shop imp kerr
nswd

pipeline

‘What does it matter how many lovers you have if none of them gives you the universe?’ –Lacan

{ For $75, this guy will sell you 1,000 Facebook ‘Likes’ | NPR | audio }

related { Facebook’s costs are rising considerably faster than its revenues. Simply relying on attracting more and more people to the site won’t do the trick. | The New Yorker | full story }

I don’t like the term ’substance abuse.’ I prefer ‘teaching substance a lesson.’

521.jpg

The lawyers for Goldman and Bank of America/Merrill Lynch have been involved in a legal battle for some time – primarily with the retail giant Overstock.com, but also with Rolling Stone, the Economist, Bloomberg, and the New York Times. The banks have been fighting us to keep sealed certain documents that surfaced in the discovery process of an ultimately unsuccessful lawsuit filed by Overstock against the banks.

Last week, the banks’ lawyers, apparently accidentally, filed an unredacted version of Overstock’s motion as an exhibit in their declaration of opposition to that motion. In doing so, they inadvertently entered into the public record a sort of greatest-hits selection of the very material they’ve been fighting for years to keep sealed. […]

“Fuck the compliance area – procedures, schmecedures,” chirps Peter Melz, former president of Merrill Lynch Professional Clearing Corp. (a.k.a. Merrill Pro), when a subordinate worries about the company failing to comply with the rules governing short sales. […]

There are even more troubling passages, some of which should raise a few eyebrows, in light of former Goldman executive Greg Smith’s recent public resignation, in which he complained that the firm routinely screwed its own clients and denigrated them (by calling them “Muppets,” among other things).

{ Rolling Stones | Continue reading }

How is that possible? Spooks. Rocks.

343.jpg

Bem made his mark as a psychologist four decades ago by proposing the then radical idea that people adjust their emotions after observing their own behavior–that we sometimes develop our attitudes about our actions only after the fact. The proposition challenged the prevailing wisdom of the 1960s that things worked the other way around, that attitude was the engine from which behavior emerged. Though counterintuitive, Bem’s theory has held up to scientific scrutiny in dozens of studies and is now enshrined in psychology textbooks.

Over the years, Bem cemented his reputation as a rebel by floating other controversial theories on topics such as personality and sexual orientation. His own personal life was also decidedly unconventional. Despite being married to a woman, Bem never hid from his family the fact that he is gay. A few years ago, he explained this conjugal conundrum in an Internet posting distinguishing between romantic love and sexual attraction, arguing that many individuals—like himself—fall in love with a person of the “wrong” gender.

Even in the context of a career of irreverence, there was little to suggest that Bem would end up defending the possibility of extrasensory perception, or ESP, which most mainstream scientists consider unworthy of serious inquiry. […]

By the end of the 1990s, Bem had changed his focus from clairvoyance to precognition, the most mind-
boggling of psi phenomena. “It has the biggest wow factor,” he says. Although telepathy, or straightforward mind reading, is hard to believe, at least it seems remotely scientifically possible. Electromagnetic waves travel over vast distances, so perhaps there is some way the electrical impulses that generate thoughts could be transmitted from one person to another. Precognition is different. Sensing events that have not yet occurred requires that information move backward in time. “I thought, my god, that is fascinating,” Bem says, “because it means that our classical view of the physical world is wrong.”

{ Discover | Continue reading }

Which dangled at every movement of his portentous frame

353.jpg

New York City agency pushes plan to prevent cyberattacks on elevators, boilers

What would happen if an attacker broke into the network for the industrial control systems for New York City’s elevators and boiler systems and decided to disrupt them?

“You could increase the speed of how elevators go up or down,” says Steve Ramirez, business analyst, analysis and communications in the Office of the CIO of the New York City Housing Authority (NYCHA), which provides public housing for low- to moderate-income families in the five boroughs of the city. And if attackers ever successfully penetrated the network-based industrial control systems (ICS) for the boilers, they could raise the heat levels for municipal boilers, causing them to explode.

{ Network World | Continue reading }

photo { Bill Sullivan }

Stretching over across

{ David O’Reilly, The External World, 2010 }

Surveillance states are the Soviet Union, and the former East Germany

643.jpg

{ US Drone fleet can keep tabs on the movements of Americans, far from the battlefields. And it can hold data on them for 90 days — studying it to see if the people it accidentally spied upon are actually legitimate targets of domestic surveillance. | Wired | full story }

‘Fuck your library.’ –Malcolm Harris

22.jpg

This system is enriching patent trolls—companies that buy patents in order to extort money from innovators. These trolls are like a modern day mafia. […]

The larger players can afford to buy patents to deter the trolls, but the smaller players—the innovative startups—can’t. Instead, they have to settle out of court. Patent trolls take advantage of this weakness. […]

In the smartphone market alone, $15-20 billion has already been spent by technology companies on building defenses, says Stanford Law School professor Mark Lemley. For example, Google bought Motorola Mobility for $12.5 billion—mostly for its patents. An Apple-Microsoft-Oracle-Nokia consortium bought Nortel’s patent portfolio for $4.5 billion. Microsoft bought Novell’s patent portfolio for $450 million and some of AOL’s patents for $1 billion. Facebook bought some of Microsoft’s new AOL patents for $550 million. Lemley estimates that more than $500 million has been squandered on legal fees—and battles are just beginning. This is money that could have been spent, instead, on R&D. […]

Clearly, the laws need revision. Feld says that software patents should be completely abolished—that in the modern era of computing, the best defense is speed to market, execution, and continuous innovation.

{ Washington Post | Continue reading }

photo { Harry Callahan }

‘In recent years, many men of science have come to realize that the scientific picture of the world is a partial one.’ –Aldous Huxley

654.jpg

Despite 28 years of research, there is still no vaccine that provides effective protection against HIV, and in that time around 25 million people have died of HIV-related causes. To understand why creating a vaccine is so hard, you need to understand HIV. This is no ordinary virus. […] The virus is the most diverse we know of. It mutates so rapidly that people might carry millions of different versions of it, just months after becoming infected. HIV’s constantly changing form makes it unlike any viral foe we have tried to thwart with a vaccine. […]

Vaccines train the immune system to recognise part of a virus, creating a long-term armada of antibodies that seek and destroy the invader, should it ever show its face. For HIV, the most obvious target is gp120, the surface protein that it uses to attach itself to human cells. But gp120 also constantly changes shape, making it difficult to recognise. It also comes in clusters of three that are shielded by bulky sugar molecules, hiding it from the immune system.

On top of that, HIV targets immune cells, the very agents that are meant to kill it. And it can hide for years by shoving its DNA into that of its host, creating a long-term reservoir of potential infection.

So, creating an HIV vaccine is like trying to fire a gun at millions of shielded, moving targets. Oh, and they can eat your bullets.

{ NERS/Discover | Continue reading }

photo { Nan Goldin }

If I had a gun wait I have a gun lol

3451.jpg

Forget Hannibal Lecter. The movie portrayal of serial killers as deranged loners with unusually high IQs is dangerously wrong and can hinder investigations. According to the FBI, serial killers are much different in real life. For years, law enforcement investigators, academics, mental health experts, and the media have studied serial murder, from Jack the Ripper in the late 1800s to the sniper killings in 2002, and from the “Zodiac Killer” in California to the “BTK Killer” in Kansas. These diverse groups have long attempted to understand the complex issues related to serial killers. In 2005, the FBI hosted a symposium in San Antonio, Texas. This report contains the collective insights of a team of experts on serial murder. The symposium’s focus was actually two-fold: to bridge the gap between fact and fiction and to build up our body of knowledge to generate a more effective investigative response.

Much of the general public’s knowledge concerning serial murder is a product of Hollywood productions. […] Law enforcement professionals are subject to the same misinformation from a different source: the use of circumstantial information. Professionals, such as investigators, prosecutors, and pathologists may have limited exposure to serial murder. Their experience may be based upon a single murder series, and the factors in that case are generalized to other serial killers. As a result, stereotypes take root in the police community regarding the nature and characteristics of serial murders. […]

The majority of serial killers are not reclusive, social misfits who live alone. They are not monsters and may not appear strange. Many serial killers hide in plain sight within their communities. Serial murderers often have families and homes, are gainfully employed, and appear to be normal members of the community. […]

Contrary to popular belief, serial killers span all racial groups. The racial diversification of serial killers generally mirrors that of the overall U.S. population. […] Female serial killers do exist. […]

Serial murders are not sexually-based. There are many other motivations for serial murders including anger, thrill, financial gain, and attention seeking.

{ Crime | Continue reading }

photo { Keizo Kitajima }

C’est la vie, say the old folks, it goes to show you never can tell

52.jpg

The explosive lawsuit alleges on January 16, 2012, Travolta picked up the masseur in a black Lexus SUV, which had “Trojan condoms in the console of the vehicle” and the duo went to a room at the Beverly Hills Hotel. […] The masseuse tried to complete the deep tissue massage, but the lawsuit alleges, “Travolta, had removed his draping and was masturbating. Travolta’s penis was fully erect, and was roughly 8 inches in length, and his pubic hair was wirey and unkempt. […] The documents state that Travolta said there was a Hollywood actress staying at the hotel that “wanted three way sex, and wanted to be double penetrated.” Travolta said they could have that later, but first they needed to have sex together before calling her, so this way they would be in-sync with each other sexually.

{ Radar | Continue reading }

The poisonous mushroom that makes the fearless vomit

Adscend Media agreed not to spam Facebook users and pay US$100,000 in court and attorney fees, according to the settlement. […] Adscend Media’s spamming generated up to $20 million a year.

{ IT World | Continue reading }

Extraordinary the interest they take in a corpse

7542.jpg

Mummies were stolen from Egyptian tombs, and skulls were taken from Irish burial sites. Gravediggers robbed and sold body parts.

“The question was not, ‘Should you eat human flesh?’ but, ‘What sort of flesh should you eat?’ ” says Sugg. […]

Blood was procured as fresh as possible, while it was still thought to contain the vitality of the body. This requirement made it challenging to acquire. The 16th century German-Swiss physician Paracelsus believed blood was good for drinking, and one of his followers even suggested taking blood from a living body. […]

As science strode forward, however, cannibal remedies died out. The practice dwindled in the 18th century, around the time Europeans began regularly using forks for eating and soap for bathing. But Sugg found some late examples of corpse medicine: In 1847, an Englishman was advised to mix the skull of a young woman with treacle (molasses) and feed it to his daughter to cure her epilepsy. (He obtained the compound and administered it, as Sugg writes, but “allegedly without effect.”)

{ Smithsonian | Continue reading }

photo { Volgareva Irina }

Be a corporal work of mercy if someone would take the life of that bloody dog

865.jpg

Poltergeists are defined as paranormal, mischievous ghostly presences that appear to a select group of people. As paranormal entities, they are beyond investigation by rational scientific means. Or are they? Odd sensations, visions, felt presences, out-of-body experiences, etc. have all been explained by unusual brain activity. Hence, neuroscientists should consider that poltergeists exist in the mind of the perceiver, not as a physical reality in the external world.

A new paper by parapsychologist William G. Roll and colleagues reported on the case of a woman who experienced paranormal phenomenon after suffering a head injury. (…)

[After the head injury,] …the relationship with her first husband deteriorated because he insisted she was not the same person. According to her reports one night he tried to kill her. The anomalous phenomena began that night and have been intermittent since that time. Their intensity and frequency have increased during the last 2–3 years.

EEG recordings revealed chronically abnormal activity at a right temporal lobe electrode.

{ The Neurocritic | Continue reading }

The will of God is all in all

The bear famously tranquilized on the University of Colorado campus last week, and immortalized in a viral photo by CU student Andy Duann, met a tragic death early Thursday morning in the southbound lanes of U.S. 36.

{ DailyCamera | Continue reading }

Hit upon an expedient by suggesting, off the reel, the propriety of the cabman’s shelter, as it was called

5345.jpg

A group of computer security researchers have refined an innovative method of combatting identity theft. (…) Its method, described in the journal Information Sciences, “continuously verifies users according to characteristics of their interaction with the mouse.”

The idea of user verification through mouse monitoring is not new. As the researchers note, “a major threat to organizations is identity thefts that are committed by internal users who belong to the organization.”

To combat this, some organizations turn “physiological biometrics” to verify the identity of a computer user. But these techniques, such as fingerprint sensors or retina scanners, “are expensive and not always available,” the researchers write.

An alternative approach is the use of “behavioral biometrics.” Such a system compiles biometric data such as “characteristics of the interaction between the user and input devices such as the mouse and keyboard” and constructs a “unique user signature.”

{ Pacific Standard | Continue reading }

painting { Antonio Ciseri, Ecce Homo, 1871 }

Human infirmity in moderating and checking the emotions I name bondage

6335.jpg

Drawing on the metaphor of ‘Prozac’, Prozac leadership encourages leaders to believe their own narratives that everything is going well and discourages followers from raising problems or admitting mistakes. Prozac is used to denote and symbolize a widespread social addiction to excessive positivity. Problems can occur, particularly if this positivity is seen to be discrepant with everyday experience. For example, if leaders repeatedly promise that ‘things can only get better’ but over time this does not happen, followers can become increasingly sceptical and cynical. This article warns that Prozac leadership, whether in corporate, political or other settings, can damage performance by eroding trust, communication, learning and preparedness.


{ SAGE | Continue reading }

photo { Erik Wåhlström }

‘I ran my life exactly as I wanted to, all the time. I never listened to anybody.’ –Michael Caine

645.jpg

Albert Tirrell and Mary Bickford had scandalized Boston for years, both individually and as a couple, registering, as one observer noted, “a rather high percentage of moral turpitude.” Mary, the story went, married James Bickford at 16 and settled with him in Bangor, Maine. They had one child, who died in infancy. Some family friends came to console her and invited her to travel with them to Boston. Mary found herself seduced by the big city. (…)

James came to Boston at once, found Mary working in a house of ill repute on North Margin Street and returned home without her. She moved from brothel to brothel and eventually met Tirrell, a wealthy and married father of two. He and Mary traveled together as man and wife, changing their names whenever they moved, and conducted a relationship as volatile as it was passionate; Mary once confided to a fellow boarder that she enjoyed quarreling with Tirrell because they had “such a good time making up.” (…)

Choate kept that case in mind while plotting his defense of Tirrell, and considered an even more daring tactic: contending that Tirrell was a chronic sleepwalker. If he killed Mary Bickford, he did so in a somnambulistic trance and could not be held responsible.

{ Smithsonian | Continue reading }

photo { Linus Bill }

You were speaking of the gaseous vertebrate, if I mistake not?

5gt.jpg

The internet is no stranger to crime. From counterfeit and stolen products, to illegal drugs, stolen identities and weapons, nearly anything can be purchased online with a few clicks of the mouse. The online black market not only can be accessed by anyone with an Internet connection, but the whole process of ordering illicit goods and services is alarmingly easy and anonymous, with multiple marketplaces to buy or sell anything you want.

Understanding how the market thrives—unregulated and untraceable—can give you a better sense of the threats (or resources) that affect you and your business.

In our scenario we are going to legally transfer $1,000 USD out of a regular bank account and into a mathematical system of binary codes, and then enter a neighborhood of the Internet largely used by criminals. This hidden world anyone lets purchase bulk downloads of stolen credit cards, as well as a credit card writer, blank cards, some “on stage” fake identities—and maybe even a grenade launcher they’ve had their eyes on.

A journey into the darker side of the Internet starts with two open-source programs: Bitcoin and the Tor Bundle.

{ CSO | Continue reading }

artwork { General Idea, Miss General Idea Glove Pattern (Form Follows Fetish), 1975 }

Cricket weather. Sit around under sunshades. Over after over.


For eight days running, YouTube’s front page had been taken over by “botted” videos—videos whose views had been artificially inflated by software programs designed to trick YouTube’s servers—and as far as YouTubers could tell, YouTube’s owner, the mighty Google, seemed powerless to stop them.

Google did eventually stop the worst of the bots, fixing a vulnerability in how the site counts mobile views. But the botting problem is far from over. And the episode leaves a lot of lingering questions over the site’s future.

{ DailyDot | Continue reading }

related { Hulu, which attracted 31 million unique users in March under a free-for-all model, is taking its first steps to change to a model where viewers will have to prove they are a pay-TV customer to watch their favorite shows. | NY Post }

Meet me at the south lock. We’re coming in.

333.jpg

A single-celled organism in Norway has been called “mankind’s furthest relative.” It is so far removed from the organisms we know that researchers claim it belongs to a new base group, called a kingdom, on the tree of life. (…)

The organism, a type of protozoan, was found by researchers in a lake near Oslo. (…) They found it doesn’t genetically fit into any of the previously discovered kingdoms of life. It’s an organism with membrane-bound internal structures, called a eukaryote, but genetically it isn’t an animal, plant, fungi, algae or protist (the five main groups of eukaryotes).

{ LiveScience | Continue reading }



kerrrocket.svg