Monday, December 05, 2011

why Occupation alone comprises an overwhelming DDOS...,

NYTimes | One area where the United States indisputably leads the world is incarceration.

The United States has 2.3 million people behind bars, almost one in every 100 Americans. The U.S. prison population has more than doubled over the past 15 years, and one in nine black children has a parent in jail.

Proportionally, the United States has four times as many prisoners as Israel, six times as many as Canada or China, eight times as many as Germany and 13 times as many as Japan.

With just a little more than 4 percent of the world’s population, the United States accounts for a quarter of the planet’s prisoners and has more inmates than the leading 35 European countries combined. Almost all the other nations with high per capita prison rates are in the developing world.

There’s also a national election in the United States soon. This issue isn’t on the agenda. It’s almost never come up with Republican presidential candidates; one of the few exceptions was at a debate in September when the audience cheered the notion of executions in Texas.

Barack Obama, the first black president, rarely mentions this question or how it disproportionately affects minorities. More than 60 percent of the United States’ prisoners are black or Hispanic, though these groups comprise less than 30 percent of the population.

“We’ve had a race to incarcerate that has been driven by politics, racially coded, get-tough appeals,” said Michelle Alexander, a law professor at Ohio State University who wrote “The New Jim Crow: Mass Incarceration in the Age of Colorblindness.”

The escalating cost of the criminal-justice system is an important factor in the fiscal challenges around the United States. Nowhere is that more evident than in California, which is struggling to obey a court order requiring it to reduce its overcrowded prisons by 40,000 inmates.

Today, there are 140,000 convicts in California’s state prisons, who cost about $50,000 each per year. The state pays more on prisons than it does on higher education.

Yet the prisons are so crowded — as many as 54 inmates have to share one toilet — that Conrad Murray, the doctor convicted in the death of the pop star Michael Jackson, may be able to avoid most prison time. Fist tap Nana.

too simple and too smart for domestic "authority" to fathom...,


Video - comedian Lee Camp's prescient answer to the strategic and tactical dilemma facing domestic "authority"..,

Sunday, December 04, 2011

fortunate is he who stands at the beginning ; he will know the end and not taste death


Video - Iran shoots down and recovers U.S. drone over eastern border.

NationalJournal | Two incidents that occurred on Sunday—Iran’s claim of a shoot-down of a U.S. drone, and an explosion outside the British embassy in Bahrain—may have been unrelated. But they appear to add to growing evidence that an escalating covert war by the West is under way against Iran, and that Tehran is retaliating with greater intensity than ever.

Asked whether the United States, in cooperation with Israel, was now engaged in a covert war against Iran’s nuclear program that may include the Stuxnet virus, the blowing-up of facilities and the assassination or kidnapping of scientists, one recently retired U.S. official privy to up-to-date intelligence would not deny it.

“It’s safe to say the Israelis are very active,” the official said, adding about U.S. efforts: “Everything that [GOP presidential candidate] Mitt Romney said we should be doing—tough sanctions, covert action and pressuring the international community -- are all of the things we are actually doing.” Though the activities are classified, a senior Obama administration official also would not deny that such a program was under way. He indicated that the U.S. was not involved in every action, referring to recent alleged explosions at Isfahan and elsewhere. But, he added: “I wouldn’t assume that everything we do is coordinated."

Former undersecretary of State Nicholas Burns, who oversaw America’s Iran engagement during the Bush administration, asked Sunday about reports that the U.S. program began under George W. Bush, said he could not comment on intelligence matters.

In September, the head of the Atomic Energy Organization of Iran, Fereydoun Abbasi-Davani, accused Great Britain, Israel and the U.S. of conducting attacks on him and other Iranian scientists."Six years ago the intelligence service of the UK began collecting information and data regarding my past, my family, the number of children," Abbasi-Davani told a news conference at the annual conference of the International Atomic Energy Agency (IAEA) in Vienna. Abbasi-Davani, who was said to have been wounded in 2010 car bomb explosion, said the attacks were carried out by Israel with the "support of the intelligence services of the United States and England."

Last week, Iranian protesters stormed the British embassy in Tehran. Dominick Chilcott, Britain's ambassador to Iran, later said the attack occurred "with the acquiescence and the support of the state." Then, on Sunday, Bahrain's interior ministry announced that an explosion occurred inside a minibus parked near the British Embassy. There were no immediate reports of serious damage or injuries.

U.S. officials alleged in October that agents acting for Iran’s Revolutionary Guard, which has increasingly exerted control over the Tehran regime, were involved in a plot to kill that Saudi ambassador to Washington in a restaurant. Iran denied the allegations. Then, on Sunday, in what have been another escalation, Iran’s news agency reported that Iranian armed forces shot down an unmanned U.S. spy plane that illegally crossed the country's eastern border.

Responding to the Iranian report, NATO command in Afghanistan released a terse statement Sunday: "The UAV to which the Iranians are referring may be a US unarmed reconnaissance aircraft that had been flying a mission over western Afghanistan late last week. The operators of the UAV lost control of the aircraft and had been working to determine its status."

Trita Parsi, president of the National Iranian American Council in Washington, said the tit-for-tat incidents “add up to a very worrisome picture,” in part because “the Iranians are absorbing all of these assassinations without seeing the pace of their nuclear program slow down to the extent it would be acceptable to the West.” But if Iranian retaliations grow serious enough, he said, they could provide “the pretext for a much larger war” in which the Israelis, and possibly the Americans, launch a full attack on Iran.

what kind of war requires this kind of continuing investment?

AP | At Los Alamos National Laboratory, scientists and engineers refer to their planned new $6 billion nuclear lab by its clunky acronym, CMRR, short for Chemistry Metallurgy Research Replacement Facility. But as a work in progress for three decades and with hundreds of millions of dollars already spent, nomenclature is among the minor issues.

Questions continue to swirl about exactly what kind of nuclear and plutonium research will be done there, whether the lab is really necessary, and — perhaps most important — will it be safe, or could it become New Mexico's equivalent of Japan's Fukushima?

As federal officials prepare the final design plans for the controversial and very expensive lab, increased scrutiny is being placed on what in recent years has been discovered to be a greater potential for a major earthquake along the fault lines that have carved out the stunning gorges, canyons and valleys that surround the nation's premier nuclear weapons facility in northern New Mexico.

Final preparations for the lab — whose the high-end price tag estimate of $5.8 billion is almost $1 billion more than New Mexico's annual state budget and more than double the lab's annual budget — also comes as a cash-strapped Congress looks to trim defense spending and cut cleanup budgets at contaminated facilities like Los Alamos. It also comes as the inspector general recommends that the federal government consider consolidating its far-flung network of research labs.

Despite the uncertainty, the National Nuclear Safety Administration, an arm of the Department of Energy that oversees the nation's nuclear labs, is moving forward on final designs for the lab. Project director Herman Le-Doux says it has been redesigned with input from the nation's leading seismic experts, and the NNSA has "gone to great extremes" to ensure the planned building could withstand an earthquake of up to 7.3 magnitude.

Most seismic experts agree that would be a worst-case scenario for the area. But many people who live near the lab — and have seen it twice threatened by massive wildfires in 10 years — see no reason for taking the chance.

"The Department of Energy has learned nothing from the Fukushima disaster," said David McCoy, director of the environmental and nuclear watchdog group Citizens Action New Mexico, at a recent oversight hearing. That's become a common refrain since last year's earthquake and tsunami in Japan caused a meltdown at one of its nuclear plants. "The major lesson of Fukushima is ignored by NNSA: Don't build dangerous facilities in unsafe natural settings."

Lab officials say CMRR is needed to replace a 1940s era facility that is beyond renovation yet crucial to supporting its mission as the primary center for maintaining and developing the country's stockpile of nuclear weapons. While much of the work is classified, they insist the lab's mission is to do analytical work to support the nearby Plutonium Facility, or PF-4, which is the only building in the country equipped for making the pits that power nuclear weapons.

Watchdog groups, however, call it an effort by the DOE and NNSA to escalate the production of new nuclear weapons and turn what has largely been a research facility into a bomb factory.


Video - The Convair WS 125 atomic powered bomber.

Wikipedia | A nuclear aircraft is an aircraft powered by nuclear energy. Research into them was pursued during the Cold War by the United States and the Soviet Union as they would presumably allow a country to keep nuclear bombers in the air for extremely long periods of time, a useful tactic for nuclear deterrence. Neither country created any nuclear aircraft in production numbers. One design problem, never adequately solved, was the need for heavy shielding to protect the crew from radiation sickness. Since the advent of ICBMs in the 60s the tactical advantage of such aircraft was greatly diminished and respective projects were cancelled. Because the technology was inherently dangerous it was not considered in non-military contexts.

Unmanned missiles have been designed to use nuclear thermal rockets, but such designs were considered too dangerous for crews to fly.

Saenger-Bredt Spaceplane


Video - Recreation of the Sanger-Bendt orbital bomber.

Sanger Orbital Bomber - In June 1935 and February 1936, Dr. Eugen Sänger published articles in the Austrian aviation publication Flug on rocket-powered aircraft. This led to his being asked by the German High Command to build a secret aerospace research institute in Trauen to research and build his "Silverbird", a manned, winged vehicle that could reach orbit. Dr. Sänger had been working on this concept for several years, and in fact he had began developing liquid-fuel rocket engines. From 1930 to 1935, he had perfected (through countless static tests) a 'regeneratively cooled' liquid-fueled rocket engine that was cooled by its own fuel, which circulated around the combustion chamber. This engine produced an astounding 3048 meters/second (10000 feet/second) exhaust velocity, as compared to the later V-2 rocket's 2000 meters/second (6560 feet/second). Dr. Sänger, along with his staff, continued work at Trauen on the "Silverbird" under the Amerika Bomber program. The Sänger Amerika Bomber (or Orbital Bomber, Antipodal Bomber or Atmosphere Skipper) was designed for supersonic, stratospheric flight. The fuselage was flattened, which helped create lift and the wings were short and wedge shaped. There was a horizontal tail surface located at the extreme aft end of the fuselage, which had a small fin on each end. The fuel was carried in two large tanks, one on each side of the fuselage, running from the wings aft. Oxygen tanks were located one on each side of the fuselage, located forward of the wings. There was a huge rocket engine of 100 tons thrust mounted in the fuselage rear, and was flanked by two auxiliary rocket engines. The pilot sat in a pressurized cockpit in the forward fuselage, and a tricycle undercarriage was fitted for a gliding landing. A central bomb bay held one 3629 kg (8000 lb) free-falling bomb, and no defensive armament was fitted. The empty weight was to be approximately 9979 kg (22000 lbs). An interesting flight profile was envisioned for the "Silverbird". It was to be propelled down a 3 km (1.9 mile) long monorail track by a rocket-powered sled that developed a 600 ton thrust for 11 seconds (please see diagram below). After taking off at a 30 degree angle and reaching an altitude of 1.5 km (5100'), a speed of 1850 km/h (1149 mph) would be reached. At this point, the main rocket engine would be fired for 8 minutes and burn 90 tons of fuel to propel the "Silverbird" to a maximum speed of 22100 km/h (13724 mph) and an altitude of over 145 km (90 miles), although some sources list the maximum altitude reached as 280 km (174 miles). As the aircraft accelerated and descended under the pull of gravity, it would then hit the denser air at about 40 km (25 miles) and 'skip' back up as a stone does when skipped along water (please see drawing below). This also had the added benefit of cooling the aircraft after the intense frictional heating encountered when the denser air was reached. The skips would gradually be decreased until the aircraft would glide back to a normal landing using its conventional tricycle landing gear, after covering approximately 23500 km (14594 miles). The final test facilities for full-scale rocket engine tests were being built when Russia was invaded in June 1941. All futuristic programs were canceled due to the need to concentrate on proven designs. Dr. Sänger went on to work on ramjet designs for the DFS (German Research Institute for Gliding), and helped to design the Skoda-Kauba Sk P.14. Although the Luftwaffe did its best to stop Dr. Sänger from publishing his research results, a few copies went unaccounted for and made their way to other countries. After the war, he was asked to work (along with mathematician Irene Bredt) for the French Air Ministry, where in a bizarre plot, he was almost kidnapped by Stalin, who recognized the value of the Amerika Bomber.

bear in mind china's pressing domestic political needs, as well...,


Video - China will not hesitate to protect Iran even with a third World War.

been making fireworks for thousands of years....,


Video - China's subterranean great wall.

Telegraph | The Washington Post reported on Tuesday that Georgetown University students under the instruction of a former Pentagon official have assembled the largest body of public knowledge yet about a vast network of secret tunnels dug by China's secretive Second Artillery Corps, responsible for nuclear warheads.

The 363-page study has not yet been published, but has already sparked a congressional hearing and been circulated among top US defence officials, including the Air Force vice chief of staff, the Post reported.

"It's not quite a bombshell, but those thoughts and estimates are being checked against what people think they know based on classified information," it quoted an unnamed Defense Department strategist as saying.

The newspaper said critics of the report had questioned the students methods, which included using internet-based sources like Google Earth, blogs, military journals and even a fictionalised Chinese TV show.

But the Post also said the students were able to obtain a 400-page manual produced by the Second Artillery and usually only available to Chinese military personnel.

Saturday, December 03, 2011

2012 national defense authorization act

Wired | Here’s the best thing that can be said about the new detention powers the Senate has tucked into next year’s defense bill: They don’t force the military to detain American citizens indefinitely without a trial. They just let the military do that. And even though the leaders of the military and the spy community have said they want no such power, the Senate is poised to pass its bill as early as tonight.

There are still changes swirling around the Senate, but this looks like the basic shape of the 2012 National Defense Authorization Act. Someone the government says is “a member of, or part of, al-Qaida or an associated force” can be held in military custody “without trial until the end of the hostilities authorized by the Authorization for Use of Military Force.” Those hostilities are currently scheduled to end the Wednesday after never. The move would shut down criminal trials for terror suspects.

But far more dramatically, the detention mandate to use indefinite military detention in terrorism cases isn’t limited to foreigners. It’s confusing, because two different sections of the bill seem to contradict each other, but in the judgment of the University of Texas’ Robert Chesney — a nonpartisan authority on military detention — “U.S. citizens are included in the grant of detention authority.”

An amendment that would limit military detentions to people captured overseas failed on Thursday afternoon. The Senate soundly defeated a measure to strip out all the detention provisions on Tuesday.

So despite the Sixth Amendment’s guarantee of a right to trial, the Senate bill would let the government lock up any citizen it swears is a terrorist, without the burden of proving its case to an independent judge, and for the lifespan of an amorphous war that conceivably will never end. And because the Senate is using the bill that authorizes funding for the military as its vehicle for this dramatic constitutional claim, it’s pretty likely to pass.

It would be one thing if the military was clamoring for the authority to become the nation’s jailer. But to the contrary: Defense Secretary Leon Panetta opposes the maneuver. So does CIA Director David Petraeus, who usually commands deference from senators in both parties. Pretty much every security official has lined up against the Senate detention provisions, from Director of National Intelligence James Clapper to FBI Director Robert Mueller, who worry that they’ll get in the way of FBI investigations of domestic terrorists. President Obama has promised to veto the bill.

Which is ironic. After all, Obama approved of the execution without trial of Anwar al-Awlaki, al-Qaida’s YouTube preacher, based entirely on the unproven assertion that Awlaki was dangerous. Awlaki was an American citizen. So Obama thinks he has the right to kill Americans the government says are terrorists, but he doesn’t want the military to lock them up forever without trial. OK then.

Weirder still, the bill’s chief architect, Sen. Carl Levin (D-Mich.), tried to persuade skeptics that the bill wasn’t so bad. His pitch? “The requirement to detain a person in military custody under this section does not extend to citizens of the United States,” he said on the Senate floor on Monday. The bill would just let the government detain a citizen in military custody, not force it to do that. Reassured yet?

Civil libertarians aren’t. Sen. Al Franken (D-Minn.) said it “denigrates the very foundations of this country.” Sen. Rand Paul (R-Ky.) added, “it puts every single American citizen at risk.”

But there’s a reason this measure goes into the defense bill: Voting against the defense bill is usually considered political suicide. That’s why the bill will almost certainly pass tonight. If Obama backs down from his veto threat, get ready to see Americans at Guantanamo Bay. Fist tap Davera.

gutting the privacy act

NYTimes | The Privacy Act of 1974 allows a person to sue a federal agency for intentionally disclosing personal, confidential information without permission. But the government is trying to limit the force of that law and make it harder to hold agencies accountable for such violations.

In Federal Aviation Administration v. Cooper, a case argued this week in the Supreme Court, the government contends that the statute allows a plaintiff to recover “actual damages” only for monetary losses, but not for emotional distress.

Stanmore Cooper brought the suit because in an exchange of data to identify medically unfit pilots, the Social Security Administration gave the Federal Aviation Administration confidential information that revealed that he was H.I.V.-positive and was receiving disability benefits. He was devastated when he learned of this revelation. He experienced anxiety, sleeplessness and other serious problems. He pleaded guilty to a misdemeanor for not disclosing his H.I.V. status to the F.A.A., but he sued the government for severe mental and emotional distress.

The Supreme Court held in 2004 that it is necessary to show actual damages in a lawsuit under the Privacy Act but did not say whether nonmonetary harm like emotional distress comes under that heading. In Mr. Cooper’s case, the United States Court of Appeals for the Ninth Circuit ruled that it does. It found support in Congress’s intent to provide relief for “any damages”; in the Supreme Court’s view that in privacy cases “the primary damage is the mental distress from having been exposed to public view”; and in the law in seven other federal circuits.

The government, however, contends that the statute does not explicitly allow damages for emotional distress claims. To counter this argument, Justice Ruth Bader Ginsburg pointed out that “the person who is subject to this, to this embarrassment, this humiliation, doesn’t have out-of-pocket costs, but is terribly distressed, nervous, anxious, and all the rest.” If Congress did not intend to allow damages for emotional distress, she said, “Then maybe Congress shouldn’t have passed this statute.”

The government’s restricted interpretation would gut the point of the Privacy Act, and in too many cases would allow agencies to act improperly with impunity.

atheists can not be trusted...,

NationalPost | Many religious people don’t like atheists, and in fact would apparently rate them alongside rapists on levels of trust, suggests a new Canadian study that claims to be one of the first psychological probes into anti-atheist prejudice.

Researchers at the University of British Columbia and the University of Oregon conducted a series of studies that found a deep level of distrust toward those who don’t believe in God, deeming them to be among the least trusted people in the world — despite their growing ranks to an estimated half billion globally.

“There’s this persistent belief that people behave better if they feel like God is watching them,” said Will Gervais, lead study author and doctoral candidate in the social psychology department at UBC. “So if you’re playing by those rules, you’re going to see other people’s religious beliefs as signals of how trustworthy they might be.”

The research began a few years ago, when a series of polls revealed atheists to be some of the least liked people in areas with religious majorities, which is to say, much of the world. In one poll, only 45% of American respondents said they would vote for a qualified atheist presidential candidate and overwhelmingly preferred to vote for African American, Jewish and female candidates. Americans also rated atheists as the group that least agrees with their vision for the country and the group they’d most disapprove of their child marrying.

The resulting paper, published in the current online issue of the Journal of Personality and Social Psychology, includes six studies all designed to measure people’s perception of an atheist’s trustworthiness. The first study asked 351 Americans from across the country to compare the trustworthiness of an atheist and a gay man, since both represent groups often described as threatening to majority religious values. They rated atheists significantly higher than gay men on distrust, though lower on levels of disgust.

The second study recruited 105 UBC undergrads —they purposely targeted a more liberal sample from a less-religious nation — to test whether distrust of atheists is more pronounced than distrust of other groups, including Muslims. The students read a description of an untrustworthy man who pretended to leave insurance information after backing his car into a parked vehicle and were asked to say whether it was more likely the man was either a Christian, Muslim, rapist or an atheist. People were far more likely to say he was either an atheist or a rapist and not part of a religious group. They did not significantly differentiate atheists from rapists, something Mr. Gervais found disconcerting.

“It’s pretty shocking that we get the same magnitude of distrust towards atheists simply because they don’t believe [in God],” said the researcher, who is himself an atheist. “With rapists, they’re distrusted because they rape people. Atheists are viewed as sort of a moral wild card.”

Another among the six studies found people are more likely to hire someone for a job that requires high levels of trust, such as a daycare worker, if they believe they are religious. They would hire atheists for a low trust job, such as a waitress, the study found.

The levels of distrust were more pronounced among respondents who said they were religious, said Mr. Gervais. One of the studies measured how much people thought believing God is watching makes you a better person.

one-time thought crime...,

NYTimes | Border Patrol agents pursue smugglers one moment and sit around in boredom the next. It was during one of the lulls that Bryan Gonzalez, a young agent, made some comments to a colleague that cost him his career.

Stationed in Deming, N.M., Mr. Gonzalez was in his green-and-white Border Patrol vehicle just a few feet from the international boundary when he pulled up next to a fellow agent to chat about the frustrations of the job. If marijuana were legalized, Mr. Gonzalez acknowledges saying, the drug-related violence across the border in Mexico would cease. He then brought up an organization called Law Enforcement Against Prohibition that favors ending the war on drugs.

Those remarks, along with others expressing sympathy for illegal immigrants from Mexico, were passed along to the Border Patrol headquarters in Washington. After an investigation, a termination letter arrived that said Mr. Gonzalez held “personal views that were contrary to core characteristics of Border Patrol Agents, which are patriotism, dedication and esprit de corps.”

After his dismissal, Mr. Gonzalez joined a group even more exclusive than the Border Patrol: law enforcement officials who have lost their jobs for questioning the war on drugs and are fighting back in the courts.

In Arizona, Joe Miller, a probation officer in Mohave County, near the California border, filed suit last month in Federal District Court after he was dismissed for adding his name to a letter by Law Enforcement Against Prohibition, which is based in Medford, Mass., and known as LEAP, expressing support for the decriminalization of marijuana.

“More and more members of the law enforcement community are speaking out against failed drug policies, and they don’t give up their right to share their insight and engage in this important debate simply because they receive government paychecks,” said Daniel Pochoda, the legal director for the American Civil Liberties Union of Arizona, which is handling the Miller case.

Mr. Miller was one of 32 members of LEAP who signed the letter, which expressed support for a California ballot measure that failed last year that would have permitted recreational marijuana use. Most of the signers were retired members of law enforcement agencies, who can speak their minds without fear of action by their bosses. But Mr. Miller and a handful of others who were still on the job — including the district attorney for Humboldt County in California and the Oakland city attorney — signed, too.

LEAP has seen its membership increase significantly from the time it was founded in 2002 by five disillusioned officers. It now has an e-mail list of 48,000, and its members include 145 judges, prosecutors, police officers, prison guards and other law enforcement officials, most of them retired, who speak on the group’s behalf.

“No one wants to be fired and have to fight for their job in court,” said Neill Franklin, a retired police officer who is LEAP’s executive director. “So most officers are reluctant to sign on board. But we do have some brave souls.”

Mr. Miller was accused of not making clear that he was speaking for himself and not the probation department while advocating the decriminalization of cannabis. His lawsuit, though, points out that the letter he signed said at the bottom, “All agency affiliations are listed for identification purposes only.”

He was also accused of dishonesty for denying that he had given approval for his name to appear on the LEAP letter. In the lawsuit, Mr. Miller said that his wife had given approval without his knowledge, using his e-mail address, but that he had later supported her.

Kip Anderson, the court administrator for the Superior Court in Mohave County, said there was no desire to limit Mr. Miller’s political views.

“This isn’t about legalization,” Mr. Anderson said. “We’re not taking a stand on that. We just didn’t want people to think he was speaking on behalf of the probation department.”

Mr. Miller, who is also a retired police officer and Marine, lost an appeal of his dismissal before a hearing officer. But when his application for unemployment benefits was turned down, he appealed that and won. An administrative law judge found that Mr. Miller had not been dishonest with his bosses and that the disclaimer on the letter was sufficient.

In the case of Mr. Gonzalez, the fired Border Patrol agent, he had not joined LEAP but had expressed sympathy with the group’s cause. “It didn’t make sense to me why marijuana is illegal,” he said. “To see that thousands of people are dying, some of whom I know, makes you want to look for a change.”

Since his firing, Mr. Gonzalez, who filed suit in federal court in Texas in January, has worked as a construction worker, a bouncer and a yard worker. He has also gone back to school, where he is considering a law degree.

“I don’t want to work at a place that says I can’t think,” said Mr. Gonzalez, who grew up in El Paso, just across the border from Ciudad Juárez, which has experienced some of the worst bloodshed in Mexico.

Friday, December 02, 2011

wikileaks: the spy files

CBSNews | President Eisenhower, in his 1961 farewell address, warned that the military-industrial complex could "endanger our liberties or democratic processes." Today WikiLeaks editor Julian Assange is warning that the surveillance-industrial complex is even more dangerous.

A set of nearly 300 documents that the document-leaking Web site published today reveals how extensive and privacy-invasive the secretive multi-billion dollar industry devoted to surveillance technology has become.

"We are in a world now where not only is it theoretically possible to record nearly all telecommunications traffic out of a country, all telephone calls, but where there is an international industry selling the devices now to do it," Assange said in a video interview today.

What WikiLeaks has dubbed the "Spy Files" is a collection of marketing and technical documents, including previously-unreleased presentations from companies that showed up at government-only conferences like ISS World Europe, billed as a gathering in 2008 for "telecom operators, law enforcement," and employees of spy agencies.

Amesys, a unit of French technology firm Bull SA, boasts in a leaked document how it can aid governments in moving from eavesdropping on one person to "full country traffic monitoring," including automatic translation and mapping of real-world social networks based on who's talking to who.

Amesys's presentation offers a one-stop shop for nationwide monitoring, including GSM cell phone communications, satellite signals, Internet communications, and phone calls. The company boasts of a "huge range of sensors and analyzing probes" and -- in an echo of what the former East German secret police attempted decades earlier -- a "centralized intelligence system gathering all information."

There were hints about the extent of Amesys' surveillance apparatus before, including in an August article in the Wall Street Journal that described a room used by Moammar Gadhafi's secret police to monitor Internet traffic in Libya. The room sported Amesys logos, manuals, and posters, the article said.

But the WikiLeaks' new leaks, which resume a dry spell for the group when it effectively halted disclosures after a series of U.S. Defense Department and State Department documents, are likely to draw more attention to the surveillance-industrial complex and could lead to more legal oversight and reform efforts.

Amesys did not immediately respond to a request for comment from CNET. It did distribute a statement in September that it sold "analysis hardware" to Libya to help it fight terrorism, and included a vague threat of legal action against anyone who damages its "image or reputation."

Not all of the documents in WikiLeaks' archive are actual leaks. An HP brochure describing "technology that supports global law enforcement" is publicly available (PDF) on the company's Web site.

Earlier this week, an attorney representing Bradley Manning, WikiLeaks' alleged source for the U.S. government files who is now facing criminal charges, suggested that the megabytes of classified data his client allegedly turned over didn't truly harm national security. Manning, an Army private, was charged last July with sending a military video to a person not authorized to receive it and with obtaining "more than 150,000 diplomatic cables" from the State Department. A preliminary hearing in Manning's case has been scheduled for later this month.

is the personal computer dead?

TechnologyReview | The PC is dead. Rising numbers of mobile, lightweight, cloud-centric devices don't merely represent a change in form factor. Rather, we're seeing an unprecedented shift of power from end users and software developers on the one hand, to operating system vendors on the other—and even those who keep their PCs are being swept along. This is a little for the better, and much for the worse.

The transformation is one from product to service. The platforms we used to purchase every few years—like operating systems—have become ongoing relationships with vendors, both for end users and software developers. I wrote about this impending shift, driven by a desire for better security and more convenience, in my 2008 book The Future of the Internet—and How to Stop It.

For decades we've enjoyed a simple way for people to create software and share or sell it to others. People bought general-purpose computers—PCs, including those that say Mac. Those computers came with operating systems that took care of the basics. Anyone could write and run software for an operating system, and up popped an endless assortment of spreadsheets, word processors, instant messengers, Web browsers, e-mail, and games. That software ranged from the sublime to the ridiculous to the dangerous—and there was no referee except the user's good taste and sense, with a little help from nearby nerds or antivirus software. (This worked so long as the antivirus software was not itself malware, a phenomenon that turned out to be distressingly common.)

Choosing an OS used to mean taking a bit of a plunge: since software was anchored to it, a choice of, say, Windows over Mac meant a long-term choice between different available software collections. Even if a software developer offered versions of its wares for each OS, switching from one OS to another typically meant having to buy that software all over again.
Advertisement

That was one reason we ended up with a single dominant OS for over two decades. People had Windows, which made software developers want to write for Windows, which made more people want to buy Windows, which made it even more appealing to software developers, and so on. In the 1990s, both the U.S. and European governments went after Microsoft in a legendary and yet, today, easily forgettable antitrust battle. Their main complaint? That Microsoft had put a thumb on the scale in competition between its own Internet Explorer browser and its primary competitor, Netscape Navigator. Microsoft did this by telling PC makers that they had to ensure that Internet Explorer was ready and waiting on the user's Windows desktop when the user unpacked the computer and set it up, whether the PC makers wanted to or not. Netscape could still be prebundled with Windows, as far as Microsoft was concerned. Years of litigation and oceans of legal documents can thus be boiled down into an essential original sin: an OS maker had unduly favored its own applications.

When the iPhone came out in 2007, its design was far more restrictive. No outside code at all was allowed on the phone; all the software on it was Apple's. What made this unremarkable—and unobjectionable—was that it was a phone, not a computer, and most competing phones were equally locked down. We counted on computers to be open platforms—hard to think of them any other way—and understood phones as appliances, more akin to radios, TVs, and coffee machines.

get root on your android...,

androidcentral | So you want to know about rooting your Android phone, eh? Yeah, it sounds a little scary. It's kind of a big leap, and it may involve a few steps. and quite possibly the use of a command prompt, which would require you to follow instructions and type words and stuff.

Here's rooting in a nutshell: Your Android smartphone is based on Linux. A big, bad, scary computer operating system known only by people with neck beards. (Only, not really. But mostly.) Anyhoo, Android apps need permission to access certain parts of Linux, and not all apps have this special "root" access. That includes a few basic things, like the camera flash, and the ability to take screen shots. There are a bunch of other apps that need root access for other reasons, too, but the basic premise is the same.

So should you root your phone? First thing to do is read this editorial, and decide if you want to go further. Then if you're the type who loves to mess with things, go for it. If you want to squeeze a little more functionality out of your phone, go for it. Need more convincing? Check out "Rooting Q&A -- Is it for me?"

what is rooting?

androidcentral | Each day more and more Android handsets are being sold, and that means users are faced with a major decision: To root, or not to root. Some of us will do it simply because we can, others will decide not to do it as they enjoy the phone as-is, but the majority of us will be on the fence about the whole idea of rooting.

Hopefully some of those questions can get answered and you’ll have a clearer picture of the process and some understanding to make the decision a bit easier. I’m sure this won’t answer every question you’ll have when considering whether or not to root your device, but hopefully this is a good start and a basis for further discussion.
What, exactly, is rooting?

Rooting your Android device involves adding in a small Linux application called “su”. It stands for SuperUser, and allows applications and commands to run with elevated permissions. Everything that runs code, whether it’s an application or the user, has a permission level set by the operating system.

Why Linux? Well the heart of the Android operating system is the Linux kernel. You'll hear a lot of nerdy geek-speak about the Linux kernel, but all you really need to know is that it's what is interfacing Android to your hardware, and ultimately has complete control. When you stray outside the "normal" way of using Android and start entering commands directly, the kernel is who you're talking to.

The root user is the boss and can do anything (good or bad) on the device. From simple things like clearing the cache from core applications, to more advanced things like wirelessly tethering a laptop or iPod touch through your phone, root can do it. The su program is a sort of gateway that lets applications or users act as root while doing tasks. If you’re the curious type (I know some of you are ;) ) here’s a more in-depth review of root as used in a Linux system by the Linux Information Project.

OK, so why would I want to root my phone?
Good question! Maybe you don’t. Everything in a Linux system is a file, or is treated as a file. Since Android runs on top of Linux, it acts the same way. Most of the files you will need to access or change are available to you without having elevated permissions. "Most" being the key term here. When you want to do things that affect or change the core software of your device -- like updating the version of Android on your phone, or adding a nice piece of software from another device -- you'll have to do it as root. Dream and Magic users have been running Eclair on their phones for a good while now, and it’s because they have rooted their device. Rooting also gives you access to some handy software that you couldn’t use otherwise. Things like a complete system backup or ad blocking software require you to root your device. Don’t root your phone just for the sake of rooting your phone, but if you come across something you feel you could use or would like to have, then consider it. You'll find that the open source community is usually pretty helpful and encouraging new people to do new things is common. And when you get to the point where you can lend a hand to the new folks, pay it forward.

sprint uses it to keep droids in the "4G" cattle pen...,

Gigaom | Carrier IQ supplies Sprint generalized data about how its customers’ smartphones perform on its network, but Sprint does not snoop into the private contents of those phones, Sprint said on Tuesday. While Sprint is primarily using that information to optimize both its network and how phones behave on it, the operator isn’t – and technically incapable of — tracking or viewing the contents of any message or media in the device, Sprint spokeswoman Stephanie Vinge said in an email. Here’s her full statement:
“Carrier IQ provides information that allows Sprint, and other carriers that use it, to analyze our network performance and identify where we should be improving service. We also use the data to understand device performance so we can figure out when issues are occurring. We collect enough information to understand the customer experience with devices on our network and how to address any connection problems, but we do not and cannot look at the contents of messages, photos, videos, etc., using this tool. The information collected is not sold and we don’t provide a direct feed of this data to anyone outside of Sprint.

“Sprint is well known for our serious commitment to respecting and protecting the privacy and security of each customer’s personally identifiable information and other customer data. A key element of this involves communicating with our customers about our information privacy practices. The Sprint privacy policy makes it clear we collect information that includes how a device is functioning and how it is being used. Carrier IQ is an integral part of the Sprint service. Sprint uses Carrier IQ to help maintain our network performance.”
Sprint, like many of its operator brethren, is in the firing line as a new research from Android developer Trevor Eckhart discovered what he termed a “rootkit” buried in the guts of many Android phones. The Carrier IQ software tracks every keystroke in on the phones it is installed on, recording that information for Carrier IQ’s analytics purposes. It’s not clear if the information collected goes directly to the operators, handset makers or to Carrier IQ. But the applications cannot be disabled or uninstalled, and there’s no way opt out of its recording activities. (Kevin Tofel wrote earlier about how to detect Carrier IQ in your phone).

carrier iq disputes Mr. Mackey's claim...,


Video - some USB debug information about carrier iq.

LATimes | Carrier IQ, the beleagured online metrics company that has been accused of installing spy software on millions of smartphones, has broken its silence to say the critics have it wrong.

"While a few individuals have identified that there is a great deal of information available to the Carrier IQ software inside the handset, our software does not record, store or transmit the contents of SMS messages, email, photographs, audio or video," the company said in a statement released late Thursday.

The firm's defense came as as politicians and privacy organizations continued to question the little-known Mountain View, Calif., company, which designs communications analysis software used by some of the largest U.S. wireless carriers, including AT&T, Sprint and T-Mobile. The carriers say data collected on their behalf by Carrier IQ helps them improve their service.

Last week, 25-year-old system administrator named Trevor Eckhart released a video (above) purporting to show Carrier IQ's app recording smartphone users' every keypress, and implying that the company was therefore able to intercept users' private communications.

But security researchers have disagreed with conclusions drawn from Eckhart's analysis.

"It's not true," said Dan Rosenberg, a senior consultant at Virtual Security Research, who said the video shows only diagnostic information and at no point provides evidence the data is stored or sent back to Carrier IQ.

"I've reverse engineered the software myself at a fairly good level of detail," Rosenberg said. "They're not recording keystroke information, they're using keystroke events as part of the application."

The difference is subtle but important. To perform commands, applications need to know which buttons a user has pushed: Your email app needs to know when you tap the reply button, and your phone app needs to know which numbers you press in order to dial. Applications therefore pay attention to which buttons a user is pressing.

But listening for a button press does not mean an application is therefore sending a record of those button presses back to the company, researchers said.

System-related apps like Carrier IQ often allow users or phone engineers to tap a series of keys in order to bring up administrative options or to display information on the phone's performance. In order to show that data, apps needs to know the correct code was tapped in -- by identifying specific key presses, as it is shown doing in the video.

But Rosenberg said his look at the Carrier IQ program revealed "a complete absence of code" that would indicate key presses were being tracked and recorded or sent over the Internet by the phone.

Instead, the readouts on Eckhart's video that occur when he presses keys are "debugging messages" -- informational feedback meant to help smartphone programmers verify that their applications are working correctly. In this case, Carrier IQ's developers appear to have set up the program to display a diagnostic message when a key is pressed or when a text message is sent.

"It's just spitting debug messages to the internal Android log service," sad Jon Oberheide, a co-founder of Duo Security. "It appears that Carrier IQ is indeed collecting some metrics, but I have not seen any evidence that keystrokes, SMS messages or Web browsing session content are being transferred off the device."

Carriers like AT&T, T-Mobile and Sprint have long disclosed that they collect and store information about users' locations, phone records and text messages. But what appeared to unnerve consumers and privacy observers was the possibility that the companies had gone a step further and were monitoring nearly every action a user performed on the phone.

about that little cootie in your droid...,

HuffPo | You might have heard about Carrier IQ, software that comes pre-installed on millions of smartphones that has the capability to record and store your keystrokes, the text messages you send and receive, the Internet websites you visit and more. If you own a smartphone -- a BlackBerry, an iPhone, an Android, a Windows Phone, whatever -- you are probably wondering whether or not Carrier IQ is on your smartphone, and if it is, how you can remove it.

Here is a rundown of everything we know about Carrier IQ, OS by OS. For a full background on Carrier IQ, what it does and why it has so many people nervous, read my colleague Gerry Smith's thorough piece from earlier.

ANDROID
The furor over Carrier IQ started with the discovery of the nosy software on Android smartphones and is only getting noisier (Senator Al Franken recently asked Carrier IQ for an explanation of its practices).

Unless you have a rooted Android device, you won't be able to see if your phone is running Carrier IQ. But here's what we know:

No Nexus smartphones (the Google Nexus One, the Nexus S and the Galaxy Nexus) have Carrier IQ software, according to a source who spoke with The Verge. That source also claimed that no Motorola Xoom tablets have Carrier IQ.

- Verizon, the largest mobile carrier in the United States, told GigaOM in an email that it did not install Carrier IQ on any of its smartphones.

- Sprint has issued a statement to The Verge. They do use Carrier IQ -- from their statement
Carrier IQ provides information that allows Sprint, and other carriers that use it, to analyze our network performance and identify where we should be improving service. We also use the data to understand device performance so we can figure out when issues are occurring. We collect enough information to understand the customer experience with devices on our network and how to address any connection problems, but we do not and cannot look at the contents of messages, photos, videos, etc., using this tool. The information collected is not sold and we don't provide a direct feed of this data to anyone outside of Sprint.
- AT&T and T-Mobile have not yet issued statements.

- The Kindle Fire tested negative for Carrier IQ, per Gizmodo.

- On Android phones, developer Trevor Eckhart has written an app that can detect and possibly remove Carrier IQ; however, your Android phone has to be "rooted," a step that the non-tech-savvy probably should not take. Better to wait for Carrier IQ and the carriers to resolve this mess than to risk bricking your phone, voiding the warranty or opening yourself up to malware.

WINDOWS PHONE
- 9to5Mac reports that Windows Phone appears to be totally free of Carrier IQ.

BLACKBERRY
Research in Motion told Business Insider that its phones do not have Carrier IQ preinstalled, nor does it authorize its carriers to do so. This does not mean, however, that carriers have not installed Carrier IQ without authorization.

The full statement:
RIM is aware of a recent claim by a security researcher that an application called “CarrierIQ” is installed on mobile devices from multiple vendors without the knowledge or consent of the device users. RIM does not pre-install the CarrierIQ app on BlackBerry smartphones or authorize its carrier partners to install the CarrierIQ app before sales or distribution. RIM also did not develop or commission the development of the CarrierIQ application, and has no involvement in the testing, promotion, or distribution of the app. RIM will continue to investigate reports and speculation related to CarrierIQ.
IPHONE
Noted iOS hacker chpwn found traces of Carrier IQ in iPhones running iOS 3.1.1 and up -- all the way up to iOS 5. However, it appears that the verison of Carrier IQ installed was tracking much less information than it was on Android phones.

Thursday, December 01, 2011

it's all downhill from here...,


Video - Decadence: Decline of the Western World documentary trailer.

SMH | LET'S not exaggerate. This is not the end of days. It is merely the end of civilisation as we know it.

That is the sobering argument made in Decadence: Decline of the Western World. Five years in the making, the Australian documentary proposes that the West peaked in 1969 and is now dying.

''The West as we know it today begins with the Magna Carta in 1215,'' Pria Viswalingam, who wrote, produced and appears in the documentary, says.
Advertisement: Story continues below

''Then came the Renaissance, the founding of America and the Enlightenment, before the West peaked with the social revolutions of the 1960s.

''And 1969 was the peak. The Russians and the Americans took us beyond our earthly bounds, the My Lai Massacre shattered the image of us as the good guys and then there was all the sheer exuberance and peace, love and rock'n'roll of Woodstock before the Rolling Stones 'end of the '60s' concert at Altamont. Decadence depicts the West's decline ever since.''

Viswalingam is a former SBS TV presenter whose credits include Fork in the Road and Class. Having devoted a career to analysing culture and society, he says the symptoms of decay and decadence are unmistakeable.

Those symptoms include soaring suicide rates and the West's addiction to antidepressants. They include rampant individualism, emptying churches, a faltering sense of community and disintegrating families. And they include the West's obsessive devotion to money as the only true measure of worth.

''Treadmill consumption, growing income disparity, B-grade leadership, they're obvious signs of a culture adrift,'' he says.

"scientists" say it may be alright...,

LATimes | "Scientifically, these compounds are way too important not to study," said Johns Hopkins psychopharmacologist Roland Griffiths, who conducted the psilocybin trial.

In their next incarnation, these drugs may help the psychologically wounded tune in to their darkest feelings and memories and turn therapy sessions into heightened opportunities to learn and heal.

"We're trying to break a social mind-set saying these are strictly drugs of abuse," said Rick Doblin, a public policy expert who founded the Multidisciplinary Assn. for Psychedelic Studies in 1986 to encourage research on therapeutic uses for medical marijuana and hallucinogens. "It's not the drug but how the drug is used that matters."

Regulators and medical researchers remain wary. But among at least some experts at the National Institutes of Health and the Food and Drug Administration, the shift in attitude "has been dramatic," Doblin said.

Researchers explored the usefulness of hallucinogenic agents as an adjunct to psychotherapy in the 1950s and '60s. But allegations that hallucinogens were used in government-funded "mind control" efforts, freewheeling experimentation by proponents like Dr. Timothy Leary, and the drugs' appeal to a generation in revolt quashed legitimate research for decades.

The thaw has been slow in coming. In 2008, Griffiths co-wrote a report in the Journal of Psychopharmacology comparing psilocybin with a placebo for people dealing with incurable diseases. Psilocybin resulted in "mystical experiences having substantial and sustained personal meaning and spiritual significance," according to the study, the first since 1972 to explore a hallucinogen's therapeutic value.

i think not...,

Wired | Technologists will become the next drug dealers, administering narcotics through brain stimulation, according to Rohit Talwar, the founder of Fast Future Research, speaking at Intelligence Squared’s If conference.

Talwar was charged by the government to investigate the drugs landscape over the next 20 years, exploring scenarios going beyond the traditional model of gangs producing and shipping drugs around the world.

He described how the world of genomic sequencing and services such as 23 and Me open up possibilities for tailoring drugs to the individual, delivering effects based on your physiology — which could apply just as effectively to narcotics as it could medicines.

He cited research from the University of California, Berkeley where neuroscientists were able to replicate images people were seeing based on the brain patterns of activity. When combined with transcranial magnetic stimulation — which has been used to inhibit brain functions such as the ability to speak or remember — it opens up the possibility of electronically delivering targeted highs.

He said: “You could also visualize the experience and then tailor the effect to what you want. This nano-bio-info-cogno convergence gets us into some very interesting spheres.”

One scenario he imagines would make use of biological proteins manufactured with information-processing technology to deliver effects that could be triggered by electromagnetic stimulation. He imagined that they could be used in a club environment where the DJ would release nanoparticles that the audience could ingest. These could then be used to trigger the desired state at a particular point during his or her set using an electrical stimulus (from a headset) into the crowd’s brains.

“The more we can understand the brain, the more we can deliver positive effects such as improved memory function. Do you want to get high? Mellow? Actually I want to live my life in my head as half-human half-cat,” he joked.

This sort of situation would mean that regulation of these “drugs” would move from trying to stop people from producing them to quality control. This sort of future could eliminate the cartels that control the drugs trade at the moment, because pharmaceutical companies might be able to corner the market and guarantee the quality of the experiences. Fist tap Dale.

the great antidepressant hypocrisy

Alternet | America’s ambivalent relationship with drugs and medication pushes us to ignore critical differences between drugs, while failing to appreciate useful similarities. When the Center for Disease Control and Prevention recently announced that one in ten Americans now takes an antidepressant—a 400% increase since 1988—there was a predictable media hand-wringing about "pill popping” and a rush to “quick fixes.”



What I always wonder when I hear these complaints is this: Have these people ever experienced depression themselves, or known someone who suffers from it? In over 20 years reporting on mental health, I’ve never actually come across a person whose first response to the slightest sadness was to seek medical help. (If you are or know of such a person, please do contact me—I’d love an interview).



In fact—and the research backs this up—most people with depression typically go untreated for years, or even decades, before finally getting treated. They often (as I personally did) tend to get lost in long, dangerous experiments in self-medication with legal or illegal drugs. Truth is, most people are reluctant to try antidepressants, rather than eagerly “ask their doctors” for the latest pill.



So why do we persist in believing that depression is over-medicated and everyone is popping Prozac like candy? The first reason is the cultural notion that mental illness should be rare.

Wednesday, November 30, 2011

Occupy Wall Street as a Node of Resonance

spaceandpolitics | The North American insurrection began when a handful of people occupied public space and began producing resonance. This is the material force that toppled three political regimes in North Africa and can only be produced by multitudes coming together on the streets. Liberty Square became a human assemblage that debates, eats, sings, drums, marches, sleeps, and dreams together and, in doing so, turns space into a machine of resonance generation. This resonance is embodied in the human mic that makes bodies speak in unison and vibrate together. The node of resonance in New York has radiated its force in all directions and precipitated the emergence of a continental political movement whose spatial form is the rhizome: a de-centered, horizontal, multi-sited assemblage of myriad other nodes interconnected with each other and recognizing no authority other than the collective power generated by the nodes.

The temporality of this spatial form, also generated in Tunisia and Egypt, seems historically unique and deserves closer scrutiny. In what follows I seek to examine the shifting spatial form and affective pulsations of the nodes that make up the local articulations of a leaderless anti-capitalist network.

Nodes of resonance expand by affecting people elsewhere and making them resonate. But this expansion only takes place if it involves receptive audiences. Countless nodes of resonance dissipate because they encounter a limit in audiences that are not affected, or are affected negatively. In North America, the inspiration created by the node of resonance on Tahrir Square and the despair generated by Obama’s unapologetic embrace of the capitalist looters finally created a more receptive political topography, a fertile ground for the expansion and multiplication of anti-systemic spatial nodes.

Decagonal and Quasi-Crystalline Tilings in Medieval Islamic Architecture



Peter Lu | The conventional view holds that girih (geometric star-and-polygon) patterns in medieval Islamic architecture were conceived by their designers as a network of zigzagging lines, where the lines were drafted directly with a straightedge and a compass. We show that by 1200 C.E. a conceptual breakthrough occurred in which girih patterns were reconceived as tessellations of a special set of equilateral polygons (girih tiles) decorated with lines. These tiles enabled the creation of increasingly complex periodic girih patterns, and by the 15th century, the tessellation approach was combined with self-similar transformations to construct nearly perfect quasi-crystalline Penrose patterns, five centuries before their discovery in the West.

magic trip: ken kesey's search for a cool place

In 1964, Ken Kesey, the 29-year-old author of One Flew Over the Cuckoo's Nest, gathered a group of friends for a freewheeling cross-country road trip. They painted a school bus psychedelic colors (a first), dropped acid, and shot the whole thing on 16mm...



Tuesday, November 29, 2011

a truly great loss indeed...,

The Scientist | Evolutionary biologist Lynn Margulis died last week (November 22) at the age of 73. She was best known for proposing the theory of endosymbiosis, which states that rather than evolving via genetic mutation, new species were more likely to have come about via parasitic or symbiotic relationships that became permanently inter-dependent over time.

“She was always stimulating; she always had a new idea, some new connection she had seen and she couldn’t wait to tell you about,” Steve Goodwin, Dean of the College of Natural Resources
 and the Environment told MassLive.com.

Margulis showed early aptitude in science, enrolling at the University of Chicago and earning her bachelor’s degree in zoology by the age of 18. Shortly thereafter she married her first husband, the astronomer Carl Sagan. The marriage ended by the time she got her doctorate in genetics from the University of California, Berkeley, in 1965.

She developed her ideas on symbiosis in the late 1960s, and tried to publish her ideas in 15 journals before finally being accepted by the Journal of Theoretical Biology, according to The New York Times. Though it was highly controversial at the time, serial symbiosis is widely accepted among evolutionary scientists today.

In the 1970s, she became a supporter of James Lovelock’s Gaia hypothesis, which proposed that the earth could be thought of as a complex system whose atmospheric and mineral components existed in symbiosis with living organisms, allowing biota as a whole to self-perpetuate.

She taught evolutionary biology for nearly 40 years, first at the Boston University and then at the University of Massachusetts, where I had the opportunity to experience her carefully crafted course. I came to the class expecting Margulis to expound on the theories that she had championed. Instead, she exposed our small seminar class to the experiments of many researchers whose work provided evidence for her ideas, and invited us to make own conclusions.

“If science doesn’t fit in with the cultural milieu, people dismiss science—they never reject their cultural milieu!” said Margulis in the book The Third Culture: Beyond the Scientific Revolution. In the same chapter, Richard Dawkins wrote: “I greatly admire Lynn Margulis’s sheer courage and stamina in sticking by the endosymbiosis theory, and carrying it through from being an unorthodoxy to an orthodoxy.”

According to The New York Times, Margulis died from a stroke. She is survived by a daughter Jennifer Margulis and three sons Dorion Sagan, Jeremy Sagan, Zachary Margulis-Ohnuma.

williams syndrome may hold clues to autism, other disorders

Visit msnbc.com for breaking news, world news, and news about the economy

MSNBC | Researchers have puzzled over that extreme friendliness for decades, pondering the causes and complicated traits that go with the syndrome that affects 1 in every 10,000 people, says Ursula Bellugi, a researcher at the Salk Institute in La Jolla, Calif., who has studied the disorder for a quarter-century.

They've come to believe that Williams syndrome, which is characterized by unique genetic markers and distinct behaviors, may actually hold the secrets to understanding other better-known disorders — including autism.

'Brink of a whole new world'
“We’re on the brink of a whole new world,” says Bellugi, 80, a professor and director of Salk’s Laboratory for Cognitive Neuroscience.

Now, thanks to a $5.5 million grant from the National Institute of Child Health and Human Development, Bellugi and team of prominent scientists are poised to use Williams syndrome to decode the ties between human genes and the way people act.

"We want to know: Are there links across the levels from the genes to behavior?" said Bellugi, who is leading a five-project program.

related to the microsychronization of body language hypothesis...,


Video - Paul Eckman talks about the genuine smile.

BBCNews | Researchers say people can spot whether a complete stranger has a certain "social gene" in just 20 seconds.

Two variants of the "oxytocin receptor gene" have been linked with social traits.

People judging the empathy of strangers - by studying the way they listened to people - predicted the genetic variant, a University of Toronto study showed.

The hormone oxytocin has a role in birth, production of milk and bonding between mother and baby.

It also seems to have a role in social skills and has variously been called the "love" or "cuddle" chemical.

Two variants of the oxytocin receptor gene - termed G and A - have been linked to social behaviour.

Studies have shown that people with two copies of G, compared with one of each or two of A, are at lower risk of autism and report higher levels of empathy, positive emotions and said they were more social.
Silent movie

Twenty three couples were filmed for the Proceedings of the National Academy of Sciences study. One described a moment of personal suffering while their partner listened.

Strangers then watched a 20 second silent recording of the exchange and scored the listener for their "prosocial traits", such as a caring nature or empathy.

GG people were found to be more prosocial than AG or AA people.

In the top 10 most trusted people, six were GG. In the 10 least trusted people, nine had at least one copy of A.

One of the researchers, Dr Aleksandr Kogan from the University of Toronto, said: "Our findings suggest even slight genetic variation may have tangible impact on people's behaviour, and that these behavioural differences are quickly noticed by others.

"Our study asked the question of whether these differences manifest themselves in behaviours that are quickly detectable by strangers, and it turns out they did."

Prof Sarina Rodrigues Saturn, from Oregon State University, said: "It was amazing to see how the data aligned so strongly by genotype.

"It makes sense that a gene crucial for social processing would yield these findings; other studies have shown that people are good at judging people at a distance and first impressions really make an impact." Fist tap Dale.

psychopaths have brain issues


Video - Paul Eckman talks about microexpressions in lie detection.

Newswise | Images of prisoners’ brains show important differences between those who are diagnosed as psychopaths and those who aren’t, according to a new study led by University of Wisconsin-Madison researchers.

The results could help explain the callous and impulsive anti-social behavior exhibited by some psychopaths.

The study showed that psychopaths have reduced connections between the ventromedial prefrontal cortex (vmPFC), the part of the brain responsible for sentiments such as empathy and guilt, and the amygdala, which mediates fear and anxiety. Two types of brain images were collected. Diffusion tensor images (DTI) showed reduced structural integrity in the white matter fibers connecting the two areas, while a second type of image that maps brain activity, a functional magnetic resonance image (fMRI), showed less coordinated activity between the vmPFC and the amygdala.

“This is the first study to show both structural and functional differences in the brains of people diagnosed with psychopathy,” says Michael Koenigs, assistant professor of psychiatry in the University of Wisconsin School of Medicine and Public Health. “Those two structures in the brain, which are believed to regulate emotion and social behavior, seem to not be communicating as they should.”

The study, which took place in a medium-security prison in Wisconsin, is a unique collaborative between three laboratories,

UW-Madison psychology Professor Joseph Newman has had a long term interest in studying and diagnosing those with psychopathy and has worked extensively in the Wisconsin corrections system. Dr. Kent Kiehl, of the University of New Mexico and the MIND Research Network, has a mobile MRI scanner that he brought to the prison and used to scan the prisoners’ brains. Koenigs and his graduate student, Julian Motzkin, led the analysis of the brain scans.

The study compared the brains of 20 prisoners with a diagnosis of psychopathy with the brains of 20 other prisoners who committed similar crimes but were not diagnosed with psychopathy.

“The combination of structural and functional abnormalities provides compelling evidence that the dysfunction observed in this crucial social-emotional circuitry is a stable characteristic of our psychopathic offenders,’’ Newman says. “I am optimistic that our ongoing collaborative work will shed more light on the source of this dysfunction and strategies for treating the problem.”

Newman notes that none of this work would be possible without the extraordinary support provided by the Wisconsin Department of Corrections, which he called “the silent partner in this research.” He says the DOC has demonstrated an unprecedented commitment to supporting research designed to facilitate the differential diagnosis and treatment of prisoners.

The study, published in the most recent Journal of Neuroscience, builds on earlier work by Newman and Koenigs that showed that psychopaths' decision-making mirrors that of patients with known damage to their ventromedial prefrontal cortex (vmPFC). This bolsters evidence that problems in that part of the brain are connected to the disorder.

“The decision-making study showed indirectly what this study shows directly – that there is a specific brain abnormality associated with criminal psychopathy,’’

Monday, November 28, 2011

schwaller de lubicz foretold the stygian depths of this evil...,


Video - Chris Busby on the abyssal reaches of the unspeakable.

ConflictandHealth | Background - Recent reports have drawn attention to increases in congenital birth anomalies and cancer in Fallujah Iraq blamed on teratogenic, genetic and genomic stress thought to result from depleted Uranium contamination following the battles in the town in 2004. Contamination of the parents of the children and of the environment by Uranium and other elements was investigated using Inductively Coupled Plasma Mass Spectrometry. Hair samples from 25 fathers and mothers of children diagnosed with congenital anomalies were analysed for Uranium and 51 other elements. Mean ages of the parents was: fathers 29.6 (SD 6.2); mothers: 27.3 (SD 6.8). For a sub-group of 6 women, long locks of hair were analysed for Uranium along the length of the hair to obtain information about historic exposures. Samples of soil and water were also analysed and Uranium isotope ratios determined.

Results
Levels of Ca, Mg, Co, Fe, Mn, V, Zn, Sr, Al, Ba, Bi, Ga, Pb, Hg, Pd and U (for mothers only) were significantly higher than published mean levels in an uncontaminated population in Sweden. In high excess were Ca, Mg, Sr, Al, Bi and Hg. Of these only Hg can be considered as a possible cause of congenital anomaly. Mean levels for Uranium were 0.16 ppm (SD: 0.11) range 0.02 to 0.4, higher in mothers (0.18 ppm SD 0.09) than fathers (0.11 ppm; SD 0.13). The highly unusual non-normal Fallujah distribution mean was significantly higher than literature results for a control population Southern Israel (0.062 ppm) and a non-parametric test (Mann Whitney-Wilcoxon) gave p = 0.016 for this comparison of the distribution. Mean levels in Fallujah were also much higher than the mean of measurements reported from Japan, Brazil, Sweden and Slovenia (0.04 ppm SD 0.02). Soil samples show low concentrations with a mean of 0.76 ppm (SD 0.42) and range 0.1-1.5 ppm; (N = 18). However it may be consistent with levels in drinking water (2.28 μgL-1) which had similar levels to water from wells (2.72 μgL-1) and the river Euphrates (2.24 μgL-1). In a separate study of a sub group of mothers with long hair to investigate historic Uranium excretion the results suggested that levels were much higher in the past. Uranium traces detected in the soil samples and the hair showed slightly enriched isotopic signatures for hair U238/U235 = (135.16 SD 1.45) compared with the natural ratio of 137.88. Soil sample Uranium isotope ratios were determined after extraction and concentration of the Uranium by ion exchange. Results showed statistically significant presence of enriched Uranium with a mean of 129 with SD5.9 (for this determination, the natural Uranium 95% CI was 132.1 < Ratio < 144.1).

Conclusions
Whilst caution must be exercised about ruling out other possibilities, because none of the elements found in excess are reported to cause congenital diseases and cancer except Uranium, these findings suggest the enriched Uranium exposure is either a primary cause or related to the cause of the congenital anomaly and cancer increases. Questions are thus raised about the characteristics and composition of weapons now being deployed in modern battlefields.

UH-UNH!!! that deadly radioactive waste y'alls now!!!

AsahiShimbun | During court proceedings concerning a radioactive golf course, Tokyo Electric Power Co. stunned lawyers by saying the utility was not responsible for decontamination because it no longer "owned" the radioactive substances.

“Radioactive materials (such as cesium) that scattered and fell from the Fukushima No. 1 nuclear plant belong to individual landowners there, not TEPCO,” the utility said.

That argument did not sit well with the companies that own and operate the Sunfield Nihonmatsu Golf Club, just 45 kilometers west of the stricken TEPCO plant in Fukushima Prefecture.

The Tokyo District Court also rejected that idea.

But in a ruling described as inconsistent by lawyers, the court essentially freed TEPCO from responsibility for decontamination work, saying the cleanup efforts should be done by the central and local governments.

Although the legal battle has moved to a higher court, observers said that if the district court’s decision stands and becomes a precedent, local governments' coffers could be drained.

The two golf companies in August filed for a provisional disposition with the Tokyo District Court, demanding TEPCO decontaminate the golf course and pay about 87 million yen ($1.13 million) for the upkeep costs over six months.

TEPCO's argument over ownership of the radioactive substances drew a sharp response from lawyers representing the Sunfield Nihonmatsu Golf Club and owner Sunfield.

“It is common sense that worthless substances such as radioactive fallout would not belong to landowners,” one of the lawyers said. “We are flabbergasted at TEPCO’s argument.”

koch bros got a "first call" from mf global...,


Video - Max Keiser on MF Global and a Koch Bros/MF Global hook-up

Negroes Getting In Trouble F'ing Around With Brandon...,

WaPo  | The head of a Philadelphia radio station said Sunday it has parted ways with a host who acknowledged that she interviewed Presid...