Page 4,260«..1020..4,2594,2604,2614,262..4,2704,280..»

UK dealer charged in US over multimillion-dollar fake Bitcoin site scam – The Guardian

Renwick Haddow is accused of duping investors into investing in a fake Bitcoin trading platform. Photograph: Benoit Tessier/Reuters

US authorities on Friday charged a British businessman with securities fraud, accusing him of deceiving investors over what turned out to be a fake trading platform for the cryptocurrency Bitcoin.

The Securities and Exchange Commission (SEC) alleged the clandestine Renwick Haddow, a UK citizen living in New York, diverted funds invested in a phoney Bitcoin site as well as from a flexible workspace firm Bar Works into accounts in Mauritius and Morocco, totalling $5m.

It said he touted experienced senior executives as behind the operations who turned out to be phantoms, and misrepresented the details and success of both companies.

Andrew Calamari, director of the SECs New York office, said: Haddow created two trendy companies and misled investors into believing that highly qualified executives were leading them to quick profitability.

In reality, Haddow controlled the companies from behind the scenes and they were far from profitable.

Bitcoin Store claimed to be an easy-to-use and secure way of holding and trading Bitcoin that had generated several million dollars in gross sales. The SEC alleged that in fact it never had any operations nor generated the gross sales it touted.

In 2015, Bitcoin Stores bank accounts allegedly received less than $250,000 in incoming transfers, none of which appear to reflect revenue from customers, the SEC said.

Haddows investors pumped more than $37m into Bar Works, which claimed to provide workspaces in old bars and restaurants, but in fact primarily sold leases coupled with sub-leases that together functioned like investment notes, the SEC said in a statement.

The commission alleged that throughout Haddow was hiding his connection to the companies given his checkered past with regulators in the UK, where he has faced similar charges for investment schemes.

According to a report in Crains, 27 investors from China filed suit in the state supreme court on 16 June seeking repayment of more than $3m invested in Bar Works, which they called a Ponzi scheme.

Another investment group filed a similar case against Bar Works in Florida in recent weeks.

Read more from the original source:
UK dealer charged in US over multimillion-dollar fake Bitcoin site scam - The Guardian

Read More..

Top 6 Adult Websites Accepting Bitcoin Payments – The Merkle

Considering how the Internet is for porn, and Bitcoin is the internet of money, it is evident BTC and adult content mix well. Quite a few adult content platforms accept Bitcoin and cryptocurrency payments, for obvious reasons. We have taken a look at some of the top platforms accepting Bitcoin to date, which can be found below. Do keep in mind there are a lot more adult content companies who accept Bitcoin, though.

Everyone who has ever browsed the internet for adult content will have come across the Livejasmin platform. The company is famous for its live webcam stream of adult content, where users can pay to interact with the streamer. Over the past decade or so, Livejasmin has become a household name in the adult content industry. The company started accepting Bitcoin payments quite some time ago, and it appears they are doing quite well since making this switch.

One of the many popular adult websites to accept Bitcoin payments goes by the name of Chaturbate. The platform has been around since 2011 and built up a solid reputation in the industry due to their live streams of erotic and pornographic performances. It is a platform where people can chat with others and have a good time, so to speak. User spend Bitcoin in the form of tips to make streamers perform specific actions. It has proven to be quite a popular business model to date, and that will not come to change anytime soon.

When the Xotika platform launched, Bitcoin community members were quite impressed. It offers everything one would expect from an adult content platform, with a large focus on live interaction with streamers. Xotika started accepting cryptocurrency payments from day one and has quickly grown to become a big player in the cryptocurrency-adult content industry. Future improvements will be made to the platform over the coming years, as the company is only just getting started, by the look of things.

Although technically not your typical adult content website, Playboy Plus is quite popular among adult content enthusiasts. The company started accepting Bitcoin payments a few years ago, thanks to the integration of BitPay services. There are multiple membership plans to choose from, which include access to HD photos and videos. It is good to see such prominent companies pay attention to Bitcoin as well.

It is not entirely surprising to see Porn.com accept Bitcoin payments. This adult content service provider feels Bitcoin has a bright future in the adult sector, thus accepting it as a payment for their premium service makes a lot of sense. Using Bitcoin as a payment method gives users access to unlimited HD streaming, no advertisements, and a very large DVD archive library. Considering how the platform offers a vast library of adult content, Bitcoin users have taken a liking to this platform for obvious reasons.

If there is one major pornographic video content creator everyone knows, it has to be Naughty America. This particular company has been around since 2001 and continues to bring quality adult content to the industry as a whole. Knowing such a major player in the industry accepts Bitcoin payments is quite significant, to say the least. Bitcoin and the adult industry create a very powerful mix, that much no one can deny.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

See the article here:
Top 6 Adult Websites Accepting Bitcoin Payments - The Merkle

Read More..

More donors give bitcoin and assets other than cash to charities – CNBC

"Donor-advised funds are a great way to give nonpublicly traded assets. Some charities will accept such assets directly, but only if they have the requisite expertise in-house," said Juan Ros, a certified financial planner and vice president for financial planning and philanthropy at Lamia Financial Group in Thousand Oaks, California.

Gifting appreciated assets comes with a double tax benefit: "Not only do you get to deduct the fair market value of the gift as a charitable deduction, but you also get to avoid paying tax on the unrealized gain of the donated property," said Chad Hamilton, a CFP in Denver who specializes in philanthropy.

For example, let's say a business owner makes a deal to sell his company and gifts shares of his stock worth $50,000 to a donor-advised fund. The business owner would avoid taxation on that $50,000 when the company is sold.

Assuming a cost basis of zero and an effective tax rate of 30 percent, a combination of long-term capital gains, state income tax and Medicare surtax, that is a long-term capital gains tax savings of $15,000, Hamilton said. Plus, that $50,000 gift is available to be claimed as a itemized charitable tax deduction.

Or let's say you want to unload bitcoin after its rapid rise this year. If you donate the bitcoin instead of selling it, you can take a charitable deduction for the fair market value on the day you give it away.

Another bonus: You'll also avoid capital gains taxes on the increase in value over time, which you would pay if you sold the bitcoin and then gave the charity the cash from the sale.

You can only deduct the fair market value if you held the bitcoin for more than a year before giving it away. If you've held it for less than a year, your deduction is limited to your cost basis, or what you paid for the digital currency, not its current value.

"Often people have appreciated assets, like stock, business interest or real estate, but they don't think of gifting those and instead just give cash," Hamilton said.

Read the rest here:
More donors give bitcoin and assets other than cash to charities - CNBC

Read More..

6 Things Quantum Computers Will Be Incredibly Useful For – Singularity Hub

Computers dont exist in a vacuum. They serve to solve problems, and the type of problems they can solve are influenced by their hardware. Graphics processors are specialized for rendering images; artificial intelligence processors for AI; and quantum computers designed forwhat?

While the power of quantum computing is impressive, it does not mean that existing software simply runs a billion times faster. Rather, quantum computers have certain types of problems which they are good at solving, and those which they arent. Below are some of the primary applications we should expect to see as this next generation of computers becomes commercially available.

A primary application for quantum computing is artificial intelligence (AI). AI is based on the principle of learning from experience, becoming more accurate as feedback is given, until the computer program appears to exhibit intelligence.

This feedback is based on calculating the probabilities for many possible choices, and so AI is an ideal candidate for quantum computation. It promises to disrupt every industry, from automotives to medicine, and its been said AI will be to the twenty-first century what electricity was to the twentieth.

For example, Lockheed Martin plans to use its D-Wave quantum computer to test autopilot software that is currently too complex for classical computers, and Google is using a quantum computer to design software that can distinguish cars from landmarks. We have already reached the point where AI is creating more AI, and so its importance will rapidly escalate.

Another example is precision modeling of molecular interactions, finding the optimum configurations for chemical reactions. Such quantum chemistry is so complex that only the simplest molecules can be analyzed by todays digital computers.

Chemical reactions are quantum in nature as they form highly entangled quantum superposition states. But fully-developed quantum computers would not have any difficulty evaluating even the most complex processes.

