nswd



pipeline

‘Nature even in chaos cannot proceed otherwise than regularly and according to order.’ –Kant

Our team has analyzed 144 of AQI’s and the ISI’s own financial and managerial documents. Captured by coalition and Iraqi forces between 2005 and 2010, these include scans of typed documents, as well as electronic files found on hard drives, USB sticks, and other media. Among them are spreadsheets listing the qualifications and training of hundreds of fighters, details on thousands of individual salary payments, and massive lists of itemized expenditures. […]

The group’s financing tactics, relying on extortion and criminal rackets, put it directly in conflict with local economic elites. […] Moreover, the way it managed human resources and finances—requiring numerous signatures and oversight—reflected high levels of internal mistrust. […]

The negative implication of our findings is that even those vulnerabilities don’t make the group easy to completely eradicate. From 2006 through 2009 the ISI was devastated by US and allied forces, Iraqi security forces, and local Sunni militias; during some months US Special Operations forces alone conducted 10 or more raids per night against the group. It stopped being a strategic threat, but it didn’t disappear. Its organizational structure was robust enough that it could go to ground, survive, and wait for the right circumstances to come roaring back.

{ Boston Globe | Continue reading }

related { One of the Islamic State’s senior commanders reveals exclusive details of the terror group’s origins inside an Iraqi prison – right under the noses of their American jailers. | The Guardian | full story }

‘We live among ideas much more than we live in nature.’ —Saul Bellow

2.jpg

DNA is generally regarded as the basic building block of life itself. In the most fundamental sense, DNA is nothing more than a chemical compound, albeit a very complex and peculiar one. DNA is an information-carrying molecule. The specific sequence of base pairs contained in a DNA molecule carries with it genetic information, and encodes for the creation of particular proteins. When taken as a whole, the DNA contained in a single human cell is a complete blueprint and instruction manual for the creation of that human being.

In this article we discuss myriad current and developing ways in which people are utilizing DNA to store or convey information of all kinds. For example, researchers have encoded the contents of a whole book in DNA, demonstrating the potential of DNA as a way of storing and transmitting information. In a different vein, some artists have begun to create living organisms with altered DNA as works of art. Hence, DNA is a medium for the communication of ideas. Because of the ability of DNA to store and convey information, its regulation must necessarily raise concerns associated with the First Amendment’s prohibition against the abridgment of freedom of speech.

New and developing technologies, and the contemporary and future social practices they will engender, necessitate the renewal of an approach towards First Amendment coverage that takes into account the purposes and values incarnated in the Free Speech Clause of the Constitution.

{ Charleston School of Law | Continue reading }

photo { Bruce Davidson }

The sound of a billion jaws collectively hitting the floor

213.jpg

[T]he Inuit, the Masai, and the Samburu people of Uganda all originally ate diets that were 60-80% fat and yet were not obese and did not have hypertension or heart disease.

The hypothesis that saturated fat is the main dietary cause of cardiovascular disease is strongly associated with one man, Ancel Benjamin Keys, a biologist at the University of Minnesota. […] Keys launched his “diet-heart hypothesis” at a meeting in New York in 1952, when the United States was at the peak of its epidemic of heart disease, with his study showing a close correlation between deaths from heart disease and proportion of fat in the diet in men in six countries (Japan, Italy, England and Wales, Australia, Canada, and the United States). Keys studied few men and did not have a reliable way of measuring diets, and in the case of the Japanese and Italians he studied them soon after the second world war, when there were food shortages. Keys could have gathered data from many more countries and people (women as well as men) and used more careful methods, but, suggests Teicholz, he found what he wanted to find. […]

At a World Health Organization meeting in 1955 Keys’s hypothesis was met with great criticism, but in response he designed the highly influential Seven Countries Study, which was published in 1970 and showed a strong correlation between saturated fat (Keys had moved on from fat to saturated fat) and deaths from heart disease. Keys did not select countries (such as France, Germany, or Switzerland) where the correlation did not seem so neat, and in Crete and Corfu he studied only nine men. […]

[T]he fat hypothesis led to a massive change in the US and subsequently international diet. One congressional staffer, Nick Mottern, wrote a report recommending that fat be reduced from 40% to 30% of energy intake, saturated fat capped at 10%, and carbohydrate increased to 55-60%. These recommendations went through to Dietary Guidelines for Americans, which were published for the first time in 1980. (Interestingly, a recommendation from Mottern that sugar be reduced disappeared along the way.)

It might be expected that the powerful US meat and dairy lobbies would oppose these guidelines, and they did, but they couldn’t counter the big food manufacturers such as General Foods, Quaker Oats, Heinz, the National Biscuit Company, and the Corn Products Refining Corporation, which were both more powerful and more subtle. In 1941 they set up the Nutrition Foundation, which formed links with scientists and funded conferences and research before there was public funding for nutrition research. […]

Saturated fats such as lard, butter, and suet, which are solid at room temperature, had for centuries been used for making biscuits, pastries, and much else, but when saturated fat became unacceptable a substitute had to be found. The substitute was trans fats, and since the 1980s these fats, which are not found naturally except in some ruminants, have been widely used and are now found throughout our bodies. There were doubts about trans fats from the very beginning, but Teicholz shows how the food companies were highly effective in countering any research that raised the risks of trans fats. […]

Another consequence of the fat hypothesis is that around the world diets have come to include much more carbohydrate, including sugar and high fructose corn syrup, which is cheap, extremely sweet, and “a calorie source but not a nutrient.”2 5 25 More and more scientists believe that it is the surfeit of refined carbohydrates that is driving the global pandemic of obesity, diabetes, and non-communicable diseases.

{ The BMJ | Continue reading }

related { Beware the Man of One Study }

image { Isa Genzken, X-ray, 1991 }

bitch i’ve always been an artist

42.jpg

Imagine receiving a text message that one of the world’s most prominent artists had appropriated your work, divorcing it of its original meaning. That’s exactly what happened to Audrey Wollen, a Los Angeles-based artist whose recreation of Diego Velázquez’s ‘The Rokeby Venus’ as a self-portrait was recently used by Richard Prince as part of his New Portraits series. […]

I was really angry, but not at all surprised. An old, white, successful, straight male artist feeling entitled to the image of a young female body is not surprising. My photograph wasn’t included in his show at Gagosian, but by distributing it through the internet under his name without any consent, he completely erased my authorship and identity. I really was just a photograph of a naked girl, up for grabs. Maybe I’m idealistic, but I don’t think art should simply reiterate the status quo. […] I think a lot of people mistake Prince’s work as purely an issue of appropriation - like, if you condemn Prince, you condemn appropriation on principle. That’s not the point: Appropriation is chill, as long as the person doing the appropriating is not the person in power. What Prince is doing is colonising and profiting off a territory of the internet that was created by a community of young girls, who, needless to say, do not have the cultural space Prince has. Selecting specific bodies from a sea of images, amputating them from their context, and then naming yourself the owner of those bodies: that isn’t just boring art, that verges on predatory and violent behavior.

{ Audrey Wollen | Continue reading }

Which losses do we impose on some to benefit others?

310.jpg

The NSA’s inspector general last year detailed 12 cases of “intentional misuse” of intelligence authorities from 2003 to 2013 […] Those cases included a member of a U.S. military intelligence unit who violated policy by obtaining the communications of his wife, who was stationed in another country. After a military proceeding, the violator was punished by a reduction in rank, 45 days of extra duty and forfeiture of half of his pay for two months, according to the letter. In a 2003 case, a civilian employee ordered intelligence collection “of the telephone number of his foreign-national girlfriend without an authorized purpose for approximately one month” to determine whether she was being faithful to him, according to the letter. The employee retired before an investigation could be completed.

{ Bloomberg | Continue reading }

photo { Olivia Locher, Lucifer Rising, 2014 }

Superboy-Prime: [battling Superman] I’m the only one who can rescue this messed-up universe.

39.jpg

This report describes the details and type of operations carried out by an organized criminal group that focuses on financial industry, such as banks and payment providers, retail industry and news, media and PR companies. […] The organized criminal group backbone are citizens of both Russian and Ukrainian origin. […]

The average sum of theft in the Russian territory and in the post-Soviet space is $2 million per incident. […] To date the total amount of theft is over 1 billion rubles (about 25 million dollars), most of it has been stolen in the second half of 2014. […]

The key is that fraud occurs within the corporate network using internal payment gateways and internal banking systems. Thus money is stolen from the banks and payment systems, and not from their customers. While this is their main and most lucra- tive activity, the gang has also ventured into other areas including the compromise of media groups and other organizations for industrial espionage and likely a trading advantage on the stock market. […]

The average time from the moment of penetration into the financial institutions internal network till successful theft is 42 days.

As a result of access to internal bank networks the attackers also managed to gain access to ATM management infrastructure and infect those systems with their own malicious software that further allows theft from the banks ATM systems on the attackers command. […]

The main steps of the attack progression are the following ones:

1. Primary infection of an ordinary employee computer.
2. Getting a password of a user with administra- tive rights on some computers. For example, a password of a technical support engineer.
3. Gaining legitimate access to one server.
4. Compromising the domain administrator password from the server.
5. Gaining access to the domain controller and compromising of all active domain accounts.
6. Gaining access to e-mail and workflow servers.
7. Gaining access to server and banking system administrator workstations. 

8. Installing the software to monitor activity of interesting system operators. Usually photo and video recording was used.
9. Configuring remote access to servers of inter- est including firewall configuration changes.

{ Group-IB and Fox-IT | PDF }

‘The subject of a good tragedy must not be realistic.’ –Corneille

341.jpg

[Yahoo C.E.O. Marissa] Mayer also had a habit of operating on her own time. Every Monday at 3 p.m. Pacific, she asked her direct reports to gather for a three-hour meeting. Mayer demanded all of her staff across the world join the call, so executives from New York, where it was 6 p.m., and Europe, where it was 11 p.m. or later, would dial in, too. Invariably, Mayer herself would be at least 45 minutes late; some calls were so delayed that Yahoo executives in Europe couldn’t hang up till after 3 a.m. […]

Within weeks of becoming C.E.O., she received an email from Henrique de Castro, the fashionable Portuguese president of Google’s media, mobile and platforms businesses. […] Over dinner, de Castro impressed Mayer with his knowledge of Yahoo’s business and his specific proposals for building it. For several mornings in a row, the two exchanged emails to negotiate de Castro’s salary. Every night, Mayer would make an offer, only to wake up to a reply with a list of more conditions. Eventually de Castro negotiated himself a contract worth around $60 million, depending on the value of Yahoo stock. […] Despite the board’s urging, Mayer opted against vetting Henrique de Castro. As a result, she was unaware that de Castro had a poor reputation among his colleagues in Google’s advertising business. Many had derisively called him the Most Interesting Man in the World, in reference to the satirically fatuous spokesman for Dos Equis beer. […] Advertising revenue declined in every quarter since he was hired. Within a year, Mayer had personally taken control of Yahoo’s ad team. De Castro would leave the company in January 2014. For about 15 months of work, he would be paid $109 million.

{ NY Times | Continue reading }

‘That something is irrational is no argument against its existence, but rather a condition for it.’ –Nietzsche

27.jpg

With the First Amendment, you’re never protecting Jefferson; it’s usually protecting some guy who’s burning a flag or doing something stupid. […]

Here’s the brilliant thing they did. You embarrass them first, so that no one gets on your side. After the Obama joke, no one was going to get on the side of Amy, and so suddenly, everyone ran for the hills.

{ George Clooney/Deadline | Continue reading }

photo { Christopher Morris }

‘If you need a friend, get a dog.’ –Gordon Gekko

Several weeks ago, Vidra communicated the new vision to the staff in what I am told was an uncomfortable stream of business clichés ungrounded in any apparent strategy other than saying things like “let’s break shit” and “we’re a tech company now.”

{ NY mag | Continue reading | Daily Beast }

‘every time I go by this Fresh Market, this dude with a whole beard-trimmer aesthetic is in front of it making out with a different woman’ —Jeb Lund

32.jpg

[D]etoxing – the idea that you can flush your system of impurities and leave your organs squeaky clean and raring to go – is a scam. It’s a pseudo-medical concept designed to sell you things.

“Let’s be clear,” says Edzard Ernst, emeritus professor of complementary medicine at Exeter University, “there are two types of detox: one is respectable and the other isn’t.” The respectable one, he says, is the medical treatment of people with life-threatening drug addictions. “The other is the word being hijacked by entrepreneurs, quacks and charlatans to sell a bogus treatment that allegedly detoxifies your body of toxins you’re supposed to have accumulated.” […]

In 2009, a network of scientists assembled by the UK charity Sense about Science contacted the manufacturers of 15 products sold in pharmacies and supermarkets that claimed to detoxify. The products ranged from dietary supplements to smoothies and shampoos. When the scientists asked for evidence behind the claims, not one of the manufacturers could define what they meant by detoxification, let alone name the toxins. […]

Then there’s colonic irrigation. Its proponents will tell you that mischievous plaques of impacted poo can lurk in your colon for months or years and pump disease-causing toxins back into your system. Pay them a small fee, though, and they’ll insert a hose up your bottom and wash them all away.[…] No doctor has ever seen one of these mythical plaques, and many warn against having the procedure done, saying that it can perforate your bowel.

{ The Guardian | Continue reading }

‘Comme je me sens vieux. Comme je me sens peu fait pour l’être. Jamais je ne vais savoir être vieux.’ –Georges Bernanos

46.jpg

“Find your sugar baby,” the site exhorted its users.

This year, Paul Aronson, an 84-year-old from Manhattan, contacted a 17-year-old girl, Shaina Foster, through the site and took her out to dinner. On a second date, Ms. Foster brought along her twin sister, Shalaine.

For a few hours on Oct. 1, the evening looked as if it might turn into an old man’s fantasy. The three dined at an expensive restaurant in Midtown. Then Mr. Aronson invited the teenagers to have a drink with him at the four-story brick townhouse he owns on East 38th Street.

He bought a bottle of raspberry-flavored rum from a liquor store on the way, a defense lawyer said. But instead of receiving caresses or whispered flirtations, Mr. Aronson ended up tied to a coffee table for 20 hours. […]

Prosecutors say the two girls bound him with zip ties, took $470 in cash from his wallet and went on a spending spree with his credit cards, buying makeup and clothes. […]

Before he was tied up, Mr. Aronson had given the teenagers a tour of his townhouse and let them play with his tiny dog, a Yorkshire terrier named Muffins, Mr. Kennedy said. Then he poured them glasses of rum and asked them about their sex lives. […]

“He asked to do things I wasn’t going to do,” she told Detective Darryl Ng at the 17th Precinct after the girls were arrested on Oct. 21. “He is ugly, old and disgusting. I tied him up. I took his money and left. He was starting to creep me out.”

{ NY Times | Continue reading }

‘Knock, knock! Who’s there?’ —Shakespeare

38.jpg

The malware, called “Regin”, is probably run by a western intelligence agency and in some respects is more advanced in engineering terms than Stuxnet. […]

Symantec said it was not yet clear how Regin infected systems but it had been deployed against internet service providers and telecoms companies mainly in Russia and Saudi Arabia as well as Mexico, Ireland and Iran. […]

“Nothing else comes close to this . . . nothing else we look at compares,” said Orla Cox, director of security response at Symantec, who described Regin as one of the most “extraordinary” pieces of hacking software developed, and probably “months or years in the making”. […] “Sometimes there is virtually nothing left behind – no clues. Sometimes an infection can disappear completely almost as soon as you start looking at it, it’s gone. That shows you what you are dealing with.”

{ FT | Continue reading }

‘Principle is OK up to a certain point, but principle doesn’t do any good if you lose.’ –Dick Cheney

26.jpg

Crimes such as bribery require the cooperation of two or more criminals for mutual gain. Instead of deterring these crimes, the state should disrupt them by creating distrust among criminals so they cannot cooperate. In a cooperative crime with two criminals, the state should offer amnesty and a bounty to the criminal who first secures punishment of the other criminal. When the bounty exceeds the bribe, a bribed official gains less from keeping the bribe than from confessing and receiving the bounty. Consequently the person who pays the bribe cannot trust the person who takes it. The game’s unique equilibrium is non-cooperative and bribes disappear.

{ Review of Law & Economics }

‘But as the power of Hellas grew, and the acquisition of wealth became more an objective, the revenues of the states increasing, tyrannies were established almost everywhere.’ —Thucydides

34.jpg

From this hillside, where it abates its rise, a sun was born into the world

81.jpg

Miniature “human brains” have been grown in a lab in a feat scientists hope will transform the understanding of neurological disorders.

{ BBC | Continue reading | Thanks Tim }

‘Death is the only thing we haven’t succeeded in completely vulgarizing.’ —Aldous Huxley

3.jpg

Leveraging the insight that periods, while a pain, also bring women together, JWT has created an augmented reality app that combines Chinese consumers’ love of technology, cute characters and selfies into a new branded platform for Sofy sanitary pads.

{ Campaign Asia | Continue reading | Thanks Tim }

‘The more numerous the laws, the more corrupt the government.’ —Tacitus

43.jpg

[T]he Office will refuse to register a claim if it determines that a human being did not create the work. […]

[T]he Office cannot register a work purportedly created by divine or supernatural beings. […]

A musical work created solely by an animal would not be registrable, such as a bird song or whale song. Likewise, music generated entirely by a mechanical or an automated process is not copyrightable. […]

To qualify as a work of authorship a choreographic work must be created by a human being and it must be intended for execution by humans. Dances performed or intended to be performed by animals, machines, or other animate or inanimate objects are not copyrightable and cannot be registered with the U.S. Copyright Office.

{ U.S. Copyright Office /Popular Science | Continue reading }

‘The future of humanity is uncertain.’ –Primo Levi

2.jpg

{ How MH17 Came Apart Over Ukraine }

Million ways to cry

1.jpg

{ CYNK, a ”social networking” startup that has no assets, no revenue, no members, and one employee, is worth $4.75 billion }

art { Paul Klee }

Child born every minute somewhere

219.jpg

Does Having Daughters Cause Judges to Rule for Women’s Issues?

Using new data on the family lives of U.S. Courts of Appeals judges, we find that, conditional on the number of children a judge has, judges with daughters consistently vote in a more feminist fashion on gender issues than judges who have only sons. This result survives a number of robustness tests and appears to be driven primarily by Republican judges. More broadly, this result demonstrates that personal experiences influence how judges make decisions, and this is the first article to show that empathy may indeed be a component in how judges decide cases.

{ American Journal of Political Science | Continue reading }



kerrrocket.svg