Saturday, November 07, 2015

even Nature whistling past the graveyard and kicking the can down the road?


theconversation |  A sustainable Australia is possible – but we have to choose it. That’s the finding of a paper published today in Nature.

The paper is the result of a larger project to deliver the first Australian National Outlook report, more than two years in the making, which CSIRO is also releasing today.

As part of this analysis we looked at whether achieving sustainability will require a shift in our values, such as rejecting consumerism. We also looked at the contributions of choices made by individuals (such as consuming less water or energy) and of choices made collectively by society (such as policies to reduce greenhouse gas emissions).

We found that collective policy choices are crucial, and that Australia could make great progress to sustainability without any changes in social values.

Competing views 
Few topics generate more heat, and less light, than debates over economic growth and sustainability.
At one end of the spectrum, “technological optimists” suggest that the marvellous invisible hand will take care of everything, with market-driven improvements in technology automatically protecting essential natural resources while also improving living standards.

Unfortunately, there is no real evidence to back this, particularly in protecting unpriced natural resources such as ocean fisheries, or the services provided by a stable climate. Instead the evidence suggests we are already crossing important planetary boundaries.

Other the other end of the spectrum, people argue that achieving sustainability will require a rejection of economic growth, or a shift in values away from consumerism and towards a more ecologically attuned lifestyles. We refer to this group as advocating “communitarian limits”.

A third “institutional reform” approach argues that policy reform can reconcile economic and ecological goals – and is attacked from one side as anti-business alarmism, and from the other as indulging in pro-growth greenwash.

Friday, November 06, 2015

the kernal of the argument


WaPo |  It took years for the Internet to reach its first 100 computers. Today, 100 new ones join each second. And running deep within the silicon souls of most of these machines is the work of a technical wizard of remarkable power, a man described as a genius and a bully, a spiritual leader and a benevolent dictator.

Linus Torvalds — who in person could be mistaken for just another paunchy, middle-aged suburban dad who happens to have a curiously large collection of stuffed penguin dolls — looms over the future of computing much as Bill Gates and the late Steve Jobs loom over its past and present. For Linux, the operating system that Torvalds created and named after himself, has come to dominate the exploding online world, making it more popular overall than rivals from Microsoft and Apple.

But while Linux is fast, flexible and free, a growing chorus of critics warn that it has security weaknesses that could be fixed but haven’t been. Worse, as Internet security has surged as a subject of international concern, Torvalds has engaged in an occasionally profane standoff with experts on the subject. One group he has dismissed as “masturbating monkeys.” In blasting the security features produced by another group, he said in a public post, “Please just kill yourself now. The world would be a better place.”

There are legitimate philosophical differences amid the harsh words. Linux has thrived in part because of Torvalds’s relentless focus on performance and reliability, both of which could suffer if more security features were added. Linux works on almost any chip in the world and is famously stable as it manages the demands of many programs at once, allowing computers to hum along for years at a time without rebooting.

Yet even among Linux’s many fans there is growing unease about vulnerabilities in the operating system’s most basic, foundational elements — housed in something called “the kernel,” which Torvalds has personally managed since its creation in 1991. Even more so, there is concern that Torvalds’s approach to security is too passive, bordering on indifferent.

don't be stupid or degenerate - avoid chemsex with your digital butt plug and you'll be just fine...,


gizmodo |  Security researchers have come across a new kind of Android malware, which purports to be a well-known app but then exposes your phone to root attacks—and is virtually impossible to remove.

The new malware has been found in software available on third-party app stores. The apps in question use code from official software that you can download from Google Play like Facebook and Twitter, reports Ars Technica, so they initially seem innocuous and even provide the exact same functionality.

But in fact they’re injected with malicious code, which allows them to gain root access to the OS. In turn, a series of exploits are installed on the device as system applications, which makes them incredibly hard—for most people, impossible—to remove. Fist tap Big Don.

android is a linux fork


wikipedia |  Android is a mobile operating system (OS) currently developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. Android's user interface is based on direct manipulation, using touch gestures that loosely correspond to real-world actions, such as swiping, tapping and pinching, to manipulate on-screen objects, along with a virtual keyboard for text input. In addition to touchscreen devices, Google has further developed Android TV for televisions, Android Auto for cars, and Android Wear for wrist watches, each with a specialized user interface. Variants of Android are also used on notebooks, game consoles, digital cameras, and other electronics. As of 2015, Android has the largest installed base of all operating systems.[11] It is the second most commonly used mobile operating system in the United States, while iOS is the first.[12]

Initially developed by Android, Inc., which Google bought in 2005,[13] Android was unveiled in 2007, along with the founding of the Open Handset Alliance – a consortium of hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices.[14] As of July 2013, the Google Play store has had over one million Android applications ("apps") published, and over 50 billion applications downloaded.[15] An April–May 2013 survey of mobile application developers found that 71% of developers create applications for Android,[16] and a 2015 survey found that 40% of full-time professional developers see Android as their priority target platform, which is comparable to Apple's iOS on 37% with both platforms far above others.[17] At Google I/O 2014, the company revealed that there were over one billion active monthly Android users, up from 538 million in June 2013.[18]

Android's source code is released by Google under open source licenses, although most Android devices ultimately ship with a combination of open source and proprietary software, including proprietary software required for accessing Google services.[3] Android is popular with technology companies that require a ready-made, low-cost and customizable operating system for high-tech devices.[19] Its open nature has encouraged a large community of developers and enthusiasts to use the open-source code as a foundation for community-driven projects, which add new features for advanced users[20] or bring Android to devices originally shipped with other operating systems. At the same time, as Android has no centralised update system most Android devices fail to receive security updates: research in 2015 concluded that almost 90% of Android phones in use had known but unpatched security vulnerabilities due to lack of updates and support.[21][22] The success of Android has made it a target for patent litigation as part of the so-called "smartphone wars" between technology companies.[23

Thursday, November 05, 2015

broad spectrum bioweapons exploiting narrowband degeneracy as delivery system...,


independent |  The rise of 'chemsex' - sex under the influence of illegal drugs - is putting people at risk of HIV and other STIs, health experts have warned.

People who are taking GHB, GBL and crystal meth to enhance sexual pleasure and reduce inhibitions are jeopardising their both sexual and mental health, a study found.

