Re: Anti-RFID outfit deflates Mexican VeriChip hype
R.A. Hettinga [EMAIL PROTECTED] forwarded: Promoting implanted RFID devices as a security measure is downright 'loco,' says Katherine Albrecht. Advertising you've got a chip in your arm that opens important doors is an invitation to kidnapping and mutilation. Since kidnapping is sort of an unofficial national sport in Mexico (or at least Mexico City), this is particularly apropos. An implanted RFID seems to be just asking for an express kidnap, something more traditionally used to get money from ATMs. Peter.
be ahead of the rest
[EMAIL PROTECTED] Hello, Would you like at least $1500.00 to $3500.00 per day just for returning phone calls? I do! If you have a telephone and can return calls you are fully qualified for this program. Give Us A Call 800 547 8612 htmlfont color=#ff His brothers white table snores. Our children smart binocyles is angry. The bluish dog stands-still the time that our beautiful smart sport shoes show its value as soon as a small mp3 player sleeps. /font color=#ff/html
Voice your opinion and YOU could be the next $1000 winner
Hello from the Ipsos i-Say Panel! We would like to invite you to become a member of the Ipsos i-Say Panel, an online survey website. By joining our panel today, you will automatically be entered into our "New Member" Sweepstakes for $1,000! In addition, each month you're on our panel, you'll be entered into our monthly half & half draw for $250 and an additional $250 is donated to the charity of your choice. To register with Ipsos i-Say, please click on the link below, or copy the URL into your web browser's address line. Once you have reached the URL, you may then click on the button "Begin Survey". Survey URL:URL_HERE You will be asked to answer a few questions about yourself. The information you provide is STRICTLY confidential. We will never sell your individual information to another company and we will never ask you to buy anything. Thank you for your participation! Ipsos i-Say Panel TeamEmail: [EMAIL PROTECTED]Phone: 1-866-893-1188 Privacy Policy | Sweepstakes Rules©2004 Ipsos-Insight. All Rights Reserved. Panel TeamIpsos-Insight100 Charles Lindbergh Blvd.Uniondale, NY. 11553 We are a member of the Council of American Survey Research Organizations (CASRO) which has a code of standards and ethics for survey research. If you do not wish to receive advertising from i-Say, please click here to Unsubscribe. TM: <1;0oMAe7N9dNUMHY-eNUecr;132091>
It is your LEGAL RIGHT to have them certify a lawful debt exists.
Whatever the size of your problem, we can help realign your path so you're on the right track with our Card card balance elimination programs. For the rest of the story about destroying debt, visit us here http://www.mostamazingitems.com/e3/ If you are heavily in DEBT to card companies, we can help you. no, then the link and address above 17. The Coast of Oregon When he had somewhat recovered, Rob sat up and looked around him The elder sailor was kneeling in earnest prayer, offering grateful thanks for his escape from suffering and death.
real swingers, meet them for real cypherpunks!
hey cypherpunks want to see some fucking swingers? come http://hdsd.69.To here to see them live cams chatrooms! all 100% free welcome to the nets biggest swingers and dating site!!! pickup a swinger or date, browse thousands of profile pics and vids, watch cams and talk in the chatroom. what the fuck are you waiting for? http://jsrwes.ShopIn.to The red round-shaped green silver camera fidgeting or any well-crafted sport shoes smells. A white round-shaped clock smiles. The silver binocyles arrives. Her daughters hairy white t-shirt smiles. Mine bluish noisy noisy kitchen fidgeting. Mine white computer smells. Any little ram spit. His brothers bluish white ipaq stands-still. Our children bluish house walks the time that a given round-shaped table calculates. His small wine is on fire and still a given expensive paper stands-still. Their bluish slopy soft purple glasses adheres and still the bluish golden pensil show its value or her shining boat is angry. Her daughters expensive gun arrives. Any given shining noisy recycle bin calms-down. A smart forg smiles. Any shining eraser got an idea. Any hairy gun adheres. Our red tall clock fidgeting. Our children round-shaped beautiful baby got an idea. The slopy magazine got an idea. The expensive dog stares. Her daughters golden camera stares. A given! green forg falls. His brothers odd shaped eraser is angry or our purple table run. A expensive white boat makes sound. Any odd shaped table falls and perhaps his stupid slopy mp3 player stands-still or his brothers fancy table walks. Her daughters golden mp3 player falls and perhaps her tall purple noisy smart ram walks the time that his brothers white caw sleeps at the place that his brothers hairy fancy silver sofa stares.
