nswd

pipeline

Dumbest movie ever with a predictable dumb plot, bad acting, worse script, straight up ridiculous

24.jpg

…America’s system of government. The bureaucracy is so understaffed that it is relying on industry hacks to draft policy. They have shaped deregulation and written clauses into the tax bill that pass costs from shareholders to society.

{ Economist | Continue reading }

graphite pencil, crayon and collage on paper { Jasper Johns, Green Flag, 1956 }

Loading the BRICKS from my FRONT YARD into a DUMPSTER because my neighbor TODD is a FUCKHEAD

7.jpg

…the “Trump Carousel” in New York’s Central Park.

The problem there: “It was never named Trump Carousel,” said Crystal Howard of the New York City parks department.

She said the Trump Organization — which had a contract to operate the attraction, whose name is the Friedsam Memorial Carousel — had simply put up a sign that renamed it “Trump Carousel.” The sign seems to have been up for months, but the city only learned of it in April 2017. Officials ordered the sign taken down that day.

{ Washington Post | Continue reading }

What am I doing? I’m talking to an empty telephone.

210.jpg

An assassination market is a prediction market where any party can place a bet (using anonymous electronic money and pseudonymous remailers) on the date of death of a given individual, and collect a payoff if they “guess” the date accurately. This would incentivise assassination of individuals because the assassin, knowing when the action would take place, could profit by making an accurate bet on the time of the subject’s death. Because the payoff is for accurately picking the date rather than performing the action of the assassin, it is substantially more difficult to assign criminal liability for the assassination.

{ Wikipedia | Continue reading }

What majesty should be, what duty is, Why day is day, night night, and time is time

28.jpg

{ This Brooklyn Heights fake townhouse is actually a subway emergency exit }

no master how mustered, mind never mend

221.jpg

Brothers Vincenzo and Giacomo Barbato named their clothing brand “Steve Jobs” in 2012 after learning that Apple had not trademarked his name. […]

The Barbatos designed a logo that resembles Apple’s own, choosing the letter “J” with a bite taken out of the side. Apple, of course, sued the two brothers for using Jobs’ name and a logo that mimics the Apple logo. In 2014, the European Union’s Intellectual Property Office ruled in favor of the Barbatos and rejected Apple’s trademark opposition. […]

While the Barbatos currently produce bags, t-shirts, jeans, and other clothing and fashion items […] they plan to produce electronic devices under the Steve Jobs brand.

{ Mac Rumors | Continue reading }

art { Left: Ellsworth Kelly, Nine Squares, 1977 | Right: Damien Hirst, Myristyl Acetate, 2005 }

The sun never sets

22.jpg

Ross McNutt is an Air Force Academy graduate, physicist, and MIT-trained astronautical engineer who in 2004 founded the Air Force’s Center for Rapid Product Development. The Pentagon asked him if he could develop something to figure out who was planting the roadside bombs that were killing and maiming American soldiers in Iraq. In 2006 he gave the military Angel Fire, a wide-area, live-feed surveillance system that could cast an unblinking eye on an entire city.

The system was built around an assembly of four to six commercially available industrial imaging cameras, synchronized and positioned at different angles, then attached to the bottom of a plane. As the plane flew, computers stabilized the images from the cameras, stitched them together and transmitted them to the ground at a rate of one per second. This produced a searchable, constantly updating photographic map that was stored on hard drives. His elevator pitch was irresistible: “Imagine Google Earth with TiVo capability.” […]

If a roadside bomb exploded while the camera was in the air, analysts could zoom in to the exact location of the explosion and rewind to the moment of detonation. Keeping their eyes on that spot, they could further rewind the footage to see a vehicle, for example, that had stopped at that location to plant the bomb. Then they could backtrack to see where the vehicle had come from, marking all of the addresses it had visited. They also could fast-forward to see where the driver went after planting the bomb—perhaps a residence, or a rebel hideout, or a stash house of explosives. More than merely identifying an enemy, the technology could identify an enemy network. […]

McNutt retired from the military in 2007 and modified the technology for commercial development. […] His first customer was José Reyes Ferriz, the mayor of Ciudad Juárez, in northern Mexico. In 2009 a war between the Sinaloa and Juárez drug cartels had turned his border town into the most deadly city on earth. […]

Within the first hour of operations, his cameras witnessed two murders. “A 9-millimeter casing was all the evidence they’d had,” McNutt says. By tracking the assailants’ vehicles, McNutt’s small team of analysts helped police identify the headquarters of a cartel kill squad and pinpoint a separate cartel building where the murderers got paid for the hit.

The technology led to dozens of arrests and confessions, McNutt says, but within a few months the city ran out of money to continue paying for the service.

{ Bloomberg | Continue reading | Radiolab }

photo { William Eggleston, Untitled (Two Girls Walking), 1970-73 }

It was put in the newses what he did, nicies and priers, the King fierceas Humphrey, with illysus distilling, exploits and all

24.jpg

The Food and Drug Administration has approved the first digital pill for the US which tracks if patients have taken their medication. The pill called Abilify MyCite, is fitted with a tiny ingestible sensor that communicates with a patch worn by the patient — the patch then transmits medication data to a smartphone app which the patient can voluntarily upload to a database for their doctor and other authorized persons to see. Abilify is a drug that treats schizophrenia, bipolar disorder, and is an add-on treatment for depression.

{ The Verge | Continue reading }

photo { Bruce Davidson, Subway platform in Brooklyn, 1980 }

I lie about my zodiac sign and watch people break down the person I’m not

2.jpg

In what appears to be the first successful hack of a software program using DNA, researchers say malware they incorporated into a genetic molecule allowed them to take control of a computer used to analyze it. […]

To carry out the hack, researchers encoded malicious software in a short stretch of DNA they purchased online. They then used it to gain “full control” over a computer that tried to process the genetic data after it was read by a DNA sequencing machine.  

The researchers warn that hackers could one day use faked blood or spit samples to gain access to university computers, steal information from police forensics labs, or infect genome files shared by scientists.  

{ Technology Review | Continue reading }

A choir of six hundred voices, conducted by Mr Vincent O’Brien

National Security Council officials have strategically included Trump’s name in “as many paragraphs as we can because he keeps reading if he’s mentioned,” according to one source, who relayed conversations he had with NSC officials.

{ Reuters | Continue reading }

related { How Trump gets his fake news }

‘There is an infinite amount of hope in the universe — but not for us.’ —Kafka

22.jpg

When the National Security Agency began using a new hacking tool called EternalBlue, those entrusted with deploying it marveled at both its uncommon power and the widespread havoc it could wreak if it ever got loose.

Some officials even discussed whether the flaw was so dangerous they should reveal it to Microsoft, the company whose software the government was exploiting, according to former NSA employees who spoke on the condition of anonymity given the sensitivity of the issue.

But for more than five years, the NSA kept using it — through a time period that has seen several serious security breaches — and now the officials’ worst fears have been realized. The malicious code at the heart of the WannaCry virus that hit computer systems globally late last week was apparently stolen from the NSA, repackaged by cybercriminals and unleashed on the world for a cyberattack that now ranks as among the most disruptive in history.

{ Washington Post | Continue reading }

screenshot { Ben Thorp Brown, Drowned World, 2016 }

Life offers second chances, it’s called tomorrow

222.jpg

Simulation suggests 68 percent of the universe may not actually exist

According to the Lambda Cold Dark Matter (Lambda-CDM) model, which is the current accepted standard for how the universe began and evolved, the ordinary matter we encounter every day only makes up around five percent of the universe’s density, with dark matter comprising 27 percent, and the remaining 68 percent made up of dark energy, a so-far theoretical force driving the expansion of the universe. But a new study has questioned whether dark energy exists at all, citing computer simulations that found that by accounting for the changing structure of the cosmos, the gap in the theory, which dark energy was proposed to fill, vanishes.

{ New Atlas | Continue reading }

art { Portia Munson, Her Coffin, 2016 }

When that hark from the air said it was Captain Finsen

22.jpg

The travel booking systems used by millions of people every day are woefully insecure and lack modern authentication methods. This allows attackers to easily modify other people’s reservations, cancel their flights and even use the refunds to book tickets for themselves.

{ Computer World | Continue reading }

related { By posting a picture of your boarding pass online, you may be giving away more information than you think }

Testis unus testis nullus

31.jpg

Over the years, multiple people have been wrongfully convicted all over the world of which some had an alibi for the moment that the crime was committed to prove their innocence but were not believed. In the criminal justice system, there appears to be an assumption that innocent people can generate an accurate and believable alibi, which means that the alibi should be correct and be supported by strong evidence. For an innocent person, it can, however, be very difficult to provide such strong evidence as also appears in the cases of wrongfully convicted people where convincing evidence is often lacking. If people were not at the crime scene but elsewhere and they can remember where they were at that time and evidence to support their alibis, it is perhaps the best chance to prove their innocence. […]

The objective of the present study was to establish the base rate of alibis and its supportive evidence of non-offenders. Despite the fact that most non-offenders report an alibi, the vast majority of their alibis do not match the criteria of the perfect alibi by the police because strong evidence is lacking. The reported evidence is more often weak, and the evidence for their alibi differs depending on when the alleged crime was committed (i.e., during the morning, afternoon, evening, or night). In addition, an alibi without supportive evidence—the least believable alibi—is most likely to be expected during the night compared to other timeframes. An alibi supported with evidence is most likely to be expected on Saturday afternoon. The results show that the perfect alibi to which police detectives compare a suspect’s alibi is an illusion because only 7% of innocent people can present strong physical evidence (i.e., video recordings), and therefore, the base rate of alibis should be taken into account when evaluating alibis.

{ Journal of Investigative Psychology and Offender Profiling | Continue reading }

‘The press, the machine, the railway, the telegraph are premises whose thousand-year conclusion no one has yet dared to draw.’ —Nietzsche

22.jpg

We fail to see that a computer that is a hundred times more accurate than a human, and a million times faster, will make 10,000 times as many mistakes.

{ The Guardian | Continue reading }

related { Robots Will Replace Doctors, Lawyers, and Other Professionals }

art { electropollock | video }

Conan Boyles will pudge the daylives out through him, if they are correctly informed

22.jpg

In 2012, hedge fund manager and venture capitalist Albert Hu was convicted of a financial fraud that stretched from Silicon Valley to Hong Kong. Today, he is locked up in the minimum security wing of Lompoc federal prison—inmate #131600-111—without access to the Internet. But, somehow, his bogus investment firm has come back to life.

On the surface, Asenqua Ventures appears to be legitimate. It has a website. It has a working voicemail system and lists a Northern California office address. It has distributed multiple press releases via PRNewswire, which were then picked up by reputable media organizations. It is included in financial industry databases like Crunchbase, PitchBook, and S&P Capital IQ. Its senior managers have LinkedIn profiles.

One of those profiles belonged to Stephen Adler, who earlier this week sent out hundreds of new Linkedin “connect” invitations (many of which were accepted). Among the recipients was Marty McMahon, a veteran executive recruiter who just felt that something was a bit off about Adler’s profile. So he did a Google reverse image search on Adler’s profile pic, and quickly learned that the headshot actually belonged to a San Diego real estate agent named Dan Becker.

McMahon called Dan Becker, who he says was stunned to learn that his photo was being used by someone who he didn’t know. Then McMahon did another image search for the LinkedIn profile pic of Adler’s colleague, Michael Reed. This time it led him to Will Fagan, another San Diego realtor who often works with Dan Becker.

{ Fortune | Continue reading }

‘Genius presupposes some disorder.’—Diderot

657.jpg

Someone Is Learning How to Take Down the Internet

Recently, some of the major companies that provide the basic infrastructure that makes the Internet work have seen an increase in DDoS attacks against them. Moreover, they have seen a certain profile of attacks. These attacks are significantly larger than the ones they’re used to seeing. They last longer. They’re more sophisticated. And they look like probing. One week, the attack would start at a particular level of attack and slowly ramp up before stopping. The next week, it would start at that higher point and continue. And so on, along those lines, as if the attacker were looking for the exact point of failure. […]

We don’t know where the attacks come from. The data I see suggests China, an assessment shared by the people I spoke with. On the other hand, it’s possible to disguise the country of origin for these sorts of attacks. The NSA, which has more surveillance in the Internet backbone than everyone else combined, probably has a better idea, but unless the US decides to make an international incident over this, we won’t see any attribution.

{ Bruce Schneier | Continue reading }

polaroid photograph { Andy Warhol, Grapes, 1981 }

Can’t hear with the waters of. The chittering waters of.

33.jpg

Seafood fraud comes in different forms, including species substitution — often a low-value or less desirable seafood item swapped for a more expensive or desirable choice — improper labeling, including hiding the true origin of seafood products, or adding extra breading, water or glazing to seafood products to increase their apparent weight. […]

One in five of the more than 25,000 samples of seafood tested worldwide was mislabeled.

{ Oceana | PDF }

polaroid photograph { Andy Warhol, Lobsters, 1982 }

Your window of opportunity is not a door

7.jpg

D. B. Cooper is a media epithet popularly used to refer to an unidentified man who hijacked a Boeing 727 aircraft in the airspace between Portland, Oregon, and Seattle, Washington, on November 24, 1971, extorted $200,000 in ransom (equivalent to $1,170,000 in 2015), and parachuted to an uncertain fate. Despite an extensive manhunt and protracted FBI investigation, the perpetrator has never been located or identified. […]

He dictated his demands: $200,000 in “negotiable American currency”; four parachutes (two primary and two reserve); and a fuel truck standing by in Seattle to refuel the aircraft upon arrival. […]

The FBI task force believes that Cooper was a careful and shrewd planner. He demanded four parachutes to force the assumption that he might compel one or more hostages to jump with him. […]

Agents theorize that he took his alias from a popular Belgian comic book series of the 1970s featuring the fictional hero Dan Cooper, a Royal Canadian Air Force test pilot who took part in numerous heroic adventures, including parachuting. […]

In February 1980 an eight-year-old boy named Brian Ingram, vacationing with his family on the Columbia River about 9 miles (14 km) downstream from Vancouver, Washington, and 20 miles (32 km) southwest of Ariel, uncovered three packets of the ransom cash, significantly disintegrated but still bundled in rubber bands, as he raked the sandy riverbank to build a campfire. FBI technicians confirmed that the money was indeed a portion of the ransom—two packets of 100 twenty-dollar bills each, and a third packet of 90, all arranged in the same order as when given to Cooper.

{ Wikipedia | Continue reading }

photo { Robert Mapplethorpe, Untitled (Candy Darling), 1972 | one more }

How say you by the French lord, Monsieur Le Bon?

24.jpg

Citigroup is suing AT&T for saying thanks to its own loyal customers […] Citigroup has trademarks on the phrases “thankyou” and “Citi thankyou,” as well as other variations of those terms.

{ Ars Technica | Continue reading }

cloaked in the pall of the ace of spaces

41.jpg

With tens or even hundreds of billions of potentially habitable planets within our galaxy, the question becomes: are we alone?

Many scientists and commentators equate “more planets” with “more E.T.s”. However, the violence and instability of the early formation and evolution of rocky planets suggests that most aliens will be extinct fossil microbes.

Just as dead dinosaurs don’t walk, talk or breathe, microbes that have been fossilised for billions of years are not easy to detect by the remote sampling of exoplanetary atmospheres.

In research published [PDF] in the journal Astrobiology, we argue that early extinction could be the cosmic default for life in the universe. This is because the earliest habitable conditions may be unstable. […] Inhabited planets may be rare in the universe, not because emergent life is rare, but because habitable environments are difficult to maintain during the first billion years.

Our suggestion that the universe is filled with dead aliens might disappoint some, but the universe is under no obligation to prevent disappointment.

{ The Conversation | Continue reading }

previously { Where is the Great Filter? Behind us, or not behind us? If the filter is in our past, there must be some extremely improbable step in the sequence of events whereby an Earth-like planet gives rise to an intelligent species comparable in its technological sophistication to our contemporary human civilization. }

still { The Day the Earth Stood Still, 1951 }



kerrrocket.svg