shop imp kerr
nswd

pipeline

Boomed crashing chords. When love absorbs.

412.jpg

The US surveillance regime has more data on the average American than the Stasi ever did on East Germans.

The American government is collecting and storing virtually every phone call, purchases, email,  text message, internet searches, social media communications, health information,  employment history, travel and student records, and virtually all other information of every American.

Some also claim that the government is also using facial recognition software and surveillance cameras to track where everyone is going.  Moreover, cell towers track where your phone is at any moment, and the major cell carriers, including Verizon and AT&T, responded to at least 1.3 million law enforcement requests for cell phone locations and other data in 2011. And – given that your smartphone routinely sends your location information back to Apple or Google – it would be child’s play for the government to track your location that way.

As the top spy chief at the U.S. National Security Agency explained this week, the American government is collecting some 100 billion 1,000-character emails per day, and 20 trillion communications of all types per year.

{ Washington Blogs | Continue reading }

Very unpleasant. Noble art of self-pretence. Personally, I detest action.

210.jpg

We live in an image society. Since the turn of the 20th century if not earlier, Americans have been awash in a sea of images – in advertisements, in newspapers and magazines, on billboards, throughout the visual landscape. We are highly attuned to looks, first impressions and surface appearances, and perhaps no image is more seductive to us than our own personal image. In 1962, the cultural historian Daniel Boorstin observed that when people talked about themselves, they talked about their images. If the flourishing industries of image management — fashion, cosmetics, self-help — are any indication, we are indeed deeply concerned with our looks, reputations, and the impressions that we make. For over a hundred years, social relations and conceptions of personal identity have revolved around the creation, projection, and manipulation of images. […]

In what follows, I want to contemplate one legal consequence of the advent of the image society: the evolution of an area of law that I describe as the tort law of personal image. By the 1950s, a body of tort law – principally the privacy, defamation, publicity, and emotional distress torts4 — had developed to protect a right to control one’s own image, and to be compensated for emotional and dignitary harms caused by egregious and unwarranted interference with one’s self-presentation and public identity. The law of image gave rise to the phenomenon of the personal image lawsuit, in which individuals sued to vindicate or redress their image rights. By the postwar era, such lawsuits had become an established feature of the sociolegal landscape, occupying not only a prominent place on court dockets but also in the popular imagination. The growth in personal image litigation over the course of the 20th century was driven by Americans’ increasing sense of entitlement to their personal images. A confluence of social forces led individuals to cultivate a sense of possessiveness and protectiveness towards their images, which was legitimated and enhanced by the law.

This article offers a broad overview of the development of the modern “image torts” and the phenomenon of personal image litigation.

{ Samantha Barbas/SSRN | Continue reading }

You say that you need my love, and you’re wantin’ my body, I don’t mind

3.png

{ Sexting: Research Criteria of a Globalized Social Phenomenon }

Snakes of river fog creep slowly. From drains, clefts, cesspools, middens arise on all sides stagnant fumes. A glow leaps in the south beyond the seaward reaches of the river.

31.jpg

Check Point has revealed how a sophisticated malware attack was used to steal an estimated €36 million from over 30,000 customers of over 30 banks in Italy, Spain, Germany and Holland over summer this year.

The theft used malware to target the PCs and mobile devices of banking customers. The attack also took advantage of SMS messages used by banks as part of customers’ secure login and authentication process.

The attack worked by infecting victims’ PCs and mobiles with a modified version of the Zeus trojan. When victims attempted online bank transactions, the process was intercepted by the trojan.

Under the guise of upgrading the online banking software, victims were duped into giving additional information including their mobile phone number, infecting the mobile device. The mobile Trojan worked on both Blackberry and Android devices, giving attackers a wider reach.

{ Net Security | Continue reading }

Onity, the company whose locks protect 4 million or more hotel rooms around the world, has agreed to reimburse at least some fraction of its hotel customers for the cost of fixing a security flaw exposed in July.

{ Forbes | Continue reading }

Some cyberattacks over the past decade have briefly affected state strategic plans, but none has resulted in death or lasting damage. For example, the 2007 cyberattacks on Estonia by Russia shut down networks and government websites and disrupted commerce for a few days, but things swiftly went back to normal. The majority of cyberattacks worldwide have been minor: easily corrected annoyances such as website defacements or basic data theft — basically the least a state can do when challenged diplomatically.

Our research shows that although warnings about cyberwarfare have become more severe, the actual magnitude and pace of attacks do not match popular perception.

{ Foreign Affairs | Continue reading }

I’ll make death love me

4.jpg

Verizon is arguing before the Court of Appeals for the D.C. Circuit that broadband providers have a right to decide what they transmit online. […] According to Verizon’s argument:

In performing these functions [providing the transmission of speech from Point A to Point B], broadband providers possess ‘editorial discretion.’

Just as a newspaper is entitled to decide which content to publish and where, broadband providers may feature some content over others.
In effect, Verizon claims that by transmitting bits – providing Internet access – it gains the rights of a newspaper like the Washington Post or the New York Times. This assertion has no basis in constitutional law, and in fact repudiates many positions taken by Verizon before Congress, courts and the FCC over the years.

[…]

“Verizon and its predecessors have argued exactly to the contrary time after time — including when they were fighting for open access to cable companies’ wires a decade ago and when they have claimed immunity from liability based on their status as a transmissions provider for the content they carry,” said Tyrone Brown, who served as an FCC Commissioner from 1977-1981.

{ Roosevelt Institute | Continue reading }

Sad was the man that word to hear that him so heavied in bowels ruthful

321.jpg

With everything from banking records and health data to contacts lists and photos available through our mobile phones, the ability to securely  access this data is an increasingly important concern.  That’s why many phone manufactures and data holders are keen on biometric security systems that reliably identify individuals.

The question of course is which biometric system to use. Face, fingerpint and iris recognition are all topics of intense research. But the most obvious choice for a mobile phone is surely voice identification. However, this approach has been plagued with problems.

For example, people’s voices can change dramatically when they are ill or in a hurry. What’s more, it’s relatively easy to record somebody’s voice during authentication and use that to break the system. So many groups have steered away from voice biometrics.

That could be set to change. Today, RC Johnson at the University of Colorado at Colorado Springs and a couple of pals lay out a new approach to voice biometrics which they say solves these problems. The new system provides secure authentication while also preserving the privacy of the user.

In the new system, users set up their accounts by recording a large number of words and phrases which are sent in encrypted form to a bank, for example. This forms a template that the bank uses to verify the user.

{ The Physics arXiv Blog | Continue reading }

Hades

5.jpg

With a homicide rate historically more than three times greater than the rest of the United States, Newark, N.J., isn’t a great vacation spot. But it’s a great place for a murder study.

Led by April Zeoli, an assistant professor of criminal justice, a group of researchers at Michigan State University tracked homicides around Newark from 1982 to 2008, using analytic software typically used by medical researchers to track the spread of diseases. They found that “homicide clusters” in Newark, as researchers called them, spread and move throughout a city much the same way diseases do. Murders, in other words, did not surface randomly—they began in the city center and moved in “diffusion-like processes” across the city.

The study also found that the there were areas of Newark that, despite being beset by violence on all sides, remained almost completely immune to the surrounding trends over the entire course of the 26 years studied.

{ Vice | Continue reading }

‘Empty crypts awaiting internment should just be rented out as short-stay Goth hotels.’ –Tim Geoghegan

23.jpg

In 1870, German chemist Erich von Wolf analyzed the iron content of green vegetables and accidentally misplaced a decimal point when transcribing data from his notebook. As a result, spinach was reported to contain a tremendous amount of iron—35 milligrams per serving, not 3.5 milligrams (the true measured value). While the error was eventually corrected in 1937, the legend of spinach’s nutritional power had already taken hold, one reason that studio executives chose it as the source of Popeye’s vaunted strength.

The point, according to Samuel Arbesman, an applied mathematician and the author of the delightfully nerdy “The Half-Life of Facts,” is that knowledge—the collection of “accepted facts”—is far less fixed than we assume. In every discipline, facts change in predictable, quantifiable ways, Mr. Arbesman contends, and understanding these changes isn’t just interesting but also useful. For Mr. Arbesman, Wolf’s copying mistake says less about spinach than about the way scientific knowledge propagates.

Copying errors, it turns out, aren’t uncommon and fall into characteristic patterns, such as deletions and duplications—exactly the sorts of mistakes that geneticists have identified in DNA. Using approaches adapted from genetics, paleographers—scientists who study ancient writing—use these accumulated errors to trace the age and origins of a document, much in the same way biologists use the accumulation of genetic mutations to assess how similar two species are to each other. For example, by analyzing the oddities and duplicated errors in the 58 surviving versions of “The Wife of Bath’s Prologue” from Chaucer’s “Canterbury Tales,” researchers deduced the content of the original version.

Mr. Arbesman’s interest in the spread of knowledge also leads him to the story of Brontosaurus, the lovable, distinct herbivore we all grew up with—only it never existed. Originally described in 1879 by Othniel Marsh, the Brontosaurus was soon determined to be a type of dinosaur that Marsh had already discovered in 1877, the Apatosaurus. But since the original Apatosaurus was just “a tiny collection of bones,” while the Brontosaurus that Marsh named “went on to be supplemented with a complete skeleton, beautiful to behold,” the second discovery captured the public’s imagination and the name “Brontosaurus” stuck for nearly a century. Only recently has the name “Apatosaurus” started to gain traction.

{ WSJ | Continue reading }

Prepare to receive cavalry. Prepare to receive soup.

45.jpg

These days, the TSA’s major role appears to be to make plane trips more unpleasant. And by doing so, it’s encouraging people to take the considerably more dangerous option of traveling by road. […]

A longer list of TSA’s confiscations would include a G.I. Joe action doll’s 4-inch plastic rifle (“it’s a replica”) and a light saber. […]

Researchers at Cornell University suggest that people switching from air to road transportation in the aftermath of the 9/11 attacks led to an increase of 242 driving fatalities per month—which means that a lot more people died on the roads as an indirect result of 9/11 than died from being on the planes that terrible day. They also suggest that enhanced domestic baggage screening alone reduced passenger volume by about 5 percent in the five years after 9/11, and the substitution of driving for flying by those seeking to avoid security hassles over that period resulted in more than 100 road fatalities.

{ BloombergBusinessweek | Continue reading }

‘The old woman dies, the burden is lifted.’ –Schopenhauer

312.jpg

This report spells out what the world would be like if it warmed by 4 degrees Celsius, which is what scientists are nearly unanimously predicting by the end of the century, without serious policy changes.

The 4°C scenarios are devastating: the inundation of coastal cities; increasing risks for food production potentially leading to higher malnutrition rates; many dry regions becoming dryer, wet regions wetter; unprecedented heat waves in many regions, especially in the tropics; substantially exacerbated water scarcity in many regions; increased frequency of high-intensity tropical cyclones; and irreversible loss of biodiversity, including coral reef systems. […]

The science is unequivocal that humans are the cause of global warming, and major changes are already being observed: global mean warming is 0.8°C above pre industrial levels; oceans have warmed by 0.09°C since the 1950s and are acidifying; sea levels rose by about 20 cm since pre-industrial times and are now rising at 3.2 cm per decade; an exceptional number of extreme heat waves occurred in the last decade; major food crop growing areas are increasingly affected by drought.

{ World Bank | PDF }

Crime, like virtue, has its degrees

311.jpg

{ Letizia Battaglia, The triple murder of a prostitute and her clients, Palermo, 1982 }

The chord in any circle being less than the arc which it subtends

65.jpg

{ Why is the polyp Hydra immortal? Researchers from Kiel University decided to study it — and unexpectedly discovered a link to aging in humans. | Kurzweil | full story }

As if any fool wouldn’t know what that meant

54.jpg

It’s all about the fact that people want to achieve two things at the same time. We want to think of ourselves as honest, wonderful people, and then we want to benefit from cheating. Our ability to rationalize our own actions can actually help us be more dishonest while thinking of ourselves as honest. So the idea that everybody else does it, or the idea that nobody is really going to suffer, or the idea that the entity you are stealing from is actually a bad entity, or the idea that you don’t see it—all of those things help people be dishonest.

{ Daniel Ariely/The Politic | Continue reading }

Mild fire of wine kindled his veins. I wanted that badly.

456.jpg

Food and nutrition. In concept it seems straightforward enough. Food is what we eat to obtain the nourishment and thus the energy to keep us going from day to day. Yet food has undergone radical changes over the past hundred years, especially in the industrialized West. People who lived at the turn of the 20th century wouldn’t recognize today’s grocery stores, and they certainly wouldn’t recognize much of what fills grocery store shelves as nourishment.

It all began with a push toward greater convenience in an increasingly mechanized world. Electricity and then electronics brought with them an endless stream of new gadgets for the home, each promising to make life easier in some way. Many of these time- and labor-saving devices were destined for the kitchen. Factories, too, were retooled to streamline the manufacture of everything, including food. But a growing segment of today’s population is concerned about healthy eating and about the place of heavily processed foods in their diet. Should convenience be the ruler by which we measure food and nutrition?

Some convenience foods actually predate the 20th century, among them canned soups, fruits and vegetables; gelatin dessert mixes; ketchup and other prepared condiments; pancake mixes; ready-to-eat breakfast cereals; sweetened condensed milk. After the First World War, these and more found their way into the kitchens of eager young housewives, with manufacturers often promoting their innovative products via free recipe books.

There’s no denying that flavor, texture and nutrients suffered, but people began to rely on these conveniences, and their tastes simply changed to accommodate. […]

Throughout the 20th century, the food industry worked to provide not only convenience but also ostensibly wholesome substitutes for natural foods, including butter. In fact, margarine has been around since the late 19th century, but for many years it was white by law. Eventually, however, it came with added artificial flavor and a capsule of yellow artificial food coloring (to be kneaded in after purchase) so it would taste and look more like the real thing. […]

After several generations of variations on this theme, however, we are seeing the effects of eating foods that are so far removed from their original state. Not only are many diseases linked to poor diet—from certain cancers to diabetes to heart disease—but obesity affects an unprecedented segment of the Western population.

{ Vision | Continue reading }

Deaden the gnaw of hunger that way. Pleasure or pain is it? Knife and fork chained to the table.

2324.jpg

In July, Wells Fargo paid a $175 million settlement after the feds caught its brokers systematically pushing minority customers into mortgages with higher rates and fees, even though they posed the same credit risks as whites.

One study found that Wells Fargo charged Hispanics $2,000 more in what the Justice Department called a “racial surtax.” The bank docked blacks nearly $3,000 extra for their own improper pigmentation.

Across the country, in Minneapolis, U.S. Bank also swindled its customers, though at least it let whites in on the action. Instead of logging debit card purchases in the order they were made, the bank rearranged them from highest amount to lowest, the better to artificially stick customers with overdraft fees.

U.S. Bank paid $55 million to settle a class action suit in July. It was the 13th major bank caught running this scam.

These were just the opening salvos of the assault. Bank of America was caught illegally foreclosing on the homes of active-duty soldiers. Visa and MasterCard were charged with fixing the prices they charged merchants to process credit card payments. Morgan Stanley colluded to drive up New York electricity prices. And in the most depraved case of all, Morgan Stanley was even sued for allegedly swindling Irish nuns in an investment deal.

{ Village Voice | Continue reading }

Better where she is down there: away. Occupy her.

Cindy Sherman reveals that, like most people, she’s had trouble finding anything good in New York’s second-hand shops.

I’ll call later in the day and I’ll take one of those soaps. How much are they?

418.jpg

U.S. cellphone carriers took a major step on Wednesday toward curbing the rising number of smartphone thefts with the introduction of databases that will block stolen phones from being used on domestic networks.

The initiative got its start earlier this year when the U.S. Federal Communications Commission and police chiefs from major cities asked the cellular carriers for assistance in battling the surging number of smartphone thefts. In New York, more than 40 percent of all robberies involve cellphones and in Washington, D.C., cellphone thefts accounted for 38 percent of all robberies in 2011.

With the introduction of the database, carriers will be able to block stolen handsets from being used on their networks. Until now, such blocking had targeted the SIM card, so unauthorized calls could not be made on stolen phones, but putting in a new SIM card meant the phone could still be used. That meant a stolen phone could be sold on the second-hand market.

The new database blocks the IMEI number, a unique identification number in the cellphone.

{ Network World | Continue reading }

photo { Garry Winogrand }

This is Red 5, I’m going in

230.jpg

The U.S. government is surreptitiously collecting the DNA of world leaders, and is reportedly protecting that of Barack Obama. Decoded, these genetic blueprints could provide compromising information. In the not-too-distant future, they may provide something more as well—the basis for the creation of personalized bioweapons that could take down a president and leave no trace.

{ Atlantic | Continue reading }

Raw silk shirts and a New York leather look

543.jpg

For nearly a decade, scientists have told city and state officials that New York faces certain peril: rising sea levels, more frequent flooding and extreme weather patterns. The alarm bells grew louder after Tropical Storm Irene last year, when the city shut down its subway system and water rushed into the Rockaways and Lower Manhattan.

On Tuesday, as New Yorkers woke up to submerged neighborhoods and water-soaked electrical equipment, officials took their first tentative steps toward considering major infrastructure changes that could protect the city’s fragile shores and eight million residents from repeated disastrous damage. […]

“The construction of this city did not anticipate these kinds of situations. We are only a few feet above sea level,” Mr. Cuomo said during a radio interview. “As soon as you breach the sides of Manhattan, you now have a whole infrastructure under the city that fills — the subway system, the foundations for buildings,” and the World Trade Center site. […]

After rising roughly an inch per decade in the last century, coastal waters in New York are expected to climb as fast as six inches per decade, or two feet by midcentury, according to a city-appointed scientific panel. That much more water means the city’s flood risk zones could expand in size. […]

What scientists, who have devoted years of research to the subject, now fear most is that, as soon as the cleanup from this storm is over, the public will move on.

{ NY Times | Continue reading }

related { What Will Happen to the NYC Subway Rats? }

And the last end of Anus Heresiarchus. The agony in the closet.

58.jpg

This study offers the first combined quantitative assessment of suicide terrorists and rampage, workplace, and school shooters who attempt suicide, to investigate where there are statistically significant differences and where they appear almost identical. Suicide terrorists have usually been assumed to be fundamentally different from rampage, workplace, and school shooters.

Many scholars have claimed that suicide terrorists are motivated purely by ideology, not personal problems, and that they are not even suicidal. This study’s focus was on attacks and attackers in the United States from 1990 to 2010 and concluded that the differences between these offenders were largely superficial. Prior to their attacks, they struggled with many of the same personal problems, including social marginalization, family problems, work or school problems, and precipitating crisis events.

{ Homicide Studies/SAGE | Continue reading }



kerrrocket.svg