From coderman at gmail.com Sat Sep 1 21:08:47 2012 From: coderman at gmail.com (coderman) Date: Sat, 1 Sep 2012 21:08:47 -0700 Subject: SCS whitewashed from wikipedia Message-ID: they finally managed to do it: United States Special Collections Service is now gone, redirected to "Central Security Service" https://en.wikipedia.org/w/index.php?title=United_States_Special_Collections_Service&diff=500013555&oldid=491317691 some interesting vandalism in the history. https://en.wikipedia.org/w/index.php?title=United_States_Special_Collections_Service&action=history i guess they're getting more sophisticated.. ;P From coderman at gmail.com Sat Sep 1 21:19:59 2012 From: coderman at gmail.com (coderman) Date: Sat, 1 Sep 2012 21:19:59 -0700 Subject: SCS whitewashed from wikipedia In-Reply-To: References: Message-ID: just to be clear, "Special Collections Service" is now merged/abridged into CSC page; waiting to see if/when that part "disappears". https://en.wikipedia.org/wiki/Special_Collection_Service curious there is no mention of X-37(A|B|C) yet... anything new on this front? looking at you, jya On Sat, Sep 1, 2012 at 9:08 PM, coderman wrote: > they finally managed to do it: United States Special Collections > Service is now gone, redirected to "Central Security Service" From bro at bfpais.ru Sat Sep 1 09:21:26 2012 From: bro at bfpais.ru (=?koi8-r?B?68HE0s/XycvVIJYg19PFIM/CINXXz8zYzsXOyck=?=) Date: Sun, 2 Sep 2012 00:21:26 +0800 Subject: =?koi8-r?B?9dfPzNjOxc7JxSDTz9TS1cTOycvP1w==?= Message-ID: <000d01cd885d$d5c0a280$6400a8c0@bro> Увольнения и сокращение численности или штата сотрудников 06 августа 2012г. 8 (495) 792/2I-22 <<<>>> +7 495 7Ч2.9I.98 Цель обучения: Изучить общие основания прекращения трудового договора, особенности сокращения штатов для отдельных категорий работников. Программа мероприятия: Общий порядок прекращения трудового договора * Собственное желание * Расторжение трудового договора по соглашению сторон * Прекращение трудового договора в связи с истечением срока его действия * Увольнение в порядке перевода к другому работодателю * Увольнение в связи с отказом работника от продолжения работы в силу изменения определенных условий трудового договора Расторжение трудового договора по инициативе работодателя: * На испытательном сроке * По причине сокращения численности (штата) работников -Порядок проведения, сроки выплата выходных пособий, -Кого сократить, а кого уволить по соглашение сторон? -Плюсы и минусы сокращения и соглашения сторон. * По причине недостаточной квалификации работника -Аттестация работников, как аргумент работодателя: правовое регулирование, сроки и порядок проведения, * В связи с неоднократным неисполнением обязанностей -Дисциплинарные взыскания √ Кнут работодателя: Порядок наложения и оформления, как не допустить ошибок. * В связи с однократным грубым нарушением работником трудовых обязанностей -По причине совершения проступка работником, непосредственно обслуживающим денежные или товарные ценности * В связи с представлением работником подложных документов Расторжение трудового договора по обстоятельствам, не зависящим от воли сторон Увольнение отдельных категорий работников: * Руководителей организаций * Совместителей * Беременных женщин Выдача трудовой книжки при увольнении: возможные проблемы и споры Ответы на вопросы слушателей За более подробной информацuей обpащайтеcь по тел: 8 (495) 792\2I22 <<<>>> 8 (495) 792_2I.22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4446 bytes Desc: not available URL: From mkrukg at gmail.com Sun Sep 2 00:20:45 2012 From: mkrukg at gmail.com (Matthew Kruk) Date: Sun, 2 Sep 2012 01:20:45 -0600 Subject: When GPS Confuses, You May Be to Blame (Randall Stross) Message-ID: Randall Stross, *The New York Times*, 1 Sep 2012 [PGN-ed] http://www.nytimes.com/2012/09/02/technology/gps-and-human-error-can-lead-drivers-astray-digital-domain.html?nl=todaysheadlines&emc=tha26_20120902 The turn-by-turn instructions of GPS-based navigation systems, ingeniously designed though they may be, can't always save us from ourselves. Consider the experience of a man from San Diego who flew to the East Coast and picked up a GPS-equipped rental car at the airport. After 20 minutes, he sensed he was headed in the wrong direction. Then he realized that he had unthinkingly entered his California address as his destination. "The navigation system had dutifully set a route back to his home in San Diego, 3,000 miles away," said Barry Brown, co-director of the Mobile Life Center, based in Stockholm, which does research on mobile communication. The incident happened to a friend of his. Mr. Brown is co-author of a recent paper titled "The Normal Natural Troubles of Driving With GPS." The paper illuminates a drawback of GPS technology: that it is designed for docile drivers whose navigational skills have atrophied. ... Randall Stross is an author based in Silicon Valley and a professor of business at San Jose State University. ------------------------------ From jya at pipeline.com Sun Sep 2 06:20:22 2012 From: jya at pipeline.com (John Young) Date: Sun, 02 Sep 2012 09:20:22 -0400 Subject: SCS whitewashed from wikipedia In-Reply-To: References: Message-ID: Informative, much. We'll try to add some of the stuff deleted, see what happens. Retrieved from Archive and posted the 1999 Village Voice piece on SCS with note about the whitewash: http://cryptome.org/2012/09/scs-vest-madsen.htm At 12:08 AM 9/2/2012, you wrote: >they finally managed to do it: United States Special Collections >Service is now gone, redirected to "Central Security Service" > >https://en.wikipedia.org/w/index.php?title=United_States_Special_Collections_Service&diff=500013555&oldid=491317691 > >some interesting vandalism in the history. >https://en.wikipedia.org/w/index.php?title=United_States_Special_Collections_Service&action=history > i guess they're getting more sophisticated.. > >;P From neumann at csl.sri.com Sun Sep 2 17:12:03 2012 From: neumann at csl.sri.com (Peter G. Neumann) Date: Sun, 2 Sep 2012 17:12:03 PDT Subject: Harvard Students in Cheating Scandal Say Collaboration Was Accepted Message-ID: [An early mention of this case stated: ``Harvard University is investigating what it calls an `unprecedented' case of cheating. College officials say around 125 students may have shared answers and plagiarized on a [Introduction To Congress] final exam.'' Source: Curt Nickisch, NPR 31 Aug.] The exam in question was an open-book take-home exam from a professor reportedly inclined to give mostly high grades based in part on factors such as the number of citations! Perhaps many of the 125 students were citing the same sources from the Internet? Is that collusion or collation collision? We await details. PGN] Richard Perez-Pena, *The New York Times*, 31 Aug 2012 Harvard students suspected in a major cheating scandal said that many of the accusations are based on innocent - or at least tolerated - collaboration among students, and with help from graduate-student teachers who sometimes gave them answers to test questions. Students said they were tripped up by a course whose tests were confusing, whose grading was inconsistent, and for which the professor and teaching assistants gave contradictory signals about what was expected. They face the possibility of a one-year suspension from Harvard or revocation of their diplomas if they have already graduated, and some said that they will sue the university if any serious punishment is meted out. In years past, the course, Introduction to Congress, had a reputation as one of the easiest at Harvard College. Some of the 279 students who took it in the spring semester said that the teacher, Matthew B. Platt, an assistant professor of government, told them at the outset that he gave high grades and that neither attending his lectures nor the discussion sessions with graduate teaching fellows was mandatory. ... http://www.nytimes.com/2012/09/01/education/students-of-harvard-cheating-scandal-say-group-work-was-accepted.html ------------------------------ From companys at stanford.edu Mon Sep 3 01:45:29 2012 From: companys at stanford.edu (Yosem Companys) Date: Mon, 3 Sep 2012 01:45:29 -0700 Subject: [liberationtech] New policy directive for Internet Filtering in Pakistan Message-ID: From: Shahzad Ahmad Dear Colleagues, More bad news coming out from Pakistanb& so seemingly much talked about Internet filtering system effectively gets an implementation through this policy directive. http://www.thenews.com.pk/Todays-News-13-17209-Govt-orders-blocking-of-all--blasphemous-pornographic-material-on-net Best wishes Shahzad www.bytesforall.pk -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From marlowe at antagonism.org Mon Sep 3 01:09:08 2012 From: marlowe at antagonism.org (Patrick R McDonald) Date: Mon, 3 Sep 2012 03:09:08 -0500 Subject: [tahoe-dev] TWN 37 Message-ID: ========================================================= Tahoe-LAFS Weekly News, issue number 37, September 3 2012 ========================================================= Welcome to the Tahoe-LAFS Weekly News (TWN). Tahoe-LAFS_ is a secure, distributed storage system. `View TWN on the web`_ *or* `subscribe to TWN`_. If you would like to view the "new and improved" TWN, complete with pictures; please take a `look`_. .. _Tahoe-LAFS: https://tahoe-lafs.org .. _View TWN on the web: https://tahoe-lafs.org/trac/tahoe-lafs/wiki/TahoeLAFSWeeklyNews .. _subscribe to TWN: https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-lafs-weekly-news .. _look: https://tahoe-lafs.org/~marlowe/TWN37.html Announcement and News ===================== Interview with Brian Warner --------------------------- This past week, TWN interviewed Brian Warner |brian|. Brian is a member of the Tahoe-LAFS development team. Brian is currently working on Accounting which is a major milestone in Tahoe-LAFS. Please thank Brian for taking the time to provide us with this interview. Patrick: First, why don't you introduce yourself to our readers, tell us who you are? Brian: sure, my name is Brian Warner, I'm a programmer based in San Francisco. I created the Buildbot many many years ago, and the "EGD" entropy-gathering daemon before that, I guess those are my two best-known projects. I worked at AllMyData.com from 2005 to 2009, and created Tahoe along with Zooko and our coworker Rob Kinninmont. I'm probably still the author of the majority of the current code, but that's slowly changing as we get more developers involved. By day, I'm a developer at Mozilla, working on the Persona (aka BrowserID) project. Patrick: Currently you are associated with the accounting work. Can you describe exactly what that is and why our readers will be interested in the final results? Brian: Yeah, the goal is to give Tahoe users more visibility into (and control over) how their data is being stored, and how their server space is being used. The current system is pretty all-or-nothing: as a server operator, you can reserve some amount of disk space (and, for the most part, the server won't use it to hold shares of client data), but you can't find out that e.g. Alice is using 20GB but Bob is only using 3GB. Similarly, as a client, you don't have control over where your shares are placed: they'll be spread uniformly among any server that connects to your grid, even though you might consider some of those servers to be unreliable. The general idea behind the Account project is that each client gets an identifier (a public key), and each share they put on a server is kept alive by a lease, which is tagged with their identifier. Patrick: so accounting would allow me as a server operator to prevent people from abusing the commons so to speak? Brian: Right. All leases will have client identifiers: when you enable "no free riders" mode, the server will reject completely anonymous clients. To begin with, there will be no connection between the client identifiers and anything else (names, etc). Servers will just get a table of "client 123 is using 23GB of space", etc. As a client, you'll be able to volunteer a "nickname", so the table can say "client 123 (who calls themselves Alice) is using 23GB". Later, we'll add better UI, so if you've actually met Alice, and she tells you her ID, that table can say "client 123 (who you know as Alice) is using 23GB". (technically speaking, this will be a "petname"). We'll probably start with simple monitoring but then make it possible for servers to require explicit approval from their admins before accepting shares from new clients. There are a lot of reasons why you might hold data for someone else: maybe they're your friend, maybe they're paying you, maybe they're providing service in kind. Patrick: Sounds like a much robust system to control the service than is currently in place. I look forward to it. Brian: In the long run, we want to make it easy to support lots of modes: maybe using Bitcoin for purely economic pay-for-storage transactions, or a form of tit-for-tat barter system where your usage is limited by how much space you've provided for others. Yeah, it's been a long road, but I think we're getting closer to finally implementing the design. Patrick: When should we expect to see accounting enter the stable release? Brian: Oh, that's a good question. I'd like to say 6-12 months, but given our history with this particular feature, I couldn't make any promises. The problem is that we keep scaling back the design to make it easier to implement, and then we discover all sorts of complexity that means it's twice as hard as we anticipated. Then we talk about it a lot, then we go away and forget about it for a while, then a few months later we simplify it some more an try again. I think we're on the 5th or 6th cycle now, and realistically we probably have another one or two to go before we get something implementable. That said, it's likely that we can get some of the basics in place (simple monitoring of space consumed) in the next six months. Patrick: Certainly sounds like a fantastic way to start off the new year. Brian: Heh, yeah, that'd be a nice holiday present. Patrick: I will make sure to ask Santa. You were also recently a release manger for Tahoe-LAFS. What was that like? Brian: It was fun. I've driven other projects in the past (especially Buildbot), so most of the work is mechanical: assembling release notes, checking test results, building tarballs. And we've automated many of the pieces. (not all of them: my goal is for a simple 'git tag; git push' to trigger everything else, but we're not there yet). The main thing about release management is all the "does this feature/bugfix/etc make it in or not" decisions. That and bossing the other developers around for a while: trying to get the most important changes completed early enough so that you can get enough beta coverage to feel confident in them. I work on other projects (BrowserID, and Firefox, for that matter) that use a strict periodic "train" model, where the release happens every N weeks regardless of what features are done: if you don't get it finished, you miss the train, but that's ok because there's another one just down the road that you can aim for. I don't think we have enough developers or momentum (or automation) to use that mode for Tahoe right now, but given another 6 months of practice, maybe we could pull it off. For a small project, periodic releases run the risk of having an empty release when nothing significant has been landed. Patrick: Wow, that was pretty in depth. Great answer. What is your favorite part about working on Tahoe-LAFS? Brian: Hm.. one big part is getting to brainstorm with Zooko and David-Sarah and the others: talking through a design in realtime is a lot of fun, and we come at it from such different angles; I always learn so much from that interaction. It's also great to get to build something that works "Correctly" (with a capital C), without the dozens of little assumptions and compromises that break the security of most other tools. This may sacrifice usability or compatibility, but I'm ok with building something right and then trying to make it more usable later (doing it the other way around is a well-explored space). But I think my favorite part is that this project is starting to influence others: we're establishing the notion that storing things "in the cloud" doesn't have to mean giving up control over your security. Sort of adjusting people's expectations, making them realize they deserve more. We've got projects like Unhosted out there working on making data storage independent from application service, Firefox Sync providing client-side encryption of browser data, and Tarsnap doing client-side security, all of which are in this family of reducing reliance on the server's behavior. It's great space to be working in. Patrick: Okay, two more questions. First what would you like to see TWN which it isn't doing now and where would you like Tahoe-LAFS to go in the next year? Brian: Hm, I guess it'd be fun to have TWN cover some of the questions that have come up in the development meetings: e.g. recently we've been talking about whether Accounting should lean towards an "invitation" model (in which you join a grid by getting invited by someone/anyone who's already in the grid), or a more centralized/explicit model (in which one person controls the whole grid, and adds people by including their public key in a config file). It'd be great to hear from the wider community what they think about the different potential models, and TWN might be a better vehicle for that question than just the tahoe-dev mailing list. As for Tahoe itself, personally I'm getting more interested in browser integration (tahoe-as-addon, "lafs://" URLs, web-apps that can store their runtime state in a tahoe filesystem), and easier grid-management tools (the "invitation" model, simple Accounting controls). I'd love to simplify our protocols enough to get developers comfortable with porting Tahoe to other languages: we used Foolscap because it provided everything we needed (and because I wrote it) but it's too big, and that discourages folks from porting it (and Tahoe) to Ruby or Javascript, etc. I'm especially eager to get the larger world of web-service authors (like the Node.js community) interested in Tahoe, or Tahoe-like systems, to tap into some of the energy building in that space. Patrick: That would be really cool. Anything else you would like to add to the interview? Brian: Nope, just thanks for the time, and thanks for putting so much energy into our little project. TWN is a great service you provide to this community. I really appreciate your dedication! .. |brian| image:: warner.png :height: 35 :alt: Brian Warner :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs Company of the Week =================== The Company of the Week is `Rentanode.nl`_ |rentanode.nl| Rentanode.nl is a new company based in The Netherlands that offers Tahoe-LAFS storage service. You use the Tahoe-LAFS client software to encrypt and upload your data, so you can be sure that the company b Rentanode.nl b never sees your plaintext or your encryption keys. You can rent multiple nodes for added fault-tolerance. Pricing starts at b, 5.00/month for 10 GB. `Rentanode.nl was announced`_ by Guido Witmond |witmond| back in June on the tahoe-dev mailing list and `opened for business on July 31`_. Their page says "Making reliable backups on the internet is as hard as doing an engine overhaul but should be as simple as an oil change. And as afforable." Rentanode.nl accepts payment in either Bitcoin or Euro. .. |rentanode.nl| image:: rentanode-logo-small.png :height: 35 :alt: Rentanode.nl :target: https://www.rentanode.nl .. |witmond| image:: witmond.jpg :height: 35 :alt: Guido Whitmod :target: https://www.rentanode.nl .. _`Rentanode.nl`: https://www.rentanode.nl .. _`Rentanode.nl was announced`: https://tahoe-lafs.org/pipermail/tahoe-dev/2012-June/007467.html .. _`opened for business on July 31`: https://tahoe-lafs.org/pipermail/tahoe-dev/2012-July/007612.html Glowing Quotes ============== bsince 1997b&I've tried lots of hardware/software raid solutions, backup schemes, and so on, and tahoe-lafs is simply amazingb Tahoe-LAFS on Twitter ===================== @zooko just saw a Tahoe-LAFS t-shirt wearing pedestrian crossing Duboce at Guerrero here In SF [`0`_] @zooko ok, the Tahoe-LAFS t-shirt acknowledgement protocol is settled, then: "Tahoe-LAFS!" "WHOO!" "WHOO!"+ [`1`_] .. _`0`: https://twitter.com/gojomo/status/241025836357124097 .. _`1`: https://twitter.com/gojomo/status/241287960622927873 Patches Needing Review of the Week ================================== There are seven (7) ticket still needing review for 1.10.0: * `#1735`: the banner on the Welcome page saying that a helper is not configured should not be red * `#1777`_: cleanups to tests and mutables for 1.10 * `#166`_: command line order is problematic * `#937`_: 'tahoe run' doesn't work for an introducer node * `#1539`_: stop putting pkg_resources.require() into .tac files * `#1159`_: stop using .tac files: make it possible to change appname, Python package-directory name, perhaps other names * `#1693`_: flogtool doesn't get automatically provided There are two (2) tickets still needing review of 1.11.0: * `#1265`_: New Visualizer is insufficiently labelled/documented (plus layout problem) * `#1382`_: immutable peer selection refactoring and enhancements .. _`#1735`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1735 .. _`#1777`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1777 .. _`#166`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/166 .. _`#937`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/937 .. _`#1539`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1539 .. _`#1159`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1159 .. _`#1693`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1693 .. _`#1265`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1265 .. _`#1382`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1382 ---- *The Tahoe-LAFS Weekly News is published once a week by The Tahoe-LAFS* *Software Foundation, President and Treasurer: Peter Secor* |peter| *. Scribes: Patrick "marlowe" McDonald* |marlowe| *, Zooko Wilcox-O'Hearn* |zooko| *, Editor: Zooko.* `View TWN on the web`_ *or* `subscribe to TWN`_ *. Send your news stories to* `marlowe at antagonism.org`_ *b submission deadline: Friday night.* .. _marlowe at antagonism.org: mailto:marlowe at antagonism.org .. |peter| image:: psecor.jpg :height: 35 :alt: peter :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs .. |marlowe| image:: marlowe-x75-bw.jpg :height: 35 :alt: marlowe :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs .. |zooko| image:: zooko.png :height: 35 :alt: zooko :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From richard.m.smith at computerbytesman.com Mon Sep 3 05:10:44 2012 From: richard.m.smith at computerbytesman.com (Richard M. Smith) Date: Mon, 3 Sep 2012 08:10:44 -0400 Subject: Smartphone apps track users even when shut down Message-ID: http://www.boston.com/business/technology/2012/09/02/smartphone-apps-track-users-even-when-shut-down/IH5UM0d4FYU5Gf5GlFjWcL/story.html Some smartphone apps collect and transmit sensitive information stored on a phone, including location, contacts, and Web browsing histories, even when the apps are not being used by the phone's owner, according to two researchers at the Massachusetts Institute of Technology. "It seems like people are no longer in control of their own privacy," said Frances Zhang, a master's degree student in computer science at MIT. Zhang and fellow researcher Fuming Shih, a computer science doctoral candidate, found that some popular apps for phones running Google Inc.'s Android operating system are continually collecting information without informing the phone's owner. The popular game Angry Birds uses the phone's GPS and Wi-Fi wireless networking features to track the owner's location, even when he's not playing the game, for example. Another game, Bowman, collects information from the phone's Internet browser, including what websites the owner has been visiting. And WhatsApp, a popular text-messaging program, scans the user's address book when it is seemingly idle. ------------------------------ From eugen at leitl.org Mon Sep 3 01:26:27 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 3 Sep 2012 10:26:27 +0200 Subject: [tahoe-dev] TWN 37 Message-ID: <20120903082627.GU12615@leitl.org> ----- Forwarded message from Patrick R McDonald ----- From monty at roscom.com Mon Sep 3 07:29:50 2012 From: monty at roscom.com (Monty Solomon) Date: Mon, 3 Sep 2012 10:29:50 -0400 Subject: Thousands fall victim to utility payment scam (Scott Bauer) Message-ID: Scott Bauer, Thousands fall victim to utility payment scam, Associated Press, 12 Jul 2012 As much as President Barack Obama wants your vote, he's not actually offering to pay your monthly bills. But thousands of Americans have been persuaded otherwise, falling victim to a fast-moving scam that claims to be part of an Obama administration program to help pay utility bills in the midst of a scorching summer. The scheme spread quickly across the nation in recent weeks with help from victims who unwittingly shared it on social media sites before realizing they had been conned out of personal information such as Social Security, credit card and checking account numbers. ... http://www.boston.com/business/news/2012/07/12/thousands-fall-victim-utility-payment-scam/CM2m794xalBFJq043Kei5O/story.html ------------------------------ From eugen at leitl.org Mon Sep 3 02:09:54 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 3 Sep 2012 11:09:54 +0200 Subject: [liberationtech] New policy directive for Internet Filtering in Pakistan Message-ID: <20120903090954.GV12615@leitl.org> ----- Forwarded message from Yosem Companys ----- From robotic at gmail.com Mon Sep 3 11:37:42 2012 From: robotic at gmail.com (Chris Csikszentmihalyi) Date: Mon, 3 Sep 2012 11:37:42 -0700 Subject: [drone-list] drone-list Digest, Vol 28, Issue 2 Message-ID: Amie, In case you haven't seen them, there are many companies making land drones bristling with guns. For instance, Foster-Miller: http://en.wikipedia.org/wiki/Foster-Miller_TALON Do an image search for SWORDS; their business model seems to be to put every kind of gun they can think of on the platform. iRobot and others have similar initiatives. Future coastal RNCs will also doubtlessly deploy USVs: http://www.youtube.com/watch?v=oBW2mSpEyi0 That said, as the Tampa Trib has learned, there is often a great distance between demo videos, press releases, and a weaponized drone-in-the-wild. F-M and iRobot are "respectable" Route 128 businesses, though, with military contracts, so they are worth following. C. _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From monty at roscom.com Mon Sep 3 16:52:17 2012 From: monty at roscom.com (Monty Solomon) Date: Mon, 3 Sep 2012 19:52:17 -0400 Subject: Hack on Saudi Aramco hit 30,000 workstations, oil firm admits (John Leyden) Message-ID: First hacktivist-style assault to use malware? John Leyden, *The Register*, 29 August 2012 Analysis Saudi Aramco said that it had put its network back online on Saturday, 10 days after a malware attack floored 30,000 workstations at the oil giant. In a statement [1], Saudi Arabia's national oil firm said that it had "restored all its main internal network services" hit by a malware outbreak that struck on 15 August. The firm said its core business of oil production and exploration was not affected by the attack, which resulted in a decision to suspend Saudi Aramco's website for a period of a few days, presumably as a precaution. Corporate remote access services were also suspended as a result of the attack. Oil and production systems were run off "isolated network systems unaffected by the attack, which the firm has pledged to investigate. In the meantime, Saudi Aramco promised [2] to improve the security of its network to guard against fresh assaults. ... http://www.theregister.co.uk/2012/08/29/saudi_aramco_malware_attack_analysis/ ------------------------------ From monty at roscom.com Mon Sep 3 16:52:17 2012 From: monty at roscom.com (Monty Solomon) Date: Mon, 3 Sep 2012 19:52:17 -0400 Subject: Can YOU crack the Gauss uber-virus encryption? Message-ID: Appeal for help to break open hidden scrambled payload John Leyden, *The Register*, 14 August 2012 Antivirus experts have called on cryptographers and other clever bods for help after admitting they are no closer to figuring out the main purpose of the newly discovered Gauss supervirus. While it's known that the complex malware features many information-stealing capabilities, with a specific focus on capturing website passwords, online banking account credentials and system configuration data from infected machines, the content of the virus's encrypted payload is still a mystery. Kaspersky Lab had tracked Gauss for weeks before announcing its discovery last week. Antivirus experts at the security biz and elsewhere have been burning the midnight oil in the days since, and although progress has been made - for example in analysing its architecture [1], unique modules and communication methods - the payload encryption is unbroken. Researchers reckon the hidden binary blob, when decrypted and executed, looks for a program specifically named using an extended character set, such as Arabic or Hebrew. What that program might be remains unclear as long as the encryption remains unbroken. The general concuss among security experts is that Gauss - like Flame, Duqu and Stuxnet before it - is a nation-state sponsored cyber-espionage toolkit, quite possibly built from the same components as Flame. ... http://www.theregister.co.uk/2012/08/14/gauss_mystery_payload/ [One of my colleagues suggests that unraveling the hidden payload would require breaking some serious crypto, and that someone successfully doing so might not be in a position to want to claim success. But RISKS awaits any further news on this topic. PGN] ------------------------------ From monty at roscom.com Mon Sep 3 16:52:17 2012 From: monty at roscom.com (Monty Solomon) Date: Mon, 3 Sep 2012 19:52:17 -0400 Subject: 'first ever' Linux, Mac OS X-only password sniffing Trojan spotted (John Leyden) Message-ID: John Leyden, Windows? Who the hell uses that? *The Register*, 29 August 2012 Security researchers have discovered a potential dangerous Linux and Mac OS X cross-platform trojan. Once installed on a compromised machine, Wirenet-1 opens a backdoor to a remote command server, and logs key presses to capture passwords and sensitive information typed by victims. The program also grabs passwords submitted to Opera, Firefox, Chrome and Chromium web browsers, and credentials stored by applications including e-mail client Thunderbird, web suite SeaMonkey, and chat app Pidgin. The malware then attempts to upload the gathered data to a server hosted in the Netherlands. ... http://www.theregister.co.uk/2012/08/29/linux_mac_trojan/ ------------------------------ From monty at roscom.com Mon Sep 3 16:52:17 2012 From: monty at roscom.com (Monty Solomon) Date: Mon, 3 Sep 2012 19:52:17 -0400 Subject: Firefox, Opera allow crooks to hide an entire phish site in a link (John Leyden) Message-ID: John Leyden, Watch out for the tinyurl that isn't, *The Register*, 3 Sep 2012 A shortcoming in browsers including Firefox and Opera allows crooks to easily hide an entire malicious web page in a clickable link - ideal for fooling victims into handing over passwords and other sensitive info. Usually, so-called "phishing attacks" rely on tricking marks into visiting websites designed by criminals to masquerade as banks and online stores, thus snaffling punters' credentials and bank account details when they try to use the bogus pages. However this requires finding somewhere to host the counterfeit sites, which are often quickly taken down by hosting companies and the authorities or blocked by filters. Instead, the malicious web pages can be stored in data URIs - uniform resource identifiers, not to be confused with URLs - which stuff the web code into a handy string that when clicked on, instructs the browser to unpack the payload and present it as a page. It negates the need to find somewhere to secrete your malicious page, and once shortened using a service such as TinyURL, the URI can be reduced to a small URL perfect for passing around social networks, online chats and e-mail. Crooks would still need to set up a server to receive data from victims, however. ... http://www.theregister.co.uk/2012/09/03/phishing_without_hosts_peril/ ------------------------------ From eugen at leitl.org Mon Sep 3 13:09:36 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 3 Sep 2012 22:09:36 +0200 Subject: [drone-list] drone-list Digest, Vol 28, Issue 2 Message-ID: <20120903200936.GF12615@leitl.org> ----- Forwarded message from Chris Csikszentmihalyi ----- From gabe at gabegold.com Tue Sep 4 06:01:59 2012 From: gabe at gabegold.com (Gabe Goldberg) Date: Tue, 04 Sep 2012 09:01:59 -0400 Subject: United Airlines Investigates Network Failure Delaying 580 Flights Message-ID: Bloomberg, 28 Aug 2012 http://www.bloomberg.com/news/2012-08-28/united-check-ins-slowed-as-airline-reservation-system-goes-down.html ------------------------------ From lauren at vortex.com Tue Sep 4 09:35:18 2012 From: lauren at vortex.com (Lauren Weinstein) Date: Tue, 4 Sep 2012 09:35:18 -0700 Subject: 1 million iOS device IDs leaked after alleged FBI laptop hack Message-ID: "One million unique device identifiers (UDIDs) from iOS devices have been posted online by hacking group AntiSec, who claimed the UDIDs came from an FBI-owned laptop. The group published a file containing the UDIDs-as well as push notification tokens, device names, and more-on Monday evening, promising that there are plenty more entries where that came from. AntiSec claims the original file contained roughly 12 million UDID entries-some with very personal data attached, such as full names, cell numbers, and home addresses." http://j.mp/Rhq4yu (ars technica via NNSquad) [Key word right now is *alleged*. LW] ------------------------------ From lauren at vortex.com Tue Sep 4 09:41:40 2012 From: lauren at vortex.com (Lauren Weinstein) Date: Tue, 4 Sep 2012 09:41:40 -0700 Subject: Ustream continues to attempt explaining Hugo Awards stream blackout Message-ID: "This occurred because our 3rd party automated infringement system, Vobile, detected content in the stream that it deemed to be copyrighted. Vobile is a system that rights holders upload their content for review on many video sites around the web. The video clips shown prior to Neil's speech automatically triggered the 3rd party system at the behest of the copyright holder." http://j.mp/RhrLMq (Ustream via NNSquad) Most of the folks commenting on their posting are not very happy. [In another NNS posting on this subject, Lauren Weinstein added, ``A similar risk exists with Google's "Hangouts On Air" via Content ID. Solutions are not trivial.'' PGN] [Lee Rudolph noted Hugo and the Rampaging Robots. PGN] http://io9.com/5940036/how-copyright-enforcement-robots-killed-the-hugo-awards ------------------------------ From trinidadshella at artq.com Tue Sep 4 05:07:58 2012 From: trinidadshella at artq.com (NickiWillena) Date: Tue, 04 Sep 2012 10:07:58 -0200 Subject: Buy HCG Now - Only $69 ecv39v2ol Message-ID: <19e82n58w22-03753274-998z3c35@dpctlqto> Buy HCG Now - Only $69 Lose 35lbs in Just 6 Weeks Easy Online Drops Purchase http://servicehgf.ru From genew at ocis.net Tue Sep 4 10:54:55 2012 From: genew at ocis.net (Gene Wirchenko) Date: Tue, 04 Sep 2012 10:54:55 -0700 Subject: "When virtualization becomes your worst enemy" Message-ID: Wrapping everything up in the same box makes hard tasks easy and big problems bigger, *InfoWorld*, 4 Sep 2012 http://www.infoworld.com/d/data-center/when-virtualization-becomes-your-worst-enemy-201398 [The IT version of putting all of one's eggs in one basket?] ------------------------------ From lauren at vortex.com Tue Sep 4 16:11:34 2012 From: lauren at vortex.com (Lauren Weinstein) Date: Tue, 4 Sep 2012 16:11:34 -0700 Subject: FBI Says Laptop Wasn't Hacked; never possessed Apple device ID file Message-ID: "The Federal Bureau of Investigation is refuting a statement made by members of AntiSec this weekend that they hacked the laptop of an FBI special agent and stole a file containing 12 million Apple device IDs and associated personal information." http://j.mp/PZtzNY (*Wired* via NNSquad) ------------------------------ From lauren at vortex.com Tue Sep 4 21:24:26 2012 From: lauren at vortex.com (Lauren Weinstein) Date: Tue, 4 Sep 2012 21:24:26 -0700 Subject: Apple patent would disable phone based on location Message-ID: "Among a bevy of patents awarded to Apple this week was one that would enable or disable certain features of a phone depending on its location. It could be useful, but it also raises serious questions about who really owns your device." http://j.mp/PZNegI (NBC via NNSquad) A lot of ideas are patented but never used. Anyway, without reading the patent in detail, I'd note there are a variety of apps (that probably postdate the patent application) that do this already. One problem with any attempt to enforce such a regime is that you need everyone to have phones carrying the capability, and you have to be ready for the litigation exposure if (for example) an important call or message is blocked by such a system. It doesn't take much imagination to think of a bunch of other exposure examples as well. ------------------------------ From gfoster at entersection.org Tue Sep 4 20:19:46 2012 From: gfoster at entersection.org (Gregory Foster) Date: Tue, 04 Sep 2012 22:19:46 -0500 Subject: [drone-list] Drone Campaign Network Message-ID: /The Drones Campaign Network (DCN) is a UK-based network of organisations, academics and individuals working together to share information and coordinate collective action in relation to military drones. Membership of the network is by invitation but the network welcomes supporters, both individuals and organisations./ http://dronecampaignnetwork.wordpress.com/ This coalition came to my attention because of a monthly newsletter they have been publishing. Here's the September issue, which outlines an upcoming Drones Week of Action (Oct 6-13): http://us2.campaign-archive2.com/?u=f4b7a7e4e1dc9a526bdcef140&id=59cb9eef33&e=33e16c34a4 I've cc:ed the coalition information address; we'd love to have your participation on the drone list, where we've gathered a stellar group of journalists, academics, activists, and citizens documenting the proliferation of drones in the States and beyond. https://mailman.stanford.edu/mailman/listinfo/drone-list gf -- Gregory Foster || gfoster at entersection.org @gregoryfoster <> http://entersection.com/ _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From boruch_baum at gmx.com Wed Sep 5 04:20:33 2012 From: boruch_baum at gmx.com (Boruch Baum) Date: Wed, 05 Sep 2012 07:20:33 -0400 Subject: [Freedombox-discuss] counter-freedombox Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Following is a reprint from rt.com. One of the reasons it's of relevance to readers of this list is as an example of how to surgically defeat a sub-set of a network, ie. political demonstrators would be disabled, while their (co-located) oppressors would remain enabled. http://rt.com/news/apple-patent-transmission-block-408/ No shooting at protest? Police may block mobile devices via Apple ================================================================= Apple has patented a piece of technology which would allow government and police to block transmission of information, including video and photographs, from any public gathering or venue they deem bsensitiveb, and bprotected from externalities.b B-In other words, these powers will have control over what can and cannot be documented on wireless devices during any public event. And while the company says the affected sites are to be mostly cinemas, theaters, concert grounds and similar locations, Apple Inc. also says bcovert police or government operations may require complete bblackoutb conditions.b bAdditionally,b Apple says,b the wireless transmission of sensitive information to a remote source is one example of a threat to security. This sensitive information could be anything from classified government information to questions or answers to an examination administered in an academic setting.b The statement led many to believe that authorities and police could now use the patented feature during protests or rallies to block the transmission of video footage and photographs from the scene, including those of police brutality, which at times of major events immediately flood news networks and video websites. Apple patented the means to transmit an encoded signal to all wireless devices, commanding them to disable recording functions. Those policies would be activated by GPS, and WiFi or mobile base-stations, which would ring-fence ("geofence") around a building or a bsensitive areab to prevent phone cameras from taking pictures or recording video. Apple may implement the technology, but it would not be Apple's decision to activate the bfeatureb b it would be down governments, businesses and network owners to set such policies, analyzes ZDNet technology website. Having invented one of the most sophisticated mobile devices, Apple now appears to be looking for ways to restrict its use. bAs wireless devices such as cellular telephones, pagers, personal media devices and smartphones become ubiquitous, more and more people are carrying these devices in various social and professional settings,b it explains in the patent. bThe result is that these wireless devices can often annoy, frustrate, and even threaten people in sensitive venues.b The companybs listed bsensitiveb venues so far include mostly meetings, the presentation of movies, religious ceremonies, weddings, funerals, academic lectures, and test-taking environments. - -- hkp://keys.gnupg.net CA45 09B5 5351 7C11 A9D1 7286 0036 9E45 1595 8BC0 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJQRzVWAAoJEDvrUfDmCx9L7IMQAJKaIR0sQezgWv+qbx/Wxpqd anoXw1rqyLps5HoE3YrL6qxNz5aLCGtFqBiLh4dAcFrWzHb+ffUGZ5xg4XEVsa79 Mggr8F1+Y9DW/J13N98b+U7f42rC4L+0Ju7F/jx0qKveFg/syVVxVhL0oDJCENPJ xyphhSpzc5udFuNxbgG54UMq8Q8wf8DzA4KpYD7tXRJkYvW92CZzTtjm1Y+0U5gO 3+4yxuVSSy5akxeCufX+6YQ6dCgZoS6jDPZRrXXoY7rdk/zjYP/x2SYskBpIWM44 CZsGUYskfy3mr26Xwy06VELagMDF7dAEQygiWENrxiNO+H4sDK7pGh9JlZyex6mV nYiyOii5RaYat8OpmjOlS+FGXOvgKz6N90J6BbMA1e/r/6oQB/YSqN9IdQHmO9UA FtL+wJyqlJwiTYahlinc2CQjyY++bE4FsK7NQDfFa3gj9N0fhTqgnhfZk5KM2s4O Rka5r25xuHPtvtN2b9z3L9qCrMTsiLEkbEkjpOS+Ww1K/LLj+5v3E49e/V45mLaB smwVevmLb1QwiikDrLbykI3YuaELDjsCNpwgwjvRdfGoidwc01xT6Vai4xIlGFxU BTT5MTBK48mQS65LBtlUqv3pxAewKkcHzKVOLRgkvFu5xp9KvF56hNJm/PE3WOB4 a+Qew5LDaJ/2IDhH8Dfu =DW2k -----END PGP SIGNATURE----- _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Sep 5 03:16:11 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 5 Sep 2012 12:16:11 +0200 Subject: Leave Your Cellphone at Home Message-ID: <20120905101611.GF12615@leitl.org> http://nplusonemag.com/leave-your-cellphone-at-home Sarah Resnick Leave Your Cellphone at Home Interview with Jacob Appelbaum >From OCCUPY Gazette 4, out May 1. Earlier this year in Wired, writer and intelligence expert James Bamford described the National Security Agencybs plans for the Utah Data Center. A nondescript name, but it has another: the First Intelligence Community Comprehensive National Cyber-security Initiative Data Center. The $2 billion facility, scheduled to open in September 2013, will be used to intercept, decipher, analyze, and store the agencybs intercepted communicationsbeverything from emails, cell phone calls, Google searches, and Tweets, to retail transactions. How will all this data be stored? Imagine, if you can, 100,000 square-feet filled with row upon row of servers, stacked neatly on racks. Bamford projects that its processing-capacity may aspire to yottabytes, or 1024 bytes, and for which no neologism of higher magnitude has yet been coined. To store the data, the NSA must first collect it, and here Bamford relies on a man named William Binney, a former NSA crypto-mathematician, as his main source. For the first time, since leaving the NSA in 2001, Binney went on the record to discuss Stellar Wind, which we all know by now as the warrantless wiretapping program, first approved by George Bush after the 2001 attacks on the twin towers. The program allowed the NSA to bypass the Foreign Intelligence Surveillance Court, in charge of authorizing eavesdropping on domestic targets, permitting the wholesale monitoring of millions of American phone calls and emails. In his thirty years at the NSA, Binney helped to engineer its automated system of networked data collection which, until 2001, was exclusively directed at foreign targets. Binney left when the organization started to use this same technology to spy on American citizens. He tells of secret electronic monitoring rooms in major US telecom facilities, controlled by the NSA, and powered by complex software programs examining Internet traffic as it passes through fiber-optic cables. (At a local event last week, Binney circulated a list of possible interception points, including 811 10th Avenue, between 53rd & 54th St., which houses the largest New York exchange of AT&T Long Lines.) He tells of software, created by a company called Narus, that parses US data sources: any communication arousing suspicion is automatically copied and sent to the NSA. Once a name enters the Narus database, all phone calls, emails and other communications are automatically routed to the NSAbs recorders. The NSA wasnbt the only intelligence-gathering agency to have its domestic surveillance powers expanded in the wake of September 11th. The USA PATRIOT Act, for instance, allows the FBI to spy on US citizens without demonstrating probable cause that its targets are engaged in criminal activities. Under Section 215 of the Act, the now infamous National Security Lettersbwhich formerly required that the information being sought pertain to a foreign power or agent of a foreign powerbcan compel the disclosure of sensitive information held by banks, credit companies, telephone carrier, and Internet Service Providers, among many others, about US citizens. The recipient of an NSL is typically gagged from disclosing the fact or nature of the request. Itbs no secret that, whereas the Fourth Amendment prevents against unreasonable search and seizure, concerns over bnational securityb occasioned its disregard and the violation of privacy rights of even the most ordinary citizens. Activists have all the more reason to worry, repeatedly turning up as the subject of terrorist investigations. For instance, in 2006 the ACLU revealed that the Pentagon was secretly conducting surveillance of protest activities, antiwar organizations, and groups opposed to military recruitment policies, including Quakers and student organizations. Relying on sources from the Department of Homeland Security, local police departments, and FBI Joint Terrorism Task Forces, the Pentagon collected, stored, and shared this data through the Threat and Local Observation Database, or TALON, designed to track terrorist threats. Or take Scott Crow, a self-described anarchist and veteran organizer in the global justice movement, who, as the New York Times reported last year, is one of dozens of political activists across the country to have come under scrutiny from the FBIbs increased counterterrorism operation. The FBI set up a video camera outside his house, monitored guests as they came and went, tracked his emails and phone conversations, and picked through his trash to identify his bank and mortgage companies, presumably to send them subpoenas. Others to have been investigated included animal rights activists in Virginia and liberal Roman Catholics in Nebraska. When in 2008, President Obama took the reigns from George W. Bush, there was an expectation that much, or at least some, of this activity would be curbed. Yet, as Bamfordbs article attests, the govermentbs monitoring and collection of our digital data remains steadfast. When the Occupy protests started in mid-September of last year, I relied on data-generating technologies increasingly, more so than I had ever before. Within a few weeks I had joined multiple OWS-related listservs; Ibd started following Twitter with unprecedented commitment; I spent more hours on Facebook than I care to acknowledge. I doubt I am the only one. At the same time, there was a widespread sense of precautionbjust because we were engaging in legal activities, covered by our First Amendment rights, no one, it seemed, should presume herself exempt from the possibility of surveillance. Sensitive conversations took place in loud bars, never over email. Text messages were presumed unsafe. In meetings, cell phone batteries were removed on occasion. Nevertheless, it was easy to feel unimportant (why would anyone watch me?) and equally easy to let standards relaxbespecially when it meant reclaiming conveniences that, once enjoyed, webre difficult to give up. Leaving a trail of potentially incriminating digital data seemed inevitable. But how bad could it really be? And was there no way to use these same tools while safeguarding our privacy? In late April, I sat down with the independent security researcher, hacker, and privacy advocate Jacob Appelbaum, who knows a thing or two about the surveillance state. Appelbaum is one of the key members of the Tor project, which relies on a worldwide volunteer network of servers to reroute Internet traffic across a set of encrypted relays. Doing so conceals a userbs location, and protects her from a common form of networking surveillance known as traffic analysis, used to infer who is talking to whom over a public network. Tor is both free (as in freedom) and free of charge. Appelbaum is also the only known American member of the international not-for-profit WikiLeaks. Resnick: The recent article in Wired describes where and how the NSA plans to store its share of collected data. But as the article explains, the Utah facility will have another important function: cryptanalysis, or code-breaking, as much of the data cycling through will be heavily encrypted. It also suggests that the Advanced Encryption Standard (AES), expected to remain durable for at least another decade, may be cracked by the NSA in a much shorter time if theybve built a secret computer that is considerably faster than any of the machines we know about. But more to the pointbis encryption safe? Appelbaum: Some of it is as safe as we think it can be, and some of it is not safe at all. The number one rule of bsignals intelligenceb is to look for plain text, or signaling informationbwho is talking to whom. For instance, you and I have been emailing, and that information, that metadata, isnbt encrypted, even if the contents of our messages are. This bsocial graphb information is worth more than the content. So, if you use SSL-encryption to talk to the OWS server for example, great, they donbt know what youbre saying. Maybe. Letbs assume the crypto is perfect. They see that youbre in a discussion on the site, they see that Bob is in a discussion, and they see that Emma is in a discussion. So what happens? They see an archive of the website, maybe they see that there were messages posted, and they see that the timing of the messages correlates to the time you were all browsing there. They donbt need to know to break a crypto to know what was said and who said it. Resnick: And this type of surveillance is called b&? Appelbaum: Traffic analysis. Itbs as if they are sitting outside your house, watching you come and go, as well as the house of every activist you deal with. Except theybre doing it electronically. They watch you, they take notes, they infer information by the metadata of your life, which implies what it is that youbre doing. They can use it to figure out a cell of people, or a group of people, or whatever they call it in their parlance where activists become terrorists. And itbs through identification that they move into specific targeting, which is why itbs so important to keep this information safe first. For example, they see that webre meeting. They know that I have really good operational security. I have no phone. I have no computer. It would be very hard to track me here unless they had me physically followed. But they can still get to me by way of you. They just have to own your phone, or steal your recorder on the way out. The key thing is that good operational security has to be integrated into all of our lives so that observation of what webre doing is much harder. Of course itbs not perfect. They can still target us, for instance, by sending us an exploit in our email, or a link in a web browser that compromises each of our computers. But if they have to exploit us directly, that changes things a lot. For one, the NYPD is not going to be writing exploits. They might buy software to break into your computer, but if they make a mistake, we can catch them. But itbs impossible to catch them if theybre in a building somewhere reading our text messages as they flow by, as they go through the switching center, as they write them down. We want to raise the bar so much that they have to attack us directly, and then in theory the law protects us to some extent. Resnick: So if I were arrested, and the evidence presented came from a targeted attack on my computer, and I knew about the attack, I would have some kind of legal recourse? Appelbaum: Well, thatbs an interesting question. What is the legal standard for breaking into someonebs computer because they were at a protest? Congratulations, take that to the Supreme Court, you might be able to make some really good law. I think the answer is that itbs a national newsworthy incidentbnobody knows the cops break into peoplebs computers. The cops break into someonebs house, the Fourth Amendment is super clear about thatbit canbt be done without a warrant. Resnick: In January of last year, it was reported that the records for your Twitter accountb along with those of Julian Assange, Private Bradley Manning, Dutch hacker Rop Gonggrjp, and Icelandic lawmaker Brigatta Jonsdottirbwere subpoenaed by the US government. What is perhaps most notable in this case is not that the accounts were subpoenaed, but that the orders, usually gagged and carried out in secret, became public knowledge. Twitter contested the secrecy order and won the right to notify you. Several months later, the Wall Street Journal revealed that Google and the Internet service provider Sonic.net, had received similar orders to turn over your data. Appelbaum: Twitter notified me. But as for Google and Sonic.net, I read about it in the Wall Street Journal like everybody else. So now I can talk about it because it was in a public newspaper. Those are b2703(d) administrative subpoenas,b and they asked for IP addresses, and the email addresses of the people I communicated with, among other things. The government asserts that it has the right to get that metadata, that bsignalingb or relationship information, without a warrant. They get to gag the company, and the company canbt fight it, because itbs not their data, itbs my data, or itbs data about me, so they have no Constitutional standing. And the government asserts that I have no expectation of privacy because I willingly disclosed it to a third party. And in fact my Twitter data was given to the governmentbno one has really written about that yet. We are still appealing but we lost the stay, which means Twitter had to disclose the data to the government, and whether or not they can use it is pending appeal. Once they get the data, itbs not like itbs private or secretband even if they canbt use it as evidence, they can still use it in their investigations. Resnick: In January of this year, the Twitter account of writer and OWS protester Malcolm Harris was subpoenaed by the Manhattan District Attorneybs Office. I think itbs safe to assume these incidents are not anomalies. In which case, is there a way to use social media sites like Twitter without putting our private data at risk? Because these sites can be very useful tools of course. Appelbaum: In the case of something like Twitter, you can use Tor on the Android phonebwe have a version of Tor for Android called Orbotband Twitter together and thatbs essentially the best youbre going to do. And even that isnbt particularly great. Twitter keeps a list of IP addresses where youbve logged in, but if you use Tor, it wonbt know you are logging in from your phone. Itbs powerful, but the main problem is that itbs kind of complicated to use. On your computer, you can use the Tor browser, and when you log into Twitter, youbre fine, no problem allbyour IP address will trace back to Tor again. So now when the government asserts that you have no expectation of privacy, you can say all right, well I believe I have an expectation of privacy, which is why I use Tor. I signal that. And the private messaging capability of Twitterbdonbt use it for sensitive stuff. Twitter keeps a copy of all its messages. Resnick: During the perceived wave of Internet activism throughout the 2009 Iranian election protests, a new proprietary software called Haystack received a lot of media attention. Haystack promised Iranian activists tightly encrypted messages, access to censored websites, and the ability to obfuscate Internet traffic. You later tested the software and demonstrated its claims to be false. For those of us who donbt have your technical skill set, how can we assess whether a particular tool is safe to use, especially if itbs new? Appelbaum: First, is the source code available? Second, if the claims are just too good to be true, they probably are. Therebs a thing called snake oil crypto or snake oil software, where the product promises the moon and the sun. When a developer promises that a proprietary software is super secure and only used by important people, itbs sketchy. Third, are the people working on this part of the community that has a reputation for accomplishing these things? Thatbs a hard one, but ask someone you know and trust. How would you go on a date with someone? How would you do an action with someone? Transitive trust is just as important in these situations. Another thing to look at is whether itbs centralized or decentralized. For example Haystack was centralized, whereas Tor is decentralized. Also, how is it sustained? Will it inject ads into your web browser, like AnchorFree, the producer of the Hotspot Shield VPN? Or is it like Riseup.net, whose VPN service monetizes not through your traffic, but through donations and solidarity and mutual aid? And if they can inject ads, that means they can inject a back door. Thatbs super sketchybif they do that, thatbs bad news. So you want to be careful about that. Finally, remember: The truth is like a bullet that pierces through the armor of charlatans. Resnick: What should we know about cell phones? Itbs hard to imagine going to a protest without one. But like all networked technologies, surely they are double-edged? Appelbaum: Cell phones are tracking devices that make phone calls. Itbs sad, but itbs true. Which means software solutions donbt always matter. You can have a secure set of tools on your phone, but it doesnbt change the fact that your phone tracks everywhere you go. And the police can potentially push updates onto your phone that backdoor it and allow it to be turned into a microphone remotely, and do other stuff like that. The police can identify everybody at a protest by bringing in a device called an IMSI catcher. Itbs a fake cell phone tower that can be built for 1500 bucks. And once nearby, everybodybs cell phones will automatically jump onto the tower, and if the phonebs unique identifier is exposed, all the police have to do is go to the phone company and ask for their information. Resnick: So phones are tracking devices. They can also be used for surreptitious recording. Would taking the battery out disable this capability? Appelbaum: Maybe. But iPhones, for instance, donbt have a removable battery; they power off via the power button. So if I wrote a backdoor for the iPhone, it would play an animation that looked just like a black screen. And then when you pressed the button to turn it back on it would pretend to boot. Just play two videos. Resnick: And how easy is it to create something like to that? Appelbaum: There are weaponized toolkits sold by companies like FinFisher that enable breaking into BlackBerries, Android phones, iPhones, Symbian devices and other platforms. And with a single click, say, the police can own a person, and take over her phone. Resnick: Rightbin November of last year, the Wall Street Journal first reported on this new global market for off-the-shelf surveillance technology, and created bSurveillance Catalogb on their website, which includes documents obtained from attendees of a secretive surveillance conference held near Washington, D.C. WikiLeaks has also released documents on these companies. The industry has grown from almost nothing to a retail market worth $5 billion per year. And whereas companies making and selling this gear say it is available only to governments and law enforcement and is intended to catch criminals, critics say the market represents a new sort of arms trade supplying Western governments and repressive nations alike. Appelbaum: Itbs scary because [accessing these products is so] easy. But when a company builds a backdoor, and sells it, and says trust us, only good guys will use itb& well, first of all, we donbt know how to secure computers, and anybody that says otherwise is full of shit. If Google can get owned, and Boeing can get owned, and Lockheed Martin can get owned, and engineering and communication documents from Marine One can show up on a filesharing network, is it realistic to assume that perfect security is possible? Knowing this is the case, the right thing is to not build any backdoors. Or assume these backdoors are all abused and bypass them so that the data acquired is very uninteresting. Like encrypted phone calls between two peoplebitbs true they can wiretap the data, but theybll just get noise. When Hillary Clinton and the State Department say they want to help people abroad fight repressive governments, they paint Internet freedom as something they can enable with $25 million. Whereas in reality the FBI makes sure that our communications tech isnbt secure. This makes it impossible for people like me to help people abroad overthrow their governments because our government has ensured that all their technology is backdoor ready. And in theory, they try to legitimize state surveillance here, and there they try to make it illegitimate. They say, bIn over-there-a-stan, surveillance is oppressive. But over here, itbs okay, we have a lawful process.b (Which is not necessarily a judicial process. For example, Eric Holder and the drones . . . sounds like a band, right?) Resnick: Okay, so one thing Ibve heard more than once at meetings when security culture comes up is that . . . well, therebs a sense that too much precaution grows into (or comes out of) paranoia, and paranoia breeds mistrustband all of it can be paralyzing and lead to a kind of inertia. How would you respond to something like that? Appelbaum: The people who that say thatbif theybre not cops, theybre feeling unempowered. The first response people have is, whatever, Ibm not important. And the second is, theybre not watching me, and even if they were, therebs nothing they could find because Ibm not doing anything illegal. But the thing is, taking precautions with your communications is like safe sex in that you have a responsibility to other people to be safebyour transgressions can fuck other people over. The reality is that when you find out it will be too late. Itbs not about doing a perfect job, itbs about recognizing you have a responsibility to do that job at all, and doing the best job you can manage, without it breaking down your ability to communicate, without it ruining your day, and understanding that sometimes itbs not safe to undertake an action, even if other times you would. Thatbs the education component. So security culture stuff sounds crazy, but the technological capabilities of the police, especially with these toolkits for sale, is vast. And to thwart that by taking all the phones at a party and putting them in a bag and putting them in the freezer and turning on music in the other roombtrue, someone in the meeting might be a snitch, but at least therebs no audio recording of you. Part of informed consent is understanding the risks you are taking as you decide whether to participate in something. Thatbs what makes us freebthe freedom to question what webre willing to do. And of course itbs fine to do that. But itbs not fine to say, I donbt believe therebs a risk, youbre being paranoid, Ibm not a target. When people say that they donbt want to take precautions, we need to show them how easy it is to do it. And to insist that not doing it is irresponsible, and most of all, that these measures are effective to a degree, and worth doing for that reason. And itbs not about perfection, because perfection is the enemy of bgood enough.b I would encourage people to think about the activity they want to engage in, and then say, Hey, this is what I want to do. Work together collaboratively to figure out how to do that safely and securely, but also easily without needing to give someone a technical education. Because thatbs a path of madness. And if people arenbt willing to change their behaviors a little bit, you just canbt work with them. I mean thatbs really what it comes down to. If people pretend that theybre not being oppressed by the state when they are literally being physically beaten, and forced to give up retinal scans, thatbs fucking ridiculous. We have to take drastic measures for some of these things. The FBI has this big fear that theybre going to bgo dark,b which means that all the ways they currently obtain information will disappear. Well, America started with law enforcement in the dark; once, we were perceived to be innocent until proven guilty. And just because the surveillance is expanding, and continues to expand, doesnbt mean we shouldnbt push back. If you havenbt committed a crime they should have no reason to get that information about you, especially without a warrant. Resnick: Are there any other tools or advice you would suggest to an activist, or anyone for that matter? Appelbaum: Well, itbs important to consider the whole picture of all the electronic devices that we have. First, you should use Tor and the Tor browser for web browsing. Know that your home internet connection is probably not safe, particularly if itbs tied to your name. If you use a Mac or Windows operating system, be especially careful. For instance, therebs a program called Evilgrade that makes it easy for attackers to install a backdoor on a computer by exploiting weaknesses in the auto-update feature of many software programs. So if you have Adobebs PDF reader, and youbre downloading and installing the update from Adobe, well, maybe youbll get a little extra thing, and youbre owned. And the cops have a different but better version of that software. Which is part of why I encourage people to use Ubontu or Debian or Linux instead of proprietary systems like a Mac or whatever. Because there are exploits for everything. If youbre in a particularly sensitive situation, use a live bootable CD called TAILSbit gives you a Linux desktop where everything routes over Tor with no configuration. Or, if youbre feeling multilingual, host stuff in another country. Open an email account in Sweden, and use TAILS to access it. Most important is to know your options. A notepad next to a fireplace is a lot more secure than a computer in some ways, especially a computer with no encryption. You can always throw the notepad in the fireplace and thatbs that. For email, using Riseup.net is good news. The solutions they offer are integrated with Tor as much as possible. Theybre badass. Because of the way they run the system, Ibm pretty sure that the only data they have is encrypted. And Ibd like to think that what little unencrypted data they do have, they will fight tooth and nail to protect. Whereas, yes, you can use Tor and Gmail together, but itbs not as integratedbwhen you sign in, Gmail doesnbt ask if you want to route this over Tor. But also, Google inspects your traffic as a method of monetization. Ibd rather give Riseup fifty dollars a month for the equivalent service of Gmail, knowing their commitment to privacy. And also knowing that they would tell the cops to go fuck themselves. Therebs a lot of value in that. For chatting, use software with off-the-record messaging (OTR)bnot Googlebs bgo off the record,b but the actual encryption softwarebwhich allows you to have an end-to-end encrypted conversation. And configure it to work with Tor. You can bootstrap a secure communication channel on top of an insecure one. On a Mac, use Adiumbit comes with OTR, but you still have to turn it on. When you chat with people, click verify and read the fingerprint to each other over the telephone. You want to do this because there could be a bman in the middleb relaying the messages, which means that you are both talking to a third party, and that third party is recording it all. As for your cell phone, consider it a tracking device and a monitoring device and treat it appropriately. Be very careful about using cell phones, but consider especially the patterns you make. If you pull the battery, youbve generated an anomaly in your behavior, and perhaps thatbs when they trigger people to go physically surveil you. Instead, maybe donbt turn it off, just leave it at home. Because, as I said earlier, in a world with lots of data retention, our data trails tell a story about us, and even if the story is made of truthful facts, itbs not necessarily the truth. On a cell phone, you can install stuff like OStel, which allows you to make encrypted voice-over-the-Internet calls, or PrivateGSMbitbs not free, but itbs available for BlackBerries, Android phones, iPhones and so on. Which means that if they want to intercept your communication, they have to break into your phone. Itbs not perfect. Gibberbot for the Android allows you to use Tor and Jabberbwhich is like Google Chatbwith OTR automatically configured. You type in your Jabber ID, it routes over Tor, and when you chat with other people, it encrypts the messages end-to-end so even the Jabber server canbt see whatbs being said. And there are a lot of tools like that to choose from. Another thing to consider is the mode in which we meet. If we want to edit something collaboratively, therebs a program called Etherpad. And therebs a social networking application called Crabgrass, and hosted at we.riseup.net. Itbs like a private Facebook. Riseup still has a lot of the data, but itbs private by default. So itbs secure, short of being hacked, which is possible, or short of some legal process. And if you use it in a Tor browser, and never reveal information about yourself, youbre in really good shape. Unlike Facebook, which is like the Stasi, but crowdsourced. And I mean that in the nicest way possible. I once had a Facebook accountbitbs fun and a great way to meet people. But it is not safe for political organizing, especially when youbre part of the minority, or when youbre not part of the minority, but you are part of the disempowered majority. As a final thought, Ibd say just to remember that a big part of this is social behavior and not technology per se. And a big part of it is accepting that while we may live in a dystopian society right now, we donbt always have to. Thatbs the tradeoff, right? Because what is OWS working toward? The answer is, something different. And if we want an end to social inequality, the surveillance state is part of what we have to change. If we make it worthless to surveil people, we will have done this. So, it needs to be the case that what we do doesnbt hang us for what we wish to create. Image: NSA headquarters, Ft. Meade, MD. From eugen at leitl.org Wed Sep 5 04:25:27 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 5 Sep 2012 13:25:27 +0200 Subject: [Freedombox-discuss] counter-freedombox Message-ID: <20120905112527.GP12615@leitl.org> ----- Forwarded message from Boruch Baum ----- From eugen at leitl.org Wed Sep 5 04:27:23 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 5 Sep 2012 13:27:23 +0200 Subject: [drone-list] Drone Campaign Network Message-ID: <20120905112723.GQ12615@leitl.org> ----- Forwarded message from Gregory Foster ----- From eugen at leitl.org Wed Sep 5 04:53:04 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 5 Sep 2012 13:53:04 +0200 Subject: Once all our cars can talk to each other, what will they reveal about us? Message-ID: <20120905115304.GR12615@leitl.org> http://www.itworld.com/it-managementstrategy/292996/once-all-our-cars-can-talk-each-other-what-will-they-reveal-about-us Once all our cars can talk to each other, what will they reveal about us? In the future, cars will be networked, personalized, and connected to the cloud. The laws protecting personal data collected from these cars? Still largely road kill. By Dan Tynan 4 comments September 03, 2012, 1:28 PM b Last week I had the pleasure of attending the IFA 2012 consumer electronics show in Berlin as a guest of the IFA organizers. When not drinking Pilsner and eating bratwurst I managed to squeeze in a panel on the future of the car, featuring representatives from Ford, Microsoft, Inrix (the leading provider of aggregated traffic data to onboard GPS systems), and TuneIn Radio, makers of a music app for cars. I also interviewed Pim van der Jagt, a managing director for Ford Europe. Bottom line? In a few short years our cars will be connected and talking to each other. They will also be able to collect vast amounts of data about who we are, where we go, and what we do. Some of these things will undoubtedly make our vehicles much safer; some may erase what little roadside privacy we have left. This is more than just Jetsons-like fantasy. Last month the National Highway Traffic Safety Administration (NHTSA) and eight major car manufacturers launched a year-long test of car-to-car communications in Ann Arbor. Some 2800 cars, trucks, and city buses have been equipped with gear that will broadcast their size, speed, and location to each other as they roll down the road, using a special band of WiFi spectrum reserved for vehicle-to-vehicle communications. If another car gets too close or a pedestrian suddenly steps into the intersection, drivers receive an alert and can react accordingly. Your location data is no more private than the color of your car, says Federal judge Why location privacy is important Location may be the next killer app Some 70 percent of all accidents can be avoided if cars are networked, says van der Jagt. But thatbs really just the beginning. Technology already exists that would allow your carbs computer to take control of the brakes and accelerator to avoid a collision, or to moderate the speed of each car to keep traffic flowing. And while webre still a long ways away from being able to climb into the backseat and take a nap while our cars drive us to our destination (sorry Google Car fans), systems that can take the wheel during certain situations - like when stuck in bumper-to-bumper traffic -- are likely to appear much sooner, says van der Jagt. The only question is whether drivers would be willing to hand the wheel over to their computer. Because the cars in the Ann Arbor test only need to know the location of other vehicles within 300 meters, therebs no need to connect to the Internet or record your carbs location, says van der Jagt. And since the system doesnbt collect any data from the carbs registration or VIN, therebs no way for Ford or anyone else to know who you are and where youbre going, he adds. But thatbs just one aspect of the connected car. The car of the future will also be personalized. It will be able to tell who just climbed behind the wheel and adjust the seats, mirrors, environmental controls, and radio stations accordingly. Using your smart phone, it will be able to connect to your data in the cloud, download your Outlook calendar, remind you about your next meeting, calculate when youbll get there, and send an email to other attendees if youbre running late. It will know the music you like to listen to, the routes you like to take each day and how fast you drive to get there. Van der Jagt says Ford is even working on sensors built into the seats that can monitor your heart rate to determine if youbre about to fall asleep at the wheel or just had a heart attack. For those features, the car (and its various mobile service providers) will definitely need to know who you are and where you are. The question then becomes, what happens to all this data? At this point, Inrix collects all its traffic data anonymously, and Ford and Microsoftbs philosophy is the customer owns the data. But exactly what that means is unclear. Are identity and location data stored, and if so, by whom and for how long? What other entities will have access to this information? Will the cops demand this data in order to nab speeders? And what about companies that want to monetize that data b like an insurance company that offers discounts for good drivers while penalizing those who put the pedal to the metal on a semi-regular basis, as Progressive Insurance already does via its bblack boxb electronic data recorders? Whatbs to keep a mobile service provider from selling that data to the highest bidders? Webve already seen what happens with cell phone data thatbs collected by the wireless companies: Police made more than 1.3 million requests for location data last year alone, roughly two thirds of them in non-emergency situations. It was up to the wireless companiesb attorneys to determine whether those requests would be honored and their customersb location data shared. Federal courts have recently ruled that sharing such data without a warrant is not a violation of our Fourth Amendment rights against unlawful search and seizure. And while commercial use of location data is still in its infancy, in part because wireless companies fear a privacy backlash, that wonbt last forever. That data too could be a target of law enforcement requests. If the tests in Ann Arbor prove successful, car-to-car networking is likely to be mandated by NHTSA b and may appear in cars as early as 2018. The notion of cloud-connected cars is less certain, but also seems inevitable. The question will be whether we will gain the legal right to control how our car data is used, or if the mobile service companies will be the ones with their hands firmly on the wheel. Got a question about social media? TY4NS blogger Dan Tynan may have the answer (and if not, hebll make something up). Visit his snarky, occasionally NSFW blog eSarcasm or follow him on Twitter: @tynanwrites. For the latest IT news, analysis and how-tobs, follow ITworld on Twitter and Facebook. From genew at ocis.net Wed Sep 5 14:02:03 2012 From: genew at ocis.net (Gene Wirchenko) Date: Wed, 05 Sep 2012 14:02:03 -0700 Subject: "Automated DRM keeps spoiling the show, from the DNC to Mars" (Phipps-Samson) Message-ID: Simon Phipps and Ted Samson, Robots aren't smart enough to decide if video or song is used lawfully; instead of trying to improve content monitoring software, we should look to ditch it, *InfoWorld*, 5 Sep 2012 http://www.infoworld.com/t/drm/automated-drm-keeps-spoiling-the-show-the-dnc-mars-201688 opening text (one of the examples): Science-fiction fans from all over the world were avidly watching the live broadcast of the Hugo Awards last Sunday from Chicon 7, the World Science Fiction Convention in Chicago. This is a venerable event with much more longevity than you might imagine: Attendees were celebrating the event's 70th year. One of the award winners, British author Neil Gaiman, was recognized for a script for the cult BBC TV series "Doctor Who." Following the showing of a clip from the episode, Gaiman took the podium for the award ceremony to make his acceptance speech. Then, however, the broadcast was abruptly cut off. A robot at Ustream, presumably using data provided by the BBC, decided on the basis of that short clip that this was an illegal broadcast of "Doctor Who" and pulled the plug. Worse, it turned out that no one at the Hugo Awards or at Ustream was empowered to turn it back on again. Ustream has promised to upgrade its robot to understand fair use, but the proposal is both ridiculous -- even judges struggle with fair use arguments -- and dangerous. ------------------------------ From joel-garry Wed Sep 5 14:52:06 2012 From: joel-garry (jgar the jorrible) Date: Wed, 5 Sep 2012 14:52:06 -0700 (PDT) Subject: The Cadillac Your Livery Driver Has Been Dreaming Of (R-27.01) Message-ID: An MSN editorial had some insight: "...Is that my cell phone buzzing, or the seat? 2013 Cadillac XTS (c) GMCadillac has a good idea here. Instead of annoying the driver with flashing lights and buzzing sounds from various active safety systems, it sends all those warnings to his back and rear end. ... The touch-capacitive dash is another story. See those silver trim pieces that look like you should touch them? Don't. They're just finger guides. The actual sensors are above them, which is confusing and frustrating. They're also slow to respond to repeated inputs, like adjusting the cooled seat or the fan speed, unless you're deliberate with your pace and timing. Who wants to think about how you touch a control, especially while driving? Lincoln already came out with this system and it's no different. It's like tapping a plastic post and wondering if some magic will happen. You also feel kind of dumb getting it wrong, which tends to happen when you're paying attention to the road. This feature needs to die." http://editorial.autos.msn.com/blogs/autosblogpost.aspx?post=3De29f4907-f964-45f5-818a-69a45340e1e4 Personally, I'm amazed that any UI designer for car controls would even think of making hand-eye coordination necessary for ancillary controls. I can control my old New Beetle radio and HVAC by touch, with very little learning. But my other cars with touch screens, any little bump and the wrong command gets invoked. And the voice control? I could go on and on, but in a nutshell, not there yet, adds frustration. ------------------------------ From lauren at vortex.com Wed Sep 5 15:04:11 2012 From: lauren at vortex.com (Lauren Weinstein) Date: Wed, 5 Sep 2012 15:04:11 -0700 Subject: Did YouTube Really Block Michelle Obama's DNC Speech for Copyright Infringement? Message-ID: http://j.mp/OQe20R (This message on Google+) http://j.mp/OQexrV (Slate, via NNSquad) "Either way, this amounts to something less than a copyright apocalypse. Michelle Obama's speech is still available on plenty of other YouTube channels, including here, here, and here. But on the heels of the Hugo Awards debacle, it's another reminder of the need for human vigilance against overzealous digital-rights-management algorithms. In a statement chalking up the glitch to "a technical error on YouTube," an Obama campaign official added, "We do not expect tonight's coverage will be affected." Copyright bots, the gauntlet has been thrown!" Irrespective of this particular case, this whole area (not just YouTube) of automated content flagging needs serious attention from a number of standpoints. Here's an example of what has happened to me (and many other people). I uploaded a video of mine that included a segment of old, definitely public domain material. Shortly thereafter, my entire vid was flagged by YouTube's Content ID. Why? It took some digging to figure out, but it turns out a Content ID partner had uploaded a video of their own that happened to include a section of the same public domain material I had used. This apparently made it look like my video was infringing, since Content ID assumed the section of my vid that matched their vid was in violation. Wrong! But Content ID partners get the assumption of being correct, and there's no way for an average user to assert that something is public domain a priori. I was able to get this reversed by careful explanation on the appropriate forms, but I wonder how many people would just throw up their arms and say, "To hell with it!" and not bother? This is not an easy situation to solve, but the explicit assumption that Content ID partners are correct and that takedowns or other actions are immediate -- with a protest required to get blocks, etc. removed after the fact, strikes me as increasingly problematic. Lauren Weinstein (lauren at vortex.com): http://www.vortex.com/lauren Network Neutrality Squad: http://www.nnsquad.org +1 (818) 225-2800 ------------------------------ From bludin at lis.ch Wed Sep 5 07:19:54 2012 From: bludin at lis.ch (=?koi8-r?B?IuDSycog68/O09TBztTJzs/Xyd4i?