From anabellucila at fsbankblm.com Sun Jan 1 05:14:34 2012 From: anabellucila at fsbankblm.com (Iraida Chanel) Date: Sun, 01 Jan 2012 08:14:34 -0500 Subject: Buy Replica Rolex Watches, Breitling, Tag Heuer, Omega, Swiss Replica Watches, Replica Luxury Watches from Watchesair. 80% off! Message-ID: <66e57j68w84-26826326-531h1c39@jyaxfovrm> Replica Watches, Replica Rolex Watches, Swiss Replica Watches Buy Replica Rolex Watches, Breitling, Tag Heuer, Omega, Swiss Replica Watches, Replica Luxury Watches from Watchesair. 80% off! High quality Replica Watches store. http://replicashopsoft.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 701 bytes Desc: not available URL: From kn at awxcnx.de Sun Jan 1 04:31:58 2012 From: kn at awxcnx.de (Karsten N.) Date: Sun, 01 Jan 2012 13:31:58 +0100 Subject: [tor-talk] remailers Message-ID: Am 30.12.2011 23:48, schrieb cmeclax-sazri: > I used to run a remailer and would like to again. There is a Mixminion > package, so I installed it and tried to join the group. What's going on these > days with remailers? Should we design a remailer that uses Tor in some way? Mixminion is dead. Only less than 10 Mixminion remailers are running: http://www.noreply.org/mixminion-nodes/ For Mixmaster up to 20 remailers are running. http://pinger.mixmin.net/mlist2.html Best regards Karsten N. _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sun Jan 1 07:31:11 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 1 Jan 2012 16:31:11 +0100 Subject: [tor-talk] remailers Message-ID: <20120101153111.GL6508@leitl.org> ----- Forwarded message from "Karsten N." ----- From paulinekim at madriver.com Mon Jan 2 08:14:27 2012 From: paulinekim at madriver.com (AMADA GLENNIE) Date: Mon, 02 Jan 2012 09:14:27 -0700 Subject: Buy Best Rolex Replica Watches And Replica Omega & more Message-ID: <201201020914.578B088AA6C189C9B93C@s006474> Replica Watches, Replica Rolex Watches, Swiss Replica Watches Buy Replica Rolex Watches, Breitling, Tag Heuer, Omega, Swiss Replica Watches, Replica Luxury Watches from Watchesair. 80% off! High quality Replica Watches store. http://replicashopnews.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 701 bytes Desc: not available URL: From mk at dee.su Mon Jan 2 09:40:52 2012 From: mk at dee.su (Maxim Kammerer) Date: Mon, 2 Jan 2012 19:40:52 +0200 Subject: [tor-talk] Postfix + Tor (Was: remailers) Message-ID: > I would imagine this sort of thing to be useful for, say, NGOs and people in the field to have > a secure decentralised email infrastructure. You don't need mail servers for such an infrastructure over networks like Tor and I2P, where nodes can have persistent addresses b see cables communication in LibertC) Linux, which sends messages directly between hidden services / eepsites: http://dee.su/cables. -- Maxim Kammerer LibertC) Linux (discussion / support: http://dee.su/liberte-contribute) _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From z0jnj at gmail.com Mon Jan 2 20:24:22 2012 From: z0jnj at gmail.com ( ) Date: Tue, 03 Jan 2012 13:24:22 +0900 Subject: No subject Message-ID: <201201030431.q034V4V5015984@proton.jfet.org> 軽いお食事・カラオケ同伴だけでお小遣いがもらえる!? 心配無用!!登録料・紹介料なんて一切ありません!! 何故こんな事が可能なのか…⇒ http://kaori20.me/m01/ 興味がおあり方は是非早めのご参加を!! http://kaori20.me/m01/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From cypherpunks at jfet.org Tue Jan 3 11:52:58 2012 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Wed, 3 Jan 2012 13:52:58 -0600 Subject: My greetings to you! Message-ID: <4F04AD51.604050@jfet.org> Hi! I'm a nice girl interested in some virtual chatting, emailing, or skyping with a nice guy. I'm looking forward to your email! http://meet-lovegirls.ru From mk at dee.su Tue Jan 3 13:14:56 2012 From: mk at dee.su (Maxim Kammerer) Date: Tue, 3 Jan 2012 23:14:56 +0200 Subject: [tor-talk] Real basic questions for linux Message-ID: On Tue, Jan 3, 2012 at 20:42, Julian Yon wrote: > There's a good reason still to use the Tor Browser: it provides a > "standard" environment which is the same as every* other Tor user's. > Safety in numbers is never truer than with anonymity; compare with the > Black Bloc tactic often used at demonstrations. If everyone looks the > same it's much harder to identify individuals. Tor is an infrastructure with a history of being developed and researched by experts in network security and anonymity. Due to its unique standing in the congregation of similar networks, Tor attracted a fair amount of academic scrutiny, which resulted in many refinements and extensions for resisting various types of attacks, and in documenting its known weaknesses. While I dislike the excessive stiffness of the project (RSA-1024? The 90's called, and they want their bmilitary-grade encryptionb back) and inability to resist the status quo (what again is the reason for not making nodes relay traffic by default? beyond you publishing another conference paper on the oh-so-terrible dangers of that in order to pad your CV, that is), I trust the Tor project to produce something solid and to not grossly overestimate its security and anonymity guarantees. Tor Browser, on he other hand, is just some hack for mangling browser headers. Who develops it? Who scrutinized it? Were it the same people who recommended using the unstable and inadequate Polipo proxy (over-64 MiB files? Nah, never heard of those) instead of well-established Privoxy previously, due to some imaginary perceived limitations of the latter (reading manuals is boring, I guess)? Is there any evidence that Tor Browser prevents fingerprinting which is marginally more sophisticated than looking at some subset of browser headers regardless of their order? Or is the joke that is Panopticlick with its bbits of identifying informationb as state-of-the-art as it gets (mind you, I was able to fool it with Privoxy rules in LibertC), masquerading as TBB, although I know that the specific browser in use can still be fingerprinted differently)? Who cares b let's ship this junk in a bundle, and convince everyone of its utmost necessity. inb4: Yeah, well, that's just, like, your opinion, man. -- Maxim Kammerer LibertC) Linux (discussion / support: http://dee.su/liberte-contribute) _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From cypherpunks at jfet.org Wed Jan 4 00:30:18 2012 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Thu, 4 Jan 2012 09:30:18 +0100 Subject: Get to meet me Message-ID: Missing real love and affection? A good-looking young woman is ready to help you enrich your life with these feelings! Let's start communicating today! http://meet-lovegirls.ru From sandyinchina at gmail.com Tue Jan 3 18:05:18 2012 From: sandyinchina at gmail.com (Sandy Harris) Date: Wed, 4 Jan 2012 10:05:18 +0800 Subject: [Freedombox-discuss] Hacker satellites? Message-ID: >From slashdot: http://www.bbc.co.uk/news/technology-16367042 Another way to bypass censorship? _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Jan 4 20:47:58 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 5 Jan 2012 05:47:58 +0100 Subject: [tor-talk] Postfix + Tor (Was: remailers) Message-ID: <20120105044758.GB27477@leitl.org> ----- Forwarded message from Maxim Kammerer ----- From gsyjrja at gmail.com Wed Jan 4 12:49:55 2012 From: gsyjrja at gmail.com (X ) Date: Thu, 05 Jan 2012 05:49:55 +0900 Subject: No subject Message-ID: <201201022055.q02Kt1iV010379@proton.jfet.org> ※冷かしでの参加は絶対にお止め下さい!! お金持ちな人妻から"お小遣い"が貰える!! "嘘"無しの報酬先払い!!女性を満足させよう。 嘘のような本当の話。逆援助を望んでいる方は実在します。 当サイトは本物を"報酬先払い"という形で証明します。 信じる人だけご入場下さい。男性はもちろん無料です。 何をすればお金を貰えるのか?  ↓↓ http://kaori20.me/sx2/ 【 報酬例 Aさんの場合】  一晩で平均報酬3万円  3万円×15日=45万円/月   ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ★こちらが実際の体験談  ↓↓ http://kaori20.me/sx2/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From cypherpunks at jfet.org Thu Jan 5 07:54:50 2012 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 5 Jan 2012 10:54:50 -0500 Subject: For those interested in romance Message-ID: <4F071916.3020602@jfet.org> Don't you think it's time for a virtual romance with a cute girl? If so, I'm ready to start chatting with you! I'm looking forward to your email! http://prettylove-woman.ru From eugen at leitl.org Thu Jan 5 06:04:07 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 5 Jan 2012 15:04:07 +0100 Subject: [tor-talk] Real basic questions for linux Message-ID: <20120105140407.GJ21917@leitl.org> ----- Forwarded message from Maxim Kammerer ----- From eugen at leitl.org Thu Jan 5 06:20:09 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 5 Jan 2012 15:20:09 +0100 Subject: [Freedombox-discuss] Hacker satellites? Message-ID: <20120105142009.GN21917@leitl.org> ----- Forwarded message from Sandy Harris ----- From cypherpunks at jfet.org Thu Jan 5 16:01:18 2012 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 6 Jan 2012 01:01:18 +0100 Subject: I would like to meet you Message-ID: <4F078B30.107070@jfet.org> I'm a hot girl, and I'm eager to make friends with a cool guy for communicating in cyberspace and/or in real life! I'm looking forward to your email! http://prettylove-woman.ru From cypherpunks at jfet.org Thu Jan 5 13:30:08 2012 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 6 Jan 2012 07:30:08 +1000 Subject: Get ready for unforgettable romance Message-ID: <9714012410.OUBX425Z817048@idixhmyawutde.vwqmsrh.va> Missing real love and affection? A good-looking young woman is ready to help you enrich your life with these feelings! Drop her a line! http://prettylove-woman.ru From Rowley.Muckley at hazelcourteney.com Thu Jan 5 20:32:19 2012 From: Rowley.Muckley at hazelcourteney.com (Rowley Muckley) Date: Fri, 06 Jan 2012 10:32:19 +0600 Subject: Discover deals you never thought possible Message-ID: Promotion now on for all our value watches and jewelry pieces. Get them today at superbly discounted prices and get free shipping as well. http://TiddlyUrl.com/m3v8xq From cypherpunks at jfet.org Fri Jan 6 05:07:30 2012 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 6 Jan 2012 14:07:30 +0100 Subject: Wives little? Visit us on the site! Message-ID: <4F084362.303070@jfet.org> I'm with you was an unforgettable night, I would like to repeat, write me - very forward, Elena from Russia! my virtual page: http://firstadore.ru From gmail at jfet.org Fri Jan 6 08:12:38 2012 From: gmail at jfet.org (gmail at jfet.org) Date: Sat, 6 Jan 2012 17:12:38 +0100 Subject: No woman can make a better wife than a Russian lady pick one here. Message-ID: My dear, come to my site - look, I'm broadcasting from a web camera at his site - is waiting for you my good! my reall photos and videos here: http://firstadore.ru From cypherpunks at jfet.org Fri Jan 6 06:46:46 2012 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Sat, 6 Jan 2012 17:46:46 +0300 Subject: Long time have not seen you, when you write me? Message-ID: <4F0859AE.9000803@jfet.org> Hello, my sun, you do not have a girl? "I was completely free! my page here: http://firstadore.ru From marlowe at antagonism.org Sat Jan 7 08:01:13 2012 From: marlowe at antagonism.org (Patrick R McDonald) Date: Sat, 7 Jan 2012 11:01:13 -0500 Subject: [tahoe-lafs-weekly-news] TWN20 Message-ID: ========================================================= Tahoe-LAFS Weekly News, issue number 20, January 08, 2011 ========================================================= Welcome to the Tahoe-LAFS Weekly News (TWN). Tahoe-LAFS_ is a secure, distributed storage system. `View TWN on the web`_ *or* `subscribe to TWN`_. If you would like to view the "new and improved" TWN, complete with pictures; please take a `look`_. .. _Tahoe-LAFS: http://tahoe-lafs.org .. _View TWN on the web: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/TahoeLAFSWeeklyNews .. _subscribe to TWN: http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-lafs-weekly-news .. _look: http://tahoe-lafs.org/~marlowe/TWN20.html Announcements and News ====================== Moving to Git ------------- Tahoe-LAFS is `moving to Git`_. The `repo`_ lives on Github under the Tahoe-LAFS organization account. Tahoe-LAFS will run both darcs and git in parallel for a while. Below are the restrictions on what we can currently commit: * The bridge only handles linear histories. Brian |brian| will enforce this by rewriting and rebasing any changes that enter from the Git side before landing them on master. Patches coming from the Darcs side are applied in single-file anyways, so no new restrictions there. * Brian runs the bridge manually (it's not safe enough to be run unsupervised), so there will be a human delay between the time something lands on the darcs side and the time it appears on the git side. Brian usually gets to it within a day, but feel free to ping him on IRC when you push a commit to darcs. * Nobody else should commit to the official git repo right now. When we stop using darcs (and the bridge), we can fix the permissions so that all Tahoe committers will have write access. Send pull requests and Brian will merge them appropriately. * Release branches will have to be managed specially. 1.8.3 does not yet exist in the git repo (Brian will need to build it manually). If we do a near-term 1.9.1 release, we'll probably do it from trunk. Tahoe-LAFS has a new `buildmaster`_, which feeds off the Github post-commit hook, and instructs buildslaves to update from Github. We'll be moving all the existing slaves to this buildmaster, and then we will determine which ones need to have Git installed (or their buildbot code updated). We'll also update to a newer buildbot version (0.8.5) at the same time, and start using "categories" to organize the waterfall views a bit more easily. The developers also `moved pycryptopp`_ to Github. The buildbot now draws from Github, and all but one of the buildslaves upgraded to match. "The first pull request has been merged, to fix compile errors with the upcoming gcc-4.7.0 release. The second pull request, to add Ed25519 signatures, is under review by Zooko." [`1`_] .. _`moving to Git`: https://tahoe-lafs.org/pipermail/tahoe-dev/2011-December/006898.html .. _`repo`: https://github.com/tahoe-lafs/tahoe-lafs .. _`buildmaster`: https://tahoe-lafs.org/buildbot-tahoe-lafs-git/ .. _`moved pycryptopp`: https://github.com/tahoe-lafs/pycryptopp .. _`1`: https://tahoe-lafs.org/pipermail/tahoe-dev/2012-January/006913.html 1.9.1 Release ------------- Brian `announced the upcoming 1.9.1 release`_. The team hopes to release 1.9.1 in the next couple of weeks. The main drivers for this release are: * `#1628`_: UCWE on deep check with recent version * upcoming Ubuntu LTS freeze. We hope to get this fix in before the freeze Ticket 1628 needs review, so please review the ticket. In addition, some other changes have occurred since the 1.9.0 release which will be included in 1.9.1: * the download-status timeline visualizer was rewritten * the WUI got a favicon * OpenBSD 5 support was added * PyCrypto 2.4 was blacklisted * some internal refactoring The changes will be included in the 1.9.1 release. The following tickets are part of the `1.9.1 milestone`_: * `#1212`_: Repairing fails if less than 7 servers available * `#1636`_: Unhandled error in Deferred while uploading (current darcs build) * `#1637`_: compilation errors with pyOpenSSL >= 0.13 on RHEL5 systems (and clones) * `#1643`_: presence of MDMF in aliases break the CLI < v1.9.0 * `#1648`_: assertion failure 'assert len(self._active_readers) >= self._required_shares' in mutable retrieve .. _`announced the upcoming 1.9.1 release`: https://tahoe-lafs.org/pipermail/tahoe-dev/2011-December/006901.html .. _`#1628`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1628 .. _`1.9.1 milestone`: https://tahoe-lafs.org/trac/tahoe-lafs/query?status=assigned&status=new&status=reopened&group=status&milestone=1.9.1 .. _`#1212`: https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1212 .. _`#1636`: https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1636 .. _`#1637`: https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1637 .. _`#1643`: https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1643 .. _`#1648`: https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1648 TWN Scribe Strives to Become Developer -------------------------------------- With the coming of the new year, I (Patrick |marlowe|) decided to seriously pursue my goal of learning programming. Further inspired by Zooko's |zooko| tweet, "Congrats!! Submit a patch to Tahoe-LAFS! We offer mentoring by experts to all contributors. :-)" [`2`_] What better way to learn a language than to work on real problems rather than sample exercises and have the support of some of the best programmers? Plus you get to learn the other details of being a developer: updating tickets, submitting patches, responding to comments, etc. So I decided to take Zooko up on the offer. I am searching through the `easy tickets`_ to determine which will be my first try. I can't wait to get started. .. _`2`: https://twitter.com/#!/zooko/status/154031644234366976 .. _`easy tickets`: https://tahoe-lafs.org/trac/tahoe-lafs/query?status=!closed&keywords=~easy&order=priority >From the tahoe-dev Mailing List =============================== Tamias ------ Jean Lorchat `announced the beta release`_ of `Tamias`_ |tamias|. "The Tamias Project is an attempt to create an opensource, privacy-aware distributed file storage. When ready, Tamias will provide : * Secure and reliable storage for all kind of files * Easy sharing with per-object control and container objects * Storage provider independence Tamias is based on the Tahoe-LAFS storage system and borrows itbs secure properties while leveraging a public-key infrastructure on top in order to provide distributed access control. Why bTamiasb ? The Tahoe-LAFS system is based on capabilities, which are very important and impossible to remember, which means you have to write them down somewhere and mail them around. When looking for shares, users then look like a squirrel looking for acorns. Tamias are a kind of chipmunk." [`3`_] Tahoe-LAFS devs look forward to learning from Tamias' thought processes, implementation, and any feedback from their users. .. _`announced the beta release`: https://tahoe-lafs.org/pipermail/tahoe-dev/2011-December/006899.html .. _`Tamias`: https://tamias.iijlab.net/ .. _`3`: https://tamias.iijlab.net/?page_id=6 .. |tamias| image:: tamias.png :height: 35 :alt: Tamias :target: https://tamias.iijlab.net/ Patch Needing Review of the Week ================================ There are five (5) tickets still needing review for 1.10: * `#393`_: mutable: implement MDMF * `#1265`_: New Visualizer is insufficiently labelled/documented (plus layout problem) * `#1398`_: make docs/performance.rst more precise and accurate * `#1566`_: if a stored share has a corrupt header, other shares held by that server for the file should still be accessible to clients * `#1593`_: the drop-upload dircap should be in BASEDIR/private/ .. _`#393`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/393 .. _`#1265`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1265 .. _`#1398`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1398 .. _`#1566`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1566 .. _`#1593`: https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1593 ---- *The Tahoe-LAFS Weekly News is published once a week by The Tahoe-LAFS* *Software Foundation, President and Treasurer: Peter Secor* |peter| *. Scribes: Patrick "marlowe" McDonald, Zooko Wilcox-O'Hearn* *, Editor: Zooko.* `View TWN on the web`_ *or* `subscribe to TWN`_ *. Send your news stories to* `marlowe at antagonism.org`_ *b submission deadline: Friday night.* .. _marlowe at antagonism.org: mailto:marlowe at antagonism.org .. |zooko| image:: zooko.png :height: 35 :alt: zooko :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs .. |brian| image:: warner.png :height: 35 :alt: brian :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs .. |peter| image:: psecor.jpg :height: 35 :alt: peter :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs .. |marlowe| image:: marlowe-x75-bw.jpg :height: 35 :alt: marlowe :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs -- ---------------------------------------------------------------- | Patrick R. McDonald GPG Key: A2D1E972 | | https://www.antagonism.org/ | | | | | ---------------------------------------------------------------- | Malo periculosam libertatem quam quietum servitium | ---------------------------------------------------------------- _______________________________________________ tahoe-lafs-weekly-news mailing list tahoe-lafs-weekly-news at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-lafs-weekly-news ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ylkjk at msn.com Fri Jan 6 19:16:24 2012 From: ylkjk at msn.com ( ) Date: Sat, 07 Jan 2012 12:16:24 +0900 Subject: No subject Message-ID: <201201070323.q073N7nC000659@proton.jfet.org> ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  ■■■□『本当にお金が欲しい方だけお読み下さい』□■■■ ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 過去に逆援助サイトのサクラに騙されて20万円もの料金を支払っ た経験のある僕が50サイト以上の「逆援助サイト」に登録してつ いに見つけた本物の逆援助サイトを完全無料で教えます! [逆援助サイトへ]>>> http://kaori20.me/sx3/ 信じない方は結構です。何故こんな事をゆうかというと、  ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ 僕にここを教える事でのメリットはありません!サイト運営者(無 料サイトですが)でもありませんし無料で教えるので1円も儲けれ ないばかりか逆にライバルが増える可能性があるんです。 ただ以前の僕のように出会い系に騙されて悔しい思いをした方に使 って貰いたい気持ちでメールいたしました。 今まで出会い系に騙されてきた方、今お金に困っている方、本物の 逆援助サイトで僕と一緒に楽してお金を稼ぎませんか? [僕のページへ]>>> http://kaori20.me/sx3/ このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From wikjao at yahoo.co.jp Fri Jan 6 22:08:15 2012 From: wikjao at yahoo.co.jp ( ЂȂ) Date: Sat, 07 Jan 2012 15:08:15 +0900 Subject: No subject Message-ID: <201201070615.q076Evw2002741@proton.jfet.org> 女性用風俗系サイトとして多くの方々に利用されている 当サイトですが、現在女性メンバーに対して 男性メンバーが慢性的に足りない状況です。 仕事内容は寂しい女性のお相手をするだけ 基本的には性欲を満足させるセフレのお仕事になります。 謝礼額は2時間1〜5万円程度。 別途ホテル代・交通費・食事代などが 女性会員様のご負担となります。 詳細はこちら▽ http://kaori20.me/sokup05/ 男性は登録料から退会まで費用はかかりません。 これらもすべて女性会員様のご負担となっております。 年齢容姿不問。未経験者大歓迎です。 一度だけのメンバー体験も随時募集しています。 http://kaori20.me/sokup05/ このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From eugen at leitl.org Sat Jan 7 07:36:54 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 7 Jan 2012 16:36:54 +0100 Subject: [p2p-hackers] Privacy issues with P2P protocols Message-ID: <20120107153654.GV21917@leitl.org> ----- Forwarded message from Arnaud Legout ----- From eugen at leitl.org Sat Jan 7 08:55:51 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 7 Jan 2012 17:55:51 +0100 Subject: [tahoe-lafs-weekly-news] TWN20 Message-ID: <20120107165551.GX21917@leitl.org> ----- Forwarded message from Patrick R McDonald ----- From rashidasarah at broadcom.com Sat Jan 7 22:24:50 2012 From: rashidasarah at broadcom.com (KENNA HILARY) Date: Sun, 08 Jan 2012 10:24:50 +0400 Subject: buy viagra, No Prescription Required High Quality Drugs. Express Delivery. No prescriptions. Accept payments: Visa and ACH... Message-ID: <201201080725.FC090CEB00C3C600C3A14B@rr6n219u7> buy viagra, No Prescription Required High Quality Drugs. Express Delivery. No prescriptions. Accept payments: Visa and ACH... Low prices and 30-day money back guarantee! http://onlinebuydrugs.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 304 bytes Desc: not available URL: From liberationtech at lewman.us Sun Jan 8 19:30:58 2012 From: liberationtech at lewman.us (liberationtech at lewman.us) Date: Sun, 8 Jan 2012 22:30:58 -0500 Subject: [liberationtech] Mobile Phone Security Message-ID: On Sun, Jan 08, 2012 at 04:44:34PM -0500, gsistare at gmail.com wrote 2.9K bytes in 85 lines about: : Considering this, which mobile phone : providers and manufacturers remain the most secure? It seems like : the numbers are dwindling, and the user-end side of things is : becoming more uneasy. Roughly zero if your threat model involves a government. All cell phones have two operating systems, one is the baseband for managing communications with the cell towers and signal processing, the other is the one for the humans. The baseband has 'lawful intercept' built in to appease western governments, at least. I'm not sure to which OS the slashdot story refers, but here's a crash course in iphone's OSes, http://www.ihackintosh.com/2009/07/difference-between-iphone-baseband-bootloader/. And here's a quick presentation on what the baseband OS, or firmware, does in a 3G phone, http://bwrc.eecs.berkeley.edu/seminars/Seminars_Archive/Sriram-9.15.00/3G_Cell_Base_Desgn.pdf. For an example of the details, the osmocombb project, http://bb.osmocom.org/trac/, is trying to write a completely free baseband stack for cell phones. They have some pretty good details and presentations on the hardware hacking involved in re-writing the baseband from scratch. As for actually secure phones, from the baseband through the user interface, Cryptophone, http://www.cryptophone.de/, makes a few models, but as you can expect, they are expensive. There are probably others, but I've only used the cryptophone g10+ model. And just in case you think the baseband isn't fun to explore and exploit to win contests at security conferences, https://www.readwriteweb.com/archives/baseband_hacking_a_new_frontier_for_smartphone_break_ins.php -- Andrew http://tpo.is/contact pgp 0x74ED336B _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From katrin at mobileactive.org Mon Jan 9 09:00:30 2012 From: katrin at mobileactive.org (Katrin Verclas) Date: Mon, 9 Jan 2012 12:00:30 -0500 Subject: [liberationtech] Azerbaijan wants to register mobile phones Message-ID: A few thoughts from here, HQ of SaferMobile: 1. SIM Card Reg Eric says: > the question of whether a SIM was purchased anonymously may be relatively > irrelevant. Many countries already require all SIMs to be identified with an > individual (say, Burma, Belarus, most EU countries (certainly France), or (I > think) the US). (China has, since October 2010, required SIM sales to be > identified with a person, but the rulebs observed in the breach.) We did, for the first time ever that we are aware of, a comprehensive assessment of SIM card registration requirements for the 47 least free countries and 63 partially countries as defined by Freedom House's Freedom of the World Index. 45 out of the 47 countries require a combination of ID, photo, and fingerprint to activate a SIM card. Of course, it is possible to get a 'gray' card in those countries which may work for a while without being ID'ed with your identity. Of course, Eric's precautions are all still valid - more on that below. As far as the regulatory context of AZ is concerned, here is what we got (all of this is going live, by the way, in the next week or so) 4 Azerbaijan Ministry of Communications and Information Technologies of the Republic of Azerbaijan http://www.mincom.gov.az/en/main.html http://www.mincom.gov.az/en/telecom.html The Law of the Republic of Azerbaijan on Telecommunications was enacted in 2005. It sets out general legal framework for telecommunication networks and services, and includes provisions on numbering, licensing, tariffs, interconnection, rights and duties of operators and subscribers, international cooperation and dispute resolution. What provisions, if any, are contained in the telecommunications regulations regarding the government's ability to conduct surveillance or monitoring of mobile technology? There are no explicit provisions authorizing surveillance. However, article 39 of the Law of the Republic of Azerbaijan on Telecommunications states that operators "must promote in proper legal manner implementation of search actions, supply telecommunication [networks] with extra technical devices according to terms set by corresponding executive power body for this goal, solve organizational issues and keep methods used in implementation of these actions as secret." Article 38 states that the law guarantees confidentiality of communication except as provided by law. What provisions are contained in the law regarding the government's ability to request disclosure of subscriber information? To the extent allowed by the vagueness of article 39. Are there any emergency or national security laws that allow the government to gain control of mobile network (e.g. suspend network, conduct interception, etc)? Article 16 entitles the government during times of martial law and state of emergency "to preference in use of necessary telecommunication nets, units and means and can stop, limit their use or apply special rules for use of communication." New rules require all operational mobile devices (cell phones) in the territory of Azerbaijan to be registered at Mobile Devices Registration System (MDRS). MDRS is not ready yet and is to be set up by the Ministry of Communication and IT. All cell phone carriers will have to connect their networks to MDRS. Information required for the system will include cell phone's IMEI code, a number associated with that phone and serial number of the SIM card. A cell phone will work only with a number associated with it and registered at MDRS. Otherwise, cell phone operators will have to block it.In practice, it means the government will be able to switch off every phone in the country. Are there any restrictions on encryption, including on VoIP? Is encryption allowed or forbidden? The telecom law does not specify any restrictions on encryption. VoIP service is considered a form of communication and requires a license (source: http://news.day.az/hitech/69561.html). Is there intermediary liability for content distributed over the network? Internet is considered "mass media" under Azerbaijan law and is governed by the 1999 legislation "On mass media." Under that law a publisher may face liability for publishing information which incites "violent overthrow of an existing constitutional state formation, attempt on integrity of the state, propagation of war, violence and cruelty, national, racial, social hate or intolerance, printing under cover of a title of an authoritative source of hearings, lie also of prejudiced publications humiliating honor and a dignity of the citizens, pornographic materials, slander or undertaking of other unlawful operating." (Full text of the law is available at: http://www.mincom.gov.az/en/main.html, under legal documents/laws). Is the operator's ability to provide services in the region conditioned on disclosure of subscriber information in any way? Article 39 of the telecom law requires cooperation of the telecommunications sector with law enforcement. Has there been a revocation or threat to revoke a license, if so, why? No instances found. Are there any provisions in the licensing agreement explicitly authorizing interception or surveillance? To the extent allowed by article 39 2. Mobile security While I could not agree more with Eric on all he is saying below, but that said, fact is activists, rights defenders and journalists DO use phones, even though they pose considerable risks. From our POV, it's a matter or risk awareness and mitigation, based on specific threat models rather than categorically saying: Don't use phones. Ain't going to happen so we rather work with reality here. By the way, the US does not require any ID for prepaid SIMs for now. These are the burner SIMs/phones we all hold dear.... and pay for in cash. With all of Eric's caveats on location, IMEI, SIM etc tracking and logging. All the best, Katrin On Jan 9, 2012, at 10:16 AM, Katy Pearce ucsb wrote: > Thanks Eric. > > Will pass this to Ali. > > Actually we find that there is cybersurveillance (documented in the > paper that was linked to above) in Azerbaijan. > > I would expect the AZ government to use this new law to engage in more > cybersurveillance... > > On Sun, Jan 8, 2012 at 5:53 AM, Eric S Johnson wrote: >> Within the context of our technology mentoring in the ISC, we advise folks >> in briskyb countries that mobile phones are, everywhere and always, a very >> high security risk. To the extent that contemporary software used by law >> enforcement agencies with access to MNOsb log files can relatively easily >> >> B7 know all (turned-on) mobile devices (phones, SIMs)b locations at >> all times, now and in the past, >> >> B7 store, read, and analyse all SMSs ever sent, and >> >> B7 enumerate identities and networks of people by looking at whobs >> talking to whom, >> >> the question of whether a SIM was purchased anonymously may be relatively >> irrelevant. Many countries already require all SIMs to be identified with an >> individual (say, Burma, Belarus, most EU countries (certainly France), or (I >> think) the US). (China has, since October 2010, required SIM sales to be >> identified with a person, but the rulebs observed in the breach.) >> >> >> >> And, to the extent that all MNOsb operation depends on frequency licensing >> from the governments in whose jurisdiction they operate, all MNOs are, by >> definition, totally under those governmentsb control, and will in any case >> eavesdrop on, and/or terminate, any and all clientsb use of their networks, >> upon govbt demand. >> >> >> >> We think the key is to encourage folks to use internet instead of >> calls/SMSs, and to help make sure folksb internet use is, to the maximum >> extent possible, encrypted. Certainly, thatbs my modus operandii when in >> Azerbaijan, Burma, China, or Uzbekistan (all of which Ibve visited in the >> last six months). >> >> >> >> Katy, do you (or Ali) think the new AZ regulation will really materially >> change the degree of risk associated with activistsb use of mobile >> communications technologies? The key issue is probably more one of whether >> the govbt of AZ is using the kinds of the software mentioned above, rather >> than whether SIMs can be procured anonymously. >> >> >> >> For the record, AFAIK, AZ doesnbt censor internet access at all, nor are >> there well-documented cases of cybersurveillance (although activists should >> always assume attempts are being made). However, starting in the second half >> of 2011, major independent Azerbaijani news-providing sites have found >> themselves under occasional DDOS attacks. >> >> >> >> Best, >> >> Eric >> >> >> >> From: liberationtech-bounces at lists.stanford.edu >> [mailto:liberationtech-bounces at lists.stanford.edu] On Behalf Of Katy Pearce >> ucsb >> Sent: Saturday, 07 January 2012 02:29 >> To: liberationtech at lists.stanford.edu >> Subject: [liberationtech] Azerbaijan wants to register mobile phones >> >> >> >> http://blog.novruzov.az/2012/01/azerbaijan-to-register-all-mobile.html >> >> Blogger (and friend) Ali Zovruzov has translated a new law in Azerbaijan >> where all mobile phones will be registered to the government and the >> government will have the potential to shut off mobile communication. >> >> The measure bypassed the parliament and was approved directly by the Council >> of Ministers (which is sort of like the president's cabinet). >> >> On his blog some commenters don't think that this is a big deal, but... >> >> For some Azerbaijan context - it has been becoming more authoritarian and >> using technology to aid that: >> http://caucasusedition.net/analysis/%E2%80%9Cthis-is-what-can-happen-to-you%E2%80%9D-networked-authoritarianism-and-the-demonization-of-social-media-in-the-republic-of-azerbaijan/ >> >> >> _______________________________________________ >> liberationtech mailing list >> liberationtech at lists.stanford.edu >> >> Should you need to change your subscription options, please go to: >> >> https://mailman.stanford.edu/mailman/listinfo/liberationtech >> >> If you would like to receive a daily digest, click "yes" (once you click >> above) next to "would you like to receive list mail batched in a daily >> digest?" >> >> You will need the user name and password you receive from the list moderator >> in monthly reminders. >> >> Should you need immediate assistance, please contact the list moderator. >> >> Please don't forget to follow us on http://twitter.com/#!/Liberationtech > _______________________________________________ > liberationtech mailing list > liberationtech at lists.stanford.edu > > Should you need to change your subscription options, please go to: > > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" > > You will need the user name and password you receive from the list moderator in monthly reminders. > > Should you need immediate assistance, please contact the list moderator. > > Please don't forget to follow us on http://twitter.com/#!/Liberationtech Katrin Verclas MobileActive.org katrin at mobileactive.org skype/twitter: katrinskaya (347) 281-7191 Check out the new Mobile Media Toolkit at http://mobilemediatoolkit.org. To "Making Media Mobile!" A global network of people using mobile technology for social impact http://mobileactive.org _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From v24j_3n at yahoo.co.jp Sun Jan 8 19:13:16 2012 From: v24j_3n at yahoo.co.jp (匴 ʉ) Date: Mon, 09 Jan 2012 12:13:16 +0900 Subject: No subject Message-ID: <201201070316.q073GZEh000403@proton.jfet.org> 【即金】容姿・経験一切不問!!誰でも稼げます!! 美人妻達が集まる逆援助サークルにご招待 当サークルの人妻に逆援助されてみませんか? 好きな時間に好きな女性を選んで逆援助出来ます!! 容姿・経験一切不問で18歳以上の方なら誰でも入会OK!! http://kaori20.me/sokukan/ 軽いデートから肉体関係まで逆援助の内容は 貴方が自由に決められます やりたくない事はしなくてOK!!全て貴方次第です。 ご参加お待ちしています!! http://kaori20.me/sokukan/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From brianc at smallworldnews.tv Mon Jan 9 16:24:17 2012 From: brianc at smallworldnews.tv (Brian Conley) Date: Mon, 9 Jan 2012 16:24:17 -0800 Subject: [liberationtech] REVIEWERS NEEDED - Safer satellite phone guide nearing completion Message-ID: Hi all, You may recall before the holidays I posted some questions about research around the use of satellite phones, best security practices, etc. I have been working on a guide providing an overview about what steps users can take to provide a modicum of protection when using satellite phones. I would greatly appreciate it if a few of you would offer to review the draft, I hope to have it together by midday tomorrow, and get feedback before the end of the week. Do let me know if you can assist, when the final is published on our site I'll be sure to let everyone know here. -- Brian Conley Director, Small World News http://smallworldnews.tv m: 646.285.2046 Skype: brianjoelconley public key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xE827FACCB139C9F0 _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From griffinboyce at gmail.com Mon Jan 9 16:41:23 2012 From: griffinboyce at gmail.com (Griffin Boyce) Date: Mon, 9 Jan 2012 19:41:23 -0500 Subject: [liberationtech] SOPA and DNS-level Censorship Circumvention Message-ID: Hey all, With the SOPA vote on the horizon, now seems to be a good time to talk about censorship at the DNS level. Computers use Domain Name Servers to make the connection to websites. These large servers act as online address books for websites, telling computers where the site they want to visit is located. So the flow is typically *Website Address -> DNS Server -> Website's Host*. If SOPA passes, sites alleged to be infringing copyright will be blocked from visitors in the US: *Website Address -> US DNS Server -> Block Page*. You can customize which servers your computer uses to fetch addresses, and bypass these types of blocks entirely. A good tutorial on how to do that is here: http://code.google.com/speed/public-dns/docs/using.html Though keep in mind that the server addresses mentioned on that tutorial are located in the United States. So anyone looking to bypass *American*censorship will need to use servers in an uncensored country like Iceland or Belgium. Another good option is using a browser plugin. For FireFox, there are two currently: Soapy and DeSopa. DeSopa automatically fetches server details for websites, but relies on a website that is likely to be blocked once SOPA goes into effect. However, it does work until blocked. I made Soapy with all of the rules it needs to function built into it. With Soapy, every site that is enabled must have redirection rules created for it, but it's also quite light (<50kb, each site is ~200bytes) and easily updated with new sites. DeSopa: https://addons.mozilla.org/en-US/firefox/addon/desopa/ Soapy: http://griftastic.com/soapy.html These browser plugins are really quick hacks designed to get into people's hands quickly. (And there aren't any for Chrome, Opera, Safari, or IE yet). There has to be a more elegant and robust solution that we can create for people affected by this type of censorship -- not just in the US, but around the world. It's completely possible to run censorship-resistant DNS servers in uncensored countries, but the critical missing element is a highly usable piece of software that will adjust the user's network settings without a major hassle. DnsJumper might work, but isn't open-source and users have to find unblocked servers to use. What do you all think about this? All the best, Griffin Boyce -- "I believe that usability is a security concern; systems that do not pay close attention to the human interaction factors involved risk failing to provide security by failing to attract users." ~Len Sassaman _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From heinousqsu1 at riverpointenapa.com Mon Jan 9 11:10:57 2012 From: heinousqsu1 at riverpointenapa.com (Dionne Sharpe) Date: Mon, 9 Jan 2012 21:10:57 +0200 Subject: =?koi8-r?B?8sHT0NLPxMHWwSDR0M/O08vJyCDCz87Twco=?