email@example.comPost Shooting ProceduresFri Feb 17, 2006 17:27
SONG: "SHOTGUN DICK CHENEY.....
-------- Original Message --------
Subject: Post Shooting Procedures
Date: Fri, 17 Feb 2006 16:11:29 -0500
Re: Post Shooting Procedures
Special note to my customers, friends and fans --
The following rules generally apply after a shooting incident (accidental or self-defense), whether you are the Vice President of the United States or not. Thanks to my friend Dr. Bruce Eimer, Ph.D., a clinical and forensic psychologist, for reminding me of these important basics, and providing facts. For some mysterious reason, little of this has come out in news reports.
1. All shooting incidents are traumatic for the good guys, especially when innocent people have been hurt.
2. Post-shooting trauma is REAL and every good person involved in a shooting incident gets it. Sleeplessness, flashbacks, disorientation, remorse, malaise and other post-trauma symptoms are routine, expected and must be dealt with.
3. You have no legal obligation to contact or talk to the press, and defense attorneys advise against doing so.
4. A person is least capable of making a coherent and consistent statement, with good word choices and chronological accuracy, immediately after a shooting incident, even though the urge to talk is typically great, and everyone around you will encourage it.
5. Knowing this, the police have adopted good standard procedures you can use as a guide. Remove yourself from all public contact, and go on "administrative leave" (with pay), until an official statement can be released in writing, in cooperation with a team of lawyers, within two weeks.
6. No statement of any kind should be made until conferring with attorneys.
7. You are advised against talking with police unless your lawyer is present.
8. The first concern must be for an injured party. Timely reporting to law enforcement authorities is also essential, and it would be improper for police to leak this to the press (both rules were observed in the Cheney incident).
9. Allow yourself time to appropriately psychologically process your post-shooting psychological trauma, and debrief this critical incident for 24 to 48 hours. Only then should you consider making a statement to the press, the authorities, or anyone. Expressing sadness, contrition and assuming FULL responsibility for the accident (as Cheney did in this case) is appropriate.
10. Do everything you can to avoid such situations.
Alan (with a lot of help from Bruce).
"We publish the gun laws."
4718 E. Cactus #440
Phoenix, AZ 85032
Call, write, fax or click for a free full-color catalog.
To reach Dr. Eimer --
Encourage politicians to pass more laws...
with expiration dates.
How to Kill RFID Tags with a Cell Phone
Scientific American | February 15 2006
Radio frequency identification (RFID) tags--tiny wireless circuits that derive their power from radio waves and cost just pennies to make--have quickly found their way into identification badges, shipping containers, even ordinary store products. Because, unlike barcodes, the tags can be read surreptitiously, a number of groups have raised privacy concerns. To address these concerns, leading RFID makers have created so-called "Gen 2" chips that will divulge their data only after a reader transmits the correct password. The new chips can also be triggered by a different password to silently self-destruct, for example as a customer leaves a store.
Encryption protects the password transmission. But renowned cryptographer Adi Shamir of Weizmann University claims to have found a way to bypass the encryption scheme and obtain the self-destruct password using technology no more sophisticated than that in a common cell phone.
Shamir announced the discovery this morning at the 2006 RSA Conference, a large computer security meeting opening today in San Jose, Calif. "Everyone expects that there will soon be billions of these tags in circulation," Shamir noted. "We bought one of the major-brand RFID tags and tried to break into it by power analysis," he said.
RFID tags have no battery or internal power source; they obtain the energy they need to operate by sucking it out of the radio signals they absorb. But in doing so, every computation of the RFID circuit modifes the radio environment. Shamir and his coworkers used a simple directional antenna to monitor the power consumption of an RFID tag as they transmitted correct and incorrect passwords to the device slowly, one bit at a time.
"We could easily notice a power spike after the first bit that the chip didn't like," Shamir recalls. By starting over and modifying the offensive bit, the researchers were able to derive quickly the kill password for the tag.
"We believe that a cell phone has all the ingredients needed to detect these passwords and disable all the RFIDs in the area," Shamir says.
If confirmed by others, the flaw would raise serious questions about the suitability of current RFIDs for use in theft prevention, employee idenfication and other applications.
For more about RFID tags, see "RFID: A Key to Automating Everything," by Roy Want. Scientific American Magazine, January 2004.
SONG: "SHOTGUN DICK CHENEY.....
Main Page -
Message Board by American Patriot Friends Network [APFN]
APFN MESSAGEBOARD ARCHIVES