Its growing popularity, particularly among gay men, has led doctors to warn that HIV rates and sexually-transmitted diseases cases are rising rapidly. 

Sex during the illegal drug-fuelled sessions is often unprotected - with those having chemsex reporting an average five sexual partners per session, according to the British Medical Journal. 

'These drugs are often used in combination to facilitate sexual sessions lasting several hours or days with multiple sexual partners,' it reported.

'Mephedrone and crystal meth are physiological stimulants, increasing heart rate and blood pressure, as well as triggering euphoria and sexual arousal.

'GHB (and its precursor GBL) is a powerful psychological disinhibitor and also a mild anaesthetic.'

The experts said the increase in chemsex was also putting people at risk of serious mental health problems caused by drug dependencies.>The authors of the report said there were many barriers for people who want to get help, including the shame and stigma often associated with drug use and ignorance of available drug services.

Some services are now developing specific chemsex and 'party drug' clinics, with specialist mental health support and help for withdrawing from the drugs.

But they warned that users often describe 'losing days' - not sleeping or eating for up to 72 hours - which 'may harm their general health'.

original wudan at war with the west - on an undeclared front - don zaluchi style...,


miamiherald |  The drug deaths of the three young men this year shared a common thread, one that ties them to scores of other overdose, suicide, accident and even murder victims in Miami-Dade and Broward counties: The synthetic substances medical examiners found in their bodies most likely arrived though the China Pipeline, which delivers illegal drugs, sold as bulk research chemicals on the Internet, to stateside dealers through the mail.

Authorities are scrambling to shut down the pipeline but they acknowledge that it remains the primary source of an array of dangerous so-called designer drugs flowing into South Florida. The grim result: a rising number of addicts, emergency room visits and deaths — particularly related to newer, more potent synthetics like infamous flakka and the less known —but even more lethal —fentanyl.

“This is Breaking Bad gone wild,” said George Hime, assistant director of the Miami-Dade County Medical Examiner’s toxicology lab. “There is no quality control. They don’t even know what they’ve created. Is it something that can cause pleasure for a short period of time? Yes. But it could also kill you.”

Flakka has run rampant among the homeless and in poor corners of Broward, offering a cheap and powerful rush aptly described as “$5 insanity.” Flakka, street slang for a chemical called alpha-PVP, induced one man up the coast in Brevard County to strip, proclaim himself the Norse god Thor and try to have sex with a tree. Two other men, suffering a serious flakka-fueled lapse in judgment, tried to break into Fort Lauderdale police headquarters.

Fentanyl users haven’t produced such attention-grabbing crazy rages, but the drug has quietly proven even deadlier in South Florida, according to a Miami Herald review of medical examiner records in both Miami-Dade and Broward counties. A fast-acting painkiller 50 times more potent than heroin, it has been used as a surgical analgesic for decades.

But investigators believe that underground labs in China fueling the synthetics pipeline have concocted illegal fentanyl as well as chemically tweaked “analogs” that are typically sold as heroin or mixed with it.

“Fentanyl and its analogs are often laced in heroin and are extremely dangerous, more so than alpha-PVP,” said Diane Boland, director of the Miami-Dade Medical Examiner’s toxicology lab. “People are dying at an alarming rate, especially those who believe they are using heroin when it’s in fact fentanyl. A small dose is enough to cause death.”

Read more here: http://www.miamiherald.com/news/local/crime/article36723141.html#storylink=cpy

Wednesday, November 04, 2015

if I'm not large and in-charge, then phuggit, I'm out!!!


theatlantic |  Since 1998, people all over the world have been living healthier and living longer. But middle-aged, white non-Hispanics in the United States have been getting sicker and dying in greater numbers. The trend is being driven primarily by people with a high-school degree or less.

That's the sobering takeaway from a paper in the Proceedings of the National Academy of Sciences published this week.

The study authors sum it up:
Between 1978 to 1998, the mortality rate for U.S. whites aged 45 to 54 fell by 2 percent per year on average, which matched the average rate of decline in the six countries shown, and the average over all other industrialized countries. After 1998, other rich countries’ mortality rates continued to decline by 2 percent a year. In contrast, U.S. white non-Hispanic mortality rose by half a percent a year. No other rich country saw a similar turnaround.
That means “half a million people are dead who should not be dead,” Angus Deaton, the 2015 Nobel laureate in economics and co-author of the paper, told The Washington Post. “About 40 times the Ebola stats. You’re getting up there with HIV-AIDS.”

The reasons for the increased death rate are not the usual things that kill Americans, like diabetes and heart disease. Rather, it’s suicide, alcohol and drug poisonings, and alcohol-related liver disease.
The least-educated are worst off: All-cause mortality among middle-aged Americans with a high-school degree or less increased by 134 deaths per 100,000 people between 1999 and 2013, but there was little change in mortality for people with some college. The death rate for the college-educated fell slightly.

g.i.joe - say it isn't so...?


chicagotribune |  Two months and three days after Fox Lake police Lt. Charles Joseph Gliniewicz's death, authorities announced Wednesday they believe the veteran officer took his own life in a carefully staged suicide designed to cover up extensive criminal acts. 

Investigators say they believe two others were involved in criminal activity and that investigation remains ongoing. 

Though the announcement answers a key question about his death, authorities continue to look into related matters. Lake County State’s Attorney Mike Nerheim said the results of the investigation have been turned over to his office, as well as to the FBI, for investigation and potential prosecution of alleged crimes that are not related to his shooting but were uncovered during the investigation into it. Nerheim declined to go into further detail.

Gliniewicz was under increasing levels of stress from scrutiny of his management of the Fox Lake Police Explorers program, George Filenko, commander of the Lake County Major Crimes Task Force, said Wednesday.

Gliniewicz had been stealing and laundering money from the Explorers post, spending the money on travel, mortgage payments, adult websites and unaccounted cash withdrawals, Filenko said.

The announcement that Gliniewicz’s death was a suicide marks the completion of a 180-degree turn for an investigation that began with hundreds of officers, as well as dogs and helicopters, searching for suspects who apparently never existed. In the weeks that followed, Lake County, Illinois authorities downplayed the possibility that Gliniewicz had committed suicide while they followed leads and reviewed forensic test results.

there but for the grace of god: pretending to be pro-life but really just pro-______________?