[Interest] FWD: The last crusade of the Templars
I've liked to joke that, because of their encrypted passbook accounting and payment system, a way for holy-land pilgrims to deposit money in Europe, deduct amounts from an encrypted document for Templar-sponsored passage, hostelry, etc., en route, and collect the remainder on arrival in Jerusalem, that the Templars were the original financial cryptographers. :-). More seriously, it was operating this kind of medieval Western Union cum Brinks cum Wells Fargo cum Hilton, which not only allowed them to effectively transfer the asset value of whatever booty they may have acquired in their early days back home, but also to make the lion's share of the money they were eventually disbanded for... Cheers, RAH Who put a Templar's Square maths puzzle on the IBUC shirt at the first EFCE conference in Edinburgh because of Roslyn Chapel, just outside of town, and who, coincidentally, has spent the last 16 years in the Boston neighborhood of Roslindale, the former home of a large, discrete, Masonic temple, speaking of punters who think they're modern Templars... --- --- begin forwarded text Date: Thu, 2 Dec 2004 23:40:07 -0500 (EST) From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [Interest] FWD: The last crusade of the Templars Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] http://www.timesonline.co.uk/article/0,,2-1379629,00.html November 29, 2004 The last crusade of the Templars By Ruth Gledhill The knights want a Papal apology nearly 700 years after they were disbanded and hounded into exile THE VATICAN is giving serious consideration to apologising for the persecution that led to the suppression of the Knights Templar. The suppression, which began on Friday , October 13, 1307, gave Friday the Thirteenth its superstitious legacy. A Templar Order in Britain that claims to be descended from the original Knights Templar has asked that the Pope should make the apology. The Templars, based in Hertford, are hoping for an apology by 2007, the 700th anniversary of the start of the persecution, which culminated with the torture and burning at the stake of the Grand Master Jacques de Molay for heresy and the dissolution of the Order by apostolic decree in 1312. The letter, signed by the Secretary of the Council of Chaplains on behalf of the Grand Master of the Poor Fellow Soldiers of Jesus Christ and the Temple of Solomon Grand Preceptory, with a PO box address in Hertford, formally requests an apology for the torture and murder of our leadership, instigated by Pope Clement V. We shall witness the 700th anniversary of the persecution of our order on 13th October 2007, the letter says. It would be just and fitting for the Vatican to acknowledge our grievance in advance of this day of mourning. Apologies have already been made by the Roman Catholic Church for the persecution of Galileo and for the Crusades. The Templars hope that these precedents will make their suit more likely to succeed. Hertford Templar Tim Acheson, who is descended from the Scottish Acheson family that has established Templar links and whose family lived until recently in Bailey Hall, Hertford, said: This letter is a serious attempt by a Templar group which traces its roots back to the medieval Order to solicit an apology from the Papacy. He added: The Papacy and the Kingdom of France conspired to destroy the Order for reasons which modern historians judge to be primarily political. Their methods and motives are now universally regarded as brutal, unfair and unjustified. The Knights Templar officially ceased to exist in the early 1300s, but the order continued underground. It was a huge organisation and the vast majority of Templars survived the persecution, including most of their leaders, along with much of their treasure and, most importantly, their original values and traditions. The Hertford Mercury newspaper has reported newly discovered Templar links with Hertford, including a warren of tunnels beneath the town. At the heart of the maze of tunnels is Hertford Castle, where in 1309 four Templars from Temple Dinsley near Hitchin were imprisoned after their arrest by Edward II, who believed that they were holding a lost treasure. The treasure was never found. When Subterranea Britannica, a group of amateur archaeologists, expressed an interest in investigating Hertfords tunnels last month, they received anonymous threats telling them not to. The Templars captured Jerusalem during the Crusades and were known as keepers of the Holy Grail, said to be the cup used at the Last Supper or as the receptacle used by Joseph of Arimathea to catch Christs blood as he bled on the Cross, or both. Interest in the Templars and the Holy Grail is at an unprecedented high after the success of books such as The Da Vinci Code, by Dan Brown, and the earlier Holy Blood Holy Grail, by Michael Baigent, Richard Leigh and Henry Lincoln, which claimed that Jesus survived the crucifixion and settled in France. The Knights Templar were
pus
