From alixjy at arcotec.com Tue Feb 1 09:59:41 2011 From: alixjy at arcotec.com (Zenaida Alix) Date: Tue, 01 Feb 2011 10:59:41 -0700 Subject: Xanax Online Store. Lowest Price guarantee! Message-ID: <4d484a0d.35288ab9@arcotec.com> Xanax Online Store. Lowest Price guarantee! Get your XANAX for as low as $2.15 per pill and even cheaper right now! Best quality Xanax from fully licensed pharmacies without RX needed http://cheapest-medti.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 556 bytes Desc: not available URL: From eugen at leitl.org Tue Feb 1 05:55:10 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 1 Feb 2011 14:55:10 +0100 Subject: The Questionable Observer Detector Message-ID: <20110201135510.GN23560@leitl.org> http://www.kurzweilai.net/the-questionable-observer-detector The Questionable Observer Detector January 25, 2011 by Lakshmi Sandhana (Image: University of Notre Dame) Exclusive | Kevin W. Bowyer, Chair of the Department of Computer Science and Engineering at the University of Notre Dame, Indiana is out to create a tool to reliably identify criminals who may be hanging out at the crime scene after the event. Their Questionable Observer Detector (QuOD) can process any available video clips of groups of people present at the scene of event, spanning different times and locations to pick out any person who appears frequently in them. bThe idea is that the person showing up unusually often as part of the crowd at these events may be someone that the police would want to talk to,b says Bowyer. For instance, if given video clips of the serial bomb attacks currently plaguing Abuja in Nigeria, the software could identify people appearing repeatedly, giving authorities leads on either the bombers or their helpers. Itbs an extremely challenging 3D facial recognition problem, since the system has no prior database to compare the faces with and works with videos taken by surveillance cameras and bystanders with their handheld video camera under any and all conditions. It detects potential suspects by creating individual bface tracksb for people appearing in every video, comparing them across videos to zero in on similar looking faces. It takes the best image from a face track in one video and compares it with the top images derived from other face tracks in other videos to see if it can find the same face. When it spots a match, it adds it to a group of video appearances featuring just that person. It identifies an individual as a bquestionable observerb if the final number of videos in their personal group exceeds a particular number, set earlier by authorities. This indicates that they appear often at numerous crime scenes. [+] (Image: University of Notre Dame) A research prototype could be ready in less than a year, according to Bowyer, who hopes to work with the Federal Bureau of Investigation (FBI) and the Intelligence Advanced Research Projects Activity (IARPA) later on. Is the QuOD a step further towards the dark picture painted by George Orwell in his novel 1984 of omnipresent surveillance and pre-emptive arrests? Given that it is more about handing authorities a tool to identify suspects based on their actual presence solely at multiple disaster areas, as opposed to policing people on possible intent (as in the movie Minority Report), the answer would have to be bno.b [+] (Image: University of Notre Dame) Topics: Electronics | Survival/Defense From eugen at leitl.org Tue Feb 1 06:18:47 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 1 Feb 2011 15:18:47 +0100 Subject: Farah Stockman: Foreign activists stay covered online (Boston Globe) Message-ID: <20110201141847.GT23560@leitl.org> ----- Forwarded message from Patrice Riemens ----- From eugen at leitl.org Tue Feb 1 06:22:28 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 1 Feb 2011 15:22:28 +0100 Subject: [tahoe-announce] Tahoe-LAFS-1.8.2 Released! Message-ID: <20110201142228.GU23560@leitl.org> ----- Forwarded message from Brian Warner ----- From millnert at gmail.com Tue Feb 1 16:10:34 2011 From: millnert at gmail.com (Martin Millnert) Date: Tue, 1 Feb 2011 19:10:34 -0500 Subject: A top-down RPKI model a threat to human freedom? (was Re: Level 3's IRR Database) Message-ID: Alex, On Tue, Feb 1, 2011 at 4:57 PM, Alex Band wrote: > On 1 Feb 2011, at 22:20, Owen DeLong wrote: >> RPKI is a big knob governments might be tempted to turn. > > Of course we looked into this, cause we're running our service from Amsterdam, the Netherlands. The possibilities for law enforcement agencies to take measures against the Resource Certification service run by the RIPE NCC are extremely limited. Under Dutch law, the process of certification, as well as resource certificates themselves, do not qualify as goods that are capable of being confiscated. > > Then of course, the decision making process always lies in the hands of the network operator. Only if a government would mandate an ISP to respect an invalid ROA and drop the route, it would be effective. > > So *both* these things would have to happen before there is an operational issue. Like you've seen in Egypt, pulling the plug is easier... > > YMMV on your side of the pond. > > Alex Band > Product Manager, RIPE NCC As others pointed out, and as we especially have seen the past 10 and a half years, laws can easily change. I too believe it is somewhat necessary to have 'control' over the IPv4 prefix distribution in order for the RIRs to continue being Registries. I understand and share the RIRs concern regarding this. I also do believe we can expend at least two years (just to put a number out there) more to make a system that is robust also against censorship, that everybody can feel comfortable to trust. Operational impact and cost, I believe, will be quite minor during this time. In fact, I believe it is an investment that apart from being necessary (IMO), will actually pay off, because only with a system that people trust, will most network operators enable it by their free will, which ought to be the goal for *everybody* involved. (Lest the dystopian future takes hold, of course.) Once a reliable system exists, I would be the first one to enable it on my routers, and wouldn't shed a tear if illegitimately acquired or traded routing information was lost at that time. And to be extremely clear, nobody is suggesting that they do not trust the people working at RIPE or any other RIR to do a good job here but at the same time, "we are all human". We have a, in my opinion, very big responsibility towards future generations in (re-)designing the Internet in a way that continues to keep it open and robust towards failures of various sorts. Even that of a single RIR. Regards, Martin ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From inversely at gdtm.net Tue Feb 1 14:37:54 2011 From: inversely at gdtm.net (=?koi8-r?B?y9XS0yDQzyDLwcTSwc0=?=) Date: Tue, 1 Feb 2011 23:37:54 +0100 Subject: =?koi8-r?B?68HE0s/Xz8UgxMXMz9DSz8na18/E09TXzyAyMDExIMcuIA==?= Message-ID: <000d01cbc260$aa753c90$6400a8c0@inversely> 10 февраля Тема: Кадровое делопроизводство и правовое регулирование трудовых отношений с учетом последних изменений. (Ч95) 742-9l98 или 4Ч5_З2*66 Андреева Валентина - консультант-преподаватель, один из лучших специалистов России в области кадрового делопроизводства. Профессор кафедры Трудового права Академии Правосудия при Верховном Суде РФ (Москва), кандидат наук, документовед. Программа мероприятия: 1.Правовые основы документирования деятельности кадровых служб 1.1.Требования к кадровому делопроизводству, предусмотренные ТК РФ, в связи с обязательно-стью документирования работы с персоналом. 1.2.Государственный надзор и контроль за соблюдением законодательства в области докумен-тирования работы с кадрами. Штрафные санкции за нарушение порядка работы с кадровой документацией. 2.Система кадровой документации 2.1.Состав документов кадровой службы. 2.2.Нормативно-методические основы оформления кадровых документов. Унифицированные системы документации, применяемые в процессе документирования работы с персоналом. 2.3.Делегирование полномочий при издании документов. 2.4.Порядок придания документам юридической силы. Типичные ошибки в оформлении докумен-тов, судебная практика. 3.Документирование процедур подбора и отбора персонала 3.1.Проверка документов, предъявляемых при приеме на работу. Определение подлинности до-кументов. 3.2.Письменный отказ в приеме на работу: обязательность составления, правильность оформ-ления, обжалование в суде. 4.Документирование процедур, предшествующих заключению трудового договора. 4.1.Ознакомление с локальными нормативными актами работодателя. 4.2.Документирование процедуры фактического допущения к работе. 5.Документирование трудовых отношений. Виды документов и правила их оформления. 5.1.Оформление приема на работу, обязательные и рекомендательные документы. 5.2.Документы, создаваемые при изменении трудового договора. 5.3.Документирование прекращения трудового договора. Документы-основания для увольнения работников. 6.Ответы на вопросы слушателей и практические рекомендации. Стоимость участия 6 990 руб. Вся информация по тел: код: (четыре девять пять) 792_2i_22 \\// ЧЧ5*4095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4121 bytes Desc: not available URL: From buhg at smartmetal.ru Wed Feb 2 05:23:27 2011 From: buhg at smartmetal.ru (=?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxQ==?=) Date: Wed, 2 Feb 2011 05:23:27 -0800 Subject: =?koi8-r?B?7sHMz8fP19nFINPIxc3ZIMTM0SAo7uTm7Cwg09TSwcjP19nFINfazs/T?= =?koi8-r?B?2Sk=?= Message-ID: <000d01cbc2dc$60805d50$6400a8c0@buhg> 07 - 08 февраля ТЕМА: Оптимальные налоговые схемы с учетом изменений налогового законодательства. Оптимизируем НДФЛ, страховые взносы. Готовим затратные механизмы в налоговых схемах. \Моск. код/-4/Ч-5_З_2_.6*6 \\\/// 742/9|98 День1: Методы оптимизации расходов на выплату белой зарплаты: уменьшаем страховые взносы Ставка обязательных страховых взносов с зарплаты с 2011 года составляет 34% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала ЕСН заменена отменой уплаты взносов с суммы дохода свыше 463 тыс. рублей, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь √ назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: * Обзор изменений законодательства, связанных с повышением ставки страховых взносов Сколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2011 гг. Какие схемы стали невыгодными; у каких налогоплательщиков положение даже улучшилось. * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. * Использование специальных налоговых режимов: * Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. * Использование вспомогательных организаций: * Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов * Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. * Использование процентных займов от физлиц. Расчет эффективности. * Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. * Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, * Создание недоимки по налогам с ФОТ на фирме, не обремененной активами √ пример "серой" схемы (как нельзя "оптимизировать"!), * Способы подтверждения источников крупных расходов физлиц и когда это необходимо. * Ответы на вопросы. По желанию √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. ----------------------------- День2: Затратные схемы для оптимизации налогов (НДС, Налог на прибыль) Программа: * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги сучетом будущих изменений законодательства, судебной практики и тенденцийразвития правоприменения. "Черные", "серые" и "белые"схемы. * Кто может быть участником "затратных" схем. Незаконные варианты: "недобросовестныеналогоплательщики" и контактирующие с ними риск-структуры ("белая"- "серая" - "черная" фирмы). Примеры "серых" схемс применением затратных механизмов (как нельзя "оптимизировать"!). Как нестать "недобросовестным". * Варианты затратных механизмов: * Виды приемлимых услуг и работ: Распространенные "плохие" варианты "виртуальных"услуг и работ (информационные, консультационные, маркетинговые, рекламные,ремонт...). Когда они все же допустимы. * Минимизация рисков "затратных" схем. "Явныепризнаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличиеделовых целей, "легенда", отсутствие дублирующихся функций. Грамотноеобоснование расходов и цен. Неаффилированность, прямые и косвенные признакиаффилированности, ее негативные последствия и когда она допустима; "искусственноедробление бизнеса с целью уклонения от уплаты налогов" (подход "как кЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельностьучастников "затратных" схем. * Иностранные низконалоговые компании в "затратных"схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п.Выбор низконалоговых юрисдикций. * Ответы на вопросы. По желанию и при наличиивозможности √ индивидуальное экспресс-моделирование схем налоговогопланирования для компаний-участниц семинара. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 Московский код: ЧЧ54095 <<>> ЧЧ5Ч095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8066 bytes Desc: not available URL: From glbux at kanteparin.ru Tue Feb 1 22:04:58 2011 From: glbux at kanteparin.ru (Myra Stringer) Date: Wed, 2 Feb 2011 08:04:58 +0200 Subject: =?koi8-r?B?88vMwcQg1yDB0sXOxNUgySDP1NfF1MjSwc7FzsnF?= Message-ID: <000d01cbc29f$1ed86d80$6400a8c0@glbux> Дешевый склад в аренду г. Москва и г. Видное, 750 кв.м., 4000 руб./кв.м. год (133 $/кв.м.год). Включая все Дешевое ответхранение в Москве: 8 руб. в сут. за паллету, 10 руб. в сут. за кв.м. Дополнительные услуги по желанию. Все склады отапливаемые. Email:sklad_24 at yahoo.com тел. 8#925#184#9I#57 Виталий. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 874 bytes Desc: not available URL: From schoen at eff.org Wed Feb 2 10:24:08 2011 From: schoen at eff.org (Seth David Schoen) Date: Wed, 2 Feb 2011 10:24:08 -0800 Subject: What are email risks? Message-ID: Bjarni Rznar Einarsson writes: > Combine that sort of stuff with analysis of writing style, vocabulary, etc. > and you might be able to correlate two e-mails as originating from the same > person with some degree of accuracy. > > I'm not aware of any research into the trackability of such things, as > e-mail generally isn't considered anonymous anyway, but a lot of the work > that has gone into fighting spam would actually have implications here as > well. Hi Bjarni, There is a stylometry item in the anonbib where they do statistical analysis of features of writing style: http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf I bet these techniques have gotten more powerful as the field of machine learning has developed, although I don't know if there are more recent studies of what this means for anonymity. -- Seth Schoen Senior Staff Technologist schoen at eff.org Electronic Frontier Foundation https://www.eff.org/ 454 Shotwell Street, San Francisco, CA 94110 +1 415 436 9333 x107 *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From j.capriceiz at tagline.net Wed Feb 2 16:10:33 2011 From: j.capriceiz at tagline.net (Jerilyn Caprice) Date: Wed, 02 Feb 2011 17:10:33 -0700 Subject: Trusted Pharmacy >>> Viagra for Sale Message-ID: <201102021710.EECFCDE94B3B78B736F6AEB7@24844mo> Trusted Pharmacy >>> Viagra for Sale Viagra for Sale in our FDA Approved Drugstore. Guaranteed Quality of Pills, Fast delivery and Low prices. http://rxmedspharmacyexam.ru From buhg at s-graf.ru Wed Feb 2 14:14:17 2011 From: buhg at s-graf.ru (=?koi8-r?B?8M/Nz9bFzSDXIMvSydrJ08U=?=) Date: Wed, 2 Feb 2011 17:14:17 -0500 Subject: =?koi8-r?B?8NLPxsXT08nPzsHM2M7PxSDGyc7BztPP18/FINDMwc7J0s/Xwc7JxS4=?= Message-ID: <000d01cbc326$887f2a80$6400a8c0@buhg> Тема: Профессиональное финансовое моделирование бюджета в различных условиях не стабильности рынка, оптимизация Cash Flow, поиск и распределение свободных денежных средств. -------------------------------------------------------------------- Компьютерный класс 3 дня, настоящей практики! С профессионалами своего дела в области бюджетного управления предприятием. По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 (Ч95) Ч45З9*68 и Ч45_З9*68 Для занятий чистой практикой! Всем участникам предоставляется индивидуальный компьютер на время семинара. Экономические задачи по перестроению бюджета будут решаться на лицензионном программном обеспечении, которое Вы получите в результате обучения Вам останется только вернуться на предприятие установить данную программу на свое рабочее место и приступить к оптимизации бюджета предприятия. Дата проведения: 1Ч-16 февраля 2011г. Краткая информация о семинаре: * В последствии решений для предприятий! это самое главное распознать и просчитать в условиях плановых задач факторы, которые, дестабилизируют деятельность предприятия, не только в условиях кризиса но и финансовой неопределенности. * Вы не поверите, но за 3 дня занятий Вы получите все ответы на вопросы, которые возникли у Вас и Вашего предприятия. Данной серией семинаров мы занимаемся с 2000г. и обучили уже более 4000 специалистов. * В условиях неопределенности рынка возникает необходимость поиска решений. Мы знаем, как помочь Вам, так как, начиная еще с прошлого века девяносто седьмого года, наша компания разрабатывает пакет программ (интегрирует их с методическими материалами и подготавливает обучающие курсы) для планирования бюджета, анализа текущего, сравнения плана и факта, поиска и принятия решений, отслеживания выполнения намеченных программ. * В итоге обучения на семинаре Вы сможете определить и найти решения по вопросам, которые в условиях кризиса возникают у компаний, а именно: Оборачиваемость капитала его недостаток, как обеспечить покрытие; как распорядиться текущими поступлениями (куда надо тратить, а куда нет); стоит ли привлекать процентные и иные дорогостоящие средства? если да, то минимизировать период использования за счет выделения собственных, то есть оптимизировать оборотные ср-ва. Рассмотрение возможных периодов с повышенными рисками используя многопараметральный экономический анализ для поиска решений; выявление нестабильности денежных средств, определение их дефицита, разработка сценария для ожидаемых трудностей, принятие сценария что следует сокращать а что увеличивать. Обучение методу от обратного для рассмотрения постатейного анализа бюджета, использование метода точки ╚0╩ для стабилизации не только затрат но и управление доходами предприятия и ценообразованием; как разработать плановый бюджет максимально приближенный к фактическому проанализировать его и принять за основу в ближайшем периоде. И еще множество других вопросов, на которые Вы услышите ответы. Около 4ОО их будет рассмотрено на семинаре. * В результате обучения, Вы, как профессионал сможете управлять любой формой финансовых отношений. Быть подготовленным к любым неожиданностям. 1 день * Создание первого тестового проекта, используя полученное задание. Знакомство программным комплексом. Изучение и рассмотрение на практике фин. методов, выбор для создаваемого проекта. Использование программ для выполнения полученного задания. Первые шаги в отборе полученных результатов используя фин. контрольные точки. Поэтапное построение проекта и анализ его при помощи выбранного метода. 2 день * Получение отчетов по проекту, знакомство, изучение. Изучение финансового анализа (показатели) практическое применение, рассмотрение в текущей ситуации. Финансовый контролинг для изучения и исправления ошибок в созданном проекте. Поиск ошибок рассмотрение и исправление. Последовательность применение метода. Для фиксирования темы и ее лучшего понимания создание II го проекта при помощи ПО. Созданный проект начинаем анализировать. 3 день * При помощи новых технологий анализа и программы, реструктурируем проекты с новыми параметрами, проводим отбор и проверяет на устойчивость. Описываем все риски, отклонения для проекта, помещаем в виртуальную реальность, получаем результаты, ищем оптимальное решение. Отбор планового проекта, загрузка фактических данных и сравнение проектов. Эмулирование риск-факторов влияющих на бюджет пр. Создание модели управления потоками. Поиск оборотных средств за счет перераспределения потоков. Постатейные отклонения в проекте, оптимизация конечных результатов. Выявления дефицита ден. ср-в и поиск средств на покрытие, создание оптимальной схемы. Решения в управлении с использованием новых полученных результатов. Каждому участнику курсов: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: 1. Специализированная программа-профессиональная разработка фин. проектов! Программный продукт способен не только разрабатывать финансовую документацию на профессиональном уровне, в новой версии реализованы значительные возможности для планирования текущего бюджета предприятий. 2. Программа для построения, развития и управления экономической моделью предприятия. Управления инвестиционными проектами, сравнение план/факт, мониторинг бюджета предприятия в реальном времени Возможность написания собственных формул, сценария диагностики проекта, перепрограммирование и настройка программы. 3. Программа экспресс подготовки экономического проекта. Позволяет всего за пару часов создать очень приличный проект для принятия решений по глобальным разработкам. 4. Материал методический: печатный для самостоятельной разработки и подготовки экономической документации, бизнес планов, ТЭО, инвестиционных проектов. 5. Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него обучающийся специалист может эффективно разрабатывать свои сценарии финансовых проектов. ------------------------------------------------------------------------- По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: (код Москвы) Ч45-ЧО95 <> 7Ч2_9I98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8240 bytes Desc: not available URL: From eugen at leitl.org Wed Feb 2 13:19:41 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 2 Feb 2011 22:19:41 +0100 Subject: What are email risks? Message-ID: <20110202211941.GV23560@leitl.org> ----- Forwarded message from Seth David Schoen ----- From maymeeleonorph at execulink.com Thu Feb 3 04:55:31 2011 From: maymeeleonorph at execulink.com (Mayme Eleonor) Date: Thu, 03 Feb 2011 05:55:31 -0700 Subject: MaxMan Pills are male enhancement pills and an all natural penis enhancement that is rated No 1 Message-ID: <11k63l19h82-26147858-122g9v14@rtyucjo> Male Enhancement Pills, Natural Penis Enhancement, Penis Pills MaxMan Pills are male enhancement pills and an all natural penis enhancement that is rated No 1 You Can Enjoy Bigger, Harder, More Intense Erections! http://enlargemypeniscafe.ru From htjzoxsyejtvh at yahoo.co.jp Thu Feb 3 06:36:12 2011 From: htjzoxsyejtvh at yahoo.co.jp (oiswssusxca@yahoo.co.jp) Date: Thu, 03 Feb 2011 08:36:12 -0600 Subject: =?ISO-2022-JP?B?GyRCJDRDbUo4JE4+JklKSC9BdzQwTjskTiQ0MEZGYiRHJDkhIyQ0M05HJyROJFskSTU5JDckLyQqNGokJENXJDckXiQ5ISMbKEI=?= Message-ID: <201102031436.p13EZwCJ004646@proton.jfet.org> トヨタ 【PR】------------------------------------------------------------------ 新型プリウスが30名様に当たる!更に現金50万円分のキャッシュバック!  ┏━━┓ ┏┛┛…┗┓ ┗●━━●┛ http://medtechediting.com/ ------------------------------------------------------------------------ ・━┓・━┓・━┓・━┓・━┓・━┓・━┓・━┓・━┓・━┓ ┃お┃┃め┃┃で┃┃と┃┃う┃┃ご┃┃ざ┃┃い┃┃ま┃┃す┃ ┗━・┗━・┗━・┗━・┗━・┗━・┗━・┗━・┗━・┗━・      タイミングが合わず参加を逃した貴方様!            最後まで決断できずに後悔した貴方様!               奇┃跡┃の┃再┃当┃選┃!┃                 ━┛━┛━┛━┛━┛━┛━┛            それも先週より                       収┃益┃ ・ 精┃度┃                     ━┛━┛   ━┛━┛         格┃ 段┃ ア┃ ッ┃ プ┃                 ━┛ ━┛ ━┛ ━┛ ━┛         貴方様だけに特別待遇今週も               通常参加費10万円のところ【完全無料】            3┃百┃万┃超┃を┃鉄┃板┃献┃上┃!!┃           ━┛━┛━┛━┛━┛━┛━┛━┛━┛━┛           業┃界┃N┃o┃1┃                     ━┛━┛━┛━┛━┛           札束直結完全的中情報                    完┃全┃獲┃得┃保┃証┃                   ━┛━┛━┛━┛━┛━┛      イ┃ン┃サ┃イ┃ダ┃ー┃情┃報┃!┃!┃           ━┛━┛━┛━┛━┛━┛━┛━┛━┛━┛          再┃ 降┃ 臨┃ !!┃                   ━┛ ━┛ ━┛ ━┛ ↓ ↓ ↓ ↓ ↓ ↓ 詳細を確認する ↓ ↓ ↓ ↓ ↓ ↓         http://medtechediting.com/          先週もお知らせした通り               今週も会員様には「特別」に負け目皆無!              どう転んでも勝ち組へご案内!                  完全獲得保証インサイダー情報              ▼ ▼ ▼ 参加特典その1 ▼ ▼ ▼       競馬の知識は一切不要!札束に直結する「本命馬」と「厳選買い目情報」をご提供致しますので後はその指示通りに馬券を買うだけ!それだけでレース発走数分後にはその手にあるのは「100万円単位」の札束。老若男女を問わずどなたでも多額の払戻金を手に入れるのが目前であります。       ▼ ▼ ▼ 参加特典その2 ▼ ▼ ▼       できるだけノーリスクで!という会員様のお声に応える形で、万が一払戻し金が到達しなかった場合はどう転んでも会員様には損をさせないシステムを実施しております!これも業界No1を誇る的中率・回収率を叩き出す自信からの保証とお考え下さい! 弊社の結果をご覧頂ければ一目瞭然でございますが「大儲けは当然」!私共が贈る今週の情報は、先週を「収益性」「精度」と共に上回る「値千金」のご案内でございます!           競馬の知識一切不要!                      ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄            性別関係無し!                         ̄ ̄ ̄ ̄ ̄ ̄ ̄             どなた様でも                     百┃ %┃ 的┃ 中┃ の┃                 ━┛ ━┛ ━┛ ━┛ ━┛             自信を以って                     札┃ 束┃ 直┃ 行┃ 便┃         ━┛ ━┛ ━┛ ━┛ ━┛             へお導き!                 完全獲得保証インサイダー情報!!の当選は今週で最後!         今まで他社で満足が得られなかった会員様            馬券で勝ちたい方、札束を欲しい方                  どんな方でも漏れなく                   最┃ 高┃ の┃ 週┃ 末┃                 ━┛ ━┛ ━┛ ━┛ ━┛           へお連れ致します!                  まずはサイト内で内容をご確認を!             そして先着順に付きご参加へお急ぎ下さい!      ↓ ↓ ↓ ↓ ↓ ↓今すぐご参加なら↓ ↓ ↓ ↓ ↓ ↓          http://medtechediting.com/ ↓ ↓ ↓ ↓ ↓ ↓ご確認はコチラで↓ ↓ ↓ ↓ ↓ ↓          http://medtechediting.com/ ▽キャンペーンに関するお問い合わせ・ご質問などは 会員様担当「青山 あずさ」まで http://thehighwaymanfilm.com/?iupoAXRJ ≫≫≫ 入会金・年会費・完全無料 ≪≪≪ ※追加費用などが発生することは御座いません。 〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓   ┏┓   ┃┃ 他┃社┃に┃は┃不┃可┃能┃!┃イ┃ン┃サ┃イ┃ダ┃ー┃!┃   ┃┃ ━┛━┛━┛━┛━┛━┛━┛━┛━┛━┛━┛━┛━┛━┛━┛   ┃┣┳┳┓  ┏┫┃┃┃┃ 支持率最高の無料情報!今週は無料情報だけでも100万宣言!  ┃ ┗┻┻┫ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~  ┃    ┃ 今月は余裕の1000万オーバー獲得宣言!次は貴方の手に!!  ┗┓  ┏┛ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓 【スポンサー広告】 某雑誌でも紹介された話題の情報サイトです!! http://medtechediting.com/ 《会員数50,000人突破記念》 馬主・厩舎・騎手・各業界著名人からの 裏情報X当社独自の統計データを 無料公開できるギリギリのレベルまで公開! 選┃び┃抜┃い┃た┃!!┃┏━━┓┏━━┓┏━━┓ ┏━━━━┳━━━━┓ ━┛━┛━┛━┛━┛━┛┗━┓┃┃┏┓┃┃┏┓┃ ┗┓┏━━┫┏┓┏┓┃   厳┃選┃情┃報┃  ┏━┛┃┃┃┃┃┃┃┃┃  ┃┗━━┫┗┛┗┛┃   ━┛━┛━┛━┛  ┗━┓┃┃┃┃┃┃┃┃┃  ┃┏━┓┃┏━━┓┃ 最┃大┃獲┃得┃総┃額┃┏━┛┃┃┗┛┃┃┗┛┃ ┏┛┃ ┃┃┃  ┃┃ ━┛━┛━┛━┛━┛━┛┗━━┛┗━━┛┗━━┛ ┗━┛ ┗┻┛  ┗┛ ↓配信停止はこちら↓ teisi_vhy at yahoo.co.jp From neal at shareable.net Thu Feb 3 08:53:38 2011 From: neal at shareable.net (Neal Gorenflo) Date: Thu, 3 Feb 2011 08:53:38 -0800 Subject: [P2P-F] Would you like to write about how to set up a mesh network Message-ID: Hi p2p friends, We at Shareable are looking for someone to write a how-to article about how to set up a neighborhood mesh network so neighbors can share Internet access. Please contact me if you're interested or know someone who could do a good job at it. What's especially appreciated is someone who has actually set one up or knows someone who has that can be a source. The article would add to our library of around 80 how-to share guides including how to start a housing coop, a chicken coop, hold a free market, share a vegetable garden, start a farmers market and more: http://shareable.net/how-to-share Neal -- Neal Gorenflo | Publisher, http://Shareable.net | 415.867.0429 _______________________________________________ P2P Foundation - Mailing list http://www.p2pfoundation.net https://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Feb 3 07:38:31 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 3 Feb 2011 16:38:31 +0100 Subject: A top-down RPKI model a threat to human freedom? (was Re: Level 3's IRR Database) Message-ID: <20110203153831.GW23560@leitl.org> ----- Forwarded message from Martin Millnert ----- From eugen at leitl.org Thu Feb 3 09:08:28 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 3 Feb 2011 18:08:28 +0100 Subject: [P2P-F] Would you like to write about how to set up a mesh network Message-ID: <20110203170828.GG23560@leitl.org> ----- Forwarded message from Neal Gorenflo ----- From invest_plus at vitragestudio.ru Thu Feb 3 11:32:15 2011 From: invest_plus at vitragestudio.ru (=?koi8-r?B?4sXM2cUg88jFzdk=?=) Date: Thu, 3 Feb 2011 20:32:15 +0100 Subject: =?koi8-r?B?68HLINfZ0dfJ1Ngg187F287Fx88gy8/O1NLBx8XO1MEtz8TOz8TOxdfL?= =?koi8-r?B?1Q==?= Message-ID: <000d01cbc3d9$0fcace60$6400a8c0@invest_plus> l8 Февраля (495) 445З266 ; Ч45.39-68 Налоговое планирование в условиях кризиса: как жить без обналички и фирм-однодневок и не разориться 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности┘); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей Информацию можно получить по телефонам: +7 (495) 7*42_9|/98 ; 4Ч54О95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4771 bytes Desc: not available URL: From cloyceow at hinet.net Fri Feb 4 02:26:17 2011 From: cloyceow at hinet.net (Cathi Loyce) Date: Fri, 04 Feb 2011 03:26:17 -0700 Subject: MaxMan Pills are male enhancement pills and an all natural penis enhancement that is rated No 1 Message-ID: <4d4bd449.2355cf5f@hinet.net> Male Enhancement Pills, Natural Penis Enhancement, Penis Pills MaxMan Pills are male enhancement pills and an all natural penis enhancement that is rated No 1 You Can Enjoy Bigger, Harder, More Intense Erections! http://enlargemypenischeck.ru ---------------------------------------------- The message was checked by Zillya! Antivirus 1.1.2942.0, bases 2.0.0.549 - No viruses detected From buhg at selex.ru Fri Feb 4 00:15:39 2011 From: buhg at selex.ru (Sherrie Keys) Date: Fri, 4 Feb 2011 08:15:39 +0000 Subject: =?koi8-r?B?8MzFzcXOztnFIM7F1MXMySDJIMLZy8kgwcLF0sTJzs8twc7H1dPTy8/K?= =?koi8-r?B?INDP0s/E2S4g8NLPxMHWwQ==?= Message-ID: <000d01cbc443$b5a4f210$6400a8c0@buhg> НЕТЕЛИ ПЛЕМЕННЫЕ АБЕРДИНО-АНГУССКОЙ ПОРОДЫ БЫКИ ПЛЕМЕННЫЕ АБЕРДИНО-АНГУССКОЙ ПОРОДЫ Цена от 50.000 руб. Цена От 80.000 руб. Класс животных Элита / Элита-рекорд Класс животных Элита / Элита-рекорд Средний живой вес 300 кг Средний живой вес 350 кг Возраст 18 мес. Возраст 20 мес. (495) 669 94 18 Группа предприятий занимается разведением, выращиванием и племенной продажей крупного рогатого скота абердин-ангусской породы. К продаже предлагаются высококлассные животные с подтвержденным генетическим потенциалом и объективной оценочной стоимостью. Животные имеют всю соответствующую сопроводительную документацию, подтверждающую их племенную ценность и качество. Скот комолый (безрогий), чёрной масти. У животных короткие, правильно поставленные ноги и хорошо выраженные мясные формы; туловище широкое и глубокое, с ровной линией верха; шея короткая, незаметно сливающаяся с плечом и головой; поясница и крестец хорошо выполнены, мускулатура окорока опускается до скакательного сустава и хорошо развита. Скот быстро и хорошо откармливается и по округлости форм, скороспелости и качеству туш он стоит на первом месте Кожа рыхлая, тонкая, эластичная; костяк животных тонкий и составляет 15 √ 18% веса туши, а жировые прослойки в мускульных волокнах повышают нежность, вкусовые и питательные качества мяса. Мясо отличается мраморностью. При скрещивании с другими породами животные очень хорошо передают потомству мясные качества. Высота в холке 120 √ 150 см; ширина груди 45 √ 65 см; ширина в маклоках 50 √ 60 см; косая длина туловища 135 √ 140 см. Продуктивность: живая масса коров 500 √ 550 кг, быков √ 750 √ 950 килограмм; новорожденных соответственно 16 √ 28 кг. Телят выращивают на подсосе до 8 месяцев, чему способствует сильно развитый материнский инстинкт коров. Среднесуточный прирост 700 √ 800 г, убойный выход 60%. Затраты корма на 1 кг привеса составляют 6.5 кормовых единиц. Племенных быков, так же предлагаемых предприятием на продажу, можно использовать не только в мясном скотоводстве, но и в молочных хозяйствах для скрещивания с коровами молочных пород и получения помесного молодняка, обладающего свойствами мясной породы. Вы можете получить более подробную информацию, фотографии животных и оставить заявку на посещение племенного репродуктора, в котором содержится скот по указанному телефону. Прайс-лист: НЕТЕЛИ БЫКИ Количество голов Цена за голову Класс Цена за голову До 10 75.000 руб. Элита 150.000 руб. От 10 до 50 70.000 руб. Элита-рекорд 130.000 руб. От 50 до 100 65.000 руб. I класс 100.000 руб. От 100 и более 50.000 руб. II класс 80.000 руб. (495) 669 94 18   -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9497 bytes Desc: not available URL: From c.arleanbn at globalbiz.net Fri Feb 4 07:50:13 2011 From: c.arleanbn at globalbiz.net (Consuela Arlean) Date: Fri, 04 Feb 2011 08:50:13 -0700 Subject: Swiss replica watches for sale! AAA cheap rolex! Message-ID: <4d4c2035.ebf75446@globalbiz.net> $139 Replica Watches! Men's Japanese Movement Replica Watches starting at $139 USD Buy replica watches at 20% OFF while supplies http://superwatchesdev.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 500 bytes Desc: not available URL: From charles at knownelement.com Fri Feb 4 09:13:09 2011 From: charles at knownelement.com (Charles N Wyble) Date: Fri, 04 Feb 2011 09:13:09 -0800 Subject: Weekend Gedankenexperiment - The Kill Switch Message-ID: On 2/3/2011 7:43 PM, Jay Ashworth wrote: > An armed FBI special agent shows up at your facility and tells your ranking > manager to "shut down the Internet". Let's look at this from a different perspective. What level of impairment would the feds face if they ordered wide spread net shut downs. Do the feds have a big enough network of their own, that they can continue to operate without the commercial nets being up? I mean they would need to declare martial law and coordinate enforcement activities. Can they do this all via satellite networks? Also what's to stop the operations staff from saying "no way jose" and walking out? Ok. Let's say they aren't dependent on the net being up. What would the scenario look like? Presumably this would be at a major IX, colo etc? Like say One Wilshire or something? They would show up with several agents, and probably some tech folks. One presumes they would have an injunction or some other legal authority to order you to terminate connectivity. This would have to be spelled out to the letter (terminate all IX traffic, drop all external sessions, take down core routers etc). > What do you do when you get home to put it back on the air Put what back on the air? Regional connectivity to let people coordinate a revolution? (I'm dead serious by the way. If things have gotten to the point where the feds are shutting down the net, it's time to follow our founding code: That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it Depending on the geography, one could establish some long distance links via 802.11/3.65ghz. Hopefully that gear is already on stand by. > -- let's say email > as a base service, since it is -- do you have the gear laying around, and how > long would it take? Well I'm a huge data ownership guy and have been preaching to folks the importance of self hosting. Lots of details are on my wiki at http://wiki.knownelement.com/index.php/Data_Ownership So yes, I have the gear in service already doing my hosting. I also run a small neighborhood WISP. I only offer net access via that WISP, but it would be trivial to stand up a neighborhood xmpp/irc/mail/www server in that VLAN. Maybe I should do that now. Get people using it before hand, so it's what they naturally turn to in time of distress/disaster. Hmmm.... > Do you have out-of-band communications (let's say phone numbers) for enough > remote contacts? How much phone service would still work, if the feds hit all the major IX points and terminate connectivity? I seem to recall much discussion about the all IP back bone of the various large carriers (Qwest/ATT). I guess calls in the same CO and maybe between regional CO's might work. Think of this from a disaster preparedness perspective (ie a major earthquake or terrorist attack significantly damages One Wilshire and/or various IXes in the bay area). AT&T has a very large CO right next to One Wilshire, with something like 1.5 million lines terminated in the building. It wouldn't take that much work for the FBI to shut those places down if they felt a significant need to. Interesting thought exercise. Let's keep the conversation going guys/gals! ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From aadrianwk at broadcom.com Fri Feb 4 10:31:21 2011 From: aadrianwk at broadcom.com (Amal Adrian) Date: Fri, 04 Feb 2011 11:31:21 -0700 Subject: Best Buy Cialis Generic Online, 90000 Satisfied US, UK, Customers! Message-ID: <201102041132.DE475611C3EAA1D66A0C2E41@03090e7> Best Buy Cialis Generic Online Cialis 20mg x 100 Pills $155, Fast Shipping - 100% SATISFACTION, We accept VISA & Mastercard, E-Check, 90000 Satisfied US, UK, Customers! http://rxmedspharmacy.ru From buhg at reciper.ru Fri Feb 4 03:25:21 2011 From: buhg at reciper.ru (=?koi8-r?B?88/L0sHUydTYINLB08guIM7BINrB0MzB1NU=?=) Date: Fri, 4 Feb 2011 13:25:21 +0200 Subject: =?koi8-r?B?7sHMz8fP19nFINPIxc3ZIMTM0SAo7uTm7Cwg09TSwcjP19nFINfazs/T?= =?koi8-r?B?2Sk=?= Message-ID: <000d01cbc45e$356a9b20$6400a8c0@buhg> 07 - 08 февраля ТЕМА: Налоговое планирование в 2011 г. с учетом изменений законодательства (НДФЛ, страховые взносы, затратные механизмы в налоговых схемах) (2 дня) +7 Московский код: Ч_Ч5/4-0_95 или 445-32-66 День1: Методы оптимизации расходов на выплату белой зарплаты: как выжить после замены ЕСН страховыми взносами Ставка обязательных страховых взносов с зарплаты с 2011 года составляет 34% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала ЕСН заменена отменой уплаты взносов с суммы дохода свыше 463 тыс. рублей, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь √ назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: * Обзор изменений законодательства, связанных с повышением ставки страховых взносов Сколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2011 гг. Какие схемы стали невыгодными; у каких налогоплательщиков положение даже улучшилось. * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. * Использование специальных налоговых режимов: * Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. * Использование вспомогательных организаций: * Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов * Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. * Использование процентных займов от физлиц. Расчет эффективности. * Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. * Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, * Создание недоимки по налогам с ФОТ на фирме, не обремененной активами √ пример "серой" схемы (как нельзя "оптимизировать"!), * Способы подтверждения источников крупных расходов физлиц и когда это необходимо. * Ответы на вопросы. По желанию √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. ----------------------------- День2: Варианты затратных схем. Оптимизируем НДС и налога на прибыль Программа: * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги сучетом будущих изменений законодательства, судебной практики и тенденцийразвития правоприменения. "Черные", "серые" и "белые"схемы. * Кто может быть участником "затратных" схем. Незаконные варианты: "недобросовестныеналогоплательщики" и контактирующие с ними риск-структуры ("белая"- "серая" - "черная" фирмы). Примеры "серых" схемс применением затратных механизмов (как нельзя "оптимизировать"!). Как нестать "недобросовестным". * Варианты затратных механизмов: * Виды приемлимых услуг и работ: Распространенные "плохие" варианты "виртуальных"услуг и работ (информационные, консультационные, маркетинговые, рекламные,ремонт...). Когда они все же допустимы. * Минимизация рисков "затратных" схем. "Явныепризнаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличиеделовых целей, "легенда", отсутствие дублирующихся функций. Грамотноеобоснование расходов и цен. Неаффилированность, прямые и косвенные признакиаффилированности, ее негативные последствия и когда она допустима; "искусственноедробление бизнеса с целью уклонения от уплаты налогов" (подход "как кЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельностьучастников "затратных" схем. * Иностранные низконалоговые компании в "затратных"схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п.Выбор низконалоговых юрисдикций. * Ответы на вопросы. По желанию и при наличиивозможности √ индивидуальное экспресс-моделирование схем налоговогопланирования для компаний-участниц семинара. Вся информация по тел: Московский код; 4Ч5_4095 **** 7.Ч2-9i/98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8036 bytes Desc: not available URL: From sdw at lig.net Fri Feb 4 13:26:27 2011 From: sdw at lig.net (Stephen Williams) Date: Fri, 04 Feb 2011 13:26:27 -0800 Subject: [FoRK] Chons Message-ID: On 2/4/11 3:40 AM, Eugen Leitl wrote: > On Thu, Feb 03, 2011 at 04:10:00PM -0800, Tom Higgins wrote: > >> Re Mesh - I have been mucking with it for many years and reading about >> it even longer. Seems solutions for getting what appears a group that > Fun fact: a local /64 is fully enough to encode lat/long/alt > (24, 24, 16 bit) with about 2 m resolution. Add some minor > LSB bit jiggling and DAD, and you've gots yourself a rather > robust address allocation scheme that allows you to know where Can you write up a spec for that? A few lines of code? > you are, and mutal local node mapping. You can either store > it verbatim, or as deviation from idealicity. Implement long-distance > links by VPN tunnels initially. > > Any current WiFi embedded is plenty capable of that. There are a couple main types of use cases for this kind of capability: A) emergency situations of various types like the Egypt blackout and B) getting communication and sharing working in more misc. ambient conditions (poor coverage in a building, on the train, etc.). There is a big use case for this that will give it a workout that is sort of a simulation of the first of these and with a good need for the second: Burning Man. Many people in a refugee-like camp, no commercial wireless or land line, a desire to communicate in various ways, a high percentage of techies with smart phones, all running an experiment for a week. Seems like a perfect testing ground. We have 6 months to be ready. I hereby declare project: "Egyptian Light" (to counter blackouts everywhere ;-) ). The point of this is to shamelessly combine every existing technology that provides a piece of this and then fill in the missing pieces. Even better: http://egypt.annourbis.com/egyptian-gods.html Chons - "Egyptian god of light in the night... he also held the titles Embracer, Pathfinder, and Defender, as he was thought to watch over night travelers. As the god of light in the night, Chons was invoked to protect against wild animals, increase male virility, and to aid with healing." chons.org is now registered. Now, how is it pronounced?? There has been plenty of work with open source cell networks, etc. I haven't seen anything usable about hand-held mesh and/or store and forward capability yet. Ideally, you'd use bluetooth when in close proximity, with Wifi / cell for uplink, with Wifi also being used for wider proximity connections. The store and forward capability could be kind of cool. Limit it to SMS-like messages, enforce flow control, then floodcast, possibly with fuzzy geo-routing, as necessary for both unicast and broadcast messages. Get all roving vehicles to run store and forward nodes. Include time synchronization, then implement radio control for prairie dog activation for both battery conservation and channel multiplexing. The biggest hurdle will be security, including detecting and defeating jamming and spoofing of various types. I'm most interested in an Android solution that will work on most devices. Not only are they easier to hack, more open, easier to run untrusted apps, etc., but some of us are building a collection of obsolete devices that would be cool to use for this. Unfortunately, my pattern is full for a bit. But before BM2011, hopefully it will be far along. sdw _______________________________________________ FoRK mailing list http://xent.com/mailman/listinfo/fork ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From buhg at seo-review.ru Fri Feb 4 13:05:35 2011 From: buhg at seo-review.ru (=?koi8-r?B?68HLINDSwdfJzNjOzyDV18/MydTY?=) Date: Sat, 5 Feb 2011 02:35:35 +0530 Subject: =?koi8-r?B?8NLFy9LB3cXOycUg1NLVxM/Xz8fPIMTPx8/Xz9LBIC0g1MnQyd7O2cUg?= =?koi8-r?B?z9vJwsvJ?= Message-ID: Грамотное увольнение сотрудников. Что должен знать работодатель? 28 февраля код: (четыре девять пять) 7.9-2/2*1_2_2 <> 7Ч2/9|98 Цель обучения: Изучить общие основания прекращения трудового договора, особенности сокращения штатов для отдельных категорий работников. Программа мероприятия: Общий порядок прекращения трудового договора * Собственное желание * Расторжение трудового договора по соглашению сторон * Прекращение трудового договора в связи с истечением срока его действия * Увольнение в порядке перевода к другому работодателю * Увольнение в связи с отказом работника от продолжения работы в силу изменения определенных условий трудового договора Расторжение трудового договора по инициативе работодателя: * На испытательном сроке * По причине сокращения численности (штата) работников -Порядок проведения, сроки выплата выходных пособий, -Кого сократить, а кого уволить по соглашение сторон? -Плюсы и минусы сокращения и соглашения сторон. * По причине недостаточной квалификации работника -Аттестация работников, как аргумент работодателя: правовое регулирование, сроки и порядок проведения, * В связи с неоднократным неисполнением обязанностей -Дисциплинарные взыскания – Кнут работодателя: Порядок наложения и оформления, как не допустить ошибок. * В связи с однократным грубым нарушением работником трудовых обязанностей -По причине совершения проступка работником, непосредственно обслуживающим денежные или товарные ценности * В связи с представлением работником подложных документов Расторжение трудового договора по обстоятельствам, не зависящим от воли сторон Увольнение отдельных категорий работников: * Руководителей организаций * Совместителей * Беременных женщин Выдача трудовой книжки при увольнении: возможные проблемы и споры Ответы на вопросы слушателей Вся информация по тел: код: (четыре девять пять) Ч4*5З.96.8 \\// 792*-2l..22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4435 bytes Desc: not available URL: From coderman at gmail.com Sat Feb 5 02:46:01 2011 From: coderman at gmail.com (coderman) Date: Sat, 5 Feb 2011 02:46:01 -0800 Subject: [FoRK] Chons In-Reply-To: <20110205084755.GJ23560@leitl.org> References: <20110205084755.GJ23560@leitl.org> Message-ID: On Sat, Feb 5, 2011 at 12:47 AM, Eugen Leitl wrote: > ... >>> Re Mesh - I have been mucking with it for many years and reading about >>> it even longer. Seems solutions for getting what appears a group that >> Fun fact: a local /64 is fully enough to encode lat/long/alt >> (24, 24, 16 bit) with about 2 m resolution.... ORCHID address space is perfect for this type of thing, and there are particular extensions well suited to this. [0][1] > There are a couple main types of use cases for this kind of capability: > A) emergency situations of various types like the Egypt blackout and >... > There has been plenty of work with open source cell networks, etc. I > haven't seen anything usable about hand-held mesh and/or store and forward > capability yet. this came up on the p2p-hackers list, which i can't seem to get mail through, [3] regarding Android in particular, sounds similar to Serval. [2] best regards, 0. An IPv6 Prefix for Overlay Routable Cryptographic Hash Identifiers (ORCHID) http://tools.ietf.org/html/rfc4843 [*this: just substitute the cryptographic with hashed coordinates or searchable prefixes, or both given privacy considerations.] 1. http://tools.ietf.org/html/draft-montenegro-6lowpan-dymo-low-routing-03 [*this: combine with geo-aware addressing.] 2. Serval Project http://www.servalproject.org/how-it-works 3. [p2p-hackers] What we should build for the Egyptian (and other) protesters http://lists.zooko.com/pipermail/p2p-hackers/2011-February/002829.html """ On Fri, Feb 4, 2011 at 10:54 AM, Alen Peacock wrote: > I'd always hoped that a global ad-hoc wireless network would spring > from something like MIT's RoofNet > (http://pdos.csail.mit.edu/roofnet/doku.php). > > There's still a lot of academic research into ad-hoc networks, but I'm > not aware of anyone really pursuing something like this in the > commercial space not to any noteworthy degree. the attempts have been numerous in both commercial and research focus. given the number of ad-hoc routing protocols, developers capable of understanding the merits and detriments of general approaches and specific implementations, and certainly not least of all the difficulty in early-adoption of such a Metcalfe utility dependent "collaborative transport" is quite difficult. see http://en.wikipedia.org/wiki/List_of_ad_hoc_routing_protocols as for my druthers i am keenly interested in combined topologies and overlays leveraging the distinct advantages of particular transports together for a best effort, immediately accessible ad-hoc infrastructure. leased circuits and dedicated fiber continued to work in Egypt; a BGP4 peering blackout is just a small slice of the overall communication stacks and paths. (you can run E-Line/E-LAN over free space optics as easily as MPLS / WDM lambdas over fiber, multi-OFDMA wide band systems can be aggregated over polarizations and center bands, etc, etc. the possibilities are endless. and even packet over shortwave can carry signalling channels around the globe...) === On Fri, Feb 4, 2011 at 2:17 PM, David Barrett wrote: > ... > On this topic, it'd be great if you could simultaneously be connected to > two networks (eg, a wireless DSL router *and* broadcast a mesh > repeater). I don't think you can do this in the strict sense, use madwifi-ng and a mobile IPv4/IPv6 transport. for example a custom SOCKS/HTTP/Transparent proxy to multi-homed SCTP over VPNs on virtual station madwifi-ng capable hardware. (i've used up to 6 clients per radio with success, and maximum 8 radios per PCI host bus.) lots of options in this space as well. just not cheap or easy yet... """ From santosjamikamf at cypressconsulting.com Sat Feb 5 02:48:29 2011 From: santosjamikamf at cypressconsulting.com (Santos Jamika) Date: Sat, 05 Feb 2011 03:48:29 -0700 Subject: Guaranteed Quality of Viagra Pills, Fast delivery and Low prices. Message-ID: <201102050347.75D16E1A4B66FA54EFABF@i55gpza> BUY V | A G R A Online Overnight Shipping - Lowest price Buy V | A G R A ONLINE - Discounts and Free Shipping applied. 24/7 Online support, Absolute anonymity & Fast delivery http://pillsprecisionpharmacyrx.ru From eugen at leitl.org Sat Feb 5 00:47:55 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 5 Feb 2011 09:47:55 +0100 Subject: [FoRK] Chons Message-ID: <20110205084755.GJ23560@leitl.org> ----- Forwarded message from Stephen Williams ----- From agnucius at gmail.com Sat Feb 5 09:24:32 2011 From: agnucius at gmail.com (Patrick Anderson) Date: Sat, 5 Feb 2011 10:24:32 -0700 Subject: [P2P-F] Would you like to write about how to set up a mesh network Message-ID: The following are not necessarily focused on 'mesh' networking, but are more generally addressing the shared property ownership of that physical infrastructure. On a similar note: I am forming a plan for an alternative organizational form (or business model) that solves the typical problem of power concentration during the growth of such endeavors which would apply across all types of sharing, not just internet access. ---- http://Frankston.com >>My current interest is moving beyond the 19th century concept of telecom to community owned infrastructure. This would add hundreds of billions of dollars to the US and much more value by creating opportunity for what we can't imagine. http://VillageTelco.org >>an easy-to-use, scalable, standards-based, wireless, local, do-it-yourself, telephone company toolkit http://TheConnective.net >>Together we can replace the telco's 'last mile' - the communication networks at the neighborhood level - with our own 'first mile' of free and open connectivity. http://netBlazr.com >>netBlazr customizes next-generation, but commercially tested, directional radios and networking equipment to deliver high-speed broadband through your office window. http://MuniNetworks.org >>Communities across America have set up community broadband networks to ensure access to affordable, fast networks. http://MediaPolicy.NewAmerica.net/publications/policy/from_the_digital_divide_to_digital_excellence >>From the Digital Divide to Digital Excellence http://WeRebuild.eu >>We Rebuild is a decentralized cluster of net activists who have joined forces to collaborate on issues concerning access to a free Internet without intrusive surveillance. http://seattlewireless.net >>SeattleWireless is a grassroots Community Wireless Network project in Seattle, Washington. Its goals include the creation of a broadband wireless metropolitan area network, as well as the creation of tools that help us achieve that goal. http://Sites.Google.com/site/wasabinetwifi >>Do you want $9.99/month wireless Internet without needing a telephone line, cable TV, or satellite? Do you want free email? Do you want to own your community's Internet network with your neighbors? http://guifi.net ---- Patrick Anderson Social Sufficiency Coalition http://SourceFreedom.BlogSpot.com On Thu, Feb 3, 2011 at 9:53 AM, Neal Gorenflo wrote: > Hi p2p friends, > We at Shareable are looking for someone to write a how-to article about > how to set up a neighborhood mesh network so neighbors can share > Internet access. > Please contact me if you're interested or know someone who > could do a good job at it. What's especially appreciated is someone who > has actually set one up or knows someone who has that can be a source. > The article would add to our library of around 80 how-to share guides > including how to start a housing coop, a chicken coop, hold a > free market, share a vegetable garden, start a farmers market and more: > http://shareable.net/how-to-share > Neal > > -- > > Neal Gorenflo | Publisher, http://Shareable.net | 415.867.0429 > > _______________________________________________ > P2P Foundation - Mailing list > http://www.p2pfoundation.net > https://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation > > _______________________________________________ P2P Foundation - Mailing list http://www.p2pfoundation.net https://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From rosejn at gmail.com Sat Feb 5 07:49:11 2011 From: rosejn at gmail.com (Jeff Rose) Date: Sat, 5 Feb 2011 16:49:11 +0100 Subject: [p2p-hackers] What we should build for the Egyptian (and other) protesters Message-ID: Great thread David. Helping in this kind of situation is what drew me to P2P, and I wish we would have this kind of discussion more often here. On Sat, Feb 5, 2011 at 12:28 AM, Julian Cain wrote: > The answer is alternative communications. Ham, CB, etc. With those the possibilities are endless. They are very reliable. They are very scalable. They can carry "any" message payload. With the consolidation of ISPs building alternative networks is going to be the major hurdle we'll have to cross to enable a P2P internet, even on a local scale. Otherwise the people will be beholden to the kill switch, and (P2P) traffic that is deemed undesirable will be easily filtered. These steerable plasma antennas that are being looked at for future versions of wifi could be one technology that opens the door for community driven mesh networks: http://www.newscientist.com/article/mg20827904.600-wireless-at-the-speed-of-plasma.html Maybe one important step for rapid adoption in crisis situations is P2P application download and install. If it was a one click operation to grab a mesh-enabled twitter app from your friend it would spread quickly. -Jeff _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jjanycepi at madriver.com Sat Feb 5 19:12:45 2011 From: jjanycepi at madriver.com (Jenae Janyce) Date: Sat, 05 Feb 2011 20:12:45 -0700 Subject: Cialis 20mg x 100 Pills $155, Fast Shipping - 100% SATISFACTION, We accept VISA & Mastercard, Message-ID: <201102052014.A85F6A854A2D0685A6DA2BE@sv6d59q> Best Buy Cialis Generic Online Cialis 20mg x 100 Pills $155, Fast Shipping - 100% SATISFACTION, We accept VISA & Mastercard, E-Check, 90000 Satisfied US, UK, Customers! http://drugtorehealthpills.ru From millnert at gmail.com Sat Feb 5 23:20:16 2011 From: millnert at gmail.com (Martin Millnert) Date: Sun, 6 Feb 2011 02:20:16 -0500 Subject: US Warships jamming Lebanon Internet Message-ID: On Sun, Feb 6, 2011 at 12:00 AM, Joly MacFie wrote: > Lebanon's Telecom minister is claiming that US Navy radar is blocking the > country's Internet.. > > http://www.naharnet.com/domino/tn/NewsDesk.nsf/0/93A95CA1A4E42178C225782E007371AF > > "The problem, however, is due to a coordination error related to waves," >> Nahhas told OTV, adding that an investigation was underway to find out >> whether this act is "intentional or not." > > > also at > http://www.naharnet.com/domino/tn/NewsDesk.nsf/Lebanon/EFCEF203B3C315A5C225782E0020C75F Well-known problem with radars and wifi (used to live next to a (military) radar research site): http://en.wikipedia.org/wiki/Radar#Frequency_bands -- Check who uses S and C http://en.wikipedia.org/wiki/S_band Another reason to not rely on radio for your LAN/WAN in times of Aegis cruisers passing by... ;) Regards, Martin ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From t.helaineoa at gatesalbert.com Sun Feb 6 02:26:31 2011 From: t.helaineoa at gatesalbert.com (Tiffany Helaine) Date: Sun, 06 Feb 2011 03:26:31 -0700 Subject: Do you want a big thick penis? Well if you do then you may be searching for natural penis male enlargement pill that has no side effect for you Message-ID: <201102060323.FC4FA67FE8FEA5CBF91ED@m329q6x> Are you fed up with size of your manhood? Do you feel inadequate around women and indeed other guys? In every man's mind there is a want to enlarge his penis. Many search out ways to do this and sometimes it works and sometimes not. Men equate a larger penis as being more attractive and impressive to the opposite sex. But they don�t always know if increasing their size will decrease or increase the pleasure they derive from sexual intercourse. Do you want a big thick penis? Well if you do then you may be searching for natural penis male enlargement pill that has no side effect for you, here you go CLICK HERE - http://bigsizeed.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 766 bytes Desc: not available URL: From infon at warm.ru Sun Feb 6 03:10:25 2011 From: infon at warm.ru (=?koi8-r?B?78bP0s3Mxc7JxSDTxMXMz8s=?=) Date: Sun, 6 Feb 2011 16:40:25 +0530 Subject: =?koi8-r?B?68HLINDSwdfJzNjOzyDTz9rEwdTYINDSxcDEycPJwCDe1M8gwtkgzsUg?= =?koi8-r?B?wtnMzyDQz9PMxcTT1NfJyg==?= Message-ID: <8474270790AC476DBD7C103209A4A4FD@server> пятнадцатого февраля 201Iг. Способы оформления сделок (создание преюдиции) с защитой от дальнейших претензий и возможных последствий +7 (код Москвы) ЧЧ/5*ЧО-.95 ; ЧЧ54095 Цель обучения: Курс посвящен вопросам совершения и последующей защиты сделок по реализации имущества от претензий со стороны третьих лиц, под которыми в основном понимается налоговый орган. Будут рассмотрены различные способы реализации, которые позволяют защититься от обвинений в занижении цены, в работе с недобросовестными поставщиками, продаже товара взаимозависимому лицу и так далее. Программа: 1. Совершение сделки в обход требований ст. 40 НК РФ. Обоснование способа, защита результатов. 2. Создание преюдиции как способ защиты совершенной сделки. 3. Заключение сделки в суде. Мировое соглашение. Обжалование результатов. 4. Сделки с недобросовестными поставщиками. Рассмотрение подхода государства к работе с недобросовестными поставщиками (анализ законодательных инициатив, требований Минфина, судебной практики). Проявление осмотрительности и прочее. Способ заключение сделки, позволяющей обойти претензии по работе с недобросовестным поставщиком. 5. Совершение сделки с обходом требований о взаимозависимости, аффилированности. 6. Использование простого товарищества для отчуждения имущества. 7. Рассмотрение способов снижения налогового бремени — использование дополнительной выгоды, штрафные санкции, перенос момента возникновения права собственности и другие. 8. Отчуждение имущества посредством реорганизации компании. Анализ деловой цели. 9. Банкротство. Оспаривание сделок в рамках процедуры банкротства. 10. Внесение в уставный капитал. Безвозмездная передача. 11. Отчуждение имущества с использованием поручительства, залога имущества. 12. Способы реализации имущества нерезиденту. Стоимость участия в семинаре 7 900 руб. За более подробной информацuей обpащайтеcь по тел: +7 Московский код: 445.З9-68 <> 445_З266 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2969 bytes Desc: not available URL: From sansary at nileuniversity.edu.eg Sun Feb 6 09:18:47 2011 From: sansary at nileuniversity.edu.eg (Sameh El-Ansary) Date: Sun, 6 Feb 2011 19:18:47 +0200 Subject: [p2p-hackers] Some Clarifications regarding Egypt Message-ID: Dear P2P-Hackers, I am an Egyptian P2P researcher and an old member of your list. I was really glad to find those two threads about Egypt in the P2P hackers list. Technology (basically Facebook and Twitter) was a foundational part of this revolution. History is being written as we speak, and any simple idea, especially technology-related can make a huge difference. Your brainstorming on this list is extremely valuable!! i have skimmed though the threads, and excuse me if some of the thoughts are redundant or not enough organized. (Have to rush back to the demonstrations!!) I- DIFFERENT PHASES --------------------------------- Let me clarify that at different stages, we had different challenges. Phase 1: Only Twitter was blocked. Solution: People started using public proxies. Even VPNs, were a bit too much of an advanced idea for some people. They started disseminating the info through Facebook. Phase 2: No Internet At this stage, I can not confirm whether routing inside Egypt was still working on or not. All ISPs and Mobile operators were ordered to shut it down. and I am interested to know (as some of you are), how did they do it. But ordering physical powering off of all switches is not unimaginable here. Let me also draw your attention to the fact that symmetric satellite connections are basically illegal to start with, unless you are an embassy or some hotshot petroleum company or something. Phase 3: No SMS Just one more censorship level Phase 4: No Internet & no mobile services. At this point there was nothing working but land-lines. Again, I can not confirm whether routing was working or not. However, if you are using a 3G connection, there was no even GSM signal to start with !! III- DIFFERENT GOALS -------------------------------- Let me aslo clarify that at each time different challenges were in place. a- Organizing protests: that was the initial thing but quickly more challenges came b- Sending out the message: the other challenge was to send to the whole world the real picture of what is going on, especially that the Egyptian media was portraying a totally different picture of what is actually going on. That was extremely important on Friday the 28th, when the police was firing real bullets (claiming that to be rubber ones.) and more importantly when they hired thugs and secret police to attack unarmed pro-democracy protesters on the 2nd of Feb. They collected video testimonies of captured thugs and captured disguised police officers including their ids and their confessions of them being paid to attack. c- On-site communication: during the demonstrations, communicating with the masses (and by masses I mean more than one million people) is a challenge. Protesters had a tough time gathering enough loudspeakers and with the amount of people and large physical space, they could barely communicate with a small portion of the rest of the crowd. May be some simple ad-hoc networking blue-tooth based or something could have helped here. II- THINGS THAT ALMOST WORKED ------------------------------------- a- Voice to Tweet http://www.guardian.co.uk/technology/2011/feb/01/google-twitter-egypt This thing really worked, before the government screwed it as well. b- International Dial-up: In phase 4, luckily this was still possible and some people started doing it individually but there is not up to now enough known phone numbers around. Finally, Internet is back now, but I would not be surprised if it went off again. I hope this gives a closer picture to what has been going on in Egypt. I hope I can still communicate and brainstorm with you on the subject, however, I am rarely online now. Finally, we have no shortage of techies here. We can set up any complex system. Everybody, is volunteering to do something and self-organizing communities are being formed in a speed beyond belief. Needless to say, the things have to be simple enough to be used by non-techie masses. Cheers, -------------- Sameh El-Ansary, PhD Assistant Professor, Nile University, Egypt Co-founder, Peerialism Inc. Stockholm, Sweden _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From coderman at gmail.com Sun Feb 6 20:59:34 2011 From: coderman at gmail.com (coderman) Date: Sun, 6 Feb 2011 20:59:34 -0800 Subject: [FoRK] Chons In-Reply-To: References: <20110205084755.GJ23560@leitl.org> Message-ID: On Sun, Feb 6, 2011 at 3:44 PM, John Case wrote: > ... > Why, in (egyption) situations like this, would you want location data > embedded in your addressing scheme ? this is one of many potential addressing and routing optimizations for ad-hoc networks. for example, a dead-drop or multi-homed rendezvous point may not care about disclosing coarse geo coords, but clients sending to same may want much more stringent pseudonymous / anonymous protections. without context, this does seem counter intuitive for guerrilla comms. (locality constrained broadcast horizons are useful as well; anonymous wireless communication is indeed difficult; lots of problems and parts to play with :) From infoo at natalya.ru Sun Feb 6 18:15:06 2011 From: infoo at natalya.ru (=?koi8-r?B?7s/Xz8Ug1yDawdDMwdTF?=) Date: Sun, 6 Feb 2011 21:15:06 -0500 Subject: =?koi8-r?B?7s/Xz8UuIPrB0sHCz9TOwdEg0MzB1MEg1yAyMDExIMfPxNU=?= Message-ID: <1934E9D3EDB7463580092C13DFE52B5D@equipo> 01 Марта ЗАРАБОТНАЯ ПЛАТА В 2011 ГОДУ: ПРАВОВОЙ, БУХГАЛТЕРСКИЙ И НАЛОГОВЫЙ АСПЕКТЫ. НАЛОГИ И ВЗНОСЫ В ПОЛЬЗУ ФИЗИЧЕСКИХ ЛИЦ Воробьева Елена Вячеславовна - налоговый консультант, автор публикаций по вопросам бухгалтерского учета, автор книги "Заработная плата", к.э.н. Информацию можно получить по телефонам: (495) 79221-22 или 4Ч5/3968 Программа: 1. Выплаты в пользу физических лиц: заработная плата, гарантии, компенсации. Налоговый учет выплат в пользу физических лиц. 2. Основные принципы организации и построения систем оплаты труда. Составные части заработной платы: базовая, компенсационная, стимулирующая. * Стимулирующие доплаты и надбавки; премирование и поощрение. Основные принципы построения системы премирования. * Отличия заработной платы от других выплат. 