Saturday, 7 March 2015

How tax can be seen to work in terms of Beer.

I was reminded of this by a similar post on Facebook.
I decided to record it here, so that I can find it again.

Suppose that every day, ten men go out for beer and the bill for all ten comes to £100. If they paid their bill the way we pay our taxes, it would go something like this…
The first four men (the poorest) would pay nothing
The fifth would pay £1
The sixth would pay £3
The seventh would pay £7
The eighth would pay £12
The ninth would pay £18
The tenth man (the richest) would pay £59

So, that’s what they decided to do.

The ten men drank in the bar every day and seemed quite happy with the arrangement, until one day, the owner threw them a curve ball.

“Since you are all such good customers,” he said, “I’m going to reduce the cost of your daily beer by £20″. Drinks for the ten men would now cost just £80.

The group still wanted to pay their bill the way we pay our taxes. So the first four men were unaffected. They would still drink for free. But what about the other six men ? How could they divide the £20 windfall so that everyone would get his fair share?

The bar owner suggested that it would be fair to reduce each man’s bill by a higher percentage the poorer he was, to follow the principle of the tax system they had been using, and he proceeded to work out the amounts he suggested that each should now pay.
And so the fifth man, like the first four, now paid nothing (100% saving).
The sixth now paid £2 instead of £3 (33% saving).
The seventh now paid £5 instead of £7 (28% saving).
The eighth now paid £9 instead of £12 (25% saving).
The ninth now paid £14 instead of £18 (22% saving).
The tenth now paid £49 instead of £59 (16% saving).

Each of the six was better off than before. And the first four continued to drink for free. But, once outside the bar, the men began to compare their savings.

“I only got a pound out of the £20 saving,” declared the sixth man. He pointed to the tenth man,”but he got £10!”

“Yeah, that’s right,” exclaimed the fifth man. “I only saved a pound too. It’s unfair that he got ten times more benefit than me!”

“That’s true!” shouted the seventh man. “Why should he get £10 back, when I got only £2? The wealthy get all the breaks!”

“Wait a minute,” yelled the first four men in unison, “we didn’t get anything at all. This new tax system exploits the poor!”

The nine men surrounded the tenth and beat him up.

The next night the tenth man didn’t show up for drinks so the nine sat down and had their beers without him. But when it came time to pay the bill, they discovered something important. They didn’t have enough money between all of them for even half of the bill!

And that, people, journalists and government ministers, is how our tax system works. The people who already pay the highest taxes will naturally get the most benefit from a tax reduction. Tax them too much, attack them for being wealthy, and they just may not show up anymore. In fact, they might start drinking overseas, where the atmosphere is somewhat friendlier.

Friday, 20 February 2015

Priestwood and Garth, Facebook page.

Again; it is such a long time since I blogged. I suppose the coming of the next election has reminded me of keeping connected with people. I am a member of several Facebook sites, and have joined The Priestwood & Garth page at https://www.facebook.com/priestwoodandgarth . I expect to contributing there soon.
Priestwood and Garth Conservative team members.
 Graham, Alvin, Tina, aided by Jessica and Oliver.
The Priestwood & Garth Conservative Team have had regular walkabouts. The amount of walking about will be increasing soon when the election starts. We have already been out delivering good news about your Conservative run council. During the election period we along with the other parties will be delivering more literature.

Please read the literature that you get from Parliamentary, Borough and  Town candidates. This will help make your mind up as to how to vote.

You can also follow your local Conservatives on Facebook at https://www.facebook.com/BracknellConservatives
and the website at http://www.bracknellconservatives.com/ .


Friday, 23 May 2014

Post Mayor Posting

It has been a long time since I last blogged. Partly because I have the duties of Bracknell Town Mayor to attend to. So; Here is the report; well most of the report that I gave at the end of my year as Mayor.

This year has gone much quicker that I expected
When I sat down to compose a report, I wondered where to start.
I thought, let’s have a look in the website; ….. what do we tell people that the Town council does? It says…. Our mission is:

To be the guardian of Bracknell Town’s parks, play areas and public spaces,
and to safeguard them from possible future development.
To be responsible to the needs of all sections of our community to build upon
our achievements and provide high quality services at minimum cost.

This is evidenced by our recent commitment to helping the community in creating a Neighbourhood Plan. More will be talked about that later……
Later this evening, the new mayor will be presenting this years grant cheques to various deserving organisations. It gave me much pleasure to meet, as Mayor, with a great number of the recipients of last years grants, and to see the hard work and dedication of their many unsung volunteers.

It has been my pleasure to support the repair of Holy Trinity Church Roof and Youth Rugby this past year.
A member of the Mosaic Church, that is affiliated to Holy Trinity, gave an excellent speech at my Civic Service earlier this year about the values imbued in sports that can overflow into our lives. Through discipline, control and mutual self-respect, a fellowship and sense of fair play are forged, …..this is a set of laws that fit well with everyday life.

That brings me to the facilities provided by the Town Council; recreational facilities that can be accessed by all. My thoughts are first drawn to Calfridus way in Bracknell, where Rugby youth practices, and where many improvements have been put in place by the Town Council.
Recent projects have enabled us to provide improved play and exercise equipment for Town residents. The Sports Legacy Zone at Mill Park applied the latest thinking in social fitness and multi-use sports area design.

There have been other improvements to the Town Councils Recreation and Woodland areas. These facilities have benefited from the attendance of our environment wardens. Two of The Town Council Parks have gained Green flag awards, signifying that they are among the top in the country.
Numerous events have been held by the Town Council over the year, one I much enjoyed was the Teddy Bears Picnic.

During my Mayoral Year I have enjoyed many events, and visits, and as I started to mention above, it has been humbling to meet so many enthusiastic volunteers in the Town Area, these are people that serve us every day. My thanks go out to all those voluntary organisations that help us all.

I much enjoyed the progress of Bracknell in Bloom last year; meeting the contenders; meeting the Judges; and helping to hand out awards to winners. I am especially proud of the Towns children, in Schools and at Scouts, and youth clubs, who contributed, and passed on their enthusiasm to their parents. I hope next year that with everyone’s help that we will yet again be in the top, if not top of the winners nationally.
I would encourage everyone to look at the BTC website to see the range of things that we do. And please do sign up to the Facebook page to keep in touch with news and activities of the Council.

I have not held that many fund raising events this year, for one reason or another,  but am grateful to the Grange Hotel for their handling of the Tea Party, and The Old Manor for providing at a huge discount the hosting of the gathering after the Civic Service.
I would also thank the staff at the Town Council, who have been most supportive, under the guidance of our Town Clerk Russell Reeve.

Back to more blogging soon...

Thursday, 27 June 2013

Mobile Phones and Virus Issues

Antivirus programs are quite familiar to us on our desktops. As mobile operating systems have grown in
popularity, desktop type security concerns have followed. So trained are users that when Android antivirus apps began appearing, users saw them as a must-have. Given that there have been various bit of news about Android malware; users can’t really be blamed for making assumptions.
The trouble with apps is that they all run in the same sandboxed Java environment, which  includes the AV apps as well.  Most AV apps lack the ability to gain low-level system access on mobile that desktop antivirus would. This currently means that the best way to avoid malware is to understand how Android apps work.

When an app is installed, the system will always display permissions requested. See here  for an example. You can also find these permissions in the android settings for installed apps. These permissions are shown on a tab in Google Play) Some antivirus apps such as Zoner can display a list of apps and the number of permissions granted.
If a simple app asks for permission to send and receive SMS messages; that should be checked out by the user. Recent malware has been designed in such a way that by gaining rights to the phone, it can send text messages to premium rate numbers and also allow other attackers to carry out fraudulent activities. PC World reports that when first executed, Obad.a prompts users for device administrator privilege. Applications that gain this privilege can no longer be uninstalled through the regular apps menu until they are removed from the administrators list on the infected device. Indeed security researchers at Kaspersky’s lab have come across a Trojan virus, which is so strong that it might be almost impossible to remove.

The same problem exists for apps that allow phone calling permissions, potentially allowing them to call premium rate numbers without the user’s knowledge.

Another permission to check for is access to the contact list, and Google accounts. If you believe that the App should not be accessing this data, there is a chance that it is malware designed to collect user data for spamming or phishing. You might expect to see this permission is in apps that autocomplete contact names, or handle messaging actions.

The location permission could be used it for location-aware ads (might be useful), but a more questionable app could pick up a user’s location, and store it over time to sell that to advertisers.

The best way to stay safe on Android is to just stick to established apps from the likes of the official Android Market or the Amazon Appstore. While bad apps do occasionally show up in the Market, Google removes them swiftly and can also remotely kill the apps on phones.

There has been good evidence that a lot of free Android antivirus apps just don’t work, and could even cause people to believe they are protected when they are not. This might mean people taking take more risks with downloading dodgy software. There is a useful review here

Perhaps even worse is the latest scam imported from the PC platform, a form of which was recently identified by Symantec. Android Fakedefender locks people out of using other applications and can also change the settings of the OS, making it tricky for people to uninstall the malware.

Juniper networks says that the Mobile Threats Report, conducted by the Juniper Networks Mobile Threat Center, is one of the largest first-hand quantitative research studies of its kind. The report is based on analysis of more than 1.85 million mobile applications and vulnerabilities, up more than 133 percent from the last report released in February 2012.
Juniper says it's clear that cybercriminals are now rather than trying to crack into every system, are going after the most popular: Android which dominates nearly 60 percent of the smartphone market share. (Apple has slightly more than 19 percent and Microsoft has 18 percent.)

An interesting feature of Zoner mentioned above is the theft protection, which if enabled allows you to remotely control and locate your device via SMS messages. If you have lost it somewhere you can get a location or sound an alarm for people to notice it. (useful if you have left it on silent) If it has been stolen you will be notified when SIM is changed. It might also be used by your partner or others to track your location... 

Monday, 24 June 2013

Yet more hackers?

In the Daily Mail Littlejohn says:
 "Law firms, telecoms giants and insurance companies all hired criminals to harvest sensitive, confidential information. One of the country’s most prolific hackers, a private investigator, admitted that 80 per cent of his work was carried out on behalf of lawyers, wealthy individuals and insurers.
Other clients of hackers included a household name who broadcasts to millions of people every week; another celebrity who paid a firm to hack into an employee’s computer; and a businessman who wanted to obtain intelligence on rivals involved in a £500 million takeover bid.
Investigators routinely obtained everything from bank and credit card statements to itemised mobile phone bills"

This was following on from a report in the Independent that alleges that a suppressed official report accuses respected industries of hiring criminals to steal rivals’ secrets. Yet an official report into their practices has been suppressed.

An interesting part of the hacking process in the operation "Blaggers" who obtain key information that may be used in itself or facilitate the hacking of another system. This is referred to on the Information Commissioners Office website - Reports to Parliament. the May  report bring up an interesting list.

"Following the report the Information Commissioner received a request under the Freedom of Information Act 2000 for further information about the publications that the 305 journalists were employed by and a breakdown of their activity. After considering the relevant exemptions information which did not identify the journalists or the publications was provided to the requester. Having considered the matter further the Information Commissioner has decided that a further disclosure is in the public interest and in the context of a special report to Parliament is consistent with the discharge of his functions under the Data Protection Act 1998. The following table shows the publications identified from documentation seized during the Operation Motorman investigation, how many transactions each publication was positively identified as being involved in and how many of their journalists (or clients acting on their behalf) were using these services".

Interestingly on the top of the list was the Daily Mail, with a reported 952 transactions and 58 journalists/clients.

It seems that illegal practices identified by Soca investigators went beyond the simple crime of voicemail hacking (see previous blog - Phone "Hacking" or Opportunistic Access? ) and included live phone interceptions, police corruption, computer hacking and perverting the course of justice.

GCHQ may gather 39 billion separate pieces of information, but how do you find the bit you might want? One should probably concerned about who could access that data.  

The trouble with access points is that once they are there, unless there is some kind of physical switch to isolate them, they may be vulnerable to unwanted access. Who also might be able to access the probes that GCHQ has placed on more than 200 transatlantic cables?

The other problem with people owning .com names is that the USA could claim that any traffic must be routed by way of the USA. See Extradition .com ‘wire fraud’ - Who next for extradition? 

The problem has been around for some time though - See Hackers’ ancient and modern blog post. There is a bit more about this sort of stuff in my book "Cold Suspenders". There are different types of suspender, and none of them hold stockings up.
 

Monday, 3 June 2013

New Priestwood Community Association AGM.

It is some time since I last blogged about anything.
There often just does not seen to be enough time.

I am on holiday at the time of writing this, and have snuck away from Diane with to use a borrowed laptop.

Anyway - What this is about is the New Priestwood community Association AGM.

This is the most important meeting of the year in Priestwood at which the annual financial report is presented, Officers and a Committee elected for the year ahead. This year, there is also the subject of approving a new lease.

There are two  speakers on local topics...
Terry Pearce
Chairman of the Over 50s' Forum & Defend Our Community Services on...  "Our NHS - Fighting for its life!"

Cllr. Mary Temperton
Bracknell Forest Council Town Centre Regeneration Committee Member on... "Our New Town Centre"

You'll also have an opportunity to speak out on any local issue you want to raise with either the speakers or with local Councillors who will also be at the meeting.

 7.30 p.m. on  Friday, 14th. June.

http://www.bracknell-forest.gov.uk/thenewpriestwoodcommunitycentre

I will try to blog about me becoming Mayor and stuff soon, and with something about the areas I wish to support during my year. http://www.getbracknell.co.uk/news/s/2134342_cllr_alvin_finch_named_new_mayor_of_bracknell_town

Thursday, 3 January 2013

Phone "Hacking" or Opportunistic Access?


A lot of mobile phone owners may have been worried by all the talk of “'phone hacking”. Customers often ask me what they can do to protect their phones, and what it’s all about anyway. In effect there is no actual phone hacking involved, it’s more of people taking advantage of lax security.

What we are talking about is opportunistic illegitimate access to voicemail messages. These could be mobile phone messages, or messages on a home answering machine.  Since the police inquiry into the News of the World scandal, mobile network have operators greatly improved their security mechanisms to increase protection of users.

A big problem with voicemails arose from the use of well-known default PINs for voicemail access. Most customers will probably have never have used their PIN code to access voicemail. On most mobile phones, the network recognises that it is your phone calling and makes life easy for you by recognising that it is you and replaying the messages.

Operators often provide an external number through which you can call to access your voicemail remotely, but the easiest way to pick up your voicemail remotely is to call your own number. Usually when in starts the voicemail message you can enter a PIN number to access the voicemail. On O2 the default used to be 8701. (You key a star first). I remember a friend of mine being horrified when I demonstrated to him how easy it was for anyone to listen to his voicemail.

As with computer passwords people who do set up PIN numbers often use their birthday or some other well known number that someone else could easily guess at. That makes it a bit too easy for someone to access your stuff.

Sadly there are now newer methods that do verge on hacking - These methods involve faking a phone’s Caller Line Identity so it can spoof access into voicemail. To block this type attack, you need to set-up a PIN to access your voicemail. By doing this you prevent automatic access to your voicemail. A bit of a pain to have to use it every time, but at least it make thing more secure.

I touched on home answering machines earlier – If you look at the operating instructions here. (See page 36 – remote access) They are much like the mobile phone set-up. Many people would leave the pin as the default 000 – a bit too easy for someone else to guess!

Soon I intend to blog about what the real hackers can do.