And that’s how our country is currently doing.There are people out there that sure do a lot of strange things in the name of politics. Take for example the two porn stars who offered every non-Donald Trump voter a free blow job. But if you’re a Trump supporter like the girl below, have you considered an ass tattoo in his honor?Clemson University student Peyton Darnell is obviously a Trump supporter, because look what she tweeted before the election results.
Daily Archives: November 14, 2016
Readers of the Guardian woke up last to find that the newspaper and website had been given over to promoting MI5. To be more precise: the paper was trumpeting a fearmongering ‘exclusive’ with MI5 Director-General, Andrew Parker. It was billed as ‘the first interview of its kind’ and was conducted by the paper’s deputy editor, Paul Johnson, and the diplomatic editor, Ewen MacAskill. However, it quickly became clear that this ‘interview’ consisted largely of the two senior Guardian journalists listening to the MI5 chief and diligently writing down what he said with no discernible challenge or scrutiny.Ex-Guardian journalist Jonathan Cook summed up perfectly the contents of the ‘interview’: • the Russians under Vladimir Putin are an evil empire; • Islamic jihadists are everywhere but MI5 is brilliant at foiling their terror attacks; • the increased budget MI5 has received is entirely justified because it is doing such a brilliant job of foiling terror attacks; • MI5′s extra powers to surveil us all are necessary to foil those terror attacks; • whatever happens with Brexit, MI5 will continue doing a brilliant job protecting the British people; • MI5 is determined to become a friendlier place for women and minority ethnic applicants.This was state ideology masquerading as robust reporting; in Britain’s ‘flagship’ newspaper of liberal journalism, no less. The front page of the Guardian website, with an accompanying photograph of two armed policemen, was a model example of propaganda that should be pored over by journalism students for decades to come:
Anywhere from 30 percent to two-thirds of all suicide attempts are based on an impulse decision — the last drop in the bucket. We know this from the accounts of people who made near-fatal suicide attempts, 70 percent of whom made a decision in less than an hour. But while this measure of last resort is often taken on a whim, studies suggest that there are patterns that describe suicidal behaviour. If you have the right eyes, you can spot them then offer the necessary support and guidance, averting an unnecessary fatality.
Robots, who can work tirelessly, might be our best ‘eyes’ even for spotting people contemplating suicide, say researchers who used machine learning.The team led by John Pestian, a professor in the divisions of Biomedical Informatics and Psychiatry at Cincinnati Children’s Hospital Medical Center, enlisted 379 who were classed as either suicidal, mentally ill but not suicidal, or neither, the latter group serving as a control.Each patient was assessed using a standardized behavioral rating scale and had to answer five questions meant to stimulate conversation.
Questions like ‘Do you have hope?’ or ‘Does it hurt emotionally?’Control groups tended to laugh more during interviews, sigh less, express less anger and emotional pain.Both the verbal and non-verbal cues were extracted for each individual and fed to machine learning algorithms which were trained to spot the biological markers related to suicide. By combining linguistic and acoustic characteristics, the machine proved very accurate at predicting which of the three groups an individual belonged to. It was actually 93 percent accurate in classifying suicidal persons and 85 percent accurate in identifying a person who had a mental illness but was thinking about killing himself.
If you ever search for a popular application in Apple’s App Store, you’ll inevitably see a bunch of copycats trying to draft on the name recognition to fool you into downloading their app. It’s usually pretty innocuous, but it can become a more pernicious problem during the holidays.That’s because app makers sometimes target popular stores like Zappos or Foot Locker and make an imitation app to trick people who aren’t really paying attention. That matters with retail apps, because you’re eventually planning on giving your credit card information to them. The New York Times recently looked into the issue after a deluge of counterfeit apps popped up a few weeks ago:
Hawai`i — Following Portugal’s model, Hawai`i could become the first state in the U.S. to decriminalize all drugs — including cocaine and even heroin.“[D]espite a longstanding policy that enforces illicit drug prohibition and imposes some of the world’s harshest penalties for drug possession and sales, illicit drug use in the United States has been increasing,” states a resolution that passed, amended by the Hawai`i House Judiciary Committee on Thursday.Now that it’s been approved, the study’s findings will be due later this year,“no later than 20 days prior” to the convening of the legislature’s 2017 session.According to testimony from the Legislative Reference Bureau Acting Director, Charlotte A. Carter-Yamauchi, the study will reference Portugal’s successful decriminalization with the caveat of recognizing Hawai`i’s obligation to follow federal law. But the state recognizes the numerous failures and pitfalls of the national war on drugs and its policies, beginning with passage of the Harrison Narcotics Act of 1914.“Addicts are still considered to be violating the law by possessing drugs and have no legal way of obtaining them. The war on drugs most problematic effects are in its pursuit of dealers and traffickers. This is what has made the business lucrative and violent, caused addicts to steal to obtain drug money, and burdened the tax payers [sic] and criminal justice system,” Libertarian Party of Hawai`i Chair, Tracy Ryan, submitted in support of the study, with the recommendation to examine pre-1914 U.S. drug policy.
I have a vivid, recurring dream. I climb the stairs in my parents’ house to see my old bedroom. In the back corner, I hear a faint humming.It’s my old computer, still running my 1990s-era bulletin board system (BBS, for short), “The Cave.” I thought I had shut it down ages ago, but it’s been chugging away this whole time without me realizing it—people continued calling my BBS to play games, post messages, and upload files. To my astonishment, it never shut down after all.BBSes once numbered in the tens of thousands in North America. These mostly text-based, hobbyist-run services played a huge part in the online landscape of the 1980s and ‘90s. Anyone with a modem and a home computer could dial-in, often for free, and interact with other callers in their area code.Then the internet came along in the mid-1990s. Like a comet to the dinosaurs, it upended the natural order of things and wiped BBSes out. My system was one of the casualties, a victim of the desire to devote all my online time to the internet. The same scenario repeated itself on thousands of computers across the country until, one by one, the brightest lights of the BBS world blinked out of existence.
Let the conspiracy theories resume! Alaska’s High-Frequency Active Auroral Research Program (HAARP) facility will reopen in 2017. The sprawling facility now is under the ownership of the University of Alaska Fairbanks (UAF), and the UAF Geophysical Institute is preparing HAARP for a new sponsored research campaign that’s set to begin early next year, UAF Researcher Chris Fallen, KL3WX, told ARRL.“This involves, for example, reinstalling the vacuum tubes in each of the 10 kW amplifiers — eventually 360 in total — that were removed by the US Air Force [the facility’s former owner] for warm storage in the main facility,” Fallen said. He later clarified that’s just one-half of the 720 tubes required to equip all of HAARP’s transmitters. “For the first campaign we will only be bringing half of the array online, as we will only have half the tubes installed,” he explained. “It’s a long process and we have limited resources.” He noted that the transmitter shelters have been unheated since the previous campaign in the summer of 2014. “The five generators — approximately 3 MW each — have recently been tested individually and are verified operational.”Fallen said the HAARP ionosonde (DPS4D “Digisonde”) will be brought back online. “Some instruments on site need to be repaired or replaced,” he said. Those would include riometers and a UHF radar. “Optical instruments will be brought back. The flux-gate magnetometer is operational again.”
In 1960, Tom and James Monaghan borrowed $900 and bought a small, ailing pizza shop on the fringes of the Eastern Michigan University campus. Early on, business was horrible and James sold his half of the company to his brother for a used Volkswagen Beetle. Tom persisted and, by 1978, had expanded Domino’s Pizza into a 200-store enterprise worth $500 million.During this period of rapid growth, Domino’s Pizza set an industry precedent that would prove critical to their success: they guaranteed that if a customer didn’t receive his pizza within 30 minutes of placing the order, it’d be free. Domino’s executives hired an external marketing firm, Group 243, to promote this new promise. The result? The “Noid.”A troll-like creature, the Noid was outfitted in a skin-tight red onesie with rabbit-like ears and buck-teeth. Will Vinton, whose studio animated the creature, described it as a “physical manifestation of all the challenges inherent in getting a pizza delivered in 30 minutes or less.” Its name, a play on “annoyed,” was an indication of its nature: many considered the Noid to be one of the most obnoxious mascots of all time. Throughout the late 80s, Domino’s ran a series of commercials in which the Noid set about attempting to make life an utter hell for pizza consumers:
If you thought biometrics was the ultimate weapon of authentication, you may be proved wrong by Starbug. German researcher Jan Krissler, aka Starbug is a hacker whose claim to fame is breaching Apple’s TouchID and recreating the German defense minister’s thumbprint from a high-res image.Starbug has revealed that he can now decode anyone’s smartphone PIN code from any selfie “image”. of the owner.Starbug and his colleagues have extracted the reflection of smartphone screens in the eye whites of “selfie” subjects, then they used an ultra-high resolution image techniques to extract the user’s PIN code. Starbug presented his discovery at the Biometrics 2015 conference in London.His team also revealed a method to take hi-res images of iris using a high-resolution camera and recreating them using a simple laser printer. They were also able to extract the reflection of phone screens in the eye whites of “selfie” subjects, then using ultra-high res image techniques to glean the user’s PIN code.
A state tax commissioner resigned Thursday (Nov. 10) after WVUE Fox 8 television exposed that he hadn’t paid property taxes in 30 years on a building he owned. New Orleans resident Jimmie Thorns stepped down from the Louisiana Tax Commission at the request of Gov. John Bel Edwards, who had originally appointed him last spring, according to Fox 8. Fox 8 revealed Wednesday night that Thorns owed about $140,000 in back taxes on a North Claiborne Avenue house in New Orleans. The governor asked for Thorns resignation after being contacted by Fox 8 about its investigation. “Upon learning of Mr. Thorns previous tax avoidance issues, Gov. Edwards immediately began a review of his appointment,” Edwards’ office told Fox 8.
Now that the election is over, the Russian teams of hackers suspected of breaking into the Democratic Party’s systems have reportedly launched a new phishing attack on US political think tanks and non-government organizations. Incident response firm Volexity has compiled information on “The Dukes” (aka APT29 or Cozy Bear) that it believes are behind the attacks. This time around, they worked by posing as a Harvard professor, sending links to Microsoft Office Word or Excel documents that contained a macro used to install a malware downloader on that target’s computer. Once installed, it downloads a PNG file that has a backdoor embedded via steganography.The emails contained headlines like “The “Shocking Truth About Election Rigging in the United States,” and went out over the last couple of days. Other security firms like CrowdStrike have previously named the attackers and linked them to Russia. Now, Reuters quotes AlienVault’s chief scientist Jaime Blasco saying “Probably now they are trying to rush to gain access to certain targets where they can get a better understanding on what is going on in Washington after the election.”
The police force in Evanston, Illinois had a problem on their hands. A mystery transmitter was blocking legal use of radio devices, car key fobs, cellphones, and other transmitters in an area of their city, and since it was also blocking 911 calls they decided to investigate it. Their first call for help went to the FCC who weren’t much use, telling them to talk to the manufacturers of the devices affected.Eventually they approached the ARRL, the USA’s national amateur radio organisation, who sent along [Kermit Carlson, W9XA] to investigate. He fairly quickly identified the frequencies with the strongest interference and the likely spot from which it originated, and after some investigation it was traced to a recently replaced neon sign power supply. Surprisingly the supply was not replaced with a fault-free unit, its owner merely agreeing to turn it off should any further interference be reported.
Do you get creeped out when an ad eerily related to your recent Internet activity seems to follow you around the web? Do you ever wonder why you sometimes see a green lock with “https” in your address bar, and other times just plain “http”? EFF’s team of technologists and computer scientists can help. We engineer solutions to these problems of sneaky tracking, inconsistent encryption, and more. Our projects are released under free and open source licenses like the GNU General Public License or Creative Commons licenses, and we make them freely available to as many users as possible. Where users face threats to their free expression, privacy, and security online, EFF’s technology projects are there to defend them.Below we go over five of EFF’s many technology tools and projects. In different ways, they all function to increase your security on the Internet—with the implicit assertion that personal privacy is at the foundation of that security.