[i2p] Distributed Search Engine (fwd from tkaitchuck@comcast.net)
- Forwarded message from Tom Kaitchuck [EMAIL PROTECTED] - From: Tom Kaitchuck [EMAIL PROTECTED] Date: Thu, 13 Jan 2005 00:51:51 -0600 To: [EMAIL PROTECTED] Subject: [i2p] Distributed Search Engine User-Agent: KMail/1.7.2 For those of you that do not know, I am currently working on building a distributed search engine for I2P. While it is still in an alpha state, it is approaching the point where it could use some wider testing. It is now in cvs under the module khksearch. I was planning to hold off on releasing it until I fixed a bug preventing servers from joining in mid operation, but it has proved elusive enough, that I think more eyeballs may help. One thing that some of you may be interested in even if you don't care about the search engine itself, is that to make it work with I2P I took the streaming library for Java and put it into a wrapper class that imitates java.net so all one has to do is take the wrapper code put it in the class path and in your java program replace import java.net.* with Import search.connection.* and your app is instantly ported to I2P. (Assuming it is fairly simplistic and only has one socket server per Jvm instance. But this could easily be improved upon if anyone is interested. ) There is still lots to do, not all of which requires huge technical skill. (Code cleanup, Better instructions, Startup scripts for windows and other JVMs) Also the existing awt interface needs to be converted into an applet or so that it can run within a webpage. The biggest thing that remains to be done is implementing the ranking code, I plan to do this next. As far as the license goes, it will we a free software license that permits modification and public access to the source. (probably lgpl or similar) However all of the scripts and all of the code for the wrapper, were written by me, and are public domain. So if you are interested in helping out, or would just like to play with it, check it out. ___ i2p mailing list [EMAIL PROTECTED] http://i2p.dnsalias.net/mailman/listinfo/i2p - End forwarded message - -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07078, 11.61144http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net pgp5PU9cEpkGx.pgp Description: PGP signature
Pain reliver Lortab Lorcet Hydrocodone Norco Vicoden ...
Need 0xycon1n Vicod1n 0xyc0d0ne http://akj.oruo.com/p/sales/xfpvne
Links exchange with http://vegasreference.com.
Dear owner of http://vegasreference.com, We've looked through your site http://vegasreference.com and we liked it very much, so we propose to you link exchange between our sites. If you agree to be our link partner please add our links to your resources page and send us your information: Title, Description, URL and preferred Category. We would add your resource to our site shortly. Information about our sites is next: URL: http://www.blackjackgame4u.com/howtoplay.html Link Title: Black Jack In Online Casino Description: Black Jack in Casino: Slang and Lingvo, Rules, Tips, Strategies, Jokes of Black Jack. URL: http://www.craps4u.com/playcraps.html Link Title: Online Gambling. Play Craps! Description: Online Craps: Useful Information About This Game, Strategies and Jokes. URL: http://www.slotsgame4u.com/betting.html Link Title: Online Casino. Play Slots!!! Description: Slots And Betting, Information About Gambling, Strategies in Casino Online. URL: http://www.roulette4u.com/facts.html Link Title: Play Roulette In Online Casino. Description: Roulette Game For You! Facts About Playing. Rules and Jokes. URL: http://www.videopoker4u.com/terms.html Link Title: Online Casino. Video Poker! Description: Rules, Tips, Strategies and Jokes Of Poker. Poker Terms and Glossary. Best regards, Cole Dunwall
Heyllooo, Baby
Would you like to keep me some company? My idiot Husband works night shifts, which makes me very lonely at night. To contact me please go here: http://wetdear.com/d/1.php Sincerely Yours, Courtney l
Block Spyware Pop-Ups
Hello, Have you recently noticed that your computer is all of a sudden running slower than normal? Or, perhaps you're noticing that you've recently been inundated with an inordinate amount of annoying and intrusive pop up advertisements. The reason this may be happening is because your PC's hard drive is infected with Spyware and/or Adware files. http://www.fundowntheroad.com/cgbbbih_tuuuhleuhx.html These are files that are installed on your PC without your knowledge and can be extremely harmful to your PC and could lead to the crashing of your PC's hard drive. The only way to check your system for these files is to scan your system using our software. You may now scan your system AbsolutelyFree to check for these infected files. To do so, simply go here to start the scan: http://www.fundowntheroad.com/ltooosg_tuuuhleuhx.html It's imperative that you keep a constant check of your PC to ensure these files are not residing on your hard drive. If after scanning you find these files do exist on your hard drive, it's essential that you remove them immediately. Again, please scan your system now (atno cost) by going here: http://www.fundowntheroad.com/jvw_tuuuhleuhx.html Best, MyNetProtectorý Your Rights, Your Privacy! If you no longer want to receive mail from this list: Send a blank email to mailto:[EMAIL PROTECTED], or write to Good Times 123 North Congress Avenue Suite 180 Boynton Beach, Florida 33426
Ridge Wants Fingerprints in Passports
http://www.nytimes.com/2005/01/13/politics/13fingerprint.html?oref=loginpagewanted=printposition= The New York Times January 13, 2005 Ridge Wants Fingerprints in Passports By MATTHEW L. WALD WASHINGTON, Jan. 12 - The United States should issue passports that include a full set of the bearer's fingerprints, Tom Ridge, the departing secretary of homeland security, said Wednesday. Mr. Ridge said the change would induce foreign governments to do the same on the passports they issue. Privacy advocates promised to fight the Ridge suggestion, in part because it would deliver the prints of American travelers to foreign governments, and the State Department has been cool to it as well. Mr. Ridge, speaking at the Center for Strategic and International Studies, a research group here, cast his comments as advice to Michael Chertoff, chosen by President Bush on Tuesday to succeed him. Be aggressive, go after 10 fingerprints on the passports, Mr. Ridge said, adding that it was a lot easier to negotiate with your allies if you've already done what you're asking them to do. Applicants for visas to visit the United States must already submit to finger scans of both index fingers. Experts call them scans, not prints, because the images are taken on a scanner screen, without ink. Later this year, a 2002 law will require people whose nationality allows them to enter this country without a visa to present machine-readable passports that incorporate a digital photograph as biometric data. A spokeswoman for the State Department, Kelly Shannon, said that the machine-readable passports the United States issues would have a computer chip with 64 kilobytes of memory, far more than is needed for the traveler's name, date and place of birth, passport number and a single photo. The chip could be used for other biometric data in the future, including an additional photo, Ms. Shannon said, adding that the globally interoperable, chosen biometric for travel documents was photos. At the Electronic Privacy Information Center, a nonprofit group here, Marc Rotenberg, the president, said that providing foreign governments with the fingerprints of each American visitor would make it easier for those foreign governments to conduct their own investigations of U.S. citizens in that foreign country. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
RE: To Tyler Durden
WHAT THE FUCK ARE YOU TALKING ABOUT! THIS IS MY REAL NAME GODDAMMIT!!! Wait, I'm getting sleepy...gotta take a nap... -TD From: Major Variola (ret) [EMAIL PROTECTED] To: [EMAIL PROTECTED] [EMAIL PROTECTED] Subject: To Tyler Durden Date: Wed, 12 Jan 2005 19:02:14 -0800 TD, I just watched _Fight Club_ so I finally get your nym. (Here in low-earth geosynchronous orbit, content is delayed). Cool. I had thought it was your real name. Maj. Variola (ret)
Download Movies Still In The Theater
When I returned I checked because I didn't believe you, sure enough, was this it? http://www.2oo5-downloading.com/gr8.html You can just about download any CD album you want to. Not to mention console games and dvd's. So I've downloaded 3 video games movies so far today :). You should get a load of how many movies are in here that'l play in your dvd player - it's crazy. Theres a few pages in there on how to get your selection on CD if you need the help. I know this, the movie section has movies in it that are still in theates - I dont know about you but thats seriously impressive. I'll talk to you later. Dawn
VIRUS (Worm.SomeFool.Gen-1) IN MAIL FROM YOU
VIRUS ALERT Our content checker found virus: Worm.SomeFool.Gen-1 in email presumably from you (cypherpunks@minder.net), to the following recipient: - [EMAIL PROTECTED] Please check your system for viruses, or ask your system administrator to do so. Delivery of the email was stopped! For your reference, here are headers from your email: - BEGIN HEADERS - Return-Path: cypherpunks@minder.net Received: from adfc.de (p508ABF6B.dip.t-dialin.net [80.138.191.107]) by mail2.srv.syswebcom.net (Postfix) with ESMTP id DB4E82FEC27 for [EMAIL PROTECTED]; Thu, 13 Jan 2005 19:06:51 +0100 (CET) From: cypherpunks@minder.net To: [EMAIL PROTECTED] Subject: Re: Your picture Date: Thu, 13 Jan 2005 19:07:43 +0100 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary==_NextPart_000_0005_622B.4C04 X-Priority: 3 X-MSMail-Priority: Normal Message-Id: [EMAIL PROTECTED] -- END HEADERS -- Reporting-MTA: dns; mail2 Received-From-MTA: smtp; mail2.srv.syswebcom.net ([127.0.0.1]) Arrival-Date: Thu, 13 Jan 2005 19:06:56 +0100 (CET) Final-Recipient: rfc822; bettundbike@dachgeber.de Action: failed Status: 5.7.1 Diagnostic-Code: smtp; 550 5.7.1 Message content rejected, id=25733-09 - VIRUS: Worm.SomeFool.Gen-1 Last-Attempt-Date: Thu, 13 Jan 2005 19:06:56 +0100 (CET) Received: from adfc.de (p508ABF6B.dip.t-dialin.net [80.138.191.107]) by mail2.srv.syswebcom.net (Postfix) with ESMTP id DB4E82FEC27 for [EMAIL PROTECTED]; Thu, 13 Jan 2005 19:06:51 +0100 (CET) From: cypherpunks@minder.net To: [EMAIL PROTECTED] Subject: Re: Your picture Date: Thu, 13 Jan 2005 19:07:43 +0100 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary==_NextPart_000_0005_622B.4C04 X-Priority: 3 X-MSMail-Priority: Normal Message-Id: [EMAIL PROTECTED]
Re: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire
From: Justin [EMAIL PROTECTED] Sent: Jan 10, 2005 7:35 PM To: [EMAIL PROTECTED] Subject: Re: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire ... Some gun accidents are suicides reported as such to avoid embarrassment to the family. I've heard this from other people, too--some in reasonably good positions to know how such things were reported. And there's surely some ambiguity between fatal accidents caused by doing something really stupid and intentional suicides. ... --John
[RealEstate] Our-capitol, your growth.
REInfo
Blue Iraq: Local Experts in Global Communications
I expect a few cypherpunks will know the founder of blueiraq... Cheers, RAH (who wonders who's running rediraq.com... ;-)) -- http://blueiraq.com/iraq/index.html Blue Iraq Local Experts in Global Communications about Blue Iraq | Products and Services | Technology and Networks | Iraq FAQ | Support | Contact Us Iraq FAQ FAQs Technology and Internet in Iraq: Frequently Asked Questions We have found that there are a few common questions about Internet access and general IT in Iraq. By answering these questions here, we can try to improve understanding inside and outside Iraq of the unique environment which exists here. What kind of Internet connection does Iraq have? Iraq does not have one main Internet connection. As of 2003, Iraq has had no landline or microwave relay connections to the outside world. All international communications, and most domestic communications, have been via satellite. Domestic wireline or wireless networks rely on satellite access for international connectivity. Many businesses use small satellite terminals (VSATs) to communicate directly with the outside world. Who uses Internet service in Iraq? The US Department of Defense, DoD and Redevelopment Contractors, Western expatriates, and the Iraqi Government are major users of Internet and international communications services in Iraq. Additionally, many NGOs, universities, and Iraqi businesses are establishing internet connectivity. One of the major purchasers of Internet service in the domestic Iraqi market is for small, entrepreneurial Internet Cafes. Why is service in Iraq more expensive than in other parts of the world? Satellite capacity is usually more expensive than terrestrial connectivity, due to the high costs of satellites and limited RF capacity available on a given transponder. However, satellites also have very high reliability, and are the only practical means of deploying communications rapidly over a large territory without building extensive (and vulnerable) fixed infrastructure. Modern shared IP-optimized Ku-band VSAT systems can be very affordably priced compared to older satellite communications systems. Communications companies operating in Iraq also face higher operating costs than similar communications companies operating elsewhere in the world, due to security concerns and lack of infrastructure. Can I use Voice over IP (VoIP) over satellite? Generally VoIP will require special settings to work reliably over satellite. We currently only support our iDirect network and dedicated satellite capacity for VoIP applications, and all supported VoIP communications must go through our VoIP gateway to ensure traffic prioritization and quality of service. Your competitors offer some systems which are cheaper, and can use Iraqis to do the installation. Why should I use Blue Iraq? Our prices are actually lower than most other satellite systems, based on service capacity and performance -- unlike a lot of companies, we specify our systems based on observed performance in Iraq, not a fanciful design specification. Due to the security situation, it is very difficult for Iraqis to get onto US bases to do installations. We do use trained Iraqis for off-base installs in some cases. However, in many cases, we have found that having US engineers do the world results in the most effective solution with the highest overall quality. An inexpensive system which does not work reliably is no bargain. Why should I purchase a system from an Iraq-focused network operating company, vs. one of the satellite owners or major networks? One word: presence. Blue Iraq has trained personnel on the ground in Iraq who are familiar with the environment. Many other vendors have never set foot in Iraq, and rely on local contract installation companies to do installations. Non-Iraq based companies also do not have personnel in Iraq do provide after-sale support if anything goes wrong. In a place like Iraq, many things can go wrong. Isn't it too dangerous to operate a business in Iraq? The news shows bombings and kidnappings every day? Iraq can be a very dangerous place. However, we take all reasonable precautions to minimize this risk. Our personnel travel with appropriate levels of security, and will refuse to go to sites which are not adequately secured. We primarily operate in conjunction with the US military, and rely on US military helicopter transport between secure bases. All personnel have appropriate protective gear and training. Why does the military use commercial internet services? Doesn't it have enough satellite capacity of its own? The US military makes extensive use of commercial products and systems for a wide variey of non-tactical purposes, as commercial systems often provide the cheapest, best, and most cost-effective solution to a given problem. Commercial satellite networks are extensively used for Morale, Welfare, and Recreation (MWR) purposes, administrative and support systems, and more. Do you do
Altnet trying to 'mug' companies
http://p2pnet.net/story/3542 p2pnet.net - the original daily p2p and digital media news site Altnet trying to 'mug' companies Jay Flemma p2pnet.net News:- Entertainment lawyer Jay Flemma doesn't believe Altnet's circular email campaign to p2p companies in a bid to get them to license the TrueNames 'hash' patent will work. In fact, As I understand the lay of the land in this case, I believe they are grossly over-reaching in attempting to turn the world of IP into the wild, wild west and effectively mug these companies by trying to make them pay for something for which they do not have the rights to defend or prosecute, he told p2pnet. Flemma, who specialises in music, film, tv and book law with particular emphasis on the confluence of the media with the Net, is consulting with companies who've received the Altnet patent letter. We're having discussions as to whether or not Altnet really has a leg to stand on, says Flemma, an expert in the legalities of Net distribution media. But, I think their attorney's claims in the Washington Post that a jury found that their patent was valid is woefully inaccurate because it is not a jury question - or what's called a question of fact, whether or not a patent is valid, he says. That is a question of law, I can tell you this: juries do not rule on the question of whether or not a patent is valid. The EFF (Electronic Frontier Foundation) is taking an interest in events, we understand. As p2pnet was the first to report on Monday, Altnet has fired off a round of identical letters to companies it believes use hashes (think 'links') for a digital file. How2Share Technologies, a small Canadian company based in Victoria on Vancouver Island, British Columbia, and which markets PiXPO software for a picture sharing network, is one of the more recent victims. I don't think the Patent has any legs, managing director Jim Wallace told p2pnet. Without saying it in so many words, the Altnet letters imply that if firms it approaches don't license the patent, they'll be sued. In the meanwhile, in case you're wondering what all the fuss is about, A Hash as unique identifier was the whole idea behind hashing algorithms, says Exo in a p2pnet comment. Read on Earliest example I can recall was the Hash sorting technique. In essence IBM's punch card sorting machines (pre WWII) are an early example of hash sorting. In the punch card machine the hash was simply a nibble from a specific character column that is used to steer the card to a specific bin. This hash is only perfect in the since that all cards having the same character in the selected column will be steered to the same bin. To sort on a wider field, you simply start with the least significant column of the sort field; run the cards, re-stack first bin on top of second bin, and so on, repeating for each column in the field. In data communications the CRC is a hash guaranteed to be unique over a specific number of bits. A CRC-16 is unique for files up to 2^16 bits in length, CRC-32 for up to 2^32 bits. Different CRC algorithms use different bits to generate the feedback used to digest the data into a hash. (early 1970's?) CRC's were first used to detect data errors over serial data links. Early example: IBM mainframe to terminal equipment communications using SNA and SDLC protocols. TCP/IP protocol uses a CRC-32 to detect packet errors. (Mid 19080's) The field of cryptography, specifically public key cryptography, needed secure hashing algorithms. (Only secure in the sense that the estimated length of time to brute force content that will generate a specific hash value will take a very long time on the order of many CPU years. RSA patented various Message Digest functions (in the 1970's, several RSA patents recently expired and are now public domain). Most of us are familiar with the MD5 algorithm in which several P2P applications use to generate file Hash values. The whole Idea of using a Message Digest function in cryptography was to generate a hash on a plain text document (file) such that it could be used to detect if that document changes in any way. If any character in the document (file) is different then the hash will be different. These hashes are used when digitally signing a document, to verify that a document is the exact same (uniquely identified) document you viewed before signing. To prevent someone from changing the hash, it is encrypted using your private key so that others can verify using your public key. The results of processing the document using the MD function should exactly match the hash decoded using your public key. Databases have used such hashing algorithms to generate unique keys for locating data in a database. Software has a good example in the C++ language standard template library in the implementation of the std map object. The map object stores a key, the key can be plain text, but is usually a hash to minimize the number of characters that need to be
virus gönderilen iletide bulunmuþtur Delivery (info@cabani.com.tr)
Dikkat: cypherpunks@minder.net Gönderdiðiniz bir Eposta iletisinde virus bulunmuþtur. Bu Eposta tarayýcýsý iletiyi durdurmuþ ve iletinin alýcýya eriþmesini engellemiþtir. Bulunan virus: Worm.SomeFool.Q Lütfen virüs tarayýcýnýzý güncelleyin ve/veya Bilgi Ýþlem departmanýna sisteminizde virüs bulunduðunu derhal haber verin. Gönderdiðiniz iletide aþaðýdaki baþlýklar bulunmuþtur: Gönderen: cypherpunks@minder.net Alýcý: [EMAIL PROTECTED] ... ve aþaðýdaki diðer baþlýklar: --- MAILFROM: cypherpunks@minder.net Received: from unknown (HELO cabani.com.tr) (65.78.109.66) by 0 with SMTP; 13 Jan 2005 22:24:14 - From: cypherpunks@minder.net To: [EMAIL PROTECTED] Subject: Delivery ([EMAIL PROTECTED]) Date: Thu, 13 Jan 2005 17:17:35 -0500 MIME-Version: 1.0 Content-Type: multipart/related; type=multipart/alternative; boundary==_NextPart_000_001B_01C0CA81.7B015D10 X-Priority: 1 X-MSMail-Priority: High ---
Florida man faces bioweapon charge
http://www.cnn.com/2005/US/01/13/ricin.arrest/ CNN Florida man faces bioweapon charge FBI says accused had poison ricin and several weapons Thursday, January 13, 2005 Posted: 7:00 PM EST ( GMT) MIAMI, Florida (CNN) -- An Ocala, Florida, man was arrested by the FBI after they found the biotoxin ricin in his possession in the home he shares with his mother. Steven Michael Ekberg, 22, had at least 83 castor beans and other byproducts consistent with the manufacture of ricin in his possession, the FBI said. Ricin is a poison that can be made from the waste from processing castor beans, according to the Centers for Disease Control and Prevention. The former waiter also had several weapons, including an AK-47 and an Uzi, the FBI said. Ekberg was taken into custody Wednesday night and was scheduled to appear Thursday afternoon before a federal magistrate in Ocala. He is being charged with possession of a biological weapon. We are still investigating and are trying to determine what his intentions were, but we have no information that he released it to anyone, said FBI spokesman Jeff Westcott. We believe that he acquired the materials over the Internet, but we are still investigating, he said. In their affidavit, FBI officials said they found a number of seeds in packaging that describes the material as very poisonous. They said they also found, in a cardboard box in Ekberg's room, glass vials containing white granules suspected of being husk-less, chopped castor beans, a byproduct of the manufacture of ricin. The FBI said Ekberg has no known ties to terrorists or extremists. A hazardous-materials team took the substance to the Florida Health Department laboratory in Jacksonville, where it was confirmed to be ricin, the FBI said. FBI biohazard teams swept the house to ensure that no one in the neighborhood could become contaminated. Ekberg was arrested on an unrelated weapons and narcotics charge last weekend by the Marion County Sheriff's Office. According to the FBI affidavit, an anonymous source now acting as a confidential source called the sheriff's office and told authorities that Ekberg showed him the materials several months ago. If I put this on your food, this would kill you immediately, Ekberg allegedly told the source, pointing to the contents of a container, according to the affidavit. He then picked up another container and stated words to the effect, This would make you really sick, the source allegedly told authorities. Picking up another container, he said, This would kill you, but not right away. The source told police that Ekberg had two books containing information on how to make poisons from household chemicals and plants, according to the affidavit. Ekberg, who has a license to carry concealed weapons, was in possession of various handguns at the time of his arrest, in addition to the Uzi and AK-47, authorities said. His mother, Theresa Ekberg, told the FBI that he has been treated for depression, according to the affidavit. His mother also told authorities that in the past her son had possessed some chemicals. She said that on at least one occasion he showed her something he had purchased via the Internet and expressed concern that if their cat inadvertently ate enough of it, the cat would die, according to the affidavit. She advised that her son had had the chemicals for several years. The confidential source, according to the FBI, told authorities that Ekberg would often mix his anti-depression medication with alcohol and visit bars carrying concealed weapons. If convicted, he could face up to 10 years in prison. The FBI is still investigating who sent two letters that contained ricin in 2003 through the U.S. postal system. Those letters contained threats and complaints about labor regulations in the trucking industry. In 1978, Georgi Markov, a Bulgarian writer and journalist in London, died after a man attacked him with an umbrella that had been rigged to inject a ricin pellet under his skin. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: Ridge Wants Fingerprints in Passports
He's smearing his sticky fingerprints all over everything else, and now he wants them in our passports? Oughtta learn to keep his hands to himself. Bill Stewart [EMAIL PROTECTED]
Re: Florida man faces bioweapon charge
RAH pastes: ... Steven Michael Ekberg, 22, had at least 83 castor beans and other byproducts consistent with the manufacture of ricin in his possession, the FBI said. ... They said they also found, in a cardboard box in Ekberg's room, glass vials containing white granules suspected of being husk-less, chopped castor beans, a byproduct of the manufacture of ricin. I'm confused here. Is possession of castor beans possession of ricin? Is possession of chopped castor beans possession of ricin? He then picked up another container and stated words to the effect, This would make you really sick, the source allegedly told authorities. I could pick up a container of Drano, and make the same commment. Big deal. The source told police that Ekberg had two books containing information on how to make poisons from household chemicals and plants, according to the affidavit. Still legal to own, as far as I know. His mother, Theresa Ekberg, told the FBI that he has been treated for depression, according to the affidavit. His mother also told authorities that in the past her son had possessed some chemicals. She said that on at least one occasion he showed her something he had purchased via the Internet and expressed concern that if their cat inadvertently ate enough of it, the cat would die, according to the affidavit. Obviously this news story is the grand prize winner in an innuendo contest. The FBI is still investigating who sent two letters that contained ricin in 2003 through the U.S. postal system. Those letters contained threats and complaints about labor regulations in the trucking industry. In 1978, Georgi Markov, a Bulgarian writer and journalist in London, died after a man attacked him with an umbrella that had been rigged to inject a ricin pellet under his skin. And WTF does this have to do with the guy with the castor beans? Looks like Ricin Theatre has joined Anthrax Theatre in the armory of Weapons of Mass Deception. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division Do What Thou Wilt Shall Be The Whole Of The Law
SolarWinds Network Toolset Update
Thank you for downloading our SolarWinds Network Management Tools. SolarWinds offers trial downloads of all our products. Everything from our TFTP Server utility to our Engineer's Edition Toolset containing over 40 network management tools. We even offer a download of our award winning web-based Orion Network Performance Monitor (Orion NPM) featured on the cover of Network Computing Magazine. You can access all of these great downloads from: http://solarwinds.net/Download-Tools.htm If you have any questions during the evaluation, please contact our sales team at [EMAIL PROTECTED] or our support team at [EMAIL PROTECTED] If you would like a quote, you can create an online quote at http://support.solarwinds.net/order/default.cfm?method=PO or we can create one for you by calling us at 918-307-8100. Again, enjoy the software. I am confident SolarWinds will exceed your expectations as a provider of network management solutions. Please call or email if I can be of any assistance. Sincerely, Kyle Miller, SolarWinds.Net [EMAIL PROTECTED] 918-307-8100
PFSO / CSO / SSO Course 7-9 FEB 2005
Title: Untitled Port Facility Security Officer Certification Course February 7-9, 2005 Fort Lauderdale, Florida USA MTSA / ISPS CODE COMPLIANT TRAINING FOR PFSO / CSO / SSO PORT FACILITY / VESSEL MANAGEMENT PERSONNEL U.S. AND INTERNATIONAL LAW REQUIRES TRAINING FOR ALL MARITIME PERSONNEL WITH SECURITY DUTIES WHO WE ARE The Maritime Security Institute (MSI), a not-for-profit educational institution, is the leading maritime security training center in the United States. Our programs are unique in both the unmatched expertise and experience of our instructors, and the hands-on opportunities to put new security skills to work. Students at MSI come from dozens of countries and represent governments, ports, and shipping companies. We train law enforcement, government officials, military, ship and port operations personnel, RSOs, Designated Authorities, and maritime security executives. OUR PROGRAMS MSI security programs combine best industry practices from experienced instructors in government and the private sector. Where applicable, these programs meet or exceed the requirements set forth in the IMOs model Training Programs for compliance with the International Ship Port Facility Security (ISPS) Code or the US Maritime Transportation Security Act (MTSA). See our website listed below for more information. OUR INSTRUCTORS MSI instructors have a rich and diverse background, with tenure in such organizations as the US Coast Guard, CIA, Justice Department, State Department Office of Counterterrorism, FBI, Navy SEALs, and Army Special Forces. Their private sector experience includes tenure with leading organizations such as SeaLand, CSX, Princess and PO Cruises, Renaissance Cruises, and other major cargo and container shipping companies and international seaports. COURSES OFFERED PFSO / CSO / SSO Certification Course Waterborne Security Operations Management Course Waterborne Security Operations Operators Course Maritime Physical Security Management Managing the Port Facility Guard Force C-TPAT/CSI/BASC Program Managers Course Maritime Threat Intelligence Collection Maritime Threat Intelligence Collection for Law Enforcement Personnel Legal Implications of the ISPS Code MTSA Underwater Threat Mitigation Weapons of Mass Destruction Ports Ships FUTURE COURSES Container Security: Protecting the Supply Chain Passenger Ferry Security Operations Mgt Course Security Train-the-Trainer Certification Program Cruise Line Security Managers Course (3-day) Cruise Line Security Executive Course (1-day) Maritime Terrorism Crime Port Employee MTSA Certification Program MODU Security Operations Course Information Security for Port Ship Operators Security for HAZMAT CDC Materials Florida Port Security Operations:Complyingwith State Law 311.12 COURSE LOCATIONS The Maritime Security Institute offers all of its training courses in southern Florida, or by arrangement, worldwide. These classes can be customized to your particular training requirements or you can let our experts analyze your operations and recommend the most cost effective way to meet the specifications of the International Ship Port Security (ISPS) Code and the Maritime Transportation Security Act (MTSA) of 2002. FOR MORE INFORMATION BG Kenneth P. Bergquist, Academic Dean http://www.maritimesecurityinstitute.org +1.954.567.8995 [EMAIL PROTECTED] +++ TO BE REMOVED FROM OUR MGN EMAIL DISTRIBUTION LIST, VISIT: HTTP://WWW.MGN.COM/[EMAIL PROTECTED]=159109=PQTUW2D64AUX6J3TQLW6 YOU CAN ALSO CONTACT US DIRECTLY AT: MARITIME GLOBAL NET PO BOX 207 BRISTOL, RHODE ISLAND 02809 USA TEL: (401)247-7780 FAX: (401)247-7756 THANK YOU. Code: PQTUW2D64AUX6J3TQLW6
Continental African Briefing Volume 2, No. 2
Title: Jamboweb - Continental African Briefing Volume 2, No. 2 Continental African Briefing Volume 2, No. 2 AFRICA IN BRIEF Politics A PEACE PROCESS THREATENS TO UNRAVEL Peace efforts in northern Uganda have been on a precarious footing in recent days, this after a bid to have a comprehensive ceasefire signed on Jan. 31 proved unsuccessful. Source: IPS Suggested book: A Complicated War: The Harrowing of Mozambique, by William Finnegan more in Politics... Conflict and Security SUDAN PEACE TREATY ENDS CONFLICT BUT FEARS REMAIN The United Nations peacekeeping mission in the troubled eastern region of the Democratic Republic of the Congo (DRC) has found evidence that former Mayi-Mayi militiamen have killed seven civilians, a soldier and perhaps another six former officers from a rival militia... Source: Christian Aid Suggested book: The African Stakes of the Congo War , by John F. Clark more in Conflict and Security... Advertisement Analysis Reports FOR ZAMBIA'S STREET KIDS, THE OUTLOOK IS BLEAK The festive season is traditionally a time of giving in Zambia, where the streets of the capital Lusaka are awash with people caught up in the buying frenzy that characterizes the end of the year. Accordingly, the city's street children are tracking the mood of consumers as carefully as any economist. Source: IPS Africa Suggested books: A History of South Africa, Third Edition, by Leonard Monteath Thompson more in Analysis and Report... Social Issues LABOUR CALLS GENERAL STRIKE OVER DEMOCRACY DEMANDS An upbeat New Year's message by Prime Minister Themba Dlamini has been rebutted by Swaziland's pro-democracy groups, with labour unions calling for a general strike in January to protest lavish royal spending and a controversial draft constitution... Source: IRIN Related books: The Root Causes of Sudan's Civil Wars, by Hamilton Johnson more in Social Issues... UP COMING EVENTS International Workshop on Africa Water Laws The programme will include presentation of papers, group and plenary discussions addressing perspective such as formal water law and existing informal water law governing small-scale rural water uses... Date: Jan 26, 2005 Organization: International Water Management Institute 7th Congress of the World Association of Theoretically Oriented Chemists The theme of the conference is "Modelling Structure and Reactivity", and a number of internationally renowned speakers have confirmed their presence to deliver talks. Date: Jan 16, 2005 Organization: World Association of Theoretically Oriented Chemists BOOKS AND RESOURCESSouth Africa : The Complete Guide to the Cities, Winelands, and Game Parks, with Zimbabwe and Botswana (2nd Edition) Author: by Andrew Barbour Zimbabwe the Beautiful Author: Peter Joyce Learn more about Africa Sponsored Links Looking for a new job? Click here to take a look at HotJobs.com and post your resume. Tell a friend Africa Exchange Blog Become a Marketing & Referral partner Become a content partner Thank you for your continued interest in Jamboweb.com products and services. TreeLife Solutions, LLC, 410 Breckinridge Square, Leesburg, VA 20175 We apologize if you have received this newsletter by mistake. If you'd rather not receive the Jamboweb.com newsletter, click here to unsubscribe.
Delivery Notification: Delivery has failed
This report relates to a message you sent with the following header fields: Message-id: [EMAIL PROTECTED] Date: Fri, 14 Jan 2005 06:51:09 +0200 From: cypherpunks@minder.net To: [EMAIL PROTECTED] Subject: hello Your message cannot be delivered to the following recipients: Recipient address: [EMAIL PROTECTED] Reason: SMTP transmission failure has occurred Diagnostic code: smtp;550 Error: Mail filters have determined that your email appears to be infected with the Bagle virus. Remote system: dns;zen.estpak.ee (TCP|84.95.2.7|17811|194.126.101.100|25) (MX-R-4 ESMTP) Reporting-MTA: dns;i_mtaout3.012.net.il (tcp-daemon) Original-recipient: rfc822;jack@shareware.ee Final-recipient: rfc822;jack@shareware.ee Action: failed Status: 5.0.0 (SMTP transmission failure has occurred) Remote-MTA: dns;zen.estpak.ee (TCP|84.95.2.7|17811|194.126.101.100|25) (MX-R-4 ESMTP) Diagnostic-code: smtp;550 Error: Mail filters have determined that your email appears to be infected with the Bagle virus. Return-path: cypherpunks@minder.net Received: from tcp-daemon.i_mtaout3.012.net.il by i_mtaout3.012.net.il (HyperSendmail v2004.12) id [EMAIL PROTECTED]; Fri, 14 Jan 2005 06:53:40 +0200 (IST) Received: from minder.net ([212.116.164.11]) by i_mtaout3.012.net.il (HyperSendmail v2004.12) with ESMTP id [EMAIL PROTECTED] for [EMAIL PROTECTED]; Fri, 14 Jan 2005 06:53:33 +0200 (IST) Date: Fri, 14 Jan 2005 06:51:09 +0200 From: cypherpunks@minder.net Subject: hello To: [EMAIL PROTECTED] Message-id: [EMAIL PROTECTED] MIME-version: 1.0 Content-type: TEXT/PLAIN; CHARSET=WINDOWS-1255 Content-transfer-encoding: QUOTED-PRINTABLE X-Priority: 3 X-MSMail-priority: Normal
PFSO / CSO / SSO Course 7-9 FEB 2005
Title: Untitled Port Facility Security Officer Certification Course February 7-9, 2005 Fort Lauderdale, Florida USA MTSA / ISPS CODE COMPLIANT TRAINING FOR PFSO / CSO / SSO PORT FACILITY / VESSEL MANAGEMENT PERSONNEL U.S. AND INTERNATIONAL LAW REQUIRES TRAINING FOR ALL MARITIME PERSONNEL WITH SECURITY DUTIES WHO WE ARE The Maritime Security Institute (MSI), a not-for-profit educational institution, is the leading maritime security training center in the United States. Our programs are unique in both the unmatched expertise and experience of our instructors, and the hands-on opportunities to put new security skills to work. Students at MSI come from dozens of countries and represent governments, ports, and shipping companies. We train law enforcement, government officials, military, ship and port operations personnel, RSOs, Designated Authorities, and maritime security executives. OUR PROGRAMS MSI security programs combine best industry practices from experienced instructors in government and the private sector. Where applicable, these programs meet or exceed the requirements set forth in the IMOs model Training Programs for compliance with the International Ship Port Facility Security (ISPS) Code or the US Maritime Transportation Security Act (MTSA). See our website listed below for more information. OUR INSTRUCTORS MSI instructors have a rich and diverse background, with tenure in such organizations as the US Coast Guard, CIA, Justice Department, State Department Office of Counterterrorism, FBI, Navy SEALs, and Army Special Forces. Their private sector experience includes tenure with leading organizations such as SeaLand, CSX, Princess and PO Cruises, Renaissance Cruises, and other major cargo and container shipping companies and international seaports. COURSES OFFERED PFSO / CSO / SSO Certification Course Waterborne Security Operations Management Course Waterborne Security Operations Operators Course Maritime Physical Security Management Managing the Port Facility Guard Force C-TPAT/CSI/BASC Program Managers Course Maritime Threat Intelligence Collection Maritime Threat Intelligence Collection for Law Enforcement Personnel Legal Implications of the ISPS Code MTSA Underwater Threat Mitigation Weapons of Mass Destruction Ports Ships FUTURE COURSES Container Security: Protecting the Supply Chain Passenger Ferry Security Operations Mgt Course Security Train-the-Trainer Certification Program Cruise Line Security Managers Course (3-day) Cruise Line Security Executive Course (1-day) Maritime Terrorism Crime Port Employee MTSA Certification Program MODU Security Operations Course Information Security for Port Ship Operators Security for HAZMAT CDC Materials Florida Port Security Operations:Complyingwith State Law 311.12 COURSE LOCATIONS The Maritime Security Institute offers all of its training courses in southern Florida, or by arrangement, worldwide. These classes can be customized to your particular training requirements or you can let our experts analyze your operations and recommend the most cost effective way to meet the specifications of the International Ship Port Security (ISPS) Code and the Maritime Transportation Security Act (MTSA) of 2002. FOR MORE INFORMATION BG Kenneth P. Bergquist, Academic Dean http://www.maritimesecurityinstitute.org +1.954.567.8995 [EMAIL PROTECTED] +++ TO BE REMOVED FROM OUR MGN EMAIL DISTRIBUTION LIST, VISIT: HTTP://WWW.MGN.COM/[EMAIL PROTECTED]=159109=HZP19DPIFI5K2QNWJFDD YOU CAN ALSO CONTACT US DIRECTLY AT: MARITIME GLOBAL NET PO BOX 207 BRISTOL, RHODE ISLAND 02809 USA TEL: (401)247-7780 FAX: (401)247-7756 THANK YOU. Code: HZP19DPIFI5K2QNWJFDD
Re: Ridge Wants Fingerprints in Passports
On 2005-01-13T17:46:39-0800, Bill Stewart wrote: He's smearing his sticky fingerprints all over everything else, and now he wants them in our passports? Oughtta learn to keep his hands to himself. Fine with me if the first person to get a new biometric passport gets Ridge's fingers as part of the deal -- to verify for the world that the prints are valid. -- War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free. -Heraclitus 53
Re: Florida man faces bioweapon charge
On 2005-01-13T17:48:13-0800, Eric Cordian wrote: RAH pastes: She said that on at least one occasion he showed her something he had purchased via the Internet and expressed concern that if their cat inadvertently ate enough of it, the cat would die, according to the affidavit. Obviously this news story is the grand prize winner in an innuendo contest. The article also neglects to mention FEDERAL AGENCIES' pet KILL ratio. I'm not sure about cats specifically, but dog killing is quite popular. The FBI is still investigating who sent two letters that contained ricin in 2003 through the U.S. postal system. Those letters contained threats and complaints about labor regulations in the trucking industry. Evidently the kid was in possession of Envelopes of Mass Destruction as well as castor beans, guns, and books. Envelopes! Everyone knows that civilized people communicate via instant/text message or email (insofar as they are distinct). We have no need for these ENVELOPES, which as well as being used to send toxins to KILL LAW-ABIDING TAXPAYERS also cause untold annual economic damage from paper-cut-caused hospital visits. In 1978, Georgi Markov, a Bulgarian writer and journalist in London, died after a man attacked him with an umbrella that had been rigged to inject a ricin pellet under his skin. And WTF does this have to do with the guy with the castor beans? I spot the beginnings of yet another war. Please excuse me while I go bury my umbrellas. PATRIOTS use hooded raincoats. We have no NEED for barbaric and dangerous implements like UMBRELLAS. Looks like Ricin Theatre has joined Anthrax Theatre in the armory of Weapons of Mass Deception. You forgot the guns! The GUNS! Those terrible and bloody implements of death ARE totally unnecessary! Never mind that they're PERFECTLY LEGAL and they don't make ricin (excuse me, castor beans) any more deadly. He still had guns! -- War is the father and king of all, and some he shows as gods, others as men; some he makes slaves, others free. -Heraclitus 53
Searching with Images instead of Words
Link: http://slashdot.org/article.pl?sid=05/01/13/184226 Posted by: CmdrTaco, on 2005-01-13 20:29:00 from the blessing-for-those-who-can't-spell dept. [1]johnsee writes A computer vision researcher by the name of Hartmut Neven is [2]developing ingenious new technology that allows the searching of a database by submitting an image, for example, off a mobile phone camera. Imagine taking a photo of a street corner to find out where you are, or the photo of a city building to see its history IFRAME: [3]pos6 References 1. http://www.sandstorming.com/ 2. http://www.thefeature.com/article?articleid=101341ref=5147543 3. http://ads.osdn.com/?ad_id=2936alloc_id=13732site_id=1request_id=9329739 - End forwarded message - -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07078, 11.61144http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net pgpekTCZ1owyS.pgp Description: PGP signature
Re: Tasers for Cops Not You
At 01:20 PM 1/8/05 -0800, John Young wrote: However, Taser claims the civilian version is effective only to 15 feet while the LE version will explose a heart at 20 feet. And, Taser says accidental deaths caused by the shock would have happened to those sick persons anyway. Well, yes, homicidal cops say the perps were begging for it, learning such talk from the president and up to the one who has fun with joy toy tsunamis. John: A taser is 50 KV and microamps. Not fun but it doesn't cause fibrillation. (Incoherent cardiac muscle contraction - no pulse.) I now work for a company that makes defibrillators. It takes a few 10s of Joules through the heart to fibrillate, typically 100-200 J for an adult, during a certain critical window during the sinus rhythm. Our gizmos discharge ~200 uF at up to 2 KV to defibrillate a fibrillating heart, which will also fibrillate if administered to a healthy heart at the wrong time, as I said. That's up to 40 amps. (Through the pads a chest is 20-200 ohms, typically 50.) Without a defibrillator the person is dead, CPR or not. That's the science. As far as pigs wanting slaves/peasants/citizens to be unarmed, well, agree. As far as choke holds on negroes, excessive force on cocaine-stimulated citizens, etc goes, I have nothing to bear on this. As far as banning lethal and nonlethal weapons for use by all but state minions, we agree. When tasers, mace, body armor, .50 cal or lesser rifles are outlawed, well, you know the rest. (Of course mace is best applied with q-tips to the eyes of sitting protesters. And the mercenaries in Iraq do fine with pillowcases and 12V batteries.) Though heavens fall, let justice be done.
Re: [IP] The DNA round-up on Cape Cod (fwd from dave@farber.net
The Beast doesn't know who licked the stamp. A fiducial sample is what they want. In Calif, they could merely arrest you for a bogus charge to have the right to sample your families DNA as carried by you. Schwarzenegger is not Austrian accidentally. GATTACA was optimistic. At 06:02 PM 1/10/05 +0100, Eugen Leitl wrote: I live in the town of Truro on Cape Cod about 4 or 5 months out of the year. This past week, the Truro has been on the national news because the local police are attempting to obtain DNA samples of all men of the town in order to solve a three-year old murder case. Here are a couple of the articles that give the details of what is going on in this DNA round-up: To Try to Net Killer, Police Ask a Small Town's Men for DNA http://www.nytimes.com/2005/01/10/national/10cape.html Truro abuzz over 'swab' DNA testing http://www.capecodonline.com/cctimes/truroabuzz7.htm I am headed back to my Truro house later this week. If I am approached by the police to provide a DNA sample for their round-up of Truro males, I am planning to refuse. However, I just realized that I already gave a DNA sample to the Town of Truro recently. I paid my property tax bill to the Truro tax collectors office two weeks ago. My DNA is on the tax payment envelope that I licked. Envelopes are apparently a good source of DNA material according to this article: DNA on Envelope Reopens Decades-old Murder Case http://abclocal.go.com/wabc/news/wabc_052103_dnaarrest.html Richard M. Smith http://www.ComputerBytesMan.com -- End of Forwarded Message - You are subscribed as [EMAIL PROTECTED] To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ - End forwarded message - -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07078, 11.61144http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature]
expectation of privacy
At 09:01 PM 1/12/05 +0100, Eugen Leitl wrote: It's time to blow the lid off this no expectation of privacy in public places argument that judges and law enforcement now spout out like demented parrots in so many situations. A court refused to hear the case of a man accused of owning unlicensed pharmaceuticals when a pig entered a locked loo. The loo was part of a gas station; the attendant called the pigs. A prostitute was in there too, with him, and the area rife with folks of that profession, FWIW, which is nothing. But the court held reduced expectation of privacy in a public loo. One imagines much fun with anonymous calls when state employees are in such places, but this does not temper our disgust, or desire for karma with extreme prejudice.
Re: Google Exposes Web Surveillance Cams
At 02:20 PM 1/9/05 -0600, Riad S. Wahby wrote: I love how all of the coverage leaves out the actual search strings, as if it's hard to discover what they are at this point. I'm similarly annoyed that articles omit the URLs of terrorist web sites, being forced to check ogrish.com, even if I couldn't read the language. But government and its presses know best.
To Tyler Durden
TD, I just watched _Fight Club_ so I finally get your nym. (Here in low-earth geosynchronous orbit, content is delayed). Cool. I had thought it was your real name. Maj. Variola (ret)
RE: To Tyler Durden
WHAT THE FUCK ARE YOU TALKING ABOUT! THIS IS MY REAL NAME GODDAMMIT!!! Wait, I'm getting sleepy...gotta take a nap... -TD From: Major Variola (ret) [EMAIL PROTECTED] To: [EMAIL PROTECTED] [EMAIL PROTECTED] Subject: To Tyler Durden Date: Wed, 12 Jan 2005 19:02:14 -0800 TD, I just watched _Fight Club_ so I finally get your nym. (Here in low-earth geosynchronous orbit, content is delayed). Cool. I had thought it was your real name. Maj. Variola (ret)
Re: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire
From: Justin [EMAIL PROTECTED] Sent: Jan 10, 2005 7:35 PM To: [EMAIL PROTECTED] Subject: Re: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire .. Some gun accidents are suicides reported as such to avoid embarrassment to the family. I've heard this from other people, too--some in reasonably good positions to know how such things were reported. And there's surely some ambiguity between fatal accidents caused by doing something really stupid and intentional suicides. .. --John
Re: Ridge Wants Fingerprints in Passports
He's smearing his sticky fingerprints all over everything else, and now he wants them in our passports? Oughtta learn to keep his hands to himself. Bill Stewart [EMAIL PROTECTED]
Blue Iraq: Local Experts in Global Communications
I expect a few cypherpunks will know the founder of blueiraq... Cheers, RAH (who wonders who's running rediraq.com... ;-)) -- http://blueiraq.com/iraq/index.html Blue Iraq Local Experts in Global Communications about Blue Iraq | Products and Services | Technology and Networks | Iraq FAQ | Support | Contact Us Iraq FAQ FAQs Technology and Internet in Iraq: Frequently Asked Questions We have found that there are a few common questions about Internet access and general IT in Iraq. By answering these questions here, we can try to improve understanding inside and outside Iraq of the unique environment which exists here. What kind of Internet connection does Iraq have? Iraq does not have one main Internet connection. As of 2003, Iraq has had no landline or microwave relay connections to the outside world. All international communications, and most domestic communications, have been via satellite. Domestic wireline or wireless networks rely on satellite access for international connectivity. Many businesses use small satellite terminals (VSATs) to communicate directly with the outside world. Who uses Internet service in Iraq? The US Department of Defense, DoD and Redevelopment Contractors, Western expatriates, and the Iraqi Government are major users of Internet and international communications services in Iraq. Additionally, many NGOs, universities, and Iraqi businesses are establishing internet connectivity. One of the major purchasers of Internet service in the domestic Iraqi market is for small, entrepreneurial Internet Cafes. Why is service in Iraq more expensive than in other parts of the world? Satellite capacity is usually more expensive than terrestrial connectivity, due to the high costs of satellites and limited RF capacity available on a given transponder. However, satellites also have very high reliability, and are the only practical means of deploying communications rapidly over a large territory without building extensive (and vulnerable) fixed infrastructure. Modern shared IP-optimized Ku-band VSAT systems can be very affordably priced compared to older satellite communications systems. Communications companies operating in Iraq also face higher operating costs than similar communications companies operating elsewhere in the world, due to security concerns and lack of infrastructure. Can I use Voice over IP (VoIP) over satellite? Generally VoIP will require special settings to work reliably over satellite. We currently only support our iDirect network and dedicated satellite capacity for VoIP applications, and all supported VoIP communications must go through our VoIP gateway to ensure traffic prioritization and quality of service. Your competitors offer some systems which are cheaper, and can use Iraqis to do the installation. Why should I use Blue Iraq? Our prices are actually lower than most other satellite systems, based on service capacity and performance -- unlike a lot of companies, we specify our systems based on observed performance in Iraq, not a fanciful design specification. Due to the security situation, it is very difficult for Iraqis to get onto US bases to do installations. We do use trained Iraqis for off-base installs in some cases. However, in many cases, we have found that having US engineers do the world results in the most effective solution with the highest overall quality. An inexpensive system which does not work reliably is no bargain. Why should I purchase a system from an Iraq-focused network operating company, vs. one of the satellite owners or major networks? One word: presence. Blue Iraq has trained personnel on the ground in Iraq who are familiar with the environment. Many other vendors have never set foot in Iraq, and rely on local contract installation companies to do installations. Non-Iraq based companies also do not have personnel in Iraq do provide after-sale support if anything goes wrong. In a place like Iraq, many things can go wrong. Isn't it too dangerous to operate a business in Iraq? The news shows bombings and kidnappings every day? Iraq can be a very dangerous place. However, we take all reasonable precautions to minimize this risk. Our personnel travel with appropriate levels of security, and will refuse to go to sites which are not adequately secured. We primarily operate in conjunction with the US military, and rely on US military helicopter transport between secure bases. All personnel have appropriate protective gear and training. Why does the military use commercial internet services? Doesn't it have enough satellite capacity of its own? The US military makes extensive use of commercial products and systems for a wide variey of non-tactical purposes, as commercial systems often provide the cheapest, best, and most cost-effective solution to a given problem. Commercial satellite networks are extensively used for Morale, Welfare, and Recreation (MWR) purposes, administrative and support systems, and more. Do you do
Re: Florida man faces bioweapon charge
RAH pastes: .. Steven Michael Ekberg, 22, had at least 83 castor beans and other byproducts consistent with the manufacture of ricin in his possession, the FBI said. .. They said they also found, in a cardboard box in Ekberg's room, glass vials containing white granules suspected of being husk-less, chopped castor beans, a byproduct of the manufacture of ricin. I'm confused here. Is possession of castor beans possession of ricin? Is possession of chopped castor beans possession of ricin? He then picked up another container and stated words to the effect, This would make you really sick, the source allegedly told authorities. I could pick up a container of Drano, and make the same commment. Big deal. The source told police that Ekberg had two books containing information on how to make poisons from household chemicals and plants, according to the affidavit. Still legal to own, as far as I know. His mother, Theresa Ekberg, told the FBI that he has been treated for depression, according to the affidavit. His mother also told authorities that in the past her son had possessed some chemicals. She said that on at least one occasion he showed her something he had purchased via the Internet and expressed concern that if their cat inadvertently ate enough of it, the cat would die, according to the affidavit. Obviously this news story is the grand prize winner in an innuendo contest. The FBI is still investigating who sent two letters that contained ricin in 2003 through the U.S. postal system. Those letters contained threats and complaints about labor regulations in the trucking industry. In 1978, Georgi Markov, a Bulgarian writer and journalist in London, died after a man attacked him with an umbrella that had been rigged to inject a ricin pellet under his skin. And WTF does this have to do with the guy with the castor beans? Looks like Ricin Theatre has joined Anthrax Theatre in the armory of Weapons of Mass Deception. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division Do What Thou Wilt Shall Be The Whole Of The Law