Google has already made forays in this field by simulating the energy of hydrogen molecules. The implication of this is more efficient products, from solar cells to pharmaceutical drugs, and especially fertilizer production; since fertilizer accounts for 2 percent of global energy usage, the consequences for energy and the environment would be profound.

Most online security currently depends on the difficulty of factoring large numbers into primes. While this can presently be accomplished by using digital computers to search through every possible factor, the immense time required makes cracking the code expensive and impractical.

Quantum computers can perform such factoring exponentially more efficiently than digital computers, meaning such security methods will soon become obsolete. New cryptography methods are being developed, though it may take time: in August 2015 the NSA began introducing a list of quantum-resistant cryptography methods that would resist quantum computers, and in April 2016 the National Institute of Standards and Technology began a public evaluation process lasting four to six years.

There are also promising quantum encryption methods being developed using the one-way nature of quantum entanglement. City-wide networks have already been demonstrated in several countries, and Chinese scientists recently announced they successfully sent entangled photons from an orbiting quantum satellite to three separate base stations back on Earth.

Modern markets are some of the most complicated systems in existence. While we have developed increasingly scientific and mathematical tools to address this, it still suffers from one major difference between other scientific fields: theres no controlled setting in which to run experiments.

To solve this, investors and analysts have turned to quantum computing. One immediate advantage is that the randomness inherent to quantum computers is congruent to the stochastic nature of financial markets. Investors often wish to evaluate the distribution of outcomes under an extremely large number of scenarios generated at random.

Another advantage quantum offers is that financial operations such as arbitrage may require many path-dependent steps, the number of possibilities quickly outpacing the capacity of a digital computer.

NOAA Chief Economist Rodney F. Weiher claims(PowerPoint file)that nearly 30 percent of the US GDP ($6 trillion) is directly or indirectly affected by weather, impacting food production, transportation, and retail trade, among others. The ability to better predict the weather would have enormous benefit to many fields, not to mention more time to take cover from disasters.

While this has long been a goal of scientists, the equations governing such processes contain many, many variables, making classical simulation lengthy. As quantum researcher Seth Lloyd pointed out, Using a classical computer to perform such analysis might take longer than it takes the actual weather to evolve! This motivated Lloyd and colleagues at MIT to show that the equations governing the weather possess a hidden wave nature which are amenable to solution by a quantum computer.

Director of engineering at Google Hartmut Neven also noted that quantum computers could help build better climate models that could give us more insight into how humans are influencing the environment. These models are what we build our estimates of future warming on, and help us determine what steps need to be taken now to prevent disasters.

The United Kingdoms national weather service Met Office has already begun investing in such innovation to meet the power and scalability demands theyll be facing in the 2020-plus timeframe, and released a report on its own requirements for exascale computing.

Coming full circle, a final application of this exciting new physics might be studying exciting new physics. Models of particle physics are often extraordinarily complex, confounding pen-and-paper solutions and requiring vast amounts of computing time for numerical simulation. This makes them ideal for quantum computation, and researchers have already been taking advantage of this.

Researchers at the University of Innsbruck and the Institute for Quantum Optics and Quantum Information (IQOQI) recently used a programmable quantum system to perform such a simulation. Published in Nature, the team used a simple version of quantum computer in which ions performed logical operations, the basic steps in any computer calculation. This simulation showed excellent agreement compared toactual experiments of the physics described.

These two approaches complement one another perfectly, says theoretical physicist Peter Zoller. We cannot replace the experiments that are done with particle colliders. However, by developing quantum simulators, we may be able to understand these experiments better one day.

Investors are now scrambling to insert themselves into the quantum computing ecosystem, and its not just the computer industry: banks, aerospace companies, and cybersecurity firms are among those taking advantage of the computational revolution.

While quantum computing is already impacting the fields listed above, the list is by no means exhaustive, and thats the most exciting part. As with all new technology, presently unimaginable applications will be developed as the hardware continues to evolve and create new opportunities.

Image Credit:IQOQI Innsbruck/Harald Ritsch

Read more:
6 Things Quantum Computers Will Be Incredibly Useful For - Singularity Hub

Read More..

Qudits: The Real Future of Quantum Computing? – IEEE Spectrum – IEEE Spectrum

Photo: INRS University Scientists have built a microchip that can generate two entangled qudits each with 10 states, for 100 dimensions total, more than what six entangled qubits could generate.

Instead of creating quantum computers based on qubits that can each adopt only two possible options, scientists have now developed a microchip that can generate qudits that can each assume 10 or more states, potentially opening up a new way to creating incredibly powerful quantum computers, a new study finds.

Classical computers switch transistors either on or off to symbolize data as ones and zeroes. In contrast, quantum computers use quantum bits, or qubitsthat, because of the bizarre nature of quantum physics, can be in a state ofsuperpositionwhere they simultaneously act as both 1 and 0.

The superpositions that qubits can adopt let them each help perform two calculations at once. If two qubitsare quantum-mechanically linked, orentangled,they can help perform four calculations simultaneously; three qubits, eight calculations; and so on. As a result, aquantum computer with 300 qubits could perform more calculations in an instant than there are atoms in the known universe, solving certain problems much faster than classical computers. However, superpositions are extraordinarily fragile, making it difficult to work with multiple qubits.

Most attempts at building practical quantum computers rely on particles that serve as qubits. However, scientists have long known that they could in principle use quditswith more than two states simultaneously. In principle, a quantum computer with two 32-state qudits, for example, would be able to perform as many operations as 10 qubits while skipping the challenges inherent with working with 10 qubits together.

Researchers used the setup pictured above to create, manipulate, and detect qudits. The experiment starts when a laser fires pulses of light into a micro-ring resonator, which in turn emits entangled pairs of photons.Because the ring has multiple resonances, the photons have optical spectrumswitha set of evenly spaced frequencies(red and blue peaks), a process known as spontaneous four-wave mixing (SFWM).The researchers were able to use each of thefrequencies to encode information, which means the photons act asqudits.Each quditis in a superposition of 10 possible states, extending the usual binary alphabet (0 and 1) of quantum bits.The researchers also showed they could perform basic gate operations on the qudits using optical filters and modulators, and then detect the results using single-photon counters.

Now scientists have for the first time created a microchip that can generate two entangled qudits each with 10 states, for 100 dimensions total, more than what six entangled qubits could generate. We have now achieved the compact and easy generation of high-dimensional quantum states, says study co-lead author Michael Kues, a quantum optics researcher at Canadas National Institute of Scientific Research, or INRS,its French acronym,in Varennes, Quebec.

The researchers developed a photonic chip fabricated using techniques similar to ones used for integrated circuits. A laser fires pulses of light into a micro-ring resonator, a 270-micrometer-diameter circle etched onto silica glass, which in turn emits entangled pairs of photons. Each photon is in a superposition of 10 possible wavelengths or colors.

For example, a high-dimensional photon can be red and yellow and green and blue, although the photons used here were in the infrared wavelength range, Kues says. Specifically, one photon from each pair spanned wavelengths from 1534 to 1550 nanometers, while the other spanned from 1550 to 1566 nanometers.

Using commercial off-the-shelf telecommunications components, the researchers showed they could manipulate these entangled photons. The basic capabilities they show are really what you need to do universal quantum computation, says quantum optics researcher Joseph Lukens at Oak Ridge National Laboratory, in Tennessee, who did not take part in this research. Its pretty exciting stuff.

In addition, by sending the entangled photons through a 24.2-kilometer-long optical fiber telecommunications system, the researchers showed that entanglement was preserved over large distances. This could prove useful for nigh-unhackable quantum communications applications, the researchers say.

What I think is amazing about our system is that it can be created using components that are out on the market, whereas other quantum computer technologies need state-of-the-art cryogenics, state-of-the-art superconductors, state-of-the-art magnets, saysstudy co-senior authorRoberto Morandotti, a physicistatINRSin Varennes. The fact that we use basic telecommunications components to access and control these states means that a lot of researchers could explore this area as well.

The scientists noted that current state-of-the-art components could conceivably generate entangled pairs of 96-state qudits, corresponding to more dimensions than 13 qubits. Conceptually, in principle, I dont see a limit to the number of states of qudits right now, Lukens, from Oak Ridge,says. I do think a 96-by-96-dimensional system is fairly reasonable, and achievable in the near future.

But he adds that several components of the experiment were not on the microchips, such as the programmable filters and phase modulators, which led to photon loss. Kues says that integrating such components with the rest of the chips and optimizing their micro-ring resonator would help reduce such losses to make their system more practical for use.

The next big challenge we will have to solve is to use our system for quantum computation and quantum communications applications, Kues says. While this will take some additional years, it is the final step required to achieve systems that can outperform classical computers and communications.

The scientists detailed their findings in the latest issue of the journal Nature.

IEEE Spectrums general technology blog, featuring news, analysis, and opinions about engineering, consumer electronics, and technology and society, from the editorial staff and freelance contributors.

Sign up for the Tech Alert newsletter and receive ground-breaking technology and science news from IEEE Spectrum every Thursday.

Connected quantum dots may form the building blocks of a solid-state quantum computer1Aug2004

A startup challenging Google and IBM sees opportunities for quantum computing in both the short term and long run 26Jun

By the end of 2017, Google hopes to make a 49-qubit chip that will prove quantum computers can beat classical machines 24May

Control of nuclear spin is key to a practical silicon quantum computer 18Apr2013

Freeing processors from doing the grunt work of communications accelerated the connected world 30Jun

Reading listings on the bulletin-board system was free, but posting cost a quarter 29Jun

HAX executives preview trends in hardware startups 26Jun

The massive 1 billion project has shifted focus from simulation to informatics 21Jun

Personalized medicine, self-driving cars, big data, AI, and machine learning will mainstream supercomputing 21Jun

For the first time since 1996, the U.S. holds none of the world's top three supercomputers. An upgraded Swiss machine takes third 19Jun

Silicon Valleys top employers made big staffing changes, according to Silicon Valley Business Journal 15Jun

Neuroscience will give us what weve sought for decades: computers that think like we do 2Jun

Why the merger of the Raspberry Pi and CoderDojo foundations makes senseand why it doesnt 2Jun

Large-scale brainlike systems are possible with existing technologyif were willing to spend themoney 1Jun

Massive efforts to better understand the human brain will deliver on the original promise of computer science: machines that think like us 31May

Modeling computers after the brain could revolutionize robotics and big data 31May

Researchers in this specialized field have hitched their wagon to deep learnings star 29May

Artificial intelligence might endow some computers with self-awareness. Heres how wed know 25May

Fujitsus new cooling system promises easy server maintenance while using less power and taking up less space 18May

Scott Borg, director of the U.S. Cyber Consequences Unit, says hardware design engineers hold the future of cybersecurity in their hands 15May

Link:
Qudits: The Real Future of Quantum Computing? - IEEE Spectrum - IEEE Spectrum

Read More..

Quantum Computing Becomes More Accessible – Scientific American

Quantum computing has captured imaginations for almost 50 years. The reason is simple: it offers a path to solving problems that could never be answered with classical machines. Examples include simulating chemistry exactly to develop new molecules and materials and solving complex optimization problems, which seek the best solution from among many possible alternatives. Every industry has a need for optimization, which is one reason this technology has so much disruptive potential.

Until recently, access to nascent quantum computers was restricted to specialists in a few labs around the world. But progress over the past several years has enabled the construction of the worlds first prototype systems that can finally test out ideas, algorithms and other techniques that until now were strictly theoretical.

Quantum computers tackle problems by harnessing the power of quantum mechanics. Rather than considering each possible solution one at a time, as a classical machine would, they behave in ways that cannot be explained with classical analogies. They start out in a quantum superposition of all possible solutions, and then they use entanglement and quantum interference to home in on the correct answerprocesses that we do not observe in our everyday lives. The promise they offer, however, comes at the cost of them being difficult to build. A popular design requires superconducting materials (kept 100 times colder than outer space), exquisite control over delicate quantum states and shielding for the processor to keep out even a single stray ray of light.

Existing machines are still too small to fully solve problems more complex than supercomputers can handle today. Nevertheless, tremendous progress has been made. Algorithms have been developed that will run faster on a quantum machine. Techniques now exist that prolong coherence (the lifetime of quantum information) in superconducting quantum bits by a factor of more than 100 compared with 10 years ago. We can now measure the most important kinds of quantum errors. And in 2016 IBM provided the public access to the first quantum computer in the cloudthe IBM Q experiencewith a graphical interface for programming it and now an interface based on the popular programming language Python. Opening this system to the world has fueled innovations that are vital for this technology to progress, and to date more than 20 academic papers have been published using this tool. The field is expanding dramatically. Academic research groups and more than 50 start-ups and large corporations worldwide are focused on making quantum computing a reality.

With these technological advancements and a machine at anyones fingertips, now is the time for getting quantum ready. People can begin to figure out what they would do if machines existed today that could solve new problems. And many quantum computing guides are available online to help them get started.

There are still many obstacles. Coherence times must improve, quantum error rates must decrease, and eventually, we must mitigate or correct the errors that do occur. Researchers will continue to drive innovations in both the hardware and software. Investigators disagree, however, over which criteria should determine when quantum computing has achieved technological maturity. Some have proposed a standard defined by the ability to perform a scientific measurement so obscure that it is not easily explained to a general audience. I and others disagree, arguing that quantum computing will not have emerged as a technology until it can solve problems that have commercial, intellectual and societal importance. The good news is, that day is finally within our sights.

See more here:
Quantum Computing Becomes More Accessible - Scientific American

Read More..

Google to Achieve "Supremacy" in Quantum Computing by the End of 2017 – Big Think

In theory, quantum computers could be vastly superior to regular or classical computers in performing certain kinds of tasks, but its been hard to build one. Already a leader in this field, Google is now testing its most powerful quantum chip yet,a 20-qubit processor,which the company looks to more than double in power to 49 qubits by the end of 2017.

Google's qubit devices are built on integrated circuits and can perform calculations using the physics of quantum mechanics.Qubits(or quantum bits) are units of quantum information that can be a mix of 0 and 1at the same time,making them better suited than classical bits for encoding large amounts of data.

Last year, Google actually released a plan on how it will achieve what it called quantum supremacy - getting quantum computers to do something the classical computers cannot, like factoring very large numbers. The paper says that if the processors manage to get to 50 qubits, quantum supremacy would be possible.

One big issue for Google to resolve - figuring out how to simulate what randomly arranged quantum circuits would do. Even a small difference in input into such a system would produce extremely different outputs, requiring a great amount of computing power that doesnt currently exist.

Theyre doing a quantum version of chaos, is how Simon Devitt from the RIKEN Center for Emergent Matter Science in Japan described Googles challenge. The output is essentially random, so you have to compute everything.

Computational difficulties aside, Google and other companies like IBM are moving along quicker than expected in their development. While they figured out the science necessary to create the qubits, the next challenges lie in scaling down their systems and reducing error rates.

The engineer Alan Ho from Googles quantum AI lab revealed that his teams current 20-qubit system has the error measure also known as two-qubit fidelity of 99.5%. The goal for the 49-qubit system would be to reach 99.7% fidelity.

It might take until 2027 until we get error-free quantum computers, according to Ho, meaning that usable devices are still some time away.

For more on how quantum computing works, check out this video:

Visit link:
Google to Achieve "Supremacy" in Quantum Computing by the End of 2017 - Big Think

Read More..

The Encryption Debate Should End Right Now – WIRED

nXF0V1K1[+>0Y]GJ$S!@BG&XFa@1"T ]ymC'GwA.5w2Xo=P Ja?t~1WQ!W@eqV+))n6f&1b)wfJjESXkKpeXj> >2R/L $dB(F~cO4? )i3gl2XckE#Jup*I[_i lHz 6eZYEYe9)thO&|?N35sC'_iW%BoZ+FAUI(k21tBW9T:+T.|{b7Tjzs,Vr3,#25/63:]Hnd9?*aUH^tYoRFW'Ob%kd)-7+mKQh'O@YgWezf[MA, {8CnXBl4lQG.HJnk/x%FE Y= Q0z @cP8B683+1E_fbv[sRW*bbyfD:_wCL9'zbvED"ZCx4c6N/>W&h X[_;'AnO9b>#>@l.WPletz*37I2{b&Xp?cFe|_Si"}5f^-{Y5pNoaBuAZwd;ckd13.oA^X=QZg'1!'~{qt07"YB58^Nq|+/^2yTU(0I;oK,+E@-^vE%2|{4dBpw%/0FoBzGCd&s9L.-1+_$I3"7@3qLo&Z`0-M$ #*" D3,C*3N8"0>Q]Hx!KRc,Nr/PvE+/Db0h,_bQz{1E,gK9Ym t)C?lC=8yc 6!.(%BCE7' Luk^vY9[VFvE1 W:EGJXid%@KxL$ou})W*.}Ay_LU,^4".V;"5DdvOxBGxs&8iXyTJ3w8!:TMGl}`Zg~p83>z]5R}*bApIaLf!6}*gv7VUMQ}^!]jTDh*$RH! [{]u"ND|?j-d(a}N))$]yC|N n~O (H296t,[H4S3kM8Dd' .MIfL2c (?{o-hGYb$+EIX Fjp%1 PY?HyeE;KP=d:VPqw8Us |^B12kU]W'X4*D%h VkBXL}]=(?|cZ7Ki&=Q{xvu)>. +*:F[5tO:u^#3UX*1hPdQ:z+8BU6s%mlN96# |Tn[BQ &$5#Fn8hL/!2WBQ.u`Gixh0&Bs@V4ye,i'[wDs01sc2=)d|Et:1G2,sT2:i49k;zSe7]4fHvBcv)V%XY**^ 3#]9l) C$fICW?"+k^q&'pz @` T*ny?D|.T2%[?vJrmv#T R{'gX,lO$Vr)k,&If_^$V6vO1uzUvu_3bj]ZwQ@MTDt#D%]l'4p[SBljaGYC2/)^(E/zHX,ZHLs6>^P,S' m)[eK]Ok 7isPnO,jl(tu^@QHAyC*5PRc'[1Tq#%sH%X6Af,/dS/X]K @ V0LeNWQ4z7}VsD% sTByqI>tU(W`Mz@cD`=HR eAt=xjZHpaOg0s &Y)yo@NcKdoe%;n'$;GPL9T?$?pPJuFZJMpAGs;@>DSC',.zLSi~VG-q-#}E$2d%96nARA"dgUq .wT fMC ,W@9k)6Q E9es} E:SiC),(]Am Lqn&lTqj.g2C J=(sj-ZcRQ!ws3:&rrb*U]TK+"hZ3Tpysiyse%'[@T.[p$34&>!OtbAGUbEgJ?u%TDbZ.psp8aOB~hc)>+FTy8Uw~g3]XT=/+GQZGqZx,znzCUtTX*U.Qz5qq*L}Y^ykU1 pC~=-:SX}xbZ|}:To:s uY+I=-+9^s|M,esk-6K4(g;M|K,uxXZvr.-"{/.2 $(T!Z dCN?Ku{Cx"5o3jJ{izdG[#_NY/J.5=^w?q 7;4u0;"sd1688.6 ;?_eo4qD>ICv9w*vam0Q9Tq67PytstUxw?OH f_[5h~7kV4XkyXkR~RM`{WHmnW#B|qq1tX]tH[d~:IF]+d.sN%S "0=e:jKU:|_j>C2,+'$^/'f]>8jo^@M A0_~ArRk'j $/T3&2ku d2vrBHjH.a}yEK` 'V +7P]qjUCo!p 2V*h* U[WK/ =?tjlW3FXZ3=>Euse+v4q])9ENS;EvUN~k>izu[gw:O_G|hdUh.[&!O qzUfv FJByeMfky'7zW

"v4`;dlxSHk xgiZObO:lcTfMNj7]DsF3 W!sN*|+'5&mn}5NkK@z$M|&4Dvz]5LZ##RLbgD385y rn>pUq>SLm$HbmAax>=j}77'#!8m-cWD({c}%kmc,z[PHsm^K^KC`/S{lCVWN!Y]ozs8:;layj&cNDO+,{6vwjn*JDR':xo1>=,PM&:J{2v='0Ud$&Wo0a9 G_[Yuvwi{7@[H _ {Cn+3igE=,W&E %S~7/@#>V`c?wk/g0:u@-6WGgykDAh*9N^LTRQ~1FO?;~~79Jp7J=N?OAoF3~G4pzmlGol76h2lY ~[ zg#[f`^>56x^'^Qpp4'x,'Q}-Y}cNU;dk.2}*W$9##NvTwO!HtlP<_>L.SGtX(3Ow'=%ZLwMea~@)8q|4/!=j_y1J@FwYU]u}#>Qo /I7!FO&_3% 6PW39pP`o2U&"G I2Qy+>| +"53 `4fNLP2$mZ]FA(Iy%Df_$R,"e-88#?W5yJG.-E1EJ!/e@(Lo'U1kd(tgHQY _KWm[A+)4rj3`l`-xr{!l$C0.I(VH!RCHgOF{ub0p'gLhd, s(7GOH; F&C%4t@..@2)

!8N'*Dr-Q"=-@4=G%4kd8-Wz0=i!&68Uu x7v#,IR+#Wj;U%1OdP"R" +pa,f'8BFR6das2ZSc#0:"shvi+xGRT;)i`RXY,>#[zcy",m$6DndKm8Ge!=Xh!tgW##0]hKnotro|O}~?},.O>=iv6/7 _Pz(uqUl mO%X-[bmTppn r%&qDP6lFsj^Uh=SAhqa09~u.vMk4UI "'T}7T7mGGuPI@uvGuo`N*TRoxW,rqRdD(N-7,;z`D FJhv5OrkfMlwO)T_r$W"7nV #V="Ir~Rs,1.W^xX(Zde(a"u4M"3fc*1Z>*kiZF2|PB(iAyzlXN k G(2Q)x-U4c3{?Sn4ZqbXZ&/Crb6O7978J.3f8u18 sML"f3v!YdLh%|%tw9-^yA){69K(@2RuCJL'~o>9 2=dEd5 V-D 8_r%@b.8]n0Q3l/RvRC"Y%-+ta rM- [X[Z5IFydbH%V S`+Wgm}{G::lFKHBCL99:pMJ+e'dR*%QftTVM!;20X*v.3v]:d@FS=&Z}=o!KN*)Qu:2 >5a(HY"gQpnWZLK,im;tnyH &QTL2)ot~:_0cC Vx4TU!!W(LaMt#+!(G> 18Jh] K'J[YSnhJ6Lm2T%MZPJeQe[f D!DU$e7X{U]a49(2^?;c *Hf!l!E/Xar-[)Za*kN3uX@Wh1tQX,j%b1Dj;]:80v9|6vf`$H>B51sey7wO*',z@ v}:b^@^4;XlJ?B*ABjN?M"(T=K}mnt"E+*op^-sJ:9(5(>6D0CJ@oddi .60q%zUOF`v!wvE}`0p-y#S &AG,Q'5_rLW}e!eQN,~"k`]S&4 JkO *ZIb kkku|uj/%WnT c>=L7 (Tf!fMXR)VGadb7cVU > 9J6XBZ3T.tNSMfb+mK?!OVTg|AP7Vk~[(OuujN4Hf}yA('>NK6$b8"lXoZ &D[n`vTxsk P #IZ+]"+~r9QUj . zCTPKcUuv?#lmS6wYILaTm zh^nP>?c7q ~'_z~Ej6|K^RhC' no_0k*D=1"gb*AV[^$$vzJ99hl:'^co v*q 7woJ]l^4;Zf]NWuqo0a]6zv$}8y]uu]Q9&VDAv{g{FUWVQX^|4lz^~~ww,7~W2PV+Pw/>EH;y")BzXt9Y>~db:T*oKay~NOWnxC]ClST%8c}.^Rf~'8AF-W:}x/~C[{/eoxBMAEX=8v{Qtw{PtE;q;iUd(v{UmU|OfM8?Nn!3/|b*[mn:650GOn%L,QL^oxSFB)qA)W-fK!lHg Mhzlqwu/{)kdydz|U*Il;#6L&Nw>}jomU%$M=u!yc''lg$to.xLn8koy P$-8i1up&IsmipdT7ugOs|qGWW9xugm|Uy|4">2>XJ0Uoe!Thzxd1m-=smvgXIEd[`>Pw*;*%;! ^_!S9EO$mW7F6in/l606`*5l5M}n|a=g> z/7lzSpba[1{*6_W(h{uahBZ.%F=ox3`7F}.p&0~6GzN#^3A =1x_^^=u{5{S{HQ#[g~n25 |HN:G`K+]#jKjuFEI-J17%iJ{K nO{DMAj%j6G{Oss]Ipy~~k2bAqO8,.^OQwi&co^dM.# L2wrahum^'{L;w,-gsb[WNYnb%rC9[ Zs.#,X_/9oS`S j";~,Ly)T&x"*$gdt~hD6+SD/2J/N9WZaeIP'( TE"E'h%h } 3:4DO{#OajC>s9$VFn=XME&'q:Sja%Auq8MT/d|^40i+/"tmtA=;P2v| dJ4~"'H3.j~#../9% 2RW$xe^D3[yB|cqF:ZwFJR~jQ=Gb:iL[H+8pi 2p2-0|"inC&`nJ/9&J+mm*+1Q[*kZ^A)XF=s`I4zJh?I{@{IM3/A2: =T/2#KuhuG1fTJ &Mx4 9)*I'By'H=2NdQrUTFP(1$3A{WXb>HufIs`E3!R,I+vW7q9@J$UL;"Q&Vu*41'$"H%izOCMYVh*n]aQ.J$/'rkr+ F#QS:/`.K*n/q97&!YirUia*tO1@mKq@/T6s DA$T#KMKhd7ln)k&d'"('2b&UCr+[$Yk,CSYHq#l 0:;u+d.wKwDzbL4x"&IK?8+C?8IG"Ei.YiCXHB7#u~46US9 /I2N@jBSmDz]& MtF-^"HrBi?+!D i`3cuOMI~{pq Rde;m2`^uMS"/hAQ/{+f ^(70?xhrskC2 RX,y:%r&"q;' ) vb*Z_;U(XKX"Bc Did grkUl*Fb2TyuKQgU}S$*T5I;&Z,P1q]x9:[:jF_rXe%P^h y>Fvjd(hX*~ME&Oz v Q'MP*]-(!0q&?-g 2b8 vVZ$HbY;P8EmI,efq^Q1f& DsjrC9E.0=B{(bT9B >Xe@`b 59~1M> D!&*D"NS'[%|HmVA.,zImf%?bW(qgn~G(ZH}U52S!8c*JZ`MI/-z ;8G O:WtaV1Q a&fn'u1#B A+12`2qN6&s-(=`c[TH4jf$MvrPk=khE3V1r]f T+DffuKqngTL`_^P*C!'*7&I4)U5R&Ixq|RY>m%U;5=KBr=1^^.Qx}H/`)/rzhx_)_.8^(Zv : ;D u68f8j+ S qauQY![z9nM_kO82J0u&,=z":,DBZ{f:5D3b:nU8CNmZS;$ Rg!t!6lF OptTIiQE

I6TtItItI.rF;gjw]|cOA lKLH.a}yEU7z/"6#S[i)U4,|-_SWm_ib5WaYWK/ b&1O$`e|un{N]ou[~t_7:{_zvy6/,5;NwQYhjFKvV]]oTx/U7n#~&>o353{;89EJ (=(eU{-on-oe'B;9Tp+7svVv}&n9 W^2..sfTHM@.7v-}JR5TEt$bo;m.[Jl pk {o/Tr4vw>X3}q2EyDU|OjLk,d}/y kai&_fXyNH/ =I>R!w@VM2-xBwh@xl{.bWM9 9P1nl+Ug^CfS7D|6:}-'ws;nvev}~ayujM=u!ys'yghY?)!2kmNZhf4z xj=>*zSIHixC7(AjH t{7O`%MmW.$iQ]E{yJl?i2R7xmAo:^vBHFp4 /|k'nix:{:{:{:H=N`3SSS'ZN&-NNNo>===)o,[-=OqS?^|[QS>O9Oq)|NqS>Oqo@u^!_2!XSeC_xNp4nGc53iF2+*,x6C=|Zbgkr+ndob6Fc"ii]6F ='0UMs`8"7*[[*.2#g L^h;/_[yk A=(NTX&B`SQD"x2_$HG 2i9V$!]L0]aN>Pkk!JG$(MA1)DI!8$7/$|b 1/P!gi/N3]/ux2gW.uNG}lzQ8lgV| }vO)T;1>."2c)/W/b~.? dz %!w)rt5PZB%efXf*4C@`T{Ep'1j3%|0B=`G_|$/FtQ8Ogw$[`!"H vagk(M1~(*wiN3!g f.hrvix Z yT7qh"X!aBs+x){khDy($Fhwt@I=I NI@/!8oHd52^_)IwL=D1:K=n6t7YF s|;[u|ya:5?Ft-=>K#g~1(b0s)r 61p^V;rgTcC^_]tDISKmu'SoL?,);$T|""8.&"|>v+ {s[Oj&v#xtB]jW-=i?hF#iu2Gu"j,[VYM:JNi:l}'0(LmLPr-YE)Gd_Ku:8`{Gu;R_&Gny}xT'xf3o4)M'*&Q{thFobyft`F6qx=>/eFo*za3e fXvR[:ftcMyy=f{y%!OV{{7M>k=N7Nnn|U?Z ry695`k:Y|livYV|nO:^As5:cz5}(KiU/PT(K@)KieR^e,Ai*A}*Ayq W3M6&O}r]&{{pWG-7kdIm&[{_vqj}`rXFrSZmS}F6aB7KMULce| g-}G6w0P$ 7{`vKBcGq1}*UkXQ{O7YT[(2xAf?x)%s(RfBft5:xEKs?!|)vm"i#iL|nd&2i4 h?%O~}X?_k3pD$8=%DL?/Y`LPOs1@m{}$Bb)u=@|MDP=FV=y@6({@iY

Z7z4w>z[DK10!TLax,[G/~z{mHa%Ds!XLBYapD}!tflYO&J 9,5K KQHkihD2Hiss)b:8"Yr$0t(A $Eexbik,WjN:x/|mu(L~`QB^nI*1W&p_j+O"Y;'1+V{LM DNuQ9p0EZd6.Y$BB?K*-i-3CEVC Rvl 5?|~ZzyZM$%wXZ.w@`;g[ pF:h'| 0~uAWXJY2|x KT8r)WvE+9koDMSl*@Q_tTxM, I)Jch]r.DmM9c'cTlC:A"/0oqfE(]{?'x eWf05+>2/_pe7>^4Lzz^='ra^fbFPQ)geXp[h[Sz:Czp^#X#3UZ@ub1^'K_*id /e#p;c%oQ7HB f'CZI ej`(pz3tB`]f[^3qqG&BctKY2uXY**(J-v%,H4s"'~2Q+AH%zjR(6!1.fM",c6br#4M@^@}hI7W[y'7b/Tr'c#A G=?Dt%8De8vVH6Vr&h8ysX !_l%gk9Ut3v#E1KEX-Xm9xL!5:0^UHT a"09K0>"iFyl }@`I Ne8J0jem^{yCwaDoK8sG>3dxA:xOFXS%&+|^HM0}5,1^:v" 6Pm=^ ,kCMXJ)sP $qGGp?9b.(g Yb]6?@+na23 Q"$[De3]q$ji7;4Y:j#2631oe4+IP}vUZX8V2(4-Q D0EH#,+zU/&V^2jc3da~NQdONF"AVxUMDDV-*E M '8*nhkBPD6)PmN XUA@-JKd`.J}dmI]"UEe+mN3Q8Q"I0EYs%z g.Dz_Tp z^I?UaVJ%'bMOBp00Knz'&sBJtD5+y,|!2(/!q*kRqt3KN"> 62 {h19 5 3tQ#'H2*?O tO(8Icy 6s}OWFuN0CcaL[jEQ03i:5E5P$0KP5LbaseyZk*6I BG3V"S 2WLf2VS?9.BKU $v;g7>t|&/vPFTT9k)6Pcg^k^SKQ$BQ`lqb6t*L8U5Tjm&;oP afKs=pjiIfe-@b1uZE?-VL73-Pt KT=[fOSi) M!/'WmD &kX=NX*K8q~{N;z~H{4]mDy^k{8pkywDayxmmv >}>{ogwx}Vw.pGd[v9zG[fd{;r(g7kN@D!vxtyrO-ewHQ[H$L%SJ W4=.NZ&b. Uz2=ojFS,TsOZ9j*n?{~-=In_ZGk ?Dkf7?Fxl4DF+#2"=2v@uAv8`@~zPo=jjs( LUw;=C5d.FE;HVKBMJ}G;Iv9sls{T-~UD^}[n8C~i0}S?exBU'=wUaO0u$%u,X'i--U.oz|.4^gO.z^LC =Jx:r;#9 6NU}HANF;A{_jp'&5&6=Jf%K ,0WXpm[h57l1A%=!1q (rn|]pC@h(.bhoxQBojIR7[S7 v*"uYRe}(%seiH>V.s9CS{Pab8o}=mCz['b#[Hy+}m?v^|ON3iYM}H8n+'AE3.79fpj yl"Q3H$$:*Pkq];zYXewRQR`RgJ%i. m3s/p2^uq@ EVD;/ozr]~W5~wf/I'n_^AmO|^-m6lE|i1 _N2kZX@'cvK[XKO1 ,5oI/2exv:+bg-9EAQRX T^vhc7`76(rm~t..Mg>76xY4+%w+y)sR^llzCCg:>4WWFFg ]A>L].L$C(0&QZXkcMJ,WV{F(ge=H OL/ot#TTDv;9m=~UhJjPcr0b9>U5 !eMoHuoo1yXIc}4A5dR, ?.=a>29*"URI|-I0,ZnMz%~={*v;fS-7*k]z}@Nbf+e*x]U-~:g}88/"Rgvk5#+_5ps"%6$5J.6wQ1I7aEr dn,1cbh.-Z$)})J%ew* m]E%485v > b7sz50% s  a 58VI/w^N=;?l1>8w {9Ge~{&"E " 5Dt[]:cRJ$ BSvdFzH*_ij&~"X4SK,"`@QjI#~iM|@[ ql rlAp*H1QYf_=TmE$b86ct3oYzSjN B"q%)iA8;V3Oe@}*%-jlK"Xqgx%%1G9L X=5yD@qbMD#k'+JbqWT $}1_~,NwALr9{H`ZH$#)RDL'MKI4G6V; 0 c^$W q?AJfP3>X,'b7Z3h[{he$)rXaLuCgBxX?SviHb`m^Z@]-}wX+]^Y JxrJrRP&@n o1TlKf2Zxs~8,{`S 6[0~>/S.;RZ"664(}4Ay%qsz= V%~%01"oU4|J1#}.&GSH4Cx-jebZ>_k72nwOz.OS48yrAF>O*4ZSA0 %: 5*#tA@V|x+z{sP7T2V Rb8s@)`JxzM,+ |,+6*DQ8 Po.h1^`N-JiB[h^dqfcP6K9`ky>~HH}4u%xJWt/iYlhRR))S=,~F:w13:|ehD(fS*z 'MkQ@p@,Iz_(4Rr$(R'vg> rps qa Hq%3HCO0|& ~LCLk"-N7YrW]2' %>A)#h. TO]&>57?ffd(2tJ#]t$jQ#1M ^Y`-vv>6wQl;#,pv0Ixt(g5Y?D$aGx~'Q:"=O)4 }2f`I6d6eW}9M}I`5~ZI@U1~bTgO9K@GQ`r"HmL [.KlgqbY DZuR0 x&fNx(7dHZ7Q+idyg>XGoqlB?.2uU~>4~xMaYFARVr7(;Ix?NuRAHi&l@y;TLg.SQ3puU3KHe0D`K*"z@ S_P::.1Da*)q1~ QJ`I7EwfUNTi*coT-N'BVI"1Pa7=5krC|V(5z;[GUp/|?lp se`B ]l/;Eq}:Q 3YX"xF(W9W^{20{.n@~C/JYLY&Z+$(F*#AQ:P9H*S1'(T2ZaHt9Vt-4=## N,Yotdv0NZK&M)P3i`L*: TR:>

FV$"9[3J1[h%"(&TKig8Em%m~j_*PtU3Xl@l"T :pW BniC 4QyAM 42[Of4c*>e6mc7^ ia,^XU' FJsVbYREi&$s6>=|ZKo)uGNhPY]6*Mn b.B>e@^,4NDJIgTu0-U6ZhYjaV*) #j ''+jAT jjEas@g:_P"i#@jEd[e6uYFSwDiN/2A~53:*>ru3|&1B T=/!vW Mf)7oevMxcAeQyTiJ*aam37]RvVQyXc0(.tqd7/Ztt7pz~^>g_."/4|nu?ZD*+K>10U,}%,zW]F'rr[AS(X2$4AiBW_dB;(}l_waKndkRL8lg(x77mHo;wmqo[o%jJB#Ju[GVjF[)S+?4nj/gg0h{9F"789=x0>ybggooN7Aq[vr:[Vr$ Jv+XPq ]x813s5,eGzxE(u0"E0=imj?MUlf^ #Wi[ 1+{I^`8mXkk|.y87};y~7=>oc.{;KlF26m:rM0f#5AWyvL@>_i&6tm6f :AiV5p5qyw; ETU}bXEKst{ypz>{R?J}wqpOyL__X87s1 EV>FO;kk3V^@75Gp 7i-oXzpda+,CM<:/>

.Z Gtj;Zqwt[[a(G9]W=-:]jxW}`Ur;vrec0[K5)NC]wzr :x]*vz@@{'v)jk'c>mgD^u^nzXF].mS,tM$utvq^wO?,;om=|;gSE#p`*DaSd xF{d)T/-'hiunM[wo3W 5DFc`QhWE{,AG/>{hq4CO7]nbMtmJ]E;P75}.xslu*!~XhP:="c?.n.JO^yw1cmS'''#{ p.Z0xox8}7y1`j2v1#Ig#B0Qx +Xg*mwuz^X`iqq*{G[>,]th{@j.HawwkWEw>Ofkf5c/lW7J`z+8ff4#02|w7G&K)Gp d]r0~Rg}@ X=8[M[^V5;.[EsL1RKt x+t-H3l+$1~+Vlw70k6}S; 2Hk,5 YEw>}V3kiZl_^)]I",XoK3Tzm YAy5a~I2$h6;Wq>:f:uI!QnP!Wr1( C&YTSh13:Yj)s|i9MHk>^ dZFJ(~~;|O37y|?(z$7Fq)xisjE^|H{{R>7di1dju^i7jvQww9c6hk.FCNFDFv6usU%ECb/|`nMMw{?Q[hcoW|p -*2PS/LO?s?c2A$ei:57a(n0c+[QV#^=QswqN_pV[.e'.QZ%w6KNX&v.S4w[uJx%o%~S~s{9q(k$ qG3}^q"72z:Q6p1 .)-@nqwn?Xfo`fg2Ten4G%HWSsfwFu[+:Kv /[E"aktvr`ofG9&DAex;6Jpu.5:Eaenzv7zjgunV5g7@tonqQ(-s#mas#|yU>W`1_(;nnC/+im.Sy+l"9Pm/h#~ofY.gR-CSAD&+I bK3 ;|,f8DIE6pMWb'+|XQV3*y*;GygZ0g;#Q0yQO"J+N#xrAIB$*+[K+A 8GPv,@/|BKse 4=/2r'8f6Wl&{6dgE% qE,#FRpIX}ZRJ-t%w(Qp]:o, N*_Z=x|jt,8fAX3IHId#BkC]%klM'5(E,/B`yI!lEr"c*r#I,PG9b[4'8pN a#QfZ!JCsf9Z[o?DqR&R.6,U@z(Q:@tkxS*Z#9B,Ht2y?r0S:$;;n/#/^r!]Tq#gpH a}_,wbNq#!vvG?_g')oIY% 6RN$fDG@[JryD|5#Uc>P5P^.C- qP7S-l=K44`Y/Rs"7y/2; x2EVp.+zspyo:9Q^2e*= 03d)pHuk^C)"e S2OJ8/`~/nrb6[RJi>">Ma{J/YCdC^|c#+?P1b;T;Ea@b~pID FsuC@8PdD=w$OY8Gm.Qwen PymCQB,$3b{s]y|F`1/eR~Jk+IR^ErAD^x-&}2J;U*Bb[8^#QIImBeLr$pcULnR/M{3o&'Rb23~.`S~9H(*9c `$AKiF "xr 18u)|eKK;4_G},`go>E~x5)S06)P$Kx5 }pR4HO!D D^~L*:? e.@3V~Y

AY`)(BY1 ,ZHO`xDJ18&E$j 92md`O lU(E2=_)DBTK+@AW!,15VLF?"-mz FotEEKr}~#:`XYr~{2DsJ"LS"9 5 COjgSC[%sUNEY` 7K[.VXhb?hzgs57x1G)s3(6P^KadfH"rq!#yFVA[2*T;fMeV+`tet0]lZ~jF|m&66+PMPf\rF8OE&AH2R p%rNF;n,I?VrC#6R1$ BLVr]jS*hn( if6fKFrF/m6 U&Jr:aH$8g/5;PlLwg75R-.mOj,u1H }DE{mnKS7,U|e* J#lV=_TtE"Pn`|*,Jtj3@V s`-T,W"" Y}&XBb MCO^oI}1-Sy632q65 zm`vGc|)[iZ !sSd5cy{QLf1VA2~t$J4) 4Y E+I.o7U:XMaCZ1AL+Jya^R 2&ZoZ]pWw"#t2C{_|g-$#2=Y=hIO2vR^CZHd*i. CJ)Y8:Y"12=eN"UOB&4$&I,FvPWd8lF=@H'@k(sYNaD/S@~sB Dl&|~HPimi^d=d#%RM{g ~(USJT *OzX{n/ YC6OHR-yp"}Z5($85#`}F}_FNp J?3B`V&K7>hIhaF"s+a MOZ'"5:Gsk4}4t2*N~I&'A:e6]7x:5TDa7hxSS3/s]TRa(J?Na!kM)i4Lqze%g'g8G|ppd(#*tXHp/#@e^=:R 9o63b>Q?2K*E:o{e3Cdw&!c ![mL/'FJJ` AJwu}K>1|3D) fr1^Oh" J gVY8?/=W %dKkG[ySGKGRFL.(,G^QaHj +#%obJP-A(T%(x2wT|9%fZDLS-ajuGxn@gSqw/jShSqzrUF~ui(LU~,^8(*H8l-2Zi(d'6x1gx B)DMQ7=m*rpaM/&)Y+]R U/KP% SQi1aGH0TUr,L0 X2o]23EZu8zG;r?xre_ p_yDBUF(3Ud

Go here to read the rest:
The Encryption Debate Should End Right Now - WIRED

Read More..

Joint Letter to Five Eyes Intelligence Agencies Regarding Encryption … – Human Rights Watch (press release)

To: Senator the Hon. George Brandis Attorney General of Australi

Hon. Christopher Finlayson Attorney General of New Zealand

Hon. Ralph Goodale Minister of Public Safety and Emergency Preparedness of Canada

Hon. John Kelly United States Secretary of Homeland Security

Rt. Hon. Amber Rudd Secretary of State for the Home Department, United Kingdom

CC: Hon. Peter Dutton, Minister for Immigration and Border Protection, Australia;

Hon. Ahmed Hussen, Minister of Immigration, Refugees, and Citizenship, Canada;

Hon. Jeff Sessions, Attorney General for the United States;

Hon. Jody Wilson-Raybould, Minister of Justice and Attorney General, Canada;

Hon. Michael Woodhouse, Minister of Immigration, New Zealand

To Ministers Responsible for the Five Eyes Security Community

In light of public reports about this weeks meeting between officials from your agencies, the undersigned individuals and organizations write to emphasize the importance of national policies that encourage and facilitate the development and use of strong encryption. We call on you to respect the right to use and develop strong encryption and commit to pursuing any additional dialogue in a transparent forum with meaningful public participation.

This weeks Five Eyes meeting (comprised of Ministers from the United States, United Kingdom, New Zealand, Canada, and Australia) discussed plans to press technology firms to share encrypted data with security agencies and hopes to achieve a common position on the extent of ... legally imposed obligations on device-makers and social media companies to co-operate.[1] In a Joint Communiqu following the meeting, participants committed to exploring shared solutions to the perceived impediment posed by encryption to investigative objectives.[2]

While the challenges of modern day security are real, such proposals threaten the integrity and security of general purpose communications tools relied upon by international commerce, the free press, governments, human rights advocates, and individuals around the world.

Last year, many of us joined several hundred leading civil society organizations, companies, and prominent individuals calling on world leaders to protect the development of strong cryptography. This protection demands an unequivocal rejection of laws, policies, or other mandates or practicesincluding secret agreements with companiesthat limit access to or undermine encryption and other secure communications tools and technologies.[3]

Today, we reiterate that call with renewed urgency. We ask you to protect the security of your citizens, your economies, and your governments by supporting the development and use of secure communications tools and technologies, by rejecting policies that would prevent or undermine the use of strong encryption, and by urging other world leaders to do the same.

Attempts to engineer backdoors or other deliberate weaknesses into commercially available encryption software, to require that companies preserve the ability to decrypt user data, or to force service providers to design communications tools in ways that allow government interception are both shortsighted and counterproductive. The reality is that there will always be some data sets that are relatively secure from state access. On the other hand, leaders must not lose sight of the fact that even if measures to restrict access to strong encryption are adopted within Five Eyes countries, criminals, terrorists, and malicious government adversaries will simply switch to tools crafted in foreign jurisdictions or accessed through black markets.[4] Meanwhile, innocent individuals will be exposed to needless risk.[5] Law-abiding companies and government agencies will also suffer serious consequences.[6] Ultimately, while legally discouraging encryption might make some useful data available in some instances, it has by no means been established that such steps are necessary or appropriate to achieve modern intelligence objectives.

Notably, government entities around the world, including Europol and representatives in the U.S. Congress, have started to recognize the benefits of encryption and the futility of mandates that would undermine it.[7]

We urge you, as leaders in the global community, to remember that encryption is a critical tool of general use. It is neither the cause nor the enabler of crime or terrorism. As a technology, encryption does far more good than harm. We therefore ask you to prioritize the safety and security of individuals by working to strengthen the integrity of communications and systems. As an initial step we ask that you continue any engagement on this topic in a multi-stakeholder forum that promotes public participation and affirms the protection of human rights.

We look forward to working together toward a more secure future.

Sincerely, 83 civil society organizations and eminent individuals (Listed Below)

Access Now

Advocacy for Principled Action in Government

Amnesty International

Amnesty UK

ARTICLE 19

Australian Privacy Foundation

Big Brother Watch

Blueprint for Free Speech

British Columbia Civil Liberties Association (BCCLA)

Canadian Civil Liberties Association (CCLA)

Canadian Journalists for Free Expression (CJFE)

Center for Democracy and Techology

Centre for Free Expression, Ryerson University

Chaos Computer Club (CCC)

Constitutional Alliance

Consumer Action

CryptoAustralia

Crypto.Quebec

Defending Rights and Dissent

Demand Progress

Digital Rights Watch

Electronic Frontier Foundation

Electronic Frontiers Australia

Electronic Privacy Information Center

Engine

Equalit.ie

Freedom of the Press Foundation

Friends of Privacy USA

Future Wise

Government Accountability Project

Human Rights Watch

i2Coalition

Index on Censorship

International Civil Liberties Monitoring Group (ICLMG)

Internet NZ

Liberty

Liberty Coalition

Liberty Victoria

Library Freedom Project

My Private Network

New Americas Open Technology Institute

NZ Council for Civil Liberties

OpenMedia

Open Rights Group (ORG)

NEXTLEAP

Niskanen Center

Patient Privacy Rights

PEN International

Privacy International

Privacy Times

Private Internet Access

Restore the Fourth

Reporters Without Borders

Rights Watch (UK)

Riseup Networks

R Street Institute

Samuelson-Glushko Canadian Internet Policy & Public Interest

Clinic (CIPPIC)

Scottish PEN

Subgraph

Sunlight Foundation

TechFreedom

Tech Liberty

The Tor Project

Voices-Voix

World Privacy Forum

Brian Behlendorf | Executive Director, Hyperledger, at the Linux Foundation

Dr. Paul Bernal | Lecturer in IT, IP and Media Law, UEA Law School

Owen Blacker | Founder and director, Open Rights Group; founder, NO2ID

Thorsten Busch | Lecturer & Senior Research Fellow, University of St. Gallen

Gabriella Coleman | Wolfe Chair in Scientific and Technological Literacy at McGill University

Sasha Costanza-Chock | Associate Professor of Civic Media, MIT

Dave Cox | CEO, Liquid VPN

Ron Deibert | The Citizen Lab, Munk School of Global Affairs

Nathan Freitas | Guardian Project

Dan Gillmor | Professor of Practice, Walter Cronkite School of

Read the original post:
Joint Letter to Five Eyes Intelligence Agencies Regarding Encryption ... - Human Rights Watch (press release)

Read More..

Five Eyes Unlimited: What A Global Anti-Encryption Regime Could … – EFF

This week, the political heads of the intelligence services of Canada, New Zealand, Australia, the United Kingdom, and the United States (the "Five Eyes" alliance) met in Ottawa. The Australian delegation entered the meeting saying publicly that they intended to "thwart the encryption of terrorist messaging." The final communiqu states more diplomatically that "Ministers and Attorneys General [...] noted that encryption can severely undermine public safety efforts by impeding lawful access to the content of communications during investigations into serious crimes, including terrorism. To address these issues, we committed to develop our engagement with communications and technology companies to explore shared solutions."

What might their plan be? Is this yet another attempt to ban encryption? A combined effort to compel ISPs and Internet companies to weaken their secure products? At least one leader of a Five Eyes nation has been talking recently about increasing international engagement with technology companies with a list of laws in her back pocket that are already capable of subverting encryption, and the entire basis of user trust in the Internet.

Exporting Britain's Surveillance Regime

Before she was elevated to the role of Prime Minister by the fallout from Brexit, Theresa May was the author of the UK's Investigatory Powers bill, which spelled out the UK's plans for mass surveillance in a post-Snowden world.

At the unveiling of the bill in 2015, May's officials performed the traditional dance: they stated that they would be looking at controls on encryption, and then stating definitively that their new proposals included "no backdoors".

Sure enough, the word "encryption" does not appear in the Investigatory Powers Act (IPA). That's because it is written so broadly it doesn't need to.

We've covered the IPA before at EFF, but it's worth re-emphasizing some of the powers it grants the British government.

These capabilities alone already go far beyond the Nineties' dreams of a blanket ban on crypto. Under the IPA, the UK claims the theoretical ability to order a company like Apple or Facebook to remove secure communication features from their productswhile being simultaneously prohibited from telling the public about it.

Companies could be prohibited from fixing existing vulnerabilities, or required to introduce new ones in forthcoming products. Even incidental users of communication tech could be commandeered to become spies in her Majesty's Secret Service: those same powers also allow the UK to, say, instruct a chain of coffee shops to use its free WiFi service to deploy British malware on its customers. (And, yes, coffee shops are given by officials as a valid example of a "communications service provider.")

Wouldn't companies push back against such demands? Possibly: but it's a much harder fight to win if it's not just the UK making the demand, but an international coalition of governments putting pressure on them to obey the same powers. This, it seems is what May's government wants next.

The Lowest Common Privacy Denominator

Since the IPA passed, May has repeatedly declared her intent to create a an international agreement on "regulating cyberspace". The difficulty of enforcing many of the theoretical powers of the IPA makes this particularly pressing.

The IPA includes language that makes it clear that the UK expects foreign companies to comply with its secret warrants. Realistically, it's far harder for UK law enforcement to get non-UK technology companies to act as their personal hacking teams. That's one reason why May's government has talked up the IPA as a "global gold standard" for surveillance, and one that they hope other countries will adopt.

In venues like the Five Eyes meeting, we can expect Britain to advocate for others to adopt IPA-like powers. In that, they will be certainly be joined by Australia, whose Prime Minister Malcolm Turnbull recently complained in the Australian Parliament that so many tech companies "are based in the United States where a strong libertarian tradition resists Government access to private communications, as the FBI found when Apple would not help unlock the iPhone of the dead San Bernardino terrorist." Turnbull, it seems, would be happy to adopt the compulsory compliance model of the United Kingdom (as would, he implied at the time of the Apple case, would President Trump).

In the meantime, the British authorities can encourage an intermediary step: other governments may be more likely to offer support for a IPA regime if Britain offers to share the results of its new powers with them.

Such information-sharing agreements are the raison d'tre of the Five Eyes alliance, which began as a program to co-ordinate intelligence operations between the Anglo-American countries. That the debate over encryption is now taking place in a forum originally dedicated to intelligence matters is an indicator that the states still see extracting private communications as an intelligence matter.

But hacking and the subversion of tech companies isn't just for spies anymore. The British Act explicitly granted these abilities to conduct "equipment interference" to more than just GCHQ and Britain's other intelligence agencies. Hacking and secret warrants can now be used by, among others, the civilian police force, inland revenue and border controls. The secrecy and dirty tricks that used to be reserved for fighting agents of foreign powers is now available for use against a wide range of potential suspects.

With the Investigatory Powers Bill, the United Kingdom is now a country empowered with a blunt tools of surveillance that have no comparison in U.S. or any other countries' law. But, along with its Five Eyes partners, it is also seen as a moderate, liberal democracy, able to be trusted with access and sharing of confidential data. Similarly, Australia is one of the few countries in the world (and the only one of the Five) to legally compel ISPs to log data on their users. Canada conducts the same meta-data surveillance projects as the United States; New Zealand contributes its mass surveillance data to the shared XKEYSCORE project.

While such data-sharing may be business as usual for the Cold War spies, the risk of such unchecked co-operation have been barely considered by the judicial and legislative branches.

In the world of law enforcement, the UK has for the last year conducted a sustained lobbying campaign in the United States Congress to grant its police forces fast-track access to American tech companies' communications data. The UK would be permitted to seize the contents of Google, Facebook and other companies' customers' inboxes without a U.S. court warrant. In return, the U.S. would gain a reciprocal capability over data held in the U.K.

The danger is that, by forging broad agreements between these five countries, all will end up taking advantage of the lowest privacy standards of each. The United Kingdom will become the source of data obtained through the Investigatory Powers Bill; the United States will launder data taken from UPSTREAM and other programs through the United Kingdom's legal system, and so on.

Secret "Five Eyes" is not the venue for deciding on the future of global surveillance. Intelligence agencies and their secret alliances are no model for oversight and control of the much broader surveillance now being conducted on billions of innocent users of the public Internet. The Investigatory Powers Bill is no "gold standard. Britain's radical new powers shouldn't be exported via the Five Eyes, either through law, or through data-sharing agreements conducted without judicial or legislative oversight.

Continue reading here:
Five Eyes Unlimited: What A Global Anti-Encryption Regime Could ... - EFF

Read More..