From nsebrinakj at ilisa.com Tue Mar 1 12:28:52 2011 From: nsebrinakj at ilisa.com (Nam Sebrina) Date: Tue, 01 Mar 2011 20:28:52 +0000 Subject: Cheap viagra and cialis, stay longer Message-ID: <36c80v21z85-72745239-146e4q91@wfbtlpeui> BUY V | A G R A Online Overnight Shipping - Lowest price Buy V | A G R A ONLINE - Discounts and Free Shipping applied. 24/7 Online support, Absolute anonymity & Fast delivery http://healthrxmedsshop.ru From franciscosamathaym at barb.com Wed Mar 2 01:18:29 2011 From: franciscosamathaym at barb.com (Francisco Samatha) Date: Wed, 02 Mar 2011 04:18:29 -0500 Subject: Why You Need to Buy Penis Pills? Message-ID: <201103021018.1386B7AA98FFDE5B6DB9@3pbw73s92> Why You Need to Buy Penis Pills? If you choose the right penis enhancement pills that work for you, you will find yourself unwilling to go back to how "sex used to be." Men use male enhancement supplements for a wide range of reasons. Indeed, there are certain factors that can interfere with a man's optimum enjoyment of sex - lifestyle, health habits, stress, aging, and many others. Many men would like to counter the effect of these factors by taking penis pills. For some, they want to improve certain aspects of their sexuality, such as: - Shortening the time it takes to achieve erection - Improving quality of erection - attaining harder, firmer and longer-lasting erections - Increase semen volume - Enhance sperm motility and virility - Increase sexual drive and libido - Heighten sexual stamina - Achieve more intense, longer and more frequent orgasms http://longpenislike.ru From jtrjtrjtr2001 at yahoo.com Wed Mar 2 09:48:04 2011 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Wed, 2 Mar 2011 09:48:04 -0800 (PST) Subject: Reliably Erasing Data From Flash-Based Solid State Drives In-Reply-To: <442605.58716.qm@web33305.mail.mud.yahoo.com> Message-ID: <315846.44782.qm@web33306.mail.mud.yahoo.com> Here is more SSD firmware destroys digital evidence, researchers find Forensic analysis of drives by investigators now uncertain Full :http://news.techworld.com/security/3263093/ssd-fimware-destroys-digital-evidence-researchers-find/ Sarad. --- On Fri, 2/18/11, Sarad AV wrote: > From: Sarad AV > Subject: Reliably Erasing Data From Flash-Based Solid State Drives > To: cypherpunks at al-qaeda.net > Date: Friday, February 18, 2011, 3:01 PM > This may be of interest > > Abstract: > Reliably erasing data from storage media (sanitizing the > media) is a critical > component of secure data management. While sanitizing > entire disks and > individual files is well-understood for hard drives, > flash-based solid state > disks have a very different internal architecture, so it is > unclear whether > hard drive techniques will work for SSDs as well. We > empirically evaluate the > effectiveness of hard drive-oriented techniques and of the > SSDsb built-in > sanitization commands by extracting raw data from the SSDbs > flash chips > after applying these techniques and commands. > > Our results lead to three conclusions: > First, built-in commands are effective, but manufacturers > sometimes implement > them incorrectly. > Second, overwriting the entire visible address space of an > SSD twice is > usually, but not always, sufficient to sanitize the drive. > Third, none of the > existing hard drive-oriented techniques for individual file > sanitization are > effective on SSDs. > This third conclusion leads us to develop flash translation > layer extensions > that exploit the details of flash memorybs behavior to > efficiently support > file sanitization. Overall, we find that reliable SSD > sanitization requires > built-in, verifiable sanitize operations. > > http://www.usenix.org/events/fast11/tech/full_papers/Wei.pdf From taishazs at jmfarms.com Wed Mar 2 07:53:24 2011 From: taishazs at jmfarms.com (Suzan Taisha) Date: Wed, 02 Mar 2011 14:53:24 -0100 Subject: Best Quality Cialis and Low Prices! Express Delivery for ALL orders, No Prescription Required! FDA approved. Message-ID: <201103021051.EC1ADCA9AAF8F2D5CDE518@9a91grd8xz> Cialis 20mg x 120 Pills $200 - VISA/AMEX ONLY - OVERNIGHT Delivery U.S to U.S 2nd Day Delivery. Best Quality and Low Prices! Express Delivery for ALL orders, No Prescription Required! FDA approved. MC or VISA or American Express ONLY. http://drugstorehealthconcernstablets.ru From jays at panix.com Wed Mar 2 12:34:18 2011 From: jays at panix.com (Jay Sulzberger) Date: Wed, 2 Mar 2011 15:34:18 -0500 (EST) Subject: [Freedombox-discuss] Store-and-forward is a necessity Message-ID: On Wed, 2 Mar 2011, Luke Kenneth Casson Leighton wrote: > just some random comments along similar lines: > > * like UUCP, SMTP was also designed to be resilient in the face of > significant disconnects and down-time. many people forget this due to > its abuse for spam... :) (no, you do not have to use SMTP _just_ for > transferring mail, as we well know. i say this explicitly to avoid > any assumptions that i have said "yes! use SMTP! And Only For > Email!") > > * nmbd (part of samba) - actually RFC1001 and RFC1002 - has the > problem of disappearing unreliable hosts solved for... decades. it's > just not very well understood or appreciated that that's nmbd does. > doing peer-to-peer multi-LAN host detection and communicating host > availability network-wide is f*****g hard to get right. back in > 1997-9 at the CIFS conferences, we found that EVERY single implementor > of RFC1001/1002 takes about THREEEE years to get the implementation > correct. INCLUDING microsoft themselves! apt-cache show samba > > *avahi is a piece of shit by comparison to what nmbd can do: it's just > that everyone, when they hear the words "microsoft" and "network > neighbourhood", turns their back on nmbd, pulls their trousers down > and strains mightily to heave out a steaming turd in its general > direction, rather than recognise the value of what nmbd has provided. > think about this: DESPITE completely ignorant computer users > completely screwing up their network configurations, systems based > around the "network neighbourhood" _still_ work... :) > > * n2n is a peer-to-peer Layer 2 VPN (similar to openvpn). its only > flaw is that it requires all parties to agree a "key", and no > mechanism has been provided to "negotiate" such a key. apt-cache show > n2n > > * babel is a mathematically-provably-correct routing algorithm that > can be used to replace BGP. every system participates in the routing, > and there is no dependence on any one given system. apt-cache show > babeld > > also... hah! it looks like there is something on top of babeld, > called ahcpd - wooow. i hadn't heard of that one, before, until > today. > > so - just food for thought: the pieces of the puzzle, to provide > resilient large-scale networking and communications infrastructure, > even in the face of absolutely zero "central servers", are beginning > to appear. > > and the nice thing is - these are all debian packages. > > the only thing i _haven't_ been able to find is a peer-to-peer DNS > service, but i beliieeeeve that there is someone working on that. ok. > they were _supposed_ to be: http://groups.google.com/group/dns-p2p - > ahh, actually someone's made an effort: > https://github.com/Mononofu/P2P-DNS > > so. there exists solid, real-world debian packages for the basics > behind the networking. as debian packages. that's really good. > > l. I have glanced at the documentation of the remarkable work of Zooko O'Whielacronx and the Tahoe team: http://tahoe-lafs.org/trac/tahoe-lafs And ZRTP: http://en.wikipedia.org/wiki/ZRTP may help us to produce a system of encrypted file-transfer/email/general-over-the-Net-communication which meets my standard constraint: Two people who have Net connected computers behind NAT/fire/proxy walls can spend ten minutes on the phone and set up the link; only one of the two need have heard of the link software before the telephone call. oo--JS. _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From usyyeykjgcqk at 3dsiam.com Wed Mar 2 12:40:40 2011 From: usyyeykjgcqk at 3dsiam.com (Original qualitative copies) Date: Wed, 02 Mar 2011 15:40:40 -0500 Subject: Interesting female bags and the Swiss watch Message-ID: <2277287twrwr41108723.8331129688502vLx72043.9422CBO14214hwrjvgiP0V0ywwX-6214214of-C4362208.70b691xy9m95780.10326.3536@dormitory.wildmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 646 bytes Desc: not available URL: From ngel_924 at caller.com Wed Mar 2 05:59:07 2011 From: ngel_924 at caller.com (Collection of novelties, season - summer 2011) Date: Wed, 02 Mar 2011 18:59:07 +0500 Subject: The best gifts and watch Message-ID: <251521842.CVRDIKMX9737DPKZ6186020@rhombic.morelos.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 584 bytes Desc: not available URL: From m0lt1wl at gmail.com Wed Mar 2 20:06:06 2011 From: m0lt1wl at gmail.com (m0lt1) Date: Wed, 02 Mar 2011 23:06:06 -0500 Subject: travelers, careful when security inspects your hardware In-Reply-To: <20110228180223.GZ23560@leitl.org> References: <20110228180223.GZ23560@leitl.org> Message-ID: <4D6F13AE.7030404@gmail.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 As a matter of interest, anyone know how detailed their particular (or others) country goes into inspecting hardware? I've never encountered personnel who did more than a physical swab on the case for residues. On 28/02/11 01:02 PM, Eugen Leitl wrote: > Achtung, kraut. > > http://www.spiegel.de/spiegel/0,1518,748110,00.html > > (German LKA installed malware when "inspecting" the notebook of > a pharma business traveler) > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJNbxOqAAoJEPuu2mBeOIXHXRkP/RteywsF3zsf/VIAVXIkaD2L YVqseCMB/6dgHaZfCy9006T2ddLio6aHFxlboB2wln/Su1uv7moBgGEE0YVrCka6 QJvOUYFB4+/MU8FB4bLJq59Qi3c0m0NRW3Nw99nAylpZn/nFF9VCX2e2kpwDljzG Y1U5H7wTq7xGuxjdPYllNTTVgkHHHY25W4RsDNRefXaKRqWiHYFzFu/4BLLhwxKy Mg0j8rDylSGFTKCX5s4g0CmdUCIxHaJYDJ1nuzOX7/OBDoe+vfj2rh2X+0zdfPNh w9pa41LcsbPIJME/UYgqYlzL+9bl7X8mU7iabkZcIRbBLLDY6Txb9tuUTR8/kuAZ qnQ4w0OIDRO/DBbO2zGMhlC2ZntRP/RkaNI/Q+LIw+VIBCIdgbK3Bmkk6Yqb3NC1 6k9kNj68+0ShcterIyNLNDdgLd15Em0tZXLKHPGxHr1ojzSV9OsBhtPknvtjOnfS DRVvKvE7InEKmnElA91VIcwjH+kMHoznYfHRwxpqTmbGV7fDG999vxAF6f3aO5uu iCcPGTgDlwcLqWq9utsnrEXCLdf/eWdVmjSfiqZOEXNU5hPhPrgV0IlSYfMZdaQ9 7Do7yPizFSs6NazgCL6ThTT1IBVWg6EGw8884/l2C1Rdvqw/TETWRC0Ru1xvuJz+ iI6aIzmtTuOvJ44QDdDx =ng1X -----END PGP SIGNATURE----- From beliy_ostrov at kosmeti.ru Wed Mar 2 17:55:07 2011 From: beliy_ostrov at kosmeti.ru (=?koi8-r?B?88TFzMvJIMkg0NLJxMnSy8k=?=) Date: Thu, 3 Mar 2011 02:55:07 +0100 Subject: =?koi8-r?B?88TFzMvJOiDT0M/Tz8LZIM/Gz9LNzMXOydEgySDawd3J1Nk=?= Message-ID: <0356A9572B6D41E79A74405844F3C39A@computer> l1 марта Защита сделок от претензий. Способы оформления (создание преюдиции) с защитой от дальнейших претензий и возможных последствий. +7 Московский код: 742_9l98 <<>> Ч-Ч*5.З.2--6/6 Цель обучения: Курс посвящен вопросам совершения и последующей защиты сделок по реализации имущества от претензий со стороны третьих лиц, под которыми в основном понимается налоговый орган. Будут рассмотрены различные способы реализации, которые позволяют защититься от обвинений в занижении цены, в работе с недобросовестными поставщиками, продаже товара взаимозависимому лицу и так далее. Программа: 1. Совершение сделки в обход требований ст. 40 НК РФ. Обоснование способа, защита результатов. 2. Создание преюдиции как способ защиты совершенной сделки. 3. Заключение сделки в суде. Мировое соглашение. Обжалование результатов. 4. Сделки с недобросовестными поставщиками. Рассмотрение подхода государства к работе с недобросовестными поставщиками (анализ законодательных инициатив, требований Минфина, судебной практики). Проявление осмотрительности и прочее. Способ заключение сделки, позволяющей обойти претензии по работе с недобросовестным поставщиком. 5. Совершение сделки с обходом требований о взаимозависимости, аффилированности. 6. Использование простого товарищества для отчуждения имущества. 7. Рассмотрение способов снижения налогового бремени — использование дополнительной выгоды, штрафные санкции, перенос момента возникновения права собственности и другие. 8. Отчуждение имущества посредством реорганизации компании. Анализ деловой цели. 9. Банкротство. Оспаривание сделок в рамках процедуры банкротства. 10. Внесение в уставный капитал. Безвозмездная передача. 11. Отчуждение имущества с использованием поручительства, залога имущества. 12. Способы реализации имущества нерезиденту. Стоимость участия в семинаре 7 900 руб. По вопpоcам pегucтаpацuu обpащайтеcь по тел: (Ч95) ЧЧ*53.96.8 : ЧЧ5/З9.68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3018 bytes Desc: not available URL: From eugen at leitl.org Thu Mar 3 00:01:30 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 3 Mar 2011 09:01:30 +0100 Subject: [Freedombox-discuss] Store-and-forward is a necessity Message-ID: <20110303080130.GD23560@leitl.org> ----- Forwarded message from Jay Sulzberger ----- From beloralex at russkayatroyka.ru Thu Mar 3 03:24:17 2011 From: beloralex at russkayatroyka.ru (=?koi8-r?B?8NnWz9c=?=) Date: Thu, 3 Mar 2011 12:24:17 +0100 Subject: =?koi8-r?B?8sXLzMHNwSDP1CDQ0s/GxdPTyc/OwczP1w==?= Message-ID: <9611F1EFDD3547A9BEDEEEFD042DC72D@laura> Предлагаем качественную доставку рекламы Базы адресов постоянно обновляются Очень гибкая система скидок постоянным клиентам до 50% При заказе 2х рассылок, 3я бесплатная; Подготовка макета бесплатно; Быстрый выход рассылки, по желанию день в день; Самый массовый охват целевой аудитории Пробив фильтров. Любые формы оплаты; Каждая рассылка перед отправкой тестируется; Москва от 2 тыс руб. Россия от 3000 руб. Страны СНГ от 2,5 тыс руб. Наши цены самые альтернативные, закажите у Нас и Вы будете удивлены качеством обслуживания. Формируем базы под каждое направление, продукт реализации. Фокусировка себя полностью оправдывает. тел: \964/ 7О2 36 85 From gnu at toad.com Fri Mar 4 03:32:51 2011 From: gnu at toad.com (John Gilmore) Date: Fri, 04 Mar 2011 03:32:51 -0800 Subject: [Freedombox-discuss] Debian FreedomBox = Existing Debian \packages on plug hardware Message-ID: > In may require a warrant, but following severe breakdown of civil > administration caused by either unrest or natural disaster, the rules may > not be followed to the letter. > > I think it's desirable - across the spectrum of proposals for > user-controlled network devices generally, not just Debian Freedomboxen - to > store as much state as possible on very small removable media - i.e. > micro-SD cards or similar - so that in the event of a raid by people likely > to wish to silence your node, all that has to be concealed is a 15mm x 11mm > card, which could be swallowed or easily concealed in any number of places. > After the event the card could be inserted into another suitable device and > the node would be back up and running with the same state it had previously. I agree that having tiny portable storage devices would be very useful for concealment and smuggling. But... There are severe technical problems to be solved to make flash-based devices such as SD or microSD cards usable for information that you want to keep private from "the authorities". Due to flash's inability to overwrite data in place, flash-based memories make multiple copies of your data, don't keep track of the extra copies, and don't rapidly or securely erase them. Many provide no interface that merely asks the entire device to erase itself into a clean, secure state. Once you've written an incriminating file, or a crypto key, onto a flash-based device, you can never be sure whether physically seizing the device, ripping it open and probing the flash chips will produce a copy of that file or key -- or not. The only ways to be sure are to (1) rip it apart yourself and look -- oops, the drive is now dead; or (2) physically grind it into sand. See: http://cseweb.ucsd.edu/users/m3wei/ http://cseweb.ucsd.edu/users/swanson/papers/Fast2011SecErase.pdf Rotating magnetic disk drives have SOLVED this problem; they provide Secure Erase commands that erase the drive such that not even experts can extract the former contents (hdparm --security-erase-extended). They are also quite good at securely erasing single files without destroying the rest of the data and without physically destroying the drive (GNU Shred). Until the Flash hardware community provides similar facilities, I recommend that the Freedom Box project fully support magnetic disk drives for those who choose them. Activists' lives depend on getting this right. John _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From vhgspanvaoco at aapmidget.com.ar Thu Mar 3 17:37:25 2011 From: vhgspanvaoco at aapmidget.com.ar (Mysterious sexuality) Date: Fri, 04 Mar 2011 06:37:25 +0500 Subject: Mysterious length Message-ID: <03skd228384115019.98959212250JRDCHI1jIpttl59543.159GZRT788032ydL6P5egE-6vy-W41795503515593.47t098iy2g875652.29623.833275035@him.yebox.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 347 bytes Desc: not available URL: From computer at rosko-iv.ru Fri Mar 4 00:01:50 2011 From: computer at rosko-iv.ru (=?koi8-r?B?78fOyQ==?=) Date: Fri, 4 Mar 2011 08:01:50 +0000 Subject: =?koi8-r?B?88vJxMvJIM7BIMTP09TB18vVINLFy8zBzdk=?= Message-ID: <000d01cbda42$6aca4a50$6400a8c0@computer> Предлагаем качественную доставку рекламы Базы адресов постоянно обновляются Очень гибкая система скидок постоянным клиентам до 50% При заказе 2х рассылок, 3я бесплатная; Подготовка макета бесплатно; Быстрый выход рассылки, по желанию день в день; Самый массовый охват целевой аудитории Пробив фильтров. Любые формы оплаты; Каждая рассылка перед отправкой тестируется; Москва от 2 тыс руб. Россия от 3000 руб. Страны СНГ от 2,5 тыс руб. Наши цены самые альтернативные, закажите у Нас и Вы будете удивлены качеством обслуживания. Формируем базы под каждое направление, продукт реализации. Фокусировка себя полностью оправдывает. тел: #8#964#7O2#З6#85 From StealthMonger at nym.mixmin.net Fri Mar 4 00:30:48 2011 From: StealthMonger at nym.mixmin.net (StealthMonger) Date: Fri, 4 Mar 2011 08:30:48 +0000 (GMT) Subject: [Freedombox-discuss] Store-and-forward is a necessity Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 treed at ultraviolet.org (Tracy Reed) writes: > The first thing evil regimes always seem to do is to turn off the > Internet access and censor communications in general. I keep asking > myself, "How did people communicate electronically before broadband > Internet or even PPP dial-up enabled the always-on connections which > allowed the web to grow?" The answer is store and forward message > passing systems: UUCP in the case of pre-Internet communications. > More than anything people need a way to ship around messages such as > tweets, emails, IMs, and smallish files. They need to be able to > send around simple news and activity coordination items. Absolutely. And another application where store and forward message passing is critical is to allow long, random latency at each stop. Anonymizing remailers [1] need this to mix messages and thwart traffic analysis. Long, random latency is part of the price of anonymity. > Goals: > * Allowing transmission of messages world-wide in the face of active > oppression > * Not requiring a dedicated Internet connection > * Encrypted > * Hard to detect > * Location-aware (for routing purposes) > * Provide very basic communications abilities. This is an improvement > when people have no ability to communicate at all. Add to that list: * Support anonymizing remailers having long, random latency to mix messages and thwart traffic analysis. > [...] > So how do we get return messages or even ACK packets (receipt > verifications) back? Send encrypted ACKs via message pools which are broadcast worldwide, such as Usenet alt.anonymous.messages [2]. Each interested party checks all pool messages and decrypts her own. And later in this thread, michiel at unhosted.org (Michiel de Jong) suggests the good idea of extending Usenet to Freedombox hosts: > to set up a revival of usenet.... putting usenet into the > freedombox would probably be easy, and definitely noone could say > we're reinventing the wheel (although, maybe rediscovering a > forgotten wheel) "Extending Usenet to a new medium" would be more accurate. Usenet has not died. Probably the NNTP Usenet protocol can be adapted to the Freedom Protocol. Moreover, pools can be used for both sides of a dialog, not just the ACKs. See stealthmail [3]. [1] http://mixmaster.sourceforge.net/ [2] http://www.is-not-my.name [3] mailto:stealthsuite at nym.mixmin.net?subject=send%20index.html -- StealthMonger Key: mailto:stealthsuite at nym.mixmin.net?subject=send%20stealthmonger-key -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.8+ iEYEARECAAYFAk1wj9QACgkQDkU5rhlDCl7qoQCfcPOCsjTL6+yhA9yDZJE8iMmO PUAAmwZOaedVlxjvehhr91KNFgxUwHgz =CjjQ -----END PGP SIGNATURE----- _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Mar 4 01:44:14 2011 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 4 Mar 2011 10:44:14 +0100 Subject: [Freedombox-discuss] Store-and-forward is a necessity Message-ID: <20110304094414.GF23560@leitl.org> ----- Forwarded message from StealthMonger ----- From eugen at leitl.org Fri Mar 4 03:04:28 2011 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 4 Mar 2011 12:04:28 +0100 Subject: Beijing to trial mobile tracking system: report Message-ID: <20110304110428.GH23560@leitl.org> http://beta.sg.news.yahoo.com/beijing-trial-mobile-tracking-system-report-20110303-090520-169.html A system designed to track the location of millions of mobile phone users is to be tested in Beijing, sparking concerns over privacy, state media reported Thursday. The information platform will enable authorities to check on the location of China Mobile's more than 17 million users in the capital, the Global Times newspaper said, citing the Beijing Municipal Science and Technology Commission. The commission made the announcement in a statement posted on its website on Monday but it was later removed, the newspaper said. A spokeswoman for China Mobile, the world's largest mobile phone operator, said she could not immediately respond to questions from AFP and no one at the commission was available to comment. The official Beijing Daily newspaper said Wednesday the project would "round up" information on mobile users' movements around the city including their time of departure, destination and means of transport. The data will be used to better control traffic and monitor the population, the Global Times said, citing an unidentified employee at the commission. "Our focus is to get general statistics for better traffic management and population monitoring," the employee said. "For example, if you want to determine the number of migrants in Beijing, the platform is far more precise than a door-to-door census." The system will be tested in two densely populated areas in the city's north by the end of June, the Global Times said. The announcement has raised concerns that the system will infringe the privacy of mobile users, despite pledges by officials that they would make sure personal data was not leaked, the Global Times said. The newspaper said 23 people, some of whom had been employed to handle China Mobile's customer service issues, were currently on trial in Beijing for selling personal information, such as users' location, on the Internet. From odelindaqu at jazzing.com Fri Mar 4 10:14:13 2011 From: odelindaqu at jazzing.com (Ora Delinda) Date: Fri, 04 Mar 2011 12:14:13 -0600 Subject: High quality Generic and Original Viagra. 100% Satisfaction Guaranteed. Fast shipping to USA with 2nd day delivery option. Message-ID: <201103041916.E9BB4D1618EA3C4BD375D5B9@o0k6008153> Cialis 20mg x 120 Pills $200 - VISA/AMEX ONLY - OVERNIGHT Delivery U.S to U.S 2nd Day Delivery. Best Quality and Low Prices! Express Delivery for ALL orders, No Prescription Required! FDA approved. MC or VISA or American Express ONLY. http://drugtoredietpillsmeds.ru From eugen at leitl.org Fri Mar 4 03:38:54 2011 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 4 Mar 2011 12:38:54 +0100 Subject: [Freedombox-discuss] Debian FreedomBox = Existing Debian \packages on plug hardware Message-ID: <20110304113854.GJ23560@leitl.org> ----- Forwarded message from John Gilmore ----- From info83075 at DHL.com Fri Mar 4 06:16:54 2011 From: info83075 at DHL.com (DHL notification robot) Date: Fri, 4 Mar 2011 17:16:54 +0300 Subject: DHL notification #38536 Message-ID: <4136013809.3MQU1D73288736@zjaqcgpcyqgz.epudvio.net> important information in attach file -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 344 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: DHL_document.zip Type: application/zip Size: 44277 bytes Desc: not available URL: From jya at pipeline.com Fri Mar 4 15:43:17 2011 From: jya at pipeline.com (John Young) Date: Fri, 04 Mar 2011 18:43:17 -0500 Subject: The Cypherpunk Revolutionary Julian Assange Message-ID: "The world's best-known 'cypherpunk' has long been on a mission to stop governments watching our every move. It is said to be the key to understanding WikiLeaks. Although there are tens of thousands of articles on Julian Assange in the world's newspapers and magazines, no mainstream journalist so far has grasped the critical significance of the cypherpunks movement to Assange's intellectual development and the origin of WikiLeaks. ... At the core of the cypherpunk philosophy was the belief that the great question of politics in the age of the internet was whether the state would strangle individual freedom and privacy through its capacity for electronic surveillance or whether autonomous individuals would eventually undermine and even destroy the state through their deployment of electronic weapons newly at hand." Excerpt online: http://www.nzherald.co.nz/technology/news/article.cfm?c_id=5&objectid=10710 269 Full 19-page essay by AU politics professor Robert Manne: http://cryptome.org/0003/assange-manne.zip (6.2MB) From info66841 at DHL.com Fri Mar 4 08:43:44 2011 From: info66841 at DHL.com (DHL notification robot) Date: Fri, 4 Mar 2011 19:43:44 +0300 Subject: DHL notification #78421 Message-ID: <981866496.03168007398045@DHL.com> important information in attach file -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 246 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: DHL_document.zip Type: application/zip Size: 44277 bytes Desc: not available URL: From copyrightd at vidok.ru Fri Mar 4 03:10:13 2011 From: copyrightd at vidok.ru (=?koi8-r?B?7sHKzSDJzs/T1NLBzsPF1w==?=) Date: Fri, 4 Mar 2011 20:10:13 +0900 Subject: =?koi8-r?B?6c7P09TSwc7O2cog0sHCz9TOycs6INPMz9bO2cUg18/Q0s/T2SDQ0snX?= =?koi8-r?B?zMXexc7J0SDJIMnT0M/M2NrP18HOydE=?= Message-ID: <0270F7A12953407E8FF2A185F11511B2@ad56387ef066e4> Утвержден новый порядок проведения Миграционной службой проверок работодателей и иностранных работников. Введены новые механизмы выездных и документарных проверок, в том числе, проводимых ФМС совместно с другими органами контроля и надзора. НОВОЕ в привлечении иностранных работников в 2011 году Дата: I5 марта (495) ЧЧ*5-.З2_66 или ЧЧ/5.40..95 Вступление в силу с 15 февраля 2011 года поправок в законы "О правовом положении иностранных граждан", "О порядке выезда из Российской Федерации и въезда в Российскую Федерацию", "О миграционном учете". Категории иностранных граждан по статусу пребывания: постоянно проживающие, временно проживающие и временно пребывающие. Изменения в статусе проживания ВКС и членов их семей — порядок оформления вида на жительство и его последствия. Продление срока разрешения на работу временно проживающим гражданам. Особенности оформления для каждой категории работники из Беларуси. Особенности оформления иностранных работников аккредитованных филиалов и представительств иностранных компаний. Международные договоры о временной трудовой деятельности. Соглашение с Францией о временной трудовой деятельности. Квоты на привлечение иностранных работников. Ограничение в торговле и спорте на 2011 год. Исключения из квотирования на 2011 год. Изменения в оформлении документов ВКС, режим их пребывания, продление сроков действительности документов. Новое понятие членов семьи ВКС, права членов семьи. Новое в оформлении приглашений и рабочих виз ВКС. Новое в медицинском страховании ВКС и членов их семей. Новые правила миграционного учета для ВКС. Новые правила командировок и служебных поездок ВКС. Обновленный перечень контингентов работников, которым не требуется разрешений на работу. Порядок оформления разрешений на работу работникам из безвизовых и визовых стран. Изменения в условиях разрешений. Эквивалентность профессионального образования. Уточненный порядок уведомлений о привлечении иностранных работников — формы, сроки. Предоставление гарантий материального, жилищного и медицинского обеспечения. Порядок въезда-выезда. Оформление приглашения на въезд. Новая практика ФМС по запрещению въезда в Россию. Изменения в продлении рабочих виз. Изменения в миграционном учете для работодателей. Новые основания для снятия с учета и новый порядок снятия с учета. Отмена пошлины за временное пребывание в России. Оформление гражданско-правового договора и трудового договора. Ограничения по территории, переводам и совмещениям, прием-увольнение, содержание трудового договора, денежные расчеты с валютными нерезидентами. Отмена социального страхования для иностранных работников. Новое регулирование командировок и служебных поездок иностранных работников. Административная и уголовная ответственность работодателей и иностранных граждан. Практика ФМС 2010 года. Миграционные карты. Постановка и снятие с миграционного учета при перемещении по России и при выезде за пределы России. Новое основание и порядок для снятия с учета. Новый регламент по миграционному учету ФМС. Изменение сведений миграционного учета. Гражданско-правовые отношения с иностранными работниками и ПБОЮЛ - плюсы и минусы. Особенности трудовых отношений с иностранными работниками: ограничения по территории, переводам и совмещениям,  прием-увольнение, содержание трудового договора, денежные расчеты с валютными нерезидентами, дополнительные гарантии за счет работодателей, охрана труда, новый перечень и условия командировок, листки нетрудоспособности. Виды социального страхования, распространяющиеся на иностранцев. Пенсионное, медицинское и социальное страхование, декларирование дохода и НОВОЕ в уплате подоходного налога. Административная ответственность работодателя, должностных лиц и иностранных граждан. Система штрафов, связанных с незаконной деятельностью иностранных граждан на территории Российской Федерации по действующему законодательству. Уголовная ответственность. Порядок привлечения, сроки давности. Административное выдворение, депортация, их последствия. Контролирующие органы и их компетенция. ФМС и ее территориальные органы, органы милиции, государственная инспекция труда, Роспотребнадзор, ГИБДД. Новый регламент по проведению проверок ФМС. Арбитражная практика по спорам о привлечении юридических лиц к административной ответственности. За более подробной информацuей обpащайтеcь по тел: код: (четыре девять пять) 742-9*i-9/8 : 7Ч2.9/l/9_8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5939 bytes Desc: not available URL: From JavierRodrguez at malaysia.net Fri Mar 4 16:53:29 2011 From: JavierRodrguez at malaysia.net (Dr.Carmen Garca) Date: Sat, 05 Mar 2011 05:53:29 +0500 Subject: Not superfluous centimetres Message-ID: <860824600.DHVSTMGJ0241KCWK2078720@dodecahedra.ert.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 490 bytes Desc: not available URL: From martyq9 at histobass.com Sat Mar 5 08:29:30 2011 From: martyq9 at histobass.com (Federico Sutherland) Date: Sat, 5 Mar 2011 08:29:30 -0800 Subject: =?koi8-r?B?MjUg0drZy8/XIMna1d7Bxc0uIMfB0sHO1MnRLg==?= Message-ID: <000d01cbdb52$80d0a630$6400a8c0@martyq9> говорите на иностранном, мы научим. говорите на иностранном, мы научим. говорите на иностранном, мы научим. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 797 bytes Desc: not available URL: From orderzl at hatillorealestate.com Sat Mar 5 08:51:46 2011 From: orderzl at hatillorealestate.com (Jocelyn North) Date: Sat, 5 Mar 2011 08:51:46 -0800 Subject: =?koi8-r?B?yc7P09TSwc7O2cogwsXaINDSz8LMxc0gLSDO1dbOzyDUz8zYy88g/Pft?= Message-ID: <000d01cbdb55$9d058980$6400a8c0@orderzl> обучим разговорному языку с гарантией. обучение языку и вы тоже сможете говорить на любом языке -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 708 bytes Desc: not available URL: From drizzles0 at happeninebook.com Sat Mar 5 10:20:01 2011 From: drizzles0 at happeninebook.com (Corinne Vigil) Date: Sat, 5 Mar 2011 10:20:01 -0800 Subject: =?koi8-r?B?zMDCz8og0drZyyDawSDLz9LP1MvPxSDX0sXN0SEg0yDHwdLBztTJxco=?= Message-ID: <000d01cbdb61$f11cd3a0$6400a8c0@drizzles0> 25 языков изучаем. гарантия. гарантированное обучение языку 25 кадр - устарело! новая супер методика обучения иностранным языкам. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 746 bytes Desc: not available URL: From qylwzyrzmuxo at aami-pezenas.com.jfet.org Fri Mar 4 20:25:34 2011 From: qylwzyrzmuxo at aami-pezenas.com.jfet.org (Dr.Alba Rodrguez) Date: Sat, 05 Mar 2011 10:25:34 +0600 Subject: 2 months. And 5 inches of strengthening Message-ID: <89522fbe758879.04371333723784ViH28.125XTW05jscelkM9L1aziwkspY-466kz-R74564189229.53e447zf1o699.17041.63314691@tansy.netsiam.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 525 bytes Desc: not available URL: From juhnbg at ivregion.ru Sat Mar 5 00:32:10 2011 From: juhnbg at ivregion.ru (=?koi8-r?B?8sXBzNjO2cUgxMXO2MfJ?=) Date: Sat, 5 Mar 2011 10:32:10 +0200 Subject: =?koi8-r?B?6c7XxdPUycPJz87Oz8Ug0NLPxcvUydLP18HOycU=?= Message-ID: ТЕМА: Реструктуризация бюджета предприятия, построение экономической модели предприятия. -------------------------------------------------------------------- Компьютерный класс 3 дня, настоящей практики!С профессионалами своего дела в области бюджетного управления предприятием. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 (Ч95) Ч45-39_68 <> 7Ч2/91.98 На весь срок обучения каждый обучающийся обеспечивается индивидуальным рабочим местом в компьютерном классе. Лицензионное программное обеспечение, на котором Вы будете обучаться методам реструктуризации бюджета, будет выдано Вам в конце семинара. А для профессиональной работы, Вам по прибытию на предприятие нужно будет всего лишь установить данную программу на свой компьютер и начать выдавать результаты. Дата учебного курса: С четырнадцатого по шестнадцатое марта 201Iг. Информация об учебном курсе: * В последствии решений для предприятий! это самое главное распознать и просчитать в условиях плановых задач факторы, которые, дестабилизируют деятельность предприятия, не только в условиях кризиса но и финансовой неопределенности. * Вы не поверите, но за 3 дня занятий Вы получите все ответы на вопросы, которые возникли у Вас и Вашего предприятия. Данной серией семинаров мы занимаемся с 2000г. и обучили уже более 4000 специалистов. * В условиях неопределенности рынка возникает необходимость поиска решений. Мы знаем, как помочь Вам, так как, начиная еще с прошлого века девяносто седьмого года, наша компания разрабатывает пакет программ (интегрирует их с методическими материалами и подготавливает обучающие курсы) для планирования бюджета, анализа текущего, сравнения плана и факта, поиска и принятия решений, отслеживания выполнения намеченных программ. * В итоге обучения на семинаре Вы сможете определить и найти решения по вопросам, которые в условиях кризиса возникают у компаний, а именно: Оборачиваемость капитала его недостаток, как обеспечить покрытие; как распорядиться текущими поступлениями (куда надо тратить, а куда нет); стоит ли привлекать процентные и иные дорогостоящие средства? если да, то минимизировать период использования за счет выделения собственных, то есть оптимизировать оборотные ср-ва. Рассмотрение возможных периодов с повышенными рисками используя многопараметральный экономический анализ для поиска решений; выявление нестабильности денежных средств, определение их дефицита, разработка сценария для ожидаемых трудностей, принятие сценария что следует сокращать а что увеличивать. Обучение методу от обратного для рассмотрения постатейного анализа бюджета, использование метода точки «0» для стабилизации не только затрат но и управление доходами предприятия и ценообразованием; как разработать плановый бюджет максимально приближенный к фактическому проанализировать его и принять за основу в ближайшем периоде. И еще множество других вопросов, на которые Вы услышите ответы. Около 4ОО их будет рассмотрено на семинаре. * В результате обучения, Вы, как профессионал сможете управлять любой формой финансовых отношений. Быть подготовленным к любым неожиданностям. 1 день * Создание первого тестового проекта, используя полученное задание. Знакомство программным комплексом. Изучение и рассмотрение на практике фин. методов, выбор для создаваемого проекта. Использование программ для выполнения полученного задания. Первые шаги в отборе полученных результатов используя фин. контрольные точки. Поэтапное построение проекта и анализ его при помощи выбранного метода. 2 день * Получение отчетов по проекту, знакомство, изучение. Изучение финансового анализа (показатели) практическое применение, рассмотрение в текущей ситуации. Финансовый контролинг для изучения и исправления ошибок в созданном проекте. Поиск ошибок рассмотрение и исправление. Последовательность применение метода. Для фиксирования темы и ее лучшего понимания создание II го проекта при помощи ПО. Созданный проект начинаем анализировать. 3 день * При помощи новых технологий анализа и программы, реструктурируем проекты с новыми параметрами, проводим отбор и проверяет на устойчивость. Описываем все риски, отклонения для проекта, помещаем в виртуальную реальность, получаем результаты, ищем оптимальное решение. Отбор планового проекта, загрузка фактических данных и сравнение проектов. Эмулирование риск-факторов влияющих на бюджет пр. Создание модели управления потоками. Поиск оборотных средств за счет перераспределения потоков. Постатейные отклонения в проекте, оптимизация конечных результатов. Выявления дефицита ден. ср-в и поиск средств на покрытие, создание оптимальной схемы. Решения в управлении с использованием новых полученных результатов. Каждому участнику курсов: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: 1. Специализированная программа-профессиональная разработка фин. проектов! Программный продукт способен не только разрабатывать финансовую документацию на профессиональном уровне, в новой версии реализованы значительные возможности для планирования текущего бюджета предприятий. 2. Программа для построения, развития и управления экономической моделью предприятия. Управления инвестиционными проектами, сравнение план/факт, мониторинг бюджета предприятия в реальном времени. Возможность написания собственных формул, сценария диагностики проекта, перепрограммирование и настройка программы. 3. Программа экспресс подготовки экономического проекта. Позволяет всего за пару часов создать очень приличный проект для принятия решений по глобальным разработкам. 4. Материал методический: печатный для самостоятельной разработки и подготовки экономической документации, бизнес планов, ТЭО, инвестиционных проектов. 5. Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него обучающийся специалист может эффективно разрабатывать свои сценарии финансовых проектов. ------------------------------------------------------------------------- По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 Московский код: Ч45-4О95 <<<>>> 4Ч5/Ч095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9866 bytes Desc: not available URL: From begirdle at dobp.ru Fri Mar 4 22:54:55 2011 From: begirdle at dobp.ru (Trent Sprague) Date: Sat, 5 Mar 2011 12:24:55 +0530 Subject: =?koi8-r?B?48XO1NIg5M/T1MHXy8kg59LV2s/X?= Message-ID: <000d01cbdb02$3be19c50$6400a8c0@begirdle> Транспортная Компания "Центр Доставки Грузов" предлагает Вам перевозку грузов на выгодных условиях: Звоните (Ч95) Ч11-96-Ч2 Тип Автомобиля Минималка Стоимость в Час Минимальный Заказ Газель 1,5 тонны 4+1 390 руб. 1950 руб. Зил Бычок 3тонны 5+1 490 руб. 2940 руб. Мерседес 5 тонн 6+1 590 руб. 4130 руб. Мерседес 10 тонн 7+1 690 руб. 5520 руб. Еврофура 20 тонн 7+1 880 руб. 7040 руб. Все цены с учетом НДС 18% Экспедирование груза +1 час Погрузоразгрузочные работы +1 час Пропуск в Центр Москвы +1 час Более подробная информация и заказ автомобилей по телефону (Ч95) Ч11-96-Ч2 Звоните! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4458 bytes Desc: not available URL: From bgivm at take.ru Sat Mar 5 08:50:53 2011 From: bgivm at take.ru (=?koi8-r?B?8NLF1MXO2snJIM7BzM/Hz9fPyg==?=) Date: Sat, 5 Mar 2011 17:50:53 +0100 Subject: =?koi8-r?B?8NLF1MXO2snJINDPIO7k8yDJIO7BzM/H1SDOwSDQ0snC2czYLCDT0M/T?= =?koi8-r?B?z8LZINrB3cnU2S4=?= Message-ID: <000d01cbdb55$7d70aaf0$6400a8c0@bgivm> шестнадцатое марта Как защититься от налоговых претензий по НДС и Налогу на прибыль. (Ч95) Ч4/5.40/.95 ; 7922l/22 Цель: Курс посвящен основным проблемам в применении и трактовке норм налогового кодекса. В первую очередь будут освещены вопросы связанные с работой с недобросовестным поставщиками, дан анализ отсутствующей концепции государства, рассмотрены законодательные инициативы по борьбе с фирмами "однодневками". Безусловно, будут предложены меры по защите от подобных претензий, даны практические рекомендации по защите интересов. Кроме того, будут также рассмотрены вопросы, связанные с обходом ст. 40 НК РФ, получение НДС по процентам коммерческого кредита, влияние суммовых разниц на вычет, НП при передаче имущества от материнской компании, получения вычета по экспортным операциям. Программа: 1. Рассмотрение общего подхода государства к проблеме недобросовестных поставщиков (анализ законодательных инициатив, писем и проектов Минфина, решений и проектов ВАС). 2. Выявление проблем связанных с отсутствием надлежащего правового регулирования получения необоснованной налоговой выгоды (претензии совпадают с выявлением в действиях налогоплательщика вины- последствия злоупотребление правом). 3. Анализ предмета доказывания по спорам о получении необоснованной налоговой выгоды. Установление размера требований по подобным делам. Взыскание всех ранее заявленных вычетов и расходов как нарушение принципа соразмерности и справедливости. Анализ аналогичной практики Европейского Суда. 4. Защита лица получившего необоснованную выгоду при работе с недобросовестным контрагентом (контрагент: не платит налоги и не сдает отчетность; не отвечает на встречные проверки; не находиться по месту регистрации, либо зарегистрирован по адресу массовой регистрации; директор БОМЖ, ничего не подписывал, его подпись подделали и т.п.) 5. Разбор основных ошибок допускаемых налоговыми органами в процессе доказывания получение налоговый выгоды (встречные проверки реально не проводятся, а данные берется из компьютерной системы учета, вместо допросов проводиться опрос, вместо экспертизы получаются заключения специалиста и т.п.). Как использовать ошибки (подробно). 6. Способы защиты при работе с недобросовестными поставщиками (специальное построение цепочек закупа/ продаж, оформление договора, проявление осмотрительности и прочее). 7. Способы обхода применения ст. 40 НК РФ. 8. Совершение сделок защищенных от налоговых претензий (несколько примеров). 9. Анализ современной судебной практики принятия вычетов по экспортным операциям. 10. Влияние суммовой разницы на вычет НДС. 11. Споры, возникающие при безвозмездной передаче имущества от материнской компании, расторжении простого товарищества. 12. Рассмотрение проблем при применении налогоплательщиками основных способов снижения налогового бремени по НДС и НП. 13. Ответы на индивидуальные вопросы. Sem_tt} +7 (Ч95).Ч*4.5_З_2-/6-6 ; 445З266 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4792 bytes Desc: not available URL: From cornerou89 at hardeevilleforsale.com Sat Mar 5 10:34:14 2011 From: cornerou89 at hardeevilleforsale.com (Art Helton) Date: Sat, 5 Mar 2011 20:34:14 +0200 Subject: =?koi8-r?B?ydrV3skgyc7P09TSwc7O2cog0drZyy4g0NLP09TPIMkgzMXHy88uIDI1?= =?koi8-r?B?INHa2cvP1yDQzyDVzsnLwczYzs/KIM3F1M/EycvFLg==?= Message-ID: <155724225.66625817945384@hardeevilleforsale.com> гарантия - ЯЗЫК обучение. 25языков обучение по уникальной методике быстрое обучение иностранному языку -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 602 bytes Desc: not available URL: From JosPrez at ffgg.com Sat Mar 5 18:25:19 2011 From: JosPrez at ffgg.com (Sexuality riddles) Date: Sat, 05 Mar 2011 21:25:19 -0500 Subject: Sexual life - new breath Message-ID: <3665213mofe1550714766.17029115844706hXod65tOVP0Dek54314.361URT839901wercypjZ6T1cbrfhC-5755cm-I9192095.81r685cu3k176.81388.98252517@scent.bellsouth.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 548 bytes Desc: not available URL: From measl at mfn.org Sun Mar 6 01:40:29 2011 From: measl at mfn.org (J.A. Terranson) Date: Sun, 6 Mar 2011 03:40:29 -0600 (CST) Subject: In brig, WikiLeaks suspect Bradley Manning ordered to sleep without clothing Message-ID: http://www.washingtonpost.com/wp-dyn/content/article/2011/03/05/AR2011030503686_pf.html By Ellen Nakashima Washington Post Staff Writer Sunday, March 6, 2011; A08 Military jailers are forcing Bradley Manning, the 23-year-old soldier accused of passing classified documents to WikiLeaks.org, to strip naked in his cell at night and sleep without clothing, a requirement his attorney says was imposed after Manning made a "sarcastic quip" about his confinement. For most of the past eight months, Manning has been required to sleep wearing only boxer shorts, because of his status as a detainee under "prevention of injury watch," said 1st Lt. Brian Villiard, a spokesman for the military detention facility, or "brig," in Quantico. Beginning Wednesday night, the facility commander ordered that Manning turn over his boxers, too. "The intention is not to cause any sort of humiliation or embarrassment," Villiard said. "The intention is to ensure the safety and security of the detainee and make sure he is able to stand trial." Villiard said he could not explain how Manning might harm himself if he were allowed to keep his underwear, citing rules to protect detainees' privacy. All he could say was that "circumstances warranted" the measure, which was ordered by the brig commander, Chief Warrant Officer 2 Denise Barnes. The requirement will remain in effect until a review next week, he said. But Manning's attorney, David E. Coombs, said he thought the order was "punitive" under the "guise of being concerned" about Manning's welfare. In a blog post Saturday, Coombs gave this account of how the boxers were taken away: On Wednesday, Manning was told he would continue to be kept under the restrictions of prevention of injury watch, that there was nothing he could do to change his maximum-custody status and that the brig commander considered him at risk of self-harm. Manning then said that the restrictions were "absurd" and that if he wanted to harm himself using an item of clothing, he could do so "with the elastic waistband of his underwear or with his flip-flops." Without consulting the facility's mental health provider, the brig commander used Manning's quip as "justification" to increase the restrictions on him, Coombs said. He said Manning was not placed under suicide watch because that would have required a mental health provider's recommendation that the brig commander lacked. In response to this specific incident, the brig psychiatrist assessed Manning as "low risk," Coombs wrote. In particular, the psychiatrist said that Manning's statement about his underwear waistband was "in no way prompted by 'a psychiatric condition.' " Villiard did not immediately respond to messages left late Saturday seeking comment on Coombs's claim. The conditions of Manning's confinement have become controversial, with the United Nations special rapporteur on torture saying he submitted a formal inquiry to the State Department about Manning's treatment. The State Department confirmed Saturday that U.S. officials "have met with the special rapporteur and are preparing a formal response." Under prevention of injury watch, Manning sleeps on a mattress with a built-in pillow. He has no sheet, only a blanket designed so that it cannot be shredded. He is in maximum custody, which means he is allowed out of his cell for only one hour each day - to exercise by himself, indoors or outdoors. The maximum-custody designation is based on the seriousness of the alleged offense and the potential length of the sentence, as well as the military's duty to protect him from himself and others, Pentagon spokesman Geoff Morrell said last month. Morrell said he had visited Quantico to observe the conditions of Manning's detention. "I came away enormously impressed by the professionalism of the brig staff and reassured that the manner in which they are housing and treating him is appropriate," he said. Morrell said that he did not actually speak to Manning but "was just able to see him." He said he was accompanied by Pentagon general counsel Jeh Johnson. "There's this misperception out there that he is in somehow in solitary confinement, out on his own somewhere in a dark and dreary cell," Morrell said. "That could not be further from the truth." Coombs said that although Manning is technically not held in solitary confinement, "the cumulative effect of his confinement conditions are tantamount to solitary confinement." He said that there are no other detainees on either side of his cell and that the cell lacks a window or natural light. If Manning tries to speak to others several cells away, "the guards will likely view it as disruptive and require him to stop speaking," he wrote in his blog. On Friday afternoon, Manning was the only detainee in maximum custody; two other maximum-custody detainees had left that morning, Villiard said. The jail has 30 cells arranged in a U formation. Though the detainees may talk to one another, the cells are designed so that no detainee has a direct line of sight to another, Villiard said. On Wednesday, the government denied Manning's request to be removed from maximum custody and prevention of injury watch, said Coombs, who will appeal. Villiard said the prevention of injury watch status is reviewed every week with input from mental health providers. Coombs has asserted that the facility's forensic psychiatrist recommended that the watch be lifted. A separate psychiatrist hired by the defense concurred, he said. From alserkli at inbox.ru Sun Mar 6 02:29:17 2011 From: alserkli at inbox.ru (Alexander Klimov) Date: Sun, 6 Mar 2011 12:29:17 +0200 Subject: [cryptography] Reliably Erasing Data From Flash-Based Solid State Drives Message-ID: It is also harder to rely on SSD as evidence. Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005). However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard drives to solid-state drives inside modern computers has so far attracted very little attention from the research community. Here we show that it is imprudent and potentially reckless to rely on existing evidence collection processes and procedures, and we demonstrate that conventional assumptions about the behaviour of storage media are no longer valid. In particular, we demonstrate that modern storage devices can operate under their own volition in the absence of computer instructions. Such operations are highly destructive of traditionally recoverable data. This can contaminate evidence; can obfuscate and make validation of digital evidence reports difficult; can complicate the process of live and dead analysis recovery; and can complicate and frustrate the post recovery forensic analysis. Our experimental findings demonstrate that solid-state drives (SSDs) have the capacity to destroy evidence catastrophically under their own volition, in the absence of specific instructions to do so from a computer. -- Regards, ASK _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sun Mar 6 04:30:32 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 6 Mar 2011 13:30:32 +0100 Subject: [cryptography] Reliably Erasing Data From Flash-Based Solid State Drives Message-ID: <20110306123032.GH23560@leitl.org> ----- Forwarded message from Alexander Klimov ----- From jwhyche at scott.net Sun Mar 6 03:47:29 2011 From: jwhyche at scott.net (=?koi8-r?B?5snOwc7Tz9fZyiDS2d7Bxw==?=) Date: Sun, 6 Mar 2011 14:47:29 +0300 Subject: =?koi8-r?B?78LV3sXOycU6ICLywdrSwcLP1MvBIMbJzsHO08/Xz8ogxM/L1c3FztTB?= =?koi8-r?B?w8nJuw==?= Message-ID: <0A8CE8E164664163A38CC42A667B00FE@microsof834308> Тема: Методы разработки и анализа бизнес плана, тэо, инвестиционных проектов. (код Москвы) ЧЧ5/З2_66 \\// ЧЧ54053 Суть обучения!!! очень проста: Вас приглашают в компьютерный класс, где 2 дня с вами занимаются, супер профессионалы (тяжеловесы в финансовом планировании), все два дня Вы являетесь настоящими участниками практического семинара, получаете знания и для закрепления тем выполняете задания, выполняете их на компьютере оснащенным специализированным программным комплексом. Все пробуете Сами, и только Сами. По Окончании курса Вас оснащают лицензионной, полнорабочей специализированной версией программы, для разработки бизнес планов и инвестиционных проектов, Вы прибываете на предприятие, устанавливает продукт на свой компьютер и начинаете сразу работать (без всякой головной боли) - Вот так! Просто! мы делает профессионалов! Краткая информация о семинаре: Дата проведения: l4 - l5 марта Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. Сочетание методов обучения с практикой - позволит достичь максимальных результатов в освоении материала. Все наглядно и просто. На первом этапе излагается теория, на втором рассматриваются закономерности, почему теория не совместима с практикой, на третьем этапе формируется задача и рассматриваются фин. методы ее решения, на четвертом участник самостоятельно решает задачу используя компьютер оснащенный специализированным ПО. Рассмотрение финансовых методов для каждого рода деятельности в отдельности, усиление восприятия информации с помощью специализированного расширенного методического материала. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: * Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. * Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). * Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. * Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него участник семинара может эффективно разрабатывать свои сценарии финансовых проектов. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 Московский код: 7_42.9|*98 <<>> 7Ч2_9I98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4465 bytes Desc: not available URL: From overdoesko94 at grizzlycapital.com Sun Mar 6 14:17:47 2011 From: overdoesko94 at grizzlycapital.com (Otto Lanier) Date: Sun, 6 Mar 2011 16:17:47 -0600 Subject: =?koi8-r?B?x8HSwc7UydLVxc0g0drZy9Ugz8LV3snNIC0g19kgwtXExdTFIMfP18/S?= =?koi8-r?B?ydTYIM7BIMzAws/NINHa2cvFIQ==?= Message-ID: <052292873.56009703095990@grizzlycapital.com> обучение английскому языку. с гарантией. 25 кадр - устарело! новая супер методика обучения иностранным языкам. обучим разговорному языку с гарантией. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 647 bytes Desc: not available URL: From jya at pipeline.com Sun Mar 6 14:11:51 2011 From: jya at pipeline.com (John Young) Date: Sun, 06 Mar 2011 17:11:51 -0500 Subject: In brig,WikiLeaks suspect Bradley Manning ordered to sleep without clothing In-Reply-To: Message-ID: Manning's capability to taunt his jailers indicates his mental health is not a problem, thus undercutting accusations of deterioration due to, uh, torture. Standing nude, being gazed by beefy guards, is not all that bad. Manning has accomplished his life's wet dream, and for that he is to be pedestaled iconically. There remains the always auto-mesmerzing issue of masturbation, according to Jean Genet the favorite prison and military and collegiate activity (inside and outside family colonies), and its near endlessly variable attraction and repulsion of the jailers, as watchers, as cheerleaders, as participants, as connoisseurs of welcomely forbidden pleasures of sadism and masochism. That the brig is headed by a female Marine ratchets up the auto-stimulation to Nurse Ratchet's castrating diabolism, the Society for Cutting Up Men coming out of the bitch-hatchetry. Soon, the society of BGLT hackers and leakers, so to speak, will come out. Genet, and gobs of others, averred there is nothing to compare with the military for pansexuality perversity except the Church. Children preferred. Childlike adults delectable substitutes. Bradass87, bare assed and loving it, you couldn't make this up for a Cuckoo Nest flic. So how many of the Manning guards are female, gay, tranny -- pansexual hornism a given? Prepare to kill and die priapically, fuck mud Gyrenes! From metaphysical62 at imascp.com Sun Mar 6 13:32:41 2011 From: metaphysical62 at imascp.com (Vaughn Taylor) Date: Sun, 6 Mar 2011 18:32:41 -0300 Subject: =?koi8-r?B?ydrV3skgyc7P09TSwc7O2cog0drZyy4g0NLP09TPIMkgzMXHy88uIDI1?= =?koi8-r?B?INHa2cvP1yDQzyDVzsnLwczYzs/KIM3F1M/EycvFLg==?= Message-ID: <76152BF4A74645A193B072ED0CA01B21@smallite> говорите на иностранном, мы научим. 25языков обучение по уникальной методике любой язык за короткое время. гарантия. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 734 bytes Desc: not available URL: From wearsz2 at groupenoces.com Sun Mar 6 15:59:19 2011 From: wearsz2 at groupenoces.com (Monty Neal) Date: Sun, 6 Mar 2011 18:59:19 -0500 Subject: =?koi8-r?B?18HNIM7V1sXOIMnOz9PU0sHOztnKICDR2tnLPyDN2SDOwdXeyc0uIOfh?= =?koi8-r?B?8uHu9Onx?= Message-ID: <804712366.40857812685855@groupenoces.com> любой язык за короткое время. гарантия. обучим разговорному языку с гарантией. обучение без проблем иностранным языкам с гарантией -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 608 bytes Desc: not available URL: From tankp4 at hicksroad.com Sun Mar 6 19:16:30 2011 From: tankp4 at hicksroad.com (Stefan Lott) Date: Sun, 6 Mar 2011 19:16:30 -0800 Subject: =?koi8-r?B?z8LV3sXOycUgwc7HzMnK08vPzdUg0drZy9UuINMgx8HSwc7UycXKLg==?= Message-ID: <000d01cbdc76$0dfe4390$6400a8c0@tankp4> любой язык за короткое время. гарантия. вам нужен иностранный язык? мы научим. ГАРАНТИЯ вам нужен иностранный язык? мы научим. ГАРАНТИЯ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 754 bytes Desc: not available URL: From cameronzq at marsh.com Sun Mar 6 13:01:19 2011 From: cameronzq at marsh.com (Karole Cameron) Date: Sun, 06 Mar 2011 20:01:19 -0100 Subject: $139 Replica Rolex Watches, Best Swiss Fake Rolex Replica Message-ID: <92l12q77f35-42611607-622e7l88@tzkjatpoax> $139 Replica Rolex Watches, Best Swiss Fake Rolex Replica Replica rolex watches for sale,fake rolex watches will help you to find the best rolex replica watches at lowest prices. http://hotreplicali.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 611 bytes Desc: not available URL: From albrecht.mulder at car-part.ru Sun Mar 6 16:45:46 2011 From: albrecht.mulder at car-part.ru (=?koi8-r?B?8M8g2sHS0MzB1MU=?=) Date: Sun, 6 Mar 2011 21:45:46 -0300 Subject: =?koi8-r?B?z9DUyc3J2sHDyckg0sHTyM/Ez9cgzsEg19nQzMHU1SDCxczPyiDawdLQ?= =?koi8-r?B?zMHU2Q==?= Message-ID: <000d01cbdc60$ff4b30c0$6400a8c0@albrecht.mulder> двадцать первое марта Уменьшаем страховые взносы: оптимизация расходов на выплату белой зарплаты. +7 (Ч95) ЧЧ.5/40_.95 : ЧЧ_54_О95 Цель: Ставка обязательных страховых взносов с зарплаты с 2011 года составляет 34% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала ЕСН заменена отменой уплаты взносов с суммы дохода свыше 463 тыс. рублей, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь √ назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1. Обзор изменений законодательства, связанных с повышением ставки страховых взносов Сколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2011 гг. Какие схемы стали невыгодными; у каких налогоплательщиков положение даже улучшилось. 2. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. 3. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность в 2011 г.; * дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с кассовой дисциплиной и политикой ЦБ. Текущая ситуация с обложением таких доходов НДФЛ. 4. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Страхование жизни работников и ДМС за счет предприятия. 6. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. 7. Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 8. Использование процентных займов от физлиц. Расчет эффективности. 9. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 10. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, 11. Создание недоимки по налогам с ФОТ на фирме, не обремененной активами √ пример "серой" схемы (как нельзя "оптимизировать"!), 12. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 13. Ответы на вопросы. По желанию √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 Моск. код: 445.З2-66 <<>> 4Ч5З9-68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6795 bytes Desc: not available URL: From extortionz27 at hsrotary.com Sun Mar 6 17:35:07 2011 From: extortionz27 at hsrotary.com (Ramona Moss) Date: Sun, 6 Mar 2011 22:35:07 -0300 Subject: =?koi8-r?B?z8LV3snNINLB2sfP18/Szs/N1SDR2tnL1SDTIMfB0sHO1MnFyi4=?= Message-ID: обучение языку с гарантией. авторская методика. Американский английский - обучение. 25 кадр - устарело! новая супер методика обучения иностранным языкам. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 778 bytes Desc: not available URL: From endowsoe1 at e1021.c.akamaiedge.net Sun Mar 6 15:10:38 2011 From: endowsoe1 at e1021.c.akamaiedge.net (Buddy Morgan) Date: Mon, 7 Mar 2011 00:10:38 +0100 Subject: =?koi8-r?B?z8LV3sXOycUgwc7HzMnK08vPzdUg0drZy9UuINMgx8HSwc7UycXKLg==?= Message-ID: <000d01cbdc53$b5012ae0$6400a8c0@endowsoe1> изучи иностранный - 25 языков по уникальной методике гарантируем языку обучим - вы будете говорить на любом языке! обучение иностранному языку. ГАРАНТИЯ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 847 bytes Desc: not available URL: From decelerated9497 at halle-nightguide.com Sun Mar 6 16:19:23 2011 From: decelerated9497 at halle-nightguide.com (Lincoln Taylor) Date: Mon, 7 Mar 2011 02:19:23 +0200 Subject: =?koi8-r?B?MjUgy8HE0iAtINXT1MHSxczPISDOz9fB0SDT1dDF0iDNxdTPxMnLwSDP?= =?koi8-r?B?wtXexc7J0SDJzs/T1NLBzs7ZzSDR2tnLwc0u?= Message-ID: <000d01cbdc5d$4fb23760$6400a8c0@decelerated9497> обучение английскому языку с гарантией. вам нужен иностранный язык? мы научим. ГАРАНТИЯ и вы тоже сможете говорить на любом языке -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 749 bytes Desc: not available URL: From laudmb6 at inciig.com Sun Mar 6 13:57:15 2011 From: laudmb6 at inciig.com (Cesar Whitney) Date: Mon, 7 Mar 2011 04:57:15 +0700 Subject: =?koi8-r?B?z8LV3sXOycUg0drZy9Ug0yDHwdLBztTJxcouIMHX1M/S08vB0SDNxdTP?= =?koi8-r?B?xMnLwS4=?= Message-ID: <2F40F49B9EBA4ED9968369E01E54913F@pc01> изучи иностранный - 25 языков по уникальной методике гарантия - ЯЗЫК обучение. изучи иностранный язык. просто и легко. 25 языков по уникальной методике. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 751 bytes Desc: not available URL: From stragglersz64 at jkogroup.com Sun Mar 6 18:11:29 2011 From: stragglersz64 at jkogroup.com (Karin Corcoran) Date: Mon, 7 Mar 2011 05:11:29 +0300 Subject: =?koi8-r?B?zMDCz8og0drZyyDawSDLz9LP1MvPxSDX0sXN0S4gx8HSwc7UydEu?= Message-ID: <611827229.94370596594346@jkogroup.com> обучение иностранному языку. ГАРАНТИЯ вам нужен иностранный язык? мы научим. ГАРАНТИЯ вам нужен иностранный язык? мы научим. ГАРАНТИЯ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 631 bytes Desc: not available URL: From waivesr47 at indonesiacity.com Sun Mar 6 16:56:48 2011 From: waivesr47 at indonesiacity.com (Jay Finn) Date: Mon, 7 Mar 2011 07:56:48 +0700 Subject: =?koi8-r?B?zMDCz8og0drZyyDawSDLz9LP1MvPxSDX0sXN0SEg0yDHwdLBztTJxco=?= Message-ID: <000d01cbdc62$89f82d80$6400a8c0@waivesr47> 25 языков изучаем. гарантия. обучение языку с гарантией обучение английскому языку. с гарантией. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 790 bytes Desc: not available URL: From jitteriern045 at imsgechef.com Sun Mar 6 18:26:50 2011 From: jitteriern045 at imsgechef.com (Allan Strickland) Date: Mon, 7 Mar 2011 07:56:50 +0530 Subject: =?koi8-r?B?z8LV3sXOycUgwsXaINDSz8LMxc0gyc7P09TSwc7O2c0g0drZy8HNINMg?= =?koi8-r?B?x8HSwc7UycXK?= Message-ID: <000d01cbdc6f$1d886630$6400a8c0@jitteriern045> и вы тоже сможете говорить на любом языке 25 языков изучаем. гарантия. обучение языку -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 702 bytes Desc: not available URL: From bribingf6 at kawachinaganosou.com Sun Mar 6 17:14:28 2011 From: bribingf6 at kawachinaganosou.com (Glen Lindsey) Date: Mon, 7 Mar 2011 08:14:28 +0700 Subject: =?koi8-r?B?x8HSwc7UydEgLSDx+vnrIM/C1d7FzsnFLg==?= Message-ID: <000d01cbdc65$019a2d00$6400a8c0@bribingf6> 25 языков изучаем. гарантия. изучи иностранный язык. просто и легко. 25 языков по уникальной методике. Американский английский - обучение. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 833 bytes Desc: not available URL: From thrumsux85 at jokersmachine.com Sun Mar 6 15:35:14 2011 From: thrumsux85 at jokersmachine.com (Bonita Belcher) Date: Mon, 7 Mar 2011 08:35:14 +0900 Subject: =?koi8-r?B?4c3F0snLwc7Ty8nKIMHOx8zJytPLycogIC0gz8LV3sXOycUu?= Message-ID: <000d01cbdc57$247b0aa0$6400a8c0@thrumsux85> гарантия - ЯЗЫК обучение. обучение языку с гарантией обучение языку с гарантией -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 695 bytes Desc: not available URL: From radonzj6 at hemorrhoidstreatments.com Sun Mar 6 16:39:04 2011 From: radonzj6 at hemorrhoidstreatments.com (Larry Ortega) Date: Mon, 7 Mar 2011 08:39:04 +0800 Subject: =?koi8-r?B?z8LV3sXOycUgyc7P09TSwc7Oz83VINHa2cvVLiDn4fLh7vTp8Q==?= Message-ID: <000d01cbdc60$0fb851a0$6400a8c0@radonzj6> гарантированное обучение языку обучение английскому языку с гарантией. обучение без проблем иностранным языкам с гарантией -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 740 bytes Desc: not available URL: From stiflingfu8 at incallajta.com Sun Mar 6 17:55:45 2011 From: stiflingfu8 at incallajta.com (Robin Ramos) Date: Mon, 7 Mar 2011 08:55:45 +0700 Subject: =?koi8-r?B?x8HSwc7UydLP18HOzs/FIM/C1d7FzsnFINHa2cvV?= Message-ID: <000d01cbdc6a$c604ab70$6400a8c0@stiflingfu8> любой язык за короткое время! с гарантией обучим разговорному языку с гарантией. гарантируем языку обучим - вы будете говорить на любом языке! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 836 bytes Desc: not available URL: From covenantsit27 at inhuminity.com Sun Mar 6 19:34:10 2011 From: covenantsit27 at inhuminity.com (Marquis Newman) Date: Mon, 7 Mar 2011 10:34:10 +0700 Subject: =?koi8-r?B?ydrV3skgyc7P09TSwc7O2cogLSAyNSDR2tnLz9cg0M8g1c7Jy8HM2M7P?= =?koi8-r?B?yiDNxdTPxMnLxQ==?= Message-ID: <000d01cbdc78$8596a620$6400a8c0@covenantsit27> вам нужен иностранный язык? мы научим. ГАРАНТИЯ изучи иностранный язык. просто и легко. 25 языков по уникальной методике. 25 кадр - устарело! новая супер методика обучения иностранным языкам. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 809 bytes Desc: not available URL: From delineates36 at gutlevel.com Sun Mar 6 18:42:42 2011 From: delineates36 at gutlevel.com (Roy Mayfield) Date: Mon, 7 Mar 2011 10:42:42 +0800 Subject: =?koi8-r?B?z8LV3sXOycUg0drZy9Ug0yDHwdLBztTJxco=?= Message-ID: <106737493.35638858560889@gutlevel.com> Американский английский - обучение. супер метод обучения иностранному языку. говорите на иностранном, мы научим. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 609 bytes Desc: not available URL: From payers0 at greaterbarriearearealestate.com Sun Mar 6 19:51:13 2011 From: payers0 at greaterbarriearearealestate.com (Jerry Finley) Date: Mon, 7 Mar 2011 10:51:13 +0700 Subject: =?koi8-r?B?ydrV3skgyc7P09TSwc7O2cogLSAyNSDR2tnLz9cg0M8g1c7Jy8HM2M7P?= =?koi8-r?B?yiDNxdTPxMnLxQ==?= Message-ID: <29D58C6A5E6C422697EAF1F0563ED868@guru01> говорите на иностранном, мы научим. иностранный без проблем - нужно только ЭВМ обучение языку с гарантией. авторская методика. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 750 bytes Desc: not available URL: From SaraGmez at fast.net Mon Mar 7 17:33:11 2011 From: SaraGmez at fast.net (Patek, Porsche Design, Louis Vuitton - democratic price) Date: Mon, 07 Mar 2011 18:33:11 -0700 Subject: Beautiful watch and gifts Message-ID: <085540.943EVCIJBAM1447PBCC1593441@doughnut.1bluepill.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 636 bytes Desc: not available URL: From precariouslyf at jetworksleasing.com Mon Mar 7 19:35:50 2011 From: precariouslyf at jetworksleasing.com (Kathryn Simons) Date: Mon, 7 Mar 2011 19:35:50 -0800 Subject: =?koi8-r?B?z8LV3sXOycUgwc7HzMnK08vPzdUg0drZy9UuINMgx8HSwc7UycXKLg==?= Message-ID: <000d01cbdd41$eb79c570$6400a8c0@precariouslyf> 25 языков изучаем. гарантия. быстрое обучение иностранному языку Японский и Английский - с гарантией. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 716 bytes Desc: not available URL: From wombatsuz80 at keystonerestore.com Mon Mar 7 16:41:10 2011 From: wombatsuz80 at keystonerestore.com (Dawn Hackett) Date: Mon, 7 Mar 2011 21:41:10 -0300 Subject: =?koi8-r?B?z8LV3sXOycUg0drZy9Ug0yDHwdLBztTJxcouIMHX1M/S08vB0SDNxdTP?= =?koi8-r?B?xMnLwS4=?= Message-ID: <000d01cbdd29$84c03de0$6400a8c0@wombatsuz80> Американский английский - обучение. гарантируем языку обучим - вы будете говорить на любом языке! любой язык за короткое время! с гарантией -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 838 bytes Desc: not available URL: From info at freedomboxfoundation.org Mon Mar 7 18:48:29 2011 From: info at freedomboxfoundation.org (info at freedomboxfoundation.org) Date: Tue, 08 Mar 2011 02:48:29 +0000 Subject: [Freedombox-discuss] FreedomBox featured on CBS News Message-ID: Greetings, CBS news has posted video of its report on this Sunday's CBS Evening News Weekend on the FreedomBox[1], a software movement I have been organizing to return control of digital communications to individuals and take it away from the corporations that spy on people as a way of life and the governments that use control over communications to stifle political organization and dissent. Given the ongoing events in the Middle East, and in particular the shutdown of Internet in Libya last week, I wanted to bring this story to your attention. The Foundation we built to support this movement has raised over $80,000 online through Kickstarter in the last 19 days[2], with 11 still to go in the first fund raising drive. More information on the project is available from the foundation's website: http://freedomboxfoundation.org Best wishes, Eben Moglen [1] http://www.cbsnews.com/video/watch/?id=7358702n [2] http://www.kickstarter.com/projects/721744279/push-the-freedombox-foundation-from-0-to-60-in-30/ _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From tadpolerp at icyj.com Mon Mar 7 17:11:38 2011 From: tadpolerp at icyj.com (Adrian Massey) Date: Tue, 8 Mar 2011 04:11:38 +0300 Subject: =?koi8-r?B?x8HSwc7UydEgLSDx+vnrIM/C1d7FzsnFLg==?= Message-ID: <000d01cbdd2d$c692d710$6400a8c0@tadpolerp> гарантируем языку обучим - вы будете говорить на любом языке! супер метод обучения иностранному языку. иностранный без проблем - нужно только ЭВМ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 818 bytes Desc: not available URL: From citationxfn57 at iflygo2.com Mon Mar 7 18:11:20 2011 From: citationxfn57 at iflygo2.com (Jonathan Conley) Date: Tue, 8 Mar 2011 07:41:20 +0530 Subject: =?koi8-r?B?z8LV3snNINLB2sfP18/Szs/N1SDR2tnL1SDTIMfB0sHO1MnFyi4=?= Message-ID: <000d01cbdd36$1db03210$6400a8c0@citationxfn57> обучение английскому языку. с гарантией. Японский и Английский - с гарантией. Японский и Английский - с гарантией. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 815 bytes Desc: not available URL: From elongatedkl01 at musicposters4u.com Mon Mar 7 16:50:09 2011 From: elongatedkl01 at musicposters4u.com (Dennis Stahl) Date: Tue, 8 Mar 2011 07:50:09 +0700 Subject: Travel Message-ID: <178309807.31000110392743@musicposters4u.com> АВИАБИЛЕТЫ ПО АКЦИЯМ Бронируйте по телефону (495) 789-66-85 Внимание! Тарифы даны без учета аэропортовых и сервисных сборов! Пункты назначения Тариф туда и обратно Аэропортовые и сервисные сборы Авиакомпания Срок действия Cтамбул (а/п Сабиха Гёкчен) от 89 EUR ~3342 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Абу Даби от 209 EUR ~7200 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Амстердам от 249 EUR ~1879 руб. Белавиа Путешествие: не более 2 мес. Анкара от 89 EUR ~3437 руб. Turkish Airlines Путешествие: не более 12 мес. Афины от 99 EUR ~6212 руб. Аэросвит Путешествие: не более 1 мес. Барселона от 148 EUR ~7160 руб. Brussels Airlines Бронирование за 21 день Берлин от 115 EUR ~4440 руб. Lufthansa Бронирование за 14 дней Брюссель от 190 EUR ~5160 руб. Brussels Airlines Варшава от 120 EUR ~5142 руб. Аэросвит Путешествие: не более 1 мес. Варшава от 196 EUR ~1782 руб. Белавиа Путешествие: не более 2 мес. Венеция от 149 EUR ~8360 руб. Lufthansa Бронирование за 21 день Ганновер от 199 EUR ~8640 руб. Lufthansa Гонг Конг, Пекин, Чанша, Чунцин, Фучжоу, Гуанджоу, Ханджоу, Куньмин, Нанкин, Нинбо, Циндао, Санья, Шанхай, Тяньцзинь, Ухань, Сямынь от 407 EUR ~5426 -6237 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Гонг-Конг от 350 EUR ~6019 руб. Hong Kong Airlines Продажа до: 31.10.2011 Путешествие : первый вылет до 31.10.2011 (ср.,пт.,вск.) Денпасар (Бали), Джакарта, Сурабая, Пномпень, Фукуока, Нагоя, Осака, Сапорро, Токио, Бусан, Сеул, Куала-Лумпур, Пинанг, Кота-Кинабалу, Катманду, Себу, Манила, Сингапур, Гаосюн, Тайбэй, Бангкок, Пхукет, Ханой, Хошимин, Нади, Окленд от 555 EUR ~6000 руб.-6500 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Дубаи от 199 EUR ~7200 руб. Turkish Airlines Продажа: 15.05.2010-31.03.2011 Путешествие: не более 12 мес. Дубай от 200 EUR ~5165 руб. Аэросвит Путешествие: не менее 3 дней и не более 1 мес. Дублин от 199 EUR ~8800 руб. Lufthansa Бронирование за 21 день Дюссельдорф от 166 EUR ~4560 руб. Lufthansa Бронирование за 14 дней Касабланка от 249 EUR ~6259 руб. Turkish Airlines Продажа:31.03.2011 Путешествие: не более 12 мес. Ларнака от 230 EUR ~6716 руб. Аэросвит Путешествие: не более 1 мес. Ларнака от 299 EUR ~2530 руб. Белавиа Путешествие: не более 2 мес. Милан от 178 EUR ~7560 руб. Brussels Airlines Бронирование за 21 день Милан от 299 EUR ~1446 руб. Белавиа Путешествие: не более 2 мес. Мюнхен от 119 EUR ~4640 руб. Lufthansa Неаполь от 229 EUR ~5401 руб. Аэросвит Путешествие: не более 1 мес. Ницца от 219 EUR ~9000 руб. Lufthansa Бронирование за 21 день Нью-Йорк от 130 EUR ~10548 руб. Аэросвит Продажа: (не позднее 3дн до вылета) Путешествие: не более 3 мес. Париж от 169 EUR ~9080 руб. Lufthansa Бронирование за 21 день Париж от 270 EUR ~3400 руб. Белавиа Путешествие: не более 2 мес. Пекин от 100 EUR ~10441 руб. Аэросвит Путешествие: не более 1 мес. Подгорица от 199 EUR ~6573 руб. Turkish Airlines Продажа:до 31.03.2011 Путешествие: не более 12 мес. Прага от 130 EUR ~4472 руб. Аэросвит Путешествие: не более 1 мес. Прага от 249 EUR ~840 руб. Белавиа Путешествие: не более 2 мес. Рим от 198 EUR ~7600 руб. Brussels Airlines Бронирование за 21 день Рим от 299 EUR ~1448 руб. Белавиа Путешествие: не более 2 мес. София от 179 EUR ~4106 руб. Аэросвит Путешествие: не более 1 мес. Стокгольм от 179 EUR ~1871 руб. Белавиа Путешествие: не более 2 мес. Тбилиси от 249 EUR ~818 руб. Белавиа Путешествие: не более 3 мес. Тегеран от 269 EUR ~1399 руб. Белавиа Путешествие: не более 2 мес. Франкфурт-на-Майне от 119 EUR ~4880 руб. Lufthansa Эрджан от 236 EUR ~2235 руб. Turkish Airlines Путешествие : не более 12 мес. Все цены в рублях могут изменяться в зависимости от курса обмена валют на день выписки. забронируйте по телефону (495) 789-66-85 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 25077 bytes Desc: not available URL: From householdersdru at mousi9a.com Mon Mar 7 19:24:19 2011 From: householdersdru at mousi9a.com (Ricky Cassidy) Date: Tue, 8 Mar 2011 08:24:19 +0500 Subject: =?koi8-r?B?4dfJwcLJzMXU2SDQzyDT0MXDycHM2M7ZzSDUwdLJxsHNICEhIQ==?= Message-ID: <000d01cbdd40$4fd27870$6400a8c0@householdersdru> АВИАБИЛЕТЫ ПО АКЦИЯМ Бронируйте по телефону (495) 789-66-85 Внимание! Тарифы даны без учета аэропортовых и сервисных сборов! Пункты назначения Тариф туда и обратно Аэропортовые и сервисные сборы Авиакомпания Срок действия Cтамбул (а/п Сабиха Гёкчен) от 89 EUR ~3342 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Абу Даби от 209 EUR ~7200 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Амстердам от 249 EUR ~1879 руб. Белавиа Путешествие: не более 2 мес. Анкара от 89 EUR ~3437 руб. Turkish Airlines Путешествие: не более 12 мес. Афины от 99 EUR ~6212 руб. Аэросвит Путешествие: не более 1 мес. Барселона от 148 EUR ~7160 руб. Brussels Airlines Бронирование за 21 день Берлин от 115 EUR ~4440 руб. Lufthansa Бронирование за 14 дней Брюссель от 190 EUR ~5160 руб. Brussels Airlines Варшава от 120 EUR ~5142 руб. Аэросвит Путешествие: не более 1 мес. Варшава от 196 EUR ~1782 руб. Белавиа Путешествие: не более 2 мес. Венеция от 149 EUR ~8360 руб. Lufthansa Бронирование за 21 день Ганновер от 199 EUR ~8640 руб. Lufthansa Гонг Конг, Пекин, Чанша, Чунцин, Фучжоу, Гуанджоу, Ханджоу, Куньмин, Нанкин, Нинбо, Циндао, Санья, Шанхай, Тяньцзинь, Ухань, Сямынь от 407 EUR ~5426 -6237 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Гонг-Конг от 350 EUR ~6019 руб. Hong Kong Airlines Продажа до: 31.10.2011 Путешествие : первый вылет до 31.10.2011 (ср.,пт,вск.) Денпасар (Бали), Джакарта, Сурабая, Пномпень, Фукуока, Нагоя, Осака, Сапорро, Токио, Бусан, Сеул, Куала-Лумпур, Пинанг, Кота-Кинабалу, Катманду, Себу, Манила, Сингапур, Гаосюн, Тайбэй, Бангкок, Пхукет, Ханой, Хошимин, Нади, Окленд от 555 EUR ~6000 руб.-6500 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Дубаи от 199 EUR ~7200 руб. Turkish Airlines Продажа: 15.05.2010-31.03.2011 Путешествие: не более 12 мес. Дубай от 200 EUR ~5165 руб. Аэросвит Путешествие: не менее 3 дней и не более 1 мес. Дублин от 199 EUR ~8800 руб. Lufthansa Бронирование за 21 день Дюссельдорф от 166 EUR ~4560 руб. Lufthansa Бронирование за 14 дней Касабланка от 249 EUR ~6259 руб. Turkish Airlines Продажа:31.03.2011 Путешествие: не более 12 мес. Ларнака от 230 EUR ~6716 руб. Аэросвит Путешествие: не более 1 мес. Ларнака от 299 EUR ~2530 руб. Белавиа Путешествие: не более 2 мес. Милан от 178 EUR ~7560 руб. Brussels Airlines Бронирование за 21 день Милан от 299 EUR ~1446 руб. Белавиа Путешествие: не более 2 мес. Мюнхен от 119 EUR ~4640 руб. Lufthansa Неаполь от 229 EUR ~5401 руб. Аэросвит Путешествие: не более 1 мес. Ницца от 219 EUR ~9000 руб. Lufthansa Бронирование за 21 день Нью-Йорк от 130 EUR ~10548 руб. Аэросвит Продажа: (не позднее 3дн до вылета) Путешествие: не более 3 мес. Париж от 169 EUR ~9080 руб. Lufthansa Бронирование за 21 день Париж от 270 EUR ~3400 руб. Белавиа Путешествие: не более 2 мес. Пекин от 100 EUR ~10441 руб. Аэросвит Путешествие: не более 1 мес. Подгорица от 199 EUR ~6573 руб. Turkish Airlines Продажа:до 31.03.2011 Путешествие: не более 12 мес. Прага от 130 EUR ~4472 руб. Аэросвит Путешествие: не более 1 мес. Прага от 249 EUR ~840 руб. Белавиа Путешествие: не более 2 мес. Рим от 198 EUR ~7600 руб. Brussels Airlines Бронирование за 21 день Рим от 299 EUR ~1448 руб. Белавиа Путешествие: не более 2 мес. София от 179 EUR ~4106 руб. Аэросвит Путешествие: не более 1 мес. Стокгольм от 179 EUR ~1871 руб. Белавиа Путешествие: не более 2 мес. Тбилиси от 249 EUR ~818 руб. Белавиа Путешествие: не более 3 мес. Тегеран от 269 EUR ~1399 руб. Белавиа Путешествие: не более 2 мес. Франкфурт-на-Майне от 119 EUR ~4880 руб. Lufthansa Эрджан от 236 EUR ~2235 руб. Turkish Airlines Путешествие : не более 12 мес. Все цены в рублях могут изменяться в зависимости от курса обмена валют на день выписки. забронируйте по телефону (495) 789-66-85 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 25197 bytes Desc: not available URL: From mischievousnessqu85 at matconn.com Mon Mar 7 17:27:04 2011 From: mischievousnessqu85 at matconn.com (Clifton Cummings) Date: Tue, 8 Mar 2011 08:27:04 +0700 Subject: SafePrice Message-ID: <000d01cbdd2f$eea4a4c0$6400a8c0@mischievousnessqu85> АВИАБИЛЕТЫ ПО АКЦИЯМ Бронируйте по телефону (495) 789-66-85 Внимание! Тарифы даны без учета аэропортовых и сервисных сборов! Пункты назначения Тариф туда и обратно Аэропортовые и сервисные сборы Авиакомпания Срок действия Cтамбул (а/п Сабиха Гёкчен) от 89 EUR ~3342 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Абу Даби от 209 EUR ~7200 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Амстердам от 249 EUR ~1879 руб. Белавиа Путешествие: не более 2 мес. Анкара от 89 EUR ~3437 руб. Turkish Airlines Путешествие: не более 12 мес. Афины от 99 EUR ~6212 руб. Аэросвит Путешествие: не более 1 мес. Барселона от 148 EUR ~7160 руб. Brussels Airlines Бронирование за 21 день Берлин от 115 EUR ~4440 руб. Lufthansa Бронирование за 14 дней Брюссель от 190 EUR ~5160 руб. Brussels Airlines Варшава от 120 EUR ~5142 руб. Аэросвит Путешествие: не более 1 мес. Варшава от 196 EUR ~1782 руб. Белавиа Путешествие: не более 2 мес. Венеция от 149 EUR ~8360 руб. Lufthansa Бронирование за 21 день Ганновер от 199 EUR ~8640 руб. Lufthansa Гонг Конг, Пекин, Чанша, Чунцин, Фучжоу, Гуанджоу, Ханджоу, Куньмин, Нанкин, Нинбо, Циндао, Санья, Шанхай, Тяньцзинь, Ухань, Сямынь от 407 EUR ~5426 -6237 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Гонг-Конг от 350 EUR ~6019 руб. Hong Kong Airlines Продажа до: 31.10.2011 Путешествие : первый вылет до 31.10.2011 (ср.,пт,вск.) Денпасар (Бали), Джакарта, Сурабая, Пномпень, Фукуока, Нагоя, Осака, Сапорро, Токио, Бусан, Сеул, Куала-Лумпур, Пинанг, Кота-Кинабалу, Катманду, Себу, Манила, Сингапур, Гаосюн, Тайбэй, Бангкок, Пхукет, Ханой, Хошимин, Нади, Окленд от 555 EUR ~6000 руб.-6500 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Дубаи от 199 EUR ~7200 руб. Turkish Airlines Продажа: 15.05.2010-31.03.2011 Путешествие: не более 12 мес. Дубай от 200 EUR ~5165 руб. Аэросвит Путешествие: не менее 3 дней и не более 1 мес. Дублин от 199 EUR ~8800 руб. Lufthansa Бронирование за 21 день Дюссельдорф от 166 EUR ~4560 руб. Lufthansa Бронирование за 14 дней Касабланка от 249 EUR ~6259 руб. Turkish Airlines Продажа:31.03.2011 Путешествие: не более 12 мес. Ларнака от 230 EUR ~6716 руб. Аэросвит Путешествие: не более 1 мес. Ларнака от 299 EUR ~2530 руб. Белавиа Путешествие: не более 2 мес. Милан от 178 EUR ~7560 руб. Brussels Airlines Бронирование за 21 день Милан от 299 EUR ~1446 руб. Белавиа Путешествие: не более 2 мес. Мюнхен от 119 EUR ~4640 руб. Lufthansa Неаполь от 229 EUR ~5401 руб. Аэросвит Путешествие: не более 1 мес. Ницца от 219 EUR ~9000 руб. Lufthansa Бронирование за 21 день Нью-Йорк от 130 EUR ~10548 руб. Аэросвит Продажа: (не позднее 3дн до вылета) Путешествие: не более 3 мес. Париж от 169 EUR ~9080 руб. Lufthansa Бронирование за 21 день Париж от 270 EUR ~3400 руб. Белавиа Путешествие: не более 2 мес. Пекин от 100 EUR ~10441 руб. Аэросвит Путешествие: не более 1 мес. Подгорица от 199 EUR ~6573 руб. Turkish Airlines Продажа:до 31.03.2011 Путешествие: не более 12 мес. Прага от 130 EUR ~4472 руб. Аэросвит Путешествие: не более 1 мес. Прага от 249 EUR ~840 руб. Белавиа Путешествие: не более 2 мес. Рим от 198 EUR ~7600 руб. Brussels Airlines Бронирование за 21 день Рим от 299 EUR ~1448 руб. Белавиа Путешествие: не более 2 мес. София от 179 EUR ~4106 руб. Аэросвит Путешествие: не более 1 мес. Стокгольм от 179 EUR ~1871 руб. Белавиа Путешествие: не более 2 мес. Тбилиси от 249 EUR ~818 руб. Белавиа Путешествие: не более 3 мес. Тегеран от 269 EUR ~1399 руб. Белавиа Путешествие: не более 2 мес. Франкфурт-на-Майне от 119 EUR ~4880 руб. Lufthansa Эрджан от 236 EUR ~2235 руб. Turkish Airlines Путешествие : не более 12 мес. Все цены в рублях могут изменяться в зависимости от курса обмена валют на день выписки. забронируйте по телефону (495) 789-66-85 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 25197 bytes Desc: not available URL: From remarryinggp406 at huashanly.com Mon Mar 7 17:42:36 2011 From: remarryinggp406 at huashanly.com (Daryl Stahl) Date: Tue, 8 Mar 2011 08:42:36 +0700 Subject: =?koi8-r?B?ySDX2SDUz9bFINPNz9bF1MUgx8/Xz9LJ1NggzsEgzMDCz80g0drZy8U=?= Message-ID: <000d01cbdd32$19c4c3e0$6400a8c0@remarryinggp406> супер метод обучения иностранному языку. ГАРАНТИРУЕМ: мы научим вас иностранному языку Американский английский - обучение. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 749 bytes Desc: not available URL: From bafflesy6 at mypublishingprinter.com Mon Mar 7 18:48:35 2011 From: bafflesy6 at mypublishingprinter.com (Meredith Mohr) Date: Tue, 8 Mar 2011 09:48:35 +0700 Subject: Lowprize Message-ID: <000d01cbdd3b$51b645e0$6400a8c0@bafflesy6> АВИАБИЛЕТЫ ПО АКЦИЯМ Бронируйте по телефону (495) 789-66-85 Внимание! Тарифы даны без учета аэропортовых и сервисных сборов! Пункты назначения Тариф туда и обратно Аэропортовые и сервисные сборы Авиакомпания Срок действия Cтамбул (а/п Сабиха Гёкчен) от 89 EUR ~3342 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Абу Даби от 209 EUR ~7200 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Амстердам от 249 EUR ~1879 руб. Белавиа Путешествие: не более 2 мес. Анкара от 89 EUR ~3437 руб. Turkish Airlines Путешествие: не более 12 мес. Афины от 99 EUR ~6212 руб. Аэросвит Путешествие: не более 1 мес. Барселона от 148 EUR ~7160 руб. Brussels Airlines Бронирование за 21 день Берлин от 115 EUR ~4440 руб. Lufthansa Бронирование за 14 дней Брюссель от 190 EUR ~5160 руб. Brussels Airlines Варшава от 120 EUR ~5142 руб. Аэросвит Путешествие: не более 1 мес. Варшава от 196 EUR ~1782 руб. Белавиа Путешествие: не более 2 мес. Венеция от 149 EUR ~8360 руб. Lufthansa Бронирование за 21 день Ганновер от 199 EUR ~8640 руб. Lufthansa Гонг Конг, Пекин, Чанша, Чунцин, Фучжоу, Гуанджоу, Ханджоу, Куньмин, Нанкин, Нинбо, Циндао, Санья, Шанхай, Тяньцзинь, Ухань, Сямынь от 407 EUR ~5426 -6237 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Гонг-Конг от 350 EUR ~6019 руб. Hong Kong Airlines Продажа до: 31.10.2011 Путешествие : первый вылет до 31.10.2011 (ср.,пт.,вск.) Денпасар (Бали), Джакарта, Сурабая, Пномпень, Фукуока, Нагоя, Осака, Сапорро, Токио, Бусан, Сеул, Куала-Лумпур, Пинанг, Кота-Кинабалу, Катманду, Себу, Манила, Сингапур, Гаосюн, Тайбэй, Бангкок, Пхукет, Ханой, Хошимин, Нади, Окленд от 555 EUR ~6000 руб.-6500 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Дубаи от 199 EUR ~7200 руб. Turkish Airlines Продажа: 15.05.2010-31.03.2011 Путешествие: не более 12 мес. Дубай от 200 EUR ~5165 руб. Аэросвит Путешествие: не менее 3 дней и не более 1 мес. Дублин от 199 EUR ~8800 руб. Lufthansa Бронирование за 21 день Дюссельдорф от 166 EUR ~4560 руб. Lufthansa Бронирование за 14 дней Касабланка от 249 EUR ~6259 руб. Turkish Airlines Продажа:31.03.2011 Путешествие: не более 12 мес. Ларнака от 230 EUR ~6716 руб. Аэросвит Путешествие: не более 1 мес. Ларнака от 299 EUR ~2530 руб. Белавиа Путешествие: не более 2 мес. Милан от 178 EUR ~7560 руб. Brussels Airlines Бронирование за 21 день Милан от 299 EUR ~1446 руб. Белавиа Путешествие: не более 2 мес. Мюнхен от 119 EUR ~4640 руб. Lufthansa Неаполь от 229 EUR ~5401 руб. Аэросвит Путешествие: не более 1 мес. Ницца от 219 EUR ~9000 руб. Lufthansa Бронирование за 21 день Нью-Йорк от 130 EUR ~10548 руб. Аэросвит Продажа: (не позднее 3дн до вылета) Путешествие: не более 3 мес. Париж от 169 EUR ~9080 руб. Lufthansa Бронирование за 21 день Париж от 270 EUR ~3400 руб. Белавиа Путешествие: не более 2 мес. Пекин от 100 EUR ~10441 руб. Аэросвит Путешествие: не более 1 мес. Подгорица от 199 EUR ~6573 руб. Turkish Airlines Продажа:до 31.03.2011 Путешествие: не более 12 мес. Прага от 130 EUR ~4472 руб. Аэросвит Путешествие: не более 1 мес. Прага от 249 EUR ~840 руб. Белавиа Путешествие: не более 2 мес. Рим от 198 EUR ~7600 руб. Brussels Airlines Бронирование за 21 день Рим от 299 EUR ~1448 руб. Белавиа Путешествие: не более 2 мес. София от 179 EUR ~4106 руб. Аэросвит Путешествие: не более 1 мес. Стокгольм от 179 EUR ~1871 руб. Белавиа Путешествие: не более 2 мес. Тбилиси от 249 EUR ~818 руб. Белавиа Путешествие: не более 3 мес. Тегеран от 269 EUR ~1399 руб. Белавиа Путешествие: не более 2 мес. Франкфурт-на-Майне от 119 EUR ~4880 руб. Lufthansa Эрджан от 236 EUR ~2235 руб. Turkish Airlines Путешествие : не более 12 мес. Все цены в рублях могут изменяться в зависимости от курса обмена валют на день выписки. забронируйте по телефону (495) 789-66-85 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 25274 bytes Desc: not available URL: From finchr75 at lockerytapdance.com Mon Mar 7 18:05:54 2011 From: finchr75 at lockerytapdance.com (Cecilia Mcmanus) Date: Tue, 8 Mar 2011 10:05:54 +0800 Subject: BudgetAir Message-ID: АВИАБИЛЕТЫ ПО АКЦИЯМ Бронируйте по телефону (495) 789-66-85 Внимание! Тарифы даны без учета аэропортовых и сервисных сборов! Пункты назначения Тариф туда и обратно Аэропортовые и сервисные сборы Авиакомпания Срок действия Cтамбул (а/п Сабиха Гёкчен) от 89 EUR ~3342 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Абу Даби от 209 EUR ~7200 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Амстердам от 249 EUR ~1879 руб. Белавиа Путешествие: не более 2 мес. Анкара от 89 EUR ~3437 руб. Turkish Airlines Путешествие: не более 12 мес. Афины от 99 EUR ~6212 руб. Аэросвит Путешествие: не более 1 мес. Барселона от 148 EUR ~7160 руб. Brussels Airlines Бронирование за 21 день Берлин от 115 EUR ~4440 руб. Lufthansa Бронирование за 14 дней Брюссель от 190 EUR ~5160 руб. Brussels Airlines Варшава от 120 EUR ~5142 руб. Аэросвит Путешествие: не более 1 мес. Варшава от 196 EUR ~1782 руб. Белавиа Путешествие: не более 2 мес. Венеция от 149 EUR ~8360 руб. Lufthansa Бронирование за 21 день Ганновер от 199 EUR ~8640 руб. Lufthansa Гонг Конг, Пекин, Чанша, Чунцин, Фучжоу, Гуанджоу, Ханджоу, Куньмин, Нанкин, Нинбо, Циндао, Санья, Шанхай, Тяньцзинь, Ухань, Сямынь от 407 EUR ~5426 -6237 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Гонг-Конг от 350 EUR ~6019 руб. Hong Kong Airlines Продажа до: 31.10.2011 Путешествие : первый вылет до 31.10.2011 (ср.,пт.,вск.) Денпасар (Бали), Джакарта, Сурабая, Пномпень, Фукуока, Нагоя, Осака, Сапорро, Токио, Бусан, Сеул, Куала-Лумпур, Пинанг, Кота-Кинабалу, Катманду, Себу, Манила, Сингапур, Гаосюн, Тайбэй, Бангкок, Пхукет, Ханой, Хошимин, Нади, Окленд от 555 EUR ~6000 руб.-6500 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Дубаи от 199 EUR ~7200 руб. Turkish Airlines Продажа: 15.05.2010-31.03.2011 Путешествие: не более 12 мес. Дубай от 200 EUR ~5165 руб. Аэросвит Путешествие: не менее 3 дней и не более 1 мес. Дублин от 199 EUR ~8800 руб. Lufthansa Бронирование за 21 день Дюссельдорф от 166 EUR ~4560 руб. Lufthansa Бронирование за 14 дней Касабланка от 249 EUR ~6259 руб. Turkish Airlines Продажа:31.03.2011 Путешествие: не более 12 мес. Ларнака от 230 EUR ~6716 руб. Аэросвит Путешествие: не более 1 мес. Ларнака от 299 EUR ~2530 руб. Белавиа Путешествие: не более 2 мес. Милан от 178 EUR ~7560 руб. Brussels Airlines Бронирование за 21 день Милан от 299 EUR ~1446 руб. Белавиа Путешествие: не более 2 мес. Мюнхен от 119 EUR ~4640 руб. Lufthansa Неаполь от 229 EUR ~5401 руб. Аэросвит Путешествие: не более 1 мес. Ницца от 219 EUR ~9000 руб. Lufthansa Бронирование за 21 день Нью-Йорк от 130 EUR ~10548 руб. Аэросвит Продажа: (не позднее 3дн до вылета) Путешествие: не более 3 мес. Париж от 169 EUR ~9080 руб. Lufthansa Бронирование за 21 день Париж от 270 EUR ~3400 руб. Белавиа Путешествие: не более 2 мес. Пекин от 100 EUR ~10441 руб. Аэросвит Путешествие: не более 1 мес. Подгорица от 199 EUR ~6573 руб. Turkish Airlines Продажа:до 31.03.2011 Путешествие: не более 12 мес. Прага от 130 EUR ~4472 руб. Аэросвит Путешествие: не более 1 мес. Прага от 249 EUR ~840 руб. Белавиа Путешествие: не более 2 мес. Рим от 198 EUR ~7600 руб. Brussels Airlines Бронирование за 21 день Рим от 299 EUR ~1448 руб. Белавиа Путешествие: не более 2 мес. София от 179 EUR ~4106 руб. Аэросвит Путешествие: не более 1 мес. Стокгольм от 179 EUR ~1871 руб. Белавиа Путешествие: не более 2 мес. Тбилиси от 249 EUR ~818 руб. Белавиа Путешествие: не более 3 мес. Тегеран от 269 EUR ~1399 руб. Белавиа Путешествие: не более 2 мес. Франкфурт-на-Майне от 119 EUR ~4880 руб. Lufthansa Эрджан от 236 EUR ~2235 руб. Turkish Airlines Путешествие : не более 12 мес. Все цены в рублях могут изменяться в зависимости от курса обмена валют на день выписки. забронируйте по телефону (495) 789-66-85 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 25204 bytes Desc: not available URL: From spottedqx3 at hypnodiaet.com Mon Mar 7 18:39:17 2011 From: spottedqx3 at hypnodiaet.com (Magdalena Horton) Date: Tue, 8 Mar 2011 10:39:17 +0800 Subject: =?koi8-r?B?z8LV3sXOycUg0drZy9Ug0yDHwdLBztTJxcouIMHX1M/S08vB0SDNxdTP?= =?koi8-r?B?xMnLwS4=?= Message-ID: <000d01cbdd3a$053879a0$6400a8c0@spottedqx3> обучение английскому языку с гарантией. обучим разговорному языку с гарантией. гарантируем языку обучим - вы будете говорить на любом языке! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 756 bytes Desc: not available URL: From conakry22 at mlfoundation.com Mon Mar 7 20:02:26 2011 From: conakry22 at mlfoundation.com (Olin Guevara) Date: Tue, 8 Mar 2011 11:02:26 +0700 Subject: =?koi8-r?B?88Xaz87O2cUg0sHT0NLPxMHWySDB18nBwsnMxdTP1yEhIfTB0snG2SDP?= =?koi8-r?B?1CA5OSBFVVIhISE=?= Message-ID: <7B384862ABBE4D928E6DA0F6D2622198@dpu27> АВИАБИЛЕТЫ ПО АКЦИЯМ Бронируйте по телефону (495) 789-66-85 Внимание! Тарифы даны без учета аэропортовых и сервисных сборов! Пункты назначения Тариф туда и обратно Аэропортовые и сервисные сборы Авиакомпания Срок действия Cтамбул (а/п Сабиха Гёкчен) от 89 EUR ~3342 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Абу Даби от 209 EUR ~7200 руб. Turkish Airlines Продажа: до 31.03.2011 Путешествие: не более 12 мес. Амстердам от 249 EUR ~1879 руб. Белавиа Путешествие: не более 2 мес. Анкара от 89 EUR ~3437 руб. Turkish Airlines Путешествие: не более 12 мес. Афины от 99 EUR ~6212 руб. Аэросвит Путешествие: не более 1 мес. Барселона от 148 EUR ~7160 руб. Brussels Airlines Бронирование за 21 день Берлин от 115 EUR ~4440 руб. Lufthansa Бронирование за 14 дней Брюссель от 190 EUR ~5160 руб. Brussels Airlines Варшава от 120 EUR ~5142 руб. Аэросвит Путешествие: не более 1 мес. Варшава от 196 EUR ~1782 руб. Белавиа Путешествие: не более 2 мес. Венеция от 149 EUR ~8360 руб. Lufthansa Бронирование за 21 день Ганновер от 199 EUR ~8640 руб. Lufthansa Гонг Конг, Пекин, Чанша, Чунцин, Фучжоу, Гуанджоу, Ханджоу, Куньмин, Нанкин, Нинбо, Циндао, Санья, Шанхай, Тяньцзинь, Ухань, Сямынь от 407 EUR ~5426 -6237 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Гонг-Конг от 350 EUR ~6019 руб. Hong Kong Airlines Продажа до: 31.10.2011 Путешествие : первый вылет до 31.10.2011 (ср.,пт.,вск.) Денпасар (Бали), Джакарта, Сурабая, Пномпень, Фукуока, Нагоя, Осака, Сапорро, Токио, Бусан, Сеул, Куала-Лумпур, Пинанг, Кота-Кинабалу, Катманду, Себу, Манила, Сингапур, Гаосюн, Тайбэй, Бангкок, Пхукет, Ханой, Хошимин, Нади, Окленд от 555 EUR ~6000 руб.