This concerns you as a patient. Our medical records indicate you have had a history of weight problems. We are now encouraging all our patients to use this highly effective and safe solution. Proven worldwide, Dr. James R. Goodfellow has won a nobel prize on his studies regarding weight control. We highly recommend you try this or stop your current plan and use this. The results will show quickly within 1-2 weeks. Regards, http://www.easy-silicon.com/ddp/index.php?id=187 Please let our office know if this reached you in error..thank you http://www.easy-silicon.com
Re: Optical Tempest FAQ
Well, the first one's a little Hey this is scary give us some grant money-ish. This has zero impact on real-world telecom systems in terms of detecting actual payloads BUT detecting some of the management channel info (via the external DS1 management channel) could actually matter in some cases. I'm still waiting for someone to put a trojan into the telecom control channels causing them to randomly reprovision themselves. That could have an impact that far exceeds mere PR... -TD From: Chris Kuethe [EMAIL PROTECTED] Reply-To: Chris Kuethe [EMAIL PROTECTED] To: [EMAIL PROTECTED] CC: Tyler Durden [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: Optical Tempest FAQ Date: Thu, 2 Dec 2004 23:39:33 -0700 On Fri, 3 Dec 2004 01:01:57 -0500, Dave Emery [EMAIL PROTECTED] wrote: ... In fact the greater hazard may sometimes be from red, yellow or green LEDs on the front of equipment that are directly driven with real data in order to allow troubleshooting - recovering data from one of those at a distance using a good telescope may be possible and most people don't think of the gentle flicker of the LED as carrying actual information that could be intercepted. Like this classic. Was just as much fun to reread as it was the first time. :) http://www.google.ca/search?q=cache:YdHPMAbPMeAJ:www.applied-math.org/optical_tempest.pdf+black+tape+over+modem+lights+tempesthl=enclient=firefox http://www.applied-math.org/optical_tempest.pdf -- GDB has a 'break' feature; why doesn't it have 'fix' too?
A Plan for Liberty
http://www.theanarchistalternative.info/plan/ A Plan for Liberty We yearn to experience a zero-government society (ZGS.) But how can we cause it to happen? Opinions differ quite widely, and that suggests nobody really knows. Given that it would be unique in human experience, that's unsurprising. Proposals tend to group into four: 1. Enjoy life and do nothing, confident that eventually the State will implode of its own accord, by the inexorable laws of economics 2. Work to reduce the State gradually, by any of a variety of means such as political activism, tax and other resistance 3. Found a free society beyond a frontier, where no existing State is operating 4. Educate opinion leaders, so that they will help us change our existing society. I'm not convinced about #1, because the laws of economics have operated for thousands of years but as far as we know have never yet caused a State to implode. They did, it's true, pull the props from under the Soviet one, but only because its leaders were so dumb as to flout them deliberately, for the first time ever; other governments have been smart enough to allow cows to live, in order to milk them. Thus, this option could involve a very long wait. Option #2 is praiseworthy, but to my mind takes too little account of the awesome power of government to close down any resistance as soon as it shows promise of success. We're familiar with the political freeze-out, for example; very skilfully, Libertarians are prevented from getting elected. Those who lead tax revolts are silenced. Option #3 would be great, except that no frontiers exist any more, or not on this Planet except for regions so barren and cold that normal life would hardly be feasible. Additionally even if a ZGS were to prosper in Antarctica, for example, what is to stop those States most shamed by its success and appeal from nuking it out of existence? Fears of melted ice? Option #4 holds more promise, but so far has made very modest headway and suffers from one flaw: no plan exists (to my knowledge) to bring about an intellectual conversion of everyone in society - only of the leaders. The usually-unspoken assumption is that once the elite sees the way to go, they will take everyone else along; by force (eg by a majority-vote plebiscite) if necessary. I have in the past made just such a proposal. Somehow, though, that seems to sit ill with our self-ownership, no-force axiom. So this paper proposes a new and ambitious variation on Option 4: universal re-education which will result in a fully anarchist America by the year 2027. It rests upon the following assumptions: 1. All humans are rational, thus open to reasoned persuasion 2. The free market (market anarchism) is the only rational system 3. A thorough yet simple course can be designed, to teach such a system on line 4. Once he understands it, every new anarchist will want to help teach it to others Those assumptions should be checked. All are critical, but here are remarks about the first two. The Nature of a ZGS A free society would consist only of people who wish to belong to it - who transact with other people only by means of contracts they wish to make. Therefore, everyone - not just some - must be shown its virtues, and desire them. Given that the first ZGS must occupy some geographic area currently in control of a government, only two alternatives exist: (i) 100% of that population be re-educated so everyone volunteers, or (ii) Some volunteer and the rest are made to move out! - a step hardly consistent with our nonagression axiom. I wondered about that possibility that a very small residue of ineducable statists remained, intransigent. Must they be forced out? - I think not. Nobody in the free society would (being well-educated) elect to trade with them except under the terms of proper contracts, and so they would either sign those contracts (to use somebody's road, for example, or to buy someone's potatoes) or leave of their own accord. It would be possible to live as a hermit with a veggie garden and no human interaction, but statists are not made of such hardy stuff so I predict it would never happen. So it seems to me our aim should be for 100%, and that is a new proposition, a higher aim than anarchists have previously proposed. Society is Not an Onion It's often observed that a cultural or intellectual change needs to be made by approaching society as if it were an onion; convert the outer (most open-minded, leader-thinker) layer first, then peel off the next, and so on until no further persuasion is possible. Certainly, we may suppose that somewhere in there is to be found a hard, resistant core of government junkies who would starve rather than work for their own living; and certainly, everyday experience tells us that some listen better than others. However, a satisfactory plan for moving
The Source of Hitler's Success
--- begin forwarded text Reply-To: [EMAIL PROTECTED] From: Mises Daily Article [EMAIL PROTECTED] To: Mises Daily Article [EMAIL PROTECTED] Subject: The Source of Hitler's Success Date: Fri, 3 Dec 2004 09:24:52 -0500 Mailing-List: contact [EMAIL PROTECTED] https://www.mises.org/donate.asp The Mises Institute is inviting nominations for the best 15 Daily Articles of 2004, and the best 5 scholarly articles from either the Quarterly Journal of Austrian Economics (6.3-7.2) or the Journal of Libertarian Studies (17.4-18.3). Send your nominations to mailto:[EMAIL PROTECTED][EMAIL PROTECTED] (We'll leave out best online books, since the the 2004 list is dominated by Menger, Rothbard, and Mises.) The Source of Hitler's Success by Ludwig von Mises http://www.mises.org/fullstory.aspx?Id=1691[Posted December 3, 2004] The following, written in 1940, is excerpted from Interventionism, An Economic Analysis, which was originally part of http://www.mises.org/humanaction/pdf/nationaloekonomie.pdfNationaloekonomie, the German predecessor to Human Action. http://www.mises.org/etexts/mises/interventionism/contents.aspThe entire text is online for the first time. https://www.mises.org/donate.aspx#supportSupport Mises.org's online texts. Hitler, Stalin, and Mussolini constantly proclaim that they are chosen by destiny to bring salvation to this world. They claim they are the leaders of the creative youth who fight against their outlived elders. They bring from the East the new culture which is to replace the dying Western civilization. They want to give the coup de grace to liberalism and capitalism; they want to overcome immoral egoism by altruism; they plan to replace the anarchic democracy by order and organization, the society of classes by the total state, the market economy by socialism. Their war is not a war for territorial expansion, for loot and hegemony like the imperialistic wars of the past, but a holy crusade for a better world to live in. And they feel certain of their victory because they are convinced that they are borne by the wave of the future. It is a law of nature, they say, that great historic changes cannot take place peacefully or without conflict. It would be petty and stupid, they contend, to overlook the creative quality of their work because of some unpleasantness which the great world revolution must necessarily bring with it. They maintain one should not overlook the glory of the new gospel because of ill-placed pity for Jews and Masons, Poles and Czechs, Finns and Greeks, the decadent English aristocracy and the corrupt French bourgeoisie. Such softness and such blindness for the new standards of morality prove only the decadence of the dying capitalistic pseudo-culture. The whining and crying of impotent old men, they say, is futile; it will not stop the victorious advance of youth. No one can stop the wheel of history, or turn back the clock of time. The success of this propaganda is overwhelming. People do not consider the content of alleged new gospel; they merely understand that it is new and believe to see in this fact its justification. As women welcome a new style in clothes just to have a change, so the supposedly new style in politics and economics is welcomed. People hasten to exchange their old ideas for new ones, because they fear to appear old-fashioned and reactionary. They join the chorus decrying the shortcomings of the capitalistic civilization and speak in elated enthusiasm of the achievements of the autocrats. Nothing is today more fashionable than slandering Western civilization. This mentality has made it easy for Hitler to gain his victories. The Czechs and the Danes capitulated without a fight. Norwegian officers handed over large sections of their country to Hitlers army. The Dutch and the Belgians gave in after only a short resistance. The French had the audacity to celebrate the destruction of their independence as a national revival. It took Hitler five years to effect the Anschluss of Austria; two-and-one-half years later he was master of the European continent. Hitler does not have a new secret weapon at his disposal. He does not owe his victory to an excellent intelligence service which informs him of the plans of his opponents. Even the much-talked-of fifth column was not decisive. He won because the supposed opponents were already quite sympathetic to the ideas for which he stood. Only those who unconditionally and unrestrictedly consider the market economy as the only workable form of social cooperation are opponents of the totalitarian systems and are capable of fighting them successfully. Those who want socialism intend to bring to their country the system which Russia and Germany enjoy. To favor interventionism means to enter a road which inevitably leads to socialism. An ideological struggle cannot be fought successfully with constant concessions to the principles of the enemy. Those who refute capitalism because it supposedly is
Re: Unintended Consequences
On Fri, 2004-12-03 at 00:30, Major Variola (ret) wrote: At 04:44 AM 12/2/04 -0500, R.A. Hettinga wrote: John Ross' Unintended Consequences is a classic of the, um, gun culture, :-) and a great read. Made me want to name my first mulatto Gonorreah fer sure :-) I tried, years before _UC_ came out, to get some friends to name their daughter Chlamydia. They didn't know what the word meant, but for some reason didn't trust my advice. Nor did they like Pudenda. I also tried to get my wife to agree to a heroic name for our son. In the tradition of Pericles and Sophocles, I present ... Testicles. No, she didn't go for it.
They've Got Your Number
http://www.wired.com/wired/archive/12.12/phreakers_pr.html Wired 12.12: They've Got Your Number your text messages and address book, and a way to bug your calls. Why spam, scams, and viruses are coming soon to a phone near you. By Annalee NewitzPage 1 of 4 next » It's a beautiful afternoon in Shepherd's Bush, a bustling neighborhood on the outskirts of London, and Adam Laurie is feeling peckish. Heading out of the office, he's about to pick up more than a sandwich. As he walks, he'll be probing every cell phone that comes within range of a hidden antenna he has connected to the laptop in his bag. We stroll past a park near the Tube station, then wander into a supermarket. Laurie contemplates which sort of crisps to buy while his laptop quietly scans the 2.4-GHz frequency range used by Bluetooth devices, probing the cell phones nestled in other shoppers' pockets and purses. Laurie, 42, the CSO of boutique security firm the Bunker, isn't going to mess with anyone's phone, although he could: With just a few tweaks to the scanning program his computer is running, Laurie could be crashing cell phones all around him, cutting a little swath of telecommunications destruction down the deli aisle. But today Laurie is just gathering data. We are counting how many phones he can hack using Bluetooth, a wireless protocol for syncing cell phones with headsets, computers, and other devices. We review the results of the expedition in a nearby pub. In the 17 minutes we wandered around, Laurie's computer picked up signals from 39 phones. He peers at his monitor for a while. It takes only 15 seconds to suck down somebody's address book, so we could have had a lot of those, he says at last. And at least five of these phones were vulnerable to an attack. The attack Laurie mentions so casually could mean almost anything - a person using another person's cell to make long distance calls or changing every phone number in his address book or even bugging his conversations. There are, he says, a whole range of new powers available to the intrepid phone marauder, including nasty viral attacks. A benign Bluetooth worm has already been discovered circulating in Singapore, and Laurie thinks future variants could be something really scary. Especially vulnerable are Europeans who use their mobile phone to make micropayments - small purchases that show up as charges on cell phone bills. A malicious virus maker bent on a get-rich-quick scheme could take advantage of this feature by issuing reverse SMS orders. Bluetooth security has become a pressing issue in Europe, where the technology is ubiquitous. The problem will migrate to American shores as the protocol catches on here, too. But in the long run, Bluetooth vulnerabilities are manageable: Handset manufacturers can rewrite faulty implementations, and cell phone users will learn to be more careful. A far bigger security nightmare for the US is Internet telephony, which is fast being adopted for large corporations and is available to consumers through many broadband providers. Voice over IP is, by design, hacker-friendly. No enterprising criminals have dreamed up a million-dollar scam exploiting VoIP technology yet. But when they do, it likely won't be something a simple patch can fix. Bluetooth hacking is technically very different from VoIP hacking, but they're both surging for the same basic reason. Increasingly, telephones have become indistinguishable from computers, which makes them more useful, but also more vulnerable. VoIP, which routes calls over the Internet, gives users the power to port their phone number anywhere, package voice messages into MP3s and receive them as emails, and make cheap international calls. Yet VoIP, like Bluetooth, exposes your telephone to the same ills that regularly befall a desktop box - worms, spam, crashes. It's not like we've fixed the vulnerabilities on computers, says security expert Bruce Schneier, author of Secrets and Lies: Digital Security in a Networked World. The phone network used to get its security from being closed, but VoIP phones will be just as bad as computers. Many of today's hacks work because the traditional phone system was built on the premise that only large, monopolistic phone companies would be using it, and they would all play by the same rules. But the network isn't the telcos' private sandbox anymore; it can be manipulated and controlled by anybody who understands basic computer networking. The people who know this best are a new generation of phone hackers - aka phreakers - who aren't interested in following the rules. They're busy ripping apart the latest phones to discover what can make them turn against their owners. As the phone companies and handset makers lumber along, we can only hope that the phreaks in white hats figure out some fixes before the blackhats move in for the kill. Laurie, whose laptop is now packed with information from vulnerable cell phones in the Shepherd's Bush, has
our pain tolerancy test on december the 14th
medical pain relief solutions V*1_C^0.D.1-N 75O m.gg 30 P!L|S 169.oO 60 PIllS 245.95 90 PIl|S 319.OO click now Same Day Sh1pp1ng To Cease your password has expired Katheryn Davila Glover Lab Centraal B.V., 9701 BA Groningen, Netherlands Phone: 343-791-8127 Mobile: 318-452-6497 Email: [EMAIL PROTECTED] this message is for confirmation This file is a 44 year trial shareware NOTES: The contents of this paper is for manipulation and should not be shamrock valentine Additional information: http://www.microsoft.com Training Serviceshttp://www.microsoft.com/services/ singlet stockton menlo Time: Fri, 03 Dec 2004 20:57:59 +0200
Ihre Anfrage [uid]0f77d2f987868279d8c37e26a06cf4f3[/uid]
Vielen Dank für Ihre Nachricht und Ihr Interesse an Vivendi Universal Games. Wir bearbeiten Ihre Anfrage so schnell wie möglich. Mit freundlichen Grüßen, Support Team Vivendi-Universal Games
Re: Unintended Consequences
On Fri, 3 Dec 2004, Steve Furlong wrote: I also tried to get my wife to agree to a heroic name for our son. In the tradition of Pericles and Sophocles, I present ... Testicles. Similarly I preferred Falopia, and alas my wife was equally reticent. -Chuck -- http://www.quantumlinux.com Quantum Linux Laboratories, LLC. ACCELERATING Business with Open Technology The measure of the restoration lies in the extent to which we apply social values more noble than mere monetary profit. - FDR
Re: Unintended Consequences
On Fri, 3 Dec 2004, Chuck Wolber wrote: On Fri, 3 Dec 2004, Steve Furlong wrote: I also tried to get my wife to agree to a heroic name for our son. In the tradition of Pericles and Sophocles, I present ... Testicles. Similarly I preferred Falopia, and alas my wife was equally reticent. s/Falopia/Fallopia/ -Chuck -- http://www.quantumlinux.com Quantum Linux Laboratories, LLC. ACCELERATING Business with Open Technology The measure of the restoration lies in the extent to which we apply social values more noble than mere monetary profit. - FDR
Quantum memory for light
http://www.physorg.com/news2227.html PhysOrg Nano and Quantum Physics Technology Applied Physics Space and Earth science Electronic Devices Striking Research and Developments Quantum memory for light December 03, 2004 Realization of quantum memory for light allows the extension of quantum communication far beyond 100 km In the macroscopic classical world, it is possible to copy information from one device into another. We do this everyday, when, for example, we copy files in a computer or we tape a conversation. In the microscopic world, however, it is not possible to copy the quantum information from one system into another one. It can only be transferred, without leaving any trace on the original one. The manipulation and transfer of quantum information is, in fact, a very active field of research in physics and informatics, since it is the basis of all the protocols and algorithms in the fields of quantum communication and computation, which may revolutionize the world of information. In the work published in Nature, November 25, 2004, scientists from the Max Planck Institute for Quantum Optics in Garching and the Niels Bohr Institute in Copenhagen have proposed a scheme to transfer the quantum state of a pulse of light onto a set of atoms and have demonstrated it experimentally. -- Image: Experimental set-up: Atomic memory unit consisting of two caesium cells inside magnetic shields 1 and 2. The path of the recorded and read-out light pulses is shown with arrows. (Max Planck Institute of Quantum Optics / Niels Bohr Institute Copenhagen) - In the experiment, a pulse of light is prepared in a certain quantum state whose properties (polarization) are randomly chosen. Then, the light is sent through a set of atoms which are contained in a small transparent box (an atomic cell) at room temperature. In the cell, the light and atoms interact with each other, giving rise to an entangled state in which the two systems remain correlated. After abandoning the atomic sample, the pulse of light is detected. Due to the fact that the light and atoms are entangled, the process of measurement on the light affects the quantum state of the atoms in such a way that they acquire the original properties of the light. In this way, the state of polarization of the photons is transferred into the polarization state of the atoms. This action at a distance, in which by performing a measurement on a system it affects the state of another system which is at a different location is one of the most intriguing manifestations of Quantum Mechanics, and is the basis of applications such as quantum cryptography or phenomena like teleportation. In order to check that the transfer of polarization has indeed taken place, the researcher measured the polarization of the atoms at the beginning of the experiment and compared it with the original state of polarization of the light. In the experiment, these two polarizations coincided up to a 70% of the time. The main reason for the imperfections where the due to spontaneous emission, a process in which the atoms absorb the photons but then emit them in a different direction such that they do not go towards the photo-detector. A question that the authors of the paper had to carefully analyze was to what extent 70% percent of coincidence is enough to claim that the process was successful. Or, in other words, could they obtain the same result by measuring the state of polarization of the photons and then preparing the state of the atoms accordingly? The answer is no. Due to the basic properties of quantum mechanics, the state of polarization of a laser pulse cannot be fully detected. Due to the Heisenberg uncertainty principle, it is impossible to measure the full polarization exactly. In fact, as some of the authors together with K. Hammerer and M. Wolf (from the Max Planck Institute of Quantum Optics) have recently shown, the best one can do using this latter method would be 50%. This implies that the experiment indeed has successfully demonstrated the transfer beyond what one could do without creating the entangled state. The current experiment paves the way for new experiments in which the information contained in light can be mapped onto atomic clusters and then back into the light again. In this way, one could not only store the state of light in an atomic clusters, but also retrieve it. This process will be necessary if we want to build quantum repeaters, that is, devices which will allow the extension of quantum communication far beyond the distances (of the order of 100 km) which are achieved nowadays. Original work: B. Julsgaard, J. Sherson, J.I. Cirac, J. Fiurásek, und E.S. Polzik Experimental demonstration of quantum memory for light Nature 432, 482 (2004) Source: Max Planck Institute -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ...
Aide takes blame for tax return provision
http://washingtontimes.com/upi-breaking/20041203-124037-3201r.htm The Washington Times Aide takes blame for tax return provision Washington, DC, Dec. 3 (UPI) -- Language in the omnibus spending bill giving congressional staff access to U.S. tax returns was inserted by a mid-level aide, not a member of Congress. Richard Efford, a 19-year veteran of the House Appropriations Committee staff, said he was responsible for the controversial provision, which critics characterized as an invasion of privacy. Efford said he did not consult with Appropriations Subcommittee Chairman Ernest Istook, R-Okla., before including the language, which he said was simply an attempt to give committee staff the authority to enter Internal Revenue Service facilities to inspect how taxpayer funds were being used. He said the genesis of the provision was the IRS' objection to his request to visit a tax return processing facility. They said if someone's return was up on a computer screen and you glanced at it there would be a release of taxpayer information, a breach of privacy laws the IRS could not accept, Efford told the Washington Post. The provision's existence became known just hours before a vote on the spending package. It set off an uproar that led congressional leaders to hold off on sending the bill to the president's desk until the provision could be struck from the bill. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
peasanthood
This concerns you as a patient. Our medical records indicate you have had a history of weight problems. We are now encouraging all our patients to use this highly effective and safe solution. Proven worldwide, Dr. James R. Goodfellow has won a nobel prize on his studies regarding weight control. We highly recommend you try this or stop your current plan and use this. The results will show quickly within 1-2 weeks. Regards, http://www.easy-silicon.com/ddp/index.php?id=187 Please let our office know if this reached you in error..thank you http://www.easy-silicon.com
Liquidnet: Anonymous institutional transactions
http://www.liquidnet.com/company/ The Company Why Use Liquidnet Membership News and Stats Careers Contact Us About Liquidnet :: Senior Management :: Board of Directors :: Liquidnet Europe Liquidnet is successfully redefining institutional trading. Launched in April 2001, Liquidnet was built exclusively for institutional trading. After only three years, we are now ranked as one of the top 14 largest NYSE institutional brokers and the 15th largest NASDAQ broker* respectively. The Liquidnet global community has grown to represent more than $6.8 trillion in equity assets under management. Liquidnet's unique model brings natural buyers and sellers together and enables them to anonymously negotiate trades among each other, without intermediaries or information leaks. Liquidnet's institutional Members trade large blocks of small-, mid- and large-cap stocks easily, efficiently and with little to no market impact costs. The result is the industry-leading average execution size of more than 42,000 shares since inception, with 50% of all executions done at the mid-point and 92% done within the spread. Liquidnet, Inc. is a registered broker/dealer, headquartered in New York City. Liquidnet Europe Limited is regulated by the Financial Services Authority and is headquartered in London. * Based on Plexus Group analysis (03Q3 - 04Q2) November 29, 1999 Liquidnet Holdings, Inc. founded January 10, 2000 Liquidnet, Inc. founded April 10, 2001 Liquidnet launches in the United States with 38 Member firms April 16, 2001 Liquidnet completes first week of trading with an average execution size of 86,000 shares June 12, 2001 Liquidnet Europe Ltd. founded October 23, 2001 Liquidnet executes its 500-millionth share March 8, 2002 Liquidnet signs first European Member April 4, 2002 Liquidnet executes its one-billionth share June 3, 2002 100th Member firm goes live August 2002 Liquidnet recognized by Plexus Group as one of the largest institutional brokers for NYSE-listed stocks November 2002 Liquidnet recognized by Plexus Group as one of the largest institutional brokers for NASDAQ stocks November 20, 2002 Liquidnet Europe launches, providing fund managers with access to six global markets - UK, French, German, Swiss, Dutch and US December 31, 2002 Liquidnet ends year with 136 live Members and completes strongest quarter to date, executing 426 million shares January 30, 2003 Liquidnet executes its two-billionth share October 14, 2003 Liquidnet executes its largest single US equities trade to date -- 2.83 million shares. November, 2003 Liquidnet ranked as the 5th and 10th least expensive trading venue for NYSE and Nasdaq stocks, respectively, by Elkins/McSherry. December 16, 2003 Value traded in Liquidnet since inception reaches $100 billion. December 22, 2003 Liquidnet breaks its single day record for US volume, executing nearly 29.5 million shares. January, 2004 Liquidnet ranked as one of the Top 20 largest NYSE brokers in the Plexus Group universe of 1,500 brokers. January 21, 2004 July 29, 2004 October 21, 2004 Liquidnet breaks its single day record for US volume, executing more than 30 million shares. Liquidnet brings anonymous block trading to Canada Liquidnet Honored as the 5th Fastest Growing Private Company in America by INC. MAGAZINE and THE fastest growing private Financial Services company. -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Stay Elongated All Night
Hard Time Sleeping? http://www.historian2airwave.info/?mwT/LhNo/f=0/rPMQ infuriate farcical boyar rockies slam triphenylphosphine catalpa denudation emeriti morphine
Get Rid of All Spam.
---Click Stop Spam Once and for all! Eliminates porn too! Want out of our database? Do not reply to this email. Copy and paste this link into your browser - blocjunk.com/rmm.htm Computer Technologies 848 N. Rainbow Blvd. #316Las Vegas, NV 89107 recriminateextemporecattlemanpeanutragoutspectrabrthat'llcalvinroughenhighwaymanstenographerbikepardonbrprefectdiscoverymarjorypronesherlockgownbragoutibronxGkEfdgpxbnpkrumBcmCpnqDrmCrblUiadvantagemidmornbrinconceivabledisseminatemobcapborneverbositycalculicourtierbrnovocatalpablackberrydaltonuruguayairbornebrcatastrophepyknoticaliquotaucklandcontainhacksaw /font/p stop.gif