shop imp kerr
nswd

pipeline

Everything goes, everything comes back

7.jpg

Fifteen years ago, two fraud cases sent shock waves through the world of photography, helping to trigger a revolution in photo conservation science.

Long dismissed by the art establishment as a second-tier medium, “photography used to fight for space in galleries,” says James M. Reilly, director of the Image Permanence Institute in Rochester, N.Y. But by the 1990s the prestige—and price tags—of photographs began to approach those of paintings and sculpture. During that decade, collectors increasingly paid out hundreds of thousands and then the first million dollars for vintage and contemporary photographs. Yet, as in all coming-of-age stories, life’s dark side made an appearance, this time by means of back-to-back fraud cases.

In 1998, researchers in Germany discovered that a collection of prints by the avant-garde American photographer Man Ray had not been made by the artist himself. A year later, a team in the U.S. began to scrutinize a collection of 20 prints by Lewis Hine, an early-20th-century American documentary photographer. They discovered that the iconic collection of photos of Empire State Building construction sites and child laborers, purported to have been printed by Hine himself, were made decades after his death. Both cases led to million-dollar settlements that helped stimulate the photo conservation research, transforming a niche field into a mature science.

{ Chemical & Engineering News | Continue reading }

All is lost now

On 5 June 1995 an adult male mallard collided with the glass façade of the Natuurmuseum Rotterdam and died. An other drake mallard raped the corpse almost continuously for 75 minutes. Then the author [of this paper] disturbed the scene and secured the dead duck. Dissection showed that the rape-victim indeed was of the male sex. It is concluded that the mallards were engaged in an ‘Attempted Rape Flight’ that resulted in the first described case of homosexual necrophilia in the mallard.

{ C.W. Moeliker | PDF }

Golden shower (disambiguation)

318.jpg

Last August, a book titled “Leapfrogging” hit The Wall Street Journal’s list of best-selling business titles upon its debut. The following week, sales of the book, written by first-time author Soren Kaplan, plunged 99% and it fell off the list.

Something similar happened when the hardcover edition of “Networking is Dead,” was published in mid-December. A week after selling enough copies to make it onto the Journal’s business best-seller list, more hardcover copies of the book were returned than sold, says book-sales tracker Nielsen BookScan.

It isn’t uncommon for a business book to land on best-seller lists only to quickly drop off. But even a brief appearance adds permanent luster to an author’s reputation, greasing the skids for speaking and consulting engagements.

Mr. Kaplan says the best-seller status of “Leapfrogging” has “become part of my position as a speaker and consultant.”

But the short moment of glory doesn’t always occur by luck alone. In the cases mentioned above, the authors hired a marketing firm that purchased books ahead of publication date, creating a spike in sales that landed titles on the lists. The marketing firm, San Diego-based ResultSource, charges thousands of dollars for its services in addition to the cost of the books, according to authors interviewed.

{ WSJ | Continue reading | via Forbes }

installation { Tom Sachs }

Bloom holds up his right hand on which sparkles the Koh-i-Noor diamond. His palfrey neighs. Immediate silence.

66.jpg

By now, the diamond thieves who pulled off a brazen $50 million heist on the tarmac of Brussels Airport are the most wanted men in Europe. They’re most likely lying low somewhere, waiting for the heat to die down. Soon enough, though, they’ll want to turn that loot into cash. But how does one actually go about fencing $50 million in stolen diamonds? In fact, it’s easier than you might think.

Clearly, these guys planned their Feb. 18 heist well — it was fast and efficient, and it employed minimal violence in intercepting the diamonds at a moment of vulnerability. Given their professionalism, it’s quite likely that they planned just as carefully what to do with the loot.

I know a little bit about what they might have been thinking, from investigating the largest diamond heist in history, the 2003 burglary of $500 million in stones in Antwerp, Belgium, by a group of Italian thieves known as the School of Turin.

Let’s assume these new crooks don’t already have someone in mind on whom they intend to unload all the diamonds. They’ll have to sell them slowly to avoid drawing attention, but that’s OK, as diamonds don’t lose value with the passage of time. The first thing to do with all those stolen diamonds is to divide them up into polished stones, rough stones, and anything in between. […] The biggest problem is getting rid of the stones’ identifying characteristics. Some of the polished diamonds will have signature marks on them, such as tiny, almost invisible, laser engravings. These can be removed. But some polished diamonds have laser-inscribed marks on their girdle, commonly used for branding purposes: Canadian diamonds often feature a maple leaf or polar bear, while De Beers uses its distinctive “Forevermark.” Such brands by themselves are not a concern; in fact, removing them might hurt the resale value of a stone. But the problem facing the thieves is that these markings often include a serial number used to identify a specific stone. […]

One thing working in the thieves’ favor is that in the complex, busy world of the gem trade, a single diamond can trade hands multiple times in a single day. And not everyone keeps clear records. By the time someone realizes that they’re in possession of a stolen stone, it could have passed through dozens of hands, leaving the trail too cold for police to be able to track it back to the original trader who bought it off the thieves.

Another thing going for the thieves is that the individual marking of stones is still rather rare. Yes, diamond-grading laboratories offer services that will inscribe a unique number on a diamond to match that polished stone to a report detailing its attributes. But it’s far more common to simply keep a diamond in a transparent, sealed, tamper-proof case along with a given report that notes cut, clarity, color, carat weight, and other details. Moreover, even the best labs don’t note or keep track of any unique identifier such as an optical fingerprint of polished stones. There are indeed services geared toward retail clients that will analyze diamonds and keep extremely detailed records for insurance or identification purposes. But these kinds of services aren’t used in Antwerp’s wholesale diamond trade. […]

The ironic thing about this week’s heist, though, is that odds are that the vast majority of these stolen stones will end up back in Antwerp soon — but the people buying and selling them will have no idea they were stolen. Even victims of this heist would be unlikely to recognize one of their stones.

{ Foreign Policy | Continue reading }

related { Robbers breach gate, steal $50 million in diamonds at Belgian airport }

screenshot { The Sicilian Clan, 1969 | more }

‘Everything resembles the truth, everything can happen to a man.’ –Gogol

224.jpg

Two generations on, the 1946-1947 Moldovan famine remains a highly contentious and emotive issue in Moldova itself. […] One aspect of the Moldovan famine that makes its memory more fraught is the gruesome suggestion that ‘the eating of corpses took place on a large scale.’ The authorities were aware of the practice— they even showed Alexei Kosygin, then a candidate politburo member and sent from Moscow to investigate, a corpse that had been prepared for eating—and sought to stamp it out. There were stories of murder-cannibalism, including one of ‘a peasant woman from the village of Tambula’, who had ‘killed two of her four children, a girl of six and a boy of five, with a view to eating them’, and ‘another peasant from the village of Cajba’ who had‘ killed his 12-year-old grandson who had come to visit and ate him’.

Cannibalism is famine’s darkest secret, a taboo topic. How common was it in the past?

{ SSRN | Continue reading }

photo { Joe Shere, Jayne Mansfield and Sophia Loren at Romanoff’s, Beverly Hills, c. 1958 }

The eyes in which a tear and a smile strove ever for the mastery were of the dimensions of a goodsized cauliflower

220.jpg

Buffett’s Berkshire Hathaway and 3G said last Thursday they would buy Heinz for $23 billion in cash. Almost immediately, options market players noted there had been extremely unusual activity the day before the deal was announced.

On Friday, the U.S. Securities and Exchange Commission filed a suit against unknown traders who it said used a Goldman Sachs account in Switzerland to trade on purported inside knowledge of the transaction.

On Tuesday, the FBI said it was joining in as well.

{ Reuters | Continue reading }

The parties hereby stipulate that their marriage has broken down irretrievably

341.jpg

Alien abduction insurance is an insurance policy issued against alien abduction.

The insurance policy is redeemed if the insured person is abducted by aliens.

The very first company to offer UFO abduction insurance was the St. Lawrence Agency in Altamonte Springs, Florida. The company says that it has paid out at least two claims.

The company pays the claimant $1 per year until their death or for 1 million years, whichever comes first. Over 20,000 people have purchased the insurance.

{ Wikipedia | Continue reading }

REDЯUM

51.jpg

On the evening of August 13, 1967, two women were attacked and killed by grizzly bears (Ursus arctos horribilis) in separate incidents within Glacier National Park (GNP). Following these incidents, there was speculation that due to odors associated with menstruation, women may be more prone to attack by bears than are men (Rogers et al. 1991).


In a study designed to test the hypothesis that bears are attracted to the odors of menstruation, Cushing (1983) reported that when presented with a series of different odors (including seal scents, other food scents, non menstrual human blood, and used tampons), four captive polar bears elicited a strong behavioral response only to seal scents and menstrual odors (used tampons).

Herrero (1985) analyzed the circumstances of hundreds of grizzly bear attacks on humans, including the attacks on the two women in GNP, and concluded that there was no evidence linking menstruation to any of the attacks. The responses of grizzly bears to menstrual odors has not been studied experimentally.

[…]

Menstrual odors were essentially ignored by black bears of all sex and age classes.

{ Bearman’s | Continue reading | Thanks Tim! }

C’est la vie, say the old folks, it goes to show you never can tell

312.jpg

The Tunguska event was an enormously powerful explosion that occurred near (and later struck) the Podkamennaya Tunguska River in what is now Krasnoyarsk Krai, Russia, on June 30, 1908. The explosion is believed to have been caused by the air burst of a large meteoroid or comet fragment at an altitude of 5–10 kilometres (3–6 mi) above the Earth’s surface.

Although the meteoroid or comet appears to have burst in the air rather than hitting the surface, this event still is referred to as an impact. Estimates of the energy of the blast range from 5 to as high as 30 megatons of TNT, with 10–15 megatons of TNT the most likely—about 1,000 times more powerful than the atomic bomb dropped on Hiroshima, Japan.

The Tunguska explosion knocked an estimated 80 million trees down over an area covering 2,150 square kilometres (830 sq mi) (i.e. circular area of 52km in diameter). It is estimated that the shock wave from the blast would have measured 5.0 on the Richter scale.

{ Wikipedia | Continue reading }

Would you rather eat a pinecone, or poop a pinecone?

216.jpg

To determine whether “folk myths” regarding the relationships of penile size to body height and foot size have any basis in fact, 63 normally virilized men were studied. Height and stretched penile length were measured; shoe size was recorded and converted to foot length. Penile length was found to be statistically related to both body height and foot length, but with weak correlation coefficients. Height and foot size would not serve as practical estimators of penis length.

{ Annals of Sex Research, 1993 }

Gary and members of his law firm filed a lawsuit late Monday in federal court in Fort Pierce on behalf of Chubby Checker, the 71-year-old singer known for “The Twist,” against Hewlett-Packard and its subsidiary Palm Inc. over the use of Checker’s name on a software application that claims to estimate the size of a man’s penis based on his shoe size…

{ via Improbable | Continue reading }

photo { Leon Levinstein }

Au couvent, le confesseur s’endort

43.jpg

{ List of the shortest-reigning popes | ‪List of sexually active popes‬ }

and { Resigning Pope No Longer Has Strength To Lead Church Backward }

Gratitude is the memory of the heart

5.jpg

I shot him, two times in the forehead. Bap! Bap!

[…]

The Navy SEAL who killed Osama bin Laden will discover soon enough that when he leaves after sixteen years in the Navy, his body filled with scar tissue, arthritis, tendonitis, eye damage, and blown disks, here is what he gets from his employer and a grateful nation: Nothing. No pension, no health care, and no protection for himself or his family.

[…]

Then I just wanted to go get out of the house. We all had a DNA test kit, but I knew another team would be in there to do all that. So I went down to the second floor where the offices were, the media center. We started breaking apart the computer hard drives, cracking the towers. We were looking for thumb drives and disks, throwing them into our net bags.

In each computer room, there was a bed. Under the beds were these huge duffel bags, and I’m pulling them out, looking for whatever. At first I thought they were filled with vacuum-sealed rib-eye steaks. I thought, They’re in this for the long haul. They’ve got all this food. Then, wait a minute. This is raw opium. These drugs are everywhere. It was pretty funny to see that.

{ Center for Investigative Reporting | Continue reading }

photo { Harry Benson, Grieving Man with Flag, Washington, D.C., 1971 }

Surveiller et punir

214.jpg

A multinational security firm has secretly developed a software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites.

{ Guardian | Continue reading }

images { 1 | 2 }

Who wants two gestures to illustrate a loaf and a jug?

29.jpg

Deloitte predicts that in 2013 more than 90 percent of user-generated passwords, even those considered strong by IT departments, will be vulnerable to hacking. […]

How do passwords get hacked? The problem is not that a hacker discovers a username, goes to a login page and attempts to guess the password. That wouldn’t work: most web sites freeze an account after a limited number of unsuccessful attempts, not nearly enough to guess even the weakest password.

Most organizations keep usernames and passwords in a master file. That file is hashed: a piece of software encrypts both the username and password together. […] However, master files are often stolen or leaked. A hashed file is not immediately useful to a hacker, but various kinds of software and hardware can decrypt the master file and at least some of the usernames and passwords. Decrypted files are then sold, shared or exploited by hackers. […]

An eight-character password chosen from all 94 characters available on a standard keyboard is one of 6.1 quadrillion (6,095,689,385,410,816) possible combinations. It would take about a year for a relatively fast 2011 desktop computer to try every variation. Even gaining access to a credit card would not be worth the computing time.

However, a number of factors, related to human behavior and changes in technology, have combined to render the “strong” password vulnerable.

First, humans struggle to remember more than seven numbers in our short-term memory. Over a longer time span, the average person can remember only five. Adding letters, cases, and odd symbols to the mix makes remembering multiple characters even more challenging.

As a result, people use a variety of tricks to make recalling passwords easier. For example, users often create passwords that reference words and names in our language and experience. […] Although a keyboard has 32 different symbols, humans generally only use half-a-dozen in passwords because they have trouble distinguishing between many of them. These tricks and tendencies combine to make passwords less random, and therefore weaker. […]

But non-random passwords aren’t even the biggest problem. The bigger problem is password re-use. The average user has 26 password-protected accounts, but only five different passwords across those accounts. Because of password re-use, a security breach on a less-secure gaming or social networking site can expose the password that protects a bank account. […]

Longer passwords could make systems more secure. Adding just one or two characters make brute-force attacks almost a thousand times slower. A ten-character password has 8,836 more possible combinations than an eight-character password, and the same password-cracking machine cited above would take more than 5 years to crack it. Truly random passwords would also decrease the threat from hackers.

{ Deloitte | Continue reading }

I am the slap and the cheek, I am the limbs and the rack, and the victim and the executioner

28.jpg

Hunger, thirst, stress and drugs can create a change in the brain that transforms a repulsive feeling into a strong positive “wanting,” a new University of Michigan study indicates.

The research used salt appetite to show how powerful natural mechanisms of brain desires can instantly transform a cue that always predicted a repulsive Dead Sea Salt solution into an eagerly wanted beacon or motivational magnet. […]

This instant transformation of motivation, he said, lies in the ability of events to activate particular brain circuitry.

{ EurekAlert | Continue reading }

But the first thing in the morning. (He pats divers pockets.) This moving kidney.

78.jpg

Coca-Cola won’t say how it makes its best-selling Simply Orange orange juice, but one thing is for sure: It’s not so simple. A new investigation by Bloomberg Businessweek shows that the Coke-owned orange juice brand that’s billed as less processed version of Tropicana is in fact a hyper-engineered and dauntingly industrial product. […]

Coke also figured out that people are willing to pay 25 percent more for juice that’s not processed, that is, not made from concentrate. Enter Simply Orange. It is indeed just oranges, but boy have those oranges been through hell and back. Coke calls the process Black Book, because it won’t tell anyone how it works. The consultant that designed the Black Book formula will, however.

Bob Cross of Revenue Analytics explained to Bloomberg Businessweek that Coke relies on a deeply complex algorithm for every step of the juice-making process. The algorithm is designed to accept any contingency that might affect manufacturing, from weather patterns to shifts in the global economy, and make adjustments to the manufacturing process accordingly. Built into the model is a breakdown of the 600-plus flavors that are in orange juice that are tweaked throughout the year to keep flavor consistent and in line with consumer tastes. Coke even sucks the oxygen out of the juice when they send it to be mixed so that they can keep it around for a year or more to balance out other batches.

{ The Atlantic Wire | Continue reading }

Agree, for the law is costly

54.jpg

How far has society gone in dreaming up new dangers to protect our children from? […]

(A.) An upstate New York school district outlawed soap in its pre-school bathrooms for fear that children might suddenly start drinking it. Now kids must come out and ask an adult to squirt some soap in their hands.


(B.) Unaccompanied children under age 12 were banned from the Boulder, CO, library, lest they encounter “hazards such as stairs, elevators, doors, furniture…and other library patrons.”


(C.) The Consumer Product Safety Commission announced a recall of certain fleece hoodies sold at Target because of lead paint on the zipper, which presumably could raise blood lead levels if the zippers are eaten.


(D.) Children under age 18 were prohibited from gathering on the streets of Tucson, AZ, for fear they might “talk, play or laugh” in groups, which could lead to bullying.


(E.) A New Canaan, CT, mom was charged with “risk of injury to a minor,” for letting her 13-year-old babysit the three younger children at home for an hour while the mom went to church.


(F.) A Tennessee mother was thrown in jail for letting her kids, aged 8 and 5, go the park without her, a block and half away from home.

[…]

The message to parents? The government is better at raising your kids than you are. The message to kids? You are weak little babies.

{ CATO Unbound | Continue reading }

photo { Mary Ellen Mark }

Pyramids in sand. Built on bread and onions.

25.jpg

Governor Andrew Cuomo wants to use $400 million in federal funding to buy beachfront homes as he seeks to reshape the New York coastline so the state is better prepared for storms like Hurricane Sandy.

The cash would come from the $51 billion Congress approved last month to help the region recover from the Oct. 29 storm.

The governor would use the money to pay owners the pre-storm value of their homes. More than 300,000 houses in New York were damaged by Sandy.

Once sold, the houses would be razed and the land would remain vacant.

{ Bloomberg | Continue reading }

She captures his hand, her forefinger giving to his palm the pass touch of secret monitor, luring him to doom

24.jpg

Federal prosecutors intend to bring civil charges against Standard & Poor’s for wrongdoing in its rating of mortgage bonds prior to the 2008 financial crisis.

Allegations against the McGraw-Hill unit will center on the model used to rate the bonds and will reportedly be made in lawsuits to be filed as soon as this week.

A move by U.S. officials would be the first federal enforcement action against a major credit rating agency over alleged illegal behavior tied to the financial crisis.

The lawsuit is reportedly regarding 30 triple-A rated CDOs from the first half of 2007, and the Department of Justice is seeking “a 10 figure plus settlement and the admission of wrongdoing,” according to sources.

“A DOJ lawsuit would be entirely without factual or legal merit,” S&P said in a statement. “It would disregard the central facts that S&P reviewed the same subprime mortgage data as the rest of the market – including U.S. government officials who in 2007 publicly stated that problems in the subprime market appeared to be contained – and that every CDO that DOJ has cited to us also independently received the same rating from another rating agency.”

Shares of McGraw-Hill are down nearly 14 percent following news of the charges.

{ CNBC | Continue reading }

What part of NO don’t you understand?

4531.jpg

For over two decades researchers have shown that there are unexpected consequences when an individual actively tries to avoid certain thoughts. First, you will start thinking about the thought you are trying to avoid more. Second, if the thought is about a behavior, you increase the likelihood of engaging in that behavior. In short, avoidance makes you less able to control what you think and what you do. Further research is necessary to explore why thought avoidance is such a prolific self-control strategy when all available evidence points to its counterintuitive consequences. […]

Thought suppression commonly refers to the act of deliberately trying to rid the mind of unwanted thoughts. In early investigations researchers demonstrated that the suppression of a particular thought often resulted in the subsequent increased return of the unwanted thought, a phenomenon termed the ‘rebound effect.’ This basic effect has been replicated on many occasions, and a more recent meta-analysis suggests the rebound effect is robust.

Therefore, there is currently a general acceptance of the view that thought suppression does not work as a strategy for controlling one’s mind, and if anything makes one more susceptible to unwanted intrusive thoughts. For example, after watching a disturbing news item, I may attempt to suppress thoughts about this disturbing footage. However, the likely outcome of this will be that I will think about the footage more not less, and I may even begin to feel obsessed. […]

Studies have reported that thought suppression can have behavioral consequences. […] How many times have you carried a tray of food or drink thinking whatever happens I must not spill this, only to then redecorate the living room with it? These errors seem to plague us and chastise us all the more so because we knew exactly what we shouldn’t have done ahead of time. Thereby, it seems that the act of trying not to, or suppressing invites one to do exactly the opposite. […]

One must avoid using thought suppression in instances where one is attempting to control a behavior. This is especially pertinent when attempting to control behaviors such as smoking, excessive alcohol or food intake, as these are likely areas where thought suppression will feature as a control strategy.

{ The Psychologist | Continue reading }



kerrrocket.svg