=) Date: Wed, 5 Sep 2012 17:19:54 +0300 Subject: =?koi8-r?B?wsXazMnNydTO2cogzcXWx8/Sz8Qh?= Message-ID: <01cd8b8a$aa265900$4cfca16d@bludin> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции From albrightnn at jobsitesupply.com Wed Sep 5 06:50:43 2012 From: albrightnn at jobsitesupply.com (=?koi8-r?B?IvfJ1MHMycog4cbBzsHT2MXXyd4i?=) Date: Wed, 5 Sep 2012 19:20:43 +0530 Subject: =?koi8-r?B?xMXbxdfB0SDNxdbE1cfP0s/EzsHRINPX0drY?= Message-ID: <01cd8b9b$8ae3f780$fa78cf75@albrightnn> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1463 bytes Desc: not available URL: From mansourmoufid at gmail.com Wed Sep 5 16:56:52 2012 From: mansourmoufid at gmail.com (Mansour Moufid) Date: Wed, 5 Sep 2012 19:56:52 -0400 Subject: [tor-talk] Leave Your Cellphone at Home Message-ID: On 2012-09-05, at 6:16 AM, Eugen Leitl wrote: > http://nplusonemag.com/leave-your-cellphone-at-home > > Sarah Resnick > > Leave Your Cellphone at Home > > Interview with Jacob Appelbaum > > From OCCUPY Gazette 4, out May 1. Very interesting read. I'm not sure I buy the theories for the new data centre. Drive capacity has increased on the same order of magnitude as Internet traffic, [1,2] so I doubt the increase in traffic from current targets is the reason for it. I also doubt extending the surveilled set by 5% to include the US is the reason. Besides, according to the whistleblowers, everything that's attributed to it has been going on for a long time. Unless there's concrete evidence I haven't heard of, I tend to believe it actually is for "cybersecurity", specifically the insider threat. These agencies monitor their own people (and soon-to-be corporate partners) far more than the public. On that note, apparently there's half a dozen versions of HR 3523 around, and NSA versus DHS (aka "the happy face") is an artificial distinction, meant to appease. [3] Anyway, I think cryptography will depend more and more on steganography -- and in the case of Tor, covert/subliminal channels. Imagine a protocol where Alice sends Bob a steady stream of garbage, and the message is encoded in the inter-packet timing noise. ;) [1] http://en.m.wikipedia.org/w/index.php?title=File:Hard_drive_capacity_over_time.svg [2] http://www.useit.com/alertbox/980405.html [3] http://www.youtube.com/watch?v=S40Qx9kVPoY#t=29m20s http://www.youtube.com/watch?v=S40Qx9kVPoY#t=50m _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From villa at ee.ucla.edu Wed Sep 5 20:55:23 2012 From: villa at ee.ucla.edu (villa at ee.ucla.edu) Date: Wed, 5 Sep 2012 20:55:23 -0700 (PDT) Subject: [drone-list] Article from Foreign Policy Message-ID: Some people may be interested in this article published in Foreign Policy today: What's Not Wrong With Drones? http://www.foreignpolicy.com/articles/2012/09/05/whats_not_wrong_with_drones The same author also wrote a piece last week on targeted killings: http://www.foreignpolicy.com/articles/2012/08/29/all_the_pentagons_lawyers and plans to write next week on what "reasons we should worry about drone strikes." John _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From gfoster at entersection.org Wed Sep 5 19:13:46 2012 From: gfoster at entersection.org (Gregory Foster) Date: Wed, 05 Sep 2012 21:13:46 -0500 Subject: [drone-list] DHS solicitation for Wide Area Airborne Surveillance System Message-ID: Federal Business Opportunities (Aug 16; updated Sep 5) - "Wide Area Airborne Surveillance System" https://www.fbo.gov/index?s=opportunity&mode=form&id=5c5cbeefa937f965efa189c9ce45c060&tab=core&tabmode=list&= >From the Original Synopsis (Aug 16, BAA12-13.pdf) p. 5-6: /The Science and Technology (S&T) Directorate is the Department's primary research and development arm. The S&T Directorate provides federal, state and local officials with the technology and capabilities to protect the homeland. The Directorate's mission is to protect the homeland by providing government officials with state-of-the-art technology and other resources. The Borders and Maritime Security Division (BMD) in S&T supports this mission by developing and transitioning technical capabilities that enhance U.S. border security without impeding commerce and travel. Part of this effort is to evaluate Wide Area Airborne Surveillance Systems (WAASS) and technologies for DHS's air operational components, especially DHS/Customs and Border Protection (CBP) and the United States Coast Guard (USCG). The general goal of this effort is to assist CBP and USCG in fielding new sensor capabilities that will strengthen our ability to regularly monitor large land and maritime areas for small targets of interest including, typically, vehicles, people, and contraband./ ibid., p. 8: /This BAA primary objective of WAASS is to simultaneously collect, detect, and highlight select observables within a large land or maritime region. Such collection shall be persistent, offering long-duration surveillance over urban and rural areas. The surveillance system shall have an electro-optical capability for daylight missions as well as an infrared capability for day or night operations. The sensor shall integrate with an airborne platform for data gathering/dissemination, power, and other support functions. The imagery data shall be displayed at a DHS operations center and have the capability for forensic analysis within 8-to-24 hours from time of collection.../ Tests are scheduled for Nogales, Arizona in FY2013. HT @KennethLipp , gf -- Gregory Foster || gfoster at entersection.org @gregoryfoster <> http://entersection.com/ _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From browsing at rocknroad.ru Wed Sep 5 22:32:15 2012 From: browsing at rocknroad.ru (=?koi8-r?B?6M/MxMnOx8/XwdEg09TS1cvU1dLB?=) Date: Wed, 5 Sep 2012 21:32:15 -0800 Subject: =?koi8-r?B?6M/MxMnOx8kg1yDOwczPx8/Xz80g0MzBzsnSz9fBzsnJICjP0NTJzcna?= =?koi8-r?B?wcPJ0Sk=?= Message-ID: <000d01cd8be8$97a8d470$6400a8c0@browsing> 07 сентября 2012г. Оптимизация налогообложения в холдинговых структурах: как снизить расходы и увеличить прибыль (495) 7922122 <> +7 499 4Ч5Ч/О95 Цель: На занятиях будут рассмотрены организационно-правовые, экономико-правовые аспекты создания и деятельности холдингов; вопросы управления холдингом, взаимодействие с дочерними и зависимыми компаниями Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные", "серые" и "белые" схемы. "Метод холдинга" в налоговом планировании. Понятие виртуального холдинга (группы компаний) как средства налогового планирования. Рациональное построение финансовых потоков и договорных отношений в холдинге через разделение оборотов, капитала (прибыли), активов, персонала, отношений с контрагентами и рисков. Элементы холдинга √ Операционные компании, Управляющая или финансирующая компания (Казначейство), Хранитель активов, Торговый дом (Снабжающая или закупочная организация), Центры обслуживания (Кадровые центры), риск-структуры и их роли в налоговом планировании. 2. Методы планирования налога на прибыль и НДС в холдингах. * Низконалоговые субъекты (ННС): субъекты специальных налоговых режимов √ УСН и ЕНВД, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5-10%) на все или почти на все виды деятельности. Простое товарищество с их участием; офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций; экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС. * "Недобросовестные налогоплательщики" и контактирующие с ними риск-структуры: как нельзя "оптимизировать". Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. * Экономия НДС в торговле, производстве, выполнении работ/оказании услуг, аренде и т.п через разделение финансовых потоков и перераспределение затрат "с НДС" и "без НДС". Ограничение использования: покупатели/заказчики, не нуждающиеся в вычете НДС, как их выявить/создать. * Способы переноса налогооблагаемой базы по налогу на прибыль на низконалоговых субъектов: механизм трансфертных цен; нефиктивные услуги, работы; выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере; платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые; штрафные санкции, возмещение убытков, включая демередж/простой; плата за залог или поручительство, делькредере; платежи за увеличенный срок и/или объем гарантийных обязательств. * Условия применения схем оптимизации: Непритворный характер заключаемых сделок. "Деловая цель", "легенда", отсутствие дублирующихся функций. Грамотное обоснование цен, новое антитрансфертное законодательство, способы ухода от контроля за сделками. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. * Безналоговые способы передачи денежных средств в холдинге. Займы и аналогичные им договоры как способ возвратного рефинансирования √ преимущества и недостатки, риск ведения незаконной банковской деятельности. Рефинансирование и капитализация прибыли предприятия (холдинга) через уставной капитал, безвозмездную передачу, увеличение чистых активов, ст. 27 Закона "Об ООО". Другие способы безвозвратного рефинансирования. * Простое товарищество субъектов упрощенной системы налогообложения, в т.ч. из "низконалоговых" регионов. Нужно ли платить НДС? Перенос прибыли товарищества на низконалоговых субъектов (УСН 6%, ЕНВД, офшор и др.). Отсрочка уплаты налога при непередаче прибыли на счета товарищей. Возможен ли обход с помощью простого товарищества правил налогового учета (гл. 25 НК) и ограничений гл. 26.2 НК РФ в части перечня затрат? 3. Создание рациональной финансовой и организационной холдинговой структуры, схемы товарно-финансовых потоков и договорных отношений холдинга. Оперативное распределение налоговой нагрузки между участниками холдинга. Пример комплексного налогового планирования в холдингах. 4. Принципы налогового планирования использования основных средств. Формирование холдинговой структуры для целей минимизации налогообложения имущества. "Хранитель активов" (лицо √ собственник имущественного комплекса). Низконалоговые и безналоговые способы передачи имущества "Хранителю активов". 5. Принципы налогового планирования (оптимизации) выплаты заработной платы в холдинге Дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, штрафные санкции, аренда и др. Расчеты эффективности. Краткий обзор других (компенсационных, процентных и прочих) схем выплаты низконалогового дохода. 6. Встраивание иностранных (в т.ч. низконалоговых) компаний в структуру российских холдингов. Защита владения и скрытие собственника, уход от аффилированности, использование для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги, и т.п.) и нетрадиционные схемы (простое товарищество, агентские). Выбор юрисдикций. 7. Обзор изменений налогового законодательства, как они повлияли на налоговые схемы. Ответы на вопросы. За более подробной информацuей обpащайтеcь по тел: (Ч95) 742_9198 : 8 (Ч95) 792-2I-22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7971 bytes Desc: not available URL: From awang at noblegrain.com Wed Sep 5 06:18:58 2012 From: awang at noblegrain.com (=?koi8-r?B?IunM2NEi?=) Date: Wed, 5 Sep 2012 22:18:58 +0900 Subject: =?koi8-r?B?wsXazMnNydTO2cogzcXWx8/Sz8Qh?= Message-ID: <01cd8bb4$719b7500$8fc29fda@awang> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции From grarpamp at gmail.com Wed Sep 5 20:48:25 2012 From: grarpamp at gmail.com (grarpamp) Date: Wed, 5 Sep 2012 23:48:25 -0400 Subject: [tor-talk] Leave Your Cellphone at Home Message-ID: > Very interesting read. """"" Resnick: The recent article in Wired describes where and how the NSA plans to store its share of collected data. But as the article explains, the Utah facility will have another important function: cryptanalysis, or code-breaking, as much of the data cycling through will be heavily encrypted. It also suggests that the Advanced Encryption Standard (AES), expected to remain durable for at least another decade, may be cracked by the NSA in a much shorter time if theybve built a secret computer that is considerably faster than any of the machines we know about. But more to the pointbis encryption safe? """"" > I'm not sure I buy the theories for the new data centre. Drive capacity Guessing it's pretty much as on the wrapper. In another interview Binney speaks of a cryptographic breakthrough. If you look at the physical size of the datacenters, you can easily envision massive index tables, rainbow or otherwise, for storing shortcuts to various projects. Note that ever since MySpace, network analysis has been the rage. Combine that with 15-20 years of public datamining and 10-15 years of easily tappable fiber and datacenters. Toss in some really smart people and PhD's and sure, there are bound to be some big and secret advances in data processing and even crypto in play here. > specifically the insider threat You don't need big DC's for that, just better software and human checks and balances. > I think cryptography will depend more and more on steganography [...] > and the message is encoded in the inter-packet timing noise. ;) Moot when you suck up and process everything to extract the crypto. Steg is nothing more than crypto with a pretty wrapper meant to get past the drunk guards, not specialized sieves sifting through your garbage. There are better lists for these topics so I'll step out. _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bounce-9643197-6864020 at mountainwings1.com Wed Sep 5 07:49:40 2012 From: bounce-9643197-6864020 at mountainwings1.com (=?koi8-r?B?Iu3B0sfB0snUwSD3wdPJzNjF187BIg==?=) Date: Wed, 5 Sep 2012 23:49:40 +0900 Subject: =?koi8-r?B?xMXbxdfB0SDNxdbE1cfP0s/EzsHRINPX0drYIQ==?= Message-ID: <01cd8bc1$1d4ac200$82d3230e@bounce-9643197-6864020> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали
- Неограниченное количество линий
- Экономия на покупке телефонной станции
-------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1463 bytes Desc: not available URL: From james.p.lux at jpl.nasa.gov Wed Sep 5 16:52:54 2012 From: james.p.lux at jpl.nasa.gov (Lux, Jim (337C)) Date: Wed, 5 Sep 2012 23:52:54 +0000 Subject: [Beowulf] propagation velocity in cables Message-ID: The electrons move very slowly.. much more slowly than the electromagnetic wave propagates. (I'm thinking a few mm/sec for some reason.. it's real slow, in any case) Undersea cables these days are all fiber optic. So about 2/3 free space. Microwave terrestrial links are at a variety of frequencies. You trade it off between antenna gain (higher frequency has higher gain for a given size antenna) and atmospheric losses (rain, mostly). There are bands everywhere from 2.6 GHz on up to 110 GHz and higher. Long haul tends to be lower frequency, short haul is higher. Yes, there are laser comm systems, but generally used only for short distances (<10km) like between two buildings. Advantage is that you don't need much power, it's really wide bandwidth (Gbps is no problem) and it's difficult to snoop on (beams are very narrow with minimal spillover). OTOH, you also have to have active pointing, typically.. the building sway in the wind is enough to break the link. And, of course rain is a problem. (there are long range laser comm systems used for things like, oh, satellite to submarine, at very low data rates.. all you have to do is send a few bits: "Launch Missiles to target N") Jim Lux -----Original Message----- From: beowulf-bounces at beowulf.org [mailto:beowulf-bounces at beowulf.org] On Behalf Of Vincent Diepeveen Sent: Wednesday, September 05, 2012 4:44 PM To: Beowulf Mailing List Subject: Re: [Beowulf] propagation velocity in cables hi Jim, Thanks for a more technical explanation. Difficult to interpret for me though. The 1/3 speed someone gave to me some years ago. Litterally quote : "electrons move at 1/3 of the lightspeed through copper" Maybe signal speed is not the same like electron speed? Would be very interesting if he said that wrong, as he has a degree here, Phd cum laude in Natural Science and he improved something or better disproved something that has to do with quantum mechanics or something, basically he calculates everything about particles such as 'electrons' (my words), so i didn't verify all this, yet assumed what he said. The most important question: what is the effective speed of signals through ocean cables? We can safely assume they use fastest speed for this. When i drove past that financial industry bunker in Land's End it seemed pretty solid to me. The interesting question is that big satellite disk on the roof as well. Microwave is simply civil allowed frequency i was told. Around 2800Mhz or so? How fast is such communication? Using a powerful laser would it somehow be possible to rival speeds of these cables? On Sep 6, 2012, at 1:18 AM, Lux, Jim (337C) wrote: > Propagation speed in copper is not 1/3 freespace. More like 2/3 or > 80%, depending on the effective permittivity of the dielectric. (c = > c0/sqrt(epsilonr)) Cat 5 is typically about 68% of free space. > Foam dielectric coaxial cable is typically 81% LMR-400 coaxial cable > is 85%. There are air filled coax which get up to 90-92%, and open > wire line (like old telephone cables on poles) is around 95% > > For single mode optical fiber, n=1.62 for the core (1.52 for > cladding), so propagation speed is c0/1.62 or about 62% free space. > > Note that copper is faster than optical. > > People are setting up freespace microwave links for just this reason. > > Jim Lux > > > > C = 300k kilometers an hour. > > 300k / 3.6 meters a second > 300 / 3.6 meters a millisecond > 0.3 / 3.6 meters a microsecond > 12 meters a microsecond > > Now i don't know whether signals travel through fiber at the full > lightspeed, as that's pretty important. > > In Copper it's roughly 1/3 lightspeed or so, so that's out of the > question to use. > > So saving some distance knowing 12 meters is a microsecond, that's > worth it. > > _______________________________________________ Beowulf mailing list, Beowulf at beowulf.org sponsored by Penguin Computing To change your subscription (digest mode or unsubscribe) visit http://www.beowulf.org/mailman/listinfo/beowulf _______________________________________________ Beowulf mailing list, Beowulf at beowulf.org sponsored by Penguin Computing To change your subscription (digest mode or unsubscribe) visit http://www.beowulf.org/mailman/listinfo/beowulf ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From brk38 at skypool.ru Thu Sep 6 02:40:02 2012 From: brk38 at skypool.ru (=?koi8-r?B?98HMwNTO2cUgz9DF0sHDyck=?=) Date: Thu, 6 Sep 2012 01:40:02 -0800 Subject: =?koi8-r?B?7s/Xz8Ug1yD3wczA1M7PzSDawcvPzs/EwdTFzNjT1NfFIA==?= Message-ID: ВНИМАНИЮ БАНКОВ, ФИНАНСОВЫХ, СТРАХОВЫХ КОМПАНИЙ - НОВЫЕ ИЗМЕНЕНИЯ ВСТУПИЛИ В СИЛУ ВНИМАНИЕ! Изменения валютного законодательства Регулирование валютного законодательства и и валютный контроль Валютное регулирование (ЦБ РФ) +7 499 - Ч45*Ч0*95 \\\/// \Моск. код/ 792*2I*2.2 18 сентября 2012г. Лектор: начальник управления Департамента финансового Мониторинга и валютного контроля Банка России. 1. Инструкция Банка России от 04.06.12г. № 138-И "О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации, связанных с проведением валютных операций, порядке оформления паспортов сделок, а также порядке учета уполномоченными банками валютных операций и контроля за их проведением". Концепция, структура, основные положения. Изменения в порядке представления и оформления документов (в том числе Справок и Паспортов сделок) и осуществления валютного контроля, установленные Инструкцией № 138-И. 2.Система валютного регулирования и валютного контроля в Российской Федерации и валютный контроль уполномоченных банков. Федеральный закон "О валютном регулировании и валютном контроле" № 173-ФЗ (с изменениями и дополнениями, в том числе внесенными Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием ФЗ "О национальной платежной системе"), императивные нормы. Регулирование порядка поведения валютных операций резидентами и нерезидентами, открытия и ведения резидентами счетов в банках, расположенных за пределами Российской Федерации. Режим счета, открытого за рубежом Действие валютного законодательства в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе") и Федерального закона от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" Порядок открытия и ведения счетов резидентов за пределами территории РФ. Правила осуществления резидентами валютных операций. 3. Порядок проведения валютных операций, порядок и сроки представления документов валютного контроля (Справки, Паспорта сделок) и порядок осуществления уполномоченными банками валютного контроля, в свете новых нормативных актов Банка России:- Инструкции Банка России от 04.06.12г. № 138-И "О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации, связанных с проведением валютных операций, порядке оформления паспортов сделок, а также порядке учета уполномоченными банками валютных операций и контроля за их проведением".- Положении Банка России от 29.12.2010 № 364-П “О порядке передачи уполномоченными банками и территориальными учреждениями Банка России в таможенные органы для выполнения ими функций агентов валютного контроля информации по паспортам сделок по внешнеторговым договорам (контрактам) в электронном виде”. 4. Регулирование порядка представления информации о нарушениях валютного законодательства. Направление информации о правонарушениях и Положение ЦБ РФ от 20.07.2007 N 308-П. Возможные правонарушения в связи с принятием Инструкции Банка России № 138-И. Практика применения Положения ЦБ РФ от 20.07.2007 N 308-П на примере конкретных нарушений. 5. Валютное регулирование операций физических лиц. Операции физических лиц и валютный контроль уполномоченных банков. Федеральный закон№ 173-ФЗ (в том числе заработная плата и командировочные расходы). Порядок осуществления переводов денежных средств физическими лицами из РФ и по территории РФ "Близкородственные" переводы. 6 Ответственность за нарушение валютного законодательства. Федеральный Закон № 174-ФЗ. Стоимость участия в семинаре 9970 рублей Информацию можно получить по телефонам: +7 (495) 792*2I22 и 8 (495) 7922122 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5289 bytes Desc: not available URL: From member at linkedin.com Wed Sep 5 19:34:18 2012 From: member at linkedin.com (Ja Huston via LinkedIn) Date: Thu, 6 Sep 2012 05:34:18 +0300 Subject: Buy Ciails and Viarga online! Message-ID: <603688454.4652502.4257847427097.JavaMail.app@ela7-app0223.prod> USPS Delivery Shipping 1-4 Day USA U.S. & Canada Licensed Pharmaices ORDER NOW! Your http://doctorchro.ru Team! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 202 bytes Desc: not available URL: From brook51288 at portal-shelkovo.ru Wed Sep 5 21:39:21 2012 From: brook51288 at portal-shelkovo.ru (=?koi8-r?B?5MzRIMLBzsvP19PLycgg09DFw8nBzMnT1M/X?=) Date: Thu, 6 Sep 2012 05:39:21 +0100 Subject: =?koi8-r?B?98HMwNTO2cogy8/O1NLPzNgg6drNxc7FzsnR?= Message-ID: ВНИМАНИЮ БАНКОВ, ФИНАНСОВЫХ, СТРАХОВЫХ КОМПАНИЙ - НОВЫЕ ИЗМЕНЕНИЯ ВСТУПИЛИ В СИЛУ ВНИМАНИЕ! Изменения валютного законодательства Регулирование валютного законодательства и и валютный контроль Валютное регулирование (ЦБ РФ) +7 499 - ЧЧ5_40/95 **** +7 Московский код: 7922I22 18 сентября 2012г. Лектор: начальник управления Департамента финансового Мониторинга и валютного контроля Банка России. 1. Инструкция Банка России от 04.06.12г. № 138-И "О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации, связанных с проведением валютных операций, порядке оформления паспортов сделок, а также порядке учета уполномоченными банками валютных операций и контроля за их проведением". Концепция, структура, основные положения. Изменения в порядке представления и оформления документов (в том числе Справок и Паспортов сделок) и осуществления валютного контроля, установленные Инструкцией № 138-И. 2.Система валютного регулирования и валютного контроля в Российской Федерации и валютный контроль уполномоченных банков. Федеральный закон "О валютном регулировании и валютном контроле" № 173-ФЗ (с изменениями и дополнениями, в том числе внесенными Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием ФЗ "О национальной платежной системе"), императивные нормы. Регулирование порядка поведения валютных операций резидентами и нерезидентами, открытия и ведения резидентами счетов в банках, расположенных за пределами Российской Федерации. Режим счета, открытого за рубежом Действие валютного законодательства в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе") и Федерального закона от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" Порядок открытия и ведения счетов резидентов за пределами территории РФ. Правила осуществления резидентами валютных операций. 3. Порядок проведения валютных операций, порядок и сроки представления документов валютного контроля (Справки, Паспорта сделок) и порядок осуществления уполномоченными банками валютного контроля, в свете новых нормативных актов Банка России:- Инструкции Банка России от 04.06.12г. № 138-И "О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации, связанных с проведением валютных операций, порядке оформления паспортов сделок, а также порядке учета уполномоченными банками валютных операций и контроля за их проведением".- Положении Банка России от 29.12.2010 № 364-П “О порядке передачи уполномоченными банками и территориальными учреждениями Банка России в таможенные органы для выполнения ими функций агентов валютного контроля информации по паспортам сделок по внешнеторговым договорам (контрактам) в электронном виде”. 4. Регулирование порядка представления информации о нарушениях валютного законодательства. Направление информации о правонарушениях и Положение ЦБ РФ от 20.07.2007 N 308-П. Возможные правонарушения в связи с принятием Инструкции Банка России № 138-И. Практика применения Положения ЦБ РФ от 20.07.2007 N 308-П на примере конкретных нарушений. 5. Валютное регулирование операций физических лиц. Операции физических лиц и валютный контроль уполномоченных банков. Федеральный закон№ 173-ФЗ (в том числе заработная плата и командировочные расходы). Порядок осуществления переводов денежных средств физическими лицами из РФ и по территории РФ "Близкородственные" переводы. 6 Ответственность за нарушение валютного законодательства. Федеральный Закон № 174-ФЗ. Стоимость участия в семинаре 9970 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 (499) Ч45\4О.95 или +7 (495) 792\2122 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5276 bytes Desc: not available URL: From saftergood at fas.org Thu Sep 6 07:32:11 2012 From: saftergood at fas.org (Steven Aftergood) Date: Thu, 06 Sep 2012 07:32:11 -0700 Subject: Secrecy News -- 09/06/12 Message-ID: Format Note: If you cannot easily read the text below, or you prefer to receive Secrecy News in another format, please reply to this email to let us know. SECRECY NEWS from the FAS Project on Government Secrecy Volume 2012, Issue No. 89 September 6, 2012 Secrecy News Blog: http://www.fas.org/blog/secrecy/ ** GREATER AUTONOMY FOR UNMANNED MILITARY SYSTEMS URGED ** NEW ARMY DOCTRINAL PUBLICATIONS ON INTELLIGENCE, SPECIAL OPS ** TRANS-PACIFIC PARTNERSHIP NEGOTIATIONS, AND MORE FROM CRS GREATER AUTONOMY FOR UNMANNED MILITARY SYSTEMS URGED The Department of Defense should focus on increasing the autonomy of drones and other unmanned military systems, a new report from the Defense Science Board said. DoD should "more aggressively use autonomy in military missions," the Board report said, because currently "autonomy technology is being underutilized." See "The Role of Autonomy in DoD Systems," Defense Science Board, dated July 2012 and released last week. http://www.fas.org/irp/agency/dod/dsb/autonomy.pdf "Autonomy" in this context does not mean "computers making independent decisions and taking uncontrolled action." The Board is not calling for the immediate development of Skynet at this time. Rather, autonomy refers to the automation of a particular function within programmed limits. "It should be made clear that all autonomous systems are supervised by human operators at some level," the report stressed. Increased autonomy for unmanned military systems "can enable humans to delegate those tasks that are more effectively done by computer... thus freeing humans to focus on more complex decision making." "However, the true value of these systems is not to provide a direct human replacement, but rather to extend and complement human capability by providing potentially unlimited persistent capabilities, reducing human exposure to life threatening tasks, and with proper design, reducing the high cognitive load currently placed on operators/supervisors." But all of that is easier said than done. "Current designs of autonomous systems, and current design methods for increasing autonomy, can create brittle platforms" that are subject to irreversible error. There are also "new failure paths associated with more autonomous platforms, which has been seen in friendly fire fatalities.... This brittleness, which is resident in many current designs, has severely retarded the potential benefits that could be obtained by using advances in autonomy." The Defense Science Board report discusses the institutional challenges confronting a move toward increasing autonomy, including the obstacles posed by proprietary software. It offers an extended discussion of conflict scenarios in which the enemy employs its own autonomous systems against U.S. forces. The authors describe China's "alarming" investment in unmanned systems, and encourage particular attention to the relatively neglected topic of the vulnerability of unmanned systems. The report includes some intriguing citations, such as a volume on "Governing Lethal Behavior in Autonomous Robots," and presents numerous incidental observations of interest. For example: "Big data has evolved as a major problem at the National Geospatial Intelligence Agency (NGA). Over 25 million minutes of full motion video are stored at NGA." But new sensors will produce "exponentially more data" than full motion video, and will overwhelm current analytical capabilities. "Today nineteen analysts are required per UAV orbit [i.e. per 24 hour operational cycle]. With the advent of Gorgon Stare, ARGUS, and other Broad Area Sensors, up to 2,000 analysts will be required per orbit." The government "can't hire enough analysts or buy enough equipment to close these gaps." NEW ARMY DOCTRINAL PUBLICATIONS ON INTELLIGENCE, SPECIAL OPS The U.S. Army has recently begun publishing two new series of Army Doctrine Publications (ADP) and Army Doctrine Reference Publications (ADRP). http://www.fas.org/irp/doddir/army/index.html#adp These publications generally offer a digest of existing doctrine in introductory form for broad consumption, with limited modifications and a few updates. Last week, the Army issued new unclassified publications on intelligence and special operations, among other topics. TRANS-PACIFIC PARTNERSHIP NEGOTIATIONS, AND MORE FROM CRS New and updated reports from the Congressional Research Service that Congress has chosen not to make available to the public include the following. The Trans-Pacific Partnership Negotiations and Issues for Congress, September 5, 2012: http://www.fas.org/sgp/crs/row/R42694.pdf Weather-Related Power Outages and Electric System Resiliency, August 28, 2012: http://www.fas.org/sgp/crs/misc/R42696.pdf SBA Veterans Assistance Programs: An Analysis of Contemporary Issues, September 4, 2012: http://www.fas.org/sgp/crs/misc/R42695.pdf Worker Adjustment and Retraining Notification (WARN) Act, September 4, 2012: http://www.fas.org/sgp/crs/misc/R42693.pdf Immigration Detainers: Legal Issues, August 31, 2012: http://www.fas.org/sgp/crs/homesec/R42690.pdf Tajikistan: Recent Developments and U.S. Interests, updated August 31, 2012: http://www.fas.org/sgp/crs/row/98-594.pdf Defense: FY2013 Authorization and Appropriations, updated September 5, 2012: http://www.fas.org/sgp/crs/natsec/R42607.pdf _______________________________________________ Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists. The Secrecy News Blog is at: http://www.fas.org/blog/secrecy/ To SUBSCRIBE to Secrecy News, go to: http://www.fas.org/sgp/news/secrecy/subscribe.html To UNSUBSCRIBE, go to http://www.fas.org/sgp/news/secrecy/unsubscribe.html OR email your request to saftergood at fas.org Secrecy News is archived at: http://www.fas.org/sgp/news/secrecy/index.html Support the FAS Project on Government Secrecy with a donation: http://www.fas.org/member/donate_today.html _______________________ Steven Aftergood Project on Government Secrecy Federation of American Scientists web: www.fas.org/sgp/index.html email: saftergood at fas.org voice: (202) 454-4691 twitter: @saftergood ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jidanni at jidanni.org Wed Sep 5 16:38:34 2012 From: jidanni at jidanni.org (jidanni at jidanni.org) Date: Thu, 06 Sep 2012 07:38:34 +0800 Subject: Test Mercenaries: Quality at Google, 2006-2011 (Mike Bland) Message-ID: "This crossed my desk this morning, it is a long and detailed (and honest!) account by an insider of Google's efforts to increase code quality and product quality: http://mike-bland.com/2012/07/10/test-mercenaries.html " [This item is indeed long, but could be worth reading if you consider yourself a software engineer. PGN] ------------------------------ From axferg at bbrcompany.com Wed Sep 5 17:14:09 2012 From: axferg at bbrcompany.com (=?koi8-r?B?8NLBy9TJ3sXTy8/FIMLAxNbF1MnSz9fBzsnF?=) Date: Thu, 6 Sep 2012 08:14:09 +0800 Subject: =?koi8-r?B?8NLBy9TJ3sXTy8/FIMLAxC3Xwc7JxTogzcXUz8TJy8ksIMTPy9XNxc7U?= =?koi8-r?B?2Swg0NLJzcXS2SwgwdfUz83B1MnawcPJ0Q==?= Message-ID: <000d01cd8bc4$8930f3b0$6400a8c0@axferg> 13-14 сентября Практическое бюджетирование: методики, документы, примеры, автоматизация код (495) - 7-42.9I_98 \\\/// +7 495 7Ч2*91/98 Программа: Бюджетирование как управленческая технология. Что такое "бюджет", а что такое "план"? Зачем компаниям нужны бюджеты? Связь бюджетирования со стратегическим и оперативным управлением. Практика и дискуссия: почему бюджетирование бывает неэффективным и как превратить его в управленческий инструмент. Внедрение бюджетирования. Пошаговый план внедрения бюджетирования. Основные проблемы, возникающие при внедрении бюджетирования и как их избежать на начальном этапе. Документы, которые должны быть разработаны для формализации бюджетного процесса. Документы бюджетирования. Разработка основного документа - концепции (стандарта) бюджетирования, в котором описываются основные параметры и правила работы бюджетной системы. Структура и правила формирования документа. Выбор подхода к построению системы бюджетирования - "сверху вниз", "снизу вверх", "смешанный". Основные параметры бюджетной модели. Взаимодействие бизнес-единиц группы компаний в бюджетировании. Практика и дискуссия: особенности разработки концепции для компаний, в которых работают слушатели. Разработка финансовой структуры компании. Бюджеты ЦФО. Разделение компании на объекты управления (центры финансовой ответственности - ЦФО). Как связана финансовая и организационная структуры компании? Классификация ЦФО. Чем отличается практика от теории - примеры "смешанных" ЦФО. Как сделать бюджет ЦФО: два подхода? Как сформировать "Положение о финансовой структуре" - форма и содержание документа. Практика и дискуссия: сравнение двух подходов к формированию бюджетов ЦФО Кейс: разработка финансовой структуры торговой компании. Методология процессного бюджетирования: операционные и финансовые бюджеты. Состав бюджетов. Определение состава бюджетов. Какие операционные и финансовые бюджеты включаем в систему бюджетирования компании и почему? Правила, по которым определяется набор бюджетов. Практические схемы бюджетирования производственного предприятия и торговой компании. Кейс: формирование набора бюджетов для компаний, в которых работают слушатели. Бюджетные формы. Операционные бюджеты. Прогнозирование продаж или почему финансистам нужно дружить с менеджерами по продажам. Виды бюджетных форм производственного предприятия и особенности их составления. Примеры. Виды бюджетных форм торговой компании и особенности их составления. Примеры. Финансовые бюджеты. Как сформировать БДР, БДДС и прогнозный баланс. Различные формы БДР: "бухгалтерский подход", "маржинальный подход", "МСФО подход". Связь БДР со стратегией компании и зачем нужны показатели EBITDA, EBIT, EBT? Практика и дискуссия: "бухгалтерский подход" (составления бюджетов с использованием двойной записи и сведение бюджетов в оборотно-сальдовую ведомость через двойную запись), "маржинальный подход", "МСФО подход" к формированию бюджетов. Методика "бюджетирования на результат", практическое применение. Связь стратегии с бюджетированием через KPI (КПЭ). Какие финансовые показатели используются в "бюджетировании на результат". Методика "бюджетирования на результат". Кейс: практический пример разработки "бюджетирования на результат" для торговой компании. Организация бюджетного процесса. Организация управления бюджетами. Разработка пакета внутренних управленческих документов по бюджетированию. Организация документооборота между подразделениями. Нужно ли создавать бюджетный комитет. Примеры бюджетного регламента. Практика и дискуссия: как распределить ответственность в рамках бюджетного регламента. ═Контроль за исполнением бюджетов. Контроль и анализ отклонений и корректировка бюджетов. Динамические и статические бюджеты. Факторный анализ отклонений (пример анализа отклонения по прибыли). Мотивация персонала к выполнению регламента бюджетирования и совершенствованию бюджетных показателей. Кейс: факторный анализ отклонения по прибыли. ═Автоматизация бюджетирования. Что должна уметь система автоматизации бюджетирования? Обзор рынка систем. Бюджетирование в 1С. Основные правила выбора системы. Как рассчитать стоимость внедрения? Стоимость участия: 16 900 рублей Вся информация по тел: +7 499 - 4Ч5.40.95 \\\/// код (495) - 7*Ч2-9I/98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5838 bytes Desc: not available URL: From klenovy at list.poltava.ua Wed Sep 5 19:35:30 2012 From: klenovy at list.poltava.ua (=?koi8-r?B?5cTFzSDOwSDrydDS?=) Date: Thu, 6 Sep 2012 10:35:30 +0800 Subject: =?koi8-r?B?69XS0yDOwSDr6fDyxTr308Ugz8Ig78bG28/SwcggzsEg68nQ0sU=?= Message-ID: <000d01cd8bd8$4885af90$6400a8c0@klenovy> 16√22 сентября 2012 г. Семинар на КИПРе: КИПР - ОДИН ИЗ ФИНАНСОВЫХ ЦЕНТРОВ ЕВРОПЫ.КАК ВЫГОДНО ИСПОЛЬЗОВАТЬ ЕГО ВОЗМОЖНОСТИ? Московский код; 742_9198 ; Московский код; 792/2122 Цель: Это наиболее эффективная форма профессионального консалтинга! Уникальная возможность без посредников пообщаться с непосредственными производителями услуг: консультантами, юристами, аудиторами, банкирами. * Самая свежая информация из первоисточника, возможность все увидеть и лично проверить! * Адаптированность для тех, кто "что-то слышал" о международном налоговом планировании, так и для тех, кто уже имеет опыт управления собственными иностранными компаниями. * Максимальная польза как для "первых лиц", принимающих управленческие решения, так и для тех, кто помогает претворять замыслы в жизнь. * Раздел о применении кипрских компаний дополнен новыми практическими блоками: * * о последних уникальных сценариях налогового планирования; * * о типичных ошибках россиян в практике работы с инофирмами, * * о требования Евросоюза по НДС в применении к работе кипрских компаний, * * о правилах бухучета и отчетности кипрских компаний. Слушатели курса смогут понять суть применения иностранных компаний во всех аспектах и, в конечном счете, принять осознанное решение о необходимости их использования в бизнесе или о системных корректировках методики работы с ними для значительного увеличения выгоды. Программа: 1 день (17.09.2012) * Выгоды от оптимизации финансовых потоков. * Международные финансовые центры √ катализаторы мировой экономики. Место и роль Кипра. Почему и как применяют кипрские компании? * Особенности кипрского корпоративного и налогового законодательства. Самые свежие изменения и их последствия. * Соглашения об избежании двойного налогообложения: кто имеет право на применение специального режима исчисления и уплаты налогов? Суть соглашений с Россией. Особенности российско-кипрского соглашения и анализ новых возможностей. * Для каких предприятий эффективно международное налоговое планирование. Детальное рассмотрение практических примеров: международная торговля, финансирование, оказание услуг, привлечение инвестиций, производство в России, получение доходов от операций внутри России, строительно-монтажные работы, владение недвижимостью и получение доходов от нее, международные перевозки и т.д. * Подведение итогов дня. 2 день (18.09.2012) * Организация управления активами предприятий. Варианты применения специально созданных для этого компаний. Суть и преимущества заключения соглашений акционеров. * Как организовать реинвестирование капиталов? В чем выгода "правильных" сценариев? * Уникальность кипрских холдинговых компаний и их сравнение с компаниями других европейских стран. Гибридные структуры. * Трансфертное ценообразование и борьба с необоснованной налоговой выгодой. "Тонкая настройка" международной компании. * Требования к отчетности кипрских компаний. * Европейские требования по НДС и кипрские компании. * Арбитражная практика с участием кипрских компаний. * Банковские услуги на Кипре: как выбрать "правильный" банк. Правила работы с банком. Банковская тайна. * Подведение итогов дня. Программа пребывания на Кипре День первый (воскресенье) Вылет из Москвы. Прибытие в Ларнаку, трансфер в отель. Размещение в отеле. Приветственный ужин. День второй (понедельник) Завтрак. 9:30 √ 14:30 Первая часть занятий "КИПР: ОДИН ИЗ ФИНАНСОВЫХ ЦЕНТРОВ ЕВРОПЫ. КАК ВЫГОДНО ИСПОЛЬЗОВАТЬ ЕГО ВОЗМОЖНОСТИ?" В перерыве кофе-брейк. Свободное время. День третий (вторник) Завтрак. 9:30 √ 14:30 Вторая часть занятий "КИПР: ОДИН ИЗ ФИНАНСОВЫХ ЦЕНТРОВ ЕВРОПЫ. КАК ВЫГОДНО ИСПОЛЬЗОВАТЬ ЕГО ВОЗМОЖНОСТИ?" В перерыве кофе-брейк. Свободное время. День четвертый (среда) Завтрак. Свободный день. Дополнительно: экскурсия по изумительным местам - свидетелям богатейшей истории Кипра: Пафос √ Курион - Место рождения Афродиты. Стоимость 76 евро. День пятый (четверг) Завтрак. Свободное время. Дополнительно: экскурсия в Лефкару (производство уникальных кружев и изделий из серебра) √ Винный завод √ горный Монастырь Киккос (исцеляющая икона Богоматери). Стоимость 76 евро. День шестой (пятница) Завтрак. Свободное время. Дополнительно: Экскурсия "Морское сафари" с обедом. Стоимость 76 евро. Экскурсия "Ночь Дионисия" с ужином и незабываемой развлекательной программой. Стоимость 82 евро. Ужин. День седьмой (суббота) Завтрак. Трансфер в аэропорт, вылет в Москву. Стоимость участия: на 1-го человека √ от 59000 рублей при двухместном размещении, доплата за одноместное размещение √ от 13000 рублей. Расходы на поездку принимаются на себестоимость в соответствии с главой 25 Налогового кодекса РФ. За более подробной информацuей обpащайтеcь по тел: +7 (код Москвы) 792/2122 <> 8 (499) ЧЧ5ЧО95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10529 bytes Desc: not available URL: From eugen at leitl.org Thu Sep 6 01:36:15 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 6 Sep 2012 10:36:15 +0200 Subject: [tor-talk] Leave Your Cellphone at Home Message-ID: <20120906083615.GH12615@leitl.org> ----- Forwarded message from grarpamp ----- From eugen at leitl.org Thu Sep 6 01:36:50 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 6 Sep 2012 10:36:50 +0200 Subject: [drone-list] Article from Foreign Policy Message-ID: <20120906083650.GJ12615@leitl.org> ----- Forwarded message from villa at ee.ucla.edu ----- From eugen at leitl.org Thu Sep 6 01:37:51 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 6 Sep 2012 10:37:51 +0200 Subject: [drone-list] DHS solicitation for Wide Area Airborne Surveillance System Message-ID: <20120906083751.GL12615@leitl.org> ----- Forwarded message from Gregory Foster ----- From gfoster at entersection.org Thu Sep 6 08:40:03 2012 From: gfoster at entersection.org (Gregory Foster) Date: Thu, 06 Sep 2012 10:40:03 -0500 Subject: [drone-list] Defense Science Board urges greater autonomy for unmanned systems Message-ID: Secrecy News (Sep 6) - "Greater Autonomy for Unmanned Military Systems Urged" (cited in full) [1]http://www.fas.org/blog/secrecy/2012/09/dsb_autonomy.html The Department of Defense should focus on increasing the autonomy of drones and other unmanned military systems, a new report from the Defense Science Board said. DoD should "more aggressively use autonomy in military missions," the Board report said, because currently "autonomy technology is being underutilized." See [2]"The Role of Autonomy in DoD Systems," Defense Science Board, dated July 2012 and released last week. "Autonomy" in this context does not mean "computers making independent decisions and taking uncontrolled action." The Board is not calling for the immediate development of [3]Skynet at this time. Rather, autonomy refers to the automation of a particular function within programmed limits. "It should be made clear that all autonomous systems are supervised by human operators at some level," the [4]report stressed. Increased autonomy for unmanned military systems "can enable humans to delegate those tasks that are more effectively done by computer... thus freeing humans to focus on more complex decision making." "However, the true value of these systems is not to provide a direct human replacement, but rather to extend and complement human capability by providing potentially unlimited persistent capabilities, reducing human exposure to life threatening tasks, and with proper design, reducing the high cognitive load currently placed on operators/supervisors." But all of that is easier said than done. "Current designs of autonomous systems, and current design methods for increasing autonomy, can create brittle platforms" that are subject to irreversible error. There are also "new failure paths associated with more autonomous platforms, which has been seen in friendly fire fatalities.... This brittleness, which is resident in many current designs, has severely retarded the potential benefits that could be obtained by using advances in autonomy." The Defense Science Board [5]report discusses the institutional challenges confronting a move toward increasing autonomy, including the obstacles posed by proprietary software. It offers an extended discussion of conflict scenarios in which the enemy employs its own autonomous systems against U.S. forces. The authors describe China's "alarming" investment in unmanned systems, and encourage particular attention to the relatively neglected topic of the vulnerability of unmanned systems. The [6]report includes some intriguing citations, such as a volume on [7]"Governing Lethal Behavior in Autonomous Robots," and presents numerous incidental observations of interest. For example: "Big data has evolved as a major problem at the National Geospatial Intelligence Agency (NGA). Over 25 million minutes of full motion video are stored at NGA." But new sensors will produce "exponentially more data" than full motion video, and will overwhelm current analytical capabilities. "Today nineteen analysts are required per UAV orbit [i.e. per 24 hour operational cycle]. With the advent of Gorgon Stare, ARGUS, and other Broad Area Sensors, up to 2,000 analysts will be required per orbit." The government "can't hire enough analysts or buy enough equipment to close these gaps." HT [8]@saftergood, gf -- Gregory Foster || [9]gfoster at entersection.org @gregoryfoster <> [10]http://entersection.com/ References 1. http://www.fas.org/blog/secrecy/2012/09/dsb_autonomy.html 2. http://www.fas.org/irp/agency/dod/dsb/autonomy.pdf 3. http://en.wikipedia.org/wiki/Skynet_%28Terminator%29 4. http://www.fas.org/irp/agency/dod/dsb/autonomy.pdf 5. http://www.fas.org/irp/agency/dod/dsb/autonomy.pdf 6. http://www.fas.org/irp/agency/dod/dsb/autonomy.pdf 7. http://books.google.com/books?id=rIsJ_QXDdEUC&printsec=frontcover#v=onepage&q&f=false 8. http://twitter.com/saftergood 9. mailto:gfoster at entersection.org 10. http://entersection.com/ _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From mindel at wordtracker.com Thu Sep 6 02:18:39 2012 From: mindel at wordtracker.com (=?koi8-r?B?7s/Xz8UgzyD3wczA1M7ZyCDP0MXSwcPJ0cg=?=) Date: Thu, 6 Sep 2012 11:18:39 +0200 Subject: =?koi8-r?B?98HMwNTO2cogy8/O1NLPzNgg6drNxc7FzsnR?= Message-ID: <8C1172F80E35421797D5A852BB6563D5@11PC> ВНИМАНИЮ БАНКОВ, ФИНАНСОВЫХ, СТРАХОВЫХ КОМПАНИЙ - НОВЫЕ ИЗМЕНЕНИЯ ВСТУПИЛИ В СИЛУ ВНИМАНИЕ! Изменения валютного законодательства (ЦБ РФ) Валютное регулирование и валютный контроль на современном этапе Валютное регулирование (ЦБ РФ) (495) 792\2122 <> +7 Ч95 742-9I*98 18 сентября 2012г. Лектор: начальник управления Департамента финансового Мониторинга и валютного контроля Банка России. 1. Инструкция Банка России от 04.06.12г. № 138-И "О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации, связанных с проведением валютных операций, порядке оформления паспортов сделок, а также порядке учета уполномоченными банками валютных операций и контроля за их проведением". Концепция, структура, основные положения. Изменения в порядке представления и оформления документов (в том числе Справок и Паспортов сделок) и осуществления валютного контроля, установленные Инструкцией № 138-И. 2.Система валютного регулирования и валютного контроля в Российской Федерации и валютный контроль уполномоченных банков. Федеральный закон "О валютном регулировании и валютном контроле" № 173-ФЗ (с изменениями и дополнениями, в том числе внесенными Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием ФЗ "О национальной платежной системе"), императивные нормы. Регулирование порядка поведения валютных операций резидентами и нерезидентами, открытия и ведения резидентами счетов в банках, расположенных за пределами Российской Федерации. Режим счета, открытого за рубежом Действие валютного законодательства в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе") и Федерального закона от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" Порядок открытия и ведения счетов резидентов за пределами территории РФ. Правила осуществления резидентами валютных операций. 3. Порядок проведения валютных операций, порядок и сроки представления документов валютного контроля (Справки, Паспорта сделок) и порядок осуществления уполномоченными банками валютного контроля, в свете новых нормативных актов Банка России:- Инструкции Банка России от 04.06.12г. № 138-И "О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации, связанных с проведением валютных операций, порядке оформления паспортов сделок, а также порядке учета уполномоченными банками валютных операций и контроля за их проведением".- Положении Банка России от 29.12.2010 № 364-П “О порядке передачи уполномоченными банками и территориальными учреждениями Банка России в таможенные органы для выполнения ими функций агентов валютного контроля информации по паспортам сделок по внешнеторговым договорам (контрактам) в электронном виде”. 4. Регулирование порядка представления информации о нарушениях валютного законодательства. Направление информации о правонарушениях и Положение ЦБ РФ от 20.07.2007 N 308-П. Возможные правонарушения в связи с принятием Инструкции Банка России № 138-И. Практика применения Положения ЦБ РФ от 20.07.2007 N 308-П на примере конкретных нарушений. 5. Валютное регулирование операций физических лиц. Операции физических лиц и валютный контроль уполномоченных банков. Федеральный закон№ 173-ФЗ (в том числе заработная плата и командировочные расходы). Порядок осуществления переводов денежных средств физическими лицами из РФ и по территории РФ "Близкородственные" переводы. 6 Ответственность за нарушение валютного законодательства. Федеральный Закон № 174-ФЗ. Стоимость участия в семинаре 9970 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: код: (четыре девять пять) 792*2122 <> 8 (499) ЧЧ5-Ч0*95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5272 bytes Desc: not available URL: From eugen at leitl.org Thu Sep 6 02:20:37 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 6 Sep 2012 11:20:37 +0200 Subject: [tor-talk] Leave Your Cellphone at Home Message-ID: <20120906092037.GM12615@leitl.org> ----- Forwarded message from Mansour Moufid ----- From eugen at leitl.org Thu Sep 6 02:22:20 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 6 Sep 2012 11:22:20 +0200 Subject: [Beowulf] propagation velocity in cables Message-ID: <20120906092220.GN12615@leitl.org> ----- Forwarded message from "Lux, Jim (337C)" ----- From mansourmoufid at gmail.com Thu Sep 6 08:31:17 2012 From: mansourmoufid at gmail.com (Mansour Moufid) Date: Thu, 6 Sep 2012 11:31:17 -0400 Subject: [tor-talk] Leave Your Cellphone at Home Message-ID: On 2012-09-05, at 11:48 PM, grarpamp wrote: > >> I think cryptography will depend more and more on steganography [...] >> and the message is encoded in the inter-packet timing noise. ;) > > Moot when you suck up and process everything to extract the > crypto. Steg is nothing more than crypto with a pretty wrapper > meant to get past the drunk guards, not specialized sieves > sifting through your garbage. Very true, unfortunately, almost all publicly available steganography is worthless. But that's just an opportunity to do better, and there's promising research. Check out: http://repository.upenn.edu/cgi/viewcontent.cgi?article=2010&context=cis_reports&sei-redir=1 _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Sep 6 02:38:41 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 6 Sep 2012 11:38:41 +0200 Subject: cryptoparties for learning essential survival skills Message-ID: <20120906093841.GR12615@leitl.org> http://falkvinge.net/2012/09/05/cryptoparties-to-learn-essential-survival-skills/ Cryptoparties For Learning Essential Survival Skills An interesting movement gaining momentum is cryptoparties, which is about learning and sharing fundamental survival skills. I say bsurvival skillsb, because it is about learning the fundamentals of communicating securely and privately. In some places in the world, this is a very tangible survival skill b right here, right now. People who donbt master this survival skillb& disappear. In several places, it is outright social darwinism: people who master these skills survive, others donbt. In other parts of the world, it can very quickly become a survival skill. The European Union and the United States alike are going down a path towards similar societies quickly b and Odin knows what will happen on the United Statesb impending collapse 5-10 years from now when it runs out of new creditors. >From Cryptoparty.org: CryptoParties are meetups to share and learn basic cryptographic tools such as PGP/GPG, Tor, OTR, TrueCrypt, etc. At CryptoParty, we teach, learn and share. These are skills that will never be taught in official curriculums, so they must spread in the underbrush by necessity b just like the skills for sharing culture and knowledge using BitTorrent and similar tools have spread in the underbrush and now have reached 250 million Europeans and 150 million Americans, just like the skills on reflashing your Android phone with Cyanogenmod has spread to over a million in the underbrush. It is all our duty to support that underbrush. Our own survival depends on other people we can communicate with securely, so it is in our interest that other people, too, know how to communicate without being wiretapped andb& disappeared. This movement has significant similarities to the early PGP keysigning parties, where people would meet to sign each otherbs keys to establish a so-called cryptographic trust chain, but those assumed a much higher level of up-front knowledge about cryptography and public-key technology. The cryptoparties are more about learning the necessary skills from a fundamental level. If you want a cryptoparty in your home town, why donbt you request one and tap into the community? All my devices are walk-away safe: no confidence placed in me will be leaked if my phone, pad or notebook are stolen or forgotten. All my firewire ports are glued shut and disabled at the bios level. All my iron locks up on power loss and requires manual unlocking. I use encrypted, unwiretappable and untraceable voice communications and text communications. I use my own mail server and encrypt anything sensitive I put on Dropbox. I use Bitcoin for unseizable funds and money transfers. Today, these are survival skills. If you donbt know why, you should attend a cryptoparty. (Hat tip to Asher Wolf and several others.) From eugen at leitl.org Thu Sep 6 03:44:55 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 6 Sep 2012 12:44:55 +0200 Subject: gpg-mailgate is a gateway for Postfix that uses the GNU Privacy Guard application to encrypt e-mails before being sent to the next hop. Message-ID: <20120906104455.GS12615@leitl.org> https://code.google.com/p/gpg-mailgate/ gpg-mailgate is a gateway for Postfix that uses the GNU Privacy Guard application to encrypt e-mails before being sent to the next hop. INSTALLATION: Ensure that GPG is installed and configured. Make sure public keys for all of your potential recipients are available in the GPG home directory you use in step 2 Configure /etc/gpg-mailgate.conf based on the provided sample config Place gpg-mailgate.py in /usr/local/bin/ Place the GnuPG directory in /usr/local/lib/python2.5/site-packages Add the following to the end of /etc/postfix/master.cf gpg-mailgate unix - n n - - pipe flags= user=nobody argv=/usr/local/bin/gpg-mailgate.py 127.0.0.1:10028 inet n - n - 10 smtpd -o content_filter= -o receive_override_options=no_unknown_recipient_checks,no_header_body_checks -o smtpd_helo_restrictions= -o smtpd_client_restrictions= -o smtpd_sender_restrictions= -o smtpd_recipient_restrictions=permit_mynetworks,reject -o mynetworks=127.0.0.0/8 -o smtpd_authorized_xforward_hosts=127.0.0.0/8 Add the following to /etc/postfix/main.cf content_filter = gpg-mailgate Restart postfix. From confesslg3 at rediffmail.com Thu Sep 6 08:59:38 2012 From: confesslg3 at rediffmail.com (=?koi8-r?B?Iu319t7JzsEi?=) Date: Thu, 6 Sep 2012 12:59:38 -0300 Subject: =?koi8-r?B?987JzcHOycUuIPbl7v3p7vksINPSz97OzyDv9Ovy7+r05SDc1M8g0MnT?= =?koi8-r?B?2M3PLCDk7PEg98HTLi4u?= Message-ID: <406E6EE700CE46EFB5DE2B355A29236C@guaracic9a1096> Работа - работой, а мужчине нужна ЖЕНЩИНА. Самая-самая-самая!!! И поэтому сегодня у меня обращение именно к ЖЕНЩИНАМ. Дорогие, милые женщины. Будьте женственны, красивы и сексуальны. Когда Вы прекрасны, нам, мужчинам хочется быть рядом с Вами. Мы хотим ВАС, только когда вы – настоящие женщины. Если у Вас с этим не очень, то читайте ниже. Потому что эта тема только для женщин. Но тех, которые хотят быть женщинами. Любить, быть счастливой и любимой. Итак, повторюсь. Только для женщин! Идет запуск уникальной программы "Раскрытие внутренней женщины". Вы еще успеваете вписаться бесплатно. Смотрите подробности здесь - НАЖАТЬ СЮДА : www.вебинар-2012.рф Я видел, как меняются женщины после курса. Некоторым мужчинам уже повезло! Пора выбирать себе жену)) P.S. Женщина хороша, когда она - женщина P.P.S. Захотите, чтобы Вас захотели мужчины и раскройте свою женскую суть www.вебинар-2012.рф From genderz81 at royama.com Thu Sep 6 05:50:53 2012 From: genderz81 at royama.com (=?koi8-r?B?Iu319t7JzsEi?=) Date: Thu, 6 Sep 2012 13:50:53 +0100 Subject: =?koi8-r?B?987JzcHOycUuIPbl7v3p7vksINPSz97OzyDv9Ovy7+r05SDc1M8g0MnT?= =?koi8-r?B?2M3PLCDk7PEg98HTLi4u?= Message-ID: <9A4259A7ADDE4D0A8DB8C21583F540D6@prof2> Работа - работой, а мужчине нужна ЖЕНЩИНА. Самая-самая-самая!!! И поэтому сегодня у меня обращение именно к ЖЕНЩИНАМ. Дорогие, милые женщины. Будьте женственны, красивы и сексуальны. Когда Вы прекрасны, нам, мужчинам хочется быть рядом с Вами. Мы хотим ВАС, только когда вы – настоящие женщины. Если у Вас с этим не очень, то читайте ниже. Потому что эта тема только для женщин. Но тех, которые хотят быть женщинами. Любить, быть счастливой и любимой. Итак, повторюсь. Только для женщин! Идет запуск уникальной программы "Раскрытие внутренней женщины". Вы еще успеваете вписаться бесплатно. Смотрите подробности здесь - НАЖАТЬ СЮДА : www.вебинар-2012.рф Я видел, как меняются женщины после курса. Некоторым мужчинам уже повезло! Пора выбирать себе жену)) P.S. Женщина хороша, когда она - женщина P.P.S. Захотите, чтобы Вас захотели мужчины и раскройте свою женскую суть www.вебинар-2012.рф From risko at csl.sri.com Thu Sep 6 15:24:32 2012 From: risko at csl.sri.com (RISKS List Owner) Date: Thu, 6 Sep 2012 15:24:32 PDT Subject: [RISKS] Risks Digest 27.02 Message-ID: RISKS-LIST: Risks-Forum Digest Thursday 6 September 2012 Volume 27 : Issue 02 ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at as The current issue can be found at Contents: Hantavirus warning e-mails and letters (Monty Solomon) Lockheed Air-Traffic Upgrade Now on Track, FAA Chief Says (Dave Farber) United Airlines Investigates Network Failure Delaying 580 Flights (Gabe Goldberg) Hack on Saudi Aramco hit 30,000 workstations, oil firm admits (John Leyden via Monty Solomon) Thousands fall victim to utility payment scam (Scott Bauer via Monty Solomon) Can YOU crack the Gauss uber-virus encryption? (John Leyden via Monty Solomon) Harvard Students in Cheating Scandal Say Collaboration Was Accepted (PGN) "Automated DRM keeps spoiling the show, from the DNC to Mars" (Phipps-Samson via Gene Wirchenko) Ustream continues to attempt explaining Hugo Awards stream blackout (Lauren Weinstein) Did YouTube Really Block Michelle Obama's DNC Speech for Copyright Infringement? (Lauren Weinstein) 1 million iOS device IDs leaked after alleged FBI laptop hack (ars technica via Lauren Weinstein) FBI Says Laptop Wasn't Hacked; never possessed Apple device ID file (WiReD via Lauren Weinstein) "When virtualization becomes your worst enemy" (Gene Wirchenko) When GPS Confuses, You May Be to Blame (Randall Stross via Matthew Kruk) 'first ever' Linux, Mac OS X-only password sniffing Trojan spotted (John Leyden via Monty Solomon) Apple patent would disable phone based on location (NBC via Lauren Weinstein) Smartphone apps track users even when shut down (Richard M. Smith) Honeytrap reveals mass monitoring of downloaders (Paul Marks via Dewayne Hendricks) Firefox, Opera allow crooks to hide an entire phish site in a link (John Leyden via Monty Solomon) Test Mercenaries: Quality at Google, 2006-2011 (Mike Bland via jidanni) Re: The Cadillac Your Livery Driver Has Been Dreaming Of (Joel Garry) Re: ... civil timekeeping meeting (Steve Allen) Abridged info on RISKS (comp.risks) ---------------------------------------------------------------------- From eugen at leitl.org Thu Sep 6 08:28:20 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 6 Sep 2012 17:28:20 +0200 Subject: Secrecy News -- 09/06/12 Message-ID: <20120906152820.GY12615@leitl.org> ----- Forwarded message from Steven Aftergood ----- From eugen at leitl.org Thu Sep 6 08:57:09 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 6 Sep 2012 17:57:09 +0200 Subject: [tor-talk] Leave Your Cellphone at Home Message-ID: <20120906155709.GC12615@leitl.org> ----- Forwarded message from Mansour Moufid ----- From eugen at leitl.org Thu Sep 6 08:57:27 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 6 Sep 2012 17:57:27 +0200 Subject: [drone-list] Defense Science Board urges greater autonomy for unmanned systems Message-ID: <20120906155727.GD12615@leitl.org> ----- Forwarded message from Gregory Foster ----- From pretend1 at rothgraphix.com Thu Sep 6 05:39:18 2012 From: pretend1 at rothgraphix.com (=?koi8-r?B?IvTp8O/n8uHm6fEi?=) Date: Thu, 6 Sep 2012 18:09:18 +0530 Subject: =?koi8-r?B?8/Lv/u7h8SDJIMvB3sXT1NfFzs7B0SDQxd7B1Ngg0M/MycfSwcbJyQ==?= Message-ID: Уникальное предложение-СРОЧНАЯ и качественная печать полиграфии В СЕЗОН! СРОЧНАЯ ПЕЧАТЬ В СЕЗОН! Печатаем ВСЕ - каталоги, буклеты, листовки, плакаты, лифлеты, визитки, брошюры и другое Цифровые тиражи (до 200 шт) 1-2 дня (Индиго 5500) Офсетные тиражи 4-7 дней (Хедельберг А2, Рапида А1) СРОЧНО - сверстаем, напечатаем, доставим. Тел +7(495) 589-76-12 Быстро думаем-быстро и качественно делаем! tipo at maillog.ru From europus at gmail.com Thu Sep 6 15:59:59 2012 From: europus at gmail.com (Ulex Europae) Date: Thu, 06 Sep 2012 18:59:59 -0400 Subject: [drone-list] Article from Foreign Policy In-Reply-To: <20120906083650.GJ12615@leitl.org> References: <20120906083650.GJ12615@leitl.org> Message-ID: <50492af2.c1c4440a.6f6d.ffffc8a8@mx.google.com> At 04:36 AM 9/6/2012, Eugen Leitl wrote: >----- Forwarded message from villa at ee.ucla.edu ----- > >From: villa at ee.ucla.edu >Date: Wed, 5 Sep 2012 20:55:23 -0700 (PDT) >To: drone-list at mailman.stanford.edu >Subject: [drone-list] Article from Foreign Policy >User-Agent: SquirrelMail/1.4.8-5.el5.centos.13 > >Some people may be interested in this article published >in Foreign Policy today: > >What's Not Wrong With Drones? >http://www.foreignpolicy.com/articles/2012/09/05/whats_not_wrong_with_drones It looks to me like the author blathered inchoate about three moral (read: minor) issues but entirely missed naming a quite pragmatic one: the CIA or other controllers losing control to a hostile actor. This is not implausible, we've already seen some college kids spoof the GPS signal and in Iran, one was landed while under the control of someone else. Or at least, while not under our control. How long until one is used to blow up stuff we don't want blown up? UE From brian at alzheimersscreen.com Thu Sep 6 06:40:36 2012 From: brian at alzheimersscreen.com (=?koi8-r?B?IvfR3sXTzMHXIO3B0svP18neIg==?=) Date: Thu, 6 Sep 2012 19:10:36 +0530 Subject: =?koi8-r?B?4sXazMnNydTO2cogzcXWx8/Sz8QgKyDNz9PLz9fTy8nKIM7PzcXS?= Message-ID: <01cd8c63$4b80de00$0ec3ac7a@brian> БЕЗЛИМИТНЫЕзвонки по межгородувсего3000 руб. в месяц.Всезоны РФ (фиксированная и мобильная связь) Звоните сегодня:(495) 225-04-62 МНОГОКАНАЛЬНЫЙномер Прямой московский номер 495, 499Абонентская плата ≈ 300руб./месяцБольшой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы нипереехали- Все возможности АТС (голосовоеприветствие, голосовая почта и т.д.) включены в абонентскую плату - Экономия на покупке телефоннойстанции -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2845 bytes Desc: not available URL: From reekrs7 at radimprochazka.com Thu Sep 6 07:06:30 2012 From: reekrs7 at radimprochazka.com (=?koi8-r?B?IuUt7cHSy8XUyc7HIg==?=) Date: Thu, 6 Sep 2012 19:36:30 +0530 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAg0tXCzMXKICvIz9PUyc7HIM7BIM3F?= =?koi8-r?B?09HDINcg8O/k4fLv6w==?= Message-ID: <29A7EB37F1E442CFB5B092D04CFFE982@ray> 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК (для указания вашего сайта в письме) - По вашему графику - Без ограничений по срокам - Возможно менять макеты все 8 раз !!! - Подготовка макетов бесплатно АКЦИИ: Месяц 44(46) рассылок - 2 раза в день - 5 раз в неделю - 20 000 рублей Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,7 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1456 bytes Desc: not available URL: From sleepwalkshh3 at rapiereurope.com Thu Sep 6 05:32:56 2012 From: sleepwalkshh3 at rapiereurope.com (=?koi8-r?B?IuUt7cHSy8XUyc7HIg==?=) Date: Thu, 6 Sep 2012 20:32:56 +0800 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAg0tXCzMXKICvIz9PUyc7HIM7BIM3F?= =?koi8-r?B?09HDINcg8O/k4fLv6w==?= Message-ID: <5BF6460F283D4E80851863D14EE28AA3@PC20120531UQYA> 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК (для указания вашего сайта в письме) - По вашему графику - Без ограничений по срокам - Возможно менять макеты все 8 раз !!! - Подготовка макетов бесплатно АКЦИИ: Месяц 44(46) рассылок - 2 раза в день - 5 раз в неделю - 20 000 рублей Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,7 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1456 bytes Desc: not available URL: From aag56 at abc-systemes.com Thu Sep 6 07:17:42 2012 From: aag56 at abc-systemes.com (=?koi8-r?B?IuvPztPUwc7Uyc4g+sHLycXXyd4i?=) Date: Thu, 6 Sep 2012 21:17:42 +0700 Subject: =?koi8-r?B?4sXazMnNydTO2cogzcXWx8/Sz8QgKyDNz9PLz9fTy8nKIM7PzcXS?= Message-ID: <01cd8c75$0cf41f00$069b0275@aag56> БЕЗЛИМИТНЫЕзвонки по межгородувсего3000 руб. в месяц.Всезоны РФ (фиксированная и мобильная связь) Звоните сегодня:(495) 225-04-62 МНОГОКАНАЛЬНЫЙномер Прямой московский номер 495, 499Абонентская плата ≈ 300руб./месяцБольшой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы нипереехали- Все возможности АТС (голосовоеприветствие, голосовая почта и т.д.) включены в абонентскую плату - Экономия на покупке телефоннойстанции -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2845 bytes Desc: not available URL: From brunettesixteen at shubkindom.ru Thu Sep 6 07:50:24 2012 From: brunettesixteen at shubkindom.ru (=?koi8-r?B?7sHUwczJ0Q==?=) Date: Thu, 6 Sep 2012 22:50:24 +0800 Subject: =?koi8-r?B?8NLPxsXT08nPzsHM2M7PxSDGyc7BztPP18/FINDMwc7J0s/Xwc7JxS4=?= Message-ID: <000d01cd8c3e$f294a020$6400a8c0@brunettesixteen> Обучающий курс, который собрал все высшие награды. Спецподготовка за 5 дней чистой практики 24-28 сентября 2012г. ТЕМА: Техника бюджетирования: основа в системе планирования предприятия, бюджетный контроль и анализ исполнения бюджета. * Впервые и только участники данной группы получают дополнительный бесплатный квалификационный день занятий, который будет согласован с группой и назначен во время занятий. * Все участники получают купон на бесплатное обновление следующей версии программного комплекса. * И еще сюрприз! Подготовка участников практического семинара будет основана на программном Комплексе с использованием новых технологий плановой деятельности, подробное изложение и понимания различных методов которые необходимо применять и внедрять на предприятии. При помощи телефонного запроса - можно получить более расширенную информацию о мероприятии и заказать дополнительные файлы: * Описание учебного курса (подробное); * Заявку участника. Занятия проводятся в компьютерном классе (из расчета: один участник - одно рабочее место). Уч. курс ориентирован на: руководителей организаций, руководителей планово-экономических служб, специалистов по управлению финансами, собственников, инвесторов, специалистов кредитных организаций и органов государственного управления. Специалистов, осуществляющих подготовку и принятие решений, связанных с долгосрочным и краткосрочным кредитованием предприятия, инвестированием, поиском партнеров, подготовкой внутренней и внешней финансовой документации, ежедневным планированием деятельности собственного предприятия. Каждому участнику мероприятия: бесплатно предоставляются следующие методические материалы и программы для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии: 1. Специализированная программа-профессиональная разработка документации! Программный продукт способен не только разрабатывать финансовую документацию на профессиональном уровне, в новой версии реализованы значительные возможности для планирования текущего бюджета предприятий. 2. Программный продукт для слияния, сравнения проектов, холдинг, консолидированная отчетность. 3. Программа для построения, развития и управления экономической моделью предприятия Управления инвестиционными проектами, сравнение план/факт, мониторинг бюджета предприятия в реальном времени. Возможность написания собственных формул, сценария диагностики проекта, перепрограммирование и настройка программы. 4. Программа для построения собственных отчетов, позволяет простыми визуальными средствами решить одну из трудоемких и важных задач - составление отчетности по финансовым проектам. Блок позволяет перенаправить данные, введенные в программном комплексе, в собственный шаблон, подготовленный средствами MS Excel. 5. Программный продукт для разработки текстовой части деловой документации (бизнес планов, ТЭО, инвестиционных проектов и прочих финансовых проектов.) в профессиональном виде. 6. Программа экспресс подготовки экономической документации. Позволяет всего за пару часов создать очень приличный бизнес √ план. 7. Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. 8. На CD диске электронную версию метод. материала для разработки финансовых проектов. 9. Технологии воспроизводства документации и формирования отчетов и презентаций в виде исполнительных программных модулей. Цена программ включена в цену семинара. Для слушателей будет организован дополнительный бесплатный день обучения не входящий в состав расписания. Каждому участнику семинара Выдается квалификационный с е р т и ф и к а т Компании о прохождении курса обучения по методике "Бюджетирование" и классу семинаров "Бюджетное управление инвестиционными проектами". Список сертифицированных специалистов публикуются на сайте Компании и будут подтверждаться по любому запросу в течение квалификационного периода. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 (код Москвы) 79221*22 ; +7 499 - 4Ч5_Ч0.95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7046 bytes Desc: not available URL: From 66info at mee-wde.nl Thu Sep 6 09:03:45 2012 From: 66info at mee-wde.nl (=?koi8-r?B?IuHMxcvTxcog7cHM2cfJziI=?=) Date: Fri, 7 Sep 2012 01:03:45 +0900 Subject: =?koi8-r?B?4sXazMnNydTO2cogzcXWx8/Sz8QgKyDNz9PLz9fTy8nKIM7PzcXS?= Message-ID: <01cd8c94$a121ae80$04543c7c@66info> БЕЗЛИМИТНЫЕ звонки по межгородувсего 3000 руб. в месяц.Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня:(495) 225-04-62 МНОГОКАНАЛЬНЫЙномер Прямой московский номер 495, 499Абонентская плата ≈ 300руб./месяцБольшой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы нипереехали- Все возможности АТС (голосовое приветствие, голосовая почта и т.д.) включены в абонентскую плату - Экономия на покупке телефоннойстанции -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2767 bytes Desc: not available URL: From synthesizerswoz65 at roumu110.com Fri Sep 7 02:16:27 2012 From: synthesizerswoz65 at roumu110.com (=?koi8-r?B?IvTp8O/n8uHm6fEi?=) Date: Fri, 7 Sep 2012 01:16:27 -0800 Subject: =?koi8-r?B?8/Lv/u7h8SDJIMvB3sXT1NfFzs7B0SDQxd7B1Ngg0M/MycfSwcbJyQ==?= Message-ID: <89A5EFCC841B41C8887F0D438A08808C@420a71ab0b5fca> Уникальное предложение-СРОЧНАЯ и качественная печать полиграфии В СЕЗОН! СРОЧНАЯ ПЕЧАТЬ В СЕЗОН! Печатаем ВСЕ - каталоги, буклеты, листовки, плакаты, лифлеты, визитки, брошюры и другое Цифровые тиражи (до 200 шт) 1-2 дня (Индиго 5500) Офсетные тиражи 4-7 дней (Хедельберг А2, Рапида А1) СРОЧНО - сверстаем, напечатаем, доставим. Тел +7(495) 589-76-12 Быстро думаем-быстро и качественно делаем! tipo at maillog.ru From blidqt14 at rs-m.ru Fri Sep 7 05:51:29 2012 From: blidqt14 at rs-m.ru (=?koi8-r?B?7sHMz8fJLCDP0NTJzcnawcPJ0Q==?=) Date: Fri, 7 Sep 2012 04:51:29 -0800 Subject: =?koi8-r?B?8dfO2cUg0NLJ2s7By8kgzsHMz8fP19nIINPIxc0=?= Message-ID: <000d01cd8cef$1dfdff30$6400a8c0@blidqt14> 14 сентября Явные признаки налоговых схем и как их избежать. Легендирование и уход от аффилированности. Конкретные примеры (Ч95) 7922I\22 \\// +7 (495)- 7Ч29I\98 Программа: 1. Общие понятия. "Черные", "серые" и "белые" схемы. "Явные признаки налоговых схем": происхождение и способы выявления. 2. Прямая и косвенная аффилированность. Что такое аффилированность и взаимозависимость лиц по новому антитрансфертному законодательству. Признаки аффилированности, в т.ч. косвенные. Негативные последствия аффилированности и когда она допустима. "Искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу", примеры его использования после собственно ЮКОСа, применение к "однодневкам"). Деловые цели, обосновывающие деление бизнеса. Что делать если аффилированность уже есть: три возможных модели поведения. Примеры из практики. 3. Способы ухода от аффилированности. Использование номинальных учредителей и директоров компаний, ИП. Кто может быть номиналом? Номиналы-нерезиденты: юридические и физические лица. Траст: номиналы по закону, а не "по понятиям". Как защититься от номинала: юридические и экономические способы. Простое товарищество с физлицом-номиналом? 4. Отсутствие убедительной деловой цели сделок/действий налогоплательщика или происходящих в бизнесе изменений. Постановление ВАС ╧ 53. Для чего нужна "легенда" и кому ее рассказывать? Когда никакая легенда не спасет. Две модели построения легенды: "инициатива сверху" и "инициатива снизу". Косвенное документальное подтверждение легенды. Примеры деловых целей и типовых обосновывающих их легенд для разных схем, в т.ч. для: * отношений с недобросовестными поставщиками; * завышенных или заниженных цен реализации; * любого аутсорсинга; * управляющей компании (или управляющего); * ИП-бывших работников, в т.ч. для перевода коммерческого персонала в отдельное юрлицо или на ИП; * выделения транспортного подразделения в отдельное юрлицо; * разбиения ранее единого бизнеса √ объяснение прямой или косвенной аффилированности в прошлом или настоящем; * посреднического договора или договора простого товарищества; * платежей от нерезидентных компаний на счета физлиц; * перехода на УСН; * высоких процентов по долговым обязательствам или штрафных санкций; * крупных расходов физлиц ("откуда деньги?"). 5. Другие признаки налоговых схем: * резкие изменения в любую сторону показателей деятельности налогоплательщика; * убыточность деятельность и/или переплата по НДС; * совокупная налоговая нагрузка/рентабельность продаж или активов, средняя зарплата значительно меньше средней по отрасли; * размер вычетов по НДС выше считающегося приемлемым. 