NYTimes |  When the nation’s long-running war against drugs was defined by the crack epidemic and based in poor, predominantly black urban areas, the public response was defined by zero tolerance and stiff prison sentences. But today’s heroin crisis is different. While heroin use has climbed among all demographic groups, it has skyrocketed among whites; nearly 90 percent of those who tried heroin for the first time in the last decade were white.

And the growing army of families of those lost to heroin — many of them in the suburbs and small towns — are now using their influence, anger and grief to cushion the country’s approach to drugs, from altering the language around addiction to prodding government to treat it not as a crime, but as a disease.

“Because the demographic of people affected are more white, more middle class, these are parents who are empowered,” said Michael Botticelli, director of the White House Office of National Drug Control Policy, better known as the nation’s drug czar. “They know how to call a legislator, they know how to get angry with their insurance company, they know how to advocate. They have been so instrumental in changing the conversation.”

Mr. Botticelli, a recovering alcoholic who has been sober for 26 years, speaks to some of these parents regularly.

Their efforts also include lobbying statehouses, holding rallies and starting nonprofit organizations, making these mothers and fathers part of a growing backlash against the harsh tactics of traditional drug enforcement. These days, in rare bipartisan or even nonpartisan agreement, punishment is out and compassion is in.

The presidential candidates of both parties are now talking about the drug epidemic, with Hillary Rodham Clinton hosting forums on the issue as Jeb Bush and Carly Fiorina tell their own stories of loss while calling for more care and empathy.

one minute a high and mighty overseer, the next minute a ________________?


HuffPo |  Columbia man Sean Groubert, 32, made headlines in September 2014 when he shot an unarmed black man at a gas station who was reaching for his driver's license after the state trooper ordered him to. Groubert fired three times, striking Levar Edward Jones once in the hip.

"I was just getting my license," Jones says in dash cam footage after being shot.  "Sir, why was I shot? All I did was reach for my license. I'm coming from work."

Groubert was ultimately fired from the department and charged with assault and battery. In February, Jones received a $285,000 settlement.

Court papers released Monday show that on Oct. 18, Groubert and his wife, Morgan, were arrested for shoplifting from a Columbia Walmart, according to WYFF4. Groubert, who now works as a truck driver, was out on bond.

"Please keep me out of jail," the former cop told a judge Monday. Prosecutors contend that the Grouberts switched price tags on food to change the total price of $135 to just $30, according to Live 5 News. 

Groubert faces up to 20 years in prison if convicted for his felony charges stemming from the shooting. A trial date for those charges has not yet been set.

Tuesday, November 03, 2015

kunstler mops the floor with the cathedral...,


kunstler |  At a moment in history when the US is beset by epochal problems of economy, energy, ecology, and foreign relations, campus life is preoccupied with handwringing over the hurt feelings of every imaginable ethnic and sexual group and just as earnestly with the suppression of ideological trespassers who don’t go along with the program of exorcisms. A comprehensive history of this unfortunate campaign has yet to be written, but by the time it is, higher education may lie in ruins. It is already burdened and beset by the unintended consequences of the financial racketeering so pervasive across American life these days. But in promoting the official suppression of ideas, it is really committing intellectual suicide, disgracing its mission to civilized life.

I had my own brush with this evil empire last week when I gave a talk at Boston College, a general briefing on the progress of long emergency. The audience was sparse. It was pouring rain. The World Series was on TV. People are not so interested in these issues since the Federal Reserve saved the world with free money, and what I had to say did not include anything on race, gender, and white privilege.

However, after the talk, I went out for dinner with four faculty members and one friend-of-faculty. Three of them were English profs. One was an urban planner and one was an ecology prof. All of the English profs were specialists in race, gender, and privilege. Imagine that. You’d think that the college was a little overloaded there, but it speaks for the current academic obsessive-compulsive neurosis with these matters. Anyway, on the way to restaurant I was chatting in the car with one of the English profs about a particular angle on race, since this was his focus and he tended to view things through that lens. The discussion continued at the dinner table and this is what ensued on the Internet (an email to me the next morning):

On Oct 29, 2015, at 4:37 PM, Rhonda Frederick wrote:
This is what I posted on my social medias, am sharing with you and your agent.
Yesterday, novelist/journalist James Howard Kunstler was invited to give a talk at BC (see his bio at http://www.bc.edu/offices/lowellhs/calendar.html#1028).

At the post-talk dinner, he said “the great problem facing African Americans is that they aren’t taught proper English, and that … academics are too preoccupied with privilege and political correctness to admit this obvious fact.” No black people (I presume he used “African American” when he meant “black”) were present at the dinner. I was not at the dinner, but two of my friends/colleagues were; I trust their recollections implicitly. Whether Kunstler was using stereotypes about black people to be provocative, or whether he believed the ignorance he spouted, my response is the same: I cannot allow this kind of ignorance into my space and I am not the one to cast what he said as a “teachable moment.” I do think there should be a BC response to this, as the university paid his honorarium and for his meal. Here’s some contact information for anyone interested in sharing your thoughts on how BC should spend its money:

Lowell Humanities Series at Boston College (http://www.bc.edu/offices/lowellhs/about.html)

Monday, November 02, 2015

vice-chair of the dnc wants to know "what is the policy/what is the mission?"


civilbeat |  Rep. Tulsi Gabbard, a frequent critic of the Obama administration’s military policies, was scheduled to appear as the lead guest on HBO’s “Real Time With Bill Maher” live on Friday at 4 p.m. (10 p.m. EST). But her recent comments left little doubt as to how she’d react to the deployment: Only days ago, she told CNN’s Wolf Blitzer there is “no reason for (U.S. military personnel) to go and to be deployed into these situations” in Syria.

Military actions being taken against the Islamic State now are being pursued under the 2001 and 2002 AUMF, which authorized use of military force against Iraq. Their use in pursuing broader goals in the Middle East goes back to the George W. Bush administration. Obama submitted a proposed new AUMF in February, but under House Speaker John Boehner, Congress failed to take up the authorization.

