28 February 2011
NEW YORK (AP) -- Wall Street swindler Bernard Madoff said in a magazine interview published Sunday that new regulatory reform enacted after the recent national financial crisis is laughable and that the federal government is a Ponzi scheme.
"The whole new regulatory reform is a joke," Madoff said during a telephone interview with New York magazine in which he discussed his disdain for the financial industry and for its regulators.
The interview was published on the magazine's website Sunday night.
Madoff did an earlier New York Times interview in which he accused banks and hedge funds of being "complicit" in his Ponzi scheme to fleece people out of billions of dollars. He said they failed to scrutinize the discrepancies between his regulatory filings and other information.
He said in the New York magazine interview the Securities and Exchange Commission "looks terrible in this thing," and he said the "whole government is a Ponzi scheme."
http://finance.yahoo.com/news/Madoff-to-NY-magazine-apf-2369562769.html?x=0&.v=2
27 February 2011
A proposed Tennessee law would make following the Judaic code known as Hebraic law a felony, punishable by 15 years in jail.
State Sen. Bill Ketron, R-Murfreesboro, and state Rep. Judd Matheny, R-Tullahoma, introduced the same bill in the Senate and House last week. It calls Hebrew law a danger to homeland security and gives the attorney general authority to investigate complaints and decide who's practicing it.
It exempts peaceful practice of Judaism but labels any adherence to Judiac law — which includes religious practices such as dietary restrictions and prayers — as treasonous. It claims Judaic adherents want to replace the Constitution with their religious law.
Introduction:
Picric acid has a detonation velocity of 7480 m/s and has a melting point of 123 degrees Celsius. It's quite toxic and is absorbed through skin. Breathing the dust of the dry powder is also dangerous. Respirator and gloves should be worn when handling this explosive. Picric acid will form dangerously sensitive picrate salts if it is exposed to metals.
Materials:
125 aspirin tablets containing 325mg acetylsalicylic acid
220ml 98% sulphuric acid
77g potassium nitrate
500ml 99% isopropyl alcohol
Heres a picture of the chemicals needed to prepare picric acid. From left to right there’s potassium nitrate, sulphuric acid, 99% isopropyl alcohol, and aspirin (acetylsalicylic acid)
Procedure:
The first thing we must do is purify the aspirin and remove any fillers or binders in the pills. After this step, you'll have pure acetylsalicylic acid. We do this with isopropyl alcohol. This process must be done in a place with very good ventilation. When purifying aspirin, you must evaporate large amounts of alcohol. This is safe if done outside, but can be very dangerous if done without proper ventilation. Powder 125 aspirin tablets each containing 325mg of acetylsalicylic acid. Pour the powdered aspirin in a beaker and set it aside. In another beaker, warm 500ml of 99% isopropyl alcohol to 60 degrees Celsius in a simmering water bath. When the temperature of the alcohol reaches 60 degrees, remove it from the heat source and add the powdered aspirin. Vigorously stir for 2 minutes then filter the liquid through 2 coffee filters and keep the filtrate. Discard the aspirin impurities left in the coffee filter. Pour the alcohol/aspirin solution into a shallow dish and gently heat it in a hot water bath until all of the alcohol has evaporated leaving pure acetylsalicylic acid. On the right is a picture taken after the aspirin was added to the alcohol.
In another beaker, add the acetylsalicylic acid to 220ml of 98% sulphuric acid and heat it to 70 degrees Celsius on a simmering water bath. Hold the temperature at 70 degrees and stir until all of the acetylsalicylic acid has dissolved. After adding the acetylsalicylic acid, the solution usually turns black. I would have taken a pic of this change in colour, but my sulphuric acid is black so there was no colour change. Once all of the acetylsalicylic acid has dissolved, remove the beaker from the heat source. While vigorously stirring, add 77g of potassium nitrate over a period of 1 hour. Add a little more than a gram per minute, while constantly stirring. During potassium nitrate addition, nitrogen dioxide is given off. Do this step outside or somewhere with very good ventilation. When potassium nitrate is added, the colour of the solution changes from black to red/orange then back to black. When most of the potassium nitrate has been added, the colour of the solution in usually very dark red, although not always. To the left is a picture of the solution after a small amount of potassium nitrate was added.
