Author Archives: mary jean ziska

May 02nd 2011@ 7:05pm ( computer crashed since April 20th 2011)

so the last time i was on the computer to check my email was April 19th 2011…. and   the computer crashed  before easter….. funny how the  phones stopped before christmas… and the computer ..my last mode of communication stopped before easter….  i just got my computer back yesterday and  went on line  and checked emails for the first time  since april 19th…..2011…..  

I was in tears as i went thorugh and found so  many of my picutres and files gone…. I still don’t understand how it happened Mike from  staples( her ein naples florida )  said that the files were diapappearing  befoe his eyes… but origionally he said he was goign to transfer allthe files form one old hardddrive to the new and larger harddrive…. directly to prevent them from  being harmed…. if anyone knows anything about transferring files and can comment to me via this website…. and explain it to me that would be great … i am going back to see  mike… i have a few questions like….the files i do have…. many of them are entcryped and when i am asked to decode the documents it is showing as japaneese….???? as the option to decode the documents… I am not from japan… and i personally never had any files encrypted 


but….  a few times when my  money belt was comprisimed…  i ended up with a hardrive with all these encrypted  files i could not open at all…. i mean it was a mess….. when i got a harddrive that was like that…. i jsut assumed it was some of the babysitters who had been stealign fiels and documents allthe way back form sharka’s referal of jonathan… who copied allmy origional fiels when i was workign  with my mom’s business…. a tender lovign care service.. or when  chad from the byte shop broke the pin off the harddrive and i suspossedly lost allmy data when i was trying to get bytpe shop to help to fix  it…. 

the horrible thing of losing all the personal written documents… like journal entries….and entries for these blogs… or the evidence i had written aboutconcerning  all the crimes and specifically naming the times and dates and perople involved who who should be criminally and civially chaged  and held accountable for their crimes….

its so wierd how many people jsut dont want me to actually stop the criminals…. when i am just trying to stop these scummy people from not only harming my life.. but from harming other people’s lives….     

anyone who want s to actually submit any real comments that will help to stop these criminals… or has any information concerning the  criminals… please feel free to comment… so i can pass along the informaiton to the police or sheriffs department..  thanks… sincerely… luv mary jean ziska   

Wednesday April 20th 2011@ 11:53am ( soldering wikipedia defination)

http://en.wikipedia.oprg/wiki/soldering

Soldering



From Wikipedia, the free encyclopedia


Jump to: navigation, search


esoldering.jpg”>

Desoldering a contact from a wire.






Soldering is a process in which two or more metal items are joined together by melting and flowing a filler metal into the joint, the filler metal having a relatively low melting point. Soft soldering is characterized by the melting point of the filler metal, which is below 400 °C (752 °F).[1] The filler metal used in the process is called solder.


Soldering is distinguished from brazing by use of a lower melting-temperature filler metal. The filler metals are typically alloys that have liquidus temperatures below 350°C. It is distinguished from welding by the base metals not being melted during the joining process which may or may not include the addition of a filler metal.[2] In a soldering process, heat is applied to the parts to be joined, causing the solder to melt and be drawn into the joint by capillary action and to bond to the materials to be joined by wetting action. After the metal cools, the resulting joints are not as strong as the base metal, but have adequate strength, electrical conductivity, and water-tightness for many uses. There is evidence that it was employed up to 5000 years ago in Mesopotamia.[3]







Contents

[hide]


[edit] Applications





Small figurine being created by soldering

One of the most frequent applications of soldering is assembling electronic components to printed circuit boards (PCBs). Another common application is making permanent but reversible connections between copper pipes in plumbing systems. Joints in sheet metal objects such as food cans, roof flashing, rain gutters and automobile radiators have also historically been soldered, and occasionally still are. Jewelry components are assembled and repaired by soldering. Small mechanical parts are often soldered as well. Soldering is also used to join lead came and copper foil in stained glass work. Soldering can also be used as a semi-permanent patch for a leak in a container or cooking vessel.


One guideline to consider when soldering is that, since soldering temperatures are so low, a soldered joint has limited service at elevated temperatures. Solders generally do not have much strength, so the process should not be used for load-bearing members.


Some examples of solder types and their applications include tin-lead (general purpose), tin-zinc for joining aluminium, lead-silver for strength at higher than room temperature, cadmium-silver for strength at high temperatures, zinc-aluminium for aluminium and corrosion resistance, and tin-silver and tin-bismuth for electronics.


[edit] Solders



Soldering filler materials are available in many different alloys for differing applications. In electronics assembly, the eutectic alloy of 63% tin and 37% lead (or 60/40, which is almost identical in performance to the eutectic) has been the alloy of choice. Other alloys are used for plumbing, mechanical assembly, and other applications.


A eutectic formulation has several advantages for soldering; chief among these is the coincidence of the liquidus and solidus temperatures, i.e. the absence of a plastic phase. This allows for quicker wetting as the solder heats up, and quicker setup as the solder cools. A non-eutectic formulation must remain still as the temperature drops through the liquidus and solidus temperatures. Any differential movement during the plastic phase may result in cracks, giving an unreliable joint. Additionally, a eutectic formulation has the lowest possible melting point, which minimizes heat stress on electronic components during soldering.


Common solder alloys are mixtures of tin and lead, respectively:



  • 63/37: melts at 183 °C (361 °F) (eutectic: the only mixture that melts at a point, instead of over a range)
  • 60/40: melts between 183–190 °C (361–374 °F)
  • 50/50: melts between 185–215 °C (365–419 °F)

Lead-free solders are suggested anywhere young children may come into contact with (since young children are likely to place things into their mouths), or for outdoor use where rain and other precipitation may wash the lead into the groundwater.


Lead-free solder alloys melt around 250 °C (482 °F), depending on their composition.


For environmental reasons, ‘no-lead’ solders are becoming more widely used. Unfortunately most ‘no-lead’ solders are not eutectic formulations, making it more difficult to create reliable joints with them. See complete discussion below; see also RoHS.


Other common solders include low-temperature formulations (often containing bismuth), which are often used to join previously-soldered assemblies without un-soldering earlier connections, and high-temperature formulations (usually containing silver) which are used for high-temperature operation or for first assembly of items which must not become unsoldered during subsequent operations.


Alloying silver with other metals changes the melting point, adhesion and wetting characteristics, and tensile strength. Of all the brazing alloys, the silver solders have the greatest strength and the broadest applications.[4]


Specialty alloys are available with properties such as higher strength, better electrical conductivity and higher corrosion resistance.


[edit] Flux



In high-temperature metal joining processes (welding, brazing and soldering), the primary purpose of flux is to prevent oxidation of the base and filler materials. Tin-lead solder, for example, attaches very well to copper, but poorly to copper oxides (which form quickly at soldering temperatures). Flux is nearly inert at room temperature, yet becomes strongly reductive when heated. This helps remove oxidation from the metals to be joined, and inhibits oxidation of the base and filler materials. Secondarily, flux acts as a wetting agent in the soldering process,[5] reducing the surface tension of the molten solder and causing it to better wet out the parts to be joined.


Fluxes currently available in three basic formulations:



  • Water-soluble fluxes (no VOC‘s required for removal) are higher activity fluxes designed to be removed with water after soldering.
  • No-clean fluxes which are mild enough to not require removal at all due to the non-conductive and non-corrosive residue.[2] Performance of the flux needs to be carefully evaluated; a very mild ‘no-clean’ flux might be perfectly acceptable for production equipment, but not give adequate performance for a poorly controlled hand-soldering operation.
  • Traditional rosin fluxes are available in non-activated (R), mildly activated (RMA) and activated (RA) formulations. RA and RMA fluxes contain rosin combined with an activating agent, typically an acid, which increases the wettability of metals to which it is applied by removing existing oxides. The residue resulting from the use of RA flux is corrosive and must be cleaned off the piece being soldered. RMA flux is formulated to result in a residue which is not significantly corrosive, with cleaning being preferred but optional.

[edit] Basic soldering techniques


Soldering operations can be performed with hand tools, one joint at a time, or en masse on a production line. Hand soldering is typically performed with a soldering iron, soldering gun, or a torch, or occasionally a hot-air pencil. Sheetmetal work was traditionally done with “soldering coppers” directly heated by a flame, with sufficient stored heat in the mass of the soldering copper to complete a joint; torches or electrically-heated soldering irons are more convenient. All soldered joints require the same elements of cleaning of the metal parts to be joined, fitting up the joint, heating the parts, applying flux, applying the filler, removing heat and holding the assembly still until the filler metal has completely solidified. Depending on the nature of flux material used, cleaning of the joints may be required after they have cooled.


The distinction between soldering and brazing is arbitrary, based on the melting temperature of the filler material. A temperature of 450 °C is usually used as a practical cut-off. Different equipment and/or fixturing is usually required since (for instance) a soldering iron generally cannot achieve high enough temperatures for brazing. Practically speaking there is a significant difference between the two processes — brazing fillers have far more structural strength than solders, and are formulated for this as opposed to maximum electrical conductivity. Brazed connections are often as strong or nearly as strong as the parts they connect,[citation needed] even at elevated temperatures.[citation needed]


“Hard soldering” or “silver soldering” (performed with high-temperature solder containing up to 40% silver) is also often a form of brazing, since it involves filler materials with melting points in the vicinity of, or in excess of, 450 °C. Although the term “silver soldering” is used much more often than “silver brazing”, it may be technically incorrect depending on the exact melting point of the filler in use. In silver soldering (“hard soldering”), the goal is generally to give a beautiful, structurally sound joint, especially in the field of jewelry. Thus, the temperatures involved, and the usual use of a torch rather than an iron, would seem to indicate that the process should be referred to as “brazing” rather than “soldering”, but the endurance of the “soldering” appellation serves to indicate the arbitrary nature of the distinction (and the level of confusion) between the two processes.


Induction soldering is a process which is similar to brazing. The source of heat in induction soldering is induction heating by high-frequency AC current in a surrounding copper coil. This induces currents in the part being soldered, heat then being generated by resistive heating. The copper rings can be made to fit the part needed to be soldered for precision in the work piece. Induction soldering is a process in which a filler metal (solder) is placed between the facing surfaces of (to be joined) metals. The filler metal in this process is melted at a fairly low temperature. Fluxes are commonly used in induction soldering. This is a process which is particularly suitable for soldering continuously. The process is usually done with coils that wrap around a cylinder/pipe that needs to be soldered.


Some metals are easier to solder than others. Copper, silver, and gold are easy. Iron, mild steel and nickel are found to be more difficult. Because of their thin, strong oxide films, stainless steel and aluminium are even more difficult. Titanium, magnesium, cast irons, some high-carbon steels, ceramics, and graphite can be soldered but it involves a process similar to joining carbides. They are first plated with a suitable metallic element that induces interfacial bonding.


[edit] Electronic components (PCBs)



Soldering a 0805.jpg





A tube of multicore electronics solder used for manual soldering




An improperly soldered ‘cold’ joint




Broken solder joints on a Flyback transformer

Currently, mass-production printed circuit boards (PCBs) are mostly wave soldered or reflow soldered, though hand soldering of production electronics is also still standard practice for many tasks. In wave soldering, parts are temporarily adhered to the PCB with small dabs of adhesive, then the assembly is passed over flowing solder in a bulk container. Reflow soldering is a process in which a solder paste (a mixture of prealloyed solder powder and a flux-vehicle that has a peanut butter-like consistency[2]) is used to stick the components to their attachment pads, after which the assembly is heated by an infrared lamp; a hot air pencil; or, more commonly, by passing it through a carefully controlled oven. Since different components can be best assembled by different techniques, it is common to use two or more processes for a given PCB. For example, surface mounted parts may be reflow soldered first, with a wave soldering process for the through-hole mounted components coming next, and bulkier parts hand-soldered last.


For hand soldering of electronic components, the heat source tool should be selected to provide adequate heat for the size of joint to be completed. A 100 watt soldering iron may provide too much heat for printed circuit boards, while a 25 watt iron will not provide enough heat for large electrical connectors, joining copper roof flashing, or large stained-glass lead came. Using a tool with too high a temperature can damage sensitive components, but protracted heating by a tool that is too cool or under powered can also cause extensive heat damage.


Hand-soldering techniques require a great deal of skill to use on the finest pitch chip packages. In particular ball grid array (BGA) devices are notoriously difficult if not impossible to rework by hand.


For attachment of electronic components to a PCB, proper selection and use of flux helps prevent oxidation during soldering, which is essential for good wetting and heat transfer. The soldering iron tip must be clean and pre-tinned with solder to ensure rapid heat transfer. Components which dissipate large amounts of heat during operation are sometimes elevated above the PCB to avoid PCB overheating. After inserting a through-hole mounted component, the excess lead is cut off, leaving a length of about the radius of the pad. Plastic or metal mounting clips or holders may be used with large devices to aid heat dissipation and reduce joint stresses.


A heat sink may be used on the leads of heat sensitive components to reduce heat transfer to the component. This is especially applicable to germanium parts. (Note the heat sink will mean the use of more heat to complete the joint.) If all metal surfaces are not properly fluxed and brought above the melting temperature of the solder in use, the result will be an unreliable “cold solder joint”.


To simplify soldering, beginners are usually advised to apply the soldering iron and the solder separately to the joint, rather than the solder being applied direct to the iron. When sufficient solder is applied, the solder wire is removed. When the surfaces are adequately heated, the solder will flow around the joint. The iron is then removed from the joint.


Since non-eutectic solder alloys have a small plastic range, the joint must not be moved until the solder has cooled down through both the liquidus and solidus temperatures. Visually, a good solder joint will appear smooth and shiny, with the outline of the soldered wire clearly visible. A matte gray surface is a good indicator of a joint that was moved during soldering. Too little solder will result in a dry and unreliable joint; too much solder (the ‘solder blob’ very familiar to beginners) is not necessarily unsound, but tends to mean poor wetting. With some fluxes, flux residue remaining on the joint may need to be removed, using water, alcohol or other solvents compatible with the process. Excess solder and unconsumed flux and residue is sometimes wiped from the soldering iron tip between joints. The tip of the iron is kept wetted with solder (“tinned”) when hot to minimize oxidation and corrosion of the tip itself.


Environmental legislation in many countries, and the whole of the European Community area (see RoHS), has led to a change in formulation of both solders and fluxes. Water soluble non-rosin based fluxes have been increasingly used since the 1980s so that soldered boards can be cleaned with water or water based cleaners. This eliminates hazardous solvents from the production environment, and effluent.


[edit] Hot-bar reflow


Hot-bar reflow is a selective soldering process where two pre-fluxed, solder coated parts are heated with heating element (called a thermode) to a sufficient temperature to melt the solder.


Pressure is applied through the whole process (usually 15 s) to ensure that components stay in place during cooling. The heating element is heated and cooled for each connection. Up to 4000 W can be used in the heating element allowing fast soldering, good results with connections requiring high energy.[6]


[edit] Laser


Laser soldering is a technique where a ~30-50 W laser is used to melt and solder an electrical connection joint. Diode laser systems based on semiconductor junctions are used for this purpose.[7]


Wavelengths are typically 808 nm through 980 nm. The beam is delivered via an optical fiber to the workpiece, with fiber diameters 800 um and smaller. Since the beam out of the end of the fiber diverges rapidly, lenses are used to create a suitable spot size on the workpiece at a suitable working distance. A wire feeder is used to supply solder. [8]


Both lead-tin and silver-tin material can be soldered. Process recipes will differ depending on the alloy composition. For soldering 44-pin chip carriers to a board using soldering preforms, power levels were on the order of 10 Watts and solder times approximately 1 second. Low power levels can lead to incomplete wetting and the formation of voids, both of which can weaken the joint.


[edit] Fiber focus infrared soldering


Fiber focus infrared soldering is technique where many infrared sources are led through fibers, then focused onto a single spot at which the connection is soldered.[9][not in citation given]


[edit] Pipe soldering





soldered copper pipes

Copper pipe, or ‘tube’, is commonly joined by soldering. Copper conducts heat away faster than a soldering iron or gun can provide, so a propane torch is most commonly used; for large jobs a MAPP or acetylene torch is used.


Solder fittings, which are short sections of smooth pipe designed to slide over the outside of the mating tube, are usually used for copper joints. There are two types of fittings: end feed fittings which contain no solder, and solder ring fittings, in which there is a ring of solder in a small circular recess inside the fitting.


As with all solder joints, all parts to be joined must be clean and oxide free. Internal and external wire brushes are available for the common pipe and fitting sizes; emery cloth and wire-wool are frequently used as well, although metal wool products are discouraged, as they can contain oil, which would contaminate the joint.


Because of the size of the parts involved, and the high activity and contaminating tendency of the flame, plumbing fluxes are typically much more chemically active, and more acidic, than electronic fluxes. Because plumbing joints may be done at any angle, even upside down, plumbing fluxes are generally formulated as pastes which stay in place better than liquids. Flux should be applied to all surfaces of the joint, inside and out. Flux residues should be removed after the joint is complete or they can, eventually, erode through the copper substrates and cause failure of the joint.


Many plumbing solder formulations are available, with different characteristics such as higher or lower melting temperature, depending on the specific requirements of the job. Building codes currently almost universally require the use of lead-free solder for potable water piping, though traditional tin-lead solder is still available. Studies have shown that lead-soldered plumbing pipes can result in elevated levels of lead in drinking water.[10][11]


Since copper pipe quickly conducts heat away from a joint, great care must be taken to ensure that the joint is properly heated through to obtain a good bond. After the joint is properly cleaned, fluxed and fitted, the torch flame is applied to the thickest part of the joint, typically the fitting with the pipe inside it, with the solder applied at the gap between the tube and the fitting. When all the parts are heated through, the solder will melt and flow into the joint by capillary action. The torch may need to be moved around the joint to ensure all areas are wetted out. However, the installer must take care to not overheat the areas being soldered. If the tube begins to discolor it means that the tube has been over-heated and is beginning to oxidize, stopping the flow of the solder and causing the soldered joint not to seal properly. Before oxidation the molten solder will follow the heat of the torch around the joint. When the joint is properly wetted out, the solder and then the heat are removed, and while the joint is still very hot, it is usually wiped with a dry rag. This removes excess solder as well as flux residue before it cools down and hardens. With a solder ring joint, the joint is heated until a ring of molten solder is visible around the edge of the fitting and allowed to cool.


Solder connections are usually considered the most difficult of the three methods of connecting copper tubing, but soldering copper is a very simple process, provided some basic conditions are provided:



  • The tubing and fittings must be cleaned to bare metal with no tarnish
  • Any pressure which is formed by heating of the tubing must have an outlet

Copper is only one material that is joined in this manner. Brass fittings are often used for valves or as a connection fitting between copper and other metals. Brass piping is soldered in this manner in the making of brass and some woodwind (saxophone and flute) musical instruments


[edit] Mechanical and aluminium soldering


A number of solder materials, primarily zinc alloys, are used for soldering aluminium metal and alloys and to some lesser extent steel and zinc. This mechanical soldering is similar to a low temperature brazing operation, in that the mechanical characteristics of the joint are reasonably good and it can be used for structural repairs of those materials.


The American welding society defines brazing as using filler metals with melting points over 450 °C (842 °F) — or, by the traditional definition in the United States, above 800 °F (427 °C). Aluminium soldering alloys generally have melting temperatures around 730 °F (388 °C).[12] This soldering / brazing operation can use a propane torch heat source.[13]


These materials are often advertised as “aluminium welding”, but the process does not involve melting the base metal, and therefore is not properly a weld.


United States Military Standard or MIL-SPEC specification MIL-R-4208 defines one standard for these zinc-based brazing/soldering alloys.[14] A number of products meet this specification.[13][15][16] or very similar performance standards.[12]


[edit] Stained glass soldering


Historically, stained glass soldering tips were copper, heated by being placed in a charcoal-burning brazier. Multiple tips were used; when one tip cooled down from use, it was placed back in the brazier of charcoal and the next tip was used.


More recently, electrically heated soldering irons are used. These are heated by a coil or ceramic heating element inside the tip of the iron. Different power ratings are available, and temperature can be controlled electronically. These characteristics allow longer beads to be run without interrupting the work to change tips. Soldering irons designed for electronic use are often effective though they are sometimes underpowered for the heavy copper and lead came used in stained glass work.


Tiffany type stainglass is made by gluing copper foil around the edges of the pieces of glass and then soldering them together. This method makes it possible to create three dimensional stainglass pieces.


[edit] Solderability



The Solderability of a substrate is a measure of the ease with which a soldered joint can be made to that material.


[edit] Desoldering and resoldering



Used solder contains some of the dissolved base metals and is unsuitable for reuse in making new joints. Once the solder’s capacity for the base metal has been achieved it will no longer properly bond with the base metal, usually resulting in a brittle cold solder joint with a crystalline appearance.


It is good practice to remove solder from a joint prior to resoldering—desoldering braids or vacuum desoldering equipment (solder suckers) can be used. Desoldering wicks contain plenty of flux that will lift the contamination from the copper trace and any device leads that are present. This will leave a bright, shiny, clean junction to be resoldered.


The lower melting point of solder means it can be melted away from the base metal, leaving it mostly intact, though the outer layer will be “tinned” with solder. Flux will remain which can easily be removed by abrasive or chemical processes. This tinned layer will allow solder to flow into a new joint, resulting in a new joint, as well as making the new solder flow very quickly and easily.


[edit] Lead-free electronic soldering


More recently environmental legislation has specifically targeted the wide use of lead in the electronics industry. The RoHS directives in Europe require many new electronic circuit boards to be lead free by 1 July 2006, mostly in the consumer goods industry, but in some others as well. In Japan lead was phased out prior to legislation by manufacturers due to the additional expense in recycling products containing lead.[17]


It is a common misconception that lead free soldering requires higher soldering temperatures than lead/tin solder; the wetting temperature in lead/tin solder is higher than the melting point and is the controlling factor – Wave soldering can proceed at the same temperature as previous lead/tin soldering.[17] Nevertheless many new technical challenges have arisen with this endeavor; to reduce the melting point of tin based solder alloys various new alloys have had to be researched, with additives of copper, silver, bismuth as typical minor additives to reduce melting point and control other properties, additionally tin is a more corrosive metal, and can eventually lead to the failure of solder baths etc.[17]


Lead-free construction has also extended to components, pins, and connectors. Most of these pins used copper frames, and either lead, tin, gold or other finishes. Tin finishes are the most popular of lead-free finishes. Nevertheless, this brings up the issue of how to deal with tin whiskers. The current movement brings the electronics industry back to the problems solved in the 1960s by adding lead. JEDEC has created a classification system to help lead-free electronic manufacturers decide what provisions to take against whiskers, depending upon their application.


[edit] Soldering defects


Various problems may arise in the soldering process which lead to joints which are non functional either immediately or after a period of use.


The most common defect when hand-soldering results from the parts being joined not exceeding the solder’s liquidus temperature, resulting in a “cold solder” joint. This is usually the result of the soldering iron being used to heat the solder directly, rather than the parts themselves. Properly done, the iron heats the parts to be connected, which in turn melt the solder, guaranteeing adequate heat in the joined parts for thorough wetting. In ‘electronic’ hand soldering solder the flux is embedded in the solder. Therefore heating the solder first may cause the flux to evaporate before it cleans the surfaces (pcb pad and component connection) being soldered.


An improperly selected or applied flux can cause joint failure, or if not properly cleaned off the joint, may corrode the metals in the joint over time and cause eventual joint failure. Without flux the joint may not be clean, or may be oxidized, resulting in an unsound joint.


In electronics non-corrosive fluxes are often used. Therefore cleaning flux off may merely be a matter of aesthetics or to make visual inspection of joints easier in specialised ‘mission critical’ applications such as medical devices, military and aerospace i.e. satellites. For satellites also to reduce weight slightly but usefully. In some conditions i.e. high humidity, even non-corrosive flux might remain slightly active, therefore the flux may be removed to absolutely negate the possibility of corrosion over time. In some applications, the PCB might also be coated in some form of protective material such as a lacquer to protect it and/or exposed solder joints from the environment.


Movement of metals being soldered before the solder has cooled will cause a highly unreliable cracked joint. In electronics’ soldering terminology this is known as a ‘dry’ joint. It has a characteristically dull or grainy appearance immediately after the joint is made, rather than being smooth, bright and shiny. This appearance is caused by crystallization of the liquid solder. A dry joint is weak mechanically and a poor conductor electrically.


In general a good looking soldered joint is a good joint. As mentioned it should be smooth, bright and shiny. If not smooth i.e. lumps or balls of otherwise shiny solder the metal has not ‘wetted’ properly. Not being bright and shiny suggests a weak ‘dry’ joint.


In electronics a ‘concave‘ fillet is ideal. This indicates good wetting and minimal use of solder (therefore minimal heating of heat sensitive components). A joint may be good, but if a large amount of unnecessary solder is used then more heating is obviously required. Excessive heating of a PCB may result in ‘delamination’, the copper track may actually lift off the board, particularly on single sided PCBs without ‘through hole’ plating.


In the joining of copper tube, failure to properly heat and fill a joint may lead to a ‘void’ being formed. This is usually a result of improper placement of the flame. If the heat of the flame is not directed at the back of the fitting cup, and the solder wire applied 180 degrees opposite the flame, then solder will quickly fill the opening of the fitting, trapping some flux inside the joint. This bubble of trapped flux is the void; an area inside a soldered joint where solder is unable to completely fill the fittings’ cup, because flux has become sealed inside the joint, preventing solder from occupying that space.


[edit] Tools


Hand-soldering tools include the electric soldering iron, which has a variety of tips available ranging from blunt to very fine to chisel heads for hot-cutting plastics, and the soldering gun, which typically provides more power, giving faster heat-up and allowing larger parts to be soldered. Hot-air guns and pencils allow rework of component packages which cannot easily be performed with electric irons and guns.


Soldering torches are a type of soldering device that uses a flame rather than a soldering iron tip to heat solder. Soldering torches are often powered by butane[18] and are available in sizes ranging from very small butane/oxygen units suitable for very fine but high-temperature jewelry work, to full-size oxy-fuel torches suitable for much larger work such as copper piping. Common multipurpose propane torches, the same kind used for heat-stripping paint and thawing pipes, can be used for soldering pipes and other fairly large objects (but not electronics,) either with or without a soldering tip attachment; pipes are generally soldered with a torch by directly applying the open flame.


A soldering copper is a tool with a large copper head and a long handle which is heated in a blacksmith‘s forge fire and used to apply heat to sheet metal for soldering. Typical soldering coppers have heads weighing between one and four pounds. The head provides a thermal mass, which can store enough heat for soldering large areas between re-heating the copper in the fire. The larger the head, the longer the working time it affords. Historically, soldering coppers were a standard tool used in auto bodywork, although body solder has been mostly superseded by spot welding for mechanical connection and non-metallic fillers for contouring.


Toaster ovens and hand held infrared lights have been used to reproduce production soldering processes on a much smaller scale.


Bristle brushes are usually used to apply plumbing paste flux. For electronic work, flux-core solder is generally used, but additional flux may be used from a flux pen or dispensed from a small bottle with a syringe-like needle.


Wire brush, wire wool and emery cloth are commonly used to prepare plumbing joints for connection. Electronic joints rarely require mechanical cleaning, though copper traces with a dark layer of oxide passivation (due to aging), as on a new prototyping board that has been on the shelf for about a year or more, may need to be polished to a shine with steel wool before being soldered.


For PCB assembly and rework, alcohol and acetone (one or the other) are commonly used with cotton swabs or bristle brushes to remove flux residue. A heavy rag is usually used to remove flux from a plumbing joint before it cools and hardens. A fiberglass brush can also be used. Some fluxes for electronics are designed to be stable and inactive when cool and do not need to be cleaned off, though they still can be if desired, while other fluxes are acidic and must be removed after soldering to prevent corrosion of the circuits.


A heat sink, such as a crocodile clip, can be used to prevent damaging heat-sensitive components while soldering. The heat sink limits the temperature of the component body by absorbing and dissipating heat (reducing the thermal resistance between the component and the air), while the thermal resistance of the leads maintains the temperature difference between the part of the leads being soldered and the component body so that the leads become hot enough to melt the solder while the component body remains cooler.


[edit] See also



[edit] References



[edit] External links












Personal tools




Namespaces



Variants





Actions







WEdnesday 20th 2011 @11:37am ( articles on soldering silver charms )

article found from google:  How to solder a silver charm bracelet/e how.com Http://www.ehow.com/how_4797361_solder-silver-charmbracelet.html#ixzz1k41mOodk  

Top 5 To Try





Ads by Google



  • www.All-Spec.com?? http: ?>www.All-Spec.com” href=”http://googleads.g.doubleclick.net/aclk?sa=l&ai=BWEio0fOuTc6nFqW9sQea7oHPB–21-IBn8X27xXAjbcB4L-HARABGAEgqYOqBigFOABQ35nRqgZgydaxh9yj8BGgAZnIwv8DsgEMd3d3LmVob3cuY29tugEKMTYweDYwMF9qc8gBAdoBQWh0dHA6Ly93d3cuZWhvdy5jb20vaG93XzQ3OTczNjFfc29sZGVyLXNpbHZlci1jaGFybS1icmFjZWxldC5odG1sgAIByAKH54ABqAMB6APeAugDnALoAzH1AwAEAAQ&num=1&sig=AGiWqtweIGIBBBAujscFA88g1NDg9mlmCQ&client=ca-ehow_160x600&adurl=http://www.all-spec.com/products/Weller/Soldering_and_Rework%257CSoldering.Rework_Equipment%257CSOL-10/” target=_blank>Weller® Soldering

Your Source For Weller Stations, Irons, Tips and More. Ships Today.


www.All-Spec.com?? http: ?>www.All-Spec.com” href=”http://googleads.g.doubleclick.net/aclk?sa=l&ai=BWEio0fOuTc6nFqW9sQea7oHPB–21-IBn8X27xXAjbcB4L-HARABGAEgqYOqBigFOABQ35nRqgZgydaxh9yj8BGgAZnIwv8DsgEMd3d3LmVob3cuY29tugEKMTYweDYwMF9qc8gBAdoBQWh0dHA6Ly93d3cuZWhvdy5jb20vaG93XzQ3OTczNjFfc29sZGVyLXNpbHZlci1jaGFybS1icmFjZWxldC5odG1sgAIByAKH54ABqAMB6APeAugDnALoAzH1AwAEAAQ&num=1&sig=AGiWqtweIGIBBBAujscFA88g1NDg9mlmCQ&client=ca-ehow_160x600&adurl=http://www.all-spec.com/products/Weller/Soldering_and_Rework%257CSoldering.Rework_Equipment%257CSOL-10/” target=_blank>www.All-Spec.com



  • www.radyne.com ?>www.radyne.com/Brazing/braze.html” href=”http://googleads.g.doubleclick.net/aclk?sa=L&ai=BNoZu0fOuTc6nFqW9sQea7oHPB7yW988Bou31mRHAjbcBkIRsEAIYAiCpg6oGKAU4AFC9_Nnj-_____8BYMnWsYfco_ARsgEMd3d3LmVob3cuY29tugEKMTYweDYwMF9qc8gBAdoBQWh0dHA6Ly93d3cuZWhvdy5jb20vaG93XzQ3OTczNjFfc29sZGVyLXNpbHZlci1jaGFybS1icmFjZWxldC5odG1sgAIBqAMB6APeAugDnALoAzH1AwAEAAQ&num=2&sig=AGiWqtzfCAYaq9GZ724cVLNAC1GqK5ox2Q&client=ca-ehow_160x600&adurl=http://www.radyne.com/brazing.html” target=_blank>Induction Brazing

Quality joins everytime! Stainless, aluminum, copper, brass, and more


www.radyne.com ?>www.radyne.com/Brazing/braze.html” href=”http://googleads.g.doubleclick.net/aclk?sa=L&ai=BNoZu0fOuTc6nFqW9sQea7oHPB7yW988Bou31mRHAjbcBkIRsEAIYAiCpg6oGKAU4AFC9_Nnj-_____8BYMnWsYfco_ARsgEMd3d3LmVob3cuY29tugEKMTYweDYwMF9qc8gBAdoBQWh0dHA6Ly93d3cuZWhvdy5jb20vaG93XzQ3OTczNjFfc29sZGVyLXNpbHZlci1jaGFybS1icmFjZWxldC5odG1sgAIBqAMB6APeAugDnALoAzH1AwAEAAQ&num=2&sig=AGiWqtzfCAYaq9GZ724cVLNAC1GqK5ox2Q&client=ca-ehow_160x600&adurl=http://www.radyne.com/brazing.html” target=_blank>www.radyne.com/Brazing/braze.html



  • www.stellartechnical.com?? ?>www.stellartechnical.com” href=”http://googleads.g.doubleclick.net/aclk?sa=L&ai=BrfTh0fOuTc6nFqW9sQea7oHPB7-R-J4B97Oi1QzAjbcBsLC7ARADGAMgqYOqBigFOABQ7sWxzQJgydaxh9yj8BGyAQx3d3cuZWhvdy5jb226AQoxNjB4NjAwX2pzyAEB2gFBaHR0cDovL3d3dy5laG93LmNvbS9ob3dfNDc5NzM2MV9zb2xkZXItc2lsdmVyLWNoYXJtLWJyYWNlbGV0Lmh0bWyoAwHoA94C6AOcAugDMfUDAAQABA&num=3&sig=AGiWqtyIFwzydQsKadS-fbNpdOEx5ZmBbA&client=ca-ehow_160x600&adurl=http://www.stellartechnical.com” target=_blank>Solder Pot

Discounted Prices – Large Selection Plato, American Bty, Waage & Esico


www.stellartechnical.com?? ?>www.stellartechnical.com” href=”http://googleads.g.doubleclick.net/aclk?sa=L&ai=BrfTh0fOuTc6nFqW9sQea7oHPB7-R-J4B97Oi1QzAjbcBsLC7ARADGAMgqYOqBigFOABQ7sWxzQJgydaxh9yj8BGyAQx3d3cuZWhvdy5jb226AQoxNjB4NjAwX2pzyAEB2gFBaHR0cDovL3d3dy5laG93LmNvbS9ob3dfNDc5NzM2MV9zb2xkZXItc2lsdmVyLWNoYXJtLWJyYWNlbGV0Lmh0bWyoAwHoA94C6AOcAugDMfUDAAQABA&num=3&sig=AGiWqtyIFwzydQsKadS-fbNpdOEx5ZmBbA&client=ca-ehow_160x600&adurl=http://www.stellartechnical.com” target=_blank>www.stellartechnical.com



  • www.FtMyersGoldExchange.com?? ?>www.FtMyersGoldExchange.com” href=”http://googleads.g.doubleclick.net/aclk?sa=l&ai=BiNh60fOuTc6nFqW9sQea7oHPB_DAiOIBmKKezhrAjbcB0IHVARAEGAQgqYOqBigFOABQoerS3QRgydaxh9yj8BGgAfCH_eIDsgEMd3d3LmVob3cuY29tugEKMTYweDYwMF9qc8gBAdoBQWh0dHA6Ly93d3cuZWhvdy5jb20vaG93XzQ3OTczNjFfc29sZGVyLXNpbHZlci1jaGFybS1icmFjZWxldC5odG1sgAIBqAMB6APeAugDnALoAzH1AwAEAAQ&num=4&sig=AGiWqtwDpvdCusb79wkMzD9kCnjncakiyA&client=ca-ehow_160x600&adurl=http://www.ftmyersgoldexchange.com%3Fsrc%3Dcon” target=_blank>Sell Gold Jewelry FtMyers

Better Business Bureau Accredited Best Prices, Not A Pawn Shop


www.FtMyersGoldExchange.com?? ?>www.FtMyersGoldExchange.com” href=”http://googleads.g.doubleclick.net/aclk?sa=l&ai=BiNh60fOuTc6nFqW9sQea7oHPB_DAiOIBmKKezhrAjbcB0IHVARAEGAQgqYOqBigFOABQoerS3QRgydaxh9yj8BGgAfCH_eIDsgEMd3d3LmVob3cuY29tugEKMTYweDYwMF9qc8gBAdoBQWh0dHA6Ly93d3cuZWhvdy5jb20vaG93XzQ3OTczNjFfc29sZGVyLXNpbHZlci1jaGFybS1icmFjZWxldC5odG1sgAIBqAMB6APeAugDnALoAzH1AwAEAAQ&num=4&sig=AGiWqtwDpvdCusb79wkMzD9kCnjncakiyA&client=ca-ehow_160x600&adurl=http://www.ftmyersgoldexchange.com%3Fsrc%3Dcon” target=_blank>www.FtMyersGoldExchange.com



  • www.Ross-Simons.com?? ?>www.Ross-Simons.com” href=”http://googleads.g.doubleclick.net/aclk?sa=l&ai=BK8cW0fOuTc6nFqW9sQea7oHPB6K2qtUB8uyN_hLAjbcB8KorEAUYBSCpg6oGKAU4AFCU2OKR-_____8BYMnWsYfco_ARoAGe_dHtA7IBDHd3dy5laG93LmNvbboBCjE2MHg2MDBfanPIAQHaAUFodHRwOi8vd3d3LmVob3cuY29tL2hvd180Nzk3MzYxX3NvbGRlci1zaWx2ZXItY2hhcm0tYnJhY2VsZXQuaHRtbIACAcgCrqmoCKgDAegD3gLoA5wC6AMx9QMABAAE&num=5&sig=AGiWqtwIxgKNrJDN_iaQmwhlUw_mcOTuFA&client=ca-ehow_160x600&adurl=http://www.ross-simons.com%3Fcm_mmc%3DGoogle-_-Content%2BRoss-Simons-_-Ross-Simons-_-ross%2520simons%2520jewelry%26crcat%3DContent%2BRoss-Simons~Ross-Simons%26crsource%3Dadwords%26crkw%3Dross%2520simons%2520jewelry%26crcampaign%3D5001804970″ target=_blank>Ross-Simons Jewelry

Up to 80% Off Fine Jewelry. Free Shipping & 100% Guarantee!


www.Ross-Simons.com?? ?>www.Ross-Simons.com” href=”http://googleads.g.doubleclick.net/aclk?sa=l&ai=BK8cW0fOuTc6nFqW9sQea7oHPB6K2qtUB8uyN_hLAjbcB8KorEAUYBSCpg6oGKAU4AFCU2OKR-_____8BYMnWsYfco_ARoAGe_dHtA7IBDHd3dy5laG93LmNvbboBCjE2MHg2MDBfanPIAQHaAUFodHRwOi8vd3d3LmVob3cuY29tL2hvd180Nzk3MzYxX3NvbGRlci1zaWx2ZXItY2hhcm0tYnJhY2VsZXQuaHRtbIACAcgCrqmoCKgDAegD3gLoA5wC6AMx9QMABAAE&num=5&sig=AGiWqtwIxgKNrJDN_iaQmwhlUw_mcOTuFA&client=ca-ehow_160x600&adurl=http://www.ross-simons.com%3Fcm_mmc%3DGoogle-_-Content%2BRoss-Simons-_-Ross-Simons-_-ross%2520simons%2520jewelry%26crcat%3DContent%2BRoss-Simons~Ross-Simons%26crsource%3Dadwords%26crkw%3Dross%2520simons%2520jewelry%26crcampaign%3D5001804970″ target=_blank>www.Ross-Simons.com


Related Topics



More


How to Solder a Silver Charm Bracelet


X



Michelle Bell


Michelle Bell is a writer with a Bachelor of Science in English and secondary education from the Connecticut State University system. Bell is new to freelance writing, and has been writing for Demand Studios for a year. Bell has her work published primarily on eHow.com and Overstock.com.


By Michelle Bell, eHow Contributor


Silver soldering is one of the most basic jewelry-making techniques. Useful for connecting separate pieces of metal by an invisible seam, soldering is most often used in the creation of linked chains and stone settings, projects that beginners must master before moving on to more complicated things. To begin learning how to solder silver, start with one basic project: the silver charm bracelet. Consisting of a linked chain ready for the attachment of dangling charms, this silver bracelet project is perfect for soldering practice. To complete the project, follow these guidelines.


Difficulty:


Moderate


Instructions


things you’ll need:




  • Silver solder 20-gauge silver wire Wire clippers Sandpaper Files Ring mandrel Mallet Jewelry pliers Flux Paintbrush Pickle pot and solution Blowtorch Soldering clamps Tongs Silver clasp Polishing cloth Charms and beads




  • 1

Measure the length of bracelet you would like to make. Since you will be creating chain links of 1/2 inch, determine how many links you will need to complete the distance.



  • 2

Cut 1/2 inch long lengths of silver wire in the amount of links you need, using the wire clippers. File and sand the edges smooth. Holding 1 wire piece with the jewelry pliers, wrap the wire around the ring mandrel until the ends meet snugly. Use the mallet to bang the wire into a perfect circular loop shape. Remove the wire from the mandrel.



  • 3

Add a little flux to the “seam” between the 2 wire ends of the loop, using a paintbrush. Only put flux where you want the solder to flow. Cut a few tiny pieces of silver solder and place them along the seam. You may need to do this with a pair of tweezers.



  • 4

Fit the wire loop into the soldering clamps. Adjust the clamps over your fire bricks, so that your soldering area is well-protected. Turn the blowtorch to a low level or small flame and apply the flame directly to the seam. When the solder flows into the seam, remove the torch.



  • 5

Pick up the wire loop with the tongs and drop it into the pickle pot. Let the loops sit there for a few minutes to cool, and then remove it. File and sand away any excess solder.



  • 6

Repeat Step 2 with the next piece of silver wire. Using the pliers, carefully pull the edges of this loop apart by twisting them to the sides, maintaining the circle. Slide this loop through the first soldered loop. Close the edges with the pliers and solder them together, following Steps 3 to 5. This creates 2 linked loops.



  • 7

Solder all remaining loops until you have one long, linked chain. Attach the premade clasp to each end loop, or make your own clasp out of spare silver wire. Polish the chain with a polishing cloth.



  • 8

Attach all premade charms to the chain loops, or create your own out of twisted wire and beads. Attach these homemade charms the same way you made the chain, by stringing them through loops and soldering the loops closed. Then simply run the length of the chain through the loops of the charms.



  • Naples Couponswww.Groupon.com/Naples

1 ridiculously huge coupon a day. Like doing Naples at 90% off!



  • Lauren Conrad at Kohl’s®Kohls.com/LaurenConrad

Save on Fresh, Fun Jewelry, Only at Kohl’s® – Expect Great Things!



  • New Brazing & Solderingwww.multiplaz.com

Hi Tech Brazing & Soldering Tool. All in One to Weld,Cut,Braze,Solder



  • Sell Us Your Jewelrywww.CircaJewels.com

Visit Us At A Location Nearest You For A Private, Cost-Free Evaluation


Ads by Google


Tips & Warnings




  • Pickle pots are usually made from heated crockpots filled with a solution called “pickle.” Older crock pots are best for this purpose.
  • Do not put beads through any soldering process. Do not melt the wire. Watch carefully and hold the flame away slightly if it seems like the wire is burning. Never use a large flame. Do not touch hot metal. Let all metal sit in the pickle pot first.

Resources




  • Print
  • Email
  • Share

Read Next Article


Comments



  • Print
  • Email
  • Share

Related Ads



Related Articles & Videos



More




Top of Form


Helpful?



Yes


No




Bottom of Form




Read more: How to Solder a Silver Charm Bracelet | eHow.com http://www.ehow.com/how_4797361_solder-silver-charm-bracelet.html#ixzz1K4lm0odk


 



Tuesday April 12th 2011 ( fbi update cybercrimes)



no-repeat scroll -11px -1px white;” type=”text”>
Home




News





Testimony





Cybersecurity: Responding to the Threat of Cyber Crime and Terrorism


filed under:



  • Gordon M. Snow

  • Assistant Director, Cyber Division
  • Federal Bureau of Investigation

  • Statement Before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism

  • Washington, D.C.
  • April 12, 2011

Good afternoon Chairman Whitehouse, Ranking Member Kyl,
and members of the subcommittee. I’m pleased to appear before you today
to discuss the cyber threats facing our nation and how the FBI and our
partners are working together to protect United States government and
private sector networks.

Countering efforts by foreign countries to steal our nation’s
secrets, evaluating the capabilities of terrorists in a digital age,
and fighting cyber crime are the FBI’s highest priorities. It is
difficult to overstate the potential impact these threats pose to our
economy, our national security, and the critical infrastructure upon
which our country relies.

The Cybersecurity Threat

As the subcommittee is aware, the number and sophistication of cyber
attacks has increased dramatically over the past five years and is
expected to continue to grow.

The threat has reached the point that given enough time, motivation,
and funding, a determined adversary will likely be able to penetrate
any system that is accessible directly from the Internet.

It is difficult to state with confidence that our critical
infrastructure—the backbone of our country’s economic prosperity,
national security, and public health—will remain unscathed and always
be available when needed.

The recent security breach by unauthorized intruders into the parent
company of NASDAQ is an example of the kind of breaches directed
against important financial infrastructure and illustrates the
difficulty of determining clear attribution. As we would in response to
any such breach, the FBI is working to identify the scope of the
intrusion and assist the victim in the remediation process.

The FBI has identified the most significant cyber threats to our
nation as those with high intent and high capability to inflict damage
or death in the U.S., to illicitly acquire assets, or to illegally
obtain sensitive or classified U.S. military, intelligence, or economic
information.

As both an intelligence and law enforcement agency, the FBI can
address every facet of a cyber case—from collecting intelligence on the
subjects in order to learn more about their networks to dismantling
those networks and prosecuting the individual perpetrators. The ability
to take action on the information we collect is critical because what
may begin as a criminal investigation may become a national security
threat.

In addition, the FBI’s presence in legal attachés in 61 cities
around the world assists in the critical exchange of case-related
information and the situational awareness of current threats, helping
to combat the global scale and scope of cyber breaches. The FBI is also
changing to adapt to the ever-evolving technology and schemes used by
cyber criminals. Intelligence now drives operations in the FBI. The
Bureau is working in new ways with long-standing and new partners to
address the cybersecurity threat.

Cyber Threats Against the Private Sector

Cyber criminal threats to the U.S. result in significant economic
losses. But the threat against financial institutions is only part of
the problem. Also of serious concern are threats to critical
infrastructure, the theft of intellectual property, and supply chain
issues.

Cyber Threats to U.S. Critical Infrastructure

U.S. critical infrastructure faces a growing cyber threat due to
advancements in the availability and sophistication of malicious
software tools and the fact that new technologies raise new security
issues that cannot always be addressed prior to adoption. The
increasing automation of our critical infrastructures provides more
cyber access points for adversaries to exploit.

New “smart grid” and “smart home” products, designed to provide
remote communication and control of devices in our homes, businesses,
and critical infrastructures, must be developed and implemented in ways
that will also provide protection from unauthorized use. Otherwise,
each new device could become a doorway into our systems for adversaries
to use for their own purposes.

Industrial control systems, which operate the physical processes of
the nation’s pipelines, railroads, and other critical infrastructures,
are at elevated risk of cyber exploitation.

The FBI is concerned about the proliferation of malicious techniques
that could degrade, disrupt, or destroy critical infrastructure.
Although likely only advanced threat actors are currently capable of
employing these techniques, as we have seen with other malicious
software tools, these capabilities will eventually be within reach of
all threat actors.

Intellectual Property Theft and Supply Chain Risks

Intellectual property rights violations, including theft of trade
secrets, digital piracy, and trafficking counterfeit goods, also
represent high cyber criminal threats, resulting in losses of billions
of dollars in profits annually. These threats also pose significant
risk to U.S. public health and safety via counterfeit pharmaceuticals,
electrical components, aircraft parts, and automobile parts.

Cyber crime that manipulates the supply chain could pose a threat to
national security interests and U.S. consumers. Poorly manufactured
computer chips or chips that have been salvaged and repackaged infringe
on intellectual property rights and could fail at critical times,
posing a serious health and safety threat to U.S. citizens. Malware
could be embedded on the chips to exfiltrate information from computers
and result in the theft of personally identifiable information (PII)
that could then be used in future cyber crimes. As the quality of
counterfeit goods increases, U.S. consumers may be challenged to tell
the difference between authentic and fraudulent goods.

Operation Cisco Raider is a joint initiative between the U.S. and
Canada that targets the illegal distribution of counterfeit network
hardware manufactured by private entities in China. The use of
counterfeit network components can lead to exploitation of cyber
infrastructure vulnerabilities and even network failure. Since 2006,
Operation Cisco Raider has seized over 3,500 network components
amounting to $3.5 million of Cisco retail products. Ten individuals
have been convicted as a result of the joint initiative.

The Booming Business of Botnets

Botnets are networks of compromised computers controlled remotely by
an attacker. Criminals use botnets to facilitate online schemes that
steal funds or data, to anonymize online activities, and to deny access
by others to online resources. The botnets run by criminals could be
used by cyber terrorists or nation states to steal sensitive data,
raise funds, limit attribution of cyber attacks, or disrupt access to
critical national infrastructure. Today’s botnets are often modular and
can add or change functionality using internal update mechanisms.

Today’s cyber criminals are business savvy. These criminals are
building businesses based on the development, management, and sale of
botnets. These criminal groups have programmers who write the malicious
software, salespeople who sell the code or lease out botnet services,
and, in some instances, dedicated support personnel. These criminals
are working to make botnets easier to deploy and more difficult to
detect. 

Successful botnet development and operations use techniques similar
to legitimate businesses, including the involvement of personnel with
various specialties, feature-based pricing structures, modularization,
and software copy protection. The development and sale of kit-based
botnets has made it easier for criminals with limited technical
expertise to build and maintain effective botnets. Botnet development
and management is approached in a business-like fashion. Some criminals
rent or sell their botnets or operate them as a specialized portion of
an ad hoc criminal organization. At least one botnet kit author
implemented a copy protection scheme, similar to major commercial
software releases, which attempts to limit unauthorized use of the
botnet kit.

Botnets that specialize in data exfiltration are able to capture the
contents of encrypted webpages and modify them in real time. When
properly configured, criminals can ask additional questions at login or
modify the data displayed on the screen to conceal ongoing criminal
activity. Criminals purchase the base kits for a few thousand dollars
and can pay for additional features to better target specific
webservices.

The “Not for Profit” Cyber Criminal

Hacktivist groups such as Anonymous undertake protests and commit
computer crimes as a collective unit. Anonymous does not have a leader
or a controlling party, but instead relies on the collective power of
individual participants. Its members utilize the Internet to
communicate, advertise, and coordinate their actions. Anonymous has
initiated multiple criminal Distributed Denial of Service attacks
against the Recording Industry Association of America, the Motion
Picture Association of America, the Church of Scientology, and various
businesses in support of WikiLeaks.

Just last month, Anonymous hacked into the website of a U.S.
security firm with U.S. government contracts and stole approximately
72,000 e-mails from the company and posted them online. This attack was
in response to the claim that a researcher at the company had
identified key members of Anonymous.

Financial Estimates of Damages

Cyber criminals are forming private, trusted, and organized groups
to conduct cyber crime. The adoption of specialized skill sets and
professionalized business practices by these criminals is steadily
increasing the complexity of cyber crime by providing actors of all
technical abilities with the necessary tools and resources to conduct
cyber crime. Not only are criminals advancing their abilities to attack
a system remotely, but they are becoming adept at tricking victims
into compromising their own systems. Once a system is compromised,
cyber criminals will use their accesses to obtain PII, which includes
online banking/brokerage account credentials and credit card numbers of
individuals and businesses that can be used for financial gain. As
cyber crime groups increasingly recruit experienced actors and pool
resources and knowledge, they advance their ability to be successful in
crimes against more profitable targets and will learn the skills
necessary to evade the security industry and law enforcement.

The potential economic consequences are severe. The sting of a cyber
crime is not felt equally across the board. A small company may not be
able to survive even one significant cyber attack. On the other hand,
companies may not even realize that they have been victimized by cyber
criminals until weeks, maybe even months later. Victim companies range
in size and industry.

Often, businesses are unable to recoup their losses, and it may be
impossible to estimate their damage. Many companies prefer not to
disclose that their systems have been compromised, so they absorb the
loss, making it impossible to accurately calculate damages.

As a result of the inability to define and calculate losses, the
best that the government and private sector can offer are estimates.
Over the past five years, estimates of the costs of cyber crime to the
U.S. economy have ranged from millions to hundreds of billions. A 2010
study conducted by the Ponemon Institute estimated that the median
annual cost of cyber crime to an individual victim organization ranges
from $1 million to $52 million.

According to a 2011 publication released by Javelin Strategy and
Research, the annual cost of identity theft is $37 billion. This
includes all forms of identity theft, not just cyber means. The
Internet Crime Complaint Center (IC3), which aggregates self-reported
complaints of cyber crime, reports that in 2010, identity theft schemes
made up 9.8 percent of all cyber crime.

Addressing the Threat

Although our cyber adversaries’ capabilities are at an all-time
high, combating this challenge is a top priority of the FBI and the
entire government. Thanks to Congress and the administration, we are
devoting significant resources to this threat. Our partnerships within
industry, academia, and across all of government have also led to a
dramatic improvement in our ability to combat this threat.

The FBI’s statutory authority, expertise, and ability to combine
resources across multiple programs make it uniquely situated to
investigate, collect, and disseminate intelligence about and counter
cyber threats from criminals, nation-states, and terrorists.

The FBI is a substantial component of the Comprehensive National
Cybersecurity Initiative (CNCI), the interagency strategy to protect
our digital infrastructure as a national security priority. Through the
CNCI, we and our partners collaborate to collect intelligence, gain
visibility on our adversaries, and facilitate dissemination of critical
information to decision makers.

The FBI has cyber squads in each of our 56 field offices, with more
than 1,000 advanced cyber-trained FBI agents, analysts, and forensic
examiners. We have increased the capabilities of our employees by
selectively seeking candidates with technical skills and enhancing our
cyber training.

In addition, as part of the FBI’s overall transformation to an
intelligence-driven organization, the Cyber Division has implemented
Threat Focus Cells, which bring together subject matter experts from
various agencies to collaborate and address specific identified cyber
threats.

Partnerships

However, one agency cannot combat the threat alone. Through the
FBI-led National Cyber Investigative Joint Task Force, we coordinate
our efforts with 20 law enforcement and intelligence community (IC)
entities, including the Central Intelligence Agency, Department of
Defense, Department of Homeland Security (DHS), and the National
Security Agency. The FBI also has embedded cyber staff in other IC
agencies through joint duty and detailee assignments.

We have also enhanced our partnership with DHS, forming joint
FBI-DHS teams to conduct voluntary assessments for critical
infrastructure owners and operators who are concerned about the network
security of their industrial control systems. DHS has provided more
than 30 FBI agents and intelligence analysts with specialized training
in these systems.

In addition, because of the frequent foreign nexus to cyber threats,
we work closely with our international law enforcement and
intelligence partners.

We currently have FBI agents embedded full-time in five foreign
police agencies to assist with cyber investigations: Estonia, the
Netherlands, Romania, Ukraine, and Colombia. These cyber personnel have
identified cyber organized crime groups targeting U.S. interests and
supported other FBI investigations. We have trained foreign law
enforcement officers from more than 40 nations in cyber investigative
techniques over the past two years.

We have engaged our international allies, including Australia, New
Zealand, Canada, and the United Kingdom, in strategic discussions that
have resulted in increased operational coordination on intrusion
activity and cyber threat investigations.

Government and Private Sector Information Sharing

The FBI has developed strong relationships with private industry and
the public. InfraGard is a premier example of the success of
public-private partnerships. Under this initiative, state, local, and
tribal law enforcement, academia, other government agencies,
communities, and private industry work with us through our field
offices to ward off attacks against critical infrastructure. Over the
past 15 years, we have seen this initiative grow from a single chapter
in the Cleveland Field Office to more than 86 chapters in 56 field
offices with 42,000 members.

The exchange of knowledge, experience, and resources is invaluable
and contributes immeasurably to our homeland security. Notably, DHS has
recognized the value of the program and recently partnered with the
InfraGard program to provide joint training and conferences during this
fiscal year.

With outside funding from DHS, the newly formed Joint Critical
Infrastructure Partnership will host five regional conferences this
year along with representation at a number of smaller venues. The focus
of the program is to further expand the information flow to the
private sector by not only reaching out to the current InfraGard
membership but also reaching beyond current members to local critical
infrastructure and key resource owners and operators. The goal is to
raise awareness of risks to the nation’s infrastructure and to better
educate the public about infrastructure security initiatives. This
partnership is a platform which will enhance the risk management
capabilities of local communities by providing security information,
education, training, and other solutions to protect, prevent, and
respond to terrorist attacks, natural disasters, and other hazards,
such as the crisis currently facing Japan. Ensuring that a country’s
infrastructure is protected and resilient is key to national security.

Experience has shown that establishing rapport with the members
translates into a greater flow of information within applicable legal
boundaries, and this rapport can only be developed when FBI personnel
have the necessary time and resources to focus on the program. This
conduit for information results in the improved protection of the
infrastructure of the U.S.

In addition to InfraGard, the FBI participates in other activities
with the private sector, like the Financial Services Information
Sharing and Analysis Center (FS-ISAC). A good example of this
cooperation is the FBI’s identification of a bank fraud trend in which
U.S. banks were unaware that they were being defrauded by businesses in
another country. As a result of FBI intelligence analysis, a joint
FBI/FS-ISAC document was drafted and sent to the FS-ISAC’s membership,
alerting them to these crimes and providing recommendations on how to
protect themselves from falling victim to the same scheme.

In the last few years, there has been a push to partner FBI
intelligence analysts with private sector experts. This is an
opportunity for the intelligence analysts to learn more about the
industries they are supporting. They then can better identify the needs
of those industries as well as FBI information gaps. Additionally,
they develop points-of-contact within those industries who can evaluate
and assist in timely analysis, and the analysts mature into subject
matter experts.

Other successful cyber partnerships include the IC3 and the National
Cyber-Forensics and Training Alliance (NCFTA). Established in 2000,
the IC3 is a partnership between the FBI and the National White Collar
Crime Center that serves as a vehicle to receive, develop, and refer
criminal complaints regarding cyber crime. Since it began, the IC3 has
processed more than two million complaints. Complaints are referred to
local, state, federal, and international law enforcement and are also
the basis for intelligence products and public service announcements.
The FBI’s IC3 unit works with the private sector, individually and
through working groups, professional organizations, and InfraGard, to
cultivate relationships, inform industry of threats, identify
intelligence, and develop investigative information to enhance or
initiate investigations by law enforcement.

The NCFTA is a private, non-profit organization composed of
representatives of industry and academia which partners with the FBI.
The NCFTA, in cooperation with the FBI, develops responses to evolving
threats to the nation’s critical infrastructure by participating in
cyber-forensic analysis, tactical response development, technology
vulnerability analysis, and the development of advanced training. The
NCFTA work products can be provided to industry, academia, law
enforcement, and the public as appropriate.

The FBI also partners with the U.S. private sector on the Domestic
Security Alliance Council (DSAC). This strategic collaboration enhances
communications and promotes effective exchanges of information in
order to prevent, detect, and investigate criminal acts, particularly
those affecting interstate commerce, while advancing the ability of the
U.S. private sector to protect its employees, assets, and proprietary
information.

The DSAC is in a unique position to speak on behalf of the private
sector because the DSAC members are the highest ranking security
executives of the member companies, who directly report to the leaders
of their organizations.

Successes

Our partnerships and joint initiatives are paying off, especially in
the national security realm. In 2010, the FBI strengthened our efforts
to counter state-sponsored cyber threats, increasing the number of
national security computer intrusion cases by 60 percent.

While we increased our emphasis on national security, we continued
to see successes on the criminal side. In 2010, we arrested a record
202 individuals for criminal intrusions, up from 159 in 2009. We
obtained a record level of financial judgments for such cases of $115
million, compared to $85 million in 2009. Those arrests included five
of the world’s top cyber criminals. Among them were the perpetrators of
the Royal Bank of Scotland WorldPay intrusion. Due to our strong
partnership with the Estonian government on cyber matters, the case
resulted in one of the first hackers extradited from Estonia to the
United States.

Conclusion

As the subcommittee knows, we face significant challenges in our
efforts to combat cyber crime. In the current technological
environment, there are numerous threats to private sector networks, and
the current Internet environment can make it extremely difficult to
determine attribution.

We are optimistic that by strengthening relationships with our
domestic and international counterparts, the FBI will continue to
succeed in identifying and neutralizing cyber criminals, thereby
protecting U.S. businesses and critical infrastructure from grave harm.

To bolster our efforts, we will continue to share information with
government agencies and private industry consistent with applicable
laws and policies. We will continue to engage in strategy discussions
with other government agencies and the private sector to ensure that
American ingenuity will lead to new solutions and better security. We
will continue to build a skilled workforce to operate in this
challenging environment.

We look forward to working with the subcommittee and Congress as a
whole to determine a successful course forward for the nation that
allows us to reap the positive economic and social benefits of the
Internet while minimizing the risk posed by those who would use it for
nefarious purposes.


Recent Testimonies
04.12.11



Cybersecurity: Responding to the Threat of Cyber Crime and Terrorism

Gordon M. Snow,
Assistant Director, Cyber Division,

Federal Bureau of Investigation,

Statement Before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism,
Washington, D.C.
04.07.11



FBI Budget for Fiscal Year 2012

Robert S. Mueller, III,
Director,

Federal Bureau of Investigation,

Statement Before the Senate Committee on Appropriations, Subcommittee on Commerce, Justice, Science, and Related Agencies,
Washington, D.C.
04.06.11



FBI Budget for Fiscal Year 2012

Robert S. Mueller, III,
Director,

Federal Bureau of Investigation,

Statement Before the House Committee on Appropriations, Subcommittee on Commerce, Justice, Science, and Related Agencies,
Washington, D.C.
03.30.11



Oversight of the Federal Bureau of Investigation

Robert S. Mueller, III,
Director,

Federal Bureau of Investigation,

Statement Before the Senate Judiciary Committee,
Washington, D.C.
03.16.11



Oversight of the Federal Bureau of Investigation

Robert S. Mueller, III,
Director,

Federal Bureau of Investigation,

Statement Before the House Judiciary Committee,
Washington, D.C.
03.02.11



Helping Law Enforcement Find Missing Children

Kevin L. Perkins,
Assistant Director, Criminal Investigative Division,

Federal Bureau of Investigation,

Statement Before the Senate Judiciary Committee,
Washington, D.C.
02.17.11



Going Dark: Lawful Electronic Surveillance in the Face of New Technologies

Valerie Caproni,
General Counsel,

Federal Bureau of Investigation,

Statement Before the House Judiciary Committee, Subcommittee on Crime, Terrorism, and Homeland Security,
Washington, D.C.
09.22.10



The FBI’s Efforts to Combat Significant Financial Crimes

Kevin L. Perkins,
Assistant Director, Criminal Investigative Division,

Federal Bureau of Investigation,

Statement Before the Senate Judiciary Committee,
Washington, D.C.
09.22.10



Nine Years After 9/11: Confronting the Terrorist Threat to the U.S.

Robert S. Mueller, III,
Director,

Federal Bureau of Investigation,

Statement Before the Senate Committee on Homeland Security and Governmental Affairs,
Washington, D.C.
07.28.10



The FBI’s Efforts to Combat Cyber Crime on Social Networking Sites

Gordon M. Snow,
Assistant Director,

Federal Bureau of Investigation,

Statement before the House Judiciary Subcommittee on Crime, Terrorism, and Homeland Security,
Washington, D.C.


More

 

Close

Saturday April 09th 2011 ( blog comments only keeping real coments.. or possibel real comments)

so this afternoon i wasted about 30 minutes blocking ip addresses adn email addresses and coments that were definatley not associated with my website or my blog…. what a waste of my time.. i decided that i will only  save the coments that apprear to be real and havecontent that pertains to my actual blog or my website…. a few of the coments were almost  liek messages to someoen via my websie… a girl who was telling about graduating colege.. then also a post of her beign pregnant…. ugg tht only reasonable explanatin why one person whould be writng such personal and utterly nonsennse  tha thas nothting to do with my website or blog… oen of the boys criminals in hiding… or whoever needed to get a message to the new girl who ned s a new greenr card.. or just one of their “whore to door girls” that they used.

I realized another plausibel explanation why these scummy persons wouldactully break into another persons home and use it for their afairs… no paper trail… like i mentioned tha one guy  who came over form fort lauderdale while his wife was in chicago… showed up at 10 or 11 pm and stayed out til really late…. came over wih no chldrens supplies jsut children… and didint want me to contact or have his wife’s hone number or contct info for emergencies… 

anyway… if these criminals.. and since they are organized and socilly and morally corrupt… if they didnt want to be caught by thier actual spouces to not leave a paper trail they might need a condo or residence where  they do not  have any connection… since these scummy parasites found my place in 2003 ehn i met the scum gerard ahler… ( martucci ) and of course karen kahle who woudl constantly tresspass into my complex form carlton lakes.. by running in or walking her baby in past the guards and terefor not having ot have sighed in or have  a record of her criminal behavoir or  slimy  affairs.. or what ever she did that had to be illegal to not to want to be caught ….. breaking  the laws  anyway… i wonder how many other victims they have found to ruin lives and family by ther criminal and immpral behavior?…. if any one has any real thoughts… let me know.. otherwise all comments that are nonsense will be deleated! thanks!

Sat. April 9th 2011 ( met a really nice an d helpful police man while getting gas after babysitting a few days ago)

In a word that seems to be over run with liars and cheats and thieves…  or the selfish and horrid girls who actually ruin lives and families….  it is sooo refreshing to actually meet a person( especially a person  who is a law officer) to get some assistance! 

He ( officer:  S. Cianflone badge # 2866)  also told me of a great  video camera surveliance system that may work wonders and be accessible 24 hours  a day!  I told him o fthe conartist i spoke iwht who was supposed to be with ADT and how tthe man who was on the phone told me the system would be 7,000.00 dollars… 
 
I soooo hope these criminals are cuaght soon and arrested and put in jail… or if we wer in saudi. ut to death… HA! that wodl at least  stop them from breeding more criminals…

stillhavent heard back about my camel cashmire sweater…. and i started going  through my car  very I was pulling into a gas station i frequent after babysitting and getting some gas when the store was closed  but  a police car pulled into the station and i was able to ask him to have extra patrols going by my home on the days i was babysititng to prevent any more of the  randon people who haved trespassed and broken into my home…. He was so helpful he even gave me a booklet on identiy theft.   


I gave him the time and hours i would be babysitting and aked if anyone is in my home… to please arrest them.. they have no persmission to be in my home.. and have no key given to them by me.. or any other means of accessing my residence other than trespassing and breaking and enterring…. 
 
carefully…  and anything where missing items  may “show up”  but i still need to do one more etremely careful itemization… then if items can t be found… the police officer said he  would be more than happy to helpme make sur ethe police reports are files… YES…. perhaps some justice…. would be great!  

Friday April 1st 2011 @ 10:58pm ( list of items still missing…)

so i thought II’d take a break from  trying to undo the lock that is not working  with the code i put into it yesterday before leaving to go babysit… and write up a list of items that are still missing…
of course my diamond earrings… and my pearl earrings… and the ring i gave to maura..  some fake .look alike sister who said  “score” when i handed  it over to her…. UGG god only knows who i really gave my  sisters sing to … i know she gave it to me for safe keeping guess she never thought i would have  to have endured all the  scum these past 7 years…. . the diamond and saphire ring… was really nice… i could l kick myself for handing it over.. i knew somewhere in the pit of my stomach.. that it was the wrong person… it was just like the one princess Diana had.. but this  group of con artists are pretty good at their cons… and i was really sweet and innocent and guillible…

so still missing…
 one bloomingdale regular poka dotted  pillow case and the pillow that was in it..
one monagramed face cloth
one set of diamond earrings given to me by my dad from  saudi..
one set of pearl earrings given to me by my dad from saudi
.
.
 

 

Fri. April 01st, 2011 @10:36am ( repost of last blog entry… concerning someone beign in my home yeserday while i was out babysititng all day…. I’m bbing told not to call the police and that no one was in myhome …you decide)

So on the subject of someone being in myome yesterday.. while i was out all day babysitiing . ( i of course am being told that no one was in my home… here is the evidence you decide… )  

I actuallyshould be caling the police right now adn dicumenting one mor injustic nad the laws repeatedly being broken .. and the last time someon told me not to calthe police… was in 2005 when my credit cards and drivers liscense “disappeared…basically were stolen..” i ws told that they woudl jsut show.. up that again.. and not to worry… ( of course sincne then myentrie life has basically and systemitacially been destroyed… but its not the criminals concern right?…. maybe my life will majicallyjsut “show upagain” the life i was supposed to have with out  any of the criminals.. and scumm who have ruin my life!)

first of course sicne 2003 Gerard ahler… and of coure we cant forget the usual suspect who trespassed with  her baycarriage.. and her rnnning shoes… good old wher i mean bully from carlton laske s the white blond haired  “whore to door service girls” Karen Kahel… who by the way went to ohio state.. wierd that i was babysitting  peope all day who  are also from ohio… but then alot of people are form ohio.. hell that is why karen used me to babysit… i was born in ohio… 

So here is the evidence.. so i was baysiting yesterday which was March 31st 2011 form 11am until 7pm leaving my home aprox 10:15am then after babysititng I went to the beach( iwent over by my aunts frans  condo which is right by where i used to live aon teh beach when we first mooved here and also where i used to come  home to from boarding school… if i wasnt going home to saudi…

then i wnet to  say my novena at St. Johnls cathlic church then decided to go to whole foods to get some of the great yeast free bread i’ve ben eating forever…the voss water the basil plants.. 4 brand new plants ( mine mysteriously keep dying..those great dutch cookies i love with nutella… and after wards stoped my  block buster to see the amazing sale for DVD’s….. the blockbuster  by river chase that i love… is sadly goign out of business….. they have DVD’s fr 3.99 and even some for .99!.. I was there until the store closed….which ws 9am!.. then i came home…
Since they are refinishing the driveays with these great pavers.. and we cant use our garage i entied my car( fully loaded… with all mybaysiting gear..and go home a bit tireded….. after having a realy long day but a realy nice one at the orrs babysititng in port royal…. 

I had started locking up everything when things wer being stolen…. and lately even started lockign the refridge.. it stoped the whore to door servce girlse( ie karen kahel.. and her buddies… form using my house to entrertain her guy friends… adn use my food.. my clothing… my life… adn ruin everything i ever want ed or ever loved…. ! well last night i went ot put awaythe groceries..and teh combination i had used to lock the door want workign… cahnge it ever time.. liek i now have to chagne locks.. and th alocks on the closets.. to dkkp outthe pareasites…. ( is that more appropriate to use for the termonology for people or insects who feed off others…..(?)

anyway.. the lock i now put on the refridge didnt work… i though tmaybe i got the conbo wrong.. but ws too tire dot worry about it.. so went ot bed… this morning  however… when i went to try the lock again… i pulled out a chair frim my kitchen table.. and noticed a blueberry bythe foot of another chair…. I dondt have any blueberries in my house… i actualy havent bought blueberries for about 1-2 months.. whe i last made blueberry pancakes adn froze them… so her is the quetstion… HOW THE HELL DID A BLUEBERRY GET IN MY HOUSE..AT THE FOOT OF THE TABLE ….. WITH AN OAT….BY IT!!!!!!!!!!!

dID I MENTION LATELY HOW ONE OF THE WHORES ACTUALLY LEFT A GOLD EMBLEM FORM A MERTLE BEACH GOLFING OUTING..IN MY BED… AFTER I WAS AWAY VISITN GMY SITERS IN PALM BEACH ONE WEEKEND.. DOYOU KNOW HOW DISGUSTING THAT IS… TO KNOW SOME STRANGER WAS SCEWGN SOME RANDOM GOLFER IN MY bED! 
I T COULD ONLYBE THE WORK OF THAT DISGUSTIN GWHORE.. SHE MUST BE BACK IN TOWN… ugggg!!! WATCH YOURHUSBANDS… WOMAN…OF NAPLES FLORIDA..
know i thoguh t it a bit wierd that some boy at the port royal club was also named greyson.. like karnen’s son but that ws theday i  saw a fake scot renshaw on a bike headign back to port royal with some random girl… UGGGGGGGGG!!!!!!!! may she go to jail.. may her and her entier famly be cursed!  what liitle good it does.. she will jsut screw someone withmoney and get out of everything jsu tliek getting out of the buling and getting out of tresspassign or any other laws that she had broken……  guessits good to be pretty have onlg blond hari and be a whore adn a buly and a con artist….  .