6. Ответы на вопросы. По желанию √ экспресс-анализ и разработка индивидуальных легенд для компаний-участниц. Стоимость участия: 9 000 рублей Информацию можно получить по телефонам: код (499) - 445/4О95 <<>> 8 (499) ЧЧ5*4О_95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5276 bytes Desc: not available URL: From arma at mit.edu Fri Sep 7 02:11:58 2012 From: arma at mit.edu (Roger Dingledine) Date: Fri, 7 Sep 2012 05:11:58 -0400 Subject: [tor-talk] Roger's status report, August 2012 Message-ID: Here's what I said at the beginning of August that I hoped to do: > - Chair the FOCI workshop at Usenix Security, and also attend the rest > of Usenix Security. > https://www.usenix.org/conference/foci12/tech-schedule/workshop-program > https://www.usenix.org/conference/usenixsecurity12/tech-schedule/technical-sessions Done. FOCI went really well -- we had 30-40 people there, and I think most of the talks were interesting. I've attempted to pass the torch to Jed Crandall and Joss Wright for next year's FOCI. But it looks like there will be some early stumbling blocks around whether Usenix wants to keep FOCI attached to Usenix Security. We'll see how that plays out. I spent much of my Usenix Security talking to research groups about setting up fast exit relays. See more about that below. I also talked to George Kadianakis about Tor network diversity metrics, and got him talking to a wide variety of other researchers for further suggestions. > - Talk to Ralf-Philipp Weinmann about his TorScan paper (upcoming at > Esorics) and what we can do to address his attacks. I talked to him, but we didn't come to any conclusions. Most of the fixes are delicate and have poorly understood tradeoffs. I left him with the plan that he would write a Tor design proposal or two, so we can think through the implications. > - Look at Rob Jansen's performance graphs from his new Shadow simulations. > Try to move the performance tickets forward. Done. We did a bunch of huge simulations using Amazon EC2, and ended up finding that mysterious bugs were ruining our results. We decided to focus on the simplest simulation question, and try to sort out the bugs. You can read our saga here: https://trac.torproject.org/projects/tor/ticket/6341 and as of early September, we've found and/or solved some good ones. Hard to say how many more remain before Shadow can solve all our problems, but I think we're getting closer. > - Expand on the set of metrics by which the SponsorF Red Team will judge > the project's success. Specifically, I should list the anonymity attacks > that they shouldn't evaluate since the PETS community is already doing > a good job at evaluating anonymity attacks. Continued. You can read some of my discussions at https://lists.torproject.org/pipermail/tor-dev/2012-September/003992.html George suggested that we try to turn them into a survey list of Tor attacks. Feel free to get that started if you like the idea. > - Launch the "run fast bridges for BBG" campaign, ideally by gathering > volunteers on tor-relays. Started: https://lists.torproject.org/pipermail/tor-relays/2012-August/001545.html https://lists.torproject.org/pipermail/tor-relays/2012-August/001549.html We have a few fast bridges running. The real challenge here will be the traditional bridge distribution strategy question: we need to give them out to people who need them without letting the bad guy find them. We're trying out some not-so-automated strategies first. I think the handful of fast stable bridges we have should be enough for now, on the principle that for any strategy that doesn't tell so many people that the bad guy learns too, a stable 100mbit bridge can handle all the good users who learn about it. In parallel we should continue exploring tricks like Philipp Winter's brdgrd tool: https://gitweb.torproject.org/brdgrd.git/blob_plain/HEAD:/README.md and maybe later on we'll move on to alternate transports like Obfsproxy. > - Launch the "exit relays at universities" push, and send BBG a timetable > for how our exit relay rollout is looking. We've got immediate plans from CMU and Penn that I know of, and promises from Georgia Tech and Michigan: https://lists.torproject.org/pipermail/tor-relays/2012-August/001543.html Moritz and I wrote up https://trac.torproject.org/projects/tor/wiki/doc/TorExitGuidelines which has so far been useful. Steve Bellovin at Columbia suggested that we get EFF to write a letter that university professors can hand to their general counsel, explaining what Tor is. I'm still talking to EFF people about what exactly they could write. There's also now a tor-relays-universities list as a support group for people trying to run exit relays at universities: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays-universities > - Get some money to some exit relay operators, since it turns out (ha) > that it's harder than I expected on our side to do it in a way we'll > pass our audits. Not done. I believe Andrew met with Tor's lawyers to discuss how to position it so that we continue to pass our audits, etc. (Making new organizational and bureaucratic ways to attack Tor doesn't sound great, at least not until we understand them better.) I'm hoping to team up with a couple of other organizations so that we can give them large bulk grants, and they can divide the money up further. If that should be you, please let us know! I'm hoping Moritz can take charge of this topic and make it happen. > - Get 0.2.3.20-alpha and 0.2.3.21-alpha out. I got 0.2.3.20-rc out: https://lists.torproject.org/pipermail/tor-talk/2012-August/025093.html Turns out 0.2.3.21-rc waited until September. > - Consider an 0.2.2.38 stable update. Done: https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html > - Consider an 0.2.4.1-alpha release. Not done, but done in September. > - Sort out my September travel to Germany Done. I'm going to Berlin next week: http://internethumanrights.org/ihrberlin2012/ Dagstuhl after that: http://www.dagstuhl.de/no_cache/en/program/calendar/semhp/?semnr=12381 and ETH Zurich after that to do a talk at Srdjan Capkun's group on Sept 25. > and my November travel to > Netherlands et al. Still unsorted. > - Schedule our NSF "censorship measurement" kickoff meeting, perhaps > the last week of September or first of October. Not yet scheduled. The other PIs are overloaded with other things, so I guess there's no rush, so long as we're doing useful research things. > - Encourage Andrew to put our "project coordinator" job description up > and announce it. He's written the web page, but hasn't announced it or linked it yet. I guess I'll leave that timing up to him > - Try to take a vacation Aug 11-19. Done. I even managed to be on vacation for some of it. ------------------------------------------------------------------------ Here are some other things I did in August: - Continued a mass of personal mail threads with exit relay operators. Reaching out to them and talking about how to help them makes them like us more: https://metrics.torproject.org/network.html?graph=bandwidth-flags&start=2012-08-01&end=2012-09-01#bandwidth-flags Exit relay capacity moved from 10Gbps to just over 12Gbps in August (growth of 20%), and actual reported load moved from around 6.4Gbps to 8Gbps (growth of 25%). I don't think it's wise to aim to get to BBG's "125 100mbit+ exit relays" goal anytime soon (that would involve something like doubling or more the exit capacity), but we're seeing great effects so far from ramping up the campaign. And if George and Sathya's preliminary graphs are accurate, we have maintained or improved our network diversity during this time. - Tariq's paper on guard rotation got into WPES! I helped them revise it. http://freehaven.net/anonbib/#wpes12-cogs - Turned down a pair of journal review invites because the journals are harming my field (aka not open-access). - Agreed to be on the program committee for PETS 2013: http://petsymposium.org/2013/ Though PETS is technically not open-access either (due to its publisher), I maintain the website so I can make sure that it is open-access in fact. I think that's good enough for now, but I'm pushing for more. - Jumped into the latest "omg Tor isn't perfect" thread: https://lists.torproject.org/pipermail/tor-talk/2012-August/025278.html - Lost a weekend to what was supposed to be a routine drive replacement and turned into an almost complete hardware replacement for moria1, one of the directory authorities. Thanks again to Andrew Lewman for spending his weekend messing with it. - Helped suggest useful historical documents to seed Karsten's Tech Reports page: http://research.torproject.org/techreports.html --Roger _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From saftergood at fas.org Fri Sep 7 07:51:11 2012 From: saftergood at fas.org (Steven Aftergood) Date: Fri, 07 Sep 2012 07:51:11 -0700 Subject: Secrecy News -- 09/07/12 Message-ID: Format Note: If you cannot easily read the text below, or you prefer to receive Secrecy News in another format, please reply to this email to let us know. SECRECY NEWS from the FAS Project on Government Secrecy Volume 2012, Issue No. 90 September 7, 2012 Secrecy News Blog: http://www.fas.org/blog/secrecy/ ** DRONES IN DOMESTIC SURVEILLANCE OPERATIONS, AND MORE FROM CRS DRONES IN DOMESTIC SURVEILLANCE OPERATIONS, AND MORE FROM CRS "The prospect of drone use inside the United States raises far-reaching issues concerning the extent of government surveillance authority, the value of privacy in the digital age, and the role of Congress in reconciling these issues," says a new report on the subject from the Congressional Research Service. "This report assesses the use of drones under the Fourth Amendment right to be free from unreasonable searches and seizures. The touchstone of the Fourth Amendment is reasonableness. A reviewing court's determination of the reasonableness of drone surveillance would likely be informed by location of the search, the sophistication of the technology used, and society's conception of privacy in an age of rapid technological advancement." "While individuals can expect substantial protections against warrantless government intrusions into their homes, the Fourth Amendment offers less robust restrictions upon government surveillance occurring in public places and perhaps even less in areas immediately outside the home, such as in driveways or backyards. Concomitantly, as technology advances, the contours of what is reasonable under the Fourth Amendment may adjust as people's expectations of privacy evolve." The new report reviews the relevant Fourth Amendment landscape, the current status of drone technology and applications, and pending legislation on the subject. A copy was obtained by Secrecy News. See "Drones in Domestic Surveillance Operations: Fourth Amendment Implications and Legislative Responses," September 6, 2012: http://www.fas.org/sgp/crs/natsec/R42701.pdf Other noteworthy new CRS reports that Congress has declined to make publicly available include the following. The "Fiscal Cliff": Macroeconomic Consequences of Tax Increases and Spending Cuts, September 5, 2012: http://www.fas.org/sgp/crs/misc/R42700.pdf The War Powers Resolution: After Thirty-Eight Years, September 5, 2012: http://www.fas.org/sgp/crs/natsec/R42699.pdf Stafford Act Declarations 1953-2011: Trends and Analyses, and Implications for Congress, August 31, 2012: http://www.fas.org/sgp/crs/homesec/R42702.pdf NFIB v. Sebelius: Constitutionality of the Individual Mandate, September 3, 2012: http://www.fas.org/sgp/crs/misc/R42698.pdf Search and Seizure Cases in the October 2012 Term of the Supreme Court, September 4, 2012: http://www.fas.org/sgp/crs/misc/R42697.pdf _______________________________________________ Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists. The Secrecy News Blog is at: http://www.fas.org/blog/secrecy/ To SUBSCRIBE to Secrecy News, go to: http://www.fas.org/sgp/news/secrecy/subscribe.html To UNSUBSCRIBE, go to http://www.fas.org/sgp/news/secrecy/unsubscribe.html OR email your request to saftergood at fas.org Secrecy News is archived at: http://www.fas.org/sgp/news/secrecy/index.html Support the FAS Project on Government Secrecy with a donation: http://www.fas.org/member/donate_today.html _______________________ Steven Aftergood Project on Government Secrecy Federation of American Scientists web: www.fas.org/sgp/index.html email: saftergood at fas.org voice: (202) 454-4691 twitter: @saftergood ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From impartswb4 at remy-barrere.com Thu Sep 6 23:56:27 2012 From: impartswb4 at remy-barrere.com (=?koi8-r?B?Iu3PzsnUz9LJzscg1NLBztPQz9LUwSI=?=) Date: Fri, 7 Sep 2012 07:56:27 +0100 Subject: =?koi8-r?B?7c/OydTP0snOxyDU0sHO09DP0tTBIMLF2iDQz9PSxcTOycvP1y4=?= Message-ID: Проффесиональный мониторинг транспорта. www.мониторинг-транспорта-тут.рф From eugen at leitl.org Thu Sep 6 23:20:23 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 7 Sep 2012 08:20:23 +0200 Subject: [RISKS] Risks Digest 27.02 Message-ID: <20120907062023.GH12615@leitl.org> ----- Forwarded message from RISKS List Owner ----- From eugen at leitl.org Fri Sep 7 02:42:07 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 7 Sep 2012 11:42:07 +0200 Subject: [tor-talk] Roger's status report, August 2012 Message-ID: <20120907094207.GK12615@leitl.org> ----- Forwarded message from Roger Dingledine ----- From dungareed9 at rasb.com Thu Sep 6 22:06:26 2012 From: dungareed9 at rasb.com (=?koi8-r?B?IvTp8O/n8uHm6fEi?=) Date: Fri, 7 Sep 2012 12:06:26 +0700 Subject: =?koi8-r?B?8/Lv/u7h8SDJIMvB3sXT1NfFzs7B0SDQxd7B1Ngg0M/MycfSwcbJyQ==?= Message-ID: Уникальное предложение-СРОЧНАЯ и качественная печать полиграфии В СЕЗОН! СРОЧНАЯ ПЕЧАТЬ В СЕЗОН! Печатаем ВСЕ - каталоги, буклеты, листовки, плакаты, лифлеты, визитки, брошюры и другое Цифровые тиражи (до 200 шт) 1-2 дня (Индиго 5500) Офсетные тиражи 4-7 дней (Хедельберг А2, Рапида А1) СРОЧНО - сверстаем, напечатаем, доставим. Тел +7(495) 589-76-12 Быстро думаем-быстро и качественно делаем! tipo at maillog.ru From nulltangent at gmail.com Fri Sep 7 11:20:59 2012 From: nulltangent at gmail.com (brian carroll) Date: Fri, 7 Sep 2012 13:20:59 -0500 Subject: subjective math . Message-ID: Hello St=E9phane > The point is : "To increase freedom, I thought about a system that =20 > allow me to share my voice between the different possibilities in =20 > the proportion I want." I visited your project page and while I could not get the javascript example to function the basic idea is there and it is quite interesting to consider in terms of voting. At first my impression was of tiered access to concepts, how a young student may interact with a shared model of events in a simpler framework than others who may mediate more of its related and foundational structure, as an idea. Such that a child may reference 'house' and it may involve a certain framework, whereas an adult could reference house in terms of its management or an architect in terms of its construction, though these are not necessarily clear-cut views and could overlap. Thus an accurate modeling of 'house' could provide different layers of contextual access for perspective so if a child referenced its maintenance it could also be validated via the tiered model for use in reasoning, not denied as irrelevant in terms of its perspective. When I saw your javascript example it shifted this view of proportionality into the context of governance, voting, the state, and representational 'democracy'. The vote symbolic of its legitimacy, as if about error-correction and guiding the state via some kind of active foresight. If the world were ungrounded this mechanism could be turned-inside out, voting legitimating a fixed idea about how the deterministic state will function into the future, voting a ritual signing-off on its predetermined course. In the sense that what guides the actions of the state may not be informed by the vote, that it is an illusion. In terms of governing the state, the individual voter is to me similar to a person who stands behind one of those scenic or iconic paintings with a hole in it, for a person to poke through and smile for the camera, shooting them as if the person is a part of its scene, say American Gothic or a Wild West shootout, and then getting the photograph as a souvenir. It is a capturing of 'I was here - though not really' moment. Voting in Democracy, at least the U.S. today, is like this, though with the American Stars & Stripes as its scenery, perhaps iconic government buildings and then the temporary symbolic citizen, a smiling voter, if not holding a painted copy of the U.S. Constitution or flag along with a ballot stub in the photograph. In this way a citizen could function as a stand-in, cast in the role of 'active citizen' within political scenery. Yet in the reality - outside this painted image of the state - perhaps it is different than the given signage. What's represented versus what's actually going on. And representation can be controlled through both language and imagery, yet also through logic.* Your demonstration shows this situation quite specifically. It has been so long since I voted I forget how it works in terms of 'neutral' or abstaining from casting a vote, though it is assumed these remain "unaccounted" and are not tallied in relation to the outcome else perhaps other options would exist in the politics of today. If voting were modeled as you have it, into 3-values of [ yes / neither / no ] as the available options, then there would be a way of tallying 'dissent' from voting itself, versus a decision having to go into a yes or no category by default. This happens with voting systems yet it is a question of whether or not they are tallied, and so tallying the proportion of such dissents to that of a binary [ yes | no ] could at some point begin to challenge the legitimacy of the yes/no vote count, if the proportion of 'neutral' or neither was the greatest proportion. And so it is a question of what would the threshold be for determining legitimacy of the vote, especially if it is reliant upon a majority framework... If there are 100 people who vote, and 99 choose to vote 'neither' or 'neutral', and only 1 person votes on the issue [yes], does that legitimate the decision for the other 99 people, such that it represents 'yes' for all of them? This instead seems like an inversion of representation, proportionally, because 99% would be the majority, not the 'yes' viewpoint. Which by a binary determinism is the only valid response if it is not evaluated in the 3-value logic the situation exists within. Thus voting itself is 2-value if not accounting for the dissent of the vote itself. In this way it cannot be invalidated by voting, it becomes a faithful activity that accurate representation occurs within a binary viewpoint, ignoring the 99%. How few voters would it take to call into question the legitimacy of the vote. Any number of a population could be taken and used to represent 100% of the population, even if only say 10 million were to vote for 300 million people, it likely would still be a 49% to 51% race, given mass media and the horserace, as it relates with winning odds. (Feasibly 1% could win the vote yet not 'represent' the goals of existing populations, only those tallied within the binary viewpoint, forcing such an approximation. Thus the biased, warped, distorted viewpoint could be normalized via mass media yet be quite unreal.) The mechanism self-reinforcing, not self-questioning, it cannot allow self-awareness or self reflection for it cannot mediate the truth, control the outcome of the reasoning process if allowing for such representation (in this case, meaning truth outside biased functioning) so the 'image' must be maintained as a limit, boundary or threshold and this is why 2-value logic is required, to invalidate everything outside its controlled domain. It occurs and can occur because there is no actual accounting for truth within society, beyond language. A citizen who references their Constitutional Rights in a real contest of power is more likely to end up in a psychiatric ward filled to the brim with mind-boggling chemicals, if not wrongly incarcerated if not murdered, than find 'representation' within the legal system at any level that would take on the state in its operating falsity. If you can prove via logic the state in its functioning is unconstitutional, it is simply ignored and disregarded. This is to say, the Constitution itself is being ignored. The status quo is government beyond its own laws while at the same time denying these for its citizens. Ungrounded language (and lawyers) allows this. In voting, those who _are represented by this system are encouraged by the status quo, signing-off on this. It's an inversion of principles, truth and falsity switched due to the logic, its biasing and lack of accountability. The image is everything, based on ungrounded beliefs or beliefs opposite what the words supposedly are saying. *(logic is also at the foundation of language/imagery.) Brian Carroll - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - >From mgoldh at well.com Fri Sep 7 10:22:45 2012 Cc: "nettime-l at kein.org" From: Michael H Goldhaber Subject: Re: subjective math. Date: Fri, 7 Sep 2012 01:22:27 -0700 To: brian carroll Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=us-ascii Status: RO X-Status: F Content-Length: 34148 Lines: 711 Brian, How does your approach relate to or differ from Lotfi Zadeh's "fuzzy logic?" Best, Michael On Sep 5, 2012, at 5:46 PM, brian carroll wrote: >> Brian: >> >> The severe limitations of "logic" have been long recognized -- which is why >> "real life" doesn't much rely on it. <...> > Hello Mark, > > The prevailing view of logic appears to consider it 'optional' and apart from > the normal reasoning process. Perhaps this view is equivalent to equating it > with the abstract level mathematic computations and equations for data that > derive answers from computer processors, that thought would begin and > function in terms of logical operators. A robot likely would be capable of <...> - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mx.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org From zeroingdh001 at reimslex.com Fri Sep 7 01:45:08 2012 From: zeroingdh001 at reimslex.com (=?koi8-r?B?IvDSz8TBxdTT0SA0IOfBIg==?=) Date: Fri, 7 Sep 2012 14:15:08 +0530 Subject: =?koi8-r?B?8NLPxMHF1NPRIDQg58Eg0M/EINPU0s/J1MXM2NPU188h?= Message-ID: <49E5C4FCFC734078B7008DCE540F17ED@L01059> Участок земли 4,16Га (416 соток), 70 км от Москвы, недалеко от г. Дмитров. Возможно строительство 12 коттеджей без перевода в другую категорию земли! Участок идеально подходит для корпоративного поселка или частной усадьбы. Прямая продажа от собственника. Все документы готовы. Быстрая продажа. Цена 99.000 Евро Подробности здесь: www.альпийский-дом-тут.рф/bukovo.html From bsvc at empnet.com Fri Sep 7 13:57:25 2012 From: bsvc at empnet.com (=?koi8-r?B?89TSwcjP19nFINfazi4g1dbFIM7FINPU0sHbzs8=?=) Date: Fri, 7 Sep 2012 14:57:25 -0600 Subject: =?koi8-r?B?68HLINXNxc7Y28nU2CDSwdPIz8TZIM7BINfZ0MzB1NUgwsXMz8og2sHS?= =?koi8-r?B?0MzB1Nk=?= Message-ID: <000d01cd8d33$00632b00$6400a8c0@bsvc> 24 сентября 2012г. Как уменьшить расходы на выплату белой зарплаты +7 499 Ч45_Ч0-95 <<<>>> +7 499 Ч45Ч*О95 Цель: Ставка обязательных страховых взносов (СВ) с 2012 года составляет 30% почти для всех плательщиков. При формальном снижении нагрузки на зарплату для многих сотрудников фактически выплаты возрастут: если раньше с больших зарплат СВ не уплачивались, то теперь их ставка составит 10% с суммы дохода свыше 512 тыс. рублей в год. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь √ возврат к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. Обзор изменений законодательства по страховым взносам на 2012-13 гг., как они повлияли на налоговые схемы. 2. Использование специальных налоговых режимов: * В каком случае выплата зарплаты на спецрежимах сохраняет актуальность. * Дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности. * Договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Способы минимизации рисков имущественной ответственности предпринимателя. Расчет эффективности. * Дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с новым порядком ведения кассовых операций. 3. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и качественное документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 4. Использование вспомогательных организаций: * "Инвалидные" организации и их филиалы, актуальность. * Страховые компании. Долгосрочное накопительное страхование жизни работников и ДМС за счет предприятия. 5. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, компенсаций, гонораров и иных легальных доходов от нерезидентов. 6. Как компенсировать снижение социальных гарантий (включая пенсионные накопления) работников при применении налоговых схем, не предусматривающих выплату зарплаты? 7. Использование процентных займов от физлиц. Расчет эффективности. Потребительский кредитный кооператив граждан √ способ получения безналогового дохода в виде процентов. 8. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 9. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды. 10. Создание недоимки по налогам с ФОТ на фирме, не обремененной активами √ пример "серой" схемы (как нельзя "оптимизировать"!). 11. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 12. Ответы на вопросы. По желанию √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц мероприятия. Стоимость участия: 9 000 рублей Информацию можно получить по телефонам: 8 (499) Ч45ЧО95 <> +7 499 ЧЧ54*О95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6543 bytes Desc: not available URL: From eugen at leitl.org Fri Sep 7 06:26:48 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 7 Sep 2012 15:26:48 +0200 Subject: 2012 in review: Tor and the censorship arms race Message-ID: <20120907132648.GR12615@leitl.org> http://44con.com/presentation/2012-in-review-tor-and-the-censorship-arms-race/ 2012 in review: Tor and the censorship arms race Presentation speakers Runa A. Sandvik New! On DVD Kazakhstan blocked Tor using Deep Packet Inspection in January 2012. China started probing Tor bridges using a system that is aimed directly at Tor, and using code that actually speaks the Tor protocol. Iran started blocking SSL connections on Valentinebs Day, in preparation for its bhalalb Internet. Mobile operators in the US and the UK continue to filter and censor websites for customers. The government in the UK proposed plans for mass surveillance. Activists in Iran and Syria were targeted with malware, and the government in Kuwait proposed plans to regulate the use of social networking sites. These are some of the Internet censorship events we have seen so far in 2012, and we have only scratched the surface. In this presentation, I will talk about how the blocking is done (in terms of what signatures are filtered in Tor, and how we have gotten around the blocking in each case), and what technologies are being used to filter Internet traffic b including the use of Western technology to operate the surveillance and censorship infrastructure in the Middle East. I will cover what we have learned so far about the mindset of the censor, as well as the users being censored, and how we can measure and track the wide-scale censorship in these countries using a framework we have developed. Lastly, I will explain Torbs development plans to continue to evade censorship and enable thousands of users around the world to access a free and open Internet. From kmascinskas at vi.lt Fri Sep 7 01:48:06 2012 From: kmascinskas at vi.lt (=?koi8-r?B?89TSz8XNIENhc2ggRmxvdw==?=) Date: Fri, 7 Sep 2012 16:48:06 +0800 Subject: =?koi8-r?B?6c7XxdPUycPJz87O2cog0NLPxcvUIMTBxc0g0NLPx9LBzc3VIMkgz8LV?= =?koi8-r?B?3sHFzQ==?= Message-ID: <000d01cd8cd5$7fdc5040$6400a8c0@kmascinskas> Информация во вложении -------------- next part -------------- A non-text attachment was scrubbed... Name: Fin_modelirovanie.rtf Type: application/rtf Size: 30171 bytes Desc: not available URL: From eugen at leitl.org Fri Sep 7 08:37:41 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 7 Sep 2012 17:37:41 +0200 Subject: Secrecy News -- 09/07/12 Message-ID: <20120907153741.GT12615@leitl.org> ----- Forwarded message from Steven Aftergood ----- From beck at mhsoft.com Fri Sep 7 05:07:14 2012 From: beck at mhsoft.com (=?koi8-r?B?IuHOzsEi?=) Date: Fri, 7 Sep 2012 19:07:14 +0700 Subject: =?koi8-r?B?7cXS08XExdMg1MHL08k=?= Message-ID: <01cd8d2b$fd83dd00$cd81a671@beck> Почасовая аренда Мерседес с водителем: (495) 508 25 54 Предлагаем новые автомобили Mercedes-Benz E и S класса с водителем для поездок по Москве и области: деловые поездки, трансферы в аэропорты, свадебные кортежи. Все автомобили без рекламы на бортах и символики VIP-такси. Водители со знанием английского языка, только в костюмах. В автомобилях бесплатно предоставляется: WiFi-Интернет, минеральная вода, деловая пресса. Стоимость по Москве: Е-класс - от 900 р. / 30 мин., S-класс: от 1200 р. / час. Принимаем к оплате: наличные, безнал, банковские карты. Заключаем договора с организациями. +7 495 508 25 54 Виктор Маклачевский From bbrewer at littledystopia.net Sat Sep 8 13:28:56 2012 From: bbrewer at littledystopia.net (b. brewer) Date: Sat, 08 Sep 2012 16:28:56 -0400 Subject: Fwd: 'subjective' 'math' '.' digest [x2: carroll, goldhaber] In-Reply-To: References: Message-ID: <504BAA88.8050507@littledystopia.net> Interesting indeed. _bbrewer -------- Original Message -------- Subject: 'subjective' 'math' '.' digest [x2: carroll, goldhaber] Resent-Date: Sat, 8 Sep 2012 15:07:00 +0200 Resent-From: nettime at kein.org Resent-To: Nettime Date: Sat, 8 Sep 2012 15:04:56 -0100 From: nettime's_influencing_machine To: nettime-l at kein.org Re: subjective math . brian carroll Michael H Goldhaber - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - From bbrewer at littledystopia.net Sat Sep 8 13:31:27 2012 From: bbrewer at littledystopia.net (b. brewer) Date: Sat, 08 Sep 2012 16:31:27 -0400 Subject: FBI launches $1 billion nationwide facial recognition system Message-ID: <504BAB1F.2010709@littledystopia.net> http://www.extremetech.com/extreme/135665-fbi-launches-1-billion-nationwide-facial-recognition-system ---------------------------------------------------------------------- FBI launches $1 billion nationwide facial recognition system By Sebastian Anthony on September 7, 2012 at 1:08 pm26 Comments Share This Article The US Federal Bureau of Investigation has begun rolling out its new $1 billion biometric Next Generation Identification (NGI) system. In essence, NGI is a nationwide database of mugshots, iris scans, DNA records, voice samples, and other biometrics, that will help the FBI identify and catch criminals  but it is how this biometric data is captured, through a nationwide network of cameras and photo databases, that is raising the eyebrows of privacy advocates. Until now, the FBI relied on IAFIS, a national fingerprint database that has long been due an overhaul. Over the last few months, the FBI has been pilot testing a facial recognition system  and soon, detectives will also be able to search the system for other biometrics such as DNA records and iris scans. In theory, this should result in much faster positive identifications of criminals and fewer unsolved cases. According to New Scientist, facial recognition systems have reached the point where they can match a single face from a pool of 1.6 million mugshots/passport photos with 92% accuracy, in under 1.2 seconds [PDF]. In the case of automated, biometric border controls where your face and corresponding mugshot are well lit, the accuracy approaches 100%. Likewise, where DNA or iris records exist, its a very expedient way of accurately identifying suspects. So far, so good  catching criminals faster and making less false arrests must be a good thing, right? Well, yes, but there are some important caveats that we must bear in mind. For a start, the pilot study has only used mugshots and driving license photos of known criminals  but the FBI hasnt guaranteed that this will always be the case. There may come a time when the NGI is filled with as many photos as possible, from as many sources as possible, of as many people as possible  criminal or otherwise. This might be as overt as parsing CCTV footage and collating every single face into a database; or maybe youre just unlucky and your face ends up in the system because youre in the background of a photo starring a known criminal. Imagine if the NGI had full access to every driving license and passport photo in the country  and DNA records kept by doctors, and iris scans kept by businesses. The FBIs NGI, if the right checks and balances arent in place, could very easily become a tool that decimates civilian privacy and freedom. Time to invest in a hoodie, I think From sj at c3.hu Sat Sep 8 09:50:21 2012 From: sj at c3.hu (Janos Sugar) Date: Sat, 8 Sep 2012 18:50:21 +0200 Subject: Caspian Shitstorm Message-ID: . http://forums.airbase.ru/2012/06/t86082--azerbajdzhan-vs-karabakh-armeniya-na-zadnem-plane.html#p2915213 Caspian Shitstorm Wars never happen, when forces, alliances and intentions are known in advance. In those cases, the weaker party simply yields to the demands of the stronger. Every war is preceded by misunderstanding. That is, the different sides live in different perceived realities. The expectations on both sides are typically completely out of whack. I will going to try to shed some light on these expectations and if you think that they are ridiculous, that's precisely what makes them dangerous. Also, I should state up front that because of that, these events are quite unlikely and the probability of a large-scale war is fairly low in normal terms, but uncomfortably high in terms of the potential damage it can cause. First statement that you can verify by talking to any Armenian you can find: the overwhelming majority of Armenians is crazy. Not just the government, not just the political class, not just the intelligentsia, not just the population of the country, but near-everybody for whom their Armenian heritage is part of identity, both inside and outside of Armenia, including the entire vast Armenian diaspora around the world. Of course, there is a large absolute number of perfectly sane Armenians, but they are a tiny minority with zero political clout. The rest is perfectly capable of enormous sacrifices for their nation, which they perceive to be existentially threatened. They are, on average, much crazier than Israelis even. Azerbaijanis are only slightly less crazy. While they do not feel existentially threatened, the refugees from Nagorno-Karabakh and Agdam county as well as the humiliated military establishment thirsts revenge. Politicians of all stripes have vowed to retake Karabakh in the very near future. Both Armenia and Azerbaijan spent around 3%-4% of GDP on Military, with a steep hike in the past two years in both countries. Azerbaijan's GDP is approx. 6 times that of Armenia, meaning that their military budget is bigger than the entire government budget of Armenia. So, on paper, Azerbaijan would be ready to launch a military offensive in Nagorno-Karabakh any day, if Armenian armed forces were the only obstacle to overcome. However, there is potentially a bigger obstacle: Russia. Obviously, Armenia's government want to secure Russian protecion, while Azerbaijan's government wants the Russian military to stay out of the conflict. So far, both have tried to curry favors with the Kremlin, but things are changing. Why would Russia intervene on the side of Armenia? Because they want to keep Nagorno-Karabakh Armenian-occupied, for the same reasons why Transdnistria, Crimean naval bases, South Ossetia and Abkhazia exist: to keep these countries (Azerbaijan, Moldova, the Ukraine and Georgia, respectively) out of NATO. Here's how it works: because of Article 5, NATO never grants membership to countries with territorial disputes and non-NATO foreign armed forces on their soil; Russian military thinking measures Russia's security by the distance potential adversaries need to cover on their way to Moscow, as exchanging territory for time has been a time-honored (and mostly successful) strategy for beating back invaders. For numerous reasons (in which both parties share the blame) Russian military establishment considers NATO potential adversaries. Since the eastward expansion of NATO first into former Warsaw-pact countries and then into former Soviet republics, only very hard guarantees (preferably: Russian military bases) are considered reliable (and acceptable). These disputed territories and military bases are Russia's effective veto on the respective states' NATO membership. In case of Azerbaijan, Armenian forces substitute for Russians. In case of Azerbaijan, keeping it out of NATO is especially important for the Russian government, as its NATO membership could very realistically (in their nightmare scenarios) change the strategic balance around the Caspian Sea and even threaten Russia with disintegration. Here's why. Right now, the Caspian Sea is the only sea with no U. S. naval presence. By contrast, Russia maintains by far the strongest naval force on that lake (and it is legally a lake, more on this later) and is essentially the arbiter of all disputes regarding seabed (oil & gas) and surface (fisheries, caviar) among littoral states. When separatists in Russia (in Chechnia or Dagestan) used the territory of neighboring countries (Georgia and Azerbaijan) for logistics and training, Russia's government did not hesitate to apply pressure with the threat of military force and in case of Georgia (in 2003) even acted on it carrying out a number of bombing raids in Pankisi Gorge against Chechen separatists, violating Georgian airspace and bombing undisputed Georgian territory, after deeming the efforts of Georgia's government (still headed by Eduard Shevarnadze at that time) insufficient. Azerbaijan has so far usually ??omplied with Russian demands. When Georgia's new government (headed by Mikheil Saakashvili) declared its intention to join NATO and then moved to reconquer South Ossetia and Abkhazia (in 2008), the Kremlin responded with a full-scale invasion, the near-total destruction of Georgia's military infrastructure and the recognition of the two separatist states, maintaining a powerful military presence in both. Now, such measures won't work against NATO members. All parties know that. Why are Russia's rulers so nervous about foreign support of separatism in the Northern Caucassus? Losing access to large parts of the mineral and caviar wealth of the Caspian Sea is just one reason. If Dagestan (which already has a simmering separatist civil war going on) and Kalmykia (a national republic with a 3/4 ethnic Kalmyk population) secede, it would become entirely feasible to close the small gap over the Volga delta between Kalmykia and Kazakhstan called Astrakhan county which right now on paper has a 2/3 Russian majority, but which may change very quickly. If Russia ceases to be a littoral state to the Caspian Sea, it loses its veto in re-classifying it from a lake to a sea. Once it is a sea, maritime law requires that access to international waters is granted to all without interference. This is why Turkey cannot stop any ships, including military ones, to travel between the Black Sea and the Mediterranean. In practice that would mean that American naval vessels could sail up and down the Volga waterway (which thus becomes an international one much like the Bosphorus) between St. Petersburg and Astrakhan and Russia's government cannot legally do anything about it. In Yaroslavl, they would be a mere 230km from Moscow and they are allowed to carry cruise missiles with nuclear warheads. As you can now understand, Russia's rulers would go to pretty extreme lengths to resist every single step down that road. Sounds crazy? See the first paragraph. So how could Azerbaijan's rulers realistically hope to keep Russia neutral in an armed conflict with Armenia? For instance, by giving them a military base in Azerbaijan's territory. Namely, they rent them the Gabala Radar Station (a Soviet-era advanced beyond-horizon early warning station controlling the airspace over the entire Middle East). So, they could convincingly claim that they have a proper Russian military base and there's no need to keep those Armenian occupiers. The lease runs out on December 24, 2012. A few years ago, it was considered a given that it will be prologued after a little bit of haggling over the price and other minor horse-trading. But things have suddenly changed last year. The rulers of Israel and the U. S. started preparations for an attack on Iran. For a number of reasons (more on this later), the Kremlin is against it and thus wants to make an attack on Iran as costly as possible. Ways to do that without getting involved in the conflict include providing Iran with effective air defense weapons and early warning in case of an attack. The latter even has the benefit of plausible deniability. The radar station in Gabala is perfectly suited for the purpose. In a surprise move, Azerbaijan's government raised the annual rent from $7.5M USD to $300M USD and offered to lease it for only seven years. This position has not changed for months and is still the official position of the government of Azerbaijan in the ongoing negotiations. Time is running out and Russia's military seems to be resigned to the fact that they will have to vacate Gabala before the end of the year; already half of the personnel has been removed, families have been resettled to Russia, etc. Whether or not the new radar station in Armavir is a suitable replacement is anybody's guess. This development points to the possibility that Azerbaijan got very strong security guarantees from the United States government, because it pushes the Kremlin unambiguously to the Armenian side in the Nagorno-Karabakh conflict. Given the value of Azerbaijan's support in the event of an attack on Iran, this does not strike me as entirely impossible. It is also worth noting that verbal guarantees and even strong military ties are obviously insufficient: the U. S. military stood idle as Russia's military invaded Georgia, even though they had direct access through the Black Sea; ferrying back Georgian troops from Iraq to Tbilisi was all the help Georgia got from Uncle Sam. Azerbaijan is not accessible by U. S. Navy, all material aid must arrive through Turkey or Georgia. Armenia does not share a border with Russia and has no seaports either. Supplies from Russia (both for Russian troops stationed in Gyumri, Armenia and for Armenian recipients) must pass through third countries. Initially, it was done through Georgia, but since 2003 it has become increasingly difficult and by now effectively impossible. Azerbaijan and Turkey are out of question, which leaves the only possibility: Iran. Stuff gets shipped from Russian ports on the Caspian to Iranian ports; from there it is forwarded by land to Armenia. Thus, Armenia critically depends on Iran and its government is pretty desperate in keeping that relationship warm, even if it means breaching the embargo on pretty much anything and fouling up relationships with the U. S. and their allies. Here's the latest episode: Fars News Agency :: Iranian, Armenian FMs Discuss Bilateral Ties in Tehran http://english.farsnews.com/newstext.php?nn=9106061134 ps http://www.economist.com/blogs/easternapproaches/2012/09/hungary-armenia-and-axe-murderer # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mx.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From brn650 at seogid.ru Sat Sep 8 12:51:32 2012 From: brn650 at seogid.ru (=?koi8-r?B?5MzRIO7B3snOwcDdycg=?=) Date: Sat, 8 Sep 2012 22:51:32 +0300 Subject: =?koi8-r?B?58/T2sHLwdogz9Qg4SDEzyDx?= Message-ID: МОСКВА: 13-14 сентября 2012 г. Госзаказ от "А" до "Я" для Заказчиков и Поставщиков "ГОСУДАРСТВЕННЫЕ ЗАКУПКИ: котировки, конкурсы, электронные аукционы. Разъяснения и практические рекомендации по порядку применения норм ФЗ-94 при проведении торгов. Федеральная контрактная система" (495) 792.2122 и код (495) - 7_42-9I\98 Программа: 1 день ЗАКОНОДАТЕЛЬНЫЕ ОСНОВЫ РАЗМЕЩЕНИЯ ЗАКАЗА. ОБЗОР 94-ФЗ И ИЗМЕНЕНИЙ ПРОЦЕДУРЫ РАЗМЕЩЕНИЯ ЗАКАЗА: Основные нормативные документы, регламентирующие сферу размещения заказа: *Субъекты правоотношений; *Размещение заказов у субъектов малого предпринимательства; *Национальный режим и преференции; *Участие отдельных категорий заказчиков и участников в системе размещения заказов. Нормативно-правовое регулирование отдельных аспектов размещения заказов: *Введение порядка обязательного опубликования планов-графиков закупок с 2012 года; *Порядок установления начальной (максимальной) стоимости контакта, возможные источники информации, обязанность заказчиков по опубликованию обоснования НМЦ. Существующие процедуры размещения заказов и условия их выбора и применения: *Приказ Минэкономразвития РФ от 07.06.2011 N 273 "Об утверждении номенклатуры товаров, работ, услуг для нужд заказчиков". Общероссийский классификатор видов экономической деятельности, продукции и услуг (ОКДП); *Определение одноименных товаров, работ, услуг при проведении запроса котировок и заключения гражданско-правового договора в соответствии с ГК РФ. Требования к участникам торгов и к заявкам на участие в торгах: *примеры и анализ законных и незаконных требований к участникам размещения заказа с анализом принятых арбитражными судами высшей инстанции решений; Условия допуска к торгам: *допуск участников размещения заказа; *отказ в допуске участников размещения заказа; *ТИПОВЫЕ ОШИБКИ УЧАСТНИКОВ ТОРГОВ; *Документы, подтверждающие соответствие участников установленным требованиям. Поиск информации о торгах и открытых информационных источниках Размещение заказа путем проведения конкурса: *Анализ технического задания. Особенности установления обеспечения исполнения контракта и обеспечения гарантийных обязательств; *Формирование лотов, указание товарных знаков и точных размеров в техническом задании. *Конкурсная документация, её структура. Порядок проведения процедуры конкурса. Порядок рассмотрения заявок на участие в конкурсе; *Отклонение заявок на стадии рассмотрения: на что обратить внимание, как обосновать и оформить результаты. *Оценка и сопоставление заявок на участие в конкурсе; *Постановления Правительства №722 о новых правилах оценки конкурсных заявок и их применение на практике, защита интересов и обжалование результатов торгов (практика ФАС РФ). Разбор ошибок при составлении конкурсной документации, технического задания; *Заключение контракта по результатам проведения конкурса. Последствия признания конкурса несостоявшимся; *Особенности проведения закрытого конкурса; *Практические вопросы проведения конкурсов; *Специфика размещения заказов на наиболее часто закупаемые сложные товары, работы, услуги (НИОКР, консультационные услуги, проектные работы, энергосервис и др.). Размещение заказов путем запроса котировок Размещение заказа у единственного поставщика (исполнителя, подрядчика) и особенности размещения заказа в соответствии с решением Правительства РФ: *Случаи размещения заказа у единственного поставщика (исполнителя, подрядчика). ГРАМОТНАЯ ПОДГОТОВКА ОБЕСПЕЧЕНИЯ ОБЯЗАТЕЛЬСТВ УЧАСТНИКА: *Банковская гарантия. Договор поручительства. Задаток; *Особенности Госконтракта. Обеспечение исполнений обязательств по договору, обеспечение "возврата аванса". Обжалование результатов конкурсных, аукционных и иных процедур, жалоба в ФАС, стратегия поведения Участника. ЗАКЛЮЧЕНИЕ ГОСУДАРСТВЕННЫХ (МУНИЦИПАЛЬНЫХ) КОНТРАКТОВ. ПОДГОТОВКА И СДАЧА ОТЧЕТНОСТИ ЗАКАЗЧИКУ *Подготовка контракта. Обязательные положения контракта: приемка товаров, работ, услуг и ответственность поставщика. *Обеспечение исполнения контракта. *Исполнение контракта: приемка поставляемых товаров, выполненных работ. Действия поставщиков, направленные на уклонение от исполнения обязательств. Действия заказчика в случаях нарушения обязательств по контракту. *Расторжение контракта. Ответственность за ненадлежащее исполнение этапов, несоблюдение этапов, несоблюдение срока исполнения этапов. Применение штрафных санкций, внесение сведений в Реестр недобросовестных поставщиков. Основные отличительные идеи нового законопроекта в сфере Госзакупок "О федеральной контрактной системе": *регламентация работы по прогнозированию и планированию обеспечения государственных нужд, установление состава обязательных документов планирования и определение порядка обоснования ключевых параметров планируемых контрактов в целях последующего мониторинга размещения и исполнения контрактов, анализа контрактных результатов; *предоставление государственным заказчикам свободу выбора способа размещения заказа; *стимуляция государственных заказчиков и закупщиков по обеспечению надлежащего исполнения условий контракта; *введение новых закупочных процедур и ограничений на закупку дорогостоящих товаров; *возможность формирования реестра недобросовестных заказчиков и т.д. 2 день _- 10.00-13.00 РАЗМЕЩЕНИЕ ЗАКАЗА ПУТЕМ ПРОВЕДЕНИЯ АУКЦИОНА. ОФИЦИАЛЬНЫЙ САЙТ РФ ДЛЯ РАЗМЕЩЕНИЯ ЗАКАЗОВ НА ПОСТАВКИ ТОВАРОВ, ВЫПОЛНЕНИЯ РАБОТ И ОКАЗАНИЯ УСЛУГ. ОБЗОР ДЕЙСТВУЮЩИХ ПЛОЩАДОК. ПОРЯДОК ПРОВЕДЕНИЯ АУКЦИОНА В ЭЛЕКТРОННОЙ ФОРМЕ. _- Новое в информационном обеспечении Госзаказа – работа официального сайта и электронных торговых площадок. Требования законодательства к извещению о закупках. Вопросы информационной безопасности в системе размещения государственных и муниципальных заказов _- Электронный аукцион. Размещение заказов на электронных аукционах. Аукционный перечень (Распоряжение Правительства 236-р). _- Обзор электронных площадок: ГУП "Агентство по государственному заказу, инвестиционной деятельности и межрегиональным связям Республики Татарстан", ОАО "Единая электронная торговая площадка", ЗАО "Сбербанк - Автоматизированная система торгов", ООО "РТС-тендер", ЗАО ММВБ "ГОСЗАКУПКИ". _- Электронный аукцион для Заказчиков Программное обеспечение, ЭЦП и порядок ее регистрации, документы на регистрацию, размещение извещения, документации об аукционе и протоколов. Порядок дачи разъяснений положений аукционной документации. _- Электронный аукцион для Участников Где можно приобрести ЭЦП, как ее зарегистрировать. Какие документы нужно предоставить для прохождения аккредитации на торговой площадке? Обеспечение заявок на участие в аукционе в электронной форме: как и кому предоставляется. Условия удержания обеспечения. _- Универсальный алгоритм проведения аукциона в электронной форме. Получение и регистрация ЭЦП; аккредитация участника; порядок опубликования информации об аукционе; _- Заключение контракта по итогам аукциона. Изменение сроков заключения контакта; Протокол разногласий; Новые требования по обеспечению исполнения контракта _- Ответы на вопросы слушателей _- ПРАКТИЧЕСКИЙ ТРЕНИНГ В КОМПЬЮТЕРНОМ КЛАССЕ ПО ФОРМИРОВАНИЮ И РАЗМЕЩЕНИЮ ИЗВЕЩЕНИЙ НА ОФИЦИАЛЬНОМ САЙТЕ ЗАКУПОК РФ И ПРОВЕДЕНИЮ АУКЦИОНА В ЭЛЕКТРОННОЙ ФОРМЕ НА ТОРГОВОЙ ПЛОЩАДКЕ ЗАО "Сбербанк-АСТ" _- Ответы на вопросы Стоимость участия: 15 200 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: (код Москвы) 7Ч2\91_98 **** +7 (код Москвы) 792*21/2_2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12908 bytes Desc: not available URL: From companys at stanford.edu Sun Sep 9 01:36:00 2012 From: companys at stanford.edu (Yosem Companys) Date: Sun, 9 Sep 2012 01:36:00 -0700 Subject: [liberationtech] Amsterdam Privacy Conference 2012 Message-ID: The Amsterdam Privacy Conference 2012 (www.apc2012.org) will be held from 7-10 October: a four-day privacy conference with interdisciplinarity and social relevance as spearheads. Topical issues to take centre stage include cloud computing, privacy by design, cookies, the economic value of personal data, social networks, security and anti-terrorism measures, privacy and medical data, consumersb perceptions and appraisal of privacy, privacy regulation and the redefinition of privacy in a rapidly changing information society. Many international experts from diverse disciplines will be speaking at the conference: Alessandro Acquisti, renowned for his research into the psychology behind and consumersb attitudes regarding their privacy; Ross Anderson, IT specialist in security systems, including those of medical record systems and smart meters; Jacob Applebaum, an internationally acclaimed hacker who was involved in Wikileaks; Peter Hustinx, chairman of the European Data Protection Supervisor; Sandra Petronio, the originator of Communication Privacy Management theory; and Priscilla Regan, author of the book, bLegislating Privacy: Technology, Social Values and Public Policyb. In addition, the conference is hosting over 30 specialist panels and sessions that are sub- divided into six themes: Economics of Privacy, Privacy and Security, Privacy in the Information Society, Privacy and Technology, the Value and Principles of Privacy and Privacy and Healthcare. There will also be sessions on the position of civil rights organisations in the privacy discourse, presentations of empirical research on consumersb behaviour with regard to their personal data and a practical session: bring your own device and learn how to hack. More than 150 academics with a large variety of backgrounds will actively contribute to the conference by means of presentations, panels and debates. The opening day of the conference on Sunday 7 October features a public lecture that also falls within the theme of the UvAbs 380th anniversary year. The day will be opened by Dymph van den Boom, Rector Magnificus of the UvA, and Lodewijk Asscher, Deputy Mayor of Amsterdam. Helen Nissenbaum, who recently published the bestseller, bPrivacy in Contextb, will give the public lecture, which examines the role of privacy in modern society. Following this, a panel composed of Jacob Kohnstamm, chairman of the Dutch Data Protection Authority and the Article 29 Data Protection Working Party, Simon Davies, founder of the civil rights organisation Privacy International, and Alma Whitten, Google's Director of Privacy, will respond to the lecture and will debate with each other and the audience. The lecture will be given in the University Auditorium. The programme of the remaining days will be held in the monumental Felix Meritis building and the university library, both situated in the centre of Amsterdam. Conference registration at: www.apc2012.org (students & PhD students: b, 125; academics, civil servants & NGOs: b, 225; lawyers, notaries & private sector: b, 550). -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From williamschwartz at jetty.net Sat Sep 8 21:22:25 2012 From: williamschwartz at jetty.net (CasandraHarmon) Date: Sun, 09 Sep 2012 02:22:25 -0200 Subject: 100% Natural - Most Effective Male Enhancement and Male Enlargement Products - Guaranteed to Work! ur32j1 Message-ID: <61w68r98t42-01084914-210q9g38@nentvmfzcm> Natural Male Enhancement Penis. 100% Natural - Most Effective Male Enhancement and Male Enlargement Products - Guaranteed to Work! http://guideeryy.ru From bsabrina at canes.ru Sat Sep 8 18:08:06 2012 From: bsabrina at canes.ru (=?koi8-r?B?+9TV3s7ZyiDSxcvS1dTNxc7U?=) Date: Sun, 9 Sep 2012 09:08:06 +0800 Subject: =?koi8-r?B?+9TV3s7ZyiDSxcvS1dTNxc7UOiDLwcsg2sHQz8zO0dTYINPMz9bO2cUg?= =?koi8-r?B?18HLwc7Tyck=?= Message-ID: <000d01cd8e27$9209b1b0$6400a8c0@bsabrina> 12 сентября "Штучный" рекрутмент: как заполнять сложные вакансии +7 (Ч95) 792*2I22 и +7 Московский код: 7922I22 Программа: "Штучный" рекрутмент на российском рынке труда. "Штучные" вакансии: топ-менеджмент, руководители среднего звена, редкие специалисты. Где и как искать кандидатов на "штучные" вакансии? Внешний и "внутренний рынок труда". Мониторинг рынка труда высококвалифицированных специалистов. Стандартные ошибки при найме на работу VIP √ персонала и способы их преодоления. Организация head hunting (executive search) собственными силами. Основные принципы "executive search". Возможности пассивного и полуактивный поиска. Система прямого (активного) поиска. В каких случаях следует использовать технологии head hunting? Стоимость вопроса. Можно ли вести активный поиск с позиций отдела управления персонала компании? Оценка целесообразности работы через специализированные кадровые агентства. SWOT √ анализ в оценке возможностей найма ценного сотрудника. Проблемы проведения активного поиска с позиций службы управления персоналом предприятия. Вопросы этики. Технологии и методики. Технологии спецслужб в head hunting. "Оперативный словарь" "хэд-хантера". Планирование прямого (активного) поиска. Основные этапы работы. Источники сведений о потенциальных кандидатах. Использование маркетинговых технологий. Как переманить ценного специалиста? Причины желания сменить место работы. Возможные причины несостоятельности нанятого VIP √ персонала. Топ-менеджмент предприятия и организационная культура. Специальные методы изучения и оценки кандидатов на VIP √ вакансии. Технология углублённого анализа резюме: анализ резюме "методом Шерлока Холмса". Методика анализа жизненного пути кандидата. Контент-анализ резюме. Анализ резюме как подготовка интервью. Особенности проведения интервью с кандидатами на "штучные" вакансии. Особенности организации оценки кандидатов на "штучные" вакансии: экспертные оценки. Вопросы обеспечения безопасности. Обеспечение безопасности предприятия при использовании технологий head hunting. Как защитить своих ценных сотрудников от "хэд-хантеров"? Стоимость участия: 8900 рублей Вся информация по тел: 8 (499) 4Ч5*4095 \Моск. код/ 742.9I98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4972 bytes Desc: not available URL: From metahorse at gmail.com Sun Sep 9 12:34:21 2012 From: metahorse at gmail.com (Michael Hrenka) Date: Sun, 9 Sep 2012 12:34:21 -0700 (PDT) Subject: [ZS] Quantified Prestige Message-ID: I just finished the updated version of the documentation of my reputation/money system with the updated name Quantified Prestige (formerly: Prestige Fluido). What's new is that there's now a Trust System that makes it necessary for new users to get Trust before they can get any Prestige (but the Trust System is actually optional, it's intended to work for distributed versions of the system). Also, the structure of the system is more modular now, as I defined the Quantified Prestige Network as core part of the system and the electronic currency gimmicks as external applications which only need few data (Trust Levels and Prestige Scores) from the Quantified Prestige Network. Another nice extra application are Prestige Polls which work like usual polls but with votes weighted with the Prestige Scores of the voters. The documentation is at http://radivis.com/public/quantifiedprestige002.pdf (do we have a central ZS cloud storage or something like that?). It's 37 pages long, so only read the parts you are really interested in. As next step I'm planning to create a quite simple/minimal implementation of a Quantified Prestige Network for ZS, so that we could test the system in action. I don't think we need a Trust System right now, because we are still a rather small group and it's only a test version of the system. In this test version you can only allocate Esteem Points to other users. With those Esteem Points the system can compute Prestige Scores for all users. Users with lots of Prestige can then feel good about themselves. If that test is successful I would add more and more features to the system, depending on the demand within ZS. We could have a ZS Bitcoin Fund which is paid out to members with Prestige. Or we could implement a ZS Fluido currency together with a basic income in that currency. Prestige Polls are also an option. Finally, there's still lots of work to be done to find out how to make a decent decentralized version of Quantified Prestige. I probably need a lot of help in that area: How are decentralized systems "managed"? Who has the authority to change the system parameters? Or is the only way to use other parameters using a different version of the software? Anyway, I need feedback. If you have any idea how to do things better, throw a suggestion into the room or to me. - Michael -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From noloader at gmail.com Sun Sep 9 14:05:00 2012 From: noloader at gmail.com (Jeffrey Walton) Date: Sun, 9 Sep 2012 17:05:00 -0400 Subject: [cryptography] Mobile Traffic Interception (SSL/TLS and VPN) Message-ID: Hi M. > not sure what you meant by mobile Anything wireless is in scope - Cellular radios, WiFi, Bluetooth, etc. I'm really interested in mobile devices which spend most of their time outside a logical security boundary of an organization. > wifi/wimax environment is almost identical to wired networks on this issue I agree that wireless suffers the same problems as wired. But I think the surface area increased disproportionately. With landlines between floors (or perhaps a leased line to/from a datacenter), I usually have some sort of physical security. In wireless, I don't have many of the assurances (how effective they are in a wired environment is a different story). A bad guy could set up a Wifi access point or base station, and my phone or tablet will happily camp to it. Plus, phones and tablets often come pre-loaded with certificates from OEMs and carriers (if they are burned into ROM, I probably can't manage them). And there is the customary law enforcement taps (x2 since both the wireless carriers and telcos likely provide them). Finally, there's WAP which places the MitM by design. > if somebody thinks SSL offers security ... Verbum sapienti. In short, I know the problems exist in the mobile arena, and I'm looking for the published results. Jeff On Sun, Sep 9, 2012 at 3:38 PM, Mh wrote: > not sure what you meant by mobile . wifi/wimax kind of mobile clients or 2g/3g/4g types ? i am not aware of papers but based on personal experiments wifi/wimax environment is almost identical to wired networks on this issue but Xg's and satellite networks have many different factors including the strong country/region based regulations , vendor/operator related demands on customizing application processor OS ( assuming it is the one that handles SSL ) and the update scenario and strategy based on operator or client choices , jailbreak related issues , etc could have impacts on SSL security . i've got many cellphones in lab that have vast difference in trusted authorities , how to handle CRL update , offers of OTA ,etc . essentially , examining Xg's traffics , whether it is Voice , Signaling or Data ( includes IP stuff like SSL ) is by no mean a friendly job . this is why projects like openbts are important . two typical remote attacks are 1.silent change in os by modifying updates which could be done by hacking into the operator which is , trust me , an easy job 2.using a GSM-style active interception and impersonating the network as a whole , then proceed with evil activities using tricks , fishing , bugs , enforced redirects to metasploit-like infected pages . over all , if somebody thinks SSL offers security , and she wants to asses if to use the first environment or the second , i'd suggest the 1st . > > Regards > M. > > > On [ Z)X4YX(Y, X4YX1[ YX1 [1[9, [1[3[9[1 at [2[3:[3[1, Jeffrey Walton wrote: > >> Hi All, >> >> Is anyone aware of papers or studies on HTTPS traffic interception in >> mobile networks? >> >> I know Colling Mulliner did a study of HTTP headers and information >> leakage in the past. I know we have Trustwave (and I'm not aware of >> published results of Mozilla's subsequent actions) and the more >> general problem of Public CA hierarchies. I am aware of products like >> BlueCoat and Dr. Matt Greene's Interception Proxies page. I believe >> the EFF is aggregating data on SSL/TLS at the moment, but the data >> will not be released for some time. >> >> With HTML5 and WebSockets, I believe we can build a smarter client >> that can detect interception based on pinning (either public key or >> certificate). Is anyone aware of any tools for doing so (perhaps where >> aggregated data is offered)? _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sun Sep 9 13:10:56 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 9 Sep 2012 22:10:56 +0200 Subject: Caspian Shitstorm Message-ID: <20120909201056.GA9750@leitl.org> ----- Forwarded message from Janos Sugar ----- From eugen at leitl.org Sun Sep 9 13:57:05 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 9 Sep 2012 22:57:05 +0200 Subject: [liberationtech] Amsterdam Privacy Conference 2012 Message-ID: <20120909205705.GI9750@leitl.org> ----- Forwarded message from Yosem Companys ----- From eugen at leitl.org Sun Sep 9 14:00:05 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 9 Sep 2012 23:00:05 +0200 Subject: [ZS] Quantified Prestige Message-ID: <20120909210005.GL9750@leitl.org> ----- Forwarded message from Michael Hrenka ----- From eugen at leitl.org Sun Sep 9 14:07:02 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 9 Sep 2012 23:07:02 +0200 Subject: [cryptography] Mobile Traffic Interception (SSL/TLS and VPN) Message-ID: <20120909210702.GO9750@leitl.org> ----- Forwarded message from Jeffrey Walton ----- From fzzpagb at nalogacademy.ru Sun Sep 9 12:13:15 2012 From: fzzpagb at nalogacademy.ru (=?koi8-r?B?9dDSwdfMxc7JxSDQxdLTz87BzM/NIMvPzdDBzsnJ?=) Date: Mon, 10 Sep 2012 00:43:15 +0530 Subject: =?koi8-r?B?9dDSwdfMxc7JxSDQxdLTz87BzM/NIMvPzdDBzsnJ?= Message-ID: <000d01cd8ebf$29de1390$6400a8c0@fzzpagb> 26-28 сентября 2012 г. УПРАВЛЕНИЕ ПЕРСОНАЛОМ √ ОТ А ДО Я +7 499 - Ч45\ЧО.95 \\\/// код (495) - 7\42*91-98 Цель: "Кадры решают все". Как сделать так, чтобы на Вашем предприятии работали сотрудники, которые все свои знания, навыки и умение отдавали работе? Как найти тех сотрудников, которые Вам нужны? Как удержать нужных и как по-хорошему расстаться с плохими работниками? Что лучше кнут или пряник в управлении персонала? Как подготовится к проверке инспекции по труду? Что нового можно применить в управлении персоналом? В ходе курса Вы узнаете, какие меры стоит предпринять для минимизации ошибок в работе с персоналом, как построить четкую систему документооборота и его учета, которая защитит при проверках, как подготовить и провести эффективную аттестация (оценку) персонала и правильно мотивировать своих сотрудников. В результате участия в курсе участник приобретет следующие знания: * Возможность оценить работу с персоналом на своем предприятии * Внедрить современные методы в соответствии с потребностями предприятия * Построить оптимальную систему кадрового документооборота * Определить и уточнить компетенции персонала, как работающего, так и принимаемого * Построить системы мотивации, адаптации и оценки, которые не будут отторгаться коллективом * Создать сбалансированную систему управления персоналом Программа: 1 день ПОИСК, ОТБОР, ПРИЕМ И АДАПТАЦИЯ СОТРУДНИКОВ 1. Критерии отбора персонала: * Заявка руководителя подразделения, имеющего вакансию, * Идеальный портрет работника, * Гармонизация идеального портрета работника и возможностей предприятия: * По навыкам, * По заработной плате, * Др. запросам. 2. Методики поиска персонала: * По категориям персонала: * Печатные издания, * Интернет, * Службы занятости, * Рекрутинговые компании, * Работа с молодежью: * Вузы и колледжи, * Военкоматы, * Heardhunting. 3. Отбор персонала: * Первоначальный отбор, * Первичное собеседование, * Собеседование в подразделении, * На что следует обратить внимание: * В документах, * При личном общение, * "Сканируем" кандидата, * Вопросы тестирования √ за и против. 4. Решение о приеме: * Условия испытательного срока и последующей работы, * Кто принимает решение, * Ответственность принимающих решение. 5. Прием на работу: * Оформление документов, * Адаптация нового сотрудника: * Ознакомительные материалы по предприятию, * Вхождение в должность, * Наставник и наставничество. 6. Прохождение испытательного срока: * Заключение руководителя, наставника, * Заключение самого работника, * Выводы по окончанию испытательного срока. 7. Движение персонала: * Переводы: * Вертикальные и горизонтальные, * По собственному желанию и по инициативе руководства, * Документальное обеспечение движения персонала, * Др. виды движения персонала. 8. Анализ движения кадров 9. Ответы на вопросы, разбор конкретных ситуаций. 2 день КАДРОВОЕ СОПРОВОЖДЕНИЕ 1. Проверки инспекции по труду: * Плановые проверки, * Внеплановые проверки: * Обращение работников в надзорные органы, * Выявление нарушений в оплате труда и начислениях работникам, * Др. моменты. 2. На что обращают внимание инспекторы: * Приказы по личному составу, * Трудовые книжки, * Личные дела работников. 3. Решение спорных вопросов: * В ходе проверки, * После проверки. 4. Выполнение предписаний инспекторов: * Сроки исполнения, * Отчет об исполнении, * Повторные проверки. 5. Ответственность руководителей предприятия: * Наложение взысканий на руководителей предприятий, * Передача дел в суд, * Ответственность работника кадрового подразделения. 6. Кадровые документы, регламентируемые законодательством: * Придание документам юридической силы, * Состав и виды документов, * Основные требования к оформлению кадровой документации, * Учет кадровой документации на предприятии (ведение регистрационных книг, журналов, др.), * Своевременное внесение изменений в учетную документацию. 7. Архив предприятия: * Виды документов по срокам хранения. 8. Применение IT-программ. 9. Минимизация ошибок в работе с персоналом: * При приеме на работу: * Анализ документов кандидатов, * Выводы по результатам собеседований и интервью. * При переходе внутри предприятия. * При оформлении отпусков: * Учебных, * Очередных. * При увольнении по инициативе администрации: * Сокращения, * Ликвидация предприятия. 10. Ответы на вопросы слушателей, разбор конкретных ситуаций. 3 день СЛОЖНЫЕ АСПЕКТЫ УПРАВЛЕНИЯ ПЕРСОНАЛОМ √ МОТИВАЦИЯ, ОБУЧЕНИЕ, АТТЕСТАЦИЯ 1. Структура мотивации: * Потребность работника * Материальное или нематериальное благо, способное удовлетворить эту потребность * Трудовое действие, необходимое для получения этого блага * Цена получения этого блага 2. Экономические и неэкономические стороны мотивации труда 3. Неэффективность немотивированного или узко мотивированного труда * Низкая производительность труда * Плохая дисциплина * Текучесть кадров 4. Правила мотивации труда * Эффект поощрения * Разнообразие способов и форм мотивации * Подкрепленная мотивация * Нестандартная мотивация * Промежуточная мотивация * Уровни ответственности, права свободы выбора * Неоправданность большого вознаграждения * Конкуренция в коллективе * Переобучение и переподготовка 5. Цели мотивации * На развитие предприятия и удержание сотрудников * На приток новых работников * На сокращение и увольнение 6. Моменты мотивации * Заработная плата * Определение оптимального уровня заработной платы * Доплаты и вычеты * Повышение квалификации, переподготовка, переобучение работников * Карьерный рост * Нематериальные поощрения 7. Эффективная мотивация 8. Критерии оценки эффективной мотивации * Удовлетворенность работников * Текучесть кадров * Производительность и качество труда 9. Когда надо обучать персонал: * Недостаточный профессионализм работников, * Новое направление деятельности или расширение предприятия, * Создание резерва на выдвижение, * Др. 10. Категории персонала по обучению: * Обучаемые и необучаемые работники, * Работники, чья профессия требует постоянного совершенствования и поддержания (бухгалтеры, IT-специалисты, др.), * Как заинтересовать работника. 11. Выбор способа и методик обучения: * Внутри предприятия: * Наставничество, * Коллективный обмен опытом, * Приглашение внешнего преподавателя, тренера: * * Коллективное обучение, * * Индивидуальное обучение, консультация, * Как лучше организовать процесс обучения. * * Вне предприятия: * Выбор обучающей фирмы, тренера, программы. 12. Планирование результатов обучения: * Цели обучения персонала, * Планы повышения квалификации и обучения. * Периодичность обучения. 13. Оценка результативности обучения: * Соотношение ожиданий и результатов обучения, * Непосредственно после обучения, * Через определенный промежуток времени, * Закрепление результатов. 14. Цели и задачи аттестации, оценки: * Оценка компетентности персонала, * Определение потребности в обучении и повышении квалификации, * Запуск нового направления деятельности, * Оптимизация численности персонала. 15. Виды оценок и аттестаций: * Плановые и внеплановые оценки, * Юридическая правомерность результатов аттестации. 16. Подготовка к проведению аттестации: * Положение об аттестации на предприятии, * Аттестационная комиссия, * План проведения аттестации, * Выработка критериев оценки отдельных групп работников, * Документы по аттестации. 17. Собственно аттестация: * Сроки проведения, * Опросные листы, * Роль аттестационной комиссии, * Самооценка и оценка руководителя, коллег, др., * Заключение по результатам аттестации, * Сравнение с предыдущими аттестациями. 18. Результативность аттестации: * Ротация кадров, * Планы повышения квалификации, * Оптимизация оплаты труда конкретного работника, * Конкретизация требований для подбора персонала, * Уточнение должностных инструкций и должностных обязанностей. 19. Практические рекомендации, ответы на вопросы: * Положения об аттестации, * Минимизация затрат на проведение аттестации. 20. Ответы на вопросы слушателей Стоимость участия: 17 000 рублей Информацию можно получить по телефонам: +7 499 Ч45*ЧО.95 \\\/// код (495) - 7\Ч2-91_98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 23111 bytes Desc: not available URL: From wrinkliesfzd45 at raincoofdallas.com Sun Sep 9 23:59:50 2012 From: wrinkliesfzd45 at raincoofdallas.com (=?koi8-r?B?IuUt0sHT09nMy8ki?=) Date: Mon, 10 Sep 2012 07:59:50 +0100 Subject: =?koi8-r?B?7cXT0cMg0sHT09nMz8sgMjAgMDAwLSA0NCDb1NXLyQ==?= Message-ID: <3BB60A24C3034F4AAAB4D976A4E3D7F7@anonymous> Месяц рассылок 44(46) - 2 раза в день - 5 раз в неделю - 20 000 Тел: (495) 585-79-04 ICQ: 286-926-971 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 382 bytes Desc: not available URL: From joshuapalmer87 at gmail.com Mon Sep 10 08:14:52 2012 From: joshuapalmer87 at gmail.com (Josh Palmer) Date: Mon, 10 Sep 2012 08:14:52 -0700 (PDT) Subject: [ZS] Re: Quantified Prestige Message-ID: A very interesting read, I feel like it is a very promising idea. I have a few nitpicks with the documents and some more serious intrinsic questions about Fluido. I feel the idea behind Prestige is sound though. Minor points: - I am pleased to see that it only implements positive reputation to avoid "karmic bankruptcy", could there be a brief explanatory note about this? - You mention on page 30 about prestige allocation being optionally fractional, but apart from a throwaway comment about positive rational numbers being the amount for the prestige allocation allowed to a user, it doesn't appear until here. Could one of the examples produced use a fractional amount to clarify this? - In section 4.3 (p16) the example uses a trust rating of 0.5 but the description of trust levels imply they should be from the naturals, was my reading of this wrong or is the example wrong? - When talking about allocators in section 2.2.4 (p9) you mention that the creator of the group is the only one with the power to hire/fire managers of the group. I believe that ownership should be transferable, perhaps this should be rephrased as owner of the user circle, or maybe superuser? More substantial questions - Is the web of trust standard to use unconnectedness except through k? How does this work in mature groups where there is a large amount of connectedness? I'm thinking more where it would be used as a local, restricted reputation model rather than a global one as that would imply a substantially different shaped network. - Fluido seems, especially when taken as the continuous system seems like it would be particularly susceptable to falling into a trap of metaphorical thinking as a renewable energy source. What implications could this have? link - (http://www.ribbonfarm.com/2009/03/02/fools-and-their-money-metaphors/) -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From begrudgey37 at rlozano.com Sun Sep 9 21:33:36 2012 From: begrudgey37 at rlozano.com (=?koi8-r?B?Iu3PzsnUz9LJzscg1NLBztPQz9LUwSI=?=) Date: Mon, 10 Sep 2012 10:03:36 +0530 Subject: =?koi8-r?B?7c/OydTP0snOxyDU0sHO09DP0tTBIMLF2iDQz9PSxcTOycvP1y4=?= Message-ID: Проффесиональный мониторинг транспорта. www.мониторинг-транспорта-тут.рф From southernmostgfn73 at renoortho.com Mon Sep 10 03:03:15 2012 From: southernmostgfn73 at renoortho.com (=?koi8-r?B?IuvB0tTJzsEi?=) Date: Mon, 10 Sep 2012 15:33:15 +0530 Subject: =?koi8-r?B?89TJzNjO2cog0M/EwdLPyyDTIMTP09TB18vPyiDOwSDEz80gLSDzy8nE?= =?koi8-r?B?y8EgNTAgJSE=?= Message-ID: <99B23614E8E94480B7E7B1AEBC6AAD59@scoe72d6138857> Картина в раме и подарочной упаковке. Упаковка бесплатно! Доставка бесплатно! Осенняя скидка 50 %! www.картина-тут.рф/11.shtml From triflingpk8 at reddwarf.com Mon Sep 10 03:05:53 2012 From: triflingpk8 at reddwarf.com (=?koi8-r?B?IuvB0tTJzsEi?=) Date: Mon, 10 Sep 2012 15:35:53 +0530 Subject: =?koi8-r?B?89TJzNjO2cog0M/EwdLPyyDTIMTP09TB18vPyiDOwSDEz80gLSDzy8nE?= =?koi8-r?B?y8EgNTAgJSE=?= Message-ID: Картина в раме и подарочной упаковке. Упаковка бесплатно! Доставка бесплатно! Осенняя скидка 50 %! www.картина-тут.рф/11.shtml From foxhoundc8 at roxiware.com Mon Sep 10 01:19:07 2012 From: foxhoundc8 at roxiware.com (=?koi8-r?B?Iu/Q1M/X2cUgySDSz9rOyd7O2cUg0NLPxMHWySI=?=) Date: Mon, 10 Sep 2012 16:19:07 +0800 Subject: =?koi8-r?B?58HSwc7UydLP18HOztnKIMvBzsHMINPC2dTB?= Message-ID: <062481459.49023633572517@roxiware.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 680 bytes Desc: not available URL: From refusalslf110 at rccmaine.com Mon Sep 10 02:25:52 2012 From: refusalslf110 at rccmaine.com (=?koi8-r?B?IvDSz8TBxdTT0SA0IOfBIg==?=) Date: Mon, 10 Sep 2012 16:25:52 +0700 Subject: =?koi8-r?B?8NLPxMHF1NPRIDQg58Eg0M/EINPU0s/J1MXM2NPU188h?= Message-ID: Участок земли 4,16Га (416 соток), 70 км от Москвы, недалеко от г. Дмитров. Возможно строительство 12 коттеджей без перевода в другую категорию земли! Участок идеально подходит для корпоративного поселка или частной усадьбы. Прямая продажа от собственника. Все документы готовы. Быстрая продажа. Цена 99.000 Евро Подробности здесь: www.альпийский-дом-тут.рф/bukovo.html From eugen at leitl.org Mon Sep 10 07:55:28 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 10 Sep 2012 16:55:28 +0200 Subject: Wrestling with Bitcoin. Why even hard-core goldbugs should respect and support cryptocurrencies. Message-ID: <20120910145528.GF9750@leitl.org> http://www.dgcmagazine.com/wrestling-with-bitcoin-why-even-hard-core-goldbugs-should-respect-and-support-cryptocurrencies/ Wrestling with Bitcoin. Why even hard-core goldbugs should respect and support cryptocurrencies. Posted on September 10, 2012 by Julia Donbt get me wrong, Ibm not suggesting you sell your gold for Bitcoins. What Ibm saying is although they may not realize it, Bitcoin is a goldbugs friend. It has a real chance of changing the way the average person thinks about money and that is good news for anyone who is not a fan of fiat. When I first heard of Bitcoin I wasb&unimpressed. Since having discovered the truth of how fractional reserve banking and fiat function, I have been a hard-core goldbug. And like most goldbugs, including James Turk, I felt that bBitCoins are the ultimate currency backed by nothing.b It seemed like a waste for such clever people to spend their time and energy creating money that functions wonderfully, but is backed by nothing. I have since changed my mind. So how can a self-respecting goldbug be in love with a cryptocurrency? While Bitcoin may not meet with Misesb regression theorem requiring an object to have primary use value prior to having value as money, it does possess many of the same characteristics that make gold a wonderful currency. The supply of Bitcoin is finite and limited, there will never be a Bitcoin inflation. Bitcoins may be purely digital, but they are not pulled out of thin air. Producing or bminingb Bitcoins comes with significant computational costs. But beyond this, goldbugs should love Bitcoin because it could be the game changer. When alternatives are accepted, when the status quo is questioned, the door is opened. Bitcoin is decentralized, resilient, cheap and easy to use and very difficult to regulate or shut down. But perhaps even more important is its popularity. The biggest hurdle that DGCbs face, next to hostile regulation, is their bweirdnessb and lack of popularity. It is simply not practical to try to operate using DGCbs when no one knows what they are, let alone accepts them. And Ibm sure most of us have had the experience of being looked at like youbre wearing a tinfoil hat when you try to explain DGCbs superiority to fiat. But this is not the case with Bitcoin. The internet is abuzz with Bitcoin. I run across articles and posts about it at almost 20 times the rate to that of other DCbs. Bitcoin is almost, dare I sayb&cool! There have been other DCbs that have gained some impressive numbers, e-gold, the Liberty Dollar and in Russia WebMoney, but no onebs got it going on quite the way Bitcoin does. New Bitcoin based businesses seem to spring up every other day, Bitcoin Users Org has 242,000+ blikesb on Facebook, on an average day over US$220k worth of Bitcoinbs are exchanged and there was an entire episode of The Good Wife about Bitcoin. There is no doubt that Bitcoin is gaining mainstream traction in the US the way no other alternative currency has. So, the question isb& why? I believe there are three big reasons why Bitcoin is winning the DC popularity contest; Fear of change, political alliances and trust. Fear of Change. Much has been said about human issues with change, and while reviewing old issues of the DGC Magazine, I ran across an interesting article touching on these topics. Paul Rosenbergbs bThe Truth About Pioneers And Why It Could Be Different This Timeb from the January 08 Issue, has some interesting thoughts. bThe group jumps forward only to the distance that an average member can handleb&the acceptance of a new idea has very little to do with the merits of the idea, and almost everything to do with the psychological impact it had upon the average personb&the pace of change is increasing. And that means that each jump is longer than the previous.b I tend to agree, so why then is Bitcoin seemingly jumping faster than other DCbs? People may be more comfortable with change, but Bitcoin looks and feels like a type of change that people have become very familiar with. Bitcoin sells itself as bnew financial technologyb, and people are very used to changes in technology. For example, Skype. People are still making long distance phone calls, but now they use a fancier device than their land line phone. Theybre okay with that, and expect to do lots of things on fancier devices in the future. Bitcoin sells itself as simply a new app for making and receiving payment. The brevolutionaryb side of it, and what it could do to the status quo, is not advertised. Its name and its advertising message make it sound like any other new high-tech product coming out of Silicon Valley. It does not raise peoples bfrightening new changeb alarm bells. Political alliances. Bitcoin is a political blank canvas. Because Bitcoin has not been aligned with any particular political philosophy, it is free to be loved by conservative anti-Fed guys, the bankster hating boccupyb crowd, and libertarian hippies alike. Anyone who is holding a grudge against banks or government can get a chuckle out of using Bitcoinb&and thatbs a LOT of people! Trust. Goldbugs will cringe, but itbs true, Bitcoin is easier for some people to trust. To most people gold bullion is just something that gets stolen out of an underground vault in an action movie. They have no actual experience, and zero comfortability with it. And they are certainly not keen to spend money on an uncomfortable product and then entrust its safe keeping to an unknown group. This is the biggest stumbling block that Ibve run across when trying to explain DGCbs to the non-initiated. bHow do you know they wonbt run off with your money?b Giving someone unfamiliar with these topics a lecture about business models, economic incentives and auditing practices does no good here. Spending money on an exotic material and then entrusting it to a bunch of foreign dudes in a foreign place is simply way too big a leap of faith. Bitcoin does not ask itbs users for this leap of faith. While Bitcoinbs lack of commodity backing is a negative in my mind, I think it might be the key to its growing acceptance by the main stream. This thought hit me while watching an interview on Canadian TV with BitInstantbs chief executive, Charlie Shrem. When explaining why one should have faith in his service, he explains that bYou are trusting the laws of math when it comes to Bitcoinb& your trusting cryptography.b Ibd rather trust gold, but would most people? Is trusting a new computer program more comfortable for the main stream than trusting a group of foreigners engaged in semi-legal activities? I think so. REGULATIONb&SURVIVING THE COMING ATTACK There has been a lot of dramatic Bitcoin news lately. A Bitcoin debit card may soon be a reality which got BitInstant ba lot of attention from a lot of regulators.b The secret service and Mitt Romney are now painfully aware of Bitcoin as Romneybs un-released tax returns are being held hostage for a ransom in Bitcoin. Brace for impact, the regulatory onslaught is coming. But here too Bitcoin has an advantage. How exactly does one attempt to stop Bitcoin? Unlike e-gold or the Liberty dollar, there is no office or vault to raid. There is nothing tangible to confiscate, no one person to go after, no central server to shut down, no main database to erase. Like the internet, its decentralized nature makes it resilient; Bitcoin does to money what email did to communication. Bitcoin is unanticipated and undefined. It exists in a legal grey area. For the most part authorities have refused to address it or even define it. Where does Bitcoin currently stand in relation to US law? Well, where do we start? Ibll just give you the cliff notes, as these issues have already been thoroughly examined in these two academic papers, Nerdy Money: Bitcoin, the Private Digital Currency, and the Case Against its Regulation and Bitcoin: An Innovative Alternative Digital Currency. It is unlikely that regulators will go after Bitcoin users or miners. Bitcoin will likely not be considered a Bank. A contract that specifically requires payment in Bitcoin is legally enforceable. It is not likely that Bitcoin will be attacked in the same fashion as the Liberty Dollar. There is a possibility that Bitcoin could be classified as a Security and be subject to SEC regulations. Bitcoin could be subject to the Stamp Payment Act of 1862 prohibiting btokensb in values less than $1. What will likely happen is that Bitcoin exchanges will be considered to be Money Transmitters and be required to obtain licenses. Bitcoin is already on FinCenbs radar, and their new bPre-paid Accessb rules could be seen as designed specifically to cover DCbs including Bitcoin. FinCenbs director Jim Freis recently said bFinCEN took a comprehensive approach in this area revising its regulations one year ago specifically to cover mobile payments and other innovations.b In fact BitInstant, a US based exchange, has already registered with FinCen as a Money Service Business. Because Bitcoin exists completely outside any banking or legal structure, its weak points are the bridges between BTC and national fiat, the exchanges. And the interaction between the exchanges and regulators is what we should be keeping our eyes on. For the moment it would seem that regulators have yet to interact with the exchanges. In fact, many exchanges are reaching out to regulators as they anxiously await action here. A few of the Bitcoin exchanges responded to my enquires on these topics. Mt.Gox is the largest Bitcon exchange and is incorporated as an IT company in Japan bBitcoin is an entirely novel concept and, as far as we know, has not yet been defined as a currency by any countries including the USAb& our lawyer contacted the Japanese FSA and asked them to define if Bitcoin is a type of currency and what license, if any, should be required. So far, the Japanese FSA has no answers to these questions as we wait for them to contact us back with the appropriate answers and guidelines.b Another exchange is Bitstamp, currently based in Slovenia. bthe US is not our primary market. b& We are, along with our partners, investigating licensing in US. Our partner already has money transmitting license for several Statesb& As goes for Slovenia, we did try contacting government agencybs to get details on regulations and licencing but did not get any response from them. We are following regulations to prevent money laundering and financing terrorism.b Will the exchanges be required to obtain licenses and implement bKnow Your Customerb rules effectively eliminating Bitcoinbs anonymity? Will Bitcoin be taxed and regulated like gold requiring disclosure and capital gains tax? Time will tell. But until (and if), quantum computing becomes a reality and encryption is rendered useless, off the books transactions in Bitcoin will continue to be a viable option. The decentralized nature of cryptocurrencies make them flexible and difficult to regulate. But what is most important about Bitcoin, is its ability to get people to think about money differently. It has the ability to draw the average Joe into the world of alternative currencies. And as such, any enemy of fiat should be a friend of Bitcoin. From eugen at leitl.org Mon Sep 10 08:37:21 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 10 Sep 2012 17:37:21 +0200 Subject: [ZS] Re: Quantified Prestige Message-ID: <20120910153721.GG9750@leitl.org> ----- Forwarded message from Josh Palmer ----- From marlowe at antagonism.org Mon Sep 10 16:06:02 2012 From: marlowe at antagonism.org (Patrick R McDonald) Date: Mon, 10 Sep 2012 18:06:02 -0500 Subject: [tahoe-lafs-weekly-news] TWN 38 Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ========================================================== Tahoe-LAFS Weekly News, issue number 38, September 10 2012 ========================================================== Welcome to the Tahoe-LAFS Weekly News (TWN). Tahoe-LAFS_ is a secure, distributed storage system. `View TWN on the web`_ *or* `subscribe to TWN`_. If you would like to view the "new and improved" TWN, complete with pictures; please take a `look`_. .. _Tahoe-LAFS: https://tahoe-lafs.org .. _View TWN on the web: https://tahoe-lafs.org/trac/tahoe-lafs/wiki/TahoeLAFSWeeklyNews .. _subscribe to TWN: https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-lafs-weekly-news .. _look: https://tahoe-lafs.org/~marlowe/TWN38.html Announcement and News ===================== Tahoe-LAFS Turning Six - ---------------------- On Oct 22, 2012, Tahoe-LAFS will turn six (6) years old. Zooko |zooko| is looking to host a celebratory party in Boulder, CO and there is talk of a party at `Noisebridge`_ for those in the San Francisco area. I will be doing something in the Kansas City, MO area for those who are interested. How do you think we should celebrate? .. _`Noisebridge`: https://www.noisebridge.net/ Cryptoparty - ----------- `Cryptoparty`_ has sprung up as a grass roots movement to bring cryptography to the people. Topics covered range from Tor to GPG to OTR. However, one topic which I haven't noticed at any of the parties was mention of Tahoe-LAFS. This prevents a great opportunity for us to introduce Tahoe-LAFS to the uninitiated. I am willing to help cover Tahoe at the Kansas City cryptoparty. Anyone else with me? .. _`Cryptoparty`: http://www.cryptoparty.org/wiki/CryptoParty Glowing Quotes ============== bTahoe-LAFS is an amazing piece of work!b b PC%l Ruud Tahoe-LAFS on Twitter ===================== Tahoe-LAFS mentioned in the keynote at the world's foremost crypto conference! bThe End of CryptobbJonathan Zittrain https://bit.ly/ShkJ14 [`0`_] #privacy #crypto MT @zooko Tahoe-LAFS appears as one point of light in an otherwise grim big picture. http://bit.ly/ShkJ14 [`1`_] @msimoni Tahoe-lafs goes at storage and its management indirectly; securing data is where it excels. [`2`_] Tahoe-LAFS = great example of FOSS community building :) RT @zooko: Notes from the Tahoe-LAFS Weekly Conference Call: https://tahoe-lafs.org/pipermail/tahoe-dev/2012-September/007689.html [`3`_] Man this is awesome stuff Tahoe b The Least-Authority Filesystem https://tahoe-lafs.org/~zooko/lafs.pdf hacks are impressive as well https://tahoe-lafs.org/hacktahoelafs/ [`4`_] Tahoe-LAFS decentralized privacy/security-enhanced data storage for I2P http://killyourtv.i2p.to/tahoe-lafs/install/ [`5`_] .. _`0`: https://twitter.com/zooko/status/243068166035623939 .. _`1`: https://twitter.com/jmcest/status/243069592585502720 .. _`2`: https://twitter.com/dehora/status/243363378356162561 .. _`3`: https://twitter.com/hypatiadotca/status/243785768735232000 .. _`4`: https://twitter.com/wolfeidau/status/244616198283739136 .. _`5`: https://twitter.com/mrkoot/status/244732321167724544 Patches Needing Review of the Week ================================== There are four (4) ticket still needing review for 1.10.0: * `#1539`_: stop putting pkg_resources.require() into .tac files * `#166`_: command line order is problematic * `#937`_: 'tahoe run' doesn't work for an introducer node * `#1159`_: stop using .tac files: make it possible to change appname, Python package-directory name, perhaps other names There are two (2) tickets still needing review of 1.11.0: * `#1265`_: New Visualizer is insufficiently labelled/documented (plus layout problem) * `#1382`_: immutable peer selection refactoring and enhancements .. _`#1735`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1735 .. _`#1777`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1777 .. _`#166`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/166 .. _`#937`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/937 .. _`#1539`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1539 .. _`#1159`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1159 .. _`#1693`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1693 .. _`#1265`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1265 .. _`#1382`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1382 - ---- *The Tahoe-LAFS Weekly News is published once a week by The Tahoe-LAFS* *Software Foundation, President and Treasurer: Peter Secor* |peter| *. Scribes: Patrick "marlowe" McDonald* |marlowe| *, Zooko Wilcox-O'Hearn* *, Editor Emeritus: Zooko.