= Message-ID: <000d01cccf02$6b01b520$6400a8c0@heinousqsu1> Новогодняя распродажа японских карликовых деревьев бонсай. Выберите дерево на сайте http://подари-бонсай.рф Звоните 780-21-94 Погрузитесь в мир красоты: Новогодняя сосна бонсай, полезные можжевельники, цветущие яблони и многое другое. Бесплатная доставка за 2 часа. Специальные подарки всем! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1084 bytes Desc: not available URL: From wilder at trip.sk Mon Jan 9 15:47:35 2012 From: wilder at trip.sk (Pavol Luptak) Date: Tue, 10 Jan 2012 00:47:35 +0100 Subject: [liberationtech] Azerbaijan wants to register mobile phones Message-ID: Hi! On Mon, Jan 09, 2012 at 12:00:30PM -0500, Katrin Verclas wrote: > > Are there any emergency or national security laws that allow the government to gain control of mobile network (e.g. suspend network, conduct interception, etc)? Data retention law (at least in the EU): https://en.wikipedia.org/wiki/Telecommunications_data_retention > Article 16 entitles the government during times of martial law and state of emergency "to preference in use of necessary telecommunication nets, units and means and can stop, limit their use or apply special rules for use of communication." New rules require all operational mobile devices (cell phones) in the territory of Azerbaijan to be registered at Mobile Devices Registration System (MDRS). MDRS is not ready yet and is to be set up by the Ministry of Communication and IT. All cell phone carriers will have to connect their networks to MDRS. Information required for the system will include cell phone's IMEI code, a number associated with that phone and serial number of the SIM card. A cell phone will work only with a number associated with it and registered at MDRS. Otherwise, cell phone operators will have to block it.In practice, it means the government will be able to switch off every phone in the country. This is also possible in Slovakia/EU if there is a "suspicion" (which can be quite unclear what is the "suspicion") and consequently obtain court order... > Are there any restrictions on encryption, including on VoIP? Is encryption allowed or forbidden? I think it is illegal in the EU to provide _publicly_ end-to-end calls encryption (without possibility of interception for legal/secret agencies). At least in Slovakia, if you decide to find out "ultra secure mobile operator" and provide end-to-end encrypted calls without possibility to intercept these calls by legal authorities, you will not receive an official license for this business. What practically means that this kind of business is illegal. Of course you ca provide end-to-end encrypted calls for private companies, organizations, etc., you can sell crypto phones and all other crypto devices, but you cannot offer completely public end-to-end call encryption services for all people... I guess the situation is similar even in the US - I don't know if it is legal to provide encrypted voice calls services _publicly_ (for all people) without possibility of interception of legal/secret agencies. > The telecom law does not specify any restrictions on encryption. VoIP service is considered a form of communication and requires a license (source: http://news.day.az/hitech/69561.html). That's also true in the EU. If you are VoIP service provider, you also need to follow the data retention law... I believe the situation in Azerbaijan is really bad, but probably not so worse than in the other developed countries :-( Pavol -- _______________________________________________________________ [wilder at trip.sk] [http://trip.sk/wilder/] [talker: ttt.sk 5678] _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ferviduc3 at rkshrine.zzn.com Tue Jan 10 00:34:49 2012 From: ferviduc3 at rkshrine.zzn.com (=?koi8-r?B?88XNyc7B0iDQzyDJ2s3FzsXOydHNICDXINfBzMDUxQ==?=) Date: Tue, 10 Jan 2012 09:34:49 +0100 Subject: =?koi8-r?B?zyDXwczA1M7PzSDSxcfVzMnSz9fBzsnJIMkgy8/O1NLPzMUg?= Message-ID: <000d01cccf72$b7768140$6400a8c0@ferviduc3> ВНИМАНИЮ БАНКОВ, ФИНАНСОВЫХ, СТРАХОВЫХ КОМПАНИЙ - НОВЫЕ ИЗМЕНЕНИЯ ВСТУПИЛИ В СИЛУ Валютное регулирование и валютный контроль на современном этапе (ЦБ РФ) Валютное регулирование (ЦБ РФ) 8 (Ч95) 792/21.22 ; код (495) - 7\42*91-98 31 Января 2012г. Лектор: начальник управления Департамента финансового Мониторинга и валютного контроля Банка России. 1. Система валютного регулирования и валютного контроля в Российской Федерации и валютный контроль уполномоченных банков. Федеральный закон "О валютном регулировании и валютном контроле" ╧ 173-ФЗ (с изменениями и дополнениями, в том числе внесенными Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе"), императивные нормы. Регулирование порядка поведения валютных операций резидентами и нерезидентами, открытия и ведения резидентами счетов в банках, расположенных за пределами Российской Федерации. Режим счета, открытого за рубежом 2. ИЗМЕНЕНИЯ∙ Действие валютного законодательства в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе"? (не вступил в силу) и Федерального закона от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" 3. Порядок осуществления валютного контроля, установленный нормативными актами Банка России по валютному контролю. Инструкция Банка России ╧ 117-И (с изменениями и дополнениями). Паспорта сделок, как документы валютного контроля. Проблемные вопросы оформления и ведения. Документы валютного контроля, учета и отчетности. Действия уполномоченных банков при оформлении и проведении валютных операций Указание Банка России от 26.09.08 ╧ 2080-У "О внесении изменений в Положение Банка России ╧ 258-П". Основные сроки представления документов валютного контроля (с учетом изменений). Направление информации о правонарушениях и Положение ЦБ РФ от 20.07.2007 N 308-П. Указание Банка России "О формах учета по валютным операциям, осуществляемым резидентами, за исключением кредитных организаций и валютных бирж" ╧1950-У и его влияние на квалификацию правонарушений. Порядок открытия и ведения счетов резидентов за пределами территории РФ. Правила осуществления резидентами валютных операций за счет средств, находящихся на счетах за рубежом. Переводы резидентами средств на свои счета. 4. Положение Банка России от 2912.2010 ╧ 364-П ⌠О порядке передачи уполномоченными банками и территориальными учреждениями Банка России в таможенные органы для выполнения ими функций агентов валютного контроля информации по паспортам сделок по внешнеторговым договорам (контрактам) в электронном виде■. Указание Банка России от 29.12.2012 ╧ 2556-У ⌠О внесении изменения в пункт 1.2 Положения Банка России от 1 июня 2004 года ╧ 258-П⌠О порядке представления резидентами уполномоченным банкам подтверждающих документов и информации, связанных с проведением валютных операций с нерезидентами по внешнеторговым сделкам, и осуществления уполномоченными банками контроля за проведением валютных операци3 Указание Банка России от 29.12.2010 ╧ 2557-У ⌠О внесении изменений в Инструкцию Банка России от 15 июня 2004 года ╧ 117-И ⌠О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации при осуществлении валютных операций, порядке учета уполномоченными банками валютных операций и оформления паспортов сделок■ 5. Регулирование порядка представления информации о нарушениях валютного законодательства. Положение ЦБ РФ от 20.07.2007 N 308-П И практика его применения (с учетом последних изменений). Постановление Правительства РФ от 24 февраля 2009 г. N 166 "О порядке представления органами и агентами валютного контроля в орган валютного контроля, уполномоченный Правительством Российской Федерации. Практика применения Положения Банка России ╧308-П на примере конкретных нарушений. 6. Валютное регулирование операций физических лиц. Операции физических лиц и валютный контроль уполномоченных банков. Нормы прямого действия Федерального закона ╧ 173-ФЗ (в том числе заработная плата и командировочные расходы). Порядок осуществления переводов денежных средств физическими лицами из Российской Федерации и по территории Российской Федерации. "Близкородственные" переводы. Действие Инструкции Банка России ╧ 136-И.в связи с внесением изменений и дополнений в Федеральный закон ╧ 115-ФЗ "О противодействии легализации (отмыванию) доходов, полученных преступным путем и финансированию терроризма" Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" и в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе" 7. Ответственность за нарушение валютного законодательства. Федеральный Закон ╧ 174-ФЗ. 8. Перспективы развития валютного регулирования и валютного контроля в Российской Федерации. Стоимость участия в семинаре 9970 рублей Вся информация по тел: 8 (Ч95) 792_2I/22 \\\/// 8 (Ч95) 7Ч2-9I98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7776 bytes Desc: not available URL: From eddieangelika at awnet.com Tue Jan 10 02:14:31 2012 From: eddieangelika at awnet.com (Collette Patience) Date: Tue, 10 Jan 2012 10:14:31 +0000 Subject: Buy Discount Cialis Online Now! we offer the the lowest prices Message-ID: <4f0c0f87.55e7e630@awnet.com> Buy Cialis Online :: OVERNIGHT Delivery! Order Cialis Online - For best prices for Cialis online, shop at one of our reliable drugstore. we offer the the lowest prices Buy Discount Cialis Online Now! http://drugripdrugshealth.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 695 bytes Desc: not available URL: From vivak38 at ronaldshane.com Tue Jan 10 03:42:04 2012 From: vivak38 at ronaldshane.com (=?koi8-r?B?9NLBztPGxdLUztnFIMPFztk=?=) Date: Tue, 10 Jan 2012 12:42:04 +0100 Subject: =?koi8-r?B?9NLBztPGxdLUztnFIMPFztk6ILkyMjct5vog0yAyMDEyIMfPxME=?= Message-ID: <000d01cccf8c$dfc19a80$6400a8c0@vivak38> 27 января 2012 г. Новое в налоговом регулировании трансфертных цен ╧227-ФЗ. с 2012 года. Что ждет налогоплательщиков? код: (четыре девять пять) 7922I*22 <> 8 (Ч95) 792-21.22 Цель: На данном курсе вы получите информацию относительно того, какие сделки будут контролироваться согласно изменениям, вносимым в Налоговый кодекс РФ Законом ╧227-ФЗ, так и практические рекомендации по подготовке защитной документации, основанные на международной практике и комментариях представителей налоговых органов, которые будут возглавлять новые контрольные подразделения. Вы узнаете об основных положениях нового раздела Налогового кодекса V.1, о спорных вопросах, приводящих к рискам для налогоплательщика, разрешение которых появится в изменениях законодательства или будет отдано на откуп судебной практике. Вы также узнаете о том, какие дополнительные документы необходимо предоставлять налоговым органам, что налоговые органы имеют право требовать во время проведения проверки и какая ответственность предусмотрена для налогоплательщиков за несоблюдение норм нового законодательства согласно ст. 129.3 Налогового кодекса РФ. Особое внимание будет уделено вопросу, волнующему многих: как снизить риск претензий со стороны налоговых органов и какие механизмы защиты интересов налогоплательщика предусмотрены новым разделом V.1 Налогового кодекса РФ? В рамках обучения будут подробно разобраны практические способы обоснования трансфертных цен в некоторых типах сделок. Программа: 1. Определение перечня контролируемых сделок как новая обязанность налогоплательщика - главы 14.1 и 14.4 Налогового кодекса РФ: критерии признания сторон сделки взаимозависимыми; * методика расчета минимальной суммы для признания внутрироссийских сделок контролируемыми; * существующие возможности для выведения сделок из-под контроля √ пробелы законодательства; * признание сторон сделки контролируемыми по иным основаниям в рамках судебного разбирательства. 2. Методы обоснования соответствия цен по контролируемым сделкам рыночному уровню - главы 14.2 и 14.3 Налогового кодекса РФ: * сопоставимые рыночные цены √ где найти и как применять, расчет интервала рыночных цен; * сопоставимые сделки √ как доказать сопоставимость или ее отсутствие и как применять методику корректировок; * открытые источников информации; * методы анализа уровня рентабельности √ как найти сопоставимые компании и как рассчитывать интервал рентабельности; * метод распределения прибыли √ возможности применения на практике; * международная практика применения методов ценообразования √ рекомендации ОЭСР и модель контроля за ценообразованием США. 3. Обязанности налогоплательщика и ответственность за несоблюдение норм Закона - глава 14.4 Налогового кодекса РФ: * перечень контролируемых сделок √ форма подачи и ее сроки; * документация по трансфертным ценам √ когда необходимо подготовить и подать; * механизм добровольных корректировок и его эффективность по внутрироссийским сделкам. * Меры для защиты налогоплательщиков, предусмотренные Законом - главы 14.5 и 14.6 Налогового кодекса РФ: симметричные корректировки √ когда они возможны; * соглашение о ценообразовании √ существующие реальные перспективы применения; * краткий обзор проектов законодательства о консолидированной группе налогоплательщиков. 4. Обзор основных мероприятий, которые необходимо провести для подготовки к введению нового законодательства и снижения сопутствующих налоговых рисков, и практические пути их осуществления: * разработка плана мероприятий по подготовке компании и (или) группы компаний к вступлению Закона в силу; * анализ соответствия цен, планируемых на 2012 год, и методики их определения требованиям Закона; * подготовка и внесение изменений в существенные условия договоров и методики определения цен для снижения налоговых рисков; * подготовка проектов типовой документации по трансфертным ценам, которые могут быть представлены налоговому органу при специальной проверке. 5. Способы обоснования цен по контролируемым сделкам на примере (на выбор): * мпортно-экспортных операций по торговле товарами; * оказания услуг иностранной зависимой компанией (или компанией, находящейся в низконалоговой юрисдикции); * добычи полезных ископаемых (металлической руды) и последующей ее реализации (переработки); * внутригруппового финансирования. 6. Обзор комментариев представителей Минфина и налоговых органов относительно нового Закона. 7. Ответы на вопросы. Стоимость участия: 9 000 рублей За более подробной информацuей обpащайтеcь по тел: 7 (499) ЧЧ5\З968 <<>> код (499) 4Ч539_68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7841 bytes Desc: not available URL: From jacob at appelbaum.net Tue Jan 10 13:33:06 2012 From: jacob at appelbaum.net (Jacob Appelbaum) Date: Tue, 10 Jan 2012 13:33:06 -0800 Subject: [liberationtech] Details needed about monitoring and data retention in Syria Message-ID: On 01/10/2012 01:11 PM, Jillian C. York wrote: > No, but it's certainly useful when putting the surveillance in > perspective. Just as many of the Egyptians who later accessed their files > from State Security offices had never been detained or questioned, it's > quite possible that much of Syria's surveillance is for surveillance's sake. > I imagine that the Narus systems likely running in Egypt will have in impact in a number of years. Just the same as the snort IDS at the edge of Syria. These are databases that over time become more and more valuable. When smart people learn about them, smart people will do much much scarier things than the original creators of these systems. I think it's really important to keep perspective about perspective. We're still around fifteen days away from a full year of revolution in Egypt. I'm sure we haven't seen everything yet and I'm certain that what we have seen, we probably don't understand very well. If the Egyptians were using Narus or Cisco interception, would we know? I've been told that the Cisco interception is used for arrests, so what do we make of that? > Which is not to say the recommendations are wrong - they're not. But the > full picture includes both the reality of the surveillance systems and the > reality of how authorities are using their capabilities. > Sure, I think we agree on the first point. Additionally, I'd add that different authorities use their capabilities in myriad of ways. We do not know the full reality, only the capabilities. By being cautious, we're trying to mitigate many of the possibilities even in the worst of actualities. The irony is that for internet chatting and web browsing, I think we've got an ironclad solution; where as for phones, we're basically all doomed - from billing to content. All the best, Jacob _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From maiatasha at victoir.com Tue Jan 10 08:16:38 2012 From: maiatasha at victoir.com (Cris Irene) Date: Tue, 10 Jan 2012 15:16:38 -0100 Subject: Buy Cialis Online :: OVERNIGHT Delivery! we offer the the lowest prices Message-ID: <33r44f11x80-58805940-067k7a11@apixtqxwo> Buy Cialis Online :: OVERNIGHT Delivery! Order Cialis Online - For best prices for Cialis online, shop at one of our reliable drugstore. we offer the the lowest prices Buy Discount Cialis Online Now! http://drugspharmacyhealth.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 696 bytes Desc: not available URL: From Jerrard.Mowrey at hawkley.net Tue Jan 10 17:26:35 2012 From: Jerrard.Mowrey at hawkley.net (Jerrard Mowrey) Date: Tue, 10 Jan 2012 21:26:35 -0400 Subject: If you are looking for a good way to improve your relationship. Message-ID: Choose blue caplets as your unversal and strong solution against male strengh problems! http://shrimpurl.com/gp0 From andrew at pdqvpn.com Tue Jan 10 14:01:29 2012 From: andrew at pdqvpn.com (Andrew Lewis) Date: Tue, 10 Jan 2012 22:01:29 +0000 Subject: [liberationtech] Details needed about monitoring and data retention in Syria Message-ID: Jacob, The people I have talked to claim to be from the tech side of intelligence agencies, and indicated a disorganized mess with competing fiefdoms. All my other poking and proding internally point to a ton of different and random equipment across different ISPs. However I have no info or access to the demarc at this point, so I'll take what your saying as the truth, I am merely indicating that my sources are not just average joes as far as I know and is based on my own investigations into the matter. Yes mobiles are terribly weak from a security PoV. And since this is where most of the Internet and communication penetration is at in these countries, it is even scarier. -Andrew Somewhat ironically, Sent from my iPhone On Jan 10, 2012, at 9:33 PM, Jacob Appelbaum wrote: > On 01/10/2012 01:11 PM, Jillian C. York wrote: >> No, but it's certainly useful when putting the surveillance in >> perspective. Just as many of the Egyptians who later accessed their files >> from State Security offices had never been detained or questioned, it's >> quite possible that much of Syria's surveillance is for surveillance's sake. >> > > I imagine that the Narus systems likely running in Egypt will have in > impact in a number of years. Just the same as the snort IDS at the edge > of Syria. These are databases that over time become more and more > valuable. When smart people learn about them, smart people will do much > much scarier things than the original creators of these systems. > > > I think it's really important to keep perspective about perspective. > > We're still around fifteen days away from a full year of revolution in > Egypt. I'm sure we haven't seen everything yet and I'm certain that what > we have seen, we probably don't understand very well. If the Egyptians > were using Narus or Cisco interception, would we know? I've been told > that the Cisco interception is used for arrests, so what do we make of that? > >> Which is not to say the recommendations are wrong - they're not. But the >> full picture includes both the reality of the surveillance systems and the >> reality of how authorities are using their capabilities. >> > > Sure, I think we agree on the first point. Additionally, I'd add that > different authorities use their capabilities in myriad of ways. > > We do not know the full reality, only the capabilities. By being > cautious, we're trying to mitigate many of the possibilities even in the > worst of actualities. > > The irony is that for internet chatting and web browsing, I think we've > got an ironclad solution; where as for phones, we're basically all > doomed - from billing to content. > > All the best, > Jacob > _______________________________________________ > liberationtech mailing list > liberationtech at lists.stanford.edu > > Should you need to change your subscription options, please go to: > > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" > > You will need the user name and password you receive from the list moderator in monthly reminders. > > Should you need immediate assistance, please contact the list moderator. > > Please don't forget to follow us on http://twitter.com/#!/Liberationtech _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Jan 10 13:56:47 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 10 Jan 2012 22:56:47 +0100 Subject: [liberationtech] Details needed about monitoring and data retention in Syria Message-ID: <20120110215647.GR21917@leitl.org> ----- Forwarded message from Jacob Appelbaum ----- From eugen at leitl.org Tue Jan 10 14:14:33 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 10 Jan 2012 23:14:33 +0100 Subject: [liberationtech] Details needed about monitoring and data retention in Syria Message-ID: <20120110221433.GS21917@leitl.org> ----- Forwarded message from Andrew Lewis ----- From eugen at leitl.org Wed Jan 11 01:20:15 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 11 Jan 2012 10:20:15 +0100 Subject: [silk] The Coming War on General Purpose Computing Message-ID: <20120111092015.GX21917@leitl.org> ----- Forwarded message from Udhay Shankar N ----- From renovatedk28 at rhic.com Wed Jan 11 01:41:15 2012 From: renovatedk28 at rhic.com (=?koi8-r?B?58/Uz9fJzdPRINMgwdfUz9LPzSDLzsnHyQ==?=) Date: Wed, 11 Jan 2012 10:41:15 +0100 Subject: =?koi8-r?B?58/Ez9fPyiDP1N7F1CDawSAyMDExIMfPxA==?= Message-ID: 24 января 2012 г. Годовой отчет за 2011 год: готовимся с автором книги 8 (499) 445.Ч0.95 **** код (499) ЧЧ539_68 Цель: исчерпывающая информация по вопросам, связанным с подготовкой годового отчета за 2011 год. По всем спорным вопросам приводится позиция контролирующих органов, мнения независимых экспертов и арбитражная практика. Программа: 1. Бухгалтерский учет: много новаций и не совсем обычных. * Обзор изменений в бухгалтерском учете. * Расходы будущих периодов: "расчищаем" счет 97 – пошаговый алгоритм. * ПБУ 8/2010: легко отделяем оценочные обязательства от условных. Пять вопросов – и Вы уверены, что необходимые оценочные обязательства сформированы в полном объеме. * Оплата отпусков: что было, что будет – определяем оптимальный порядок с учетом налоговых правил. * Отражение последствий изменений в бухгалтерской отчетности. Вносим необходимые изменения в учетную политику. 2. Бухгалтерская отчетность: формы новые, подходы – тоже. * Форма бухгалтерского баланса: дело не в соединении или разъединении показателей, а в порядке их формирования. Практическая реализация курса на повышение достоверности данных отчетности. Новые требования и подходы к распределению показателей между отдельными статьями. * Форма отчета о прибылях и убытках: от перестановки мест слагаемых сумма… Сохранятся ли контрольные соотношения? * Отчет об изменении капитала: "переходному периоду" - нет. Новый раздел II по отражению корректировок в связи с выявлением ошибок и изменением учетной политики: проще один раз заполнить, чем сто раз услышать. * Если у организации есть денежные средства, - будем заполнять отчет об их движении. Изменилась не только форма – изменились принципы составления. Но все не так сложно, если понять три главных направления изменений. 3. Налоги. * Основные массовые изменения в порядке исчисления налога на прибыль. Подвижки в подходах по отдельным вопросам налогового учета: основных средств, материалов и товаров, дебиторской и кредиторской задолженностей, дивидендов. * Авторские ремарки к изменениям в порядке исчисления НДС (корректировочные счета-фактуры, расчеты в условных единицах). * Другие налоги (отдельные аспекты). Стоимость участия: 8 000 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 (499) 4Ч5З968 ; 8 (499) ЧЧ5\4О_95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4207 bytes Desc: not available URL: From udhay at pobox.com Tue Jan 10 22:26:37 2012 From: udhay at pobox.com (Udhay Shankar N) Date: Wed, 11 Jan 2012 11:56:37 +0530 Subject: [silk] The Coming War on General Purpose Computing Message-ID: On 02-Jan-12 10:14 AM, Biju Chacko wrote: > Silklister Cory Doctorow gave an interesting [1] talk at the Chaos > Computer Congress in Berlin recently. A more polished version of this: http://boingboing.net/2012/01/10/lockdown.html Lockdown The coming war on general-purpose computing By Cory Doctorow This article is based on a keynote speech to the Chaos Computer Congress in Berlin, Dec. 2011. General-purpose computers are astounding. They're so astounding that our society still struggles to come to grips with them, what they're for, how to accommodate them, and how to cope with them. This brings us back to something you might be sick of reading about: copyright. But bear with me, because this is about something more important. The shape of the copyright wars clues us into an upcoming fight over the destiny of the general-purpose computer itself. In the beginning, we had packaged software and we had sneakernet. We had floppy disks in ziplock bags, in cardboard boxes, hung on pegs in shops, and sold like candy bars and magazines. They were eminently susceptible to duplication, were duplicated quickly, and widely, and this was to the great chagrin of people who made and sold software. Enter Digital Rights Management in its most primitive forms: let's call it DRM 0.96. They introduced physical indicia which the software checked forbdeliberate damage, dongles, hidden sectorsband challenge-response protocols that required possession of large, unwieldy manuals that were difficult to copy. These failed for two reasons. First, they were commercially unpopular, because they reduced the usefulness of the software to the legitimate purchasers. Honest buyers resented the non-functionality of their backups, they hated the loss of scarce ports to the authentication dongles, and they chafed at the inconvenience of having to lug around large manuals when they wanted to run their software. Second, these didn't stop pirates, who found it trivial to patch the software and bypass authentication. People who took the software without paying for it were untouched. Typically, the way this happened is a programmer, with possession of technology and expertise of equivalent sophistication to the software vendor itself, would reverse-engineer the software and circulate cracked versions. While this sounds highly specialized, it really wasn't. Figuring out what recalcitrant programs were doing and routing around media defects were core skills for computer programmers, especially in the era of fragile floppy disks and the rough-and-ready early days of software development. Anti-copying strategies only became more fraught as networks spread; once we had bulletin boards, online services, USENET newsgroups and mailing lists, the expertise of people who figured out how to defeat these authentication systems could be packaged up in software as little crack files. As network capacity increased, the cracked disk images or executables themselves could be spread on their own. This gave us DRM 1.0. By 1996, it became clear to everyone in the halls of power that there was something important about to happen. We were about to have an information economy, whatever the Hell that was. They assumed it meant an economy where we bought and sold information. Information technology improves efficiency, so imagine the markets that an information economy would have! You could buy a book for a day, you could sell the right to watch the movie for a Euro, and then you could rent out the pause button for a penny per second. You could sell movies for one price in one country, at another price in another, and so on. The fantasies of those days were like a boring science fiction adaptation of the Old Testament Book of Numbers, a tedious enumeration of every permutation of things people do with informationband what might be charged for each. Unfortunately for them, none of this would be possible unless they could control how people use their computers and the files we transfer to them. After all, it was easy to talk about selling someone a tune to download to their MP3 player, but not so easy to talk about the the right to move music from the player to another device. But how the Hell could you stop that once you'd given them the file? In order to do so, you needed to figure out how to stop computers from running certain programs and inspecting certain files and processes. For example, you could encrypt the file, and then require the user to run a program that only unlocked the file under certain circumstances. But, as they say on the Internet, now you have two problems. You must now also stop the user from saving the file while it's unencryptedbwhich must happen eventuallyb and you must stop the user from figuring out where the unlocking program stores its keys, enabling them to permanently decrypt the media and ditch the stupid player app entirely. Now you have three problems: you must stop the users who figure out how to decrypt from sharing it with other users. Now you've got four problems, because you must stop the users who figure out how to extract secrets from unlocking programs from telling other users how to do it too. And now you've got five problems, because you must stop users who figure out how to extract these secrets from telling other users what the secrets were! That's a lot of problems. But by 1996, we had a solution. We had the WIPO Copyright Treaty, passed by the United Nations World Intellectual Property Organization. This created laws that made it illegal to extract secrets from unlocking programs, and it created laws that made it illegal to extract media (such as songs and movies) from the unlocking programs while they were running. It created laws that made it illegal to tell people how to extract secrets from unlocking programs, and it created laws that made it illegal to host copyrighted works or the secrets. It also established a handy streamlined process that let you remove stuff from the Internet without having to screw around with lawyers, and judges, and all that crap. And with that, illegal copying ended forever, the information economy blossomed into a beautiful flower that brought prosperity to the whole wide world; as they say on the aircraft carriers, "Mission Accomplished". That's not how the story ends, of course, because pretty much anyone who understood computers and networks understood that these laws would create more problems than they could possibly solve. After all, these laws made it illegal to look inside your computer when it was running certain programs. They made it illegal to tell people what you found when you looked inside your computer, and they made it easy to censor material on the internet without having to prove that anything wrong had happened. In short, they made unrealistic demands on reality and reality did not oblige them. Copying only got easier following the passage of these lawsbcopying will only ever get easier. Right now is as hard as copying will get. Your grandchildren will turn to you and say "Tell me again, Grandpa, about when it was hard to copy things in 2012, when you couldn't get a drive the size of your fingernail that could hold every song ever recorded, every movie ever made, every word ever spoken, every picture ever taken, everything, and transfer it in such a short period of time you didn't even notice it was doing it." Reality asserts itself. Like the nursery rhyme lady who swallows a spider to catch a fly, and has to swallow a bird to catch the spider, and a cat to catch the bird, so must these regulations, which have broad general appeal but are disastrous in their implementation. Each regulation begets a new one, aimed at shoring up its own failures. It's tempting to stop the story here and conclude that the problem is that lawmakers are either clueless or evil, or possibly evilly clueless. This is not a very satisfying place to go, because it's fundamentally a counsel of despair; it suggests that our problems cannot be solved for so long as stupidity and evilness are present in the halls of power, which is to say they will never be solved. But I have another theory about what's happened. It's not that regulators don't understand information technology, because it should be possible to be a non-expert and still make a good law. MPs and Congressmen and so on are elected to represent districts and people, not disciplines and issues. We don't have a Member of Parliament for biochemistry, and we don't have a Senator from the great state of urban planning. And yet those people who are experts in policy and politics, not technical disciplines, still manage to pass good rules that make sense. That's because government relies on heuristics: rules of thumb about how to balance expert input from different sides of an issue. Unfortunately, information technology confounds these heuristicsbit kicks the crap out of thembin one important way. The important tests of whether or not a regulation is fit for a purpose are first whether it will work, and second whether or not it will, in the course of doing its work, have effects on everything else. If I wanted Congress, Parliament, or the E.U. to regulate a wheel, it's unlikely I'd succeed. If I turned up, pointed out that bank robbers always make their escape on wheeled vehicles, and asked, "Can't we do something about this?", the answer would be "No". This is because we don't know how to make a wheel that is still generally useful for legitimate wheel applications, but useless to bad guys. We can all see that the general benefits of wheels are so profound that we'd be foolish to risk changing them in a foolish errand to stop bank robberies. Even if there were an epidemic of bank robberiesbeven if society were on the verge of collapse thanks to bank robberiesbno-one would think that wheels were the right place to start solving our problems. However, if I were to show up in that same body to say that I had absolute proof that hands-free phones were making cars dangerous, and I requested a law prohibiting hands-free phones in cars, the regulator might say "Yeah, I'd take your point, we'd do that." We might disagree about whether or not this is a good idea, or whether or not my evidence made sense, but very few of us would say that once you take the hands-free phones out of the car, they stop being cars. We understand that cars remain cars even if we remove features from them. Cars are special-purpose, at least in comparison to wheels, and all that the addition of a hands-free phone does is add one more feature to an already-specialized technology. There's a heuristic for this: special-purpose technologies are complex, and you can remove features from them without doing fundamental, disfiguring violence to their underlying utility. This rule of thumb serves regulators well, by and large, but it is rendered null and void by the general-purpose computer and the general-purpose networkbthe PC and the Internet. If you think of computer software as a feature, a computer with spreadsheets running on it has a spreadsheet feature, and one that's running World of Warcraft has an MMORPG feature. The heuristic would lead you to think that a computer unable to run spreadsheets or games would be no more of an attack on computing than a ban on car-phones would be an attack on cars. And, if you think of protocols and websites as features of the network, then saying "fix the Internet so that it doesn't run BitTorrent", or "fix the Internet so that thepiratebay.org no longer resolves," sounds a lot like "change the sound of busy signals," or "take that pizzeria on the corner off the phone network," and not like an attack on the fundamental principles of internetworking. The rule of thumb works for cars, for houses, and for every other substantial area of technological regulation. Not realizing that it fails for the Internet does not make you evil, and it does not make you an ignoramus. It just makes you part of that vast majority of the world, for whom ideas like Turing completeness and end-to-end are meaningless. So, our regulators go off, they blithely pass these laws, and they become part of the reality of our technological world. There are, suddenly, numbers that we aren't allowed to write down on the Internet, programs we're not allowed to publish, and all it takes to make legitimate material disappear from the Internet is there mere accusation of copyright infringement. It fails to attain the goal of the regulation, because it doesn't stop people from violating copyright, but it bears a kind of superficial resemblance to copyright enforcementbit satisfies the security syllogism: "something must be done, I am doing something, something has been done." As a result, any failures that arise can be blamed on the idea that the regulation doesn't go far enough, rather than the idea that it was flawed from the outset. This kind of superficial resemblance and underlying divergence happens in other engineering contexts. I've a friend, who was once a senior executive at a big consumer packaged goods company, who told me what happened when the marketing department told the engineers that they'd thought up a great idea for detergent: from now on, they were going to make detergent that made your clothes newer every time you washed them! After the engineers had tried unsuccessfully to convey the concept of entropy to the marketing department, they arrived at another solution: they'd develop a detergent that used enzymes that attacked loose fiber ends, the kind that you get with broken fibers that make your clothes look old. So every time you washed your clothes in the detergent, they would look newer. Unfortunately, that was because the detergent was digesting your clothes. Using it would literally cause your clothes to dissolve in the washing machine. This was, needless to say, the opposite of making clothes newer. Instead, you were artificially aging them every time you washed them, and as the user, the more you deployed the "solution", the more drastic your measures had to be to keep your clothes up to date. Eventually, you would have to buy new clothes because the old ones fell apart. Today we have marketing departments that say things such as "we don't need computers, we need appliances. Make me a computer that doesn't run every program, just a program that does this specialized task, like streaming audio, or routing packets, or playing Xbox games, and make sure it doesn't run programs that I haven't authorized that might undermine our profits." On the surface, this seems like a reasonable idea: a program that does one specialized task. After all, we can put an electric motor in a blender, and we can install a motor in a dishwasher, and we don't worry if it's still possible to run a dishwashing program in a blender. But that's not what we do when we turn a computer into an appliance. We're not making a computer that runs only the "appliance" app; we're taking a computer that can run every program, then using a combination of rootkits, spyware, and code-signing to prevent the user from knowing which processes are running, from installing her own software, and from terminating processes that she doesn't want. In other words, an appliance is not a stripped-down computerbit is a fully functional computer with spyware on it out of the box. We don't know how to build a general-purpose computer that is capable of running any program except for some program that we don't like, are prohibited by law, or which loses us money. The closest approximation that we have to this is a computer with spyware: a computer on which remote parties set policies without the computer user's knowledge, or over the objection of the computer's owner. Digital rights management always converges on malware. In one famous incidentba gift to people who share this hypothesisbSony loaded covert rootkit installers on 6 million audio CDs, which secretly executed programs that watched for attempts to read the sound files on CDs and terminated them. It also hid the rootkit's existence by causing the computer operating system's kernel to lie about which processes were running, and which files were present on the drive. But that's not the only example. Nintendo's 3DS opportunistically updates its firmware, and does an integrity check to make sure that you haven't altered the old firmware in any way. If it detects signs of tampering, it turns itself into a brick. Human rights activists have raised alarms over U-EFI, the new PC bootloader, which restricts your computer so it only runs "signed" operating systems, noting that repressive governments will likely withhold signatures from operating systems unless they allow for covert surveillance operations. On the network side, attempts to make a network that can't be used for copyright infringement always converges with the surveillance measures that we know from repressive governments. Consider SOPA, the U.S. Stop Online Piracy Act, which bans innocuous tools such as DNSSecba security suite that authenticates