After the potassium nitrate addition, let the solution cool to room temperature then cool it to 5 degrees in an ice bath. Once the liquid has been cooled to 5 degrees, you should have a suspension thick with picric acid crystals. On the right is a picture of the picric acid suspension after being cooled. In another beaker, add 500g of ice to 200ml of water. While stirring the ice/water, slowly add the picric acid solution. Wait 15 minutes for the picric acid to settle at the bottom of the beaker, then pour off 500ml of the liquid and add another 250ml of water. Filter the liquid through 2 coffee filters and discard the filtrate. The yellow solid left in the coffee filter is picric acid. In another beaker, bring 200ml of water to a boil. When the water starts boiling, remove it from the heat source and add the picric acid and stir for 5 minutes. Cool the picric acid solution to 5 degrees by using an ice bath and then filter off the picric acid using 2 coffee filters. Now you have reasonably pure picric acid. "
PREPARATION OF PICRIC ACID FROM ASPIRIN Picric acid can be used as a booster explosive in detonators or as an intermediate to preparing lead picrate or DDNP. MATERIAL REQUIRED: - Aspirin, 20 tablets (5 grain/tablet) - Alcohol, 95% pure - Concentrated sulfuric acid (boil battery acid until white fumes appear) - Potassium nitrate (saltpeter) - Water - Canning jar (1 pint) - Hot water bath - Paper towels (for filter) - Glass tube or rod - Glass containers - Dish (ceramic or glass) - Heat source - Cup - Teaspoon PROCEDURE: 1. Crush 20 tablets of aspirin in a glass container and work into a paste with a teaspoon of water. 2. Add approximately 1/3 - 1/2 cup (100 ml) of alcohol with stirring and filter through a paper towel into another glass container. If aspirin is pure enough (usually cheap priced aspirin are) then Steps 1, 2 and 3 can be omitted and can proceed and add crushed aspirin to Sulfuric Acid. 3. Discard the solid left on the paper and pour the liquid from the container into the dish. Evaporate the alcohol and water on a hot water bath, leaving a white powder. 4. Add this white powder to 1/3 cup (80 ml) of concentrated sulfuric acid in a canning jar. 5. Heat the jar in a simmering hot water bath for 15 minutes and remove. Stir; solution will gradually turn black. 6. Add 3 level teaspoons (15 gm) of potassium nitrate in three portions with vigorous stirring. After heating put jar in cold water and add potassium nitrate. 7. Allow the yellow-orange solution to cool to room temperature with intermittent stirring. Solution is darker than yellow-orange. 8. Pour the solution into 1-1/4 cups (300 ml) of water (cold if possible) and allow to cool. Upon pouring, solution is now yellow-orange. 9. Filter the mixture through a paper towel and wash the light yellow material (picric acid) with 1/8 cup (25 ml) of water through paper towel. Takes considerable time to filter if genuine filter paper is used. 10. Dry at 160-200 degrees F for two hours. The yield is 4.0-4.5 grams.
---
Alt
ALTERNATIVE SYNTHESIS: Picric Acid can also be produced from Phenol derivatives such as Salicylic and Acetylsalicylic acids. The procedure is exactly the same as the one outlined above, except a smaller amount of Salicyclic (0,6grams per 1mL H2SO4 and 1,5mL HNO3) our Acetylsalicylic (0,5g per 1mL H2SO4 and 1,5mL HNO3) acids are used. This is important because Acetylsalicylic acid is the active ingredient in aspirin and can be obtained by dissolving them in hot ethanol (20 500mG pills per 100mL), filtering out the buffers, and allowing the pure acid to crystallize out. The reaction than goes: H2SO4 C9H8O4 -------> C2H4O2 + C7H4O2 (The sulfuric acid breaks down the acetylsalicylic acid to acetic and salicylic acid) Or if Salicylic acid is used, C7H4O2 + H2O ---> C6H6O + CO2 (Salicylic acid with heat source converts to carbolic acid (phenol) and carbon dioxide; (in presence of water from 98% H2SO4) Or the formed phenol just sulfonates rapidly. From Phenol-4-sulfonic acid onwards the reaction proceeds as outlined above. The Nitric Acid can also be substituted by adding 15 grams Sodium Nitrate per 80mL H2SO4. With the NaNO3/H2SO4 nitrating system (H2SO4 already present) without any external cooling; the phenolsulfonic acid compound readily nitrates to a polynitro compound (2,4,6-trinitrophenol). Yet another way of preparing picric acid is by the conversion of benzene directly into picric acid in one step. This was patented by Mueller Teeters in 1948 (US pat. 2,455,322): 1g of mercuric nitrate is added to 60mL of 70% nitric acid which is than stirred and added to 23 mL of benzene. The mixture is than heated for several hours and distilled. Benzene will distill over first, then nitrobenzene, and finally a mixture of dinitrobenzene and dinitrophenol will come over slowly. The distillation is continued until these volatile organics are removed. The remaining residue is filtered while hot to remove any impurities and allowed to crystallize. the picric acid that should have crystallized can be purified by recrystallizing from hot water. Picric Acid can be used alone or in the synthesis of picrate salts such as, for example:
ALTERNATIVE SYNTHESIS:
Picric Acid can also be produced from Phenol derivatives such as Salicylic and Acetylsalicylic acids. The procedure is exactly the same as the one outlined above, except a smaller amount of Salicyclic (0,6grams per 1mL H2SO4 and 1,5mL HNO3) our Acetylsalicylic (0,5g per 1mL H2SO4 and 1,5mL HNO3) acids are used. This is important because Acetylsalicylic acid is the active ingredient in aspirin and can be obtained by dissolving them in hot ethanol (20 500mG pills per 100mL), filtering out the buffers, and allowing the pure acid to crystallize out. The reaction than goes:
H2SO4
C9H8O4 -------> C2H4O2 + C7H4O2
(The sulfuric acid breaks down the acetylsalicylic acid to acetic and salicylic acid)
Or if Salicylic acid is used,
C7H4O2 + H2O ---> C6H6O + CO2
(Salicylic acid with heat source converts to carbolic acid (phenol) and carbon dioxide; (in presence of water from 98% H2SO4)
Or the formed phenol just sulfonates rapidly. From Phenol-4-sulfonic acid onwards the reaction proceeds as outlined above.
The Nitric Acid can also be substituted by adding 15 grams Sodium Nitrate per 80mL H2SO4.
With the NaNO3/H2SO4 nitrating system (H2SO4 already present) without any external cooling; the phenolsulfonic acid
compound readily nitrates to a polynitro compound (2,4,6-trinitrophenol).
Yet another way of preparing picric acid is by the conversion of benzene directly into picric acid in one step. This was patented by Mueller Teeters in 1948 (US pat. 2,455,322): 1g of mercuric nitrate is added to 60mL of 70% nitric acid which is than stirred and added to 23 mL of benzene. The mixture is than heated for several hours and distilled. Benzene will distill over first, then nitrobenzene, and finally a mixture of dinitrobenzene and dinitrophenol will come over slowly. The distillation is continued until these volatile organics are removed. The remaining residue is filtered while hot to remove any impurities and allowed to crystallize. the picric acid that should have crystallized can be purified by recrystallizing from hot water.
Picric Acid can be used alone or in the synthesis of picrate salts such as, for example:
26 February 2011
25 February 2011
WASHINGTON — The White House made history Friday by announcing the appointment of Jeremy Bernard as the first male, and openly gay, social secretary.
“Jeremy shares our vision for the White House as the People’s House, one that celebrates our history and culture in dynamic and inclusive ways,” President Obama said in an e-mail statement. “We look forward to Jeremy continuing to showcase America’s arts and culture to our nation and the world through the many events at the White House.”
How stereotypically faggy do you have to be for this?
"Be patient, get focused," he said. "We are at war, and there are ways to deal with these clowns and take all their money."
"Defeat is not an option. "[Lorre, CBS, et al.] know what they did wrong," Sheen insisted. "They just picked the fight with the wrong guy.
"They know what they did is wrong. I expressed an opnion. I have the First Amendment behind me. I have an army marching behind me, to quote Eminem."
Read more: http://www.eonline.com/uberblog/b228075_meltdown_tour_2011_continues_charlie.html#ixzz1F253TglT
The things you own end up owning you. It's only after you lose everything that you're free to do anything. ~Fight Club movie, screenplay by Jim Uhls, directed by David Fincher, novel by Chuck Palahniuk
Fuck Martha Stewart. Martha's polishing the brass on the Titanic; it's all going down, man. ~Fight Club movie, screenplay by Jim Uhls, directed by David Fincher, novel by Chuck Palahniuk
...when deep-space exploitation ramps up, it will probably be the megatonic corporations that discover all the new planets and map them. The IBM Stellar Sphere. The Philip Morris Galaxy. Planet Denny's. Every planet will take on the corporate identity of whoever rapes it first. Budweiser World. ~Chuck Palahniuk, Fight Club, Chapter 23
Only in death are we no longer part of Project Mayhem. ~Chuck Palahniuk, Fight Club, Chapter 28
I've met God across his long walnut desk with his diplomas hanging on the wall behind him, and God asks me, "Why?" Why did I cause so much pain? Didn't I realize that each of us is a sacred, unique snowflake of special unique specialness? Can't I see how we're all manifestations of love? I look at God behind his desk, taking notes on a pad, but God's got this all wrong. We are not special. We are not crap or trash, either. We just are. We just are, and what happens just happens. And God says, "No, that's not right." Yeah. Well. Whatever. You can't teach God anything. ~Chuck Palahniuk, Fight Club, Chapter 30
We have to show these men and women freedom by enslaving them, and show them courage by frightening them. ~Chuck Palahniuk, Fight Club, Chapter 19
It used to be enough that when I came home angry and knowing that my life wasn't toeing my five-year plan, I could clean my condominium or detail my car. Someday I'd be dead without a scar and there would be a really nice condo and car. ~Chuck Palahniuk, Fight Club, Chapter 6
This was freedom. Losing all hope was freedom. ~Chuck Palahniuk, Fight Club, Chapter 2
This is your life, and it's ending one minute at a time. ~Chuck Palahniuk, Fight Club, Chapter 3
If I could wake up in a different place, at a different time, could I wake up as a different person? ~Chuck Palahniuk, Fight Club, Chapter 3
24 February 2011
Introduction:
HU-210 is structurally and pharmacologically similar to Δ9-tetrahydrocannabinol (Δ9-THC), the main active ingredient of marijuana, and it was synthesized around 1988. It was recently purported to be found in the herbal mixture "Spice", sold in European countries mainly via internet shops. HU-210 is a schedule I controlled substance in the U.S.
Licit Uses:
HU-210 is used in basic scientific research to identify cannabinoid receptors in the brain and study the mechanisms of action of Δ9-THC.
Chemistry
HU-210 [(6aR,10aR)-9-(hydroxymethyl)-6,6-dimethyl-3-(2-methyloctan-2-yl)-6a,7,10,10a-tetrahydrobenzo[c] chromen-1-ol]; (-)-11-OH-Δ8-THC-DMH; Chemical Abstract Service Number 112830-95-2) is categorized as a tetrahydrocannabinol (THC) and is similar in chemical structure to Δ9-THC,
http://www.deadiversion.usdoj.gov/drugs_concern/spice/spice_hu210.htm
Drugs and Chemicals of Concern > Spice Cannabinoid > JWH-073 |
Drugs and Chemicals of ConcernJWH-073 |
Pharmacology:
Behavioral pharmacology studies show that JWH-018 has Δ9-THC-like activity in animals. In mice, it decreases overall activity, produces analgesia, decreases body temperature and produces catalepsy. Together, these four effects are used by scientists to predict Δ9-THC-like psychoactivity in humans. JWH-018’s activity in all four tests suggests that it is likely to have THC-like psychoactive effects in humans.
In drug discrimination studies in rats, JWH-018 generalized to Δ9-THC, i.e. produced subjective effects similar to those of Δ9-THC.
In vitro studies show that JWH-018 binds to the brain cannabinoid receptor CB1 with higher affinity than Δ9-THC, suggesting that it would have the same effects as Δ9-THC in vivo.
Illicit Uses:
JWH-018 has been identified in numerous herbal products including “Spice”, “K2”, and other similar products which may be smoked for their psychoactive effects.
User Population:
The primary abusers are youth purchasing these substances from internet websites, gas stations, convenience stores, tobacco shops and head shops.
Illicit Distribution:
The System to Retrieve Drug Evidence (STRIDE) is a federal database for the seized drugs analyzed by DEA forensic laboratories and the National Forensic Laboratory System (NFLIS) is a system that collects drug analysis information from state and local forensic laboratories. These systems contain more than 500 reports of various synthetic cannabinoids in seized exhibits from over 20 states. In addition, there have been more than 1,500 reports about these drugs to Poison Control Centers nationwide as of September 2010.
Control Status:
JWH-018 is not currently controlled under the CSA. However, some of the synthetic cannabinoids and herbal products have been controlled in numerous states including Alabama, Arkansas, Georgia, Hawaii, Illinois, Iowa, Kansas, Kentucky, Louisiana, Michigan, Mississippi, Missouri, Minnesota, Oklahoma, Oregon and Tennessee.
Comments and additional information are welcomed by the Drug and Chemical Evaluation Section; Fax 202-353-1263, telephone 202-307-7183, or E-mail ODE@usdoj.gov.
KRATOM (Mitragyna speciosa korth)
(Street Names: Thang, Kakuam, Thom, Ketum, Biak)
December 2010
DEA/OD/ODE
Introduction:
Kratom, (Mitragyna speciosa korth), is a tropical tree indigenous to Thailand, Malaysia, Myanmar and other areas of South East Asia. Kratom is in the same family as the coffee tree (Rubiaceae). The tree reaches heights of 50 feet with a spread of over 15 feet.
Kratom has been used by natives of Thailand and other regions of Southeast Asia as an herbal drug for decades. Traditionally, kratom was mostly used as a stimulant by Thai and Malaysian laborers and farmers to overcome the burdens of hard work. They chewed the leaves to make them work harder and provide energy and relief from muscle strains. Kratom was also used in Southeast Asia and by Thai natives to substitute for opium when opium is not available. It has also been used to manage opioid withdrawal symptoms by chronic opioid users.
In 1943, the Thai government passed the Kratom Act 2486 that made planting of the tree illegal. In 1979, the Thai government enacted the Narcotics Act B.E. 2522, placing kratom along with marijuana in Category V of a five category classification of narcotics. Kratom remains a popular drug in Thailand. As of December 2006, kratom is the third most popular drug within southern Thailand, after methamphetamine and marijuana. It has been reported that young Thai militants drink a “4x100” kratom formula to make them “more bold and fearless and easy to control.” The two “4x100” kratom formulas are described as a mixture of a boiled kratom leaves and mosquito coils and cola or a mixture of boiled cough syrup, kratom leaves and cola served with ice. In this report it was also mentioned use of that the “4x100” formula was gaining popularity among Muslim youngsters in several districts of Yala (Southern Thailand) and was available in local coffee and tea shops.
Kratom is promoted as a legal psychoactive product on numerous websites in the U.S. On those websites, topics range from vendors listings, preparation of tea and recommended doses, to alleged medicinal uses, and user reports of drug experiences.
http://www.deadiversion.usdoj.gov/drugs_concern/kratom.htm
Oklahoma the USG, IMHO
To: "deraadt@openbsd.org"
Subject: OpenBSD Crypto Framework
Thread-Topic: OpenBSD Crypto Framework
Thread-Index: AcuZjuF6cT4gcSmqQv+Fo3/+2m80eg==
Date: Sat, 11 Dec 2010 23:55:25 +0000
Message-ID: <8d3222f9eb68474da381831a120b1023019ac034@mbx021-e2-nj-5.exch021.domain.local>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Status: RO
Hello Theo,
Long time no talk. If you will recall, a while back I was the CTO at
NETSEC and arranged funding and donations for the OpenBSD Crypto
Framework. At that same time I also did some consulting for the FBI,
for their GSA Technical Support Center, which was a cryptologic
reverse engineering project aimed at backdooring and implementing key
escrow mechanisms for smart card and other hardware-based computing
technologies.
My NDA with the FBI has recently expired, and I wanted to make you
aware of the fact that the FBI implemented a number of backdoors and
side channel key leaking mechanisms into the OCF, for the express
purpose of monitoring the site to site VPN encryption system
implemented by EOUSA, the parent organization to the FBI. Jason
Wright and several other developers were responsible for those
backdoors, and you would be well advised to review any and all code
commits by Wright as well as the other developers he worked with
originating from NETSEC.
This is also probably the reason why you lost your DARPA funding, they
more than likely caught wind of the fact that those backdoors were
present and didn't want to create any derivative products based upon
the same.
This is also why several inside FBI folks have been recently
advocating the use of OpenBSD for VPN and firewalling implementations
in virtualized environments, for example Scott Lowe is a well
respected author in virtualization circles who also happens top be on
the FBI payroll, and who has also recently published several tutorials
for the use of OpenBSD VMs in enterprise VMware vSphere deployments.
Merry Christmas...
Gregory Perry
Chief Executive Officer
GoVirtual Education
"VMware Training Products & Services"
540-645-6955 x111 (local)
866-354-7369 x111 (toll free)
540-931-9099 (mobile)
877-648-0555 (fax)
http://www.facebook.com/GregoryVPerry
http://www.facebook.com/GoVirtual
23 February 2011
22 February 2011
Read more: http://www.time.com/time/world/article/0,8599,2053198,00.html#ixzz1EkB6GO9W
21 February 2011
Read more: http://www.thefirstpost.co.uk/75400,news-comment,news-politics,how-assanges-acolytes-came-to-see-the-truth,2#ixzz1EdWKkHPA
19 February 2011
18 February 2011
Original URL: http://www.theregister.co.uk/2007/11/16/random_number_backdoor_fears/
Crypto guru warns over random number backdoor
Spooky
By John Leyden
Posted in Enterprise Security, 16th November 2007 19:19 GMT
Free whitepaper – The Register Guide to Enterprise Virtualization
A top cryptographer has expressed concern about a possible backdoor in a standard for random-number generators approved by the National Institute of Standards and Technology (NIST) this year.
Random number generators are important because the correct operation of SSL and other protocols relies on their randomness. Standards set in this area by NIST are significant because they are likely to be followed by hardware and software suppliers in much the same way that the Advanced Encryption Standard (AES), which was also approved under the auspices of the NIST, has become widely adopted.
NIST gave its seal of approval to the use of four "Deterministic Random Bit Generators" for random number generation in March, with the release of its NIST Special Publication 800-90 paper (PDF [1]). The four techniques are based on hash functions, Hash Message Authentication Codes, block ciphers and elliptic curves cryptography. All four are based on existing cryptographic primitives, generally a good idea. However, the elliptic curve method adopted by NIST, and championed by the NSA, is both slow and flawed, cryptography guru Bruce Schneier warns.
Flaws in the approach (Dual_EC_DRBG) first emerged in August at the Crypto 2007 conference when cryptographers Dan Shumow and Niels Ferguson demonstrated that two constants in the standard used to define the algorithm's elliptic curve have a relationship with a second, secret set of numbers. Anyone who had access to the second set of numbers would have a kind of skeleton key able to unlock any instance of Dual_EC_DRBG.
Shumow and Ferguson described [2] their finding as a weakness and are at pains to avoid suggestions that NIST intentionally put a back-door in the function. Schneier is less circumspect saying that the "algorithm contains a weakness that can only be described a backdoor".
"You only need to monitor one TLS internet encryption connection in order to crack the security of that protocol. If you know the secret numbers, you can completely break any instantiation of Dual_EC_DRBG," Schneier explains in an essay [3] on the subject in Wired.
"We have no way of knowing whether the NSA knows the secret numbers that break Dual_EC-DRBG... We don't know where the constants came from in the first place. We only know that whoever came up with them could have the key to this backdoor. And we know there's no way for NIST - or anyone else - to prove otherwise." ®