3. Гарантии и компенсации: определение, различия, порядок налогообложения. * Гарантии и компенсации работникам, направленным в служебные командировки. * Гарантии и компенсации в связи с разъездным характером работы. * Прочие гарантии и компенсации. 4. Пособия по временной нетрудоспособности, пособия гражданам, имеющим детей – порядок начисления и выплаты в 2011 году. 5. Начисление выплат в пользу физических лиц, страховых взносов во внебюджетные фонды: * определение объекта налогообложения; * выплаты, не признаваемые объектом обложения; * выплаты, освобожденные от обложения страховыми взносами. 6. НДФЛ: комментарии к основным изменениям, вступившим в силу в 2011 году. Cтоимоcть: 7500 руб. По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (код Москвы) Ч45/3/9.6*8 ; 4Ч5/З2_66 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3240 bytes Desc: not available URL: From case at sdf.lonestar.org Sun Feb 6 15:44:39 2011 From: case at sdf.lonestar.org (John Case) Date: Sun, 6 Feb 2011 23:44:39 +0000 (UTC) Subject: [FoRK] Chons In-Reply-To: References: <20110205084755.GJ23560@leitl.org> Message-ID: On Sat, 5 Feb 2011, coderman wrote: >>>> Re Mesh - I have been mucking with it for many years and reading about >>>> it even longer. Seems solutions for getting what appears a group that >>> Fun fact: a local /64 is fully enough to encode lat/long/alt >>> (24, 24, 16 bit) with about 2 m resolution.... > > ORCHID address space is perfect for this type of thing, and there are > particular extensions well suited to this. [0][1] Why, in (egyption) situations like this, would you want location data embedded in your addressing scheme ? It seems like one would do hard work to ensure such encapsulation was NOT happening... Or is this just a scheme for fair and reasonable address allocation in an anarchy to avoid collisions ? From b.e.ivorywl at jmfarms.com Mon Feb 7 02:23:43 2011 From: b.e.ivorywl at jmfarms.com (Bea Ivory) Date: Mon, 07 Feb 2011 03:23:43 -0700 Subject: Brand HYDROCODONE Watson 540 10/500mg and Full Range of FDA Approved Meds for Low Cost. Message-ID: <201102070325.6C1DFFE8DB6D4E2B55E5F489@nxs230gwg9> HYDROCODONE 10/500mg: 30/$230, 60/$419, 90/$593, 120/$754 Brand HYDROCODONE Watson 540 10/500mg and Full Range of FDA Approved Meds for Low Cost. No Rx Required. Express Delivery, VISA ONLY. ----- Buy Now! ----- http://jorxtrust.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 576 bytes Desc: not available URL: From infoh at michail.ru Sun Feb 6 21:37:47 2011 From: infoh at michail.ru (=?koi8-r?B?5MnSxcvUz9LVIM8gwsHOy9LP1NPU18U=?=) Date: Mon, 7 Feb 2011 11:07:47 +0530 Subject: =?koi8-r?B?4uHu6/Lv9PP09+8uIOvByyDVytTJIM/UIM/U18XU09TXxc7Oz9PUySDQ?= =?koi8-r?B?zyDEz8zHwc0gy8/N0MHOyck=?= Message-ID: <580C877E26CC458087EC73925DEE3E1D@Vikas> ТЕМА: Ответственность собственника и руководителя по долгам компании: новое законодательство о банкротстве. Как уйти от ответственности, эффективно взыскать задолженность. Дата: 10 февраля код: (четыре девять пять) 7-9.2*2_i_2_2 **** ЧЧ.5.40_*95 Обучение посвящено анализу нововведений и разъяснению таких вопросов как: 1. Как собственнику и директору защититься от возможных претензий по долгам компании. 2. Как построить структуру управления и собственности, чтобы претензий можно было избежать. Что даст оффшор и т.п. 3. Каким образом заключать сделки, чтобы их затруднительно было оспорить. Как объяснить почему сделки заключались на невыгодных условиях. 4. На каком основании налоговый орган сможет предъявить претензии, что для этого необходимо. 5. Как кредиторам воспользоваться изменениями в законе чтобы в полной мере взыскать свои долги. Программа: 1. Основания признания должника несостоятельным (банкротом). Основания для обязательного добровольного обращения в суд. Презумпция вины и неплатежеспособности, введенные Федеральным законом от 28 апреля 2009 г. N 73-ФЗ. 2. Ответственность директора. Гражданско-правовая ответственность (субсидиарная ответственность по долгам организации и т.п.), уголовная ответственность, административная ответственность. Ответственность директора при отсутствии документов. Обоснование распространения обязанности ведения бухучета на все компании, вне зависимости от указаний в законе о бухучете. Ответственность директора компании применяющей УСН. Обоснование ухода от ответственности в данном случае. Ответственность контролирующих должника лиц (собственников организаций владеющих более 50 % долей/акций, иных лиц которые могли давать обязательные для должника указания). 3. Способы ухода директора от ответственности. Как обосновать отсутствие вины директора при заключении договоров. Типичные легенды, позволяющие объяснить заключение договоров на невыгодных для должника условиях. Способы заключение договоров, исключающие претензии кредиторов/суда. Как проявить разумную осмотрительность при выборе контрагента как условие отсутствия вины директора. Установление предмета требований по делам связанным с получением необоснованной налоговой выгоды, установление размера требований. Как уйти от обвинений в умысле при заключении сделки с компанией заведомо не исполняющей налоговые обязательства. 4. Способы ухода контролирующего должника лица от ответственности: * владение компанией через нерезидента, в том числе оффшор. * владение компанией через доверенных лиц (порядок оформления отношений, риски); * формирование полномочий директора и исключение ответственности собственников посредством изменения уставных документов и др. 5. Сокрытие структуры собственности с помощью оффшора/нерезидента. Трасты (на примере Кипра): понятие, механизмы контроля за действиями трастового управляющего; процедура принудительного раскрытия информации о бенефициаре, проблемы вывода имущества и оспаривания сделок и др. 6. Порядок взыскания долгов кредиторов с директора/контролирующих лиц организации должника. Специальные условия оспаривания сделок по основаниям, предусмотренные ФЗ "О несостоятельности (банкротстве). Круг сделок, которые могут оспариваться и др. 7. Анализ положений главы III.1 об оспаривании сделок должника. Анализ Проекта Постановления Пленума ВАС "О некоторых вопросах связанных с применением главы III.1 ...". Рассмотрение проекта ФЗ подготовленного правительством о внесении изменений в ФЗ о банкротстве. Рассмотрение способов совершение сделок, закрывающих возможность обжалования их в рамках закона о банкротстве (именно самих сделок, а не их исполнение): получение судебного акта, утверждение мирового соглашения, торги, реализация заложенного имущества и др. 8. Квалификация и установление размера требований по обязательным платежам. Ответственность за правонарушения. Когда, по каким требованиям и на основании каких документов налоговый орган имеет право предъявить требования о банкротстве и др. Стоимость участия в семинаре 7 900 руб. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 (код Москвы) 445*З9*68 и 7.9_2_2_i.2_2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7140 bytes Desc: not available URL: From eugen at leitl.org Mon Feb 7 03:27:16 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 7 Feb 2011 12:27:16 +0100 Subject: Weekend Gedankenexperiment - The Kill Switch Message-ID: <20110207112716.GY23560@leitl.org> ----- Forwarded message from Charles N Wyble ----- From eugen at leitl.org Mon Feb 7 03:49:08 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 7 Feb 2011 12:49:08 +0100 Subject: [p2p-hackers] What we should build for the Egyptian (and other) protesters Message-ID: <20110207114908.GF23560@leitl.org> ----- Forwarded message from Jeff Rose ----- From eugen at leitl.org Mon Feb 7 03:57:27 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 7 Feb 2011 12:57:27 +0100 Subject: [P2P-F] Would you like to write about how to set up a mesh network Message-ID: <20110207115726.GG23560@leitl.org> ----- Forwarded message from Patrick Anderson ----- From coderman at gmail.com Mon Feb 7 14:26:12 2011 From: coderman at gmail.com (coderman) Date: Mon, 7 Feb 2011 14:26:12 -0800 Subject: US Warships jamming Lebanon Internet In-Reply-To: <20110207141444.GP23560@leitl.org> References: <20110207141444.GP23560@leitl.org> Message-ID: On Mon, Feb 7, 2011 at 6:14 AM, Eugen Leitl wrote: > ... > Another reason to not rely on radio for your LAN/WAN in times of Aegis > cruisers passing by... ;) unless it's ultra-wide band with orthogonal / turbo coding. USA Navy is annoyed they can't jam those effectively ... yet. From eugen at leitl.org Mon Feb 7 06:14:45 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 7 Feb 2011 15:14:45 +0100 Subject: US Warships jamming Lebanon Internet Message-ID: <20110207141444.GP23560@leitl.org> ----- Forwarded message from Martin Millnert ----- From measl at mfn.org Mon Feb 7 16:05:06 2011 From: measl at mfn.org (J.A. Terranson) Date: Mon, 7 Feb 2011 18:05:06 -0600 (CST) Subject: [RAISETHEFIST] Rights groups vow to hunt Bush over torture (fwd) Message-ID: ---------- Forwarded message ---------- Date: Mon, 7 Feb 2011 15:48:00 -0800 From: "Banuelos, Max" Reply-To: raisethefist at lists.riseup.net To: raisethefist at lists.riseup.net Subject: [RAISETHEFIST] Rights groups vow to hunt Bush over torture GENEVA (AFP) - Human rights groups vowed Monday to pursue George W. Bush wherever he travels, claiming that the former US president had cancelled a trip to Switzerland over fears that he could be probed for torture. Bush was due to attend a fund-raising gala evening in Geneva this week, but organisers said Saturday that he had cancelled because of the risk of disturbances. "The reach of the Convention Against Torture is wide -- this case is prepared and will be waiting for him wherever he travels next," said Katherine Gallagher, an attorney and vice-president of the Paris-based International Federation for Human Rights (FIDH) Human rights groups pointed out that two "torture victims" were to have filed a criminal complaint in Geneva against Bush, who was due to speak at the gala here on February 12. "Swiss law requires the presence of the torturer on Swiss soil before a preliminary investigation can be opened," said the FIDH, the European Centre for Constitutional and Human Rights and the Centre for Constitutional Rights. "When Bush cancelled his trip to avoid prosecution, the human rights groups who prepared the complaints made (them) public and announced that the Bush torture indictment would be waiting wherever he travels next," they added in a statement. In his memoirs published last year, Bush claimed that use of the water boarding technique -- which simulates drowning -- had directly prevented terror attacks in Britain and the United States. He also said in an interview with the British newspaper The Times it was "damn right" that he had authorised use of the controversial method on Al-Qaeda's 9/11 mastermind Khalid Sheikh Mohammed. "Waterboarding is torture, and Bush has admitted, without any sign of remorse, that he approved its use," said Gallagher. "Torturers -- even if they are former presidents of the United States -- must be held to account and prosecuted. Impunity for Bush must end." Gavin Sullivan, a lawyer at the European Centre for Constitutional and Human Rights, added that Bush "bears ultimate responsibility for authorizing the torture of thousands of individuals at places like Guantanamo and secret CIA 'black sites'. "As all states are obliged to prosecute such torturers, Bush has good reason to be very worried," he said. Human Rights Watch said in New York that the US authorities themselves should be pursuing Bush. "The US government should take the lead to investigate former US President George W. Bush and other senior officials for authorizing torture of terrorism suspects rather than leaving prosecutions to other countries," the organization said. "The US government needs to demonstrate that no official, including an ex-president, is above the law," said Kenneth Roth, executive director of Human Rights Watch. http://news.yahoo.com/s/afp/20110207/pl_afp/switzerlandusattacksrightsbu sh ----------------------------------------------------------- ))) Mitakuye Oyasin - Panche Be - En Lakech - Itzea ((( ------------- SILENCE IS DEFEAT! http://www.RaisetheFist.com From kevl at turniket.ru Mon Feb 7 11:33:12 2011 From: kevl at turniket.ru (=?koi8-r?B?8M/Ex8/Uz9fLwSDLwcTSz9c=?=) Date: Mon, 7 Feb 2011 20:33:12 +0100 Subject: =?koi8-r?B?8NLPxcvUINrBy8/OwSDPIOvBxNLP18/NIMTFzM/Q0s/J2tfPxNPU18U=?= Message-ID: <43D316438149464C890CB1C5A4748BD0@SelaNC> Десятого февраля 201Iг. Тема: Кадровый документооборот. Трудовые отношения: регулирование, документирование, налогообложение код: (четыре девять пять) Ч4*5_Ч0._95 <> ЧЧ5*4О95 Андреева Валентина - консультант-преподаватель, один из лучших специалистов России в области кадрового делопроизводства. Профессор кафедры Трудового права Академии Правосудия при Верховном Суде РФ (Москва), кандидат наук, документовед. Программа мероприятия: 1.Правовые основы документирования деятельности кадровых служб 1.1.Требования к кадровому делопроизводству, предусмотренные ТК РФ, в связи с обязательно-стью документирования работы с персоналом. 1.2.Государственный надзор и контроль за соблюдением законодательства в области докумен-тирования работы с кадрами. Штрафные санкции за нарушение порядка работы с кадровой документацией. 2.Система кадровой документации 2.1.Состав документов кадровой службы. 2.2.Нормативно-методические основы оформления кадровых документов. Унифицированные системы документации, применяемые в процессе документирования работы с персоналом. 2.3.Делегирование полномочий при издании документов. 2.4.Порядок придания документам юридической силы. Типичные ошибки в оформлении докумен-тов, судебная практика. 3.Документирование процедур подбора и отбора персонала 3.1.Проверка документов, предъявляемых при приеме на работу. Определение подлинности до-кументов. 3.2.Письменный отказ в приеме на работу: обязательность составления, правильность оформ-ления, обжалование в суде. 4.Документирование процедур, предшествующих заключению трудового договора. 4.1.Ознакомление с локальными нормативными актами работодателя. 4.2.Документирование процедуры фактического допущения к работе. 5.Документирование трудовых отношений. Виды документов и правила их оформления. 5.1.Оформление приема на работу, обязательные и рекомендательные документы. 5.2.Документы, создаваемые при изменении трудового договора. 5.3.Документирование прекращения трудового договора. Документы-основания для увольнения работников. 6.Ответы на вопросы слушателей и практические рекомендации. Стоимость участия 6 990 руб. Вся информация по тел: +7 Московский код: 445.З2*66 **** Ч45_ЧО.95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4127 bytes Desc: not available URL: From camera_lumina at hotmail.com Mon Feb 7 17:41:17 2011 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 7 Feb 2011 20:41:17 -0500 Subject: US Warships jamming Lebanon Internet In-Reply-To: References: <20110207141444.GP23560@leitl.org>, Message-ID: Ultra wide band probably jams their stuff too. Hey...Wired story today about the US government forcing internet down the throats of a hostage populace. But I'd sure love to see a less, well, edit-able and decentralized native emergency internet. WiMax seems a nice candidate, but you have to hit the wireline somewhere. -TD > Date: Mon, 7 Feb 2011 14:26:12 -0800 > Subject: Re: US Warships jamming Lebanon Internet > From: coderman at gmail.com > To: eugen at leitl.org > CC: cypherpunks at al-qaeda.net > > On Mon, Feb 7, 2011 at 6:14 AM, Eugen Leitl wrote: > > ... > > Another reason to not rely on radio for your LAN/WAN in times of Aegis > > cruisers passing by... ;) > > unless it's ultra-wide band with orthogonal / turbo coding. USA Navy > is annoyed they can't jam those effectively ... yet. From eugen at leitl.org Mon Feb 7 13:18:36 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 7 Feb 2011 22:18:36 +0100 Subject: [p2p-hackers] Some Clarifications regarding Egypt Message-ID: <20110207211836.GY23560@leitl.org> ----- Forwarded message from Sameh El-Ansary ----- From eugen at leitl.org Mon Feb 7 13:37:21 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 7 Feb 2011 22:37:21 +0100 Subject: [FoRK] Chons In-Reply-To: References: <20110205084755.GJ23560@leitl.org> Message-ID: <20110207213721.GA23560@leitl.org> On Sun, Feb 06, 2011 at 11:44:39PM +0000, John Case wrote: > > On Sat, 5 Feb 2011, coderman wrote: > >>>>> Re Mesh - I have been mucking with it for many years and reading about >>>>> it even longer. Seems solutions for getting what appears a group that >>>> Fun fact: a local /64 is fully enough to encode lat/long/alt >>>> (24, 24, 16 bit) with about 2 m resolution.... >> >> ORCHID address space is perfect for this type of thing, and there are >> particular extensions well suited to this. [0][1] > > > Why, in (egyption) situations like this, would you want location data > embedded in your addressing scheme ? Location is only available in point-to-point connections, of course you're free to run remixing layers on top of that infrastructure. > It seems like one would do hard work to ensure such encapsulation was NOT > happening... If you want to do cut-through at relativistic speed there are not many options left. If you want to obscure origins, use anonymization implemented in higher layers. > Or is this just a scheme for fair and reasonable address allocation in an > anarchy to avoid collisions ? That's one of the side effects: it cuts out the middlemen like IANA, RIRs and LIRs. Anyone can compute one's geographical positions either from global or local references, and you're free to refuse peering from position fakers. Faking disturbances takes ownership of the local loop, and is easily checked by referencing global beakons. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From Valdis.Kletnieks at vt.edu Mon Feb 7 20:11:40 2011 From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks at vt.edu) Date: Mon, 07 Feb 2011 23:11:40 -0500 Subject: Weekend Gedankenexperiment - The Kill Switch Message-ID: On Mon, 07 Feb 2011 17:49:36 EST, Josh Smith said: > even if it was I suspect any service available via satellite might > suffer from similar problems if the methods used to disrupt > connectivity in Egypt were employed here. The real question isn't "If they shut you down, can you restart?". The real question is "If they shut you down, can you restart in a way that avoids them attempting a second shutdown with a bullet?" ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From irbis at kino.nsk.ru Mon Feb 7 14:24:54 2011 From: irbis at kino.nsk.ru (=?koi8-r?B?8sXLz83FzsTBw8nJIMTM0SDV3sHT1M7Jy8/XIPf85C4=?=) Date: Mon, 7 Feb 2011 23:24:54 +0100 Subject: =?koi8-r?B?58zPwsHM2M7PIMnazcXOxc4g9MHNz9bFzs7ZyiDLz8TFy9MuICjX08Ug?= =?koi8-r?B?ydrNxc7FzsnRKQ==?= Message-ID: l4-l5 Февраля > Внимание изменения! Нововведения в таможенном законодательстве: новые формы таможенных деклараций и новый порядок декларирования, контроля и корректировки таможенной стоимости товаров с 01 января 2011 года < (код Москвы)*74-29i*98 или 7/9.2.2*I/2*2 Образование Таможенного союза и единой таможенной территории привело к значительным изменениям в таможенном законодательстве. С 1 июля 2010 года вступил в силу Таможенный кодекс Таможенного союза. С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: * новые формы бланков декларации на товары (решение Комиссии таможенного союза №257 от 20 мая 2010 года) и транзитной декларации (решение Комиссии таможенного союза № 289 от 18 июня 2010 года) * инструкция о порядке заполнения декларации на товары (утвержденная в окончательной редакции решением Комиссии таможенного союза №379 от 20 сентября 2010 года) * инструкция о порядке заполнения транзитной декларации (решение Комиссии таможенного союза №289 от 18 июня 2010 года) * новые классификаторы, используемые для заполнения таможенных деклараций (решение Комиссии таможенного союза №378 от 20 сентября 2010 года) * новый порядок декларирования таможенной стоимости и новые формы бланков декларации таможенной стоимости (ДТС и ДТС-1) и корректировки таможенной стоимости и таможенных платежей (КТС) (решение Комиссии таможенного союза № 376 от 20.09.2010 года) Цель: * ознакомить участников ВЭД с особенностями заполнения новых форм деклараций, изменениями в классификаторах, используемых для заполнения таможенных деклараций. * подготовить участников ВЭД к практической работе в условиях действия новых нормативно-правовых документов таможенного союза, регламентирующих вопросы определения, декларирования, контроля и корректировки таможенной стоимости товаров * обсудить проблемы правоприменительной практики по вопросам таможенной стоимости, в том числе дать ответы на вопросы участников ВЭД по актуальным проблемам определения и контроля таможенной стоимости товаров Программа: 1. Новая форма таможенной декларации: особенности заполнения * Изменения в порядке заполнения декларации на товары (ДТ) при декларировании товаров, ввозимых (ввезенных) на таможенную территорию Таможенного союза * Особенности заполнения новой формы декларации на товары, вывозимые с таможенной территории Таможенного союза * Порядок внесения изменений и (или) дополнений в сведения, заявленные в декларации на товары, до и после выпуска товаров * Особенности заполнения графы 47 "Исчисление платежей" 2. Классификаторы и перечни нормативно-справочной информации, используемые для заПолнения таможенных деклараций. Основные изменения. 3. Транзитная декларация: новая форма и правила ее заполнения. 4. Особенности электронного и интернет декларирования. 5. Законодательство Таможенного союза по вопросам таможенной стоимости товаров * Таможенный кодекс Таможенного союза * Соглашение по определению таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза; * Решения Комиссии таможенного союза по вопросам таможенной стоимости товаров: * порядок декларирования таможенной стоимости товаров * порядок контроля таможенной стоимости товаров * порядок корректировки таможенной стоимости товаров * новые формы бланков декларации (ДТС и ДТС-1) и корректировки таможенной стоимости (КТС). 6. Практические проблемы заявления, контроля и корректировки таможенной стоимости товаров * решения, принимаемые таможенными органами в ходе таможенного контроля * дополнительная проверка заявленной таможенной стоимости товаров * корректировка таможенной стоимости товаров * порядок обжалования в арбитражных судах решений таможенных органов по вопросам корректировки таможенной стоимости За более подробной информацuей обpащайтеcь по тел: (Ч95)*7Ч/29i/98 **** 7-9/2*2*l/2/2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7395 bytes Desc: not available URL: From jya at pipeline.com Tue Feb 8 04:14:03 2011 From: jya at pipeline.com (John Young) Date: Tue, 08 Feb 2011 07:14:03 -0500 Subject: Weekend Gedankenexperiment - The Kill Switch In-Reply-To: <20110208093406.GK23560@leitl.org> Message-ID: At 10:34 AM 2/8/2011 +0100, you wrote: >----- Forwarded message from Valdis.Kletnieks at vt.edu ----- >The real question isn't "If they shut you down, can you restart?". > >The real question is "If they shut you down, can you restart in a way that >avoids them attempting a second shutdown with a bullet?" Better than a bullet is to restart in a deal with the authorities to watch and log the traffic, in the Tor model, in the ATT model, in the Oracle model, in the Microsoft model, the models of Google, Mozilla, Intel, NGOs, Wikileaks, news media, hackers, freedom fighters, cryptographers, coders, anybody needing to make a living rather than serve a cause for thrills, fun and begging for a bed and rot gut victuals. Far better than inviting a bullet is to shop your comrades, become a covert agent of the counterrevolution, actually a celebrated hero of the revolution itself defying authority, showing amazing courage, downplaying losses and collateral damage and dispensing a dose of informant poison here and there to quell internal dissent and boost reliability with those running and funding the operation. If not a turncoat hero then a pre-positioned second in command to watch and log the all too trusting hero, manage the finances, keep keys to the secrets, arrange recordable pleasurable enticements to sway the hero in the pre-planned direction, that is, right into a carefully constructed trap where a hero's only choice will be to play along or get exposed as a insanely vainglorious, self-serving, money-grubbing, child rapist to be soon dead with a vile disease. This is described in the tell all books appearing left and right and center. From jya at pipeline.com Tue Feb 8 05:33:00 2011 From: jya at pipeline.com (John Young) Date: Tue, 08 Feb 2011 08:33:00 -0500 Subject: US Warships jamming Lebanon Internet In-Reply-To: References: <20110207141444.GP23560@leitl.org> Message-ID: >Hey...Wired story today about the US government forcing internet down the >throats of a hostage populace. I thought you meant ARPA foie gras-ing the US then the globalism. So here we are stuffed, helplessly RAMed into believing there is a way back to free range quacking without minutely controlled AFLACing. Ah, the dream of winning by coding, to hell with politics. So why is Cryptography mail stuck at October 2010? Perry in jail again? Speaking of jail, this time there have been no letters from Jim Bell. He may be under a clampdown. Or we are. All of us stuffed. Speaking of coding, what's the latest on open source crypto, has it been co-opted like the US masterspy claims, or disinfos? From kivictoreq at got.net Tue Feb 8 08:37:05 2011 From: kivictoreq at got.net (Kathrin Victor) Date: Tue, 08 Feb 2011 09:37:05 -0700 Subject: Now you can buy brand and generic pills online worldwide. 100% secure online sale of pills including generic Viagra, generic Cialis, ... Message-ID: <201102080939.494C63E64A107CC9FCBD64E@v3ixse1247> Buy Viagra & Cialis - cheap generic Viagra online pharmacy Now you can buy brand and generic pills online worldwide. 100% secure online sale of pills including generic Viagra, generic Cialis, ... http://rxdiscountmeds.ru From eliton at eliton.cz Mon Feb 7 23:43:08 2011 From: eliton at eliton.cz (=?koi8-r?B?/MvT0M/S1Dog18/azcXdxc7JxSDu5PM=?=) Date: Tue, 8 Feb 2011 09:43:08 +0200 Subject: =?koi8-r?B?6drNxc7FzsnRINDPINfP0NLP08HNINfP2s3F3cXOydEg7uTzINDSySDc?= =?koi8-r?B?y9PQz9LUztnIIMkgyc3Qz9LUztnIIM/QxdLBw8nRyA==?= Message-ID: <6AC14125A9AF4DB8BDDE64DBEA6CD386@on> Целевая аудитория: Руководители, бухгалтеры, менеджеры, юристы компаний, занимающихся внешнеэкономической деятельностью Московский код; Ч4539.68 : 7*9/2_2_l_2/2 Возмещение НДС при экспортных и импортных операциях Цель обучения: знакомить слушателей с последними изменениями нормативно-правовой базы таможенных и налоговых органов по вопросам возмещения НДС; дать слушателям комплекс знаний по вопросам возмещение НДС при экспортных и импортных операциях; изучить особенности подготовки основных документов для возмещения НДС; О9 февраля 2011г. 1. Особенности таможенного регулирования ВЭД. * Таможенные режимы – основные, экономические и завершающие. Особенность нало-гообложения товаров в различных таможенных режимах. * Таможенная стоимость – налоговая база для возмещения НДС. Методы расчета та-моженной стоимости. * Таможенные платежи – виды, порядок и сроки оплаты. Порядок расчета НДС. * Таможенное оформление экспортно-импортных операций. 2. Возмещение НДС при экспортных и импортных операциях. * Нормативно-правовая база по вопросам возмещения НДС. * Особенности подготовки основных документов для таможенного оформления това-ров и возмещения НДС. * Возмещение НДС при импорте товаров. * Возмещение НДС при экспорте товаров. * Особенности возмещения НДС при оказании услуг по вывозу товаров за пределы территории РФ. * Порядок подтверждения вывоза товаров с территории РФ. * Особенности возмещения НДС при торговле в рамках СНГ и Таможенного союза. * Судебная практика по вопросам возмещения НДС. Стоимость участия в семинаре 8000 руб. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 Московский код: Ч45.32-66 : 4Ч*53_96_8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3903 bytes Desc: not available URL: From flick at flickharrison.com Tue Feb 8 09:51:52 2011 From: flick at flickharrison.com (Flick Harrison) Date: Tue, 8 Feb 2011 09:51:52 -0800 Subject: A DIY Data Manifesto by Scott Gilbertson Message-ID: Server space is one thing, BBS networks are an interesting solution, sort of a HAM radio version of the internet. I think the backbone needs to be de-privatised as well. I was under the impression there are places in Europe where the internet backbone is public, leased out to anyone who wants some. Here, even the pipeline is under threat - the usage caps and overage charges (which mostly serve to limit competing businesses, rather than democratic expression which tends to be lower-bandwidth ;-) ) are hotly debated, with Joe Public mostly on the side of Cheaper and Faster but no dialogue around public pipelines whatsoever. There are two companies in most of Canada, Shaw and Telus in the west, Bell and Rogers in the East, who deliver all the internet service, they are forced to lease out to competitors but they are always pushing for the power to charge more to their competitors to squeeze their share. Even the pundits who want Net Neutrality still don't call for public communications infrastructure. The net is treated more like phones than roads, which is a mistake in my opinion. http://www.thestar.com/business/article/933854--geist-the-real-reason-we-pay-so-much-for-internet?bn=1 Our post office is about to abandon (sell) its courier operations, seen as too incompetitive with commercial enterprises, and when competitive, an unwanted intrusion on the free market. http://www.thestar.com/opinion/editorialopinion/article/931800--goar-a-smarter-post-office-might-thrive -Flick -- * WHERE'S MY ARTICLE, WORLD? http://wikipedia.org/wiki/Flick_Harrison * FLICK's WEBSITE & BLOG: http://www.flickharrison.com # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Feb 8 01:34:06 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 8 Feb 2011 10:34:06 +0100 Subject: Weekend Gedankenexperiment - The Kill Switch Message-ID: <20110208093406.GK23560@leitl.org> ----- Forwarded message from Valdis.Kletnieks at vt.edu ----- From nettime-l at kein.org Tue Feb 8 02:43:35 2011 From: nettime-l at kein.org (nettime-l at kein.org) Date: Tue, 8 Feb 2011 10:43:35 +0000 Subject: A DIY Data Manifesto by Scott Gilbertson Message-ID: the internet shutdown in egypt prompted similar questions about independent infrastructure and corporate control. see for example http://www.openmeshproject.org/ and the comment thread on https://blog.torproject.org/blog/recent-events-egypt. i know that some people were busy setting up BBS in egypt during the shutdown, which has some interesting echoes of rushkoff's recent piece on the Next Net ('dump internet, go fidonet') http://www.shareable.net/blog/the-next-net dan [@danmcquillan | www.internetartizans.co.uk] On 7 February 2011 21:26, Geert Lovink wrote: > > Good you raise this issue, Rory. <...> -- # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From rob at robmyers.org Tue Feb 8 02:44:05 2011 From: rob at robmyers.org (Rob Myers) Date: Tue, 08 Feb 2011 10:44:05 +0000 Subject: A DIY Data Manifesto by Scott Gilbertson Message-ID: On 07/02/11 21:26, Geert Lovink wrote: > The question indeed is: what does it mean when we call to run our own > servers? If they are located somewhere in the 'cloud' then what's the > difference anyway in comparison to Facebook or Google? > > The alternatives we suggest cannot be empty gestures if we propose to > use 'virtual' servers that are under the same corporate control anyway. Yes, Amazon volunteered to cut off Wikileaks, which demonstrates that the degree of freedom that EC2 instances give you are very limited - http://www.guardian.co.uk/technology/2010/dec/11/wikileaks-amazon-denial-democracy-lieberman Eben Moglen gave a very good talk about the issues of privacy and control that I think are at the heart of the question you raise, recommending that people run servers on computing machinery that they physically control - http://www.softwarefreedom.org/news/2010/feb/10/highlights-eben-moglens-freedom-cloud-talk/ It's possible to implement Moglen's ideas with current technology: here's a "wall wart" plug server in the corner of my living room running GNU social on Debian - http://foocorp.org/projects/fooplug/ And here's a project to create a distro specifically for such devices - http://wiki.debian.org/FreedomBox - Rob. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From coderman at gmail.com Tue Feb 8 12:35:49 2011 From: coderman at gmail.com (coderman) Date: Tue, 8 Feb 2011 12:35:49 -0800 Subject: US Warships jamming Lebanon Internet In-Reply-To: References: <20110207141444.GP23560@leitl.org> Message-ID: On Tue, Feb 8, 2011 at 5:33 AM, John Young wrote: >... > Speaking of coding, what's the latest on open source crypto, has it > been co-opted like the US masterspy claims, or disinfos? the latest is same as it ever was: cheaper, easier, more effective to end-run 'round the crypto bits and attack implementation, human factors. never a shortage of serious vulns there... (at least MITRE and NSA and FIWC and everyone else are finally admitting we all get hacked no matter the protections - just a matter of when, how much effort, how deep, and how persistent the penetration) on the ITAR side, haven't heard any ramblings about digital crypto munitions. who knows when/if they'll pick up that truncheon again... (i know they reserved the right to regulate, but has anyone made any noise about it?) From tbyfield at panix.com Tue Feb 8 09:44:58 2011 From: tbyfield at panix.com (t byfield) Date: Tue, 8 Feb 2011 12:44:58 -0500 Subject: Amazon and Wikileaks Message-ID: When Amazon booted Wikileaks, I decided to do tinker with this problem. Too many arguments about Wikileaks (and just about everything else) hinged too heavily on metaphors and analogies, which tend to obscure rather than articulate what's new about a situation -- kind of obvious, if you think about it. After all, Amazon began as a bookseller and remains an immense force in that field, which historically is deeply intertwingled with "free speech." So, regardless of your preferred metaphor for Wikileaks (journalism, publishing, treason, terrorism, etc), Amazon's action conflicted with that tradition. A typical conglomerate problem, right? A diversified 'portfolio' may be a smart strategy for making money, but it's a shit strategy when it comes to the particulars of any given activity -- boring stuff like craft, values, tradition. Naturally, Amazon runs a print-on-demand service, Createspace. So I knocked together a book called _Cablegate: The Complete Wikileaks Datadump_, Volume 1. Their "online tools" are what they are, and it went well enough -- and quickly enough that I received five proof copies notably ahead of schedule. I approved them and ordered ten copies, which also arrived ahead of schedule. The book consists of 200 pages of what might look like random noise to some people, or maybe like a 3D barcode to others. The cover text on the back (and therefore on Createspace's and Amazon's promo pages, where it received several reviews) said this: On Sunday 28th November 2010, Wikileaks began publishing 251,287 leaked United States embassy cables, the largest set of confidential documents ever to be released into the public domain. Volume 1 of Cablegate: The Complete Wikileaks Datadump offers an abstract, high-level view of these communications in 200 densely packed pages. Due to the immense volume of material, it was necessary to rely on extremely efficient encoding techniques, with a consequent loss of resolution; as a result, we cannot guarantee that all of the material is legible. Soon after I got the production copies, the URL for this book circulated on the "anonops" IRC channel. And very soon after that -- more than hours, less than days -- Createspace "reached out" (bleh) to say Our technical services department has recently confirmed that the interior content uploaded to your title contains blank black and white pages. They have set your title to incomplete so that you can upload a file with content. I went back and forth with them about this, of course. Their explanations are painfully boring, but do pay close attention: Version 2: Upon reviewing your account, it was confirmed that the content submitted for your title is entirely comprised of black and white static. This content has caused pauses in our production process as it's viewed as a printing error. As this is halting production we are unable to continue distributing this title at this time. Version 3: In the most recent print run of your title, production was stopped on your book after a routine quality check indicated that your interior files were printing incorrectly due to a production error. We had to remove the availability of your title as we are unable to continue fulfilling orders for your title since it will continue to halt production. Version 4: You are welcome to fade the static images on each page and indicate on each page that you are displaying encrypted text and that it is a gag book. You may also upload a file with text on most pages and the static image pages interspersed throughout. However, please note that we will not allow more than two consecutive pages of static images. Additionally, you may add a disclaimer page at the beginning of the book that this is a gag book. You may also consider adding information in the description that this is a gag book as to not foster customer confusion on Amazon.com. Version 5: There are two main concerns with the interior of Title ID 3522893. First and foremost, the interior file caused a production error; this occurred was a result of the black and white images, also defined as "static," on all the interior pages. Furthermore, as there is not text in the book file indicating the black and white images as intentional, it was seen as a mistake in production. As a result, all of production was stopped and in order to prevent the same occurrence, it was necessary to remove the availability of the title. Secondly, the current book description does not detail that the book is a gag or the reason for the illegible material on the interior. Therefore, customers could purchase the title without being made aware that it is a gag book. Overall, it must be understood from the interior files that the full interior of the black and white images is intentional. To do so, it is necessary to indicate in text that you are displaying encrypted text and to indicate in both the interior and book description that it is a gag book. (I'll leave the claims that it's "encrypted" *and* a "gag" for others to sort out...) Now, I'll be the first to admit that there's something very reasonable about all of this. Their production lines have QA people who see a snow crash and barf on it, which buggers things up, etc, etc. Except for one thing: I don't feel like being 'reasonable.' This is a book, they're a printer-publisher, and they've refused to print it based in large part on the argument -- after much tooth-pulling -- that it might offend someone. They can couch their argument in terms of production efficiencies and consumer confusion (standard weapons in commercial interests' war on culture), much as theocrats have suppressed books on grounds of heresy, and as bluenoses have suppressed books on grounds of obscenity, but the structural issue remains the same: one party wants to print a book, other parties might not want it printed, and the printer-publisher is the man in the middle. Though I doubt very much that if I'd printed a _History of Televised Static_, with details about where, when, and how each image was captured and a scholarly introduction afterword, they would have empowered their QA people to reject it. But no matter: Volumes 2, 3, 4, etc are forthcoming, and I'll factor in Createspace's issues into the encoding and design. This fight's been going on for centuries now, and leaks aren't going away. I'm in no rush. And, anyway, once I'd kicked the Amazon dinosaur its various extremities started waking up. Amazon very graciously invited me to publish a Kindle edition -- which of course would have the benefit that it doesn't need to be printed and therefore doesn't face quite the same production issues. So I used their online tools (same story) and was pleased to see this message: Converting book file to Kindle format... \ | / -- -- / | \ This may take a few moments. If you have completed all required fields above, click "Save and Continue" to move forward while conversion continues. I just logged in again to see their little wheel-of-industry widget still spinning. It's been "converting" since Christmas eve. URLs: bit.ly/bookoleaks > createspace.com "This title is currently on hold. This title is still being prepared for sale and should be ready soon." amzn.to/bookileaks > amazon.com "Out of Print--Limited Availability." Cheers, T # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Feb 8 08:05:24 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 8 Feb 2011 17:05:24 +0100 Subject: A DIY Data Manifesto by Scott Gilbertson Message-ID: <20110208160524.GT23560@leitl.org> ----- Forwarded message from nettime-l at kein.org ----- From eugen at leitl.org Tue Feb 8 08:11:07 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 8 Feb 2011 17:11:07 +0100 Subject: A DIY Data Manifesto by Scott Gilbertson Message-ID: <20110208161107.GU23560@leitl.org> ----- Forwarded message from Rob Myers ----- From eugen at leitl.org Tue Feb 8 10:07:53 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 8 Feb 2011 19:07:53 +0100 Subject: Amazon and Wikileaks Message-ID: <20110208180753.GA23560@leitl.org> ----- Forwarded message from t byfield ----- From eugen at leitl.org Tue Feb 8 12:53:35 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 8 Feb 2011 21:53:35 +0100 Subject: A DIY Data Manifesto by Scott Gilbertson Message-ID: <20110208205334.GB23560@leitl.org> ----- Forwarded message from Flick Harrison ----- From m.ameliaih at jhbaxter.com Tue Feb 8 21:54:08 2011 From: m.ameliaih at jhbaxter.com (Marvel Amelia) Date: Tue, 08 Feb 2011 22:54:08 -0700 Subject: if you are looking for some cheapest replica watches to really patch up with your girlfriends, you should immediately get connected with best online replica watches store Message-ID: <4d522c00.80bfb7fa@jhbaxter.com> Can you imagine about some cheap replica watches? Indeed they have become one of the best complimentary gifts for boyfriends and girlfriends nowadays. With the aid of imitation rolex watches, you can be surely able to again get closer with your girlfriend for long time. That is why replica watch is available in every new style nowadays for example,Cartier replica watch, Zenith fake watch, Omega fake watch, Day Date replica watch, Date Just fake watch, Ferrari replica watch, and so on. Therefore if you are looking for some cheapest replica watches to really patch up with your girlfriends, you should immediately get connected with best online replica watches store so as to accomplish your needs and desire on time. Replica watches are available in many styles. By visiting any replica watch website,you can select a watch that suits you style and budget. You can buy thesewatches for different occasions for your loved ones. Here you will learn about replica watches and perfect watches. http://replicastoreaccess.ru From c.rbaoki at mail.telcel.com Tue Feb 8 22:19:52 2011 From: c.rbaoki at mail.telcel.com (Carmella Bao) Date: Tue, 08 Feb 2011 23:19:52 -0700 Subject: RESULTS ARE NOW GUARANTEED: Enlarge your penis 1-4 inches. Message-ID: <201102082319.429F2AF309AFEEF52018@2657i6fs> Truth About Penis Enhancing Pills Now! Can You Increase Penis Size with topics about Increase Male Sex Stamina including Herbal Male Enhancement Pills If you�re one of the millions of men with a little penis then you�ve come to the proper place. I�m travelling to state you how to make your penis permanently longer and thicker. RESULTS ARE NOW GUARANTEED: Enlarge your penis 1-4 inches. You can blow up your penis size and girth easily. Get got down TODAY with no holding off. See results in as little as 7 weeks Guaranteed Click here now to learn how to blow up your penis http://growpenisbuy.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 959 bytes Desc: not available URL: From case at sdf.lonestar.org Tue Feb 8 19:33:56 2011 From: case at sdf.lonestar.org (John Case) Date: Wed, 9 Feb 2011 03:33:56 +0000 (UTC) Subject: A DIY Data Manifesto by Scott Gilbertson In-Reply-To: <20110208205334.GB23560@leitl.org> References: <20110208205334.GB23560@leitl.org> Message-ID: On Tue, 8 Feb 2011, Eugen Leitl wrote: > Server space is one thing, BBS networks are an interesting solution, sort > of a HAM radio version of the internet. > > I think the backbone needs to be de-privatised as well. Look, this is all fine and good - everyone with two brain cells to rub together immediately thought "mesh network" - not for Egypt, per se, but anytime in the last four years that this issue has come up. But you go digging into the guts of this and you'll find that you only have to get about three levels deep before the whole thing is a mess. Start reading the mailing list archives of MANET, BATMAN, OLSR, and so on, and you'll find that there are serious, serious math/network[1]/graphing/etc. issues that are nowhere near to being solved on any scale larger than your neighborhood. So, a standalone wireless BBS ? Golden. The knee jerk "I (somewhat) grok the OSI model and some related bits of trivia and I think ya'll should just set up a mesh" ... not so much. [1] http://en.wikipedia.org/wiki/Network_(mathematics) From eugen at leitl.org Tue Feb 8 23:55:51 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 9 Feb 2011 08:55:51 +0100 Subject: A DIY Data Manifesto by Scott Gilbertson In-Reply-To: References: <20110208205334.GB23560@leitl.org> Message-ID: <20110209075551.GH23560@leitl.org> On Wed, Feb 09, 2011 at 03:33:56AM +0000, John Case wrote: > Look, this is all fine and good - everyone with two brain cells to rub > together immediately thought "mesh network" - not for Egypt, per se, but > anytime in the last four years that this issue has come up. > > But you go digging into the guts of this and you'll find that you only > have to get about three levels deep before the whole thing is a mess. > > Start reading the mailing list archives of MANET, BATMAN, OLSR, and so > on, and you'll find that there are serious, serious > math/network[1]/graphing/etc. issues that are nowhere near to being > solved on any scale larger than your neighborhood. Ok, if you map hyperlattice to a sphere surrounding Earth (for other gravity wells, use a hierarchical subnet) derived mostly from WGS84 position fixes, and otherwise visibility/ToF mutual triangulation and store only local deviations from idealicity, and implement long-distance via VPN over Internet initially, and use geographic routing where are the scale limits? I mean, sure, there are a gazillion ways to do it wrong, and only a couple to do it right. But this doesn't mean the problem is unsolvable. > So, a standalone wireless BBS ? Golden. The knee jerk "I (somewhat) > grok the OSI model and some related bits of trivia and I think ya'll > should just set up a mesh" ... not so much. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Feb 9 09:29:33 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 9 Feb 2011 18:29:33 +0100 Subject: EDRi-gram newsletter - Number 9.3, 9 February 2011 Message-ID: <20110209172932.GZ23560@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From edrigram at edri.org Wed Feb 9 09:16:29 2011 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 9 Feb 2011 19:16:29 +0200 Subject: EDRi-gram newsletter - Number 9.3, 9 February 2011 Message-ID: ============================================================ EDRi-gram biweekly newsletter about digital civil rights in Europe Number 9.3, 8 February 2011 ============================================================ Contents ============================================================ 1. Data retention law provisions declared unlawful in Cyprus 2. Commission's proposal for PNR Directive fails to impress MEPs 3. German study finds the data retention ineffective 4. UK Supreme Court to hear DNA cases 5. Spanish sports streaming domain seized by US authorities without warning 6. France: Increased powers for Hadopi authority 7. ENDitorial: Internet blocking and damage to child protection 8. Recommended Action 9. Recommended Reading 10. Agenda 11. About ============================================================ 1. Data retention law provisions declared unlawful in Cyprus ============================================================ The Cyprus Supreme Court decided on 1 February 2011 that some of the provisions of Law 183 (I) / 2007 on disclosure of telecommunications data are unlawful, as they breach the Cyprus Constitution and its jurisprudence, as revealed by the daily Cyprus Mail. Law 183 (I) / 2007 (Retention of Telecommunication Data for Purposes of Investigation of Serious Criminal Offences Law of 2007) was adopted by Cyrpus on 31 December 2007 as the national implementation of the EU Data retention directive. In the case brought to the Supreme Court, four people claimed that Articles 4 and 5 of the national law, that provided police forces access to the retained data, were unlawful. The court considered that the articles in question go beyond the provisions of the EU Directive which does not address the issue of access to the retained data. Therefore, the court considered it may check the constitutionality of these articles, especially in relation with Art 15 of the Cyprus Constitution (right to privacy) and article 17 (confidentiality of communications). Based on the Cyprus Constitution, and jurisprudence from itself and from the EctHR, the Supreme Court issued a unanimous ruling regarding the legality of court orders issued for the disclosure of telecommunications data by the district courts of Nicosia, Limassol and Larnaca at the request of police investigating serious crimes. The orders concerned the four complainants that claimed a breach of privacy and confidentiality of their communications. The court considered that three of the four court orders for disclosing telephone numbers and calls were illegal and should be annulled. In the case of the fourth person the case was rejected, since the person was imprisoned and banned for using a mobile phone. It is unclear how this decision will affect the law and its application. According to a statement of police spokesman Michalis Katsounotos to Cyprus Mail, "the decision will be studied in depth by the assistant police chief and all under investigation or criminal proceedings will be identified for which a court order was secured for the disclosure of telecommunications data, so that in consultation with the Attorney-general, a decision can be taken on the further handling of them." Big blow to police powers (3.02.2011) http://www.cyprus-mail.com/crime/big-blow-police-powers/20110203 Case file at the Supreme Court of Cyprus http://www.supremecourt.gov.cy/Judicial/SC.nsf/All/5B67A764B86AA78EC225782F004F6D28?OpenDocument Ruling on the case of the Law 183 (I) / 2007 on disclosure of telecommunications data (1.02.2011) http://www.supremecourt.gov.cy/Judicial/SC.nsf/All/5B67A764B86AA78EC225782F004F6D28/$file/65-09.pdf Constitution of the Republic of Cyrpus http://en.wikisource.org/wiki/Constitution_of_the_Republic_of_Cyprus ============================================================ 2. Commission's proposal for PNR Directive fails to impress MEPs ============================================================ On 2 February 2011, the European Commission released its proposal for a directive on the use of Passenger Name Records. This would require airlines flying into and out of the EU to give travellers' personal information to national authorities in the Member State of departure or arrival. Such data includes, for example, home address, mobile phone number, frequent flier information, email address and credit card information. The document is a follow up to the proposal for PNR in 2007, for which the European Parliament, led by rapporteur Sophia in't Veld (ALDE, Netherlands), requested from the Commission, particularly in terms of better justifications regarding the measure's supposed necessity and proportionality. With a number of databases related to travellers already in existence, such as the Schengen Information System (SIS), the Visa Information System (VIS) and the Advanced Passenger Information system (API), many members of European Parliament were and are sceptical about the necessity of a Passenger Name Record regime. The scope of the purpose of PNR is widened. Whereas, in the 2007 document, the purposes were preventing and combating terrorist offences and organised crime, now it extends to "serious crimes" (defined as offences which call for a minimum prison sentence of 3 years). As these crimes are not specified, there is, by definition, no way of assessing the necessity and proportionality of all crimes that could be covered by this wording. The processing of the PNR data outlined in Article 4 stipulates that the Passenger Information Unit (PIU -the body responsible for the storage and management of PNR databases), can use the data for profiling purposes, an issue that has been highly criticised in Parliament. The data can also be compared with other "relevant" databases, while not making clear which databases will be accessed by Member States. PIUs will also be obliged to hand over PNR data at the request of the competent authorities in Member States. Finally, the document proposes using the data to update and create new profiling criteria. The document indicates that it will "mask" some pieces of data after 30 days of storage. The data is, however, not anonymised - instead, a certain amount of data is "masked" with no actual anonymisation. These pieces of information can be easily re-personalised and, in fact, access to the full PNR data is always available to the Head of the PIU, "where it could be reasonably believed that it is necessary to carry out an investigation and in response to a specific and actual threat or risk or a specific investigation or prosecution." Furthermore, considering the list of PNR data to be collected, there are a number of personally identifiable information that will not be "masked", such as billing information (including credit card numbers). The document also prohibits the collection, storage and processing of "sensitive data", defined in the proposal as "any personal data that could reveal racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership or data concerning health or sexual life of the individual concerned". In the same paragraph however, it states the PNR data "should contain details on the passenger's reservation and travel itinerary", which include special meal requests which can indicate religious orientation; special service requests that can indicate disabilities or specific medical conditions and billing and contact information. MEP Sophia in't Veld seems pleased with the document, saying, "we will closely scrutinise the proposals, but at first glance there is a substantial improvement compared to the previous proposals". However, she did indicate that better justification of the necessity of collecting PNR data remains, and that Parliament needs the facts and figures before they can make a well founded decision. Other members of the European Parliament are not so optimistic. EPP member Manfred Weber (Germany) is sceptical of the necessity of PNR, saying, "there are deficits in the usage of current data. So why should we collect even more mass data?" "The EU-US PNR agreement is already bad enough", stated German Greens member Jan Albrecht. "The last thing we need to do in Europe is to copy this model, which infringes on the civil liberties of EU citizens." Claude Moraes (S&D, UK) has concerns about the Commission's proposal to profile individuals and indiscriminately collect personal data, calling on Commissioner Malmstrvm to "urgently come before the European Parliament and to provide precise evidence that massively collecting air travellers' data is an effective and necessary way to prevent terrorists from flying to and from Europe." Commissioner Malmstrvm is likely to meet with the LIBE committee in the next few weeks to discuss the contentious elements of the proposal. The entire negotiation process in the Council and the Parliament is expected to take around two years. Proposal for a Directive on the use of Passenger Name Record data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime (2.02.2011) http://ec.europa.eu/home-affairs/news/intro/docs/com_2011_32_en.pdf ALDE press release: EP insists on proof of proportionality of data transfer (11.11.2010) http://www.alde.eu/press/press-and-release-news/press-release/article/ep-insists-on-proof-of-proportionality-of-data-transfer-35825/ Proposal for a Council Framework Decision on the use of Passenger Name Record (PNR) for law enforcement purposes (6.11.2007) http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2007:0654:FIN:EN:PDF EU proposal for passenger data to fight serious crime and terrorism (2.02.2011) http://europa.eu/rapid/pressReleasesAction.do?reference=IP/11/120&format=HTML&aged=0&language=EN&guiLanguage=en Commission PNR FAQ (2.02.2011) http://europa.eu/rapid/pressReleasesAction.do?reference=MEMO/11/60&format=HTML&aged=0&language=EN&guiLanguage=en EU to collect data of international air travellers (1.02.2011) http://euobserver.com/22/31731 "Does the EU need to collect all air travellers' data?", ask S&D (2.02.2011) http://www.socialistsanddemocrats.eu/gpes/public/detail.htm?id=135236§ion=NER&category=NEWS&startpos=9&topicid=-1&request_locale=EN Greens press release: Passenger data (PNR): Commission proposes system for retaining passenger data based on spurious security grounds http://www.greens-efa.eu/cms/pressreleases/dok/369/369653.passenger_data_pnr at en.htm (contribution by Raegan MacDonald - EDRi) ============================================================ 3. German study finds the data retention ineffective ============================================================ A study of police statistics published by the German Federal Crime Agency on 26 January 2011, finds telecommunications data retention ineffective for the prosecution of serious crime. An analysis of Federal Crime Agency statistics published on 27 January 2011 by German civil liberties NGO AK Vorrat reveals that data retention, while in force, did not make the prosecution of serious crime any more effective. With data retention in effect, more serious criminal acts (2009: 1 422 968) were registered by police than before (2007: 1 359 102), and a smaller proportion were cleared up (2009: 76.3%) than before the introduction of blanket retention of communications data (2007: 77.6%). Likewise, after the additional retention of Internet data began in 2009, the number of registered Internet offences surged from 167 451 in 2008 to 206 909 in 2009, while the clear-up rate for Internet crime fell (2008: 79.8%, 2009: 75.7%). According to AK Vorrat, user avoidance behaviour can explain the counterproductive effects of blanket data retention on the investigation of crime. In order to avoid the recording of sensitive information under a blanket data retention scheme, users begin to employ Internet cafis, wireless Internet access points, anonymisation services, public telephones, unregistered mobile telephone cards, non-electronic communications channels and the like. This avoidance behaviour cannot only render retained data meaningless but also frustrate more targeted investigation techniques that would otherwise have been available to law enforcement. Overall, blanket data retention can thus be counterproductive to criminal investigations, facilitating some, but rendering many more futile. AK Vorrat study: Registered Serious Crime in Germany (26.01.2011) http://www.vorratsdatenspeicherung.de/images/data_retention_effectiveness_report_2011-01-26.pdf Study finds telecommunications data retention ineffective (27.01.2011) http://www.vorratsdatenspeicherung.de/content/view/426/79/lang,en/ ============================================================ 4. UK Supreme Court to hear DNA cases ============================================================ Following a decision of the European Court of Human Rights (ECtHR), the UK Coalition Government has recently stated its intention to dramatically reduce the retention period of DNA data. In 2008, the ECtHR ruled that a blanket policy of retaining DNA samples of people who were not charged or convicted of offences indefinitely was breaching human rights. The UK Supreme Court has recently held hearings in two cases related to the retention of DNA, fingerprints and other information by the Police of Metropolis of two individuals, independently arrested by the police for suspected offences but had no further action taken against them. "It makes good sense to hold the DNA of dangerous convicts, but holding intimate information on thousands of innocents is discriminatory as well as intrusive. The high numbers of black men arrested and never charged explains but doesn't justify their over-representation on the database. In the absence of long-trailed new law from Parliament, Britain's highest court must inject fairness into DNA retention practice," stated Liberty's legal officer Anna Fairclough. The Supreme Court will decide whether the respective data retention violates the rights of the plaintiffs under Article 8 of the European Convention on Human Rights. The decision will probably largely influence the actions taken further on by the UK authorities. The Coalition expressed the intention to introduce a similar policy to that in Scotland where only the samples of people suspected of serious offences are retained and only for a limited period of time. "The Government is committed to adopting the protections of the Scottish model for DNA retention. In particular, we are examining whether the provisions of section 23 of the Crime and Security Act 2010 should be brought into force. This would empower the National DNA Database Strategy Board to issue binding guidance to chief police officers on the types of case in which deletion would be appropriate," Home Office Minister James Brokenshire announced in the Parliament. For the time being, according to the statistics, one out of four people whose DNA data are retained by the UK police forces are innocent and the data are retained indefinitely. In January 2011, Northern Ireland's High Court of Justice ruled that the retention of a 14-year-old boy's DNA by the police was not illegal, stating ECHR's 2008 ruling could not be followed because it was not binding and it was in conflict with the earlier ruling by the House of Lords. "The lengthy, perhaps indefinite, retention by the police of the Applicant's photographic images seems incompatible with the broad and elastic formulations of the scope of Article 8(1) [of the ECHR]," said Mr Justice McLoskey who added: "But for [the House of Lords] decision and our analysis of it, we consider that there is substantial force in the view that the retention of the Applicant's photographic images by the Police Service for a minimum period of seven years, which may be extended indefinitely, unconnected in any concrete or rational way with any of the statutory purposes, interferes with his right to respect for private life guaranteed by Article 8(1)." Innocent DNA retention to be challenged (31.01.2011) http://www.telegraph.co.uk/news/uknews/law-and-order/8291385/Innocent-DNA-retention-to-be-challenged.html Supreme Court to revisit DNA retention (30.01.2011) http://gizmonaut.net/blog/uk/supreme_court_to_revisit_dna_retention.html Police DNA retention ruled lawful by NI High Court (21.01.2011) http://www.theregister.co.uk/2011/01/21/police_dna_retention_lawful/ EDRi-gram: ECHR decided against the UK DNA Database (17.12.2008) http://www.edri.org/edri-gram/number6.24/echr-marper-case-dna-uk ============================================================ 5. Spanish sports streaming domain seized by US authorities without warning ============================================================ The US authorities have recently seized, without any warning, the domain names of several sports streaming sites over alleged copyright infringements within the "Operation In Our Sites" action launched at the beginning of July 2010, targeting websites having allegedly offered users copyrighted material without copyright owners' consent. In July 2010, the Department of Justice (DOJ) and Homeland Security's Immigration and Customs Enforcement (ICE) seized a series of film streaming domain names. It is now the turn of sports streaming domain names. Among the recently seized domains, DOJ and ICE have included Rojadirecta.org, a popular sports steaming website, despite the fact that the site is owned by a Spanish company and its only relation to the US is that the .org domain is maintained by a US company. Furthermore, the site has already been declared legal by two Spanish court rulings in 2009 and 2010, following an action introduced by sports rights holder Audiovisual Sport in 2007. "In our opinion the US authorities are completely despising the Spanish justice system and sovereignty," stated Igor Seoane, Rojadirecta's owner for TorrentFreak. Rojadirecta, as a streaming site, does not host any copyrighted material but indexes HTTP links to sports streams that can be found on the Internet and links to torrent files hosted on other sites. This seizure of a site domain already declared legal in Spain, raises concerns related to generic domain names that are controlled exclusively by US companies. Without even contacting the site owners, the US authorities may obtain a seizure warrant from a District Court judge and use this to take control over the domains in question even if the sites are not based in the US, which provides US censorship powers over a great part of the Internet. Besides Rojadirecta.org, the domains of several other sports streaming sites were seized by DOJ and ICE, only a few days before the Super Bowl, the most-watched American television broadcast. This seems like a pattern. In November, the US authorities seized domains of online retailers of alleged counterfeit goods, just a few days before "Cyber Monday", a commercial event. The sites in question had the option to