* `View TWN on the web`_ *or* `subscribe to TWN`_ *. Send your news stories to* `marlowe at antagonism.org`_ *b submission deadline: Friday night.* .. _marlowe at antagonism.org: mailto:marlowe at antagonism.org .. |peter| image:: psecor.jpg :height: 35 :alt: peter :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs .. |marlowe| image:: marlowe-x75-bw.jpg :height: 35 :alt: marlowe :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs .. |zooko| image:: zooko.png :height: 35 :alt: zooko :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJQTnJXAAoJEAT4nRyi0ely+N8QAIFgNijXK2P8t4Wc3mmGusFv xtgTROAAHGGnunT4pv7TplUMDog25BN/ysAFQ+v52HWjljCnQDn5vgDvF8+3FZX4 AZ6pKvTm9l/LWaFjV0J4sWYM4qpjOq85qTe160dV4ATGuMVBrxrLMxADkDQNEtDa zK2Tat7144s4xcA/bugRvbn34dyXCt4CxKy1KPx+NgL1bhLoru/uws4H08Mtvepz Mc0cq6nVQHzK9sRHtqiPgB/ylX89oqcuJwT1NilAUkLmIuLULRWD+cORCUALpYw/ FfEHFo8O1uT4rSeTy1XIjyMlgy6sxL4HGRl2qFDqPEj14LYs45gjL8rEf8EhbmUB gKQqn1GsKfYFlOpwSg55qxnlFsubIrPabSlmQczCWUZiSDeJyHjgt76FNKCiaZUs sN+eG149zJ440ej7FLUI0QiLMFk4q3//hvZWgB4JOVhDrxPJzgCEdUxbHDczvLko eN9qQon3XsIFkb4huqZ8ufTSUJh68f5VJKuoXrIDbm+z9DUYZ0mc3dBacaRxTxJf 6EVOiZHpG9GgeegbA+8JBlpCc4vbgOmuxOsj+gylkLm1coDoi658rlWGxgVBzMy0 roel0amvtqfvqdsFZ8xK1q4wk4Y3DTx5+T4cTiR70Fwiuu7p9odKV20EaC06NGE2 YKi0Kxz1ZFV0mi2uebEd =LYdb -----END PGP SIGNATURE----- _______________________________________________ tahoe-lafs-weekly-news mailing list tahoe-lafs-weekly-news at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-lafs-weekly-news ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From horsemenzq95 at reefindustries.com Mon Sep 10 04:07:32 2012 From: horsemenzq95 at reefindustries.com (=?koi8-r?B?IuUt7cHSy8XUyc7HIg==?=) Date: Mon, 10 Sep 2012 18:07:32 +0700 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAg0tXCzMXKICvIz9PUyc7HIM7BIM3F?= =?koi8-r?B?09HDINcg8O/k4fLv6w==?= Message-ID: <12D73FC892334C6A8879AF7D29DE51C6@OFFICE4> 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК (для указания вашего сайта в письме) - По вашему графику - Без ограничений по срокам - Возможно менять макеты все 8 раз !!! - Подготовка макетов бесплатно АКЦИИ: Месяц 44(46) рассылок - 2 раза в день - 5 раз в неделю - 20 000 рублей Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,7 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1456 bytes Desc: not available URL: From ryan.gallagher at hotmail.com Mon Sep 10 12:17:37 2012 From: ryan.gallagher at hotmail.com (Ryan Gallagher) Date: Mon, 10 Sep 2012 20:17:37 +0100 Subject: [liberationtech] FinFisher is now controlled by UK export controls Message-ID: Export controls on cryptographic items is not a new development in the UK or anywhere else - https://www.gov.uk/specialist/export-of-cryptographic-items The question in the case of FinSpy was whether it was to be classed as a Dual Use item. The UK government appears to now be recognising that FinSpy is indeed a Dual Use item and falls under Annex I of EC export regulations. Annex I is designed to control exports of goods (cryptographic or otherwise) "designed or modified for military use." So what the UK government is implicitly recognising here is that FinSpy can be used as a military tool -- a bit like a weapon -- and should be subject to the same controls. If they implement this, it will mean Gamma will have to make an application for every sale it wants to make outside of the EU, and this will have to be assessed with the Dual Use criteria in mind. So any export will have to be considered in terms of "the respect of human rights and fundamental freedoms in the country of final destination." If the UK government suspects it could be used for internal repression in the country of final destination, for example, they will (theoretically at least) refuse the export. In short, this is progress. Good work Eric. Ryan > Date: Mon, 10 Sep 2012 18:39:51 +0000 > From: jacob at appelbaum.net > To: liberationtech at lists.stanford.edu > CC: eric at privacy.org > Subject: Re: [liberationtech] FinFisher is now controlled by UK export controls > > Eric King: > > Hi all, > > > > I thought this list would be interested to know that the British Government has decided to place FinFisher under UK export controls. There are a ton of questions that remain to be answered, and it's only part of the bigger goal to control the export of surveillance technology, but it's a good first step! > > > >> In a letter sent earlier in August to Privacy International's lawyers Bhatt Murphy, a representative of the Treasury Solicitor stated: > >> > >> The Secretary of State, having carried out an assessment of the FinSpy system to which your letter specifically refers, has advised Gamma International that the system does require a licence to export to all destinations outside the EU under Category 5, Part 2 (bInformation Securityb) of Annex I to the Dual-Use Regulation. This is because it is designed to use controlled cryptography and therefore falls within the scope of Annex I to the Dual-Use Regulation. The Secretary of State also understands that other products in the Finfisher portfolio could be controlled for export in the same way." > >> > >> Press release is here: > >> https://www.privacyinternational.org/press-releases/british-government-admits -it-has-already-started-controlling-exports-of-gamma > >> > >> Full copy of the letter: https://www.privacyinternational.org/sites/privacyinternational.org/files/dow nloads/press-releases/2012_08_08_response_from_tsol.pdf > > Best, > > > > Eric > > This is absolutely fucking horrible. They're controlling it based on > *cryptography* after we WON the cryptowars? What. The. Fuck. And even > worse, they must require a license? And they don't state categorically > that they'll deny it on some kind of humanitarian or anti-crime related > basis? > > I mean, I am sure this is the result of a lot of hard work by many > people and I don't mean to imply any disrespect. Did this just undercut > the work from the 90s? Wany people explicitly fought hard to win the > decision of having our free speech rights apply to the net for code as > speech. > > Argh, > Jake > > -- > Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From coherentp at rodneyred.com Mon Sep 10 21:43:25 2012 From: coherentp at rodneyred.com (=?koi8-r?B?Iu3PzsnUz9LJzscg1NLBztPQz9LUwSI=?=) Date: Mon, 10 Sep 2012 20:43:25 -0800 Subject: =?koi8-r?B?7c/OydTP0snOxyDU0sHO09DP0tTBIMLF2iDQz9PSxcTOycvP1y4=?= Message-ID: <9FCE8FA649654DC08A3F15A994D7CFBB@mookda> Проффесиональный мониторинг транспорта. www.мониторинг-транспорта-тут.рф From DObrien at cpj.org Mon Sep 10 14:39:44 2012 From: DObrien at cpj.org (Danny O'Brien) Date: Mon, 10 Sep 2012 21:39:44 +0000 Subject: [liberationtech] FinFisher is now controlled by UK export controls Message-ID: Just to add to this: It's surprising just how much of the old cryptowar language is still hanging around ready to trip someone up. The US government is still unwilling to grant blanket exemptions for classes of crypto-using products, so the only way you can know whether you're violating the broad language of the law is to ask very specifically for an export license. And if you ask, they may say no. This was the issue with much of the United States "Axis of Evil" (Sudan/Syria/Iran/N. Korea) sanctions too -- Mozilla had to tread very carefully in order to get a permitted exception before the recent sanctions rewrite. That rewrite contains no pre-emptive exemptions (you still have to apply) and other companies still play far too safe WRT offering downloads to these countries rather than risk asking permission and being turned down. As Eric says, the UK is part of Wassenaar, which means public domain and personal use crypto is okay to export, but various "strongish" crypto requires a license, at least in theory: http://rechten.uvt.nl/koops/cryptolaw/cls2.htm#Wassenaar To broaden Wassenaar to include surveillance tech by extending it with regard to specific categories of use is one approach to attempt to dissuade local companies from selling mass surveillance tools to repressive regimes. I know that PI has been thinking and working on this for a very long time, and is not unaware of the problems of creating well-meaning restrictions that can be applied overbroadly. Another legislative approach is to prohibit the distribution of certain tools with certain capabilities to certain target groups (prohibit sales to law enforcement (or all but certain types of law enforcement), government actors, blacklist countries). I think the real challenge with either strategy is not re-animating the crypto wars, but preventing a well-meaning effort to control the spread of tools of mass surveillance becoming an excuse to, in some countries, investigate or criminalize infosec tool creators and distributors, and in others to create parallel, extrapolated laws that go after local dissidents who undermine the local public health and morals of the Net through their use or possession of dangerous Internet tools -- ie using the language controlling surveillance tools to also cover circumvention or secure communication tools. You could already go after distributors of such well-regarded tools for domestic crypto violations in a disturbingly large set of countries, though I've not seen anyone do that (partly I think because the commercial sector's use of crypto is similarly unenforced in most countries, but mostly because the prosecutors who go after dissident reporters and technologists aren't particularly au fait with their own crypto law). We all need to tread very carefully here. Legislators can be taught to see the problem as being rogue states conducting mass surveillance, but closer to home they will tend to see it as individual criminals using spyware. It makes sense if you are thinking about limiting the behaviour of foreign governments to concentrate limiting the local incentives to manufacture and export those tools; you can't, after all, effectively outlaw the practice of those foreign governments. But viewing this simplistically as controlling the tool over controlling the action is a problematic practice if we accept code is speech. The connection with the crypto-wars is the belief that we should aim to criminalize bad behavior, not struggle futilely to outlaw the ownership and distribution of particular programs that can be used in pursuit of that behavior. d. ________________________________________ From: liberationtech-bounces at lists.stanford.edu [liberationtech-bounces at lists.stanford.edu] on behalf of Eric King [eric at privacy.org] Sent: Monday, September 10, 2012 16:21 To: Jacob Appelbaum Cc: liberationtech Subject: Re: [liberationtech] FinFisher is now controlled by UK export controls Hi all, Apologies, I should have taken longer to explain what we this all means. To get the obvious bit out of the way: PI spent the first decade of it's existence fighting the crypto wars and is against government control of cryptography. While the governments decision is not the outcome we wanted, as a temporary measure, we welcome what the British government is trying to do. So to clarify some points: No new cryptography controls have been put in place. The British government, in seemly trying to do the right thing for once, has used the only power it had to control FinFisher immediately. It's reinterpreted the remnants of the old cryptography controls that were never fully removed and has applied them to FinFisher. We don't feel the success of the crypto wars has been undone in this action. This is by no means a permanent solution and have said so clearly to the British government. As a method of controlling FinFisher it's stupid and has the potential to be easily circumvented. We're calling for export controls on surveillance technology because of what it is, not because it happens to use cryptography. However this a hell of a lot of grit that has just been thrown into Gamma's machinery. They will have to re-configure chunks of FinFisher if they want to try evade the controls, and even then the control will very likely remain effective. From this point on it, what this decision means is a little unclear but the likely scenario is that right now Gamma is being investigated for records of every location they have shipped FinFisher to. Updates and technical support should have stopped until licences are granted and while the British government won't stop exports to all the same countries PI might want it to - it will be a significant chunk. These licences will then be published and we'll have some indication as where else FinFisher will be operating. However there are a hell of a lot of unanswered questions and we've written to the government asking for urgent clarification on the below points: b" When and in what circumstances was the assessment of the FinSpy system carried out, the conclusion reached and the advice given that a licence to export was required? b" Had Gamma International previously sought advice from your client as to whether the FinSpy system required export control, when was this and what was the advice given? b" What audit had been carried out of the export of the FinSpy system to countries outside the EU prior to the advice referred to? b" What enforcement action is/will be taken against Gamma International for previous exports of the FinSpy system without a licence? b" Has Gamma International been required to retrospectively apply for licences for previous exports of the FinSpy system? If not, why not? b" Has Gamma International sought any licences to export the FinSpy system and/or provide technical assistance, and, if so, to which countries and which licences have been granted and which refused? b" Notwithstanding the generality of question 6 above, material in the public domain suggests that the FinSpy system has been used in Egypt, Turkmenistan, Bahrain, Dubai, Ethiopia, Indonesia, Mongolia and Qatar. Has Gamma sought any licences for exports of FinSpy or the provision of technical assistance to any of these countries? If so, which ones and were licences granted or refused? b" Kindly provide a detailed explanation and supporting documentation of precisely which components of FinSpy are controlled? The end goal is a subsection of the Wassenaar technical annex list to be entitled "Surveillance", and control FinFisher directly within it, not because it just happens to use cryptography. In the mean time, this doesn't appear to do any damage elsewhere, but does causes a whole lot of problems for Gamma. There's more to be said, but as this is part of an ongoing legal action, there are some things that have to remain confidential for the moment. For those who have met me, you'll know I'm terrified of my work in this area doing more harm than good, so I encourage people to call me out on anything you think I've missed or doesn't make sense. In the mean time I hope the above will help dispel some of the concerns, but please ask if things are unclear, either on or off list. Best, Eric -- Eric King Head of Research, Privacy International +44 (0) 7986860013 | skype:blinking81 | @e3i5 On 10 Sep 2012, at 19:39, Jacob Appelbaum wrote: > Eric King: >> Hi all, >> >> I thought this list would be interested to know that the British Government has decided to place FinFisher under UK export controls. There are a ton of questions that remain to be answered, and it's only part of the bigger goal to control the export of surveillance technology, but it's a good first step! >> >>> In a letter sent earlier in August to Privacy International's lawyers Bhatt Murphy, a representative of the Treasury Solicitor stated: >>> >>> The Secretary of State, having carried out an assessment of the FinSpy system to which your letter specifically refers, has advised Gamma International that the system does require a licence to export to all destinations outside the EU under Category 5, Part 2 (bInformation Securityb) of Annex I to the Dual-Use Regulation. This is because it is designed to use controlled cryptography and therefore falls within the scope of Annex I to the Dual-Use Regulation. The Secretary of State also understands that other products in the Finfisher portfolio could be controlled for export in the same way." >>> >>> Press release is here: >>> https://www.privacyinternational.org/press-releases/british-government-admits -it-has-already-started-controlling-exports-of-gamma >>> >>> Full copy of the letter: https://www.privacyinternational.org/sites/privacyinternational.org/files/dow nloads/press-releases/2012_08_08_response_from_tsol.pdf >> Best, >> >> Eric > > This is absolutely fucking horrible. They're controlling it based on > *cryptography* after we WON the cryptowars? What. The. Fuck. And even > worse, they must require a license? And they don't state categorically > that they'll deny it on some kind of humanitarian or anti-crime related > basis? > > I mean, I am sure this is the result of a lot of hard work by many > people and I don't mean to imply any disrespect. Did this just undercut > the work from the 90s? Wany people explicitly fought hard to win the > decision of having our free speech rights apply to the net for code as > speech. > > Argh, > Jake -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From currentlyymb1 at rdnav.com Tue Sep 11 01:12:32 2012 From: currentlyymb1 at rdnav.com (=?koi8-r?B?IvTSxc7Jzsci?=) Date: Tue, 11 Sep 2012 00:12:32 -0800 Subject: =?koi8-r?B?9NLFzsnOxyDp08vV09PU188gz9LB1M/S09TXwSEg68HLINPLwdrB1Ngg?= =?koi8-r?B?y9LB08nXzywg1c3Ozywg1c3F09TOzz8=?= Message-ID: <905034666.70041009116748@rdnav.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 31073 bytes Desc: not available URL: From hungered7 at ripcurl-europe.com Tue Sep 11 02:24:53 2012 From: hungered7 at ripcurl-europe.com (=?koi8-r?B?IvTp8O/n8uHm6fEi?=) Date: Tue, 11 Sep 2012 01:24:53 -0800 Subject: =?koi8-r?B?7uUg5O/y7+fh8SDvxtPF1M7B0SDw5f7h9PggKDQ5NSkgNTAwLTk4LTkz?= Message-ID: ТИПОГРАФИЯ ПРЕДЛАГАЕТ НЕ ДОРОГАЯ Офсетная ПЕЧАТЬ - Быстро, Качественно и в Максимально короткий срок. ЖУРНАЛЫ, КАТАЛОГИ, БРОШЮРЫ, БУКЛЕТЫ, ЛИСТОВКИ ФЛАЕРЫ, ПАПКИ, КАЛЕНДАРИ КВАРТАЛЬНЫЕ, КАРМАННЫЕ и ДОМИКИ, ПОСТЕРЫ, ПЛАКАТЫ и АФИШЫ, ФИРМЕННЫЕ КОНВЕРТЫ, ПАКЕТЫ, ПЛАСТИКОВЫЕ КАРТЫ, ВИЗИТКИ на ДИЗАЙНЕРСКИХ БУМАГАХ, БАНЕРЫ, ШТЕНДЕРЫ и т. д. тел.: (495) 500-98-93 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2964 bytes Desc: not available URL: From grarpamp at gmail.com Mon Sep 10 23:11:43 2012 From: grarpamp at gmail.com (grarpamp) Date: Tue, 11 Sep 2012 02:11:43 -0400 Subject: [tor-talk] hidden services and stream isolation (file transfer over Tor HS speedup?) Message-ID: > I think you aren't considering how much cpu load is added by > opening a new circuit ... > This latency you will experience is exactly the sort of thing > that will get worse if people start overloading the network with > extra circuits. As with the current count of onions, it's not intentional harm, just people wanting to do things. Bitcoin is bringing a big growth in onion sites (litle impact itself). But the new bitcoin version can interop with clearnet and onions natively. If I remember from my last test, bitcoin rotates its traffic through a sizable address pool. Multiply that by the userbase and it could be similar to torrenting. There might be utility in allowing different circuit expiry parameter settings for different socksports... perhaps keeping a large state table for some would reduce load. Related at a distance is that I think the Phantom project mentioned they will not hesitate to use disk to support the network protocol. > While I'm at it, there *are* several steps that would lead to > significantly improving hidden service performance: > https://trac.torproject.org/projects/tor/ticket/1944 > plus the various performance and security fixes in the 'Tor hidden > service' category. I want to get around to make some nice HS metrics along that ticket, but I don't want to give early hopes. > I know it can be tempting to treat the Tor design and code as a > black box and try to hack around it, but I think in this case the > clear right thing to do is to make the code not suck so much. Yes this is nicer. _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From imputedl7 at replies.iwon.com Tue Sep 11 03:31:24 2012 From: imputedl7 at replies.iwon.com (=?koi8-r?B?IvfFwsnOwdIi?=) Date: Tue, 11 Sep 2012 02:31:24 -0800 Subject: =?koi8-r?B?9NLVxM/X2cUg18/Q0s/T2SDXIMLJ2s7F08U=?= Message-ID: <33141E53E8944BD297E88719C722749B@admin22bb6c8dd> Трудовые вопросы в бизнесе" подробности тут www.вебинар-2012.рф From metahorse at gmail.com Tue Sep 11 03:36:23 2012 From: metahorse at gmail.com (Michael Hrenka) Date: Tue, 11 Sep 2012 03:36:23 -0700 (PDT) Subject: [ZS] Quantified Prestige Message-ID: On Monday, 10 September 2012 20:14:18 UTC+2, Mark Nuzzolilo wrote: > > On Sun, Sep 9, 2012 at 12:34 PM, Michael Hrenka > > wrote: > > I just finished the updated version of the documentation of my > > reputation/money system with the updated name Quantified Prestige > (formerly: > > Prestige Fluido). > > This is very good stuff, but it must be handled with care. Similar to > what I was working on last year. I'm obligated to ask a few tough > questions. > > 1) This prestige score appears to be linear. Any thoughts on having a > two-dimensional score, score as a function of context? > No, how should that work? Context isn't even 1-dimensional, but much more complicated. If you really want different contexts, then use a different Quantified Prestige Network for each context. Finally, I want to create a service that makes it very easy to set one up. Like what Wordpress did with blogs. You can get one on wordpress.com, or you can download the software from wordpress.org and host one on your own. > > 2) How do points get taken away? In my system, a negative vote from a > person would equal the inverse of about six positive votes from that > same person, *but* a reason would always have to be given for the > negative vote, and those reasons could themselves be voted on, thereby > lowering the vote's weight if it did in itself receive negative votes. > This heavily gives incentive to quality over quantity, and helps > ensure that the scores are themselves indicative of the quality of an > individual's contributions. > User can take Esteem Points they allocated to others away at any time without having to give a reason. Think about it like an unrestricted 100% money back guarantee. Of course, you can give a reason for giving and taking back EPs to give clear information, but that's option. I don't think it's a good idea to force people to rationalize their decisions. I had thought a long time about including negative scores in my system, but I decided against it, because it's hardly possible to prevent any serious abuse of such a system. I'm a proponent of positive reinforcement. Your system sounds interesting. Is there any incentive to vote on the votes of others, or even to have a look at them? Most people probably won't bother with meta-voting, unless they see it as some kind of game or hobby. Unless they are so fed up with systems that don't allow meta-voting that they see it as obligation to meta-vote where it's possible. But then such a system would become like Reddit on steroids. Anyway, if you have good ideas for modifying Quantified Prestige to a kind of "Qualified Prestige", you are free to develop that alternative concept. > > 3) Do two relatively equal political opponents have a widely different > amount of prestige points based on their popularity? How do you deal > with bias? > It's a bit much to expect tools to fix psychological problems. Every voting system is prone to biases. Is there any way that is proven to reduce the level of bias in such systems? > > 4) There are many different pieces to this system, including Esteem > Matrix, re-allocation, user circles, etc. Are each of these an > absolute necessary component to the system and have you completely > worked out why they are necessary? I would strongly suggest including > the "why" in the paper, and if you can't come up with a reason, > *consider* dropping the mechanic from the system. > Reallocation is necessary because otherwise a system with a fixed quota of points would stop working once all your points are used up. There is a fixed quota in order to prevent Prestige inflation. It might be possible to use a monthly quota instead and to weight points with how recently they were allocated. I haven't given such a system a lot of thought. Need to think about that option. Many parts of the system are just for convenience or security. They are optional in that sense. The core of the system is Esteem Point allocation (-> Esteem Matrix) that determines a Prestige Score for each user (-> Prestige Vector). Strictly speaking the Spread Factor isn't necessary, but it provides a strong incentive to give out points generously to many different users - and to get a meaningful representation of relative prestige. I really tried to make my system as simple as possible and as complex as necessary to avoid (almost) obvious failure modes of the system - and to make the system comfortable for the users, because otherwise it won't become popular. And a reputation/money system that's not popular isn't very useful. > > 5) Will ordinary users with low prestige find it easy or difficult to > "get in at the ground floor" and be able to use this system to help > build their prestige? Or will these methods only be more accessible > to people who already have large networks of people? > Having large networks of people may be useful, but their usefulness is limited if the Esteem Trust system is used, because it makes Esteem from an independent individual much more valuable than Esteem from a cluster of people that all know each other. The system should work fine if new uses do anything cool or useful that catches some attention by many users. It's supposed to encourage creating and doing publicly useful stuff. > > > This is really great. Just be careful because widespread adoption of > systems like this can easily have negative effects in addition to > positive effects. You want to reward people for "doing the right > thing" and not necessarily for doing what is popular. > In principle, I totally agree with you here. But how do you make a clear distinction between what's right and what's popular? Who is supposed to judge that? I mean, that's exactly the problem of democracy: It can't distinguish between good (and popular) parties and bad, but popular parties. However we haven't found a system yet that works better than democracy when nobody has the clear authority to judge what's good and what's bad. Anyway, thanks for the great feedback! It's really helpful! :) -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From milena at promzone.ru Mon Sep 10 16:34:34 2012 From: milena at promzone.ru (=?koi8-r?B?79DUyc3J2sHDydEgzsHMz8fP1w==?=) Date: Tue, 11 Sep 2012 07:34:34 +0800 Subject: =?koi8-r?B?89TSwdTFx8nRINrB1NLB1CDEzNEg1c3Fztjbxc7J0SDOwczPx8/XLg==?= Message-ID: 21 сентября Затратные схемы для оптимизации налогов (НДС, Налог на прибыль) 8 (499) ЧЧ5-4О\95 **** \Моск. код/ 742/9198 Цель: Курс посвящен изучению затратных механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Рассмотрено новое законодательство по контролю за ценами, его влияние на схемы с использованием затратных инструментов. Участники получат краткие индивидуальные консультации по тематике курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные", "серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов – ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием; * зарубежные оффшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций; * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС. * Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы; * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере; * платежи за использование объектов основных средств и нематериальных активов, в т.ч. франчайзинговые; * штрафные санкции, возмещение убытков, включая демередж и прочий простой; * платежи за увеличенный срок и/или объем гарантийных обязательств; * плата за залог или поручительство, делькредере. 4. Виды приемлемых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. 5. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 6. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен, уход от контроля за ценой сделок по новым правилам трансфертного ценообразования. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 7. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 8. Ответы на вопросы. По желанию и при наличии возможности – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц. Стоимость участия: 9 000 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 (495)- 7Ч291-98 или 8 Моск. код: 79221_22 From eugen at leitl.org Mon Sep 10 23:16:52 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 11 Sep 2012 08:16:52 +0200 Subject: [liberationtech] FinFisher is now controlled by UK export?controls Message-ID: <20120911061652.GM9750@leitl.org> ----- Forwarded message from Danny O'Brien ----- From eugen at leitl.org Mon Sep 10 23:17:05 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 11 Sep 2012 08:17:05 +0200 Subject: [liberationtech] FinFisher is now controlled by UK export controls Message-ID: <20120911061705.GN9750@leitl.org> ----- Forwarded message from Ryan Gallagher ----- From eugen at leitl.org Mon Sep 10 23:17:49 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 11 Sep 2012 08:17:49 +0200 Subject: [tahoe-lafs-weekly-news] TWN 38 Message-ID: <20120911061749.GO9750@leitl.org> ----- Forwarded message from Patrick R McDonald ----- From grammep6 at raulmategalan.com Mon Sep 10 22:47:14 2012 From: grammep6 at raulmategalan.com (=?koi8-r?B?IvPU0s/K8NLPx9LF09PzxdLXydPTIg==?=) Date: Tue, 11 Sep 2012 09:47:14 +0400 Subject: =?koi8-r?B?8sXNz87UIM/GydPP1yDJIOvPzdDMxcvTztnKIMkg3sHT1MneztnKINLF?= =?koi8-r?B?zc/O1CDL18HS1MnS?= Message-ID: <0EFFB3DA188E40C09A42D669C5ED15EC@in> Ремонт офисов под ключ и частично! Низкие цены!   Бесплатный выезд замерщика! Составление сметы бесплатно! Цена от 1700 р. м2 с материалами! Гарантия на выполненные работы до 3-х лет! Ремонт любой сложности и в срок! Комплексный и частичный ремонт квартир! Низкие цены! Выезд замерщика и смета бесплатно! Ремонт квартир от 4500 руб/м. ! Дизайн проект 1000 руб/м. ! Составление договора! Составление сметы бесплатно! Качество, сроки, гарантия ! ООО "РПО "СтройПрогрессСервисс" Тел. (495) 782-69-46 www.ремонт-тут.рф From eugen at leitl.org Tue Sep 11 01:34:00 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 11 Sep 2012 10:34:00 +0200 Subject: [tor-talk] hidden services and stream isolation (file transfer over Tor HS speedup?) Message-ID: <20120911083400.GQ9750@leitl.org> ----- Forwarded message from grarpamp ----- From zooko at zooko.com Tue Sep 11 09:59:55 2012 From: zooko at zooko.com (Zooko Wilcox-O'Hearn) Date: Tue, 11 Sep 2012 10:59:55 -0600 Subject: [tahoe-dev] notes from the Tahoe-LAFS Weekly Dev Call, 2012-09-11 Message-ID: Folks: As usual, I'm not taking the time to contextualize and vet all these notes. Caveat lector! Also, I've maintained my tradition of adding some of my own thoughts that weren't actually expressed out loud in the discussion. (In particular the advocacy for adding padding and the ideas about how to do so.) in attendance: Brian, David-Sarah, Andrew, Zooko (scribe) b" topic: The compression attack on HTTPS. (Not really relevant to Tahoe-LAFS, but interesting.) Brian says one possible defense against this is to move your secrets from cookies to the URL. This makes the attack impossible unless your secrets are sharing a compression context with the attack. Does anyone actually use TLS compression? Is it turned off by default? Does anyone configure it on? A similar attack is possible on HTTP encryption, if the higher-layer protocol includes attacker-controlled data in the payload. This would be relevant to Tahoe-LAFS if we added compression. However, even if we added compression, we would never mix attacker-controlled data with attacker-unknown data in the same file. However, a higher-layer protocol might mix them. One caveat: convergent encryption could allow compression between attacker-controlled and attacker-unknown data! In fact, there is a deep connection between the adaptive-chosen-plaintext-compression- violates-confidentiality ("CRIME") attack and the drewp "learn the remaining information" attack! The drewp defense -- the Added Convergence Secret -- is exactly the thing that creates independent compression contexts in order to limit the scope for attack. Zooko and (perhaps to a lesser degree) Brian are uncomfortable with the fact that LAFS currently exposes the length of your plaintext, to the byte level of precision. Zooko wants to add padding. That would probably help against the convergent-encryption-based CRIME attack which currently exists in hazy nascent form in Zooko's mind. Also, it enhances general privacy, for example an attacker might be able to recognize what files you are storing and reading just from the lengths of the files. Padding could help against that. Padding out to fixed boundary (e.g. to the next 16 bytes, or to the next 4096 bytes, or whatever) helps but the information can still leak if there are a number of files. For example, suppose you're browsing or downloading a directory containing hundreds of files of varying lengths. The attacker knows the lengths of some files that he suspects you might be browsing. Even if the ciphertext is padded out to fixed sizes, thus "coarsening" or discretizing the information, he might still be able to recognize the pattern. A better defense is to add a random amount of padding, where the random amount is determined by the (possibly convergently generated) encryption key. b" topic: engineering tools and practices We talked about usage of git. David-Sarah likes git-gui. Andrew asked if he should rebase patches when submitting pull requests and Brian said yes. Brian said always first rebase -- bring everything up to trunk -- and then rerecord it as a set of logical commits. It is not necessary to squash it all down into a single commit, unless that's what makes sense. Definitely squash out ephemeral stuff like "Oops, made a typo, oops test didn't pass, let me go back and fix that.". It often makes sense to make four patches: First refactor the code so that there is no actual functional changes, second cosmetic changes like whitespace, third update the unit tests, fourth the new code. Ideally, the revision history tells a story. b" topic: When do we kill off darcs? David-Sarah still has some patches that need to be darcs pushed. But they could diff-and-patch those to git. At some point soon we'll all agree to stop pushing patches into darcs. LeastAuthority.com's Cloud Backend is currently in darcs. We are scheduled to merge the cloud backend to trunk within three weeks. There is still the question of how to handle hyperlinks into https://tahoe-lafs.org that point at darcs patches and history. b" topic: Will Cloud Backend, leasedb, and accounting go into Tahoe-LAFS v1.11? _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Sep 11 03:45:56 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 11 Sep 2012 12:45:56 +0200 Subject: [ZS] Quantified Prestige Message-ID: <20120911104555.GW9750@leitl.org> ----- Forwarded message from Michael Hrenka ----- From brownd10 at lingvanet.ru Mon Sep 10 22:40:48 2012 From: brownd10 at lingvanet.ru (=?koi8-r?B?4snazsXTIPDMwc4=?=) Date: Tue, 11 Sep 2012 13:40:48 +0800 Subject: =?koi8-r?B?79PPwsXOzs/T1Mkg0sHT3sXUwSDOxdPUwc7EwdLUztnIINDSz8XL1M/X?= =?koi8-r?B?Lg==?= Message-ID: <553BAC4F852543A6A2B25B121B18855B@stadd1> Тема: Как правильно разработать Бизнес план, ТЭО? – практикум 2 дня в компьютерном классе +7 Ч95 7Ч2*9I\98 <<<>>> +7 499 Ч454/О95 Суть обучения!!! очень проста: Вас приглашают в компьютерный класс, где 2 дня с вами занимаются, супер профессионалы (тяжеловесы в финансовом планировании), все два дня Вы являетесь настоящими участниками практического семинара, получаете знания и для закрепления тем выполняете задания, выполняете их на компьютере оснащенным специализированным программным комплексом. Все пробуете Сами, и только Сами. По Окончании курса Вас оснащают лицензионной, полнорабочей специализированной версией программы, для разработки бизнес планов и инвестиционных проектов, Вы прибываете на предприятие, устанавливает продукт на свой компьютер и начинаете сразу работать (без всякой головной боли) - Вот так! Просто! мы делает профессионалов! Информация об учебном курсе: Дата мероприятия: 24-25 сентября 2012г. Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. Сочетание методов обучения с практикой - позволит достичь максимальных результатов в освоении материала. Все наглядно и просто. На первом этапе излагается теория, на втором рассматриваются закономерности, почему теория не совместима с практикой, на третьем этапе формируется задача и рассматриваются фин. методы ее решения, на четвертом участник самостоятельно решает задачу используя компьютер оснащенный специализированным ПО. Рассмотрение финансовых методов для каждого рода деятельности в отдельности, усиление восприятия информации с помощью специализированного расширенного методического материала. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: * Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. * Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). * Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. * Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него участник семинара может эффективно разрабатывать свои сценарии финансовых проектов. Вся информация по тел: +7 Московский код: 792-21-2\2 <<<>>> +7 Московский код: 742\9I98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4635 bytes Desc: not available URL: From hierarchiesz9 at redlineltd.com Tue Sep 11 01:16:24 2012 From: hierarchiesz9 at redlineltd.com (=?koi8-r?B?IvTp8O/n8uHm6fEi?=) Date: Tue, 11 Sep 2012 13:46:24 +0530 Subject: =?koi8-r?B?7uUg5O/y7+fh8SDvxtPF1M7B0SDw5f7h9PggKDQ5NSkgNTAwLTk4LTkz?= Message-ID: <8A59C648ED5F4CB9A5E816C8232228FF@netlab3a2014ec> ТИПОГРАФИЯ ПРЕДЛАГАЕТ НЕ ДОРОГАЯ Офсетная ПЕЧАТЬ - Быстро, Качественно и в Максимально короткий срок. ЖУРНАЛЫ, КАТАЛОГИ, БРОШЮРЫ, БУКЛЕТЫ, ЛИСТОВКИ ФЛАЕРЫ, ПАПКИ, КАЛЕНДАРИ КВАРТАЛЬНЫЕ, КАРМАННЫЕ и ДОМИКИ, ПОСТЕРЫ, ПЛАКАТЫ и АФИШЫ, ФИРМЕННЫЕ КОНВЕРТЫ, ПАКЕТЫ, ПЛАСТИКОВЫЕ КАРТЫ, ВИЗИТКИ на ДИЗАЙНЕРСКИХ БУМАГАХ, БАНЕРЫ, ШТЕНДЕРЫ и т. д. тел.: (495) 500-98-93 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2964 bytes Desc: not available URL: From ming at uscx.net Tue Sep 11 01:26:41 2012 From: ming at uscx.net (=?koi8-r?B?8snTy8kg0NLJIMTSz8LMxc7JySDCydrOxdPB?=) Date: Tue, 11 Sep 2012 13:56:41 +0530 Subject: =?koi8-r?B?7sHMz8fP19nFINLJ08vJINDSySDE0s/CzMXOyckgwsnazsXTwQ==?= Message-ID: Дробление бизнеса. Правовые проблемы, защита от претензий налоговых органов. +7 499 ЧЧ54\095 \\\/// +7 (код Москвы) 792*2122 Дата проведения занятий: 13 сентября Краткая информация о предстоящем мероприятии: 1. Вывод сотрудников. Аутсорсинг. Способы разделения организации. 2. Разбор действенных "легенд" в обоснование дробления бизнеса (на основе практики, решений судов). 3. Переквалификация аутсорсинга, возмездного оказания услуг в трудовые отношения. Разбор ошибок при оформлении документов. 4. Анализ ошибок допускаемых при аутсорсинге (работа осуществляется без цели извлечения прибыли, является зависимой от головного предприятия и т.п.). 5. Основания завышения стоимости работ, услуг, получаемых от вновь созданного предприятия (почему ранее те же работы выполнялись за 10 рублей, а сейчас за 100?). 6. Разбор способа позволяющего защититься от претензий по трансфертному ценообразованию и признании лиц недобросовестными, а саму схему созданной в целях получения необоснованной налоговой выгоды. 7. Защита от показаний/шантажа сотрудников. 8. Обход пределов применения УСН с использованием договора простого товарищества. Легенды, обосновывающие заключение такого договора. 9. Потеря документов, как способ максимальной защиты от возможных претензий контролирующих органов. 10. Фактическое нахождение юридического лица не по месту регистрации, либо наличие обособленных подразделений по ст. 55 ГК РФ как основание утраты права на применение УСН. 11. Сокрытие афиллированности: использование доверенных лиц, оффшоров, некоммерческих организаций. 12. Передача имущества при дроблении: реорганизация, взнос в уставный капитал, займы и т.п. Судебная практика, выявляющая риски безвозмездной передачи имущества, дарения. 13. Защита активов - правило "четырех углов". 14. Способы контроля доверенных лиц как элемент безопасности активов. 15. Способы управления группой компаний. 16. Презумпция недобросовестности. Проект Постановления ВАС о недобросовестности. 17. Анализ законодательных инициатив, пресекающих оптимизацию налогов. 18. Рассмотрение методичек Минфина (ДСП) о выявлении и предъявлении претензий к компаниям осуществившим дробление своей структуры. Новые требования к выездным проверкам и т.д. Последние выявленые схемы по дроблению бизнеса, разбор сложных случаев. Ответы на индивидуальные вопросы За более подробной информацuей обpащайтеcь по тел: 8 Моск. код: 792_21\2.2 <> (код Москвы) 742/91/98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3203 bytes Desc: not available URL: From warner at lothar.com Tue Sep 11 13:57:03 2012 From: warner at lothar.com (Brian Warner) Date: Tue, 11 Sep 2012 13:57:03 -0700 Subject: [tahoe-dev] notes from the Tahoe-LAFS Weekly Dev Call, 2012-09-11 Message-ID: On 9/11/12 9:59 AM, Zooko Wilcox-O'Hearn wrote: > b" topic: The compression attack on HTTPS. > The drewp defense -- the Added Convergence Secret -- is exactly the > thing that creates independent compression contexts in order to limit > the scope for attack. Nope. Drewp's defense increases the total entropy of the input to the convergence function, but that only helps if you're limited to guessing that input all-at-once. The compression attack lets you guess the secret input incrementally (just like a padding-oracle attack), so the attacker's job is linear, not exponential. Adding 256 bits of unguessable secret merely adds about 256 extra guesses to their workload. The defense is either to prevent the mixing of secret and adaptive attacker-supplied data in the same compression context (i.e. the same file), or to prevent the attacker from measuring the length of the resulting compressed data. > Zooko and (perhaps to a lesser degree) Brian are uncomfortable with > the fact that LAFS currently exposes the length of your plaintext, to > the byte level of precision. Zooko wants to add padding. I'm vaguely uncomfortable with it, but I'm more uncomfortable with some of the alternatives. Exposing the exact byte-length of the plaintext is easy to implement (the alternatives are harder to implement) and easy to explain to users ("we expose the exact byte-length of your plaintext, and if you append N bytes of attacker-supplied data, we'll expose length+N"). Compressing the data first might have value (for large fluffy data, but we think most large data is already mp3/jpg compressed), but is harder to explain: "we'll leak the length of a gzipped form of your data, which exposes some obscured combination of the actual length of your file and the fluffiness of its contents, which will vary in hard-to-predict way if you append attacker-supplied data to it". Padding isn't too hard to explain ("we expose 8*ceil(len/8)"), but the privacy value it provides is dubious: an active attacker can still detect single-byte variations if they can get you to start close to an edge of the block size, and 8 bytes may not be enough to thwart the would-be file-correlator (who's just on the lookout for a file exactly 4834263 bytes long, but knows there aren't any other files close to that length, so the rounded-up 4834264-byte file is probably the same). For larger files, even 4096-byte chunks might not be enough. So the benefit depends upon the block size you pick, versus the distribution of file sizes, meaning we'd have to pick a block size out of a hat, and unjustified ad-hoc constants always make me think we're doing something wrong. (it might end up being a good idea, but it makes me nervous). You could add random padding (in a convergent fashion, e.g. append H(file)%8 bytes of zeros, record the original length in the encrypted data somewhere). But as we've learned from anonymous remailers, random padding merely lowers the signal-to-noise ratio, and only increases the cost of statistical correlation by a linear factor. So you'd have to be clear on what sort of protection you were earning before taking the complexity hit of random padding. cheers, -Brian _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From gfoster at entersection.org Tue Sep 11 12:09:31 2012 From: gfoster at entersection.org (Gregory Foster) Date: Tue, 11 Sep 2012 14:09:31 -0500 Subject: [drone-list] Defense Science Board urges greater autonomy for unmanned systems Message-ID: Wired Danger Room (Sep 11) - "The Pentagon Doesn't Trust Its Own Robots": [1]http://www.wired.com/dangerroom/2012/09/robot-autonomy/ Follow up on the DSB report by Spencer Ackerman [ [2]@attackerman ] featuring commentary by Brookings' Peter W. Singer. At Brookings, Singer currently supervises [3]nonresident fellow Noah Shachtman, the editor of Wired's Danger Room blog. gf On 9/6/12 10:40 AM, Gregory Foster wrote: Secrecy News (Sep 6) - "Greater Autonomy for Unmanned Military Systems Urged" (cited in full) [4]http://www.fas.org/blog/secrecy/2012/09/dsb_autonomy.html The Department of Defense should focus on increasing the autonomy of drones and other unmanned military systems, a new report from the Defense Science Board said. DoD should "more aggressively use autonomy in military missions," the Board report said, because currently "autonomy technology is being underutilized." See [5]"The Role of Autonomy in DoD Systems," Defense Science Board, dated July 2012 and released last week. "Autonomy" in this context does not mean "computers making independent decisions and taking uncontrolled action." The Board is not calling for the immediate development of [6]Skynet at this time. Rather, autonomy refers to the automation of a particular function within programmed limits. "It should be made clear that all autonomous systems are supervised by human operators at some level," the [7]report stressed. Increased autonomy for unmanned military systems "can enable humans to delegate those tasks that are more effectively done by computer... thus freeing humans to focus on more complex decision making." "However, the true value of these systems is not to provide a direct human replacement, but rather to extend and complement human capability by providing potentially unlimited persistent capabilities, reducing human exposure to life threatening tasks, and with proper design, reducing the high cognitive load currently placed on operators/supervisors." But all of that is easier said than done. "Current designs of autonomous systems, and current design methods for increasing autonomy, can create brittle platforms" that are subject to irreversible error. There are also "new failure paths associated with more autonomous platforms, which has been seen in friendly fire fatalities.... This brittleness, which is resident in many current designs, has severely retarded the potential benefits that could be obtained by using advances in autonomy." The Defense Science Board [8]report discusses the institutional challenges confronting a move toward increasing autonomy, including the obstacles posed by proprietary software. It offers an extended discussion of conflict scenarios in which the enemy employs its own autonomous systems against U.S. forces. The authors describe China's "alarming" investment in unmanned systems, and encourage particular attention to the relatively neglected topic of the vulnerability of unmanned systems. The [9]report includes some intriguing citations, such as a volume on [10]"Governing Lethal Behavior in Autonomous Robots," and presents numerous incidental observations of interest. For example: "Big data has evolved as a major problem at the National Geospatial Intelligence Agency (NGA). Over 25 million minutes of full motion video are stored at NGA." But new sensors will produce "exponentially more data" than full motion video, and will overwhelm current analytical capabilities. "Today nineteen analysts are required per UAV orbit [i.e. per 24 hour operational cycle]. With the advent of Gorgon Stare, ARGUS, and other Broad Area Sensors, up to 2,000 analysts will be required per orbit." The government "can't hire enough analysts or buy enough equipment to close these gaps." HT [11]@saftergood, gf -- Gregory Foster || [12]gfoster at entersection.org @gregoryfoster <> [13]http://entersection.com/ References 1. http://www.wired.com/dangerroom/2012/09/robot-autonomy/ 2. http://twitter.com/attackerman 3. http://www.brookings.edu/experts/shachtmann.aspx 4. http://www.fas.org/blog/secrecy/2012/09/dsb_autonomy.html 5. http://www.fas.org/irp/agency/dod/dsb/autonomy.pdf 6. http://en.wikipedia.org/wiki/Skynet_%28Terminator%29 7. http://www.fas.org/irp/agency/dod/dsb/autonomy.pdf 8. http://www.fas.org/irp/agency/dod/dsb/autonomy.pdf 9. http://www.fas.org/irp/agency/dod/dsb/autonomy.pdf 10. http://books.google.com/books?id=rIsJ_QXDdEUC&printsec=frontcover#v=onepage&q&f=false 11. http://twitter.com/saftergood 12. mailto:gfoster at entersection.org 13. http://entersection.com/ _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From 258-2666susan at calparks.org Tue Sep 11 07:55:34 2012 From: 258-2666susan at calparks.org (=?koi8-r?B?IsfMwdfO2cogyc7Wxc7F0iI=?=) Date: Tue, 11 Sep 2012 16:55:34 +0200 Subject: =?koi8-r?B?18XE1d3FzdUgyc7Wxc7F0tUt09TSz8nUxczA?= Message-ID: <01cd903e$42668700$335f604e@258-2666susan> Приглашаем Вас принять участие в образовательном мероприятии 17-18.09.2012 ╚Инженерные сети и линейные объекты как объект имущественных отношений╩ Санкт-Петербург. Темы докладов: - Инженерные сети как объект имущества. Нормативно-правовые вопросы владения и распоряжения инженерными сетями. Виды линейных объектов. - Оформление прав на земельные участки, землеотведение под строительство линейных объектов и сетей - Порядок осуществление кадастровых работ и учета - Новая система нормативных документов в проектировании и строительстве объектов инженерной инфраструктуры и линейных объектов. Подготовка проектной документации - Оформление сделок, связанных с арендой, куплей-продажей, приватизацией инженерных сетей. - Экологические требования в связи с проектированием, строительством и эксплуатацией инженерных объектов. Порядок оформления охранных и санитарно-защитных зон линейных объектов. - Особенности землепользования объектов ЛЭП. - Обзор судебной практики За дополнительной информацией и условиями регистрации обращаться по телефону в СПб:(812) 642 50 91 From hackedy0 at richardsandwest.com Tue Sep 11 03:40:36 2012 From: hackedy0 at richardsandwest.com (=?koi8-r?B?IuHMxcvTwc7E0iI=?=) Date: Tue, 11 Sep 2012 18:40:36 +0800 Subject: =?koi8-r?B?5MXSxdfRzs7B0SDQwczP3svBIMTM0SDNz9LP1sXOz8fP?= Message-ID: <3CCCA0FC8E2C4AF8AEEBA26DDF7ECC45@VHPC0813fiv> Палочка для мороженого, медицинские шпателя и кофейная палочка. Происхождение - Украина. Имеем опыт экспортных отправок. Размеры: 94x10x2, 114x10x2, 94x17⁄11x2, 150x16x2 Тел: +38(0472)544270 Моб: +38(067)4705270 From blur at managerzone.com Tue Sep 11 06:18:35 2012 From: blur at managerzone.com (=?koi8-r?B?IvrFzcXM2M7PxSDawcvPzs/EwdTFzNjT1NfPIg==?=) Date: Tue, 11 Sep 2012 18:48:35 +0530 Subject: =?koi8-r?B?89LP3s7PISDw0sXExczYztnFINrOwd7FzsnRINPF1Mkh?= Message-ID: <01cd904e$0c310380$69f25c3b@blur> Приглашаем Вас принять участие в образовательном мероприятии 17-18.09.2012 ╚Инженерные сети и линейные объекты как объект имущественных отношений╩ Санкт-Петербург. Темы докладов: - Инженерные сети как объект имущества. Нормативно-правовые вопросы владения и распоряжения инженерными сетями. Виды линейных объектов. - Оформление прав на земельные участки, землеотведение под строительство линейных объектов и сетей - Порядок осуществление кадастровых работ и учета - Новая система нормативных документов в проектировании и строительстве объектов инженерной инфраструктуры и линейных объектов. Подготовка проектной документации - Оформление сделок, связанных с арендой, куплей-продажей, приватизацией инженерных сетей. - Экологические требования в связи с проектированием, строительством и эксплуатацией инженерных объектов. Порядок оформления охранных и санитарно-защитных зон линейных объектов. - Особенности землепользования объектов ЛЭП. - Обзор судебной практики За дополнительной информацией и условиями регистрации обращаться по телефону в СПб:(812) 642 50 91 From linebackersh5 at royalboom.com Tue Sep 11 06:34:21 2012 From: linebackersh5 at royalboom.com (=?koi8-r?B?IvfFwsnOwdIi?=) Date: Tue, 11 Sep 2012 19:04:21 +0530 Subject: =?koi8-r?B?787MwcrOINPFzcnOwdIgzyDQ0sHXyczYzs/NIM/Gz9LNzMXOyckg08/U?= =?koi8-r?B?0tXEzsnLz9cg1yDLz83Qwc7J0cgu?= Message-ID: Онлайн семинар о правильном оформлении сотрудников в компаниях. Что будет на семинаре: • Законодательно регулирование трудовых отношений в РФ; • Способы оформления трудовых отношений с работниками; • Практические аспекты оформления работников по гражданско-правовому договору; • Практические аспекты оформления работников по трудовому договору; • Организация оплаты сотрудников; • Рабочие основания увольнения работников; • Полный порядок приема работников; • Полный порядок увольнения работников; • Основные виды «шантажа» работодателей, которые используются работники и способы как этого избежать; • Типичные ошибки при приеме на работу сотрудника; • Типичные ошибки при увольнение сотрудника; • Оформление и выдача трудовой книжки; • Практика разрешения конфликтных ситуаций с сотрудником; • Проверки государственной инспекции труда; • Организация защиты персональных данных в компании; • Практика рассмотрения трудовых споров в суде; Начало 14 сентября в 18:00 Более подробно тут www.вебинар-2012.рф From billd at designsunfolding.com Tue Sep 11 16:28:27 2012 From: billd at designsunfolding.com (=?koi8-r?B?IuXLwdTF0snOwSI=?=) Date: Tue, 11 Sep 2012 20:28:27 -0300 Subject: =?koi8-r?B?4sXazMnNydTO2cogzcXWx8/Sz8QgKyDNz9PLz9fTy8nKIM7PzcXS?= Message-ID: <01cd905b$ffb3a780$e0c330bd@billd> БЕЗЛИМИТНЫЕзвонки по межгородувсего3000 руб. в месяц.Всезоны РФ (фиксированная и мобильная связь) Звоните сегодня:(495) 225-04-62 МНОГОКАНАЛЬНЫЙномер Прямой московский номер 495, 499Абонентская плата ≈ 300руб./месяцБольшой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы нипереехали- Все возможности АТС (голосовоеприветствие, голосовая почта и т.д.) включены в абонентскую плату - Экономия на покупке телефоннойстанции -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2845 bytes Desc: not available URL: From eugen at leitl.org Tue Sep 11 13:05:10 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 11 Sep 2012 22:05:10 +0200 Subject: [tahoe-dev] notes from the Tahoe-LAFS Weekly Dev Call, 2012-09-11 Message-ID: <20120911200510.GB9750@leitl.org> ----- Forwarded message from Zooko Wilcox-O'Hearn ----- From eugen at leitl.org Tue Sep 11 13:11:04 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 11 Sep 2012 22:11:04 +0200 Subject: [drone-list] Defense Science Board urges greater autonomy for unmanned systems Message-ID: <20120911201104.GE9750@leitl.org> ----- Forwarded message from Gregory Foster ----- From billing at adl-zentrale.com Tue Sep 11 18:08:43 2012 From: billing at adl-zentrale.com (=?koi8-r?B?IuvPztPVzNjUwcPJ0TogIunOz9PU0sHOztnFINLBws/UzsnLySIi?=) Date: Wed, 12 Sep 2012 04:08:43 +0300 Subject: =?koi8-r?B?7cnH0sHDyc/O2cog1d7F1CDJzs/T1NLBzs7ZyCDSwcLP1M7Jy8/X?= Message-ID: <01cd909c$4c1ed780$7fe64cb2@billing> В отдел кадров Для руководителя Уважаемые коллеги! Информируем Вас о проведении консультационного мероприятия по теме: > Порядок трудоустройства иностранных граждан. > Обязанности работодателя по миграционному учету. > Новое в сфере миграционного учета иностранных граждан. > 24 сентября, Санкт-Петербург Программа доступна по запросу: (812) 642-04-36 Просим Вас сообщить о своем решении. С уважением, отдел разработки программ консультационных мероприятий Тел.: (812) 642-04-36 From fruitfula73 at rdmpumps.com Wed Sep 12 07:53:53 2012 From: fruitfula73 at rdmpumps.com (=?koi8-r?B?IvTp8O/n8uHm6fEi?=) Date: Wed, 12 Sep 2012 06:53:53 -0800 Subject: =?koi8-r?B?9MnQz8fSwcbJ0SDEwcXUIMzV3tvJxSDDxc7ZIM7BINDPzMnH0sHGycA=?= Message-ID: Фабрика печати АТАКУЕТ ценами и сроками Московский рынок И ПРЕДЛАГАЕТ - Лучшее в регионе соотношение цена-качество на полиграфию (календари, каталоги, журналы, ПОС, брошюры, папки, кашировка...) в т.ч.- эксклюзивная полиграфия (сложные книги, нестандартная упаковка) - Логистика - склад Москва (доставка до клиента) - Офис - Курская (можно приехать посмотреть образцы) - Машины - формат А1, А2, полный комплекс постпечатки Посчитайте Ваши заказы - Вас приятно удивят наши цены и сервис! Москва 495-589-76-12 Написать нам Вы можете тут www.логотип-л.рф From persuasionsvy at royalparadise.com Tue Sep 11 21:27:39 2012 From: persuasionsvy at royalparadise.com (=?koi8-r?B?IuHMxcvTwc7E0iI=?=) Date: Wed, 12 Sep 2012 09:27:39 +0500 Subject: =?koi8-r?B?5MXSxdfRzs7B0SDQwczP3svBIMTM0SDNz9LP1sXOz8fP?= Message-ID: Палочка для мороженого, медицинские шпателя и кофейная палочка. Происхождение - Украина. Имеем опыт экспортных отправок. Размеры: 94x10x2, 114x10x2, 94x17⁄11x2, 150x16x2 Тел: +38(0472)544270 Моб: +38(067)4705270 From eugen at leitl.org Wed Sep 12 03:12:40 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 12 Sep 2012 12:12:40 +0200 Subject: [tahoe-dev] notes from the Tahoe-LAFS Weekly Dev Call, 2012-09-11 Message-ID: <20120912101240.GF9750@leitl.org> ----- Forwarded message from Brian Warner ----- From oustersh5 at reidbuilthomes.com Tue Sep 11 22:36:13 2012 From: oustersh5 at reidbuilthomes.com (=?koi8-r?B?IuvB0tTJzsEi?=) Date: Wed, 12 Sep 2012 13:36:13 +0800 Subject: =?koi8-r?B?89TJzNjO2cog0M/EwdLPyyDTIMTP09TB18vPyiDOwSDEz80gLSDzy8nE?= =?koi8-r?B?y8EgNTAgJSE=?= Message-ID: <4E1E5090E7924D5198A661F2CCDB27D5@MMA3> ������� � ���� � ���������� ��������. �������� ���������! �������� ���������! ������� ������ 50 %! www.www.�������-���.�� -------------- next part -------------- A non-text attachment was scrubbed... Name: hiscoe.jpg Type: image/jpeg Size: 5866 bytes Desc: not available URL: From imprisoningwil at rockoutrecords.com Tue Sep 11 23:29:38 2012 From: imprisoningwil at rockoutrecords.com (=?koi8-r?B?IuUt7cHSy8XUyc7HIg==?=) Date: Wed, 12 Sep 2012 14:29:38 +0800 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAg0tXCzMXKICvIz9PUyc7HIM7BIM3F?= =?koi8-r?B?09HDINcg8O/k4fLv6w==?= Message-ID: <47ED8A263AD64B3C8F6D57201800E5F6@BE83CF9588BA41D> 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК (для указания вашего сайта в письме) - По вашему графику - Без ограничений по срокам - Возможно менять макеты все 8 раз !!! - Подготовка макетов бесплатно АКЦИИ: Месяц 44(46) рассылок - 2 раза в день - 5 раз в неделю - 20 000 рублей Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,7 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1456 bytes Desc: not available URL: From alex at alexanderandersonhall.com Wed Sep 12 06:24:23 2012 From: alex at alexanderandersonhall.com (=?koi8-r?B?ItPQxcPJwczJ09Qgz9TExczBINLB2tLBws/Uy8kg0NLPxcvUzs/KIA==?= =?koi8-r?B?xM/L1c3FztTBw8nJIg==?=) Date: Wed, 12 Sep 2012 16:24:23 +0300 Subject: =?koi8-r?B?/MvT0MXS1MnawSDQ0s/Fy9TOzy3TzcXUzs/KIMTPy9XNxc7UwcPJyQ==?= Message-ID: <01cd9103$119c5580$ee536e6d@alex> 24 и 25 сентября в Caнкт-Пeтepбypгe пpoйдeт двyxднeвный кypc: Hoвый пopядoк ГОСУДАРСТВЕННОЙ и НЕГОСУДАРСТВЕННОЙ CТPOИТEЛЬНOЙ ЭКCПEPТИЗЫ. CТPOИТEЛЬНЫЙ НAДЗOP, aдминиcтpaтивнaя oтвeтcтвeннocть. Зaнятия пpoйдyт в цeнтpe гopoдa в лeкциoннoй фopмe. Kpaткaя пpoгpaммa кypca: 1. Coвpeмeннaя зaкoнoдaтeльнo-нopмaтивнaя бaзa инвecтициoннo-cтpoитeльнoгo пpoцecca в т.ч. нoвый Гpaдocтpoитeльный Koдeкc PФ и дpyгиe дoкyмeнты. 2. Hoвoe в пoдгoтoвкe иcxoднo-paзpeшитeльнoй дoкyмeнтaции нa пpoeктиpoвaниe и cтpoитeльcтвo; пopядoк paзpaбoтки, coглacoвaния и yтвepждeния пpoeктнoй дoкyмeнтaции, ee cocтaв и coдepжaниe; 3. Пpoвeдeниe Eдинoй гocyдapcтвeннoй экcпepтизы пpoeктнoй дoкyмeнтaции и peзyльтaтoв инжeнepныx изыcкaний. Tpeбoвaния к cocтaвy пpoeктнoй дoкyмeнтaции, cpoки пpoвeдeния экcпepтизы: 4. Bыдaчa paзpeшeний нa cтpoитeльcтвo. Cocтaв дoкyмeнтoв; coдepжaниe гpaдocтpoитeльнoгo плaнa yчacткa; cпeцификa выдaчи paзpeшeний нa paзличныe виды oбъeктoв. 5. Tpeбoвaния CниП и дpyгиx нopмaтивoв пpи пpoeктиpoвaнии и cтpoитeльcтвe, пpaктикa иx coблюдeния. 6. Пoдгoтoвкa зaдaния нa пpoeктиpoвaниe oбъeктa, oпpeдeлeниe cтoимocти пpoeктныx paбoт, coглacoвaниe пpoeктныx paбoт. 7. Гocyдapcтвeнный cтpoитeльный нaдзop. Koммeнтapии к pyкoвoдящим дoкyмeнтaм. 8. Bыдaчa paзpeшeний нa ввoд oбъeктoв в экcплyaтaцию. 9. Пpaктикa пpивлeчeния к aдминиcтpaтивнoй oтвeтcтвeннocти зa нapyшeния в cфepe гpaдocтpoитeльнoй дeятeльнocти. 10.Экoнoмичecкaя эффeктивнocть инвecтиций и ee oбocнoвaниe в пpoeктax cтpoитeльcтвa. Oбocнoвaниe инвecтиций. 11.Негосударственная экспертиза проектно-сметной документации. Пoлнaя пpoгpaммa и ycлoвия yчacтия бyдyт выcлaны пo зaпpocy: 8 { 8I2 } 64 2 -. 5з ^ Ч5 From eugen at leitl.org Wed Sep 12 08:04:44 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 12 Sep 2012 17:04:44 +0200 Subject: Army Wants Tiny Suicidal Drone to Kill From 6 Miles Away Message-ID: <20120912150444.GP9750@leitl.org> http://www.wired.com/dangerroom/2012/09/suicidal-drone-6-miles-away/ Army Wants Tiny Suicidal Drone to Kill From 6 Miles Away By Spencer Ackerman September 10, 2012 | 5:31 pm | Categories: Army and Marines, Drones Follow @attackerman Thought the Armybs Raven drone was tiny? The Army now wants a new drone, called the Lethal Miniature Aerial Munition System, thatbs weighs just just 5 pounds. And unlike the Raven, the so-called LMAMS will be armed and dangerous. Photo: U.S. Army Killer drones just keep getting smaller. The Army wants to know how prepared its defense-industry partners are to build what it calls a bLethal Miniature Aerial Munition System.b Itbs for when the Army needs someone dead from up to six miles away in 30 minutes or less. How small will the new mini-drone be? The Armybs less concerned about size than it is about the dronebs weight, according to a recent pre-solicitation for businesses potentially interested in building the thing. The whole system b drone, warhead and launch device b has to weigh under five pounds. An operator should be able to carry the future Lethal Miniature Aerial Munition System, already given the acronym LMAMS in a backpack and be able to set it up to fly within two minutes. The envisioned LMAMS, a bloitering precision guided munitionb is designed for quick missions to take out specific targets, and the Armybs had its eye on something like it for years. Its small size means it canbt carry a lot of fuel. As first reported by (subscription only) InsideDefense, the Army needs it to stay aloft for a half hour at most. But during that half hour, the Army expects it to fly up to six miles to smash into a target, either directed by a human controller or pre-programmed through GPS. Whether it speeds to a target fairly distant from where an Army unit is set up or loiters over one until it gets a clear shot, itbs another step toward making drone strikes inconspicuous. The Army wants it ready for use by 2016 at the latest. But it may not take that long b since the Armybs already got something similar to LMAMS. There are basically three models for shrinking the drone war. One is to build a tiny munition, so as to weaponize existing small spy drones, like the Raven or the Puma. Raytheonbs doing that with its Small Tactical Munition, a two-foot bomb that weighs about 10 to 15 pounds. A second is to take the existing functionality and physical specs of existing killer drones and scale it down, as with California company Arcturusb eponymous 17-foot armed spy plane. The third is to mash up drones and missiles, so a controller remotely pilots a tiny missile and guides it on a one-way mission to a target. Thatbs what AeroVironmentbs much-hyped Switchblade does. LMAMS is more like the Switchblade than the other two. Itbs not designed for more than one use. bOnce a target is selected by the operator in the terminal phase of an engagement,b the pre-solicitation reads, bno further operator input shall be required.b Accordingly, its spy tools are minimal: The Army just needs the soldier operating it from a distance to receive real-time video of the LMAMSb flight path. And like the Switchblade, since the drone/missile hybrid is small, it ought to cause minimal collateral damage: The Army needs LMAMS to have an bextremely low probabilityb of killing someone 10 meters from its bombbs impact. In fact, the LMAMS sounds so similar to the Switchblade that the Armybs flirting with redundancy. The only major discrepancy between what the Army wants for LMAMS and what the Switchblade does is that the Switchbladebs loiter time tops out at 10 minutes, which is too short for the bunprecedented engagement of enemy combatantsb that LMAMS envisions. (The Switchblade can also fly a span of six miles.) Still, the Army has sunk nearly $10 million into Switchblade since last September, and an AeroVironment vice president told InsideDefense, bSwitchblade would be the Aerovironment solution that applies to this.b Still, the missions that the Army wants the LMAMS to complete are fairly specific. It should be used for discrete targets: bpersonnel and personnel in moving light-duty vehicles, while minimizing collateral damage,b the pre-solicitation reads. So when Army units b small ones, since the Army wants LMAMS borganic to the small unit levelb b spot a specific combatant or suspicious vehicle, a soldier is supposed to launch the LMAMS and direct it at the target, and only the target. Its limited flight range, loiter time and camera power restricts its use as an overhead spy tool for scouting those targets. Given the drawdown in Afghanistan, chances are the bsmall unitsb whobd operate the LMAMS will be special-operations teams, unless another ground war breaks out unexpectedly. The LMAMS is just the latest development in miniaturizing drones. The Air Forcebs bmicro-aviaryb is at work building small aircraft modeled on insects and tiny birds, the better for spying without attracting notice. LMAMS doesnbt care so much about watching an adversary for any prolonged period b when it finds one, though, the Army wants it killed, and quickly. Spencer Ackerman Danger Room senior reporter Spencer Ackerman recently won the 2012 National Magazine Award for Reporting in Digital Media. Read more by Spencer Ackerman From jya at pipeline.com Wed Sep 12 15:17:26 2012 From: jya at pipeline.com (John Young) Date: Wed, 12 Sep 2012 18:17:26 -0400 Subject: [drone-list] End-Use Monitoring on Unmanned Aerial Vehicle Exports Message-ID: http://www.gao.gov/products/GAO-12-536 Agencies Could Improve Information Sharing and End-Use Monitoring on Unmanned Aerial Vehicle Exports Full 58-page report, PDF: http://www.gao.gov/assets/600/593131.pdf GAO-12-536, Jul 30, 2012 What GAO Found Since 2005, the number of countries that acquired an unmanned aerial vehicle (UAV) system nearly doubled from about 40 to more than 75. In addition, countries of proliferation concern developed and fielded increasingly more sophisticated systems. Recent trends in new UAV capabilities, including armed and miniature UAVs, increased the number of military applications for this technology. A number of new civilian and commercial applications, such as law enforcement and environmental monitoring, are available for UAVs, but these applications are limited by regulatory restrictions on civilian airspace. The United States likely faces increasing risks as countries of concern and terrorist organizations seek to acquire UAV technology. Foreign countries' and terrorists' acquisition of UAVs could provide them with increased abilities to gather intelligence on and conduct attacks against U.S. interests. For instance, some foreign countries likely have already used UAVs to gather information on U.S. military activities overseas. Alternatively, the U.S. government has determined that selected transfers of UAV technology support its national security interests by providing allies with key capabilities and by helping retain a strong industrial base for UAV production. For instance, the United Kingdom and Italy have used UAVs purchased from the United States to collect data on Taliban activity in Afghanistan. The United States has engaged in multilateral and bilateral diplomacy to address UAV proliferation concerns. The United States principally engaged the Missile Technology Control Regime (MTCR) to address multilateral UAV proliferation concerns. Since 2005, the United States proposed certain significant changes to address how MTCR controls UAVs, but members could not reach a consensus for these changes. Also, while the Wassenaar Arrangement (Wassenaar) controls the export of some key dual-use UAV components, it does not control other dual-use technologies that are commonly used in UAVs. The Department of State (State) has also used diplomatic cables to address the proliferation of UAV-related technologies bilaterally. State provided to GAO about 70 cables that it sent from January 2005 to September 2011 addressing UAV-related concerns to about 20 governments and the MTCR. Over 75 percent of these cables focused on efforts by a small number of countries of concern to obtain UAV technology. U.S. agencies coordinate in several ways to control the spread of UAV technology, but could improve their UAV-related information sharing. For instance, an interagency group reviews many license applications to export UAV technology. However, there is not a formal mechanism to ensure that licensing agencies have relevant and timely intelligence information when making licensing decisions. Also, State's licensing database cannot provide aggregate data on military UAV exports State has authorized, which may impair the U.S. government's ability to oversee the release of sensitive UAV technology. The Department of Defense (DOD) and State each conduct end-use monitoring of some UAV exports, but differences in the agencies' programs may result in similar types of items being subject to different levels of oversight. _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Sep 12 09:36:29 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 12 Sep 2012 18:36:29 +0200 Subject: EDRi-gram newsletter - Number 10.17, 12 September 2012 Message-ID: <20120912163629.GS9750@leitl.org> ----- Forwarded message from EDRi-gram ----- From edrigram at edri.org Wed Sep 12 09:29:45 2012 From: edrigram at edri.org (EDRi-gram) Date: Wed, 12 Sep 2012 19:29:45 +0300 Subject: EDRi-gram newsletter - Number 10.17, 12 September 2012 Message-ID: ====================================================================== EDRi-gram biweekly newsletter about digital civil rights in Europe Number 10.17, 12 September 2012 ======================================================================= Contents ======================================================================= 1. Belarusian authorities harass online opposition groups 2. Spanish website gets back seized domain names. After 18 months. 3. Russia: Old and new in online censorship 4. Unitary patent brings back the software patents debate 5. EDRi on child protection policy 6. EDPS opinion on the EU database for asylum seekers 7. ENDItorial:CET(A)CTA bCriminal sanctions provisions broadly identical 8. Recommended Action 9. Recommended Reading 10. Agenda 11. About ======================================================================= 1. Belarusian authorities harass online opposition groups ======================================================================= As elections in Belarus approach, independent or pro-opposition journalists and Internet users are harassed by the Belarusian authorities, pressured and even put to jail. "The call for an election boycott by some opposition figures has joined the long list of subjects that are off limits. Those who mention the boycott, such as opposition groups on social networks, are immediately sanctioned. It is illusory to talk of free elections in such a media environment," stated Reporters Without Borders. As reported by the human rights group Viasna on 31 August, the mobile phone company BelCel blocked access to the pro-opposition news websites Charter97 and BelPartizan. The State Security Committee arrested a series of moderators of online communities who were interrogated and beaten, their apartments were searched and their laptops confiscated. Pavel Yeutsikhiyeu, one of the moderators of the "Webve had enough of this Lukashenkob group on the Russian social network VKontake, was sentenced by Minskbs Kastrychnitski district court on 31 August to five days in prison on a charge of disturbing public order and Andrey Tkachou, the administrator of the Only SHOS group, was sentenced to seven days in prison on the same charge. The authorities also hacked into two online discussions groups obtaining the names of their presumed moderators and administrators and removed much of the content of these groups. The group bWebve had enough of this Lukashenkob is now controlled by the State Security Committee after having been hacked, deleted and restored. The secret services do not delete information from the community, but publish libel against group's administrators. Also OSCE has again showed deep concern over the situation in Belarus. bI have repeatedly called on Belarusian authorities to stop persecuting journalists and bloggers. Unfortunately, recent detentions and searches in Minsk and elsewhere in the country show continued efforts to muzzle dissenting voices and clamp down on freedom of expression online,b said the OSCE Representative on Freedom of the Media, Dunja Mijatovic who added: bThe Belarusian authorities are using such charges to control the media and Internet communities. The detentions are a strike against freedom of expression and contravene OSCE commitments which Belarus has pledged to uphold.b Opposition journalists and cyber-dissidents hounded in run-up to election (3.09.2012) http://en.rsf.org/belarus-opposition-journalists-and-cyber-03-09-2012,43321.html OSCE Press Release - OSCE media freedom representative concerned by arrest of social media activists in Belarus (4.09.2012) http://www.osce.org/fom/93345 KGB continues crackdown on social network groups (4.09.2012) http://spring96.org/en/news/56709 Crackdown on social networks: interrogations, searches, arrests (31.08.2012) http://spring96.org/en/news/56544 ======================================================================= 2. Spanish website gets back seized domain names. After 18 months. ======================================================================= After one year and a half battle with the US authorities, the sports streaming and download Spanish site Rojadirecta has succeeded in winning back its domain names, after the authorities dropped the lawsuit against it on 29 August 2012. The .org and .com domains of Rojadirecta were seized in January 2011 as part of operation bOperation In Our Sitesb, on a very questionable basis of intellectual property rights violation, and without any court order. The site had already been considered as legally operating in Spain by two Spanish courts. After the seizure, Rojadirecta continued its operation as usual under .es and .me domains and decided to fight back and sued the US government. bWe immediately initiated talks with the government, through our legal representatives in San Francisco and New York, in order to obtain the return of (our domains). Since it was impossible at that stage to recover domains amicably, we filed a complaint against the Government, the Department of Homeland Security and the Immigration and Customs Enforcement agency of the United States of America,b said Rojadirectabs owner, the Spanish company Puerto 80. This is not the first case of this type. In 2010 music blog Dajaz1 had its domain name seized which was returned after more than 12 months. It turned out that the seizure, initiated by the RIAA, was a mistake. The concern is that the US government may repeat such abuses without any consequence for them. bI expect that we may see a few more such cases as well. Unfortunately, though, we may not get a clear legal ruling telling the government it can't do this b meaning that they'll be free to continue to abuse their powers in such a manner going forward,b stated Mark Lemley from Puerto 80 legal team. U.S. Returns Seized Domains to Streaming Links Site (After 18 Months) (30.08.2012) http://torrentfreak.com/u-s-returns-seized-domains-to-streaming-links-site-after-18-months-120830/ Oops: After Seizing & Censoring Rojadirecta For 18 Months, Feds Give Up & Drop Case (29.08.2012) http://www.techdirt.com/articles/20120829/12370820209/oops-after-seizing-censoring-rojadirecta-18-months-feds-give-up-drop-case.shtml The U.S. Government withdraws complaint against the Rojadirecta domains and the Court orders their return (up-dated 5.09.2012) http://blog.rojadirecta.me/2012/08/30/us-government-withdraws-lawsuit-against-rojadirecta-domains-and-court-orders-their-return/ Rojadirecta wins the fight with the USA Government and recovers its domains (only in Spanish, 30.08.2012) http://www.elmundo.es/elmundo/2012/08/30/navegante/1346315790.html EDRi-gram: Spanish sports streaming domain seized by US authorities without warning (9.02.2011) http://www.edri.org/edrigram/number9.3/rojadirecta-domain-name-seized-us ======================================================================= 3. Russia: Old and new in online censorship ======================================================================= A new Russian law intended to protect minors from bharmfulb content entered into force on 1 September 2012 bringing forth confusion and, at the same time, hilarious and even dangerous results. "The lawbs vagueness and inconsistencies render its repressive provisions even more threatening and are encouraging journalists to censor themselves. The vague definition of bharmful contentb leaves too much room for interpretation and increases the probability of overblocking. As defined, the requirement to put age ban labels on content is absurd and dangerous. On the grounds of protecting minors, this law is likely to place serious obstacles on the mediabs ability to provide the public with general news coverage. We urge parliament to clarify this law and to strike out those provisions that violate the constitution and international agreements that Russia has ratified," stated Reporters Without Borders said. Under the final version of the law, the media must prevent children from seeing content that contains violence, sex or rude words or content encouraging them to smoke or drink alcohol. Vladimir Pikov, the spokesman of Roskomnadzor (the Federal Service for Supervision in the Sphere of Telecom, Information Technologies and Mass Communications), said on 29 August 2012 that, with the exception of news agencies, all online media had to place age bans on their content. Moreover, Pikov stated that when it was complicated to place a ban label to individual articles, then the entire website had to be labelled. This has led to cases when online media representatives decided to label their entire site in order to avoid any risk. A Russian channel will censor bThe Simpsonsb cartoon series banning scenes of violence, drinking, and smoking before 11 pm. bUnder the new law we cannot show bThe Itchy & Scratchy Showb from bThe Simpsonsb before 11 pmb, said general director Lev Makarov. Moreover, the majority party of the Russian Parliament has announced the intention to introduce new amendments to the libel law to find and punish those posting anonymous insults on the Internet. Russia amended the law on libel during this spring adding harsh new administrative punishments for defamation. In October 2011, the Upper House Commission for Development of Civil Society approved a draft law "Against Internet Extremism," suggesting all postings on the Internet are public and thus, Internet libel would be punished with sentences of up to five years in prison just as the mass-media libel. bThe law already includes the norms providing responsibility for journalists b both the media companies and authors. But what shall we do if some anonymous user makes insulting statements? We will consider the questions connected with legislation improvement in this direction so that anonymity no longer gives such people the illusion of impunity,b said deputy speaker of the Lower House and member of the Culture Committee Sergey Zheleznyak. This new amendment will allow police officers to find the identity of anonymous libels and, according to Zheleznyak, it will apply to Internet users, not just journalists. Major threat to news coverage from law "protecting minors" online (1.09.2012) http://en.rsf.org/russie-major-threat-to-news-coverage-from-01-09-2012,43314.html Russia To Censor bSouth Parkb and bThe Simpsonsb (30.08.2012) http://www.inquisitr.com/316980/russia-to-censor-south-park-and-the-simpsons/ United Russia mulls amendments to track anonymous Internet slanderers (29.09.2012) http://rt.com/politics/united-russia-internet-slanderers-814/ ======================================================================= 4. Unitary patent brings back the software patents debate ======================================================================= The Committee on Legal Affairs (JURI) of the European Parliament is preparing these days in view of the discussion on unitary patent on 17 and 18 September 2012. The issue of interest is whether these discussions will bring back the return of software patents as it seems to be the case, having in view the recent patent wars in the US (like that of Apple against Samsung). There is also the threat of letting companies monopolise the market thus preventing innovation and the introduction of new products. Several groups, like April and FSFE, call for a general mobilisation to contact all MEPs, so that the European Parliament finally tackles the issue of the software patentability. "Software patents are a real scourge for companies and software developers. They do not contribute to innovation whatsoever, but prevent us from developing new products while exposing us to ever increasing legal uncertainty," stated GC)rald SC)drati-Dinet, April's patent advisor. Although European laws prohibit software patents, the European Patent Office (EPO) has been trying for years to legalize software patents and, under the new proposal to be discussed, the power and control on the law on patentability would be left to an organisation, without any democratic control or the opinion to go before an independent court. Under the current proposal, the EPO has the right to award a patent, but also takes the final decision on whether it remains valid when someone complains, while the final court to decide on patent complaints should be the European Court of Justice which has already warned that the current proposal is incompatible with EU laws. The patent system should be politically controlled by the European Parliament and should benefit of proper checks and balances. Ideally, the European Parliament must ensure that computer programs are excluded from patentability, making clear that they cannot be patented just because they run on generic data processing hardware. I call! http://call.unitary-patent.eu/campaign/call2/unitary-patent-juri-2012 General mobilisation against the return of software patents in Europe (3.09.2012) http://www.april.org/en/general-mobilisation-against-return-software-patents-europe No patents on software: Unitary patent threatens innovation in Europe (7.09.2012) http://fsfe.org/news/2012/news-20120907-01.en.html EU: the unitary patent (5.09.2012) http://fsfe.org/campaigns/swpat/current/unitary-patent.html ======================================================================= 5. EDRi on child protection policy ======================================================================= The interests of children should be put first, even if that means allowing them to learn and adapt to online risks An unseen threat is the scariest threat of all. An unseen threat to our children provokes our most basic protective instincts, which is exactly as it should be. The internet is a public space and it is as safe or dangerous to allow a child to wander in its various neighbourhoods as for them to wander through any city. The challenge is to fight the temptation to be over-protective and instead allow our societybs children and young people to develop into responsible adults. Panic and assumptions lead to policies that are counterproductive. Effective child protection measures are those based on facts and not fear. The European commission has sought the facts, financing truly impressive research on which solid policy can be based. The European Unionbs kids online research project on the experience of European children online is excellent, setting global standards for both scope and quality. Bizarrely, however, the commissionbs recent communication on a bEuropean strategy for a better internet for childrenb only briefly references this research. Instead, it is pushing internet companies to adopt unspecified voluntary measures that will not be subject to the rigours of democratic decision-making, will not be based on research and risk being either useless or, even worse, counterproductive. The threat of the implementation of bad policies as a result on over-reliance on industry bsolutionsb is very real. For example, it would seem logical for internet providers to offer strong internet filtering to protect children. The public relations value of such a service is tempting. However, research from the UK office for standards in education indicates that students are safest when they are not using strongly filtered internet connections. Instead, children gain better knowledge, awareness and security by using open services, which allow them to learn about, confront and adapt to risk. The commission has been funding child abuse image (child pornography) prevention hotlines for several years. On the basis of direct or indirect reports from these hotlines, internet providers in many EU countries voluntarily remove images or sites from their services. The commission is now demanding a quicker takedown of such images. However, despite funding the hotlines, the commission can produce no statistics as regards how fast sites are removed in each EU member state, nor on the causes of delays. In other words, the commission is asking for an unspecified improvement on an unknown baseline value that it is unable to make available. This is simply not good enough. Worse still, the commission cannot produce any reliable data on the number of prosecutions b or even investigations. Criminal activity must be treated more seriously than this. It is difficult to understand the basis of the commissionbs apparent belief that companies instinctively know what is in the best interests of children and society and will put these interests ahead of their own profits. Companies frequently have conflicts between their own interest and that of the public. It is unwise and inappropriate to devolve policy-making to them on such an important issue. Children deserve better, a policy for child protection must be based on evidence and not the public relations needs of parts of industry or even of the commission itself. If any policy area deserved to be treated with more diligence, it is this one. We need European leadership on this issue, not facile nonsense about corporations regulating children, free speech and our digital heritage. Article published in TheParliament.com (7.09.2012) http://www.theparliament.com/latest-news/article/newsarticle/child-protection-policy-joe-mcnamee (Article by Joe McNamee - Executive Director of European Digital Rights EDRi) ======================================================================= 6. EDPS opinion on the EU database for asylum seekers ======================================================================= On 5 September 2012, the European Data Protection Supervisor (EDPS) issued his opinion on the amended Commission proposal for a Regulation of the European Parliament and of the Council on the establishment of EURODAC database for the comparison of the fingerprints of asylum seekers. EURODAC was established by an EC regulation on 11 December 2000 concerning the establishment of a database for the comparison of the fingerprints of asylum seekers for the effective application of the Dublin Convention. On 30 May 2012, the Commission adopted a proposal concerning a modification of the EURODAC Regulation that also provides access to EURODAC data for law enforcement purposes by Member States' law enforcement authorities and Europol. Peter Hustinx, EDPS, stated in his opinion that while the availability of a database with fingerprints could be a useful additional tool in combating crime, this new amendment represents "a serious intrusion into the rights of a vulnerable group of people in need of protection." "Just because the data has already been collected, it should not be used for another purpose which may have a far-reaching negative impact on the lives of individuals," said Peter Hustinx who added that such an intrusion risking the stigmatisation of individuals should have a strong justification and that the Commission has not bprovided sufficient reason why asylum seekers should be singled out for such treatment." Hustinx asked the Commission to provide solid evidence and reliable statistics for the need to access EURODAC data and added that in case such a need is supported by evidence, the access to the database should be subject to strict, appropriate safeguards. The EDPS also recommended that the access to the data by law enforcement entities should also be subject to bspecific and clearly defined criteria such as a substantiated suspicion that the perpetrator of a terrorist or other serious criminal offence has applied for asylumb and that the request for access for law enforcement purposes should be verified by an independent authority or, preferably, submitted for prior judicial authorisation. Other recommendations are that the proposal should clearly emphasize that the transfer to third data is prohibited, that it should specify more clearly the rules on retention or deletion of data and that it should include an improvement of the provisions on data security. Among the conditions for access, the EDPS included the consultation of the Visa Information System, the existence of a substantiated suspicion that the perpetrator of a terrorist or other serious criminal offences has applied for asylum and the bsubstantial contribution for law enforcement purposes and clarifying what is understood by reasonable groundsb Privacy czar: Civil rights at stake in asylum database proposal (6.09.2012) http://www.euractiv.com/specialreport-data-protection/eu-advisor-commissions-fingerpri-news-514635 EDPS Press Release - EURODAC: erosion of fundamental rights creeps along (5.09.2012) http://www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/EDPS/PressNews/Press/2012/EDPS-2012-12_Eurodac_EN.pdf Opinion of the European Data Protection Supervisor on the amended proposal for a Regulation of the European Parliament and of the Council on the establishment of "EURODAC" (5.09.2012) http://www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/Consultation/Opinions/2012/12-09-05_EURODAC_EN.pdf ======================================================================= 7.ENDItorial:CET(A)CTA b Criminal sanctions provisions broadly identical ======================================================================= Towards the end of July 2012, a rather strange and surprising e-mail was sent from the General Secretariat of the Council of the European Union to the Member States and the European Commission. The e-mail explained that the criminal sanctions provisions of the draft EU/Canada trade agreement are modelled on those in ACTA. This, the General Secretariat of the Council worries, presents a problem as, on the one hand, the conclusion and implementation of CETA are a declared priority of the Union while, on the other, the European Parliament will need to be asked to approve the final text of the Agreement. Member States told EDRi were baffled by the e-mail. On the one hand, after all the controversy surrounding ACTA, they could not understand why such a blunt e-mail was sent in the first place. After all of the leaks surrounding ACTA, a more subtle message would have been logical. Secondly, after the adoption of the Lisbon Treaty, the task of coordinating such policies is now the responsibility of the Commission, so it was not clear why the Council took it upon itself to even ask the question. Member States are not the only ones that are somewhat surprised by the Council's e-mail b the European Commission told the press only two weeks previously bthat language being negotiated on CETA regarding Internet is now totally different from ACTA.b Has the Council been given the wrong draft of CETA? This seems like the only possible explanation. After everything that happened with ACTA, it hardly seems possible that the Commission would be seeking to mislead the public. Many Member States still do not understand the political problems that surrounded ACTA and are therefore generally not opposed to provisions from ACTA being put into CETA. However, only two Member States clicked on breply allb when responding to the Council's e-mail b one was a well-known supporter of ACTA from western Europe and, surprisingly, the other was one of the bnewb Member States from South-East Europe. The response from the South-East European member state also raised opposition to the inclusion of camcording in the draft Agreement. Camcording is such a non-issue that it was abandoned by the negotiating parties in ACTA, so it is bizarre that even stronger wording has now made its way into CETA. Even more strange is that a policy has found its way into the draft EU/Canada trade deal that is neither an EU policy nor a Canadian policy, but a US one. Michael Geist points in a blog post to a Wikileaks cable where the US described as bdisingenuousb a Canadian claim that their anti-camcording legislation was an independent policy change that was not the result of lobbying pressure from the US. Michael Geist blog: Wikileaks Cables Show Massive U.S. Effort to Establish Canadian DMCA (29.04.2011) http://www.michaelgeist.ca/content/view/5765/125/ Council E-Mail (07.2012) Cannot publish yet to protect source Don't believe every leak you read says EU Commission on CETA (11.07.2012) http://www.itworld.com/internet/285634/dont-believe-every-leak-you-read-says-eu-commission-ceta (Contribution by Joe McNamee - EDRi) ======================================================================= 8. Recommended Action ======================================================================= Join Global Advocates: Oppose Expanding ITU Authority to the Internet (7.09.2012) https://www.cdt.org/blogs/ellery-biddle/0709global-advocates-oppose-expanding-itu-authority-internet ======================================================================= 9. Recommended Reading ======================================================================= Chip and Skim: cloning EMV cards with the pre-play attack (10.09.2012) http://www.lightbluetouchpaper.org/2012/09/10/chip-and-skim-cloning-emv-cards-with-the-pre-play-attack/ http://www.cl.cam.ac.uk/~rja14/Papers/unattack.pdf http://www.pcworld.com/businesscenter/article/262197/emv_protocol_flaw_allows_preplay_attacks_against_chipenabled_payment_cards_researchers_say.html http://www.bbc.com/news/technology-19559124 Illegal file-sharing activity generally logged within three hours, according to new study (6.09.2012) http://www.out-law.com/en/articles/2012/september/illegal-file-sharing-activity-generally-logged-within-three-hours-according-to-new-study http://www.cs.bham.ac.uk/~tpc/Papers/P2PMonitor.pdf Europeanabs huge cultural dataset opens for re-use (12.09.2012) http://bit.ly/SbKfPb ======================================================================= 10. Agenda ======================================================================= 14-17 September 2012, Brussels, Belgium Freedom not Fear 2012 http://www.freedomnotfear.org/ http://www.freedom-not-fear.eu 17-22 September 2012, Helsinki, Finland Open Knowledge Festival http://okfestival.org/ 20-21 September 2012, Trier, Germany The proposed general Data Protection Regulation. Strengthening the EU's Data Protections Architecture? https://www.era.int/cgi-bin/cms?sprache=en&_bereich=artikel&_aktion=detail&idartikel=122913 26 September 2012, Cambridge, UK Open Data across Europe in Local and National Government - Practical achievements and challenges http://www.opening-up.eu/content/open-data-conference 27 September 2012, Paris, France Open Data - La Conferance http://www.opendata-laconference.com/agenda.html 7-10 October 2012, Amsterdam, Netherlands 2012 Amsterdam Privacy Conference http://www.apc2012.org/ 11-12 October 2012, Amsterdam, Netherlands Economies of the commons 3 - Sustainable Futures for Digital Archives http://ecommons.eu/ 25-28 October 2012, Barcelona, Spain Free Culture Forum 2012 http://fcforum.net/ 3-4 November 2012, Baku, Azerbaijan Best Bits b a strategic gathering of NGOs around Internet governance and Internet principles http://igf-online.net/bestbits.pdf 6-9 November 2012, Baku, Azerbaijan Seventh Annual IGF Meeting: "Internet Governance for Sustainable Human, Economic and Social Development" http://www.intgovforum.org/cms/ 9-11 November 2012, Fulda, Germany Digitalisierte Gesellschaft - Wege und Irrwege FIfF Annual Conference in cooperation with Fuldaer Informatik Kollquium http://www.fiff.de/2012 4 December 2012, Brussels, Belgium 3rd Annual European Data Protection and Privacy Conference http://www.eu-ems.com/summary.asp?event_id=123&page_id=983 23-25 January 2013, Brussels, Belgium CPDP 2013 Conference - Reloading data protection CfP by 19 October 2012 http://www.cpdpconferences.org/callforpapers.html 6-8 May 2013, Berlin, Germany re:publica 2013 http://re-publica.de/12/2012/08/28/der-termin-steht-vom-06-08-mai-2013-geht-die-republica-in-die-siebte-runde/ 31 July b 4 August 2013, Geestmerambacht, Netherlands Observe. Hack. Make. - OHM2013 https://ohm2013.org/ ============================================================ 11. About ============================================================ EDRi-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRi has 32 members based or with offices in 20 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRi-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and are visible on the EDRi website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring http://flattr.com/thing/417077/edri-on-Flattr - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/mk/vesti/edri - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided by Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From becker at rectomolded.com Wed Sep 12 08:04:19 2012 From: becker at rectomolded.com (=?koi8-r?B?IvTSxcLP18HOydEg887J8CI=?=) Date: Wed, 12 Sep 2012 20:34:19 +0530 Subject: =?koi8-r?B?99nEwd7BINLB2tLF28XOycogzsEg09TSz8nUxczY09TXzw==?= Message-ID: <01cd9125$fbec5780$81965a3b@becker> 24 и 25 сентября в Caнкт-Пeтepбypгe пpoйдeт двyxднeвный кypc: Hoвый пopядoк ГОСУДАРСТВЕННОЙ и НЕГОСУДАРСТВЕННОЙ CТPOИТEЛЬНOЙ ЭКCПEPТИЗЫ. CТPOИТEЛЬНЫЙ НAДЗOP, aдминиcтpaтивнaя oтвeтcтвeннocть. Зaнятия пpoйдyт в цeнтpe гopoдa в лeкциoннoй фopмe. Kpaткaя пpoгpaммa кypca: 1. Coвpeмeннaя зaкoнoдaтeльнo-нopмaтивнaя бaзa инвecтициoннo-cтpoитeльнoгo пpoцecca в т.ч. нoвый Гpaдocтpoитeльный Koдeкc PФ и дpyгиe дoкyмeнты. 2. Hoвoe в пoдгoтoвкe иcxoднo-paзpeшитeльнoй дoкyмeнтaции нa пpoeктиpoвaниe и cтpoитeльcтвo; пopядoк paзpaбoтки, coглacoвaния и yтвepждeния пpoeктнoй дoкyмeнтaции, ee cocтaв и coдepжaниe; 3. Пpoвeдeниe Eдинoй гocyдapcтвeннoй экcпepтизы пpoeктнoй дoкyмeнтaции и peзyльтaтoв инжeнepныx изыcкaний. Tpeбoвaния к cocтaвy пpoeктнoй дoкyмeнтaции, cpoки пpoвeдeния экcпepтизы: 4. Bыдaчa paзpeшeний нa cтpoитeльcтвo. Cocтaв дoкyмeнтoв; coдepжaниe гpaдocтpoитeльнoгo плaнa yчacткa; cпeцификa выдaчи paзpeшeний нa paзличныe виды oбъeктoв. 5. Tpeбoвaния CниП и дpyгиx нopмaтивoв пpи пpoeктиpoвaнии и cтpoитeльcтвe, пpaктикa иx coблюдeния. 6. Пoдгoтoвкa зaдaния нa пpoeктиpoвaниe oбъeктa, oпpeдeлeниe cтoимocти пpoeктныx paбoт, coглacoвaниe пpoeктныx paбoт. 7. Гocyдapcтвeнный cтpoитeльный нaдзop. Koммeнтapии к pyкoвoдящим дoкyмeнтaм. 8. Bыдaчa paзpeшeний нa ввoд oбъeктoв в экcплyaтaцию. 9. Пpaктикa пpивлeчeния к aдминиcтpaтивнoй oтвeтcтвeннocти зa нapyшeния в cфepe гpaдocтpoитeльнoй дeятeльнocти. 10.Экoнoмичecкaя эффeктивнocть инвecтиций и ee oбocнoвaниe в пpoeктax cтpoитeльcтвa. Oбocнoвaниe инвecтиций. 11.Негосударственная экспертиза проектно-сметной документации. Пoлнaя пpoгpaммa и ycлoвия yчacтия бyдyт выcлaны пo зaпpocy: 8 { 8I2 } 64 2 -. 5з ^ Ч5 From villa at ee.ucla.edu Wed Sep 12 20:34:19 2012 From: villa at ee.ucla.edu (villa at ee.ucla.edu) Date: Wed, 12 Sep 2012 20:34:19 -0700 (PDT) Subject: [drone-list] New article Message-ID: The latest installment in the series Rosa Brooks has been writing about "drones" in Foreign Policy. Take Two Drones and Call Me in the Morning The perils of our addiction to remote-controlled war. http://www.foreignpolicy.com/articles/2012/09/12/take_two_drones_and_call_me_in_the_morning John _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From intricaciesp93 at rotblit.com Wed Sep 12 23:23:48 2012 From: intricaciesp93 at rotblit.com (=?koi8-r?B?IuvB0tTJzsEi?=) Date: Wed, 12 Sep 2012 22:23:48 -0800 Subject: =?koi8-r?B?1MnM2M7ZyiDQz8TB0s/LINMgxM/T1MHXy8/KIM7BIMTPzSAtIPPLycTL?= =?koi8-r?B?wSA1MCAlIQ==?= Message-ID: <717885664.43221445582950@rotblit.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 296 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: 700808_b.jpg Type: image/jpeg Size: 5866 bytes Desc: not available URL: From annelies.stevens at b-rail.be Wed Sep 12 15:25:00 2012 From: annelies.stevens at b-rail.be (=?koi8-r?B?IvPU0s/J1MXM2M7B0SDcy9PQxdLUydrB0iI=?=) Date: Wed, 12 Sep 2012 22:25:00 +0000 Subject: =?koi8-r?B?/MvT0MXS1MnawSDQ0s/Fy9TOzy3TzcXUzs/KIMTPy9XNxc7UwcPJyQ==?= Message-ID: <01cd9135$72448600$83758d29@annelies.stevens> 24 и 25 сентября в Caнкт-Пeтepбypгe пpoйдeт двyxднeвный кypc: Hoвый пopядoк ГОСУДАРСТВЕННОЙ и НЕГОСУДАРСТВЕННОЙ CТPOИТEЛЬНOЙ ЭКCПEPТИЗЫ. CТPOИТEЛЬНЫЙ НAДЗOP, aдминиcтpaтивнaя oтвeтcтвeннocть. Зaнятия пpoйдyт в цeнтpe гopoдa в лeкциoннoй фopмe. Kpaткaя пpoгpaммa кypca: 1. Coвpeмeннaя зaкoнoдaтeльнo-нopмaтивнaя бaзa инвecтициoннo-cтpoитeльнoгo пpoцecca в т.ч. нoвый Гpaдocтpoитeльный Koдeкc PФ и дpyгиe дoкyмeнты. 2. Hoвoe в пoдгoтoвкe иcxoднo-paзpeшитeльнoй дoкyмeнтaции нa пpoeктиpoвaниe и cтpoитeльcтвo; пopядoк paзpaбoтки, coглacoвaния и yтвepждeния пpoeктнoй дoкyмeнтaции, ee cocтaв и coдepжaниe; 3. Пpoвeдeниe Eдинoй гocyдapcтвeннoй экcпepтизы пpoeктнoй дoкyмeнтaции и peзyльтaтoв инжeнepныx изыcкaний. Tpeбoвaния к cocтaвy пpoeктнoй дoкyмeнтaции, cpoки пpoвeдeния экcпepтизы: 4. Bыдaчa paзpeшeний нa cтpoитeльcтвo. Cocтaв дoкyмeнтoв; coдepжaниe гpaдocтpoитeльнoгo плaнa yчacткa; cпeцификa выдaчи paзpeшeний нa paзличныe виды oбъeктoв. 5. Tpeбoвaния CниП и дpyгиx нopмaтивoв пpи пpoeктиpoвaнии и cтpoитeльcтвe, пpaктикa иx coблюдeния. 6. Пoдгoтoвкa зaдaния нa пpoeктиpoвaниe oбъeктa, oпpeдeлeниe cтoимocти пpoeктныx paбoт, coглacoвaниe пpoeктныx paбoт. 7. Гocyдapcтвeнный cтpoитeльный нaдзop. Koммeнтapии к pyкoвoдящим дoкyмeнтaм. 8. Bыдaчa paзpeшeний нa ввoд oбъeктoв в экcплyaтaцию. 9. Пpaктикa пpивлeчeния к aдминиcтpaтивнoй oтвeтcтвeннocти зa нapyшeния в cфepe гpaдocтpoитeльнoй дeятeльнocти. 10.Экoнoмичecкaя эффeктивнocть инвecтиций и ee oбocнoвaниe в пpoeктax cтpoитeльcтвa. Oбocнoвaниe инвecтиций. 11.Негосударственная экспертиза проектно-сметной документации. Пoлнaя пpoгpaммa и ycлoвия yчacтия бyдyт выcлaны пo зaпpocy: 8 { 8I2 } 64 2 -. 5з ^ Ч5 From boeken at auboutdumonde.nl Wed Sep 12 10:48:02 2012 From: boeken at auboutdumonde.nl (=?koi8-r?B?IvHLz9cg6dPBxdfJ3iI=?=) Date: Wed, 12 Sep 2012 23:18:02 +0530 Subject: =?koi8-r?B?wsXazMnNydTOwdEgzcXWxNXHz9LPxM7B0SDT19Ha2A==?= Message-ID: <01cd913c$dae33100$581cd675@boeken> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - - Все возможности АТС (голосовое приветствие, голосовая почта и т.д.) включены в абонентскую плату - Экономия на покупке телефонной станции From bonus at top5softwarereviews.com Wed Sep 12 07:29:34 2012 From: bonus at top5softwarereviews.com (=?koi8-r?B?IvfMwcTJzcnSIPfJy9TP0s/Xyd4i?=) Date: Wed, 12 Sep 2012 23:29:34 +0900 Subject: =?koi8-r?B?wsXazMnNydTOwdEgzcXWxNXHz9LPxM7B0SDT19Ha2CE=?= Message-ID: <01cd913e$775a0300$722d203d@bonus> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - - Все возможности АТС (голосовое приветствие, голосовая почта и т.д.) включены в абонентскую плату - Экономия на покупке телефонной станции From 298f187d at thegrottotonight.com Wed Sep 12 11:23:46 2012 From: 298f187d at thegrottotonight.com (=?koi8-r?B?ItPQxcPJwczJ09Qgz9TExczBINDSz8XL1MnSz9fBzsnRICI=?=) Date: Thu, 13 Sep 2012 01:23:46 +0700 Subject: =?koi8-r?B?89TSz8nUxczYztnKIM7BxNrP0i4g7s/X2cog0sXHzMHNxc7U?= Message-ID: <01cd914e$6b763d00$8173893a@298f187d> 24 и 25 сентября в Caнкт-Пeтepбypгe пpoйдeт двyxднeвный кypc: Hoвый пopядoк ГОСУДАРСТВЕННОЙ и НЕГОСУДАРСТВЕННОЙ CТPOИТEЛЬНOЙ ЭКCПEPТИЗЫ. CТPOИТEЛЬНЫЙ НAДЗOP, aдминиcтpaтивнaя oтвeтcтвeннocть. Зaнятия пpoйдyт в цeнтpe гopoдa в лeкциoннoй фopмe. Kpaткaя пpoгpaммa кypca: 1. Coвpeмeннaя зaкoнoдaтeльнo-нopмaтивнaя бaзa инвecтициoннo-cтpoитeльнoгo пpoцecca в т.ч. нoвый Гpaдocтpoитeльный Koдeкc PФ и дpyгиe дoкyмeнты. 2. Hoвoe в пoдгoтoвкe иcxoднo-paзpeшитeльнoй дoкyмeнтaции нa пpoeктиpoвaниe и cтpoитeльcтвo; пopядoк paзpaбoтки, coглacoвaния и yтвepждeния пpoeктнoй дoкyмeнтaции, ee cocтaв и coдepжaниe; 3. Пpoвeдeниe Eдинoй гocyдapcтвeннoй экcпepтизы пpoeктнoй дoкyмeнтaции и peзyльтaтoв инжeнepныx изыcкaний. Tpeбoвaния к cocтaвy пpoeктнoй дoкyмeнтaции, cpoки пpoвeдeния экcпepтизы: 4. Bыдaчa paзpeшeний нa cтpoитeльcтвo. Cocтaв дoкyмeнтoв; coдepжaниe гpaдocтpoитeльнoгo плaнa yчacткa; cпeцификa выдaчи paзpeшeний нa paзличныe виды oбъeктoв. 5. Tpeбoвaния CниП и дpyгиx нopмaтивoв пpи пpoeктиpoвaнии и cтpoитeльcтвe, пpaктикa иx coблюдeния. 6. Пoдгoтoвкa зaдaния нa пpoeктиpoвaниe oбъeктa, oпpeдeлeниe cтoимocти пpoeктныx paбoт, coглacoвaниe пpoeктныx paбoт. 7. Гocyдapcтвeнный cтpoитeльный нaдзop. Koммeнтapии к pyкoвoдящим дoкyмeнтaм. 8. Bыдaчa paзpeшeний нa ввoд oбъeктoв в экcплyaтaцию. 9. Пpaктикa пpивлeчeния к aдминиcтpaтивнoй oтвeтcтвeннocти зa нapyшeния в cфepe гpaдocтpoитeльнoй дeятeльнocти. 10.Экoнoмичecкaя эффeктивнocть инвecтиций и ee oбocнoвaниe в пpoeктax cтpoитeльcтвa. Oбocнoвaниe инвecтиций. 11.Негосударственная экспертиза проектно-сметной документации. Пoлнaя пpoгpaммa и ycлoвия yчacтия бyдyт выcлaны пo зaпpocy: 8 { 8I2 } 64 2 -. 5з ^ Ч5 From aracellic at wipa.ca Wed Sep 12 13:52:31 2012 From: aracellic at wipa.ca (=?koi8-r?B?Iu/Mxcci?=) Date: Thu, 13 Sep 2012 02:52:31 +0600 Subject: =?koi8-r?B?xMXbxdfB0SDNxdbE1cfP0s/EzsHRINPX0drY?= Message-ID: <01cd915a$d168c180$82142f5c@aracellic> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - - Все возможности АТС (голосовое приветствие, голосовая почта и т.д.) включены в абонентскую плату - Экономия на покупке телефонной станции From eugen at leitl.org Wed Sep 12 23:36:30 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 13 Sep 2012 08:36:30 +0200 Subject: [drone-list] End-Use Monitoring on Unmanned Aerial Vehicle Exports Message-ID: <20120913063630.GU9750@leitl.org> ----- Forwarded message from John Young ----- From eugen at leitl.org Wed Sep 12 23:40:33 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 13 Sep 2012 08:40:33 +0200 Subject: [drone-list] New article Message-ID: <20120913064033.GW9750@leitl.org> ----- Forwarded message from villa at ee.ucla.edu ----- From saftergood at fas.org Thu Sep 13 08:46:11 2012 From: saftergood at fas.org (Steven Aftergood) Date: Thu, 13 Sep 2012 08:46:11 -0700 Subject: Secrecy News -- 09/13/12 Message-ID: Format Note: If you cannot easily read the text below, or you prefer to receive Secrecy News in another format, please reply to this email to let us know. SECRECY NEWS from the FAS Project on Government Secrecy Volume 2012, Issue No. 93 September 13, 2012 Secrecy News Blog: http://www.fas.org/blog/secrecy/ ** AN ARMY INTRODUCTION TO OPEN SOURCE INTELLIGENCE ** HOUSE VOTES TO REAUTHORIZE FISA AMENDMENTS ACT AN ARMY INTRODUCTION TO OPEN SOURCE INTELLIGENCE A new U.S. Army publication provides an introduction to open source intelligence, as understood and practiced by the Army. "Open-source intelligence is the intelligence discipline that pertains to intelligence produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence and information requirement," the document says. "The world is being reinvented by open sources. Publicly available information can be used by a variety of individuals to [achieve] a broad spectrum of objectives. The significance and relevance of open-source intelligence (OSINT) serve as an economy of force, provide an additional leverage capability, and cue technical or classified assets to refine and validate both information and intelligence." See "Open-Source Intelligence," Army Techniques Publication (ATP) 2-22.9, July 2012: http://www.fas.org/irp/doddir/army/atp2-22-9.pdf The new manual is evidently intended for soldiers in the field rather than professional analysts, and it takes nothing for granted. At some points, the guidance that it offers is remedial rather than state of the art. For example, "if looking for information about Russian and Chinese tank sales to Iraq, do not use 'tank' as the only keyword in the search. Instead, use additional defining words such as 'Russian Chinese tank sales Iraq'." But the manual reflects the ongoing maturation of open source intelligence (OSINT), and it contains several observations of interest. "The reliance on classified databases has often left Soldiers uninformed and ill-prepared to capitalize on the huge reservoir of unclassified information from publicly available information and open sources," the manual states. Classification can also be a problem in open source intelligence, however, and "concern for OPSEC [operations security] can undermine the ability to disseminate inherently unclassified information." "Examples of unclassified information being over-classified [include] reported information found in a foreign newspaper [and a] message from a foreign official attending an international conference." Therefore, pursuant to Army regulations, "Army personnel will not apply classification or other security markings to an article or portion of an article that has appeared in a newspaper, magazine, or other public medium," although the resulting OSINT analysis might be deemed "controlled unclassified information." Curiously, the new manual itself is blocked from access by the general public on Army websites. But an unrestricted copy was released by the Army on request. Somewhat relatedly, the Department of Defense this week published a new Instruction on DoD Internet Services and Internet-Based Capabilities, DODI 8550.01, September 11, 2012: http://www.fas.org/irp/doddir/dod/i8550_01.pdf HOUSE VOTES TO REAUTHORIZE FISA AMENDMENTS ACT The House of Representatives voted yesterday to renew the Foreign Intelligence Surveillance Act (FISA) Amendments Act for five years. The Act generally authorizes electronic surveillance of non-U.S. persons and U.S. persons who are believed to be outside the United States, while prohibiting the "intentional" targeting of persons in the U.S. without an individualized warrant, seemingly leaving a wide opening for unintentional or incidental collection. This and other features of the Act prompted concerns about the expansion of surveillance authority and the erosion of constitutional protections. But such concerns, however eloquently expressed by a few dissenting Members, gained little traction. The House rebuffed efforts to increase reporting on implementation of the law or to shorten the duration of its renewal, and approved the measure by a vote of 300-118. http://www.fas.org/irp/congress/2012_cr/faa_house.html In the Senate, Sen. Ron Wyden has placed a hold on the bill in an attempt to compel disclosure of the current scale of government interception of U.S. communications, which the Administration says it cannot provide. The Congressional Research Service has produced a new report on "Reauthorization of the FISA Amendments Act," dated September 12, 2012. http://www.fas.org/sgp/crs/intel/R42725.pdf The ACLU is challenging the constitutionality of the Act in a case that will be heard by the U.S. Supreme Court on October 29. http://www.aclu.org/national-security/amnesty-et-al-v-clapper _______________________________________________ Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists. The Secrecy News Blog is at: http://www.fas.org/blog/secrecy/ To SUBSCRIBE to Secrecy News, go to: http://www.fas.org/sgp/news/secrecy/subscribe.html To UNSUBSCRIBE, go to http://www.fas.org/sgp/news/secrecy/unsubscribe.html OR email your request to saftergood at fas.org Secrecy News is archived at: http://www.fas.org/sgp/news/secrecy/index.html Support the FAS Project on Government Secrecy with a donation: http://www.fas.org/member/donate_today.html _______________________ Steven Aftergood Project on Government Secrecy Federation of American Scientists web: www.fas.org/sgp/index.html email: saftergood at fas.org voice: (202) 454-4691 twitter: @saftergood ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bueswmlw at nedim.ru Wed Sep 12 18:05:25 2012 From: bueswmlw at nedim.ru (=?koi8-r?B?7s/X2cog2sHLz84gzyDC1cjV3sXUxQ==?=) Date: Thu, 13 Sep 2012 09:05:25 +0800 Subject: =?koi8-r?B?7s/X2cog2sHLz84gIu8gwtXIx8HM1MXS08vPzSDV3sXUxSI=?= Message-ID: <000d01cd914b$db87feb0$6400a8c0@bueswmlw> 26 сентября 2012 г. Новый закон "О бухгалтерском учете" Московский код; 7Ч2/9I_98 **** +7 (495)- 74291-98 Цель: Новый закон "О бухгалтерском учете" вступает в силу с 2013 года. Подготовка к применению требований закона займет много времени, поэтому начинать освоение новых норм нужно заранее. Минфин РФ спланировал разработку основных нормативных документов по бухгалтерскому учету и внедрение в России МСФО до 2015 года. Разберемся в новых правилах, которые уже приняты и к тех, принятие которых √ дело ближайшего будущего. Программа: 1. Правовой контекст, в котором будет действовать новый закон "О бухгалтерском учете": глобальная реформа бухучета, ее стратегия и направления в ближайшем будущем; рост значения бухгалтерского учета; сближение бухгалтерского и налогового учетов за счет грядущих изменений в НК РФ. 2. Сфера применения закона: * Отмена освобождения от ведения учета плательщиков УСН с 2013 года, постановка учета "упрощенцами", возможности упростить бухучет и сблизить его с налоговым. * Обязательно ли ведение бухучета самозанятыми гражданами (ИП, адвокатами, учредившими адвокатские кабинеты, нотариусами и иными лицами, занимающимися частной практикой) с 2013 года? * Филиалы и представительства иностранных компаний √ обязанности по ведению бухучета по российским стандартам в качестве вспомогательного с 2013 года. 3. Объекты бухгалтерского учета: новые доминанты. Обязательный учет всех фактов хозяйственной жизни (в том числе, при недостаточности информации и отсутствии первичных документов): как это сделать практически? Денежное измерение объектов бухгалтерского учета (сравним подход с правилами оценки в налоговом учете). 4. Организация ведения бухучета на предприятии. Бухгалтерская служба или аутсорсинг? Может ли руководитель совмещать должность главбуха по новому закону? Каковы новые требования к главному бухгалтеру или аутсорсеру (образование, стаж работы и т.п.)? Новые критерии повышения квалификации бухгалтеров. 5. Новые грани ответственности главного бухгалтера. Новые риски аутсорсера в связи законом ╧ 402-ФЗ. 6. Закон о бухгалтерском документообороте: * Первичная документация по-новому. Готовимся к вступлению нового закона в силу заранее. Возможен ли отказ от унифицированных форм первичной документации и в какой степени он оправдан на практике? Обязательна ли печать на первичных документах? Возможности использования факсимильной подписи на первичном документе в 2013 году. Возможности внедрения и развития электронного документооборота. * Новые требования к учетным регистрам. * Бухгалтерская отчетность по-новому. Состав отчетности Требование нового законодательства по адаптации форм отчетности для нужд организации, рекомендации по такой адаптации. Новые адреса и периодичность представления отчетности с 2013 года. Когда согласно новому закону бухгалтерская отчетность считается составленной? Новые правила публикации отчетности с 2013 года. * Правила хранения бухгалтерской документации на основании закона. 7. Требование закона к организации внутреннего контроля совершаемых фактов хозяйственной жизни, а также ведения бухгалтерского учета и составления бухгалтерской (финансовой) отчетности. Как составить процедуры контроля и реализовать их? Стоимость участия: 8 900 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 (Ч95) 7922I-22 ; (495) 7Ч2.91_98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5208 bytes Desc: not available URL: From kiccovich at gmail.com Thu Sep 13 02:09:49 2012 From: kiccovich at gmail.com (francesca recchia) Date: Thu, 13 Sep 2012 10:09:49 +0100 Subject: [drone-list] Paul Rogers on drones Message-ID: Suicide-bombs without the suicides: why drones are so cool http://www.opendemocracy.net/paul-rogers/suicide-bombs-without-suicides-why-drones-are-so-cool -- francesca recchia @kiccovich http://muftah.org/art+culture/ http://www.klatmagazine.com/wanderdust travel-snippets.tumblr.com _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From boomerang at bistrots.be Thu Sep 13 11:40:06 2012 From: boomerang at bistrots.be (=?koi8-r?B?IvDSydLPxM/PyNLBzs7PxSDawcvPzs/EwdTFzNjT1NfPIg==?=) Date: Thu, 13 Sep 2012 10:40:06 -0800 Subject: =?koi8-r?B?79TIz8TZINDSz8na18/E09TXwSDJINDP1NLFwszFzsnR?= Message-ID: <01cd919c$237e0700$f974ad7a@boomerang> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 314 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 66883 bytes Desc: not available URL: From regionallycx7 at quebecpop.com Wed Sep 12 22:32:16 2012 From: regionallycx7 at quebecpop.com (=?koi8-r?B?Iu3By9PJzcHM2M7B0SDSxcvMwc3BIg==?=) Date: Thu, 13 Sep 2012 11:02:16 +0530 Subject: =?koi8-r?B?7cXT0cMg0sHT09nMz8sgMjAgMDAw?= Message-ID: <9216417326.WA6BY298138@mugbypkzmw.zqsyppeg.su> Без ограничений по срокам. 22 рассылки + повтор в день выхода - 20 000 + Хостинг в подарок и домен РФ Тел: (495) 585-79-04 ICQ: 286-926-971 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 355 bytes Desc: not available URL: From guffawm106 at royalsnooker.com Wed Sep 12 21:22:45 2012 From: guffawm106 at royalsnooker.com (=?koi8-r?B?IuvB0tTJzsEi?=) Date: Thu, 13 Sep 2012 11:22:45 +0700 Subject: =?koi8-r?B?89TJzNjO2cog0M/EwdLPyyDTIMTP09TB18vPyiDOwSDEz80gLSDzy8nE?= =?koi8-r?B?y8EgNTAgJSE=?= Message-ID: ������� � ���� � ���������� ��������. �������� ���������! �������� ���������! ������� ������ 50 %! www.www.�������-�������.�� -------------- next part -------------- A non-text attachment was scrubbed... Name: diedrich.jpg Type: image/jpeg Size: 5866 bytes Desc: not available URL: From eugen at leitl.org Thu Sep 13 02:38:48 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 13 Sep 2012 11:38:48 +0200 Subject: [drone-list] Paul Rogers on drones Message-ID: <20120913093848.GY9750@leitl.org> ----- Forwarded message from francesca recchia ----- From eugen at leitl.org Thu Sep 13 02:39:52 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 13 Sep 2012 11:39:52 +0200 Subject: Counter Threat-Finance Analyst Message-ID: <20120913093952.GZ9750@leitl.org> https://sjobs.brassring.com/1033/ASP/TG/cim_jobdetail.asp?SID=&jobId=255705&type=search&JobReqLang=1&recordstart=351&JobSiteId=5010&JobSiteInfo=255705_5010&GQId=0&partnerid=25037&siteid=5010 Req ID 244705BR Industry Job Title Counter Threat-Finance Analyst Standard Job Code/Title E2483:Intelligence Analyst Sr Required skills Place of performance is MacDill AFB, Tampa, FL (Primary); USCENTCOM AOR (Secondary) 5-7 years joint interagency intel-ops fusion and/or counter-threat experience in the CT, CTF, and/or CD/CN communities. Minimum 4 years prior military/government service required. Bachelorbs or Masterbs Degrees in a related field is desired, but not necessary. OR 5-7 commercial anti-money laundering, financial investigation, or export compliance experience is acceptable in lieu of 2-4 years of joint interagency intel-ops fusion experience.Minimum of 7 years of hands-on analysis experience in one or more relevant military or defense industry functional area Top Secret/Specialized Compartmented Information Security Clearance Position requires ability to perform OCONUS deployment to theatre of operations Desired skills Experience working CT, CTF or CD/CN analysis Language experience with Dari Pashtu Specific Job Description High paced environment within U.S. Central Command with requirement to deploy to USCENTCOM AOR locations such as Afghanistan and Dubai, UAE. The CTF Operations-Intelligence Analyst shall coordinate USCENTCOM Operations Directorate CTF activities throughout USCENTCOM area of responsibility (AOR). SMEs will deploy to the AOR to support Combined Joint Operations Area (CJOA) Commanders, Task Force Commanders, and Interagency threat finance cells. Analyst shall Plan, organize, and coordinate the CTF activities in USCENTCOM AOR, ensuring that CTF activities comply with legal and regulatory requirements and meets the Commander, Component Commanders, deployed Task Forces, and other USG agencies/departmentbs operational needs and directives. Experienced and motivated analysts with significant CTF and joint-interagency analytical and intel-ops fusion experience to work on the leading edge of combating Counter-Narco-Terror illicit finance at USCENTCOM. Analysts shall have a strong working knowledge of various DoD, CTF and LE action instruments and directives including, but not limited to: Direct Action (Title 10/50) influence operations; Executive Order 13224; Foreign Terrorist Organization Designation; Commerce Denied Entities/Persons List; UNSCR 1988/1989. Analysts shall be intimately familiar with intelligence sharing with law enforcement and Treasury Department and on the use of LE and Treasury Department information within DoD and intelligence frameworks, with awareness of judicial discoverability and financial intelligence. Analysts should also have financial investigatory/forensic accounting experience in non-traditional arenas including drug money laundering, Sharia-compliant banking, terrorist finance, informal and formal money transfer mechanisms (hawala), trade based value transfers, and parallel reconstruction. Knowledge of emerging alternative and mobile payment methods is also desired (Bitcoin, Secondlife, etc). Analyst should also have experience with recommending intelligence collection strategies. Place of performance: MacDill AFB, Tampa, FL (Primary); USCENTCOM AOR (Secondary) 84 hour work week anticipatedin Afghanistan, in CENTCOM AOR a 48 hour work week. A 1 year deployment for Afghanistan and CENTCOM AOR staff. Standard Job Description Provides analysis and research for industry, infrastructure, technology, country, geographic area, biographic and targeted vulnerability. Prepares assessments of current events based on the sophisticated collection, research and analysis of classified and open source information. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. Collects data using a combination of standard intelligence methods and business processes. Security Clearance TS/SCI Typical Minimums Bachelors degree from an accredited college in a related discipline, or equivalent experience/combined education, with 5 years of professional experience; or 3 years of professional experience with a related Masters degree. Considered career, or journey, level. LMCareers Business Unit ESS0999 IS&GS-DEFENSE (S8200) Business Area Info Systems & Global Sol Program GTL CNTPO Department 6222024:Intel Tech-ClientSite OTO3(OS) Job Class Intelligence Analysis Job Category Experienced Professional City MacDill Air Force Base State Florida Relocation Available No Work Schedule FLEX-Non-Standard 40 hour week Req Type Blue Sky Direct/Indirect Direct Shift First From renddj836 at rosslynchapel.com Wed Sep 12 21:57:07 2012 From: renddj836 at rosslynchapel.com (=?koi8-r?B?IuvB0tTJzsEi?=) Date: Thu, 13 Sep 2012 11:57:07 +0700 Subject: =?koi8-r?B?89TJzNjO2cog0M/EwdLPyyDTIMTP09TB18vPyiDOwSDEz80gLSDzy8nE?= =?koi8-r?B?y8EgNTAgJSE=?= Message-ID: <84F58BE57054401283116EA1855C365B@thanhquan>

Картина в раме и подарочной упаковке. Упаковка бесплатно! Доставка бесплатно! Осенняя скидка 50 %!

www.подари-картину.рф -------------- next part -------------- A non-text attachment was scrubbed... Name: dickard.jpg Type: image/jpeg Size: 5866 bytes Desc: not available URL: From knitsfzh716 at redcoatpublishing.com Wed Sep 12 23:23:22 2012 From: knitsfzh716 at redcoatpublishing.com (=?koi8-r?B?IvTp8O/n8uHm6fEi?=) Date: Thu, 13 Sep 2012 13:23:22 +0700 Subject: =?koi8-r?B?9MnQz8fSwcbJ0SDEwcXUIMzV3tvJxSDDxc7ZIM7BINDPzMnH0sHGycA=?= Message-ID: <82FC380433374F11B74B290275DF8297@May6> Фабрика печати АТАКУЕТ ценами и сроками Московский рынок И ПРЕДЛАГАЕТ - Лучшее в регионе соотношение цена-качество на полиграфию (календари, каталоги, журналы, ПОС, брошюры, папки, кашировка...) в т.ч.- эксклюзивная полиграфия (сложные книги, нестандартная упаковка) - Логистика - склад Москва (доставка до клиента) - Офис - Курская (можно приехать посмотреть образцы) - Машины - формат А1, А2, полный комплекс постпечатки Посчитайте Ваши заказы - Вас приятно удивят наши цены и сервис! Москва 495-589-76-12 Написать нам Вы можете тут www.письмо-онлайн.рф From berardim at giverviaggi.com Thu Sep 13 05:27:35 2012 From: berardim at giverviaggi.com (=?koi8-r?B?IuvByyDOxSDT1MHU2CDawczP1s7Jy8/NINDPxN7JzsXOztnILiI=?=) Date: Thu, 13 Sep 2012 14:27:35 +0200 Subject: =?koi8-r?B?yc7EydfJxNXBzNjO2cUgw8XMySDQz8Teyc7Fzs7ZyC4=?= Message-ID: <01cd91bb$eaee2580$4048765c@berardim> Приглашаем Вас принять участие в ТРЕНИНГЕ: СОВРЕМЕННЫЙ ЭФФЕКТИВНЫЙ РУКОВОДИТЕЛЬ 15 - 16 октября 2012 г. Санкт-Петербург ************************************ ПРОГРАММА МЕРОПРИЯТИЯ: 1. Компетентность руководителя. ╥ Основные техники деловой коммуникации. ╥ Использование знаний о типологии личности в руководстве подчиненными. ╥ Стили руководства. ╥ Методы экспресс-диагностики сотрудников. 2. Функции менеджера в организации. ╥ Основные функции менеджмента. ╥ Цель распределения функций. ╥ Пирамида навыков менеджера. Что нужно знать для оперативного управления. ╥ Понятие, основные виды и методы планирования. Планирование работы отдела (подразделения, фирмы). ╥ Взаимосвязь функций. Как расставлять приоритеты: иерархия ценностей и целей. ╥ За что платят менеджеру (зона ответственности). 3. Постановка целей, планирование, координация и организация работы подчиненных: ╥ Целеполагание как основа любой деятельности. ╥ Расстановка приоритетов в соответствии с поставленными целями. ╥ Роль менеджера в трансформации целей организации в индивидуальные цели подчиненных. ╥ Основы профессиональной деятельности управленца. Чем именно мы управляем. Что такое управление. 4. Управление персоналом. ╥ Делегирование полномочий, ответственность и полномочия. Правила и принципы делегирования: кому, когда, как и зачем. ╥ Что можно и что нельзя делегировать. ╥ Организация повседневной деятельности сотрудников. Как поставить подчиненным задачу? Использование внешних и внутренних ресурсов. Правила, отчетность, стандарты и результаты. ╥ Организация и координация процесса работы отдела. ╥ Чего ждут от нас, и что ждем мы (подчиненные, коллеги и руководство). ╥ Лидер и менеджер √ в чем различие. ╥ Как не стать заложником подчиненных. ╥ На чьей стороне играем. ╥ Эффективные методы руководства и взаимодействия с подчиненными. Стили управления. Матрица ситуационного руководства. 5. Организация исполнения. ╥ Пошаговая методика. ╥ Технологии постановки задач: инструктирование. ╥ Классификация задач сотрудников. 6. Управленческое взаимодействие с подчиненными по вопросам, находящимся за рамками их сферы деятельности. ╥ Методы управления в подобных ситуациях. ╥ Способы определения и развития потенциала подчиненного. 7. Практика управления. ╥ Как оперативно получить обратную связь? ╥ Выявление сбоев и их причин. ╥ Информирование подчиненных (информационные тромбы?) ╥ Возврат и корректировка планов. ╥ Регулирование: аварийное и системное. ╥ Контроль повседневной деятельности подчиненных. ╥ Координация деятельности подчиненных на основе показателей деятельности. ╥ Системная связь между планированием, контролем и мотивацией. 8. Способы разрешения проблемных ситуаций с подчиненными. 9. Мотивация подчиненных: практические способы и методы. ************************************************* Зaнятия прoйдyт в цeнтрe Caнкт-Пeтeрбyргa в течение двyx днeй c 10:00 дo 18:00 c пeрeрывaми нa кoфe-брeйк и oбeд. Для пoлyчeния пoлнoй прoгрaммы и ycлoвий yчacтия cвяжитecь c нaми пo тeлeфoнy в Caнкт-Пeтeрбyргe: 8 [ код СПб ] 98-.6 8-2 -. 29 From eugen at leitl.org Thu Sep 13 07:07:05 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 13 Sep 2012 16:07:05 +0200 Subject: Crack in Internet's foundation of trust allows HTTPS session hijacking Message-ID: <20120913140705.GF9750@leitl.org> http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+arstechnica%2Findex+%28Ars+Technica+-+All+content%29 Crack in Internet's foundation of trust allows HTTPS session hijacking Attack dubbed CRIME breaks crypto used to prevent snooping of sensitive data. by Dan Goodin - Sep 13, 2012 7:47 am UTC Black Hat National Security A screen shot from a video showing CRIME decrypting the contents of an encrypted cookie used to authenticate a dropbox.com user account. Researchers have identified a security weakness that allows them to hijack web browser sessions even when they're protected by the HTTPS encryption that banks and ecommerce sites use to prevent snooping on sensitive transactions. The technique exploits web sessions protected by the Secure Sockets Layer and Transport Layer Security protocols when they use one of two data-compression schemes designed to reduce network congestion or the time it takes for webpages to load. Short for Compression Ratio Info-leak Made Easy, CRIME works only when both the browser and server support TLS compression or SPDY, an open networking protocol used by both Google and Twitter. Microsoft's Internet Explorer, Google's Chrome and Mozilla's Firefox browsers are all believed to be immune to the attack, but at time of writing smartphone browsers and a myriad of other applications that rely on TLS are believed to remain vulnerable. CRIME is the latest black eye for the widely used encryption protocols, which act as the Internet's foundation of trust by encrypting traffic that flows over open networks and cryptographically proving websites such as Gmail are really operated by Google rather than criminal hackers or state-sponsored spies. The specter of a new attack that could subvert one of the only widely available protections preventing the interception of sensitive e-mails and web transactions, follows revelations that both Iran and China have actively worked to defeat it so they could spy on its citizens. "The CRIME attack is the nation-state attack," Matthew Green, a professor specializing in cryptography at Johns Hopkins University, told Ars. "It's not something that some hackers are going to do when you're sitting in Starbucks. It's really something that Iran is going to do to try to find dissidents or China is going to do for the same reason. And it's a big deal because of that, especially if Google and Twitter are the ones who are vulnerable." Representatives from Google, Mozilla, and Microsoft said their companies' browsers weren't vulnerable to CRIME attacks. Both Google and Mozilla released patches after the weaknesses were privately reported by Juliano Rizzo and Thai Duong, the researchers who devised the CRIME exploits. Internet Explorer was never vulnerable because it never supported SPDY (pronounced "speedy") or the TLS compression scheme known as Deflate. That still leaves open the possibility that a raft of smaller browsers are susceptible. This webpage maintained by self-described "Web tinkerer" and Adobe employee Alexis Deveria says that SPDY is supported in beta versions of Opera and production versions of both Firefox and Chrome for Android, as well as the Android browser. Apple's Safari browser doesn't support SPDY, but its use of compression is unknown. The status of TLS compression in smaller browsers also remained unknown at time of writing. Rizzo told Ars that encryption schemes used in a variety of chat applications, virtual private networks, and other software may also be vulnerable. Even when a browser is vulnerable, an HTTPS session can only be hijacked when one of those browsers is used to connect to a site that supports SPDY or TLS compression. The Qualys SSL Labs page, which tracks the quality of sites that offer HTTPS protection, shows that services offered by Google and Twitter support SPDY. Ivan Ristic, director of engineering at security firm Qualys, told Ars that 42 percent of sites surveyed by his service support TLS compression. A demonstration video taken by Rizzo and Duong on Wednesday shows Github.com, Dropbox.com, and Stripe.com succumbing to the CRIME attack, although all three of those sites had disabled compression at time of writing, meaning they are no longer vulnerable. CRIME vs startups Both the GnuTLS and OpenSSL TLS implementations for clients and servers respectively support TLS, making it easy for developers and engineers to fold it into web servers. The chosen one Rizzo and Duong are the architects of a separate attack from last year that also defeated TLS protection. It was dubbed BEAST and was short for Browser Exploit Against SSL/TLS). Like that attack, compression-based exploits wield what cryptographers call a chosen plaintext attack on an encrypted session. The technique mixes clear-text data under the control of the attacker with the encrypted payload being targeted. By modifying the clear-text payload hundreds or thousands of times and watching how each one interacts with the encrypted data, an attacker can deduce its contents, usually character by character. Such attacks can be particularly useful against SSL, since the beginning of each web HTML request contains an authentication cookie with a secret key (which may look something like XS8b1MWZ0QEKJtM1t+QCofRpCsT2u). In a CRIME attack, the encrypted message is combined with attacker-controlled JavaScript that, letter by letter, performs a brute-force attack on the secret key. When it guesses the letter X as the first character of the cookie secret, the encrypted message will appear differently than an encrypted message that uses W or Y. Once the first character is correctly guessed, the attack repeats the process again on the next character in the key until the remainder of the secret is deduced. Once the session cookie is decrypted, hackers can exploit it to gain unauthorized access to the user account the session cookie is designed to authenticate. The process from start to finish takes "a few minutes," Rizzo said. Data compression reduces the number of bytes contained in a file or data stream by removing redundant information. CRIME forces a web browser to compress and encrypt requests that contain attacker-controlled data that is combined with the cookie secret. If one of the requests produces fewer encrypted network packets, that's an indication there's more redundancy in the request, and hence the attacker data and the secret data have more information in common. CRIME algorithms decrypt the session cookies by guessing their contents byte by byte. The attacks don't require any browser plugins, and the use of JavaScript isn't necessary, although it does make the brute-force attack faster. A side effect of compression, security experts have long known, is that it leaks clues about the encrypted contents. That means it provides a "side channel" to adversaries who have the ability to monitor the data. A research paper published in 2002 by John Kelsey looks eerily similar to CRIME, but only in retrospect. "I don't think anyone realized that this enables an attack on HTTP over TLS, or that an attacker could learn the value of secret cookies sent over a TLS-encrypted connection," a participant in this online discussion observed. "The paper looks at attacks on compression mainly in the abstract, rather than in the specific context of the web, and is pretty theoretical. So, CRIME (or Thomas Pornin's attack) is still a significant novel extension of these ideas." ("Pornin's attack" is a reference to an exploit described in this blog post, in which the well known cryptographer by that name correctly guessed how CRIME worked based on bare-bones clues offered in previous news coverage of the attack. Other speculation that proved to be correct is here.) Chain of fools Last year's BEAST attack worked only against an encryption mode known as cipher block chaining. That limitation allowed engineers to block attacks by using encryption algorithms such as RC4, which don't rely on the mode. There is no such restriction with compression attacks, so the only known way to block them is to disable TLS compression or apply a SPDY patch that's comparable to the one recently added to Chrome. Rizzo and Duong are scheduled to demonstrate CRIME on September 21 at the Ekoparty security conference in Buenos Aires. Although the attack no longer works on the three most popular browsers to connect to HTTPS-protected websites, CRIME is a potent reminder of the fragility of the protection of encryption. But it likely won't be the last. "It is easy to try the idea with a short script," Rizzo told Ars. "It's a practical attack against HTTPS and could be a starting point to attack other secure protocols. It's another powerful tool for attackers with access to your network." Story updated to add Safari details. From eugen at leitl.org Thu Sep 13 09:25:12 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 13 Sep 2012 18:25:12 +0200 Subject: Secrecy News -- 09/13/12 Message-ID: <20120913162512.GM9750@leitl.org> ----- Forwarded message from Steven Aftergood ----- From av-contact at nerim.net Thu Sep 13 07:30:02 2012 From: av-contact at nerim.net (=?koi8-r?B?IuvPz9LEyc7Bw8nRIMTF0dTFzNjOz9PUySDQz8Teyc7Fzs7ZyC4i?=) Date: Thu, 13 Sep 2012 18:30:02 +0400 Subject: =?koi8-r?B?89TJzMkg1dDSwdfMxc7J0S4g?= Message-ID: <01cd91dd$c99e3100$c044d025@av-contact> Приглашаем Вас принять участие в ТРЕНИНГЕ: СОВРЕМЕННЫЙ ЭФФЕКТИВНЫЙ РУКОВОДИТЕЛЬ 15 - 16 октября 2012 г. Санкт-Петербург *********************************************** ПРОГРАММА МЕРОПРИЯТИЯ: 1. Компетентность руководителя. ╥ Основные техники деловой коммуникации. ╥ Использование знаний о типологии личности в руководстве подчиненными. ╥ Стили руководства. ╥ Методы экспресс-диагностики сотрудников. 2. Функции менеджера в организации. ╥ Основные функции менеджмента. ╥ Цель распределения функций. ╥ Пирамида навыков менеджера. Что нужно знать для оперативного управления. ╥ Понятие, основные виды и методы планирования. Планирование работы отдела (подразделения, фирмы). ╥ Взаимосвязь функций. Как расставлять приоритеты: иерархия ценностей и целей. ╥ За что платят менеджеру (зона ответственности). 3. Постановка целей, планирование, координация и организация работы подчиненных: ╥ Целеполагание как основа любой деятельности. ╥ Расстановка приоритетов в соответствии с поставленными целями. ╥ Роль менеджера в трансформации целей организации в индивидуальные цели подчиненных. ╥ Основы профессиональной деятельности управленца. Чем именно мы управляем. Что такое управление. 4. Управление персоналом. ╥ Делегирование полномочий, ответственность и полномочия. Правила и принципы делегирования: кому, когда, как и зачем. ╥ Что можно и что нельзя делегировать. ╥ Организация повседневной деятельности сотрудников. Как поставить подчиненным задачу? Использование внешних и внутренних ресурсов. Правила, отчетность, стандарты и результаты. ╥ Организация и координация процесса работы отдела. ╥ Чего ждут от нас, и что ждем мы (подчиненные, коллеги и руководство). ╥ Лидер и менеджер √ в чем различие. ╥ Как не стать заложником подчиненных. ╥ На чьей стороне играем. ╥ Эффективные методы руководства и взаимодействия с подчиненными. Стили управления. Матрица ситуационного руководства. 5. Организация исполнения. ╥ Пошаговая методика. ╥ Технологии постановки задач: инструктирование. ╥ Классификация задач сотрудников. 6. Управленческое взаимодействие с подчиненными по вопросам, находящимся за рамками их сферы деятельности. ╥ Методы управления в подобных ситуациях. ╥ Способы определения и развития потенциала подчиненного. 7. Практика управления. ╥ Как оперативно получить обратную связь? ╥ Выявление сбоев и их причин. ╥ Информирование подчиненных (информационные тромбы?) ╥ Возврат и корректировка планов. ╥ Регулирование: аварийное и системное. ╥ Контроль повседневной деятельности подчиненных. ╥ Координация деятельности подчиненных на основе показателей деятельности. ╥ Системная связь между планированием, контролем и мотивацией. 8. Способы разрешения проблемных ситуаций с подчиненными. 9. Мотивация подчиненных: практические способы и методы. ----------------------------------------------- Зaнятия прoйдyт в цeнтрe Caнкт-Пeтeрбyргa в течение двyx днeй c 10:00 дo 18:00 c пeрeрывaми нa кoфe-брeйк и oбeд. Для пoлyчeния пoлнoй прoгрaммы и ycлoвий yчacтия cвяжитecь c нaми пo тeлeфoнy в Caнкт-Пeтeрбyргe: 8 [ код СПб ] 98-.6 8-2 -. 29 From ann_kelly at archway.com Thu Sep 13 06:49:03 2012 From: ann_kelly at archway.com (=?koi8-r?B?Iu3B0snOwSDp083Bx8nMz9fOwSI=?=) Date: Thu, 13 Sep 2012 20:49:03 +0700 Subject: =?koi8-r?B?4sXazMnNydTO2cogzcXWx8/Sz8QgKyDNz9PLz9fTy8nKIM7PzcXS?= Message-ID: <01cd91f1$353dc980$c5b50275@ann_kelly> БЕЗЛИМИТНЫЕзвонки по межгородувсего3000 руб. в месяц.Всезоны РФ (фиксированная и мобильная связь) Звоните сегодня:(495) 225-04-62 МНОГОКАНАЛЬНЫЙномер Прямой московский номер 495, 499Абонентская плата ≈ 300руб./месяцБольшой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы нипереехали- Все возможности АТС (голосовоеприветствие, голосовая почта и т.д.) включены в абонентскую плату - Экономия на покупке телефоннойстанции -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2845 bytes Desc: not available URL: From aslycee at saint-joseph.com Thu Sep 13 09:50:25 2012 From: aslycee at saint-joseph.com (=?koi8-r?B?IvDSydLPxM/PyNLBzs7PxSDawcvPzs/EwdTFzNjT1NfPIg==?=) Date: Fri, 14 Sep 2012 01:50:25 +0900 Subject: =?koi8-r?B?79TIz8TZINDSz8na18/E09TXwSDJINDP1NLFwszFzsnR?= Message-ID: <01cd921b$4ef40680$18abf2cb@aslycee> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 316 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 66883 bytes Desc: not available URL: From gastronomicp2 at rayprotech.com Fri Sep 14 03:46:30 2012 From: gastronomicp2 at rayprotech.com (=?koi8-r?B?Iu3By9PJzcHM2M7B0SDSxcvMwc3BIg==?=) Date: Fri, 14 Sep 2012 02:46:30 -0800 Subject: =?koi8-r?B?MjIg0sHT09nMy8kgKyDQz9fUz9Ig1yDExc7YINfZyM/EwSAtIDIwIDAw?= =?koi8-r?B?MCA=?= Message-ID: <607913D2558F4218AF92AE9F94C88E24@city2> 2 рассылки - 5 000 8 рассылок 10 000 + Хостинг в подарок и домен РФ 22 рассылки + повтор в день выхода - 20 000 + Хостинг в подарок и домен РФ База россия 23 млн Мы советуем делать не 1 рассылки и даже не 2. И по возможности это 2 рассылки не менять текст и вид письма. Реклама даже такая все равно реклама - и она строится по основам психологии. Вы замечали что вся реклама идет "Валом" даже по телевизору часто можно увидеть, что рекламный ролик идет дважды. Есть психологическая схема восприятия товара Вот смотрите Вы получили письмо первый раз и почти наверняка уго удалите даже не рассматривая елси вам оно пришло еще раз вы посмотрите и удалите на третий раз оно вас разозлит и вы его прочтете а потом уже подсознательно получая его будите задумываться что а может оно мне нужно. реклама идет по принципу детской игры "Купи слона" под конец все говорят "хорошо куплю"! Тел: (495) 585-79-04 ICQ: 286 926 971 From brian.garvan at eviivo.com Thu Sep 13 15:02:35 2012 From: brian.garvan at eviivo.com (=?koi8-r?B?Iv7UzyDNz9bOzyDJIN7UzyDOxczY2tEgxMXMxcfJ0s/XwdTYLiI=?=) Date: Fri, 14 Sep 2012 05:02:35 +0700 Subject: =?koi8-r?B?/tTPIM7V1s7PINrOwdTYIMTM0SDP0MXSwdTJ187Px88g1dDSwdfMxQ==?= =?koi8-r?B?zsnRLg==?= Message-ID: <01cd9236$275e6780$4b7b4973@brian.garvan> Приглашаем Вас принять участие в ТРЕНИНГЕ: СОВРЕМЕННЫЙ ЭФФЕКТИВНЫЙ РУКОВОДИТЕЛЬ 15 - 16 октября 2012 г. Санкт-Петербург ---------------------------------------------------------------------------------------- ПРОГРАММА МЕРОПРИЯТИЯ: 1. Компетентность руководителя. ╥ Основные техники деловой коммуникации. ╥ Использование знаний о типологии личности в руководстве подчиненными. ╥ Стили руководства. ╥ Методы экспресс-диагностики сотрудников. 2. Функции менеджера в организации. ╥ Основные функции менеджмента. ╥ Цель распределения функций. ╥ Пирамида навыков менеджера. Что нужно знать для оперативного управления. ╥ Понятие, основные виды и методы планирования. Планирование работы отдела (подразделения, фирмы). ╥ Взаимосвязь функций. Как расставлять приоритеты: иерархия ценностей и целей. ╥ За что платят менеджеру (зона ответственности). 3. Постановка целей, планирование, координация и организация работы подчиненных: ╥ Целеполагание как основа любой деятельности. ╥ Расстановка приоритетов в соответствии с поставленными целями. ╥ Роль менеджера в трансформации целей организации в индивидуальные цели подчиненных. ╥ Основы профессиональной деятельности управленца. Чем именно мы управляем. Что такое управление. 4. Управление персоналом. ╥ Делегирование полномочий, ответственность и полномочия. Правила и принципы делегирования: кому, когда, как и зачем. ╥ Что можно и что нельзя делегировать. ╥ Организация повседневной деятельности сотрудников. Как поставить подчиненным задачу? Использование внешних и внутренних ресурсов. Правила, отчетность, стандарты и результаты. ╥ Организация и координация процесса работы отдела. ╥ Чего ждут от нас, и что ждем мы (подчиненные, коллеги и руководство). ╥ Лидер и менеджер √ в чем различие. ╥ Как не стать заложником подчиненных. ╥ На чьей стороне играем. ╥ Эффективные методы руководства и взаимодействия с подчиненными. Стили управления. Матрица ситуационного руководства. 5. Организация исполнения. ╥ Пошаговая методика. ╥ Технологии постановки задач: инструктирование. ╥ Классификация задач сотрудников. 6. Управленческое взаимодействие с подчиненными по вопросам, находящимся за рамками их сферы деятельности. ╥ Методы управления в подобных ситуациях. ╥ Способы определения и развития потенциала подчиненного. 7. Практика управления. ╥ Как оперативно получить обратную связь? ╥ Выявление сбоев и их причин. ╥ Информирование подчиненных (информационные тромбы?) ╥ Возврат и корректировка планов. ╥ Регулирование: аварийное и системное. ╥ Контроль повседневной деятельности подчиненных. ╥ Координация деятельности подчиненных на основе показателей деятельности. ╥ Системная связь между планированием, контролем и мотивацией. 8. Способы разрешения проблемных ситуаций с подчиненными. 9. Мотивация подчиненных: практические способы и методы. ************************************************************* Зaнятия прoйдyт в цeнтрe Caнкт-Пeтeрбyргa в течение двyx днeй c 10:00 дo 18:00 c пeрeрывaми нa кoфe-брeйк и oбeд. Для пoлyчeния пoлнoй прoгрaммы и ycлoвий yчacтия cвяжитecь c нaми пo тeлeфoнy в Caнкт-Пeтeрбyргe: 8 [ код СПб ] 98-.6 8-2 -. 29 From bonbkokingcom at seocontent.ru Thu Sep 13 21:25:26 2012 From: bonbkokingcom at seocontent.ru (=?koi8-r?B?7c/ExczYIMLAxNbF1ME=?=) Date: Fri, 14 Sep 2012 09:25:26 +0500 Subject: =?koi8-r?B?8M/T1NLPxc7JxSwg187FxNLFzsnFLCDQzMHOz9fPx88gwsDE1sXUwQ==?= Message-ID: <000d01cd9230$f6d8a0d0$6400a8c0@bonbkokingcom> Тема: Обучение: Разработка бизнес плана (изучение его структуры). 8 (499) ЧЧ54О95 \\// +7 (495)- 7Ч291_98 Суть обучения!!! очень проста: Вас приглашают в компьютерный класс, где 2 дня с вами занимаются, супер профессионалы (тяжеловесы в финансовом планировании), все два дня Вы являетесь настоящими участниками практического семинара, получаете знания и для закрепления тем выполняете задания, выполняете их на компьютере оснащенным специализированным программным комплексом. Все пробуете Сами, и только Сами. По Окончании курса Вас оснащают лицензионной, полнорабочей специализированной версией программы, для разработки бизнес планов и инвестиционных проектов, Вы прибываете на предприятие, устанавливает продукт на свой компьютер и начинаете сразу работать (без всякой головной боли) - Вот так! Просто! мы делает профессионалов! Краткая информация о предстоящем мероприятии: Дата учебного курса: 24-25 сентября 2012г. Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. Сочетание методов обучения с практикой - позволит достичь максимальных результатов в освоении материала. Все наглядно и просто. На первом этапе излагается теория, на втором рассматриваются закономерности, почему теория не совместима с практикой, на третьем этапе формируется задача и рассматриваются фин. методы ее решения, на четвертом участник самостоятельно решает задачу используя компьютер оснащенный специализированным ПО. Рассмотрение финансовых методов для каждого рода деятельности в отдельности, усиление восприятия информации с помощью специализированного расширенного методического материала. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: * Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. * Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). * Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. * Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него участник семинара может эффективно разрабатывать свои сценарии финансовых проектов. Информацию можно получить по телефонам: 8 (495) 792/21/22 <> +7 (Ч95) 7Ч2*9198 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4951 bytes Desc: not available URL: From kleinesk-sw at jenniferlopezfan.com Thu Sep 13 21:47:36 2012 From: kleinesk-sw at jenniferlopezfan.com (=?koi8-r?B?7c/ExczYIMLAxNbF1ME=?=) Date: Fri, 14 Sep 2012 10:17:36 +0530 Subject: =?koi8-r?B?8sHa0sHCz9TLwSDJztfF09QuINDSz8XL1MEgzsEg0NLFxNDSydHUycku?= =?koi8-r?B?IA==?= Message-ID: <000d01cd9234$0fec46f0$6400a8c0@kleinesk-sw> Тема: Разработка финансовой документации (бизнес √ плана, ТЭО) практическая реализация. +7 499 Ч45/ЧО/95 и +7 499 - 4Ч5-4О/95 Суть обучения!!! очень проста: Вас приглашают в компьютерный класс, где 2 дня с вами занимаются, супер профессионалы (тяжеловесы в финансовом планировании), все два дня Вы являетесь настоящими участниками практического семинара, получаете знания и для закрепления тем выполняете задания, выполняете их на компьютере оснащенным специализированным программным комплексом Все пробуете Сами, и только Сами. По Окончании курса Вас оснащают лицензионной, полнорабочей специализированной версией программы, для разработки бизнес планов и инвестиционных проектов, Вы прибываете на предприятие, устанавливает продукт на свой компьютер и начинаете сразу работать (без всякой головной боли) - Вот так! Просто! мы делает профессионалов! Информация об учебном курсе: Дата учебного курса: 24-25 сентября 2012г. Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. Сочетание методов обучения с практикой - позволит достичь максимальных результатов в освоении материала. Все наглядно и просто. На первом этапе излагается теория, на втором рассматриваются закономерности, почему теория не совместима с практикой, на третьем этапе формируется задача и рассматриваются фин. методы ее решения, на четвертом участник самостоятельно решает задачу используя компьютер оснащенный специализированным ПО. Рассмотрение финансовых методов для каждого рода деятельности в отдельности, усиление восприятия информации с помощью специализированного расширенного методического материала. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: * Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. * Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). * Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. * Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него участник семинара может эффективно разрабатывать свои сценарии финансовых проектов. Информацию можно получить по телефонам: \Моск. код/ 7Ч2_9198 \\\/// 8 (495) 79221\22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4410 bytes Desc: not available URL: From bandiedmr9 at rebsamen.com Thu Sep 13 23:56:32 2012 From: bandiedmr9 at rebsamen.com (=?koi8-r?B?IvfFwsnOwdIi?=) Date: Fri, 14 Sep 2012 12:26:32 +0530 Subject: =?koi8-r?B?99kgzsUgzc/WxdTFINXXz8zJ1NggzsXSwcTJ18/HzyDTz9TS1cTOycvB?= =?koi8-r?B?Pw==?= Message-ID: Сегодня 14 сентября 2012 г. пройдет онлайн-семинар посвященный найму и увольнению сотрудников в сложных ситуациях. Более подробно тут: www.вебинар-2012.рф From bo at legmed.ru Fri Sep 14 01:04:34 2012 From: bo at legmed.ru (=?koi8-r?B?4sDE1sXUydLP18HOycU=?=) Date: Fri, 14 Sep 2012 16:04:34 +0800 Subject: =?koi8-r?B?4sDE1sXUydLP18HOycU6IOvV0tPZINMg0NLPx9LBzc3Pyg==?= Message-ID: <39836C75C7444357AAD3DEBC24F524E3@admin> Тема: Финансовое моделирование: создание и управление бюджетом +7 (495)- 74291.98 \\// +7 Ч95 742\9I.98 Суть обучения!!! очень проста: Вас приглашают в компьютерный класс, где 2 дня с вами занимаются, супер профессионалы (тяжеловесы в финансовом планировании), все два дня Вы являетесь настоящими участниками практического семинара, получаете знания и для закрепления тем выполняете задания, выполняете их на компьютере оснащенным специализированным программным комплексом. Все пробуете Сами, и только Сами. По Окончании курса Вас оснащают лицензионной, полнорабочей специализированной версией программы, для разработки бизнес планов и инвестиционных проектов, Вы прибываете на предприятие, устанавливает продукт на свой компьютер и начинаете сразу работать (без всякой головной боли) - Вот так! Просто! мы делает профессионалов! Краткая информация о семинаре: Дата: 24-25 сентября 2012г. Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. Сочетание методов обучения с практикой - позволит достичь максимальных результатов в освоении материала. Все наглядно и просто. На первом этапе излагается теория, на втором рассматриваются закономерности, почему теория не совместима с практикой, на третьем этапе формируется задача и рассматриваются фин. методы ее решения, на четвертом участник самостоятельно решает задачу используя компьютер оснащенный специализированным ПО. Рассмотрение финансовых методов для каждого рода деятельности в отдельности, усиление восприятия информации с помощью специализированного расширенного методического материала. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: * Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. * Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). * Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. * Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него участник семинара может эффективно разрабатывать свои сценарии финансовых проектов. За более подробной информацuей обpащайтеcь по тел: 8 (495) 792\2I_22 <<<>>> код (495) - 7\42.91\98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4554 bytes Desc: not available URL: From jya at pipeline.com Fri Sep 14 13:08:03 2012 From: jya at pipeline.com (John Young) Date: Fri, 14 Sep 2012 16:08:03 -0400 Subject: [drone-list] GAO: Addressing Privacy Concerns for Integration of UAS into National Airspace Message-ID: http://www.gao.gov/products/GAO-12-981 Full report: http://www.gao.gov/assets/650/648348.pdf Unmanned Aircraft Systems: Measuring Progress and Addressing Potential Privacy Concerns Would Facilitate Integration into the National Airspace System GAO-12-981, Sep 14, 2012 What GAO Found Progress has been made, but additional work is needed to overcome many of the obstacles to the safe integration of unmanned aircraft systems (UAS) that GAO identified in 2008. GAO reported in 2008 that UAS could not meet the aviation safety requirements developed for manned aircraft and that this posed several obstacles to safe and routine operation in the national airspace system. These obstacles still exist and include the inability for UAS to sense and avoid other aircraft and airborne objects in a manner similar to manned aircraft; vulnerabilities in the command and control of UAS operations; the lack of technological and operational standards needed to guide safe and consistent performance of UAS; and final regulations to accelerate the safe integration of UAS into the national airspace system. The Joint Planning and Development Office of the FAA has provided UAS stakeholders with a framework to collaborate and coordinate their UAS integration efforts. Congress set forth specific requirements and deadlines in the FAA Modernization and Reform Act of 2012 for FAA to safely accelerate UAS integration. FAA, in coordination with stakeholders, has begun making progress toward completing those requirements, but has missed one deadline and could miss others. Many of the requirements entail significant work, including completing planning efforts and issuing a final rule for small UAS. Most of the requirements are to be achieved by December 2015. While FAA has taken steps to meet them, it is uncertain when the national airspace system will be prepared to accommodate UAS given that these efforts are occurring simultaneously and without monitoring to assess the quality of progress over time toward the deadlines Congress established. Better monitoring can help FAA understand what has been achieved and what remains to be done and can also help keep Congress informed about this significant change to the aviation landscape. Concerns about national security, privacy, and the interference in Global Positioning-System (GPS) signals have not been resolved and may influence acceptance of routine access for UAS in the national airspace system. The Department of Homeland Security's (DHS) Transportation Security Administration (TSA) has the authority to regulate security of all modes of transportation, including non-military UAS. Working with FAA and other federal agencies, TSA implements security procedures, such as airspace restrictions like those limiting operations into and out of Ronald Reagan National Airport. In 2008, GAO recommended that TSA examine the security implications of non-military UAS. According to a TSA official, it recently reviewed its UAS related advisories and determined that they are still applicable. TSA has not provided information on its efforts to mitigate security implications of UAS, and GAO believes TSA should act on this recommendation. Stakeholder privacy concerns include the potential for increased amounts of government surveillance using technologies placed on UAS, the collection and use of such data, and potential violations of constitutional Fourth Amendment protections against unreasonable search and seizures. Currently, no federal agency has specific statutory responsibility to regulate privacy matters relating to UAS for the entire federal government. Some stakeholders have suggested that DHS or the Department of Justice (DOJ) might be better positioned to address privacy issues since they generally stem from the operational uses of UAS for governmental surveillance and law enforcement purposes. Working proactively to address security and privacy concerns could help prevent further delays in UAS integration. Finally, non-military UAS GPS signals are unencrypted, risking potential interruption of the command and control of UAS. _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bounce at australia.care2.com Fri Sep 14 06:35:25 2012 From: bounce at australia.care2.com (=?koi8-r?B?IuvV0tMg0M8g3MvT0MXS1MnaxSDQ0s/N2dvMxc7Oz8ogwsXaz9DB0w==?= =?koi8-r?B?zs/T1Mki?=) Date: Fri, 14 Sep 2012 22:35:25 +0900 Subject: =?koi8-r?B?8NLPzdnbzMXOzsHRIMLF2s/QwdPOz9PU2A==?= Message-ID: <01cd92c9$3b9f7480$5b9b370e@bounce> Приглашаем всех руководителей на курс повышения квалификации: Экспертиза промышленной безопасности. Разработка документации. Ответственность за нарушение законодательства о промышленной безопасности. Курс пройдет в период с 24 по 25 сентября, в Санкт-Петербурге Темы, которые будут освещены в рамках курса: 1)Федеральный закон N 116-ФЗ «О промышленной безопасности опасных производственных объектов». 2)Виды надзора экспертизы промышленной безопасности. 3)Разработка документации для получения лицензий Ростехнадзора. 4)Соответствие объекта экспертизы предъявляемым к нему требованиям промышленной безопасности. 5)Регистрация опасных производственных объектов в реестр. 6)Административный регламент Федеральной службы по экологическому, технологическому и атомному надзору
7)Ответственность за нарушение законодательства РФ о промышленной безопасности опасных производственных объектов. Дополнительная информация доступна при обращении по телефону: (812) 642-53-41 С уважением, Центр Подготовки Специалистов. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2100 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 9156 bytes Desc: not available URL: From bowdell at mich.com Fri Sep 14 14:47:31 2012 From: bowdell at mich.com (=?koi8-r?B?Iu3JyMHJzCI=?=) Date: Fri, 14 Sep 2012 23:47:31 +0200 Subject: =?koi8-r?B?58/S0d7FxSEg9+nk5TAgLSDk7PEg7fX2/unuISBIRCDLwd7F09TXzw==?= =?koi8-r?B?IQ==?= Message-ID: <400478563.72109753823308@mich.com> 151 П О Р Н О ФИЛЬМ 2012г. БЕСПЛАТНАЯ ДОСТАВКА КУРЬЕРОМ ПО РОССИИ! Blu-Ray формат 400 часов видео! Жесткий диск в подарок! Стоимость 1 фильма всего 71 р.! БЕЗ ОТПРАВКИ SMS и СКАЧИВАТЬ НЕ НУЖНО! Вся информация на нашем сайте ------------------------------------------------------------------------------ --->>> http://purchase.151video.ru ------------------------------------------------------------------------------ ICQ 9940204 ------------------------------------------------------------------------------ From betsy at shilaw.com Fri Sep 14 14:59:27 2012 From: betsy at shilaw.com (=?koi8-r?B?Iu3B0snOwSI=?=) Date: Fri, 14 Sep 2012 23:59:27 +0200 Subject: =?koi8-r?B?79TMyd7Oz8UhIPfp5OXvIC0g5OzxIO319v7p7iEgYmx1LXJheSDLwQ==?= =?koi8-r?B?3sXT1NfPIQ==?= Message-ID: <287753481.30103873094770@shilaw.com> 151 П О Р Н О ФИЛЬМ 2012г. БЕСПЛАТНАЯ ДОСТАВКА КУРЬЕРОМ ПО РОССИИ! Blu-Ray формат 400 часов видео! Жесткий диск в подарок! Стоимость 1 фильма всего 71 р.! БЕЗ ОТПРАВКИ SMS и СКАЧИВАТЬ НЕ НУЖНО! Вся информация на нашем сайте ---------------------------------------- --->>> http://market.151film.ru ---------------------------------------- icq 9-9-4-0-2-0-4 ---------------------------------------- From aeide at oreck.com Fri Sep 14 08:23:30 2012 From: aeide at oreck.com (=?koi8-r?B?IuvV0tMg0M8g0NLPzdnbzMXOzs/KIMLF2s/QwdPOz9PUySI=?=) Date: Sat, 15 Sep 2012 00:23:30 +0900 Subject: =?koi8-r?B?8NLPzdnbzMXOzsHRIMLF2s/QwdPOz9PU2A==?= Message-ID: <01cd92d8$54fbed00$905fcc77@aeide> Приглашаем всех руководителей на курс повышения квалификации: Экспертиза промышленной безопасности. Разработка документации. Ответственность за нарушение законодательства о промышленной безопасности. Курс пройдет в период с 24 по 25 сентября, в Санкт-Петербурге Темы, которые будут освещены в рамках курса: 1)Федеральный закон N 116-ФЗ «О промышленной безопасности опасных производственных объектов». 2)Виды надзора экспертизы промышленной безопасности. 3)Разработка документации для получения лицензий Ростехнадзора. 4)Соответствие объекта экспертизы предъявляемым к нему требованиям промышленной безопасности. 5)Регистрация опасных производственных объектов в реестр. 6)Административный регламент Федеральной службы по экологическому, технологическому и атомному надзору
7)Ответственность за нарушение законодательства РФ о промышленной безопасности опасных производственных объектов. Дополнительная информация доступна при обращении по телефону: (812) 642-53-41 С уважением, Центр Подготовки Специалистов. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2101 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 9156 bytes Desc: not available URL: From bowling at sanantoniocvb.com Fri Sep 14 15:53:31 2012 From: bowling at sanantoniocvb.com (=?koi8-r?B?IuXXx8XOycog7sXT1MXSxc7LzyI=?=) Date: Sat, 15 Sep 2012 01:53:31 +0300 Subject: =?koi8-r?B?79TMyd7Oz8UhIOvp7jAgLSDk7PEg9/ry7/Ps+eghIEhEIMvB3sXT1A==?= =?koi8-r?B?188h?= Message-ID: <414210411.72013382838114@sanantoniocvb.com> 151 ФИЛЬМ ДЛЯ В З Р О С Л Ы Х 2012год! Цена за один фильм 71 руб! 400 часов видео Blu-Ray качества! Жесткий диск в подарок! И бесплатная доставка по всей России курьером! ОТПРАВЛЯТЬ СМС НЕ НАДО! НЕ НАДО СКАЧИВАТЬ! Информация на нашем сайте ------------------------------------------------------------------- --->>> http://class.151film.ru ------------------------------------------------------------------- icq 9-94-0-20-4 ------------------------------------------------------------------- From ablfqt at scch.at Fri Sep 14 14:29:57 2012 From: ablfqt at scch.at (=?koi8-r?B?IuDSycog89TF0MHOz9fJ3iI=?=) Date: Sat, 15 Sep 2012 06:29:57 +0900 Subject: =?koi8-r?B?7NXe28XFISBWSURFTyAtIOTs8SD3+vLv8+z56CEgSEQgy8HexdPU1w==?= =?koi8-r?B?zyE=?= Message-ID: <01cd930b$8641e080$f69bca77@ablfqt> 151 П О Р Н О ФИЛЬМ 2012г. БЕСПЛАТНАЯ ДОСТАВКА КУРЬЕРОМ ПО РОССИИ! Blu-Ray формат 400 часов видео! Жесткий диск в подарок! Стоимость 1 фильма всего 71 р.! БЕЗ ОТПРАВКИ SMS и СКАЧИВАТЬ НЕ НУЖНО! Вся информация на нашем сайте --------------------------------------------------------------------------------------------- --->>> http://cool.151video.ru --------------------------------------------------------------------------------------------- аська 9940204 --------------------------------------------------------------------------------------------- From eugen at leitl.org Fri Sep 14 22:39:37 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 15 Sep 2012 07:39:37 +0200 Subject: [drone-list] GAO: Addressing Privacy Concerns for Integration of UAS into National Airspace Message-ID: <20120915053937.GM9750@leitl.org> ----- Forwarded message from John Young ----- From Royyy at chiemsee.ru Sat Sep 15 14:29:37 2012 From: Royyy at chiemsee.ru (Curtis Martin) Date: Sun, 16 Sep 2012 05:29:37 +0800 Subject: Dont get paid less just because you havent got a degree. Get it online. Message-ID: <02B3A2E9.6739E592@chiemsee.ru> How are you doing? I�ve heard you�re planning to get a promotion soon. Back up your knowledge and practical experience with a customized diploma! Our telephone numbers for citizens of America 1-603-509-2001 and for citizens of other countries +1-603-509-2001 Please Inform your name and phone number (country code) and our staff members will get back to you promptly! From jya at pipeline.com Sun Sep 16 07:32:54 2012 From: jya at pipeline.com (John Young) Date: Sun, 16 Sep 2012 10:32:54 -0400 Subject: FBI Has No Files on Cypherpunks Message-ID: Federal Bureau of Investigation September 10, 2012 FOIPA Request No. 1198150-00 Subject: CYPHERPUNKS "Based the information you provided we conducted a search of the Central Records System. We were unable to identify main file records responsive to the FOIA." Now with one record, our emailed FOIA request: August 31, 2012 Federal Bureau of Investigation Attn: FOI/PA Request Record/Information Dissemination Section 170 Marcel Drive Winchester, VA 22602-4843 Dear FBI FOIA Office, Under provisions of the FOIA I request any and all FBI records on the group "Cypherpunks" affiliated with the online Cypherpunk Mail List established in 1992 and continuing to the present. A description of the Cypherpunks group and some of its members, including me, is available on Wikipedia: http://en.wikipedia.org/wiki/Cypherpunks This material will be published on the public education website Cryptome.org of which I am the administrator. I agree to pay for costs associated with this request as provided by the FOIA. Thank you very much. Sincerely, John Young Cryptome.org 251 West 89th Street New York, NY 212-873-8700 From etanes.rm at gmail.com Sun Sep 16 11:42:17 2012 From: etanes.rm at gmail.com (Scurvy Scott) Date: Sun, 16 Sep 2012 11:42:17 -0700 Subject: TOR Hidden Services Message-ID: This seems like the appropriate list to ask on, so here goes.. I've been considering writing what I've been calling a TORdialer.. Something that would basically connect to the DB which stores the hash files for the hidden services links and basically index the entire DB with the intent of creating a definitive index of all hidden services points in the TOR network. I know this probably sounds like I have fundamental misunderstanding of how this whole process works which is why I'm emailing this list. I'll probably also forward this email to the TOR dev mailing list. If anyone has any reason this absolutely will not work in any way, shape, or form, I'd like to hear about it. What I'm figuring I'd do is start TOR and attempt to connect to a bunch of known .onion addresses, sniff that traffic and attempt to gather where/when TOR connects to this hash db I've read about on the hidden services docs. >From there write a script to query the DB myself and perhaps figure out how to download the entire db, then write a script to convert all the individual hashes into valid .onion addresses. Again, I may have a completely naive view of how the system works, just from reading the past two days this is my idea. Any input would be appreciated, I gather most of you folks know far more about cryptography and anonymity systems like TOR than I could dream of. Fire away, tell me this won't work. Scott From drwho at virtadpt.net Sun Sep 16 09:25:27 2012 From: drwho at virtadpt.net (The Doctor) Date: Sun, 16 Sep 2012 12:25:27 -0400 Subject: FBI Has No Files on Cypherpunks In-Reply-To: References: Message-ID: <5055FD77.7010705@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 09/16/2012 10:32 AM, John Young wrote: > Federal Bureau of Investigation September 10, 2012 > > FOIPA Request No. 1198150-00 Subject: CYPHERPUNKS > > "Based the information you provided we conducted a search of the > Central Records System. We were unable to identify main file > records responsive to the FOIA." Try making FOIA requests of the US DoD (http://www.dod.mil/pubs/foi/foiareq.html). I have had some success in the past in so doing. Someone over the years may have subscribed to this mailing list for some purpose and their notes may have been archived. The US Secret Service also has a FOIA request process (http://www.secretservice.gov/foia.shtml) that you may want to make use of. - -- The Doctor [412/724/301/703] [ZS] Developer, Project Byzantium: http://project-byzantium.org/ PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ USE THEM TOGETHER. USE THEM IN PEACE. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAlBV/XcACgkQO9j/K4B7F8EZfACgs+VJCjV0Uoo6pPOugITqFv10 lrkAn1olaPorGUf+JEM2unxTSe/GAu1m =z3SV -----END PGP SIGNATURE----- From gfoster at entersection.org Sun Sep 16 13:38:09 2012 From: gfoster at entersection.org (Gregory Foster) Date: Sun, 16 Sep 2012 15:38:09 -0500 Subject: [drone-list] Drones y Mixico Message-ID: The Mexico Federal Police parade their drones: https://twitter.com/EstadoMayor_MX/status/247392289574486017/photo/1 Worth remembering that a contingent of the Mexico Federal Police (FP) ambushed an American embassy vehicle carrying two CIA operatives a few weeks ago. It's been suggested that the FP are well infiltrated by the drug cartels: http://www.reuters.com/article/2012/08/30/us-mexico-shooting-idUSBRE87S19K20120830 Congressional Unmanned Systems Caucus Co-Chair Henry Cuellar (D-TX) suggested "using UAS to help Mexico fight drug cartels" at the Congressional Unmanned Systems Caucus Technology & Science Fair this past week: https://twitter.com/AUVSI/status/246272339183009793 Congressman Cuellar's brother happens to be the Sheriff of Laredo, which is situated on the Texas border with Mexico. The Cuellars hosted a demonstration of the Vanguard Defense Industries Shadowhawk in July. http://www.texasobserver.org/lalinea/now-laredo-wants-a-drone-too Montgomery County-based Vanguard is the only company I've observed that is actively working on a less-lethal weapons package for domestic use of their drone. That came to light after Montgomery County Sheriffs acquired a $300K Shadowhawk through a federal grant. According to the Texas Observer article, the name of that grant program is Operation Stonegarden (OPSG). http://www.fema.gov/fy-2012-homeland-security-grant-program#3 OPSG is funded to the tune of $46M in FY2012, down from $60M in 2009, and is part of the $831M FY2012 Homeland Security Grant Program: http://www.fema.gov/pdf/government/grant/2012/fy12_hsgp_foa.pdf gf -- Gregory Foster || gfoster at entersection.org @gregoryfoster <> http://entersection.com/ _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From a.peters at ferrotechniek.com Mon Sep 17 08:38:45 2012 From: a.peters at ferrotechniek.com (=?koi8-r?B?IvDP0tHEz8sg0M/T1MHOz9fLySDOwSDHz9PVxMHS09TXxc7O2cogyw==?= =?koi8-r?B?wcTB09TSz9fZyiDV3sXULiAi?=) Date: Mon, 17 Sep 2012 07:38:45 -0800 Subject: =?koi8-r?B?8M/Q0sHXy8kg1yD6xc3FzNjO2cogy8/ExcvTIPLmINcgMjAxMiDHzw==?= =?koi8-r?B?xNU=?= Message-ID: <01cd94a7$77903080$7f528670@a.peters> Уважаемые коллеги! Приглашаем Вас посетить краткосрочный курс: ОФОРМЛЕНИЕ ПРАВ НА ОБЪЕКТЫ НЕДВИЖИМОСТИ. КАДАСТРОВЫЙ УЧЁТ, ОЦЕНКА И НАЛОГООБЛОЖЕНИЕ НЕДВИЖИМОСТИ. Последние изменения в законодательстве, арбитражная практика. 01 - 02 октяября 2ОI2 г. Санкт-Петербург (условия участия по телефону (код спб)6Ч2.ЧЗ.8Ч) ПРОГРАММА КУРСА - Последние изменения в правовом регулировании оформления прав на объекты недвижимости. Основы законодательства в области земельных отношений и кадастровой деятельности. Практика применения "Земельного кодекса РФ", "Гражданского кодекса РФ", "Градостроительного кодекса", ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним", и иных нормативных документов, регулирующих оборот объектов недвижимости. - Основные положения Федерального закона от 24.07.2007 г. # 221-ФЗ "О государственном кадастре недвижимости". Принципы ведения государственного кадастра недвижимости (ГКН). Порядок предоставления сведений ГКН. Порядок и особенности осуществления кадастрового учёта земельных участков, зданий, сооружений, объектов незавершённого строительства, помещений. Основания приостановления и отказа в проведении кадастрового учёта. - Кадастровые работы. Межевой план. Порядок согласования месторасположения границ земельных участков. Кадастровые паспорта на земельные участки, здания, сооружения, объекты незавершённого строительства, помещения. Требования к подготовке межевого плана. Многоконтурные земельные участки. Порядок их формирования и учета. Технический план сооружения. Требования к подготовке. - Зоны с особыми условиями использования территории. - Юридические аспекты объекта недвижимости (здания и сооружения) и принадлежности к нему; основания отнесения объекта к недвижимому имуществу. Земельный участок, инженерные сети, линейные объекты как объект недвижимости и ограничения, связанные с ними. Право долевой собственности, формирование и выдел долей. Понятие сложного единого объекта по Гражданскому кодексу РФ. Самовольная постройка: последствия создания, легализация. Сервитут как обременение права собственности, порядок определения права за сервитут и порядок заключения сервитутного соглашения. - Правовое регулирование и особенности государственной регистрации договора купли-продажи объектов недвижимости. Анализ судебной практики. Изменения в ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним". Правовое регулирование и особенности государственной регистрации договора ипотеки. - Порядок оформления арендных отношений. Правовая сущность договора. Предмет договора аренды, существенные условия договора. Арендодатель и его правоуполномоченные лица. Сохранение договора аренды при изменении арендодателя. Порядок регистрации договора аренды. Срок договора аренды. Досрочное расторжение договора аренды. Изменение сторон договора аренды. Договор субаренды, права на распоряжение арендованным имуществом. Договор аренды государственного и муниципального имущества. Анализ основных случаев отказа в государственной регистрации договора аренды. - Аренда земельных участков, находящихся в государственной или муниципальной собственности. Порядок заключения договора. Купля-продажа земельных участков, находящихся в государственной или муниципальной собственности. Общий порядок приобретения. Преимущественные права при выкупе земельных участков. Особенности перехода права собственности на землю при переходе прав на строение. Порядок приобретения прав на земельные участки, находящиеся в государственной или муниципальной собственности, на которых расположены здания, строения, сооружения (в т.ч. приватизированные). - Особенности предоставления земельных участков для строительства. Порядок предоставления земель для различных целей. административные ограничения прав на землю. - Особенности оформления прав на земельные участки под строительство линейных объектов. Регистрация прав собственности на линейные объекты и объекты инженерной инфраструктуры. - Государственная политика в области налогообложения имущества. Формирование налоговой базы налога на недвижимость. Массовая оценка как элемент налогообложения недвижимости. Классификация объектов недвижимости для целей кадастровой оценки и налогообложения. Причины и последствия изменение системы классификации. Нормативное и правовое регулирование в области государственной кадастровой оценки (ГКО) земель и массовой оценки недвижимости. Основные положения методических документов по ГКО земель различных категорий. Порядок определения кадастровой стоимости в составе земель различных категорий. - Профессиональные требования, предъявляемые к кадастровым инженерам. Приказ Минэкономразвития России # 23 от 22.01.2010 г. "Об утверждении Положения о составе, порядке работы квалификационной комиссии для проведения аттестации на соответствие квалификационным требованиям, предъявляемым к кадастровым инженерам...". Комментарии, разъяснения. Кадастровый инженер. Состав, порядок работы квалификационной комиссии для проведения аттестации кадастровых инженеров. Порядок проведения квалификационного экзамена. Квалификационные требования, предъявляемые к кадастровым инженерам. Права и обязанности кадастровых инженеров. Доп. Информация и полная_ программа_ по телефону [8I2] 6.42_ 43.. 8Ч From milohovaov at locutus.blueboard.cz Sun Sep 16 22:40:36 2012 From: milohovaov at locutus.blueboard.cz (=?koi8-r?B?88jFzdkgxMzRINrB0tDMwdTZ?=) Date: Mon, 17 Sep 2012 11:10:36 +0530 Subject: =?koi8-r?B?7NXe28nFIMLFzNnFIM7BzM/Hz9fZxSDTyMXN2SDXIDIwMTIgxy4=?= Message-ID: 24-25 сентября Налоговое планирование в 2012 г. – лучшие белые схемы (код Москвы) 79221/22 \\// +7 Московский код: 792/2I22 Цель: Ставка обязательных страховых взносов (СВ) с зарплаты с 2012 года составляет 30% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При формальном снижении нагрузки по зарплате многих сотрудников фактически выплаты возрастут: если раньше с больших зарплат СВ не уплачивались, то теперь их ставка составит 10% с суммы дохода свыше 512 тыс. рублей в год. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Есть возможность посещения любого одного дня: программа разбита на два логических блока, каждый из которых занимает один день. Рекомендуется посещение обоих дней. Первый день посвящен поиску путей выживания компаний при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Кроме того, рассматриваются общие для всех налоговых схем условия и принципы применения – такие как наличие деловых целей, отсутствие аффилированности и фиктивных сделок, грамотное оформление. Второй день посвящен изучению основных практических методов оптимизации налога на прибыль и (в той степени, в которой это возможно) НДС в торговых (оптовых и розничных) и производственных предприятиях, предприятиях, оказывающих услуги или выполняющих работы, в т.ч. строительные. Рассматриваются субъекты льготного налогообложения, способы переноса на них налогооблагаемой базы и пути безналогового рефинансирования (возврата) выведенных сумм. Участники получат краткие индивидуальные консультации по тематике курса. Программа: 1 день: Налоговое планирование по страховым взносам и НДФЛ в 2012 г. с учетом изменений законодательства 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. Обзор изменений законодательства по страховым взносам на 2012-13 гг., как они повлияли на налоговые схемы. 2. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность; * дивидендные схемы – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Способы минимизации рисков имущественной ответственности предпринимателя. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с новым порядком ведения кассовых операций. 3. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и качественное документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 4. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Долгосрочное накопительное страхование жизни работников и ДМС за счет предприятия. 5. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, компенсаций, гонораров и иных легальных доходов от нерезидентов. 6. Как компенсировать снижение социальных гарантий (включая пенсионные накопления) работников при применении налоговых схем, не предусматривающих выплату зарплаты? 7. Использование процентных займов от физлиц. Расчет эффективности. Потребительский кредитный кооператив граждан – способ получения безналогового дохода в виде процентов. 8. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 9. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды. 10. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 2 день: Оптимизация налога на прибыль: пределы возможного и допустимого 1. Методы планирования налога на прибыль и НДС. Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. 2. Низконалоговые субъекты: * субъекты специальных налоговых режимов – ЕНВД и УСН, в т.ч. патентная система, субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * оффшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, 3. Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 4. Способы переноса налогооблагаемой базы по налогу на прибыль на низконалоговых субъектов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. лицензионные и франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. * механизм трансфертных цен. Новое антитрансфертное законодательство, способы ухода от контроля за сделками, грамотное обоснование трансфертных цен, 5. Займы как способ возвратного рефинансирования – преимущества и недостатки, риск ведения незаконной банковской деятельности. Безналоговое рефинансирование (возврат) и капитализация выведенной прибыли предприятия (холдинга) через уставный капитал, безвозмездную передачу имущества, увеличение чистых активов, ст. 27 Закона "Об ООО". 6. Простое товарищество субъектов упрощенной системы налогообложения, в т.ч. из "низконалоговых" регионов. Уплата НДС. Перенос прибыли товарищества на низконалоговых субъектов (УСН 6%, ЕНВД, оффшор и др.). Отсрочка уплаты налога при непередаче прибыли на счета товарищей. Возможен ли обход с помощью простого товарищества правил налогового учета (гл. 25 НК) и ограничений гл. 26.2 НК РФ в части перечня затрат? 7. Экономия НДС в торговле, производстве, выполнении работ, оказании услуг через разделение финансово-товарных потоков "с НДС" и "без НДС". Ограничение использования: покупатели/заказчики, не нуждающиеся в вычете НДС, как их выявить, или создать искусственно. Риски и рекомендации по использованию схемы. 8. Иностранные низконалоговые компании, цели применения. Их использование при проведении внутрироссийских операций для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги и т.п.) и нетрадиционные схемы (простое товарищество, агентские). Выбор низконалоговых юрисдикций. 9. Обзор изменений налогового законодательства, как они повлияют на налоговые схемы. Ответы на вопросы. По желанию и по возможности – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц курса. Стоимость участия:1 день 9 000 руб. Стоимость участия:2 дня 16 000 руб. За более подробной информацuей обpащайтеcь по тел: код (499) - ЧЧ5/4095 \\// 8 Моск. код: 792_2122 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12378 bytes Desc: not available URL: From wilcoxjg at gmail.com Mon Sep 17 11:51:55 2012 From: wilcoxjg at gmail.com (Josh Wilcox) Date: Mon, 17 Sep 2012 11:51:55 -0700 Subject: [tahoe-dev] San Francisco Bay Area, Recurring Weekly Physical Meetup Message-ID: Hello all! This Thursday, 2012-09-20 at 19:00 (UTC-7) there will be a physical meetup at the Noisebridge Hacker Space AT THE FRONT TABLE, in the Mission District of San Francisco. https://www.noisebridge.net/wiki/Noisebridge In addition to inviting all readers of this list, I'd also like to stimulate an agenda-setting conversation. My personal preference is for a setup that results in me staring at code. Ideally I'd know ahead of time that there're a few (or ONE!) chunk(s)/module(s) of code that are/is going to be examined/discussed during the meetup, so I can "study up". I'd like to attract new mindshare so it'd be nice if the focus were on something that (perhaps with a short preamble) is difficult for a "typical" (as if there were such a thing!) Noisebridger to resist. This also means that our meeting space, AT THE FRONT TABLE, is a feature, not a bug. I'd like to pre-empt a call for realtime video, because I believe that the physical space is likely to be difficult to control (particularly with regard to sound) for that purpose. I think realtime code-sharing (i.e. where those physically present can stare at a projected web-page that remote parties can view more "traditionally") will be feasible. I'll be visiting the space tomorrow (Tuesday night) to, announce this meetup at the weekly Noisebridge political meeting, and troubleshoot the setup. I'd like to have a head-count, so I can know how many chairs to commandeer, so emails to my "wilcoxjg at gmail.com" account with subject: [ATTENDING 2012-09-20 TAHOE MEETUP] are greatly appreciated ( provided they're from an appropriate party! :) And there's a 1-1 correlation between party and email... and etc... ) . OK... I've probably missed something, hopefully someone will remind me. About Last Week: During the inaugural (very informal) meetup last Thursday 2012-09-13, the following topics were discussed: * Add Only Capabilities as an abstraction built on top of mutable files * Resource Allocation Accounting * Migration to vanilla HTTPS for inter-node communication I may (upon demand) publish slightly more detailed notes. -- Za <--> X8 "I want people to see the truth... regardless of who they are... because without information, you cannot make informed decisions as a public" *-- Bradley Manning* 'Lame' is stale, 'cruft' is cruft. "Who ordered it? Who ordered the saxogram?" https://www.youtube.com/watch?v=GaoLU6zKaws _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From truckersdv50 at refraline.com Sun Sep 16 22:35:24 2012 From: truckersdv50 at refraline.com (=?koi8-r?B?Iu3By9PJzcHM2M7B0SDSxcvMwc3BIg==?=) Date: Mon, 17 Sep 2012 13:35:24 +0800 Subject: =?koi8-r?B?MjIg0sHT09nMy8kgKyDQz9fUz9Ig1yDExc7YINfZyM/EwSAtIDIwIDAw?= =?koi8-r?B?MCA=?= Message-ID: 2 рассылки - 5 000 8 рассылок 10 000 + Хостинг в подарок и домен РФ 22 рассылки + повтор в день выхода - 20 000 + Хостинг в подарок и домен РФ База Россия 23 млн Мы советуем делать не 1 рассылку и даже не 2. И по возможности в этих рассылках не менять текст и вид письма. Реклама, даже такая, все равно реклама, и она строится на основах психологии. Вы замечали, что вся реклама идет "Валом". По телевизору часто можно увидеть, что рекламный ролик идет дважды. Существует психологическая схема восприятия товара. Вот смотрите: Вы получили письмо первый раз, и почти наверняка его удалите даже не рассматривая. Елси вам оно пришло еще раз, вы посмотрите и удалите. На третий раз, оно вас разозлит и вы его прочтете. А потом уже, получив его, подсознательно задумаетесь: "а может оно мне нужно...". Реклама идет по принципу детской игры "Купи слона", под конец все говорят "хорошо куплю"! Тел: (495) 585-79-04 ICQ: 286 926 971 From eugen at leitl.org Mon Sep 17 05:46:43 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 17 Sep 2012 14:46:43 +0200 Subject: [drone-list] Drones y =?iso-8859-1?B?Tel4?= =?iso-8859-1?Q?ico?= Message-ID: <20120917124643.GA9750@leitl.org> ----- Forwarded message from Gregory Foster ----- From bokser99999 at rkz-28.ru Mon Sep 17 03:46:42 2012 From: bokser99999 at rkz-28.ru (=?koi8-r?B?987FxNLRxc0g0MzBzg==?=) Date: Mon, 17 Sep 2012 16:16:42 +0530 Subject: =?koi8-r?B?79TCz9IgwsnazsXTINDMwc7BLg==?= Message-ID: <96D7859313BD403A93CA558540875B18@Yash08> Тема: Методы разработки и анализа бизнес плана, тэо, инвестиционных проектов. \Моск. код/ 792-2122 \\// код (495) - 7-42.9I/98 Суть обучения!!! очень проста: Вас приглашают в компьютерный класс, где 2 дня с вами занимаются, супер профессионалы (тяжеловесы в финансовом планировании), все два дня Вы являетесь настоящими участниками практического семинара, получаете знания и для закрепления тем выполняете задания, выполняете их на компьютере оснащенным специализированным программным комплексом. Все пробуете Сами, и только Сами. По Окончании курса Вас оснащают лицензионной, полнорабочей специализированной версией программы, для разработки бизнес планов и инвестиционных проектов, Вы прибываете на предприятие, устанавливает продукт на свой компьютер и начинаете сразу работать (без всякой головной боли) - Вот так! Просто! мы делает профессионалов! Краткая информация о семинаре: Дата: 24-25 сентября 2012г. Подготовка участников будет осуществляться в компьютерном классе, где в помощь будет предоставлен программный комплекс в основе которого заложена современная методика планирования. Сочетание методов обучения с практикой - позволит достичь максимальных результатов в освоении материала. Все наглядно и просто. На первом этапе излагается теория, на втором рассматриваются закономерности, почему теория не совместима с практикой, на третьем этапе формируется задача и рассматриваются фин. методы ее решения, на четвертом участник самостоятельно решает задачу используя компьютер оснащенный специализированным ПО. Рассмотрение финансовых методов для каждого рода деятельности в отдельности, усиление восприятия информации с помощью специализированного расширенного методического материала. Каждому участнику: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и программы: * Специализированный Программный продукт-для разработки бизнес планов, ТЭО, инвестиционных проектов! Программа проста в понимании и настройках, подготавливает расчетную и текстовую части фин. проекта, подготавливает и оформляет все в единый отчет. 90% автоматизации труда.. * Книга - "Разработка бизнес плана - практическое руководство". В комплекте с книгой поставляется новая версия специализированной программы по Экспресс построению бизнес планов. (Экспресс подготовка экономической документации. Основное назначение программы - быстрая, качественная, профессиональная подготовка экономической документации для представления в различные структуры, как в финансовые, так и в структуры органов власти.). * Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. * Для эффективной работы в помощь прилагается на диске методический материал в электронной версии. С помощью него участник семинара может эффективно разрабатывать свои сценарии финансовых проектов. Вся информация по тел: 8 (495) 792\21\22 или +7 499 - Ч45_ЧО/95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4869 bytes Desc: not available URL: From blazonsgj51 at rhoadeslawoffice.com Mon Sep 17 01:42:32 2012 From: blazonsgj51 at rhoadeslawoffice.com (=?koi8-r?B?IuHMxcvTwc7E0iI=?=) Date: Mon, 17 Sep 2012 16:42:32 +0800 Subject: =?koi8-r?B?5MXSxdfRzs7B0SDQwczP3svBIMTM0SDNz9LP1sXOz8fP?= Message-ID: Палочка для мороженого, медицинские шпателя и кофейная палочка. Происхождение - Украина. Имеем опыт экспортных отправок. Размеры: 94x10x2, 114x10x2, 94x17⁄11x2, 150x16x2 Тел: +38(0472)544270 Моб: +38(067)4705270 From eugen at leitl.org Mon Sep 17 12:54:51 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 17 Sep 2012 21:54:51 +0200 Subject: [tahoe-dev] San Francisco Bay Area, Recurring Weekly Physical Meetup Message-ID: <20120917195451.GN9750@leitl.org> ----- Forwarded message from Josh Wilcox ----- From benniegoe at f6clan.com Mon Sep 17 12:08:57 2012 From: benniegoe at f6clan.com (=?koi8-r?B?IuvV0tMg0M8gy8HEwdPU0tUuIPPw5fvp9OUhIg==?=) Date: Tue, 18 Sep 2012 03:08:57 +0800 Subject: =?koi8-r?B?y8HEwdPU0s/XwdEg09TPyc3P09TYINrFzcXM2M7Px88g1d7B09TLwQ==?= =?koi8-r?B?IDIwMTIJ?= Message-ID: <01cd954a$f12d2a80$e468e33d@benniegoe> Уважаемые коллеги! Приглашаем Вас посетить краткосрочный курс: ОФОРМЛЕНИЕ ПРАВ НА ОБЪЕКТЫ НЕДВИЖИМОСТИ. КАДАСТРОВЫЙ УЧЁТ, ОЦЕНКА И НАЛОГООБЛОЖЕНИЕ НЕДВИЖИМОСТИ. Последние изменения в законодательстве, арбитражная практика. 01 - 02 октяября 2ОI2 г. Санкт-Петербург (условия участия по телефону (код спб)6Ч2.ЧЗ.8Ч) ПРОГРАММА КУРСА - Последние изменения в правовом регулировании оформления прав на объекты недвижимости. Основы законодательства в области земельных отношений и кадастровой деятельности. Практика применения "Земельного кодекса РФ", "Гражданского кодекса РФ", "Градостроительного кодекса", ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним", и иных нормативных документов, регулирующих оборот объектов недвижимости. - Основные положения Федерального закона от 24.07.2007 г. # 221-ФЗ "О государственном кадастре недвижимости". Принципы ведения государственного кадастра недвижимости (ГКН). Порядок предоставления сведений ГКН. Порядок и особенности осуществления кадастрового учёта земельных участков, зданий, сооружений, объектов незавершённого строительства, помещений. Основания приостановления и отказа в проведении кадастрового учёта. - Кадастровые работы. Межевой план. Порядок согласования месторасположения границ земельных участков. Кадастровые паспорта на земельные участки, здания, сооружения, объекты незавершённого строительства, помещения. Требования к подготовке межевого плана. Многоконтурные земельные участки. Порядок их формирования и учета. Технический план сооружения. Требования к подготовке. - Зоны с особыми условиями использования территории. - Юридические аспекты объекта недвижимости (здания и сооружения) и принадлежности к нему; основания отнесения объекта к недвижимому имуществу. Земельный участок, инженерные сети, линейные объекты как объект недвижимости и ограничения, связанные с ними. Право долевой собственности, формирование и выдел долей. Понятие сложного единого объекта по Гражданскому кодексу РФ. Самовольная постройка: последствия создания, легализация. Сервитут как обременение права собственности, порядок определения права за сервитут и порядок заключения сервитутного соглашения. - Правовое регулирование и особенности государственной регистрации договора купли-продажи объектов недвижимости. Анализ судебной практики. Изменения в ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним". Правовое регулирование и особенности государственной регистрации договора ипотеки. - Порядок оформления арендных отношений. Правовая сущность договора. Предмет договора аренды, существенные условия договора. Арендодатель и его правоуполномоченные лица. Сохранение договора аренды при изменении арендодателя. Порядок регистрации договора аренды. Срок договора аренды. Досрочное расторжение договора аренды. Изменение сторон договора аренды. Договор субаренды, права на распоряжение арендованным имуществом. Договор аренды государственного и муниципального имущества. Анализ основных случаев отказа в государственной регистрации договора аренды. - Аренда земельных участков, находящихся в государственной или муниципальной собственности. Порядок заключения договора. Купля-продажа земельных участков, находящихся в государственной или муниципальной собственности. Общий порядок приобретения. Преимущественные права при выкупе земельных участков. Особенности перехода права собственности на землю при переходе прав на строение. Порядок приобретения прав на земельные участки, находящиеся в государственной или муниципальной собственности, на которых расположены здания, строения, сооружения (в т.ч. приватизированные). - Особенности предоставления земельных участков для строительства. Порядок предоставления земель для различных целей. административные ограничения прав на землю. - Особенности оформления прав на земельные участки под строительство линейных объектов. Регистрация прав собственности на линейные объекты и объекты инженерной инфраструктуры. - Государственная политика в области налогообложения имущества. Формирование налоговой базы налога на недвижимость. Массовая оценка как элемент налогообложения недвижимости. Классификация объектов недвижимости для целей кадастровой оценки и налогообложения. Причины и последствия изменение системы классификации. Нормативное и правовое регулирование в области государственной кадастровой оценки (ГКО) земель и массовой оценки недвижимости. Основные положения методических документов по ГКО земель различных категорий. Порядок определения кадастровой стоимости в составе земель различных категорий. - Профессиональные требования, предъявляемые к кадастровым инженерам. Приказ Минэкономразвития России # 23 от 22.01.2010 г. "Об утверждении Положения о составе, порядке работы квалификационной комиссии для проведения аттестации на соответствие квалификационным требованиям, предъявляемым к кадастровым инженерам...". Комментарии, разъяснения. Кадастровый инженер. Состав, порядок работы квалификационной комиссии для проведения аттестации кадастровых инженеров. Порядок проведения квалификационного экзамена. Квалификационные требования, предъявляемые к кадастровым инженерам. Права и обязанности кадастровых инженеров. Доп. Информация и полная_ программа_ по телефону [8I2] 6.42_ 43.. 8Ч From gfoster at entersection.org Tue Sep 18 07:33:33 2012 From: gfoster at entersection.org (Gregory Foster) Date: Tue, 18 Sep 2012 09:33:33 -0500 Subject: [drone-list] End-Use Monitoring on Unmanned Aerial Vehicle Exports Message-ID: Drone Wars UK (Sep 18) - "Mapping drone proliferation: big business vs. the MTCR": [1]http://dronewarsuk.wordpress.com/2012/09/18/mapping-drone-proliferat ion-big-business-vs-the-mtcr/ Summarizes and riffs on the GAO report. gf On 9/12/12 5:17 PM, John Young wrote: [2]http://www.gao.gov/products/GAO-12-536 Agencies Could Improve Information Sharing and End-Use Monitoring on Unmanned Aerial Vehicle Exports Full 58-page report, PDF: [3]http://www.gao.gov/assets/600/593131.pdf GAO-12-536, Jul 30, 2012 What GAO Found Since 2005, the number of countries that acquired an unmanned aerial vehicle (UAV) system nearly doubled from about 40 to more than 75. In addition, countries of proliferation concern developed and fielded increasingly more sophisticated systems. Recent trends in new UAV capabilities, including armed and miniature UAVs, increased the number of military applications for this technology. A number of new civilian and commercial applications, such as law enforcement and environmental monitoring, are available for UAVs, but these applications are limited by regulatory restrictions on civilian airspace. The United States likely faces increasing risks as countries of concern and terrorist organizations seek to acquire UAV technology. Foreign countries' and terrorists' acquisition of UAVs could provide them with increased abilities to gather intelligence on and conduct attacks against U.S. interests. For instance, some foreign countries likely have already used UAVs to gather information on U.S. military activities overseas. Alternatively, the U.S. government has determined that selected transfers of UAV technology support its national security interests by providing allies with key capabilities and by helping retain a strong industrial base for UAV production. For instance, the United Kingdom and Italy have used UAVs purchased from the United States to collect data on Taliban activity in Afghanistan. The United States has engaged in multilateral and bilateral diplomacy to address UAV proliferation concerns. The United States principally engaged the Missile Technology Control Regime (MTCR) to address multilateral UAV proliferation concerns. Since 2005, the United States proposed certain significant changes to address how MTCR controls UAVs, but members could not reach a consensus for these changes. Also, while the Wassenaar Arrangement (Wassenaar) controls the export of some key dual-use UAV components, it does not control other dual-use technologies that are commonly used in UAVs. The Department of State (State) has also used diplomatic cables to address the proliferation of UAV-related technologies bilaterally. State provided to GAO about 70 cables that it sent from January 2005 to September 2011 addressing UAV-related concerns to about 20 governments and the MTCR. Over 75 percent of these cables focused on efforts by a small number of countries of concern to obtain UAV technology. U.S. agencies coordinate in several ways to control the spread of UAV technology, but could improve their UAV-related information sharing. For instance, an interagency group reviews many license applications to export UAV technology. However, there is not a formal mechanism to ensure that licensing agencies have relevant and timely intelligence information when making licensing decisions. Also, State's licensing database cannot provide aggregate data on military UAV exports State has authorized, which may impair the U.S. government's ability to oversee the release of sensitive UAV technology. The Department of Defense (DOD) and State each conduct end-use monitoring of some UAV exports, but differences in the agencies' programs may result in similar types of items being subject to different levels of oversight. -- Gregory Foster || [4]gfoster at entersection.org @gregoryfoster <> [5]http://entersection.com/ References 1. http://dronewarsuk.wordpress.com/2012/09/18/mapping-drone-proliferation-big-business-vs-the-mtcr/ 2. http://www.gao.gov/products/GAO-12-536 3. http://www.gao.gov/assets/600/593131.pdf 4. mailto:gfoster at entersection.org 5. http://entersection.com/ _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Sep 18 01:43:16 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 18 Sep 2012 10:43:16 +0200 Subject: [tor-talk] almost success toward complete tor enforcement, need little help now Message-ID: <20120918084316.GV9750@leitl.org> ----- Forwarded message from Raviji ----- From l at odewijk.nl Tue Sep 18 02:09:10 2012 From: l at odewijk.nl (Lodewijk andri de la porte) Date: Tue, 18 Sep 2012 11:09:10 +0200 Subject: [ZS] Re: On the question of coercion (was: Commentary on the Consensus International Principles) Message-ID: 2012/9/18 Spencer Campbell > > >> It might be of interest to take a person's life and present it, The >> Truman Show like it's creator had never imagined. I'd suggest producing >> such content to be banned. >> > > I don't think that's a tenable idea, either practically or > philosophically. Nothing short of a 1984 regime would be enough to enforce > the ban, and Truman Shows have considerable value from several different > dimensions -- entertainment, artistic, historic, even self-analytical. > You forget this, in some senses, IS a 1984 regime. These shows can still be made after someone dies, retaining most of the value without the devestating effects it has on the subject. It's a means to preserve a new shape of privacy. A form of security through obscurity, the only form of security I usually find exists in real life situations. > 2012/9/18 R|diger Koch Fine, as long as webcams are in the board rooms of the world, including the > oval office. As long as black Mercs come only with clear windows and > particularly, and most importantly as long as it is not a criminal offense > to do complete life logging, including the police officer beating you to > pulp for not quick enough jumping out of his way. > > As long as surveillance only means that any attempt of yours to watch the > watchers is being watched and sanctioned, this has to be a red line. A twofold of laws will make this happen as much as it can. 1) Never may the recording of an event be illegal in and of itself. This is a "self governance" law. Limiting the governement and police's own power. It mustn't be too powerfull as to prevent people claiming access 2) Any person, legal or otherwise, must make available it's survailance records, freely, in accordance with common conventions. Meaning that if I do record something I must make it publicly available on, say, a distributed open file network. Usenet would be the inadequate present day example. In whatever format and form is common at the time. Freely effectively bans propriatary formats and prevents copyright-ish laws from securing it. Untarget recordings mean survailance style always-on recording. This law would allow one to keep his/her home video's private but requires sharing of the always-on webcam in front of the house. An underlying assumption is that we'll have widespectrum radio-camera's that see everything the birds do now, and a lot that they don't, even through the walls of buildings. Never, I repeat, NEVER, will board rooms of the importants Anu wishes to be public become public. Worst case scenario Space-One will offer "private conversation" trips that pass by the dark side of the moon for the rough talks. Worst because that gives an unfair advantage to those most motivated to have privacy, privacy isn't worth as much to the Green Energy Consurtum as it'll be to Mean Oil Corp. But it's likely nearly as usefull. -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Sep 18 03:16:55 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 18 Sep 2012 12:16:55 +0200 Subject: [ZS] Re: On the question of coercion (was: Commentary on the Consensus International Principles) Message-ID: <20120918101655.GW9750@leitl.org> ----- Forwarded message from Lodewijk andri de la porte ----- From adrelanos at riseup.net Tue Sep 18 06:32:43 2012 From: adrelanos at riseup.net (adrelanos) Date: Tue, 18 Sep 2012 13:32:43 +0000 Subject: [tor-talk] almost success toward complete tor enforcement, need little help now Message-ID: Raviji: > https://cryptoanarchy.org/wiki/Build_your_own_livething That's a bit insufficient and some points clearly outdated, see below. > > obfsproxy issue > ================= > > I have installed tor,pdnsd,ttdnsd,obfsproxy,polipo,vidalia You don't need pdnsd,ttdnsd,polipo. Vidalia is a nice optional graphical user interface. > I have already collected the obfs IP address from a running tor bundle and then placed all those > at /etc/tor/torrc. tor is running with obfs. > > [Q] How can I check online that obfs is functional ? https://check.torproject.org/ simply shows > tor is running, but no obfs related information. Someone else has to answer here. > polipo and firewall > ===================== > > Browsers configured to use polopo ( tor as parent) and the online check is successful (https://check.torproject.org/) > > [Q] Is polipo really fast ? I hardly see any advantage comparing direct tor connection with out polipo. You're on the wrong path. Don't use polipo / Firefox etc. anymore, unless you want to stay out from all other Tor users. Use Tor Browser. Details: https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers > [Q] What is the iptables rule to redirect all 80 and 443 traffic through polipo 8118 port ? Then no configuration is > required at browser level. You don't need iptables for that. Tor is running on a Gateway. Tor Browser without Tor/Vidalia started (patched startup script) is running on another machine. (Which we call Workstation.) Tor Button SOCKS Host: gateway IP, port: reserve one SocksPort in torrc on Gateway exclusively for Tor Browser. Add some extra SocksPorts for other applications. (stream isolation) > DNS and firewall > ================= > > I am using pdnsd (caching DNS proxy server) and ttdnsd ( udp to tcp converter ) You don't need ttdnsd. I recommend using one SocksPorts per most, if not all applications. If you still want some remaining traffic fallback you can use Tor's excellent Dns- and TransPorts. > > [Q] How can I enforce all udp to go through local DNS port and which one 53 or 8853 ? For a "fetch remaining DNS traffic and route through Tor iptables rule" have a look at https://github.com/adrelanos/Whonix/blob/master/whonix_gateway/usr/local/bin/whonix_firewall and search for "dns". > > iptables to route all traffic and blocked all non tor > ====================================================== > > LAN and lo (localhost) don't need to go through tor You probable mess up there figuring out what is lan traffic for real and what not. I strongly recommend the Tor-only box to have no local lan traffic. > port 80/443 should go through poliop port 8118, > all dns query should go through local 53 ( or 8853 ? ) port Like said before, forget about that plan. Don't use polipo. > And the rest of the traffic should go through tor 9050 port, anything left should be dropped. > The example iptables given at tails site is not working for me. Could anyone kindly give such a > rule sets please ? You can do it with virtual machines and/or physical isolation. https://sourceforge.net/p/whonix/wiki/Home/ https://github.com/adrelanos/Whonix/ https://github.com/adrelanos/Whonix/blob/master/whonix_gateway/usr/local/bin/whonix_firewall _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From raviji157 at gmail.com Tue Sep 18 01:24:45 2012 From: raviji157 at gmail.com (Raviji) Date: Tue, 18 Sep 2012 13:54:45 +0530 Subject: [tor-talk] almost success toward complete tor enforcement, need little help now Message-ID: Dear list, I wonder if I can setup a box which provides complete traffic enforcement through tor. The tails project has encouraged me to work in that direction. With the tails documentations and with some online guide like https://cryptoanarchy.org/wiki/Build_your_own_livething I am able to setup my running debian system almost a tor encrypted box, with some small hitches which I belief can easily be solved with your technical guidance. obfsproxy issue ================= I have installed tor,pdnsd,ttdnsd,obfsproxy,polipo,vidalia I have already collected the obfs IP address from a running tor bundle and then placed all those at /etc/tor/torrc. tor is running with obfs. [Q] How can I check online that obfs is functional ? https://check.torproject.org/ simply shows tor is running, but no obfs related information. polipo and firewall ===================== Browsers configured to use polopo ( tor as parent) and the online check is successful (https://check.torproject.org/) [Q] Is polipo really fast ? I hardly see any advantage comparing direct tor connection with out polipo. [Q] What is the iptables rule to redirect all 80 and 443 traffic through polipo 8118 port ? Then no configuration is required at browser level. DNS and firewall ================= I am using pdnsd (caching DNS proxy server) and ttdnsd ( udp to tcp converter ) /etc/pdnsd.conf content with this: global { perm_cache = 2048; cache_dir = "/var/cache/pdnsd"; run_as = "pdnsd"; server_ip = 127.0.0.1; status_ctl = on; min_ttl = 15m; max_ttl = 1w; timeout = 120; } # Tor DNS resolver server { label = "tor"; ip = 127.0.0.1; port = 8853; uptest = none; exclude=".invalid"; policy=included; proxy_only = on; lean_query = on; } # ttdnsd server { label = "ttdnsd"; ip = 127.0.0.2; port = 53; uptest = none; exclude=".invalid",".exit",".onion"; policy=included; proxy_only = on; lean_query = on; } /etc/tor/torrc has DNSPort 8853 AutomapHostsOnResolve 1 AutomapHostsSuffixes .exit,.onion So ttdnsd running at port 53 at 127.0.0.2 and tor dns at 127.0.0.1 port 8853. But nmap shows ( #nmap -p 1-65535 localhost ) PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 111/tcp open rpcbind 631/tcp open ipp 8118/tcp open privoxy 9040/tcp open tor-trans 9050/tcp open tor-socks 9051/tcp open tor-control no open port for tor-dns [Q] How can I enforce all udp to go through local DNS port and which one 53 or 8853 ? <...> iptables -t nat -A OUTPUT ! -o lo -p udp -m udp --dport 53 -j REDIRECT --to-ports 53 iptables -t filter -A OUTPUT -p udp -m udp --dport 53 -j ACCEPT <...> is not working. Can't do any dns resolution, even ping failed to gmail.com iptables to route all traffic and blocked all non tor ====================================================== LAN and lo (localhost) don't need to go through tor port 80/443 should go through poliop port 8118, all dns query should go through local 53 ( or 8853 ? ) port And the rest of the traffic should go through tor 9050 port, anything left should be dropped. The example iptables given at tails site is not working for me. Could anyone kindly give such a rule sets please ? Many many thanks for designing tor :-) _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Sep 18 06:57:30 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 18 Sep 2012 15:57:30 +0200 Subject: [tor-talk] almost success toward complete tor enforcement, need little help now Message-ID: <20120918135730.GD9750@leitl.org> ----- Forwarded message from adrelanos ----- From eugen at leitl.org Tue Sep 18 07:35:17 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 18 Sep 2012 16:35:17 +0200 Subject: [drone-list] End-Use Monitoring on Unmanned Aerial Vehicle Exports Message-ID: <20120918143517.GH9750@leitl.org> ----- Forwarded message from Gregory Foster ----- From anitandd at allseas.net Tue Sep 18 10:01:13 2012 From: anitandd at allseas.net (=?koi8-r?B?Iu7v9/nqINDP0tHEz8sg8/Ty7+n05ez47u/qIPzr8/Dl8vTp+vki?=) Date: Tue, 18 Sep 2012 18:01:13 +0100 Subject: =?koi8-r?B?0MHT0M/S1CDQ0s/Fy9TBIMTM0SDSwdrSxdvFzsnRIM7BINPU0s/J1A==?= =?koi8-r?B?xczY09TXzw==?= Message-ID: <01cd95c7$971e7a80$f5c5deb2@anitandd> 24 u 25 сентября 2012 года в Петеpбypге пpoйдет кypc пocвященный Нoвoмy пopядкy гocyдapcтвеннoй и негосударственной cтpouтельнoй экcпеpтuзы u cтpouтельнoмy нaдзopy B paмкax кypca бyдyт paccмoтpены ocнoвные вoпpocы, кacaемые ГОCУДAРCТBEННОЙ ЭKCПEРТИЗЫ u CТРОИТEЛЬНОГО НAДЗОРA, технических регламентов Таможенного союза в области строительства и безопасности, a тaкже: - Система ценообразования и сметного нормирования в строительстве - Земельный кoдекc РФ - Нoвoе в пoдгoтoвке ucxoднo-paзpешuтельнoй дoкyментaцuu - Bыдaчa paзpешенuй нa cтpouтельcтвo - Тpебoвaнuя CнuП u дpyгux нopмaтuвoв - Bыдaчa paзpешенuй нa ввoд oбъектoв в экcплyaтaцuю - Определение сметной стоимости монтажных работ и оборудования - Система руководящих и методических документов для применения свода правил и сметно-нормативной базы на федеральном, территориальном и местном уровнях определения сметной стоимости строительства (ГЭСН-2001, ГЭСНр-2001, ФЕР-2001, ФЕРр-2001, ТЕР-2001,ТЕРр-2001) - Технические регламенты Таможенного союза в области безопасности и строительства Пo вcем вoпpocaм Bы мoжете нaм нaпucaть uлu пoзвoнuть! C Увaженuем, uнфopмaцuoнный oтдел *812* .986=82=29. From bomber at derka.com.au Tue Sep 18 06:52:06 2012 From: bomber at derka.com.au (=?koi8-r?B?IvLBydPBIO7B2snSz9fOwSI=?=) Date: Tue, 18 Sep 2012 19:22:06 +0530 Subject: =?koi8-r?B?wsXazMnNydTO2cogzcXWx8/Sz8Qh?= Message-ID: <01cd95d2$e3bb8300$d95af173@bomber> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Бесплатные звонки на SIP телефоны From a_manzon at abc-systemes.com Tue Sep 18 08:39:12 2012 From: a_manzon at abc-systemes.com (=?koi8-r?B?Iu/L08HOwSDnz8zVwsXOy88i?=) Date: Tue, 18 Sep 2012 21:09:12 +0530 Subject: =?koi8-r?B?2tfPzsvJINDPIPLP09PJySDExdvF188=?= Message-ID: <01cd95e1$d9ed4c00$6f6cae7a@a_manzon> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Бесплатные звонки на SIP телефоны From bf at cordobaservice.com Tue Sep 18 06:14:32 2012 From: bf at cordobaservice.com (=?koi8-r?B?Iu7v9/nqINDP0tHEz8sg8/Ty7+n05ez47u/qIPzr8/Dl8vTp+vki?=) Date: Tue, 18 Sep 2012 21:14:32 +0800 Subject: =?koi8-r?B?89TSz8nUxczYzsHRINzL09DF0tTJ2sE=?= Message-ID: <01cd95e2$98a96c00$ce20e07d@bf> 24 u 25 сентября 2012 года в Петеpбypге пpoйдет кypc пocвященный Нoвoмy пopядкy гocyдapcтвеннoй и негосударственной cтpouтельнoй экcпеpтuзы u cтpouтельнoмy нaдзopy B paмкax кypca бyдyт paccмoтpены ocнoвные вoпpocы, кacaемые ГОCУДAРCТBEННОЙ ЭKCПEРТИЗЫ u CТРОИТEЛЬНОГО НAДЗОРA, технических регламентов Таможенного союза в области строительства и безопасности, a тaкже: - Система ценообразования и сметного нормирования в строительстве - Земельный кoдекc РФ - Нoвoе в пoдгoтoвке ucxoднo-paзpешuтельнoй дoкyментaцuu - Bыдaчa paзpешенuй нa cтpouтельcтвo - Тpебoвaнuя CнuП u дpyгux нopмaтuвoв - Bыдaчa paзpешенuй нa ввoд oбъектoв в экcплyaтaцuю - Определение сметной стоимости монтажных работ и оборудования - Система руководящих и методических документов для применения свода правил и сметно-нормативной базы на федеральном, территориальном и местном уровнях определения сметной стоимости строительства (ГЭСН-2001, ГЭСНр-2001, ФЕР-2001, ФЕРр-2001, ТЕР-2001,ТЕРр-2001) - Технические регламенты Таможенного союза в области безопасности и строительства Пo вcем вoпpocaм Bы мoжете нaм нaпucaть uлu пoзвoнuть! C Увaженuем, uнфopмaцuoнный oтдел *812* .986=82=29. From 2862.rigapopn.info at kusat.com Tue Sep 18 09:12:36 2012 From: 2862.rigapopn.info at kusat.com (=?koi8-r?B?IuvV0tMg0M/X2dvFzsnRIMvXwczJxsnLwcPJySD3z8TO2cogy8/ExQ==?= =?koi8-r?B?y9Mi?=) Date: Tue, 18 Sep 2012 21:42:36 +0530 Subject: =?koi8-r?B?8NLJzcXOxc7JxSDXz8TOz8fPINrBy8/Oz8TB1MXM2NPU18Eg1yAyMA==?= =?koi8-r?B?MTIgx8/E1Q==?= Message-ID: <01cd95e6$84676e00$8233b973@2862.rigapopn.info> Ведущему инженеру Уважаемые коллеги! Приглашаем Вас на курс посвященный последним изменениям водного законодательства по теме: ВОДНЫЙ КОДЕКС. Применение водного законодательства в 2012 году. ФЗ N 416-ФЗ от 07.12.2011 "О ВОДОСНАБЖЕНИИ И ВОДООТВЕДЕНИИ" Дата проведения: 01 - 02 октября 2012 г. Место проведения: г. Санкт - Петербург Краткая программа курса повышения квалификации: 1.Водные объекты и водные ресурсы РФ. 2.Изменения природоресурсного и природоохранного законодательства РФ. 3.Права собственности на водные объекты. 4.Водные объекты общего пользования. 5.Основы управления водными объектами, предусмотренные Водным кодексом РФ. 6.Понятия и составные части водного объекта. 7.Разграничение собственности на водные объекты между РФ, субъектами РФ, муниципальными образованиями, физическими и юридическими лицами. 8.Принципы управления использованием и охраной водных объектов. 9.Ответственность за нарушение водного законодательства РФ. За всеми подробностями обращайтесь по телефону: (812) 642-98-29 С уважением, Ермакова Екатерина Дмитриевна менеджер информационного отдела Тел.: (812) 642-98-29 From andreaandrea.porcu at selesta.ca Tue Sep 18 08:00:48 2012 From: andreaandrea.porcu at selesta.ca (=?koi8-r?B?IvPuyfAsIOfv8/QsIPfz7iwg9PUi?=) Date: Tue, 18 Sep 2012 22:00:48 +0700 Subject: =?koi8-r?B?/MvT0MXS1MnawSDExcbFy9TP1ywg0M/X0sXWxMXOycosIMTFxs/SzQ==?= =?koi8-r?B?wcPJyiwg1NLF3cnO?= Message-ID: <01cd95e9$0f496800$ba6efede@andreaandrea.porcu> 24 u 25 сентября 2012 года в Петеpбypге пpoйдет кypc пocвященный Нoвoмy пopядкy гocyдapcтвеннoй и негосударственной cтpouтельнoй экcпеpтuзы u cтpouтельнoмy нaдзopy B paмкax кypca бyдyт paccмoтpены ocнoвные вoпpocы, кacaемые ГОCУДAРCТBEННОЙ ЭKCПEРТИЗЫ u CТРОИТEЛЬНОГО НAДЗОРA, технических регламентов Таможенного союза в области строительства и безопасности, a тaкже: - Система ценообразования и сметного нормирования в строительстве - Земельный кoдекc РФ - Нoвoе в пoдгoтoвке ucxoднo-paзpешuтельнoй дoкyментaцuu - Bыдaчa paзpешенuй нa cтpouтельcтвo - Тpебoвaнuя CнuП u дpyгux нopмaтuвoв - Bыдaчa paзpешенuй нa ввoд oбъектoв в экcплyaтaцuю - Определение сметной стоимости монтажных работ и оборудования - Система руководящих и методических документов для применения свода правил и сметно-нормативной базы на федеральном, территориальном и местном уровнях определения сметной стоимости строительства (ГЭСН-2001, ГЭСНр-2001, ФЕР-2001, ФЕРр-2001, ТЕР-2001,ТЕРр-2001) - Технические регламенты Таможенного союза в области безопасности и строительства Пo вcем вoпpocaм Bы мoжете нaм нaпucaть uлu пoзвoнuть! C Увaженuем, uнфopмaцuoнный oтдел *812* .986=82=29. From camera_lumina at hotmail.com Tue Sep 18 19:01:02 2012 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 18 Sep 2012 22:01:02 -0400 Subject: This Machine Kills Secrets Message-ID: Lotsa Cypherpunk stuff in there, apparently. Anyone talk to this guy? Reward with dollars (ie, buy)? Or does information in this case want to be free? If the former, no doubt I'll be buying in cash. -TD From blondellmelanie at pctel.com Tue Sep 18 08:26:36 2012 From: blondellmelanie at pctel.com (Alyce Florentina) Date: Tue, 18 Sep 2012 23:26:36 +0800 Subject: Best Male Enhancement Penis Enlargement Pills 2012. Order Now! See The 4 Free Great Bonus Gifts ho9mqnpf76 Message-ID: <62w42o84o46-49538499-882b9w81@xjjkpdri> Bonus Gifts - PenisSolution Pills - 2012 Best Male Enhancement Penis Enlargement Pills 2012. Order Now! See The 4 Free Great Bonus Gifts http://beful.ru From bkfuhrer at netidea.com Tue Sep 18 07:26:48 2012 From: bkfuhrer at netidea.com (=?koi8-r?B?IuvV0tMg0M8g18/Ezs/N1SDLz8TFy9PVIg==?=) Date: Tue, 18 Sep 2012 23:26:48 +0900 Subject: =?koi8-r?B?98/Ez9POwcLWxc7JxSDXIDIwMTIgx8/E1Q==?= Message-ID: <01cd95f5$12e2ec00$8a41d870@bkfuhrer> Ведущему инженеру Уважаемые коллеги! Приглашаем Вас на курс посвященный последним изменениям водного законодательства по теме: ВОДНЫЙ КОДЕКС. Применение водного законодательства в 2012 году. ФЗ N 416-ФЗ от 07.12.2011 "О ВОДОСНАБЖЕНИИ И ВОДООТВЕДЕНИИ" Дата проведения: 01 - 02 октября 2012 г. Место проведения: г. Санкт - Петербург Краткая программа курса повышения квалификации: 1.Водные объекты и водные ресурсы РФ. 2.Изменения природоресурсного и природоохранного законодательства РФ. 3.Права собственности на водные объекты. 4.Водные объекты общего пользования. 5.Основы управления водными объектами, предусмотренные Водным кодексом РФ. 6.Понятия и составные части водного объекта. 7.Разграничение собственности на водные объекты между РФ, субъектами РФ, муниципальными образованиями, физическими и юридическими лицами. 8.Принципы управления использованием и охраной водных объектов. 9.Ответственность за нарушение водного законодательства РФ. За всеми подробностями обращайтесь по телефону: (812) 642-98-29 С уважением, Ермакова Екатерина Дмитриевна менеджер информационного отдела Тел.: (812) 642-98-29 From bowmand at premierbank.com Tue Sep 18 12:28:48 2012 From: bowmand at premierbank.com (=?koi8-r?B?IvPXxdTMwc7BIg==?=) Date: Wed, 19 Sep 2012 00:58:48 +0530 Subject: =?koi8-r?B?wsXazMnNydTO2cogzcXWx8/Sz8Qh?= Message-ID: <01cd9601$ed101400$0601a07a@bowmand> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Бесплатные звонки на SIP телефоны From 46fd6340.1020703 at telefonicamoviles.com Tue Sep 18 11:50:10 2012 From: 46fd6340.1020703 at telefonicamoviles.com (=?koi8-r?B?ItTFyM7J3sXTy8nKIM7BxNrP0iDawSDT1NLPydTFzNjT1NfPzSI=?=) Date: Wed, 19 Sep 2012 03:50:10 +0900 Subject: =?koi8-r?B?y8/HxMEgzsXPwsjPxMnNzyDSwdrSxdvFzsnFIM7BINPU0s/J1MXM2A==?= =?koi8-r?B?09TXzz8=?= Message-ID: <01cd9619$dd9cc500$34b3e4d3@46fd6340.1020703> 24 u 25 сентября 2012 года в Петеpбypге пpoйдет кypc пocвященный Нoвoмy пopядкy гocyдapcтвеннoй и негосударственной cтpouтельнoй экcпеpтuзы u cтpouтельнoмy нaдзopy B paмкax кypca бyдyт paccмoтpены ocнoвные вoпpocы, кacaемые ГОCУДAРCТBEННОЙ ЭKCПEРТИЗЫ u CТРОИТEЛЬНОГО НAДЗОРA, технических регламентов Таможенного союза в области строительства и безопасности, a тaкже: - Система ценообразования и сметного нормирования в строительстве - Земельный кoдекc РФ - Нoвoе в пoдгoтoвке ucxoднo-paзpешuтельнoй дoкyментaцuu - Bыдaчa paзpешенuй нa cтpouтельcтвo - Тpебoвaнuя CнuП u дpyгux нopмaтuвoв - Bыдaчa paзpешенuй нa ввoд oбъектoв в экcплyaтaцuю - Определение сметной стоимости монтажных работ и оборудования - Система руководящих и методических документов для применения свода правил и сметно-нормативной базы на федеральном, территориальном и местном уровнях определения сметной стоимости строительства (ГЭСН-2001, ГЭСНр-2001, ФЕР-2001, ФЕРр-2001, ТЕР-2001,ТЕРр-2001) - Технические регламенты Таможенного союза в области безопасности и строительства Пo вcем вoпpocaм Bы мoжете нaм нaпucaть uлu пoзвoнuть! C Увaженuем, uнфopмaцuoнный oтдел *812* .986=82=29. From saftergood at fas.org Wed Sep 19 07:27:11 2012 From: saftergood at fas.org (Steven Aftergood) Date: Wed, 19 Sep 2012 07:27:11 -0700 Subject: Secrecy News -- 09/19/12 Message-ID: Format Note: If you cannot easily read the text below, or you prefer to receive Secrecy News in another format, please reply to this email to let us know. SECRECY NEWS from the FAS Project on Government Secrecy Volume 2012, Issue No. 95 September 19, 2012 Secrecy News Blog: http://www.fas.org/blog/secrecy/ ** PRODUCTION OF [DELETED] WEAPONS, 1981 ** SURVEILLANCE OF JOURNALISTS: A LOOK BACK ** POVERTY IN THE UNITED STATES, AND MORE FROM CRS PRODUCTION OF [DELETED] WEAPONS, 1981 For decades, President Reagan's 1981 National Security Decision Directive (NSDD) 7 remained entirely classified. According to a 1999 listing of Reagan NSDDs issued by the National Security Council, even the title of NSDD 7 was classified. In 2008, the document was partially declassified, bearing the title "[deleted] Weapons." It stated: "The production and stockpiling of [deleted] weapons is authorized with stockpiling being restricted to the United States [deleted]." http://www.fas.org/irp/offdocs/nsdd/nsdd-7.pdf What is this all about? What mysterious weapons were to be produced and stockpiled that could not be acknowledged three decades later? In all likelihood, said Hans Kristensen of FAS, the deleted term describing the weapons is "enhanced radiation." Two enhanced radiation weapons started production in August/September 1981, he noted: the W70 (Lance warhead) and the W79 (artillery shell). That likelihood is actually a certainty, said our colleague Allen Thomson, who pointed to the 1991 Bush directive NSD 59. The Bush directive, declassified in 1996, listed the title of NSDD 7 with no redactions: Enhanced Radiation Weapons. http://www.fas.org/irp/offdocs/nsd/nsd59.pdf SURVEILLANCE OF JOURNALISTS: A LOOK BACK "The Department of Defense does not conduct electronic or physical surveillance of journalists," Pentagon press spokesman George E. Little wrote in a September 6 response to reporters who had questioned the scope of official monitoring of their work. http://www.fas.org/blog/secrecy/2012/09/press_surveillance.html The DoD disavowal of active surveillance is almost certainly true, as far as it goes. Even if there were surveillance to be done, it would probably not be performed by DoD. But the reporters' question was not a frivolous one. There is an historical basis for their concern. The celebrated CIA "family jewels" report on illegal Agency activities prior to the mid-1970s that was finally released in full in 2007 included descriptions of CIA operations to surveil reporters in order to identify their confidential sources. http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB222/ The operation known as CELOTEX I was summarized as follows: "At the direction of the DCI, a surveillance was conducted of Michael Getler of the Washington Post during the periods 6-9 October, 27 October - 10 December 1971 and on 3 January 1972. In addition to physical surveillance, an observation post was maintained in the Statler Hilton Hotel where observation could be maintained of the building housing his office. The surveillance was designed to determine Getler's sources of classified information of interest to the Agency which had appeared in a number of his columns." CELOTEX II was described this way: "At the direction of the DCI, surveillance was conducted of Jack Anderson and at various times his 'leg men,' Britt Hume, Leslie Whitten, and Joseph Spear, from 15 February to 12 April 1972. In addition to the physical surveillance, an observation post was maintained in the Statler Hilton Hotel directly opposite Anderson's office. The purpose of this surveillance was to attempt to determine Anderson's sources for highly classified Agency information appearing in his syndicated columns." The results of these surveillance activities were not reported in the CIA document. Government attorneys this week reiterated their argument that New York Times reporter James Risen "does not have a 'reporter's privilege' to refuse to identify his source" in the prosecution of former CIA officer Jeffrey Sterling, who is accused of disclosing classified information to Risen. The attorneys cited a new ruling in another Circuit that rejected a similar claim of privilege, and they urged the Fourth Circuit Court of Appeals to affirm their position. http://www.fas.org/sgp/jud/sterling/091712-supp.pdf POVERTY IN THE UNITED STATES, AND MORE FROM CRS "In 2011, 46.2 million people were counted as poor in the United States, the same number as in 2010 and the largest number of persons counted as poor in the measure's 53-year recorded history," according to a timely new report from the Congressional Research Service. See Poverty in the United States: 2011, September 13, 2012: http://www.fas.org/sgp/crs/misc/RL33069.pdf Other new and newly updated CRS reports that have not been made publicly available include the following. Intelligence Authorization Legislation: Status and Challenges, updated September 18, 2012: http://www.fas.org/sgp/crs/intel/R40240.pdf Latin America and the Caribbean: Fact Sheet on Leaders and Elections, updated September 17, 2012: http://www.fas.org/sgp/crs/row/98-684.pdf Carbon Tax: Deficit Reduction and Other Considerations, September 17, 2012: http://www.fas.org/sgp/crs/misc/R42731.pdf Energy Tax Incentives: Measuring Value Across Different Types of Energy Resources, updated September 18, 2012: http://www.fas.org/sgp/crs/misc/R41953.pdf Congressional Responses to Selected Work Stoppages in Professional Sports, updated September 17, 2012: http://www.fas.org/sgp/crs/misc/R41060.pdf Length of Time from Nomination to Confirmation for "Uncontroversial" U.S. Circuit and District Court Nominees: Detailed Analysis, September 18, 2012: http://www.fas.org/sgp/crs/misc/R42732.pdf _______________________________________________ Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists. The Secrecy News Blog is at: http://www.fas.org/blog/secrecy/ To SUBSCRIBE to Secrecy News, go to: http://www.fas.org/sgp/news/secrecy/subscribe.html To UNSUBSCRIBE, go to http://www.fas.org/sgp/news/secrecy/unsubscribe.html OR email your request to saftergood at fas.org Secrecy News is archived at: http://www.fas.org/sgp/news/secrecy/index.html Support the FAS Project on Government Secrecy with a donation: http://www.fas.org/member/donate_today.html _______________________ Steven Aftergood Project on Government Secrecy Federation of American Scientists web: www.fas.org/sgp/index.html email: saftergood at fas.org voice: (202) 454-4691 twitter: @saftergood ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Sep 19 08:12:52 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 19 Sep 2012 17:12:52 +0200 Subject: Secrecy News -- 09/19/12 Message-ID: <20120919151252.GY9750@leitl.org> ----- Forwarded message from Steven Aftergood ----- From jya at pipeline.com Thu Sep 20 07:34:08 2012 From: jya at pipeline.com (John Young) Date: Thu, 20 Sep 2012 10:34:08 -0400 Subject: This Machine Kills Secrets Message-ID: Here are the book's contents, list of characters, and index: http://cryptome.org/2012/08/greenberg-leaks-secrets.pdf Not a few in the book will regret talking to Greenberg and might seek revenge using cpunks wizardry and subterfuge against the author and Forbes. Smells of a smear by the capitalist fools. Pretty good Wired-level read, above average on the tech, but marred by the personal slop, authorial preening and evasion of inconvenient truth which are now obligatory among craven journalists running scared of their salacity-demanding fans, censorious lawyers and immoral publishers. While that is not news here, Greenberg managed to breach defenses by MTMing targets induced to finger one another. Personal stuff allegedly revealed by Greenberg's "characters" Tim May, John Gilmore, Phil Zimmermann and Mudge, for example, might arouse gossip-loving readers to hoot and holler. Formulaic padding about WikiLeaks and hangers-on is rancid recycling still being massively churned to entice rabid book sellers and advertizers sustaining Forbe's fortune. At 10:01 PM 9/18/2012, you wrote: >Lotsa Cypherpunk stuff in there, apparently. Anyone talk to this guy? > >Reward with dollars (ie, buy)? Or does information in this case want to be >free? If the former, no doubt I'll be buying in cash. > >-TD From virtualadept at gmail.com Thu Sep 20 08:40:15 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Thu, 20 Sep 2012 11:40:15 -0400 Subject: [ZS] ZS reboot seed Message-ID: On Thu, Sep 20, 2012 at 6:53 AM, R|diger Koch wrote: > I hope and believe that we still have a long way to go down the Road to > Serfdom until this becomes a real possibility. There is still a chance that > the current process stops. The USA had a close brush with totalitarianism > (Mc Carthy) in the 1950s and also managed to come around. We're creeping closer to it again, I'm afraid - anarchists are the new reds, warrants are secret, and doors are being kicked in. > If we get close, we'll stop distributing updates, find another way to > accomplish the same goals and ask everyone to destroy their copies. This is, incidentally, why I keep talking about running everything over Tor and using distributed services. If one instance of a service has to disappear (say it gets /usr/bin/shred'd for security) other instances on the network wll still exist and operate normally. -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From vickieapolonia at hcahealthcare.com Thu Sep 20 06:45:17 2012 From: vickieapolonia at hcahealthcare.com (Devora Sharolyn) Date: Thu, 20 Sep 2012 11:45:17 -0200 Subject: BigMan and Manhood Plus and are proven to increase penis size. Recommended Penis Enlargement Pills to Increase Your Penis Size wh9heh Message-ID: <18d76i40b50-42692890-575j4l33@werifhjz> Recommended Penis Enlargement Pills to Increase Your Penis Size In the world of penis enlargement pills, two brands stand clearly above the rest. BigMan and Manhood Plus and are proven to increase penis size. http://gooddfg.ru From virtualadept at gmail.com Thu Sep 20 08:53:18 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Thu, 20 Sep 2012 11:53:18 -0400 Subject: [ZS] ZS reboot seed Message-ID: On Thu, Sep 20, 2012 at 8:14 AM, ZeroState.net wrote: > The important issue right this very moment, I think, is the one Niles has > raised. How might you create a 'reboot seed' (is there a technical term for > such things, if we were to go with a computer science analogy?) that somehow > avoids compromising specific individuals? Perhaps not, but let's at least > *attempt* a little creative brainstorming here... Why not publish the design pattern that the Zero State is using for its superstructure? hackerspaces.org has documented numerous design patterns that a small group can choose from if they want to bootstrap a hackerspace. All of them are formal descriptions of how hackerspaces did it so new ones don't have to reinvent the wheel: http://hackerspaces.org/wiki/Design_Patterns Telecomix has not only documented the quasi-design pattern of their collective but they've run workshops at conferences to teach other people how to do it. Alvin Toffler would be proud. Note that I'm not able to reach their wiki from work right now, others might be able to: werebuild.telecomix.org What I'm suggesting is that we take a page from the Hakatak Records Manifesto. Once we've got a good working structure and set of resources, let's document them someplace and make sure that everyone can access them. All it would take is a single copy of the design pattern document/software bundle to bootstrap another Zero State (-like group) somewhere else. If anything does happen, the bundle can be leaked for others to download and make use of; or some of us could use it to re-bootstrap. -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From virtualadept at gmail.com Thu Sep 20 08:54:32 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Thu, 20 Sep 2012 11:54:32 -0400 Subject: [ZS] ZS reboot seed Message-ID: On Thu, Sep 20, 2012 at 8:19 AM, R|diger Koch wrote: > We should focus on getting things done instead of doing magic with complex > crypto to avoid problems that aren't real (yet). That said, we might want > to put such info into the NameCoin blockchain some day. > http://dot-bit.org/Main_Page The same accessibility problems exist for NameCoin as BitCoin: NameCoins are destoyed as domains are (re-)registered, and CUDA and FPGA mining will shortly make it next to impossible to register quietly. There are other technologies with a lower barrier to entry. -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From virtualadept at gmail.com Thu Sep 20 08:56:51 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Thu, 20 Sep 2012 11:56:51 -0400 Subject: [ZS] ZS reboot seed Message-ID: On Thu, Sep 20, 2012 at 8:19 AM, Dirk Bruere wrote: > Darknet server with encrypted list - doubly hidden and with only a > handful of people who know the passwords and locations. In fact, apart How about lots of them - one per member? Barring the transition of an x-risk into an x-occurrance, only one copy would have to survive. > from one person, the passwords and location could be kept seperate ie > only one person knows both. And the others do not all know each other. > A "buddy system" There are distributed, federated wikis out there. There are federated, distributed chat systems out there. There are distributed file stores out there. There are federated, distributed socnets out there. There is no reason that we can't go mycelial and automagically distribute copies of every/thing/ every/where/. -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From virtualadept at gmail.com Thu Sep 20 09:49:35 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Thu, 20 Sep 2012 12:49:35 -0400 Subject: [ZS] ZS reboot seed Message-ID: On Thu, Sep 20, 2012 at 11:59 AM, Dirk Bruere wrote: > Given that you know vastly more about it than most of us, including > me, could you put together some suggestions as to how we proceed, with > recommendations? I'll take a crack at it: A lot of the Zero State notes and docs are online in Google Pages. That's pretty much a wiki. The usual wiki software (MediaWiki, Trac, MoinMoin, et cetera) is nice, but not distributed. One server, one database, one wiki. While it's possible to cluster the databases not all software plays nicely that way, and in fact a lot of database software we're likely to get hold of has serious hardcoded limitations on the number of nodes (MySQL, I'm looking at you). There are alternative wiki implementations that do the same thing but make it possible to share the whole shebang across arbitrary numbers of nodes, potentially more one per member of the Zero State, potentially more than one per member. The first thing that comes to mind is Ward Cunningham's Smallest Federated Wiki (https://github.com/WardCunningham/Smallest-Federated-Wiki). It's a web application (Ruby/Sinatra/JavaScript) which runs on a machine and is accessible through a web browser. It's designed such that multiple instances of the server can connect to one another over a network and synch up, so it's really one wiki spread across lots of machines at the same time. Multiple people can browse the wiki, create and edit pages. I dont' see why we can't have instances communicating over a darknet. The one that I keep coming back to (and not just because I suck at Ruby apps) is called Fossil (https://www.fossil-scm.org/index.html/doc/trunk/www/index.wiki), which is a distributed revision control system, bug/ticket tracker, blog, and wiki. It uses many of the same techniques as (and in fact is compatible with) the revision control system Git (http://git-scm.org/). Again, it's accessed with a web browser, everything is versioned, and multiple instances can synch up with one another in a by-any-means-necessary approach. Revision control is good for more than just source code - a lot of us use it to help manage our configuration files as well as things we write. We can check stuff we're working on into revision control if we wanted to. We could definitely use the wiki and blog. The ticket tracker could be used to assign and keep track of tasks (ticket #31337: Create Friendly AGI) that we're working on. Fossil can automatically synch off of a single server, or instances can synch off of each other and merge the data. It's cross platform. And, if something does happen, all it takes is a single instance of Fossil to re-bootstrap because every node has... well.. everything. We could import everything important into one of these systems and others could set up and synch their own copies of the whole Zero State superstructure. Chat isn't particularly difficult: While we could set up our own servers we could also just as easily take advantage of any and all XMPP services out there. There are skillions of them, and most of them can cross-chat between one another. I do that a lot with friends aorund the world: My jabber.ccc.de account can talk to the endno.de folks, the Blackbird folks, and so on. If we really wanted to we could set up our own XMPP servers. But there are other ways. Lately I've been experimenting with Litter (https://github.com/ptony82/litter), a distributed microblogging system written in Python. Unpack it, run it, and it does pretty much what you'd expect of Twitter.. save that it automatically seeks out and finds other instances of Litter on the network using IP multicasting and exchanges messages with them. It's pretty nifty and very lightweight. I haven't tested it with Tor or I2P yet, though. Torchat (https://github.com/prof7bit/TorChat) is actually implemented in a number of languages, but they all do pretty much the same thing: If you're running Tor on your laptop or workstation it'll set up a hidden service that is uniquely yours. Other Torchat users can, if they know the address, add you as a friend and you can IM over the Tor network. It's a pretty nice IM client. Tahoe-LAFS (https://tahoe-lafs.org/trac/tahoe-lafs) is a massively distributed file storage and sharing grid. The idea is that you install it and join a grid, and you donate a portion of your disk space to the grid that people can use to share and back up files. If some number of members built a grid we could put Zero State related materials into it for us to access - Fossil trees, documents, videos, audio recordings, whatever we needed to replicate and make available, we could. The next question is how to network all this stuff together. Tor (https://torproject.org/) is the first thing that comes to mind because it's the most popoular and heavily worked on right now. There isn't a whole lot that we couldn't set up so that it's available only to Zero State members through the Tor network who know the .onion addresses. If we wanted to go about it another way, we could use something like SocialVPN (https://socialvpn.wordpress.com/). It's written in C# but designed to be Mono-compatible, and it's a peer to peer VPN that connects users over... XMPP. Rather than hunting for IP addresses of other nodes to connect to, the addresses are usernames of some people you probably already have in your IM friends list. As I recall, their primary test transport for this project is GChat. However, my concern is that it implicitly exposes your socnet because the usernames and addresses of your IM friends/VPN nodes might be in the clear. I'm not sure yet, I haven't looked into it. It also hasn't shown a lot of development in the past year. For whatever software development we do in the long run, we'll need someplace to put it all. If we go with Fossil we'll have a very useful hosting environment already. However, there are some alternatives which should be explored (though they're not as distributed-friendly as Fossil). Gitlab (http://gitlabhq.com/) does pretty much what Github (https://github.com/) is, though it's F/OSS, meaning we can set up as many instances of it as we like, anywhere we like. It does project management, Git repository hosting and management, bug tracking, fork and merge management, it has a wiki... It's written with Ruby On Rails. We can also clone Github with Redmine (http://xdissent.com/2010/05/04/github-clone-with-redmine/). I have personal reservations about Redmine (because I suck at Ruby and have been fighting with it at work for most of a year now) but if someone here is good with it, feel free to consider it as an option. So, how do we search all this stuff? I've been running a YaCy (http://yacy.de/) node for over a year as part of their grid and I'm quite pleased with how well it works as a search engine. It's basically a distributed search engine that you can either proxy your traffic through (and it'll index everything you browse through it - it's privacy aware, too), or it can be fed links that it'll index, follow, index, follow... It can be run as part of a private search grid (Crusoe Mode), so we could set up a private YaCy network (and run the traffic over Tor) to index all of our resources. It's written in Java but installs pretty easily, though the indices are pretty big so disk space will be necessary. I'm long overdue to add a couple of terabytes to my YaCy box. -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From flyingkiwiguy at gmail.com Thu Sep 20 04:55:12 2012 From: flyingkiwiguy at gmail.com (Gary Mulder) Date: Thu, 20 Sep 2012 12:55:12 +0100 Subject: [ZS] US House of Representatives Approves Sweeping, Warrantless Electronic Spy Powers Message-ID: http://www.wired.com/threatlevel/2012/09/house-approves-spy-bill -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From gfoster at entersection.org Thu Sep 20 11:40:13 2012 From: gfoster at entersection.org (Gregory Foster) Date: Thu, 20 Sep 2012 13:40:13 -0500 Subject: [liberationtech] Face recognition software prefers unsmiling humans Message-ID: A little poetry for the watchdogs. PoliceOne.com (Sep 20) - "[New Jersey] driver license face-recognition technology prohibits smiles": [1]http://www.policeone.com/police-technology/articles/5990244-N-J-driv er-license-face-recognition-technology-prohibits-smiles/ HT [2]@PoliceOne, gf -- Gregory Foster || [3]gfoster at entersection.org @gregoryfoster <> [4]http://entersection.com/ References 1. http://www.policeone.com/police-technology/articles/5990244-N-J-driver-license-face-recognition-technology-prohibits-smiles/ 2. http://twitter.com/PoliceOne/status/248848769012076544 3. mailto:gfoster at entersection.org 4. http://entersection.com/ -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Sep 20 05:10:24 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Sep 2012 14:10:24 +0200 Subject: [ZS] US House of Representatives Approves Sweeping, Warrantless Electronic Spy Powers Message-ID: <20120920121024.GK9750@leitl.org> ----- Forwarded message from Gary Mulder ----- From bandsxz4 at gigahookedopps.com.jfet.org Thu Sep 20 03:28:02 2012 From: bandsxz4 at gigahookedopps.com.jfet.org (=?koi8-r?B?IvLFzc/O1CI=?=) Date: Thu, 20 Sep 2012 15:58:02 +0530 Subject: =?koi8-r?B?8sXNz87UIMvXwdLUydLZICLQz8Qgy8zA3iIgz9QgNDUwMCAg0tXCLg==?= =?koi8-r?B?INrBIDHNMi4=?= Message-ID: <0983486910.PTWP90F7071770@lisdrf.nxnwfinnpza.tv> Ремонт квартиры "под ключ" от 4500 руб. за 1м2. Предлагаем услуги по отделке и ремонту квартир, офисов, общественных и жилых помещений "под ключ"
═
═Выполняем комплексный ремонт помещений: капитальный, косметический и евроремонт.
═
═Предлагаются следующие виды работ: малярные, электромонтажные, сантехнические, отделочные работы.
═
═Мы берем на себя весь ремонтный процесс: от доставки и подъема материалов до уборки и выноса мусора. Цены приемлемые. Договор смета. Выезд замерщика БЕСПЛАТНО!!!
═
═Режим работы с 9:00 до 19:00 без выходных.
═
═Лицензия ═ ГС-1-77-01-1027-0-7734591078-036617-1
 Контакты:═ 
═Тел. (495) 782-69-46
 www.ремонт-тут.рф From beulahadiabatic at rotation.ca Thu Sep 20 12:17:32 2012 From: beulahadiabatic at rotation.ca (=?koi8-r?B?IuvV0tMg0M8gy8HEwdPU0tUuIPPw5fvp9OUhIg==?=) Date: Thu, 20 Sep 2012 16:17:32 -0300 Subject: =?koi8-r?B?4cTNyc7J09TSwdTJ187ZxSDPx9LBzsnexc7J0SDQ0sHXIM7BINrFzQ==?= =?koi8-r?B?zMAu?= Message-ID: <01cd974b$6ff0b600$17d915c9@beulahadiabatic> Уважаемые коллеги! Приглашаем Вас посетить краткосрочный курс: ОФОРМЛЕНИЕ ПРАВ НА ОБЪЕКТЫ НЕДВИЖИМОСТИ. КАДАСТРОВЫЙ УЧЁТ, ОЦЕНКА И НАЛОГООБЛОЖЕНИЕ НЕДВИЖИМОСТИ. Последние изменения в законодательстве, арбитражная практика. 01 - 02 октяября 2ОI2 г. Санкт-Петербург (условия участия по телефону (код спб)6Ч2.ЧЗ.8Ч) ПРОГРАММА КУРСА - Последние изменения в правовом регулировании оформления прав на объекты недвижимости. Основы законодательства в области земельных отношений и кадастровой деятельности. Практика применения "Земельного кодекса РФ", "Гражданского кодекса РФ", "Градостроительного кодекса", ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним", и иных нормативных документов, регулирующих оборот объектов недвижимости. - Основные положения Федерального закона от 24.07.2007 г. # 221-ФЗ "О государственном кадастре недвижимости". Принципы ведения государственного кадастра недвижимости (ГКН). Порядок предоставления сведений ГКН. Порядок и особенности осуществления кадастрового учёта земельных участков, зданий, сооружений, объектов незавершённого строительства, помещений. Основания приостановления и отказа в проведении кадастрового учёта. - Кадастровые работы. Межевой план. Порядок согласования месторасположения границ земельных участков. Кадастровые паспорта на земельные участки, здания, сооружения, объекты незавершённого строительства, помещения. Требования к подготовке межевого плана. Многоконтурные земельные участки. Порядок их формирования и учета. Технический план сооружения. Требования к подготовке. - Зоны с особыми условиями использования территории. - Юридические аспекты объекта недвижимости (здания и сооружения) и принадлежности к нему; основания отнесения объекта к недвижимому имуществу. Земельный участок, инженерные сети, линейные объекты как объект недвижимости и ограничения, связанные с ними. Право долевой собственности, формирование и выдел долей. Понятие сложного единого объекта по Гражданскому кодексу РФ. Самовольная постройка: последствия создания, легализация. Сервитут как обременение права собственности, порядок определения права за сервитут и порядок заключения сервитутного соглашения. - Правовое регулирование и особенности государственной регистрации договора купли-продажи объектов недвижимости. Анализ судебной практики. Изменения в ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним". Правовое регулирование и особенности государственной регистрации договора ипотеки. - Порядок оформления арендных отношений. Правовая сущность договора. Предмет договора аренды, существенные условия договора. Арендодатель и его правоуполномоченные лица. Сохранение договора аренды при изменении арендодателя. Порядок регистрации договора аренды. Срок договора аренды. Досрочное расторжение договора аренды. Изменение сторон договора аренды. Договор субаренды, права на распоряжение арендованным имуществом. Договор аренды государственного и муниципального имущества. Анализ основных случаев отказа в государственной регистрации договора аренды. - Аренда земельных участков, находящихся в государственной или муниципальной собственности. Порядок заключения договора. Купля-продажа земельных участков, находящихся в государственной или муниципальной собственности. Общий порядок приобретения. Преимущественные права при выкупе земельных участков. Особенности перехода права собственности на землю при переходе прав на строение. Порядок приобретения прав на земельные участки, находящиеся в государственной или муниципальной собственности, на которых расположены здания, строения, сооружения (в т.ч. приватизированные). - Особенности предоставления земельных участков для строительства. Порядок предоставления земель для различных целей. административные ограничения прав на землю. - Особенности оформления прав на земельные участки под строительство линейных объектов. Регистрация прав собственности на линейные объекты и объекты инженерной инфраструктуры. - Государственная политика в области налогообложения имущества. Формирование налоговой базы налога на недвижимость. Массовая оценка как элемент налогообложения недвижимости. Классификация объектов недвижимости для целей кадастровой оценки и налогообложения. Причины и последствия изменение системы классификации. Нормативное и правовое регулирование в области государственной кадастровой оценки (ГКО) земель и массовой оценки недвижимости. Основные положения методических документов по ГКО земель различных категорий. Порядок определения кадастровой стоимости в составе земель различных категорий. - Профессиональные требования, предъявляемые к кадастровым инженерам. Приказ Минэкономразвития России # 23 от 22.01.2010 г. "Об утверждении Положения о составе, порядке работы квалификационной комиссии для проведения аттестации на соответствие квалификационным требованиям, предъявляемым к кадастровым инженерам...". Комментарии, разъяснения. Кадастровый инженер. Состав, порядок работы квалификационной комиссии для проведения аттестации кадастровых инженеров. Порядок проведения квалификационного экзамена. Квалификационные требования, предъявляемые к кадастровым инженерам. Права и обязанности кадастровых инженеров. Доп. Информация и полная_ программа_ по телефону [8I2] 6.42_ 43.. 8Ч From eugen at leitl.org Thu Sep 20 07:55:23 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Sep 2012 16:55:23 +0200 Subject: [serval-project-dev] Reports of WiFi Monitor Mode on Nexus One and Samsung Galaxy SII Message-ID: <20120920145523.GO9750@leitl.org> ----- Forwarded message from Paul Gardner-Stephen ----- From eugen at leitl.org Thu Sep 20 09:24:40 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Sep 2012 18:24:40 +0200 Subject: [ZS] ZS reboot seed Message-ID: <20120920162440.GQ9750@leitl.org> ----- Forwarded message from Bryce Lynch ----- From eugen at leitl.org Thu Sep 20 09:25:12 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Sep 2012 18:25:12 +0200 Subject: [ZS] ZS reboot seed Message-ID: <20120920162512.GR9750@leitl.org> ----- Forwarded message from Bryce Lynch ----- From eugen at leitl.org Thu Sep 20 09:25:23 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Sep 2012 18:25:23 +0200 Subject: [ZS] ZS reboot seed Message-ID: <20120920162523.GS9750@leitl.org> ----- Forwarded message from Bryce Lynch ----- From eugen at leitl.org Thu Sep 20 09:25:48 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Sep 2012 18:25:48 +0200 Subject: [ZS] ZS reboot seed Message-ID: <20120920162548.GT9750@leitl.org> ----- Forwarded message from Bryce Lynch ----- From eugen at leitl.org Thu Sep 20 09:54:23 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Sep 2012 18:54:23 +0200 Subject: [ZS] ZS reboot seed Message-ID: <20120920165423.GA9750@leitl.org> ----- Forwarded message from Bryce Lynch ----- From eugen at leitl.org Thu Sep 20 13:21:19 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Sep 2012 22:21:19 +0200 Subject: [liberationtech] Face recognition software prefers unsmiling humans Message-ID: <20120920202119.GG9750@leitl.org> ----- Forwarded message from Gregory Foster ----- From berit.soderstrom at vll.ca Thu Sep 20 13:37:58 2012 From: berit.soderstrom at vll.ca (=?koi8-r?B?IunSyc7BIg==?=) Date: Thu, 20 Sep 2012 22:37:58 +0200 Subject: =?koi8-r?B?4sXazMnNydTO2cogzcXWx8/Sz8QgKyDNz9PLz9fTy8nKIM7PzcXS?= Message-ID: <01cd9780$954be700$e9d1e3d5@berit.soderstrom> БЕЗЛИМИТНЫЕзвонки по межгородувсего3000 руб. в месяц.Всезоны РФ (фиксированная и мобильная связь) Звоните сегодня:(495) 225-04-62 МНОГОКАНАЛЬНЫЙномер Прямой московский номер 495, 499Абонентская плата ≈ 300руб./месяцБольшой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы нипереехали- Все возможности АТС (голосовоеприветствие, голосовая почта и т.д.) включены в абонентскую плату - Экономия на покупке телефоннойстанции -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2767 bytes Desc: not available URL: From backup at themac.org Thu Sep 20 10:23:01 2012 From: backup at themac.org (=?koi8-r?B?Iv7UzyDO1dbOzyDazsHU2CDPIM7FxNfJ1snNz9PUySCWINDSyc7JzQ==?= =?koi8-r?B?wcXNINrB0dfLySEi?=) Date: Thu, 20 Sep 2012 22:53:01 +0530 Subject: =?koi8-r?B?+sXNxczYzs/FINrBy8/Oz8TB1MXM2NPU188=?= Message-ID: <01cd9782$af86c480$694fc675@backup> Уважаемые коллеги! Приглашаем Вас посетить краткосрочный курс: ОФОРМЛЕНИЕ ПРАВ НА ОБЪЕКТЫ НЕДВИЖИМОСТИ. КАДАСТРОВЫЙ УЧЁТ, ОЦЕНКА И НАЛОГООБЛОЖЕНИЕ НЕДВИЖИМОСТИ. Последние изменения в законодательстве, арбитражная практика. 01 - 02 октяября 2ОI2 г. Санкт-Петербург (условия участия по телефону (код спб)6Ч2.ЧЗ.8Ч) ПРОГРАММА КУРСА - Последние изменения в правовом регулировании оформления прав на объекты недвижимости. Основы законодательства в области земельных отношений и кадастровой деятельности. Практика применения "Земельного кодекса РФ", "Гражданского кодекса РФ", "Градостроительного кодекса", ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним", и иных нормативных документов, регулирующих оборот объектов недвижимости. - Основные положения Федерального закона от 24.07.2007 г. # 221-ФЗ "О государственном кадастре недвижимости". Принципы ведения государственного кадастра недвижимости (ГКН). Порядок предоставления сведений ГКН. Порядок и особенности осуществления кадастрового учёта земельных участков, зданий, сооружений, объектов незавершённого строительства, помещений. Основания приостановления и отказа в проведении кадастрового учёта. - Кадастровые работы. Межевой план. Порядок согласования месторасположения границ земельных участков. Кадастровые паспорта на земельные участки, здания, сооружения, объекты незавершённого строительства, помещения. Требования к подготовке межевого плана. Многоконтурные земельные участки. Порядок их формирования и учета. Технический план сооружения. Требования к подготовке. - Зоны с особыми условиями использования территории. - Юридические аспекты объекта недвижимости (здания и сооружения) и принадлежности к нему; основания отнесения объекта к недвижимому имуществу. Земельный участок, инженерные сети, линейные объекты как объект недвижимости и ограничения, связанные с ними. Право долевой собственности, формирование и выдел долей. Понятие сложного единого объекта по Гражданскому кодексу РФ. Самовольная постройка: последствия создания, легализация. Сервитут как обременение права собственности, порядок определения права за сервитут и порядок заключения сервитутного соглашения. - Правовое регулирование и особенности государственной регистрации договора купли-продажи объектов недвижимости. Анализ судебной практики. Изменения в ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним". Правовое регулирование и особенности государственной регистрации договора ипотеки. - Порядок оформления арендных отношений. Правовая сущность договора. Предмет договора аренды, существенные условия договора. Арендодатель и его правоуполномоченные лица. Сохранение договора аренды при изменении арендодателя. Порядок регистрации договора аренды. Срок договора аренды. Досрочное расторжение договора аренды. Изменение сторон договора аренды. Договор субаренды, права на распоряжение арендованным имуществом. Договор аренды государственного и муниципального имущества. Анализ основных случаев отказа в государственной регистрации договора аренды. - Аренда земельных участков, находящихся в государственной или муниципальной собственности. Порядок заключения договора. Купля-продажа земельных участков, находящихся в государственной или муниципальной собственности. Общий порядок приобретения. Преимущественные права при выкупе земельных участков. Особенности перехода права собственности на землю при переходе прав на строение. Порядок приобретения прав на земельные участки, находящиеся в государственной или муниципальной собственности, на которых расположены здания, строения, сооружения (в т.ч. приватизированные). - Особенности предоставления земельных участков для строительства. Порядок предоставления земель для различных целей. административные ограничения прав на землю. - Особенности оформления прав на земельные участки под строительство линейных объектов. Регистрация прав собственности на линейные объекты и объекты инженерной инфраструктуры. - Государственная политика в области налогообложения имущества. Формирование налоговой базы налога на недвижимость. Массовая оценка как элемент налогообложения недвижимости. Классификация объектов недвижимости для целей кадастровой оценки и налогообложения. Причины и последствия изменение системы классификации. Нормативное и правовое регулирование в области государственной кадастровой оценки (ГКО) земель и массовой оценки недвижимости. Основные положения методических документов по ГКО земель различных категорий. Порядок определения кадастровой стоимости в составе земель различных категорий. - Профессиональные требования, предъявляемые к кадастровым инженерам. Приказ Минэкономразвития России # 23 от 22.01.2010 г. "Об утверждении Положения о составе, порядке работы квалификационной комиссии для проведения аттестации на соответствие квалификационным требованиям, предъявляемым к кадастровым инженерам...". Комментарии, разъяснения. Кадастровый инженер. Состав, порядок работы квалификационной комиссии для проведения аттестации кадастровых инженеров. Порядок проведения квалификационного экзамена. Квалификационные требования, предъявляемые к кадастровым инженерам. Права и обязанности кадастровых инженеров. Доп. Информация и полная_ программа_ по телефону [8I2] 6.42_ 43.. 8Ч From djb at cr.yp.to Thu Sep 20 16:39:57 2012 From: djb at cr.yp.to (D. J. Bernstein) Date: 20 Sep 2012 23:39:57 -0000 Subject: [cryptography] abstract: Air to Ground Quantum Key Distribution Message-ID: Zack Weinberg writes: > I've seen claims that quantum key agreement lets both parties detect a > man in the middle with no prior communication and no trusted third party. Nope. The security of QKE relies on the parties both knowing a shared secret key to authenticate messages. This begs the questions of (1) how the parties communicated this secret---this doesn't have to be a _prior_ secure channel but it does have to be a separate secure channel; (2) why the parties are bothering to use QKE to generate randomness when they can much more cheaply generate local randomness and send it through the separate secure channel; and (3) why the parties are bothering to generate so much randomness in the first place when they can much more cheaply use the key as an AES key to encrypt and authenticate messages. See http://cr.yp.to/talks/2009.10.06/slides2.pdf for a more detailed cost-benefit analysis. ---D. J. Bernstein Research Professor, Computer Science, University of Illinois at Chicago _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From blair at hudsonpooldist.com Thu Sep 20 08:43:45 2012 From: blair at hudsonpooldist.com (=?koi8-r?B?Iufr7iDnz9PVxMHS09TXxc7O2cogy8HEwdPU0iDOxcTXydbJzc/T1A==?= =?koi8-r?B?ySI=?=) Date: Thu, 20 Sep 2012 23:43:45 +0800 Subject: =?koi8-r?B?0MHT0M/S1CDPwt/Fy9TBINPU0s/J1MXM2NPU18E=?= Message-ID: <01cd9789$c5e44e80$b1076a72@blair> Уважаемые коллеги! Приглашаем Вас посетить краткосрочный курс: ОФОРМЛЕНИЕ ПРАВ НА ОБЪЕКТЫ НЕДВИЖИМОСТИ. КАДАСТРОВЫЙ УЧЁТ, ОЦЕНКА И НАЛОГООБЛОЖЕНИЕ НЕДВИЖИМОСТИ. Последние изменения в законодательстве, арбитражная практика. 01 - 02 октяября 2ОI2 г. Санкт-Петербург (условия участия по телефону (код спб)6Ч2.ЧЗ.8Ч) ПРОГРАММА КУРСА - Последние изменения в правовом регулировании оформления прав на объекты недвижимости. Основы законодательства в области земельных отношений и кадастровой деятельности. Практика применения "Земельного кодекса РФ", "Гражданского кодекса РФ", "Градостроительного кодекса", ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним", и иных нормативных документов, регулирующих оборот объектов недвижимости. - Основные положения Федерального закона от 24.07.2007 г. # 221-ФЗ "О государственном кадастре недвижимости". Принципы ведения государственного кадастра недвижимости (ГКН). Порядок предоставления сведений ГКН. Порядок и особенности осуществления кадастрового учёта земельных участков, зданий, сооружений, объектов незавершённого строительства, помещений. Основания приостановления и отказа в проведении кадастрового учёта. - Кадастровые работы. Межевой план. Порядок согласования месторасположения границ земельных участков. Кадастровые паспорта на земельные участки, здания, сооружения, объекты незавершённого строительства, помещения. Требования к подготовке межевого плана. Многоконтурные земельные участки. Порядок их формирования и учета. Технический план сооружения. Требования к подготовке. - Зоны с особыми условиями использования территории. - Юридические аспекты объекта недвижимости (здания и сооружения) и принадлежности к нему; основания отнесения объекта к недвижимому имуществу. Земельный участок, инженерные сети, линейные объекты как объект недвижимости и ограничения, связанные с ними. Право долевой собственности, формирование и выдел долей. Понятие сложного единого объекта по Гражданскому кодексу РФ. Самовольная постройка: последствия создания, легализация. Сервитут как обременение права собственности, порядок определения права за сервитут и порядок заключения сервитутного соглашения. - Правовое регулирование и особенности государственной регистрации договора купли-продажи объектов недвижимости. Анализ судебной практики. Изменения в ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним". Правовое регулирование и особенности государственной регистрации договора ипотеки. - Порядок оформления арендных отношений. Правовая сущность договора. Предмет договора аренды, существенные условия договора. Арендодатель и его правоуполномоченные лица. Сохранение договора аренды при изменении арендодателя. Порядок регистрации договора аренды. Срок договора аренды. Досрочное расторжение договора аренды. Изменение сторон договора аренды. Договор субаренды, права на распоряжение арендованным имуществом. Договор аренды государственного и муниципального имущества. Анализ основных случаев отказа в государственной регистрации договора аренды. - Аренда земельных участков, находящихся в государственной или муниципальной собственности. Порядок заключения договора. Купля-продажа земельных участков, находящихся в государственной или муниципальной собственности. Общий порядок приобретения. Преимущественные права при выкупе земельных участков. Особенности перехода права собственности на землю при переходе прав на строение. Порядок приобретения прав на земельные участки, находящиеся в государственной или муниципальной собственности, на которых расположены здания, строения, сооружения (в т.ч. приватизированные). - Особенности предоставления земельных участков для строительства. Порядок предоставления земель для различных целей. административные ограничения прав на землю. - Особенности оформления прав на земельные участки под строительство линейных объектов. Регистрация прав собственности на линейные объекты и объекты инженерной инфраструктуры. - Государственная политика в области налогообложения имущества. Формирование налоговой базы налога на недвижимость. Массовая оценка как элемент налогообложения недвижимости. Классификация объектов недвижимости для целей кадастровой оценки и налогообложения. Причины и последствия изменение системы классификации. Нормативное и правовое регулирование в области государственной кадастровой оценки (ГКО) земель и массовой оценки недвижимости. Основные положения методических документов по ГКО земель различных категорий. Порядок определения кадастровой стоимости в составе земель различных категорий. - Профессиональные требования, предъявляемые к кадастровым инженерам. Приказ Минэкономразвития России # 23 от 22.01.2010 г. "Об утверждении Положения о составе, порядке работы квалификационной комиссии для проведения аттестации на соответствие квалификационным требованиям, предъявляемым к кадастровым инженерам...". Комментарии, разъяснения. Кадастровый инженер. Состав, порядок работы квалификационной комиссии для проведения аттестации кадастровых инженеров. Порядок проведения квалификационного экзамена. Квалификационные требования, предъявляемые к кадастровым инженерам. Права и обязанности кадастровых инженеров. Доп. Информация и полная_ программа_ по телефону [8I2] 6.42_ 43.. 8Ч From blondehomeperf.lyonlyon at homeperf.com Thu Sep 20 09:47:48 2012 From: blondehomeperf.lyonlyon at homeperf.com (=?koi8-r?B?Iu/Mxccg4dLTxc7P18neIg==?=) Date: Thu, 20 Sep 2012 23:47:48 +0700 Subject: =?koi8-r?B?4sXazMnNydTO2cogzcXWx8/Sz8QgKyDNz9PLz9fTy8nKIM7PzcXS?= Message-ID: <01cd978a$56bb2a00$08b6fc7a@blondehomeperf.lyonlyon> БЕЗЛИМИТНЫЕзвонки по межгородувсего3000 руб. в месяц.Всезоны РФ (фиксированная и мобильная связь) Звоните сегодня:(495) 225-04-62 МНОГОКАНАЛЬНЫЙномер Прямой московский номер 495, 499Абонентская плата ≈ 300руб./месяцБольшой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы нипереехали- Все возможности АТС (голосовоеприветствие, голосовая почта и т.д.) включены в абонентскую плату - Экономия на покупке телефоннойстанции -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2767 bytes Desc: not available URL: From paul at servalproject.org Thu Sep 20 07:45:11 2012 From: paul at servalproject.org (Paul Gardner-Stephen) Date: Fri, 21 Sep 2012 00:15:11 +0930 Subject: [serval-project-dev] Reports of WiFi Monitor Mode on Nexus One and Samsung Galaxy SII Message-ID: Most interesting ... Meanwhile, here in Amsterdam I have been meeting with various groups and talking with people, and I think we are now MUCH closer to being able to make a mesh device that will do the ad-hoc WiFi *and* support external radio modules, e.g., in other ISM bands in the countries where they are allowed, to facilitate links of 100m - 1500m between the mesh helper devices. As the device would do ad-hoc and the other communications, and be a 1st class member of the mesh, it will be able to carry traffic for nearby mobile phones, which would just be WiFi clients of it. This means we can finally get rid of root, and also really easily port to other platforms, including perhaps by having an HTML client that is served from a web server on the device itself. I am thinking of using the Dragrove as the basis, as it is an OpenWRT-based router that already has an Arduino-compatible interface inside, and all the software tools to talk to the Arduino-compatible interface written and included. This means all we really need to do is make the working ISM radio interface for it. Paul. On Thu, Sep 20, 2012 at 11:52 AM, Corey Wallis wrote: > Hi, > > I stumbled across this link last night and thought it may be of > interest to the group. > > Working monitor mode on Nexus one & Galaxy S II !!! > http://bcmon.blogspot.com.au/2012/09/working-monitor-mode-on-nexus-one.html?m=1 > > With thanks. > > -Corey > > -- > You received this message because you are subscribed to the Google Groups "Serval Project Developers" group. > To post to this group, send email to serval-project-developers at googlegroups.com. > To unsubscribe from this group, send email to serval-project-developers+unsubscribe at googlegroups.com. > For more options, visit this group at http://groups.google.com/group/serval-project-developers?hl=en. > -- You received this message because you are subscribed to the Google Groups "Serval Project Developers" group. To post to this group, send email to serval-project-developers at googlegroups.com. To unsubscribe from this group, send email to serval-project-developers+unsubscribe at googlegroups.com. For more options, visit this group at http://groups.google.com/group/serval-project-developers?hl=en. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From araknn at schenker.ca Thu Sep 20 09:17:15 2012 From: araknn at schenker.ca (=?koi8-r?B?IvLByMnNwSDk1cTOycvP18Ei?=) Date: Fri, 21 Sep 2012 01:17:15 +0900 Subject: =?koi8-r?B?xMXbxdfZyiDNxdbHz9LPxA==?= Message-ID: <01cd9796$d5b65f80$2520dc01@araknn> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - - Все возможности АТС (голосовое приветствие, голосовая почта и т.д.) включены в абонентскую плату - Экономия на покупке телефонной станции From blueyonder.co.uk at mcsv15.net Thu Sep 20 14:10:27 2012 From: blueyonder.co.uk at mcsv15.net (=?koi8-r?B?IuvBxMHT1NIgySDaxc3FzNjO2cogy8/ExcvTIg==?=) Date: Fri, 21 Sep 2012 05:10:27 +0800 Subject: =?koi8-r?B?7cXWxdfPyiDQzMHO?= Message-ID: <01cd97b7$69982380$5aa41c74@blueyonder.co.uk> Уважаемые коллеги! Приглашаем Вас посетить краткосрочный курс: ОФОРМЛЕНИЕ ПРАВ НА ОБЪЕКТЫ НЕДВИЖИМОСТИ. КАДАСТРОВЫЙ УЧЁТ, ОЦЕНКА И НАЛОГООБЛОЖЕНИЕ НЕДВИЖИМОСТИ. Последние изменения в законодательстве, арбитражная практика. 01 - 02 октяября 2ОI2 г. Санкт-Петербург (условия участия по телефону (код спб)6Ч2.ЧЗ.8Ч) ПРОГРАММА КУРСА - Последние изменения в правовом регулировании оформления прав на объекты недвижимости. Основы законодательства в области земельных отношений и кадастровой деятельности. Практика применения "Земельного кодекса РФ", "Гражданского кодекса РФ", "Градостроительного кодекса", ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним", и иных нормативных документов, регулирующих оборот объектов недвижимости. - Основные положения Федерального закона от 24.07.2007 г. # 221-ФЗ "О государственном кадастре недвижимости". Принципы ведения государственного кадастра недвижимости (ГКН). Порядок предоставления сведений ГКН. Порядок и особенности осуществления кадастрового учёта земельных участков, зданий, сооружений, объектов незавершённого строительства, помещений. Основания приостановления и отказа в проведении кадастрового учёта. - Кадастровые работы. Межевой план. Порядок согласования месторасположения границ земельных участков. Кадастровые паспорта на земельные участки, здания, сооружения, объекты незавершённого строительства, помещения. Требования к подготовке межевого плана. Многоконтурные земельные участки. Порядок их формирования и учета. Технический план сооружения. Требования к подготовке. - Зоны с особыми условиями использования территории. - Юридические аспекты объекта недвижимости (здания и сооружения) и принадлежности к нему; основания отнесения объекта к недвижимому имуществу. Земельный участок, инженерные сети, линейные объекты как объект недвижимости и ограничения, связанные с ними. Право долевой собственности, формирование и выдел долей. Понятие сложного единого объекта по Гражданскому кодексу РФ. Самовольная постройка: последствия создания, легализация. Сервитут как обременение права собственности, порядок определения права за сервитут и порядок заключения сервитутного соглашения. - Правовое регулирование и особенности государственной регистрации договора купли-продажи объектов недвижимости. Анализ судебной практики. Изменения в ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним". Правовое регулирование и особенности государственной регистрации договора ипотеки. - Порядок оформления арендных отношений. Правовая сущность договора. Предмет договора аренды, существенные условия договора. Арендодатель и его правоуполномоченные лица. Сохранение договора аренды при изменении арендодателя. Порядок регистрации договора аренды. Срок договора аренды. Досрочное расторжение договора аренды. Изменение сторон договора аренды. Договор субаренды, права на распоряжение арендованным имуществом. Договор аренды государственного и муниципального имущества. Анализ основных случаев отказа в государственной регистрации договора аренды. - Аренда земельных участков, находящихся в государственной или муниципальной собственности. Порядок заключения договора. Купля-продажа земельных участков, находящихся в государственной или муниципальной собственности. Общий порядок приобретения. Преимущественные права при выкупе земельных участков. Особенности перехода права собственности на землю при переходе прав на строение. Порядок приобретения прав на земельные участки, находящиеся в государственной или муниципальной собственности, на которых расположены здания, строения, сооружения (в т.ч. приватизированные). - Особенности предоставления земельных участков для строительства. Порядок предоставления земель для различных целей. административные ограничения прав на землю. - Особенности оформления прав на земельные участки под строительство линейных объектов. Регистрация прав собственности на линейные объекты и объекты инженерной инфраструктуры. - Государственная политика в области налогообложения имущества. Формирование налоговой базы налога на недвижимость. Массовая оценка как элемент налогообложения недвижимости. Классификация объектов недвижимости для целей кадастровой оценки и налогообложения. Причины и последствия изменение системы классификации. Нормативное и правовое регулирование в области государственной кадастровой оценки (ГКО) земель и массовой оценки недвижимости. Основные положения методических документов по ГКО земель различных категорий. Порядок определения кадастровой стоимости в составе земель различных категорий. - Профессиональные требования, предъявляемые к кадастровым инженерам. Приказ Минэкономразвития России # 23 от 22.01.2010 г. "Об утверждении Положения о составе, порядке работы квалификационной комиссии для проведения аттестации на соответствие квалификационным требованиям, предъявляемым к кадастровым инженерам...". Комментарии, разъяснения. Кадастровый инженер. Состав, порядок работы квалификационной комиссии для проведения аттестации кадастровых инженеров. Порядок проведения квалификационного экзамена. Квалификационные требования, предъявляемые к кадастровым инженерам. Права и обязанности кадастровых инженеров. Доп. Информация и полная_ программа_ по телефону [8I2] 6.42_ 43.. 8Ч From eugen at leitl.org Fri Sep 21 04:53:41 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 21 Sep 2012 13:53:41 +0200 Subject: Drone warfare's deadly civilian toll: a very personal view Message-ID: <20120921115341.GJ9750@leitl.org> http://www.guardian.co.uk/commentisfree/2012/sep/19/drone-warfare-deadly-civilian-toll Drone warfare's deadly civilian toll: a very personal view I was minutes from ordering a drone strike on a Taliban insurgent b until I realised I was watching an Afghan child at play James Jeffrey guardian.co.uk, Wednesday 19 September 2012 21.36 BST Predator drone in Afghanistan A US Predator drone in Afghanistan. The strike in Somalia means armed drones are operating in six countries. Photograph: Joel Saget/AFP/Getty Images I find myself caught between the need to follow the drone debate and the need to avoid unpleasant memories it stirs. I used drones b unmanned aerial vehicles b during the nadir of my military career that was an operational tour in Afghanistan. I remember cuing up a US Predator strike before deciding the computer screen wasn't depicting a Taliban insurgent burying an improvised explosive device in the road; rather, a child playing in the dirt. After returning from Afghanistan at the end of 2009, I left the British army in 2010. I wanted to put as much distance as I could between myself and the UK, leaving to study in America (where I still reside). By doing so, I inadvertently placed myself in the country that is spearheading development in drone technology and use, highlighted by each report of a drone strike and the usual attendant civilian casualties. Political theorist Hannah Arendt described the history of warfare in the 20th century as the growing incapacity of the army to fulfil its basic function: defending the civilian population. My experiences in Afghanistan brought this issue to a head, leaving me unable to avoid the realization that my role as a soldier had changed, in Arendt's words, from "that of protector into that of a belated and essentially futile avenger". Our collective actions in Iraq and Afghanistan after 9/11 were, and remain, futile vengeance b with drones the latest technological advance to empower that flawed strategy. Drones are becoming the preferred instruments of vengeance, and their core purpose is analogous to the changing relationship between civil society and warfare, in which the latter is conducted remotely and at a safe distance so that implementing death and murder becomes increasingly palatable. James Jeffrey serving in Iraq, 2004 The author (at far left) as a lieutenant Challenger 2 troop leader in al-Amarah, Iraq, 2004. Photograph: James Jeffrey Hyperbole? But I was there. I sat in my camouflaged combats and I took the rules of engagement and ethical warfare classes. And frankly, I don't buy much, if any, of it now b especially concerning drones. Their effectiveness is without question, but there's terrible fallout from their rampant use. Both Pakistan and Yemen are arguably less stable and more hostile to the west as a result of President Obama's increased reliance on drones. When surveying the poisoned legacy left to the Iraqi people, and what will be left to the Afghan people, it's beyond depressing to hear of the hawks circling around other theatres like Pakistan and Yemen, stoking the flames of interventionism. I fear the folly in which I took part will never end, and society will be irreversibly enmeshed in what George Orwell's 1984 warned of: constant wars against the Other, in order to forge false unity and fealty to the state. It's very easy to kill if you don't view the target as a person. When I went to Iraq as a tank commander in 2004, the fire orders I gave the gunner acknowledged some legitimacy of personhood: "Coax man, 100 meters front." Five years later in Afghanistan, the linguistic corruption that always attends war meant we'd refer to "hot spots", "multiple pax on the ground" and "prosecuting a target", or "maximising the kill chain". The Pentagon operates about 7,000 drones and asked Congress for nearly $5bn for drones in the 2012 budget. Before retiring as air force chief of staff, General Norton Schwartz was reported as saying it "was 'conceivable' drone pilots in the air force would outnumber those in cockpits in the foreseeable future". That's not a brave new world, far from it. The encroachment of drones into the civilian realm is also gaining momentum. President Obama signed a federal law on 14 February 2012, allowing drones for a variety of commercial uses and for police law enforcement. The skies above may never be the same. As with most of America's darker elements, such as its gun culture, there's profit to be made b the market for drones is already valued at $5.9bn and is expected to double in 10 years. During my time in Afghanistan, drones were primarily supplied by the US as our drone capability was miniscule in comparison. The British military still relies on US support, only owning about five armed drones. They have been busy, though: as of May 2012, the Ministry of Defence confirmed these had flown a total of 34,750 hours, and fired 281 missiles and laser-guided bombs. With continued cuts to the British army's personnel levels, it isn't hard to envisage drones increasingly replacing boots on the ground. And since the UK already has the world's highest number of CCTV cameras, the intrusion of drones into surveillance Britain doesn't require much imagination. Technological advancements in warfare don't have a good track record in terms of unintended consequences. As Chris Hedges reveals in his book War is a Force That Gives Us Meaning, an estimated 62 million civilians perished in the 20th century's wars b "nearly 20 million more than the 43 million military personnel killed". Will the 21st century repeat such foolish tragedy? Many years still remain. I'd argue we should err on the side of caution and remain immensely wary of drones. From eugen at leitl.org Fri Sep 21 04:59:41 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 21 Sep 2012 13:59:41 +0200 Subject: [cryptography] abstract: Air to Ground Quantum Key Distribution Message-ID: <20120921115941.GL9750@leitl.org> ----- Forwarded message from "D. J. Bernstein" ----- From jbrownfirst at gmail.com Fri Sep 21 11:28:57 2012 From: jbrownfirst at gmail.com (James Brown) Date: Fri, 21 Sep 2012 18:28:57 +0000 Subject: [tor-talk] Putin's fascist band intend to ban the Tor Message-ID: Putin's fascist junta intend to ban the Tor and other anonimous services: http://izvestia.ru/news/535724 "MPs claim that the adoption of legislative initiatives on which state agencies can block access to sites containing illegal content, there is still a lot of work in this area. In particular, members are going to limit the use of the programs, masking the information data and IP-address of users - anonymizers. The fact is that if the decision of the court will be locked out of Internet users to a particular site, the last by proxy will visit the pages blocked site. For example, with these programs, users in China and Belarus very well go to those sites to which local authorities are blocking access. In this regard, representatives of the lower house of Parliament propose to ban the software, then there is a proxy server that is installed on the user's computer, or browsers with built anonymizer for example browser Tor. In addition to masking tools of deputies web servers - standalone sites, with the help of which users can establish special programs to pass the modified IP-address on the blocked sites. Such amendments will be made to the Federal Law "On Information, Information Technology and Information Security" and the law "On the protection of children from information harmful to their health and development," which has already undergone changes this summer and which had been prescribed norms helping to block sites with illegal content. According to the author of amendments to the legislation on blocking access to sites with illegal content deputy Yaroslav Nil, the question of a possible ban on the proxies will be discussed within the walls of the State Duma. - We now have a committee on information policy, information technology and communications, and on it we will discuss the possibility and feasibility of introducing a ban on the use of software, which can mask the Internet - says Nilov. - It is quite logical decision after we have amended the possibility of blocking sites containing illegal content. According to another co-author of the laws of the blocking of websites with illegal content - Deputy Speaker of the State Duma Sergei Zheleznyaka parliamentarians intend to continue to shield users from illegal content on the Web. - Of course, the decisions that we have made in recent years in the information security of users on the Internet, are not our latest initiatives, - says Zheleznyak. - We're going to continue to fight the "harmful" content of our networks, including software that allows any way to mask Internet crime. For breach of access to the network by the user using anonymizer could face punishment - from blocking access to the Internet through an ISP to a quite reasonable fines. In addition to the legislators to ban proxy in Russia are the representatives of some social movements. The leader of the organization's anti-pedophile "Headhunters" by Sergey Zhuk, mostly proxies are used to commit crimes on the Internet. - Our organization supports the ban proxy in Russia. Around 99% of those who use anonymizers to hide their information data to commit crimes. Whether economic crimes on the Web, or viewing of child pornography, or to access blocked sites - says the beetle. - Then it prevents the investigating authorities find criminals, and probably would have been extremely useful to prohibit the use of anonymizers. Experts in the field of information technology argue that providers can identify subscribers using anonymizers when visiting websites. However, they doubt the effectiveness of measures already taken to block sites with illegal content or that prohibit anonymizers. CTO LETA Alexander Bondarenko points to technical problems in the implementation of this idea. - They have already legislated solutions to block sites containing illegal content. But the decision to block the sites and bans on the use of proxy are malorealizuemymi - said Bondarenko. - Technically competent users will still find a way to circumvent the ban. As with the server locks up, and when blocking of websites will be immediately blocked their new mirror sites and servers. Therefore, most likely, and already taken and planned solutions will remain formal." _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From nadim at nadim.cc Fri Sep 21 16:27:20 2012 From: nadim at nadim.cc (Nadim Kobeissi) Date: Fri, 21 Sep 2012 19:27:20 -0400 Subject: [liberationtech] Cryptocat 2 Alpha Released Message-ID: Dear friends, The first Alpha build of Cryptocat 2 has been released today in the form of browser plugins for Google Chrome and Mozilla Firefox. You are strongly invited to test out the builds and report any: * Bugs (security and otherwise), * Things you'd like to see changed, * Praise! The builds may be downloaded here: https://github.com/kaepora/cryptocat/tree/cryptocat2/alpha To load the extension in Chrome: 1. Download and unzip 'cryptocat-chrome.zip'. 2. In Chrome, go to 'Tools' > 'Extensions' 3. Click 'Developer mode' and load the Cryptocat 2 directory. To load the extension in Firefox: 1. Download 'cryptocat-firefox.xpi' 2. Open the 'Add-ons' page in Firefox. 3. Drag and drop the xpi file into Firefox. Please enjoy and let me know what you think! Warm regards, NK -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Sep 21 12:25:16 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 21 Sep 2012 21:25:16 +0200 Subject: [tor-talk] Putin's fascist band intend to ban the Tor Message-ID: <20120921192516.GB9750@leitl.org> ----- Forwarded message from James Brown ----- From eugen at leitl.org Sat Sep 22 03:14:52 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 22 Sep 2012 12:14:52 +0200 Subject: [liberationtech] Cryptocat 2 Alpha Released Message-ID: <20120922101452.GN9750@leitl.org> ----- Forwarded message from Nadim Kobeissi ----- From jya at pipeline.com Sat Sep 22 10:01:55 2012 From: jya at pipeline.com (John Young) Date: Sat, 22 Sep 2012 13:01:55 -0400 Subject: Tim May on This Machine Kills Secrets In-Reply-To: References: Message-ID: Tim May posted a review of This Machine Kills Secret on Amazon on September 14, 2012: "Reads Like a Good Novel" http://www.amazon.com/This-Machine-Kills-Secrets-WikiLeakers/dp/0525953205/ref=sr_1_1?s=books&ie=UTF8&qid=1348333215&sr=1-1&keywords=this+machine+kills+secrets+how+wikileakers From bbrewer at littledystopia.net Sat Sep 22 13:00:15 2012 From: bbrewer at littledystopia.net (b. brewer) Date: Sat, 22 Sep 2012 16:00:15 -0400 Subject: Tim May on This Machine Kills Secrets In-Reply-To: References: Message-ID: <505E18CF.6010809@littledystopia.net> On 9/22/2012 1:01 PM, John Young wrote: > Tim May posted a review of This Machine Kills Secret on > Amazon on September 14, 2012: > > "Reads Like a Good Novel" > > http://www.amazon.com/This-Machine-Kills-Secrets-WikiLeakers/dp/0525953205/ref=sr_1_1?s=books&ie=UTF8&qid=1348333215&sr=1-1&keywords=this+machine+kills+secrets+how+wikileakers > A copy just showed up at my doorstep the other day; Yet to get it cracked open yet, but I am curious... John, Never realized you were so famous... From virtualadept at gmail.com Sat Sep 22 13:28:32 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Sat, 22 Sep 2012 16:28:32 -0400 Subject: [Freedombox-discuss] [ZS] ZS reboot seed Message-ID: So, now the question is, what do we do? The logical answer would be to start testing them. Whomever is good with web apps written in Ruby could set up an instance or two of the Smallest Federated Wiki for us to test. Porting some of the stuff from the Google Pages over to it would be a good way to put it through its paces. Once they're up, getting them working over Tor would be the next logical step. I've got a copy of Fossil installed on Windbringer to play around with. Installing it is pretty straightforward. The workflow is different from Git, though, so it takes some getting used to. I'm working on a cribsheet of how to do practical stuff with it immediately (along the lines of the Git In 20 Commands page that the Linux kernel team used to have), which I'll post to this list. I'll put together a Fossil repository of stuff for us to mess around with - probably some of the ZS Google Pages. When a few folks are working on it, I'll throw a server on a Tor node and we can practice synching our respective copies that way. Litter's been fun to play with, and I'd suggest that others do as well. You need Python 2 installed on your machine, but that's it, it's based entirely on the libraries that come with Python by default. I've forked the project on Github because I plan on doing some work on it - it's got potential for use in Byzantium. I still haven't tried it over Tor; because it uses IP multicasting it might not work. None of the research I've done shows that IP multicasting over Tor works. Torchat is pretty nifty. I've used the python version a bit and it seems pretty stable. I don't know why the primary maintainer is rewriting it in Pascal but there should be binary-only downloads available when it's ready. That's my primary concern, that it's written in an odd language, but that's probably my language prejudices talking. As the name suggests, it's married to Tor because it uses the hidden service naming scheme to find people on the buddy list (but they can be aliased to more understandable names). No group chat that I know of. I haven't had time to mess with Tahoe-LAFS since the last Byzantium dev sprint, so I can't really speak to it. I had problems with it but Haxwithaxe and Sitwon didn't. So, that's on my hit list of things to do in the near future. More to come. SocialVPN hasn't been touched since 2011, and besides that there is a chance that XMPP server operators would start finding ways of blocking it because it basically means that you'd be running all of your network traffic through their server. That's a serious bandwidth sink, and it's not well understood how many people (or how much traffic) would bring a server to its knees. All things considered, wrecking someone's XMPP server by running a parasitic VPN over it is against a couple of the Principles, so it's out. I haven't done anything with any of the Github-like software mentioned earlier, so I can't speak to it. If anyone sets up an instance or two, your opinions would be welcome. Maybe we need them, maybe we won't (i.e., Fossil or something else). I still like YaCy, and still need more disk space for it. -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jya at pipeline.com Sat Sep 22 16:58:20 2012 From: jya at pipeline.com (John Young) Date: Sat, 22 Sep 2012 19:58:20 -0400 Subject: Tim May on This Machine Kills Secrets In-Reply-To: <505E18CF.6010809@littledystopia.net> References: <505E18CF.6010809@littledystopia.net> Message-ID: If it was fame, it was fleeting, so fleet I missed the benefits and got only the cesspool backflow. At 04:00 PM 9/22/2012, you wrote: >On 9/22/2012 1:01 PM, John Young wrote: >>Tim May posted a review of This Machine Kills Secret on >>Amazon on September 14, 2012: >> >>"Reads Like a Good Novel" >> >>http://www.amazon.com/This-Machine-Kills-Secrets-WikiLeakers/dp/0525953205/ref=sr_1_1?s=books&ie=UTF8&qid=1348333215&sr=1-1&keywords=this+machine+kills+secrets+how+wikileakers > >A copy just showed up at my doorstep the other day; Yet to get it >cracked open yet, but I am curious... > >John, > >Never realized you were so famous... From decoy at iki.fi Sat Sep 22 20:07:52 2012 From: decoy at iki.fi (Sampo Syreeni) Date: Sun, 23 Sep 2012 06:07:52 +0300 (EEST) Subject: Tim May on This Machine Kills Secrets In-Reply-To: References: <505E18CF.6010809@littledystopia.net> Message-ID: On 2012-09-22, John Young wrote: > If it was fame, it was fleeting, so fleet I missed the benefits and > got only the cesspool backflow. And yet you already built the spire far ahead of WikiLeaks. It isn't as though we don't refer to cryptome everyday... -- Sampo Syreeni, aka decoy - decoy at iki.fi, http://decoy.iki.fi/front +358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2 From bbrewer at littledystopia.net Sun Sep 23 14:23:57 2012 From: bbrewer at littledystopia.net (b. brewer) Date: Sun, 23 Sep 2012 17:23:57 -0400 Subject: Fwd: [cryptography] Preemptive compromise of Apple ID accounts In-Reply-To: References: Message-ID: <505F7DED.2010003@littledystopia.net> -------- Original Message -------- Subject: [cryptography] Preemptive compromise of Apple ID accounts Date: Sun, 23 Sep 2012 20:26:42 +1200 From: Peter Gutmann To: cryptography at randombit.net I just got email from Apple asking me to confirm setting up a rescue email address for my Apple ID account (I haven't owned any Apple products since the IIe). It's the real thing from Apple, not a phishing email. So it looks like attackers have gone beyond social engineering access to Apple accounts and are pre-emptively creating mechanisms for access on the off chance that the target may at some point become an Apple account user who can then be exploited. That's pretty sophisticated forward planning. Peter. _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography From eugen at leitl.org Sun Sep 23 12:20:11 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 23 Sep 2012 21:20:11 +0200 Subject: [Freedombox-discuss] [ZS] ZS reboot seed Message-ID: <20120923192011.GS9750@leitl.org> ----- Forwarded message from Bryce Lynch ----- From bbrewer at littledystopia.net Tue Sep 25 14:26:22 2012 From: bbrewer at littledystopia.net (b. brewer) Date: Tue, 25 Sep 2012 17:26:22 -0400 Subject: Fwd: [cryptography] Data breach at IEEE.org: 100k plaintext passwords. In-Reply-To: References: Message-ID: <5062217E.3090001@littledystopia.net> Wow. This is extremely stupid. -------- Original Message -------- Subject: [cryptography] Data breach at IEEE.org: 100k plaintext passwords. Date: Tue, 25 Sep 2012 13:39:34 -0400 From: Jeffrey Walton Reply-To: noloader at gmail.com To: Randombit List In case anyone on the list might be affected... [Please note: I am not the "I' in the text below] http://ieeelog.com IEEE and the log story IEEE (Institute of Electrical and Electronics Engineers) is renowned as one of the world-leading organizations in standard development and the promotion of scientific and educational development within the Electrical, Electronics, Communications, Computer Engineering, Computer Science and related fields. The organization has more than 415,000 members all over the world, almost half of them in the United States [1]. By the nature of the organization, IEEE members are highly specialised individuals, many of them working in critical industry, governmental and military projects. Furthermore, it would be reasonable to assume, that an organization publishing leading security-focused publications [2], would value the privacy of its members, and be proactive in keeping their data secure. Due to several undoubtedly grave mistakes, the ieee.org account username and plaintext password of around 100,000 IEEE members were publicly available on the IEEE FTP server for at least one month. Furthermore, all the actions these users performed on the ieee.org website were also available. Separately, spectrum.ieee.org visitor activity is also publicly available. The simplest and most important mistake on the part of the IEEE web administrators was that they failed to restrict access to their webserver logs for both ieee.org and spectrum.ieee.org allowing these to be viewed by anyone going to the address ftp://ftp.ieee.org/uploads/akamai/ (closed on September 24 around 13:00 UTC, after I reported it). On these logs, as is the norm, every web request was recorded (more than 376 million HTTP requests in total). Web server logs should never be publicly available, since they usually contain information that can be used to identify users (sometimes even after the log was anonymized as in the "AOL incident" [3]). However, this case is much worse, since 411.308 of the log entries contain both usernames and passwords. Out of these, there seem to be 99.979 unique usernames. If leaving an FTP directory containing 100GB of logs publicly open could be a simple mistake in setting access permissions, keeping both usernames and passwords in plaintext is much more troublesome. Keeping a salted cryptographic hash of the password is considered best practice, since it would mitigate exactly such an access permission mistake. Also, keeping passwords in logs is inherently insecure, especially plaintext passwords, since any employee with access to logs (for the purpose of analysis, monitoring or intrusion detection) could pose a threat to the privacy of users. Log analysis It is certainly unfortunate this information was leaked out, and who knows who got it before it got fixed. Maybe there are access logs for the FTP so the damage can be assessed. Anyway, the affected users will probably have to be informed, since it is my understanding that the law requires it. In Europe there is Article 4 of the Directive on privacy and electronic communications (Directive 2002/58/EC) and its amendment (Directive 2009/136/EC). In the US, 46 states seem to have similar requirements [4]. While the cause of the data breach has been solved, one must point out the value of this dataset from a research perspective. It is rare that researchers gain access to such rich datasets. Various ethical and privacy-related considerations must be evaluated before such datasets can be publicly released. Deciding on how to anonymize the data is no easy challenge. Simply excluding any information making users directly identifiable is not enough, as past dataset releases have shown that some users can still be pinpointed. This resulted in lawsuits in the case of Netflix [5] and AOL [6], or the withdrawal of the data, like in the recent Wikipedia case [7]. For this reason, companies such as Google prefer to keep such data for study by internal researchers and do not release it to the public [3]. Furthermore, some companies release data to a trusted researcher with the condition to remain anonymous, like an unnamed European mobile phone operator did for Albert-LC!szlC3 BarabC!si [8]. This means academic researchers working in such fields as Information Retrieval have limited access to fresh real-world data, being at a disadvantage to their industrial counterparts. For these reasons, I cannot not give in to the urge to perform a basic analysis of this serendipitously acquired data, although I acknowledge this might be ethically dubious. However, I did not, and plan not to release the raw log data to anyone else. Data overview Log data time span: 01/Aug/2012:20:46:28 +0000b to 18/Sep/2012:08:47:17 +0000 Total number of log entries: 376.021.496 log entries for ieee.org: 301.319.566 log entries for spectrum.ieee.org: 74.701.930 log entries with password details: 411.308 (of which 17.157 are password reset requests and have no username field) ... _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography From mikeperry at torproject.org Wed Sep 26 11:48:14 2012 From: mikeperry at torproject.org (Mike Perry) Date: Wed, 26 Sep 2012 11:48:14 -0700 Subject: [tor-talk] Tor and P2P Message-ID: Thus spake Nathan Freitas (nathan at freitas.net): > On 09/26/2012 10:08 AM, meh. wrote: > > > > After implementing the torchat protocol and seeing how bad it is, > > but how nice the idea is, I started thinking it would be cool to > > have a more general protocol for P2P use through hidden services. > > This is something we have definitely been considering as a feature or > add-on to Orbot - essentially mobile-to-mobile file sharing, > messaging/voice messaging via hidden services. > > While we don't need a very complex p2p design (in short, we are mostly > just talking about simple HTTP servers running on each device, behind > a hidden service .onion), I am concerned in the long run about > scalability and reliability of this. It is not unheard of for apps > that work well and do something cool to suddently have 1M+ users, and > already are nearing half that with Orbot. This is a great point, and I wish I could reply to it and Robert's comments about DoSing the hsdirs in the same mail. It would seem that "simple" solutions might end up destroying the Tor network. Based on Robert's comments, it sounds like the properties we need are: 1. Persistent hidserv connections. Reconnecting for each message via an HTTP POST is right out. Way too many circuits+onionskins to scale. 2. Avoid the situation where a single user is creating multiple hidden services for all their crazy P2P apps. For 1: It would seem to me that a system that ships a local torified XMPP server would satisfy this. XMPP is fully decentralized, and maintains persistent connections between servers. Each user would run their own server over .onion. For 2: The resource identifiers of XMPP mean we can connect multiple XMPP clients to a single local XMPP server, and have them provide multiple (admittedly linkable) P2P services over XMPP 'streams' without spinning up additional hidden services for each client app. XMPP has some obvious downsides... We'd need to audit the whole beast to make sure the federation+decentralization properties can't be manipulated to connect to things over non-tor. It also appears to have the property that social networks where everybody wants presence notifications for everybody else end up requiring O(n^2) persistent hidserv connections between the n XMPP servers... Not sure how serious this is, or if there are any workable decentralized alternatives. However, unlike torchat, the XMPP protocol itself is well documented, widely used, and seems to be designed for a superset of the things we want. I was able to spend just 10 minutes reviewing the XMPP specs to fact-check before composing this email: http://xmpp.org/xmpp-protocols/rfcs/ I was unable to determine if torchat even has property 1 in that time... -- Mike Perry _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bbrewer at littledystopia.net Wed Sep 26 12:21:15 2012 From: bbrewer at littledystopia.net (b. brewer) Date: Wed, 26 Sep 2012 15:21:15 -0400 Subject: Fwd: [liberationtech] facebook sim card In-Reply-To: <50633865.8070008@cryptosms.org> References: <50633865.8070008@cryptosms.org> Message-ID: <506355AB.1070903@littledystopia.net> Interesting, interesting indeed. -------- Original Message -------- Subject: [liberationtech] facebook sim card Date: Wed, 26 Sep 2012 19:16:21 +0200 From: oli Reply-To: liberationtech To: liberationtech at lists.stanford.edu hi there, i would be happy if anyone knows details or can point me somewhere to get to know more about the facebook sim card: http://fr.sitestat.com/gemplus/gemalto/s?tel_facebook&ns_type=pdf http://gigaom.com/mobile/facebook-sim-card-uses-sms-gemalto/ do you know of independent technical documents, academic papers or other good sources of information? fyi: this is one of the ways how facebook is getting access to new users that are using so called "simple phones", the ones without even j2me capabilites. and this user group is huge in many parts of the world. if you are interested in the general trajectory and technological set up of facebook how to reach more mobile phones, this text is really good: http://qz.com/5180/facebooks-plan-to-find-its-next-billion-users-convince-them-the-internet-and-facebook-are-the-same/ fb has developed solutions for all the different types of phones and uses the fast growing mobile telephony market e.g. in some african countries to lock-in users at their first contact with mobile media. thanks, oliver -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech From mikeperry at torproject.org Wed Sep 26 17:52:41 2012 From: mikeperry at torproject.org (Mike Perry) Date: Wed, 26 Sep 2012 17:52:41 -0700 Subject: [tor-talk] Tor and P2P Message-ID: Thus spake adrelanos (adrelanos at riseup.net): > grarpamp: > > Given that these services are surely coming in force... and from > > directions that see these networks more as a raw transport than > > say, primarily for the purposes outlined on their respective web > > pages... it seems the usual echo of "we're a nice project, don't > > do that, too much load" may not be useful. This should not imply > > fault, but merely suggest that it's dated and hopeless. > > I tend to agree but I am not sure. At the moment I don't believe the Tor > project will die soon. It's fine with me if we can continue use it for > anonymous browsing, circumvention and so on for the next years. > > It's also questionable if the Tor project should try to get a big share > of the people interested in anonymous p2p. I tend to think no, because > this opens up the project for a lot negative press. That increases the > risk for a new law to forbid the whole network in even more countries. > Let other networks try that out. Yeah. Due to my distributed systems background, I read "P2P" in this thread as "peer to peer", not "filesharing". I assume that was the case for most of the other Tor people commenting in this thread. I would love it for Tor to support ways for people to communicate without revealing either their social network or message content to the network or infrastructure. I literally cannot stand the fact that there are no ways to communicate right now without handing your social graph to someone who wants to datamine it or sell it, or both. I do think it is important to devote thought even to something as simple as P2P chat, or we could end up destroying the network as soon as it becomes popular, as Nathan and Robert said. Hidden services in Tor are quite expensive: ~3-4X more expensive than exit circuits in terms of CPU usage during connection setup, and 2X as expensive in terms of bandwidth consumption during usage. Because of this, I would be annoyed if people wrote bittorrent clients that used hidden services the way I2P does. I would prefer it if people focused such efforts on networks other than Tor, because I like Tor to remain useful for things other than simply filesharing. I recognize we don't have a whole lot of options to prevent such abuse, but I am not opposed to stopgaps such as throttling loud clients and QoS mechanisms to impact the popularity of resource-intensive filesharing apps... I suspect most of the other Tor folks in favor of "Tor and P2P" are in the same boat. -- Mike Perry _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From grarpamp at gmail.com Wed Sep 26 15:34:33 2012 From: grarpamp at gmail.com (grarpamp) Date: Wed, 26 Sep 2012 18:34:33 -0400 Subject: [tor-talk] Tor and P2P Message-ID: Allow me to combine some quotes from this recent thread alone... > I've had an idea for a while for a killer service for... > I'd be very much interested to see it in reality. I guess the > delays will be more then acceptable. > it would be cool to have a more general protocol for P2P use > through hidden services. > Hidden Services as a globally anonymous NAT'd networked is an > amazing opportunity for this type of application. It seems pretty clear we are at the point where there are current and growing ideas and demand for all manner of anonymous P2P services. In part driven by global news, and thus global awareness, that governments, business and others have questionable regard for privacy, etc. And if consumers continue to demand and drive openness into products, there will soon come a day when open, BSD/Linux capable, pad devices (PC + wifi + cell) the size of a DVD case are common. Demand, compounded by utility. Regardless of the capacity for the sort of projects listed below to handle it, people WILL build these services. Some of them are out there today, and being largely unknown, they are performing well enough. More users will try them and adopt them based on need, utility and performance. The only question is how will the networks perform at each stage of popularity. Given that these services are surely coming in force... and from directions that see these networks more as a raw transport than say, primarily for the purposes outlined on their respective web pages... it seems the usual echo of "we're a nice project, don't do that, too much load" may not be useful. This should not imply fault, but merely suggest that it's dated and hopeless. And since the networks are anonymous, countermeasures would affect all users matching the metric, even those using it for said purposes. So maybe there's room for more focused/funded research into the actual impacts of different traffic models (leading to proper resource giveback by apps/users/groups), development improvement in the networks to handle the traffic, even up to creating an entirely new anonymous network optimized for P2P ... > It is not unheard of for apps that work well and do something > cool to suddently have 1M+ users ... before this certainty happens. > which isn't to say you shouldn't build this. > What should I do then to have anonymous and secure decentralized > chat, file sharing and the like on Tor? > We just need to solve the scalability problem so we do not, as > Robert put it "thrash the hidden services directory". Do what is needed to go forth and conquer :) P2P services should look at the current strong anonymization projects that could provide transport. The ones I know of are: http://www.i2p2.de/ https://code.google.com/p/phantom/ https://www.torproject.org/ More links are welcome. People should not make the mistake of assuming they can freely use any network without negative impact. Including fatal impact for their own service. They should offer sufficient resources back to the network. Contrary to popular belief, P2P is not a free ride. Relay, directory and index is expensive and the cost is bandwidth, CPU and storage. _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From edrigram at edri.org Wed Sep 26 09:42:31 2012 From: edrigram at edri.org (EDRi-gram) Date: Wed, 26 Sep 2012 19:42:31 +0300 Subject: EDRi-gram newsletter - Number 10.18, 26 September 2012 Message-ID: ====================================================================== EDRi-gram biweekly newsletter about digital civil rights in Europe Number 10.18, 26 September 2012 ======================================================================= Contents ======================================================================= 1. Facebook gives up its face recognition feature in EU 2. European Parliament steps back from promoting ISP liability 3. Ancillary copyright madness in Germany and France 4. EDRi responds to Commission bself-regulationb consultation 5. EU Parliament approves directive on orphan works 6. Data protection package: a proposed timetable in the EP 7. The Netherlands against ACTA in all its forms 8. Mapping Net Neutrality worldwide 9. Freedom Not Fear 2012 10. First victim of French 3 strikes law is found guilty for negligence 11. ENDitorial: Clean IT is just a symptom of the pinata politics of privatised online enforcement 12. Recommended Reading 13. Agenda 14. About ======================================================================= 1. Facebook gives up its face recognition feature in EU ======================================================================= Following pressure from Data Protection offices in EU, Facebook has decided to give up the controversial face recognition feature in EU. The feature used by Facebook was taking information given by users when tagging friends' faces in photo, with the declared purpose to make suggestions on tags for future images, thus making the process simpler and faster. This comes as a result of the work of the Irish Data Protection Authority (Office of the Data Protection Commissioner of Ireland - DPCI) which, in December 2011, performed an audit assessing Facebook Irelandbs (FB-I) compliance with the Irish Data protection law as well as the EU law and made a series of recommendations to Facebook. On 21 September 2012, DPCI issued the outcomes of its Review Implementation of Audit Recommendations finding that most recommendations by the Audit had been met by the company, most notably the turning off of the face recognition feature. At the same time, DPCI gave Facebook four weeks to solve the remaining issues that are still to be met. Among other things, Facebook has been asked to provide more detailed information about the use of the "fr" cookie and to explain the consent collected for this cookie. It has also been asked to introduce a "robust process" to "irrevocably delete user accounts and data upon request within 40 days" of being notified and to address the concerns regarding the possibility of targeted advertising utilising sensitive data on the network. bI am satisfied that the Review has demonstrated a clear and ongoing commitment on the part of FB-I to comply with its data protection responsibilities by way of implementation or progress towards implementation of the recommendations in the Audit Report. I am particularly encouraged in relation to the approach it has decided to adopt on the tag suggest/facial recognition feature by in fact agreeing to go beyond our initial recommendations, in light of developments since then, in order to achieve best practice. This feature has already been turned off for new users in the EU and templates for existing users will be deleted by 15 October, pending agreement with my Office on the most appropriate means of collecting user consent. By doing so it is sending a clear signal of its wish to demonstrate its commitment to best practice in data protection compliance,b said Billy Hawkes, the Irish Data Protection Commissioner. Facebook declared it intends to re-introduce the tag feature in the future, but it would do that under new guidelines and, according to Billy Hawkes, the tool would only return if Facebook agreed on the bmost appropriate means of collecting user consentb. Report of Review of Facebook Irelandbs Implementation of Audit Recommendations Published b Facebook turns off Tag Suggest in the EU (21.09.2012) http://dataprotection.ie/viewdoc.asp?DocID=1233&m=f Facebook Ireland Ltd b Report of Re-Audit (21.09.2012) http://dataprotection.ie/documents/press/Facebook_Ireland_Audit_Review_Report_21_Sept_2012.pdf Facebook given 4 weeks to FULLY SATISFY Irish data commissioner - Review mainly leads to whiskey doubles all round (21.09.2012) http://www.theregister.co.uk/2012/09/21/irish_data_protection_commissioner_facebook_review_following_2011_audit/ Facebook abandons face recognition within the EU (only in French, updated 24.09.2012) http://www.01net.com/editorial/573553/facebook-abandonne-la-reconnaissance-faciale-au-sein-de-lue/ Facebook to switch off controversial facial recognition feature following data protection concerns (22.09.2012) http://www.dailymail.co.uk/news/article-2207098/Facebook-switch-controversial-facial-recognition-feature-following-data-protection-concerns.html ======================================================================= 2. European Parliament steps back from promoting ISP liability ======================================================================= On 11 September 2012, the European Parliament voted on an own-initiative report of Mr Jean-Marie Cavada (EPP, France) on the online distribution of audiovisual works. As we reported in the EDRi-gram after the vote in the leading Committee, the Culture and Education Committee, last July, the report was containing some surprising and potentially very problematic terms on the liability of networks operators. The text was calling for bways to encourage network operators to standardise their technical toolsb for copyright enforcement and arguing that the current trend was towards a removal of liability of networks operators. This is factually wrong, could lead to privatisation of censorship and would encourage enforcement outside the rule of law. Finally, this is in no way pursuing the goal of the report, which is to promote and develop access to cultural content. This problematic part of the report (point 59 of the final report) was thankfully rejected in the final vote of the European Parliament on the dossier following a lot of behind the scenes activity by EDRi. This vote is important for three reasons. Firstly, the European Parliament would have faced difficulties convincing the other institutions of its credibility on the dossier. A report containing (obviously) inaccurate statements will not be particularly credible. Secondly, encouraging network operators to standardise their btechnical toolsb means encouraging Internet service providers to monitor, filter and possibly block access to content. This call was going against recent decisions of the Court of Justice of the European Union that protecting intellectual property could not override other fundamental rights such as the right to privacy, the freedom of information and the freedom to conduct business. (C-70/10 Scarlet/SABAM and C-360/10 SABAM/Netlog). The mix of btechnical toolsb creates the motive, means and opportunity for Internet companies to appoint themselves as the judge, jury and executioner of online law enforcement. Finally, and most importantly, it shows the willingness of the European Parliament to move away from concentrating all intellectual property related issues on enforcement b particularly privatised enforcement by Internet companies. It is a clear reversal of the Parliament's previous approach in the so-called bGallo reportb adopted by the European Parliament in 2010 that demanded bappropriate solutionsb from Internet Service Providers in bdialogueb with stakeholders. One such bdialogueb was the one convened by the European Commission, which suggested the bvoluntaryb implementation of exactly the kinds of filtering systems that the European Court of Justice subsequently ruled to be in breach of citizens' fundamental rights. This vote is in tune with the recently adopted Opinion of the Industry Committee of the European Parliament on Completing Digital Single Market, led by Italian Conservative Parliamentarian Aldo Patriciello. In that report, Parliamentarians focussed on eliminating the many barriers to online services in Europe, demanding in particular ba harmonised approach to copyright exceptions and limitationsb. This reflects a growing awareness that it is time to move away from trying to use disproportionate tools to enforce a copyright system that is devoid of credibility and towards building a more credible approach. The road will still be long to adapt the current framework to the digital revolution and to overcome the barriers that prevent consumers to access, use and enjoy cultural content but the European Parliament has made it clear that it was the direction it wanted to take. EDRi-gram: EP: Surprises in the online distribution of audiovisual works' report (18.07.2012) http://www.edri.org/edrigram/number10.14/online-distribution-works Patriciello Opinion Not yet published by Parliament Cavada Report (25.07.2012) http://www.europarl.europa.eu/sides/getDoc.do?type=REPORT&reference=A7-2012-0262&language=EN Gallo Report (22.10.2012) http://www.europarl.europa.eu/sides/getDoc.do?type=TA&language=EN&reference=P7-TA-2010-340 (Contribution by Marie Humeau - EDRi) ======================================================================= 3. Ancillary copyright madness in Germany and France ======================================================================= On 29 August 2012, the German government decided to pass a draft legislative proposal for ancillary copyright (so-called "Leistungsschutzrecht") aimed at bprotectingb publishing houses' online content from being quoted in news aggregation sites and on search engines. This draft law would give publishers the right to limit or forbid any publication or reproduction by third parties of snippets of their content. Services (Google in particular) which publish (or "steal") even very small parts or snippets as a means of helping end-users find interesting information would have to obtain a license and pay a tax in order to do so. The law would have an extensive impact since any website, aggregator or blog could be affected by this. A couple of years ago, German publishers suddenly realised that there were companies on the internet which make billions of Euro from advertising. Advertising has traditionally been the publishers' business model and they have failed to adapt this part of their business to the online environment. They therefore argue that companies that are able to make money in the digital environment should subsidise their pre-existing business model. Ironically, though, those companies are still able to make significant profits. For example, Germany's biggest publisher Axel Springer recently announced an increase in 55% for its online products in the first half of 2012. Just a few days ago, French magazine TC)lC)rama.fr revealed a draft proposal written by the press association IPG and inspired by the developments in Germany, in order to tax Google and cream off its billion euro profits in France. The draft blex Googleb wants to give publishers the exclusive right to reproduce snippets from articles, under penalty of a fine of 30 000 euro and 3 years imprisonment for offenders. The somewhat incomprehensive German and French provisions create a disincentive for online companies to help people find the publishers' online content and bcompensateb the publishers when their content is found. Following the same logic, concert venues could ban taxi drivers to take people to their concerts, unless they pay bcompensationb to the venue for bringing customers to their doors. In an environment where expensive, disjointed and out-of-date copyright law is already causing significant damage to the European economy, this approach may be a joke, but it certainly is not funny. Civil society groups as well as the German association of internet economy eco have highlighted the absurdities and negative consequences of ancillary copyright provisions repeatedly. They have pointed out that the current terms of the law are more than unclear, that it is difficult to establish what makes a website "commercial" and therefore leads to legal uncertainty. In addition, the current German draft would restrict the diversity of information on the internet. Civil society groups have also pointed out the complete superfluousness of such provisions - publishers are already protected by copyright provisions and are given extensive rights by journalists through contracts or general terms and conditions. Due to the vague definition of a "press product", search engines would need to conclude thousands of individual contracts. Smaller publishers and bloggers do not have the capacity to do the same. It is thus likely to result in adverse effects: a creation of exceptions for monopolies, leading to an uncompetitive market situation. Ultimately, this will also limit the freedom of communication and freedom to do business. 3rd revision of the German draft proposal (only in German) http://irights.info/userfiles/3_%20Referentenentwurf-LSR-Kabinettsfassung_Scan.pdf Axel Springer online profit (only in German, 8.08.2012) http://www.welt.de/wirtschaft/article108532273/Axel-Springer-steigert-Gewinn-dank-Online-Geschaeft.html eco Comments on Planned Ancillary Copyright (10.07.2012) http://international.eco.de/2012/news/eco-comments-on-planned-ancillary-copyright.html TC)lC)rama reveals press publishers' project (only in French, 21.09.2012) http://www.telerama.fr/medias/taxe-google-telerama-devoile-le-projet-des-editeurs-de-presse,87027.php Common declaration of French and German publishers (only in German, 19.09.2012) http://www.bdzv.de/fileadmin/bdzv_hauptseite/aktuell/bdzv_branchendienste/bdzv_intern/2012/14_2012/images/Erklaerung_Deutsche_und_Franz_Verleger_zum_LSR_Deutsche_Version.pdf (Contribution by Kirsten Fiedler - EDRi) ======================================================================= 4. EDRi responds to Commission bself-regulationb consultation ======================================================================= The Commission is asking for feedback on a draft bcodeb for what it describes as bmultistakeholder actionsb. The intention is to use the final text as a blueprint for future self- and co-regulatory actions, in order to ensure that certain best practices are respected. The deadline is at the end of this week (30 September 2012) and EDRi has already submitted its response. We have been (sometimes very!) critical of the Commission's approach to self-regulation b most particularly when it is not self-regulation at all but privatised law enforcement, as we see in the now infamous Clean IT project and as was also proposed in ACTA. If the Commission were currently following the draft code, many of the excesses that we see today would not be happening. For example, the chaotic and expensive two-year bbrainstormingb of Clean IT would never have happened because the code stipulates the establishment, from the outset, of bclear and unambiguousb objectives, bstarting from a well-defined baseline.b Indeed, the confusion regarding the specific aims of the project is one of the main reasons that EDRi felt that it was inappropriate to participate in that group. While the draft proposed by the European Commission would represent a solid step forward, there are still valuable improvements that would need to be made. For example, contrary to the process followed by Clean IT, there should be an bup frontb understanding that any outcome cannot legally result in restrictions of fundamental rights. Secondly, it is very important that any involvement from public authorities in self-regulatory measures result in those authorities agreeing to take a formal position to either endorse or reject the outcome of the project. The alternative is power without responsibility b a public authority can convene industry discussions, push for a particular outcome and then claim that the entire process was bindustry's idea.b We also suggest that the involvement of the public authority be under constant review and only allowed to continue when a majority of stakeholders are in favour. Power without responsibility is a corrosive and corrupting factor for any administration. Our response therefore highlights this point as being one of critical importance. The third major point of our response refers to the actions that should be taken if a stakeholder group resigns from a multi-stakeholder process. In the Commission's draft code, representativeness is given a high degree of priority, but the guarantees to ensure this is actually respected are somewhat weak. For example, there is no clarity as to what should be done if a stakeholder group loses faith in the process and resigns. Our suggestion is that the group should have the right to produce a statement of objections and for this to be appended to the final, published agreement. We also suggest that the resignation of key stakeholder groups or an agreed proportion of participants would automatically trigger the ending of the project. In the same vein, we propose that a level of non-compliance should be agreed which, if attained, would also lead to the ending of the project. The Commission consultation comes in two parts b a short questionnaire and a PDF/DOC of the draft code, which should be submitted with btracked changesb after being edited in line with the respondent's views. We encourage other civil society groups and also individuals to respond b and we will not complain if any of our analysis is plagiarised. On-line public consultation on Code for Effective Open Voluntarism: Good design principles for self- and co-regulation and other multistakeholder actions Deadline: 30 September 2012 http://ec.europa.eu/information_society/digital-agenda/actions/consultation/ EDRi's tracked changes document http://edri.org/files/EC_code_final.pdf (Contribution by Joe McNamee - EDRi) ======================================================================= 5. EU Parliament approves directive on orphan works ======================================================================= On 13 September 2012, the EU Parliament approved the draft legislation on orphan works proposed in 2011, completed by the EU Parliament and Council compromise in June 2012. The European Commission issued an Impact Assessment in 2011 accompanying the proposal for a directive on certain permitted used of orphan works, considering there was an urgent need of a legislative initiative on orphan works, as a result of the situation created by the US Google Books Settlement (in its original formulation orphan works were to be automatically included in the scope of the Google Books Settlement), the need to obtain prior copyright permissions for the use of orphan works in Europe and the risk of a knowledge gap in case orphan works could not become part of European Digital Library projects. The Commission also considered a key action of the Digital Agenda for Europe was the creation of a legal framework to facilitate the digitisation and dissemination of orphan works (works for which no author is identified or located). The proposed directive was intended to make it "safer and easier for public institutions such as museums and libraries to search for and use orphan works (...)." The directive defines what works that can be considered orphan works and it stipulates that the public institutions would be required to carry out a prior bdiligent searchb, in terms with the proposed directive requirements, in the Member State where the work was first published. When the diligent search establishes the orphan status of a work, it would be considered an orphan work all over the EU. Thus, orphan works can be made available online for cultural and educational purposes without prior authorisation, unless (or until) the owner of the work puts an end to such status. Following certain concerns and criticism, in June 2012, the draft proposal was completed with two points which established that in case the right holder showed up, he would be entitled to claim compensation for the use of his own work and that public institutions should be allowed to generate some revenue from the use of an orphan work to be used to pay for the search and the digitisation process. The approved text by the European Parliament also includes some other additions such as that the diligent search will not be necessary for each work but "in good faith" and "prior to the use of the work." A new article was also added - the new Directive bshall be without prejudice to the Member Statesb arrangements concerning mass-scale digitisation of works, such as those relating to out-of-commerce works." Although considered a good idea, the proposed directive does not impress everybody. MEP Christian EngstrC6m, of the Swedish Pirate Party, believes the directive is not bold enough and bis not going to help to make the European common cultural heritage available the way it is drafted so I would urge everyone to reconsider because at the moment it simply isn't useful.b Another difficulty is that when dealing with musical works, a cultural heritage institution will have to consider the future rules that will result from the proposed directive on collective rights management and multi-territorial licensing of rights in musical works for online uses. Commission's Vice-President Neelie Kroes has recently pointed out that although the proposals on orphan works, as well as the proposal on collective rights management, were good steps in the way to improve EU copyright, there were also other problems beyond licensing or orphan works and that "we need to focus also on substantive copyright reform." Orphan works directive approved by EU Parliament (14.09.2012) http://ipkitten.blogspot.nl/2012/09/orphan-works-directive-approved-by-eu.html Are European orphans about to be freed? (21.09.2012) http://kluwercopyrightblog.com/2012/09/21/are-european-orphans-about-to-be-freed/ Finding a good home for orphan works online (12.09.2012) http://www.europarl.europa.eu/news/en/headlines/content/20120706STO48456/html/Finding-a-good-home-for-orphan-works-online "Orphan" works: informal deal done between MEPs and Council (6.06.2012) http://www.europarl.europa.eu/news/en/pressroom/content/20120606IPR46383/html/Orphan-works-informal-deal-done-between-MEPs-and-Council European Parliament legislative resolution of 13 September 2012 on the proposal for a directive of the European Parliament and of the Council on certain permitted uses of orphan works (COM(2011)0289 b C7-0138/2011 b 2011/0136(COD) (13.09.2012) http://www.europarl.europa.eu/sides/getDoc.do?type=TA&reference=P7-TA-2012-0349&language=EN&ring=A7-2012-0055 ======================================================================= 6. Data protection package: a proposed timetable in the EP ======================================================================= Last week, on 19 September 2012, the Civil Liberties, Justice and Home Affairs (LIBE) Committee discussed the data protection package, in particular the planned timetable. LIBE is the Committee leading the dossier in the European Parliament and will issue two reports, one on the proposal for a General Data Protection Regulation ( bthe Regulationb) and one on the proposal for a Directive bon the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and the free movement of such datab (bthe Directiveb). The two Rapporteurs, Mr Jan-Philipp Albrecht (Greens, Germany) for the Regulation and Mr Droutsas (S&D, Greece) for the Directive, decided to follow a package approach because of the important links between the two proposed legislative measures. However, Mr Droutsas underlined the difficulties that the Council seems to encounter on the Directive with the position of certain Member States. The joint parliamentary meeting taking place on 9 and 10 October is going to be crucial in solving this issue, he added. Because of the problems in the Council, the feasibility of the package approach was questioned by Mr Alvaro (ALDE, Germany) b even though he recognised the benefit of such an approach - and Mr Kirkhope (ECR, United Kingdom). The cooperative approach of the dossier, desired by the Rapporteurs, was warmly welcomed by the other members of the European Parliament from all political groups. Important issues were underlined several times during the debate such as the importance of a good implementation and of a strong enforcement of data protection, the need for clarity, the necessity of protecting fundamental rights and finally the issue of data flow to third countries. Even if no final agreement on those issues was found during the debate, the debate was very helpful to understand the forthcoming steps in the process. Mr Albrecht indeed presented his forecasted timetable for the Regulation. The current plan is to have the Regulation definitely voted before the end of this legislature, i.e. in 2014. To achieve this goal, he would like to provide a second working paper for the joint parliamentary meeting taking place beginning of October. At that time, the paper will be available only in English and will subsequently be translated for a debate in the Committee that will take place on 5 or 6 November 2012. The Rapporteur intends to have a draft report ready by December of this year, so the vote can take place between February and April 2013, to enable negotiation with the Council later on. The envisaged timeframe is very important as it gives a great perspective on the forthcoming steps. However, this timetable is foreseen as being very ambitious by Mr Alvaro, Mr Kirkhope and Mr Voss (EPP, Germany), the bShadow Rapporteursb. During the debate, they expressed the necessity to favour quality over speed. It is a very important issue and the process should not be rushed. Mr Albrecht concluded by underlining the importance of a coherent and harmonised framework and the necessity of consolidating the current system of data protection. Good legislation needs good implementation and a strong enforcement system. EU citizens have to be protected when their data are processed, he said. Therefore, he agreed that if more time was needed to make a good and strong legislation, then this time will be taken. More information on the procedure being followed and a glossary of the key terminology is available in EDRibs bActivist Guide to the Brussels Mazeb (2012) http://www.edri.org/files/2012EDRiPapers/activist_guide_to_the_EU.pdf The entire debate is available on the Parliament website (19.09.2012) http://www.europarl.europa.eu/ep-live/en/committees/video?event=20120919-0900-COMMITTEE-LIBE (Contribution by Marie Humeau - EDRi) ======================================================================= 7. The Netherlands against ACTA in all its forms ======================================================================= In response to an open letter sent by EDRi-member Bits of Freedom (BoF), the Dutch government has confirmed that it opposes any controversial ACTA-provisions in whatever form. This confirmation was provoked by the news, only six days after ACTA was rejected by the European Parliament, that a draft text of the Canada b EU Trade Agreement contained provisions that were virtually identical to provisions from ACTA. As the Netherlands set an important example by rejecting ACTA long before the vote in the European Parliament, Bits of Freedom requested the government to do the same with CETA or any agreement alike. And it did. More specifically in its letter of 17 September 2012, the government b upon BoF request b confirmed that it would not agree to the ACTA-provisions in CETA or any other treaty in which such provisions may appear. It stated: "The European Commission rightly agreed to respect the vote of the European Parliament against ACTA and to observe this vote concerning CETA. ACTA-provisions 27(3) and 27(4) regarding the liability of Internet Service Providers are no longer part of the current draft of CETA. Other provisions relating to the enforcement of intellectual property rights are currently being studied with the aforementioned vote in mind. If provisions do not correspond thereto, they will be changed or deleted." and: "In light of resolution 288 of the House of Representatives [2], this government will not agree b in whatever agreement this may be b to any ACTA-provisions it voted against. Examples are provisions on the strict enforcement of intellectual property on the internet and provisions that stand in the way of future intellectual property reforms." The government further noted that currently there were no other treaties similar to ACTA being negotiated. This confirmation by the Dutch government is of course very good news. However, due to recent elections, a note of caution is in place: the new government that is currently being formed may decide differently. Seeing the latest positions of the two major parties there is not too much reason for concern: in their election campaign, the liberal party (VVD) took a position against ACTA and similar treaties; the labour party (PvdA) took position only against ACTA but did support resolution 288 (also mentioned above) by which the government was requested to vote against treaties similar to ACTA. Bits of Freedom hopes that the formal position of the Dutch government against controversial ACTA-provisions in whatever form serves as an example to policymakers in other countries to do the same. This will hopefully help the European Commission accept its loss and realize that the only constructive way forward is to start looking for acceptable alternatives in an open and transparent way. Translation open letter: Dutch government must reject CETA (1.08.2012) https://www.bof.nl/2012/08/01/translation-open-letter-dutch-government-must-reject-ceta Translations of Dutch parliamentary resolutions against ACTA (29.05.2012) https://www.bof.nl/2012/05/29/translations-of-dutch-parliamentary-resolutions-against-acta (Contribution by Simone Halink - EDRi-member Bits of Freedom, Netherlands) ======================================================================= 8. Mapping Net Neutrality worldwide ======================================================================= When questioned about Net Neutrality the European Commission previously claimed that only little data existed to show that net neutrality violations had occurred. A new project: netneutralitymap.org shows net neutrality violations worldwide based on tests for shaping. It documents the need for net neutrality legislation. Although Net Neutrality is currently discussed throughout Europe, very little actual data is used for campaigning. A new project tries to change this by mapping data from Measurement Lab's global "Glasnost" tests. The map uses the same metric previously used by the researchers of Measurement Lab to detect violations of Net Neutrality along one year and display them on a map. The map clearly shows: violations of Net Neutrality are commonplace throughout Europe. Especially the Bittorrent protocol is frequently shaped. While data from small countries are sparse - data from larger countries confirm that net neutrality violations are indeed common. The map was created by activists around the Austrian EDRi member VIBE.at and "Initiative fuer Netzfreiheit" which recently started a campaign to promote Net Neutrality in Austria. "I did not perceive Net Neutrality violations as a problem until I first looked at the map we created" says Michael Bauer of VIBE.at. "It is striking how common shaping is in todaybs internet". The European Commission previously claimed a lack of data on Net Neutrality violations as the main reason for not punishing them. Measurement lab had this data since 2009. With this new way of presenting the data it is clear that the lack of data is not a reason for delaying net neutrality regulation any longer. The Net Neutrality map http://netneutralitymap.org Austrian campaign on Net Neutrality (only in German) http://unsernetz.at Measurement Lab - open platform for researchers to deploy Internet measurement tools http://measurementlab.net Initiative fur Netzfreiheit (only in German) http://netzfreiheit.org (contribution by Michael Bauer - EDRi-member VIBE.AT - Austria) ======================================================================= 9. Freedom Not Fear 2012 ======================================================================= The 4-day "Freedom Not Fear 2012" (FNF 2012) event came to a successful end on Monday, 17 September 2012. Organisations and individuals from 11 EU-member states participated to raise their voice for better privacy safeguards, to protest against emerging surveillance measures and to exchange views on digital rights issues The Brussels action in which several EDRi members participated (FoeBuD, Digitale Gesellschaft, IuRe, Panoptykon, Bits of Freedom, VibeAt and the Liga voor Mensenrechten) was accompanied by protest events in the US, Argentina, Luxembourg and Australia. Bits of Freedom (Netherlands) attended the FNF weekend in Brussels focusing mainly on the events around the review of the data protection framework. They consider it great to meet many activists working on different topics of which many are related to the activities of the Dutch organisation. Also, BoF found it inspiring to see which important issues exist outside the scope of their work. FoeBuD (Germany) said that several excellent results were produced at FNF 2012. FoeBuD members really enjoyed the internationality this year - and will continue working to bring even more organisations to next year's event. One topic that FoeBuD has recently focused on is the European Data Protection Regulation, and some good work on this was done during the FNF activists' weekend and the meetings with European officials. Another focus is the project to investigate and hopefully start a European Citizens' Initiative (ECI) against data retention, on which some valuable exchanges took place during FNF. The next step on this will be to organise an international conference in Amsterdam to talk about the ECI. Three Digitale Gesellschaft (Germany) members were able to participate in this year's FNF12. This was a perfect occasion for them to put their energy into pan-European networking between activists and to explain their position to European policy makers. During the conference, the members gave a short introduction and overview of the German national campaign on net neutrality. The FNF 2012 started on Friday afternoon with a discussion about the consultations of the EU Commission about a European notice-and-takedown system of content on the Internet. Mr. Werner Stengg, Head of the EC Unit "Online Services" presented the Commission's point of view on this sensitive topic. The talk was followed by two hours of discussions with Mr. Peter Hustinx, European Data Protection Supervisor, about the upcoming EU Data Protection Reform. He started with a detailed explanation of his interpretation of the Freedom Not Fear motto: "Fear is always a bad adviser." He emphasized the need to keep on striving for positive developments on privacy issues. Mentioning the whole range of various kinds of activism, from single person engagement up to professional privacy activism: "Keep on going - we need you!" Three more days of the barcamp-like conference filled with meetings, lectures and discussions followed, also including a colorful demonstration within the city of Brussels and one more outside action named the "Camspotting Game". One of the results of bFreedom Not Fearb was the establishment of the International Working Group on Video Surveillance, which announced a campaign targeting the latest developments in privacy-intrusive technology such as "Facewatch" in the UK. Freedom Not Fear 2012 http://wiki.vorratsdatenspeicherung.de/Freedom_Not_Fear_2012 Walk of Protest FNF 2012 http://wiki.vorratsdatenspeicherung.de/Freedom_Not_Fear_2012/Walk-of-protest ======================================================================= 10. First victim of French 3 strikes law is found guilty for negligence ======================================================================= After almost two years since the 3-strikes law has entered into force in France, the first Internet user was sentenced by the court to a 150 euro fine for negligence for not using the Internet access security measures and because the user has innocently confessed it. Since October 2010, about 3 million French IP addresses have been identified by rightholders of being possible infringers. Out of these, Hadopi considered 1.15 million worthy of a bfirst strikeb notice, about 102 000 of a second warning, and only 340 of a third warning. Only 14 cases were sent to court, so far. This is the first fine applied for the Hadopi law because the infringement must be proven and this is not easy to do. In order to be punished for negligence, one has to have failed to apply security means to his Internet connection or to have not used accordingly these means, both being rather difficult to prove. However, this particular Internet user gave himself up by admitting that he had not used any security means to prevent access to his Internet account. By trying to defend himself, the Internet user summoned by the court for repeated infringements, gave the court the motives to condemn him for negligence. He argued he was himself unable to download material from the Internet and blamed his wife (with whom he is under divorce procedures) for having illegally downloaded material from the Internet. The woman confirmed she had downloaded Rhianna songs. bBy saying he knew she was downloading infringing content, but didnbt prevent her from doing so, he self-incriminated,b explained Guillaume Champeau of Numerama. So, although actually innocent, the man is now to pay for being responsible for the downloading, because he did not prevent it. Hadopi: one first condemned person, by ingenuity (only in French, 13.09.2012) http://www.numerama.com/magazine/23715-hadopi-un-premier-condamne-par-naiumlvete.html Hadopi confirms that the first condemned betrayed himself (only in French, 13.09.2012) http://www.numerama.com/magazine/23718-la-hadopi-confirme-que-son-1er-condamne-s-est-lui-meme-trahi.html French 3 Strikes: Court Fines First File-Sharer, Even Though Hebs Innocent (13.09.2012) http://torrentfreak.com/french-3-strikes-court-fines-first-file-sharer-even-though-hes-innocent-120813/ ======================================================================= 11. ENDitorial: Clean IT is just a symptom of the pinata politics of privatised online enforcement ======================================================================= There has been a lot of attention to the bClean ITb project since EDRi published a leaked draft document last week, on 21 September 2011. Since then, the project organisers have said that the statement on the front page saying that bthis document contains detailed recommendationsb was incorrect and that it also contained (unidentified) other mistakes. Project coordinator But Klaasen explained on Twitter that the leak was little more than a bdiscussion document.b According to the Clean IT website, this is the output of two day meetings in Amsterdam (October 2011), Madrid (January 2012), Brussels (March 2012) Berlin (June 2012) and Utrecht(September 2012). According to the website of Clean IT, which has produced 23 pages of bullet points of policy suggestions, there will be just one more meeting (Vienna, November 2012) before a final presentation is made in February 2013. Mr Klaasen also explained on Twitter that all suggestions received thus far are only bfood for discussionb, because they do not censor the ideas they receive. Clean IT is therefore part of a wider problem b a conveyor-belt of ill-defined projects whereby industry is expected to do bsomethingb to solve ill - or even undefined problems on the Internet. For example, it takes an almost impressive amount of fragmentation for the European Commission to be simultaneously funding two different and uncoordinated projects (Clean IT and CEO Coalition on a Safer Internet for Kids) developing bvoluntaryb industry standards on bnotice and takedownb, on bupload filtersb, on breporting buttonsb and all with little or no analysis of the specific problems that need to be solved. Worse still, Clean IT was born out of a failed bvoluntaryb project organised directly by the European Commission on billegal online contentb. That project failed because it did not have a problem definition. Without knowing what problems it was trying to solve, it ended up going round in ever smaller circles before finally disappearing down the proverbial drain. Sadly, no lessons were learned before the Commission committed to funding Clean IT, which is currently making the same mistakes all over again. Even bigger mistakes have not been learned from in this approach. In the Commission-organised bdialogue on illegal uploading and downloadingb, a proposal was made for widespread bvoluntaryb filtering of peer-to-peer networks. This was resisted by the Internet access provider industry and ultimately ruled by the European Court of Justice (Scarlet/Sabam case C70/10) to be in breach of fundamental rights. All of this experience meant that EDRi could not possibly participate in Clean IT without seeking to ensure that the project did not make the same mistakes that we have seen over and over again. In 2011, as a precondition of participation, we therefore set very reasonable demands: 1. Identify the specific problems to be solved. (At different moments, Clean IT was meant to address bAl Quaida influencedb networks, bterrorist and extremist 'use' of the Internetb and bdiscriminationb/billegal softwareb.) 2. Identify the scope of the industry involvement. Listing every single type of online intermediary is neither credible nor effective. 3. Actively seek to identify and avoid possibilities for unintended consequences for both fundamental rights and addressing illegal content. The project leader rejected all of these preconditions, regrettably leaving us no option but to stay outside the process. As a result, we have a project that seeks to use unspecified industry participants to solve unidentified problems in ways which may or may not be in breach of the Union and international law. It would be unconscionable for EDRi to participate in these circumstances. We have also been contacted via Twitter by Commissioner Kroes' spokesperson. Mr Heath's comments suggest that CleanIT is only a bbrainstormingb session and the Commission has spent hundreds of thousands of Euro just for lists of possible policies. It is very important to stress that absolutely nothing in the document that we released last week has been officially approved as European Commission policy. The recommendations, insofar as they are recommendations, are the sole responsibility of the CleanIT project. Commissioner MalmstrC6m has acted to distance herself from the project and has made this very clear via Twitter messages. There are, however, serious questions that are still to be asked regarding the budget approval processes that lead to such projects being approved for public funding. The law is quite clear b the Charter of Fundamental Rights, the Convention on Human Rights and the International Covenant on Civil and Political Rights are quite clear b restrictions on fundamental rights must be foreseen by law and not introduced as unpredictable, ad hoc projects by industry. The rule of law cannot be defended by abandoning the rule of law and EDRi will continue to defend this principle. EDRi: Clean IT b Leak shows plans for large-scale, undemocratic surveillance of all communications (21.09.2012) http://edri.org/cleanIT Clean IT rebuttal of our comments http://www.cleanitproject.eu/edri-publishes-clean-it-discussion-document/ Mr Heath's comments https://twitter.com/EDRi_org/status/250524464499023872 Mr Klaasen's tweet https://twitter.com/ButKlaasen/status /249145735453487105 Commissioner MalmstrC6m's tweets https://twitter.com/MalmstromEU/status/250573911471845376 https://twitter.com/MalmstromEU/status/250574119991660545 https://twitter.com/MalmstromEU/status/250641266038173696 (Contribution by Joe McNamee - EDRi) ======================================================================= 12. Recommended Reading ======================================================================= Islands of Resilience Comparative Model for Energy, Connectivity and Jurisdiction Realizing European ICT possibilities through a case study of Iceland http://islandsofresilience.eu/ http://icg.greens-efa.org/pipermail/hub/attachments/20120925/83bf78da/attachment-0001.pdf JoaquC-n Almunia Vice President of the European Commission responsible for Competition Policy - Competition enforcement in the knowledge economy Fordham University/ New York City (20.09.2012) http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/12/629&format=HTML&aged=0&language=EN&guiLanguage=en EDPS issues comments on DG MARKT's public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries (13.09.2012) http://www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/Consultation/Comments/2012/12-09-13_Comments_DG_MARKT_EN.pdf The internet in pieces Harried by cyberattacks, Iran is making good on a vow to build its own web. Others could follow (23.09.2012) http://www.guardian.co.uk/commentisfree/2012/sep/23/iran-us-cyber-espionage-intranet ======================================================================= 13. Agenda ======================================================================= 27 September 2012, Paris, France Open Data - La ConfC)rence http://www.opendata-laconference.com/agenda.html 7-10 October 2012, Amsterdam, Netherlands 2012 Amsterdam Privacy Conference http://www.apc2012.org/ 11-12 October 2012, Amsterdam, Netherlands Economies of the commons 3 - Sustainable Futures for Digital Archives http://ecommons.eu/ 25-28 October 2012, Barcelona, Spain Free Culture Forum 2012 http://fcforum.net/ 3-4 November 2012, Baku, Azerbaijan Best Bits b a strategic gathering of NGOs around Internet governance and Internet principles http://igf-online.net/bestbits.pdf 6-9 November 2012, Baku, Azerbaijan Seventh Annual IGF Meeting: "Internet Governance for Sustainable Human, Economic and Social Development" http://www.intgovforum.org/cms/ 9-11 November 2012, Fulda, Germany Digitalisierte Gesellschaft - Wege und Irrwege FIfF Annual Conference in cooperation with Fuldaer Informatik Kollquium http://www.fiff.de/2012 29-30 November 2012, Brussels, Belgium For Your Eyes Only: Privacy, Empowerment and Technology in the context of Social Networks http://www.foryoureyesonly.be 4 December 2012, Brussels, Belgium 3rd Annual European Data Protection and Privacy Conference http://www.eu-ems.com/summary.asp?event_id=123&page_id=983 23-25 January 2013, Brussels, Belgium CPDP 2013 Conference - Reloading data protection CfP by 19 October 2012 http://www.cpdpconferences.org/callforpapers.html 6-8 May 2013, Berlin, Germany re:publica 2013 http://re-publica.de/12/2012/08/28/der-termin-steht-vom-06-08-mai-2013-geht-die-republica-in-die-siebte-runde/ 31 July b 4 August 2013, Geestmerambacht, Netherlands Observe. Hack. Make. - OHM2013 https://ohm2013.org/ ============================================================ 14. About ============================================================ EDRi-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRi has 32 members based or with offices in 20 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRi-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and are visible on the EDRi website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring http://flattr.com/thing/417077/edri-on-Flattr - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/mk/vesti/edri - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided by Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From grarpamp at gmail.com Wed Sep 26 16:44:14 2012 From: grarpamp at gmail.com (grarpamp) Date: Wed, 26 Sep 2012 19:44:14 -0400 Subject: [tor-talk] Tor and P2P Message-ID: > While we don't need a very complex p2p design (in short, we are mostly > just talking about simple HTTP servers running on each device, behind > a hidden service .onion), I am concerned in the long run about > scalability and reliability of this. Is, or can Tor be, useful or optimal? On which platforms? With what P2P apps or traffic patterns? Assuming these are the only cores available at this time... http://www.i2p2.de/ https://code.google.com/p/phantom/ https://www.torproject.org/ Running a P2P app will require running one of the above cores. Which means all peers already have access to each core's internal addressing scheme, respectively: i2p, private IPv6, onion. And thus they have access to each other. So though Tor is unique in having exit facilities by design, those facilities are not needed for a global P2P mesh to work. Tor's uniqueness and its perhaps as yet uncharacterized ability to handle certain P2P loads should lead to a comparative review of the utility of other cores. If you can speak IPv6, you can speak Phantom, which makes app development incredibly simple. Written in C. Probably the lightest weight core so far. Needs some review. Presents a native, node specific, source address. I2P has the most network experience so far with lots of P2P connections going on, ala bittorrent. More work is needed to interface apps with it. Written in Java. Does not present a native, node specific, source address? If you need to use exit for other things, you may not have room to run multiple cores, provide some resources back, etc. So Tor would make sense in that case. Does not present a native, node specific, source address. There are certainly more comparisons to be made. > OnionCat can be seen as implementing P2P-over-HS. I never read a > similarily strong statement about it before. It does provide an IPv6 interface/layer, that is definitely a win since you can use all the usual network programming methods and apps. It is not a P2P app, only a shim for Tor and I2P. And it needs further work to provide IPv6 to HS/I2P PKI authentication. I might be inclined to sign all the traffic ala IPSEC before attempting some ping pong scheme. On a big scale, it might make sense for all the anonymous networks to use interfaces and IPv6 node addresses for interop purposes. Though there are some current problems there... Tor's 80 bits may be too small, I2P's 256 is wider than can be packed under an IPv6/48. _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From camera_lumina at hotmail.com Wed Sep 26 17:19:54 2012 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 26 Sep 2012 20:19:54 -0400 Subject: Julian Assange now an official enemy of the US Message-ID: "The U.S. Defense Department has formally declared WikiLeaks founder Julian Assange an enemy on par with al-Qaida, according to documents that an Australian newspaper said Wednesday it had obtained under freedom of information laws." Hilarious. From grarpamp at gmail.com Wed Sep 26 17:39:15 2012 From: grarpamp at gmail.com (grarpamp) Date: Wed, 26 Sep 2012 20:39:15 -0400 Subject: [tor-talk] Tor and P2P Message-ID: >> My question is, how would it scale and what would be the implications >> of such a system (every user would be a hidden service and would be >> constantly connected to other hidden services it wants to interact >> with)? > thrash the HS > directory system excessively, and probably overload the users' Tor > client processes to the point that they start pounding on the Tor > network in general I likely ran into some of this a while back with something I was working on, enough that it forced a hardware upgrade and future tests. If you're expecting to be doing lots of session initiation, I think you're going to hit some significant local CPU issues, especially those of you thinking of P2P applications running on "smaller than laptop" devices. An occaisional message in the manner in which you might normally 'text', would work ok. But if you expect to have some sort of pidgin/sip buddy list full of status and people bouncing around doing things, it could become ugly. Certainly far worse for torrenting as the extreme example. And when thousands of people come online with P2P like that... yeah. On the other hand, once the session state is up, things seem better and you're back to the usual latency, bandwidth and reliability limits of the relay system. P2P doesn't generally keep sessions up, so it's back to step one. > 1. Persistent hidserv connections. Reconnecting for each message via an > HTTP POST is right out. Way too many circuits+onionskins to scale. So it would be interesting to see where this could go. - Extending circuit and other timeouts for hidden services? - Storing related TCP or Tor states locally? _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From demonfighter at gmail.com Wed Sep 26 17:40:53 2012 From: demonfighter at gmail.com (Steve Furlong) Date: Wed, 26 Sep 2012 20:40:53 -0400 Subject: Julian Assange now an official enemy of the US In-Reply-To: References: Message-ID: On Wed, Sep 26, 2012 at 8:19 PM, Tyler Durden wrote: > "The U.S. Defense Department has formally declared WikiLeaks founder > Julian Assange an enemy on par with al-Qaida, according to documents > that an Australian newspaper said Wednesday it had obtained under > freedom of information laws." It *totally* makes sense! It does! Because hosting documents embarrassing to the administration is *exactly* the same as blowing up two large buildings and killing thousands of people. And if you can't see that, then maybe you also don't believe we have always been at war with Eastasia. -- Neca eos omnes. Deus suos agnoscet. -- Arnaud-Amaury, 1209 From collin at averysmallbird.com Wed Sep 26 18:15:44 2012 From: collin at averysmallbird.com (Collin Anderson) Date: Wed, 26 Sep 2012 21:15:44 -0400 Subject: Julian Assange now an official enemy of the US In-Reply-To: References: Message-ID: On Wed, Sep 26, 2012 at 9:06 PM, Karel Bmlek wrote: > they spelled al-Qaeda wrong, lol. > The pretentious beauty of not having a transliteration standard. Anyway, I won't be convinced that this analogy is government policy until Assange ends up on the SDN list. > (non that it matters because it uses ayn which is a letter that no > westerner ever can say right.) > > ....sorry, back to important US bashing. > > On Thu, Sep 27, 2012 at 2:19 AM, Tyler Durden > wrote: > > "The U.S. Defense Department has formally declared WikiLeaks founder > > Julian Assange an enemy on par with al-Qaida, according to documents > > that an Australian newspaper said Wednesday it had obtained under > > freedom of information laws." > > > > Hilarious. > -- *Collin David Anderson* averysmallbird.com | @cda | Washington, D.C. From eugen at leitl.org Wed Sep 26 12:58:23 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 26 Sep 2012 21:58:23 +0200 Subject: EDRi-gram newsletter - Number 10.18, 26 September 2012 Message-ID: <20120926195823.GL9750@leitl.org> ----- Forwarded message from EDRi-gram ----- From eugen at leitl.org Wed Sep 26 13:14:18 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 26 Sep 2012 22:14:18 +0200 Subject: [tor-talk] Tor and P2P (Hidden SMS) Message-ID: <20120926201418.GR9750@leitl.org> ----- Forwarded message from Nathan Freitas ----- From eugen at leitl.org Wed Sep 26 13:15:50 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 26 Sep 2012 22:15:50 +0200 Subject: [tor-talk] Tor and P2P Message-ID: <20120926201550.GS9750@leitl.org> ----- Forwarded message from Mike Perry ----- From hellosr54 at iicbelgium.com Thu Sep 27 00:39:06 2012 From: hellosr54 at iicbelgium.com (=?koi8-r?B?zsHMz8fPz8LMz9bFzsnFIM7BIOvJ0NLF?=) Date: Wed, 26 Sep 2012 23:39:06 -0800 Subject: =?koi8-r?B?7uTzIPDy6SDp8/Dv7Pj67/fh7unpIOvp8PLz6+noIOvv7fDh7unq?= Message-ID: <1930568835.A9992722016@uheakfplyotaqx.mxpido.ua> 28 сентября 2012 г. ОФФШОРНЫЙ БИЗНЕС: КИПР ДО И ПОСЛЕ РАТИФИКАЦИИ ПРОТОКОЛА. ДЕТАЛЬНЫЙ АНАЛИЗ И ПРАКТИКА ИСПОЛЬЗОВАНИЯ. (Налоги на Кипре √ не пересекая грань между оптимизаций и уклонением. Схемы с использованием Кипрских компаний) (495) 7922I22 и 8 (499) Ч45*4О_95 Цель: Для участия мы приглашаем как слушателей, уже использующих кипрские компании в своей работе, так и тех, кто только планирует воспользоваться данным инструментом налогового планирования, конфиденциальности и защиты активов. Содержание семинара можно разделить на блоки: * последствия ратификации Протокола к соглашению об избежании двойного налогообложения между РФ и Кипром; * практика использования и сопровождения кипрских компаний; * пути применения Кипра в налоговом планировании; * налогообложение на Кипре (с детальным рассмотрением НДС). По мнению автора, ратификация Протокола не приведет к массовой реструктуризации или отказам от налоговых решений с использованием Кипра, поскольку данный Протокол лишь "перетасовывает" сложившиеся принципы работы. Во многих случаях оптимальным решением будет "косметическая" коррекция договорных отношений и хозяйственных операций, которой будет уделено особое внимание в рамках данного семинара. Тщательного рассмотрения заслуживает налоговое законодательство Кипра и его "пересечение" с российским в налоговых решениях. Например, в уставной капитал кипрских компаний можно вложить не только денежные средства, но и акции российских компаний. Налоговые последствия при этом и методика оценки вклада в натуральной форме вызывают особенно много вопросов слушателей. При использовании кипрских компаний многие сталкиваются с проблемами в виде непредвиденных налоговых обязательств, штрафов и пеней, возникающих из-за незнания тонкостей и особенностей налоговой системы ЕС и Кипра, эволюционирующей столь же стремительно, как и российская. В рамках данного семинара будут рассмотрены детали налоговой системы Кипра, при этом особое внимание будет уделено НДС √ наиболее сложному налогу, который регулируется не только местным законодательством, но и многочисленными европейскими директивами. Не менее важны технические вопросы использования кипрских компаний. К сожалению, на практике взаимодействие с администратором, или регистрационным агентом, часто сопряжено с большим количеством трудностей, выливающимся в противостояние владельца компании и неторопливых кипрских юристов. Также многие сталкиваются с непрозрачностью ценообразования на отдельные услуги, особенно на аудит и номинальный сервис. Данный семинар поможет Вам оптимизировать свои отношения с администратором, и определить: за что, кому и когда Вы должны платить при использовании кипрских компаний. Особенностью данного семинара является практическая направленность и отсутствие лишних теоретических и исторических отступлений. Семинар строится в форме интерактивного практического занятия при постоянном взаимодействии с аудиторией с разбором большого количества примеров и подробным описанием налоговых, финансовых и правовых последствий или рисков. Программа: НАЛОГИ НА КИПРЕ √ НЕ ПЕРЕСЕКАЯ ГРАНЬ МЕЖДУ ОПТИМИЗАЦИЙ И УКЛОНЕНИЕМ * Налог на прибыль (Corporate Income Tax); предварительный налог на прибыль (Preliminary Tax); налог на оборону (Special Defence Contribution); налог на прирост капитала (Capital Gains Tax) и т.д. * Пути минимизации налоговых отчислений на Кипре: практические примеры и анализ ошибок * Налогообложение операций с ценными бумагами: пределы освобождения * Налоговый календарь на 2012 год: сдача отчетностей, оплата налогов и сборов * Изменения кипрского законодательства 2012 и тенденции 2013 * Ратификация Протокола к Соглашению между РФ и Кипром: кто понесет убытки, а кому удастся на этом заработать? * Как не попасть в "петлю" негативных нововведений Протокола? НДС ПРИ ИСПОЛЬЗОВАНИИ КИПРСКИХ КОМПАНИЙ * Когда нужно получать номер НДС (VAT number) и можно ли это сделать в другой стране ЕС? * Применение механизма ⌠reverse charge■ * Анализ основных европейских директив на предмет определения места оказания услуг (⌠the place of supply■) * Обложение НДС услуг, оказанных через интернет (⌠electronically supplied services■) * Сложные случаи экспорта-импорта: когда возникает НДС? * Налоговые последствия по НДС при совершении трехсторонних сделок в ЕС (triangular operations) * НДС и роялти, консалтинг, маркетинг √ всегда ли можно принять к вычету всю сумму входящего НДС? СХЕМЫ С ИСПОЛЬЗОВАНИЕМ КИПРСКИХ КОМПАНИЙ * Владение недвижимостью с использованием кипрских компаний * Займы: анализ правил тонкой капитализации и прочих ограничений (ст.269 НК РФ), риски и примеры ошибок * Роялти: риски, оптимальная величина размеров выплат, НДС, экономическое и документальное обоснование (⌠substance■) * Операции с ценными бумагами и векселями * ЗПИФы √ применимы ли после ратификации Протокола? * Построение комплексной действующей холдинговой структуры и дивиденды * Схемы коллективных инвестиций и инвестиционные фонды на Кипре РАБОТА С АДМИНИСТРАТОРОМ (АГЕНТОМ) И АУДИТОРОМ КИПРСКОЙ КОМПАНИИ * Наличие представительства администратора в Москве: преимущество или недостаток? * Как не дать администратору и аудитору обмануть Вас? Примеры и рекомендации * За что кипрские администраторы деньги брать не должны? * Переход к другому администратору: "подводные камни" * Принципы ценообразования аудиторских услуг и пути минимизации их стоимости * Вправе ли кипрский аудитор одновременно проверять и вести отечность? * Анализ среднерыночных цен и сроков оказания услуг: оцените своего администратора. РЕАЛЬНЫЙ ОФИС НА КИПРЕ * Сравнение "виртуального" и реального офисов * Случаи, когда реальное присутствие на Кипре необходимо * Инструменты создания видимости контроля компании с территории Кипра * Наем персонала в кипрскую компанию: налоговые и практические вопросы НОМИНАЛЬНЫЙ СЕРВИС И КОНФИДЕНЦИАЛЬНОСТЬ * Документы, регламентирующие возникающие отношения: на что следует обратить внимание? * Раскрытие информации в связи с ратификацией Протокола * Полномочия номинальных директоров и акционеров: где границы и кем они устанавливаются? * Что делать, если номинальный директор отказывается подписывать документы? БАНКОВСКИЕ СЧЕТА * Анализ надежности кипрских банков на фоне ухудшения ситуации в ЕС * Пути снятия средств со счета кипрского банка в России * Раскрытие банковской тайны √ факты и выводы * Тарифы популярных кипрский и прибалтийских банков. Использование SEPA. * Выплаты зарплаты путем выпуска карт к счетам в кипрских банках Стоимость участия: 9 000 рублей За более подробной информацuей обpащайтеcь по тел: +7 (495)- 7Ч291/98 и +7 499 - ЧЧ5_40_95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 11536 bytes Desc: not available URL: From adrelanos at riseup.net Wed Sep 26 17:06:28 2012 From: adrelanos at riseup.net (adrelanos) Date: Thu, 27 Sep 2012 00:06:28 +0000 Subject: [tor-talk] Tor and P2P Message-ID: grarpamp: > Given that these services are surely coming in force... and from > directions that see these networks more as a raw transport than > say, primarily for the purposes outlined on their respective web > pages... it seems the usual echo of "we're a nice project, don't > do that, too much load" may not be useful. This should not imply > fault, but merely suggest that it's dated and hopeless. I tend to agree but I am not sure. At the moment I don't believe the Tor project will die soon. It's fine with me if we can continue use it for anonymous browsing, circumvention and so on for the next years. It's also questionable if the Tor project should try to get a big share of the people interested in anonymous p2p. I tend to think no, because this opens up the project for a lot negative press. That increases the risk for a new law to forbid the whole network in even more countries. Let other networks try that out. > P2P services should look at the current strong anonymization projects > that could provide transport. The ones I know of are: > > http://www.i2p2.de/ > https://code.google.com/p/phantom/ > https://www.torproject.org/ > > More links are welcome. Loads of links here: https://en.wikipedia.org/wiki/Anonymous_P2P A very interesting idea is/was the owner free filesystem: https://en.wikipedia.org/wiki/OFFSystem Depending on ones individual threat model, I believe i2p could be sufficiently secure for file sharing purposes: http://www.i2p2.de/ I didn't make an academic comparison, but it looks like retroshare is quickly gaining more and more users: http://retroshare.sourceforge.net/ _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From nathan at freitas.net Wed Sep 26 12:14:38 2012 From: nathan at freitas.net (Nathan Freitas) Date: Thu, 27 Sep 2012 00:44:38 +0530 Subject: [tor-talk] Tor and P2P (Hidden SMS) Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 09/26/2012 08:53 PM, Ted Smith wrote: > Further, SMS is basically real-time. An SMS app that had > hidden-service type delays (which would be especially bad when > roaming between network connections, causing you to rebuild all of > your circuits) would probably be unusable for all but the most > paranoid (which isn't to say you shouldn't build this). I can tell you that based on prototype code I have created, SMS and VoIP type p2p applications between mobile devices works just fine. The latency is not bad, especially since the apps are coded to be asynchronous anyhow. Whether it takes 10 seconds or 1 minute for someone to respond does not bother users. Hidden Services as a globally anonymous NAT'd networked is an amazing opportunity for this type of application. We just need to solve the scalability problem so we do not, as Robert put it "thrash the hidden services directory". +n -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/ iQIcBAEBAgAGBQJQY1QeAAoJEKgBGD5ps3qpurYP/27/iAMOyATOl5ME+636qMSz vfZQcdyHn/fJ7RwCVULmtmxPO9Gv0jua6bamR3jOCHYXM/GpEcIjz2S9tMb10uX0 MgiFNxmh2hC6+uuf4eyrWglrDpPCZc3QeWsiDV64nyhfo7cKJ09CN6qKGW228l1i gRPiT3ypfWBIu6OMlX2hBpBToI8xifrVH/dMiizZvFvNBTNXkzsUaUZi34O9znwi zCGi0zrEXsSN3uITKAEKBs63XrPU3Wam4sd7dUWFnSy7S6MknUQdIAFtVYzCyp7h +apznQJG9FLxYVU4qNPRRB9Ffm0eSDzf/ANSsMVg38ad+xZ2BMMwg4XDicUoEr0m ROa727U/MWQKCsm6zgwtvXNGcd29GjWn98SHmZR16kH+LrYhXoS/nKTNQgHUrqRT G6jRnEHGoIVFY71d+juCm8xgqgTBO+l7jFO143eBDb4iMUJW8eD/AuIT9xIn+r9x i545WWwynI8EAKj7IU2iGnZ3I1xwF2JOaSd7K9W+AiMJ45EjLpN2w+4QXdw/ud9s DSvFFpzrHGjtkYA3KFiIwaItcHkNkqEZf0kPdKRabLWjDf2a5Dsg55cyjZ3Xb+tr K+nvvc4z2C3QUoLV0wMr7rh8dw8cjb1nKs15mxYLeMw+1hhUTw0bvCbIj6NkGK2V r5y9TkDrsVIcJIvWAJsA =Y46k -----END PGP SIGNATURE----- _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From grarpamp at gmail.com Wed Sep 26 23:30:46 2012 From: grarpamp at gmail.com (grarpamp) Date: Thu, 27 Sep 2012 02:30:46 -0400 Subject: [tor-talk] Tor and P2P Message-ID: > Loads of links here: > https://en.wikipedia.org/wiki/Anonymous_P2P Always a good read :) Part of me wants to see if one giant anonymous general purpose filesystem will ever come about... https://en.wikipedia.org/wiki/List_of_file_systems#Distributed_file_systems > A very interesting idea is/was the owner free filesystem: > https://en.wikipedia.org/wiki/OFFSystem I think this required the use of https to be fully secure, just a bit of extra setup for that is all. > Depending on ones individual threat model, I believe i2p could > be sufficiently secure for file sharing purposes: > http://www.i2p2.de/ They use it a lot for that. Admittedly I really should learn more about the full mechanics of this one. > I didn't make an academic comparison, but it looks like retroshare > is quickly gaining more and more users: > http://retroshare.sourceforge.net/ http://en.wikipedia.org/wiki/Friend-to-friend When I last looked briefly at this one a couple years back, the users were not necessarily anonymous to each other. It seemed to require users to know and/or trust one another. If that was the case, anonymous transport layer would have been required underneath it to match the level of anonymity the three projects I listed. Maybe they solved that since then? _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From kb at karelbilek.com Wed Sep 26 18:06:38 2012 From: kb at karelbilek.com (=?ISO-8859-1?Q?Karel_B=EDlek?=) Date: Thu, 27 Sep 2012 03:06:38 +0200 Subject: Julian Assange now an official enemy of the US In-Reply-To: References: Message-ID: they spelled al-Qaeda wrong, lol. (non that it matters because it uses ayn which is a letter that no westerner ever can say right.) ....sorry, back to important US bashing. On Thu, Sep 27, 2012 at 2:19 AM, Tyler Durden wrote: > "The U.S. Defense Department has formally declared WikiLeaks founder > Julian Assange an enemy on par with al-Qaida, according to documents > that an Australian newspaper said Wednesday it had obtained under > freedom of information laws." > > Hilarious. From kb at karelbilek.com Wed Sep 26 18:22:11 2012 From: kb at karelbilek.com (=?ISO-8859-1?Q?Karel_B=EDlek?=) Date: Thu, 27 Sep 2012 03:22:11 +0200 Subject: Julian Assange now an official enemy of the US In-Reply-To: References: Message-ID: Yes, of course. And I found out that "Qaida" transliteration is used a lot, too, so this makes the whole point moot. Back to the point... I really wonder if Sweden would *actually* hand JA over to USA. They did something like that before (see http://en.wikipedia.org/wiki/Repatriation_of_Ahmed_Agiza_and_Muhammad_al-Zery ) On Thu, Sep 27, 2012 at 3:15 AM, Collin Anderson wrote: > On Wed, Sep 26, 2012 at 9:06 PM, Karel Bmlek wrote: >> >> they spelled al-Qaeda wrong, lol. > > > The pretentious beauty of not having a transliteration standard. > > Anyway, I won't be convinced that this analogy is government policy until > Assange ends up on the SDN list. > > > >> >> (non that it matters because it uses ayn which is a letter that no >> westerner ever can say right.) >> >> ....sorry, back to important US bashing. >> >> On Thu, Sep 27, 2012 at 2:19 AM, Tyler Durden >> wrote: >> > "The U.S. Defense Department has formally declared WikiLeaks founder >> > Julian Assange an enemy on par with al-Qaida, according to documents >> > that an Australian newspaper said Wednesday it had obtained under >> > freedom of information laws." >> > >> > Hilarious. > > > > > -- > Collin David Anderson > averysmallbird.com | @cda | Washington, D.C. From kb at karelbilek.com Wed Sep 26 18:35:16 2012 From: kb at karelbilek.com (=?ISO-8859-1?Q?Karel_B=EDlek?=) Date: Thu, 27 Sep 2012 03:35:16 +0200 Subject: islamists webforums Message-ID: well, this list is already listed as terrorist by Jester, so why not I am looking for as much islamists webfora as possible (english is better)... either regular web or torspace/darknet/i2p/... it is good for both laughing at them + sort of testing the freedom of the internet, I donno the only one I really know in English is https://www.ansar1.info I found a few working in Arabic in here - http://www.ministrywarning.com/terrorists%20sites%20with%20Forumer.htm - but since I don't understand Arabic that well I can't really tell which are just regular Arabic forums ;( http://muslm.net/vb I would guess there will be lots of them on torspace, OTOH tor is so slow few islamists would really be using it... who knows From jacob at appelbaum.net Thu Sep 27 01:54:13 2012 From: jacob at appelbaum.net (Jacob Appelbaum) Date: Thu, 27 Sep 2012 08:54:13 +0000 Subject: [tor-talk] TorBirdy 0.0.12 released - testing and feedback requested! Message-ID: Hi! TorBirdy 0.0.12 is now out. It's still quite experimental - of course. Use at your own risk and especially if you're using it with Enigmail and GnuPG without a local[0] HTTP proxy. We've continued with updating the web page to show some TorBirdy screen shots: https://github.com/ioerror/torbirdy/wiki/Screen-shots Call for help: We're looking for assistance with Translations - if you'd like to translate TorBirdy, we'd gladly accept a patch that prepares TorBirdy for translation work. We now have German, English and Punjabi! Even if you can't help translate, we'd love to know what languages matter to you or your friends - please let us know? Release Highlights: 0.0.12, 27 Sept 2012 TorBirdy now has localization support Current languages: English, German (translated by Karsten N.), Punjabi TorBirdy code cleanup: fix global namespace pollution Do not select the last selected account to prevent automatic login (TorBirdy selects 'Local Folders' on startup to prevent this) Restore proxy settings at TorBirdy uninstall (settings prior to installation of TorBirdy) TorBirdy now allows HTTP/SSL connections Users may opt-out from `--throw-keyids' Enhanced TorBirdy JonDo support (thanks to Karsten N.) Fix a bug in 0.0.11 that prevented account preferences from being set Add Screenshots directory TorBirdy no longer requires a configured HTTP proxy for full use with Tor TorBirdy now enforces the safest HTTP proxy usage possible with GnuPG TorBirdy attempts to disable all name resolution in GnuPG due to a serious SOCKS5 problem with GnuPG proxy options in how we invoke GnuPG; GnuPG only supports SOCKS5 when it is linked against libcurl (>7.21.7) and hostnames are not used. This is outlined the following bug: https://trac.torproject.org/projects/tor/ticket/2846 General content anonymity caution note: TorBirdy has known leaks in the Message-ID and in the Date header, we're working on merging an upstream patch that will allow these leaks to be closed. There are no known proxy leaks unless you use additional extensions that do not respect the proxy settings of Thunderbird. If you use GnuPG and Enigmail, we encourage you to use it with a local HTTP proxy due to the issues mentioned[0] regarding GnuPG. Here's the wiki page for TorBirdy: https://trac.torproject.org/projects/tor/wiki/torbirdy Here's the latest XPI for TorBirdy: https://www.torproject.org/dist/torbirdy/torbirdy-0.0.12.xpi https://github.com/downloads/ioerror/torbirdy/torbirdy-0.0.12.xpi Here is a proper GPG signature for the latest XPI: https://www.torproject.org/dist/torbirdy/torbirdy-0.0.12.xpi.asc https://github.com/downloads/ioerror/torbirdy/torbirdy-0.0.12.xpi.asc Here is the sha1sum of torbirdy-0.0.12.xpi: 4d956d0458580dd689f2e02a6cf369384e4aa5af The GnuPG signature that signed this email is also the same key that signs the TorBirdy releases. To learn more about signature verification of Tor Project related software such as TorBirdy please visit this page: https://www.torproject.org/docs/verifying-signatures.html The plugin on AMO has been preliminarily reviewed and we are still in the review process. It is again possible (Hooray!) to install TorBirdy directly from Thunderbird or by downloading the extension in a web browser from Mozilla's website: https://addons.mozilla.org/en-US/thunderbird/addon/torbirdy/ We believe that users who installed previous versions from Mozilla's addons site should receive this update automatically. We now upload a full XPI and GnuPG signature for every new release to the Tor Project's web servers: https://www.torproject.org/dist/torbirdy/ All the best, Jacob [0] https://trac.torproject.org/projects/tor/ticket/2846 _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From saftergood at fas.org Thu Sep 27 09:01:10 2012 From: saftergood at fas.org (Steven Aftergood) Date: Thu, 27 Sep 2012 09:01:10 -0700 Subject: Secrecy News -- 09/27/12 Message-ID: Format Note: If you cannot easily read the text below, or you prefer to receive Secrecy News in another format, please reply to this email to let us know. SECRECY NEWS from the FAS Project on Government Secrecy Volume 2012, Issue No. 98 September 27, 2012 Secrecy News Blog: http://www.fas.org/blog/secrecy/ ** DECLASSIFICATION PROCEEDS METHODICALLY AT ENERGY DEPARTMENT ** US FOREIGN ASSISTANCE TO CENTRAL ASIA, AND MORE FROM CRS DECLASSIFICATION PROCEEDS METHODICALLY AT ENERGY DEPARTMENT The capacity of gas centrifuges to enrich uranium increased by two orders of magnitude between 1961 and 1967, from 0.39 kg-SWU/year to 30 kg-SWU/year. That striking fact was declassified by the U.S. Department of Energy in 2008 and made public this month. http://www.fas.org/sgp/othergov/doe/decl/table.pdf Under the terms of the Atomic Energy Act (section 142), which governs the classification of nuclear weapons-related information, the Department of Energy is required to conduct a "continuous review" of its classified information "in order to determine which information may be declassified." And so it does. Slowly and methodically, the Department has declassified numerous categories of nuclear information over the last several years. Those declassification actions were documented recently in response to a Freedom of Information Act request from the Federation of American Scientists. http://www.fas.org/sgp/othergov/doe/decl/index.html At least one of the declassifications is of lasting and profound political importance, namely the public disclosure in 2010 of the size of the U.S. nuclear weapons arsenal. Other declassifications involve obscure matters of uncertain significance, like the now-declassified "fact that thorium metal is used in the radiation case of the W71 warhead." In each instance, declassification is preceded by a deliberative process which considers whether the information is already widely known; whether its publication would assist an adversary in the development of countermeasures to U.S. systems or in development of its own nuclear capability; whether disclosure would have a detrimental effect on U.S. foreign relations; whether it would benefit the public welfare; and whether it would otherwise enhance government operations. With respect to the declassification of historical U.S. centrifuge information, the DOE record of decision noted that while the information was not widely known, it would not assist in development of countermeasures, would not have a detrimental effect on foreign relations, and would not enhance government operations. Other aspects of the justification for declassification of centrifuge data, however, remained classified and were not released. On the whole, DOE seems to have a well-articulated procedure for conducting declassification of atomic energy information. Under DOE regulations, there is even a provision for members of the public to propose topics for declassification (10 CFR 1045.20), though it has rarely if ever been invoked. The outcome of the declassification process, however, is somewhat unpredictable. It is contingent upon an official -- but inevitably subjective -- assessment of current technological developments and political trends. The correct answer is not always self-evident. "Prior classification decisions, while not unwarranted, might have taken a slightly different direction had the post-Cold War environment been more clearly seen a decade ago," wrote a Los Alamos technical evaluation panel in a 2003 report to DOE headquarters. http://www.fas.org/sgp/othergov/doe/decl/lanl-let.pdf Classified atomic energy information still plays a potent role in public policy and is not exclusively the province of technologists. This week the Nuclear Regulatory Commission granted a license to General Electric-Hitachi for construction of a uranium enrichment plant in Wilmington, NC, which uses a controversial laser enrichment process known as SILEX. Arms control advocates (including FAS) and others argued that the SILEX process raises distinctive proliferation concerns that weigh against its adoption. http://www.nrc.gov/reading-rm/doc-collections/news/2012/12-106.pdf In 2001, the SILEX process was deemed by DOE to contain privately-generated Restricted Data that is classified under the Atomic Energy Act. http://www.fas.org/sgp/othergov/doe/silex.html Aside from nuclear weapons information classified under the Atomic Energy Act, the Department of Energy also classifies national security information by executive order. DOE described the current state of its national security information program in a recent report on its performance of the Fundamental Classification Guidance Review. http://www.fas.org/sgp/isoo/fcgr/doe.pdf US FOREIGN ASSISTANCE TO CENTRAL ASIA, AND MORE FROM CRS One of the features that make Congressional Research Service reports broadly valuable is that they often reflect the privileged access to executive branch information that is enjoyed by CRS, at least in some areas, compared to what an ordinary member of the public can expect. So, for example, a newly updated CRS report on Central Asia provides authoritative tabulations of US foreign assistance to Central Asian countries, broken down by country and by year for the past two decades. Assembling this data independently would be a difficult and time-consuming chore, if it were possible at all. See Central Asia: Regional Developments and Implications for U.S. Interests, updated September 19, 2012: http://www.fas.org/sgp/crs/row/RL33458.pdf (For a new critical assessment of US aid to Central Asia based on data previously published by CRS, see "U.S. Military Aid To Central Asia: Who Benefits?" by Joshua Kucera, The Bug Pit, September 25.) http://www.eurasianet.org/node/65957 Some other new and newly updated reports from the Congressional Research Service that materialized on our website include the following. Prospects for Democracy in Hong Kong: Results of the 2012 Elections, September 14, 2012: http://www.fas.org/sgp/crs/row/R42746.pdf Trafficking in Persons: International Dimensions and Foreign Policy Issues for Congress, updated September24, 2012: http://www.fas.org/sgp/crs/row/R42497.pdf Energy Policy: Election Year Issues and Legislative Proposals, September 24, 2012: http://www.fas.org/sgp/crs/misc/R42756.pdf The Post-9/11 Veterans Educational Assistance Act of 2008 (Post-9/11 GI Bill): Primer and Issues, September 21, 2012: http://www.fas.org/sgp/crs/misc/R42755.pdf The Committee on Foreign Investment in the United States (CFIUS), updated September 26, 2012: http://www.fas.org/sgp/crs/natsec/RL33388.pdf U.S. Public Diplomacy: Legislative Proposals to Amend Prohibitions on Disseminating Materials to Domestic Audiences, September 21, 2012: http://www.fas.org/sgp/crs/secrecy/R42754.pdf Mexico: Issues for Congress, updated September 24, 2012: http://www.fas.org/sgp/crs/row/RL32724.pdf The Eurozone Crisis: Overview and Issues for Congress, updated September 26, 2012: http://www.fas.org/sgp/crs/row/R42377.pdf _______________________________________________ Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists. The Secrecy News Blog is at: http://www.fas.org/blog/secrecy/ To SUBSCRIBE to Secrecy News, go to: http://www.fas.org/sgp/news/secrecy/subscribe.html To UNSUBSCRIBE, go to http://www.fas.org/sgp/news/secrecy/unsubscribe.html OR email your request to saftergood at fas.org Secrecy News is archived at: http://www.fas.org/sgp/news/secrecy/index.html Support the FAS Project on Government Secrecy with a donation: http://www.fas.org/member/donate_today.html _______________________ Steven Aftergood Project on Government Secrecy Federation of American Scientists web: www.fas.org/sgp/index.html email: saftergood at fas.org voice: (202) 454-4691 twitter: @saftergood ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From zooko at zooko.com Thu Sep 27 08:27:22 2012 From: zooko at zooko.com (Zooko Wilcox-O'Hearn) Date: Thu, 27 Sep 2012 09:27:22 -0600 Subject: [tahoe-dev] Tahoe-LAFS Weekly Conference report, 2012-09-25 Message-ID: caveat lector 2012-09-25 -- "The Science Fair episode" in attendance: Zooko (scribe), CodesInChaos, amiller, David-Sarah, elb Topic: proof-of-storage/proof-of-retrievability CiC suggested a pass-through "Chess Grandmaster" style attack of storage server which doesn't hold the data but queries other servers to answer challenges. amiller suggested that perhaps not knowing the verify cap would prevent a storage server from doing that. CiC pointed out that if you are a malicious storage server who wants to defect, you won't do that when there are K other, non-malicious, storage servers online. You might as well wait until there are not enough non-malicious storage servers left, so that your defection can accomplish some real harm. CiC mentioned his standard merkle tree design, but didn't get much opportunity to say much about it. There was extensive discussion about the very notion of Proof-of-Storage and Proof-of-Retrievability, and how they could be applied to LAFS. I (Zooko) intend to write notes to tahoe-dev about it soon. David-Sarah had simulation results about the idea of Proof-of-Storage by adding erasure-coding redundancy to each share stored on an individual server. After CiC disconnected, amiller and davidsarah proposed standardizing a hash-dag instead of a hash-tree, with the tree being a special case of the dag. There was a bit about having a tweak to make hash collision attacks harder. Andrew Miller talked about the Bitcoin blockchain and a git repository are similar data structures. Zooko told Andrew Miller that digital signatures built out of secure hash functions normally use hash trees, but that one design, due to Bleichenbacher and Maurer, uses hash-dags instead. The full sub-graph of a LAFS filesystem which is reachable starting from an immutable dir constitutes a hash dag. Not so for mutable dirs. _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From lists at infosecurity.ch Thu Sep 27 01:54:13 2012 From: lists at infosecurity.ch (Fabio Pietrosanti (naif)) Date: Thu, 27 Sep 2012 10:54:13 +0200 Subject: [tor-talk] Tor and P2P (Hidden SMS) Message-ID: On 9/26/12 9:14 PM, Nathan Freitas wrote: > I can tell you that based on prototype code I have created, SMS and > VoIP type p2p applications between mobile devices works just fine. The > latency is not bad, especially since the apps are coded to be > asynchronous anyhow. Whether it takes 10 seconds or 1 minute for > someone to respond does not bother users. > Sure, also GlobaLeaks 0.2 is designed in a way to minimize the impact on TorHS latency and avoid "white page effect" on user's browser. > Hidden Services as a globally anonymous NAT'd networked is an amazing > opportunity for this type of application. We just need to solve the > scalability problem so we do not, as Robert put it "thrash the hidden > services directory". Totally agree, especially it's absolutely reasonable that we will see a growing number of Applications that include Tor as part of their code and use Tor Hidden Services a unique way to communicate. It would be very useful to have an official statement by Tor Project on the current scalability / performance impact of Tor Hidden Service with a Guideline to let Application Developer (bundling Tor, using TorHS) avoid breaking/hurting the Tor Network. That way the limits are clear and the way to be "Polite with the Network considering it's current limitations" would be explicit. Fabio _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From lists at infosecurity.ch Thu Sep 27 01:57:24 2012 From: lists at infosecurity.ch (Fabio Pietrosanti (naif)) Date: Thu, 27 Sep 2012 10:57:24 +0200 Subject: [tor-talk] Tor and P2P (XMPP?) Message-ID: On 9/26/12 8:48 PM, Mike Perry wrote: > > > For 1: It would seem to me that a system that ships a local torified > XMPP server would satisfy this. XMPP is fully decentralized, and > maintains persistent connections between servers. Each user would run > their own server over .onion. Something like that will be done very soon by CryptoCat Project with CryptoCat Portable Server, using the APAF (Anonymous Python Application Framework) https://github.com/kaepora/cryptocat/issues/81 . It maybe so nice to add such a link between servers to create a fully federated XMPP network on top of Tor Darknet with easy to be installed new XMPP servers. Fabio _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Sep 27 02:30:40 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 27 Sep 2012 11:30:40 +0200 Subject: [tor-talk] Tor and P2P (XMPP?) Message-ID: <20120927093040.GZ9750@leitl.org> ----- Forwarded message from "Fabio Pietrosanti (naif)" ----- From eugen at leitl.org Thu Sep 27 02:31:39 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 27 Sep 2012 11:31:39 +0200 Subject: [tor-talk] TorBirdy 0.0.12 released - testing and feedback requested! Message-ID: <20120927093139.GA9750@leitl.org> ----- Forwarded message from Jacob Appelbaum ----- From eugen at leitl.org Thu Sep 27 02:32:10 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 27 Sep 2012 11:32:10 +0200 Subject: [tor-talk] Tor and P2P (Hidden SMS) Message-ID: <20120927093210.GB9750@leitl.org> ----- Forwarded message from "Fabio Pietrosanti (naif)" ----- From eugen at leitl.org Thu Sep 27 03:21:25 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 27 Sep 2012 12:21:25 +0200 Subject: [tor-talk] Tor and P2P Message-ID: <20120927102125.GH9750@leitl.org> ----- Forwarded message from grarpamp ----- From eugen at leitl.org Thu Sep 27 03:22:06 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 27 Sep 2012 12:22:06 +0200 Subject: [tor-talk] Tor and P2P Message-ID: <20120927102206.GI9750@leitl.org> ----- Forwarded message from grarpamp ----- From eugen at leitl.org Thu Sep 27 03:28:52 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 27 Sep 2012 12:28:52 +0200 Subject: [tor-talk] Tor and P2P Message-ID: <20120927102852.GJ9750@leitl.org> ----- Forwarded message from adrelanos ----- From eugen at leitl.org Thu Sep 27 08:30:47 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 27 Sep 2012 17:30:47 +0200 Subject: [tahoe-dev] Tahoe-LAFS Weekly Conference report, 2012-09-25 Message-ID: <20120927153047.GY9750@leitl.org> ----- Forwarded message from Zooko Wilcox-O'Hearn ----- From noloader at gmail.com Thu Sep 27 14:49:33 2012 From: noloader at gmail.com (Jeffrey Walton) Date: Thu, 27 Sep 2012 17:49:33 -0400 Subject: [cryptography] Inappropriate Use of Adobe Code Signing Certificate Message-ID: http://blogs.adobe.com/asset/2012/09/inappropriate-use-of-adobe-code-signing-certificate.html We recently received two malicious utilities that appeared to be digitally signed using a valid Adobe code signing certificate. The discovery of these utilities was isolated to a single source. As soon as we verified the signatures, we immediately decommissioned the existing Adobe code signing infrastructure and initiated a forensics investigation to determine how these signatures were created. We have identified a compromised build server with access to the Adobe code signing infrastructure. We are proceeding with plans to revoke the certificate and publish updates for existing Adobe software signed using the impacted certificate. This only affects the Adobe software signed with the impacted certificate that runs on the Windows platform and three Adobe AIR applications* that run on both Windows and Macintosh. The revocation does not impact any other Adobe software for Macintosh or other platforms. Sophisticated threat actors use malicious utilities like the signed samples during highly targeted attacks for privilege escalation and lateral movement within an environment following an initial machine compromise. As a result, we believe the vast majority of users are not at risk. We have shared the samples via the Microsoft Active Protection Program (MAPP) so that security vendors can detect and block the malicious utilities. Customers should not notice anything out of the ordinary during the certificate revocation process. Details about what to expect and a utility to help determine what steps, if any, a user can take are available on the support page on Adobe.com. ... _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Sep 27 10:12:44 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 27 Sep 2012 19:12:44 +0200 Subject: Secrecy News -- 09/27/12 Message-ID: <20120927171244.GA9750@leitl.org> ----- Forwarded message from Steven Aftergood ----- From bpicarddd at mediaworks.ca Thu Sep 27 06:56:16 2012 From: bpicarddd at mediaworks.ca (=?koi8-r?B?Iu7ByczYIPPUxcbBzs/XzsEi?=) Date: Thu, 27 Sep 2012 20:56:16 +0700 Subject: =?koi8-r?B?2tfPzsvJINDPIPLP09PJySDExdvF188h?= Message-ID: <01cd9cf2$891cd800$b583aa71@bpicarddd> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1463 bytes Desc: not available URL: From alint at saxonwoods.net Thu Sep 27 06:26:04 2012 From: alint at saxonwoods.net (=?koi8-r?B?IvTBzc/WztEi?=) Date: Thu, 27 Sep 2012 22:26:04 +0900 Subject: =?koi8-r?B?9MHNz9bFzs7ZyiDLz8TFy9Mg?= Message-ID: <01cd9cff$149c6600$410661b7@alint> Таможенный союз. Таможенное регулирование и контроль Таможенного Союза. Новое во внешнеэкономической деятельности. 08 - 09 октября 2012 г., Санкт-Петербург КРАТКАЯ программа: - Правовое регулирование ВЭД в рамках Таможенного союза. - Единый список мер таможенно-тарифного и нетарифного регулирования Таможенного союза; Единый Таможенный тариф; Единый таможенный кодекс Таможенного союза. - Особенности развития Таможенного союза в 2012 году. - Информация о состоянии дел по присоединению к ВТО стран Таможенного союза. - Соглашения ВТО, правила рассмотрения споров и т.п. информация.Внешнеторговые сделки и таможенное оформление в рамках ВТО - Компетенция органов Таможенного союза и процедуры принятия решений. - Таможенные процедуры Таможенного кодекса Таможенного союза. - Защита прав и интересов участников ВЭД в условиях Таможенного союза. - Новая редакция единой Товарной номенклатуры внешнеэкономической деятельности Таможенного союза (ТН ВЭД ТС). - Таможенное регулирование и контроль Таможенного союза. - Условия поставки. Инкотермс 90/2000. Новый Инкотермс 2010. - Нетарифные меры регулирования в Таможенном союзе. - Требования к лицам, осуществляющим деятельность в области таможенного дела. РЕГИСТРИРУЙТЕСЬ: Тел.: 8 (Петербург) 6Ч2 -- 2I ^ з..2 From eugen at leitl.org Thu Sep 27 23:50:36 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 28 Sep 2012 08:50:36 +0200 Subject: [cryptography] Inappropriate Use of Adobe Code Signing Certificate Message-ID: <20120928065036.GD9750@leitl.org> ----- Forwarded message from Jeffrey Walton ----- From eugen at leitl.org Fri Sep 28 04:00:36 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 28 Sep 2012 13:00:36 +0200 Subject: [tor-talk] Tor and P2P Message-ID: <20120928110036.GM9750@leitl.org> ----- Forwarded message from grarpamp ----- From eugen at leitl.org Fri Sep 28 04:00:52 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 28 Sep 2012 13:00:52 +0200 Subject: [tor-talk] Tor and P2P Message-ID: <20120928110052.GN9750@leitl.org> ----- Forwarded message from Mike Perry ----- From eugen at leitl.org Fri Sep 28 04:31:45 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 28 Sep 2012 13:31:45 +0200 Subject: [tor-talk] Tor and P2P Message-ID: <20120928113145.GO9750@leitl.org> ----- Forwarded message from grarpamp ----- From brendonb1 at velcom.ca Fri Sep 28 07:14:39 2012 From: brendonb1 at velcom.ca (=?koi8-r?B?Iu/Tz8LFzs7P09TJINDP09TSz8XOydEgy8/NzdXOycvBw8nKINMgzQ==?= =?koi8-r?B?xdbE1c7B0s/EztnNySDP0sfBzsnawcPJ0c3JIg==?=) Date: Fri, 28 Sep 2012 19:44:39 +0530 Subject: =?koi8-r?B?RXZlbnQtzcXOxcTWzcXO1CwgUFIgySDpztTF0s7F1C3Q0s/E18nWxQ==?= =?koi8-r?B?zsnFLg==?= Message-ID: <01cd9db1$b2506d80$db90b17a@brendonb1> В отдел маркетинга Уважаемые коллеги! Приглашаем Вас на конференцию по программе: СОВРЕМЕННЫЙ ОТДЕЛ МАРКЕТИНГА. Event-менеджмент, PR и Интернет-продвижение. Дата проведения: 24 - 25 октября 2012 года Место проведения: г. Санкт - Петербург ************************************************************************************* Программа конференции: 1. Основные виды маркетинговых коммуникаций на В2В рынке. 2. Event-менеджмент, Событийный PR: как создать и провести событие, ориентированное на клиента с максимальным эффектом для компании. 3. GR - Как создать коммуникационные поля с государственными органами, организациями, дипломатическим корпусом компаниям малого и среднего бизнеса. 4. Особенности построения коммуникаций с международными организациями, партнерами, клиентами. 5. Автоматизация маркетинга В2В. 6. Специфика и трудности работы компаний B2B сферы в интернет. 7. Интернет как канал продаж на рынке В2В. 8. Сайт - международный он-лайн офис вашего предприятия. 9. Вебинар - как средство маркетинговой коммуникации на рынке В2В. 10. E-mail маркетинг. -------------------------------------- По вопросам участия и регистрации обращайтесь по телефону: (8I2) 6Ч2...О1.Ч8 С уважением, Давидовa Евгения Анатолиевна специалист информационной группы тел.: (8I2) 6Ч2..О1-Ч8 From bonnie.wolff at urs.org Fri Sep 28 11:33:00 2012 From: bonnie.wolff at urs.org (=?koi8-r?B?IuvV0tMgIuvBxMHT1NLP19nKINXexdQiIg==?=) Date: Fri, 28 Sep 2012 20:33:00 +0200 Subject: =?koi8-r?B?8NLJzcXOxc7JxSDaxc3FzNjOz8fPIMvPxMXL08Eg1yAyMDEyIMfPxA==?= =?koi8-r?B?1S4=?= Message-ID: <01cd9db8$7371e600$cf0932c2@bonnie.wolff> Исх. N 141-82 от 25 сентября 2012г. Вх. N _______________ Ведущему инженеру от _______________ Юристу Уважаемые коллеги! Приглашаем Вас на курс повышения квалификации освящающий новое в земельном законодательстве: ПРИМЕНЕНИЕ ЗЕМЕЛЬНОГО КОДЕКСА В 2012 году. Кадастровый учет и оформление прав на земельные участки. Предоставление земельных участков под застройку. Дата проведения: 22 - 23 октября 2012 года. Место проведения: г. Санкт - Петербург Программа курса повышения квалификации: 1. Категории земельных участков. 2. Оформление прав на объекты недвижимости. 3. Кадастровая деятельность по формированию земельных участков. 4. Особенности оформления прав на земельные участки различных категорий. 5. Перевод земельных участков из одной категории в другую. 6. Согласование местоположения границ земельных участков. 7. Кадастровые паспорта на жилое помещение, на нежилое помещение, на землю. 8. Оформление прав на земельные участки под существующими линейно-кабельными сооружениями и под строительство линейных объектов. 9. Предоставление земельных участков на инвестиционных условиях. ******************************************************** По окончании курса выдается удостоверение государственного образца о повышении квалификации! ------------------------------------------------------------------------------------------- За дополнительной информацией обращайтесь по телефону: (8I2) 6Ч2...95 7О C уважением, Буранова Екатерина Александровна менеджер информационного отдела тел.: (8I2) 6Ч2...95_7О From borcjcompgid at cjcomp.com Fri Sep 28 08:27:51 2012 From: borcjcompgid at cjcomp.com (=?koi8-r?B?Iu/C1d7FzsnFICLwz8THz9TP18vBIMnTyM/Ezs/KIMTPy9XNxc7UwQ==?= =?koi8-r?B?w8nJIiI=?=) Date: Fri, 28 Sep 2012 20:57:51 +0530 Subject: =?koi8-r?B?/MvT0MXS1MnawSDQ0s/Fy9TOzy3TzcXUzs/KIMTPy9XNxc7UwcPJyQ==?= Message-ID: <01cd9dbb$ec267180$a09ba27a@borcjcompgid> Обучение "Государственная экспертиза" -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 281 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: application/vnd.ms-excel Size: 32768 bytes Desc: not available URL: From barajas at facslaw.com Fri Sep 28 09:34:14 2012 From: barajas at facslaw.com (=?koi8-r?B?IvrrIPLmIg==?=) Date: Fri, 28 Sep 2012 23:34:14 +0700 Subject: =?koi8-r?B?+sXNxczYztnKIMvPxMXL0w==?= Message-ID: <01cd9dd1$c5389d80$45f7127b@barajas> Исх. N 141-82 от 25 сентября 2012г. Вх. N _______________ Ведущему инженеру от _______________ Юристу Уважаемые коллеги! Приглашаем Вас на курс повышения квалификации освящающий новое в земельном законодательстве: ПРИМЕНЕНИЕ ЗЕМЕЛЬНОГО КОДЕКСА В 2012 году. Кадастровый учет и оформление прав на земельные участки. Предоставление земельных участков под застройку. Дата проведения: 22 - 23 октября 2012 года. Место проведения: г. Санкт - Петербург Программа курса повышения квалификации: 1. Категории земельных участков. 2. Оформление прав на объекты недвижимости. 3. Кадастровая деятельность по формированию земельных участков. 4. Особенности оформления прав на земельные участки различных категорий. 5. Перевод земельных участков из одной категории в другую. 6. Согласование местоположения границ земельных участков. 7. Кадастровые паспорта на жилое помещение, на нежилое помещение, на землю. 8. Оформление прав на земельные участки под существующими линейно-кабельными сооружениями и под строительство линейных объектов. 9. Предоставление земельных участков на инвестиционных условиях. ********************************** По окончании курса выдается удостоверение государственного образца о повышении квалификации! ---------------------------------------------------------------------- За дополнительной информацией обращайтесь по телефону: (8I2) 6Ч2__95__7О C уважением, Буранова Екатерина Александровна менеджер информационного отдела тел.: (8I2) 6Ч2 95 7О From bowmandd at softinn.com Fri Sep 28 09:00:54 2012 From: bowmandd at softinn.com (=?koi8-r?B?IuvPzsbF0sXOw8nRINDPIM3B0svF1MnOx9Ui?=) Date: Sat, 29 Sep 2012 01:00:54 +0900 Subject: =?koi8-r?B?RXZlbnQtzcXOxcTWzcXO1CwgUFIgySDpztTF0s7F1C3Q0s/E18nWxQ==?= =?koi8-r?B?zsnFLg==?= Message-ID: <01cd9ddd$e04ba700$e76ec2d3@bowmandd> В отдел маркетинга Уважаемые коллеги! Приглашаем Вас на конференцию по программе: СОВРЕМЕННЫЙ ОТДЕЛ МАРКЕТИНГА. Event-менеджмент, PR и Интернет-продвижение. Дата проведения: 24 - 25 октября 2012 года Место проведения: г. Санкт - Петербург ************************************************************************************ Программа конференции: 1. Основные виды маркетинговых коммуникаций на В2В рынке. 2. Event-менеджмент, Событийный PR: как создать и провести событие, ориентированное на клиента с максимальным эффектом для компании. 3. GR - Как создать коммуникационные поля с государственными органами, организациями, дипломатическим корпусом компаниям малого и среднего бизнеса. 4. Особенности построения коммуникаций с международными организациями, партнерами, клиентами. 5. Автоматизация маркетинга В2В. 6. Специфика и трудности работы компаний B2B сферы в интернет. 7. Интернет как канал продаж на рынке В2В. 8. Сайт - международный он-лайн офис вашего предприятия. 9. Вебинар - как средство маркетинговой коммуникации на рынке В2В. 10. E-mail маркетинг. -------------------------------------------------------------------------------------------------- По вопросам участия и регистрации обращайтесь по телефону: (8I2) 6Ч2 О1 Ч8 С уважением, Давидовa Евгения Анатолиевна специалист информационной группы тел.: (8I2) 6Ч2..О1 Ч8 From 4fb5ae25 at scch.at Fri Sep 28 10:55:27 2012 From: 4fb5ae25 at scch.at (=?koi8-r?B?Iu3B0svF1MnOx8/X2cUgy8/NzdXOycvBw8nJIg==?=) Date: Sat, 29 Sep 2012 02:55:27 +0900 Subject: =?koi8-r?B?88/X0sXNxc7O2cogz9TExcwgzcHSy8XUyc7HwS4=?= Message-ID: <01cd9ded$e0ec3980$e76ec2d3@4fb5ae25> В отдел маркетинга Уважаемые коллеги! Приглашаем Вас на конференцию по программе: СОВРЕМЕННЫЙ ОТДЕЛ МАРКЕТИНГА. Event-менеджмент, PR и Интернет-продвижение. Дата проведения: 24 - 25 октября 2012 года Место проведения: г. Санкт - Петербург *************************************************************** Программа конференции: 1. Основные виды маркетинговых коммуникаций на В2В рынке. 2. Event-менеджмент, Событийный PR: как создать и провести событие, ориентированное на клиента с максимальным эффектом для компании. 3. GR - Как создать коммуникационные поля с государственными органами, организациями, дипломатическим корпусом компаниям малого и среднего бизнеса. 4. Особенности построения коммуникаций с международными организациями, партнерами, клиентами. 5. Автоматизация маркетинга В2В. 6. Специфика и трудности работы компаний B2B сферы в интернет. 7. Интернет как канал продаж на рынке В2В. 8. Сайт - международный он-лайн офис вашего предприятия. 9. Вебинар - как средство маркетинговой коммуникации на рынке В2В. 10. E-mail маркетинг. ------------------------------------------------------------------------------------------------ По вопросам участия и регистрации обращайтесь по телефону: (8I2) 6Ч2..О1...Ч8 С уважением, Давидовa Евгения Анатолиевна специалист информационной группы тел.: (8I2) 6Ч2--О1--Ч8 From brhode at simpacfinancial.com Fri Sep 28 14:24:23 2012 From: brhode at simpacfinancial.com (=?koi8-r?B?IuvPzsbF0sXOw8nRICLzz9fSxc3Fzs7ZyiDP1MTFzCDNwdLLxdTJzg==?= =?koi8-r?B?x8EiIg==?=) Date: Sat, 29 Sep 2012 04:24:23 +0700 Subject: =?koi8-r?B?RXZlbnQtzcXOxcTWzcXO1CwgUFIgySDpztTF0s7F1C3Q0s/E18nWxQ==?= =?koi8-r?B?zsnFLg==?= Message-ID: <01cd9dfa$4d6d3580$f73c1a7b@brhode> В отдел маркетинга Уважаемые коллеги! Приглашаем Вас на конференцию по программе: СОВРЕМЕННЫЙ ОТДЕЛ МАРКЕТИНГА. Event-менеджмент, PR и Интернет-продвижение. Дата проведения: 24 - 25 октября 2012 года Место проведения: г. Санкт - Петербург ********************************************************************** Программа конференции: 1. Основные виды маркетинговых коммуникаций на В2В рынке. 2. Event-менеджмент, Событийный PR: как создать и провести событие, ориентированное на клиента с максимальным эффектом для компании. 3. GR - Как создать коммуникационные поля с государственными органами, организациями, дипломатическим корпусом компаниям малого и среднего бизнеса. 4. Особенности построения коммуникаций с международными организациями, партнерами, клиентами. 5. Автоматизация маркетинга В2В. 6. Специфика и трудности работы компаний B2B сферы в интернет. 7. Интернет как канал продаж на рынке В2В. 8. Сайт - международный он-лайн офис вашего предприятия. 9. Вебинар - как средство маркетинговой коммуникации на рынке В2В. 10. E-mail маркетинг. --------------------------------------------------------------------------------------- По вопросам участия и регистрации обращайтесь по телефону: (8I2) 6Ч2--О1 Ч8 С уважением, Давидовa Евгения Анатолиевна специалист информационной группы тел.: (8I2) 6Ч2--О1 Ч8 From jacquelynlilian at jeanrem.com Sat Sep 29 08:23:28 2012 From: jacquelynlilian at jeanrem.com (Sunni Adell) Date: Sat, 29 Sep 2012 16:23:28 +0100 Subject: Male Enlargement - Get Yours Big & Strong Today euh99dn Message-ID: <50671270.287fb98d@jeanrem.com> == Male Extra Special Offer! == Perform at your best every time with the worlds best selling enhancement pill Male Extra. PLUS free gift by following this link! http://luncl.ru From case at SDF.ORG Sun Sep 30 08:24:45 2012 From: case at SDF.ORG (John Case) Date: Sun, 30 Sep 2012 15:24:45 +0000 (UTC) Subject: [liberationtech] hardware options for a computer phone, not a mobile phone... Message-ID: I'm interested in finally responding in some ways to the vulnerabilities and privacy implications of the mobile phone and its networks. For my own comms, that is. In addition to the problems with privacy and tracking, I am also worried about problems at lower layers - like rogue BTS abusing my radio to exploit the phone. We first saw real evidence of this at defcon 2-3 years ago when there was a rogue BTS attempting android exploits (see coderman posting to cypherpunks around that time). I think there are two broad strategies to pursue here. The first is the obvious one - a totally open, free software firm, from layer 1 all the way up. The major problem with this strategy is that it is a long way off from existing - osmocombb still barely has a working model of a phone that can place an actual call, and this is ONLY on a very limited chipset that is 2G only, and voice only. It appears that osmocom is moving forward in a lot of ways, but they are not graduating to other, or better chipsets (ie., to 3G, and to fast data) - and even if they were, we're years and years away. But there's another strategy that has all of the components already in existence, and that is to use a handheld computer that *happens* to contain a GSM or CDMA *module* (or both) in addition to WIFI. With this setup, you can behave as a SIP device (using WIFI as much as possible) for all calls - you never make a call, or perform any action using the phone network directly. All phone activity is tunneled through SIP/VOIP to your own server at a fixed datacenter, where you have either a hosted SIM in a pci card, or you have a POTS uplink. This is very appealing because it means that most of the time (depending on where you live) you are just using WIFI. When you are forced to failover to (for instance) GSM, you are using a very, very simple, modular modem that you can easily control (ifconfig xx0 down) and that caontains an anonymous, prepaid SIM. You don't care about the number, or the ID, or about any of the contraints of prepaid SIMs, since you just need network access. > From the outside world, all calls come from the same fixed point, no matter where you are in the world. Further, if you have colocation, you control that fixed point. Finally, while you don't have total layer 1 control over the GSM modem, you do have *some* control over it - you can ifconfig it down, you can disable it, you can *physically remove* it, and presumably you can interact with it in much more profound ways, since its a modular modem inside of a unix system you control (your handset). So the question ... what is the handset ? If a handheld linux computer (archos ? old compaq ipaq ?) wasn't designed as a mobile phone, it won't have speaker at the ear and mic at the mouth as you would expect, so that's difficult. OTOH, if you use a handheld computer that was designed as a phone, you have a problem with the tight integration of the mobile modem with the device, and you lose some control over the modem and its attack vectors (although if you are running a completely open OS, perhaps not ?) I am looking at some of the later HP Ipaq models, like the HP Ipaq 910c, which has GSM built in (it's a phone) ... honestly, I'm at a loss - I know all about modern phones like nexus, etc., which will not fit here, and I know all about modern android-based handheld devices like nook and kindle fire and so on ... but who makes a handheld, phone sized (not tablet sized) linux capable computer that I can easily insert one or more mobile modems into ? Since all we need is a linux computer, perhaps other devices, like a mp3 player (as long as it has a SD card for a modem) would work ? Comments / advice appreciated ... -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sun Sep 30 08:39:21 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 30 Sep 2012 17:39:21 +0200 Subject: [liberationtech] hardware options for a computer phone, not a mobile phone... Message-ID: <20120930153921.GZ9750@leitl.org> ----- Forwarded message from John Case -----