shop imp kerr
nswd

pipeline

I’m not talking about Facebook, I want to know how to block you in real life

345.jpg

Google’s harvesting of e-mails, passwords and other sensitive personal information from unsuspecting households in the United States and around the world was neither a mistake nor the work of a rogue engineer, as the company long maintained, but a program that supervisors knew about, according to new details from the full text of a regulatory report.

The report, prepared by the Federal Communications Commission after a 17-month investigation of Google’s Street View project, was released, heavily redacted, two weeks ago. Although it found that Google had not violated any laws, the agency said Google had obstructed the inquiry and fined the company $25,000.

On Saturday, Google released a version of the report with only employees’ names redacted.

The full version draws a portrait of a company where an engineer can easily embark on a project to gather personal e-mails and Web searches of potentially hundreds of millions of people as part of his or her unscheduled work time, and where privacy concerns are shrugged off.

The so-called payload data was secretly collected between 2007 and 2010 as part of Street View, a project to photograph streetscapes over much of the civilized world. When the program was being designed, the report says, it included the following “to do” item: “Discuss privacy considerations with Product Counsel.”

“That never occurred,” the report says.

Google says the data collection was legal. But when regulators asked to see what had been collected, Google refused, the report says, saying it might break privacy and wiretapping laws if it shared the material. (…)

Ever since information about the secret data collection first began to emerge two years ago, Google has portrayed it as the mistakes of an unauthorized engineer operating on his own and stressed that the data was never used in any Google product.

The report, quoting the engineer’s original proposal, gives a somewhat different impression. The data, the engineer wrote, would “be analyzed offline for use in other initiatives.” Google says this was never done. (…)

The Street View program used special cars outfitted with cameras. Google first said it was just photographing streets and did not disclose that it was collecting Internet communications called payload data, transmitted over Wi-Fi networks, until May 2010, when it was confronted by German regulators.

Eventually, it was forced to reveal that the information it had collected could include the full text of e-mails, sites visited and other data.

{ NY Times | Continue reading }

When contradictory positions are reconciled in a higher unity (synthesis) they are both annulled and preserved

232.jpg

On March 23, 1994 a medical examiner viewed the body of Ronald Opus and concluded that he died from a gunshot wound of the head caused by a shotgun. Investigation to that point had revealed that the decedent had jumped from the top of a ten-story building with the intent to commit suicide. (He left a note indicating his despondency.) As he passed the 9th floor on the way down, his life was interrupted by a shotgun blast through a window, killing him instantly. Neither the shooter nor the decedent was aware that a safety net had been erected at the 8th floor level to protect some window washers, and that the decedent would most likely not have been able to complete his intent to commit suicide because of this.

Ordinarily, a person who starts into motion the events with a suicide intent ultimately commits suicide even though the mechanism might be not what he intended. That he was shot on the way to certain death nine stories below probably would not change his mode of death from suicide to homicide, but the fact that his suicide intent would not have been achieved under any circumstance caused the medical examiner to feel that he had homicide on his hands.

Further investigation led to the discovery that the room on the 9th floor from whence the shotgun blast emanated was occupied by an elderly man and his wife. He was threatening her with the shotgun because of an interspousal spat and became so upset that he could not hold the shotgun straight. Therefore, when he pulled the trigger, he completely missed his wife, and the pellets went through the window, striking the decedent.

When one intends to kill subject A, but kills subject B in the attempt, one is guilty of the murder of subject B. The old man was confronted with this conclusion, but both he and his wife were adamant in stating that neither knew that the shotgun was loaded. It was the longtime habit of the old man to threaten his wife with an unloaded shotgun. He had no intent to murder her; therefore, the killing of the decedent appeared then to be accident. That is, the gun had been accidentally loaded.

But further investigation turned up a witness that their son was seen loading the shotgun approximately six weeks prior to the fatal accident. That investigation showed that the mother (the old lady) had cut off her son’s financial support, and her son, knowing the propensity of his father to use the shotgun threateningly, loaded the gun with the expectation that the father would shoot his mother. The case now becomes one of murder on the part of the son for the death of Ronald Opus.

Now comes the exquisite twist. Further investigation revealed that the son, one Ronald Opus, had become increasingly despondent over the failure of his attempt to get his mother murdered. This led him to jump off the ten-story building on March 23, only to be killed by a shotgun blast through a 9th story window.

The medical examiner closed the case as a suicide.

{ Snopes | Continue reading | thanks Caitie }

Wail, Banba, with your wind: and wail, O ocean, with your whirlwind.

7689.jpg

{ Roy Lichtenstein’s estate claims copyright over the images he appropriated, 2010 }

With what success had he attempted direct instruction?

332.jpg

Did they say they give a delightful figure line 11/6 obviating that unsightly broad appearance across the lower back to reduce flesh (wink)

444.jpg

Many crimes are generally performed by using language. Among them are solicitation, conspiracy, perjury, threatening, and bribery. In this chapter, we look at these crimes as acts of speech, and find that they have much in common – and a few interesting differences. For one thing, they involve different acts of speech, ranging from promises to orders. For another, most language crimes can be committed through indirect speech. Few criminals will say, “I hereby offer you a bribe,” or “I hereby engage you to kill my spouse.” Thus, many of the legal battles involve the extent to which courts may draw inferences of communicative intent from language that does not literally appear to be criminal. Yet the legal system draws a line in the sand when it comes to perjury, a crime that can only be committed through a direct fabrication. We provide a structured discussion of these various crimes that should serve to explain the similarities and difference among them.

{ SSRN | Continue reading }

What qualifying considerations allayed his perturbations?

9a.jpg

{ Mac Flashback Attack Started With Compromised WordPress Blogs }

related { We’ve heard much about the possibility of a quantum internet which uses single photons to encode and send information protected by the emerging technology of quantum cryptography }

Large reservoirs such as oil fields are typically split into exploratory blocks for different consortia

5g.jpg

Anonymous, together with a group known as the Peoples Liberation Front, Tuesday announced the immediate availability of a new website for hacktivists to dump their stolen (”doxed”) data.

Dubbed AnonPaste, the website has been created as an alternative to Pastebin and other websites that allow people to anonymously upload large amounts of text, the two groups said in a joint press release. Shared content can be set to expire after 10 minutes, an hour, a day, a month, a year, or never. In addition, the site promises to remain advertising-free and unmoderated, maintain no connection logs, and store only encrypted data.

{ InformationWeek | Continue reading }

What part of MEOW don’t you understand?

415.jpg

Suddenly they all died. The end.

8.jpg

The outbreak of a new livestock disease in western Europe last year, particularly harmful to offspring, could move further into areas surrounding the worst affected countries in the next cycle of new births, scientists say.

Schmallenberg virus - named after the German town where it was first detected in November - infected sheep and cows on at least 2,600 farms in eight EU countries last year, most likely between August and October.

Thought to have been spread for hundreds of miles across Europe by biting midges and warm late summer winds, the virus has since been confirmed in Belgium, the Netherlands, Luxembourg, France, Italy, Spain and Britain.

{ Reuters | Continue reading }

By bronze, by gold, in oceangreen of shadow

410.jpg

Federal authorities have arrested eight men accused of distributing more than $1 million worth of LSD, ecstasy, and other narcotics with an online storefront that used the TOR anonymity service to mask their Internet addresses.

“The Farmer’s Market,” as the online store was called, was like an Amazon for consumers of controlled substances, according to a 66-page indictment unsealed on Monday. It offered online forums, Web-based order forms, customer service, and at least four methods of payment, including PayPal and Western Union. From January 2007 to October 2009, it processed some 5,256 orders valued at $1.04 million. The site catered to about 3,000 customers in 35 countries, including the United States.

To elude law enforcement officers, the operators used software provided by the TOR Project that makes it virtually impossible to track the activities of users’ IP addresses.

{ Ars Technica | Continue reading }

photos { Claes Källarsson | 1 | 2 }

If you’re expecting me to help out with the rent you’re in for a big fuckin’ surprise

999.jpg

{ Traffic cop issues ticket to moving bus }

The failure to find any extraterrestrial civilizations in the observable universe implies the possibility something is wrong with one or more of the arguments from various scientific disciplines that the appearance of advanced intelligent life is probable

442.jpg

{ New analysis of 36-year-old data, resuscitated from printouts, shows NASA found life on Mars, an international team of mathematicians and scientists conclude in a paper published this week. }

Don’t know if this song is better than sex. I’m still a virgin.

49.jpg

The discovery [of the Higgs boson], if confirmed, will mark the culmination of a hunt that has taken years and cost billions of dollars, and will shape the field for years to come. (…) What fundamental discoveries in biology might inspire the same thrill? We put the question to experts in various fields. (…)

Is there life elsewhere? (…)

Is there foreign life on earth? (…) Some have postulated the existence of a ’shadow biosphere’ on Earth, teeming with life that has gone undiscovered because scientists simply don’t know where to look. It could contain life that relies on a fundamentally different biochemistry, using different forms of amino acids or even entirely novel ways of storing, replicating and executing inherited information that do not rely on DNA or proteins. (…)

How did life start…? (…) Joyce says that there will come a point at which researchers learn how to synthesize an evolving, replicating system from scratch. (…) Several labs have already made headway. (…) In 2009, a paper from Joyce’s lab reported the development of a system of RNA molecules that undergo self-sustaining Darwinian evolution5. But enzymes and a human hand were needed to create the RNA sequences to start off the reaction, Joyce says, and so far his lab has not found conditions that would allow the system to form spontaneously. “We’re still a bit challenged,” he says. “But the system is running more and more efficiently all the time.” (…)

… and can we delay its end? (…) Cynthia Kenyon and her colleagues at the University of California, San Francisco, reported that mutations in a single gene allowed the nematode Caenorhabditis elegans to live more than twice as long as usual. Three years later, a group led by Andrzej Bartke, who studies ageing at Southern Illinois University in Springfield, reported that mice bearing a single mutation that causes hormonal deficiencies live up to 68% longer than mice without the mutation. Both papers, and a slew of work since, have suggested that it might be possible to significantly slow human ageing and its associated diseases.

{ Nature | Continue reading }

image { Trevor Brown }

Now however, in the cool air, when even all the tumult of your hearts have become still

441.jpg

Thriving colonies disappear overnight without leaving a trace, the bodies of the victims are never found. It’s what’s happening to fully a third of commercial beehives, over a million colonies every year. Seemingly healthy communities fly off never to return. The queen bee and mother of the hive is abandoned to starve and die.

Thousands of scientific sleuths have been on this case for the last 15 years trying to determine why our honey bees are disappearing in such alarming numbers. “This is the biggest general threat to our food supply,” according to Kevin Hackett, the national program leader for the U.S. Department of Agriculture’s bee and pollination program.

Until recently, the evidence was inconclusive on the cause of the mysterious “colony collapse disorder” (CCD) that threatens the future of beekeeping worldwide. But three new studies point an accusing finger at a culprit that many have suspected all along, a class of pesticides known as neonicotinoids. (…)

Their vanishing is nature’s way of telling us that conditions have deteriorated in the world around us. Bees won’t survive for long if we don’t change our commercial breeding practices and remove deadly toxins from their environment. (…)

Germany and France have already banned pesticides that have been implicated in the deaths of bees.

{ Reuters | Continue reading }

collage { Matthew Cusick }

They lifted. Tschink. Tschunk. Tip.

2g.jpg

One of the great challenges in cosmology is understanding the nature of the universe’s so-called missing mass.

Astronomers have long known that galaxies are held together by gravity, a force that depends on the amount of mass a galaxy contains. Galaxies also spin, generating a force that tends to cause this mass to fly apart.

The galaxies astronomers can see are not being torn apart as they rotate, presumably because they are generating enough gravity to prevent this.

But that raises a conundrum. Astronomers can see how much visible mass there is in a galaxy and when they add it all up, there isn’t anywhere enough for the required amount of gravity.  So something else must be generating this force. 

One idea is that gravity is stronger on the galactic scale and so naturally provides the extra force to glue galaxies together.

Another is that the galaxies must be filled with matter that astronomers can’t see, the so-called dark matter.

{ The Physics arXiv Blog | Continue reading }

photo { Bela Borsodi }

And we’ll steal a bunch of boysenberries and I’ll smear them on your face

36.jpg

A series of hacks perpetrated against so-called “smart meter” installations over the past several years may have cost a single U.S. electric utility hundreds of millions of dollars annually, the FBI said in a cyber intelligence bulletin obtained by KrebsOnSecurity. The law enforcement agency said this is the first known report of criminals compromising the hi-tech meters, and that it expects this type of fraud to spread across the country as more utilities deploy smart grid technology.

Smart meters are intended to improve efficiency, reliability, and allow the electric utility to charge different rates for electricity at different times of day. Smart grid technology also holds the promise of improving a utility’s ability to remotely read meters to determine electric usage.

{ KrebsOnSecurity | Continue reading }

███████, ██████, and so on

43.jpg

{ When the authorities send a subpoena to Facebook for your account information, what do they receive? }

related:

This paper reports a study which investigated adult social activity on Facebook. The data was drawn from an online survey (N = 758) and 18 in-depth research sessions (semistructured interviews and verbal protocols). The research explored the function of Facebook in making contact, maintaining contact and facilitating extended contact with online friends and the concept of ‘facestalking’. It also examined how the specific tools of Facebook (wall postings, status updates, events and photos) are used to communicate and socialise. The research concludes that Facebook strengthens existing friendships by supplementing traditional forms of communication (face to face, telephone). Also, participation in the Facebook community enables efficient and convenient contact to be maintained with a larger and more diverse group of acquaintances, thus extending potential social capital.

{ IJETS | Continue reading }

A Wall Street Journal examination of 100 of the most popular Facebook apps found that some seek the email addresses, current location and sexual preference, among other details, not only of app users but also of their Facebook friends. One Yahoo service powered by Facebook requests access to a person’s religious and political leanings as a condition for using it. The popular Skype service for making online phone calls seeks the Facebook photos and birthdays of its users and their friends. (…)

Facebook requires apps to ask permission before accessing a user’s personal details. However, a user’s friends aren’t notified if information about them is used by a friend’s app. An examination of the apps’ activities also suggests that Facebook occasionally isn’t enforcing its own rules on data privacy.

{ WSJ | Continue reading }

Already lost two fake nails, my drink, and my best friend

28.jpg

Homicidal sleepwalking, also known as homicidal somnambulism, is the act of killing someone during an episode of sleepwalking.

About 68 cases had been reported in the literature up to 2000.

{ Wikipedia | Continue reading }

photo { Anja Niemi }

Energy and motion made visible — memories arrested in space.

7.jpg

For decades in art circles it was either a rumor or a joke, but now it is confirmed as a fact. The Central Intelligence Agency used American modern art - including the works of such artists as Jackson Pollock, Robert Motherwell, Willem de Kooning and Mark Rothko - as a weapon in the Cold War. In the manner of a Renaissance prince - except that it acted secretly - the CIA fostered and promoted American Abstract Expressionist painting around the world for more than 20 years. (…)

Why did the CIA support them? Because in the propaganda war with the Soviet Union, this new artistic movement could be held up as proof of the creativity, the intellectual freedom, and the cultural power of the US. Russian art, strapped into the communist ideological straitjacket, could not compete.

{ Independent | Continue reading }

photo { Jackson Pollock, Clement Greenberg, Helen Frankenthaler, Lee Krasner and an unidentified child at the beach, 1952 }

Straight from heaven up above

555.jpg



kerrrocket.svg