Sunday, December 04, 2011

Saenger-Bredt Spaceplane


Video - Recreation of the Sanger-Bendt orbital bomber.

Sanger Orbital Bomber - In June 1935 and February 1936, Dr. Eugen Sänger published articles in the Austrian aviation publication Flug on rocket-powered aircraft. This led to his being asked by the German High Command to build a secret aerospace research institute in Trauen to research and build his "Silverbird", a manned, winged vehicle that could reach orbit. Dr. Sänger had been working on this concept for several years, and in fact he had began developing liquid-fuel rocket engines. From 1930 to 1935, he had perfected (through countless static tests) a 'regeneratively cooled' liquid-fueled rocket engine that was cooled by its own fuel, which circulated around the combustion chamber. This engine produced an astounding 3048 meters/second (10000 feet/second) exhaust velocity, as compared to the later V-2 rocket's 2000 meters/second (6560 feet/second). Dr. Sänger, along with his staff, continued work at Trauen on the "Silverbird" under the Amerika Bomber program. The Sänger Amerika Bomber (or Orbital Bomber, Antipodal Bomber or Atmosphere Skipper) was designed for supersonic, stratospheric flight. The fuselage was flattened, which helped create lift and the wings were short and wedge shaped. There was a horizontal tail surface located at the extreme aft end of the fuselage, which had a small fin on each end. The fuel was carried in two large tanks, one on each side of the fuselage, running from the wings aft. Oxygen tanks were located one on each side of the fuselage, located forward of the wings. There was a huge rocket engine of 100 tons thrust mounted in the fuselage rear, and was flanked by two auxiliary rocket engines. The pilot sat in a pressurized cockpit in the forward fuselage, and a tricycle undercarriage was fitted for a gliding landing. A central bomb bay held one 3629 kg (8000 lb) free-falling bomb, and no defensive armament was fitted. The empty weight was to be approximately 9979 kg (22000 lbs). An interesting flight profile was envisioned for the "Silverbird". It was to be propelled down a 3 km (1.9 mile) long monorail track by a rocket-powered sled that developed a 600 ton thrust for 11 seconds (please see diagram below). After taking off at a 30 degree angle and reaching an altitude of 1.5 km (5100'), a speed of 1850 km/h (1149 mph) would be reached. At this point, the main rocket engine would be fired for 8 minutes and burn 90 tons of fuel to propel the "Silverbird" to a maximum speed of 22100 km/h (13724 mph) and an altitude of over 145 km (90 miles), although some sources list the maximum altitude reached as 280 km (174 miles). As the aircraft accelerated and descended under the pull of gravity, it would then hit the denser air at about 40 km (25 miles) and 'skip' back up as a stone does when skipped along water (please see drawing below). This also had the added benefit of cooling the aircraft after the intense frictional heating encountered when the denser air was reached. The skips would gradually be decreased until the aircraft would glide back to a normal landing using its conventional tricycle landing gear, after covering approximately 23500 km (14594 miles). The final test facilities for full-scale rocket engine tests were being built when Russia was invaded in June 1941. All futuristic programs were canceled due to the need to concentrate on proven designs. Dr. Sänger went on to work on ramjet designs for the DFS (German Research Institute for Gliding), and helped to design the Skoda-Kauba Sk P.14. Although the Luftwaffe did its best to stop Dr. Sänger from publishing his research results, a few copies went unaccounted for and made their way to other countries. After the war, he was asked to work (along with mathematician Irene Bredt) for the French Air Ministry, where in a bizarre plot, he was almost kidnapped by Stalin, who recognized the value of the Amerika Bomber.

bear in mind china's pressing domestic political needs, as well...,


Video - China will not hesitate to protect Iran even with a third World War.

been making fireworks for thousands of years....,


Video - China's subterranean great wall.

Telegraph | The Washington Post reported on Tuesday that Georgetown University students under the instruction of a former Pentagon official have assembled the largest body of public knowledge yet about a vast network of secret tunnels dug by China's secretive Second Artillery Corps, responsible for nuclear warheads.

The 363-page study has not yet been published, but has already sparked a congressional hearing and been circulated among top US defence officials, including the Air Force vice chief of staff, the Post reported.

"It's not quite a bombshell, but those thoughts and estimates are being checked against what people think they know based on classified information," it quoted an unnamed Defense Department strategist as saying.

The newspaper said critics of the report had questioned the students methods, which included using internet-based sources like Google Earth, blogs, military journals and even a fictionalised Chinese TV show.

But the Post also said the students were able to obtain a 400-page manual produced by the Second Artillery and usually only available to Chinese military personnel.

Saturday, December 03, 2011

2012 national defense authorization act

Wired | Here’s the best thing that can be said about the new detention powers the Senate has tucked into next year’s defense bill: They don’t force the military to detain American citizens indefinitely without a trial. They just let the military do that. And even though the leaders of the military and the spy community have said they want no such power, the Senate is poised to pass its bill as early as tonight.

There are still changes swirling around the Senate, but this looks like the basic shape of the 2012 National Defense Authorization Act. Someone the government says is “a member of, or part of, al-Qaida or an associated force” can be held in military custody “without trial until the end of the hostilities authorized by the Authorization for Use of Military Force.” Those hostilities are currently scheduled to end the Wednesday after never. The move would shut down criminal trials for terror suspects.

But far more dramatically, the detention mandate to use indefinite military detention in terrorism cases isn’t limited to foreigners. It’s confusing, because two different sections of the bill seem to contradict each other, but in the judgment of the University of Texas’ Robert Chesney — a nonpartisan authority on military detention — “U.S. citizens are included in the grant of detention authority.”

An amendment that would limit military detentions to people captured overseas failed on Thursday afternoon. The Senate soundly defeated a measure to strip out all the detention provisions on Tuesday.

So despite the Sixth Amendment’s guarantee of a right to trial, the Senate bill would let the government lock up any citizen it swears is a terrorist, without the burden of proving its case to an independent judge, and for the lifespan of an amorphous war that conceivably will never end. And because the Senate is using the bill that authorizes funding for the military as its vehicle for this dramatic constitutional claim, it’s pretty likely to pass.

It would be one thing if the military was clamoring for the authority to become the nation’s jailer. But to the contrary: Defense Secretary Leon Panetta opposes the maneuver. So does CIA Director David Petraeus, who usually commands deference from senators in both parties. Pretty much every security official has lined up against the Senate detention provisions, from Director of National Intelligence James Clapper to FBI Director Robert Mueller, who worry that they’ll get in the way of FBI investigations of domestic terrorists. President Obama has promised to veto the bill.

Which is ironic. After all, Obama approved of the execution without trial of Anwar al-Awlaki, al-Qaida’s YouTube preacher, based entirely on the unproven assertion that Awlaki was dangerous. Awlaki was an American citizen. So Obama thinks he has the right to kill Americans the government says are terrorists, but he doesn’t want the military to lock them up forever without trial. OK then.

Weirder still, the bill’s chief architect, Sen. Carl Levin (D-Mich.), tried to persuade skeptics that the bill wasn’t so bad. His pitch? “The requirement to detain a person in military custody under this section does not extend to citizens of the United States,” he said on the Senate floor on Monday. The bill would just let the government detain a citizen in military custody, not force it to do that. Reassured yet?

Civil libertarians aren’t. Sen. Al Franken (D-Minn.) said it “denigrates the very foundations of this country.” Sen. Rand Paul (R-Ky.) added, “it puts every single American citizen at risk.”

But there’s a reason this measure goes into the defense bill: Voting against the defense bill is usually considered political suicide. That’s why the bill will almost certainly pass tonight. If Obama backs down from his veto threat, get ready to see Americans at Guantanamo Bay. Fist tap Davera.

gutting the privacy act

NYTimes | The Privacy Act of 1974 allows a person to sue a federal agency for intentionally disclosing personal, confidential information without permission. But the government is trying to limit the force of that law and make it harder to hold agencies accountable for such violations.