domain name informationb because they might be used to defeat DNS blocking measures. It blocks Tor, an online anonymity tool sponsored by the U.S. Naval Research Laboratory and used by dissidents in oppressive regimes, because it can be used to circumvent IP blocking measures. In fact, the Motion Picture Association of America, a SOPA proponent, circulated a memo citing research that SOPA might work because it uses the same measures as are used in Syria, China, and Uzbekistan. It argued that because these measures are effective in those countries, they would work in America, too! It may seem like SOPA is the endgame in a long fight over copyright and the Internet, and it may seem that if we defeat SOPA, we'll be well on our way to securing the freedom of PCs and networks. But as I said at the beginning of this talk, this isn't about copyright. The copyright wars are just the beta version of a long coming war on computation. The entertainment industry is just the first belligerents to take up arms, and we tend to think of them as particularly successful. After all, here is SOPA, trembling on the verge of passage, ready to break the Internet on a fundamental levelb all in the name of preserving Top 40 music, reality TV shows, and Ashton Kutcher movies. But the reality is that copyright legislation gets as far as it does precisely because it's not taken seriously by politicians. This is why, on one hand, Canada has had Parliament after Parliament introduce one awful copyright bill after another, but on the other hand, Parliament after Parliament has failed to actually vote on each bill. It's why SOPA, a bill composed of pure stupid and pieced together molecule-by-molecule into a kind of "Stupidite 250" normally only found in the heart of newborn star, had its rushed-through SOPA hearings adjourned midway through the Christmas break: so that lawmakers could get into a vicious national debate over an important issue, unemployment insurance. It's why the World Intellectual Property Organization is gulled time and again into enacting crazed, pig-ignorant copyright proposals: because when the nations of the world send their U.N. missions to Geneva, they send water experts, not copyright experts. They send health experts, not copyright experts. They send agriculture experts, not copyright experts, because copyright is just not as important. Canada's Parliament didn't vote on its copyright bills because, of all the things that Canada needs to do, fixing copyright ranks well below health emergencies on First Nations reservations, exploiting the oil patch in Alberta, interceding in sectarian resentments among French- and English-speakers, solving resources crises in the nation's fisheries, and a thousand other issues. The triviality of copyright tells you that when other sectors of the economy start to evince concerns about the Internet and the PC, copyright will be revealed for a minor skirmishbnot a war. Why might other sectors come to nurse grudges against computers in the way the entertainment business already has? The world we live in today is made of computers. We don't have cars anymore; we have computers we ride in. We don't have airplanes anymore; we have flying Solaris boxes attached to bucketfuls of industrial control systems. A 3D printer is not a device, it's a peripheral, and it only works connected to a computer. A radio is no longer a crystal: it's a general-purpose computer, running software. The grievances that arise from unauthorized copies of Snooki's Confessions of a Guidette are trivial when compared to the calls-to-action that our computer-embroidered reality will soon create. Consider radio. Radio regulation until today was based on the idea that the properties of a radio are fixed at the time of manufacture, and can't be easily altered. You can't just flip a switch on your baby monitor and interfere with other signals. But powerful software-defined radios (SDRs) can change from baby monitor to emergency services dispatcher or air traffic controller, just by loading and executing different software. This is why the Federal Communications Commission (FCC) considered what would happen when we put SDRs in the field, and asked for comment on whether it should mandate that all software-defined radios should be embedded in "trusted computing" machines. Ultimately, the question is whether every PC should be locked, so that their programs could be strictly regulated by central authorities. Even this is a shadow of what is to come. After all, this was the year in which we saw the debut of open source shape files for converting AR-15 rifles to full-automatic. This was the year of crowd-funded open-sourced hardware for genetic sequencing. And while 3D printing will give rise to plenty of trivial complaints, there will be judges in the American South and mullahs in Iran who will lose their minds over people in their jurisdictions printing out sex toys. The trajectory of 3D printing will raise real grievances, from solid-state meth labs to ceramic knives. It doesn't take a science fiction writer to understand why regulators might be nervous about the user-modifiable firmware on self-driving cars, or limiting interoperability for aviation controllers, or the kind of thing you could do with bio-scale assemblers and sequencers. Imagine what will happen the day that Monsanto determines that it's really important to make sure that computers can't execute programs which cause specialized peripherals to output custom organisms which literally eat their lunch. Regardless of whether you think these are real problems or hysterical fears, they are, nevertheless, the political currency of lobbies and interest groups far more influential than Hollywood and big content. Every one of them will arrive at the same place: "Can't you just make us a general-purpose computer that runs all the programs, except the ones that scare and anger us? Can't you just make us an Internet that transmits any message over any protocol between any two points, unless it upsets us?" There will be programs that run on general-purpose computers, and peripherals, that will freak even me out. So I can believe that people who advocate for limiting general-purpose computers will find a receptive audience. But just as we saw with the copyright wars, banning certain instructions, protocols or messages will be wholly ineffective as a means of prevention and remedy. As we saw in the copyright wars, all attempts at controlling PCs will converge on rootkits, and all attempts at controlling the Internet will converge on surveillance and censorship. This stuff matters because we've spent the last decade sending our best players out to fight what we thought was the final boss at the end of the game, but it turns out it's just been an end-level guardian. The stakes are only going to get higher. As a member of the Walkman generation, I have made peace with the fact that I will require a hearing aid long before I die. It won't be a hearing aid, though; it will really be a computer. So when I get into a carba computer that I put my body intobwith my hearing aidba computer I put inside my bodybI want to know that these technologies are not designed to keep secrets from me, or to prevent me from terminating processes on them that work against my interests. Last year, the Lower Merion School District, in a middle-class, affluent suburb of Philadelphia, found itself in a great deal of trouble. It was caught distributing, to its students, rootkitted laptops that allowed remote covert surveillance through the computer's camera and network connection. They photographed students thousands of times, at home and at school, awake and asleep, dressed and naked. Meanwhile, the latest generation of lawful intercept technology can covertly operate cameras, microphones, and GPS tranceivers on PCs, tablets, and mobile devices. We haven't lost yet, but we have to win the copyright war first if we want to keep the Internet and the PC free and open. Freedom in the future will require us to have the capacity to monitor our devices and set meaningful policies for them; to examine and terminate the software processes that runs on them; and to maintain them as honest servants to our will, not as traitors and spies working for criminals, thugs, and control freaks. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From nvvaidyax at cossette.com Tue Jan 10 23:50:07 2012 From: nvvaidyax at cossette.com (=?koi8-r?B?IvDy7+3i5frv8OHz7u/z9PggMjAxMiI=?=) Date: Thu, 11 Jan 2012 13:20:07 +0530 Subject: =?koi8-r?B?/MvT0MXS1MnawSDQ0s/N2dvMxc7Oz8ogwsXaz9DB087P09TJ?= Message-ID: <01ccd063$bc83dd80$f4efa17a@nvvaidyax> Куда: В отдел ОТ и ПБ Уважаемые коллеги! Информируем Вас, что в период с 30 по 31 января 2012 года в Санкт-Петербурге пройдет КУРС ПОВЫШЕНИЯ КВАЛИФИКАЦИИ по теме: Э К С П Е Р Т И З А П Р О М Ы Ш Л Е Н Н О Й Б Е З О П А С Н О С Т И. Разработка документации. Ответственность за нарушение законодательства о промышленной безопасности. По вопросам участия обращайтесь по телефону: 8 812 6Ч2--95_98 Краткая программа конференции: 1. Экспертиза промышленной безопасности. Правила проведения. 2. Разработка документации для получения лицензий Ростехнадзора. 3. Соответствие объекта экспертизы предъявляемым к нему требованиям промышленной безопасности (промбезопасности). 4. Регистрация опасных производственных объектов (регистрация опо) в реестр. 5. Регистрирующие органы - Ростехнадзор, в том числе его территориальные органы. 6. Ответственность за нарушение законодательства РФ о промышленной безопасности опасных производственных объектов. С уважением, оргкомитет конференций Титова Анна Николаевна Тел.: (812) 6Ч2...95.98 From eugen at leitl.org Wed Jan 11 04:38:37 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 11 Jan 2012 13:38:37 +0100 Subject: [liberationtech] Mobile Phone Security Message-ID: <20120111123837.GI21917@leitl.org> ----- Forwarded message from liberationtech at lewman.us ----- From britnidaniele at tcfbank.com Wed Jan 11 11:28:33 2012 From: britnidaniele at tcfbank.com (CATRICE KANDI) Date: Wed, 11 Jan 2012 14:28:33 -0500 Subject: SPECIAL OFFER : CIALIS on SALE at $1.53 !!! BEST quality generic CIALIS with 100% satisfaction guaranteed! Message-ID: <75p23q18x15-17995039-381x8s93@cnnzspnz> Buy Cialis Online :: OVERNIGHT Delivery! Order Cialis Online - For best prices for Cialis online, shop at one of our reliable drugstore. we offer the the lowest prices Buy Discount Cialis Online Now! http://drugstorepillsplusrx.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 697 bytes Desc: not available URL: From eugen at leitl.org Wed Jan 11 06:59:56 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 11 Jan 2012 15:59:56 +0100 Subject: [liberationtech] Azerbaijan wants to register mobile phones Message-ID: <20120111145956.GQ21917@leitl.org> ----- Forwarded message from Katrin Verclas ----- From eugen at leitl.org Wed Jan 11 07:38:40 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 11 Jan 2012 16:38:40 +0100 Subject: [liberationtech] Azerbaijan wants to register mobile phones Message-ID: <20120111153840.GV21917@leitl.org> ----- Forwarded message from Pavol Luptak ----- From eugen at leitl.org Wed Jan 11 07:39:20 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 11 Jan 2012 16:39:20 +0100 Subject: [liberationtech] REVIEWERS NEEDED - Safer satellite phone guide nearing completion Message-ID: <20120111153920.GW21917@leitl.org> ----- Forwarded message from Brian Conley ----- From eugen at leitl.org Wed Jan 11 07:41:22 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 11 Jan 2012 16:41:22 +0100 Subject: [liberationtech] SOPA and DNS-level Censorship Circumvention Message-ID: <20120111154122.GX21917@leitl.org> ----- Forwarded message from Griffin Boyce ----- From appearrw8 at rapptechnology.com Wed Jan 11 07:41:38 2012 From: appearrw8 at rapptechnology.com (=?koi8-r?B?89TSwcjP19nFINfazs/T2Q==?=) Date: Wed, 11 Jan 2012 16:41:38 +0100 Subject: =?koi8-r?B?89TSwcjP19nFINfazs/T2SDJINDP08/CydEg1yAyMDEyIMfPxNU=?= Message-ID: <8D2379FE73234185BF7DC480DC3B0123@rally> 17 января 2012 г. Страховые взносы и пособия в 2012 году +7 (495)- 7Ч29I*98 и +7 499 - 4Ч5-40.95 Программа: 1. Новое в уплате страховых социальных взносов в 2012 году * Изменение тарифов страховых взносов и облагаемой базы. Применение льготных тарифов для работодателей-инвалидов, "упрощенки", СМИ. * Сложные вопросы и типичные ошибки: объект и база обложения взносами, необлагаемые выплаты. * Последствия перечисления взносов по неверным реквизитам. Зачет и возврат переплаты. * Отчетность страхователя. Новшества в персонифицированной отчетности за 2011 год. * Формы отчетности по персонифицированному учету за 2011 год. * Важные новшества в технологии электронной отчетности, которые необходимо учитывать. * Важнейшие разъяснения ПФР по заполнению РСВ-1 и подаче корректирующих отчетов. * Камеральные и выездные проверки по взносам: правила проведения проверок, риски, санкции. 2. Новое в выплате пособий по социальному страхованию в 2012 году * Новые бланки больничных листков и порядок их заполнения врачом и работодателем с учетом требований ФСС и новых нормативных документов. * Изменения порядка исчисления пособий в 2012 году. * Индексация "детских" пособий. * Программа реформирования пособий до 2014 года: чего ожидать. Стоимость участия: 8 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: код (495) - 7.Ч2*91\98 : 8 (495) 792_21_22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3151 bytes Desc: not available URL: From torvng at cleanclothes.ch Thu Jan 12 01:20:42 2012 From: torvng at cleanclothes.ch (=?koi8-r?B?Iufr7iI=?=) Date: Fri, 12 Jan 2012 10:20:42 +0100 Subject: =?koi8-r?B?+sXNxczYztnKIMvPxMXL0yDXIDIwMTIgx8/E1Q==?= Message-ID: <01ccd113$d6ba0200$5ab4bb52@torvng> Кому: ГЛАВНОМУ ИНЖЕНЕРУ Уважаемые коллеги! Напоминаем Вам, что с 30 по 31 января 2012 года в Санкт-Петербурге состоится КОНФЕРЕНЦИЯ по теме: З Е М Е Л Ь Н Ы Й К О Д Е К С в 2012 году. КАДАСТРОВЫЙ УЧЕТ и оформление прав на земельные участки. Предоставление земельных участков под застройку. За более подробной информацией обращайтесь по телефону: 8 812 642 O5..96 **************************************************************** Краткая программа мероприятия: ******************************************************************* 1. Оформление прав на объекты недвижимости. Государственная регистрация сделок с земельными участками. 2. Обзор практики применения Федерального закона "О государственной регистрации прав на недвижимое имущество и сделок с ним". 3. Кадастровая деятельность по формированию земельных участков. 4. Категории земельных участков. 5. Перевод земельных участков из одной категории в другую. 6. Согласование местоположения границ земельных участков. Межевой план. 7. Кадастровые паспорта на жилое помещение, на нежилое помещение, на землю. 8. Регламент предоставления земельного участка в собственность. 9. Оформление прав на земельные участки под существующими линейно-кабельными сооружениями и под строительство линейных объектов. 10. Переход права собственности на здание, строение, сооружение, находящиеся на чужом земельном участке. 11. Предоставление земельных участков на инвестиционных условиях. 12. Перечень документов, представляемых для регистрации договора аренды земельного участка. С уважением, отдел обучения Иванова Валерия Юрьевна Тел. /812/ 642..O5...96 From cypherpunks at jfet.org Wed Jan 11 20:41:45 2012 From: cypherpunks at jfet.org (cypherpunks at jfet.org) Date: Fri, 12 Jan 2012 12:41:45 +0800 Subject: Career development program Message-ID: <4F0FB5F4.402060@jfet.org> AFFORDABLE ONLINE BACHEL0R'S, MASTER'S & DOCT0RATE DEGREES Add Bache1or's, Master's or Doctorate Degrees to your resume in just a few weeks and open avenues to promotion and better jobs! At your Own Pace! At your Own Schedule! At your Own Convenience! No Examination! No Study! No Class! Regardless of your age, sex, marital status, or location, you can receive a degree in your desired field. All you need is sufficient work, military, or life experience and you are already on your way to an instant degree in your relevant field. Earn a recognized University Degree based on work or life experience within weeks! Get your desired degree on the basis of your Prior Knowledge and Professional Experience. Give us a call NOW! +1-404-549-4731 Please leave us your: 1) Your Name 3) Phone No. We will get back to you ASAP If you would like to have your email address removed from our client list please leave a message spelling out your email address clearly.We apologize for any inconvenience this may have caused you. From nitin_golao at purestudio.net Wed Jan 11 23:49:14 2012 From: nitin_golao at purestudio.net (=?koi8-r?B?Iuvh5OHz9PIg7uXk9+n26e3v8/TpIg==?=) Date: Fri, 12 Jan 2012 13:19:14 +0530 Subject: =?koi8-r?B?+sXNxczYztnKIMvPxMXL0yDXIDIwMTIgx8/E1Q==?= Message-ID: <01ccd12c$c7567500$34dac375@nitin_golao> Кому: ГЛАВНОМУ ИНЖЕНЕРУ Уважаемые коллеги! Напоминаем Вам, что с 30 по 31 января 2012 года в Санкт-Петербурге состоится КОНФЕРЕНЦИЯ по теме: З Е М Е Л Ь Н Ы Й К О Д Е К С в 2012 году. КАДАСТРОВЫЙ УЧЕТ и оформление прав на земельные участки. Предоставление земельных участков под застройку. За более подробной информацией обращайтесь по телефону: 8 812 642 O5-96 ***** Краткая программа мероприятия: ----------------------------------------------- 1. Оформление прав на объекты недвижимости. Государственная регистрация сделок с земельными участками. 2. Обзор практики применения Федерального закона "О государственной регистрации прав на недвижимое имущество и сделок с ним". 3. Кадастровая деятельность по формированию земельных участков. 4. Категории земельных участков. 5. Перевод земельных участков из одной категории в другую. 6. Согласование местоположения границ земельных участков. Межевой план. 7. Кадастровые паспорта на жилое помещение, на нежилое помещение, на землю. 8. Регламент предоставления земельного участка в собственность. 9. Оформление прав на земельные участки под существующими линейно-кабельными сооружениями и под строительство линейных объектов. 10. Переход права собственности на здание, строение, сооружение, находящиеся на чужом земельном участке. 11. Предоставление земельных участков на инвестиционных условиях. 12. Перечень документов, представляемых для регистрации договора аренды земельного участка. С уважением, отдел обучения Иванова Валерия Юрьевна Тел. /812/ 642_O5 96 From warner at lothar.com Thu Jan 12 15:33:10 2012 From: warner at lothar.com (Brian Warner) Date: Thu, 12 Jan 2012 15:33:10 -0800 Subject: [tahoe-announce] ANN: Tahoe-LAFS 1.9.1 Released! Message-ID: ANNOUNCING Tahoe, the Least-Authority File System, v1.9.1 The Tahoe-LAFS team has announced the immediate availability of version 1.9.1 of Tahoe-LAFS, an extremely reliable distributed storage system. Get it here: https://tahoe-lafs.org/source/tahoe-lafs/trunk/docs/quickstart.rst Tahoe-LAFS is the first distributed storage system to offer "provider-independent security" b meaning that not even the operators of your storage servers can read or alter your data without your consent. Here is the one-page explanation of its unique security and fault-tolerance properties: https://tahoe-lafs.org/source/tahoe-lafs/trunk/docs/about.rst The previous stable release of Tahoe-LAFS was v1.9.0, released on October 31, 2011. v1.9.1 is a critical bugfix release which fixes a significant security issue [#1654]. See the NEWS file [1] and known_issues.rst [2] file for details. WHAT IS IT GOOD FOR? With Tahoe-LAFS, you distribute your filesystem across multiple servers, and even if some of the servers fail or are taken over by an attacker, the entire filesystem continues to work correctly, and continues to preserve your privacy and security. You can easily share specific files and directories with other people. In addition to the core storage system itself, volunteers have built other projects on top of Tahoe-LAFS and have integrated Tahoe-LAFS with existing systems, including Windows, JavaScript, iPhone, Android, Hadoop, Flume, Django, Puppet, bzr, mercurial, perforce, duplicity, TiddlyWiki, and more. See the Related Projects page on the wiki [3]. We believe that strong cryptography, Free and Open Source Software, erasure coding, and principled engineering practices make Tahoe-LAFS safer than RAID, removable drive, tape, on-line backup or cloud storage. This software is developed under test-driven development, and there are no known bugs or security flaws which would compromise confidentiality or data integrity under recommended use. (For all important issues that we are currently aware of please see the known_issues.rst file [2].) COMPATIBILITY This release is compatible with the version 1 series of Tahoe-LAFS. Clients from this release can write files and directories in the format used by clients of all versions back to v1.0 (which was released March 25, 2008). Clients from this release can read files and directories produced by clients of all versions since v1.0. Servers from this release can serve clients of all versions back to v1.0 and clients from this release can use servers of all versions back to v1.0. This is the sixteenth release in the version 1 series. This series of Tahoe-LAFS will be actively supported and maintained for the foreseeable future, and future versions of Tahoe-LAFS will retain the ability to read and write files compatible with this series. LICENCE You may use this package under the GNU General Public License, version 2 or, at your option, any later version. See the file "COPYING.GPL" [4] for the terms of the GNU General Public License, version 2. You may use this package under the Transitive Grace Period Public Licence, version 1 or, at your option, any later version. (The Transitive Grace Period Public Licence has requirements similar to the GPL except that it allows you to delay for up to twelve months after you redistribute a derived work before releasing the source code of your derived work.) See the file "COPYING.TGPPL.rst" [5] for the terms of the Transitive Grace Period Public Licence, version 1. (You may choose to use this package under the terms of either licence, at your option.) INSTALLATION Tahoe-LAFS works on Linux, Mac OS X, Windows, Solaris, *BSD, and probably most other systems. Start with "docs/quickstart.rst" [6]. HACKING AND COMMUNITY Please join us on the mailing list [7]. Patches are gratefully accepted -- the RoadMap page [8] shows the next improvements that we plan to make and CREDITS [9] lists the names of people who've contributed to the project. The Dev page [10] contains resources for hackers. SPONSORSHIP Atlas Networks has contributed several hosted servers for performance testing. Thank you to Atlas Networks [11] for their generous and public-spirited support. And a special thanks to Least Authority Enterprises [12], which employs several Tahoe-LAFS developers, for their continued support. HACK TAHOE-LAFS! If you can find a security flaw in Tahoe-LAFS which is serious enough that we feel compelled to warn our users and issue a fix, then we will award you with a customized t-shirts with your exploit printed on it and add you to the "Hack Tahoe-LAFS Hall Of Fame" [13]. ACKNOWLEDGEMENTS This is the tenth release of Tahoe-LAFS to be created solely as a labor of love by volunteers. Thank you very much to the team of "hackers in the public interest" who make Tahoe-LAFS possible. Brian Warner on behalf of the Tahoe-LAFS team January 12, 2011 San Francisco, California, USA [#1654] https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1654 [1] https://tahoe-lafs.org/trac/tahoe-lafs/browser/NEWS.rst [2] https://tahoe-lafs.org/trac/tahoe-lafs/browser/docs/known_issues.rst [3] https://tahoe-lafs.org/trac/tahoe-lafs/wiki/RelatedProjects [4] https://tahoe-lafs.org/trac/tahoe-lafs/browser/COPYING.GPL [5] https://tahoe-lafs.org/trac/tahoe-lafs/browser/COPYING.TGPPL.rst [6] https://tahoe-lafs.org/trac/tahoe-lafs/browser/docs/quickstart.rst [7] https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev [8] https://tahoe-lafs.org/trac/tahoe-lafs/roadmap [9] https://tahoe-lafs.org/trac/tahoe-lafs/browser/CREDITS [10] https://tahoe-lafs.org/trac/tahoe-lafs/wiki/Dev [11] http://atlasnetworks.us/ [12] http://leastauthority.com/ [13] https://tahoe-lafs.org/hacktahoelafs/ _______________________________________________ tahoe-announce mailing list tahoe-announce at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-announce ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From egs at systems.cs.cornell.edu Thu Jan 12 14:29:49 2012 From: egs at systems.cs.cornell.edu (Emin Gun Sirer) Date: Thu, 12 Jan 2012 17:29:49 -0500 Subject: [p2p-hackers] P2P DNS-related web sites/blogs/discussion forums? Message-ID: I did some of the earliest work on a feasible peer-to-peer DNS called CoDoNs: http://www.cs.cornell.edu/people/egs/beehive/codons.php The project website describes the kind of system we envisioned as a "safety-net" for DNS. There are lots of good reasons for not fracturing the namespace. DNSSEC helps by providing a secure mapping from names to addresses, while CoDoNs helps by removing centralized bottlenecks to the distribution of DNSSEC-protected records. - egs On Wed, Jan 11, 2012 at 7:17 PM, Tony Arcieri wrote: > With the looming threat of SOPA, completely decentralized censorship-proof > P2P DNS systems are beginning to look pretty interesting. > > Namecoin is perhaps the most interesting to-date, but what other systems > are people working on? Are there people who are particularly enthusiastic > about this subject whose blogs I should be reading? Or other > sites/discussion forums which deal with this issue in particular? > > (And yes, I've heard of Zooko's Triangle ;) > > -- > Tony Arcieri > > > _______________________________________________ > p2p-hackers mailing list > p2p-hackers at lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers > > _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From mail at pasdrafting.com Thu Jan 12 05:03:57 2012 From: mail at pasdrafting.com (=?koi8-r?B?Iufr7iI=?=) Date: Fri, 12 Jan 2012 21:03:57 +0800 Subject: =?koi8-r?B?8NLJzcXOxc7JxSD65e3l7Pju7+fvIOvv5OXr8+E=?= Message-ID: <01ccd16d$b2e69c80$4c51733b@mail> Кому: ГЛАВНОМУ ИНЖЕНЕРУ Уважаемые коллеги! Напоминаем Вам, что с 30 по 31 января 2012 года в Санкт-Петербурге состоится КОНФЕРЕНЦИЯ по теме: З Е М Е Л Ь Н Ы Й К О Д Е К С в 2012 году. КАДАСТРОВЫЙ УЧЕТ и оформление прав на земельные участки. Предоставление земельных участков под застройку. За более подробной информацией обращайтесь по телефону: 8 812 642..O5 96 ************************************* Краткая программа мероприятия: ------ 1. Оформление прав на объекты недвижимости. Государственная регистрация сделок с земельными участками. 2. Обзор практики применения Федерального закона "О государственной регистрации прав на недвижимое имущество и сделок с ним". 3. Кадастровая деятельность по формированию земельных участков. 4. Категории земельных участков. 5. Перевод земельных участков из одной категории в другую. 6. Согласование местоположения границ земельных участков. Межевой план. 7. Кадастровые паспорта на жилое помещение, на нежилое помещение, на землю. 8. Регламент предоставления земельного участка в собственность. 9. Оформление прав на земельные участки под существующими линейно-кабельными сооружениями и под строительство линейных объектов. 10. Переход права собственности на здание, строение, сооружение, находящиеся на чужом земельном участке. 11. Предоставление земельных участков на инвестиционных условиях. 12. Перечень документов, представляемых для регистрации договора аренды земельного участка. С уважением, отдел обучения Иванова Валерия Юрьевна Тел. /812/ 642--O5__96 From unquotedq829 at returnity.com Thu Jan 12 05:52:43 2012 From: unquotedq829 at returnity.com (=?koi8-r?B?98nL1M/SydE=?=) Date: Thu, 12 Jan 2012 22:52:43 +0900 Subject: =?koi8-r?B?7sHbwSDSxcvMwc3BINLBws/UwcXUIQ==?= Message-ID: Предлагаем качественную доставку рекламы Базы адресов постоянно обновляются Очень гибкая система скидок постоянным клиентам до 50% При заказе 2х рассылок, 3я бесплатная; Подготовка макета бесплатно; Быстрый выход рассылки, по желанию день в день; Самый массовый охват целевой аудитории Пробив фильтров. Любые формы оплаты; Каждая рассылка перед отправкой тестируется; Москва от 2 тыс руб. Россия от 3000 руб. Страны СНГ от 2,5 тыс руб. Наши цены самые альтернативные, закажите у Нас и Вы будете удивлены качеством обслуживания. Формируем базы под каждое направление, продукт реализации. Фокусировка себя полностью оправдывает. тел: #8#964#7O2#З6#85 From eugen at leitl.org Fri Jan 13 04:15:57 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 13 Jan 2012 13:15:57 +0100 Subject: [p2p-hackers] P2P DNS-related web sites/blogs/discussion forums? Message-ID: <20120113121557.GQ21917@leitl.org> ----- Forwarded message from Emin Gun Sirer ----- From eugen at leitl.org Fri Jan 13 04:16:04 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 13 Jan 2012 13:16:04 +0100 Subject: [tahoe-announce] ANN: Tahoe-LAFS 1.9.1 Released! Message-ID: <20120113121604.GR21917@leitl.org> ----- Forwarded message from Brian Warner ----- From reincarnatedl47 at rbrides.com Fri Jan 13 05:26:15 2012 From: reincarnatedl47 at rbrides.com (=?koi8-r?B?5MzRIMLBzsvP19PLycgg09DFw8nBzMnT1M/X?=) Date: Fri, 13 Jan 2012 16:26:15 +0300 Subject: =?koi8-r?B?7s/X2cog2sHLz84g98HMwNTOz8fPINLFx9XMydLP18HOydE=?= Message-ID: ВНИМАНИЮ БАНКОВ, ФИНАНСОВЫХ, СТРАХОВЫХ КОМПАНИЙ - НОВЫЕ ИЗМЕНЕНИЯ ВСТУПИЛИ В СИЛУ Новое в системе валютного регулирования и валютного контроля Валютное регулирование (ЦБ РФ) 8 (499) 4453968 или +7 Московский код: 742-9198 31 Января 2012г. Лектор: начальник управления Департамента финансового Мониторинга и валютного контроля Банка России. 1. Система валютного регулирования и валютного контроля в Российской Федерации и валютный контроль уполномоченных банков. Федеральный закон "О валютном регулировании и валютном контроле" № 173-ФЗ (с изменениями и дополнениями, в том числе внесенными Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе"), императивные нормы. Регулирование порядка поведения валютных операций резидентами и нерезидентами, открытия и ведения резидентами счетов в банках, расположенных за пределами Российской Федерации. Режим счета, открытого за рубежом 2. ИЗМЕНЕНИЯ• Действие валютного законодательства в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе"? (не вступил в силу) и Федерального закона от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" 3. Порядок осуществления валютного контроля, установленный нормативными актами Банка России по валютному контролю. Инструкция Банка России № 117-И (с изменениями и дополнениями). Паспорта сделок, как документы валютного контроля. Проблемные вопросы оформления и ведения. Документы валютного контроля, учета и отчетности. Действия уполномоченных банков при оформлении и проведении валютных операций. Указание Банка России от 26.09.08 № 2080-У "О внесении изменений в Положение Банка России № 258-П". Основные сроки представления документов валютного контроля (с учетом изменений). Направление информации о правонарушениях и Положение ЦБ РФ от 20.07.2007 N 308-П. Указание Банка России "О формах учета по валютным операциям, осуществляемым резидентами, за исключением кредитных организаций и валютных бирж" №1950-У и его влияние на квалификацию правонарушений. Порядок открытия и ведения счетов резидентов за пределами территории РФ. Правила осуществления резидентами валютных операций за счет средств, находящихся на счетах за рубежом. Переводы резидентами средств на свои счета. 4. Положение Банка России от 29.12.2010 № 364-П “О порядке передачи уполномоченными банками и территориальными учреждениями Банка России в таможенные органы для выполнения ими функций агентов валютного контроля информации по паспортам сделок по внешнеторговым договорам (контрактам) в электронном виде”. Указание Банка России от 29.12.2012 № 2556-У “О внесении изменения в пункт 1.2 Положения Банка России от 1 июня 2004 года № 258-П“О порядке представления резидентами уполномоченным банкам подтверждающих документов и информации, связанных с проведением валютных операций с нерезидентами по внешнеторговым сделкам, и осуществления уполномоченными банками контроля за проведением валютных операци3. Указание Банка России от 29.12.2010 № 2557-У “О внесении изменений в Инструкцию Банка России от 15 июня 2004 года № 117-И “О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации при осуществлении валютных операций, порядке учета уполномоченными банками валютных операций и оформления паспортов сделок” 5. Регулирование порядка представления информации о нарушениях валютного законодательства. Положение ЦБ РФ от 20.07.2007 N 308-П И практика его применения (с учетом последних изменений). Постановление Правительства РФ от 24 февраля 2009 г. N 166 "О порядке представления органами и агентами валютного контроля в орган валютного контроля, уполномоченный Правительством Российской Федерации. Практика применения Положения Банка России №308-П на примере конкретных нарушений. 6. Валютное регулирование операций физических лиц. Операции физических лиц и валютный контроль уполномоченных банков. Нормы прямого действия Федерального закона № 173-ФЗ (в том числе заработная плата и командировочные расходы). Порядок осуществления переводов денежных средств физическими лицами из Российской Федерации и по территории Российской Федерации. "Близкородственные" переводы. Действие Инструкции Банка России № 136-И.в связи с внесением изменений и дополнений в Федеральный закон № 115-ФЗ "О противодействии легализации (отмыванию) доходов, полученных преступным путем и финансированию терроризма" Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" и в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе" 7. Ответственность за нарушение валютного законодательства. Федеральный Закон № 174-ФЗ. 8. Перспективы развития валютного регулирования и валютного контроля в Российской Федерации. Стоимость участия в семинаре 9970 рублей Информацию можно получить по телефонам: +7 (код Москвы) 7922122 : +7 499 - 4Ч5_40_95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7755 bytes Desc: not available URL: From marsh at extendedsubset.com Sat Jan 14 07:45:14 2012 From: marsh at extendedsubset.com (Marsh Ray) Date: Sat, 14 Jan 2012 09:45:14 -0600 Subject: [cryptography] Fwd: [TLS] Fwd: New Non-WG Mailing List: therightkey Message-ID: -------- Original Message -------- Subject: [TLS] Fwd: New Non-WG Mailing List: therightkey Date: Fri, 13 Jan 2012 18:26:18 +0000 From: Stephen Farrell To: saag at ietf.org , pkix , tls at ietf.org , dane FYI please sign up if interested but wait a few days to give folks a chance to sign up before starting in on discussion. Stephen & Sean. -------- Original Message -------- Subject: New Non-WG Mailing List: therightkey Date: Fri, 13 Jan 2012 10:23:58 -0800 (PST) From: IETF Secretariat To: IETF Announcement list CC: therightkey at ietf.org, turners at ieca.com, stephen.farrell at cs.tcd.ie A new IETF non-working group email list has been created. List address: therightkey at ietf.org Archive: http://www.ietf.org/mail-archive/web/therightkey/ To subscribe: https://www.ietf.org/mailman/listinfo/therightkey Purpose: A number of people are interested in discussing proposals that have been developed in response to recent attacks on the Internet security infrastructure, in particular those that affected sites using TLS and other protocols relying on PKI. This list is intended for discussion of those proposals and how they might result in potential work items for the IETF. One short-term outcome may be the holding of a non-wg-forming BoF at IETF-83. For additional information, please contact the list administrators. _______________________________________________ TLS mailing list TLS at ietf.org https://www.ietf.org/mailman/listinfo/tls _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From adg at crypto.lo.gy Sat Jan 14 03:38:52 2012 From: adg at crypto.lo.gy (Alfonso De Gregorio) Date: Sat, 14 Jan 2012 12:38:52 +0100 Subject: [cryptography] Gregory Perry's follow-up to the FBI OpenBSD / OCF backdoors thread (was: Fwd: [gsc] Fwd: OpenBSD IPSEC backdoor(s)) Message-ID: Back in December 2010, we discussed the OpenBSD IPSec backdoor allegations. Two days ago, Cryptome.org published the Gregory Perry's follow-up to the this story. FBI OpenBSD Backdoors and RSA Cipher Vulnerability http://cryptome.org/2012/01/0032.htm Cheers, -- alfonso blogs at http://Plaintext.crypto.lo.gy tweets @secYOUre _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From Arin.Mclear at fantasias.com Sun Jan 15 00:36:23 2012 From: Arin.Mclear at fantasias.com (Arin Mclear) Date: Sun, 15 Jan 2012 10:36:23 +0200 Subject: Do not desperate, we can help you. Message-ID: Tired of leaving your girl unsatisfied after a night? http://tinyu.me/TUcCd From mail at phoenixfilmdxb.com Sat Jan 14 22:58:44 2012 From: mail at phoenixfilmdxb.com (=?koi8-r?B?Iu/UxMXMIO/v8yI=?=) Date: Mon, 15 Jan 2012 12:28:44 +0530 Subject: =?koi8-r?B?7cXIwc7J2s3ZINfPxM/Qz8zY2s/Xwc7J0Q==?= Message-ID: <01ccd381$388e6600$d26acd75@mail> Куда: ОООС Кому: Ведущему инженеру Уважаемые коллеги! Доводим до Вашего сведения, что в период с 30 по 31 января 2012 года В Санкт-Петербурге пройдет КУРС ПОВЫШЕНИЯ КВАЛИФИКАЦИИ по теме: "ВОДНОЕ ЗАКОНОДАТЕЛЬСТВО В 2012 ГОДУ. Использование водных ресурсов и объектов". В рамках курса будут рассмотрены новации и противоречия водного законодательства и механизмы водопользования. Курс повышения квалификации ведут специалисты Росприроднадзора. По окончании выдается Удостоверение государственного образца о краткосрочном повышении квалификации. Дополнительная информация по участию доступна по запросу. С уважением, оргкомитет конференций Иванова Юлия Андреевна Тел.: (8I2) 642 96..I0 From shane at berwick-pa.com Sun Jan 15 01:57:59 2012 From: shane at berwick-pa.com (=?koi8-r?B?Iu/v7/Mi?=) Date: Mon, 15 Jan 2012 12:57:59 +0300 Subject: =?koi8-r?B?8NLJzcXOxc7JxSDXz8TOz8fPIMvPxMXL08E=?= Message-ID: <01ccd385$4e9e2580$026396d5@shane> Куда: ОООС Кому: Ведущему инженеру Уважаемые коллеги! Доводим до Вашего сведения, что в период с 30 по 31 января 2012 года В Санкт-Петербурге пройдет КУРС ПОВЫШЕНИЯ КВАЛИФИКАЦИИ по теме: "ВОДНОЕ ЗАКОНОДАТЕЛЬСТВО В 2012 ГОДУ. Использование водных ресурсов и объектов". В рамках курса будут рассмотрены новации и противоречия водного законодательства и механизмы водопользования. Курс повышения квалификации ведут специалисты Росприроднадзора. По окончании выдается Удостоверение государственного образца о краткосрочном повышении квалификации. Дополнительная информация по участию доступна по запросу. С уважением, оргкомитет конференций Иванова Юлия Андреевна Тел.: (8I2) 642 96 I0 From patlatrina at mtu-online.com Sun Jan 15 08:09:54 2012 From: patlatrina at mtu-online.com (IleanaOdelia) Date: Sun, 15 Jan 2012 17:09:54 +0100 Subject: U.S to U.S Shipping for ALL orders, Viagra 100mg x 100 Pills ONLY $139.95, No Prescription Required! Message-ID: <84d82m60f58-45435310-306b8i33@wbyyzfyes> VIAGRA 100mg - FREE U.S to U.S Shipping! U.S to U.S Shipping for ALL orders, No Prescription Required! Viagra 100mg x 100 Pills ONLY $139.95 - Best Quality and Low Prices! http://pharmacypillstech.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 682 bytes Desc: not available URL: From mail at peterwarren.ca Sun Jan 15 04:39:05 2012 From: mail at peterwarren.ca (=?koi8-r?B?IufMwdfO2cogyc7Wxc7F0iDv7+/zIg==?=) Date: Mon, 15 Jan 2012 18:09:05 +0530 Subject: =?koi8-r?B?9+/k7vnqIOvv5OXr8w==?= Message-ID: <01ccd3b0$c46bb680$86a0633b@mail> Куда: ОООС Кому: Ведущему инженеру Уважаемые коллеги! Доводим до Вашего сведения, что в период с 30 по 31 января 2012 года В Санкт-Петербурге пройдет КУРС ПОВЫШЕНИЯ КВАЛИФИКАЦИИ по теме: "ВОДНОЕ ЗАКОНОДАТЕЛЬСТВО В 2012 ГОДУ. Использование водных ресурсов и объектов". В рамках курса будут рассмотрены новации и противоречия водного законодательства и механизмы водопользования. Курс повышения квалификации ведут специалисты Росприроднадзора. По окончании выдается Удостоверение государственного образца о краткосрочном повышении квалификации. Дополнительная информация по участию доступна по запросу. С уважением, оргкомитет конференций Иванова Юлия Андреевна Тел.: (8I2) 642.96 I0 From otrdisable at sogeasoft.com Sun Jan 15 03:41:49 2012 From: otrdisable at sogeasoft.com (=?koi8-r?B?Iu/v7/Mi?=) Date: Mon, 15 Jan 2012 19:41:49 +0800 Subject: =?koi8-r?B?8NLJzcXOxc7JxSDXz8TOz8fPIMvPxMXL08E=?= Message-ID: <01ccd3bd$b8d2bc80$ccabf63c@otrdisable> Куда: ОООС Кому: Ведущему инженеру Уважаемые коллеги! Доводим до Вашего сведения, что в период с 30 по 31 января 2012 года В Санкт-Петербурге пройдет КУРС ПОВЫШЕНИЯ КВАЛИФИКАЦИИ по теме: "ВОДНОЕ ЗАКОНОДАТЕЛЬСТВО В 2012 ГОДУ. Использование водных ресурсов и объектов". В рамках курса будут рассмотрены новации и противоречия водного законодательства и механизмы водопользования. Курс повышения квалификации ведут специалисты Росприроднадзора. По окончании выдается Удостоверение государственного образца о краткосрочном повышении квалификации. Дополнительная информация по участию доступна по запросу. С уважением, оргкомитет конференций Иванова Юлия Андреевна Тел.: (8I2) 642-96 I0 From mortgages at clickability.com Sun Jan 15 22:48:14 2012 From: mortgages at clickability.com (=?koi8-r?B?IvzMxcvU0s/OztnFINTP0sfJIg==?