-6500 руб. CATHAY PACIFIC Продажа до: 31.03.2011 Путешествие :до 31.03.2011 (кроме вылетов с 25.12.10 по 05.01.11) Дубаи от 199 EUR ~7200 руб. Turkish Airlines Продажа: 15.05.2010-31.03.2011 Путешествие: не более 12 мес. Дубай от 200 EUR ~5165 руб. Аэросвит Путешествие: не менее 3 дней и не более 1 мес. Дублин от 199 EUR ~8800 руб. Lufthansa Бронирование за 21 день Дюссельдорф от 166 EUR ~4560 руб. Lufthansa Бронирование за 14 дней Касабланка от 249 EUR ~6259 руб. Turkish Airlines Продажа:31.03.2011 Путешествие: не более 12 мес. Ларнака от 230 EUR ~6716 руб. Аэросвит Путешествие: не более 1 мес. Ларнака от 299 EUR ~2530 руб. Белавиа Путешествие: не более 2 мес. Милан от 178 EUR ~7560 руб. Brussels Airlines Бронирование за 21 день Милан от 299 EUR ~1446 руб. Белавиа Путешествие: не более 2 мес. Мюнхен от 119 EUR ~4640 руб. Lufthansa Неаполь от 229 EUR ~5401 руб. Аэросвит Путешествие: не более 1 мес. Ницца от 219 EUR ~9000 руб. Lufthansa Бронирование за 21 день Нью-Йорк от 130 EUR ~10548 руб. Аэросвит Продажа: (не позднее 3дн до вылета) Путешествие: не более 3 мес. Париж от 169 EUR ~9080 руб. Lufthansa Бронирование за 21 день Париж от 270 EUR ~3400 руб. Белавиа Путешествие: не более 2 мес. Пекин от 100 EUR ~10441 руб. Аэросвит Путешествие: не более 1 мес. Подгорица от 199 EUR ~6573 руб. Turkish Airlines Продажа:до 31.03.2011 Путешествие: не более 12 мес. Прага от 130 EUR ~4472 руб. Аэросвит Путешествие: не более 1 мес. Прага от 249 EUR ~840 руб. Белавиа Путешествие: не более 2 мес. Рим от 198 EUR ~7600 руб. Brussels Airlines Бронирование за 21 день Рим от 299 EUR ~1448 руб. Белавиа Путешествие: не более 2 мес. София от 179 EUR ~4106 руб. Аэросвит Путешествие: не более 1 мес. Стокгольм от 179 EUR ~1871 руб. Белавиа Путешествие: не более 2 мес. Тбилиси от 249 EUR ~818 руб. Белавиа Путешествие: не более 3 мес. Тегеран от 269 EUR ~1399 руб. Белавиа Путешествие: не более 2 мес. Франкфурт-на-Майне от 119 EUR ~4880 руб. Lufthansa Эрджан от 236 EUR ~2235 руб. Turkish Airlines Путешествие : не более 12 мес. Все цены в рублях могут изменяться в зависимости от курса обмена валют на день выписки. забронируйте по телефону (495) 789-66-85 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 25204 bytes Desc: not available URL: From altercationsy2317 at guiadetanger.com Mon Mar 7 20:09:03 2011 From: altercationsy2317 at guiadetanger.com (Marcus Calhoun) Date: Tue, 8 Mar 2011 11:09:03 +0700 Subject: =?koi8-r?B?zMDCz8og0drZyyDawSDLz9LP1MvPxSDX0sXN0SEg0yDHwdLBztTJxco=?= Message-ID: <000d01cbdd46$8f92c180$6400a8c0@altercationsy2317> Американский английский - обучение. 25 кадр - устарело! новая супер методика обучения иностранным языкам. гарантируем языку обучим - вы будете говорить на любом языке! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 860 bytes Desc: not available URL: From cucumbersydu4 at janruneblom.com Mon Mar 7 20:32:35 2011 From: cucumbersydu4 at janruneblom.com (Josefina Stephens) Date: Tue, 8 Mar 2011 11:32:35 +0700 Subject: =?koi8-r?B?x8/Xz9LJ1MUgzsEgyc7P09TSwc7Oz80sIM3ZIM7B1d7JzS4=?= Message-ID: <000d01cbdd49$d91b7ec0$6400a8c0@cucumbersydu4> гарантируем языку обучим - вы будете говорить на любом языке! обучим разговорному языку с гарантией. гарантированное обучение языку -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 823 bytes Desc: not available URL: From eugen at leitl.org Tue Mar 8 03:14:28 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 8 Mar 2011 12:14:28 +0100 Subject: [Freedombox-discuss] FreedomBox featured on CBS News Message-ID: <20110308111427.GB23560@leitl.org> ----- Forwarded message from "info at freedomboxfoundation.org" ----- From achristivi at naturalimpulse.com Tue Mar 8 12:50:36 2011 From: achristivi at naturalimpulse.com (Angelyn Christi) Date: Tue, 08 Mar 2011 13:50:36 -0700 Subject: Package Price Per Pill Order; 100mg x 10 pills: $39.95: 100mg x 30 pills Message-ID: <4d76969c.9a04e9ec@naturalimpulse.com> How to get Viagra? We recommend buy Viagra online. ... Package Price Per Pill Order; 100mg x 10 pills: $39.95: 100mg x 30 pills http://prescriptionmedstabletspharmacy.ru From jcg.sturdy at gmail.com Tue Mar 8 06:43:31 2011 From: jcg.sturdy at gmail.com (John Sturdy) Date: Tue, 8 Mar 2011 14:43:31 +0000 Subject: [Freedombox-discuss] alternative hardware idea Message-ID: I heard Eben's talk at FOSDEM, and it occurred to me that, in some jurisdictions, ownership of a Freedom Box could itself be regarded as either suspicious or even criminal. (For example, countries that restrict cryptography, or can jail you for not disclosing keys, as is the case in the UK.) So it would make sense to run the software on a device that has some other reason to justify its existence / presence; perhaps some kind of embedded device that is always switched on. A specific such device, that at first I thought of just because of the irony of it, is the wireless IP CCTV camera. On further thought, it seems this could be specifically a very suitable kind of device for the purpose, as it has a continuous stream of information-poor data which would be ideal for encoding things in steganographically. As an added benefit, such cameras could also form a sousveillance network. (Quick introduction: I'm a programmer, based in the UK. I don't think my skillset has much overlap with what's needed for this project, but I just wanted to drop this idea in, in case it's useful.) _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Mar 8 06:52:31 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 8 Mar 2011 15:52:31 +0100 Subject: [Freedombox-discuss] alternative hardware idea Message-ID: <20110308145231.GG23560@leitl.org> ----- Forwarded message from John Sturdy ----- From substitution64 at isaidmoo.com Tue Mar 8 05:12:23 2011 From: substitution64 at isaidmoo.com (Antonio Downey) Date: Tue, 8 Mar 2011 18:12:23 +0500 Subject: =?koi8-r?B?MjUg0drZy8/XIMna1d7Bxc0uIMfB0sHO1MnRLg==?= Message-ID: <8F946BD57AFA484899C1310A96B5FB55@pc7> обучение языку с гарантией. авторская методика. 25 языков изучаем. гарантия. гарантируем языку обучим - вы будете говорить на любом языке! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 762 bytes Desc: not available URL: From m.arlindaan at all-hotels.com Tue Mar 8 11:13:46 2011 From: m.arlindaan at all-hotels.com (Mariam Arlinda) Date: Tue, 08 Mar 2011 18:13:46 -0100 Subject: Get your XANAX for as low as $2.15 per pill and even cheaper right now! Message-ID: <30w98i60s59-92988403-800s3w40@tfaglpi> Xanax Online Store. Lowest Price guarantee! Get your XANAX for as low as $2.15 per pill and even cheaper right now! Best quality Xanax from fully licensed pharmacies without RX needed http://cheapmedsmarketing.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 560 bytes Desc: not available URL: From bucksp at homesknoxcounty.com Tue Mar 8 03:56:42 2011 From: bucksp at homesknoxcounty.com (Christy Rojas) Date: Tue, 8 Mar 2011 18:56:42 +0700 Subject: =?koi8-r?B?z8LV3sXOycUgyc7P09TSwc7Oz83VINHa2cvVLiDn4fLh7vTp8Q==?= Message-ID: <143659468.55532100868226@homesknoxcounty.com> говорите на иностранном, мы научим. ГАРАНТИРУЕМ: мы научим вас иностранному языку обучим разговорному языку с гарантией. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 615 bytes Desc: not available URL: From rigsg20 at jeevesatwork.com Tue Mar 8 04:23:20 2011 From: rigsg20 at jeevesatwork.com (Minerva Fry) Date: Tue, 8 Mar 2011 19:23:20 +0700 Subject: =?koi8-r?B?8dDPztPLycogySDhzsfMycrTy8nKIC0g0yDHwdLBztTJxcou?= Message-ID: <000d01cbdd8b$9c9452f0$6400a8c0@rigsg20> обучение языку обучение иностранному языку. ГАРАНТИЯ обучение без проблем иностранным языкам с гарантией -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 721 bytes Desc: not available URL: From ukrainiansmu2753 at greaterbarriearearealty.com Tue Mar 8 05:38:18 2011 From: ukrainiansmu2753 at greaterbarriearearealty.com (Kurtis Mcguire) Date: Tue, 8 Mar 2011 20:38:18 +0700 Subject: =?koi8-r?B?yc7P09TSwc7O2cogwsXaINDSz8LMxc0gLSDO1dbOzyDUz8zYy88g/Pft?= Message-ID: <326818150.27416776621706@greaterbarriearearealty.com> обучение английскому языку. с гарантией. 25 кадр - устарело! новая супер методика обучения иностранным языкам. обучим разговорному языку с гарантией. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 645 bytes Desc: not available URL: From stokef20 at magnatag.com Tue Mar 8 05:39:37 2011 From: stokef20 at magnatag.com (Lanny Vega) Date: Tue, 8 Mar 2011 20:39:37 +0700 Subject: =?koi8-r?B?MjXR2tnLz9cgz8LV3sXOycUg0M8g1c7Jy8HM2M7PyiDNxdTPxMnLxQ==?= Message-ID: <000d01cbdd96$4481a0d0$6400a8c0@stokef20> гарантируем языку обучим - вы будете говорить на любом языке! изучи иностранный - 25 языков по уникальной методике обучение языку -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 823 bytes Desc: not available URL: From lording79 at imedcare.com Tue Mar 8 05:39:37 2011 From: lording79 at imedcare.com (Shana Cullen) Date: Tue, 8 Mar 2011 20:39:37 +0700 Subject: =?koi8-r?B?z8LV3sXOycUgwsXaINDSz8LMxc0gyc7P09TSwc7O2c0g0drZy8HNINMg?= =?koi8-r?B?x8HSwc7UycXK?= Message-ID: <000d01cbdd96$447348f0$6400a8c0@lording79> изучи иностранный - 25 языков по уникальной методике Японский и Английский - с гарантией. говорите на иностранном, мы научим. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 741 bytes Desc: not available URL: From shagru at homerssoftwater.com Tue Mar 8 06:02:35 2011 From: shagru at homerssoftwater.com (Rusty Bliss) Date: Tue, 8 Mar 2011 21:02:35 +0700 Subject: =?koi8-r?B?ydrV3skgyc7P09TSwc7O2cogLSAyNSDR2tnLz9cg0M8g1c7Jy8HM2M7P?= =?koi8-r?B?yiDNxdTPxMnLxQ==?= Message-ID: <53AA46CD368E4BDFBD7A7441848A84BC@dna3> любой язык за короткое время. гарантия. говорите на иностранном, мы научим. Американский английский - обучение. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 736 bytes Desc: not available URL: From zooko at zooko.com Tue Mar 8 20:55:46 2011 From: zooko at zooko.com (Zooko O'Whielacronx) Date: Tue, 8 Mar 2011 21:55:46 -0700 Subject: [p2p-hackers] how do I tell these Chinese people "You're doing it wrong!" ? Message-ID: (carbon-copied to the p2p-hackers mailing list and the liberationtech mailing lists) Folks: As previously discussed on these lists (e.g. on 2010-11-10), we at the Tahoe-LAFS project have now posted a prominent tutorial on the security properties of our architecture: http://pubgrid.tahoe-lafs.org/ Thanks to David Triendl, Yu Xue, David Andersen, Rujia Liu, Weihan Wang, David-Sarah Hopwood, and Jonathan M. I have (still) never had a successful two-way conversation with the Chinese users that we originally noticed last year, so I don't know if this warning label is still needed or if there are any Chinese people using it. If you hear of any Chinese people using Tahoe-LAFS, please let us know! :-) Regards, Zooko _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From inexhaustiblye917 at houston-training.com Tue Mar 8 06:32:41 2011 From: inexhaustiblye917 at houston-training.com (Nita Juarez) Date: Tue, 8 Mar 2011 22:32:41 +0800 Subject: =?koi8-r?B?wtnT1NLPxSDPwtXexc7JxSDJzs/T1NLBzs7PzdUg0drZy9U=?= Message-ID: <480198148.71800653493794@houston-training.com> 25 кадр - устарело! новая супер методика обучения иностранным языкам. Японский и Английский - с гарантией. гарантируем языку обучим - вы будете говорить на любом языке! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 664 bytes Desc: not available URL: From submitytfk2 at houstonschoolguide.com Tue Mar 8 07:00:31 2011 From: submitytfk2 at houstonschoolguide.com (Sherman Mcelroy) Date: Tue, 8 Mar 2011 23:00:31 +0800 Subject: =?koi8-r?B?x8/Xz9LJ1MUgzsEgyc7P09TSwc7Oz80sIM3ZIM7B1d7JzS4=?= Message-ID: <000d01cbdda1$9176db70$6400a8c0@submitytfk2> Японский и Английский - с гарантией. гарантия - ЯЗЫК обучение. любой язык за короткое время. гарантия. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 796 bytes Desc: not available URL: From fokkernx0 at jiansuj.com Tue Mar 8 08:06:25 2011 From: fokkernx0 at jiansuj.com (Rebekah Huggins) Date: Tue, 8 Mar 2011 23:06:25 +0700 Subject: =?koi8-r?B?z8LV3sXOycUg0drZy9Ug0yDHwdLBztTJxco=?= Message-ID: <000d01cbddaa$c668b200$6400a8c0@fokkernx0> быстрое обучение иностранному языку обучение языку с гарантией обучение языку с гарантией -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 706 bytes Desc: not available URL: From bunche98 at herc-jm.com Tue Mar 8 11:02:14 2011 From: bunche98 at herc-jm.com (Sally Fish) Date: Wed, 9 Mar 2011 00:32:14 +0530 Subject: =?koi8-r?B?z8LV3sXOycUgyc7P09TSwc7Oz83VINHa2cvVLiDn4fLh7vTp8Q==?= Message-ID: <344428990.39933644828970@herc-jm.com> вам нужен иностранный язык? мы научим. ГАРАНТИЯ 25языков обучение по уникальной методике изучи иностранный язык. просто и легко. 25 языков по уникальной методике. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 659 bytes Desc: not available URL: From freak_dragosi_dm at 283.ru Tue Mar 8 17:32:05 2011 From: freak_dragosi_dm at 283.ru (Hans Alvarado) Date: Wed, 9 Mar 2011 08:32:05 +0700 Subject: =?koi8-r?B?98HbINLBws/UzsnLLSDJzs/T1NLBzsXD?= Message-ID: <000d01cbddf9$cc111d60$6400a8c0@freak_dragosi_dm> 10 Марта Ваш работник- иностранец Программа мероприятия I часть 1.Характеристика изменений законодательства в сфере трудовой миграции в 2010 ≈ 2011 гг. Нововведения в законодательстве в 2010-2011гг. Принципиально важные аспекты исполнения в 2011г. нового Административного регламента ФМС предоставления государственной услуги по выдаче заключений о привлечении и об использовании иностранных работников. Характеристика изменений законодательства в сфере трудовой миграции, вступивших в силу с 1 июля 2011 г. 2.Статус иностранного гражданина в РФ. Процедура регистрации по месту жительства. Порядок въезда-выезда иностранных работников из визовых и безвизовых стран. Правовое положение иностранных работников предприятий с иностранными инвестициями и аккредитованных филиалов и представительств иностранных юридических лиц. 3.Правила и особенности привлечения на работу иностранных граждан из стран с безвизовым, визовым порядками въезда Случаи, когда работодатель является принимающей стороной, и его обязанности и ответственность в этом качестве. Квоты на привлечение иностранных работников √ территориальные (по субъектам РФ для граждан ближнего и дальнего зарубежья) и профессиональные (по отдельным видам деятельности). Категории иностранных работников, которым не требуется оформления разрешения на работу. Особая категория иностранных граждан ≈ Белорусы. Оформление разрешения на работу иностранным работникам в 2011 году. 4. Ответственность за нарушения установленного порядка привлечения и использования иностранных работников и режима пребывания: ужесточение требований и изменения в законодательстве. Административная ответственность работодателя, должностных лиц и иностранных граждан. Уголовная ответственность. Административное═ выдворение, депортация, их последствия. 5. Практика работы с иностранными гражданами в Москве и Московской области в 2011 году. Процедура подачи заявки на привлечение иностранной рабочей силы для работы в Москве и Московской области. Заявки работодателей на привлечение иностранных работников на 2011 год. Последствия для работодателей, не подавших заявок на 2011 год. Обязан ли работодатель участвовать в квотировании для легального привлечения ИРС? Процедура постановки, снятия и продления первичного миграционного учета (регистрации) иностранных граждан в Москве. Сроки, документы, ответственность. Оформление разрешения на работу для иностранного гражданина в 2011 году. Процедура получения / продления, документы II часть 1. Административный регламент ФМС РФ, регулирующий проведение проверочных мероприятий в 2011 году. 2. Ответственность за нарушения установленного порядка привлечения и использования иностранных работников и режима пребывания. Административная ответственность работодателя, должностных лиц и иностранных граждан. Разбор и консультации по типичным случаям из практики 2010 и 2011 гг. Уголовная ответственность Порядок привлечения, сроки давности. 3. Органы, осуществляющие надзор и контроль за привлечением иностранных работников. Контролирующие органы и их компетенция. ФМС и ее территориальные органы, органы милиции, государственная инспекция труда: полномочия, санкции. Порядок проведения проверок и их последствия. Новые суммы штрафов. Права и обязанности работодателя при проведении инспекционных проверок. Перечень документов и сведений, необходимых для предъявления при проведении инспекционной проверки. 4. Наем иностранного работника и оформление трудовых отношений. 5. Регистрация работника в государственных фондах. Сроки, процедура, документы. 6. Уведомления государственных органов о приеме/увольнении иностранного работника. Перечень государственных органов, сроки, процедуры подачи, документы, ответственность. 7. Правильное начисление и выдача заработной платы иностранному работнику. Отчисления и налоги: Новое в 2011 году. Резиденты и нерезиденты. 8. Экономическая эффективность Ваших иностранных работников. 9. Какие выгоды предприятию приносят Аутсорсинг, Аутстаффинг, Стафф-Лизинг при кадровом учете и администрировании иностранного персонала По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 (Ч95) 4Ч5-32.66 > 445З266 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6704 bytes Desc: not available URL: From eugen at leitl.org Tue Mar 8 23:57:20 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 9 Mar 2011 08:57:20 +0100 Subject: [p2p-hackers] how do I tell these Chinese people "You're doing it wrong!" ? Message-ID: <20110309075720.GM23560@leitl.org> ----- Forwarded message from Zooko O'Whielacronx ----- From oleg at linuxportal.ru Wed Mar 9 02:33:08 2011 From: oleg at linuxportal.ru (=?koi8-r?B?987JzcHOycAg4sHOy8/XIMkg1d7B09TOycvP1yD3/OQ=?=) Date: Wed, 9 Mar 2011 15:33:08 +0500 Subject: =?koi8-r?B?98HMwNTOz8Ug0sXH1czJ0s/Xwc7JxSAo4+Ig8uYp?= Message-ID: <000d01cbde45$61d94610$6400a8c0@oleg> Вниманию банков, финансовых, страховых компаний Валютное регулирование и валютный контроль на современном этапе (ЦБ РФ) Валютное регулирование (ЦБ РФ) +7 Московский код: 792/-2i..22 \\// 445-З266 I5 марта 2О1l Лектор: начальник управления Департамента финансового Мониторинга и валютного контроля Банка России. 1. Система валютного регулирования и валютного контроля в Российской Федерации и валютный контроль уполномоченных банков. * Федеральный закон "О валютном регулировании и валютном контроле" ╧ 173-ФЗ, императивные нормы. Регулирование порядка поведения валютных операций резидентами и нерезидентами, открытия и ведения резидентами счетов в банках, расположенных за пределами Российской Федерации. Режим счета, открытого за рубежом. * Репатриация выручки от внешнеэкономической деятельности. * Нормативные акты Банка России и Правительства Российской Федерации. * Контроль за соблюдением Федерального закона и нормативных актов Банка России. 2. Нормативные акты Банка России: Инструкция Банка России от 15 июня 2004 года ╧117-И "О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации при осуществлении валютных операций, порядке учета уполномоченными банками валютных операций и оформления паспортов сделок" (с изменениями и дополнениями), Положение Банка России от 1 июня 2004 года ╧ 258-П "О порядке представления резидентами уполномоченным банкам подтверждающих документов и информации, связанных с проведением валютных операций с нерезидентами по внешнеторговым сделкам, и осуществления уполномоченными банками контроля за проведением валютных операций" (с изменениями и дополнениями). Основные требования к порядку проведения валютных операций и оформления документов валютного контроля, установленные этими нормативными актами: * кодирование валютных операций, * оформление и представление справок о валютных операциях, о подтверждающих документах, о поступлении валюты Российской Федерации, о расчетах через счета резидентов, открытые в банках, расположенных за пределами Российской Федерации, * Паспорт сделки. Практика применения вышеуказанных нормативных актов Банка России: 3. Паспорта сделок, как документы валютного контроля. Проблемные вопросы оформления и ведения. Документы валютного контроля, учета и отчетности. Действия уполномоченных банков при оформлении и проведении валютных операций. 4. Указание Банка России "О формах учета по валютным операциям, осуществляемым резидентами, за исключением кредитных организаций и валютных бирж" ╧1950-У и его влияние на квалификацию правонарушений. 5. Регулирование порядка представления информации о нарушениях валютного законодательства. Положение ЦБ РФ от 20.07.2007 N 308-П И практика его применения (с учетом последних изменений). Постановление Правительства РФ от 24 февраля 2009 г. N 166 "О порядке представления органами и агентами валютного контроля в орган валютного контроля, уполномоченный Правительством Российской Федерации, необходимых для осуществления его функций документов и информации". Практика применения Положения Банка России ╧308-П на примере конкретных нарушений. 6. Валютное регулирование операций физических лиц. Операции физических лиц и валютный контроль уполномоченных банков. Нормы прямого действия Федерального закона ╧ 173-ФЗ. Порядок осуществления переводов денежных средств физическими лицами из Российской Федерации и по территории Российской Федерации. Инструкция Банка России ╧113-И (с изменениями и дополнениями). Указание Банка России от 20.07.2007 ╧1868-У "О предоставлении физическими лицами-резидентами уполномоченным банкам документов, связанных с проведением отдельных валютных операций". Изменения в регулировании валютных операций физических лиц. Валютные операции с платежными картами. Положение Банка России ╧266-П (с изменениями и дополнениями). 7. Ответственность за нарушение валютного законодательства. 8. Перспективы развития валютного регулирования и валютного контроля в Российской Федерации. Стоимость участия в семинаре 9970 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: (495) 4Ч_5Ч-О95 или ЧЧ_5-40/_95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6770 bytes Desc: not available URL: From momg79 at reporter-herald.com Wed Mar 9 11:44:01 2011 From: momg79 at reporter-herald.com (UNI-TRADE) Date: Thu, 10 Mar 2011 01:14:01 +0530 Subject: Export Import operations Ukraine Message-ID: <72CE23E3DD0D4FE1B7D3197ABC5B0BCA@swroom> Export Import operations Ukraine "UNI-TRADE " Ltd Ukraine Skype: export-import-ukraine Tel: +38(0472) 544269 Fax: +38(0472) 544270 Mob: +38(067) 470 52 70 From freeads at atownsquare.com Thu Mar 10 00:49:41 2011 From: freeads at atownsquare.com (Young Nelson) Date: Thu, 10 Mar 2011 11:49:41 +0300 Subject: =?koi8-r?B?98na2SEg89LP3s7PISDnwdLBztTJ0SEg4cvL0sXEydTBw8nRINcg8M/T?= =?koi8-r?B?z8zY09TXxSEg88vJxMvBIDEwJSE=?= Message-ID: ВИЗОВЫЙ ОПЕРАТОР! АККРЕДИТАЦИЯ В ПОСОЛЬСТВЕ! БЫСТРО! ЛЕГАЛЬНО! Телефоны: +7 (495) 649 9170; +7 (499)3431902; СПЕЦПРЕДЛОЖЕНИЕ НЕДЕЛИ. Испания. Шенгенская мульти-виза - 6 месяцев за 350 у.е. ДЕЛОВАЯ МУЛЬТИВИЗА в ГРЕЦИЮ СПЕЦПРЕДЛОЖЕНИЕ 6 мес- 650 ЕВРО! СПЕШИТЕ! ТОЛЬКО НА ЭТОЙ НЕДЕЛЕ СКИДКА 10% при подаче 2-х документов сразу. Шенгенские ДЕЛОВЫЕ мульти-визы за 4 РАБОЧИХ ДНЯ Среднесрочные - 1 год - 900 у.е, 6 месяцев - 700 у.е, 3 месяца - 500 у.е. (сбор включен) Долгосрочные - 2 года - 1800 у.е, 3 года - 2 650 у.е. (сбор включен) ШЕНГЕН БЕЗ СОБЕСЕДОВАНИЯ, БЕЗ ПРИСУТСТВИЯ, БЕЗ ЗАПИСИ В КОНСУЛЬСТВЕ!!!! Работаем со сложными случаями - мультивизы для уроженцев и жителей Кавказа и паспортов с отказами Аккредитации в Посольствах!!! ВИЗЫ в США, Великобританию, Кипр, Китай и др. страны ОПЛАТА деловых мульти-виз только ПОСЛЕ ВЫХОДА ВИЗЫ. ГАРАНТИЯ. Телефоны: +7 (495) 649 9170; +7 (499)3431902; (без выходных) СПЕЦИАЛЬНЫЕ ПРЕДЛОЖЕНИЯ ПО ТУРАМ, ОГРОМНАЯ БАЗА ГОРЯЩИХ ТУРОВ!!!!! ПРИГЛАШЕНИЯ для иностранцев, страхование на даты поездки, ПЕРЕВОДЫ документов. Телефоны: +7 (495) 649 9170; +7 (499)3431902 (без выходных) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3827 bytes Desc: not available URL: From merlenelk at abbottexcellence.com Thu Mar 10 10:37:26 2011 From: merlenelk at abbottexcellence.com (Blossom Merlene) Date: Thu, 10 Mar 2011 21:37:26 +0300 Subject: 100mg Viagra Online - 100 pills FOR $159.28 plus 10 FREE Pills Message-ID: <201103110237.D414666065EC83AABCA5AC@5g45o1u> Want Cheap Cialis? Buy 20mg x 10pills $30,90 Only! Buy Cheap Generic Viagra, Cialis, Levitra Online. Save With The Lowest Price. Secure Checkout, Visa & Mastercard Accepted. http://pillsmedshealth.ru From netservice at italmarket.com Thu Mar 10 20:51:25 2011 From: netservice at italmarket.com (=?koi8-r?B?8sHT3sXUIM7BzM/Hz9fPyiDOwcfS1drLyQ==?=) Date: Fri, 11 Mar 2011 11:51:25 +0700 Subject: =?koi8-r?B?68HLINbJ1NggwsXaIM/CzsHMyd7LySDJIMbJ0s0tz8TOz8TOxdfPyw==?= Message-ID: <9DB05BF7785F423FAE6A7A21FE8EBDDE@sunma> 18 марта \Моск. код/ 79221/22 <<>> 792/2i22 Налоговое планирование в условиях кризиса: как жить без обналички и фирм-однодневок и не разориться 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности…); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) – как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП – легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей Вся информация по тел: (Ч95) ЧЧ54О95 ; ЧЧ5Ч053 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4850 bytes Desc: not available URL: From francescofesta at bianca-mebel.ru Fri Mar 11 09:41:26 2011 From: francescofesta at bianca-mebel.ru (Quentin Lowery) Date: Fri, 11 Mar 2011 18:41:26 +0100 Subject: =?koi8-r?B?8NLB188g08/C09TXxc7Oz9PUySDOwSDPwt/Fy9TZIM7FxNfJ1snNz9PU?= =?koi8-r?B?yQ==?= Message-ID: <000d01cbe013$8b8aa1f0$6400a8c0@francescofesta> 16 Марта ПРАВО СОБСТВЕННОСТИ НА ОБЪЕКТЫ НЕДВИЖИМОСТИ Цель: Курс по освещению основных проблем участия объектов недвижимости в гражданском обороте. Программа мероприятия: Участие объектов недвижимости в гражданском обороте. Сделки по отчуждению объектов недвижимости. Спорные вопросы возникновения права собственности. Защита права собственности. Признание права собственности в суде. Виндикация, Условия удовлетворения виндикационного иска, понятие добросовестности приобретения недвижимости с учетом положений Постановления Пленумов Верховного Суда РФ и Высшего Арбитражного Суда РФ от 29.04.2010 ╧ 10/22. Негаторный иск: обзор современной судебной практики Лица, права которых могут быть защищены с помощью негаторного иска. Особенности виндикационных и негаторных споров: доказательства, участие в судебном процессе органов исполнительной власти. Обеспечительные меры в отношении объектов недвижимого имущества, реализация недвижимости (торги) на стадии исполнения принятых судебных актов арбитражных судов. Понятие самовольной постройки и незавершенного строительства: проблемы квалификации правоотношений. Земельные участки под объектами самовольного и незавершенного строительства. Вопросы легализации самовольных построек с учетом арбитражной практики. Регистрация прав на недвижимое имущество и сделок с ним √ проблемные вопросы 2009-2010 годов и возможности их решения. Случаи нестандартных отказов от госрегистрации права на примере рассмотрения судебных споров. По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (Ч95) 7/9.2.2.l-2.2 <> 792/21_2*2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2720 bytes Desc: not available URL: From deenavj at idc-ch2m.com Fri Mar 11 09:52:20 2011 From: deenavj at idc-ch2m.com (Gwyneth Deena) Date: Fri, 11 Mar 2011 22:52:20 +0500 Subject: Why You Need to Buy Penis Pills? Message-ID: <201103112351.CBF4393ABE4A510F816DFDE@g17o01psn> Why You Need to Buy Penis Pills? If you choose the right penis enhancement pills that work for you, you will find yourself unwilling to go back to how "sex used to be." Men use male enhancement supplements for a wide range of reasons. Indeed, there are certain factors that can interfere with a man's optimum enjoyment of sex - lifestyle, health habits, stress, aging, and many others. Many men would like to counter the effect of these factors by taking penis pills. For some, they want to improve certain aspects of their sexuality, such as: - Shortening the time it takes to achieve erection - Improving quality of erection - attaining harder, firmer and longer-lasting erections - Increase semen volume - Enhance sperm motility and virility - Increase sexual drive and libido - Heighten sexual stamina - Achieve more intense, longer and more frequent orgasms http://longpenislike.ru From terafilomenacw at jathomas.com Fri Mar 11 13:25:20 2011 From: terafilomenacw at jathomas.com (Tera Filomena) Date: Sat, 12 Mar 2011 02:25:20 +0500 Subject: Get 4 Free Viaga pills with each order and 12 Free Viagra Pills for order more than $300 Message-ID: <21g31x91z96-14088323-681j9d89@xxhbxvruee> Viagra Online Store - Buy Viagra | Cialis | Levitra from us Get 4 Free Viaga pills with each order and 12 Free Viagra Pills for order more than $300 http://healthmedicmedicine.ru From olfactorylocks at zelesa.lt Fri Mar 11 23:22:42 2011 From: olfactorylocks at zelesa.lt (=?koi8-r?B?79DUyc3J2sHDydEgzsHMz8fP1w==?=) Date: Sat, 12 Mar 2011 13:22:42 +0600 Subject: =?koi8-r?B?+sHU0sHUztnFINPIxc3ZIMTM0SDP0NTJzcnawcPJySDOwczPx8/X?= Message-ID: <0997E4FC021D4C6A8A26D6FA8B5860CE@microsofc88bb1> 22 марта 2О1l Тема: Затратные механизмы в налоговых схемах для оптимизации НДС и налога на прибыль +7 (495) 7-42*9I*98 \\// 445З9-68 Цель: Курс посвящен изучению затратых механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Участники получат краткие индивидуальные консультации по тематике данного курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные","серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов – ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. 4. Виды приемлимых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 5. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 6. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 7. Ответы на вопросы. По желанию и при наличии возможности – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Вся информация по тел: +7 (Ч95) 4-Ч5_Ч*О.95 и Ч45З9-68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6693 bytes Desc: not available URL: From info16216 at FedEx.com Sat Mar 12 02:10:59 2011 From: info16216 at FedEx.com (FedEx notification robot) Date: Sat, 12 Mar 2011 15:40:59 +0530 Subject: FedEx notification #01805 Message-ID: <01cbe0cb$e24f1e90$0201a8c0@info16216> important information in attach file -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 366 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: FedEx.zip Type: application/zip Size: 9946 bytes Desc: not available URL: From democracy.still.works at gmail.com Sat Mar 12 14:03:54 2011 From: democracy.still.works at gmail.com (Democracy) Date: Sat, 12 Mar 2011 17:03:54 -0500 Subject: The Cypherpunk Revolutionary Julian Assange In-Reply-To: References: Message-ID: On 4 March 2011 18:43, John Young wrote: > Full 19-page essay by AU politics professor Robert Manne: > > http://cryptome.org/0003/assange-manne.zip (6.2MB) > So that's a link to a zip file, containing an html file which is just a link to another html file available online? Good show, jolly good show! From jya at pipeline.com Sat Mar 12 14:48:00 2011 From: jya at pipeline.com (John Young) Date: Sat, 12 Mar 2011 17:48:00 -0500 Subject: The Cypherpunk Revolutionary Julian Assange In-Reply-To: References: Message-ID: Ah ha, you cracked the last of Kryptos Part 4. What's it say? http://www.kryptos-cia.com/Krytos%20Secret.htm Don't miss the misspelling in the URL. From info at odrerir.com Sat Mar 12 22:03:39 2011 From: info at odrerir.com (=?koi8-r?B?88jFzdkg2sHU0sHU?=) Date: Sun, 13 Mar 2011 13:03:39 +0700 Subject: =?koi8-r?B?+sHU0sHUztnFINPIxc3ZIMTM0SDP0NTJzcnawcPJySDOwczPx8/X?= Message-ID: <4115E57D233E4EA4B036CA5809AC8793@xpwindows7> двадцать второе марта Тема: Затратные схемы для оптимизации налогов (НДС, Налог на прибыль) (Ч95). 792-2122 \\\/// 7_9*2.2_|-2.2 Цель: Курс посвящен изучению затратых механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Участники получат краткие индивидуальные консультации по тематике данного курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные","серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов – ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. 4. Виды приемлимых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 5. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 6. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 7. Ответы на вопросы. По желанию и при наличии возможности – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Информацию можно получить по телефонам: +7 (код Москвы) 445/32_66 <<>> 445З9*68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6723 bytes Desc: not available URL: From Javier2986 at 2u-itswholesale.com Sun Mar 13 20:05:07 2011 From: Javier2986 at 2u-itswholesale.com (EmporioArmani Chanel, Concord-best offer.) Date: Mon, 14 Mar 2011 04:05:07 +0100 Subject: Smart Swiss watch and souvenirs Message-ID: <623kax8551655429.98330076528Wz4UV5A12365.68687KIJX5940pwkmrxC9C7lccA-940248nb-B64039525153.44v196so6g464382.96072.64610@hurrah.skim.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 624 bytes Desc: not available URL: From buh at olympic-2010.ru Sun Mar 13 22:29:10 2011 From: buh at olympic-2010.ru (=?koi8-r?B?8sXLz83FzsTBw8nJICDP1CDm9PMg?=) Date: Mon, 14 Mar 2011 08:29:10 +0300 Subject: =?koi8-r?B?9/zkIMvPzdDBzsnJOiDp2s3FzsXOydEg1MHNz9bFzs7Px88gy8/ExcvT?= =?koi8-r?B?wQ==?= Message-ID: <9DD40633DD734E249E4B45BDE57F70E2@COMP07> Участникам ВЭД Тема: Внешнеторговая сделка и ее таможенное оформление в 2011 г. 17 марта С 1 ноября 2010г. вступил в силу приказ ФТС об отмене таможенного транзита грузов прибывших на территорию РФ морским и воздушным транспортом. С 1 января 2011г. вводятся новые формы таможенных документов (декларация на товары, транзитная декларация, декларация таможенной стоимости и др.) и новый порядок их заполнения. С 1 января 2011г. вступили в силу отдельные нормы таможенного кодекса в отношении юридических и физических лиц, осуществляющих деятельность в сфере таможенного регулирования. С 1 января 2011г. ФТС внедряет таможенные процедуры и технологии, предусматривающие, в том числе, переход на электронное декларирование при экспорте и импорте товаров без предоставления в таможенные органы соответствующих документов на бумажных носителях. (Ч95) 7*9.2*2_l.2/2 \\\/// 7Ч2_9I.98 Цель: Ознакомится с действующими конвенциями в области внешнеторговой сделки. Помочь участникам ВЭД избежать ошибок при осуществлении внешнеторговой сделки. Минимизировать риски и оптимизировать действия при осуществлении внешнеторговой сделки. Программа: Организации внешнеторговой сделки на международных рынках. Разработка стратегии компании в области внешнеэкономической деятельности (ВЭД). Оценка доли и места компании в конкретном сегменте рынка. Источники информации для анализа рынка и конкурентов. Место и роль службы ВЭД в организационной структуре компании. Задачи, функции, должностные обязанности сотрудников службы ВЭД. Использование информационных технологий во ВЭД. Классификация иностранных компаний. Особенности выбора и построения взаимоотношений с различными категориями иностранных партнёров Риски во внешнеэкономической деятельности, их классификация и способы минимизации. Особенности реализации внешнеторговой сделки. Внешнеэкономическая сделка - этапы и способы её оформления. Структура и содержание внешнеторгового контракта купли-продажи. Оплата внешнеторговых сделок. Система валютного регулирования и валютного контроля внешнеторговых операций. Налогообложение внешнеторговых операций. Проблемы возмещения НДС. Особенности подготовки основных документов для реализации внешнеторговой сделки и таможенного оформления товаров:- инвойсы; - спецификации; - упаковочные листы; - международные транспортные документы; - сертификаты; - санитарно-эпидемиологические заключения; - прайс-листы; - экспортные декларации; Таможенное оформление внешнеторговых грузов. Нормативно-правовая база таможенного регулирования ВЭД. Тарифные и нетарифные методы регулирования внешнеторговых сделок. - Задачи, функции и структура таможенных органов РФ. Классификация товаров и товарная номенклатура внешнеэкономической деятельности. Товары "группы риска" и "группы прикрытия". - Страна происхождения товара и система преференций РФ. Как использовать режим преференций в целях экономии таможенных платежей. Таможенная стоимость товаров. Как правильно определить, подтвердить и отстоять таможенную стоимость. Порядок расчета и сроки уплаты таможенных платежей. - Декларирование и таможенное оформление внешнеторговых грузов. "Серые" схемы таможенного оформления. Предпринимательские и таможенные риски и способы их минимизации. - Таможенный контроль внешнеторговых операций и оптово-розничной торговли импортными товарами. Стоимость участия 7500 руб. Вся информация по тел: +7 (код Москвы) Ч45.З2.66 <<>> 4Ч5_4О95 *** 19-20 Января 2011 г. Нововведения в таможенное законодательстве: новые формы таможенных деклараций и новый порядок декларирования, контроля и корректировки таможенной стоимости товаров с 01 января 2011 года. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6476 bytes Desc: not available URL: From expert at stroyfintrast.ru Mon Mar 14 12:31:55 2011 From: expert at stroyfintrast.ru (=?koi8-r?B?+sHU0sHU2SDJIM7BzM/HyQ==?=) Date: Mon, 14 Mar 2011 11:31:55 -0800 Subject: =?koi8-r?B?68HLIM3P1s7PIMkgy8HLIM7FzNja0SDP0NTJzcnaydLP18HU2CDOwczP?= =?koi8-r?B?x8k=?= Message-ID: <601A9FD4B20841129826600FF46B7FB6@subhash449f30f> двадцать второе марта Тема: Затратные механизмы в налоговых схемах для оптимизации НДС и налога на прибыль +7 (495) 792-2I.22 или ЧЧ/5Ч/О95 Цель: Курс посвящен изучению затратых механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Участники получат краткие индивидуальные консультации по тематике данного курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные","серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов – ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. 4. Виды приемлимых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 5. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 6. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 7. Ответы на вопросы. По желанию и при наличии возможности – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Вся информация по тел: +7 (Ч95) 7Ч2/9l/98 **** 4Ч*53/96.8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6743 bytes Desc: not available URL: From jays at panix.com Mon Mar 14 12:07:38 2011 From: jays at panix.com (Jay Sulzberger) Date: Mon, 14 Mar 2011 15:07:38 -0400 (EDT) Subject: [Freedombox-discuss] ZRTP is free software, and is used Message-ID: On Mon, 14 Mar 2011, Jay Sulzberger wrote: > > http://www.panix.com/~jays/David.Sugar.2011-3-14.announce.odt > > oo--JS. Here is the official announcement: http://www.gnutelephony.org/index.php/GNU_Free_Call_Announcement oo--JS. _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From maicel382 at applescript.ru Mon Mar 14 01:19:51 2011 From: maicel382 at applescript.ru (=?koi8-r?B?78bJ0w==?=) Date: Mon, 14 Mar 2011 17:19:51 +0900 Subject: =?koi8-r?B?887JzdUgz8bJ0yDXIO3P08vXxQ==?= Message-ID: <818984092.59673250155856@applescript.ru> Сниму офис на условиях долгосрочной аренды без посредников. Требования Площадь: 100 √ 150 кв.м. Этажность: не важно. Расположение помещения (Бизнес центр, офисное помещ., жил. дом, ): не важно Местоположение: г. Москва Округ: кроме севера и северо-запада Расположение: за пределами садового кольца Удаленность от метро: не более 5 мин. пешком Удаленность от садового кольца: не более 3х станций метро. Цель использования помещения: офис консалтинговой фирмы. Состояние помещений: отремонтированные, кондиционируемые. Телефоны: обязательно, кол-во не важно, требуется возможность подключения, дополнительных линий. Интернет: обязательно Уважаемые посредники! просьба не предлагать Ваши услуги. По предложениям аренды просьба звонить: (96З) 682-5592 From evgenyd at ivvs.ru Mon Mar 14 11:31:04 2011 From: evgenyd at ivvs.ru (=?koi8-r?B?z9DUyc3J2sHDydEg7uTz?=) Date: Mon, 14 Mar 2011 19:31:04 +0100 Subject: =?koi8-r?B?89TSwdTFx8nRINrB1NLB1CDEzNEg1c3Fztjbxc7J0SDOwczPx8/XLg==?= Message-ID: двадцать второе марта Тема: Затратные схемы для оптимизации налогов (НДС, Налог на прибыль) (код Москвы) 7/42.9|_98 или ЧЧ-54*О95 Цель: Курс посвящен изучению затратых механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Участники получат краткие индивидуальные консультации по тематике данного курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные","серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов – ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. 4. Виды приемлимых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 5. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 6. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 7. Ответы на вопросы. По желанию и при наличии возможности – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. За более подробной информацuей обpащайтеcь по тел: +7 (код Москвы) 4Ч.539/68 <> 7_42_9i.98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6720 bytes Desc: not available URL: From buh at morfo.ru Mon Mar 14 10:38:06 2011 From: buh at morfo.ru (=?koi8-r?B?xsnSzcEtz8TOz8TOxdfLwQ==?=) Date: Mon, 14 Mar 2011 19:38:06 +0200 Subject: =?koi8-r?B?68HLINbJ1NggwsXaIM/CzsHMyd7LySDJIMbJ0s0tz8TOz8TOxdfPyw==?= Message-ID: <4254FB3B91C04CDA93C2ABC6B600AC0A@danielad19e313> 18 марта код: (четыре девять пять) 7922i_22 \\// Ч4_5Ч_095 Налоговое планирование в условиях кризиса: как жить без обналички и фирм-однодневок и не разориться 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности…); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) – как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП – легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей Информацию можно получить по телефонам: (код Москвы) 44539_68 \\\/// Ч45*32.66 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3977 bytes Desc: not available URL: From eugen at leitl.org Mon Mar 14 12:16:18 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 14 Mar 2011 20:16:18 +0100 Subject: [Freedombox-discuss] ZRTP is free software, and is used Message-ID: <20110314191618.GQ23560@leitl.org> ----- Forwarded message from Jay Sulzberger ----- From stainingtvx at autumnmusefilm.com Mon Mar 14 07:17:16 2011 From: stainingtvx at autumnmusefilm.com (Amparo Ervin) Date: Mon, 14 Mar 2011 21:17:16 +0700 Subject: Key chain of famous brand is what you need to be fully fashionable.. Copy of a Chopard watch will let your wallet stay thick. Message-ID: <815137814.25693057323662@autumnmusefilm.com> D&G replica watch will fit any lady’s wrist for sure.. Looking for D&G replica watch? You can buy it in our store.   our store -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 665 bytes Desc: not available URL: From kimberleewgidgetjh at novellus.com Mon Mar 14 09:07:25 2011 From: kimberleewgidgetjh at novellus.com (Kimberlee Gidget) Date: Tue, 15 Mar 2011 00:07:25 +0800 Subject: If you choose the right penis enhancement pills that work for you, you will find yourself unwilling to go back to how "sex used to be. Message-ID: <4d7e3d3d.f6f30d06@novellus.com> Why You Need to Buy Penis Pills? If you choose the right penis enhancement pills that work for you, you will find yourself unwilling to go back to how "sex used to be." Men use male enhancement supplements for a wide range of reasons. Indeed, there are certain factors that can interfere with a man's optimum enjoyment of sex - lifestyle, health habits, stress, aging, and many others. Many men would like to counter the effect of these factors by taking penis pills. For some, they want to improve certain aspects of their sexuality, such as: - Shortening the time it takes to achieve erection - Improving quality of erection - attaining harder, firmer and longer-lasting erections - Increase semen volume - Enhance sperm motility and virility - Increase sexual drive and libido - Heighten sexual stamina - Achieve more intense, longer and more frequent orgasms http://longpenislike.ru From schneier at SCHNEIER.COM Mon Mar 14 23:23:43 2011 From: schneier at SCHNEIER.COM (Bruce Schneier) Date: Tue, 15 Mar 2011 01:23:43 -0500 Subject: CRYPTO-GRAM, March 15, 2011 Message-ID: CRYPTO-GRAM March 15, 2011 by Bruce Schneier Chief Security Technology Officer, BT schneier at schneier.com http://www.schneier.com A free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise. For back issues, or to subscribe, visit . You can read this issue on the web at . These same essays and news items appear in the "Schneier on Security" blog at , along with a lively comment section. An RSS feed is available. ** *** ***** ******* *********** ************* In this issue: Anonymous vs. HBGary News Schneier News NIST Defines New Versions of SHA-512 ** *** ***** ******* *********** ************* Anonymous vs. HBGary One of the effects of writing a book is that I don't have the time to devote to other writing. So while I've been wanting to write about Anonymous vs. HBGary, I don't think I will have time. Here's an excellent series of posts on the topic from ArsTechnica. In cyberspace, the balance of power is on the side of the attacker. Attacking a network is *much* easier than defending a network. That may change eventually -- there might someday be the cyberspace equivalent of trench warfare, where the defender has the natural advantage -- but not anytime soon. http://arstechnica.com/tech-policy/news/2011/02/anonymous-to-security-firm-working-with-fbi-youve-angered-the-hive.ars or http://tinyurl.com/5t35y7m http://arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars or http://tinyurl.com/6xhleht http://arstechnica.com/tech-policy/news/2011/02/virtually-face-to-face-when-aaron-barr-met-anonymous.ars or http://tinyurl.com/4n8rohh http://arstechnica.com/tech-policy/news/2011/02/the-ridiculous-plan-to-attack-wikileaks.ars or http://tinyurl.com/4nv4jat http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars or http://tinyurl.com/6579grz http://arstechnica.com/tech-policy/news/2011/02/black-ops-how-hbgary-wrote-backdoors-and-rootkits-for-the-government.ars or http://tinyurl.com/6fw4s5u This is a really good piece by Paul Roberts on Anonymous vs. HBGary: not the tactics or the politics, but what HBGary demonstrates about the IT security industry. http://threatpost.com/en_us/blogs/rsa-2011-winning-war-losing-our-soul-022211 or http://tinyurl.com/48tgfee Stephen Colbert on HBGary: http://www.colbertnation.com/the-colbert-report-videos/375428/february-24-2011/corporate-hacker-tries-to-take-down-wikileaks or http://tinyurl.com/46gaa9d http://www.colbertnation.com/the-colbert-report-videos/375429/february-24-2011/corporate-hacker-tries-to-take-down-wikileaks---glenn-greenwald or http://tinyurl.com/4p4zp3l Another article: http://www.h-online.com/security/features/Anonymous-makes-a-laughing-stock-of-HBGary-1198176.html or http://tinyurl.com/63fekyp ** *** ***** ******* *********** ************* News Interesting article from Wired: "How a Remote Town in Romania Has Become Cybercrime Central." http://www.wired.com/magazine/2011/01/ff_hackerville_romania/all/1 Recently declassified: "Historical Study: The National Security Agency Scientific Advisory Board 1952b1963." http://www.governmentattic.org/4docs/NSA-SAB52-63_1965.pdf A physical biometric wallet: $825. http://www.dunhill.com/en-us/shoponline/leather/wallets/biometric-wallet-qgk0169 or http://tinyurl.com/4f2f345 http://www.thetechherald.com/article.php/201105/6754/Dunhill-biometric-wallet-provides-protection-for-the-rich or http://tinyurl.com/4n8v53e I don't think I understand the threat model. If your wallet is stolen, you're going to replace all your ID cards and credit cards and you're not going to get your cash back -- whether it's a normal wallet or this wallet. I suppose this wallet makes it less likely that someone will use your stolen credit cards quickly, before you cancel them. But you're not going to be liable for costs incurred during that delay in any case. Interesting story about a con man who conned the U.S. government, and how the government is trying to hide its dealings with him. http://www.nytimes.com/2011/02/20/us/politics/20data.html Susan Landau's testimony before the House Judiciary Committee, Subcommittee on Crime, Terrorism, and Homeland Security on government eavesdropping. http://judiciary.house.gov/hearings/hear_02172011.html The testimony of Valerie Caproni, General Counsel of the FBI, on the same topic. http://www.fbi.gov/news/testimony/going-dark-lawful-electronic-surveillance-in-the-face-of-new-technologies or http://tinyurl.com/46l49am Good article about the terrorist non-threat from Reason: http://reason.com/archives/2011/02/15/what-islamist-terrorist-threat "Reliably Erasing Data From Flash-Based Solid State Drives," by Michael Wei, Laura M. Grupp, Frederick E. Spada, and Steven Swanson. http://www.usenix.org/events/fast11/tech/full_papers/Wei.pdf News article: http://www.theregister.co.uk/2011/02/21/flash_drive_erasing_peril/ Video of talk: http://www.usenix.org/multimedia/fast11wei NIST has finally published its rationale for selecting the five SHA-3 finalists. http://csrc.nist.gov/groups/ST/hash/sha-3/Round2/documents/Round2_Report_NISTIR_7764.pdf or http://tinyurl.com/4zte3e2 Pickpocketing as a trade is dying out in America, because there's no one to train newer pickpockets in the craft. http://www.slate.com/id/2286010/pagenum/all/ Interesting research in using animals to detect substances. Basically, sniffer dogs respond to unconscious cues from their handlers, and generate false alarms because of them. It makes sense, as dogs are so attuned to humans. I'll bet bomb-sniffing bees don't make the same mistakes. http://www.economist.com/blogs/babbage/2011/02/animal_behaviour Full paper: http://www.springerlink.com/content/j477277481125291/fulltext.pdf Bomb-sniffing bees: http://www.livescience.com/4605-bees-trained-bomb-sniffers.html "American Cryptography During the Cold War 1945-1989; Book IV: Cryptologic Rebirth 1981-1989." Document was first declassified in 2009. Here are some newly declassified pages. http://www.governmentattic.org/4docs/NSA_AmerCryptColdWarBk4_1999.pdf http://www.governmentattic.org/4docs/oNSAAmerCryptColdWarBk4_1999.pdf Criminals are stealing cars by calling tow trucks. It's a clever hack, but an old problem: the authentication in these sorts of normal operations isn't good enough to prevent abuse. http://www.wsmv.com/news/26878155/detail.html A programmer installed malware into the Whack-a-Mole arcade game as a form of job security. It didn't work. http://www.wftv.com/news/26986709/detail.html Wired.com has a good three-part story on full-body scanners. http://www.wired.com/threatlevel/2011/02/scanners-part1/ http://www.wired.com/threatlevel/2011/03/scanners-part2/ http://www.wired.com/threatlevel/2011/03/scanners-part3/ Another attempt to sort out scanner claims: http://www.okianwarrior.com/MathView/BackscatterSafety/ Using language patterns to identify anonymous email. It only works when there's a limited number of potential authors. http://www.schneier.com/blog/archives/2011/03/using_language.html ** *** ***** ******* *********** ************* Schneier News I'm speaking at Black Hat Europe in Barcelona on March 17. http://www.blackhat.com/html/bh-eu-11/bh-eu-11-home.html I'm speaking at the Oracle Chief Security Officer Summit in New York City on March 30. http://www.oracle.com/us/dm/65212-wwmk09121721mpp414-se-281577.html This three-part video interview with me was conducted at the RSA Conference last month. http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1528091,00.html or http://tinyurl.com/4q9vt45 http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1528245,00.html or http://tinyurl.com/4dezbsk http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1528160,00.html or http://tinyurl.com/4bawfzq I was interviewed on chomp.fm. http://chomp.fm/008/ ** *** ***** ******* *********** ************* NIST Defines New Versions of SHA-512 NIST has just defined two new versions of SHA-512. They're SHA-512/224 and SHA-512/256: 224- and 256-bit truncations of SHA-512 with a new IV. They've done this because SHA-512 is faster than SHA-256 on 64-bit CPUs, so these new SHA variants will be faster. This is a good thing, and exactly what we did in the design of Skein. We defined different outputs for the same state size, because it makes sense to decouple the internal workings of the hash function from the output size. http://csrc.nist.gov/publications/drafts/fips180-4/FRN_Draft-FIPS180-4.pdf or http://tinyurl.com/47fta7g http://csrc.nist.gov/publications/PubsDrafts.html#fips-180-4 ** *** ***** ******* *********** ************* Since 1998, CRYPTO-GRAM has been a free monthly newsletter providing summaries, analyses, insights, and commentaries on security: computer and otherwise. You can subscribe, unsubscribe, or change your address on the Web at . Back issues are also available at that URL. Please feel free to forward CRYPTO-GRAM, in whole or in part, to colleagues and friends who will find it valuable. Permission is also granted to reprint CRYPTO-GRAM, as long as it is reprinted in its entirety. CRYPTO-GRAM is written by Bruce Schneier. Schneier is the author of the best sellers "Schneier on Security," "Beyond Fear," "Secrets and Lies," and "Applied Cryptography," and an inventor of the Blowfish, Twofish, Threefish, Helix, Phelix, and Skein algorithms. He is the Chief Security Technology Officer of BT BCSG, and is on the Board of Directors of the Electronic Privacy Information Center (EPIC). He is a frequent writer and lecturer on security topics. See . Crypto-Gram is a personal newsletter. Opinions expressed are not necessarily those of BT. Copyright (c) 2011 by Bruce Schneier. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Mar 15 00:59:48 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 15 Mar 2011 08:59:48 +0100 Subject: CRYPTO-GRAM, March 15, 2011 Message-ID: <20110315075948.GV23560@leitl.org> ----- Forwarded message from Bruce Schneier ----- From rebbeccamaribethgg at wine.net Mon Mar 14 21:01:01 2011 From: rebbeccamaribethgg at wine.net (Rebbecca Maribeth) Date: Tue, 15 Mar 2011 12:01:01 +0800 Subject: Percocet online cheap. No prescription required! Message-ID: <4d7ee47d.50ff175e@wine.net> s1,6@ Percocet online cheap. No prescription required! Buy PERCOCET online without Rx and save your money! ... CLICK HERE TO BUY PERCOCET ONLINE WITH HUGE DISCOUNT! UP TO 80% OFF! http://cheapmedsfind.ru s1,6@ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 553 bytes Desc: not available URL: From eugen at leitl.org Tue Mar 15 07:29:07 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 15 Mar 2011 15:29:07 +0100 Subject: Cell phones are 'Stalin's dream,' says free software movement founder Message-ID: <20110315142907.GB23560@leitl.org> http://www.networkworld.com/cgi-bin/mailto/x.cgi?pagetosend=/news/2011/031411-richard-stallman.html&pagename=/news/2011/031411-richard-stallman.html&pageurl=http://www.networkworld.com/news/2011/031411-richard-stallman.html&site=printpage&nsdr=n Cell phones are 'Stalin's dream,' says free software movement founder Richard Stallman: iPhones and Androids are 'Big Brother' tracking devices By Jon Brodkin, Network World March 14, 2011 05:47 PM ET Richard Stallman Nearly three decades into his quest to rid the world of proprietary software, Richard Stallman sees a new threat to user freedom: smartphones. "I don't have a cell phone. I won't carry a cell phone," says Stallman, founder of the free software movement and creator of the GNU operating system. "It's Stalin's dream. Cell phones are tools of Big Brother. I'm not going to carry a tracking device that records where I go all the time, and I'm not going to carry a surveillance device that can be turned on to eavesdrop." Stallman firmly believes that only free software can save us from our technology, whether it be in cell phones, PCs, tablets or any other device. And when he talks about "free," he's not talking about the price of the software -- he's talking about the ability to use, modify and distribute software however you wish. Stallman founded the free software movement in the early- to mid-1980s with the creation of the GNU project and the Free Software Foundation, of which he is still president. ON BOARD: Microsoft: 'We love open source' When I asked Stallman to list some of the successes of the free software movement, the first thing that came up was Android -- not Google's version of Android, but rather a third-party version of the mobile OS in which all proprietary software has been stripped out. "It just recently became possible to run some very widely used phones with free software," Stallman said. "There's a version of Android called Replicant that can run on the HTC Dream phone without proprietary software, except in the U.S. In the U.S., as of a few weeks ago there was still a problem in some dialing library, although it worked in Europe. By now, maybe it works. Maybe it doesn't. I don't know." Although Android is distributed with free software licenses, Stallman notes that manufacturers can ship the devices with non-free executables, which users cannot replace "because there is a device in the phone that checks if the software is changed and won't let the modified executables run." Stallman calls it "tivoization," because TiVo uses free software but lays down hardware restrictions to prevent it from being altered. "If the manufacturer can replace the executable but you can't, then the product is a jail," he says. Theoretically, Stallman says, phones that use only free software can protect themselves from the danger of electronic eavesdropping. "If it's all free software, you can probably protect yourself from that, because that's caused by the software in the phone," he says. Ironically enough, Stallman was speaking to me on a cell phone. Not his own, of course, but one he borrowed from a friend in Spain while on a European speaking tour. Over the course of 38 minutes, our connection was lost five times, including just after Stallman's comments about electronic eavesdropping and free software for phones. We tried to connect again several hours later but were unable to complete the interview via phone. Stallman answered the rest of my questions over e-mail. Sacrificing convenience is something Stallman is used to. He won't use Windows or Mac, obviously, and even software such as Ubuntu, perhaps the most popular operating system based on GNU and the Linux kernel, does not meet his free software requirements. Few people are willing to make the sacrifices he will for the goal of software freedom, Stallman acknowledges. "The decisions anyone makes depend on values," he says. "And most people are taught to think about software purely as a matter of price and performance, not whether it respects your freedom. People who make decisions on those values will not make any sacrifice of convenience to get free software, whereas I am willing to work for years and years and years to have no proprietary software in my computer." Stallman does his computing on a Lemote Yeeloong laptop running gNewSense, a GNU/Linux distribution composed only of free software. "There are some things I can't do. I'm using a rather slow computer because it's the only laptop with a free BIOS," Stallman says. gNewSense is the only totally free distribution that will run on the Lemote, which has a MIPS-like processor, he says. The Lemote had come with another GNU/Linux distribution that included non-free software, and Stallman replaced it with gNewSense. Stallman, 57, experienced software sharing for the first time when he began working at the MIT Artificial Intelligence Lab in 1971. The sharing community broke down in the early 1980s around the same time that Digital Equipment Corp. discontinued a mainframe hardware platform the community relied upon. Stallman could have joined the proprietary software world if he had been willing to "sign nondisclosure agreements and promise not to help my fellow hacker," he says. Instead, he pioneered the free software movement. Stallman is a fascinating figure in the world of computing, admired by many individuals and reviled by companies such as Microsoft which see a threat from software they can't make a profit from. Stallman has failed to break the Microsoft/Apple dominance of the desktop computer market, not to mention Apple's dominance of tablets. But the free software movement he created did lead to the proliferation of Linux-based servers which are prevalent in data centers and power much of the Internet. This is perhaps ironic because Stallman expresses resentment about the credit given to the Linux kernel at the expense of his own GNU operating system. Stallman says he is "somewhat" proud of the proliferation of free server software, "but I'm more concerned with the size of the problem that needs to be corrected than with how far we have already come." Free software in data centers is nice, but "with the goal of giving users freedom, their own desktops, laptops and phones are the computers that affect their freedom most." The focus is mainly on software rather than hardware, but the movement insists on "hardware that comes with specs so that we can write free software to support it fully," he says. "It is unconscionable to offer hardware for sale and refuse to tell the purchaser how to use it. This ought to be illegal." Before agreeing to an interview with Network World, Stallman demanded that this article use his preferred terminology -- e.g. "free software" instead of "open source" and "GNU/Linux" instead of just "Linux." He also requested that the interview be recorded and that, if the recording were distributed online, that it be done so in a format that works with free software. There are four essential software freedoms, Stallman explained. "Freedom Zero is the freedom to run the program as you wish. Freedom 1 is the freedom to study the source code, and change it so the program does your computing as you wish. Freedom 2 is the freedom to help others; that's the freedom to make and distribute exact copies when you wish. And Freedom 3 is the freedom to contribute to your community, which is the freedom to distribute copies of your modified versions when you wish." Stallman came up with the term "copyleft" to indicate licenses that ensure free software code cannot be redistributed in proprietary products. The key to Stallman's philosophy is this: "Without those four freedoms, the owner controls the program and the programs control the users," he says. "So the program is simply an instrument of unjust power. The users deserve freedom to control their computing. A non-free program is a system of unjust power and shouldn't exist. The existence and use of non-free software is a social problem. It's an evil. And our aim is a world without that problem." "That problem" wasn't caused by one company in particular, but Microsoft is usually the most frequently criticized by people like Stallman. "They continue regarding us as their enemy," Stallman says. Ten years ago, Microsoft CEO Steve Ballmer famously called Linux a "cancer." Microsoft has softened its public tone since then, but Stallman is not impressed: "They have in some ways learned to be a bit more subtle but their goal is that people should use Windows and not a free operating system." After that thought, our phone connection was lost again. Other than Microsoft, Stallman calls out "Apple and Adobe, and Oracle and lots of others that make proprietary software and pressure people to use it." Google "does some good things and some bad," Stallman says. "It has released useful free software such as the WebM codec, and is moving YouTube to distribute that way. However, the new Google Art Project can only be used through proprietary software." Stallman is also at odds with some people in what is known as the open source community. Open source advocates clearly sprung out of the free software movement, and most open source software also counts as free software. But Stallman says that people who identify as open source advocates tend to view the access to source code as a practical convenience and ignore the ethical principles of software freedom. Various vendors have jumped on the open source bandwagon without embracing the principles that Stallman believes should be at the heart of free software. "I don't want to make this seem too one-sided," Stallman says. "Certainly a lot of people who hold open source views have worked on useful programs that are free and also some of those companies have funded work on useful programs that are free. So that work is good. But at the same time, at a deeper level, the focus on open source leads people's attention away from the idea that they deserve freedom." One of Stallman's targets is Linus Torvalds, creator of the Linux kernel and one of the most famous figures in the world of free software. Stallman and his crew worked on the GNU operating system for most of the 1980s, but there was one missing piece: a kernel, which provides resources from the hardware to programs that run on the computer. This gap was filled by Torvalds in 1991 when he developed Linux, a Unix-like kernel. Systems using the Linux kernel are usually called just "Linux," but Stallman has fought for years to get people to use his preferred term, "GNU/Linux." Stallman "wanted to make sure GNU got proper credit," says Miguel de Icaza of Novell, who created the free software program GNOME but has been criticized by Stallman for partnering with Microsoft and selling proprietary software. "When Linux came out, Richard didn't take it very seriously for a while, and he kept working on his own kernel. It was only when Linux took the spotlight that he felt, to some extent, his project had not been given enough credit. The problem is, what happened at the time was there was a new community that was created out of the blue that wasn't necessarily aligned with GNU." The GNU kernel, called Hurd, is still "under active development," according to the project's Web site. Torvalds' contribution to free software will be widely celebrated this year during the 20th anniversary of the Linux kernel. But Stallman won't be one of his cheerleaders, and it's not just because of the naming dispute. "I don't admire a person who says freedom is not important," Stallman says. "Torvalds set a bad example for the community by publicly using a non-free program for the maintenance of Linux (his kernel, which is his main contribution to the GNU/Linux system). I criticized him for this, and so did others. When he stopped, it was not by choice. More recently, he rejected [the] GPL version 3 for Linux because it protects the users' freedom from tivoization. His rejection of GPLv3 is why most Android phones are jails." Even Red Hat and Novell, known widely as open source supporters, don't get a ringing endorsement. "Red Hat partly supports free software. Novell much less," he says, noting that Novell has a patent agreement with Microsoft. Despite outward pessimism, Stallman does see a few positives spurred by his quest for software freedom. When he's not at his Cambridge, Mass., home, which is most of the time, Stallman is roaming the world giving speeches and holding discussions about free software. Before traveling to Spain, Stallman stopped off in London to give a speech in which he called Windows "malware," and met with a couple members of Parliament to explain free software issues. He often gets a better reception in Europe than at home. "In the U.S., awareness of free software has been almost completely pushed under the rug by open source. As a result, you'd never find people in any government position who'd want to talk to me," he says. Outside of North America, some governments are embracing free software. "I found out yesterday that in France, the state agencies are continuing to move to free software," he says. "There's no systematic policy requiring them to but they're doing so more and more. And in some countries, for instance in Ecuador, there is an explicit policy for state agencies to move to free software and any agency that wants to continue using non-free software has to apply for a temporary exception, permission to do so." Although Stallman didn't mention it, the Russian government is requiring agencies to replace proprietary software with free alternatives by 2015 in a bid to improve both economics and security, according to The Wall Street Journal. In addition to free software, Stallman is devoted to political issues, and writes a blog for The Huffington Post. In fact, he sees little distinction between the corporations threatening software freedom and "the scoundrels in Washington" who are beholden to corporate donations. In the recent Wisconsin union protests, Stallman sees something of his own spirit. "Sometimes freedom requires a sacrifice and most Americans are not willing to make any sacrifices for their freedom," he says. "But maybe the protesters in Wisconsin are starting to change that." Corporations and mass media "have to a large extent convinced Americans ... that they're not entitled to refuse businesses whatever businesses want. Well, we need a spirit of resistance in America. We need to recover the spirit of freedom with which we created the United States." Follow Jon Brodkin on Twitter: www.twitter.com/jbrodkin Read more about software in Network World's Software section. From slteisharg at aem1.com Tue Mar 15 09:19:38 2011 From: slteisharg at aem1.com (Shante Teisha) Date: Tue, 15 Mar 2011 17:19:38 +0100 Subject: For Visa owners only! Free Shipping, Free Consultation! Up to 40% Loyalty Bonus. Message-ID: <201103151218.90C7CF99A75E3ADD0B940@5f4k055r9z> Cheap viagra and cialis, stay longer For Visa & Master owners! Free Shipping, Free Consultation! Up to 40% Loyalty Bonus. Safe Generic medications from non US Licensed(!) pharmacy. 100% Satisfaction Guaranteed http://tablettoxicspillsrx.ru From alt.boaz at gmail.com Tue Mar 15 19:25:24 2011 From: alt.boaz at gmail.com (Boaz) Date: Tue, 15 Mar 2011 22:25:24 -0400 Subject: [Freedombox-discuss] distributed DNS Message-ID: Okay, so the people who are working on various aspects of the problem of decentralized replacement for DNS can keep working, and the people who think that decentralized replacement for DNS is not possible or not worthwhile can keep thinking that. If there's something by way of decentralized DNS replacement good enough early enough to be included in the first release of freedom box, great, if not, fine. If not, then whenever (if ever) a decentralized DNS replacement emerges, it can be integrated into freedom box. In the meanwhile, we can implement a decentralized non-memorizeable system of addressing based on public keys, and use that optionally in parallel with regular DNS. I really think that non-memorizeable addresses are fine for most purposes, though clearly less than ideal. Since the address itself doesn't make representations about the person behind it, those claims are made in the actual body of the publicly accessible page. And these unwieldy names can be unauthenticated initially, until they are authenticated by a web of trust or ZRTP-style voice authentication. You can still send someone such an address electronically no problem. Also, you can find it by search. Imagine that you're looking for someone named John Doe. You type John Doe into the person search bar of the interface you use to interact with your freedom box. It contacts a web search engine and does a search for John Doe and the appropriate markup. It displays the results, you pick out the one claiming to be the John Doe you're looking for, and you contact him. Authentication can take place at a later time. And a human meaningful name can be assigned (by the person or by you) which your local agent can map to the unwieldy address (the petname approach). Realistically, we already rely on this all the time; a cellphone for example gives you a menu to choose between people whose actual routing addresses (phone numbers) it has remembered for you. Optionally, John Doe might also have a plain old domain name, which he can give you on a slip of paper at a party, which points to the same place as the non-memorizeable address. Again, since you don't trust the DNS provider as far as you can throw it, you'll authenticate in some way outside of the addressing. If we are going to place reliance on DNS, we would do well to make some arrangements for some DNS providers that are friendly to our needs (as people have been talking about what those are). I see these as being at least a subset of the desirable attributes for a "freedom-friendly" DNS provider: 1. Is incorporated and physically served out of a jurisdiction with relatively friendly laws. 2. Is committed to continue operating long haul. 3. Keeps no logs at all for longer than say, a week. 4. Will respond to any request for either information or denial of service which is not legally compulsory by saying shove off and informing the customer. 5. Will respond to any request for either information or denial of service which is legally compulsory by waiting the longest legal amount of time before complying and immediately informing the customer, unless not able to legally inform the customer. 6. If not able to legally inform the customer, will fight in legal channels for the freedom to inform the customer. 7. All of this is spelled out in a legally binding service agreement. But additionally, in order for people to have their own domains, it needs to cost way less in terms of both money and, more importantly, hassle than it currently does. Whatever arrangements we make for freedom box friendly DNS service should involve costing almost no to no money ($15 per year or whatever isn't a lot, but it is a lot compared to the unfree services which people are currently using completely free of charge). Maybe the cost of the first 10 years of DNS service from one of a whole list of participating service providers should be rolled up into the price of the device? Just a thought. Appropriate arrangements should also involve extremely low hassle domain registration. Something like, you choose a provider from a pull down menu, or type in one that you know about, type in your desired second (or lower) level domain, and hit enter, and it automatically contacts the provider, registers the domain, and points it to your box. Do people think that could be possible? Perhaps using lower level domains, as some have suggested? But more important, I think, than trying to find a good provider is to make it as easy as possible for people to switch from misbehaving providers. One feature that would help tremendously (especially if we're going to create a system of almost or completely free of charge, easy to register subdomains), one feature which a few people have already proposed, is a machine language for your box, using the proper cryptographic credentials, to inform your friends that you, who used to be found at foo.example.com, will now be found at foo.bar.net. In other words, your real identity as far as your friends are concerned is your key. Your domain name is just a way for your friends to find you in the network. If your domain name has changed, why should you need to tell your actual human friends about this. Just tell their boxes and let them take care of it. I wish I already had this feature for email. If I have an email address boaz at example.com, and example.com does something to upset me, and I hate example.com, and I never want to have any further dealings with those bastards at example.com, there's nothing I can do. I've already told three hundred people who I want to be able to contact me for all time, that my address is boaz at example.com. I'll have to keep monitoring boaz at example.com forever. Unless I want to do one of these terrible mass mailings that everyone hates (I've received several of these, and it's a sorry sight). _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From moritz at torservers.net Tue Mar 15 14:40:55 2011 From: moritz at torservers.net (Moritz Bartl) Date: Tue, 15 Mar 2011 22:40:55 +0100 Subject: Torservers Foundation Meeting - Invitation 26.3. Dresden Message-ID: Hi, The non-profit organization around Torservers, Zwiebelfreunde ("Friends of the Onion") will be officially founded in Dresden on 26 March 2011. The goal of the foundation is to strengthen article 19 of the Universal Declaration of Human Rights by (including, not limited to) * encouraging and organizing local user groups, workshops and meetings https://www.torservers.net/wiki/usergroups * documenting and collecting Tor information material and setup guides https://www.torservers.net/wiki/guides * documenting experiences with high bandwidth Tor exit node operation, both operational and legal https://www.torservers.net/wiki/hoster/index https://www.torservers.net/wiki/hoster/bridges (* provide legal help for Tor exit node operators?) In general, if you like this, you should take a look at https://www.torservers.net/wiki/todo and join us on irc.oftc.net #torservers This is an open meeting and everyone is welcome. We will most likely have (limited supplies of) free beer. You can come as a spectator, and you can stay anonymous. To become an official founding member, you will have to put your name on a document and your signature next to it (no further identification required), and sign the German statute: https://www.torservers.net/wiki/satzung There is absolutely no requirement to be there on 15:00 sharp. If you want to be a founding member, come before 16:30. If you just want to discuss Tor(servers) and the foundation, you can also join in later. It will most likely be a long night, so better sleep until noon. Probably we will be leaving Watzke some time. If you are unsure, call me or look for Twitter updates. * Saturday, 26.03.2010 * starting 15:00, open end * Brauhaus Watzke, www.watzke.de , Am Goldenen Reiter, Hauptstra_e 1, 01139 Dresden * no preregistration necessary * Phone contact (mine): +49-176-96 373 484 http://maps.google.de/maps?f=q&source=s_q&hl=en&geocode=&q=watzke+dresden&ie=UTF8&hq=watzke&hnear=Dresden,+Saxony&ll=51.059449,13.741665&spn=0.005577,0.013905&z=17&iwloc=B If you need a place to sleep at, no problem. Contact me, at best before Saturday. -- Moritz Bartl XMPP: moritz at torservers (net) http://www.twitter.com/torservers https://www.torservers.net/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Mar 15 14:44:43 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 15 Mar 2011 22:44:43 +0100 Subject: Torservers Foundation Meeting - Invitation 26.3. Dresden Message-ID: <20110315214443.GQ23560@leitl.org> ----- Forwarded message from Moritz Bartl ----- From tawnalunasu at mail.wplus.net Tue Mar 15 14:10:45 2011 From: tawnalunasu at mail.wplus.net (Tawna Luna) Date: Tue, 15 Mar 2011 23:10:45 +0200 Subject: Cialis - Brand and Generic. Great quality! No Prescription Required. VISA, MASTERCARD, AMEX. FDA approved. Message-ID: <4d7fd5d5.77ab23ea@mail.wplus.net> Cialis (Generic) 90 tabs x 20mg = $144.19 Cialis - Brand and Generic. Great quality! No Prescription Required. VISA, MASTERCARD, AMEX. FDA approved. http://drugsmedictech.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 511 bytes Desc: not available URL: From StealthMonger at nym.mixmin.net Tue Mar 15 17:08:10 2011 From: StealthMonger at nym.mixmin.net (StealthMonger) Date: Wed, 16 Mar 2011 00:08:10 +0000 (GMT) Subject: uinmyn 0.06 Message-ID: <20110316000810.B04DD81444@fleegle.mixmin.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The Internet is even more powerful at protecting privacy than it is at destroying it. --- StealthMonger ... for low-latency systems like Tor, end-to-end traffic correlation attacks [8, 21, 31] allow an attacker who can observe both ends of a communication to correlate packet timing and volume, quickly linking the initiator to her destination. --- http://tor.eff.org/cvs/tor/doc/design-paper/challenges.pdf Long, random latency is part of the price of Internet anonymity. --- StealthMonger _ ____ ____ __ _ _|_|_ __ _ __ __ __ __ _ __ / _ \/ _ \ / / | | | | | '_ \| '_ \'_ \\ \/ /| '_ \ | | | | | | | ^\ | |_| | | | | | | | | | |\ / | | | | | |_| | |_| | () | \__,|_|_|_| |_|_| |_| |_|/ / |_| |_| \____(_)___/\___/ /_/ __________________________________________ | | | | | IS THIS ANONYMOUS BROWSING, OR WHAT?! | | | |__________________________________________| The url at is-not-my.name Internet page fetcher [1] allows the reading of Internet content with strong anonymity. An encrypted request is sent through a chain of anonymizing remailers and content is returned encrypted in Usenet newsgroup alt.anonymous.messages. No one, not even the is-not-my.name administrator, is able to link content being fetched with any particular user, or with other requests. Here are some scripts to facilitate use of url at is-not-my.name. There are two main scripts: uinmyn-fetch-body.py -- code URLs into a request and save the key uinmyn-do-aam-article.py -- extract pages from returned a.a.m. articles Given a (short) list of URLs, uinmyn-fetch-body.py generates a random key for the encryption and hsub of the reply, saves the key in a local database, and constructs the body of the request, encrypted and ready to send through a remailer chain. Each message from a.a.m. is then fed to uinmyn-do-aam-article.py. If the message matches a key in the database, the key is removed from the database, the decrypted message is saved for further processing, and the script returns with a positive code. Otherwise, the script gives a negative code. The net effect, if all goes well, is that the pages addressed by URLs submitted to uinmyn-fetch-body.py show up, after privacy-protecting remailer random latencies. No record leaves the requester's site of who accessed the pages. Also provided here are minor support scripts to list the URLs in a given reply, and to insert page content into the browser-accessible cache provided by wwwoffle [2]. Return codes from uinmyn-do-aam-article.py are useful for procmail, which might be checking the same message for other hits. The following .procmailrc clause sequence will send the decrypted "inner posting" to local-recipient. :0fW | uinmyn-do-aam-article.py /path/to/uinmyn_pending_requests_db :0a ! local-recipient Out of respect for your privacy, uinmyn does not require you to access any web site for its installation or use (though you may if you wish: mailto:stealthsuite at nym.mixmin.net?subject=send%20index.html). Everything is right here in this posting. ABOUT THE CODE Succinctness and readability are given priority here over efficiency. If efficiency becomes an issue, there are lots of opportunities here for speedup. These scripts are meant mainly as hints for you to adapt to the needs of your particular case. But they could be used verbatim if you like. INSTALLATION Have python, gnupg, and mixmaster installed. Have the send at is-not-my.name public key on your gnupg keyring. Copy the scripts from below to somewhere on your executables path. Of course, you are taking a full feed of a.a.m at all times without interruption, separating wheat from chaff only after it's all behind closed doors. Otherwise, the world is informed about which articles you find interesting. Remember, long random latency is part of the price of anonymity. It can't be done with TOR or any other low-latency method. EXAMPLE Typing uinmyn-fetch-body.py db | mixmaster url at is-not-my.name http://www.banana.mixmin.net ^D will send a request for http://www.banana.mixmin.net. The key is added to db, which need not have existed beforehand. (It's plain ASCII, so you can look at it to better understand what's happening.) Later, in a directory full of fresh a.a.m articles, the command for f in *; do uinmyn-do-aam-article.py db < $f >> mbox; done will append the requested content to mbox if it has arrived. FOOTNOTES [1] http://www.is-not-my.name [2] World Wide Web OFFline Explorer http://www.gedanken.demon.co.uk/wwwoffle/ BUGS Encryption/hsub keys are exposed briefly during a.a.m. processing. CHANGE LOG 0.06 Add time-stamps to database entries to facilitate removal of old, stale entries. Changed slogan from "Is this anonymous surfing, or what?". Documentation improvements. 0.05 Quote URL in uinmyn-do-aam-article.py against shell interpretation. 0.04 Did TODO item: Use PIPE for the gpg stdin in uinmyn-do-aam-article.py. (eliminating previous stupid size limit). 0.03 Add "decode=True" in uinmyn-to-wwwoffle-cache.py to capture coded files, such as .pdfs. Change the www.bananasplit.info reference to www.banana.mixmin.net. 0.02 Add a script to enter gotten pages into a local browser-accessible cache. Improvements to the documentation. Here are the scripts. 8<--------8<--------8<--------8<--------8<--------8<--------8<-------- #! /usr/bin/python # SYNOPSIS # uinmyn-fetch-body.py # DESCRIPTION # Reads URLs from standard input, one per line, generates a fresh # random key to encrypt the reply and for its hsub, adds the key and # the requested URLs to pending-requests-dict (creating it anew if # it doesn't exist), constructs and encrypts a request for # url at is-not-my.name, and writes it to standard output. from os import urandom from base64 import standard_b64encode import sys, os, time import pprint from subprocess import Popen, PIPE UINMYN_PENDING_REQUESTS = sys.argv[1] # same key for both encryption and hsub: key = standard_b64encode(urandom(15)) gpgproc = Popen('gpg -e -a -r send at is-not-my.name --trust-model always --no-emit-version --batch', shell=True, stdin=PIPE) gpgproc.stdin.write("KEY " + key + '\n') urls = [time.time()] # time-tag precedes the urls in the db entry for line in sys.stdin.readlines(): urls.append(line.rstrip()) gpgproc.stdin.write('SOURCE ' + line.rstrip() + '\n') gpgproc.stdin.close() # Not dealt with here: Mutually exclusive access to the # UINMYN_PENDING_REQUESTS database, as would be required if request # issuance might be concurrent with a.a.m. processing. if os.path.isfile(UINMYN_PENDING_REQUESTS): execfile(UINMYN_PENDING_REQUESTS) else: uinmyn_pending_requests = {} uinmyn_pending_requests[key] = urls new_upr_fd = open(UINMYN_PENDING_REQUESTS, 'w') new_upr_fd.write('uinmyn_pending_requests =\\\n') pprint.pprint(uinmyn_pending_requests,stream=new_upr_fd) 8<--------8<--------8<--------8<--------8<--------8<--------8<-------- #! /usr/bin/python # SYNOPSIS # uinmyn-do-aam-article.py # DESCRIPTION # Reads an article from standard input. If its Subject: might be an # hsub, check it against each key in pending-requests-dict in turn. # If a hit is found, decrypt the inner posting and write it to # standard output. import sys, os from hashlib import sha256 import email import pprint from subprocess import Popen, PIPE UINMYN_PENDING_REQUESTS = sys.argv[1] posting = email.message_from_file(sys.stdin) subject = posting.get('Subject') try: iv = subject[:16].decode('hex') except TypeError: sys.exit(1) # Not dealt with here: Mutually exclusive access to the # UINMYN_PENDING_REQUESTS database, as would be required if request # issuance might be concurrent with a.a.m. processing. if os.path.isfile(UINMYN_PENDING_REQUESTS): execfile(UINMYN_PENDING_REQUESTS) else: uinmyn_pending_requests = {} for key, urls in uinmyn_pending_requests.iteritems(): if subject == (iv+sha256(iv+key).digest()).encode('hex')[:48]: # Doing part of the job in shell: gpgproc = Popen('mkfifo $HOME/passwdf ; (echo ' + key + ' > $HOME/passwdf &); gpg --passphrase-fd 3 3<$HOME/passwdf --trust-model always --batch 2>/dev/null ; rm $HOME/passwdf', stdin=PIPE, shell=True) gpgproc.stdin.write(posting.get_payload()) # Other processing that could be done here: # Deal with discrepancies between requested and obtained URL lists. # Save the used key in an archive, rather than losing it forever. del uinmyn_pending_requests[key] new_upr_fd = open(UINMYN_PENDING_REQUESTS, 'w') new_upr_fd.write('uinmyn_pending_requests =\\\n') pprint.pprint(uinmyn_pending_requests,stream=new_upr_fd) sys.exit(0) sys.exit(1) 8<--------8<--------8<--------8<--------8<--------8<--------8<-------- #! /usr/bin/python # SYNOPSIS # uinmyn-list-gotten-urls.py # DESCRIPTION # List the URLs in the url at is-not-my.name "inner mail" on standard # input together with the sizes of the fetched pages. import sys, email pages = email.message_from_file(sys.stdin) for page in pages.get_payload(): print(page.get('Content-Description') + ', size = ' + repr(len(page.get_payload()))) 8<--------8<--------8<--------8<--------8<--------8<--------8<-------- #! /usr/bin/python # SYNOPSIS # uinmyn-to-wwwoffle-cache.py # DESCRIPTION # Given a (decrypted) url at is-not-my.name "inner posting", enter each # page that it contains into the wwwoffle cache, overlaying any # previous content having matching URLs. import sys, os, email from subprocess import Popen, PIPE pages = email.message_from_file(sys.stdin) for page in pages.get_payload(): p = Popen('wwwoffle-write \'' + page.get('Content-Description') + '\'', stdin=PIPE, shell=True) p.stdin.write('HTTP/1.0 200 OK\n') p.stdin.write('Content-Type: ' + page.get('Content-Type') + '\n\n') p.stdin.write(page.get_payload(decode=True)) p.stdin.close() p.wait() 8<--------8<--------8<--------8<--------8<--------8<--------8<-------- -- StealthMonger Long, random latency is part of the price of Internet anonymity. stealthmail: Hide whether you're doing email, or when, or with whom. mailto:stealthsuite at nym.mixmin.net?subject=send%20index.html Key: mailto:stealthsuite at nym.mixmin.net?subject=send%20stealthmonger-key -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.8+ iEYEARECAAYFAk1+58QACgkQDkU5rhlDCl6zCACguZBtkNeT1e3AxjZfQFDeBEpg 6lQAnRsgP/u3PeMpufRfiVx2xrNWuUQM =jxyo -----END PGP SIGNATURE----- From buh at v-o-s.ru Tue Mar 15 23:10:32 2011 From: buh at v-o-s.ru (=?koi8-r?B?98nS1dPOwdEg1cfSz9rBIMvPzdDYwNTF0s7PyiDJzsbP0s3Bw8nJ?=) Date: Wed, 16 Mar 2011 11:10:32 +0500 Subject: =?koi8-r?B?6c7Gz9LNwcPJz87OwdEgwsXaz9DB087P09TYOiDhy9TVwczYzs/T1Ngg?= =?koi8-r?B?18/Q0s/TwSDawd3J1Nkgyc7Gz9LNwcPJyQ==?= Message-ID: <000d01cbe3a0$dbaa6180$6400a8c0@buh> ------------------------------------------------------------------------- ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ: Защита конфиденциальной информации и персональных данных, инновационный подход, современные технологии и практические решения ------------------------------------------------------------------------- 22-23 Марта > 8 Моск. код: 7.42_9I_98 ; 792_2I22 >Цель обучения: Формирование у слушателей: системно-целостного видения проблем обеспечения информационной безопасности компании; умений организации и обеспечения эффективного функционирования систем информационной безопасности в компании; понимания природы возникновения угроз информационной безопасности и практической реализации мероприятий защиты от них. >Задачи: анализ основных проблем информационной безопасности и подготовка алгоритмов решений, исходя из существующих угроз; изучение опыта создания различных систем информационной безопасности в коммерческих структурах; обобщение современных подходов к формированию системы информационной безопасности компании; изучение современных приемов управления системами информационной безопасности компании. > ПPОГРАММА 1. Актуальность вопроса защиты информации * Актуальность проблемы защиты информации. Защита информации как составная часть общей системы безопасности организации (предприятия) * Основные понятия, термины и определения в области защиты информации * Основные направления защиты информации * Законодательная и нормативная база правового регулирования вопросов защиты информации * Требования к организации защиты конфиденциальной информации на предприятии (организации) * Составные части (основа) системы защиты информации 2. Коммерческая тайна * Понятие "коммерческой тайны" в предпринимательской деятельности. Законодательство РФ в области защиты коммерческой тайны * Методика составления Перечня сведений, содержащих коммерческую тайну * Внутренние нормативные документы, регламентирующие деятельность компании в области защиты коммерческой тайны 3. Угрозы информации. Возможные каналы утечки информации * Виды угроз информационной безопасности * Определение предмета и объекта защиты. * Технические каналы утечки информации. Их классификация. Механизмы образования * Организационные, организационно-технические меры и технические средства защиты информации от утечки по техническим каналам * Угрозы несанкционированного доступа (НСД) к информации Источники угроз. Классификация угроз * Возможная тактика использование программных и аппаратных закладных устройств (ЗУ). Уязвимость современных технических средств обработки информации (проводные и беспроводные системы, Интернет, мобильные средства связи и пр) 4. Мероприятия по защите информации. Противодействие промышленному шпионажу. Технические средства защиты информации * Формирование организационной структуры системы защиты информации на предприятии Принципы формирования, факторы и критерии принятия решения * Технические средства промышленного шпионажа * Защита информации от утечки по техническим каналам * Меры и средства защиты информации от технических средств ее съема * Приборы обнаружения технических средств промышленного шпионажа * Общие требования по защите помещений и технических средств * Организационные мероприятия по защите информации. Допуск, доступ, учет, хранение * Организационно- технические мероприятия защиты информации * Человеческий фактор в утечке информации. Превентивные мероприятия по предупреждению возможной утечки защищаемой информации. 5. Методы и средства защиты компьютерных систем * Возможные способы утери, искажения, изменения компьютерной информации или получения к ней несанкционированного доступа. * Вирусная угроза компьютерной информации. Антивирусная защита. * Возможность защиты информации при работе в сети Internet. Межсетевое экранирование. * Активный аудит. * Основы криптографической защиты информации. Классификация методов криптографического закрытия информации. Шифрование (симметричные криптосистемы и криптосистемы с открытым ключом). Кодирование и сжатие информации. Стеганография. * VPN (виртуальная частная сеть). Преимущества организации виртуальных частных сетей на основе Internet. * Электронная цифровая подпись. Электронная цифровая подпись как базовый механизм обеспечения юридической силы документа при электронном документообороте. * Практические примеры применения криптографических методов защиты информации. 