Sunday, April 12, 2015

:) :) :) :) :)

Security features maintained in the enhanced Federal Reserve Notes include a portrait watermark visible when held up to a light, two numeric watermarks on the $5s, an enhanced security thread that glows under an ultraviolet light, micro printing, improved color shifting ink that changes color when the note is tilted, and on the newly redesigned $100 notes, a 3-D security ribbon and enhanced, raised printing...
is primarily made of wood pulp; however, United States currency paper is composed of 75% cotton and 25% linen...
and watermark are already built into the paper when it is received.
All bills, regardless of denomination, utilize green ink on the backs.  Faces, on the other hand, use black ink, color-shifting ink in the lower right hand corner for the $10 denominations and higher, and metallic ink for the freedom icons on redesigned $10, $20, and $50 bills.  
details such as outlines, tone, and shading will "translate" when engraved and printed on an intaglio press.
Then using a high-resolution film recorder, each color separation is imaged onto a sheet of sensitive film in negative form.  A thin sheet of steel, coated with a light-sensitive polymer, is exposed to ultraviolet light while covered by the film negative which contains the imagery.  The areas on the film that allow light to pass onto the plate are transferred or exposed. The unexposed areas around the images are washed away with water and soft scrubbing brushes.  This process is called "burning a plate."
One plate contains the background pattern that will be printed in green and peach. The second plate contains the images that will be printed in blue — an eagle and the words TWENTY USA. The photoengraver takes great care to make sure the images are perfectly aligned on both plates, or else the images will not line up properly when printed on the bills
The blank sheet of paper passes in-between the face and back blankets and simultaneously prints the complete image on the paper. The press has eight print units, four on the face and four on the back, with two comprehensive computer control consoles.  Many of the press settings can be controlled from these consoles and their status displayed on the computer screens
next section, Intaglio printing
Paper is then laid atop the plate, and the two are pressed together under great pressure.  As a result, the ink from the recessed areas is pulled onto paper, creating a finished image
Sharp tools (commonly called gravers) and acids are used to cut the fine lines, dots and dashes that uniquely describe the subject the engraver is creating.  Additionally, the engraver must cut the image in reverse to how it will actually print on a highly polished steel die. 
individual plastic molds are made from the master die and are assembled into one plate containing 32 exact duplicates of the master die.  Plate makers will then process this plate to create the metal printing plates that go on the presses
signatures into the plates using a pantograph machine.  A pantograph copies the die engraving onto the plate.  As one part of the machine traces the original engraving another part engraves the image onto the new plate.
Electroplating is how this is done. The plastic master, which is called the "basso", is sprayed with silver nitrate to act as an electrical conductor. The plate is then placed into a tank filled with a nickel salt solution, and an electric current is generated. Nickel ions leave the solution and deposit themselves on the electrically charged surface of the master. After about 22 hours, a nickel plate, called an "alto" has literally grown. The alto is separated from the plastic master, trimmed, and inspected by the engravers.  The plate contains the mirror image of the master in all its intricate detail and is an exact replica of the original engraved die.
That final printing plate is coated with a thin layer of chrome to make it hard and slick. It contains the Intaglio image in recessed grooves only 2/1000 (0.002) of an inch deep — but that is deep enough to hold ink for intaglio printing.
High-speed, sheet-fed rotary I-10 Intaglio printing presses are used to print the green engraving on the back of U.S. currency
Paper is applied directly to the plate and under tremendous pressure (approximately 20,000 lbs. per sq. inch), the paper is forced into the engraved plate, thereby removing the ink and printing the image. 
Sheets that were printed from the Back Intaglio process require 72 hours to dry and cure. During this drying process, the sheets bond and stick together. Therefore the sheets must be separated and neatly jogged before they can be printed on the Face Intaglio press.  To do this the BEP employs automated joggers shaped much like the letter "C."  Support personnel retrieve the load and place it into the jogger.  The load is turned on its side and, through the combination of vibration and forced air, the sheets are separated.  The process takes approximately 10 minutes.  Once jogged, the load is moved to the designated Face Intaglio press.
Special cut-out ink rollers transfer the different inks to a specific portion of the engraving, thus allowing three distinct colors to be printed on the face of the note; the black for the border, portrait engraving, and signatures of the Secretary of the Treasury, and the Treasurer of the United States; the color-shifting ink in the lower right hand corner for the $10 denominations and higher; and the metallic ink for the freedom icons on redesigned $10, $20, and $50 bills or color shifting ink on the redesigned $100 notes' freedom icons.  Bills printed in Fort Worth, Texas, will also have a small "FW" printed in black ink.  The loads of these freshly printed sheets will still require 72 hours to dry and cure before they can continue to the next operation.
To recap, the subtle background colors are printed first using Offset print technology, then the green engraving on the back is printed second using the Intaglio printing process. The third printing operation is the Face Intaglio printing process
 transmissive camera is used to inspect the paper by looking through the sheets to ensure the thread and portrait watermark are in the correct position.  In addition, two separate cameras take a digital picture of both the front and back of the sheets, breaking the images down into four million tiny pixels.  After the sheets are trimmed, a trim camera takes measurements of the sheets.  All data is gathered from the sheets and compared to what is considered a perfect "golden image," and within three tenths of a second, the computer decides if the sheet is acceptable or a reject, looking for defects such as ink spots, ink deficiencies, or smears.
The new serial numbers consist of two prefix letters, eight numerals, and a one-letter suffix.  The first letter of the prefix designates the series (for example, Series 1996 is designated by the letter A, and Series 1999 is designated by the letter B).  The second letter of the prefix designates the Federal Reserve Bank to which the note was issued. The serial numbers are overprinted in sequential order and remain in order until the 16-subject sheets are cut.  
inspected by the COPE Vision Inspection System (CVIS)

Wednesday, April 8, 2015


Supplying the science hobbyist, industry, government, schools & universities since 1998.
"We specialize in small orders"
Uranium Extract
from bulk Carnotite/Gummite Uranium Ore

The Uranium contained in bulk Carnotite and associated Uranium ores can be easily extracted to form various Uranium compounds.
Typical Carnotite/Gummite Uranium ore.
Use a hammer or rock crusher to smash the rock into a granular form.
Wear proper safety equipment (gloves, dust mask, eye protection) when breaking the rock so you don't get rock fragments in your eye, or inhale piles of ore dust.
Sift the crushed rock through a screen (a window screen or a spaghetti strainer will do).
This will separate the large chunks from the fine, granular material.

Weigh out 300 grams of the fine granular ore.
Pour the 300 grams of fine ore into the barrel of your Ball Mill.
A hard milling media is required, such as steel balls which are used here.
Place the barrel on the mill and let it run for approximately 2 hours.
This will reduce the ore into a very fine dust.
This is necessary so the extraction chemicals will be able to react with the ore material.
If Ball Milling is not done, very little Uranium will be extracted.

After 2 hours of milling, the ore is as fine as Talcum powder.
Separate the steel balls from the powdered ore by using either a magnet to pull out the balls,
or dumping the barrel contents through a strainer.
Certain types of Uranium ore (Pitchblende, Uraninite) can be simply extracted with Nitric Acid. However, Carnotite and its associated matrix minerals are far too alkaline for Acid extraction and many of the minor Uranium ores will not dissolve in acid. Alkaline extraction is called for when dealing with Carnotite ore.
To begin, you'll need 200 grams of powdered Uranium ore, 50 grams of Sodium Carbonate,
25 grams of Sodium Bicarbonate (use Arm & Hammer Baking Soda) and 1000 ml of water.
Place a large flask with the 1000 ml of water in it on a magnetic stirrer/hot plate,
drop in a spinbar and heat to about 70-80ьз╕ C.
Set the stir speed to maximum and slowly add each ingredient into the water while it is being stirred & heated. Let the mixture heat & stir overnight. 
The next day, turn off the hot plate/stirrer and set the flask aside to cool and settle for 1 hour.
After an hour, the heavy sediment will sink to the bottom leaving the cloudy extracted Uranium in a carbonate solution floating on top.

 

Pour the cloudy Uranium solution through a fine filter being careful not to let the bottom sediment to stir up or get into the filter. 
The finished product will be a bright, clear yellow liquid: Uranyl Tricarbonate.
In our next experiment, we'll use Kerosene and thttp://www.unitednuclear.com/extract.htmhe Solvent Extraction method to remove the carbonate from the Uranium.

Wednesday, February 4, 2015

How to Launder Stolen Bitcoins

Bitcoin’s main problem is that every transaction is public. Such a feature makes it difficult to launder stolen bitcoins. Take this $5m thief as the example. The person controlling 19,000 of Bitstamp’s coins has a problem. Anyone can follow the coins as they move between addresses. Lucky for them (or not as we’ll see), there exist tools to assist in hiding, disguising, and making it difficult to prove where your bitcoins originate.
Mixers combine your coins with the coins of others. Everyone sends coins to a central address. The mixer sends a transaction back to each user from the key controlling the central address. When stolen coins mix with ‘clean’ coins, they become difficult to track.
Coin Tumblers swap coins between users.  A Tumbler will mix coins, send transactions with various amounts to keys it controls; attempting to simulate other network transactions.  Sending a tumbler 1BTC may result in you receiving multiple, smaller, transactions in return over a short time. The bitcoins returned to you will have been combined, split and transacted many, many times. Taint is the probability of tracing coins back to any given address after mixing and tumbling.
CCN
A Google search will turn up half a dozen of these coin washing services. Many are a combination of the preceding concepts. The majority offer themselves to consumers as anonymizers protecting privacy. Whether they are tools for crime or a defense against tyrants remains in the hand of the user. As Cody Wilson, co-founder of the anonymous Bitcoin wallet ‘Dark Wallet’, has said “Liberty is a dangerous thing.”
Also read: Cody Wilson: I Will Wrestle the Bitcoin Foundation to its Suicide
Regardless of their deployment, these methods are not without weaknesses. Further, still, there are other ways to launder stolen bitcoins that may not require any extra services at all. Bitcoin mixes coins in transactions all the time. You’ve probably already done it dozens of times and never noticed.

How Tumblers Launder Stolen Bitcoins

Heap of moneyA Bitcoin Transaction contains inputs and outputs. Inputs reference previous payments made to you. Outputs spend the coins by transferring ownership to a new address. A tumbler can launder stolen bitcoins by mixing and distributing them to other people and back to you.
Alice has previously received three payments.
1 BTC she bought on Coinbase,
2 BTC from her online store, and
3 BTC for selling weaponized wormhole technology to North Korea.
Alice controls 6 BTC with the keys in her wallet. If Alice sent all 6BTC in one transaction it’s not only reasonable, it’s likely, that someone analyzing the block chain will assume the same individual controls those keys. The transaction would join the Coinbase BTC and North Korea BTC in the same transaction with her online store proceeds as the inputs. Worse, still, if they are a government organization or Coinbase, they will be able to trace back the 1 BTC from Coinbase included in Alice’s transaction. Effectively, Alice is no longer anonymous, and her last transaction ties her to arms dealing with North Korea. Poor Alice.
Even if Alice were not laundering stolen bitcoins (or her North Korean coins), sending her coins through a tumbling service as she received them, she could have a higher chance of maintaining her anonymity.
launder stolen bitcoins tumblers
The expertly made graphic demonstrates. Multiple users send their coins to the tumbler. The coins will be mixed, then split to many addresses, mixed to small groups, mixed to large groups, sent out again, etc. Over time, Alice will receive a number of payments totaling close to her original amount (minus the tumbler fees). Then, Alice could check blockchain.info’s taint analysis for her addresses and see the chances of being connected to her pre-tumbled coins.

Coin Mixing to Launder Stolen Bitcoins

If you’re planning to steal from an exchange and planning to launder stolen bitcoins through mixing here is how that works. In the section on tumbling stolen coins, Alice could potentially dox herself anytime she mixes coins she purchased from an exchange with other coins she controls.
Bitcoin Core developer Gregory Maxwell first described a new style of transaction, CoinJoin, that uses the same principle that connected Alice’s bitcoin keys. It was not developed to launder stolen bitcoins but protect privacy. The concept takes things many steps further. Transaction inputs are completely independent of each other. If a transaction contains one input from Alice and one input from Bob, they both must sign the transaction for it to be valid. Instead of a transaction containing only Alice’s inputs and outputs, a CoinJoin transaction contains inputs and outputs from many groups of people.
A group using CoinJoin agrees on a transaction ahead of time. Until everyone in the group signs the transaction, it is invalid. Including multiple people in a transaction makes it much more difficult to link other keys together based on the transaction alone. If Alice includes Bob in a CoinJoin transaction, it becomes more difficult to chip away at the walls of anonymity.

More Ways to Launder Stolen Bitcoins

These two principles to launder stolen bitcoins rely on the fact that bitcoins do not exist. The balance of bitcoins anyone controls are just numbers recorded in the block chain. When combined with a transaction, it is akin to adding “2 + 2″ and breaking apart the resulting “4” into “1;1;1;1″ There is no way of proving “Each ‘1’ is an equal quarter of each ‘2’ added to get ‘4’” or any other denomination.
The current Alpha release of Dark Wallet supports Stealth Addresses, in addition to CoinJoin and Multisig. A Stealth Address is another privacy-related feature in the works for Bitcoin. They don’t launder funds, so much as break the usual chain of custody the block chain provides for tracking bitcoins. Also, exchanges that implement hot/cold wallets can function as tumblers and mixers if users deposit and withdrawal from the same hot wallet
It’s important to end with the weaknesses. Both of these systems relies on a foundation of “legitimate” users to effectively launder stolen bitcoins. If the hacker, who stole BitStamp’s coins, were to offload all 18,000 bitcoins on the same tumbler or mixer at the same time, their volume would overwhelm the obfuscation they hope to attain. Similarly, including 18,000 stolen bitcoins in a CoinJoin with 100 other bitcoins would just give everyone highly tainted coins. It would take some time and effort to launder so many.
Disclaimer: If your goal is to launder stolen bitcoins and you rely on this article as your sole source you will fail.
Images from the author and Shutterstock
https://www.cryptocoinsnews.com/launder-stolen-bitcoins/

Saturday, January 10, 2015

sodium pentothal = truth serum

The famed chemical sodium pentothal, which is commonly known as truth serum, has been a mainstay of spy flicks for decades. In real life, scientists have tested it on spies, psychiatric patients, pregnant women, and suspected criminals. They all talked, but did they say something meaningful? Or was it just what the people around them wanted to hear?
Like heroin, sodium pentothal is a brand name. The drug was manufactured and trademarked by Abbott Laboratories, and its free-for-all name is sodium thiopental. It's a barbiturate, a drug that acts on the central nervous system, which it depresses to calm anxiety, induce drowsiness, eliminate pain, and sometimes entirely knock someone out. That is not why it's become world famous. Sodium pentothal made its name in detective, spy, and pulp novels, where it was famously used as a 'truth sérum
 
Buy Pentothal (Thiopental sodium) 1GR/GM 1 Injectables Brand
In Stock And Available For Purchase From the Online Pharmacy Now !
Pharmacy Discount Price: $198.64