Up to 50 Special Operations advisers, who will not take part in direct combat, are expected to comprise the new deployment, which the White House described as “an intensification of a strategy that the president announced more than a year ago.”

theatrics but no hard questions for granny goodness...,


RT |  The one question that has not been answered during Hillary Clinton’s grilling before a US Congress committee over the deadly 2012 attack in Benghazi, was “What was the policy that was being carried out that led to the deaths of these four men?” 

The attack on the US consulate in Libya resulted in the deaths of four US citizens on September 11, 2012.

The four who were found dead in the aftermath of the Benghazi chaos of that night were the US Ambassador to Libya J. Christopher Stevens; Sean Smith who, significantly, was known as “Vile Rat” in his online gaming community; and two former US Navy SEALs and Central Intelligence Agency contractors (CIA), Glen Doherty and Tyrone Woods.

These four public servants answered the call to serve the policy of the US government. Their deaths in the service of their country are truly tragic. However, the question that has not been answered in all of the hoopla over the proceedings of the Select Committee are: “What was the policy that was being carried out that led to the deaths of these four men?” It is the avoidance of even asking that question in public, let alone answering it, that is the proverbial elephant in the room.

The top Democrat on the Select Committee is Representative Elijah Cummings from Maryland, who in a moment of selective outrage, exclaimed to rousing applause from the audience, “We’re better than that! We are so much better! We’re a better country! We’re better than using taxpayer dollars to try to destroy a campaign! That’s not what America is all about!” But, apparently, using taxpayer dollars to destroy one country and literally wipe another country off the map — that’s OK, I guess. Because, at the time of last week’s hearing, U.S. Embassy in Libya personnel weren’t even in Libya! They’re operating from Malta, after President Obama’s policy to destroy Libya was so effective. How much questioning about that took place in the eleven-hour hearing?

16 times the hon.bro.preznit said "no boots on the ground in syria"


usatoday |  Since 2013, President Obama has repeatedly vowed that there would be no "boots on the ground" in Syria.

But White House press secretary Josh Earnest said the president's decision Friday to send up to 50 special forces troops to Syria doesn't change the fundamental strategy: "This is an important thing for the American people to understand. These forces do not have a combat mission."

Earnest said the promises of "no boots on the ground" first came in the context of removing Syrian President Bashar Assad because of his use of chemical weapons. Since then, Syria has become a haven for Islamic State fighters.

Here's a recap of Obama's no-boots pledge:

Sunday, November 01, 2015

basil sydney portrays BD and perfectly depicts why your species is doomed...,


wikipedia |  Michael Cannon (Richard Burton) returns to London after the Second World War and places advertisements in the personal column of various newspapers (The Daily Telegraph distributed miniaturised copies of the newspaper showing the 'ad' at U.K. cinemas after each performance of the film), in which "Biscuit" tries to get in touch with "Sea Wife". Eventually Cannon, who is Biscuit, receives a letter summoning him to the Ely Retreat and Mental Home. There he meets an ill man nicknamed "Bulldog" (Basil Sydney). Bulldog tries to persuade Biscuit to give up the search. A flashback reveals the backstory.

In 1942, people crowd aboard a ship, the San Felix, to get away before Singapore falls to the Japanese Army. Biscuit is brusquely shouldered aside by a determined older man (later nicknamed Bulldog) (Basil Sydney), who insists the ship's black purser ("Number Four") (Cy Grant) evict the people from the cabin he has reserved. However, when he sees that it is occupied by children and nuns, he reluctantly relents. The nun with her back to him is the beautiful young Sister Therese ("Sea Wife") (Joan Collins). Later, the San Felix is torpedoed by a submarine. Biscuit, Sea Wife, Bulldog and Number Four manage to get to a small liferaft. Only Number Four knows that Sea Wife is a nun; she asks him to keep her secret.

It soon becomes evident that Bulldog is a racist who does not trust Number Four. Later, they encounter a Japanese submarine whose captain at first refuses to give aid, but gives them food and water when Number Four talks to him in Japanese, though what he said is kept a secret between him and Sea Wife.

After nearly being swamped by a vessel that passes by so quickly they do not have a chance to signal for help, they eventually make it to a deserted island. When Number Four finds a machete, they build a raft. Number Four insists on keeping the machete to himself, which heightens Bulldog's distrust. Meanwhile, Biscuit falls in love with Sea Wife; she is tempted, but rejects his romantic advances without telling him why.

Finally, they are ready to set sail. Bulldog tricks Number Four into going in search of his missing machete, then casts off without him. When Biscuit tries to stop him, Bulldog knocks him unconscious with an oar. Number Four tries to swim to the raft, but is killed by a shark.

The survivors are eventually picked up by a ship, and Biscuit is taken to a hospital for a long recovery. By the time he is discharged, Sea Wife has gone.

Thus, he searches for her via the newspaper advertisements. Bulldog tells Biscuit that Sea Wife died on the rescue ship. Heartbroken, Biscuit leaves the grounds and walks past two nuns without noticing that Sea Wife is one of them. She watches him go in silence.

the heart wants what it wants...,


thisamericanlife |  When Jesse first started getting letters from Pamala, he couldn’t believe his luck. He'd been waiting all his life to fall in love—and then he started getting these letters from the perfect woman. Vulnerable. In need of protection. Classic beauty. He was totally devoted. They corresponded for years. And when something happens that really should change how he feels about her— he just can’t give it up.

to get to the creamy sheeple nougat, you have to get through us....,


Saturday, October 31, 2015

technically and infrastructurally easy to fix, politically - next to impossible...,


WaPo |  To begin, a conclusion: The Internet, whatever its many virtues, is also a weapon of mass destruction.

We have been distracted from focusing on that potential by a succession of high-profile cyberattacks, including China vacuuming up more than 22 million federal employee records, North Korea’s humiliating shot across the bow of Sony Pictures Entertainment and a barrage of cyberlarceny directed at U.S. banks and businesses, much of which has originated in Russia and Ukraine. Each of these targets was protected by firewalls and other defenses. But the Internet is inherently vulnerable. It was never intended to keep intruders out. It was designed to facilitate the unimpeded exchange of information, giving attackers a built-in advantage over defenders. If that constitutes an ongoing threat to commerce (and it does), it also represents a potentially catastrophic threat to our national security — and not just in the area of intelligence-gathering. The United States’ physical infrastructure is vulnerable. Our electric power grids, in particular, are highly susceptible to cyberattacks, the consequences of which would be both devastating and long-lasting.

Deregulation of the electric power industry has resulted in a network of more than 3,000 companies, some of which are well protected, many of which are not, but all of which are interconnected. Hacking into the most vulnerable could lead to a domino-like penetration of even the most secure companies. The automated programs (known as supervisory control and data acquisition systems) that control the supply and demand of electricity nationwide are, for the most part, standardized and therefore highly accessible. Multiple sources in the intelligence community and the military tell me that Russia and China have already embedded cyber-capabilities within our electrical systems that would enable them to take down all or large parts of a grid. Iran’s capabilities are believed to be close behind. North Korea is working toward such a goal. George Cotter, a former chief scientist at the National Security Agency, told me that he fears groups such as the Islamic State may soon be able to hire capable experts and assemble the necessary equipment, which is available on the open market.

EU narrowly rejects predatory militarist digital proctology


HuffPo |  In June of this year, the White House rejected the idea of dropping charges filed against Snowden under the Espionage Act. The former CIA contractor fled the U.S. in 2013 and resides in Moscow.

“The fact is that Mr Snowden committed very serious crimes, and the U.S. government and the Department of Justice believe that he should face them,” Obama administration spokesman Josh Earnest told the Guardian at the time. “That’s why we believe that Mr Snowden should return to the United States, where he will face due process and have the opportunity to make that case in a court of law.”

Snowden faces the possibility of extradition to the U.S. should he enter any of the EU’s 28 member countries. At the time of his departure, Snowden applied for -- and was denied -- asylum in Austria, Finland, France, Germany, Ireland, Italy, the Netherlands, Poland and Spain. The FBI pursued him relentlessly, even notifying Scandinavian countries in advance of their intent to extradite him should he leave Moscow via a connecting flight through any of their countries.

The new EU proposition specifically asks countries to "drop any criminal charges against Edward Snowden, grant him protection and consequently prevent extradition or rendition by third parties, in recognition of his status as whistle-blower and international human rights defender." 

Snowden called the vote a "game-changer" on Twitter, adding, "This is not a blow against the US Government, but an open hand extended by friends. It is a chance to move forward."

buy high, sell low - the definition of stupid


oilprice |  That’s what Congress is considering as it eyes selling oil from the U.S. Strategic Petroleum Reserve (SPR) to pay for certain projects in its latest spending plan.

The last time the U.S. bought oil for the SPR in 2000 through 2005, oil prices were rising (Figure 1). Now Congress wants to sell oil when prices are the lowest in a decade and continuing to fall.

Friday, October 30, 2015

meanwhile, quietly watching at the other end of your holomorphically encrypted butt plug android...,


bloomberg |  When Google-parent Alphabet Inc. reported eye-popping earnings last week its executives couldn’t stop talking up the company’s investments in machine learning and artificial intelligence.

For any other company that would be a wonky distraction from its core business. At Google, the two are intertwined. Artificial intelligence sits at the extreme end of machine learning, which sees people create software that can learn about the world. Google has been one of the biggest corporate sponsors of AI, and has invested heavily in it for videos, speech, translation and, recently, search.
For the past few months, a “very large fraction” of the millions of queries a second that people type into the company’s search engine have been interpreted by an artificial intelligence system, nicknamed RankBrain, said Greg Corrado, a senior research scientist with the company, outlining for the first time the emerging role of AI in search.
RankBrain uses artificial intelligence to embed vast amounts of written language into mathematical entities -- called vectors -- that the computer can understand. If RankBrain sees a word or phrase it isn’t familiar with, the machine can make a guess as to what words or phrases might have a similar meaning and filter the result accordingly, making it more effective at handling never-before-seen search queries.
Unique Questions
The system helps Mountain View, California-based Google deal with the 15 percent of queries a day it gets which its systems have never seen before, he said. For example, it’s adept at dealing with ambiguous queries, like, “What’s the title of the consumer at the highest level of a food chain?” And RankBrain’s usage of AI means it works differently than the other technologies in the search engine.
“The other signals, they’re all based on discoveries and insights that people in information retrieval have had, but there’s no learning,” Corrado said.
Keeping an edge in search is critical to Google, and making its systems smarter and better able to deal with ambiguous queries is one of the ways it can keep a grip on time-starved users, who are now mostly searching using their mobile devices. “If you say Google people think of search,” Corrado said.

securing the hegemonic aether for you peasants against you peasants others...,


So let's start with fully homomorphic encryption. It's a particular type of encryption scheme, different from what you have seen so far, which lets you encrypt data-- so that is the first arrow pointing from the user to the cloud. She encrypts her data and stores it in the cloud. And then the magic sauce is a procedure that lets the cloud take this encrypted data and do computations on the underlying data. Remember, the cloud doesn't see what's inside, and yet, magically, it can do computations on it. And what it gets at the end of it is the encrypted result of this computation. Once the cloud gets the encrypted result, it sends the encrypted result back to the user. Now the user has the key. She can open the box, decrypt, and what does she learn? She learns the result of the computation. We let the user use the cloud for everything that she wanted to do, except now she also has privacy. So the bottom line of fully homomorphic encryption is that it lets you do anything that you want to do on plain text data you can see, it lets you do on encrypted data which you cannot see. 

What kind of security do I want from homomorphic encryption? The standard notion of security, the golden standard these days in cryptography, is the notion of indistinguishablility of ciphertexts, or semantic security. This was a notion developed by Shafi Goldwasser and Silvio Micali back in the '80s. And what that says is that, number one, encryption has to be probabilistic. In other words, if you encrypt a message twice, you should get completely different ciphertexts. Encryption injects randomness into the process, and the ciphertext looks different every time you encrypt it. Now, what that means is that if you see a stream of ciphertexts passing by, you won't even know if there are any repeats in this ciphertext. It doesn't let you figure that out. This is a very, very strong notion of security. Again, just to be clear, indistinguishability of ciphertexts says that you, as an adversary, can pick two messages. You pick. It's your choice. They have to have the same length, because from the ciphertext, you can tell what the length of the message is. So I'm not trying to hide the length information. So you pick two messages, same length. Send it to me. I, as the challenger for you, will pick a random one of the two messages and encrypt them using this probabilistic encryption, and send it back to you. Your job is to figure out which message I encrypted. If you manage to figure this out, you've won. So I say that an encryption system is secure, semantically secure, or indistinguishably secure, if there is no way that you can win in this game. So that is the notion of security I need from encryption. That is the notion of security that I need from fully homomorphic encryption as well. Now that we know what homomorphic encryption is, and what kind of security notion you want it to satisfy, let's take a step towards trying to see how we can achieve it. 

So what is homomorphic encryption? Again, the new magic sauce is a way to take encryptions of plaintexts-- data-- together with the function that you're interested in computing, and somehow coming up with an encryption of f of this data, the function applied on this data. So before we even start talking about how to do this, we have to figure out, what is this function? How do I represent this function? Is it a C program? Is it a Java program? Is it-- what is it? Is it a hardware circuit? How do we represent these functions? Well, for me today, and in all the literature on homomorphic encryption and, in fact, secure multiparty computation, the standard way to represent functions, computations, is through a circuit. So what's a circuit? You have two types of gates here, addition gates and multiplication gates. Now, I can define this over any field. So if I define it over a field of size 2, these are basically XOR and AND gates. But I could do something more general if I wanted. So how is the circuit defined? You basically put together XOR gates, addition gates, and multiplication gates, or AND gates, in this form of a tree or a graph. And you feed the circuit inputs that comes from the top, and every time the circuit computes either the addition or the multiplication of the bits that are fed into it, and that keeps going. So this is a model of computation, and that is a model I am going to work with. When I say function, I mean a circuit computing the function. 

Now, you might say what happens if I want a computer program or extra data? Turns out that I can convert a program into a circuit, as long as I know its running time. So if you don't have infinite loops in your program, you can undraw the program into a circuit, and that's what I will work with. Now, there is a separate line of research, very interesting work, which deals with how to compute on programs directly without undrawing them and turning them into circuits. Once you've fixed your model of computation, once you have circuits, you think about it, and you realize that if you want to compute a circuit on encrypted inputs-- encrypted bits, here, let's say-- all you have to do is to add encrypted bits and multiply encrypted bits. In other the words, you want an encryption system where given encryption of x1 and encryption of x2, two bits or two numbers, x1 and x2, you should be able to turn it into an encryption of x1 plus x2, as well as an encryption of x1 times x2. If you can do this, you can go through the circuit step by step. Every time you will have an encryption of the wire off the circuit and you will keep going. You will get the encrypted result. That's what we're going to do today.

splendid irony calling the digital catheter android


NYTimes |  For years, Google, now known as Alphabet, has supported two operating systems on two very different tracks: Android and Chrome. But now the company is nodding in the direction of Android.

Google is working toward allowing its low-cost Chromebook computing devices to work on the popular Android operating system. The work will take place over the next year, according to a person with knowledge of the matter. Google is not indicating it plans to stop development of Chrome OS, but making Android work on Chromebooks opens the door to one of the few products that Chrome OS, the lesser-known operating system, had to itself.

Chrome OS should not be confused with Google’s popular Chrome web browser.

News of the shift was first reported earlier Thursday by The Wall Street Journal.

The first Android operating system for mobile devices was introduced about seven years ago as a direct competitor to Apple’s iOS mobile operating system. Since then, it has become the most widely used operating system in the world. Its development was led by an executive named Andy Rubin, who went on to lead much of the company’s robotics efforts before leaving Google last year.

android security architecture


It is instructive to look at Android as a case study of mobile phone security for two reasons. First, it's  a much more principled design and approach to security than either the web or desktop application contexts.

Web browsers have evolved incrementally over many years to incorporate more and more security checks without as clean a story for how security should work and how isolation should be done. Looking at Android allows us to understand how you go about designing a new clean slate security architecture from scratch if needed. To understand what security problems we have to contend with, let's understand what are the security goals you might have in mind, or what things you might worry about in the context of applications running on a user's mobile phone. Simply stated, we are working with a some data that the user has, as well some resources-- things like the user's camera, GPS
device, microphone, and so on, and, a physical human user.

Then, we have the network interacting with the device. Some considerations for this interaction include ensuring that when two applications interact, they cannot arbitrarily tamper with each other's data, and processes, and execution.  At the same time, we want to allow applications to interact with one another. For example, if you get an email attachment in your email program, you would like to open it up with a text editor, or a PDF viewer, or an image viewer. So we need some sort of protected sharing between applications, but isolation to make sure that they're still secure in the presence of other applications.

Next, we might worry about access between applications and shared data that the user wants to keep private, perhaps, or untampered with on their phone. So we need to make sure that when applications access the data on the user's device, this is somehow mediated and done according to whatever policy the user is OK with. A similar consideration applies to applications accessing the phone's resources.

Now this is not necessarily confidential data that the user has stored on the phone, but it might, nonetheless, be undesirable behavior from the phone user perspective. For example, if the phones turn on the GPS device and start tracking the user, or running the device out of battery, or these might cost the user money if the application starts sending SMS messages, or using a lot of data on the user's mobile phone plan. These are some of the considerations that go into isolating things within the phone. There are of course other sets of considerations that you have to worry about when dealing with the outside world-- outside of the phone, but that's Sith bidnis and not for slovenly peasant consideration.

Now in the case of Android, the platform itself has relatively little to say about protecting the interaction between the phone and the network. One of the few exceptions is the application installation update mechanism. Here, the mobile phone platform has to make sure that when your phone downloads a new version of an app, it comes from the right application developer and not from some man in the middle that's injecting a malicious copy of the application into your phone. Now, in the case of actual interactions between applications and the network, such as an application server running somewhere in the Cloud, the Android platform doesn't provide much in terms of primitives or mechanisms to help applications secure that interaction. The peasants applications are on their own in terms of protecting these communication.

The final interaction we might want to consider in terms of security on a mobile phone is the interaction between the human the user and the phone in their hands. Here, there are two qualitative kinds of problems you might worry about. One, is that someone might steal your phone and try to get at your information at their leisure. The typical defense against this is asking the user, when they're interacting with the phone, to enter some kind of a PIN or a password, to unlock a phone to have the legitimate user be able to identify themselves. There are many techniques you might use here to make sure that this password or PIN is strongly enforced, such as disk encryption of all the contents on the phone itself.

We can talk about doing disk encryption as a separate matter.

The final consideration of interactions between the user and the phone comes from protecting the phone's proprietary internal states from a potentially curious or malicious user. This shows up in the case of DRM, or digital rights management, concerns, or paid applications. So, for example, if a user buys some application in the Android Play Store or in Apple's equivalent app store, the phone platform might want to make sure the user can't take the phone apart and get the application out and give it to all of their friends for free. This is really more Sith bidnis and outside the scope of what you peasants need concern yourself with your beloved little digital cather units.

We will focus exclusively on the interactions that take place within the phone-- so isolating applications from each other, controlling how our applications can get at the data, and the different resources. other aspects of the Android security problem will be addressed as these come to mind over time. Next time, we camy consider and briefly explore the threat model in which your digital catheter is embedded. Careful, in-depth consideration of this topic is bound to disclose a very great deal concerning our assumptions about the world.  In the world as we know it, your imagination could well run wild with possibilities over which you really shouldn't ever worry your pointy little peasant head...., (^;

Thursday, October 29, 2015

why is god so interested in bad behavior?


aeon |  Of all humanity’s eccentricities, religion could very well be the most baffling. Even though no one has produced a fleck of evidence for the existence of the gods, people will engage in repetitive, often taxing behaviours, under the impression that some ethereal being out there knows and cares. And regardless of whether or not they believe, many thoughtful people have burned considerable numbers of calories trying to unravel the mystery that is God’s mind and the implications it has for, quite literally, everything.

The anthropologist Pascal Boyer of Washington University in St Louis has observed that people primarily fixate on what gods know and care about. Those following the Abrahamic traditions – Judaism, Christianity and Islam – focus on God’s mind. They rationalise their behaviour whenever they claim that God wants them to do something. They invoke God to influence others, as in: ‘God sees through your cheap tricks.’ From Moses on Sinai to ecstatic, modern-day Evangelicals, many claim to have gone directly to The Man Himself for a chat, even reporting their conversations in bestselling books.
Ask a random stranger what God knows, and chances are he’ll say: ‘Everything.’ But ask what God cares about, and he’ll say murder, theft and deceit; generosity, kindness and love. Amid God’s infinite knowledge, His concerns are quite narrow: He knows everything but cares only about the moral stuff. Where do these beliefs come from, and what impacts do they have on our lives?

Across cultures, even children seem to think that gods know more than normal humans. This is borne out by experiments using what psychologists call the ‘false-belief task’, which tests whether individuals can detect that others have false beliefs. In one version of the test, researchers put a bag of rocks into a box of crackers, showed children what’s inside, and then asked what various entities would think was in the box. If the children said: ‘Mom thinks rocks are in there’, then they haven’t passed the false-belief task. If they said: ‘Mom thinks crackers are in there, but there are really rocks’, they have a handle on the incorrect mental states of others.

What’s curious is that, with age, children come to know that Mom, dogs, and even trees will have incorrect thoughts, but they never extend that vulnerability to God. In fact, the quality of omniscience attributed to God appears to extend to any disembodied entity. In a 2013 paper in the International Journal for the Psychology of Religion, Louisville Seminary researchers found that children think imaginary friends know more than flesh-and-blood humans. There appears to be a rule, then, deep in our mental programming that tells us: minds without bodies know more than those with bodies.

the android security model is most impressive...,

marketplace |  Try to pay for something at your local store of choice and you might notice a few changes up at the register. Namely those kiosks where you’re used to paying with a swipe credit card. 

There's a good chance some of those stations are ready to accept the new chip and PIN tech.

But there's also a chance that there's a logo from Apple, Google and other tech giants letting you know you can pay up with an app on your phone. And now, add Chase Bank to the mobile payments game.  

Molly Wood, senior Marketplace tech correspondent, spoke with Marketplace host Kai Ryssdal about what the biggest bank in the U.S. has planned for the checkout line.

On how Chase is different:
They are not the first ones, but arguably they are the biggest. Chase is huge. One of every two households, according to Chase, is a Chase customer. [It is] the No. 1 processor in terms of payments overall. So what they are going to do differently, I think, is double down on reach. Chase is partnering up with Wal-Mart and some other big retailers. Now, that said, even though they have the size and the power, they’re going all-in on confusing. The digital wallet that they’re building sounds a little bit funky. There will be a Chase app. You could use that to pay by showing a code to a cashier that they can scan — but not in every store. Some stores will require you to use a different app that is being built by this consortium of retailers. So it’s a little messy right now.
On why companies are climbing into mobile payments when so few people uses it:
In fact, I think it’s only about 4 percent of consumers. It’s something like 13 percent have ever actually tried it. It’s very tiny. But it has the potential to be hugely profitable for whatever company wins…. There’s a potential for this to become a multibillion dollar business, even in the next couple years.

Wednesday, October 28, 2015

kunstler indicts banksters, feces-flingers in his comments indict others....,


kunstler |  Mr. Bernanke now says he “regrets” that nobody went to jail. That’s interesting. More to the point perhaps he might explain why the Federal Reserve and the Securities and Exchange Commission did not make any criminal referrals to the US Attorney General in such cases as, for instance, Goldman Sachs (and others) peddling bonds deliberately constructed to fail, on which they had placed bets favoring that very failure.

There were a great many such cases, explicated in full by people and organizations outside the regulating community. For instance, the Pro Publica news organization did enough investigative reporting on the racket of collateralized debt obligations to send many banking executives to jail. But the authorities turned a blind eye to it, and to the reporting of others, mostly on the web, since the legacy news media just didn’t want to press too hard.

In effect, the rule of law was replaced with a patch of official accounting fraud, starting with the April 2009 move by the Financial Accounting Standards Board involving their Rule 157, which had required banks to report the verifiable mark-to-market value of the collateral they held. It was essentially nullified, allowing the banks to value their collateral at whatever they felt like saying.

Accounting fraud remains at the heart of the fix instituted by Ben Bernanke and the ploy has been copied by authorities throughout the global financial system, including the central banks of China, Japan, and the European Community. That it seemed to work for the past seven years in propping up global finance has given too many people the dangerous conviction that reality is optional in economic relations. The recovery of equity markets from the disturbances of August has apparently convinced the market players that stocks are invincible. Complacency reigns at epic levels. Few are ready for what is coming.

china warns u.s. of south china sea eventualities...,


xinhua |  The Chinese navy has warned that further forays by the U.S. naval vessel into the waters claimed by China in the South China Sea may "trigger eventualities."

Chinese navy spokesperson Liang Yang made the comment following a U.S. warship's entering waters near the Nansha Islands on Tuesday.

The Chinese navy monitored, tracked and issued warnings to the USS Lassen, according to Liang, who said China's reaction is necessary, legitimate and professional.

"China's sovereignty over the Nansha Islands and their adjacent waters is irrefutable," he said. "The Chinese navy will resolutely perform duties and missions to unswervingly safeguard national sovereignty, maritime rights and interests, and peace and stability in the South China Sea."

The spokesperson said the navy will closely monitor the situation in and above the sea for goings-on that may jeopardize China's national security.

deuterostems want fairness, not equality...,


theatlantic |  Can Frankfurt really be right that people don’t value economic equality for its own sake? Many scholars believe otherwise. The primatologist Frans de Waal sums up a popular view when he writes: “Robin Hood had it right. Humanity’s deepest wish is to spread the wealth.”

In support of de Waal, researchers have found that if you ask children to distribute items to strangers, they are strongly biased towards equal divisions, even in extreme situations. The psychologists Alex Shaw and Kristina Olson told children between the ages of six and eight about two boys, Dan and Mark, who had cleaned up their room and were to be rewarded with erasers—but there were five of them, so an even split was impossible. Children overwhelmingly reported that the experimenter should throw away the fifth eraser rather than establish an unequal division. They did so even if they could have given the eraser to Dan or Mark without the other one knowing, so they couldn’t have been worrying about eliciting anger or envy.

It might seem as though these responses reflect a burning desire for equality, but more likely they reflect a wish for fairness. It is only because Dan and Mark did the same work that they should get the same reward. And so when Shaw and Olson told the children “Dan did more work than Mark,” they were quite comfortable giving three to Dan and two to Mark. In other words, they were fine with inequality, so long as it was fair.

In research I’ve been involved with at Yale, led by then-graduate student Mark Sheskin, we find that younger children actually have an anti-equality bias—they prefer distributions where they get a relative advantage over equal distributions where everyone gets the same. For instance, children prefer one for them and zero for another child over an arrangement where everyone gets two.

This finding meshes well with what other psychologists have found—and which many parents have observed: When treats are being distributed, children will complain bitterly if they get less, but are entirely mellow if they get more. Other primates behave similarly. Monkeys enjoy cucumbers and will normally be happy getting one, but if they are handed one after having just seen another monkey getting a grape—which monkeys love—they freak out. The monkey with the grape, on the other hand, is perfectly comfortable with its relative advantage.

no grain, now no oil? you can print more money, but you can't print more oil....,


marketwatch |  Even though the world is awash in cheap petroleum, Washington thinks the time is ripe again to sell part of the nation’s emergency oil reserves to help cut the U.S. deficit.

As part of an emerging budget deal, the Republican Congress and Democratic White House plan to sell up to 58 million barrels of oil from the so-called Strategic Petroleum Reserve. The reserve was created in 1975 in the aftermath of the OPEC oil embargo to protect the U.S. from another oil shock.
The sale would be spread out from 2018 to 2025 and raise more than $3 billion, based on current forecasts of future petroleum prices. Another $2 billion in oil could also be sold to modernize SPR facilities.

 
It’s not the first time Washington has resorted to oil sales to make its budget numbers work. A Republican Congress and a Democratic White House did the same thing in 1996, selling 23 million barrels to help balance the U.S. budget. Prices ranged from $18 to $26 a barrel back then.
Outgoing House Speaker John Boehner must remember. He was part of the Republican leadership during the 1996 budget talks as well.

Hey, every little bit counts. Although the nation’s deficit fell in fiscal 2015 to the lowest level in eight years, it still totaled a whopping $439 billion.

Some lawmakers have been itching to sell oil from the nation’s stockpile reserve, though for other reasons. A bill circulating in the Senate sought the sale of 100 million barrels of oil to beef up the depleted Highway Trust Fund, a moneypot used each year to maintain the nation’s main roadways.
Not everyone is smitten with the idea.

“The Strategic Petroleum Reserve is not an ATM,” Republican Sen. Lisa Murkowski said earlier this year after colleagues pushed for oil sales. “It is certainly not the petty cash drawer for Congress.”

Tuesday, October 27, 2015

why you didn't see it coming...,


nautilus |  Media may already be helping us understand the economic scale changes happening in this country. The surprising success of Bernie Sanders has been propelled by online discussions of income inequality. Michael Konczal, a fellow with the Roosevelt Institute, points out that between 1980 and 2006, gross domestic product increased fivefold, while financial sector profits increased sixteenfold. Between 1984 and 2014, the increases have been fourfold and tenfold, respectively. At this rate, we could well be in for a black hole-sized phase change.

Even billionaires know something qualitatively new is going on here—something so different that the old rules don’t apply. “I’m scared,” wrote Peter Georgescu, chairman of advertising giant Young and Rubicam, in The New York Times recently, speaking of the income gap. “We risk losing the capitalist engine that brought us great economic success.” His billionaire friends are scared too, he said. They know what we’re seeing is not just more of the same.

Could a tipping point exist where a concentrated quantity of power and money really change society? Even individual behavior? The evidence is mounting. One sociological study showed that drivers of more expensive cars are less likely to stop for pedestrians than drivers of less expensive cars. Nobel laureate in economics Daniel Kahneman points to studies suggesting that “living in a culture that surrounds us with reminders of money may shape our behavior and our attitudes in ways that we do not know about and of which we may not be proud.”

Elite Donor Level Conflicts Openly Waged On The National Political Stage

thehill  |   House Ways and Means Committee Chair Jason Smith (R-Mo.) has demanded the U.S. Chamber of Commerce answer questions about th...