=) Date: Mon, 15 Jan 2012 22:48:14 -0800 Subject: =?koi8-r?B?58/T1cTB0tPU18XOztnKINrBy8HaINcgMjAxMiDHz8TV?= Message-ID: <01ccd3d7$c39a4b00$5ad4c875@mortgages> Уважаемые коллеги! Информируем Вас о проведении конференции, посвященной последним изменениям в правовом механизме закупок товаров и услуг для государственных и муниципальных нужд: КОНФЕРЕНЦИЯ: Э Л Е К Т Р О Н Н Ы Е Т О Р Г И. Федеральная контрактная система. Сложные вопросы в практике применения конкурентных и неконкурентных торгов. ВРЕМЯ И МЕСТО: 13 февраля 2012 года, Санкт-Петербург Преимущество данного мероприятия √ практический аспект предоставляемой информации, которая имеет важное значение для руководителей компаний, специалистов тендерных отделов, отделов продаж и маркетинга, юридических отделов, бухгалтеров организаций-поставщиков, а также руководителей и специалистов в сфере государственных закупок. По вопросам участия обращайтесь в оргкомитет: 8 812 6Ч2__Ч7__53 Конференцию ведут сертифицированные специалисты по конкурентным торгам. С уважением, руководитель оргкомитета конференции Иванова Татьяна Викторовна Тел.: (812) 6Ч2.Ч7...53 From oejustified at illumeonline.com Mon Jan 16 00:16:18 2012 From: oejustified at illumeonline.com (=?koi8-r?B?IuvV0tMgIufv8/rh6+H6IDIwMTIiIg==?=) Date: Tue, 16 Jan 2012 13:46:18 +0530 Subject: =?koi8-r?B?7yDSwdrNxd3FzsnJINrBy8Haz9cgzsEg0M/T1MHXy8kg1M/XwdLP1w==?= Message-ID: <01ccd455$38f83100$a480ee7b@oejustified> Уважаемые коллеги! Информируем Вас о проведении конференции, посвященной последним изменениям в правовом механизме закупок товаров и услуг для государственных и муниципальных нужд: КОНФЕРЕНЦИЯ: Э Л Е К Т Р О Н Н Ы Е Т О Р Г И. Федеральная контрактная система. Сложные вопросы в практике применения конкурентных и неконкурентных торгов. ВРЕМЯ И МЕСТО: 13 февраля 2012 года, Санкт-Петербург Преимущество данного мероприятия √ практический аспект предоставляемой информации, которая имеет важное значение для руководителей компаний, специалистов тендерных отделов, отделов продаж и маркетинга, юридических отделов, бухгалтеров организаций-поставщиков, а также руководителей и специалистов в сфере государственных закупок. По вопросам участия обращайтесь в оргкомитет: 8 812 6Ч2 Ч7..53 Конференцию ведут сертифицированные специалисты по конкурентным торгам. С уважением, руководитель оргкомитета конференции Иванова Татьяна Викторовна Тел.: (812) 6Ч2 Ч7 53 From eugen at leitl.org Mon Jan 16 04:46:39 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 16 Jan 2012 13:46:39 +0100 Subject: [cryptography] Gregory Perry's follow-up to the FBI OpenBSD / OCF backdoors thread (was: Fwd: [gsc] Fwd: OpenBSD IPSEC backdoor(s)) Message-ID: <20120116124639.GR21917@leitl.org> ----- Forwarded message from Alfonso De Gregorio ----- From eugen at leitl.org Mon Jan 16 05:12:20 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 16 Jan 2012 14:12:20 +0100 Subject: [cryptography] Fwd: [TLS] Fwd: New Non-WG Mailing List: therightkey Message-ID: <20120116131220.GV21917@leitl.org> ----- Forwarded message from Marsh Ray ----- From takishaashlea at thehartford.com Mon Jan 16 11:08:04 2012 From: takishaashlea at thehartford.com (KatyMarchelle) Date: Mon, 16 Jan 2012 22:08:04 +0300 Subject: VIAGRA 100mg x 130 Pills $172, VISA ONLY Message-ID: <20p98e28e88-30331633-422z3k56@sjwikonum> VIAGRA 100mg x 130 Pills $172, VISA ONLY Buy VIAGRA (Sildenafil) 100mg or 50mg From Our Online Pharmacy - No Prescription Required Express Shipping To U.S - Secured Checkout - VISA ONLY. http://pills-med2012.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 665 bytes Desc: not available URL: From emekay at stanford.edu Tue Jan 17 10:09:47 2012 From: emekay at stanford.edu (Emad Mekay) Date: Tue, 17 Jan 2012 10:09:47 -0800 (PST) Subject: [liberationtech] Calling all Computer Wizards at Stanford Message-ID: My name is Emad Mekay. I am an Arab journalist here at Stanford as a Knight Journalism Fellow. I am looking for urgent technical help from volunteers, who believe in the right to information and transparency, to help us do some quick Website development on a Wikileaks project. America In Arabic News Agency, the project I am working on here, needs urgent help to set up a website where we could give free access to the public to translated Wikileaks documents related to Egypt and later on the rest of the Arab countries. We did some stories based on Wikileaks documents that revealed secrete meetings between some activist and pubic figures and U.S. officials. Some of them were getting U.S. government funding. They are now threatening us for revealing that relationship. We need the site up today or tomorrow. We are already using a private Wordpress site that needs some tweaking and help to make it look more professional and not amateurish. The features should include good protection, sending mails to readers, the option to pass-word protect stories and to later list the Wikileaks documents. We have put some stories out along with both the original leaked documents and the Arabic translation but were met with a campaign of intimidation in Egypt by very powerful people including from the wife of a former presidential candidate, a publisher, a presidential candidate and a member of the current parliament among others. Experience with wordpress would be great. Journalists in Egypt have been unable to make full use of the documents because of the intimidation campaign. Some suggested Wordpress but we are so busy with writing and translating and need someone to devote two or three hours or a total of 10 hours with the site as well. This is a time to help and push for greater transparency no matter what who the powerful people are. This is very very urgent and confidential. Emad -- Emad Mekay John S. Knight Journalism Fellow Knight Fellowship Department of Communication Stanford University _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From DObrien at cpj.org Tue Jan 17 09:47:33 2012 From: DObrien at cpj.org (Danny O'Brien) Date: Tue, 17 Jan 2012 12:47:33 -0500 Subject: [liberationtech] Safer submission of content to news organizations Message-ID: On Tue, Jan 17, 2012 at 11:39:36AM -0500, Martyn Williams wrote: > Hi to all on this list. I've been following discussions here for a while > but this is the first time I'm posting. > > I'm a Knight Journalism Fellow at Stanford this year, which means I have > a year off from reporting to follow projects that interest me and help > innovate in journalism in some way. > > One of my two projects is focused on the security of consumers who > supply content (text, photo or video) to news organizations. > > I see a lot of work being done on how citizens/activists/bloggers and > others can secure information on their end but I haven't seen much done > on the other end by the news organizations. Sometimes they offer little > more than an email address or Facebook page for submissions. > > So my project asks: If news organizations are to solicit content from > people on the ground (and there are no signs this will stop), what can > they do to make it safer for those submitting the information? > > Should they set up a dedicated server, rely on a cloud service, use a > certain type of encryption, base it on a particular technology, etc etc? > > The goal isn't anonymity like Wikileaks - that brings a heap of > editorial problems with it - but making it harder for tracking to link > person A with news organization B. It should also be practical to implement. > I spoke to CJR about this last week, including some of the failed attempts so far. I think it's much of a culture clash between traditional journalisms and comp.security environments. http://www.cjr.org/the_news_frontier/tell_me_a_secret.php?page=all&print=true Essentially, the problem you face is one of differing threat models. In traditional journalism, the idea is that you and your source would know each other's identities, but the journalist would be ethically bound (and legally protected) from revealing the whistleblower's name. Traditionally this hasn't required "anonymity". Your problem is that any networked connection is vulnerable to making that identification between the two users, journalist and whistleblower, unless you maintain absolute anonymity over the network, but provide some form of consistent attestation (ie, I don't know who you are, but you're the same person as I talked to last time). Any actual identity can be ascertained out of band. (I'm that guy you met that one time wearing a rose. We both know Bill's shoe size. etc) It's worth reading the original paper for OTR which covers some of these particular requirements in depth. http://www.cypherpunks.ca/otr/otr-wpes.pdf > It will ideally be based on open-source technologies that are freely > available and can be implemented by news organizations of any size. > > If successful, I hope to present this to news organizations, push for > its adoption, and raise awareness of the need for media groups to think > about the safety of those sending content. > > I welcome comments off list. If anyone has heard of or is working on > similar technology or has an interest in collaborating I'd love to hear > from you. > > -- > Martyn Williams > 2012 John S. Knight Journalism Fellow > Stanford University > Cell: 650-391-4868 > @martyn_williams > _______________________________________________ > liberationtech mailing list > liberationtech at lists.stanford.edu > > Should you need to change your subscription options, please go to: > > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" > > You will need the user name and password you receive from the list moderator in monthly reminders. > > Should you need immediate assistance, please contact the list moderator. > > Please don't forget to follow us on http://twitter.com/#!/Liberationtech -- Danny O'Brien Internet Advocacy Coordinator Committee to Protect Journalists +1 408 480 3412 _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jya at pipeline.com Tue Jan 17 10:58:16 2012 From: jya at pipeline.com (John Young) Date: Tue, 17 Jan 2012 13:58:16 -0500 Subject: [liberationtech] Safer submission of content to news organizations In-Reply-To: <20120117175222.GZ21917@leitl.org> Message-ID: O'Brien is right that no trustworthy anonymity is possible over a public network like the Internet due to the basic design of the Internet to track its use. At best there are varying degrees of trustworthiness such as Tor-like widgets, the semi-classified milnet and intelnets, somewhat isolated nets like BlackNet and Darknet, partially-hidden encrypted paths, kind of cloaked nets, ineptly-cloaked multi-level proxies and subterfuges, and more that proffer protection but suffer in all cases from limiting adjectives of partiality and depending upon outwitting a user and an opponent by preening, obscuritism black magic formulas, algorithmic daredevilry, superlative-slathered acronymic technology for quasi-concealed transmission beyond belief. This is not to say that the legacy means of shoe leather, deep throats, drops, brown packages, cranium crypto, homing pigeons, "unbreakable math," were any less porous or less subject to dreamy exaggeration, black bagging, bribes, sex stings, vanity and stupidity. What hope for noble journalism (not the same as cranky, cantakerous, paranoid, ill-paid journalists) remains, though, is the gullibility of sources to believe their risk is protected by journalistic ethics as good as those of lawyers, doctors, architects, bankers, officials and BFFs. "Sources" is an asymmetrical term of artifice not to be believed. STFU or publish yourself or be gulled by the allure of never-anonymous infame. "Liberationtech," too, smells of tech sting. From nicola.lisciotto at megs.ca Tue Jan 17 02:53:31 2012 From: nicola.lisciotto at megs.ca (=?koi8-r?B?IvfPxM7ZyiDLz8TFy9MgMjAxMiI=?=) Date: Wed, 17 Jan 2012 16:23:31 +0530 Subject: =?koi8-r?B?xMzRIMnO1sXOxdLBIO/v7/M=?= Message-ID: <01ccd534$59e38380$a861f275@nicola.lisciotto> Куда: ОООС Кому: Ведущему инженеру Уважаемые коллеги! Доводим до Вашего сведения, что в период с 30 по 31 января 2012 года В Санкт-Петербурге пройдет КУРС ПОВЫШЕНИЯ КВАЛИФИКАЦИИ по теме: КУРС: В О Д Н Ы Й К О Д Е К С В 2012 ГОДУ. Применение водного законодательства. МЕСТО И ВРЕМЯ: 30 - 31 января 2012 года, Санкт-Петербург. По вопросам участия обращайтесь в оргкомитет: 8 812 6Ч2..9Ч..59 Курс повышения квалификации посвящен новациям и противоречиям водного законодательства Российской Федерации. Курс ведут специалисты Росприроднадзора. По окончании выдается Удостоверение государственного образца о краткосрочном повышении квалификации. С уважением, оргкомитет конференций Титова Ольга Александровна Тел.: 8 812 6Ч2..9Ч..59 From eugen at leitl.org Tue Jan 17 09:52:22 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 17 Jan 2012 18:52:22 +0100 Subject: [liberationtech] Safer submission of content to news organizations Message-ID: <20120117175222.GZ21917@leitl.org> ----- Forwarded message from Danny O'Brien ----- From eugen at leitl.org Tue Jan 17 12:40:37 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 17 Jan 2012 21:40:37 +0100 Subject: [liberationtech] Calling all Computer Wizards at Stanford Message-ID: <20120117204037.GC21917@leitl.org> ----- Forwarded message from Emad Mekay ----- From tarantulaee73 at rileyguide.com Wed Jan 18 10:39:19 2012 From: tarantulaee73 at rileyguide.com (=?koi8-r?B?88jFzc/UxcjOycvB?=) Date: Wed, 18 Jan 2012 10:39:19 -0800 Subject: =?koi8-r?B?+sHKzdk6IMvByyDTz9rEwdTYIMzFx8nUyc3O1cAg08jFzdU/?= Message-ID: <776BB053BA8F4DB6AA4BF53E5FFCA967@acasa65bfd58b4> 30 Января 2012 г. ОФФШОРНЫЙ БИЗНЕС: О ЧЕМ МОЛЧАТ ДРУГИЕ 8 (499) 445З968 : +7 499 - ЧЧ5_ЧО_95 Программа: 1. Оффшорные, низконалоговые и престижные европейские юрисдикции: критерии выбора. * Сравнительная характеристика наиболее популярных оффшорных юрисдикций (Британские Виргинские острова, Белиз, Сейшелы, Панама и т.д.). * Оффшоры, Гонконг и Кипр в современном бизнесе. * Низконалоговые юрисдикции: преимущества по сравнению с "классическими" орами и Гонконгом. * Структура управления иностранными компаниями и доступа к банковскому счету. * Использование престижных юрисдикций: Швейцария, Люксембург, Нидерланды и т.д. – когда это обоснованно? * Соглашения об избежании двойного налогообложения – моменты, на которые нужно обратить внимание. * "Черные списки" ФАТФ, ОЭСР, Минфина, ЦБ РФ. 2. Кипр как сбалансированный инструмент налогового планирования. Практика использования кипрских компаний * Основные налоги на Кипре (ставки, порядок уплаты, освобождения): * налог на прибыль (Corporate Income Tax); * предварительный налог на прибыль (Preliminary Tax) и авансовые платежи (Installments); налог на оборону (Defence Contribution Tax); * НДС. * Проведение аудита и сдача отчетности. * Изменения в Соглашении об избежании двойного налогообложения между Кипром и РФ: * анализ каждой поправки и предпосылок к ним, сравнение с новой редакцией конвенции ОСЭР; * прогноз: последствия для российского бизнеса. 3. Схемы, применяемые в международном налоговом планировании. * Предварительный краткий обзор особенностей европейского законодательства * Внешнеторговые операции (экспорт/импорт) * схемы с использованием оффшоров и Гонконга; * схемы с использование английских партнерств LLP; * схемы с использованием Кипра и английской компании со статусом резидентства на Кипре. * агентские схемы (на примере английской LTD) и возможность использования прочих юрисдикций. * Эстонские, Датские, Нидерландские, Ирландские компании в торговых схемах. * Выплаты дивидендов и построение холдинговых структур с использованием Кипра * Финансирование через Кипр, Люксембург и Нидерланды (на примере займов и процентных выплат). * Правила тонкой капитализации и принцип недискриминации в схемах финансирования. Позиция судов. * (Суб)лицензионные договоры и выплаты роялти за использование прав интеллектуальной собственности. * Схемы владения недвижимостью через иностранные юридические лица. * Схемы, использования которых следует избегать 4. Конфиденциальность бизнеса: номинальные директора и акционеры, акции на предъявителя, трасты и фонды. * Номинальный сервис: * инструменты контроля номинальных директоров и номинальных акционеров; * лица, которым будут известны имена бенефициаров. * Могут ли налоговые органы РФ получить информацию о компании путем запроса в регистрирующие органы иностранного государства? * Акции на предъявителя: целесообразность применения. * Трасты/фонды как инструмент защиты активов и конфиденциальности. * "Подводные камни" при использовании номинального сервиса и трастов/фондов. 5. Открытие счетов на иностранные компании. * Какой иностранный банк выбрать? * Требования к держателям счетов: поиск наиболее лояльного банка. * Тарифы популярных кипрский и прибалтийских банков. * Рублевый счет в иностранном банке. Стоимость участия: 9000 рублей Информацию можно получить по телефонам: +7 Московский код: 7922I-22 \\\/// 8 (499) ЧЧ539.68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7343 bytes Desc: not available URL: From mikecarrothersnn at bollingerinsurance.com Wed Jan 18 04:48:51 2012 From: mikecarrothersnn at bollingerinsurance.com (=?koi8-r?B?Iu/v7/Mi?=) Date: Thu, 18 Jan 2012 14:48:51 +0200 Subject: =?koi8-r?B?98XE1d3FzdUg3MvPzM/H1Q==?= Message-ID: <01ccd5f0$4ac20b80$1bb7483e@mikecarrothersnn> Кому: Главному экологу Уважаемые коллеги! Информируем Вас о том, что в период с 20 - 21 февраля 2012 года в Санкт-Петербурге пройдет КОНФЕРЕНЦИЯ: Э К О Л О Г И Ч Е С К А Я Э К С П Е Р Т И З А П Р О Е К Т О В По вопросам участия обращайтесь в оргкомитет конференции: 8 812 6Ч2_98 62 Краткая программа конференции: 1. Правовая основа Государственной экологической экспертизы. 2. Государственная экологическая экспертиза проектов строительства (ГЭЭ). 3. Экологическая экспертиза проектов по организации особоохраняемых территорий. 4. Экологические требования законодательства Российской Федерации. 5. Федеральный закон и иные законодательные и нормативные акты об экологической экспертизе. 6. Оценка воздействия на окружающую среду (ОВОС) на стадии обосновании инвестиций в строительство. 7. Права и обязанности заказчика документации, подлежащей экологической экспертизе. 8. Ответственность за нарушение законодательства РФ об экологической экспертизе. -- С уважением, Федорова Валерия Николаевна оркомитет конференций тел.: (812) 6Ч2 98__62 From edrigram at edri.org Wed Jan 18 10:57:05 2012 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 18 Jan 2012 20:57:05 +0200 Subject: EDRi-gram newsletter - Number 10.1, 18 January 2012 Message-ID: ============================================================ EDRi-gram biweekly newsletter about digital civil rights in Europe Number 10.1, 18 January 2012 ============================================================ Contents ============================================================ EDRi supports protests against US blacklist legislation 1. What's Wrong with ACTA Week 2. The US pressure on Spain to censor the Internet has paid off 3. Belarus strongly censors the Internet 4. Commission confirms illegality of Data Retention Directive 5. Romanian Senate rejects the new data retention law 6. Finnish ISP started blocking The Pirate Bay 7. Dutch Internet providers forced to block The Pirate Bay 8. US continue pushing on EU Commission against Data Protection proposals 9. Researchers say smart meter technology is privacy intrusive 10.ENDitorial: Copyright vs Public Domain-copyright as a barrier to culture? 11. Recommended Action 12. Recommended Reading 13. Agenda 14. About ============================================================ EDRi supports protests against US blacklist legislation ============================================================ EDRi supports today's black-out campaign against SOPA and PIPA and endorses the positions of the human rights international community in criticizing the two draft normative acts from US. Human rights community speaks out on PROTECT IP Act (16.01.2012) https://www.accessnow.org/policy-activism/press-blog/human-rights-community-speaks-out-on-protect-ip-act Human rights community against SOPA (15.11.2011) http://www.edri.org/files/sopa_civilsociety_15Nov_2011.pdf More details on the blackout campaign https://www.eff.org/deeplinks/2012/01/january-18-internet-wide-protests-against-blacklist-legislation https://blacklist.eff.org/ http://sopastrike.com/ ============================================================ 1. What's Wrong with ACTA Week ============================================================ Since many politicians and citizens are not yet aware of ACTA's serious implications, EDRi has launched a "What's Wrong with ACTA Week". We have put together five one-page briefing documents which briefly summarise the most important issues: ACTA and its Impact on Fundamental Rights (16.01.2012) http://www.edri.org/files/EDRI_acta_series_1_20120116.pdf ACTA - Criminal Sanctions (17.01.2012) http://www.edri.org/files/EDRI_acta_series_2_20120117.pdf ACTA - Innovation and Competition (18.01.2012) http://www.edri.org/files/EDRI_acta_series_3_20120118.pdf ACTA and its Impact on the EU's International Relations (will be released on 19.01.2012) http://www.edri.org/ACTA_Week ACTA and its Safeguards (will be released on 20.01.2012) http://www.edri.org/ACTA_Week ============================================================ 2. The US pressure on Spain to censor the Internet has paid off ============================================================ The US has continued to pressure Spain since 2008 to adopt measures against users allegedly illegally downloading copyrighted music and movies from file-sharing networks. And now this pressure has paid off; the Spanish Congress approved at the end of 2011 the so-called Sinde law (Ley Sinde) which allows the closing down of websites deemed to illegally download copyrighted material. Wikileaks cables revealed in 2010 that the US pressured Spain to pass stronger copyright enforcement laws threatening to put Spain on their Special 301 Report (a watch list of countries with "bad" intellectual property policies), threat which they actually delivered. "We propose to tell the new government that Spain will appear on the Watch List if it does not do three things by October 2008. First, issue a (Government of Spain) announcement stating that Internet piracy is illegal, and that the copyright levy system does not compensate creators for copyrighted material acquired through peer-to-peer file sharing. Second, amend the 2006 "circular" that is widely interpreted in Spain as saying that peer-to-peer file sharing is legal. Third, announce that the GoS (Government of Spain) will adopt measures along the lines of the French and/or UK proposals aimed at curbing Internet piracy by the summer of 2009," says the text of the diplomatic cable announcing the pressure tactics revealed by WikiLeaks. The Sinde Law was promoted by Angeles Gonzalez-Sinde Reig, former head of the Spanish Academy of Cinematographic Arts & Sciences, when becoming Minister of Culture in 2009. Sinde Law was giving a government committee the power to blacklist Internet sites allegedly trafficking copyrighted files. The new legislation creates a government body, the Commission of the Intellectual Property which will have the power to evaluate sites and force Internet service providers to block, within ten days, the sites deemed to be trading in pirated material. The owners of the websites have three days to present arguments before the commission to justify their activities and after the commission has decided the removal of certain content, the ISPs have 24 hours to block the service or to remove the content, and the website owners have no access to appeal. If website owners don4t comply voluntarily, a court will intervene to close down the website or to block the service, requiring to the ISPs to reveal the identity of the website owners. The US supported Sinde law, lobbying hard for her measure, even asking support from Spanish opposition parties, with the purpose to have Spain's position influence later on the European Union during Spain's EU presidency, as appeared in Wikileaks revealed cables. But, despite the government's expectations, the opposition to Sinde law was fierce, being strongly criticized by Internet groups and lawyers, which has led to the bill being stopped in the Parliament at the end of 2010. The government left the law for the incoming administration to handle after November 2011 and the new government approved very rapidly a modified version of the law where, for instance, judges will have to issue the actual blacklist order. It appears that this sudden decision was also pressured by the US. El Pais revealed on 12 December 2011 a letter of the US ambassador addressed to the Spanish officials complaining the law had not yet entered into force. "The government has unfortunately failed to finish the job for political reasons, to the detriment of the reputation and economy of Spain. I encourage the Government of Spain to implement the Sinde Law immediately to safeguard the reputation of Spain as an innovative country that does what it says it will, and as a country that breeds confidence," said the letter. The ambassador also reminded Spain of having already been once on the special 301 Report and warned of the risk of the country being further downgraded and returned to the "Priority Watch List" of "the worst global violators of intellectual property rights", which can lead to serious commercial sanctions. Spanish Internet users are already organizing a boycott, calling Internet users not to purchase or consume any artistic or intellectual works of authors, producers, agents, or managers who have explicitly expressed or participated lobbying for Sinde law. Victor Domingo Prieto, President of La Asociacisn de Internautas has stated that "when the Intellectual Property Commission take its first steps (of blocking sites), reports of the unconstitutionality of their decisions will occur immediately." How the US pressured Spain to adopt unpopular Web blocking law (5.01.2012) http://arstechnica.com/tech-policy/news/2012/01/how-the-us-convinced-spain-to-adopt-internet-censorship.ars US slammed Zapatero for not passing "Sinde" anti-piracy law (4.01.2012) http://www.elpais.com/articulo/english/US/slammed/Zapatero/for/not/passing/Sinde/anti-piracy/law/elpepueng/20120104elpeng_10/Ten Spain's SOPA Law: How It Works And Why It Won't (9.01.2012) http://spectrum.ieee.org/tech-talk/telecom/internet/spains-sopa-law-how-it-works-and-why-it-wont-work Anti-internet piracy law adopted by Spanish government (3.01.2012) http://www.bbc.co.uk/news/technology-16391727 The Government of PP approves the regulation of Sinde Law and eliminates the licence (only in Spanish, 30.12.2011) http://www.elmundo.es/elmundo/2011/12/30/navegante/1325253506.html Spain's Ley Sinde: New Revelations of U.S. Coercion (9.01.2012) https://www.eff.org/deeplinks/2012/01/spains-ley-sinde-new-revelations EDRi-gram: Spanish anti-piracy law approved by the Government (24.03.2011) http://www.edri.org/edrigram/number8.6/spain-govt-adopts-antipiracy-law ============================================================ 3. Belarus strongly censors the Internet ============================================================ 6 January 2012 saw the coming into force of the Belarusian law imposing even more restrictions on online free expression in a country that is already viewed as a dictatorship. Belarus is already listed as a country "under surveillance" in the Reporters Without Borders annual report on "Enemies of the Internet" and is ranked 154th out of 178 countries in the 2010 press freedom index. The law recently entered into force turns browsing foreign websites into an offence to be punished by fines up to about 100 Euro and makes ISPs liable for the actions of their users. Which means that, in carrying out its online activities, any business in the country will be able to use only the fully local Internet domains, excluding such sites, search engines or social networks as Wikipedia, Facebook, Twitter. Even Google may be in the same position as it hosts its website Google.by in US. The initial decree, issued in February 2010 by President Alyaksandr Lukashenko, already requires the compulsory registration of all Belarusian websites that must then be hosted in the country. Also, anyone going online in an Internet cafi or using a shared connection will have to identify themselves, and a record will be kept of everyone's surfing history for a year. Not only ISPs are liable for their users' activities online but home Internet subscribers are also considered liable for others who might share their connections with them. ISPs are expected to monitor foreign website use and report the findings to authorities just as the simple citizens sharing an Internet connection with others are expected to report any law infringement. A list of banned sites is issued by the State Inspection on Electronic Communications on the basis of decisions by several institutions such as the Operational and Analytical Centre and the criteria for the inclusion of sites on the list include content that is pornographic or advocates violence or "extremism", which, as proven several times, is vague enough to lead to abuse and overblocking. Thus, the authorities may draw up a list of banned sites the access to which must be blocked by ISPs at 24 hours' notice in official institutions and cultural and educational institutions. Websites such as news Charter97, Belaruspartisan, and the blog of the humorist Yauhen Lipkovich, which are critical to the government or the President, are already on the blacklist. After Lukashenko has taken all the measures to eliminate any opposition, the Internet has practically remained the only environment to apply pressure on the regime. A Facebook group "Wanted criminals in civilian clothes", blogs and Posobniki.com all helped in exposing the regime's crimes and abuses. This made the Internet a target for the government, hence the present restrictive legislation. Belarus Bans Browsing of All Foreign Websites (3.01.2012) http://torrentfreak.com/belarus-bans-browsing-of-all-foreign-websites-120103/ Belarus authorities turn up the heat on the Internet (6.01.2012) http://en.rsf.org/belarus-belarus-authorities-turn-up-the-06-01-2012,41634.html Internet in Belarus, November 2011 (4.01.2012) http://e-belarus.org/news/201201041.html In Belarus, the freedom of the internet is at stake (6.01.2012) http://www.indexoncensorship.org/2012/01/belarus-internet-freedom-mike-harris/ ============================================================ 4. Commission confirms illegality of Data Retention Directive ============================================================ The EDRi-member Quintessenz - Austria has published a leak of an internal paper from the Commission intended to inform DAPIX, the Council's working party on information exchange and data protection, of the results of the Commission's consultation in April 2011 on the reform of the Data Retention Directive (DRD). It raises a number of issues with the Directive that the Commission wishes to tackle in order to cast it in a better light. The Commission admits that "there is a continued perception that there is little evidence at an EU and national level on the value of data retention in terms of public security and criminal justice, nor of what alternatives have been considered". It then asks at the end of the document: "What are the most effective ways of demonstrating value of data retention in general and of the DRD itself?" The origin of the "perception" that there is little evidence existing as to the value of the Directive is shown by the Commission's statement that only 11 of 27 Member States have provided data that could be used in order to highlight the added value of the Directive. Legal uncertainties that have been overlooked during the drafting process of the Directive are now posing a certain number of problems for the Commission. In the document, the Commission acknowledges for example the lack of a "logical separation between data stored and then accessed for a) business purposes, b) for purposes of combating 'serious crime' and c) for purposes other than combating serious crime" and the lack of a monitoring system showing "data (that) would not have been available to law enforcement without mandatory retention". The question of distinguishing between data retained for business purposes from data retained under the Directive is asked but left unanswered. The Commission also states that unclear definitions in the DRD have led to service providers storing instant messaging, chats and filesharing details even though these types of data are outside the scope of the Directive. It is often unclear to businesses in the telecommunications sector which data should be stored. Law enforcement agencies have apparently lobbied the Commission for a "technological neutrality" of the Directive to ensure a broad "ability to know who communicated with whom, when, where and how" - despite, it appears, being able to justify the retention of the data already being stored. Moreover, the paper repeats EDRi's concern regarding the "serious crime" limitation, which is not defined at EU level or in many Member States, and regarding the lack of a clear limitation of the purposes for which data is being retained. It states that there have been many demands for the extension of the use of data to copyright infringements or for such vaguely defined offenses as "hacking" and "urgent cases". According to the document, the Directive has also led to an unclear situation for citizens due the absence of a procedure for reporting and redressing data breaches and the absence of a monitoring system to know who actually accessed the data. Furthermore, the Commission states that, depending on the country, there is no or only a very low reimbursement of storage costs, which leads to a distortion of the free market. Especially the costs for small businesses are being rated as "disproportionately high". This also means that countries having implemented the Directive will have an economic interest and will pressure other countries into implementing data retention. In order to justify limitations of fundamental rights, such as the right to privacy and to data protection, measures must be necessary and proportionate. The leaked document however shows that the Commission can neither prove necessity nor proportionality of the Data Retention Directive - but still wants to keep the Directive. Despite unending implementation problems and proven failure of the current Directive, the Commission is maintaining its pressure on Member States that have not already implemented the Directive, to do so. The Commission is currently examining the possibility amending the Directive and is conducting a study on data preservation ("quick freeze") which is due for May 2012. Leaked Commission document (15.12.2011) http://quintessenz.org/d/000100011699 Commission's DRD implementation report (18.04.2011) http://ec.europa.eu/commission_2010-2014/malmstrom/archive/20110418_data_retention_evaluation_en.pdf EDRi's Shadow implementation report (17.04.2011) http://www.edri.org/files/shadow_drd_report_110417.pdf (Contribution by Kirsten Fiedler - EDRi) ============================================================ 5. Romanian Senate rejects the new data retention law ============================================================ Following the pressure of the European Commission to the Romanian authorities to implement the data retention directive and despite the decision of the Constitutional Court from 2009 against the data retention law, a new draft law has emerged, but it was rejected by the Senate at the end of 2011. The Romanian Ministry of Communications and Information Society (MCSI) has tried to have the new draft promoted as a Government proposal, but has failed to do so for unclear reasons. The Romanian Data Protection Authority has decided not to endorse the new draft law, as the article related to the security institutions to the retain data is still vague. The text is in fact similar to the old law that was declared unconstitutional and even worse in some specific cases, such as for example the judicial approval to have access to the retained data that is unclear in the new proposal. However, the MCSI rejected claims of the civil society that the new law was still unconstitutional and decided to go further with the same draft. In the end, the Minister promoted the law as his own initiative in the Chamber of Deputies (because he is also a deputy) together with a Party colleague. The law was sent for debates to the Senate, where it received a unusual point of view from the Government that refused to endorse the law and said that the Parliament should decide its fate, because of the conflict between the Constitutional Court decision and the EU data retention directive. The law was quickly debated by the Senate, after the Legal and Human Rights Committees decided to suggest the rejection the law, as the content is similar to the one already declared unconstitutional. On 21 December 2011, the Senate decided unanimously that the law should be rejected. However, the vote in the Senate is only consultative for this law and the decisive vote will be taken by the Chamber of Deputies, that will start discussing the law in its Commissions starting with February 2012. Data retention: Commission requests Germany and Romania fully transpose EU rules (27.10.2011) http://europa.eu/rapid/pressReleasesAction.do?reference=IP/11/1248&type=HTML Romanian DPA does not endorse the data retention law (only in Romanian, 29.08.2011) http://dataprotection.ro/?page=stire_07092011&lang=ro The Romanian Government refuses to adopt a point of view on data retention law (only in Romanian, 19.12.2011) http://apti.ro/retinerea-datelor-Guvernul-refuza-sa-isi-asume-un-punct-de-vedere Report of the Senate Legal Committee to reject the data retention law (only in Romanian, 20.12.2011) http://www.apti.ro/sites/default/files/Raport%20respingere%20Senat%2020%20dec%202011.pdf. The Senate rejects the data retention law (only in Romanian, 22.12.2011) http://legi-internet.ro/blogs/index.php/2011/12/22/legea-pastrarii-datelor-de-trafic-a-fost-respinsa-de-senat EDRi-gram: New draft law for data retention in Romania (29.06.2011) http://www.edri.org/edrigram/number9.13/new-draft-data-retention-romania ============================================================ 6. Finnish ISP started blocking The Pirate Bay ============================================================ On 9 January 2012, the Helsinki Enforcement authority obligated Finnish ISP Elisa to execute the court ruling that it had to block access to The Pirate Bay from its network. This is the latest phase in an ongoing legal fight between the Copyright Information and Anti-Piracy Centre (CIAPC) and Elisa. Acting on behalf of IFPI Finland, CIAPC brought the case to court in May 2011, and in October the court ruled that Elisa must block access to The Pirate Bay. Elisa has appealed the ruling to a higher court. The court ruling from October did not specify the domain names and IP addresses that Elisa should block. The Enforcement authority gave Elisa a list of domain names compiled by the CIAPC, including not only domains of The Pirate Bay itself but various translations of the name such as depiraatbaai.be. One of the listed domain names was piraattilahti.fi ("pirate bay" in Finnish), a website owned by a private Finnish person. The site did not contain any links to or material from The Pirate Bay, but instead hosted a campaign page against SOPA (Stop Online Piracy Act), the controversial US draft bill. The owner of the site changed piraattilahti.fi to point to Effi's web server, with the result that people outside Elisa's network saw Effi's web pages and those inside Elisa got nothing when they entered piraattilahti.fi in their browser. The site was later removed from the blocking list. Another initially blocked site was piraatti.fi, which is in fact an anti-piracy propaganda site. It was unblocked a few days later. After the enforcement of the block, the website of CIAPC was flooded offline and CIAPC claimed to have received a bomb threat. The enforcement raises some questions. First of all, how can a private organisation be empowered to manage a list of websites that people should not be allowed to access - apparently without checking at all what the site actually contains. Furthermore, why such a hurry to enforce a court decision that has been appealed, especially as there is a fresh precedent from the European Court of Justice that basically disallows the Finnish lower court decision. Elisa's press release (9.01.2012, updated 11.01.2012) http://www.elisa.fi/ir/pressi/index.cfm?t=100&o=5130&did=17728 EDRi-gram 9.21: Finnish ISP ordered to block The Pirate Bay (2.11.2011) http://www.edri.org/edrigram/number9.21/finnish-isp-block-piratebay European Court of Justice press release (24.10.2011) http://curia.europa.eu/jcms/upload/docs/application/pdf/2011-11/cp110126en.pdf (Contribution by Timo Karjalainen, EDRi member Electronic Frontier Finland - Effi) ============================================================ 7. Dutch Internet providers forced to block The Pirate Bay ============================================================ In its judgement of 11 January 2012, the Court of The Hague granted Dutch copyright enforcement organisation Brein's request to order Dutch internet providers Ziggo and XS4ALL to block access to The Pirate Bay. This is the opposite of an earlier ruling given in summary proceedings where no such order was given. Ziggo and XS4all will appeal the ruling. The Court of The Hague held that Ziggo and XS4ALL have to block access to the domain names and IP-addresses of The Pirate Bay. In the future, Brein may also give the providers additional lists to block. The Court came to this conclusion based on additional evidence provided by Brein that a large number of Ziggo and XS4ALL subscribers used The Pirate Bay to download content without authorisation. The Court based its order on article 26d of the Dutch Copyright Act and article 15e of the Dutch Neighbouring Rights Act. These articles, which are based on Directive 2001/29/EC on the harmonisation of certain aspects of copyright and related rights in the information society, give the judiciary the right to order intermediaries whose services are used by third parties to infringe copyrights, to discontinue the services that are used for these infringing activities. The Court reasons that, based on the ECJ's explanation of Article 11 of the IP Enforcement Directive 2004/48/EC in the L'Oreal/Ebay case, this order can also be extended to prevent future infringements. Therefore, the order does not have to be focussed on a specific infringement, but its scope can be broader, according to the Court. Referring to the judgement of the European Court of Justice (ECJ) in Sabam/Scarlet case, the Court states that a right balance has to be struck between fundamental rights and the protection of intellectual property. This balance has to be determined by the principles of subsidiarity and proportionality. According to the Court, blocking The Pirate Bay adheres to these two principles for a number of reasons. First, according to the Court, only a marginal amount of legal content can be found on The Pirate Bay. The legal content that is provided can also be retrieved with other means and therefore there is not a violation of article 10 ECHR. Second, the Court notes that direct proceedings against The Pirate Bay and release groups have proven to be futile. Therefore it is appropriate to address intermediaries. Third, blocking The Pirate Bay would essentially substantiate an earlier order of the Court of Amsterdam that already ordered the administrators of The Pirate Bay to disable their website, including legal content. Fourth, the Court does not consider a DNS and IP blockade to constitute active surveillance, as it is directed at one website. It does not involve deep packet inspection to prevent any possible infringements from happening and it is therefore not forbidden by article 15 sub 1 of the E-Commerce Directive 2000/31/EC and the Sabam/Scarlet ruling of the ECJ. As can be seen by the many contradicting rulings given by various Courts in Europe, court cases regarding the blocking of websites do not always lead to the same result. For example, on 9 January 2012, the local Court of Helsinki in Finland ordered Elisa, one of the largest Internet Providers in Finland, to block access to The Pirate Bay for its customers. On the other hand, on the 31 August 2011, the Court of Cologne held that Internet Provider HanseNet could not be ordered to block access to a Russian website that facilitated copyright infringement. Considering these completely different outcomes across the European Union, it is remarkable that the Court of The Hague did not see reason to ask preliminary questions to the ECJ. Decision of the Court of The Hague (only in Dutch, 11.01.2012) http://zoeken.rechtspraak.nl/detailpage.aspx?ljn=BV0549 Court of Cologne's decisions on Hansenet (only in German, 31.08.2011) http://www.justiz.nrw.de/nrwe/lgs/koeln/lg_koeln/j2011/28_O_362_10_Urteil_20110831.html EDRi-gram: Dutch Internet Provider Not Obliged To Block The Pirate Bay (28.07.2010) http://www.edri.org/edrigram/number8.15/dutch-isps-not-blocking-piratebay/ Blocking The Pirate Bay: will the Dutch court ruling hold in appeal? (18.01.2012) http://kluwercopyrightblog.com/2012/01/18/blocking-the-pirate-bay-will-the-dutch-court-ruling-hold-in-appeal/ (Contribution by Arjan de Jong - volunteer Bits of Freedom) ============================================================ 8. US continue pushing on EU Commission against Data Protection proposals ============================================================ The US Department of Commerce has circulated a second informal note with comments on the proposals for a data protection regulation and a directive on data protection in the field of law enforcement. This time, its criticism focuses on the following concerns: the regulation could hinder commercial interoperability and be even counter-productive for consumer privacy protection, it could have negative impact on the freedom of speech and other human rights, on law enforcement cooperation, on cooperation between regulatory authorities and on civil litigation. The high-level interference with the internal processes of the European Commission by the United States is quite extraordinary. Undoubtedly, a degree of concern can legitimately be expressed as the final decisions are being made on a piece of legislation which has international significance. However, this amount of interference, before either the European Parliament or Council (the Member States) have been able to have their say, implies a significant level of disrespect for the institutions of the Union and their ability to resolve any issues with what is, after all, the first draft in a legislative process which will last two to three years. According to the DoC's informal note, the Safe Harbor Agreement enabled transfer of personal data and is a "vital component of transatlantic trade". The DoC thereby completely ignores the findings of several external evaluations on the EU-US Safe Harbor Privacy Principles which attacked the agreement in terms of compliance and enforcement and is today widely considered to be entirely without credibility. The note praises Article 40 and its provisions regarding Binding Corporate Rules (BCR) as a legal basis for transfers of personal data to third countries but asks for more detail regarding the type of verification data protection authorities will consider sufficient. The document also states that codes of conduct (of the kind that have failed to develop in the existing Directive, but are nonetheless envisaged in the USA) can lead to an increase in interoperability and enhanced consumer protection and suggests that the EU looks into mechanisms to convert codes of conduct into BCRs. However, the provision for explicit consent with a single standard is heavily criticized since, it is argued, if it is not simplified and meaningful, it could easily overburden individuals. The DoC states that asingle standard is ill-suited for institutions and types of commerce that offer financial products and services. The DoC then criticises the Regulation's specifications regarding "privacy by design" and the broad authority given to the EU Commission to set out the technical standards - without presenting any valid arguments against the proposed principle of privacy by design itself. The informal note also qualifies some provisions as being infeasible, since they would impose burdens on businesses without enhancing consumer protection, such as data breach notification and the right to be forgotten. In contrast to its first note from December 2011 the DoC now admits that the US itself has several federal laws regarding breach notification but repeats its criticism of the first informal note regarding the obligation to notify data subjects within 24 hours arguing that the period is "simply too short", that it could lead to "massive fines" for companies and to confusing "false alarms" for consumers. The draft Regulation is also considered to be inconsistent with the global nature of the Internet since it would assert jurisdiction over persons operating websites without a legal nexus with Europe (i.e. exactly what the US is proposing in its current draft proposals on intellectual property). According to the DoC, the term "directed to" is neither sufficiently defined in paragraph 15 nor does the limiting principle go far enough. Oddly enough, the "directed to residents of the US" provision of the planned Protect IP Act (PIPA) raises no similar concerns in the US. As mention above, the note qualifies the "right to be forgotten" as undermining freedom of expression, as technically impracticable and as ignoring the open and decentralised nature of the Internet. The DoC expresses concern that exceptions in article 80 are narrower than the freedom of expression, that the "right" to be forgotten is not an internationally recognised right and protected expression will be deleted. However, the DoC seems to ignore that this article is based on an already existing right as set out by the EU (1995/46/EC, article 12 b) and that these concerns can easily be addressed by clarification of the wording of the current draft of the Regulation. Of course, the DoC is also very concerned about the draft Police and Criminal Justice Data Protection Directive saying that it would limit information and evidence sharing to "the minimum necessary" - which is a useful, albeit unintentional, confirmation that the proposal is legal under the Charter of Fundamental Rights. They are also unhappy about the fact that other legal information-sharing instruments with EU Member States would probably not suffice under the proposed Directive since existing instruments must meet specific and "problematic" privacy protection requirements. Moreover, the DoC fears that the "strong system of privacy protection" existing in the United States (which, incidentally, does not cover EU citizens) would disappear since it would be forced to adopt the European style of data protection. The DoC criticises the data transfer provisions of the draft Regulation (art. 37-41) arguing that they would undermine cooperation and data sharing processes among regulatory authorities in the US, the EU and the EU's Member States based on cooperative arrangements. The document then specifically targets article 42 stating that its restrictions could block or delay access to information held by US firms and have an impact on investigations of EU firms and citizens. Bizarrely, the US DoC is worried about regulating a currently unregulated situation which would permit data exchange in the absence of a legal framework and legal safeguards. According to the note, article 42 might even affect the US-registered companies located in the EU and their ability to conduct business in the US. It is noteworthy that the US currently uses instruments such as the Foreign Intelligence Surveillance Act to retrieve data on foreign individuals' political activities, who may have no contact whatsoever with the USA, via companies with US offices. This legal vacuum would be addressed by article 42. An unusually high number of Commission services issued negative internal opinions to the draft legislation, thus delaying the inter-service process (see 2 opinions below). This was partly as a result of this significant lobbying campaign (including high-level phone calls to top level staff in the European Commission) against the leaked draft proposal for a Regulation by the United States Department of Commerce and the Federal Trade Commission, the official draft proposal of which is now expected to be published in February/March. First informal note circulated by the US (21.12.2011) http://edri.org/US-DPR Second informal note by the US (16.01.2012) http://www.edri.org/files/US_lobbying16012012_0000.pdf Opinion DG Trade (21.12.2011) http://www.edri.org/files/21122011_DGTradeOpinion.pdf Opinion DG Infso (21.12.2011) http://www.edri.org/files/120112_DGINFSO_negativereply.pdf Chris Connolly (Galexia), US Safe Harbor - Fact or Fiction?, Privacy Laws and Business International, issue 96, December 2008: http://www.galexia.com/public/research/assets/safe_harbor_fact_or_fiction_2008/ The implementation of Commission Decision 520/2000/EC on the adequate protection of personal data provided by the Safe Harbour privacy Principles and related Frequently Asked Questions issued by the US Department of Commerce SEC(2004)1323 http://ec.europa.eu/justice/policies/privacy/docs/adequacy/sec-2004-1323_en.pdf (Contribution by Kirsten Fiedler - EDRi) ============================================================ 9. Researchers say smart meter technology is privacy intrusive ============================================================ Two German researchers presented a talk entitled "Smart Hacking for Privacy" at the 28th Chaos Computing Congress that took place between 27 and 30 December 2011, on the privacy implications of "smart" electricity meters. These devices, installed in homes, collect information to determine the power consumption. The researchers had signed up with Discovergy, one of the independent companies providing such smart meters, to check out how secure the devices were and what information could be obtained from the data gathered by them. According to Discovergy's website, the web interface accessing the consumption data used HTTPS to protect the data and the data sent back to Discovergy was encrypted and signed in order to prevent forged data. The website also stated these facts had been confirmed by independent experts. Following the presentation of the researchers on 30 December, these statements disappeared from the company's website and as it came out, the SSL certificate of the site was misconfigured and presented an invalid certificate warning, then proceeded to redirect them to an HTTP URL where the data and password were transmitted in clear text across the internet. The researchers found out the traffic was not encrypted and signed and, therefore, easy to intercept. Thus, they were able to demonstrate that data from the entire life of the device was stored on Discovergy's servers. One of the main concerns was that the smart meters were monitoring the power usage in two-second intervals which implies the devices were able to discern very fine modifications in power consumptions such as differences based on the brightness levels displayed for different scenes in TV shows and movies. The researchers believe that two seconds measurements are unnecessary for the stated goals of the smart meter companies and too privacy intrusive as the data obtained could be used to establish very fine details. "Unfortunately, smart meters are able to become surveillance devices that monitor the behaviour of the customers leading to unprecedented invasions of consumer privacy. High-resolution energy consumption data is transmitted to the utility company in principle allowing intrusive identification and monitoring of equipment within consumers' homes (e.g., TV set, refrigerator, toaster, and oven)", said the researchers in a statement prior to the presentation. Nikolaus Starzacher, CEO of Discovergy, explained that one of the reasons for using the two second polling interval was to provide services such as notifying a customer that he forgot an iron or another house appliance on, when leaving the house. Also, the researchers claimed that they had been able to send false details about their energy consumption back over the unencrypted Discovergy network meaning that consumers might be able to "potentially fake the amount of consumed power being billed". In the opinion of Ross Anderson, professor in security engineering at the University of Cambridge Computer Laboratory, EU and UK plans to install smart meter are "set to become another public sector IT disaster". In a joint paper with his fellow academic Shailendra Fuloria, Anderson warned over the threat of the vulnerability of the smart meters which might allow hackers to break into a "head-end" hub where smart metering data are collated and thus be able to even cut the supply of energy across "tens of millions of households". "The introduction of hundreds of millions of these meters in North America and Europe over the next ten years, each containing a remotely commanded off switch, remote software upgrade and complex functionality, creates a shocking vulnerability," Anderson said adding: "An attacker who takes over the control facility or who takes over the meters directly could create widespread blackouts; a software bug could do the same." In his opinion, regulators have started to be aware of the issue and possible solutions under discussion might be "shared control, as used in nuclear command and control; backup keys as used in Microsoft Windows; rate-limiting mechanisms to bound the scale of an attack; and local-override features to mitigate its effects." Smart meter hacking can disclose which TV shows and movies you watch (8.01.2012) http://nakedsecurity.sophos.com/2012/01/08/28c3-smart-meter-hacking-can-disclose-which-tv-shows-and-movies-you-watch/ Smart Hacking for Privacy (16.01.2012) http://www.youtube.com/28c3#p/u/54/YYe4SwQn2GE Smart meter technology is privacy intrusive, researchers claim (11.01.2012) http://www.out-law.com/en/articles/2012/january-/smart-meter-technology-is-privacy-intrusive-researchers-claim/ ============================================================ 10.ENDitorial: Copyright vs Public Domain-copyright as a barrier to culture? ============================================================ "The book, as a book, belongs to the author, but as thought it belongs -- the word is not too big -- to the human species. Any intelligent being has a right to it. If one of the two rights, that of the writer and that of the human spirit, must be sacrificed, then certainly it should be the right of the writer, as the public interest is our sole preoccupation, and everyone, I declare, should come before us" - Victor Hugo, Opening speech of the International Literature Congress of 1878 For many of us, New Year means good resolutions for some even new beginnings but it also means new works of art in the public domain. This year - and just to name a few - James Joyce, Maurice Leblanc, Virginia Woolf, Robert Delaunay, Sherwood Anderson, Henri Bergson have entered the public domain. To be in the public domain: what does it concretely mean? Public domain works are part of a citizens' cultural heritage, therefore their use is not restricted - as they would be when they are protected by copyright. Practically, it means that people can freely copy, translate, adapt or use the works of the artists, writers or musicians. Entering the public domain leads to a wider, access to cultural content. The public domain promotes education and knowledge. It is a factor of new and further creation, knowledge and innovation. Some of these elements are of great importance and further enhance access to culture. Once a work has entered the public domain, new editions and republications flourish, giving the opportunity to a larger audience to access society's cultural heritage. 2010 turned into a year of Freud. When Sigmund Freud's works finally entered the public domain, publishers rushed to publish, commissioned new translations and subsequently sold new versions of his books. All in all, public domain enables a wider and higher circulation of artistic, literary, dramatic, musical works, encouraging access for all. And last but not least, public domain also has an economic value. Some publishers indeed have specialised their business model on publishing works for which copyright protection has expired. This is true not only for the book publishers but also in the music industry. A crucial question therefore arises: If public domain is so important and so beneficial, why do we have to wait for so long after the artist's, painter's or writer's death to have works of art finally in the public domain? The original idea behind copyright monopolies was to favour creativity and to enable artists, writers and authors to continue to create. This would be a great and praiseworthy purpose if only it had not have been turned away from its primary goals. Copyright is currently the rule and public domain is the exception. The content industry continually asks for, and receives ever-longer copyright terms, and consequently the public domain continually decreases. Just recently and after a strong lobby from the music industry, the European Union decided to extend copyright for performers and producers from 50 to 70 years. Turning back on Victor Hugo's idea of his work as a shared good, some in the rightsholders lobby are pushing the limits of protection, and moving cultural goods out of the reach of society. They argue that it serves the economy, helps to keep jobs and improves the investment in new talent. However what they miss here is that access to the works of the artists they claim to represent is restricted to the public, to other publishers or other record companies. In the end, this only serves the majors and the most famous artists, who are least in need of this "protection". Finally, while these dominant industries claim that term extension is needed in order to invest in new talent, the policy of ever longer copyright extension does not create any incentive to do so. In the absence of such incentive, major record companies will continue to invest only in performers that will bring in long-term of revenues, so alternative and less popular musicians will be left out, undermining cultural diversity. Nowadays, the protection of works subject to copyright is based not on their date of publication but on the death of the authors, and the life expectancy has improved, so the public domain is proportionally diminishing. If copyright is to incentivise creation, what is the logic behind remunerating artists for ever-longer periods after their deaths? The entire logic behind the copyright protection has been subverted. Cultural works are being locked away from the public and a greater barrier is being built between the public and their culture. If copyright is meant to defend culture and creation, it should not be used to create barriers between citizens and their heritage. Freud in the public domain (only in French, 27.01.2010) http://www.lexpress.fr/culture/livre/freud-dans-le-domaine-public_844789.html EDRi-gram: New rules on term of protection of music recordings (21.09.2011) http://edri.org/edrigram/number9.18/term-extension-music-copyright The progressive weakening of the public domain (only in French, 2.01.2012) http://www.numerama.com/magazine/21129-l-affaiblissement-progressif-du-domaine-public-en-un-schema.html Public domain calculator http://outofcopyright.eu/ (Contribution by Marie Humeau - EDRi) ============================================================ 11. Recommended Action ============================================================ 5th International Computers, Privacy & Data Protection Conference: "European Data Protection: Coming of Age" CPDP 2012 takes place during a significant stage of the revision of the EU legal framework on data protection, thus several panels will focus on the review and the latest legislative proposals. More than 20 panels will be organized on key issues such as geolocalization, e-identity and e-management, enforcement of copyright protection, surveillance in the workplace, accountability and communication of privacy. In addition, there will be workshops and special sessions on topics such as eDiscovery, privacy impact assessments and "privacy by design", smart metering and transborder data flows. Since 2012 was declared the European Year of Active Ageing, three sessions will be devoted to the theme of Ageing and New Technologies. 25-27 January 2012, Brussels, Belgium http://www.cpdpconferences.org/ Corporate Responsibility to Respect Human Rights A new European Commissions' project will produce 3 sector-specific guides on the Corporate Responsibility to Respect Human Rights.The choice regarding which three sectors will be the included in this project, based on suggestions by stakeholders, will be made by the Commission and announced in February 2012. Therefore, it is very important that you give your input in order to highlight the importance of defending human rights in the digital environment. All stakeholders are invited to submit their suggestions for the choice of sectors by emailing sectorguidance at ihrb.org by:6pm CET on 27 January 2012. http://www.ihrb.org/news/2012/new_project_to_develop_business_and_human_rights_guides_for_three_european_business_sectors.html ============================================================ 12. Recommended Reading ============================================================ German police officer uses federal Trojan to spy on daughter. Her friend then breaks into fathers PC and police server (9.01.2012) http://www.thelocal.de/national/20120109-39999.html http://www.spiegel.de/netzwelt/netzpolitik/0,1518,807820,00.html CMCS: Hungarian Media Laws in Europe: An Assessment of the Consistency of Hungary's Media Laws with European Practices and Norms (5.01.2012) https://cmcs.ceu.hu/news/2012-01-05/new-study-hungarian-media-laws-in-europe-an-assessment-of-the-consistency-of-hungary France: Fingerprints and transmission of data: biometrics to protect identity? (4.01.2012) http://www.statewatch.org/news/2012/jan/04fr-id.htm ============================================================ 13. Agenda ============================================================ 23-24 January 2012, Brussels, Belgium The European Thematic Network on Legal Aspects of Public Sector Information - LAPSI 2nd Public Conference and 3rd Award http://www.lapsi-project.eu/bruxellesprog 24 January 2012, Brussels, Belgium PrivacyCamp.eu - UnConference on Privacy and Data Protection http://www.edri.org/Privacy-Camp-EU 25-27 January 2012, Brussels, Belgium Computers, Privacy and Data Protection 2012 http://www.cpdpconferences.org/ 26 January 2012, Schaarbeek, Belgium Big Brother Awards Belgium http://www.bigbrotherawards.be/ 27 January 2012, Brussels, Belgium 21.30 - 02.00 (come early!) Privacy Party at Bozar http://www.edri.org/files/01-2012PRIVACY-PARTY-POSTER-DEF.jpg 4-5 February 2012, Brussels, Belgium FOSDEM 2012 - Free and Open source Software Developers' European Meeting http://fosdem.org/2012/ 25 February 2012, Szeged, Hungary Copyright and Human Rights in the Information Age: Conflict or Harmonious Coexistence http://www.juris.u-szeged.hu/english/news/conference-on-copyright 16 March 2012, Rotterdam, Netherlands EPSIplatform Conference: Taking government data re-use to the next level! http://epsiplatform.eventbrite.com/ 20 March - 1 April 2012, Berlin, Germany Wikimedia Chapters Meeting 2012 http://meta.wikimedia.org/wiki/Wikimedia_Conference_2012 13 April 2012, Biefeld, Germany Big Brother Awards Germany http://www.bigbrotherawards.de/ 16-18 April 2012, Cambridge, UK Cambridge 2012: Innovation and Impact - Openly Collaborating to Enhance Education OER12 and the OCW Consortium's Global Conference http://conference.ocwconsortium.org/index.php/2012/uk 2-4 May 2012, Berlin, Germany Re:Publica 2012: ACTION! http://re-publica.de/12/en 14-15 June 2012, Stockholm, Sweden EuroDIG 2012 http://www.eurodig.org/ 20-22 June 2012, Paris, France 2012 World Open Educational Resources Congress http://www.unesco.org/webworld/en/oer 9-10 July 2012, Barcelona, Spain 8th International Conference on Internet Law & Politics: Challenges and Opportunities of Online Entertainment http://edcp.uoc.edu/symposia/idp2012/cfp/?lang=en 12-14 September 2012, Louvain-la-Neuve, Belgium Building Institutions for Sustainable Scientific, Cultural and genetic Resources Commons. http://biogov.uclouvain.be/iasc/index.php 7-10 October 2012, Amsterdam, Netherlands 2012 Amsterdam Privacy Confernece Call for Papers by 1 February 2012 http://www.ivir.nl/news/CallforPapersAPC2012.pdf ============================================================ 14. About ============================================================ EDRi-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRi has 28 members based or with offices in 18 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRi-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and are visible on the EDRi website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring http://flattr.com/thing/417077/edri-on-Flattr - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edri/2.html - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Jan 18 23:23:07 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 19 Jan 2012 08:23:07 +0100 Subject: EDRi-gram newsletter - Number 10.1, 18 January 2012 Message-ID: <20120119072307.GK21917@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From smb at cs.columbia.edu Thu Jan 19 19:19:34 2012 From: smb at cs.columbia.edu (Steven Bellovin) Date: Thu, 19 Jan 2012 22:19:34 -0500 Subject: Megaupload.com seized Message-ID: On Jan 19, 2012, at 10:07 PM, Suresh Ramasubramanian wrote: > I would agree. They've dotted every i and crossed every t here. > > This will inevitably be followed by a prosecution of some sort and/or > there's also scope for Megaupload to sue the USG for restitution. > > It'll be interesting to see how this pans out - especially wrt any > safe harbor provisions in the DMCA for providers (which do have a > provision for due diligence being exercised etc). Note this from the NY Times article: The Megaupload case is unusual, said Orin S. Kerr, a law professor at George Washington University, in that federal prosecutors obtained the private e-mails of Megauploadbs operators in an effort to show they were operating in bad faith. "The government hopes to use their private words against them," Mr. Kerr said. "This should scare the owners and operators of similar sites." And see 17 USC 512(c)(1)(A) (http://www.law.cornell.edu/uscode/17/512.html) for why that's significant. --Steve Bellovin, https://www.cs.columbia.edu/~smb ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From lamenesst50 at ringorealty.com Thu Jan 19 15:43:18 2012 From: lamenesst50 at ringorealty.com (=?koi8-r?B?8NLRzdnFIMnO18XT1MnDyck=?=) Date: Fri, 20 Jan 2012 03:13:18 +0330 Subject: =?koi8-r?B?7cXUz8TZINfZ1snXwc7J0SDJztfF09Qt0NLPxcvUwSDQ0skg0M/X2dvF?= =?koi8-r?B?zs7PzSDEydPLz87UxQ==?= Message-ID: <000d01ccd704$1f1395c0$6400a8c0@lamenesst50> Тема: Разраб0тка и .анализ инвестиционных пр0ект0в За более подробной информацuей обpащайтеcь по тел: +7 Московский код: 7Ч2*9I98 <> код (495) - 7\Ч2_91/98 Дата проведения семинара: 30-31 января 2012г.. Целu Уч. курса: Изучение и применение информации для оценки проекта и его разработки. Типы инвестиционных проектов и их особенности, а также их принципиальное отличие от бизнес планов, различные методы и инструментарий для разработки и оценки. Основные критерии принятия решения по инвестиционному проекту. Практическое занятие с участниками, выяснение и обучение таким методам как: 1.Нестандартные проекты и особенности их расчета. 2.Подготовить исходную информацию для оценки проекта: определение доходной и затратной частей, их классификация по статьям для: * новых компаний. * функционирующего предприятия. 4.Определить состав инвестиционных затрат. 5.Определение и построение источников финансирования: кредиты, нераспределенная прибыль, инвестиционный капитал. 6.Организовать управление формированием прибыли от продаж товаров (работ, услуг) 7.Доходность проекта, анализ, показатели, которые определяют критерии рентабельности и прибыли. Финансовые результаты проекта. 8.Провести структурный анализ отчета о прибылях и убытках, операционный анализ и управление затратами + классификация затрат. 9.Инфляция и ее влияние на расчеты и результаты проекта. 10.Понятие Критерия Эффективности при построении инвестиционной программы. Анализ целесообразности. 11.Разработать отчеты для дальнейшей консолидации между головным предприятием и филиалами и прочими подразделениям, входящим в структуру предприятия: * Понять принцип консолидации отчетности для групп компаний (холдингов); * Подготовить последовательность операций при консолидации; * Понять и подготовить анализ консолидированной отчетности; 12.ДИСКОНТИРОВАНИЕ √ критерий разногласия! Вопрос применения и понятия метода. 13.Понять и самостоятельно разработать структуру инвестиционного проекта и изучить правила построения анализа для данного проекта. 14.Разработать процесс утверждения (принятия) инвестиционного проекта. 15.Маркетинговая информация, как ее подготовить? 16.Грамотно подготовить текстовую часть документа. 17.Подготовка финансового плана: * Объем и требования к расчетам; * Объем расчетов и описание в финансовом плане; * Самостоятельная подготовка электронных таблиц; * Описание расчетов в финансовом плане, необходимый объем; * Рассмотрение финансовых показателей и их корректировка с учетом выбранного интервала расчетов; * Анализ финансовых показателей деятельности предприятия; * Определение уровня безубыточности, запаса финансовой прочности проекта; * Использование полученных данных. Каждому участнику для дальнейшей успешной работы и внедрения методики планирования на предприятии предоставляются бесплатно следующие методические материалы и программы: * Материал методический: печатный для самостоятельной разработки бизнес планов, ТЭО, инвестиционных проектов. * На CD диске электронную версию метод. материала для разработки финансовых проектов. * Книга - ╚О Методах разработки бизнес плана╩. Книга написана как - практическое руководство. В комплект с книгой прилагается специализированная программа по разработке технико-экономического обоснования. (Продукт создан для экспресс подготовки экономической документации. Возможности программы это быстрая, качественная, профессиональная подготовка эконом. документации для представления партнерам, инвесторам, кредитодателям и т.п..).. За более подробной информацuей обpащайтеcь по тел: 8 (499) ЧЧ5\З9/68 ; 8 (499) Ч454095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6464 bytes Desc: not available URL: From jya at pipeline.com Fri Jan 20 06:21:11 2012 From: jya at pipeline.com (John Young) Date: Fri, 20 Jan 2012 09:21:11 -0500 Subject: Megaupload.com seized In-Reply-To: <20120120131232.GE21917@leitl.org> References: <20120120103253.GX21917@leitl.org> Message-ID: Harking back to the Echelon era, it is worth noting that those five countries - US, UK, AU, CA, NZ - are in the forefront of mega-managing the security of the Internet, no doubt refining and expanding the technological tools and sneaky extra-legal practices to work their combined will on global communications. Gaining access to MegaUpload's emails, business records and financial affairs likely required several multi-jurisdictional actions not only by the Echelon partners by also by allies such as those in NATO. As often discussed here, the use of military capabilities developed for national security for civilian criminal affairs matters is amply indicated in the MegaUpload indictment. Indicting in the US, in particular in the Eastern District of Virginia, the pre-eminent national security court, also indicates a bias toward national security undergirding arguments for economic security threat. That too was often debated here in the crypto wars of the 1990s. Recent defense funding authorization of holding alleged terrorists indefinitely, keeping Gitmo alive, SOPA, PIPA, MegaUpload, Bradley Manning, WikiLeaks, huge funding increases for openly hiring hackers and paying those undecover to rat on cohorts, also reminds of the extra-legalities and betrayals of the early public crypto era. >From those crypto lessons -- aspirations to use technology to beat government, then gradual co-optation by legal threats, bribes, scholarships, contracts, stigma, isolation, betrayals, call that the After Echelon Option -- it should be expected that the same means and methods will be used in cyber wars, offense and defense mutually aggrandizing one another. Note that there have been a slew of seeming public interest comsec initiatives in recent years to address cyber threats combined with threats to privacy. Observing the particpants in these there are quite a few recognizable warriors from the crypto-comsec-privacy wars. Fine minds and good hearts still proposing technological solutions to the issues, warning of legal if not military oppostion. Ginning up more technical fixes to comsec and privacy, reminding of past errors and promises gone awry, sniping at one another, admitting NDA withholdings, parading an impressive list of corporate domains after the nyms. Optimistically, using the wind down of the Cold War as a precedent, when crypto wizards came of out of classified realms due to decline of nat sec jobs, the wind down of GWOT could lead to comsec wizards coming out of similarly classified realms to aid civilians against those remaining in the world of secrecy worldwide. It would be a swell outcome of classified research to heed its inherent dual use once again on the dual use Internet: between those who want to control it with an iron hand of government and commerce and those who want to free it from that hand. That will depend upon who gets paid to betray the public and those who defend the public. It is not easy to tell who is who since both copy one another's language, behavior and promises -- most of the charges against MegaUpload could be applied to government and commerce. Call that Mega Echelon Option. At 02:12 PM 1/20/2012 +0100, Eugen Leitl wrote: >On Sat, Jan 21, 2012 at 01:52:01AM +1300, Peter Gutmann wrote: > >> Kim Schmitz (or whatever he's calling himself this week) is a survivor. >> He'll be back, even if Megaupload isn't. > >If the charges stick he'll be out of circulation for a while. From eugen at leitl.org Fri Jan 20 02:32:53 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 20 Jan 2012 11:32:53 +0100 Subject: Megaupload.com seized Message-ID: <20120120103253.GX21917@leitl.org> ----- Forwarded message from Steven Bellovin ----- From visgean at gmail.com Fri Jan 20 04:01:10 2012 From: visgean at gmail.com (Visgean Skeloru) Date: Fri, 20 Jan 2012 13:01:10 +0100 Subject: Megaupload.com seized In-Reply-To: <20120120103253.GX21917@leitl.org> References: <20120120103253.GX21917@leitl.org> Message-ID: BTW: Anons are attacking back http://anonops.blogspot.com/2012/01/internet-strikes-back-opmegaupload.html( http://en.wikipedia.org/wiki/Timeline_of_events_involving_Anonymous#Operation_Megaupload) but it does not seem to be as massive as previous attacks... There seems to be lack of media coverage... 2012/1/20 Eugen Leitl > ----- Forwarded message from Steven Bellovin ----- > > From: Steven Bellovin > Date: Thu, 19 Jan 2012 22:19:34 -0500 > To: Suresh Ramasubramanian > Cc: NANOG > Subject: Re: Megaupload.com seized > X-Mailer: Apple Mail (2.1251.1) > > > On Jan 19, 2012, at 10:07 PM, Suresh Ramasubramanian wrote: > > > I would agree. They've dotted every i and crossed every t here. > > > > This will inevitably be followed by a prosecution of some sort and/or > > there's also scope for Megaupload to sue the USG for restitution. > > > > It'll be interesting to see how this pans out - especially wrt any > > safe harbor provisions in the DMCA for providers (which do have a > > provision for due diligence being exercised etc). > > > Note this from the NY Times article: > > The Megaupload case is unusual, said Orin S. Kerr, a law professor > at George Washington University, in that federal prosecutors > obtained > the private e-mails of Megauploadb s operators in an effort to show > they > were operating in bad faith. > > "The government hopes to use their private words against them," Mr. > Kerr > said. "This should scare the owners and operators of similar sites." > > And see 17 USC 512(c)(1)(A) (http://www.law.cornell.edu/uscode/17/512.html > ) > for why that's significant. > > --Steve Bellovin, https://www.cs.columbia.edu/~smb > > > > > > > ----- End forwarded message ----- > -- > Eugen* Leitl leitl http://leitl.org > ______________________________________________________________ > ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org > 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > -- PGP pub key: http://keyserver.pgp.com/vkd/SubmitSearch.event?SearchCriteria=visgean%40gmail.com http://www.abclinuxu.cz/lide/visgean/gpg A453 B7F3 33D9 3BE6 2B8A | F014 5347 EBAC 0A5A 3E92 Jabber: visgean at jabber.org | visgean at jabber.cz Github: http://github.com/Visgean From eugen at leitl.org Fri Jan 20 05:12:32 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 20 Jan 2012 14:12:32 +0100 Subject: Megaupload.com seized In-Reply-To: References: <20120120103253.GX21917@leitl.org> Message-ID: <20120120131232.GE21917@leitl.org> On Sat, Jan 21, 2012 at 01:52:01AM +1300, Peter Gutmann wrote: > Kim Schmitz (or whatever he's calling himself this week) is a survivor. > He'll be back, even if Megaupload isn't. If the charges stick he'll be out of circulation for a while. From akaenjk at gmail.com Thu Jan 19 23:18:17 2012 From: akaenjk at gmail.com (aJ ͂邩) Date: Fri, 20 Jan 2012 16:18:17 +0900 Subject: No subject Message-ID: <201201180724.q0I7OuCt003392@proton.jfet.org> 【報酬先払い】副業目的で無料登録が増えてます 人妻との愛人月契約で20万円〜報酬先払いで本物保障!! 当倶楽部の人妻と愛人契約を結んでお金を稼いで見ませんか? 報酬は安心の完全先払い!!しかも契約を結ぶ女性を選べるんです。 http://korikori117.info/sx3/ サラリーマンの副業目的での参加が増えてきています。 未経験の方でも複数人と契約して月50万円以上稼ぐ方もいらっしゃいます。 18歳以上の健全な男性であれは料金等一切かかりませんので リスク無しで参加可能です。 http://korikori117.info/sx3/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From hacksawingth00 at rotarylift.com Thu Jan 19 23:40:37 2012 From: hacksawingth00 at rotarylift.com (=?koi8-r?B?7s/XLiD6wcvPziDQzyDU0sHO08bF0tTO2YU=?=) Date: Fri, 20 Jan 2012 16:40:37 +0900 Subject: =?koi8-r?B?uTIyNy3m+iDPINTSwc7TxsXS1M7ZyCDDxc7ByA==?= Message-ID: <000d01ccd746$ccf17300$6400a8c0@hacksawingth00> 27 января 2012 г. ╧227-ФЗ. Новое законодательство о трансфертном ценообразовании. Как подготовиться к новым обязанностям и минимизировать риски? +7 (код Москвы) 79221*22 \\\/// +7 (495)- 74291-98 Цель: На данном курсе вы получите информацию относительно того, какие сделки будут контролироваться согласно изменениям, вносимым в Налоговый кодекс РФ Законом ╧227-ФЗ, так и практические рекомендации по подготовке защитной документации, основанные на международной практике и комментариях представителей налоговых органов, которые будут возглавлять новые контрольные подразделения. Вы узнаете об основных положениях нового раздела Налогового кодекса V.1, о спорных вопросах, приводящих к рискам для налогоплательщика, разрешение которых появится в изменениях законодательства или будет отдано на откуп судебной практике. Вы также узнаете о том, какие дополнительные документы необходимо предоставлять налоговым органам, что налоговые органы имеют право требовать во время проведения проверки и какая ответственность предусмотрена для налогоплательщиков за несоблюдение норм нового законодательства согласно ст. 129.3 Налогового кодекса РФ. Особое внимание будет уделено вопросу, волнующему многих: как снизить риск претензий со стороны налоговых органов и какие механизмы защиты интересов налогоплательщика предусмотрены новым разделом V.1 Налогового кодекса РФ? В рамках обучения будут подробно разобраны практические способы обоснования трансфертных цен в некоторых типах сделок. Программа: 1. Определение перечня контролируемых сделок как новая обязанность налогоплательщика - главы 14.1 и 14.4 Налогового кодекса РФ: критерии признания сторон сделки взаимозависимыми; * методика расчета минимальной суммы для признания внутрироссийских сделок контролируемыми; * существующие возможности для выведения сделок из-под контроля √ пробелы законодательства; * признание сторон сделки контролируемыми по иным основаниям в рамках судебного разбирательства. 2. Методы обоснования соответствия цен по контролируемым сделкам рыночному уровню - главы 14.2 и 14.3 Налогового кодекса РФ: * сопоставимые рыночные цены √ где найти и как применять, расчет интервала рыночных цен; * сопоставимые сделки √ как доказать сопоставимость или ее отсутствие и как применять методику корректировок; * открытые источников информации; * методы анализа уровня рентабельности √ как найти сопоставимые компании и как рассчитывать интервал рентабельности; * метод распределения прибыли √ возможности применения на практике; * международная практика применения методов ценообразования √ рекомендации ОЭСР и модель контроля за ценообразованием США. 3. Обязанности налогоплательщика и ответственность за несоблюдение норм Закона - глава 14.4 Налогового кодекса РФ: * перечень контролируемых сделок √ форма подачи и ее сроки; * документация по трансфертным ценам √ когда необходимо подготовить и подать; * механизм добровольных корректировок и его эффективность по внутрироссийским сделкам. * Меры для защиты налогоплательщиков, предусмотренные Законом - главы 14.5 и 14.6 Налогового кодекса РФ: симметричные корректировки √ когда они возможны; * соглашение о ценообразовании √ существующие реальные перспективы применения; * краткий обзор проектов законодательства о консолидированной группе налогоплательщиков. 4. Обзор основных мероприятий, которые необходимо провести для подготовки к введению нового законодательства и снижения сопутствующих налоговых рисков, и практические пути их осуществления: * разработка плана мероприятий по подготовке компании и (или) группы компаний к вступлению Закона в силу; * анализ соответствия цен, планируемых на 2012 год, и методики их определения требованиям Закона; * подготовка и внесение изменений в существенные условия договоров и методики определения цен для снижения налоговых рисков; * подготовка проектов типовой документации по трансфертным ценам, которые могут быть представлены налоговому органу при специальной проверке. 5. Способы обоснования цен по контролируемым сделкам на примере (на выбор): * мпортно-экспортных операций по торговле товарами; * оказания услуг иностранной зависимой компанией (или компанией, находящейся в низконалоговой юрисдикции); * добычи полезных ископаемых (металлической руды) и последующей ее реализации (переработки); * внутригруппового финансирования. 6. Обзор комментариев представителей Минфина и налоговых органов относительно нового Закона. 7. Ответы на вопросы. Стоимость участия: 9 000 рублей Вся информация по тел: 8 (Ч95) 792/2122 <<>> 8 (499) 4Ч54095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7928 bytes Desc: not available URL: From pgut001 at cs.auckland.ac.nz Fri Jan 20 04:52:01 2012 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Sat, 21 Jan 2012 01:52:01 +1300 Subject: Megaupload.com seized In-Reply-To: <20120120103253.GX21917@leitl.org> Message-ID: Eugen Leitl quotes: > "The government hopes to use their private words against them," Mr. > Kerr said. "This should scare the owners and operators of similar > sites." Kim Schmitz (or whatever he's calling himself this week) is a survivor. He'll be back, even if Megaupload isn't. Peter. From akarmn at gmail.com Sat Jan 21 01:33:05 2012 From: akarmn at gmail.com (AK) Date: Sat, 21 Jan 2012 02:33:05 -0700 Subject: [tor-talk] Pirate Linux - First Release Message-ID: This is a project I have been working on for the Pirate Party of Canada. You can see the feature list and download links at http://piratelinux.org. The video walk-through is at http://youtu.be/s9kj4pziojQ. Some features that are perhaps unique when compared to other distros: - Ubuntu based together with a package called "piratepack" that installs all the modifications. - The piratepack has been tested to work on Ubuntu 10+ and Debian 6. - Tor & Vidalia run in the background and you can access Vidalia from the icon on the top panel. - Tor browser uses your current firefox under a profile called "tor". - Both the Tor browser and the regular firefox get addons automatically installed (your firefox settings and history are still working as usual, it's just as if you installed the addons on top of them). - Regular Firefox addons: AdBlock Plus, Bloody Vikings, Download Helper, Ghostery, HTTPS-Everywhere. - Tor browser addons: Bloody Vikings, HTTPS-Everywhere, NoScript, Torbutton. - Tor browser automatically launches Pidgin in OTR mode connected to the oftc.net server through Tor. - Bitcoin client (both command line and graphical). - Cwallet: My own program that lets you list the private keys associated with your addresses in your wallet.dat and make a paper backup of your wallet in QR code format. Also, it checks to make sure that the keys are not corrupted. There's both a command line and graphical version. - Custom Google Homepage: Google SSL search & Pirate search, plus useful links on top. - Piratepack modifications can be enabled and disabled through a GUI controller. - You can launch the Liberte & Tails privacy enhanced distros from the boot menu. - IMPORTANT: Any binaries that piratepack installs are compiled from source automatically on installation. You don't have to trust my binaries. Of course the dependencies (such as libz1g or firefox, etc...) will not be compiled, but by default come from the standard Ubuntu/Debian repositories. Piratepack also produces a binary version of piratepack and puts it in /opt/piratepack/bin-pack. You can share this binary version with a friend or use it for yourself for installation on another machine. Of course you can also choose to install the binary version of piratepack if you don't want to wait for the compilation and you trust my signed binaries. Also, when doing updates to piratepack, you may want to read the source code first. In this case you can simply download piratepack from the piratelinux.org website instead of using the update manager. Or you can install it from the update manager and then read the source code from the cache directory /var/cache/apt/archives in order to make sure that the code is not malicious. I'm taking a break from this now to focus on other things. But, Ill try to get some small updates done from time to time and I'm keeping an eye out for the release of Ubuntu 12, and that's when the next major update will probably happen. Cheers _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From yamnmyj at gmail.com Fri Jan 20 23:57:31 2012 From: yamnmyj at gmail.com (| q) Date: Sat, 21 Jan 2012 16:57:31 +0900 Subject: No subject Message-ID: <201201190800.q0J80s5Z026105@proton.jfet.org> ※冷かしでの参加は絶対にお止め下さい!! お金持ちな人妻から"お小遣い"が貰える!! "嘘"無しの報酬先払い!!女性を満足させよう。 嘘のような本当の話。逆援助を望んでいる方は実在します。 当サイトは本物を"報酬先払い"という形で証明します。 信じる人だけご入場下さい。男性はもちろん無料です。 何をすればお金を貰えるのか?  ↓↓ http://kakeke.info/sx3/ 【 報酬例 Aさんの場合】  一晩で平均報酬3万円  3万円×15日=45万円/月   ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ★こちらが実際の体験談  ↓↓ http://kakeke.info/sx3/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From eugen at leitl.org Sun Jan 22 03:48:29 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 22 Jan 2012 12:48:29 +0100 Subject: [tor-talk] Pirate Linux - First Release Message-ID: <20120122114829.GS21917@leitl.org> ----- Forwarded message from AK ----- From orangewinds at gmail.com Sun Jan 22 19:05:47 2012 From: orangewinds at gmail.com (Jacob Taylor) Date: Sun, 22 Jan 2012 19:05:47 -0800 Subject: Megaupload.com seized Message-ID: On Fri, 2012-01-20 at 11:14 +0000, Alec Muffett wrote: > On 20 Jan 2012, at 11:00, Tei wrote: > > > Fileshares can organize thenselves in sites based on a forum software > > that is private by default (open with registration), then share some > > "information" file that include the url to the files hosted, and the > > key to unencrypt these files, and some metadata. A special desktop > > program* would load that information file, and start the http > > download. > > > At the risk of kicking over old ground, there are a bunch of privacy solutions like this; possibly the most complete attempt (in terms of attempted privacy and distribution) is Freenet: > > http://freenetproject.org/whatis.html > > ...but it's slow; then there's Tahoe-LAFS - a decentralised filesystem: > > https://tahoe-lafs.org/trac/tahoe-lafs > > ...but it's slow; then there are connection anonymisation tools like I2P and Tor, but - wonderful as they are - they're slow. > > Can you see a pattern developing that would be relevant to the downloader of 700Mb+ AVIs? :-) > > It would be great to speed them through wider adoption, but until then... > > -a Tahoe-lafs can be fast. A grid I help out with is often capable of 600kilobyte/per/second downloads (or faster), and I personally have several files stored on there in excess of 500mb. Close enough to your 700mb movie example. I use this storage as a CDN of sorts, as a friend wrote an HTTP interface to the Tahoe-lafs grid. Should you wish to see it in action, the code and download links are over here --> http://cryto.net/projects/tahoe.html ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sun Jan 22 23:37:20 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 23 Jan 2012 08:37:20 +0100 Subject: Megaupload.com seized Message-ID: <20120123073720.GC7343@leitl.org> ----- Forwarded message from Jacob Taylor ----- From mail at mcbridemurphy.com Mon Jan 23 07:08:48 2012 From: mail at mcbridemurphy.com (=?koi8-r?B?IvPU0s/JxczYzs/FINXQ0sHXzMXOycUi?=) Date: Tue, 23 Jan 2012 16:08:48 +0100 Subject: =?koi8-r?B?88TFzMvJINMg2sXNxczYztnNySDVwdPUy8HNyQ==?= Message-ID: <01ccd9e9$4a0ee800$99ad565d@mail> КОМУ: Главному инженеру Уважаемые коллеги! Доводим до вашего сведения, что с 30 по 31 января 2012 года в Санкт-Петербурге состоится КОНФЕРЕНЦИЯ по теме: З Е М Е Л Ь Н О Е З А К О Н О Д А Т Е Л Ь С Т В О В 2 0 1 2 Г О Д У. КАДАСТРОВЫЙ УЧЕТ. Оформление прав на земельные участки. Предоставление земельных участков под застройку. За более подробной информацией обращайтесь по телефону: 8 812 642--96--lO Краткая программа конференции: ***************************************************************************************** - Оформление прав на объекты недвижимости. Государственная регистрация сделок с земельными участками. - Обзор практики применения Федерального закона "О государственной регистрации прав на недвижимое имущество и сделок с ним". - Кадастровая деятельность по формированию земельных участков. - Категории земельных участков. - Перевод земельных участков из одной категории в другую. - Согласование местоположения границ земельных участков. Межевой план. - Кадастровые паспорта на жилое помещение, на нежилое помещение, на землю. - Регламент предоставления земельного участка в собственность. - Оформление прав на земельные участки под существующими линейно-кабельными сооружениями и под строительство линейных объектов. - Переход права собственности на здание, строение, сооружение, находящиеся на чужом земельном участке. - Предоставление земельных участков на инвестиционных условиях. - Перечень документов, представляемых для регистрации договора аренды земельного участка. ************************* С уважением, отдел обучения Устинова Валерия Юрьевна Тел. (812) 642--96--lO From steylartn at peninsulaplastics.com Mon Jan 23 22:33:28 2012 From: steylartn at peninsulaplastics.com (=?koi8-r?B?IuvV0tMg0M8g5vogOTQgySAyMjMi?=) Date: Tue, 23 Jan 2012 22:33:28 -0800 Subject: =?koi8-r?B?5vogOTQgySAyMjM=?= Message-ID: <01ccda1f$06cf6c00$75214977@steylartn> ГОСУДАРСТВЕННЫЙ ЗАКАЗ ДЛЯ ПОСТАВЩИКОВ ********************************************************************************** Уважаемые коллеги! Информируем вас, что с 20 по 21 февраля 2012 года в Санкт-Петербурге состоится КОНФЕРЕНЦИЯ по теме: Г О С У Д А Р С Т В Е Н Н Ы Й З А К А З. Последние изменения в правовом механизме поставок товаров и услуг для государственных и муниципальных нужд. Практика применения конкурентных и неконкурентных торгов. (Курс для поставщиков)". По вопросам участия обращайтесь в оргкомитет: 8 (8l2) 6Ч2 98 6З Краткая программа конференции: *********************** 1. Реформа государственного заказа: - обзор последних изменений в законодательстве РФ; - федеральная контрактная система (ФКС) - как альтернатива ФЗ-94. 2. Сложные вопросы торгов: - универсальный алгоритм проведения аукциона в электронной форме; - обзор типичных ошибок поставщиков; - заключение контрактов по итогам аукциона. 3. Антимонопольный контроль размещения государственного заказа: - последние изменения Федерального закона "О защите конкуренции"; - наиболее распространенные нарушения антимонопольного законодательства; - практика рассмотрения жалоб участников торгов на нарушения заказчиками антимонопольного законодательства; - административная и уголовная ответственность за нарушения антимонопольного законодательства. Темы освещают ведущие специалисты в области государственного заказа. ********************* С уважением, Николаева Валентина Викторовна оргкомитет конференций Тел. (8I2) 6Ч2 98-6З From pete.gunnlaugsson at painreliefgroup.com Mon Jan 23 22:08:01 2012 From: pete.gunnlaugsson at painreliefgroup.com (=?koi8-r?B?IvzLz8zPx8nRIg==?=) Date: Wed, 24 Jan 2012 11:38:01 +0530 Subject: =?koi8-r?B?9yDv7+/z?= Message-ID: <01ccda8c$a0813280$e2ecce75@pete.gunnlaugsson> Кому: Главному экологу Уважаемые коллеги! Информируем Вас о том, что в период с 20 - 21 февраля 2012 года в Санкт-Петербурге пройдет КОНФЕРЕНЦИЯ: Э К О Л О Г И Ч Е С К А Я Э К С П Е Р Т И З А П Р О Е К Т О В По вопросам участия обращайтесь в оргкомитет конференции: 8 812 6Ч2 98...62 Краткая программа конференции: 1. Правовая основа Государственной экологической экспертизы. 2. Государственная экологическая экспертиза проектов строительства (ГЭЭ). 3. Экологическая экспертиза проектов по организации особоохраняемых территорий. 4. Экологические требования законодательства Российской Федерации. 5. Федеральный закон и иные законодательные и нормативные акты об экологической экспертизе. 6. Оценка воздействия на окружающую среду (ОВОС) на стадии обосновании инвестиций в строительство. 7. Права и обязанности заказчика документации, подлежащей экологической экспертизе. 8. Ответственность за нарушение законодательства РФ об экологической экспертизе. ------------------------------------------------------------------------------------- С уважением, Федорова Валерия Николаевна оркомитет конференций тел.: (812) 6Ч2...98..62 From psanchez at bollingerinsurance.com Tue Jan 24 00:05:44 2012 From: psanchez at bollingerinsurance.com (=?koi8-r?B?IuvV0tM6IOfv8/Xk4fLz9Pfl7u756iD64evh+iI=?=) Date: Wed, 24 Jan 2012 17:05:44 +0900 Subject: =?koi8-r?B?5vogOTQgySAyMjM=?= Message-ID: <01ccdaba$6890e400$f1ecbad3@psanchez> ГОСУДАРСТВЕННЫЙ ЗАКАЗ ДЛЯ ПОСТАВЩИКОВ ** Уважаемые коллеги! Информируем вас, что с 20 по 21 февраля 2012 года в Санкт-Петербурге состоится КОНФЕРЕНЦИЯ по теме: Г О С У Д А Р С Т В Е Н Н Ы Й З А К А З. Последние изменения в правовом механизме поставок товаров и услуг для государственных и муниципальных нужд. Практика применения конкурентных и неконкурентных торгов. (Курс для поставщиков)". По вопросам участия обращайтесь в оргкомитет: 8 (8l2) 6Ч2..98_6З Краткая программа конференции: ******************** 1. Реформа государственного заказа: - обзор последних изменений в законодательстве РФ; - федеральная контрактная система (ФКС) - как альтернатива ФЗ-94. 2. Сложные вопросы торгов: - универсальный алгоритм проведения аукциона в электронной форме; - обзор типичных ошибок поставщиков; - заключение контрактов по итогам аукциона. 3. Антимонопольный контроль размещения государственного заказа: - последние изменения Федерального закона "О защите конкуренции"; - наиболее распространенные нарушения антимонопольного законодательства; - практика рассмотрения жалоб участников торгов на нарушения заказчиками антимонопольного законодательства; - административная и уголовная ответственность за нарушения антимонопольного законодательства. Темы освещают ведущие специалисты в области государственного заказа. --- С уважением, Николаева Валентина Викторовна оргкомитет конференций Тел. (8I2) 6Ч2_98__6З From farrahvernice at pacificnet.net Wed Jan 25 04:53:34 2012 From: farrahvernice at pacificnet.net (Shawna) Date: Wed, 25 Jan 2012 06:53:34 -0600 Subject: Male Penis Enhancement - Male Extra Pills - Rock solid, bigger, harder, more intense erections. mho6do3r7x17c1 Message-ID: <201201250953.FFFFBAB996BBC7139CA3@8v06d691a4> Male Penis Enhancement - Male Extra Pills Rock solid, bigger, harder, more intense erections and enlarge your penis by up to 3 inches with #1 Male Extra Penis Enhancement Pills. Get Max Discount. 100% risk free money back guarantee. http://enlargepillfilm.ru From adaharlette at tagline.net Tue Jan 24 21:40:34 2012 From: adaharlette at tagline.net (KristineKeitha) Date: Wed, 25 Jan 2012 07:40:34 +0200 Subject: Generic Generic Viagra Drugs. Regular Discounts. No prescription needed! 2oeyop3iwdjr Message-ID: <68x25v92s38-94926253-881f5a93@f95grg2x> Special internet prices! No prescription needed! High Quality Generic Drugs! No prescription required, Confidentiality, Guaranteed Fast Worldwide Delivery, 24/7 customer service. All Major Credit Cards Accepted! Special internet prices. Generic Drugs. Regular Discounts. http://medspillspharmacy.ru From indirectnessow6 at richardbayfield.com Wed Jan 25 11:12:43 2012 From: indirectnessow6 at richardbayfield.com (=?koi8-r?B?99PFIM8gzsHMz8fByA==?=) Date: Wed, 25 Jan 2012 14:12:43 -0500 Subject: =?koi8-r?B?YyAxINHO18HS0SAyMDEyIOvB09PP19nFIM/QxdLBw8nJLiA=?= Message-ID: Все для бухгалтеров и не только(обучение, курсы) 7 (499) 445_З968 > +7 499 - 445.ЧО*95 Февраль 1 февраля Командировки по России и за рубеж. Учет представительских расходов 1 февраля ГОДОВАЯ ОТЧЕТНОСТЬ 2011 г. Бухгалтерская отчетность за 2011 г.: изменения, порядок составления, распространенные ошибки 2 февраля Основные средства и материально-производственные запасы: бухгалтерский учет и налогообложение в 2012 году 3 февраля Делопроизводство в бухгалтерии  3 февраля Новации таможенного законодательства. Кодекс Таможенного союза. Контракт и таможенные формальности 3 февраля Новый закон "О бухгалтерском учете" 7 февраля Вахтовый метод организации работ 7 февраля Операции с ценными бумагами и иными финансовыми вложениями: бухгалтерский учет и налогообложение 7 февраля Кассовые операции. Новый Порядок ведения кассовых операций, вступающий в действие 1 января 2012 года 8 февраля Управленческие навыки главного бухгалтера. Позиционирование в компании, приемы управления коллективом бухгалтерии 8 февраля Переход на новый план счетов для бюджетных и автономных организаций 8 февраля Социальные страховые взносы и пособия в 2012 г. Все новшества. Льготы для страхователей 8 февраля НДС - Счета-фактуры и налоговые вычеты в 2012 году 9 февраля Декларация по НДС за 4 квартал 2011 года: инструкция по первому применению Закона № 245-ФЗ 9-10 февраля Управление закупками. Практические приемы минимизации оборотных средств 10 февраля Конфиденциальность и защита бизнеса: насколько безопасно использование иностранных компаний и счетов в зарубежных банках? (Как скрыть истинного владельца бизнеса? и как найти "тихую гавань" для сбережений) 10 февраля Налоговый агент иностранной организации. Налоговые последствия для российской организации 10 февраля Оплата больничных и пособия на детей в 2012 году 10 февраля Риски и ошибки, совершаемые при дроблении бизнеса. Применение льготных режимов налогообложения для 13 февраля Явные признаки налоговых схем и как их избежать 13 февраля Оплата временной нетрудоспособности в 2012 г.: сложные вопросы начисления, выплаты и налогообложение 13 февраля Недобросовестные поставщики. Как сохранить вычеты, уйти от ответственности 14 февраля НДС в 2012 году: как избежать проблем при исчислении и уплате. Декларация за 4 квартал 2011 года: первое применение закона № 245-ФЗ 14 февраля Методы оптимизации расходов на выплату белой зарплаты 14 февраля Заработная плата в 2012 г.: правовые, бухгалтерские и налоговые вопросы (каждому участнику книга Воробьевой Е.В.) 15 февраля Налог на прибыль в 2012 году: как избежать проблем при исчислении и уплате 16 февраля Применяем ПБУ 18/02 на практике. Пути сближения бухгалтерского и налогового учета 16-17 февраля Управленческий учет. Управление по целям и показателям. Бюджетирование 16-17 февраля ОФФШОРЫ: выбор оптимальной юрисдикции, схемы налоговой оптимизации, конфиденциальность бизнеса 17 февраля Годовой отчет за 2011 год готовим с автором книги 17 февраля Самые важные изменения в налоговом законодательстве в 2012 г. Порядок составления налоговой отчетности 17 февраля Годовая бухгалтерская и налоговая отчетность – 2011г. Практика применения изменений в законодательстве 17 февраля Основные налоговые претензии по НДС и Налогу на прибыль. Способы защиты, разбор сложных случаев 17 февраля НДС при осуществлении внешнеторговых операций с учетом изменений, внесенных в НК РФ. Применение нулевой ставки НДС с учетом изменений, внесенных в НК РФ в 2011 году. Перспективы 2012 года. 20 февраля Оптимизация налогообложения и налоговое планирование 20 февраля Как жить без обналички и фирм-однодневок и не разориться, уход от "черных" и "серых" схем. Оптимизация налогообложения законными способами 27 февраля Иностранные работники (кадровые, налоговые и правовые аспекты) 27 февраля Изменения в законодательстве о налоговом регулировании трансфертных цен с 2012 года (Закон № 227-ФЗ). Как налогоплательщикам обосновать применяемые цены и минимизировать риски? 28-29 февраля Налоговое планирование в 2012г. – Лучшие белые схемы. Полный курс 28 февраля Гонконг – идеальный инструмент налогового планирования для работы в Азии 28 февраля Методы оптимизации расходов на выплату белой зарплаты и других доходов физических лиц в 2012-13 гг. 28 февраля Налоговые проверки и проверки МВД в 2012 году 29 февраля Иностранные работники в 2012 г.: что важно знать кадровику и руководителю 29 февраля Оптимизация НДС и налога на прибыль: пределы возможного и допустимого 29 февраля Упрощенная система налогообложения в 2012 г.: изменения в законодательстве, сложные вопросы. Подготовка к сдаче отчетности За более подробной информацuей обpащайтеcь по тел: +7 Ч95 742/9I/98 **** 8 (499) 445.З9.68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 19315 bytes Desc: not available URL: From kimberleealfreda at idial.net Wed Jan 25 18:15:50 2012 From: kimberleealfreda at idial.net (Adrienne Lilia) Date: Wed, 25 Jan 2012 19:15:50 -0700 Subject: Male Penis Enhancement - Male Extra Pills - Rock solid, bigger, harder, more intense erections. sovbe118mmogi3kkvned Message-ID: <201201260515.225DFF4EA6406D1E4BFCB@75579r8> Male Penis Enhancement - Male Extra Pills Rock solid, bigger, harder, more intense erections and enlarge your penis by up to 3 inches with #1 Male Extra Penis Enhancement Pills. Get Max Discount. 100% risk free money back guarantee. http://penisprogold.ru From selenashelly at gasworks.com Wed Jan 25 08:47:07 2012 From: selenashelly at gasworks.com (Richard Maryann) Date: Wed, 25 Jan 2012 19:47:07 +0300 Subject: Complete HCG Weight Loss Kit. Safely Lose 10-15 Pounds in 40 Days - GUARANTEED zzlbc63avk5hb1eckpgu Message-ID: <201201251243.20D59B9A7A4F6CB2B8E4C@z80x03p> Complete HCG Weight Loss Kit #1 Doctor Endorsed HCG. Made in the USA. Safely Lose 10-15 Pounds in 40 Days - GUARANTEED http://hcg-discountphoenix.ru From jordanlaurice at grahampearce.com Wed Jan 25 17:47:41 2012 From: jordanlaurice at grahampearce.com (MOLLIECORRIN) Date: Wed, 25 Jan 2012 19:47:41 -0600 Subject: Get Max Discount. 100% risk free money back guarantee. Rock solid, bigger, harder, more intense erections.2 lmsuxz1qf717b2 Message-ID: <97v66g84j20-44698120-399n2d69@sbmzjxp> Male Penis Enhancement - Male Extra Pills Rock solid, bigger, harder, more intense erections and enlarge your penis by up to 3 inches with #1 Male Extra Penis Enhancement Pills. Get Max Discount. 100% risk free money back guarantee. http://penisprogold.ru From steinwaybp0 at rakuda.com Wed Jan 25 10:50:10 2012 From: steinwaybp0 at rakuda.com (=?koi8-r?B?zs/Xz8Ug1yAyMDEy?=) Date: Wed, 25 Jan 2012 19:50:10 +0100 Subject: =?koi8-r?B?68zJzc/XwSDPIM7BzM/HwcgsINPU0sHIz9fZyCDX2s7P08HI?= Message-ID: <000d01ccdb92$29e3b9c0$6400a8c0@steinwaybp0> 27 января 2012 г. НАЛОГИ, СТРАХОВЫЕ ВЗНОСЫ И БУХГАЛТЕРСКИЙ УЧЕТ В 2012 ГОДУ: ВСЕ, ЧТО НУЖНО ЗНАТЬ БУХГАЛТЕРУ \Моск. код/ 79221*22 \\\/// \Моск. код/ 7922I22 Программа: 1. Налоги в 2012 году * Трансфертное ценообразование: чего ждать от нового закона (Федеральный закон ╧ 227-ФЗ) КАЖДОМУ налогоплательщику. * НДС (Федеральный закон ╧ 245-ФЗ и др.): * Новый вид счетов-фактур √ корректировочные. * Скорректированы правила определения места реализации отдельных работ (услуг). * Новый порядок учета суммовых разниц в части НДС. * Новые случаи восстановления НДС, установленные НК РФ, и новые важные решения ВАС в этой области. * Новый порядок и возможности электронного документооборота счетами-фактурами. * Уточнен порядок вычетов по НДС при ликвидации объектов недвижимости, их модернизации (реконструкции). * Важнейшие решения ВАС. * Другие важные новшества. * Налог на прибыль (Федеральные законы ╧ 249-ФЗ, ╧ 245-ФЗ, ╧ 239-ФЗ, ╧ 235-ФЗ, ╧ 227-ФЗ, ╧ 215-ФЗ, ╧ 200-ФЗ, от 07.06.2011 ╧ 132-ФЗ, ╧ 321-ФЗ, ╧ 320-ФЗ): * Новое в оценке доходов и расходов в целях налога на прибыль в 2012 г. * Консолидированная группа налогоплательщиков √ новый институт налогового права. Совместная уплата налога на прибыль участниками КГН. * Совершенствование амортизационной политики. * Новый подход к учету расходов на реконструкцию и капитальный ремонт в налоговом и бухгалтерском учете. * Уточнение порядка признания расходов на НИОКР. * Новый порядок списания расходов по лицензионным договорам на программы для ЭВМ и базы данных. * Ставка 0 % для образовательных и медицинских организаций все же может быть применена с 2011 г.: что надо предпринять? * Другие важные новшества. * Изменения по НДФЛ в 2011 и 2012 г. (Федеральный закон ╧ 330-ФЗ): * Отмена стандартного вычета 400 руб. * Изменение вычетов на детей с 2011 года "задним числом": делаем перерасчет, зачитываем переплату. * Вычеты на детей в 2012 году. * Новый порядок налогообложения выходных пособий в 2012 г. * Специальные налоговые режимы в 2012 г.: * Изменения в УСН. * Подготовка к отмене ЕНВД (отмена ЕНВД с 2012 г. в г. Москве). 2. Социальные страховые взносы и пособия * Новое в уплате страховых социальных взносов в 2012 г. (с учетом закона, принятого Госдумой 23 ноября 2011 г.): * Изменение тарифов страховых взносов, введение регрессивной шкалы. * Новый принцип определения облагаемой базы. * Новый порядок уплаты взносов за иностранных работников. * Новый порядок применения тарифных льгот с 2012 года. * Новое в уплате взносов "на травматизм" в 2012 году. * Новое в процедурах проведения Фондами проверок. * Новые штрафные санкции. * Новое в отчетности перед Фондами: * Формы отчетности по персонифицированному учету за 2011 год. * Важные новшества в технологии электронной отчетности, о которых необходимо знать бухгалтеру. * Новое в выплате пособий по социальному страхованию: новшества в 2012 году, новое в оплате больничных "упрощенцами", новые бланки больничных листков и порядок их заполнения: типичные ошибки; программа реформирования пособий до 2014 года: чего ожидать. * Индексация "детских" пособий в 2012 году. 3. Бухгалтерский учет в 2012 году и отчетность за 2011 год * Новый закон "О бухгалтерском учете", принятый Госдумой 22 ноября 2011 г.: готовимся к его вступлению в силу. Внедрение МСФО: кто и когда будет применять эти стандарты. * Первая годовая отчетность по новым формам. Изменения в бухучете в 2011 году, которые надо отразить в отчетности. * Новшества первичной документации: * Новая форма транспортной накладной √ обязательно ли ее применять? * Новый порядок хранения бухгалтерской документации все же вступил в силу: на что обратить внимание. 4. Новое в трудовом законодательстве * Новые требования аттестации рабочих мест по условиям труда: информация для бухгалтера (с учетом Федерального закона ╧ 300-ФЗ). Новый подход к обоснованию расходов на обеспечение нормальных условий труда, спецодежду, медосмотры, аптечки и т.д. * Новые требования к обработке персональных данных работников. * Новое в порядке предоставления отпусков с сентября 2011 г. * Новый минимум оплаты труда в регионах с 2012 года. Стоимость участия: 8 000 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: код: (четыре девять пять) 7Ч2\9I-98 \\// 8 (495) 792/2I.22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8805 bytes Desc: not available URL: From tracifiona at aem1.com Wed Jan 25 14:22:48 2012 From: tracifiona at aem1.com (BELLA) Date: Wed, 25 Jan 2012 23:22:48 +0100 Subject: TRY THIS! Penis enhancement pill helps increase sexual health for bigger, harder erections 394t7k1eajhcq0g Message-ID: <23a77v40w29-42969643-284b8m51@iwx4qwxnn9> World's Best Penis Pills - Virility Pills 100% Satisfaction Guaranteed Penis Enlargement, Clinically Proven Now in USA Buy 3 Get One Free, Buy 4 Get 2 Free Limited Time Only http://penisproclung.ru From syverson at itd.nrl.navy.mil Thu Jan 26 07:18:00 2012 From: syverson at itd.nrl.navy.mil (Paul Syverson) Date: Thu, 26 Jan 2012 10:18:00 -0500 Subject: [tor-talk] Fwd: ANONdroid Message-ID: On Thu, Jan 26, 2012 at 10:35:20AM +0200, Maxim Kammerer wrote: > On Thu, Jan 26, 2012 at 10:05, Karsten N. wrote: > > > It is possible, to deanonymize a single user by some features (user IP > > address, website monitoring or user account). The idedentify feature for > > the malicious user has to be provided by the law enforcement agency and > > all operators have to get an official order in their country. > > So there is no difference from Tor? > JonDoNym and Tor have some significant aspects in common, but they are fundamentally different in the basis for their security. JonDoNym is a mix cascade design (or `MIX' as some would write it). This means that all the messages (packets/cells) that enter the network together (enter a node at roughly the same time) proceed through the network together in a batch and leave the network together (exit at a predictable but distinct node all at the same time). In principle, this means that an adversary will have a difficult time separating messages in a batch from one another. (In practice, research indicates that the situation for low-latency traffic is, let's just be generous and say, more complicated.) This is the basis of the security they provide. Onion routing designs like Tor derive their security primarily from the unpredictability of routes: just seeing a message from a client enter the network does not tell you where it is going to come out. The pros and cons of these are a matter of long debate. (I miss you, Andreas.) I come down strongly on the side of onion routing as an approach. Many detailed research papers address lots of the issues, but much of my position is captured in my "Why I'm not an Entropist." (Let me know if you want to see it and can't find it.) The basic difference is roughly that mix cascades attempt to hide you well in a predictable 'anonymity set'. Onion routing networks attempt to make it hard to know where to look/attack if you want to de-anonymize, e.g., what website someone is browsing. And the Tor network is intended to be big enough and in diverse enough jurisdictions that it is hard for any one adversary to look everywhere (thousands of nodes worldwide). That's the main idea, skipping a lot of aspects, such as the possible benefits (or not) of combining the two approachers. > > An scientific paper about the "Revocable Anonymity" impleneted by > > JonDonym > > I see, so is that an optional feature that can be turned on by a MIX > router operator once served by a surveillance order? It seems to me > that it's an advantage over Tor, where relay operators can be served > with an order and some Tor patches that they wouldn't be able to turn > down to to the absence of a similar feature in Tor. Revocable > Anonymity seems to be designed to provide the minimum necessary > information to law enforcement. > Many security researchers, including myself, are quite resistant to the idea of revocable anonymity. Designing, building, and deploying a system to be secure is incredibly hard even without the added burden of building in a systematic means to selectively remove its security properties. See, for example, Matt Blaze's work on key escrow. See http://www.acsac.org/2011/program/keynotes/ for his recent retrospective. But leaving that entire issue aside, from my above comment, I hope it is apparent that there is another important difference from mix cascades. For Tor such a surveillance order for purposes of tracking particular communicants would be pointless, and thus presumably unjustified. Unlike cascades, a message entering the network in one location might come out at any exit node, anywhere in the world. And if, e.g., one observes communication exiting a particular network node and arriving at a destination of interest, there is no reason to think that future communication, even from the same originating client is likely to emerge from that same node. In fact just the opposite. aloha, Paul _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From modestajong at ftventures.com Wed Jan 25 20:40:38 2012 From: modestajong at ftventures.com (CarrolCassaundra) Date: Thu, 26 Jan 2012 10:40:38 +0600 Subject: Complete HCG Weight Loss Kit. Safely Lose 10-15 Pounds in 40 Days - GUARANTEED v9nnbgl4jqoe1h9w27q Message-ID: <41t64q32z46-03815683-051m8q95@mkzrtfyhrk> Complete HCG Weight Loss Kit #1 Doctor Endorsed HCG. Made in the USA. Safely Lose 10-15 Pounds in 40 Days - GUARANTEED http://hcgcheapsex.ru From robvanderhoeven at ziggo.nl Thu Jan 26 02:23:32 2012 From: robvanderhoeven at ziggo.nl (Rob van der Hoeven) Date: Thu, 26 Jan 2012 11:23:32 +0100 Subject: [Freedombox-discuss] Moxie Marlinspike talk: Changing Threats To Privacy: From TIA To Google Message-ID: Came across a great talk by Moxie Marlinspike at Defcon 18. Changing Threats To Privacy: From TIA To Google download: https://media.defcon.org/dc-18/video/DEF%20CON%2018%20Hacking% 20Conference%20Presentation%20By%20-%20Moxie%20Marlinspike%20-% 20Changing%20Threats%20To%20Privacy%20From%20TIA%20to%20Google%20-% 20Video.m4v Enjoy, Rob. http://freedomboxblog.nl _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From outcastsbg9 at rouenstsever.com Wed Jan 25 18:26:45 2012 From: outcastsbg9 at rouenstsever.com (=?koi8-r?B?887J2tggzsHMz8fJ?=) Date: Thu, 26 Jan 2012 11:26:45 +0900 Subject: =?koi8-r?B?6d3F1MUgwczY1MXSzsHUydfVIOvJ0NLVPw==?= Message-ID: 30 Января 2012 г. ОФФШОРНЫЙ БИЗНЕС: О ЧЕМ МОЛЧАТ ДРУГИЕ +7 499 - 445.4О\95 и 8 (495) 792_21/22 Программа: 1. Оффшорные, низконалоговые и престижные европейские юрисдикции: критерии выбора. * Сравнительная характеристика наиболее популярных оффшорных юрисдикций (Британские Виргинские острова, Белиз, Сейшелы, Панама и т.д.). * Оффшоры, Гонконг и Кипр в современном бизнесе. * Низконалоговые юрисдикции: преимущества по сравнению с "классическими" орами и Гонконгом. * Структура управления иностранными компаниями и доступа к банковскому счету. * Использование престижных юрисдикций: Швейцария, Люксембург, Нидерланды и т.д. – когда это обоснованно? * Соглашения об избежании двойного налогообложения – моменты, на которые нужно обратить внимание. * "Черные списки" ФАТФ, ОЭСР, Минфина, ЦБ РФ. 2. Кипр как сбалансированный инструмент налогового планирования. Практика использования кипрских компаний * Основные налоги на Кипре (ставки, порядок уплаты, освобождения): * налог на прибыль (Corporate Income Tax); * предварительный налог на прибыль (Preliminary Tax) и авансовые платежи (Installments); налог на оборону (Defence Contribution Tax); * НДС. * Проведение аудита и сдача отчетности. * Изменения в Соглашении об избежании двойного налогообложения между Кипром и РФ: * анализ каждой поправки и предпосылок к ним, сравнение с новой редакцией конвенции ОСЭР; * прогноз: последствия для российского бизнеса. 3. Схемы, применяемые в международном налоговом планировании. * Предварительный краткий обзор особенностей европейского законодательства * Внешнеторговые операции (экспорт/импорт) * схемы с использованием оффшоров и Гонконга; * схемы с использование английских партнерств LLP; * схемы с использованием Кипра и английской компании со статусом резидентства на Кипре. * агентские схемы (на примере английской LTD) и возможность использования прочих юрисдикций. * Эстонские, Датские, Нидерландские, Ирландские компании в торговых схемах. * Выплаты дивидендов и построение холдинговых структур с использованием Кипра * Финансирование через Кипр, Люксембург и Нидерланды (на примере займов и процентных выплат). * Правила тонкой капитализации и принцип недискриминации в схемах финансирования. Позиция судов. * (Суб)лицензионные договоры и выплаты роялти за использование прав интеллектуальной собственности. * Схемы владения недвижимостью через иностранные юридические лица. * Схемы, использования которых следует избегать 4. Конфиденциальность бизнеса: номинальные директора и акционеры, акции на предъявителя, трасты и фонды. * Номинальный сервис: * инструменты контроля номинальных директоров и номинальных акционеров; * лица, которым будут известны имена бенефициаров. * Могут ли налоговые органы РФ получить информацию о компании путем запроса в регистрирующие органы иностранного государства? * Акции на предъявителя: целесообразность применения. * Трасты/фонды как инструмент защиты активов и конфиденциальности. * "Подводные камни" при использовании номинального сервиса и трастов/фондов. 5. Открытие счетов на иностранные компании. * Какой иностранный банк выбрать? * Требования к держателям счетов: поиск наиболее лояльного банка. * Тарифы популярных кипрский и прибалтийских банков. * Рублевый счет в иностранном банке. Стоимость участия: 9000 рублей За более подробной информацuей обpащайтеcь по тел: Московский код; 792-2I22 **** +7 (495)- 7Ч29I-98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7364 bytes Desc: not available URL: From eugen at leitl.org Thu Jan 26 04:08:10 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 26 Jan 2012 13:08:10 +0100 Subject: [Freedombox-discuss] Moxie Marlinspike talk: Changing Threats To Privacy: From TIA To Google Message-ID: <20120126120810.GT7343@leitl.org> ----- Forwarded message from Rob van der Hoeven ----- From qjaaq at gmail.com Wed Jan 25 21:05:26 2012 From: qjaaq at gmail.com (“c q) Date: Thu, 26 Jan 2012 14:05:26 +0900 Subject: No subject Message-ID: <201201260505.q0Q55R8F029394@proton.jfet.org> 50万振込めます。 どちらにしても連絡下さい。私が電話にこだわ理由は、個人情報の漏洩の確立がメールに比べると下がるからです。それに声を聞いた時の安心感ってあると想いますからね。話した地点で気持ちが変わったらすぐ切ってもらって構いませんし、貴方がどうしてもというならお礼はお会いしてから渡す形でも構いません。どちらにしてもお返事を下さい。電話で構わないなら、いつでも掛けられます。お会いする方が良いなら、明日にでもお会いしましょう。どちらが良いですか http://kani63.info/sx3/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From mckinneynn at darkhorseagency.com Thu Jan 26 01:22:42 2012 From: mckinneynn at darkhorseagency.com (=?koi8-r?B?IuHOwdPUwdPJ0SDhzMXL08HOxNLP187BIg==?