move to alternative domains, which they did in a short time. Rojadirecta is presently available on several alternative domains, such as .es, .in and .me. Channelsurfing.net, one of the other seized sites is now available under Channelsurf.eu, Atdhe.net has moved to Atdhenet.tv while Ilemi.com turned to Ilemi.tv. Rojadirecta : judged as legal in Spain, seized by USA (update) (only in French, 2.02.2011) http://www.numerama.com/magazine/17946-rojadirecta-juge-legal-en-espagne-saisi-par-les-usa-maj.html U.S. Resume Controversial File-Sharing Domain Seizures (Update) (1.02.2011) http://torrentfreak.com/us-resume-file-sharing-domain-seizures-110201/ Sports Streaming / Torrent Links Site Victorious in Court (10.05.2010) http://torrentfreak.com/sports-streaming-torrent-links-site-victorious-in-court-100510/ U.S. Seizes Sports Streaming Sites in "Super Bowl Crackdown"(update) (2.02.2011) http://torrentfreak.com/u-s-seizes-sports-streaming-sites-in-super-bowl-crackdown-110202/ ============================================================ 6. France: Increased powers for Hadopi authority ============================================================ The Hadopi law continues to develop as the French Government pushes last minute amendments to be passed by the Parliament. Thus, the French National Assembly adopted on 1 February 2011, late at night, an amendment filed at the last moment by the Government, that would allow French three strikes authority (Hadopi) to pay private-sector companies for carrying out online surveillance and filtering. Amendment 151 to the draft Law on Simplifying and Improving the Quality of Laws extends Hadopi powers to "provide support for innovative research and experimentation projects by state or privately-owned entities that would assist the Authority in fulfilling its mission (...)", meaning that the authority would have the freedom to subsidise private entities for "the development of the legal offer and the observation of legal and illegal use of works". Although it was passed in a rush and late at night, the amendment did not go unnoticed. The legal commission of the General Assembly showed concerns regarding the constitutionality of the amendment stating it had no time to examine it and asked for its withdrawal. Deputy Alain Vidalies warned that the opposition would take the issue to the Constitutional Court, considering the amendment as a "legislative knight" (a text which has actually no relation to the text examined). Another draft decree related to Hadopi was on CNIL's agenda on 20 January 2011 and is now to be examined by the State Council. The decree, already modified once in October 2010, introduces means to interconnect ISPs' subscriber files with infringement information received by the Hadopi authority and makes electronic transmissions of all files from Hadopi to courts. This modification fulfils Hadopi's wish to manage all three strikes processes up to the courts by information systems, as the authority stated in November 2010: "Actually, the information system manages the first pedagogical phases of the graduate response procedure (...) It must be completed to manage the next exchange phase with the prosecutor offices and jurisdictions, for which a decree of the Culture Minister is to be published next month." The current procedure is that the files are verified first by the Commission for the Protection of Rights (CPD) before being sent to the prosecutor. However, the president of CPD stated in an interview at the end of 2010 that he supported the idea that the "negligent infraction" can be verified by the repeated offence and therefore, no additional evidence is necessary. "If the subscriber has not changed his behaviour after three offences, he has therefore not placed any security measure (...) the consequences of your actions are those that prove the infringement ", said CPD President. The transmission of Hadopi files to the prosecutor offices is already covered by a procedural decree of July 2010 which says that the files are sent "to the prosecutor of the Republic attached to the competent high court." The idea is to make these transmissions electronic and to allow the courts to send their decisions electronically. Hadopi wants to make certain that a decision to suspend a subscriber's Internet access is applied. The authority also wants to be sure the subscriber cannot use another ISP during the suspension period. Hadopi law modified in the middle of the night to finance private actors! (only in French, 2.02.2011) http://www.numerama.com/magazine/17948-la-loi-hadopi-modifiee-en-pleine-nuit-pour-financer-des-acteurs-prives.html Hadopi: a legislative knight voted at night by the Assembly (only in French, 4.02.2011) http://www.01net.com/www.01net.com/editorial/527873/hadopi-un-cavalier-legislatif-vote-de-nuit-a-lassemblee/?r=/rss/actus.xml Hadopi: towards a decree for electronic transmission to prosecutor's offices (only in French, 1.02.2011) http://www.numerama.com/magazine/17944-hadopi-vers-un-decret-pour-la-transmission-informatisee-aux-parquets.html Hadopi wants to make electronic the graduate response phase (only in French, 18.11.2010) http://www.itespresso.fr/hadopi-cherche-informatiser-phase-riposte-graduee-39127.html ============================================================ 7. ENDitorial: Internet blocking and damage to child protection ============================================================ The child protection industry has been campaigning for years for the introduction of EU-wide mandatory blocking of websites accused of being illegal by the police, by independent authorities, etc. This is as a result of a very laudable reflex - child abuse websites are even more abhorrent than one would imagine and blocking a bad thing can only logically be a good thing. Politically, it is an easy message. Unfortunately, child protection in an international context is polluted with easy messages and unthinking reflexes. Every government loves sounding tough on child protection and every soundbite that does not require concrete action results in a weakening of real measures being taken to protect children from real abuse. The self-appointed childrens' representatives consistently support and encourage these meaningless and counterproductive soundbites, ultimately damaging the very interests they claim to defend. Every country in the world except Somalia has signed and ratified either the UN Child Rights Convention or its Optional Protocol on the sale of children, child prostitution and child pornography. The Convention requires governments to take all appropriate national, bilateral and international measures to prevent the exploitative use of children in "pornographic" performances. The Optional Protocol requires governments to ensure that child "pornography" is "fully covered under its penal and criminal law". We are told that some countries leave child abuse websites online for months. Where is the public condemnation from the United Nations for these blatant breaches of its most successful binding Convention? Where are the shadow reports from child protection organisations condemning those countries for gross failures to protect the weakest in society? Where are the sanctions from governments bound under international law to take "all appropriate national, bilateral and international measures to prevent the abuse"? They are lost in soundbites. The problem is that the Convention and the Optional Protocol have no enforcement mechanisms. They can be signed and forgotten and states can move on to the next soundbite. We are told that web blocking is meant to be a "complementary measure". It will be part of a wider strategy. Unfortunately, it requires no action from governments - building on years of failure and years of soundbites, they will be able to claim that they are fighting child abuse when all they are really doing is asking Internet providers to put up a screen - a screen which will mask their own failures better than the abuse. So, why does the child protection industry insist on promoting blocking? It would be unfair to say that they are funded by governments and therefore unwilling to criticise them. The issue appears to be based more on misunderstandings than anything else. If we look at one particular child campaigner's blog (link below), we can see this quite clearly. He says: "Blocking is, after all, a form of deletion. It renders the material inaccessible to the great majority of internet users in the country where blocking happens." A system which leaves the material online is not a form of deletion. Nobody has been able to indicate any statistical difference between the number of - or trends in - reports to child abuse hotlines in countries with or without blocking. It has, therefore, no discernible impact on the great majority of internet users. In any event, the great majority of internet users never find child abuse material and, according to statistics from Internet hotlines. Furthermore, the great majority (over 75%) of those who think that they do have actually found entirely legal material. He goes on to say: "Opponents of blocking are sort of saying everyone should be able to see the images until no one can." It is difficult to know which opponents of blocking might be referred to here. Innocent people very rarely access the material and there is no evidence that blocking stops this to an appreciable extent. What we object to are measures which take the pressure off governments to take real action against websites containing evidence of real abuse and which destroy fundamental rights in the process He then explains that: "A number of opponents of blocking make references to "the thin end of the wedge" and to "dangerous precedents", sometimes referred to jointly or severally as the "slippery slope". "Where will it all end?" they ask." This fails to recognise that this is not a "stand alone" argument. The "slippery slope" is an inevitable cost. Any policy in any area requires the costs and benefits to be compared and balanced. As there is no demonstrable benefit to blocking, the slippery slope alone would make the measure disproportionate. He continues: "More reprehensible in some ways are those who make no attempt to deny that blocking child abuse images is a good thing to do. Instead, and often without any apparent embarrassment, they say they would do it in a trice if only they could be sure blocking would forever be limited to that. Terrorism, anorexia or suicide related materials frequently get mentioned as examples of the types of content it is known others are pushing to be blocked." Having worked on this issue for several years, I have never once heard someone make this argument. Blocking is dangerous, counter-productive and useless for child abuse images, whether other types of site are blocked does not change this. He adds: "Why do they find it difficult to agree that they should be blocked pending their deletion? It does not add up." Having seen governments sign, ratify and forget the UN Child Rights Convention, the Convention's Optional Protocol, the International Labour Organisation Convention on the worst forms of child labour and the Stockholm Declaration, it does not add up that people interested in child protection would want to give governments yet another soundbite - another way of hiding inaction on child protection behind empty promises. There MUST be investigations in order to identify and rescue as many children as possible. There MUST be investigations in order to find and prosecute both the owners and users of such sites. Blocking will immediately warn the people behind the websites that they have been spotted by law enforcement authorities and they can act to protect themselves. Why would child protection organisations want this? He says: "The techie world generally dislikes solutions which it believes are "broken" i.e. that can be defeated or circumvented, but the point is the knowledge and the determination to circumvent or defeat blocking are very unevenly distributed." The problem that the techie world has is the same as the one that the political world increasingly has with blocking. Techies are parents too and therefore understand that all efforts to protect children must be effective. They understand that every failed initiative has real human consequences. If a policy has demonstrable costs and no demonstrable benefits, it must be avoided. He continues: "Critics say that if the EU gives official blessing to the use of blocking it would enable totalitarian regimes in other parts of the world to point to it to justify their own oppressive use of blocking." Nobody says that blocking of child abuse images will directly cause this. However, "mission creep" is not a risk, it is a guarantee. Lawless blocking, such as in the UK and Sweden is not a risk, it is an existing fact. If, and it is already beginning to happen, EU countries block child abuse websites to hide their own international failures, if they block entirely legal gambling websites in order to protect tax revenues and gambling monopolies and if they block websites accused of copyright infringement in order to protect outdated industries that cannot cope with the digital age, if EU countries abandon the rule of law and permit blocking without any involvement of law enforcement (let alone judicial) authorities, it is not alone encouraging totalitarian regimes to undermine access to information, it is providing a blueprint for them. Sadly and disappointingly, the campaigner then goes on to give statistics which have been comprehensively, repeatedly and unquestionably disproven. One of the many clear analyses of why the "statistics" are misleading nonsense is linked from the bottom of this page. To finish, and bearing in mind that total lack of any benefit of blocking and the real dangers to child protection that blocking presents, I will finish with two quotations from the campaigner that sum up the debate very neatly: "If your starting point is the best interests of the child there is no way you can end up concluding that, actually, after a lot of careful thought, a great deal of soul searching and hand wringing it is best to leave pictures of children being raped on full public view for a little while longer." "This argument turns sexually-abused children into bargaining chips." This is completely and reprehensibly true. It is incomprehensible to find oneself trying to defend measures that will force governments to take proper action against child abuse, being fought every step of the way by those people whose job it is to do this. Campaigner's blog: Campaign bulletin: child pornography on the internet - bad reasons and non-reasons for opposing blocking (29.01.2011) http://johnc1912.wordpress.com/2011/01/29/bad-reasons-and-non-reasons-for-opposing-blocking/ Statistics: Twisting the facts to fit the story: child porn nonsense (7.02.2006) http://kierenmccarthy.co.uk/2006/02/07/twisting-the-facts-to-fit-the-story-child-porn-nonsense/ EDRi's blocking booklet http://www.edri.org/files/blocking_booklet.pdf (Contribution by Joe McNamee - EDRi) ============================================================ 8. Recommended Action ============================================================ Modernisation of the Council of Europe Convention 108 With new data protection challenges arising everyday, the Convention is being overhauled to meet new realities and time is now ripe to think about modernising it. The technological developments of the information and communication society as well as the globalisation of exchanges lead to unexplored challenges and potential new risks for the protection of human rights and fundamental freedoms. Is Convention 108's protection still in line with today's needs in respect of data protection or should it be modified and complemented in order to better satisfy the legitimate expectations of individuals and concerned professionals? http://www.coe.int/t/dghl/standardsetting/dataprotection/Consultation_Modernisation_Convention_108_EN.pdf ============================================================ 9. Recommended Reading ============================================================ Statewatch Analysis: EU: Deepening the democratic deficit: the failure to "enshrine" the public's right of access to documents by Tony Bunyan http://www.statewatch.org/analyses/no-121-eu-access-to-documents.pdf Transparency NGOs call on EU not to restrict document access (2.02.2011) http://euobserver.com/18/31736/?rk=1 ============================================================ 10. Agenda ============================================================ 18 February 2011, Berlin, Germany Open data: apps for everyone? Opportunities and challenges in the re-use of public sector information. http://www.epsiplatform.eu/news/events/opendata_apps_for_everyone 23-28 February 2011, Gosier, Guadeloupe, France ICDS 2011- 5th International Conference on Digital Society http://www.iaria.org/conferences2011/ICDS11.html 24-25 February 2011, Berlin, Germany The First OAPEN Conference http://meetings.copernicus.org/oapen2011/ 9 March 2011, Amsterdam, The Netherlands Big Brother Awards NL https://www.bigbrotherawards.nl 11-12 March 2011, Ankara, Turkey ICEGEG-2011- 3rd International Conference on E-Government and E-Governance http://www.icegeg.com/index.html 28 March 2011, Paris, France 5th European eAccessbility Forum: Benefits and costs of e-accessibility http://inova.snv.jussieu.fr/evenements/colloques/colloques/70_index_en.html 1 April 2011, Bielefeld, Germany Big Brother Awards Germany http://www.bigbrotherawards.de/index_html-en 15-17 April 2011, Berlin, Germany Re:publica XI: Conference about blogs, social media and the digital society http://re-publica.de/11/en/ 17-18 May 2011, Berlin Germany European Data Protection Reform & International Data Protection Compliance http://www.edpd-conference.com 12-15 June 2011, Bled, Slovenia 24th Bled eConference, eFuture: Creating Solutions for the Individual, Organisations and Society http://www.bledconference.org/index.php/eConference/2011 14-16 June 2011, Washington DC, USA CFP 2011 - Computers, Freedom & Privacy "The Future is Now" http://www.cfp.org/2011/wiki/index.php/Main_Page 11-12 July 2011, Barcelona, Spain 7th International Conference on Internet, Law & Politics (IDP 2011): Net Neutrality and other challenges for the future of the Internet Abstract submission: 18 February 2011 http://p2pfoundation.ning.com/profiles/blogs/7th-international-conference ============================================================ 11. About ============================================================ EDRI-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRI has 29 members based or with offices in 18 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRI-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and are visible on the EDRI website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edri/2.html - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From gracielc at mail.wplus.net Thu Feb 10 04:31:53 2011 From: gracielc at mail.wplus.net (Ingrid Gracie) Date: Thu, 10 Feb 2011 05:31:53 -0700 Subject: $150 Rolex Replica Watches Message-ID: <4d53dab9.e09eea43@mail.wplus.net> $150 Rolex Replica Watches Replica Rolex Watches, Omega, Tag Heuer, Breitling, Cartier, Swiss Replica Watches, Tag Heuer, Omega, Panerai, Rolex, IWC, Chopard, Longines, Audemars ... Find Wholesale Replica Watches At Discount Price & With Good Quality http://superwatchescore.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 627 bytes Desc: not available URL: From dimikas at samitos.com Wed Feb 9 22:42:09 2011 From: dimikas at samitos.com (=?koi8-r?B?4sDE1sXUydLP18HOycU=?=) Date: Thu, 10 Feb 2011 08:42:09 +0200 Subject: =?koi8-r?B?8sHa0sHCz9TLwSDGyc7BztPP18/KIMTPy9XNxc7UwcPJySAowsnazsXT?= =?koi8-r?B?LdDMwc7P1ywg9PzvKQ==?= Message-ID: Тема: Практическое финансовое моделирование, построение оптимальной схемы бизнес процесса, разработка и анализ бизнес плана. 8 Моск. код:_ 792_2|22 : Ч4*5..З2*66 Суть обучения!!! очень проста: Вас приглашают в компьютерный класс, где 2 дня с вами занимаются, супер профессионалы (тяжеловесы в финансовом планировании), все два дня Вы являетесь настоящими участниками практического семинара, получаете знания и для закрепления тем выполняете задания, выполняете их на компьютере оснащенным специализированным программным комплексом. Все пробуете Сами, и только Сами. По Окончании курса Вас оснащают лицензионной, полнорабочей специализированной версией программы, для разработки бизнес планов и инвестиционных проектов, Вы прибываете на предприятие, устанавливает продукт на свой компьютер и начинаете сразу работать (без всякой головной боли) - Вот так! Просто! мы делает профессионалов! Краткая информация о семинаре: Дата проведения занятий: С Четырнадцатого по пятнадцатое февраля 201Iг. Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. Сочетание методов обучения с практикой - позволит достичь максимальных результатов в освоении материала. Все наглядно и просто. На первом этапе излагается теория, на втором рассматриваются закономерности, почему теория не совместима с практикой, на третьем этапе формируется задача и рассматриваются фин. методы ее решения, на четвертом участник самостоятельно решает задачу используя компьютер оснащенный специализированным ПО. Рассмотрение финансовых методов для каждого рода деятельности в отдельности, усиление восприятия информации с помощью специализированного расширенного методического материала. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: * Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. * Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). * Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. * Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него участник семинара может эффективно разрабатывать свои сценарии финансовых проектов. Вся информация по тел: Московский код; ЧЧ5-4О_95 или ЧЧ5_3-9_6-8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4574 bytes Desc: not available URL: From hyunjaeum at usa.xerox.com Thu Feb 10 18:17:03 2011 From: hyunjaeum at usa.xerox.com (Hyun Jae) Date: Thu, 10 Feb 2011 19:17:03 -0700 Subject: Many men are coming to realise that penis size far from being completely fixed and immutable is actually very plastic and modifiable Message-ID: <4d549c1f.31aab8b2@usa.xerox.com> There are many way to enlarge a man's penis size in today's market. Most men tend to look for the simpler and safer methods to get a penis size larger. One of these is enlargement pill which is the most natural & hassle-free way among most enlargement methods. Just because you've not got the biggest penis doesn't mean you have to give up and accept your lot in life. Many men are coming to realise that penis size far from being completely fixed and immutable is actually very plastic and modifiable - if you know the right techniques to help it change size. CHANGE your SIZE TODAY! http://growpenisruputer.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 726 bytes Desc: not available URL: From tamikabreanahj at irco.com Thu Feb 10 18:40:05 2011 From: tamikabreanahj at irco.com (Tamika Breana) Date: Thu, 10 Feb 2011 19:40:05 -0700 Subject: Generic & Brand Viagra for $1.25/pill from TRUSTED online resellers Message-ID: <201102101939.DCFDAE3D7781FE96B59F1@4u7a9gi42> Buy VIAGRA Now From $1.25 & Get 12 bonus pills FREE! Generic & Brand Viagra for $1.25/pill from TRUSTED online resellers. Buy Viagra Online with Satisfaction Guarantee. Buy Cheap Generic Viagra or Brand name Viagra http://pillsprecisionpharmacyrx.ru From dir at aixo.ru Thu Feb 10 20:35:14 2011 From: dir at aixo.ru (Lena Bauer) Date: Fri, 11 Feb 2011 05:35:14 +0100 Subject: =?koi8-r?B?78LTzNXWydfBzsnFIMkg0sXNz87UIFZvbHZvIMkgRm9yZCDExdvF18zF?= =?koi8-r?B?IM7BIDIwJQ==?= Message-ID: <000d01cbc9a5$1391cc20$6400a8c0@dir> По понедельникам скидка на работы и запчасти 20%!!!! Диагностика ходовой бесплатно!!! Компьютерная диагностика, сход-развал, шиномонтаж. Быстро и качественно - все виды слесарных работ по ремонту Вольво и Форд с гарантией. Кузовные работы любой сложности Вольво и Форд с гарантией. Запчасти оригинальные и не оригинальные в наличии и на заказ. Запишитесь к нам на обслуживание по телефонам: (495) 785 36 01 или (495)389 09 55 Наш адрес: Москва, Днепропетровский пр-зд. д.5 From mchantellso at fonterra.com Fri Feb 11 05:40:08 2011 From: mchantellso at fonterra.com (Marilynn Chantell) Date: Fri, 11 Feb 2011 06:40:08 -0700 Subject: Best Deal Viagra. Free Delivery. A lot of packs & dosage available. Message-ID: <19b45v56m45-86915938-926z2f91@ccbbrtf> Next Day Delivery Viagra. LOW PRICE Viagra. Pills from USA stock Best Deal Viagra. Free Delivery. A lot of packs & dosage available. Quality Viagra from $1.37 per pill. Guaranted Satisfaction & Discount 10% for all reorders! Order FDA approved Viagra. MasterCard, VISA, eChecks http://licensedrxpills.ru From nettime at kein.org Fri Feb 11 08:26:42 2011 From: nettime at kein.org (nettime's avid reader) Date: Fri, 11 Feb 2011 17:26:42 +0100 Subject: Glenn Greenwald: The leaked campaign to attack WikiLeaks and its supporters Message-ID: http://www.salon.com/news/wikileaks/index.html?story=/opinion/greenwald/2011/02/11/campaigns Friday, Feb 11, 2011, Glenn Greenwald There's been a very strange episode being written about the past couple of days involving numerous parties, including me, that I now want to comment on. The story, first reported by The Tech Herald, has been been written about in numerous places (see Marcy Wheeler, Forbes, The Huffington Post, BoingBoing, Matt Yglesias, Reason, Tech Dirt, and others), so I'll provide just the summary. Last week, Aaron Barr, a top executive at computer security firm HB Gary, boasted to the Financial Times that his firm had infiltrated and begun to expose Anonymous, the group of pro-WikiLeaks hackers that had launched cyber attacks on companies terminating services to the whistleblowing site (such as Paypal, MasterCard, Visa, Amazon and others). In retaliation, Anonymous hacked into the email accounts of HB Gary, published 50,000 of their emails online, and also hacked Barr's Twitter and other online accounts. Among the emails that were published was a report prepared by HB Gary -- in conjunction with several other top online security firms, including Palantir Technologies -- on how to destroy WikiLeaks. The emails indicated the report was part of a proposal to be submitted to Bank of America through its outside law firm, Hunton & Williams. News reports have indicated that WikiLeaks is planning to publish highly incriminating documents showing possible corruption and fraud at that bank, and The New York Times detailed last month how seriously top bank officials are taking that threat. The NYT article described that the bank's "counterespionage work" against WikiLeaks entailed constant briefings for top executives on the whistle-blower site, along with the hiring of "several top law firms" and Booz Allen (the long-time firm of former Bush DNI Adm. Michael McConnell and numerous other top intelligence and defense officials). The report prepared by these firms was designed to be part of the Bank of America's highly funded anti-WikiLeaks campaign. The leaked report suggested numerous ways to destroy WikiLeaks, some of them likely illegal -- including planting fake documents with the group and then attacking them when published; "creat[ing] concern over the security" of the site; "cyber attacks against the infrastructure to get data on document submitters"; and a "media campaign to push the radical and reckless nature of wikileaks activities." Many of those proposals were also featured prongs of a secret 2008 Pentagon plan to destroy WikiLeaks. One section of the leaked report focused on attacking WikiLeaks' supporters and it featured a discussion of me. A graph purporting to be an "organizational chart" identified several other targets, including former New York Times reporter Jennifer 8 Lee, Guardian reporter James Ball, and Manning supporter David House. The report claimed I was "critical" to WikiLeaks' public support after its website was removed by Amazon and that "it is this level of support that needs to be disrupted"; absurdly speculated that "without the support of people like Glenn, WikiLeaks would fold"; and darkly suggested that "these are established professionals that have a liberal bent, but ultimately most of them if pushed will choose professional preservation over cause." As The Tech Herald noted, "earlier drafts of the proposal and an email from Aaron Barr used the word 'attacked' over 'disrupted' when discussing the level of support." In the wake of the ensuing controversy caused by publication of these documents, the co-founder and CEO of Palantir Tech, Alex Karp, has now issued a statement stating that he "directed the company to sever any and all contacts with HB Gary." The full statement -- which can be read here -- also includes this sentence: "personally and on behalf of the entire company, I want to publicly apologize to progressive organizations in general, and Mr. Greenwald in particular, for any involvement that we may have had in these matters." Palantir has also contacted me by email to arrange for Dr. Karp to call me to personally convey the apology. My primary interest is in knowing whether Bank of America retained these firms to execute this proposal and if any steps were taken to do so; if Karp's apology is genuine, that information ought to be forthcoming (as I was finishing writing this, Karp called me, seemed sincere enough in his apology, vowed that any Palantir employees involved in this would dealt with the way they dealt with HB Gary, and commendably committed to telling me by the end of the week whether Bank of America or Hunton & Williams actually retained these firms to carry out this proposal). * * * * * My initial reaction to all of this was to scoff at its absurdity. Not being familiar with the private-sector world of internet security, I hadn't heard of these firms before and, based on the quality of the proposal, assumed they were just some self-promoting, fly-by-night entities of little significance. Moreover, for the reasons I detailed in my interview with The Tech Herald -- and for reasons Digby elaborated on here -- the very notion that I could be forced to choose "professional preservation over cause" is ludicrous on multiple levels. Obviously, I wouldn't have spent the last year vehemently supporting WikiLeaks -- to say nothing of aggressively criticizing virtually every large media outlet and many of their leading stars, as well as the most beloved political leaders of both parties -- if I were willing to choose "career preservation over cause." But after learning a lot more over the last couple of days, I now take this more seriously -- not in terms of my involvement but the broader implications this story highlights. For one thing, it turns out that the firms involved here are large, legitimate and serious, and do substantial amounts of work for both the U.S. Government and the nation's largest private corporations (as but one example, see this email from a Stanford computer science student about Palantir). Moreover, these kinds of smear campaigns are far from unusual; in other leaked HB Gary emails, ThinkProgress discovered that similar proposals were prepared for the Chamber of Commerce to attack progressive groups and other activists (including ThinkProgress). And perhaps most disturbing of all, Hunton & Williams was recommended to Bank of America's General Counsel by the Justice Department -- meaning the U.S. Government is aiding Bank of America in its defense against/attacks on WikiLeaks. That's why this should be taken seriously, despite how ignorant, trite and laughably shallow is the specific leaked anti-WikiLeaks proposal. As creepy and odious as this is, there's nothing unusual about these kinds of smear campaigns.The only unusual aspect here is that we happened to learn about it this time because of Anonymous' hacking. That a similar scheme was quickly discovered by ThinkProgress demonstrates how common this behavior is. The very idea of trying to threaten the careers of journalists and activists to punish and deter their advocacy is self- evidently pernicious; that it's being so freely and casually proposed to groups as powerful as the Bank of America, the Chamber of Commerce, and the DOJ-recommended Hunton & Williams demonstrates how common this is. These highly experienced firms included such proposals because they assumed those deep-pocket organizations would approve and it would make their hiring more likely. But the real issue highlighted by this episode is just how lawless and unrestrained is the unified axis of government and corporate power. I've written many times about this issue -- the full-scale merger between public and private spheres -- because it's easily one of the most critical yet under-discussed political topics. Especially (though by no means only) in the worlds of the Surveillance and National Security State, the powers of the state have become largely privatized. There is very little separation between government power and corporate power. Those who wield the latter intrinsically wield the former. The revolving door between the highest levels of government and corporate offices rotates so fast and continuously that it has basically flown off its track and no longer provides even the minimal barrier it once did. It's not merely that corporate power is unrestrained; it's worse than that: corporations actively exploit the power of the state to further entrench and enhance their power. That's what this anti-WikiLeaks campaign is generally: it's a concerted, unified effort between government and the most powerful entities in the private sector (Bank of America is the largest bank in the nation). The firms the Bank has hired (such as Booz Allen) are suffused with the highest level former defense and intelligence officials, while these other outside firms (including Hunton & Williams and Palantir) are extremely well- connected to the U.S. Government. The U.S. Government's obsession with destroying WikiLeaks has been well-documented. And because the U.S. Government is free to break the law without any constraints, oversight or accountability, so, too, are its "private partners" able to act lawlessly. That was the lesson of the Congressional vesting of full retroactive immunity on lawbreaking telecoms, of the refusal to prosecute any of the important Wall Street criminals who caused the 2008 financial crisis, and of the instinctive efforts of the political class to protect defrauding mortgage banks. The exemption from the rule of law has been fully transferred from the highest level political elites to their counterparts in the private sector. "Law" is something used to restrain ordinary Americans and especially those who oppose this consortium of government and corporate power, but it manifestly does not apply to restrain these elites. Just consider one amazing example illustrating how this works. After Anonymous imposed some very minimal cyber disruptions on Paypal, Master Card and Amazon, the DOJ flamboyantly vowed to arrest the culprits, and several individuals were just arrested as part of those attacks. But weeks earlier, a far more damaging and serious cyber-attack was launched at WikiLeaks, knocking them offline. Those attacks were sophisticated and dangerous. Whoever did that was quite likely part of either a government agency or a large private entity acting at its behest. Yet the DOJ has never announced any investigation into those attacks or vowed to apprehend the culprits, and it's impossible to imagine that ever happening. Why? Because crimes carried out that serve the Government's agenda and target its opponents are permitted and even encouraged; cyber-attacks are "crimes" only when undertaken by those whom the Government dislikes, but are perfectly permissible when the Government itself or those with a sympathetic agenda unleash them. Whoever launched those cyber attacks at WikiLeaks (whether government or private actors) had no more legal right to do so than Anonymous, but only the latter will be prosecuted. That's the same dynamic that causes the Obama administration to be obsessed with prosecuting WikiLeaks but not The New York Times or Bob Woodward, even though the latter have published far more sensitive government secrets; WikiLeaks is adverse to the government while the NYT and Woodward aren't, and thus "law" applies to punish only the former. The same mindset drives the Government to shield high-level political officials who commit the most serious crimes, while relentlessly pursuing whistle-blowers who expose their wrongdoing. Those with proximity to government power and who serve and/or control it are free from the constraints of law; those who threaten or subvert it have the full weight of law come crashing down upon them. * * * * * What is set forth in these proposals for Bank of America quite possibly constitutes serious crimes. Manufacturing and submitting fake documents with the intent they be published likely constitutes forgery and fraud. Threatening the careers of journalists and activists in order to force them to be silent is possibly extortion and, depending on the specific means to be used, constitutes other crimes as well. Attacking WikiLeaks' computer infrastructure in an attempt to compromise their sources undoubtedly violates numerous cyber laws. Yet these firms had no compunction about proposing such measures to Bank of America and Hunton & Williams, and even writing them down. What accounts for that brazen disregard of risk? In this world, law does not exist as a constraint. It's impossible to imagine the DOJ ever, ever prosecuting a huge entity like Bank of America for doing something like waging war against WikiLeaks and its supporters. These massive corporations and the firms that serve them have no fear of law or government because they control each. That's why they so freely plot to target those who oppose them in any way. They not only have massive resources to devote to such attacks, but the ability to act without limits. John Cole put it this way: One thing that even the dim bulbs in the media should understand by now is that there is in fact a class war going on, and it is the rich and powerful who are waging it. Anyone who does anything that empowers the little people or that threatens the wealth and power of the plutocracy must be destroyed. There is a reason for these clowns going after Think Progress and unions, just like there is a reason they are targeting Wikileaks and Glenn Greenwald, Planned Parenthood, and Acorn. . . . You have to understand the mindset- they are playing for keeps. The vast majority of the wealth isn't enough. They want it all. Anything that gets in their way must be destroyed. . . . And they are well financed, have a strong infrastructure, a sympathetic media, and entire organizations dedicated to running cover for them . . . . I don't even know why we bother to hold elections any more, to be honest, the game is so rigged. Webre a banana republic, and it is just a matter of time before we descend into necklacing and other tribal bullshit. There are supposed to be institutions which limit what can be done in pursuit of those private-sector goals. They're called "government" and "law." But those institutions are so annexed by the most powerful private- sector elites, and so corrupted by the public officials who run them, that nobody -- least of all those elites -- has any expectation that they will limit anything. To the contrary, the full force of government and law will be unleashed against anyone who undermines Bank of America and Wall Street executives and telecoms and government and the like (such as WikiLeaks and supporters), and will be further exploited to advance the interests of those entities, but will never be used to constrain what they do. These firms vying for Bank of America's anti-WikiLeaks business know all of this full well, which is why they concluded that proposing such pernicious and possibly illegal attacks would be deemed not just acceptable but commendable. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From coderman at gmail.com Fri Feb 11 23:28:29 2011 From: coderman at gmail.com (coderman) Date: Fri, 11 Feb 2011 23:28:29 -0800 Subject: Glenn Greenwald: The leaked campaign to attack WikiLeaks and its supporters In-Reply-To: <20110212070100.GZ23560@leitl.org> References: <20110212070100.GZ23560@leitl.org> Message-ID: great stuff; one comment: On Fri, Feb 11, 2011 at 11:01 PM, Eugen Leitl wrote: > ... > But the real issue highlighted by this episode is just how lawless and > unrestrained is the unified axis of government and corporate power.. > .. The U.S. Government's obsession with > destroying WikiLeaks has been well-documented. And because the U.S. > Government is free to break the law without any constraints, oversight or > accountability, so, too, are its "private partners" able to act lawlessly. only partly true. were it entirely true we'd have some cypherpunk corpses laying about... ;) [ to my knowledge they've only annoyed and inconvenienced with disk imaging and impromptu interrogations... ] From measl at mfn.org Sat Feb 12 01:41:16 2011 From: measl at mfn.org (J.A. Terranson) Date: Sat, 12 Feb 2011 03:41:16 -0600 (CST) Subject: Glenn Greenwald: The leaked campaign to attack WikiLeaks and its supporters (fwd) Message-ID: ---------- Forwarded message ---------- Date: Fri, 11 Feb 2011 17:26:42 +0100 From: nettime's avid reader To: nettime-l at kein.org Subject: Glenn Greenwald: The leaked campaign to attack WikiLeaks and its supporters Resent-Date: Fri, 11 Feb 2011 21:27:16 +0100 Resent-From: nettime at kein.org Resent-To: Nettime http://www.salon.com/news/wikileaks/index.html?story=/opinion/greenwald/2011/02/11/campaigns Friday, Feb 11, 2011, Glenn Greenwald There's been a very strange episode being written about the past couple of days involving numerous parties, including me, that I now want to comment on. The story, first reported by The Tech Herald, has been been written about in numerous places (see Marcy Wheeler, Forbes, The Huffington Post, BoingBoing, Matt Yglesias, Reason, Tech Dirt, and others), so I'll provide just the summary. Last week, Aaron Barr, a top executive at computer security firm HB Gary, boasted to the Financial Times that his firm had infiltrated and begun to expose Anonymous, the group of pro-WikiLeaks hackers that had launched cyber attacks on companies terminating services to the whistleblowing site (such as Paypal, MasterCard, Visa, Amazon and others). In retaliation, Anonymous hacked into the email accounts of HB Gary, published 50,000 of their emails online, and also hacked Barr's Twitter and other online accounts. Among the emails that were published was a report prepared by HB Gary -- in conjunction with several other top online security firms, including Palantir Technologies -- on how to destroy WikiLeaks. The emails indicated the report was part of a proposal to be submitted to Bank of America through its outside law firm, Hunton & Williams. News reports have indicated that WikiLeaks is planning to publish highly incriminating documents showing possible corruption and fraud at that bank, and The New York Times detailed last month how seriously top bank officials are taking that threat. The NYT article described that the bank's "counterespionage work" against WikiLeaks entailed constant briefings for top executives on the whistle-blower site, along with the hiring of "several top law firms" and Booz Allen (the long-time firm of former Bush DNI Adm. Michael McConnell and numerous other top intelligence and defense officials). The report prepared by these firms was designed to be part of the Bank of America's highly funded anti-WikiLeaks campaign. The leaked report suggested numerous ways to destroy WikiLeaks, some of them likely illegal -- including planting fake documents with the group and then attacking them when published; "creat[ing] concern over the security" of the site; "cyber attacks against the infrastructure to get data on document submitters"; and a "media campaign to push the radical and reckless nature of wikileaks activities." Many of those proposals were also featured prongs of a secret 2008 Pentagon plan to destroy WikiLeaks. One section of the leaked report focused on attacking WikiLeaks' supporters and it featured a discussion of me. A graph purporting to be an "organizational chart" identified several other targets, including former New York Times reporter Jennifer 8 Lee, Guardian reporter James Ball, and Manning supporter David House. The report claimed I was "critical" to WikiLeaks' public support after its website was removed by Amazon and that "it is this level of support that needs to be disrupted"; absurdly speculated that "without the support of people like Glenn, WikiLeaks would fold"; and darkly suggested that "these are established professionals that have a liberal bent, but ultimately most of them if pushed will choose professional preservation over cause." As The Tech Herald noted, "earlier drafts of the proposal and an email from Aaron Barr used the word 'attacked' over 'disrupted' when discussing the level of support." In the wake of the ensuing controversy caused by publication of these documents, the co-founder and CEO of Palantir Tech, Alex Karp, has now issued a statement stating that he "directed the company to sever any and all contacts with HB Gary." The full statement -- which can be read here -- also includes this sentence: "personally and on behalf of the entire company, I want to publicly apologize to progressive organizations in general, and Mr. Greenwald in particular, for any involvement that we may have had in these matters." Palantir has also contacted me by email to arrange for Dr. Karp to call me to personally convey the apology. My primary interest is in knowing whether Bank of America retained these firms to execute this proposal and if any steps were taken to do so; if Karp's apology is genuine, that information ought to be forthcoming (as I was finishing writing this, Karp called me, seemed sincere enough in his apology, vowed that any Palantir employees involved in this would dealt with the way they dealt with HB Gary, and commendably committed to telling me by the end of the week whether Bank of America or Hunton & Williams actually retained these firms to carry out this proposal). * * * * * My initial reaction to all of this was to scoff at its absurdity. Not being familiar with the private-sector world of internet security, I hadn't heard of these firms before and, based on the quality of the proposal, assumed they were just some self-promoting, fly-by-night entities of little significance. Moreover, for the reasons I detailed in my interview with The Tech Herald -- and for reasons Digby elaborated on here -- the very notion that I could be forced to choose "professional preservation over cause" is ludicrous on multiple levels. Obviously, I wouldn't have spent the last year vehemently supporting WikiLeaks -- to say nothing of aggressively criticizing virtually every large media outlet and many of their leading stars, as well as the most beloved political leaders of both parties -- if I were willing to choose "career preservation over cause." But after learning a lot more over the last couple of days, I now take this more seriously -- not in terms of my involvement but the broader implications this story highlights. For one thing, it turns out that the firms involved here are large, legitimate and serious, and do substantial amounts of work for both the U.S. Government and the nation's largest private corporations (as but one example, see this email from a Stanford computer science student about Palantir). Moreover, these kinds of smear campaigns are far from unusual; in other leaked HB Gary emails, ThinkProgress discovered that similar proposals were prepared for the Chamber of Commerce to attack progressive groups and other activists (including ThinkProgress). And perhaps most disturbing of all, Hunton & Williams was recommended to Bank of America's General Counsel by the Justice Department -- meaning the U.S. Government is aiding Bank of America in its defense against/attacks on WikiLeaks. That's why this should be taken seriously, despite how ignorant, trite and laughably shallow is the specific leaked anti-WikiLeaks proposal. As creepy and odious as this is, there's nothing unusual about these kinds of smear campaigns.The only unusual aspect here is that we happened to learn about it this time because of Anonymous' hacking. That a similar scheme was quickly discovered by ThinkProgress demonstrates how common this behavior is. The very idea of trying to threaten the careers of journalists and activists to punish and deter their advocacy is self- evidently pernicious; that it's being so freely and casually proposed to groups as powerful as the Bank of America, the Chamber of Commerce, and the DOJ-recommended Hunton & Williams demonstrates how common this is. These highly experienced firms included such proposals because they assumed those deep-pocket organizations would approve and it would make their hiring more likely. But the real issue highlighted by this episode is just how lawless and unrestrained is the unified axis of government and corporate power. I've written many times about this issue -- the full-scale merger between public and private spheres -- because it's easily one of the most critical yet under-discussed political topics. Especially (though by no means only) in the worlds of the Surveillance and National Security State, the powers of the state have become largely privatized. There is very little separation between government power and corporate power. Those who wield the latter intrinsically wield the former. The revolving door between the highest levels of government and corporate offices rotates so fast and continuously that it has basically flown off its track and no longer provides even the minimal barrier it once did. It's not merely that corporate power is unrestrained; it's worse than that: corporations actively exploit the power of the state to further entrench and enhance their power. That's what this anti-WikiLeaks campaign is generally: it's a concerted, unified effort between government and the most powerful entities in the private sector (Bank of America is the largest bank in the nation). The firms the Bank has hired (such as Booz Allen) are suffused with the highest level former defense and intelligence officials, while these other outside firms (including Hunton & Williams and Palantir) are extremely well- connected to the U.S. Government. The U.S. Government's obsession with destroying WikiLeaks has been well-documented. And because the U.S. Government is free to break the law without any constraints, oversight or accountability, so, too, are its "private partners" able to act lawlessly. That was the lesson of the Congressional vesting of full retroactive immunity on lawbreaking telecoms, of the refusal to prosecute any of the important Wall Street criminals who caused the 2008 financial crisis, and of the instinctive efforts of the political class to protect defrauding mortgage banks. The exemption from the rule of law has been fully transferred from the highest level political elites to their counterparts in the private sector. "Law" is something used to restrain ordinary Americans and especially those who oppose this consortium of government and corporate power, but it manifestly does not apply to restrain these elites. Just consider one amazing example illustrating how this works. After Anonymous imposed some very minimal cyber disruptions on Paypal, Master Card and Amazon, the DOJ flamboyantly vowed to arrest the culprits, and several individuals were just arrested as part of those attacks. But weeks earlier, a far more damaging and serious cyber-attack was launched at WikiLeaks, knocking them offline. Those attacks were sophisticated and dangerous. Whoever did that was quite likely part of either a government agency or a large private entity acting at its behest. Yet the DOJ has never announced any investigation into those attacks or vowed to apprehend the culprits, and it's impossible to imagine that ever happening. Why? Because crimes carried out that serve the Government's agenda and target its opponents are permitted and even encouraged; cyber-attacks are "crimes" only when undertaken by those whom the Government dislikes, but are perfectly permissible when the Government itself or those with a sympathetic agenda unleash them. Whoever launched those cyber attacks at WikiLeaks (whether government or private actors) had no more legal right to do so than Anonymous, but only the latter will be prosecuted. That's the same dynamic that causes the Obama administration to be obsessed with prosecuting WikiLeaks but not The New York Times or Bob Woodward, even though the latter have published far more sensitive government secrets; WikiLeaks is adverse to the government while the NYT and Woodward aren't, and thus "law" applies to punish only the former. The same mindset drives the Government to shield high-level political officials who commit the most serious crimes, while relentlessly pursuing whistle-blowers who expose their wrongdoing. Those with proximity to government power and who serve and/or control it are free from the constraints of law; those who threaten or subvert it have the full weight of law come crashing down upon them. * * * * * What is set forth in these proposals for Bank of America quite possibly constitutes serious crimes. Manufacturing and submitting fake documents with the intent they be published likely constitutes forgery and fraud. Threatening the careers of journalists and activists in order to force them to be silent is possibly extortion and, depending on the specific means to be used, constitutes other crimes as well. Attacking WikiLeaks' computer infrastructure in an attempt to compromise their sources undoubtedly violates numerous cyber laws. Yet these firms had no compunction about proposing such measures to Bank of America and Hunton & Williams, and even writing them down. What accounts for that brazen disregard of risk? In this world, law does not exist as a constraint. It's impossible to imagine the DOJ ever, ever prosecuting a huge entity like Bank of America for doing something like waging war against WikiLeaks and its supporters. These massive corporations and the firms that serve them have no fear of law or government because they control each. That's why they so freely plot to target those who oppose them in any way. They not only have massive resources to devote to such attacks, but the ability to act without limits. John Cole put it this way: One thing that even the dim bulbs in the media should understand by now is that there is in fact a class war going on, and it is the rich and powerful who are waging it. Anyone who does anything that empowers the little people or that threatens the wealth and power of the plutocracy must be destroyed. There is a reason for these clowns going after Think Progress and unions, just like there is a reason they are targeting Wikileaks and Glenn Greenwald, Planned Parenthood, and Acorn. . . . You have to understand the mindset- they are playing for keeps. The vast majority of the wealth isn't enough. They want it all. Anything that gets in their way must be destroyed. . . . And they are well financed, have a strong infrastructure, a sympathetic media, and entire organizations dedicated to running cover for them . . . . I don't even know why we bother to hold elections any more, to be honest, the game is so rigged. Were a banana republic, and it is just a matter of time before we descend into necklacing and other tribal bullshit. There are supposed to be institutions which limit what can be done in pursuit of those private-sector goals. They're called "government" and "law." But those institutions are so annexed by the most powerful private- sector elites, and so corrupted by the public officials who run them, that nobody -- least of all those elites -- has any expectation that they will limit anything. To the contrary, the full force of government and law will be unleashed against anyone who undermines Bank of America and Wall Street executives and telecoms and government and the like (such as WikiLeaks and supporters), and will be further exploited to advance the interests of those entities, but will never be used to constrain what they do. These firms vying for Bank of America's anti-WikiLeaks business know all of this full well, which is why they concluded that proposing such pernicious and possibly illegal attacks would be deemed not just acceptable but commendable. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org From slestefanaxp at budgetware.com Sat Feb 12 06:50:10 2011 From: slestefanaxp at budgetware.com (Sarina Estefana) Date: Sat, 12 Feb 2011 07:50:10 -0700 Subject: Buy Viagra Online with Satisfaction Guarantee. Buy Cheap Generic Viagra or Brand name Viagra Message-ID: <66w48q84b41-14206862-006j3k40@rthilckab> Buy VIAGRA Now From $1.25 & Get 12 bonus pills FREE! Generic & Brand Viagra for $1.25/pill from TRUSTED online resellers. Buy Viagra Online with Satisfaction Guarantee. Buy Cheap Generic Viagra or Brand name Viagra http://buydrugsprescription.ru From eugen at leitl.org Fri Feb 11 23:01:00 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 12 Feb 2011 08:01:00 +0100 Subject: Glenn Greenwald: The leaked campaign to attack WikiLeaks and its supporters Message-ID: <20110212070100.GZ23560@leitl.org> ----- Forwarded message from nettime's avid reader ----- From lmilissary at mail4y.com Sat Feb 12 09:19:49 2011 From: lmilissary at mail4y.com (Lester Milissa) Date: Sat, 12 Feb 2011 10:19:49 -0700 Subject: --- Hydrocodone 10mg --- 30 for $230 -- 60 for $419 -- VISA Only!!! --- Message-ID: <50v15q88l97-48811947-998d9n39@aecrjbnbws> -- Hydrocodone 10mg - 30 for $230 - 60 for $419 --- Hydrocodone is a semi-synthetic opioid -- Watson 540 Hydrocodone (Vicodin HP) contains 10 mg hydrocodone and 500 mg acetaminophen 30 for $230 - 60 for $419 - 90 for $593 - 120 for $754 -- VISA Only! Click Here! http://cheappharmacyauto.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 637 bytes Desc: not available URL: From Francisco2175 at 2-wayradiotowers.com.jfet.org Sat Feb 12 00:33:58 2011 From: Francisco2175 at 2-wayradiotowers.com.jfet.org (Dr.Carmen Martn) Date: Sat, 12 Feb 2011 14:33:58 +0600 Subject: Your chips are worth more Message-ID: <874433.755VANRDUMD6469MWNF5161173@ferric> tetragonal shannon agitate egghead boyish nymph implementer instant centum chive diabetic amoral detonate cit euphrates modulo capacitance theism buddhism chaff monetary aggressive archenemy aphasia ciceronian axes appendices apathy bronchus cartographic fight o'leary bertie profound yeasty ektachrome oceanographer boltzmann apatite dollar permissive pygmalion boil parkinson dime bayreuth jew inch pickoff manitoba fiduciary segundo crux lengthy nit acanthus price downriver brushwork keyes lotus belligerent workmen y's maternal baptist allegate sandra breakfast musculature crackle accompany econometric bonnet auschwitz plumage degeneracy kern sesame oboe beginning pastor gordian bent anaplasmosis aberrant osseous titillate field flageolet seedy nation allude increment wacke checksumming biltmore anthropogenic conglomerate whose statutory duplex eumenides gent mortgagor savoyard thayer volkswagen abominate dichotomy flagellate erosible lick paymaster cretan billion azure sharpe impolite moot inaccessible floury cottonmouth barber backplate borne ask arsine hemispheric magnate telephone embarcadero cheap clytemnestra whirl gown bstj drophead remington holdover konrad pad amble brazzaville conversation agreeable demise diagnostician atwood howsoever persuasion eliminate candid buyer bootlegging guam ellison out sorrel extra canaan barth pilgrimage julia midge being treasure accordion arachne telephonic aggression elk corvus jam beforehand canteen argus cobweb painful brindisi crosswort elba ambulant otherwise allison craven ambivalent yolk etc nouveau discussion bestow http://durl.me/5u7nm -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 814 bytes Desc: not available URL: From measl at mfn.org Sat Feb 12 12:58:02 2011 From: measl at mfn.org (J.A. Terranson) Date: Sat, 12 Feb 2011 14:58:02 -0600 (CST) Subject: World.s Total CPU Power: One Human Brain Message-ID: http://www.wired.com/wiredscience/2011/02/world-computer-data/ By John Timmer, Ars Technica How much information can the world transmit, process, and store? Estimating this sort of thing can be a nightmare, but the task can provide valuable information on trends that are changing our computing and broadcast infrastructure. So a pair of researchers have taken the job upon themselves and tracked the changes in 60 different analog and digital technologies, from newsprint to cellular data, for a period of over 20 years. The trends they spot range from the expected.Internet access has pushed both analog and digital phones into a tiny niche.to the surprising, such as the fact that, in aggregate, gaming hardware has always had more computing power than the world.s supercomputers. The authors were remarkably thorough. For storage media, they considered things like paper, film, and vinyl records, and such modern innovations as Blu-ray discs and memory cards. To standardize their measurements across media, they used Shannon.s information theory to consider data storage in terms of optimally compressed bits. They also tracked technology, noting that in the year 2000, bits of video were compressed using cinepak, which was far less efficient than the current MPEG-4 format; calculations were adjusted accordingly. Even so, there are some significant estimations here. .For example,. the authors note, .after normalization on optimally compressed bits we can say things like .a 6 square-cm newspaper image is worth a 1,000 words... Similar sorts of estimates are required for things like broadcast capability and two-way communications, both of which are compiled as bits-per-second figures. The researchers estimate typical consumption of broadcast media to figure out how much of the existing capacity is used, and they figure that, since telecom equipment is run to maximize the use of its capacity, it.s usually booked to close to its limit. Computing capacity is converted into MIPS, and estimates for the total number and class of chips are available. The big question mark here is mostly in embedded controllers; it.s hard to estimate both their computational capacity and how many are out there. So these are pretty rough estimates, but similar assumptions are made at all four time points examined between 1986 and 2007. That should allow comparisons of trends across the time period, even if the absolute values of the estimates are a bit off. Storage Some trends are very, very obvious. Analog video accounted for over half the data stored in 1986 (vinyl LPs and cassette tapes accounted for over a quarter), and video held 86 percent of all stored data by 1993, squeezing out nearly everything else. By 2000, CDs and digital tape started pushing back, but analog video still stood at 70 percent of all stored data. By 2007, analog video had plunged to a tiny six percent, eclipsed by hard disks, Blu-ray and DVDs, and digital tape. During that time, total storage capacity grew at about 23 percent annually, and it topped out at 2.9 x 1020 bytes.that.s about 300 exabytes, or 61 CDs for everyone on the planet. A similar shift to digital occurred in broadcast media and two-way communications. Back in 1986, 80 percent of broadcast capacity was used for terrestrial TV, although analog cable was already a presence. Today, broadcast TV has fallen to 50 percent; a quarter of the broadcast data is now some form of digital, and analog cable is declining from its peak in 2000. Two-way communications underwent a far more dramatic shift. In 1986, analog phones handled 80 percent of the data, with digital phones taking the other 20 percent; everything else was a rounding error. By 2000, analog telephony was down to two percent of the world.s two-way transmissions. Digital telephony peaked in 1993 at 67 percent; fixed Internet connections accounted for one percent of usage that year. By 2000, it was up to 50 percent, and it.s now at 97 percent. Nothing else cleared one percent. Two-way communications handled 65 exabytes in 2007, dwarfed by broadcasting, which sent a whopping 2 zetabytes of data. But, while broadcasting is increasing at a linear rate, the advent of the Internet has given two-way transmissions a big boost, increasing the bytes transmitted by a factor of 29 in just 7 years. Computation Computation is probably the most varied mix of hardware of the lot. Back in 1986, pocket calculators represented about 40 percent of all computer capacity, beating out PCs at 33 percent and servers at 17 percent. Even then, gaming hardware held a nine percent share. Calculators were gone by 2000, when the PC peaked at 86 percent and the mobile phone/PDA first appeared at 3 percent. By 2007, phones held six percent of world processing power, but the big story was gaming hardware, which shot up to a quarter of the total computational capacity, pushing the PC back down to a two-thirds share. Supercomputers are apparently rare enough not to measure. One surprising result of the research is the amount of total horsepower found in the application-specific space, where the authors considered only DSPs, microcontrollers, and GPUs (GPUs alone account for 97 percent of this category.s capacity). And that capacity is huge, about 30 times that of all the general purpose computation hardware. GPUs account for the lion.s share of the 6.4 x 1018 operations a second that the planet can now perform, and they showed a compound annual growth rate of 86 percent over the study period. Lest we get too enamored with our technological prowess, however, the authors make some comparisons with biology. .To put our findings in perspective, the 6.4*1018 instructions per second that human kind can carry out on its general-purpose computers in 2007 are in the same ballpark area as the maximum number of nerve impulses executed by one human brain per second,. they write. Our total storage capacity is the same as an adult human.s DNA. And there are several billion humans on the planet. Image: Flickr/adafruit. Citation: .The World.s Technological Capacity to Store, Communicate, and Compute Information.. Martin Hilbert and Priscila Lspez. Science, 692-693, Feb. 11, 2011. DOI: 10.1126/science.1200970 Source: Ars Technica. From charlenababaraoe at gdai.com Sun Feb 13 00:27:22 2011 From: charlenababaraoe at gdai.com (Charlena Babara) Date: Sun, 13 Feb 2011 01:27:22 -0700 Subject: Potential Gains Up To 3+ Full Inches In Length & Girth Message-ID: <201102130126.B69228C432CA4B0AEF13FB@10jzcu5v1> 100% Safe To Take, With No Side Effects Make Penis Bigger Bigger Penis Pill is a product that can help your erections be the way they used to be. This product is completely natural. The best way to achieve your maximum potential with erections is in your blood flow. If your blood flow has been reduced you will experience problems with your erection. Rated NO.1 Penis Enhancement Pill on the Market! * Potential Gains Up To 3+ Full Inches In Length & Girth * Achieve Powerful Erections * Reduces Premature Ejaculation * Produce Stronger and Rock Hard Erections * Longer more intense orgasms * Increase in sperm volume * Increased stamina and staying power * 100% Safe To Take, With No Side Effects * 100% FDA Approved Conditions http://longpenisitive.ru From diogomatheis at web-alley.ru Sat Feb 12 21:57:47 2011 From: diogomatheis at web-alley.ru (=?koi8-r?B?+sHLz84gzyDaxc3MxdDPzNjaz9fBzsnJ?=) Date: Sun, 13 Feb 2011 10:57:47 +0500 Subject: =?koi8-r?B?58zPwsHM2M7PxSDJ2s3FzsXOycUg2sHLz87BIM8g2sXNzMU=?= Message-ID: <9E605D8BE9EE4D5AB9275F5730EC6D4D@microsof052e58> 16 Февраля ВНИМАНИЕ ИЗМЕНЕНИЯ! ПРОБЛЕМЫ ПРИМЕНЕНИЯ ДЕЙСТВУЮЩЕГО ЗАКОНОДАТЕЛЬСТВА В СФЕРЕ ЗЕМЛЕПОЛЬЗОВАНИЯ С УЧЕТОМ ИЗМЕНЕНИЙ 2011 ГОДА (Ч95) Ч/45/Ч*0_95 **** ЧЧ539.68 Объекты земельных правоотношений. Вопросы кадастрового учета земельных участков. Особенности кадастрового учета вновь создаваемых и изменяемых объектов недвижимости в соответствии с Федеральным законом от 24.07.2007 N 221-ФЗ "О государственном кадастре недвижимости". Практические вопросы кадастровой стоимости объектов недвижимости. Право постоянного (бессрочного) пользования землей. Практические вопросы правового статуса землепользователя. Права собственников при разрушении объекта недвижимого имущества. Правовой режим земель сельскохозяйственного назначения. Проблемы распоряжения земельными долями из земель сельскохозяйственного назначения. Арбитражная практика. Приватизация земли. Пути решения вопросов, возникающих при предоставлении земельных участков из государственной и муниципальной собственности. Распоряжение земельными участками, государственная собственность на которые не разграничена. Земли поселений. Понятие разрешенного использования земельных участков с учетом требований Градостроительного кодекса Российской Федерации. Особенности предоставления земельных участков под строительство. Оформление разрешений на строительство с учетом требований земельного законодательства. Особенности предоставления земельных участков под многоэтажными жилыми домами. Практические рекомендации. Урегулирование земельных отношений сособственниками помещений, в том числе нежилых, в многоквартирных домах. Порядок заключения, изменения и расторжения договоров аренды земельных участков, находящихся в государственной или муниципальной собственности с учетом практики арбитражных судов. Некоторые особенности определения сроков по договору аренды земельных участков. Государственная регистрация прав и сделок с землей. Земельные отношения в особых экономических зонах. Налогообложение в сфере землепользования. Информацию можно получить по телефонам: 8 (Ч95) ЧЧ54О95 <> 7/42_9i-98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3642 bytes Desc: not available URL: From y.jstephaniesd at emr.net Sun Feb 13 14:34:06 2011 From: y.jstephaniesd at emr.net (Yetta Stephanie) Date: Sun, 13 Feb 2011 15:34:06 -0700 Subject: Buy V|AGRA ONLINE - Discounts and Free Shipping applied. 24/7 Online support, Absolute anonymity & Fast delivery Message-ID: <201102131534.B5DC61A33A5C4176EED82@ntlmq3vus> Buy VIAGRA Now From $1.25 & Get 12 bonus pills FREE! Generic & Brand Viagra for $1.25/pill from TRUSTED online resellers. Buy Viagra Online with Satisfaction Guarantee. Buy Cheap Generic Viagra or Brand name Viagra http://buyhealthmeds.ru From elena at ochag.kharkov.ua Sun Feb 13 11:48:58 2011 From: elena at ochag.kharkov.ua (=?koi8-r?B?4s/M2M7J3s7ZxSDMydPU2Q==?=) Date: Sun, 13 Feb 2011 20:48:58 +0100 Subject: =?koi8-r?B?6drNxc7FzsnROiD6wdLBws/UzsHRINDMwdTBLCDX0sXNxc7OwdEgzsXU?= =?koi8-r?B?0tXEz9PQz9PPws7P09TY?= Message-ID: С 1 января 2011 года введен новый порядок расчета пособий по временной нетрудоспособности. Наряду с увеличением количества дней, оплачиваемых за счет работодателя, изменился расчетный период, включаемые в него суммы и исключаемые периоды. Нововведением явился учет заработной платы, полученной у прежних работодателей. По-иному оплачиваются периоды работы в режиме неполного рабочего времени и время простоя и т.д. 04 марта ЗАРАБОТНАЯ ПЛАТА В 2011г.: ПРАВОВЫЕ, БУХГАЛТЕРСКИЕ И НАЛОГОВЫЕ ВОПРОСЫ Егоров Вадим Викторович - эксперт АКДИ "Экономика и жизнь", практик-бухгалтер с многолетним опытом работы, автор книги "Больничные и другие социальные пособия" и публикаций в изданиях "Экономика и жизнь", "Российский налоговый курьер", "Новая бухгалтерия" и др. +7 (Ч95) 7922I-22 **** 4Ч5*З9-68 Цель: новое в практике исчисления пособий по временной нетрудоспособности, по беременности и родам в 2011 году, рассмотреть новый порядок начисления страховых взносов от несчастных случаев на производстве, получить последние разъяснения о порядке начисления страховых взносов Программа: 1. Новое в практике исчисления пособий по временной нетрудоспособности, по беременности и родам в 2011 году 2. Порядок исчисления пособий по уходу за ребенком. Повышение размеров пособия в 2011 году 3. Новый порядок начисления страховых взносов от несчастных случаев на производстве 4. Изменение размеров и условий оплаты труда в условиях экономического кризиса. Требования ТК РФ и НК РФ. Особенности оплаты труда при неполном рабочем времени 5. Последние разъяснения о порядке начисления страховых взносов 6. Налог на доходы физических лиц. Изменения, вступающие в силу в 2011 году Вся информация по тел: +7 (код Москвы) 792*-2I/.22 **** 445Ч05З -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3189 bytes Desc: not available URL: From priscilavr at starstream.net Mon Feb 14 00:50:32 2011 From: priscilavr at starstream.net (Doreen Priscila) Date: Mon, 14 Feb 2011 01:50:32 -0700 Subject: Just $1.27 a tablet! Cheap Viagra OVERNIGHT from USA stock. Free Delivery! 10% OFF for ALL reorders! FDA approved. Excellent quality of all pills without exception! We accept VISA & eCheck. Message-ID: <201102140149.EE89D8891CEF32D97A2A5C@s45m87m> Next Day Delivery Viagra. LOW PRICE Viagra. Pills from USA stock Best Deal Viagra. Free Delivery. A lot of packs & dosage available. Quality Viagra from $1.37 per pill. Guaranted Satisfaction & Discount 10% for all reorders! Order FDA approved Viagra. MasterCard, VISA, eChecks http://appletabletpharmacypills.ru From alline.melitafb at telenor.com Mon Feb 14 07:40:01 2011 From: alline.melitafb at telenor.com (Alline Melita) Date: Mon, 14 Feb 2011 08:40:01 -0700 Subject: Male Enhancement Pills, Natural Penis Enhancement, Penis Pills Message-ID: <201102140838.B78C9E069C5C181500B2@0w6rb7o8> Male Enhancement Pills, Natural Penis Enhancement, Penis Pills MaxMan Pills are male enhancement pills and an all natural penis enhancement that is rated No 1 You Can Enjoy Bigger, Harder, More Intense Erections! http://longpenisland.ru From salving99 at rockymountainnews.com Mon Feb 14 00:11:20 2011 From: salving99 at rockymountainnews.com (Hunter Hadley) Date: Mon, 14 Feb 2011 11:11:20 +0300 Subject: BudgetAir Message-ID: АВИАБИЛЕТЫ ПО АКЦИЯМ Бронируйте по телефону (495) 789-66-85 Внимание! Тарифы даны без учета аэропортовых и сервисных сборов! Пункты назначения Тариф туда и обратно Аэропортовые и сервисные сборы Авиакомпания Срок действия Cтамбул (а/п Сабиха Гёкчен) от 89 EUR ~3342 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Абу Даби от 209 EUR ~7200 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Амстердам от 249 EUR ~1879 руб. Белавиа Путешествие: не более 2 мес. Анкара от 89 EUR ~3437 руб. Turkish Airlines Путешествие: не более 12 мес. Атланта от 313 EUR ~12306 руб. ALITALIA Продажа до: 15.02.2011 Путешествие : c 15.01-15.04.11 Афины от 99 EUR ~6212 руб. Аэросвит Путешествие: не более 1 мес. Барселона от 148 EUR ~7160 руб. Brussels Airlines Бронирование за 21 день Берлин от 115 EUR ~4440 руб. Lufthansa Бронирование за 14 дней Бостон от 288 EUR ~12615 руб. ALITALIA Продажа до: 15.02.2011 Путешествие : c 15.01-15.04.11 Брюссель от 190 EUR ~5160 руб. Brussels Airlines Варшава от 120 EUR ~5142 руб. Аэросвит Путешествие: не более 1 мес. Варшава от 196 EUR ~1782 руб. Белавиа Путешествие: не более 2 мес. Венеция от 149 EUR ~8360 руб. Lufthansa Бронирование за 21 день Ганновер от 199 EUR ~8640 руб. Lufthansa Гонг Конг, Пекин, Чанша, Чунцин, Фучжоу, Гуанджоу, Ханджоу, Куньмин, Нанкин, Нинбо, Циндао, Санья, Шанхай, Тяньцзинь, Ухань, Сямынь от 407 EUR ~5426 -6237 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Гонг-Конг от 350 EUR ~6019 руб. Hong Kong Airlines Продажа до: 31.10.2011 Путешествие : первый вылет до 31.10.2011 (ср.,пт.,вск.) Денпасар (Бали), Джакарта, Сурабая, Пномпень, Фукуока, Нагоя, Осака, Сапорро, Токио, Бусан, Сеул, Куала-Лумпур, Пинанг, Кота-Кинабалу, Катманду, Себу, Манила, Сингапур, Гаосюн, Тайбэй, Бангкок, Пхукет, Ханой, Хошимин, Нади, Окленд от 555 EUR ~6000 руб.-6500 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Дубаи от 199 EUR ~7200 руб. Turkish Airlines Продажа: 15.05.2010-31.03.2011 Путешествие: не более 12 мес. Дубай от 200 EUR ~5165 руб. Аэросвит Путешествие: не менее 3 дней и не более 1 мес. Дублин от 199 EUR ~8800 руб. Lufthansa Бронирование за 21 день Дюссельдорф от 166 EUR ~4560 руб. Lufthansa Бронирование за 14 дней Касабланка от 249 EUR ~6259 руб. Turkish Airlines Продажа:31.03.2011 Путешествие: не более 12 мес. Ларнака от 230 EUR ~6716 руб. Аэросвит Путешествие: не более 1 мес. Ларнака от 299 EUR ~2530 руб. Белавиа Путешествие: не более 2 мес. Лондон от 138 EUR ~7590 руб. ТРАНСАЭРО Продажа до: 20.02.2011 Путешествие : до 09.06.11 Лос-Анджелес от 402 EUR ~12935 руб. ALITALIA Продажа до: 15.02.2011 Путешествие : c 15.01-15.04.11 Майами от 392 EUR ~12906 руб. ALITALIA Продажа до: 15.02.2011 Путешествие : c 15.01-15.04.11 Милан от 178 EUR ~7560 руб. Brussels Airlines Бронирование за 21 день Милан от 299 EUR ~1446 руб. Белавиа Путешествие: не более 2 мес. Мюнхен от 119 EUR ~4640 руб. Lufthansa Неаполь от 229 EUR ~5401 руб. Аэросвит Путешествие: не более 1 мес. Ницца от 219 EUR ~9000 руб. Lufthansa Бронирование за 21 день Нью-Йорк от 130 EUR ~10548 руб. Аэросвит Продажа: (не позднее 3дн до вылета) Путешествие: не более 3 мес. Нью-Йорк от 250 EUR ~12509 руб. ALITALIA Продажа до: 15.02.2011 Путешествие : c 15.01-15.04.11 Париж от 169 EUR ~9080 руб. Lufthansa Бронирование за 21 день Париж от 270 EUR ~3400 руб. Белавиа Путешествие: не более 2 мес. Пекин от 100 EUR ~10441 руб. Аэросвит Путешествие: не более 1 мес. Подгорица от 199 EUR ~6573 руб. Turkish Airlines Продажа:до 31.03.2011 Путешествие: не более 12 мес. Прага от 130 EUR ~4472 руб. Аэросвит Путешествие: не более 1 мес. Прага от 249 EUR ~840 руб. Белавиа Путешествие: не более 2 мес. Прага от 199 EUR ~4138 руб. СZECH AIRLINES Продажа до: 28.02.2011 Путешествие : 15.01-28.02.2011 Рим от 198 EUR ~7600 руб. Brussels Airlines Бронирование за 21 день Рим от 299 EUR ~1448 руб. Белавиа Путешествие: не более 2 мес. София от 179 EUR ~4106 руб. Аэросвит Путешествие: не более 1 мес. Стокгольм от 179 EUR ~1871 руб. Белавиа Путешествие: не более 2 мес. Тбилиси от 249 EUR ~818 руб. Белавиа Путешествие: не более 3 мес. Тегеран от 269 EUR ~1399 руб. Белавиа Путешествие: не более 2 мес. Тель-Авив от 128 EUR ~6562 руб. ТРАНСАЭРО Продажа до: 15.04.2011 Путешествие : до 15.04.11 Токио, Осака, Саппоро, Фукуока, Окинава, Нагоя от 360 EUR ~8400 руб. JAL Продажа до: 14.02.2011 Путешествие : c 14.02-14.03.11 (ручная маска) Торонто от 377 EUR ~12765 руб. ALITALIA Продажа до: 15.02.2011 Путешествие : c 15.01-15.04.11 Франкфурт-на-Майне от 119 EUR ~4880 руб. Lufthansa Чикаго от 299 EUR ~12646 руб. ALITALIA Продажа до: 15.02.2011 Путешествие : c 15.01-15.04.11 Эрджан от 236 EUR ~2235 руб. Turkish Airlines Путешествие : не более 12 мес. Все цены в рублях могут изменяться в зависимости от курса обмена валют на день выписки. забронируйте по телефону (495) 789-66-85 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 31353 bytes Desc: not available URL: From ginettenildapg at acbs.com Mon Feb 14 21:32:19 2011 From: ginettenildapg at acbs.com (Ginette Nilda) Date: Mon, 14 Feb 2011 22:32:19 -0700 Subject: Buy V|AGRA ONLINE - Discounts and Free Shipping applied. 24/7 Online support, Absolute anonymity & Fast delivery Message-ID: <201102142232.68316DB21CE04BADF14D8F9@qtkhpxsb> BUY V | A G R A Online Overnight Shipping - Lowest price Buy V | A G R A ONLINE - Discounts and Free Shipping applied. 24/7 Online support, Absolute anonymity & Fast delivery http://buyhealthonline.ru From ira at e-magnet.ru Tue Feb 15 00:20:26 2011 From: ira at e-magnet.ru (=?koi8-r?B?0MnXzyDEzNEgx9XSzcHOz9c=?=) Date: Tue, 15 Feb 2011 10:20:26 +0200 Subject: =?koi8-r?B?0MnXzyDLIDIzIMbF19LBzNE=?= Message-ID: <782651750.55895771281830@e-magnet.ru> http://доставка-пива.рф/ From amandaclemenciapj at acadian.com Tue Feb 15 10:23:01 2011 From: amandaclemenciapj at acadian.com (Amanda Clemencia) Date: Tue, 15 Feb 2011 11:23:01 -0700 Subject: You Can Enjoy Bigger, Harder, More Intense Erections! Message-ID: <201102151124.6C6586B52DBB04F1FBF260@6evj78c> Male Enhancement Pills, Natural Penis Enhancement, Penis Pills MaxMan Pills are male enhancement pills and an all natural penis enhancement that is rated No 1 You Can Enjoy Bigger, Harder, More Intense Erections! http://longpenisman.ru From elinnearm at stjohnprospect.com Tue Feb 15 15:08:05 2011 From: elinnearm at stjohnprospect.com (Ebony Linnea) Date: Tue, 15 Feb 2011 16:08:05 -0700 Subject: MaxMan Pills are male enhancement pills and an all natural penis enhancement that is rated No 1 Message-ID: <37o68e45l41-85066997-073c9g77@tijgcjvm> Male Enhancement Pills, Natural Penis Enhancement, Penis Pills MaxMan Pills are male enhancement pills and an all natural penis enhancement that is rated No 1 You Can Enjoy Bigger, Harder, More Intense Erections! http://longpenisment.ru From irinahv at wordkeeper.ru Tue Feb 15 13:49:40 2011 From: irinahv at wordkeeper.ru (=?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxQ==?=) Date: Tue, 15 Feb 2011 22:49:40 +0100 Subject: =?koi8-r?B?78LOwczJ3snXwc7JxSDkzNEg/sXHzz8=?= Message-ID: <6EB439B2009F49F0B9AB5517DC2E9DBE@honzikkwvicjl4> Восемнадцатого февраля 201Iг. код: (четыре девять пять) ЧЧ5/З266 : 44/539_68 Правильное Налоговое планирование исключает фирмы-однодневки и обналичку 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности…); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) – как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП – легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 (Ч95) Ч45З266 **** ЧЧ-5-4О._95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4006 bytes Desc: not available URL: From dimett at dom-so.ru Wed Feb 16 01:28:42 2011 From: dimett at dom-so.ru (Dollie Phelps) Date: Wed, 16 Feb 2011 11:28:42 +0200 Subject: =?koi8-r?B?68HLz9cgq9PSz8sgx8/Ezs/T1Mm7IM/GxtvP0sE/?= Message-ID: ВСЕ ОФФШОРНЫЕ СХЕМЫ за раз понятным человеческим языком! Как законно снижать налоги в 2011-м? Как построить хорошую торговую схему? Как торговать с Европой, США, СНГ, Китаем? Как вернуть в РФ оффшорный капитал? Как снизить таможенные платежи? Как построить рабочую схему с займами? Анализ схемы с роялти, агентской, схемы владения, дивидендной и др. Как обосновать оффшорную деловую цель? Как защитить и скрыть владельца? У каких налоговых решений "истекает срок годности"? Есть ли альтернатива Кипру? Кто такие "номиналы" и чем они опасны? Как проверить чистоту "готовой" компании? Кто отвечает по долгам оффшора? Что делать если пропал оффшорный администратор? Как крадут информацию о клиентах из банков? Рейтинг банков, допустивших утечки. Как ФНС разбивает оффшорные схемы? Вопросы про VAT-ID и НДС. Обмен информацией между странами. Опасные ошибки схемотехники! Ответы на эти и многие другие вопросы мы впервые собрали и систематизировали в рамках одного семинара, который предлагаем Вашему вниманию: ОФФШОРНАЯ СХЕМОТЕХНИКА: ПРАКТИКА 100 ВАЖНЫХ ВОПРОСОВ Ежегодные семинар-практикум 3-го Марта в Москве от международной консалтинговой компании и крупнейшего банка Кипра Зарегистрироваться и получить полный список всех 100 вопросов: +7 (495) 697-36-67; +7 (916) 340-58-29 Этот семинар будет полезен для тех, кто только делает свои первые, оффшорные "шаги". Хотя, и тем, кто налоговые решения уже строить умеет, мы бы рекомендовали проверить их на ошибки. В рамках данного семинара мы расскажем обо ВСЕХ, наиболее часто используемых налоговых решениях. Решений таких получилось 22 штуки, а хорошо разбираться в них помогут ответы на 100 конкретно поставленных вопросов. Для начала мы подробно остановимся на вопросах, связанных с базовыми понятиями "схемотехники": Что такое оффшоры, оншоры, номиналы, агенты, бенефициары, трастовые декларации, кто, кого и как контролирует, скрывает и защищает, кто, чем владеет, управляет и за что несет ответственность. Что такое постоянное представительство и налоги у источника, когда они возникают, на что влияют и чем опасны. Как регистрируются и сопровождаются компании-нерезиденты, сколько это стоит, как быстро происходит, чем и как "набиваются" уставники, куда оплачиваются, насколько часто и проблемно сдаются отчеты и, что будет, если их сдавать нулевыми. По каким принципам должны строиться устойчивые схемы, как выбирать "белые" юрисдикции, каких "черных списков" стоит бояться и где их искать, в каких юрисдикциях "оставаться", а какие "обходить стороной"? В итоге мы разберем каждую из 22-х схем на предмет налоговых последствий и рисков, рассмотрим какие компании и страны могут быть для таких решений идеальными, а какие – "запасными" вариантами. Рассмотрим принципы построения схем владения, конфиденциальности и защиты активов и их владельцев. Подробно остановимся на вопросах выбора обслуживающего банка и, конкретно, на их тарифах, требованиях, скорости обслуживания, гарантиях, "болтливости", лояльности и защищенности от утечек информации о клиентах (через межгосударственные запросы или банальную кражу данных). И в заключении, рассмотрим каждую схему на предмет наиболее распространенных ошибок и сбоев. В итоге, "перетрясем" 22 схемы, 40 юрисдикций и 32 банка. Хватит искать "проверенные схемы" в интернете и слушать оффшорные басни людей, разбирающихся в теме поверхностно! Не стоит строить налоговые решения наугад. Научитесь САМИ разбираться в проблеме. Не забывайте, что за налоговые ошибки может последовать и уголовное наказание. Подробная информация  и регистрация по телефонам: +7 (495) 697-36-67; +7 (916) 340-58-29 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4695 bytes Desc: not available URL: From diqit at iboya.com Tue Feb 15 21:43:44 2011 From: diqit at iboya.com (Pasquale Craft) Date: Wed, 16 Feb 2011 12:43:44 +0700 Subject: =?koi8-r?B?6/LzLiDhwsXSxMnOzy3BzsfV09kuIPDSz8TB1sEg0MzFzcXOztnIIM7F?= =?koi8-r?B?1MXMxcogySDC2cvP1w==?= Message-ID: <000d01cbcd9c$791431f0$6400a8c0@diqit> НЕТЕЛИ ПЛЕМЕННЫЕ АБЕРДИНО-АНГУССКОЙ ПОРОДЫ БЫКИ ПЛЕМЕННЫЕ АБЕРДИНО-АНГУССКОЙ ПОРОДЫ Цена от 50.000 руб. Цена От 80.000 руб. Класс животных Элита / Элита-рекорд Класс животных Элита / Элита-рекорд Средний живой вес 350 кг Средний живой вес 500 кг Возраст 20 мес. Возраст 24 мес. (495) 669 94 18 Группа предприятий занимается разведением, выращиванием и племенной продажей крупного рогатого скота абердин-ангусской породы. К продаже предлагаются высококлассные животные с подтвержденным генетическим потенциалом и объективной оценочной стоимостью. Животные имеют всю соответствующую сопроводительную документацию, подтверждающую их племенную ценность и качество. Скот комолый (безрогий), чёрной масти. У животных короткие, правильно поставленные ноги и хорошо выраженные мясные формы; туловище широкое и глубокое, с ровной линией верха; шея короткая, незаметно сливающаяся с плечом и головой; поясница и крестец хорошо выполнены, мускулатура окорока опускается до скакательного сустава и хорошо развита. Скот быстро и хорошо откармливается и по округлости форм, скороспелости и качеству туш он стоит на первом месте. Кожа рыхлая, тонкая, эластичная; костяк животных тонкий и составляет 15 √ 18% веса туши, а жировые прослойки в мускульных волокнах повышают нежность, вкусовые и питательные качества мяса. Мясо отличается мраморностью. При скрещивании с другими породами животные очень хорошо передают потомству мясные качества. Высота в холке 120 √ 150 см; ширина груди 45 √ 65 см; ширина в маклоках 50 √ 60 см; косая длина туловища 135 √ 140 см. Продуктивность: живая масса коров 500 √ 550 кг, быков √ 750 √ 950 килограмм; новорожденных соответственно 16 √ 28 кг. Телят выращивают на подсосе до 8 месяцев, чему способствует сильно развитый материнский инстинкт коров. Среднесуточный прирост 700 √ 800 г, убойный выход 60%. Затраты корма на 1 кг привеса составляют 6.5 кормовых единиц. Племенных быков, так же предлагаемых предприятием на продажу, можно использовать не только в мясном скотоводстве, но и в молочных хозяйствах для скрещивания с коровами молочных пород и получения помесного молодняка, обладающего свойствами мясной породы. Вы можете получить более подробную информацию, фотографии животных и оставить заявку на посещение племенного репродуктора, в котором содержится скот по указанному телефону. Прайс-лист: НЕТЕЛИ БЫКИ Количество голов Цена за голову Класс Цена за голову До 10 75.000 руб. Элита 150.000 руб. От 10 до 50 70.000 руб. Элита-рекорд 130.000 руб. От 50 до 100 65.000 руб. I класс 100.000 руб. От 100 и более 50.000 руб. II класс 80.000 руб. (495) 669 94 18 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9485 bytes Desc: not available URL: From dir at 3dteapot.ru Wed Feb 16 15:07:00 2011 From: dir at 3dteapot.ru (=?koi8-r?B?89TSwcjP19nFINfazi4g1dbFIM7FINPU0sHbzs8=?=) Date: Wed, 16 Feb 2011 20:07:00 -0300 Subject: =?koi8-r?B?9c3FztjbwcXNINLB08jPxNkgzsEg19nQzMHU1SDCxczPyiDawdLQzMHU?= =?koi8-r?B?2Q==?= Message-ID: <135E43922D58468797F130F29D45E4DD@oema71555ae80c> Двадцать восьмое февраля Налоговое планирование налогообложения доходов с физических лиц. (НДФЛ, страховые взносы) 8 (495) ЧЧ_5З9.68 ; ЧЧ5.3968 Цель: Ставка обязательных страховых взносов с зарплаты с 2011 года составляет 34% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала ЕСН заменена отменой уплаты взносов с суммы дохода свыше 463 тыс. рублей, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1. Обзор изменений законодательства, связанных с повышением ставки страховых взносов. Сколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2011 гг. Какие схемы стали невыгодными; у каких налогоплательщиков положение даже улучшилось. 2. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. 3. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность в 2011 г.; * дивидендные схемы – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с кассовой дисциплиной и политикой ЦБ. Текущая ситуация с обложением таких доходов НДФЛ. 4. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Страхование жизни работников и ДМС за счет предприятия. 6. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. 7. Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 8. Использование процентных займов от физлиц. Расчет эффективности. 9. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 10. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, 11. Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!), 12. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 13. Ответы на вопросы. По желанию – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. За более подробной информацuей обpащайтеcь по тел: Московский код; ЧЧ539/68 **** 4Ч*5З.96.8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6740 bytes Desc: not available URL: From jya at pipeline.com Wed Feb 16 18:13:19 2011 From: jya at pipeline.com (John Young) Date: Wed, 16 Feb 2011 21:13:19 -0500 Subject: Anonymous Surpasses Wikileaks Message-ID: The exploits of Anonymous to hack the systems of firms providing spying services to governments and corporations suggest that the WikiLeaks mini-era has been surpassed. Much of WikiLeaks promise to protect sources is useless if the sources are not whistleblowers needing a forum for publication. Instead publishers of secret information grab it directly for posting to Torrent for anybody to access without mediation and mark-up by self-esteemed peddlers of protection, interpretationa and authentication, including media cum scholars. Arstechnica descriptions of the how the Anonymous hack are the best reading of Internet derring-do yet and far exceeds the much simpler version of WikiLeaks carefully bruited as if precious but is not according to Daniel Domscheit-Berg's revelations. AnonLeaks.ru is a remarkable advance of WikiLeaks. And promises much more by the same means and methods most associated with official spies -- NSA and CIA run the Special Collections Service to do exactly that kind of criminal aggression, along with black bag burglaries, surveillance and bugging. Contractors hiring ex-spies do much of this highly classified work as well and invent and supply the gadgets and front organizations required. Not least of importance of the Anonymous hack and the many preceding it is the revelation of how commercial firms have been exploiting public ignorance of their spying capacity. That they are themselves vulnerable is a surprise to them, as it must be to those who hire them and, in the case of governments, provide legal cover for criminal actions. This is not news, to be sure, for it has been alleged and reported on for decades but mostly in technical journals and conferences where offerers strut their malwares to buyers of perfidium. Imagine that instead of the many iterations of Wikileaks now appearing to receive and publish documents, that more of the Anonymous-type hacks simply steal the family jewels of the spies, officials, lobbyists and corporations believing they own the territory in order to show the extent of their secret predations on the public. The digitization of vast archives of government, commercial and non-governmental organizations to facilitate their hegemony provides a bounty to be hacked repeatedly despite attempts to prevent it by vainly inept cybersecurity agencies and firms. The cyber officials yell, hit the Internet Switch. Too late, too late. Anonymous controls the switch. Sure, Anonymous can be compromised with sufficient hostile and friendly inducements, but so can the predators, perhaps moreso the latter. I like that venerable Anonymous and the promise it offers as the Nymous authoritatives of secrecy frantically attempt to ban its privilege. For the WL era dutifully enshrine Julian Assange and Bradley Manning, give them Medals of Freedom as icons of what led to the rise of Unnamables worldwide. I commend Ketih for that unbreakable domain name. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From nqxdtkp at mypicture.info Wed Feb 16 20:16:05 2011 From: nqxdtkp at mypicture.info (=?ISO-2022-JP?B?GyRCJVEhPCU9JUolazt2TDM2SRsoQg==?=) Date: Thu, 17 Feb 2011 03:16:05 -0100 Subject: =?ISO-2022-JP?B?GyRCNEpDMSRLQC5OKSQ3JF4kOSRoGyhC?= Message-ID: 諦めていませんか? ━━━━━━━━━━━━━━━━━━━━━━━━━━━ ☆割り切った交流 ☆身体のみの交流 ☆都合のいい交流 既婚者だし幸せな家庭もそこにある、 でもやっぱり妻以外の女性も抱いてみたい… お互いの欲望と欲求の為だけに身体を重ね 結婚してから忘れていた熱い想いをもう一度思い出したい。 そう思ってはいるけど、そんな上手い話はない、非現実的だ!! と諦めてしまってはいませんか? 今日はそんな方に朗報です。 あなたのイヤラシイ願望や淫乱な欲望を、 参加無料で実現できる出会いの場のご紹介です。 ■セ付レ ■愛人 ■逆援 などの大人の交流を求める 積極的な女性たちが多数参加中で女性参加者の8割は既婚者。 しかも優しくリードしてくれる大人の女性がとても多いので 初めての方でも安心してご利用頂くことができます。 *18歳以上の方で大人の交流に興味のある方でしたら 誰でも参加可能で参加無料。 今まで諦めていた方はぜひこちらから ⇒http://www.quietod.com/pleasure/ ━━━━━━━━━━━━━━━━━━━━━━━━━━━ 発行:あなたにもできる大人の交流 From measl at mfn.org Thu Feb 17 07:38:50 2011 From: measl at mfn.org (J.A. Terranson) Date: Thu, 17 Feb 2011 09:38:50 -0600 (CST) Subject: [cryptography] NIST's SHA-3 finalist report published (fwd) Message-ID: ---------- Forwarded message ---------- Date: Thu, 17 Feb 2011 10:33:00 -0500 From: Jack Lloyd Reply-To: Crypto discussion list To: cryptography at randombit.net Subject: [cryptography] NIST's SHA-3 finalist report published NIST's report explaining the reasoning behind the choice of the 5 finalists in the SHA-3 competition has been released. No big surprises. http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/documents/Round2_Report_NISTIR_7764.pdf _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography From calyciawp at swpc.siemens.com Thu Feb 17 09:08:54 2011 From: calyciawp at swpc.siemens.com (Cameron Alycia) Date: Thu, 17 Feb 2011 10:08:54 -0700 Subject: Compare the best online pharmacies to buy Viagra. Order Viagra online with huge discount. Message-ID: <201102171012.DE59F3F7CF0EE91C31C277A1@e4w234872> NEXT DAY 20 x Viagra 100mg tabs ONLY $39.99! Just $1.27 a tablet! Cheap Viagra OVERNIGHT from USA stock. Free Delivery! 10% OFF for ALL reorders! FDA approved. Excellent quality of all pills without exception! We accept VISA & eCheck. http://healthdrugstore.ru From measl at mfn.org Thu Feb 17 09:38:41 2011 From: measl at mfn.org (J.A. Terranson) Date: Thu, 17 Feb 2011 11:38:41 -0600 (CST) Subject: Decentralizing the Internet So =?utf-8?Q?B?= =?utf-8?Q?ig_Brother_Can=E2=80=99t?= Find You In-Reply-To: <20110217160452.GZ23560@leitl.org> References: <20110217160452.GZ23560@leitl.org> Message-ID: This seems preety hefty on ambition and pretty low on details. Is he planning on these wal-wart "servers" acting as TOR nodes? Universally accessable wifi spots? FreeNet nodes, or LAFS servers? I think what bugs me the most here is that the basic premise appears intrinsically flawed: On Inet-1, everyone can see who you are - it's an artifact of the construction goals originally designed for. I'd want to see some more meat and less fluff before I looked any deeper. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From measl at mfn.org Thu Feb 17 11:13:29 2011 From: measl at mfn.org (J.A. Terranson) Date: Thu, 17 Feb 2011 13:13:29 -0600 (CST) Subject: Decentralizing the Internet So ... In-Reply-To: References: <20110217160452.GZ23560@leitl.org> <20110217160452.GZ23560@leitl.org> Message-ID: On Thu, 17 Feb 2011, John Young wrote: > Anybody heard from Jim Bell? Not a peep heard here > in his third go around. Is he being Bradley Manning'd? I haven't checked in a few months, but last time I did, he was in "special housing" (solitary). I don't expect anyone is likely to hear from him until his entire sentence has been served, along with a few sentence tacked on along the way for good measure (as seems to have already happened to him several times already). //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From jya at pipeline.com Thu Feb 17 10:28:54 2011 From: jya at pipeline.com (John Young) Date: Thu, 17 Feb 2011 13:28:54 -0500 Subject: Decentralizing the Internet So ... In-Reply-To: References: <20110217160452.GZ23560@leitl.org> <20110217160452.GZ23560@leitl.org> Message-ID: Whatever it is or turns out to be it will be carefully and meticulously legal. No crossing the line into criminality or the organizer will have to shop your ass in accord with governmental regulations governing the practice of law sometimes laughingly called the bar. There is a decent-sized legal and financial (they always sleep together) industry of setting up non-profits to advance alluring agendas. All legal and financially accountable as determined by inscrutible taxation laws and those who sell scrutibility by the unlimited hours. The schemes cover the broad spectrum of left, moderate, right, extreme, covert, deceptive, manipulative, hit and run, offshore, out of this world, you want your very own why no problem provide retainer sign here be in touch soon. Head for the tracks to leverage for three lovers want their dues. Anybody with over $500,000 to squander, and they all need to do that or Uncle takes a big bite, is incessantly proffered opportunities to fund a perfect fit for the psychopathology used to attain the wealth and to battle the accompanying terror of losing it to another psycho like the government or the latest bedmate of amazing understanding of the greeder's weakness due to being a world class shit. The Internet has upchucked thousands of these NGO facilitators who spam conferences, mail lists, chat rooms, dinners, panels, and oddball conclaves of wealth managers all seeking to promote goodness to bad guys with a foot in the grave, they are reminded unctuously, would you not like to consider a heritage to whiten your name. One way to fend off these leeches is to ask about their fee, not the pro bono sham, the fees for lecturing, drafting incorporation papers, sitting on boards, doing due diligence (be very afraid of due diligence for that will get you jail time, tell'em Jim Bell), defending and offending in court, publishing how-tos, escrowing bribes and alimony, the usually panoply of self-dealing in guise of public benefit, uh, protecting the client. Another way to fend off these bloodsuckers is to ask for advice on how to engage in criminal "public benefit." Whoa, he says, whoa, whoa, now way. I could be disbarred for that. You say, what would be your fee to cover that risk. Excuse me, she will say, I need to step out for a moment. You hear a dime dropping. Not calling the cops, calling a financial advisor. None of this applies to jail house lawyers or pro se. Anybody heard from Jim Bell? Not a peep heard here in his third go around. Is he being Bradley Manning'd? From jya at pipeline.com Thu Feb 17 10:30:51 2011 From: jya at pipeline.com (John Young) Date: Thu, 17 Feb 2011 13:30:51 -0500 Subject: Decentralizing the Internet So ... In-Reply-To: References: <20110217160452.GZ23560@leitl.org> <20110217160452.GZ23560@leitl.org> Message-ID: Excuse that last post. It was about architects, not lawyers. Greg Broiles is an angel, totally trustworthy. Ply him. From measl at mfn.org Thu Feb 17 13:22:49 2011 From: measl at mfn.org (J.A. Terranson) Date: Thu, 17 Feb 2011 15:22:49 -0600 (CST) Subject: Decentralizing the Internet So =?utf-8?Q?B?= =?utf-8?Q?ig_Brother_Can=E2=80=99t?= Find You In-Reply-To: References: <20110217160452.GZ23560@leitl.org> Message-ID: On Thu, 17 Feb 2011, John Case wrote: > On Thu, 17 Feb 2011, J.A. Terranson wrote: > > > This seems preety hefty on ambition and pretty low on details. Is he > > planning on these wal-wart "servers" acting as TOR nodes? Universally > > accessable wifi spots? FreeNet nodes, or LAFS servers? > > > > I think what bugs me the most here is that the basic premise appears > > intrinsically flawed: On Inet-1, everyone can see who you are - it's an > > artifact of the construction goals originally designed for. > > > > I'd want to see some more meat and less fluff before I looked any deeper. > > > The (obvious) meme going around is "we'll just set up a mesh". > > You can stop reading when you see that. A mesh network that does the things > these people want it to do is currently rocket-science hard. I'm tired of hearing the current calls for "mesh networks" myself. As you point out, they are *incredibly* complex, and these "wall-wart servers" aren't going to implement that kind of thing IMO. Christ, large ISPs still have trouble with simple IP, and they have "trained [or] experienced 'engineers'". It's a silly call to arms at this point. I was with a group that tried to work out a mesh implementation across a relatively small (~15sq miles) area, and it never came to fruition, despite several years of work on the problems presented. > It can be done, and I'd be the first one celebrating, but from the mouths of > these morons its just mental masturbation. I don't even see *that* coming from this particular ?press release?. Just a "build it and people will do it" [hrmm.. Build it and They will come". Where have I heard *that* before?] theme, with no particular goal in mind other than wide "implementation (which is glaringly undefined)". Whats the point, and how do I know that these guys are even competent to decide on a goal - just because they're with EFF? A lawyer who likes to code is a *long* way from the kind of talent that can make these little things useful for anything more than maybe [sntp server||dns server-small||etc.). Has anyone looked at the scaling problems of having these warts fully disseminated into the population, and "plugged in"? Like I said, it sounds like some vague, undefined project that nobody has yet actually looked at with any seriousness. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From eugen at leitl.org Thu Feb 17 06:53:42 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 17 Feb 2011 15:53:42 +0100 Subject: Anonymous Surpasses Wikileaks Message-ID: <20110217145342.GW23560@leitl.org> ----- Forwarded message from John Young ----- From eugen at leitl.org Thu Feb 17 08:04:52 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 17 Feb 2011 17:04:52 +0100 Subject: Decentralizing the Internet So =?utf-8?Q?B?= =?utf-8?Q?ig_Brother_Can=E2=80=99t?= Find You Message-ID: <20110217160452.GZ23560@leitl.org> http://www.nytimes.com/2011/02/16/nyregion/16about.html?_r=1&pagewanted=print Decentralizing the Internet So Big Brother Canbt Find You By JIM DWYER On Tuesday afternoon, as Secretary of State Hillary Rodham Clinton spoke in Washington about the Internet and human liberty, a Columbia law professor in Manhattan, Eben Moglen, was putting together a shopping list to rebuild the Internet b this time, without governments and big companies able to watch every twitch of our fingers. The list begins with bcheap, small, low-power plug servers,b Mr. Moglen said. bA small device the size of a cellphone charger, running on a low-power chip. You plug it into the wall and forget about it.b Almost anyone could have one of these tiny servers, which are now produced for limited purposes but could be adapted to a full range of Internet applications, he said. bThey will get very cheap, very quick,b Mr. Moglen said. bTheybre $99; they will go to $69. Once everyone is getting them, they will cost $29.b The missing ingredients are software packages, which are available at no cost but have to be made easy to use. bYou would have a whole system with privacy and security built in for the civil world we are living in,b he said. bIt stores everything you care about.b Put free software into the little plug server in the wall, and you would have a Freedom Box that would decentralize information and power, Mr. Moglen said. This month, he created the Freedom Box Foundation to organize the software. bWe have to aim our engineering more directly at politics now,b he said. bWhat has happened in Egypt is enormously inspiring, but the Egyptian state was late to the attempt to control the Net and not ready to be as remorseless as it could have been.b Not many law professors have Mr. Moglenbs credentials as lawyer and geek, or, for that matter, his record as an early advocate for what looked like very long shots. Growing up on the West Side of Manhattan, he began fooling around with computers as a boy. In 1973, at age 14, he was employed writing programs for the Scientific Time Sharing Corporation. At 26, he was a young lawyer, clerking for Justice Thurgood Marshall. Later, he got a Ph.D. in history from Yale. He was also the lawyer for the Free Software Foundation, headed by Richard M. Stallman, which aggressively b and successfully b protected the ability of computer scientists, hackers and hobbyists to build software that was not tied up by copyright, licensing and patents. In the first days of the personal computer era, many scoffed at the idea that free software could have an important place in the modern world. Today, it is the digital genome for millions of phones, printers, cameras, MP3 players, televisions, the Pentagon, the New York Stock Exchange and the computers that underpin Googlebs empire. This month, Mr. Moglen, who now runs the Software Freedom Law Center, spoke to a convention of 2,000 free-software programmers in Brussels, urging them to get to work on the Freedom Box. Social networking has changed the balance of political power, he said, bbut everything we know about technology tells us that the current forms of social network communication, despite their enormous current value for politics, are also intensely dangerous to use. They are too centralized; they are too vulnerable to state retaliation and control.b In January, investors were said to have put a value of about $50 billion on Facebook, the social network founded by Mark Zuckerberg. If revolutions for freedom rest on the shoulders of Facebook, Mr. Moglen said, the revolutionaries will have to count on individuals who have huge stakes in keeping the powerful happy. bIt is not hard, when everybody is just in one big database controlled by Mr. Zuckerberg, to decapitate a revolution by sending an order to Mr. Zuckerberg that he cannot afford to refuse,b Mr. Moglen said. By contrast, with tens of thousands of individual encrypted servers, there would be no one place where a repressive government could find out who was publishing or reading bsubversiveb material. In response to Mr. Moglenbs call for help, a group of developers working in a free operating system called Debian have started to organize Freedom Box software. Four students from New York University who heard a talk by Mr. Moglen last year have been building a decentralized social network called Diaspora. Mr. Moglen said that if he could raise bslightly north of $500,000,b Freedom Box 1.0 would be ready in one year. bWe should make this far better for the people trying to make change than for the people trying to make oppression,b Mr. Moglen said. bBeing connected works.b E-mail: dwyer at nytimes.com From dir at 89166806820.ru Thu Feb 17 15:39:18 2011 From: dir at 89166806820.ru (=?koi8-r?B?7sXEz8LSz9PP18XT1M7ZxSDQz9PUwdfdycvJ?=) Date: Thu, 17 Feb 2011 18:39:18 -0500 Subject: =?koi8-r?B?8NLJ2s7By8kgzsXEz8LSz9PP18XT1M7ZyCDQz9PUwdfdycvP1w==?= Message-ID: <000d01cbcefb$e4d21f00$6400a8c0@dir> 25 Февраля Тема: НЕДОБРОСОВЕСТНЫЕ ПОСТАВЩИКИ. КАК СОХРАНИТЬ ВЫЧЕТЫ, УЙТИ ОТ ОТВЕТСТВЕННОСТИ код: (четыре девять пять) 792/-21./22 ; Ч*Ч-5.З*2-/6_6 Цель обучения: Обучающий курс даст слушателям ответ на то, как правильно заключать договоры и что делать, если он ошибся, но при этом хотел бы сохранить свои налоговые обязательства без изменений. Слушатели будут точно знать, что и как отвечать налоговой инспекции в случае проверки таких контрагентов. Поймут, как можно уйти от НДС без последствий. В период кризисных явлений в экономике, и как следствие острой нужды государства в пополнении бюджета, ФНС ужесточила требования к проверкам - повысила границу результативности проверок до миллиона рублей (приказ ФНС ╧409), а также предложила идти простым путем √ находить среди контрагентов налогоплательщика компании, которые подпадают под признаки недобросовестных и лишать налогоплательщика налоговых льгот полученных в результате взаимодействия с такими организациями (Приказ ФНС России ╧ММ-3-2/467@). Практика свидетельствует, что практически все проверки налогоплательщиков применяющих ОСН затрагивают данный вопрос с негативными для налогоплательщика последствиями. При этом налоговый орган исключает из состава затрат НП и вычетов по НДС суммы по контрагентам, которые, например, просто не отвечают на запрос в рамках встречных проверок, либо не заплатили налоги и т.п. Подчас очень тяжело отстоять свою правоту в спорах с налоговым органом. Курс посвящен вопросу защиты налогоплательщика, призван помочь ему как не погрязнуть в тотальных проверках своих контрагентов, так и впоследствии защитить свои права по взаимоотношениям я такими компаниями. На Обучении не только будут показаны способы противодействия придиркам налоговой, но и будут разобраны способы заключения договоров, которые в принципе исключают возможность признания лица недобросовестным, а также законные способы снижение налоговой нагрузки по НДС в том случае, если налогоплательщик в этом заинтересован. Программа: 1. Методические указания Минфина о назначении выездных налоговых проверок (включая Приказ ФНС от 22.09.10 N ММB-7-2/461@, Приказ УФНС по г. Москве от 1 сентября 2008 г ╧409 и др.) 2. Методические указания Минфина по поиску недобросовестных контрагентов. Рассмотрение мер, которые планирует принять Минфин, Минюст по борьбе с однодневками. 3. Основания признания налоговой выгоды необоснованной (на основании судебной практики, писем Минфина, практики проверок). 4. Что необходимо сделать, чтобы проявить разумную осмотрительность. Какие документы и какую информацию о контрагенте необходимо собрать. 5. Как защититься от претензий налогового органа о том, что контрагент: * не платит налоги и не сдает отчетность; * не отвечает на встречные проверки; * не находиться по месту регистрации, либо зарегистрирован по адресу массовой регистрации; * директор БОМЖ, ничего не подписывал, его подпись подделали и т.п. * директор является "массовым", в отношении руководителя проводятся розыскные мероприятия; * проведенный осмотр показал, что компания не могла отгрузить товар с адреса, указанного в накладной, счете-фактуре; * коды ОКВЭД контрагента не позволяют ему произвести действия, которые он якобы произвел по отношению к налогоплательщику (не может выполнять работы, поставлять товар и тп., так как создан для иных целей); * иные претензии. 6. Анализ предмета доказывания по спорам о получении необоснованной налоговой выгоды. Установление размера требований по подобным делам. Взыскание всех ранее заявленных вычетов и расходов как нарушение принципа соразмерности и справедливости. Анализ аналогичной практики Европейского Суда. 7. Разбор основных ошибок допускаемых налоговыми органами в процессе доказывания получение налоговый выгоды (встречные проверки реально не проводятся, а данные берется из компьютерной системы учета, вместо допросов проводиться опрос, вместо экспертизы получаются заключения специалиста и т.п.). Как использовать ошибки (подробно). 8. Создание преюдиции для доказывания реальности сделки. 9. Способ ухода от признания налоговой выгоды необоснованной при заключении договоров с поставщиками при помощи посредника. Как построить договор, чтобы претензии по поставщикам нельзя было предъявить. 10. Уход от признания налоговой выгоды необоснованной путем особого способа заключения договоров. 11. Уход от уплаты НДС с наценки путем: * заключения договора с дополнительной выгодой; * включение условий о неустойки; * использование простого товарищества. 12. Кто отвечает за работу с недобросовестными контрагентами (директор или бухгалтер) и в какой части. Рассмотрение основных законодательных инициатив и принятых в последнее время законов, направленных на борьбу с "однодневками". 13. Потеря документов по недобросовестным поставщикам. Налоговые последствия. Указания Минфина по привлечению к ответственности в таком случае. Способ защиты от налоговых претензий. Является ли потеря документов защитой от претензий правоохранительных органов. 14. Анализ возможности рассмотрения любого налогового спора в Арбитражном суде г. Москвы, как способ обойти негативную практику конкретного региона. 15. Изменение практики компенсации судебных издержек. 16. Ответы на индивидуальные вопросы. Cтоимоcть: 7900 руб. Информацию можно получить по телефонам: 8 Моск. код: 44/539_68 : 7922I-2*2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8604 bytes Desc: not available URL: From case at sdf.lonestar.org Thu Feb 17 13:04:05 2011 From: case at sdf.lonestar.org (John Case) Date: Thu, 17 Feb 2011 21:04:05 +0000 (UTC) Subject: Decentralizing the Internet So =?utf-8?Q?B?= =?utf-8?Q?ig_Brother_Can=E2=80=99t?= Find You In-Reply-To: References: <20110217160452.GZ23560@leitl.org> Message-ID: On Thu, 17 Feb 2011, J.A. Terranson wrote: > This seems preety hefty on ambition and pretty low on details. Is he > planning on these wal-wart "servers" acting as TOR nodes? Universally > accessable wifi spots? FreeNet nodes, or LAFS servers? > > I think what bugs me the most here is that the basic premise appears > intrinsically flawed: On Inet-1, everyone can see who you are - it's an > artifact of the construction goals originally designed for. > > I'd want to see some more meat and less fluff before I looked any deeper. The (obvious) meme going around is "we'll just set up a mesh". You can stop reading when you see that. A mesh network that does the things these people want it to do is currently rocket-science hard. It can be done, and I'd be the first one celebrating, but from the mouths of these morons its just mental masturbation. From eugen at leitl.org Thu Feb 17 13:35:26 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 17 Feb 2011 22:35:26 +0100 Subject: Decentralizing the =?utf-8?Q?Internet_?= =?utf-8?Q?So_Big_Brother_Can=E2=80=99t?= Find You In-Reply-To: References: <20110217160452.GZ23560@leitl.org> Message-ID: <20110217213526.GO23560@leitl.org> On Thu, Feb 17, 2011 at 09:04:05PM +0000, John Case wrote: > On Thu, 17 Feb 2011, J.A. Terranson wrote: > >> This seems preety hefty on ambition and pretty low on details. Is he >> planning on these wal-wart "servers" acting as TOR nodes? Universally I think they're drafting up the specs. Tor would be a save idea, ip2 and LAFS-Tahoe another. >> accessable wifi spots? FreeNet nodes, or LAFS servers? Not necessarily WiFi, thogh if the wall wart has a radio, why not. Just another NIC. >> >> I think what bugs me the most here is that the basic premise appears >> intrinsically flawed: On Inet-1, everyone can see who you are - it's an >> artifact of the construction goals originally designed for. >> >> I'd want to see some more meat and less fluff before I looked any deeper. > > > The (obvious) meme going around is "we'll just set up a mesh". I think you're being too harsh here. These are wired nodes, running vanilla current p2p stuff. Tor e.g. might not scale to a meganode, but it would be fun to find out when and how it breaks. > You can stop reading when you see that. A mesh network that does the > things these people want it to do is currently rocket-science hard. I notice you didn't comment on the sketch I gave you. While not a rocket surgeon, the issue of routing by itself is doable, provided you meet certain constraints. I wish I had time to write a simulator for that to prove a few points. > It can be done, and I'd be the first one celebrating, but from the mouths > of these morons its just mental masturbation. Let's compare notes. I tell you how I think it could be done, and you take it apart. Deal? -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jtrjtrjtr2001 at yahoo.com Fri Feb 18 01:31:58 2011 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Fri, 18 Feb 2011 01:31:58 -0800 (PST) Subject: Reliably Erasing Data From Flash-Based Solid State Drives In-Reply-To: <20110218083553.GQ23560@leitl.org> Message-ID: <442605.58716.qm@web33305.mail.mud.yahoo.com> This may be of interest Abstract: Reliably erasing data from storage media (sanitizing the media) is a critical component of secure data management. While sanitizing entire disks and individual files is well-understood for hard drives, flash-based solid state disks have a very different internal architecture, so it is unclear whether hard drive techniques will work for SSDs as well. We empirically evaluate the effectiveness of hard drive-oriented techniques and of the SSDsb built-in sanitization commands by extracting raw data from the SSDbs flash chips after applying these techniques and commands. Our results lead to three conclusions: First, built-in commands are effective, but manufacturers sometimes implement them incorrectly. Second, overwriting the entire visible address space of an SSD twice is usually, but not always, sufficient to sanitize the drive. Third, none of the existing hard drive-oriented techniques for individual file sanitization are effective on SSDs. This third conclusion leads us to develop flash translation layer extensions that exploit the details of flash memorybs behavior to efficiently support file sanitization. Overall, we find that reliable SSD sanitization requires built-in, verifiable sanitize operations. http://www.usenix.org/events/fast11/tech/full_papers/Wei.pdf From measl at mfn.org Fri Feb 18 01:36:56 2011 From: measl at mfn.org (J.A. Terranson) Date: Fri, 18 Feb 2011 03:36:56 -0600 (CST) Subject: Decentralizing the =?utf-8?Q?Internet_?= =?utf-8?Q?So_Big_Brother_Can=E2=80=99t?= Find You In-Reply-To: <20110218083553.GQ23560@leitl.org> References: <20110217160452.GZ23560@leitl.org> <20110218083553.GQ23560@leitl.org> Message-ID: Note: Reply made on a free form stream-of-consciousness basis. On Fri, 18 Feb 2011, Eugen Leitl wrote: > If you're talking mesh, one of the basic requirements is to get > rid of central address allocation authority and establish > a local-knowledge based routing. Thats not as easy as it sounds, especially in hyperdense cities - although I will also admit that this is more a 70% administrative issue than an technical issue. It's unlikely that anyone in their right minds is going to just open up their networks to both unlimited and unmonitored connections, but even if they do, they are going to demand some allocation control and accountability. Not that it's necessary for any technical reason, but because it's required for the people who both pay the network bills and receive FBI "letters" / subpoenas: even the smallest networks have some kind of "security department", even if it's the same guy who does everything else there. This is where the idea truly breaks down. I wouldn't allow an open wifi connection when I know that any illicit activities are going to come back to haunt *me* when the FBI does their next "predator sweep". No municipality is going to allow geocoded/derived addressing for the exact same reason: they want to be able to point the finger when the time comes. They also want to know if your node is acting up, where they can go /phone to make you fix it. Mesh networks are a political disaster *before* anyactual engineering time goes in. But if you are lucky enough to get past the politics (hard. really hard.), then you start down the actual engineering pipe: traffic planning and engineering is at best difficult, at worst impossible, without centralized control. So do we just assume that the warts know not to exceed bandwidth(x), and plan for max(y) warts per square mile/kilometer? Do we assume that all these warts are going to be using passive connections for ftp? this road leads back to political questions by the way. The residential carriers will go postal if 100k home connections are suddenly offering services and draining back through the cable/dsl drains, against their AUP/ToS. If you choose to create layer 2 drain solutions you are back to tight and centralized allocation control. > If you get that far, the human operator mistakes are removed from the > loop. > > > I was with a group that tried to work out a mesh implementation across a > > relatively small (~15sq miles) area, and it never came to fruition, > > despite several years of work on the problems presented. > > Do you have a pointer to description of your project, and what went > wrong? This was a municipal project, so I can't point you anywhere: sorry. As for what went wrong: everything. Everyone who touches the mesh has questions/issues of the nature I alluded to above. Muni IT demands to be able to track back every ip to a known user, meaning any kind of geolocation solution is gone right off the bat. By the way, the reasoning here wasn't what I was expecting: they were more concerned with virus control and quarantine (which implies a separate layer 2 sandbox for infected connections, or connections carrying infected traffic where such can be accurately and reliably determined - which is about 50% of the time). The muni wanted a known IP for each user, with certain wifi hotspots exempted to local rfc1913 networks using DHCP. We had interesting times with these hotspots too! Not having enough IPs on a public wifi segment causes weird behaviour that the basic call desk cant troubleshoot, and that they don't recognize as being broken - so these spots get reputations as being "unreliable". Significant automation was assembled just to keep track of required resources vs actual available resources, with traps going out when automation sees something we dont. The traffic engineering issues are perverse. Meditate on them for a little while, and consider all of the ways you can slice your own throat. Is a steady rise in users a trend, or did the bookings for conventions just have a good year? Are you meeting peak demand, or are you oversubscribing on your backbone? *Is* there a backbone? Lots of questions at layers 1 and 2! In fact, layer 2 is where you're going to spend a *lot* of your time, unlike the operation of a more traditional IP network, where you spend the vast majority of your time at layer 3. Segregation is a necessary ingredient, as well as scanning-on-allocation to check for blatantly rooted connections. This gets tricky as hell. We were asked to plan for each muni supporting drains for the connections made within their geographic areas: oops! Looks like I want geo-derived addresses again! Except that these same munis have the additional condition of only wanting to allocate for their own taxpayers: oops! Back to centralized control and allocation... Round and round you go... Everyone here knows IP well, and can add a hundred things that I've not touched on. Every time you add a condition, you increase complexity, and these increases are *not* linear! > I can tell you one thing: Eben Moglen is not a stupid man, and he's I never alleged that he was stupid. I know he's no moron. But he's also not thinking this through, he's looking to build the device before he knows his application. Thats fine for general purpose machinery with lots of cycles and storage to spare, but a wart is likely to be max'd out at ultra-small storage and cpu limits: virtually every wart-driven device was designed to act as a simple bridge or router, which requires surprisingly little computing power: An old 386 is massive overkill for acting as a router on lines up to about 3mbps - while these warts may have more *cycles* available than an old throwaway box, they are going to have [at best] a few hundred megabytes of flash storage: not a lot of room there for anything meaningful. > surrounded with technically capable people. If he can raise the money > for 10-100 k wall wart units you can assume people will do useful > things with them. I can assume people will do *something* with them, but *useful* things, no, I cannot just assume that - that will be something I'll have to see to believe. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From measl at mfn.org Fri Feb 18 04:52:33 2011 From: measl at mfn.org (J.A. Terranson) Date: Fri, 18 Feb 2011 06:52:33 -0600 (CST) Subject: BGP (in)security makes the AP wire In-Reply-To: <20110218121423.GF23560@leitl.org> References: <20110218121423.GF23560@leitl.org> Message-ID: > > Presumably, one could prototype something simple and cheap at L2 level > > with WGS 84->MAC (about ~m^2 resolution), custom switch firmware and GBIC > > for longish (1-70 km) distances, but without a mesh it won't work. > > It was discussed during the IPng days. My view at the time -- and my > view today -- is that there's an inherent conflict between that and > multiple competitive ISPs. Suppose there's an IP address corresponding > to 40.75013351 west longitude, 73.99700928 north latitude (my building, > according to Google maps). To which ISP should it be handed for > delivery? Must all ISPs in a given area peer with each other? There go those pesky L2 political questions! //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From eugen at leitl.org Fri Feb 18 00:35:53 2011 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 18 Feb 2011 09:35:53 +0100 Subject: Decentralizing the =?utf-8?Q?Internet_?= =?utf-8?Q?So_Big_Brother_Can=E2=80=99t?= Find You In-Reply-To: References: <20110217160452.GZ23560@leitl.org> Message-ID: <20110218083553.GQ23560@leitl.org> On Thu, Feb 17, 2011 at 03:22:49PM -0600, J.A. Terranson wrote: > I'm tired of hearing the current calls for "mesh networks" myself. As you > point out, they are *incredibly* complex, and these "wall-wart servers" > aren't going to implement that kind of thing IMO. Christ, large ISPs I fail to see where they're mentioning the word mesh at all. If I would do it, I would just package Tor, Tahoe-LAFS, I2P and maybe a couple other select goodies (tinc, opportunistic encryption, whatever), and put it on the residential Internet. If you recall I repeatedly suggested that here and elsewhere, to the overwhelming sound of crickets. > still have trouble with simple IP, and they have "trained [or] experienced > 'engineers'". It's a silly call to arms at this point. If you're talking mesh, one of the basic requirements is to get rid of central address allocation authority and establish a local-knowledge based routing. If you get that far, the human operator mistakes are removed from the loop. > I was with a group that tried to work out a mesh implementation across a > relatively small (~15sq miles) area, and it never came to fruition, > despite several years of work on the problems presented. Do you have a pointer to description of your project, and what went wrong? > > It can be done, and I'd be the first one celebrating, but from the mouths of > > these morons its just mental masturbation. > > I don't even see *that* coming from this particular ?press release?. Just > a "build it and people will do it" [hrmm.. Build it and They will come". > Where have I heard *that* before?] theme, with no particular goal in mind > other than wide "implementation (which is glaringly undefined)". Whats > the point, and how do I know that these guys are even competent to decide > on a goal - just because they're with EFF? A lawyer who likes to code is > a *long* way from the kind of talent that can make these little things > useful for anything more than maybe [sntp server||dns server-small||etc.). > Has anyone looked at the scaling problems of having these warts fully > disseminated into the population, and "plugged in"? > > Like I said, it sounds like some vague, undefined project that nobody has > yet actually looked at with any seriousness. I can tell you one thing: Eben Moglen is not a stupid man, and he's surrounded with technically capable people. If he can raise the money for 10-100 k wall wart units you can assume people will do useful things with them. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From sdw at lig.net Fri Feb 18 10:53:19 2011 From: sdw at lig.net (Stephen Williams) Date: Fri, 18 Feb 2011 10:53:19 -0800 Subject: [FoRK] Decentralizing the Internet So Big Brother Canbt Find You Message-ID: I was really interested in Plug Computers a year or two ago, and I have a couple development units. For this kind of application, it seems that a certain range of applications, like personal servers and remote access to archives, is obvious (and there is an "app plug computer" for that, about $100). For really solving the decentralized problem, you'd want to pair it with mesh communications. I see several possibilities. Wifi-Wifi would be great, but there are antenna and power issues in many cases. Wifi-cellphone-picocell is more interesting because cell phones already can make significantly more distance than typical WiFi. This is also interesting if you add in resilient routing / store and forward / dynamic multi-modal addressing (including geo). Ideally, you can cover any distance and gaps for at least some transmission, and great transmission when possible, by opportunistically hitching a ride on any device to any device proximity. These devices (plug computers, smart phones, picocells, wifi base stations, bluetooth, zigbee) are inexpensive and low power enough that they could be just about everywhere. Every vehicle, street light / signal, business, person, and even important street surfaces and similar could be wirelessed with an open, cooperative, protocol. Doing it while controlling abuse and making use fair is the problem. The biggest hard problem is probably preventing bombing by e-signal. Some possible solutions: A) blackout in appropriate conditions (hard to prevent abuse of) and B) super-tracing / persistent following after the fact when a bad event happens and enough people vote for extreme transparency. In other words, detect the explosion or whatever, people hit the panic button, and every possible trigger is tracked back to a likely source and those sources are tracked for some time using all methods. There are a number of obvious apps for this kind of network: shotspotter (a la Bump) for all devices. Person-aware (what I mentioned yesterday a la traffic safety to prevent hitting children and animals in congested traffic areas). Emergency service / help expediting. sdw On 2/17/11 8:04 AM, Eugen Leitl wrote: > http://www.nytimes.com/2011/02/16/nyregion/16about.html?_r=1&pagewanted=print > > Decentralizing the Internet So Big Brother Canbt Find You > > By JIM DWYER > > On Tuesday afternoon, as Secretary of State Hillary Rodham Clinton spoke in > Washington about the Internet and human liberty, a Columbia law professor in > Manhattan, Eben Moglen, was putting together a shopping list to rebuild the > Internet b this time, without governments and big companies able to watch > every twitch of our fingers. > > The list begins with bcheap, small, low-power plug servers,b Mr. Moglen said. > bA small device the size of a cellphone charger, running on a low-power chip. > You plug it into the wall and forget about it.b > > Almost anyone could have one of these tiny servers, which are now produced > for limited purposes but could be adapted to a full range of Internet > applications, he said. > > bThey will get very cheap, very quick,b Mr. Moglen said. bTheybre $99; they > will go to $69. Once everyone is getting them, they will cost $29.b > > The missing ingredients are software packages, which are available at no cost > but have to be made easy to use. bYou would have a whole system with privacy > and security built in for the civil world we are living in,b he said. bIt > stores everything you care about.b > > Put free software into the little plug server in the wall, and you would have > a Freedom Box that would decentralize information and power, Mr. Moglen said. > This month, he created the Freedom Box Foundation to organize the software. > > bWe have to aim our engineering more directly at politics now,b he said. > bWhat has happened in Egypt is enormously inspiring, but the Egyptian state > was late to the attempt to control the Net and not ready to be as remorseless > as it could have been.b > > Not many law professors have Mr. Moglenbs credentials as lawyer and geek, or, > for that matter, his record as an early advocate for what looked like very > long shots. > > Growing up on the West Side of Manhattan, he began fooling around with > computers as a boy. In 1973, at age 14, he was employed writing programs for > the Scientific Time Sharing Corporation. At 26, he was a young lawyer, > clerking for Justice Thurgood Marshall. Later, he got a Ph.D. in history from > Yale. He was also the lawyer for the Free Software Foundation, headed by > Richard M. Stallman, which aggressively b and successfully b protected the > ability of computer scientists, hackers and hobbyists to build software that > was not tied up by copyright, licensing and patents. > > In the first days of the personal computer era, many scoffed at the idea that > free software could have an important place in the modern world. Today, it is > the digital genome for millions of phones, printers, cameras, MP3 players, > televisions, the Pentagon, the New York Stock Exchange and the computers that > underpin Googlebs empire. > > This month, Mr. Moglen, who now runs the Software Freedom Law Center, spoke > to a convention of 2,000 free-software programmers in Brussels, urging them > to get to work on the Freedom Box. > > Social networking has changed the balance of political power, he said, bbut > everything we know about technology tells us that the current forms of social > network communication, despite their enormous current value for politics, are > also intensely dangerous to use. They are too centralized; they are too > vulnerable to state retaliation and control.b > > In January, investors were said to have put a value of about $50 billion on > Facebook, the social network founded by Mark Zuckerberg. If revolutions for > freedom rest on the shoulders of Facebook, Mr. Moglen said, the > revolutionaries will have to count on individuals who have huge stakes in > keeping the powerful happy. > > bIt is not hard, when everybody is just in one big database controlled by Mr. > Zuckerberg, to decapitate a revolution by sending an order to Mr. Zuckerberg > that he cannot afford to refuse,b Mr. Moglen said. > > By contrast, with tens of thousands of individual encrypted servers, there > would be no one place where a repressive government could find out who was > publishing or reading bsubversiveb material. > > In response to Mr. Moglenbs call for help, a group of developers working in a > free operating system called Debian have started to organize Freedom Box > software. Four students from New York University who heard a talk by Mr. > Moglen last year have been building a decentralized social network called > Diaspora. > > Mr. Moglen said that if he could raise bslightly north of $500,000,b Freedom > Box 1.0 would be ready in one year. > > bWe should make this far better for the people trying to make change than for > the people trying to make oppression,b Mr. Moglen said. bBeing connected > works.b > > E-mail: dwyer at nytimes.com > _______________________________________________ > FoRK mailing list > http://xent.com/mailman/listinfo/fork -- Stephen D. Williams sdw at lig.net stephendwilliams at gmail.com LinkedIn: http://sdw.st/in V:650-450-UNIX (8649) V:866.SDW.UNIX V:703.371.9362 F:703.995.0407 AIM:sdw Skype:StephenDWilliams Yahoo:sdwlignet Resume: http://sdw.st/gres Personal: http://sdw.st facebook.com/sdwlig twitter.com/scienteer ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Feb 18 04:14:23 2011 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 18 Feb 2011 13:14:23 +0100 Subject: BGP (in)security makes the AP wire Message-ID: <20110218121423.GF23560@leitl.org> ----- Forwarded message from Steven Bellovin ----- From neil at tonal.clara.co.uk Fri Feb 18 05:42:14 2011 From: neil at tonal.clara.co.uk (Neil Harris) Date: Fri, 18 Feb 2011 13:42:14 +0000 Subject: BGP (in)security makes the AP wire Message-ID: On 18/02/11 12:26, Eugen Leitl wrote: > On Sun, May 09, 2010 at 09:38:18AM -0700, Joel Jaeggli wrote: > >> geographic location doesn't map to topology > In LEO satellite constellations and mesh wireless it typically does. > When bootstrapping a global mesh, one could use VPN tunnels over > Internet to emulate long-distance links initially. > > Eben Moglen recently proposed a FreedomBox intitiative, using ARM > wall warts to build an open source cloud with an anonymizing layer. > Many of these come with 802.11x radio built-in. If this project > ever happens, it could become a basis for end-user owned > infrastructure. Long-range WiFi can compete with LR fiber > in principle, though at a tiny fraction of throughput. > "Tiny fraction" is putting it mildly. I once considered starting up a low-infrastructure wireless ISP using mesh radio based on wifi radio technology adapted to work in licensed bands. If you work out the numbers, the bandwidth you get in any substantial deployment is pitiful compared to technologies like DSL and cable modems, let alone fiber. New technologies such as distributed space-time multipath coding on the wireless side, and multipath network coding on the bitstream side, look like the way forward on this, but these are brand new, and still the subject of research -- you certainly can't just hot-wire these onto wifi hardware. >>> Presumably, one could prototype something simple and cheap at L2 level >>> with WGS 84->MAC (about ~m^2 resolution), custom switch firmware and GBIC >>> for longish (1-70 km) distances, but without a mesh it won't work. > The local 64 bit part of IPv6 has enough space for global ~2 m resolution, > including altitide (24, 24, 16 bit). With DAD and fuzzing lowest > significant bits address collisions could be prevented reliably. > > Central authority and decentralism can co-exist. Indeed. The fact that the usable bandwidth resulting from ad-hoc mesh wiki would be tiny compared to broadband connections doesn't mean this sort of thing isn't worth trying: a few tens of kilobits a second is plenty for speech, and even a few hundred bits per second useful for basic text messaging. Given that the cost of doing this is almost zero, since only software is required to implement it on any modern wifi/GPS equipped mobile hardware, this seems like a great thing to have in the general portfolio of networking technologies: having something like this available could be invaluable in disaster/crisis situations. -- Neil ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Feb 18 06:12:23 2011 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 18 Feb 2011 15:12:23 +0100 Subject: BGP (in)security makes the AP wire Message-ID: <20110218141223.GN23560@leitl.org> ----- Forwarded message from Neil Harris ----- From irasa at visti.kiev.ua Fri Feb 18 11:18:28 2011 From: irasa at visti.kiev.ua (=?koi8-r?B?7sXEz8LSz9PP18XT1M7ZxSDLz87U0sHHxc7U2Q==?=) Date: Fri, 18 Feb 2011 16:18:28 -0300 Subject: =?koi8-r?B?68HLIM3P1s7PINXK1Mkgz9Qg7uTzIMLF2iDQz9PMxcTT1NfJyi4=?= Message-ID: <4C9A4DFD6F4D4CF3A8397C4F49301C5C@zeze3cf98e977f> 25 февраля 2011г. Тема: НЕДОБРОСОВЕСТНЫЕ ПОСТАВЩИКИ. КАК СОХРАНИТЬ ВЫЧЕТЫ, УЙТИ ОТ ОТВЕТСТВЕННОСТИ (Ч95) ЧЧ53266 : ЧЧ5Ч053 Цель обучения: Обучающий курс даст слушателям ответ на то, как правильно заключать договоры и что делать, если он ошибся, но при этом хотел бы сохранить свои налоговые обязательства без изменений. Слушатели будут точно знать, что и как отвечать налоговой инспекции в случае проверки таких контрагентов. Поймут, как можно уйти от НДС без последствий. В период кризисных явлений в экономике, и как следствие острой нужды государства в пополнении бюджета, ФНС ужесточила требования к проверкам - повысила границу результативности проверок до миллиона рублей (приказ ФНС №409), а также предложила идти простым путем – находить среди контрагентов налогоплательщика компании, которые подпадают под признаки недобросовестных и лишать налогоплательщика налоговых льгот полученных в результате взаимодействия с такими организациями (Приказ ФНС России №ММ-3-2/467@). Практика свидетельствует, что практически все проверки налогоплательщиков применяющих ОСН затрагивают данный вопрос с негативными для налогоплательщика последствиями. При этом налоговый орган исключает из состава затрат НП и вычетов по НДС суммы по контрагентам, которые, например, просто не отвечают на запрос в рамках встречных проверок, либо не заплатили налоги и т.п. Подчас очень тяжело отстоять свою правоту в спорах с налоговым органом. Курс посвящен вопросу защиты налогоплательщика, призван помочь ему как не погрязнуть в тотальных проверках своих контрагентов, так и впоследствии защитить свои права по взаимоотношениям я такими компаниями. На Обучении не только будут показаны способы противодействия придиркам налоговой, но и будут разобраны способы заключения договоров, которые в принципе исключают возможность признания лица недобросовестным, а также законные способы снижение налоговой нагрузки по НДС в том случае, если налогоплательщик в этом заинтересован. Программа: 1. Методические указания Минфина о назначении выездных налоговых проверок (включая Приказ ФНС от 22.09.10 N ММB-7-2/461@, Приказ УФНС по г. Москве от 1 сентября 2008 г №409 и др.) 2. Методические указания Минфина по поиску недобросовестных контрагентов. Рассмотрение мер, которые планирует принять Минфин, Минюст по борьбе с однодневками. 3. Основания признания налоговой выгоды необоснованной (на основании судебной практики, писем Минфина, практики проверок). 4. Что необходимо сделать, чтобы проявить разумную осмотрительность. Какие документы и какую информацию о контрагенте необходимо собрать. 5. Как защититься от претензий налогового органа о том, что контрагент: * не платит налоги и не сдает отчетность; * не отвечает на встречные проверки; * не находиться по месту регистрации, либо зарегистрирован по адресу массовой регистрации; * директор БОМЖ, ничего не подписывал, его подпись подделали и т.п. * директор является "массовым", в отношении руководителя проводятся розыскные мероприятия; * проведенный осмотр показал, что компания не могла отгрузить товар с адреса, указанного в накладной, счете-фактуре; * коды ОКВЭД контрагента не позволяют ему произвести действия, которые он якобы произвел по отношению к налогоплательщику (не может выполнять работы, поставлять товар и т.п., так как создан для иных целей); * иные претензии. 6. Анализ предмета доказывания по спорам о получении необоснованной налоговой выгоды. Установление размера требований по подобным делам. Взыскание всех ранее заявленных вычетов и расходов как нарушение принципа соразмерности и справедливости. Анализ аналогичной практики Европейского Суда. 7. Разбор основных ошибок допускаемых налоговыми органами в процессе доказывания получение налоговый выгоды (встречные проверки реально не проводятся, а данные берется из компьютерной системы учета, вместо допросов проводиться опрос, вместо экспертизы получаются заключения специалиста и т.п.). Как использовать ошибки (подробно). 8. Создание преюдиции для доказывания реальности сделки. 9. Способ ухода от признания налоговой выгоды необоснованной при заключении договоров с поставщиками при помощи посредника. Как построить договор, чтобы претензии по поставщикам нельзя было предъявить. 10. Уход от признания налоговой выгоды необоснованной путем особого способа заключения договоров. 11. Уход от уплаты НДС с наценки путем: * заключения договора с дополнительной выгодой; * включение условий о неустойки; * использование простого товарищества. 12. Кто отвечает за работу с недобросовестными контрагентами (директор или бухгалтер) и в какой части. Рассмотрение основных законодательных инициатив и принятых в последнее время законов, направленных на борьбу с "однодневками". 13. Потеря документов по недобросовестным поставщикам. Налоговые последствия. Указания Минфина по привлечению к ответственности в таком случае. Способ защиты от налоговых претензий. Является ли потеря документов защитой от претензий правоохранительных органов. 14. Анализ возможности рассмотрения любого налогового спора в Арбитражном суде г. Москвы, как способ обойти негативную практику конкретного региона. 15. Изменение практики компенсации судебных издержек. 16. Ответы на индивидуальные вопросы. Cтоимоcть: 7900 руб. По вопpоcам pегucтаpацuu обpащайтеcь по тел: (код Москвы) ЧЧ5-32.66 : 445/3-9-6/8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7004 bytes Desc: not available URL: From case at sdf.lonestar.org Fri Feb 18 09:11:02 2011 From: case at sdf.lonestar.org (John Case) Date: Fri, 18 Feb 2011 17:11:02 +0000 (UTC) Subject: Decentralizing the =?utf-8?Q?Internet_?= =?utf-8?Q?So_Big_Brother_Can=E2=80=99t?= Find You In-Reply-To: <20110218083553.GQ23560@leitl.org> References: <20110217160452.GZ23560@leitl.org> <20110218083553.GQ23560@leitl.org> Message-ID: On Fri, 18 Feb 2011, Eugen Leitl wrote: > On Thu, Feb 17, 2011 at 03:22:49PM -0600, J.A. Terranson wrote: > >> I'm tired of hearing the current calls for "mesh networks" myself. As you >> point out, they are *incredibly* complex, and these "wall-wart servers" >> aren't going to implement that kind of thing IMO. Christ, large ISPs > > I fail to see where they're mentioning the word mesh at all. > If I would do it, I would just package Tor, Tahoe-LAFS, I2P > and maybe a couple other select goodies (tinc, opportunistic > encryption, whatever), and put it on the residential Internet. You're right - they did not specifically mention "mesh", which probably means this individual is operating even one level of abstraction higher .. in the realm of "I know computers can do wonderful things". ToR in this context doesn't make much sense to me - it's a network designed to run over the public Internet, and the whole point of his "dream" is to get out from under the thumb of the public internet. Did I misread, and he thinks that a bunch of low power micro devices, as nodes on the plain old Internet, are going to be helpful in any way ? Tahoe-LAFS makes a bit more sense, as it makes content available without shackling any one system (operator) with liability for that content. > If you recall I repeatedly suggested that here and elsewhere, > to the overwhelming sound of crickets. Well, if you're suggesting that I have little to contribute, you're right. My interests float into this area, and I've lurked long enough on BATMAN and MANET and OLSR to know when to call bullshit, but that's about it. Make no mistake - I agree with the sentiment that this is possible, and that it's coming, and I will be very happy when/if it does ... I just think some dose of reality is needed for the boingboing set of "technologists". >> still have trouble with simple IP, and they have "trained [or] experienced >> 'engineers'". It's a silly call to arms at this point. > > If you're talking mesh, one of the basic requirements is to get > rid of central address allocation authority and establish > a local-knowledge based routing. If you get that far, the > human operator mistakes are removed from the loop. > >> I was with a group that tried to work out a mesh implementation across a >> relatively small (~15sq miles) area, and it never came to fruition, >> despite several years of work on the problems presented. > > Do you have a pointer to description of your project, and what went > wrong? I think the BATMAN people have some long, detailed summaries of successful implementations in places like .de and .it and so on. By successful, I mean, they got packets to flow. The deeper issues of establishing everything with no centralized authority, etc., are unsolved. > I can tell you one thing: Eben Moglen is not a stupid man, and he's > surrounded with technically capable people. If he can raise the money > for 10-100 k wall wart units you can assume people will do useful > things with them. That's good news - better that someone is pushing in this direction than not... From eugen at leitl.org Fri Feb 18 10:59:48 2011 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 18 Feb 2011 19:59:48 +0100 Subject: [FoRK] Decentralizing the =?utf-8?Q?In?= =?utf-8?Q?ternet_So_Big_Brother_Can=E2=80=99t?= Find You Message-ID: <20110218185948.GS23560@leitl.org> ----- Forwarded message from Stephen Williams ----- From measl at mfn.org Fri Feb 18 22:21:57 2011 From: measl at mfn.org (J.A. Terranson) Date: Sat, 19 Feb 2011 00:21:57 -0600 (CST) Subject: "Nobody Wins a Nuclear War" But "Success" is Possible (fwd) Message-ID: Great stuff! //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech ---------- Forwarded message ---------- Date: Sat, 19 Feb 2011 00:43:12 -0500 From: National Security Archive To: NSARCHIVE at HERMES.GWU.EDU Subject: "Nobody Wins a Nuclear War" But "Success" is Possible National Security Archive Update, February 19, 2011 "Nobody Wins a Nuclear War" But "Success" is Possible Mixed Message of 1950s Air Force Film on a U.S.-Soviet Conflict For more information contact: William Burr - 202/994-7000 http://www.nsarchive.org Washington, DC, February 19, 2011 - "The Power of Decision" may be the first (and perhaps the only) U.S. government film depicting the Cold War nightmare of a U.S.-Soviet nuclear conflict. The U.S. Air Force produced it during 1956-1957 at the request of the Strategic Air Command. Unseen for years and made public for the first time by the National Security Archive, the film depicts the U.S. Air Force's implementation of war plan "Quick Strike" in response to a Soviet surprise attack against the United States and European and East Asian allies. By the end of the film, after the Air Force launches a massive bomber-missile "double-punch," millions of Americans, Russians, Europeans, and Japanese are dead. Colonel Dodd, the narrator, asserts that "nobody wins a nuclear war because both sides are sure to suffer terrible damage." Despite the "catastrophic" damage described by a SAC briefer, one of the film's operating assumptions is that defeat is avoidable as long as the Soviet Union cannot impose its "will." The last few minutes of the film suggest that the United States will prevail because of its successful nuclear air offensive. One of the characters, General "Pete" Larson optimistically asserts that the Soviets "must quit; we have the air and the power and they know it." It is the Soviets, not the United States, who are sending out cease-fire pleas, picked up by the CIA. Little is known about the production or subsequent distribution of "The Power of Decision." It was probably used for internal training purposes so that officers and airmen could prepare for the worst active-duty situation that they could encounter. Perhaps the relatively unruffled style of the film's performers was to help serve as a model for SAC officers if they ever had to follow orders that could produce a nuclear holocaust. This film is from a DVD supplied by the U.S. National Archives' motion picture unit and is hosted by the Internet Archive's Moving Images Archive. View the complete film at http://www.nsarchive.org or watch a four-minute clip of the film on the Archive's YouTube channel. http://www.youtube.com/user/nsarchive#p/a/u/0/hfhqZgg_bqQ ________________________________________________________ THE NATIONAL SECURITY ARCHIVE is an independent non-governmental research institute and library located at The George Washington University in Washington, D.C. The Archive collects and publishes declassified documents acquired through the Freedom of Information Act (FOIA). A tax-exempt public charity, the Archive receives no U.S. government funding; its budget is supported by publication royalties and donations from foundations and individuals. _________________________________________________________ PRIVACY NOTICE The National Security Archive does not and will never share the names or e-mail addresses of its subscribers with any other organization. Once a year, we will write you and ask for your financial support. We may also ask you for your ideas for Freedom of Information requests, documentation projects, or other issues that the Archive should take on. We would welcome your input, and any information you care to share with us about your special interests. But we do not sell or rent any information about subscribers to any other party. From measl at mfn.org Fri Feb 18 22:59:45 2011 From: measl at mfn.org (J.A. Terranson) Date: Sat, 19 Feb 2011 00:59:45 -0600 (CST) Subject: "Nobody Wins a Nuclear War" But "Success" is Possible (fwd) In-Reply-To: <20110219064623.GX23560@leitl.org> References: <20110219064623.GX23560@leitl.org> Message-ID: On Sat, 19 Feb 2011, Eugen Leitl wrote: > On Sat, Feb 19, 2011 at 12:21:57AM -0600, J.A. Terranson wrote: > > Great stuff! > > Hysterical. I'm glad that particular madness is mostly over. Me too. Practicing "Duck and Cover!" at school always left you with a particularly grim schoolday. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From dimikas at samitos.com Fri Feb 18 19:02:10 2011 From: dimikas at samitos.com (=?koi8-r?B?5MXMz9DSz8na18/E09TXzw==?=) Date: Sat, 19 Feb 2011 04:02:10 +0100 Subject: =?koi8-r?B?5tXOy8PJz87BzNjO2cUgz8LR2sHOzs/T1Mkg08XL0sXUwdLR?= Message-ID: <000d01cbcfe1$6677a760$6400a8c0@dimikas> ОРГАНИЗАЦИЯ ДОКУМЕНТООБОРОТА ПРЕДПРИЯТИЯ. ПРАКТИЧЕСКИЕ РЕКОМЕНДАЦИИ По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 Моск. код: Ч4_5*Ч0-.95 \\// 4*Ч/5-З/2/-6/6 2Ч февраля 2011г. Программа мероприятия 1-й день: Нормативно-правовые акты по делопроизводству. Основные категории документов. Создание Табеля унифицированных форм документов предприятия. Правила оформления документов. Виды бланков. Наиболее распространенные погрешности при разработке фирменных бланков организации. Распорядительные документы Признаки юридической силы документа. Особенности оформления и хранения документов по личному составу. Справочно-информационные документы. Деловое письмо. Рекомендации, которыми не следует пренебрегать. Правила заверения копий документов в организации. Совершенствование делопроизводственных процессов. Контроль исполнения. Составление номенклатуры дел. Формирование и оформление дел. Что должен знать и уметь секретарь при подготовке и передаче дел на архивное хранение Практическая работа с документами. СОВРЕМЕННЫЙ СЕКРЕТАРЬ, ОФИС-МЕНЕДЖЕР: ФУНКЦИОНАЛЬНЫЕ ОБЯЗАННОСТИ И ЭТИКЕТ СЛУЖЕБНЫХ ОТНОШЕНИЙ Двадцать пятого февраля 201Iг. Программа мероприятия 2-й день: Корпоративная культура: фирменный стиль организации. Имидж секретаря. Международный стандарт. Функциональные обязанности секретаря. Личные и профессиональные качества. Деловое общение: правила этикета при приветствии и представлении. Виды визитных карточек и правила использования. Характерные ошибки в оформлении и использовании. Функции секретаря по организации приема посетителей. "Традиционные" ошибки при приеме деловых партнеров и посетителей. Международные правила дарения и принятия подарков и сувениров. Взаимоотношения с сотрудниками и руководством. Использование психологических дистанций и жестов в деловой обстановке. Культура деловой речи. Правильно ли мы ставим ударения? Телефонные переговоры: забытые истины. Виды приемов. Гастрономический этикет. Стоимость участия 1 дня: 6 200 рублей Стоимость участия за 2 дня: 10 540 рублей За более подробной информацuей обpащайтеcь по тел: +7 Московский код:-4-4*5-3-2/.6.6 **** Ч45-40*95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3970 bytes Desc: not available URL: From eugen at leitl.org Fri Feb 18 22:46:23 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 19 Feb 2011 07:46:23 +0100 Subject: "Nobody Wins a Nuclear War" But "Success" is Possible (fwd) In-Reply-To: References: Message-ID: <20110219064623.GX23560@leitl.org> On Sat, Feb 19, 2011 at 12:21:57AM -0600, J.A. Terranson wrote: > Great stuff! Hysterical. I'm glad that particular madness is mostly over. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From measl at mfn.org Sat Feb 19 06:00:46 2011 From: measl at mfn.org (J.A. Terranson) Date: Sat, 19 Feb 2011 08:00:46 -0600 (CST) Subject: FBI pushes for surveillance backdoors in Web 2.0 tools In-Reply-To: <20110219114203.GY23560@leitl.org> References: <20110219114203.GY23560@leitl.org> Message-ID: On Sat, 19 Feb 2011, Eugen Leitl wrote: > "As the gap between authority and capability widens, the government is > increasingly unable to collect valuable evidence in cases ranging from > child exploitation and pornography to organized crime and drug trafficking > to terrorism and espionage..." I see the Horeseman of the Infopocalypse are still healthy and working for the US govt... //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From nettime at kein.org Sat Feb 19 03:06:02 2011 From: nettime at kein.org (nettime's very avid reader) Date: Sat, 19 Feb 2011 12:06:02 +0100 Subject: FBI pushes for surveillance backdoors in Web 2.0 tools Message-ID: By Ryan Singel, wired.com | Last updated about 19 hours ago http://tinyurl.com/5w7sp4j The FBI pushed Thursday for more built-in backdoors for online communication, but beat a hasty retreat from its earlier proposal to require providers of encrypted communications services to include a backdoor for law enforcement wiretaps. FBI general counsel Valerie Caproni told Congress that new ways of communicating online could cause problems for law enforcement officials, but categorically stated that the bureau is no longer pushing to force companies like RIM, which offers encrypted e-mail for business and government customers, to engineer holes in their systems so the FBI can see the plaintext of a communication upon court order. "Addressing the Going Dark problem does not require fundamental changes in encryption technology," Caproni said in her written testimony (PDF). "We understand that there are situations in which encryption will require law enforcement to develop individualized solutions." ("Going Dark" is the FBI's codename for its multimillion-dollar project to extend its ability to wiretap communications as they happen.) That's a far cry from what Caproni told The New York Times last fall: "No one should be promising their customers that they will thumb their nose at a US court order," Ms. Caproni said. "They can promise strong encryption. They just need to figure out how they can provide us plain text." Those remarks indicated the FBI seemed to want to revisit the encryption wars of the 1990s. That largely ended with the government scrapping its plans to mandate backdoors in encryption, after security researchers discovered flaws in the idea, and the National Research Council concluded that strong encryption made the country safer. But that retreat didn't satisfy Susan Landau, a privacy and cryptography expert who testified alongside Caproni in front of a House Judiciary subcommittee Thursday. That's because the FBI is still pushing for more online-communications companies to build real-time spying capabilities into their software, which Landau said will harm innovation and introduce security flaws that will be used against American companies, government agencies and citizens. Innovation happens too fast on the Internet to require companies that provide chat and voice-calling capabilitiesbwhich these days includes online games, social networking sites and a myriad of online chat and photo-sharing servicesbto comply with detailed wiretapping specifications that cost hundreds of dollars just to read, according to Landau. "Requiring that Internet applications with communications systemsb[which] means anything from speak-to-tweet to Second Life to software supporting music-jam sessionsbbe vetted first will put American innovation at a global disadvantage," Landau said. "For American competitiveness it is critical that we preserve the ease and speed with which innovative new communications technologies can be developed." And she added the wiretapping holes are serious security risks. "Building wiretapping into communications infrastructure creates serious risk that the communications system will be subverted either by trusted insiders or skilled outsiders, including foreign governments, hackers, identity thieves and perpetrators of economic espionage," Landau said in her written testimony (PDF), pointing to incidents in Greece, Italy and the United States where equipment built to comply with US wiretapping rules were subverted. Those rules, known as CALEA, were enacted in 1994 to require phone companies to engineer their networks to be wiretap-compliant. The rules were expanded by the FCC in the George W. Bush Administration to apply to ISPs as well. The FBI's further push for expanded powers to wiretap online communications in real time comes against the backdrop of revolutions in the Middle East that relied heavily on social media communication tools and as Secretary of State Hillary Clinton called for worldwide internet freedom. "I urge countries everywhere to join the United States in our bet that an open internet will lead to stronger, more prosperous countries,b Clinton said Tuesday, speaking at George Washington University. But Caproni argued that law enforcement officials are occasionally running into cases where criminals are using online communication tools that aren't wiretappable in real-time, because the provider had not built-in that capability. Caproni did not mention that the FBI has not encountered a single case of encryption hampering its criminal investigations for the past four years, according to reports to Congress, nor that the FBI has never run into a single case over the last 10 years where it could not get the plaintext of a target's communications. Landau told Congress the FBI was overlooking some very good news. "While there is a genuine problem with intercepting some communications, the FBI now has access to more communications, and more metadata about communications, than ever before in history," Landau said. But Caproni said that's not enough and the FBI needs to find new technical solutions b though she did add that the Obama administration has no "formal position at this time" about needed changes to the law. But she warned Congress that the country was in danger from a surveillance gap. "As the gap between authority and capability widens, the government is increasingly unable to collect valuable evidence in cases ranging from child exploitation and pornography to organized crime and drug trafficking to terrorism and espionage -evidence that a court has authorized the government to collect," Caproni said. "This gap poses a growing threat to public safety." Also on Thursday, the Electronic Frontier Foundation released some government documents about the FBI's so-called Going Dark program, which it got under the Freedom of Information Act. Those documents show the project dates to 2006, and that the FBI had hired high-powered consultants from the Rand Corporation and Booz Allen Hamilton to help come up with solutions. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sat Feb 19 03:42:03 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 19 Feb 2011 12:42:03 +0100 Subject: FBI pushes for surveillance backdoors in Web 2.0 tools Message-ID: <20110219114203.GY23560@leitl.org> ----- Forwarded message from nettime's very avid reader ----- From bill.stewart at pobox.com Sat Feb 19 15:22:26 2011 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 19 Feb 2011 15:22:26 -0800 Subject: "Nobody Wins a Nuclear War" But "Success" is Possible (fwd) In-Reply-To: References: <20110219064623.GX23560@leitl.org> Message-ID: <6.2.1.2.1.20110219151237.02dc3e58@pop.sonic.net> At 10:59 PM 2/18/2011, J.A. Terranson wrote: >On Sat, 19 Feb 2011, Eugen Leitl wrote: > > Hysterical. I'm glad that particular madness is mostly over. > >Me too. Practicing "Duck and Cover!" at school always left you with a >particularly grim schoolday. Yeah. Al-Qaeda and their ilk were really wimpy terrorists compared to forty years of "we can blow up the world N times over and we've got the crazy generals to do it!" nuclear terrorism. I was a kid during the Cuban Missile Crisis, and one of my neighbors had dug up their back yard to put in a bomb shelter. It was really freaky the first time I heard the Emergency Broadcast System come on the radio in the ?early 90s? and say "this is not a test" - they were using it for flood warnings during a storm, which is a sensible thing to do, but before that it had always been "this is a test of the 'let you know that the Russians and Americans are trying to blow up the world' alarm system", whether it was EBS or CONELRAD or whatever, so by the time they got to the "flooding" part, I'd already mentally been through the "WTF? The politicians haven't been saber-rattling at each other, is this some surprise attack? How fast can I get home to my wife?" panic attack. They'd probably been using it that way for several years, just not at times I'd been driving with the car radio on. From bill.stewart at pobox.com Sat Feb 19 15:25:53 2011 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 19 Feb 2011 15:25:53 -0800 Subject: "Nobody Wins a Nuclear War" But "Success" is Possible (fwd) In-Reply-To: <20110219212004.GS23560@leitl.org> References: <20110219064623.GX23560@leitl.org> <20110219212004.GS23560@leitl.org> Message-ID: <6.2.1.2.1.20110219152309.02ec3cf8@pop.sonic.net> At 01:20 PM 2/19/2011, Eugen Leitl wrote: >On Sat, Feb 19, 2011 at 12:59:45AM -0600, J.A. Terranson wrote: > > > Me too. Practicing "Duck and Cover!" at school always left you with a > > particularly grim schoolday. > >On the other side of the Iron Curtain, it wasn't the duck and cover >exercises (that never happened, or was before my time), but the >nuclear weapon education posters on the walls. Yeah, these did really >cheer you up. A friend of mine was in a rough airplane landing many years ago, and after the pilot had gone through the usual steps of "seat belts on, seat backs up, lean forward and hold on to the seat in front of you" safety instructions, she and half her fellow passengers responded with "and kiss your ass goodbye", which is the punch line of the hippie version of the American nuclear war education posters. From alisanilawo at homesweb.com.jfet.org Sat Feb 19 12:53:07 2011 From: alisanilawo at homesweb.com.jfet.org (Alisa Nila) Date: Sat, 19 Feb 2011 15:53:07 -0500 Subject: Men equate a larger penis as being more attractive and impressive to the opposite sex. Message-ID: <4d602db3.1889f13a@homesweb.com> Are you fed up with size of your manhood? Do you feel inadequate around women and indeed other guys? In every man's mind there is a want to enlarge his penis. Many search out ways to do this and sometimes it works and sometimes not. Men equate a larger penis as being more attractive and impressive to the opposite sex. But they don�t always know if increasing their size will decrease or increase the pleasure they derive from sexual intercourse. Do you want a big thick penis? Well if you do then you may be searching for natural penis male enlargement pill that has no side effect for you, here you go CLICK HERE - http://naturalpenisrectify.ru From measl at mfn.org Sat Feb 19 14:59:39 2011 From: measl at mfn.org (J.A. Terranson) Date: Sat, 19 Feb 2011 16:59:39 -0600 (CST) Subject: "Nobody Wins a Nuclear War" But "Success" is Possible (fwd) In-Reply-To: <20110219212004.GS23560@leitl.org> References: <20110219064623.GX23560@leitl.org> <20110219212004.GS23560@leitl.org> Message-ID: On Sat, 19 Feb 2011, Eugen Leitl wrote: > On Sat, Feb 19, 2011 at 12:59:45AM -0600, J.A. Terranson wrote: > > > Me too. Practicing "Duck and Cover!" at school always left you with a > > particularly grim schoolday. > > On the other side of the Iron Curtain, it wasn't the duck and cover > exercises (that never happened, or was before my time), but the > nuclear weapon education posters on the walls. Yeah, these did really > cheer you up. What exactly was on these posters? Self-defense information, or weapon how-does-it-work type stuff? > I also found the AK-47s in the weapon education chamber in > our school slightly unnerving. No idea where the older kids > got trained on weapon handling if at all, that must have been > at higher grades than 7th. HOW COOL IS *THAT*! Weapon education chamers? Shit! I grew up in NYC, where there are *zero* legal guns, unless you're LEA or one of the under 100 people who could afford the weekly $500.00 bribe! Not that handguns weren't all over the schools - almost everyone in my class carried at IS44 (IS == "Intermediate School". Kinda of like junior high school and high school all in one: grades 6-12), since the likelyhood of needing to defend yourself was very close to 100% NYC schools in the 60's were horror shows, even in the better neighborhoods (which I certainly didn't live!). Our "weapons education" was going out at night and shooting out street lamps (at $1.00 per shot to the betting pool - first to take the light gets the pool. Not so easy with a <3 inch barrel on a saturday night special!). I am in envy of you and your schools :-) //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From measl at mfn.org Sat Feb 19 16:34:20 2011 From: measl at mfn.org (J.A. Terranson) Date: Sat, 19 Feb 2011 18:34:20 -0600 (CST) Subject: "Nobody Wins a Nuclear War" But "Success" is Possible (fwd) In-Reply-To: <6.2.1.2.1.20110219151237.02dc3e58@pop.sonic.net> References: <20110219064623.GX23560@leitl.org> <6.2.1.2.1.20110219151237.02dc3e58@pop.sonic.net> Message-ID: On Sat, 19 Feb 2011, Bill Stewart wrote: > It was really freaky the first time I heard the Emergency Broadcast System > come on the radio in the ?early 90s? and say "this is not a test" Interesting: I have *never* heard the EBS et al used other than for testing. Had I ever heard it, it would have scared the crap out of me - I don't know if I'd even hear past that point, having spent a childhood listening to that damned system being "tested" all the time (?I believe it was weekly or bi-monthly?). Like most Americans alive through the period, I can still recite, word for word, the text of the EBS "test" announcement: "This is a test of the Emergency Broadcast System. This is only a test. The broadcasters in your area, in voluntary cooperation with the FCC and other authorities, have developed this system to keep you informed in the event of an emergency. If this had been an actual emergency, you would have been instructed where to tune in your area for news and other local information. This concludes our test of the Emergency Broadcast System." I can't even imagine the panic of hearing "this is *not* a test"! Interestingly, the EBS had at least one accidental activation in the late 60's or early 1970s, which I fortunately missed out on: good for me! > using it for flood warnings during a storm, which is a sensible thing to do, Very. But then we wouldn't have paid any attention to it when the Russians were finally ready to end it all! //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From eugen at leitl.org Sat Feb 19 10:03:07 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 19 Feb 2011 19:03:07 +0100 Subject: Robot hummingbird passes flight tests (w/ Video) Message-ID: <20110219180307.GC23560@leitl.org> (remote-controlled micro-UAVs are already routinely used by LEOs world wide) http://www.physorg.com/news/2011-02-robot-hummingbird-flight-video.html Robot hummingbird passes flight tests (w/ Video) February 18, 2011 by Lin Edwards Nano Air Vehicle (PhysOrg.com) -- A prototype robot spy "ornithopter," the Nano-Hummingbird, has successfully completed flight trials in California. Developed by the company AeroVironment Inc., the miniature spybot looks like a hummingbird complete with flapping wings, and is only slightly larger and heavier than most hummingbirds, but smaller than the largest species. The Hummingbird's bird-shaped body is removable but it gives the bot an uncanny resemblance to a real hummingbird. The vehicle can hover and maneuver just like the bird. The ornithopter can fly into buildings under the control of an operator flying the spybot with the help of a feed from its tiny video camera. The prototype is capable of flying at speeds of up to 18 km/h (11 mph) and weighs 19 grams, which is about the same as an AA battery. AeroVironment video of flight tests of its Nano Hummingbird flapping-wing nano air vehicle, developed for DARPA. Manager of the project, Matt Keennon, said it had been a challenge to design and build the spybot because it bpushes the limitations of aerodynamics.b The specifications given to the firm by the Pentagon included being able to hover in an 8 km/h wind gust and being able to fly in and out of buildings via a normal door. The spybot was developed for the US military's research arm, the Defense Advanced Research Projects Agency (DARPA). The hummingbird appearance is intended to disguise the bot, although it would look decidedly out of place and would attract attention in most places in the world since hummingbirds are not found outside of the Americas. DARPA's head of the Nano Air Vehicles (NAV) program. Dr Todd Hylton, said the successful flight tests pave the way for new vehicles that resemble small birds and match their agility. The new drone is a departure from existing NAVs, which in the past have always resembled helicopters or planes. Nano Air Vehicle 360 Degree Flip The current model is a prototype and more development is required before any decisions are made on its deployment. Keennon said he expected the flight time to improve as the spybot develops, and said he envisaged it could be used for reconnaissance purposes in around a decade. He also said the final version is unlikely to look like a hummingbird, which is rare even in parts of the US, and he thinks a sparrow would be a better choice. The US military has funded the project, giving AeroVironment around $4 million since 2006. More information: http://www.avinc.com/nano From eugen at leitl.org Sat Feb 19 11:02:21 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 19 Feb 2011 20:02:21 +0100 Subject: Black ops: how HBGary wrote backdoors for the government Message-ID: <20110219190221.GG23560@leitl.org> http://arstechnica.com/tech-policy/news/2011/02/black-ops-how-hbgary-wrote-backdoors-and-rootkits-for-the-government.ars Black ops: how HBGary wrote backdoors for the government By Nate Anderson | Last updated about 19 hours ago On November 16, 2009, Greg Hoglund, a cofounder of computer security firm HBGary, sent an e-mail to two colleagues. The message came with an attachment, a Microsoft Word file called AL_QAEDA.doc, which had been further compressed and password protected for safety. Its contents were dangerous. The attached document, which is in English, begins: "LESSON SIXTEEN: ASSASSINATIONS USING POISONS AND COLD STEEL (UK/BM-154 TRANSLATION)." It purports to be an Al-Qaeda document on dispatching one's enemies with knives (try "the area directly above the genitals"), with ropes ("Chokingb& there is no other area besides the neck"), with blunt objects ("Top of the stomach, with the end of the stick."), and with hands ("Poking the fingers into one or both eyes and gouging them."). But the poison recipes, for ricin and other assorted horrific bioweapons, are the main draw. One, purposefully made from a specific combination of spoiled food, requires "about two spoonfuls of fresh excrement." The document praises the effectiveness of the resulting poison: "During the time of the destroyer, Jamal Abdul Nasser, someone who was being severely tortured in prison (he had no connection with Islam), ate some feces after losing sanity from the severity of the torture. A few hours after he ate the feces, he was found dead." The purported Al-Qaeda document According to Hoglund, the recipes came with a side dish, a specially crafted piece of malware meant to infect Al-Qaeda computers. Is the US government in the position of deploying the hacker's darkest toolsbrootkits, computer viruses, trojan horses, and the like? Of course it is, and Hoglund was well-positioned to know just how common the practice had become. Indeed, he and his company helped to develop these electronic weapons. Thanks to a cache of HBGary e-mails leaked by the hacker collective Anonymous, we have at least a small glimpse through a dirty window into the process by which tax dollars enter the military-industrial complex and emerge as malware. Task B In 2009, HBGary had partnered with the Advanced Information Systems group of defense contractor General Dynamics to work on a project euphemistically known as "Task B." The team had a simple mission: slip a piece of stealth software onto a target laptop without the owner's knowledge. HBGary white paper on exploiting software They focused on portsba laptop's interfaces to the world around itbincluding the familiar USB port, the less-common PCMCIA Type II card slot, the smaller ExpressCard slot, WiFi, and Firewire. No laptop would have all of these, but most recent machines would have at least two. The HBGary engineering team broke this list down into three categories. First came the "direct access" ports that provided "uninhibited electronic direct memory access." PCMCIA, ExpressCard, and Firewire all allowed external devicesbsay a custom piece of hardware delivered by a field operativebto interact directly with the laptop with a minimum amount of fuss. The direct memory access provided by the controllers for these ports mean that devices in them can write directly to the computer's memory without intervention from the main CPU and with little restriction from the operating system. If you want to overwrite key parts of the operating system to sneak in a bit of your own code, this is the easiest way to go. The second and third categories, ports that needed "trust relationships" or relied on "buffer overflows," included USB and wireless networking. These required more work to access, especially if one wanted to do so without alerting a user; Windows in particular is notorious for the number of prompts it throws when USB devices are inserted or removed. A cheerful note about "Searching for device driver for NSA_keylogger_rootkit_tango" had to be avoided. So HBGary wanted to go the direct access route, characterizing it as the "low hanging fruit" with the lowest risk. General Dynamics wanted HBGary to investigate the USB route as well (the ports are more common, but an attack has to trick the operating system into doing its bidding somehow, commonly through a buffer overflow). The team had two spy movie scenarios in which its work might be used, scenarios drafted to help the team think through its approach: 1) Man leaves laptop locked while quickly going to the bathroom. A device can then be inserted and then removed without touching the laptop itself except at the target port. (i.e. one can't touch the mouse, keyboard, insert a CD, etc.) 2) Woman shuts down her laptop and goes home. One then can insert a device into the target port and assume she will not see it when she returns the next day. One can then remove the device at a later time after she boots up the machine. Why would the unnamed client for Task Bbwhich a later e-mail makes clear was for a government agencybwant such a tool? Imagine you want access to the computer network used in a foreign government ministry, or in a nuclear lab. Such a facility can be tough to crack over the Internet; indeed, the most secure facilities would have no such external access. And getting an agent inside the facility to work mischief is very riskybif it's even possible at all. But say a scientist from the facility uses a memory stick to carry data home at night, and that he plugs the memory stick into his laptop on occasion. You can now get a piece of custom spyware into the facility by putting a copy on the memory stickbif you can first get access to the laptop. So you tail the scientist and follow him from his home one day to a local coffee shop. He steps away to order another drink, to go to the bathroom, or to talk on his cell phone, and the tail walks past his table and sticks an all-but-undetectable bit of hardware in his laptop's ExpressCard slot. Suddenly, you have a vector that points all the way from a local coffee shop to the interior of a secure government facility. The software exploit code actually delivered onto the laptop was not HBGary's concern; it needed only to provide a route through the computer's front door. But it had some constraints. First, the laptop owner should still be able to use the port so as not to draw attention to the inserted hardware. This is quite obviously tricky, but one could imagine a tiny ExpressCard device that slid down into the slot but could in turn accept another ExpressCard device on its exterior-facing side. This sort of parallel plugging might well go unnoticed by a user with no reason to suspect it. HBGary's computer infiltration code then had to avoid the computer's own electronic defenses. The code should "not be detectable" by virus scanners or operating system port scans, and it should clean up after itself to eliminate all traces of entry. Greg Hoglund was confident that he could deliver at least two laptop-access techniques in less than a kilobyte of memory each. As the author of books like Exploiting Software: How to Break Code, Rootkits: Subverting the Windows Kernel, and Exploiting Online Games: Cheating Massively Distributed Systems, he knew his way around the deepest recesses of Windows in particular. Hoglund's special interest was in all-but-undetectable computer "rootkits," programs that provide privileged access to a computer's innermost workings while cloaking themselves even from standard operating system functions. A good rootkit can be almost impossible to remove from a running machinebif you could even find it in the first place. Just a demo Some of this work was clearly for demonstration purposes, and much of it was probably never deployed in the field. For instance, HBGary began $50,000 of work for General Dynamics on "Task C" in June 2009, creating a piece of malware that infiltrated Windows machines running Microsoft Outlook. The target user would preview a specially crafted e-mail message in Outlook that took advantage of an Outlook preview pane vulnerability to execute a bit of code in the background. This code would install a kernel driver, one operating at the lowest and most trusted level of the operating system, that could send traffic over the computer's serial port. (The point of this exercise was never spelled out, though the use of serial ports rather than network ports suggest that cutting-edge desktop PCs were not the target.) HBGary's expertise Once installed, the malware could execute external commands, such as sending specific files over the serial port, deleting files on the machine, or causing the infamous Windows "blue screen of death." In addition, the code should be able to pop open the computer's CD tray and blink the lights on its attached keyboardsbanother reminder that Task C was, at this stage, merely for a demo. General Dynamics would presumably try to interest customers in the product, but it's not clear from the e-mails at HBGary whether this was ever successful. Even with unique access to the innermost workings of a security firm, much remains opaque; the real conversations took place face-to-face or on secure phone lines, not through e-mail, so the glimpses we have here are fragmentary at best. This care taken to avoid sending sensitive information via unencrypted e-mail stands in stark contrast with the careless approach to security that enabled the hacks in the first place. But that doesn't mean specific information is hard to come bybsuch as the fact that rootkits can be purchased for $60,000. Step right up! Other tools were in use and were sought out by government agencies. An internal HBGary e-mail from early 2010 asks, "What are the license costs for HBGary rk [rootkit] platform if they want to use it on guardian for afisr [Air Force Intelligence, Surveillance, and Reconnaissance]?" The reply indicates that HBGary has several tools on offer. "Are you asking about the rootkit for XP (kernel driver that hides in plain sight and is a keylogger that exfiltrates data) or are you asking about 12 Monkeys? We've sold licenses of the 1st one for $60k. We haven't set a price on 12 Monkeys, but can." The company had been developing rootkits for years. Indeed, it had even developed a private Microsoft Word document outlining its basic rootkit features, features which customers could have (confirming the e-mail listed above) for $60,000. Description of the basic rootkit platform That money bought you the rootkit source code, which was undetectable by most rootkit scanners or firewall products when it was tested against them in 2008. Only one product from Trend Micro noticed the rootkit installation, and even that alert was probably not enough to warn a user. As the HBGary rootkit document notes, "This was a low level alert. TrendMicro assaults the user with so many of these alerts in every day use, therefore most users will quickly learn to ignore or even turn off such alerts." When installed in a target machine, the rootkit could record every keystroke that a user typed, linking it up to a Web browser history. This made it easy to see usernames, passwords, and other data being entered into websites; all of this information could be silently "exfiltrated" right through even the pickiest personal firewall. But if a target watched its outgoing traffic and noted repeated contacts with, say, a US Air Force server, suspicions might be aroused. The rootkit could therefore connect instead to a "dead drop"ba totally anonymous server with no apparent connection to the agency using the rootkitbwhere the target's keyboard activity could be retrieved at a later time. But by 2009, the existing generic HBGary rootkit package was a bit long in the tooth. Hoglund, the rootkit expert, apparently had much bigger plans for a next-gen product called "12 monkeys." 12 Monkeys The 12 Monkeys rootkit was also a contract paid out by General Dynamics; as one HBGary e-mail noted, the development work could interfere with Task B, but "if we succeed, we stand to make a great deal of profit on this." On April 14, 2009, Hoglund outlined his plans for the new super-rootkit for Windows XP, which was "unique in that the rootkit is not associated with any identifiable or enumerable object. This rootkit has no file, named data structure, device driver, process, thread, or module associated with it." How could Hoglund make such a claim? Security tools generally work by scanning a computer for particular objectsbpieces of data that the operating system uses to keep track of processes, threads, network connections, and so on. 12 Monkeys simply had nothing to find. "Since no object is associated with the objectless rootkit, detection will be very difficult for a security scanner," he wrote. In addition, the rootkit would encrypt itself to cloak itself further, and hop around in the computer's memory to make it even harder to find. As for getting the data off a target machine and back to the rootkit's buyer, Hoglund had a clever idea: he disguised the outgoing traffic by sending it only when other outbound Web traffic was being sent. Whenever a user sat down at a compromised machine and started surfing the Web, their machine would slip in some extra outgoing data "disguised as ad-clicks" that would contain a log of all their keystrokes. While the basic rootkit went for $60,000, HBGary hoped to sell 12 Monkeys for much more: "around $240k." 0-day The goal of this sort of work is always to create something undetectable, and there's no better way to be undetectable than by taking advantage of a security hole that no one else has ever found. Once vulnerabilities are disclosed, vendors like Microsoft race to patch them, and they increasingly push those patches to customers via the Internet. Among hackers, then, the most prized exploits are "0-day" exploitsbexploits for holes for which no patch yet exists. HBGary kept a stockpile of 0-day exploits. A slide from one of the company's internal presentations showed that the company had 0-day exploits for which no patch yet existedbbut these 0-day exploits had not yet even been published. No one knew about them. The company had exploits "on the shelf" for Windows 2000, Flash, Java, and more; because they were 0-day attacks, any computer around the world running these pieces of software could be infiltrated. One of the unpublished Windows 2000 exploits, for instance, can deliver a "payload" of any size onto the target machine using a heap exploit. "The payload has virtually no restrictions" on what it can do, a document notes, because the exploit secures SYSTEM level access to the operating system, "the highest user-mode operating system defined level" available. These exploits were sold to customers. One email, with the subject "Juicy Fruit," contains the following list of software: VMware ESX and ESXi * Win2K3 Terminal Services Win2K3 MSRPC Solaris 10 RPC Adobe Flash * Sun Java * Win2k Professional & Server XRK Rootkit and Keylogger * Rootkit 2009 * The e-mail talks only about "tools," not about 0-day exploits, though that appears to be what was at issue; the list of software here matches HBGary's own list of its 0-day exploits. And the asterisk beside some of the names "means the tool has been sold to another customer on a non-exclusive basis and can be sold again." HBGary's 0-day exploits References to Juicy Fruit abound in the leaked e-mails. My colleague Peter Bright and I have spent days poring through the tens of thousands of messages; we believe that "Juicy Fruit" is a generic name for a usable 0-day exploit, and that interest in this Juicy Fruit was high. "[Name] is interested in the Juicy Fruit you told him about yesterday," one e-mail reads. "Next step is I need to give [name] a write up describing it." That writeup includes the target software, the level of access gained, the max payload size, and "what does the victim see or experience." Aaron Barr, who in late 2009 was brought on board to launch the separate company HBGary Federal (and who provoked this entire incident by trying to unmask Anonymous), wrote in one e-mail, "We need to provide info on 12 monkeys and related JF [Juicy Fruit] asap," apparently in reference to exploits that could be used to infect a system with 12 Monkeys. HBGary also provided some Juicy Fruit to Xetron, a unit of the massive defense contractor Northrop Grumman that specialized in, among other things, "computer assault." Barr wanted to "provide Xetron with some JF code to be used for demonstrations to their end customers," one e-mail noted. "Those demonstrations could lead to JF sales or ongoing services work. There is significant revenue potential doing testing of JF code acquired elsewhere or adding features for mission specific uses." As the deal was being worked out, HBGary worked up an agreement to "provide object code and source code for this specific Juicy Fruit" to Xetron, though they could not sell the code without paying HBGary. The code included with this agreement was a "Adobe Macromedia Flash Player Remote Access Tool," the "HBGary Rootkit Keylogger Platform," and a "Software Integration Toolkit Module." The question of who might be interested in these tools largely remains an unknownbthough Barr did request information on HBGary's Juicy Fruit just after asking for contacts at SOCOM, the US Special Operations Command. But HBGary Federal had ideas that went far beyond government rootkits and encompassed all facets of information warfare. Including, naturally, cartoons. And Second Life. Psyops In mid-2010, HBGary Federal put together a PSYOP (psychological operations) proposal for SOCOM, which had issued a general call for new tools and techniques. In the document, the new HBGary Federal team talked up their past experience as creators of "multiple products briefed to POTUS [President of the United States], the NSC [National Security Council], and Congressional Intelligence committees, as well as senior intelligence and military leaders." The document focused on cartoons and the Second Life virtual world. "HBGary personnel have experience creating political cartoons that leverage current events to seize the target audience's attention and propagate the desired messages and themes," said the document, noting that security-cleared cartoonists and 3D modelers had already been lined up to do the work if the government wanted some help. Cartoon example of Ahmadinejad with a puppet ayatollah The cartooning process "starts with gathering customer requirements such as the target audience, high level messages and themes, intended publication mediumsb& Through brainstorming sessions, we develop concept ideas. Approved concepts are rough sketched in pencil. Approved sketches are developed into a detailed, color end product that is suitable for publishing in a variety of mediums." A sample cartoon, of Iranian President Ahmadinejad manipulating a puppet Ayatollah, was helpfully included. The document then went on to explain how the US government could use a virtual world such as Second Life to propagate specific messages. HBGary could localize the Second Life client, translating its menu options and keyboard shortcuts into local dialects, and this localized client could report "valuable usage metrics, enabling detailed measures of effects." If you want to know whether your message is getting out, just look at the statistics of how many people play the game and for how long. As for the messages themselves, those would appear within the Second Life world. "HBGary can develop an in-world advertising company, securing small plots of virtual land in attractive locations, which can be used to promote themes using billboards, autonomous virtual robots, audio, video, and 3D presentations," said the document. They could even make a little money while they're at it, by creating "original marketable products to generate self-sustaining revenue within the virtual space as well as promote targeted messaging." We found no evidence that SOCOM adopted the proposal. But HBGary Federal's real interest had become social media like Facebook and Twitterband how they could be used to explore and then penetrate secretive networks. And that was exactly what the Air Force wanted to do. Fake Facebook friends In June 2010, the government was expressing real interest in social networks. The Air Force issued a public request for "persona management software," which might sound boring until you realize that the government essentially wanted the ability to have one agent run multiple social media accounts at once. It wanted 50 software licenses, each of which could support 10 personas, "replete with background, history, supporting details, and cyber presences that are technically, culturally and geographically consistent." The software would allow these 50 cyberwarriors to peer at their monitors all day and manipulate these 10 accounts easily, all "without fear of being discovered by sophisticated adversaries." The personas would appear to come from all over the world, the better to infiltrate jihadist websites and social networks, or perhaps to show up on Facebook groups and influence public opinion in pro-US directions. As the cyberwarriors worked away controlling their 10 personas, their computers would helpfully provide "real-time local information" so that they could play their roles convincingly. In addition the Air Force wanted a secure virtual private network that could mask the IP addresses behind all of this persona traffic. Every day, each user would get a random IP address to help hide "the existence of the operation." The network would further mask this persona work by "traffic mixing, blending the user's traffic with traffic from multitudes of users from outside the organization. This traffic blending provides excellent cover and powerful deniability." This sort of work most interested HBGary Federal's Aaron Barr, who was carving out a niche for himself as a social media expert. Throughout late 2010 and early 2011, he spent large chunks of his time attempting to use Facebook, Twitter, and Internet chat to map the network of Exelon nuclear plant workers in the US and to research the members of Anonymous. As money for his company dried up and government contracts proved hard to come by, Barr turned his social media ideas on pro-union forces, getting involved in a now-controversial project with two other security firms. But e-mails make clear that he mostly wanted to sell this sort of capability to the government. "We have other customers, mostly on offense, that are interested in Social Media for other things," he wrote in August 2010. "The social media stuff seems like low hanging fruit." How does one use social media and fake "personas" to do anything of value? An e-mail from Barr on August 22 makes his thinking clear. Barr ponders "the best way to go about establishing a persona to reach an objective (in this case ft. belvoir/INSCOM/1st IO)." The Army's Fort Belvoir, like any secretive institution, might be more easily penetrated by pretending to be an old friend of a current employee. "Make your profile swim in a large sea," Barr wrote. "Pick a big city, big high school, big company. Work your way up and in. Recreate your history. Start by friending high school people. In my case I am in the army so after you have amassed enough friends from high school, then start friending military folks outside of your location, something that matches the area your in, bootcamp, etc. Lastly start to friend people from the base, but start low and work your way up. So far so good." Once the persona had this network of friends, "I will start doing things tricky. Try to manipulate conversations, insert communication streams, etc," said Barr. This sort of social media targeting could also be used to send your new "friend" documents or files (such as the Al-Qaeda poison document discussed above) [that] come complete with malware, or by directing them to specially-crafted websites designed to elicit some specific piece of information: directed attacks known as "spear phishing." But concerns arose about obtaining and using social media data, in part because sites like Facebook restricted the "scraping" of its user data. An employee from the link analysis firm Palantir wrote Barr at the end of August, asking, "Is the idea that we'd want to ingest all of Facebook's data, or just a targeted subset for a few users of interest?" The more data that was grabbed from Facebook, the more chance a problem could arise. The Palantir employee noted that a researcher had used similar tools to violate Facebook's acceptable use policy on data scraping, "resulting in a lawsuit when he crawled most of Facebook's social graph to build some statistics. I'd be worried about doing the same. (I'd ask him for his Facebook databhe's a fan of Palantirbbut he's already deleted it.)" Still, the potential usefulness of sites like Facebook was just too powerful to ignore, acceptable use policy or not. Feeling twitchy While Barr fell increasingly in love with his social media sleuthing, Hoglund still liked researching his rootkits. In September, the two teamed up for a proposal to DARPA, the Defense Advanced Research Projects Agency that had been instrumental in creating the Internet back in the 1960s. DARPA didn't want incrementalism. It wanted breakthroughs (one of its most recent projects is the "100-Year Starship Study"), and Barr and Hoglund teamed up for a proposal to help the agency on its Cyber Insider Threat (CINDER) program. CINDER was an expensive effort to find new ways to watch employees with access to sensitive information and root out double agents or disgruntled workers who might leak classified information. So Barr and Hoglund drafted a plan to create something like a lie detector, except that it would look for signs of "paranoia" instead. "Like a lie detector detects physical changes in the body based on sensitivities to specific questions, we believe there are physical changes in the body that are represented in observable behavioral changes when committing actions someone knows is wrong," said the proposal. "Our solution is to develop a paranoia-meter to measure these observables." The idea was to take an HBGary rootkit like 12 Monkeys and install it on user machines in such a way that users could not remove it and might not even be aware of its presence. The rootkit would log user keystrokes, of course, but it would also take "as many behavioral measurements as possible" in order to look for suspicious activity that might indicate wrongdoing. What sort of measurements? The rootkit would monitor "keystrokes, mouse movements, and visual cues through the system camera. We believe that during particularly risky activities we will see more erratic mouse movements and keystrokes as well as physical observations such as surveying surroundings, shifting more frequently, etc." The rootkit would also keep an eye on what files were being accessed, what e-mails were being written, and what instant messages were being sent. If necessary, the software could record a video of the user's computer screen activity and send all this information to a central monitoring office. There, software would try to pick out employees exhibiting signs of paranoia, who could then be scrutinized more closely. Huge and obvious challenges presented themselves. As the proposal noted: Detecting insider threat actions is highly challenging and will require a sophisticated monitoring, baselining, analysis, and alerting capability. Human actions and organizational operations are complex. You might think you can just look for people that are trying to gain access to information outside of their program area of expertise. Yet there are legitimate reasons for accessing this information. In many cases the activity you might call suspicious can also be legitimate. Some people are more or less inquisitive and will have different levels of activity in accessing information outside their specific organization. Some of the behaviors on systems vary widely depending on function. Software developer behavior will be very different than an HR person or senior manager. All of these factors need to be taken into account when developing detection capabilities for suspicious activity. We cannot focus on just [whether] a particular action is potentially suspicious. Instead we must quantify the legitimate reasons for the activity and whether this person has a baseline, position, attributes, and history to support the activity. DARPA did not apparently choose to fund the plan. Grey areas The ideas got ever more grandiose. Analyzing malware, HBGary's main focus, wasn't enough to keep up with the hackers; Hoglund had a plan to get a leg up on the competition by getting even closer to malware authors. He floated an idea to sniff Russian GSM cell phone signals in order to eavesdrop on hackers' voice calls and text messages. "GSM is easily sniffed," he wrote to Barr. "There is a SHIELD system for this that not only intercepts GSM 5.1 but can also track the exact physical location of a phone. Just to see what's on the market, check [redacted]b& these have to be purchased overseas obviously." The note concluded: "Home alone on Sunday, so I just sit here and sharpen the knife." Barr, always enthusiastic for these kinds of ideas, loved this one. He wanted to map out everything that would be required for such an operation, including "personas, sink holes, honey nets, soft and hard assetsb& We would want at least one burn persona. We would want to sketch out a script to meet specific objectives. And, he noted, "We will likely ride in some grey areas." Back to basics In January 2011, Barr had moved on to his research into Anonymousbresearch that would eventually do his company in. Over at HBGary, Hoglund continued his pursuit of next-gen rootkits. He had hit on a new approach that he called "Magenta." This would be a "new breed of Windows-based rootkit," said a Magenta planning document, one that HBGary called a "multi-context rootkit." Slava Markeyev The Magenta software would be written in low-level assembly language, one step up from the ones and zeroes of the binary code with which computers do their calculating. It would inject itself into the Windows kernel, and then inject itself further into an active process; only from there would the main body of the rootkit execute. Magenta would also inject itself routinely into different processes, jumping around inside the computer's memory to avoid detection. Its command-and-control instructions, telling the rootkit exactly what to do and where to send the information, wouldn't come from some remote Internet server but from the host computer's own memorybwhere the control instructions had been separately injected. "This is ideal because itbs trivial to remotely seed C&C messages into any networked Windows host," noted Hoglund, "even if the host in question has full Windows firewalling enabled." Nothing like Magenta existed (not publicly, at least), and Hoglund was sure that he could squeeze the rootkit code into less than 4KB of memory and make it "almost impossible to remove from a live running system." Once running, all of the Magenta files on disk could be deleted. Even the best anti-rootkit tools, those that monitored physical memory for signs of such activity, "would only be of limited use since by the time the responder tried to verify his results Magenta will have already moved to a new location & context." Hoglund wanted to build Magenta in two parts: first, a prototype for Windows XP with Service Pack 3ban old operating system but still widely installed. Second, if the prototype generated interest, HBGary could port the rootkit "to all current flavors of Microsoft Windows." Shortly thereafter, Anonymous broke into HBGary Federal's website, cracked Barr's hashed password using rainbow tables, and found themselves in a curious position; Barr was also the administrator for the entire e-mail system, so they were able to grab e-mail from multiple accounts, including Hoglund's. A world awash in rootkits The leaked e-mails provide a tantalizing glimpse of life behind the security curtain. HBGary and HBGary Federal were small players in this space; indeed, HBGary appears to have made much of its cash with more traditional projects, like selling anti-malware defense tools to corporations and scanning their networks for signs of infection. If rootkits, paranoia monitors, cartoons, and fake Facebook personas were being proposed and developed here, one can only imagine the sorts of classified projects underway throughout the entire defense and security industry. Whether these programs are good or bad depends upon how they are used. Just as Hoglund's rootkit expertise meant that he could both detect them and author them, 0-day exploits and rootkits in government hands can be turned to many uses. The FBI has had malware like CIPAV (the Computer and Internet Protocol Address Verifier) for several years, and it's clear from the HBGary e-mail leak that the military is in wide possession of rootkits and other malware of its own. The Stuxnet virus widely believed to have at least damaged Iranian nuclear centrifuge operations is thought to have originated in the US or Israeli governments, for instance. But the e-mails also remind us how much of this work is carried out privately and beyond the control of government agencies. We found no evidence that HBGary sold malware to nongovernment entities intent on hacking, though the company did have plans to repurpose its DARPA rootkit idea for corporate surveillance work. ("HBGary plans to transition technology into commercial products," it told DARPA.) And another document, listing HBGary's work over the last few years, included this entry: "HBGary had multiple contracts with a consumer software company to add stealth capability to their host agent." The actions of HBGary Federal's Aaron Barr also serve as a good reminder that, when they're searching for work, private security companies are more than happy to switch from military to corporate clientsband they bring some of the same tools to bear. When asked to investigate pro-union websites and WikiLeaks, Barr turned immediately to his social media toolkit and was ready to deploy personas, Facebook scraping, link analysis, and fake websites; he also suggested computer attacks on WikiLeaks infrastructure and pressure be brought upon journalists like Glenn Greenwald. His compatriots at Palantir and Berico showed, in their many e-mails, few if any qualms about turning their national security techniques upon private dissenting voices. Barr's ideas showed up in Palantir-branded PowerPoints and Berico-branded "scope of work" documents. "Reconnaissance cells" were proposed, network attacks were acceptable, "target dossiers" on "adversaries" would be compiled, and "complex information campaigns" involving fake personas were on the table. Critics like Glenn Greenwald contend that this nexus of private and public security power is a dangerous mix. "The real issue highlighted by this episode is just how lawless and unrestrained is the unified axis of government and corporate power," he wrote last week. Especially (though by no means only) in the worlds of the Surveillance and National Security State, the powers of the state have become largely privatized. There is very little separation between government power and corporate power. Those who wield the latter intrinsically wield the former. The revolving door between the highest levels of government and corporate offices rotates so fast and continuously that it has basically flown off its track and no longer provides even the minimal barrier it once did. It's not merely that corporate power is unrestrained; it's worse than that: corporations actively exploit the power of the state to further entrench and enhance their power. Even if you don't share this view, the e-mails provide a fascinating glimpse into the origins of government-controlled malware. Given the number of rootkits apparently being developed for government use, one wonders just how many machines around the globe could respond to orders from the US military. Or the Chinese military. Or the Russian military. While hackers get most of the attention for their rootkits and botnets and malware, state actors use the same tools to play a different gamebthe Great Gameband it could be coming soon to a computer near you. Opening photo illustration contains elements from Shutterstock. From eugen at leitl.org Sat Feb 19 13:20:04 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 19 Feb 2011 22:20:04 +0100 Subject: "Nobody Wins a Nuclear War" But "Success" is Possible (fwd) In-Reply-To: References: <20110219064623.GX23560@leitl.org> Message-ID: <20110219212004.GS23560@leitl.org> On Sat, Feb 19, 2011 at 12:59:45AM -0600, J.A. Terranson wrote: > Me too. Practicing "Duck and Cover!" at school always left you with a > particularly grim schoolday. On the other side of the Iron Curtain, it wasn't the duck and cover exercises (that never happened, or was before my time), but the nuclear weapon education posters on the walls. Yeah, these did really cheer you up. I also found the AK-47s in the weapon education chamber in our school slightly unnerving. No idea where the older kids got trained on weapon handling if at all, that must have been at higher grades than 7th. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From adamfisk at gmail.com Sun Feb 20 00:56:20 2011 From: adamfisk at gmail.com (Adam Fisk) Date: Sun, 20 Feb 2011 00:56:20 -0800 Subject: [p2p-hackers] on mobile meshes Message-ID: I somehow missed all the discussion of Egypt here, so I apologize for coming late to the game. There's *a lot* of work on the mesh and mobile side that's been happening largely separately but in parallel to p2p development over the last 10 years or so. The best I know of is from Sascha Meinrath and the people over at OTI. Have a look here, for example: http://www.saschameinrath.com/2011/feb/18/gigaom_covers_otis_mesh_work_building_technology_stack_internet_freedom There's also a great deal of activity in the censorship circumvention world surrounding all these issues, with most of the funding coming directly from State. As an aside, there are rumors that the Egyptian communications minister pulled the plug at the IXP in Egypt as the lessor of two evils with the other option being monitoring, geolocating, and arresting all dissidents at the behest of Egyptian intelligence. -Adam -- Adam Fisk http://www.littleshoot.org | http://adamfisk.wordpress.com | http://twitter.com/adamfisk _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From rayxopsciof at myftp.name Sat Feb 19 13:03:21 2011 From: rayxopsciof at myftp.name (=?ISO-2022-JP?B?GyRCOT5GIyQ5JF8kMxsoQg==?=) Date: Sun, 20 Feb 2011 01:03:21 +0400 Subject: =?ISO-2022-JP?B?GyRCJCpAJE9DTU0kRyQ5ISMkMyRORVkkTxsoQg==?= Message-ID: <<メールを残しておける便利な場所>> 忙しい主婦達が友達やサークル仲間と連絡を取り合う為にメールを 一時的に保管しておくとっても便利な場所 〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓 はじめまして。 私は主婦メール置き場という主婦達がメールを保存して やり取りするインターネット空間を運営しております江藤すみこ と申します。 この主婦メール置き場はもともと主婦達が秘密でメールを やり取りする為の掲示板でした。 「ご主人にバレないようにメールがしたい」 「携帯に履歴を残したくない」 「簡単にメールを残したい」 このような主婦達の生の声を実現したいと思い。 このメール置き場を作りました。 今では主婦の方達から大変ご好評を頂いており、 一日に10000通以上のメールがやり取りされています。 例えば、主婦Aさんの場合… 主婦Aさん「いい雰囲気のカフェを見つけたんだけど一緒に行かない?」 主婦Bさん「いいね!!じゃ夕方ね。」 このように本当に普通で簡単なメールのやり取りをしたり、 時にはご主人には知られたくないような内容をやり取りしたりしています。 使い方とても簡単。下記URLから申し込みをするだけです ▼http://www.ctrhf.com/hpymsg/ 参加無料で使えてとっても便利。 貴方の生活にぜひご活用ください。 〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓 配信:主婦メッセージ置き場 配信者:江藤すみこ 配信解除:http://www.ctrhf.com/hpymsg/ 〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓〓 From irina at tvaudio.spb.ru Sat Feb 19 11:24:36 2011 From: irina at tvaudio.spb.ru (=?koi8-r?B?7s/Xz8Ug1yDawdDMwdTF?=) Date: Sun, 20 Feb 2011 03:24:36 +0800 Subject: =?koi8-r?B?7s/Xz8UuIPrB0sHCz9TOwdEg0MzB1MEg1yAyMDExIMfPxNU=?= Message-ID: <2943C0E2F23147058377614F8E5404AE@MARBOPC1> 01 Марта ЗАРАБОТНАЯ ПЛАТА В 2011 ГОДУ: ПРАВОВОЙ, БУХГАЛТЕРСКИЙ И НАЛОГОВЫЙ АСПЕКТЫ. НАЛОГИ И ВЗНОСЫ В ПОЛЬЗУ ФИЗИЧЕСКИХ ЛИЦ Воробьева Елена Вячеславовна - налоговый консультант, автор публикаций по вопросам бухгалтерского учета, автор книги "Заработная плата", к.э.н. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 (Ч95)/4*Ч-5_3/2._6*6 : 4Ч54О95 Программа: 1. Выплаты в пользу физических лиц: заработная плата, гарантии, компенсации. Налоговый учет выплат в пользу физических лиц. 2. Основные принципы организации и построения систем оплаты труда. Составные части заработной платы: базовая, компенсационная, стимулирующая. * Стимулирующие доплаты и надбавки; премирование и поощрение. Основные принципы построения системы премирования. * Отличия заработной платы от других выплат. 3. Гарантии и компенсации: определение, различия, порядок налогообложения. * Гарантии и компенсации работникам, направленным в служебные командировки. * Гарантии и компенсации в связи с разъездным характером работы. * Прочие гарантии и компенсации. 4. Пособия по временной нетрудоспособности, пособия гражданам, имеющим детей – порядок начисления и выплаты в 2011 году. 5. Начисление выплат в пользу физических лиц, страховых взносов во внебюджетные фонды: * определение объекта налогообложения; * выплаты, не признаваемые объектом обложения; * выплаты, освобожденные от обложения страховыми взносами. 6. НДФЛ: комментарии к основным изменениям, вступившим в силу в 2011 году. Cтоимоcть: 7500 руб. По вопpоcам pегucтаpацuu обpащайтеcь по тел: \Моск. код/ Ч453266 : Ч45*З9/68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3274 bytes Desc: not available URL: From Hugo_4108 at firstworld.net Sun Feb 20 04:37:00 2011 From: Hugo_4108 at firstworld.net (Sexual practice) Date: Sun, 20 Feb 2011 09:37:00 -0300 Subject: Free of charge before the termination of month. Message-ID: <34eujepz738130165457.88216220553xy616.763RWO853edjM6D1jhagruH-3295353zs-L760571734.26j685sk2e136.41892.708@conway.nethomebiz.net> derelict wingmen avoidance dactylic muzo deportation craze ramada brent botswana sloop natal projector adamson asheville lifeblood emphasis abramson duress diem freeman celtic denounce liggett despair betelgeuse bicameral passenger crete retrogression erupt emblazon govern boston doreen declamatory alveolar delaney colorado grubby cabot boyhood depute bundy chore taft cuba bookshelf boot concubine harshen directrices blimp bugeyed beirut aloha asexual unruly shortcoming brainchildren ax brimstone coequal decompose cbs dogleg destabilize farley multi virtuous noose duke nadine fondle harden cleft chromosome trailside ar ewing pong tty chat countervail aileron clearheaded readout rack cubic stereo anion byzantine bishop critic confucius brandeis lens assiduous kelley rankine neither benign butch pressure indemnity workspace hecate chime codeword butler alumnae palliate dovetail wad cayley sprue cartridge cut afield coulter clamp earthworm attire charcoal delhi fasten emperor differentiate azimuthal andiron calcium enos bestow inert aborigine tough diversify clothier agnes minuet rooseveltian annunciate durrell immobility preoccupy ciliate ferdinand hertz potion brazilian deportation doris kenneth chalky gash oboist coulter emolument airfield novo afterword jacobus emory ecuador calamity bronchi tenderloin collegiate crater alizarin thing meretricious bismarck sal angora conscionable aaron o dogfish gout swing glottis cowbell sheepskin exasperater quasar slight bakhtiari arpa berwick ballyhoo baronial loess http://www.cbuz.com/48df1e -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 599 bytes Desc: not available URL: From jomgq at 360degreepix.com Sun Feb 20 04:45:34 2011 From: jomgq at 360degreepix.com (Attractive sexuality) Date: Sun, 20 Feb 2011 10:45:34 -0200 Subject: New preparation for men, the free test. Message-ID: <463961.912IKZFFHHL2426KGER0523317@porosity.%CUSTOM_DOMAINS> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 616 bytes Desc: not available URL: From measl at mfn.org Sun Feb 20 12:08:08 2011 From: measl at mfn.org (J.A. Terranson) Date: Sun, 20 Feb 2011 14:08:08 -0600 (CST) Subject: Forensics On Trial Message-ID: http://www.newsweek.com/2011/02/17/forensics-under-the-microscope.html Forensics Under the Microscope More courts are starting to question the .facts. proved by scientific evidence. Warren Horinek did not murder his wife. That.s what he said, that.s what the medical examiner said, that.s what the homicide sergeant said. Even the district attorney.s office in the Horineks. hometown of Ft. Worth, Texas, agreed that he was innocent.not something a Texas prosecutor typically says. But when Bonnie Horinek died in 1995, her parents refused to believe what the evidence strongly suggested.that Bonnie shot herself.and instead they enlisted the services of a blood-spatter analyst to prove that it was their son-in-law who had killed their daughter. The spatter analyst zeroed in on the blood-soaked T shirt Horinek was wearing when the paramedics arrived. To him, the fine spray of blood on Horinek.s left shoulder was not from administering CPR, as Warren said it was, and as the 911 recording seemed to indicate, but from shooting Bonnie at close range. On the basis of that testimony, Horinek was convicted of murder and sentenced to 30 years. But did they really get their man? Horinek.s lawyers have filed a writ of habeas corpus to try to have him released, based in part on the National Academy.s report; much of the spatter analyst.s testimony, the lawyers argue, .was contrary to known and accepted science.. In the age of CSI and Dexter, we.re led to believe that forensic science is a high-tech discipline, powerful and sophisticated enough to catch any criminal. As it turns out, whether blood-spatter analysis and disciplines like it qualify as .science. at all is a matter of increasing debate. In a sharply critical report issued in 2009, the National Academy of Sciences said, .The simple reality is that the interpretation of forensic evidence is not always based on scientific studies.. Taking aim at disciplines as varied as ballistics, hair and fiber analysis, bite-mark comparison.even fingerprints.the report declared, .This is a serious problem.. The last few years have seemed to bear out the report. Dozens of elite crime labs all over the country, from Nassau County, N.Y., to San Francisco, to Virginia, Cleveland, Oklahoma, and Baltimore, have been involved in scandals involving mishandled evidence and false or misleading forensic testimony. This past summer, a North Carolina attorney general.s audit discovered that the state.s Bureau of Investigation had withheld or distorted evidence in more than 200 cases. Even some of the best funded and most sophisticated crime-fighting organizations are being taken to task for their use of forensic evidence. This week, the New York Times reported that the Federal Buerau of Investigation had .overstated the strenght of genetic analysis. during the investigation of Bruce E. Ivins, who allegedly mailed anthrax to newsrooms and Senate offices in the wake of the 9/11 attacks. A year-long investigation by the independent journalism nonprofit ProPublica revealed major problems in the nation.s coroner system: pathologists not certified in pathology, physicians who flunk their board exams, even coroners who are not physicians at all. .In nearly 1,600 counties across the country,. the investigation found, .elected or appointed coroners who may have no qualifications beyond a high-school degree have the final say on whether fatalities are homicides, suicides, accidents or the result of natural or undetermined causes.. For his forthcoming book, Convicting the Innocent: Where Criminal Prosecutions Go Wrong (Harvard University Press, April 2011), University of Virginia law professor Brandon Garrett examined the trial transcripts and other legal documents of the first 250 people to be exonerated by DNA in this country. He discovered that in more than half these cases, trials were tainted by .invalid, unreliable, concealed, or erroneous forensic evidence.. The errors ranged from analysts making up statistics on the fly, implying that their methods were more scientific than they actually were, and exaggerating or distorting their findings to support the prosecution. Peter Neufeld, a lawyer in New York and cofounder of the Innocence Project, which has helped to facilitate many of these exonerations, calls it the .elastic expert: no matter what you see, I can distort it so that it would be a match.. This .elasticity. is possible because the tests are largely subjective. Just how much human judgment is required depends on the discipline: DNA testing is mostly.though not entirely.done by machine, for instance, whereas microscopic hair comparison is based solely on the analyst.s opinion. Even fingerprints, which many of us regard as foolproof tools for identifying culprits.think Dexter feeding a print into his computer and a bad guy.s photo and driver.s license appearing on the screen.in fact rely largely on human interpretation, and therefore are subject to human error. One of the most famous examples of the danger of fingerprints was the case of Oregon lawyer Brandon Mayfield, arrested in 2004 in the wake of the Madrid train bombings. Working from a partial print that Spanish authorities had found on a plastic bag of detonators, several top FBI analysts declared Mayfield.s print a match. That is, until Spanish authorities identified Ouhnane Daoud, now wanted for terrorism in connection to the crime. When it became clear that Daoud.s prints were a much better match, the FBI was forced to admit that its own bias and .circular reasoning. had led them to Mayfield, who had no involvement in the bombings. Part of the problem is what social scientists call .context bias.. Most forensics labs are located within police departments, so analysts may see themselves as working .for. the prosecution. They also usually have information about the evidence they.re testing.for example, that the suspect has a prior record. .There.s a lot of research to suggest that knowledge could have biasing effect,. says Jennifer Mnookin, a professor at the UCLA School of Law. In a recent Supreme Court case, Justice Antonin Scalia, writing for the majority, said that whether consciously or not, an analyst .responding to a request from a law enforcement official may feel pressure.or have an incentive.to alter the evidence in a manner favorable to the prosecution.. The judges. ruling means that forensic test results may be subject to the same kind of scrutiny as any other evidence, and an analyst from the lab that ran the test must be present in court to be cross-examined, just like any other witness. .Obviously, most people in this community are trying to do their jobs well and are not trying to frame innocent people,. says the University of Virginia.s Garrett. .But what we.ve seen come out of these exoneration cases and in additional scandals at the laboratories is that this is not a problem of a few bad apples. Who is the competent analyst that can testify about a technique that.s fundamentally unreliable? That.s not a bad-apple problem. That.s a serious problem with our entire system.. At the heart of these criticisms is the issue of what scientists call validity and reliability. A test is valid if its results are factually accurate. A test is reliable if multiple tests will lead to the same conclusion. Some forensics tests, like blood typing, are very reliable: no matter how many times your doctor draws your blood, you will always have the same blood type. Occasionally there are mistakes, of course, but they are predictable: blood-typing tests have well-documented and well-understood error rates. Others, like hair comparison, are unreliable: studies have shown that multiple technicians examining the same two hairs.even the same technician examining the same two hairs at different times.come to multiple conclusions. Critics say that many of forensic science.s most basic tools are neither reliable nor valid. For example, at the trial of Jimmy Ray Bromgard, who served more than 14 years of a 40-year sentence for sexual intercourse without consent until he was exonerated in 2002, the director of the Montana State Crime Lab told the jury that hairs found on a blanket in the victim.s house .matched. hairs taken from Bromgard.s body. There were so many hairs that matched so well, the analyst said, that there was a .one in 10,000. chance the hairs could have come from anyone else. But no one has ever established any statistics about the microscopic characteristics of hair, so .one in 10,000. odds isn.t based on scientific consensus. How common is it for a person to have a particular hair color, or for a hair to crinkle or curl just so? Scientists have never answered that question systematically. And what does .match. mean, anyway? There are no uniform guidelines to say how many characteristics two hairs must have in common before they.re said to .match.. It varies entirely from one lab to the next, from one technician to the next. Barry Fisher, who served as the crime-laboratory director for the Los Angeles Sheriff.s Department for more than 20 years, was often stymied by this problem when he took the stand. .How do you convey the level of certainty?. Fisher asks. .Do you say to the jury, .I.m pretty sure.? .I.m very sure.? What do these things mean?. To get around this problem, Garrett found, forensics experts too often overreach in their testimony. When Ray Krone was convicted of murder in Arizona and sentenced to death in 1995, the testimony of a bite-mark analyst was key to the state.s case. .This is really an excellent match,. the analyst said on the stand, comparing Krone.s teeth with a bite mark on the murder victim. .That tooth caused that injury.. In fact, in its report the National Academy of Sciences found that, among all the forensic disciplines, only DNA has proved capable of .individualization..that is, demonstrating .a connection between evidence and a specific individual or source.. When the DNA in the Krone case was tested year later, he was exonerated, but only after spending a decade in prison. The report has led a small but growing number of judges to take a more skeptical approach to forensics. In addition to the Supreme Court case, Melendez-Diaz v. Massachusetts, U.S. District Court Judge Nancy Gertner announced in March that she will allow forensic evidence in her courtroom only if a lawyer first proves in a pretrial hearing that the method is scientifically sound. .In the past, the admissibility of this kind of evidence was effectively presumed, largely because of . the fact that it had been admitted for decades,. Judge Gertner wrote in her order. .The NAS report suggests a different calculus.. The National Institute of Justice has funded some preliminary studies to establish the scientific information that has so far been missing; UCLA.s Mnookin and her colleagues are less than a year into a two-and-a-half-year grant to develop a more formalized and scientifically validated approach to fingerprint analysis. .It.s not that we know that they don.t work,. Mnookin says of fingerprints and other forensic methods. .It.s that we don.t have enough evidence about when they work, how they work, when they might not work.. The report also led to a series of Senate Judiciary Committee hearings. In January Senator Patrick Leahy (D-Vt. introduced a bill to address some of the major issues in the nation.s forensic system. The The Criminal Justice and Forensic Science Reform Act takes up many of the issues identified in the NAS report. Although the report has gotten a chilly reception from many forensics experts and prosecutors, many others in the field, like Fisher, believe reforms in the system are long overdue. Geoffrey Mearns, a former federal prosecutor who helped try both Oklahoma City bombers Terry Nichols and Timothy McVeigh, regularly used forensics in his work. Mearns served on the committee that wrote the academy.s report. .I had assumed that there were well-established uniform processes and procedures in place. I really had faith in the accuracy, reliability, and that it was well grounded in science,. says Mearns, now provost and senior vice president for academic affairs at Cleveland State University. .When I realized my faith was not well placed, I was very concerned about the damage that it was doing to the accuracy and efficiency of law-enforcement investigations. Because if the science is not accurate, and is leading us to the wrong person, it.s not only causing a terrible injury to the wrong person, but it.s leading you away from the right person.. The 265 innocent people so far exonerated by DNA are lucky. Among the .hundreds, if not thousands. of people that the Innocence Project.s Peter Neufeld estimates were wrongfully convicted on the basis of faulty forensics, only a small percentage have DNA available to test. What is their recourse? Neufeld says his organization is counseling attorneys to submit a writ of habeas corpus.the legal system.s document of last resort.on the basis of newly discovered evidence: the fact that forensic science is not as scientific as it purported to be at the time of trial. However, .given the reluctance of judges to ever set aside convictions with anything less than DNA,. says Neufeld, .I am not as optimistic as I would like to be despite the fact that there.s a matter of fairness.. One of those exonerated after 15 years in prison was Roy Brown. He was convicted of murder in 1992 and sentenced to 25 years to life, partly on the basis of a bite-mark analyst who said that Brown.s teeth matched a wound on the victim .to a reasonable degree of dental certainty.. The fact that whoever had bitten the victim had six teeth on his upper jaw.the wound clearly had six impressions.whereas Roy Brown had only four was .inconsistent,. the analyst admitted, .but explainably so in my opinion.. DNA proved him innocent in 2006. Beth Schwartzapfel is a Brooklyn freelance journalist with an interest in criminal justice issues. From jya at pipeline.com Sun Feb 20 13:10:12 2011 From: jya at pipeline.com (John Young) Date: Sun, 20 Feb 2011 16:10:12 -0500 Subject: Forensics On Trial In-Reply-To: Message-ID: This reminds of the carnard that crypto weakness is in the implementation or user ineptness not the algorithm, the math nor the cryptographers. Probably old stuff to the sharp tacks here, a 2007 paper describes how to retrieve keys from volatile memory not via brute force cracking or key logger or back doors or rubber hole or stupidly vain cryptographers. PGP Disk and TrueCrypto are used as examples of how to do it. http://cryptome.org/0003/RAMisKey.pdf This might suggest explain why those associated long-associated with PGP have moved on to less risky endeavors and why TrueCrypt is so beloved by snoops. The paper was written by a student which again demonstrates that those with less of a stake in the most trustworthy security are seldom the most trustworthy and must be protected by secrecy. Now, for dead-broke deep thinking futurists: Which is the world's greatest spying machine, the Internet or cellphones or the two combined? What is the crucial aspect of each system which renders it susceptible to covert compromise? Which is most promoted as a way to assure freedom from compromise? Name the most prominent promoters for each. Name the most unknown skeptic for each. Name three shame-faced apologists who admit they had not examined the consequences of what they once believed with certainty. Winners will receive a huge amount of untaxable cash amply hoarded offshore by Robert Hettinga, secured by powerful financial crypto. From oulck at 2muchfootball.com Sun Feb 20 17:05:49 2011 From: oulck at 2muchfootball.com (Sexuality and manners) Date: Sun, 20 Feb 2011 20:05:49 -0500 Subject: New preparation for men, the free test. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 586 bytes Desc: not available URL: From Alejandro422 at 2einkomen.com Sun Feb 20 18:14:01 2011 From: Alejandro422 at 2einkomen.com (The sexual answer) Date: Mon, 21 Feb 2011 06:14:01 +0400 Subject: The test of New man's pills, is given free of charge. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 610 bytes Desc: not available URL: From ldcpaoaveerj at 10gstreetne.info Sun Feb 20 18:27:16 2011 From: ldcpaoaveerj at 10gstreetne.info (Modern sexuality) Date: Mon, 21 Feb 2011 06:27:16 +0400 Subject: The free test, advertising testing of pills for men. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 647 bytes Desc: not available URL: From eugen at leitl.org Sun Feb 20 23:40:50 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 21 Feb 2011 08:40:50 +0100 Subject: [p2p-hackers] on mobile meshes Message-ID: <20110221074050.GB23560@leitl.org> ----- Forwarded message from Adam Fisk ----- From eugen at leitl.org Mon Feb 21 02:18:43 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 21 Feb 2011 11:18:43 +0100 Subject: [cryptography] Reliably Erasing Data From Flash-Based Solid State Drives Message-ID: <20110221101843.GH23560@leitl.org> ----- Forwarded message from Alexander Klimov ----- From alserkli at inbox.ru Mon Feb 21 01:48:22 2011 From: alserkli at inbox.ru (Alexander Klimov) Date: Mon, 21 Feb 2011 11:48:22 +0200 Subject: [cryptography] Reliably Erasing Data From Flash-Based Solid State Drives Message-ID: : We empirically evaluate the effectiveness of hard drive-oriented techniques and of the SSDs' built-in sanitization commands by extracting raw data from the SSD's flash chips after applying these techniques and commands. Our results lead to three conclusions: First, built-in commands are effective, but manufacturers sometimes implement them incorrectly. Second, overwriting the entire visible address space of an SSD twice is usually, but not always, sufficient to sanitize the drive. Third, none of the existing hard drive-oriented techniques for individual file sanitization are effective on SSDs. -- Regards, ASK _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From zooko at zooko.com Mon Feb 21 14:04:55 2011 From: zooko at zooko.com (Zooko O'Whielacronx) Date: Mon, 21 Feb 2011 15:04:55 -0700 Subject: [p2p-hackers] P2P file storage systems Message-ID: Dear Michael Militzer: Thanks for your ideas about secure P2P storage, and thanks for your interest in Tahoe-LAFS in particular. Here are a couple of quick responses. I'm an architect and developer of Tahoe-LAFS. On Sun, Feb 20, 2011 at 7:45 AM, Michael Militzer wrote: > > While I don't agree that we should really drop erasure > coding, I however like your approach to keep things simple. I also like that about Octavia. I'd like to see Octavia developed and used more so I can learn more about the consequences of its trade-offs. Since it is so simple it should be relatively easy for a volunteer to implement it or to contribute part of an implementation of it. Somebody out there do that! :-) > Also today > indeed bandwidth should be the more precious resource in a P2P system > compared to storage, which is available in abundance to the home user. > So a simple replication strategy might not be so bad after all... Replication costs more bandwidth on upload than erasure coding does (for a similar degree of fault-tolerance) as well as costing more storage. > If I understood it right, Tahoe clients simply keep a connection with each > storage node in a storage cluster. That's right, We have kicked around some ideas about how to do a more scalable-DHT-like routing instead of keeping a connection open from each client to each server, but even if we had such a thing Tahoe-LAFS grids would still be comprised exclusively of servers whose owners gave you some reason to believe that they were reliable. Scalable routing a la DHT wouldn't be sufficient to allow you to safely rely on strangers for storage, for various reasons that you touched on next: > So if the DHT is deployed on untrusted nodes we need to care about things > like admission control, sybil attack, routing and index poisening, eclipse > attack and so on. Hm, but then you say something that I don't quite follow: > - It may need further modification to be safely usable in a network > comprised of untrusted nodes (sybils, DHT robustness against denial of > service attacks, ...) I think the word "trust" often causes confusion, because it bundles together a lot of concepts into one word. I find that rephrasing things in terms of "reliance" often makes things clearer. So: Tahoe-LAFS users absolutely do *not* rely on the storage servers for confidentiality and integrity. Confidentiality and integrity are guaranteed by the user's client software, using math (cryptography). Even if *all* of the storage servers that you are using turn out to be controlled by a single malicious entity who will stop at nothing to harm you, this doesn't threaten the confidentiality of the data in your files nor its integrity. But, Tahoe-LAFS users *do* rely on the storage servers for the longevity and availability of their data. If the malicious entity that controls all the servers decides to delete all of the ciphertext that they are holding for you, then no mathematical magic will help you get the data back. :-) That is why Tahoe-LAFS users typically limit the set of storage servers that they will entrust their ciphertext. They choose only servers which are operated by friends of theirs, or by a company that they pay for service, or servers operated by members of a group that has collectively agreed to trade storage for storage with each other. I wrote more on this topic in a letter to the tahoe-dev mailing list last night: "BitTorrent for storage" is a bad idea http://tahoe-lafs.org/pipermail/tahoe-dev/2011-February/006150.html > - To guarantee persistence in a P2P network of untrusted and unreliable > nodes Tahoe's information dispersal strategy needs be adapted. The degree > of redundancy must be increased (n/k) but just as well the number of > erasure coded fragments (k) too for storage efficiency. Why do you think these parameters would need to be changed? > I don't know if > this is practically doable within Tahoe's current structure (galois-field > based Reed-Solomon coding is slow with large k and n) or what other side > effects this may have (size of the Merkle trees?). It is plenty efficient for k and n up to about 256. It is also probably efficient enough for k and n up to about 2^16, although I'm skeptical that anyone actually needs k and n that size. There is a Merkle Tree in Tahoe-LAFS which is computed over the identifiers of the n shares, so that Merkle Tree would grow in size as n grew. However that is a small cost that probably wouldn't need much if any optimization. > - Censorship-resistance obviously also depends on availability and data > persistence guarantees. If directed (or undirected) denial of service > attacks are possible on the DHT, the system cannot said to be censorship- > resistant. Hm, so if I understand correctly, Tahoe-LAFS currently doesn't have *scalability* in terms of the number of servers, but it does have nearly optimal *censorship resistance* at a given scale. For example, suppose there are 200 servers which are all joined in the conspiracy to host a repository of Free and Open Source Software, and some evil attacker is expending resources attempting to disrupt that hosting or deny users access to it. If those 200 servers are organized into a traditional scalable DHT like Chord, then a client would have approximately a logarithmic number of connections to servers, say to perhaps eight of them. An attacker who wants to deny that client access to the Free and Open Source software repository would have to take down only eight servers or prevent the client from establishing working connections to them, right? Whereas with a full bipartite graph topology like Tahoe-LAFS the attacker would have to take down or deny access to a substantial constant fraction of all 200 of them (depending on the ratio of k to n). (Note: is assuming that the erasure coding parameter n is turned up to 200, which is already supported in Tahoe-LAFS -- you can configure it in the tahoe.cfg configuration file.) (Note: this is about attacking the storage layer, not the introduction layer. Those are separate in Tahoe-LAFS and while the latter does need some work, it is probably easier to defend the introduction layer than the storage layer since introducers are stateless and have minimal ability to do damage if they act maliciously. Multiple redundant introducers were implemented by MO Faruque Sarker as part of the Google Summer of Code 2010 but it hasn't been merged into trunk yet. You can help! We need code-review, testing, documentation, etc. http://tahoe-lafs.org/trac/tahoe-lafs/ticket/68 :-) ) > And there are other, less-obvious censorship risks too: If a third-party > can force specific node owners (e.g. by court order) to shut down their > storage nodes then certain data can become unavailable in the system. You may be interested in Tahoe-LAFS-over-Tor and Tahoe-LAFS-over-i2p. :-) I'm sure both of those projects would be grateful for bug reports, patches, etc. Regards, Zooko _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From kenishamonetba at pharmacyexpress.com Mon Feb 21 00:25:21 2011 From: kenishamonetba at pharmacyexpress.com (Kenisha Monet) Date: Mon, 21 Feb 2011 16:25:21 +0800 Subject: By having a beautiful luxury designer replica watch, your girlfriend will be surely inclined towards you at once. Message-ID: <4d622171.bf0e1a42@pharmacyexpress.com> Patch Up With Your Girlfriend With Luxury Designer Replica Watches If you are worried about your breakup, then you should be bold enough to patch up it with grace and style. By having a beautiful luxury designer replica watch, your girlfriend will be surely inclined towards you at once. All of a sudden, natural feelings of love, peace, comfort, romance, and sex will be restored again between you and your girlfriend for long time http://finewatchescedrus.ru From marc at let.de Mon Feb 21 09:20:47 2011 From: marc at let.de (Marc Manthey) Date: Mon, 21 Feb 2011 18:20:47 +0100 Subject: [p2p-hackers] Why Political Liberty Depends on Software Freedom More Than Ever / was Some Clarifications regarding Egypt Message-ID: Am 20.02.2011 um 00:31 schrieb David Barrett: > > > I think the Freedom Box should take a similar approach. It should > arrive pre-configured with the wifi network name and network printed > on > a (removable) sticker on the side. The first browser to connect to it > should get a happy webpage explaining how it works and ask the fewest > possible configuration steps. In fact, maybe the first time any new > MAC > address connects to it, show a nice welcome page. Yes i think the technologie is developed allready, imagine " zeroconf" for the hassle free configuration and publishing of services http://www.dns-sd.org/ and http://pdos.csail.mit.edu/uia/ All things just need to put together like eben said. :) or a commercial solution AllJoynb" is a peer-to-peer technology that enables ad hoc, proximity- based, device-to-device communication without the use of an intermediary server. https://www.alljoyn.org/ greetings Marc > > Then have a big "reset" button on the side that wipes the brick and > restores it to factory settings. The wipe should be so thorough as to > make it literally impossible to know if anybody has ever used it. > This > is good for security, as well as for just fixing it when something > goes > wrong. > > -david > > On 02/19/2011 03:18 PM, Mats Henricson wrote: >> Well, a lot of people are willing to take a hit when it comes to >> ease of use >> to get more privacy. We're even willing to pay for one of these >> plugs. >> >> Mats >> >> On Sat, Feb 19, 2011 at 11:12 PM, Chris Palmer >> > > wrote: >> >> Eugen Leitl writes: >> >>> Tor, Tahoe-LAFS, i2p, tinc, some kind of opportunistic >>> encryption are obvious candidates, but what else? >> >> The purpose of Freedom Box is to compete with cloud services, >> which are >> notable for their ease of use. That is much less true of these >> technologies. >> I don't see how Freedom Box can succeed without taking the >> usability >> problem >> head-on. >> >> >> -- >> http://noncombatant.org/ >> >> "These days, though, you have to be pretty technical before you >> can even >> aspire to crudeness." --- William Gibson >> >> _______________________________________________ >> p2p-hackers mailing list >> p2p-hackers at lists.zooko.com >> http://lists.zooko.com/mailman/listinfo/p2p-hackers >> >> >> >> >> _______________________________________________ >> p2p-hackers mailing list >> p2p-hackers at lists.zooko.com >> http://lists.zooko.com/mailman/listinfo/p2p-hackers > _______________________________________________ > p2p-hackers mailing list > p2p-hackers at lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers -- Les enfants teribbles - research / deployment Marc Manthey- Vogelsangerstrasse 97 50823 KC6ln - Germany Tel.:0049-221-29891489 Mobil:0049-1577-3329231 blog: http://let.de project : http://opencu.org twitter: http://twitter.com/macbroadcast/ facebook : http://opencu.tk Opinions expressed may not even be mine by the time you read them, and certainly don't reflect those of any other entity (legal or otherwise). _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Feb 21 10:01:02 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 21 Feb 2011 19:01:02 +0100 Subject: [p2p-hackers] Why Political Liberty Depends on Software Freedom More Than Ever / was Some Clarifications regarding Egypt Message-ID: <20110221180102.GJ23560@leitl.org> ----- Forwarded message from Marc Manthey ----- From teneshadwynellpt at ftgx.com.jfet.org Mon Feb 21 15:54:01 2011 From: teneshadwynellpt at ftgx.com.jfet.org (Tenesha Wynell) Date: Mon, 21 Feb 2011 22:54:01 -0100 Subject: Here you will learn about replica watches and perfect watches. Message-ID: <201102212355.9FB621A30CE6FF97ECF6A13@i8265fp> Can you imagine about some cheap replica watches? Indeed they have become one of the best complimentary gifts for boyfriends and girlfriends nowadays. With the aid of imitation rolex watches, you can be surely able to again get closer with your girlfriend for long time. That is why replica watch is available in every new style nowadays for example,Cartier replica watch, Zenith fake watch, Omega fake watch, Day Date replica watch, Date Just fake watch, Ferrari replica watch, and so on. Therefore if you are looking for some cheapest replica watches to really patch up with your girlfriends, you should immediately get connected with best online replica watches store so as to accomplish your needs and desire on time. Replica watches are available in many styles. By visiting any replica watch website,you can select a watch that suits you style and budget. You can buy thesewatches for different occasions for your loved ones. Here you will learn about replica watches and perfect watches. http://finewatchescreep.ru From nickm at freehaven.net Mon Feb 21 21:03:30 2011 From: nickm at freehaven.net (Nick Mathewson) Date: Tue, 22 Feb 2011 00:03:30 -0500 Subject: [tor-talk] Using Mixminion trough the Tor network Message-ID: On Sun, Jan 30, 2011 at 2:13 PM, emersonv6 wrote: > Hi, > > I was wondering if anyone has succeeded torifyng Mixminion. You'd probably want to hack up Mixminion's socket.connect stuff to use a SOCKS-compatible version instead. The functions to hack on the client side would be in lib/mixminion/MMTPClient.py ; that's the part that does the client-side network connections. Unfortunately, Mixminion isn't maintained these days; if anybody is interested in new versions coming out, they should subscribe to the mixminion-dev list and coordinate with others. hth, -- Nick _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From marten-tfrerevo at advokatsamara.ru Mon Feb 21 18:21:26 2011 From: marten-tfrerevo at advokatsamara.ru (=?koi8-r?B?7uTm7A==?=) Date: Tue, 22 Feb 2011 03:21:26 +0100 Subject: =?koi8-r?B?wsXMwdEg2sHS0MzB1MEg0NXUxc0g1c3Fztjbxc7J0SDT1NLByM/X2cgg?= =?koi8-r?B?19rOz9PP1w==?= Message-ID: <000d01cbd237$34eea380$6400a8c0@marten-tfrerevo> 28 февраля 2О1lг. Методы оптимизации расходов на выплату белой зарплаты: уменьшаем страховые взносы Московский код; 7*Ч2_9i-98 \\\/// ЧЧ53266 Цель: Ставка обязательных страховых взносов с зарплаты с 2011 года составляет 34% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала ЕСН заменена отменой уплаты взносов с суммы дохода свыше 463 тыс. рублей, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь √ назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1. Обзор изменений законодательства, связанных с повышением ставки страховых взносов Сколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2011 гг. Какие схемы стали невыгодными; у каких налогоплательщиков положение даже улучшилось. 2. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. 3. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность в 2011 г.; * дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с кассовой дисциплиной и политикой ЦБ. Текущая ситуация с обложением таких доходов НДФЛ. 4. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Страхование жизни работников и ДМС за счет предприятия. 6. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. 7. Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 8. Использование процентных займов от физлиц. Расчет эффективности. 9. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 10. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, 11. Создание недоимки по налогам с ФОТ на фирме, не обремененной активами √ пример "серой" схемы (как нельзя "оптимизировать"!), 12. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 13. Ответы на вопросы. По желанию √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 (495) 4Ч/53/96_8 <<>> 742_9*|_9_8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6736 bytes Desc: not available URL: From marilee.candicemc at dmans.com Mon Feb 21 13:01:22 2011 From: marilee.candicemc at dmans.com (Marilee Candice) Date: Tue, 22 Feb 2011 05:01:22 +0800 Subject: Great prices is available! Order Xanax Online at cheap price Message-ID: <201102211500.2392F3EC0FD8CCCB4CD93E9@m6ya381> Great prices is available! Order Xanax Online. Buy Xanax Online from Certified Online Pharmacy. Order xanax no prescription for Lowest prices Buy Xanax without a prescription. Fast Worldwide shipping. http://cheappharmacybuy.ru From eugen at leitl.org Mon Feb 21 23:38:42 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 22 Feb 2011 08:38:42 +0100 Subject: [p2p-hackers] P2P file storage systems Message-ID: <20110222073842.GM23560@leitl.org> ----- Forwarded message from Zooko O'Whielacronx ----- From eugen at leitl.org Mon Feb 21 23:47:18 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 22 Feb 2011 08:47:18 +0100 Subject: [tor-talk] Using Mixminion trough the Tor network Message-ID: <20110222074718.GP23560@leitl.org> ----- Forwarded message from Nick Mathewson ----- From lchantelvr at johnburnham.com.jfet.org Mon Feb 21 18:42:19 2011 From: lchantelvr at johnburnham.com.jfet.org (Latonya Chantel) Date: Tue, 22 Feb 2011 10:42:19 +0800 Subject: Buy Viagra Online without prescription! Lowest Prices and Satisfaction Guaranteed! Message-ID: <4d63228b.fd16a068@johnburnham.com> OVERNIGHT Viagra - $1.18 per pill from USA stock USA to USA 2nd Day Delivery. 15 x Viagra 100mg tabs ONLY $35 Best Quality and Low Prices! Free Regular Delivery for ALL orders Free Express Delivery for orders over $200! FDA & WHO approved Accept Visa/MC/eCheck http://buyhealthonline.ru From m0lt1wl at gmail.com Tue Feb 22 11:25:47 2011 From: m0lt1wl at gmail.com (m0lt1) Date: Tue, 22 Feb 2011 14:25:47 -0500 Subject: Feasibility of Using TOR or VPNs For Anonymity Message-ID: <4D640DBB.5090900@gmail.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I've been told TOR and VPNs are heralded for their anonymizing properties however the skeptic in me says that there are some serious failing points. It goes without saying that recipients of this list knows their stuff about prying eyes and third parties surveilling activities of "activists" or people of interest. So, how does one engage in electronic communication whilst maintaining anonymity from governments, business, and rambunctious infosec techies? I've also been told that TOR exit nodes are often run by governments to filter and collect outgoing data that can use to build a profile on a person. How dangerous is this problem? Wouldn't the SSL'd connections between TOR nodes mitigate the issue? My present strategy is to employ the use of a VPN that retains IP address logs for 24 hours before wiping for all communications. The VPN is located outside the US, and is apparently regarded as "safe" by a few paranoid individuals. I know there are a few pitfalls there, how dire are they? In short, I need to be able to disassociate my real identity with this pseudonym effectively enough to "hide" from governments and third parties... At least in terms of originating IP addresses to public services like email. -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJNZA26AAoJEPuu2mBeOIXHAucP/0pnDqnbP0rLAbZ0PLKgMOdM Jv7TFo8T7MruGQ6l7X6M8Ol0w05tNeh02Y7UtLv5jBkUXIacXOlxXgJfFhri3Pm7 0IBIzfzoki+PhSyWEca8gc/uhjIFTAE/uEpTDUgf5s4hE4WqgihNwI4JHv98tlr5 tXZn2kcckuoCz/hfGg7HqLbDyI6nCG+6JA9Ojl+Iq9JemIfY51BoE2YBYOAc8keM cGpFNkrrMdL/Cl2/RayYI9OjG/N9yY2cKXpniBRq1kUwHoyMKS/B8424p4fKNiMu otFWBNz2EbV+rbv1O2r+EmmIH8MtLWRFYxnedsHNYcuWetYdQP3b2M4y8QZJvFVs Z7zGLeKpEGxT/Mo489g+6fPaf1YcVCB7g7Y1liq8IPK9YpCpPTwYjiFV+2Fz6Cw1 Ilsyy5ldS+gGaWFiYpLxIBquu5Oki7GNvXTBUQdHOaRmNCuxTT5NvzT7nwtZqhLc GMD1Ea8V7iFeIUfpaEYW8GrvAx/9AnLqP2iTyUfC9huu1q4oFRF8tx5pKWl9Kt5w G14qP3uDmFQiotOfpK1LAW8WTn/ffIb4LLSYPkmW+u+AGR2X0t9PuZqQS+Q8ehFc wTM0dfdZM7lHJY6IDOkSuXyPLDJIXqMO44zStPAVPME/lXLZMSureesV+joD0GRK oBDgNe/aFyK6VOfy9H9W =REH8 -----END PGP SIGNATURE----- From jya at pipeline.com Tue Feb 22 13:00:16 2011 From: jya at pipeline.com (John Young) Date: Tue, 22 Feb 2011 16:00:16 -0500 Subject: Feasibility of Using TOR or VPNs For Anonymity In-Reply-To: <4D640DBB.5090900@gmail.com> Message-ID: You may not be aware that such questions are now commonplace by commercial spies like HBGary and ilk. So here is what you tell them buzzards openly with your nym prominent: The design of the Internet prevents concealed communication from being possible. How to prevent using the Internet to do what you want was its first design requirement. Still there have been numerous attempts to get around the Internet's fundamental prohibition against being traced. A canard has been promulagated that the Internet routes around censorship and based on that there continues to be a hope that untraceability is in the offing. TOR and VPN claimed to be able to do that but cannot, don't waste your time, they were compromised by design. Many more out there and more hidden to assure suckering. All mass communication must be capable of tracing its users, for "administration and management." Designers and sysadmins of any of these systems know that but keep it quiet to protect their jobs and investor profits. Privacy shams encourage trust in these systems as in confessionals and torture holes. There may be a way to communicate with a few people without using any means of mass communication but not with many and pretty soon one or more of them will rat on the other users, either for pay or for jealous revenge at being stooged. TOR is a fish trap. This is not limited to technological means of communication, it applies to any form, verbal, written, sign, smoke, ear wiggle, eye blink, twitch, finger, forked tongue, boogie, hickory stick, mail drop, dead drop, fake rock, gut condom, vaginal and anal beads, DNA and quanta. You might think keeping your mouth shut would do it, but no no no. Too late for that unless it was never opened begging for tit. Tits have you by the balls. So go to work and pay your dues. But even then expect to be reported to the authorities as a menace to society for asking these questions. Or, if you're broke, report your gang and its fledging means of hiding. From m0lt1wl at gmail.com Tue Feb 22 14:17:16 2011 From: m0lt1wl at gmail.com (m0lt1) Date: Tue, 22 Feb 2011 17:17:16 -0500 Subject: Feasibility of Using TOR or VPNs For Anonymity Message-ID: <4D6435EC.9050307@gmail.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 In reply to John: So you say all hope is lost, then? That Nineteen Eighty-Four has come upon us? Don't tell me you give up a white flag so easily. If a system has been build, it can be broken. Then lets look to mitigation and obfuscation. What is the lesser of two evils? I have been suspicious of TOR long enough to stop using it. But the technology of VPNs don't seem to be the failing point, it's its operators. What of compromised servers? Installing a network of VPNs or a darknet on a host of unsuspecting machines, thus leaving them exposed to the world whilst I comfortably stay obfuscated? Perhaps a more blackhat approach is the way to go. I'm only briefly aware of HBGary and others, but from what I've heard that is the exact reason why I'd prefer to operate under a pseudonym and not my real identity. Perhaps some faith should be placed in the design of the P2P DNS infrastructure? One that could, hopefully, provide a safer haven that traditional DNS and Internet structure. -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJNZDXsAAoJEPuu2mBeOIXHz+cQAJQ9P5JSSocc4o9KKwVGoTDM zKywxriWvE/sJp72kpPPQmrQI5D35qIgO0GYgphU/cTtfUSwX/V0UPu09iaBpgVB MAX9x1uf+3n5aTo5R97OJD9+5ymg/8tqj+26qwuY3ChOoAoNbmFgQRqAu3/3f95Y Ma95GpM5jglpnOgVIy9rmnUBJlEuG0aDX5Kce5S0XSXIu+S4vEH/IoCtpyTV4oY/ ZYok2fCtbFm6Bb4kgbkVG0RnzjcAdqVOg54MetK5StLpeF/2vzUFVORRJqGZkTQ7 ympTmKpQazpqtPHDzYOCjDOAZQA2BV5EObySAAOzTcIbRvs5VV0+hDa+ai+pboOo YpiZ+9Ki9bMu0ZW39Yln5NtQB3JWQx1VyaaI/nOoG4+cy8GZCkOB3u370DOy6JiJ 1fdTxGOklxq8gmH/Qj/TBpi4Lg8oTWDasxEf+YQLifcbLjdJ7DEU08SR+h5BuMBB BPMTuNuLlYx0EtV6tjn/BzuobuFCy57jInNaC5Cddqb2T14nzrYuauVGG2CFLbms hcXgdqAyIiK2fAdcJY3dugq8K0A4u2espVl5OLTZ4Tb4Dk+HKVw6vJAUm45GOhQn WuqgnPC966Vwe1jPbiq8w/lXkdiWLwfDQc8oyU3n/038FGt3xNB/AAbBJ8kU7nLk OeB4HwoIFWxmfMQmF/np =6eaf -----END PGP SIGNATURE----- From gavinandresen at gmail.com Tue Feb 22 17:22:18 2011 From: gavinandresen at gmail.com (Gavin Andresen) Date: Tue, 22 Feb 2011 20:22:18 -0500 Subject: [bitcoin-list] Bitcoin version 0.3.20.01 released Message-ID: Binaries for Bitcoin version 0.3.20.01 are available at: https://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.3.20/ There were several changes and additions to the JSON remote-procedure-call interface; there are no significant user interface changes. See: http://www.bitcoin.org/smf/index.php?topic=3473.msg48839#msg48839 ... for details. This version does fix one significant denial-of-service attack (earlier versions of bitcoin could be caused to crash due to running out of memory by a remote attacker). SHA1-checksums for the binary files are: 7dfbc05b36112f59886a29f044cfd21c6c253169 bitcoin-0.3.20.01-linux.tar.gz 3fe4c5f2a5406322a2f116b30aefbd402b079940 bitcoin-0.3.20.01-win32-setup.exe dffb709a90a7abcff08c2ef1e79d3f9b54751786 bitcoin-0.3.20.01-win32.zip b540825d864e7561cc21465ad072fb299e0d817a bitcoin-0.3.20.01-macosx.zip Gavin Andresen gavinandresen at gmail.com ------------------------------------------------------------------------------ Free Software Download: Index, Search & Analyze Logs and other IT data in Real-Time with Splunk. Collect, index and harness all the fast moving IT data generated by your applications, servers and devices whether physical, virtual or in the cloud. Deliver compliance at lower cost and gain new business insights. http://p.sf.net/sfu/splunk-dev2dev _______________________________________________ bitcoin-list mailing list bitcoin-list at lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-list ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From manager at sigma.com.ua Tue Feb 22 15:30:49 2011 From: manager at sigma.com.ua (=?koi8-r?B?9dfPzNjOxc7JxSDCxdogz9vJws/L?=) Date: Tue, 22 Feb 2011 20:30:49 -0300 Subject: =?koi8-r?B?9dfPzNjOxc7J0SDJINPPy9LB3cXOycUg3snTzMXOzs/T1MkgyczJINvU?= =?koi8-r?B?wdTBINPP1NLVxM7Jy8/X?= Message-ID: <000d01cbd2e8$89ece340$6400a8c0@manager> Общие принципы грамотного увольнения работника. Какие ошибки чаще всего совершают работодатели? 28 февраля 2О1lг. +7 (495) 4453266 \\// 792*_2|./22 Цель обучения: Изучить общие основания прекращения трудового договора, особенности сокращения штатов для отдельных категорий работников. Программа мероприятия: Общий порядок прекращения трудового договора * Собственное желание * Расторжение трудового договора по соглашению сторон * Прекращение трудового договора в связи с истечением срока его действия * Увольнение в порядке перевода к другому работодателю * Увольнение в связи с отказом работника от продолжения работы в силу изменения определенных условий трудового договора Расторжение трудового договора по инициативе работодателя: * На испытательном сроке * По причине сокращения численности (штата) работников -Порядок проведения, сроки выплата выходных пособий, -Кого сократить, а кого уволить по соглашение сторон? -Плюсы и минусы сокращения и соглашения сторон. * По причине недостаточной квалификации работника -Аттестация работников, как аргумент работодателя: правовое регулирование, сроки и порядок проведения, * В связи с неоднократным неисполнением обязанностей -Дисциплинарные взыскания √ Кнут работодателя: Порядок наложения и оформления, как не допустить ошибок. * В связи с однократным грубым нарушением работником трудовых обязанностей -По причине совершения проступка работником, непосредственно обслуживающим денежные или товарные ценности * В связи с представлением работником подложных документов Расторжение трудового договора по обстоятельствам, не зависящим от воли сторон Увольнение отдельных категорий работников: * Руководителей организаций * Совместителей * Беременных женщин Выдача трудовой книжки при увольнении: возможные проблемы и споры Ответы на вопросы слушателей Вся информация по тел: код: (четыре девять пять) 44_53_96-8 и Ч45З9-68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4447 bytes Desc: not available URL: From StealthMonger at nym.mixmin.net Tue Feb 22 17:32:49 2011 From: StealthMonger at nym.mixmin.net (StealthMonger) Date: Wed, 23 Feb 2011 01:32:49 +0000 (GMT) Subject: Feasibility of Using TOR or VPNs For Anonymity References: <4D640DBB.5090900@gmail.com> Message-ID: <20110223013249.BDF7B81440@fleegle.mixmin.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 m0lt1 writes: > I've been told TOR and VPNs are heralded for their anonymizing > properties however the skeptic in me says that there are some > serious failing points. Your skepticism is fitting. In fact, even the TOR documentation concurs: ... for low-latency systems like Tor, end-to-end traffic correlation attacks [8, 21, 31] allow an attacker who can observe both ends of a communication to correlate packet timing and volume, quickly linking the initiator to her destination. http://tor.eff.org/cvs/tor/doc/design-paper/challenges.pdf > So, how does one engage in electronic communication whilst > maintaining anonymity from governments, business, and rambunctious > infosec techies? uinmyn: Is this anonymous browsing, or what? http://groups.google.com/group/alt.privacy.anon-server/browse_thread/thread/089c8f2f251c207e?fwc=1 stealthmail: Hide whether you're doing email, or when, or with whom. mailto:stealthsuite at nym.mixmin.net?subject=send%20index.html > In short, I need to be able to disassociate my real identity with > this pseudonym effectively enough to "hide" from governments and > third parties... Good stuff. Stick with it. -- StealthMonger Long, random latency is part of the price of Internet anonymity. Key: mailto:stealthsuite at nym.mixmin.net?subject=send%20stealthmonger-key -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.8+ iEYEARECAAYFAk1kNbsACgkQDkU5rhlDCl70agCcCfTMPTtKxD0+LNo15a+ke1MF WOYAnRhiZXg5Vxvr9i2cjan7Vgx0zMvw =P6aB -----END PGP SIGNATURE----- From yasmine.marqueritept at seiltechno.com Wed Feb 23 02:37:17 2011 From: yasmine.marqueritept at seiltechno.com (Yasmine Marquerite) Date: Wed, 23 Feb 2011 03:37:17 -0700 Subject: 90 x 20mg cialis - $195.53. Free airmail shipping on all orders. All patrons get 15% off discount and free 50% pills with every next order Message-ID: <201102231035.10AEAD40D33EB580D4EF@47826puj31> Generic cialis 20mg - 60 pills - $143.25 90 x 20mg - $195.53. Free airmail shipping on all orders. We accept VISA, MasterCard, Amex, Discover. All patrons get 15% off discount and free 50% pills with every next order. No Prior Prescription required http://buyhealthmedicine.ru From caterinaaricabs at gazdefrance.com Wed Feb 23 03:00:50 2011 From: caterinaaricabs at gazdefrance.com (Caterina Arica) Date: Wed, 23 Feb 2011 09:00:50 -0200 Subject: Why You Need to Buy Penis Pills? Message-ID: <54k79m91c59-17829490-390e8u41@jreccmy> Why You Need to Buy Penis Pills? If you choose the right penis enhancement pills that work for you, you will find yourself unwilling to go back to how "sex used to be." Men use male enhancement supplements for a wide range of reasons. Indeed, there are certain factors that can interfere with a man's optimum enjoyment of sex - lifestyle, health habits, stress, aging, and many others. Many men would like to counter the effect of these factors by taking penis pills. For some, they want to improve certain aspects of their sexuality, such as: - Shortening the time it takes to achieve erection - Improving quality of erection - attaining harder, firmer and longer-lasting erections - Increase semen volume - Enhance sperm motility and virility - Increase sexual drive and libido - Heighten sexual stamina - Achieve more intense, longer and more frequent orgasms http://longpenislike.ru From eugen at leitl.org Wed Feb 23 00:02:23 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 23 Feb 2011 09:02:23 +0100 Subject: [bitcoin-list] Bitcoin version 0.3.20.01 released Message-ID: <20110223080223.GE23560@leitl.org> ----- Forwarded message from Gavin Andresen ----- From elena at sobeski.ru Wed Feb 23 03:19:04 2011 From: elena at sobeski.ru (=?koi8-r?B?8NLFy9LB3cXOycUg1NLVxM/Xz8fPIMTPx8/Xz9LB?=) Date: Wed, 23 Feb 2011 12:19:04 +0100 Subject: =?koi8-r?B?9dfPzNjOxc7JxSDTz9TS1cTOycvP1w==?= Message-ID: <1D2A3DDCE7E443BDB60418D3B61FF8CA@xp1f0bedf6311e> Увольнения и сокращение численности или штата сотрудников 28 февраля 2011г. \Моск. код/ 792_.2i-/22 или 792_2|22 Цель обучения: Изучить общие основания прекращения трудового договора, особенности сокращения штатов для отдельных категорий работников. Программа мероприятия: Общий порядок прекращения трудового договора * Собственное желание * Расторжение трудового договора по соглашению сторон * Прекращение трудового договора в связи с истечением срока его действия * Увольнение в порядке перевода к другому работодателю * Увольнение в связи с отказом работника от продолжения работы в силу изменения определенных условий трудового договора Расторжение трудового договора по инициативе работодателя: * На испытательном сроке * По причине сокращения численности (штата) работников -Порядок проведения, сроки выплата выходных пособий, -Кого сократить, а кого уволить по соглашение сторон? -Плюсы и минусы сокращения и соглашения сторон. * По причине недостаточной квалификации работника -Аттестация работников, как аргумент работодателя: правовое регулирование, сроки и порядок проведения, * В связи с неоднократным неисполнением обязанностей -Дисциплинарные взыскания – Кнут работодателя: Порядок наложения и оформления, как не допустить ошибок. * В связи с однократным грубым нарушением работником трудовых обязанностей -По причине совершения проступка работником, непосредственно обслуживающим денежные или товарные ценности * В связи с представлением работником подложных документов Расторжение трудового договора по обстоятельствам, не зависящим от воли сторон Увольнение отдельных категорий работников: * Руководителей организаций * Совместителей * Беременных женщин Выдача трудовой книжки при увольнении: возможные проблемы и споры Ответы на вопросы слушателей Вся информация по тел: (код Москвы) ЧЧ5-3_9/6*8 <> 74-29I.98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4434 bytes Desc: not available URL: From Pablo2772 at ok.ru Wed Feb 23 04:30:31 2011 From: Pablo2772 at ok.ru (Magic sexuality.) Date: Wed, 23 Feb 2011 13:30:31 +0100 Subject: The free test, advertising testing of pills for men. Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 606 bytes Desc: not available URL: From martachinbj at activeware.com Wed Feb 23 15:32:19 2011 From: martachinbj at activeware.com (Marta Chin) Date: Wed, 23 Feb 2011 17:32:19 -0600 Subject: Here you will learn about replica watches and perfect watches. Message-ID: <37k49b17u47-97736444-249j7l49@owgewfl> Can you imagine about some cheap replica watches? Indeed they have become one of the best complimentary gifts for boyfriends and girlfriends nowadays. With the aid of imitation rolex watches, you can be surely able to again get closer with your girlfriend for long time. That is why replica watch is available in every new style nowadays for example,Cartier replica watch, Zenith fake watch, Omega fake watch, Day Date replica watch, Date Just fake watch, Ferrari replica watch, and so on. Therefore if you are looking for some cheapest replica watches to really patch up with your girlfriends, you should immediately get connected with best online replica watches store so as to accomplish your needs and desire on time. Replica watches are available in many styles. By visiting any replica watch website,you can select a watch that suits you style and budget. You can buy thesewatches for different occasions for your loved ones. Here you will learn about replica watches and perfect watches. http://replicastoreportal.ru From michael at xvid.org Wed Feb 23 09:37:43 2011 From: michael at xvid.org (Michael Militzer) Date: Wed, 23 Feb 2011 18:37:43 +0100 Subject: [p2p-hackers] P2P file storage systems Message-ID: Dear Zooko, thanks for your detailed comments. I'd like to elaborate some more on them in the following: Quoting Zooko O'Whielacronx : >> Also today >> indeed bandwidth should be the more precious resource in a P2P system >> compared to storage, which is available in abundance to the home user. >> So a simple replication strategy might not be so bad after all... > > Replication costs more bandwidth on upload than erasure coding does > (for a similar degree of fault-tolerance) as well as costing more > storage. True. But the repair cost is minimal compared to replacing a lost erasure coded fragment. So assuming long-lived data stored in a network of dynamic, unreliable peers (P2P), repair may be frequently needed and cost much more bandwidth over the whole life-time of a data object than the initial upload. In such an environment replication can hence be more bandwidth efficient than erasure coding - while of course requiring more storage in any case. >> If I understood it right, Tahoe clients simply keep a connection with each >> storage node in a storage cluster. > > That's right, We have kicked around some ideas about how to do a more > scalable-DHT-like routing instead of keeping a connection open from > each client to each server, but even if we had such a thing Tahoe-LAFS > grids would still be comprised exclusively of servers whose owners > gave you some reason to believe that they were reliable. Scalable > routing a la DHT wouldn't be sufficient to allow you to safely rely on > strangers for storage, for various reasons that you touched on next: "Tahoe-LAFS grids would still be comprised exclusively of servers whose owners gave you some reason to believe that they were reliable." ^^ That is exactly what I initially referred to as "trusted" and "trusted environment". Because the servers that take part in the grid are selected (friends, an operator you trust, etc.), you can assume within Tahoe's use-case that all (or almost all) servers are honest and have no malicious intentions. This assumption is not important for data integrity and confidentiality because this is assured by cryptographic primitives. However, this trust relationship ("friends network") is necessary to gain reliability with regard to data availability / accessibility and censorship-resistance. When you give up the assumption of a trusted environment and allow random strangers to join the network and serve as storage nodes, the Tahoe design can become vulnerable to DoS attacks. That's not a criticism of Tahoe at all because it's not the use-case of Tahoe. I just wanted to point out why Tahoe cannot be employed (at least not without modification) for the use case I have in mind: A global P2P file store made of arbitrary, unreliable nodes. >> So if the DHT is deployed on untrusted nodes we need to care about things >> like admission control, sybil attack, routing and index poisening, eclipse >> attack and so on. > > Hm, but then you say something that I don't quite follow: > >> - It may need further modification to be safely usable in a network >> comprised of untrusted nodes (sybils, DHT robustness against denial of >> service attacks, ...) > > I think the word "trust" often causes confusion, because it bundles > together a lot of concepts into one word. I find that rephrasing > things in terms of "reliance" often makes things clearer. Ok, we can use the term reliable or maybe it's clearer referring to game theory's "selfish but honest". I realize now that my claim that Tahoe would not be deployable to "untrusted nodes" might have sound as if I wanted to challenge Tahoe's least authority principle. That's of course not the case. I just wanted to point out that a) Tahoe doesn't scale to the size I'd like and b) is not designed to withstand the presence of malicious nodes. Both would however be needed for the use-case I have in mind. > So: Tahoe-LAFS users absolutely do *not* rely on the storage servers > for confidentiality and integrity. Confidentiality and integrity are > guaranteed by the user's client software, using math (cryptography). > Even if *all* of the storage servers that you are using turn out to be > controlled by a single malicious entity who will stop at nothing to > harm you, this doesn't threaten the confidentiality of the data in > your files nor its integrity. I know. That's why I also said that I don't think Tahoe has deficiencies with regard to confidentiality and integrity even if used on a global scale in an uncontrolled / partly malicious environment. > But, Tahoe-LAFS users *do* rely on the storage servers for the > longevity and availability of their data. If the malicious entity that > controls all the servers decides to delete all of the ciphertext that > they are holding for you, then no mathematical magic will help you get > the data back. :-) Correct. But you can design the system in such a way that the data will still be available as long as only a certain percentage of the nodes are "honest". Then the key to achieve a reliable storage system reduces to making it practically impossible that any single malicious entity can gain control over the necessary set of network nodes. And here, size becomes your friend: The larger the network and the wider the stored data is dispersed, the harder for a single attacker to reach the necessary percentage to break availability. That's mathematical magic too ;) > That is why Tahoe-LAFS users typically limit the set of storage > servers that they will entrust their ciphertext. They choose only > servers which are operated by friends of theirs, or by a company that > they pay for service, or servers operated by members of a group that > has collectively agreed to trade storage for storage with each other. Yep, I understand the concept. That's the trust relationship I initially referred to. However, I don't quite like the concept ;) It certainly has a use-case but it is limited imho. Your average Joe will pretty certainly not be able to set up a dedicated storage network with his friends. It's too complicated (or he doesn't have friends ;)). The only easy option is to connect to the storage grid of a commercial provider (like allmydata was). But then you suffer from some similar risks than when using a central cloud storage system in the first place: provider insolvency, management fault, etc. So: One large, public network where everyone could freely join or leave would be much easier from a usability point of view: Just download and run the software and you're ready to start. No setup, no configuration, no further management required. > I wrote more on this topic in a letter to the tahoe-dev mailing list > last night: > > "BitTorrent for storage" is a bad idea > http://tahoe-lafs.org/pipermail/tahoe-dev/2011-February/006150.html Thanks for the cross-post. I'm not on the Tahoe dev list, so I missed the earlier discussion. To clarify: I don't think your documentation on Tahoe is incomprehensible. Seems it is rather me who is widely misunderstood ;) I think I've made it clear above what I was referring to with "untrusted nodes" and that I don't think Tahoe has any design problem within the scope of its targeted use-case. The question is rather whether "BitTorrent for storage" is really a bad idea and whether there's really no value for Tahoe in dropping the "friends network" assumption. I named "ease of use" as an argument already. And I think this is not just a "nice to have" feature. If ease of use is not provided built-in, people will look for alternatives to easily join a storage grid. If you think experiments like "volunteer-grid" a bit further you are not far from my envisioned ad-hoc network of strangers. The participants in such a volunteer grid are not your friends. Can you still disregard the possibility of malicious nodes for this use-case? >> - To guarantee persistence in a P2P network of untrusted and unreliable >> nodes Tahoe's information dispersal strategy needs be adapted. The degree >> of redundancy must be increased (n/k) but just as well the number of >> erasure coded fragments (k) too for storage efficiency. > > Why do you think these parameters would need to be changed? For several considerations: In a P2P network made of home computers, the availability of the single nodes will be significantly lower than for dedicated storage nodes in a grid (maybe just around 30-40% instead of 90%). To still achieve high overall availability, n needs to be increased (or more precisely: n/k). Because we however don't want to introduce too much redundancy and waste storage, we'd like to increase system availability primarily by increasing k. This has also the advantage that we could download from many sources in parallel and better level the node heterogenity with regard to available upstream bandwidth. Finally, large k (and n) makes it much harder for a malicious entity to attack the availability of a file because the attacker then needs to gain control over not just a few but many specific storage nodes, which - with proper admission control and network size - can be made largely infeasible. >> I don't know if >> this is practically doable within Tahoe's current structure (galois-field >> based Reed-Solomon coding is slow with large k and n) or what other side >> effects this may have (size of the Merkle trees?). > > It is plenty efficient for k and n up to about 256. It is also > probably efficient enough for k and n up to about 2^16, although I'm > skeptical that anyone actually needs k and n that size. Hm, what is plenty efficient for you? Again, I have to admit that I didn't run any specific tests with zfec, so my opinion is mostly guess-work: I read James Plank's paper on open-source erasure coding libraries that included some numbers on zfec and did some actual tests with Alexandre Soro's Fermat-prime based reed-solomon implementation (which should be more efficient than zfec for k, n >= 256 - at least in theory): For k = 256 and n = 1024, I get a decoding speed of about 7.5 Mbit/s on my two years old notebook. But this is not efficient enough for me. Erasure decoding speed should be much higher than network bandwidth. And considering that the next-gen broadband internet links offer 100 MBit/s for the home user, 7.5 Mbit/s erasure decoding seems by far not sufficient. > There is a Merkle Tree in Tahoe-LAFS which is computed over the > identifiers of the n shares, so that Merkle Tree would grow in size as > n grew. However that is a small cost that probably wouldn't need much > if any optimization. Yes, the size of the hash tree should indeed be less of an issue. >> - Censorship-resistance obviously also depends on availability and data >> persistence guarantees. If directed (or undirected) denial of service >> attacks are possible on the DHT, the system cannot said to be censorship- >> resistant. > > Hm, so if I understand correctly, Tahoe-LAFS currently doesn't have > *scalability* in terms of the number of servers, but it does have > nearly optimal *censorship resistance* at a given scale. For example, > suppose there are 200 servers which are all joined in the conspiracy > to host a repository of Free and Open Source Software, and some evil > attacker is expending resources attempting to disrupt that hosting or > deny users access to it. If those 200 servers are organized into a > traditional scalable DHT like Chord, then a client would have > approximately a logarithmic number of connections to servers, say to > perhaps eight of them. An attacker who wants to deny that client > access to the Free and Open Source software repository would have to > take down only eight servers or prevent the client from establishing > working connections to them, right? Could be even worse. Actually, if an attacker sits somewhere along the DHT lookup path he could pretend to be the root node for a searched key. In that case (and assuming a traditional DHT) just one compromised node could already be sufficient to make certain data unavailable. > Whereas with a full bipartite > graph topology like Tahoe-LAFS the attacker would have to take down or > deny access to a substantial constant fraction of all 200 of them > (depending on the ratio of k to n). Yes. But again: I didn't challenge that ;) Tahoe is good for its current use case. I was rather responding to questions like "Why don't you simply use Tahoe for what you have in mind?". BTW: While Tahoe is pretty censorship-resistant (depending on the size and ratio of k to n as well as the number of independent parties in the grid), censorship is a problem you shouldn't need to worry about too much in a network of "friends" anyway. And for the use-case where the whole storage grid is operated by just one commercial provider you have no censorship- resistance anyway - no matter what is the network topology ;) > (Note: is assuming that the erasure coding parameter n is turned up to > 200, which is already supported in Tahoe-LAFS -- you can configure it > in the tahoe.cfg configuration file.) Yes, that's the same consideration why I proposed to increase k and n too: Larger k and n reduce the feasibility of DoS attacks. > (Note: this is about attacking the storage layer, not the introduction > layer. Those are separate in Tahoe-LAFS and while the latter does need > some work, it is probably easier to defend the introduction layer than > the storage layer since introducers are stateless and have minimal > ability to do damage if they act maliciously. Multiple redundant > introducers were implemented by MO Faruque Sarker as part of the > Google Summer of Code 2010 but it hasn't been merged into trunk yet. > You can help! We need code-review, testing, documentation, etc. > http://tahoe-lafs.org/trac/tahoe-lafs/ticket/68 :-) ) I agree that bootstrapping can be rather easily distributed and thereby made more robust against potential attacks. >> And there are other, less-obvious censorship risks too: If a third-party >> can force specific node owners (e.g. by court order) to shut down their >> storage nodes then certain data can become unavailable in the system. > > You may be interested in Tahoe-LAFS-over-Tor and Tahoe-LAFS-over-i2p. > :-) I'm sure both of those projects would be grateful for bug reports, > patches, etc. Not really. I'm not convinced of the onion routing or mixnet concepts for such a storage use-case. First, it's inefficient as lots of bandwidth is "wasted". Second, is sender and receiver anonymity really what we need? I think in a storage network there is no need to disguise who communicates with whom or who participates in the network at all. For privacy, it's important to obfuscate which nodes store which data and consequently who accesses or forwards which data. Anonymous routing is not sufficient to solve the former and does not fix the "legal attack" problem I mentioned (rather the opposite seems to be true). Let's consider the case of downloading a MP3 file in Freenet (the infamous "anonymous filesharing" use-case): The file is stored (or cached) encrypted on some node. It is transferred to the requester by onion routing. Indeed, the downloader cannot determine the identity of the storage node and the storage node doesn't know the identity of the requester. So with regard to criminal liability this scheme may provide some protection (plausible deniability, benefit of the doubt). However, in civil law it doesn't matter who is the original sender and who the actual receiver of the copyrighted work. Everybody who participates in the copying and distribution of the file can become liable to recourse. This means that the copyright holder can send a C&D letter to every node along the onion route - and not just sue sender or receiver. And it should not be difficult to log the identity of some of the hops along the route. Now I don't want to promote any "anonymous filesharing" nonsense. I just think that in order for people to accept the use of online storage their data needs to be as "safe" from third-party delete requests as on their local hard disk. Further, people will only be ready to participate in such a network (and dedicate storage to it) when they don't risk to be held liable for the actions of others. Regards, Michael _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Feb 23 09:39:48 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 23 Feb 2011 18:39:48 +0100 Subject: [p2p-hackers] P2P file storage systems Message-ID: <20110223173948.GP23560@leitl.org> ----- Forwarded message from Michael Militzer ----- From edrigram at edri.org Wed Feb 23 10:02:30 2011 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 23 Feb 2011 20:02:30 +0200 Subject: EDRi-gram newsletter - Number 9.4, 23 February 2011 Message-ID: ============================================================ EDRi-gram biweekly newsletter about digital civil rights in Europe Number 9.4, 23 February 2011 ============================================================ Contents ============================================================ 1. Hungary amends its controversial Media Law 2. EESC condemns body scanners as a breach of fundamental rights 3. The French supreme court recognizes hosting status of Web 2.0 services 4. The US pressures the EU to pass ACTA before the end of 2011 5. German law on Internet blocking challenged in Constitutional Court 6. Polish civil society stirs up debate on Internet freedom 7. France: Loppsi 2 adopted - Internet filtering without court order 8. Is the EU going to have a new common patent law? 9. European Privacy & Human Rights 2010 10. ENDitorial: Internet blocking - EP opts for leadership over populism 11. Recommended Action 12. Recommended Reading 13. Agenda 14. About ============================================================ 1. Hungary amends its controversial Media Law ============================================================ As a result of the concern expressed by the European Commission and following the meetings with the Commission's experts on 7 and 15 February 2011, the Hungarian authorities have decided to amend their new controversial media legislation. The main issues of concern were related to four issues: 1. The disproportionate application of rules on balanced information due to the lack of limiting criteria, which was considered a breach of the Audiovisual Media Services Directive (AVMS), the EU Treaty rules on the establishment and provision of services and of Article 11 of the EU Charter of Fundamental Rights concerning the fundamental freedom of expression and information. The amendment brought by the Hungarian government is that requirements regarding balanced information will be limited to broadcasting, being no longer applied for on-demand media services. 2. The application of fines to broadcasters legally established and authorised in other Member States which could breach the "country of origin" principle established by the AVMS Directive, according to which, audiovisual media service providers are subject to the regulations in their country of origin only. The Hungarian authorities agreed to amend this by removing the ability to fine legally established broadcasters in other EU countries. 3. The rules on registration and authorisation of media service providers which apply to on-demand media services, press products and ancillary media services could imply that they are required to register before they are allowed to provide services in Hungary and are thus subject to an authorisation scheme. These provisions could create an unjustified restriction of the Treaty rules on freedom of establishment. The amendment agreed upon clarifies that on-demand audiovisual media service providers, media product publishers and ancillary media service providers would have to register within 60 days after having begun providing their services, meaning that these providers established in Hungary and in other Member States would no longer be subject to prior authorisation by the Hungarian authorities. 4. The law dictated that media content may not "cause offence", even by implication, to individuals, minorities or majorities and which apply to all media content providers, including those established in other EU countries. These provisions have been limited, for all media content providers, to situations of incitement to hatred or discrimination. "I am very pleased that the Hungarian authorities have agreed to amend their Media Law to ensure that it complies with the aspects of EU law that we have raised, including the Charter of Fundamental Rights", stated Neelie Kroes, EC Vice-President and European Digital Agenda Commissioner who added that the European Commission will continue to closely monitor the adoption and implementation of the amendments. However, the opponents of the Hungarian media law are still sceptical and the debate in the European Parliament on 16 February also raised issues that had not been addressed by of the Hungarian authorities, such as the political control over the country's media authority. According to Martin Schulz EMP (Germany), the Socialists & Democrats group leader, "At first glance, a series of changes, some of technical nature have taken place. But other important matters, such as the composition of Media Council, are outstanding. (...) We still need to analyse the text carefully. Media freedom is an issue of central importance to the S&D group and we will do everything in our power to protect it." During the meeting of the European Parliament's group leaders (with exception of the EPP) on 17 February, the decision was taken to postpone the vote on the Hungarian media law but not withdraw a resolution on the matter. "Whilst it is a positive sign that the Hungarian Government have indicated a willingness to modify the four areas of concern outlined by the Commission, Liberals and Democrats remain concerned about other aspects of the Hungarian law which place huge powers of censorship in the hands of governing party appointees and reveal a lack of adequate protection for journalists' sources as well as insufficient provision for judicial review or appeal," said Renate Weber (PNL, Romania) ALDE coordinator in the Civil Liberties committee and spokesperson on the Hungarian media law who added that the Hungarian Government "should consider a more fundamental overhaul of the law in line with the recommendations of the OSCE." Media: Commission Vice-President Kroes welcomes amendments to Hungarian Media Law (16.02.2011) http://europa.eu/rapid/pressReleasesAction.do?reference=MEMO/11/89&format=HTML&aged=0&language=EN&guiLanguage=en Brussels happy with Hungary's pledges on media law (17.02.2011) http://www.euractiv.com/en/future-eu/brussels-happy-hungarys-pledges-media-law-news-502238 Press Release Changes by Hungarian Parliament to media law must be closely monitored (17.02.2011) http://www.alde.eu/press/press-and-release-news/press-release/article/changes-by-hungarian-parliament-to-media-law-must-be-closely-monitored-37098/ Hungarian media law: Proposed amendments ignore core provisions restricting media freedom (16.02.2011) http://www.greens-efa.eu/cms/pressreleases/dok/371/371430.hungarian_media_law at en.htm EDRi-gram: EU institutions want clarifications form Hungary on its media legislation (26.01.2011) http://www.edri.org/edrigram/number9.2/hungary-media-legislation-2010 ============================================================ 2. EESC condemns body scanners as a breach of fundamental rights ============================================================ On 16 February 2011, the European Economic and Social Committee (EESC) issued its opinion on the use of body scanners in EU airports. The EESC has opposed the eventual adoption of any measures that would introduce body scanners on an EU-wide level, and feel that the Commission Communication on the use of security scanners does not respect three basic criteria: necessity, proportionality and legality. The document also criticises the Commission for changing the term "body scanners" to "security scanners", and outlines four central critiques with regard to the Commission Communication, namely, proportionality, fundamental rights, health risks and passenger rights . The document urges the Commission to produce a thorough proportionality test in order to determine the necessity of their implementation versus alternative measures. The EESC suggests that the Commission seriously consider alternatives and that it might be better to wait for more precise and less intrusive technology which can recognise security hazards. The EESC objects to the infringement of fundamental rights as a trade-off for public security. The costs to fundamental rights are three fold: personal privacy, data privacy and the right to human dignity. To further underline the inherent risks, the document cites a case in a Florida airport where 35 000 naked scans were recorded by officers and distributed on the Internet. As there exists no code of best practices or conclusive proof that these scanners do not pose health risks to individuals, the EESC requests that the Commission provide a thorough scientific examination proving that passengers and personnel who frequently fly will not be exposed to any health risks. The Committee also reminded the Commission that its Communication did not include guarantees of effective recourse for passengers and personnel undergoing the scans, and also failed to include guarantees that passengers will not obliged to undergo body scanning, ensuring individuals reserve the right to 'opt out' while not suffering longer wait times, more intrusive pat-downs, or be prevented from flying. Body scanners are currently in a trial period in the EU, where approximately 5 or 6 Member States have deployed the technology, including the UK, Finland, the Netherlands, France and Italy (according to a press release from 15 June 2010). The Commission is convinced that a more harmonised approach to body scanners is needed throughout the EU, thus it is likely that an EU legal framework on the use of "security scanners" at EU airports will be produced sometime in the near future. EESC Opinion on Use of Security Scanners at EU airports (16-17.02.2011) http://www.eesc.europa.eu/?i=portal.en.opinions.15111 Body scanners? Not yet, says the EESC (17.02.2011) http://europa.eu/rapid/pressReleasesAction.do?reference=CES/11/20&format=HTML&aged=0&language=EN&guiLanguage=en Commission communication on body scanners (15.06.2010) http://ec.europa.eu/transport/air/security/doc/com2010_311_security_scanners_en.pdf Commission Q&A on "security scanners" (15.06.2010) http://europa.eu/rapid/pressReleasesAction.do?reference=MEMO/10/261&format=HTML&aged=0&language=EN&guiLanguage=en EU aviation security FAQ (15.02.2010) http://europa.eu/rapid/pressReleasesAction.do?reference=MEMO/10/34 Technologies for the Use of Images: Automated Processes of Identification, Behavioural Analysis and Risk Detection Control at the Airports by Douwe Korff (06.2010) http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1673772 Presentation by Douwe Korff (EDRi-member FIPR), at EESC Hearing "Use of Security Scanners at EU Airports" (11.01.2011) http://www.eesc.europa.eu/resources/docs/korff_20110111_security-scanners.pdf (Contribution by Raegan MacDonald - EDRi) ============================================================ 3. The French supreme court recognizes hosting status of Web 2.0 services ============================================================ On 17 February 2011 the French Court of Cassation recognized the hosting status of Dailymotion and Fuzz.fr. The court also confirmed, in relation to the Amen website case, that the judges had to verify that the content withdrawal requests observed the requirements of LCEN (loi pour la confiance dans l'iconomie numirique - French implementation of the EU E-commerce Directive) before condemning a hosting site that had not withdrawn promptly the notified content. The decisions of the Court of Cassation establish clearly the boundary between a content hosting site and a web service editor. In the Dailymotion case, it comes to confirm the decision of the French Court of Appeal of May 2009 which overturned a 2007 court decision that considered the hosting site liable for the content posted online on its platform. Moreover, the site had responded immediately after having been notified that it was hosting illegal content. The Court of Cassation also overturned the decision against Fuzz.fr in the case introduced by actor Olivier Martinez. In 2008, a French court decided that the owner of the website had an editorial responsibility, even if the website was a digg-like service (where the users can vote which news comes on first) and forced him to pay 1000 euro in damages for infringing the actor's privacy and an additional 1500 euro in legal fees. The Court of Cassation considered fuzz.fr a hosting site in terms of LCEN and therefore not liable for the content posted on it. An important clarification in relation both to Dailymotion and the Amen hosting site is the necessity to correctly formulate the requests for content withdrawal by taking all actions stipulated by the law. According to LCEN, the request to withdraw content must cover a series of elements including the notification date, the identification data of the notifying person (either natural or legal), the identification data of the addressee, the description of the litigious facts and precise location, the reasons for the withdrawal, including legal basis and justification, , a copy of the correspondence addressed to the author or editor of the litigious actions asking for their interruption, withdrawal or modification, or the justification of the fact that the author or editor could not be contacted. The subsidiarity principle is thus observed, meaning that a hosting site cannot be required to withdraw content before proving that the author of the content has been first contacted and required to withdraw the respective content. This could be the end of mass withdrawals of files without any previous procedure. However, the Legal Commission of the Senate seems to want to change the rules and on 15 February 2011 it proposed the creation of a new status between hoster and editor that will have filtering and surveillance obligations. Dailymotion and Fuzz recognised as hosters by the Cassation Court (only in French, 17.02.2011) http://www.01net.com/www.01net.com/editorial/528466/dailymotion-et-fuzz-reconnus-hebergeurs-par-la-cour-de-cassation/ The Cassation Court saves Fuzz.fr service as well (only in French, 18.02.2011) http://www.numerama.com/magazine/18104-la-cour-de-cassation-sauve-aussi-le-service-fuzzfr.html The Cassation Court protects the hosting status of Dailymotion. Thanks Hadopi ? (only in French, 17.02.2011) http://www.numerama.com/magazine/18099-la-cour-de-cassation-protege-le-statut-d-hebergeur-de-dailymotion-merci-l-hadopi.html The assignees will not be able to withdraw mass contents (only in French, 17.02.2011) http://www.numerama.com/magazine/18098-les-ayants-droit-ne-pourront-plus-faire-retirer-les-contenus-en-masse.html The Senate proposes the creation of web service editor status (only in French, (16.02.2011) http://www.journaldunet.com/ebusiness/le-net/statut-d-editeur-de-services-web.shtml EDRi-gram: French courts give clear decisions for hosted content (20.05.2009) http://www.edri.org/edri-gram/number7.10/france-decisions-hosting ============================================================ 4. The US pressures the EU to pass ACTA before the end of 2011 ============================================================ The US government has expressed its eagerness to see ACTA passed by the European Parliament this year. The controversial treaty allows governments to "order an online service provider to disclose (...) information sufficient to identify a subscriber whose account was allegedly used for infringement (...) of trademark or copyright or related rights infringement." Pressures from the US are expected to increase in the next months, having in view that there is the possibility that the European Parliament strikes down the agreement which means that talks would start again from the beginning. Based on a recent study issued by legal informatics experts from the German University in Hannover, ACTA raises a series of problems in complying with EU legislation and therefore the report advises MEPs to strike the act down or significantly change it. Hence, four MEPs sent on 15 February 2011 written questions to the EU Commission asking whether it was aware of the negative legal opinion and how it intended to deal with it. One of the issues raised by the MEPs was the different formulations on the level of damages for intellectual property infringements. Another aspect is related to how the new measures targeting counterfeit products, but also copyright and trademark infringements, will avoid impeding the legal movement of medicines. The atmosphere is already tense as recently, La Quadrature du Net has obtained from WikiLeaks exclusive access to diplomatic cables revealing pressure put by the US government on several European governments, especially in Spain, for the adoption of harsh copyright enforcement laws. The US Embassy cables refer to the EU Telecoms Package in the context of copyright, expressing its approval for cutting off Internet access without the necessity of a court order, as well as for the French three-strikes system and similar measures adopted in the UK. They also show the main role of the US in the initiation of ACTA, the stakes involved, the debates related to the participation of developing countries, as well as the evolution of the position of the European Union during the negotiations. Although the EU Commission has strongly criticised ACTA, several EU national governments have negotiated the treaty behind closed doors. On the other hand, the European Parliament has, in its turn, concluded a free trade agreement (FTA) with South Korea that is not far off from ACTA, including strong provisions on intellectual property rights protection. The FTA with Korea, which will come into effect on 1 July 2011, includes, just like ACTA, excessive criminal liability provisions for online intellectual property infringements. As the rapporteur for the Industry Committee of the Parliament, Daniel Caspary pointed out, the level of IP protection standards in the EU-Korea FTA includes not only copyright, related rights and trademarks, but also designs, services marks, layout designs of integrated circuits, geographical indications, plant varieties and the "protection of undisclosed information". The treaty stipulates other measures including searches and seizures at the request of rights holders and gives broadcasters the right to prohibit re-broadcasting, fixation, and communication to the public of their TV broadcasts for a fee. According to Green party member Jan Philipp Albrecht, the FTA is similar to ACTA as the information about the provisions of the agreement were kept secret before the it was signed by the parties involved. US keen for EU to adopt controversial anti-counterfeiting treaty (17.02.2011) http://euobserver.com/9/31827/?rk=1 Anti-Counterfeiting Trade Agreement (3.12.2010) http://www.dfat.gov.au/trade/acta/Final-ACTA-text-following-legal-verification.pdf Stronger IP Rights In EU-Korea FTA: Precedent For Future FTAs? (20.02.2011) http://www.ip-watch.org/weblog/2011/02/20/stronger-ip-rights-granted-in-eu-korea-fta-precedent-for-future-ftas/ WikiLeaks Cables Shine Light on ACTA History (3.02.2010) http://www.laquadrature.net/en/wikileaks-cables-shine-light-on-acta-history Wikileaks publishes Acta cables (4.02.2011) http://www.zdnet.co.uk/blogs/communication-breakdown-10000030/wikileaks-publishes-acta-cables-10021617/ Opinion of European Academics on ACTA (11.02.2011) http://www.iri.uni-hannover.de/tl_files/pdf/ACTA_opinion_110211_DH2.pdf EDRi-gram: ENDitorial: ACTA endgame - The devil is in the detail (8.09.2010) http://www.edri.org/edrigram/number8.17/acta-devil--in-details ============================================================ 5. German law on Internet blocking challenged in Constitutional Court ============================================================ On 22 February 2011 the German Working Group against Internet Blocking and Censorship (AK Zensur) submitted their complaint against the German law on Internet blocking to Germany's Constitutional Court. The law is directed against online child abuse material and had come into force on 23 February 2010, setting a one-year deadline for the complaint. AK Zensur and many others had fiercely opposed the law and announced that a complaint would be filed when the law was enacted by Parliament in June 2009. An online petition against the law collected 134 000 signatures in May and June, the highest number ever achieved at the German Parliament's online petitions system. A curious situation emerged when the government changed after the elections in September 2009, taking the liberal party FDP into power in a coalition with the conservative CDU/CSU. The FDP had opposed the blocking law in their election campaign, and before the law came into force, it was agreed that it would not be fully implemented. In a legally dubious move, a "non-application directive" by the Interior minister stipulated that initially, only take-down was to be attempted, and the governing parties agreed that a review would be held about a year later. This created something of a legal absurdity as the consequences of the law are not fully felt at the moment when the deadline to complain is expiring. But AK Zensur and its lawyers are confident that even now, many aspects of the law are in clear violation of the German Constitution, and several experts had voiced similar concerns at a parliamentary hearing before the law was enacted. While political support for the ill-fated law has widely diminished, the governing parties have not found the will to abolish it in a new Parliamentary act. AK Zensur is hopeful that with its complaint, it will be able to do the politicians' homework for them. A website collecting signatures to support the complaint in the political debate will be started soon. German press release: German Free Speech Working Party issues constitutional complaint against censorship law (only in German, 23.02.2011) http://ak-zensur.de/2011/02/verfassungsbeschwerde.html German Free Speech Working Party issues constitutional complaint against censorship law (23.02.2011) http://ak-zensur.de/2011/02/constitutional-complaint.html EDRi-gram: Germany's President signs an Internet bill against his own government (24.02.2010) http://www.edri.org/edrigram/number8.4/german-president-adopts-internet-childporn-law (Contribution by Sebastian Lisken) ============================================================ 6. Polish civil society stirs up debate on Internet freedom ============================================================ The Polish chapter in the European debate on whether Internet blocking can be conceived as a measure in fighting the dissemination of child abuse images has finally been opened. This is due to the quite successful campaign that EDRi-member Panoptykon Foundation, supported by the open source movement and Internet Society Poland, has been running over last few weeks. It has long been unclear what position the government will take with regard to the Directive on combating sexual abuse, sexual exploitation of children and child pornography. The Polish representative in the Council refrained from taking a firm standpoint, which made us believe that the government - mindful of civil society's likely outrage - is playing hide and seek, hoping that the Directive will be adopted with the silent approval of Poland. Provoked by this game, back in November, we managed to trigger some interest in this topic in two leading daily newspapers. Right after the first article describing the alleged tactic of the Polish government was published, the spokesperson of the Ministry of Justice confirmed that the government "of course, supports the Directive", including the concept of obligatory Internet blocking. This position was made very clear at the JHA meeting on 3 December 2010. To us it clearly meant that the government was trying to do some policy laundering. Almost exactly a year ago, - Polish Prime Minister Donald Tusk, in a public debate with NGOs and Internet activists, acknowledged that blocking Internet sites is a flawed measure and should not be applied. Moreover, he promised that any future plans to introduce legal measures affecting Internet freedom would involve consultation with civil society. The present policy and the way it has been carried out so far clearly contradicts both promises. In an attempt to draw more attention to what is happening in Brussels with the support of our government, Panoptykon organised a public debate under the auspices of Polish Ombudsman, Prof. Irena Lipowicz which took place on 10 February 2011. The discussion panel was composed of representatives of the Ministry of Justice and four foundations representing both sides of the debate: Panoptykon, Kidprotect.pl, Safe Cyberspace and Nobody's Children. The audience consisted mainly of journalists, academic society representatives and technologically minded individuals. While Panoptykon argued that there was no collision between protecting children and Internet freedom because child abuse images can be effectively removed and therefore do not need to be blocked, our opponents claimed the opposite, on the grounds that international cooperation did not function well enough. The debate revolved around the following issues: what are the technical possibilities of removing illegal content; how to ensure both fast reaction and due process; what are the challenges of international cooperation; how can we prove that blocking tends to be used instead of and not in addition to fighting crimes against children; how blocking can disturb pending police investigations; how big the problem of child abuse images on-line really is; and what role can the Internet community play in addressing the problem. The Government's representative, Tomasz Darkowski, argued in favour of web blocking. Mr Darkowski stressed that the Directive should, in the first place, prevent Internet users from accidental and unwanted contact with child abuse images. He also expressed a strong belief that web blocking would remain strictly to child abuse images and there were no reasons to worry about possibilities of extending blocking to other types of content. This claim is all the more astonishing when one can already hear some politicians suggesting that hate speech and illegal gambling sites should be blocked. Polish experience clearly shows that it does not take a lot to change an existing law, especially in order to make it more radical. In the end, the Ombudsman had a voice. She expressed her astonishment with the hot atmosphere of the meeting caused by the huge societal interest in the issue of website blocking. Prof. Lipowicz called in for more evidence and analysis to support our claims. It was also clear that further discussions are needed - first to explain the technical aspects of blocking and the second to analyse the risk of extending blocking to other types of "unwanted" content. The office of the Ombudsman is committed to helping us continue the debate. In the meantime, we are collecting evidence and analyses requested by the Ombudsman (the action called "Respond the Ombudsman") and preparing an electronic publication that will summarise the debate. It will be published on 10 March 2011. Finally, together with five other organisations, Panoptykon has sent an open letter to the Prime Minister calling for a meeting "a year after". We want a serious discussion on the future of Internet freedom in Poland, which seems threatened not only by the blocking proposal. There are at least four other controversial and pending areas of regulation, which need to be explored: data retention, content liability, nonlinear audiovisual services and the implementation of the Telecoms Package. We hope that the Prime Minister will accept our invitation and a working meeting with the government will happen before 15 March. With regard to Internet blocking, we hope to hear from the Prime Minister the same words we heard from Woody Allen's character, quantum physics genius Boris Yellnikoff: "However, as only a great mind can do, I've reassessed... my... position, and uh, changed my mind." Open letter of Polish NGOs to the Prime Minister(only in Polish) http://www.panoptykon.org/content/rok-po-nadal-chcemy-rozmawia-na-temat-wolno-ci-w-internecie-organizacje-pozarz-dowe-wzywaj-p Report on the position of Polish government in the Council (only in Polish, 03.12.2010) http://www.panoptykon.org/content/polska-popiera-dyrektyw-otwieraj-c-drog-do-blokowania-internetu-w-unii-europejskiej Reports from the public debate on Internet blocking (+video)(only in Polish) http://www.panoptykon.org/content/relacje-z-debaty-blokowanie-stron-internetowych-rok-po-pocz-tek-cenzury-czy-odpowied-na-real Action "Respond the Ombudsman" (only in Polish) http://www.panoptykon.org/content/odpowiadamy-rzecznik-praw-obywatelskich-przy-cz-si-do-akcji (Contribution by Katarzyna Szymielewicz - EDRi-member Panoptykon Foundation, Poland) ============================================================ 7. France: Loppsi 2 adopted - Internet filtering without court order ============================================================ The French so-called Loppsi 2 draft law was adopted on 8 February 2011 by the National Assembly as well as by the Senate without modifications, thus allowing for the blocking of Internet access of a site deemed as having "obvious" child pornographic content, without a court order. The text is challenged by the Constitutional Court that will to decide whether the new provisions are constitutional or not. The draft law also allows for the installation of spyware by the police and reinforces video-surveillance by the use of electronic bracelets. Following its adoption, the opposition has filed an appeal against the law to the Constitutional Council, showing concerns that the draft law gives authorities "obvious inappropriate means" without "providing enough guarantees against the eventual damages to the freedom of expression". La Quadrature du Net has recently sent a memo to the Council asking for the rejection of the Internet filtering as being against the Constitution, inefficient and disproportionate. The group believes the law is a Trojan horse which, under false pretences, will legitimise Internet censorship. There will be no control over the way the filtering techniques will be set up and, as the blacklist of websites to be filtered will be kept secret, it will also be impossible to file complaints against filtering actions. CFE-CGC professional unions as well as Unsa-Tilicoms union from France Tilicom-Orange believe this is "a festival of incompetence, where, in the name of overall security, this mixing-all text undermines fundamental principles, especially in relation to the Internet, with the announced blocking of the sites in the name of the fight against child pornography". The opposition refers Loppsi 2 to the Constitutional Council (only in French, 15.02.2011) http://www.01net.com/www.01net.com/editorial/528388/lopposition-saisit-le-conseil-constitutionnel-sur-la-loppsi-2/ French LOPPSI Bill Adopted: The Internet under Control? (9.02.2011) http://www.laquadrature.net/en/french-loppsi-bill-adopted-the-internet-under-control The administrative filtering of the net is contrary to the French Constitution (only in French, 02.2011) http://www.laquadrature.net/files/20110214_La%20Quadrature%20du%20Net_Amicus%20curiae%20LOPPSI2.pdf EDRi-gram: French law Loppsi 2 adopted by the General Assembly (12.01.2011) http://www.edri.org/edrigram/number9.1/loppsi-2-adopted-assembly ============================================================ 8. Is the EU going to have a new common patent law? ============================================================ Based on a recommendation of the Committee on Legal Affairs, the European Parliament approved on 15 February 2011 the use of the enhanced co-operation procedure to create a unitary patent system in the EU, following the request made by 12 Member States in December 2010. Presently, there are national patents coexisting with a European patent in a complicated and fragmented system which implies that the patent holders must choose the countries where they want patent protection. Also, Member States may impose additional requirements and the European patents are only enforced by national laws. The expenses involved are also very high because the current system requires the translation into the official language of every country in which patent protection is sought. According to the European Commission, a European patent validated in 13 countries can cost up to 18 000 euro, more than half of which on translation fees. Attempts have been made during the last year to get a unified system but they have failed mostly due to translation issues. In 2010, Spain and Italy raised objections to the EU plans to allow EU patents to be printed in any of the three EU official languages: English, French or German. The enhanced co-operation procedure allows a group of EU nations to use EU government bodies to create a new system when unanimous agreement cannot be found. Other countries can opt-in to the new rules later on. Under the Lisbon Treaty a minimum of nine Member States is enough for this procedure. The Member States, having initiated the proposal, believe a unitary patent system in EU will make things cheaper and easier, will ensure equal access to all inventors within the EU and will simplify the handling of infringements. . The enhanced co-operation proposal is still to be examined by the Competitiveness Council on 10 March 2011. If approved by the Council as well, the Commission will have to present two proposals, one on the language regime (consultation procedure) and the other establishing the single patent (co-decision procedure). However, a key legal opinion by the European Court of Justice is expected at the end of this month regarding the proposed "enhanced cooperation". According to documents published until now, the Court might find the proposal in conflict with the EU treaties, which will delay the process and require changes to the proposal. Free Software Foundation Europe (FSFE) has expressed concerns that the European Parliament might lose its legislative competence regarding patents, which will be controlled by the European Patent Organisation (EPO). A conflict of interest would then be created, the EPO being responsible both for awarding patents and for defining what is patentable. FSFE also believes that "software patents hurt innovation and are an unnecessary burden on European software developers. (...) Legislators need to take charge and make sure the patent system contributes to the public good. As the European Patent Organisation has acknowledged, this is a decision that cannot be left to bureaucrats and the judiciary." Spain and Italy might also use the courts to further postpone the process. Single patent co-operation plan gets committee go-ahead (27.01.2011) http://www.europarl.europa.eu/en/pressroom/content/20110124IPR12359/html/Single-patent-co-operation-plan-gets-committee-go-ahead MEPs support vanguard group on EU patent (15.02.2011) http://euobserver.com/19/31809/?rk=1 New pan-EU patent plan will be adopted by 25 of EU's 27 countries, says Commission (16.02.2011) http://www.out-law.com//default.aspx?page=11782 European Patent: FSFE urges European Parliament to wait for legal advice (9.02.2011) http://fsfe.org/news/2011/news-20110209-01.en.html Draft European Parliament Legislative Resolution on the proposal for a Council decision authorising enhanced cooperation in the area of the creation of unitary patent protection (2.02.2011) http://www.europarl.europa.eu/sides/getDoc.do?type=REPORT&reference=A7-2011-0021&language=EN ============================================================ 9. European Privacy & Human Rights 2010 ============================================================ On Data Protection Day, 28 January 2011, Privacy International, the Center for Media and Communication Studies of the Central European University and the Electronic Privacy Information Center, released the European Privacy & Human Rights 2010 (EPHR) report. The survey reviews the landscape of national privacy and data protection laws and regulations, in addition to other laws, cases and recent developments, such as European NGOs' advocacy activities, that have had an impact on privacy in Europe in the last two years. The research field covers jurisdictions of all 27 EU Member States, two EFTA countries (Norway and Switzerland), three EU accession candidate states (Croatia, Macedonia and Turkey), and the EU itself as a jurisdiction. Apart from the country-by-country analysis in 33 reports, the survey also provides a comparative legal and policy analysis of major privacy topics and a section on key developments country by country. A privacy ranking offers a bird's-eye view of all major developments, and summarizes them by grading the state of privacy in each state, from the ones which "consistently uphold human rights standards" (best grade) to the ones where "endemic surveillance" prevails (lowest grade), going through the states that have "adequate safeguards against abuse" (satisfactory mark), present a "systemic failure to uphold safeguards" (insufficient mark), or show signs of "extensive surveillance" (very poor grade). Key findings then list countries on a grading scale, such as the "good" ones ("European democracies (...) in good health", with a "majority of countries having constitutional protections") or the ones where "heroic" policy advocacy, campaigns or protests that took place that slowed down or prevented privacy intrusions or government surveillance. A special section in the report outlines European NGOs' advocacy work in each country. Several of EDRi's NGO members have directly contributed to the success of those advocacy efforts in their respective countries. Each country report is available in English and translated into the country's official language(s). Another section provides an extensive list of privacy resources, country by country. The EPHR report builds upon the legacy of EPIC & Privacy International's Privacy & Human Rights survey, in which more than 300 privacy experts from all over the world have already participated for over a decade, making this survey one of the world's most comprehensive report on privacy and data protection. The "EPHR 2010" report is part of a broader project that comprises, apart from the publication of the report itself, two other action areas that will be fully developed over the next six months: the dissemination of the report on various online platforms, in particular mobile phones, so that people around Europe can learn, in their own national language, about privacy developments in their country; but also the development of awareness-raising campaigns, including three "games" that teach people how to decode web access logs and IP addresses and tie them to a unique individual, or figure out which countries' servers their e-mails may have gone through, and may possibly have been intercepted. In addition to the research and production team, made up of people from the Center for Media and Communication Studies at the Central European University and Privacy International, more than 90 privacy and data protection experts (privacy advocates, academics, lawyers and policy experts) from 32 countries all over Europe, contributed with updates from their respective countires. The European Commission funded the EPHR project through its "Fundamental Rights and Citizenship Program (2007-2013)". The European Privacy & Human Rights 2010 report https://www.privacyinternational.org/ephr/ The introductory video https://www.privacyinternational.org/data/ The "EPHR" project http://www.cmcs.ceu.hu/research/privacy-and-freedoms Short presentation of the survey (31.01.2011) http://blog.cedriclaurant.org/2011/01/31/european_privacy_and_human_rights/ (Contribution by Cedric Laurant - observer at EDRi) ============================================================ 10. ENDitorial: Internet blocking - EP opts for leadership over populism ============================================================ On 14 February 2011, the Civil Liberties Committee of the European Parliament (EP) voted on the European Commission's proposal on web blocking. The European Commission had proposed mandatory EU-wide blocking and limited safeguards. The approach is populist, simplistic and, by giving Member States the option to take cosmetic measures to hide their inaction, profoundly dangerous and counterproductive. The Committee addressed the issue in numerous debates, from September 2009 until now and held a two-day hearing on the subject to get views from international institutions, police and law enforcement bodies, child rights organisations and EDRi, as the sole digital rights voice in the event. As a result of this extensive analysis, Parliamentarians increasing came to the conclusion that the issue was more complex and sensitive than it first appeared. As a result, under the leadership of rapporteur Roberta Angelilli (EPP, Italy), the Parliament voted for a text which moved the focus away from technically inefficient measures and towards concrete tools to fight crimes against children. Despite bizarre and desperate claims from some quarters that this approach was somehow paedophile-friendly, the Committee courageously rejected simplistic lobbying and took a leadership role - pushing for effective policy across the European Union. The text also harmonises the approach to existing European Union and European Convention on Human Rights obligations with regard to restrictions on communication. This will enable more coherent, predictable and proportionate approaches in the future on a European level. The Parliament text of Article 21 and Recital 13 prioritises concrete measures aimed at addressing the existence of the illegal content on websites, investigating the actual crimes and the criminals committing them, as well as rescuing the victims. It does this specifically by placing the emphasis on: - removal at source: This measure undermines the same existence of illegal material, avoiding "all" risks of re-victimisation, while allowing Internet providers to keep record of content to facilitate police's criminal investigation and victim identification; - international cooperation: It is particularly important to remove the systemic problems in communication and cooperation with third countries' authorities that lead to illegal content in websites hosted abroad not being dealt with expeditiously (this cooperation could include, for example, the setting up of single points of contact for competent authorities); - European annual reporting on removal activities: This will help identify individual success and failures of Member States at a national and international level, to disseminate best practices and ensure maximum efforts to prosecute criminals and identify victims. The Parliament's text will serve to clarify and harmonise the EU's approach to existing legal obligations on restrictions to communications. In particular: - The least restrictive alternative is prioritised, namely, the deletion of websites. Only when this is impossible can a more restrictive method (such as blocking) be considered. - In line with the European Convention on Human Rights, alternative measures for removal at source (such as blocking) must be "necessary" (ie, the measure must be effective and no other measure can be reasonably available taking into account technical and economic feasibility) - Respecting existing case law of the European Court of Human Rights, restrictions must be imposed in a predictable (according to law), transparent (ie, the measure should be based on relevant factors or sufficient evidence) and proportionate (ie, the negative effects of a measure should be counter-balanced by its benefits in terms of a legitimate public policy objective) manner. Proposal for a Directive of the European Parliament and of the Council on combating the sexual abuse, sexual exploitation of children and child pornography, repealing Framework Decision 2004/68/JHA http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2010:0094:FIN:EN:PDF "Impact assessment": Accompanying document to the Proposal for a Council Framework Decision on combating the sexual abuse, sexual exploitation of children and child pornography, repealing Framework Decision 2004/68/JHA - Impact assessment {COM(2009)135} {SEC(2009)356} http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52009SC0355:EN:NOT Commission official explains the Commission's research http://www.youtube.com/watch?v=EpFpoXIdRQc EDRi's blocking booklet http://www.edri.org/files/blocking_booklet.pdf EDRi-gram: Web blocking discussions in European Parliament reach critical stage (12.01.2011) http://www.edri.org/edrigram/number9.1/web-blocking-campaign (contribution by Joe McNamee - EDRi) ============================================================ 11. Recommended Action ============================================================ The Council of Europe's Expert Committee on New Media launched a consultation on its draft recommendations on search engines and social networking services, including guidelines Deadline for sending your comments:18 March 2011 http://www.coe.int/t/dghl/standardsetting/media/ Privacy International: Petition to Council of Europe on government use of citizens biometrics https://www.privacyinternational.org/article/petition-council-europe-government-use-citizens-biometrics ============================================================ 12. Recommended Reading ============================================================ European DPAs adopt opinion on RFID Privacy Impact Assessment Framework http://ec.europa.eu/justice/policies/privacy/workinggroup/wpdocs/2011_en.htm ENISA Report: 'Bittersweet cookies': new types of 'cookies' raise online security & privacy concerns http://www.enisa.europa.eu/media/press-releases/2018bittersweet-cookies2019-new-types-of-2018cookies2019-raise-online-security-privacy-concerns Freedom in the days of the Internet http://www.thinkingeurope.eu/images/dbimages/docs/CESFreedominDaysofInternet.pdf ============================================================ 13. Agenda ============================================================ 23-28 February 2011, Gosier, Guadeloupe, France ICDS 2011- 5th International Conference on Digital Society http://www.iaria.org/conferences2011/ICDS11.html 24-25 February 2011, Berlin, Germany The First OAPEN Conference http://meetings.copernicus.org/oapen2011/ 9 March 2011, Amsterdam, The Netherlands Big Brother Awards NL https://www.bigbrotherawards.nl 11-12 March 2011, Ankara, Turkey ICEGEG-2011- 3rd International Conference on E-Government and E-Governance http://www.icegeg.com/index.html 27-29 March 2011, Ghent, Belgium Online content: policy and regulation for a global market http://www.eurocpr.org/ 28 March 2011, Paris, France 5th European eAccessbility Forum: Benefits and costs of e-accessibility http://inova.snv.jussieu.fr/evenements/colloques/colloques/70_index_en.html 1 April 2011, Bielefeld, Germany Big Brother Awards Germany http://www.bigbrotherawards.de/index_html-en 15-17 April 2011, Berlin, Germany Re:publica XI: Conference about blogs, social media and the digital society http://re-publica.de/11/en/ 17-18 May 2011, Berlin Germany European Data Protection Reform & International Data Protection Compliance http://www.edpd-conference.com 12-15 June 2011, Bled, Slovenia 24th Bled eConference, eFuture: Creating Solutions for the Individual, Organisations and Society http://www.bledconference.org/index.php/eConference/2011 14-16 June 2011, Washington DC, USA CFP 2011 - Computers, Freedom & Privacy "The Future is Now" http://www.cfp.org/2011/wiki/index.php/Main_Page 11-12 July 2011, Barcelona, Spain 7th International Conference on Internet, Law & Politics (IDP 2011): Net Neutrality and other challenges for the future of the Internet http://p2pfoundation.ning.com/profiles/blogs/7th-international-conference ============================================================ 14. About ============================================================ EDRi-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRi has 29 members based or with offices in 18 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRi-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and are visible on the EDRi website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edri/2.html - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From diabolik at narutoproject.ru Wed Feb 23 11:39:53 2011 From: diabolik at narutoproject.ru (Russell Quintero) Date: Wed, 23 Feb 2011 20:39:53 +0100 Subject: =?koi8-r?B?7uTzLCDOwczPxyDOwSDQ0snC2czYLCDu5ObsLCDT1NLByM/X2cUg19rO?= =?koi8-r?B?z9PZIA==?= Message-ID: <02F31B0591654BCE84F3F60E6F8F88D1@xp0ce990594f6e> 01 Марта ИЗМЕНЕНИЯ 2011г. Новации 2011! Актуальные вопросы налогообложения: НДС, налог на прибыль, НДФЛ, страховые взносы \Моск. код/ 742/9/l/9/8 ; ЧЧ5_3968 Программа мероприятия: Проект ПБУ 22 "Исправление ошибок в бухгалтерском учете и отчетности". Разъяснения Минфина РФ: реализация недвижимости: налог на имущество у продавца и покупателя – очередная точка зрения демонтаж основных средств и налог на имущество проценты по заемным средствам в стоимости  объекта ОС или в составе прочих расходов: ПБУ 15/2008 или ПБУ 6/01.  можно ли первичные документы, документы бухгалтерского и налогового учета для целей исчисления налога на прибыль составлять в электронном виде и заверять электронной цифровой подписью Часть I НК РФ Изменен порядок исправления ошибок, приведших в переплате налога. Налоговые органы не имеют права повторно затребовать копии документов, которые были ранее предоставлены налогоплательщиком. Налоговые органы несут ответственность за несвоевременную разблокировку счета. При этом проценты за нарушение срока отмены приостановления операций по счетам признаются доходом налогоплательщика ФНС РФ разработала рекомендуемую форму сообщения организации о выборе налогового органа для постановки на учет Налог на добавленную стоимость Изменение требований к содержанию счетов-фактур Счета-фактуры в условных единицах Возмещение НДС в заявительном порядке На сайте Минфина России размещен перечень банков, которые могут выдать банковскую гарантию для возмещения НДС в заявительном порядке Дополнение к перечню операций, не облагаемых НДС: реализация коммунальных услуг переуступка права требования и т. д. Налог на прибыль Определение стоимости материалов, выявленных при инвентаризации Учет затрат на НИОКР, давших положительный результат: когда начинается списание Затраты на модернизацию основных средств, не признаваемых модернизиуемым имуществом Отменено начисление курсовых разниц по валютным авансам: бухгалтерский и налоговых учет совпали Дополнительные затраты на обеспечение пожарной безопасности можно учесть в расходах Амортизация неотделимых улучшений арендованного имущества – срок амортизации можно совместить со сроком аренды. Позиция НК РФ и разъяснения Минфина РФ Проценты признаются в расходах на конец каждого месяца пользования заемными средствами, независимо от даты их перечисления согласно условиям договора Смета при признании представительских расходов. Страховые взносы с выплат, не включаемых в состав расходов. НДФЛ Изменения в составе льгот (ст. 217 НК РФ): о социальных доплатах к пенсиям, единовременной материальной помощи в связи со смертью работника или членов его семьи и материальной помощи при рождении (усыновлении, удочерении) ребенка Социальный налоговый вычет по расходам на негосударственное  пенсионное обеспечение и (или) добровольное пенсионное страхование можно получить у работодателя Компенсация за использование личного транспорта в служебных целях: в каких размерах  не облагается НДФЛ в размере? Страховые взносы в ПФ, ФСС, ФФОМС и ТФОМС Страховые взносы в ПФР, ФСС, ФОМС учитываются в месяце начисления зарплаты работникам По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: (Ч95) 742_9|98 и 4454095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6594 bytes Desc: not available URL: From eugen at leitl.org Wed Feb 23 11:54:46 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 23 Feb 2011 20:54:46 +0100 Subject: EDRi-gram newsletter - Number 9.4, 23 February 2011 Message-ID: <20110223195446.GR23560@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From pravi.a at gmail.com Wed Feb 23 07:45:19 2011 From: pravi.a at gmail.com (Praveen A) Date: Wed, 23 Feb 2011 21:15:19 +0530 Subject: Decentralizing the Internet So Big Brother Canbt Find You Message-ID: 2011/2/19 nettime's avid reader : > In response to Mr. Moglenbs call for help, a group of developers working in > a free operating system called Debian have started to organize Freedom Box > software. > Mr. Moglen said that if he could raise bslightly north of $500,000,b > Freedom Box 1.0 would be ready in one year. They raised more than 60,000 US dollars in 5 days on kickstarter https://www.kickstarter.com/projects/721744279/push-the-freedombox-foundation-from-0-to-60-in-30 "The donation that pushed us over the edge came from Blaine Cook, the former lead architect for twitter, which is a nice vote of confidence, but we would like to take a moment and send our thanks out to all of the people who have helped contribute to this great drive, and encourage everyone else to take a look." They announced on their website yesterday http://freedomboxfoundation.org/news/Thank_you_Kickstarters/ Praveen -- `4*`5 `40`45`5`4#`5 b `4`40`4?`4.`5 `4*`5 `40`4$`5 `4$`5 `4`4?`4/`4?`42`5 b You have to keep reminding your government that you don't get your rights from them; you give them permission to rule, only so long as they follow the rules: laws and constitution. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Feb 23 12:41:28 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 23 Feb 2011 21:41:28 +0100 Subject: Decentralizing =?utf-8?Q?the?= =?utf-8?Q?_Internet_So_Big_Brother_Can=E2=80=99t?= Find You Message-ID: <20110223204128.GT23560@leitl.org> ----- Forwarded message from Praveen A ----- From ambulancebqqa at redirectguide.com Wed Feb 23 14:40:38 2011 From: ambulancebqqa at redirectguide.com (Donny Lowry) Date: Thu, 24 Feb 2011 06:40:38 +0800 Subject: =?koi8-r?B?98HbySDE0tXa2NEg0sXLz83FzsTP18HMyQ==?= Message-ID: <949839017.56570940359436@redirectguide.com> Добрый день! Вы получили это письмо, потому что Ваши друзья рекомендуют нас для проведения ремонта в Вашей квартире. Наша команда, состоящая из профессионалов, сделает ремонт под ключ в квартире или в доме в Москве и области. Позвоните для бесплатной консультации по телефону: (916)149-81-00 С уважением, и надеждой на сотрудничество, Звонарев Андрей From cxmtbsowid at 4x4defenderland.com.jfet.org Thu Feb 24 07:38:54 2011 From: cxmtbsowid at 4x4defenderland.com.jfet.org (The checked up effect) Date: Thu, 24 Feb 2011 12:38:54 -0300 Subject: Buy cheaply SLEEP and INSOMNIA and WEIGHT LOSS Message-ID: <052920.095OEJNTCOQ7062VCSL3435382@penultimate.%CUSTOM_DOMAINS> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 555 bytes Desc: not available URL: From elena at oxrana.dn.ua Thu Feb 24 00:13:26 2011 From: elena at oxrana.dn.ua (Cynthia Koch) Date: Thu, 24 Feb 2011 18:13:26 +1000 Subject: =?koi8-r?B?8PLv5OH24SDk6frl7Pju7+og/Ozl6/Ty7/P04e7j6ek=?= Message-ID: <470443224.29959772361936@oxrana.dn.ua> Дизельная электростанция WILSON (Англия) Мощность - 30 кВт Напряжение переменное - 3-х фазное, 400/230 В Автоматизация √ полная Расход горючего - 10 л/час Наработка часов √ более 2500 часов Стоимость - 300 000 руб. Год выпуска √ 2008 Место нахождения - Москва Тел. 585 77 86 From elorv at ipga.com Fri Feb 25 02:46:38 2011 From: elorv at ipga.com (=?koi8-r?B?68HE0s/XycvVIJYg19PFIM/CINXXz8zYzsXOyck=?=) Date: Fri, 25 Feb 2011 02:46:38 -0800 Subject: =?koi8-r?B?59LBzc/Uzs/FINXXz8zYzsXOycUg08/U0tXEzsnLz9c=?= Message-ID: <574263F5D7EA4EBD87C82D71FDAE314F@xp46716ffa1422> Грамотное увольнение сотрудников. Что должен знать работодатель 28 Февраля код: (четыре девять пять) 4454095 <<>> 445*ЧО95 Цель обучения: Изучить общие основания прекращения трудового договора, особенности сокращения штатов для отдельных категорий работников. Программа мероприятия: Общий порядок прекращения трудового договора * Собственное желание * Расторжение трудового договора по соглашению сторон * Прекращение трудового договора в связи с истечением срока его действия * Увольнение в порядке перевода к другому работодателю * Увольнение в связи с отказом работника от продолжения работы в силу изменения определенных условий трудового договора Расторжение трудового договора по инициативе работодателя: * На испытательном сроке * По причине сокращения численности (штата) работников -Порядок проведения, сроки выплата выходных пособий, -Кого сократить, а кого уволить по соглашение сторон? -Плюсы и минусы сокращения и соглашения сторон. * По причине недостаточной квалификации работника -Аттестация работников, как аргумент работодателя: правовое регулирование, сроки и порядок проведения, * В связи с неоднократным неисполнением обязанностей -Дисциплинарные взыскания – Кнут работодателя: Порядок наложения и оформления, как не допустить ошибок. * В связи с однократным грубым нарушением работником трудовых обязанностей -По причине совершения проступка работником, непосредственно обслуживающим денежные или товарные ценности * В связи с представлением работником подложных документов Расторжение трудового договора по обстоятельствам, не зависящим от воли сторон Увольнение отдельных категорий работников: * Руководителей организаций * Совместителей * Беременных женщин Выдача трудовой книжки при увольнении: возможные проблемы и споры Ответы на вопросы слушателей За более подробной информацuей обpащайтеcь по тел: (код Москвы) ЧЧ_53_96*8 <<<>>> 445/3266 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4472 bytes Desc: not available URL: From Rosa375 at 21-dream.com Fri Feb 25 02:23:51 2011 From: Rosa375 at 21-dream.com (Surprising efficiency) Date: Fri, 25 Feb 2011 05:23:51 -0500 Subject: The maximum effect and assortment, ANTI-DEPRESSANT and ED pills Message-ID: <113913.467PZEUDRRC4776DIQW8672153@nemesis.%CUSTOM_DOMAINS> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 560 bytes Desc: not available URL: From keaganjeffreys at dedmoroz-call.ru Thu Feb 24 23:29:56 2011 From: keaganjeffreys at dedmoroz-call.ru (Ila Shaffer) Date: Fri, 25 Feb 2011 14:29:56 +0700 Subject: =?koi8-r?B?58HSwc7UydLP18HOztnFINvFzsfFztPLycUg18na2SDP1CAzIM3F0yDE?= =?koi8-r?B?zyAzLcggzMXUISDzzM/WztnFINPM1d7BySEgMTAlINPLycTLwSE=?= Message-ID: <000d01cbd4bd$ccfdbe80$6400a8c0@keaganjeffreys> ВИЗОВЫЙ ОПЕРАТОР! АККРЕДИТАЦИЯ В ПОСОЛЬСТВЕ! БЫСТРО! ЛЕГАЛЬНО! Телефоны: +7 (495) 649 9170; +7 (499)3431902; СПЕЦПРЕДЛОЖЕНИЕ НЕДЕЛИ. Испания. Шенгенская мульти-виза - 6 месяцев за 350 у.е. ДЕЛОВАЯ МУЛЬТИВИЗА в ГРЕЦИЮ СПЕЦПРЕДЛОЖЕНИЕ 6 мес- 650 ЕВРО! СПЕШИТЕ! ТОЛЬКО НА ЭТОЙ НЕДЕЛЕ СКИДКА 10% при подаче 2-х документов сразу- к празднику 8 марта! Шенгенские ДЕЛОВЫЕ мульти-визы за 4 РАБОЧИХ ДНЯ Среднесрочные - 1 год - 900 у.е, 6 месяцев - 700 у.е, 3 месяца - 500 у.е. (сбор включен) Долгосрочные - 2 года - 1800 у.е, 3 года - 2 650 у.е. (сбор включен) ШЕНГЕН БЕЗ СОБЕСЕДОВАНИЯ, БЕЗ ПРИСУТСТВИЯ, БЕЗ ЗАПИСИ В КОНСУЛЬСТВЕ!!!! Работаем со сложными случаями - мультивизы для уроженцев и жителей Кавказа и паспортов с отказами Аккредитации в Посольствах!!! ВИЗЫ в США, Великобританию, Кипр, Китай и др. страны ОПЛАТА деловых мульти-виз только ПОСЛЕ ВЫХОДА ВИЗЫ. ГАРАНТИЯ. Телефоны: +7 (495) 649 9170; +7 (499)3431902; (без выходных) СПЕЦИАЛЬНЫЕ ПРЕДЛОЖЕНИЯ ПО ТУРАМ, ОГРОМНАЯ БАЗА ГОРЯЩИХ ТУРОВ!!!!! ПРИГЛАШЕНИЯ для иностранцев, страхование на даты поездки, ПЕРЕВОДЫ документов. Телефоны: +7 (495) 649 9170; +7 (499)3431902 (без выходных) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3870 bytes Desc: not available URL: From ggmakhm at armline.am Fri Feb 25 08:04:53 2011 From: ggmakhm at armline.am (=?koi8-r?B?7s/Xz8Ug1yDawdDMwdTF?=) Date: Fri, 25 Feb 2011 21:04:53 +0500 Subject: =?koi8-r?B?7s/Xz8UuIPrB0sHCz9TOwdEg0MzB1MEg1yAyMDExIMfPxNU=?= Message-ID: <000d01cbd505$bd513640$6400a8c0@ggmakhm> 01 Марта ЗАРАБОТНАЯ ПЛАТА В 2011 ГОДУ: ПРАВОВОЙ, БУХГАЛТЕРСКИЙ И НАЛОГОВЫЙ АСПЕКТЫ. НАЛОГИ И ВЗНОСЫ В ПОЛЬЗУ ФИЗИЧЕСКИХ ЛИЦ Воробьева Елена Вячеславовна - налоговый консультант, автор публикаций по вопросам бухгалтерского учета, автор книги "Заработная плата", к.э.н. По вопpоcам pегucтаpацuu обpащайтеcь по тел: \Моск. код/ 742_9i98 **** 792-2I*2_2 Программа: 1. Выплаты в пользу физических лиц: заработная плата, гарантии, компенсации. Налоговый учет выплат в пользу физических лиц. 2. Основные принципы организации и построения систем оплаты труда. Составные части заработной платы: базовая, компенсационная, стимулирующая. * Стимулирующие доплаты и надбавки; премирование и поощрение. Основные принципы построения системы премирования. * Отличия заработной платы от других выплат. 3. Гарантии и компенсации: определение, различия, порядок налогообложения. * Гарантии и компенсации работникам, направленным в служебные командировки. * Гарантии и компенсации в связи с разъездным характером работы. * Прочие гарантии и компенсации. 4. Пособия по временной нетрудоспособности, пособия гражданам, имеющим детей √ порядок начисления и выплаты в 2011 году. 5. Начисление выплат в пользу физических лиц, страховых взносов во внебюджетные фонды: * определение объекта налогообложения; * выплаты, не признаваемые объектом обложения; * выплаты, освобожденные от обложения страховыми взносами. 6. НДФЛ: комментарии к основным изменениям, вступившим в силу в 2011 году. Cтоимоcть: 7500 руб. Информацию можно получить по телефонам: +7 (Ч95) 445/3266 <> 4Ч5.3266 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3315 bytes Desc: not available URL: From gilbert-augurand at autokip.ru Sat Feb 26 04:09:00 2011 From: gilbert-augurand at autokip.ru (Naomi Jewell) Date: Sat, 26 Feb 2011 13:09:00 +0100 Subject: =?koi8-r?B?98HbINLBws/UzsnLLSDJzs/T1NLBzsXD?= Message-ID: <000d01cbd5ad$f3d45af0$6400a8c0@gilbert-augurand> 10 Марта Ваш работник- иностранец Программа мероприятия I часть 1.Характеристика изменений законодательства в сфере трудовой миграции в 2010 ≈ 2011 гг. Нововведения в законодательстве в 2010-2011гг. Принципиально важные аспекты исполнения в 2011г. нового Административного регламента ФМС предоставления государственной услуги по выдаче заключений о привлечении и об использовании иностранных работников. Характеристика изменений законодательства в сфере трудовой миграции, вступивших в силу с 1 июля 2011 г. 2.Статус иностранного гражданина в РФ. Процедура регистрации по месту жительства. Порядок въезда-выезда иностранных работников из визовых и безвизовых стран. Правовое положение иностранных работников предприятий с иностранными инвестициями и аккредитованных филиалов и представительств иностранных юридических лиц. 3.Правила и особенности привлечения на работу иностранных граждан из стран с безвизовым, визовым порядками въезда Случаи, когда работодатель является принимающей стороной, и его обязанности и ответственность в этом качестве. Квоты на привлечение иностранных работников √ территориальные (по субъектам РФ для граждан ближнего и дальнего зарубежья) и профессиональные (по отдельным видам деятельности). Категории иностранных работников, которым не требуется оформления разрешения на работу. Особая категория иностранных граждан ≈ Белорусы. Оформление разрешения на работу иностранным работникам в 2011 году. 4. Ответственность за нарушения установленного порядка привлечения и использования иностранных работников и режима пребывания: ужесточение требований и изменения в законодательстве. Административная ответственность работодателя, должностных лиц и иностранных граждан. Уголовная ответственность. Административное═ выдворение, депортация, их последствия. 5. Практика работы с иностранными гражданами в Москве и Московской области в 2011 году. Процедура подачи заявки на привлечение иностранной рабочей силы для работы в Москве и Московской области. Заявки работодателей на привлечение иностранных работников на 2011 год. Последствия для работодателей, не подавших заявок на 2011 год. Обязан ли работодатель участвовать в квотировании для легального привлечения ИРС? Процедура постановки, снятия и продления первичного миграционного учета (регистрации) иностранных граждан в Москве. Сроки, документы, ответственность. Оформление разрешения на работу для иностранного гражданина в 2011 году. Процедура получения / продления, документы II часть 1. Административный регламент ФМС РФ, регулирующий проведение проверочных мероприятий в 2011 году. 2. Ответственность за нарушения установленного порядка привлечения и использования иностранных работников и режима пребывания. Административная ответственность работодателя, должностных лиц и иностранных граждан. Разбор и консультации по типичным случаям из практики 2010 и 2011 гг. Уголовная ответственность Порядок привлечения, сроки давности. 3. Органы, осуществляющие надзор и контроль за привлечением иностранных работников. Контролирующие органы и их компетенция. ФМС и ее территориальные органы, органы милиции, государственная инспекция труда: полномочия, санкции. Порядок проведения проверок и их последствия. Новые суммы штрафов. Права и обязанности работодателя при проведении инспекционных проверок. Перечень документов и сведений, необходимых для предъявления при проведении инспекционной проверки. 4. Наем иностранного работника и оформление трудовых отношений. 5. Регистрация работника в государственных фондах. Сроки, процедура, документы. 6. Уведомления государственных органов о приеме/увольнении иностранного работника. Перечень государственных органов, сроки, процедуры подачи, документы, ответственность. 7. Правильное начисление и выдача заработной платы иностранному работнику. Отчисления и налоги: Новое в 2011 году. Резиденты и нерезиденты. 8. Экономическая эффективность Ваших иностранных работников. 9. Какие выгоды предприятию приносят Аутсорсинг, Аутстаффинг, Стафф-Лизинг при кадровом учете и администрировании иностранного персонала Информацию можно получить по телефонам: +7 Московский код: 792/2|/22 и 4Ч5/4095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6708 bytes Desc: not available URL: From marmu at unizh.ch Sat Feb 26 04:12:52 2011 From: marmu at unizh.ch (Vera Holbrook) Date: Sat, 26 Feb 2011 13:12:52 +0100 Subject: =?koi8-r?B?98HbINLBws/UzsnLLSDJzs/T1NLBzsXD?= Message-ID: 10 Марта Ваш работник- иностранец Программа мероприятия I часть 1.Характеристика изменений законодательства в сфере трудовой миграции в 2010 — 2011 гг. Нововведения в законодательстве в 2010-2011гг. Принципиально важные аспекты исполнения в 2011г. нового Административного регламента ФМС предоставления государственной услуги по выдаче заключений о привлечении и об использовании иностранных работников. Характеристика изменений законодательства в сфере трудовой миграции, вступивших в силу с 1 июля 2011 г. 2.Статус иностранного гражданина в РФ. Процедура регистрации по месту жительства. Порядок въезда-выезда иностранных работников из визовых и безвизовых стран. Правовое положение иностранных работников предприятий с иностранными инвестициями и аккредитованных филиалов и представительств иностранных юридических лиц. 3.Правила и особенности привлечения на работу иностранных граждан из стран с безвизовым, визовым порядками въезда. Случаи, когда работодатель является принимающей стороной, и его обязанности и ответственность в этом качестве. Квоты на привлечение иностранных работников – территориальные (по субъектам РФ для граждан ближнего и дальнего зарубежья) и профессиональные (по отдельным видам деятельности). Категории иностранных работников, которым не требуется оформления разрешения на работу. Особая категория иностранных граждан — Белорусы. Оформление разрешения на работу иностранным работникам в 2011 году. 4. Ответственность за нарушения установленного порядка привлечения и использования иностранных работников и режима пребывания: ужесточение требований и изменения в законодательстве. Административная ответственность работодателя, должностных лиц и иностранных граждан. Уголовная ответственность. Административное  выдворение, депортация, их последствия. 5. Практика работы с иностранными гражданами в Москве и Московской области в 2011 году. Процедура подачи заявки на привлечение иностранной рабочей силы для работы в Москве и Московской области. Заявки работодателей на привлечение иностранных работников на 2011 год. Последствия для работодателей, не подавших заявок на 2011 год. Обязан ли работодатель участвовать в квотировании для легального привлечения ИРС? Процедура постановки, снятия и продления первичного миграционного учета (регистрации) иностранных граждан в Москве. Сроки, документы, ответственность. Оформление разрешения на работу для иностранного гражданина в 2011 году. Процедура получения / продления, документы II часть 1. Административный регламент ФМС РФ, регулирующий проведение проверочных мероприятий в 2011 году. 2. Ответственность за нарушения установленного порядка привлечения и использования иностранных работников и режима пребывания. Административная ответственность работодателя, должностных лиц и иностранных граждан. Разбор и консультации по типичным случаям из практики 2010 и 2011 гг. Уголовная ответственность. Порядок привлечения, сроки давности. 3. Органы, осуществляющие надзор и контроль за привлечением иностранных работников. Контролирующие органы и их компетенция. ФМС и ее территориальные органы, органы милиции, государственная инспекция труда: полномочия, санкции. Порядок проведения проверок и их последствия. Новые суммы штрафов. Права и обязанности работодателя при проведении инспекционных проверок. Перечень документов и сведений, необходимых для предъявления при проведении инспекционной проверки. 4. Наем иностранного работника и оформление трудовых отношений. 5. Регистрация работника в государственных фондах. Сроки, процедура, документы. 6. Уведомления государственных органов о приеме/увольнении иностранного работника. Перечень государственных органов, сроки, процедуры подачи, документы, ответственность. 7. Правильное начисление и выдача заработной платы иностранному работнику. Отчисления и налоги: Новое в 2011 году. Резиденты и нерезиденты. 8. Экономическая эффективность Ваших иностранных работников. 9. Какие выгоды предприятию приносят Аутсорсинг, Аутстаффинг, Стафф-Лизинг при кадровом учете и администрировании иностранного персонала Вся информация по тел: Московский код; 742-9-l-9-8 \\// 4.Ч_5-3/2*.6/6 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6706 bytes Desc: not available URL: From ip1xm at sfos.ru Sat Feb 26 07:03:49 2011 From: ip1xm at sfos.ru (Ashley Leal) Date: Sat, 26 Feb 2011 18:03:49 +0300 Subject: =?koi8-r?B?88XCxdPUz8nNz9PU2CDXIMLVyMfBzNTF0tPLz80gySDOwczPx8/Xz80g?= =?koi8-r?B?1d7F1MU=?= Message-ID: <6B505FBEC8A84848AF9448074B5B960A@sunrisee7ff7ef> 11 Марта Себестоимость в бухгалтерском и налоговом учете Московский код; Ч4_5З.96-8 и 7922I.22 Программа: Обзор новшеств порядка признания расходов в 2011 г. Состав и принципы признания расходов. Требование документирования расходов. Унифицированные формы первичных документов, договоры и акты, документы, не имеющие унифицированной формы. Типичные ошибки при составлении первичных документов. Документы с электронными подписями, легализация документов, составленных на иностранных языках. Право подписи первичного документа. Экономическая оправданность расходов. Оценка обоснованности получения налогоплательщиком налоговой выгоды. Условия признания затрат, требования налогового и бухгалтерского законодательства о распределении расходов по некоторым сделкам. Порядок оценки расходов, понесенных в денежной и не денежной формах, в иностранной валюте и у.е. Прямые и косвенные расходы. Расходы на производство и реализацию для целей бухгалтерского и налогового учета. Сложные вопросы, особенности признания, новшества в законодательстве, типичные ошибки, нормирование затрат: материальные расходы расходы на оплату труда амортизация прочие расходы Стоимость участия в семинаре 7 500 руб. По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (код Москвы) 7Ч2*9.l*9*8 >> 792_-2|__22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2919 bytes Desc: not available URL: From sj.chued at cnh.com Sat Feb 26 13:06:32 2011 From: sj.chued at cnh.com (Signe Chu) Date: Sun, 27 Feb 2011 00:06:32 +0300 Subject: Quality Viagra from $1.37 per pill. Guaranted Satisfaction & Discount 10% for all reorders! Order FDA approved Viagra. Message-ID: <87z62j76j13-00167007-611j1f59@aoqjuvxhk> Next Day Delivery Viagra. LOW PRICE Viagra. Pills from USA stock Best Deal Viagra. Free Delivery. A lot of packs & dosage available. Quality Viagra from $1.37 per pill. Guaranted Satisfaction & Discount 10% for all reorders! Order FDA approved Viagra. MasterCard, VISA, eChecks http://tabletpharmacytechpills.ru From skquinn at speakeasy.net Sat Feb 26 22:55:29 2011 From: skquinn at speakeasy.net (Shawn K. Quinn) Date: Sun, 27 Feb 2011 00:55:29 -0600 Subject: "Nobody Wins a Nuclear War" But "Success" is Possible (fwd) In-Reply-To: References: <20110219064623.GX23560@leitl.org> <6.2.1.2.1.20110219151237.02dc3e58@pop.sonic.net> Message-ID: <1298789729.3740.4097.camel@afterburner> On Sat, 2011-02-19 at 18:34 -0600, J.A. Terranson wrote: > I can't even imagine the panic of hearing "this is *not* a test"! > Interestingly, the EBS had at least one accidental activation in the late > 60's or early 1970s, which I fortunately missed out on: good for me! Growing up, I heard it used a couple of times here locally during severe weather events. But I don't dispute at all that the tests were more common than real activations. I'm glad testing of the EAS is a bit less obtrusive. -- Shawn K. Quinn From fittinglymf639 at ritter1.com Sun Feb 27 02:11:35 2011 From: fittinglymf639 at ritter1.com (Denise Shaw) Date: Sun, 27 Feb 2011 02:11:35 -0800 Subject: =?koi8-r?B?z8LV3sXOycUg0drZy9U=?= Message-ID: <000d01cbd666$b707a190$6400a8c0@fittinglymf639> обучение без проблем иностранным языкам с гарантией гарантированное обучение языку -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 397 bytes Desc: not available URL: From shink83 at resourceindex.com Sat Feb 26 15:10:45 2011 From: shink83 at resourceindex.com (Tanner Spaulding) Date: Sun, 27 Feb 2011 06:10:45 +0700 Subject: =?koi8-r?B?z8LV3sXOycUgwsXaINDSz8LMxc0gyc7P09TSwc7O2c0g0drZy8HNINMg?= =?koi8-r?B?x8HSwc7UycXK?= Message-ID: обучение языку любой язык за короткое время. гарантия. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 348 bytes Desc: not available URL: From raucousvp865 at rosehills.com Sun Feb 27 01:21:38 2011 From: raucousvp865 at rosehills.com (Mari Bernal) Date: Sun, 27 Feb 2011 12:21:38 +0300 Subject: =?koi8-r?B?z8LV3snNINLB2sfP18/Szs/N1SDR2tnL1SDTIMfB0sHO1MnFyi4=?= Message-ID: обучение языку с гарантией. авторская методика. гарантия - ЯЗЫК обучение. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 371 bytes Desc: not available URL: From dr at jones.dk Sun Feb 27 08:50:10 2011 From: dr at jones.dk (Jonas Smedegaard) Date: Sun, 27 Feb 2011 17:50:10 +0100 Subject: [Freedombox-discuss] Bitcoin? Message-ID: On Sun, Feb 27, 2011 at 08:50:52AM -0500, James Vasile wrote: > I've read through *every* email the FreedomBox Foundation has received > since its inception (and replied to almost all of them). This is a > very passionate, skilled and creative community, and I enjoyed hearing > your ideas and plans quite a bit. I filed as much of it as away I > could so we'll be able to give a report to our for future tech lead > (s/he'll know for example that by far the most mentioned feature was > mesh networking), but mostly I was reading to get an aggregate idea of > what people seek in this project. > > You might also be interested to know that we received contact from > people of diverse backgrounds-- it wasn't all technologists. I find > that encouraging, and I hope you do too. Is that stream of emails public accessible somewhere? If not, why? > One thing that suprised me was the number of requests for Bitcoin > support. What this support consists of wasn't much specified in the > emails. Still, just for the sake of my own personal curiosity, I'd > like to ask you all: does Bitcoin matter to you? How would the Freedom > Plug support it? It is packaged for Debian, available in untable (Sid) and testing (Wheezy). Being rather new, also as upstream code, it certainly could use some actual crash-testing, though: Please anyone interesting in shipping this in future FreedomBoxen strongly consider installing the Debian package yourself on your own machines, play with it, and file bugreports about any and all issues you run across with it. > In the interest of not being an information bottleneck, if you have > questions about the content of those emails, I'll try to answer them. I find it odd having you (or anyone - not personal) proxy in the first place. - Jonas -- * Jonas Smedegaard - idealist & Internet-arkitekt * Tlf.: +45 40843136 Website: http://dr.jones.dk/ [x] quote me freely [ ] ask before reusing [ ] keep private _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From deduces983 at royalcliff.com Sun Feb 27 07:51:26 2011 From: deduces983 at royalcliff.com (Corinne Mcqueen) Date: Sun, 27 Feb 2011 17:51:26 +0200 Subject: =?koi8-r?B?z8LV3sXOycUg0drZy9U=?= Message-ID: <000d01cbd696$30be2fc0$6400a8c0@deduces983> быстрое обучение иностранному языку любой язык за короткое время гарантия. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 366 bytes Desc: not available URL: From eugen at leitl.org Sun Feb 27 09:00:49 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 27 Feb 2011 18:00:49 +0100 Subject: [Freedombox-discuss] Bitcoin? Message-ID: <20110227170049.GJ23560@leitl.org> ----- Forwarded message from Jonas Smedegaard ----- From logsvb9 at responseprocessing.com Sun Feb 27 10:13:05 2011 From: logsvb9 at responseprocessing.com (Delbert Bullard) Date: Sun, 27 Feb 2011 20:13:05 +0200 Subject: =?koi8-r?B?zMDCz8og0drZyyDawSDLz9LP1MvPxSDX0sXN0SEg0yDHwdLBztTJxco=?= Message-ID: <000d01cbd6a9$faa4ea00$6400a8c0@logsvb9> иностранный без проблем - нужно только ЭВМ гарантированное обучение языку -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 463 bytes Desc: not available URL: From gamete39 at royalasansor.com Sun Feb 27 13:29:08 2011 From: gamete39 at royalasansor.com (Iris Carpenter) Date: Sun, 27 Feb 2011 23:29:08 +0200 Subject: =?koi8-r?B?8sHT0NLPxMHWySDB18nBwsnMxdTP1yAhISH0wdLJxtkgz9QgOTkgRVVS?= =?koi8-r?B?ISEh?= Message-ID: <629596069EB54191B0F499465714E539@admin98e7ecdd7> АВИАБИЛЕТЫ ПО АКЦИЯМ Бронируйте по телефону (495) 789-66-85 Внимание! Тарифы даны без учета аэропортовых и сервисных сборов! Пункты назначения Тариф туда и обратно Аэропортовые и сервисные сборы Авиакомпания Срок действия Cтамбул (а/п Сабиха Гёкчен) от 89 EUR ~3342 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Абу Даби от 209 EUR ~7200 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Амстердам от 249 EUR ~1879 руб. Белавиа Путешествие: не более 2 мес. Анкара от 89 EUR ~3437 руб. Turkish Airlines Путешествие: не более 12 мес. Афины от 99 EUR ~6212 руб. Аэросвит Путешествие: не более 1 мес. Барселона от 148 EUR ~7160 руб. Brussels Airlines Бронирование за 21 день Берлин от 115 EUR ~4440 руб. Lufthansa Бронирование за 14 дней Брюссель от 190 EUR ~5160 руб. Brussels Airlines Варшава от 120 EUR ~5142 руб. Аэросвит Путешествие: не более 1 мес. Варшава от 196 EUR ~1782 руб. Белавиа Путешествие: не более 2 мес. Венеция от 149 EUR ~8360 руб. Lufthansa Бронирование за 21 день Ганновер от 199 EUR ~8640 руб. Lufthansa Гонг Конг, Пекин, Чанша, Чунцин, Фучжоу, Гуанджоу, Ханджоу, Куньмин, Нанкин, Нинбо, Циндао, Санья, Шанхай, Тяньцзинь, Ухань, Сямынь от 407 EUR ~5426 -6237 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Гонг-Конг от 350 EUR ~6019 руб. Hong Kong Airlines Продажа до: 31.10.2011 Путешествие : первый вылет до 31.10.2011 (ср.,пт.,вск.) Денпасар (Бали), Джакарта, Сурабая, Пномпень, Фукуока, Нагоя, Осака, Сапорро, Токио, Бусан, Сеул, Куала-Лумпур, Пинанг, Кота-Кинабалу, Катманду, Себу, Манила, Сингапур, Гаосюн, Тайбэй, Бангкок, Пхукет, Ханой, Хошимин, Нади, Окленд от 555 EUR ~6000 руб.-6500 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Дубаи от 199 EUR ~7200 руб. Turkish Airlines Продажа: 15.05.2010-31.03.2011 Путешествие: не более 12 мес. Дубай от 200 EUR ~5165 руб. Аэросвит Путешествие: не менее 3 дней и не более 1 мес. Дублин от 199 EUR ~8800 руб. Lufthansa Бронирование за 21 день Дюссельдорф от 166 EUR ~4560 руб. Lufthansa Бронирование за 14 дней Касабланка от 249 EUR ~6259 руб. Turkish Airlines Продажа:31.03.2011 Путешествие: не более 12 мес. Ларнака от 230 EUR ~6716 руб. Аэросвит Путешествие: не более 1 мес. Ларнака от 299 EUR ~2530 руб. Белавиа Путешествие: не более 2 мес. Милан от 178 EUR ~7560 руб. Brussels Airlines Бронирование за 21 день Милан от 299 EUR ~1446 руб. Белавиа Путешествие: не более 2 мес. Мюнхен от 119 EUR ~4640 руб. Lufthansa Неаполь от 229 EUR ~5401 руб. Аэросвит Путешествие: не более 1 мес. Ницца от 219 EUR ~9000 руб. Lufthansa Бронирование за 21 день Нью-Йорк от 130 EUR ~10548 руб. Аэросвит Продажа: (не позднее 3дн до вылета) Путешествие: не более 3 мес. Нью-Йорк от 159 EUR ~12066 руб. SWISS Продажа: до 27.02.2011 Путешествие:01/03-31/03/11 Париж от 169 EUR ~9080 руб. Lufthansa Бронирование за 21 день Париж от 270 EUR ~3400 руб. Белавиа Путешествие: не более 2 мес. Пекин от 100 EUR ~10441 руб. Аэросвит Путешествие: не более 1 мес. Подгорица от 199 EUR ~6573 руб. Turkish Airlines Продажа:до 31.03.2011 Путешествие: не более 12 мес. Прага от 130 EUR ~4472 руб. Аэросвит Путешествие: не более 1 мес. Прага от 249 EUR ~840 руб. Белавиа Путешествие: не более 2 мес. Прага от 199 EUR ~4138 руб. СZECH AIRLINES Продажа до: 28.02.2011 Путешествие : 15.01-28.02.2011 Рим от 198 EUR ~7600 руб. Brussels Airlines Бронирование за 21 день Рим от 299 EUR ~1448 руб. Белавиа Путешествие: не более 2 мес. София от 179 EUR ~4106 руб. Аэросвит Путешествие: не более 1 мес. Стокгольм от 179 EUR ~1871 руб. Белавиа Путешествие: не более 2 мес. Тбилиси от 249 EUR ~818 руб. Белавиа Путешествие: не более 3 мес. Тегеран от 269 EUR ~1399 руб. Белавиа Путешествие: не более 2 мес. Франкфурт-на-Майне от 119 EUR ~4880 руб. Lufthansa Эрджан от 236 EUR ~2235 руб. Turkish Airlines Путешествие : не более 12 мес.   Все цены в рублях могут изменяться в зависимости от курса обмена валют на день выписки. забронируйте по телефону (495) 789-66-85 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 28553 bytes Desc: not available URL: From gestapo at ilovetechno.lv Sun Feb 27 12:36:01 2011 From: gestapo at ilovetechno.lv (Stewart Westbrook) Date: Sun, 27 Feb 2011 23:36:01 +0300 Subject: =?koi8-r?B?4dLFzsTBIMkgzMnayc7HOiDC1cjHwczUxdLTy8nKINXexdQgySDOwczP?= =?koi8-r?B?x8/PwszP1sXOycU=?= Message-ID: 10 Марта Аренда и лизинг: бухгалтерский учет и налогообложение Цель обучения: рассматриваются вопросы правового регулирования аренды и лизинга, во взаимосвязи с вопросами бухгалтерского учета и налогообложения операций. Все рекомендации по бухгалтерскому и налоговому учету основаны на судебно-арбитражной практике по спорам, связанным с договорами аренды и лизинга. Участники семинара получат консультации специалистов-практиков. Программа мероприятия Права и обязанности сторон договора лизинга. Бухгалтерский учет у лизингодателя и лизингополучателя: нормативные документы и варианты учетной политики, в том числе по отражению выкупной стоимости: имущество на балансе лизингодателя: формирование первоначальной стоимости, порядок начисления амортизации у лизингодателя и лизинговых платежей у лизингополучателя, расчеты по лизинговым платежам, установленным в рублях и в условных единицах; имущество на балансе лизингополучателя: отражение операций у лизингодателя и лизингополучателя по передаче имущества на баланс лизингополучателя, формированию доходов у лизингодателя и расходов у лизингодателя, в том числе, если обязательства (требования) по лизинговым платежам выражены в условных единицах. Налогообложение лизинговых операций. налог на прибыль (формирование первоначальной стоимости лизингового имущества в налоговом учёте; учёт расходов, связанных с доведением лизингового имущества до состояния, пригодного к эксплуатации; порядок признания доходов и расходов; применение повышающего коэффициента при начислении амортизации; выкупная стоимость и варианты ее определения в договоре). НДС у лизингодателя и лизингополучателя: отсутствие обязанности выставления счетов-фактур при передаче имущества в лизинг и выставление счетов-фактур в период действия договора-лизинга; вычет НДС у лизингодателя по имуществу, приобретенному для передачи в лизинг, в том числе при возвратном лизинге (позиция налоговых органов и ВАС РФ); вычет НДС у лизингополучателя, в том числе по выкупной стоимости. Налог на имущество: какая из сторон договора является плательщиком налога на имущество. Порядок расчета средней и среднегодовой стоимости. Отличия в определении остаточной стоимости в бухгалтерском и налоговом учете; особенности уплаты налога на имущество при наличии обособленных подразделений. Арбитражная практика, комментарии. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 (495) ЧЧ5/З2_66 или ЧЧ5/З-9.6_8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3722 bytes Desc: not available URL: From refittede7 at radkersburg.com Sun Feb 27 08:57:23 2011 From: refittede7 at radkersburg.com (Monroe Driscoll) Date: Sun, 27 Feb 2011 23:57:23 +0700 Subject: =?koi8-r?B?zMDCz8og0drZyyDawSDLz9LP1MvPxSDX0sXN0SEg0yDHwdLBztTJxco=?= Message-ID: <000d01cbd69f$67563c40$6400a8c0@refittede7> быстрое обучение иностранному языку гарантия - ЯЗЫК обучение. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 374 bytes Desc: not available URL: From chemistr1 at rhrs.com Sun Feb 27 10:33:40 2011 From: chemistr1 at rhrs.com (Cary Wynn) Date: Mon, 28 Feb 2011 01:33:40 +0700 Subject: =?koi8-r?B?x8HSwc7UydLVxc0g0drZy9Ugz8LV3snNIC0g19kgwtXExdTFIMfP18/S?= =?koi8-r?B?ydTYIM7BIMzAws/NINHa2cvFIQ==?= Message-ID: <000d01cbd6ac$db166cb0$6400a8c0@chemistr1> говорите на иностранном, мы научим. ГАРАНТИРУЕМ: мы научим вас иностранному языку -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 394 bytes Desc: not available URL: From feltsbt at ramshare.com Sun Feb 27 14:30:24 2011 From: feltsbt at ramshare.com (Rex Armstrong) Date: Mon, 28 Feb 2011 07:30:24 +0900 Subject: =?koi8-r?B?4dfJwcLJzMXU2SDQzyDEz9PU1dDO2c0gw8XOwc0hISH0wdLJxtkgz9Qg?= =?koi8-r?B?OTkgRVVSISEh?= Message-ID: АВИАБИЛЕТЫ ПО АКЦИЯМ Бронируйте по телефону (495) 789-66-85 Внимание! Тарифы даны без учета аэропортовых и сервисных сборов! Пункты назначения Тариф туда и обратно Аэропортовые и сервисные сборы Авиакомпания Срок действия Cтамбул (а/п Сабиха Гёкчен) от 89 EUR ~3342 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Абу Даби от 209 EUR ~7200 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Амстердам от 249 EUR ~1879 руб. Белавиа Путешествие: не более 2 мес. Анкара от 89 EUR ~3437 руб. Turkish Airlines Путешествие: не более 12 мес. Афины от 99 EUR ~6212 руб. Аэросвит Путешествие: не более 1 мес. Барселона от 148 EUR ~7160 руб. Brussels Airlines Бронирование за 21 день Берлин от 115 EUR ~4440 руб. Lufthansa Бронирование за 14 дней Брюссель от 190 EUR ~5160 руб. Brussels Airlines Варшава от 120 EUR ~5142 руб. Аэросвит Путешествие: не более 1 мес. Варшава от 196 EUR ~1782 руб. Белавиа Путешествие: не более 2 мес. Венеция от 149 EUR ~8360 руб. Lufthansa Бронирование за 21 день Ганновер от 199 EUR ~8640 руб. Lufthansa Гонг Конг, Пекин, Чанша, Чунцин, Фучжоу, Гуанджоу, Ханджоу, Куньмин, Нанкин, Нинбо, Циндао, Санья, Шанхай, Тяньцзинь, Ухань, Сямынь от 407 EUR ~5426 -6237 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Гонг-Конг от 350 EUR ~6019 руб. Hong Kong Airlines Продажа до: 31.10.2011 Путешествие : первый вылет до 31.10.2011 (ср.,пт.,вск.) Денпасар (Бали), Джакарта, Сурабая, Пномпень, Фукуока, Нагоя, Осака, Сапорро, Токио, Бусан, Сеул, Куала-Лумпур, Пинанг, Кота-Кинабалу, Катманду, Себу, Манила, Сингапур, Гаосюн, Тайбэй, Бангкок, Пхукет, Ханой, Хошимин, Нади, Окленд от 555 EUR ~6000 руб.-6500 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Дубаи от 199 EUR ~7200 руб. Turkish Airlines Продажа: 15.05.2010-31.03.2011 Путешествие: не более 12 мес. Дубай от 200 EUR ~5165 руб. Аэросвит Путешествие: не менее 3 дней и не более 1 мес. Дублин от 199 EUR ~8800 руб. Lufthansa Бронирование за 21 день Дюссельдорф от 166 EUR ~4560 руб. Lufthansa Бронирование за 14 дней Касабланка от 249 EUR ~6259 руб. Turkish Airlines Продажа:31.03.2011 Путешествие: не более 12 мес. Ларнака от 230 EUR ~6716 руб. Аэросвит Путешествие: не более 1 мес. Ларнака от 299 EUR ~2530 руб. Белавиа Путешествие: не более 2 мес. Милан от 178 EUR ~7560 руб. Brussels Airlines Бронирование за 21 день Милан от 299 EUR ~1446 руб. Белавиа Путешествие: не более 2 мес. Мюнхен от 119 EUR ~4640 руб. Lufthansa Неаполь от 229 EUR ~5401 руб. Аэросвит Путешествие: не более 1 мес. Ницца от 219 EUR ~9000 руб. Lufthansa Бронирование за 21 день Нью-Йорк от 130 EUR ~10548 руб. Аэросвит Продажа: (не позднее 3дн до вылета) Путешествие: не более 3 мес. Нью-Йорк от 159 EUR ~12066 руб. SWISS Продажа: до 27.02.2011 Путешествие:01/03-31/03/11 Париж от 169 EUR ~9080 руб. Lufthansa Бронирование за 21 день Париж от 270 EUR ~3400 руб. Белавиа Путешествие: не более 2 мес. Пекин от 100 EUR ~10441 руб. Аэросвит Путешествие: не более 1 мес. Подгорица от 199 EUR ~6573 руб. Turkish Airlines Продажа:до 31.03.2011 Путешествие: не более 12 мес. Прага от 130 EUR ~4472 руб. Аэросвит Путешествие: не более 1 мес. Прага от 249 EUR ~840 руб. Белавиа Путешествие: не более 2 мес. Прага от 199 EUR ~4138 руб. СZECH AIRLINES Продажа до: 28.02.2011 Путешествие : 15.01-28.02.2011 Рим от 198 EUR ~7600 руб. Brussels Airlines Бронирование за 21 день Рим от 299 EUR ~1448 руб. Белавиа Путешествие: не более 2 мес. София от 179 EUR ~4106 руб. Аэросвит Путешествие: не более 1 мес. Стокгольм от 179 EUR ~1871 руб. Белавиа Путешествие: не более 2 мес. Тбилиси от 249 EUR ~818 руб. Белавиа Путешествие: не более 3 мес. Тегеран от 269 EUR ~1399 руб. Белавиа Путешествие: не более 2 мес. Франкфурт-на-Майне от 119 EUR ~4880 руб. Lufthansa Эрджан от 236 EUR ~2235 руб. Turkish Airlines Путешествие : не более 12 мес.   Все цены в рублях могут изменяться в зависимости от курса обмена валют на день выписки. забронируйте по телефону (495) 789-66-85 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 28553 bytes Desc: not available URL: From hybaus at sveta.ru Mon Feb 28 18:30:58 2011 From: hybaus at sveta.ru (Belinda Holland) Date: Mon, 28 Feb 2011 14:30:58 -1200 Subject: =?koi8-r?B?8NLJxc0gyc7P09TSwc7DxdcsIM7BzM/Hz9fZyiDT1MHU1dMgyc4uIM/S?= =?koi8-r?B?x8HOydrBw8nK?= Message-ID: <000d01cbd7b8$b2a42fd0$6400a8c0@hybaus> 02-03 Марта Принимаем на работу граждан СНГ +7 (код Москвы) 4Ч_5-_32_66 > 792.21*22 Программа мероприятия: Статус гражданина СНГ в РФ (временное пребывание, временное проживание, постоянное проживание). "Читаем" миграционную карту, разрешение на временное проживание, вид на жительство √ на что следует обращать внимание работодателю. Ограничения, которые налагает на трудовую деятельность, статус иностранца. Привилегированное положение граждан республики Беларусь. Особенности трудоустройства граждан Кыргызстана. Особенности статуса граждан Туркменистана, Таджикистана, Абхазии, Южной Осетии, имеющих двойное гражданство. Жители═ Приднестровья, имеющие гражданство РФ. Учет по месту пребывания √ что это такое, как оформить, кто может проверить. Является ли работодатель принимающей стороной. Обязанности принимающей стороны и сложности, с которыми она сталкивается. Позиция проверяющих, судебная практика. Ответственность работодателя. Квотирование иностранной рабочей силы. Порядок подачи обязательных заявок на включение в квоту. Необходимость подачи заявки на граждан СНГ, кроме граждан Беларуси. Оформление разрешений вне квот отдельным сотрудникам организации. Новый порядок оформления разрешений на работу для граждан СНГ. Можно ли постоянно оформлять трехмесячные разрешения на граждан СНГ, не оформляя годовых. Ответственность за трудоустройство иностранцев без разрешений на работу или с поддельными, аннулированными разрешениями. Прохождение медицинского осмотра гражданами СНГ. Особенности направления иностранных работников в командировки. Режим стройплощадки √ особенности нахождения работников, имеющих разрешения на работу на другой регион. Обязанности работодателя по уведомлению контролирующих органов о трудоустройстве, увольнении граждан СНГ. Договорные отношения с иностранными гражданами √ трудовые и гражданско-правовые отношения с иностранными работниками. Особенности заключения договоров, особые условия. Порядок выплаты заработной платы и вознаграждения иностранному гражданину наличными рублями с учетом валютного законодательства. Документы, предъявляемые иностранцами при приеме на работу √ перечень необходимых документов и требования к ним Документы об образовании, выданные за рубежом и в СССР √ особенности легализации и нострификации, предусмотренные соглашениями со странами СНГ (Армения, Беларусь, Казахстан, Кыргызстан, Молдова, Туркменистан, Таджикистан, Узбекистан, Украина, Азербайджан, Грузия). Особенности ведения трудовых книжек. Оформление пенсионных свидетельств. Пенсионное обеспечение иностранцев в России. Особенности уплаты пенсионных взносов. Порядок пенсионного страхования и обеспечения граждан Беларуси. Социальное страхование иностранцев. Оплата больничных, детские пособия √ можно ли и нужно ли выплачивать пособия гражданам СНГ. Обязательное медицинское страхование гастарбайтеров. Оформление работодателем полисов ОМС. Особенности уплаты НДФЛ за иностранного работника Особенности уплаты НДФЛ с доходов граждан Беларуси. Понятие налогового резидента и нерезидента. Подсчет дней пребывания в РФ с учетом особенностей для граждан Беларуси, Казахстана, Кыргызстана, Украины, Таджикистана. Перерасчет НДФЛ. Лизинг иностранного персонала: возможности и риски. 03 Марта Все о налоговом статусе иностранных организаций Различие в понятиях "представительство" и "постоянное представительство" иностранной организации: Определения "представительство" и "постоянное представительство" в соответствии с международными договорами об избежании двойного налогообложения. Характеристика подготовительно-вспомогательной деятельности иностранной организации, не приводящей к возникновению налогового статуса "постоянное представительство" в разрезе международного и российского законодательств, а также с учетом сложившейся практики применения законодательных норм. Признаки постоянного представительства. Виды деятельности иностранной организации, приводящие к возникновению налогового статуса "постоянное представительство": предпринимательская деятельность; строительная деятельность; подготовительно-вспомогательная деятельность в интересах иного лица. Роль зависимого и независимого агента иностранной организации в возникновении налогового статуса "постоянное представительство" Налогообложение внереализационных доходов (расходов) Особенности налогообложения и отчетности по налогу на прибыль для представительств и постоянных представительств банк Вся информация по тел: 8 Моск. код: Ч45_ЧО95 \\// ЧЧ5_3968 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7370 bytes Desc: not available URL: From eugen at leitl.org Mon Feb 28 10:02:23 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 28 Feb 2011 19:02:23 +0100 Subject: travelers, careful when security inspects your hardware Message-ID: <20110228180223.GZ23560@leitl.org> Achtung, kraut. http://www.spiegel.de/spiegel/0,1518,748110,00.html (German LKA installed malware when "inspecting" the notebook of a pharma business traveler) -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From contact at diamant-telekom.ru Mon Feb 28 16:16:03 2011 From: contact at diamant-telekom.ru (Earlene Rush) Date: Mon, 28 Feb 2011 21:16:03 -0300 Subject: =?koi8-r?B?89XExcLOwdEg2sHdydTBINDSwdcg18XL08XMxdXewdPUzsnLz9c=?= Message-ID: <000d01cbd7a5$d9dbfdc0$6400a8c0@contact> 02 Марта Правовые риски вексельного оборота. СУДЕБНАЯ ЗАЩИТА ПРАВ ВЕКСЕЛЕУЧАСТНИКОВ 8 Моск. код: 7.42_9l*98 \\// 4Ч5_З2_66 Программа мероприятия: Обзор возможных вексельных возражений . Общая характеристика рисков участников вексельного оборота. Риски, обусловленные документарным характером векселя. Вексельные возражения. Личные и формальные вексельные возражения. Отказы в платеже по векселям. Примеры из практики. Отказы в платеже со ссылкой на дефекты формы векселя Отказы в платеже со ссылкой на нарушение передаточного ряда Отказы в платеже со ссылкой на недобросовестность векселедержателя и приобретение векселя сознательно в ущерб должнику. Доказывание недобросовестного приобретения и приобретения в ущерб должнику. Отказы в платеже со ссылкой на несоблюдение порядка предъявления векселя. Порядок предъявления векселя к платежу. Возможные сценарии с передачей и без передачи векселя плательщику. Удостоверение фактов предъявления векселя плательщику и факта предъявления требования об оплате. Защита прав вексельного должника при обороте поддельных и подложных векселей. Несовершенство института публичной достоверности для векселей в праве РФ. Нестабильность правового положения вексельного должника и вексельного кредитора. Ссылка должника на подделку первоначального текста. Доказывание факта изменения текста. Предмет и вопросы технической экспертизы. Ситуация при невозможности установить первоначальное содержание векселя. Ссылка должника на подлог подписи. Почерковедческая экспертиза, предмет и вопросы Доказательственная сила экспертного заключения. Критерии, предъявляемые к результатам почерковедческих и технических экспертиз. Ссылка должника на превышение полномочий должностного лица, подписавшего вексель Правовые средства заявления возражений со ссылкой на превышение полномочий (в рамках вексельного иска, самостоятельный иск). Техническая экспертиза давности подписи, возможности. Предмет иска и способы доказывания факта превышения полномочий. Распределение обязанности доказывания.. Защита прав векселедержателя при обороте поддельных и подложных векселей. Средства правовой защиты держателя, обнаружившего подлог или подделку векселя. Рекомендации при заключении договоров купли-продажи векселя. Возможные предметы исковых требований. Рекомендации участникам вексельного оборота в целях снижения рисков. Рекомендации по построению внутренних регламентов выдачи, приобретения/отчуждения и погашения векселей. Рекомендации по юридическому оформлению процедуры внутренней (профилактической) экспертизы векселей при принятии векселя к оплате и приобретении векселя Характеристика основных современных технических способов фальсификации векселей. Вся информация по тел: 8 (Ч95) Ч45Ч095 **** 7/42*91-98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5004 bytes Desc: not available URL: From eugen at leitl.org Mon Feb 28 13:18:07 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 28 Feb 2011 22:18:07 +0100 Subject: [Freedombox-discuss] Routing around nationwide and international Internet blocks Message-ID: <20110228211807.GH23560@leitl.org> ----- Forwarded message from Paul Gardner-Stephen ----- From eugen at leitl.org Mon Feb 28 15:24:02 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 1 Mar 2011 00:24:02 +0100 Subject: U.K. Case Reveals Terror Tactics Message-ID: <20110228232402.GI23560@leitl.org> http://online.wsj.com/article/SB10001424052748704570104576124231820312632.html U.K. Case Reveals Terror Tactics By ALISTAIR MACDONALD And CASSELL BRYAN-LOW LONDONbA British Airways PLC employee named Rajib Karim allegedly exchanged electronic messages with an al Qaeda cleric in Yemen for more than two years, his activities cloaked by an encrypted fortress he created on a laptop computer and an external hard drive, prosecutors say. View Full Image PA Photos /Landov Rajib Karim, shown in an undated police photo. The sophisticated encryption tactics Mr. Karim allegedly used to shield his communications with U.S.-born radical cleric Anwar al-Awlakiband the small clue he left behind that enabled police forensics teams to defeat thembare center stage in a high-profile trial here in which Mr. Karim is accused of preparing for terrorist acts related to his work at the airline and to his alleged communications with Mr. Awlaki. The case provides a rare and detailed look at how terror suspects may be able to communicate surreptitiouslyband how difficult and laborious it is for law enforcement to crack their codes. Mr. Karim used layer upon layer of encryption and other techniques to prevent others from being able to read the messages and access other data stored on his computer equipment, prosecutors allege. The encryption is so complex and layered that "I could give an analogy of Russian dolls," Detective Constable Stephen Ball, the policeman in charge of the computer forensics in Mr. Karim's case, said in court Thursday. Mr. Karim, a 31-year-old Bangladeshi national, pleaded guilty in November to fund-raising for the purposes of terrorism; possessing documents likely to be of use to a person committing or preparing to commit an act of terrorism; and engaging in conduct for the preparation of terrorist acts, all charges mainly related to his association with a banned Bangladeshi terrorist group. Mr. Karim, who is in custody, is being tried on four counts of engaging in conduct in preparation of terrorist acts, including providing information about his employer to others for terrorist purposes. James Wood, a lawyer for Mr. Karim, told the court that while his client had committed some offenses, "that which he has admitted is the limit of his criminal actions." Mr. Wood didn't dispute that Mr. Karim had encrypted the messages. Lawyers for Mr. Karim didn't respond to requests to comment for this article. The methods that terror suspects use to conceal their communications are "a real problem" for police and intelligence authorities, says Lord Alan West, who was security adviser to former Prime Minister Gordon Brown. Other experts say such problems have been made worse by off-the-shelf software. View Full Image PA Photos /Landov British Airways planes at Heathrow Airport. Keeping Secrets Among the steps Rajib Karim allegedly used to encrypt messages: b" Messages were stored on an external hard drive in files that appeared to have been created in one kind of program, but in fact used a different type of program b" The program used enables each file to run as a separate, password-protected 'virtual hard drive' b" Text contained in those files also was in scrambled form unless decrypted with the help of a custom-built software program b" Messages allegedly contained false names and other coded words b" Didn't exchange messages as emails, which can be intercepted; instead uploaded them to publicly available websites that host files b" Used software to erase some electronic fingerprints from laptop WSJ research The previous government had even looked into whether they should make it a criminal offense for suspects to not hand over decryption codes, Lord West said. The time needed to break such codes was one reason the previous British government under Mr. Brown argued for holding terror suspects for as long as 28 days without charge, Lord West added. The current government of Prime Minister David Cameron recently reduced this to 14 days. Upon raiding Mr. Karim's apartment police recovered, among other things, a laptop and an external hard drive able to store some 320 gigabytes of data, according to prosecutors. The hard drive held some 35,000 files including messages with Mr. Karim's brother, with Mr. Awlakiba leader of terror group al Qaeda in the Arabian Peninsulaband with other colleagues, prosecutors say. Mr. Karim allegedly hid the messages and other data stored on the drive by changing the suffix at the end of the name of key files, which would typically tell a computer what program would be needed to open them up. That included four files labeled "Quran DVD Collection," which appeared to be compressed files because they took the suffix ".rar," which relates to a type of software that reduces the size of a file, according to prosecutors. Mr. Ball said he noted these files were unusually large, and discovered that they were actually created in a different program, Pretty Good Privacy, which enabled each file to run as a separate, encryption-protected "virtual hard drive." Without the correct password, the files were completely unintelligible. It's the equivalent of "a safe with a combination," Mr. Ball said in court. He sent the files to British intelligence services, which returned them decrypted, or unlocked. Once able to open the files, Mr. Ball testified, he still wasn't able to read most of the messages contained with them: Mr. Karim had enciphered the text, leaving it scrambled and unreadable. Mr. Karim left police a clue, however. On the external hard drive was a disguised file that looked like it was meant for viewing thumbnail-size photographsbbut that actually consisted of text with instructions for using a spreadsheet containing a purpose-built formula to decipher the message, according to Mr. Ball. The spreadsheet also worked in reverse, enciphering messages before sending to another member of the group, Mr. Ball said. Those instructions helped Mr. Ball decrypt the messages and see thatbaccording to prosecutors' accountbMr. Karim was passing to Mr. Awlaki information about British Airways' computer and security systems that could be vitally important for those wishing to conduct a terrorist attack. Still, it took many more months for the messages to fully come into focus. There were many spreadsheets on the hard drive, and sometimes numerous versions of each one. Even once unscrambled, prosecutors allege the messages contained false names and other coded words, further obscuring their contents. The names of countries and people, as well as their sex, were changed, and their movements and activity were discussed as if involved in business transactions, prosecutors allege. As an additional layer of protection, prosecutors say, Mr. Karim and his colleagues didn't exchange their messages as emails, which can be intercepted. They instead uploaded them to public websites that host files, where another member of the group could then download them to his or her own machine. In a further safeguard, prosecutors allege, Mr. Karim used software to erase other electronic fingerprints from his laptop, including a program called "Windows Washer" that effectively deletes traces of Internet browsing history from the machine. Write to Alistair MacDonald at alistair.macdonald at wsj.com and Cassell Bryan-Low at cassell.bryan-low at wsj.com From paul.gardner.stephen at gmail.com Mon Feb 28 13:07:34 2011 From: paul.gardner.stephen at gmail.com (Paul Gardner-Stephen) Date: Tue, 1 Mar 2011 07:37:34 +1030 Subject: [Freedombox-discuss] Routing around nationwide and international Internet blocks Message-ID: Hello Eugen, On Mon, Feb 28, 2011 at 10:23 PM, Eugen Leitl wrote: > On Sun, Feb 27, 2011 at 02:27:29PM -0800, Matt Joyce wrote: >> The only solution I can think of for this is a modular hardware design at >> the physical level that allows for pluggable communication devices. Then > > That's called GBit Ethernet. Some cheap switches even come with > literal SFP and SFP+ slots. It would be interesting to see whether > a couple of cheap aligned Newtons wouldn't cover a few 100 m, or so. > >> allow individual groups to play with laser links, packet radio, gsm / > > I only recently found out that Android smartphones are down to > about 100 EUR in Far East. Because of small size and power envelope > and ability to link up to 3G they can be rooftop-positioned in > weatherproof cases for maximum range, and powered by a small, > cheap PV panel to last through the night. About 95 EUR in Australia for the Huawei IDEOS (network locked, but that doesn't matter for mesh networking) which ServalProject.org is already using as a mesh telephony platform. We also have PV panels that we can use with them. The trick at the moment is that if the phone goes flat, it won't turn back on by itself; but I am sure some clever person can find a solution to that problem. ... >> The problem is mesh networking tends to not work well legally outside of >> 802.xx standards and 2.4 ghz. > > I think our best hope is that next WiFi standards will move towards > realtime beamforming, boosting range while reducing local interferences. This is particularly valuable if you wish to avoid purposeful interference which is trying to take your mesh down. ... > Plug computers are a nice focus, and also a point of departure. > The advantage of plugs is that they're easily placed, immobile, > poweful, and offer both wired and wireless access. Smartphone-based > platforms are mobile, but power-limited, and hence cannot operate > 24/7 unless they're dedicated immobile units, whether mains or > PV-powered -- notice that they come with their built-in UPS. Personally I think that plug computers, mobile phones and more "ordinary" wifi devices like the VillageTelco.org Mesh Potato together provide diversity and specialisation to various tasks and appplications; no one solves all problems. This is why I am passionate that ServalProject.org phone software and VillageTelco.org Mesh Potatoes be interoperable (which they are), and I hope, also that they will interoperate with what this community generates. This also distributes the maintenance and leadership of these platforms further removing single points of failure. Paul. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE