Flying Ginza: Drones Used Missiles with Knife Warhead to Take Out Single Terrorist Targets 

Hellfire missile has spring-loaded blades created to minimize collateral damage.

Drone strikes have been the go-to approach by both the US military and the Central Intelligence Agency to take out terrorists and insurgent leaders over the past decade, and the main weapon in those strikes has been the Lockheed Martin AGM-114 Hellfire II missile—a laser-guided weapon originally developed for use by Army helicopters as a “tank buster.” But as concerns about collateral damage from drone strikes mounted, the DOD and CIA apparently pushed for development of a new Hellfire that takes the term “surgical strike” to a new level, with a version that could be used to take out a single individual.

The Wall Street Journal reports that just such a weapon has been developed and deployed on at least two occasions, based on information provided by multiple current and former defense and intelligence officials. Designated the Hellfire R9X, the missile has no explosive warhead—instead, its payload is more than 100 pounds of metal, including long blades that deploy from the body of the missile just before impact. Read the rest of this entry »


U.S. Urged to Rapidly Prepare for Electromagnetic Pulse Attack

World War II-style Manhattan Project needed for electric infrastructure protection.

reports:The United States is vulnerable to a devastating electromagnetic pulse event caused by a high-altitude nuclear blast or solar superstorm, according to a recently published book.

Peter Pry, a former CIA analyst and author of the book EMP Manhattan Project, is urging the government to rapidly harden the U.S. electric power system against EMP similar to the three-year crash program to build the first atomic bomb in 1942.”Today the United States and the world faces another existential threat—from an electromagnetic pulse (EMP) catastrophe that can be caused by nature or man, and topple the technological pillars of modern electronic civilization,” said Pry, who served on a congressional EMP commission in the early 2000s.

The book contains fresh assessments of the EMP threat produced by a more recent congressional commission last year that concluded the United States would suffer millions of deaths from a major EMP incident.

EMP was discovered in the 1960s during above-ground nuclear tests. The tests showed a nuclear blast created a pulse capable of disrupting or destroying electronic devices over large areas, in some cases over 1,000 miles away.

The latest EMP commission found the United States is confronted with “a present and continuing existential threat from naturally occurring and manmade electromagnetic pulse assault and related attacks on military and critical national infrastructures.”

panic-betty

An EMP event would produce an electric power outage over large areas of the country that could last for a year or longer.

Emergency systems, such as generators, also are vulnerable to damage from EMP.

EMP events would disable critical supply chains and plunge the entire country into living conditions similar to those of centuries ago prior the use of electric power.

“An extended blackout today could result in the death of a large fraction of the American people through the effects of societal collapse, disease, and starvation,” the commission stated in its July 2017 report. “While national planning and preparation for such events could help mitigate the damage, few such actions are currently underway or even being contemplated.”

William R. Graham, former head of the EMP commission, stated in a preface to the book that a nationwide electrical blackout of one year “could kill millions, perhaps prove fatal to most Americans, by starvation, disease, and societal collapse.”

“EMP is a civilization killer,” Graham said.

The book warns that China, Russia, North Korea, and Iran are preparing to use EMP attacks combined with traditional military strikes and new cyber attacks in future conflicts.

The threat was highlighted by North Korea’s announcement in state-run media in September 2017 that the country’s thermonuclear device could be detonated at high altitude and produce “great destructive power … for superpowerful EMP attack.” Read the rest of this entry »


Are You a DFIO? The Four Ways Ex-Internet Idealists Explain Where It All Went Wrong 

trump-digital-czarz.jpg

21st-century digital evangelists had a lot in common with early Christians and Russian revolutionaries.

A long time ago, in the bad old days of the 2000s, debates about the internet were dominated by two great tribes: the Optimists and the Pessimists.

“The internet is inherently democratizing,” argued the Optimists. “It empowers individuals and self-­organizing communities against a moribund establishment.”

“Wrong!” shouted the Pessimists. “The internet facilitates surveillance and control. It serves to empower only governments, giant corporations, and on occasion an unruly, destructive mob.”

These battles went on at length and were invariably inconclusive.

Nevertheless, the events of 2016 seem to have finally shattered the Optimist consensus. Long-standing concerns about the internet, from its ineffectual protections against harassment to the anonymity in which teenage trolls and Russian spies alike can cloak themselves, came into stark relief against the backdrop of the US presidential election. Even boosters now seem to implicitly accept the assumption (accurate or not) that the internet is the root of multiple woes, from increasing political polarization to the mass diffusion of misinformation.

All this has given rise to a new breed: the Depressed Former Internet Optimist (DFIO). Everything from public apologies by figures in the technology industry to informal chatter in conference hallways suggests it’s become very hard to find an internet Optimist in the old, classic vein. There are now only Optimists-in-retreat, Optimists-in-doubt, or Optimists-hedging-their-bets.

As Yuri Slezkine argues wonderfully in The House of Government, there is a process that happens among believers everywhere, from Christian sects to the elites of the Russian Revolution, when a vision is unexpectedly deferred. Ideologues are forced to advance a theory to explain why the events they prophesied have failed to come to pass, and to justify a continued belief in the possibility of something better.

[Read the full story here, at MIT Technology Review]

Among the DFIOs, this process is giving rise to a boomlet of distinct cliques with distinct views about how the internet went wrong and what to do about it. As an anxiety-­ridden DFIO myself, I’ve been morbidly cataloguing these strains of thinking and have identified four main groups: the Purists, the Disillusioned, the Hopeful, and the Revisionists.

These are not mutually exclusive positions, and most DFIOs I know combine elements from them all. I, for instance, would call myself a Hopeful-Revisionist. Read the rest of this entry »


The US May Have Just Pulled Even With China in the Race to Build Supercomputing’s Next Big Thing

The two countries are vying to create an exascale computer that could lead to significant advances in many scientific fields.

Martin Giles writes:

… The race to hit the exascale milestone is part of a burgeoning competition for technological leadership between China and the US. (Japan and Europe are also working on their own computers; the Japanese hope to have a machine running in 2021 and the Europeans in 2023.)

In 2015, China unveiled a plan to produce an exascale machine by the end of 2020, and multiple reports over the past year or so have suggested it’s on track to achieve its ambitious goal. But in an interview with MIT Technology Review, Depei Qian, a professor at  Beihang University in Beijing who helps manage the country’s exascale effort, explained it could fall behind schedule. “I don’t know if we can still make it by the end of 2020,” he said. “There may be a year or half a year’s delay.”

Teams in China have been working on three prototype exascale machines, two of which use homegrown chips derived from work on existing supercomputers the country has developed. The third uses licensed processor technology. Qian says that the pros and cons of each approach are still being evaluated, and that a call for proposals to build a fully functioning exascale computer has been pushed back.

Given the huge challenges involved in creating such a powerful computer, timetables can easily slip, which could make an opening for the US. China’s initial goal forced the American government to accelerate its own road map and commit to delivering its first exascale computer in 2021, two years ahead of its original target. The American machine, called Aurora, is being developed for the Department of Energy’s Argonne National Laboratory in Illinois. Supercomputing company Cray is building the system for Argonne, and Intel is making chips for the machine. Read the rest of this entry »


[VIDEO] Brilliantly Mocks the ‘Magic of the Birth Canal’

… A few days ago, Choice42 released this deliciously sardonic video entitled “The Magical Birth Canal.” It is a searing take on the pro-abort narrative that says life begins at birth.

Quite simply, it is brilliant …

… Something within that canal confers humanity on a life that has been human from the moment of conception. But pro-aborts prefer to think of the unborn as a mass of tissue not worthy of protection. Read the rest of this entry »


Elon Musk’s SpaceX Will Be the Third Most Valuable Private Company in the Country After a $500 Million Fundraising Round

Turns out this space stuff is pretty lucrative. (AP Photo/Jae C. Hong)

Turns out this space stuff is pretty lucrative. (AP Photo/Jae C. Hong)

Elon told you so.

Tim Fernholz writes: Elon Musk’s bet on the future of space transportation is set to be the third-biggest private tech company in the US, behind only Uber and Airbnb, and worth more than $27 billion.

SpaceX filed paperwork in Delaware to raise an additional $500 million in capital, according to Equidate, a stock market for private technology companies that tracks such filings. Once the fundraising round is completed, the company’s value will have increased by approximately 25% in the last nine months, according to Equidate COO Hari Raghavan. It has more than doubled since 2015.

It’s not clear yet which investors will provide the cash, but the company has preferred to retain old investors than add new ones. Fidelity is rumored to be leading the round, and Musk is supposedly set to put up more equity in the company he founded out of his own pocket in 2002.

SpaceX confirmed the fundraising round, but did not share any details about how the capital will be used. Read the rest of this entry »


Science Reveals: Communism Makes Nations Poorer and Less Healthy

Alain Tolhurst writes: Living under communism makes countries poorer and less healthy for decades, according to a landmark new study.

Researchers testing historical connections between cultures found that whether a country had been under communism was the biggest factor for those with lower health, income and educational levels.

In the first undertaking of its kind, they analyzed the fortunes of 44 countries across Europe and Asia and looked at geography, religion, systems of government and a more intangible quality called “deep cultural ancestry.”

Russian Communist Party supporters attend a memorial ceremony March 5 in Red Square to mark the 65th anniversary of Soviet leader Joseph Stalin's death.

Russian Communist Party supporters attend a memorial ceremony March 5 in Red Square to mark the 65th anniversary of Soviet leader Joseph Stalin’s death.

Writing in the journal Royal Society Open Science, they matched these factors against where they ranked on the United Nations Human Development Index, which measures per-capita income, life expectancy at birth and the number of years its citizens spend in education.

Most of the issues they looked at appeared to have little or no effect on the disparities between the countries, except for Islamic countries scoring a little worse on education. Read the rest of this entry »


[VIDEO] MONTAGE: Zuckerberg Doesn’t Know — His ‘Team’ Will ‘Follow Up’ 

During Mark Zuckerberg’s appearance before two Congressional committees, it was unclear whether the Facebook CEO knew the answer to ANYTHING. Don’t worry though, his ‘team’ will be sure to follow-up.


Neuroscience & Biobehavioral Reviews Find LSD “Harmonizing” on Brain, Changes Personality for Years, Studies Show from Scientific Reports 

The study found that taking LSD is ‘harmonizing’ because it helps connect different parts of your brain in new ways while “reorganizing” it.

Josh Magness writes: Your brain on LSD is kind of like jazz improvisation.

That’s according to Selen Atasoy, a research fellow at the Center for Brain and Cognition at the Pompeu Fabra University in Spain. She was among the authors of a study published in the journal Scientific Reports that found the psychedelic drug can reorganize your brain in a “harmonizing” way.

“Just like improvising jazz musicians use many more musical notes in a spontaneous and non-random fashion,” she told PsyPost in an interview, “your brain combines many more of the harmonic waves (connectome harmonics) spontaneously yet in a structured way.”

Twelve people were examined for the study, with some taking LSD and some a placebo drug. Researchers examined their brain with an MRI scan both during and after the subjects listened to music.

Researchers said they wanted to study the combined effect of music and LSD because “music is also known for its capacity to elicit emotions, which is found to be emphasized by the effect of psychedelics.

“Exploring the combined effects of music and the psychedelic state induced by LSD provided us an opportunity to reveal not only the LSD-induced dynamical changes in the brain,” they wrote, “but also how these dynamics are affected by the presence of a complex, natural stimuli like music.”

The study found that taking LSD is “harmonizing” because it helps connect different parts of your brain in new ways while “reorganizing” it. The effects were temporary, but Newsweek reports that it’s a positive sign for people with some psychological conditions.

The brain could more efficiently make those new connections while a person listened to music, the study also found.

Atasoy told PsyPost that because changes in a brain with LSD were “structured” instead of random, this “suggests a reorganisation of brain dynamics and the emergence of new type of order in the brain.” Read the rest of this entry »


[VIDEO] How Government Lost the Crypto Wars (At Least for Now) 

Forty-two years after unbreakable encryption was first conceived, these tools are more widespread than ever before. One milestone came in 2016, when the world’s largest messaging service—WhatsApp—announced it would offer default end-to-end encryption on all communications. In other words, the messages can be read only by the senders and recipients; even the platform provider can’t access them.

Law enforcement and intelligence agencies are still reckoning with this new reality. For decades, they demanded that tech companies hand over private data on their users, sometimes without obtaining warrants. So companies like Apple changed their policies so individual users were the only ones holding the keys to their data.

This new era of consumer privacy led to a standoff in 2016, when the Federal Bureau of Investigation (FBI) demanded access to an encrypted iPhone belonging to Sayed Farook, a deceased terrorist from San Bernardino, California. Farook and his wife, Tashfeen Malik, had killed 14 people at a holiday office party in December 2015.

The FBI wanted Apple to write software that would weaken the iPhone’s built-in security. Apple refused, saying that such flawed software would jeopardize the security of its customers, who number in the hundreds of millions. Once a back door was created, the company claimed, the FBI could use it on similar phones—and it could be leaked to hackers or foreign enemies. “It is in our view the software equivalent of cancer,” Apple CEO Tim Cook told ABC News. Read the rest of this entry »


[VIDEO] Falcon Heavy Blasts Off, Boosters Land at Cape Canaveral

Rumbling into a mostly sunny sky, SpaceX’s new Falcon Heavy rocket — the world’s most powerful present-day launcher — soared into orbit Tuesday, and its two strap-on boosters came back to Cape Canaveral for an electrifying double-landing punctuated by quadruple sonic booms.

The dramatic test flight took off at 3:45 p.m. EST (2045 GMT) Tuesday from launch pad 39A at NASA’s Kennedy Space Center in Florida, the same facility used by the Apollo 11 lunar landing crew and numerous space shuttle missions.

Standing nearly 230 feet (70 meters) tall, the Falcon Heavy’s 27 main engines put out nearly 5 million pounds of thrust, one-and-a-half times more than any other rocket flying today, and around two-thirds the power output of the space shuttle at liftoff. Read the rest of this entry »


NORAD’s Crazy Santa Cause 

An inside look at the single largest public outreach program for the Department of Defense — and the Pentagon’s most elaborate propaganda operation.

But the number printed in the newspaper in December 1955 had a digit wrong — and was instead the direct line into the secret military nerve center in Colorado Springs, Colo., where the Pentagon was on the lookout to prevent nuclear war. The Air Force officer and World War II fighter pilot who took the first call that day for Father Christmas thought it was a crank — and Col. Harry Shoup sternly said so.

“The little kid started crying,” Shoup’s daughter, Terri Van Keuren, recalled in an interview. “So Dad went into his ‘Ho ho ho’ and got the kid’s list.”

Sixty-two years later, the Continental Air Defense Command is now the North American Aerospace Defense Command, and its interactive NORAD Tracks Santa has become the largest single public outreach program for the Defense Department. It’s also, you might say, the Pentagon’s most elaborate propaganda operation.

Air Force Lt. Col. David Hanson, of Chicago, takes a phone call from a youngster in Florida at the Santa Tracking Operations Center at Peterson Air Force Base near Colorado Springs, Colo., on Friday, Dec. 24, 2010. Volunteers take as many as 80,000 phone calls from youngsters and adults around the world with questions about Santa and his travels. Lots of military secrets are hidden behind the gleaming walls of NORAD’S headquarters building, including this one: Just how do they get Santa’s flight path onto their computer screens every Christmas Eve?Tracking Santa’s travels is a celebrated tradition at the North American Aerospace Command, and it unfolds Friday for the 55th year. (AP Photo/Ed Andrieski)

On Christmas Eve, while monitoring the heavens for North Korean missile launches or Russian military aircraft flying too close to the U.S. or Canada, NORAD will also be reporting the progress of Santa and his reindeer as they travel from the North Pole around the world delivering presents and holiday cheer. It will correlate the jolly elf’s journey with its network of 47 radar stations, spy satellites in “geosynchronous” orbit 22,300 miles above the earth, fighter jets and a suite of special high-tech “SantaCams.” Or so the publicity stunt’s plan goes.

“The moment our radar tells us that Santa has lifted off, we begin to use the same satellites that we use in providing warning of possible missile launches aimed at North America,” says NORAD’s detailed 14-page internal handbook for the operation, which is replete with Santa stats (first flight believed to be Dec. 24, 343 A.D.) and even talking points for that uncomfortable question many parents also confront: “Is there a Santa Claus?”

[Read the full story here, at POLITICO]

It’s all part of the ornamented script that more than 1,500 volunteers — including the four-star general in charge of defending North America — are using to field an anticipated 150,000 calls and an avalanche of emails and social media posts (2 million Facebook followers so far) who are all seeking to locate Ole St. Nick on his starlight odyssey.

“As soon as you’re hanging up there’s another kid wanting to talk to you,” Preston Schlachter, NORAD’s Track Santa program manager and its director of community outreach, said of the 23-hour period leading up to Christmas when volunteers work in two-hour shifts, backed up by dozens of sponsors ranging from Microsoft to the National Defense Industrial Association, Taco Bell and the local Amy’s Donuts in Colorado Springs.

In the past, VIPs like former first lady Michelle Obama have also taken a turn at the phones.

“It is the best two hours you’ll ever experience,” Schlachter added in an interview. “You are getting these calls from all over the world. One of the coolest things I like about the program is the multi-generational aspect of it. We are seeing feedback on social media, people who call in and tell us they tracked Santa when they were kids and they’ve introduced it to their kids and now they’re introducing it to their grandkids.” Read the rest of this entry »


Ajit Pai : How the FCC Can Save the Open Internet

POTUS_Code

We should undo the Obama administration’s rules that regulate the web like a 1930s utility.

Ajit Pai writes: As millions flocked to the web for the first time in the 1990s, President Clinton and a Republican Congress decided “to preserve the vibrant and competitive free market that presently exists for the Internet.” In the Telecommunications Act of 1996, the government called for an internet “unfettered by Federal or State regulation.” The result of that fateful decision was the greatest free-market success story in history.

Encouraged by light-touch regulation, private companies invested over $1.5 trillion in nearly two decades to build out American communications networks. Without having to ask anyone’s pemission, innovators everywhere used the internet’s open platform to start companies that have transformed how billions of people live and work.

But that changed in 2014. Just days after a poor midterm election result, President Obama publicly pressured the Federal Communications Commission to reject the longstanding consensus on a market-based approach to the internet. He instead urged the agency to impose upon internet service providers a creaky regulatory framework called “Title II,” which was designed in the 1930s to tame the Ma Bell telephone monopoly. A few months later, the FCC followed President Obama’s instructions on a party-line vote. I voted “no,” but the agency’s majority chose micromanagement over markets.

obama-code-abc.jpg

This burdensome regulation has failed consumers and businesses alike. In the two years after the FCC’s decision, broadband network investment dropped more than 5.6%—the first time a decline has happened outside of a recession. If the current rules are left in place, millions of Americans who are on the wrong side of the digital divide would have to wait years to get more broadband.

The effect has been particularly serious for smaller internet service providers. They don’t have the time, money or lawyers to cut through a thicket of complex rules. The Wireless Internet Service Providers Association, which represents small fixed wireless companies that generally operate in rural America, found that more than 80% of its members “incurred additional expense in complying with the Title II rules, had delayed or reduced network expansion, had delayed or reduced services and had allocated budget to comply with the rules.” They aren’t alone. Other small companies have told the FCC that these regulations have forced them to cancel, delay or curtail upgrades to their fiber networks.

The uncertainty surrounding the FCC’s onerous rules has also slowed the introduction of new services. One major company reported that … (read more)

Source: WSJ.com

ajitpai428.jpg

Todd Krainin, Reason

FCC Head Ajit Pai: Killing Net Neutrality Will Set the Internet Free

Promises that “we’re going to see an explosion in the kinds of connectivity and the depth of that connectivity” like never before.

& report: Todd Krainin, ReasonIn an exclusive interview today just hours after announcing his plan to repeal “Net Neutrality” rules governing the actions of Internet-service providers (ISPs) and mobile carriers, Federal Communications Commission (FCC) Chairman Ajit Pai has an in-your-face prediction for his critics: “Over the coming years, we’re going to see an explosion in the kinds of connectivity and the depth of that connectivity,” he said this afternoon. “Ultimately that means that the human capital in the United States that’s currently on the shelf—the people who don’t have digital opportunity—will become participants in the digital economy.”

Pai stressed that regulating the Internet under a Title II framework originally created in the 1930s had led to less investment in infrastructure and a slower rate of innovation. “Since the dawn of the commercial internet, ISPs have been investing as much as they can in networks in order to upgrade their facilities and to compete with each other,” he says. “Outside of a recession we’ve never seen that sort of investment go down year over year. But we did in 2015, after these regulations were adopted.” In a Wall Street Journal column published today, Pai says Title II was responsible for a nearly 6 percent decline in broadband network investment as ISPs saw compliance costs rise and the regulatory atmosphere become uncertain. In his interview with Reason, Pai stressed that the real losers under Net Neutrality were people living in rural areas and low-income Americans who were stuck on the bad end of “the digital divide.”

Proponents of Net Neutrality maintain that rules that went into effect in 2015 are the only thing standing between rapacious businesses such as Comcast, Verizon (where Pai once worked), and Spectrum and an Internet choking on throttled traffic, expensive “fast lanes,” and completely blocked sites that displease whatever corporate entity controls the last mile of fiber into your home or business. Pai says that is bunk and noted that today’s proposed changes, which are expected to pass full FCC review in mid-December, return the Internet to the light-touch regulatory regime that governed it from the mid-1990s until 2015.

“It’s telling that the first investigations that the prior FCC initiated under these so-called Net Neutrality rules were involving free data offerings,” says Pai, pointing toward actions initiated by his predecessor against “zero-rating” services such as T-Mobile’s Binge program, which didn’t count data used to stream Netflix, Spotify, and a host of other services against a customer’s monthly data allowance. “To me it’s just absurd to say that the government should stand in the way of consumers who want to get, and companies that want to provide, free data.”

The FCC is not completely evacuating its oversight role. ISPs, he says, will need to be completely transparent with customers about all practices related to prioritizing traffic, data caps, and more. Pai believes that market competition for customers will prove far more effective in developing better and cheaper services than regulators deciding what is best for the sector. “In wireless,” he says, “there’s very intense competition—you have four national carriers and any number of regional carriers competing to provide 4G LTE, and a number of different services. In those marketplaces where there’s not as much competition as we’d like to see, to me at least, the solution isn’t to preemptively regulate as if it were a monopoly, as if we’re dealing with ‘Ma Bell,’ but to promote more competition.” Read the rest of this entry »


Ted Cruz & Patrick Leahy slam Tim Cook for removing VPN apps from Chinese App Store

Chance Miller reports: Earlier this year, Apple was forced to remove several VPN apps from the App Store in China due to regulatory reasons. At the time, Tim Cook explained that he would rather not remove them, but was forced to comply.

Now, United States Senators Ted Cruz and Patrick Leahy are pressing Apple for more information…

In a letter sent to Tim Cook, Cruz and Leahy say Apple may be “enabling the Chinese government’s censorship and surveillance of the Internet,” noting that China has an “abysmal human rights record.”

Specifically, Cruz and Leahy pointed to Cook’s acceptance of the Newseum’s 2017 Free Expression Award. While receiving the award, Cook remarked that Apple “enables people around the world to speak up.” The senators, however, argue that Apple’s removal of VPN apps in China do the exact opposite of that:

While Apple’s many contributions to the global exchange of information are admirable, removing VPN apps that allow individuals in China to evade the Great Firewall and access the Internet privately does not enable people in China to “speak up.” To the contrary, if Apple complies with such demands from the Chinese governments, it inhibits free expression for users across China, particularly in light of the Cyberspace Administration of China’s new regulations targeting online anonymity.

The two senators also point to Apple’s past concessions to the Chinese government: removing the New York Times from the App Store and shutting down the iBooks Store and iTunes Movies.

Cook and Leahy outline a list of questions they want Cook to answer. Read the rest of this entry »


[AUDIO] Dangerous sound? What Americans heard in Cuba attacks

WASHINGTON (AP) — It sounds sort of like a mass of crickets. A high-pitched whine, but from what? It seems to undulate, even writhe. Listen closely: There are multiple, distinct tones that sound to some like they’re colliding in a nails-on-the-chalkboard effect.

The Associated Press has obtained a recording of what some U.S. Embassy workers heard in Havana in a series of unnerving incidents later deemed to be deliberate attacks. The recording, released Thursday by the AP, is the first disseminated publicly of the many taken in Cuba of mysterious sounds that led investigators initially to suspect a sonic weapon.

The recordings themselves are not believed to be dangerous to those who listen. Sound experts and physicians say they know of no sound that can cause physical damage when played for short durations at normal levels through standard equipment like a cellphone or computer.

What device produced the original sound remains unknown. Americans affected in Havana reported the sounds hit them at extreme volumes.

Whether there’s a direct relationship between the sound and the physical damage suffered by the victims is also unclear. The U.S. says that in general the attacks caused hearing, cognitive, visual, balance, sleep and other problems.

The recordings from Havana have been sent for analysis to the U.S. Navy, which has advanced capabilities for analyzing acoustic signals, and to the intelligence services, the AP has learned. But the recordings have not significantly advanced U.S. knowledge about what is harming diplomats.

The Navy did not respond to requests for comment on the recording. State Department spokeswoman Heather Nauert wouldn’t comment on the tape’s authenticity.

Cuba has denied involvement or knowledge of the attacks. The U.S. hasn’t blamed anyone and says it still doesn’t know what or who is responsible. But the government has faulted President Raul Castro’s government for failing to protect American personnel, and Nauert said Thursday that Cuba “may have more information than we are aware of right now.”

[Read the full story here, at apnews.com]

“We believe that the Cuban government could stop the attacks on our diplomats,” said White House chief of staff John Kelly.

Not all Americans injured in Cuba heard sounds. Of those who did, it’s not clear they heard precisely the same thing.

Yet the AP has reviewed several recordings from Havana taken under different circumstances, and all have variations of the same high-pitched sound. Individuals who have heard the noise in Havana confirm the recordings are generally consistent with what they heard.

“That’s the sound,” one of them said.

The recording being released by the AP has been digitally enhanced to increase volume and reduce background noise, but has not been otherwise altered.

The sound seemed to manifest in pulses of varying lengths — seven seconds, 12 seconds, two seconds — with some sustained periods of several minutes or more. Then there would be silence for a second, or 13 seconds, or four seconds, before the sound abruptly started again. Read the rest of this entry »


Future of News: Bracing for Next Wave of Technology

New technologies have disrupted news media over the past 20 years — but one report says that’s just the beginning.