6. Аудит информационной безопасности компании. Политика информационной безопасности * Анализ внутренних и внешних угроз информационной безопасности компании. Общие подходы * Методика разработки политики информационной безопасности в компании * Международные и российские стандарты безопасности информационных систем (ISO 17799, ГОСТ Р ИСО/МЭК 17799-2005) * Американская концепция системного подхода к обеспечению защиты конфиденциальной информации (OPSEC Operation Security) 7. Организация работы Службы информационной безопасности (СИБ) предприятия. Практический опыт * Процедура создания СИБ на предприятии. Разделение функций между СИБ и IT-подразделением. Место СИБ в структуре предприятия * Организация взаимодействия с Руководством и руководителями структурных IT-подразделений компании 8. Актуальные вопросы организации работы с персональными данными. Применение Федерального закона РФ ╧ 152 "О персональных данных" * Общие вопросы обработки и обеспечения защиты персональных данных (ПДн) в компании. * Международное и российское законодательство в области обработки ПДн. * Общие вопросы проведения работ по комплексной защите ПДн. * Порядок проведения работ по защите ПДн. * Общие вопросы согласования документов с регуляторами. * Обзор основных мероприятий, нормативно-правовой, организационно-распорядительной и нормативно-технической документации при создании системы защиты ПДн. Стоимость участия 19706 рублей За более подробной информацuей обpащайтеcь по тел: код: (четыре девять пять) Ч45З9-68 <> 792_21/22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10510 bytes Desc: not available URL: From henry.story at bblfish.net Wed Mar 16 03:14:50 2011 From: henry.story at bblfish.net (Henry Story) Date: Wed, 16 Mar 2011 11:14:50 +0100 Subject: [Freedombox-discuss] human-meaningful names and zooko's triangle [was: Re: FOAF developers taking FreedomBox into their equation] Message-ID: On 15 Mar 2011, at 00:26, Daniel Kahn Gillmor wrote: > (for some reason, my MUA thinks that this message from henry story may > be a scam. it is not.) > > On 03/13/2011 08:11 AM, Henry Story wrote: >> If you had a global reliable distributed public key inscription/lookup service, then one could create URLs based on it so that boxes could be moved easily. Perhaps one could create such HTTP URLs based on the existence of such a service. call these httpk urls. The could look something like this >> >> > > Without getting into the details, it sounds to me like you're proposing > dropping human-meaningful identifiers entirely (and relying on the FOAF > assertions to situate the opaque identifiers in a social context). This > is an interesting approach, but it makes it difficult to mix between the > online and offline worlds, i think. > > At this point, I'd rather not comment on the specifics of whether to use > HTML forms, what specific structure each datapoint should use, etc, > because i think we don't have consensus yet on how we should handle the > basics of the naming question. > > If we give up on human-meaningful names, then yes, i think the rest of > the puzzle pieces fall into place -- it's not terribly hard to come up > with a distributed namebaddress resolution mechanism that covers a > cryptographically-strong namespace. We can then use that address > resolution mechanism to make requests about the rest of the related data > (e.g. what human-memorable name each entity claims for itself, and what > names other entities claim for it). > > Revocations become quite permanent in that case (the name itself gets > retired), and (it seems to me) it becomes difficult to refer cleanly and > unambiguously to a specific entity in the offline world while online, > and vice versa. > > However, petname-style proposals (which i think includes the system > Henry sketched here) implemented on trusted hardware allow humans to > have some sort of private/non-universal human-meaningful name that they > can apply to a given peer. > > What do other people think of the consequences of this sort of tradeoff? > > I'm assuming that people in this discussion are aware of the concept of > Zooko's Triangle (whether you subscribe to it or not). If you haven't > read about it yet, please take a second to do so: > > https://secure.wikimedia.org/wikipedia/en/wiki/Zooko's_triangle > http://zooko.com/distnames.html > > Regards, > > --dkg > I came across Zooko's triangle in a few recent posts by Dan Kaminsky, of which this one http://dankaminsky.com/2011/01/13/spelunk-tri/ In the e-mail you are responding to, I started with the idea of an httpk URL which I found to be a very useful one in helping me frame my thoughts. Its advantages and disadvantages are quite easy to see, and Zooko's triangle makes those clear. I then showed how if each server published the public keys/ip addresses for each of the servers it had fetched its TLS protected content from, one could have a system that used normal human readable names but could easily be mapped to secure URLS if needed. Or in other words: one could have a system where FreedomBoxes could work with the current DNS but also be alert to suspicious changes. One could work in both frameworks simultaneously. The question one would then have is what would a box do when the keys did not match? Perhaps just reduce the trust it put in information coming from a box, provisionally? It would have to be careful with the response being too strong, as this could lead to a form of attack that Bruce Schneier describes well: attack a system by creating many false alerts until the guards no longer pay attention to the alarm bells. Then attack. As far as how such a protocol would work, I agree it is way too early for that. The idea of a simple RDFa backed HTML form protocol was there to show that something like that could be built in an afternoon. Most of all the point was that we can build a Web based system on TLS and add these layers with time. They don't have to be built in from the start. Henry Social Web Architect http://bblfish.net/ _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Mar 16 03:15:24 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 16 Mar 2011 11:15:24 +0100 Subject: [Freedombox-discuss] distributed DNS Message-ID: <20110316101524.GB23560@leitl.org> ----- Forwarded message from Boaz ----- From eugen at leitl.org Wed Mar 16 03:17:39 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 16 Mar 2011 11:17:39 +0100 Subject: [Freedombox-discuss] human-meaningful names and zooko's triangle [was: Re: FOAF developers taking FreedomBox into their equation] Message-ID: <20110316101739.GD23560@leitl.org> ----- Forwarded message from Henry Story ----- From buh at vipclubtravel.ru Wed Mar 16 05:57:45 2011 From: buh at vipclubtravel.ru (=?koi8-r?B?4sXMwdEg2sHS0MzB1ME=?=) Date: Wed, 16 Mar 2011 13:57:45 +0100 Subject: =?koi8-r?B?987FxNLFzsnFINPIxc0gxMzRINXNxc7Y28XOydEg09TSwcjP19nIINfa?= =?koi8-r?B?zs/Tz9c=?= Message-ID: <8B15CD9161E649D1992394DFDC52E8AB@PC02> двадцать первого марта 201Iг. Методы оптимизации расходов на выплату белой зарплаты: как выжить после замены ЕСН страховыми взносами (код Москвы) ЧЧ5.З9-68 <<>> 4Ч_5З*96*8 Цель: Ставка обязательных страховых взносов с зарплаты с 2011 года составляет 34% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала ЕСН заменена отменой уплаты взносов с суммы дохода свыше 463 тыс. рублей, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1. Обзор изменений законодательства, связанных с повышением ставки страховых взносов. Сколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2011 гг. Какие схемы стали невыгодными; у каких налогоплательщиков положение даже улучшилось. 2. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. 3. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность в 2011 г.; * дивидендные схемы – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с кассовой дисциплиной и политикой ЦБ. Текущая ситуация с обложением таких доходов НДФЛ. 4. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Страхование жизни работников и ДМС за счет предприятия. 6. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. 7. Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 8. Использование процентных займов от физлиц. Расчет эффективности. 9. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 10. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, 11. Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!), 12. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 13. Ответы на вопросы. По желанию – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. За более подробной информацuей обpащайтеcь по тел: +7 Московский код: 792_-2i**22 <> 4-45.4*0_95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6735 bytes Desc: not available URL: From scandidahz at jencoprod.com Wed Mar 16 09:17:04 2011 From: scandidahz at jencoprod.com (Serafina Candida) Date: Wed, 16 Mar 2011 15:17:04 -0100 Subject: We are Selling Various Replica Watches, Swiss Replica Watches of Big-Name Brands which are all Made According to Genuine Ones. Message-ID: <51g91o56t58-29593839-565b2e81@ujfyztyrfl> Swiss replica watches: swiss movement replicas, fake swiss watches Swiss replica watches were always highly prized, but from now you can get Swiss luxury watches for the lowest prices! We are Selling Various Replica Watches, Swiss Replica Watches of Big-Name Brands which are all Made According to Genuine Ones. http://replicaonlinemahican.ru From buhg at barchamova.ru Wed Mar 16 07:36:47 2011 From: buhg at barchamova.ru (=?koi8-r?B?68HLIM3P1s7PINXK1Mkgz9Qg7uTz?=) Date: Wed, 16 Mar 2011 15:36:47 +0100 Subject: =?koi8-r?B?7uTzLiD1yM/EIM/UINDSydrOwc7J0SDOwczPx8/Xz8og19nHz8TZIM7F?= =?koi8-r?B?z8LP087P18HOzs/K?= Message-ID: 25 марта 2011г. Тема: ПРИЗНАКИ НЕДОБРОСОВЕСТНЫХ ПОСТАВЩИКОВ. СПОСОБЫ ПРОТИВОДЕЙСТВИЯ ПРИДИРКАМ НАЛОГОВОЙ И СНИЖЕНИЕ НАЛОГОВОЙ НАГРУЗКИ ПО НДС 8 Моск. код: 7Ч2.9198 <<>> 44539.68 Цель обучения: Обучающий курс даст слушателям ответ на то, как правильно заключать договоры и что делать, если он ошибся, но при этом хотел бы сохранить свои налоговые обязательства без изменений. Слушатели будут точно знать, что и как отвечать налоговой инспекции в случае проверки таких контрагентов. Поймут, как можно уйти от НДС без последствий. В период кризисных явлений в экономике, и как следствие острой нужды государства в пополнении бюджета, ФНС ужесточила требования к проверкам - повысила границу результативности проверок до миллиона рублей (приказ ФНС №409), а также предложила идти простым путем – находить среди контрагентов налогоплательщика компании, которые подпадают под признаки недобросовестных и лишать налогоплательщика налоговых льгот полученных в результате взаимодействия с такими организациями (Приказ ФНС России №ММ-3-2/467@). Практика свидетельствует, что практически все проверки налогоплательщиков применяющих ОСН затрагивают данный вопрос с негативными для налогоплательщика последствиями. При этом налоговый орган исключает из состава затрат НП и вычетов по НДС суммы по контрагентам, которые, например, просто не отвечают на запрос в рамках встречных проверок, либо не заплатили налоги и т.п. Подчас очень тяжело отстоять свою правоту в спорах с налоговым органом. Курс посвящен вопросу защиты налогоплательщика, призван помочь ему как не погрязнуть в тотальных проверках своих контрагентов, так и впоследствии защитить свои права по взаимоотношениям я такими компаниями. На Обучении не только будут показаны способы противодействия придиркам налоговой, но и будут разобраны способы заключения договоров, которые в принципе исключают возможность признания лица недобросовестным, а также законные способы снижение налоговой нагрузки по НДС в том случае, если налогоплательщик в этом заинтересован. Программа: 1. Методические указания Минфина о назначении выездных налоговых проверок (включая Приказ ФНС от 22.09.10 N ММB-7-2/461@, Приказ УФНС по г. Москве от 1 сентября 2008 г №409 и др.) 2. Методические указания Минфина по поиску недобросовестных контрагентов. Рассмотрение мер, которые планирует принять Минфин, Минюст по борьбе с однодневками. 3. Основания признания налоговой выгоды необоснованной (на основании судебной практики, писем Минфина, практики проверок). 4. Что необходимо сделать, чтобы проявить разумную осмотрительность. Какие документы и какую информацию о контрагенте необходимо собрать. 5. Как защититься от претензий налогового органа о том, что контрагент: * не платит налоги и не сдает отчетность; * не отвечает на встречные проверки; * не находиться по месту регистрации, либо зарегистрирован по адресу массовой регистрации; * директор БОМЖ, ничего не подписывал, его подпись подделали и т.п. * директор является "массовым", в отношении руководителя проводятся розыскные мероприятия; * проведенный осмотр показал, что компания не могла отгрузить товар с адреса, указанного в накладной, счете-фактуре; * коды ОКВЭД контрагента не позволяют ему произвести действия, которые он якобы произвел по отношению к налогоплательщику (не может выполнять работы, поставлять товар и т.п., так как создан для иных целей); * иные претензии. 6. Анализ предмета доказывания по спорам о получении необоснованной налоговой выгоды. Установление размера требований по подобным делам. Взыскание всех ранее заявленных вычетов и расходов как нарушение принципа соразмерности и справедливости. Анализ аналогичной практики Европейского Суда. 7. Разбор основных ошибок допускаемых налоговыми органами в процессе доказывания получение налоговый выгоды (встречные проверки реально не проводятся, а данные берется из компьютерной системы учета, вместо допросов проводиться опрос, вместо экспертизы получаются заключения специалиста и т.п.). Как использовать ошибки (подробно). 8. Создание преюдиции для доказывания реальности сделки. 9. Способ ухода от признания налоговой выгоды необоснованной при заключении договоров с поставщиками при помощи посредника. Как построить договор, чтобы претензии по поставщикам нельзя было предъявить. 10. Уход от признания налоговой выгоды необоснованной путем особого способа заключения договоров. 11. Уход от уплаты НДС с наценки путем: * заключения договора с дополнительной выгодой; * включение условий о неустойки; * использование простого товарищества. 12. Кто отвечает за работу с недобросовестными контрагентами (директор или бухгалтер) и в какой части. Рассмотрение основных законодательных инициатив и принятых в последнее время законов, направленных на борьбу с "однодневками". 13. Потеря документов по недобросовестным поставщикам. Налоговые последствия. Указания Минфина по привлечению к ответственности в таком случае. Способ защиты от налоговых претензий. Является ли потеря документов защитой от претензий правоохранительных органов. 14. Анализ возможности рассмотрения любого налогового спора в Арбитражном суде г. Москвы, как способ обойти негативную практику конкретного региона. 15. Изменение практики компенсации судебных издержек. 16. Ответы на индивидуальные вопросы. Cтоимоcть: 7900 руб. Информацию можно получить по телефонам: +7 (Ч95) ЧЧ5*3-9-6/8 ; Ч/Ч_5/З.2_.6/6 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6964 bytes Desc: not available URL: From jacquelynea.ingridik at times.com Wed Mar 16 01:02:58 2011 From: jacquelynea.ingridik at times.com (Jacquelyne Ingrid) Date: Wed, 16 Mar 2011 16:02:58 +0800 Subject: Cialis - Brand and Generic. Great quality! No Prescription Required. VISA, MASTERCARD, AMEX. FDA approved. Message-ID: <201103160200.1DE7D6E3C881C0F9D962@4ysmmx65> Cialis (Generic) 90 tabs x 20mg = $144.19 Cialis - Brand and Generic. Great quality! No Prescription Required. VISA, MASTERCARD, AMEX. FDA approved. http://medstabletspharmacy.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 516 bytes Desc: not available URL: From eugen at leitl.org Wed Mar 16 11:04:10 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 16 Mar 2011 19:04:10 +0100 Subject: Scott Adams pulls a Brin Message-ID: <20110316180410.GO23560@leitl.org> http://dilbert.com/blog/entry/noprivacyville/ Noprivacyville Mar 15, 2011 General Nonsense | Notify I heard a report on NPR about an auto insurance company giving drivers the options of putting GPS tracking devices on their vehicles to lower insurance rates by as much as 30%. The idea is that, for example, the device could confirm to the insurance company that the car wasn't being used in high risk situations, such as commute traffic. Safe driving situations would be rewarded with lower rates. This made me wonder how much money could be saved by creating an entire city with no privacy except in the bedroom and bathroom. I will stipulate in advance that you do not want to live in such a place because you're an urban pirate. You want the freedom to do "stuff" that no one ever finds out about. I get it. This is just an economic thought experiment. Although you would never live in a city without privacy, I think that if one could save 30% on basic living expenses, and live in a relatively crime-free area, plenty of volunteers would come forward. Let's assume that residents of this city agree to get "chipped" so their locations are always known. Everyone's online activities are also tracked, as are all purchases, and so on. We'll have to assume this hypothetical city exists in the not-so-distant future when technology can handle everything I'm about to describe. This city of no privacy wouldn't need much of a police force because no criminal would agree to live in such a monitored situation. And let's assume you have to have a chip to enter the city at all. The few crooks that might make the mistake of opting in would be easy to round up. If anything big went down, you could contract with neighboring towns to get SWAT support in emergency situations. You wouldn't need police to catch speeders. Cars would automatically report the speed and location of every driver. That sucks, you say, because you usually speed, and you like it. But consider that speed limits in this hypothetical town would be much higher than normal because every car would be aware of the location of every other car, every child, and every pet. Accidents could be nearly eliminated. Healthcare costs might plunge with the elimination of privacy. For example, your pill container would monitor whether you took your prescription pills on schedule. I understand that noncompliance of doctor-ordered dosing is a huge problem, especially with older folks. Without privacy you would also begin to build a database of which drugs are actually working and which ones have deadly side effects. Every patient's history would be meticulously and automatically collected. The same goes for detailed diet and exercise patterns. Healthcare today involves an alarming amount of educated guesswork. In time, with a total lack of privacy, we'd know precisely which kinds of choices have better health outcomes. Now imagine that your doctor has a full screen of your DNA so together you can modify your lifestyle or healthcare choices to avoid problems for which you are prone. This city would need to have universal healthcare to make this work. No one would be denied coverage because of an existing or potential condition. Employment would seem problematic in this world of no privacy. You assume that no employer would hire someone who has risky lifestyle preferences, or DNA that suggests major health problems. But I'll bet employers would learn that everyone has issues of one kind or another, so hiring a qualified candidate who might later become ill will look like a good deal. And on the plus side, employers would rarely hire someone who had a bad employment record, as that information would not be as hidden as it is today. Bad workers would end up voluntarily moving out of the city to find work. Imagine a world where your coworkers are competent. You might need a lack of privacy to get to that happy situation. Public transportation would be cheap in this city of no privacy. Once you know where everyone is, and where everyone wants to go, you can design a system that has little wasted capacity. That means lower costs. Now let's say that your house is aware of your location and even your patterns of activities. Smart systems in the home can turn off your lights whenever a room is unoccupied, power down your computer as needed, and generally manage your power consumption smartly. And if you insisted on being an energy hog, your neighbors would be aware of it. Studies have shown that peer pressure has a huge impact on conservation. It's not as bad as it sounds; if your neighbor is elderly, and using a lot of energy for extra heating, you would understand. In most cases your neighbor's excessive energy use would have a perfectly good explanation. At tax time, you'd be done before you started. All of your financial activities would be tracked in real time, so your taxes would always be up to date. Advertisements would transform from a pervasive nuisance into something more like useful information. Advertisers would know so much about your lifestyle and preferences that you would only see ads that made perfect sense for your situation. This lack of privacy would extend to businesses as well, although the better description in this case would be transparency. As a consumer, you'd know where to get the best prices. You'd know how long the wait is at your favorite restaurant. And you'd know how every consumer felt about his experience with every business. When you considered applying for a new job, you'd have access to the latest employee opinion survey for that business. Bad employee practices would be driven out and best practices would more easily spread. Confusopolies wouldn't be tolerated in this city. Confusing pricing plans are a weasel method of hiding information from consumers. If a company wants to offer cell phone service, or insurance, or banking, in this city they have to meet standards for pricing clarity. On the personal side of things, a complete surrendering of privacy means it's always easy to locate and hook up with people who have similar interests and similar schedules. Dating, and every other social activity would become far easier. And cheating would be nearly impossible. You worry about the slippery slope of zero privacy. The government could easily abuse this information. But that problem is somewhat minimized because the situation is limited to a single city, and the residents can simply leave if they don't like how things are going. I know you don't want to live in that city. I'm just curious what sort of price, in economic terms, and in convenience and in social benefits, we pay for our privacy. My guess is that it's expensive. From milkmaid at spbflower.ru Wed Mar 16 13:18:32 2011 From: milkmaid at spbflower.ru (POSTMAN) Date: Wed, 16 Mar 2011 20:18:32 +0000 Subject: email advertisement. Message-ID: <000d01cbe417$51f320e0$6400a8c0@milkmaid> Email advertisement. Europe 440 000 000 address- 1000 USD. USA 80 000 000 address - 500 USD. Canada 26 000 000 address-500 USD. Mailing two times BSTS RGRDS POSTMAN (email for orders: POST at NETPOST.SU) From support at rayservers.com Wed Mar 16 14:47:16 2011 From: support at rayservers.com (Rayservers) Date: Wed, 16 Mar 2011 21:47:16 +0000 Subject: Scott Adams pulls a Brin In-Reply-To: <20110316180410.GO23560@leitl.org> References: <20110316180410.GO23560@leitl.org> Message-ID: <4D812FE4.2040305@rayservers.com> On 16/03/11 18:04, Eugen Leitl wrote: > http://dilbert.com/blog/entry/noprivacyville/ > > Noprivacyville > > Mar 15, 2011 General Nonsense | Notify > > I heard a report on NPR about an auto insurance company giving drivers the > options of putting GPS tracking devices on their vehicles to lower insurance > rates by as much as 30%. The idea is that, for example, the device could > confirm to the insurance company that the car wasn't being used in high risk > situations, such as commute traffic. Safe driving situations would be > rewarded with lower rates. > > This made me wonder how much money could be saved by creating an entire city > with no privacy except in the bedroom and bathroom. I will stipulate in > advance that you do not want to live in such a place because you're an urban > pirate. You want the freedom to do "stuff" that no one ever finds out about. > I get it. This is just an economic thought experiment. > > Although you would never live in a city without privacy, I think that if one > could save 30% on basic living expenses, and live in a relatively crime-free > area, plenty of volunteers would come forward. > > Let's assume that residents of this city agree to get "chipped" so their > locations are always known. Everyone's online activities are also tracked, > as are all purchases, and so on. We'll have to assume this hypothetical city > exists in the not-so-distant future when technology can handle everything > I'm about to describe. > > This city of no privacy wouldn't need much of a police force because no > criminal would agree to live in such a monitored situation. And let's assume > you have to have a chip to enter the city at all. The few crooks that might > make the mistake of opting in would be easy to round up. If anything big > went down, you could contract with neighboring towns to get SWAT support in > emergency situations. > > You wouldn't need police to catch speeders. Cars would automatically report > the speed and location of every driver. That sucks, you say, because you > usually speed, and you like it. But consider that speed limits in this > hypothetical town would be much higher than normal because every car would > be aware of the location of every other car, every child, and every pet. > Accidents could be nearly eliminated. > > Healthcare costs might plunge with the elimination of privacy. For example, > your pill container would monitor whether you took your prescription pills > on schedule. I understand that noncompliance of doctor-ordered dosing is a > huge problem, especially with older folks. > > Without privacy you would also begin to build a database of which drugs are > actually working and which ones have deadly side effects. Every patient's > history would be meticulously and automatically collected. The same goes for > detailed diet and exercise patterns. Healthcare today involves an alarming > amount of educated guesswork. In time, with a total lack of privacy, we'd > know precisely which kinds of choices have better health outcomes. > > Now imagine that your doctor has a full screen of your DNA so together you > can modify your lifestyle or healthcare choices to avoid problems for which > you are prone. This city would need to have universal healthcare to make > this work. No one would be denied coverage because of an existing or > potential condition. > > Employment would seem problematic in this world of no privacy. You assume > that no employer would hire someone who has risky lifestyle preferences, or > DNA that suggests major health problems. But I'll bet employers would learn > that everyone has issues of one kind or another, so hiring a qualified > candidate who might later become ill will look like a good deal. And on the > plus side, employers would rarely hire someone who had a bad employment > record, as that information would not be as hidden as it is today. Bad > workers would end up voluntarily moving out of the city to find work. > Imagine a world where your coworkers are competent. You might need a lack of > privacy to get to that happy situation. > > Public transportation would be cheap in this city of no privacy. Once you > know where everyone is, and where everyone wants to go, you can design a > system that has little wasted capacity. That means lower costs. > > Now let's say that your house is aware of your location and even your > patterns of activities. Smart systems in the home can turn off your lights > whenever a room is unoccupied, power down your computer as needed, and > generally manage your power consumption smartly. And if you insisted on > being an energy hog, your neighbors would be aware of it. Studies have shown > that peer pressure has a huge impact on conservation. It's not as bad as it > sounds; if your neighbor is elderly, and using a lot of energy for extra > heating, you would understand. In most cases your neighbor's excessive > energy use would have a perfectly good explanation. > > At tax time, you'd be done before you started. All of your financial > activities would be tracked in real time, so your taxes would always be up > to date. > > Advertisements would transform from a pervasive nuisance into something more > like useful information. Advertisers would know so much about your lifestyle > and preferences that you would only see ads that made perfect sense for your > situation. > > This lack of privacy would extend to businesses as well, although the better > description in this case would be transparency. As a consumer, you'd know > where to get the best prices. You'd know how long the wait is at your > favorite restaurant. And you'd know how every consumer felt about his > experience with every business. > > When you considered applying for a new job, you'd have access to the latest > employee opinion survey for that business. Bad employee practices would be > driven out and best practices would more easily spread. > > Confusopolies wouldn't be tolerated in this city. Confusing pricing plans > are a weasel method of hiding information from consumers. If a company wants > to offer cell phone service, or insurance, or banking, in this city they have > to meet standards for pricing clarity. > > On the personal side of things, a complete surrendering of privacy means > it's always easy to locate and hook up with people who have similar interests > and similar schedules. Dating, and every other social activity would become > far easier. And cheating would be nearly impossible. > > You worry about the slippery slope of zero privacy. The government could > easily abuse this information. But that problem is somewhat minimized > because the situation is limited to a single city, and the residents can > simply leave if they don't like how things are going. > > I know you don't want to live in that city. I'm just curious what sort of > price, in economic terms, and in convenience and in social benefits, we pay > for our privacy. My guess is that it's expensive. Pure and utter bull shit. Best, Ray -- Rayservers http://www.rayservers.com/ Zurich: +41 43 5000 728 London: +44 20 30 02 74 72 Panama: +507 832 1846 San Francisco: +1 408 419 1978 USA Toll Free: +1 888 265 5009 10:00 - 24:00 GMT We prefer to be paid in gold Globals and silver Isles Global Standard - Global Settlement Foundation http://www.global-settlement.org/ Our PGP key 0x079CCE10 on http://keyserver.rayservers.com/ From eugen at leitl.org Wed Mar 16 14:49:17 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 16 Mar 2011 22:49:17 +0100 Subject: Scott Adams pulls a Brin In-Reply-To: <4D812FE4.2040305@rayservers.com> References: <20110316180410.GO23560@leitl.org> <4D812FE4.2040305@rayservers.com> Message-ID: <20110316214917.GQ23560@leitl.org> On Wed, Mar 16, 2011 at 09:47:16PM +0000, Rayservers wrote: > > I know you don't want to live in that city. I'm just curious what sort of > > price, in economic terms, and in convenience and in social benefits, we pay > > for our privacy. My guess is that it's expensive. > > Pure and utter bull shit. Truly heady stuff, innit? From ylaveraoz at strykercorp.com Wed Mar 16 23:36:31 2011 From: ylaveraoz at strykercorp.com (Yolanda Lavera) Date: Thu, 17 Mar 2011 12:36:31 +0600 Subject: Best Male Enhancement, Natural Penis Enlargement Pills discounts and more! Message-ID: <4d81abef.c212315a@strykercorp.com> Best Male Enhancement Pill, Natural Penis Enlargement Pills Wonder what is the Best Male Enhancement Pill? Best Male Enhancement, Natural Penis Enlargement Pills discounts and more! http://biggerpenisbook.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 585 bytes Desc: not available URL: From Snchez55 at 4b-group.biz Thu Mar 17 11:46:33 2011 From: Snchez55 at 4b-group.biz (Alba Lpez) Date: Thu, 17 Mar 2011 14:46:33 -0400 Subject: Smart souvenirs and the Swiss watch Message-ID: <933920.011YFRZFBLK7473SQYX6360125@liable.107plan.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 669 bytes Desc: not available URL: From Lucia_54 at cnn.com Thu Mar 17 09:41:04 2011 From: Lucia_54 at cnn.com (Dr.Isabel Gonzlez) Date: Thu, 17 Mar 2011 15:41:04 -0100 Subject: Magnificent watch and gifts Message-ID: <448558gzzu56573001.9739800206611m6uQ8vUC4q20263.18430NND099772xlhkoE2E2wdT-292477jg-Q4392918375694090.10o977nd4k6051.37559.46@aliphatic.wildmail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 620 bytes Desc: not available URL: From bretonptzx at marinastilist.ru Thu Mar 17 04:10:09 2011 From: bretonptzx at marinastilist.ru (=?koi8-r?B?7cnOyc3J2sHDydEgzsHMz8fP1w==?=) Date: Thu, 17 Mar 2011 16:40:09 +0530 Subject: =?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxSDXIDIwMTEgxy4gIO/Q1MnNydrJ?= =?koi8-r?B?0tXFzSDOwczPx8ku?= Message-ID: <2CD6E4D10698400389813301B5F02F76@Mary> 29-З0 марта 2011г. ТЕМА: Оптимизация налогов в 2011г. (НДФЛ, страховые взносы, затратные механизмы в налоговых схемах) \Моск. код/- 792-2I22 ; 44_5*.32*66 День1: СНИЖЕНИЕ СТРАХОВЫХ ВЗНОСОВ внедряем допустимые схемы снижения выплат налогов на доходы физических лиц в условиях кризиса и замены ЕСН страховыми взносами. Ставка обязательных страховых взносов с зарплаты с 2011 года составляет 34% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала ЕСН заменена отменой уплаты взносов с суммы дохода свыше 463 тыс. рублей, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: * Обзор изменений законодательства, связанных с повышением ставки страховых взносов. Сколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2011 гг. Какие схемы стали невыгодными; у каких налогоплательщиков положение даже улучшилось. * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. * Использование специальных налоговых режимов: * Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. * Использование вспомогательных организаций: * Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. * Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. * Использование процентных займов от физлиц. Расчет эффективности. * Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. * Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, * Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!), * Способы подтверждения источников крупных расходов физлиц и когда это необходимо. * Ответы на вопросы. По желанию – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. ----------------------------- День2: Варианты затратных схем. Оптимизируем НДС и налога на прибыль Программа: * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги сучетом будущих изменений законодательства, судебной практики и тенденцийразвития правоприменения. "Черные", "серые" и "белые"схемы. * Кто может быть участником "затратных" схем. Незаконные варианты: "недобросовестныеналогоплательщики" и контактирующие с ними риск-структуры ("белая"- "серая" - "черная" фирмы). Примеры "серых" схемс применением затратных механизмов (как нельзя "оптимизировать"!). Как нестать "недобросовестным". * Варианты затратных механизмов: * Виды приемлимых услуг и работ: Распространенные "плохие" варианты "виртуальных"услуг и работ (информационные, консультационные, маркетинговые, рекламные,ремонт...). Когда они все же допустимы. * Минимизация рисков "затратных" схем. "Явныепризнаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличиеделовых целей, "легенда", отсутствие дублирующихся функций. Грамотноеобоснование расходов и цен. Неаффилированность, прямые и косвенные признакиаффилированности, ее негативные последствия и когда она допустима; "искусственноедробление бизнеса с целью уклонения от уплаты налогов" (подход "как кЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельностьучастников "затратных" схем. * Иностранные низконалоговые компании в "затратных"схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п.Выбор низконалоговых юрисдикций. * Ответы на вопросы. По желанию и при наличиивозможности – индивидуальное экспресс-моделирование схем налоговогопланирования для компаний-участниц семинара. Вся информация по тел: (Ч95) Ч453266 ; 44_5Ч.О95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8034 bytes Desc: not available URL: From yuldkrjknylmr at 21cd.com Thu Mar 17 18:01:35 2011 From: yuldkrjknylmr at 21cd.com (Present to itself it...) Date: Thu, 17 Mar 2011 18:01:35 -0700 Subject: Interesting female bags and the Swiss watch Message-ID: <732923.866CXLXMNNL5827PDXB6956109@residual.3feetfromfalling.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 585 bytes Desc: not available URL: From corlisschristioh at netiq.com Thu Mar 17 05:07:32 2011 From: corlisschristioh at netiq.com (Corliss Christi) Date: Thu, 17 Mar 2011 18:07:32 +0600 Subject: Cialis - Brand and Generic. Great quality! No Prescription Required. VISA, MASTERCARD, AMEX. FDA approved. Message-ID: <62d64x58p87-24877930-712m8j50@djlygdfnoc> Cialis (Generic) 90 tabs x 20mg = $144.19 Cialis - Brand and Generic. Great quality! No Prescription Required. VISA, MASTERCARD, AMEX. FDA approved. http://pillhealthdrugstore.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 516 bytes Desc: not available URL: From Miguel_567 at doneasy.com Thu Mar 17 23:29:03 2011 From: Miguel_567 at doneasy.com (Emporio Armani. Prada Keychains ...) Date: Fri, 18 Mar 2011 02:29:03 -0400 Subject: Authoritative watch and gifts Message-ID: <1552vic6562039944212.838227041549723L8wYqPAIvPWE39.6867IRH71vzsviF4H1wtemxtbD-051343hw-K206265120467679.91w000ph0u534483.64843.94248@cortical.fdt.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 647 bytes Desc: not available URL: From roseannelr at jeraisy.com Thu Mar 17 12:55:10 2011 From: roseannelr at jeraisy.com (Rosario Roseanne) Date: Fri, 18 Mar 2011 03:55:10 +0800 Subject: Best penis enlargement pills and male enhancement products. Boost your sexual confidence Message-ID: <4d82671e.6df751f7@jeraisy.com> Penis Enlargement Pills - Best Penis Enlargement Pills Best penis enlargement pills and male enhancement products. Boost your sexual confidence http://biggerpenisbusiness.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 554 bytes Desc: not available URL: From Josefa5350 at 50rock.com Fri Mar 18 05:13:08 2011 From: Josefa5350 at 50rock.com (Patek, Porsche Design, Louis Vuitton - democratic price) Date: Fri, 18 Mar 2011 09:13:08 -0300 Subject: Attractive watch and gifts Message-ID: <467764765.KYAUSVRH6099ERQE0265459@omen.surfy.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 639 bytes Desc: not available URL: From buhg at dclient.ru Fri Mar 18 08:28:02 2011 From: buhg at dclient.ru (=?koi8-r?B?78LOwcw=?=) Date: Fri, 18 Mar 2011 09:28:02 -0600 Subject: =?koi8-r?B?79POz9fOwdEg1MXNwSDLwcsgz8LPytTJ09ggwsXaIM/CzsHMyd7LyQ==?= Message-ID: <000d01cbe581$122222c0$6400a8c0@buhg> двадцать восьмого марта 201Iг. +7 (код Москвы) ЧЧ539*68 <<<>>> ЧЧ5.З968 Налоговое планирование: как жить без обналички и фирм-однодневок и не разориться, уход от "черных" и "серых" схем, оптимизация налогов с использованием законных альтернативных схем. Цель: помочь компаниям, применяющим "серые" и "черные" схемы оптимизации налогов, уйти от них, и при этом не разориться, не уступить конкурентам, не уйти с рынка. Найти законные альтернативы таким схемам, платить налоги, но не переплачивать √ вот основная идея налогового планирования без "помоек" и "черного нала". 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности┘); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. --"Серые" (полулегальные) альтернативы: как нельзя "оптимизировать"! Фирмы-"прокладки", контактирующие с недобросовестными налогоплательщиками ("белая" - "серая" - "черная" фирмы). Краткий обзор других "серых" альтернатив. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. 5.Как можно и как нельзя оптимизировать налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменения. Обзор изменений налогового законодательства в 2011 г., как они повлияли на налоговые схемы. Ответы на вопросы. По желанию и возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Стоимость участия в семинаре 7 900 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: код: (четыре девять пять) ЧЧ5/39*68 или 792.2l22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5651 bytes Desc: not available URL: From eugen at leitl.org Fri Mar 18 03:03:40 2011 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 18 Mar 2011 11:03:40 +0100 Subject: RSA hacked Message-ID: <20110318100340.GV23560@leitl.org> http://www.wired.com/threatlevel/2011/03/rsa-hacked/ Hacker Spies Hit Security Firm RSA By Kim Zetter * March 17, 2011 | * 6:40 pm | * Categories: Breaches, Hacks and Cracks, RSA Conference Top security firm RSA Security revealed on Thursday that itbs been the victim of an bextremely sophisticatedb hack. The company said in a note posted on its website that the intruders succeeded in stealing information related to the companybs SecurID two-factor authentication products. SecurID adds an extra layer of protection to a login process by requiring users to enter a secret code number displayed on a keyfob, or in software, in addition to their password. The number is cryptographically generated and changes every 30 seconds. bWhile at this time we are confident that the information extracted does not enable a successful direct attack on any of our RSA SecurID customers,b RSA wrote on its blog, bthis information could potentially be used to reduce the effectiveness of a current two-factor authentication implementation as part of a broader attack. We are very actively communicating this situation to RSA customers and providing immediate steps for them to take to strengthen their SecurID implementations.b As of 2009, RSA counted 40 million customers carrying SecurID hardware tokens, and another 250 million using software. Its customers include government agencies. RSA CEO Art Coviello wrote in the blog post that the company was bconfident that no other b& products were impacted by this attack. It is important to note that we do not believe that either customer or employee personally identifiable information was compromised as a result of this incident.b The company also provided the information in a document filed with the Securities and Exchange Commission on Thursday, which includes a list of recommendations for customers who might be affected. See below for a list of the recommendations. A company spokesman would not provide any details about when the hack occurred, how long it lasted or when the company had discovered it. bWe are not withholding anything that would adversely impact the security of our customer systems,b said spokesman Michael Gallant. b[But] webre working with government authorities as well so webre not disclosing any further information besides whatbs on the blog post.b RSA categorized the attack as an advanced persistent threat, or APT. APT attacks are distinctive in the kinds of data the attackers target. Unlike most intrusions that go after financial and identity data, APT attacks tend to go after source code and other intellectual property and often involve extensive work to map a companybs infrastructure. APT attacks often use zero-day vulnerabilities to breach a company and are therefore rarely detected by antivirus and intrusion programs. The intrusions are known for grabbing a foothold into a companybs network, sometimes for years, even after a company has discovered them and taken corrective measures. Last yearbs hack into Google was considered an APT attack, and, like many intrusions in this category, was linked to China. RSA, which is owned by EMC, is a leading firm and is most known for the RSA encryption algorithm used to secure e-commerce and other transactions. The company hosts the top-ranked RSA security conference every year. Following is the list of recommendations RSA has provided to customers: b" We recommend customers increase their focus on security for social media applications and the use of those applications and websites by anyone with access to their critical networks. b" We recommend customers enforce strong password and pin policies. b" We recommend customers follow the rule of least privilege when assigning roles and responsibilities to security administrators. b" We recommend customers re-educate employees on the importance of avoiding suspicious emails, and remind them not to provide user names or other credentials to anyone without verifying that personbs identity and authority. Employees should not comply with email or phone-based requests for credentials and should report any such attempts. b" We recommend customers pay special attention to security around their active directories, making full use of their SIEM products and also implementing two-factor authentication to control access to active directories. b" We recommend customers watch closely for changes in user privilege levels and access rights using security monitoring technologies such as SIEM, and consider adding more levels of manual approval for those changes. b" We recommend customers harden, closely monitor, and limit remote and physical access to infrastructure that is hosting critical security software. b" We recommend customers examine their help desk practices for information leakage that could help an attacker perform a social engineering attack. b" We recommend customers update their security products and the operating systems hosting them with the latest patches. Photo: RSA SecurID tokens (br2dotcom/Flickr) From nelson_mikel at yahoo.com Fri Mar 18 11:32:48 2011 From: nelson_mikel at yahoo.com (Michael Nelson) Date: Fri, 18 Mar 2011 11:32:48 -0700 (PDT) Subject: RSA hacked Message-ID: <223381.58103.qm@web63105.mail.re1.yahoo.com> Anyone know what is going on? RSA have been pretty cagey about it -- I know more about Three Mile Island, Chernobyl, and the Japanese nuclear disasters combined than about what has actually happened at RSA. If I had to guess, I'd guess that securid uses a super-master secret, from which they generate a master secret for each enterprise. Then when RSA provisions a token for an enterprise, they generate the individual secret from the enterprise master secret. I have not read up on securid for years. The kind of fuss over this break-in would be consistent with someone stealing enterprise master secrets. Any better conjectures? Or, better still, any actual information? Mike From fogsg02 at zonahelp.ru Fri Mar 18 06:59:03 2011 From: fogsg02 at zonahelp.ru (POSTMAN) Date: Fri, 18 Mar 2011 21:59:03 +0800 Subject: email advertisement. Message-ID: <000d01cbe574$a3aa38c0$6400a8c0@fogsg02> Email advertisement. Europe 440 000 000 address- 1000 USD. USA 80 000 000 address - 500 USD. Canada 26 000 000 address-500 USD. Mailing two times BSTS RGRDS POSTMAN (email for orders: POST at NETPOST.SU) From tidepool at suspicious.org Sat Mar 19 08:14:18 2011 From: tidepool at suspicious.org (tidepool) Date: Sat, 19 Mar 2011 11:14:18 -0400 Subject: 'Legal' WiFi hacking? Message-ID: <4D84C84A.2010404@suspicious.org> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Dutch Court Rules WiFi Hacking Is Now Legal By Loek Essers, webwereld.nl- Mar 18, 2011 6:05 pm Breaking in to an encrypted router and using the WiFi connection is not an criminal offence, a Dutch court ruled. WiFi hackers can not be prosecuted for breaching router security. A court in The Hague ruled earlier this month that it is legal to break WiFi security to use the internet connection. The court also decided that piggybacking on open WiFi networks in bars and hotels can not be prosecuted. In many countries both actions are illegal and often can be fined. The ruling is linked to a case of a student who threatened to shoot down everyone at the Maerlant College in The Hague, a high school. He posted a threat on the internet message board 4chan.org using a WiFi connection that he broke into. The student was convicted for posting the message and sentenced to 20 hours of community service, but he was acquitted of the WiFi hacking charges. The Judge reasoned that the student didn't gain access to the computer connected to the router, but only used the routers internet connection. Under Dutch law breaking in to a computer is forbidden. A computer in The Netherlands is defined as a machine that is used for three things: the storage, processing and transmission of data. A router can therefore not be described as a computer because it is only used to transfer or process data and not for storing bits and bytes. Hacking a device that is no computer by law is not illegal, and can not be prosecuted, the court concluded. If a secure WiFi connection is hacked or an open network is used for WiFi leeching, the action could be tried under civil law, said criminal lawyer Mathieu van Linde of Blokzijl Advocaten . The ruling led to some controversy in The Netherlands. Van Linde found the verdict "remarkable". He reckoned that most people from The Netherlands assume hacking a WiFi network is illegal. He also added that the law used by the court in this case was formed in the early nineties, and could be outdated, since it was not intended to cover WiFi networks. The Dutch attorney general decided to appeal the verdict. Within two years the case will be reviewed by the High Court of The Netherlands that will decide if a router can be defined as a computer under Dutch law. Hacking or even 'piggybacking' on an open WiFi connection is illegal in a wide variety of nations. In some states in the US unauthorized access of a network is an criminal offense, in other states piggybacking can be fined. WiFi leechers in the UK can be fined or arrested, depending on the intentions of the leecher. http://www.pcworld.com/article/222589/dutch_court_rules_wifi_hacking_is_now_legal.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBAgAGBQJNhMhKAAoJEEaTyAFUbka1CfoIAIoUq0LgGqUeCg0x+PGf0BV3 2ZvXZGAt1m8o5R9j4d+x8y91ZQvDwmNjoMkipnuw0resAOb5ZziTSqDqDu0LKsQ+ OrdUpswpnqvyWcefUnyHCku6l14kx/xfKX+o4abDD6NwkWhh0CFIfNOGrNRFQj6g mdMnHOGHbljzGKG4emo+Df/7cZn0BKBzCATvjyVEUIo58OOuulvPsLF/qSJjUlD5 zEr2s7F0iZ9rqsqWecHnezk1Ev6XuRCpLOl9iaN9oTFeMJdB521epB8tpdb3dToQ GHspUXnJsH+cjMTIvSHaKpalHUO8KvRiawTnW9bwtycF4Gl4xnEyXnR5UOakNUc= =U+K6 -----END PGP SIGNATURE----- From dorlamaragaretom at victoir.com Sat Mar 19 07:35:38 2011 From: dorlamaragaretom at victoir.com (Dorla Maragaret) Date: Sat, 19 Mar 2011 11:35:38 -0300 Subject: Get your XANAX for as low as $2.15 per pill and even cheaper right now! Message-ID: <4d84bf3a.f3cd6258@victoir.com> Xanax Online Store. Lowest Price guarantee! Get your XANAX for as low as $2.15 per pill and even cheaper right now! Best quality Xanax from fully licensed pharmacies without RX needed http://cheapmedsmarketing.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 560 bytes Desc: not available URL: From cypherpunks at al-qaeda.net Sat Mar 19 06:10:47 2011 From: cypherpunks at al-qaeda.net (Lourdes Hebert) Date: Sat, 19 Mar 2011 12:10:47 -0100 Subject: This month's Luxury Watch specials Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 249 bytes Desc: not available URL: From eol1 at yahoo.com Sat Mar 19 19:03:12 2011 From: eol1 at yahoo.com (Peter Thoenen) Date: Sat, 19 Mar 2011 16:03:12 -1000 Subject: Liberty Dollar - Final Nail? Message-ID: <4D856060.3070108@yahoo.com> http://charlotte.fbi.gov/dojpressrel/pressrel11/ce031811.htm Anybody have the court records? (John??) For Immediate Release March 18, 2011 United States Attorney's Office Western District of North Carolina Contact: (704) 344-6222 Defendant Convicted of Minting His Own Currency STATESVILLE, NCbBernard von NotHaus, 67, was convicted today by a federal jury of making, possessing, and selling his own coins, announced Anne M. Tompkins, U.S. Attorney for the Western District of North Carolina. Following an eight-day trial and less than two hours of deliberation, von NotHaus, the founder and monetary architect of a currency known as the Liberty Dollar, was found guilty by a jury in Statesville, North Carolina, of making coins resembling and similar to United States coins; of issuing, passing, selling, and possessing Liberty Dollar coins; of issuing and passing Liberty Dollar coins intended for use as current money; and of conspiracy against the United States. The guilty verdict concluded an investigation which began in 2005 and involved the minting of Liberty Dollar coins with a current value of approximately $7 million. Joining the U.S. Attorney Anne M. Tompkins in making todaybs announcement are Edward J. Montooth, Acting Special Agent in Charge of the FBI, Charlotte Division; Russell F. Nelson, Special Agent in Charge of the United States Secret Service, Charlotte Division; and Sheriff Van Duncan of the Buncombe County Sheriffbs Office. According to the evidence introduced during the trial, von NotHaus was the founder of an organization called the National Organization for the Repeal of the Federal Reserve and Internal Revenue Code, commonly known as NORFED and also known as Liberty Services. Von NotHaus was the president of NORFED and the executive director of Liberty Dollar Services, Inc. until on or about September 30, 2008. Von NotHaus designed the Liberty Dollar currency in 1998 and the Liberty coins were marked with the dollar sign ($); the words dollar, USA, Liberty, Trust in God (instead of In God We Trust); and other features associated with legitimate U.S. coinage. Since 1998, NORFED has been issuing, disseminating, and placing into circulation the Liberty Dollar in all its forms throughout the United States and Puerto Rico. NORFEDbs purpose was to mix Liberty Dollars into the current money of the United States. NORFED intended for the Liberty Dollar to be used as current money in order to limit reliance on, and to compete with, United States currency. In coordination with the Department of Justice, on September 14, 2006, the United States Mint issued a press release and warning to American citizens that the Liberty Dollar was bnot legal tender.b The U.S. Mint press release and public service announcement stated that the Department of Justice had determined that the use of Liberty Dollars as circulating money was a federal crime. Article I, section 8, clause 5 of the United States Constitution delegates to Congress the power to coin money and to regulate the value thereof. This power was delegated to Congress in order to establish and preserve a uniform standard of value and to insure a singular monetary system for all purchases and debts in the United States, public and private. Along with the power to coin money, Congress has the concurrent power to restrain the circulation of money which is not issued under its own authority in order to protect and preserve the constitutional currency for the benefit of all citizens of the nation. It is a violation of federal law for individuals, such as von NotHaus, or organizations, such as NORFED, to create private coin or currency systems to compete with the official coinage and currency of the United States. Von NotHaus, who remains free on bond, faces a sentence of up to 15 yearsb imprisonment on count two of the indictment and a fine of not more than $250,000. Von NotHaus faces a prison sentence of five years and fines of $250,000 on both counts one and three. In addition, the United States is seeking the forfeiture of approximately 16,000 pounds of Liberty Dollar coins and precious metals, currently valued at nearly $7 million. The forfeiture trial, which began today before United States District Court Judge Richard Voorhees, will resume on April 4, 2011 in the federal courthouse in Statesville. Judge Voorhees has not yet set a date for the sentencing of von NotHaus. bAttempts to undermine the legitimate currency of this country are simply a unique form of domestic terrorism,b U.S. Attorney Tompkins said in announcing the verdict. bWhile these forms of anti-government activities do not involve violence, they are every bit as insidious and represent a clear and present danger to the economic stability of this country,b she added. bWe are determined to meet these threats through infiltration, disruption, and dismantling of organizations which seek to challenge the legitimacy of our democratic form of government.b The case was investigated by the FBI, Buncombe County Sheriffbs Department, and the U.S. Secret Service, in cooperation with and invaluable assistance of the United States Mint. The case was prosecuted by Assistant United States Attorneys Jill Westmoreland Rose and Craig D. Randall, and the forfeiture trial is being prosecuted by Assistant United States Attorneys Tom Ascik and Ben Bain Creed. From buhg at alfresco.ru Sat Mar 19 02:11:52 2011 From: buhg at alfresco.ru (=?koi8-r?B?7sHMz8fP19nFINPIxc3Z?=) Date: Sat, 19 Mar 2011 16:11:52 +0700 Subject: =?koi8-r?B?9c3FztjbwcXNINLB08jPxNkgzsEg19nQzMHU1SDCxczPyiDawdLQzMHU?= =?koi8-r?B?2Q==?= Message-ID: <000d01cbe615$af7197b0$6400a8c0@buhg> двадцать девятого марта 201Iг. Налоговое планирование налогообложения доходов с физических лиц. (НДФЛ, страховые взносы) 8 Моск. код: 445/З968 или ЧЧ.5-*32-66 Цель: Ставка обязательных страховых взносов с зарплаты с 2011 года составляет 34% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала ЕСН заменена отменой уплаты взносов с суммы дохода свыше 463 тыс. рублей, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь √ назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1. Обзор изменений законодательства, связанных с повышением ставки страховых взносов Сколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2011 гг. Какие схемы стали невыгодными; у каких налогоплательщиков положение даже улучшилось. 2. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. 3. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность в 2011 г.; * дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с кассовой дисциплиной и политикой ЦБ. Текущая ситуация с обложением таких доходов НДФЛ. 4. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Страхование жизни работников и ДМС за счет предприятия. 6. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. 7. Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 8. Использование процентных займов от физлиц. Расчет эффективности. 9. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 10. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, 11. Создание недоимки по налогам с ФОТ на фирме, не обремененной активами √ пример "серой" схемы (как нельзя "оптимизировать"!), 12. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 13. Ответы на вопросы. По желанию √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 (Ч95) 7.9/2*2_I.2/2 <> 4Ч5/З2_66 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6715 bytes Desc: not available URL: From buhg at ad-vance.ru Sat Mar 19 13:54:23 2011 From: buhg at ad-vance.ru (=?koi8-r?B?6drV3sHFzSDLwcTSz9fPxSDExczP0NLPydrXz8TT1NfP?=) Date: Sat, 19 Mar 2011 21:54:23 +0100 Subject: =?koi8-r?B?68HE0s/X2cUgz9DF0sHDycksINLFx9XMydLP18HOycUu?= Message-ID: <000d01cbe677$d36cca10$6400a8c0@buhg> 23 марта 2011г. Тема: Правовые основы документирования деятельности кадровых служб с учетом последних изменений 8 Моск. код: 792*21/2-2 **** 792*2|22 Андреева Валентина - консультант-преподаватель, один из лучших специалистов России в области кадрового делопроизводства. Профессор кафедры Трудового права Академии Правосудия при Верховном Суде РФ (Москва), кандидат наук, документовед. Программа мероприятия: 1.Правовые основы документирования деятельности кадровых служб 1.1.Требования к кадровому делопроизводству, предусмотренные ТК РФ, в связи с обязательно-стью документирования работы с персоналом. 1.2.Государственный надзор и контроль за соблюдением законодательства в области докумен-тирования работы с кадрами. Штрафные санкции за нарушение порядка работы с кадровой документацией. 2.Система кадровой документации 2.1.Состав документов кадровой службы. 2.2.Нормативно-методические основы оформления кадровых документов. Унифицированные системы документации, применяемые в процессе документирования работы с персоналом. 2.3.Делегирование полномочий при издании документов. 2.4.Порядок придания документам юридической силы. Типичные ошибки в оформлении докумен-тов, судебная практика. 3.Документирование процедур подбора и отбора персонала 3.1.Проверка документов, предъявляемых при приеме на работу. Определение подлинности до-кументов. 3.2.Письменный отказ в приеме на работу: обязательность составления, правильность оформ-ления, обжалование в суде. 4.Документирование процедур, предшествующих заключению трудового договора. 4.1.Ознакомление с локальными нормативными актами работодателя. 4.2.Документирование процедуры фактического допущения к работе. 5.Документирование трудовых отношений. Виды документов и правила их оформления. 5.1.Оформление приема на работу, обязательные и рекомендательные документы. 5.2.Документы, создаваемые при изменении трудового договора. 5.3.Документирование прекращения трудового договора. Документы-основания для увольнения работников. 6.Ответы на вопросы слушателей и практические рекомендации. Стоимость участия 6 990 руб. Вся информация по тел: код: (четыре девять пять) 742.9l98 <> Ч.Ч5.Ч_0_95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4130 bytes Desc: not available URL: From ssanjuanayg at acta-assistance.com Sat Mar 19 16:17:12 2011 From: ssanjuanayg at acta-assistance.com (Shawanna Sanjuana) Date: Sat, 19 Mar 2011 23:17:12 +0000 Subject: Boost your sexual confidence, Best penis enlargement pills and male enhancement products. Message-ID: <19k62n79p26-78961356-197k4y64@vbbemyl> Penis Enlargement Pills - Best Penis Enlargement Pills Best penis enlargement pills and male enhancement products. Boost your sexual confidence http://biggerpeniscomputer.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 554 bytes Desc: not available URL: From a.solangekp at rbs.com Sun Mar 20 02:02:00 2011 From: a.solangekp at rbs.com (Armanda Solange) Date: Sun, 20 Mar 2011 15:02:00 +0600 Subject: Men use male enhancement supplements for a wide range of reasons Message-ID: <30k78l32c85-44703940-619y3c65@fhbfewyf> Why You Need to Buy Penis Pills? If you choose the right penis enhancement pills that work for you, you will find yourself unwilling to go back to how "sex used to be." Men use male enhancement supplements for a wide range of reasons. Indeed, there are certain factors that can interfere with a man's optimum enjoyment of sex - lifestyle, health habits, stress, aging, and many others. Many men would like to counter the effect of these factors by taking penis pills. For some, they want to improve certain aspects of their sexuality, such as: - Shortening the time it takes to achieve erection - Improving quality of erection - attaining harder, firmer and longer-lasting erections - Increase semen volume - Enhance sperm motility and virility - Increase sexual drive and libido - Heighten sexual stamina - Achieve more intense, longer and more frequent orgasms http://longpenislike.ru From mikeperry at fscked.org Sun Mar 20 20:05:44 2011 From: mikeperry at fscked.org (Mike Perry) Date: Sun, 20 Mar 2011 20:05:44 -0700 Subject: [tor-talk] How evil is TLS cert collection? Message-ID: Thus spake coderman (coderman at gmail.com): > > The brief summary is that it will be submitting rare TLS certificates > > through Tor to EFF for analysis and storage. We will also leverage the > > database of certificates to provide notification in the event of > > targeted MITM attacks**. > > > > I am trying to decide if this is a bad thing to enable by default for > > users. > > if EFF was presented with a national security letter or other legal > demand under seal demanding the existence of a given certificate not > be exposed, would they be bound to not present a MITM alert for that > cert? Leaving this for pde and/or Seth. > (said another way, could this potentially be a false sense of > security, if all trust for anomaly notification was placed in the EFF > alone?) The reality is we won't have the Firefox APIs to actually prevent content load after certificate inspection any time soon, so it's not feasible to trust this as your only security measure. Monsterous hacks might make this possible sooner, though... On a timescale where we can provide real security rather than just analysis and post-pwnage notification, we can build multiple databases to submit to/query, just like Perspectives. There's also no real reason why you can't use both Perspectives and HTTPS-Everywhere. Then you can get both of our half-assed after-the-fact notifications that you were owned :) -- Mike Perry Mad Computer Scientist fscked.org evil labs _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From devinbalkind at gmail.com Sun Mar 20 18:02:15 2011 From: devinbalkind at gmail.com (Devin Balkind) Date: Sun, 20 Mar 2011 21:02:15 -0400 Subject: Not sure if this is related but... Message-ID: I've been working on creating alliances between liberty and open source activists for about a year and have found that there is a MASSIVE philosophical overlap between people interested in technical and political freedom. In fact, I think one of the best opportunities the open source movement has to get in front of the American people is through the voices of 'tea party' political candidates. No joke. I was at CPAC last month telling every liberty activist I could get my hands on one simple thing: "The people will stop supporting government when they know they can thrive without it." Then I tell them about how easy it would be to create Drupal, Joomla and Wordpress deployments and component libraries for common tasks such as running schools, local governments, hospitals, fire departments, etc. We could have open source technology solutions originating from local groups instead of the federal government. They love it. There is an initiative brewing out of Young Americans for Liberty (formerly Students for Ron Paul) called Year of Youth . Their mission is to get 100+ youth candidates trained and running for local, state and federal offices by 2012. I may have the opportunity to develop their technology candidate training module. Another group we should all be familiar with is the Free State Project in New Hampshire where a multi-year effort to take over the state government and make New Hampshire the freest state in the Union is underway and beginning to pay divided. I've met many of the free staters. They're awesome and philosophically aligned with us. If we can help the liberty movement explain to the American people how they can overcome the challenges of self-governance using open source technologies, we can get our message of autonomy and resilience into the homes of nearly every American. If anyone on this list would like to help me with this endeavor, please let me know and we can connect. I've begun a presentation about this issue: https://docs.google.com/present/view?id=ddrgsgrv_1766g9jm7tz I've been listing resources here: http://www.sarapisfoundation.org/wiki/index.php?title=FLOAmerica Live Free :) On Sun, Mar 20, 2011 at 8:27 PM, Michael Grube wrote: > Tatiana, > > You are absolutely right. Everyone who is seriously involved in projects > like the must consider all possible reactions to the technologies being > developed - even the extremely unpleasant ones. The truth is that if we > achieve any amount of success we will have most of "the powers that be" > completely against us. Not to sound alarmist, but the cold truth is that if > your technology directly threatens a giant, there may be worse consequences > than being thrown in jail. > > This is a very important point that all contributors must keep in mind when > publishing their work. No conspiracy theories are necessary to realize that > a successful implementation will mean possible violence and radical changes. > > Michael > > On Sun, Mar 20, 2011 at 7:43 PM, Tatiana Maya wrote: > >> Hi All, >> >> I am a lurker in this group. My name is Tatiana, I am from Colombia and >> live in Brisbane - Australia since 2007. My interest about the contact event >> is in business and economics. Passionate about complementary currencies >> (CC's). >> >> There is a skype group about CC's where someone shared this >> http://www.zerohedge.com/article/fbi-busts-mastermind-criminal-issuing-silver-currency-demanding-repeal-fed-and-irs-faces-15- >> >> >> The >> main point of the article is: Someone will be in prison for 15 years due to >> his silver coin (Liberty Dollar) issuing. >> >> From that skype conversation I also got this: >> >> The Liberty Dollar case is far from "resolved," rather the conviction of >>> von Nothaus demonstrates just how far through the looking glass we have >>> gone. According to the US government, you may all be "terrorists." >>> Here is a quote from the FBI press release: >>> "Attempts to undermine the legitimate currency of this country are simply >>> a unique form of domestic terrorism,b U.S. Attorney Tompkins said in >>> announcing the verdict. bWhile these forms of anti-government activities do >>> not involve violence, they are every bit as insidious and represent a clear >>> and present danger to the economic stability of this country,b she added. >>> bWe are determined to meet these threats through infiltration, disruption, >>> and dismantling of organizations which seek to challenge the legitimacy of >>> our democratic form of government.b >>> http://charlotte.fbi.gov/dojpressrel/pressrel11/ce031811.htm >> >> >> So, this is not to implant fear or anything, but a pretty similar >> situation may be on the horizon for initiatives like the decentralized >> internet. I don't know what the laws are about it in the US, but it might be >> worth having a look to try to anticipate possible scenarios?? >> >> Is there anyone familiar with Admiralty law vs Commons Law?? There is a >> movie called Kymatica available on the internet that talks about it. It may >> appear the kind of conspiracy theory thing, but I found a group here in >> Australia that is actually disrupting the legal and banking system a bit >> using what they have discovered from the research on the matter. Just >> thoughts if anyone thinks these are interrelated topic. >> >> Cheers >> >> Tatiana >> >> >> >> On Mon, Mar 21, 2011 at 7:31 AM, Steve Jakson wrote: >> >>> Hi Douglas, >>> >>> I am fine with developing a solution to a problem. But can you suggest >>> me 2-3 topics so that I can choose one. It must be a semester project. >>> >>> On Mar 20, 6:51 am, Douglas Rushkoff wrote: >>> > Hi Steve, >>> > I would think part of the Masters thesis is to come up with the idea. >>> Given all the conversation that has been going on here, given the Wiki >>> filled with what exists and what doesn't, I would think you should be able >>> to pick from among the dozens of areas that need a fix and develop a >>> solution, no? >>> > >>> > On Mar 20, 2011, at 12:58 AM, Steve Jakson wrote: >>> > >>> > >>> > >>> > >>> > >>> > >>> > >>> > > Hello All, >>> > > I am a Graduate Student in Computer Science and I am supposed to do a >>> > > Masterbs Project in Computer Networks. Can someone suggest me some >>> > > idea so that I can develop and implement that idea and complete my >>> > > project. At the same time I want to be part of your open source >>> > > projects. So can you guys suggest me a project where it is mutually >>> > > helpful to both of us. >>> > > Waiting for your reply. >>> >> >> >> >> -- >> Tatiana Maya >> *The New Economics for Humanity* >> *Truthology Foundation* >> >> "Never offer the kind of help that disempowers. Never insist on offering >> the help you think is needed. Let the person or people in need know all that >> you have to give - then listen to what they want; see what they are ready to >> receive" Neale Donald Walsch >> >> > -- Devin Balkind @devinbalkind vitamindwb.com ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From liberationtech at lewman.us Sun Mar 20 18:35:54 2011 From: liberationtech at lewman.us (liberationtech at lewman.us) Date: Sun, 20 Mar 2011 21:35:54 -0400 Subject: [liberationtech] Fwd: [APC Forum] Online 'astroturfing': comment threads and forums are being hijacked and manipulated Message-ID: A correction to my own email, apparently "Operation Earnest Voice" is up to $200m, not the $10m I read somewhere. $200m figure from http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks -- Andrew pgp key: 0x74ED336B _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From rosina.viviennegn at execulink.com Sun Mar 20 11:59:20 2011 From: rosina.viviennegn at execulink.com (Rosina Vivienne) Date: Sun, 20 Mar 2011 22:59:20 +0400 Subject: Buy Viagra Online at Discount Price. We accept: Visa, Master, ACH. Fast online consultation! Message-ID: <4d864e88.8fca7d22@execulink.com> Buy Viagra Online - Cheap Price Buy Viagra Online at Discount Price. We accept: Visa, Master, ACH. Fast online consultation! http://buydrugstech.ru From eugen at leitl.org Sun Mar 20 15:08:52 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 20 Mar 2011 23:08:52 +0100 Subject: Iran cracks down on web dissident technology Message-ID: <20110320220852.GF23560@leitl.org> http://www.telegraph.co.uk/news/worldnews/middleeast/iran/8388484/Iran-cracks-down-on-web-dissident-technology.html Iran cracks down on web dissident technology Iranian security authorities have launched a new crackdown on dissidents online by blocking US government-backed technology that allows them to speak out safely. Tor took off in Iran after the disputed 2009 election Photo: AFP/GETTY By Christopher Williams, Technology Correspondent 7:00AM GMT 18 Mar 2011 Internet freedom activists believe the regime in Tehran has implemented highly sophisticated internet surveillance technology and that an information barms raceb is now inevitable. The crackdown targeted Tor, a free piece of software that allows anyone to connect to internet via a global private network that hides computer IP addresses, which could be used by authorities to identify and locate dissidents. It also encrypts the contents of users' internet communications, making eavesdropping on emails, Facebook, Twitter and other applications more difficult. On average, around 250,000 computers worldwide are connected to the Tor network at any time, making it the leading anti-surveillance technology online. But in mid-January, as revolutionary fervour swept the Middle East, the number of computers connected to the Tor network via one major Iranian broadband provider collapsed almost overnight from more than 11,000 to zero. Investigations by the Tor Project, the not-for-profit company that runs the system, have since revealed that, crucially, other encrypted traffic such as internet banking was still flowing. It meant Iranian authorities had for the first time found a way to identify and block only Tor connections, and therefore a way to potentially identify dissidents. bWhat they did was vastly upgrade their capability,b said Andrew Lewman, executive director of the Tor Project. The technology responsible for the new threat was Deep Packet Inspection (DPI), a type of high-end network equipment that uses ultra-fast microchips to read and classify internet traffic in transit. The Iranian authorities used DPI to detect the highly specific parameters Tor uses to establish an encrypted connection. bFrom an engineering perspective this is fantastic,b said Mr Lewman of his adversaries' efforts. He added that the Tor Project had known it could be attacked in this way bfor yearsb, but had chosen not to take pre-emptive measures because bwebre trying to have an arms race really slowlyb. In the last few weeks developers have redesigned the software so that its traffic looks just like any other when it sets up an encrypted connection, and Iranian user numbers are now back to normal. It is unknown who supplied Iran with the DPI technology, but few technology manufacturers build equipment capable of reading and classifying internet traffic at the necessary scale and speed. Last year, Nokia-Siemens faced a European Parliament hearing after it admitted selling a mass communications bmonitoring centreb to an Iranian mobile network. bWho knows, maybe they just got someone to configure it for them,b Mr Lewman speculated. Whoever the supplier, the temporary block on Tor does show that Iran is now more advanced than even China and its Great Firewall in terms of the technology it uses to suppress dissent online, said Mr Lewman. The regime has rapidly caught up with its critics since the unrest following the 2009 election, when the number of Tor users rocketed from approximately 1,200 to 2,800 in a matter of days as many Iranians first began to use social networks to organise protests. The value of binternet freedomb technologies to US foreign policy has not gone unnoticed in Washington: the Tor Projectbs arms race with Iranian authorities is funded in part by grants from both the Department of Defense and the State Department. From jya at pipeline.com Mon Mar 21 05:05:30 2011 From: jya at pipeline.com (John Young) Date: Mon, 21 Mar 2011 08:05:30 -0400 Subject: Liberty Dollar - Final Nail? In-Reply-To: <4D856060.3070108@yahoo.com> Message-ID: The Liberty Dollar-Von Nothaus indictment and lists of exhibits. http://cryptome.org/0003/von-nothaus.zip (1.1MB) The list of Von Nothaus exhibits includes a bibliography on the many predecessors and uses of local currencies. The list of USG exhibits ignores the persistently popular means to manage financial affairs locally. From eugen at leitl.org Mon Mar 21 00:28:36 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 21 Mar 2011 08:28:36 +0100 Subject: Not sure if this is related but... Message-ID: <20110321072836.GI23560@leitl.org> ----- Forwarded message from Devin Balkind ----- From oqcap at softforall.ru Mon Mar 21 02:07:32 2011 From: oqcap at softforall.ru (=?koi8-r?B?7sXEz8LSz9PP18XT1M7ZxSDQz9PUwdfdycvJ?=) Date: Mon, 21 Mar 2011 09:07:32 +0000 Subject: =?koi8-r?B?7sXEz8LSz9PP18XT1M7ZxSDLz87U0sHHxc7U2SAtINPQz9PPwtkgws/S?= =?koi8-r?B?2MLZ?= Message-ID: двадцать пятого марта 201Iг. Тема: (НЕДОБРОСОВЕСТНЫЕ ПОСТАВЩИКИ.) ПРАКТИЧЕСКИЕ РЕКОМЕНДАЦИИ КАК ОТВЕЧАТЬ НАЛОГОВОЙ ИНСПЕКЦИИ В СЛУЧАЕ ПРОВЕРКИ НЕДОБРОСОВЕСТНЫХ КОНТРАГЕНТОВ И КАК МОЖНО УЙТИ ОТ НДС БЕЗ ПОСЛЕДСТВИЙ код: (четыре девять пять) 4Ч5ЧО95 \\\/// ЧЧ.54_О95 Цель обучения: Обучающий курс даст слушателям ответ на то, как правильно заключать договоры и что делать, если он ошибся, но при этом хотел бы сохранить свои налоговые обязательства без изменений. Слушатели будут точно знать, что и как отвечать налоговой инспекции в случае проверки таких контрагентов. Поймут, как можно уйти от НДС без последствий. В период кризисных явлений в экономике, и как следствие острой нужды государства в пополнении бюджета, ФНС ужесточила требования к проверкам - повысила границу результативности проверок до миллиона рублей (приказ ФНС №409), а также предложила идти простым путем – находить среди контрагентов налогоплательщика компании, которые подпадают под признаки недобросовестных и лишать налогоплательщика налоговых льгот полученных в результате взаимодействия с такими организациями (Приказ ФНС России №ММ-3-2/467@). Практика свидетельствует, что практически все проверки налогоплательщиков применяющих ОСН затрагивают данный вопрос с негативными для налогоплательщика последствиями. При этом налоговый орган исключает из состава затрат НП и вычетов по НДС суммы по контрагентам, которые, например, просто не отвечают на запрос в рамках встречных проверок, либо не заплатили налоги и т.п. Подчас очень тяжело отстоять свою правоту в спорах с налоговым органом. Курс посвящен вопросу защиты налогоплательщика, призван помочь ему как не погрязнуть в тотальных проверках своих контрагентов, так и впоследствии защитить свои права по взаимоотношениям я такими компаниями. На Обучении не только будут показаны способы противодействия придиркам налоговой, но и будут разобраны способы заключения договоров, которые в принципе исключают возможность признания лица недобросовестным, а также законные способы снижение налоговой нагрузки по НДС в том случае, если налогоплательщик в этом заинтересован. Программа: 1. Методические указания Минфина о назначении выездных налоговых проверок (включая Приказ ФНС от 22.09.10 N ММB-7-2/461@, Приказ УФНС по г. Москве от 1 сентября 2008 г №409 и др.) 2. Методические указания Минфина по поиску недобросовестных контрагентов. Рассмотрение мер, которые планирует принять Минфин, Минюст по борьбе с однодневками. 3. Основания признания налоговой выгоды необоснованной (на основании судебной практики, писем Минфина, практики проверок). 4. Что необходимо сделать, чтобы проявить разумную осмотрительность. Какие документы и какую информацию о контрагенте необходимо собрать. 5. Как защититься от претензий налогового органа о том, что контрагент: * не платит налоги и не сдает отчетность; * не отвечает на встречные проверки; * не находиться по месту регистрации, либо зарегистрирован по адресу массовой регистрации; * директор БОМЖ, ничего не подписывал, его подпись подделали и т.п. * директор является "массовым", в отношении руководителя проводятся розыскные мероприятия; * проведенный осмотр показал, что компания не могла отгрузить товар с адреса, указанного в накладной, счете-фактуре; * коды ОКВЭД контрагента не позволяют ему произвести действия, которые он якобы произвел по отношению к налогоплательщику (не может выполнять работы, поставлять товар и т.п., так как создан для иных целей); * иные претензии. 6. Анализ предмета доказывания по спорам о получении необоснованной налоговой выгоды. Установление размера требований по подобным делам. Взыскание всех ранее заявленных вычетов и расходов как нарушение принципа соразмерности и справедливости. Анализ аналогичной практики Европейского Суда. 7. Разбор основных ошибок допускаемых налоговыми органами в процессе доказывания получение налоговый выгоды (встречные проверки реально не проводятся, а данные берется из компьютерной системы учета, вместо допросов проводиться опрос, вместо экспертизы получаются заключения специалиста и т.п.). Как использовать ошибки (подробно). 8. Создание преюдиции для доказывания реальности сделки. 9. Способ ухода от признания налоговой выгоды необоснованной при заключении договоров с поставщиками при помощи посредника. Как построить договор, чтобы претензии по поставщикам нельзя было предъявить. 10. Уход от признания налоговой выгоды необоснованной путем особого способа заключения договоров. 11. Уход от уплаты НДС с наценки путем: * заключения договора с дополнительной выгодой; * включение условий о неустойки; * использование простого товарищества. 12. Кто отвечает за работу с недобросовестными контрагентами (директор или бухгалтер) и в какой части. Рассмотрение основных законодательных инициатив и принятых в последнее время законов, направленных на борьбу с "однодневками". 13. Потеря документов по недобросовестным поставщикам. Налоговые последствия. Указания Минфина по привлечению к ответственности в таком случае. Способ защиты от налоговых претензий. Является ли потеря документов защитой от претензий правоохранительных органов. 14. Анализ возможности рассмотрения любого налогового спора в Арбитражном суде г. Москвы, как способ обойти негативную практику конкретного региона. 15. Изменение практики компенсации судебных издержек. 16. Ответы на индивидуальные вопросы. Cтоимоcть: 7900 руб. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 (код Москвы) 7Ч2/9i98 <> 4*Ч5/Ч*0_95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8629 bytes Desc: not available URL: From ialberthakw at oxygenforbusiness.com Mon Mar 21 09:11:54 2011 From: ialberthakw at oxygenforbusiness.com (Isobel Albertha) Date: Mon, 21 Mar 2011 11:11:54 -0500 Subject: Buy Replica Watches, Fake Watch for Sale. Message-ID: <201103211915.0862466D6B8655D30DFE8AB@lby571u1xb> $139 Replica Rolex Watches, Best Swiss Fake Rolex Replica Replica rolex watches for sale,fake rolex watches will help you to find the best rolex replica watches at lowest prices. http://swissreplicarepair.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 617 bytes Desc: not available URL: From eugen at leitl.org Mon Mar 21 03:22:26 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 21 Mar 2011 11:22:26 +0100 Subject: [liberationtech] Fwd: [APC Forum] Online 'astroturfing': comment threads and forums are being hijacked and manipulated Message-ID: <20110321102226.GL23560@leitl.org> ----- Forwarded message from liberationtech at lewman.us ----- From sneak at datavibe.net Mon Mar 21 04:03:55 2011 From: sneak at datavibe.net (Jeffrey Paul) Date: Mon, 21 Mar 2011 12:03:55 +0100 Subject: Google releases their own open source Bitcoin client Message-ID: http://www.techworld.com.au/article/380396/google_releases_open_source_bitcoi n_client/ So it begins. -jp -- ======================================================== Jeffrey Paul -datavibe- sneak at datavibe.net +1 (800) 403-1126 http://sneak.datavibe.net 5539AD00 DE4C42F3 AFE11575 052443F4 DF2A55C2 "Virtue is its own punishment." ======================================================== From lodewijkadlp at gmail.com Mon Mar 21 04:14:20 2011 From: lodewijkadlp at gmail.com (=?UTF-8?Q?lodewijk_andr=C3=A9_de_la_porte?=) Date: Mon, 21 Mar 2011 12:14:20 +0100 Subject: Google releases their own open source Bitcoin client In-Reply-To: References: Message-ID: I was in before the hype. I'm cool now! 2011/3/21 Jeffrey Paul > > http://www.techworld.com.au/article/380396/google_releases_open_source_bitcoi > n_client/ > > So it begins. > > -jp > > -- > ======================================================== > Jeffrey Paul -datavibe- sneak at datavibe.net > +1 (800) 403-1126 http://sneak.datavibe.net > 5539AD00 DE4C42F3 AFE11575 052443F4 DF2A55C2 > "Virtue is its own punishment." > ======================================================== From eugen at leitl.org Mon Mar 21 04:29:58 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 21 Mar 2011 12:29:58 +0100 Subject: [tor-talk] How evil is TLS cert collection? Message-ID: <20110321112958.GS23560@leitl.org> ----- Forwarded message from Mike Perry ----- From buhg at bizinmarket.ru Mon Mar 21 00:28:13 2011 From: buhg at bizinmarket.ru (=?koi8-r?B?7cnIwcnM?=) Date: Mon, 21 Mar 2011 12:58:13 +0530 Subject: =?koi8-r?B?UmU6IEUtbWFpbCAtINLFy8zBzcEg0yDUz97Oz8ogx8HSwc7UycXKINzG?= =?koi8-r?B?xsXL1ME=?= Message-ID: Предлагаем качественную доставку рекламы Базы адресов постоянно обновляются Очень гибкая система скидок постоянным клиентам до 50% При заказе 2х рассылок, 3я бесплатная; Подготовка макета бесплатно; Быстрый выход рассылки, по желанию день в день; Самый массовый охват целевой аудитории Пробив фильтров. Любые формы оплаты; Каждая рассылка перед отправкой тестируется; Москва от 2 тыс руб. Россия от 3000 руб. Страны СНГ от 2,5 тыс руб. Наши цены самые альтернативные, закажите у Нас и Вы будете удивлены качеством обслуживания. Формируем базы под каждое направление, продукт реализации. Фокусировка себя полностью оправдывает. тел: Девятьсот шестьдесят четыре, семьсот два, тридцать шесть, восемьдесят пять From eugen at leitl.org Mon Mar 21 05:35:42 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 21 Mar 2011 13:35:42 +0100 Subject: [cryptography] Another signature-scheme blunder Message-ID: <20110321123542.GW23560@leitl.org> ----- Forwarded message from Peter Gutmann ----- From nursultan at almatytrends.kz Mon Mar 21 11:16:03 2011 From: nursultan at almatytrends.kz (=?koi8-r?B?8NLJ2s7By8kgzsXEz8LSz9PP18XT1M7ZyCDQz9PUwdfdycvP1w==?=) Date: Mon, 21 Mar 2011 15:16:03 -0300 Subject: =?koi8-r?B?7sXEz8LSz9PP18XT1M7ZxSDQz9PUwdfdycvJLiDrwcsg08/I0sHOydTY?= =?koi8-r?B?INfZ3sXU2Q==?= Message-ID: <000d01cbe7f4$09b4c730$6400a8c0@nursultan> 25 марта 2011г. Тема: ПРИЗНАКИ НЕДОБРОСОВЕСТНЫХ ПОСТАВЩИКОВ. СПОСОБЫ ПРОТИВОДЕЙСТВИЯ ПРИДИРКАМ НАЛОГОВОЙ И СНИЖЕНИЕ НАЛОГОВОЙ НАГРУЗКИ ПО НДС (495) ЧЧ5/З2/66 <> Ч45*32/66 Цель обучения: Обучающий курс даст слушателям ответ на то, как правильно заключать договоры и что делать, если он ошибся, но при этом хотел бы сохранить свои налоговые обязательства без изменений. Слушатели будут точно знать, что и как отвечать налоговой инспекции в случае проверки таких контрагентов. Поймут, как можно уйти от НДС без последствий. В период кризисных явлений в экономике, и как следствие острой нужды государства в пополнении бюджета, ФНС ужесточила требования к проверкам - повысила границу результативности проверок до миллиона рублей (приказ ФНС ╧409), а также предложила идти простым путем √ находить среди контрагентов налогоплательщика компании, которые подпадают под признаки недобросовестных и лишать налогоплательщика налоговых льгот полученных в результате взаимодействия с такими организациями (Приказ ФНС России ╧ММ-3-2/467@). Практика свидетельствует, что практически все проверки налогоплательщиков применяющих ОСН затрагивают данный вопрос с негативными для налогоплательщика последствиями. При этом налоговый орган исключает из состава затрат НП и вычетов по НДС суммы по контрагентам, которые, например, просто не отвечают на запрос в рамках встречных проверок, либо не заплатили налоги и т.п. Подчас очень тяжело отстоять свою правоту в спорах с налоговым органом. Курс посвящен вопросу защиты налогоплательщика, призван помочь ему как не погрязнуть в тотальных проверках своих контрагентов, так и впоследствии защитить свои права по взаимоотношениям я такими компаниями. На Обучении не только будут показаны способы противодействия придиркам налоговой, но и будут разобраны способы заключения договоров, которые в принципе исключают возможность признания лица недобросовестным, а также законные способы снижение налоговой нагрузки по НДС в том случае, если налогоплательщик в этом заинтересован. Программа: 1. Методические указания Минфина о назначении выездных налоговых проверок (включая Приказ ФНС от 22.09.10 N ММB-7-2/461@, Приказ УФНС по г. Москве от 1 сентября 2008 г ╧409 и др.) 2. Методические указания Минфина по поиску недобросовестных контрагентов. Рассмотрение мер, которые планирует принять Минфин, Минюст по борьбе с однодневками. 3. Основания признания налоговой выгоды необоснованной (на основании судебной практики, писем Минфина, практики проверок). 4. Что необходимо сделать, чтобы проявить разумную осмотрительность. Какие документы и какую информацию о контрагенте необходимо собрать. 5. Как защититься от претензий налогового органа о том, что контрагент: * не платит налоги и не сдает отчетность; * не отвечает на встречные проверки; * не находиться по месту регистрации, либо зарегистрирован по адресу массовой регистрации; * директор БОМЖ, ничего не подписывал, его подпись подделали и т.п. * директор является "массовым", в отношении руководителя проводятся розыскные мероприятия; * проведенный осмотр показал, что компания не могла отгрузить товар с адреса, указанного в накладной, счете-фактуре; * коды ОКВЭД контрагента не позволяют ему произвести действия, которые он якобы произвел по отношению к налогоплательщику (не может выполнять работы, поставлять товар и тп., так как создан для иных целей); * иные претензии. 6. Анализ предмета доказывания по спорам о получении необоснованной налоговой выгоды. Установление размера требований по подобным делам. Взыскание всех ранее заявленных вычетов и расходов как нарушение принципа соразмерности и справедливости. Анализ аналогичной практики Европейского Суда. 7. Разбор основных ошибок допускаемых налоговыми органами в процессе доказывания получение налоговый выгоды (встречные проверки реально не проводятся, а данные берется из компьютерной системы учета, вместо допросов проводиться опрос, вместо экспертизы получаются заключения специалиста и т.п.). Как использовать ошибки (подробно). 8. Создание преюдиции для доказывания реальности сделки. 9. Способ ухода от признания налоговой выгоды необоснованной при заключении договоров с поставщиками при помощи посредника. Как построить договор, чтобы претензии по поставщикам нельзя было предъявить. 10. Уход от признания налоговой выгоды необоснованной путем особого способа заключения договоров. 11. Уход от уплаты НДС с наценки путем: * заключения договора с дополнительной выгодой; * включение условий о неустойки; * использование простого товарищества. 12. Кто отвечает за работу с недобросовестными контрагентами (директор или бухгалтер) и в какой части. Рассмотрение основных законодательных инициатив и принятых в последнее время законов, направленных на борьбу с "однодневками". 13. Потеря документов по недобросовестным поставщикам. Налоговые последствия. Указания Минфина по привлечению к ответственности в таком случае. Способ защиты от налоговых претензий. Является ли потеря документов защитой от претензий правоохранительных органов. 14. Анализ возможности рассмотрения любого налогового спора в Арбитражном суде г. Москвы, как способ обойти негативную практику конкретного региона. 15. Изменение практики компенсации судебных издержек. 16. Ответы на индивидуальные вопросы. Cтоимоcть: 7900 руб. Информацию можно получить по телефонам: (код Москвы) 445З266 <<>> Ч45З9.68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6915 bytes Desc: not available URL: From luca.dionisi at gmail.com Mon Mar 21 09:21:48 2011 From: luca.dionisi at gmail.com (Luca Dionisi) Date: Mon, 21 Mar 2011 17:21:48 +0100 Subject: [Netsukuku] Netsukuku port to Vala. Work in progress, help wanted. Message-ID: I have encountered many problems [and did not succeed yet] in making Python Stackless work correctly in ARM or MIPS architectures. Even admitting that it is possible, the python interpreter itself is quite memory consuming. This makes many/most embedded devices out of luck for netsukuku. The main points in favor of using Stackless instead of C, at least for me, have been: - fast prototyping - co-routine support (that is, tasklets in stackless terminology) Recently I have made some research on alternatives. The first requirement of course was support of co-routines. The most portable framework for this support is GNU Pth. [0] The second requirement was a good-enough high-level language that could allow the developer to focus on functional details. And possibly have a near one-to-one mapping of the features of python interpreter that we mostly used in our program. I think Vala does. [1] And it has many good points over other languages. It has modern features while producing old style C API/ABI compatible machine code. Long story short, I started to organize the basis for a port of current python implementation of netsukuku to Vala. The first task was producing a binding (vapi file) for the Pth library. I made one that does the job for what we need - could be improved, though. Right now there is a working implementation of tasklets ("microfunc" in our python code) scheduling, switching, inter-communication (Channels in our python code) and events (for free in Vala as signals). I promise to post updates soon when I can make some tests on my little mipsel-based router. [2] Soooo, to get to the point. This work is not going to be quick and simple. Any help with the development is welcome, especially right now or soon. I could organize the work and assign little tasks to anyone that has some expertise on vala. I am a vala newbie myself. Knowledge of python is not a requirement, because reading the old code is quite straightforward and one can ask when in doubt. Knowledge of current workings of netsukuku is not a requirement either. Sure, it could help. But I would assign very specific tasks and coordinate the rest, so that also "new entry" developers can help a lot. Have a look at the initial code [3] and please get involved! --Luca [0] http://www.gnu.org/software/pth/ [1] http://live.gnome.org/Vala [2] http://www.omnima.co.uk/store/catalog/Embedded-controller-p-16140.html and a review here: http://www.kelvinsthunderstorm.com/omnima-embedded-controller-and-openwrt/ [3] http://dev.hinezumi.org/browser/netsukuku/sandbox/lukisi/branches/multipleip/valantk _______________________________________________ Netsukuku mailing list Netsukuku at lists.dyne.org http://lists.dyne.org/mailman/listinfo/netsukuku ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Mar 21 09:40:11 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 21 Mar 2011 17:40:11 +0100 Subject: [Netsukuku] Netsukuku port to Vala. Work in progress, help wanted. Message-ID: <20110321164010.GK23560@leitl.org> ----- Forwarded message from Luca Dionisi ----- From eugen at leitl.org Mon Mar 21 10:02:48 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 21 Mar 2011 18:02:48 +0100 Subject: The Cypherpunk Revolutionary Message-ID: <20110321170248.GA1163@leitl.org> http://www.themonthly.com.au/julian-assange-cypherpunk-revolutionary-robert-manne-3081 EXCLUSIVE: THE COMPLETE 15,000-WORD ESSAY Interview: Late Night Live Extract of 3,0000-words: The Australian March 2011: Revised in light of a lengthy email exchange initiated by Julian Assange Robert Manne's picture March 2011 | The Monthly Essays | Assange | Assassination | Communications | Human Rights | Iraq | Julian Assange | Wikileaks | HRAFF The Cypherpunk Revolutionary Julian Assange Robert Manne March 2011 cover image Less than twenty years ago Julian Assange was sleeping rough. Even a year ago hardly anyone knew his name. Today he is one of the best-known and most-respected human beings on earth. Assange was the overwhelming winner of the popular vote for Time magazinebs bPerson of the Yearb and Le Mondebs less politically correct bMan of the Yearb. If Rupert Murdoch, who recently turned eighty, is the most ino,uential Australian of the post-war era, Julian Assange, who will soon turn forty, is undoubtedly the most consequential Australian of the present time. Murdochbs importance rests in his responsibility for injecting, through Fox News, the poison of rabid populist conservatism into the political culture of the United States; Assangebs in the revolutionary threat that his idea of publishing damaging documentary information sent by anonymous insiders to WikiLeaks poses to governments and corporations across the globe. Julian Assange has told the story of his childhood and adolescence twice, most recently to a journalist from the New Yorker, Raffi Khatchadourian, and some fifteen years ago, secretly but in greater detail, to Suelette Dreyfus, the author of a fascinating book on the first generation of computer hacking, Underground, for which Assange was the primary researcher. In what is called the bResearcherbs Introductionb, Assange begins with a cryptic quote from Oscar Wilde: bMan is least himself when he talks in his own person. Give him a mask, and he will tell you the truth.b Nothing about Assange has ever been straightforward. One of the main characters in Underground is the Melbourne hacker Mendax. Although there is no way readers at that time could have known it, Mendax is Julian Assange. Putting Khatchadourian and Dreyfus together, and adding a little detail from a blog that Assange published on the internet in 2006b07 and checking it against commonsense and some material that has emerged since his rise to fame, the story of Assangebs childhood and adolescence can be told in some detail. There is, however, a problem. Journalists as senior as David Leigh of the Guardian or John F. Burns of the New York Times in general accept on trust many of Assangebs stories about himself. They do not understand that, like many natural writers, he has fashioned his life into a fable. According to Assange, his mother, Christine Hawkins, left her Queensland home for Sydney at the age of seventeen, around 1970, at the time of the antibVietnam War movement when the settled culture of the Western world was breaking up. Christinebs father, Dr Warren Hawkins, was the principal of the Northern Rivers College of Advanced Education; her mother was a specialist in medieval literature. Christine fell in love with a man called John Shipton in Sydney. A year or so after Julian was born, in Townsville, they parted. Assange did not meet Shipton again till he was twenty-five. When Julian was about one, Christine met and married a roving theatrical producer and member of what was by now called the counter-culture, Brett Assange. According to what Julian told Khatchadourian, Brett was the descendant of a Chinese immigrant who had settled on Thursday Island, Ah Sang or Mr Sang. Together Brett and Christine travelled around the country, performing. He painted a vivid portrait for Khatchadourian of an idyllic life after the family settled for a time on Magnetic Island. bMost of this time was pretty Tom Sawyer. I had my own horse. I built my own raft. I went fishing. I was going down mine shafts and tunnels.b To Dreyfus, Julian claimed his stepfather was a decent man but also an alcoholic. By the time he was addressing audiences worldwide, his bfatherb b which Assange informed me is an amalgam of Brett Assange and John Shipton, created to protect their identities b had become idealised as a bgood and generous manb who had taught him the most fundamental lesson in life: to nurture victims rather than to create them. Assange also told Dreyfus about a foundational political memory, an incident that had occurred while he was about four but was much spoken of later. His mother and a male friend had discovered evidence concerning the British atomic bomb tests that had taken place in Maralinga in greatest secrecy, which they intended to give to an Adelaide journalist. The male friend had been beaten by police to silence him. Christine had been warned that she was in danger of being charged with being ban unfit motherb. She was advised to stay out of politics. When Julian was eight or nine years old, Christine and Brett Assange separated and then divorced. His mother now formed a btempestuousb relationship with an amateur musician, Keith Hamilton, with whom she had another child, a boy. To Dreyfus, Julian described Hamilton as a bmanipulative and violent psychopathb. A brief bitter battle over access to Julianbs half-brother was fought. Christinebs family was now once more on the move b this time not as before on a bhappy-go-lucky odysseyb, but hiding on both sides of the continent in permanent terror. In his final years of education Julian was home-schooled or independently educated either by professors encountered on their travels or by following his curiosity in public libraries. He did, however, attend very many schools. According to Dreyfus, by the time Mendax was fifteen he bhad lived in a dozen different placesb and had benrolled in at least as many different schoolsb. His lawyer in his trial of 1996, Paul Galbally, also told the court Assange had been enrolled in about twelve schools. By 2006, Assange claimed he had attended thirty-seven different schools. To answer my doubt, Assange explained: bSince my mother was going to be a witness and could only reliably remember the schools I had spent a long time at b& we claimed merely twelve to be safe. The figure of 37 includes schools I spent a single day attending.b One of the schools Julian attended was in rural Victoria. In the blog he posted on 18 July 2006, there is an account of his and another outsiderbs experience at this school. We were bright sensitive kids who didnbt fit into the dominant sub-culture and fiercely castigated those who did as irredeemable boneheads. This unwillingness to accept the authority of a peer group considered risible was not appreciated. I was quick to anger and brutal statements such as bYoubre a bunch of mindless apes out of Lord of the Fliesb when faced with standover tactics were enough to ensure I got into a series of extreme ?ghts and I wasnbt sorry to leave when presented with the dental bills of my tormentors. Eventually Julianbs family settled on the outskirts of Melbourne in Emerald and then Tecoma, according to Dreyfus. Christine bought Julian a $700 computer and a modem. Assange fell in love with a 16-year-old girl, Teresa, whom he claims to have met through a program for gifted children. He left home and then married his girlfriend. They had a son. This was the period when the underground sub-culture of hacking was forming in Melbourne. Around 1988 Assange joined it under the handle Mendax. By October 1989 an attack was mounted from Australia on the NASA computer system via the introduction of what was called the WANK worm in an attempt to sabotage the Jupiter launch of the Galileo rocket as part of an action of anti-nuclear activists. No one claimed responsibility for this attack, which is outlined in the first chapter of Underground. In a Swedish television documentary, WikiRebels, made with Assangebs co-operation, there are hints he was responsible. Mendax formed a closed group with two other hackers b Trax and Prime Suspect. They called themselves the International Subversives. According to Dreyfus, their politics were fiercely anti-establishment; their motive adventure and intellectual curiosity; their strict ethic not to profit by their hacking or to harm the computers they entered. Mendax wrote a program called Sycophant. It allowed the International Subversives to conduct bmassive attacks on the US militaryb. The list of the computers they could recall finding their way into bread like a Whobs Who of the American military-industrial complexb. Eventually Mendax penetrated the computer system of the Canadian telecommunications corporation Nortel. It was here that his hacking was first discovered. The Australian Federal Police conducted a long investigation into the International Subversives, Operation Weather. Eventually Trax lost his nerve and began to talk. He told the police that the International Subversives had been hacking on a scale never achieved before. In October 1991 the Australian Federal Police raided Prime Suspectbs and Mendaxbs homes. They found Assange in a state of near mental collapse. His young wife had recently left him, taking their son Daniel. Assange told Dreyfus that he had been dreaming incessantly of bpolice raids b& of shadows in the pre-dawn darkness, of a gun-toting police squad bursting through his backdoor at 5 a.m.b When the police arrived, the incriminating disks, which he had been in the habit of hiding inside a beehive, were scattered by his computer. The evidence was removed. Assange descended into a personal hell. He was admitted briefly to hospital, suffering from what Suelette Dreyfus describes as ba deep depression and consuming rageb. He tried and failed to return home to live with his mother. He frequently slept along Merri Creek in Melbourne or in Sherbrooke Forest. He told Dreyfus that 1992 was bthe worst year in his lifeb. The formal charges against Assange were not laid until July 1994. His case was not finally settled until December 1996. Although Assange had been speaking in secretive tones about the technical possibility of a massive prison sentence, in the end he received a $5000 good behaviour bond and a $2100 reparations fine. The experience of arrest and trial nonetheless scarred his soul and helped shape his politics. In his blog of 17 July 2006, Assange wrote: If there is a book whose feeling captures me it is First Circle by Solzhenitsyn. To feel that home is the comraderie [sic] of persecuted, and in fact, prosecuted, polymaths in a Stalinist labor camp! How close the parallels to my own adventures! b& Such prosecution in youth is a defining peak experience. To know the state for what it really is! To see through that veneer the educated swear to disbelieve in but still slavishly follow with their hearts! b& True belief only begins with a jackboot at the door. True belief forms when lead [sic] into the dock and referred to in the third person. True belief is when a distant voice booms bthe prisoner shall now riseb and no one else in the room stands. No doubt the experience of investigation and prolonged trial was harrowing. Nonetheless, this is a rather self-dramatising passage. Solzhenitsyn was incarcerated in the Gulag Archipelago, harassed for years by the KGB and eventually expelled from the Soviet Union. Assange was investigated by the AFP and received a good behaviour bond and a fine. Julian Assange was extremely sensitive about any public discussion of his impending trial. In 1994 he offered to assist the director of Dogs in Space, Richard Lowenstein, with a film about hackers. Assange spoke about the 290 years he might theoretically spend in prison. He learned that Lowenstein had not kept this information confidential. He was furious. He sent Lowenstein a series of threatening emails in which he outlined details of Lowensteinbs sexual life. Assange explained to me he did so to make Lowenstein aware of bthe significance of his confidentiality breach by way of analogyb. Lowenstein protested. Had Assange no understanding of the concept of privacy? Privacy, Assange replied, is brelativeb. bI could monitor your keystrokes, intercept your phone and bug your residence. If I could be bothered b& As one whobs has [sic] onebs life monitored pretty closely, you quickly come to the realisation that trying to achieve complete privacy is impossible.b If Lowenstein wanted to keep details of his life confidential he should use encrypted email. Lowenstein told Assange he had not realised that the information was confidential. bI do not doubt your reasons were not malicious. Stupidity, ignorance and lack of respect come to mind. You seem to think I have only one life. I have many.b While awaiting trial, Julian Assange began to try to reconstruct his life. One overwhelming preoccupation was the bitter struggle waged for the custody of his son, Daniel. In their struggle, Julian and Christine Assange formed a small activist group b Parent Inquiry into Child Protection. They found sources of support inside the Victorian Department of Health and Community Services. An insider provided them with a document of great value to their cause b an internal departmental manual outlining the current rules determining custody disputes. He told Dreyfus that in his fight against government corruption in Victoria he had bacted as a conduit for leaked documentsb. On several occasions recently, in answering questions about the origin of WikiLeaks, Assange has spoken of a domain site registered in 1999, but with which he did nothing, known as bleaks.orgb. His interest in leaks must have preceded that. In November 1996 he sent the following enigmatic message to those on certain email lists he had created. A few pointy heads in Canberra have been considering your moderatorbs continued existence. Consequentially Ibve been called on to justify labour and resources spent on all projects under my control, particularly those that canbt easily be quantified such as IQ, BOS, LACC, IS, LEAKS b& All these lists were connected to an internet service provider, Suburbia Public Access Network, for which Assange was, as he puts it, bthe chief technical brainsb and which he had taken over when its original owner, Mark Dorset, went to live in Sydney. He likened it to a blow cost power-to-the-people enabling technologyb. Suburbia was the vehicle for several email lists b Interesting Questions (IQ), Best of Security (BOS), Legal Aspects of Computer Crime (LACC), Inside-Source (IS) and, presumably, LEAKS b that Assange created. It was also the free site for several groups of Melbourne activists, artists and others b the Powerline Action Group; the Alternative Technology Association; the Centre for Contemporary Photography; the Australian Public Access Network Association and, strangely enough, the Private Inquiry Agents Association. It is because of the continued existence on the internet of some of the commentary he wrote for these lists in his mid-twenties that we can begin to hear, for the first time, the distinctive political voice of Julian Assange. In general, it is intelligent and assured. One of Suburbiabs clients had published some of the Church of Scientologybs holy scriptures. The church threatened legal action against Suburbia. The client, Dave Gerard, fought back. In March 1996, Assange issued an appeal to join an anti-Scientology protest. What you have then is a Church based on brainwashing yuppies and other people with more money than sense b& If Nicole Kiddman [sic], Kate Cerbrano [sic], John Travolta, Burce [sic] Willis, Demi Moore and Tom Cruise want to spend their fortunes on learning that the earth is in reality the destroyed prison colony of aliens from outer space then so be it. However, money brings power and attracts the corrupt b& Their worst critic at the moment is not a person, or an organisation but a medium b the Internet. The Internet is by its very nature a censorship free zone b& The fight against the Church is far more than the Net versus a bunch of wackos. It is about corporate suppression of the Internet and free speech. It is about intellectual property and the big and rich versus the small and smart. At this time, to judge by the pieces he wrote that have survived, Assangebs main political preoccupation seems to have been the extraordinary democratic possibilities of the information-sharing virtual communities across the globe created by the internet, and the threat to its freedom and flourishing posed by censorious states, greedy corporations and repressive laws. Not everything Assange wrote at this time was serious. He was interested in a computer security software program developed by Dan Farmer of Silicon Graphics known as SATAN. One evening in April 1995 he composed bThe Dan Farmer Rapb for bfirewallsb, a list to which he subscribed. Ibm Dan Farmer you canbt fool me b The only security consultant to be on MTV, Ibve got red hair b hey hands off man! donbt touch the locks of the mighty Dan. AC/DC b from the front or from behind, you can fuck my arse but you canbt touch my mind. philosophybs the trip b evil bnb stuff, god, we know a lot, Mike me and Muff. A real ardent feminist b just like she tells me to be, See me out there rooting for sexual e-qual-ity b& I coded it all b yes the mighty Dan did it alone, if you canbt believe it, you and your note pad can fuck off home. Ibm Dan Farmer b now take that down b itbs not every day you get to interview the worldbs biggest security clown. Several subscribers to bfirewallsb were appalled. One wrote: bJust reading this made me feel dirty. In 20+ years associated with this business, I donbt think Ibve ever seen debate among professionals degraded to quite this slime-ball level. Mr Assange is an unprincipled ass b&b Assange wrote a sort-of apology. bIt was perhaps an error of judgment on my behalf to equate the people on this list with those who knew myself and Dan more fully. Such mistakes are ripe to happen when one is merry and full of wine in the wee hours of the morning.b Nonetheless, he expressed high amusement regarding all those who had publicly condemned him while privately sending their congratulations. bYou know who you are.b Assangebs Dan Farmer bpeccadillob was still remembered six years later by a British computer geek, Danny ObBrien. By 1997 Julian Assange, with his friends Suelette Dreyfus and Ralf Weinmann, had written Rubberhose, a piece of bdeniable cryptographyb for human rights activists and troublemakers, the purpose of which was to make it impossible for torturers or their victims to know whether all the encrypted data on a computer hard drive had been revealed. It was designed to make torture to extract passwords pointless, and defection and betrayal in the face of such torture impossible. The concept was Assangebs. Assange argued a convoluted and rather improbable psychological case about why Rubberhose would cause rational torturers to put away their weapons. Danny ObBrien captured the obvious objection rather well. Despite Rubberhosebs deniable cryptography, bwonbt rational torturers just beat you up bforeverb?b Assange disagrees. bRational torturers have opportunity costs and understand them.b I am in no position to judge the sophistication of the Rubberhose software or the level of creativity it required. I can however assess the quality of the posting announcing its creation, which Assange sent to the firewalls list in June 1997. Assange called it bOne Manbs Search for a Cryptographic Mythologyb. His search to find a suitable name for Rubberhose takes him, in a zany and hilarious stream of consciousness, on a journey through Greek and Roman mythology, the incestuous Cerberus and the clichC)d Janus; to the moral pessimism of David Hume, who argued the inescapable connection between joy and despondency; to an unexplained rejection of his request for mythological advice by the Princeton History Department; to Sigmund Freud, the Medusabs Head and the castration complex; to a spoof on Zen Buddhism; to a memory of a visit to a mercenary hypnotherapist in Melbournebs Swanston Street b until, through the suggestion of a Swedish friend with an interest in ancient Sumerian mythology b bwho calls himself Elk on odd days and Godflesh on even days. Donbt ask whyb b he finally arrives with a joyous heart at the Mesopotamian god MARUTUKKU, bMaster of the Arts of Protectionb. If MARUTUKKU was my exquisite cryptographic good, of wit, effusive joy, ravishing pleasure and ?attering hope; then where was the counter point? The figure to its ground b the sharper evil, the madness, the melancholy, the most cruel lassitudes and disgusts and the severest disappointments. Was Hume right? Alas, he was. Assange, bon a cold and wintry night here in Melbourneb, discovers in the 4000-year-old Babylonian tablets a reference to the supposedly secret eavesdropping intelligence agency in Maryland, the National Security Agency! It is a magnificently exuberant, bravura literary performance. Assange was not merely a talented code writer and computer geek. There was in him daring, wildness and a touch of genius. For a while he signed his emails not with his customary bProff.b but bProf. Julian Assangeb. Assange was by now a committed member of the free software movement, pioneered by Richard Stallman, whose aim was to regulate communication in cyberspace by software not by law. As members of the movement put it, freedom here meant free speech rather than free beer. The movement stressed democratic, collective contribution. Assange tended to be somewhat sceptical about the movement, on one occasion arguing that in reality usually one or two people did 80% of the work. Assange was nonetheless involved in the development of NetBSD, an open source computer operating system derived from the original Berkeley Software Distribution source code. Some of the slogans he invented to spruik its virtues can still be found on the internet. Here are three. bWe put the OS in OrgaSmb; bBits for Titsb; bMore ports than a Norwegian crack whoreb b all examples, as Assange now sees it, of his youthful bribald humourb. By the time Assange was working on NetBSD he had been involved for several years with a movement known as the cypherpunks. It was the cypherpunks more than the free software movement who provided him with his political education. Although there are tens of thousands of articles on Julian Assange in the worldbs newspapers and magazines, no mainstream journalist so far has grasped the critical significance of the cypherpunks movement to Assangebs intellectual development and the origin of WikiLeaks. The cypherpunks emerged from a meeting of minds in late 1992 in the Bay Area of San Francisco. Its founders were Eric Hughes, a brilliant Berkeley mathematician; Timothy C. May, an already wealthy, former chief scientist at Intel who had retired at the age of thirty-four; and John Gilmore, another already retired and wealthy computer scientist b once number five at Sun Microsystems b who had co-founded an organisation to advance the cause of cyberspace freedom, the Electronic Frontier Foundation. They created a small group, which met monthly in Gilmorebs office at a business he had created, Cygnus. At one of the early meetings of the group, an editor at Mondo 2000, Jude Milhon, jokingly called them cypherpunks, a play on cyberpunk, the bhi-tech, low-lifeb science-fiction genre. The name stuck. It soon referred to a vibrant emailing list, created shortly after the first meeting, which had grown to 700 by 1994 and perhaps 2000 by 1997 with by then up to a hundred postings per day. It also referred to a distinctive sub-culture b eventually there were cypherpunk novels, Snowcrash, Cryptonomicon, Indecent Communications; a cypherpunk porno film, Cryptic Seduction; and even a distinctive cypherpunk dress: broad-brimmed black hats. Most importantly, however, it referred to a politicalbideological crusade. At the core of the cypherpunk philosophy was the belief that the great question of politics in the age of the internet was whether the state would strangle individual freedom and privacy through its capacity for electronic surveillance or whether autonomous individuals would eventually undermine and even destroy the state through their deployment of electronic weapons newly at hand. Many cypherpunks were optimistic that in the battle for the future of humankind b between the State and the Individual b the individual would ultimately triumph. Their optimism was based on developments in intellectual history and computer software: the invention in the mid-1970s of public-key cryptography by Whitfield Diffie and Martin Hellman, and the creation by Phil Zimmerman in the early 1990s of a program known as PGP, bPretty Good Privacyb. The seminal historian of codes, David Kahn, argued that the DiffiebHellman invention represented the most important development in cryptography since the Renaissance. Zimmermanbs PGP program democratised their invention and provided individuals, free of cost, with access to public-key cryptography and thus the capacity to communicate with others in near-perfect privacy. Although George Orwellbs Nineteen Eighty-Four was one of the cypherpunksb foundational texts, because of the combination of public-key cryptography and PGP software, they tended to believe that in the coming battle between Big Brother and Winston Smith, the victor might be Winston Smith. At the time the cypherpunks formed, the American government strongly opposed the free circulation of public-key cryptography. It feared that making it available would strengthen the hands of the espionage agencies of Americabs enemies abroad and of terrorists, organised criminals, drug dealers and pornographers at home. For the cypherpunks, the question of whether cryptography would be freely available would determine the outcome of the great battle of the age. Their most important practical task was to write software that would expand the opportunities for anonymous communication made possible by public-key cryptography. One of the key projects of the cypherpunks was bremailersb, software systems that made it impossible for governments to trace the passage from sender to receiver of encrypted email traffic. Another key project was bdigital cashb, a means of disguising financial transactions from the state. Almost all cypherpunks were anarchists who regarded the state as the enemy. Most but not all were anarchists of the Right, or in American parlance, libertarians, who supported laissez-faire capitalism. The most authoritative political voice among the majority libertarian cypherpunks was Tim May, who, in 1994, composed a vast, truly remarkable document, bCyphernomiconb. May called his system crypto-anarchy. He regarded crypto-anarchy as the most original contribution to political ideology of contemporary times. May thought the state to be the source of evil in history. He envisaged the future as an Ayn Rand utopia of autonomous individuals dealing with each other as they pleased. Before this future arrived, he advocated tax avoidance, insider trading, money laundering, markets for information of all kinds, including military secrets, and what he called assassination markets not only for those who broke contracts or committed serious crime but also for state officials and the politicians he called bCongressrodentsb. He recognised that in his future world only elites with control over technology would prosper. No doubt bthe clueless 95%b b whom he described as binner city breedersb and as bthe unproductive, the halt and the lameb b bwould suffer, but that is only justb. May acknowledged that many cypherpunks would regard these ideas as extreme. He also acknowledged that, while the overwhelming majority of cypherpunks were, like him, anarcho-capitalist libertarians, some were strait-laced Republicans, left-leaning liberals, Wobblies or even Maoists. Neither fact concerned him. The cypherpunks formed a house of many rooms. The only thing they all shared was an understanding of the political significance of cryptography and the willingness to fight for privacy and unfettered freedom in cyberspace. Like an inverse Marxist, Tim May tended to believe that the inexorable expansion of private cryptography made the victory of crypto-anarchism inevitable. A new bbalance of power between individuals and larger entitiesb was already emerging. He predicted with some confidence bthe end of governments as we know themb. Another even more extreme cypherpunk of the libertarian Right, Jim Bell, like an inverse Leninist, thought that history might need a push. In mid-1995, drawing upon Maybs recommendation of assassination markets, he began a series explaining his brevolutionary ideab, which he called bAssassination Politicsb. These were perhaps the most notorious and controversial postings in the history of the cypherpunks list. Bell devised a system in which citizens could contribute towards a lottery fund for the assassination of particular government officials. The prize would go to the person who correctly predicted the date of the death. The winner would obviously be the officialbs murderer. However, through the use of public-key cryptography, remailers and digital cash, from the time they entered the competition to the collection of the prize no one except the murderer would be aware of their identity. Under the rubric btax is theftb all government officials and politicians were legitimate targets of assassination. Journalists would begin to ask of politicians, bWhy should you not be killed?b As prudence would eventually dictate that no one take the job, the state would simply wither away. Moreover, as assassination lotteries could be extended across borders, no leader would again risk taking their people to war. Eventually, through the idea of the assassination lottery, then, not only would the era of anarchy arise across the globe, the condition of permanent peace humankind had long dreamt of would finally come to pass. Bell ended his 20,000 word series of postings with these words. bIs all this wishful thinking? I really donbt know!b A year or so later he was arrested on tax avoidance charges. Julian Assange informed me he joined the cypherpunks email list in late 1993 or early 1994. There were many reasons Assange was likely to be attracted to it. As his encounter with Richard Lowenstein had revealed, he was interested in the connection between privacy and encrypted communication. Even before his arrest he had feared the intrusion into his life of the totalitarian surveillance state. An atmosphere of paranoia pervaded the cypherpunks list. Assange believed that he had been wrongly convicted of what he called a bvictimless crimeb. The struggle against victimless crimes b the right to consume pornography, to communicate in cyberspace anonymously, to distribute cryptographic software freely b was at the centre of the cypherpunksb political agenda. Moreover the atmosphere of the list was freewheeling b racism, sexism, homophobia were common. Not only Tim May believed that political correctness had turned Americans into ba nation of sheepb. On the cypherpunks list no one would disapprove of bThe Dan Farmer ragb. Yet there was probably more to it than all this. Cypherpunks saw themselves as Silicon Valley Masters of the Universe. It must have been more than a little gratifying for a self-educated antipodean computer hacker, who had not even completed high school, to converse on equal terms with professors of mathematics, whiz-kid businessmen and some of the leading computer code-writers in the world. Julian Assange contributed to the cypherpunks list until June 2002. As it happens, almost all his interventions have been placed on the internet. On the basis of what historians call primary evidence, the mind and character of Julian Assange can be seen at the time of his obscurity. The first thing that becomes clear is the brashness. Over a technical dispute, he writes: b[B]oy are you a dummy.b When someone asks for assistance in compiling a public list of hackers with handles, names, email addresses, Assange responds: bAre you on this list of morons?b In a dispute over religion and intolerance one cypherpunk had written: bBecause those being hatefully intolerant have the brightb beliefs as to what the Bible says. Am I a racist if I donbt also include an example from the Koran?b bNo, just an illiterate,b Assange replied. Following a savaging from Assange for total computer incompetence, a hapless cypherpunk pointed out that he has been writing code since the age of fourteen. If one thing is clear from the cypherpunks list, it is that the young Julian Assange did not suffer those he regarded as fools gladly. In his posts there is humour, although often it is sarcastic. In one of his earliest interventions Assange has read about the arrest of someone caught with diesel fuel and fertiliser. bLooks like Ibve just been placed into the ranks of the pyro-terrorist. Golly, Deisel [sic] fuel. Gosh, Fertilizer. Ma, other items.b Some posts reflect his faith in the theory of evolution. Assange forwarded an article about the role played by the CIA in supplying crack gangs in Los Angeles. A cypherpunk responded: bI wish theybd get back to the business, but add an overt poison to the product. Clean out the shit from the cities. Long live Darwinism.b bDarwinism is working as well as it ever was. You may not like it but shit is being selected for,b Assange shot back. Other posts reflect his recent life experiences. Assange had helped Victoria Police break a paedophile ring in 1993. On the cypherpunks list he defended the circulation of child pornography on the internet on the grounds that it would cut the need for new production and make it easier for police to capture paedophiles. In another post he expressed deep anger at perceived injustice regarding those with whom he identifies b convicted hackers. One, Tsutomu Shimamura, had not only played a role in the hunting down of a notorious American fellow hacker, Kevin Mitnick (known personally to Assange through his research for Underground), but had even co-authored a book about it, Takedown. bThis makes me ill. Tsutomu, when Mitnick cracks will you dig up his grave and rent his hands out as ash trays?b Assange also posted on the reports of violence against another hacker, Ed Cummings a.k.a. Bernie S, imprisoned in the US. bI was shocked. Ibve had some dealings with the SSb&Those that abuse their power and inflict grave violence on others must be held accountable and their crimes deplored and punished in the strongest manner. Failure to do so merely creates an environment where such behaviour becomes predominant.b Already there are qualities in Assangebs postings that are unusual in the standard cypherpunk. One is a fascination with language. Assange invented with Richard Jones a software program that created anagrams. The deepest institutional enemy of the cypherpunks was the National Security Agency. Assange put the name into his computer. Among the anagrams that emerged were: bNational Anti-Secrecy Guyb; bSecret Analytic Guy Unionb; bCaution Laying Any Secretb; bInsane, ugly, acne atrocityb; and, Assangebs apparent favourite: bNational Gay Secrecy Unitb. He was also interested in what he described as btracking language drift; i.e. the relative change in word frequency on the internet as time goes byb. He informed the cypherpunks that he had just discovered that in a b10 billion word corpusb the following frequency occurred: God b 2,177,242 America b 2,178,046 Designed b 2,181,106 Five b 2,189,194 December b 2,190,028 His eccentricity would also have been obvious after a member of the bfirewallsb list forwarded his MARUTUKKU fantasia to cypherpunks. Where did Assange stand with regard to the radical cypherpunks agenda of Tim May? This question is best answered in two parts. On the question of cryptographic freedom and hostility towards the surveillance state and its chief embodiment b the National Security Agency b Assange was, if anything, even more absolute and extreme than May. In September 1996, Esther Dyson, the chair of the lobby group for freedom in cyberspace, the Electronic Frontier Foundation, was quoted in the Los Angeles Times as being in favour of certain extremely limited restrictions on internet anonymity. On the cypherpunks list a furious controversy, called bThe Esther Dyson Fussb, broke out. Some cypherpunks defended Dyson on the ground that she had every right to argue a more nuanced position and that it was anyhow healthy for individuals to speak their mind. May vehemently disagreed. The issue was not her freedom of speech. A critical moment in the battle between freedom and surveillance had arrived. Dyson had defected to the enemy camp. Assange went further. He launched a stinging ad hominem attack. Examining in detail Dysonbs interests it appears she maintains a sizeable and longstanding interest in Eastern European technology companies. She is also very far to the right of the political spectrum (rampant capitalist would be putting it mildly). She also speaks Russian. Ibm not saying shebs been working for the CIA for the past decade, but I would be very surprised if the CIA has not exerted quite significant pressure b& in order to bring her into their folds during that time period. bAt least you donbt accuse me of being a Communist,b Dyson responded. bFor the record, I am not a tool of the CIA nor have they pressured me, but therebs no reason for you to believe me.b Later, Assange informed me, they became friends. However, when Assange was in trouble last year Dyson wrote a piece on the Salon website arguing that even unpleasant characters need to be defended. A month or so after September 11 a controversy broke out on the cypherpunks list over the report of a civilised discussion about increased FBI surveillance over internet communications between Mitch Kapor, a co-founder and former board member of the Electronic Frontier Foundation, and Stu Baker, an attorney who had once been employed by the National Security Agency. Some cypherpunks had some sympathy for Kaporbs moderation. Even they recognised that with September 11 something major had occurred. One pointed out, in addition, that Stu Baker was ba gun-for-hire, not a doctrinaire blinders-on true believer for either the surveillance enthusiasts or privacy freaksb. This was too much for Assange: Stu is a well known NSA zealot. The only reason therebs a bridge between Kapor and Baker is due to the cavernous ravine that lays [sic] between them. Kapor is now apparently half-way across, following Stubs silently beckoning ?nger, fearfully running from the sounds of angels [sic] wings; fooled into believing that they lie behind and not ahead of him. >From beginning to end Assange was, in short, a hardline member of the tendency among the cypherpunks that Tim May called the brejectionistsb, an enemy of those who displayed even the slightest tendency to compromise on the question of Big Brother and the surveillance state. On another question, however, Assange was at the opposite end of the cypherpunks spectrum from Tim May. At no stage did Assange show sympathy for the anarcho-capitalism of the cypherpunks mainstream which, as he explained to me, he regarded as bnaiveb about bthe state tendencies of corporatismb. In October 1996, a prominent cypherpunk, Duncan Frissell, claimed that in the previous fiscal year the American government had seized more tax than any government in history. Assange pointed out that, as the US was the worldbs largest economy and that its GDP had grown in the previous year, this was a ridiculous statement designed to be deceptive. In October 2001, Declan McCullagh expressed bsurpriseb when a bcritique of laissez-faire capitalismb appeared on the cypherpunks list bof all placesb. Assange replied: Declan, Declan. Put away your straw man b& Nobel economic laureates have been telling us for years to be careful about idealised market models b& This years [sic] Nobel for Economics won by George A. Akerlof, A. Michael Spence and Joseph E. Stiglitz bfor their analysis of markets with assymmetric [sic] informationb is typical. You donbt need a Nobel to realize that the relationship between a large employer and employee is brutally assymmetric [sic] b& To counter this sort of assymetery. [sic] Employees naturally start trying to collectivise to increase their information processing and bargaining power. Thatbs right. UNIONS Declan. Those devious entities that first world companies and governments have had a hand in suppressing all over the third world by curtailing freedom of association, speech and other basic political rights we take for granted. Assange was, then, an absolutist crypto-anarchist but one who leant decidedly to the Left. Mainstream cypherpunks did not defend trade unions or speak negatively of brampant capitalistsb and positively of bhuman rights activistsb. He was an electronic but not an economic libertarian. There is also evidence that Assange was increasingly repelled by the corrosive cynicism common in cypherpunks ranks. Something in his spirit seems to have changed after his trial and the writing of his MARUTUKKU mythology. >From 1997 to 2002 Julian Assange accompanied all his cypherpunks postings with this beautiful passage from Antoine de Saint-ExupC)ry: bIf you want to build a ship, donbt drum up people together to collect wood and donbt assign them tasks and work, but rather teach them to long for the endless immensity of the sea.b On one occasion in July 1999 William H. Geiger III presented standard Ayn Rand Objectivist praise of human selfishness. bEveryone is a predator out to advance their own agenda at the expence [sic] of others. Tim is just more honest than most about it.b Assange replied with a defence of altruism, for Objectivists an evil. No b& Everyone maybe self-interested, but some are self-interested in a way that is healthy (to you, or the people you care about), some in a way which is benign, and some in a manner that is pernicious. It is important to distinguish between these different behaviours and support or undermine them accordingly. On another occasion, a cypherpunk suggested that in the great struggle for privacy and against censorship ordinary people could not give a damn. Perhaps with Tim Maybs contempt for bthe clueless 95%b in his mind, in March 2002, in what was one of his final cypherpunks postings, Assange responded: bThe 95% of the population which comprise the flock have never been my target and neither should they be yours; itbs the 2.5% at either end of the normal that I find in my sights, one to be cherished and the other to be destroyed.b Already he seems to have imagined the future as a struggle to the death between autocratic elites and electronic freedom fighters. Increasingly, Assange began to mock Tim May. Many thought of May as an anti-Semite, with good reason. In November 2001, when May used a quote from a cypherpunk fellow traveller, David Friedman (Miltonbs son), Assange emailed: bQuoting Jews again, Tim?b Julian Assange was a regular contributor to the cypherpunks mailing list particularly before its decline in late 1997 following a meltdown over the question of the possible moderation of the list b censorship! b and the departure of John Gilmore. The cypherpunks list clearly mattered to him deeply. Shortly before his travels in 1998, Assange asked whether anyone could send him a complete archive of the list between 1992 and the present time. While commentators have comprehensively failed to see the significance of the cypherpunks in shaping the thought of Julian Assange, this is something insiders to the movement understand. When Jeanne Whalen from the Wall Street Journal approached John Young of Cryptome in August last year, he advised her to read the Assange cypherpunk postings he had just placed on the internet, and also Tim Maybs bCyphernomiconb. bThis background has not been explored in the WikiLeaks saga. And WikiLeaks cannot be understood without it.b Likewise, in his mordant online article on WikiLeaks and Assange, the influential cyberpunk novelist and author of The Hacker Crackdown Bruce Sterling wrote: bAt last b at long last b the homemade nitroglycerin in the old cypherpunks blast shack has gone off.b In 2003 Julian Assange seems to have considered living a more conventional life. He went to the University of Melbourne to study mainly mathematics and physics. As a student of mathematics his results were mixed but generally mediocre. This can hardly be explained by lack of talent. No one worked more closely with Assange than Suelette Dreyfus. bA geek friend of his once described Assange as having an IQ bin excess of 170b,b she wrote in the Sydney Morning Herald of 12 December 2010. bI suspect this could be true.b Assange claimed that he became disillusioned with the applied maths department when he discovered its members were working with defence authorities in the US on a military bulldozer adapted to desert conditions known as bThe Grizzly Ploughb. He also claimed that visits to the ANU were thoroughly dispiriting. On one occasion he represented University of Melbourne students at a competition. bAt the prize ceremony, the head of ANU physics motioned to us and said, byou are the cream of Australian physics.b I looked around and thought, bChrist Almighty I hope hebs wrong.bb On another occasion he saw 900 senior physicists in Canberra proudly carrying bags with the logo of the Defence Science and Technology Organisation. He described them as bsnivelling fearful conformists of woefully, woefully inferior characterb. Perhaps there were other reasons for dissatisfaction. By 2004 Assange had reached the elevated position of vice-president of the studentsb Mathematics and Statistics Society and chief organiser of their Puzzle Huntba quiz leading the winner to $200 of buried treasure. He described his role as bplot/script, general nonsense, Abstract(ion), Caesar Cipher, Disc, Platonic, Score, Surstro:mmingb. Assange explained that he binvented/founded the competition to improve the intellectual climate in Australia.b Nonetheless, organising a puzzle hunt was a somewhat less engrossing ambition than planning world revolution. And towards the end of his studies this was exactly what he was doing. A female friend provided the journalist Nikki Barrowclough with a vivid portrait of the atmosphere of a share house close-by the University of Melbourne that Assange lived in at this time. There were beds everywhere, she says. There was even a bed in the kitchen. This woman slept on a mattress in Assangebs room, and says she would sometimes wake up in the middle of the night to ?nd him still glued to his computer. He frequently forgot to eat or sleep, wrote mathematical formulas all over the walls and the doors, and used only red light bulbs in his room b on the basis that early man, if waking suddenly, would see only the gentle light of the camp?re, and fall asleep again. Between July 2006 and August 2007 b the period when WikiLeaks was being planned and actualised b Julian Assange maintained a blog at IQ.ORG, some of which he collected under the title bSelected Correspondenceb. The correspondence can still be found on the internet. Because of its existence, a reasonably detailed map of his mind at the age of thirty-five and at the moment of WikiLeaksb creation is available. Strangely enough, even though there are now some 27 million Google entries on Assange, so far as I am aware no one has offered an analysis. The blog reveals a young man of unusual intellectual range, ambition and curiosity. As expected, there are references to cypherpunks and his work as a code-writer in the free software movement. Assange writes of his loathing for the bbeverything which is not explicitly permitted is deniedb security typesb who bmake concurrent salutes to the Fuhrer, Baal and Jack Strawb. He explains why as one of the committed developers of NetBSD he has refused to sign a proposed contract: bThe contract as well as being an instrument of the state is written in the demeaning language of the corporate state. It should have been written in the language of our programmer world.b Some entries, such as his defence of altruism, are familiar to those who have followed his postings on the cypherpunks list. Many others have the range and also eccentricity revealed in his MARUTUKKU performance. There are abstract speculations on philosophy, mathematics, neuroscience, human physiology, the law, history and sociology. There are also very striking and revealing extracts. One is from a Buddhist text from 500 BC, Ajita Kesakambali, in defence of materialism. bThe words of those who speak of existence after death are false, empty chatter. With the break-up of the body, the wise and the foolish are alike annihilated, destroyed.b Another is a wonderful story from the Nazi concentration camp. A Jewish inmate can save his daughter if he chooses which eye of his guard is glass. He chooses the left eye, correctly. His guard asks how he knew. bbIbm sorry,b trembled Moshe, bbut the left eye looks at me with a kindly gleam.bb Assange has great interest in the history of European totalitarianism. One extract is a poem b bbad b& but elevated by its monumental contextb b about the atom bomb spies Ethel and Julius Rosenberg: bEven so, we did what we believed in: / Treason, yes, perhaps, but with good cause.b There is also a long extract from an article about the problems besetting those possessing super-high IQs, such as the unfulfilled genius William James Sidis. It concludes with these words: bAnd so we see that the explanation for the Sidis tragedy is simple. Sidis was a feral child; a true man born into a world filled with animals b a world filled with us.b It is not difficult to understand why this article interested him. Many blog entries are personal. When Daniel Domscheit-Berg released his memoir, Inside WikiLeaks, there was excitement around the globe at his claim that Assange had boasted about fathering several children, something Assange fiercely denies. About one child at least there can be no doubt. On his blog, Assange includes a photo of a bonneted baby under the title bThose Eyesb with the caption, bAll the pink ribbons in the world canbt hide them.b She is his new daughter. Another entry referred obliquely to his motherbs organisation of bThe Great Bikini Marchb against Sheikh Hilaly, who had recently compared women who dressed scantily to buncovered meatb. Some entries about women fleetingly encountered are awkward in a Mills & Boon kind of way. bA lovely girl I knew b& stood for a moment fully clothed in her shower before letting the wind and rain buffet her body as she made her tremulous approach to my door and of course I could not turn her away.b One b Assangebs study of the etymology of the word bcadb b seems to me rather sinister. bCaddie or cadet used to denote the passenger of a horse-coach picked up for personal profit by the driver b& So a bcadb is a man who picks up women, profits from them and leaves them by the road side b& Such romantic etymology is enough to make a man want to don his oilskin and mount his horse with whip and smile at the ready.b The coldness of tone here, which Assange ascribes to his taste for bblack humourb, is striking precisely because other passages in the correspondence are so tender. Assange writes of meeting Antony, a country kid he had known since they were both fourteen, at a mental health centre in East Ringwood. bHis smile was shaky but characteristic. His physical edges rounded off by weight gain and his imagination dulled b& His limbs and jaw gently shuddered with some frequency.b Assange visited him later still at a psychiatric hospital. bWhen I asked about the cause of his shaking, suggesting a dopamine antagonist, he said, bNo b& If you look closely youbll notice a number of people around here acting the same way. Julian b& webre all doing the Mont Park shuffle.bb What is most important about the correspondence, however, is that in it we can hear for the first time Julian Assangebs distinctive political voice. As a former cypherpunk crypto-anarchist the enemy for him is, unsurprisingly, that abstraction he calls the State. bWhere words have power to change, the state tries hard to trap, burn or blank them, such is its fear of their power.b The state represents the principle of bmendacityb. bThe state does what it can get away with.b True understanding requires the individual bto know the state for what it really isb. Yet, unlike most of his fellow cypherpunks, by now Assange unambiguously extends his idea of the state to big business. In thinking about the US, in one blog entry, he asks: bWhat kinds of states are giant corporations?b He answers in the following way. As executive power is wielded by a central committee; as there is unaccountable single-party rule; as there is no freedom of speech or association, and bpervasive surveillance of movement and electronic communicationb, what then do you have in that federation of giant corporations that control the US? What else but a bUnited Soviet of Americab. Assange is a profound anti-communist. But he regards power in Western society as belonging to political and economic elites offering ordinary people nothing more nourishing than a counterfeit conception of democracy and a soul-destroying consumption culture. Assangebs selected correspondence is addressed to a small coterie of followers. It involves a revolutionary call to arms. bIf we can only live once, then let it be a daring adventure that draws on all our powers b& Let our grandchildren delight to find the start of our stories in their ears but the endings all around in their wandering eyes.b Assange seems not particularly interested in future political institutions or in economic arrangements. The revolution he speaks about is moral. He believes that individual action can re-fashion the world. The state may do bwhat it can get away withb but it does bwhat we let it get away withb and even bwhat we let ourselves get away with, for we, in our interactions with others, form the stateb. Over the whole selected correspondence there is a quotation from the GermanbJewish revolutionary anarchist Gustav Landauer, beaten to death by right-wing troops after the Munich soviet experiment of 1919. bThe state is a condition, a certain relationship between human beings, a mode of behaviour. We destroy it by contracting other relationships, by behaving differently toward one another b& We are the state and we shall continue to be the state until we have created the institutions that form a real community and society of men.b The question is how new institutions can be formed. In the struggle to create a truly human society, Assange warns his interlocutors not to believe they can think globally but act locally. This is an illusion. Action must be taken on a truly global scale. He is also witheringly contemptuous of those he calls bthe typical shy intellectualb. This type is often of a noble heart, wilted by fear of conflict with authority. The power of their intellect and noble instincts may lead them to a courageous position, where they see the need to take up arms, but their instinctive fear of authority then motivates them to find rationalizations to avoid conflict. For Assange the central political virtue is courage. One of his favourite sayings is: bCourage is contagious.b He attributes it to the Pentagon Papers whistleblower Daniel Ellsberg. In fact it was coined by the evangelist Billy Graham. Assangebs politics are also generational. bPerhaps as an old man I will take great comfort in pottering around in a lab and gently talking to students in the summer evening and will accept suffering with insouciance. But not now; men in their prime, if they have convictions are tasked to act on them.b For Assange the great moving forces in history are the need for Love and the thirst for Truth. In his final piece in the selected correspondence, Assange admits that often boutcomes are treated with more reverence than Truthb. Yet just as we feel all hope is lost and we sink into the miasma, back to the shadow world of ghosts and gods, a miracle arises, everywhere before the direction of self interest is known, people yearn to see where its compass points and then they hunger for truth with passion and beauty and insight b& Here then is the truth to set them free. Free from the manipulations and constraints of the mendacious. Free to choose their path, free to remove the ring from their noses, free to look up into the infinite void and choose wonder over whatever gets them through. And before this feeling to cast blessings on the pro?ts and prophets of truth b& on the Voltaires, the Galileos and Principias of truth, on the Gutenbergs, Marconis and Internets of truth, those serial killers of delusion, those brutal, driven and obsessed miners of reality, smashing, smashing, smashing every rotten edi?ce until all is ruins and the seeds of the new. But how will the rotten edifice be smashed? On 22 November 2006 Assange provides a link to a paper. He tells his coterie of readers: bNo. Donbt skip to the good stuff. This is the good stuff.b He is pointing them to the central theoretical breakthrough that led to WikiLeaks. Julian Assange published this paper twice, the first time on 10 November 2006 under the title bState and Terrorist Conspiraciesb, the second time, in more developed form, on 3 December under the title bConspiracy as Governanceb. Stripped of its inessential mathematical gobbledegook, its argument goes like this. The world is at present dominated by the conspiratorial power of authoritarian governments and big business corporations. As President Theodore Roosevelt understood, behind bostensible governmentsb, there exists ban invisible government owing no allegiance and acknowledging no responsibility to the people. To destroy this invisible government, to befoul this unholy alliance between corrupt business and corrupt politics is the first task of statesmanship.b Authoritarian governments and corporations maintain and entrench their power through a conspiracy. For Assange the conspiracy involves the maintenance of a network of links between the conspirators, some vital, some less so. Conspiracies naturally provoke resistance. Among revolutionaries of earlier generations resistance has involved the attempt to break the links between the leaders of the conspiracy by bassassination b& killing, kidnapping, blackmailing, or otherwise marginalising or isolating some of the conspirators they were connected tob. Such methods are no longer appropriate. bThe act of assassination b the targeting of visible individuals, is the result of mental inclinations honed for the pre-literate societies in which our species evolved.b The new generation of revolutionaries bmust think beyond those who have gone before us, and discover technological changes that embolden us with ways to act in which our forebears could notb. Contemporary conspiracies rely on unrestricted information flow to adapt to and control their environments. Conspirators need to be able to speak freely to each other and to disarm resistance by spreading disinformation among the people they control, something they presently very successfully achieve. Conspirators who have control over information flow are infinitely more powerful than those who do not. Drawing on a passage from Lord Halifax in which political parties are described as bconspiracies against the rest of the nationb, Assange asks his readers to imagine what would happen in the struggle between the Republican and Democratic parties in the US bif one of these parties gave up their mobile phones, fax and email correspondence b let alone the computer systems that manage their subscribes [sic], donors, budgets, polling, call centres and direct mail campaignsb. He asks them to think of the conspiracy as a living organism, ba beast with arteries and veins whose blood may be thickened and slowed until it falls, stupefied; unable to sufficiently comprehend and control the forces in its environmentb. Rather than attacking the conspiracy by assassinating its leading members, he believes it can be bthrottledb by cutting its information flows. bLater,b he promises, bwe will see how new technology and insights into the psychological motivations of conspirators can give us practical methods for preventing or reducing important communication between authoritarian conspirators, foment strong resistance to authoritarian planning and create powerful incentives for more humane forms of governance.b The promise is fulfilled in a blog entry of 31 December 2006. Here he outlines finally the idea at the core of the WikiLeaks strategy. The more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie. This must result in minimization of efficient internal communications mechanisms (an increase in cognitive bsecrecy taxb) and consequent system-wide cognitive decline resulting in decreased ability to hold onto power as the environment demands adaptation. Hence in a world where leaking is easy, secretive or unjust systems are nonlinearly hit relative to open, just systems. Since unjust systems, by their nature induce opponents, and in many places barely have the upper hand, leaking leaves them exquisitely vulnerable to those who seek to replace them with more open forms of governance. There is a link between Assangebs cypherpunks period and the theory behind WikiLeaks. Assange was a contributor to the cypherpunks list at the time when Jim Bellbs bAssassination Politicsb was being hotly discussed. There is evidence that Assange was intrigued by the idea. In January 1998 he had come upon an advertisement for a prize b bScoop the Grim Reaper. Who Will Live? Who Will Die?b b which was to be awarded to the person who guessed on what dates certain Hollywood celebrities would die. bAnyone noticed this before?b Assange posted the advertisement on the cypherpunks list under the heading: bJimb&Bellb&livesb&onb&inb&Hollywoodb. Although Assange assured me he was not thinking about bAssassination Politicsb at the time he was inventing WikiLeaks, there are similarities between Bellbs thought and Assangebs. Like Bell, Assange was possessed by a simple brevolutionary ideab about how to create a better world. As with Bell, the idea emerged from reflection upon the political possibilities created by untraceable anonymous communication, through the use of remailers and unbreakable public-key cryptography. The differences are also clear. Unlike with Bell, the revolution Assange imagined would be non-violent. The agent of change would not be the assassin but the whistleblower. The method would not be the bullet but the leak. In arriving at this position, Assange had drawn together different personal experiences. It was as a bfrontier hactivistb and as bAustraliabs first electronic publisherb that he had become interested in the political potency of leaks. From his cypherpunk days he had become engaged in discussions about the political possibilities of untraceable encrypted communication. And from his involvement in the free software movement he had seen what collective democratic intellectual enterprise might achieve. In essence, his conclusion was that world politics could be transformed by staunching the flow of information among corrupt power elites by making them ever more fearful of insider leaks. He believed he could achieve this by establishing an organisation that would allow whistleblowers from all countries to pass on their information, confident that their identities would not be able to be discovered. He proposed that his organisation would then publish the information for the purpose of collective analysis so as to empower oppressed populations across the globe. There are few original ideas in politics. In the creation of WikiLeaks, Julian Assange was responsible for one. In late 2006 Assange sought a romantic partner through OKCupid using the name of Harry Harrison. Under the heading, bWhat am I doing with my life?b, he answered: bdirecting a consuming, dangerous human rights project which is, as you might expect, male-dominatedb. Under the heading, bI spend a lot of time thinking aboutb, he answered: bChanging the world through passion, inspiration and trickeryb. There was something distinctly Walter Mittyish about it all. Under the informal leadership of Julian Assange, a group of mainly young men, without resources and linked only by computers, now began to implement their plans for a peaceful global political revolution. On 4 October 2006 Assange registered the domain name bWikiLeaks.orgb in the US. He called it WikiLeaks because he had been immensely impressed by the success of the Wikipedia experiment, where 3 million entries had been contributed through the input of a worldwide virtual community. As he put it, WikiLeaks would be to leaks what Wikipedia was to the encyclopedia. Strangely and perhaps revealingly, it was registered under the names of two fathers, his biological one, John Shipton, and his cypherpunk political one, John Young, a New York architect who ran the intelligence leak website Cryptome, which could be seen as WikiLeaksb predecessor. Assange explained his request for assistance to Young like this: You knew me under another name from cypherpunks days. I am involved in a project that you may have a feeling for b& The project is a mass document leaking project that requires someone with backbone to hold the .org domain registration b& We expect the domain to come under the usual political and legal pressure. The policy for .org requires that registrants [sic] details not be false or misleading. It would be an easy play to cancel the domain unless someone were willing to stand up and claim to be the registrant. The choice of Young reveals something about Assange. For Young was undoubtedly the most militant security cypherpunk of all, who had published on his website an aerial photo of Dick Cheneybs hideout bunker, a photograph of the home of Fox Newsbs Bill ObReilly, and the names of 276 British and some 600 Japanese intelligence agents and 2619 CIA bsourcesb. Young was also Jim Bellbs greatest champion. After Bellbs arrest and imprisonment, Young nominated him for the Chrysler Award for Innovation in Design. Bell had, he argued in his nomination, contributed ban imaginative and sophisticated prospective for improving governmental accountability by way of a scheme for anonymous, untraceable political assassinationb. Serious work on the establishment of WikiLeaks began in December 2006. One of the first tasks was to decide upon a logo. Before opting for the hourglass, the WikiLeaks team thought seriously about a mole breaking through a wall above which stood three sinister authoritarian figures, arms folded. Another early task was to put together an advisory board. The first person he wanted was Daniel Ellsberg. Assange explained the purpose of WikiLeaks and why he had been approached: Webd like your advice and webd like you to form part of our political armor. The more armor we have, particularly in the form of men and women sanctified by age, history and class, the more we can act like brazen young men and get away with it. Here was one generation speaking to another. A month after being contacted Ellsberg replied. bYour concept is terrific and I wish you the best of luck with it.b He did not agree to join the board. Two leading cypherpunks were approached b the British computer security specialist Ben Laurie and one of the cypherpunksb founders, John Gilmore. Laurie became actively involved. Gilmore instead asked the Electronic Frontier Foundation he had also co-founded to help. Assangebs old cypherpunk sparring partner, Danny ObBrien, now with the EFF, offered to assist. Also approached not long after were two Chinese Tiananmen Square dissidents, a member of the Tibetan Association in Washington and Australian journalist Phillip Adams. All agreed to join the board of advisers and, then, most seem never to have heard from WikiLeaks again. What do the early internal documents reveal about the charge that WikiLeaks was an anti-American outfit posing as a freedom of information organisation? In his invitation to Gilmore, Assange had pledged that WikiLeaks bwill provide a catalyst that will bring down government through stealth everywhere, not least that of the Bushistsb. In its first public statement, WikiLeaks argued that bmisleading leaks and misinformation are already well placed in the mainstream media b& an obvious example being the lead-up to the Iraq warb. And in an email of 2 January 2007 Assange even argued that WikiLeaks could advance by several years bthe total annihilation of the current US regime and any other regime that holds its authority through mendacity aloneb. And yet, despite these statements, the evidence surrounding WikiLeaksb foundation makes it abundantly clear that anti-Americanism was not the primary driving force. Time and again, in its internal documents, it argued that its broots are in dissident communitiesb and that its bprimary targets are those highly oppressive regimes in China, Russia and central Eurasiab. China is a special focus. One or more of WikiLeaksb inner coterie were Taiwanese hacking into Chinese government sources. At the time of its foundation, WikiLeaks claimed to have more than a million documents. Almost certainly almost all came from China. For this reason, WikiLeaks argued publicly that ba politically motivated legal attack on us would be seen as a grave error in western administrationsb. Concerning its targets, the formulation is precise. WikiLeaks has in its sights authoritarian governments, the increasingly authoritarian tendencies seen in the recent trajectory of the Western democracies, and the authoritarian nature of contemporary business corporations. What then of the charge that WikiLeaks was a revolutionary organisation pretending to be concerned merely with reformist liberal issues such as exposure of corruption, open government and freedom of information and expression? The internal WikiLeaks documents show that the answer to this question is complex. At its foundation, Assange frequently argued that WikiLeaksb true nature did indeed need to be disguised. Because bfreedom of information is a respected liberal valueb, Assange argued, bwe may get some sympathyb but it would not last. Inevitably governments would try to crush WikiLeaks. But if the mask of moderation was maintained, at least for some time, opposition would be blimp wristedb. A quotation from the Book of Isaiah, he believed, might be suitable bif we were to front as a Ploughshares [peace] organisationb. To John Young he wrote: bWe have the collective sources, personalities and learning to be, or rather appear to be, the reclusive ubermensch of the 4th estate.b The emphases are mine. He also knew that if WikiLeaks was to prosper, and also to win support from philanthropic bodies such as the Soros Foundation, the hackerbcypherpunk origin of the inner circle needed to be disguised. bWe expect difficult state lashback [sic] unless WikiLeaks can be given a sanctified frame (bcenter for human rights, democracy, good government and apple pie press freedom projectb vs bhackers strike againb).b The key to WikiLeaks was that its true revolutionary ambitions and its moderate liberal public face would be difficult for opponents to disentangle. Open government and freedom of information were standard liberal values. However, as explained in the theory outlined in bConspiracy as Governanceb, they were the values in whose name authoritarian structures would be undermined worldwide, through the drying up of information flows and a paralysing fear of insider leaks. It was not only opponents who found it difficult to keep the public and private faces of WikiLeaks distinct. Despite those involved understanding the need for disguise, at its foundation the excitement was so palpable and the ambition so boundless that, when it was called upon to explain itself, the mask of apple pie liberal reformist moderation instantly fell away. On 3 January 2007 a small crisis arose when WikiLeaksb existence was prematurely revealed. Assange immediately put together a brilliant description of WikiLeaks for public release. Principled leaking has changed the course of human history for the better; it can alter the course of history in the present; it can lead to a better future b& Public scrutiny of otherwise unaccountable and secretive institutions pressures them to act ethically. What official will chance a secret corrupt transaction when the public is likely to find out? b& When the risks of embarrassment through openness and honesty increase, the tables are turned against conspiracy, corruption, exploitation and oppression b& Instead of a couple of academic specialists, WL will provide a forum for the entire global community to examine any document relentlessly for credibility, plausibility, veracity and falsifiability b& WL may become the most powerful intelligence agency on earth, an intelligence agency of the people b& WL will be an anvil at which beats the hammer of the collective conscience of humanity b& WL, we hope, will be a new star in the political firmament of humanity. Julian Assange recognised that the language of what amounted to the WikiLeaks Manifesto might appear a little boverblownb. He recognised that it had about it too much the flavour of banarchyb. But in general when it was written he was pleased. John Young was not. In early January 2007 he decided that WikiLeaks was a CIA-backed fraud. bFuck your cute hustle and disinformation campaign. Same old shit, working for the enemy b& Fuck bem all.b bWe are going to fuck them all. Chinese mostly but not entirely a feint,b Assange cryptically replied. Young decided now to post all the WikiLeaks correspondence he had seen between early December 2006 and early January 2007 on his website. Later, in 2010, he published Assangebs contributions to the cypherpunks list between 1995 and 2002. It is because of his baseless suspicion that the mind of Julian Assange and the intellectual origins of WikiLeaks are able to be understood. In February 2007, Julian Assange travelled to Nairobi to attend the World Social Forum, a very large gathering of mainly left-wing human rights activists and NGOs. He stayed on in Kenya for several months, involved with anti-corruption forces but also fascinated and repelled by the world of superstition he encountered: Here, in Africa there was a two page fold out on the bNight Runnerb plague. Plague? Yes. Of people b typically old, who supposedly run around naked at night b& tapping on windows, throwing rocks on peoples [sic] roofs, snapping twigs, rustling grass, casting spells and getting lynched because itbs the bright thing to dob. Insofar as we can affect the world, let it be to utterly eliminate guilt and fear as a motivator of man and replace it cell for cell with love of one another and the passion of creation. Assange was a true Enlightenment Man. The next Social Forum was to be held between 27 June and 4 July in Atlanta. Assange wanted WikiLeaks volunteers to attend. Emails he sent in early June can be found on the internet. They provide the clearest evidence of his political viewpoint and strategic thinking at this time. In the first he assures his supporters that WikiLeaksb future is secure. b[T]he idea canbt be stopped. Itbs everyonebs now.b Some people have apparently argued that WikiLeaksb idealism or bchildlike naivetyb is a weakness. He believes they are entirely wrong. bNaivety is unfailingly attractive when it adorns strength. People rush forward to defend and fight for individuals and organizations imbued with this quality.b Confronted by it, bvirtuous sophisticatesb are bmaroonedb. Some people are clearly worried that WikiLeaks will be captured by bthe Leftb. Assange assures his followers they need not be concerned. In the US the problem is rather that WikiLeaks is seen as too close to the CIA and American foreign policy. In fact, bwebll take our torch to all.b Some people have clearly expressed doubts about Social Forum types. Assange more than shares them. They are by and large bineffectual pansiesb who bspecialize in making movies about themselves and throwing bdialogueb parties b& with foundation moneyb, while fantasising that bthe vast array of functional cogs in brute inhumanity b& would follow their lead, clapping, singing and videotaping their way up Mt. Mostly Harmlessb. In Africa Assange has seen human rights fighters of real backbone. He warns his followers not to expect to find such people in the US. He quotes at length from Solzhenitsynbs 1979 Harvard address about the radical decline of bcivic courageb in the West especially among the bruling and intellectual elitesb. Nonetheless, to advance WikiLeaksb cause, the Social Forum b the worldbs biggest NGO bbeach partyb b matters. Assange anticipates that antibIraq War feeling will hold it together. Although WikiLeaks has so far concentrated on bthe most closed governmentsb, he explains that it is about to publish explosive material on American binvolvement in Iraq and Afghanistanb. He hopes that the anti-war movement will embrace these documents so that WikiLeaks can avoid the bretributiveb blast from pro-war forces. It is vital to position itself bas everyonebs friendb. If anyone still needs it, this despatch is proof that Assange has a biting tongue, a mordant wit and a brilliant political mind. It is obvious that by June 2007 several members of the Left had indeed gravitated to WikiLeaks. In Assangebs view, this group were thinking of publishing commentary on leaked documents in a way that allowed their political bias to show. He sent a different email to them: OK, you guys need to keep the Progressive/Commie/Socialist agendas and rhetoric to yourselves or youbre going to go absolutely nowhere very, very fast. Now, now, donbt get your dander up: if I can pass by gross mis-characterizations of the existing world order as bcapitalismb or bwhite supremacyb, you can stay calm and listen a minute. WikiLeaks was in danger, he argued, of being positioned either as a CIA front by John Young types or as a same-old left-wing outfit bpreaching to the choirb. All partisanship would be lethal. WikiLeaks needed to keep itself open to whistleblowers of all stripes b even bconservative and religious types waking up to the fact that theybve been taken for a rideb. bWhat you need to strive for is the same level of objectivity and analytical disinterest as the League of Women Voters. No, even higher. Else Ibll be so disheartened that Ibll lower myself to government contracting work.b This email is not only illuminating from the point of view of WikiLeaksb grand strategy. It is also decisive as to his true political position. Assange might have been on the left of the spectrum by anarcho-capitalist cypherpunk standards but he was by no means a standard leftist. His politics were anti-establishment but genuinely beyond Left and Right. Between 2007 and 2010 Assangebs political thinking was shaped by two key ideas. The first, as we have seen, was that all authoritarian structures b both governments and corporations b were vulnerable to insider leaks. Fear would throttle information flows. Assange called this a bsecrecy taxb. Inevitably, he argued, because of this tax, governments and corporations with nothing to hide would triumph over their secretive, unjust conspiratorial competitors. This aspect of his politics amounted to a kind of political Darwinism, a belief not in the survival of the fittest but of the most transparent and most just. As an organisation that encouraged whistleblowers and published their documents, WikiLeaks was aiding and speeding up this process. There was, however, another dimension of his politics that reflected his long association with the cypherpunks. Assange believed that, in the era of globalisation, laws determining communication were going to be harmonised. The world would either opt for a closed system akin to Chinese political secrecy and American intellectual property laws, or an open system found to some extent in Belgium and Sweden. Once more, Assange hoped that WikiLeaks was assisting a positive outcome to this struggle through its role as what he called a global publisher of last resort. If WikiLeaks could survive the attacks certain to be mounted by governments and corporations, the rights of human beings to communicate freely with each other without the intervention of governments would be entrenched. WikiLeaks was, according to this argument, the canary in the mine. Assange was taken with the famous Orwell quote. bHe who controls the present controls the past and he who controls the past controls the future.b The world was at a turning point. Either Big Brother would take control of the internet or an era of unprecedented freedom of communication would arrive. Assange was by now in the habit of composing motivational emails for his volunteers. This is the message he sent them on 12 March 2008: Mankind has successfully adapted changes as monumental as electricity and the engine. It can also adapt to a world where state sponsored violence against the communications of consenting adults is not only unlawful, but physically impossible. As knowledge flows across nations it is time to sum the great freedoms of every nation and not subtract them. It is time for the world as an international collective of communicating peoples to arise and say bhere I amb. This might have come straight out of a cypherpunks manifesto. In the first weeks of 2010 Assange was involved in an ultimately successful political manoeuvre to turn Iceland into the worldbs first bdata havenb with the most politically progressive anti-censorship laws on Earth. There was an aspect of WikiLeaksb work that was, through 2008 and 2009, beginning to trouble Assange. Although it was a peripatetic organisation with a small permanent staff, WikiLeaks had proven to be an outstanding success in attracting leaks and then publishing them. By late 2009 it had published documents concerning an Islamist assassination order from Somalia; massive corruption in Daniel arap Moibs Kenya; tax avoidance by the largest Swiss bank, Julius Baer; an oil spill in Peru, a nuclear accident in Iran and toxic chemical dumping by the Trafigura corporation off the Ivory Coast. Further, it had released the Guantanamo Bay operational manuals; secret film of dissent in Tibet; the emails of Sarah Palin; a suppressed report into an assassination squad operating in Kenya; American intelligence reports on the battle of Fallujah, and reports into the conditions in its jails; the Climategate emails; the internet censorship lists from Australia; and, finally, the loans book of the Icelandic bank Kaupthing. WikiLeaks had never been successfully sued, although Julius Baer had tried. None of the identities of the whistleblowers who sought to conceal them had been uncovered. WikiLeaks had won awards from the Economist, in 2008, and from Amnesty International, in 2009. Assange believed that WikiLeaksb information had determined a Kenyan election. He knew that the publication of the loans book in Iceland had riveted the nation, especially after Kaupthing had brought down an injunction against the national broadcasterbs evening television news. And yet, as his internal communications make clear, he was puzzled and appalled by the worldbs indifference to his leaks. Assange had once regarded WikiLeaks as the peoplebs intelligence agency. In January 2007 he sincerely believed that when WikiLeaks published commentary on the Somalia assassination order document it would be bvery closely collaboratively analysed by hundreds of Wikipedia editorsb and by bthousands of refugees from the Somali, Ethiopian and Chinese expat communitiesb. This simply had not happened. Commentary by the people on material produced by their intelligence agency never would. He had once hoped for engaged analysis from the blogosphere. What he now discovered were what he thought of as indifferent narcissists repeating the views of the mainstream media on bthe issues de jourb with an additional flourish along the lines of btheir pussy cat predicted it all alongb. Even the smaller newspapers were hopeless. They relied on press releases, ignorant commentary and theft. They never reported the vitally significant leaks without WikiLeaks intervention. Counter-intuitively, only the major newspapers in the world, such as the New York Times or the Guardian, undertook any serious analysis but even they were self-censoring and their reportage dominated by the interests of powerful lobby groups. No one seemed truly interested in the vital material WikiLeaks offered or willing to do their own work. He wrote to his volunteers: What does it mean when only those facts about the world with economic powers behind them can be heard, when the truth lays [sic] naked before the world and no one will be the first to speak without a bribe? WikiLeaksb unreported material is only the most visible wave on an ocean of truth rotting in draws [sic] of the fourth estate, waiting for a lobby to subsidize its revelation into a profitable endeavour. In Iraq, a junior American intelligence analyst, Private Bradley Manning b at least according to very convincing evidence yet to be tested in court b had been following WikiLeaksb activities with interest. On 25 November 2009 WikiLeaks released a document comprising 573,000 messages from September 11. As this material could only come from a National Security Agency leak, Manning was now convinced that WikiLeaks was genuine. Eventually, after sending WikiLeaks some cables concerning the American Ambassador in Iceland, he decided to download 93,000 logs from the Afghan War, 400,000 incident reports from the war in Iraq and 250,000 State Department cables, to which he and hundreds of thousands of American officials had access, and to send them to WikiLeaks. As a cover, he brought along Lady Gaga CDs and, while downloading these documents onto disc, pretended to be mouthing the words to the music. Some time after, he confessed to a convicted hacker, Adrian Lamo, what he had done. The most secure encryption and remailing systems were powerless against human, all-too-human frailty. Lamo in turn informed the FBI and American military authorities. Shortly after, Manning was arrested and taken to a military prison in West Virginia. Lamo also went with his evidence to a longstanding acquaintance, another convicted hacker, Kevin Poulsen, who worked at the magazine Wired. Poulsen published the log of some of the alleged conversation between Manning and Lamo. (12.15:11 PM) bradass87: hypothetical question: if you had free reign [sic] over classified networks for long periods of time b& say 8-9 months b& and you saw incredible things, awful things b& things that belonged in the public domain, and not on some server stored in a dark room in Washington DC b& what would you do? (12.26:09 PM) bradass87: lets just say bsomeoneb I know intimately well, has been penetrating US classified networks, mining data like the ones described b& and been transferring that data from the classified networks over the bair gapb onto a commercial network computer b& sorting the data, compressing it, encrypting it, and uploading it to a crazy white haired aussie who canbt seem to stay in one country very long. One of the items sent to WikiLeaks was a video of a cold-blooded, American Apache helicopter attack on a group of Iraqis, in which up to fifteen men were gunned down. Assange made the decision to concentrate the resources and the energies of WikiLeaks on publishing it under the title: bCollateral Murderb. In early April 2010, he flew to Washington to launch it, with his temporary chief-of-staff in Iceland (where the video had been edited), Rop Gonggrijp, the Dutch veteran of Berlinbs Chaos Computer Club. On 5 April, Assange addressed the National Press Club. His frustration with the indifference of the world was, to put it mildly, about to end. For once, the clichC) is true. What happened over the next ten months is stranger than fiction. With the release of the bCollateral Murderb footage, WikiLeaks became instantly famous. Assange decided to publish the new material he had received from Manning anonymously in association with some of the worldbs best newspapers or magazines. Complex and heated negotiations between WikiLeaks and the Guardian, the New York Times and Der Spiegel were now conducted. Even though these negotiations are one of the less interesting aspects of this story, already three books from the news outlets involved offering their own perspectives have been published. Assange had long regarded the Western media as narcissistic. It is likely that his judgement was now confirmed. In July the first of the Manning tranche, the bAfghan War Diaryb, was published. Assange held back only 15,000 of the 93,000 reports. Unforgivably, those released included the names of perhaps 300 Afghans who had assisted Western forces. A Taliban spokesperson, Zabiullah Mujahid, claimed that a nine-member commission had been created after the documents were released bto find out about people who were spyingb. Assange was unrepentant. In a speech in Sweden of 14 August, in talking about the practical impossibility of redacting names from the 93,000 reports, he distinguished between those who are binnocentb and those who are not. Regarding the latter he asked: bAre they entitled to retribution or not?b He did, however, learn from the experience. When the Iraq War logs were released in October most names had been redacted. By now, fissures were emerging inside WikiLeaks. Relations between Assange and Domscheit-Berg became increasingly tense, especially after Assange warned him, in April 2010, regarding the exposure of sources: bIf you fuck up, Ibll hunt you down and kill you.b Birgitta JC3nsdC3ttir, the anarchist Icelandic parliamentarian, was concerned about what she saw as the cavalier way in which Assange had handled the moral issue of the Afghan War Diary. The young Icelandic anarchist historian, Herbert Snorrason, resented what he thought of as the increasingly dictatorial tendency inside the organisation. He claimed that Assange had warned: bI donbt like your tone. If it continues youbre out. I am the heart and soul of this organization, its founder, philosopher, spokesperson, original coder, organizer, financier, and all of the rest. If you have a problem b& piss off.b On 21 August, Assange discovered that he was under investigation for sexual crimes after he slept with two Swedish supporters during a triumphal visit to Stockholm, one of whom, Anna Ardin, to complicate matters, had published advice on her blog concerning seven lawful kinds of revenge women might take after sexual mistreatment. Facing these charges, Assange expected total loyalty. Neither Domscheit-Berg nor JC3nsdC3ttir were willing to give him what he wanted. Domscheit-Berg was suspended from WikiLeaks; JC3nsdC3ttir quit. The man Domscheit-Berg called bthe architectb followed. He and Domscheit-Berg took the WikiLeaksb submissions with them, at least temporarily, on the grounds that its sources needed far more scrupulous protection. Assange regards this as a pure bpost facto fabricationb. Yet there was more to the troubles at WikiLeaks than supposed concerns about Assangebs laxity over security or his cavalier and dictatorial behaviour. In December, Rop Gonggrijp confessed to the Chaos Computer Club: bI guess I could make up all sorts of stories about how I disagreed with people or decisions, but the truth is that [during] the period that I helped out, the possible ramifications of WikiLeaks scared the bejezus out of me. Courage is contagious, my ass.b Assange had taken on the power of the American state without flinching. His identification with Solzhenitsyn was no longer empty. Assange decided to release the 250,000 US Department of State cables WikiLeaks still had in its possession on drip-feed so their content could be absorbed. On 28 November the first batch was published. The American vice president, Joe Biden, called Assange a bhigh-tech terroristb. The rival vice-presidential candidate of 2008, Sarah Palin, thought he should be hunted down like Osama bin Laden, a suggestion that led Assange to quip to Paris Match that at least that option assured him of a further ten years of freedom. Visa, Mastercard and PayPal severed connections with WikiLeaks. A global guerrilla hacker army of WikiLeaks supporters, Anonymous, mounted an instant counter-attack. Assange was by now facing two legal threats b extradition to Sweden to be interviewed about his relations with Anna Ardin and Sofia WilC)n or extradition to the US where a secret grand jury had been established to look into whether he had committed crimes outlined in the 1917 Espionage Act or broken some other law. After a preliminary hearing in London on the Swedish extradition request, he was first imprisoned in Wandsworth gaol and then placed under a form of house arrest. In early April 2010 hardly anyone had heard of Julian Assange. By December he was one of the most famous people on Earth, with very powerful enemies and very passionate friends. A future extradition to the US was almost certain to ignite a vast Left versus Right global cultural war, a kind of 21st-century equivalent of the Dreyfus Affair. Ironically, if that broke out, his staunchest and most eloquent defenders were likely to be people Assange assured me he now genuinely admires, such as John Pilger or Tariq Ali or Michael Moore. These are the kind of thinkers whom Assange privately had once derided as followers of the bProgressive Commie Socialistb agenda. Domscheit-Berg tells us Assange considered Moore ban idiotb. In an email Assange denied this with considerable eloquence: bI would never call someone as successful and influential as Moore an bidiotb...His precise position is, I suspect, more a function of his market than his limitations. Similarly when people have called George W. Bush ban idiotb, I think they are wrong, and that they are wishfully blind to other forms of intelligence.b In the coming cultural war, he would also be championed by millions of baverage shy intellectualsb across the Western world who had watched on passively as the political and business elites and their spin-masters in the US and beyond plunged Iraq into bloody turmoil, brought chaos to the global financial markets and resisted action over the civilisational crisis of climate change. Assange had long grasped the political significance of his compatriot, Rupert Murdoch. In bConspiracy as Governanceb he had called the disinformation the political and business elites fed the people to safeguard their power and their interests the bFox News Effectb. As the pressure on Assange mounted, Murdoch was clearly on his mind. In December, he spoke to Pilger in the New Statesman of an binsurance fileb on Murdoch and News Corp his supporters would release if the future work of WikiLeaks was threatened by his arrest and to Paris Match about Murdochbs supposed btax havensb. If a culture war was engaged over Assangebs extradition to the US it would involve, strangely enough, the clash of cultural armies mobilised by the creators of Fox News and WikiLeaks, the two most influential Australians of the era. March 2011: Revised in light of a lengthy email exchange initiated by Julian Assange From jjustinavs at aspenonnet.com Mon Mar 21 06:18:54 2011 From: jjustinavs at aspenonnet.com (Jesenia Justina) Date: Mon, 21 Mar 2011 21:18:54 +0800 Subject: Men use male enhancement supplements for a wide range of reasons Message-ID: <201103211218.7DC810C0DC5BF4CBD8BFEF@nmgqm49nj> Why You Need to Buy Penis Pills? If you choose the right penis enhancement pills that work for you, you will find yourself unwilling to go back to how "sex used to be." Men use male enhancement supplements for a wide range of reasons. Indeed, there are certain factors that can interfere with a man's optimum enjoyment of sex - lifestyle, health habits, stress, aging, and many others. Many men would like to counter the effect of these factors by taking penis pills. For some, they want to improve certain aspects of their sexuality, such as: - Shortening the time it takes to achieve erection - Improving quality of erection - attaining harder, firmer and longer-lasting erections - Increase semen volume - Enhance sperm motility and virility - Increase sexual drive and libido - Heighten sexual stamina - Achieve more intense, longer and more frequent orgasms http://longpenislike.ru From pgut001 at cs.auckland.ac.nz Mon Mar 21 05:32:11 2011 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Tue, 22 Mar 2011 01:32:11 +1300 Subject: [cryptography] Another signature-scheme blunder Message-ID: Looks like Motorola made a similar mistake to Sony in their digital signatures: http://nenolod.net/~nenolod/sholes-keyleak-explained.html The description is a bit confusing (did they really use Elgamal signatures rather than, say, DSA?), but it's basically the same thing Sony did. If they used actual Elgamal sigs though they went even further than Sony, along with rolling their own broken crypto implementation they also decided to go their own way with the signature scheme they used. As I've said a number of times before: In practice you don.t need to know all the gory details of encryption modes and IVs and other cryptoplumbing, you just need to make sure that you apply the right tool for the job. The right tool for fixing a blocked drain is a plumber, and the right tool for dealing with problems requiring cryptography is a security library written by someone who knows what they.re doing. Or to quote Bruce: "anyone who creates his or her own cryptographic primitives is either a genius or a fool. Given the genius/fool ratio for out species, the odds aren't very good". Peter. _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From o at cleaning-plus.by Tue Mar 22 01:07:47 2011 From: o at cleaning-plus.by (Cleo Dubois) Date: Tue, 22 Mar 2011 13:37:47 +0530 Subject: =?koi8-r?B?987V1NLFzs7JyiDSxc3PztQgySDP1MTFzMvBINDPzcXdxc7Jyi4=?= Message-ID: <649169755.17141012221057@cleaning-plus.by> 1.Ремонт и устройство мягких и жестких кровель. 2.Гидроизоляция, устройство водопровода и канализации. 3.Строительство деревянных домов и бань. 4.Внутренний ремонт и отделка помещений. 8-903-286-76-94 Валерий. From br at doskinaz.ru Mon Mar 21 23:40:46 2011 From: br at doskinaz.ru (Aldo Landry) Date: Tue, 22 Mar 2011 13:40:46 +0700 Subject: =?koi8-r?B?58HSwc7UydLP18HOztnFINvFzsfFztPLycUg18na2SDP1CAzIM3F0yDE?= =?koi8-r?B?zyAzLcggzMXUISDzzM/WztnFINPM1d7BySE=?= Message-ID: <000d01cbe85c$13071e60$6400a8c0@br> ВИЗОВЫЙ ОПЕРАТОР! АККРЕДИТАЦИЯ В ПОСОЛЬСТВЕ! БЫСТРО! ЛЕГАЛЬНО! Телефоны: +7 (495) 649 9170; +7 (499)3431902; СПЕЦПРЕДЛОЖЕНИЕ НЕДЕЛИ. Испания. Шенгенская мульти-виза - 6 месяцев за 350 у.е. ДЕЛОВАЯ МУЛЬТИВИЗА в ГРЕЦИЮ СПЕЦПРЕДЛОЖЕНИЕ 6 мес- 650 ЕВРО! СПЕШИТЕ! ТОЛЬКО НА ЭТОЙ НЕДЕЛЕ СКИДКА 10% при подаче 2-х документов сразу. Шенгенские ДЕЛОВЫЕ мульти-визы за 4 РАБОЧИХ ДНЯ Среднесрочные - 1 год - 900 у.е, 6 месяцев - 700 у.е, 3 месяца - 500 у.е. (сбор включен) Долгосрочные - 2 года - 1800 у.е, 3 года - 2 650 у.е. (сбор включен) ШЕНГЕН БЕЗ СОБЕСЕДОВАНИЯ, БЕЗ ПРИСУТСТВИЯ, БЕЗ ЗАПИСИ В КОНСУЛЬСТВЕ!!!! Работаем со сложными случаями - мультивизы для уроженцев и жителей Кавказа и паспортов с отказами Аккредитации в Посольствах!!! ВИЗЫ в США, Великобританию, Кипр, Китай и др. страны ОПЛАТА деловых мульти-виз только ПОСЛЕ ВЫХОДА ВИЗЫ. ГАРАНТИЯ. Телефоны: +7 (495) 649 9170; +7 (499)3431902; (без выходных) СПЕЦИАЛЬНЫЕ ПРЕДЛОЖЕНИЯ ПО ТУРАМ, ОГРОМНАЯ БАЗА ГОРЯЩИХ ТУРОВ!!!!! ПРИГЛАШЕНИЯ для иностранцев, страхование на даты поездки, ПЕРЕВОДЫ документов. Телефоны: +7 (495) 649 9170; +7 (499)3431902 (без выходных) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3820 bytes Desc: not available URL: From buhg at avto-prodaga.ru Tue Mar 22 02:31:50 2011 From: buhg at avto-prodaga.ru (=?koi8-r?B?78jSwc7BINTS1cTB?=) Date: Tue, 22 Mar 2011 16:31:50 +0700 Subject: =?koi8-r?B?8NLPxcvUINrBy8/OwSDPIOvBxNLP18/NIMTFzM/Q0s/J2tfPxNPU18U=?= Message-ID: <000d01cbe873$f8c3b690$6400a8c0@buhg> 23 Марта Тема: Кадровое делопроизводство и правовое регулирование трудовых отношений с учетом последних изменений. 8 Моск. код: 7Ч2_9198 \\\/// 7-9.2-2*I_2_2 Андреева Валентина - консультант-преподаватель, один из лучших специалистов России в области кадрового делопроизводства. Профессор кафедры Трудового права Академии Правосудия при Верховном Суде РФ (Москва), кандидат наук, документовед. Программа мероприятия: 1.Правовые основы документирования деятельности кадровых служб 1.1.Требования к кадровому делопроизводству, предусмотренные ТК РФ, в связи с обязательно-стью документирования работы с персоналом. 1.2.Государственный надзор и контроль за соблюдением законодательства в области докумен-тирования работы с кадрами. Штрафные санкции за нарушение порядка работы с кадровой документацией. 2.Система кадровой документации 2.1.Состав документов кадровой службы. 2.2.Нормативно-методические основы оформления кадровых документов. Унифицированные системы документации, применяемые в процессе документирования работы с персоналом. 2.3.Делегирование полномочий при издании документов. 2.4.Порядок придания документам юридической силы. Типичные ошибки в оформлении докумен-тов, судебная практика. 3.Документирование процедур подбора и отбора персонала 3.1.Проверка документов, предъявляемых при приеме на работу. Определение подлинности до-кументов. 3.2.Письменный отказ в приеме на работу: обязательность составления, правильность оформ-ления, обжалование в суде. 4.Документирование процедур, предшествующих заключению трудового договора. 4.1.Ознакомление с локальными нормативными актами работодателя. 4.2.Документирование процедуры фактического допущения к работе. 5.Документирование трудовых отношений. Виды документов и правила их оформления. 5.1.Оформление приема на работу, обязательные и рекомендательные документы. 5.2.Документы, создаваемые при изменении трудового договора. 5.3.Документирование прекращения трудового договора. Документы-основания для увольнения работников. 6.Ответы на вопросы слушателей и практические рекомендации. Стоимость участия 6 990 руб. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: код: (четыре девять пять) 7Ч2_9|98 <> ЧЧ5-32.66 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4135 bytes Desc: not available URL: From reed at inet.org Tue Mar 22 13:57:39 2011 From: reed at inet.org (Michael Reed) Date: Tue, 22 Mar 2011 16:57:39 -0400 Subject: [tor-talk] Iran cracks down on web dissident technology Message-ID: On 03/22/2011 12:08 PM, Watson Ladd wrote: > On Tue, Mar 22, 2011 at 11:23 AM, Joe Btfsplk wrote: >> Why would any govt create something their enemies can easily use against >> them, then continue funding it once they know it helps the enemy, if a govt >> has absolutely no control over it? It's that simple. It would seem a very >> bad idea. Stop looking at it from a conspiracy standpoint& consider it as >> a common sense question. > Because it helps the government as well. An anonymity network that > only the US government uses is fairly useless. One that everyone uses > is much more useful, and if your enemies use it as well that's very > good, because then they can't cut off access without undoing their own > work. BINGO, we have a winner! The original *QUESTION* posed that led to the invention of Onion Routing was, "Can we build a system that allows for bi-directional communications over the Internet where the source and destination cannot be determined by a mid-point?" The *PURPOSE* was for DoD / Intelligence usage (open source intelligence gathering, covering of forward deployed assets, whatever). Not helping dissidents in repressive countries. Not assisting criminals in covering their electronic tracks. Not helping bit-torrent users avoid MPAA/RIAA prosecution. Not giving a 10 year old a way to bypass an anti-porn filter. Of course, we knew those would be other unavoidable uses for the technology, but that was immaterial to the problem at hand we were trying to solve (and if those uses were going to give us more cover traffic to better hide what we wanted to use the network for, all the better...I once told a flag officer that much to his chagrin). I should know, I was the recipient of that question from David, and Paul was brought into the mix a few days later after I had sketched out a basic (flawed) design for the original Onion Routing. The short answer to your question of "Why would the government do this?" is because it is in the best interests of some parts of the government to have this capability... Now enough of the conspiracy theories... -Michael _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jya at pipeline.com Tue Mar 22 14:43:14 2011 From: jya at pipeline.com (John Young) Date: Tue, 22 Mar 2011 17:43:14 -0400 Subject: [tor-talk] Iran cracks down on web dissident technology In-Reply-To: <20110322211620.GO23560@leitl.org> Message-ID: Fucking amazing admission. No conspiracy theory needed. From eugen at leitl.org Tue Mar 22 13:51:47 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 22 Mar 2011 21:51:47 +0100 Subject: US military weaponizes sockpuppets Message-ID: <20110322205147.GM23560@leitl.org> http://www.telegraph.co.uk/news/8388603/US-military-creates-fake-online-personas.html US military creates fake online personas The US military awarded a contract for software to create 500 fake personas on social networks in order to secretly influence online debate in its favour, it has been reported. Facebook: The move has angered troops who regularly use networking sites to keep in touch with family and friends Photo: GETTY By Christopher Williams, Technology Correspondent 4:54PM GMT 17 Mar 2011 The $2.76m contract was won by Ntrepid, a Californian firm, and called for an "online persona management service" that would enable 50 military spies to manage 10 fake identities each. The personas should be "replete with background , history, supporting details, and cyber presences that are technically, culturally and geographacilly consistent", a US Central Command (Centcom) tender document said. It added: "Individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries. "Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms." The project would be based at MacDill Air Force base in Florida, The Guardian reported. The contract was first revealed by The Raw Story, a US news website. It also called for internet traffic from the project to be "mixed" with traffic from outside Centcom to provide "excellent cover and powerful deniability". A Centcom spokesman however said the fake social media personas would not "address US audiences". "The technology supports classified blogging activities on foreign-language websites to enable Centcom to counter violent extremist and enemy propaganda outside the US," said Commander Bill Speaks. If used against US citizens such "sock-puppetry" techniques, as they are known online, would bring legal fire on the military. The MoD meanwhile said it could find no evidence that British forces was involved in Operation Earnest Voice, a $200m anti-jihadism psychological operation, of which Centcom's "online persona management service" contract was thought to be part. From eugen at leitl.org Tue Mar 22 14:16:20 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 22 Mar 2011 22:16:20 +0100 Subject: [tor-talk] Iran cracks down on web dissident technology Message-ID: <20110322211620.GO23560@leitl.org> ----- Forwarded message from Michael Reed ----- From lodewijkadlp at gmail.com Tue Mar 22 14:24:34 2011 From: lodewijkadlp at gmail.com (=?UTF-8?Q?lodewijk_andr=C3=A9_de_la_porte?=) Date: Tue, 22 Mar 2011 22:24:34 +0100 Subject: US military weaponizes sockpuppets In-Reply-To: <20110322205147.GM23560@leitl.org> References: <20110322205147.GM23560@leitl.org> Message-ID: 2011/3/22 Eugen Leitl > that would enable 50 military spies to > manage 10 fake identities each. > I'm sorry, what? This could be done manually! I think there going for millions of online persona's that in an automatic natural language generating way creates believable "people", then having them post similar messages (think the stream of "It's payback for Pearl Harbor" messages on Facebook) to insinuate an idea upon the collective of users of that medium. Or simply create a trending topic on Twitter. I doubt they're interested in a tool that combines proxy's, header spoofing and a custom Facebook interface (and Twitter and whatnot) so their spy's can hold some sock puppets (let alone pay almost 3 mil for it). Then again: only in the US, right? From tackyes1 at superbook.ru Tue Mar 22 22:51:32 2011 From: tackyes1 at superbook.ru (Toby Pineda) Date: Tue, 22 Mar 2011 22:51:32 -0700 Subject: Online store - update details Message-ID: <000d01cbe91e$5c88c8f0$6400a8c0@tackyes1> Hello We are proud to inform you about starting new software shop bestsoftstore.net More than 3000 items of the most fresh software are available for downloading. All software is available for download from the fast high-end servers. You will be blown away with our extremely low prices. Last added software on 1softstore.com Adobe CS 5 Master Collection - US149 Creative Suite 5 Design Premium - 149 Lightroom 3.3 - 19 Photoshop Elements 9.0 - 54 Creative Suite 5 Production Premium - 149 InCopy CS5 - 35 Premiere Elements 9.0 - 54 After Effects CS5 x64 - 79 Adobe Acrobat Professional X 10 - 69 Microsoft Windows 7 Ultimate x86 SP1 - 79 MS Windows 7 Professional SP1 - 79 Office 2011 Business (Mac) - 79 ADesk Autocad 2011 - 99 3D Studio Max 2011 - 99 Feel free to contact our customer friendly technical support on any matters. It will help you to find the best solutions at any time. From jrebaoc at tek.com Tue Mar 22 16:33:24 2011 From: jrebaoc at tek.com (Jeanie Reba) Date: Wed, 23 Mar 2011 02:33:24 +0300 Subject: Buy Replica Watches, Fake Watch for Sale. Message-ID: <23j79u26b98-55443126-339s2n59@mvifcddp> Replica rolex watches, rolex replica watches, Fake rolex watch ... Buy Replica Watches, Fake Watch for Sale. Selling great quality replica for all kinds of branded replica such as Title replica watches http://finewatchesconsult.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 612 bytes Desc: not available URL: From oper3102 at banksist.ru Wed Mar 23 01:36:36 2011 From: oper3102 at banksist.ru (Dion Villegas) Date: Wed, 23 Mar 2011 09:36:36 +0100 Subject: =?koi8-r?B?59LV2s/QxdLF18/ay8kgzMDCz8og08zP1s7P09TJ?= Message-ID: <000d01cbe935$6bce1ec0$6400a8c0@oper3102> Транспортные услуги Компания "МосАвтоТранзит" специализируется на оказании услуг в области грузоперевозок любой сложности. - перевозка грузов автомобильным транспортом по России, СНГ и Дальнему зарубежью. - перевозка грузов от 1 кг автомобильным транспортом по России. - перевозка негабаритного груза - перевозка опасных грузов - рефрижераторные перевозки - перевозка контейнеров железнодорожным транспортом - логистика - хранение - страхование Специалисты компании обладают большим опытом. Компания имеет собственный автопарк, а так же работает с привлеченным транспортом. Мы предлагаем своим клиентам выгодные и надежные условия сотрудничества! Гарантия сроков доставки грузов, высокое качество, оперативность, конфиденциальность, приемлемые цены, гибкая система скидок. Наши контактные телефоны: Многоканальный Моб. Факс +7 /495/ 229 46 87 +7 /499/ 409 84 05 +7 /915/ 213 76 05 /грузоперевозки/, icq 367-051-072 +7 /906/ 794 29 31 /грузоперевозки/, icq 553-806-483 +7 /495/ 611 11 54 Звоните и мы с радостью ответим на все интересующие вас вопросы! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2549 bytes Desc: not available URL: From eugen at leitl.org Wed Mar 23 02:12:45 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 23 Mar 2011 10:12:45 +0100 Subject: [cryptography] Trusted CA compromised, used to issue fraudulent certificates Message-ID: <20110323091245.GT23560@leitl.org> ----- Forwarded message from Peter Gutmann ----- From lee at royalgardens.us Wed Mar 23 13:53:18 2011 From: lee at royalgardens.us (Lee @ Royal Gardens) Date: Wed, 23 Mar 2011 10:53:18 -1000 Subject: 1/9/11 and historical wiretaps Message-ID: Pre for oBSama.com documentary. (200)1-09-11 or 1911 simplified to "9/11" in the American system was a manifestation of a turf war between the us treasury secret service, department of justice including dea and FBI, oss derivatives, and military dia defense intelligence agency and factions like disa. Though the troubled situation was existing previously and most parties already involved, it became structured in the context known to history when a number of small children were exploited as newspaper carriers. During the 1980s through to a set of legal clarifications in the late 1990s, child labour such as newspaper delivery by children under legal working age was considered child exploitation and illegal under both federal and international law. In this prominent historical case, the children serving as newspaper delivery in a quaint neighbourhood were being used to finance hobby projects such as a network of bbs systems which they ran entirely themselves. as these communication systems expended their influence in the dawn of the technological revolution, they were used for automatic distribution of public interest content and electronic media and became the primary conduit between eastern new York and northern Europe due to cleaner telephone lines more direct in both directions. by 1993 and 1994, these children were subject of heated political disputes contrasting their benevolent educational activities financed by illicit child labour exploitation with trans-national automatic distribution of public interest content and its frequent payload of age-restricted material and shareware license generators. with international distribution of significant volumes of data, some of which could easily have come from controlled sources, this hobby project financed by newspaper delivery drew the attention of most federal authorities and related international parties. by 1994, the doj FBI espionage division, treasury secret service, military intelligence including dia (and Cia for foreign data), us customs for the trans-border transfer of content, even the us dea drug enforcement administration for the distribution of "cracks" (and coordination thereof in a small urban environment) were all involved. the children, still pre-teen, simply continued their highly regarded activities and provided a large percentage of the intellectual content and shareware traffic between Europe and eastern usa. A specific legal situation generated conflict between a majority of the legal and investigating parties as us secret service was obligated to defend the exploited children against corrupt practices of the department of justice which would have led to further direct exploit and customs and military were also at odds due to strife and inconsistent policy. as military interests trump civilian, the defense intelligence agency activated a special unit to track information leaks and distribution mechanisms including these kids' bbs by active participation. in contradiction, USSS ncmec and doj amongst others contradicted the dod and NATO interests by bringing the situation of the exploited children to the UN as both a security and policy issue. the modern internet was only starting to develop at this time, sponsored mainly by the American institution which saw a potential for global propaganda distribution, and various factions of the us dept of commerce and defense intelligence agency chose to encourage consumer use of computer devices and found case models such as these to be ideal templates. as the military dealt with the transition between centrally managed data systems and these new console devices entities such as Disa defense information systems agency and others encouraged making use of public sector communication noise to obscure the the transport of data for ic (nefarious intelligence) purposes. they selected to sponsor various mechanisms of distribution including bbs and early internet systems in specific high relevance regions and also maneuvered to take over distribution logistics including software and electronic media distributors and primary sources such as the shareware and "warez" originators. since dia also manages foreign espionage against the united states and its interests, this further generated rifts between military and counter-espionage authorities such as the FBI and us customs. by 1996 or 1997, internet based information distribution originators were the primary unique source of data and the dominant traffic proved to be the widespread distribution of games. as "intelligence" entities tend to avoid trackable modes of communication, the us military defense intelligence agency dia took over control and operation of the primary and most widespread distributor of consumer content, the "warez" group Razor1911. as the parties involved evolved, the scope of the control and coordination structures were more clear, fully managed by the contrasting policy and interests of commerce and governing entities and related antagonistic interests of military intelligence. the scope of Razor1911 as a global intelligence front for a plethora of countries and organizations was vast on paper but concise and limited in context. Razor1911, based originally in Sweden and then controlled by the American dia and NATO, served as a primary cornerstone for information propagation to a global audience and even provided the opportunity for competing intelligence factions to use their own distribution originators such as DOD "Drink or Die" and many others, all closely related. in the same context as the exploited children were used for content distribution, these patsy fronts exploited the best interests of the international community to ensure that the opportunity was maintained to use these distribution channels for specific propaganda or hidden messages. [[ The small countries of Connecticut, Sweden, Norway, and related institutions like the confederate militias were selected as primary players as their histories and political claims are closely interrelated. ]] the over abundance of watching parties, any modernized country or commercial intelligence faction, provided not only a wiretap on each of thousands of contacted devices (especially an American fisa "entity" tap order) but layers of both semi-legal and illegal wiretaps for anyone interested and even wiretaps on wiretaps which sold everything to black market as well. one of these taps, actually a cable modem circuit used since 1996 and never taken out of the "test service" mode, constantly reported all data on wire to over 40 countries and hundreds of minor police entities which then redistributed their illicit gains for profit. in June of 2001, a laptop device owned by travellers insurance company connected to this cable modem's wireless accesspoint for an intense work-at-home debate about a commercial insurance account. the client was the world trade center complex in new York city including the twin towers brought to public attention in 2001.09.11. the world trade center buildings, especially the twin towers, were a prominent and significant concern for the insurance company -- having had damage to the foundation from a car bomb in 1993 and a subway repair project -- the buildings were in need of significant repair. though built after epa orders against such, the twin towers used significant amounts of compressed asbestos cement (white crystal powder) and could not be repaired without "bagging" the entire building and complex. Alternate options included trying to dismantle the WTC towers which would have been a severe blow to American ego, letting it stand and hope for the best, or illegally repair without full protocol given the size of the project. if the WTC towers were left alone, a fracture or failure of the foundation would have caused a 3 block radius of nyc to be obliterated with unpredictable domino cascade results for adjacent buildings as the towers fell over. The best option was controlled demolition; the most severe blow to the American psyche possible. the year 2000 calendar audits for technological devices, known as y2k popularly, discovered some severe problems in a wide diversity of legacy electronic systems including the fly-by-wire autopilot system required in all commercial jets since the early 1970s. one primary factor was that a set of flight control systems which typically handle routine aircraft control but also provide a system so that norad and other radar systems can help prevent mid-air collisions by slightly adjusting their course and to control evasive maneuvers of the civilian jet in the remote case of an unguided heat seeking missile targeting the passenger aircraft. because this later fact was deemed sensitive and classified, an uproar in the auditing community brought attention to both the clock problems in the autopilot system and the presence of the override circuit. more importantly in 1999 and 2000, techniques to generate the override control signals were demonstrated using a retail laptop or pda with a simple radio and even a module was submitted to the "Microsoft flight simulator" community website to demonstrate the remote control of commercial jets in the simulator -- the encryption used on the norad signal and autopilot radio circuit was antiquated and easily determined with the computer. [jumping out of an elevator in the fbi 101:] From acorinneew at fsbankblm.com Wed Mar 23 02:08:11 2011 From: acorinneew at fsbankblm.com (Argelia Corinne) Date: Wed, 23 Mar 2011 11:08:11 +0200 Subject: If you choose the right penis enhancement pills that work for you, you will find yourself unwilling to go back to how "sex used to be. Message-ID: <17g90u24f86-64041055-697a2l67@pnhakxp> Why You Need to Buy Penis Pills? If you choose the right penis enhancement pills that work for you, you will find yourself unwilling to go back to how "sex used to be." Men use male enhancement supplements for a wide range of reasons. Indeed, there are certain factors that can interfere with a man's optimum enjoyment of sex - lifestyle, health habits, stress, aging, and many others. Many men would like to counter the effect of these factors by taking penis pills. For some, they want to improve certain aspects of their sexuality, such as: - Shortening the time it takes to achieve erection - Improving quality of erection - attaining harder, firmer and longer-lasting erections - Increase semen volume - Enhance sperm motility and virility - Increase sexual drive and libido - Heighten sexual stamina - Achieve more intense, longer and more frequent orgasms http://longpenislike.ru From eugen at leitl.org Wed Mar 23 03:36:36 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 23 Mar 2011 11:36:36 +0100 Subject: realtime VoIP censorship Message-ID: <20110323103636.GX23560@leitl.org> http://www.nytimes.com/2011/03/22/world/asia/22china.html?_r=1&pagewanted=all China Tightens Censorship of Electronic Communications By SHARON LaFRANIERE and DAVID BARBOZA Published: March 21, 2011 BEIJING b If anyone wonders whether the Chinese government has tightened its grip on electronic communications since protests began engulfing the Arab world, Shakespeare may prove instructive. A Beijing entrepreneur, discussing restaurant choices with his fiancC)e over their cellphones last week, quoted Queen Gertrudebs response to Hamlet: bThe lady doth protest too much, methinks.b The second time he said the word bprotest,b her phone cut off. He spoke English, but another caller, repeating the same phrase on Monday in Chinese over a different phone, was also cut off in midsentence. A host of evidence over the past several weeks shows that Chinese authorities are more determined than ever to police cellphone calls, electronic messages, e-mail and access to the Internet in order to smother any hint of antigovernment sentiment. In the cat-and-mouse game that characterizes electronic communications here, analysts suggest that the cat is getting bigger, especially since revolts began to ricochet through the Middle East and North Africa, and homegrown efforts to organize protests in China began to circulate on the Internet about a month ago. bThe hard-liners have won the field, and now we are seeing exactly how they want to run the place,b said Russell Leigh Moses, a Beijing analyst of Chinabs leadership. bI think the gloves are coming off.b On Sunday, Google accused the Chinese government of disrupting its Gmail service in the country and making it appear as if technical problems at Google b not government intervention b were to blame. Several popular virtual private-network services, or V.P.N.bs, designed to evade the governmentbs computerized censors, have been crippled. This has prompted an outcry from users as young as ninth graders with school research projects and sent them on a frustrating search for replacements that can pierce the so-called Great Firewall, a menu of direct censorship and bopinion guidanceb that restricts what Internet users can read or write online. V.P.N.bs are popular with Chinabs huge expatriate community and Chinese entrepreneurs, researchers and scholars who expect to use the Internet freely. In an apology to customers in China for interrupted service, WiTopia, a V.P.N. provider, cited bincreased blocking attempts.b No perpetrator was identified. Beyond these problems, anecdotal evidence suggests that the governmentbs computers, which intercept incoming data and compare it with an ever-changing list of banned keywords or Web sites, are shutting out more information. The motive is often obvious: For six months or more, the censors have prevented Google searches of the English word bfreedom.b But other terms or Web sites are suddenly or sporadically blocked for reasons no ordinary user can fathom. One Beijing technology consultant, who asked not to be identified for fear of retribution against his company, said that for several days last week he could not visit the Web site for the Hong Kong Stock Exchange without a proxy. LinkedIn, a networking platform, was blocked for a day during the height of government concerns over Internet-based calls for protests in Chinese cities a few weeks ago, he said. Hu Yong, a media professor at Peking University, said government censors were constantly spotting and reacting to new perceived threats. bThe technology is improving and the range of sensitive terms is expanding because the depth and breadth of things they must manage just keeps on growing,b Mr. Hu said. Chinabs censorship machine has been operating ever more efficiently since mid-2008, and restrictions once viewed as temporary b like bans on Facebook, YouTube and Twitter b are now considered permanent. Government-friendly alternatives have sprung and developed a following. Few analysts believe that the government will loosen controls any time soon, with events it considers politically sensitive swamping the calendar, including a turnover in the Communist Partybs top leadership next year. bIt has been double the guard, and double the guard, and you never hear proclamations about things being relaxed,b said Duncan Clark, chairman of BDA China, an investment and strategy consultancy based in Beijing, and a 17-year resident of China. bWe have never seen this level of control in the time I have been here, and I have been here since the beginning of the Internet.b How far China will clamp down on electronic communications is unclear. bTherebs a lot more they can do, but theybve been holding back,b said Bill Bishop, a Internet expert based in Beijing. Some analysts suggest that officials are exploring just how much inconvenience the Chinese are willing to tolerate. While sentiment is hard to gauge, a certain segment of society rejects censorship. For many users, an inoperable V.P.N. is an inconvenience, not a crisis. But Internet consultants said interfering with an e-mail service on which people depend every day is more serious. bHow people respond is going to be more intense, more visceral,b one consultant said. Google began receiving complaints from Gmail users and its own employees in China about a month ago, around the time anonymous Internet posts urged people unhappy with the government to gather every Sunday. Some Gmail users found their service disconnected when they tried to send or save messages. Engineers determined that there were no technical difficulties on Googlebs end, Google said; rather, the hand of the Chinese government was at work. Chinabs Foreign Ministry did not respond Monday to calls or faxed questions about Googlebs statement. Disrupting Web sites and Internet connections is a standard tactic in dealing with companies that fall out of government favor. Mark Seiden, an Internet consultant, said Chinese officials typically left the companies and users to guess the reason. In the Google case, an article on the Web site of Peoplebs Daily, the Communist Partybs official publication, offered a strong hint. The March 4 article, attributed to a netizen, called Google a tool of the United States government. Like Facebook and Twitter, the article said, Google has bplayed a role in manufacturing social disorderb and sought to involve itself in other nationsb politics. China has treated Google as a threat for some time. Last year, Google closed its search service and redirected Chinese users to Googlebs Hong Kong site after the company said China was behind a cyberattack aimed partly at Gmail accounts. Mr. Moses, the Beijing analyst, said the latest moves further expand government control of electronic communications. bThe model for this government is that every day is a new challenge and a new opportunity to show the strength of the state here,b he said. bThere is clear confidence in the capability of the political authorities to maintain order.b Jonathan Ansfield contributed reporting from Beijing, and Claire Cain Miller from San Francisco. Jonathan Kaiman and Li Bibo contributed research from Beijing. From eugen at leitl.org Wed Mar 23 05:56:36 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 23 Mar 2011 13:56:36 +0100 Subject: Phoenix UAV can sense you breathing Message-ID: <20110323125635.GE23560@leitl.org> http://news.cnet.com/8301-17938_105-20045941-1.html March 22, 2011 1:18 PM PDT Phoenix UAV can sense you breathing by Tim Hornyak Up, up, and away: Phoenix40-A takes to the skies after casing a building. (Credit: TiaLinx) Just when you thought you might be able to outrun the Cougar20-H surveillance robot that can detect human breathing, developer TiaLinx has launched a flying version that can do the same. The Phoenix40-A is a mini-UAV with six rotors that can detect motion and breathing when searching for hidden people. Like the Cougar20-H, it has an ultra-wideband radio frequency sensor array and can also detect motionless live objects. It also has video cameras for site surveillance. Developed with U.S. Army funding, the Phoenix unmanned aerial vehicle can be remotely controlled from ground or air with a laptop or joystick, and can fly to multiple GPS points on its missions. The flying robot's RF array can penetrate concrete walls from "an extended range," according to TiaLinx, which is based in Newport Beach, Calif. Other skills include providing the layout of a multistory building and scanning roads for unexploded ordnance. Skynet might dig that, but the Phoenix could also be deployed in humanitarian missions. It could work in disasters such as earthquakes to scan for survivors, or even find landmines in former war zones. Read more: http://news.cnet.com/8301-17938_105-20045941-1.html#ixzz1HQWyNIOH From lodewijkadlp at gmail.com Wed Mar 23 06:45:55 2011 From: lodewijkadlp at gmail.com (=?UTF-8?Q?lodewijk_andr=C3=A9_de_la_porte?=) Date: Wed, 23 Mar 2011 14:45:55 +0100 Subject: Phoenix UAV can sense you breathing In-Reply-To: <20110323125635.GE23560@leitl.org> References: <20110323125635.GE23560@leitl.org> Message-ID: Does my breathing produce rf signals? Infrared due to the heat but that doesn't really penentrate walls all too well. Anyway, time to wrap the HQ in aluminium foil. 2011/3/23 Eugen Leitl : > http://news.cnet.com/8301-17938_105-20045941-1.html > > March 22, 2011 1:18 PM PDT > > Phoenix UAV can sense you breathing > > by Tim Hornyak > > Up, up, and away: Phoenix40-A takes to the skies after casing a building. > > (Credit: TiaLinx) > > Just when you thought you might be able to outrun the Cougar20-H surveillance > robot that can detect human breathing, developer TiaLinx has launched a > flying version that can do the same. > > The Phoenix40-A is a mini-UAV with six rotors that can detect motion and > breathing when searching for hidden people. > > Like the Cougar20-H, it has an ultra-wideband radio frequency sensor array > and can also detect motionless live objects. It also has video cameras for > site surveillance. > > Developed with U.S. Army funding, the Phoenix unmanned aerial vehicle can be > remotely controlled from ground or air with a laptop or joystick, and can fly > to multiple GPS points on its missions. > > The flying robot's RF array can penetrate concrete walls from "an extended > range," according to TiaLinx, which is based in Newport Beach, Calif. > > Other skills include providing the layout of a multistory building and > scanning roads for unexploded ordnance. > > Skynet might dig that, but the Phoenix could also be deployed in humanitarian > missions. It could work in disasters such as earthquakes to scan for > survivors, or even find landmines in former war zones. > > Read more: http://news.cnet.com/8301-17938_105-20045941-1.html#ixzz1HQWyNIOH From eugen at leitl.org Wed Mar 23 08:14:25 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 23 Mar 2011 16:14:25 +0100 Subject: Listen: Secret Libya Psyops, Caught by Online Sleuths Message-ID: <20110323151425.GL23560@leitl.org> http://www.wired.com/dangerroom/2011/03/secret-libya-psyops/ Listen: Secret Libya Psyops, Caught by Online Sleuths By Noah Shachtman Email Author March 20, 2011 | 7:28 pm | Categories: Air Force The U.S. military has dispatched one of its secret propaganda planes to the skies around Libya. And that bCommando Solob aircraft is telling Libyan ships to remain in port b or risk NATO retaliation. We know this, not because some Pentagon official said so, but because one Dutch radio geek is monitoring the airwaves for information about Operation Odyssey Dawn b and tweeting the surprisingly-detailed results. On Sunday alone, bHuubb has identified the tail numbers, call signs, and movements of dozens of NATO aircraft: Italian fighter jets, American tankers, British aerial spies, U.S. bombers, and the Commando Solo psyops plane (pictured). bIf you attempt to leave port, you will be attacked and destroyed immediately,b the aircraft broadcasted late Sunday night. Itbs the kind of information that the American military typically tries to obscure, at least until a mission is over. But Huub is just a single node in a sprawling online network that trawls the airwaves for clues to military operations. Huub, also known online as bBlackBoxb and @FMCNL, has been monitoring longer than most b more than a quarter-century. A former member of the Dutch military, he says that hebs captured the sounds of everything from Air Force One to CIA rendition flights to the travels of Yugoslavian war criminal Slobodan Mlosevic. bI just combine the global and free information on the Internet with my local received information from the ether,b Huub e-mails Danger Room. b[My] main goal to listen to this communication is to listen to bthe truth,b without any military or political propaganda.b Military aircraft have to provide basic information about their position over unencrypted, unclassified UHF and VHF radio networks; otherwise, theybd risk slamming into civilian jets in mid-air. That allows savvy listeners like Huub to use radio frequency scanners, amplifiers, and antennas to capture the communications. Some spend thousands of dollars homebrewing their own DIY listening stations. Many others b Huub included b rely on handheld gear, much of which can be ordered through Radio Shack. Huub uses the ICOM R20 receiver and the Uniden UBC-785XLT scanner, both of which retail for a little more than $500. But the type of gear is almost secondary, Huub writes. bI do not simply listen to ATC [air traffic control] or NATO frequencies,b he says. Instead, he monitors everything from aircraft transponder data to IRC chatrooms to pinpoint his planes. bI use a combination of live listening with local equipment, audio streaming, video streaming, datamining, intelligence, analyzing and the general knowledge of ATC procedures, communication, encryption, call signs, frequencies and a lot of experience on this!b Huub, who ordinarily spends his days as a digital forensics manager in the town of Hilversum, has lately spent up to 16 hours a day, scanning for clues about the attack on Libya. Some of his Twitter followers arenbt so sure Huub should be devoting that much time to plucking military data from the sky. bIf you are not delaying your tweets by a WIDE margin, you are putting the pilots in harms way!!!!b tweets @Joe_Taxi. bWhen the sounds of the #operationoddesydawn aircraft are heard in #Libya it should be a complete surprise.b Huub is hardly the only one eavesdropping on this operation, however. At least two others recorded the Commando Solo in action on Sunday, for instance. And that shows just how easily average folks can now gather intelligence in ways once reserved for the best-funded spy agencies. Online sleuths now use Google Earth to find everything from North Koreabs launch facilities to Pakistanbs drone bases. Plane-spotters scoured tail numbers to uncover the CIAbs torture flights. So itbs no wonder that the sounds of this newest air war are being broadcast online b even before the planes return to their airstrips. Photo: USAF http://www.lsdimension.com/2011/03/23/amateur-spying-on-the-usaf-and-nato/ Amateur Spying On The USAF And NATO A few days ago I posted a USAF warning transmission targeted at Libyan ships. Somebody had picked that transmission off the ether, recorded it and put it on the internet. It turns out that somebody was a Dutch guy called Huub. This digital forensics manager in Hilversum has spent all of his freetime in the last 25 years on tracking down air movements of military aircrafts. During the current war in Libya he is spending 16 hours a day monitoring the positions and movements of the allied warplanes. Wired has a story on this former member of the Dutch military, in which he explains his methods: bI just combine the global and free information on the Internet with my local received information from the ether,b Huub e-mails Danger Room. b[My] main goal to listen to this communication is to listen to bthe truth,b without any military or political propaganda.b (b&) bI do not simply listen to ATC [air traffic control] or NATO frequencies,b he says. Instead, he monitors everything from aircraft transponder data to IRC chatrooms to pinpoint his planes. bI use a combination of live listening with local equipment, audio streaming, video streaming, datamining, intelligence, analyzing and the general knowledge of ATC procedures, communication, encryption, call signs, frequencies and a lot of experience on this!b For this he uses his computer and simple handheld radiogear which costs no more than a couple of hundred dollars. He shares his findings on Twitter, which raises the question: is he putting fighter pilots and the general mission in danger? Maybe he should wait a few hours before tweeting his discoveries? The Wired article ends with: And that shows just how easily average folks can now gather intelligence in ways once reserved for the best-funded spy agencies. Online sleuths now use Google Earth to find everything from North Koreabs launch facilities to Pakistanbs drone bases. Plane-spotters scoured tail numbers to uncover the CIAbs torture flights. So itbs no wonder that the sounds of this newest air war are being broadcast online b even before the planes return to their airstrips. Some recent tweets bij Huub (@FMCNL): More on Huub and another Dutch radio amateur called Dirk de Jager who is doing similar stuff at The Guardian, NOS and RNW (last two in Dutch). - Edit: An Italian guy called David Cenciotti (@cencio4) is doing similar work and he posts a daily overview of all the actions of the allied forces in Operation Oddysey Dawn, including a detailed gathering of daily fly ops, ship movements and military buildup. He puts all this data into a stratigical and military-historical perspective. Very interesting! From plopswc87 at sprosite.ru Wed Mar 23 14:37:39 2011 From: plopswc87 at sprosite.ru (Emerson Webb) Date: Wed, 23 Mar 2011 18:37:39 -0300 Subject: Top selling product list Message-ID: <000d01cbe9a2$887a95e0$6400a8c0@plopswc87> Hello We are proud to inform you about starting new software shop softcopyonline.com More than 3000 items of the most fresh software are available for downloading. All software is available for download from the fast high-end servers. You will be blown away with our extremely low prices. Last added software on 1softcopy.com Adobe CS 5 Master Collection - US149 Creative Suite 5 Design Premium - 149 Lightroom 3.3 - 19 Photoshop Elements 9.0 - 54 Creative Suite 5 Production Premium - 149 InCopy CS5 - 35 Premiere Elements 9.0 - 54 After Effects CS5 x64 - 79 Adobe Acrobat Professional X 10 - 69 Microsoft Windows 7 Ultimate x86 SP1 - 79 MS Windows 7 Professional SP1 - 79 Office 2011 Business (Mac) - 79 ADesk Autocad 2011 - 99 3D Studio Max 2011 - 99 Feel free to contact our customer friendly technical support on any matters. It will help you to find the best solutions at any time. From buhg at blackmetal.ru Wed Mar 23 09:38:47 2011 From: buhg at blackmetal.ru (=?koi8-r?B?7cnOyc3J2sHDydEgzsHMz8fP1w==?=) Date: Wed, 23 Mar 2011 18:38:47 +0200 Subject: =?koi8-r?B?7cnOyc3J2sHDydEgzsHMz8fP1yAtICLawdTSwdTO2cUiINPIxc3Z?= Message-ID: <36C96EF6F7304369920D3A6CCD0AB041@stella318bba9e> З0 марта 2О1l Тема: Затратные схемы для оптимизации налогов (НДС, Налог на прибыль) +7 Московский код: ЧЧ5З9_68 \\// 7922I.22 Цель: Курс посвящен изучению затратых механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Участники получат краткие индивидуальные консультации по тематике данного курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные","серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов – ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. 4. Виды приемлимых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 5. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 6. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 7. Ответы на вопросы. По желанию и при наличии возможности – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Вся информация по тел: Московский код;. 792/2|22 : 7-9-2-2_I*2/2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6766 bytes Desc: not available URL: From pgut001 at cs.auckland.ac.nz Tue Mar 22 23:04:06 2011 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Wed, 23 Mar 2011 19:04:06 +1300 Subject: [cryptography] Trusted CA compromised, used to issue fraudulent certificates Message-ID: Interesting post by Jacob Appelbaum on the compromise of a trusted CA that was used to issue fraudulent certificates: https://blog.torproject.org/blog/detecting-certificate-authority-compromises-and-web-browser-collusion The discussion shows up (yet again) one of the (several) killer problems of CRL/OCSP-style blacklisting, since you can only blacklist certs that you know that a certificate vending machine has issued, there could be arbitrary numbers of further certs out there that can't be revoked because the vending machine doesn't know that it issued them. Peter. _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Mar 23 13:25:24 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 23 Mar 2011 21:25:24 +0100 Subject: EDRi-gram newsletter - Number 9.6, 23 March 2011 Message-ID: <20110323202524.GU23560@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From edrigram at edri.org Wed Mar 23 13:12:02 2011 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 23 Mar 2011 22:12:02 +0200 Subject: EDRi-gram newsletter - Number 9.6, 23 March 2011 Message-ID: ============================================================ EDRi-gram biweekly newsletter about digital civil rights in Europe Number 9.6, 23 March 2011 ============================================================ Contents ============================================================ 1. French DPA fines Google for its Street View case with 100k Euro 2. The Privacy Platform Meeting: Reding outlines the way forward 3. French ISPs explain why blocking is wrong 4. Belgian political parties suspend plans for IPR enforcement measures 5. Net Neutrality debate kicks off in UK as ISPs propose transparency code 6. Ireland: Police seek internet blocking from ISPs 7. Using new Internet tools to identify dissidents in Azerbaijan 8. Romania: draft legislation proposing website blocking 9. Loppsi 2 bill passes the French Constitutional Council test 10. Dutch court rules that WiFi hacking is legal 11. Privatised online enforcement series: A. Abandonment of the rule of law 12. Recommended Reading 13. Agenda 14. About ============================================================ 1. French DPA fines Google for its Street View case with 100k Euro ============================================================ CNIL (the French DPA - Data Protection Authority) has recently performed a series of inspections related to the conformity with the French legislation of Google's gathering data from Wi-Fi networks for its Google Maps, Street View and Latitude services on France's territory. The inspections have revealed several infringements of the law, including the collection, through Google's Street View service cars, of WiFi data without the knowledge of the data subjects and of content-related data such as IDs, login details, emails and passwords. In May 2010, CNIL formally notified Google of the infringements and, as the company had not officially replied, on 17 March 2011, issued a 100 000 Euro fine on the company, the highest fine CNIL has applied since it received, in 2004, the power to impose financial sanctions. According to Google, the collection of the respective data was involuntary and a mistake. "As soon as we realised what was going on, we have immediately stopped our Street View cars" said Peter Fleischer, Google's Global Privacy Counsel, who added that all the collected data can now be deleted. CNIL confirmed that Google stopped collecting Wi-Fi data through its "Google cars" and deleted the collected data. However, the DPA believes that the company has not refrained from using the data without the knowledge of the data subjects and, moreover, has continued to gather such kind of data, without informing the data subjects, through users' mobile terminals connecting to the geo-location service, Latitude (smartphones, etc.). "They were not always willing to co-operate with us, they didn't give us all the information we asked for, like the source code of all devices in the Google cars," said Yann Padova, CNIL's executive director who added: "They were not always very transparent." Google may appeal the fine in two months time. Google Street View: CNIL pronounces a fine of 100,000 Euros (21.03.2011) http://www.cnil.fr/english/news-and-events/news/article/google-street-view-cnil-pronounces-a-fine-of-100000-euros/ Cnil sanctions the blunder of +Google cars; (only in French, 21.03.2011) http://www.lefigaro.fr/hightech/2011/03/21/01007-20110321ARTFIG00601-la-cnil-sanctionne-le-derapage-des-google-cars.php France fines Google over Street View data blunder (21.03.2011) http://www.bbc.co.uk/news/technology-12809076 EDRi-gram: Google admits it was gathering passwords and emails via StreetView (3.09.2010) http://www.edri.org/edrigram/number8.21/street-view-collects-emails ============================================================ 2. The Privacy Platform Meeting: Reding outlines the way forward ============================================================ On 16 March 2011, Sophie In't Veld's Privacy Platform met in the European Parliament to discuss the state of play for the review of the data protection directive. The cross-party meeting was co-chaired by EU Parliament members from the EPP, S&D, ALDE, the Greens and GUE. Speakers at the event included Vice-President of the Commission responsible for justice, fundamental rights and citizenship Viviane Reding and Axel Voss, German EPP member responsible for the Communication on a comprehensive approach to data protection in the EU in the European Parliament. Like most meetings which aim to tackle this massive Directive, it was difficult to narrow discussions and focus on concrete problems or possible solutions. However, there was an emphasis on fundamental rights from many speakers. In her keynote speech, Ms. Reding said that data protection was her "top legislative priority", while still hinting at the idea that a Regulation could replace the existing Directive, at least in part. She plans to enhance control and build individual rights in four pillars: 1. The right to be forgotten. Individuals have the right to withdraw consent to data processing, and it will be up to the data controllers to prove the need to collect or retain personal data. 2. Greater transparency. For data subjects, the use, collection and retention of personal data must be made clear, intelligible, easy to understand and easy to find. She made particular reference to social networking services and children. 3. Privacy by default. The term is different from the vaguely defined but often cited Privacy by Design, which Reding says is more of a technical solution. "Privacy settings often require considerable operational effort in order to be put in place," she said, so these settings are not a reliable indication of true consent, adding that "this needs to be changed". 4. Data protection regardless of data location. The data subject will enjoy protection, independent of the geographical region where the data is being collected and processed, without exception for third-party providers. On enforcement, she cautioned that the EU would not hesitate to take action against non-EU companies that broke EU rules on the collection and retention of data. She proposed the establishment of national privacy watchdogs to investigate non-EU data controllers. She declared that "a US-based social network company that has millions of active users in Europe needs to comply with EU rules". Mr. Voss and Commissioner Reding seemed to have divergent views on data protection. Where Commissioner Reding understands these rights as fundamental principles each human being is granted under all circumstances, Voss often questions how far data protection laws should stretch. This was particularly apparent when discussing data protection for criminals and anonymity and pseudonymity on the web. Ms. In't Veld brought up the "rubber stamping" of consent, urging that the revised Directive should address this adequately. Commissioner Reding agreed that consent without choice cannot be considered "consent". Ensuring true transparency and choice, she explained, is one of the components of Privacy by Default. A Dutch Pirate from the audience asked the panel how it planed to realistically protect the data of EU citizens regardless of geographical location, citing the request by the US authorities to access the Twitter data of individuals who may be linked to Julian Assange, the founder of WikiLeaks. Ms. In't Veld said there would soon be a meeting in the LIBE Committee to address this issue explicitly. Mr. Voss' working document will be published and presented in the committee on 11 April. The vote in the committee will follow on 24 or 25 May, and the plenary vote on 22 June 2011. In advance of this, the EPP Group in the European Parliament will hold a hearing on 31 March - the invitation explains that "nowadays, the debate seems to be narrowly focussed on the perspective of consumer protection and the safeguarding of a free internet. We think there is more to discuss!" As for the finalised version of the Data Protection Directive, the Commission plans to deliver it sometime in summer of 2011. EU privacy law will extend to US social networks, vows Commissioner (17.03.2011) http://www.out-law.com//default.aspx?page=11824 Commissioner Reding's keynote speech, Your data, your rights: safeguarding your rights in a connected world (16.03.2011) http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/11/183&format=HTML&aged=0&language=EN&guiLanguage=en EPP Hearing invitation http://www.edri.org/files/epp_hearing.pdf (contribution by Raegan MacDonald - EDRi) ============================================================ 3. French ISPs explain why blocking is wrong ============================================================ The French ISPs are being brought to court by ARJEL (the French online gambling regulation authority) in its attempt to obtain the blocking of access to the foreign online betting site 5Dimes. On 17 March 2011, the court heard seven French ISPs - Orange, SFR, Numericable, Free, Bouygues Telecom, Darty Telecom and Auchan Telecom - who resisted Arjel's request to block the online gambling site. Arjel was created in 2010 and given the authority to require ISPs to block access to online betting sites alleged infringements of various regulatory and fiscal obligations. However, ISPs are reluctant to answer the authority's request to block 5Dimes, arguing that blocking measures are inefficient. Furthermore, ISPs do not wish to create a dangerous precedent by blocking a site only at the request of Arjel without a judge's decision. 5Dimes, as well as its hosting company, Costa-Rica based Instituto Costarricense de Electricidad y Telecom (ICE), have only recently answered the requests of the authority to apply technical measures to block access to French users. During the hearing at the High Court, the operators criticised Arjel's system and pointed out the inefficiency of the measures by giving the example of Aaargh site which, "continues to be accessible under 12 or 13 addresses", although in 2005, the High Court of Paris ordered its blocking, a ruling supported in appeal by the decision of the Cassation Court. The ISPs also complained about the extremely high penalty requested by Arjel for non-compliance to its requests - 100 000 Euro/day. In their opinion, the authority should first act against the ICE that hosts 5Dimes. For Arjel however, website blocking at the level of ISPs is the easier solution in the case of a site hosted outside the country. Indeed, the ICE announced a day before the ISPs hearing, that, in order to block access to 5Dimes for French users, it would need a decision from a French court. ISPs criticize the efficiency of the blocking of online betting sites (only in French, 18.03.2011) http://www.numerama.com/magazine/18324-les-fai-critiquent-l-efficacite-du-blocage-des-sites-de-paris-en-ligne.html Online betting: the operators resists the blocking requests (only in French, 18.03.2011) http://www.freenews.fr/spip.php?article9977 The Telecom operators rearing against the filtering of the illegal sports betting sites (only in French, 17.03.2011) http://www.latribune.fr/technos-medias/medias/20110317trib000608945/les-operateurs-telecoms-arc-boutes-contre-le-filtrage-des-sites-de-paris-sportifs-illegaux.html ============================================================ 4. Belgian political parties suspend plans for IPR enforcement measures ============================================================ Following a reported flood of calls and e-mails to the parliamentarians involved, a campaign by the digital rights group Belgian Net Users' Rights Protection Association (NURPA) and a series of meetings between the Belgian political parties and ISPA Belgium, the two main parties supporting restrictive solutions for intellectual property enforcement for Belgium have decided to suspend their efforts. Both the Mouvement Reformateur (MR) and Socialist Party (PS) have decided - albeit for an unspecified period - to remove their initiatives from the parliamentary calendar. The MR is proposing Hadopi-like measures while the PS strategy has been to abandon the rule of law and force Internet service providers to block internet websites. The MR and PS now appear to have reached the conclusion that a more defensible methodology will be to organise a comprehensive review of all of the issues at stake, including the issue of lack of access to legal content in the right format and price. This is now seen as preferable to focus solely on repression, in an environment where large sections of the population see the legal framework as illegitimate. The increasing reticence of Belgian politicians on this point may not be hugely surprising. The initial push came from the outlandish promises made for HADOPI in France which seduced politicians into believing that this blunt approach might actually work. In January the Union of Independent French Phonographic Producers issued a statement that HADOPI had no perceptible impact on the French market - with market figures exactly in line with comparable European economies where draconian, repressive measures were not imposed. It is hardly surprising, therefore, that Belgian politicians are increasingly reticent to launch a policy which has no perceptible advantages for anyone and which causes such damage to both fundamental rights and to the perceived legitimacy of the legal framework for intellectual property. The next stages of the process are not yet clear, as it will be heavily influenced by political developments in the world-record breaking attempts to form a government. The entire political process in Belgium is struggling to cope with ongoing political impasse, with two failed elections already and a third one likely to strike the country any time over the next few months. Music: Independant producers want to debate the support measures (only in French, 18.01.2011) http://www.leparisien.fr/flash-actualite-culture/musique-les-producteurs-independants-veulent-debattre-de-mesures-de-soutien-18-01-2011-1232806.php Belgian Net Users' Rights Protection Association http://www.nurpa.be ISPA Belgium http://www.ispa.be EDRi-gram: Four strikes law returns to Belgium (9.03.2011) http://www.edri.org/edrigram/number9.5/belgium-four-strikes-law-returns (Contribution by Joe McNamee - EDRi) ============================================================ 5. Net Neutrality debate kicks off in UK as ISPs propose transparency code ============================================================ Minister Ed Vaizey met with Internet service providers, Internet platforms and citizen groups including the EDRi-member Open Rights Group on 16 March 2011 to discuss network discrimination. The positive outcome is that Tim Berners-Lee, who was at the meeting, will work with the ISPs "Broadband Stakeholders Group" on their new code. The ISPs themselves however did not feel any need to limit their ability to engage in network discrimination, arguing that market forces would prevent any serious problems from emerging. Others emphasised the difficulty in switching services which would limit the ability of the market to correct itself, and that mobile broadband suffered severe problems with little sign that anti-competitive behaviour was about to change. Ed Vaizey's Net neutrality roundtable with Tim Berners Lee (16.03.2011) http://www.openrightsgroup.org/blog/2011/ed-vaizey%E2%80%99s-net-neutrality-roundtable (Contribution by Jim Killock -EDRi member Open Rights Group - UK) ============================================================ 6. Ireland: Police seek internet blocking from ISPs ============================================================ A leaked letter from the Irish police force to ISPs has revealed demands that Irish ISPs should implement internet blocking. The letter - dated December 2010 but made publicly available only now - shows that Irish police have requested ISPs to implement a system of blocking with no legislative basis or judicial oversight, in which sites alleged to contain child pornography will be designated by the police. In a particularly worrying development, the letter also reveals police demands that the proposed system should be used as a surveillance tool, so that the police "would obtain details of other sites visited by the user, along with other technical details, in order that [they] can identify any new websites that require blocking". Irish ISPs have been critical of this initiative and see it as an attempt to bypass industry bodies such as the ISPAI by putting pressure directly on individual ISPs: "ISPs are concerned that this is a unilateral action by Garda with no legislative basis. At least one ISP has told the Garda that negotiation about the system should be done with a representative body such as telecoms group Alternative Operators in the Communications Market (Alto) or the Internet Service Providers Association of Ireland rather than dealing with individual service providers." Digital Rights Ireland has also criticised the move as promoting a failed model of blocking which has been shown by experience elsewhere to be ineffective, while at the same time acting as a distraction from attempts to remove material at source. It has also argued that any attempt to introduce such a model in Ireland would require - at a minimum - primary legislation and judicial oversight. Garda bid to block sites raises concerns (18.03.2011) http://www.irishtimes.com/newspaper/finance/2011/0318/1224292505133.html Leaked letter from Gardai (police) to Irish ISPs (28.12.2010) http://www.scribd.com/doc/51018185/Garda-Letter-to-ISPs-Requesting-Blocking EDRi-gram: Internet blocking plans in Ireland (21.04.2010) http://www.edri.org/edrigram/number8.8/internet-blocking-ireland-plans (Contribution by TJ McIntyre EDRi-member Digital Rights Ireland) ============================================================ 7. Using new Internet tools to identify dissidents in Azerbaijan ============================================================ As freedom activists have increased their activity on Facebook, the Azeri government has also increased its attention and surveillance of social networks. According to Azadliq newspaper, for instance, in June 2010, pro-government youth were encouraged to join Facebook with the purpose to expose those with online links to contacts in "enemy" nations. According to the international hacking group Anonymous, Virginia-based consulting company Booz Allen Hamilton is developing software that is used against dissidents in several countries, including Azerbaijan. The group, which claims it holds documents and e-mails to prove its allegations, states the respective software, which has led to the arrest of pro-democracy dissidents in Azerbaijan, creates "armies of fake people" through social networks like Facebook, identifying dissidents with anonymous profiles. "We know the U.S. Air Force and the Pentagon asked for it, we do know that Booz Allen and Aaron Barr (of HBGary) bid for the contract, we've got confirmation from Booz Allen themselves that the software exists" stated one member of Anonymous. The software has at its basis a proposal from the Office of Air Mobility Command of the U.S. Air Force, asking for 50 user licenses for software that would allow 10 personas per user. The US Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, has contracted such software. The contract stipulates that each fake online persona must have a convincing background, history and supporting details, and that the 50 US-based controllers should be able to operate false identities from their workstations "without fear of being discovered by sophisticated adversaries". "The technology supports classified blogging activities on foreign-language websites to enable Centcom to counter violent extremist and enemy propaganda outside the US," stated Centcom spokesman Commander Bill Speaks who added that the interventions would not be in English but in Arabic, Farsi, Urdu and Pashto. Further, the project was not targeting any US-based web sites, in English or any other language, and most specifically, was not targeting Facebook or Twitter. Whether Anonymous' allegations related to software used to track down dissidents in various countries is true or not, the fact that the US military is developing false online personalities is extremely disturbing and could create a dangerous precedent. Other governments, private companies and non-government organisations might wish to do the same. And, while in the US persona management is illegal, there are other countries where such procedures might not be forbidden by the law. Azerbaijan: Anonymous says Big Brother might be watching you (19.03.2011) http://advocacy.globalvoicesonline.org/2011/03/19/azerbaijan-anonymous-says-big-brother-might-be-watching-you/ Anonymous To Release Documents Showing 'Virtual Armies' Used To Identify Dissidents (16.03.2011) http://blogs.forbes.com/parmyolson/2011/03/16/anonymous-to-release-documents-showing-virtual-armies-used-to-identify-dissidents/ Revealed: US spy operation that manipulates social media (17.03.2011) http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks ============================================================ 8. Romania: draft legislation proposing website blocking ============================================================ Some ministries in the Romanian government seem to ignore or not even consider the arguments against Internet blocking, as they are proposing new legislation meant to allow enforcement authorities to impose blocking obligations on Internet service providers. One draft law initiated by the Government and currently debated within the Parliament is aimed at reviewing the existing legislation on pornography. While the law in force stipulates that the persons creating pornographic websites may allow access to these websites only after users pay "a tax per minute of usage" (while in reality there is no such a tax foreseen by fiscal authorities), the draft law introduces new obligations: a warning regarding the content must be placed on the website's home page or a verification of the age of the potential users. The draft law gives the competent authority (the Ministry of Communications and Information Society) the mandate to control the enforcement of the obligations imposed by law, and, in case of non-compliance, to require service providers to block access to the websites or content for a period of up to 30 days. Providers would have to implement the blocking measure within two days following the request of the authority. The Ministry that initiated the project did not reply to any comments on the draft law and refused to take into consideration the only implementation of the law in force, when in December 2008, ISPs were asked to block 40 allegedly illegal websites. The blocking order was sent to only 5-6 ISPs out of the almost 1000 on the market, where the authority implementing the law by claiming that they had already covered 90% of the Internet access market. Besides the fact that the idea of a tax per minute of usage is practically irrelevant for any Internet service, the draft law contains many other flaws. Firstly, it is not clear to what type of service providers the blocking obligation would apply to, since there are many similar terms used in the law: "service providers as defined by the Romanian law on electronic commerce" (i.e. information society service providers), "providers of services for Internet", "service provider". Secondly, although the competent authority is able to request providers to block access to websites or to content, sanctions would be imposed only if they do not comply with the request to block access to websites. Thirdly, there is a provision according to which service providers would be held responsible if they offer links to pornographic websites. This provision is not only confusing, since it does not specify the type of service providers it refers to, but also redundant since a similar provision already exists in the E-commerce law. The "web blocking solution" is also included in another draft law, a Governmental decision regarding the organisation and operation of gambling websites. According to this draft decision, the competent bodies would be able to require Internet providers to block websites identified as being used to provide access to unlicensed gambling sites or to market activities regarding gambling sites or related activities and services that are not authorized under Romanian law. However the law does not provide any obligation (or sanction) for the ISPs to comply with that decision. This draft decision, which was never discussed with the ISPs, is only a secondary legislation that should only implement a law (OUG 77/2009), which, again, does not foresee blocking as a possible measure or any obligations for ISPs. What the two draft legal acts have in common is a misunderstanding while the Internet industry and human rights organisations were never consulted on the matter- that website blocking is either the only, or the most efficient solution for dealing with problems related to the illegal activities undertaken via websites. The measure to block websites is even more ludicrous when Romania has no legal or practical system in place for blocking illegal content (i.e. child pornography) and the Ministry of Justice representatives rejected this measure in the European Council. However the measure could be adopted for legal, but harmful content (such as pornography). Websites blocking measures to be adopted in Romania (only in Romanian,18.03.2011) http://www.apti.ro/blocare-site-uri-web EDRi-gram: Romanian Authority asks ISPs to block 40 pornographic websites (17.12.2008) http://www.edri.org/edri-gram/number6.24/anc-blocks-isp-pornography-romania Stop(ped) web blocking (14.02.2011) http://www.edri.org/stop_web_blocking (Contribution by Sorina Teleanu - EDRi-member ApTI - Romania) ============================================================ 9. Loppsi 2 bill passes the French Constitutional Council test ============================================================ On 10 March 2011, the French Constitutional Council issued its decision on the LOPPSI 2 law considering 13 of its articles as unconstitutional but ruling that the controversial article 4, allowing the censoring of the Internet under the pretext of fighting child pornography, was not in contradiction with the Constitution. The court failed to protect freedom of expression by not striking out the infamous article 4 presented in the noble light of the fight against online child pornography: "This decision about article 4 is a great disappointment. It is obvious that Internet censorship will not help solve the child pornography problem in any way, as experiments in other countries have shown. After HADOPI's Internet access suspension measures, calls to ban WikiLeaks hosting and recent talks against Net Neutrality, France is siding ever more within the group of countries hostile to a free Internet by adopting administrative filtering of the Internet", stated Jirimie Zimmermann, co-founder and spokesperson for La Quadrature du Net. According to Filix Triguer, policy and legal analyst of La Quadrature du Net, the hope now lies in the hands of the European institutions. "The EU Parliament is currently trying to supervise blocking measures adopted at the national level, which could impede their implementation in France. Moreover, administrative Net filtering seems contrary to the European Convention on Human Rights, and one can expect an appeal before European judges" Having in view the censoring legislation it has lately adopted, such as Hadopi and Loppsi 2 laws which introduce Internet blocking and excessive surveillance measures, France has found its place on the list of countries with a high level of surveillance, as determined by Reporters without Borders. The Loppsi 2 law was promulgated by the French President and published in the Official Journal on 15 March 2011. Loppsi 2 promulgated (only in French, 15.03.2011) http://www.lefigaro.fr/flash-actu/2011/03/15/97001-20110315FILWWW00311-loisecurite-interieure-promulgation.php Decision no. 2011-625 DC of the Constitutional Council on the Law of orientation and programming for the interior security performance (only in French, 10.03.2011) http://www.conseil-constitutionnel.fr/conseil-constitutionnel/francais/les-decisions/acces-par-date/decisions-depuis-1959/2011/2011-625-dc/decision-n-2011-625-dc-du-10-mars-2011.94924.html Text of the Loppsi 2 (only in French, 15.03.2011) http://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000023707312&fastPos=1&fastReqId=1447818568&categorieLien=id&oldAction=rechTexte French Constitutional Council Validates Internet Censorship (11.03.2011) http://www.laquadrature.net/en/french-constitutional-council-validates-internet-censorship France the enemy of the Internet? No, but a country to survey according to RSF (only in France, 14.03.2011) http://www.zdnet.fr/actualites/la-france-ennemie-d-internet-non-mais-pays-a-surveiller-selon-rsf-39758987.htm World day against cyber-censorship (12.03.2011) http://march12.rsf.org/en/ France: Loppsi 2 adopted - Internet filtering without court order (23.02.2011) http://www.edri.org/edrigram/number9.4/web-blocking-adopted-france-loppsi-2 ============================================================ 10. Dutch court rules that WiFi hacking is legal ============================================================ A Dutch court in The Hague has recently ruled that by-passing an encrypted router and using its WiFi connection does not infringe Dutch law. The decision of the court comes in relation to the case of a young man having posted a threat on an Internet message board by using a WiFi connection he had hacked into. Although the student was convicted for posting the threatening message and sentenced to 20 hours of community service, he was acquitted of the WiFi hacking charges. The court considered that the student had not obtained access to the computer connected to the router, but only used the router which, in the terms of Dutch legislation, is legal as only breaking into a computer is forbidden. In The Netherlands, a computer is defined as a machine that is used for data storage, processing and transmission. Therefore, a router cannot be considered a computer because it is only used for data transferring or processing and not storing. Hence, hacking a device that is not a computer is legal and cannot be prosecuted in the court of law.. Therefore, actions such as piggybacking on open Wi-Fi networks in places such as bars and hotels, which in some countries is considered illegal and can be fined, cannot, according to the Dutch court decision, be prosecuted in The Netherlands. The Dutch Attorney General has appealed the verdict and the High Court of The Netherlands will review the case within two years to rule on whether a router can be defined as a computer under Dutch law. It is also possible that the law might be updated in the meantime. Dutch Court Rules WiFi Hacking Is Now Legal (19.03.2011) http://www.pcworld.com/article/222589/dutch_court_rules_wifi_hacking_is_now_legal.html Judge: wifi hacking network of neighbors may be done (only in Dutch, 14.03.2011) http://webwereld.nl/nieuws/106024/rechter--wifi-netwerk-van-de-buren-hacken-mag.html ============================================================ 11. Privatised online enforcement series: A. Abandonment of the rule of law ============================================================ This is the first in a series of articles looking at the development of processes for cajoling, obliging or coercing online economic operators to police the Internet. This first article examines the scale of this trend. Most western democracies either actively or passively recognise that they are based on the "rule of law" and protection of fundamental rights is normally provided within this framework. In the EU, for example, the rule of law is affirmed four times in the Treaty on European Union. It is "confirmed" in the preamble of the Treaty and restated in Article 6. The EU also places an obligation on itself to contribute to the objective of consolidating "democracy and the rule of law" in its development policy (Article 177) and common foreign and security policy (Article 11). Furthermore, the European Convention on Fundamental Rights and the Charter of Fundamental Rights place obligations on EU Member States and on the Commission (ratification of the ECHR is pending) that restrictions to freedoms must be based on law. The 2003 Interinstitutional Agreement on better lawmaking which was agreed between the Commission, Parliament and Council further requires in Article 17 that self-regulation must respect criteria of representativeness of the parties involved and "will not be applicable where fundamental rights or important political options are at stake". All of these obligations have not prevented the European Commission from: - Launching a "dialogue" with industry on filesharing, which included proposals from the European Commission on "voluntary" mass filtering of networks by ISPs; - Launching a "dialogue" with industry on "voluntary" deletion of websites accused of containing unlawful material (unless the Internet provider is convinced the site is legal); - Launching a dialogue on punishments to be meted out by online trading platforms against traders accused of counterfeiting; - Launching a funding proposal for "self-regulatory" blocking of websites accused of containing illegal content; - Agreeing on a text promoting online policing of copyright by Internet providers in the Anti-Counterfeiting Trade Agreement; - Launching a dialogue with the US Federal Bureau of Investigations on "voluntary" deletion of websites and removal of IP address from ISPs abroad; - Promoting a reduction in privacy in favour of intellectual property rights in the Commission Communication on enforcement of intellectual property rights; - Agreeing on a global filtering of mobile Internet access with European GSM Operators, in the absence of an identified problem and, in the three years since the agreement was reached, any assessment of its impact; - Agreeing on a text in the EU/Korea Free Trade Agreement which risks removing core aspects of ISP liability safe harbours, increasing the liklihood of ISPs feeling the need to take pre-emptive punitive measures against consumers suspected of illegal activity; - Financially supporting an initiative to block funding to websites accused of illegal activity (the model used by Mastercard to block funding to Wikileaks and by Visa to block funding to websites accused of facilitating copyright infringement). In addition, there are other projects elsewhere in the world and globally, such as the US-led "trans-pacific partnership" and the OECD project on the role of ISPs in achieving public policy objectives. In the next instalment of this series, we will look at some case studies of existing privatised enforcement measures to assess the dangers of these projects. 2003 Interinstitutional Agreement: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2003:321:0001:0005:EN:PDF Treaty on European Union: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2006:321E:0001:0331:EN:PDF European Convention on Human Rights: http://www.hri.org/docs/ECHR50.html Charter of Fundamental Rights: http://www.hri.org/docs/ECHR50.html Dialogue on dissemination of illegal online content: http://www.edri.org/edrigram/number8.15/edri-euroispa-notice-takedown-comission Filesharing project: http://www.euractiv.com/en/infosociety/eu-secret-talks-illegal-downloads-news-501715 ACTA consolidated text: http://www.mofa.go.jp/policy/economy/i_property/acta_consolidated_text_101006.pdf Commission funding proposal: http://ec.europa.eu/home-affairs/funding/isec/call_10132/tc2_call_2010_en.pdf IPR Enforcement Directive Communication: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52010DC0779:EN:NOT Mobile blocking of allegedly illegal content: http://ec.europa.eu/information_society/activities/sip/events/forum/forum_june_2006/index_en.htm OECD project on ISPs and public policy objectives: http://www.oecd.org/dataoecd/8/59/45997042.pdf Charter of fundamental rights: http://www.europarl.europa.eu/charter/pdf/text_en.pdf EDRi study on "self-regulation": http://www.edri.org/files/EDRI_selfreg_final_20110124.pdf Trans-pacific partnership: http://arstechnica.com/tech-policy/news/2011/03/son-of-acta-meet-the-next-secret-copyright-treaty.ars OECD project: http://www.oecd.org/dataoecd/8/59/45997042.pdf Blocking of payments: http://europa.eu/rapid/pressReleasesAction.do?reference=IP/09/342 EU/Korea Free Trade Agreement: http://trade.ec.europa.eu/doclib/press/index.cfm?id=443 (Contributon by Joe McNamee - EDRi) ============================================================ 12. Recommended Reading ============================================================ Media Piracy in Emerging Economies is the first independent, large-scale study of music, film and software piracy in emerging economies, with a focus on Brazil, India, Russia, South Africa, Mexico and Bolivia. http://piracy.ssrc.org/about-the-report/ German statistics prove telecommunications data retention superfluous (21.03.2011) http://www.vorratsdatenspeicherung.de/content/view/435/79/lang,en/ ============================================================ 13. Agenda ============================================================ 27-29 March 2011, Ghent, Belgium Online content: policy and regulation for a global market http://www.eurocpr.org/ 28 March 2011, Paris, France 5th European eAccessbility Forum: Benefits and costs of e-accessibility http://inova.snv.jussieu.fr/evenements/colloques/colloques/70_index_en.html 1 April 2011, Bielefeld, Germany Big Brother Awards Germany http://www.bigbrotherawards.de/index_html-en 7-8 April 2011, Amsterdam, Netherlands European Legal Network Conference "Free Software law for the next ten years" http://fsfe.org/projects/ftf/legal-conference.en.html 15-17 April 2011, Berlin, Germany Re:publica XI: Conference about blogs, social media and the digital society http://re-publica.de/11/en/ 5-6 May 2011, Milano, Italy The European Thematic Network on Legal Aspects of Public Sector Information - public conference http://www.lapsi-project.eu/milan 17-18 May 2011, Berlin Germany European Data Protection Reform & International Data Protection Compliance http://www.edpd-conference.com 30-31 May 2011, Belgrade, Serbia Pan-European dialogue on Internet governance (EuroDIG) http://www.eurodig.org/ 2-3 June 2011, Krakow, Poland 4th International Conference on Multimedia, Communication, Services and Security organized by AGH in the scope of and under the auspices of INDECT project http://mcss2011.indect-project.eu/ 12-15 June 2011, Bled, Slovenia 24th Bled eConference, eFuture: Creating Solutions for the Individual, Organisations and Society http://www.bledconference.org/index.php/eConference/2011 14-16 June 2011, Washington DC, USA CFP 2011 - Computers, Freedom & Privacy "The Future is Now" http://www.cfp.org/2011/wiki/index.php/Main_Page 11-12 July 2011, Barcelona, Spain 7th International Conference on Internet, Law & Politics (IDP 2011): Net Neutrality and other challenges for the future of the Internet http://edcp.uoc.edu/symposia/lang/en/idp2011/?lang=en ============================================================ 14. About ============================================================ EDRi-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRi has 29 members based or with offices in 18 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRi-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and are visible on the EDRi website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edri/2.html - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From coderman at gmail.com Thu Mar 24 00:13:05 2011 From: coderman at gmail.com (coderman) Date: Thu, 24 Mar 2011 00:13:05 -0700 Subject: Phoenix UAV can sense you breathing In-Reply-To: References: <20110323125635.GE23560@leitl.org> Message-ID: 2011/3/23 lodewijk andri de la porte : > Does my breathing produce rf signals? your body interacts with them: "... a fine beam ultra-wideband (UWB), multi-Gigahertz radio frequency (RF) sensor array ... mounted on the robots lightweight arm transmits highly directional wideband signals that are able to penetrate reinforced concrete walls at an extended range. Reflections from the targets are captured by a signal detector circuit in the receiver and amplitude and delay information is then processed in an integrated signal processor to track the targets in real time." From jennapq at qantasvacations.com Wed Mar 23 16:07:54 2011 From: jennapq at qantasvacations.com (Nedra Jenna) Date: Thu, 24 Mar 2011 02:07:54 +0300 Subject: Buy Replica Watches, Fake Watch for Sale. Message-ID: <4d8a7d4a.af007e00@qantasvacations.com> Replica rolex watches, rolex replica watches, Fake rolex watch ... Buy Replica Watches, Fake Watch for Sale. Selling great quality replica for all kinds of branded replica such as Title replica watches http://finewatchesdiscount.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 613 bytes Desc: not available URL: From halliere at baerenreiter.com Wed Mar 23 23:51:26 2011 From: halliere at baerenreiter.com (Rocio Hallie) Date: Thu, 24 Mar 2011 06:51:26 +0000 Subject: Replica watches come to the aid of those people who are smart enough to know both ... Message-ID: <93f60k79e73-42856872-134a6o32@fntgmrgomp> Replica Rolex : Rolex Replica : Best Swiss Rolex Replicas ... Swiss Made Replica; A.Lange; Audemars Piguet; Breitling; Bvlgari; Cartier ... Replica watches come to the aid of those people who are smart enough to know both ... http://replicastorenavigator.ru From orcka at softforall.ru Thu Mar 24 00:46:05 2011 From: orcka at softforall.ru (Wallace Newton) Date: Thu, 24 Mar 2011 13:46:05 +0600 Subject: =?koi8-r?B?68/OxMnDyc/OxdLZLCDXxc7UyczRw8nRLg==?= Message-ID: <000d01cbe9f7$8799f940$6400a8c0@orcka> Кондиционирование и Вентиляция. Мы поможем создать Вам климат. Кондиционер + установка от 21500р. Проектирование, Поставка, Монтаж, Гарантия, Сервисное обслуживание. Звоните, мы Вам ответим. 8 (926) 800 √ 94 √ 98 Сергей. 8 (915) 108 √ 99 √ 79 Роман. From AlbaRodrguez at exalumnos.com Thu Mar 24 13:29:19 2011 From: AlbaRodrguez at exalumnos.com (Modern sexuality) Date: Thu, 24 Mar 2011 17:29:19 -0300 Subject: I have tried IT it is more pleasant Message-ID: <475037662.CDOUSRCJ5755OUQI7314229@insolvable.kinki-kids.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 491 bytes Desc: not available URL: From buh at vlad.aptrade.ru Thu Mar 24 07:48:10 2011 From: buh at vlad.aptrade.ru (=?koi8-r?B?4tXIx8HM1MXSydE=?=) Date: Thu, 24 Mar 2011 20:18:10 +0530 Subject: =?koi8-r?B?78TOz8TOxdfLyS4g5MzRIN7Fx88gydPQz8zY2tXA1NPR?= Message-ID: <000d01cbea32$7ed27fe0$6400a8c0@buh> 28 марта 2011г. +7 Московский код: ЧЧ-5З9*68 \\\/// 742_9I98 Налоговое планирование в условиях кризиса: как жить без обналички и фирм-однодневок и не разориться Цель: помочь компаниям, применяющим "серые" и "черные" схемы оптимизации налогов, уйти от них, и при этом не разориться, не уступить конкурентам, не уйти с рынка. Найти законные альтернативы таким схемам, платить налоги, но не переплачивать √ вот основная идея налогового планирования без "помоек" и "черного нала". 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности┘); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. --"Серые" (полулегальные) альтернативы: как нельзя "оптимизировать"! Фирмы-"прокладки", контактирующие с недобросовестными налогоплательщиками ("белая" - "серая" - "черная" фирмы). Краткий обзор других "серых" альтернатив. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. 5.Как можно и как нельзя оптимизировать налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменения. Обзор изменений налогового законодательства в 2011 г., как они повлияли на налоговые схемы. Ответы на вопросы. По желанию и возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Стоимость участия в семинаре 7 900 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: (495) Ч4_539_68 : 4/Ч.5*3-2*_6/6 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5651 bytes Desc: not available URL: From buhg at acda.ru Thu Mar 24 10:33:30 2011 From: buhg at acda.ru (=?koi8-r?B?8sHT3sXUIM7BzM/Hz9fPyiDOwcfS1drLyQ==?=) Date: Fri, 25 Mar 2011 02:33:30 +0900 Subject: =?koi8-r?B?79POz9fOwdEg1MXNwSDLwcsgz8LPytTJ09ggwsXaIM/CzsHMyd7LyT8=?= Message-ID: <000d01cbea49$975c6c80$6400a8c0@buhg> 28 марта +7 (код Москвы) ЧЧ5/З9_68 \\\/// ЧЧ-5_ЧО__95 Налоговое планирование в условиях кризиса. Законная альтернатива обналички и фирмам - однодневкам. Цель: помочь компаниям, применяющим "серые" и "черные" схемы оптимизации налогов, уйти от них, и при этом не разориться, не уступить конкурентам, не уйти с рынка. Найти законные альтернативы таким схемам, платить налоги, но не переплачивать √ вот основная идея налогового планирования без "помоек" и "черного нала". 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности┘); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. --"Серые" (полулегальные) альтернативы: как нельзя "оптимизировать"! Фирмы-"прокладки", контактирующие с недобросовестными налогоплательщиками ("белая" - "серая" - "черная" фирмы). Краткий обзор других "серых" альтернатив. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. 5.Как можно и как нельзя оптимизировать налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменения. Обзор изменений налогового законодательства в 2011 г., как они повлияли на налоговые схемы. Ответы на вопросы. По желанию и возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Стоимость участия в семинаре 7 900 рублей Вся информация по тел: 8 (Ч95) Ч45З9*68 \\\/// 4Ч5Ч095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5779 bytes Desc: not available URL: From buh at wmod.ru Fri Mar 25 06:50:30 2011 From: buh at wmod.ru (=?koi8-r?B?7cnOyc3J2sHDydEgzsHMz8fP1w==?=) Date: Fri, 25 Mar 2011 10:50:30 -0300 Subject: =?koi8-r?B?+sHU0sHUztnFINPIxc3ZIMTM0SDP0NTJzcnawcPJySDu5PMgySDOwczP?= =?koi8-r?B?x8EgzsEg0NLJwtnM2A==?= Message-ID: <000d01cbeaf3$9ade3f00$6400a8c0@buh> тридцатое марта Тема: Налоговое планирование. Затратные механизмы для оптимизации НДС и налога на прибыль (код Москвы) 4.Ч5.Ч.О-95 \\\/// Ч45-32_66 Цель: Курс посвящен изучению затратых механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Участники получат краткие индивидуальные консультации по тематике данного курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные","серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов √ ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. 4. Виды приемлимых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 5. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 6. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 7. Ответы на вопросы. По желанию и при наличии возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (код Москвы) 7.9-2*2/i.2-2 **** Ч45_3968 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6731 bytes Desc: not available URL: From teddks at gmail.com Fri Mar 25 08:26:24 2011 From: teddks at gmail.com (Ted Smith) Date: Fri, 25 Mar 2011 11:26:24 -0400 Subject: [tor-talk] Iran cracks down on web dissident technology In-Reply-To: References: Message-ID: <1301066784.26906.8.camel@anglachel> On Tue, 2011-03-22 at 17:43 -0400, John Young wrote: > Fucking amazing admission. No conspiracy theory needed. Wasn't this already very common knowledge? [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From Marta4971 at park.6616.net Fri Mar 25 13:39:36 2011 From: Marta4971 at park.6616.net (The most fashionable things, Summer 2011) Date: Fri, 25 Mar 2011 15:39:36 -0500 Subject: Smart Swiss watch and souvenirs Message-ID: <188312702.TVARJSJP4484DEMZ6936222@bourgeois.britneyclub.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 561 bytes Desc: not available URL: From jya at pipeline.com Fri Mar 25 14:34:31 2011 From: jya at pipeline.com (John Young) Date: Fri, 25 Mar 2011 17:34:31 -0400 Subject: [tor-talk] Iran cracks down on web dissident technology In-Reply-To: <1301066784.26906.8.camel@anglachel> References: Message-ID: That's what the Eff-folks advocating TOR are saying. And point to a file on Torproject.org. See: http://cryptome.org/0003/tor-spy.htm However, this appears to be a giant evasion perhaps asubterfuge, even reminds of what Big Boys say when customers learn they are siphoning customer data. Read the privacy policy the lawyer-advised apologists bark, and upon reading the privacy policy see that it only emphasizes the subterfuge. Openly admitting siphoning is supposed to make it okay because everyone does it under cover of lockstep privacy policy. Fuck that. If the Tor operators really know what they are being used for, then they should admit to being agents of the USG, as Michael Reed had the guts to do. Claiming this US spying role for Tor is well known is a crock of shit, but then spies lie all the time and care not a whit that they peddle shit for eaters of it. If you believe them and like what they do then don't shilly-shally, just do what Michael Reed did but others are too ashamed to do after having been duped since 1996. If Reed's precedent for honesty is followed, there will be an admission that the Internet was invented for spying by its inventor. And then cryptography and other comsec tools. And then cellphones and the like. Hold on now, this is getting out of hand, the apologists will bellow, everybody has always known that there is no privacy in digital world. Actually, no, they did not. And those who knew keep their fucking mouths shut to reap the rewards of deception. Now that is a truth everyone knows. No conspiracy theory needed. From keisha.adelineop at gazellesports.com Fri Mar 25 09:46:29 2011 From: keisha.adelineop at gazellesports.com (Keisha Adeline) Date: Fri, 25 Mar 2011 19:46:29 +0300 Subject: Buy Replica Watches, Fake Watch And Famous Handbags for Sale. Message-ID: <76y39x60s96-84365904-063q2d22@fmsrbhlc> Replica Swiss Watches Buy Replica Watches,Fake Watch And Famous Handbags for Sale.selling great quality replica for all kinds of branded replica such as louis vuitton replica handbags ... http://finewatchespenny.ru From buh at 6-9.ru Fri Mar 25 14:53:51 2011 From: buh at 6-9.ru (=?koi8-r?B?79DUyc3J2sHDydEgzsHMz8fP1w==?=) Date: Sat, 26 Mar 2011 01:23:51 +0330 Subject: =?koi8-r?B?68HLINPOydrJ1Ngg0sHTyM/E2SDJINXXxczJ3snU2CDQ0snC2czYINcg?= =?koi8-r?B?yM/MxMnOx8HIPyA=?= Message-ID: <000d01cbeb2e$bf2a8950$6400a8c0@buh> ОI aпреля 2011г. Создание виртуального холдинга для оптимизации налогообложения. (Ч95) 7_42/9i_98 <<>> 4453266 Цель: На занятиях будут рассмотрены организационно-правовые, экономико-правовые аспекты создания и деятельности холдингов; вопросы управления холдингом, взаимодействие с дочерними и зависимыми компаниями. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные", "серые" и "белые" схемы. "Метод холдинга" в налоговом планировании. Понятие виртуального холдинга как средства налогового планирования. Рациональное построение финансовых потоков и договорных отношений в холдинге через разделение оборотов, капитала (прибыли), активов, персонала, отношений с контрагентами и рисков. Элементы холдинга √ Операционные компании, Управляющая или финансирующая компания (Казначейство), Хранитель активов, Торговый дом (Снабжающая или закупочная организация), Центры обслуживания (Кадровые центры), риск-структуры и их роли в налоговом планировании. 2. Методы планирования налога на прибыль и НДС в холдингах Низконалоговые субъекты (ННС): * субъекты специальных налоговых режимов √ ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5-7%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, * "Недобросовестные налогоплательщики" и контактирующие с ними риск-структуры: как нельзя "оптимизировать". Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. Способы переноса налогооблагаемой базы по налогу на прибыль на низконалоговых субъектов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере, * механизм трансфертных цен. Условия их применения: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование трансфертных цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. Безналоговые способы передачи денежных средств в холдинге. Займы и аналогичные им договоры как способ возвратного рефинансирования √ преимущества и недостатки, риск ведения незаконной банковской деятельности. Рефинансирование и капитализация прибыли предприятия (холдинга) через уставной капитал, безвозмездную передачу имущества или добавочный капитал. Ст. 27 Закона "Об ООО". Другие способы безвозвратного рефинансирования. Простое товарищество субъектов упрощенной системы налогообложения, в т.ч. из "низконалоговых" регионов. Нужно или нет платить НДС? Перенос прибыли товарищества на низконалоговых субъектов (УСН 6%, ЕНВД, офшор и др.). Отсрочка уплаты налога при непередаче прибыли на счета товарищей. Возможен ли обход с помощью простого товарищества правил налогового учета (гл. 25 НК) и ограничений гл. 26.2 НК РФ в части перечня затрат? Экономия НДС в производстве, выполнении работ, оказании услуг через разделение финансовых потоков "с НДС" и "без НДС". Ограничение использования: покупатели/заказчики, не нуждающиеся в вычете НДС, как их выявить или создать искусственно. 3. Создание рациональной финансовой и организационной холдинговой структуры, схемы товарно-финансовых потоков и договорных отношений холдинга. Оперативное распределение налоговой нагрузки между участниками холдинга. Реальный пример комплексного налогового планирования в холдингах. 4. Принципы налогового планирования использования основных средств. Формирование холдинговой структуры для целей минимизации налогообложения имущества. "Хранитель активов" (лицо √ собственник имущественного комплекса). Низконалоговые и безналоговые способы передачи имущества "Хранителю активов". 5. Принципы налогового планирования (оптимизации) выплаты заработной платы в холдинге Дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчеты эффективности. Краткий обзор других (компенсационных, процентных и прочих) схем выплаты низконалогового дохода. 6. Встраивание иностранных (в т.ч. низконалоговых) компаний в структуру российских холдингов. Защита владения и скрытие собственника, уход от аффилированности, использование для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги, и т.п.) и нетрадиционные схемы (простое товарищество, агентские). Выбор юрисдикций. 7. Обзор изменений налогового законодательства в 2011 г., как они повлияли на налоговые схемы. Ответы на вопросы. Стоимость участия:═7═900 рублей Вся информация по тел: +7 Московский код: 792_2l_2/2 \\\/// 4/Ч*5/З*2*/6-6 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8144 bytes Desc: not available URL: From elviajesicavn at tasmail.com.jfet.org Sat Mar 26 10:58:56 2011 From: elviajesicavn at tasmail.com.jfet.org (Elvia Jesica) Date: Sat, 26 Mar 2011 16:58:56 -0100 Subject: Rolex Replica Watches. High Quality Luxorious Watches. Fake Rolex. Message-ID: <50w97u15v63-30321998-338q1o18@ckaqguxeo> Rolex Replica Watches. High Quality Luxorious Watches. Fake Rolex. Rolex replica watches of superb quality at replica store. Perfect look, Top quality Japanese movements, accessible prices. http://finewatchesfix.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 569 bytes Desc: not available URL: From pgut001 at cs.auckland.ac.nz Fri Mar 25 21:34:22 2011 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Sat, 26 Mar 2011 17:34:22 +1300 Subject: Iranian state-sponsored cyberwarfare is indistinguishable from script kiddies Message-ID: Pretty much every news report I've seen so far that mentions any kind of Iranian connection is claiming that it's Iranian state-sponsored hacking. If what's happened with the certs so far (someone grabbed a few sample certs for high-profile domains, and there was a report of one of them briefly appearing on a test server in Iran) is an indication of their competence then we really have nothing to fear from them. Let's look at what would have happened if *I'd* figured out a way to compromise a CA. First, I'd get a few test certs issued for high-profile domains, Microsoft, Google, Yahoo, and perhaps a CA cert just for giggles. Then I'd set up a server somewhere and install one of the sample certs to see whether any web browser noticed a problem. Gosh, this sounds awfully like what actually happened. New Zealand must have a state-sponsored cyberwar program! The only difference in my case is that after a day or so of inviting security people to have a giggle at the test server with my "genuine" cert, I'd notify the CA about the problem. If I was an Iranian script kiddie I probably wouldn't have much motivation to do that. So what we have here is either (a) the world's most incompetent state- sponsored cyberwar program, who get the keys to the kingdom and then have no idea what to do with them, or (b) a bunch of script kiddies having fun. What do you reckon the odds are? (And in all this I haven't seen any mention of the Al Kai-yee-da angle. What happened, is everyone asleep?). Peter. From TeresaLpez at yebox.com Sat Mar 26 16:47:38 2011 From: TeresaLpez at yebox.com (Proff.Antonio Garca) Date: Sat, 26 Mar 2011 20:47:38 -0300 Subject: I do IT so... Message-ID: <762190331.SKNPNFQA0160NBCY0616924@coffer.expedia.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 564 bytes Desc: not available URL: From coderman at gmail.com Sat Mar 26 23:11:35 2011 From: coderman at gmail.com (coderman) Date: Sat, 26 Mar 2011 23:11:35 -0700 Subject: Iranian state-sponsored cyberwarfare is indistinguishable from script kiddies In-Reply-To: References: Message-ID: On Fri, Mar 25, 2011 at 9:34 PM, Peter Gutmann wrote: > Pretty much every news report I've seen so far that mentions any kind of > Iranian connection is claiming that it's Iranian state-sponsored hacking. pretty amusing, to be sure. (years ago i quit being frustrated by lazy, inaccurate, attention porn news programming and decided to be amused instead. i am often amused! there are worse things...) > If ... [this] ... is an indication of their competence then we really > have nothing to fear from them. nothing in the "cyber domain", certainly. they're quite adept at old skewl though... > So what we have here is either (a) the world's most incompetent state- > sponsored cyberwar program, who get the keys to the kingdom and then have no > idea what to do with them, or (b) a bunch of script kiddies having fun. > What do you reckon the odds are? considering the poorly deployed, poorly managed, poorly maintained iranian networking and computing systems in question, Occam says someone having fun through iranian pwn hops... (not to mention, who better to place blame upon? what a great diversion! :) From Humberto.Herndon at zippo87.net Sat Mar 26 16:14:26 2011 From: Humberto.Herndon at zippo87.net (Wilma Witt) Date: Sun, 27 Mar 2011 00:14:26 +0100 Subject: Branded watches at clearance prices Message-ID: <823785245317$7516999211602562683470@synalia.fr> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 545 bytes Desc: not available URL: From l.kconchazg at tinet.ie Sat Mar 26 10:37:32 2011 From: l.kconchazg at tinet.ie (Leanna Concha) Date: Sun, 27 Mar 2011 01:37:32 +0800 Subject: Learn how to get a bigger penis, be a better lover, and be a better man! Message-ID: <23q28a17m67-41998636-213z9h77@xglweoia> Penis Enlargement - Get A Bigger Penis Naturally. Learn how to get a bigger penis, be a better lover, and be a better man! Gain up to 4 inches penis size, naturally,starting today. http://longerpeniswow.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 321 bytes Desc: not available URL: From cilenect at abunayyangroup.com Sun Mar 27 02:53:43 2011 From: cilenect at abunayyangroup.com (Carroll Ilene) Date: Sun, 27 Mar 2011 05:53:43 -0400 Subject: Buy Generic CIALIS 20mg (Tadalafil) From Our U.S Pharmacy - No Prescription Required - Overnight U.S To U.S Delivery - Message-ID: <4d8f0927.39cb6db0@abunayyangroup.com> CIALIS 20mg x 120 Pills Only $154 - No Rx Required - Overnight U.S To U.S Buy Generic CIALIS 20mg (Tadalafil) From Our U.S Pharmacy - No Prescription Required - Overnight U.S To U.S Delivery - Secured Checkout - Visa, MC or American Express Accepted. http://healthbuytech.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 367 bytes Desc: not available URL: From vmdgzmykhiul at 001free.com Sun Mar 27 11:08:12 2011 From: vmdgzmykhiul at 001free.com (Attractive sexuality) Date: Sun, 27 Mar 2011 11:08:12 -0700 Subject: Mysterious length Message-ID: <049562.265KNRDSNHX6924XOPP0537126@hazy.18pt.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 525 bytes Desc: not available URL: From buh at artandphoto.ru Sun Mar 27 11:37:37 2011 From: buh at artandphoto.ru (=?koi8-r?B?4c7OwQ==?=) Date: Sun, 27 Mar 2011 19:37:37 +0100 Subject: =?koi8-r?B?4cTSxdPOwdEg0sHT09nMy8E=?= Message-ID: Предлагаем качественную доставку рекламы Базы адресов постоянно обновляются Очень гибкая система скидок постоянным клиентам до 50% При заказе 2х рассылок, 3я бесплатная; Подготовка макета бесплатно; Быстрый выход рассылки, по желанию день в день; Самый массовый охват целевой аудитории Пробив фильтров. Любые формы оплаты; Каждая рассылка перед отправкой тестируется; Москва от 2 тыс руб. Россия от 3000 руб. Страны СНГ от 2,5 тыс руб. Наши цены самые альтернативные, закажите у Нас и Вы будете удивлены качеством обслуживания. Формируем базы под каждое направление, продукт реализации. Фокусировка себя полностью оправдывает. тел: #8#964#7O2#З6#85 From eugen at leitl.org Sun Mar 27 10:50:21 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 27 Mar 2011 19:50:21 +0200 Subject: Anthrax Redux: Did the Feds Nab the Wrong Guy? Message-ID: <20110327175021.GN23560@leitl.org> http://www.wired.com/magazine/2011/03/ff_anthrax_fbi/all/1 Anthrax Redux: Did the Feds Nab the Wrong Guy? By Noah Shachtman March 24, 2011 | 4:40 pm | Wired April 2011 Illustration: GoC1i Montes Finally, the investigation was over. The riddle solved. On August 18, 2008bafter almost seven years, nearly 10,000 interviews, and millions of dollars spent developing a whole new form of microbial forensicsbsome of the FBIbs top brass filed into a dimly lit, flag-lined room in the bureaubs Washington, DC, headquarters. They were there to lay out the evidence proving who was responsible for the anthrax attacks that had terrified the nation in the fall of 2001. It had been the most expensive, and arguably the toughest, case in FBI history, the assembled reporters were told. But the facts showed that Army biodefense researcher Bruce Ivins was the person responsible for killing five people and sickening 17 others in those frightening weeks after 9/11. It was Ivins, they were now certain, who had mailed the anthrax-filled letters that exposed as many as 30,000 people to the lethal spores. The FBI unraveled the mystery, officials said, thanks in part to the microbiologists seated at a U-shaped table in the front of the room. Among them was Paul Keim, who first identified the anthrax strain used in the attacks, and genetic specialist Claire Fraser-Liggett, who led the team that sequenced the DNA of the anthrax in the letters, tracing the spores back to their genetic match: a flask of superconcentrated, ultrapure anthrax held by Ivins. Several of the researchers at the table had previously counted Ivins as a peer and even a friend. Now they were helping brand him a monster. Between the officials and the scientists, it was a convincing display. It had to be. Ivins had killed himself three weeks earlier. There would be no arrest, no trial, no sentencing. Absent a courtroom and a verdict to provide a sense of finality or some measure of catharsis, all the FBI could do was present its findings and declare the case closed. No one involved that day expressed any doubt about Ivinsb guilt. But things are not always as clear-cut as they may seem in an FBI presentation. Two years later, sitting in her office overlooking West Baltimore, Fraser-Liggett concedes she has reservations. bThere are still some holes,b she says, staring out her window in discomfort. Nearly 2,000 miles away in Flagstaff, Arizona, Keim has his own concerns. bI donbt know if Ivins sent the letters,b he says with a hint of both irritation and sadness. Even agent Edward Montooth, who ran the FBIbs hunt for the anthrax killer, says thatbwhile hebs still convinced Ivins was the mailerbhebs unsure of many things, from Ivinsb motivation to when he brewed up the lethal spores. bWe still have a difficult time nailing down the time frame,b he says. bWe donbt know when he made or dried the spores.b In other words, itbs been 10 years since the deadliest biological terror attack in US history launched a manhunt that ruined one scientistbs reputation and saw a second driven to suicide, yet nagging problems remain. Problems that add up to an unsettling reality: Despite the FBIbs assurances, itbs not at all certain that the government could have ever convicted Ivins of a crime. It took weeks for anyone to realize the attacks were even happening. When Robert Stevens, a photo editor at the Sun tabloid, came down with chills while on vacation in North Carolina on September 29, 2001, neither he nor his wife figured it was a big deal. She went to spend the afternoon with their daughter; he rested on the couch. As Stevens lay there, thousands of spores were filling his lungs. Nestled in the respiratory sacs, the particles slowly came in contact with white blood cells called macrophages, which carried the bacteria into the lymph nodes in the central cavity of his chest. There, the spores began to germinate, shedding their tough outer layer and multiplying relentlessly. The bacteria unleashed two types of toxins into Stevensb bloodstream. One caused a fluid buildup in his central chest cavity, which squeezed his heart and shoved his lungs against his ribs, making it difficult to breathe. The other began killing off Stevensb macrophages, decimating his bodybs natural defenses. Two days later, Stevens was feverish, short of breath, and red in the face. He and his wife started driving back to their home in Florida, with Stevens sweating in his seat. When they got there, Stevensb wife took him, nearly incoherent now, to the hospital. On October 4, he tested positive for anthrax. He died the next day. Both medical and public officials figured it was a freak but natural occurrence, maybe something Stevens picked up on a hike in the Carolina woods. Because anthrax was known as a potential biological warfare agent, the case grabbed national attention, but there seemed no reason to panic. bIt looks like itbs a very isolated incident,b President George W. Bush told the country on October 9. Three days later, an anthrax-loaded letter was found at NBC News headquarters. A week after that, the FBI recovered an identical-looking spore-laden letter from the offices of the New York Post. b09-11-01,b the letters read. bthis is next / take penacilin now / death to america / death to israel / allah is great.b By mid-October, four more people had been diagnosed with anthrax, and Leroy Richmond, a postal worker at the Brentwood Road mail facility in Washington, DC, was doing his best to convince his coworkers to relax. Mail handlers had little to fear as long as they took precautions, according to talking points distributed by the government, which Richmond read aloud to several fellow mail room employees. Bacillus anthracis will appear as a white powder that you should keep away from your face. So be careful, but keep doing your jobs, Richmond told his coworkers as he wiped away a sniffle. Everything is going to be just fine. A few days later, Richmond barely had the lung capacity to walk across the floor of the mail room, which routes correspondence to the US Senate and dozens of federal agencies. His shoulders and chest ached like they had been hit with a bat. bOh my God,b he thought. bThis might be the last breath that I can take.b On October 20, doctors at Inova Fairfax Hospital confirmed that he had been infected with anthrax. Richmond survived. His coworkers Thomas Morris and Joseph Curseen did not. The mailer was probably a spore-happy Unabomber typeba highly trained, educated loner, likely in the US biodefense community. The letter that likely infected them was discovered in the offices of Tom Daschle, the Senate majority leader. The envelope had a Trenton, New Jersey, postmark and a return address that read in handwritten block letters, b4th grade greendale school.b An FBI team wearing protective suits placed the letter and envelope in ziplock bags. They then drove the package 50 miles northwest, to Fort Detrick, home of the militarybs leading biodefense facility, the United States Army Medical Research Institute of Infectious Diseasesbthe famed USAMRIID. John Ezzell, the bearded, Harley-driving head of the institutebs Special Pathogens Sample Testing Lab, was waiting to meet the agents. He spent a day studying the package, then sent it to the lab of Bruce Ivins, one of the institutebs most experienced anthrax researchers. As his fellow microbiologists watched from the hallway, Ivins shoved his double-gloved hands inside a biosafety cabinet containing the sample. He opened the bag and held it up with one hand. When he moved his free hand closer to it, the granules in the bag began moving toward his glove, drawn by a slight electrostatic charge. The microbiologists gasped; they were used to working with wet spores, which fell to the ground easily. But this anthrax was dry and ionizedbit would stay aloft and spread like a gas. It was potentially lethal to anyone in the vicinity. bItbs unbelievable,b a colleague remembers Ivins saying. bIbve never seen anything like that.b Bruce Ivins Illustration: GoC1i Montes Ivins measured the concentration of the sample. It came out to a trillion spores per grambthree orders of magnitude more dense than anything the USAMRIID researchers had ever grown. bThese are not bgarageb spores,b Ivins later wrote in an analysis. bProfessional manufacturing techniques were used.b If anyone at USAMRIID knew about spore-growing, it was Ivins. After two decades at the institute, he had mastered the delicate balance of chemistry, heat, and time required to get anthracis to multiply in just the right way. Ivins not only supplied spores to his fellow scientists at USAMRIID; many of the anthrax researchers on the planet relied, in one way or another, on his concoctions. In addition to his anthrax expertise, Ivins was known as one of the odder characters in an institute full of odd characters. Hebd show up to work in plaid bell-bottoms and flowered shirts that ran a few sizes too small for his soda-straw frame. He was a juggler, a unicyclist, and a weather junkie. At institute Christmas parties, Ivins was the one reciting the corny limericks. At the base gym, he was the one working out in dark socks and heavy boots. Ivins grew up in the small town of Lebanon, Ohio, the skinny, science-nerd son of the local drugstore pharmacist. He went to school at the University of Cincinnati, where he met his wife, Diane, and earned a bachelorbs degree, a masterbs, and a PhDball in microbiology. After Ivinsb postdoctoral work at the University of North Carolina, the couple moved to Maryland, where Ivins started working at USAMRIID in 1981. Two years earlier, an anthrax outbreak at a secret military microbiology plant in Siberia had killed at least 66 people, proving that the Soviets had been refining anthrax into a biological weapon. Ivins was assigned to start working on a new, more effective vaccine. Ivins was a fixture in the institutebs active social and intramural sports scenes. Diane largely stayed away, even though they lived just up the street from the base with their adopted kids, Andy and Amanda. (The Ivins family did not respond to repeated interview requests.) So it was Ivins alone who frequented the institutebs volleyball gamesbnot to play but to cheer and razz the refs. Then hebd go to the postgame drinking sessions, held at Fort Detrickbs old officersb club, and nurse a single glass of wine while everyone else got sloshed. Ivins liked to keep candy on his desk and would talk and talk and talk to anyone bold enough to grab a piece. When he got flusteredbwhich was oftenbhebd stammer and flap his arms in hopes of making his point. If you found a lame joke or a picture of kittens in your inbox, you knew who to blame. He led what his friends called a bhippie Massb at St. John the Evangelist Catholic Church in nearby Frederick, playing keyboards and acoustic guitar. He was a local Red Cross volunteer. Colleagues found him both smart and generous. bHe had experience and was willing to share,b remembers Hank Heine, Ivinsb friend and colleague in the tight-knit bacteriology division. bThe first day I arrived, he said, bIf therebs any help you need, come see me.bb Not surprisingly, then, when the FBI set up a small team after the initial attacks to help with the science of anthrax, they found Ivins eager to assist. Maybe too eager. While other USAMRIID scientists swore that no one there could have pulled off the attacks, Ivins suggested several current and former colleagues as potential perpetrators. bRarely would a guy point the finger at his coworkers,b says Thomas Dellafera, the US Postal Inspection Service agent who helped lead the anthrax investigation. bBut he did. This guy was rolling on his own mother.b Ivins regularly emailed friends and acquaintances about the burgeoning investigationbincluding a former UNC grad student he had known named Nancy L. Haigwood. One picture Ivins sent Haigwood, now also a microbiologist, was particularly unsettling: It showed Ivins holding petri dishes filled with anthracisbwithout wearing gloves. Haigwood was already thoroughly unnerved by Ivins: He had shown an excessive fascination with both her and the rules and rituals of the Kappa Kappa Gamma sorority she advised back in school, and he had foisted all manner of unwanted attention on her ever since. For example, she had long suspected that Ivins was the one who, years after graduation, spray-painted a fence at her boyfriendbs house with a red kkg in Greek lettering. When the American Society for Microbiology later emailed a plea to its members asking for help on the case, Haigwood thought of Ivins. bAt that exact moment, that awful moment, I knew it was him,b she says. She reported her feelings to the FBI. The bureau sent out two agents but didnbt seem all that interested in Haigwoodbs intuition at the time. The Scientists Investigating the 2001 anthrax attacks required an unprecedented scientific effortbone that was mostly conducted by US anthrax researchers. A few of the key players: Hank Heine One of Ivinsb closest friends in USAMRIIDbs bacteriology division Paul Keim Identified the attack anthrax as a strain used in many US labs. Pat Worsham Identified the four mutants produced by the attack anthrax. Claire Fraser-Liggett Led the genetics team charged with bfingerprintingb the anthrax. Illustration: GoC1i Montes Sitting on the hood of his Toyota SUV on the edge of the tarmac at Flagstaff Pulliam Airport, Paul Keim watched the Arizona sky change colors as the sun went down. A microbiologist at Northern Arizona University, Keim supervised one of the largest collections of anthrax on the planet, more than 1,000 samples in all. That afternoon, he had received a call from the FBI directing him to the tarmac to receive one more specimen: anthrax-infected spinal fluid extracted from the first victim, photo editor Robert Stevens. At about 7 pm, a Gulfstream corporate jet landed, coming to a stop near where Keim was parked. While the jetbs engines died down, a blond woman stepped out, strode across the runway, and handed Keim a box. He took the box and drove straight to his lab. Keim was well-known among anthrax researchers for having developed a DNA test that could tell one form of Bacillus anthracis from another. By looking at certain sections of the anthrax genome, Keim could find telltale patterns of repeating nucleotides that would indicate a given strain. Ten hours after the tarmac handoff, Keim had finished his analysis of the anthrax that killed Stevens. The signatures indicated a particularly lethal stock known as Ames. The strain was mainly used in biolabs around the US to test vaccines and therapeutic treatments. The attack anthrax, in other words, was very likely US-grown. When tested, samples from the subsequent attacks also proved to be Ames. It was the investigatorsb first big break. Actually, it was their only break; from every other angle, the case looked nearly impossible to solve. Unlike in a traditional murder case, the victims had little in common. The letters themselves were cleanbno fingerprints or human DNA. The exact location of the letter drops was unknown. It was enough to drive postal inspector Dellafera mad. Because the attacks used the mail system, Dellafera, who led a seven-person mail theft unit before the attacks, was placed on the case leadership team. Now the Connecticut native was interviewing hundreds of postal workers to see if they had noticed any suspicious envelopes. Nobody had. Soon it became clear that this wasnbt just a whodunit. It was a wheredunit, whydunit, and howdunit, too. Classifying the killer anthrax as belonging to the Ames strain gave the investigation something to go on, but it was helpful only to a point. Tracing the attack anthrax to its source would require far more precision. More than a dozen labsband thousands of researchersbworked with Ames anthrax. And distinguishing one Ames isolate, or sample, from another was tough; they were all nearly identical genetically. Every Ames isolate in circulation originates from a single heifer that died in Sarita, Texas, in 1981. If spores were the equivalent of bullets, Keim knew the caliber of the murder weapon. But the bullets could have been fired from any of a thousand different guns. To have any hope of finding the equivalent of ballistic markings for this anthrax, scientists would have to go beyond Keimbs tests, which examined just eight regions of the genome, with a few hundred base pairs each. Theybd need to decode the entire anthrax genome, some 5.2 million base pairs. So they turned to Claire Fraser-Liggett. Dark-haired, with a square jaw and modelbs cheekbones, Fraser-Liggett helped pioneer the field of genome sequencing. In 1995, she and her fellow scientists at the Institute for Genomic Research published the first complete sequence of a bacterium. Her then-husband, J. Craig Venter, led the private-sector effort to sequence the entire human genome in the late 1990s. By the time of the anthrax attacks, she and her team had already unraveled the genetic codes for dozens of microorganismsbincluding the bacteria that cause Lyme disease and syphilis. And they were already working on anthraxban Ames sample from Porton Down, a British biodefense lab. Fraser-Liggettbs team immediately set out to fully sequence the anthrax taken from Robert Stevensb spinal fluid. The hope was that even a few unique nucleotide sequences could further identify the specific isolate of the Ames strain that was used in the attacks. In 2001, though, genetic sequencing was still so difficult and expensive that the process could take months. Anthrax growing in a petri dish of sheep's blood. Photo: Corbis Meanwhile, the attacks continued. On October 28, a 61-year-old hospital stockroom worker named Kathy Nguyen became so ill so quickly that she could barely speak by the time she got to the emergency room. She died three days later, shortly after being diagnosed with anthrax. Nobody could figure out how she got infected. Maybe one of the anthrax letters had brushed against a hospital package somewhere along its route and left spores behind. Then, two weeks after that, a spore-filled letter addressed to US senator Patrick Leahy was found in a pile of quarantined mail. That same day, 94-year-old widow Ottilie Lundgren checked into the hospital with a slight cough and some weakness. It was nothing major, but the doctors decided to keep her overnight for observation. She lived alone in the small, rustic town of Oxford, Connecticut; she didnbt get a lot of company. Four days later, doctors confirmed that Lundgren had anthrax. She died the next day. The CDC warned that btens of thousands and maybe more letters [could] be potentially at risk for some level of cross-contamination.b The country, still shell-shocked from 9/11, plunged further into panic. Every newsroom in New York and every office in DC became a jury-rigged biosafety lab. People stormed doctorsb offices demanding ciprofloxacin, the powerful antibiotic used to counter anthrax; some drove to Canada when US pharmacies ran out. Then the hoaxes started. One antiabortion extremist mailed 554 powder-filled letters to abortion clinics all over the country. On December 4, newly appointed homeland security chief Tom Ridge declared that he was again placing the public bon general alert.b FBI director Robert Mueller held dailyband sometimes twice-dailybmeetings on the investigation, demanding progress reports at every turn. bWho was going to be a brave enough soul to come in and say, bI got nothing?bb one FBI veteran recalls. But nothing is pretty much what they had. To Pat Worsham, one of Ivinsb colleagues, the rush of events felt like bthe world had gone mad.b A bookish anthrax specialist with a measured, librarianbs air, she was used to USAMRIIDbs placid, well-regulated pace. Now she found herself at the center of a frenzied national bioterror investigation. Worsham had made her reputation in the scientific community by studying anthracis variants, work that was key to the development of a vaccine. So it made sense that one of the institutebs technicians, Terry Abshire, would decide to email Worsham a photo of a petri dish covered with strange-looking anthracis colonies. Abshire had let spore colonies from the letter to Leahy grow for two to three days longer than researchers normally do when culturing anthrax. When she pulled the dish out of the incubator, she noticed that many of the colonies had a yellowish color instead of the usual light gray tone. And they seemed to have affected the sheepbs blood that lined the dish, turning it a sickly green. Worsham studied the picture, but she wasnbt sure what it meant. So she grew a second batch from the Leahy letter and, sure enough, it produced several funny-looking yellowish colonies, too. Ultimately, four predominant morphs were identified. Two had a bullbs-eye shape, almost perfectly round. A third was a little smaller and more irregular. The fourth was mostly translucent. Worsham later grew colonies from the spores that coated the letters to Daschle and the New York Post. The same mutated colonies appeared again. Worsham, cautious by nature, didnbt want to jump to conclusions. bOK, they look alike,b she told colleagues. bThey may not be alike.b But she suspected that they were unique to the attack anthrax, which might make them the kind of identifying characteristic investigators were looking for. The FBI, meanwhile, turned to a more conventional investigative technique: behavioral profiling. It parsed the anthrax letters with Talmudic precision, looking for anything that seemed out of place. The lettersb evocation of September 11, b09-11-01,b used the American style of placing the month before the day. The bAllah is greatb line at the end of the letter seemed inauthentic; a devout Muslim would have begun the letter that way and used the phrase bAllahu akbar.b Profilers concluded that the mailer was likely a sort of spore-happy Unabomberba highly trained, highly educated loner, probably in the American biodefense community. In public, hebd be nonconfrontational, they advised. Instead, he preferred to harass people anonymously. Neither the recipients of his letters nor the mailbox into which he dropped them were chosen at random. The letters had a Trenton postmark, so, the profilers said, the mailer probably lived or worked nearby. Investigators in New Jersey drew up a list of 621 mailboxes that fed the Trenton areabs main mail-processing facility. They started with the most isolated boxes, figuring a local resident would choose a place where they wouldnbt be seen making an envelope drop. Under cover of night, the team swabbed box after box for anthrax residue. Box after box came up negative. Separately, FBI agents were asking biodefense specialists whether they could imagine anyone as a potential mailer. One name was mentioned regularly: Steven Hatfill, a physician who had previously done virology work at USAMRIID. Hatfill was familiar with anthrax; he had gone to medical school and done his internship in southern Africa, where he had seen patients with skin infections caused by anthrax. At the defense contractor SAIC, he showed PowerPoint presentations that sketched out a biological terror attack. The scenario: anonymously mailed envelopes packed with anthrax. In the months before the attacks, he had been filling prescriptions for Cipro. But the thing that made Hatfill a standout in his field was that he was essentially a jock among nerds, a high school wrestler and former soldier. While his colleagues limited their publishing to academic periodicals like The Journal of Infectious Diseases, Hatfill appeared in the conservative political magazine Insight, pretending to cook up biohazards in his kitchen as a way to dramatize the threat of homegrown pathogens. Out of thousands of current and former biodefense workers, Hatfill became the focus of the FBIbs attention. Ivins, meanwhile, was becoming the investigatorsb trusted ally, walking them through the minutiae of the anthrax life cycle. On January 22, 2002, he drew a diagram that illustrated why mutants were showing up in the attack sporesband why that was important. The envelope mailed to US senator Tom Daschle. Getty Images Anthrax isnbt a typical bacteria. Itbs almost immortal. As a spore, anthracis can survive in a dormant state for decades, perhaps even centuries. When it happens to enter an animal, it springs back to life and starts reproducing. Like all living things, anthracis produces mutant offspring as it multiplies. But those mutants have trouble going dormant. When the anthrax loses its host, many mutants die out and the bacteria returns to a near-pure state. Itbs almost as if the law of evolution doesnbt apply. The way the scientific community handles anthrax further inhibits the mutation process. Ivins, for example, kept anthracis batches that were pure, strong, and bjust a slant away,b as he put it, from the original strain taken from that Ames cow. Then Ivins individually picked what he judged to be the healthiest colonies to pass on to other researchers. In other words, when anthrax scientists used Ivinsb spores, they limited the possibility of mutation. They simply kept returning to 1981 over and over again. The anthracis found in the various letters was totally different from his stock, Ivins explained to investigators. Worsham had shown that the attack anthrax produced all kinds of mutants when cultured. This meant that those spores were already the product of generation after generation of culturing and reculturing, unlike his straight-from-the-cow stuff; only the extra turns of the evolutionary cycle could explain the weird growths. bbDaschleb b B.I. cultures,b Ivins wrote on the diagram, referring to his own initials. Agents jotted down his analysis, which seemed perfectly logicalbif a little confusingbat the time. They also noted his suggestion to try genetic analysis to show the difference between his anthrax and the anthrax used in the letters. Of course, for genetics to be helpful, the FBI would need to collect a comprehensive cross-section of anthracis samples to have something to compare the attack anthrax to. So this is what they decided to do. They set up one storehouse for samples at Keimbs lab and another in a locked facility at USAMRIID. Scientists from around the world were asked to send in a bit of every Ames anthrax sample in their possession. Ivins and Worsham, among others, were asked to provide input for the submission guidelines. The procedures included a reminder not to pick just individual, healthy coloniesbeven though that was standard practice for lab work. Scientists were told to take a representative mix from each sample, to catch any stray mutants. Ivins finished handing in his samples in April 2002. Included in Ivinsb submissions was an unusually potent batch of Ames sporesba mix he first created in 1997. It was the result of 164 liters of anthrax from 35 different production runs, distilled into a single liter that was nearly pure. The flask was marked RMR-1029. That same month, Ivins did something that surprised everyone. For some reason, he decided to start testing his office and biocontainment labs for spores. This was a major breach of USAMRIID protocol. Specially trained testing teams were supposed to handle suspected contaminations. On April 18, Ivins told his bacteriology division colleagues what he had done. They promptly freaked out. In addition to being unsafe, Ivinsb actions could be read as an attempt to cover up potential evidence. bBruce,b his friend and coworker Jeff Adamovicz told him, byou donbt understand what this makes you look like.b The next day, USAMRIID held an institute-wide town hall meeting to discuss Ivinsb actions and launch a facility-wide spore hunt. bI am now forbidden from being a bcowboy,bb Ivins emailed a friend later. bI canbt think for myself, and I canbt do anything without everybody up and down the line questioning me about it. Ibm sure itbs punishment.b The FBI decided to have a talk with Ivins. They had more than just the testing to ask him about. They also had discovered that Ivins liked to spend an inordinate amount of time alone in his suite of biocontainment labs, located in the windowless concrete bowels of the institute. Why lock yourself inside for so long? bI donbt think anyone has any idea how peaceful and quiet it can be here after hours,b he wrote in an email to a friend after the questioning. bIn the evenings [suite] B3 may as well be Mars.b Despite all this, the bureaubs major interest was still fixated elsewhere. Investigators were digging into the background of Steven Hatfill and finding inconsistencies. Hatfill, for example, claimed he had a PhD; in fact, the degree was never awarded. If he was misrepresenting something like that, they thought, maybe he was keeping other secrets. In June 2002, agents asked Hatfill if they could swab his apartment for spores. When they arrived, they found the place surrounded by camera crews. News channels carried the event live. Even though the search came up empty, on August 6 attorney general John Ashcroft went on the Today show to declare Hatfill a bperson of interestb in the anthrax case. Two days later, after testing more than 600 mailboxes in central New Jersey for anthrax, investigators finally found one in Princeton with spores inside. Contrary to what the profilers had predicted, it was at a busy intersection on the northwest corner of Princeton Universitybs campus, surrounded by traffic day and night. Agents passed pictures of Hatfill around the neighborhood, asking whether the guy looked familiar. Nobody recognized him. In February 2003, anthrax became part of the rationale for invading Iraq. Colin Powell went to the United Nations Security Council, in part to discuss the potential bioweapon. bLess than a teaspoonful of dry anthrax in an envelope shut down the United States Senate,b he said. bSaddam Hussein could have b& enough to fill tens upon tens upon tens of thousands of teaspoons.b Two weeks later, Tom Ridge told Americans to buy duct tape and plastic sheeting to protect themselves from a bioterror attack. Four weeks after that, the invasion of Iraq began. As the war got under way, Hatfillbs life was unraveling. He had been fired from his job at SAIC, and a replacement gig at Louisiana State University fell apart under Justice Department pressure. He spent his days bremodeling every room in my girlfriendbs apartment,b he says. bIt took months.b Suicide was bnever an option,b he later told a reporter from The Atlantic, but at the time, he was under extreme emotional and mental strain. In August 2003, Hatfill sued the Justice Department for violating his constitutional rights and privacy. After Vanity Fair and The New York Times published articles suggesting Hatfill was guilty, he also sued CondC) Nast (which owns wired as well as Vanity Fair) and the Times. In public, the bureau defended its actions. But the more the anthrax unit investigated Hatfill, the less convinced some agents became of his involvement. The Cipro prescriptions, the magazine photo, the flawed rC)sumC)bnone of it made him a killer. bHe fits the general profile,b special agent Brad Garrett told colleagues after one interview. bBut I donbt see any real evidence.b Meanwhile, Fraser-Liggettbs team was still hard at work trying to come up with a DNA signature for the attack anthrax. To do this they were sequencing not only the anthrax taken from Stevensb spinal fluid but also the original Ames strain (taken from Keimbs collection), which could allow them to pinpoint genetic markers unique to the attack spores. The team spent months shearing off DNA segments, tagging those segments with fluorescent dyes, scanning them with a laser, and then using advanced algorithms to reassemble the base pairs. By October 2003, they had the results. bOh shit,b Fraser-Liggett said when she saw the outcome. bThere isnbt a single difference.b As far as the tests could tell, all of the nearly five and a half million base pairs were the same, and in the same order. Because of the natural and man-made processes that slow anthraxbs evolution, the attack bacteria was essentially pure Ames. The whole idea of using this new DNA fingerprinting technique to find the attack spores seemed like a dead end. There were still a few options left. The best of those was to analyze the mutant anthrax coloniesbthose yellowish, rounded, and blood-busting specimensbthat Pat Worsham had spotted. There was a chance that these mutants might contain larger, more detectable genetic differences that would allow scientists to distinguish them from pure Ames spores. If so, those morphs might produce a usable DNA fingerprint. The Fraser-Liggett team launched a new, laborious round of sequencing. bNot all hope was lost,b Fraser-Liggett says. But she wasnbt optimistic. For the time being, however, the FBI decided to rely on Worshambs eyes. Investigators started bringing samples from the FBIbs Ames repository to her, which she would culture, then check for mutants. One sample caught her attention. It had the bullbs-eye-shaped variants and all the other mutants, too. Because it was labeled with an anonymous code, Worsham didnbt know where the spores had come from. But the FBI knew it was a subsample of Bruce Ivinsb lethal RMR-1029 batch, which Ivins had previously provided to the Battelle biodefense lab in Ohio. And this meant something didnbt add up. If the Battelle sample produced mutants, Ivinsb RMR-1029 sample should have as wellbthey were supposed to be virtually identical. But the RMR-1029 from Ivins tested clean. Investigators wondered if, despite instructions to the contrary, Ivins may have picked off a few healthy colonies rather than a representative sample of the RMR-1029 flask. Or maybe he hadnbt submitted RMR-1029 at all. In December 2003, while conducting an inventory of one of USAMRIIDs biocontainment suites, investigators discovered 22 undocumented Ames anthrax samples. They began to fear that the repository they had spent nearly two years assembling might have gaping holes in it. So for the first time, the FBI decided to scour USAMRIID for any vials they had missed. The institute staff fumed at the searchbongoing experiments would be disrupted, they shouted. Heine, Ivinsb coworker, decided to exact a bit of revenge on his FBI handler. While the agent was collecting samples in his labbdressed in full protective gearbHeine handed her a vial and told her it was a deadly plague strain. The vial started shaking in the agentbs gloved hand. Heine cracked up. bThey were entirely dependent on me to identify everything in every box,b he says. bI couldbve held up a critical piece of evidence, said it was something else, and put it aside. Therebs no way they wouldbve known.b During the search, investigators took Ivinsb primary RMR-1029 storebnot just a sample of the stuff, all of it. They skimmed a small amount into a vial, labeled it with an identification number, and sent it to Pat Worsham down the hall for analysis. Later, on the patio of the old officersb club, Heine, Ivins, and the other scientists in the bacteriology division had a couple of beers and tried to laugh the whole thing off. Each one would joke about how the other was really the anthrax mailer. The letter mailed to Tom Brokaw at NBC News. Getty Images Over the following days, Worsham grew fresh cultures from the seized RMR-1029 spores. Unlike the cultures from the sample that Ivins had supplied back in April 2002, this time the same bullbs-eye-shaped morphs she had seen in the Leahy, Daschle, and Post letters appeared. So did the smallish, irregular colonies. Like the Battelle sample, it seemed to be the same stuff as the killer anthrax. Investigators were talking to Ivinsb coworkers and digging into his archived emails. They learned that women made him feel awkward. He also didnbt like talking on the telephone. More seriously, Ivins worried in an email about having bparanoid personality disorderb and feared that he might be schizophrenic, as well. The idea that a man handling some of the worldbs most lethal pathogens might be mentally ill was not a comforting thought. (It isnbt clear whether Ivins actually suffered from these ailments. His medical records are still sealed.) On March 31, 2005bafter more than two dozen interviewsbinvestigators decided to challenge Ivins more forcefully. They asked why he hadnbt submitted all his anthrax samples to the repository; he had no good explanation. They asked him about the bcowboyb spore hunts in his office; he said he was just being careful. They told him they were copying his hard drive. He was concernedbhe asked what the FBI does when they find something like child pornography on a computer. Investigators also pressed Ivins about his personal life. He responded that he had stopped taking antidepressants. bHe internalizes his negative emotions and, as a result, suffers from ulcers and irritable bowel syndrome,b an FBI interview summary noted. bWhen asked whether his psychological condition had ever caused him to do anything which surprised him b& Ivins offered that he does not bact outb and has never hit his wife.b It was a devastating conversation for Ivins. Even the investigators were worried about the impact. The next day, an agent asked Ivins if hebd make it through the weekend. bIbm not going to jump off a bridge or anything like that,b Ivins said. But he was going to start taking his meds again. A few days later, he hired a lawyer. Meanwhile, Fraser-Liggettbs team had genetically sequenced the four telltale mutants that grew out of the killer anthrax. They were all 99.99 percent identical. But that tiny fraction of differencebless than a thousand base pairsbwas enough to give each mutant a unique genomic signature. If a batch of anthrax tested positive for these four morphs, it meant that it was provably identical to the attack anthrax. Before, researchers had relied on Worshambs discerning but still subjective eye to tell them which strains looked similar to the morphs in the killer batches. Now they had the kind of hard genetic data they could take to a judge and jury. Along with other labs, Fraser-Liggettbs team quickly developed streamlined tests to detect each one of the mutants. They then began the labor-intensive process of running these tests on every anthrax isolate the FBI had collected from labs around the world. In a warehouse-style lab, 75 researchers worked split shifts six days a week, testing and retesting the samples. None of them had any idea what the results meant; all the samples were coded, and all the groups were compartmentalized from one another. They toiled without any sense of progress. Even as they plunged ahead with the new genetic tests, they continued to search for other ways to identify the source of the killer anthrax. Fraser-Liggettbs team and others spent more than a year trying to track a contaminant found in two of the letters. The search did not yield any useful forensic information. Repeated attempts to reverse-engineer the powdered attack spores flopped. So did efforts to use trace amounts of tin and silica found in the attack powder to discern where the spores were made. Eventually, FBI director Robert Mueller seemed to lose patience with the whole thing. President Bush frequently teased him about the case during his intelligence briefings. bBob, howbs that anthrax investigation coming along?b Bush would ask sarcastically. Mueller had no good answers. In 2006, the agent in charge of the case was replaced. Edward Montooth, a two-decade veteran of counterterrorism and homicide cases, was brought in to run the investigation. He cultivated a relaxed, slow-going demeanor among outsiders, coming across as a sort of clean-shaven midwestern Columbo. An agent named Vince Lisi was chosen to be Montoothbs deputy. Blue-eyed with a ruddy quarterbackbs face, Lisi had no tolerance for shifty suspects or slow-moving investigations. Dellafera, the postal inspector, remained on the leadership team, thanks in part to his ability to grasp the details of everything from anthrax fermentation to forensic psychology to envelope fibers. And boy, were there details. Anthrax repository submissions. Genomic fingerprinting. Thousands of interview transcripts. In the unitbs office, sandwiched between a chain hotel and the freeway in suburban Tysons Corner, Virginia, there were rooms filled with filesbas many as 400,000 documents. It seemed impossible to get through them all. bI came home with a headache every day for a year,b Montooth says. On the other hand, the list of potential suspects was now short enough that it could fit on a single page, thanks to the emerging DNA results. The search for the anthrax mutants wasnbt finished, but once decoded, the results pointed directly at RMR-1029 and its subsamples. This, in turn, meant that scientists with access to that material were the people worth considering. Guys like Bruce Ivins, in other words. bThe science absolutely drove this,b one former senior FBI official says. bIt changed the focus completely.b The investigating unit gathered in its makeshift meeting areaba training room with acoustics so bad agents had to shout to be heard. Lisi, Dellafera, and Montooth barked out the new plan: Start with RMR-1029 and its subsamples. Figure out who had access. Cross as many names off the list as you can. The person left at the end is the killer. bDonbt assume anything. Either prove to us theybre guiltybor prove to us theybre not,b Lisi said. bNo more happy talk. Even for the people who helped us.b Investigators scoured the phone records, email accounts, and laboratory access-card records of US anthrax scientists with possible access to RMR-1029 in an effort to determine their whereabouts on the days in the fall of 2001 when the letters were mailed. They reviewed anthrax transfer records, lab notebooks, and scientific publications to get a sense of how the scientists used their anthracis. bIf you knew how to grow up large quantities of bugs, the FBI was on you all the time,b Heine says. Pat Worshambwho found the telltale mutantsbwas among those aggressively interrogated. Worsham was able to exonerate herself, but other names were harder to cross off. Heine had a bunch of RMR-1029 subsamples. John Ezzell, head of USAMRIIDbs Special Pathogens Sample Testing Lab, was perhaps the only scientist at USAMRIID who worked with dry sporesbalbeit dead ones. But it wouldbve been highly unusual for Ezzell or Heine to keep a store of bugs in their freezers. One of the many lab technicians or scientists who shared cold-storage space with them would have noticed a stockpile, the agents theorized. Ivins, as a designated spore-grower, had plenty of reason to keep large quantities of anthrax. On top of all the other red flags, Ivins had little to no verifiable alibi for the critical days in question. Ivins, Heine, and their coworkers would still blow off steam at the old officersb club. Sometimes Ivinsb buddies would needle him about being the new leading suspect. bBruce, what have you done now?b theybd ask sarcastically. Sometimes they shouted curses at the FBI agents they were sure must be listening in. They kept going to their volleyball games. Ivins kept emailing around corny jokes. Interest in Ivins continued to grow. Agents began looking for old evidence that might point to him. That led them, finally, back to Nancy Haigwood, Ivinsb grad school colleague who had called as early as 2002 to say that she thought Ivins was the anthrax mailer. They had all but ignored her then. Now they encouraged her to email Ivins while they monitored the thread. It wasnbt hard to get a reply: Ivins always wanted to know more about Kappa Kappa Gamma, her old sorority. Maybe theybd even talk about how odd it was that the one anthrax-laden mailbox in New Jersey was right next to Princetonbs KKG offices. (Neither Haigwood nor the FBI will discuss the details of these exchanges.) Around the same time, the US attorneybs office asked Ivins to testify before a grand jury about the scientific aspects of the anthrax case. In a strictly legal sense, he wasnbt an investigative target, they explained. Ivins agreed and, starting on May 7, 2007, testified for two days without a lawyer. The questions about his handling of anthracisband about his personal lifebsent him into a tailspin. bThey accused me of diluting, altering or adulterating an important preparation of anthrax material,b he emailed a friend, almost certainly referring to his flawed RMR-1029 submission in April 2002. bDo you realize that if anybody gets indicted for even the most remote reason with respect to the anthrax letters b& they face the death penalty?b He also began talking about leaving USAMRIID. And maybe more. bIbve been inside, cooped up for almost all of my life, I want to spend eternity outside,b he wrote in another email. bI look like Ibm 90 years old. I feel older than that b& I guess I should have started on [the antidepressant drug] Celexa years earlier. Also caffeine and alcohol.b The former lightweight had become a heavy drinker. In August, Fraser-Liggettbs team presented its final DNA fingerprinting report to the bureau. The results were somewhat conflicting. Some samples initially tested positive for the telltale morphs, then negative in a second exam. But of the 1,059 viable samples in the FBIbs Ames anthrax repository, eight regularly produced all of the mutants. One of those eight was Ivinsb RMR-1029 flask. The other seven were its subsamples. This ruled out Hatfill, who did not have access to RMR-1029 during his time at USAMRIID. (Later, the Justice Department agreed to pay Hatfill a $5.8 million settlement and issued an official letter exonerating him. CondC(9 Nast also agreed to an undisclosed settlement. The New York Times case was dismissed.) And while dozens of other scientists did have access to the RMR-1029 subsamples, they were being slowly crossed off the list. As each alibi and exculpatory story checked out, the investigators gravitated closer to Ivins. The FBI wasnbt ready to make a move, though. It had the genetics, but the DNA fingerprints went only so far. There were still those seven subsamples and those occasionally inconsistent results. If this were a more traditional murder case, investigators would now know which store sold the gun and to whom it was registeredbbut not who fired it. Montooth, for one, was worried. He once lost a murder case because the jury didnbt buy the DNA evidence. bJust like a gun in possession doesnbt mean homicide,b Montooth says, bscience alone isnbt going to convict him.b Nor would a jury convict Ivins because of his unexplained hours in the lab, his suspicious office swabbing, or his botched April 2002 submission of RMR-1029 to the FBI Ames repository. The agents still had no witnesses to the mailings, no confession, no obvious motivebjust complicated science, some hard-to-explain coincidences, and odd behavior. In a series of meetings, the agents debated whether it was finally time to search Ivinsb home. They decided to consult with outside forensic psychiatrists. The doctors said Ivins was probably the type to keep a souvenir of the crime, but they warned that he was a fragile man who had already been pushed very, very hard. On September 25, Ivins showed up at work with a black eye. He joked that he ran into somethingbhis wifebs fist. A month later, he talked about his new favorite cocktail, tequila and Ambien. bThe psychiatrists told us: When you go overt, you will have cut him from all his life rings. Things could get tough,b Montooth says. bSo, were we concerned? Hell yeah.b But they didnbt have much choice. The search was scheduled for November 1, 2007. When the day came, two FBI agents caught up to Ivins at the entrance to USAMRIID. Ivins asked if he needed his lawyer. Nope, they answered. Just come into an office and listen to what webve got to say. Youbve been trying to fool us for a long time, they said. You knew as far back as early 2002 that your RMR-1029 anthrax was close, really close, to the killer spores: same strain, similar kinds of mutants. You knew back then that we were looking at those mutants, seeing if theybd lead back to the attack anthrax. You knew that we wanted to do DNA fingerprinting; heck, you even suggested we do that. And now we know that you screwed up your RMR-1029 submission. The genetic analysis of the mutants came in, Bruce. RMR-1029 and the attack spores: They match. Perfectly. That stuff you gave us in April of b02? That stuff you called RMR-1029? It doesnbt match. And we know why. You were supposed to give us a full sample back then, mutants and all. Instead, you picked off single colonies so those morphs would never show. Ivins offered all kinds of excuses. He hadnbt understood the submission guidelines. He hadnbt gotten how important RMR-1029 was. He even absurdly claimed he wasnbt really an expert on anthrax. Each lame explanation only frustrated the agents further. To rattle Ivins, the agents asked what they call a change-up questionba deliberately provocative non sequitur. Tell us about Nancy Haigwoodbs husband, an agent said. Ivinsb house was a microcosm of the case: lots of suspicious, freaky material but no evidence of a crime. Ivins pushed away from the conference room table, crossed his arms and legs, and told the investigators he was taking the Fifth. He refused to respond to any further statements. At about 8 pm, Ivins said he was leaving. Actually, you probably shouldnbt, the agents answered. Webve got people talking to your wife and kids. Webve got agents searching your office, your cars, and your house. Itbs going to take a while. Webve booked hotel rooms for you and your family. Want a ride? Dellafera, the postal inspector, was waiting at the institutebs entrance. He and Ivins had known each other since the beginning of the case. They drove over to the Hilton Garden Inn, with Ivins in the passenger seat. Dellafera asked Ivins: Are you worried about the searches? Yes, Ivins answered. I do things a bmiddle-aged man should not do.b Then Ivins told him about a bag in his house filled with the womenbs clothes he liked to wear. The two passed a few minutes in awkward silence. Ivins still looked nervous, uncomfortable. He said he didnbt want to be labeled a mass killer. Ibm not a terrorist, he said. I canbt believe you think Ibm the anthrax mailer. Dellafera said he empathized. He told Ivins that the mailer never meant to hurt anyone: The envelopes were taped shut, and the letters told people to take penicillin. Ivins didnbt answer. He just rocked in his seat, staring at the floor. While Dellafera and Ivins checked Ivins into the hotel, teams of FBI agents drove slowly, one car at a time, up to Ivinsb home. They went in quietly; Montooth didnbt want another media circus. Inside, there were piles of clutter everywhere: bank deposit slips, VHS tapes of The Mary Tyler Moore Show, classical music cassettes. The agents collected it all, hoping for somethingbanythingbthat would tie Ivins to the mailings. Finally, around 5 am, Montooth called it off. bWe got dust bunnies,b he says. Montooth, Dellafera, and Lisi tried to stay upbeat. The agents did find some odd items: fake hairpieces, letters to politicians and the press (the same sorts of people who got the anthrax mailings), three pistols, a handwritten note about drawing bfirst blood b& and last.b Ivins even wrote a song celebrating deceased space shuttle astronaut Christa McAuliffebone of his many fixations. In some ways, the discoveries were a microcosm of the whole case: lots of suspicious, freaky material but no direct evidence of a crime. On the day of the search, Ivinsb security clearance was revoked, severely limiting the kind of work he could do at USAMRIID. He became convinced that Heine, his close friend and colleague, had fingered him as the anthrax mailer. Heine hadnbt, but the suspicion drove a wedge between Ivins and his drinking buddy. The two scientists stopped talking to each other, even though they were still working together on projects. When they needed to communicate, they did so through their boss. Bowling nights and beers at the old officersb club were out, of course. Heine even skipped the division Christmas party so Ivins could go, but Ivins didnbt show up either. About a week after the search, a surveillance agent spotted Ivins at around 1 am in his long underwear, throwing out a copy of Douglas Hofstadterbs classic book GC6del, Escher, Bach. Ivins had lots of books in his house. Why throw out that one? The book contains a lengthy section dealing with codesbspecifically, nucleotide bases that make up DNA, represented by the letters A, T, C, and G. Investigators had long believed that at least two of the anthrax mailings contained a code, too. Some of the As and Ts were bolded, and the misspelled word penacilin had a bold A in the middle. Maybe Hofstadterbs coding was the answer. The agents knew that groups of three basesbcalled codonsbwill reliably form certain amino acids, which can also be represented by letters. When they lifted out just the bolded letters, investigators got TTT AAT TAT. The amino acids that form from these codons start with the letters P, A, and T. It was the first name of a female colleague that Ivins seemed to have a peculiar interest in: Pat Fellows. The letters that officially represent these amino acids are F, N, and Y. Maybe that meant bFuck New Yorkb; investigators knew Ivins hated New York City. In the end, though, they could only guess at the meaning. As the case focused on him, Ivins was coming unmoored. His colleagues would find him slumped in his chair, staring into space. Every once in a while, hebd blurt out unprompted: bI could never intentionally kill or hurt someone.b For their next interview with Ivins, investigators decided not to ask about the mailings and instead planned to focus on the weird stuff, the personal stuff. On January 16, 2008, they all met at the US attorneybs office in downtown Washington. Lisi opened up with a question about Kappa Kappa Gamma, the sorority Ivins had been so interested in for so long. bOh, itbs not an interest,b Ivins answered. bItbs an obsession.b Ivins detailed that obsession as the investigators tried to hide their shock. Ivins talked about how he broke into KKG houses in the 1970s and stole their coded ritual book and cipher. How he sold copies of that book through the mail. How he set out to learn everything about Nancy Haigwood once he found out she was a Kappa. How he vandalized the property where she lived. Lisi asked Ivins if his wife, Diane, knew about any of this. Not a clue, Ivins answered. She didnbt track his comings and goings. It was the kind of answer Lisi, Montooth, Dellafera, and US attorney Rachel Lieber wanted to hear. If the case went to trial, Ivins couldnbt use his wife as an alibi for the mailings. Not after hebd bragged about disappearing all the time without her knowledge. They liked Ivinsb other answers, too. He admitted to multiple felonies with the vandalismbones he traveled far to commit. And he repeatedly used the word obsession, which might spook a jury inclined to sympathize with Bruce Ivins, Red Cross volunteer. A second interview, on February 13, started along similar lines. Ivins described his fascination with bondage, beginning with blindfolding his teddy bears at age 5 or 6. Then Lisi asked about a more sensitive subject. He took out the diagram Ivins had drawn in January 2002 explaining the differences in anthrax strains. In it, Ivins showed how his purer-than-pure anthrax samples were so completely different from the attack spores. Ivins said he didnbt remember drawing it. Lisi assured Ivins he had and asked him to reinterpret it on the spot. Ivins just read the names and places on the diagram out loud. A little over a month later, on March 19, at 2:09 pm, Diane Ivins called 911. Her husband was unconscious after too many pills and too much liquor. Ivins spent a few days at a local hospital. When he returned to work, he struggled. Then, in May, Ivins checked into a mental health facility in Cumberland, Maryland, and spent four weeks there. But the drinking and pill-taking continued. On June 5, Ivins spoke on the phone with a friend. Ivins complained of waking up in his clothes, looking at the keys beside the bed, and thinking: bOh shit, did I drive somewhere last night?b The friend asked Ivins if he might have committed some terrible act. Ivins didnbt say no. Instead, Ivins told his friend, bI do not have any recollection of ever having done anything like [the anthrax attacks]. As a matter of fact, I have no clue how to, how to make a bioweapon, and I donbt want to know.b The friend suggested hypnosis as a recall tool. Ivins said, bWhat happens if I find something that, that is, like, buried deep, deep, deep b& if I found out I was involved in some way?b A few days later, agents had their final interview with Ivins. The intention was to nail him on key aspects of the case, bwhat we needed for prosecution,b Dellafera explains. Yet the talk turned strange and personal once again. Lisi took out GC6del, Escher, Bach. Ivins said he had a dog-eared copy of the book at home. Lisi asked about DNA and codes. Ivins answered that he wasnbt much of a bgene jockey.b (This from a guy who once emailed around a joke that went: bBiopersonals b& Lonely ATGCATG would like to pair up with congenial TACGTAG.b) Lisi wondered why Ivins hated New York so much. Ivins said it dated back to a microbiology conference there in the late b60s. A waitress was rude and threw his lunch on the table. Lisi asked Ivins whether he remembered what hebd had. Sure, Ivins answered: spinach salad. Yet Ivinsb memory quickly failed him when it came to details about the anthrax investigation. Ivins said he couldnbt remember why the FBI wanted to build an anthracis repository, or what they wanted to do with the samples, or whether he prepared his submissions himself. Ivins was attending therapy sessions, but they didnbt seem to be helping his mental state. In July 2008, he posted a comment on a YouTube clip of a reality TV show, The Mole, suggesting that one of the female contestants ought to have a hatchet brought bdown hard and sharply across her neck, severing her carotid artery and jugular vein.b On July 9, Ivins went to a group therapy session and said he had a plan to end all this government harassment. He said he had access to a .22-caliber rifle, a Glock handgun, and body armor. He would kill all his coworkers and everybody else who had wronged him. The next day, the addiction counselor, Jean Duley, called the police and told them of the disturbing outburst. Officers were dispatched to USAMRIID, where Ivins was attending a briefing on a next-generation plague vaccine. He seemed stressed, his colleagues said, but not crazy. The cops arrived and took Ivins away. He left the institute quietly and never went back. The police didnbt arrest Ivins but rather took him to Frederick Memorial Hospital for evaluation. Two weeks later, on July 24, 2008, Ivins returned home. That afternoon, he made two separate trips to a local store, picking up a bottle of Tylenol PM each time. That night, his wife left a note on his bedside. bIbm hurt, concerned, confused, and angry about your actions the last few weeks,b she wrote. bYou tell me you love me but you have been rude and sarcastic and nasty many times when you talk to me. You tell me you arenbt going to get any more guns then you fill out an online application for a gun license.b At approximately 1 am on July 27, 2008, Diane Ivins woke up to check on her husband. He wasnbt in bed. She went to the bathroom and found him on the floor, in his undershirt, lying in a pool of what looked like his own urine. bHebs unconscious. Hebs breathing rapidly. Hebs clammy,b she told the 911 operator. The local police and the emergency medical technicians arrived at the same time. The police and Diane counted the pills left in the medicine cabinet while the EMTs brought Ivins out on a stretcher. They rushed him to the hospital. The doctors thought he might have overdosed and promptly ordered that a breathing tube be put down his throat. Blood tests showed the acetaminophen level in Ivinsb blood was 10 times higher than what is considered safe. A massive dose of Tylenol was overloading his liver. Few ways to die are more agonizingbthe abdominal pain alone is excruciating. Doctors administered an antidote, N-acetyl cysteine. But it was too late. At 8 obclock, a nurse woke Ivins up and asked, bDid you intentionally try to commit suicide?b Ivins nodded and attempted to remove his tubes. The nurse had him restrained. Doctors tried to talk Diane into transferring him to another facility for a potential liver transplant. He doesnbt want to be saved, she said. On July 29, 2008, at 10:47 am, Ivins died. There was no suicide note. Instead, he had merely taken his wifebs letter and scrawled a response on the other side. He then scratched out a few of the words and left it on the nightstand. bI have a terrible headache. Ibm going to take some Tylenol and sleep in tomorrow,b he wrote. bPlease let me sleep. Please.b Over the next year and a half, the Justice Department produced a 92-page binvestigative summaryb of its case against Bruce Ivins, released thousands of pages of documents, agreed to independent reviews by both the National Research Council and the Government Accountability Office, and officially declared the case closed. It was an extraordinary and unprecedented effort to prove the guilt of a man who was never arrested for any crime. But the document dump is in many ways unsatisfying, since it covers a single suspectbIvinnd labs in a recently opened West Baltimore biotechnology complex. Hanging on her office wall, near pictures of her prized poodles, are framed copies of her articles in the prestigious science journal Nature. Shebs proud of her colleagues, like Jacques Ravel and David Rasko, who, while working on her team, helped pioneer this new science of microbial forensics during the anthrax investigation. As she talks about the case, however, Fraser-Liggett becomes uneasy. bItbs as if somehow webmeaning those of us here who were involved in doing all this work on genetic mutantsbwere somehow fully supportive of the FBIbs conclusions,b she says. The cross-dressing, the sorority obsession, the bondagebbit would be very easy to get sucked into all of this because, you know, it makes for a great tabloid-type story,b she says. bIvins was a bit peculiar. But one of our civil liberties is to be peculiar.b There are still unresolved scientific issues surrounding the case, she points out. RMR-1029 was a witchesb brew of 35 different production runs. Maybe the mutants came from one or more of those original component batches and therefore showed up only on particular tests. Nobody knows for sure, because RMR-1029 was never reverse- engineered. bIt raises some very important questions,b Fraser-Liggett says. bLetbs repeat this experiment. Letbs go back and see if we can re-create what was in RMR-1029.b The National Research Council report also casts doubt on whether the killer spores really were descendants of Ivinsb RMR-1029 flask. The FBI resampled RMR-1029 a total of 30 different times, the report found. They could get all four telltale morphs on only 16 occasions. Further, the FBI says that only eight samples in its Ames repository were genetic matches to all four morphs of the killer sporesband that the scientists with access to those isolates were thoroughly scrutinized. But the National Research Council found that the FBIbs collection canbt be fully trusted: Too many of the samples were intermingled or descended from other labsb anthracis to provide a truly representative cross-section of Ames anthrax. This may also be a reason why nearly one in 10 samples in the repository tested positive for at least one mutant. Paul Keim, who helped assemble the FBIbs Ames collection, still wonders how much to trust an anthrax repository that relied on scientists (and potential murder suspects) submitting their own samples. bWe donbt know if people did it correctly, and therebs no real way to control for that,b Keim says. Even if everyone was aboveboard, itbs unclear whether the FBI accounted for every last anthrax sample. Each time Ivins gave his colleague Hank Heine a batch of spores for an experiment, for example, Heine would save a milliliter or two, in case the experiment went wrong. bItbs just good scientific practice,b Heine says. bI had numerous samples of RMR-1029.b Itbs hard to imagine he was the only scientist with such a collection. Because the subsamples were so small and largely undocumented, it took the FBI nearly three years to stock its repositorybplenty of time for a researcher to dispose of an incriminating batch. Then therebs the problem of figuring out when Ivins could have grown the spores. In an email to colleagues on April 23, 2004bunrelated to the investigation and long before he became its prime suspectbIvins estimated that it would take 60 hours to brew up 500 billion spores. Each anthrax letter contained up to four times that amount. This means that making enough spores for the mailings would have required between five and six months. It would have been nearly impossible for Ivins to do that much work without others noticing. It may be odd to rely on Ivins himself for these numbers, but his colleagues do not dispute his estimate. The National Research Council report does theorize that it could have been done more quickly, but its findings were inconclusive. bThe time might vary from as little as two to three days to as much as several,b the report reads. bGiven uncertainty about the methods used for preparation of the spore material, the committee could reach no significant conclusions regarding the skill set of the perpetrator.b This raises another significant problem with the case. USAMRIID veterans debate whether Ivins had access to the kind of gear required to dry and mill the spores. Even if he did, some argue, he wouldnbt have known how to use it. Ivinsb wet-spore experience didnbt translate to dry stuff, Heine and others say. Montooth acknowledges that he isnbt sure how Ivins would have done all that growing and drying. bBut it almost doesnbt matter,b he says. Investigators know which days in September and October the envelopes were mailed. That was the actual murderous act. The anthrax could have been slowly assembled and processed for months or years before that. Ivinsb alibis for those autumn days are virtually nonexistent. There are still other problems with the case against Ivins. The killing spores were so volatile that they cross-contaminated piles and piles of mail. Yet spores were never found in Ivinsb house or his car, and only a handful were discovered in his lab. Therebs no evidence of any trip to Princeton to mail the letters. And just because the killer spores were descendants of a USAMRIID flask, therebs no guarantee a USAMRIID scientist was actually the mailer. In fact, the FBI was never able to prove where the attack anthrax was cultured. bIt wouldbve been very easy to take the anthrax out, to steal some,b a former USAMRIID officer says. bAnybody could do that.b Finally, therebs the matter of motive. The Justice Department asserts in its investigative summary that Ivins mailed the letters to gin up support for an anthrax vaccine, offering a few ambiguous emails and comments to friends and investigators as proof. If therebs any further, credible evidence to support this notion, Wired couldnbt find it in the thousands of pages of case documents released by the government or in the hours of interviews conducted with the investigators. Montooth concedes itbs a placeholder rationale at best. For someone as deeply disturbed as Ivins, he argues, simple rules of cause and effect donbt apply, especially not in matters as grave as murder. bYou cannot think of this in one dimension or layer. Itbs not that simple,b Montooth says. bYoubre never gonna know a single cause or motive for why it was done.b But despite all these flaws, the circumstantial evidence remains compelling. It could just be a coincidence that the killer spores were ultimately traced back to a single parent flask and that this flask just happened to be overseen by a depressed scientist with occasional violent fantasies. It could just be a coincidence that this same scientist screwed up his anthrax submission to the FBIbeven though he helped develop the submission protocols. It could just be a coincidence that his after-hours work spiked right before the mailings. But put all of those coincidences together and something stronger than happenstance emerges. For the Justice Department, itbs enough to prove Ivins was the anthrax mailer. Therebs an irony in the fact that the culprit was likely a top government anthrax expert: Since 2001, the US has built dozens of labs, spent just under $62 billion, and hired an army of researchers to prevent a second bioterror attack. In effect, Washington has devoted the past decade to training and equipping hundreds of people like Ivins. Itbs an unnerving scenario. But therebs something much scarier to contemplate. Therebs still the possibility that the government was as wrong about Ivins as it was about Hatfill. If thatbs the case, the anthrax mailer is still at large. And that means someone launched the deadliest biological attack in the history of the United Statesband got away with it. Contributing editor Noah Shachtman (noah.shachtman at gmail.com) wrote about the Afghan air war in issue 18.01. Additional reporting by Adam Rawnsley. From coderman at gmail.com Sun Mar 27 21:10:55 2011 From: coderman at gmail.com (coderman) Date: Sun, 27 Mar 2011 21:10:55 -0700 Subject: Iranian state-sponsored cyberwarfare is indistinguishable from script kiddies In-Reply-To: References: Message-ID: On Sat, Mar 26, 2011 at 11:11 PM, coderman wrote: > .. >> Pretty much every news report I've seen so far that mentions any kind of >> Iranian connection is claiming that it's Iranian state-sponsored hacking. now you can point them at: http://pastebin.com/74KXCaEZ comodo ceo a fucking dunce and tool. send your csr anywhere else! > considering the poorly deployed, poorly managed, poorly maintained > iranian networking and computing systems in question, Occam says > someone having fun through iranian pwn hops... even if that someone is themselves persian... , a few choice quotes in the correspondence. c.f.: """ 'I heard that some stupids tried to ask about it from Iran's ambassador in UN, really? How smartass you are? Where were you when Stuxnet created by Israel and USA with millions of dollar budget, with access to SCADA systems and Nuclear softwares? Why no one asked a question from Israel and USA ambassador to UN?' "" From lvaro67 at 5199info.com.jfet.org Sun Mar 27 18:10:47 2011 From: lvaro67 at 5199info.com.jfet.org (Dr.Claudia Garca) Date: Mon, 28 Mar 2011 02:10:47 +0100 Subject: Traditions and the present Message-ID: <127723lqmj6738212.2801524569984046rsOIBs770.880SN946082nohaqY2F7qzqxvN-5vq-T91501396057.65j516kq7b604224.80223.57@chignon.takuyakimura.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 597 bytes Desc: not available URL: From measl at mfn.org Mon Mar 28 06:32:17 2011 From: measl at mfn.org (J.A. Terranson) Date: Mon, 28 Mar 2011 08:32:17 -0500 (CDT) Subject: Anthrax Redux: Did the Feds Nab the Wrong Guy? In-Reply-To: <20110327175021.GN23560@leitl.org> References: <20110327175021.GN23560@leitl.org> Message-ID: The fact that the FBI chose to prosecute these cases (first Hatfill and then Ivins) in the press and not the courtroom said it all then, and nothing has come out to change the conclusion now: the government was looking for a way to end this investigation at any cost, no matter what - a lot like the Branch Dividian Raid. Since Tim is no longer with us, I'll substitute his much needed quote: Fuck the Government. Fuck it dead! //Alif On Sun, 27 Mar 2011, Eugen Leitl wrote: > Date: Sun, 27 Mar 2011 19:50:21 +0200 > From: Eugen Leitl > To: tt at postbiota.org, cypherpunks at al-qaeda.net > Subject: Anthrax Redux: Did the Feds Nab the Wrong Guy? > > http://www.wired.com/magazine/2011/03/ff_anthrax_fbi/all/1 > > Anthrax Redux: Did the Feds Nab the Wrong Guy? From measl at mfn.org Mon Mar 28 07:43:31 2011 From: measl at mfn.org (J.A. Terranson) Date: Mon, 28 Mar 2011 09:43:31 -0500 (CDT) Subject: Phoenix UAV can sense you breathing In-Reply-To: <20110323125635.GE23560@leitl.org> References: <20110323125635.GE23560@leitl.org> Message-ID: On Wed, 23 Mar 2011, Eugen Leitl wrote: > The flying robot's RF array can penetrate concrete walls from "an extended > range," according to TiaLinx, which is based in Newport Beach, Calif. > > Other skills include providing the layout of a multistory building and > scanning roads for unexploded ordnance. > > Skynet might dig that, but the Phoenix could also be deployed in humanitarian > missions. It could work in disasters such as earthquakes to scan for > survivors, or even find landmines in former war zones. Yes, it *could*, and even *should* be put to such high end humanitarian uses. But how many people really believe that this will ever happen? It's *so* much more fun to use them in seizure cases, where you can beef up your budget through fee-splitting with the manufacturer and USG. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From fuckc at pravdelo.ru Mon Mar 28 04:08:55 2011 From: fuckc at pravdelo.ru (=?koi8-r?B?897F1CDawSDV08zVx8kg09fR2sk=?=) Date: Mon, 28 Mar 2011 12:08:55 +0100 Subject: =?koi8-r?B?897F1CDawSDV08zVx8kg09fR2sk=?= Message-ID: <000d01cbed30$25adee80$6400a8c0@fuckc> Новые возможности телефонной связи! Желающим снизить расходы на телефонию, нами разработаны новые тарифные планы Индивидуальный блок минут Звонки по России √ 1 рубль. Звонки на мобильные √ 1 рубль. Звонки в Москву √ 50 копеек. Безлимитные звонки по России 1990 рублей в месяц ═Выскажите свои пожелания персональному менеджеру и начинайте экономить. ПОДКЛЮЧЕНИЕ ВО ВСЕХ ГОРОДАХ РОССИИ. Контакты для связи: +7 (495) 668-0856 http://www.lekstel.net -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2065 bytes Desc: not available URL: From measl at mfn.org Mon Mar 28 10:29:15 2011 From: measl at mfn.org (J.A. Terranson) Date: Mon, 28 Mar 2011 12:29:15 -0500 (CDT) Subject: The American Thought Police Message-ID: I think he should have noted that *both* parties are the "one party" he's diatribing, nevertheless... //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech ------------------------------------------------------------------------- http://www.nytimes.com/2011/03/28/opinion/28krugman.html?src=twrhp Op-Ed Columnist American Thought Police By PAUL KRUGMAN Published: March 27, 2011 Recently William Cronon, a historian who teaches at the University of Wisconsin, decided to weigh in on his state.s political turmoil. He started a blog, .Scholar as Citizen,. devoting his first post to the role of the shadowy American Legislative Exchange Council in pushing hard-line conservative legislation at the state level. Then he published an opinion piece in The Times, suggesting that Wisconsin.s Republican governor has turned his back on the state.s long tradition of .neighborliness, decency and mutual respect.. So what was the G.O.P..s response? A demand for copies of all e-mails sent to or from Mr. Cronon.s university mail account containing any of a wide range of terms, including the word .Republican. and the names of a number of Republican politicians. If this action strikes you as no big deal, you.re missing the point. The hard right . which these days is more or less synonymous with the Republican Party . has a modus operandi when it comes to scholars expressing views it dislikes: never mind the substance, go for the smear. And that demand for copies of e-mails is obviously motivated by no more than a hope that it will provide something, anything, that can be used to subject Mr. Cronon to the usual treatment. The Cronon affair, then, is one more indicator of just how reflexively vindictive, how un-American, one of our two great political parties has become. The demand for Mr. Cronon.s correspondence has obvious parallels with the ongoing smear campaign against climate science and climate scientists, which has lately relied heavily on supposedly damaging quotations found in e-mail records. Back in 2009 climate skeptics got hold of more than a thousand e-mails between researchers at the Climate Research Unit at Britain.s University of East Anglia. Nothing in the correspondence suggested any kind of scientific impropriety; at most, we learned . I know this will shock you . that scientists are human beings, who occasionally say snide things about people they dislike. But that didn.t stop the usual suspects from proclaiming that they had uncovered .Climategate,. a scientific scandal that somehow invalidates the vast array of evidence for man-made climate change. And this fake scandal gives an indication of what the Wisconsin G.O.P. presumably hopes to do to Mr. Cronon. After all, if you go through a large number of messages looking for lines that can be made to sound bad, you.re bound to find a few. In fact, it.s surprising how few such lines the critics managed to find in the .Climategate. trove: much of the smear has focused on just one e-mail, in which a researcher talks about using a .trick. to .hide the decline. in a particular series. In context, it.s clear that he.s talking about making an effective graphical presentation, not about suppressing evidence. But the right wants a scandal, and won.t take no for an answer. Is there any doubt that Wisconsin Republicans are hoping for a similar .success. against Mr. Cronon? Now, in this case they.ll probably come up dry. Mr. Cronon writes on his blog that he has been careful never to use his university e-mail for personal business, exhibiting a scrupulousness that.s neither common nor expected in the academic world. (Full disclosure: I have, at times, used my university e-mail to remind my wife to feed the cats, confirm dinner plans with friends, etc.) Beyond that, Mr. Cronon . the president-elect of the American Historical Association . has a secure reputation as a towering figure in his field. His magnificent .Nature.s Metropolis: Chicago and the Great West. is the best work of economic and business history I.ve ever read . and I read a lot of that kind of thing. So we don.t need to worry about Mr. Cronon . but we should worry a lot about the wider effect of attacks like the one he.s facing. Legally, Republicans may be within their rights: Wisconsin.s open records law provides public access to e-mails of government employees, although the law was clearly intended to apply to state officials, not university professors. But there.s a clear chilling effect when scholars know that they may face witch hunts whenever they say things the G.O.P. doesn.t like. Someone like Mr. Cronon can stand up to the pressure. But less eminent and established researchers won.t just become reluctant to act as concerned citizens, weighing in on current debates; they.ll be deterred from even doing research on topics that might get them in trouble. What.s at stake here, in other words, is whether we.re going to have an open national discourse in which scholars feel free to go wherever the evidence takes them, and to contribute to public understanding. Republicans, in Wisconsin and elsewhere, are trying to shut that kind of discourse down. It.s up to the rest of us to see that they don.t succeed. From nods at yb.net.ua Mon Mar 28 05:49:02 2011 From: nods at yb.net.ua (=?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxQ==?=) Date: Mon, 28 Mar 2011 13:49:02 +0100 Subject: =?koi8-r?B?9c3FztjbwcXNIM7BzM/Hz8/CzM/Wxc7JxS4g68/Oy9LF1M7ZxSDQ0snN?= =?koi8-r?B?xdLZLg==?= Message-ID: <024E513B9C9A480BB60FFA2769A71FDA@bsacer> 29-З0 марта 2011г. ТЕМА: Оптимизация налогов в 2011г. (НДФЛ, страховые взносы, затратные механизмы в налоговых схемах) 8 (Ч95) 792._21-*22 **** 4454095 День1: Уменьшаем страховые взносы: оптимизация расходов на выплату белой зарплаты. Ставка обязательных страховых взносов с зарплаты с 2011 года составляет 34% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала ЕСН заменена отменой уплаты взносов с суммы дохода свыше 463 тыс. рублей, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: * Обзор изменений законодательства, связанных с повышением ставки страховых взносов. Сколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2011 гг. Какие схемы стали невыгодными; у каких налогоплательщиков положение даже улучшилось. * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. * Использование специальных налоговых режимов: * Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. * Использование вспомогательных организаций: * Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. * Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. * Использование процентных займов от физлиц. Расчет эффективности. * Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. * Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, * Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!), * Способы подтверждения источников крупных расходов физлиц и когда это необходимо. * Ответы на вопросы. По желанию – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. ----------------------------- День2: Затратные схемы для оптимизации налогов (НДС, Налог на прибыль) Программа: * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги сучетом будущих изменений законодательства, судебной практики и тенденцийразвития правоприменения. "Черные", "серые" и "белые"схемы. * Кто может быть участником "затратных" схем. Незаконные варианты: "недобросовестныеналогоплательщики" и контактирующие с ними риск-структуры ("белая"- "серая" - "черная" фирмы). Примеры "серых" схемс применением затратных механизмов (как нельзя "оптимизировать"!). Как нестать "недобросовестным". * Варианты затратных механизмов: * Виды приемлимых услуг и работ: Распространенные "плохие" варианты "виртуальных"услуг и работ (информационные, консультационные, маркетинговые, рекламные,ремонт...). Когда они все же допустимы. * Минимизация рисков "затратных" схем. "Явныепризнаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличиеделовых целей, "легенда", отсутствие дублирующихся функций. Грамотноеобоснование расходов и цен. Неаффилированность, прямые и косвенные признакиаффилированности, ее негативные последствия и когда она допустима; "искусственноедробление бизнеса с целью уклонения от уплаты налогов" (подход "как кЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельностьучастников "затратных" схем. * Иностранные низконалоговые компании в "затратных"схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п.Выбор низконалоговых юрисдикций. * Ответы на вопросы. По желанию и при наличиивозможности – индивидуальное экспресс-моделирование схем налоговогопланирования для компаний-участниц семинара. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 (код Москвы) 792-2|*22 или ЧЧ5_З2*66 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8019 bytes Desc: not available URL: From buh at gkrd.ru Mon Mar 28 04:27:45 2011 From: buh at gkrd.ru (=?koi8-r?B?88/L0sHdxc7JxSDT1NLByM/X2cgg19rOz9PP1w==?=) Date: Mon, 28 Mar 2011 15:57:45 +0430 Subject: =?koi8-r?B?1c3FztjbwcXNINPU0sHIz9fZxSDX2s7P09k=?= Message-ID: <000d01cbed3b$28d210e0$6400a8c0@buh> двадцать девятое марта Методы оптимизации расходов на выплату белой зарплаты: уменьшаем страховые взносы +7 (Ч95) 792.-2|*/22 \\// 792-2I22 Цель: Ставка обязательных страховых взносов с зарплаты с 2011 года составляет 34% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала ЕСН заменена отменой уплаты взносов с суммы дохода свыше 463 тыс. рублей, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь √ назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1. Обзор изменений законодательства, связанных с повышением ставки страховых взносов Сколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2011 гг. Какие схемы стали невыгодными; у каких налогоплательщиков положение даже улучшилось. 2. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. 3. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность в 2011 г.; * дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с кассовой дисциплиной и политикой ЦБ. Текущая ситуация с обложением таких доходов НДФЛ. 4. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Страхование жизни работников и ДМС за счет предприятия. 6. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. 7. Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 8. Использование процентных займов от физлиц. Расчет эффективности. 9. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 10. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, 11. Создание недоимки по налогам с ФОТ на фирме, не обремененной активами √ пример "серой" схемы (как нельзя "оптимизировать"!), 12. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 13. Ответы на вопросы. По желанию √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 (Ч95) ЧЧ5/4О_95 <> Ч/45*4-0*95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6767 bytes Desc: not available URL: From sbonniepm at matrix.com Mon Mar 28 15:19:50 2011 From: sbonniepm at matrix.com (Shaina Bonnie) Date: Mon, 28 Mar 2011 22:19:50 +0000 Subject: We are Selling Various Replica Watches, Swiss Replica Watches of Big-Name Brands which are all Made According to Genuine Ones. Message-ID: <54i26f95y87-11602478-854e8f12@rujqisgzd> Swiss replica watches: swiss movement replicas, fake swiss watches Swiss replica watches were always highly prized, but from now you can get Swiss luxury watches for the lowest prices! We are Selling Various Replica Watches, Swiss Replica Watches of Big-Name Brands which are all Made According to Genuine Ones. http://superwatchesgame.ru From measl at mfn.org Mon Mar 28 23:12:56 2011 From: measl at mfn.org (J.A. Terranson) Date: Tue, 29 Mar 2011 01:12:56 -0500 (CDT) Subject: Before cpunks there was video... Message-ID: I found this treasure while trying to identify the specific video art workshop I was attending in 1968-1970, when I left to make exclusive use of my neighbors portapak (sony BW reel/reel on a backpack frame). It's interesting in how the theories of the video arts community at the time saw the commercialization and democratization of video production much as we saw the creation of networks, protocols, and the all-mighty liberating cryptographic superstructure which would free us all. In both cases I believe we have become slaves to our saviours, albeit with an improvement of the general welfare. Enjoy. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech ------------------------------------------------------------------------- http://webcache.googleusercontent.com/search?hl=en&client=firefox-a&rls=org.mozilla%3Aen-US%3Aofficial&q=cache:Bq34mWwF-dQJ:http://www.vdb.org/resources/chrishill.html+1968+video+arts+workshop+new+york&ct=clnk This is Google's cache of http://www.vdb.org/resources/chrishill.html. It is a snapshot of the page as it appeared on Mar 9, 2011 17:49:26 GMT. The current page could have changed in the meantime. Learn more Text-only version These search terms are highlighted: 1968 video arts new york These terms only appear in links pointing to this page: workshop Attention! Production! Audience. Performing Video in the First Decade, 1968-1980 by Chris Hill 1. A radical communications paradigm for participatory democracy The argument was not only about producing new form for new content, it was also about changing the nature of the relationship between reader and literary text, between spectator and spectacle, and the changing of this relationship was itself premised upon new ways of thinking about the relationship between art (or more generally 'representation') and reality...the adequacy or effectiveness of the devices employed depends entirely upon the historical moment or "conjecture" within which they are manifest. .Sylvia Harvey 1 a. Cultural Agency and new technology Artists and social activists declared video a cultural praxis in the United States in the late '60s, a period of radical assertions fueled by a decade of civil rights confrontations, controversy surrounding U.S. involvement in Vietnam, and the rise of a new youth culture intent on consciousness expansion. Within a charged atmosphere of personal and social change and political confrontation, the production of culture was understood to be a necessary step in the development of a reinvigorated participatory democracy. The first issue of Radical Software (1970), a tabloid published by the New York media collective Raindance Corporation, asserted that video making and other "information software design" were radical cultural tools and proposed that, "Unless we design and implement alternate information structures which transcend and reconfigure the existing ones, our alternate systems and life styles will be no more than products of the existing process." 2 The video art and communications projects nurtured by this radical climate were fused into a cultural "movement" by the introduction to the U.S. market of the relatively affordable ($1500) and light weight half-inch open reel portapak in 1967-1968. In the half decade before the arrival of this mobile video production unit, art about television or its technology had entered the cultural imaginary through Fluxus artists' modified TV sets that challenged bourgeois televisual sensibilities, and art and technology exhibitions at major galleries. Speculation by the influential Canadian media theorist Marshall McLuhan on the parallel evolution of communications media and structures of consciousness fueled utopian conjecturing about a new information-based society. McLuhan's writing had particular impact on the post-war generation that grew up with television. In 1968 artists and social activists welcomed the new attentional terrain offered by the unintimidating, real-time video medium and the possibility of developing an accessible democratic communication system as an alternative to commercial television. Unified by cultural imperatives for a more open and egalitarian way of living as well as by the pragmatic need to pool equipment.portapaks, microphones, and a growing assortment of independently engineered tools.a number of artists, activists, and electronic tool designers formed working collectives. Woody Vasulka described video in 1969-1970 as, "A very free medium, and the community was very young, naive, new, strong, cooperative, no animosities, kind of a welcoming tribe. So we ganged together west coast, east coast, Canadian west and east coasts, and we created overnight a spiritual community." 3 Even before the appearance of the portapak in the late '60s, sculptors, experimental filmmakers, painters, performers, musicians, and dancers had begun to seriously challenge long-held concepts about the formal separation of specific art disciplines and interpretive discourses. Some would eventually include video in their interdisciplinary investigations. Starting in the late 50s, Happenings expanded paintings into interactive environments, engaging those aspects of art which, "Consciously intended to replace habit with the spirit of exploration and experiment." 4 By the late '60s some members of the counterculture involved with the absorbing psychedelic underground of music, experimental film, theater, and light shows found video to be a provocative new moving image and installation medium. Sculptors who had been working within the emerging vocabulary of post-minimalism found video to be a medium with which they could foreground the phenomenology of perceptual or conceptual process over the aesthetic object or product. Artists participating in the "high" art gallery and museum spaces as well as those positioned in the clubs, concerts and mass cultural scenes found reasons to explore the new moving image and sync sound medium. The manifestos and commentary by those caught up in the early video movement of 1968-1973 reflected an optimism stemming from the belief that real social change was possible; they expressed a commitment to cultural change that bordered on the ecstatic. During this heady period political theorists, artists, and activists delivered powerful arguments for a participatory democracy. The possibility of working for radical social change was conflated with the task of personal change and with imperatives to explore one's consciousness through music, art, drugs, encounter groups, spirituality, sexuality, and countercultural lifestyles. The valorization of "process" and "an almost religious return to experience" was shared by both political and cultural radicals of the late '60s, even though their agendas and strategies varied considerably. 5 Much of the enthusiasm expressed about the "process" available to artists and audiences through the new portable video technology centered on instant replay and immediate "feedback" of one's experience. The social and cultural challenges of the '60s were, "A disruption of late capitalist ideology, political hegemony, and the bourgeois dream of unproblematic production." 6 The decade opened with the beginning of the civil disobedience phase of the civil rights movement and the formation of the Student Non-Violent Coordinating Committee (SNCC), which organized interracial Freedom Rides to integrate restaurants and restrooms in the South in 1961. According to Todd Gitlin, sociologist and '60s activist, "The [civil rights] movement's rise and fall, its transmutations from southern nonviolence to black power, its insistence on the self-determination of the insulted and injured, was the template for every other movement of the decade." 7 Influenced by SNCC's egalitarianism, where middle class and poor struggled together, Students for a Democratic Society (SDS) in 1962 issued the Port Huron Statement which called for a "participatory democracy" based on "love and community in decisions shaping private lives." This New Left asserted that necessary social change would come about only by replacing institutions of control, not by reforming them. 8 The civil rights movement, SDS, the growing anti-war movement, and community organizing around urban poverty provided activist models that would challenge the generation coming of age in the mid-'60s to interrogate institutionalized authority, national priorities, and conventional expectations of personal satisfaction and class privilege. On college campuses teach-ins, information sharing, and local organizing around issues of housing, health, and legal rights offered practicums for a radically revised education for living. By 1968, 50% of the population was under 25, and across the country young people were swept up in the intoxication of the expanding and celebratory counterculture, its music, and its libertarian lifestyle choices. Although deep divisions between political radicals and lifestyle radicals remained throughout the decade, the country experienced a profound transformation of cultural relations in their wake. As part of the progressive dialogue on college campuses between 1968 and 1973, tracts by writers like Herbert Marcuse were broadly circulated and discussed. They described the media as a "consciousness industry" responsible for the alienation of the individual, the commodification of culture, and the centralized control of communications technologies. In his widely read books, One-Dimensional Man (1964) and An Essay on Liberation (1969), Herbert Marcuse identified a relationship between the consciousness of the individual and the political, asserting that "radical change in consciousness is the beginning, the first step in changing social existence: the emergence of a new Subject." This new citizen, aware of and actively dealing with "tragedy and romance, archetypal dreams and anxieties" would be less susceptible to "technical solutions" offered through contemporary society's homogeneous "happy consciousness." 9 Marcuse's utopian ideas supported other mandates for consciousness expansion and change and validated the role that personal agency should play in accomplishing social change. By 1969, through confrontation and consciousness raising.the sharing and study of personal experience and history.blacks and women declared themselves new historical "subjects." Strategizing around separatism and alliances, their liberation movements developed solidarity with other U.S. and international movements as global awareness permeated their public discourse. The gay rights movement, born after the 1969 Stonewall confrontation, and the American Indian Movement (AIM) also asserted political and cultural identities through public actions and networking during the early 19'70s. These new movements focused both on histories of economic exploitation and systemic cultural domination. The Port Huron Statement had demanded a less alienated society and claimed a definitive subjectivity for the generation coming of age in the '60s; these new movements also sought profound transformation in both socioeconomic and cultural relations. Although the New Left and the anti-war movement in the late '60s had close ties with progressive documentary filmmakers, such as the film collective Newsreel, their information was disseminated by an extensive underground press.10 The Left learned to regard the mainstream media, including commercial television, with distrust. Planning for the 1968 anti-war protests in Chicago during the Democratic National Convention did include strategizing around national press coverage, but it was fringe groups like the Yippies that specifically sought confrontation with and coverage by commercial media. Forays into network broadcasting, such as the Videofreex collaboration with CBS on the aborted 1969 Subject to Change project revealed the industry's contradictory aspirations for new broadcast programming and reinforced alternative video makers' wariness of corporate television. By the early '70s video theorists writing in Radical Software along with Marxist critics Todd Gitlin and German socialist Hans Magnus Enzensberger outlined arguments for an alternative, independent electronic media practice. In 1970, building on ideas developed earlier by Bertolt Brecht about the corporate structure of radio communications, Enzensberger critiqued the asymmetry between media producers/transmitters and media consumers/receivers. The radio and television industries had centralized and controlled access to the production, programming, and transmission of media, and limited those individual receivers to participation as consumers. However there was nothing inherent in the technology that could not support a more reciprocal communications system such as, for example, the telephone. Enzensberger concluded that new portable video technology set the stage for redressing this contradiction: For the first time in history the media are making possible mass participation in a social and socialized productive process, the practical means of which are in the hands of the masses themselves. Such a use of them would bring the communications media, which up to now have not deserved the name, into their own. In its present form, equipment like television or film does not serve communication but prevents it. It allows no reciprocal action between transmitter and receiver; technically speaking, it reduces feedback to the lowest point compatible to the system. 11 Such political analysis was generally overshadowed at the time by the popular views of media theorist Marshall McLuhan, whose books on the history of communications technologies were widely discussed by the national media. McLuhan wrote in Understanding Media (1964) that human history was a succession of technological extensions of human communication and perception where each new medium subsumed the previous technology, sometimes as an art form. Through the inherent speed and immediacy of electronic video technology, television had become an extension of the human nervous system. His notion of television's "flowing, unified perceptual events" bringing about changes in consciousness spoke directly to the contemporary psychedelic drug experience as well as to artists experimenting with new electronic visualizations. His aphorism "the medium is the message" suggested that consciousness change was brought about primarily through formal changes in communications technologies rather than the specific content delivered by those media, which resonated with the concentrated formalist investigations practiced in the contemporary arts. Although McLuhan's and others' prescriptions for technological utopia appeared poetic to many, he popularized the notion of television, a "high participation" as a generational marker and as a potentially liberatory information tool in the hands of the first generation that had grown up with it. McLuhan did not address ways of restructuring a more democratic telecommunications system, but he inspired others to apply his ideas to using the new video medium. The belief that new technologies would inspire and generate the foundation for a new society was underwritten in part by the American post-war investment in the grand cultural imperative of science, which had brought about the international green revolution in agriculture and the space race. Americans had landed on the moon in 1969, in the "biggest show in broadcast history." 12 The rational spirit of science resonated in a series of art and technology exhibitions at major museums. Critic Susan Sontag articulated this "new sensibility" in the arts: What gives literature its preeminence is its heavy burden of 'content,' both reportage and moral judgment...But the model arts of our time are actually those with much less content, and a much cooler mode of moral judgment - like music, films, dance, architecture, painting, sculpture. The practice of these arts.all of which draw profusely, naturally, and without embarrassment, upon science and technology.are the locus of the new sensibility. In fact there can be no divorce between science and technology, on the one hand, and art, on the other, any more than there can be a divorce between art and the forms of social life. 13 Enthusiasm about new technologies.computers and the information-based society they might anticipate, and theorizing on human evolution, cybernetics, human perception, ecology, and transformable environments.appeared at a time when post-war economic growth generated confidence and society seemed to be capable of radical change. Through the writing of McLuhan, Norbert Wiener, Buckminster Fuller, Gregory Bateson and others 14 the intersection of information and systems theory with biological models provided intellectual references about communications and human potential for a generation that had grown up with the increasing availability of powerful and expressive personal tools.cars, televisions, transistor radios, 35mm and 8mm movie cameras, electronic musical instruments, and now video cameras. The mixed metaphors of science, biology, and revolution, dubbed "cyber-scat" by critic David Antin 15 are evident in Michael Shamberg's description of "Media-America": It may be that unless we re-design our television structure, our own capacity to survive as a species may be diminished. For if the character of our culture is defined by its dominant communications medium, and that medium is an overly centralized, low-variety system, then we will succumb to those biologically unviable characteristics. Fortunately techno-evolution has spawned new video modes like portable videotape, cable television, and videocassettes which promise to restore a media-ecological balance to TV. 16 b. Early video collectives and access to cable and public broadcast TV The video collectives that formed between 1968-1971 embraced the new portable video technology and assumptions about the need for cultural and social change that could include humanely reconfigured technologies. The individual groups were bonded by the practical need to share technical resources, and to collaborate on the many tasks required for productions. Some of the video collectives functioned as communes, with members living together as well as working regularly with video. Parry Teasdale, a member of the Videofreex, recalled "the video medium ...was part of the concept of enjoyment as well as experimentation, as well as art, as well as politics, all those things." 17 Philip Mallory Jones described his involvement with the Ithaca video community, initially as a member of a video-producing commune: "For me it was a two way thing. There was the individual vision and the individual maker working with a set of tools to do something. The tools were something I could get access to one way or another, without a lot of money. The other concern was the serious business of making revolution. These things were not separated. These things were a part of everybody else's concern too." 18 The expansion of these various collectives into an informal national network of producers with common interests can be traced through the "Feedback" sections of the early issues of Radical Software, published by the New York City collective Raindance. The masthead from the first issue articulates the broad aspirations of the editors' proposed cultural intervention: "Videotape can be to television what writing is to language. And television, in turn, has subsumed written language as the globe's dominant communications medium. Soon accessible VTR [video tape recorder] systems and videocassettes (even before CATV [cable antenna television] opens up) will make alternate networks a reality." 19 Manifestos about making video with portapaks and practical user information were made available through publications like Radical Software (1970-1976) which reported on video-making initiatives in art, education, psychotherapies, and community building. Hands-on technical guides like Spaghetti City Video Manual (1973) and Independent Video (1974) demystified the technology, encouraging independent problem-solving and self-sufficiency with video tools. These publications were critical in promoting a vision of radicalized personal communications, providing an education for the unsophisticated and curious, and identifying a network of fellow enthusiasts. Their pragmatic approach to the present and sometimes utopian visions for the future were shared by others who examined and challenged the delivery of basic institutional systems.education, communications, government, health.and envisioned new grassroots configurations which often centered on new or reconfigured technologies. The first edition of the widely referenced Whole Earth Catalog (1969) begins with a section on "understanding whole systems," including communications, featuring descriptions of Super-8 filmmaking and audio synthesizer construction and describing the role that accessing and understanding tools might play in a new society: "So far, remotely driven power and glory.as via government, big business, formal education, church--has succeeded to the point where gross defects obscure actual gains. In response to this dilemma and to these gains, a realm of intimate, personal power is developing.power of the individual to conduct his own education, find his own inspiration, shape his own environment, and share adventure with whoever is interested. Tools that aid this process are sought and promoted by the Whole Earth Catalog." 20 Most of the early video collectives developed projects which articulated production and reception as essential structural components of their telecommunications visions, reflecting a pragmatic need for new exhibition venues that would accommodate video makers' aspirations as well as the period's recognition of the politicization of culture. Specific audience feedback structures were envisioned which exercised portable video's capacity to render real time documentations of everyday events, perceptual investigations, and experimental tech performances. These structural concerns combined with the imprecision of early video editing initially overshadowed the production of a singular tape. The work of the early collectives reveals their acknowledgement of video as social relations.managing or guiding the attention of viewers, directly engaging viewers in some aspect of the expressive, performative or production process, and educating audiences as new users. The often-stated goal of radicalized communications was further reflected in the early collectives' strategies for the distribution of information they produced. Tape libraries, tape exchanges, and mobile services were established, the print media.journals and books.were considered important adjunct communications "software," experimental video labs and theaters accommodated interactive screenings, and transmission using low power broadcast, cable television, and public broadcast television was explored. The diverse "cultural data banks" inventoried in the early issues of Radical Software were maps of the counter cultural imagination of the time, such as: "Dick Gregory speaking at San Jose State College 11/69" by Electric Eye; Eric Siegel's tapes made with his Psychedelevision color video synthesizer; "a tour of el barrio by a Minister of the Young Lord's Party" and "Gay Liberation Day" by People's Video Theater.21 Enzensberger recognized the radical potential of video data banks to be a "memory-in-readiness" for a changing society, and contrasted it with class-based notions of intellectual "heritage."22 These pioneering recordings were documentations of the counterculture, by the counterculture. Like home movies, they were a collection of personal experiences, but unlike those private records, these tapes were contributions to an information bank from which anyone could draw, where no one person was specifically credited with having produced the tape. The contents of the video libraries posted in Radical Software were not commodities for sale, but participated in an alternative cultural economy that valued information exchange for imaging a new society. The cultural exchange performed through the production/reception configurations of early collectives' projects varied according to specific agendas and sites of operation. In New York, Raindance Corporation was the video movement's self-described research and development organization. Raindance also was responsible for Radical Software (1970-74), the chief networking tool and theoretical organ, Guerrilla Television (1971) by Michael Shamberg, and Video Art: An Anthology (1976), edited by Ira Schneider and Beryl Korot. People's Video Theater was founded by Ken Marsh, an artist working with light shows, and Elliot Glass, a language teacher videotaping his students' conversations in Spanish-speaking neighborhoods in New York. They videotaped interviews and events on the streets of New York during the day and invited interviewees to their loft "theater" in the evening for screenings and further discussions as part of "activating the information flow."23 PVT's interactions took the form of community "mediations" where points of view on a particular issue would be researched and recorded, then played back for politicians, community leaders, and neighborhood people as part of the negotiating process. Ken Marsh regarded video production at the time as an aspect of citizenship. "The rhetoric that we subscribed to was that 'the people are the information'... Everybody could do it and everybody should do it. That was the mandate-pick it up, it's there. Like the power to vote-vote, take responsibility. Make it and see it."24 Video Free America documented the West Coast counterculture-including Buckminster Fuller's World Games in Washington state and a yoga festival in Golden Gate Park-and these tapes were screened to audiences at their production and exhibition facility in San Francisco. After shooting a frisbee competition as a parody of television sports coverage, Arthur Ginsberg had the idea of examining the porn industry, which developed into an ongoing video veriti installation on love, marriage, and living with media, Carel and Ferd, a countercultural precursor of the controversial PBS documentary series An American Family. In 1972, the Videofreex, a New York City collective, moved to the Catskills, renamed themselves Media Bus, and began broadcasting live and recorded programming each week over a low power, pirate TV station to their tiny community in Lanesville, New York. Visitors interested in using their editing system or viewing tapes from their extensive library were welcomed at their communal home, Maple Tree Farm. Media Bus travelled around New York state giving workshops in live and recorded video production for artists, educators, and civic officials. Another seminal group formed around experimental filmmaker and dancer Shirley Clarke; her T.P. Video Space Troupe (NY) produced interactive exercises and events using video, dance, and performance, which served as a video training model. One of Clarke's exercises, with local social service projects and screened their sometimes controversial a sunrise project, concluded when participants reconvened at her Chelsea Hotel rooftop apartment at sunrise to replay the evening's portapak documentation of New York's nightlife. A little further west, the Ithaca video commune collaborated programming in bars and bookstores, generating discussion about local and national issues as well as educating local audiences to the possibilities of portable video. Philip Mallory Jones and others eventually initiated the Ithaca Video Festival, the first touring video festival (1974-1984) and an important showcase for early video art and documentary. At Antioch College in Ohio an active national tape exchange was maintained by students through their Community Media Center. At the Antioch Free Library people were welcome to borrow tapes or add their own tapes to the collection. Through the college's alternating semesters of work and school and its new program in communications, media students became actively involved in planning and establishing public access cable operations all over the country. Alongside the inspiration of the portapak, the burgeoning cable television industry was heralded as a promising technological development by artists writing in Radical Software, as well as community activists, and urban policy planners. Portable video technology could introduce non-professional people to production, and cable television companies which contracted with individual municipalities could use their local systems to disseminate citizen-generated and community-responsive programming. Public access provisions were understood as incentives to potential municipal clients by cable companies, anxious to expand into new markets in the early '70s, and as a negotiated resource in exchange for the companies receiving access to municipal infrastructures (utility poles, right-of-way to lay cable) by public policy planners and community media activists. Citizens' access to cable TV could begin to develop the media voices for those largely unrepresented by commercial television, as well as encourage cultural consumers to become cultural producers. In a 1970 issue of The Nation, Ralph Lee Smith chronicled the competition among broadcast TV, cable TV, and the telephone companies for a "wired nation." Smith cited post-war federal commitment to building the interstate highway system as a precedent for mandating similar planning in the public interest for the development of an "electronic highway" in the '70s. Smith's prescient article concluded: "It is hard to assign a dollar value to many or most of the educational, cultural, recreational, social and political benefits that the nation would receive from a national communications highway. It is easier to assert the negative-that the nation probably cannot afford not to build it...It cannot be assumed that all the social effects of the cable will be good. For example...the cable will make it less and less necessary for the more affluent population of the suburbs to enter the city, either for work or recreation. Lack of concern and alienation could easily deepen, with effects that could cancel the benefits of community expression that the cable will bring to inner-city neighborhoods. At the very least, such dangerous possibilities must be foreseen, and the educational potential of the cable itself must be strongly marshaled to meet them..."25 The "benefits of community expression" cited by Smith are echoed in "Minority Cable Report," written for Televisions magazine. Roger Newell argued for minorities' stake in the cable business and community projects that would keep the public informed and also "operationally involved." He pointed out that in the findings of the 1968 National Advisory Commission on Civil Disorder (the Kerner Commission), "Blacks interviewed by investigators for the commission felt that the media could not be trusted to present the true story of conditions that led to the riots." Furthermore, "proponents of the use of cable in minority communities saw it as the clear alternative to commercial broadcasting ... Cable gives us a second-and perhaps last-chance to determine whether television can be used to teach, to inspire, to change humans' lives for the better. The task will be demanding and expensive."26 The movement to develop public access to cable in the United States initially centered around New York University's Alternative Media Center (AMC) and George Stoney, who had directed the Canadian National Film Board's Challenge for Change from 1968-1970, a project which encouraged "community animation" by training people to use media to represent themselves and local issues to government agencies. Dorothy Henaut and Bonnie Klein describe the investment of citizens participating in Challenge for Change in the first issue of Radical Software: "Half-inch video allows complete control of the media by the people of a community. They can use the camera to view themselves and their neighborhood with a new and more perceptive eye; they can do interviews and ask the questions more pertinent to them; they can record discussions; they can edit tapes designed to carry a particular message to a particular audience-an audience they have chosen and invited themselves." 27 Stoney worked with other video activists taking portapaks into New York City neighborhoods, strategizing with city officials, federal regulators and cable companies, and speaking out at public hearings about the need to establish diversity of programming voices in order to prevent cable from becoming a copy of commercial broadcasting. In 1970 Stoney and Red Burns founded the Alternate Media Center at New York University with support from the Markle Foundation and, shortly thereafter, the National Endowment for the Arts, to train organizers to work with interested community groups, cable companies, and city governments to develop public access to cable TV around the country. Descriptions of tapes made by Alternate Media Center interns in Washington Heights, one of the first neighborhoods in Manhattan to be cabled, indicate their commitment to process-oriented productions and the viability of community participation in cable television: Tape 190: Black Response to Riots 9/25/71. Cabled: Teleprompter, Sept 14, 16, 18. Because of an article in the NY Times about Dominican and black gangs fighting, Joel went up to 164th St. and Amsterdam Ave. to see if videotape could be used in any way to help in this situation possibly by using tape to get information to both sides, possibly putting this information on public access to bring the communities' attention to this incident. It was the first time Joel had gone out alone, so he gave the mike to the people because he had no partner to take sound. At the beginning, Joel asked questions, but then the people just started relating to each other and totally ignored Joel. He felt they really wanted to get something out and had a strong need to speak. He played the tape back for the people through the camera and they dug it...The stereotyped image of a Black voice is destroyed by the information on the tape showing the difference of views. People talk to each other as well as to the camera. 28 In 1972 the Federal Communications Commission (FCC), under the leadership of Nicholas Johnson, issued regulations which required every cable system with 3,500 or more subscribers to originate local programming and to provide one dedicated, non-commercial public access channel, available without charge at all times on a first-come, first-served, non-discriminatory basis to carry that programming. At that time the cable industry had a 7% penetration of U.S. households. This legislation provided the groundwork from which citizens, municipalities, or cable companies could initiate public access programming, and establish equipment and training resource centers all over the country. Cable access facilities typically supported local production by providing consumer video equipment, training, and programming access to cable channels; they were funded primarily by mandated fees paid by cable companies to cities. In 1976 former AMC interns established the National Federation for Local Cable Programmers (NFLCP), an umbrella organization whose newsletters and conferences generated communication and ongoing education within the growing number of centers. The NFLCP continued to support citizens, municipalities and cable companies interested in initiating public access to cable facilities around the country, and their legislative and grass roots advocacy impacted significantly on national communications legislation throughout the decade. By 1986 there were over 1,200 public access facilities in the United States, actively supporting productions and programming by the public on cable TV. 29 Although cable could reach potentially large television audiences, not all communities were cabled. And because cable companies charged viewers, many households chose not to subscribe. Local public television stations were also potential distribution outlets for video producers. The stand-alone time base corrector appeared on the market in 1973; by stabilizing the signal of 1/2" open reel tapes, it effectively ended technological objections to broadcasting portable video. As video began to replace film for news productions, independents using portable video equipment began calling for more diversity in points of view, challenging existing union policies as well as programming policies. Video groups began working with local PBS stations-Portable Channel with WXXI in Rochester (New York) and University Community Video with KTCA in Minneapolis-to produce news and documentaries specifically for local broadcast audiences. Technical developments-portability, color video, 3/4" U-matic cassette format, CMX computer video editing-all enhanced video production throughout the decade while raising a complex of issues around independents' access to new technologies and broadcast TV's audiences. Public libraries were pioneers of community video activity-extending their mission by loaning out portapaks, collecting and screening tapes, and advocating for public access to cable. Public libraries in Port Washington, the Cattaraugus-Chautauqua Public Library in Jamestown, and Donnell Library in New York City, became notable sites for videotape production and dissemination. Port Washington Public Library's video director Walter Dale asked the questions: "Could the library maintain in the area of video those qualities it fought for in print; namely, the right to read all views and expressions? Could the library become a true catalyst for the free market place of visual as well as printed expressions?" 30 To Dale, the answer was yes. Reflecting back on the formative period (1968-1973) both technological utopians and social historians testified to an inspired engagement with the possibilities of a new society. Hans Magnus Enzensberger commented on 1968, when "... utopian thinking seemed to meet the material conditions for its own realization. Liberation had ceased to be a mere wishful thought. It appeared to be a real possibility." 31 Videofreex member Parry Teasdale recalled the imperative to make a commitment: "Without understanding the dynamics of the war in Vietnam and what that did to society; I don't think you can understand video ... it spawned the technology and it created the necessary groundwork for an adversarial relationship within the society that defined sides so clearly that people could choose and choose righteously to be a part of something." 32 Ralph Lee Smith looked back on his first encounter with advocates for public access cable TV: "Those people were.applying not just technology but appropriate technology. That is to say they were adopting enough of the technology, at a level of expression which was just adequate to do the job and no more, to achieve what they wanted to achieve...They were way ahead of their time." 33 Woody Vasulka recalled a time when many welcomed, "A new society that would be based on a new model ... a drive for personal enlightenment ... the possibility of transcendence through image as an actual machine-made evocation ... Some thought of this as a healing process or ... a restructuring of one's consciousness." 34 Despite the limits to change eventually encountered by the early video practitioners, widespread questioning of fundamental ideological and lifestyle choices did inspire the invention of experimental community structures and economies founded on the use value of media production. Such emphatic commitments focused a radical subjectivity which identified itself as an alternative to the "alienated" and spiritually bankrupt bureaucratic mainstream. Collectives and networked individuals invented new cultural forms and nourished an energy which focused, invigorated, and sustained productive social scenes. Existing institutions-television networks, museums, schools, libraries-were challenged to respond to the interests and needs of their audiences, markets, and users. Optimistic about the role the new media technology could play in a new society, these early video tribes committed themselves to the performance of a radically de-centralized and potentially more democratic electronic communication practice. This alternative vision of decentralized media culture(s) was funded starting in the early '70s as not-for-profit artists projects, artist-run spaces, video access centers, and public access cable facilities by federal, state and local arts councils, private foundations, public television and cable companies. c. Invisible histories- reconstructing a picture of decentralized media practice Few of the tapes from the immense body of work produced by these early collectives and access projects have been restored and are available today. Most open reel tapes from this period are in desperate need of preservation. Archivist Roger House recently described "Inside Bed-Stuy," one of the first black-produced community access shows (1968) as revealing "a community in the midst of trying to speak to itself, articulate its needs, appreciate its creativity, and urge its residents to rise to the challenges of the times." He commented on "how healthy it was to see average people of all ages, in splendid plainness of speech and appearance, speaking out on the Vietnam war, unemployment, urban blight, black capitalism, and black power." 35 Much research is needed to identify, recover, and evaluate a comprehensive history of the alternative video culture from this period. Videotaped documentation of community "process" set out to establish a media vocabulary for a new way of speaking in American society. Why have so many of these tapes been relegated to the back shelves of social and educational institutions and producers' attics? Part of the answer lies in the social and institutional dynamics of any cultural scene. Almost any cultural production, whether destined for a museum or a living room via public access cable, depends on intersecting social and institutional systems that construct the motivation for the work's production, and the distribution or exhibition vehicle which connects it with an audience, all contributing to its value and meaning. In working to establish a decentralized media practice that had more to do with practice and process than product, especially in the early '70s, producers consciously positioned themselves on the cultural margins. Many of these early initiatives were undertaken by members of minority groups or geographically isolated communities, which had never established cultural currency outside their local scenes. Many of these early communications projects were intended to be narrow-casted to specific audiences, and conceived essentially to intersect with locally constructed social and cultural territory. Are these challenges to existing limitations imposed by class, race, age, and gender less legible today? Contemporary viewers may require a context explaining the previous generation.s commitment to process, lack of narrative closure, and rough editing. Cultural theorist Fredric Jameson claimed at the end of the '70s: "Authentic cultural creation is dependent for its existence on authentic collective life, on the vitality of the 'organic' social group in whatever form...[The] only authentic cultural production today has seemed to be that which can draw on the collective experience of marginal pockets of the social life of the world system...and this production is possible only to the degree to which these forms of collective life or collective solidarity have not yet been fully penetrated by the market and by the commodity system." 36 Jameson cites women's literature, black literature, and British working class rock as examples of this authentic collective life, but the alternative video scenes efforts to realize a new citizen-based, locally-responsive media culture across the United States at the time would also qualify. 2. Video art practice and its interpretive strategies "A few years ago Jonas Mekas closed a review of a show of videotapes with an aphorism to the effect that film is an art but video is a god. I coupled the remark, somehow, with another, of Ezra Pound's; that he understood religion to be "just one more unsuccessful attempt to popularize art." Recently though I have sensed a determination on the part of video artists to get down to the work of inventing their art, and corroborating their faith in good works...A large part of that work of invention is, I take it, to understand what video is." .Hollis Frampton 37 "Perceptual and structural changes...have to go with relevance rather than forms. And the sense of a new relevance is the aspect that quickly fades. Once a perceptual change is made, one does not look at it but uses it to see the world. It is only visible at the point of recognition of the change. After that, we are changed by it but have also absorbed it. The impossibility of reclaiming the volitivity of perceptual change leaves art historical explanations to pick the bones of dead forms. In this sense, all art dies with time and is impermanent whether it continues to exist as an object or not." .Robert Morris 38 a. Post-minimalist perceptual relevance Although they often remarked on the pleasure of working in aesthetic territory that was open to new gestures and a new critical vocabulary, the first artists to explore new video technology in the late '60s were educated through minimalism's measured structures and procedures and shared late modernism's investment of the "real" in the materials of art making. The mid-'60s saw a shift if not a crisis in contemporary modern art predicated on a radical reassessment of aesthetic foundations and a politicized evaluation of the institutional delivery system for art. Critic Clement Greenberg's reigning tenets of post-war modernism argued that art was, "An escape from ideas, which were infecting the arts with the ideological struggles of society," and that, in contemporary art, "A new and greater emphasis upon form...involved the assertion of the arts as independent vocations, disciplines, and crafts, absolutely autonomous, and entitled to respect for their own sakes..." 39 This description of an art object, whose integrity was specific to a discipline and which was intended to be appreciated in isolation from the complex social and cultural contexts of its making, had begun to be challenged in the late '50s. The multi-disciplinary, participatory nature of Happenings, the invasion of mass media via parody in Pop Art, and the aberrant humor of "intermedia" Fluxus projects fractured audience expectations of what had been considered normative conditions for art making. While many modernist artists began the '70s by investigating the "essential" properties of video, by the end of the decade the confluence of "high" and "low" art forms, the performance of radical subjectivities, and shifting attitudes toward cinema, television and narrative would set in motion competing cultural agendas for video-makers. By the mid-'60s painters, sculptors, filmmakers, musicians, and dancers were not only embracing interdisciplinary work but also contributing important critical perspectives, articulating their own working assumptions in major art journals like Artforum. Fluxus artist Dick Higgins argued in 1965 for the "populism" and "dialogue" of "intermedia" and against "the concept of the pure medium, the painting or precious object of any kind." 40 Conceptual art, articulated by artists like Sol LeWitt, minimized the importance of objecthood altogether in the aesthetic exercise. Participating in this debate critic Michael Fried wrote in 1967 that, "In previous [modern] art what is to be had from the work is located strictly within it," and the art object should occupy a privileged meditative space. He objected to the "degenerative theatricality" of new process-oriented works of art that acknowledged the viewer and were "concerned with the actual circumstances in which the beholder encounters work." 41 However other critics, such as Annette Michelson, heralded post-minimalism for acknowledging "temporality as the condition or medium of human cognition and aesthetic experience." 42 And Lizzie Borden pointed out that the value of considering the perceptual phenomenology of an art event "underline[d] its actual way of working with the viewer" which amounted to the "liberation of the art object from the idealization of critical theory." 43 Sculptor, performer, and sometime video-maker Robert Morris traced the shift from his early minimalist project of describing objecthood to a post-minimalist articulation of the new "landscape" of material and perceptual processes: "What was relevant to the '60s was the necessity of reconstituting the object as art. Objects were an obvious first step away from illusionism, allusion and metaphor... [However] object making has now given way to an attention to substance...substances in many states-from chunks, to particles, to slime, to whatever...Alongside this approach is chance, contingency, indeterminacy-in short, the entire area of process...This reclamation of process refocuses art as an energy driving to change perception...What is revealed is that art itself is an activity of change, of disorientation and shift, of violent discontinuity and mutability, of the willingness for confusion even in the service of discovering new perceptual modes." 44 This attention to the process of working with specific materials and art making as a way of changing perception itself constituted "a dialectic between structure and meaning which is...sensitive to its own needs in its realization." 45 This phenomenological dialogue was articulated through an essentially formal vocabulary that attempted to focus precise attention on fundamental structures and procedures involved in producing work, more akin to science than poetics. Experimental filmmaker Paul Sharits described the critical vocabulary brought to bear on non-narrative film of the '60s, a way of speaking about work which was adopted by the early video makers: It is noteworthy that during the 1950s and 1960s a relatively successful vocabulary ("formalism") was employed by critics of painting and sculpture. It was a mode which by-passed the artists' intentions, dismissed "poetic" interpretations, and focused on apt descriptions of the art object; the aim was a certain discrete "objectivity." 46 Experimental film, like sculpture and painting, had been grounded in modernism's materials-based formal vocabulary and was strictly anti-illusionist (vis a vis the Hollywood narrative), and video makers would assume this bias for their camera-based medium as well. Filmmaker Malcolm LeGrice commented on experimental film's investment in the descriptive reality of physical materials and viewers' perception in 1977: "The historical development of abstract and formal cinema ... seeks to be 'realist' in the material sense. It does not imitate or represent reality, nor create spurious illusions of times, places and lives which engage the spectator in a vicarious substitute for his own reality." 47 Artists and critics were re-examining fundamental assumptions about modern art which for decades had been isolated within a personal contemplative moment and removed from popular culture and mass media. Hermine Freed remarked: "Just when pure formalism had run its course; just when it became politically embarrassing to make objects, but ludicrous to make nothing; just when many artists were doing performance work but had nowhere to perform, or felt the need to keep a record of their performance;...just when it became clear that TV communicates more information to more people than large walls do; just when we understood that in order to define space it is necessary to encompass time, just when many established ideas in other disciplines were being questioned and new models were proposed, just then the portapak became available." 48 b. Immediacy, process, feedback In step with late modernism's imperative to explore the essential properties of materials, video makers were initially rhapsodic about the inherent properties of the medium, such as immediacy and real time feedback. Compared to film, videotape was inexpensive, immediate, and recyclable like audiotape. Editing videotape between 1968-1971 was primitive; aesthetic strategies and narrative constructions that relied on precise editing emerged only with the development of more sophisticated editing equipment and eventually access programs available through media art centers, TV labs, and public access centers. During this early period, the simultaneous recording and exhibition of events in "real time" or the real time "synthesis" of images using analog electronic instruments dictated the structure of the work. Early tapes using these time-based instruments foregrounded duration itself, along with the mapping of attention over time, and relationships between space/time and sound/time. Critic David Antin discussed at length early video makers' calculated denial of the attentional framework, or "money metric," of television. 49 Joanna Gill, writing for the Rockefeller Foundation in 1975, described these early video works as "information/perception pieces," projects determined to expand the limits of viewers' ability to perceive themselves in video-mediated environments. 50 The mapping of perceptual, social and/or technological "processes" was valorized above the tape as an art "product." Early video projects often took the form of installations-configuring cameras, monitors, and/or recording decks with immediate or delayed playback, a common adaptation of an open reel tape recorder accomplished by creating a tape loop between the record and playback heads on one or more decks. Wipe Cycle, a multi-monitor installation by Ira Schneider and Frank Gillette, part of Howard Wise's historic 1969 exhibition TV as a Creative Medium, featured an 8-second tape loop whereby people entering the gallery encountered delayed images of their own arrival played back to them on a bank of monitors. The artists described the installation as an "information strobe" in which "the most important thing was the notion of information presentation, and the notion of the integration of the audience into the information." 51 Antin, writing about this installation said that "what is attempted is the conversion (liberation) of an audience (receiver) into an actor (transmitter)." 52 Other artists pursued these ideas throughout the decade. Dan Graham, for example, structured "consciousness projections" which featured technical and human feedback and delay systems in which the audience could explore its apprehension of present and past time, subjective and objective information. Graham wrote: "Video is a present time medium. Its image can be simultaneous with its perception by/of its audience (it can be the image of its audience perceiving).video feeds back indigenous data in the immediate, present-time environment or connects parallel time/space continua. 53 Through the use of videotape feedback and tape delay the performer and the audience, the perceiver and his process of perception, are linked, or co-identified. The difference between intention and actual behaviour is fed back on the monitor and immediately influences the observer's future intentions and behaviour. By linking perception of exterior behaviour and its interior, mental perception, an observer's 'self', like a topological moebius strip, can be apparently without 'inside' or 'outside.'" 54 Video artists exploited the phenomenon of video "feedback," a specific artifact of video tools, accomplished by pointing a video camera at a monitor which produces an infinite tunnelling or mirroring effect. Besides being an easily produced and mesmerizing psychedelic effect, feedback expressed an essential concept in information systems theory. The feedback effect was a powerful metaphor for the ability of a self-monitoring information system to function as an organic or self-regulating physical system. It was invoked by artists in investigations of duration, information exchange and modification, the phenomenology of self and the everyday, and relationships with audiences. Strategies using information feedback were also employed by community activists interested in models of participatory social mediation and political advocacy where citizens could represent themselves and deliver their messages as a kind of extended dialogue with public officials on video, the image currency of the time. The portability and unity of image and sound represented by the portapak meant that the video cameraperson could approach documentation in terms of his or her ability to enter into a relational process with a constantly evolving situation. Bob Devine commented on how the attention of the cameraperson constructed the event: "There are qualities which distinguish the sort of tape in which resonance or receptivity predominates. The takes tend to be unbroken. The point of view has the unity of a single continuous interactive perspective. The camera moves through and among; it does not define space with fronts, backs, sides or even frame-edges, but instead "occupies" the interior of the space and presents a structural awareness of that interior. The camera is distractible; it reacts, is drawn through attention to particular features or interactions. The tape represents a record of the focus of receptive attention in the taping context. Attention is edited in real-time." 55 c. The electronic material of video and the development of tools Artists working directly with the technologically charged environment of this time-based medium generated a discourse celebrating the particular processes of electronic image-construction. The video camera transforms light and sound information into the video and audio signals as waveform, frequency and voltage, which can be displayed on a cathode ray tube-a television monitor-or magnetically encoded and stored on videotape. Woody and Steina Vasulka articulated their video project in 1975 as primarily a "didactic" one, an inquiry into developing a "vocabulary" of electronic procedures unique to the construction of a "time/energy object." 56 Other artists also dedicated aesthetic and scientific research into interfaced electronic tools, anticipating what would be the television industry's eventual menu of "special effects." In the early 1970s, artists invented this imaging as a fundamental electronic lexicon, long before it became a pre-programmed stylistic embellishment. By 1978, Woody Vasulka had broadened his discussion of electronic image vocabulary to include digital as well as analog codes. "I want to point to the primary level of codes, notably the binary code operation, as a principle of imaging and image processing. This may require accepting and incorporating this primitive structure (the binary code) into our views of literacy, in the form of binary language, in order to maintain communication with the primary materials at all levels and from any distance. The dramatic moment of the transformation into a binary code of energy events in time, as they may be derived from light, or the molecular communication of sound, or from a force field, gravity, or other physical initiation, has to be realized, in order to appreciate the power of the organization and transformation of a code." 57 Throughout this period, artists, usually in conjunction with independent engineers, modified and invented video "instruments" or imaging tools, making possible the construction of new video and audio systems shaped by their individual aesthetic agendas. Throughout the late '60s, Experiments in Art and Technology (EAT) celebrated collaborations between visual and sound artists and scientists in a number of exhibitions, seeking to integrate new ideas in technology with contemporary culture. Labs and studios designed specifically to explore electronic imaging and facilitate collaborations between video artists and engineers included the National Center for Experiments in Television at KQED in San Francisco, the Television Lab at WNET in New York, the Experimental Television Center in Binghamton and later Owego, New York, the studios at the University of Illinois at Chicago Circle, and the School of the Art Institute of Chicago. 58 One aesthetic and technical issue carried over from music and experimental film that provoked the interest of early video makers was the structural relationship between electronic sound and image production. Nam June Paik's experimentation with the electromagnetic parameters of television and instrument design were extensions of his earlier activity in avant-garde music. Paik's 1963 Fluxus modifications of television sets with powerful magnets and his TV bra for cellist Charlotte Moorman were ironic gestures, exposing television's electronic materiality and toying with audience expectations around the TV set as an everyday site for Americans. meditation and cultural reception. He had earlier attacked and compromised pianos as American icons of German culture. In 1969 with engineer Shuya Abe, Paik pioneered the construction of the Paik-Abe video synthesizer, an instrument which enabled an artist to add color to the standard black and white video image. In the production of video, both sound and image are determined by the same fundamental analog electronic processes. Modular audio synthesizers, developed in the early '60s by Robert Moog and Don Buchla, were models for much of the video synthesizer development. Video artists' explorations into the physical materiality underlying visual, aural, and cognitive phenomena and into the fundamental structuring of sound and image through mathematical algorithms and machine systems, occupied common territory with aesthetic inquiries in music, experimental film, and sculpture at this time. d. Video and performance and its audience If video was celebrated by late '60s artists for its immediacy and ability to function within or capture a sense of real time, so too was performance art a "situation" or gesture which invigorated the present. Both video making and performance supported the investigation of the everyday, the vernacular, the conditions of active perception and information gathering in various settings. Portable video, with its immediate playback, as well as performance, foregrounded the producer/performer and his or her negotiation of a theatrical moment, and could be resituated in the streets or the studio, removed from a gallery setting. Both video and performance raised questions about the function of art at a time when modernism's validation of the transcendent aesthetic experience was challenged by artists. Barbara Rose commenting on the politics of art in 1969 observed: "The real change is not in forms of art, but in the function of art and the role of the artist in society, which poses an absolute threat to the existence of critical authority." 59 Performance art posited the aesthetic gesture in the body of the artist, with his or her personal tools, in the present tense, and video could function as one of those personal tools or as a recording instrument for documenting the situation. The subjectivity of the artist and/or the expectations of the audience could be investigated through performance. Vito Acconci, whose early work as a poet involved words and the page as space, remarked that his involvement with performance was a shift away from the material to understanding the self as an instrument and "an agent which attends to it, the world, out there." 60 Performance art had often functioned historically as a transgressive gesture. With its postwar experimental roots in the aleatory music of John Cage, who advocated the listener's focused "learning" so that "the hearing of the piece is his own action," 61 and in paradoxical Fluxus events, which embraced boredom in combination with excitement to "enrich the experiential world of our spectators, our co-conspirators," 62 performance art in the '60s and '70s undermined audiences' cultural habits and expectations. It also shared with multi-media happenings, "In a real, not an ideological way, a protest against museum conceptions of art-preserved and cherished." 63 Performance art clearly participated in an economic critique of the art establishment's investments in objects through its refusal to be commodified. Video installations, performance documentations, and process-oriented recordings at the time, shared with performance art an accommodation of chance events. As unedited documentation of live events, with grainy black and white images of unknown stability, video also had questionable archival, and therefore investment, value within the art market. Performance assumes a relationship with a local audience, which shares to some degree in the risk-taking or experimental nature of performance work. Writer and artist Liza Bear cited the "heightened awareness of audience as an intrinsic element of the whole performing situation." 64 Vito Acconci's work in particular functioned as a kind of encyclopedic study of relationships constructed between the performer and his/her audience through the video monitor. His repertoire of entertaining, erotic, and threatening overtures catalogued the narcissism, seduction, and risk-taking in personal theater and its proto-narrative gestures by directly engaging the viewer in the construction of attentional needs. By exposing his intentions within his performances, he begged the audience's consideration of their own intentions and unstated assumptions. Acconci has written about the intimacy involved with video performance and its "fertile ground for relationship." 65 At the same time that artists were venturing structural studies of video performance and measures of intimacy, feminists drew on the intimacy of shared life and art experiences generated through conscious-raising groups and women-centered cultural scenes. Concentrating on the body as a performance vehicle as well as critiquing its representation in mass media and art history, feminist artists such as Hermine Freed, Joan Jonas, Martha Rosler, and Linda Montano, among others, used video and performance to assert and focus female presence and raise issues of gender and subjectivity in art. The invigorated confidence of women as performers and producers, their ambivalence about being the object of desire before the lens or audience, and their politicized relationship to audiences and institutional venues developed into a vital and complex discourse through video and other camera-based media like photography and film. Having attended the second Women's Video Festival in New York, reviewer Pat Sullivan offered her experience as audience member: "The striking feature of the festival was the revival of communal viewing...Being puzzled or amused or even angered by the responses of the other viewers forced me to search on the screen or in my mind for the origins of my own reactions." 66 Tthe video project's relationship to its audience was assumed to be a structural aspect of work that expressed a range of radical subjective assertions. The early feminist insight that both cultural production and viewer reception were constructed according to gender was eventually extended to other "differences" such as class, race, and ethnicity. Community media activists worked to transform citizens from passive television consumers into active video producers who would reveal specific local agendas. Artists investigated the phenomenology of viewers' attention in a variety of performative situations which included installations of electronic instruments as well as personal gestures. And the counter-cultural "longing for group experiences that would transcend the limits of the individual ego...a craving for a sort of public love, a communal self-determination," 67 was reflected in part by viewers' openness to the experience of duration through largely unedited veriti video documentation. The investigation of phenomenological and social relations mediated by video also inevitably introduced television, a paradoxically intimate and remote technology located in the home. Television's intimacy with audience was taken up in diverse west coast work by William Wegman, Ilene Segalove, Ant Farm and T.R. Uthco. In The Eternal Frame (1976) Ant Farm and T.R.Uthco re-enacted the media spectacle of the Kennedy assassination and revealed "inscribed audiences," 68 members of the general public who had originally witnessed television's public channeling of the horror and intimate details of the Kennedy assassination and who now inadvertently found themselves in the middle of public performances recorded in the streets of Dallas and San Francisco. The comments of those audiences confirmed the pseudo-familiality of the events; the audiences became un-alienated partners in an ironic disassembling of the authority of the news media. The tourists standing in Dealey Plaza in 1976 may have been unwitting cultural collaborators, but, like the New York audiences for video and performance events, they were assumed to be important receivers of video by this first generation of video artists. Liza Bear, writing about performance in Avalanche in 1974, stated: "Part of content was an articulation of ... the audience's knowledge, beliefs, expectations of the artist in question ... and it was a consciousness of the audience as people who've come to see a particular artists' work, as people who know or work within the art context, and also, in some cases, a consciousness of the limitations of that context." 69 Critic Peggy Gale concluded that by "shifting away from the marketplace and the production of a precious object ... the role of the audience was redefined to play a part in the completion of the work through their response and feedback: the video model of simultaneous record and presentation, objectification and immediacy, was in effect reiterated." 70 e. Video and the construction of "reality" Artists explored the immediacy and performative possibilities of video, producing work that legitimized new political and cultural assertions about subjective, lived experience and extended to audiences a considered and responsive function. These critical intimacies and ideological realities as they were mapped out through the video art and alternative media culture, however, were largely antithetical to the commodified "reality" portrayed through mass culture. Although the spectacle of television appealed to the intimate wants and desires of its audience or market, as Enzensberger elaborated, the relationship proffered through television inevitably resulted in a false intimacy: "Consumption as spectacle contains the promise that want will disappear. The deceptive, brutal, and obscene features of this festival derive from the fact that there can be no question of a real fulfillment of its promise...Trickery on such a scale is only conceivable if based on mass need." 71 Viewers' expectations of video art were complicated by their experiences living with television. That experience was described clearly at the end of the decade by Dan Graham: "TV gains much of its effect from the fact that it appears to depict a world which is immediately and fully present. The viewer assumes that the TV image is both immediate and contiguous as to time with the shared social time and parallel "real world" of its perceivers-even when that may not be the case. This physical immediacy produces in the viewer(s) a sense of psychological intimacy where people on TV and events appear to directly address him or her." 72 The capacity of camera-based work to signify truthfulness, to claim to witness or represent reality, results in its legibility to many viewers as an "essential" and confirming realism. The documentary form, which introduces images and sounds as evidence, was embraced by many women and other previously marginalized producers working with video in the '70s, in part because seeing new images of self was undeniably powerful and evidenced the production of a new version of the real. At the same time, documentary representation was challenged by women and others as inevitably a product of a specifically focused lens and ideology, with edited inclusions, omissions, and censorships. 73 Contending ideas about the phenomenological, political, and subjective constructions of reality dominated cultural debate at the end of decade. New developments in narrative film theory, feminist theory, and the semiotics of image-making repositioned late '70s and early '80s art making within an emerging discourse that focused on the construction of subjectivity through the signifying practices of mass media, in which ideology was transacted through commodified and reproducible images. These cultural shifts, generally regarded as postmodern, forced a re-evaluation of critical strategies for artists in creating video "texts." In the early '70s video makers articulated their opposition to television's codes and one-way distribution system, evident in assertions such as "VT is not TV," and exhibitions at new artists' centers titled "No TV," "Alternative TV," "Process TV," and "Natural TV." 74 The independent network at the end of the decade included media collectives, artists-run media centers, public access organizations, and artist collaborations with public television, and remained a vital alternative to corporate television, however marginalized those cultural scenes. Whether intentionally oppositional or mainstream, video artists, public access producers, and independent documentarians worked with technologies and cultural codes shared in part by the dominant communications media that in the United States, though not in all countries, was primarily a commercial venture. Independent work intended for television would inevitably be evaluated in terms of its marketing value, which would shadow its other intentions or merits. In the late '70s video artists and independent producers negotiated the contradictory possibilities of broadcast television's great visibility and potential censorship. David Antin pointed out that an artist's videotape ended, not when it was time for a commercial, but when the artist's intention was accomplished. 75 A decade of producing work, exploring relationships with audiences, and nurturing a viable alternative media infrastructure developed into a video cultural discourse which framed the capacity of a videotape to represent its maker's access to production technologies, to reveal its maker's strategies for approximating or constructing the "real," and to engage a performative interaction with an anticipated audience. Alternative video makers were able to map out diverse intentions as they developed modes of address specific to different audiences-the art world, public television, local community media. The video maker's various strategies-attentional, representational, formal, performative-for articulating an art or communications event remained a choice, and always measured the critical distance between the dominant language of commercial media and the video maker's independent voice. 3. Emergence of public funding "Artists with electronic skill have transformed old TV sets into the dazzling 'light machines' that have appeared in galleries and museums, and some have developed video colorizers and synthesizers which permit electronic "painting." A relative few have penetrated the engineers' citadels of broadcast television to create experimental videotapes with the full palette of the switching consoles. A larger number, working since 1967 with half-inch portable video systems from Japan, have explored the potential of videotape to reach out and open circuits of communication within a variety of small communities-giving substance to attitudes and concerns which monolithic broadcast television has ignored to a point of near obliteration ... This new area of Council [NYSCA] involvement suggests the extraordinary potential of the medium still to be explored as we go forward into tomorrow's wired nation.".Russell Connor 76 a. From collectives and community media to video access centers, public access centers, and public television labs In the decade following the introduction of the portapak, video art and documentary practice developed within an alternative media infrastructure nurtured by the parallel growth of public arts funding. Early video makers had found that keeping up with the quickly evolving, high-end consumer tools of electronic media was expensive, even when resources were shared. Early video arts funding supported proposals by artists and collectives, and developed by the mid-'70s into funding programs for both individual artists and a nationwide system of regional media arts centers, some of which had evolved out of the early collectives. By the late 1960s public funding for experimental and documentary film had been established through the National Endowment for the Arts (NEA) and the New York State Council on the Arts (NYSCA). Gerd Stern, an artist and early NYSCA staff consultant, outlined the rationale for NYSCA's early commitment to the new medium of video art as "a societal shift away from stockpiling a product ... [T]he Council had always maintained a very open attitude toward new art forms and a willingness to experiment, to take chances, to recognize the difficulties of arriving at tight value judgments in new situations where the standards were still nascent, embryonic." 77 Funding of not-for-profit cultural organizations and artists was promoted by public policy planners to encourage cultural research and design that would invigorate the marketplace and enhance the quality of life in a democracy. Some artists argued that public funding for the arts would force individuals to become institutionalized and could co-opt or blunt the edge of cultural dissent and creativity. Others countered that public funding would maintain a publicly accessible platform for discussion of cultural values which would contribute alternatives to a marketplace of ideas dominated by art collecting and the interests of commercial media. A more thorough tracking of the dialogue, initiatives, policies, and the negotiations between the funding institutions, legislative and judicial bodies, commercial interests, not-for-profit arts organizations, public access supporters, and artists' peer panel participation during this early period would be an important contribution to understanding the development of independent video, but must be developed elsewhere. Artists in the late 60.s challenged the dominant aesthetics of modernist high culture and the economic assumptions of the art world establishment. Demonstrations at major museums protested the lack of support for living artists and called for a general reassessment of the business of art making and art dealing. A manifesto by the Art Workers Coalition in 1970 declared: "Artworks are a cultural heritage that belongs to the people. No minority has the right to control them." Their demands challenged, among other conditions, the make-up of museum boards of directors, inattention to the work of minorities, and a lack of information about active local artists. 78 Although many galleries and museums supported new work and were responsive to criticism from working artists, the very existence of artist-run cooperatives and media and performance laboratories indicated the existing system was not adequately meeting the shifting needs and interests of a new generation of artists. The late '60s saw the development of new structures to support the production and funding of video art. Some of the first experimental sites for "television art" were at educational television stations (soon to become "public television"): KQED in San Francisco, WGBH in Boston, and WNET in New York. Both KQED and WGBH received Rockefeller Foundation support in 1967 to establish experimental workshops, each taking different directions. Firmly committed to process-oriented research, the San Francisco project set up a studio for video instrumentation design as well as interdisciplinary (poetry, video, music, dance) television art projects. This became the National Center for Experiments in Television (NCET) in 1969. The Rockefeller Foundation also supported research in the development of media programs at the university level, and educators were invited to observe the electronic arts research happening at the NCET. WGBH's New Television Workshop produced a series of innovative programs in the late '60s, including the critically acclaimed The Medium is the Medium (1969), a television art magazine of early video experimentation. The Television Laboratory at WNET was established in 1972 with support from the Rockefeller Foundation, NYSCA, and the NEA. Between 1974 and 1984, WNET's residency program provided access to state-of-the-art broadcast video technology for five to eight artists each year. The station showcased a range of independent documentary and video art to its large New York market through series such as the "Video and Television Review" ("VTR") (1975-1976), hosted by artist/curator Russell Connor. Although the TV labs clearly represented a rare window for technical and programmatic experimentation within broadcast television, public television ultimately did not sustain its support for media art research and equipment access, nor did it continue to provide adequate outlets for independent work. An accessible funding structure for the media arts emerged in the late .60s. NYSCA had been established in 1960 and was the nation's first government agency for support of the arts, mandated to respond to the art needs of New York City, the epicenter of the post-war international art world. Art was business, especially in New York, and the 1972 NYSCA annual report noted that the tourist trade as well as "two major industries of New York City-fashion and communications-are there ... because only there can be found the ideas and energy on which they depend." 79 Governor Nelson Rockefeller, in supporting NYSCA's expansion, could claim in 1971 that more than 75 million attendances were reported at New York State arts events in the previous year. Between 1969 and 1970, NYSCA's overall budget increased almost ten fold from $2.3 million in 1969-1970 to $20.2 million in 1970-1971. This same period saw NYSCA film and television expenditures grow from $45,000 to almost $1.6 million, with over $500,000 going to new video projects. The NEA, established by Congress in 1965, initiated its Public Media Program in 1967 and by 1971 was spending $1.26 million on film and television art. By the end of the decade the NEA was spending $8.4 million on media arts (film and video) and committed to supporting a network of regional media arts centers. NYSCA's early and substantial funding for video was critical in the start up of diverse projects throughout New York State. Many video collectives as well as museums and libraries received support in 1970-71, NYSCA's first year of media funding. The list revealed a broad range of initiatives and included, in New York City: Shirley Clarke's T.P. Video Space Troupe, People's Video Theater, Raindance, Global Village, Media Equipment Resource Center (MERC), and the Artists' TV Lab at WNET; in Brooklyn: Operation Discovery, a cable program on the cultural life of the Bedford-Stuyvestant neighborhood; in Ithaca: Collaborations of Art, Science, and Technology (CAST); on Long Island: Port Washington Public Library; in Rochester: the Videofreex at the Rochester Museum of Science and the Visual Studies Workshop; and in Binghamton: Community Center for Television. Often building on the existing media collectives, new media centers and multi-disciplinary artist-run spaces were required to be incorporated as not-for-profit organizations. Expanding on the collectives' communications paradigm, these emerging sites of alternative cultural activity typically offered production facilities, training workshops, and active exhibition programs that positioned video within a critical environment of other disciplines that often included experimental, documentary, and narrative films, music, performance, photography, and the visual arts. Screenings by visiting artists were common and were often accompanied by discussions with local audiences about the work and news about the growing field. Many media centers and museums published their own bulletins, catalogs, regular program notes, and posters. This ephemeral material, in combination with contemporaneous periodicals, catalogs, and critical journals, offers a vivid picture of alternative media activity during this first decade. A respected video art and alternative media discourse was disseminated by publications such as Radical Software, Afterimage, Vidicon, and Televisions. Avalanche, Art News, and other arts magazines featured special issues on video. The National Federation of Local Cable Programmers published The NFLCP Newsletter, which was succeeded by Community Television Review in 1979. The Independent began publication by the Association of Independent Video and Filmmakers (AIVF) in 1976, and Video 80 started publication in 1980 in San Francisco. Sightlines, published by the Educational Film Library Association, regularly reviewed independent videotapes. Video distributors such as Electronic Arts Intermix, Castelli-Sonnabend, Anna Canepa, Video Data Bank, Third World Newsreel, California Newsreel, Art Com, and Women Make Movies were critical in building and sustaining informational conduits among artists, exhibitors, curators, and educators. Exhibitions at galleries and museums in the late '60s and early '70s-including the Howard Wise and Castelli Galleries (New York City), the DeSaisset Museum (Santa Clara, California), and the University Art Museum (Berkeley, California)-helped to legitimize video art within established art institutions. Especially important was the founding of video departments at the Whitney Museum of American Art, the Museum of Modern Art, the Everson Museum, and the Long Beach Museum of Art, whose curators regularly positioned video art within highly visible contemporary exhibitions, such as the Whitney Biennials. At a 1983 conference of the National Alliance of Media Arts Centers (NAMAC), a three-year-old organization which claimed 80 institutional members, speakers asserted that media arts centers had "now become a significant presence in our culture." NAMAC's chairman, Ron Green, identified the "cultural lack" that media arts centers addressed: "Blacks and women may have realized that lack inherent in the images of them that has been perpetrated by the media art of the film and television industry, but American society did not ... Democracy was understood [by our forefathers] to require universal education, specifically the ability of all citizens to read and write in order not only to assimilate the issues on which they would vote, but also to contribute to the formulation and presentation of those issues through writing. Since much, if not most, of our information two centuries later is presented through the media instead of writing, and since the media are not accessible to most of us (nor even to most of our best media artists), this requirement of our political system is not being met." 80 Artists, independent documentarians, and public access activists were joined by curators, programmers, distributors, and librarians who continued to support media culture on many fronts. By the middle of the '70s the alternative media network featured overlapping but largely independent organizations, funding infrastructures, and audiences. These projects may have shared basic assumptions about the importance of media arts and distribution systems, but were testing and reconfiguring different identities and survival strategies. The vision and work that extended the alternative media arts infrastructure throughout the '70s would be faced with an ongoing struggle for legitimacy and survival requiring public visibility and support. Green addressed the field: "The biggest problem we are having in seeing the future stems from scale illiteracy. Through hard work, innovation, and persistence we have made a field where there was none ... There can be little doubt that the price of genuine cultural pluralism in this country is in the billions of dollars. ... Britain recently began providing large financing to genuinely independent, even avant-garde, media artists under the new BBC fourth channel ... It is common knowledge that our American public telecommunications system never had a chance; it has always been ludicrously under-financed. How can we who promote the independent media arts ever have expected a system with enormous capital and personnel expenses, and impossibly weak financial structures, to be seriously concerned about cultural pluralism? To expect that is a manifestation of our illiteracy of scale." 81 As regional media arts centers expanded primarily through public and private arts funding, the cable industry was growing. Public access facilities proliferated around the country, and both the local benefits and the economic and political costs of public access continued to be challenged. In developing public access facilities through cable franchise agreements, media activists inevitably found themselves up against the pragmatic need to work with established power structures-city governments, cable companies, and the state and federal regulators. Cable channels remained a public forum for speech protected by the First Amendment not available on broadcast channels, 82 and access operators supported the education of a diverse community of users. However, access organizations occasionally found their political and financial support threatened by providing uncensored access to large local audiences. They found their goals of first-come, first-served access positioned precariously between potential critics of free speech on cable and their constituencies-between city officials and their voters, and between cable companies and their paying customers. These tensions were also played out in the courts, where federal regulators contended that they must arbitrate between "social engineering" by public access advocates and protecting a "free market" for the expanding cable industry. In 1972 the FCC had established access requirements for the cable industry, which many cable operators had promoted. At this time access provisions served the enlightened self-interest of the cable industry which needed to garner the support of municipalities and the public as it faced competition from the broadcast industry. The subscription-based cable industry was portrayed as a threat to free television by the broadcasters. By the late '70s, however, the cable industry challenged the financial burden of complying with access provisions in the courts. In 1979 the Supreme Court ruled in favor of the cable industry, stating that the FCC did not have the statutory authority to require cable companies to support public access. In what would remain a shifting regulatory landscape, public access organizations joined forces with the National League of Cities to lobby Congress for new communications legislation under consideration at the end of the decade. The Cable Communications Policy Act of 1984 mandated that cable companies support public access channels, prohibited cable operators from asserting editorial control over access producers, and declared that public access regulations "serve a most significant and compelling government interest-promotion of the basic underlying values of the First Amendment itself." 83 Although many media producers in the early '70s believed that their work functioned in opposition to television, by mid-decade documentarians challenged the absence of independent points of view on broadcast TV. AIVF had formed in 1974 to advocate for more public funding for independent film and video makers. In 1976, 15 independent video production groups lobbied the Corporation for Public Broadcasting (CPB), arguing that independents should have more funding and equipment access through public television. In 1977 and 1978 AIVF testified at the second Carnegie Commission, charged with evaluating the first decade of public television. AIVF also testified before the Congressional Subcommittee on Communications, examining public television in its revision of the Communications Act. Even though the 1967 Public Broadcasting Act had specified that high quality programs be obtained from "diverse sources," AIVF charged: "Public television at this time does not reflect the rich diversity of American social, cultural, and political issues. The reliance on in-house staff productions and British imports has limited both the subjects and the substance offered. In a society which relies heavily on electronic media for information, independent video and filmmakers are being denied the full exercise of their constitutional rights, and the public is denied access to the diverse viewpoints and vigorous debate which are intrinsic to informed self-government." 84 The 1978 Public Telecommunications Financing Act authorized specific appropriations for independents, although the distribution of those monies would continue to be contentious. A Public Trust, the 1979 report of the second Carnegie Commission on public television, also mandated programming diversity and financial support for independents: "Americans have the capacity to rebuild their local communities, their regions, and indeed their country, with tools no more formidable than transistors and television tubes..." 85 These recommendations would not be interpreted and actualized, however, until after the election of Ronald Reagan in 1980, which proved to be a period of shrinking government support for public television. By the end of the '70s, new satellite technology also contributed to the vision of yet another kind of independent network. Communications Update, for example, a Manhattan public access cable series started up by Liza Bear in 1979, produced informative programs on the World Administrative Radio Conference (WARC). WARC is an international UNESCO conference held every 20 years to determine policies for the allocation of access to the electromagnetic spectrum and the management of telecommunications satellites. Anticipating the confluence of cable, telephone, and digital information services, artists, independent producers, and public policy planners continued to raise questions about access to new and existing telecommunications technologies. 86 Independents' relationships with television would continue to raise fundamental questions. For video art or documentary work to reach a commercial television market, would access to broadcast technology be necessary to make that work competitive? Throughout the '70s public and private funders pumped hundreds of thousands of dollars into industrial grade and occasionally broadcast quality equipment for regional media centers. Technology for video was evolving rapidly, and it was clear that this need for regular retooling would not abate. If independent work aspired to television's mass audiences, could additional support be expected from public television or even commercial television for ongoing equipment upgrades? How could artists afford the time to experiment in an editing suite and/or exercise the kind of control over post-production decisions if sophisticated tools were only available with professional editing assistance? What was the relationship between broadcast television's special effects technology and the independently-designed tools that had been invented by pioneering engineers and artists? These questions confronted individual artists and funders in consultation with peer panels, who, in determining which projects should receive funding, inevitably debated issues ranging from the structures of access to new technologies to promising and exhausted expressive cultural forms. By the late '70s a media arts infrastructure in collaboration with public and private funders had expanded the production and exhibition opportunities for emerging artists, foregrounding new art forms and becoming a critical factor in the development of new audiences for this work, but not without significant resistance. Mapping the trajectory of public support for the arts, David Trend quoted a 1981 Heritage Foundation document written during the Reagan administration that accused the NEA of having grown "more concerned with the politically calculated goals of social policy than with the arts it was created to support. To accomplish goals of social intervention and change ... the Endowment...serve(s) audiences rather than art, vocal constituencies rather than individually motivated artistic impulses." 87 A struggle, which would eventually be described as a cultural war, was underway for the legitimacy and survival of an independent media arts practice and infrastructure, one that by the early 80s was more alternative than oppositional, and was described accommodatingly by NAMAC as a "counterculture ... only in comparison to the mass media." 88 How could an alternative media cultural practice be validated by a delivery system that depended on legislators for appropriations and reviewers for mainstream visibility by the end of the decade? Martha Rosler, who has written extensively about the cultural delivery system during this period, remarked that "video's marginality produces shrunken or absent critical apparatuses ... This leaves the theorizing to people with other vested interests." 89 Peer Bode, who worked in an artist-run access center, reflected on the late '70s: "The people who then wrote about media gradually were not practitioners but actually came to observe video from other disciplines. At this point the understanding of the value of issues around labor and production were lost ... Various making communities and language communities [recognize] that written language still has a real legitimizing power within the culture, and the commercial publications that ended up as a forum for writers were often not interested in those projects which were not commercially based. As any writer will tell you, within the art magazines, one could only represent what happened in those not-for-profit alternative art centers to a very small extent because the publications survived on a commercial advertising base." 90 By the end of the decade independent video art and documentary making had been integrated into academia through art, media art, and communications departments that had given tenure to early video practitioners. Though the production of independent media continued through university programs, media art centers, and public access centers, the '80s also saw cultural theory take up the study of the dominant genres of narrative filmmaking and television, emphasizing a critical ideological reading of popular culture as seen in its internationally disseminated products, Hollywood cinema and television. Such writing acknowledged the insights of independent video and filmmakers occasionally, but rarely the alternative media institutional infrastructure that supported their independent cultural production, nor the encoding of challenging that production system through an art work's invention of signifying practices. 91 With the growth of cultural theory as an academic discipline, an oppositional or ambivalent posture to the dominant media often took the form of critical writing rather than critical media production. b.Conclusion Video was spawned at an historical moment when personal and communal experimentation and institutional invention made sense within a widely embraced vision of a radically changing society. Inspired by the availability of the portapak, a personal media tool, and emerging at a time when culture was widely acknowledged as political terrain, video makers performed initiatives which sought to radically reconfigure local art and communications structures, invigorating their respective communities' capacities for informational and participatory feedback. Communications production and reception were re-inscribed in contemporary culture by early video independents as social relations, which could be negotiated by ordinary people and art scenes as well as by media corporations and advertisers. Video makers' work queried the dimensions and structures of the television's address-how far, to whom, how expensive, does it feedback, with what images does it create, engage, transform, misrepresent, and censor? Artists and independent producers integrated production, exhibition, distribution, transmission, audience feedback, and media education into their work, and they invited the cultural participation of individuals as artists, critics, scientists, citizens, and educators, creating a vital alternative infrastructure. In a period that advocated for expanded consciousness and a critical reassessment of institutionalized authority, artists engaged various attentional constructs using information fed back from a newly accessible electronic time-based medium and experimented with the fundamental structures of a new image language available through electronic materials. Women producers asserted a gendered subjectivity, and both women and men transgressed viewers' assumptions primarily through performance-based work. Artists enlisted video in an expansive documentary exploration of the vernacular, the everyday, as well as investigations of dominant social institutions. A negotiation of attentional terrain with viewers, the sharing of authority in the work through ongoing efforts to develop structures that would guarantee broad access to production, and the recognition of audience as subjective participant in the work and social partner in sustaining cultural scenes characterized the performance of video art and communications projects throughout its first decade. A fundamental speaking point of this first generation of video artists was that to engage a critical relationship with a televisual society you must primarily participate televisually. Their art, performance, and documentary projects are available today as tapes, which deserve conservation and study as part of an extensive moving image "literature," as do the alternative stages and scenes supported by the surviving independent media infrastructure. Video art and alternative media production was developed by artists in the late '60s and early '70s as a public dialogue about new cultural forms and access to communications technology distributed through a proliferation of new sites for exchange. The revisiting of that period through an historical survey is, in part, an effort to link the cultural insights and strategies of portable video's first decade with the present conditions for producing media culture. Attention to the video projects of the late '60s and '70s, those surveyed in this project and others yet to be rediscovered, is timely in view of the advent of international media hardware and software expansion and new decentralized multi-media networks. The democratic use of these tools can only be realized with considerable efforts toward widespread media literacy, a necessary extension of basic reading and writing skills. Such an education for media cultural fluency must encompass access to and experience with production tools and an understanding of the interpretive structures of moving image media "literatures"-video, film, sound, digital multi-media, radio, cinema, television, internet-that have been produced to date. It is necessary to beware of the emancipatory claims of new technologies, as well as the liberal notion that access to production alone will bring about critical participation in view of the capacity of the mass media to assimilate new cultural forms. However, the early '70s participatory affirmation of an alternative media practice bears amplification at the present time in order to reconsider the efforts of that earlier generation to initiate new forms of cultural exchange, and to share the authority of technologically intensive cultural production with diverse audiences and local communities. In supporting the production of a vital, multi-vocal, and accessible contemporary media culture, artists and educators must continue to question-what were the cultural issues negotiated by past bodies of work, who has training and access to increasingly sophisticated tools, and how can diverse audiences approach the work produced-and on a much broader scale than has been accomplished to date. 1. Sylvia Harvey, May '68 and Film Culture. London: British Film Institute, 1978, p. 56. 2. Beryl Korot and Phyllis Gershuny, editors, "Table of Contents," Radical Software, 1:1, 1970, p. 1. 3. Chris Hill, "Interview with Woody Vasulka,"The Squealer, Summer 1995, p. 6. 4. Allan Kaprow, Assemblages, Environments and Happenings. New York: Abrams, 1966. [Excerpted in Charles Harrigan and Paul Wood, editors, Art in Theory. Cambridge: Blackwell, 1992, p. 708.] 5. Sohnya Sayres, Anders Stephanson, Stanley Aronowitz, and Fredric Jameson, editors,The '60s Without Apology. Minneapolis: University of Minnesota Press, 1984, p. 20. 6. Ibid, p. 2. 7. Todd Gitlin, The Sixties. New York: Bantam Books, 1987, p. xv. 8. Students for a Democratic Society, "Port Huron Statement," The Sixties Papers, edited by Judith Albert and Stewart Albert. New York: Praeger, 1984, p. 181. 9. Herbert Marcuse, One-Dimensional Man. Boston: Beacon Press, 1964, p. 251. 10. See Michael Renov, "Early Newsreel: The Construction of a Political Imaginary for the New Left," Afterimage, 10:10, February 1987, pp. 12-15; distribution catalogs from Third World Newsreel and California Newsreel; for a history of the underground press see David Armstrong, A Trumpet to Arms. Los Angeles: J.P. Tarcher, 1981. 11 . Hans Magnus Enzensberger, "Constituents of a Theory of the Media," Video Culture, edited by John Hanhardt. Rochester, New York: Visual Studies Workshop Press, 1986, p. 98. See also Todd Gitlin. "16 Notes on Television," Tri-Quarterly Review, Nos. 23/24, Winter-Spring 1972, pp. 325-366. 12 . "Time Scan," Televisions , 4:2, Summer 1976, p. 7. 13 . Susan Sontag, "On Culture and the New Sensibility," Against Interpretation.. New York: Dell Publishing, 1966, p. 299. 14 . See Norbert Wiener, Cybernetics, or Control and Communication in the Animal and the Machine. New York: John Wiley and Sons, 1948; Buckminster Fuller, Operating Manual for Spaceship Earth. New York: Simon and Schuster, 1969; Gregory Bateson, Steps To an Ecology of Mind. New York: Ballantine Books, 1972. 15 . David Antin, "Video: The Distinctive Features of the Medium," Video Art, edited by Susanne Delahanty. Philadelphia: Institute of Contemporary Art, 1975, p. 57. 16 . Michael Shamberg and Raindance Corporation, Guerrilla Television.. New York: Holt, Rinehart, and Winston, 1971, p. 9. 17 . Parry Teasdale, Unpublished interview with author, May 1995. 18 . Philip Mallory Jones, Unpublished interview with author, July 1995. 19. Beryl Korot and Phylis Gershuny, editors, "Masthead," Radical Software, 1:1, 1970, p.1. 20. Portola Institute, The Whole Earth Catalog. San Francisco: 1969, p. 1. 21. Beryl Korot and Phyllis Gershuny, editors, "Cultural Data Banks," Radical Software, 1:2, 1970, p. 19. 22. Hans Magnus Enzensberger, "Constituents of a Theory of the Media," p. 105. 23. Ken Marsh, "Alternatives for Alternative Media-PeopleUs Video TheaterUs Handbook," Radical Software, 1:2, 1970, p. 18. 24. Ken Marsh and Elliot Glass, Unpublished interview with author, June 1992. 25. Ralph Lee Smith, "The Wired Nation," The Nation, 210:19, May 18, 1970, p. 606. 26. Roger Newell, "Minority Cable Report," Televisions, 6:3, November 1978, p. 10. 27. Dorothy Heneaut and Bonnie Klein, "Challenge for Change," Radical Software, 1:1, 1970, p. 11. 28. Alternate Media Center, Alternate Media Center at NewYork University School of the Arts, Summer 1972, p. 11. 29. "1986," Community Television Review, 9:2, Summer 1986, p. 59. 30. Walter A. Dale, "The Port Washington Experiment," Film Library Quarterly, Summer 1972, p. 23. 31. Hans Magnus Enzensberger, "Television and the Politics of Liberation," The New Television: A Public/Private Art, edited by Douglas Davis and Alison Simmons. Cambridge: MIT Press, 1977, p. 263. 32. Parry Teasdale, Unpublished interview with author, May 1995. 33. "Ralph Lee Smith Meets Access," Community Television Review, 9:2, Summer, 1986, p. 22. 34. Chris Hill, "Interview with Woody Vasulka," The Squealer, Summer 1995, p. 7. 35. Roger House, "Bed-Stuy Voices from the Neighborhood," Afterimage, 19:1, Summer 1991, p. 3. 36. Fredric Jameson, "Reification and Utopia in Mass Culture," Signatures of the Visible. New York: Routledge, 1992, p. 23. 37. Hollis Frampton, "The Withering Away of the State of the Art," Artforum, December 1974, p. 50. 38. Robert Morris, "Notes on Sculpture, Part 4: Beyond Objects," Artforum, 7:8, April 1969, p. 53. 39. Clement Greenberg, "Towards a Newer Laocoon," Collected Essays and Criticism, Vol. I: Perception and Judgments, 1939-44, edited by John O'Brian. Chicago: University of Chicago Press, 1986, p. 28. 40. Dick Higgins, "Intermedia," foew+ombyhnw. New York: Something Else Press, 1969, p. 15. 41. Michael Fried, "Art and Objecthood," Artforum, Summer 1967, p. 44. 42. Annette Michelson, "Robert Morris: An Aesthetic of Transgression," Robert Morris. Baltimore: Garamond/Pridemark Press and Corcoran Gallery of Art, 1969, p. 23. 43. Lizzie Borden, "The New Dialectic,"Artforum, April 1974, p. 44. 44. Morris, Robert, "Notes on Sculpture, Part 4: Beyond Objects," p. 54. 45. Dick Higgins, "Structural Researches," foew+ombyhnw. New York: Something Else Press, 1969, p. 149. 46. Paul Sharits, "A Cinematics Model for Film Studies in Higher Education," Film Culture , No. 65-66, 1978, p. 49. 47. Malcolm LeGrice, Abstract Film and Beyond. Cambridge: MIT Press, 1977, p. 152. 48. Hermine Freed, "Where Do We Come From? Where Are We? Where Are We Going?" Video Art, edited by Beryl Korot and Ira Schneider. New York: Harcourt, Brace, Jovanovich, 1976, p. 210. 49. Antin, David, "Video: The Distinctive Features of the Medium," p. 60. 50. Joanna Gill, "Video, The State of the Art," New York: Rockefeller Foundation, June 1975. Reprinted in Eigenwelt des Apparate-welt: Pioneers of Electronic Arts, edited by David Dunn, Steina and Woody Vasulka. Linz: Ars Electronica, 1992, p. 64. 51. Jud Yalkut, "Interview with Frank Gillette and Ira Schneider," Radical Software, 1:1, 1970, p. 9. 52. David Antin, "Video: The Distinctive Features of the Medium," p. 60. 53. Dan Graham, "Film and Video: Video as Present Time," Video/Architecture/Television.. Halifax: Nova Scotia School of Art and Design Press, 1979, p. 62. 54. Dan Graham, "Feedback," p. 69. 55. Bob Devine, "The Long Take as Body Envelope," Phos, 1:1, March 1978, p. 6. 56. Woody Vasulka and Scott Nygren, "Didactic Video: Organizational Models of the Electronic Image," Afterimage, 3:4, October 1975, p. 9. 57. Woody Vasulka, "A Syntax of Binary Images," Afterimage, 6:1-2, Summer 1978, p. 20. 58. For a thorough source on artists working with engineers see the exhibition catalog of early instruments and tapes organized by the Vasulkas, Eigenwelt Der Apparate-Welt: Pioneers of Electronic Art, edited by David Dunn and Steina and Woody Vasulka. Linz, Austria: Ars Electronica, 1992. 59. Barbara Rose, "Problems of Criticism V: The Politics of Art, Part, II," Artforum, 7:5, January 1969, p. 50. 60. Vito Acconci, Lecture at Albright-Knox Art Gallery recorded by Hallwalls Contemporary Arts Center, Buffalo, New York, June 1995. 61. Susan Sontag, "On Culture and the New Sensibility," p. 300. 62. Dick Higgins, "Boredom and Danger," foew+ombyhnw. New York: Something Else Press, 1969, p. 123. 63. Roselee Goldberg, Performance: Live Art 1909 to Present. New York: Harry Abrams, 1979, p. 81. 64. Liza Bear, Avalanche, 1:1, May-June 1974, p. 1. 65. Vito Acconci, "10 Point Plan for Video," Video Art, edited by Beryl Korot and Ira Schneider. New York: Harcourt, Brace, Jovanovich, 1976, p. 8. 66. Pat Sullivan, "WomenUs Video Festival," [No publisher] 1973. 67. Todd Gitlin, The Sixties, p. xix. 68. Patricia Mellencamp, Indiscretions. Bloomington: University of Indiana Press, p. 58. 69. Liza Bear, Avalanche, p. 1. 70. Peggy Gale, "A History in 4 Moments," Mirror Machine, edited by Janine Marchessault.Toronto: YYZ Books, 1995, p. 56. 71. Hans Magnus Enzensberger, "Constituents of a Theory of the Media," p. 109. See also Guy Debord, Society of the Spectacle. Detroit: Red and Black Books, 1977. 72. Dan Graham, "Film and Video: Video as Present Time," p. 63. 73. See Martha Gever, "Feminist Video-Early Projects," Afterimage, 11:1-2, Summer 1983; Julia LeSage,"The Political Aesthetics of the Feminist Documentary Film," Quarterly Review of Film Studies, 3:4, Fall 1978; Allan Sekula. "Dismantling Modernism," Photography Against the Grain. Halifax: Press of Nova Soctia School of Art and Design, 1984; Laura Mulvey, "Visual Pleasure and Narrative Cinema, Screen, Autumn 1975. 74. Michael Shamberg and Raindance Corporation, Guerrilla Television., p. 89. 75. David Antin, "The Distinctive Features of the Medium," p. 3. 76. Russell Connor, "TV/Media," NYSCA Annual Report 1971-1972. New York: New York State Council on the Arts, 1972, p. 23. 77. Gerd Stern, "Support of Television Arts by Public Funding," The New Television: A Public/ Private Art. edited by Douglas Davis and Alison Simmons. Cambridge: MIT Press, 1977, p. 144. 78. Lucy Lippard, "Art Workers Coalition: not a history," Studio International, November 1970, p. 171. 79. Eric Larabee, "The Arts and Government in New York State," NYSCA Annual Report 1971-1972, New York: New York State Council on the Arts, 1972, p. 23. 80. Ronald Green, "The Media Arts in Transition," The Media Arts In Transition, edited by Bill Horrigan. Minneapolis: The Walker Arts Center, 1983, p. 9. 81. Ibid, p. 9. 82. To date, speech on cable systems, including public access channels, is protected by the First Amendment because viewers must exercise choice in accessing cable (they cannot receive cable without paying for it); speech on broadcast channels is limited because anyone (children, etc.) can access the broadcast programs by simply turning on a TV set. See L. Brown, "Free Expression is an Unwelcome Rider on the Runaway Technology Train," Community Television Review, Summer-Fall 1980. 83. Susan Bednarczyk, "NFLCP: The Way It Was," Community Television Review, 9:2, Summer 1986, p.44. 84. John J. O'Connor, "The Outsiders Want a Bigger Piece of the Pie," New York Times, March 26, 1978. 85. Deirdre Boyle, Subject to Change: Guerrilla Television, Revisited. New York: Oxford Press, 1996. 86. Nolan Bowie, "Parting Shots: An Expanded Agenda," The Social Impact of Television, A Research Agenda for the 1980s. Aspen Colorado: The Aspen Institute, October 1980. 87. David Trend, "Rethinking Media Activism," Socialist Review, 23:2, February 1993, p. 7. 88. Ronald Green, "The Media Arts in Transition," p. 9. 89. Martha Rosler, "Shedding the Utopian Moment," Illuminating Video, edited by Doug Hall and Sally Jo Fifer. San Francisco: Aperture, 1990, p. 49. 90. Chris Hill, "Interview with Peer Bode," The Squealer, September 1996, p. 4. 91. Patricia Mellencamp, Indiscretions, p. 205. From shaquana.fatimabc at jawpc.com Mon Mar 28 23:24:32 2011 From: shaquana.fatimabc at jawpc.com (Shaquana Fatima) Date: Tue, 29 Mar 2011 02:24:32 -0400 Subject: If you choose the right penis enhancement pills that work for you, you will find yourself unwilling to go back to how "sex used to be. Message-ID: <92l51p28v96-23305870-949z4d97@uqothxp> Why You Need to Buy Penis Pills? If you choose the right penis enhancement pills that work for you, you will find yourself unwilling to go back to how "sex used to be." Men use male enhancement supplements for a wide range of reasons. Indeed, there are certain factors that can interfere with a man's optimum enjoyment of sex - lifestyle, health habits, stress, aging, and many others. Many men would like to counter the effect of these factors by taking penis pills. For some, they want to improve certain aspects of their sexuality, such as: - Shortening the time it takes to achieve erection - Improving quality of erection - attaining harder, firmer and longer-lasting erections - Increase semen volume - Enhance sperm motility and virility - Increase sexual drive and libido - Heighten sexual stamina - Achieve more intense, longer and more frequent orgasms http://longpenislike.ru From mail at ukrmuseum.org Tue Mar 29 03:38:54 2011 From: mail at ukrmuseum.org (=?koi8-r?B?7sHMz8fP19nFINPIxc3Z?=) Date: Tue, 29 Mar 2011 02:38:54 -0800 Subject: =?koi8-r?B?89TSwdTFx8nRINrB1NLB1CDEzNEgz9DUyc3J2sHDyckg7uTzIMkgzsHM?= =?koi8-r?B?z8fBIM7BINDSycLZzNg=?= Message-ID: <8896EEA2070447BA83CBAF2CFFADD239@SS> тридцатое марта Тема: Затратные механизмы в налоговых схемах для оптимизации НДС и налога на прибыль +7 (код Москвы) 792*2I*22 <<<>>> 742_9I98 Цель: Курс посвящен изучению затратых механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Участники получат краткие индивидуальные консультации по тематике данного курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные","серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов – ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. 4. Виды приемлимых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 5. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 6. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 7. Ответы на вопросы. По желанию и при наличии возможности – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. По вопpоcам pегucтаpацuu обpащайтеcь по тел: Московский код; 4Ч53266 : ЧЧ5_4О95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6740 bytes Desc: not available URL: From measl at mfn.org Tue Mar 29 00:51:36 2011 From: measl at mfn.org (J.A. Terranson) Date: Tue, 29 Mar 2011 02:51:36 -0500 (CDT) Subject: cyberpunk is dead (fwd) Message-ID: ---------- Forwarded message ---------- Date: Mon, 28 Mar 2011 14:36:35 -0700 From: el at riseup.net To: nettime Subject: cyberpunk is dead Resent-Date: Tue, 29 Mar 2011 08:51:20 +0200 Resent-From: nettime at kein.org Resent-To: Nettime notes on the development of the so-called social web and the role of cyberpunks inside this process http://el.blogsport.de/2011/03/28/cyberpunk-is-dead/ The weakness of cyberpunk was its virtuality, being a complex of imagery mostly used by writers in fiction, by bloggers in egomany and by journalists in, well, journalism. What was missing, is a cyberpunk realism, in the sense of an aesthetics that relates to and occupies something else than the realms of literature. From this viewpoint, real existing cyberpunk was the adaption of cyberpunk as a shiny static representation for what was left of the dynamic of electronic pioneers, the early computer hackers, and their process of dissolving their avant-guard status in time and into mass. Comparable to the punks that were the mass reproduction of the avantgarde activists before them. The name of this historic forerunner of punk referred to here, was the Situationist International, a 1950s and 60s avantgarde group (Read their texts and Greil Marcus history book). Just like the situationists worked at the fissure between literature and street, the early real-existing cyberpunks worked at the fissure of literature and cyberspace. The cyberpunk literature served its purpose to provide aesthetic naratives some time ago, and in the ensuing process the real-existing groups that were trying to adapt these clichis turned into clichis for others to adapt to. A virtual movement. What constitutes the weakness of the aesthetic force, results in the weakness as a material force: Cyberpunk made its way on the market of despiritualized ideas, as the shopping good for the masses. Ever tried to squat something in Secondlife, like offline punks would do? Technically impossible. In the process to solve this dilemma, cyberpunk had to give up integral parts to be able to work on social topics without a realism and therefore without a political strategy. Which led to a certain aligning with the social and economical facts in the process of trying to gain a social impact through the cyberpunk models. Wondering why Wikileaks doesnt have a wiki anymore? Because cypherpunk (with ph in this case, refering to those fractions of cyberpunk that focuse on encryption) was either mass movement or political tactics of an avant-guard. In deciding to focus on political manouvres, an open publishing model is not fitting anymore. Contrary to this, CHAN-culture (imageboards, fast communication channels) and the ANON-meme (crowd orientated cyber actions) try different ways in waging real mass-based cyberwars, they reach this point by being more punk again, punk as in: deviant subculture that parents are afraid of. Still inside this historic #fail of cyberpunk, there were hacker groups and cyberpunk collectives not only representing the literary images of cyberpunk, but trying to do cyberpunk realism. In the sense of picking up the punk culture and porting it to the cyberspace. Working with images and text in the new media, taking it back to the roots of post-war pre-punk movements, creating free tools, cultural gifts and mixed artworks, like all the minds from Guy Debord (and many before), to John Lyndon, to Allen Ginsberg, to Wau Holland, had shown the way. But working with punk attitude in the 90s and the Zeros proofs to be a delicate business. Now we can see the last phase of cyberpunk, the virus has spread, it has dissolved into one of its more justified aims: the dissolution in non-elitist mass approaches. If you search today for crazy netpunks, doing the mix with images, ideas and slogans, fighting cyberwars against scientology and other creepy institutions, you dont come to the avantgarde collectives, you go the chans. These collectives had been reaching out to you, flooding you with texts, movies, songs, images, a vast wave of media. Working all the time under fake identities to give away anticommodities of a little countercultureindustry. With that fulfilling the idealist idea of the free and useful citizens. Only through the nature of these efforts being collective and collaborative, this theater of autonomy could be kept running, serving as a good example to all little self-managed projects out there that with a little circle of friends you can reach everything you can imagine. Nothing else though. So when the participants got tired of the shooting in the dark acceleration these collective products had taken, all the releases, all the administration, all the fuzz, it went down the spiral of individualization: moving to a aggregation of solo blogs, then moving on to the short notes of twitter, a medium only to well fitting for the self-advertisement. After the autonomous text production of the last two decades, we face a shift to short notes and images. The DIY music scene remains a bit unaffected by this, since the hope to become a money earning musician is still a more powerful cultureindustrial meme than the one of a writer actually getting paid. The recent shifting from myspace to facebook shows although, that everyone-is-an-artist wasnt a powerful enough idea. It had to be self-representation, mini-blogging, star-cult, focus on images and other spectacular media instead of text: The hyperindividualist self-representation platform of facebook suited the masses best. For large parts, this big network is filled with representations of static faces. Faces, that are amongst our most subliminal ways of communicating, become our fastest and most plain way of making a statement. Update profile picture, comment, like, like back, update again. The collectivization of communication (lat. communicare = do sth. together) failed, in fact this means the failure of mass art. Todays market of representations means that we exchange images that are valued by statements without consequence, statements whose only value is the one of attention, something we have learned from the advertising process, which has become the key process of culture. This cultural praxis fails to find a history of the human faces. The faces tried to break the boundaries of word and image, they were processes of conscious creation of speaking images for the feelings that words fail to describe. The times of boredom that everyone wanders now, through images that dont form related stories anymore, are a result of loosing our dream of creating non-static post-representative playful expressions. To associate the fragile idea of friendship still with the formalized and online media based networks of friends is the dramatic deception that covers this loss. It was the fragile nature of friendship itself that was lost, that what made communication between friends comfortable. The need to be near to others and to be free on ones own at the same time, was dissolved into the mode of being present to each other only through distance. The tools of social media cover up the failure of the social itself. Giving up the idea of the possibility of social relations in which one can give each other the comfort of being together and granting all freedom the same time, is a failure whose results may be not so easy to cover. This is not a judgment about the idea of mass communication per se, but about the idea and modes of social media networks. Coming back to the crews for once: the game of creating a strong collective representation that immediately represents itself was programmed to fail in a society that only uses representations to mark the value of exchangeability. The punk image of a cybergang that somehow evades the mainstream norms and holds up the, now conservative, ideas of elite and underground was the joke that had to choke itself. It was working with the idea of an everchanging collective project that would remain the same all the time in order to avoid to spoil the fans. This planned contradiction of the ultimate hype was not scandalous anymore when the whole web turned to the noncontradictive targeted creation of hypes. What these groups had caricatured since decades was only about to become the online model of creating static ideas that represent dynamic change. The cybergangs were constructed never to end, because as a project, a channel, it was not aiming for something and therefore it couldnt fail. Other media collectives of today, opposed to this, want to start because they realize that pictured dynamics has to be the key feature of a successful industrial media product. So from this learning process we gain the perspective of boringness. Being a progressive participant of cyberspace today is not about being elite and surfing the most underground hubs. Its about surfing on the top of it all, on the big normal junkyard of human creation and picking up the inspirations together. Its also about reading a book again, following an authors thought through 400 pages instead of 140 letters. And also in the same sense: doing a website again, a static thing that waits for hundreds to come by, just like a book in the library, instead of giving daily updates to attract some other thousands that need their daily fix of info. Some books still are more actual than the daily news reports (when these were still existing, now the news must be updated all the time). And maybe the lost dreams in these books need an actualisation through a website, instead of just a quotation in the fast streams of actualities. Its about refusing the entertainment, its about finding enlightment in thought processes themselves and not in what forms they have been given for representation. Its about picking up something dead and giving it life instead of living the perpetual death of the bubble of statements. The non-conformism of today is a real challenge: To deal with something beyond the instantaneous satisfaction of a pseudodynamic static image. The progressive illustrations, thoughts, projects and processes will need you to stumble over them, to search for them, to look closely or even stare at them (not like you stared at the TV since 50 years ago, at youtube since 5 years ago). It needs you to stop worrying about the central hub, website or plattform that you feel like home in. It needs you to stop worrying about any rss-feeds that you only used to feed your identity out of angst in this process of identification, representation and individualisation. Not to learn even more exiting ways of being alone  you can easily find those in the entertainment industry  but to pick up again the idea of communication. Surf around, take off from time to time and play with what and whom you might find. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org From fweimer at bfk.de Tue Mar 29 00:30:15 2011 From: fweimer at bfk.de (Florian Weimer) Date: Tue, 29 Mar 2011 07:30:15 +0000 Subject: The state-level attack on the SSL CA security model Message-ID: * Crist Clark: > Any large, well funded national-level intelligence agency > almost certainly has keys to a valid CA distributed with > any browser or SSL package. It would be trivial for the US > Gov't (and by extension, the whole AUSCANNZUKUS intelligence > community) to simply form a shell company CA that could get > a trusted cert in the distros or enlist a "legit" CA to do > their patriotic duty (along with some $$$) and give up a key. I think this is far too complicated. You just add your state PKI to the browsers, and the CPS does not require any checks on the Common Name, to verify it's actually somehow controlled by the certificate holder. Curiously, such CAs can pass Webtrust audits. Now I'm a realist and assume that the bureaucrats involved are just too incompetent to write a proper CPS (and the auditors to lazy to notice). Authoring policies and paying attention to detail, should be second nature to them, but somehow I doubt that the FPKI (say) issues certificates for non-federal entities to help with ongoing FBI investigations. (Same for the German government agencies who actually managed to get Mozilla approval for their non-CN-checking CAs.) -- Florian Weimer BFK edv-consulting GmbH http://www.bfk.de/ Kriegsstra_e 100 tel: +49-721-96201-1 D-76133 Karlsruhe fax: +49-721-96201-99 ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Mar 29 03:31:55 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 29 Mar 2011 12:31:55 +0200 Subject: The state-level attack on the SSL CA security model Message-ID: <20110329103155.GD23560@leitl.org> ----- Forwarded message from Florian Weimer ----- From futurion at branan-environment.ru Tue Mar 29 06:20:27 2011 From: futurion at branan-environment.ru (=?koi8-r?B?9/zkIC0gydrNxc7FzsnRLg==?=) Date: Tue, 29 Mar 2011 14:20:27 +0100 Subject: =?koi8-r?B?9d7B09TOycvBzSD3/OQ=?= Message-ID: <000d01cbee0b$afb5a880$6400a8c0@futurion> тридцатое марта - первое апреля > Внимание изменения! Нововведения в таможенном законодательстве: новые формы таможенных деклараций и новый порядок декларирования, контроля и корректировки таможенной стоимости товаров с 01 января 2011 года < (код Москвы) 7.9_2-2-1_2/2 и 792_21*2.2 Образование Таможенного союза и единой таможенной территории привело к значительным изменениям в таможенном законодательстве. С 1 июля 2010 года вступил в силу Таможенный кодекс Таможенного союза. С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: * новые формы бланков декларации на товары (решение Комиссии таможенного союза ╧257 от 20 мая 2010 года) и транзитной декларации (решение Комиссии таможенного союза ╧ 289 от 18 июня 2010 года) * инструкция о порядке заполнения декларации на товары (утвержденная в окончательной редакции решением Комиссии таможенного союза ╧379 от 20 сентября 2010 года) * инструкция о порядке заполнения транзитной декларации (решение Комиссии таможенного союза ╧289 от 18 июня 2010 года) * новые классификаторы, используемые для заполнения таможенных деклараций (решение Комиссии таможенного союза ╧378 от 20 сентября 2010 года) * новый порядок декларирования таможенной стоимости и новые формы бланков декларации таможенной стоимости (ДТС и ДТС-1) и корректировки таможенной стоимости и таможенных платежей (КТС) (решение Комиссии таможенного союза ╧ 376 от 20.09.2010 года) Цель: * ознакомить участников ВЭД с особенностями заполнения новых форм деклараций, изменениями в классификаторах, используемых для заполнения таможенных деклараций. * подготовить участников ВЭД к практической работе в условиях действия новых нормативно-правовых документов таможенного союза, регламентирующих вопросы определения, декларирования, контроля и корректировки таможенной стоимости товаров * обсудить проблемы правоприменительной практики по вопросам таможенной стоимости, в том числе дать ответы на вопросы участников ВЭД по актуальным проблемам определения и контроля таможенной стоимости товаров Программа: 1. Новая форма таможенной декларации: особенности заполнения * Изменения в порядке заполнения декларации на товары (ДТ) при декларировании товаров, ввозимых (ввезенных) на таможенную территорию Таможенного союза * Особенности заполнения новой формы декларации на товары, вывозимые с таможенной территории Таможенного союза * Порядок внесения изменений и (или) дополнений в сведения, заявленные в декларации на товары, до и после выпуска товаров * Особенности заполнения графы 47 "Исчисление платежей" 2. Классификаторы и перечни нормативно-справочной информации, используемые для заПолнения таможенных деклараций Основные изменения. 3. Транзитная декларация: новая форма и правила ее заполнения. 4. Особенности электронного и интернет декларирования. 5. Законодательство Таможенного союза по вопросам таможенной стоимости товаров * Таможенный кодекс Таможенного союза * Соглашение по определению таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза; * Решения Комиссии таможенного союза по вопросам таможенной стоимости товаров: * порядок декларирования таможенной стоимости товаров * порядок контроля таможенной стоимости товаров * порядок корректировки таможенной стоимости товаров * новые формы бланков декларации (ДТС и ДТС-1) и корректировки таможенной стоимости (КТС). 6. Практические проблемы заявления, контроля и корректировки таможенной стоимости товаров * решения, принимаемые таможенными органами в ходе таможенного контроля * дополнительная проверка заявленной таможенной стоимости товаров * корректировка таможенной стоимости товаров * порядок обжалования в арбитражных судах решений таможенных органов по вопросам корректировки таможенной стоимости Информацию можно получить по телефонам: 8 Моск. код:/4_Ч*5/З*2_.6-6 : ЧЧ54О5З -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7370 bytes Desc: not available URL: From pgut001 at cs.auckland.ac.nz Mon Mar 28 18:22:30 2011 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Tue, 29 Mar 2011 14:22:30 +1300 Subject: Iranian state-sponsored cyberwarfare is indistinguishable from script kiddies Message-ID: The original source of the info about the hack has now posted the private key corresponding to one of the bogus certs at http://pastebin.com/X8znzPWH. The public-key components are identical, haven't verified that the private key matches yet, but I'm going to guess it will. So a global CA wasn't 0wned by a nation-state cyberwar agency but by a random script kiddie having some fun. Oh the embarassment :-). Peter. From pgut001 at cs.auckland.ac.nz Mon Mar 28 19:50:38 2011 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Tue, 29 Mar 2011 15:50:38 +1300 Subject: Iranian state-sponsored cyberwarfare is indistinguishable from script kiddies In-Reply-To: Message-ID: For people who aren't following this via pastebin, to paraphrase Crocodile Dundee, "you call that a successful CA attack? *This* http://pastebin.com/CvGXyfiJ is a successful CA attack": "Here is another proof: http://www.multiupload.com/TGDP99CJLH. I uploaded JUST 1 table of their ENTIRE database which I own." Looks like every Comodo account should now be regarded as compromised. I wonder if we'll finally see a CA cert pulled from a browser? Or does the CA have to behead someone live on Youtube before the browser vendors will act? Peter. From DavidGarca at exc.com Tue Mar 29 17:24:07 2011 From: DavidGarca at exc.com (Cultural glamour) Date: Wed, 30 Mar 2011 05:24:07 +0500 Subject: Prestigious watch and gifts Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 614 bytes Desc: not available URL: From maild at innoplus.ru Tue Mar 29 23:24:29 2011 From: maild at innoplus.ru (Beverley Allen) Date: Wed, 30 Mar 2011 08:24:29 +0200 Subject: =?koi8-r?B?7MXHwczYzs8gySDC2dPU0s8hIPvFzsfFztPLycUg98na2SEg79QgMyDS?= =?koi8-r?B?wcIuxM7FyiEg4sXaIMzJ3s7Px88g0NLJ09XU09TXydEh?= Message-ID: <000d01cbee9a$be6ed560$6400a8c0@maild> ВИЗОВЫЙ ОПЕРАТОР! АККРЕДИТАЦИЯ В ПОСОЛЬСТВЕ! БЫСТРО! ЛЕГАЛЬНО! Телефоны: +7 (495) 649 9170; +7 (499)3431902; СПЕЦПРЕДЛОЖЕНИЕ НЕДЕЛИ. Испания. Шенгенская мульти-виза - 6 месяцев за 350 у.е. ДЕЛОВАЯ МУЛЬТИВИЗА в ГРЕЦИЮ СПЕЦПРЕДЛОЖЕНИЕ 6 мес- 650 ЕВРО! СПЕШИТЕ! ТОЛЬКО НА ЭТОЙ НЕДЕЛЕ СКИДКА 10% при подаче 2-х документов сразу. Шенгенские ДЕЛОВЫЕ мульти-визы за 4 РАБОЧИХ ДНЯ Среднесрочные - 1 год - 900 у.е, 6 месяцев - 700 у.е, 3 месяца - 500 у.е. (сбор включен) Долгосрочные - 2 года - 1800 у.е, 3 года - 2 650 у.е. (сбор включен) ШЕНГЕН БЕЗ СОБЕСЕДОВАНИЯ, БЕЗ ПРИСУТСТВИЯ, БЕЗ ЗАПИСИ В КОНСУЛЬСТВЕ!!!! Работаем со сложными случаями - мультивизы для уроженцев и жителей Кавказа и паспортов с отказами Аккредитации в Посольствах!!! ВИЗЫ в США, Великобританию, Кипр, Китай и др. страны ОПЛАТА деловых мульти-виз только ПОСЛЕ ВЫХОДА ВИЗЫ. ГАРАНТИЯ. Телефоны: +7 (495) 649 9170; +7 (499)3431902; (без выходных) СПЕЦИАЛЬНЫЕ ПРЕДЛОЖЕНИЯ ПО ТУРАМ, ОГРОМНАЯ БАЗА ГОРЯЩИХ ТУРОВ!!!!! ПРИГЛАШЕНИЯ для иностранцев, страхование на даты поездки, ПЕРЕВОДЫ документов. Телефоны: +7 (495) 649 9170; +7 (499)3431902 (без выходных) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3820 bytes Desc: not available URL: From spermicidesq5394 at bebopdesigns.com Tue Mar 29 20:33:15 2011 From: spermicidesq5394 at bebopdesigns.com (Tyson Snell) Date: Wed, 30 Mar 2011 08:33:15 +0500 Subject: =?koi8-r?B?68/O08HM1MnOx8/X2cUg1dPM1cfJ?= Message-ID: <000d01cbee8b$346d8a50$6400a8c0@spermicidesq5394> Многопрофильная консалтинговая компания г. Москвы, с 2001 года занимающаяся профессиональной деятельностью в области ведения бухгалтерского и налогового учета предлагает: Бухгалтерские услуги: * составление нулевой отчетности от 1000 рублей за комплект; * бухгалтерское сопровождение от 5000 рублей в месяц; * подготовка и заполнение декларации по налогу на доходы физических лиц 3-НДФЛ от 500 рублей; * восстановление бухгалтерского и налогового учета; * постановка налогового учета; * налоговый консалтинг; Услуги в области налогообложения: * сопровождение налоговых проверок; * налоговые споры; * оптимизация налогообложения; * подготовка пакета документов в ИФНС по возмещению НДС; Качество подтверждено, ответственность застрахована. Мы предоставляем скидки на аудиторские, юридические и обучающие услуги при заключении договора на постановку, ведение или восстановление бухгалтерского и (или) налогового учета. Подробная информация по телефону: 8 (495) 725 - 04 √ 59 Адрес: м. Бауманская, ул. Бауманская, д.6, бизнес центр ╚Виктория Плаза╩ From buh at chromaggus.ru Tue Mar 29 17:59:49 2011 From: buh at chromaggus.ru (=?koi8-r?B?89TSwcjP19nFINfazi4g1dbFIM7FINPU0sHbzs8=?=) Date: Wed, 30 Mar 2011 08:59:49 +0800 Subject: =?koi8-r?B?z9DUyc3J2sHDyckg0sHTyM/Ez9cgzsEg19nQzMHU1SDCxczPyiDawdLQ?= =?koi8-r?B?zMHU2Q==?= Message-ID: <000d01cbee75$c5570570$6400a8c0@buh> Четвертое апреля Методы оптимизации расходов на выплату белой зарплаты: как выжить после замены ЕСН страховыми взносами +7 (код Москвы) 7*9-2_2-1.2.2 <<>> 74_29l-98 Цель: Ставка обязательных страховых взносов с зарплаты с 2011 года составляет 34% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала ЕСН заменена отменой уплаты взносов с суммы дохода свыше 463 тыс. рублей, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь √ назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1. Обзор изменений законодательства, связанных с повышением ставки страховых взносов Сколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2011 гг. Какие схемы стали невыгодными; у каких налогоплательщиков положение даже улучшилось. 2. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. 3. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность в 2011 г.; * дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с кассовой дисциплиной и политикой ЦБ. Текущая ситуация с обложением таких доходов НДФЛ. 4. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Страхование жизни работников и ДМС за счет предприятия. 6. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. 7. Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 8. Использование процентных займов от физлиц. Расчет эффективности. 9. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 10. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, 11. Создание недоимки по налогам с ФОТ на фирме, не обремененной активами √ пример "серой" схемы (как нельзя "оптимизировать"!), 12. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 13. Ответы на вопросы. По желанию √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 Моск. код: 4Ч5*З968 ; ЧЧ5/3_9.6_8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6766 bytes Desc: not available URL: From basiliaantonettabk at prudentialdoss.com Wed Mar 30 06:44:15 2011 From: basiliaantonettabk at prudentialdoss.com (Basilia Antonetta) Date: Wed, 30 Mar 2011 09:44:15 -0400 Subject: Best Male Enhancement Pill, Natural Penis Enlargement Pills Message-ID: <39c35i47y34-18709321-377g2z84@xbd8yiyloeqk> Best Male Enhancement Pill, Natural Penis Enlargement Pills Wonder what is the Best Male Enhancement Pill? Best Male Enhancement, Natural Penis Enlargement Pills discounts and more! http://longerpenisink.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 584 bytes Desc: not available URL: From buh at latinofiesta.ru Wed Mar 30 02:42:29 2011 From: buh at latinofiesta.ru (=?koi8-r?B?5MzRINzL09DP0tTF0s/XIMkgyc3Qz9LUxdLP1w==?=) Date: Wed, 30 Mar 2011 10:42:29 +0100 Subject: =?koi8-r?B?7s/X2cUgxs/SzdkgINTBzc/Wxc7O2cggIMTFy8zB0sHDyco=?= Message-ID: <000d01cbeeb6$677bb450$6400a8c0@buh> 30 марта Оl апреля > Внимание изменения! Нововведения в таможенном законодательстве: новые формы таможенных деклараций и новый порядок декларирования, контроля и корректировки таможенной стоимости товаров с 01 января 2011 года < \Моск. код/ ЧЧ54095 и 445_ЧО95 Образование Таможенного союза и единой таможенной территории привело к значительным изменениям в таможенном законодательстве. С 1 июля 2010 года вступил в силу Таможенный кодекс Таможенного союза. С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: * новые формы бланков декларации на товары (решение Комиссии таможенного союза ╧257 от 20 мая 2010 года) и транзитной декларации (решение Комиссии таможенного союза ╧ 289 от 18 июня 2010 года) * инструкция о порядке заполнения декларации на товары (утвержденная в окончательной редакции решением Комиссии таможенного союза ╧379 от 20 сентября 2010 года) * инструкция о порядке заполнения транзитной декларации (решение Комиссии таможенного союза ╧289 от 18 июня 2010 года) * новые классификаторы, используемые для заполнения таможенных деклараций (решение Комиссии таможенного союза ╧378 от 20 сентября 2010 года) * новый порядок декларирования таможенной стоимости и новые формы бланков декларации таможенной стоимости (ДТС и ДТС-1) и корректировки таможенной стоимости и таможенных платежей (КТС) (решение Комиссии таможенного союза ╧ 376 от 20.09.2010 года) Цель: * ознакомить участников ВЭД с особенностями заполнения новых форм деклараций, изменениями в классификаторах, используемых для заполнения таможенных деклараций. * подготовить участников ВЭД к практической работе в условиях действия новых нормативно-правовых документов таможенного союза, регламентирующих вопросы определения, декларирования, контроля и корректировки таможенной стоимости товаров * обсудить проблемы правоприменительной практики по вопросам таможенной стоимости, в том числе дать ответы на вопросы участников ВЭД по актуальным проблемам определения и контроля таможенной стоимости товаров Программа: 1. Новая форма таможенной декларации: особенности заполнения * Изменения в порядке заполнения декларации на товары (ДТ) при декларировании товаров, ввозимых (ввезенных) на таможенную территорию Таможенного союза * Особенности заполнения новой формы декларации на товары, вывозимые с таможенной территории Таможенного союза * Порядок внесения изменений и (или) дополнений в сведения, заявленные в декларации на товары, до и после выпуска товаров * Особенности заполнения графы 47 "Исчисление платежей" 2. Классификаторы и перечни нормативно-справочной информации, используемые для заПолнения таможенных деклараций Основные изменения. 3. Транзитная декларация: новая форма и правила ее заполнения. 4. Особенности электронного и интернет декларирования. 5. Законодательство Таможенного союза по вопросам таможенной стоимости товаров * Таможенный кодекс Таможенного союза * Соглашение по определению таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза; * Решения Комиссии таможенного союза по вопросам таможенной стоимости товаров: * порядок декларирования таможенной стоимости товаров * порядок контроля таможенной стоимости товаров * порядок корректировки таможенной стоимости товаров * новые формы бланков декларации (ДТС и ДТС-1) и корректировки таможенной стоимости (КТС). 6. Практические проблемы заявления, контроля и корректировки таможенной стоимости товаров * решения, принимаемые таможенными органами в ходе таможенного контроля * дополнительная проверка заявленной таможенной стоимости товаров * корректировка таможенной стоимости товаров * порядок обжалования в арбитражных судах решений таможенных органов по вопросам корректировки таможенной стоимости По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 (код Москвы) 7922i*22 \\// 792/2|/2.2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7370 bytes Desc: not available URL: From qjyfuao at yahoo.co.jp Wed Mar 30 05:16:14 2011 From: qjyfuao at yahoo.co.jp (oglatibk@yahoo.co.jp) Date: Wed, 30 Mar 2011 15:16:14 +0300 Subject: =?ISO-2022-JP?B?GyRCOkc/NzJIRUUhJiVWJWklcyVJSUohJiUyITwlYDUhJCw6R0JnIzkjOSFzJSolVSEqT0NCaiROQmc/TTUkJSohPCUvJTclZyVzInYbKEI=?= Message-ID: <201103301121.p2UBL5sD029790@proton.jfet.org> �@�@���������������������������������������������������������� �@�@���l���C�������i�������P���~���I���H���ń����������鄫�H�� �@�@���������������������������������������������������������� ,:��܁�:,_,:��܁�:,_,:��܁�:,_,:��܁�:,_,:��܁�:,_,:��܁�:, �@�@�@�@�@�@�@�@�@���V���o�|�C���g�I�[�N�V������ ,:��܁�:,_,:��܁�:,_,:��܁�:,_,:��܁�:,_,:��܁�:,_,:��܁�:, �@�@�@�@�@�@http://medtechediting.com/otoku/index.html �_�u�m�@�@ ������������������������������������������������������������������ �����������@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�F �����@�@���������o�^�Ń|�C���g1,500�~���v���[���g�L�����y�[���� �E �����������@�@�@http://medtechediting.com/otoku/index.html�@�@�@�F ������������������������������������������������������������������ ���ŐV�̑�l�C���i(iPad�A�t���e���r�A�m�[�gPC�A�ŐV�Ɠd)���ڔ������� �@--------------------------------------------------------------- �@�@�@������������������������������������������������������������ �@�@�@���[�����������I�����������������I�����������I�����N�����I�� �@�@�@������������������������������������������������������������ �@�����E�d�c�@[http://medtechediting.com/otoku/index.html]�@�c�d�E���� �S���i���ő�Œ艿��99%OFF!! �������������������������������������������� ����iPad64G�i�艿�F6��8,800�~�j��366�~�@ ���@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@ �����A�N�I�X 52V�^�i�艿�F34��8,000�~�j��1,114�~ ���@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@ ����Let�fs note�i�艿�F22��4,000�~�j��6,270�~ �@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@�@ �������������������������������������������� �����O�C���y�[�W�͂����� �� ��[http://medtechediting.com/otoku/index.html] ������������������������������������������������������ ���V�����������i����������������X�����DŽ����������I�� ������������������������������������������������������ ���@�����|���@�@�����o ���@���Ł@dynabook RX3 ���@JCB�M�t�g�J�[�h�@30���~�� ���@�A�b�v���@iPod 64GB ���@�p�i�\�j�b�N VIERA�@54V�^ �v���Y�}�e���r ���@�C�V�� Wii �{�� ���@�_�C�\���@�T�C�N�����|���@ ���������������������������������������������������������������������� ���������������������������������������������������������������������� �@�@�@���i�͂��ׂĐV�i���J���A���[�J�[�̕ۏؕt���Ȃ̂ň��S�ł��B ���������������������������������������������������������������������� ���������������������������������������������������������������������� �@�@�ȒP�I�����o�^�Ń|�C���g�Q�b�g�I�I �A�@[http://medtechediting.com/otoku/index.html] �B�@�ȒP���D�ŁA���i��i�����D�I�I �C�@�ŒZ�P���ł��茳�ɁI�I�I --------------------------------------- ��5���œo�^�I�����D�ŁI�I�����茳�ɁI�I�I �������o�^�͂����� �@�@�@���������� �@�@�@���@�@�@�� �@�@�@���������� �@ �� �� �@�����@�� �� �@�@�@�_�_�@�����^ �^ http://medtechediting.com/otoku/index.html �_�_�_�_�_�_�_�_�_�_�_�@�@�^�^�^�^�^�^�^�^�^�^�^ ������������������������������������������������ ���ń����V�����������D�����������i�����������ʄ� ������������������������������������������������ �^�^�^�^�^�^�^�^�^�^�^�@�@�_�_�_�_�_�_�_�_�_�_�_ ��JCB�@�M�t�g���y10���~���z��M�t�g���� ���D��z�F 1,130�~ �i98.8���j http://medtechediting.com/otoku/index.html �����C�E���B�g�� �_�~�G �A�Y�[�� �l���@�[�t��PM��t�@�b�V�����E�u�����h�� ���D��z�F 445�~ �i99.3���j http://medtechediting.com/otoku/index.html ��TOSHIBA REGZA 40V�^ �t���e���r 40�`1 �u���b�N��e���r�� ���D��z�F 581�~ �i99.4���j http://medtechediting.com/otoku/index.html �����������������������@�{���̒��ڏ��i�̂��Љ�@���������������������� �@���l�C�@�V���i�� �@�P�ATOSHIBA �X�`�[���I�[�u�������W(21L) �Ηq�I�[�u�� ER-BJ6 �u���b�N �@�s�ꉿ�i�F�@35,000 �@http://medtechediting.com/otoku/index.html ���������������������������������������������������������������������� �@ �@�Q�AFUJITSU FMVL52CB �m�[�gPC LIFEBOOK LH52 �V���C�j�[�u���b�N �@�s�ꉿ�i�F�@100,000 �@http://medtechediting.com/otoku/index.html ���������������������������������������������������������������������� �@�R�ALOUIS VUITTON(���C�E���B�g��) ���܌�2�܍�z M93521 �J���[���F���j�E�A�}�����g �@�s�ꉿ�i�F�@83,000 �@http://medtechediting.com/otoku/index.html ���������������������������������������������������������������������� �@�S�ASHARP �E�H�[�^�[�I�[�u�� �w���V�I AX-CX1 �X�e���z���C�g �@�s�ꉿ�i�F�@60,000 �@http://medtechediting.com/otoku/index.html ���������������������������������������������������������������������� �@�T�A�����s�[�X ONE PIECE �S���Z�b�g(1-60��) �@�s�ꉿ�i�F�@24,225 �@http://medtechediting.com/otoku/index.html ���������������������������������������������������������������������� ���؏��i�����R�Ō�����܂��B ���񂱂̋@��ɗ~�������i�ɓ��D���Ă݂ĉ������� ���^�_���@ �^�I���_�@�t���e���r�E�p�\�R���E�f�W�J���E�u�����h�i�ȂǁA �_�ԋ߁^�@�����̏��i���c�莞�ԋ͂��ƂȂ��Ă���܂��B ���_�^���@ ��iPad�@64G�@ �s�ꉿ�i�F68,800�@�@�y�Ɠd�z http://medtechediting.com/otoku/index.html ��FUJIFILM FinePix Z800EXR �u���b�N �s�ꉿ�i�F32,000�@�@�y�J�����z http://medtechediting.com/otoku/index.html ��ROLEX �����b�N�X �G�N�X�v���[���[�U�@�r���v �s�ꉿ�i�F418,000�@�@�y�t�@�b�V�����E�u�����h�z http://medtechediting.com/otoku/index.html ��Panasonic 19V�^�n�C�r�W�����e���r TH-L19C2-K �s�ꉿ�i�F49,800�@�@�y�e���r�z http://medtechediting.com/otoku/index.html �����Ł@42V�^�@LED REGZA 42Z1 [42�C���`] �s�ꉿ�i�F299,800�@�@�y�e���r�z http://medtechediting.com/otoku/index.html ��LOUIS VUITTON(���C�E���B�g��)N61734�_�~�G �|���g�t�H�C���E�T���@�G�x�k�@�t�@�X�i�[�t������z �s�ꉿ�i�F84,000�@�@�y�t�@�b�V�����E�u�����h�z http://medtechediting.com/otoku/index.html �����C�J 18151 D-LUX 5�@�@�y�J�����z http://medtechediting.com/otoku/index.html ���p�i�\�j�b�N VIERA 46V�^ �v���Y�}�e���r �y�Ɠd�z http://medtechediting.com/otoku/index.html ��apple iPad Wi-Fi �y�Ɠd�z http://medtechediting.com/otoku/index.html �����B�g�� ���m�O���� �y�K�X55 �@�@�y�t�@�b�V�����E�u�����h�z http://medtechediting.com/otoku/index.html ��JTB���s�� �V�i50���~���@�@�y�`�P�b�g�z http://medtechediting.com/otoku/index.html ���C�V�� Wii �{�� �y�Ɠd�z http://medtechediting.com/otoku/index.html ��BALENCIAGA �U��V�e�B�@�@�y�t�@�b�V�����E�u�����h�z http://medtechediting.com/otoku/index.html ��ROLEX �G�N�X�v���[���[�U�@�y�t�@�b�V�����E�u�����h�z http://medtechediting.com/otoku/index.html �����Ńu���[���C���R�[�_�[ 3D�f�B�X�N�Ή�RD-X10 �y�Ɠd�z http://medtechediting.com/otoku/index.html ��i Robot �����|���@�����o �y�Ɠd�z http://medtechediting.com/otoku/index.html ������ ZABOON TW-Z360L-W �y���@�z http://medtechediting.com/otoku/index.html �������� ���_�^�� �������� ���z�M��~�̊�]�̕��́� http://medtechediting.com/otoku/index.html From transitionhi4 at belamesa.com Wed Mar 30 12:29:55 2011 From: transitionhi4 at belamesa.com (Darcy Walton) Date: Wed, 30 Mar 2011 21:29:55 +0200 Subject: =?koi8-r?B?68/O08HM1MnOx8/X2cUg1dPM1cfJ?= Message-ID: <000d01cbef08$77690820$6400a8c0@transitionhi4> Многопрофильная консалтинговая компания г. Москвы, с 2001 года занимающаяся профессиональной деятельностью в области ведения бухгалтерского и налогового учета предлагает: Бухгалтерские услуги: * составление нулевой отчетности от 1000 рублей за комплект; * бухгалтерское сопровождение от 5000 рублей в месяц; * подготовка и заполнение декларации по налогу на доходы физических лиц 3-НДФЛ от 500 рублей; * восстановление бухгалтерского и налогового учета; * постановка налогового учета; * налоговый консалтинг; Услуги в области налогообложения: * сопровождение налоговых проверок; * налоговые споры; * оптимизация налогообложения; * подготовка пакета документов в ИФНС по возмещению НДС; Качество подтверждено, ответственность застрахована. Мы предоставляем скидки на аудиторские, юридические и обучающие услуги при заключении договора на постановку, ведение или восстановление бухгалтерского и (или) налогового учета. Подробная информация по телефону: 8 (495) 725 - 04 √ 59 Адрес: м. Бауманская, ул. Бауманская, д.6, бизнес центр ╚Виктория Плаза╩ From fumigatorcc at burkblast.com Wed Mar 30 05:47:33 2011 From: fumigatorcc at burkblast.com (Rudy Ferreira) Date: Wed, 30 Mar 2011 21:47:33 +0900 Subject: =?koi8-r?B?98/T09TBzs/XzMXOycUgwtXIx8HM1MXS08vPx88gySDOwczPx8/Xz8fP?= =?koi8-r?B?INXexdTB?= Message-ID: <000d01cbeed8$a3891dd0$6400a8c0@fumigatorcc> Многопрофильная консалтинговая компания г. Москвы, с 2001 года занимающаяся профессиональной деятельностью в области ведения бухгалтерского и налогового учета предлагает: Бухгалтерские услуги: * составление нулевой отчетности от 1000 рублей за комплект; * бухгалтерское сопровождение от 5000 рублей в месяц; * подготовка и заполнение декларации по налогу на доходы физических лиц 3-НДФЛ от 500 рублей; * восстановление бухгалтерского и налогового учета; * постановка налогового учета; * налоговый консалтинг; Услуги в области налогообложения: * сопровождение налоговых проверок; * налоговые споры; * оптимизация налогообложения; * подготовка пакета документов в ИФНС по возмещению НДС; Качество подтверждено, ответственность застрахована. Мы предоставляем скидки на аудиторские, юридические и обучающие услуги при заключении договора на постановку, ведение или восстановление бухгалтерского и (или) налогового учета. Подробная информация по телефону: 8 (495) 725 - 04 √ 59 Адрес: м. Бауманская, ул. Бауманская, д.6, бизнес центр ╚Виктория Плаза╩ From myrtiehyunbm at agrinova.org Wed Mar 30 12:53:36 2011 From: myrtiehyunbm at agrinova.org (Myrtie Hyun) Date: Wed, 30 Mar 2011 21:53:36 +0200 Subject: Xanax Online Store. Lowest Price guarantee! Message-ID: <62d90x93a87-10883202-732u3a97@izmsf6xm> Xanax Online Store. Lowest Price guarantee! Get your XANAX for as low as $2.15 per pill and even cheaper right now! Best quality Xanax from fully licensed pharmacies without RX needed http://cheapmedsmarketing.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 560 bytes Desc: not available URL: From tryst at brendaandellis.com Wed Mar 30 08:01:03 2011 From: tryst at brendaandellis.com (Rhonda Russo) Date: Wed, 30 Mar 2011 22:01:03 +0700 Subject: =?koi8-r?B?8M/T1MHOz9fLwSDC1cjHwczUxdLTy8/HzyDJIM7BzM/Hz9fPx88g1d7F?= =?koi8-r?B?1ME=?= Message-ID: <5560721A5FFD4467B60B83DE2FF81575@MAY12> Многопрофильная консалтинговая компания г. Москвы, с 2001 года занимающаяся профессиональной деятельностью в области ведения бухгалтерского и налогового учета предлагает: Бухгалтерские услуги: * составление нулевой отчетности от 1000 рублей за комплект; * бухгалтерское сопровождение от 5000 рублей в месяц; * подготовка и заполнение декларации по налогу на доходы физических лиц 3-НДФЛ от 500 рублей; * восстановление бухгалтерского и налогового учета; * постановка налогового учета; * налоговый консалтинг; Услуги в области налогообложения: * сопровождение налоговых проверок; * налоговые споры; * оптимизация налогообложения; * подготовка пакета документов в ИФНС по возмещению НДС; Качество подтверждено, ответственность застрахована. Мы предоставляем скидки на аудиторские, юридические и обучающие услуги при заключении договора на постановку, ведение или восстановление бухгалтерского и (или) налогового учета. Подробная информация по телефону: 8 (495) 725 - 04 – 59 Адрес: м. Бауманская, ул. Бауманская, д.6, бизнес центр «Виктория Плаза» From buhgalter at kepka-tut.ru Thu Mar 31 00:00:33 2011 From: buhgalter at kepka-tut.ru (=?koi8-r?B?8NLPxMHAIMvXwdLUydLV?=) Date: Wed, 30 Mar 2011 23:00:33 -0800 Subject: =?koi8-r?B?8NLPxMHAIDItyCDLz83OLiDr18HS1MnS1S4g7S7vLiDHLvbFzMXazs/E?= =?koi8-r?B?z9LP1s7Zyg==?= Message-ID: <000d01cbef68$f2516950$6400a8c0@buhgalter> ПРОДАЮ 2-Х КОМН. КВАРТИРУ Г. ЖЕЛЕЗНОДОРОЖНЫЙ УЛ. ТРАНСПОРТНАЯ Д. 4 ПРЯМАЯ продажа (торг возможен) Возможна продажа по ипотеке. Общие данные: Общая площадь 43 метров, жилая 29, кухня 8, с/у совместный. Застекленная лоджия, железная дверь, городской телефон нет, интернет есть. Очень теплая! Дом кирпичный, тихий двор, выход окон на частный сектор, приличный подъезд (ремонтируют периодически). КВАРТИРА В СОБСТВЕННОСТИ БОЛЕЕ 10 ЛЕТ! Один владелец. В ДКП возможно указать полную цену продажи и получать налоговые вычеты! Возможна продажа по ипотеке. Документы готовы к сделке. Стоимость 3,4 млн. т. +7 (926) 274-93-01 Сергей From jodlucreciaew at access-li.com Wed Mar 30 15:17:38 2011 From: jodlucreciaew at access-li.com (Jo Lucrecia) Date: Thu, 31 Mar 2011 05:17:38 +0700 Subject: Cialis 20mg x 120 Pills $200 - MC/VISA/AMEX ONLY - OVERNIGHT Delivery Message-ID: <14z58l36j95-10226475-019w2g19@rokfvnjp> Cialis 20mg x 120 Pills $200 - VISA/AMEX ONLY - OVERNIGHT Delivery U.S to U.S 2nd Day Delivery. Best Quality and Low Prices! Express Delivery for ALL orders, No Prescription Required! FDA approved. MC or VISA or American Express ONLY. http://drugtoregraphictabletsrx.ru From glavbux at bogsnami.ru Thu Mar 31 07:01:23 2011 From: glavbux at bogsnami.ru (=?koi8-r?B?0NLP18XSy8kg7ffk?=) Date: Thu, 31 Mar 2011 15:01:23 +0100 Subject: =?koi8-r?B?7sHMz8fP19nFINDSz9fF0svJIMkg0NLP18XSy8kg7ffkINcgMjAxMSDH?= =?koi8-r?B?z8TV?= Message-ID: <000d01cbefa3$bc7ff040$6400a8c0@glavbux> 12 апреля Проверки МВД и Налоговые проверки в 2011 году 8 (Ч95) Ч4_53\96*8 : Ч45З9.68 Цель: изучить понятие налоговой и административной ответственности, приостановление операций по счетам в банках организаций и индивидуальных предпринимателей. Программа: 1. Недобросовестность налогоплательщика. * Признаки недобросовестности налогоплательщика. * Критерии законности налоговой оптимизации. * Доказывание фактов, свидетельствующих об уклонении от налогов. * Недействительные сделки, мнимые и притворные сделки; последствия недействительности. * Срок давности для привлечения к ответственности при выявлении уклонения от уплаты налогов. * Типичные налогосберегающие схемы: ошибки применения и последствия. 2. Проверки налоговыми органами. * Специфика проверок камеральных, встречных, выездных. * Правила поведения первых лиц организации при выездной налоговой проверке. * Оформление результатов проверки. Обжалование результатов налоговых проверок. * Взыскание недоимки по налогам и пени. Срок давности для взыскания налогов и пени. * Порядок бесспорного взыскания недоимки по налогам и пени. * Взыскание штрафных санкций. Срок давности для взыскания штрафных санкций. * Ответственность должностных лиц по налоговым преступлениям. 3. Проверки, проводимые совместно с ОБЭП и органами МВД РФ. * Основные причины, по которым приходит ОБЭП. Подтверждение полномочий инспекторов и порядок проведения проверки. * Опрос, допрос, обыск и изъятие: правила поведения налогоплательщика. Основные виды экономических преступлений. Как избежать уголовной ответственности руководителю, бухгалтеру, юристу. 4. Новые направления в налоговом контроле: о критериях признания получения налогоплательщиком необоснованной налоговой выгоды. 5. Что нужно знать о порядке проведения проверки. 6. Что нужно знать о том, как обычно действуют проверяющие. 7. Изменения в регламенте проведения проверок налоговыми органами. Изменения в части I НК РФ. * Формы и методы контроля со стороны правоохранительных органов. Финансовая, административная и уголовная ответственность за нарушение налогового законодательства. * Применение срока давности по налоговым правонарушениям. 8. Что нужно знать о том, как правильно проверяющие должны оформлять свои действия. * Как начинается проверка и что требовать от проверяющих. * Что делать, если проверяющие приходят, а директора нет на месте. * Как проходит и чем заканчивается проверка. * Как оформляются проверочные мероприятия. * Что можно позволить проверяющим, а что лучше запретить. * Как правильно вести себя при проверке. * Нужно ли отвечать на все вопросы. * Нужно ли незамедлительно предоставлять документы. * Нужно ли показывать и разъяснять компьютерные программы и файлы. 9. Что нужно знать, если намерениями проверяющих являются: ревизия финансово-хозяйственной деятельности, изъятие товара, изъятие компьютеров, обследование помещений, зданий, сооружений, транспортных средств и других объектов, выемка документов, вскрытие сейфов, обыск. 10. Что нужно знать, если Вы решили жаловаться или инициировать судебное разбирательство. 11. Способы защиты прав налогоплательщика при процедурных нарушениях со стороны налоговых и правоохранительных органов. Составление протокола разногласий. Стоимость участия: 8 000 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: \Моск. код/ 4Ч5*З_9_6-8 <<<>>> 445.З968 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6858 bytes Desc: not available URL: From postmail-help.725 at sanfrancisco.com Thu Mar 31 01:38:05 2011 From: postmail-help.725 at sanfrancisco.com (Post Express Delivery) Date: Thu, 31 Mar 2011 16:38:05 +0800 Subject: Post Express Office. Package is available for pickup. NR 62841 Message-ID: <000d01cbef7e$f49f9d10$6400a8c0@rustylh0> Dear client. Post notification! No.06708 The company could not deliver your package to your address. Your package has been returned to the Post Express office. The reason of the return is "Error in the delivery address" Please attention! Attached to the letter mailing label contains the details of the package delivery. Please print out the invoice copy attached and collect the package at our office Thank you. Post Express Support. -------------- next part -------------- A non-text attachment was scrubbed... Name: Invoice_Copy_IN32942.zip Type: application/zip Size: 24550 bytes Desc: not available URL: From eugen at leitl.org Thu Mar 31 08:30:31 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 31 Mar 2011 17:30:31 +0200 Subject: Authorities in Awe of Drug Runners' Jungle-Built, Kevlar-Coated Supersubs Message-ID: <20110331153031.GY23560@leitl.org> http://www.wired.com/magazine/2011/03/ff_drugsub/all/1 Authorities in Awe of Drug Runners' Jungle-Built, Kevlar-Coated Supersubs By Jim Popkin Email Author March 29, 2011 | 12:00 pm | Wired April 2011 Photo: Christoph Morlinghaus The clatter of helicopter blades echoed across the jungles of northwestern Ecuador. Antinarcotics commandos in three choppers peered at the mangroves below, scanning for any sign of activity. The police had received a tip that a gang of Colombian drug smugglers had set up a clandestine work site here, in a dense swamp 5 miles south of Colombiabs border. And whatever the traffickers were building, the tipster had warned, was truly enormous. For decades, Colombian drug runners have pursued their trade with diabolical ingenuity, staying a step ahead of authorities by coming up with one innovation after another. When false-paneled pickups and tractor-trailers began drawing suspicion at US checkpoints, the cartels and their Mexican partners built air-conditioned tunnels under the border. When border agents started rounding up too many human mules, one group of Colombian smugglers surgically implanted heroin into purebred puppies. But the drug runnersb most persistently effective method has also been one of the crudestbsemisubmersible vessels that cruise or are towed just below the oceanbs surface and can hold a ton or more of cocaine. Assembled in secret shipyards along the Pacific coast, theybve been dubbed drug subs by the press, but theybre incapable of diving or maneuvering like real submarines. In fact, theybre often just cigarette boats encased in wood and fiberglass that are scuttled after a single mission. Yet despite their limitations, these semisubmersibles are notoriously difficult to track. US and Colombian officials estimate that the cartels have used them to ship hundreds of tons of cocaine from Colombia over the past five years alone. But several years ago, intelligence agencies began hearing that the cartels had made a technological breakthrough: They were constructing some kind of supersub in the jungle. According to the persistent rumors, the phantom vessel was an honest-to-goodness, fully functioning submarine with vastly improved rangebnothing like the disposable water coffins the Colombians had been using since the b90s. US law enforcement officials began to think of it as a sort of Loch Ness Monster, says one agent: bNever seen one before, never seized one before. But we knew it was out there.b Finally, the Ecuadoreans had enough information to launch a full-fledged raid. On July 2, 2010, a search partybincluding those three police helicopters, an armada of Ecuadorean navy patrol boats, and 150 well-armed police and sailorsbscoured the coastline near the Colombian border. When a patrol boat happened on some abandoned barrels in a clearing off the RC-o Molina, the posse moved in to find an astillero, or jungle shipyard, complete with spacious workshops, kitchens, and sleeping quarters for 40. The raid had clearly interrupted the workdaybrice pots from breakfast were still on the stove. And there was something else hastily abandoned in a narrow estuary: a 74-foot camouflaged submarinebnearly twice as long as a city busbwith twin propellers and a 5-foot conning tower, beached on its side at low tide. bIt was incredible to find a submarine like that,b says rear admiral Carlos Albuja, who oversees Ecuadorean naval operations along the northwest coast. bIbm not sure who built it, but they knew what they were doing.b Photo: Christoph Morlinghaus A cargo hold in the sub's bow can hold up to 9 tons of cocaine, worth about $250 million. Photo: Christoph Morlinghaus Four hundred miles away, at the US embassy in BogotC!, Jay Bergman received the news with a sense of vindication. As the US Drug Enforcement Agencybs top official in South America, Bergman had followed the chatter about a rumored supersub for yearsbeven as his colleagues remained deeply skeptical. But any satisfaction he felt was undercut by the implications of the discovery. The drug cartels continued to grow more sophisticated. If the DEA and other agencies hoped to keep up, theybd have to figure out how the traffickers built the sub, how to prevent them from building more, andbmost importantbhow to detect others that might already be out there. bThis is a quantum leap in technology,b Bergman says over a breakfast of eggs and strong Colombian coffee at a BogotC! hotel. bIt poses some formidable challenges.b The US governmentbs first step was a stern-to-snorkel assessment. Agents from the Farragut Technical Analysis Centerba branch of the US Office of Naval Intelligence that helps the Pentagon assess the capabilities of North Korean battleships and Russian nuclear subsbwent down to Ecuador. Over two days, the team broke down every aspect of the vesselbs construction. They examined the hull with an electron microscope and energy-dispersive x-ray to determine its composition. They pored over the technical capabilities of the subbs Chinese engines to calculate its range. And they studied the maximum amount of breathing time the crew would have underwater, without the aid of CO2 scrubbers, before theybd be forced to surface. The group summed up its findings in a 70-page white paperbmarked FOUO, for official use onlybthat conveys a grudging respect for the engineers and craftsmen who were able to build something so seaworthy in the middle of a swamp. bThe streamlined hull, diesel-electric propulsion system, and fuel ballast system design all show a significant level of technical expertise and knowledge of submersible operations,b it states. The hull, they discovered, was made from a costly and exotic mixture of Kevlar and carbon fiber, tough enough to withstand modest ocean pressures but difficult to trace at sea. Like a classic German U-boat, the drug-running submarine uses diesel engines on the surface and battery-powered electric motors when submerged. With a crew of four to six, it has a maximum operational range of 6,800 nautical miles on the surface and can go 10 days without refueling. Packed with 249 lead-acid batteries, the behemoth can also travel silently underwater for up to 18 hours before recharging. The most valuable feature, though, is the cargo bay, capable of holding up to 9 tons of cocaineba street value of about $250 million. The vessel ferries that precious payload using a GPS chart plotter with side-scan capabilities and a high-frequency radiobessential gadgetry to ensure on-time deliveries. Therebs also an electro-optical periscope and an infrared camera mounted on the conning towerbvisual aids that supplement two miniature windows in the makeshift cockpit. Old go-kart steering wheels control the flippers for diving and surfacing. Photo: Christoph Morlinghaus Today the supersub sits propped on a pedestal like a trophy at Ecuadorbs naval command headquarters in Guayaquil, the countrybs largest city and main port. Fresh air is piped in to keep investigators cool, and a tin roof protects it from the elements. Inside, the captured sub looks like the garage of a failed inventor; exposed PVC pipe hangs from the ceiling, batteries and plastic tubing are littered throughout the cabin, electrical wires are patched to the walls without any apparent logic. Old go-kart steering wheels control flippers on the subbs exterior, helping it to dive and surface. Crew comfort seems to have been an afterthought. Standing room is precious, and there are no visible seats or bunks. During a recent tour, diesel fumes barely masked the powerful combination of urine and man-stink lingering months after the subbs discovery. Smuggling huge rolls of Kevlar, four engines, 249 back-breaking batteries, and thousands of obscure marine parts to a remote equatorial shipyard takes patience, money, and cojones. But does building a homemade submarine also take real smarts? The American and Colombian sub hunters seem to think so, but what do big government institutions know about hacking together a custom sub in a poorly equipped workshop? When powerful navies want a new submarine, they call defense contractors. To truly understand the complexities of building a sub from scratch, the real experts are a band of irrepressible hobbyists who build personal submarines in their backyards. Jon Wallace, a Unix software programmer for Hewlett-Packard, has headed the Personal Submersibles Organization, or Psubs, for 15 years. The group promotes the safe design, construction, and operation of personal submarines. It has 53 active members, mostly middle-aged American men bwith their mortgage and kids under control,b Wallace says. Theybre the kind of guys who are willing to spend every weekend in their suburban garages hand-welding custom vessels, the better to explore the bottoms of nearby lakes. Construction can require years and a masterful sales pitch. bItbs not that easy to say, bHoney, I just need $25,000 and the driveway for the next two years,b Wallace says. Psubs members have been tracking the development of the drug runnersb semisubmersible creations for years. And they havenbt been very impressed. bFive hundred grand for a snorkel semisub. Ha!b reads a typical posting on the Psubs website from 2009. bThese guys may have a lot of money, but they are not the sharpest tools in the shed!b snorts another. But the towel-snapping ended with last summerbs discovery of the submarine in Ecuador. bThis is the most sophisticated sub webve seen to date,b Wallace says. bItbs a very good design in terms of shape and controls.b Anatomy of a Drug Sub The 74-foot vessel seized from a remote jungle shipyard in Ecuador is nothing like the crude semisubmersibles that Colombian drug runners have used in recent years. Here are some of the sophisticated craftbs standout features.bJ.P. Conning Tower A 5 B= foot tower with tiny windows, electro-optical periscope, and infrared camera provides a window on the world above while the bulk of the ship remains submerged. Batteries The subbs 249 lead-acid batteries power two electric motors, letting it run silently underwater for up to 18 hours before recharging. Main Engines On the surface, the vessel uses a pair of four-cylinder diesel engines to reach speeds up to 8.5 knots (10 mph), with a range of 6,800 nautical milesbroughly one round-trip from Colombia to San Diego. Hull The submarine is sheathed in Kevlar and carbon fiber instead of steel, making it hard to detect with sonar or radar. Itbs strong enough to withstand depths of up to 62 feet. Buoyancy System Compressed air is used to blow seawater out of more than a dozen ballast tanks, increasing the subbs buoyancy so it can surface. To dive, valves are opened to take in water. Illustration: Kristian Hammerstad The vessel, which never had a chance to take its maiden voyage, is by no means perfect. Its steel-free hull canbt withstand depths of more than 62 feet, according to the US Navybs technical assessment, a limitation that gives the pilot an incredibly narrow comfort zone. In other words, the slightest miscalculation in ballastbthe amount of seawater a sub takes in to divebcould spell disaster for the unwieldy, 16-foot-high vessel. Still, while they donbt approve of its purpose, the Psubs members confirm that the craft is an impressive piece of work. bSomething like that would have taken a year or so in a modern shop,b says Vance Bradley, a member of the groupbs advisory council and a former professional submarine fabricator. bImagine doing it out in the boonies with the mosquitoes and vermin!b That gets at one of the most vexing questions surrounding the sub: How was the beast actually built? According to Bergmanbs calculations, it must have cost at least $5 million to construct. Which drug gang would devote that kind of money to this black-market engineering project? Did they design it themselves, or did they recruit disaffected Russians or other foreign naval specialists? Were professional submarine pilots used to manage the tedious construction and begin underwater testing? Was it just a coincidence that so many of the parts were from China? Some answers can probably be deduced from the nearly three dozen old-school semisubmersibles that US and Colombian forces have confiscated since 2006bor from the 83 crew members who have been captured and prosecuted in that time, many of whom have traded information about the boats and their makers in exchange for reduced prison time. If their experience is an accurate guide, the supersub was likely built in sections in the backwoods Ecuadorean shipyard and then assembled at an adjacent estuary during low tide. Skilled engineers likely called the shots, directing teams of impoverished local laborers. Gas-powered generators may have been used, but the yearlong project would have been done mostly by hand without the help of electricity. Every bolt, pipe, and engine part would have been imported and laboriously smuggled in on small, canoe-like boats. Photo: Christoph Morlinghaus The sub was discovered on July 2, 2010, in an estuary in the jungles of Ecuador. Photo: Christoph Morlinghaus The Colombian cartels may be impressive and resourceful engineers today, but Miguel Angel Montoya knows that just a decade ago they were hopeless amateurs. A former drug-cartel associate who says he designed some of the early semisubmersibles, Montoya quit the business in 2001 and wrote a tell-all book (Yesterday a Doctor, Today a Narco-Trafficker). Hebs understandably cautious about his security and would agree to be interviewed only via email. In the early b90s, Montoya explains, his bosses had begun launching cocaine-smuggling vessels from the Colombian coast. At the time, most of the contraptions were laughableblike something out of those black-and-white newsreels of early flying machines that piteously crash into barns. Some looked like oversize bathtubs. Others resembled sea monsters with jutting pipes for necks. Montoya and his partners made their bosses a daring proposal: Let us help you design a new way to ferry cocaine underwater to Mexico. In 1999, Montoya and his associates began designing a finned, dart-shaped tube that could be crammed with cocaine and towed underwater by fishing trawlers to evade detection. His bnarco torpedob was unmanned and carried radio transponders to locate it if traffickers had to ditch it on the open seas. When the torpedoes were ready to begin field-testing, Montoya says, he was escorted to a clandestine camp in Colombiabs remote coastal region south of Buenaventura. He recalls riding for hours through a labyrinth of rivers and unnamed tributaries. bThe place was practically invisible from the air, and the jungle was impenetrable. We walked on planks set on swampland,b Montoya says. bThe air was thick with chemical fumes from resins. Hundreds of workers lived there, and the roar of motorboats was always present. Theybd come and go by the dozens.b Laborers were converting boats into precarious semisubmersibles that local fishing boat captains would pilot to Mexico for a quick payoff. bOnly poor people live in the area. Theybre in the Stone Age. Theybll give anything a go for very little money or food,b Montoya says. Montoya conducted practice runs with his makeshift torpedo in desolate local rivers and videotaped the launches. His bosses were enthusiastic and decided to give it a try. Montoyabs capsules carried loads up the Pacific coast for at least three years without a problem, delivering cocaine to Mexico for eventual sale in the US. When the Colombian navy finally confiscated one of the torpedoes, they marveled at the design and reverse-engineered it to better understand how it was builtbmuch as theybve done to the 54 other drug-toting semisubmersibles theybve captured. Montoya ultimately left the cartel in disillusionment. bI lost my family, my profession. I fell into drug and alcohol use,b he says. bMy friends died or were in jail, and my head had a price on it. This is simply no way to earn a living, however glamorous and attractive it may seem.b Looking back, he says the Colombian cartels were honing their skills in preparation for their ultimate goalbthe construction of long-distance vessels that could dive and surface on command. What the drug lords have always wanted, he says, was their own fleet of fully functioning submarines. The D.E.A.bs Bergman thinks the drug lords may have finally achieved that dream. Immediately after the raid in Ecuador, Bergman publicly stated that he had to assume there were other such submarines operating throughout the region. About seven months later, on Valentinebs Day of 2011, he was proven correct when the Colombian navy announced that it had seized a second drug-running supersub. This one had also been built in the jungle. It was 101 feet long, could hold up to 8 tons of cocaine, and could withstand ocean depths of about 30 feet, Colombian officials said. bOne is an aberration,b Bergman says. bTwo is an emerging trend.b He presumes there are more. The prospect of Colombian drug traffickers running their own private navy poses problems that wonbt be solved with a few arrests. bThis is one of those cases webre not going to divert our attention from. It has implications that go beyond law enforcement. It has national security implications,b Bergman says. After all, there is no reason the subs have to be limited to the drug trade. They could carry illegal immigrants or even terrorists, or be sold to the highest bidder for any number of nefarious purposes. Consequently, the supersubs are garnering high-level attention. Ecuadorean military brass briefed US defense secretary Robert Gates. And Bergmanbs DEA agents gave a lengthy presentation to Coast Guard and Pentagon officials with the Joint Interagency Task Force South, the Florida-based intelligence unit responsible for detecting drug-running semisubmersibles on the open sea. The task force works with law enforcement agenciesbwhich have unmanned aerial drones, Coast Guard cutters, and warships at their disposalbbut they wouldnbt comment on how they might try to locate the new long-range narco subs. Given the Navybs recent 70-page assessment, however, tracking them wonbt be so easy. bThe vessel is assessed to be quiet, while operating under electric power, and potentially difficult to detect acoustically or by radar,b the Navy concludes. In the meantime, Montoya predicts that the jungle shipbuilders will continue to perfect their craft. bThese efforts have been in the making for at least 17 years, since the time of Escobar,b he says. bIt would be realistic to assume that there is a sub en route to Mexico or Europe at this very moment.b Photo: Christoph Morlinghaus Photo: Christoph Morlinghaus Jim Popkin (jim.popkin at gmail.com) is a writer and former head of the NBC News Investigative Unit. From hortensera at jwamalls.com Thu Mar 31 16:46:21 2011 From: hortensera at jwamalls.com (Drusilla Hortense) Date: Thu, 31 Mar 2011 20:46:21 -0300 Subject: Why You Need to Buy Penis Pills? Message-ID: <60t20l95a72-64439237-129e4j42@usbikmh> Why You Need to Buy Penis Pills? If you choose the right penis enhancement pills that work for you, you will find yourself unwilling to go back to how "sex used to be." Men use male enhancement supplements for a wide range of reasons. Indeed, there are certain factors that can interfere with a man's optimum enjoyment of sex - lifestyle, health habits, stress, aging, and many others. Many men would like to counter the effect of these factors by taking penis pills. For some, they want to improve certain aspects of their sexuality, such as: - Shortening the time it takes to achieve erection - Improving quality of erection - attaining harder, firmer and longer-lasting erections - Increase semen volume - Enhance sperm motility and virility - Increase sexual drive and libido - Heighten sexual stamina - Achieve more intense, longer and more frequent orgasms http://longpenislike.ru From verdellmauricequ at bms.com Thu Mar 31 20:10:12 2011 From: verdellmauricequ at bms.com (Verdell Maurice) Date: Fri, 01 Apr 2011 09:10:12 +0600 Subject: TOP SPECIAL onCIALIS 20mg/90/$135 shipped by EMS, free on orders above $200! Message-ID: <4d954214.ebc4b978@bms.com> s1,6@ TOP SPECIAL onCIALIS 20mg/90/$135 TOP SPECIAL on qualityCIALIS (Tadaga) 20mg by Best Pharma for ONLY $135! shipped by EMS, free on orders above $200! Visit this site http://globalrxgeo.ru s1,6@ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 809 bytes Desc: not available URL: