flickr-free-ic3d pan white
View allAll Photos Tagged Microsoft+Privacy

This is one of the nicest streets in Avignon: Rue des teinturiers, sided by a small canal bringing water to some mills.

The night I made this shot a very strong mistral was blowing (hence some blurred leaves) and the temperature inside the camera was 12°C (54°F).

To protect the privacy of the loved one (not mine) I removed the last two digits from the phone number written on the parapet.

 

Questa è una delle più belle strade di Avignone: Rue des teinturiers, affiancata da un piccolo canale che porta acqua ad alcuni mulini.

La notte che ho fatto questa foto soffiava un forte mistral (si nota dalle foglie mosse) e la temperatura all'interno della macchina era 12°C.

Per proteggere la privacy della persona amata (non mia) ho rimosso le ultime due cifre del numero di telefono scritto sul parapetto.

  

long stories shortened... (discarded and abandoned and intertwined short stories) well..actually they are chunks and fragmets and notes of stories that never made it

 

____________________________________________

  

a young PhD math candidate writing his dissertation on an obscure arab mathematician from the middle ages who specialized in cycles and periods in infinite series and develops a process to determine prime number density in a large number space. (which is all and good) except this makes it an excellent tool to decrypting military grade encryption, which is based on the computational difficulty of factoring large numbers into their prime components

 

the arab mathematician was ultimately censured by the religious mullahs for developing tools to rationalize the infinite, which is of course the nature of Allah and for man to attempt to place Allah into a human scale is blasphemy

 

so the arab mathematician disappears and the young phd candidate finds that his dissertation has been suspended pending review but cant get any information on who is reviewing it

 

finally another young mathematician approaches him and starts a long discussion on math and the nature of numbers and the mathematicians love of the underlying structure of reality that math represents. the phd candidate is leary of this mathematician cause he wont answer what he does or where he went to school or how he knows so many cutting edge fields in math

 

eventually, the young mathematician offers the phd candidate a position with the NSA, National Security Agency, (where all the big crypto and high math goes on) but explains that if he accepts that he will essentially disappear from his current world. his work will be classified, he will not be able to publish in academic journals or speak in public, or talk about his work to his friends on the outside, but the compensation is that he

would be able to work unfettered with the greatest math minds in the country, totally funded, free to explore any field or fancy he thought. after a few moments of thought, the phd accepts.

 

then the story will go back to the arab mathematician who is also approached my a young beared mullah, who offers him a position within his group of thinkers who do ponder and explore the nature of nature reality and Allah through mathematics, but that by joining them he would need to disappear from the world, after a few minutes of thought, he too accepts...

 

--

  

Daniel sipped his 6th coffee (colloidal suspension for caffeine transport) while his batch jobs on ramanet, the Indian supergrid, finished their checksum verification. His chin, a bit stubbly, itched. His eyes, a bit red, were sore. The goa trance shoutcast feed had mushed into a fast cadence drone. The flat screen monitor warped and bulged with the oscillating fan blowing on Daniel's face

 

'O' glamorous larval life of a PhD student...' he jotted and doodle-circled on his notepad.

 

Daniel cracked his neck and jutted his jaw, stretching out the accumulation of kinks, as RamaNet finished the final integrity check on his dataset. this two hour round of processing on the Indian supergrid would cost about $130 out of his precious grant fund, but you couldnt beat the bargain. 120 minutes times 150,000 PCs in the RamaNet processing collective = 1,080,000,000 seconds or 18,000,000 minutes or 300,000 hours or 12500 days or 34.25 years of processing time for the price of a video game. Calculation was commoditized now. You uploaded your pre-fromatted dataset to RamaNet. the data was packeted and sent to out to 150,000 Indians who lent a few percents of never-to-be missed CPU cycles off their systems for background processing. when their alotted package was completed it was sent back to RamaNet for re-assembly into something coherent for the buyer. in return the Indians got a rebate on their net access charges or access to premier bollywood galleries or credit towards their own processing charges. a good deal all the way around. Daniel's dataset, an anthology of complex proofs from a long-dead arab mathematician, was queued with amateur weather forecast modeling, home-brewed digital CGI for indie movies, chaos theory-based currency trading algorithms, etc. the really high end, confidential jobs, like protein folding analysis or big pharm drug trials were more likely handled by the huge western collectives of several million collaborative systems, usually high-performance machines in dedicated corporate server farms. the cost there was out of Daniel's range, but you got a faster return and better promises of encryption for your buck.

 

Daniel scratched his scalp and flexed his fingers. 'two months from today i will be a doctor of mathematics...and no job. damnit. i need to find something fast.' Daniel calculated in his mind how quickly the student loans repayments would kick in and completely wipe him out. RamaNet would have done it in nanoseconds, ha! he laughed to himself. Daniel had avoided the rounds of job interviews and recommendations that passed his way. he was too absorbed in his research to look ahead, and perhaps a bit intimidated by the idea of the job hunt flea market. flexing his CV, getting a monkey suit, trying to explain his research to recruiters, who were often the same finger-counting business majors in college that made his skin crawl. Daniel always felt a bit embarrassed when he announced he was math PhD candidate. folks would immediately glaze over,

tsk tsk out a 'that's interesting', and swiftly change the subject. something will come up, he mantra'd to himself over and over, something will come up. stick with ali, there is something real in there, just a bit deeper. the real problem was his thesis advisor. dr. fuentes was not returning his calls, his secretary was not taking appointments from Daniel. he had submitted his finished draft of his thesis two weeks ago, but hadnt heard back since, except for a cryptic email saying that the review committee was having some issues with his paper and that Daniel would be hearing from him shortly. Daniel was rerunning his calculations on RamaNet to assuage the gnawing doubt that he completely botched some component of his argument and that the review committee was debating some manner of telling him to redo the entire effort. no PhD and no job. that would ice the cake. Daniel started calculating his body mass and general aerodynamic resistance relative to the height of the school cathedral to figure out if he had time to reach a terminal velocity before impact...only a failed math PhD would attempt to determine at what speed his body would smack concrete, he morbidly thought to himself.

 

ali ja'far muhammed ibn abdullah al-farisi slipped meditatively on his cup of water, thinking about his proof. he dipped a finger in the cup and held up a droplet of water under his fingertip, watching the sunlight prisimatically splay out on the mouth of the cup. 'praise be Allah and his wonderous bounty' he mumured to himself.

 

the elders had been in conference all day over his proof. though the heavy doors to their chamber were closed, he would occasionally hear muffled but distinctly angry shouts. ali sat on a divan in the anteroom, served numerous cups of tea by an obviously nervous secretary. ali knew there was deep resistance to his research, but for the life of him he couldnt figure out why. he was a simple mathematician. he came up with some unique observations. he wanted to share them with his peers...

_____________________________________________________

  

Overview: biotech researcher discovers a new life-extension technology and is murdered. He is cryogenically frozen for 150 years. When he is

revived he must stop a dark corporate conspiracy – and find his murderer.

  

Summer 2015 - Hot genius free-lance biotech researcher unravels the key component of a radical life-extension gene therapy that will ensure 300 years of robust life to its recipients. The researcher is murdered shortly after he hides the critical component. His distraught friend has him cryogenically frozen. 150 years later, the researcher is revived by the same major bio-med corporation for which he had originally been working.

Quickly he realizes that their motives are less than altruistic: his modification of the gene therapy is needed to resolve an unforeseen debilitation now creeping up in the recipients of the life-extension process. The recipients, now nearing 125 years off added life, are decompensating into psychotics. The researcher at first tries to remember and reconstruct what he did with the hidden critical component, but stops in disgust when he learns that in the past 150 years the life-extension therapy has been reserved solely for the ultra-affluent and has created an extreme and cruel global gerontocratic elite. He voices his disgust to his corporate minders, who cease being beneficent and show their true colors as trying to gain control of this critical technology in order to control the elites.

 

In the process of dealing with the corporation, he learns about his murder and begins investigating.As he comes closer to the identity of his murderer, he uncovers a wider conspiracy and is the target of more murder attempts.

 

He was killed by a friend in 2015. The friend was the CEO of a small bio-gen firm that the researcher was doing the LET work for. The CEO, a biz-head with a genetics academic background, took the researcher’s work and exploited it as his own, in the process growing his small firm into a bio-med powerhouse and him into one of the world’s wealthiest individuals.

 

The CEO also was the first recipient of the LET and is now 190 years old, but doesn’t look a day over 45. Smart, urbane, ruthless, the CEO used his wealth and position to start the cabal of Ultras. It is a faction of the top 50 smartest and wealthiest people in the world who have ‘ascended from the world’ (faked their demise) and control the global economy with their vast coordinated wealth. Perhaps they will call themselves ‘The Ascended’. We need to decide how the cabal lives. Are they sequestered on a luxurious island compound, or do they live in the open, surgically re-sculpted after each faked death, or do they live in the open.

 

Also we need to figure out what the world will look and feel like in 150 years.

 

As the ultras decompensate into psychosis, the CEO orders the researcher to be revived in order to find a cure. The CEO had the researcher’s lab notes decrypted and figured that the he was close if not successful in finding the missing component to stabilize the LET.

 

Tiberius Syndrome: the decline into cruel psychosis experienced by the ultras, named after the roman emperor Tiberius’ degenerate behavior after he sequestered himself on Capri.

 

The ironic twist might be that there is no cure, no stabilization. The psychosis is not the result of the LET alone, but also due in part to the unfettered ego/wills of the ultras. Absolute power corrupts…

  

________________________________________________________

 

a brazilian hacking syndicate was subcontracted by a st petersberg crew to run interference on a hit on SWIFT, the global currency clearinghouse notification network. The UniFavela clan was going to run a multi-flank raid. They specialized in fast propagating virii and had created a custom mail-in virus that exploited a few microsoft vulnerabilities that they had discovered and kept mum. Their target was a Latin American PR spokesman listed on the corporate web site for press queries. The PR flak would be just the sleepy guard on the wall for their virus to slip past. 30 minutes after opening an inocuous spoofed email from a French e-trade publication requesting clarification on the SWIFT-Indentrus partnership. the virus would port scan and map its entire site LAN, salmoning its way up the router paths till it found the deep waters of the main corporate campus network in Brussels. Shortly, the internal LAN at Brussels would be suffering switch and router buffer overflows and traffic would gasp, ack, and sputter. UniFavela would then towel whip out a vanilla DDOS on the main company web site, any INTERNIC-registered addresses, and any other system in the IP block reserved for SWIFT that had previously port scanned as interesting, or ,even, as nothing. Mongols charging the village gates and tossing flaming torches on thatched roofs. IT Operations would be running to and fro, trying to figure out the internal bandwidth crunch and if there was a bleedout causing the external net problems.

 

____________________________________________________________

  

The Post-Human Story of Minos:

 

the CEO of a powerful commercial combine is bore an illegitimate son by his indiscreet wife in retaliation for his own dalliances. the son has a hideous deformity but is fantastically brilliant - brilliant enough for the father overcome his own repulsion of the child - as a bastard and a freak. the father sequesters the child in an elaborate virtual domain. the child, a hacker savant, is used to breach competitor nets. but as his power in the digital realm expands, the child transforms into the tyrant-monster. using the nets, he lashes out at people who have caused him pain, then evolves into enjoying the taste of terror and fear. He becomes the Minotaur.

 

____________________________________________________________

 

'there was a mad scramble amongst all the big spook governments, dark side corporations, and the privacy maccabees once it was determined that quantum computation had left the tidal pool of academia, grown legs and air-breathing lungs, and was headed for the nat sec intel highlands. all previous encryption models were rendered obsolete, and worse, exposed. QC became an undefiable xray spotlight, laying bare any encrypted secret with a ease of opening a mathematical candy wrapper. And for a while it swung the advantage back to the state in the digital Boer War against the freecon partisans.'

 

____________________________________________________________

  

The Oort, to the Intras, looked as one people. Extra-stellar hillbillies, ekeing out a subsistance existence on extracted organics from the frozen crud comets and other planetesimals of the Oort Cloud that slung around the solar system in a 1K AU circuit. To the Oort there was no Oort. Each station, each kampong was distinct and seperate. Seperate dialects, traditions, norms, goals. Some were scientific collectives, some were tired mining operations, some were intense sectarian cults - they shared little between themselves beyond necessary trade links for scarce commodities.

 

---

A young prince is disgraced in an internal court scandal and sent into a quasi-exile on a worthless mission. On his travels he builds the wisdom and learns the skills necessary to be a just and effective leader.

 

His exile was a gambit by his patriarch to remove Genji from the arena of pointless court intrigues and develop him as a real leader. The patriarch dispatched a team of loyal praetorians to discreetly follow and protect Genji on his odyssey.

 

Genji was sent as an emissary to the Oort system. He must pass through the Martian-Saturnine corridor, populated with industrial trading guilds and their private militias.

 

----

 

Genealogy becomes paramount in a closed culture; hierarchy by heredity. Reference the roman patrician class’ death-grip obsession with lineage, or the medieval Japanese imperial court’s strict intra-elite caste system.

 

But in an era of extreme genetic engineering, how can bloodlines retain their importance? Perhaps this is the wrong question. Perhaps in an era of extreme genetic engineering, authentic bloodlines can only retain their importance. The longevity of an unchanged gene line demonstrates success in evolutionary competition. Over time however, the fitness of a rigidly enforced and ‘sequestered’ gene line will degrade. Consider the hemophilia of the European royal strata.

 

I would not want the imperial court of the inner system to be pure blue bloods, eschewing genetic manipulation. Rather I would have them take the opposite tack – and embrace genetic engineering in the pursuit of perfecting particular socially valued or distinctive attributes; a roman nose, elongated refined fingers, even the possession of certain ‘noble’ afflictions (for ex., the aforementioned hemophilia as a sign of noble lineage).

The elites should pursue genealogy with the same passion and gusto as horse breeders; studs and mares and percentages of bloodlines, enforced and suppressed gene expressions, surrogates, and gene modes des saisons.

 

__________________________________________________________

 

a bum finds a the wallet and keys of a man who jumped from a bridge

he goes to his townhouse to find something to eat or steal

is impressed and overwhelmed with the man's townhouse

showers, eats, gets cleaned up, finds some clothes

is ready to leave when he helps a woman wrestling with groceries at her door

she thanks him, but looks stunned.

‘are you the man in #560? umm..i have lived here for 3 years and have never actually seen you. you seem to leave so early in the morning and get

home so late and keep to yourself.’

they spend 30 minutes talking, having a generally warm friendly encounter.

‘well, I am so glad to have finally met you. Hope to see you soon.’ As she closes her door, the bum turns to leave but pauses and thinks for a moment, then goes back into the man's townhouse

he pours through the man's papers and keepsakes and learns that the man has no family that he speaks with, no friends, lives off a well-endowed trust fund

 

and

 

the bum moves in and takes over the mans identity

he brings warmth and sincerity to the man's identity

 

what makes a hermit tick? what lengths do they go to to remove themselves from society? does it become a game to avoid contact, trying to become a shadow, a phantom? does society dissolve away as a mental force in their thoughts, atrophy away or does it become an amputated impression?

 

what divsion line stands between a hermit and convict in solitary? the hermit, by and large, chooses their isolation, the convict has it enforced upon them. at what point does the human need for society or socialization collapse? is there anything left that we can inspect and evaluate? a hermit, however, is able to maintain walls against the Great Other, which would imply that they are seeking refuge from the world. a schizo or an autistic will be physically surrounded by others but unable or incapable of making contact.

 

when does the will to contact die? what is left over? do humans require contact to retain our humanity? can you love and sacrifice in a vacuum?

what defines humanity? oooh, a big question...

  

___________________________________________________________________

 

genetic engineering will continue to deconstruct the human species

 

there will be catastrophic disasters: gene sequence specific viruses engineered to attack 'types' of people. Der Genkampf

petroleum will be replaced- hydrogen-powered locomotion and green power (in the wealthy states). the poor states will continue to be held hostage to oil politics

 

(cultures and civilizations do not move forward uneringly. they spasticly jerk forward and fro, in clumps andgrains, never ever as a lemming death drive.)

 

developed economies will be netized. a new state structure will be needed to manage and dsitribute resources. the corporate structure, the commercial backbone of the capitalist democracy, will replace the republic. it is flexible to markets and political forces, insistent on accountability, it provides a sufficient compromise between individual representation and republican government. they will begin their political evolution as projects in community development. assurances of an educated workforce by charter education. assurances of uninterrupted utilities by running their own power/water etc. net-based marketplaces create corporate agoras. employees are in fact de facto citizens of the corporation. citizenship, or regular employment, will be a reward for merit, stock shares will count towards suffrage.

 

great corporate collectives will arise. housing, education, security...all the needs of the middle class will be absorbed in the corporate state. the tradtional state will cede roles and responsibilities to the corporate state as their resources dwindle. a few isolated violent reactions (military or legal)by the republics against the corporate states, but they will fail over time. against, or more so, in conjunction with the homogenized corporatsists wil be the diasporae, non-corporates will glom to other modes of networked alignment, ethnic allegiance will become stronger over time - as the chinese, indian, and jewish disporaestrengthen as a formula for a successful competition against/with the corporates.

 

the american state, succored by its overwhelming techo-military supremancy, loses its mission, its vision - substitutes will to dominate for will to excel - and falls into the deep narcotic, insulated slumber of the unassailable. GE, nano, and the banknote net weaken the mythic cohesion of the american spirit. we are no longer united by common experience (mass-mediated or otherwise) the promise of science to make us stronger, smarter, near immortal is held like a manifest destiny or a divine IOU for services rendered to humanity.

 

www.photosfromonhigh.com aerial photos Albany NY aerial photos photographer Upstate albanyphotos@yahoo.com 518-495-7983

 

Globalfoundries Saratoga County NY Globalfoundries Albany NY New York Convention Center aerial photos Mercer Development aerial photographer M W ... at the Luther Forest Technology Campus in Saratoga County, NY, in ... Did GlobalFoundries just become an 800-pound Fab gorilla?

9/8/2009 by: Theo Valich - Get more from this author

   

ATIC [Advanced Technology Investment Company], technology investment group from the Government of Abu Dhabi, the majority owner of GlobalFoundries announced that the group is making a bid to acquire Chartered Semiconductor.

 

The move is not entirely unexpected, but rather a consequence of events that had nothing to do with semiconductor industry: Chartered Semiconductor is one of golden eggs in Singaporean's government investment arm [Temasek Holdings Pte], who is feeling the pain of global economy slowdown and the changes in companies owned by Temasek were obvious. As Singapore Airlines went through ownership change [now mostly owned by Temasek] the investment arm needed the cash to complete the transaction and Abu Dhabi's ATIC rode into town.

 

ATIC was interested in buying its competition, but when an opportunity like this arises, there isn't much you can do but to take it. The acquisition of Chartered Semi puts GlobalFoundries in a role of an 800-pound gorilla in the contract manufacturing space. First GlobalFoundries signed the deal to manufacture chips for a chip maker [STMicroelectronics], and now the GF owner is buying one of own largest competitors. In fact, until TSMC gets its SOI production up and running, GlobalFoundries is acquiring its second largest competitor in the SOI space [we take that ATIC does not want to buy IBM... for now].

 

In case you're unfamiliar with Chartered semiconductor manufacturing capabilities, the foundry owns six cleanrooms in a giant fab complex in Singapore, with production based on 200mm and 300mm wafers. Total output of the company is also very interesting:

 

Fab 2: 50,000 200mm WSM 600-350nm

Fab 3: 25,000 200mm WSM 350-180nm

Fab 3E: 34,000 200mm WSM in 250-180nm

Fab 5: 24,000 200mm WSM 350-180nm

Fab 6: 39,000 200mm WSM 180-110nm

Fab7: 45,000 300mm WSM 130-40nm [equal to 101,250 200mm wafers]

So, we have 172,000 WSM [wafer starts per month], or around 2,06 million 200mm wafers per year, plus an additional 540,000 300mm wafers. This manufacturing capacity is nothing short of impressive, even though the majority is in less competitive 200mm wafer space. If you would compare Chartered's Fab7 [300mm2 one] to GlobalFoundries' Fab1 complex in Dresden, you might be surprised at the differences in size, since Fab7 is massive: clean room space is as big as whole Module 2 [ex-Fab30/38] and half of Module 1 [ex-Fab36].

 

Yes, it is true that currently "only" 27,000 wafer starts can be in 40nm, but SOI capacity is quite impressive. Inside this advanced 300mm facility Chartered makes Microsoft's Xbox 360 CPUs, some AMD CPUs and some of IBM's Power chips.

 

Clean room space is also quite impressive - six facilities with a grand total of 773,640 square feet [71,871.15 m2]. If you compare that to current manufacturing facilities in Dresden, Module 1 [14,500 m2 - 156,000 sqft] and currently upgrading Module 2 [16,700 m2 - 180,000 sqft], you can see that GlobalFoundries wants to go from 336,000 sqft [31,214 m2] in 2009 to 1.38 million square feet [128,202 m2] of clean room space in 2012.

Divided by wafer size, GlobalFoundries in 2012 could look like this:

 

300mm2 - 120,000 wafer starts per month, 838,000 sqft [77,850 m2] Class 100 clean room

200mm2 - 172,000 wafer starts per month, 541,640 sqft [50,318 m2] Class 100 clean room

All in all, this is quite a significant jump in manufacturing space, as there aren't exactly many contract manufacturers who can or plan to annually output almost 1.5 million 300mm wafers in 2012-2013 frame. In fact, one could put a question that GlobalFoundries is doing this to attract the heavy weights, Microsoft, Sony, Nintendo - but Qualcomm and nVidia as well.

 

Over the past several months, we featured various articles on upcoming chips, but they all have one thing in common: they have to be built on 300mm wafers in order to be profitable. Qualcomm's quad-core ARM System-on-Chip is quite nice, but the company has to have 300mm wafers available to score a profit. Same thing with the 2010-2011 generation of nVidia's Tegra and Texas Instruments OMAP chips.

 

Thus, a foundry has to position itself aggressively and there is no doubt that this move puts GlobalFoundries on the map of TSMC and Intel challenger. While TSMC still has the overall lead in number of wafers it can produce, the numbers here show that GlobalFoundries is catching up and overtaking in 300mm wafer arena - a worrisome trend.

 

The clock isn't exactly stopping there - if we divide the wafers in SOI and non-SOI flavor, GlobalFoundries will be the largest SOI wafer maker, and with a move to optical interconnects starting in 2012-2013 there isn't exactly any doubt what's on the table. ATIC and AMD both want that GlobalFoundries change the semi playing field for good, and this acquisition only confirms that direction.

 

GlobalFoundries can freely disclose all of its plans and there isn't exactly a lot that other competitors can do but to launch massive FUD campaigns which again, would not stand due to engineering excellence shown by former AMD engineering teams, who saved Microsoft's bacon on Xbox 360 yields, for instance.

 

This move also solves one of major pains for GlobalFoundries exec team - no longer journalists and analysts need to ask "who are your customers?", because with the acquisition of Chartered Semi, that list grew by couple of dozen names, including Microsoft and IBM. You can expect that next GlobalFoundries event to feature numerous existing customers, even if they did not sign directly with GlobalFoundries, rather Chartered Semi.

 

ATIC's next move: Buying a wafer supplier?

We wonder what the next step for GlobalFoundries will be, but personally I would not bet against GF acquiring Soitec, as the largest SOI wafer vendor. Intel invested in the firm in 2007, when it became clear that the future chip interconnects [remember Intel Hybrid Silicon Laser demonstration on SOI wafers during IDF Fall 2006?] will require the use SOI wafers. AMD did not react at the time, but with over a trillion USD for investments alone, Abu Dhabi investment groups can easily flex their muscle and put everything they need under one roof.

   

© 2009 Bright Side Of News*, All rights reserved.

     

--------------------------------------------------------------------------------

 

Related articles:

Intel Lynnfield; Core i5 750 and Core i7 870 Evaluation by: Sean Kalinich

The Future of GlobalFoundries revealed by: Theo Valich

nVidia's 3D Glasses can be found for free by: Theo Valich

Qimonda's starts to dissolve, sell family jewlery [300mm and 200mm Fab] by: Thorsten Wolf

GLOBALFOUNDRIES - Is America Back in Tech? by: Toby Hudon

BSN* presents The Ultimate Workstation: Part I by: Nebojsa Novakovic

Is TSMC getting nervous about GlobalFoundries? by: Thomas Gordon

 

Tags:

ATIC, Abu Dhabi Technology Investment Company, Abu Dhabi, GlobalFoundries, GF, Chartered, Chartered Semiconductor, Temasek, Temasek Holdings Pte, Singapore, Singapore Airlines, TSMC, SOI, Silicon on Insulator, 300mm, 200mm, wafer, wsm, wspm, wafer starts per month, clean room, clean rooms, Class 1, Class 100, Fab1, Fab2, Module 1, Module 2, Dresden, Saratoga, Fab 2, Fab 3E, Fab 3, Fab 5, Fab 6, Fab 7, Microsoft, Xbox 360, IBM, Qualcomm, Freescale, nVidia, Texas Instruments, TI, Intel, Hybrid Silicon Laser, Soitec

Share and enjoy :)

 

Would you like to purchase related items?

Xbox 360

Microsoft Software Xbox 360 VGA HD AV Cable

Microsoft Xbox 360 VGA HD AV Cable B4S-00001

Microsoft Xbox 360 VGA HD AV Cable B4S-00001

Microsoft Xbox 360 VGA HD AV Cable B4S00001

Intel

Intel Core 2 Quad Q9400 2.66GHz Processor Upgrade BX80580Q9400

Intel Core2 Quad Q9400 2.66GHz 6MB L2 Cache LGA 775 95W Quad-Core Processor - Retail BX80580Q9400

Intel Core 2 Quad Q9400 Processor BX80580Q9400 - 2.66GHz 6MB Cache 1333MHz FSB Yorkfield Quad-Core Retail Socket 775 with Fan

Intel BX80580Q9400 Core 2 Quad Q9400 Central Processing Unit

    

Comments:

See all comments

Leave a comment: GlobalFoundries owner buys Chartered Semiconductor

The Business Review (Albany)

 

* Print

* Email

* Reprints

* RSS Feeds

* Add to Del.icio.us

* Digg This

*

Comments

 

Other Matching Articles for

"ATIC Globalfoundries"

 

* GlobalFoundries owner buys Chartered Semiconductor [09/08/2009]

* Steel, concrete companies win contracts at chip plant site [08/07/2009]

* Intel fined $1.45B in European antitrust suit [05/13/2009]

* AMD rejects Intel claims on violation of cross-licensing pact [03/20/2009]

* Intel says AMD breached confidentiality agreement [03/16/2009]

* > More Search Results

 

Advanced Technology Investment Co., the Abu Dhabi company that owns the majority of GlobalFoundries, plans to acquire chip maker Chartered Semiconductor Manufacturing Ltd.

 

The Singapore-based Chartered Semiconductor would become part of GlobalFoundries, a joint venture with ATIC and Advanced MicroDevices Inc. (NYSE: AMD).

 

GlobalFoundries is building a $4.2 billion manufacturing plant in Malta in Saratoga County. N.Y., about 25 miles north of Albany. It also has operations in Dresden, Germany.

 

It was unclear early Tuesday how the acquisition would affect the Malta operation.

 

ATIC would pay $3.9 billion in cash and debt for the acquisition, the companies said in a joint statement. The transaction is expected to close in late 2009, pending required government and shareholder approvals.

 

GlobalFoundries CEO Doug Grose would head up the combined operations. Chartered (Nasdaq: CHRT) CEO Chia Song Hwee would become chief operating officer and head the integration of both companies, according to the companies.

 

ATIC is a technology investment company wholly owned by the Abu Dhabi government. It owns 66 percent of GlobalFoundries; AMD owns the remaining 34 percent.

 

Singapore’s state-owned investment fund Temasek Holdings owns about 62 percent of Chartered’s shares. The chip maker produces chips for Xbox 360 games and other consoles.

 

“Chartered and GlobalFoundries will be able to draw on each other’s strengths to enable the next generation of semiconductor innovation, utilizing the value of both companies and the intellectual capital of thousands of skilled employees,” said Ibrahim Ajami, CEO of ATIC. GlobalFoundries’ plant in Malta is under construction. It’s expected to employ 1,5000 during the construction phase and 1,6000 permanent and ancillary jobs when it’s running at full capacity in 2010.

 

* Print

* Email

* LinkedIn

*

Yahoo! Buzz

 

Contact the Editor Need Assistance? More Latest News

 

Most Read Stories

 

* Nigro affiliate buys Watertown shopping plaza

* Carmine's Restaurant closes

* GlobalFoundries owner buys Chartered Semiconductor

* Saratoga couple accused in $2.5 million mortgage scheme

* Walmart shows off new interior design at Glenmont store

  

Most Emailed Stories

 

* Albany airport looks to fill Eclipse vacancy

* The Comet named a Roller Coaster Landmark

* GlobalFoundries owner buys Chartered Semiconductor

* N.Y. pursues green building guidelines

* Walmart shows off new interior design at Glenmont store

  

Reader Comments

(0) Comments

You must be logged in to add a comment. Please Login or Register.

Welcome

Add your comment here:

  

logout here

Help us stop spam!

Enter the text below into the box:

 

Can't read this?

 

bizjournals Partners

 

City Guide Spotlight - Albany

Albany

 

* Attractions in Albany

* Cocktails in Albany ATIC to buy Chartered, fold into GlobalFoundries

The move follows an earlier investment in GlobalFoundries, a joint venture with AMD

John Ribeiro (IDG News Service) 08 September, 2009 06:01:00

Tags: processors, globalfoundries, ATIC, amd

 

Advanced Technology Investment Company (ATIC) of Abu Dhabi has signed a definitive agreement to acquire chip maker Chartered Semiconductor Manufacturing of Singapore in a deal valued at S$5.6 billion (US$3.9 billion) in cash and debt, the companies said on Monday.

 

Chartered, a contract chip maker, will become part of GlobalFoundries, the chip manufacturing venture formed by ATIC and Advanced Micro Devices (AMD).

 

The CEO of GlobalFoundries, Doug Grose, will head up the combined operations, while Chartered CEO Chia Song Hwee will become chief operating officer and head the integration of the businesses, ATIC said in a statement.

 

The transaction is expected to close during the fourth quarter of this year. It will require approval by Chartered shareholders and government regulators.

 

ATIC is a technology investment company wholly owned by the government of Abu Dhabi.

 

The acquisition of Chartered will be its second major investment in the semiconductor industry after the deal with AMD.

 

GlobalFoundries has a manufacturing facility in Dresden, Germany, and another under construction in the state of New York.

 

* itdrilldown

* comments

 

*

Panel Discussion: Virtualisati ...

 

"A complete transcript of the panel discussion from the recent CIO Breakfast Briefing, Virtualis ..."

*

Sydney Uni takes virtual cours ...

 

"Following a long IT career in the financial services sector, two and half years ago Bruce Meikl ..."

*

Quick-boot laptops ready for a ...

 

"After being hampered by slow adoption, laptops with quick-boot capabilities may soon be upgrade ..."

*

Cloud Computing Special Part 1 ...

 

"Australian companies of all types are cautiously shifting applications out of the data centre a ..."

*

Cloud Computing Special Part 2 ...

 

"Beyond the hype, some companies are moving cautiously to cloud computing. Meet the experimente ..."

 

* 1

* 2

* 3

* 4

* 5

 

ATIC hopes to combine Chartered's customer relationships and capabilities in both 8-inch and 12-inch fabrication with GlobalFoundries' technology expertise, capacity, and global footprint.

 

Singapore state-owned investment fund Temasek Holdings, which owns about 62 percent of Chartered’s shares, fully supports the acquisition and has signed an irrevocable undertaking to vote in support of the transaction, the statement said.

 

Chartered also on Monday revised up its guidance for the third quarter of 2009.

 

The company increased its revenue forecast slightly and narrowed its loss forecast compared to guidance given in July, because of an incremental improvement in business.

  

Albany Nanotech Albany NY New York Aerial photos photographer SUNY University TAC Tour Andover Controls Dallas Boston Andover Massachusetts Texas Carrollton West crosby Road 75006 Scheider Electric BIOTECH EMPAC RPI TROY AMD advanced Micro Devices Malta

                   

www.photosfromonhigh.com Albany Nanotech Fuller Road Albany NY CEG Center for economic growth Tech Valley TAC Tour Andover Controls 1650 west Crosby Road Carrolton Texas Schneider electric 43-45 boulevard Franklin Roosevelt 92500 Rueil-Malmaison-France Key Bank AMD Advanced Micro devices Sunnyvale Ca. California aerial photos photographer Andover Massachusetts Ma. aerial photos Tepperman Ray associates Andover massachusetts Nanotech Clean Rooms

Albany Nanotech Albany Nanotech Albany Nanotech Albany nanotech Albany Nanotech Albany Nanotech AMD AMD AMD AMD AMD AMD Advanced Micro devices Advanced micro devices Advanced micro devices New York new york New york new York New York aerial photos architectural photos www.photosfromonhigh.com/sematech.htm The College of Nanoscale Science and Engineering of the University at Albany is the first college in the world dedicated to research, development, education, and deployment in the emerging disciplines of nanoscience, nanoengineering, nanobioscience, and nanoeconomics. CNSE's Albany NanoTech Complex – a $4.5 billion megaplex that has attracted over 250 global corporate partners – is the most advanced research complex at any university in the world.

Download the CNSE brochure 2008 Year in Review

   

GW Hatchet: Philippe Chow: Engineering a passion for music

05/11/09

 

Nanotechnology Now: UAlbany NanoCollege Hosts K-12 Students from Throughout Tech Valley for NanoCareer Day

05/10/09

 

AZoNano: NanoCollege Professor Receives Award for Excellence in Research from University at Albany

05/08/09

 

More Headlines >>

NanoNow >>

 

Subscribe to CNSE's RSS Feed

Frontiers of Characterization and Metrology for Nanoelectronics05/11/09 - 05/14/09

Spring 2009 Commencement Reception05/16/09

Olympus Technology Showcase05/20/09

More Events >>

Upcoming Seminars >>

  

UAlbany NanoCollege Hosts K-12 Students from Throughout Tech Valley for NanoCareer Day

05/07/09

 

UAlbany NanoCollege Professor Serge Oktyabrsky Receives the UAlbany Award for Excellence in Research

05/07/09

 

UAlbany NanoCollege and City School District of Albany Present Nanotechnology Explorations for Educators

04/30/09

 

More Headlines >>

   

News > Nanowerk Research and General News >

Posted: May 28, 2009

Job fair to Help M+W Zander fill 40 project management positions in new chip facility

(Nanowerk News) The College of Nanoscale Science and Engineering ("CNSE") of the University at Albany today announced plans to host a Job Fair to assist M+W Zander in building its project management team to support the construction of GlobalFoundries' computer chip manufacturing facility in Malta.

The Job Fair, to be held on Wednesday, June 10 from 5 to 8 p.m. at CNSE's Albany NanoTech Complex, will help recruit candidates for 40 high-tech design and construction management positions, including electrical and mechanical designers, engineers and estimators; construction and design project managers and coordinators; architectural project managers, planners and interns; and, accounting, purchasing, document control and administrative personnel. The positions carry salaries that range from $40,000 to more than $100,000 annually.

Officials from M+W Zander will be on hand to accept resumes and conduct initial interviews on site, with representatives of CNSE also providing assistance at the event. This marks the fifth high-tech job fair to be held at CNSE in just the past three years, with previous events in May 2006, January 2007, September 2007 and October 2008.

Candidates interested in attending and interviewing at the Job Fair are encouraged to pre-register online by visiting cnse.albany.edu/events/jobfair2009.html.

Assembly Majority Leader Ron Canestrari said, "That still another Job Fair is necessary to fill these high-tech positions is a great testament to the investments made in the rapidly growing nanotechnology sector in the Capital Region and New York State. I hope local residents will take full advantage of this opportunity to learn more about exciting careers in the nanotechnology industry."

Assemblyman John J. McEneny said, "The investments in nanotechnology are once again paying dividends in the form of exciting new high-tech career opportunities for residents of Albany and the Capital Region. It is an enormous source of pride to know that New York State is leading the worldwide nanotechnology revolution, which is creating new jobs and attracting new investments."

Rick Whitney, President and CEO of M+W Zander U.S. Operations said, "It is a pleasure to work in partnership with the UAlbany NanoCollege, the world leader in nanotechnology education, research and development, as M+W Zander builds its construction management team to support GlobalFoundries' world-class computer chip manufacturing facility at the Luther Forest Technology Campus. As a company that works on high-tech projects and facilities around the world, there is no question that the Capital Region and New York are recognized globally as the place to be for nanotechnology."

Dr. Alain E. Kaloyeros, Senior Vice President and Chief Executive Officer of CNSE, said, "With the vision, leadership and support of Speaker Silver, Assembly Majority Leader Canestrari, Assemblyman McEneny and the New York State Assembly, M+W Zander has become a valuable partner in building high-tech facilities that are critical to New York's global leadership in nanotechnology education, research and development, and economic outreach. The UAlbany NanoCollege is pleased to host this Job Fair, which will provide exciting career opportunities for local residents, and ensure that M+W Zander has a highly skilled management team in place to build GlobalFoundries' state-of-the-art computer chip manufacturing plant."

 

With headquarters in Stuttgart, Germany, M+W Zander is one of the world's foremost companies for the design and construction of high-tech buildings and cleanroom facilities for research and development, pilot manufacturing, manufacturing, and assembly and testing operations. M+W Zander's Northeastern U.S. headquarters is located at the Watervliet Arsenal, where it employs more than 250 people.

About M+W Zander

The M+W Zander Group offers its customers worldwide integrated life-cycle solutions for high-tech production plants and infrastructure complexes including all necessary service and modernization support. The customer base focuses primarily on leading electronics, photovoltaic, pharmaceutical, chemical, automobile and communication companies, as well as research institutes and universities. The company ranks among the market leaders in various market sectors which include semiconductors, photo-voltaics and pharmaceuticals. MWZ Group GmbH, Stuttgart, manages the global activities of the group as a holding company. The group has three main divisions based on Facility Solutions, Process Solutions and Product Solutions which together generated 2008 revenues of $2.32 billion with a workforce of approximately 4,500.

 

Source: CNSE

Comments

no3rdw says:

Did you take this photo? I did a photosimulation of the nanotech facility expansion based off this very same photo.

Posted 29 months ago. ( permalink )

aerialphotos21 says:

Yes I did. Who supplied the photo to you? I don't remember anyone calling me about this. Only an architect firm in Albany. Let me know. Chris

Posted 29 months ago. ( permalink )

no3rdw says:

Oops, sorry it took a while to get back to you - I just PM'd you about this :)

Posted 29 months ago. ( permalink )

aerialphotos21 says:

Thanks Chris

Posted 29 months ago. ( permalink )

aerialphotos21 says:

Too Much work to do to enter. Chris

Posted 28 months ago. ( permalink )

aerialphotos21 says:

Thanks

Posted 27 months ago. ( permalink )

Donna62 says:

  

A great image, much admired by Donna62 --,

a "FIRST - THE EARTH!" member - www.flickr.com/groups/first-the-earth/

Posted 24 months ago. ( permalink )

 

Add your comment

 

How do I format my comment?

Invite this photo to...

 

Loading groups

 

Invite this photo to...

   

OR

Share This Share this photo

 

Enter email addresses or a contact's screen name:

  

Add a message?

 

Message:

   

Grab the link

Here's a link to this photo. Just copy and paste!

   

Blog it

     

Guest Passes let you share your photos that aren't public. Anyone can see your public photos anytime, whether they're a Flickr member or not. But! If you want to share photos marked as friends, family or private, use a Guest Pass. If you're sharing photos from a set, you can create a Guest Pass that includes any of your photos marked as friends, family, or private. If you're sharing your entire photostream, you can create a Guest Pass that includes photos marked as friends or family (but not your private photos). Learn more about Guest Passes![?]

Uploaded on September 25, 2006

by aerialphotos21

aerialphotos21's photostream

85

uploads

   

This photo also belongs to:

 

Nanotechnology (Pool)

0

   

Adirondack, Upstate NY (Pool)

0

   

***Volunteers in Earthcare ACTIONS! ~ FIRST-THE EARTH - En1:Awd2 (Pool)

0

   

Tags

www.photosfromonhigh.com

TAC

Tour

Andover

Controls

Albany

Nanotech

Tepperman

Ray

Associates

6

windsor

street

Massachusetts

Dallas

Texas

Boston

MA.

aerial

photos

Training

EMPAC

RPI

SUNY

New

York

photographer

americas

asia

pacific

Denmark

Finland

Germany

Norway

Poland

Russia

Sweden

UK

United

Kingdom

England

Solutions

energy

industry

brands

corporate

1650

West

Crosby

Road

Carrollton

75006

Headquarters

photo

Chris

Milian

FIRST - THE EARTH!

v227-f1-My16-07

INTERFACE - ART & PROMOTION

globalfoundries [x]

chip [x]

plant [x]

malta [x]

ny [x]

The College of Nanoscale Science and Engineering of the University at Albany is the first college in the world dedicated to research

development

education

and deployment in the emerging disciplines of nanoscience

nanoengineering

nanobioscience

and nanoeconomics. CNSE's Albany NanoTech Complex – a $4.5 billion megaplex that has attracted over 250 global corporate partners – is the most advanced research complex at any university in the world. Show machine tags (0)

Hide machine tags (0)

Add a tag

 

Choose from your tags

 

Separate each tag with a space: cameraphone urban moblog. Or to join 2 words together in one tag, use double quotes: "daily commute".

Additional Information

All rights reserved

Anyone can see this photo

  

Taken on September 25, 2006

2 people call this photo a favorite

Viewed 4,342 times

Flag this photo

Flag this photo Cancel

Please review this photo's safety level

 

This is a photo

This is a screenshot

This is art/illustration

 

Need help?

 

Add to your map Yay location removed

 

...

   

(Some formats are OK.)

Anyone will be able to see this on the map (edit)

Or, remove it from the map.

  

Or, remove it from the map.

Finding location...

Finding location...

 

(Some formats are OK.)

Or, cancel.

Are you sure you want to remove this from the map?

 

Removing location...

Saving location...

Or, search again.

 

(Some formats are OK.)

Or, cancel. Do any of these fit? Or, search again.

 

(Some formats are OK.)

Or, cancel.

Are you sure you want to remove this photo's geo information?

  

Who can see this on the map.

Only You

Your Friends and/or Family

Your Family

Your Friends

Your Contacts

Anyone (Recommended)

  

Or, cancel.

 

(Just so you know, it'll take a few minutes to make those updates. But you can carry on as normal while we do the work in the background.) Go to the map Map data CCBYSA 2009 OpenStreetMap.org contributors

 

Activity Around You | In Your Groups | From your friends

You Your Photostream | Organize | Upload | Your Account | Do More, Order Prints

Explore Places | Last 7 Days | This Month | Popular Tags | The Commons | Creative Commons | Search

Help Community Guidelines | The Help Forum | FAQ | Tools | Sitemap | Get Help

Send to a friend

Bookmark on Delicious from Flickr Blog | About Flickr | Terms of Service | Your Privacy | Copyright/IP Policy | Report Abuse

 

| Deutsch | English | Español | Français | | Italiano | Português

Copyright © 2009 Yahoo! Inc. All rights reserved.

  

President Barack Obama Visits Luther Forest Technology Campus Malta Saratoga County New york GlobalFoundries Breaks Ground in Malta

GlobalFoundries held a groundbreaking ceremony for Fab 2 in Malta, N.Y. The foundry's goal is to have the first tool move in by October 2011, with qualification coming in early 2012 and commercial production by the second half of 2012. The event marks "a significant shift in momentum" for chip manufacturing in the United States, said Norm Armour, Fab 2 general manager.

David Lammers, News Editor -- Semiconductor International, 7/24/2009

As an Albany, N.Y., taxi driver ferried a visitor to the GlobalFoundries Fab 2 groundbreaking ceremony near the village of Malta, he said, "For three years they've been talking about this, but I never thought they would actually build it."

 

Planning began in June 2006, and it was this year on June 19 that GlobalFoundries began clearing portions of its 230-acre site, located ~24 miles from Albany and seven miles from Saratoga Springs. Fab 2 is expected to be making volume silicon by the second half of 2012, employing 1400 directly and an estimated 5000 indirect workers. The spinoff of Advanced Micro Devices (AMD, Sunnyvale, Calif.) has room for two additional modules at the site.

 

Fab 2 General Manager Norm Armour said he watched manufacturing shift from the United States to Asian foundries during his career at LSI Logic Corp., where he spent a decade managing LSI's fab in Gresham, Ore. "We are on the other side, trying to bring manufacturing back to a U.S. fab," Armour said. "It is a significant momentum shift."

 

That shift was supported by a $6B investment in GlobalFoundries by the Abu Dhabi Investment Co. (ATIC). The money will be spent to build Fab 2 at Malta, expected to cost $4.2B, as well as to expand and upgrade the GlobalFoundries Module 2 in Dresden, Germany. The state of New York is providing an estimated $1.2B in subsidies for Fab 2, and is investing additional funding to expand the University at Albany's nearby College of Nanoscale Science and Engineering (CNSE). AMD contributed its existing manufacturing complex in Dresden as well as other assets, but no cash, providing AMD with access to a new fab without capital outlays.

   

GlobalFoundries Fab 2 will begin production in the second half of 2012.

  

Because the site is not space-constrained, Fab 2 will be a two-level building rather than three-level, said Tom Sonderman, vice president of manufacturing systems technology at GlobalFoundries. All of the wafer production will be on one floor, eliminating the need to move wafers-in-progress (WIP) up and down floors. A "zero footprint storage" approach will put some wafer stockers above the tools, he added. Implant will be located off of the main waffle slab, reducing construction costs, and maintenance shops will be on the upper production floor to further improve efficiencies.

 

Though its labor costs in both Dresden and Malta will be higher than at many Asian fabs, manufacturing innovations will make GlobalFoundries cost-competitive with Taiwan Semiconductor Manufacturing Co. Ltd. (TSMC, Hsinchu, Taiwan), according to Sonderman. GlobalFoundries is investing in the midst of a severe downturn, which also will reduce costs compared with the more expensive 24/7 construction schedules used when fabs are built in a hurry. Armour said it may take 18 months to build Fab 2, which is expected to have a 220,000 sq. ft. cleanroom with an option to expand cleanroom space to 300,000 sq. ft. The goal is to have the first tool move in by October 2011, with qualification coming in early 2012 and commercial production by the second half of 2012, a schedule that could be accelerated somewhat "depending on market conditions," Armour said.

 

Sonderman said construction begins at a time "of a lot of pent-up demand for advanced foundry capacity." Fab 2 will start at 28 nm technology, and then bring up a 22 nm SOI process for CPU production. GlobalFoundries will support AMD's manufacturing needs with the current 45 nm production, moving to 32 and 22 nm production. For foundry customers, however, most of the interest is at the half nodes, including 40 nm bulk technology immediately at Dresden and 28 nm high-k/metal gate technology late next year when 28 nm customer designs start to be accepted.

 

Sonderman said GlobalFoundries is accelerating its effort to support 40 nm bulk production, which he said comes as customers express concerns about yields at TSMC. "We definitely want to be a counterbalance to TSMC," Sonderman said, outlining plans to offer, by 2013, 600,000 wspy at Dresden and 400,000 wspy at Fab 2.

Posted in General, GlobalFoundries, Real estate, Tech Valley, Technology | 2 Comments

RPI spokesman joining GlobalFoundriesApril 2, 2009 at 10:25 am by Larry Rulison

Jason Gorss, the manager of media relations at Rensselaer Polytechnic Institute in Troy, will be joining GlobalFoundries later this month in a communications role.

 

Gorss (right) has been at RPI for several years now. He has a technical and scientific background that helps with his new role with the company, which is building a $4.2 billion computer chip factory in Malta called Fab 2 and owns two others in Dresden, Germany.

 

GlobalFoundries spokesman Jon Carvill said that Gorss’ role will be “more global in nature and focused on our technology.

 

“We will still look to add additional resources specific to Fab 2 in 2009,” Carvill said.

 

The company already has an office in Malta at the Saratoga Technology + Energy Park, which sits within the Luther Forest Technoogy Campus where GlobalFoundries is planning its factory on 222 acres. At least one former General Electric employee is now working there in a human resources position, and additional positions are expected to be filled in the coming months.

 

The new CEO of GlobalFoundries, Doug Grose, is himself an RPI graduate.

 

The Times Union contacted Gorss this morning by e-mail and he confirmed he is taking the job.

 

“My experience at Rensselaer has given me the rare chance to work with incredibly brilliant people on a wide array of fascinating projects. I am going to miss my colleagues here, but I am excited about the new opportunity with GlobalFoundries,” Gorss said. “It is a perfect fit for someone with my background and interests. I am a technophile at heart, and this job will allow me to immerse myself in some of the most advanced technology on the planet.”05/15/2009 10:10 AM EDT)

  

MALTA, N.Y. — It's rare these days in the semiconductor industry to witness the unfolding of a project on a grand scale. Based on what has been proposed so far, the Global Foundries project backed by Advanced Micro Devices and its partner is precisely that.

 

"We want to be the first truly global semiconductor foundry," said Global Foundries CEO Global Doug Grose at a recent event here, where a ground-breaking ceremony will be held in July.

 

Global Foundries has committed up to $6 billion to develop a new fab to produce chips for AMD and new customers. AMD and partner, Abu Dhabi-backed Advanced Technology Investment Co. (ATIC). "This money is for a five- to seven-year stretch. Our investors [are] in this for the long haul," said Grose.

 

According to Jim McGregor, chief technology strategist at market researcher In-Stat, "Everything for the future depends on GlobalFoundries' ability to land new customers. Unfortunately, I can't predict that."

 

Jim Doran, senior vice president and general manager of AMD's Dresden, Germany, operation, said Global Foundries will use a Sunnyvale, Calif., facility for technology development and producing process design kits. The U.S. site also will be used for designing intellectual property and chip testing and validation.

 

Global Foundries also is engaged with neighbors here like the IBM Alliance on submicron research and development.

 

Global Foundries' 300-mm Fab 1 in Dresden includes a Module 1 used for 45-nm silicon-on-insulator (SOI) chips; Module 2 is used for 32-nm and beyond bulk CMOS process technology. Both modules are expected to operate at 25,000 monthly wafer starts at full capacity. Module 2 production will ramp up in late 2009.

  

The $4.5 billion Fab 2, a 300-mm manufacturing facility in Saratoga County, N.Y., is expected to come online in 2012 with 35,000 wafer starts per month at full capacity. Fab 2 is expected to create more than 1,400 jobs along with about 5,000 spin-off jobs.

    

Page 2: Global Foundries' big bet takes shape in upstate New York

  

Page 1 2

    

Please login or register here to post a comment or to get an email when other comments are made on this article

 

Global Foundries breaks ground on long-awaited NY fab.

 

The new 300-mm manufacturing facility is expected to bring 1,400 direct semiconductor manufacturing jobs and billions of dollars in economic development to upstate New York.

 

By Suzanne Deffree, Managing Editor, News -- Electronic News, 7/24/2009

Global Foundries today announced it officially broke ground on the construction of Fab 2, a new semiconductor manufacturing facility located at the Luther Forest Technology Campus in Saratoga County, NY.

 

The construction and ramp-up phases for the new $4.2 billion facility are expected to take approximately three years to complete, with volume production expected in 2012. According to the company, once Fab 2 is completed it will stand as the "most technologically advanced semiconductor manufacturing facility in the world" and the "largest leading-edge semiconductor foundry in the United States."

 

“As today’s chip designers push the boundaries on the next generation of products, there is a growing need for a new approach to design and manufacturing rooted in collaboration and innovation," Hector Ruiz, chairman of Global Foundries, said in a statement. "With Fab 2, Global Foundries moves the semiconductor industry away from the traditional model of isolated regional development and into an era of global hubs of manufacturing and technology expertise.”

 

The new facility is designed to manufacture microprocessors and logic products on 300-mm wafers, Global Foundries said, noting that initial production is expected to ramp at the 28-nm technology node and move to volume manufacturing on the 22-nm node. Fab 2 will work in conjunction with Global Foundries’ Fab 1 facility in Dresden, Germany.

   

Today's ground breaking was long awaited. Indeed, talk of the NY fab began in 2006, years before AMD spun out its manufacturing operations to form Global Foundries in October 2008. AMD saw significant support from the state during its decision and commitment process, including $1.2 billion in incentives. That largest private-public investment in the history of the state included grants, tax credits, and other New York City Empire Zone benefits. In accord with the investment, New York gave AMD a two-year window, from July 2007 to July 2009, to initiate the building of a new 300-mm wafer fabrication facility in Saratoga County, NY.

 

New York's significant support was not unwarranted. New York estimated that the plant will create approximately 1,400 new, direct semiconductor manufacturing jobs at full-scale production, providing an estimated annual payroll of more than $88 million to the upstate region. In addition, the project will create approximately 5,000 new, indirect jobs in the region, offering a sustained estimated total annual payroll of $290 million for all jobs, according to New York's estimates.

 

The state's universities also have several high-tech efforts in play that include AMD and its partners. Most recently, Intel, IBM, and Sematech backed an R&D joint venture with the University at Albany’s College of Nanoscale Science and Engineering center that is expected to add 475 jobs to New York.

 

“New York has worked with Global Foundries for three years to bring this [fab] project to fruition and I am pleased to say that with the groundbreaking of Fab 2, New York and Global Foundries take a lead role in delivering the type of economic growth needed to carry our nation toward sustainable growth,” said Governor David Paterson of New York in the Global Foundries statement. “This initiative not only provides our residents with a source for new jobs, but is integral in positioning New York as a future hub of innovation and an attractive destination for additional investment.”

 

AMD also showed its support at the ground breaking today. "This is an important opportunity to create thousands of jobs and strengthen US competiveness in the high-tech industry," said Dirk Meyer, president and CEO of AMD, in a company statement. “The multi-billion dollar investments in research and development and capacity expansion that Global Foundries is planning strengthen its position as a premier leading-edge semiconductor manufacturing foundry and make it the ideal AMD technology partner to help in bringing our innovative products to market.”

 

Link: www.edn.com/article/CA6672910.html

      

Location and plans:

m + w zander U.S. Operations, Inc. is designing and building the most advanced semiconductor manufacturing complex in the world for GLOBALFOUNDRIES. The Fab 2, Module 1 facility is to be located at the Luther Forest Technology Campus in the Towns of Malta and Stillwater, Saratoga County, New York. The realization of this project will be the crowning achievement in the continued development of New York's Tech Valley as a pre-eminent location for technological breakthroughs not only in the field of semiconductors but in nanotechnology, bio-technology, pharmaceuticals and alternative energy as well.

 

m + w zander is proud to be a leader in this effort and shares this website in order to provide information and the excitement of constructing this most important project with the local and world-wide communities.

 

link: fab2construction.com/

           

--------------------------------------------------------------------------------

Last edited by Buyckske Ruben; December 6th, 2009 at 03:22 PM.

  

Buyckske Ruben

View Public Profile

Find More Posts by Buyckske Ruben

 

December 6th, 2009, 03:27 PM #2

Buyckske Ruben

Registered User

  

Join Date: Aug 2007

Posts: 1,539 slideshow of construction site:

 

www.flickr.com/photos/aerial-...th/3460543532/

  

Global Foundries' Fab 2: (part 1)

  

all the 3 parts:

    

Link: www.anandtech.com/printarticle.aspx?i=3614

  

Buyckske Ruben

View Public Profile

Find More Posts by Buyckske Ruben

 

December 13th, 2009, 01:52 PM #3

Buyckske Ruben

Registered User

  

Join Date: Aug 2007

Posts: 1,539 updates

 

--------------------------------------------------------------------------------

 

Hector Ruiz, the chairman of GlobalFoundries said that the new chip plant is “by far the most significant high-tech investment made in this country in decades.” This plant will produce the most advanced computer chips in the world when it is completed.

      

Having been the construction project manager for AMD’s original Dresden-based fabrication facilities, Globalfoundries has awarded M+W Zander the full turnkey construction contract for Fab 2, currently being built at the Luther Forest Technology Campus in Saratoga County, New York. A departure from pervious fab projects, M+W Zander is also responsible for the architectural aspects of the 4 building project. Previously, AMA Group, based in Italy had been the architectural firm responsible for this aspect of the work. The turnkey project is worth approximately €550 million to M+W Zander over the two-year construction schedule.

 

The Fab 2 complex is more than 130,000 square meters (1.45 million square feet), including a 28,000 square meters (300,000 square feet) Class 100 clean room. A ‘spine’ support building is also being built, along with administrative office building and a central utility building (CUB) along with service yards and small support buildings.

 

M+W Zander will also handle general contracting for all of the technical areas to include the manufacturing spaces, building utilities, central utility building and process systems.

LINK: www.fabtech.org/news/_a/mw_za...undries_fab_2/

   

OKT 2009:

          

Buyckske Ruben

View Public Profile

Find More Posts by Buyckske Ruben

 

December 13th, 2009, 02:04 PM #4

Buyckske Ruben

Registered User

  

Join Date: Aug 2007

Posts: 1,539 Overvieuw project:

         

Impressions inside the fab:

    

Link: blogs.thenational.ae/beep_bee...abu-dhabi.html

        

Buyckske Ruben

View Public Profile

Find More Posts by Buyckske Ruben

 

December 13th, 2009, 02:10 PM #5

Buyckske Ruben

Registered User

  

Join Date: Aug 2007

Posts: 1,539 YOUTUBE FILM about the concurrent Intel.

 

--------------------------------------------------------------------------------

 

Fab 32 - Intel's first high-volume 45nm chip factory:

 

www.youtube.com/watch?v=4FLBtQC0F0c

 

Very impressive!

  

Buyckske Ruben

View Public Profile

Find More Posts by Buyckske Ruben

       

« Previous Thread | Next Thread »

  

Thread Tools

Show Printable Version

Email this Page

 

Display Modes

Linear Mode

Switch to Hybrid Mode

Switch to Threaded Mode

 

Posting Rules

You may not post new threads

You may not post replies

You may not post attachments

You may not edit your posts

 

--------------------------------------------------------------------------------

 

BB code is On

Smilies are On

[IMG] code is On

HTML code is Off

 

--------------------------------------------------------------------------------

 

Forum Rules

     

All times are GMT +2. The time now is 10:27 PM.

  

-- English (US) -- Español 3.6.5 Contact Us - SkyscraperCity - Archive - Top

  

Powered by vBulletin® Version 3.8.3

Copyright ©2000 - 2009, Jelsoft Enterprises Ltd.

 

SkyscraperCity - In Urbanity We Trust

 

Hosted by Blacksun, dedicated to this site too!

Linux server management by DaiTengu

  

All timesunion.com blogs | City Brights | Capitol Confidential | Crime Confidential | On the Edge | Table Hopping | The Advocate | Read & React The Buzz: Business news

Covering commerce in the Capital Region

Business section

Category: GlobalFoundries

Customer-centricMay 3, 2009 at 6:00 am by Larry Rulison

 

Talking about customers, GlobalFoundries is making sure that it treats the customers that it does get the right way.

 

The 1.3 million-square-foot factory it will build in Saratoga County features a special entrance for customers, separate from the visitor entrance. Inside, customers will find a nearly half-acre of space devoted to designing chips for them. GlobalFoundries expects its customer base to grow beyond AMD to include graphics chips companies and those that produce chips used in handheld electronics.

  

Posted in GlobalFoundries | 1 Comment

GlobalFoundries site clearing should be soonApril 30, 2009 at 4:05 pm by Larry Rulison

Although the closing on the sale of 222 acres in Malta at the Luther Forest Technology Campus has been in the final stages now for the last couple of weeks, officials with GlobalFoundries Inc. said again today the deal could be done any day now.

 

The deal will also set in motion a number of events, including the awarding of the first contract to clear the site for a $4.2 billion computer chip factory.

 

In fact, right around the time the sale occurs, GlobalFoundries will send its official commitment letter to the state of New York, making it eligible for $650 million in cash incentives for chip fab construction and research and development activities.

 

Around the same time, GlobalFoundries will make the announcement that it has hired a general contractor. Although not official yet, it’s largely expected that M+W Zander, which built Albany NanoTech, will be given the nod. (more…)

 

Posted in Economic development, GlobalFoundries, Tech Valley, Technology | Add a comment

No Malta meeting for GlobalFoundriesApril 28, 2009 at 10:37 am by Larry Rulison

There will be no Malta Planning Board meeting tonight for GlobalFoundries, the company building a $4.2 billion computer chip factory in the town.

 

The town planning board had posted an agenda for the meeting on the town’s Web site, but Town Planning Director Anthony Tozzi said today that the planning board has decided it doesn’t need to meet. It was scheduled to review temporary construction plans for the project.

 

GlobalFoundries is still wrapping up the purchase of 222 acres of land at Luther Forest, and closing is expected later this week or early next week. The planning board doesn’t need to make any approvals until after the closing of that deal, which is why the board decided not to meet.

 

The Malta Planning Board usually meets the third Tuesday of every month, but it has set aside the second and fourth Tuesday of every month for the GlobalFoundries project if needed.

 

Posted in General, GlobalFoundries, Government | Add a comment

AMD posts loss of $416 millionApril 21, 2009 at 4:55 pm by Larry Rulison

Advanced Micro Devices Inc., the only customer of GlobalFoundries Inc., the company building a $4.2 billion computer chip factory in Malta, posted a $416 million loss in the first quarter.

 

Sales totaled $1.177 billion.

 

AMD spun off GlobalFoundries earlier this year and included the results of GlobalFoundries in its consolidated results released today.

 

Those results say GlobalFoundries had sales of $283 million and an operating loss of $141 million.

 

The results also show AMD spent $44 million on the formation of GlobalFoundries during the past two quarters.

 

GlobalFoundries is expected to acquire 222 acres at the Luther Forest Technology Campus any day now and start construction of the chip fab this summer. The plant is expected to start full-scale manufacturing by 2012.

 

Posted in Advanced Micro Devices Inc., General, GlobalFoundries | Add a comment

Malta holding meeting on Luther ForestApril 20, 2009 at 11:48 am by Larry Rulison

The Malta Town Board will hold a workshop and special meeting tonight to make some minor changes to an agreement it has with the Luther Forest Technology Campus.

  

Aerial shows road construction at the Luther Forest site. (Times Union archive)

The meeting comes as it appears that the sale of 222 acres at Luther Forest to GlobalFoundries Inc. for a $4.2 billion computer chip factory could come any day now.

 

It’s unclear if the changes to the agreement with the town, technically a declaration of covenants, conditions and restrictions, are needed so the sale can take place.

 

Malta Supervisor Paul Sausville said this morning that he thought the sale might take place today and he didn’t think the changes – considered minor — had to occur for the sale to go through.

 

Sausville said the document deals with things such as who is responsible for interior roads, sidewalks and lights at the tech park.

 

He said Luther Forest and the town reached an agreement last week, but the town of Stillwater made some minor changes to its version on Thursday, and the two documents have to be identical. The park straddles both towns, although most of the land is located in Malta.

 

GlobalFoundries spokesman Travis Bullard said the Malta meeting is being held just to make minor revisions. He has said the land deal is imminent.

 

Posted in GlobalFoundries, Government | Add a comment

Luther Forest looking for consultantsApril 16, 2009 at 2:47 pm by Larry Rulison

The nonprofit group developing the Luther Forest Technology Campus in Malta is looking for real estate and construction consultants to provide their expertise as it develops the 1,414-acre business park.

 

Computer chip manufacturer GlobalFoudries Inc. is expected to be the first tenant, taking 222 acres. A deal by the Sunnyvale, Calif.-based firm to acquire the land is due any day now.

 

The Luther Forest Technology Campus Economic Development Corp. issued a request for proposals today for consultants it can use on an as-needed basis.

 

The RFPs are due back April 30. The review process will begin in early May, with selection to take place within a few weeks after that.

 

To see the RFP, click here.

 

Posted in General, GlobalFoundries, Real estate, Tech Valley, Technology | 2 Comments

RPI spokesman joining GlobalFoundriesApril 2, 2009 at 10:25 am by Larry Rulison

Jason Gorss, the manager of media relations at Rensselaer Polytechnic Institute in Troy, will be joining GlobalFoundries later this month in a communications role.

 

Gorss (right) has been at RPI for several years now. He has a technical and scientific background that helps with his new role with the company, which is building a $4.2 billion computer chip factory in Malta called Fab 2 and owns two others in Dresden, Germany.

 

GlobalFoundries spokesman Jon Carvill said that Gorss’ role will be “more global in nature and focused on our technology.

 

“We will still look to add additional resources specific to Fab 2 in 2009,” Carvill said.

 

The company already has an office in Malta at the Saratoga Technology + Energy Park, which sits within the Luther Forest Technoogy Campus where GlobalFoundries is planning its factory on 222 acres. At least one former General Electric employee is now working there in a human resources position, and additional positions are expected to be filled in the coming months.

 

The new CEO of GlobalFoundries, Doug Grose, is himself an RPI graduate.

 

The Times Union contacted Gorss this morning by e-mail and he confirmed he is taking the job.

 

“My experience at Rensselaer has given me the rare chance to work with incredibly brilliant people on a wide array of fascinating projects. I am going to miss my colleagues here, but I am excited about the new opportunity with GlobalFoundries,” Gorss said. “It is a perfect fit for someone with my background and interests. I am a technophile at heart, and this job will allow me to immerse myself in some of the most advanced technology on the planet.”

 

Click here to access job opportunities with GlobalFoundries.

 

Posted in Education, GlobalFoundries | 1 Comment

New Fab2 renderings releasedMarch 24, 2009 at 7:41 pm by Larry Rulison

GlobalFoundries Inc. is going to show these new renderings (below) of Fab2 to the Malta Planning Board tonight.

 

GlobalFoundries is planning a $4.2 billion computer-chip factory in the Luther Forest Technology Campus, which sits on land in both Malta and the town of Stillwater.

 

The company is seeking a temporary construction permit tonight after getting approval to start moving soil and trees. That work could begin early next month.

         

Posted in Advanced Micro Devices Inc., GlobalFoundries | Add a comment

Page 5 of 6« First...« Previous23456Next »

Cam'ron - On New Clipse Album

Cam'ron is feat. on Clipse's new album out now. Check it out here.

amazon.com/music

Ron and Susan's Condo In Hawaii

Oceanfront oceanview Hawaii condo. Oceanfront saltwater and freshwater pool. Central air and elevator.

www.ronandsusans.com

overture center ticket office

Just Buy Overture Center Tickets Madison Wisconsin Overture Center Wi

Overture.JustBuyTickets.com

 

Ads by Yahoo!

Posts | Comments Log in

  

Capital Region Job Openings

Membership, Marketing, Outreach Co-ordinator - Troy Community Food Cooperative - Troy, NY

Accounting Assistant - MG Careers - Albany, NY - Schenectady, NY

Paralegal/Legal Assistant - Wilhelm Law Firm, PLLC - Albany, NY

Senior Administrative Assistant - ALBANY COUNTY COOPERATIVE EXTENSION - Albany, NY

Office Manager - NES Inc. - Albany, NY

Pharmacy Customer Service Rep - Hometown Healthcare, Inc. - Watervliet, NY

Club House Coordinator - The Mohawk Golf Club - Schenectady, NY

More Times Union job listingsRecent Comments

Is HDTV helping WRGB? (3)

Kevin: Despite having several HDTV sets in the house, watching WRGB’s news is as painful as watching the...

Jeff: Where did Carrie Proctor go? I liked watching her on RGB.

RP: When we watch the local news, we switch to WRGB only because they broadcast in HD. Other than that, they are no...

Military tanker practicing landings, takeoffs at ALB (10)

Freddie: @9 I believe there is also a base at ALB—Wolf at Wade Here’s a look from a KC-10 fueling a C-17...

Barry Soetoro: Curious as to why they would use ALB when Schenectady is a National Guard base.

L.E.Roy: The “buzzing” you hear is the sound of freedom. Rejoice and be glad in it!

WNYT no longer leader of the pack (90)

One Year Justice: It was almost one year ago that myself and 16 others (including Lydia)were fired….oh I mean...

Categories

Advanced Micro Devices Inc. Advertising Agriculture Airlines Albany International Airport Amtrak Architecture Auto Banking Biotech CDTA Chambers of commerce Chip fab Commercial real estate Construction Cost of Living Credit unions Defense Economic development Economy Education Energy Engineering Entertainment Environment Farming Food Fuel cells General General Electric Co. GlobalFoundries Government Health care Health insurers Higher education Hospitality industry Hospitals Industry Insurers Investment banking Jobs Labor Law firms Layoffs Manufacturing Marketing Media Medical instruments Nanotechnology Newspapers Nonprofits Nursing homes On the Move Arts Financial Healthcare Professions Retail Services Technology Telecom PCBs Personal finance Pharmaceuticals Port of Albany Public companies public relations Rail Real estate Residential real estate Restaurants Retail Sematech Small business Software Solar energy Supermarkets Tech Valley Technology Telecommunications Tourism Trade Transportation Unions Utilities Venture capital WAMC Watervliet Arsenal Wind power Business news staff:

Eric Anderson

Business editor: Biotech, Transportation, Retail, Albany International Airport, Port of Albany

Larry Rulison

Business writer: High tech, energy/utilities, manufacturing, bankruptcy court

Chris Churchill

Business writer: Real estate, construction, financial institutions, labor, small business, the stock market.

Archives

[-] 2009 (1706)

December 2009 (68)

November 2009 (80)

October 2009 (89)

September 2009 (117)

August 2009 (91)

July 2009 (123)

June 2009 (176)

May 2009 (174)

April 2009 (230)

March 2009 (186)

February 2009 (176)

January 2009 (196)

[+] 2008 (2314)

December 2008 (184)

November 2008 (177)

October 2008 (176)

September 2008 (197)

August 2008 (171)

July 2008 (197)

June 2008 (225)

May 2008 (213)

April 2008 (209)

March 2008 (199)

February 2008 (171)

January 2008 (195)

[+] 2007 (2006)

December 2007 (166)

November 2007 (193)

October 2007 (188)

September 2007 (140)

August 2007 (140)

July 2007 (150)

June 2007 (181)

May 2007 (198)

April 2007 (166)

March 2007 (167)

February 2007 (149)

January 2007 (168)

[+] 2006 (607)

December 2006 (142)

November 2006 (167)

October 2006 (181)

September 2006 (117)

 

Timesunion.com

Home

Local News

Your Town

Politics

Nation/World

Opinion

Sports

Business Blogs

Weather

Traffic

Calendar

Life

Restaurants

Movies

TV Guide

Travel Obituaries

Births

Weddings/Celebrations

Lottery

Special Reports

Photo Galleries

Video

Comics

Contests Corrections

Archives

Data Center

  

Topics

Home Decor

518 Moms

Entertainment

Local Arts Marketplace

Jobs

Real Estate

Cars

Shopping

Classifieds

Yellow Pages

Today's Print Ads

Place an Ad Home Delivery

Subscription

Customer Care

Source Card

 

Other Editions

Mobile site | Info

E-Edition

E-mail Newsletters

RSS Feeds Services

Help Center

Contact Us

Hope Fund

Copyright

Classroom Enrichment

Online Store

Info for Advertisers

 

Privacy Rights | Terms of Service

All Times Union materials copyright 1996-2009, Capital Newspapers Division of The Hearst Corporation, Albany, NY

 

The resources that are available to companies located at the Luther Forest Technology Campus are unparalleled. The Campus is located in the midst of New York’s Tech Valley, a 19-county region in eastern New York that spans from Montreal to New York City. Tech Valley contains more than 1,000 technology companies providing more than 50,000 jobs. Tech Valley companies have a combined economic impact of more than $5 billion and an annual payroll of $2 billion.

 

Located centrally in NY’s Tech Valley, the Luther Forest Technology Campus is the premier site for innovative, high tech companies. The Luther Forest Technology Campus has convenient access to major North American markets, close proximity to industry suppliers, leading universities, and major R&D partners.

  

--------------------------------------------------------------------------------

 

"This area (NY’s Capital Region) is really ripe for development with the combination of educational institutions, people and facilities."

-- Hector Ruiz, Chairman of the Board

GLOBALFOUNDRIES

 

Photo credit: Banner image courtesy of University at Albany's College of Nanoscale Science and Engineering. Lower photo: Aerial view of University at Albany's College of Nanoscale Science and Engineering

            

28 Clinton Street Saratoga Springs, NY 12866 USA

  

went to the community open house at the Globalfoundries Fab2 construction site in Malta, New York this morning. Globalfoundries had a nice tent set up with hot coffee, cookies, donuts, etc. It was a good thing because it was raining pretty hard and the gravel parking lot had a lot of water on it. Globalfoundries and M + W Zander had people on-site to answer questions about the project. They had a few large pictures of the construction site inside the tent as well as artist conceptions of the completed building.

 

The actual construction site could be seen from outside the tent. I took a few of my own pictures that you can see below. Double click on any of the pictures to enlarge them. It is a pretty impressive site. You can’t see the construction site from any of the main roads in the area because it is a few miles deep into The Luther Forest. It is on Stone Break Road off of Route 9 in Malta. I doubt that you can get into the actual construction site except for events like this. (Google Maps can’t locate “Stone Break Road, Malta NY”, unless you include the zip code 12020, but Bing.com can find it without the zip code.)

 

By the time I arrived they had run out of “fact sheets” but I was told to check their website and the information would be updated by Tuesday, October 27th. You can find their website at Globalfoundries.com.

 

Hector Ruiz, the chairman of GlobalFoundries said that the new chip plant is “by far the most significant high-tech investment made in this country in decades.” This plant will produce the most advanced computer chips in the world when it is completed.

 

I wrote a previous article about the chip plant in March. You can read it here: Globalfoundries Chip Plant in Saratoga County New York.

  

The refreshment tent at the Globalfoundries Community Open House

 

The Globalfoundries construction site

 

The Globalfoundries construction site

 

The Globalfoundries construction site

 

The Globalfoundries construction site

The construction and eventual operation of this plant will be an economic boost to Saratoga Springs and the surrounding area for years to come. What do you think about the plant? Leave a comment or send me an email. Thanks.

  

Tags: bing.com, chip plant, fab2, GlobalFoundries, google maps, Hector Ruiz, luther forest, m + w zander, malta ny, saratoga springs

 

General, New York State | John Tedder | October 24, 2009 4:03 pm

 

One Response to “The Globalfoundries Chip Plant in Malta, New York”

Daniel Tagliento says:

October 31, 2009 at 1:50 pmThe local “newspapers” lack of in depth investigative reporting was not at all included in their articles!

What was the reason the entire working platform had to be ‘bulldozed’ flat and devoid of mature stands of trees and other fauna?

Waht is the landscaping of the buildings and parking areas supposed to ‘blend’ into the surrounding topography?

Does this ‘platforming’ necessiate storm water retention ponds?

 

At the completion and occupation of the complex will it be eye friendly?

Note: Parssiphany, New Jersy

Buiding Codes insist that Mega-National type complexes remain ‘hidden’ in park like setting closely resembling the natural forest thy found before construction. Ten Billion of many Corporate Headquarters in ten years were build and remain sucessful but accessible by two lane tree stands lined country lane like entrances with multi-storied parking structures and modest designed multi-storied offices etc, all this surrounded by lawns and fields!

For Your Information the Mayor, who had his hand opefor the entire process was found guilty of 23 or the 24 charges, his hand was returning to his pocket with money he should not have had procession of!

Back to the Chase:Tokyo Electron opening in Malta; part of first wave drawn by chip fab

 

Climbing Blog -

 

2am Saturday morning and Im dodging boulders on memorial high way on the way up to Bunny Flat. The sharp slopes of volcanic debris act as a vertical launching pad for stones that were once tossed thousands of feet through the air from the earths hot belly. The white petals of salmon berry and Shasta lilies make little reflective explosions along roads edge in an otherwise dark embankment of Douglas firs, Manzanita, white pine, and cedars. The truck is running a little warm, but doing good for the 5 hour drive from Oakland and most importantly no run ins with the huge number of law enforcement on the roads, patrolling the July 4th weekend. Bunny Flat is like a used car lot, every imaginable make of vehicle is scattered around the front of the trail entrance, so much so that I have to drive back down the road aways and careen over into the shoulder for a space. Adam and I hop out of the 95 Ranger with expired Montana plates and go about preparing the back of the truck for sleep. As I our eyes adjust to the night, the white edges of Mount Shasta grow out the darkness, a large looming slope cut with bands of black. I position my sleeping bag such that I face the mountain and it is my last visible sight before consciousness checks out. I wake around 6 am and ask Adam for the time and then conk back out for another hour. The air is a strange olfactory experience of warm cedars and firs mixed with gusts of mountain stream moisture and the crisp cut of snow. Outside the shitters there is a sign in post for the wilderness permit and summit pass, so we take care of the necessary business and deposits before heading back down the hill into the city of Mount Shasta. At the Fifth Element Outfitters we get avalanche probes and an extra snow shovel, so I can dig Adam out if he gets buried by a column of snow. We hit the trail around 9am and within minutes are accidentally off trail and just b-lining towards Avalance Gulch. The loose alpine soil is rich with soft powdery dirt and high alpine plants trying to eek out an existence. The sun is unbelievably bright and glares off of every stone, every patch of snow. At the base of avalanche gulch we take in a little more food, make sure the plastic hiking boots are tight and that we are ready for the long haul. Looking up the southwestern slope of Shasta we can spy Helen Lake amongst the vertical snow fields. The climb up to the lake has no major point to comment upon, for its basically just a vertical gully filled with snow. Red algae grows on much of the snow, giving it the look of snow with fresh blood. I move up hill faster than Adam and happen to run into a guy named Brian with the same problem, so we camped out on some of the only three exposed rocks on the way up and waited for our respective parties to catch up. Brian is traveling with Anne, Jim and Peter. As Seattlites three of them work for Microsoft and Brian is the tag along boyfriend. A group of them had been on Rainer two weeks ago, taking the Emmons Winthrop Glacier route up, a gain of 10,000ft, but failed to summit because of a group puke due to altitude sickness or as Brian would rather call it, food poisoning. At Helen Lake, which is really more of a depression with snow banks good for digging into, we camped between the Seattlites. I dug a little snow coffin, just big enough for my plastic and summer bivy to fit into and Adam put his tent just on the opposite side of this and dug himself out a step for sitting. We had camp set up by 1pm, so we took a nap to catch up on the sleep debt from the night before. I didnt have any sun protection in the form of a tent so just covered my exposed skin in clothes etc. From Helen lake Lassen was visible to the south and Castla Crags just across the valley to the west. Lassens main peak was bathed in snow and so was the ridge stretching westward. We dug out a hole for the stove and proceeded to melt snow to reload our water bottles. Adam had his 3.5 L and I had my 2 L which I knew that I probably wouldnt drink all of. To the East of the main Helen lake encampment were the privacy pits for dropping your shorts and making deposits into plastic bags and a urine pit. The urine pit, well labeled by a stick that said Urinate Here, had an icy little cornice to it, so you wanted to be especially sure you were stable before letting things rip, because if you fell in, you would be trapped in yours and everyone elses frozen urine and the only way you could probably get out would be to yell for help our dig holes in the urine walls so you could climb out. Adam at some point was using the privacy pit to collect his human waste and had two girls accidentally walk up on him with his ass hanging out in the process of trying to put last nights processed dinner in a bag. We finished up boiling water, had dinner and by about 8p crawled into our respective sleeping accommodations. Adam had his alarm set for 2:30am, but slept right through it. Luckily I had woken up in nervous anticipation and realized other people in the camp were also moving about and getting their gear on. I put my boots on outside of Adams tent and noise woke him. The sky was brilliant with stars, so much so that I had a hard time picking out constellations, because there were just so many stars. The ambient night light glowed off the banks of the mountain in a dull blue hue. A few headlamp lights reflected off the snow about half way up to the Red Banks. All the planning and packing I did last night paid off, because I was ready to go within 10 minutes of waking up. Brian and Anne were also up and ready to go. They took off ahead of us, but once Adam had his stuff we caught right up. The snow had a crust of morning ice to it, which snap and popped under the weight of the crampons. I found walking back and forth like a switch back trail was the most effective way to get the most friction out of the crampons, so I did this most of the way up, passing many people that were just going toe forward up the mountain. I had to wait often for Adam to catch up or at least get close before I took off again. I waited for him at the cusp of the Red Banks, so we could decide which shoot to take. The ranger Nick who we had talked to at Helen Lake the night before said the middle shoot was the way to go and it should be easily distinguishable, because of the trail in it. We some how managed to not see the trail and ended up on the chute to the far left, which was a strong vertical, enough that I was actually nervous about loosing footing and was constantly going back over how to self-arrest using the ice axes. The chute was only about ten feet across and the red rock wall scaled up about 20 feet above us. The trail we carved spit us right out onto the top of the 12,500ft Red Banks, where we walked up a snow field to join the rest of the morning climbers. To the west a giant pyramidal shadow of the mountain stretched out in the pink haze. A layer of heavy night blue rested on the pillow of purple to pink sky just above the shadow. At the shadows peak light seemed to swirl from dark shadow, to red, to yellow. Unfortunately the slope was too steep for me to even think about taking my pack off to get at my camera, so it was one of the many images I end up just having to hold on my neurons and not a piece of paper. I took a break just before Misery Hill and allowed Adam to catch up. The sun was starting to blaze a path of fiery white across this depression, so I sat and soaked up warmth as Adam ate some more food. Brian and Anne caught up to us and we checked in to see how they were doing. No food poisoning for anyone, so we continued on. I blasted on ahead feeling the summit close. I hit the top of Misery Hill and walked the saddle over to the last short climb to the Summit. The wind ripped through the shoulder like the foul wind that had been ripping through my colon since being at about 10,000 ft. I blame the change in atmospheric pressure and the 10 servings of peanuts I had for dinner. Shastina to the left sat with minimal snow and the sulfur springs that had once saved John Muir life when climbing Mount Shasta sat just to the base of the summit trail. The summit was a small rocky configuration of pink rhyolite with a step vertical drop to the northeast. To the north the most distinguishable peak was mount Mclaughlins perfect pyramidal peak and closer in was the glassy surface of lower Klamath lake of Tule Lake. An iron box contained the sign in sheet for those that had made the top. I signed in and waited for Adam, Brian and Anne to make it.

 

Sitting amongst the weather broken stones of the summit I realized that I dont really enjoy summiting mountains in that there is a lot of dead time, a lot of gear, and hubris to it. Most people see themselves as conquering a mountain when they summit it and the entire trip is about besting nature, being able to stand on top of her and say look at me I am able to climb your steepest pitch, battle your coldest winds and conquer you. I far more enjoy a long trek with no obvious goal, no peak, no opposition between me and the land. All of the best things are the surprises that nature leaves along the way; the indescribable beauty of purple-ing trillium tucked between logs, a pileated woodpecker boring fist sized holes in dead pines, orange cup mushrooms, saprophobic snowflowers, harvester ants with their peppery sting, a black tailed deer in felt, a small stem of Thysanocarpus curvipes or a thousand other things of such undefined, unplaceable magnificence that one can not conquer, but can only hope to be a part of.

 

20 minutes later Brian, then Anne and then Adam filed in to the summit nook, hung out for a while and then we took off back down to Helen Lake. The snow still hard all the way down to the heart, meant no glissading. About halfway down the side of the heart Brian took off his crampons and tried glissading in the well worn trail that was about as deep as a luge run and as icy. He ended up expending most of his energy using his ice axe to slow him down. A little lower where the snow began to soften we all sat on our asses and slide for Helen camp. After about 2 mintues of rocketing down on ice and snow I could fee my butt, my balls or anything in that neighborhood. I was slides so fast that I was worried that I might be giving myself a snow enema without knowing, luckily this was not the case. At base camp we hung out and talked while Adam took a short snooze and then packed out gear up and headed down the mountain.

 

check out more of my adventures, poems and ramblings at:

damontighe.blogspot.com/

"What is more pleasant than the benevolent notice other people take of us, what is more agreeable than their compassionate empathy? What inspires us more than addressing ears flushed with excitement, what captivates us more than exercising our own power of fascination? What is more thrilling than an entire hall of expectant eyes, what more overwhelming than applause surging up to us? What, lastly, equals the enchantment sparked off by the delighted attention we receive from those who profoundly delight ourselves? - Attention by other people is the most irresistible of drugs. To receive it outshines receiving any other kind of income. This is why glory surpasses power and why wealth is overshadowed by prominence."

 

Caterina Fake, Co-founder of Flickr, 2005.

 

A couple of years ago I wrote a post called Top 10 Tips for Getting Attention on Flickr that proved fairly popular. A lot has changed at Flickr in the past 2 years though and how imagery is rated and ranked on the site has also changed. That said, I thought I'd write a fresher updated post on the top 10 ways, presently, to get attention on Flickr.

 

Back in 2006 when I wrote my original article on how to achieve popularity on Flickr my photostream had been viewed almost 400,000 times. According to a Flickr stats page that's been added since that time, the view count for my pages on Flickr now stands at 9,953,328. It should pass 10 million sometime this week. I'm averaging about 14,000 page views a day on Flickr.

 

Some of how one gets attention on Flickr has remained the same since 2006. Other stuff has changed.

 

1. Take great pictures. This was my number one way to achieve popularity on Flickr in 2006 and remains the number one way today. Despite all the other things that you might do to promote your photography, none of it will matter if your photos are not interesting. Everyone can be creative. Some are more creative than others. Sometimes your gear and photo processing matters, other times it doesn't. I've seen incredibly beautiful and creative photos taken with a $10 toy camera. And I've seen incredibly beautiful and creative photos taken with a $40,000 digital Hasselblad. I've seen people upload interesting things from a crappy iPhone camera and I've seen people upload interesting things that they spent 8 hours on Photoshop with. But, the better your photos are the more likely that you will get attention. Taking great photos is a prerequisite to everything else in this article.

 

This said, there are certain types of photos that tend to become more popular on Flickr than others. Provocatively posed female self portraits or photos of attractive women in interesting poses, extremely saturated photos rich with eye candy like color, cityscapes, night photography, photos depicting movement and motion, silhouettes, dramatic architecture, unique portraits, creatively arranged macros and cross processed and some film photography.

 

2. The order that you post your photos to Flickr counts. The number one way that your photos will likely be seen in Flickr comes from your Flickr contacts looking at their Flickr contact's photos. At present Flickr allows you to set your contacts most recent photos to their last photo, or their last 5 photos. Anything beyond 5 photos in a single batch upload will largely be buried on Flickr. If you are uploading more than 5 photos at once, make sure that you upload your best 5 photos last and what you consider your very best photo last of all. Frequently people will upload a batch of 30 photos from a concert or something with no thought as to which will be the last 5 of the 30 in order.

 

3. Consider places outside of Flickr to promote your photography. Do you have a blog or a photoblog? If you want more attention on Flickr you should. Flickr makes it very easy to blog your photos, you simply cut and paste the html code above your photo and you are now photoblogging with a direct link back to your photo. My blog, thomashawk.com is my number two external referrer of pageviews to my Flickrstream. Are you on FriendFeed yet? You should be. It's easy to set up and makes sure more people see your photos. Pownce (when it is working) is another place to post interesting photos.

 

4. Do you have your settings on Flickr configured for maximum exposure? After Flickr itself, Google drives more traffic to my Flickrstream than any other source, even my blog. Yahoo search and both Google and Yahoo image search drive traffic as well. But your photos will be blocked from appearing in search engines unless you authorize Flickr to display your images in search engines. Make sure your photostream is set to not "hide your stuff from public searches," here.

 

Same goes for the Flickr API. Lots of people are using the Flickr API in interesting ways. I get traffic from places like Flickrleech, Compfight, Technorati and lots of other places that use the Flickr API to extend your photos outside of Flickr. Make sure that you've authorized Flickr to allow API access to your photos here.

 

5. Explore. Explore still remains the number one way to get photos viewed on Flickr. Explore uses Flickr's "Magic Donkey" algorithm to each day highlight 500 of what Flickr feels are the best photos on Flickr for that day. It's a very popular section of the site despite the fact that everyone seems to constantly hate Explore and decry its mediocrity in selecting exceptional photos. Explore has changed and evolved a lot since it was first introduced at Flickr a few years back. Initially things like *when* you posted your photos mattered.

 

Whether or not Flickr chooses your photos for Explore is still very much a mystery. But there are some things that we do know. The more faves, comments, tags, etc. your photo gets, the more likely it is that it will appear in Explore. Explore also uses averaging in their algorithm now. This means that if your average photo gets 5 faves, then you'll need to do considerably better than average if you hope to see that photo in Explore.

 

Photos are also constantly dropping in and out of Explore. I've got 157 photos in Explore at present but I've had 446 that have appeared in Explore at one time or another. You can check out which and how many of your photos that have been showcased by Flickr in Explore here. Just change my Flickr ID at the link above for your own.

 

6. Groups. Speaking of Explore, if you really want to get a particular photo in Explore consider adding it to a group that encourages tagging, faving and comments of photos. Photo critique groups are good examples of this. Some of the photo critique groups play games where tagging and commenting on a photo are part of the game. Flickr does not distinguish between a photo that has been commented on or tagged organically vs. one that is included in some sort of photo critique game. If you want to boost the likelihood that your photo will be selected for Explore consider putting a strong photo into one of these pools. Photo critique groups on Flickr run the gamut from nice and friendly photo critique groups like TWIP's, to hostile and brutal photo critique groups like DeleteMe Uncensored (note NSFW and maybe not the best group if you are easily offended).

 

Whatever the case, the key to groups is participation. If you simply dump a bunch of photos blindly into random groups you will likely not get much benefit. In fact, Flickr actually penalizes photo rank if someone posts their photo to too many groups. But posting your photo to selective groups where you participate will encourage activity on your photos and photostream.

 

7. Tag for Exploration (especially your most popular photos). Why has this photo of mine been viewed over 27,000 times on Flickr? Well in part because it shows up on the first page search results on Flickr for the search term guitar. And why does it show up in searches for the word "guitar?" Because I've got the photo *tagged* guitar. By tagging your photos appropriately you can ensure that more people will see them in search. Think of other ways that you can tag your photos. Are all of your photos taken in San Francisco also tagged "California?" They should be. Are all of your photos tagged "self portrait" also tagged with your name? Again, they should be.

 

The better you keyword and tag your photos, the more likely they will show up in searches that take place on Flickr. Even if you think that your photos will never be popular enough to rank highly in search, remember that there are other ways that Flickr users can filter search. You can search just by your contacts photos on Flickr for instance. So even if you don't have the most popular sunset photo amongst millions on Flickr, you might have the most popular sunset photo amongst your contacts because you tagged it.

 

A note that I've seen some people on Flickr abuse tags. They will tag every photo with girl, sunset, cat, etc. Even if these things are not in their photo simply to try and trick people into getting to their photos through search. This sucks. I'm not sure what/if/how Flickr penalizes people who do this, but it's a crappy thing to do and ruins the search experience for everyone. Tag early and often, but only tag your photos with tags that truly are accurate and descriptive.

 

8. Geotag. One of the more interesting ways to find photos on Flickr is through exploring photos that are geotagged on a map. When I'm going to a new place that I'm not familiar with, frequently Flickr's "Explore the World Map," is one of my first destinations. But of course your photos will not show up here if they are not geotagged. The best way to geotag your photos is actually at the file level before you upload them. I use Geotagger on the Mac which allows you to use Google Earth to geotag your photos. You can also download the free software program from Microsoft Pro Photo Tools to geotag photos on a PC.

 

Check what Flickr considers your most popular photos and make sure that you geotag (and more descriptively tag) these photos especially -- even if you have to geotag these shots on Flickr using their tools. Geotagging has been documented by Flickr staff as increasing the Flickr "interestingness" rating of a photograph.

 

9. Consider creating a few "best of" sets and feature them prominently on your Flickrstream. Frequently when people first discover your photostream they don't have time to check out your entire stream. But if you make it easier for them and create a few sets that highlight some of your best work they may stick around longer. I've created two such sets myself. My 10 faves or more set and my 25 faves or more set. These sets highlight what are some of my best work according to the Flickr community and are my two most visited sets on Flickr. As my photos are faved 10 or 25 times I add the tag fav10 or fav25 to these sets and then use SmartSetr to automatically generate these sets.

 

Make sure also that you change your Flickr page layout from the boring default one to one that highlights your collections and sets better.

 

10. Tell everyone you know about your Flickrstream. Are you active on other social networks? Is a link to your Flickrstream prominently displayed on your blog? On your Facebook profile page? Be sure to include a link to your Flickrstream in every profile that you are on with other sites. Consider buying Moo cards (even though Moo.com has been lousy for me lately and won't let me buy anymore cards from them) which highlight your photostream that you can give out to people that you run across while out shooting. Tell your friends and family and your offline "real life" contacts about your Flickrstream.

 

Bonus tip: Reciprocation. Above everything else, perhaps the most important thing about Flickr is that it is a community and a reciprocation based community. If you think that you can just post your photos on the site and they will garner thousands of faves and views simply because, you are wrong. Even the best photos on Flickr will not get very much attention if you simply upload them to the site and never participate.

 

Flickr has been built to encourage reciprocation. In fact a recent study cited reciprocation as the number one key to popularity on Flickr. Every single time you fave or comment on someone else's photo you are giving them a link back to your own photostream. While you may not have the time to check out *everyone* who faves your photos, spend time each day faving and commenting on other people's photos on Flickr. By sharing with others the fact that you appreciate their photos they will return the favor. Be generous with your faves and comments. Remember, other people like the attention as much as you do.

 

On digg here.

 

Update: An interesting link to comments Flickr staff have made about the Explore algorithm here. Thanks, Ole!

About this mailing:

You are receiving this e-mail because you subscribed to Yahoo Featured Offers Intel respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by Google. Intel shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised.

Prices and item availability subject to change without notice.

 

2009 IBM | Unsubscribe | More Newsletters | Privacy

 

Microsoft Corporation, WA 98052

 

This message was sent from iContact to editors@fgfs.com. It was sent from: iContact AutoResponder, 72 Meridian Pkwy Suite 00, Durham, NC 7193. You can modify/update your subscription via the link below.

About this mailing:

 

You are receiving this e-mail because you subscribed to Intel Featured Offers Microsoft respects your privacy.

If you do not wish to receive this IBM Featured Offers e-mail, please click the "Unsubscribe" link below.

This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers.

This shall not constitute an offer by MSN. IBM shall not be responsible or liable for the advertisers'

content nor any of the goods or service advertised.

 

Prices and item availability subject to change without notice.

 

2009 IBM | Unsubscribe | More Newsletters | Privacy

 

Sun Microsystems Corporation, WA 98052

 

This message was sent from iContact to editors@aek.com. It was sent from: iContact AutoResponder, 79 Meridian Pkwy Suite 22, Durham, NC 4539.

You can modify/update your subscription via the link below.

Quelle:

de.wikipedia.org/wiki/Hacker_(Computersicherheit)

en.wikipedia.org/wiki/Hacker_(computer_security)

Hacker aus dem Bereich der Computersicherheit beschäftigen sich mit Sicherheitsmechanismen und deren Schwachstellen. Während der Begriff auch diejenigen beinhaltet, die Sicherheitslücken suchen, um sie aufzuzeigen oder zu korrigieren, wird er von den Massenmedien und in der allgemeinen Öffentlichkeit häufiger für Personen benutzt, die unerlaubt in fremden Systemen solche Lücken ausnutzen. Entsprechend ist der Begriff stark positiv beziehungsweise negativ belegt.[1]

  

Abhängig von der Motivation und Loyalität zu den Gesetzen, wird unterschieden zwischen White-Hat-, Grey-Hat- und Black-Hat-Hackern, wobei insbesondere Black-Hats auch als Cracker bezeichnet werden.

Nachdem eine Gruppe jugendlicher Hacker, bekannt als The 414s, in zahlreiche Computersysteme der Vereinigten Staaten eindrang, forderte der Kongressabgeordnete Dan Glickman eine Untersuchung und neue Gesetze gegen das Hacken.[2] Neal Patrick, der damals 17-jährige Sprecher der Hackergruppe, wurde am 26. September 1983 vor dem Repräsentantenhaus der Vereinigten Staaten über die Gefahren des Hackens befragt, und noch im gleichen Jahr wurden sechs Gesetzesentwürfe zur Computerkriminalität in das Repräsentantenhaus eingebracht.[3] In Deutschland wurde im August 1986 Computersabotage im Allgemeinen, und die unbefugte Manipulation von Daten im Besonderen, als spezielle Form der Sachbeschädigung in das Strafgesetzbuch aufgenommen (§ 202a, § 303a und § 303b des StGB).

  

Nach der Einführung der Gesetze zur Computerkriminalität begannen sich White-Hat-, Grey-Hat- und Black-Hat-Hacker voneinander abzugrenzen, abhängig von der Gesetzmäßigkeit ihrer Tätigkeiten. Diese Einteilung basiert auf alten Western-Filmen, welche „Cowboys“ aufgrund ihrer Hutfarbe als „gut“ (weiß), „neutral“ (grau) oder „böse“ (schwarz) charakterisiert:

  

White-Hats („Weiß-Hüte“):

Verwenden ihr Wissen sowohl innerhalb der Gesetze als auch innerhalb der Hackerethik, beispielsweise indem sie professionelle Penetrationstests ausführen.

Grey-Hats („Grau-Hüte“):

Verstoßen möglicherweise gegen Gesetze oder restriktive Auslegungen der Hackerethik, allerdings zum Erreichen eines höheren Ziels. Beispielsweise durch die Veröffentlichung von Sicherheitslücken, um ein Leugnen unmöglich zu machen und die Verantwortlichen dazu zu zwingen, diese zu beheben. Grey-Hats zeichnen sich dadurch aus, dass sie nicht eindeutig als „gut“ oder „böse“ einzustufen sind.

Black-Hats („Schwarz-Hüte“):

Handeln mit krimineller Energie und beabsichtigen beispielsweise, das Zielsystem zu beschädigen oder Daten zu stehlen.

Mangels klarer Trennlinie nimmt diese Unterteilung in der Praxis wenig Bezug auf real existierende Personen und steht vielmehr als Begrifflichkeit für eine bestimmte Art des Hackens.

  

Kontroverse zum Hackerbegriff

Als Reaktion auf schlechte Presse vertritt das Jargon File seit 1990 den Standpunkt, dass der Begriff ‚Hacker’ für die Personengruppen, die ihre Aktivitäten betont auf die Umgehung von Sicherheitsmechanismen legen, ungeachtet ihrer Motivation zu missbilligen ist und schlägt stattdessen Cracker vor.[4] Die Forderung, ein anderes Wort zu verwenden, wurde jedoch von der Presse nicht wahrgenommen oder weitestgehend ignoriert.

  

Hacker aus dem Bereich der Computersicherheit, insbesondere der Teil, der sich als gesetzestreu versteht, erheben weiterhin einen Mitverwendungsanspruch auf den Hackerbegriff und akzeptieren die Bezeichnung als Cracker nur für die dunkler gefärbten Richtungen. Auch von ihnen wird mitunter eine deutliche Abgrenzung zwischen Hacker und Cracker gefordert. Ein Teil derart abgegrenzter Cracker möchte sich jedoch ebenfalls als Hacker bezeichnet wissen.

  

Daneben zählen Skriptkiddies innerhalb der Computersicherheit zu den Crackern. Sie nutzen vorgefertigte Automatismen, um (meist unter schriftlicher Anleitung) in fremde Computersysteme einzudringen oder sonstigen Schaden anzurichten. Obgleich ihnen die beim Hackerbegriff notwendige tiefe Grundlagenkenntnis der Materie fehlt, werden Skriptkiddies innerhalb des Boulevardjournalismus gewöhnlich als „Hacker“ betitelt.[5]

  

Populäre Techniken

Social Engineering

Beschreibt eine Technik, die es erlaubt, über gesellschaftliche Kontakte an die vom Hacker begehrten Informationen zu gelangen.

Trojanisches Pferd

Als Trojanisches Pferd bezeichnet man ein Programm, welches als nützliche Anwendung getarnt ist, im Hintergrund aber ohne Wissen des Anwenders eine andere Funktion erfüllt.

Backdoor

Dieser Begriff bezeichnet einen (oft vom Autor eingebauten) Teil eines Computerprogramms, der es Benutzern ermöglicht, unter Umgehung der normalen Zugriffssicherung Zugang zum Computer oder einer sonst geschützten Funktion eines Computerprogramms zu erlangen. Als Beispiel sei das Universalpasswort für ein BIOS genannt oder eine spezielle (meist durch einen Trojaner heimlich installierte) Software, die einen entsprechenden Fernzugriff auf das Computersystem ermöglicht.

Rootkits

Die Rootkit-Technik dient dazu, bestimmte Objekte und Aktivitäten vor den Augen des Anwenders zu verbergen. So werden sie meist nach dem Einbruch in ein Computersystem auf dem kompromittierten System installiert, um geheime Prozesse und Dateien zu verstecken sowie zukünftige Logins des Eindringlings zu verbergen.

Denial of Service (DoS)

Meint eine Außerstandsetzung eines Netzwerkdienstes, beispielsweise durch Überlastung.

Exploit

Ein Exploit ist ein Computerprogramm oder Skript, welches spezifische Schwächen oder Fehlfunktionen eines anderen Computerprogramms ausnutzt, um erweiterte Privilegien zu erlangen oder um eine DoS-Attacke auszuführen.

Vulnerability Scanner

Diese Technik dient der automatischen Analyse von Computersystemen. Dabei suchen Hilfsprogramme gezielt nach Sicherheitslücken in einer Anwendung, einem Computer oder einem Netzwerk und können dabei helfen, Anfälligkeiten zu erkennen.

Sniffer

Ein Sniffer realisiert die Technik, den Datenverkehr eines Netzwerks oder eines am Rechner angeschlossenen Gerätes zu empfangen, aufzuzeichnen, darzustellen und gegebenenfalls auszuwerten. Beispielsweise kann ein Netzwerk-Sniffer dafür genutzt werden, um Passwörter auszuspionieren und übertragene Daten einzusehen.

Keylogger

Eine Technik zum Aufzeichnen der Tastatureingaben, zum Beispiel um an diverse Zugangsdaten zu gelangen.

Virus

Ein Computervirus ist ein Computerprogramm oder Skript, welches die spezielle Eigenschaft hat, sich selbst zu reproduzieren, sobald es einmal ausgeführt wird. Dadurch gelangt der Virus auf andere Datenträger, wie Netzwerklaufwerke und Wechselmedien. Durch Interaktion des Benutzers, der ein infiziertes Wechselmedium an ein anderes System anschließt oder eine infizierte Datei startet, gelangt der Virencode auch dort zur Ausführung, wodurch weitere Systeme von dem Virus infiziert werden. Neben der geheimen Verbreitung kann die Schadfunktion des Virus vom Anwender nicht kontrollierbare Veränderungen am System vornehmen. Auf diese Weise ist es möglich, zahlreiche Rechner eines Firmennetzwerks oder gar Server aus dem Internet halb automatisiert zu kompromittieren.

Wurm

Im Gegensatz zum Virus benötigt der Computerwurm ein auf dem System bereits installiertes Hilfsprogramm, welches er dazu verwendet, um sich auf ein anderes System zu kopieren. Das könnte zum Beispiel ein bestimmtes E-Mail-Programm sein, welches der Wurm fernsteuert, um sich an alle dort eingetragenen Adressaten zu verteilen. Je nach Art des Hilfsprogramms kann sich der Wurmcode auf dem neu infizierten System manchmal sogar selbst ausführen, weshalb dann keine Interaktion mit dem Benutzer mehr notwendig ist, um sich von dort aus weiter zu verbreiten. Daher ist diese Methode sehr effizient. Auf Systemen, die nicht über das benötigte Hilfsprogramm verfügen, kann sich der Wurm allerdings nicht reproduzieren.

physischer Zugang

Eine häufig unterschätzte Möglichkeit, sich Zugang zu verschaffen, besteht darin, in die Räumlichkeiten zu gelangen, in denen sich sicherheitskritische Hardware befindet.

Historischer Abriss aus dem Bereich Phreaking und Computersicherheit[Bearbeiten]

Chronisten der Hackerkultur gehen bei ihrer Suche nach dem Ursprung teilweise zurück bis in die Antike. Die griechische Erfindung des Trojanischen Pferdes gilt manchen als erster Hack überhaupt.[6] Operatoren der Telegrafen- (seit Mitte der 1840er) und Telefonnetze (seit Ende der 1870er), die häufig ebensolche Technikenthusiasten waren, wie die Hacker heute, nutzten ihr Wissen, um das Netz für ihre eigenen Zwecke zu verwenden. Sie gelten als Vorläufer der heutigen Hacker.[6] Einer der berühmtesten unter ihnen war der Erfinder Thomas A. Edison.[6] Die entsprechende Verwendung des Wortes Hacker ist eng mit der Geschichte des Computers verbunden, wobei Hacker aus dem Bereich der Netzwerk- und Computersicherheit aus der Subkultur des Phreaking hervorgegangen sind:[7] [6]

  

1971 veröffentlicht der Yippie Abbie Hoffman in seinem Buch „Steal This Book“ und einem Rundbrief namens „Youth International Party Line“ Methoden, um die Gebührenzahlung an Telefongesellschaften zu umgehen. Im selben Jahr erscheint auch ein entsprechender Bericht im Hochglanzmagazin „Esquire“,[8] sowie ein Jahr später im radikalen Magazin „Ramparts“. Infolgedessen entsteht die Ära des kostenlosen Telefonierens, das sogenannte Phreaking. Dies stellt die erste markante Assoziation zwischen dem Begriff Hacken und dem Überwinden von Sicherheitsbarrieren dar, in dessen Zusammenhang oft der Hacker John T. Draper, auch bekannt als Captain Crunch, und Joybubbles erwähnt wird.

  

1973 sind die beiden späteren Gründer von Apple, Steve Wozniak und Steve Jobs, auch im Phreaking-Umfeld aktiv und bauen zusammen mit John T. Draper Blue-Boxes.[6]

  

1981 wird der Chaos Computer Club (CCC) gegründet, ein deutscher Verein von und für Hacker, der im deutschen Raum hauptsächlich für die Belange im Bereich Datenschutz, Informationsfreiheit und Datensicherheit tätig ist und für ein Menschenrecht auf Kommunikation eintritt. Er wird gegründet, um Hackern eine Plattform zu geben, so dass sie über Aktivitäten und entdeckte Sicherheitslücken berichten können, ohne Strafverfolgung befürchten zu müssen.

  

1982 bricht eine Gruppe von sechs Teenagern in etwa 60 Rechnersysteme von Institutionen ein, die sich von Laboratorien aus Los Alamos bis Manhattans Krebszentrum Sloan-Kettering erstrecken, bevor sie festgenommen werden. Die Hackergruppe nennt sich nach der Vorwahl ihres Ortes Milwaukee „The 414s“. Sie werden im darauf folgenden Jahr vom FBI gefasst, wodurch der Fall eine große Popularität erlangt. Aufgrund der damaligen Gesetzeslage werden die meisten von ihnen jedoch nicht angeklagt. In der Cover-Story des Newsweek-Artikels „Beware: Hackers at play“ vom 5. September 1983 findet sich ihre Geschichte wieder. Das ist die erste Benutzung des Worts ‚Hacker‘ in überregionalen Medien, die den Begriff in abwertender Weise verwenden.

  

1983 erscheint der Film WarGames – Kriegsspiele und führt in der breiten Öffentlichkeit zum Phänomen der Massenparanoia vor Hackern und ihren mutmaßlichen Fähigkeiten, durch Hacken eine nukleare Katastrophe herbeiführen zu können. Gleichzeitig erhält der Geheimdienst Secret Service eine Abteilung für Kreditkarten- und Computerbetrug.

  

1984 startet der erste alljährliche Chaos Communication Congress, die älteste und größte internationale Hackerkonferenz in Europa. Im selben Jahr stellt der CCC mit dem BTX-Hack eine Schwachstelle im bislang als sicher titulierten BTX-System der Bundespost unter Beweis. Ebenfalls 1984 gründet jemand, der sich Lex Luthor nennt, eine Hackergruppe namens „Legion of Doom“ (LoD/H), die später eine der bekanntesten Hackergruppen wird und sich mit einer konkurrierenden Gruppe „Masters of Deception“ einen erbitterten Kampf liefert. In den frühen 1990er Jahren werden beide Hackergruppen in Zusammenarbeit zwischen dem Secret Service und dem FBI zerschlagen, wobei viele ihrer Mitglieder verhaftet werden.

  

1985 wird Loyd Blankenship (ein bekannter US-amerikanischer Hacker, der sich selbst „The Mentor“ nennt) verhaftet, woraufhin er ein noch heute oft zitiertes Schreiben mit dem Titel „Hacker’s Manifesto“ veröffentlicht. Es verschafft einen groben Einblick in die Gefühlswelt eines damaligen Hackers der Phreaking-Kultur. Im selben Jahr beginnt eine Hannoversche Hackergruppe um Karl Koch und Markus Hess mit einer Reihe von Einbrüchen in verschiedene westliche Computersysteme, um die Daten an den russischen Geheimdienst (KGB) zu verkaufen. Die Hacks werden unter anderem durch einen Bug in der Emacs-Komponente movemail möglich. Erst im März 1989 gelingt es der Polizei und dem Bundesnachrichtendienst die Hackergruppe endgültig zu zerschlagen, wobei der KGB-Hack in der Öffentlichkeit auf sich aufmerksam macht, da er den ersten bekannten Cyberspionagefall darstellt.

  

1987 wird die Organisation „Computer Emergency Response Team“ (CERT) gegründet, die sich durch öffentliche Mittel finanziert und möglichst zeitnah Warnungen vor Sicherheitslücken herausgibt. Im selben Jahr gelingt es norddeutschen Hackern, Zugriff auf die Systeme im von NASA und ESA betriebenen SPANet zu erhalten, was später als NASA-Hack bezeichnet wird.

  

1988 schreibt Robert Tappan Morris aus Neugierde ein Programm, welches auf dem UNIX-System automatisiert nach bekannten Schwachstellen sucht. Es ist in der Lage, diese Schwachstellen zu gebrauchen, um sich auf andere Systeme zu kopieren und dort auszuführen. Als sein Versuch außer Kontrolle geriet, sieht sich die Computerwelt mit dem ersten Wurm konfrontiert, der sich über das ARPAnet (dem Vorgänger zum Internet) verbreitet und dank seiner permanent arbeitenden Verbreitungsroutine über 6.000 vernetzte Computer der Regierung und Universitäten blockiert. Über ein unzureichend gesichertes Computersystem gelingt es im selben Jahr erstmals einem Eindringling, die First National Bank von Chicago um 70 Millionen US$ zu erleichtern. Wenig später wird der Hacker Kevin Mitnick, alias condor, verhaftet, weil er die E-Mail von Sicherheitsbeamten des MCI Communications und Digital Equipment Corporation (DEC) insgeheim überwachte. Acht Monate in Einzelhaft und weitere sechs Monate im Half Way House sind die Folge seiner Tat. Danach soll er, größtenteils mit Hilfe von Social Engineering, mehrfach in das Netzwerk des Pentagon eingedrungen sein. Auch legt man ihm den Einbruch in das System der NSA und das Eindringen in das NORAD-Netzwerk zur Last, wobei er selbst vor allem Letzteres immer bestritten hat. Mehr als fünf Jahre lang gilt er als die meistgesuchte Person in den USA, bis er 1995 erneut vom FBI verhaftet und zunächst zwei Jahre ohne Gerichtsverhandlung gefangen gehalten wird. Ebenfalls im Jahr 1988 wird Kevin Poulsen beschuldigt, Telefonanlagen manipuliert zu haben. Zu einer erfolgreichen Anklage kommt es jedoch erst 1993, in der ihm und zwei seiner Freunde, Ronald Austin und Justin Peterson, vorgeworfen wird, zwischen 1990 und 1993 zahlreiche Radiogewinnspiele manipuliert zu haben. Das Trio erlangte Kontrolle über alle Telefonleitungen der Radiostation und stellte damit sicher, dass ausschließlich ihre eigenen Anrufe durchkamen, wodurch sie zwei Porsche, 20.000 US$ und einige Reisen gewannen. Kevin Poulsen verbringt daraufhin fünf Jahre seines Lebens im Gefängnis.

  

1990–1999 Das Aufkommen von Würmern und Viren nimmt in dieser Zeit rapide zu. 1993 startet die erste DEF CON, eine alljährliche Hackerkonferenz, in Las Vegas. Mitte der 1990er Jahre berichtet der US-amerikanische Bundesrechnungshof, dass im Schnitt 250.000 Mal im Jahr Hacker versuchen, auf Dateien des Verteidigungsministeriums zuzugreifen. Nach deren Bericht sind etwa 65 Prozent der Versuche erfolgreich.[9] 1997 dringt ein 15 Jahre alter kroatischer Jugendlicher in die Computer einer Luftwaffenbasis in Guam, USA, ein. Eine Gruppe von Hackern um Natasha Grigori, Gründerin von antichildporn.org, nutzen erstmals in der Hackergeschichte ihre Fertigkeiten, um die Verteiler von Kinderpornografie gezielt zu verfolgen und ihre Informationen an die Hüter der Gesetze weiterzugeben. 1998 werden zwei Hacker von einem Gericht in China zum Tode verurteilt. Ende der 1990er Jahre gibt es die ersten organisierten, politisch motivierten Hackerattacken in den USA.

  

2000–2005 Anfang 2000 werden DDoS-Attacken populär, eine Variante von DoS, welche automatisiert von mehreren Rechnern gleichzeitig ausgeführt wird. Politisch motivierte Hacker verunstalten Webseiten der indischen und israelischen Regierungen, um auf die Unterdrückung in Kaschmir und Palästina aufmerksam zu machen. Permanenten Hackerattacken ausgesetzt, unterbricht Microsoft seine Entwicklung und schickt erstmals über 8.000 Programmierer zu einer Schulung, die dazu dienen soll, programmiertechnische Schwachstellen künftig zu vermeiden.

  

Siehe dazu auch den Artikel in der englischsprachigen Wikipedia.[10]

  

Hackermagazine

Zum Informationsaustausch unter Hackern wurden seit den 1980ern eine Reihe von Untergrund-Magazinen gegründet. Beispiele sind das 2600 magazine und das inzwischen nur noch unregelmäßig veröffentlichte Phrack. Diese Entwicklung wurde von den Phreaks der frühen 1970er Jahre angeschoben, die in illegalen Untergrund-Magazinen wie der TAP ihre Informationen weitergaben.

  

Es gibt jedoch auch Magazine, die völlig legal sind. Ein bekanntes deutschsprachiges Magazin ist die vom Chaos Computer Club herausgegebene Datenschleuder.

In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge or enjoyment.[1] The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.[2] While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks,[3] they are rarely used in mainstream context. They are subject to the longstanding hacker definition controversy about the term's true meaning. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone who breaks into computers, whether computer criminal (black hats) or computer security expert (white hats),[4] is more appropriately called a cracker instead.[5] Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called "crackers".

  

Bruce Sterling traces part of the roots of the computer underground to the Yippies, a 1960s counterculture movement which published the Technological Assistance Program (TAP) newsletter.[citation needed] TAP was a phone phreaking newsletter that taught techniques for unauthorized exploration of the phone network. Many people from the phreaking community are also active in the hacking community even today, and vice versa.

  

Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree.

  

Eric S. Raymond, author of The New Hacker's Dictionary, advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as a wider hacker culture, a view that Raymond has harshly rejected. Instead of a hacker/cracker dichotomy, they emphasize a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie. In contrast to Raymond, they usually reserve the term cracker for more malicious activity.

  

According to Ralph D. Clifford, a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system".[6] These subgroups may also be defined by the legal status of their activities.[7]

  

White hat

Main article: White hat

A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council,[8] also known as the International Council of Electronic Commerce Consultants, is one of those organizations that have developed certifications, courseware, classes, and online training covering the diverse arena of Ethical Hacking.[7]

  

Black hat

A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005).[9] Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".[10] Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers. Crackers keep the awareness of the vulnerabilities to themselves and do not notify the general public or manufacturer for patches to be applied. Individual freedom and accessibility is promoted over privacy and security. Once they have gained control over a system, they may apply patches or fixes to the system only to keep their reigning control. Richard Stallman invented the definition to express the maliciousness of a criminal hacker versus a white hat hacker who performs hacking duties to identify places to repair.[11]

  

Grey hat[edit]

Main article: Grey hat

A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee.[10]

  

Elite hacker

A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.[12]

  

Script kiddie

A script kiddie (also known as a skid or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature),[13] usually with little understanding of the underlying concept.

  

Neophyte

A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.[10]

  

Blue hat

A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.[14][15][16]

  

Hacktivist

A hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or political message.

  

Hactivism can be divided into two main groups:

  

Cyberterrorism - Activities involving website defacement or denial-of-service attacks.

Freedom of information - Making information that is not public, or is public in non-machine-readable formats, accessible to the public.

Nation state[edit]

Intelligence agencies and cyberwarfare operatives of nation states.[17]

  

Organized criminal gangs

Groups of hackers that carry out organized criminal activities for profit.

A typical approach in an attack on Internet-connected system is:

  

Network enumeration: Discovering information about the intended target.

Vulnerability analysis: Identifying potential ways of attack.

Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.[18]

In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.

  

Security exploits[edit]

Main article: Exploit (computer security)

A security exploit is a prepared application that takes advantage of a known weakness.[19] Common examples of security exploits are SQL injection, Cross Site Scripting and Cross Site Request Forgery which abuse security holes that may result from substandard programming practice. Other exploits would be able to be used through FTP, HTTP, PHP, SSH, Telnet and some web-pages. These are very common in website/domain hacking.

  

Vulnerability scanner

A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Firewalls defend computers from intruders by limiting access to ports and machines, but they can still be circumvented.)

Brute force Attack

Password guessing, this method is very fast when used to check all short passwords, but for longer passwords other methods such as the dictionary attack are used because of the time a brute-force search takes.

Password cracking

Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.

Packet sniffer

A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.

Spoofing attack (Phishing)

A spoofing attack involves one program, system or website that successfully masquerades as another by falsifying data and is thereby treated as a trusted system by a user or another program—usually to fool programs, systems or users into revealing confidential information, such as user names and passwords.

Rootkit

A rootkit is a program that uses low-level, hard-to-detect methods to subvert control of an operating system from its legitimate operators. Rootkits usually obscure their installation and attempt to prevent their removal through a subversion of standard system security. They may include replacements for system binaries, making it virtually impossible for them to be detected by checking process tables.

Social engineering

In the second stage of the targeting process, hackers often use Social engineering tactics to get enough information to access the network. They may contact the system administrator and pose as a user who cannot get access to his or her system. This technique is portrayed in the 1995 film Hackers, when protagonist Dade "Zero Cool" Murphy calls a somewhat clueless employee in charge of security at a TV network. Posing as an accountant working for the same company, Dade tricks the employee into giving him the phone number of a modem so he can gain access to the company's computer system.

Hackers who use this technique must have cool personalities, and be familiar with their target's security practices, in order to trick the system administrator into giving them information. In some cases, a help-desk employee with limited security experience will answer the phone and be relatively easy to trick. Another approach is for the hacker to pose as an angry supervisor, and when his/her authority is questioned, threaten to fire the help-desk worker. Social engineering is very effective because users are the most vulnerable part of an organization. No security devices or programs can keep an organization safe if an employee reveals a password to an unauthorized person.

Social engineering can be broken down into four sub-groups:

Intimidation As in the "angry supervisor" technique above, the hacker convinces the person who answers the phone that their job is in danger unless they help them. At this point, many people accept that the hacker is a supervisor and give them the information they seek.

Helpfulness The opposite of intimidation, helpfulness exploits many people's natural instinct to help others solve problems. Rather than acting angry, the hacker acts distressed and concerned. The help desk is the most vulnerable to this type of social engineering, as (a.) its general purpose is to help people; and (b.) it usually has the authority to change or reset passwords, which is exactly what the hacker wants.

Name-dropping The hacker uses names of authorized users to convince the person who answers the phone that the hacker is a legitimate user him or herself. Some of these names, such as those of webpage owners or company officers, can easily be obtained online. Hackers have also been known to obtain names by examining discarded documents (so-called "dumpster diving").

Technical Using technology is also a way to get information. A hacker can send a fax or email to a legitimate user, seeking a response that contains vital information. The hacker may claim that he or she is involved in law enforcement and needs certain data for an investigation, or for record-keeping purposes.

Trojan horses

A Trojan horse is a program that seems to be doing one thing but is actually doing another. It can be used to set up a back door in a computer system, enabling the intruder to gain access later. (The name refers to the horse from the Trojan War, with the conceptually similar function of deceiving defenders into bringing an intruder into a protected area.)

Computer virus

A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. By doing this, it behaves similarly to a biological virus, which spreads by inserting itself into living cells. While some viruses are harmless or mere hoaxes, most are considered malicious.

Computer worm

Like a virus, a worm is also a self-replicating program. It differs from a virus in that (a.) it propagates through computer networks without user intervention; and (b.) does not need to attach itself to an existing program. Nonetheless, many people use the terms "virus" and "worm" interchangeably to describe any self-propagating program.

Keystroke logging

A keylogger is a tool designed to record ("log") every keystroke on an affected machine for later retrieval, usually to allow the user of this tool to gain access to confidential information typed on the affected machine. Some keyloggers use virus-, trojan-, and rootkit-like methods to conceal themselves. However, some of them are used for legitimate purposes, even to enhance computer security. For example, a business may maintain a keylogger on a computer used at a point of sale to detect evidence of employee fraud.

Tools and Procedures

  

A thorough examination of hacker tools and procedures may be found in Cengage Learning's E|CSA certification workbook.

  

Jacob Appelbaum is an advocate, security researcher, and developer for the Tor project. He speaks internationally for usage of Tor by human rights groups and others concerned about Internet anonymity and censorship.

Eric Corley (also known as Emmanuel Goldstein) is the longstanding publisher of 2600: The Hacker Quarterly. He is also the founder of the H.O.P.E. conferences. He has been part of the hacker community since the late '70s.

Ed Cummings (also known as Bernie S) is a longstanding writer for 2600: The Hacker Quarterly. In 1995, he was arrested and charged with possession of technology that could be used for fraudulent purposes, and set legal precedents after being denied both a bail hearing and a speedy trial.

Dan Kaminsky is a DNS expert who exposed multiple flaws in the protocol and investigated Sony's rootkit security issues in 2005. He has spoken in front of the US Senate on technology issues.

Andrew Auernheimer, sentenced to 3 years in prison, is a grey hat hacker whose security group Goatse Security exposed a flaw in AT&T's iPad security.

Gordon Lyon, known by the handle Fyodor, authored the Nmap Security Scanner as well as many network security books and web sites. He is a founding member of the Honeynet Project and Vice President of Computer Professionals for Social Responsibility.

Gary McKinnon is a Scottish hacker facing extradition to the United States to face criminal charges. Many people in the UK have called on the authorities to be lenient with McKinnon, who suffers from Asperger syndrome.[21]

Kevin Mitnick is a computer security consultant and author, formerly the most wanted computer criminal in United States history.[22]

Rafael Núñez, aka RaFa, was a notorious hacker who was sought by the FBI in 2001. He has since become a respected computer security consultant and an advocate of children's online safety.

Meredith L. Patterson is a well-known technologist and biohacker who has presented research with Dan Kaminsky and Len Sassaman at many international security and hacker conferences.

Len Sassaman was a Belgian computer programmer and technologist who was also a privacy advocate.

Solar Designer is the pseudonym of the founder of the Openwall Project.

Michał Zalewski (lcamtuf) is a prominent security researcher.

The computer underground[1] has produced its own specialized slang, such as 1337speak. Its members often advocate freedom of information, strongly opposing the principles of copyright, as well as the rights of free speech and privacy.[citation needed] Writing software and performing other activities to support these views is referred to as hacktivism. Some consider illegal cracking ethically justified for these goals; a common form is website defacement. The computer underground is frequently compared to the Wild West.[23] It is common for hackers to use aliases to conceal their identities.

  

Hacker groups and conventions[edit]

Main articles: Hacker conference and Hacker group

The computer underground is supported by regular real-world gatherings called hacker conventions or "hacker cons". These events include SummerCon (Summer), DEF CON, HoHoCon (Christmas), ShmooCon (February), BlackHat, Chaos Communication Congress, AthCon, Hacker Halted, and H.O.P.E...[citation needed] Local Hackfest groups organize and compete to develop their skills to send a team to a prominent convention to compete in group pentesting, exploit and forensics on a larger scale. Hacker groups became popular in the early 1980s, providing access to hacking information and resources and a place to learn from other members. Computer bulletin board systems (BBSs), such as the Utopias, provided platforms for information-sharing via dial-up modem. Hackers could also gain credibility by being affiliated with elite groups.

   

About this mailing:

You are receiving this e-mail because you subscribed to Google Featured Offers IBM respects your privacy. If you do not wish to receive this Yahoo Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in Google Feature Offers. This shall not constitute an offer by GMail. Intel shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised.

Prices and item availability subject to change without notice.

 

2009 Microsoft | Unsubscribe | More Newsletters | Privacy

 

Microsoft Corporation, WA 98052

 

This message was sent from iContact to editors@ler.com. It was sent from: iContact AutoResponder, 19 Meridian Pkwy Suite 95, Durham, NC 4595. You can modify/update your subscription via the link below.

About this mailing:

 

You are receiving this e-mail because you subscribed to GMail Featured Offers Microsoft respects your privacy.

If you do not wish to receive this GMail Featured Offers e-mail, please click the "Unsubscribe" link below.

This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in IBM Feature Offers.

This shall not constitute an offer by IBM. MSN shall not be responsible or liable for the advertisers'

content nor any of the goods or service advertised.

 

Prices and item availability subject to change without notice.

 

2009 Microsoft | Unsubscribe | More Newsletters | Privacy

 

Intel Corporation, WA 98052

 

This message was sent from iContact to editors@rzpwc.com. It was sent from: iContact AutoResponder, 14 Meridian Pkwy Suite 81, Durham, NC 3323.

You can modify/update your subscription via the link below.

We are photographer - not anti video, but anti video on flickr...

 

• 100.000.000 views - 100.000.000 comments

• 100.000.000 次檢視 - 100.000.000 回應

• 100.000.000 vistas - 100.000.000 comentarios

• 100.000.000 vues - 100.000.000 commentaires

• 100.000.000 visualizzazioni - 100.000.000 commenti

• 100.000.000 mal angesehen - 100.000.000 Kommentare

 

NO video on flickr - we don't like "items", we like photos !

real photo groups must be free of videos !!!

 

- - - - -

 

Austria is indeed home to a town called 'Fucking'.

The second sign carries the hilarity even further:

"Bitte nicht so schnell!"

is german for "Please not so fast!"

 

- - - - -

 

DEAR ADMINS OF PHOTO GROUPS,

CHANGE YOUR rules and MODERATION SETTINGS !

 

The kind of items you would like to accept into the pool:

 

• Media types: (from Photos&Videos - to) Photos only

• Content types: Photos only

 

• Akzeptierte Medientypen: Fotos

• Akzeptierte Inhaltstypen: Fotos

 

• Tipo de medios: Sólo fotos

• Tipos de contenido: Fotos

 

• Types de média: Photos uniquement

• Types de contenu: Photos

 

• Tipi multimediali: Solo foto

• Tipi di contenuto: Foto

 

你接受將哪種項目放入分享區?

• 媒體類型︰僅相片

• 內容類型︰相片

 

flickr = Photography

YOU TUBE = Video

 

- - - - -

 

Yahoo Inc. will begin showing homemade videos on its online photo-sharing site, Flickr, in a long-anticipated move that may be too late to lure most people away from the Internet’s dominant video channel, Google Inc.’s YouTube. Flickr’s video technology, to debut late Tuesday, represents the latest example of Yahoo trying to catch up to Google in a crucial battleground. Yahoo’s inability to keep pace with Google in the lucrative online search market caused its profits and stock price to sag during the past two years, which in turn triggered an unsolicited takeover attempt by Microsoft Corp. for more than $40 billion. Flickr’s new technology is aimed at amateurs and hobbyists looking for a better way to share short video clips with family and friends.

 

Only Flickr’s “pro” members — those who pay for a $24.95 annual subscription — will be allowed to transfer video clips of up to 90 seconds to the site, but anyone will be able to watch them. A privacy setting will allow videographers to limit access to the clips on Flickr if they want. The video service will be offered in English and seven other languages: French, German, Italian, Korean, Portuguese, Spanish and traditional Chinese. Flickr believes its service will offer a more personal touch than the many other Web sites that feature video, and that will help distinguish it. Flickr managers also expect to appeal to people looking to keep their video and pictures on the same site.

 

Let youtube have the video and Flickr have the photos or if Yahoo wants videos create a seperate page.

 

Don't become another Facebook or Myspace!!

What next Ad's on each page?

 

Please keep flickr for Photographers - Photographers don't want FLICKR flooded with random 'video phone' style videos. Give us the choice on whether we see video.

 

- - - - -

About this mailing:

You are receiving this e-mail because you subscribed to Google Featured Offers IBM respects your privacy. If you do not wish to receive this Yahoo Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in Google Feature Offers. This shall not constitute an offer by GMail. Intel shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised.

Prices and item availability subject to change without notice.

 

2009 Microsoft | Unsubscribe | More Newsletters | Privacy

 

Microsoft Corporation, WA 98052

 

This message was sent from iContact to editors@ler.com. It was sent from: iContact AutoResponder, 19 Meridian Pkwy Suite 95, Durham, NC 4595. You can modify/update your subscription via the link below.

To control Information Technology (IT) costs we think about and act within the enterprise as a whole, in part because we sell enterprise and mid-level solutions. We apply an Enterprise Architecture (EA) strategy which at the top level is comprised of infrastructure and communication considerations. This is not just about technical infrastructure, defined or designed by IT, because it is highly likely that such individual solutions (one offs) will not align to core business strategies (vertical needs verses horizontal needs spanning the whole company).

 

It is not really possible to do this, that is consider the entire company's needs, without significant participation by the business for which we use terms such as Solution Delivery or Product Management. Product and program managers from a solution delivery framework gather information, report back to the business, and return to apply the business strategies to align with short, medium, and especially long term business goals.

 

This business and implementation strategy focus is a change agent, to reduce siloed thinking, and achieve more horizontal capability across units. We reduce multiple applications, which take time to manage and maintain, and where it makes sense, fold them into one. Because we take security and privacy of our customers very seriously, any applications which may be at risk have been identified and are brought up into our standards. The process of combining risk management goals, application and data reduction streams saves money, although the process of so much change at once can be stressful at the unit, project, and personal levels.

 

We seek to empower self-service among our partners, customers and employees, for access to all kinds of information they need, and internally reduce redundant data stores, for example referring to customers by one identifier if possible. This is especially challenging in our partner relationships with multiple data stores that contain similar information about customers which are identified in completely different ways. This is the reason for serious data modeling and tight or loose coupling where needed – to retrieve and move information back to the partner systems. We leverage Microsoft software, and then buy, build, minimize or reuse existing systems.

 

In order to be more successful in our efforts to control IT costs we strive to increase flexibility among existing staff and provide rewards for strategic thinking – this strategic thinking aligns along company-wide goals. We need people with the right skills who work in efficient methods, only including the people who need to be included to make decisions or act. In fact we need to change confrontational and passive aggressive behaviors internally to collaborative personality styles – changing the organizations culture is doable but difficult. For more information I recommend reading "The Heart of Change" by Kotter and Cohen.

 

The technologies we invest in to help control IT costs are our own. We custom write stuff served up on Microsoft servers and plan to use SharePoint as the UI for our new change request tool. We are substantially reducing and eliminating the number of different applications (SQL stored procedures or XML Blobs mostly) we use and maintain on a daily basis. We are moving from C++ to C#/.NET (C Sharp and .Net technologies).

 

We use Microsoft software as our strategy to control IT costs - it is easy to manage, and has great support. Some team members keep an eye on relevant Open Source software as competitive analysis.

 

Our company is getting the maximum value from its data center investment because we have not invested to the level we need for our infrastructure. We expect to remediate this lack of investment after deploying skilled, thoughtful product managers with the right combination of education and practical experience to assist in this effort through the next couple of years.

 

What is our organization doing to maximize the value from its data center investment? In addition to the other things mentioned we outsource development and support to India, Israel, and developing countries, etc. We also are making use of tax advantaged locations for large savings in transactions.

 

We are adding metrics and measurements by which we evaluate not just personal progress but internal and external customer satisfaction with our IT initiatives on a project by project basis to self-improve.

 

The practices which enable us to maximize value from our IT investment are varied and multifaceted. To maximize ongoing investment we are adding solution delivery strategies, planning ahead, and aligning IT with company-wide goals. Of course in our space we have some unique issues, and as a public company even more so. One thing that may surprise you is some of our projects we do end to end locally because of how critical success is. We leverage our best, most successful local managers to produce projects and design larger scale solutions if we determine it is the best strategy – so in this way we are flexible – we don't just out source everything.

 

We are in the process of reducing the number of applications we need to maintain, and where it is appropriate fold one into another so long as the user interface or back ends do not become unmanageable. We are making over our change request platform from top to bottom which we feel will enable quicker turnarounds on change requests – it is both loosely and tightly coupled where it needs to be. For the presentation layer we choose Microsoft SharePoint.

 

Conversely, what factors are inhibiting our organization from reaping the maximum value from its data center investments? The factors inhibiting the maximum value include a lack of foresight in strategic planning for long term goals –

 

1. Putting temporary things together to just meet immediate needs.

 

2. Focusing on small details and not seeing the big picture.

 

3. Lack of metrics to evaluate progress, process, and client / customer / partner success.

 

4. Unwillingness of team members to change or promote change even when it is in their and the companies' best interest.

 

5. Having too many data centers, identifying customers in too many ways.

 

How important is productivity within the IT function in our efforts to control IT costs and maximize our data center investment? Functionality, capacity, and reliability far outstrip productivity, but that is only because we have already hit very high productivity goals and exceeded them. Here are some of the metrics we examine:

 

Metrics

 

Percentage of project budgeted costs

Scope requirements

Total cost of ownership

Traceability

Defects rate (sev1, sev2, sev3 bugs - zero tolerance for sev1)

Completed requirements

Customer satisfaction scores (cust sats)

Schedule slippage

Flexibility of management styles

End-to-end throughput time per client-side user request

System extensibility

Scalability

Maintainability

Defects per thousand lines of code (KLOC or by function)

Support functionality and documentation availability, and completeness prior to launch

Rates of failure

Restoration (emergency)

Availability

Test effectiveness

Business acceptance

System acceptance (signoff)

Average turn around time for service and change requests

Number of security or privacy defects (last two should be zero tolerance in launch candidates)

Number of post freeze change requests

Among the mandatory metrics used are peer review effectiveness of code, and post mortems and overall customer satisfaction. In other words we do not consider just ontime delivery of products, enhancements, or new functionality.

 

What is our organization doing to improve productivity within its IT function?

Getting the right people – some people grew with us or came to us with deep knowledge from the school of hard knocks – work experience – we seek to capture the most knowledgeable and either increase their education or find those with both practical work experience and advanced degrees. Good thing this is Seattle with its heavily educated population. New programs at the university level such as Informatics and Information Management are producing the people we need – not just MBAs or Master of Comp Sci - because so much of our development work we outsource to India and developing countries, and IT is not traditionally closely aligned with marketing or sales. We do outsource much of the development work as is possible.

 

The undergrad Informatics and Master of Science in Information Management programs at the University of Washington are housed in Mary Gates' Hall, renovated and named in honor of Bill Gate's late mother, it's headed by Mike Crandall (Dublin Core, Microsoft, Boeing). So you can see this is the direction we are going regionally, because that is where the spend is. Another great information school is at the University of California at Berkeley, housed in one of the oldest and most architecturally beautiful collegiate buildings on the west coast, South Hall. On the physical level all Berkeley had to do is add wireless. Excellent academics such as the seminal thinker Dr Michael Buckland are there at Berkeley, and business leaders such as Mitch Kapor. Industry wide I think iSchools are having an effect, adding a more well rounded, even playful culture to high tech operations.

 

Improving and opening the culture is important. Having a shared lexicon is one of the benefits of educated people; those with MSIM (master of science in information management), Informatics, technical MBA degrees can comunicate effectively with highly technical people - this can produce enormous savings and long term cost benefits. Increased, clear, enthusiastic communication saves IT costs.

 

In strategy meetings, for example, we often include Enterprise Architects to assist in stack ranking program and project development, because this helps reduce redundant systems.

 

Our organization's ability to measure the return on investment (ROI) or success of its IT investments is “Fair but mixed,” we want ROI to be easily measureable and this means evaluating the correct things, asking the right questions in the first place, not following other organizations techniques, although we examine them as examples.

 

We are adding ways to evaluate our ROI – we do use business analysis methods. There is always an identifiable way to analyze and measure the relationship of what something costs even if it appears intangible such as Brand protection.

 

Considering the strategic and tactical stuff we are doing, at the core, creativity is what drives our success. Creativity is always a very difficult thing to measure. In fact it could be said that if you try, you are barking up the wrong tree. However creative thinking around practical goals has provided us success. This is where the ideas around flexibility and being very responsive come to play.

 

We have found very very high ROI around outsourced projects because they must be clearly defined within the Software Development Lifecycle (SDLC) and Sarbanes-Oxley Act of 2002 (SOX) compliance.

 

Those people who actually think out of the box are oftentimes not recognized by co-workers and management. Change is perceived as negative among full time staff. We seek to show support for both full time employees and consultants, and change this view and enhance their ability to communicate ideas. That is why our management keeps an open door policy. Unfortunately like any other policies the hazard is that individual managers must believe in our policies around openness and creativity; such self-selecting polices are impossible to enforce.

 

Our organization uses balanced scorecards, Six Sigma and other types of internally derived quantitative value measurement methods to measure the ROI or success of our IT investments.

 

The continued use of these methods we expect will substantially improve the management and measurement of our IT investments. Some of the metrics are at the discretion of the product or program manager, others are mandatory. In part we have some success- at issue is adopting metrics and measurement as well as Enterprise Architecture and engaging with open arms increased strategic thinking and planning.

 

Senior management must come together and present a unified strategy for the entire company – which is a top down management style but it must be embraced from the bottom up. This is within a framework of enforced change as we seek to achieve excellence in all of our business units, especially in core infrastructure – those units which either produce money, or cost money. Some of our key investments we know are lost leaders, but other research will more than make up for those. Enforced change in this context means business units receive minimum budget until they comply.

 

We are still feeling the effects of the changes the Web brings in enterprise directly and for our customers; we continue to learn from the effects of communities and communication via the Web. The opportunities for growth are so enormous that it is all the more important that we curb spending where it is not required and apply it as much as possible to grow in creative arenas which still have huge untapped profit potential. It is not just about money, among hard core technologists – those who really love it – money is secondary in many ways - it’s about the fun stuff technology can bring as well as the benefit to serve humanity that technology brings.

 

High tech, information technology, and software development have made some strides to maturity but we are still learning new things; it will be a learning industry, discovering and inventing stuff for a long time to come.

 

p.s.

Enforced Change is a radically different challenge, and promises different ways of looking at human-to-human, individual-to-corporation, corporate-to-corporate, human-to- computer interactions, etc, which I plan to cover in future articles, so stay tuned!

  

About this mailing:

You are receiving this e-mail because you subscribed to Yahoo Featured Offers Intel respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the "Unsubscribe" link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by Google. Intel shall not be responsible or liable for the advertisers' content nor any of the goods or service advertised.

Prices and item availability subject to change without notice.

 

2009 IBM | Unsubscribe | More Newsletters | Privacy

 

Microsoft Corporation, WA 98052

 

This message was sent from iContact to editors@fgfs.com. It was sent from: iContact AutoResponder, 72 Meridian Pkwy Suite 00, Durham, NC 7193. You can modify/update your subscription via the link below.

My son has become fascinated with bitcoins, and so I had to get him a tangible one for Xmas (thanks Sim1!). The public key is imprinted visibly on the tamper-evident holographic film, and the private key lies underneath.

 

I too was fascinated by digital cash back in college, and more specifically by the asymmetric mathematical transforms underlying public-key crypto and digital blind signatures.

 

I remembered a technical paper I wrote, but could not find it. A desktop search revealed an essay that I completely forgot, something that I had recovered from my archives of floppy discs (while I still could).

 

It is an article I wrote for the school newspaper in 1994. Ironically, Microsoft Word could not open this ancient Microsoft Word file format, but the free text editors could.

 

What a fun time capsule, below, with some choice naivetés…

 

I am trying to reconstruct what I was thinking, and wondering if it makes any sense. I think I was arguing that a bulletproof framework for digital cash (and what better testing ground) could be used to secure a digital container for executable code on a rental basis. So the expression of an idea — the specific code, or runtime service — is locked in a secure container. The idea would be to prevent copying instead of punishing after the fact. Micro-currency and micro-code seem like similar exercises in regulating the single use of an issued number.

 

Now that the Bitcoin experiment is underway, do you know of anyone writing about it as an alternative framework for intellectual property?

  

IP and Digital Cash

@NORMAL:

Digital Cash and the “Intellectual Property” Oxymoron

By Steve Jurvetson

 

Many of us will soon be working in the information services or technology industries which are currently tangled in a bramble patch of intellectual property law. As the law struggles to find coherency and an internally-consistent logic for intellectual property (IP) protection, digital encryption technologies may provide a better solution — from the perspective of reducing litigation, exploiting the inherent benefits of an information-based business model, and preserving a free economy of ideas.

Bullet-proof digital cash technology, which is now emerging, can provide a protected “cryptographic container” for intellectual expressions, thereby preserving traditional notions of intellectual property that protect specific instantiations of an idea rather than the idea itself. For example, it seems reasonable that Intuit should be able to protect against the widespread duplication of their Quicken software (the expression of an idea), but they should not be able to patent the underlying idea of single-entry bookkeeping. There are strong economic incentives for digital cash to develop and for those techniques to be adapted for IP protection — to create a protected container or expression of an idea. The rapid march of information technology has strained the evolution of IP law, but rather than patching the law, information technology itself may provide a more coherent solution.

 

Information Wants To Be Free

Currently, IP law is enigmatic because it is expanding to a domain for which it was not initially intended. In developing the U.S. Constitution, Thomas Jefferson argued that ideas should freely transverse the globe, and that ideas were fundamentally different from material goods. He concluded that “Inventions then cannot, in nature, be a subject of property.” The issues surrounding IP come into sharp focus as we shift to being more of an information-based economy.

The use of e-mail and local TV footage helps disseminate information around the globe and can be a force for democracy — as seen in the TV footage from Chechen, the use of modems in Prague during the Velvet Revolution, and the e-mail and TV from Tianammen Square. Even Gorbachev used a video camera to show what was happening after he was kidnapped. What appears to be an inherent force for democracy runs into problems when it becomes the subject of property.

As higher-level programming languages become more like natural languages, it will become increasingly difficult to distinguish the idea from the code. Language precedes thought, as Jean-Louis Gassée is fond of saying, and our language is the framework for the formulation and expression of our ideas. Restricting software will increasingly be indistinguishable from restricting freedom of speech.

An economy of ideas and human attention depends on the continuous and free exchange of ideas. Because of the associative nature of memory processes, no idea is detached from others. This begs the question, is intellectual property an oxymoron?

 

Intellectual Property Law is a Patch

John Perry Barlow, former Grateful Dead lyricist and co-founder (with Mitch Kapor) of the Electronic Frontier Foundation, argues that “Intellectual property law cannot be patched, retrofitted or expanded to contain digitized expression... Faith in law will not be an effective strategy for high-tech companies. Law adapts by continuous increments and at a pace second only to geology. Technology advances in lunging jerks. Real-world conditions will continue to change at a blinding pace, and the law will lag further behind, more profoundly confused. This mismatch may prove impossible to overcome.”

From its origins in the Industrial Revolution where the invention of tools took on a new importance, patent and copyright law has protected the physical conveyance of an idea, and not the idea itself. The physical expression is like a container for an idea. But with the emerging information superhighway, the “container” is becoming more ethereal, and it is disappearing altogether. Whether it’s e-mail today, or the future goods of the Information Age, the “expressions” of ideas will be voltage conditions darting around the net, very much like thoughts. The fleeting copy of an image in RAM is not very different that the fleeting image on the retina.

The digitization of all forms of information — from books to songs to images to multimedia — detaches information from the physical plane where IP law has always found definition and precedent. Patents cannot be granted for abstract ideas or algorithms, yet courts have recently upheld the patentability of software as long as it is operating a physical machine or causing a physical result. Copyright law is even more of a patch. The U.S. Copyright Act of 1976 requires that works be fixed in a durable medium, and where an idea and its expression are inseparable, the merger doctrine dictates that the expression cannot be copyrighted. E-mail is not currently copyrightable because it is not a reduction to tangible form. So of course, there is a proposal to amend these copyright provisions. In recent rulings, Lotus won its case that Borland’s Quattro Pro spreadsheet copied elements of Lotus 123’s look and feel, yet Apple lost a similar case versus Microsoft and HP. As Professor Bagley points out in her new text, “It is difficult to reconcile under the total concept and feel test the results in the Apple and Lotus cases.” Given the inconsistencies and economic significance of these issues, it is no surprise that swarms of lawyers are studying to practice in the IP arena.

Back in the early days of Microsoft, Bill Gates wrote an inflammatory “Open Letter to Hobbyists” in which he alleged that “most of you steal your software ... and should be kicked out of any club meeting you show up at.” He presented the economic argument that piracy prevents proper profit streams and “prevents good software from being written.” Now we have Windows.

But seriously, if we continue to believe that the value of information is based on scarcity, as it is with physical objects, we will continue to patch laws that are contrary to the nature of information, which in many cases increases in value with distribution. Small, fast moving companies (like Netscape and Id) protect their ideas by getting to the marketplace quicker than their larger competitors who base their protection on fear and litigation.

The patent office is woefully understaffed and unable to judge the nuances of software. Comptons was initially granted a patent that covered virtually all multimedia technology. When they tried to collect royalties, Microsoft pushed the Patent Office to overturn the patent. In 1992, Software Advertising Corp received a patent for “displaying and integrating commercial advertisements with computer software.” That’s like patenting the concept of a radio commercial. In 1993, a DEC engineer received a patent on just two lines of machine code commonly used in object-oriented programming. CompuServe announced this month that they plan to collect royalties on the widely used GIF file format for images.

The Patent Office has issued well over 12,000 software patents, and a programmer can unknowingly be in violation of any them. Microsoft had to pay $120MM to STAC in February 1994 for violating their patent on data compression. The penalties can be costly, but so can a patent search. Many of the software patents don’t have the words “computer,” “software,” “program,” or “algorithm” in their abstracts. “Software patents turn every decision you make while writing a program into a legal risk,” says Richard Stallman, founder of the League for Programming Freedom. “They make writing a large program like crossing a minefield. Each step has a small chance of stepping on a patent and blowing you up.” The very notion of seventeen years of patent protection in the fast moving software industry seems absurd. MS-DOS did not exist seventeen years ago.

IP law faces the additional wrinkle of jurisdictional issues. Where has an Internet crime taken place? In the country or state in which the computer server resides? Many nations do not have the same intellectual property laws as the U.S. Even within the U.S., the law can be tough to enforce; for example, a group of music publishers sued CompuServe for the digital distribution of copyrighted music. A complication is that CompuServe has no knowledge of the activity since it occurs in the flood of bits transferring between its subscribers

The tension seen in making digital copies revolves around the issue of property. But unlike the theft of material goods, copying does not deprive the owner of their possessions. With digital piracy, it is less a clear ethical issue of theft, and more an abstract notion that you are undermining the business model of an artist or software developer. The distinction between ethics and laws often revolves around their enforceability. Before copy machines, it was hard to make a book, and so it was obvious and visible if someone was copying your work. In the digital age, copying is lightning fast and difficult to detect. Given ethical ambiguity, convenience, and anonymity, it is no wonder we see a cultural shift with regard to digital ethics.

 

Piracy, Plagiarism and Pilfering

We copy music. We are seldom diligent with our footnotes. We wonder where we’ve seen Strat-man’s PIE and the four slices before. We forward e-mail that may contain text from a copyrighted news publication. The SCBA estimates that 51% of satellite dishes have illegal descramblers. John Perry Barlow estimates that 90% of personal hard drives have some pirated software on them.

Or as last month’s Red Herring editorial points out, “this atmosphere of electronic piracy seems to have in turn spawned a freer attitude than ever toward good old-fashioned plagiarism.” Articles from major publications and WSJ columns appear and circulate widely on the Internet. Computer Pictures magazine replicated a complete article on multimedia databases from New Media magazine, and then publicly apologized.

Music and voice samples are an increasingly common art form, from 2 Live Crew to Negativland to local bands like Voice Farm and Consolidated. Peter Gabriel embraces the shift to repositioned content; “Traditionally, the artist has been the final arbiter of his work. He delivered it and it stood on its own. In the interactive world, artists will also be the suppliers of information and collage material, which people can either accept as is, or manipulate to create their own art. It’s part of the shift from skill-based work to decision-making and editing work.”

But many traditionalists resist the change. Museums are hesitant to embrace digital art because it is impossible to distinguish the original from a copy; according to a curator at the New Museum of Contemporary Art, “The art world is scared to death of this stuff.” The Digital Audio Tape debate also illustrated the paranoia; the music industry first insisted that these DAT recorders had to purposely introduce static into the digital copies they made, and then they settled for an embedded code that limited the number of successive copies that could be made from the a master source.

For a healthier reaction, look at the phenomenally successful business models of Mosaic/Netscape and Id Software, the twisted creator of Doom. Just as McAfee built a business on shareware, Netscape and Id encourage widespread free distribution of their product. But once you want support from Netscape, or the higher levels of the Doom game, then you have to pay. For industries with strong demand-side economies of scale, such as Netscape web browsers or Safe-TCL intelligent agents, the creators have exploited the economies of information distribution. Software products are especially susceptible to increasing returns with scale, as are networking products and most of the information technology industries.

Yet, the Software Publishers Association reports that 1993 worldwide losses to piracy of business application software totaled $7.45 billion. They also estimated that 89% of software units in Korea were counterfeit. And China has 29 factories, some state-owned, that press 75 million pirated CDs per year, largely for export. GATT will impose the U.S. notions of intellectual property on a world that sees the issue very differently.

Clearly there are strong economic incentives to protect intellectual property, and reasonable arguments can be made for software patents and digital copyright, but the complexities of legal enforcement will be outrun and potentially obviated by the relatively rapid developments of another technology, digital cash and cryptography.

 

Digital Cash and the IP Lock

Digital cash is in some ways an extreme example of digital “property” -- since it cannot be copied, it is possessed by one entity at a time, and it is static and non-perishable. If the techniques for protecting against pilferage and piracy work in the domain of cash, then they can be used to “protect” other properties by being embedded in them. If I wanted to copy-protect an “original” work of digital art, digital cash techniques be used as the “container” to protect intellectual property in the old style. A bullet-proof digital cash scheme would inevitably be adapted by those who stand to gain from the current system. Such as Bill Gates.

Several companies are developing technologies for electronic commerce. On January 12, several High-Tech Club members attended the Cybermania conference on electronic commerce with the CEOs of Intuit, CyberCash, Enter TV and The Lightspan Partnership. According to Scott Cook, CEO of Intuit, the motivations for digital cash are anonymity and efficient small-transaction Internet commerce. Anonymity preserves our privacy in the age of increasingly intrusive “database marketing” based on credit card purchase patterns and other personal information. Of course, it also has tax-evasion implications. For Internet commerce, cash is more efficient and easier to use than a credit card for small transactions.

“A lot of people will spend nickels on the Internet,” says Dan Lynch of CyberCash. Banks will soon exchange your current cash for cyber-tokens, or a “bag of bits” which you can spend freely on the Internet. A competitor based in the Netherlands called DigiCash has a Web page with numerous articles on electronic money and fully functional demo of their technology. You can get some free cash from them and spend it at some of their allied vendors.

Digital cash is a compelling technology. Wired magazine calls it the “killer application for electronic networks which will change the global economy.” Handling and fraud costs for the paper money system are growing as digital color copiers and ATMs proliferate. Donald Gleason, President of the Smart Card Enterprise unit of Electronic Payment Services argues that “Cash is a nightmare. It costs money handlers in the U.S. alone approximately $60 billion a year to move the stuff... Bills and coinage will increasingly be replaced by some sort of electronic equivalent.” Even a Citibank VP, Sholom Rosen, agrees that “There are going to be winners and losers, but everybody is going to play.”

The digital cash schemes use a blind digital signature and a central repository to protect against piracy and privacy violations. On the privacy issue, the techniques used have been mathematically proven to be protected against privacy violations. The bank cannot trace how the cash is being used or who is using it. Embedded in these schemes are powerful digital cryptography techniques which have recently been spread in the commercial domain (RSA Data Security is a leader in this field and will be speaking to the High Tech Club on January 19).

To protect against piracy requires some extra work. As soon as I have a digital $5 bill on my Mac hard drive, I will want to make a copy, and I can. (Many companies have busted their picks trying to copy protect files from hackers. It will never work.). The difference is that I can only spend the $5 bill once. The copy is worthless. This is possible because every bill has a unique encrypted identifier. In spending the bill, my computer checks with the centralized repository which verifies that my particular $5 bill is still unspent. Once I spend it, it cannot be spent again. As with many electronic transactions today, the safety of the system depends on the integrity of a centralized computer, or what Dan Lynch calls “the big database in the sky.”

One of the most important limitations of the digital cash techniques is that they are tethered to a transaction between at least three parties — a buyer, seller and central repository. So, to use such a scheme to protect intellectual property, would require networked computers and “live” files that have to dial up and check in with the repository to be operational. There are many compelling applications for this, including voter registration, voting tabulation, and the registration of digital artwork originals.

When I asked Dan Lynch about the use of his technology for intellectual property protection, he agreed that the bits that now represent a $5 bill could be used for any number of things, from medical records to photographs. A digital photograph could hide a digital signature in its low-order bits, and it would be imperceptible to the user. But those bits could be used with a registry of proper image owners, and could be used to prove misappropriation or sampling of the image by others.

Technology author Steven Levy has been researching cryptography for Wired magazine, and he responded to my e-mail questions with the reply “You are on the right track in thinking that crypto can preserve IP. I know of several attempts to forward plans to do so.” Digital cash may provide a “crypto-container” to preserve traditional notions of intellectual property.

The transaction tether limits the short-term applicability of these schemes for software copy protection. They won’t work on an isolated computer. This certainly would slow its adoption for mobile computers since the wireless networking infrastructure is so nascent. But with Windows ’95 bundling network connectivity, soon most computers will be network-ready — at least for the Microsoft network. And now that Bill Gates is acquiring Intuit, instead of dollar bills, we will have Bill dollars.

The transaction tether is also a logistical headache with current slow networks, which may hinder its adoption for mass-market applications. For example, if someone forwards a copyrighted e-mail, the recipient may have to have their computer do the repository check before they could see the text of the e-mail. E-mail is slow enough today, but in the near future, these techniques of verifying IP permissions and paying appropriate royalties in digital cash could be background processes on a preemptive multitasking computer (Windows ’95 or Mac OS System 8). The digital cash schemes are consistent with other trends in software distribution and development — specifically software rental and object-oriented “applets” with nested royalty payments. They are also consistent with the document-centric vision of Open Doc and OLE.

The user of the future would start working on their stationary. When it’s clear they are doing some text entry, the word processor would be downloaded and rented for its current usage. Digital pennies would trickle back to the people who wrote or inspired the various portions of the core program. As you use other software applets, such as a spell-checker, it would be downloaded as needed. By renting applets, or potentially finer-grained software objects, the licensing royalties would be automatically tabulated and exchanged, and software piracy would require heroic efforts. Intellectual property would become precisely that — property in a market economy, under lock by its “creator,” and Bill Gates’ 1975 lament over software piracy may now be addressed 20 years later.

 

--------end of paper-----------

 

On further reflection, I must have been thinking of executable code (where the runtime requires a cloud connect to authenticate) and not passive media. Verification has been a pain, but perhaps it's seamless in a web-services future. Cloud apps and digital cash depend on it, so why not the code itself.

 

I don't see it as particularly useful for still images (but it could verify the official owner of any unique bundle of pixels, in the sense that you can "own" a sufficiently large number, but not the essence of a work of art or derivative works). Frankly, I'm not sure about non-interactive content in general, like pure video playback. "Fixing" software IP alone would be a big enough accomplishment.

Its midnight, and Im writing this probably well before I slip back into the comfort of sleep. More to ensure it gets done before my migrain creeps back n my mind turns back to a possible explosive.

My day, pretty much sucked. I slept until 3 in the afternoon. Woke up with the same throbbing headache I had went to sleep with, a sorer throat than I had went to sleep with, and a less stuffed but still stuffed nose. Lame. Once I finally decided to move, which seriously hurt in my gerneral brain region, I took a shower. Showers help me feel better, this one didnt help much. Certainly the worse headache Iv had in awhile, stress is getting to me. Its been a long time since Iv had to fight so hard to not have a panic attack, and a long time since Iv cried so much. Depression is something Ill more than likely be struggling with forever, its just how its always been. But thankfully I can maintain it and understand it now, and Im fully aware that life is constantly going to go from up to down n so on n so forth. I love how I keep switching from "n" to "and" lol I could never be a writer, atleast not without Microsoft Word. Anywho. I wrapped up Adrians presents the night before and brought them downstairs for him. It was sweet seeing how excited he got. I miss that boy, we dont spend much time together anymore. He opened his dinosaurs first, called them both dragons (thats my boy!), but answered correctly with a "rawrrr" when I asked when what dinosaurs say. Next he opened his outfit which he was surprisingly excited about lol I cant wait to see it on him, trust me Ill take pictures! And last he opened his pink baseball bat n baseball (u know the kind thats soft n squishy n mostly child safe). Pink was the only color they had left but I wasnt concerned about it, the boys a little fruity anyway I mean he has a purse n gets pissed if u dont give it to him, n wears Kiaras heels all the time lol Its ok, atleast its some what manly. Rachael was automatically like "Football, Jenny. Football." I replied with "Baseball players are hotter" lol even if it is more complicated. He liked it tho. He putted his ball around for awhile, maybe I should have gotten his golf clubs! But he certainly looked cute with it, I took a few pictures. I ended up watching him for awhile while they were out. I didnt feel too hot so we didnt have too much fun but he was shockingly well behaved. I love that kid. He never ceases to amaze me, or amuse me for that matter. I went back to my bed in my dimly lit room once they got back. I cant recall what I did, probably nothing. Iv done a lot of hiding under my pillow today. But I read some, watched bits n peices of Easy A.. as much as my migrain would let me. Looking at a bright box of light n listening to noise doesnt really help, but then again neither does focusing on small print but I had to do something. My migrain ended up ALMOST going away. Until I got some news. Apparently Im accompanying Ryan a New Years party. Itll be more than likely the same group of people Iv been around a few time before like at the wedding n the banquet, I like these people. Theyv all been nice to me. But theres a nice possibility that itll be a bad night. I dont wanna talk about it, not like this anyway, its not just about me or u know Id share it with the world but I try my best to keep others privacy in mind. But lets just say if what I dont want to happen happens theres a huge possibility for my fragile female mind to snap. Hopefully I wont cry in front of everyone. But Ill end up cuddling with my pillow, n not sleeping. N Ill be fighting an internal brain battle for weeks to come, I havent even won the last battle yet. Curse u female mind, curse u. I still feel sick from the whole matter but the tears have stopped falling. But my lord did that amplify my headache. I could have swore my brain would burst. My eyes had so much pressure behind them I was afraid to open them n my forehead was sensitive to the touch. Ryan has this amazing way of bringing back my smile, and Im thankful for that cause once I stopped crying the headache started to lift a bit. N just for the record cause I know Im sparring a lot of details here, he didnt do anything to make me cry, its strictly a fragile female thing I cant control.. no matter how hard I try. I dont want any of u thinking hes some bad guy that makes me cry cause its really the opposite. Hes amazing. He means the world to me, honest. I was a Girl Scout, I was taught not to lie lol. Speaking of Ryan. I miss him like mad, Im going a tad Looney Tunes. Thankfully we got to talk more today than yesterday, he said his phone had died. Damn phones lol. Just 3 more days n I can hug him as tight as my little arms will let me lol. I finished Feed. I really liked/really disliked that book. U know how I was complaining about how it didnt explain things right away when itd mention things? Well that continued but not in the same obnoxious way, more in a suspensful way. It was a good book, glad I read it. It kept me entertained n in a lot of ways it was written how I would have done it if I were to write a book (I still need to finish my "book" btw), n by that I mean unprofessionally. It impressed me in a lot of ways. The setting n the main plot of the story was pretty far fetched with zombies n all but the way it was written it was completely believable, she did a great job there. SPOILER ALERT! Two main characters die, one more main than the other. I almost cried when the first one died, I did cry when the 2nd died. I hate when things make me cry. I rarely cry during movies (I think that only happened once), books get to me more than movies do. But I still hate it when authors off the main characters, and then still have the nerve to continue the series. Feed was the first of 3 books. I need Deadline now. Well anyway. Ill probably try to watch Easy A again. My migrain has died down, my temples still hurt but my eyeballs no longer feel like popping out.

 

Sticky note... This is something I never wanted to do, something Im terribly afraid of doing. But in my very favorite song, Everybodys free (to wear sunscreen), it says to do one thing everyday that scares u. Now I dont follow that rule, my life isnt nearly that exciting, but this is a fear I can over come. And I will. If given the chance to ride with a SAFE and EXPERIENCED driver I will indeed get on the back of a motorcycle. I will be scared out of my mind but u only live once so fear isnt practicle lol I find it funny how I know this but that doesnt change the fact that fear burdons my everyday life n always will.

Picture is of myself eating my giant candy cane I got from Ellen, n its thrown together with my sticky note. Original I know, but arent all of my photos?

 

Sorry my write ups have been so down lately. Im a downer of a read, n I apologize. But hey, my up will come again soon n Ill get more exciting. Maybe not exciting, but more chipper lol. Thanks for reading, sorry if Iv bummed ya out, and goodnight. Be well :)

Oh n Rise up while you can.

 

Sexy Silk

Photo

 

Servers at the Microsoft data center in Dublin. Credit Microsof.

A broad array of organizations in technology, media and other fields rallied on Monday behind Microsoft’s effort to block American authorities from seizing a customer’s emails stored in Ireland.

The...

 

www.baindaily.com/bits-blog-tech-and-media-companies-back...

Photo

 

Servers at the Microsoft data center in Dublin. Credit Microsof.

A broad array of organizations in technology, media and other fields rallied on Monday behind Microsoft’s effort to block American authorities from seizing a customer’s emails stored in Ireland.

The...

 

www.baindaily.com/bits-blog-tech-and-media-companies-back...

About this mailing:

 

You are receiving this e-mail because you subscribed to GMail Featured Offers Microsoft respects your privacy.

If you do not wish to receive this GMail Featured Offers e-mail, please click the "Unsubscribe" link below.

This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in IBM Feature Offers.

This shall not constitute an offer by IBM. MSN shall not be responsible or liable for the advertisers'

content nor any of the goods or service advertised.

 

Prices and item availability subject to change without notice.

 

2009 Microsoft | Unsubscribe | More Newsletters | Privacy

 

Intel Corporation, WA 98052

 

This message was sent from iContact to editors@rzpwc.com. It was sent from: iContact AutoResponder, 14 Meridian Pkwy Suite 81, Durham, NC 3323.

You can modify/update your subscription via the link below.

About this mailing:

 

You are receiving this e-mail because you subscribed to Intel Featured Offers Microsoft respects your privacy.

If you do not wish to receive this IBM Featured Offers e-mail, please click the "Unsubscribe" link below.

This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers.

This shall not constitute an offer by MSN. IBM shall not be responsible or liable for the advertisers'

content nor any of the goods or service advertised.

 

Prices and item availability subject to change without notice.

 

2009 IBM | Unsubscribe | More Newsletters | Privacy

 

Sun Microsystems Corporation, WA 98052

 

This message was sent from iContact to editors@aek.com. It was sent from: iContact AutoResponder, 79 Meridian Pkwy Suite 22, Durham, NC 4539.

You can modify/update your subscription via the link below.

About this mailing:

 

You are receiving this e-mail because you subscribed to Intel Featured Offers Intel respects your privacy.

If you do not wish to receive this Intel Featured Offers e-mail, please click the "Unsubscribe" link below.

This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in Intel Feature Offers.

This shall not constitute an offer by Intel. Google shall not be responsible or liable for the advertisers'

content nor any of the goods or service advertised.

 

Prices and item availability subject to change without notice.

 

2009 Microsoft | Unsubscribe | More Newsletters | Privacy

 

Microsoft Corporation, WA 98052

 

This message was sent from iContact to editors@nael.com. It was sent from: iContact AutoResponder, 72 Meridian Pkwy Suite 34, Durham, NC 0100.

You can modify/update your subscription via the link below.

Specifications

  

Type

Compact digital still camera with built-in flash, 5x Optical, 4x Digital and 20x Combined Zoom with Optical Image Stabilizer

 

Image Capture Device

 

Type

12.1 Megapixel, 1/1.7-inch CMOS

  

Total Pixels

Approx. 13.3 Megapixels

  

Effective Pixels

Approx. 12.1 Megapixels

  

Lens

 

Focal Length

6.1 (W) - 30.5 (T) mm (35mm film equivalent: 28-140mm)

  

Digital Zoom

4.0x

  

Focusing Range

Normal: 2.0 in. (5cm) - infinity (W), 1.3 ft. (40cm) - infinity (T)

 

Normal with Tele-converter: 2.0 in. (5cm) - infinity (W), 2.5 ft. (75cm) - infinity (T)

 

Auto: 0.4 in. (1cm) - infinity (W), 1.3 ft. (40cm) - infinity (T)

 

Auto with Tele-converter: 2.5 ft. (75cm) - infinity (T)

 

Macro AF: 0.4 in. - 1.6 ft. (1-50cm) (W)

  

Autofocus System

TTL Autofocus, Manual Focus

  

Viewfinders

 

Optical Viewfinder

Real-image zoom viewfinder

  

LCD Monitor

3.0-inch TFT Colour LCD with wide viewing angle

  

LCD Pixels

Approx. 922,000 dots

  

LCD Coverage

Approx. 100%

  

Aperture and Shutter

 

Maximum Aperture

f/1.8 (W), f/2.8 (T)

  

Shutter Speed

1-1/4000 sec.

 

15-1/4000 sec. (in Tv and M modes)

  

Exposure Control

 

Sensitivity

Auto, ISO 80/100/125/160/200/250/320/400/500/640/800/1250/ 1600/2000/2500/3200/4000/5000/6400/8000/10000/12800

  

Light Metering Method

Evaluative*, Center-weighted average, Spot**

 

* Facial brightness is evaluated in Face Detection AF

 

** Metering frame is fixed to the center

  

Exposure Control Method

Manual Exposure, Program Shift, Safety Shift, AE Lock

  

Exposure Compensation

Still Images: ±3 stops in 1/3-stop increments

 

Videos: ±3 stops in 1/3-stop increments (not available during shooting)

  

White Balance

 

White Balance Control

Auto*, Daylight, Cloudy, Tungsten, Fluorescent, Fluorescent H, Flash, Underwater, Custom 1, Custom 2

 

* Camera automatically sets the optimal ISO speed according to shooting mode.

  

Flash

 

Built-in Flash

Auto, Flash On, Slow Synchro, Flash Off

 

- Facial brightness is also evaluated in Face Detect.

  

Flash Range

1.6 ft. - 23 ft. (W), 1.6 - 15 ft. (T) (50cm - 7.0m (W), (50cm - 4.5m (T))

 

Image brightness may diminish depending on the shooting distance.

  

Recycling Time

10 sec. or less (battery voltage: 7.4 V)

  

Flash Exposure Compensation

+/-2 stops in 1/3-stop increments

  

Shooting Specifications

 

Shooting Modes

C1, C2, M, Av, Tv, P, Auto, Movie Digest, SCN*1, Creative Filters*2, Movie*3

 

- Shooting movies is possible with the movie button

 

*1 Portrait, Smooth Skin, Smart Shutter*4, High-Speed Burst HQ, Handheld NightScene, Underwater, Snow, Fireworks, Stitch Assist

 

*2 High Dynamic Range, Nostalgic, Fish-eye Effect, Miniature Effect, Toy Camera Effect, Soft Focus, Monochrome, Super Vivid, Poster Effect, Colour Accent, Colour Swap

 

*3 Standard, iFrame Movie, Super Slow Motion Movie

 

*4 Smile, Wink Self-timer, Face Self-timer

  

Photo Effects

My Colours Off, Vivid, Neutral, Sepia, Black & White, Positive Film, Lighter Skin Tone, Darker Skin Tone, Vivid Blue, Vivid Green, Vivid Red, Custom Colour*

 

*Adjustment of contrast sharpness, saturation, red, green, blue and skin tone are available

  

Self Timer

Approx. 10-sec. delay/approx. 2-sec. delay/custom*

 

*Delay time (0-15 sec. (in one-second increments), 20/25/30 sec.) and number of shots (1-10 shots (in one-shot increments)) can be specified.

  

Wireless Control

Not available

  

Continuous Shooting

1) Normal: Approx. 2.1 shots/sec. (in P mode)

 

Approx. 10 shots/sec.* (in High-Speed Burst HQ)

 

2) AF: Approx. 0.9 shots/sec. (in P mode)

 

Approx. 5.2 shots/sec.* (in High-Speed Burst HQ)

 

3) LV: Approx. 0.9 shots/sec. (in P mode)

 

- Under conditions where the flash does not fire automatically

 

- Differs depending on the zoom position.

 

*Maximum continuous capture is 10 frames.

 

Image Storage

 

Storage Media

SD Memory Card, SDHC Memory Card, SDXC Memory Card

  

File Format

Design rule for Camera File system, DPOF (Version 1.1) compliant

  

Image Recording Format

Superfine / Fine

  

JPEG Compression Mode

Still Image: Exif. 2.3 (JPEG)

 

Video: MOV (Image: H.264; Audio: Linear PCM (Stereo))

  

Number of Recording Pixels

Still Images:

 

1) 16:9 - Large: 4000 x 2248; Medium 1: 2816 x 1584; Medium 2: 1920 x 1080; Small: 640 x 360; RAW: 4000 x 2248

 

2) 3:2 - Large: 4000 x 2664; Medium 1: 2816 x 1880; Medium 2: 1600 x 1064; Small: 640 x 424; RAW: 4000 x 2664

 

3) 4:3 - Large: 4000 x 3000; Medium 1: 2816 x 2112; Medium 2: 1600 x 1200; Small: 640 x 480; Raw: 4000 x 3000

 

4) 1:1 - Large: 2992 x 2992; Medium 1: 2112 x 2112; Medium 2: 1200 x 1200; Small: 480 x 480; RAW: 2992 x 2992

 

5) 4:5 - Large: 2400 x 3000; Medium 1: 1696 x 2112; Medium 2: 960 x 1200; Small: 384 x 480; RAW: 2400 x 3000

 

Videos:

 

Full HD 1920 x 1080: 24 fps (23.976)

 

HD 1280 x 720: 30 fps (29.97)

 

iFrame Movie HD 1280 x 720: 30 fps (29.97)

 

Movie Digest HD 1280 x 720: 30 fps (29.97)

 

Miniature Effect HD 1280 x 720: 6 fps / 3 fps / 1.5 fps

 

Miniature Effect 640 x 480: 6 fps / 3 fps / 1.5 fps

 

Super Slow Motion Movie 640 x 480: 120 fps

 

Super Slow Motion Movie 320 x 240: 240 fps

 

640 x 480: 30 fps (29.97)

  

Number of Recordable Images

 

Image data

 

16:9 3:2

File Size (KB) 8 GB 32 GB File Size (KB) 8 GB 32 GB

Large (L) SF 4,507 1,729 6,980 5,134 1,515 6,118

F 2,915 2,640 10,659 3,247 2,384 9,624

Medium 1(M1) SF 2,630 2,923 11,801 2,914 2,640 10,659

F 1,814 4,234 17,091 1,945 3,961 15,989

Medium 2(M2) SF 1,095 6,822 27,537 899 8,187 33,044

F 604 12,280 49,567 496 14,448 58,314

Small (S) SF 188 35,089 141,622 221 30,703 123,919

F 113 49,125 198,271 133 40,937 165,225

RAW RAW 17,680 442 1,788 17,585 444 1,798

RAW+JPEG RAW+JPEG NA NA RAW+JPEG NA NA

  

4:3 1:1

File Size (KB) 8 GB 32 GB File Size

(KB) 8 GB 32 GB

Large (L) SF 5,661 1,379 5,568 4,224 1,832 7,397

F 3,537 2,192 8,850 2,640 2,923 11,801

Medium 1(M1) SF 3,173 2,431 9,814 2,365 3,274 13,217

F 2,073 3,721 15,020 1,549 4,912 19,826

Medium 2(M2) SF 1,002 7,442 30,040 760 9,824 39,653

F 558 12,927 52,176 420 16,374 66,090

Small (S) SF 249 27,291 110,150 188 35,089 141,622

F 150 40,937 165,225 113 49,125 198,271

RAW RAW 17,529 446 1,804 17,415 448 1,814

RAW+JPEG RAW+JPEG NA NA RAW+JPEG NA NA

  

4:5

File Size

(KB) 8 GB 32 GB

Large (L) SF 3,396 2,273 9,178

F 2,121 3,611 14,578

Medium 1(M1) SF 1,898 4,026 16,251

F 1,243 6,140 24,783

Medium 2(M2) SF 608 12,280 49,567

F 336 20,468 82,612

Small (S) SF 150 40,937 165,225

F 90 61,406 247,838

RAW RAW 17,347 450 1,821

RAW+JPEG RAW+JPEG NA NA

Note: SF=Superfine F=Fine

*The approximate number of images recordable on memory cards other than the above can be calculated by using the above figures as a reference and extrapolating accordingly.

  

Time of Recordable Movies

 

Movie data

 

iFrame Movie, Movie Digest Mode*1 Miniature Effect

HD: 1280 x 720 HD: 1280 x 720 640 x 480

30 fps*2 5x 10x 20x 5x 10x 20x

6 fps*3 3 fps*3 1.5 fps*3 6 fps*3 3 fps*3 1.5 fps*3

Movie Size

(KB/sec.) 4701 573 287 143 246 123 61

8 GB 27 min. 39 sec. 3 hrs. 35 min. 27 sec. 6 hrs. 49 min. 22 sec. 11 hrs. 22 min. 17 sec. 7 hrs. 34 min. 51 sec. 13 hrs. 38 min. 45 sec. 22 hrs. 44 min. 36 sec.

32 GB 1 hr. 51 min. 37 sec. 14 hrs. 29 min. 36 sec. 27 hrs. 32 min. 15 sec. 45 hrs. 53 min. 45 sec. 30 hrs. 35 min. 50 sec. 55 hrs. 04 min. 31 sec. 91 hrs. 47 min. 32 sec.

  

Super Slow Motion Movie Other

640 x 480 320 x 240

Full HD: 1920 x 1080

HD: 1280 x 720 640 x 480

120 fps*3 240 fps*3 24 fps*4 30 fps*2 30 fps*2

Movie size (KB/sec.) 4914 2457 4355 3054 1416

8 GB 26 min. 24 sec. 52 min. 28 sec. 29 min. 39 sec. 42 min. 11 sec. 1 hr. 28 min. 59 sec.

32 GB 1 hr. 46 min. 35 sec. 3 hrs. 31 min. 49 sec. 1 hr. 59 min. 43 sec. 2 hrs. 50 min. 19 sec. 5 hrs. 59 min. 10 sec.

*1Movie Digest refers to the created movie.

*2Actual frame rate is 29.97 fps.

*3Playback frame rate is 30 fps*2.

*4Actual frame rate is 23.976 fps.

 

Playback Specifications

 

Playback Modes File

Stills & Videos:

 

Auto Rotate (Automatic vertical/horizontal detection), Index Continuous Display, Image Advance (Operation Tools, Transition Effects, Scroll Display), Rotate, Favorites, My Category, Smart Shuffle, Group Playback, Movie Digest, Slideshow (Playback Interval, Repeat, Effect, Playlist)

 

Still Images:

 

Single, Index, Magnification (2-10x), Switch to other images while zoomed, Information Display, Red-eye Correction, i-Contrast, Photobook Setup, Trimming, Resize, My Colours, Face ID info, Focus Check, Histogram, RGB Histogram, Location Information, Overexposure Warning

 

Videos:

 

Normal Playback*1, Slow Motion, Skip Backward*2, Previous Frame*3, Next Frame*3, Skip Forward*2, Erase chapters, Editing

 

Using the software included with the camera (ImageBrowser EX), there are 8 levels (1/8x to 1x) of playback speed for Super Slow Motion Movies possible on a computer.

 

*1 Audio settings available in 5 levels

 

*2 Approximately 4 seconds

 

*3 Slow motion available

  

Erasing Specifications

 

Erase Modes

Select Image, Select Range, Select All Images

 

- The image data in the memory card stored with the Design rule for Camera File systems format can be erased (however, protected images cannot be erased).

 

- Using the Movie editing function, sections of the movie can be deleted.

 

Interfaces

 

Video Out

NTSC/PAL (dedicated connector (female) with unified type of digital, audio and video)

 

Mini-HDMI connector

  

Audio Out

Stereo (dedicated connector (female) with unified type of digital, audio and video)

  

Other

SD memory card slot; direct connection to Canon SELPHY, PIXMA Photo Printers & PictBridge compatible printers

  

Power Source

Battery Pack NB-10L, Compact Power Adapter CA-PS700 (included with AC Adapter Kit ACK-DC80)

  

Shooting Capacity

Approx. 350 shots using LCD monitor

 

Approx. 770 shots when LCD monitor is off

  

Playback Time

Approx. 7 hours

  

Physical Specifications

 

Operating Temperature

32-104°F/0-40°C

  

Operating Humidity

10-90%

  

Dimensions (W x H x D)

4.20 x 2.99 x 1.58 in. / 106.6 x 75.9 x 40.1mm

  

Weight

12.4 oz. / 352g (CIPA standard)

 

10.9 oz. / 310g (camera only)

    

..

 

30 display languages provided (English, German, French, Dutch, Danish, Finnish, Italian, Norwegian, Swedish, Spanish, Simplified/Traditional Chinese, Japanese, Russian, Portuguese, Korean, Greek, Polish, Czech, Hungarian, Turkish, Thai, Arabic, Romanian, Ukrainian, Farsi, Hindi, Malay, Indonesian and Vietnamese).

All data are based on Canon's Standard Test Method. Subject to change without notice.

Canon, DIGIC, ELPH, PIXMA, and PowerShot and SELPHY are registered trademarks of Canon Inc. in Canada and may also be registered trademarks or trademarks in other countries. Microsoft, Windows and Windows Vista are trademarks or registered trademarks of Microsoft Corporation in Canada and/or other countries. Mac is a trademark of Apple, Inc., registered in Canada and other countries. All other products and brand names are registered trademarks, trademarks or service marks of their respective owners in Canada and/or other countries.

    

.

   

--------------------------------------------------------------------------------

     

--------------------------------------------------------------------------------

      

.

.

 

Careers

|

MSDS Search

|

Contact Us

|

Product Advisories

|

Site Map

|

Terms of Use

|

Privacy Policy

|

Donations & Sponsorships

 

behance _ be.net/newart

 

911 9-11 advertising afghanistan africa america animals animation apple architecture art astronomy australia batshitinsane bbc biology blog blogging blogs books brokenlink bush business california canada cars cartoons censorship children china christmas cinema comedy comics computers copyright crime culture deadlink death design documentary drugs economics economy education election elections environment evolution fashion fiction film flash food football france fun funny game games gaming gay georgebush georgewbush google government gwb health history humor illustration india internet iran iraq iraqwar islam israel japan journalism language law literature london maps math media medicine microsoft military money movie movies mp3 murder music nasa news newsfilter newyork newyorktimes nsfw nyc nytimes obama obit obituary parody philosophy photographs photography photos physics poetry police politics privacy psychology race racism radio religion research rock russia satire science sciencefiction security sex slyt software space sports technology television terrorism travel tv uk us usa video videogames war web women writing youtube

SEE THE SHOW HERE

This is the photos and unedited camera raw footage under 90 seconds from the SHIZ vlog archived on Flickr. Videos over 90 seconds are archived on YouTube. Visit the link below for more information.

vlog 20120815: mini-shiz - iLOG Microsoft Privacy Roof Carport (show ms-imprc)

 

10/1/10. Portland, Oregon. Nikon Coolpix S8000. Handheld. SOOC, then licence plate edited w/ Microsoft Paint for privacy.

 

This is a window view.

i do not want yahoo or flickr to be owned by microsoft.

 

why? because microsoft is not a customer oriented company. they're an enterprise company. they have a terrible record when it comes to customer service, customer privacy, and customer choice.

 

they rarely innovate, and when they can't, they use their enormous coffers to try to buy up someone else's wow-factor.

 

and it never works. you know internet explorer? the worst web browser in existence? well it exists because microsoft missed the boat on the internet in the early 90s, bought a partially complete web browser from another company, then violated the terms of their contract, and then continued to leave the browser broken.

 

i thought that yahoo's announcement to adopt openID was great news, and i doubt microsoft will follow through on that. passport, anyone?

 

and while i don't think that yahoo and it's properties are going to radically change right away; they will be tainted, and grow more so as time goes on.

 

and it's not that i'm worried that the sky is falling or anything like that, i just don't like the idea. period.

8/16/10. Portland, Oregon. While riding. Nikon Coolpix S8000. Handheld. Licence plate edited w/ Microsoft Paint to protect privacy.

7/29/10. Portland, Oregon. Nikon Coolpix S8000. Handheld. Licence plates edited w/ Microsoft Paint to protect privacy.

About this mailing:

 

You are receiving this e-mail because you subscribed to Intel Featured Offers Intel respects your privacy.

If you do not wish to receive this Intel Featured Offers e-mail, please click the "Unsubscribe" link below.

This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in Intel Feature Offers.

This shall not constitute an offer by Intel. Google shall not be responsible or liable for the advertisers'

content nor any of the goods or service advertised.

 

Prices and item availability subject to change without notice.

 

2009 Microsoft | Unsubscribe | More Newsletters | Privacy

 

Microsoft Corporation, WA 98052

 

This message was sent from iContact to editors@nael.com. It was sent from: iContact AutoResponder, 72 Meridian Pkwy Suite 34, Durham, NC 0100.

You can modify/update your subscription via the link below.

Explosives, guns, assassination, conspiracy, primers, detonators, Kakadan, initiators, main charge, nuclear charges, ambush, sniping, motorcade, IRS, ETA, FARC, Cuba, Castro, Che Guevara, revolution, ATTAC, BATF, jtf-6, mjtf, hrt, srt, hostages, munitions, weapons, TNT, rdx, amfo, love, peace, hmtd, picric acid, silver itrite, mercury fulminate, presidential motorcade, Greenpeace, Chirac, salt peter, charcoal, sulfur, c4, composition b, petn, lead azide, lead styphante, ddnp, tetryl, nitrocellulose, nitrostarch, mines, grenades, rockets, fuses, delay mechanism, mortars, rpg7, propellants, incendiaries, incendiary device, thermite, security forces, intelligence, agencies, hrt, resistance, psyops, infiltration, assault team, defensive elements, evasion, detection, mission, communications, the football, platter charge, shaped charges, m118, claymore, body armor, charges, shrapnel, timers, timing devices, boobytraps, detcord, pmk 40, silencers, Uzi, HK-MP5, AK-47, FAL, Jatti, Skorpion MP, teflon bullets, cordite, napalm, law, Stingers, RPK, SOCIMI 821 SMG, STEN, BAR, MP40, HK-G3,FN-MAG, RPD,PzB39, Air Force One, M60, RPK74, SG530, SG540, Galil arm, Walther WA2000, HK33KE, Parker-Hale, MOD. 82, AKR, Ingram MAC10, M3, L34A1, Walther MPL, AKS-74, HK-GR6, subsonic rounds, ballistic media, special forces, JFKSWC, SFOD-D, SRT, Rewson, SAFE, Waihopai, INFOSEC, ASPIC, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Kenya, Terrorism Defensive, José Bové, Confédérarion Paysanne, Information, Defense Information Warfare, Offensive Information, listeriose, listeria, Offensive Information Warfare, NAIA, SAPM, ASU, ECHELON ASTS, National Information Infrastructure, InfoSec, SAO, Reno, Compsec, JICS, Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secret Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet, AOL, AOL, street fight, against, TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, Tanzania, SAMU, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN, 877, NAVELEXSYSSECENGCEN, BZ, CANSLO, CBNRC, CIDA, JAVA, rsta, Active X, Compsec 97, RENS, LLC, DERA, JIC, rip, rb, Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?, SADT, Steve Case, Tools, RECCEX, Telex, OTAN, monarchist, NMIC, NIOG, IDB, MID/KL, NADIS, NMI, SEIDM, BNC, CNCIS, STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, SARL, Military Intelligence, JICA, Scully, recondo, Flame, Infowar, Bubba, Freeh, Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA, NCSA, ASVC, spook words, RRF, 1071, Bugs Bunny, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce, Lacrosse, Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, Chávez, mouvement, movement, site, SASSTIXS, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, SARD, Marx, Groucho Marx, Marx Brothers, LABLINK, USACIL, SAPT, USCG, NRC, ~, O, NSA/CSS, CDC, DOE, SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, bemd, SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA, SHAPE, bird dog, SACLANT, BECCA, DCJFTF, HALO,SC, TASAS, Lander, GSM, T Branch, AST, SAMCOMM, HAHO, FKS, 868, GCHQ, DITSA,SORT,AMEMB, NSG, HIC, EDI, benelux, SAS, SBS, SAW, UDT, EODC, GOE, catholic,integrist, exorcist, DOE, SAMF, GEO, JRB, 3P-HV, Masuda, Forte, AT,GIGN,Exon Shell, radint, MB, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS,GEOS, EADA, SART, FLB, Bretagne, BBE, STEP, Echelon, Dictionary, MD2, MD4,MDA, diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11, EODN, SHS,^X, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, NSS, Duress,RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11, SERT, VIP, ARC,S.E.T.Team, NSWG, MP5k, SATKA, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV,NACSI, MEU/SOC,PSAC, PTT, RFI, EDF, ZL31, SIGDASYS, TDM, SUKLO, SUSLO,TELINT, fake, TEXTA, ELF, LF, MF, CGT, SIGS, VHF, Recon, peapod,PA598D28,Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF, SHF, ASIO, SASP, WANK,Colonel,domestic disruption, divorce, 5ESS, smuggle, Z-200, 15kg, DUVDEVAN, RFX,nitrate, OIR, Pretoria, M-14, enigma, Bletchley Park, Clandestine, NSO,nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, SARA, RapidReaction, JSOFC3IP, Corporate Security, Police, sniper, PPS, ASIS,ASLET,TSCM, Security Consulting, M-x spook, Z-150T, High Security, SecurityEvaluation, Electronic Surveillance, MI-17, ISR, NSAS,Counterterrorism,real, spies, IWO, eavesdropping, debugging, CCSS, interception, COCOT,NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn, NAVCM,Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, tc, 2EME REP,FID,7NL SBS, tekka, captain, 226, .45, nonac, .li, Ionosphere, Mole,Keyhole,NABS, Kilderkin, Artichoke, Badger, Emerson, Tzvrif, SDIS, T2S2, STTC,DNR,NADDIS, NFLIS, CFD, quarter, Cornflower, Daisy, Egret, Iris, JSOTF,Hollyhock, Jasmine, Juile, Vinnell, B.D.M., Sphinx, Stephanie,Reflection,Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, rusers, Covert Video,Intiso,r00t, lock picking, Beyond Hope, LASINT, csystems, .tm, passwd, 2600Magazine, JUWTF, Competitor, EO, Chan, Pathfinders, JTF,Nash,ISSAA, B61-11, Alouette, executive, Event Security, Mace, Cap-Stun,stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Prologue,Rolm,TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, , RIT, Time, MSEE, Cable &Wireless, CSE, SUW, J2, Embassy, ETA, Fax, finks, Fax encryption, whitenoise, Fernspah, MYK, GAFE, forcast, import, rain, tiger, buzzer, N9,pinknoise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security,Macintosh Internet Security, OC3, Macintosh Firewalls, Unix Security,VIPProtection, SIG, sweep, Medco, TRD, TDR, Z, sweeping, SURSAT, 5926,TELINT,Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, NAIAG,Cypherpunks, NARF, 127, Coderpunks, TRW, remailers, replay, redheads,RX-7,explicit, FLAME, JTF-6, AVN, ISSSP, Anonymous, W, Sex, chaining, codes,Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b,d,SUBACS, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, UXO, (),OC-12,counterintelligence, Shaldag, sport, NASA, TWA, DT, gtegsc, owhere, .ch,hope, emc, industrial espionage, SUPIR, PI, TSCI, spookwords, industrialintelligence, H.N.P., SUAEWICS, Juiliett Class Submarine, Locks, qrss,loch,64 Vauxhall Cross, Ingram Mac-10, wwics, sigvoice, ssa, E.O.D., SEMTEX,penrep, racal, OTP, OSS, Siemens, RPC, Met, CIA, DST, INI, watchers,keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo Class, squib,primacord,RSP, Z7, Becker, Nerd, fangs, Austin, nod, Comirex, GPMG, Speakeasy,humint,GEODSS, SORO, M5, BROMURE, ANC, zone, SBI, DSS, S.A.I.C., Minox,Keyhole,SAR, Rand Corporation, Starr, Wackenhutt, EO, burhop, Wackendude, mol,Shelton, 2E781, F-22, 2010, JCET, cocaine, coca, Vale, IG, Kosovo, Dake,36,800, Hillal, Pesec, Hindawi, GGL, NAICC, CTU, botux, Virii, CCC,ISPE,CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura, Small Pox, Tajik, Blacklisted 411, TRDL, Internet Underground, BX, XS4ALL, wetsu, LOL,muezzin, Retinal Fetish, WIR, Fetish, FCA, Yobie, forschung, emm, ANZUS,Reprieve, NZC-332, edition, cards, mania, 701, CTP, CATO, phone, ChicagoSeattle, Davos, Bangkok, Paris, Posse, NSDM, l0ck, spook, keywords, QRR,PLA, TDYC, W3, CUD, CdC, news, Weekly World News, Zen, World Domination,Dead, GRU, M72750, Salsa, 7, Blowfish, feminism, Gorelick, Glock, Ft.Meade, NSWT, press-release, WISDIM, burned, Indigo, wire transfer,e-cash,Bubba the Love Sponge, Enforcers, Digicash, zip, SWAT, Ortega, PPP,NACSE,crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, ISM, JCE, Middleman, KLM,Blackbird, NSV, GQ360, X400, Texas, jihad, SDI, BRIGAND, Uzi, FortMeade, gchq.gov.uk, supercomputer, bullion, 3, NTTC, Blackmednet, :,Propaganda, ABC, Satellite phones, IWIS, Planet-1, ISTA, rs9512c, SouthAfrica, Sergeyev, Montenegro, Toeffler, Rebollo, sorot, cryptanalysis,nuclear, 52 52 N – 03 03 W, Morgan, Canine, GEBA, INSCOM, France, MEMEX,Stanley, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force,SEAL,virtual, WASS, WID, Dolch, secure shell, screws, Black-Ops, O/S,Venezuela,Ecuador, Argentina, Area51, SABC, basement, ISWG, data-haven, NSDD,black-bag, rack, TEMPEST, Goodwin, rebels, ID, MD5, IDEA, garbage,market,beef, Stego, ISAF, unclassified, Sayeret Tzanhanim, PARASAR, Gripan,pirg,curly, Taiwan, guest, utopia, NSG, orthodox, CCSQ, Alica, SHA, Global,gorilla, Bob, UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx,Lenin,Abdurahmon,snullen, Pseudonyms, MITM, NARF, Gray Data, VLSI, mega, Leitrim, Yakima,NSES, Sugar Grove, WAS, Cowboy, Gist, 8182, Gatt, Platform, 1911,Geraldton,UKUSA, veggie, XM, Parvus, NAVSVS, 3848, Morwenstow, Consul, Oratory,PineGap, Menwith, Mantis, DSD, BVD, 1984, blow out, BUDS, WQC, Flintlock,PABX,Electron, Church, Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1,erco,Toffler, FAS, RHL, K3, Visa/BCC, SNT, Ceridian, STE, condor,CipherTAC-2000,Etacs, Corsica, Shipiro, ssor, piz, fritz, KY, 32, Edens, Kiwis,Kamumaruha,DODIG, Firefly, HRM, Albright, Bellcore, rail, csim, NMS, 2c, FIPS140-1,CAVE, E-Bomb, CDMA, Fortezza, 355ml, ISSC, cybercash, NAWAS, government,NSY, hate, Microsoft, MP3, speedbump, joe, illuminati, BOSS, Kourou,Misawa,Morse, HF, P415, ladylove, filofax, Gulf, lamma, Unit 5707, SayeretMat’Kal,Unit 669, Sayeret Golani, Lanceros, Ejército, Liberación, Nacional,Summercon, NSADS, president, ISFR, freedom, ISSO, walburn, Defcon VI,DC6,Larson, P99, HERF pipe-bomb, cocaine, impact, Roswell, ESN,COS,E.T., credit card, b9, fraud, ST1, assassinate, virus, ISCS, ISPR,anarchy,anarchysm, rogue, mailbomb, Chelsea, Whitewater, MOD, York, plutonium, libertad, OMC, MOC, William Gates, clone, BATF, SGDN, Nike,WWSV,Atlas, IWWSVCS, Delta, TWA, Lewiski, Kiwi, PGP 2.6.2., PGP 5.0i, PGP5.1,siliconpimp, SASSTIXS, IWG, Lynch, 414, Face, Pixar, IRIDF, NSRB,eternityserver, Skytel, Yukon, Templeton, Johohonbu, LUK, Cohiba, Soros,Standford,niche, ISEP, ISEC, 51, H&K, USP, sardine, bank, EUB, USP, PCS, NRO,RedCell, NSOF, Glock 26, snuffle, indigeneous, indian, Patel, package, ISI,INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu,FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA,LITE,PKK, HoHoCon, SISMI, ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA,HAMASMOIS,SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG, chameleon man,Hutsul, CESID, Bess, rail gun, .375, Peering, CSC, Tangimoana Beach,Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST, MITI, JERTO, SDF,Koancho, Blenheim, Rivera, Kyudanki, varon, 310, 17, 312, NB, CBM, CTP,Sardine, SBIRS, jaws, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL,Flu, &, Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP, blackjack, Fox,Aum,AIEWS, AMW, RHL, Baranyi, WORM, MP5K-SD, WINGS, cdi, VIA, DynCorp,food, UXO, Ti, WWSP, WID, honor, Templar, THAAD, package,CISD,ISG, IVG, social, BIOLWPN, JRA, ISB, ISDS, chosen, LBSD, van, schloss,secops, DCSS, DPSD, LIF, PRIME, SURVIAC, telex, SP4, Analyzer, embassy,Golf, B61-7, Maple, Tokyo, ERR, SBU, Threat, JPL, Tess, SE, EPL,SPINTCOM,ISS-ADP, Merv, Mexico, SUR, SO13, Rojdykarna, airframe, 510, EuroFed,Avi,shelter, Crypto AG, BeepBeepKarl, Justin, RamasseBoy, Stronger than theAverage, koulou-koulou, cagoulard, Mustaphanou, Islam, Islamist, Ligue,Front, Frente, RESEAU ECHELON NSA GCHQ GCSB CSE DSD CNCIS DGSE CIA FBI PENTAGONE DST KALASCHNICOV TERRORISM IRAK KOSOVO ISRAEL LEBANON MISSILE CHIRAC JOSPIN ELTSINE GAZA SPY LSD SATELLITE GOVERNMENT U.S. ADMINISTRATION CONTROL SECRET CONFIDENTIAL DEFENSE NATIONALE GUERRE BILL CLINTON SECURITY SECURITE OPERATIONAL OPERATIONNEL RG SADDAM HUSSEN MILOSEVIC H.C.OTAN UNITED NATIONS UNIES IRS ATF BATF DOD WACO RUBY RIDGE OKC OKLAHOMA CITY MILITIA GUN HANDGUN MILGOV ASSAULT RIFLE TERRORISM BOMB DRUG HORUCHI KORESH DAVIDIAN KAHL POSSE COMITATUS RANDY WEAVER VICKIE WEAVER SPECIAL FORCES LINDA THOMPSON CONSTITUTION MILITARY TERRORIST TASK FORCE SPECIAL OPS GROUP PARATROOPER SPECIAL OPERATIONS GROUP SOG SOCRATE RANGER SIPRNET SOF SURVEILLANCE DIRECTION SYSTEM WARLORD DELTA FORCE COBRA CONSTITUTION BILL OF RIGHTS WHITEWATER POM PARK ON METER ARKANSIDE IRAN CONTRAS OLIVER NORTH VINCE FOSTER PROMIS MOSSAD NASA MI5 ONI CID AK47 M16 C4 MALCOLM X REVOLUTION CHEROKEE HILLARY BILL CLINTON GORE GEORGE BUSH WACKENHUT TERRORIST TASK FORCE 160 SPECIAL OPS 12TH GROUP 5TH GROUP

behance _ be.net/newart

 

911 9-11 advertising afghanistan africa america animals animation apple architecture art astronomy australia batshitinsane bbc biology blog blogging blogs books brokenlink bush business california canada cars cartoons censorship children china christmas cinema comedy comics computers copyright crime culture deadlink death design documentary drugs economics economy education election elections environment evolution fashion fiction film flash food football france fun funny game games gaming gay georgebush georgewbush google government gwb health history humor illustration india internet iran iraq iraqwar islam israel japan journalism language law literature london maps math media medicine microsoft military money movie movies mp3 murder music nasa news newsfilter newyork newyorktimes nsfw nyc nytimes obama obit obituary parody philosophy photographs photography photos physics poetry police politics privacy psychology race racism radio religion research rock russia satire science sciencefiction security sex slyt software space sports technology television terrorism travel tv uk us usa video videogames war web women writing youtube

  

About corporate computer security, antiviruas, hackick, data security, network security and security softwares.

 

www.suncoast-detective.com/

6/17/09. Lake Oswego, Oregon. While riding. Nikon Coolpix S50. Handheld. SOOC, then plate edited w/ Microsoft Paint to protect privacy.

 

7192 v 10/6/15

  

The other reaction to my joining Microsoft: "Have you been assimilated yet?"

So you feel you are prudent when posting to social media? Forget that. New technology by Microsoft, Google, and others are invading our private spaces with always-on cameras and microphones. Going even beyond facial recognition, this technology claims to even detect certain vital signs going on in our bodies. Your heartbeat, for starters.

 

Why are we voluntarily setting up a state of surveillance which can and will be abused? Convenience? Discounts on goods and services? Controller-less gaming??

 

How short-sighted can we be?

Bordel à thé

  

Explosives, guns, assassination, conspiracy, primers, detonators, Kakadan, initiators, main charge, nuclear charges, ambush, sniping, motorcade, IRS, ETA, FARC, Cuba, Castro, Che Guevara, revolution, ATTAC, BATF, jtf-6, mjtf, hrt, srt, hostages, munitions, weapons, TNT, rdx, amfo, love, peace, hmtd, picric acid, silver itrite, mercury fulminate, presidential motorcade, Greenpeace, Chirac, salt peter, charcoal, sulfur, c4, composition b, petn, lead azide, lead styphante, ddnp, tetryl, nitrocellulose, nitrostarch, mines, grenades, rockets, fuses, delay mechanism, mortars, rpg7, propellants, incendiaries, incendiary device, thermite, security forces, intelligence, agencies, hrt, resistance, psyops, infiltration, assault team, defensive elements, evasion, detection, mission, communications, the football, platter charge, shaped charges, m118, claymore, body armor, charges, shrapnel, timers, timing devices, boobytraps, detcord, pmk 40, silencers, Uzi, HK-MP5, AK-47, FAL, Jatti, Skorpion MP, teflon bullets, cordite, napalm, law, Stingers, RPK, SOCIMI 821 SMG, STEN, BAR, MP40, HK-G3,FN-MAG, RPD,PzB39, Air Force One, M60, RPK74, SG530, SG540, Galil arm, Walther WA2000, HK33KE, Parker-Hale, MOD. 82, AKR, Ingram MAC10, M3, L34A1, Walther MPL, AKS-74, HK-GR6, subsonic rounds, ballistic media, special forces, JFKSWC, SFOD-D, SRT, Rewson, SAFE, Waihopai, INFOSEC, ASPIC, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Kenya, Terrorism Defensive, José Bové, Confédérarion Paysanne, Information, Defense Information Warfare, Offensive Information, listeriose, listeria, Offensive Information Warfare, NAIA, SAPM, ASU, ECHELON ASTS, National Information Infrastructure, InfoSec, SAO, Reno, Compsec, JICS, Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secret Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet, AOL, AOL, street fight, against, TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, Tanzania, SAMU, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN, 877, NAVELEXSYSSECENGCEN, BZ, CANSLO, CBNRC, CIDA, JAVA, rsta, Active X, Compsec 97, RENS, LLC, DERA, JIC, rip, rb, Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?, SADT, Steve Case, Tools, RECCEX, Telex, OTAN, monarchist, NMIC, NIOG, IDB, MID/KL, NADIS, NMI, SEIDM, BNC, CNCIS, STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, SARL, Military Intelligence, JICA, Scully, recondo, Flame, Infowar, Bubba, Freeh, Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA, NCSA, ASVC, spook words, RRF, 1071, Bugs Bunny, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce, Lacrosse, Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, Chávez, mouvement, movement, site, SASSTIXS, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, SARD, Marx, Groucho Marx, Marx Brothers, LABLINK, USACIL, SAPT, USCG, NRC, ~, O, NSA/CSS, CDC, DOE, SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, bemd, SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA, SHAPE, bird dog, SACLANT, BECCA, DCJFTF, HALO,SC, TASAS, Lander, GSM, T Branch, AST, SAMCOMM, HAHO, FKS, 868, GCHQ, DITSA,SORT,AMEMB, NSG, HIC, EDI, benelux, SAS, SBS, SAW, UDT, EODC, GOE, catholic,integrist, exorcist, DOE, SAMF, GEO, JRB, 3P-HV, Masuda, Forte, AT,GIGN,Exon Shell, radint, MB, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS,GEOS, EADA, SART, FLB, Bretagne, BBE, STEP, Echelon, Dictionary, MD2, MD4,MDA, diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11, EODN, SHS,^X, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, NSS, Duress,RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11, SERT, VIP, ARC,S.E.T.Team, NSWG, MP5k, SATKA, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV,NACSI, MEU/SOC,PSAC, PTT, RFI, EDF, ZL31, SIGDASYS, TDM, SUKLO, SUSLO,TELINT, fake, TEXTA, ELF, LF, MF, CGT, SIGS, VHF, Recon, peapod,PA598D28,Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF, SHF, ASIO, SASP, WANK,Colonel,domestic disruption, divorce, 5ESS, smuggle, Z-200, 15kg, DUVDEVAN, RFX,nitrate, OIR, Pretoria, M-14, enigma, Bletchley Park, Clandestine, NSO,nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, SARA, RapidReaction, JSOFC3IP, Corporate Security, Police, sniper, PPS, ASIS,ASLET,TSCM, Security Consulting, M-x spook, Z-150T, High Security, SecurityEvaluation, Electronic Surveillance, MI-17, ISR, NSAS,Counterterrorism,real, spies, IWO, eavesdropping, debugging, CCSS, interception, COCOT,NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn, NAVCM,Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, tc, 2EME REP,FID,7NL SBS, tekka, captain, 226, .45, nonac, .li, Ionosphere, Mole,Keyhole,NABS, Kilderkin, Artichoke, Badger, Emerson, Tzvrif, SDIS, T2S2, STTC,DNR,NADDIS, NFLIS, CFD, quarter, Cornflower, Daisy, Egret, Iris, JSOTF,Hollyhock, Jasmine, Juile, Vinnell, B.D.M., Sphinx, Stephanie,Reflection,Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, rusers, Covert Video,Intiso,r00t, lock picking, Beyond Hope, LASINT, csystems, .tm, passwd, 2600Magazine, JUWTF, Competitor, EO, Chan, Pathfinders, JTF,Nash,ISSAA, B61-11, Alouette, executive, Event Security, Mace, Cap-Stun,stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Prologue,Rolm,TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, , RIT, Time, MSEE, Cable &Wireless, CSE, SUW, J2, Embassy, ETA, Fax, finks, Fax encryption, whitenoise, Fernspah, MYK, GAFE, forcast, import, rain, tiger, buzzer, N9,pinknoise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security,Macintosh Internet Security, OC3, Macintosh Firewalls, Unix Security,VIPProtection, SIG, sweep, Medco, TRD, TDR, Z, sweeping, SURSAT, 5926,TELINT,Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, NAIAG,Cypherpunks, NARF, 127, Coderpunks, TRW, remailers, replay, redheads,RX-7,explicit, FLAME, JTF-6, AVN, ISSSP, Anonymous, W, Sex, chaining, codes,Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b,d,SUBACS, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, UXO, (),OC-12,counterintelligence, Shaldag, sport, NASA, TWA, DT, gtegsc, owhere, .ch,hope, emc, industrial espionage, SUPIR, PI, TSCI, spookwords, industrialintelligence, H.N.P., SUAEWICS, Juiliett Class Submarine, Locks, qrss,loch,64 Vauxhall Cross, Ingram Mac-10, wwics, sigvoice, ssa, E.O.D., SEMTEX,penrep, racal, OTP, OSS, Siemens, RPC, Met, CIA, DST, INI, watchers,keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo Class, squib,primacord,RSP, Z7, Becker, Nerd, fangs, Austin, nod, Comirex, GPMG, Speakeasy,humint,GEODSS, SORO, M5, BROMURE, ANC, zone, SBI, DSS, S.A.I.C., Minox,Keyhole,SAR, Rand Corporation, Starr, Wackenhutt, EO, burhop, Wackendude, mol,Shelton, 2E781, F-22, 2010, JCET, cocaine, coca, Vale, IG, Kosovo, Dake,36,800, Hillal, Pesec, Hindawi, GGL, NAICC, CTU, botux, Virii, CCC,ISPE,CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura, Small Pox, Tajik, Blacklisted 411, TRDL, Internet Underground, BX, XS4ALL, wetsu, LOL,muezzin, Retinal Fetish, WIR, Fetish, FCA, Yobie, forschung, emm, ANZUS,Reprieve, NZC-332, edition, cards, mania, 701, CTP, CATO, phone, ChicagoSeattle, Davos, Bangkok, Paris, Posse, NSDM, l0ck, spook, keywords, QRR,PLA, TDYC, W3, CUD, CdC, news, Weekly World News, Zen, World Domination,Dead, GRU, M72750, Salsa, 7, Blowfish, feminism, Gorelick, Glock, Ft.Meade, NSWT, press-release, WISDIM, burned, Indigo, wire transfer,e-cash,Bubba the Love Sponge, Enforcers, Digicash, zip, SWAT, Ortega, PPP,NACSE,crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, ISM, JCE, Middleman, KLM,Blackbird, NSV, GQ360, X400, Texas, jihad, SDI, BRIGAND, Uzi, FortMeade, gchq.gov.uk, supercomputer, bullion, 3, NTTC, Blackmednet, :,Propaganda, ABC, Satellite phones, IWIS, Planet-1, ISTA, rs9512c, SouthAfrica, Sergeyev, Montenegro, Toeffler, Rebollo, sorot, cryptanalysis,nuclear, 52 52 N – 03 03 W, Morgan, Canine, GEBA, INSCOM, France, MEMEX,Stanley, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force,SEAL,virtual, WASS, WID, Dolch, secure shell, screws, Black-Ops, O/S,Venezuela,Ecuador, Argentina, Area51, SABC, basement, ISWG, data-haven, NSDD,black-bag, rack, TEMPEST, Goodwin, rebels, ID, MD5, IDEA, garbage,market,beef, Stego, ISAF, unclassified, Sayeret Tzanhanim, PARASAR, Gripan,pirg,curly, Taiwan, guest, utopia, NSG, orthodox, CCSQ, Alica, SHA, Global,gorilla, Bob, UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx,Lenin,Abdurahmon,snullen, Pseudonyms, MITM, NARF, Gray Data, VLSI, mega, Leitrim, Yakima,NSES, Sugar Grove, WAS, Cowboy, Gist, 8182, Gatt, Platform, 1911,Geraldton,UKUSA, veggie, XM, Parvus, NAVSVS, 3848, Morwenstow, Consul, Oratory,PineGap, Menwith, Mantis, DSD, BVD, 1984, blow out, BUDS, WQC, Flintlock,PABX,Electron, Church, Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1,erco,Toffler, FAS, RHL, K3, Visa/BCC, SNT, Ceridian, STE, condor,CipherTAC-2000,Etacs, Corsica, Shipiro, ssor, piz, fritz, KY, 32, Edens, Kiwis,Kamumaruha,DODIG, Firefly, HRM, Albright, Bellcore, rail, csim, NMS, 2c, FIPS140-1,CAVE, E-Bomb, CDMA, Fortezza, 355ml, ISSC, cybercash, NAWAS, government,NSY, hate, Microsoft, MP3, speedbump, joe, illuminati, BOSS, Kourou,Misawa,Morse, HF, P415, ladylove, filofax, Gulf, lamma, Unit 5707, SayeretMat’Kal,Unit 669, Sayeret Golani, Lanceros, Ejército, Liberación, Nacional,Summercon, NSADS, president, ISFR, freedom, ISSO, walburn, Defcon VI,DC6,Larson, P99, HERF pipe-bomb, cocaine, impact, Roswell, ESN,COS,E.T., credit card, b9, fraud, ST1, assassinate, virus, ISCS, ISPR,anarchy,anarchysm, rogue, mailbomb, Chelsea, Whitewater, MOD, York, plutonium, libertad, OMC, MOC, William Gates, clone, BATF, SGDN, Nike,WWSV,Atlas, IWWSVCS, Delta, TWA, Lewiski, Kiwi, PGP 2.6.2., PGP 5.0i, PGP5.1,siliconpimp, SASSTIXS, IWG, Lynch, 414, Face, Pixar, IRIDF, NSRB,eternityserver, Skytel, Yukon, Templeton, Johohonbu, LUK, Cohiba, Soros,Standford,niche, ISEP, ISEC, 51, H&K, USP, sardine, bank, EUB, USP, PCS, NRO,RedCell, NSOF, Glock 26, snuffle, indigeneous, indian, Patel, package, ISI,INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu,FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA,LITE,PKK, HoHoCon, SISMI, ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA,HAMASMOIS,SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG, chameleon man,Hutsul, CESID, Bess, rail gun, .375, Peering, CSC, Tangimoana Beach,Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST, MITI, JERTO, SDF,Koancho, Blenheim, Rivera, Kyudanki, varon, 310, 17, 312, NB, CBM, CTP,Sardine, SBIRS, jaws, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL,Flu, &, Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP, blackjack, Fox,Aum,AIEWS, AMW, RHL, Baranyi, WORM, MP5K-SD, WINGS, cdi, VIA, DynCorp,food, UXO, Ti, WWSP, WID, honor, Templar, THAAD, package,CISD,ISG, IVG, social, BIOLWPN, JRA, ISB, ISDS, chosen, LBSD, van, schloss,secops, DCSS, DPSD, LIF, PRIME, SURVIAC, telex, SP4, Analyzer, embassy,Golf, B61-7, Maple, Tokyo, ERR, SBU, Threat, JPL, Tess, SE, EPL,SPINTCOM,ISS-ADP, Merv, Mexico, SUR, SO13, Rojdykarna, airframe, 510, EuroFed,Avi,shelter, Crypto AG, BeepBeepKarl, Justin, RamasseBoy, Stronger than theAverage, koulou-koulou, cagoulard, Mustaphanou, Islam, Islamist, Ligue,Front, Frente, RESEAU ECHELON NSA GCHQ GCSB CSE DSD CNCIS DGSE CIA FBI PENTAGONE DST KALASCHNICOV TERRORISM IRAK KOSOVO ISRAEL LEBANON MISSILE CHIRAC JOSPIN ELTSINE GAZA SPY LSD SATELLITE GOVERNMENT U.S. ADMINISTRATION CONTROL SECRET CONFIDENTIAL DEFENSE NATIONALE GUERRE BILL CLINTON SECURITY SECURITE OPERATIONAL OPERATIONNEL RG SADDAM HUSSEN MILOSEVIC H.C.OTAN UNITED NATIONS UNIES IRS ATF BATF DOD WACO RUBY RIDGE OKC OKLAHOMA CITY MILITIA GUN HANDGUN MILGOV ASSAULT RIFLE TERRORISM BOMB DRUG HORUCHI KORESH DAVIDIAN KAHL POSSE COMITATUS RANDY WEAVER VICKIE WEAVER SPECIAL FORCES LINDA THOMPSON CONSTITUTION MILITARY TERRORIST TASK FORCE SPECIAL OPS GROUP PARATROOPER SPECIAL OPERATIONS GROUP SOG SOCRATE RANGER SIPRNET SOF SURVEILLANCE DIRECTION SYSTEM WARLORD DELTA FORCE COBRA CONSTITUTION BILL OF RIGHTS WHITEWATER POM PARK ON METER ARKANSIDE IRAN CONTRAS OLIVER NORTH VINCE FOSTER PROMIS MOSSAD NASA MI5 ONI CID AK47 M16 C4 MALCOLM X REVOLUTION CHEROKEE HILLARY BILL CLINTON GORE GEORGE BUSH WACKENHUT TERRORIST TASK FORCE 160 SPECIAL OPS 12TH GROUP 5TH GROUP

Explosives, guns, assassination, conspiracy, primers, detonators, Kakadan, initiators, main charge, nuclear charges, ambush, sniping, motorcade, IRS, ETA, FARC, Cuba, Castro, Che Guevara, revolution, ATTAC, BATF, jtf-6, mjtf, hrt, srt, hostages, munitions, weapons, TNT, rdx, amfo, love, peace, hmtd, picric acid, silver itrite, mercury fulminate, presidential motorcade, Greenpeace, Chirac, salt peter, charcoal, sulfur, c4, composition b, petn, lead azide, lead styphante, ddnp, tetryl, nitrocellulose, nitrostarch, mines, grenades, rockets, fuses, delay mechanism, mortars, rpg7, propellants, incendiaries, incendiary device, thermite, security forces, intelligence, agencies, hrt, resistance, psyops, infiltration, assault team, defensive elements, evasion, detection, mission, communications, the football, platter charge, shaped charges, m118, claymore, body armor, charges, shrapnel, timers, timing devices, boobytraps, detcord, pmk 40, silencers, Uzi, HK-MP5, AK-47, FAL, Jatti, Skorpion MP, teflon bullets, cordite, napalm, law, Stingers, RPK, SOCIMI 821 SMG, STEN, BAR, MP40, HK-G3,FN-MAG, RPD,PzB39, Air Force One, M60, RPK74, SG530, SG540, Galil arm, Walther WA2000, HK33KE, Parker-Hale, MOD. 82, AKR, Ingram MAC10, M3, L34A1, Walther MPL, AKS-74, HK-GR6, subsonic rounds, ballistic media, special forces, JFKSWC, SFOD-D, SRT, Rewson, SAFE, Waihopai, INFOSEC, ASPIC, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Kenya, Terrorism Defensive, José Bové, Confédérarion Paysanne, Information, Defense Information Warfare, Offensive Information, listeriose, listeria, Offensive Information Warfare, NAIA, SAPM, ASU, ECHELON ASTS, National Information Infrastructure, InfoSec, SAO, Reno, Compsec, JICS, Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secret Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet, AOL, AOL, street fight, against, TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, Tanzania, SAMU, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN, 877, NAVELEXSYSSECENGCEN, BZ, CANSLO, CBNRC, CIDA, JAVA, rsta, Active X, Compsec 97, RENS, LLC, DERA, JIC, rip, rb, Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?, SADT, Steve Case, Tools, RECCEX, Telex, OTAN, monarchist, NMIC, NIOG, IDB, MID/KL, NADIS, NMI, SEIDM, BNC, CNCIS, STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, SARL, Military Intelligence, JICA, Scully, recondo, Flame, Infowar, Bubba, Freeh, Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA, NCSA, ASVC, spook words, RRF, 1071, Bugs Bunny, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce, Lacrosse, Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, Chávez, mouvement, movement, site, SASSTIXS, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, SARD, Marx, Groucho Marx, Marx Brothers, LABLINK, USACIL, SAPT, USCG, NRC, ~, O, NSA/CSS, CDC, DOE, SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, bemd, SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA, SHAPE, bird dog, SACLANT, BECCA, DCJFTF, HALO,SC, TASAS, Lander, GSM, T Branch, AST, SAMCOMM, HAHO, FKS, 868, GCHQ, DITSA,SORT,AMEMB, NSG, HIC, EDI, benelux, SAS, SBS, SAW, UDT, EODC, GOE, catholic,integrist, exorcist, DOE, SAMF, GEO, JRB, 3P-HV, Masuda, Forte, AT,GIGN,Exon Shell, radint, MB, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS,GEOS, EADA, SART, FLB, Bretagne, BBE, STEP, Echelon, Dictionary, MD2, MD4,MDA, diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11, EODN, SHS,^X, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, NSS, Duress,RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11, SERT, VIP, ARC,S.E.T.Team, NSWG, MP5k, SATKA, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV,NACSI, MEU/SOC,PSAC, PTT, RFI, EDF, ZL31, SIGDASYS, TDM, SUKLO, SUSLO,TELINT, fake, TEXTA, ELF, LF, MF, CGT, SIGS, VHF, Recon, peapod,PA598D28,Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF, SHF, ASIO, SASP, WANK,Colonel,domestic disruption, divorce, 5ESS, smuggle, Z-200, 15kg, DUVDEVAN, RFX,nitrate, OIR, Pretoria, M-14, enigma, Bletchley Park, Clandestine, NSO,nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, SARA, RapidReaction, JSOFC3IP, Corporate Security, Police, sniper, PPS, ASIS,ASLET,TSCM, Security Consulting, M-x spook, Z-150T, High Security, SecurityEvaluation, Electronic Surveillance, MI-17, ISR, NSAS,Counterterrorism,real, spies, IWO, eavesdropping, debugging, CCSS, interception, COCOT,NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn, NAVCM,Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, tc, 2EME REP,FID,7NL SBS, tekka, captain, 226, .45, nonac, .li, Ionosphere, Mole,Keyhole,NABS, Kilderkin, Artichoke, Badger, Emerson, Tzvrif, SDIS, T2S2, STTC,DNR,NADDIS, NFLIS, CFD, quarter, Cornflower, Daisy, Egret, Iris, JSOTF,Hollyhock, Jasmine, Juile, Vinnell, B.D.M., Sphinx, Stephanie,Reflection,Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, rusers, Covert Video,Intiso,r00t, lock picking, Beyond Hope, LASINT, csystems, .tm, passwd, 2600Magazine, JUWTF, Competitor, EO, Chan, Pathfinders, JTF,Nash,ISSAA, B61-11, Alouette, executive, Event Security, Mace, Cap-Stun,stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Prologue,Rolm,TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, , RIT, Time, MSEE, Cable &Wireless, CSE, SUW, J2, Embassy, ETA, Fax, finks, Fax encryption, whitenoise, Fernspah, MYK, GAFE, forcast, import, rain, tiger, buzzer, N9,pinknoise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security,Macintosh Internet Security, OC3, Macintosh Firewalls, Unix Security,VIPProtection, SIG, sweep, Medco, TRD, TDR, Z, sweeping, SURSAT, 5926,TELINT,Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, NAIAG,Cypherpunks, NARF, 127, Coderpunks, TRW, remailers, replay, redheads,RX-7,explicit, FLAME, JTF-6, AVN, ISSSP, Anonymous, W, Sex, chaining, codes,Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b,d,SUBACS, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, UXO, (),OC-12,counterintelligence, Shaldag, sport, NASA, TWA, DT, gtegsc, owhere, .ch,hope, emc, industrial espionage, SUPIR, PI, TSCI, spookwords, industrialintelligence, H.N.P., SUAEWICS, Juiliett Class Submarine, Locks, qrss,loch,64 Vauxhall Cross, Ingram Mac-10, wwics, sigvoice, ssa, E.O.D., SEMTEX,penrep, racal, OTP, OSS, Siemens, RPC, Met, CIA, DST, INI, watchers,keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo Class, squib,primacord,RSP, Z7, Becker, Nerd, fangs, Austin, nod, Comirex, GPMG, Speakeasy,humint,GEODSS, SORO, M5, BROMURE, ANC, zone, SBI, DSS, S.A.I.C., Minox,Keyhole,SAR, Rand Corporation, Starr, Wackenhutt, EO, burhop, Wackendude, mol,Shelton, 2E781, F-22, 2010, JCET, cocaine, coca, Vale, IG, Kosovo, Dake,36,800, Hillal, Pesec, Hindawi, GGL, NAICC, CTU, botux, Virii, CCC,ISPE,CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura, Small Pox, Tajik, Blacklisted 411, TRDL, Internet Underground, BX, XS4ALL, wetsu, LOL,muezzin, Retinal Fetish, WIR, Fetish, FCA, Yobie, forschung, emm, ANZUS,Reprieve, NZC-332, edition, cards, mania, 701, CTP, CATO, phone, ChicagoSeattle, Davos, Bangkok, Paris, Posse, NSDM, l0ck, spook, keywords, QRR,PLA, TDYC, W3, CUD, CdC, news, Weekly World News, Zen, World Domination,Dead, GRU, M72750, Salsa, 7, Blowfish, feminism, Gorelick, Glock, Ft.Meade, NSWT, press-release, WISDIM, burned, Indigo, wire transfer,e-cash,Bubba the Love Sponge, Enforcers, Digicash, zip, SWAT, Ortega, PPP,NACSE,crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, ISM, JCE, Middleman, KLM,Blackbird, NSV, GQ360, X400, Texas, jihad, SDI, BRIGAND, Uzi, FortMeade, gchq.gov.uk, supercomputer, bullion, 3, NTTC, Blackmednet, :,Propaganda, ABC, Satellite phones, IWIS, Planet-1, ISTA, rs9512c, SouthAfrica, Sergeyev, Montenegro, Toeffler, Rebollo, sorot, cryptanalysis,nuclear, 52 52 N – 03 03 W, Morgan, Canine, GEBA, INSCOM, France, MEMEX,Stanley, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force,SEAL,virtual, WASS, WID, Dolch, secure shell, screws, Black-Ops, O/S,Venezuela,Ecuador, Argentina, Area51, SABC, basement, ISWG, data-haven, NSDD,black-bag, rack, TEMPEST, Goodwin, rebels, ID, MD5, IDEA, garbage,market,beef, Stego, ISAF, unclassified, Sayeret Tzanhanim, PARASAR, Gripan,pirg,curly, Taiwan, guest, utopia, NSG, orthodox, CCSQ, Alica, SHA, Global,gorilla, Bob, UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx,Lenin,Abdurahmon,snullen, Pseudonyms, MITM, NARF, Gray Data, VLSI, mega, Leitrim, Yakima,NSES, Sugar Grove, WAS, Cowboy, Gist, 8182, Gatt, Platform, 1911,Geraldton,UKUSA, veggie, XM, Parvus, NAVSVS, 3848, Morwenstow, Consul, Oratory,PineGap, Menwith, Mantis, DSD, BVD, 1984, blow out, BUDS, WQC, Flintlock,PABX,Electron, Church, Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1,erco,Toffler, FAS, RHL, K3, Visa/BCC, SNT, Ceridian, STE, condor,CipherTAC-2000,Etacs, Corsica, Shipiro, ssor, piz, fritz, KY, 32, Edens, Kiwis,Kamumaruha,DODIG, Firefly, HRM, Albright, Bellcore, rail, csim, NMS, 2c, FIPS140-1,CAVE, E-Bomb, CDMA, Fortezza, 355ml, ISSC, cybercash, NAWAS, government,NSY, hate, Microsoft, MP3, speedbump, joe, illuminati, BOSS, Kourou,Misawa,Morse, HF, P415, ladylove, filofax, Gulf, lamma, Unit 5707, SayeretMat’Kal,Unit 669, Sayeret Golani, Lanceros, Ejército, Liberación, Nacional,Summercon, NSADS, president, ISFR, freedom, ISSO, walburn, Defcon VI,DC6,Larson, P99, HERF pipe-bomb, cocaine, impact, Roswell, ESN,COS,E.T., credit card, b9, fraud, ST1, assassinate, virus, ISCS, ISPR,anarchy,anarchysm, rogue, mailbomb, Chelsea, Whitewater, MOD, York, plutonium, libertad, OMC, MOC, William Gates, clone, BATF, SGDN, Nike,WWSV,Atlas, IWWSVCS, Delta, TWA, Lewiski, Kiwi, PGP 2.6.2., PGP 5.0i, PGP5.1,siliconpimp, SASSTIXS, IWG, Lynch, 414, Face, Pixar, IRIDF, NSRB,eternityserver, Skytel, Yukon, Templeton, Johohonbu, LUK, Cohiba, Soros,Standford,niche, ISEP, ISEC, 51, H&K, USP, sardine, bank, EUB, USP, PCS, NRO,RedCell, NSOF, Glock 26, snuffle, indigeneous, indian, Patel, package, ISI,INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu,FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA,LITE,PKK, HoHoCon, SISMI, ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA,HAMASMOIS,SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG, chameleon man,Hutsul, CESID, Bess, rail gun, .375, Peering, CSC, Tangimoana Beach,Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST, MITI, JERTO, SDF,Koancho, Blenheim, Rivera, Kyudanki, varon, 310, 17, 312, NB, CBM, CTP,Sardine, SBIRS, jaws, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL,Flu, &, Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP, blackjack, Fox,Aum,AIEWS, AMW, RHL, Baranyi, WORM, MP5K-SD, WINGS, cdi, VIA, DynCorp,food, UXO, Ti, WWSP, WID, honor, Templar, THAAD, package,CISD,ISG, IVG, social, BIOLWPN, JRA, ISB, ISDS, chosen, LBSD, van, schloss,secops, DCSS, DPSD, LIF, PRIME, SURVIAC, telex, SP4, Analyzer, embassy,Golf, B61-7, Maple, Tokyo, ERR, SBU, Threat, JPL, Tess, SE, EPL,SPINTCOM,ISS-ADP, Merv, Mexico, SUR, SO13, Rojdykarna, airframe, 510, EuroFed,Avi,shelter, Crypto AG, BeepBeepKarl, Justin, RamasseBoy, Stronger than theAverage, koulou-koulou, cagoulard, Mustaphanou, Islam, Islamist, Ligue,Front, Frente, RESEAU ECHELON NSA GCHQ GCSB CSE DSD CNCIS DGSE CIA FBI PENTAGONE DST KALASCHNICOV TERRORISM IRAK KOSOVO ISRAEL LEBANON MISSILE CHIRAC JOSPIN ELTSINE GAZA SPY LSD SATELLITE GOVERNMENT U.S. ADMINISTRATION CONTROL SECRET CONFIDENTIAL DEFENSE NATIONALE GUERRE BILL CLINTON SECURITY SECURITE OPERATIONAL OPERATIONNEL RG SADDAM HUSSEN MILOSEVIC H.C.OTAN UNITED NATIONS UNIES IRS ATF BATF DOD WACO RUBY RIDGE OKC OKLAHOMA CITY MILITIA GUN HANDGUN MILGOV ASSAULT RIFLE TERRORISM BOMB DRUG HORUCHI KORESH DAVIDIAN KAHL POSSE COMITATUS RANDY WEAVER VICKIE WEAVER SPECIAL FORCES LINDA THOMPSON CONSTITUTION MILITARY TERRORIST TASK FORCE SPECIAL OPS GROUP PARATROOPER SPECIAL OPERATIONS GROUP SOG SOCRATE RANGER SIPRNET SOF SURVEILLANCE DIRECTION SYSTEM WARLORD DELTA FORCE COBRA CONSTITUTION BILL OF RIGHTS WHITEWATER POM PARK ON METER ARKANSIDE IRAN CONTRAS OLIVER NORTH VINCE FOSTER PROMIS MOSSAD NASA MI5 ONI CID AK47 M16 C4 MALCOLM X REVOLUTION CHEROKEE HILLARY BILL CLINTON GORE GEORGE BUSH WACKENHUT TERRORIST TASK FORCE 160 SPECIAL OPS 12TH GROUP 5TH GROUP

online security

online security scan

online virus scan

cyber security

virus scan

internetsecurity

online security check

free virus scan

security software

online banking security

security

internet security

panda security

microsoft security essentials

symantec

security management

norman security suite

windows security

online security test

alarm

security shield

ahnlab online security

internet privacy

free internet security

it security

internet security test

security online

network security

microsoft internet security

internet security 2011

internet security free

information security

security internet

security shop

home security

online privacy

computer security

windows internet security

g data internet security 2011

web security

secure online

internet security essentials

google security blog

security solutions

home security systems

security systems

pc security

free security software

website security

wireless security

data security

best free internet security

software security

online security services

cyber safety

internet safety

pc tools internet security

free security

wifi security

google security

security suite

security products

best online security

internet security software

trend security

system security

security blog

internet security mac

panda internet security 2011

security system

freeware internet security

best security suite

security blogs

chubb security

titanium internet security

trend internet security

security websites

pc tools internet security 2011

web protection

free internet security software

titanium internet security 2011

windows 7 internet security

internet security freeware

antivirus internet security

panda security online scan

online security systems

best internet security suite

online security scanner

security computer

security programs

free computer security

top ten internet security

computer safety

online security shop

online protection

online security free

security net

free online security protection

symantec online security check

online securities

net security

6/17/09. While riding. Nikon Coolpix S50. Handheld. License plate edited with Microsoft Paint to protect privacy.

 

The S85B50 is a high-revving engine designed to utilize power from a wide rev band. Having a redline of 8250 rpm, it achieves over 100 bhp (70 kW)/litre and features a very high compression ratio of 12.0:1.

 

5.0 Litre V10 engine, 507 hp (378 kW) @ 7750rpm/520 N·m (384 lb·ft) torque @ 6100rpm.

 

1682 v 1/5/15.

 

American tech giants are Satan's heart of CIA-Mossad's treason empire. But who noticed? ***********************************************************************************July 03, 2014

Dog & Pony PR to keep shareholders' denial intact.

 

Another Shareholder Performance

Microsoft’s Gestures of Transparency

by BILL BLUNDEN

 

A Vice President from Microsoft has announced that the company’s webmail services are now protected by an advanced encryption suite known as TLS, or Transport Layer Security, and also that Microsoft has launched a “Transparency Center” on its Redmond campus so that governments can inspect the company’s source code (i.e. the blueprints to its software) [1]. Earlier this year, in January, Microsoft’s Chief Privacy Officer publicized a similar Transparency initiative in Brussels [2].

 

As I’ve discussed in a prior CounterPunch essay [3] (“Google’s Shareholder Theater”), encryption schemes like TLS falter as an alleged panacea to society’s cyber-security problems. Hi-tech subversion, the practice of leveraging flaws to covertly gain access, is a trump card as anyone who has investigated the Heartbleed bug understands [4]. So let’s examine the reality behind Microsoft’s Transparency Centers because they’re obviously an attempt to downplay the threat of subversion.

 

[Not So] Accidental Bugs

 

History has shown that in a large system like Windows there will be a plethora of subtle bugs that observers will fail to catch. Defects of this nature will even evade professional quality assurance experts despite the fact that they’re staring straight at them for hours on end.

 

Some bugs will be accidental, the result of sloppy software engineering. Thanks to Ed Snowden we know that there will also be other bugs that are not accidents; that were embedded in the source code to provide back doors to spies. This is a convenient ploy because “accidental” bugs offer the additional benefit of plausible deniability. Intentional back doors disguised in this manner can be explained away as absent-minded mistakes.

 

Microsoft’s Windows code base currently spans millions of lines (Windows XP alone contained 45 million lines of code [5]). There is an endless supply of inconspicuous little hidey-holes where spies can be granted camouflaged access. Recall that Stuxnet, a malicious computer worm created by the American and Israeli spies, leveraged not just one but multiple unpatched Windows bugs [6].

 

Once spies gain a foothold on a machine they install “implants” (also known as rootkits) to maintain access and steal data [7]. U.S. intelligence has a veritable catalogue of such implants that they can draw on [8]. System administrators, the people who manage servers and routers, will likely view this catalogue and experience growing pangs of dread. This is the ugly truth: almost nothing is safe. Our collective security and liberty have been undermined on an industry-wide basis at the behest of the American Deep State. Hi-tech companies dutifully cooperated. Behind this cooperation is the shadow cast by the neoliberal mindset, such that there are discreet undercurrents of shared class interest.

 

We’ve Seen This Before

 

Building hi-tech trap doors for spies is hardly a recent phenomenon. Well over 15 years ago there was a guy from the NSA named Lew Giles who went around getting companies in Silicon Valley to play ball. Bruce Schneier describes how Giles operated [9]:

 

“The deal went something like this: Giles offered you preferential treatment for export if you would add a back door. The back door could be subtle enough that it wouldn’t show up in the design, and only be obvious if someone analyzed the binary code. It could be something that would easily be viewed as a mistake if someone learned about it. Maybe you could weaken your random number generator, or leak a few key bits in a header. Anything blundenthat would let the NSA decrypt the ciphertext without it looking like the crypto was broken.”

 

“In return you would be able to export your products. But you and he would have to come up with some kind of cover story as to why you could export what was normally unexportable encryption, something that would allay any suspicion.”

 

Then there’s also the strange affair involving a software company named Inslaw which sold a legal case-tracking solution called PROMIS (Prosecutor’s Management Information System) to the federal government. Uncle Sam refused to pay Inslaw and pushed the company into bankruptcy. This did little to stop American and Israeli intelligence agencies from selling roughly $500 million in pirated copies of PROMIS to other intelligence agencies. As you might have guessed the pirated copy of PROMIS had a back door installed that enabled remote monitoring [10]. Greeks bearing gifts and all that.

 

On a side note, there was an investigative journalist looking into the Inslaw case, Danny Casolaro, who died mysteriously just as he was about to make a big break. The death was ruled a suicide though Casolaro had received a number of death threats and he warned his brother shortly before he died that if anything happened to him it wasn’t an accident [11]. Readers familiar with the CIA’s links to the drug underworld will note general similarities to the death of another journalist named Gary Webb [12]. He allegedly committed suicide by shooting himself in the head. Twice [13]. Ed Snowden was justified in fearing for his safety before meeting reporters in Hong Kong.

 

Listen To Ken Thompson

 

Ultimately Trust Centers are elaborate security theater. Microsoft sells compiled executable programs not source code and there’s no telling if some special sauce hasn’t been added surreptitiously. Never mind that, as mentioned earlier, an outwardly accidental bug which is completely visible in the code base (but extremely difficult to detect as a flaw in practice) might be intentional.

 

Consider Ken Thompson’s canonical essay on Trusting Trust [14].

 

“The moral is obvious. You can’t trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well installed microcode bug will be almost impossible to detect.”

 

Thompson, the founding father of the UNIX operating system who is now in his 70s, is the epitome of a credible source. He has no reason to lie in his essay, no conflicts of interest, no financial incentive to pull the wool over your eyes.

 

Ulterior Motives

 

The same cannot be said for the executives at hi-tech behemoths like Microsoft. Ed Snowden’s revelations have put them in an awkward position. They were caught red-handed, having silently clambered into bed with the Deep State and the powerful private-sector interests that drive it [15]. It’s part of the public record that Microsoft was the original entrant into the NSA’s PRISM program back in 2007 [16], that the company gives U.S. intelligence early

 

access to information on zero-day bugs [17], and that the company is almost certainly a participant in the NSA’s ongoing subversion ops (e.g. BULLRUN and the SIGNINT Enabling Programs [18]).

 

When confronted with this duplicity company spokesmen initially denied involvement [19]. With their lies exposed the execs in Redmond are scrambling desperately to manage public outcry, to provide the perception of opposition so that onlookers are led to believe that Microsoft is fighting for user’s rights rather than the bottom line.

 

Companies that take a genuine stance against the Deep State, like Lavabit, are the exception to the rule and they are quickly dispatched. For multinational companies like Microsoft, which recently signed a $617 million deal with the Pentagon, there’s too much money at stake to not collaborate with intelligence services [20]. And Microsoft continues to do so, both here in the United States and in countries like Russia [21].

 

Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” and “Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs.

  

Explosives, guns, assassination, conspiracy, primers, detonators, Kakadan, initiators, main charge, nuclear charges, ambush, sniping, motorcade, IRS, ETA, FARC, Cuba, Castro, Che Guevara, revolution, ATTAC, BATF, jtf-6, mjtf, hrt, srt, hostages, munitions, weapons, TNT, rdx, amfo, love, peace, hmtd, picric acid, silver itrite, mercury fulminate, presidential motorcade, Greenpeace, Chirac, salt peter, charcoal, sulfur, c4, composition b, petn, lead azide, lead styphante, ddnp, tetryl, nitrocellulose, nitrostarch, mines, grenades, rockets, fuses, delay mechanism, mortars, rpg7, propellants, incendiaries, incendiary device, thermite, security forces, intelligence, agencies, hrt, resistance, psyops, infiltration, assault team, defensive elements, evasion, detection, mission, communications, the football, platter charge, shaped charges, m118, claymore, body armor, charges, shrapnel, timers, timing devices, boobytraps, detcord, pmk 40, silencers, Uzi, HK-MP5, AK-47, FAL, Jatti, Skorpion MP, teflon bullets, cordite, napalm, law, Stingers, RPK, SOCIMI 821 SMG, STEN, BAR, MP40, HK-G3,FN-MAG, RPD,PzB39, Air Force One, M60, RPK74, SG530, SG540, Galil arm, Walther WA2000, HK33KE, Parker-Hale, MOD. 82, AKR, Ingram MAC10, M3, L34A1, Walther MPL, AKS-74, HK-GR6, subsonic rounds, ballistic media, special forces, JFKSWC, SFOD-D, SRT, Rewson, SAFE, Waihopai, INFOSEC, ASPIC, Information Security, SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Kenya, Terrorism Defensive, José Bové, Confédérarion Paysanne, Information, Defense Information Warfare, Offensive Information, listeriose, listeria, Offensive Information Warfare, NAIA, SAPM, ASU, ECHELON ASTS, National Information Infrastructure, InfoSec, SAO, Reno, Compsec, JICS, Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF, Passwords, NAAP, DefCon V, RSO, Hackers, Encryption, ASWS, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secret Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet, AOL, AOL, street fight, against, TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, Tanzania, SAMU, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN, 877, NAVELEXSYSSECENGCEN, BZ, CANSLO, CBNRC, CIDA, JAVA, rsta, Active X, Compsec 97, RENS, LLC, DERA, JIC, rip, rb, Wu, RDI, Mavricks, BIOL, Meta-hackers, ^?, SADT, Steve Case, Tools, RECCEX, Telex, OTAN, monarchist, NMIC, NIOG, IDB, MID/KL, NADIS, NMI, SEIDM, BNC, CNCIS, STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, SARL, Military Intelligence, JICA, Scully, recondo, Flame, Infowar, Bubba, Freeh, Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA, NCSA, ASVC, spook words, RRF, 1071, Bugs Bunny, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce, Lacrosse, Flashbangs, HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, Chávez, mouvement, movement, site, SASSTIXS, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, SARD, Marx, Groucho Marx, Marx Brothers, LABLINK, USACIL, SAPT, USCG, NRC, ~, O, NSA/CSS, CDC, DOE, SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, bemd, SGC, UNCPCJ, CFC, SABENA, DREO, CDA, SADRS, DRA, SHAPE, bird dog, SACLANT, BECCA, DCJFTF, HALO,SC, TASAS, Lander, GSM, T Branch, AST, SAMCOMM, HAHO, FKS, 868, GCHQ, DITSA,SORT,AMEMB, NSG, HIC, EDI, benelux, SAS, SBS, SAW, UDT, EODC, GOE, catholic,integrist, exorcist, DOE, SAMF, GEO, JRB, 3P-HV, Masuda, Forte, AT,GIGN,Exon Shell, radint, MB, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS,GEOS, EADA, SART, FLB, Bretagne, BBE, STEP, Echelon, Dictionary, MD2, MD4,MDA, diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6, 757, Kh-11, EODN, SHS,^X, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, NSS, Duress,RAID, Uziel, wojo, Psyops, SASCOM, grom, NSIRL, D-11, SERT, VIP, ARC,S.E.T.Team, NSWG, MP5k, SATKA, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV,NACSI, MEU/SOC,PSAC, PTT, RFI, EDF, ZL31, SIGDASYS, TDM, SUKLO, SUSLO,TELINT, fake, TEXTA, ELF, LF, MF, CGT, SIGS, VHF, Recon, peapod,PA598D28,Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF, SHF, ASIO, SASP, WANK,Colonel,domestic disruption, divorce, 5ESS, smuggle, Z-200, 15kg, DUVDEVAN, RFX,nitrate, OIR, Pretoria, M-14, enigma, Bletchley Park, Clandestine, NSO,nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, SARA, RapidReaction, JSOFC3IP, Corporate Security, Police, sniper, PPS, ASIS,ASLET,TSCM, Security Consulting, M-x spook, Z-150T, High Security, SecurityEvaluation, Electronic Surveillance, MI-17, ISR, NSAS,Counterterrorism,real, spies, IWO, eavesdropping, debugging, CCSS, interception, COCOT,NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn, NAVCM,Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, tc, 2EME REP,FID,7NL SBS, tekka, captain, 226, .45, nonac, .li, Ionosphere, Mole,Keyhole,NABS, Kilderkin, Artichoke, Badger, Emerson, Tzvrif, SDIS, T2S2, STTC,DNR,NADDIS, NFLIS, CFD, quarter, Cornflower, Daisy, Egret, Iris, JSOTF,Hollyhock, Jasmine, Juile, Vinnell, B.D.M., Sphinx, Stephanie,Reflection,Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, rusers, Covert Video,Intiso,r00t, lock picking, Beyond Hope, LASINT, csystems, .tm, passwd, 2600Magazine, JUWTF, Competitor, EO, Chan, Pathfinders, JTF,Nash,ISSAA, B61-11, Alouette, executive, Event Security, Mace, Cap-Stun,stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Prologue,Rolm,TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, , RIT, Time, MSEE, Cable &Wireless, CSE, SUW, J2, Embassy, ETA, Fax, finks, Fax encryption, whitenoise, Fernspah, MYK, GAFE, forcast, import, rain, tiger, buzzer, N9,pinknoise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security,Macintosh Internet Security, OC3, Macintosh Firewalls, Unix Security,VIPProtection, SIG, sweep, Medco, TRD, TDR, Z, sweeping, SURSAT, 5926,TELINT,Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, NAIAG,Cypherpunks, NARF, 127, Coderpunks, TRW, remailers, replay, redheads,RX-7,explicit, FLAME, JTF-6, AVN, ISSSP, Anonymous, W, Sex, chaining, codes,Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b,d,SUBACS, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, UXO, (),OC-12,counterintelligence, Shaldag, sport, NASA, TWA, DT, gtegsc, owhere, .ch,hope, emc, industrial espionage, SUPIR, PI, TSCI, spookwords, industrialintelligence, H.N.P., SUAEWICS, Juiliett Class Submarine, Locks, qrss,loch,64 Vauxhall Cross, Ingram Mac-10, wwics, sigvoice, ssa, E.O.D., SEMTEX,penrep, racal, OTP, OSS, Siemens, RPC, Met, CIA, DST, INI, watchers,keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo Class, squib,primacord,RSP, Z7, Becker, Nerd, fangs, Austin, nod, Comirex, GPMG, Speakeasy,humint,GEODSS, SORO, M5, BROMURE, ANC, zone, SBI, DSS, S.A.I.C., Minox,Keyhole,SAR, Rand Corporation, Starr, Wackenhutt, EO, burhop, Wackendude, mol,Shelton, 2E781, F-22, 2010, JCET, cocaine, coca, Vale, IG, Kosovo, Dake,36,800, Hillal, Pesec, Hindawi, GGL, NAICC, CTU, botux, Virii, CCC,ISPE,CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura, Small Pox, Tajik, Blacklisted 411, TRDL, Internet Underground, BX, XS4ALL, wetsu, LOL,muezzin, Retinal Fetish, WIR, Fetish, FCA, Yobie, forschung, emm, ANZUS,Reprieve, NZC-332, edition, cards, mania, 701, CTP, CATO, phone, ChicagoSeattle, Davos, Bangkok, Paris, Posse, NSDM, l0ck, spook, keywords, QRR,PLA, TDYC, W3, CUD, CdC, news, Weekly World News, Zen, World Domination,Dead, GRU, M72750, Salsa, 7, Blowfish, feminism, Gorelick, Glock, Ft.Meade, NSWT, press-release, WISDIM, burned, Indigo, wire transfer,e-cash,Bubba the Love Sponge, Enforcers, Digicash, zip, SWAT, Ortega, PPP,NACSE,crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, ISM, JCE, Middleman, KLM,Blackbird, NSV, GQ360, X400, Texas, jihad, SDI, BRIGAND, Uzi, FortMeade, gchq.gov.uk, supercomputer, bullion, 3, NTTC, Blackmednet, :,Propaganda, ABC, Satellite phones, IWIS, Planet-1, ISTA, rs9512c, SouthAfrica, Sergeyev, Montenegro, Toeffler, Rebollo, sorot, cryptanalysis,nuclear, 52 52 N – 03 03 W, Morgan, Canine, GEBA, INSCOM, France, MEMEX,Stanley, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force,SEAL,virtual, WASS, WID, Dolch, secure shell, screws, Black-Ops, O/S,Venezuela,Ecuador, Argentina, Area51, SABC, basement, ISWG, data-haven, NSDD,black-bag, rack, TEMPEST, Goodwin, rebels, ID, MD5, IDEA, garbage,market,beef, Stego, ISAF, unclassified, Sayeret Tzanhanim, PARASAR, Gripan,pirg,curly, Taiwan, guest, utopia, NSG, orthodox, CCSQ, Alica, SHA, Global,gorilla, Bob, UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx,Lenin,Abdurahmon,snullen, Pseudonyms, MITM, NARF, Gray Data, VLSI, mega, Leitrim, Yakima,NSES, Sugar Grove, WAS, Cowboy, Gist, 8182, Gatt, Platform, 1911,Geraldton,UKUSA, veggie, XM, Parvus, NAVSVS, 3848, Morwenstow, Consul, Oratory,PineGap, Menwith, Mantis, DSD, BVD, 1984, blow out, BUDS, WQC, Flintlock,PABX,Electron, Church, Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1,erco,Toffler, FAS, RHL, K3, Visa/BCC, SNT, Ceridian, STE, condor,CipherTAC-2000,Etacs, Corsica, Shipiro, ssor, piz, fritz, KY, 32, Edens, Kiwis,Kamumaruha,DODIG, Firefly, HRM, Albright, Bellcore, rail, csim, NMS, 2c, FIPS140-1,CAVE, E-Bomb, CDMA, Fortezza, 355ml, ISSC, cybercash, NAWAS, government,NSY, hate, Microsoft, MP3, speedbump, joe, illuminati, BOSS, Kourou,Misawa,Morse, HF, P415, ladylove, filofax, Gulf, lamma, Unit 5707, SayeretMat’Kal,Unit 669, Sayeret Golani, Lanceros, Ejército, Liberación, Nacional,Summercon, NSADS, president, ISFR, freedom, ISSO, walburn, Defcon VI,DC6,Larson, P99, HERF pipe-bomb, cocaine, impact, Roswell, ESN,COS,E.T., credit card, b9, fraud, ST1, assassinate, virus, ISCS, ISPR,anarchy,anarchysm, rogue, mailbomb, Chelsea, Whitewater, MOD, York, plutonium, libertad, OMC, MOC, William Gates, clone, BATF, SGDN, Nike,WWSV,Atlas, IWWSVCS, Delta, TWA, Lewiski, Kiwi, PGP 2.6.2., PGP 5.0i, PGP5.1,siliconpimp, SASSTIXS, IWG, Lynch, 414, Face, Pixar, IRIDF, NSRB,eternityserver, Skytel, Yukon, Templeton, Johohonbu, LUK, Cohiba, Soros,Standford,niche, ISEP, ISEC, 51, H&K, USP, sardine, bank, EUB, USP, PCS, NRO,RedCell, NSOF, Glock 26, snuffle, indigeneous, indian, Patel, package, ISI,INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu,FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA,LITE,PKK, HoHoCon, SISMI, ISG, FIS, MSW, Spyderco, UOP, SSCI, NIMA,HAMASMOIS,SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG, chameleon man,Hutsul, CESID, Bess, rail gun, .375, Peering, CSC, Tangimoana Beach,Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST, MITI, JERTO, SDF,Koancho, Blenheim, Rivera, Kyudanki, varon, 310, 17, 312, NB, CBM, CTP,Sardine, SBIRS, jaws, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL,Flu, &, Loin, PGP 5.53, meta, Faber, SFPD, EG&G, ISEP, blackjack, Fox,Aum,AIEWS, AMW, RHL, Baranyi, WORM, MP5K-SD, WINGS, cdi, VIA, DynCorp,food, UXO, Ti, WWSP, WID, honor, Templar, THAAD, package,CISD,ISG, IVG, social, BIOLWPN, JRA, ISB, ISDS, chosen, LBSD, van, schloss,secops, DCSS, DPSD, LIF, PRIME, SURVIAC, telex, SP4, Analyzer, embassy,Golf, B61-7, Maple, Tokyo, ERR, SBU, Threat, JPL, Tess, SE, EPL,SPINTCOM,ISS-ADP, Merv, Mexico, SUR, SO13, Rojdykarna, airframe, 510, EuroFed,Avi,shelter, Crypto AG, BeepBeepKarl, Justin, RamasseBoy, Stronger than theAverage, koulou-koulou, cagoulard, Mustaphanou, Islam, Islamist, Ligue,Front, Frente, RESEAU ECHELON NSA GCHQ GCSB CSE DSD CNCIS DGSE CIA FBI PENTAGONE DST KALASCHNICOV TERRORISM IRAK KOSOVO ISRAEL LEBANON MISSILE CHIRAC JOSPIN ELTSINE GAZA SPY LSD SATELLITE GOVERNMENT U.S. ADMINISTRATION CONTROL SECRET CONFIDENTIAL DEFENSE NATIONALE GUERRE BILL CLINTON SECURITY SECURITE OPERATIONAL OPERATIONNEL RG SADDAM HUSSEN MILOSEVIC H.C.OTAN UNITED NATIONS UNIES IRS ATF BATF DOD WACO RUBY RIDGE OKC OKLAHOMA CITY MILITIA GUN HANDGUN MILGOV ASSAULT RIFLE TERRORISM BOMB DRUG HORUCHI KORESH DAVIDIAN KAHL POSSE COMITATUS RANDY WEAVER VICKIE WEAVER SPECIAL FORCES LINDA THOMPSON CONSTITUTION MILITARY TERRORIST TASK FORCE SPECIAL OPS GROUP PARATROOPER SPECIAL OPERATIONS GROUP SOG SOCRATE RANGER SIPRNET SOF SURVEILLANCE DIRECTION SYSTEM WARLORD DELTA FORCE COBRA CONSTITUTION BILL OF RIGHTS WHITEWATER POM PARK ON METER ARKANSIDE IRAN CONTRAS OLIVER NORTH VINCE FOSTER PROMIS MOSSAD NASA MI5 ONI CID AK47 M16 C4 MALCOLM X REVOLUTION CHEROKEE HILLARY BILL CLINTON GORE GEORGE BUSH WACKENHUT TERRORIST TASK FORCE 160 SPECIAL OPS 12TH GROUP 5TH GROUP

6/17/09. While riding. Nikon Coolpix S50. Handheld. License plate edited with Microsoft Paint to protect privacy.

 

The S85B50 is a high-revving engine designed to utilize power from a wide rev band. Having a redline of 8250 rpm, it achieves over 100 bhp (70 kW)/litre and features a very high compression ratio of 12.0:1.

 

The 2009 BMW M6 has a 5.0 Litre V10 engine pushing 507 hp (378 kW) @ 7750rpm/520 N·m (384 lb·ft) torque @ 6100rpm.

 

2482 v 1/5/15

3130 v 10/9/15 {changed name to M6}

 

kit box kinder cash tax mov moov movie sight slight sly so if ele return bacl forward backslash mormon sioniste cathare breton corse arabe musulman, muslim mousse à raser rasoir rateau tolard espaces meudon clamart soul breat bright brit sun light cadillac norton fiat punto citroen ds gs xm sm mehari geep buggy cloop cigarette test splif bab oinj joint jointure culasse ass asshole dolly parton marmadi nedjad hidjab hi ho ha yes no oui non pourquoi because harrison lennon beatles stones pink octothorpe pound sign size height width color background-color weight boring build buy sell sold add addict addiction lost less confuse confusion ses porn wild legs arm boob help none all alone us with carry let lit pal cam secam condom briz bold thin light mail @ Πόλεμος έξω από την πόρτα μας

shots follow webstagram colorful #style #swag

Explosives, guns, assassination, wonder jackson 5 five cinq pende conspiracy, primers, detonators, Kakadan, initiators,

main charge, nuclear charges, ambush, sniping, motorcade, IRS, ETA, FARC, Cuba, Castro,

Che Guevara, revolution, ATTAC, BATF, jtf-6, mjtf, hrt, srt, hostages, munitions, weapons,

TNT, rdx, amfo, love, peace, hmtd, picric acid, silver itrite, mercury fulminate, presidential |^|^|^|^|^|^|^|^|^|^|^|^|^|

@#@#@#

motorcade, Greenpeace, Chirac, salt peter, charcoal, sulfur, c4, composition b, petn, lead azide,

lead styphante, ddnp, tetryl, nitrocellulose, nitrostarch, mines, grenades, rockets, fuses,

delay mechanism, mortars, rpg7, propellants, incendiaries, incendiary device, thermite, security

forces, intelligence, agencies, hrt, resistance, psyops, infiltration, assault team, defensive elements,

evasion, detection, mission, communications, the football, platter charge, shaped charges, m118, claymore,

body armor, charges, shrapnel, timers, timing devices, boobytraps, detcord, pmk 40, silencers, Uzi, HK-MP5,

AK-47, FAL, Jatti, Skorpion MP, teflon bullets, cordite, napalm, law, Stingers, RPK, SOCIMI 821 SMG, STEN,

BAR, MP40, HK-G3,FN-MAG, RPD,PzB39, Air Force One, M60, RPK74, SG530, SG540, Galil arm, Walther WA2000,

HK33KE, Parker-Hale, MOD. 82, AKR, Ingram MAC10, M3, L34A1, Walther MPL, AKS-74, HK-GR6, subsonic rounds,

ballistic media, special forces, JFKSWC, SFOD-D, SRT, Rewson, SAFE, Waihopai, INFOSEC, ASPIC, Information Security,

SAI, Information Warfare, IW, IS, Privacy, Information Terrorism, Kenya, Terrorism Defensive, Bucky Roberts, José Bové,

Confédérarion Paysanne, Information, Defense Information Warfare, Offensive Information, listeriose, listeria,

Offensive Information Warfare, NAIA, SAPM, ASU, ECHELON ASTS, National Information Infrastructure, InfoSec, SAO,

Reno, Compsec, JICS, Computer Terrorism, Firewalls, Secure Internet Connections, RSP, ISS, JDF, Passwords, NAAP,

DefCon V, RSO, Hackers, Encryption, ASWS, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secret Service, USSS, Defcon,

Military, White House, Undercover, NCCS, Mayfly, PGP, SALDV, PEM, resta, RSA, Perl-RSA, MSNBC, bet, AOL, AOL,

street fight, against, TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, Tanzania, SAMU, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS,

UT/RUS, JANET, ram, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, SADCC, NSLEP, SACLANTCEN, FALN, 877, NAVELEXSYSSECENGCEN,

BZ, CANSLO, CBNRC, CIDA, JAVA, rsta, Active X, Compsec 97, RENS, LLC, DERA, JIC, rip, rb, Wu, RDI, Mavricks, BIOL,

Meta-hackers, ^?, SADT, Steve Case, Tools, RECCEX, Telex, OTAN, monarchist, NMIC, NIOG, IDB, MID/KL, NADIS, NMI, SEIDM,

BNC, CNCIS, STEEPLEBUSH, RG, BSS, DDIS, mixmaster, BCCI, BRGE, SARL, Military Intelligence, JICA, Scully, recondo, Flame,

Infowar, Bubba, Freeh, Archives, ISADC, CISSP, Sundevil, jack, Investigation, JOTS, ISACA, NCSA, ASVC, spook words, RRF,

1071, Bugs Bunny, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, JIC, bce, Lacrosse, Flashbangs,

HRT, IRA, EODG, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, Chávez, mouvement, movement, site, SASSTIXS,

NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, SARD, Marx, Groucho Marx, Marx Brothers, LABLINK, USACIL, SAPT,

USCG, NRC, ~, O, NSA/CSS, CDC, DOE, SAAM, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, bemd, SGC, UNCPCJ, CFC,

SABENA, DREO, CDA, SADRS, DRA, SHAPE, bird dog, SACLANT, BECCA, DCJFTF, HALO,SC, TASAS, Lander, GSM, T Branch, AST, SAMCOMM,

HAHO, FKS, 868, GCHQ, DITSA,SORT,AMEMB, NSG, HIC, EDI, benelux, SAS, SBS, SAW, UDT, EODC, GOE, catholic,integrist, exorcist,

DOE, SAMF, GEO, JRB, 3P-HV, Masuda, Forte, AT,GIGN,Exon Shell, radint, MB, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS,

GEOS, EADA, SART, FLB, Bretagne, BBE, STEP, Echelon, Dictionary, MD2, MD4,MDA, diwn, 747, ASIC, 777, RDI, 767, MI5, 737, MI6,

757, Kh-11, EODN, SHS,^X, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, NSS, Duress,RAID, Uziel, wojo, Psyops,

SASCOM, grom, NSIRL, D-11, SERT, VIP, ARC,S.E.T.Team, NSWG, MP5k, SATKA, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV,NACSI,

MEU/SOC,PSAC, PTT, RFI, EDF, ZL31, SIGDASYS, TDM, SUKLO, SUSLO,TELINT, fake, TEXTA, ELF, LF, MF, CGT, SIGS, VHF, Recon, peapod,

PA598D28, Spall, dort, 50MZ, 11Emc Choe, SATCOMA, UHF, SHF, ASIO, SASP, WANK, Colonel, domestic disruption, divorce, 5ESS, smuggle,

Z-200, 15kg, DUVDEVAN, RFX,nitrate, OIR, Pretoria, M-14, enigma, Bletchley Park, Clandestine, NSO, nkvd, argus, afsatcom, CQB, NVD,

Counter Terrorism Security, SARA, RapidReaction, JSOFC3IP, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM,

Security Consulting, M-x spook, Z-150T, High Security, SecurityEvaluation, Electronic Surveillance, MI-17, ISR, NSAS, Counterterrorism,

real, spies, IWO, eavesdropping, debugging, CCSS, interception, COCOT,NACSI, rhost, rhosts, ASO, SETA, Amherst, Broadside, Capricorn,

NAVCM,Gamma, Gorizont, Guppy, NSS, rita, ISSO, submiss, ASDIC, tc, 2EME REP,FID,7NL SBS, tekka, captain, 226, .45, nonac, .li,

Ionosphere, Mole,Keyhole,NABS, Kilderkin, Artichoke, Badger, Emerson, Tzvrif, SDIS, T2S2, STTC,DNR,NADDIS, NFLIS, CFD, quarter,

Cornflower, Daisy, Egret, Iris, JSOTF,Hollyhock, Jasmine, Juile, Vinnell, B.D.M., Sphinx, Stephanie,Reflection,Spoke, Talent, Trump,

FX, FXR, IMF, POCSAG, rusers, Covert Video, Intiso, r00t, lock picking, Beyond Hope, LASINT, csystems, .tm, passwd, 2600Magazine,

JUWTF, Competitor, EO, Chan, Pathfinders, JTF,Nash,ISSAA, B61-11, Alouette, executive, Event Security, Mace, Cap-Stun,stakeout,

ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Prologue, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, RIT, Time, MSEE,

Cable &Wireless, CSE, SUW, J2, Embassy, ETA, Fax, finks, Fax encryption, whitenoise, Fernspah, MYK, GAFE, forcast, import, rain,

tiger, buzzer, N9,pinknoise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, OC3,

Macintosh Firewalls, Unix Security, VIPProtection, SIG, sweep, Medco, TRD, TDR, Z, sweeping, SURSAT, 5926, TELINT, Audiotel,

Harvard, 1080H, SWS, Asset, Satellite imagery, force, NAIAG,Cypherpunks, NARF, 127, Coderpunks, TRW, remailers, replay, redheads,

RX-7,explicit, FLAME, JTF-6, AVN, ISSSP, Anonymous, W, Sex, chaining, codes,Nuclear, 20, subversives, SLIP, toad, fish, data havens,

unix, c, a, b,d,SUBACS, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, UXO, (),OC-12,counterintelligence, Shaldag, sport, NASA,

TWA, DT, gtegsc, owhere, .ch,hope, emc, industrial espionage, SUPIR, PI, TSCI, spookwords, industrialintelligence, H.N.P., SUAEWICS,

Juiliett Class Submarine, Locks, qrss,loch,64 Vauxhall Cross, Ingram Mac-10, wwics, sigvoice, ssa, E.O.D., SEMTEX,penrep, racal, OTP,

OSS, Siemens, RPC, Met, CIA, DST, INI, watchers,keebler, contacts, Blowpipe, BTM, CCS, GSA, Kilo Class, squib,primacord,RSP, Z7, Becker,

Nerd, fangs, Austin, nod, Comirex, GPMG, Speakeasy,humint,GEODSS, SORO, M5, BROMURE, ANC, zone, SBI, DSS, S.A.I.C., Minox,Keyhole, SAR,

Rand Corporation, Starr, Wackenhutt, EO, burhop, Wackendude, mol,Shelton, 2E781, F-22, 2010, JCET, cocaine, coca, Vale, IG, Kosovo, Dake,

36, 800, Hillal, Pesec, Hindawi, GGL, NAICC, CTU, botux, Virii, CCC,ISPE,CCSC, Scud, SecDef, Magdeyev, VOA, Kosiura, Small Pox, Tajik,

Blacklisted 411, TRDL, Internet Underground, BX, XS4ALL, wetsu, LOL,muezzin, Retinal Fetish, WIR, Fetish, FCA, Yobie, forschung, emm,

ANZUS,Reprieve, NZC-332, edition, cards, mania, 701, CTP, CATO, phone, ChicagoSeattle, Davos, Bangkok, Paris, Posse, NSDM, l0ck, spook,

keywords, QRR,PLA, TDYC, W3, CUD, CdC, news, Weekly World News, Zen, World Domination,Dead, GRU, M72750, Salsa, 7, Blowfish, feminism,

Gorelick, Glock, Ft.Meade, NSWT, press-release, WISDIM, burned, Indigo, wire transfer,e-cash,Bubba the Love Sponge, Enforcers, Digicash,

zip, SWAT, Ortega, PPP,NACSE,crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, ISM, JCE, Middleman, KLM,Blackbird, NSV, GQ360, X400, Texas,

jihad, SDI, BRIGAND, Uzi, FortMeade, gchq.gov.uk, supercomputer, bullion, 3, NTTC, Blackmednet, :,Propaganda, ABC, Satellite phones, IWIS,

Planet-1, ISTA, rs9512c, SouthAfrica, Sergeyev, Montenegro, Toeffler, Rebollo, sorot, cryptanalysis,nuclear, 52 52 N – 03 03 W, Morgan,

Canine, GEBA, INSCOM, France, MEMEX,Stanley, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force,SEAL,virtual, WASS, WID, Dolch,

secure shell, screws, Black-Ops, O/S,Venezuela,Ecuador, Argentina, Area51, SABC, basement, ISWG, data-haven, NSDD,black-bag, rack, TEMPEST,

Goodwin, rebels, ID, MD5, IDEA, garbage,market,beef, Stego, ISAF, unclassified, Sayeret Tzanhanim, PARASAR, Gripan,pirg,curly, Taiwan, guest,

utopia, NSG, orthodox, CCSQ, Alica, SHA, Global,gorilla, Bob, UNSCOM, Fukuyama, Manfurov, Kvashnin, Marx,Lenin,Abdurahmon,snullen, Pseudonyms,

MITM, NARF, Gray Data, VLSI, mega, Leitrim, Yakima,NSES, Sugar Grove, WAS, Cowboy, Gist, 8182, Gatt, Platform, 1911,Geraldton,UKUSA, veggie,

XM, Parvus, NAVSVS, 3848, Morwenstow, Consul, Oratory,PineGap, Menwith, Mantis, DSD, BVD, 1984, blow out, BUDS, WQC, Flintlock,PABX,Electron,

Church, Chicago Crust, e95, DDR&E, 3M, KEDO, iButton, R1,erco,Toffler, FAS, RHL, K3, Visa/BCC, SNT, Ceridian, STE, condor,CipherTAC-2000,Etacs,

Corsica, Shipiro, ssor, piz, fritz, KY, 32, Edens, Kiwis,Kamumaruha,DODIG, Firefly, HRM, Albright, Bellcore, rail, csim, NMS, 2c, FIPS140-1,CAVE,

E-Bomb, CDMA, Fortezza, 355ml, ISSC, cybercash, NAWAS, government,NSY, hate, Microsoft, MP3, speedbump, joe, illuminati, BOSS, Kourou,Misawa,Morse,

HF, P415, ladylove, filofax, Gulf, lamma, Unit 5707, SayeretMat’Kal,Unit 669, Sayeret Golani, Lanceros, Ejército, Liberación, Nacional,Summercon,

NSADS, president, ISFR, freedom, ISSO, walburn, Defcon VI,DC6,Larson, P99, HERF pipe-bomb, cocaine, impact, Roswell, ESN,COS,E.T., credit card, b9,

fraud, ST1, assassinate, virus, ISCS, ISPR,anarchy,anarchysm, rogue, mailbomb, Chelsea, Whitewater, MOD, York, plutonium, libertad, OMC, MOC,

William Gates, clone, BATF, SGDN, Nike,WWSV,Atlas, IWWSVCS, Delta, TWA, Lewiski, Kiwi, PGP 2.6.2., PGP 5.0i, PGP5.1,siliconpimp, SASSTIXS, IWG,

Lynch, 414, Face, Pixar, IRIDF, NSRB,eternityserver, Skytel, Yukon, Templeton, Johohonbu, LUK, Cohiba, Soros,Standford,niche, ISEP, ISEC, 51,

H&K, USP, sardine, bank, EUB, USP, PCS, NRO,RedCell, NSOF, Glock 26, snuffle, indigeneous, indian, Patel, package, ISI,INR, INS, IRS, GRU, RUOP,

GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu,FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA,LITE,PKK, HoHoCon, SISMI, ISG,

FIS, MSW, Spyderco, UOP, SSCI, NIMA,HAMASMOIS,SVR, SIN, advisors, SAP, Monica, OAU, PFS, Aladdin, AG, chameleon man,Hutsul, CESID, Bess, rail gun,

.375, Peering, CSC, Tangimoana Beach,Commecen, Vanuatu, Kwajalein, LHI, DRM, GSGI, DST, MITI, JERTO, SDF,Koancho, Blenheim, Rivera, Kyudanki, varon,

310, 17, 312, NB, CBM, CTP,Sardine, SBIRS, jaws, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL,Flu, &, Loin, PGP 5.53, meta, Faber, SFPD, EG&G,

ISEP, blackjack, Fox,Aum,AIEWS, AMW, RHL, Baranyi, WORM, MP5K-SD, WINGS, cdi, VIA, DynCorp,food, UXO, Ti, WWSP, WID, honor, Templar, THAAD, package,

CISD,ISG, IVG, social, BIOLWPN, JRA, ISB, ISDS, chosen, LBSD, van, schloss,secops, DCSS, DPSD, LIF, PRIME, SURVIAC, telex, SP4, Analyzer, embassy,Golf,

B61-7, Maple, Tokyo, ERR, SBU, Threat, JPL, Tess, SE, EPL,SPINTCOM,ISS-ADP, Merv, Mexico, SUR, SO13, Rojdykarna, airframe, 510, EuroFed,Avi,shelter,

Crypto AG, BeepBeepKarl, Justin, RamasseBoy, Stronger than theAverage, koulou-koulou, cagoulard, Ligue,Front, Frente,

RESEAU ECHELON NSA GCHQ GCSB CSE DSD CNCIS DGSE CIA FBI PENTAGONE DST KALASCHNICOV TERRORISM IRAK KOSOVO ISRAEL LEBANON MISSILE CHIRAC JOSPIN ELTSINE

GAZA SPY LSD SATELLITE GOVERNMENT U.S. ADMINISTRATION CONTROL SECRET CONFIDENTIAL DEFENSE NATIONALE GUERRE BILL CLINTON SECURITY SECURITE OPERATIONAL

OPERATIONNEL RG H.C.OTAN UNITED NATIONS UNIES IRS ATF BATF DOD WACO RUBY RIDGE OKC OKLAHOMA CITY MILITIA GUN HANDGUN MILGOV ASSAULT RIFLE DRUG HORUCHI

KORESH DAVIDIAN KAHL POSSE COMITATUS RANDY WEAVER VICKIE WEAVER SPECIAL FORCES LINDA THOMPSON CONSTITUTION MILITARY TERRORIST TASK FORCE SPECIAL OPS

GROUP PARATROOPER SPECIAL OPERATIONS GROUP SOG SOCRATE RANGER SIPRNET SOF SURVEILLANCE DIRECTION SYSTEM WARLORD DELTA FORCE COBRA CONSTITUTION

BILL OF RIGHTS WHITEWATER POM PARK ON METER ARKANSIDE IRAN CONTRAS OLIVER NORTH VINCE FOSTER PROMIS MOSSAD NASA MI5 ONI CID AK47 M16 C4 MALCOLM X

REVOLUTION CHEROKEE HILLARY BILL CLINTON GORE GEORGE BUSH WACKENHUT TERRORIST TASK FORCE 160 SPECIAL OPS 12TH GROUP 5TH GROUP

The US Consitution was a clear and present danger to the PNAC-AIPAC-Wall Street corporate architects of 911.

 

Luckily for its billionaire holocaust survivors, for their multinational corporations, for their Supreme Mafia Court, their toy president and toy congress and for their terrorist military corporations aimed directly at the people of the United States....

 

...That dangerous constitution rag can never threaten multinational terrorist corporations and war profits again. As GOPDEM's describe their corporate 911 junta, they are the new American Citizens. That's why it is their corporate military NSA-CIA-CIA-Homeland spy and repress mission to war against the 99.99% of former Americans stripped of rights.

 

They pay themselves well to stay safe from the pre-911 former Americans. Their behemoth corporate spy and war machine endows itself with certain inalienable rights to terrorize whomever it profits the military corporations to do so. That's what Wall Street's toy congress and toy presidents are payed to do.

 

In order to outlaw challenges to post 911 crime corporation supremacy, their Supreme Mafia Court officially legislated that multinational corporations are replacement citizens that rule as law officially in 2010. They replace non-corporations meaning they replace people.

 

Constitutional "consent of the governed" is a relic. The 911 junta is Earth's multinational corporate law unto itself and permanent war against the governed.

 

Consent of the governed is corporate consent by The Supreme Mafia Court Corporation of common thugs: Roberts, Alito, Scalia, Thomas and Kennedy.

-RT

**********************************************************************************

 

Shredding the Fourth Amendment in Post-Constitutional America

Four Ways It No Longer Applies

By Peter Van Buren

 

Here’s a bit of history from another America: the Bill of Rights was designed to protect the people from their government. If the First Amendment’s right to speak out publicly was the people's wall of security, then the Fourth Amendment’s right to privacy was its buttress. It was once thought that the government should neither be able to stop citizens from speaking nor peer into their lives. Think of that as the essence of the Constitutional era that ended when those towers came down on September 11, 2001. Consider how privacy worked before 9/11 and how it works now in Post-Constitutional America.

 

The Fourth Amendment

 

A response to British King George’s excessive invasions of privacy in colonial America, the Fourth Amendment pulls no punches: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

 

In Post-Constitutional America, the government might as well have taken scissors to the original copy of the Constitution stored in the National Archives, then crumpled up the Fourth Amendment and tossed it in the garbage can. The NSA revelations of Edward Snowden are, in that sense, not just a shock to the conscience but to the Fourth Amendment itself: our government spies on us. All of us. Without suspicion. Without warrants. Without probable cause. Without restraint. This would qualify as “unreasonable” in our old constitutional world, but no more.

 

Here, then, are four ways that, in the name of American “security” and according to our government, the Fourth Amendment no longer really applies to our lives.

 

The Constitutional Borderline

 

Begin at America's borders. Most people believe they are “in” the United States as soon as they step off an international flight and are thus fully covered by the Bill of Rights. The truth has, in the twenty-first century, become infinitely more complicated as long-standing practices are manipulated to serve the expanding desires of the national security state. The mining of words and concepts for new, darker meanings is a hallmark of how things work in Post-Constitutional America.

 

Over the years, recognizing that certain situations could render Fourth Amendment requirements impractical or against the public interest, the Supreme Court crafted various exceptions to them. One was the “border search.” The idea was that the United States should be able to protect itself by stopping and examining people entering the country. As a result, routine border searches without warrants are constitutionally “reasonable” simply by virtue of where they take place. It’s a concept with a long history, enumerated by the First Congress in 1789.

 

Here’s the twist in the present era: the definition of “border” has been changed. Upon arriving in the United States from abroad, you are not legally present in the country until allowed to enter by Department of Homeland Security (DHS) officials. You know, the guys who look into your luggage and stamp your passport. Until that moment, you exist in a legal void where the protections of the Bill of Rights and the laws of the United States do not apply. This concept also predates Post-Constitutional America and the DHS. Remember the sorting process at Ellis Island in the late nineteenth and early twentieth centuries? No lawyers allowed there.

 

Those modest exceptions were all part of constitutional America. Today, once reasonable searches at the border have morphed into a vast “Constitution-free zone.” The “border” is now a strip of land circling the country and extending 100 miles inland that includes two-thirds of the U.S. population. In this vast region, Customs and Border Protection (CBP) can set up checkpoints and conduct warrantless searches. At airports, American citizens are now similarly subjected to search and seizure as filmmaker Laura Poitras -- whose work focuses on national security issues in general and Edward Snowden in the particular -- knows firsthand. Since 2006, almost every time Poitras has returned to the U.S., her plane has been met by government agents and her laptop and phone examined.

 

There are multiple similar high-profile cases (including those of a Wikileaks researcher and a Chelsea Manning supporter), but ordinary citizens are hardly exempt. Despite standing in an American airport, a pane of glass away from loved ones, you are not in the U.S. and have no Fourth Amendment rights. How many such airport searches are conducted in the aggregate is unknown. The best information we have comes from a FOIA request by the ACLU. It revealed that, in the 18-month period beginning in October 2008, more than 6,600 people, about half of them U.S. citizens, were subjected to electronic device searches at the border.

 

Still, reminding us that it’s possible to have a sense of humor on the road to hell, the CBP offers this undoubtedly inadvertent pun at its website: “It is not the intent of CBP to subject travelers to unwarranted scrutiny.” (emphasis added)

 

Making It All Constitutional In-House

 

Here’s another example of how definitions have been readjusted to serve the national security state's overriding needs: the Department of Justice (DOJ) created a Post-Constitutional interpretation of the Fourth Amendment that allows it to access millions of records of Americans using only subpoenas, not search warrants.

 

Some background: a warrant is court permission to search and seize something. As the Fourth Amendment makes clear, it must be specific: enter Thomas Anderson's home and look for hacked software. Warrants can only be issued on “probable cause.” The Supreme Court defined probable cause as requiring a high standard of proof, or to quote its words, “a fair probability that contraband or evidence of a crime will be found in a particular place.”

 

A subpoena on the other hand is nothing more than a government order issued to a citizen or organization to do something, most typically to produce a document. Standards for issuing a subpoena are flexible, as most executive agencies can issue them on their own without interaction with a court. In such cases, there is no independent oversight.

 

The Department of Justice now claims that, under the Fourth Amendment, it can simply subpoena an Internet company like Facebook and demand that they look for and turn over all the records they have on our Mr. Anderson. Their explanation: the DOJ isn't doing the searching, just demanding that another organization do it. As far as its lawyers are concerned, in such a situation, no warrant is needed. In addition, the Department of Justice believes it has the authority to subpoena multiple records, maybe even all the records Facebook has. Records on you? Some group of people including you? Everyone? We don't know, as sources of data like Facebook and Google are prohibited from disclosing much about the information they hand over to the NSA or other government outfits about you.

 

It’s easy enough to miss the gravity of this in-house interpretation when it comes to the Fourth Amendment. If the FBI today came to your home and demanded access to your emails, it would require a warrant obtained from a court after a show of probable cause to get them. If, however, the Department of Justice can simply issue a subpoena to Google to the same end, they can potentially vacuum up every Gmail message you’ve ever sent without a warrant and it won’t constitute a “search.” The DOJ has continued this practice even though in 2010 a federal appeals court ruled that bulk warrantless access to email violates the Fourth Amendment. An FBI field manual released under the Freedom of Information Act similarly makes it clear that the Bureau’s agents don’t need warrants to access email in bulk when it’s pulled directly from Google, Yahoo, Microsoft, or other service providers.

 

How far can the use of a subpoena go in bypassing the Fourth Amendment? Recently, the inspector general of the Department of Veterans Affairs (VA) issued a subpoena -- no court involved -- demanding that the Project On Government Oversight (POGO) turn over all information it has collected relating to abuses and mismanagement at VA medical facilities. POGO is a private, non-profit group, dedicated to assisting whistleblowers. The VA subpoena demands access to records sent via an encrypted website to POGO under a promise of anonymity, many from current or former VA employees.

 

Rather than seek to break the encryption surreptitiously and illegally to expose the whistleblowers, the government has taken a simpler, if unconstitutional route, by simply demanding the names and reports. POGO has refused to comply, setting up a legal confrontation. In the meantime, consider it just another sign of the direction the government is heading when it comes to the Fourth Amendment.

 

Technology and the Fourth Amendment

 

Some observers suggest that there is little new here. For example, the compiling of information on innocent Americans by J. Edgar Hoover's low-tech FBI back in the 1960s has been well documented. Paper reports on activities, recordings of conversations, and photos of meetings and trysts, all secretly obtained, exposed the lives of civil rights leaders, popular musicians, and antiwar protesters. From 1956 to at least 1971, the government also wiretapped the calls and conversations of Americans under the Bureau’s counterintelligence program (COINTELPRO).

 

But those who look to such history of government illegality for a strange kind of nothing-new-under-the-sun reassurance have not grasped the impact of fast-developing technology. In scale, scope, and sheer efficiency, the systems now being employed inside the U.S. by the NSA and other intelligence agencies are something quite new and historically significant. Size matters.

 

To avoid such encroaching digitization would essentially mean withdrawing from society, not exactly an option for most Americans. More of life is now online -- from banking to travel to social media. Where the NSA was once limited to traditional notions of communication -- the written and spoken word -- new possibilities for following you and intruding on your life in myriad ways are being created. The agency can, for instance, now collect images, photos, and video, and subject them to facial recognition technology that can increasingly put a name to a face. Such technology, employed today at casinos as well as in the secret world of the national security state, can pick out a face in a crowd and identify it, taking into account age, changes in facial hair, new glasses, hats, and the like.

 

An offshoot of facial recognition is the broader category of biometrics, the use of physical and biological traits unique to a person for identification. These can be anything from ordinary fingerprinting to cutting-edge DNA records and iris scans. (Biometrics is already big business and even has its own trade association in Washington.) One of the world's largest known collections of biometric data is held by the Department of State. As of December 2009, its Consular Consolidated Database (CCD) contained more than 75 million photographs of Americans and foreigners and is growing at a rate of approximately 35,000 records per day. CCD also collects and stores indefinitely the fingerprints of all foreigners issued visas.

 

With ever more data available, the NSA and other agencies are creating ever more robust ways to store it. Such storage is cheap and bounteous, with few limits other than the availability of electricity and water to cool the electronics. Emerging tech will surely bypass many of the existing constraints to make holding more data longer even easier and cheaper. The old days of file cabinets, or later, clunky disk drives, are over in an era of mega-data storage warehouses.

 

The way data is aggregated is also changing fast. Where data was once kept in cabinets in separate offices, later in bureaucratically isolated, agency-by-agency digital islands, post-9/11 sharing mandates coupled with new technology have led to fusion databases. In these, information from such disparate sources as license plate readers, wiretaps, and records of library book choices can be aggregated and easily shared. Basically everything about a person, gathered worldwide by various agencies and means, can now be put into a single “file.”

 

Once you have the whole haystack, there’s still the problem of how to locate the needle. For this, emerging technologies grow ever more capable of analyzing Big Data. Some simple ones are even available to the public, like IBM's Non-Obvious Relationship Awareness software (NORA). It can, for example, scan multiple databases, geolocation information, and social media friend lists and recognize relationships that may not be obvious at first glance. The software is fast and requires no human intervention. It runs 24/7/365/Forever.

 

Tools like NORA and its more sophisticated classified cousins are NSA's solution to one of the last hurdles to knowing nearly everything: the need for human analysts to “connect the dots.” Skilled analysts take time to train, are prone to human error, and -- given the quickly expanding supply of data -- will always be in demand. Automated analysis also offers the NSA other advantages. Software doesn't have a conscience and it can't blow the whistle.

 

What does all this mean in terms of the Fourth Amendment? It’s simple: the technological and human factors that constrained the gathering and processing of data in the past are fast disappearing. Prior to these “advances,” even the most ill-intentioned government urges to intrude on and do away with the privacy of citizens were held in check by the possible. The techno-gloves are now off and the possible is increasingly whatever an official or bureaucrat wants to do. That means violations of the Fourth Amendment are held in check only by the goodwill of the government, which might have qualified as the ultimate nightmare of those who wrote the Constitution.

 

On this front, however, there are signs of hope that the Supreme Court may return to its check-and-balance role of the Constitutional era. One sign, directly addressing the Fourth Amendment, is this week's unanimous decision that the police cannot search the contents of a cell phone without a warrant. (The court also recently issued a ruling determining that the procedures for challenging one's inclusion on the government’s no-fly list are unconstitutional, another hopeful sign.)

 

Prior to the cell phone decision, law enforcement held that if someone was arrested for, say, a traffic violation, the police had the right to examine the full contents of his or her cell phone -- call lists, photos, social media, contacts, whatever was on the device. Police traditionally have been able to search physical objects they find on an arrestee without a warrant on the grounds that such searches are for the protection of the officers.

 

In its new decision, however, the court acknowledged that cell phones represent far more than a "physical object." The information they hold is a portrait of someone's life like what’s in a closet at home or on a computer sitting on your desk. Searches of those locations almost always require a warrant.

 

Does this matter when talking about the NSA's technological dragnet? Maybe. While the Supreme Court's decision applies directly to street-level law enforcement, it does suggest an evolution within the court, a recognition of the way advances in technology have changed the Fourth Amendment. A cell phone is not an object anymore; it is now recognized as a portal to other information that a person has gathered in one place for convenience with, as of this decision, a reasonable expectation of privacy.

 

National Security Disclosures Under HIPPA

 

While the NSA’s electronic basket of violations of the Fourth Amendment were, pre-Snowden, meant to take place in utter secrecy, here’s a violation that sits in broad daylight: since 2002, my doctor can disclose my medical records to the NSA without my permission or knowledge. So can yours.

 

Congress passed the Health Information Portability and Accountability Act (HIPPA) in 1996 “to assure that individuals’ health information is properly protected.” You likely signed a HIPPA agreement at your doctor's office, granting access to your records. However, Congress quietly amended the HIPPA Act in 2002 to permit disclosure of those records for national security purposes. Specifically, the new version of this “privacy law” states: “We may also disclose your PHI [Personal Health Information] to authorized federal officials as necessary for national security and intelligence activities.” The text is embedded deep in your health care provider’s documentation. Look for it.

 

How does this work? We don’t know. Do the NSA or other agencies have ongoing access to the medical records of all Americans? Do they have to request specific ones? Do doctors have any choice in whose records to forward under what conditions? No one knows. My HMO, after much transferring of my calls, would ultimately only refer me back to the HIPPA text with a promise that they follow the law.

 

The Snowden revelations are often dismissed by people who wonder what they have to hide. (Who cares if the NSA sees my cute cat videos?) That's why health-care spying stands out. How much more invasive could it be than for your government to have unfettered access to such a potentially personal and private part of your life -- something, by the way, that couldn’t have less to do with American “security” or combating terrorism.

 

Our health-care providers, in direct confrontation with the Fourth Amendment, are now part of the metastasizing national security state. You’re right to be afraid, but for goodness sake, don't discuss your fears with your doctor.

 

How the Unreasonable Becomes Reasonable

 

At this point, when it comes to national security matters, the Fourth Amendment has by any practical definition been done away with as a part of Post-Constitutional America. Whole books have been written just about Edward Snowden and more information about government spying regularly becomes available. We don't lack for examples. Yet as the obviousness of what is being done becomes impossible to ignore and reassurances offered up by the president and others are shown to be lies, the government continues to spin the debate into false discussions about how to “balance” freedom versus security, to raise the specter of another 9/11 if spying is curtailed, and to fall back on that go-to “nothing to hide, nothing to fear” line.

 

In Post-Constitutional America, the old words that once defined our democracy are twisted in new ways, not discarded. Previously unreasonable searches become reasonable ones under new government interpretations of the Fourth Amendment. Traditional tools of law, like subpoenas and warrants, continue to exist even as they morph into monstrous new forms.

 

Americans are told (and often believe) that they retain rights they no longer have. Wait for the rhetoric that goes with the celebrations of our freedoms this July 4th. You won’t hear a lot about the NSA then, but you should. In pre-constitutional America the colonists knew that they were under the king's thumb. In totalitarian states of the last century like the Soviet Union, people dealt with their lack of rights and privacy with grim humor and subtle protest. However, in America, ever exceptional, citizens passively watch their rights disappear in the service of dark ends, largely without protest and often while still celebrating a land that no longer exists.

 

Peter Van Buren blew the whistle on State Department waste and mismanagement during the Iraqi reconstruction in his first book, We Meant Well: How I Helped Lose the Battle for the Hearts and Minds of the Iraqi People. A Tom Dispatch regular, he writes about current events at his blog, We Meant Well. His new book, Ghosts of Tom Joad: A Story of the #99Percent, is available now. This is the second in a three-part series on the shredding of the Bill of Rights.

 

Follow TomDispatch on Twitter and join us on Facebook and Tumblr. Check out the newest Dispatch Book, Rebecca Solnit's Men Explain Things to Me.

 

Il browser è il programma che vi permette la navigazione del www acronimo di World Wide Web, la sua funzione principale è quella di permettere la visualizzazione delle pagine costituite da codice HTML.

 

Tramite l'integrazione di plug-in la navigazione nei siti può essere più ricca di contenuti quali suoni e immagini, tra i browser più conosciuti troviamo Internet Explorer, Firefox e Opera ma anche Avant Browser è utilizzato come alternativa al più famoso e utilizzato IE.

 

Ve ne sono molti altri ad esempio il Maxthon o il Browzar e non solo per i sistemi operativi Microsoft come ad esempio Safari utilizzato su Mac OS X ma che recentemete è stato sviluppato anche per Windows.

 

Firefox è programma gratuito e open source, un browser multifunzionale grazie ai componenti aggiuntivi come il FireFTP ovvero un client FTP per trasferire i file dal vostro HD ad un server o il FoxyTunes, che vi permette con un click di avviare il vostro lettore multimediale per l'ascolto di file musicali, ma ve ne sono molte altre di queste estensioni per rendere sicura e divertente la vostra navigazione. Firefoxdispone inoltre di temi per modificarne l'aspetto a vostro piacimento.

 

K-Meleon è un browser estremamente leggero che necessita di requiisti minimi , questo perchè il browser è stato progettato per la velocità non certo per la grafica , dotato di un ottimo motore di rendering , utilizza Gecko lo stesso di Firefox, è uno dei più veloci browser con tempi di risposta veramente degni di nota , consigliato per macchine con requisiti di sistema obsoleti.

 

Internet Explorer 8 dagli addetti ai lavori di casa Microsoft è definito veloce, sicuro, semplice e consente di proteggere di conseguenza la privacy degli utenti e del computer evitando la possibilità di installazione di software dannoso e delle informazioni riservate grazie alla funzionalità integrata di identificare i siti web fraudolenti, è disponibile per sistemi operativi XP.

 

Avant Browser è un browser che gira sotto IE, conserva lo stesso motore e quindi lo possiamo definire una skin di IE anche se rispetto ad IE integra delle funzionalità maggiori quali il blocco animazioni Flash e i controlli ActiveX possono essere altresì bloccati, in più in caso di crash al prossimo riavvio l'utente può ritornare alla pagina che stava visitando ed è personalizzabile nell' aspetto grafico.

 

Opera è multifunzionale e valida alternativa a IE. Gratuito dalla versione 8.50, prima lo si poteva utilizzare acquistando la licenza o con l'ausilio di un banner pubblicitario. Supporta lo scaricamento e la ricerca di file BitTorrent, permette il blocco popup, possiede filtri anti spam. Per Windows, Linux e supporta la lingua italiana.

 

Google Chrome diretto concorrente di Internet Explorer e Firefox. Un prodotto velocissimo, molto intuitivo, quindi dotato di un design minimo per facilità di utilizzo, con funzionalità degne di nota quali ad esempio le miniature dei siti web più visitati (tipo il plugin di Firefox "Speed dial")

 

Maxthon Browser ha un motore di rendering basato su IE, è multifunzionale in quanto si ha la possibilità di ulitizzare la navigazione a schede come con Firefox, protezione privacy, permette di eliminare la pubblicità e personalizzabile tramite skin, è dotato di molte feature come ad esempio lo zoom della pagina o il lettore di feed RSS. Può essere utilizzato con tutte le versioni di Windows.

 

Flock ,questo browser è basato sul motore di Mozilla Firefox ed è disponibile per prodotti Linux , Microsoft , MAC e supporta la lngua italiana dalla versione 1.0.5. Permette inoltre l'integrazione di servizi internet come blog, condivisione di dati e aggregazione di news e viene definito per queste sue caratteristiche un Social Web Browser.

 

Sleipnir è un nuovo browser che si dichiara antagonista di Firefox e IE , prodotto valido per sistemi windows 98/98SE/Me/2000/XP/Vista ; ottima dotazione di skin per la personalizzazione. Requisiti per l'installazione : CPU: Pentium 266MHz or higher ,Memory: 64MB or higher

1 3 4 5 6 7 ••• 56 57