=) Date: Fri, 26 Jan 2012 14:52:42 +0530 Subject: =?koi8-r?B?8NLJx8zB28HFzSDXICLE0tXHz8og1MXB1NIiIA==?= Message-ID: <01ccdc3a$27bfd900$9a2ba97a@mckinneynn> "ДРУГОЙ ТЕАТР" представляет на сцене ДК имени Зуева (ул. Лесная 18) 28 января (суббота) спектакль "Страх мыльного пузыря" В ролях: Ксения АЛФЕРОВА, Егор БЕРОЕВ и др. -------------------- 29 января (воскресенье) Т. Стоппард "Розенкранц и Гильденстерн мертвы" В ролях: Анатолий БЕЛЫЙ, Евгений СТЫЧКИН, Григорий СИЯТВИНДА и др. Билеты - по цене театра, без комиссий и наценок. Возможна доставка. Тел: 8(499) 973..21..41 Театральное агентство "Рампа". From suzannealpha at hillsip.com Thu Jan 26 04:53:48 2012 From: suzannealpha at hillsip.com (Florinda Bulah) Date: Thu, 26 Jan 2012 15:53:48 +0300 Subject: TRY THIS! Penis enhancement pill helps increase sexual health for bigger, harder erections 1e9k1x2m8mb442x Message-ID: <4f214cdc.905c76d4@hillsip.com> World's Best Penis Pills - Virility Pills 100% Satisfaction Guaranteed Penis Enlargement, Clinically Proven Now in USA Buy 3 Get One Free, Buy 4 Get 2 Free Limited Time Only http://penisprohoof.ru From eugen at leitl.org Thu Jan 26 07:26:40 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 26 Jan 2012 16:26:40 +0100 Subject: [tor-talk] Fwd: ANONdroid Message-ID: <20120126152640.GZ7343@leitl.org> ----- Forwarded message from Paul Syverson ----- From eugen at leitl.org Thu Jan 26 09:30:49 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 26 Jan 2012 18:30:49 +0100 Subject: FBI releases plans to monitor social networks Message-ID: <20120126173049.GB7343@leitl.org> http://www.newscientist.com/blogs/onepercent/2012/01/fbi-releases-plans-to-monitor.html FBI releases plans to monitor social networks 20:10 25 January 2012 Cybersecurity Law Jim Giles, consultant (Image: Patrick George/Ikon Images/Getty) The US Federal Bureau of Investigation has quietly released details of plans to continuously monitor the global output of Facebook, Twitter and other social networks, offering a rare glimpse into an activity that the FBI and other government agencies are reluctant to discuss publicly. The plans show that the bureau believes it can use information pulled from social media sites to better respond to crises, and maybe even to foresee them. The information comes from a document released on 19 January looking for companies who might want to build a monitoring system for the FBI. It spells out what the bureau wants from such a system and invites potential contractors to reply by 10 February. The bureau's wish list calls for the system to be able to automatically search "publicly available" material from Facebook, Twitter and other social media sites for keywords relating to terrorism, surveillance operations, online crime and other FBI missions. Agents would be alerted if the searches produce evidence of "breaking events, incidents, and emerging threats". Agents will have the option of displaying the tweets and other material captured by the system on a map, to which they can add layers of other data, including the locations of US embassies and military installations, details of previous terrorist attacks and the output from local traffic cameras. The document suggests that the bureau wants to use social media to target specific users or groups of users. It notes that agents need to "locate bad actors...and analyze their movements, vulnerabilities, limitations, and possible adverse actions". It also states that the bureau will use social media to create "pattern-of-life matrices" -- presumably logs of targets' daily routines -- that will aid law enforcement in planning operations. The use of the term "publicly available" suggests that Facebook and Twitter may be able to exempt themselves from the monitoring by making their posts private. But the desire of the US government to watch everyone may still have an unwelcome impact, warns Jennifer Lynch at the Electronic Frontier Foundation, a San Francisco-based advocacy group. Lynch says that many people post to social media in the expectation that only their friends and followers are reading, which gives them "the sense of freedom to say what they want without worrying too much about recourse," says Lynch. "But these tools that mine open source data and presumably store it for a very long time, do away with that kind of privacy. I worry about the effect of that on free speech in the US". The document also suggests that the FBI thinks it can use social media to peer into the future. It notes that agents need to use social media to "[p]redict likely developments in the situation or future actions taken by bad actors (by conducting, [sic] trend, pattern, association, and timeline analysis)". The bureau declined to immediately comment on how this analysis might work, or on any other aspect of the document, but the idea of turning agents into digital soothsayers is plausible: researchers working at Facebook and in academia have shown that social media can be used to infer many things about an individual, including the existence of friendships that are not declared on social networking sites and the location of users who have not revealed where they are based. From measl at mfn.org Thu Jan 26 19:37:02 2012 From: measl at mfn.org (J.A. Terranson) Date: Thu, 26 Jan 2012 21:37:02 -0600 (CST) Subject: FBI releases plans to monitor social networks In-Reply-To: <20120126173049.GB7343@leitl.org> References: <20120126173049.GB7343@leitl.org> Message-ID: > http://www.newscientist.com/blogs/onepercent/2012/01/fbi-releases-plans-to-monitor.html > > FBI releases plans to monitor social networks > > 20:10 25 January 2012 > > Cybersecurity Law > > Jim Giles, consultant > > (Image: Patrick George/Ikon Images/Getty) > > The US Federal Bureau of Investigation has quietly released details of plans > to continuously monitor the global output of Facebook, Twitter and other > social networks, offering a rare glimpse into an activity that the FBI and > other government agencies are reluctant to discuss publicly. The plans show > that the bureau believes it can use information pulled from social media > sites to better respond to crises, and maybe even to foresee them. > > The information comes from a document released on 19 January looking for > companies who might want to build a monitoring system for the FBI. It spells > out what the bureau wants from such a system and invites potential > contractors to reply by 10 February. > > The bureau's wish list calls for the system to be able to automatically > search "publicly available" material from Facebook, Twitter and other social > media sites for keywords relating to terrorism, surveillance operations, > online crime and other FBI missions. Agents would be alerted if the searches > produce evidence of "breaking events, incidents, and emerging threats". > Agents will have the option of displaying the tweets and other material > captured by the system on a map, to which they can add layers of other data, > including the locations of US embassies and military installations, details > of previous terrorist attacks and the output from local traffic cameras. What I find incredibly myopic is the assumption that terrorists and other "bad actors" are likely to ue the services mentioned to facilitate their acts, whether good, bad, or fantasy. I doubt that the targets are actually the proposed "bad actors" mentioned in the RFP, but believe that it is Joe Sixpack, Jane Minorcriminal, and John Protester who are the actual points of interest of the FBI and its [few, and all lettered] friends. If we are really interested in bad actors of the classes suggested here, I think it's pretty much universally agreed that HUMINT is the standard bearer, and will remain so for the foreeable future - unless there is also some "plan" to have HUMINT tranliterated into Facebook and Twitter feeds, specifically to enable this kind of automated processing to proceed apace (*highly* doubtful, as such a plan would by definition require what is effectively a "public disclosure" of likely classified data streams from the various HUMINT sources). Again, look not at what the elephant on your throat *says* she wants to accomplish, but look rather to the Military Industrial Software Complex for the Actual Truth - to be released every day, right after the 3 Minute Hate. //Alif -- "A reputable physician does NOT: promise a cure; demand advance payment; advertise." [Capitalization as in original] [1936] U.S. Public Health Service poster alerting the public to the dangers of "Quack Cancer Cures" specifically, and "Quackery" in general. From shavonnelavern at ajlopez.com Thu Jan 26 14:59:26 2012 From: shavonnelavern at ajlopez.com (Mechelle Gregory) Date: Thu, 26 Jan 2012 21:59:26 -0100 Subject: Buy Here & Get Discount! #1 Penis Enlargement - Penis Enlargement Pills. am5w3tlpx7ui Message-ID: <87p55y47n31-90527374-988l9g97@z2z7iqn5hs> #1 Penis Enlargement - Penis Enlargement Pills. Gain up to 4 Inches or 6 Month Money Back Guarantee. Buy Here & Get Discount! http://penisprohotel.ru From yvettemaryln at activetelesource.com Fri Jan 27 07:26:49 2012 From: yvettemaryln at activetelesource.com (MagaliSadie) Date: Fri, 27 Jan 2012 08:26:49 -0700 Subject: $129 Replica Watches, Buy Cheap Replica Rolex Watches during Economic crisis and how to drive fashion? We specialize in top quality replica watches that are famous around the world. zoovf835kq Message-ID: <4f22c239.6df52b36@activetelesource.com> $129 Replica Watches, Buy Cheap Replica Rolex Watches during Economic crisis and how to drive fashion? We specialize in top quality replica watches that are famous around the world. Come to our online store to buy replica watches. http://finewatchcompany.ru From taunyakaye at addyourprofile.com Thu Jan 26 23:43:12 2012 From: taunyakaye at addyourprofile.com (Jannet Crystal) Date: Fri, 27 Jan 2012 08:43:12 +0100 Subject: Top rated hcg diet drops @ HCG Buy Direct, as seen on TV! fvhqaj2eouxymbhwjge2 Message-ID: <4f225590.19f5f898@addyourprofile.com> HCG Diet Drops - #1 Buy HCG Drops @ HCG Buy Direct HCG Buy Direct is your source for hcg diet drops. Top rated hcg diet drops @ HCG Buy Direct, as seen on TV! http://hcgcheapauto.ru From gertrudshantel at furnituremedic.com Fri Jan 27 08:21:49 2012 From: gertrudshantel at furnituremedic.com (Desirae Norman) Date: Fri, 27 Jan 2012 10:21:49 -0600 Subject: Express delivery USA to USA 1-3 days! VIAGRA 100mg/90pills $129 FREE Shipping! rqeho62sx2bqi3ph17 Message-ID: <201201271821.A7BCDB30F9F9D32CE051A@d33w42w1> VIAGRA 100mg/90pills $129 FREE Shipping! Generic Viagra, Cialis, Levitra Low Price! Express delivery USA to USA 1-3 days! http://onlinehealthpills.ru From snacks64 at roundpeg.com Thu Jan 26 20:14:54 2012 From: snacks64 at roundpeg.com (=?koi8-r?B?88XNyc7B0iDQzyDJ2s3FzsXOydHNICDXINfBzMDUxQ==?=) Date: Fri, 27 Jan 2012 13:14:54 +0900 Subject: =?koi8-r?B?7s/Xz8UgLfDP0tHEz8sgz9PV3cXT1NfMxc7J0SDXwczA1M7Px88gy8/O?= =?koi8-r?B?1NLPzNE=?= Message-ID: <2B0ADEA15318433F824451995C0B95A2@computer> ВНИМАНИЮ БАНКОВ, ФИНАНСОВЫХ, СТРАХОВЫХ КОМПАНИЙ - НОВЫЕ ИЗМЕНЕНИЯ ВСТУПИЛИ В СИЛУ Валютное регулирование и валютный контроль на современном этапе (ЦБ РФ) Валютное регулирование (ЦБ РФ) \Моск. код/ 792*21\2*2 : 8 (499) ЧЧ54095 31 Января 2012г. Лектор: начальник управления Департамента финансового Мониторинга и валютного контроля Банка России. 1. Система валютного регулирования и валютного контроля в Российской Федерации и валютный контроль уполномоченных банков. Федеральный закон "О валютном регулировании и валютном контроле" № 173-ФЗ (с изменениями и дополнениями, в том числе внесенными Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе"), императивные нормы. Регулирование порядка поведения валютных операций резидентами и нерезидентами, открытия и ведения резидентами счетов в банках, расположенных за пределами Российской Федерации. Режим счета, открытого за рубежом 2. ИЗМЕНЕНИЯ• Действие валютного законодательства в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе"? (не вступил в силу) и Федерального закона от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" 3. Порядок осуществления валютного контроля, установленный нормативными актами Банка России по валютному контролю. Инструкция Банка России № 117-И (с изменениями и дополнениями). Паспорта сделок, как документы валютного контроля. Проблемные вопросы оформления и ведения. Документы валютного контроля, учета и отчетности. Действия уполномоченных банков при оформлении и проведении валютных операций. Указание Банка России от 26.09.08 № 2080-У "О внесении изменений в Положение Банка России № 258-П". Основные сроки представления документов валютного контроля (с учетом изменений). Направление информации о правонарушениях и Положение ЦБ РФ от 20.07.2007 N 308-П. Указание Банка России "О формах учета по валютным операциям, осуществляемым резидентами, за исключением кредитных организаций и валютных бирж" №1950-У и его влияние на квалификацию правонарушений. Порядок открытия и ведения счетов резидентов за пределами территории РФ. Правила осуществления резидентами валютных операций за счет средств, находящихся на счетах за рубежом. Переводы резидентами средств на свои счета. 4. Положение Банка России от 29.12.2010 № 364-П “О порядке передачи уполномоченными банками и территориальными учреждениями Банка России в таможенные органы для выполнения ими функций агентов валютного контроля информации по паспортам сделок по внешнеторговым договорам (контрактам) в электронном виде”. Указание Банка России от 29.12.2012 № 2556-У “О внесении изменения в пункт 1.2 Положения Банка России от 1 июня 2004 года № 258-П“О порядке представления резидентами уполномоченным банкам подтверждающих документов и информации, связанных с проведением валютных операций с нерезидентами по внешнеторговым сделкам, и осуществления уполномоченными банками контроля за проведением валютных операци3. Указание Банка России от 29.12.2010 № 2557-У “О внесении изменений в Инструкцию Банка России от 15 июня 2004 года № 117-И “О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации при осуществлении валютных операций, порядке учета уполномоченными банками валютных операций и оформления паспортов сделок” 5. Регулирование порядка представления информации о нарушениях валютного законодательства. Положение ЦБ РФ от 20.07.2007 N 308-П И практика его применения (с учетом последних изменений). Постановление Правительства РФ от 24 февраля 2009 г. N 166 "О порядке представления органами и агентами валютного контроля в орган валютного контроля, уполномоченный Правительством Российской Федерации. Практика применения Положения Банка России №308-П на примере конкретных нарушений. 6. Валютное регулирование операций физических лиц. Операции физических лиц и валютный контроль уполномоченных банков. Нормы прямого действия Федерального закона № 173-ФЗ (в том числе заработная плата и командировочные расходы). Порядок осуществления переводов денежных средств физическими лицами из Российской Федерации и по территории Российской Федерации. "Близкородственные" переводы. Действие Инструкции Банка России № 136-И.в связи с внесением изменений и дополнений в Федеральный закон № 115-ФЗ "О противодействии легализации (отмыванию) доходов, полученных преступным путем и финансированию терроризма" Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" и в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе" 7. Ответственность за нарушение валютного законодательства. Федеральный Закон № 174-ФЗ. 8. Перспективы развития валютного регулирования и валютного контроля в Российской Федерации. Стоимость участия в семинаре 9970 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: (495) 79221_22 и (495) 792*2I\2.2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7751 bytes Desc: not available URL: From Cody.Elliot at postaldigital.com Fri Jan 27 03:50:29 2012 From: Cody.Elliot at postaldigital.com (Cody Elliot) Date: Fri, 27 Jan 2012 14:50:29 +0300 Subject: Make your wife happy with a new rock hard erection Message-ID: <33FA4EC4540FD91@byline.tt> The pills arrive in no time at all and you can get started http://themselves.rxmed-mall.ru From measl at mfn.org Fri Jan 27 15:29:26 2012 From: measl at mfn.org (J.A. Terranson) Date: Fri, 27 Jan 2012 17:29:26 -0600 (CST) Subject: CagePrisoners Newsletter Message-ID: www.cageprisoners.com ( http://www.cageprisoners.com/ ) DAVID CAMERON CALLS FOR THE REFORM OF THE EUROPEAN COURT OF HUMAN RIGHTS: HIS DANGEROUS DOUBLESPEAK FAILS MUSLIMS, AND FAILS TO HONOUR THE MEMORY OF THE HOLOCAUST In his speech on Wednesday calling for the reform of the European Court of Human Rights (ECHR), David Cameron engaged in some dangerous doublespeak. * Read more... ( /index.php?option=com_k2&view=item&id=3358&Itemid=999 ) HOW THE NATIONAL DEFENSE AUTHORIZATION ACT ALLOWS THE PRESIDENT TO RELEASE PRISONERS FROM GUANTCB!NAMO While I was in the US two weeks ago, for the 10th anniversary of the opening of the b war on terrorb prison at GuantC!namo Bay, there was great deal of understandable outrage amongst activists b both those on the left, and libertarians b because of outrageous provisions in the National Defense Authorization Act of 2012 (PDF), which was passed by the Senate on December 15, and was signed into law by President Obama on December 31. * Read more... ( /index.php?option=com_k2&view=item&id=3357&Itemid=999 ) VIDEO: TUNISIAN FREED FROM GUANTCB!NAMO CALLS FOR THE RETURN OF HIS COMPATRIOTS To mark the 10th anniversary of the opening of the b war on terrorb prison at GuantC!namo Bay, both Al-Jazeera and the Guardian turned their attention to the fate of the five Tunisians still held in GuantC!namo, who I wrote about almost exactly a year ago, after the unexpected fall of the dictator Zine El-Abidine Ben Ali, and the beginning of the revolutionary movements in the Middle East. * Read more... ( /index.php?option=com_k2&view=item&id=3348&Itemid=999 ) PRESS RELEASE: NEW SYSTEM OF TPIMS RETAINS ALL THE FAILINGS OF CONTROL ORDERS CagePrisonersB is concerned that the new system of Terrorism Prevention and Investigation Measures (TPIMs) appears in substance to be nothing but control orders rebranded. * Read more... ( /index.php?option=com_k2&view=item&id=3340&Itemid=999 ) AVIVA STAHL INTERVIEWS AMEENA QAZI Aviva Stahl interviews Ameena Qazi, Deputy Executive Director and Staff Attorney for the Council of American Relations - Los Angeles. * Read more... ( /index.php?option=com_k2&view=item&id=3320&Itemid=999 ) GUANTANAMO REMEMBERED: THE ONES LEFT BEHIND Freed Guantanamo prisoners and their families moving recollections of the men still held at the prison camp - 10 years on. * Read more... ( /index.php?option=com_k2&view=item&id=3293&Itemid=999 ) EX-GUANTANAMO DETAINEE DEFENSE TEAM RECEIVES AWARD NEW YORK, Jan 26 (Reuters) - Lawyers who defended the only former Guantanamo detainee to be tried in a U.S. federal court received an award on Thursday for "promoting integrity in the criminal justice system." * Read more... ( /index.php?option=com_k2&view=item&id=3355&Itemid=999 ) PRESS RELEASE: CAGEPRISONERS QUESTIONS BRITISH COMPLICITY IN THE ASSASSINATION OF BELAL EL-BERJAWI The news that British citizen, Belal el-Berjawi, has been assissinated by a US unmanned aerial vehicle in SomaliaB has raised some important questions regarding British complicity in extrajudicial killings. * Read more... ( /index.php?option=com_k2&view=item&id=3319&Itemid=999 ) Connect with us: Facebook ( http://www.facebook.com/#!/pages/Cageprisoners/122052607808255 ) Twitter ( http://twitter.com/#!/cageprisoners ) Cageprisoners Ltd 27 Old Gloucester Street London WC1N 3XX Tel: (+44) 203 167 4416 From savannahmarica at iaai.com Fri Jan 27 08:14:45 2012 From: savannahmarica at iaai.com (MELANIE SHERLENE) Date: Fri, 27 Jan 2012 18:14:45 +0200 Subject: Buy VIAGRA at EXTRA LOW PRICES. Wide variety of generic and brand VIAGRA packages. c0yoom1wn1j21 Message-ID: <33t29n72q53-39661393-212c6b69@xvytzuzmoo> SPECIAL OFFER : VIAGRA on SALE at $1.09 !!! Buy VIAGRA at EXTRA LOW PRICES. Wide variety of generic and brand VIAGRA packages. BEST quality generic VIAGRA with 100% satisfaction guaranteed! http://onlinehealthmeds.ru From lashaynorma at j-rautobodysupply.com Fri Jan 27 10:49:27 2012 From: lashaynorma at j-rautobodysupply.com (CaroleeKatelyn) Date: Fri, 27 Jan 2012 23:49:27 +0500 Subject: Lowest prices and Satisfaction Guaranteed. Buy Viagra, Cialis, Levitra nkq5r36ovnhy2me37s Message-ID: <201201271749.F00BDDE8A6FE45FAD0DA3BC@628lr0q91> Buy Viagra, Cialis, Levitra - Cheap Generic Cialis Without Prescription 10 Free Viagra Pills. Order cheap Cialis plus many other generic Cialis erectile dysfunction drugs. Lowest prices and Satisfaction Guaranteed http://med2012-pills.ru From yokomarkita at glassoc.com Fri Jan 27 20:00:55 2012 From: yokomarkita at glassoc.com (Sylvia Joanie) Date: Sat, 28 Jan 2012 00:00:55 -0400 Subject: Generic Viagra, Cialis, Levitra Low Price! Express delivery USA to USA 1-3 days! xhg26jg3m62f2d3 Message-ID: <92v35n27a28-57528991-441d8k75@fsjbcahytm> VIAGRA 100mg/90pills $129 FREE Shipping! Generic Viagra, Cialis, Levitra Low Price! Express delivery USA to USA 1-3 days! http://onlinemedicinetablets.ru From judejanella at marshmc.com Fri Jan 27 14:08:18 2012 From: judejanella at marshmc.com (Joselyn Glynda) Date: Sat, 28 Jan 2012 00:08:18 +0200 Subject: Generic Viagra, Cialis, Levitra Low Price! Express delivery USA to USA 1-3 days! bs4fd912alye Message-ID: <201201271507.ACB5320B68870F9DCBE6FAD@05hie0h> VIAGRA 100mg/90pills $129 FREE Shipping! Generic Viagra, Cialis, Levitra Low Price! Express delivery USA to USA 1-3 days! http://onlinehealthpills.ru From claudeflorinda at egroups.com Fri Jan 27 15:27:52 2012 From: claudeflorinda at egroups.com (DENESE) Date: Sat, 28 Jan 2012 01:27:52 +0200 Subject: Come to our online store to buy replica watches for only $129 x2ir7a2zxeg Message-ID: <27i36l75d59-00783079-358o7u30@fdnelkba> $129 Replica Watches, Buy Cheap Replica Rolex Watches during Economic crisis and how to drive fashion? We specialize in top quality replica watches that are famous around the world. Come to our online store to buy replica watches. http://finewatchlead.ru From wanitapamala at abunayyangroup.com Fri Jan 27 12:38:36 2012 From: wanitapamala at abunayyangroup.com (RefugiaMerlene) Date: Sat, 28 Jan 2012 03:38:36 +0700 Subject: Generic Viagra, Cialis, Levitra Low Price! Express delivery USA to USA 1-3 days! r9b44dxqp4c21bn2 Message-ID: <49f82c37j77-99308443-064i3x15@hytbokgqw> VIAGRA 100mg/90pills $129 FREE Shipping! Generic Viagra, Cialis, Levitra Low Price! Express delivery USA to USA 1-3 days! http://pharmacypillstech.ru From lavoneira at ndtv.com Sat Jan 28 02:00:58 2012 From: lavoneira at ndtv.com (CARRIE JUSTA) Date: Sat, 28 Jan 2012 06:00:58 -0400 Subject: BEST quality generic VIAGRA with 100% satisfaction guaranteed! VIAGRA on SALE at $1.09 65f4dkf3j7eb3a Message-ID: <201201280257.4A5C283263B3C44154B468@r95eqhn726> SPECIAL OFFER : VIAGRA on SALE at $1.09 !!! Buy VIAGRA at EXTRA LOW PRICES. Wide variety of generic and brand VIAGRA packages. BEST quality generic VIAGRA with 100% satisfaction guaranteed! http://onlinehealthpharmacy.ru From agneslouie at cpships.com.jfet.org Fri Jan 27 21:10:53 2012 From: agneslouie at cpships.com.jfet.org (Vickie) Date: Sat, 28 Jan 2012 07:10:53 +0200 Subject: Risk free 60-day money back guarantee. Enlarge your penis size up to 3-4 Inches in length and up to 25% in girth 27j7jjxjerw4351 Message-ID: <80n87i98z19-27427680-327e6c53@gcsrvahsz> Penis Enlargement Pills - $59.95 Enlarge your penis size up to 3-4 Inches in length and up to 25% in girth with most powerful and 100% Natural and Safe Mandhood Penis Enlargement Pills. Risk free 60-day money back guarantee. http://best-penispot.ru From njkn at gmail.com Fri Jan 27 17:35:36 2012 From: njkn at gmail.com (n a) Date: Sat, 28 Jan 2012 10:35:36 +0900 Subject: No subject Message-ID: <201201280135.q0S1ZXAv009155@proton.jfet.org> 【参加無料】お金に困った女性妻達のデリバリーSEXサービス 《平均大1枚〜》 お金に困った女性が貴方のお宅でデリバリーSEXしに伺います!! 家賃が払えない、子供の給食費を稼ぎたいなど当サイトにはそんな 哀れな女性や人妻達も多数参加しています。 当サイトに参加して彼女達の生活を少しでも楽にしてあげてくれま せんか? http://kamo10.info/sokukan/ 当サイトに参加している女性は全員素人なので全員SEXが上手い とはいえませんがその代わりしっかりご奉仕するはずです。 心優しい貴方様のご参加お待ちいてます。 http://kamo10.info/sokukan/ このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From reputev84 at rothart.com Sat Jan 28 05:56:39 2012 From: reputev84 at rothart.com (=?koi8-r?B?7sHMz8fP19nFINPIxc3Z?=) Date: Sat, 28 Jan 2012 22:56:39 +0900 Subject: =?koi8-r?B?68HLIMnT0M/M2NrP18HU2CD6wdTSwdTZINcgzsHMz8fByA==?= Message-ID: <000d01ccddc4$a85987b0$6400a8c0@reputev84> Тридцать первого января 2012 года Затратные механизмы в налоговых схемах: обоснование, документальное оформление, деловые цели и легенды код (495) - 7/Ч2.91_98 : 8 (499) Ч45/Ч0\95 Цель: Курс посвящен изучению затратных механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Рассмотрено новое законодательство по контролю за ценами, его влияние на схемы с использованием затратных инструментов. Участники получат краткие индивидуальные консультации по тематике курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные", "серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов √ ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием; * зарубежные оффшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций; * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС. * Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы; * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере; * платежи за использование объектов основных средств и нематериальных активов, в т.ч. франчайзинговые; * штрафные санкции, возмещение убытков, включая демередж и прочий простой; * платежи за увеличенный срок и/или объем гарантийных обязательств; * плата за залог или поручительство, делькредере. 4. Виды приемлемых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. 5. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 6. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен, уход от контроля за ценой сделок по новым правилам трансфертного ценообразования. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 7. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 8. Ответы на вопросы. По желанию и при наличии возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц. Стоимость участия: 9 000 рублей Информацию можно получить по телефонам: 8 Моск. код: 79221\22 : (код Москвы) 79221.22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6898 bytes Desc: not available URL: From mika at portwise.com Sat Jan 28 23:27:44 2012 From: mika at portwise.com (=?koi8-r?B?IufP09XEwdLT1NfFzs7ZyiDJIM3VzsnDydDBzNjO2cog2sHLwdouIg==?= =?koi8-r?B?A===?=) Date: Sun, 28 Jan 2012 23:27:44 -0800 Subject: =?koi8-r?B?58/T1cTB0tPU18XOztnKINrBy8HaIC0g8+zv9u755SD37/Dy7/P5?= Message-ID: <01ccde14$6f9a5800$7da1c875@mika> КОМУ: Специалисту по работе с ГОСЗАКАЗОМ Уважаемые коллеги! Информируем вас, что 27 февраля 2012 года в Санкт-Петербурге состоится КОНФЕРЕНЦИЯ по теме: Сложные вопросы Г О С У Д А Р С Т В Е Н Н О Г О З А К А З А в 2012 году По вопросам участия обращайтесь в оргкомитет: 8 812 6Ч2 01 Ч8 Краткая программа конференции: *************************************** 1. Правовые основы оспаривания размещения государственного и муниципального заказа. 2. Практика оспаривания: - хода проведения торгов - определения победителя 3. Проблемные ситуации. 4. Анализ конкретных арбитражных дел, типичных для текущей судебно-арбитражной практики. 5. Круглый стол. Ответы на вопросы. *************************** С уважением, Пахомова Валерия Викторовна оргкомитет конференций Тел. (812) 6Ч2-01-Ч8 From broadsidingyf at roicorp.com Sat Jan 28 18:32:45 2012 From: broadsidingyf at roicorp.com (=?koi8-r?B?7s/X2cog2sHLz84gzyDXwczA1MU=?=) Date: Sun, 29 Jan 2012 05:32:45 +0300 Subject: =?koi8-r?B?987JzcHOycAgwsHOy8/XLCDGyc7BztPP19nILCDT1NLByM/X2cggy8/N?= =?koi8-r?B?0MHOyco=?= Message-ID: ВНИМАНИЮ БАНКОВ, ФИНАНСОВЫХ, СТРАХОВЫХ КОМПАНИЙ - НОВЫЕ ИЗМЕНЕНИЯ ВСТУПИЛИ В СИЛУ Регулирование валютного законодательства и и валютный контроль Валютное регулирование (ЦБ РФ) 8 (499) 4Ч5ЧО95 <<>> (Ч95) 792*2I22 31 Января 2012г. Лектор: начальник управления Департамента финансового Мониторинга и валютного контроля Банка России. 1. Система валютного регулирования и валютного контроля в Российской Федерации и валютный контроль уполномоченных банков. Федеральный закон "О валютном регулировании и валютном контроле" № 173-ФЗ (с изменениями и дополнениями, в том числе внесенными Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе"), императивные нормы. Регулирование порядка поведения валютных операций резидентами и нерезидентами, открытия и ведения резидентами счетов в банках, расположенных за пределами Российской Федерации. Режим счета, открытого за рубежом 2. ИЗМЕНЕНИЯ• Действие валютного законодательства в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе"? (не вступил в силу) и Федерального закона от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" 3. Порядок осуществления валютного контроля, установленный нормативными актами Банка России по валютному контролю. Инструкция Банка России № 117-И (с изменениями и дополнениями). Паспорта сделок, как документы валютного контроля. Проблемные вопросы оформления и ведения. Документы валютного контроля, учета и отчетности. Действия уполномоченных банков при оформлении и проведении валютных операций. Указание Банка России от 26.09.08 № 2080-У "О внесении изменений в Положение Банка России № 258-П". Основные сроки представления документов валютного контроля (с учетом изменений). Направление информации о правонарушениях и Положение ЦБ РФ от 20.07.2007 N 308-П. Указание Банка России "О формах учета по валютным операциям, осуществляемым резидентами, за исключением кредитных организаций и валютных бирж" №1950-У и его влияние на квалификацию правонарушений. Порядок открытия и ведения счетов резидентов за пределами территории РФ. Правила осуществления резидентами валютных операций за счет средств, находящихся на счетах за рубежом. Переводы резидентами средств на свои счета. 4. Положение Банка России от 29.12.2010 № 364-П “О порядке передачи уполномоченными банками и территориальными учреждениями Банка России в таможенные органы для выполнения ими функций агентов валютного контроля информации по паспортам сделок по внешнеторговым договорам (контрактам) в электронном виде”. Указание Банка России от 29.12.2012 № 2556-У “О внесении изменения в пункт 1.2 Положения Банка России от 1 июня 2004 года № 258-П“О порядке представления резидентами уполномоченным банкам подтверждающих документов и информации, связанных с проведением валютных операций с нерезидентами по внешнеторговым сделкам, и осуществления уполномоченными банками контроля за проведением валютных операци3. Указание Банка России от 29.12.2010 № 2557-У “О внесении изменений в Инструкцию Банка России от 15 июня 2004 года № 117-И “О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации при осуществлении валютных операций, порядке учета уполномоченными банками валютных операций и оформления паспортов сделок” 5. Регулирование порядка представления информации о нарушениях валютного законодательства. Положение ЦБ РФ от 20.07.2007 N 308-П И практика его применения (с учетом последних изменений). Постановление Правительства РФ от 24 февраля 2009 г. N 166 "О порядке представления органами и агентами валютного контроля в орган валютного контроля, уполномоченный Правительством Российской Федерации. Практика применения Положения Банка России №308-П на примере конкретных нарушений. 6. Валютное регулирование операций физических лиц. Операции физических лиц и валютный контроль уполномоченных банков. Нормы прямого действия Федерального закона № 173-ФЗ (в том числе заработная плата и командировочные расходы). Порядок осуществления переводов денежных средств физическими лицами из Российской Федерации и по территории Российской Федерации. "Близкородственные" переводы. Действие Инструкции Банка России № 136-И.в связи с внесением изменений и дополнений в Федеральный закон № 115-ФЗ "О противодействии легализации (отмыванию) доходов, полученных преступным путем и финансированию терроризма" Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" и в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе" 7. Ответственность за нарушение валютного законодательства. Федеральный Закон № 174-ФЗ. 8. Перспективы развития валютного регулирования и валютного контроля в Российской Федерации. Стоимость участия в семинаре 9970 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (код Москвы) 742*9198 <<>> 8 Моск. код: 7922122 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7755 bytes Desc: not available URL: From vonniecari at kansas.net Sun Jan 29 03:18:38 2012 From: vonniecari at kansas.net (DELENA) Date: Sun, 29 Jan 2012 06:18:38 -0500 Subject: HCG Diet Drops - Message-ID: <4f252b0e.8d5d5ae2@kansas.net> HCG Diet Drops - #1 Buy HCG Drops @ HCG Buy Direct HCG Buy Direct is your source for hcg diet drops. Top rated hcg diet drops @ HCG Buy Direct, as seen on TV! http://hcg-lossweightshop.ru From xochitleleanora at saeca.com Sat Jan 28 15:38:46 2012 From: xochitleleanora at saeca.com (RaeleneLane) Date: Sun, 29 Jan 2012 06:38:46 +0700 Subject: SPECIAL OFFER: VIAGRA on SALE at $1.09 !!! Buy VIAGRA at EXTRA LOW PRICES. Wide variety of generic and brand VIAGRA packages. nrs7ji1y5nkd1lqci9 Message-ID: <81a64s55y13-02199833-480m8g99@uqtkjqdw> SPECIAL OFFER : VIAGRA on SALE at $1.09 !!! Buy VIAGRA at EXTRA LOW PRICES. Wide variety of generic and brand VIAGRA packages. BEST quality generic VIAGRA with 100% satisfaction guaranteed! http://onlinehealthtech.ru From clarajeanna at cpdns.net Sun Jan 29 03:55:30 2012 From: clarajeanna at cpdns.net (Carmella Lera) Date: Sun, 29 Jan 2012 07:55:30 -0400 Subject: SPECIAL OFFER: VIAGRA on SALE at $1.09 !!! Buy VIAGRA at EXTRA LOW PRICES. Wide variety of generic and brand VIAGRA packages. qzk05edmpyzd2pn0ux Message-ID: <4f2533b2.dd3cbe56@cpdns.net> SPECIAL OFFER : VIAGRA on SALE at $1.09 !!! Buy VIAGRA at EXTRA LOW PRICES. Wide variety of generic and brand VIAGRA packages. BEST quality generic VIAGRA with 100% satisfaction guaranteed! http://onlinemedicbuy.ru From azaleegudrun at visionsolutions.com Sun Jan 29 01:05:12 2012 From: azaleegudrun at visionsolutions.com (Maryanne Tracy) Date: Sun, 29 Jan 2012 10:05:12 +0100 Subject: Wotld Top Penis Enlargement Pills. Gain up to 4 Inches or 6 Month Money Back Guarantee. 3op3pdbakms Message-ID: <57z12g78r44-55550325-966y5m75@vervw8rzbn> #1 Penis Enlargement - Penis Enlargement Pills. Gain up to 4 Inches or 6 Month Money Back Guarantee. Buy Here & Get Discount! http://bestenlargementtwo.ru From marie-francoise.simeoni at laposte.ca Sun Jan 29 03:35:54 2012 From: marie-francoise.simeoni at laposte.ca (=?koi8-r?B?IufP09XEwdLT1NfFzs7ZyiDJIM3VzsnDydDBzNjO2cog2sHLwdouIg==?= =?koi8-r?B?A===?=) Date: Mon, 29 Jan 2012 12:35:54 +0100 Subject: =?koi8-r?B?88zP1s7ZxSDXz9DSz9PZIOfv8/rh6+H64Q==?= Message-ID: <01ccde82$8aa3b100$4eb34a54@marie-francoise.simeoni> КОМУ: Специалисту по работе с ГОСЗАКАЗОМ Уважаемые коллеги! Информируем вас, что 27 февраля 2012 года в Санкт-Петербурге состоится КОНФЕРЕНЦИЯ по теме: Сложные вопросы Г О С У Д А Р С Т В Е Н Н О Г О З А К А З А в 2012 году По вопросам участия обращайтесь в оргкомитет: 8 812 6Ч2 01 Ч8 Краткая программа конференции: -------- 1. Правовые основы оспаривания размещения государственного и муниципального заказа. 2. Практика оспаривания: - хода проведения торгов - определения победителя 3. Проблемные ситуации. 4. Анализ конкретных арбитражных дел, типичных для текущей судебно-арбитражной практики. 5. Круглый стол. Ответы на вопросы. *********************************************** С уважением, Пахомова Валерия Викторовна оргкомитет конференций Тел. (812) 6Ч2-01-Ч8 From martyn at stanford.edu Sun Jan 29 15:43:54 2012 From: martyn at stanford.edu (Martyn Williams) Date: Sun, 29 Jan 2012 15:43:54 -0800 Subject: [liberationtech] How secure is Bluetooth? Message-ID: Brian, > Again this is of course based on the assumption current technology cannot effectively monitor all 79 channels constantly for the duration of the call. However it also makes the assumption the data packets can be reconstructed into audio. Are you familiar with SDRs software defined radios? These are capable of monitoring a chunk of radio spectrum continuously. They're becoming very popular in amateur radio because they can monitor a band and visually indicate where the signals exist. I have one on my desk that works over 200kHz on frequencies up to 30MHz. The Bluetooth band is much higher in frequency and occupies 80MHz of spectrum. There's at least one SDR out there that can handle a 20MHz chunk of spectrum so, in theory, it could continuously monitor 1/4 of the Bluetooth band. Four radios (each a few thousand dollars) and some PCs and you might be able to monitor the whole band. You'd have to put the packets back together. I expect the difficulty of that depends on how noisy or quiet the Bluetooth spectrum is where the device is being used. If there isn't much traffic, it might be easy to match the packets together. Presumably the hopping works so that a transmission begins on one channel immediately after one ends on another. That might be enough to match them. You could also use the power level to help narrow down transmissions that might match each other. I have no idea if this would work in practice. Realtime would be more difficult than delayed processing. It's a potential method anyway. In reality it might be that the 2.4GHz band, which is also full of WiFi and other low power unlicensed radio stuff, is too noisy to do this easily. Even if you did get all the packets, you're still let with the encryption of the data. My point is, using SDRs it's possible to monitor a chuck of spectrum - not just one channel - continuously. Martyn -- Martyn Williams 2012 John S. Knight Journalism Fellow Stanford University Cell: 650-391-4868 @martyn_williams _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From angelinesabina at hillsip.com Sun Jan 29 09:19:16 2012 From: angelinesabina at hillsip.com (TaraJodee) Date: Sun, 29 Jan 2012 17:19:16 +0000 Subject: Lowest prices and Satisfaction Guaranteed. Buy Viagra, Cialis, Levitra n65qc3y6mo Message-ID: <201201292120.2F06D14BF9FFA95FD666AB1@3g6kl42k2> Buy Viagra, Cialis, Levitra - Cheap Generic Cialis Without Prescription 10 Free Viagra Pills. Order cheap Cialis plus many other generic Cialis erectile dysfunction drugs. Lowest prices and Satisfaction Guaranteed http://pillsmed2012.ru From mpm at selenic.com Sun Jan 29 15:52:12 2012 From: mpm at selenic.com (Matt Mackall) Date: Sun, 29 Jan 2012 17:52:12 -0600 Subject: [liberationtech] How secure is Bluetooth? Message-ID: On Sun, 2012-01-29 at 14:47 -0800, Brian Conley wrote: > Thanks Jacob, > > I expected you'd reply thusly. The implementation I'm talking about > doesn't appear to be compromised based on what I've read in the links > you've provided. The first link, from usenix, seems to be most > damning, however doesn't appear to suggest that the packets from a > voice call can be put back together in such a way they can be listened > to. Even if that is true, it appears based on what I'm reading that, > at most, current tools as of that paper, would only enable yo to > listen to, at most, 2.4 seconds of audio from a one minute call. Ok, so two academics in '07 get 90% of the way to a fully-working attack, but are stymied by a silly timing limitation in the software-defined radio they had on hand. They could trivially fix it by dropping another $1k on a second USRP for leapfrogging to the next channel, given that they _have exposed the hopping pattern_. And you conclude... "not compromised". Huh. I conclude "compromised for all practical purposes": I could take their paper and $2000 and build a fully-working attack if I had the motivation. As could any motivated interception capability vendor. Odds that this capability already exists: rapidly approaching unity. Also note that recording the traffic on all 79 3Mbit/s channels is trivially within the capabilities of any organization that designs its own hardware. This IC has programmable hop parameters and is < $5: www.atmel.com/atmel/acrobat/doc1612.pdf Slapping 79 of those on a board with a high-gain antenna and a USB interface left as an exercise for the reader. -- Mathematics is the supreme nostalgia of our time. _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From elsakandace at toto.net Sun Jan 29 06:18:31 2012 From: elsakandace at toto.net (BERNIECE SHARRON) Date: Sun, 29 Jan 2012 18:18:31 +0400 Subject: Buy VIAGRA at EXTRA LOW PRICES. Wide variety of generic and brand VIAGRA packages. k0dtmf2pdmspv7454ff Message-ID: <4f255537.eb12aff7@toto.net> SPECIAL OFFER : VIAGRA on SALE at $1.09 !!! Buy VIAGRA at EXTRA LOW PRICES. Wide variety of generic and brand VIAGRA packages. BEST quality generic VIAGRA with 100% satisfaction guaranteed! http://onlinemedicinedrugs.ru From louannantonia at blazenetme.net Sun Jan 29 13:20:48 2012 From: louannantonia at blazenetme.net (Allyson Gertrude) Date: Sun, 29 Jan 2012 21:20:48 +0000 Subject: Best price for even small orders. Cialis at $1.30 per pill for any order size and No Rx plqdai1wwcz Message-ID: <31f47p63f33-01343805-142h1w91@muqabqn> Cialis 20mg - $1.30 Any Order Size No Rx Best price for even small orders. Cialis at $1.30 per pill for any order size and No Rx http://healthdosespills.ru From jacob at appelbaum.net Sun Jan 29 22:23:07 2012 From: jacob at appelbaum.net (Jacob Appelbaum) Date: Sun, 29 Jan 2012 22:23:07 -0800 Subject: [liberationtech] How secure is Bluetooth? Message-ID: On 01/29/2012 04:09 PM, Brian Conley wrote: > See my first email please. > > Are there any documented cases of monitoring the audio transmitted between > a Bluetooth headset and phone. I guess you're looking for some personal stories or big news stories? > > I am quite aware that Bluetooth is not safe for a variety of reasons. > Please note that your users will likely be targeted by cops with FinFisher: http://speciali.espresso.repubblica.it/pdf/spyfiles/it-intrusion.pdf > When preparing advice for non technical people with very real security > problems that are known, its important to provide the best advice about > what is not known in their situation. I've been unable to find any > information on the viability of intercepting audio transmissions, even the > 2007 article doesn't appear to suggest for certain that they could > reconstruct the audio file, merely that the potential might be there. > Audio is a weird way to frame it. You have devices that communicate with Bluetooth (TM) use common cryptography and protocols. The crypto is busted: http://en.wikipedia.org/wiki/E0_(cipher) This is a pretty funny read: http://en.wikipedia.org/wiki/Bluetooth#Security Overall, I think it's important to note that even if a device wasn't used in a discoverable mode, a sniffer can at least passively track and try to exploit devices nearby after seeing them transmit. This is likely similiar to Bluejacking: http://en.wikipedia.org/wiki/Bluejacking Here's a project that uses a car as an audio bug: http://trifinite.org/trifinite_stuff_carwhisperer.html > I'm only asking if anyone has heard of documented cases of listening in to > Bluetooth audio. So far it only seems to happen if there is a prior exploit > in place and that doesn't even appear to be definitive. R&S sells a solution to sniff traffic between two devices: http://www2.rohde-schwarz.com/file_13603/Bluetooth_Sniffer_v2.4.pdf "In an active Piconet, where at least two Bluetooth. devices (one master, one or more slaves) interact with each other, the USB dongle is air sniffing the communication between those. This analysis is required to check interoperability of Bluetooth. devices from different vendors and to troubleshoot problems by detailed protocol decoding" Those guys also sell IMSI-catchers if you're in the market... This "Decrypting Encrypted Bluetooth data with FTS4BT" is also a good read: http://www.fte.com/docs/encryption%20and%20decryption%20in%20fts4bt.pdf Basically, the FTS4BT just needs the pin to decrypt the data and that's where h1kari's work comes in: http://openciphers.sourceforge.net/oc/ http://openciphers.sourceforge.net/oc/btpincrack.php Bluetooth Pin Cracking Core says: "The bluetooth pin cracking core implements the basic bluetooth pin cracking attack by generating possible PINs and running then through SAFER+ to verify if they are correct or not. This uses the pipelined implementation of SAFER+ and loops the output of the pipeline back into itsself 7 times to perform all of the E21/E22/E1 functions. The max clock speed we've been able to run it at on an E-12 is 75MHz which results in ~10 million PINs per second compared to roughly 40k on a modern CPU." the openciphers project supports the protocol analyser files produced by these devices: http://www.lecroy.com/protocolanalyzer/?capid=103&mid=511 This does HCI and air interface sniffing in sync: http://www.connectblue.com/products/sniffer-protocol-analyzers/bluetooth-sniffer-protocol-analyzer/ Note the features of that one: "Extracts Audio into WAV files: Supports A2DP, HSP & HF Profiles with playback for rapid quality check or performing a more detailed analysis" And if all of that doesn't convince you that someone can sniff Bluetooth - I encourage you to read this student's web page: http://nap.cse.bgu.ac.il/home/index.php/Bluetooth_Sniffing This seems to be the best buy for your money: http://compare.ebay.com/like/150735473216?var=lv<yp=AllFixedPriceItemTypes&var=sbar $799.99 for the LeCroy Merlin CATC Mobile Bluetooth Protocol Analyzer seems like a deal. Even cheaper than the USRP! If you're looking for other devices for BT sniffing, I also found this: http://www.palowireless.com/bluearticles/bluetoothanalyzercompare1.asp And finally - the Ellisys equipment: http://www.ellisys.com/products/bex400/revolution.php "The new Ellisys All-Channel sniffer robustly records any packet, at any time, from any neighboring piconet, with zero-configuration and without being intrusive." http://www.ellisys.com/products/bex400/ has the best quote: "Determine PIN codes automatically and decrypt the data on the fly" Two nice photos of the device and software: http://www.ellisys.com/archive/images/bex400.png http://www.ellisys.com/archive/images/bex400_soft.png All the best, Jacob _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jacob at appelbaum.net Sun Jan 29 23:45:50 2012 From: jacob at appelbaum.net (Jacob Appelbaum) Date: Sun, 29 Jan 2012 23:45:50 -0800 Subject: [liberationtech] How secure is Bluetooth? Message-ID: On 01/29/2012 11:05 PM, Brian Conley wrote: > Thanks Jacob, > > I was looking for documentation from someone who has done it, had it done > to them, or is offering a product for sale. > > All I had found previously was documentation about sniffing, which is of > course well known. The FinBluez is interesting, however there are only 3 > references in google, one to the document you linked that says it will be > available in 2008. Either it never came out, or was renamed. > The FinFisher guys wrote this paper ages ago: http://www.remote-exploit.org/research/busting-bluetooth-myth.pdf (now gone) Here's a mirror: bluetooth-pentest.narod.ru/doc/busting_bluetooth_myth_sniffer.pdf The best quote is here: "Introduction During the last year, rumours had come to my attention that apparently it is possible to transform a standard 30USD Bluetooth. dongle into a full-blown Bluetooth. sniffer. Thinking you absolutely need Hardware to be able to hop 79 channels 1600 times a second I was rather suspicious about these claims." Basically, he took a $30 bluetooth device and constructed a sniffer that works with downloadable software. > However it seems clear that Ellisys and ConnectBlue both at least claim to > offer products that will do this. I was surprised that I found it so > difficult to locate something like this, since it seemed very likely it > existed. > Yeah - the fact that FinFisher offers it should cause concern. > Which brings us to the next question, what is the feasibility or likelihood > that an unknown individual, communicating via a bluetooth headset and > otherwise over secure means, can be located, targetted, and intercepted? > What's your threat model? It's impossible to meaningfully answer that question in the abstract. "It's feasible and likely" if the target warrants it and "possible" for a kiddie in a cafe. > Although there are documented accounts of located bluetooth signals from a > kilometer+ away, would it be reasonable to create such a device in > combination with one of the sniffers that will decode audio on the fly? > That sounds reasonable to me, though it seems a limited enough use-case > that its unlikely its been developed, but much more unlikely to be refined > and distributed widely. > I'm sure some of the cell phone intercept gear already does this as a bonus add on feature - probably in shopping malls for tracking movements. > I would not be surprised if American intelligence agents might have > something like this, though in some ways it seems more likely governments > in countries more prone to bluetooth sharing would be more likely to have > developed such a tool, however it still seems very unlikely. > FinFisher sells it and so governments have it. We know the Egyptians had it, I bet they had the Bluetooth module but I'm not certain. > The case I am considering here is something like this: > > Jane is an activist who is communicating via a phone that, for our > purposes, is secure except for her decision to use a bluetooth headset. > Jane is not a known activist nor likely to be targeted for special > monitoring. However the authorities are on a heightened sense of alert and > looking for activists. She makes, at most, one call per day, at different > times of the day, and from different locations. Her phone calls are kept > short, less than three minutes whenever possible, and certainly less than > five. Jane uses a Bluetooth headset because she wishes to be less > conspicuous making her phone call. Jane has patterns - Jane should use a connected headset and Jane will be better off. > > So what is the likelihood this person's Bluetooth traffic is being > monitored? It appears to me that the question "can this person's Bluetooth > traffic be monitored?" is decidedly yes. However the question "IS she being > monitored?" Is much more murky, however I could be missing something here. > Further it would be interesting to discuss whether any of the following > dramatically change the likelihood of her Bluetooth transmissions being > monitored: > > > A. the security of the phone itself > B. the timing of the call > C. the location of the call > D. the length of the call > E. the individual(s) she calls > F. ??? > The question is impossible to answer. You'll know for sure if the attacker tells you, not at all if they don't and they take no other actions, and you'll just go crazy if bad stuff starts to happen and you have no idea why. If that really is her weak point, I think she should use a headset that is wired into the phone. > And yes, I agree, http://en.wikipedia.org/wiki/Bluetooth#Security is pretty > funny reading. > It's a sad replacement for a wire, eh? > I think we'd all agree that one of the largest problems here, of course, is > the closed nature of the Bluetooth protocol, combined with its broad > adoption by manufacturers. That said, if you need to disguise the fact that > you are making a phone call, it may be the only option, unless a wired > headset is feasible. > Yeah, I'm not seeing how it's a good idea. The fact of the matter is simple - Jane is an activist trying to stay safe, Jane should not do unsafe things if she can help it. Bluetooth is a luxury that given the weaponized nature of some of the attackers, I think it is best avoided. Simply having it on will provide a relative tracking beacon - I imagine that some airplane modes on cell phones don't disable BT or Wifi... > Thanks as always for your time and consideration > Sure thing. I'm glad you're asking these questions. All the best, Jacob _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From zlkak at msn.com Sun Jan 29 07:31:34 2012 From: zlkak at msn.com (֓ ^q) Date: Mon, 30 Jan 2012 00:31:34 +0900 Subject: No subject Message-ID: <201201291538.q0TFcrnC009895@proton.jfet.org> お金持ちの若奥様が集まる逆援助サークルに無料招待 お金と時間はあるけど、刺激が無い… そんな若奥様達が集まる逆援助サークル!! 男性は女性を抱くことで報酬が発生します!! http://kamo10.info/s118/ 只今、男性会員を募集中です。男性の少ない今がチャンス!! 今なら完全無料のノーリスクで逆援助が体感できます。 突然逆援助します!!といわれても、信じられないと思うので 最初は冷かしのフリアド登録も可能です!! http://kamo10.info/s118/ このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From catarinafermina at qiit.com Sun Jan 29 12:18:27 2012 From: catarinafermina at qiit.com (OZELL GOLDEN) Date: Mon, 30 Jan 2012 04:18:27 +0800 Subject: Penis Enlargement Pills - $59.95. Risk free 60-day money back guarantee. mxhu6t2ymqc7k114 Message-ID: <4f25a993.3d0de1a1@qiit.com> Penis Enlargement Pills - $59.95 Enlarge your penis size up to 3-4 Inches in length and up to 25% in girth with most powerful and 100% Natural and Safe Mandhood Penis Enlargement Pills. Risk free 60-day money back guarantee. http://penisprofed.ru From anissajillian at iaai.com Mon Jan 30 01:15:40 2012 From: anissajillian at iaai.com (Iola Augustina) Date: Mon, 30 Jan 2012 05:15:40 -0400 Subject: Come to our online store to buy replica watches for only $129 swcc9q3bhtof6 Message-ID: <4f265fbc.b4723622@iaai.com> $129 Replica Watches, Buy Cheap Replica Rolex Watches during Economic crisis and how to drive fashion? We specialize in top quality replica watches that are famous around the world. Come to our online store to buy replica watches. http://finewatchpaper.ru From skip at ospreyfilters.com Sun Jan 29 22:17:20 2012 From: skip at ospreyfilters.com (=?koi8-r?B?IvzL09DF0tTJ2sEgySDOwcTaz9Ig1yDT1NLPydTFzNjT1NfFIg==?=) Date: Tue, 30 Jan 2012 08:17:20 +0200 Subject: =?koi8-r?B?9yDP1MTFzCDQ0s/Fy9TJ0s/Xwc7J0Q==?= Message-ID: <01ccdf27$95fce800$92f3ab53@skip> Куда: В строительный отдел Кому: Главному инженеру Уважаемые коллеги! Информируем Вас о том, что в период с 13 по 14 февраля 2012 года в Санкт-Петербурге пройдет курс повышения квалификации по вопросам нового порядка экспертизы проектно-сметной документации. ================================================ Тема: Г О С Э К С П Е Р Т И З А проектно-сметной документации в 2012 году. Строительный надзор. Место и время: Санкт-Петербург, 13 - 14 февраля ================================================ По вопросам участия обращайтесь по телефону: 8 812 642*94*59 Краткая программа курса: 1. Изменения в законодательстве РФ по вопросам проведения государственной экспертизы проектной документации. 2. Государственная экспертиза проектно-сметной документации объектов капитального строительства и результатов инженерных изысканий, выполняемых для подготовки проектной документации. 3. Требования к организации и порядку проведения инженерных изысканий. 4. Разделение полномочий между федеральным центром и экспертизами субъектов Федерации. 5. Состав проектной документации, предоставляемой на экспертизу. 6. Оценка соответствия сметной стоимости объекта капитального строительства нормативам в области сметного нормирования и ценообразования. 7. Техническое регулирование в строительной отрасли. 8. Негосударственная экспертиза проектно-сметной документации. 9. Инженерно-экологические изыскания в системе инженерных изысканий для строительства. ==== С уважением, Никитина Дарья Георгиевна оркомитет конференций тел.: /812/ 642--94--59 From myrtiegita at borland.com Sun Jan 29 20:24:44 2012 From: myrtiegita at borland.com (JENE DARIA) Date: Mon, 30 Jan 2012 08:24:44 +0400 Subject: Buy Here & Get Discount! #1 Penis Enlargement - Penis Enlargement Pills. uunstihwes2l1z4dhqo Message-ID: <43w69t19c88-19380724-683p4w29@upozskras> #1 Penis Enlargement - Penis Enlargement Pills. Gain up to 4 Inches or 6 Month Money Back Guarantee. Buy Here & Get Discount! http://bestenlargementcook.ru From eugen at leitl.org Sun Jan 29 23:49:56 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 30 Jan 2012 08:49:56 +0100 Subject: [liberationtech] How secure is Bluetooth? Message-ID: <20120130074956.GI7343@leitl.org> ----- Forwarded message from Martyn Williams ----- From eugen at leitl.org Sun Jan 29 23:51:30 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 30 Jan 2012 08:51:30 +0100 Subject: [liberationtech] How secure is Bluetooth? Message-ID: <20120130075130.GK7343@leitl.org> ----- Forwarded message from Matt Mackall ----- From eugen at leitl.org Sun Jan 29 23:58:48 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 30 Jan 2012 08:58:48 +0100 Subject: [liberationtech] How secure is Bluetooth? Message-ID: <20120130075848.GN7343@leitl.org> ----- Forwarded message from Jacob Appelbaum ----- From eugen at leitl.org Mon Jan 30 00:04:14 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 30 Jan 2012 09:04:14 +0100 Subject: [liberationtech] How secure is Bluetooth? Message-ID: <20120130080414.GQ7343@leitl.org> ----- Forwarded message from Jacob Appelbaum ----- From indirectlyb5 at re-broker.com Sun Jan 29 18:50:34 2012 From: indirectlyb5 at re-broker.com (=?koi8-r?B?68/EIPTuIPf85A==?=) Date: Mon, 30 Jan 2012 11:50:34 +0900 Subject: =?koi8-r?B?9/zkIMvPzdDBzsnJ?= Message-ID: <79CC863701E940CD832E052D4157AE90@GOLFZON5> Новации таможенного законодательства. Кодекс таможенного союза. Контракт и таможенные формальности 03 Февраля Цель: полученные знания помогут минимизировать риски и оптимизировать бизнес в сфере ВЭД за счет правильного применения нового таможенного законодательства Таможенного союза и изменившихся норм национального законодательства, грамотного (с учетом правоприменительной практики) толкования таможенных правил и логистического подхода к составлению внешнеторговой сделки. Слушатели обеспечиваются содержательным методическим пособием с полным, по каждому рассматриваемому вопросу, перечнем нормативных документов, актуализированных на момент проведения курса. Программа мероприятия: Таможенный кодекс Таможенного союза. Область применения, нововведения, поправки. Таможенное законодательство Таможенного союза. Особенности применения национальных норм. Закон о "О таможенном регулировании в РФ". Структура и функции таможенных органов. Приближение к границе. Контракт и таможенные формальности. Понятие внешнеторговой сделки. Контрагенты и третья сторона в лице таможенных органов. Применимое право. Форма и структура контракта, типичные ошибки при составлении. Документы, регулирующие заключение международных сделок. Роль контракта при таможенном оформлении и таможенном контроле. Соотнесение статей контракта и таможенных формальностей. Статус, полномочия и ответственность лиц, декларирующих товар. Таможенный брокер (представитель). Таможенный представитель по Таможенному кодексу Таможенного Союза и в Законе "О таможенном регулировании в РФ". Что меняется? Условия включения в Реестр, полномочия, ответственность. Когда следует обращаться к услугам брокера (таможенного представителя) и на что следует обратить внимание при заключении договора с ним. Проект договора с брокером. "Серые брокеры". Административная ответственность за недостоверное декларирование. Судебная практика. Декларант. Статус декларанта в Таможенном Кодексе Таможенного Союза и в ФЗ "О таможенном регулировании в РФ". Перечень лиц, имеющих право выступать в качестве декларантов (собственник товара, посредник?). Контроль таможенными органами полномочий лиц на декларирование товаров. Список требуемых таможней документов. Позиция судов. Может ли "Грузополучатель" быть декларантом? Административная ответственность лиц, осуществляющих незаконную деятельность в качестве декларантов. Классификация товаров по коду ТНВЭД в рамках Таможенного союза. ТН ВЭД РФ и ТН ВЭД Таможенного Союза (структура, изменения). Рекомендации по определению и заявлению кода ТН ВЭД при декларировании. Особенности заполнения 31-й графы ГТД. Описание товара и статья "Предмет договора". Предварительное классификационное решение по коду ТН ВЭД и законодательство таможенного союза. Является ли заявление "неправильного" кода в ГТД недостоверным декларированием? Товары риска и прикрытия. Арбитражные споры. Перечень нормативных документов. Страна происхождения товаров в условиях таможенного союза. Принципы определения. Дифференциация таможенных платежей в зависимости от страны происхождения. Перечень стран-пользователей преференций (в условиях Таможенного Союза). Контроль таможенными органами страны происхождения товаров. Документы, подтверждающие право на права на преференции. Страна происхождения товара и Контракт. Рекомендации по подтверждению страны происхождения при декларировании товаров. Предварительное решение по стране происхождения в условиях таможенного союза. Судебная практика. Нормативные документы. Нетарифные меры регулирования в условиях Таможенного союза. Запреты и ограничения. Лицензирование экспорта и импорта. Подтверждение соответствия (сертификация). Применение ветеринарных, санитарных и фитосанитарных мер. Перечни товаров, нормативные документы, уполномоченные органы. Таможенная стоимость – база для начисления платежей. Таможенная стоимость в рамках Таможенного Союза. Определение, заявление, контроль и корректировка таможенной стоимости ввозимых и вывозимых товаров. Методы определения таможенной стоимости. Первый метод определения таможенной стоимости и требования к внешнеторговому Контракту. Рекомендации по подтверждению и снижению таможенной стоимости. Вычеты и скидки из таможенной стоимости - законные пути ее снижения. Основные нормативные документы. Примеры заполнения ДТС. Примеры расчета таможенной стоимости и таможенных платежей. Практические аспекты определения таможенной стоимости и риска корректировки по новому таможенному законодательству. Правоприменительная практика по вопросам таможенной стоимости. Обжалование действий и решений таможенных органов. Условия поставки. ИНКОТЕРМС 90/2000. Новый ИНКОТЕРМС 2010. Изменения, в связи с принятием последней редакции ИНКОТЕРМС 2010. Статус документа. Особенности каждой группы и отдельных терминов. Сравнение редакций. ИНКОТЕРМС и таможенная очистка. ИНКОТЕРМС и вид транспорта. Ошибки при выборе условий поставки. Рекомендации по выбору оптимальных условий поставки, "подводные" камни. ИНКОТЕРМС и страхование. За более подробной информацuей обpащайтеcь по тел: \Моск. код/ 79221/22 ; (495) 7Ч2_91_98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10145 bytes Desc: not available URL: From shandihelen at nch.com Mon Jan 30 03:50:03 2012 From: shandihelen at nch.com (Susanne Socorro) Date: Mon, 30 Jan 2012 13:50:03 +0200 Subject: Cialis 20mg - $1.30 Any Order Size No Rx. Best price for even small orders. 8kxner3r0b Message-ID: <36i27l81m40-62950133-803a6b26@roitedzzeb> Cialis 20mg - $1.30 Any Order Size No Rx Best price for even small orders. Cialis at $1.30 per pill for any order size and No Rx http://medicinecutrxhealth.ru From qpigler at maildomination.com Mon Jan 30 01:01:48 2012 From: qpigler at maildomination.com (=?koi8-r?B?IvXQ0sHXzMXOycUg0M8g09TSz8nUxczY09TX1SI=?=) Date: Tue, 30 Jan 2012 14:31:48 +0530 Subject: =?koi8-r?B?9yDT1NLPydTFzNjO2cogz9TExcw=?= Message-ID: <01ccdf5b$e5f5a200$e5c8a07a@qpigler> Куда: В строительный отдел Кому: Главному инженеру Уважаемые коллеги! Информируем Вас о том, что в период с 13 по 14 февраля 2012 года в Санкт-Петербурге пройдет курс повышения квалификации по вопросам нового порядка экспертизы проектно-сметной документации. ================================================ Тема: Г О С Э К С П Е Р Т И З А проектно-сметной документации в 2012 году. Строительный надзор. Место и время: Санкт-Петербург, 13 - 14 февраля ================================================ По вопросам участия обращайтесь по телефону: 8 812 642*94*59 Краткая программа курса: 1. Изменения в законодательстве РФ по вопросам проведения государственной экспертизы проектной документации. 2. Государственная экспертиза проектно-сметной документации объектов капитального строительства и результатов инженерных изысканий, выполняемых для подготовки проектной документации. 3. Требования к организации и порядку проведения инженерных изысканий. 4. Разделение полномочий между федеральным центром и экспертизами субъектов Федерации. 5. Состав проектной документации, предоставляемой на экспертизу. 6. Оценка соответствия сметной стоимости объекта капитального строительства нормативам в области сметного нормирования и ценообразования. 7. Техническое регулирование в строительной отрасли. 8. Негосударственная экспертиза проектно-сметной документации. 9. Инженерно-экологические изыскания в системе инженерных изысканий для строительства. ==== С уважением, Никитина Дарья Георгиевна оркомитет конференций тел.: /812/ 642--94--59 From dottysherril at aati-us.com Mon Jan 30 17:50:17 2012 From: dottysherril at aati-us.com (Shaquita Jene) Date: Mon, 30 Jan 2012 23:50:17 -0200 Subject: Penis Enlargement Pills - $59.95. Risk free 60-day money back guarantee. umdkt61906s293 Message-ID: <39d49f53b86-18470929-678m2c76@ivlqotrgyt> Penis Enlargement Pills - $59.95 Enlarge your penis size up to 3-4 Inches in length and up to 25% in girth with most powerful and 100% Natural and Safe Mandhood Penis Enlargement Pills. Risk free 60-day money back guarantee. http://penisprotummy.ru From evonbev at lxe.com Mon Jan 30 11:34:55 2012 From: evonbev at lxe.com (Marva Keli) Date: Tue, 31 Jan 2012 00:34:55 +0500 Subject: Generic Viagra, Cialis, Levitra Low Price! Express delivery USA to USA 1-3 days! hy66ip15vr7oa2tigqfo Message-ID: <201201301334.0F919CDACDCDB2B9D2387@o1sh704899> VIAGRA 100mg/90pills $129 FREE Shipping! Generic Viagra, Cialis, Levitra Low Price! Express delivery USA to USA 1-3 days! http://pharmacypillstech.ru From susiepage at burkeequipco.com Tue Jan 31 00:36:47 2012 From: susiepage at burkeequipco.com (=?koi8-r?B?IuHOwdTPzMnKIg==?=) Date: Wed, 31 Jan 2012 00:36:47 -0800 Subject: =?koi8-r?B?8NLJx8zB28HFzSDXINTFwdTSIA==?= Message-ID: <01ccdfb0$69d97980$8792623b@susiepage> 11 февраля 2012 в Театриуме на Серпуховке в 19-30 (ул.Павловская, д.6, м.Серпуховская) тел 641...89...75 "ЛЮБОВЬ - НЕ КАРТОШКА, НЕ ВЫБРОСИШЬ В ОКОШКО" Лирическая комедия в двух действиях По пьесе Cтепана Лобозерова Режиссер-постановщик - Андрей Максимов (АБДТ им. Товстоногова) В ролях: народная артистка России Нина Усатова, народный артист России Александр Михайлов, заслуженная артистка России Кира Крейлис-Петрова, заслуженный артист России Игорь Скляр, Зоя Буряк, Кирилл Полухин. Продолжительность спектакля - два часа 30 минут с одним антрактом "Любовь - не картошка, не выбросишь в окошко" - комедия с танцами, песнями и частушками, насыщенный неиссякаемым народным юмором и задором. Тонкий музыкальный фон, а также любовно-детективная интрига в сюжете пьесы придают спектаклю особый шарм и динамизм. В течение всего действия зритель наблюдает за событиями, происходящими с жителями одной сибирской глубинки. Персонаж Александра Михайлова как будто продолжает тему фильма "Любовь и голуби", привлекая новых персонажей: Н. Усатову, К. Петрову ("Окно в Париж"), И. Скляра ("Мы из джаза") и др. Заказ и доставка билетов тел. (495) 641-89.75 From lucienneshelly at brueggen.com Tue Jan 31 02:28:26 2012 From: lucienneshelly at brueggen.com (Mitsuko Sherita) Date: Tue, 31 Jan 2012 03:28:26 -0700 Subject: 10 Free Viagra Pills. Order cheap Cialis plus many other generic Cialis erectile dysfunction drugs. dh01tc8w8mgncj8tq Message-ID: <4f27c24a.0035eb89@brueggen.com> Buy Viagra, Cialis, Levitra - Cheap Generic Cialis Without Prescription 10 Free Viagra Pills. Order cheap Cialis plus many other generic Cialis erectile dysfunction drugs. Lowest prices and Satisfaction Guaranteed http://pills-med2012.ru From eleonoreflavia at acs-wa.com Mon Jan 30 13:50:44 2012 From: eleonoreflavia at acs-wa.com (Lilli) Date: Tue, 31 Jan 2012 03:50:44 +0600 Subject: BEST quality generic VIAGRA with 100% satisfaction guaranteed! VIAGRA on SALE at $1.09 uzthc42hbi0a8yjwufa1 Message-ID: <49f46z85i44-36055049-014a7i70@xdsgbuwgcd> SPECIAL OFFER : VIAGRA on SALE at $1.09 !!! Buy VIAGRA at EXTRA LOW PRICES. Wide variety of generic and brand VIAGRA packages. BEST quality generic VIAGRA with 100% satisfaction guaranteed! http://onlinemedicmeds.ru From ecologistsjk41 at roaringspring.com Tue Jan 31 06:32:48 2012 From: ecologistsjk41 at roaringspring.com (=?koi8-r?B?7s/X2cog2sHLz84gzyDC1cjV3sXUxQ==?=) Date: Tue, 31 Jan 2012 09:32:48 -0500 Subject: =?koi8-r?B?7s/X2cog2sHLz84gIu8gwtXIx8HM1MXS08vPzSDV3sXUxSI=?= Message-ID: <000d01cce025$3499d3d0$6400a8c0@ecologistsjk41> 03 февраля 2012 г. НОВЫЙ ЗАКОН "О БУХГАЛТЕРСКОМ УЧЕТЕ" 8 (Ч95) 792-21_22 <<>> +7 (код Москвы) 792*2122 Цель: Новый закон "О бухгалтерском учете" вступает в силу с 2013 года. Подготовка к применению требований закона займет много времени, поэтому начинать освоение новых норм нужно заранее. Минфин РФ спланировал разработку основных нормативных документов по бухгалтерскому учету и внедрение в России МСФО до 2015 года. Разберемся в новых правилах, которые уже приняты и к тех, принятие которых √ дело ближайшего будущего. Программа: 1. Законодательная база по бухгалтерскому учету: закон, федеральные и международные стандарты, отраслевые и локальные стандарты учета. Соотношение и сфера применения федеральных стандартов учета и отчетности и МСФО. Работа Минфина по внедрению МСФО с ближайшие годы. Кто и с какого момента обязан будет применять международные стандарты? Порядок вступления в силу нового Закона "О бухгалтерском учете", особенности его действия в переходный период до разработки новых федеральных и отраслевых стандартов учета. 2. Отмена освобождения от ведения учета плательщиков УСН с 2013 года. Постановка бухгалтерского учета у налогоплательщиков, применяющих УСН. Обязанности ИП по ведению бухучета. Случаи, когда ИП и лица, занимающиеся частной практикой, вправе не вести бухгалтерский учет. Ведение бухгалтерского учета филиалами иностранных юридических лиц. 3. Новые требования к главному бухгалтеру и лицам, которым ведение учета передано на аутсорсинг. 4. Требование закона к организации внутреннего аудита. 5. Новые грани ответственности главного бухгалтера. 6. Первичная учетная документация по-новому: отмена унифицированных форм. Как утвердить и внедрить свои формы? Требования нового бухгалтерского законодательства и НК РФ к первичным документам. Ответственности за отсутствие первичных документов и ошибки при их оформлении. 7. Новый порядок электронного документооборота: новые возможности и риски. 8. Новый порядок внесения исправлений в первичные документы, регистры и отчетность. 9. Требования Закона к учетным регистрам, учтенной политике. 10. Бухгалтерская отчетность по-новому: новые требования к утверждению, публикации отчетности. Состав бухгалтерской отчетности. Возможности адаптации форм бухгалтерской отчетности под потребности организации. Адреса и сроки представления отчетности. Создание информационного ресурса со свободным доступом к бухгалтерской отчетности организаций. Отчетность при реорганизации и ликвидации предприятия в соответствии с новым Законом. 11. Новые требования к хранению бухгалтерской документации на основании Закона. Стоимость участия: 8 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: код: (четыре девять пять) 7922122 : +7 (Ч95) 7922122 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4497 bytes Desc: not available URL: From precursorsbgm3 at rosaleenkelly.com Mon Jan 30 17:29:41 2012 From: precursorsbgm3 at rosaleenkelly.com (Gilbert Ricks) Date: Tue, 31 Jan 2012 10:29:41 +0900 Subject: =?koi8-r?B?68HT08/X2cUgz9DF0sHDyckuIO7P19nKIPDP0tHEz8sg?= Message-ID: <9EE0FBF353124C32ACA5C133060E031D@USER2> 07 февраля 2012 г. Кассовые операции. Новый Порядок ведения кассовых операций, вступающий в действие 1 января 2012 года \Моск. код/ 742/9198 или код (499) - ЧЧ5-4095 С 1 января 2012 года в РФ установлен новый порядок ведения кассовых операций, обязательный для всех организаций, а теперь – и для индивидуальных предпринимателей. Изменений много и они коснулись почти всех сложных моментов осуществления операций с наличными деньгами. Мы уделим внимание всем новшествам, а также тем проблемам, которые остаются неразрешенными! Программа: 1. Новое Положение о порядке ведения кассовых операций от 12.10.2011 № 373-П. Обзор новшеств. 2. Необходимые локальные акты по организации кассовой работы. 3. Новые принципы установления лимита остатка кассы и новые требования к его соблюдению. 4. Новые требования и возможности при ведении кассовой книги. Новые требования к заполнению расходных ордеров. Особенности заполнения приходных ордеров. Ведении книги учета принятых и выданных денежных средств с учетом нового порядка. Особенности оформление кассовых документов – за что штрафуют налоговые органы в 2012 году? 5. Выдача денег по доверенности: совершенно новый порядок в 2012 году. 6. Переход на оформление кассовых документов в электронном виде: новые возможности и обязанности. 7. Новый порядок работы с подотчетными суммами. 8. Денежные документы и БСО: порядок хранения в кассе и учета на счетах, выдачи, отчета ответственных лиц. БСО и НДС. 9. Лимит расчетов наличными: сложные ситуации и типичные ошибки. Наличная выручка и порядок ее расходования без сдачи в банк. 10. Применение ККМ. Расчеты с применением платежных банковских карт. Возвраты покупателям наличных в случае отказа от товара в день приобретения и позже. 11. Изменение требований к оборудованию кассовых комнат и хранению денежных средств. 12. Должность кассира: обязанности, ответственность. Совмещение и временное замещение должности кассира. Новые условия возложения материальной ответственности на кассира. 13. Контроль за осуществлением кассовых операций. Кто может Вас проверять и какие санкции грозят. Что изменилось в 2012 году? Типичные нарушения со стороны контролеров: как отстоять свою правоту. Стоимость участия: 8 000 рублей Вся информация по тел: +7 499 - Ч45\ЧО/95 <<>> 8 (499) 445З968 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4103 bytes Desc: not available URL: From candidatesaity at resdat.com Tue Jan 31 02:52:05 2012 From: candidatesaity at resdat.com (Morton Duffy) Date: Tue, 31 Jan 2012 11:52:05 +0100 Subject: =?koi8-r?B?8M/S0cTPyyDXxcTFzsnRIMvB09PZINMgMSDRztfB0tEgMjAxMiDHLg==?= Message-ID: <000d01cce006$5ecdc130$6400a8c0@candidatesaity> Информация во вложении -------------- next part -------------- A non-text attachment was scrubbed... Name: Izmenenie_kassovih_operacii.rtf Type: application/rtf Size: 18906 bytes Desc: not available URL: -------------- next part -------------- An embedded and charset-unspecified text was scrubbed... Name: URL: From marthgeneva at jbase.com Tue Jan 31 00:44:22 2012 From: marthgeneva at jbase.com (Martina Donella) Date: Tue, 31 Jan 2012 12:44:22 +0400 Subject: Express delivery USA to USA 1-3 days! VIAGRA 100mg/90pills $129 FREE Shipping! xblzc62pd0u4e1g726q Message-ID: <201201310144.5E392ACA2893A232DFEF7E@bm57el77> VIAGRA 100mg/90pills $129 FREE Shipping! Generic Viagra, Cialis, Levitra Low Price! Express delivery USA to USA 1-3 days! http://pharmacyprescription.ru From shawn_white at cti-intl.com Mon Jan 30 23:47:52 2012 From: shawn_white at cti-intl.com (=?koi8-r?B?IvfR3sXTzMHXIO3J0s/Oz9ci?=) Date: Wed, 31 Jan 2012 13:17:52 +0530 Subject: =?koi8-r?B?8NLJx8zB28HFzSDXINTFwdTSICAg?= Message-ID: <01cce01a$bc4f8000$81a964af@shawn_white> 11 февраля 2012 в Театриуме на Серпуховке в 19-30 (ул.Павловская, д.6, м.Серпуховская) тел 641__89-75 "ЛЮБОВЬ - НЕ КАРТОШКА, НЕ ВЫБРОСИШЬ В ОКОШКО" Лирическая комедия в двух действиях По пьесе Cтепана Лобозерова Режиссер-постановщик - Андрей Максимов (АБДТ им. Товстоногова) В ролях: народная артистка России Нина Усатова, народный артист России Александр Михайлов, заслуженная артистка России Кира Крейлис-Петрова, заслуженный артист России Игорь Скляр, Зоя Буряк, Кирилл Полухин. Продолжительность спектакля - два часа 30 минут с одним антрактом "Любовь - не картошка, не выбросишь в окошко" - комедия с танцами, песнями и частушками, насыщенный неиссякаемым народным юмором и задором. Тонкий музыкальный фон, а также любовно-детективная интрига в сюжете пьесы придают спектаклю особый шарм и динамизм. В течение всего действия зритель наблюдает за событиями, происходящими с жителями одной сибирской глубинки. Персонаж Александра Михайлова как будто продолжает тему фильма "Любовь и голуби", привлекая новых персонажей: Н. Усатову, К. Петрову ("Окно в Париж"), И. Скляра ("Мы из джаза") и др. Заказ и доставка билетов тел. (495) 641..89..75 From t_y-arquinio at aqp.ca Tue Jan 31 03:29:28 2012 From: t_y-arquinio at aqp.ca (=?koi8-r?B?IvPU0s/J1MXM2M7B0SDLz87GxdLFzsPJ0SI=?=) Date: Wed, 31 Jan 2012 13:29:28 +0200 Subject: =?koi8-r?B?8sHa0sXbxc7JxSDOwSDT1NLPydTFzNjT1NfP?= Message-ID: <01cce01c$5b28ac00$ea25425e@t_y-arquinio> КУДА: В строительный отдел КОМУ: Главному инженеру Уважаемые коллеги! Информируем Вас о том, что в период с 05 по 06 марта 2012 года в Санкт-Петербурге состоится КОНФЕРЕНЦИЯ, посвященная новациям в проведении инженерных изысканий и в подготовке проектной документации: Строительство и реконструкция объектов К А П И Т А Л Ь Н О Г О С Т Р О И Т Е Л Ь С Т В А. Экспертиза проектной документации. Строительный надзор. Ввод объектов в эксплуатацию. Санкт-Петербург, 05 - 06 марта 2012 года ************************************* По любым вопросам обращайтесь по телефону: 8 812 6Ч2 98 62 Краткая программа конференции: ************************************* 1. Инженерные изыскания для подготовки проектной документации, строительства, реконструкции объектов капитального строительства. 2. Архитектурно-строительное проектирование. 3. Разрешение на строительство. Порядок выдачи. Внесение изменений и продление. 4. Требования к подготовке земельных участков для капитального строительства. 5. Строительный контроль в процессе строительства, реконструкции, капитального ремонта объектов капитального строительства. 6. Государственный строительный надзор. 7. Разрешение на ввод объекта в эксплуатацию. Порядок получения. 8. Ответственность за нарушение законодательства о градостроительной деятельности. С уважением, Серова Анастасия Владимировна оркомитет конференций тел.: (812) 6Ч2 98 62 From ok at bpr.ca Tue Jan 31 00:57:53 2012 From: ok at bpr.ca (=?koi8-r?B?IuvPzsbF0sXOw8nRICLr4fDp9OHs+O7v5SDz9PLv6fTl7Pjz9PfvIg==?= =?koi8-r?B?Ig==?=) Date: Wed, 31 Jan 2012 14:27:53 +0530 Subject: =?koi8-r?B?68HQydTBzNjOz8Ug09TSz8nUxczY09TXzw==?= Message-ID: <01cce024$844d3a80$36923f65@ok> КУДА: В строительный отдел КОМУ: Главному инженеру Уважаемые коллеги! Информируем Вас о том, что в период с 05 по 06 марта 2012 года в Санкт-Петербурге состоится КОНФЕРЕНЦИЯ, посвященная новациям в проведении инженерных изысканий и в подготовке проектной документации: Строительство и реконструкция объектов К А П И Т А Л Ь Н О Г О С Т Р О И Т Е Л Ь С Т В А. Экспертиза проектной документации. Строительный надзор. Ввод объектов в эксплуатацию. Санкт-Петербург, 05 - 06 марта 2012 года ********** По любым вопросам обращайтесь по телефону: 8 812 6Ч2 98 62 Краткая программа конференции: ********** 1. Инженерные изыскания для подготовки проектной документации, строительства, реконструкции объектов капитального строительства. 2. Архитектурно-строительное проектирование. 3. Разрешение на строительство. Порядок выдачи. Внесение изменений и продление. 4. Требования к подготовке земельных участков для капитального строительства. 5. Строительный контроль в процессе строительства, реконструкции, капитального ремонта объектов капитального строительства. 6. Государственный строительный надзор. 7. Разрешение на ввод объекта в эксплуатацию. Порядок получения. 8. Ответственность за нарушение законодательства о градостроительной деятельности. С уважением, Серова Анастасия Владимировна оркомитет конференций тел.: (812) 6Ч2 98 62 From smithg4 at mail2paris.com Tue Jan 31 01:22:31 2012 From: smithg4 at mail2paris.com (=?koi8-r?B?Iu7ByczYIg==?=) Date: Wed, 31 Jan 2012 14:52:31 +0530 Subject: =?koi8-r?B?8NLJx8zB28HFzSDXINTFwdTSICAgICA=?= Message-ID: <01cce027$f5422180$f9b0613b@smithg4> 11 февраля 2012 в Театриуме на Серпуховке в 19-30 (ул.Павловская, д.6, м.Серпуховская) тел 641 89.75 "ЛЮБОВЬ - НЕ КАРТОШКА, НЕ ВЫБРОСИШЬ В ОКОШКО" Лирическая комедия в двух действиях По пьесе Cтепана Лобозерова Режиссер-постановщик - Андрей Максимов (АБДТ им. Товстоногова) В ролях: народная артистка России Нина Усатова, народный артист России Александр Михайлов, заслуженная артистка России Кира Крейлис-Петрова, заслуженный артист России Игорь Скляр, Зоя Буряк, Кирилл Полухин. Продолжительность спектакля - два часа 30 минут с одним антрактом "Любовь - не картошка, не выбросишь в окошко" - комедия с танцами, песнями и частушками, насыщенный неиссякаемым народным юмором и задором. Тонкий музыкальный фон, а также любовно-детективная интрига в сюжете пьесы придают спектаклю особый шарм и динамизм. В течение всего действия зритель наблюдает за событиями, происходящими с жителями одной сибирской глубинки. Персонаж Александра Михайлова как будто продолжает тему фильма "Любовь и голуби", привлекая новых персонажей: Н. Усатову, К. Петрову ("Окно в Париж"), И. Скляра ("Мы из джаза") и др. Заказ и доставка билетов тел. (495) 641...89--75 From selmachaya at abtc.com Tue Jan 31 10:07:02 2012 From: selmachaya at abtc.com (Charita Eunice) Date: Tue, 31 Jan 2012 20:07:02 +0200 Subject: Buy VIAGRA at EXTRA LOW PRICES. Wide variety of generic and brand VIAGRA packages. h5ojyw3vcvcs51 Message-ID: <33r80h58p95-85382120-214h1j47@xkintmj> SPECIAL OFFER : VIAGRA on SALE at $1.09 !!! Buy VIAGRA at EXTRA LOW PRICES. Wide variety of generic and brand VIAGRA packages. BEST quality generic VIAGRA with 100% satisfaction guaranteed! http://onlinemedictablets.ru From gerimarni at tnt.com Tue Jan 31 20:17:16 2012 From: gerimarni at tnt.com (Carleen Ara) Date: Wed, 01 Feb 2012 07:17:16 +0300 Subject: 10 Free Viagra Pills. Order cheap Cialis plus many other generic Cialis erectile dysfunction drugs. gt83jtstdrmgt Message-ID: <201202010816.CF4A09C4BE0DC6E341B2A@7473y7wnwd> Buy Viagra, Cialis, Levitra - Cheap Generic Cialis Without Prescription 10 Free Viagra Pills. Order cheap Cialis plus many other generic Cialis erectile dysfunction drugs. Lowest prices and Satisfaction Guaranteed http://pills2012med.ru From bjaa at msn.com Tue Jan 31 14:56:07 2012 From: bjaa at msn.com ({ a) Date: Wed, 01 Feb 2012 07:56:07 +0900 Subject: No subject Message-ID: <201201312256.q0VMtxOq032105@proton.jfet.org> 50万振込めます。 どちらにしても連絡下さい。私が電話にこだわ理由は、個人情報の漏洩の確立がメールに比べると下がるからです。それに声を聞いた時の安心感ってあると想いますからね。話した地点で気持ちが変わったらすぐ切ってもらって構いませんし、貴方がどうしてもというならお礼はお会いしてから渡す形でも構いません。どちらにしてもお返事を下さい。電話で構わないなら、いつでも掛けられます。お会いする方が良いなら、明日にでもお会いしましょう。どちらが良いですか http://gyofun.info/s118/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp