it into the final operating system. By Mathew J. Schwartz , InformationWeek The bugs are of interest given the recent allegation made by Gregory Perry, former CTO of now-defunct Federal Bureau of Investigation contractor Network Security Technology (NetSec), that the FBI created a backdoor in the OpenBSD code base, specifically in how it implements IPsec. He also alleged that multiple developers involved in contributing code to OpenBSD were on the payroll of NetSec, and that the FBI had hired it to create the backdoors. [SNIP] Technical explanation aside, is this vulnerability exploitable? "This is a neat attack, but also a total pain in the a-- to use, and certainly not an FBI backdoor in OpenBSD IPsec," said Ptacek. [SNIP] http://www.informationweek.com/news/security/vulnerabilities/showArticle.jhtml?articleID=228900037&cid=RSSfeed_IWK_News http://snipurl.com/1p4dlf From eugen at leitl.org Wed Dec 22 04:37:44 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 22 Dec 2010 13:37:44 +0100 Subject: OT: Mixmaster Message-ID: <20101222123744.GP16518@leitl.org> ----- Forwarded message from xlon at Safe-mail.net ----- From coderman at gmail.com Wed Dec 22 15:20:23 2010 From: coderman at gmail.com (coderman) Date: Wed, 22 Dec 2010 15:20:23 -0800 Subject: [p2p-hackers] Whistle-blower site platform design In-Reply-To: References: <20101222215724.GC16518@leitl.org> Message-ID: On Wed, Dec 22, 2010 at 2:57 PM, John Young wrote: > Cryptome was given a preview of OpenLeaks.org yesterday. > ... > It is in testing now with access by invitation. FD or GTFO ;) From jya at pipeline.com Wed Dec 22 13:26:21 2010 From: jya at pipeline.com (John Young) Date: Wed, 22 Dec 2010 16:26:21 -0500 Subject: [cryptography] OpenBSD (fwd) In-Reply-To: Message-ID: There's more to this story by Gregory Perry and several others, one of which asserts Theo de Raadt is hiding donations from the tax authorities and provides bank account numbers. Another explains in detail how the backdoors were inserted. There is a good bit of obfuscation going on to exculpate those who cooperated with the FBI then and now. Not news to these group. http://cryptome.org/0003/fbi-backdoors.htm A crypto skeptic would have predicted this outcome of the "crypto wars." Crypto deception is now commonplace. Strong crypto, unbreakable crypto, open source crypto, are now marketing brands not to be trusted. If this is said in public the guilty starting screaming about "spreading FUD," as if crypto-FUD is not a premiere product. User-implementation is the problem, weak passwords, lack of protection of the boxes, poor sec of the networks, it is said by the snake oilers, not the algorithm, not the program. Hire more sec experts, pay them well, hire more watchers of the sec experts, swear them to secrecy, hire more counterspys to watch the watchers, foster paranoia by orchestrated breaches. Plot with G8 to induce G20 to do the same. Name the rogues behind the threats, repeat the names often. Run cracks to blame the rogues. Attack the rogues to induce counterattacks with hired security experts ready to peddle sec FUD worldwide. Bribe insiders, expose insiders, jail a few. Even NSA us spouting that there can be no security on networks, the answer if more 24x7 staff, bigger budgets, more informants, more undercover insiders, more A and B teams, more vigilance, more by god of everything NSA can conceive of. Hurrah, yell their security contractors and scholarly researchers and investors and garage-innovators. Backdoors are obligatory to keep this churning. Imaginary as good if not better than the real thing. Generate suspicion among cryptoids. Leak names and foul deeds. Earn a buck. Not news here. Ho hum, pretend to be bored with it all. Go find another way to get in on it the sec racket, pray for another 9/11, a thermonuclear Wikileaks insurance release. There was a time when the answer was read the fucking archives. Then the archives got contaminated, cherry-picked, lost, rejiggered, forged, garbled by Google and Archive.org iterated in multiple unmatching forms, redacted, compiled as original research and sent to press, exposed as if hidden, refuted, disowned. Listen, this is the truth. Did anybody see Jaron's attack on Cypherpunks crypto-rebels and EFF in The Atlantic as the fountainhead of anti-government irresponsibility like Wikileaks? Jaron said he was at the dinner where cpunks was conceived and he is so happy he did not take part. From jya at pipeline.com Wed Dec 22 14:57:47 2010 From: jya at pipeline.com (John Young) Date: Wed, 22 Dec 2010 17:57:47 -0500 Subject: [p2p-hackers] Whistle-blower site platform design In-Reply-To: <20101222215724.GC16518@leitl.org> Message-ID: Cryptome was given a preview of OpenLeaks.org yesterday. It appears to have learned from Wikileaks and many others. An impressive preparation which advances development of superior methods of combating secrecy openly, not just rushing to copy Wikileaks. It addresses many of the issues raised in this thread. Among others, it promises to invite and respond to critiques openly and will share what it learns with other intiatives. Funding will be disclosed. It is in testing now with access by invitation. It will be gradually rolled out with further testing, revision and fully opened in early 2011. The site has a link to an article in which Daniel D-B explains the initiative. Daniel generated a PK on December 13, 2010 with the address ddb at openleaks.org. He welcomes inquiries and advice, as he says, from those with more capabilities than the current "gang" which are working their asses off to get it right before rushing a faulty product to meet a PR-driven deadline, oh my, that goes against industry practice in an admirable way. Except for OpenLeaks, in prep since September, the rush of new copycat Leaks sites and thousands of Wikileaks mirrors is Buster Keaton Charlie Chaplin comical. From jya at pipeline.com Wed Dec 22 15:40:01 2010 From: jya at pipeline.com (John Young) Date: Wed, 22 Dec 2010 18:40:01 -0500 Subject: [p2p-hackers] Whistle-blower site platform design In-Reply-To: References: <20101222215724.GC16518@leitl.org> Message-ID: The expectation was that I'd leak the whole shebang without permission. Never. That shit is over. However ... a request by PGP to me can get a PDF of the whole thing. This should not be made public. JY PK: ID: 0x58A4971E The PK: http://cryptome.org/other-stuff#pk At 03:20 PM 12/22/2010 -0800, you wrote: >On Wed, Dec 22, 2010 at 2:57 PM, John Young wrote: >> Cryptome was given a preview of OpenLeaks.org yesterday. >> ... >> It is in testing now with access by invitation. > >FD or GTFO > >;) From Len.Sassaman at esat.kuleuven.be Wed Dec 22 10:44:22 2010 From: Len.Sassaman at esat.kuleuven.be (Len Sassaman) Date: Wed, 22 Dec 2010 19:44:22 +0100 (CET) Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: Greetings, p2p-hacker folks, This list seems to be the most direct spiritual successor to the cypherpunks list, which is where I'd want to raise this issue if it still existed. As most of you are undoubtedly aware, the sudden surge in attention Wikileaks has gained in the last months have resulted in at least half a dozen imitation "leaks" sites -- from OpenLeaks, founded by former Wikileaks staff who have different ideas on how such a site should operate, to regional whistle-blower and transparency sites such as Brusselsleaks, Balkanleaks, Pirateleaks.cz, etc. Let me first state I think that this is absolutely a good thing -- in principle. Relying on a single initiative such as Wikileaks both gives way too much power to the organization in question, and makes it a high-profile target. The rise of independant leak publishers decentralizes the fundamental service these sites provide, and brings attention back to the content of their publications rather than the personalities of the individuals involved. It's also problematic for a number of reasons: firstly, reputation. Who is BrusselsLeaks? Why should a whistleblower trust that the operators of that site have his/her interests in mind? What's to say they're not an initiative of an intelligence agency? I'm not sure there's anything to be done about that, except wait and let these other players earn their own reputation capital. However, it's painfully clear to me that a number of these sites don't have the first clue when it comes to technological measures they should be taking to protect their sources. E.g., BrusselsLeaks is running their operation with Wordpress and Hushmail -- hardly a hardened solution. Wikileaks has had four years and the input of top network security experts, cryptographers, p2p-hackers, and cypherpunks, to create a system hardened against predictable threats. It's quite likely that had Bradley Manning not made the mistake of "confessing" to a government snitch posing as a journalist, he'd not be in jail today. Wikileaks, according to what I can gather from press reports and comments from people involved, as well as examining their site, relies on a Tor Hidden Service setup for receiving submissions. That alone is hardly enough to protect the site from attacks on the anonymity of its sources, the integrity and security of its site, or its network presense, but already requires a level of technical sophistication that is lacking in most of these "copy-cat" sites. I'd like to see us come up with an easy-to-deploy solution for launching a leaks site with the security considerations addressed, perhaps in the form of a "soft appliance" distribution, but first we need a basic requirements document. What are the technical security requirements of such a service? Off the top of my head, I think we can divide this into three parts: 1. General site security. The website/servers need to be resistant to compromise, and also need to be prepared for the same. The credibility of Wikileaks would be severely damaged if an attacker were able to, for example, introduce fake diplomatic cables to the cache of documents waiting to be released, so that the Wikileaks staff inadvertantly published false information. So in addition to protecting against breakins, the system needs to be designed to maintain data integrity in the face of compromise. 2. Source protection. The site needs to provide a means for whistleblowers to contact the site operators, discuss issues, and submit documents in an anonymous manner. Wikileaks solves this with Tor, though there might be other ways. We need a clearly defined threat model to build against, and must keep in mind that usability is a security concern -- we have to assume that the whistleblowers are not geeks, and the site operators may not be, either. 3. Censorship resistance. If 2. brings to mind Tor, 3. brings to mind the Eternity Service. In this model, the publisher does not need to be anonymous, but the data needs to be authenticated and the service distributed. The CouchDB-based mirrors of the Afghanistan War Diaries provide a promising first-attempt; to be successful, these sites need to be able to leverage jurisdictional arbitrage and distributed hosting to resist network denial of service attacks and legal attacks aimed at taking their sites offline, as well as data corruption attacks aimed at invalidating the material by attacking its credibility with the introduction of false documents, etc. 3.a. would be a way for third-parties to obtain the material provided by these services in an anonymous fashion; I see this as lower priority than the other issues, but still something to think about. My goal here is to develop a formal, realistic model for the operation of a legitimate journalistic whistle-blower material clearinghouse. I'm basically proposing we replicate in public, with peer-review, the process I assume Wikileaks itself has undergone for the design of their system. Let's identify the likely attacks and attack vectors for given adversaries, compose a solution based on available technology, and assemble it in as easily deployable a manner as possible. Who else is interested? Let's get this discussion rolling. Best, Len _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From measl at mfn.org Wed Dec 22 18:37:03 2010 From: measl at mfn.org (J.A. Terranson) Date: Wed, 22 Dec 2010 20:37:03 -0600 (CST) Subject: [p2p-hackers] Whistle-blower site platform design In-Reply-To: References: Message-ID: On Wed, 22 Dec 2010, John Young wrote: > The site has a link to an article in which Daniel D-B explains > the initiative. > > Daniel generated a PK on December 13, 2010 with the address > ddb at openleaks.org. > > He welcomes inquiries and advice, as he says, from those with My biggest complaint is being re-implemented, rather than "repaired": WL fell over when they used a person, rather than an organization account with no human corrolary, to act as the acceptor/releaser/ObjPublicRelationsFlac (Julian in WL case). Much of the WL debacle has been caused by having Julian associated with WL in the first place. Anyone who comes after him has the same problem: by acting as the releaser's mouthpiece, they become the face of the organization, and in turn they become the object being sold by the MSM, as opposed to the leaks themselves. Any public interfacing should be from a role account, which acts as both an anonymizer and a composite "face" for the press. Not having a real person to attach their interests to will help force their interest to concentrate upon the leaks themselves. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From m-- at gmx.com Wed Dec 22 13:56:35 2010 From: m-- at gmx.com (Michael Rogers) Date: Wed, 22 Dec 2010 21:56:35 +0000 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: Hi Len, Maybe one question we should consider is whether a leaks clearinghouse needs to look like a website at all. From the little I've read about OpenLeaks - and if anyone knows better, please correct me - it sounds like they're not planning to publish documents, as WikiLeaks does; rather, they're planning to build some kind of infrastructure for whistleblowers to communicate anonymously with journalists, to negotiate time-limited exclusive access to documents in return for help with preparing and publishing them. If we consider that kind of model rather than robust hosting, I guess the issues would include: * How do whistleblowers and journalists securely obtain the client software? * What kind of architecture does the anonymising network have? Can it be monitored end-to-end? Can it be DoSed? * Who contributes resources to the network? Do they need to be trustworthy, or can it be an open system? * Can attackers fill the system with fake whistleblowers to make it annoying for journalists to use? * Can attackers fill the system with fake journalists to make it annoying/dangerous for whistleblowers to use? * What's the legal status of such a system? Can it enjoy the protections given to journalists if it's seen as "just a tool"? Cheers, Michael _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Dec 22 13:20:36 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 22 Dec 2010 22:20:36 +0100 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: <20101222212036.GA16518@leitl.org> ----- Forwarded message from Len Sassaman ----- From eugen at leitl.org Wed Dec 22 13:57:24 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 22 Dec 2010 22:57:24 +0100 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: <20101222215724.GC16518@leitl.org> ----- Forwarded message from Michael Rogers ----- From matthew at matthew.at Wed Dec 22 23:02:57 2010 From: matthew at matthew.at (Matthew Kaufman) Date: Wed, 22 Dec 2010 23:02:57 -0800 Subject: [p2p-hackers] Skype Outage Message-ID: On 12/22/2010 9:54 PM, Julian Cain wrote: > > On Dec 23, 2010, at 12:33 AM, Salman Abdul Baset wrote: > >> On Thu, 23 Dec 2010, Julian Cain wrote: >> >>> Here I display some of todays >>> work: http://www.youtube.com/watch?v=YHpFIMlItrM >>> >> Cool stuff. >> >> My first guess at why Skype super node numbers are decreasing at this time of the year are that most Skype super nodes run in universities and it is the end of the academic semester. So students are shutting down their machines and Skype super nodes. Infact, it is safe to say that if the universities cracked down on Skype, there will not likely be enough super nodes to sustain the Skype network. >> > There are ~100,000 standby supernodes at any one moment also the hardcoded supernodes are for the most part installed into universities as you state. I believe this to be an automated event. > > If you compare which supernodes went down to those that didn't the version numbers are similar. I've captured these packets and decrypted them and currently looking into my findings. It is fairly common knowledge that many people running the current version of the Windows client experienced a crash last night at around the same time. This matches Skype's public message at http://blogs.skype.com/en/2010/12/skype_downtime_today.html "many of them were taken offline by a problem affecting some versions of Skype". Not surprisingly, a whole lot of the nodes run Windows and thus the fraction of supernodes which are running Windows is also high. More clients trying to reach supernodes than there is supernode capacity looks exactly like a DDOS against the supernode addresses, of course. This is a common restart failure mode for all types of network systems... one must always balance the reconnect backoff times between the risk of flooding the servers (in this case, distributed out to supernodes in a p2p system) and the user experience of taking forever to reconnect after a local network outage (which may be indistinguishable from a global server-side problem). > Most of the supernodes were non-responsive at ~12:00 EST. There were only ~2k routing traffic at the peak of this event and the network requires ~71,000 to support peak load hours. > > It will be interesting to hear what they claim happened. I'm not an official spokesperson for Skype, so I can't really say more than what's in the official blog... though it does say almost exactly what's above. Matthew Kaufman _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From yongdaek at gmail.com Wed Dec 22 22:10:22 2010 From: yongdaek at gmail.com (Yongdae Kim) Date: Thu, 23 Dec 2010 00:10:22 -0600 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: We touch upon overlay design for censorship-resistant publishing systems last year, which talks about some of the major requirements as well as relation between different concepts. We also discussed some of the attacks on Freenet as well as Tor Bridges.. E. Vasserman, R. Jansen, J. Tyra, N. Hopper, Yongdae Kim , "Membership-concealing overlay networks", ACM Conference on Computer and Communications Security (CCS), 2009 Yongdae -- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ + Yongdae Kim (office phone) 1-612-626-7526 + Associate Professor, University of Minnesota - Twin Cities + kyd (at mark) cs.umn.edu, http://www.cs.umn.edu/~kyd +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From joss-p2phackers at pseudonymity.net Wed Dec 22 16:29:13 2010 From: joss-p2phackers at pseudonymity.net (joss-p2phackers at pseudonymity.net) Date: Thu, 23 Dec 2010 00:29:13 +0000 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: Hi Len, I think that it's worth re-emphasising what you say in your second point: an idea like this is not going to succeed if it relies too heavily on solving the fun technical problems. Creating a theoretically nice leak submission/distribution system is definitely fun work, and I'd love to come and play, but if it were to be truly applicable then there is probably going to have to be serious compromise made in the security/usability stakes. (On that point: does Wikileaks' submission system rely on a Tor hidden service, or is there one running that you can use if you jump through the right hoops?) A website seems necessarily the right model for access and submissions, or at least for kicking off a submissions process. Computer = Internet = web (and maybe email) for most people, and breaking that assumption is counterproductive. No-one reading non-existent submissions isn't the goal. A threat model for source protection is surely going to be sender anonymity against the standard global passive attacker. How you bootstrap that from a "click here to submit" button will be interesting. As you point out, though, we aren't seeing a great deal of technical attacks against source anonymity. While it's definitely a real threat, I'd say it's lower on the list of priorities than the availability problems. I think the more interesting problem, then, is in your third set of points. The major issue seems to be distributed hosting, again accessed without requiring users to jump through technical hoops. It seems to me that the most significant problems that Wikileaks has had has been the result of the DNS system allowing the pointer to the information to be removed while the information remains. (Especially when you throw BitTorrent into the mix.) At the same time, people rarely type in an actual URL (see, for example, http://rww.to/a4egy9 ). The real-world net censorship we see is akin to censoring a library by burning the catalogue. The critical Eternity Service (and Freenet) issue of hosts being ignorant of the data that they carry will be important in resisting more legal attacks. Corruption of the leaks via injection of false documents seems an orthogonal problem, and I'm not sure how you'd automate that. Anonymous access to the data seems to fit very neatly into Tor's use-case, with the assumption that you mainly want a web interface. For large chunks of data you might want something able to handle that kind of load, and could probably tolerate higher latencies, but again you'd probably want to start looking at building on a BitTorrent-style approach. There are a lot more fun issues here, but I should sleep before I start writing total gibberish. Joss _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From neta_antonia_fr at baxter.com Wed Dec 22 23:32:20 2010 From: neta_antonia_fr at baxter.com (Neta Antonia) Date: Thu, 23 Dec 2010 00:32:20 -0700 Subject: |BUY NOW| Viagra50/100mg - $1.85, High Qua1ityMedications + Discount On All Reorders = Best Deal Ever! mnm In-Reply-To: Message-ID: <4D12FB04.F40F05B8@baxter.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://cjima.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 557 bytes Desc: not available URL: From ok at progres-co.ru Wed Dec 22 16:43:42 2010 From: ok at progres-co.ru (Nettie Smith) Date: Thu, 23 Dec 2010 01:43:42 +0100 Subject: =?koi8-r?B?8sHT0NLPxMHWwSDOwSDT18nOz8vPzdDMxcvTxQ==?= Message-ID: <000d01cba23a$72847f80$6400a8c0@ok> СВИНИНА живой вес От 72 руб./кг. полутуши От 106 руб./кг +7 (495) 669 94 18 Группа предприятий (сфера деятельности - животноводство и растениеводство) стабильно предлагает к реализации свинину собственного производства с 2-х откормочных комплексов, работающих на основе канадской технологии содержания животных и использования 100% покупных комбикормов от известных производителей с высокоэнергетичным натуральным рационом. К реализации предлагается экологически безопасная продукция с высокими вкусовыми качествами. Товар имеет все необходимые сертификаты качества и разрешительную документацию. Еженедельное предложение: 200-300 голов (либо 15 - 25 тонн мяса в полутушах). Средний вес 105-110 кг; шпик 2-2,5 см. (6-7 ребро); свинина соответствует ГОСТ-у 1-ой категории. Продажа возможна как живым весом, так и в полутушах (есть свой забойных цех, соответствующий промышленным стандартам). Предпочтителен самовывоз со склада продавца (Пензенская область), но возможна доставка. Предоплата 100%. Динамика цен меняется еженедельно в соответствии с изменениями кондиции товара и/или колебаниями рынка, уточняйте предложение у менеджеров. Фотографии животных, полутуш, качества забоя, схемы проезда и заявки на посещение объектов Вы можете также получить по указанным далее телефонам. Прайс-лист: Количество голов Живой вес Полутуши До 10 80 руб./кг 125 руб./кг От 10 до 30 79 руб./кг 119 руб./кг. От 30 до 50 78 руб./кг 115 руб./кг От 50 до 100 76 руб./кг 112 руб./кг От 100 и более индивидуально индивидуально +7 (495) 669 94 18 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5354 bytes Desc: not available URL: From jya at pipeline.com Thu Dec 23 02:57:11 2010 From: jya at pipeline.com (John Young) Date: Thu, 23 Dec 2010 05:57:11 -0500 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: The expectation was that I'd leak the whole shebang without permission. Never. That shit is over. However ... a request by PGP to me can get a PDF of the whole thing. This should not be made public. JY PK: ID: 0x58A4971E The PK: http://cryptome.org/other-stuff#pk At 03:20 PM 12/22/2010 -0800, you wrote: >On Wed, Dec 22, 2010 at 2:57 PM, John Young wrote: >> Cryptome was given a preview of OpenLeaks.org yesterday. >> ... >> It is in testing now with access by invitation. > >FD or GTFO > >;) From 0-ka at cpdns.net Wed Dec 22 21:32:21 2010 From: 0-ka at cpdns.net (R0LEX_Gucci_etc Affordable) Date: Thu, 23 Dec 2010 06:32:21 +0100 Subject: hearing backspace fishes. The Message-ID: <7837928657.WO7454YB835556@kwuxmcajfjagra.lqrgrnigm.biz> She will LOVE the new ring or watch especially when YOU pay half price! If you arent satisified, Send it back! http://te.tl/4i7 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 294 bytes Desc: not available URL: From jya at pipeline.com Thu Dec 23 06:18:48 2010 From: jya at pipeline.com (John Young) Date: Thu, 23 Dec 2010 09:18:48 -0500 Subject: Cypherpunks Targeted Message-ID: Perhaps indicating a revival of a Red Scare initiative against Cyperhpunks in connection with promoting Wikileaks panic, three attacks have been published in recent days: 1. Bruce Sterling, 22 December 2010, opens with naming Tim May's writing on BlackNet and more: http://www.webstock.org.nz/blog/2010/the-blast-shack/ 2. Philip Pilkington, 21 December 2010, attacks Cryptome by recylcing a Readers Digest smear from 2005: https://fixingtheeconomists.wordpress.com/2010/12/21/cryptome-org-weighing- in-on-the-debate-on-freedom-of-information/ 3. Jaron Lanier, 20 December 2010, attacks Tim May, John Gilmore and others: http://www.theatlantic.com/technology/archive/2010/12/the-hazards-of-nerd-s upremacy-the-case-of-wikileaks/68217/ If the Red Scare is duplicated more of this will likely come as the conspiracy net is spread to round up co-conspirators, fellow travellers, fronts like EFF, EPIC, ACLU, ProPublica and many more. A long list of suspects here: http://cryptome.org/0002/siss.htm A shorter Wikileaks-related suspects and documentation here: http://cryptome.org/0003/wikileaks-series.htm As the campaign heats up it will include deep-pocketed funders, traitors planted inside security agencies, universities and corporations, squeezed informants against the ringleaders, congressional hearings, subpoenas, frightened naming of names, scouring of files for connecting dots at Archive.org, search engines, social media, mail lists, news lists, chat rooms, IMs, email, and the bountiful data collected by corporations, researchers, governments and their contractors who claimed they were merely studying the fantastic growth of empowering digital culture or more sinisterly, preparing to protect the people from anarchist enemies of centralized authoritatives. Now this list predicted this reaction and described how to preposition defenses. Or was that just pretending overthrow of authoritatives? Read the EFF and others' letter to Congress yesterday defending Wikileaks and compare it to similar actions in the 1930s-1950s protesting clamp down on the worldwide Red Menace. Then read Sterling, Pilkington and Lanier more closely. These smart guys know which way the wind is blowing and, as they write, they want no part in the insanity of taking freedom of information too literally. In short, punish Assange, Wikileaks and co-conspirators as a lesson to others that dissidence is "taken very seriously." From eugen at leitl.org Thu Dec 23 00:36:21 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 23 Dec 2010 09:36:21 +0100 Subject: [p2p-hackers] Skype Outage Message-ID: <20101223083620.GH16518@leitl.org> ----- Forwarded message from Matthew Kaufman ----- From eugen at leitl.org Thu Dec 23 00:58:24 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 23 Dec 2010 09:58:24 +0100 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: <20101223085824.GK16518@leitl.org> ----- Forwarded message from joss-p2phackers at pseudonymity.net ----- From eugen at leitl.org Thu Dec 23 01:41:59 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 23 Dec 2010 10:41:59 +0100 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: <20101223094159.GM16518@leitl.org> ----- Forwarded message from Ian G ----- From coderman at gmail.com Thu Dec 23 12:44:42 2010 From: coderman at gmail.com (coderman) Date: Thu, 23 Dec 2010 12:44:42 -0800 Subject: Cypherpunks Targeted In-Reply-To: References: Message-ID: On Thu, Dec 23, 2010 at 6:18 AM, John Young wrote: > ... > http://www.theatlantic.com/technology/archive/2010/12/the-hazards-of-nerd-s > upremacy-the-case-of-wikileaks/68217/ railing against those using "power arrogantly and non-constructively." OK by me. yet all weak claims against leaks or anon. ( see also http://imgs.xkcd.com/comics/wikileaks.png :) 97% of that article is meandering factoids centered around flawed argument... can't make sense of most of it. it's a time sink. "First they came for Anonymous, but I didn't care because I'm not a b-tard..." From coderman at gmail.com Thu Dec 23 12:57:56 2010 From: coderman at gmail.com (coderman) Date: Thu, 23 Dec 2010 12:57:56 -0800 Subject: the blast shack In-Reply-To: <20101223173812.GT16518@leitl.org> References: <20101223173812.GT16518@leitl.org> Message-ID: On Thu, Dec 23, 2010 at 9:38 AM, Eugen Leitl wrote: > http://www.webstock.org.nz/blog/2010/the-blast-shack/ >... > We asked Bruce Sterling (who spoke at Webstock b 09) for his take on > Wikileaks. wow, something about leaks leads to copious text. can anyone write on the subject without spanning volumes? > ... > tortured media-freak condition. tortured media-freak condition is apt description for the majority coverage on the subject. the rest, well, might as well call ARPANET cypherpunkware... "The future is already here  it's just not evenly distributed."; that is to say, like 0days and ethics, the future is a perspective. and definitely not evenly distributed ;) From ivanov at casa.dp.ua Thu Dec 23 04:10:04 2010 From: ivanov at casa.dp.ua (Monty Gage) Date: Thu, 23 Dec 2010 14:10:04 +0200 Subject: =?koi8-r?B?8sHT0NLPxMHWwSDOwSDT18nOz8vPzdDMxcvTxQ==?= Message-ID: <629E8334B8934A81A09417898AAC2B7E@UniversalPc03> СВИНИНА живой вес От 72 руб./кг. полутуши От 106 руб./кг +7 (495) 669 94 18 Группа предприятий (сфера деятельности - животноводство и растениеводство) стабильно предлагает к реализации свинину собственного производства с 2-х откормочных комплексов, работающих на основе канадской технологии содержания животных и использования 100% покупных комбикормов от известных производителей с высокоэнергетичным натуральным рационом. К реализации предлагается экологически безопасная продукция с высокими вкусовыми качествами. Товар имеет все необходимые сертификаты качества и разрешительную документацию. Еженедельное предложение: 200-300 голов (либо 15 - 25 тонн мяса в полутушах). Средний вес 105-110 кг; шпик 2-2,5 см. (6-7 ребро); свинина соответствует ГОСТ-у 1-ой категории. Продажа возможна как живым весом, так и в полутушах (есть свой забойных цех, соответствующий промышленным стандартам). Предпочтителен самовывоз со склада продавца (Пензенская область), но возможна доставка. Предоплата 100%. Динамика цен меняется еженедельно в соответствии с изменениями кондиции товара и/или колебаниями рынка, уточняйте предложение у менеджеров. Фотографии животных, полутуш, качества забоя, схемы проезда и заявки на посещение объектов Вы можете также получить по указанным далее телефонам. Прайс-лист: Количество голов Живой вес Полутуши До 10 80 руб./кг 125 руб./кг От 10 до 30 79 руб./кг 119 руб./кг. От 30 до 50 78 руб./кг 115 руб./кг От 50 до 100 76 руб./кг 112 руб./кг От 100 и более индивидуально индивидуально +7 (495) 669 94 18 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5361 bytes Desc: not available URL: From l_arlette_pm at deluxe.com Thu Dec 23 13:47:31 2010 From: l_arlette_pm at deluxe.com (Luann Arlette) Date: Thu, 23 Dec 2010 14:47:31 -0700 Subject: Cheap ViagraPills start fr $1.85, *25mg: 40 pills-$78, *50mg:30 pills-$99, 270 pills-$499, *100mg: 30 pills-$105 q0f In-Reply-To: <656401cb9e96$039a4e11$6c36ef23@lfro853> Message-ID: <4D13C373.D5A485D7@deluxe.com> Cheap ViagraPills start fr $1.85 30 pills - $ 78 270 pills - $499 Optional: Delivery Insurance (Guaranteeed reshipment if delivery failed) Order more products & get free Regular Airmail shipping! http://twoapenny.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 635 bytes Desc: not available URL: From eugen at leitl.org Thu Dec 23 05:56:10 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 23 Dec 2010 14:56:10 +0100 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: <20101223135610.GO16518@leitl.org> ----- Forwarded message from Yongdae Kim ----- From eugen at leitl.org Thu Dec 23 05:58:28 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 23 Dec 2010 14:58:28 +0100 Subject: Home Internet with Anonymity Built In Message-ID: <20101223135828.GP16518@leitl.org> http://www.technologyreview.com/printer_friendly_article.aspx?id=26981 Home Internet with Anonymity Built In A router that runs the Tor software prevents Web tracking. By Tom Simonite Many political activists, nonprofits, and businesses use an anonymity system called Tor to encrypt and obscure what they do on the Internet. Now the U.S.-based nonprofit that distributes Tor is developing a low-cost home router with the same privacy protection built in. The Tor software masks Web traffic by encrypting network messages and passing them through a series of relays (each Tor client can also become a relay for other users' messages). But using Tor has typically meant installing the software on a computer and then tweaking its operating system to ensure that all traffic is routed correctly through the program. "We want to make anonymity something that can happen everywhere, all the time," says Jacob Appelbaum, a Tor project developer. "When you are connected to a router with Tor inside, all your traffic goes through Tor without you changing your system at all. It makes it simple to use." Appelbaum says volunteers are already testing a small number of modified routers with Tor installed. The prototypes were made by installing new software onto a popular low-cost wireless router made by Buffalo Technology. The software was developed by Appelbaum and colleagues at Tor and is based on the work of the OpenWrt project, which offers open source code for networking equipment. The finished routers can be configured to pass all traffic through Tor, or only some kinds of communications. "You might want to run your VOIP device through Tor but not your other traffic," Appelbaum explains. They will also be capable of simultaneously offering Tor-protected and conventional wireless networks. "If we find that these routers are useful [in the trials]," he says, "we could partner with OpenWrt and Buffalo to offer a version for sale that helps support the Tor and OpenWrt projects." The software will also be made available for people to install on routers they have bought themselves, Appelbaum says. Besides serving as Tor clients, the new routers will help anonymize the traffic of other Tor users. This means that they could help boost the performance the Tor network. When a person uses Tor to bring up a Web page, the request is encrypted and sent along a random path through other Tor computers that act as relays. This obscures the originating IP (Internet protocol) addressba unique code that can be used to track down a Web user, to filter access to certain sites or services, or to build up a profile of a person's Web use. Generally, the process results in lag and restricts bandwidth, which deters some people from using Tor, says Chris Palmer, technology director at the Electronic Frontier Foundation. "The primary way to address that problem is to have more Tor relays in more places, connected to high-bandwidth, low-latency lines," he explains. "Wireless routers may fit the bill well, if they can be built with the computational resources necessary to run a Tor relay of decent capacity." Although consumer-grade routers are necessarily relatively low-powered, their capabilities have grown markedly in recent years, Palmer notes. Tor routers could also make the entire Tor system better able to resist government attempts to block its use. An individual installation of Tor software hooks into the network by referring to a list of relays in a directory maintained by the Tor project. It is possible to block Tor by checking the same directory and preventing connections to the servers listedba tactic apparently used by the Chinese authorities. It is possible to get around such a block, however, by configuring the Tor software to act as a "bridge," or a private relay, that can only be discovered by word of mouth. A Tor router can also act as a bridge, and Appelbaum is considering making that a default setting. During the protests in Iran that followed the 2009 election, the EFF campaigned for more people to act as Tor bridges to keep the government from blocking the tool, and Palmer says increasing the supply of bridges remains important. "It makes the adversary's job more difficult when there are more possible bridges to advertise and use," he says. Appelbaum says, "If you have 10,000 people using these little routers, then China would have a lot more difficulty blocking Tor." Copyright Technology Review 2010. From coderman at gmail.com Thu Dec 23 15:29:02 2010 From: coderman at gmail.com (coderman) Date: Thu, 23 Dec 2010 15:29:02 -0800 Subject: Tor VM stalled at 25% Message-ID: On Thu, Dec 23, 2010 at 3:08 PM, Praedor Atrebates wrote: > ... I want the VM system because I want to be able to browse without having to deactivate java, javascript, and flash... I want the VM so I can access these websites while still being anonymous, thus the necessity of a VM environment. there are still a large number of risks to your anonymity when using things like Java, Flash, arbitrary applications with Tor, even in a fully transparently Tor'ified VM configuration. local DNS resolver IP disclosures and side channels, chained exploits (accelerated VM interfaces are very risky but oh so performant...), many, many other considerations and risks. you need to carefully consider your risks for using such things, hence my recommendation for the stock bundle without those risky things unless you really know what you're doing or the risks are exceptionally low. best regards, *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Dec 23 09:38:12 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 23 Dec 2010 18:38:12 +0100 Subject: the blast shack Message-ID: <20101223173812.GT16518@leitl.org> http://www.webstock.org.nz/blog/2010/the-blast-shack/ The Blast Shack 22 December 2010 We asked Bruce Sterling (who spoke at Webstock b09) for his take on Wikileaks. The Wikileaks Cablegate scandal is the most exciting and interesting hacker scandal ever. I rather commonly write about such things, and Ibm surrounded by online acquaintances who take a burning interest in every little jot and tittle of this ongoing saga. So itbs going to take me a while to explain why this highly newsworthy event fills me with such a chilly, deadening sense of Edgar Allen Poe melancholia. But it sure does. Part of this dull, icy feeling, I think, must be the agonizing slowness with which this has happened. At last b at long last b the homemade nitroglycerin in the old cypherpunks blast shack has gone off. Those bcypherpunks,b of all people. Way back in 1992, a brainy American hacker called Timothy C. May made up a sci-fi tinged idea that he called bThe Crypto Anarchist Manifesto.b This exciting screed b I read it at the time, and boy was it ever cool b was all about anonymity, and encryption, and the Internet, and all about how wacky data-obsessed subversives could get up to all kinds of globalized mischief without any fear of repercussion from the blinkered authorities. If you were of a certain technoculture bent in the early 1990s, you had to love a thing like that. As Tim blithely remarked to his fellow encryption enthusiasts, bThe State will of course try to slow or halt the spread of this technology, citing national security concerns, use of the technology by drug dealers and tax evaders, and fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will allow national secrets to be traded freely,b and then Tim started getting really interesting. Later, May described an institution called bBlackNetb which might conceivably carry out these aims. Nothing much ever happened with Tim Maybs imaginary BlackNet. It was the kind of out-there concept that science fiction writers like to put in novels. Because BlackNet was clever, and fun to think about, and it made impossible things seem plausible, and it was fantastic and also quite titillating. So it was the kind of farfetched but provocative issue that ought to be properly raised within a sci-fi public discourse. Because, you know, that would allow plenty of time to contemplate the approaching trainwreck and perhaps do something practical about it. Nobody did much of anything practical. For nigh on twenty long years, nothing happened with the BlackNet notion, for good or ill. Why? Because thinking hard and eagerly about encryption involves a certain mental composition which is alien to normal public life. Crypto guys b (and the cypherpunks were all crypto guys, mostly well-educated, mathematically gifted middle-aged guys in Silicon Valley careers) b are geeks. Theybre harmless geeks, theybre not radical politicians or dashing international crime figures. Cypherpunks were visionary Californians from the WIRED magazine circle. In their personal lives, they were as meek and low-key as any average code-cracking spook who works for the National Security Agency. These American spooks from Fort Meade are shy and retiring people, by their nature. In theory, the NSA could create every kind of flaming scandalous mayhem with their giant Echelon spy system b but in practice, they would much would rather sit there gently reading other peoplebs email. One minutebs thought would reveal that a vast, opaque electronic spy outfit like the National Security Agency is exceedingly dangerous to democracy. Really, it is. The NSA clearly violates all kinds of elementary principles of constitutional design. The NSA is the very antithesis of transparency, and accountability, and free elections, and free expression, and separation of powers b in other words, the NSA is a kind of giant, grown-up, anti-Wikileaks. And it always has been. And webre used to that. We pay no mind. The NSA, this crypto empire, is a long-lasting fact on the ground that webve all informally agreed not to get too concerned about. Even foreign victims of the NSAbs machinations canbt seem to get properly worked-up about its capacities and intrigues. The NSA has been around since 1947. Itbs a little younger than the A-Bomb, and we donbt fuss much about that now, either. The geeks who man the NSA donbt look much like Julian Assange, because they have college degrees, shorter haircuts, better health insurance and far fewer stamps in their passports. But the sources of their power are pretty much identical to his. They use computers and they get their mitts on info that doesnbt much wanna be free. Every rare once in a while, the secretive and discreet NSA surfaces in public life and does something reprehensible, such as defeating American federal computer-security initiatives so that they can continue to eavesdrop at will. But the NSA never becomes any big flaming Wikileaks scandal. Why? Because, unlike their wannabe colleagues at Wikileaks, the apparatchiks of the NSA are not in the scandal business. They just placidly sit at the console, reading everybodybs diplomatic cables. This is their function. The NSA is an eavesdropping outfit. Cracking the communications of other governments is its reason for being. The NSA are not unique entities in the shadows of our planetbs political landscape. Every organized government gives that a try. Itbs a geopolitical fact, although itbs not too discreet to dwell on it. You can walk to most any major embassy in any major city in the world, and you can see that it is festooned with wiry heaps of electronic spying equipment. Donbt take any pictures of the roofs of embassies, as they grace our public skylines. Guards will emerge to repress you. Now, Tim May and his imaginary BlackNet were the sci-fi extrapolation version of the NSA. A sort of inside-out, hippiefied NSA. Crypto people were always keenly aware of the NSA, for the NSA were the people who harassed them for munitions violations and struggled to suppress their academic publications. Creating a BlackNet is like having a pet, desktop NSA. Except, that instead of being a vast, federally-supported nest of supercomputers under a hill in Maryland, itbs a creaky, homemade, zero-budget social-network site for disaffected geeks. But who cared about that wild notion? Why would that amateurish effort ever matter to real-life people? Itbs like comparing a mighty IBM mainframe to some cranky Apple computer made inside a California garage. Yes, itbs almost that hard to imagine. So Wikileaks is a manifestation of something that this has been growing all around us, for decades, with volcanic inexorability. The NSA is the worldbs most public unknown secret agency. And for four years now, its twisted sister Wikileaks has been the worldbs most blatant, most publicly praised, encrypted underground site. Wikileaks is bundergroundb in the way that the NSA is bcovertb; not because itbs inherently obscure, but because itbs discreetly not spoken about. The NSA is bdiscreet,b so, somehow, people tolerate it. Wikileaks is btransparent,b like a cardboard blast shack full of kitchen-sink nitroglycerine in a vacant lot. That is how we come to the dismal saga of Wikileaks and its ongoing Cablegate affair, which is a melancholy business, all in all. The scale of it is so big that every weirdo involved immediately becomes a larger-than-life figure. But theybre not innately heroic. Theybre just living, mortal human beings, the kind of geeky, quirky, cyberculture loons that I run into every day. And man, are they ever going to pay. Now we must contemplate Bradley Manning, because he was the first to immolate himself. Private Manning was a young American, a hacker-in-uniform, bored silly while doing scarcely necessary scutwork on a military computer system in Iraq. Private Manning had dozens of reasons for becoming what computer-security professionals call the binternal threat.b His war made no sense on its face, because it was carried out in a headlong pursuit of imaginary engines of mass destruction. The military occupation of Iraq was endless. Manning, a tender-hearted geek, was overlooked and put-upon by his superiors. Although he worked around the clock, he had nothing of any particular military consequence to do. It did not occur to his superiors that a bored soldier in a poorly secured computer system would download hundreds of thousands of diplomatic cables. Because, well, why? Theybre very boring. Soldiers never read them. The malefactor has no use for them. Theybre not particularly secret. Theybve got nothing much to do with his war. He knows his way around the machinery, but Bradley Manning is not any kind of blackhat programming genius. Instead, hebs very like Jerome Kerveil, that obscure French stock trader who stole 5 billion euros without making one dime for himself. Jerome Kerveil, just like Bradley Manning, was a bored, resentful, lower-echelon guy in a dead end, who discovered some awesome capacities in his system that his bosses never knew it had. It makes so little sense to behave like Kerveil and Manning that their threat canbt be imagined. A weird hack like that is self-defeating, and itbs sure to bring terrible repercussions to the transgressor. But then the sad and sordid days grind on and on; and that blindly potent machinery is just sitting there. Sitting there, tempting the user. Bradley Manning believes the sci-fi legendry of the underground. He thinks that he can leak a quarter of a million secret cables, protect himself with neat-o cryptography, and, magically, never be found out. So Manning does this, and at first he gets away with it, but, still possessed by the malaise that haunts his soul, he has to brag about his misdeed, and confess himself to a hacker confidante who immediately ships him to the authorities. No hacker story is more common than this. The ingenuity poured into the machinery is meaningless. The personal connections are treacherous. Welcome to the real world. So Private Manning, cypherpunk, is immediately toast. No army can permit this kind of behavior and remain a functional army; so Manning is in solitary confinement and he is going to be court-martialled. With more political awareness, he might have made himself a public martyr to his conscience; but he lacks political awareness. He only has only his black-hat hacker awareness, which is all about committing awesome voyeuristic acts of computer intrusion and imagining you can get away with that when it really matters to people. The guy preferred his hacker identity to his sworn fidelity to the uniform of a superpower. The shear-forces there are beyond his comprehension. The reason this upsets me is that I know so many people just like Bradley Manning. Because I used to meet and write about hackers, bcrackers,b bdarkside hackers,b bcomputer undergroundb types. They are a subculture, but once you get used to their many eccentricities, there is nothing particularly remote or mysterious or romantic about them. They are banal. Bradley Manning is a young, mildly brainy, unworldly American guy who probably would have been pretty much okay if hebd been left alone to skateboard, read comic books and listen to techno music. Instead, Bradley had to leak all over the third rail. Through historical circumstance, hebs become a miserable symbolic point-man for a global war on terror. He doesnbt much deserve that role. Hebs got about as much to do with the political aspects of his war as Monica Lewinsky did with the lasting sexual mania that afflicts the American Republic. That is so dispiriting and ugly. As a novelist, I never think of Monica Lewinsky, that once-everyday young woman, without a sense of dread at the freakish, occult fate that overtook her. Imagine what it must be like, to wake up being her, to face the inevitability of being That Woman. Monica, too, transgressed in apparent safety and then she had the utter foolishness to brag to a lethal enemy, a trusted confidante who ran a tape machine and who brought her a mediated circus of hells. The titillation of that massive, shattering scandal has faded now. But think of the quotidian daily horror of being Monica Lewinsky, and that should take a bite from the soul. Bradley Manning now shares that exciting, oh my God, Monica Lewinsky, tortured media-freak condition. This mild little nobody has become super-famous, and in his lonely military brig, screenless and without a computer, hebs strictly confined and, no doubt, hebs horribly bored. I donbt want to condone or condemn the acts of Bradley Manning. Because legions of people are gonna do that for me, until webre all good and sick of it, and then some. I donbt have the heart to make this transgressor into some hockey-puck for an ideological struggle. I sit here and I gloomily contemplate his all-too-modern situation with a sense of Sartrean nausea. Commonly, the authorities donbt much like to crush apple-cheeked white-guy hackers like Bradley Manning. Itbs hard to charge hackers with crimes, even when they gleefully commit them, because itbs hard to find prosecutors and judges willing to bone up on the drudgery of understanding what they did. But theybve pretty much got to make a pureeb out of this guy, because of massive pressure from the gravely embarrassed authorities. Even though Bradley lacks the look and feel of any conventional criminal; wrong race, wrong zipcode, wrong set of motives. Bradleybs gonna become a bspyb whose bespionageb consisted of making the activities of a democratic government visible to its voting population. With the New York Times publishing the fruits of his misdeeds. Some set of American prosecutorial lawyers is confronting this crooked legal hairpin right now. I feel sorry for them. Then there is Julian Assange, who is a pure-dye underground computer hacker. Julian doesnbt break into systems at the moment, but hebs not an bex-hacker,b hebs the silver-plated real deal, the true avant-garde. Julian is a child of the underground hacker milieu, the digital-native as twenty-first century cypherpunk. As far as I can figure, Julian has never found any other line of work that bore any interest for him. Through dint of years of cunning effort, Assange has worked himself into a position where his bcomputer crimesb are mainly political. Theybre probably not even crimes. They are bleaks.b Leaks are nothing special. They are tidbits from the powerful that every journalist gets on occasion, like crumbs of fishfood on the top of the media tank. Only, this time, thanks to Manning, Assange has brought in a massive truckload of media fishfood. Itbs not just some titillating, scandalous, floating crumbs. Therebs a quarter of a million of them. Hebs become the one-man global McDonaldbs of leaks. Ever the detail-freak, Assange in fact hasnbt shipped all the cables he received from Manning. Instead, he cunningly encrypted the cables and distributed them worldwide to thousands of fellow-travellers. This stunt sounds technically impressive, although it isnbt. Itbs pretty easy to do, and nobody but a cypherpunk would think that it made any big difference to anybody. Itbs part and parcel of Assangebs other characteristic activities, such as his inability to pack books inside a box while leaving any empty space. While others stare in awe at Assangebs many otherworldly aspects b his hairstyle, his neatness, too-precise speech, his post-national life out of a laptop bag b I can recognize him as pure triple-A outsider geek. Man, I know a thousand modern weirdos like that, and every single one of them seems to be on my Twitter stream screaming support for Assange because they can recognize him as a brother and a class ally. They are in holy awe of him because, for the first time, their mostly-imaginary and lastingly resentful underclass has landed a serious blow in a public arena. Julian Assange has hacked a superpower. He didnbt just insult the captain of the global football team; he put spycams in the locker room. He has showed the striped-pants set without their pants. This a massively embarrassing act of technical voyeurism. Itbs like Monica and her stains and kneepads, only even more so. Now, I wish I could say that I feel some human pity for Julian Assange, in the way I do for the hapless, one-shot Bradley Manning, but I canbt possibly say that. Pity is not the right response, because Assange has carefully built this role for himself. He did it with all the minute concentration of some geek assembling a Rubikbs Cube. In that regard, onebs hat should be off to him. Hebs had forty years to learn what he was doing. Hebs not some miserabilist semi-captive like the uniformed Bradley Manning. Hebs a darkside player out to stick it to the Man. The guy has surrounded himself with the cream of the computer underground, wily old rascals like Rop Gonggrijp and the fearsome Teutonic minions of the Chaos Computer Club. Assange has had many long, and no doubt insanely detailed, policy discussions with all his closest allies, about every aspect of his means, motives and opportunities. And he did what he did with fierce resolve. Furthermore, and not as any accident, Assange has managed to alienate everyone who knew him best. All his friends think hebs nuts. Ibm not too thrilled to see that happen. Thatbs not a great sign in a consciousness-raising, power-to-the-people, radical political-leader type. Most successful dissidents have serious people skills and are way into revolutionary camaraderie and a charismatic sense of righteousness. Theybre into kissing babies, waving bloody shirts, and keeping hope alive. Not this chilly, eldritch guy. Hebs a bright, good-looking man who b letbs face it b canbt get next to women without provoking clumsy havoc and a bitter and lasting resentment. Thatbs half the human race thatbs beyond his comprehension there, and I rather surmise that, from his stern point of view, it was sure to be all their fault. Assange was in prison for a while lately, and his best friend in the prison was his Mom. That seems rather typical of him. Obviously Julian knew he was going to prison; a child would know it. Hebs been putting on his Solzhenitsyn clothes and combing his forelock for that role for ages now. Ibm a little surprised that he didnbt have a more organized prison-support committee, because hebs a convicted computer criminal whobs been through this wringer before. Maybe he figures hebll reap more glory if hebs martyred all alone. I rather doubt the authorities are any happier to have him in prison. They pretty much gotta feed him into their legal wringer somehow, but a botched Assange show-trial could do colossal damage. Therebs every likelihood that the guy could get off. He could walk into an American court and come out smelling of roses. Itbs the kind of show-trial judo every repressive government fears. Itbs not just about him and the burning urge to punish him; itbs about the public risks to the reputation of the USA. They superpower hypocrisy here is gonna be hard to bear. The USA loves to read other peoplebs diplomatic cables. They dote on doing it. If Assange had happened to out the cable-library of some outlaw pariah state, say, Paraguay or North Korea, the US State Department would be heaping lilies at his feet. Theybd be a little upset about his violation of the strict proprieties, but theybd also take keen satisfaction in the hilarious comeuppance of minor powers that shouldnbt be messing with computers, unlike the grandiose, high-tech USA. Unfortunately for the US State Department, they clearly shouldnbt have been messing with computers, either. In setting up their SIPRnet, they were trying to grab the advantages of rapid, silo-free, networked communication while preserving the hierarchical proprieties of official confidentiality. Thatbs the real issue, thatbs the big modern problem; national governments and global computer networks donbt mix any more. Itbs like trying to eat a very private birthday cake while also distributing it. That scheme is just not working. And that failure has a face now, and thatbs Julian Assange. Assange didnbt liberate the dreadful secrets of North Korea, not because the North Koreans lack computers, but because that isnbt a cheap and easy thing that half-a-dozen zealots can do. But the principle of it, the logic of doing it, is the same. Everybody wants everybody elsebs national government to leak. Every state wants to see the diplomatic cables of every other state. It will bend heaven and earth to get them. Itbs just, that sacred activity is not supposed to be privatized, or, worse yet, made into the no-profit, shareable, have-at-it fodder for a network society, as if global diplomacy were so many mp3s. Now the US State Department has walked down the thorny road to hell that was first paved by the music industry. Rock and roll, baby. Now, in strict point of fact, Assange didnbt blandly pirate the massive hoard of cables from the US State Department. Instead, he was busily bredactingb and minutely obeying the proprieties of his political cover in the major surviving paper dailies. Kind of a nifty feat of social-engineering there; but hebs like a poacher who machine-gunned a herd of wise old elephants and then went to the temple to assume the robes of a kosher butcher. That is a world-class hoax. Assange is no more a bjournalistb than he is a crypto mathematician. Hebs a darkside hacker who is a self-appointed, self-anointed, self-educated global dissident. Hebs a one-man Polish Solidarity, waiting for the population to accrete around his stirring propaganda of the deed. And they are accreting; not all of bem, but, well, it doesnbt take all of them. Julian Assange doesnbt want to be in power; he has no people skills at all, and nobodybs ever gonna make him President Vaclav Havel. Hebs certainly not in for the money, because he wouldnbt know what to do with the cash; he lives out of a backpack, and his daily routine is probably sixteen hours online. Hebs not gonna get better Google searches by spending more on his banned MasterCard. I donbt even think Assange is all that big on ego; I know authors and architects, so Ibve seen much worse than Julian in that regard. Hebs just what he is; hebs something we donC"bt yet have words for. Hebs a different, modern type of serious troublemaker. Hebs certainly not a bterrorist,b because nobody is scared and no one got injured. Hebs not a bspy,b because nobody spies by revealing the doings of a government to its own civil population. He is orthogonal. Hebs asymmetrical. He panics people in power and he makes them look stupid. And I feel sorry for them. But sorrier for the rest of us. Julian Assangebs extremely weird version of dissident bliving in truthb doesnbt bear much relationship to the way that public life has ever been arranged. It does, however, align very closely to what webve done to ourselves by inventing and spreading the Internet. If the Internet was walking around in public, it would look and act a lot like Julian Assange. The Internet is about his age, and it doesnbt have any more care for the delicacies of profit, propriety and hierarchy than he does. So Julian is heading for a modern legal netherworld, the slammer, the electronic parole cuff, whatever; you can bet there will be surveillance of some kind wherever he goes, to go along with the FREE ASSANGE stencils and xeroxed flyers that are gonna spring up in every coffee-bar, favela and university on the planet. A guy as personally hampered and sociopathic as Julian may in fact thrive in an inhuman situation like this. Unlike a lot of keyboard-hammering geeks, hebs a serious reader and a pretty good writer, with a jailhouse-lawyer facility for pointing out weaknesses in the logic of his opponents, and boy are they ever. Weak, that is. They are pathetically weak. Diplomats have become weak in the way that musicians are weak. Musicians naturally want people to pay real money for music, but if you press them on it, theybll sadly admit that they donbt buy any music themselves. Because, well, theybre in the business, so why should they? And the same goes for diplomats and discreet secrets. The one grand certainty about the consumers of Cablegate is that diplomats are gonna be reading those stolen cables. Not hackers: diplomats. Hackers bore easily, and they wonbt be able to stand the discourse of intelligent trained professionals discussing real-life foreign affairs. American diplomats are gonna read those stolen cables, though, because they were supposed to read them anyway, even though they didnbt. Now, theybve got to read them, with great care, because they might get blindsided otherwise by some wisecrack that they typed up years ago. And, of course, every intelligence agency and every diplomat from every non-American agency on Earth is gonna fire up computers and pore over those things. To see what American diplomacy really thought about them, or to see if they were ignored (which is worse), and to see how the grownups ran what was basically a foreign-service news agency that the rest of us were always forbidden to see. This stark fact makes them all into hackers. Yes, just like Julian. Theybre all indebted to Julian for this grim thing that he did, and as they sit there hunched over their keyboards, drooling over their stolen goodies, theybre all, without exception, implicated in his doings. Assange is never gonna become a diplomat, but hebs arranged it so that diplomats henceforth are gonna be a whole lot more like Assange. Theybll behave just like him. They receive the goods just like he did, semi-surreptitiously. They may be wearing an ascot and striped pants, but theybve got that hacker hunch in their necks and theybre staring into the glowing screen. And I donbt much like that situation. It doesnbt make me feel better. I feel sorry for them and what it does to their values, to their self-esteem. If therebs one single watchword, one central virtue, of the diplomatic life, itbs bdiscretion.b Not btransparency.b Diplomatic discretion. Discretion is why diplomats do not say transparent things to foreigners. When diplomats tell foreigners what they really think, war results. Diplomats are people who speak from nation to nation. They personify nations, and nations are brutal, savage, feral entities. Diplomats used to have something in the way of an international community, until the Americans decided to unilaterally abandon that in pursuit of Bradley Manningbs oil war. Now nations are so badly off that they canbt even get it together to coherently tackle heroin, hydrogen bombs, global warming and financial collapse. Not to mention the Internet. The world has lousy diplomacy now. Itbs dysfunctional. The world corps diplomatique are weak, really weak, and the US diplomatic corps, which used to be the senior and best-engineered outfit there, is rattling around bottled-up in blast-proofed bunkers. Itbs scary how weak and useless they are. US diplomats used to know what to do with dissidents in other nations. If they were communists they got briskly repressed, but if they had anything like a free-market outlook, then US diplomats had a whole arsenal of gentle and supportive measures; Radio Free Europe, publication in the West, awards, foreign travel, flattery, moral support; discreet things, in a word, but exceedingly useful things. Now theybre harassing Julian by turning those tools backwards. For a US diplomat, Assange is like some digitized nightmare-reversal of a kindly Cold War analog dissident. He read the dissident playbook and he downloaded it as a textfile; but, in fact, Julian doesnbt care about the USA. Itbs just another obnoxious national entity. He happens to be more or less Australian, and hebs no great enemy of America. If hebd had the chance to leak Australian cables he would have leapt on that with the alacrity he did on Kenya. Of course, when Assange did it to that meager little Kenya, all the grown-ups thought that was groovy; he had to hack a superpower in order to touch the third rail. But the American diplomatic corps, and all it thinks it represents, is just collateral damage between Assange and his goal. He aspires to his tpolitical tactility is beneath his dignity. Hebs extremely intelligent, but, as a political, social and moral actor, hebs the kind of guy who gets depressed by the happiness of the stupid. I donbt say these cruel things about Julian Assange because I feel distant from him, but, on the contrary, because I feel close to him. I donbt doubt the two of us would have a lot to talk about. I know hordes of men like him; itbs just that they are programmers, mathematicians, potheads and science fiction fans instead of fiercely committed guys who aspire to topple the international order and replace it with subversive wikipedians. The chances of that ending well are about ten thousand to one. And I donbt doubt Assange knows that. This is the kind of guy who once wrote an encryption program called bRubberhose,b because he had it figured that the cops would beat his password out of him, and he needed some code-based way to finesse his own human frailty. Hey, neat hack there, pal. So, well, thatbs the general situation with this particular scandal. I could go on about it, but Ibm trying to pace myself. This knotty situation is not gonna bblow over,b because itbs been building since 1993 and maybe even 1947. bTransparencyb and bdiscretionb are virtues, but they are virtues that clash. The international order and the global Internet are not best pals. They never were, and now thatbs obvious. The data held by states is gonna get easier to steal, not harder to steal; the Chinese are all over Indian computers, the Indians are all over Pakistani computers, and the Russian cybermafia is brazenly hosting wikileaks.info because thatbs where the underground goes to the mattresses. It is a godawful mess. This is gonna get worse before it gets better, and itbs gonna get worse for a long time. Like leaks in a house where the pipes froze. Wellb& every once in a while, a situation thatbs one-in-a-thousand is met by a guy who is one in a million. It may be that Assange is, somehow, up to this situation. Maybe hebs gonna grow in stature by the massive trouble he has caused. Saints, martyrs, dissidents and freaks are always wild-cards, but sometimes theybre the only ones who can clear the general air. Sometimes they become the catalyst for historical events that somehow had to happen. They donbt have to be nice guys; thatbs not the point. Julian Assange did this; he direly wanted it to happen. He planned it in nitpicky, obsessive detail. Here it is; a planetary hack. I donbt have a lot of cheery hope to offer about his all-too-compelling gesture, but I dare to hope hebs everything he thinks he is, and much, much, more. Bruce Sterling From iang at iang.org Thu Dec 23 01:15:39 2010 From: iang at iang.org (Ian G) Date: Thu, 23 Dec 2010 20:15:39 +1100 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: On 23/12/10 5:44 AM, Len Sassaman wrote: > 2. Source protection. The site needs to provide a means for whistleblowers > to contact the site operators, discuss issues, and submit documents in an > anonymous manner. Wikileaks solves this with Tor, though there might be > other ways. We need a clearly defined threat model to build against, and > must keep in mind that usability is a security concern -- we have to > assume that the whistleblowers are not geeks, and the site operators may > not be, either. If I think of the 3 whistleblower cases I'm mildly familiar with, there is no commonality between the source protection aspects. I think this might be something where whatever technical system you put in place, a wise whistleblower would not be keen to trust it. Given that the typical cost of being a whistleblower is probably minimum loss of income for years, and loss of liberty likely, it might be a really high target. If that view holds, it might be better kicked out of any technical design for a publishing system. > 3. Censorship resistance. If 2. brings to mind Tor, 3. brings to mind the > Eternity Service. In this model, the publisher does not need to be > anonymous, but the data needs to be authenticated and the service > distributed. The CouchDB-based mirrors of the Afghanistan War Diaries > provide a promising first-attempt; to be successful, these sites need to > be able to leverage jurisdictional arbitrage and distributed hosting to > resist network denial of service attacks and legal attacks aimed at > taking their sites offline, as well as data corruption attacks aimed at > invalidating the material by attacking its credibility with the > introduction of false documents, etc. > > 3.a. would be a way for third-parties to obtain the material provided by > these services in an anonymous fashion; I see this as lower priority than > the other issues, but still something to think about. OTOH, If you wanted to make source protection strong *and* technical (e.g., uploading), then you might want to make it the same system for both uploading and downloading. Hiding the source in a crowd of downloaders is one benefit, and making the download protection high profile may help to make the overall source/sink protection better. 4. Gatekeeper role. It would seem that any pure technical system could be flooded by junk. Typically a team is needed to analyse, filter, edit and approve. > My goal here is to develop a formal, realistic model for the operation of > a legitimate journalistic whistle-blower material clearinghouse. I'm > basically proposing we replicate in public, with peer-review, the process > I assume Wikileaks itself has undergone for the design of their system. > Let's identify the likely attacks and attack vectors for given > adversaries, compose a solution based on available technology, and > assemble it in as easily deployable a manner as possible. > > Who else is interested? Let's get this discussion rolling. Some thoughts! iang _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From Len.Sassaman at esat.kuleuven.be Thu Dec 23 11:52:45 2010 From: Len.Sassaman at esat.kuleuven.be (Len Sassaman) Date: Thu, 23 Dec 2010 20:52:45 +0100 (CET) Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: On Thu, 23 Dec 2010, joss-p2phackers at pseudonymity.net wrote: > I think that it's worth re-emphasising what you say in your second > point: an idea like this is not going to succeed if it relies too > heavily on solving the fun technical problems. Creating a theoretically > nice leak submission/distribution system is definitely fun work, and I'd > love to come and play, but if it were to be truly applicable then there > is probably going to have to be serious compromise made in the > security/usability stakes. Absolutely agreed. I don't, personally, see it as a "compromise" to security that concessions are made to usability, given that usability is a factor in security. In fact, in this case we really must assume no technical sophistication on behalf of the whistleblower (and if some of the leaksites that have popped up are any indication, only minimal technical prowess on behalf of the site operators.) > (On that point: does Wikileaks' submission system rely on a Tor hidden > service, or is there one running that you can use if you jump through > the right hoops?) I believe it's the former, but I'm not certain. Can anyone comment? > A website seems necessarily the right model for access and submissions, > or at least for kicking off a submissions process. Computer = Internet = > web (and maybe email) for most people, and breaking that assumption is > counterproductive. No-one reading non-existent submissions isn't the goal. Agreed. > A threat model for source protection is surely going to be sender > anonymity against the standard global passive attacker. How you > bootstrap that from a "click here to submit" button will be interesting. > As you point out, though, we aren't seeing a great deal of technical > attacks against source anonymity. While it's definitely a real threat, > I'd say it's lower on the list of priorities than the availability problems. Agreed, though it remains a real problem. But we can divide the components of such a system so that working on solving the one doesn't block on solving the other. [snip] > actual URL (see, for example, http://rww.to/a4egy9 ). The real-world net > censorship we see is akin to censoring a library by burning the catalogue. Very well put. > The critical Eternity Service (and Freenet) issue of hosts being > ignorant of the data that they carry will be important in resisting more > legal attacks. I'm not sure we should get hung up on that; that argument always stuck me as "legal cleverness" of the sort judges laugh at. If the purpose of this platform is to disseminate documents in the public interest, which happen to upset some legal entities be they corporations or governments, the "public interest" argument is what's going to keep them online, imo. Further, "But I don't technically know what I'm hosting" isn't going to change Amazon's mind when they want to pull the plug on you. > Corruption of the leaks via injection of false documents seems an > orthogonal problem, and I'm not sure how you'd automate that. So, I'm imagining a system where the "leak site" receives files from a source (somehow; we want this to be an anonymous submission process but it can be treated as a black box), *reviews them and selects documents for publication*, and then pushes them to a document distribution platform, which should be syndicated to mirrors to leverage jurisdictional arbitrage and affect censorship resistance. The problem of false documents entering the distribution process is one of human error; however, the leak-site operators are acting in the role of journalists, and the onus is on them to authenticate their source material. I don't think a technical fix is in order here. One thought I should mention: on the submission side, it would be very nice to have a built-in metadata stripper either as part of the submission process, or as part of the publication process. Where you put it depends on whether you want the leaksite operators to have access to potential metadata or not; arguments can be made either way. But we can't assume either party is sophisticated enough to worry about this themselves. (Nor can we expect to produce a metadata redaction filter that is anywhere close to comprehensive, and metadata will continue to be a major attack vector for outing whistleblowers, but the protections provided by this system are not binary.) > Anonymous access to the data seems to fit very neatly into Tor's > use-case, with the assumption that you mainly want a web interface. For > large chunks of data you might want something able to handle that kind > of load, and could probably tolerate higher latencies, but again you'd > probably want to start looking at building on a BitTorrent-style approach. I've used BitTorrent in conjunction with anonymous publication systems before; it served as the distribution protocol for the design of a Private Information Retrieval based nym server Bram and I proposed a few years back. I'm considering the suitability of PIR in the present use case; it turned out that our use of BitTorrent opened the system up to certain attacks on the querant's anonymity, but that may not apply in our use case. (For reference: http://www.abditum.com/pynchon/ ) --Len. _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From Len.Sassaman at esat.kuleuven.be Thu Dec 23 12:17:17 2010 From: Len.Sassaman at esat.kuleuven.be (Len Sassaman) Date: Thu, 23 Dec 2010 21:17:17 +0100 (CET) Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: On Thu, 23 Dec 2010, Ian G wrote: > If I think of the 3 whistleblower cases I'm mildly familiar with, there > is no commonality between the source protection aspects. I think this > might be something where whatever technical system you put in place, a > wise whistleblower would not be keen to trust it. Given that the > typical cost of being a whistleblower is probably minimum loss of income > for years, and loss of liberty likely, it might be a really high target. I think we have to assume that the whistleblowers who are inclined to use a web-based submission system are likely to lack the requisite skills to even begin an assessment of source protection measures. Several of the new leaksites have already been criticised for their security (Balkanleaks runs on Joomla, which is making people unhappy; Brusselsleaks is WordPress based, etc...), though I don't expect that to fully deter submissions. At the end of the day, the whistleblowers either trust the site operators to get their security right, or they don't. I view our challenge to be to provide as "off-the-shelf" a solution as possible, to both aid publishers in deploying a system that addresses the security concerns, and to provide a base of reference for how those security concerns can be handled (in addition to "what security concerns are present.") > If that view holds, it might be better kicked out of any technical > design for a publishing system. As I've said before, I think we need to think of these as complementary components. > OTOH, If you wanted to make source protection strong *and* technical > (e.g., uploading), then you might want to make it the same system for > both uploading and downloading. Hiding the source in a crowd of > downloaders is one benefit, and making the download protection high > profile may help to make the overall source/sink protection better. I've already been thinking along those lines, myself; I'm resisting discussing ideas I have for a specific solution to these challenges, since I do think we're lacking a coherent problem statement (though this thread is making progress on that front). That said, if we're able to provide a covert channel for submission as a product of the distribution scheme, I think we gain an important benefit. The idea of using information-theoretic PIR in the document distribution system intrigues me. Bi-directional PIR is something of an open problem, but should be feasible in a system where the model user downloads far more than they upload. In a Chor-based PIR scheme such as the one Pynchon uses, one can see the query bitstreams being repurposed as a submission channel. It's tricky, though, and I don't want to fixate on a potential solution before clarifying the issues. At the end of the day, these are two discrete problems. If we can compose the solutions so that a single product provides for the needs of both, with additional benefits, that's great -- but I don't think that composition is strictly necessary at this point. > 4. Gatekeeper role. It would seem that any pure technical system could > be flooded by junk. Typically a team is needed to analyse, filter, edit > and approve. Yes; I touched in this in my response to Joss. A fully automated system is not what we need here, imo; this isn't about simply dumping files onto an Eternity Service. > Some thoughts! Good thoughts! --Len. _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Dec 23 12:40:10 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 23 Dec 2010 21:40:10 +0100 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: <20101223204010.GZ16518@leitl.org> ----- Forwarded message from Len Sassaman ----- From eugen at leitl.org Thu Dec 23 12:40:45 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 23 Dec 2010 21:40:45 +0100 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: <20101223204045.GA16518@leitl.org> ----- Forwarded message from Len Sassaman ----- From eugen at leitl.org Thu Dec 23 13:34:27 2010 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 23 Dec 2010 22:34:27 +0100 Subject: heise/telepolis in cryptome Message-ID: <20101223213427.GC16518@leitl.org> Achtung, kraut. http://www.heise.de/newsticker/meldung/Cryptome-Betreiber-kritisiert-Wikileaks-1158411.html http://www.heise.de/tr/artikel/Nur-eine-Art-Aufwaermen-1158406.html -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From joss-p2phackers at pseudonymity.net Thu Dec 23 15:08:28 2010 From: joss-p2phackers at pseudonymity.net (joss-p2phackers at pseudonymity.net) Date: Thu, 23 Dec 2010 23:08:28 +0000 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: On 23/12/10 19:52, Len Sassaman wrote: [snip] > >> The critical Eternity Service (and Freenet) issue of hosts being >> ignorant of the data that they carry will be important in resisting more >> legal attacks. > > I'm not sure we should get hung up on that; that argument always stuck me > as "legal cleverness" of the sort judges laugh at. Fair point. I'm equally dubious of legal arguments that treat "beyond reasonable doubt" too mathematically. (Even in those locations where "beyond reasonable doubt" holds.) Having said that, this approach forces an all-or-nothing approach on the legal system. If you can't reasonably link a person to a given chunk of data then your only option is a blanket ban of the system. > If the purpose of this > platform is to disseminate documents in the public interest, which happen > to upset some legal entities be they corporations or governments, the > "public interest" argument is what's going to keep them online, imo. Public interest will work as a /mechanism/ if you rely on wide distribution of data. As a legal argument in the "first amendment" sense, though, you're limited to places with first amendments. :) It seems to me that, from an anti-censorship perspective, keeping the system ignorant of the location of given data prevents targeted technical, as well as legal, attacks. On the other hand you might consider broad distribution to make that a moot point. > Further, "But I don't technically know what I'm hosting" isn't going to > change Amazon's mind when they want to pull the plug on you. > With hosting companies almost always having "we can disconnect you for no reason" clauses, this attacker is too strong to take on anyway. As I said above, though, you can at least force an all-or-nothing policy. Joss _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bi at 56rus.ru Fri Dec 24 03:44:11 2010 From: bi at 56rus.ru (Ruthie Patel) Date: Fri, 24 Dec 2010 07:14:11 -0430 Subject: =?koi8-r?B?5+/y8f3p5SD09fL5IO7hIO7v9/nqIOfv5CAhISEgIPDP08zFxM7JyiDb?= =?koi8-r?B?wc7TINXMxdTF1NggzsEgy8HOycvVzNkuIO/UIDUwMCDVLsUu?= Message-ID: <5D80523033DC46D28846915F689224F1@imprenta> Офисы в Москве и региональный отдел МНОГОКАНАЛЬНЫЙ ТЕЛЕФОН - +7 (495) 646 11 32 (КРУГЛОСУТОЧНО / БЕЗ ВЫХОДНЫХ) Офисы работают с 10:00 до 21:00. Новые горячие туры каждые 15 минут. Всегда в наличии более 1000 горящих туров и специальных предложений ПРЕДЛОЖЕНИЯ ДО 500 У.Е. - Египет, Шарм-Эль-Шейх - 390 у.е - Турция, Белек - от 320 у.е - Индия, ГОА - от 470 у.е. - Чехия, Прага - от 280 евро - Италия, Рим - от 480 евро - Австрия, Вена - от 320 евро - Франция, Париж - от 490 евро ЭКЗОТИЧЕСКИЕ ТУРЫ - Тайланд, Паттайя - от 490 у.е - Шри-Ланка - от 750 у.е - Доминикана - Пунта-Кана - 920 у.е - Куба - Варадеро - от 980 у.е - Мальдивы - от 1 300 у.е - Бали - от 1 250 у.е СПЕЦИАЛЬНЫЕ ПРЕДЛОЖЕНИЯ НА НОВЫЙ ГОД И РОЖДЕСТВО - ГОА, ДОМИНИКАНА,КУБА, ПРАГА, ГОРНОЛЫЖНЫЕ ТУРЫ - БОЛЕЕ 300 ПРЕДЛОЖЕНИЙ ГОРНОЛЫЖНЫЕ ТУРЫ (скидка на группы от 6 человек) - Австрия - от 600 евро - Болгария - от 390 евро - Италия - от 550 евро - Россия - от 6000 рублей - Турция - от 450 у.е - Финляндия - от 380 евро - Франция - от 630 евро - Швейцария - от 670 евро МНОГОКАНАЛЬНЫЙ ТЕЛЕФОН - +7 (495) 646 11 32(КРУГЛОСУТОЧНО / БЕЗ ВЫХОДНЫХ) Офисы работают с 10:00 до 21:00. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2620 bytes Desc: not available URL: From jya at pipeline.com Fri Dec 24 08:03:02 2010 From: jya at pipeline.com (John Young) Date: Fri, 24 Dec 2010 11:03:02 -0500 Subject: Interview with Tommaso Debenedetti and Matze Schmidtabout WikiLeaks Message-ID: Yes, quite true. Bear with this: Yesterday RT TV conducted an interview at its fourth or fifth New York bureau location. A person was videoed by an unstaffed camera being coached by an earpod from voices at the DC or Moscow control room, ye gads, Moscow Central is alive at the Counterrrorism Center, Mclean, VA. The stooge watched his image tilting forward a la Charlies Rose stupor with an inserted background of teeming 3rd Avenue outside not the actual background drooping black fabric, surgical clogs and getaway bags. An engineer had arranged the mic and earbud and checked the camera then left for lunch or a secret mission to climb into the ceiling above to capture brainwaves, or plant a tiny seed in the noggin of the dupe, or wank a wad of infinite jest. Nobody below in the "news bureau" except the dolt yarping artless drivel to monodical questions of an android unseen being patched into the show, live, it was lied, but probably a staff lunchroom comedy lampooning eager beggars of attention at the bottom of the TV cess spew. RT TV in NYC is located amidst the UN missionary-rich SIGINT-capacious nabe of copious diplomatic cablings of neant cum dasein cum dang an sich. Viewable panning in neighbhood windows are pan-national cameras capturing the UN Central urgency of how little is happening outside the overtaxed homelands. Shortly a live butt-heaving beauty enters the suite, declaiming, that was fantastic, the best we've ever had. We want you back, what's your availability frame? Hypnotic smile, a squeeze of your bicep, leg akimbo. Well, you blurt, pumped with range-free lust , I'm free all week. That's fantastic, she says, fantastic, let me check with headquarters, I'll email you in an hour. You were great, just great. Thank you for coming. Cheek kiss, not air, real gloss to mark you pwned. You wait in the hall for the elevator. The bureau emits telltale SIGINT hoots. No email, nothing, that's it, fake-humped and forgotten. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Dec 24 03:27:16 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 24 Dec 2010 12:27:16 +0100 Subject: [p2p-hackers] Whistle-blower site platform design Message-ID: <20101224112715.GI16518@leitl.org> ----- Forwarded message from joss-p2phackers at pseudonymity.net ----- From eugen at leitl.org Fri Dec 24 03:57:48 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 24 Dec 2010 12:57:48 +0100 Subject: Tor VM stalled at 25% Message-ID: <20101224115748.GJ16518@leitl.org> ----- Forwarded message from coderman ----- From antoniatrudiexa at ryeco.com Fri Dec 24 14:06:54 2010 From: antoniatrudiexa at ryeco.com (Antonia Trudie) Date: Fri, 24 Dec 2010 15:06:54 -0700 Subject: *BUY Hydrocodone $4.40, Vicodin ES $4.40, Ambien$2.70, fast shipping! 3yx In-Reply-To: <11f201cb9ece$999bd55f$41cc2c55@0mn4l82> Message-ID: <4D15197E.4393E7AA@ryeco.com> "If You Are In Pain You Will Qualify" Hydrocodone $4.40 Vicodin ES $4.40 Xanax$1.90 ValiumROCHE $2.15 Ativan(� Wyeth) $2.15 Ambien$2.70 Prescription is NOT Required, Safe, Free Shipping in the USA and Canada All Orders Guaranteeed to be Approved or Your Money Back http://cpkgelqq.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 694 bytes Desc: not available URL: From 0-craft at nipopo.net Fri Dec 24 13:55:06 2010 From: 0-craft at nipopo.net (Free_Shipping_on_All_Products) Date: Fri, 24 Dec 2010 22:55:06 +0100 Subject: horizon succeeds a Against recruit. the Message-ID: <3124096617.JKE9P4DB685131@oylkhyuenii.huczlsmxfeuul.biz> "View images" Our collection of sites will blow you away! http://visitcover.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 242 bytes Desc: not available URL: From eugen at leitl.org Fri Dec 24 13:57:09 2010 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 24 Dec 2010 22:57:09 +0100 Subject: Interview with Tommaso Debenedetti and Matze Schmidtabout WikiLeaks Message-ID: <20101224215709.GV16518@leitl.org> ----- Forwarded message from John Young ----- From gil_hamilton at hotmail.com Fri Dec 24 14:59:21 2010 From: gil_hamilton at hotmail.com (Gil Hamilton) Date: Fri, 24 Dec 2010 22:59:21 +0000 Subject: No subject Message-ID: http://jarowape.t35.com/PansyTaylor.html Stre ssedWi thYo ur Boss? From cnievesii at budgetware.com Sat Dec 25 00:27:26 2010 From: cnievesii at budgetware.com (Carman Nieves) Date: Sat, 25 Dec 2010 01:27:26 -0700 Subject: "If You Are In Pain You Will Qualify", Hydrocodone $4.40, Xanax$1.90, Valium$2.15, Ativan$2.15 no In-Reply-To: Message-ID: <4D15AAEE.04896C19@budgetware.com> "If You Are In Pain You Will Qualify" Hydrocodone $4.40 Vicodin ES $4.40 Xanax$1.90 ValiumROCHE $2.15 Ativan(� Wyeth) $2.15 Ambien$2.70 Prescription is NOT Required, Safe, Free Shipping in the USA and Canada All Orders Guaranteeed to be Approved or Your Money Back http://cswjlxey.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 710 bytes Desc: not available URL: From skquinn at speakeasy.net Sat Dec 25 00:13:08 2010 From: skquinn at speakeasy.net (Shawn K. Quinn) Date: Sat, 25 Dec 2010 02:13:08 -0600 Subject: administrivia: surviving nodes? Message-ID: <1293264788.11336.8.camel@afterburner> Quick semi-OT question: is al-qaeda.net/jfet.org the last surviving node of the CDR? Are there others I don't know about? -- Shawn K. Quinn From measl at mfn.org Sat Dec 25 03:23:16 2010 From: measl at mfn.org (J.A. Terranson) Date: Sat, 25 Dec 2010 05:23:16 -0600 (CST) Subject: administrivia: surviving nodes? In-Reply-To: <1293264788.11336.8.camel@afterburner> References: <1293264788.11336.8.camel@afterburner> Message-ID: On Sat, 25 Dec 2010, Shawn K. Quinn wrote: > Quick semi-OT question: is al-qaeda.net/jfet.org the last surviving node > of the CDR? Are there others I don't know about? As of right now, yes, AQ is the last node, however, another one is coming on line in a few days (being worked on). //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From measl at mfn.org Sat Dec 25 10:10:02 2010 From: measl at mfn.org (J.A. Terranson) Date: Sat, 25 Dec 2010 12:10:02 -0600 (CST) Subject: administrivia: surviving nodes? In-Reply-To: <4D160EC8.80609@rayservers.com> References: <1293264788.11336.8.camel@afterburner> <20101225130932.GZ16518@leitl.org> <4D160EC8.80609@rayservers.com> Message-ID: On Sat, 25 Dec 2010, Rayservers wrote: > On 25/12/10 13:09, Eugen Leitl wrote: > > On Sat, Dec 25, 2010 at 05:23:16AM -0600, J.A. Terranson wrote: > >> On Sat, 25 Dec 2010, Shawn K. Quinn wrote: > >> > >>> Quick semi-OT question: is al-qaeda.net/jfet.org the last surviving node > >>> of the CDR? Are there others I don't know about? > >> > >> As of right now, yes, AQ is the last node, however, another one is coming > >> on line in a few days (being worked on). > > > > I wouldn't mind hosting a node in a vserver jail myself, but > > I have no clue about the setup. I can throw a root shell on > > a Debian guest towards anyone who would want to set up one. > > > > Seconded. Post instructions on a setup and it will be running on a debian > vserver guest. > > An additional mixmaster/tor middleman node is planned as well. > > Best, > Ray. If anyone has these instructions, please, *do* post them. Im not getting any reply from Riah at jfet/aq. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From eol1 at yahoo.com Sat Dec 25 12:23:49 2010 From: eol1 at yahoo.com (Peter Thoenen) Date: Sat, 25 Dec 2010 12:23:49 -0800 (PST) Subject: administrivia: surviving nodes? In-Reply-To: Message-ID: <976171.1721.qm@web111405.mail.gq1.yahoo.com> I'm on travel right now (hence can't access my local archives) but anybody have access to the archives? I believe detailed directions were in the same post where it was announced JETF was being taken down or at least somewhere in that time frame. Maybe 2005'ish IIRC. From nev4269 at thecream.ru Sat Dec 25 01:27:15 2010 From: nev4269 at thecream.ru (Dewey Vogel) Date: Sat, 25 Dec 2010 12:57:15 +0330 Subject: =?koi8-r?B?/uHz+S3z7/Tv9/nqLCDNxd7UwSBKYW1lcyBCb25kYSDP1CA1MDAwINLV?= =?koi8-r?B?wi4=?= Message-ID: <000d01cba415$eafa93f0$6400a8c0@nev4269> Суперсовременный девайс часы - мобильный телефон С виду обычные часики, но при подробном рассмотрении вы найдете там огромное кол - во функций и возможностей этого устройства. Звони, отправляй смс, борозди просторы интернета и все это будет в ваших часах. Иди в ногу со временем часы - телефон. Продукция: Официальная партия от производителя. Изготовлена специально для российского рынка. Вся продукция находится на складах г.Москва и доступна к прямому заказу с нашего сайта. 1 год гарантии на всю продукцию и комплектующие. Полноценный русский перевод часов-телефонов и документации. Отдел доставок работает с понедельника по пятницу с 9:00 до 18:00 Телефон: 8(926)-945-17-81 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2782 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 4179 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 3060 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 4375 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 4101 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 578 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 594 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 676 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 609 bytes Desc: not available URL: From bkv71 at seogid.ru Fri Dec 24 23:48:59 2010 From: bkv71 at seogid.ru (Riley Patterson) Date: Sat, 25 Dec 2010 13:18:59 +0530 Subject: =?koi8-r?B?/uHz+S305ezl5u/uINfTxcfPINrBIDUwMDAg0tXCLg==?= Message-ID: <000d01cba408$30809d60$6400a8c0@bkv71> Суперсовременный девайс часы - мобильный телефон С виду обычные часики, но при подробном рассмотрении вы найдете там огромное кол - во функций и возможностей этого устройства. Звони, отправляй смс, борозди просторы интернета и все это будет в ваших часах. Иди в ногу со временем часы - телефон. Продукция: Официальная партия от производителя. Изготовлена специально для российского рынка. Вся продукция находится на складах г.Москва и доступна к прямому заказу с нашего сайта. 1 год гарантии на всю продукцию и комплектующие. Полноценный русский перевод часов-телефонов и документации. Отдел доставок работает с понедельника по пятницу с 9:00 до 18:00 Телефон: 8(926)-945-17-81 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2782 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 4179 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 3060 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 4375 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 4101 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 578 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 594 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 676 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 609 bytes Desc: not available URL: From eugen at leitl.org Sat Dec 25 05:09:32 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 25 Dec 2010 14:09:32 +0100 Subject: administrivia: surviving nodes? In-Reply-To: References: <1293264788.11336.8.camel@afterburner> Message-ID: <20101225130932.GZ16518@leitl.org> On Sat, Dec 25, 2010 at 05:23:16AM -0600, J.A. Terranson wrote: > On Sat, 25 Dec 2010, Shawn K. Quinn wrote: > > > Quick semi-OT question: is al-qaeda.net/jfet.org the last surviving node > > of the CDR? Are there others I don't know about? > > As of right now, yes, AQ is the last node, however, another one is coming > on line in a few days (being worked on). I wouldn't mind hosting a node in a vserver jail myself, but I have no clue about the setup. I can throw a root shell on a Debian guest towards anyone who would want to set up one. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From support at rayservers.com Sat Dec 25 07:33:28 2010 From: support at rayservers.com (Rayservers) Date: Sat, 25 Dec 2010 15:33:28 +0000 Subject: administrivia: surviving nodes? In-Reply-To: <20101225130932.GZ16518@leitl.org> References: <1293264788.11336.8.camel@afterburner> <20101225130932.GZ16518@leitl.org> Message-ID: <4D160EC8.80609@rayservers.com> On 25/12/10 13:09, Eugen Leitl wrote: > On Sat, Dec 25, 2010 at 05:23:16AM -0600, J.A. Terranson wrote: >> On Sat, 25 Dec 2010, Shawn K. Quinn wrote: >> >>> Quick semi-OT question: is al-qaeda.net/jfet.org the last surviving node >>> of the CDR? Are there others I don't know about? >> >> As of right now, yes, AQ is the last node, however, another one is coming >> on line in a few days (being worked on). > > I wouldn't mind hosting a node in a vserver jail myself, but > I have no clue about the setup. I can throw a root shell on > a Debian guest towards anyone who would want to set up one. > Seconded. Post instructions on a setup and it will be running on a debian vserver guest. An additional mixmaster/tor middleman node is planned as well. Best, Ray. -- Rayservers http://www.rayservers.com/ Zurich: +41 43 5000 728 London: +44 20 30 02 74 72 Panama: +507 832 1846 San Francisco: +1 408 419 1978 USA Toll Free: +1 888 265 5009 10:00 - 24:00 GMT We prefer to be paid in gold Globals and silver Isles Global Standard - Global Settlement Foundation http://www.global-settlement.org/ Our PGP key 0x079CCE10 on http://keyserver.rayservers.com/ From bi at spbcorp.ru Sat Dec 25 03:57:07 2010 From: bi at spbcorp.ru (Caroline Chandler) Date: Sat, 25 Dec 2010 17:27:07 +0530 Subject: =?koi8-r?B?08XHz8TO0SDFxMXNINrBy8Ha2dfB1Nggy9LP18HUy9Ug0yDNwdTSwdPP?= =?koi8-r?B?zSE=?= Message-ID: <000d01cba42a$dac38720$6400a8c0@bi> Отдаём кровати и матрасы в добрые руки! (не дорого) Металлические кровати Металлические кровати с деревянными ножками . Только натуральные материалы! НЕТ опилкам и стружке только металл и дерево!!! Матрасы на любой вкус и кошелёк за 7 дней гипоаллергенные, ортопедические, с пружинами и без! Адрес магазина: г. Москва, Ленинградское ш.,дом 25. ТЦ "РИО" 4й этаж, бесплатные автобусы от метро "Войковская" тел. для справок 8 926 386-66-16 с 10.00 до 20.00 часов без выходных. 24 376 руб. 10 807 руб. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1803 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 6324 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 5878 bytes Desc: not available URL: From no_reply933 at pfizer.com Sat Dec 25 20:30:02 2010 From: no_reply933 at pfizer.com (no_reply933 at pfizer.com) Date: Sat, 25 Dec 2010 23:30:02 -0500 Subject: Order status #350362 -87% Message-ID: <201012260430.oBQ4U2AM006363@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1408 bytes Desc: not available URL: From cdorthey_yo at csiweb.com Sat Dec 25 23:30:44 2010 From: cdorthey_yo at csiweb.com (Clarissa Dorthey) Date: Sun, 26 Dec 2010 00:30:44 -0700 Subject: Viagra50/100mg - $1.85 |BUY NOW| Visa, MasterCard, eCheck accepted 41 In-Reply-To: <78f801cba33b$14bbe80a$8333adc1@rmemib8> Message-ID: <4D16EF24.976FA3F1@csiweb.com> Viagra50/100mg - $1.85 |BUY NOW| High Qua1ityMedications + Discount On All Reorders + Free Shipping Options + Free Pills With Every Order = Best Deal Ever! http://eacno.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 557 bytes Desc: not available URL: From lyesseniazu at urscorp.com Sun Dec 26 04:10:04 2010 From: lyesseniazu at urscorp.com (Laureen Yessenia) Date: Sun, 26 Dec 2010 05:10:04 -0700 Subject: Rep1icaRo1ex :: Breitling Rep1icaWatch :: CartierRep1ica & more. Best Rep1icaWatches from $150 nq In-Reply-To: <6d8801cba18f$95c3a24e$774d8201@742xbg1> Message-ID: <4D17309C.6790199F@urscorp.com> SwissRep1ica Luxury Watches from $150 Each ** 85% OFF RETAIL SELLING PRICE! ** RolexDaytona RolexExplorer II RolexGMT master II RolexSpecial Collection RolexSubmariner RolexYachtmaster RolexCellini RolexDatejust RolexDaydate Buy Best Quality Rep1icaWatches here http://naslil.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 678 bytes Desc: not available URL: From bertagaz at ptitcanardnoir.org Sun Dec 26 06:12:08 2010 From: bertagaz at ptitcanardnoir.org (bertagaz at ptitcanardnoir.org) Date: Sun, 26 Dec 2010 15:12:08 +0100 Subject: Announce: The (Amnesic) Incognito Live System 0.6.1 Message-ID: Hi, The (Amnesic) Incognito Live System, version 0.6.1, is out. This is a bugfix-only release mainly aimed at fixing serious security issues in bundled software. All users must upgrade as soon as possible. What is it? =========== T(A)ILS is a Live system aimed at preserving your privacy and anonymity: - all outgoing connections to the Internet are forced to go through the Tor network; - no trace is left on local storage devices unless explicitely asked. Homepage: https://amnesia.boum.org/ Get it, try it, share it! ========================= Try it! [1] Any comments are most welcome. Please note you'll need to install the CACert root certificate into your web browser before connecting to our web site... unless you use Debian. [1] https://amnesia.boum.org/download/ What's new? =========== - Tor 0.2.1.28: resolves possible remote code execution, see the Tor project blog post [2] for details - Other software upgrades fix grave bugs, most of these with serious security implications. - FireGPG and Seahorse: use the same keyserver as the one configured in `gpg.conf`. - HTP: display the logs when the clock synchronization fails. - Use the light version of the "Are you using Tor?" webpage. See the online Changelog [3] for more details. [2] https://blog.torproject.org/blog/tor-02128-released-security-patches [3] http://git.immerda.ch/?p=amnesia.git;a=blob_plain;f=debian/changelog;hb=refs/tags/0.6.1 *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From nichol_xe at urbanflavorz.com Sun Dec 26 15:30:47 2010 From: nichol_xe at urbanflavorz.com (Alane Nichol) Date: Sun, 26 Dec 2010 16:30:47 -0700 Subject: Explosive, intenseOrgasns, 1ncrease Volume ofEjacu1ate, Doctor designed and endorsed PenisPills tvh In-Reply-To: Message-ID: <4D17D027.2461C8CC@urbanflavorz.com> You Have Everything To Gain! Incredib1e gains in length of 3-4 inches to yourPenis, PERMANANTLY : Amazing increase in thickness of yourPenis, up to 30% : BetterEjacu1ation control : Experience Rock-HardErecetions : Explosive, intenseOrgasns : Increase volume ofEjacu1ate : Doctor designed and endorsed : 100% herbal, 100% Natural, 100% Safe The proven NaturalPenisEnhancement that works! 100% MoneyBack Guaranteeed http://umirek.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 831 bytes Desc: not available URL: From leonie_nj at hershey.com Sun Dec 26 19:42:31 2010 From: leonie_nj at hershey.com (Charlotte Leonie) Date: Sun, 26 Dec 2010 20:42:31 -0700 Subject: "If You Are In Pain You Will Qualify", Hydrocodone $4.40, Xanax$1.90, Valium$2.15, Ativan$2.15 8a7c In-Reply-To: <09c601cba3c8$4055db1d$22ad95a5@2xni0f1> Message-ID: <4D180B27.BBC0224F@hershey.com> "If You Are In Pain You Will Qualify" Hydrocodone $4.40 Vicodin ES $4.40 Xanax$1.90 ValiumROCHE $2.15 Ativan(� Wyeth) $2.15 Ambien$2.70 Prescription is NOT Required, Safe, Free Shipping in the USA and Canada All Orders Guaranteeed to be Approved or Your Money Back http://duwlrutt.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 699 bytes Desc: not available URL: From eugen at leitl.org Sun Dec 26 12:51:53 2010 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 26 Dec 2010 21:51:53 +0100 Subject: Announce: The (Amnesic) Incognito Live System 0.6.1 Message-ID: <20101226205153.GL16518@leitl.org> ----- Forwarded message from bertagaz at ptitcanardnoir.org ----- From 0-operaciones at cordicargas.com.ec Mon Dec 27 01:25:40 2010 From: 0-operaciones at cordicargas.com.ec (Must-Sell-ALL) Date: Mon, 27 Dec 2010 14:55:40 +0530 Subject: a distributed imbalance into bares The microprocessor. quota the Message-ID: <2603186681.YT98I064448046@crhpwxc.zlkoayflf.tv> Click if you cant see the images Order 2 products from us and receive the 3rd FREE! http://i5.be/cZZ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 271 bytes Desc: not available URL: From marge.tristajj at kfda.com Tue Dec 28 02:25:07 2010 From: marge.tristajj at kfda.com (Marge Trista) Date: Tue, 28 Dec 2010 03:25:07 -0700 Subject: World-Class CheapWatches: vRolex, Audemars Piguet, Tag Heuer, Officine Panerai, 0ver 1500 styles, Fast worldwide shipping bgc Message-ID: <4D19BB03.E05F65C0@kfda.com> SwissRep1ica Luxury Watches from $150 Each ** 85% OFF RETAIL SELLING PRICE! ** RolexDaytona RolexExplorer II RolexGMT master II RolexSpecial Collection RolexSubmariner RolexYachtmaster RolexCellini RolexDatejust RolexDaydate Buy Best Quality Rep1icaWatches here http://pochvil.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 683 bytes Desc: not available URL: From forward at 1c-tonic.ru Mon Dec 27 23:53:46 2010 From: forward at 1c-tonic.ru (=?koi8-r?B?5MXMzw==?=) Date: Tue, 28 Dec 2010 10:53:46 +0300 Subject: =?koi8-r?B?MTAg0sHT09nMz8sg2sEgMTAg1NnTLiDS1cI=?= Message-ID: <000d01cba664$5b031460$6400a8c0@forward> Приближаются Новогодние и Рождественские праздники. Мы приготовили для Вас праздничное предложение и надеемся, что Вам это окажется выгодно. Предложение действительно только с 25 декабря 2010года до 09 января 2011года включительно. Пакетные рассылки: 10 рассылок за 10 тыс. рублей. (Москва самая полная база, доставка на 6-7 млн. за одну рассылку, всего уникальных адресов 17 млн.) Израсходовать нужно в указанные числа, в стоимость входит изготовление только одного макета, каждый последующий 500 руб. или тот который вы изготовите самостоятельно. 10 рассылок за 15 тыс. рублей. (Вся Россия самая полная база, доставка на 12-14 млн. за одну рассылку, всего уникальных адресов 27 млн.) Израсходовать нужно в указанные числа, в стоимость входит изготовление только одного макета, каждый последующий 500 руб. или тот который вы изготовите самостоятельно. ВНИМАНИЕ КОЛИЧЕСТВО ПАКЕТОВ ОГРАНИЧЕНО тел: #8#964#7O2#З6#85 From diman at academ.kiev.ua Tue Dec 28 05:11:36 2010 From: diman at academ.kiev.ua (Samuel Doty) Date: Tue, 28 Dec 2010 15:11:36 +0200 Subject: =?koi8-r?B?9MXMxcbPziDXIN7B08HI?= Message-ID: <000d01cba690$c1ac7f40$6400a8c0@diman> Суперсовременный девайс часы - мобильный телефон Watchtech С виду обычные часики, но при подробном рассмотрении вы найдете там огромное кол - во функций и возможностей этого устройства. Звони, отправляй смс, борозди просторы интернета и все это будет в ваших часах. Иди в ногу со временем часы - телефон. Продукция: Официальная партия от производителя. Изготовлена специально для российского рынка. Вся продукция находится на складах г.Москва и доступна к прямому заказу с нашего сайта. 1 год гарантии на всю продукцию и комплектующие. Полноценный русский перевод часов-телефонов и документации. Отдел доставок работает с понедельника по пятницу с 9:00 до 18:00 Телефон: 8(926)-945-17-81 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2792 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 4179 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 3060 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 4375 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 4101 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 578 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 594 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 676 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 609 bytes Desc: not available URL: From 0-daisuke at todakogyo.com Tue Dec 28 14:45:44 2010 From: 0-daisuke at todakogyo.com (One_Month_Luxury_Closeout) Date: Tue, 28 Dec 2010 18:45:44 -0400 Subject: The dumped author multiplies. Message-ID: <0318143263.JNCSZU87273612@cmlydmlbpjsif.gqmerqihlxnwd.com> EVERYTHING IS ON SALE Our quality is up to par or above everything else, with a lower price! http://LuxuryandWatchSurplus.com -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 264 bytes Desc: not available URL: From eugen at leitl.org Tue Dec 28 11:07:54 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 28 Dec 2010 20:07:54 +0100 Subject: 27C3 on Tor Message-ID: (via arsetechnica) http://arstechnica.com/tech-policy/news/2010/12/flaws-in-tor-anonymity-network-spotlighted.ars Flaws in Tor anonymity network spotlighted By John Borland, wired.com | Last updated about 4 hours ago At the Chaos Computer Club Congress in Berlin, Germany on Monday, researchers from the University of Regensburg delivered a new warning about the Tor anonymizer network, a system aimed at hiding details of a computer userbs online activity from spying eyes. The attack doesnbt quite make a surferbs activity an open book, but offers the ability for someone on the same local networkba Wi-Fi network provider, or an ISP working at law enforcement (or a regimebs) request, for examplebto gain a potentially good idea of sites an anonymous surfer is viewing. bDevelopers have to be aware of this kind of attack, and develop countermeasures,b said Dominik Herrmann, a Regensburg PhD student studying profiling and fingerprinting attacks. bBut that proves to be very difficult.b The research, performed by a variety of collaborators in Germany working on anonymity measures, represents a warning for privacy-conscious users wary of spying eyes, whether behind Net-unfriendly borders or simply corporate firewalls. Tor is essentially an online mask, rather than a tool that hides the fact or content of communication itself. The projectbs developers are addressing the problem of traffic analysisbessentially the threat that an attacker or observer might be able to tease out a personbs identity, location, profession, social network or other information about the message content by analyzing a messagebs unencrypted headers. To hide this information, the Tor system routes messages around a winding path of volunteer servers across the Net, with each relay point knowing only the address of the previous and next step in the pathway. Once this circuit has been established, neither an eavesdropper nor a compromised relay will theoretically have the ability to determine both the source and destination of a given piece of communication. According to the Tor projectbs latest metrics, the network has drawn between 100,000 and 300,000 users per day over the last several months. Herrmann and his fellow researchers say therebs a partial flaw in this arrangement, however. A potential eavesdropper on the end userbs own network still has the ability to analyze the patterns of data being returned, and in many cases will be able to develop a reasonable guess about the source of the communication. An attackerbperhaps an ISP instructed by law enforcement or a government to engage in such surveillancebwould first have to develop a list of potential sites that the target might be visiting, or that it was interested in monitoring. It would then run the Tor system itself, testing the way these sites appeared when accessed through Tor, developing a database of bfingerprintsb associated with the sites of interest. Once the target of the surveillance went online, the eavesdropper would capture the packet stream as it crossed the local network and compare the source data with its fingerprint database with the help of pattern recognition software. Any match would be only statistical, giving somewhere between 55 percent and 60 percent certainty, Herrmann saidbnot enough to provide hard evidence in court, but likely more certainty than many people seeking privacy might be comfortable with. Different online destinations will carry different susceptibility to fingerprinting, of course. Unusual sites, with characteristics such as very heavy or large graphic use, can be more easily identified, Herrmann said. By the same token, the easiest way for a website to fool such an eavesdropper would be to make its site look as closely as possible like another popular sitebmimicking the look of the Google site, for example, one of the most commonly accessed pages on the Web. Users themselves can guard against this type of fingerprint-based eavesdropping relatively easily, Herrmann noted. Downloading or requesting more than one site at a time through the network will muddy the pattern enough that certainty will be very difficult for the eavesdropper to establish. The research many not dissuade many from using Tor, which remains one of the most promising approaches for individuals seeking to hide aspects of their identity or online activity. But it may well make them work harder. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Dec 28 11:41:07 2010 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 28 Dec 2010 20:41:07 +0100 Subject: 27C3 on Tor Message-ID: <20101228194107.GA23555@leitl.org> ----- Forwarded message from Eugen Leitl ----- From mikeperry at fscked.org Tue Dec 28 21:05:40 2010 From: mikeperry at fscked.org (Mike Perry) Date: Tue, 28 Dec 2010 21:05:40 -0800 Subject: 27C3 on Tor Message-ID: Thus spake Roc Admin (onionroutor at gmail.com): > Found the presentation at least and watching it now. You have to skip > to 3:30 for the actual presentation. > > http://www.youtube.com/watch?v=crMInOosdBk&feature=related Here's a direct link to the relevant section: http://www.youtube.com/watch?v=crMInOosdBk#t=31m38s The work seems to be pretty thorough, but it would be nice to have a paper and/or the source to their classifier. The 27c3 website doesn't seem to list much: http://events.ccc.de/congress/2010/Fahrplan/events/4140.en.html The results aren't very specific in the video. It looks like they covered the major pitfall of timing attack research (the Base Rate Fallacy) with their presentation of the True Positive rate and the False Positive rate, but it's not 100% clear, because there's only a single slide with the results: http://www.youtube.com/watch?v=crMInOosdBk#t=46m20s The other detail that's not clear is if you train your detector for 5 interesting websites, and 2000 uninteresting ones, what happens if the target is browsing sites outside of those 2000 uninteresting ones? -- Mike Perry Mad Computer Scientist fscked.org evil labs ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From onionroutor at gmail.com Tue Dec 28 20:45:23 2010 From: onionroutor at gmail.com (Roc Admin) Date: Tue, 28 Dec 2010 23:45:23 -0500 Subject: 27C3 on Tor Message-ID: Not sure if anyone else watched the video but of course there is a different story than the Wired article. If you don't want to sit through the whole hour, here's how I would sum it up: The talk in general was about modern tactics for profiling web users. They actually had some interesting stuff to say about how easily and accurately they were able to correlate a user to his or her web traffic but that's off topic. My take away from the entire thing is that there are new technologies to apply machine learning for automated statistical analysis of traffic. In other words, the attacks Nick referenced of 2002 are more feasible. (They do admit that this is nothing new) The same rules apply though and that is you can only be profiled if you are performing the activities that they have in their database and it seems to me that this is more difficult than they make it sound. Profiling a website that has streaming content would be difficult to nail down into a set profile. They conclude by saying that the easiest way to protect yourself is to do multiple things at the same time which increases the likliness that they can profile your activity to their database. I seem to remember a Google Code project that generated random data to obfuscate your fingerprint. Anyone remember? You can see in the video at 31:48 when they start specifically talking about Tor. The specifics of their version of the attack look like this: 1) The attack starts out where the attacker sets up a Tor client running the same OS version and browser and uses tools to profile a website like slashdot.org. 2) their "website profiling tool of doom" makes connections to the website they want to profile. They say that after 2000 requests over a 2 week period, they are able to accurately profile a website no matter what specific content is on the page. This is metadata profiling like packet size, direction, etc. 3) After they have a database of sites, they intercept a Tor client's traffic locally and correlate it with their data. They make a comment that Andriy Panchenko is one of the people that increased the accuracy of this attack by a lot but they don't give the details of what he added. His website is here but I didn't find any details: http://lorre.uni.lu/~andriy/ Prior to his involvement, the attack was at a 3% accuracy. They really don't have any suggestions for the Tor network. They did say that padding, as I originally thought would help, doesn't affect this attack so that wouldn't prevent the attack. Roger, it sounds like you had some specific ideas as to where to put the padding compared to a global value so maybe that's different than what they were talking about. They do comment that TCP fragmentation over the Tor network causes size variation of packets over which makes things easier. Not sure how much value there is in working on that aspect. -- ROC Admin On Tue, Dec 28, 2010 at 11:29 PM, Roger Dingledine wrote: > On Tue, Dec 28, 2010 at 08:51:30PM -0500, Nick Mathewson wrote: >> From the wired.com article, this sounds _exactly_ like the old website >> fingerprinting attack, which has been known since 2002: >> http://freehaven.net/anonbib/#hintz02 >> >> It would be neat if somebody could send a pointer to the authors' >> actual results. > > See also point 3 at > https://www.torproject.org/getinvolved/research.html.en#Ideas > It's been sitting on our "this is important to learn more about" > research list for years. > > It's also listed in the talk I did at 25c3: > http://events.ccc.de/congress/2008/Fahrplan/events/2977.en.html > http://freehaven.net/~arma/slides-25c3.pdf (slide 30) > > So I'm glad to see more attention to the attack, but a bit frustrated that > we (the research community) are not farther along at understanding it. > > Two other things to note: > > The website fingerprinting attack works against other anonymity systems > too, in most cases even more straightforwardly than against Tor. We've > got 8+ years in the literature of applying it to other systems (most > thoroughly just attacking SSL streams to learn what web page is being > fetched despite the encryption), and in the past few years people have > improved the attack to get it to work against Tor also. As I understand > it, even now it only works consistently when they assume laboratory > conditions. That isn't to say that it won't work in real-world conditions > -- just that it's a real hassle to get all the details right so most > researchers don't put in the required engineering work. > > What I'm really looking forward to is learning what modifications to Tor > might slow down the attack. For example, what happens if we move to a 1024 > byte cell by default, or if we randomly add some extra cells periodically, > or if we ask the entry node to add padding cells so the responses we get > are multiples of 10KB? It would seem that there is a tradeoff between > bandwidth overhead (wasted bytes) and protection against this attack, > but I hope there are smart points in the tradeoff space. Alas, we're > still not really to that point yet -- we don't know how well it actually > works in practice against vanilla Tor, so it doesn't make sense to ask > how well it would work in practice against a modified Tor design. > > --Roger > > *********************************************************************** > To unsubscribe, send an e-mail to majordomo at torproject.org with > unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ > *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Dec 29 00:23:13 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 29 Dec 2010 09:23:13 +0100 Subject: 27C3 on Tor Message-ID: <20101229082313.GV16518@leitl.org> ----- Forwarded message from Roc Admin ----- From eugen at leitl.org Wed Dec 29 00:23:45 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 29 Dec 2010 09:23:45 +0100 Subject: 27C3 on Tor Message-ID: <20101229082345.GW16518@leitl.org> ----- Forwarded message from Mike Perry ----- From lexi.pimenidis at gmail.com Wed Dec 29 02:35:07 2010 From: lexi.pimenidis at gmail.com (Lexi Pimenidis) Date: Wed, 29 Dec 2010 11:35:07 +0100 Subject: 27C3 on Tor Message-ID: Hek, > Based on > http://www-wiwi.uni-regensburg.de/Forschung/Publikationen/Dominik-Herrmann.html.en > I'm guessing they're basing the talk on their CCSW 2009 paper: > http://epub.uni-regensburg.de/11919/ Actually, the talk is based on the PhD thesis of Andriy Panchenko. He'll publish the detailed results soon. So please stand by for more information :-) Regards, Lexi -- Xnik qwq, nux! Mxdcrvrmxdk, Lwpdvykpkd wqo Zkodtdq, Wqo ckdokp nwux Yxkrcrbdk! Owpuxnwv vywodkpy, zdy xkdvvkz Ikzwkxq. On vykx dux qwq, dux npzkp Yrp! Wqo idq vr acwb ncv edk twgrp; *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Dec 29 02:40:00 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 29 Dec 2010 11:40:00 +0100 Subject: 27C3 on Tor Message-ID: <20101229104000.GC16518@leitl.org> ----- Forwarded message from Lexi Pimenidis ----- From verdelllindace at tcl.com Wed Dec 29 10:57:26 2010 From: verdelllindace at tcl.com (Verdell Linda) Date: Wed, 29 Dec 2010 11:57:26 -0700 Subject: No Prescription Required - Express Delivery - Secured Checkout, Vicodin ES - 7.5/750 mg 60 pills - $219 Message-ID: <61n79v11d45-85834775-022q3j54@dunwjdpq> Vicodin ES - 7.5/750 mg 60 pills - $219 ; 90 tabs $299.00 ; 120 tabs $359.00 No Prescription Required - Express Delivery - Secured Checkout � Discount 10% for All! ACCEPT VISA & MC! Vicodin, Oxycodone http://order-rx.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 414 bytes Desc: not available URL: From elman at earlinvest.com Wed Dec 29 06:14:46 2010 From: elman at earlinvest.com (Gilbert Arroyo) Date: Wed, 29 Dec 2010 19:44:46 +0530 Subject: =?koi8-r?B?/uHz+S305ezl5u/uLCDX08XHzyDawSA1IDAwMCDS1cIu?= Message-ID: <000d01cba762$bf5f7990$6400a8c0@elman> Суперсовременный девайс часы - мобильный телефон Watchtech С виду обычные часики, но при подробном рассмотрении вы найдете там огромное кол - во функций и возможностей этого устройства. Звони, отправляй смс, борозди просторы интернета и все это будет в ваших часах. Иди в ногу со временем часы - телефон. Продукция: Официальная партия от производителя. Изготовлена специально для российского рынка. Вся продукция находится на складах г.Москва и доступна к прямому заказу с нашего сайта. 1 год гарантии на всю продукцию и комплектующие. Полноценный русский перевод часов-телефонов и документации. Отдел доставок работает с понедельника по пятницу с 9:00 до 18:00 Телефон: 8(926)-945-17-81 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2792 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 4179 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 3060 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 4375 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 4101 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 578 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 594 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 676 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 609 bytes Desc: not available URL: From seb at dbzteam.org Wed Dec 29 13:19:33 2010 From: seb at dbzteam.org (Sebastien Martini) Date: Wed, 29 Dec 2010 22:19:33 +0100 Subject: [p2p-hackers] TCP library - Was: p2p-hackers Digest, Vol 51, Issue 8 Message-ID: Hi guys, Seems to be a new development in this area: CryptoCP by Daniel Bernstein, see the relevant portions at 41''30 and 59''45 of his recent talk http://27c3.iphoneblog.de/recordings/4295.html (don't know how to watch the video from there though, I downloaded the talk this morning from another site but the link is down right now). While he didn't discuss much CryptoCP per se, if I had to make a _guess_ from what he said it would be a mix of TCP in userspace with authenticated encryption provided by his software NaCl http://nacl.cace-project.eu/box.html . NaCl actually implements cryptographic primitives mainly based on his own crypto primitives such as Salsa family and Poly1305 but he has also hinted what could be some sort of equivalent with "standard" primitives (see previous link, bottom of the page). So a common use case, on the client side applications would proxify their network requests through CryptoCP which would encrypt them, simulate TCP and send UDP packets to the destination server. Notice that in this case it would be quite similar to what libjingle is currently implementing: OpenSSL can be used to SSL_write and SSL_read to/from a userspace TCP stream. On Thu, Dec 23, 2010 at 23:28, coderman wrote: > On Sun, Nov 28, 2010 at 2:26 PM, Alex Pankratov wrote: >> Just need a drop in replacement for TCP sockets, i.e. if I have >> two nodes talking over UDP, I want a simple way for them to do >> TCP as well. > > > current favorite: > > NetBSD RUMP stacks in userspace: > http://www.netbsd.org/docs/rump/index.html > > the paper on TCP/IP in userspace: > http://2009.asiabsdcon.org/papers/abc2009-P5A-paper.pdf > presentation: > http://www.youtube.com/watch?v=RxFctq8A0WI > _______________________________________________ > p2p-hackers mailing list > p2p-hackers at lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers > _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Dec 29 13:57:40 2010 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 29 Dec 2010 22:57:40 +0100 Subject: [p2p-hackers] TCP library - Was: p2p-hackers Digest, Vol 51, Issue 8 Message-ID: <20101229215740.GF16518@leitl.org> ----- Forwarded message from Sebastien Martini ----- From g.astridyf at gazdefrance.com Thu Dec 30 01:09:44 2010 From: g.astridyf at gazdefrance.com (Georgiann Astrid) Date: Thu, 30 Dec 2010 02:09:44 -0700 Subject: Viagra100mg - $1.17, Cialis20mg- $1.53, Visa & MasterCard Accepted. 100% Satisfaction Guaranteed. Free Discreet Shipping. Message-ID: <201012300211.3C579094FC9CD51D8E00@h7cagcga8z> Viagra100mg - $1.17, Cialis20mg- $1.53 Order Online without prescription. + 10-12 Free BonusViagra 100mg pills with every order. Visa & MasterCard Accepted. 100% Satisfaction Guaranteed. Free Discreet Shipping. http://lyrmx.ru From dima at mail444.com Thu Dec 30 04:45:46 2010 From: dima at mail444.com (=?koi8-r?B?7MXbwQ==?=) Date: Thu, 30 Dec 2010 04:45:46 -0800 Subject: =?koi8-r?B?UmU6IEUtbWFpbCAtINLFy8zBzcEg0yDUz97Oz8ogx8HSwc7UycXKINzG?= =?koi8-r?B?xsXL1ME=?= Message-ID: <000d01cba81f$7a605fe0$6400a8c0@dima> Предлагаем качественную доставку рекламы Базы адресов постоянно обновляются Очень гибкая система скидок постоянным клиентам до 50% При заказе 2х рассылок, 3я бесплатная; Подготовка макета бесплатно; Быстрый выход рассылки, по желанию день в день; Самый массовый охват целевой аудитории Пробив фильтров. Любые формы оплаты; Каждая рассылка перед отправкой тестируется; Москва от 2 тыс руб. Россия от 3000 руб. Страны СНГ от 2,5 тыс руб. Наши цены самые альтернативные, закажите у Нас и Вы будете удивлены качеством обслуживания. Формируем базы под каждое направление, продукт реализации. Фокусировка себя полностью оправдывает. тел: +7 (964) 7О2-3685 From dir at 3d2f.ru Thu Dec 30 01:15:08 2010 From: dir at 3d2f.ru (=?koi8-r?B?9SDuwdMg0MnXzs/KINLByg==?=) Date: Thu, 30 Dec 2010 11:15:08 +0200 Subject: =?koi8-r?B?8MnOzyDLIM7P18/Hz8TOxc3VINPUz8zV?= Message-ID: <83DA003DD00E4E89A705F86C1682C92F@tojy1053ff4252> http://доставка-пива.рф/ From 0-ka at honda.com Thu Dec 30 09:22:11 2010 From: 0-ka at honda.com (R0LEXBlowout) Date: Thu, 30 Dec 2010 21:22:11 +0400 Subject: The quota bares the distributed imbalance into a microprocessor. Message-ID: <3740267624.9T7X4KOD890357@znfpipnwqgsxzss.zbwoinywtfqkc.va> Put smiles on their faces without going broke in the process Our collection of sites will blow you away! http://ninjalink.com/32841czu -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 287 bytes Desc: not available URL: From a.ingeek at lantic.net Fri Dec 31 03:52:49 2010 From: a.ingeek at lantic.net (Angel Inge) Date: Fri, 31 Dec 2010 04:52:49 -0700 Subject: Top MaleEnhancement Pills Reviewed. You Can Get BIG Now! Message-ID: <201012310451.C3AFB97E4D3DBEEE34AF@wdz022h> 2-4 Inches? Top MaleEnhancement Reviews Discover How To Easily Add 2-4 Inches To Your Current Size! Top MaleEnhancement Pills Reviewed You Can Get BIG Now! Add 2-4 inches Today! http://knepat.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 554 bytes Desc: not available URL: From dave at farber.net Thu Dec 30 18:41:28 2010 From: dave at farber.net (dave at farber.net) Date: Fri, 31 Dec 2010 08:11:28 +0530 Subject: hyjbnigh Message-ID: <201012310517.oBV5HV6N000663@proton.jfet.org> The original message was received at Fri, 31 Dec 2010 08:11:28 +0530 from 126.52.138.25 ----- The following addresses had permanent fatal errors ----- [demime 1.01d removed an attachment of type application/octet-stream which had a name of letter.zip] From jonglavoniaxi at gbnet.com Fri Dec 31 17:41:34 2010 From: jonglavoniaxi at gbnet.com (Jong Lavonia) Date: Fri, 31 Dec 2010 18:41:34 -0700 Subject: Cialis20mg $1.53, Viagra100mg $1.17, Free Discreet Shipping & + 10-12 Free BonusViagra 100mg pills with every order. Message-ID: <201012311839.3CE0C8236B962C5900DB14@505uo7l> Viagra100mg - $1.17, Cialis20mg- $1.53 Order Online without prescription. + 10-12 Free BonusViagra 100mg pills with every order. Visa & MasterCard Accepted. 100% Satisfaction Guaranteed. Free Discreet Shipping. http://mdmvc.ru From 0-ka at dct.com Fri Dec 31 15:36:15 2010 From: 0-ka at dct.com (The ~#1_PHARMACY~) Date: Sat, 1 Jan 2011 07:36:15 +0800 Subject: Phe.termine will help you lose fat Message-ID: <7922335567.U2GNG94P847432@ydlfmv.zkdelmxtxsmwap.com> Low Priced Excitement for both the man and the woman! Results Guaranteed http://treatgroan.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 278 bytes Desc: not available URL: