Invite Electronic signature Form Safe
Make the most out of your eSignature workflows with airSlate SignNow
Extensive suite of eSignature tools
Robust integration and API capabilities
Advanced security and compliance
Various collaboration tools
Enjoyable and stress-free signing experience
Extensive support
Help Me With Invite Electronic Signature PPT
Keep your eSignature workflows on track
Our user reviews speak for themselves
Invite Electronic signature Form Safe. Explore by far the most user-warm and friendly knowledge of airSlate SignNow. Deal with your whole papers processing and discussing program digitally. Go from hand held, papers-centered and erroneous workflows to automatic, digital and flawless. You can easily generate, provide and indicator any paperwork on any gadget anywhere. Ensure your important organization circumstances don't move overboard.
See how to Invite Electronic signature Form Safe. Follow the straightforward manual to start:
- Build your airSlate SignNow bank account in click throughs or log on with your Facebook or Google accounts.
- Take pleasure in the 30-time free trial or go with a rates program that's excellent for you.
- Find any lawful template, build on the web fillable kinds and discuss them firmly.
- Use superior capabilities to Invite Electronic signature Form Safe.
- Signal, modify signing get and acquire in-individual signatures 10 times more quickly.
- Set intelligent reminders and receive notifications at each phase.
Transferring your activities into airSlate SignNow is uncomplicated. What practices is an easy process to Invite Electronic signature Form Safe, in addition to suggestions to keep your colleagues and lovers for better partnership. Empower your staff together with the best resources to remain along with company procedures. Increase productivity and range your small business speedier.
How it works
Rate your experience
-
Best ROI. Our customers achieve an average 7x ROI within the first six months.
-
Scales with your use cases. From SMBs to mid-market, airSlate SignNow delivers results for businesses of all sizes.
-
Intuitive UI and API. Sign and send documents from your apps in minutes.
A smarter way to work: —how to industry sign banking integrate
FAQs
-
Are you aware that electronic signatures are very trustworthy?
Building trust with technology isn’t quite as easy as falling backward into someone’s arms. Unless you have a technical background, cybersecurity can be difficult to grasp.Most people are comfortable with ink signatures, but it’s a common misconception that just because a document has been signed with ink, it’s safe, secure and valid. In fact, without physically meeting and talking with the signer.For example, if you’ve never seen the signer’s signature before, how do you know it is actually their signature? If you know what the signature is supposed to look like, how do you know the one in front of you wasn't forged? And if the signature is on the last page of a multi-page document, how do you know that something in the preceding pages was not altered after the document was signed?The reality of e-signatures – especially independent e-signatures, in which the evidence of their validity is embedded in the signed document – is that they are more trustworthy than traditional ink signatures.Offer Transparency and ControlIn the same way, building trust means providing all the facts. If signers have access to the entire signing process from a comprehensive audit trail, they’re able to keep close watch over their transaction and its process from identity authentication to opening and reviewing documents to signing.Use Trusted TechnologyPeople trust those who are trustworthy. Companies that use e-signature technology that goes above and beyond security requirements will naturally win over the trust.Educate DownstreamNo matter how many thousands of dollars e-signatures will save your company, for an e-signature solution to be successful at every level, you must educate everyone involved in the importance your e-signature provider places on security and independence.
-
How do I register my company and logo in India?
Incorporating a company in India is slightly difficult than you may think. Its better you hire a CS, CA or a Lawyer to do it for you. Nonetheless, here is the process:(1) Obtain DIN (Director Identification Number) from Registrar of Companies, Ministry of Corporate Affairs of all the proposed Directors in your Company. (2) Obtain DSC (Digital Signature Certificate) from any of the authorities recognised by Registrar of Companies of all the Directors. (3) Apply in a prescribed format to the Registrar of Companies for the approval of name of your company. You need to provide a minimum of 5 options to the Registrar in this form.(4) Once you receive the name approval from the Registrar of Companies, you need to file the following documents with that office: (a) Memorandum of Association(b) Article of Association(c) Form 32 (Details of Directors)(d) Form 18 (Registered Office details)(e) Form 1 (Compliance with the Act) FEESThe official fees for which you will receive receipts (for a Company with an Authorised Capital of Rs 1 lakh) will be approximately Rs 11,000. Rest of it will be the fee of the working professional. On an average you're likely to spend Rs 5000 to Rs 10000 in addition to the official fee, so that the total price comes out to somewhere between Rs 16000 and Rs 21000.TIME FRAMEIf everything goes smoothly, you can register your Company within 20 to 30 days. However, if an objection is raised on an issue, it may take longer, as well. Good luck!Nitin
-
Do fighter jets use decoys to misguide fast approaching missiles? Which fourth generation jets are equipped with such decoys?
Thanks for the A2A.Q: Do fighter jets use decoys to misguide fast approaching missiles? Which fourth generation jets are equipped with such decoys?A: Yes, fighters do use ‘decoys’ (technically speaking dispensable counter-measures), of 2 large families, totaling 4 basic types, to deal with missiles.Then again, not getting shot at in the first place is much better than using last ditch measures as ‘decoys’.ALE-50 towed decoy (above) and flares (below), together with chaff (which is barely visible in air) are ‘reactive decoys’ - you deploy them as a last ditch attempt to evade missilesThe MALD, basically a ‘disposable drone’, is a ‘proactive decoy’ - you deploy them before getting into a ‘hot’ zone, fooling the enemy to reveal the positions of its defensive systems‘Decoys’ are part of the larger ECM (Electronic Counter-Measures) effort. They emulate an aircraft signature (usually in terms of radar / ‘heat’), and attempt to ‘seduce’ the missile to attack them instead of the actual aircraft.In addition to jamming, that is, to use fake electronic signals to confuse radars/missiles, there are 2 main families and 4 main types of decoys. I’ll call them ‘reactive decoys’ (used when you’ve already been attacked: chaffs, flares, towed decoys) and ‘proactive decoys’ (used to fool enemies to shoot at the decoy when you’re not actually there; ‘disposable drone’ decoys).But first, let’s define what’s a kill chain[1]. ‘Kill’ in the military has a broad meaning, but usually means you’re either out of action or actually dead, any of which may ruin your day.The kill chain - F2T2EA, or Find, Fix, Track, Target, Engage, Assess - is a series of steps needed to ‘kill’ the enemy.One military kill chain model is the "F2T2EA", which includes the following phases:Find: Identify a target. Find a target within surveillance or reconnaissance data or via intelligence means.Fix: Fix the target's location. Obtain specific coordinates for the target either from existing data or by collecting additional data.Track: Monitor the target's movement. Keep track of the target until either a decision is made not to engage the target or the target is successfully engaged.Target: Select an appropriate weapon or asset to use on the target to create desired effects. Apply command and control capabilities to assess the value of the target and the availability of appropriate weapons to engage it.Engage: Apply the weapon to the target.Assess: Evaluate effects of the attack, including any intelligence gathered at the location.This is an integrated, end-to-end process described as a "chain" because an interruption at any stage can interrupt the entire process.[2]We’re in the classical ‘cat and mouse’ game, where the cat tries to invite the mouse for dinner and the mouse tries to decline that apointment. As the cat becomes ever more persuading, the mouse has to get ever more effective in skipping.The sooner you break the chain the better; once the chain goes all the links down to the ‘engage’ thingie you must deal with an incoming missile, which isn’t at all easy - sometimes the ‘engage’ link lasts only a few seconds.Turkish AH-1 CObra shot down by insurgents on 13/May/2016[3]. The whole kill chain lasted only about 1 minute, with the ‘engage’ part being as short as 5 seconds from the moment the insurgent launched the missile until impact. Had the helo launched flares, it might have missed this dinnerAircraft are usually detecded via radar, visual, sound or IR (Infra-Red, ‘heat’) signatures. While visual and sound are still important, especially when fighting helicopters, the most dangerous signature is radar, as it’s longer ranged and less affected by weather. IR is also important, especially for missile guidance, like the shoulder-fired beast of the video above.In general terms, the bigger the signature the easier it’s to find / fix / target / track the target, and/or the farther away that can be done. ‘Stealth’ is a broad term regarding signature reduction, and as radar is the most important sensor it’s also where most signature reduction efforts have been directed. To be sure, competent stealth designs also reduce the IR signature somewhat, but nowhere near the radar signature reduction.Stealth intends to break the chain before the ‘target’ link, ECM in general try to break the chain in each link except for ‘assess’, ‘reactive decoys’ try do avoid the ‘engage’ becoming ‘assess’. Stealth can be mightily effective, reducing radar detection distances by up to 10 times.‘Proactive decoys’ try to lure the enemy into activating the whole chain without actual aircraft around, making it easier for attackers to disable the enemy defenses by means of ECM, SEAD (Suppression of Enemy Air Defenses) and DEAD (Destruction of Enemy Air Defenses).‘Reaction decoys’ can be very effective, and sometimes are the only option available.Each decoy has its pros and cons, and I’ll talk briefly of each.‘REACTIVE DECOYS’CHAFFExamples of chaffBroadly speaking, radars work by emitting EM (Electromagnetic) waves of certain wavelengths and analysing the return signal.By the late 1930s three countries - US, UK and Nazi Germany - had developed a way to trick radars. UK used it first, in 1943[4]. In modern parlance, it’s commonly referred to as chaff.Chaff is a set of small metallic fibres (usually of aluminium), with a length adequate to the wavelength of the radar you want to spoof. Chaff creates a series of false targets on radar displays[5].While being almost invisible to the human eye, the ‘cloud’ formed by the fibres can have a signNow radar signature, masking the actual aircraft or breaking the lock of a missile, causing it to go ballistic.Most BVR (Beyond Visual Range) missiles, both air- and surface-launched, are radar-guided; additionally, radars are often used to vector intercepts and direct flak and other weapons, so it’s easy to see how chaff can be useful.Modern radars, however, can use techniques to avoid the chaff, like pulse-Doppler[6], which detects mobile targets and can distinguish between aircraft and ‘chaff clouds’ with relative ease. But even these advanced radars can be fooled long enough for the missile to lose track of the aircraft.FLARESFlares are fairly visible[7]Chaff generate a lot of radar signature, and flares generate a lot of IR signature, to fool IR-guided missiles, like the shoulder-fired ones that are so popular with insurgents worldwide, and the short-ranged airborne ones like the Sidewinder[8].Modern missiles have several tricks to deal with flares: IIR (Imaging Infra-Red, which uses ‘heat’ images of the target instead of just chasing a heat source) and dual-band sensors (usually in the IR and UV / Ultra-Violet bands, that have libraries of how aircraft and flares behave in either band) are the most used. Then again, even these modern missiles can be fooled by flares.TOWED DECOYSALE-50 towed decoyThe most effective way to deal with radars is the use of ECM; the emitters can mimic radar signals, and the most recent ones can fool even the good pulse-Doppler radars that are largely immune to chaff. To counter those pesky emitters, the cat developed a new trick, HOJ (Home On Jammer), where the missile will target the emitter.The mouse had to develop a new trick, and the towed decoy was created. It is used as a complement to the aircraft’s on-board ECM suite, emitting signals at a safe distance from the aircraft. It’s a win-win for the mouse - either the missile will be fooled and miss entirely, or be partly fooled and hit the decoy, leaving the aircraft unscathed.It was first used by the Allies during the War of Kosovo, with excellent results.‘PROACTIVE DECOYS’‘DISPOSABLE DRONES’MALD on an F-16D during tests‘Proactive decoys’, like the modern MALD family, are launched in an area just before the actual aircraft, or as a distraction while the actual attack happens elsewhere, or even when there's no attack at all.Modern decoys can emulate signatures, flight patterns and even ECM systems of modern aircraft, and are mightly seductive. Once an enemy activates its defenses against decoys like the MALD, they’ll be targeted by SEAD/DEAD aircraft, or have their characteristics and locations revealed for future activities against them.The widespread use of such ‘disposable drones’ may be one of the reasons behind claims like ‘we shot down most incoming aircraft and missiles’ regularly made by the likes of Syria - despite the fact that they mostly fail to show evidence of such interceptions while the remains of the areas they allegedly protected can be seen on satellite pictures.Footnotes[1] Air Force Magazine[2] Kill chain - Wikipedia[3] Turkish Cobra Helicopter Shot Down With Heat Seeking Missile[4] Bombing of Hamburg in World War II - Wikipedia[5] Chaff (countermeasure) - Wikipedia[6] Pulse-Doppler radar - Wikipedia[7] Flare (countermeasure) - Wikipedia[8] Ja'Din shootdown incident - Wikipedia
-
What are the laws - Data Protection, Data Transmission and Export and Data Encryption in India to operate a technology platform
The Information Technology Act, 2000 came into force on 17.10.2000 vide G.S.R No. 788(E) dated 17.10.2000 and for the first time, a legal definition of “Computer”, “Data”, “electronic record”, “Information” et al were provided. The said Act gave a legal recognition to the electronic records and digital signatures and in Chapter IX thereof provided for penalty and adjudication. Section 43 of the Act interalia provided that in case of unauthorised access, download or copying or damage to data etc, the person responsible shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person affected.Apart from civil liability provided under Section 43, Chapter XI (Sections 63 to 78) of the Act of 2000 provided for criminal liability in cases of Tampering, Hacking, publishing or transmitting obscene material, misrepresentation etc. Apart from the same, Section 72 of the Act provided for penalty in case of bsignNow of confidentiality and privacy and laid that in case any person who has secured access to any electronic record, Data or information, discloses the same to any other person without obtaining the consent of the person concerned, he shall be punished with imprisonment upto two years or with fine upto Rupees one lakh or with both.However, the provisions of the Information Technology Act, 2000 were not adequate and the need for more stringent data protection measures were felt, the Information Technology (Amendment) Act, 2008 was enacted which came into force on 27.10.2009. The said Amendment Act brought in the concepts like cyber security in the statute book and widened the scope of digital signatures by replacing the words “electronic signature”. The amendment act also provided for secure electronic signatures and enjoined the central government to prescribe security procedures and practices for securing electronic records and signatures (Sections 15-16) The amendment Act also removed the cap of Rupees One Crore as earlier provided under Section 43 for damage to computer and computer systems and for unauthorised downloading/ copying of data. The said Amendment Act also introduced Section 43A which provides for compensation to be paid in case a body corporate fails to protect the data. Section 46 of the Act prescribes that the person affected has to approach the adjudicating officer appointed under Section 46 of the Act in case the claim for injury or damage does not exceed Rupees Five crores and the civil court in case, the claim exceeds Rupees Five crores. The amendment act also brought/ introduced several new provisions which provide for offenses such as identity theft, receiving stolen computer resource/ device, cheating, violation of privacy, cyber terrorism, pornography (Section 66A-F & 67A-C). The amendment act also brought in provisions directing intermediaries to protect the data/information and penalty has been prescribed for disclosure of information of information in bsignNow of lawful contract (Section 72A)With the enactment of the Amendment Act of 2008, India for the first time got statutory provisions dealing with data protection. However, as the ingredients of “sensitive personal data and information” as well as the “reasonable security practices and procedures” were yet to be prescribed by the Central Government, the Ministry of Communications and Information Technology vide Notification No. GSR 313 (E) dated 11th April 2011 made the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information ) Rules, 2011 (the said rules). Rule 3 of the said rules defines personal sensitive data or information and provides that the same may include information relating to password, financial information such as bank account or credit card details, health condition, medical records etc. Rule 4 enjoins every body corporate which receives or deals with information to provide a privacy policy. Rule 5 prescribes that every body corporate shall obtain consent in writing from the provider of the sensitive information regarding purpose of usage before collection of such information and such body corporate will not collect such information unless it is collected for a lawful purpose connected with the function or activity of such body corporate and collection of such information or data is necessary and once such data is collected, it shall not be retained for a period longer than what is required. Rule 6 provides that disclosure of the information to any third party shall require prior permission from the provider unless such disclosure has been agreed to in the contract between the body corporate and the provider or where the disclosure is necessary for compliance of a legal obligation. The Body corporate has been barred to publish sensitive information and the third parties receiving such information have been barred to disclose it further. Rule 7 lays down that the body corporate may transfer such information to any other body corporate or person in India or outside, that ensure the same level of data protection and such transfer will be allowed only if it is necessary for performance of lawful contract between the body corporate and provider of information or where the provider has consented for data transfer. Rule 8 of the said rules further provide reasonable security practises and procedures and lays down that international standard IS/ISO/IEC 27001 on “Information Technology- Security Techniques- Information Security Management System- requirements “ would be one such standard.The Ministry of Communication and Information Technology further issued a press note dated 24th August 2011 and clarified that the said rules are applicable to the body corporate or any person located within India. The press note further provides that any body corporate providing services relating to collection or handling of sensitive personal data or information under contractual obligation with any other legal entity located within India or outside is not subject to requirements of Rules 5 &6 as mentioned hereinabove. A body corporate providing services to the provider of information under a contractual obligation directly with them however has to comply with Rules 5 &6. The said press note also clarifies that privacy policy mentioned in Rule 4 relates to the body corporate and is not with respect to any particular obligation under the contract. The press note at the end provides that the consent mentioned in Rule 5 includes consent given by any mode of electronic communication.Data Protection relates to issues relating to the collection, storage, accuracy and use of data provided by net users in the use of the World Wide Web. Visitors to any website want their privacy rights to be respected when they engage in e-Commerce. It is part of the confidence-creating role that successful e-Commerce businesses have to convey to the consumer. If industry doesn't make sure it's guarding the privacy of the data it collects, it will be the responsibility of the government and it's their obligation to enact legislation.Any transaction between two or more parties involves an exchange of essential information between the parties. Technological developments have enabled transactions by electronic means. Any such information/data collected by the parties should be used only for the specific purposes for which they were collected. The need arose, to create rights for those who have their data stored and create responsibilities for those who collect, store and process such data. The law relating to the creation of such rights and responsibilities may be referred to as ‘data protection’ law.The world’s first computer specific statute was enacted in the form of a Data Protection Act, in the German state of Hesse, in 1970.The misuse of records under the Nazi regime had raised concerns among the public about the use of computers to store and process large amounts of personal data.The Data Protection Act sought to heal such memories of misuse of information. A different rationale for the introduction of data protection legislation can be seen in the case of Sweden which introduced the first national statute in 1973.Here, data protection was seen as fitting naturally into a two hundred year old system of freedom of information with the concept of subject access (such a right allows an individual to find out what information is held about him) being identified as one of the most important aspects of the legislation.In 1995, the European Union adopted its Directive (95/46/EC) of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (hereinafter, the Directive), establishing a detailed privacy regulatory structure. The Directive is specific on the requirements for the transfer of data. It sets down the principles regarding the transfer of data to third countries and states that personal data of EU nationals cannot be sent to countries that do not meet the EU “adequacy” standards with respect to privacy.In order to meet the EU “adequacy” standards, US developed a ‘Safe Harbour’ framework, according to which the US Department of Commerce would maintain a list of US companies that have self-certified to the safe harbor framework. An EU organization can ensure that it is sending information to a U.S. organization participating in the safe harbor by viewing the public list of safe harbor organizations posted on the official website.Data protection has emerged as an important reaction to the development of information technology. In India data protection is covered under the Information Technology Act, 2000 (hereinafter, the Act). The Act defines ‘data’ as, “‘data’ means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalized manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer”. Protection of such data and privacy are covered under specific provisions in the Act. In the recent past, the need for data protection laws has been felt to cater to various needs. The following analyses the position of data protection law with respect to some of the needs.Data Protection Law In Respect of Information Technology Enabled Services (ITES)India started liberalizing its economy in the 1990’s and since then a huge upsurge in the IT business process outsourcing may be witnessed. Financial, educational, legal, marketing, healthcare, telecommunication, banking etc are only some of the services being outsourced into India. This upsurge of outsourcing of ITES into India in the recent past may be attributed to the large English-speaking unemployed populace, cheap labour, enterprising and hardworking nature of the people etc. Statistics have shown that the outsourcing industry is one of the biggest sources of employment. In a span of four years, the number of people working in call centers in the country supporting international industries has risen from 42,000 to 3,50,000. Exports were worth $5.2 billion in 2004-2005 and are expected to grow over 40% this fiscal year. US is currently the biggest investor in Indian ITES, taking advantage of cheap labour costs. Statistics indicate that software engineers with two-years experience in India are being paid about 1/5th of an equivalent US employee.Concerns about adequacy of lawBPO FraudsWith globalization and increasing BPO industry in India, protection of data warrants legislation. There are reasons for this. Every individual consumer of the BPO Industry would expect different levels of privacy from the employees who handle personal data. But there have been situations in the recent past where employees or systems have given away the personal information of customers to third parties without prior consent. So other countries providing BPO business to India expect the Indian government and BPO organizations to take measures for data protection. Countries with data protection law have guidelines that call for data protection law in the country with whom they are transacting.For instance, in, the European Union countries according to the latest guidelines, they will cease to part with data, which are considered the subject matter of protection to any third country unless such other country has a similar law on data protection. One of the essential features of any data protection law would be to prevent the flow of data to non-complying countries and such a provision when implemented may result in a loss of "Data Processing" business to some of the Indian companies.In the recent past, concerns have been raised both within the country as well as by customers abroad regarding the adequacy of data protection and privacy laws in the country. A few incidents have questioned the Indian data protection and privacy standards and have left the outsourcing industry embarrassed. In June 2005, ‘The Sun’ newspaper claimed that one of its journalists bought personal details including passwords, addresses and passport data from a Delhi IT worker for £4.25 each. Earlier BPO frauds in India include New York-based Citibank accounts being looted from a BPO in Pune and a call-center employee in Bangalore peddling credit card information to fraudsters who stole US$398,000 from British bank accounts.UK's Channel 4 TV station ran broadcast footage of a sting operation exposing middlemen hawking the financial data of 200,000 UK citizens. The documentary has prompted Britain's Information Commissioner's Office to examine the security of personal financial data at Indian call centers.In the absence of data protection laws, the kind of work that would be outsourced to India in the future would be limited. The effect of this can be very well seen in the health-care BPO business, which is estimated to be worth close to $45 billion. Lack of data protection laws have left Indian BPO outfits still stagnating in the lower end of the value chain, doing work like billing, insurance claims processing and of course transcription. Besides healthcare, players in the retail financial sector are also affected. Financial offshoring from banks is limited because of statutory compliance requirements and data privacy laws protecting sensitive financial information in accounts. In the Human Resource (HR) domain, there are many restrictions on sharing of personal information. In the medical domain, patient history needs to be protected. In credit card transactions, identity theft could be an issue and needs to be protected. Companies in the banking, financial services and insurance (BFSI) sector and healthcare have excluded applications/processes which use sensitive information from their portfolio for offshoring till they are comfortable about the data protection laws prevalent in the supplier country.Since there is lack of data protection laws in India, Indian BPO outfits are trying to deal with the issue by attempting to adhere to major US and European regulations. MNCs have to comply with foreign Regulations so that they don’t lose on their international partners. There are problems involved in this. Efforts by individual companies may not count for much if companies rule out India as a BPO destination in the first place in the absence of data protection law.Today, the largest portion of BPO work coming to India is low-end call centre and data processing work. If India has to exploit the full potential of the outsourcing opportunity, then we have to move up the value chain. Outsourced work in Intellectual Property Rights (IPR)-intensive areas such as clinical research, engineering design and legal research is the way ahead for Indian BPO companies. The move up the value chain cannot happen without stringent laws. Further, weak laws would act as deterrents for FDI, global business and the establishment of research and development parks in the pharmaceutical industry.Looking to the above scenario, we can say that for India to achieve heights in BPO industry stringent laws for data protection and intellectual property rights have to be made. . Thus, a law on data protection on India must address the following Constitutional issues on a "priority basis" before any statutory enactment procedure is set into motion:(1) Privacy rights of interested persons in real space and cyber space.(2) Mandates of freedom of information U/A 19 (1) (a).(3) Mandates of right to know of people at large U/A 21.Once the data protection rules are enforced in India, companies outsourcing to India are unlikely to dismantle the systems they have in place straightaway, and move data more freely to India. Hence ,the need for data protection laws would win over the confidence of international business partners; protect abuse of information; protection of privacy and personal rights of individuals would be ensured; there would be more FDI inflows, global business and the establishment of research and development parks in the pharmaceutical industry & impetus to the sector of e-Commerce at national and international levels would be provided.Data protection law in India (Present status):-Data Protection law in India is included in the Act under specific provisions. Both civil and criminal liabilities are imposed for violation of data protection.(1) Section 43 deals with penalties for damage to computer, computer system etc.(2) Section 65 deals with tampering with computer source documents.(3) Section 66 deals with hacking with computer system.(4) Section 72 deals with penalty for bsignNow of confidentiality and privacy. Call centers can be included in the definition of ‘intermediary’and a ‘network service provider’ and can be penalized under this section.These developments have put the Indian government under pressure to enact more stringent data protection laws in the country in order to protect the lucrative Indian outsourcing industry. In order to use IT as a tool for socio-economic development, employment generation and to consolidate India’s position as a major player in the IT sector,amendments to the IT Act, 2000 have been approved by the cabinet and are due to be tabled in the winter session of the Parliament.Proposed amendments:-The amendments relate to the following[22]:(i) Proposal at Sec. 43 (2) related to handling of sensitive personal data or information with reasonable security practices and procedures.(ii) Gradation of severity of computer related offences under Section 66, committed dishonestly or fraudulently and punishment thereof.(iii) Proposed additional Section 72 (2) for bsignNow of confidentiality with intent to cause injury to a subscriber.It is hoped that these amendments will strengthen the law to suffice the need.Data Protection Laws In Order To Invite ‘Data Controllers’.There has been a strong opinion that if India strengthens its data protection law, it can attract multi-national corporations to India. India can be home to such corporations than a mere supplier of services.In fact, there is an argument that the EU’s data protection law is sufficient to protect the privacy of its people and thus lack of strong protection under Indian law is not a hindrance to the outsourcing industry. To enumerate, consider a company established in EU (called the ‘data controller’) and the supplier of call center services (‘data processor’) in India. If the data processor makes any mistake in the processing of personal data or there are instances of data theft, then the data controller in the EU can be made liable for the consequences. The Indian data processor is not in control of personal data and can only process data under the instructions of the data controller. Thus if a person in EU wants to exercise rights of access and retrieve personal data, the data controller has to retrieve it from the data processor, irrespective of where the data processor is located. Thus a strong data protection law is needed not only to reinforce the image of the Indian outsourcing industry but also to invite multi-national corporations to establish their corporate offices here.Data Protection And TelemarketingIndia is faced with a new phenomenon-telemarketing. This is facilitated, to a large extent, by the widespread use of mobile telephones. Telemarketing executives, now said to be available for as low as US $70 per month, process information about individuals for direct marketing. This interrupts the peace of an individual and conduct of work. There is a violation of privacy caused by such calls who, on behalf of banks, mobile phone companies, financial institutions etc. offer various schemes. The right to privacy has been read into Article 21, Constitution of India, but this has not afforded enough protection. A PIL against several banks and mobile phone service providers is pending before the Supreme Court alleging inter alia that the right to privacy has been infringed.The EC Directive confers certain rights on the people and this includes the right to prevent processing for direct marketing. Thus, a data controller is required not to process information about individuals for direct marketing if an individual asks them not to. So individuals have the right to stop unwanted marketing offers. It would be highly beneficial that data protection law in India also includes such a right to prevent unsolicited marketing offers and protect the privacy of the people.Data Protection With Regard To Governance And PeopleThe Preamble to the Act specifies that, the IT Act 2000, inter alia, will facilitate electronic filing of documents with the Government agencies. It seeks to promote efficient delivery of Government services by means of reliable electronic records. Stringent data protection laws will thus help the Government to protect the interests of its people.Data protection law is necessary to provide protection to the privacy rights of people and to hold cyber criminals responsible for their wrongful acts. Data protection law is not about keeping personal information secret. It is about creating a trusted framework for collection, exchange and use of personal data in commercial and governmental contexts. It is to permit and facilitate the commercial and governmental use of personal data.The Data Security Council of India (DSCI) and Department of Information Technology(DIT) must also rejuvenate its efforts in this regard on the similar lines. However, the best solution can come from good legislative provisions along with suitable public and employee awareness. It is high time that we must pay attention to Data Security in India. Cyber Security in India is missing and the same requires rejuvenation. When even PMO's cyber security is compromised for many months we must at least now wake up. Data bsignNowes and cyber crimes in India cannot be reduced until we make strong cyber laws. We cannot do so by mere declaring a cat as a tiger. Cyber law of India must also be supported by sound cyber security and effective cyber forensics.Indian companies in the IT and BPO sectors handle and have access to all kinds of sensitive and personal data of individuals across the world, including their credit card details, financial information and even their medical history. These Companies store confidential data and information in electronic form and this could be vulnerable in the hands of their employees. It is often misused by unsurplous elements among them. There have been instances of security bsignNowes and data leakages in high profile Indian companies. The recent incidents of data thefts in the BPO industry have raised concerns about data privacy.There is no express legislation in India dealing with data protection. Although the Personal Data Protection Bill was introduced in Parliament in 2006, it is yet to see the light of day. The bill seems to proceed on the general framework of the European Union Data Privacy Directive, 1996. It follows a comprehensive model with the bill aiming to govern the collection, processing and distribution of personal data. It is important to note that the applicability of the bill is limited to ‘personal data’ as defined in Clause 2 of the bill.The bill applies both to government as well as private enterprises engaged in data functions. There is a provision for the appointment of, “Data Controllers”, who have general superintendence and adjudicatory jurisdiction over subjects covered by the bill. It also provides that penal sanctions may be imposed on offenders in addition to compensation for damages to victims.The stringency of data protection law, whether the prevailing law will suffice such needs, whether the proposed amendments are a welcome measure, whether India needs a separate legislation for data protection etc are questions which require an in-depth analysis of the prevailing circumstances and a comparative study with laws of other countries. There is no consensus among the experts regarding these issues. These issues are not in the purview of this write-up. But there can be no doubt about the importance of data protection law in the contemporary IT scenario and are not disputable.
-
What are Bitcoins? What are their working process? What are the impacts of Lakshmi Bitcoins in the Indian economy?
Introduction to Bitcoin:When I read about Bitcoin, I was amazed at knowing that there existed an electronic currency and that there are millions of users worldwide who are using a medium of this electronic currency called bitcoin. I was shocked to know that in the beginning or the early years of bitcoin, 10000 bitcoins were used to simply order a Papa Jones pizza. I bet the one who ate that pizza must be really disappointed at the price he paid for a pizza which would have been amounted to $39289900 ($39 Million) today. Can you imagine a pizza worth 39 million, he could have bought the entire Papa Jones Pizza chain if he wouldn’t have had that pizza and would have kept his bitcoins intact.Now, getting a little serious, let’s talk about what I know to be bitcoins (These are my understanding, they may be wrong or inaccurate). Bitcoins is an electronic currency. Now what is an electronic currency? Ok, many of us would be having bank accounts right, now, many of us would be using the net banking facility wherein we make payments online from our bank account to a vendors bank account against receipt of goods or services, in this transaction, we don’t actually exchange cash issued by the central bank, but instead what happens is, the said amount reduces from payer’s bank account and that same amount is increased in the bank account of the recipient, resultantly, the money in the economy remains the same. Do you think that our banks actually exchange cash with the vendors banks, no, this transaction is executed by merely updating the electronic ledgers (Ledger is a record book that records information of transaction between parties, parties in our case are the banks) of the said banks wherein the payers bank reduces the said amount while the recipient bank increases the said amount and in addition, the said entry is also updated in a ledger maintained by the Central Bank. Hence, no real exchange of cash occurs between the two banks, simply their records are updated on a daily basis. Thus, the actual currency that is circulated physically (i.e. in the form of cash) in a country is way less than the currency being circulated in total in a country, usually this physical cash is 10% of the total currency in a country like India. Now, we can say that the currency in non-cash form is a form of electronic cash or electronic currency. Thus, we are already using our own currency in an electronic form if we are using facilities like net banking, debit cards, e-payment wallets etc. Now what is bitcoin, bitcoin is the same form of electronic currency, but the only difference is that it is not available in any form of cash, but is only available in electronic form, which means, we cannot get a paper which indicates that a central bank promises to pay the bearer a sum of 1 bitcoin. Bitcoin is 100% electronic and its existence is purely based on the ledgers or the records that are updated every second like the records that are updated by our banks and the central bank. Because, our banks update their ledgers and the Central bank updates its ledgers, we can fairly and squarely say that, our Central bank regulates our currency by ensuring in its master ledger that no false transactions are recorded in any of the bank’s ledger. Now how does a Central Bank regulate a currency, regulation of a currency is done by passing laws, putting restriction, giving loans, issuing cash, giving credit etc.So if Bitcoin is an electronic currency just like our money in our bank accounts, then what is the difference between Bitcoin and our currency also known as a fiat currency? What is the difference when both are in an electronic form? The difference is in the following ways:1. Transaction Intermediaries: In our currency, when we transact by sending money from our bank account to someone else’s bank account, what happens is that two intermediaries participate in this transaction. These two intermediaries are the payer’s bank and the receiver’s bank. In our transaction, we order our bank to make payment of our desired sum from our bank account to the recipient’s bank account and the recipient bank receives the said electronic payment on behalf of the recipient. Thus, when two people transact, there are actually 4 parties that come into picture namely, the main parties i.e. payer and receiver and the intermediaries the payer’s bank and the receiver’s bank. In the case of Bitcoin currency, what happens is the elimination of the intermediaries i.e. the payer’s bank and the receiver’s bank does not play any role in the transaction. The currency is directly transferred from the payer to the receiver. This is possible because of the blockchain technology (I will come back on this later). There is an advantage of Bitcoin users in this scenario, if a value is transferred from one person to another, no third party, no intermediary, no government, no FBI, no Interpol, no regulatory authority would be flagged in any manner or would come to know about this transfer of value as no third party is involved in this transaction. This makes Bitcoin a heaven for those who wish to evade taxes, who wish to launder money, who wish to store value without hiring a locker or keeping bodyguards around to protect wealth, who wish to sell contraband items like drugs and arms. These people would prefer selling their stuff for bitcoin, as they know that their proceeds are safe with them and that they would not be caught because no authority except the two parties involved knows about their transaction. Let’s say that Mr. A bought a house for Rs. 100000 in 2001 and Mr. A sells that house to Mr. B for Rs. 400000 in 2017. Mr. A receives the consideration in 2 forms, Bitcoins worth Rs. 300000 and a bankers cheque of Rs. 100000. Mr. A will report in his tax papers that he has sold his house in a no profit no loss price of his cost or less than his cost (considering indexation benefits), this will help Mr. A from paying capital gains taxes on the gain of Rs. 300000 received through Bitcoins. Mr. A being conservative would go to a commodities trader and ask him for physical gold against bicoin and will buy gold worth Rs. 300000 against his bitcoins. Thus Mr. A will buy unaccounted gold worth Rs. 300000 and also save capital gains taxes from his sales transaction. The income tax department will not be able to prove that Mr. A has received any other consideration over and above Rs. 100000 in cheque (unless ofcourse they search his home and find unaccounted gold worth Rs. 300000, which Mr. A would say that is of his ancestors and that he would be happy to pay inheritance tax if any).2. Ledger Maintenance: We read above that when we transact in our local country currency, we are compelled to involve the intermediaries i.e. our banks. We understood that our banks are needed, because, these intermediaries are the institutions who keep our money in the electronic form by regularly updating their ledgers. Now how do they update their ledgers? Do they do it after every transaction? No, let’s understand this with an example, say that we have total 2 banks in our country namely A and B, and both banks have 1000 customers each who transact with the customers of other banks. What happens is that at the end of the day, both banks sit together with their ledgers and calculate the amount payable by bank A to B and the amount receivable by bank A from B based on the transactions made by the customers of these banks. If the amount receivable by A from B is more than that of the amount payable by A to B, then the net difference between amount receivable by A from B and the amount payable by A to B is the net amount of increase in the books of A while the same is reduced in the books of B and vice versa. This ultimate net transaction is recorded in the books of the Central Bank which keeps the records of the banks in a country. In the bitcoin transaction, the reason we don’t need banks as intermediaries is because, the ledgers are updated by the nodes or miners who verify and authorize a transaction. The updated ledger of bitcoin users is declared and the updated ledger of all bitcoin users is informed to every bitcoin user after every transaction. This means that no bulk or net settlement is required in the bitcoin universe, why is it not required is because every bitcoin wallet holder is like a bank of our system and every transaction between users is like a transaction between two banks. After every transaction, the records are added in the public ledger which is in the public domain. Every transaction is systematically updated in such a manner that no duplication or double use of balance happens by any user. E.g. A has 10 bitcoins and A transfers 5 bitcoins to B and 10 bitcoins to C. Now the technology is so designed that after the first transaction from A to B, the ledger of A is updated to 5 bitcoins by reduction of 5 bitcoins in his balance and the ledger of B is updated to 5 bitcoins by increase of 5 bitcoins in his balance. After this first transaction by A to B, the updated balance is verified and is declared as an update to the public ledger that is being maintained in the hands of every bitcoin user. After this update, the second transaction of A to C of transfer of 10 bitcoins will be rejected as every public ledger will declare that as per their updated records, A does not have sufficient balance to transfer 10 bitcoins to C, as the updated ledger clearly indicates that the balance of A is merely 5 bitcoins after the first transaction from A to B. This settlement system is extremely precise and is so accurate that A won’t be able to do any kind of fraudulent transaction over and above its balance. This idea and execution of accurate public ledger maintenance is the blockchain technology.3. Privacy: In our currency, the electronic form cannot be privatized from the eyes of banks, regulators and the government. If we have a bank account, our bank knows how much money we have in our account and what transactions we do using those money, our government knows it, our government is informed by the banks for every transaction that surpass a certain amount as the banks are legally bound to report so. A person holding more than a specific number of bank accounts is also flagged and the government is informed about the same. Bitcoin is way more private for its users. Every bitcoin user is provided with a public key and a private key to their bitcoin wallets. These keys are alphanumeric codes that are unique for every wallet. A user may have as many bicoin wallets as they want, hence there is no restriction in the number of accounts that a user wishes to maintain. And no one can know from the public key about the owner of the bitcoin wallet. The privacy of bitcoin is one of the many reasons why people doing illegal business prefer it to be a utensil of value, they very well know that the first rule of doing an illegal business is to not get caught, and they try all the measures to secure their privacy, one such preferred measure is to accept bitcoins as a medium of cash because of its privacy feature.We read about the introduction of Bitcoins and the basic understanding about bitcoins that I have. We also came to know about the advantages of bitcoins when we tried to find the difference between bitcoin as an electronic currency and our fiat currency as an electronic currency. Let us move on to why I feel that BITCOIN is BOUND TO FAIL and why I feel that such failure will be another lesson for the world to know how gullible the people are.1. Advantages of Bitcoin: As I described before the advantages of Bitcoin makes it a utensil of value for people who wish to pursue illegal businesses. This will in long run invite government intervention and regulations to keep a check on circulation of these utensils. Bitcoin is too private to be owned and hidden from a government that has an army and a defense budget going into billions of dollars every year. If bitcoin will come in the way of government’s motives to curb crime, it will not take more than a signature of the president or the prime minister to pass a regulation to ban this crypto currency, resulting into the downfall in its price. Because of its grave advantages, a government might presume that whosoever holds bitcoins or deals in bitcoins is involved in any kind of illegal operation and may try to point all the holders or traders of bitcoins to instead prove their innocence.2. National Currency Vs. Global Currency: When a country issues currency, the said currency is owned and regulated by a powerful institution known as the government. Apart from regulating its currency, government has power to impose taxes on people. This power of imposing taxes is the power that can nationalize the efforts of the people of the country. Governments take several measures to ensure that the currency of their country is valued according to the needs of the country. They control the interest rates to ensure required liquidity so as to keep the economy stable and growth oriented. Bitcoin is not regulated by any central government but by a software that mathematically controls its supply. The supply is predetermined and the time is also predetermined. A fiat currency has the backing of a powerful government behind it, the people who are in power in the government have their interest in the economy being stable, this self interest will ensure that the government takes necessary steps to keep their currency stable in value. If the economy plunges, it becomes hard for the people in power to get re-elected. Thus the entire system of fiat currency is designed in the manner that its volatility can be controlled to a certain extent. Bitcoin on the other hand has no governing body. Its value is purely based on the number of users using it and the pre-determined supply. Imagine if all the Bitcoins ever mined are bought by 1 person, will it hold its value? No. That 1 person will be the most unluckiest person for he would have spent a fortune in accumulating something that is not backed by any powerful agency and it has no secondary market. To be frank, Bitcoin is an illusion of value, it’s just a number in an application and this number derives its value because many people think that it’s valuable. It’s not gold, silver or diamond which will find its value in the secondary market, if not in the primary market. It’s not a legitimate currency issued by a powerful country and backed by the same. It’s simply valuable because so many people have made a huge investment to become miners and these people feel that they are doing a valuable job running their machines.3. Heaven to Money Launderers and Tax Evaders: As we read earlier, the advantages of bitcoins are majorly exploited by people who are involved in illegal operations of any kind or who wish to evade taxes from gains in transaction. Bitcoin is heaven for them. Taxes are the only sources of revenue for the mighty government. Taxes are the only source of income for government. When the Government will realize that a tool is being used that is causing their treasury to remain empty, it will start its witch hunting and this will be a deadly witch hunt. You may kill a few solders and you will be spared but you try to take away power from the powerful and you shall see the fury like no other. If I can evade 25% of capital gain on Rs. 300000, it amounts to Rs. 75000 and all I have to do is take my receipts in bitcoins and to avoid any speculative loss simply sell it against gold or any other financial instrument off-shore or I can help someone else evade his taxes by buying his property using my bitcoins. Now my profit of Rs. 300000 in a property in India is a meager token amount, the real gains goes into crores, imagine if the gain is no just 300000 but Rs. 30 million. Thus, this 25% of tax evasion is compounded with every transaction that involves bitcoin as a medium of exchange. Governments around the world would soon realize this and would in no case tolerate this. China has started realizing and so will other countries.4. Threat of new Crypto currency: Just as we learnt above, that the value of Bitcoin is derived because so many people agree to the value. As other software developers realize the potential, they may develop such other cryptocurrency based on the same blockchain technology. This will lead to introduction of so many different cryptocurrencies and people will keep on shifting to every new currency that has low value initially but will have the potential to become big just like bitcoin. This will lead to busting the bubble of bitcoin crashing its prices due to the shift. This crash will result in distrust of people on such cryptocurrencies and will eventually lead to the crash in every crypto currency. As I am writing this, I found that there are atleast 100 crypto currencies in the market in existence. Bitcoin, Ethereum, Ripply, Dash, Litecoin are few (https://coinmarketcap.com/). The bigger this list gets, the riskier, these kinds of instruments become. If a software developer can create a valuable commodity, just by writing a programme, then there are millions of coders and software developers who can make a million cryptocurrencies.5. Mining community: An important reason for bitcoin being so valuable is because of the mining community. Miners are the people who play the role of Nodes who verify and authorize transactions and thereby help sustain and update the public ledger. Miners are like the Central Bank for bitcoin users. Now for the purpose of authorizing and verifying a bitcoin transaction, these miners have to deploy huge computer processing power to solve difficult mathematical equations so as to approve a transaction. So as to deploy a processing power, these miners have to buy and invest in huge GPU (Graphics Processing Units or lets say, expensive processing units) and these GPU’s require a lot of electricity to function. All this adds to the cost of mining process. These miners bear these costs because, as a return against verifying the transaction, they get a fractional bitcoin as their processing fees. For miners to make profit, these fractional bitcoin should have a value more than that of the cost they bear. However, the supply of these fractions is limited in such a manner that only 12.5 bitcoins are issued every 10 minutes. If the number of miners increase, the fractions reduces as the supply is limited, and these fractions will further reduce because, every 4 years, this supply would be halved so as to create an artificial scarcity. The only reason why miners continue to mine bitcoins is because its value keeps on rising, making the fraction mined to be profitable. If the value of bitcoin plunges, this fraction earned will no longer remain profitable and the miners will be losing money for the cost they incur to mine a bitcoin. Personally, I feel that the GPU makers are playing a big fraud on the customers of their products. If mining would be extremely profitable, then the manufacturer would use the products to mine bitcoins himself rather than to sell the processors. It’s common sense that if a tool can make me earn a substantial sum, the tool maker would not sell the tool, but would use it, if I get the plates to print money, would I be fool enough to sell those plates?. Also, if a group of miners feel that the value of bitcoin is stagnant, they may shift to mining some other cryptocurrency which is new and still a bit cheap.6. No Fundamental Value: Bitcoins don’t have any fundamental value, not even an artistic value. A painting of a famous artist is valued because art curators value that art, the day majority of these art curators shift to some other art, the value of their curated value drops to a great extent. Still, a painting has a form, it can be seen, touched and felt. There exists no such base for bitcoins. It’s value will remain and grow until its users or believers remain in greed, ignorant, avoid rationality and remain stuck to delusion. The day majority of these users come to their senses and rationality and realize that what they are holding onto is merely a number in an application, they will start selling their bitcoins consequently crashing the currency. Only those who come to their senses early and will exit early may save their money. Once panic selling starts, the fall will be drastic and no government will be able to bail out anyone, they will simply laugh it off. It being a global currency will have the same impact in every country. If a person invests in gold and if the gold market in a particular country deteriorates, then the owner of such gold has the opportunity to get a good value of his gold in some other country, however, this will not be the case for bitcoins, once panic selling starts, every country will start dumping their balance and the one who will be stupid enough to buy then would be the biggest loser. Many of the believers of Bitcoin have not heeded to the lesson of 2007-08 housing crises. The CDO’s (Collateralized Debt Obligations) had a base of the inherent real estate that was mortgaged, this real estate was physical, tangible and though it was inflated in value, it still had an inherent value. There was one more instrument called Synthetic CDO’s which had its base in CDO’s, if the CDO’s failed, the Synthetic CDO’s would also collapse, now this base was less tangible, less physical, and had less inherent value. Bitcoins are even worse than the synthetic CDO’s because they don’t have any base at all. The survival of bitcoin can be purely because there is no clause of interest payment to the holder of the Bitcoin and hence there is no chance that Bitcoin would default. The only return that a Bitcoin as an asset can provide is the return of capital gain in its value and the return of taxes evaded using it (Which is substantial btw, though illegal). If I can evade 25% of capital gain on Rs. 300000, it amounts to Rs. 75000 and all I have to do is take my receipts in bitcoins and to avoid any speculative loss simply sell it against gold or any other financial instrument off-shore or I can help someone else evade his taxes by buying his property using my bitcoins. Thus, this 25% of tax evasion is compounded with every transaction that involves bitcoin as a medium of exchange. Governments around the world would soon realize this. Thus with bitcoin being a medium, an illegal tax evasion is the only return that a user can get apart from its appreciation in price. A country with higher income taxes and capital gain taxes will be the place where bicoins will be most preferred and valued and that country would lose a lot of income because of this currency. Though this tax return is high, it is basically, tax evasion and though it sounds like a smart thing to do, it’s more like stealing from the government.7. No Security: Government security is not available to protect gullible investors of bitcoin. There is no gold deposit reserves, there are no diamonds, there is no receivables of debt based on which this currency is issued, the only security is mutual trust of users and this kind of security is an extremely weak kind of security.8. Competition to powerful nations: Every country and the managers of country wish to be in power in all forms including the economic form. If a government of the country is robbed of its power to control the economy of the country, it would not let it happen, it would fight it till it defeats its enemy. If one person holding power declares that a certain currency would have no value from the next day, that currency would not have any value from the next day, this is power demonstrated by the PM of India during Demonetization. If POITUS would declare the same about Bitcoins, they will face the same death.9. Imposition of regulations: So as to not let bitcoin become a safe heaven for money launderers and tax evaders and to prevent its treasury from being robbed, Government will either ban the cryptocurrency or will draft laws and regulations to regulate the same in the hands of its users. These regulations will destroy the advantages and the only reason why Bitcoins have its value i.e. of tax evasion and privacy that are currently inherent in Bitcoins. Once these advantages are destroyed, it will be hard to gain anything out of Bitcoins. People will shift to fiat currency which would atleast give interest and which would have an advantage of being backed by the government, resulting into the grave fall in demand of bitcoins. Resultantly, Bitcoins and all other cryptocurrency would crash. If a government regulates gold, then the holder has an option to sneak into some other nation and sell that gold, what option would a bitcoin holder have??10. Inheritance issues: What if a person dies with so many bitcoins in his account but in his will forgets to mention the private key to access the wallet by his heirs? Apparently there exists no way to verify that a wallet is of a person other than through his private key. If a person dies or loses his private key, that value conversion vanishes with the death of a person. For money in a bank account, an heir can claim funds and if proved to be an actual heir, a bank is obliged to give the money to such heir. No such process is apparently available for bitcoins. Also, a private key is a long alphanumeric password extremely hard to remember. The only option is to write down the private key in a piece of paper, laminate that paper and put it into a locker and keep the key with oneself till one dies and then in the will, give the location to that locker with the key.So when will the Bicoin crash?Bitcoin will crash when the governments of world will start realizing that their coffers are being depleted due to the use of a crypto-currency. OR Bitcoin will crash when the masses would realize that they are buying something that does not have any inherent value other than the value of stealing from one’s government through evasion of taxes. OR Bitcoin will crash when the miners will feel that the price of Bitcoin is saturated and will not go any further and that there is no point in investing in more powerful GPU’s, instead, it would be profitable to shift to a new crypto-currency which is in its infancy stage. OR Bitcoin will crash when the believers would think rationally again and would realize that the illegal benefits that they are reaping could cause them to face jail time. Sooner or later, Bitcoin will crash and it will crash along with other crypto-currencies crashing like hell.Can Bitcoin survive? What is the summary?Bitcoin may survive if there is an authority that would assign gold value to bitcoins in circulation. Bitcoin may survive if bitcoin founders clearly give a minimum value to it by creating a gold or silver reserve for bitcoins in circulation. Any crypto-currency with an inherent reserve of value will survive if that inherent reserve is traditionally accepted as a reserve of value like gold or silver or platinum etc. Such crypto-currency may have a value more than the inherent reserve because of the illegal returns (returns of tax evasion) attached, but, when the crash starts, the only crypto-currencies that would survive will be the ones having such fundamental base as being backed by a gold reserve or silver reserve, because such currencies are not backed by any nation or any government.The block-chain technology on the other hand will not just survive, it will flourish like anything. Governments will realize that they can have an alternative to banks transacting on people’s behalf and this may influence them to issue their own government backed crypto-currencies (obviously with the required conditions so as to not misuse them to evade taxes, eg. Only one account per person). This will be a big hit for the public as the public will not be in need to approach banks for digital transactions, it will save a lot of processing fees. This will be a big blow to the banking sector and for processing companies like visa, master-card, rupay etc., banks will lose current account holders, people will prefer transacting in crypto-currencies issued by the country. Then, the most powerful institution would again be the government. No bank would be able to influence such crypto-currency except the government.(The answer is long and is merely an opinion, I can be wrong.)
-
Is the cryptocurrency Bitcoin a good idea?
Yes.Here’s the problem: most people who know a lot about Bitcoin can only speak “tech”.I was at a conference recently. I was the keynote speaker but had zero talk prepared (as usual). It was a crowdfunding conference so I “crowdsourced” my talk.I asked the audience: I can talk about entrepreneurship or I can take fifteen minutes to explain Bitcoin without using any technical jargon. Clap for which one you want.Almost 100% of the people wanted to learn about Bitcoin without the technical jargon.People are hungry for this. They don’t want to hear about “crypto” or “blockchain”. They just want to know what all this Bitcoin stuff is about.Back in 2013, I thought Bitcoin was a scam. I was wrong.First, some credentials.In early 2013 I had my doubts. I started reading everything I could. Then I got my hands dirty.I’ve been a coder / programmer since 1985. I decided to code up a Bitcoin only store (maybe the first ever) and sell my book, “Choose Yourself” on it before it was released on Amazon.It was very hard. I had to develop the store from scratch since there were no easy tools to help me. There still isn’t (hint: business opportunity).Once I launched it, quite a few people bought my book. I sold a PDF of my book for 0.1 Bitcoin. Bitcoin was then $60 so I sold it for about $6 per PDF. Right now, it’s as if I sold each PDF for $1600. I sold many copies.I went on CNBC when they heard I was doing this. The anchor asked me, “Did you just do this for publicity?”I said, “Well, I’m on national TV so I guess it worked.”Another thing worth noting: Most of my customers came from one domain name (they had to submit their email addresses for me to process the sale): Amazon.com. Make of that what you will.A few months ago I started writing about cryptocurrencies again. I saw so many people getting involved in scams, I wanted to help.The other day I had an Uber driver who thanked me during the car ride for helping him “get it”.And last night at a restaurant, the waiter at the end of the meal shook my hand and thanked me for helping him “finally” begin to understand what Bitcoin was about.In order for crypto currencies to succeed, people need to understand at a basic level what they are. Nobody needs to learn complicated cryptography or blockchain.Just understand why now. Why this is important for us a society.TWO CRITICAL REASONS BITCOIN IS HISTORICALLY IMPORTANT AND HERE TO STAYJust understand these two reasons. Then you will know the potential for Bitcoin. And you will be popular at cocktail parties.A) THE HISTORY OF MONEYEvery new style of money solves the major problems of the last style of money.BarterIf I have a bag of rice and I need shoes, what if you make shoes but you only need 1/2 bag of rice. Do I get 1/2 a pair of shoes?Barter has a lot of problems. In the above, coming up with the rice to shoes exchange rate is difficult.Then coming up with 1000s of exchange rates just to go out and buy groceries is almost impossible.PLUS, what if you have to move (your kingdom is attacked). How are you going to carry all that rice? All of those shoes?Money has two purposes:as a store of wealth / savingsto make transactionsThere’s a third, which Ray Dalio, the head of the largest hedge fund in the world, Brigewater, told me the other day. But we’ll get to that later.Barter is horrible as a store of wealth. And for transactions, best case it’s very difficult.But problems lead to opportunities. Which leads to…2. PRECIOUS METALS / COINSGold and silver are scarce. It’s hard to mine them.But it’s hard to forge them because you can measure by weight.So the scarcity combined with the lack of forgery makes them good choices for money. I can convert my rice into gold coins, you can convert your shoes into gold coins, and now we can trade and now we can buy whatever we want.(Marcus Aurelius on a gold coin)As a store of wealth, it’s not great but not horrible.If my kingdom is attacked and I have to move, gold and silver are easily stored and carried as designed jewelry.BUT, two problems.One: what if you live in a country that doesn’t have any gold mines. Now you either have to trade for gold or start attacking countries: (this did not work out so well for the Aztecs).Two: What if you wanted to buy a house right now: are you really going to bring a truck of gold bars to the closing? Or if you have to move to another country and you have a lifetime worth of savings: are you going to ship all of your gold bars to your new home?People say that gold is “real” as opposed to (later) paper money and cryptocurrencies.This is not really true. Gold is a rock. But it does have industrial uses (silver is better for this because of price but still…). Gold and silver are great electric conductors, can be used as SILVERware. Can be used as antibiotics (hence great for fillings on teeth).So we can say that gold money is “backed” by something that has real use with value associated with it.But we still have to solve the problems above.3) PAPER MONEY BACKED BY GOLD AND…PAPER MONEYCountries made paper money that was like a contract with the government that all of that money can be converted into gold.This was great for transactions (easy to carry paper money).This was great for store of wealth (put the money in a bank and you can go anywhere). The first banks for paper money backed by gold helped fund every war in Europe in the 1800s. Good job!When paper money is backed by gold it also puts a clamp on inflation. You only have as much paper money in a country as there is gold in that country.(yes, there is a 100,000 dollar bill in the US. Woodrow Wilson is on it).So you can trust the government to not go crazy printing money that is not backed by gold (like German in the 1920s when trillions of Marks were printed and Germany went into an inflationary death spiral that was at least one cause for World War II).BUT, why benefit the countries where gold is easy to mine and punish the countries where gold is hard to mine.Also, the world is expanding in every way: more people, more technology, more innovation, more THINGS.I’m not sure this is a good thing or a bad thing (see: Germany above) but sometimes countries need to balance debt with money printing to manage their fiscal policy.The US went off of gold in the early 70s in order to fund the financial needs of both the Vietnam War and the social improvement programs of Lyndon Johnson.This created inflation.Paper money will often lead to this situation. Someone will say: why do we need the gold part?Again, might be good or bad. There’s a lot of debate. Did money printing save the US in 2008 and 2009? Maybe. Or will their be future problems caused by this? Maybe.Nevertheless, there are other problems with paper money that need to be solved:a. No privacy.If I’m making a sizable (greater than $1000) transaction I’m usually not using cash but either a credit card or a money wire.So that means your bank knows. Other banks know (the bank you are sending money to, the Federal Reserve, the local Reserve bank, etc).Government agencies know (the IRS, the NSA, etc etc).Potentially sites like Google and Amazon know depending on what payment services you use and what you are buying.So you have no privacy on your transactions with paper money.b. Fees.If I send a friend in Korea money, I go through my bank (fee), local reserve bank (fee), Federal Reserve (fee), International wiring system (fee), their central bank (fee), their local reserve bank (fee), their local bank (fee).That’s a lot of fees. Those fees help create inflation because every transaction needs to have a profit on top of those fees.c. Forgery. Something like $200 billion in forged money is circulating right now.d. Human error. This is a CRITICAL problem. There are so many opportunities for human error. When you transfer money, they can send to the wrong account. Or a bank’s software can be hacked and you lose all of your money.Or, most importantly, the Federal Reserve in the US can decide to print another trillion (Like 2009) and, without your permission, the value of your dollar has gone down.In the US we’ve been lucky. But all of South America hasn’t been so lucky (all of their currencies crashed in the 80s. Most of Asia wasn’t so lucky in the 90s (their currencies wiped them out). Russia in 1997 was wiped out.Many countries have relied on humans to print (or not print) money and the slightest human error can wipe out an entire country’s economy.The United States has been lucky. For now. But this is a HUGE error we risk every day.These are the basic problems. There are more (theft, for instance).e. What is backing paper money?Only our trust. I don’t want to be a conspiracy theorist. But the reality is: a dollar is a piece of paper. Just like gold is just a rock.How do they make us trust that the money has value?They put “In God We Trust” on it. They put George Washington. They put the signature of the Secretary of Treasury (pretending it’s a contract.).And, for the weirdos, they even put a pyramid with an eye on it.And that’s supposed to be why we trust it. I don’t trust it.4) BITCOIN (and, btw, Bitcoin is not the end. There will be a “5”).Bitcoin solves the problems above.a. Human error: there is no printing of money. There is a fixed supply of 21,000,000 coins.How do I know this? I’m a skeptic. So I read the software behind Bitcoin. I read it over and over until I could figure it out. In one part of the code they clearly define how many coins can be “mined” / printed (printed is the wrong word but I’m using it here to make the connection with paper money). And there’s another part of the code which “enforces” the first part.(part of the code that limits the total # of bitcoins to 21,000,000. I found this by reading ALL of the code for bitcoin).b. Theft. Like with every other form of currency, an exchange (like a bank) that stores your Bitcoin can be hacked and money stolen.BUT, I only keep a small amount of money in an exchange. You can get a storage drive, store your money, and put it in a safety deposit box. So even if the exchange is attacked, you still have your money.ALL theft can be prevented this way with Bitcoin. You can’t do this with paper dollars because if you have too many dollars, how will you store it? Ditto for gold.c. Forgery. The software guarantees that Bitcoins can’t be forged.d. Privacy. I can send you a Bitcoin and nobody knows who is sending it, who is receiving it, and no government institutions are aware of it.e. Fees.Some bitcoin transactions have small fees. But it’s nothing like the fees of going through six banks in the transaction described above.What’s backing it?There’s about 1000 man-years of science backing Bitcoin.The underlying technology of Bitcoin which involves heavy amounts of cryptography, financial know-how, and basics of contract law, plus the “blockchain” have 100s of use-cases that we have only just begun to play with.EVEN IF Bitcoin is never used as a coin (although note: it’s being used every day as money) there are 100s or 1000s of other uses for Bitcoin that have nothing to do with the basic money use.I won’t get into the weeds here: but suffice to say that ALL of contract law can be (and will be) eventually replaced by Bitcoin.And ALL of logistics will be replaced by Bitcoin (e.g. UPS is replacing all of their internal logistics (tracking millions of packages every day going from millions of locations to millions of other locations) by Bitcoin technology.There’s nothing behind paper money or gold like this.Now…Bitcoin has problems also.Hence the need for other cryptocurrencies. But that’s ok and not the topic for here. Suffice to say, Bitcoin solves all the basic problems of paper money, which solves the problems of gold, which solves the problems of barter.HOWEVER, there is another reason why Bitcoin is here to stay and it’s so compelling.——EVOLUTION OF EVERY INDUSTRYEverything in life evolves. Not only species but ideas.Let’s look at some industries.MEDICINETheism: 500 years ago if you got sick, you’d either pray to a god to get better, go to a shaman, make a sacrifice, or assume you committed a sin that made you sick and would try to undo the sin.Humanism: Post-rennaissance, we had human “experts” called doctors who would either leech us to death, perform horrible surgeries that would kill us, or would pat us on the back, hammer our knee and say, “take two aspirin”.Doctors aren't bad. They’ve saved many many lives. But Humanism has it’s limits. A known fact is that, on average, the moment when a doctor is most effective is his or her first year out of medical school. After that, statistically downhill.Data-ism:Now when if you go to a doctor, you get tests. You get blood work, you get an MRI, an EEG, an X-Ray, the X-Ray might go into a database and an AI algorithm matches it against other X-rays (does it match a tumor X-ray or a non-tumor X-ray?). We even get genetic testing to see if our illness is in our chromosomes.Then, armed with data, often a computer will tell us the correct solution (and even a computer can do the robotic surgery needed), or a human will help interpret the data (but there’s room for human error here).(source: National Genome Research Institute)So Medicine has evolved fromTheism → Humanism → DataismLet’s pick another industry:WARTheism: 3000 years ago if two countries went to war, the kings would perform massive sacrifices to their gods the day before.In the Bible, whosever God was stronger (Baal versus Yahweh being a notable Hebrew battle), that group would win the war.Fragments of this exist right now: May the Force Be With You, said to Luke before he flies out to fight the Death Star.Humanism: For the past 500 years, whoever had the most humans on the ground, the most bullets, then the most planes, then the most bombs. ,would win the war.Data-ism:War is being fought every day now. EVERY SINGLE DAY. Every day, some country tries to bring down the electric grid of Poland.Every day, every Fortune 500 company is attacked by “bot armies” coming from…nobody knows.I’ve been involved in the cyber security space for 25 years or more.I once was talking to a company who helps Fortune 500 companies fight “bot armies”. All of the employees were top Phds who were the experts in their fields.One guy told me, “No matter how smart we are, they are smarter.”Who are “they?” The people making the bot armies. Where do they come from? We don’t know. They come from everywhere. They are just smarter than us.Elections are rigged. Companies are attacked. Information is stolen.We have been in World War III for at least 20 years and it will never end. Dataism has taken over war.Ok…MONEYTheism: “In God We Trust”Humanism: “George Washington”. A picture of Independence Hall. Or the White House. Anything. Anything at all so that we trust humans with what we are given in exchange for the hard labor we do every single day.Do we trust humans? I tend to trust humans. But that is maybe not so smart all of the time. Humans make a lot of mistakes and that’s been the downfall of so many companies, so many families, and so many…everything.Data-ism. Bitcoin and now other cryptocurrencies.1000s of man-years of science. 100,000s of lines of code that has been checked by 10,000s of the best programmers.Data-ism prevents forgery, keeps privacy, re-creates all contract law, avoids fees, avoids theft. And this is just a small sample of what data does for money.“In Data We Trust” for better or worse. But it works.The natural evolution of money has arrived. And it’s not only Bitcoin but other cryptocurrencies.FAQ:Why do we need other Cryptocurrencies?Why do we need more than one currency at all? Why is there a US dollar and a Canadian dollar.FOR NO REASON. Just an artificial border created in 1770 and we have two different currencies.Cryptocurrencies have what I call are “problem borders”.One coin is better than Bitcoin for making contracts (Ethereum).Another coin is better for privacy ((Zcash. A problem with Bitcoin is that although there are no names on a transaction, I can see the size and the time. So privacy is still a slight problem).Another coin might be better for solving a problem of decentralized storage (as opposed to storing all of your photos on one centralizes spot that can be hacked like Google Drive). Bitcoin doesn’t address this problem.Problem Borders create new currencies.Is it too late to invest in Bitcoin and other cryptocurrencies?Right now, this reminds me of the Internet in 1995–6. There’s a bit of irrational exuberance in new coins. Prices are going crazy.There will be a massive pullback. BUT, the legitimate coins are here to stay and will keep going.Amazon, of course, pulled back, when the Internet pulled back. Now it will eventually be a trillion dollar company. Many companies that started in the 90s have survived and thrived and were great long-term investments that have paid off.Cryptocurrencies are the “internet of money”. The internet is here to stay and so is the internet of money.We are only in inning one of the cryptocurrency shift in our money.Will cryptocurrencies replace paper money?Yes. Eventually. It might not be Bitcoin although Bitcoin will always exist.But each country, to solve the problems of paper money, will eventually switch. Countries that are debating it include: Israel, Estonia, Venezuela, Argentina.Countries that will use some aspects of cryptocurrency technology in their central bank will soon include China, Korea, Russia, and yes, the United States.And many countries will reject cryptocurrencies but their population will shift en masse to cryptocurrencies in order to avoid corruption, human error, theft, etc. First on my list for this is Argentina.What will the value of cryptocurrencies be?When I first wrote about this, all cryptocurrencies added up was about $200 BILLION. Now it’s around $750 Billion. Although I do view many of the currencies as scams so the number is really less.That’s the “SUPPLY” of cryptocurrencies.The DEMAND is the amount of paper money + gold that exists.That number is $200 TRILLION.So in order to go from ONE TRILLION to 200 TRILLION that’s a 200x gain. In other words, $10,000 turns into $2,000,000.And if you focus on the legitimate currencies, the gains are much greater.So, again, we are very much in the beginning of this. There is no other investment opportunity in our lifetime greater than this. And we ARE at the beginning.What are the legitimate cryptocurrencies?There are many. I don’t want to get into the weeds here and discuss all the technology.And I also don’t like all the speculative trading that is going on in cryptocurrencies. Speculation leads to scams and bubbles.But just like there were Internet companies that survived the bust and became the companies we use every day, there are cryptocurrencies that exist now that we will use every day ten years from now.You said on CNBC that Bitcoin will go to a $1,000,000? Were you kidding?No.Bitcoin hit $20,000 recently. We just said it could go at least as much as 200x higher. That’s $4,000,000. So even at $1,000,000, Bitcoin will be a buy.How else can one make money in the Bitcoin sector?You don’t have to be a software developer.When the gold rush hit in the 1800s, Levis Jeans became the big winner. And the companies that sold “picks” and “shovels”.There will be many picks and shovels companies in the Bitcoin space.Sites that have the latest bitcoin news and analysis will do well. Exchanges will do well. Companies that help integrate traditional companies with the deeper parts of Bitcoin technology will do well (like whoever is helping UPS integrate blockchain tech into their logistics).Companies that help new cryptocurrencies launch will do well.And on and on.Someone said you called “Bitcoin is a Ponzi scheme” in early 2013. Why should we trust you now?First, I’m always a believer that the best investment is in yourself. This will provide greater than 200x returns.That said, I was wrong in early 2013.I’ve been a software guy for 25+ years. I’m able to do my research. Which I did.By May 2013 I had already done enough research to build my own bitcoin store, go on CNBC and discuss Bitcoin, and be an advocate when it was just $60. This is all public info.But, for me, focusing on my physical health, emotional health, creative health, and spiritual health, will always be the most valuable “Currency” I can develop and trade in.Could Bitcoin be just a fad?No.Paper money DOES have the problems described above. Someone has to solve those problems. Bitcoin and other cryptocurrencies solve them.And every industry evolves. Cryptocurrencies are the “In Data We Trust” way in which money is evolving.And $750 BILLION believes in me on this.Who is Satoshi?Satoshi is the secretive founder of Bitcoin. He is worth many many billions in Bitcoin right now. He is anonymous and reporters, governments, etc have never figured out who he is.That said, a number of people know who he is. I read his blog every day, He is a secretive person and nobody wants to blow his cover.Well, what should I do now?Don’t listen to me.a. Get an account on Coinbase (or wherever). Buy $10 worth of Bitcoin just to taste and feel it.b. Then read. Read a lot.Here’s some books not about Bitcoin that are worth reading:Sapiens by Yuval HurariThe Evolution of Everything by Matt RidleyThe Ascent of Money by Niall Ferguson.Antifragile by Naseem TalebThere’s a lot of discussion of cryptocurrencies on Reddit and Twitter. DO NOT read those. Most of those discussions are filled with trolls although there are some decent sources there.Blogs / Sites: start with Coindesk and CoinTelegraph. You'll find the rest as you read more.
-
Did Malaysia ever have a strong and intelligent PM like Lee Kuan Yew?
Threats to the state come from outside and inside. In order to facilitate the planning of the enemy of Islam, their main agenda was to bring turbulence from within the country and cause the unity of the Muslim Malays to split. This is happening right now and the government is forced to spend hundreds of millions of ringgit to carry nerves of war to prevent Malaysia from falling into this scene.Malaysia has managed to eliminate the delicate and planned planning from outside because it has a very powerful intelligence network with the help of the Malaysian Armed Forces (ATM) troops and the Royal Malaysian Police (PDRM) Branch. Only a country with an intelligence network and a really good information network can only cope with many problems thrown into the country.Not a few other countries imitate the way Malaysia uses the concept of "Prevent Before it happen" through the Official Secrets Act which is now imitated by many foreign countries.Where other countries fail, Malaysia remains safe. Try to find out in this world, which country is inevitably disturbed by these "invisible hands", from Indonesia to the Middle East.So far our country is still capable of being defended and you can still go out to march, listen to Anwar or PAS talks and campaign for your political success in the Umno party, all because the Malaysian government and its cronies are struggling to struggle in order to enable you to do all this for FREE .1. To ensure security, the state must have an efficient intelligence network. To ensure sovereignty, the state must have a strong defence. It's easy to form.2. The basis for a strong intelligence network in Malaysia lies with the military, government bodies and the sources of income from government-owned companies with rich funds.3. I think it's funny when there are parties who raise the issue of "people's money", what is the people's money? I am confident through a state-owned privatization policy like Tun Dr Mahathir Mohamad, government corporations or GLCs can afford millions of ringgit to the Malaysian government (your people's money, your money safe in the bank and the Employees Provident Fund).4. it’s not easy to get the thing I mentioned in Paragraph 1 above because it's very expensive. It is a difficulties for Malaysian mentality to pay insurance because the importance of insurance coverage will not be seen unless it is an accident or a disaster.5. Simple example, we are headache when it comes to spending money on our car insurance and we (especially the Malays) are not interested in insurance-based investments.6. This is very different from developed countries such as Singapore, which considers internal and external defence budgets as an insurance protection to the security and progress of the republic.7. There are several parties conducting intelligence in the country and include several agencies in government ministries, the Royal Malaysian Police Special Branch Unit (PDRM) or the Special Branch, Kor Risik Diraja, the Malaysian Maritime Enforcement Agency, the Malaysian Armed Forces and Air Force and elements within the Ministry of Home Affairs and the Prime Minister's Department of Malaysia.8. Foreign and domestic intelligence elements lie on the shoulders of intelligence agencies such as the Malaysia External Intelligence Organization (MEIO), SB and the Kor Risik Diraja who collect information from abroad to be collected and linked to several issues within the country that are also compiled by the same agency or others agency who collect information from local sources.9. From the public, intelligence networks (networks to real intelligence agencies) will provide information to the Prime Minister's Department, for example, the Special Affairs Division (JASA), KEMAS, the State Bureau of Customs and specially appointed individuals identified as highly patriotic and pass strict security scores, and they are mostly made up of former military personnel in particular commandos.10. This intelligence information is sourced from human resources (HUMINT), signature and electronic intelligence (ELINT) and assisted by experts to analyse data, psychologists and skilled experts and called Cobbler (forged expert document) for the purpose of penetration.11. As the intelligence agencies abroad, the Malaysian security budget is assisted by formal budgeting such as the budget for PDRM, the Malaysian Armed Forces and the clandestine budget of government-owned companies (GLCs) such as the Armed Forces Fund Board, Tenaga Nasional Berhad and much more.12. The role of intelligence in Malaysia is actually greater than the Mission Impossible movie and if you are careful, last year there was an advertisement on JPM's web site where "Electronic Warfare" was needed, if we thought logically why a department of the Prime Minister needed an electronic warfare expert? Of course this expertise is channelled to security intelligence agencies under his auspices such as MEIO.EQUIPMENT13. Like any other intelligence agency, the delivery of intelligence information to the Malaysian government is also made through sophisticated equipment and not very sophisticated (not easy to hang) and this requires machines capable of making Chiper and Dechiper (either the latest model or which has been used since communist times again).14. There are tools produced by well-known scientists and individuals in Malaysia (names do not mention) to create the required gadgets whether the system for debugging or surveillance and communication interceptors.15. I'm not sure if this is true but the giant phone manufacturer (Nokia or Samsung) sells telecommunication equipment products which cost up to tens of thousands of dollars for the use of our intelligence agencies.16. Used vehicles are diverse and diverse including vans from travel agencies that never existed but the most popular are taxis.INVITATION IN COUNTRY17. In general, national threats exist from various parties sponsored by external clandestine elements such as MOSSAD, CIA, M16, SIS, SID and Singapore's sensitive intelligence elements that contain corporate, financial and military data and political data.18. Threats from outside countries such as Thailand and Indonesia are below the lowest level (they are considered a friendly country).19. The threat comes from a variety of forms such as economic sabotage, peace, politics, worsening the image of the country and various other subversive elements.20. I'm not sure if this story is true, when the crew of The Entrapment film creates shooting in Kuala Lumpur, a crew of some CIA agents has installed some electronic equipment (listening bug) at KLCC and Menara KL Tower.21. It looks like they've been tracked, since then it has been very few or no Hollywood film companies made film shooting in Malaysia. I however assume this story is just "rumours" only and it is uncertain.22.All the centre of threats based in Singapore which are the gateway into the country.23. There are elements that point out that there is sponsorship to the chaos in the country that is being inflicted by the elements of the opposition party as well as the subtle elements in Umno.24. Efforts are also being made to topple the Malay Rulers, their fall will move Malaysia into a republic and anybody can be the Head of State (if the people of this nation have been educated to disrespect the head of state, the prime minister ... we hear who And if we talk about the mufti, then we can hear what else? Finally, all leaders named Malays and Islam will be pushed aside and then we know but we are late for our own foolishness.25. DAP may be the best platform for the fall of an Islamic Malay kingdom like Malaysia. Anwar Ibrahim is just a puppet, the best question, who puts on a video camera where Anwar is swaddling with Chinese prostitutes? Who owns the place and the purpose of the camera in pairs? (Sorry, if Anwar is right, please do not). Police should investigate who the real owner of the place is.26. It's just a new, new political threat, not to mention the threat and sabotage of the country's economy and finances as well as various delicate threats aimed at reducing the identity of the Malays and Islam in the country.27.The problem is, no matter the external element, they still fail to study who the real Malays are. Failure to study the psychology of the Malays and they thought the Malays were the same as the Arabs.28. If provocation elements fail to be created through the country, it is likely that they will go to higher levels such as war with foreign countries and so forth.EXTERNAL SCREEN29. To undermine Malaysia, this country needs to be removed from its closest companion, Indonesia.30. The unity and density of these two friends must be shaken through some issues that may have been overwhelmed by third parties.31. This has been confirmed by the Defense Attache at the Indonesian Embassy in Kuala Lumpur, which claims to be a third party who tries to lead the relationship between the two countries.32. If this third party exists, they are sure to have substantial funding, operating and context centers within the government and corporate structures in both countries.33. Thanks to Indonesia having a very influential President and bringing the republican nation to a better future, as a former military ruler, Bambang Susilo quickly analyzes the situation and does not quickly push Sukhoinya's head towards Kuala Lumpur.34. Indonesia itself has a bitter experience, how these external agents are trying to destroy the big country and the reader's brother certainly remember in the 1990s, Indonesia was called the "Asian Little Dragon" because of its economic progress even having a company to make its own plane but in twinkle it destroyed when there was a reform movement that supposedly supported the rights of citizens and students.http://35.As a result of this reform movement, Indonesia's enemies have succeeded in separating Timor Leste with a view to further destroying the republican power of the majority of its population of Islam.36. Together we pray, so that the close friendship between the two nations continues to be established and their people and we are aware that there is a process to woo these two countries to remain hostile.37. At present, Malaysia's potential to fight with foreign countries is at zero level and if so, I bet in the next 10 to 50 years in crisis with Singapore or China.
-
What is it like to have ADD or ADHD?
Wow. So many awesome answers. I share much of what has already been described:* Brighter than almost everyone around me* Learn new things incredibly fast when engaged* See deeply into problems--develop an abstract understanding of a new area so much faster than others* Very, very good at anticipating problems and making a plan. Very, very bad at executing against it.* Terribly easily distracted, always starting and abandoning projects* Information junky LOVE to learn new things* Incredibly verbal and charming when I want to be. Witty and funny.* Viciously self-critical and sometimes viciously critical of others* Hate to wait, always late, procrastinate.* Finish people's sentences for them* Only care about getting the information I need. Please don't tell me why that task isn't done. I don't care. I asked a yes or no question: Is it done? * Being mistaken for a dick because my irritation over delay and distraction is mistaken for judgment about another's behavior or their output.* C student in high school, didn't graduate college. Sometimes spent more time helping others with their homework than doing my own.* Hated to attend lecture. The information came too slowly. Detested listening to others ask questions of the teacher. Why are they so stupid? This is a waste of my time. Learned on my own time in my own way.* Undisciplined about health. Don't take care of my health for years at a time. Then flip-flop to hyperfocused. Eat carefully, exercise every day, drop 40 pounds or more, then peter out and back to sloth.* No self-control around foods. Can't eat one cookie. The only way I can eat better is to not have the cookies around.* Tried drugs as a teenager but didn't like them. I literally didn't get what others thought was exciting about being drunk or stoned. Would 100X rather waste time reading a fascinating history book or playing a strategy game than feel impaired.* TV calms me if it is engaging. Enrages me when it isn't. Commercials usually make me want to tear my eyes out. Poorly written comedy makes me want to kill somebody. I can more-or-less only watch PBS and cable TV because the programs are commercial free. Documentaries are the BOMB. Who knew earth worms were so fascinating? And I feel so much calmer while I watch...* Radio calms me if it is engaging, Enrages me when it isn't. The increased volume of radio commercials and makes me want to firebomb car dealers and other radio advertisers. I am engaged only when I get a constant stream of just the right music or engaging information from people I respect. I can pretty much only listen to PBS and internet radio today.* Movies often bore me, unless they hit the right psychological note. Can't stand to watch shoot-em-ups, blow-em-ups, superpower-them-ups, hack-em-ups. Have to watch movies that show me nuance and psychological realities. When I do have to watch silly movies with my children, have to analyze the symbolism to death. * Always felt different. Always knew there was something wrong with me. Always felt lonely. Couldn't put my finger on the problem with me.* Couldn't achieve my potential. Couldn't even come close.* Verbally Impulsive. Have great trouble concealing a negative emotional reaction.* Will freely express a negative opinion of an idea. Can't understand why that would bother the other person. After all, I was only trying to help improve the idea... * Am not strongly attached to my own ideas. They come and go fast anyways. If you shoot it down, I'll go back to the drawing board and comeback with another.* Consistently underestimate the time I need to complete tasks.The only real thing I can add to what others have written is the depression and self-doubt. If you allow it to get to you, it can be so demoralizing to lose your wallet, phone or keys every morning. To once again leave the house without remembering that form you were supposed to return to the kids school. It sucks to constantly feel you are disappointing others. It sucks to feel you don't know how to love other people because your attention wanders the moment their needs don't require your focused attention. It sucks to know you set a bad example for your children. It sucks to know in the moment you are becoming obsessed over something inconsequential and have pursued it far beyond the point of behaving productively. It sucks to feel that you are self-centered because your need to have your anxiety reassured is so important you often can't suspend it when you should.ADD is the best of times and the worst of times. Sometimes I feel so powerful because it is so easy to put that blowhard in his place by pointing out the myriad flaws in his argument. Sometimes I feel so self-confident because I don't give a fuck what people think of me so I can say what I want. Sometimes I feel so awesome because I can do things with my brain others find incredible. Sometimes I feel hopeless because I can't get up off the couch to do the simple things that must get done today.
Trusted esignature solution— what our customers are saying
Get legally-binding signatures now!
Related searches to Invite Electronic signature Form Safe
Frequently asked questions
How do i add an electronic signature to a word document?
What is the original on an electronic signature document?
How to sign a pdf with time date stamp?
Get more for Invite Electronic signature Form Safe
- How Do I Electronic signature Illinois Police Form
- How Do I Electronic signature Ohio Real Estate PPT
- Can I Electronic signature Ohio Real Estate PPT
- Help Me With Electronic signature Illinois Police Form
- How Can I Electronic signature Illinois Police Form
- Can I Electronic signature Illinois Police Form
- Help Me With Electronic signature Ohio Real Estate PPT
- How To Electronic signature Illinois Police Form
Find out other Invite Electronic signature Form Safe
- Trace evidence worksheet answer key form
- Prescription renewal form optumrx
- Manitoba form
- How to fill schengen application pdf form
- Pgcps employment verification form
- Hilo international airport new badge application form
- Biology paper 3 questions and answers form
- Nics e check form
- Pfc604 attachment 33 application form for industrial tcs edu
- Generic child care sign in sign out sheet sites placercoe k12 ca form
- Irata assessment form 457322700
- Ref introduction letter form
- Application form for inter university migration certificate of malakand university
- Csi algebra answer key form
- Gsis membership form 44190943
- Statement of disability form
- Happy home public school redox student login form
- Planetary heliocentric longitudes form
- Apply nowmoody theological seminary chicago form
- Notice to quit to recover possession of property form