In Federal Aviation Administration v. Cooper, a case argued this week in the Supreme Court, the government contends that the statute allows a plaintiff to recover “actual damages” only for monetary losses, but not for emotional distress.

Stanmore Cooper brought the suit because in an exchange of data to identify medically unfit pilots, the Social Security Administration gave the Federal Aviation Administration confidential information that revealed that he was H.I.V.-positive and was receiving disability benefits. He was devastated when he learned of this revelation. He experienced anxiety, sleeplessness and other serious problems. He pleaded guilty to a misdemeanor for not disclosing his H.I.V. status to the F.A.A., but he sued the government for severe mental and emotional distress.

The Supreme Court held in 2004 that it is necessary to show actual damages in a lawsuit under the Privacy Act but did not say whether nonmonetary harm like emotional distress comes under that heading. In Mr. Cooper’s case, the United States Court of Appeals for the Ninth Circuit ruled that it does. It found support in Congress’s intent to provide relief for “any damages”; in the Supreme Court’s view that in privacy cases “the primary damage is the mental distress from having been exposed to public view”; and in the law in seven other federal circuits.

The government, however, contends that the statute does not explicitly allow damages for emotional distress claims. To counter this argument, Justice Ruth Bader Ginsburg pointed out that “the person who is subject to this, to this embarrassment, this humiliation, doesn’t have out-of-pocket costs, but is terribly distressed, nervous, anxious, and all the rest.” If Congress did not intend to allow damages for emotional distress, she said, “Then maybe Congress shouldn’t have passed this statute.”

The government’s restricted interpretation would gut the point of the Privacy Act, and in too many cases would allow agencies to act improperly with impunity.

atheists can not be trusted...,

NationalPost | Many religious people don’t like atheists, and in fact would apparently rate them alongside rapists on levels of trust, suggests a new Canadian study that claims to be one of the first psychological probes into anti-atheist prejudice.

Researchers at the University of British Columbia and the University of Oregon conducted a series of studies that found a deep level of distrust toward those who don’t believe in God, deeming them to be among the least trusted people in the world — despite their growing ranks to an estimated half billion globally.

“There’s this persistent belief that people behave better if they feel like God is watching them,” said Will Gervais, lead study author and doctoral candidate in the social psychology department at UBC. “So if you’re playing by those rules, you’re going to see other people’s religious beliefs as signals of how trustworthy they might be.”

The research began a few years ago, when a series of polls revealed atheists to be some of the least liked people in areas with religious majorities, which is to say, much of the world. In one poll, only 45% of American respondents said they would vote for a qualified atheist presidential candidate and overwhelmingly preferred to vote for African American, Jewish and female candidates. Americans also rated atheists as the group that least agrees with their vision for the country and the group they’d most disapprove of their child marrying.

The resulting paper, published in the current online issue of the Journal of Personality and Social Psychology, includes six studies all designed to measure people’s perception of an atheist’s trustworthiness. The first study asked 351 Americans from across the country to compare the trustworthiness of an atheist and a gay man, since both represent groups often described as threatening to majority religious values. They rated atheists significantly higher than gay men on distrust, though lower on levels of disgust.

The second study recruited 105 UBC undergrads —they purposely targeted a more liberal sample from a less-religious nation — to test whether distrust of atheists is more pronounced than distrust of other groups, including Muslims. The students read a description of an untrustworthy man who pretended to leave insurance information after backing his car into a parked vehicle and were asked to say whether it was more likely the man was either a Christian, Muslim, rapist or an atheist. People were far more likely to say he was either an atheist or a rapist and not part of a religious group. They did not significantly differentiate atheists from rapists, something Mr. Gervais found disconcerting.

“It’s pretty shocking that we get the same magnitude of distrust towards atheists simply because they don’t believe [in God],” said the researcher, who is himself an atheist. “With rapists, they’re distrusted because they rape people. Atheists are viewed as sort of a moral wild card.”

Another among the six studies found people are more likely to hire someone for a job that requires high levels of trust, such as a daycare worker, if they believe they are religious. They would hire atheists for a low trust job, such as a waitress, the study found.

The levels of distrust were more pronounced among respondents who said they were religious, said Mr. Gervais. One of the studies measured how much people thought believing God is watching makes you a better person.

one-time thought crime...,

NYTimes | Border Patrol agents pursue smugglers one moment and sit around in boredom the next. It was during one of the lulls that Bryan Gonzalez, a young agent, made some comments to a colleague that cost him his career.

Stationed in Deming, N.M., Mr. Gonzalez was in his green-and-white Border Patrol vehicle just a few feet from the international boundary when he pulled up next to a fellow agent to chat about the frustrations of the job. If marijuana were legalized, Mr. Gonzalez acknowledges saying, the drug-related violence across the border in Mexico would cease. He then brought up an organization called Law Enforcement Against Prohibition that favors ending the war on drugs.

Those remarks, along with others expressing sympathy for illegal immigrants from Mexico, were passed along to the Border Patrol headquarters in Washington. After an investigation, a termination letter arrived that said Mr. Gonzalez held “personal views that were contrary to core characteristics of Border Patrol Agents, which are patriotism, dedication and esprit de corps.”

After his dismissal, Mr. Gonzalez joined a group even more exclusive than the Border Patrol: law enforcement officials who have lost their jobs for questioning the war on drugs and are fighting back in the courts.

In Arizona, Joe Miller, a probation officer in Mohave County, near the California border, filed suit last month in Federal District Court after he was dismissed for adding his name to a letter by Law Enforcement Against Prohibition, which is based in Medford, Mass., and known as LEAP, expressing support for the decriminalization of marijuana.

“More and more members of the law enforcement community are speaking out against failed drug policies, and they don’t give up their right to share their insight and engage in this important debate simply because they receive government paychecks,” said Daniel Pochoda, the legal director for the American Civil Liberties Union of Arizona, which is handling the Miller case.

Mr. Miller was one of 32 members of LEAP who signed the letter, which expressed support for a California ballot measure that failed last year that would have permitted recreational marijuana use. Most of the signers were retired members of law enforcement agencies, who can speak their minds without fear of action by their bosses. But Mr. Miller and a handful of others who were still on the job — including the district attorney for Humboldt County in California and the Oakland city attorney — signed, too.

LEAP has seen its membership increase significantly from the time it was founded in 2002 by five disillusioned officers. It now has an e-mail list of 48,000, and its members include 145 judges, prosecutors, police officers, prison guards and other law enforcement officials, most of them retired, who speak on the group’s behalf.

“No one wants to be fired and have to fight for their job in court,” said Neill Franklin, a retired police officer who is LEAP’s executive director. “So most officers are reluctant to sign on board. But we do have some brave souls.”

Mr. Miller was accused of not making clear that he was speaking for himself and not the probation department while advocating the decriminalization of cannabis. His lawsuit, though, points out that the letter he signed said at the bottom, “All agency affiliations are listed for identification purposes only.”

He was also accused of dishonesty for denying that he had given approval for his name to appear on the LEAP letter. In the lawsuit, Mr. Miller said that his wife had given approval without his knowledge, using his e-mail address, but that he had later supported her.

Kip Anderson, the court administrator for the Superior Court in Mohave County, said there was no desire to limit Mr. Miller’s political views.

“This isn’t about legalization,” Mr. Anderson said. “We’re not taking a stand on that. We just didn’t want people to think he was speaking on behalf of the probation department.”

Mr. Miller, who is also a retired police officer and Marine, lost an appeal of his dismissal before a hearing officer. But when his application for unemployment benefits was turned down, he appealed that and won. An administrative law judge found that Mr. Miller had not been dishonest with his bosses and that the disclaimer on the letter was sufficient.

In the case of Mr. Gonzalez, the fired Border Patrol agent, he had not joined LEAP but had expressed sympathy with the group’s cause. “It didn’t make sense to me why marijuana is illegal,” he said. “To see that thousands of people are dying, some of whom I know, makes you want to look for a change.”

Since his firing, Mr. Gonzalez, who filed suit in federal court in Texas in January, has worked as a construction worker, a bouncer and a yard worker. He has also gone back to school, where he is considering a law degree.

“I don’t want to work at a place that says I can’t think,” said Mr. Gonzalez, who grew up in El Paso, just across the border from Ciudad Juárez, which has experienced some of the worst bloodshed in Mexico.

Friday, December 02, 2011

wikileaks: the spy files

CBSNews | President Eisenhower, in his 1961 farewell address, warned that the military-industrial complex could "endanger our liberties or democratic processes." Today WikiLeaks editor Julian Assange is warning that the surveillance-industrial complex is even more dangerous.

A set of nearly 300 documents that the document-leaking Web site published today reveals how extensive and privacy-invasive the secretive multi-billion dollar industry devoted to surveillance technology has become.

"We are in a world now where not only is it theoretically possible to record nearly all telecommunications traffic out of a country, all telephone calls, but where there is an international industry selling the devices now to do it," Assange said in a video interview today.

What WikiLeaks has dubbed the "Spy Files" is a collection of marketing and technical documents, including previously-unreleased presentations from companies that showed up at government-only conferences like ISS World Europe, billed as a gathering in 2008 for "telecom operators, law enforcement," and employees of spy agencies.

Amesys, a unit of French technology firm Bull SA, boasts in a leaked document how it can aid governments in moving from eavesdropping on one person to "full country traffic monitoring," including automatic translation and mapping of real-world social networks based on who's talking to who.

Amesys's presentation offers a one-stop shop for nationwide monitoring, including GSM cell phone communications, satellite signals, Internet communications, and phone calls. The company boasts of a "huge range of sensors and analyzing probes" and -- in an echo of what the former East German secret police attempted decades earlier -- a "centralized intelligence system gathering all information."

There were hints about the extent of Amesys' surveillance apparatus before, including in an August article in the Wall Street Journal that described a room used by Moammar Gadhafi's secret police to monitor Internet traffic in Libya. The room sported Amesys logos, manuals, and posters, the article said.

But the WikiLeaks' new leaks, which resume a dry spell for the group when it effectively halted disclosures after a series of U.S. Defense Department and State Department documents, are likely to draw more attention to the surveillance-industrial complex and could lead to more legal oversight and reform efforts.

Amesys did not immediately respond to a request for comment from CNET. It did distribute a statement in September that it sold "analysis hardware" to Libya to help it fight terrorism, and included a vague threat of legal action against anyone who damages its "image or reputation."

Not all of the documents in WikiLeaks' archive are actual leaks. An HP brochure describing "technology that supports global law enforcement" is publicly available (PDF) on the company's Web site.

Earlier this week, an attorney representing Bradley Manning, WikiLeaks' alleged source for the U.S. government files who is now facing criminal charges, suggested that the megabytes of classified data his client allegedly turned over didn't truly harm national security. Manning, an Army private, was charged last July with sending a military video to a person not authorized to receive it and with obtaining "more than 150,000 diplomatic cables" from the State Department. A preliminary hearing in Manning's case has been scheduled for later this month.

is the personal computer dead?

TechnologyReview | The PC is dead. Rising numbers of mobile, lightweight, cloud-centric devices don't merely represent a change in form factor. Rather, we're seeing an unprecedented shift of power from end users and software developers on the one hand, to operating system vendors on the other—and even those who keep their PCs are being swept along. This is a little for the better, and much for the worse.

The transformation is one from product to service. The platforms we used to purchase every few years—like operating systems—have become ongoing relationships with vendors, both for end users and software developers. I wrote about this impending shift, driven by a desire for better security and more convenience, in my 2008 book The Future of the Internet—and How to Stop It.

For decades we've enjoyed a simple way for people to create software and share or sell it to others. People bought general-purpose computers—PCs, including those that say Mac. Those computers came with operating systems that took care of the basics. Anyone could write and run software for an operating system, and up popped an endless assortment of spreadsheets, word processors, instant messengers, Web browsers, e-mail, and games. That software ranged from the sublime to the ridiculous to the dangerous—and there was no referee except the user's good taste and sense, with a little help from nearby nerds or antivirus software. (This worked so long as the antivirus software was not itself malware, a phenomenon that turned out to be distressingly common.)

Choosing an OS used to mean taking a bit of a plunge: since software was anchored to it, a choice of, say, Windows over Mac meant a long-term choice between different available software collections. Even if a software developer offered versions of its wares for each OS, switching from one OS to another typically meant having to buy that software all over again.
Advertisement

That was one reason we ended up with a single dominant OS for over two decades. People had Windows, which made software developers want to write for Windows, which made more people want to buy Windows, which made it even more appealing to software developers, and so on. In the 1990s, both the U.S. and European governments went after Microsoft in a legendary and yet, today, easily forgettable antitrust battle. Their main complaint? That Microsoft had put a thumb on the scale in competition between its own Internet Explorer browser and its primary competitor, Netscape Navigator. Microsoft did this by telling PC makers that they had to ensure that Internet Explorer was ready and waiting on the user's Windows desktop when the user unpacked the computer and set it up, whether the PC makers wanted to or not. Netscape could still be prebundled with Windows, as far as Microsoft was concerned. Years of litigation and oceans of legal documents can thus be boiled down into an essential original sin: an OS maker had unduly favored its own applications.

When the iPhone came out in 2007, its design was far more restrictive. No outside code at all was allowed on the phone; all the software on it was Apple's. What made this unremarkable—and unobjectionable—was that it was a phone, not a computer, and most competing phones were equally locked down. We counted on computers to be open platforms—hard to think of them any other way—and understood phones as appliances, more akin to radios, TVs, and coffee machines.

get root on your android...,

androidcentral | So you want to know about rooting your Android phone, eh? Yeah, it sounds a little scary. It's kind of a big leap, and it may involve a few steps. and quite possibly the use of a command prompt, which would require you to follow instructions and type words and stuff.

Here's rooting in a nutshell: Your Android smartphone is based on Linux. A big, bad, scary computer operating system known only by people with neck beards. (Only, not really. But mostly.) Anyhoo, Android apps need permission to access certain parts of Linux, and not all apps have this special "root" access. That includes a few basic things, like the camera flash, and the ability to take screen shots. There are a bunch of other apps that need root access for other reasons, too, but the basic premise is the same.

So should you root your phone? First thing to do is read this editorial, and decide if you want to go further. Then if you're the type who loves to mess with things, go for it. If you want to squeeze a little more functionality out of your phone, go for it. Need more convincing? Check out "Rooting Q&A -- Is it for me?"

what is rooting?

androidcentral | Each day more and more Android handsets are being sold, and that means users are faced with a major decision: To root, or not to root. Some of us will do it simply because we can, others will decide not to do it as they enjoy the phone as-is, but the majority of us will be on the fence about the whole idea of rooting.

Hopefully some of those questions can get answered and you’ll have a clearer picture of the process and some understanding to make the decision a bit easier. I’m sure this won’t answer every question you’ll have when considering whether or not to root your device, but hopefully this is a good start and a basis for further discussion.
What, exactly, is rooting?

Rooting your Android device involves adding in a small Linux application called “su”. It stands for SuperUser, and allows applications and commands to run with elevated permissions. Everything that runs code, whether it’s an application or the user, has a permission level set by the operating system.

Why Linux? Well the heart of the Android operating system is the Linux kernel. You'll hear a lot of nerdy geek-speak about the Linux kernel, but all you really need to know is that it's what is interfacing Android to your hardware, and ultimately has complete control. When you stray outside the "normal" way of using Android and start entering commands directly, the kernel is who you're talking to.

The root user is the boss and can do anything (good or bad) on the device. From simple things like clearing the cache from core applications, to more advanced things like wirelessly tethering a laptop or iPod touch through your phone, root can do it. The su program is a sort of gateway that lets applications or users act as root while doing tasks. If you’re the curious type (I know some of you are ;) ) here’s a more in-depth review of root as used in a Linux system by the Linux Information Project.

OK, so why would I want to root my phone?
Good question! Maybe you don’t. Everything in a Linux system is a file, or is treated as a file. Since Android runs on top of Linux, it acts the same way. Most of the files you will need to access or change are available to you without having elevated permissions. "Most" being the key term here. When you want to do things that affect or change the core software of your device -- like updating the version of Android on your phone, or adding a nice piece of software from another device -- you'll have to do it as root. Dream and Magic users have been running Eclair on their phones for a good while now, and it’s because they have rooted their device. Rooting also gives you access to some handy software that you couldn’t use otherwise. Things like a complete system backup or ad blocking software require you to root your device. Don’t root your phone just for the sake of rooting your phone, but if you come across something you feel you could use or would like to have, then consider it. You'll find that the open source community is usually pretty helpful and encouraging new people to do new things is common. And when you get to the point where you can lend a hand to the new folks, pay it forward.

sprint uses it to keep droids in the "4G" cattle pen...,

Gigaom | Carrier IQ supplies Sprint generalized data about how its customers’ smartphones perform on its network, but Sprint does not snoop into the private contents of those phones, Sprint said on Tuesday. While Sprint is primarily using that information to optimize both its network and how phones behave on it, the operator isn’t – and technically incapable of — tracking or viewing the contents of any message or media in the device, Sprint spokeswoman Stephanie Vinge said in an email. Here’s her full statement:
“Carrier IQ provides information that allows Sprint, and other carriers that use it, to analyze our network performance and identify where we should be improving service. We also use the data to understand device performance so we can figure out when issues are occurring. We collect enough information to understand the customer experience with devices on our network and how to address any connection problems, but we do not and cannot look at the contents of messages, photos, videos, etc., using this tool. The information collected is not sold and we don’t provide a direct feed of this data to anyone outside of Sprint.

“Sprint is well known for our serious commitment to respecting and protecting the privacy and security of each customer’s personally identifiable information and other customer data. A key element of this involves communicating with our customers about our information privacy practices. The Sprint privacy policy makes it clear we collect information that includes how a device is functioning and how it is being used. Carrier IQ is an integral part of the Sprint service. Sprint uses Carrier IQ to help maintain our network performance.”
Sprint, like many of its operator brethren, is in the firing line as a new research from Android developer Trevor Eckhart discovered what he termed a “rootkit” buried in the guts of many Android phones. The Carrier IQ software tracks every keystroke in on the phones it is installed on, recording that information for Carrier IQ’s analytics purposes. It’s not clear if the information collected goes directly to the operators, handset makers or to Carrier IQ. But the applications cannot be disabled or uninstalled, and there’s no way opt out of its recording activities. (Kevin Tofel wrote earlier about how to detect Carrier IQ in your phone).

carrier iq disputes Mr. Mackey's claim...,


Video - some USB debug information about carrier iq.

LATimes | Carrier IQ, the beleagured online metrics company that has been accused of installing spy software on millions of smartphones, has broken its silence to say the critics have it wrong.

"While a few individuals have identified that there is a great deal of information available to the Carrier IQ software inside the handset, our software does not record, store or transmit the contents of SMS messages, email, photographs, audio or video," the company said in a statement released late Thursday.

The firm's defense came as as politicians and privacy organizations continued to question the little-known Mountain View, Calif., company, which designs communications analysis software used by some of the largest U.S. wireless carriers, including AT&T, Sprint and T-Mobile. The carriers say data collected on their behalf by Carrier IQ helps them improve their service.

Last week, 25-year-old system administrator named Trevor Eckhart released a video (above) purporting to show Carrier IQ's app recording smartphone users' every keypress, and implying that the company was therefore able to intercept users' private communications.

But security researchers have disagreed with conclusions drawn from Eckhart's analysis.

"It's not true," said Dan Rosenberg, a senior consultant at Virtual Security Research, who said the video shows only diagnostic information and at no point provides evidence the data is stored or sent back to Carrier IQ.

"I've reverse engineered the software myself at a fairly good level of detail," Rosenberg said. "They're not recording keystroke information, they're using keystroke events as part of the application."

The difference is subtle but important. To perform commands, applications need to know which buttons a user has pushed: Your email app needs to know when you tap the reply button, and your phone app needs to know which numbers you press in order to dial. Applications therefore pay attention to which buttons a user is pressing.

But listening for a button press does not mean an application is therefore sending a record of those button presses back to the company, researchers said.

System-related apps like Carrier IQ often allow users or phone engineers to tap a series of keys in order to bring up administrative options or to display information on the phone's performance. In order to show that data, apps needs to know the correct code was tapped in -- by identifying specific key presses, as it is shown doing in the video.

But Rosenberg said his look at the Carrier IQ program revealed "a complete absence of code" that would indicate key presses were being tracked and recorded or sent over the Internet by the phone.

Instead, the readouts on Eckhart's video that occur when he presses keys are "debugging messages" -- informational feedback meant to help smartphone programmers verify that their applications are working correctly. In this case, Carrier IQ's developers appear to have set up the program to display a diagnostic message when a key is pressed or when a text message is sent.

"It's just spitting debug messages to the internal Android log service," sad Jon Oberheide, a co-founder of Duo Security. "It appears that Carrier IQ is indeed collecting some metrics, but I have not seen any evidence that keystrokes, SMS messages or Web browsing session content are being transferred off the device."

Carriers like AT&T, T-Mobile and Sprint have long disclosed that they collect and store information about users' locations, phone records and text messages. But what appeared to unnerve consumers and privacy observers was the possibility that the companies had gone a step further and were monitoring nearly every action a user performed on the phone.

about that little cootie in your droid...,

HuffPo | You might have heard about Carrier IQ, software that comes pre-installed on millions of smartphones that has the capability to record and store your keystrokes, the text messages you send and receive, the Internet websites you visit and more. If you own a smartphone -- a BlackBerry, an iPhone, an Android, a Windows Phone, whatever -- you are probably wondering whether or not Carrier IQ is on your smartphone, and if it is, how you can remove it.

Here is a rundown of everything we know about Carrier IQ, OS by OS. For a full background on Carrier IQ, what it does and why it has so many people nervous, read my colleague Gerry Smith's thorough piece from earlier.

ANDROID
The furor over Carrier IQ started with the discovery of the nosy software on Android smartphones and is only getting noisier (Senator Al Franken recently asked Carrier IQ for an explanation of its practices).

Unless you have a rooted Android device, you won't be able to see if your phone is running Carrier IQ. But here's what we know:

No Nexus smartphones (the Google Nexus One, the Nexus S and the Galaxy Nexus) have Carrier IQ software, according to a source who spoke with The Verge. That source also claimed that no Motorola Xoom tablets have Carrier IQ.

- Verizon, the largest mobile carrier in the United States, told GigaOM in an email that it did not install Carrier IQ on any of its smartphones.

- Sprint has issued a statement to The Verge. They do use Carrier IQ -- from their statement
Carrier IQ provides information that allows Sprint, and other carriers that use it, to analyze our network performance and identify where we should be improving service. We also use the data to understand device performance so we can figure out when issues are occurring. We collect enough information to understand the customer experience with devices on our network and how to address any connection problems, but we do not and cannot look at the contents of messages, photos, videos, etc., using this tool. The information collected is not sold and we don't provide a direct feed of this data to anyone outside of Sprint.
- AT&T and T-Mobile have not yet issued statements.

- The Kindle Fire tested negative for Carrier IQ, per Gizmodo.

- On Android phones, developer Trevor Eckhart has written an app that can detect and possibly remove Carrier IQ; however, your Android phone has to be "rooted," a step that the non-tech-savvy probably should not take. Better to wait for Carrier IQ and the carriers to resolve this mess than to risk bricking your phone, voiding the warranty or opening yourself up to malware.

WINDOWS PHONE
- 9to5Mac reports that Windows Phone appears to be totally free of Carrier IQ.

BLACKBERRY
Research in Motion told Business Insider that its phones do not have Carrier IQ preinstalled, nor does it authorize its carriers to do so. This does not mean, however, that carriers have not installed Carrier IQ without authorization.

The full statement:
RIM is aware of a recent claim by a security researcher that an application called “CarrierIQ” is installed on mobile devices from multiple vendors without the knowledge or consent of the device users. RIM does not pre-install the CarrierIQ app on BlackBerry smartphones or authorize its carrier partners to install the CarrierIQ app before sales or distribution. RIM also did not develop or commission the development of the CarrierIQ application, and has no involvement in the testing, promotion, or distribution of the app. RIM will continue to investigate reports and speculation related to CarrierIQ.
IPHONE
Noted iOS hacker chpwn found traces of Carrier IQ in iPhones running iOS 3.1.1 and up -- all the way up to iOS 5. However, it appears that the verison of Carrier IQ installed was tracking much less information than it was on Android phones.

Thursday, December 01, 2011

it's all downhill from here...,


Video - Decadence: Decline of the Western World documentary trailer.

SMH | LET'S not exaggerate. This is not the end of days. It is merely the end of civilisation as we know it.

That is the sobering argument made in Decadence: Decline of the Western World. Five years in the making, the Australian documentary proposes that the West peaked in 1969 and is now dying.

''The West as we know it today begins with the Magna Carta in 1215,'' Pria Viswalingam, who wrote, produced and appears in the documentary, says.
Advertisement: Story continues below

''Then came the Renaissance, the founding of America and the Enlightenment, before the West peaked with the social revolutions of the 1960s.

''And 1969 was the peak. The Russians and the Americans took us beyond our earthly bounds, the My Lai Massacre shattered the image of us as the good guys and then there was all the sheer exuberance and peace, love and rock'n'roll of Woodstock before the Rolling Stones 'end of the '60s' concert at Altamont. Decadence depicts the West's decline ever since.''

Viswalingam is a former SBS TV presenter whose credits include Fork in the Road and Class. Having devoted a career to analysing culture and society, he says the symptoms of decay and decadence are unmistakeable.

Those symptoms include soaring suicide rates and the West's addiction to antidepressants. They include rampant individualism, emptying churches, a faltering sense of community and disintegrating families. And they include the West's obsessive devotion to money as the only true measure of worth.

''Treadmill consumption, growing income disparity, B-grade leadership, they're obvious signs of a culture adrift,'' he says.

"scientists" say it may be alright...,

LATimes | "Scientifically, these compounds are way too important not to study," said Johns Hopkins psychopharmacologist Roland Griffiths, who conducted the psilocybin trial.

In their next incarnation, these drugs may help the psychologically wounded tune in to their darkest feelings and memories and turn therapy sessions into heightened opportunities to learn and heal.

"We're trying to break a social mind-set saying these are strictly drugs of abuse," said Rick Doblin, a public policy expert who founded the Multidisciplinary Assn. for Psychedelic Studies in 1986 to encourage research on therapeutic uses for medical marijuana and hallucinogens. "It's not the drug but how the drug is used that matters."

Regulators and medical researchers remain wary. But among at least some experts at the National Institutes of Health and the Food and Drug Administration, the shift in attitude "has been dramatic," Doblin said.

Researchers explored the usefulness of hallucinogenic agents as an adjunct to psychotherapy in the 1950s and '60s. But allegations that hallucinogens were used in government-funded "mind control" efforts, freewheeling experimentation by proponents like Dr. Timothy Leary, and the drugs' appeal to a generation in revolt quashed legitimate research for decades.

The thaw has been slow in coming. In 2008, Griffiths co-wrote a report in the Journal of Psychopharmacology comparing psilocybin with a placebo for people dealing with incurable diseases. Psilocybin resulted in "mystical experiences having substantial and sustained personal meaning and spiritual significance," according to the study, the first since 1972 to explore a hallucinogen's therapeutic value.

i think not...,

Wired | Technologists will become the next drug dealers, administering narcotics through brain stimulation, according to Rohit Talwar, the founder of Fast Future Research, speaking at Intelligence Squared’s If conference.

Talwar was charged by the government to investigate the drugs landscape over the next 20 years, exploring scenarios going beyond the traditional model of gangs producing and shipping drugs around the world.

He described how the world of genomic sequencing and services such as 23 and Me open up possibilities for tailoring drugs to the individual, delivering effects based on your physiology — which could apply just as effectively to narcotics as it could medicines.

He cited research from the University of California, Berkeley where neuroscientists were able to replicate images people were seeing based on the brain patterns of activity. When combined with transcranial magnetic stimulation — which has been used to inhibit brain functions such as the ability to speak or remember — it opens up the possibility of electronically delivering targeted highs.

He said: “You could also visualize the experience and then tailor the effect to what you want. This nano-bio-info-cogno convergence gets us into some very interesting spheres.”

One scenario he imagines would make use of biological proteins manufactured with information-processing technology to deliver effects that could be triggered by electromagnetic stimulation. He imagined that they could be used in a club environment where the DJ would release nanoparticles that the audience could ingest. These could then be used to trigger the desired state at a particular point during his or her set using an electrical stimulus (from a headset) into the crowd’s brains.

“The more we can understand the brain, the more we can deliver positive effects such as improved memory function. Do you want to get high? Mellow? Actually I want to live my life in my head as half-human half-cat,” he joked.

This sort of situation would mean that regulation of these “drugs” would move from trying to stop people from producing them to quality control. This sort of future could eliminate the cartels that control the drugs trade at the moment, because pharmaceutical companies might be able to corner the market and guarantee the quality of the experiences. Fist tap Dale.

the great antidepressant hypocrisy

Alternet | America’s ambivalent relationship with drugs and medication pushes us to ignore critical differences between drugs, while failing to appreciate useful similarities. When the Center for Disease Control and Prevention recently announced that one in ten Americans now takes an antidepressant—a 400% increase since 1988—there was a predictable media hand-wringing about "pill popping” and a rush to “quick fixes.”



What I always wonder when I hear these complaints is this: Have these people ever experienced depression themselves, or known someone who suffers from it? In over 20 years reporting on mental health, I’ve never actually come across a person whose first response to the slightest sadness was to seek medical help. (If you are or know of such a person, please do contact me—I’d love an interview).



In fact—and the research backs this up—most people with depression typically go untreated for years, or even decades, before finally getting treated. They often (as I personally did) tend to get lost in long, dangerous experiments in self-medication with legal or illegal drugs. Truth is, most people are reluctant to try antidepressants, rather than eagerly “ask their doctors” for the latest pill.



So why do we persist in believing that depression is over-medicated and everyone is popping Prozac like candy? The first reason is the cultural notion that mental illness should be rare.

Wednesday, November 30, 2011

Occupy Wall Street as a Node of Resonance

spaceandpolitics | The North American insurrection began when a handful of people occupied public space and began producing resonance. This is the material force that toppled three political regimes in North Africa and can only be produced by multitudes coming together on the streets. Liberty Square became a human assemblage that debates, eats, sings, drums, marches, sleeps, and dreams together and, in doing so, turns space into a machine of resonance generation. This resonance is embodied in the human mic that makes bodies speak in unison and vibrate together. The node of resonance in New York has radiated its force in all directions and precipitated the emergence of a continental political movement whose spatial form is the rhizome: a de-centered, horizontal, multi-sited assemblage of myriad other nodes interconnected with each other and recognizing no authority other than the collective power generated by the nodes.

The temporality of this spatial form, also generated in Tunisia and Egypt, seems historically unique and deserves closer scrutiny. In what follows I seek to examine the shifting spatial form and affective pulsations of the nodes that make up the local articulations of a leaderless anti-capitalist network.

Nodes of resonance expand by affecting people elsewhere and making them resonate. But this expansion only takes place if it involves receptive audiences. Countless nodes of resonance dissipate because they encounter a limit in audiences that are not affected, or are affected negatively. In North America, the inspiration created by the node of resonance on Tahrir Square and the despair generated by Obama’s unapologetic embrace of the capitalist looters finally created a more receptive political topography, a fertile ground for the expansion and multiplication of anti-systemic spatial nodes.

Decagonal and Quasi-Crystalline Tilings in Medieval Islamic Architecture



Peter Lu | The conventional view holds that girih (geometric star-and-polygon) patterns in medieval Islamic architecture were conceived by their designers as a network of zigzagging lines, where the lines were drafted directly with a straightedge and a compass. We show that by 1200 C.E. a conceptual breakthrough occurred in which girih patterns were reconceived as tessellations of a special set of equilateral polygons (girih tiles) decorated with lines. These tiles enabled the creation of increasingly complex periodic girih patterns, and by the 15th century, the tessellation approach was combined with self-similar transformations to construct nearly perfect quasi-crystalline Penrose patterns, five centuries before their discovery in the West.

magic trip: ken kesey's search for a cool place

In 1964, Ken Kesey, the 29-year-old author of One Flew Over the Cuckoo's Nest, gathered a group of friends for a freewheeling cross-country road trip. They painted a school bus psychedelic colors (a first), dropped acid, and shot the whole thing on 16mm...



Tuesday, November 29, 2011

a truly great loss indeed...,

The Scientist | Evolutionary biologist Lynn Margulis died last week (November 22) at the age of 73. She was best known for proposing the theory of endosymbiosis, which states that rather than evolving via genetic mutation, new species were more likely to have come about via parasitic or symbiotic relationships that became permanently inter-dependent over time.

“She was always stimulating; she always had a new idea, some new connection she had seen and she couldn’t wait to tell you about,” Steve Goodwin, Dean of the College of Natural Resources
 and the Environment told MassLive.com.

Margulis showed early aptitude in science, enrolling at the University of Chicago and earning her bachelor’s degree in zoology by the age of 18. Shortly thereafter she married her first husband, the astronomer Carl Sagan. The marriage ended by the time she got her doctorate in genetics from the University of California, Berkeley, in 1965.

She developed her ideas on symbiosis in the late 1960s, and tried to publish her ideas in 15 journals before finally being accepted by the Journal of Theoretical Biology, according to The New York Times. Though it was highly controversial at the time, serial symbiosis is widely accepted among evolutionary scientists today.

In the 1970s, she became a supporter of James Lovelock’s Gaia hypothesis, which proposed that the earth could be thought of as a complex system whose atmospheric and mineral components existed in symbiosis with living organisms, allowing biota as a whole to self-perpetuate.

She taught evolutionary biology for nearly 40 years, first at the Boston University and then at the University of Massachusetts, where I had the opportunity to experience her carefully crafted course. I came to the class expecting Margulis to expound on the theories that she had championed. Instead, she exposed our small seminar class to the experiments of many researchers whose work provided evidence for her ideas, and invited us to make own conclusions.

“If science doesn’t fit in with the cultural milieu, people dismiss science—they never reject their cultural milieu!” said Margulis in the book The Third Culture: Beyond the Scientific Revolution. In the same chapter, Richard Dawkins wrote: “I greatly admire Lynn Margulis’s sheer courage and stamina in sticking by the endosymbiosis theory, and carrying it through from being an unorthodoxy to an orthodoxy.”

According to The New York Times, Margulis died from a stroke. She is survived by a daughter Jennifer Margulis and three sons Dorion Sagan, Jeremy Sagan, Zachary Margulis-Ohnuma.

williams syndrome may hold clues to autism, other disorders

Visit msnbc.com for breaking news, world news, and news about the economy

MSNBC | Researchers have puzzled over that extreme friendliness for decades, pondering the causes and complicated traits that go with the syndrome that affects 1 in every 10,000 people, says Ursula Bellugi, a researcher at the Salk Institute in La Jolla, Calif., who has studied the disorder for a quarter-century.

They've come to believe that Williams syndrome, which is characterized by unique genetic markers and distinct behaviors, may actually hold the secrets to understanding other better-known disorders — including autism.

'Brink of a whole new world'
“We’re on the brink of a whole new world,” says Bellugi, 80, a professor and director of Salk’s Laboratory for Cognitive Neuroscience.

Now, thanks to a $5.5 million grant from the National Institute of Child Health and Human Development, Bellugi and team of prominent scientists are poised to use Williams syndrome to decode the ties between human genes and the way people act.

"We want to know: Are there links across the levels from the genes to behavior?" said Bellugi, who is leading a five-project program.

related to the microsychronization of body language hypothesis...,


Video - Paul Eckman talks about the genuine smile.

BBCNews | Researchers say people can spot whether a complete stranger has a certain "social gene" in just 20 seconds.

Two variants of the "oxytocin receptor gene" have been linked with social traits.

People judging the empathy of strangers - by studying the way they listened to people - predicted the genetic variant, a University of Toronto study showed.

The hormone oxytocin has a role in birth, production of milk and bonding between mother and baby.

It also seems to have a role in social skills and has variously been called the "love" or "cuddle" chemical.

Two variants of the oxytocin receptor gene - termed G and A - have been linked to social behaviour.

Studies have shown that people with two copies of G, compared with one of each or two of A, are at lower risk of autism and report higher levels of empathy, positive emotions and said they were more social.
Silent movie

Twenty three couples were filmed for the Proceedings of the National Academy of Sciences study. One described a moment of personal suffering while their partner listened.

Strangers then watched a 20 second silent recording of the exchange and scored the listener for their "prosocial traits", such as a caring nature or empathy.

GG people were found to be more prosocial than AG or AA people.

In the top 10 most trusted people, six were GG. In the 10 least trusted people, nine had at least one copy of A.

One of the researchers, Dr Aleksandr Kogan from the University of Toronto, said: "Our findings suggest even slight genetic variation may have tangible impact on people's behaviour, and that these behavioural differences are quickly noticed by others.

"Our study asked the question of whether these differences manifest themselves in behaviours that are quickly detectable by strangers, and it turns out they did."

Prof Sarina Rodrigues Saturn, from Oregon State University, said: "It was amazing to see how the data aligned so strongly by genotype.

"It makes sense that a gene crucial for social processing would yield these findings; other studies have shown that people are good at judging people at a distance and first impressions really make an impact." Fist tap Dale.

psychopaths have brain issues


Video - Paul Eckman talks about microexpressions in lie detection.

Newswise | Images of prisoners’ brains show important differences between those who are diagnosed as psychopaths and those who aren’t, according to a new study led by University of Wisconsin-Madison researchers.

The results could help explain the callous and impulsive anti-social behavior exhibited by some psychopaths.

The study showed that psychopaths have reduced connections between the ventromedial prefrontal cortex (vmPFC), the part of the brain responsible for sentiments such as empathy and guilt, and the amygdala, which mediates fear and anxiety. Two types of brain images were collected. Diffusion tensor images (DTI) showed reduced structural integrity in the white matter fibers connecting the two areas, while a second type of image that maps brain activity, a functional magnetic resonance image (fMRI), showed less coordinated activity between the vmPFC and the amygdala.

“This is the first study to show both structural and functional differences in the brains of people diagnosed with psychopathy,” says Michael Koenigs, assistant professor of psychiatry in the University of Wisconsin School of Medicine and Public Health. “Those two structures in the brain, which are believed to regulate emotion and social behavior, seem to not be communicating as they should.”

The study, which took place in a medium-security prison in Wisconsin, is a unique collaborative between three laboratories,

UW-Madison psychology Professor Joseph Newman has had a long term interest in studying and diagnosing those with psychopathy and has worked extensively in the Wisconsin corrections system. Dr. Kent Kiehl, of the University of New Mexico and the MIND Research Network, has a mobile MRI scanner that he brought to the prison and used to scan the prisoners’ brains. Koenigs and his graduate student, Julian Motzkin, led the analysis of the brain scans.

The study compared the brains of 20 prisoners with a diagnosis of psychopathy with the brains of 20 other prisoners who committed similar crimes but were not diagnosed with psychopathy.

“The combination of structural and functional abnormalities provides compelling evidence that the dysfunction observed in this crucial social-emotional circuitry is a stable characteristic of our psychopathic offenders,’’ Newman says. “I am optimistic that our ongoing collaborative work will shed more light on the source of this dysfunction and strategies for treating the problem.”

Newman notes that none of this work would be possible without the extraordinary support provided by the Wisconsin Department of Corrections, which he called “the silent partner in this research.” He says the DOC has demonstrated an unprecedented commitment to supporting research designed to facilitate the differential diagnosis and treatment of prisoners.

The study, published in the most recent Journal of Neuroscience, builds on earlier work by Newman and Koenigs that showed that psychopaths' decision-making mirrors that of patients with known damage to their ventromedial prefrontal cortex (vmPFC). This bolsters evidence that problems in that part of the brain are connected to the disorder.

“The decision-making study showed indirectly what this study shows directly – that there is a specific brain abnormality associated with criminal psychopathy,’’

Monday, November 28, 2011

schwaller de lubicz foretold the stygian depths of this evil...,


Video - Chris Busby on the abyssal reaches of the unspeakable.

ConflictandHealth | Background - Recent reports have drawn attention to increases in congenital birth anomalies and cancer in Fallujah Iraq blamed on teratogenic, genetic and genomic stress thought to result from depleted Uranium contamination following the battles in the town in 2004. Contamination of the parents of the children and of the environment by Uranium and other elements was investigated using Inductively Coupled Plasma Mass Spectrometry. Hair samples from 25 fathers and mothers of children diagnosed with congenital anomalies were analysed for Uranium and 51 other elements. Mean ages of the parents was: fathers 29.6 (SD 6.2); mothers: 27.3 (SD 6.8). For a sub-group of 6 women, long locks of hair were analysed for Uranium along the length of the hair to obtain information about historic exposures. Samples of soil and water were also analysed and Uranium isotope ratios determined.

Results
Levels of Ca, Mg, Co, Fe, Mn, V, Zn, Sr, Al, Ba, Bi, Ga, Pb, Hg, Pd and U (for mothers only) were significantly higher than published mean levels in an uncontaminated population in Sweden. In high excess were Ca, Mg, Sr, Al, Bi and Hg. Of these only Hg can be considered as a possible cause of congenital anomaly. Mean levels for Uranium were 0.16 ppm (SD: 0.11) range 0.02 to 0.4, higher in mothers (0.18 ppm SD 0.09) than fathers (0.11 ppm; SD 0.13). The highly unusual non-normal Fallujah distribution mean was significantly higher than literature results for a control population Southern Israel (0.062 ppm) and a non-parametric test (Mann Whitney-Wilcoxon) gave p = 0.016 for this comparison of the distribution. Mean levels in Fallujah were also much higher than the mean of measurements reported from Japan, Brazil, Sweden and Slovenia (0.04 ppm SD 0.02). Soil samples show low concentrations with a mean of 0.76 ppm (SD 0.42) and range 0.1-1.5 ppm; (N = 18). However it may be consistent with levels in drinking water (2.28 μgL-1) which had similar levels to water from wells (2.72 μgL-1) and the river Euphrates (2.24 μgL-1). In a separate study of a sub group of mothers with long hair to investigate historic Uranium excretion the results suggested that levels were much higher in the past. Uranium traces detected in the soil samples and the hair showed slightly enriched isotopic signatures for hair U238/U235 = (135.16 SD 1.45) compared with the natural ratio of 137.88. Soil sample Uranium isotope ratios were determined after extraction and concentration of the Uranium by ion exchange. Results showed statistically significant presence of enriched Uranium with a mean of 129 with SD5.9 (for this determination, the natural Uranium 95% CI was 132.1 < Ratio < 144.1).

Conclusions
Whilst caution must be exercised about ruling out other possibilities, because none of the elements found in excess are reported to cause congenital diseases and cancer except Uranium, these findings suggest the enriched Uranium exposure is either a primary cause or related to the cause of the congenital anomaly and cancer increases. Questions are thus raised about the characteristics and composition of weapons now being deployed in modern battlefields.

UH-UNH!!! that deadly radioactive waste y'alls now!!!

AsahiShimbun | During court proceedings concerning a radioactive golf course, Tokyo Electric Power Co. stunned lawyers by saying the utility was not responsible for decontamination because it no longer "owned" the radioactive substances.

“Radioactive materials (such as cesium) that scattered and fell from the Fukushima No. 1 nuclear plant belong to individual landowners there, not TEPCO,” the utility said.

That argument did not sit well with the companies that own and operate the Sunfield Nihonmatsu Golf Club, just 45 kilometers west of the stricken TEPCO plant in Fukushima Prefecture.

The Tokyo District Court also rejected that idea.

But in a ruling described as inconsistent by lawyers, the court essentially freed TEPCO from responsibility for decontamination work, saying the cleanup efforts should be done by the central and local governments.

Although the legal battle has moved to a higher court, observers said that if the district court’s decision stands and becomes a precedent, local governments' coffers could be drained.

The two golf companies in August filed for a provisional disposition with the Tokyo District Court, demanding TEPCO decontaminate the golf course and pay about 87 million yen ($1.13 million) for the upkeep costs over six months.

TEPCO's argument over ownership of the radioactive substances drew a sharp response from lawyers representing the Sunfield Nihonmatsu Golf Club and owner Sunfield.

“It is common sense that worthless substances such as radioactive fallout would not belong to landowners,” one of the lawyers said. “We are flabbergasted at TEPCO’s argument.”

koch bros got a "first call" from mf global...,


Video - Max Keiser on MF Global and a Koch Bros/MF Global hook-up

Sunday, November 27, 2011

frank miller and the rise of cryptofascist hollywood

Guardian | The film 300, directed by Zack Snyder, based on a Frank Miller graphic novel of the same name, is just what you would expect from the heavily freighted right-wing filmic propaganda of the post-9/11 period: the Greeks, from which our own putative democracies are descended, must fight to the death against a vast but incompetent army of Persians (those hordes of the Middle East), who are considered here unworthy of characterisation – in fact, every character in the film is unworthy of characterisation – and the noble Spartans (the Greeks in question) achieve heroism despite their glorious deaths on the field at Thermopylae, by virtue of the moral superiority of their belief system and their unmatched courage. Ruthless enemy! From the Middle East! Heroic, rugged individualists! A big, sentimental score! Lots and lots of blue-screen! Endless amounts of body parts spewing theatrical blood!

It's a barely watchable film, but what from Hollywood these days is not similarly unwatchable, when so many high-profile releases are based on a medium, the comic book, made expressly to engage the attentions of pre- and just post-pubescent boys. At least comic books themselves are so politically dim-witted, so pie-in-the-sky idealistic as to be hard to take seriously. But in the films of this era, the Marvel and DC era of Hollywood, even when the work is not self-evidently shilling for large corporations (with product placement) or militating for a libertarian and oligarchical political status quo (which makes a fine environment for large, multinational corporations), the work is doing nothing at all to oppose these things. Paying your $12.50, these days, is not unlike doing a few lines of cocaine and pretending you don't know about the headless bodies in Juarez.

With this in mind, an honest recognition of cinematic propaganda, we shouldn't be shocked by Frank Miller's comments about Occupy Wall Street. It is naive to be shocked by them. But let's evaluate the particulars of his remarks just the same. Miller tries to repel the OWS message ("Maybe, between bouts of self-pity and all the other tasty titbits of narcissism you've been served up in your sheltered, comfy little worlds, you've heard terms like al-Qaeda and Islamicism") by reminding us that we are at war. This despite the fact that OWS is focused primarily on income inequality, and thus mainly taken up with domestic politics, such that OWS doesn't really take a position on the "ruthless enemy" and doesn't need to. Miller's particular approach, the warmongering approach, is self-evidently reminiscent of the Bush/Cheney years, in which any domestic reversal was followed by an elevated level on the colour-coded risk-assessment wheel. But in this post-Iraq war moment – when the most aggravated conspiracies we seem to have in New York City involve, for example, a lone Dominican guy who advertises his hatred of the government on Facebook and who may have been entrapped by local police – our "ruthless enemy" just doesn't seem quite as numerous as Miller's Persian hordes.

Beyond Bush-Cheney fear-mongering, Miller's further complaint seems to be that people who camped outdoors in Zuccotti Park for two months were not terribly clean. (The Spartans were no doubt tidier in Thermopylae.) But if the crowd of 32,000 who turned up to march in NYC last Thursday – after the "pond scum" had been ejected from the park – are any indication, this hygiene issue is no longer a reliable talking point for Miller (or for Newt Gingrich, the rightwing posterboy of the late 80s who has now entered the race for the Republican presidential noimination). The 32,000 included some professional types, at least one retired police officer and lots of elderly people, many of whom had recently showered. Same thing at UC Davis, and at Berkeley. Those college kids usually have showers in their dorms.

Miller also accuses the OWS protesters of being too technologically savvy. For example, he accuses them of playing Lords of Warcraft. Now, I admit it, I know nothing of multiplayer online role-playing games, nor do I own an iPhone nor an iPad. Nevertheless, I maintain I am correct in imagining that what Miller actually means here is World of Warcraft. This superficial mistake (suggests what should be plain: that Miller wrote his jeremiad quickly, perhaps late at night, when a lack of restraint is often linked with the onset of unconsciousness. He didn't bother to reread it. He therefore overlooks at least one obvious point. Namely, no one is more likely to play World of Warcraft than the kind of adolescent boy who also thinks 300 is quality cinematic product.

Miller's hard-right, pro-military point of view is not only accounted for in his own work, but in the larger project of mainstream Hollywood cinema. American movies, in the main, often agree with Frank Miller, that endless war against a ruthless enemy is good, and military service is good, that killing makes you a man, that capitalism must prevail, that if you would just get a job (preferably a corporate job, for all honest work is corporate) you would quit complaining. American movies say these things, but they are more polite about it, lest they should offend. The kind of comic-book-oriented cinema that has afflicted Hollywood for 10 years now, since Spider-Man, has degraded the cinematic art, and has varnished over what was once a humanist form, so Hollywood can do little but repeat the platitudes of the 1%. And yet Hollywood tries still not to offend.

Does that make American cinema cryptofascist? Is "cryptofascist" a word that you can use in an essay like this? I keep trying to find a space somewhere between "propagandistic" and "cryptofascist" to describe my feelings about Miller's screed. But perhaps it's more accurate to say the following: whatever mainstream Hollywood cinema is now, Frank Miller is part of it. And Frank Miller has done Occupy Wall Street a service by reminding us that our allegedly democratic political system, which increases inequality and decreases class mobility, which is mostly interested in keeping the disenfranchised where they are, requires a mindless, propagandistic (or "cryptofascist") storytelling medium to distract its citizenry. We should be grateful for the reminder. And we might repay the favor by avoiding purchase of tickets to Miller's films.

surplus labor and the inevitability of the cull...,

NYTimes | AMERICA, like other modern countries, has always had some surplus workers — people ready to work but jobless for extended periods because the “job creators,” private and public, have been unable or unwilling to create sufficient jobs. When the number of surplus workers rose sharply, the country also had ways of reducing it.

However, the current jobless recovery, and the concurrent failure to create enough new jobs, is breeding a new and growing surplus pool. And some in this pool are in danger of becoming superfluous, likely never to work again.

The currently jobless and the so-called discouraged workers, who have given up looking for work, total about 15 percent of the work force, not including the invisible discouraged workers the government cannot even find to count.

In the old days — before Social Security, welfare and Medicaid — poverty-caused illnesses killed off or incapacitated some of the people who could not find jobs. Even earlier, some nations sold their surplus workers as slaves, while the European countries could send them to the colonies.

In addition, wars were once labor-intensive enterprises that absorbed the surplus temporarily, and sufficient numbers of those serving in the infantry and on warships were killed or seriously enough injured so that they could not add to the peacetime labor surplus.

The old ways of reducing surplus labor are, however, disappearing. Decades of medical and public health advances, as well as Medicare and Medicaid, have reduced the number of poverty-related deaths. The Iraq and Afghanistan wars have left many more service members injured than killed.

Over the past quarter-century, one very costly way of decreasing the surplus has been the imprisonment of people, mostly dark-skinned men, for actual and invented offenses. Felons are not often hired when they leave prison. Many, at least those who do not become recidivists, become surplus and then superfluous labor. As incarceration becomes less affordable for financially strapped states, inmates will reach surplus or superfluous status at a younger age.

Meanwhile, new ways of increasing surplus labor have appeared. One is the continued outsourcing of jobs to low-wage countries; the other is the continuing computerization and mechanization of manufacturing and of services not requiring hands-on human contact. Continuing increases in worker productivity add yet more to the surplus. So does the unwillingness of employers to even consider hiring people who have been unemployed for a long time.

When the jobless recovery ends and the economy is restored to good health, today’s surplus will be reduced. New technology and the products and services that accompany it will create new jobs. But unless the economy itself changes, eventually many of these innovations may be turned over to machines or the jobs may be sent to lower-wage economies.

In fact, if modern capitalism continues to eliminate as many jobs as it creates — or more jobs than it creates — future recoveries will not only add to the amount of surplus labor but will turn a growing proportion of workers into superfluous ones. Fist tap Nana.

the poor, the near poor, and you...,

NYTimes | What is it like to be poor? Thankfully, most Americans do not know, at least not firsthand. And times are tough for the middle class. But everyone needs to recognize a chilling reality: One in three Americans — 100 million people — is either poor or perilously close to it.

The Times’s Jason DeParle, Robert Gebeloff and Sabrina Tavernise reported recently on Census data showing that 49.1 million Americans are below the poverty line — in general, $24,343 for a family of four. An additional 51 million are in the next category, which they termed “near poor” — with incomes less than 50 percent above the poverty line.

As for all of that inspirational, up-by-their-bootstrap talk you hear on the Republican campaign trail, over half of the near poor in the new tally actually fell into that group from higher income levels as their resources were sapped by medical expenses, taxes, work-related costs and other unavoidable outlays.

The worst downturn since the Great Depression is only part of the problem. Before that, living standards were already being eroded by stagnating wages and tax and economic policies that favored the wealthy.

Conservative politicians and analysts are spouting their usual denial. Gov. Rick Perry and Representative Michele Bachmann have called for taxing the poor and near poor more heavily, on the false grounds that they have been getting a free ride. In fact, low-income workers do pay up, if not in federal income taxes, then in payroll taxes and state and local taxes.

Asked about the new census data, Robert Rector, an analyst at the conservative Heritage Foundation told The Times that the “emotionally charged terms ‘poor’ or ‘near poor’ clearly suggest to most people a level of material hardship that doesn’t exist.” Heritage has its own, very different ranking system, based on households’ “amenities.” According to that, the typical poor household has roughly 14 of 30 amenities. In other words, how hard can things be if you have a refrigerator, air-conditioner, coffee maker, cellphone, and other stuff?

The rankings ignore the fact that many of these are requisites of modern life and that things increasingly out of reach for the poor and near poor — education, health care, child care, housing and utilities — are the true determinants of a good, upwardly mobile life.

Elite Donor Level Conflicts Openly Waged On The National Political Stage

thehill  |   House Ways and Means Committee Chair Jason Smith (R-Mo.) has demanded the U.S. Chamber of Commerce answer questions about th...