Washington (AFP) – If you think technology has shaken up the news media — just wait, you haven’t seen anything yet.

The next wave of disruption is likely to be even more profound, according to a study presented Saturday to the Online News Association annual meeting in Washington.

News organizations which have struggled in the past two decades as readers moved online and to mobile devices will soon need to adapt to artificial intelligence, augmented reality and automated journalism and find ways to connect beyond the smartphone, the report said.

“Voice interface” will be one of the big challenges for media organizations, said the report by Amy Webb, a New York University Stern School of Business faculty member and Founder of the Future Today Institute.

The institute estimates that 50 percent of interactions that consumers have with computers will be using their voices by 2023.

“Once we are speaking to our machines about the news, what does the business model for journalism look like?” the report said.

“News organizations are ceding this future ecosystem to outside corporations. They will lose the ability to provide anything but content.”

Webb writes that most news organizations have done little experimentation with chat apps and voice skills on Amazon’s Alexa and Google Home, the likes of which may be key parts of the future news ecosystem.

Because of this, she argues that artificial intelligence or AI is posing “an existential threat to the future of journalism.”

“Journalism itself is not actively participating in building the AI ecosystem,” she wrote.

One big problem facing media organizations is that new technologies impacting the future of news such as AI are out of their control, and instead is in the hands of tech firms like Google, Amazon, Tencent, Baidu, IBM, Facebook, Apple and Microsoft, according to Webb.

“News organizations are customers, not significant contributors,” the report said. Read the rest of this entry »


Hackers Gain Direct Access to US Power Grid Controls 

PALO ALTO, CA -JULY 12: Power line towers are shown July 12, 2002 in Palo Alto, California. The Federal Energy Regulatory Commission boosted the maximum price of electricity from $55.26 per megawatt hour to $91.87 in the wake of record-breaking temperatures for the week, including 112 degrees in Redding, California today. One megawatt is enough to power about 750 homes. (Justin Sullivan/Getty Images)

Hackers had the power to cause blackouts, Symantec says. And yes, most signs point to Russia.

Andy Greenberg writes: In an era of hacker attacks on critical infrastructure, even a run-of-the-mill malware infection on an electric utility’s network is enough to raise alarm bells. But the latest collection of power grid penetrations went far deeper: Security firm Symantec is warning that a series of recent hacker attacks not only compromised energy companies in the US and Europe but also resulted in the intruders gaining hands-on access to power grid operations—enough control that they could have induced blackouts on American soil at will.

Symantec on Wednesday revealed a new campaign of attacks by a group it is calling Dragonfly 2.0, which it says targeted dozens of energy companies in the spring and summer of this year. In more than 20 cases, Symantec says the hackers successfully gained access to the target companies’ networks. And at a handful of US power firms and at least one company in Turkey—none of which Symantec will name—their forensic analysis found that the hackers obtained what they call operational access: control of the interfaces power company engineers use to send actual commands to equipment like circuit breakers, giving them the ability to stop the flow of electricity into US homes and businesses.

“There’s a difference between being a step away from conducting sabotage and actually being in a position to conduct sabotage … being able to flip the switch on power generation,” says Eric Chien, a Symantec security analyst. “We’re now talking about on-the-ground technical evidence this could happen in the US, and there’s nothing left standing in the way except the motivation of some actor out in the world.”

Never before have hackers been shown to have that level of control of American power company systems, Chien notes. The only comparable situations, he says, have been the repeated hacker attacks on the Ukrainian grid that twice caused power outages in the country in late 2015 and 2016, the first known hacker-induced blackouts.

The Usual Suspects

Security firms like FireEye and Dragos have pinned those Ukrainian attacks on a hacker group known as Sandworm, believed to be based in Russia. But Symantec stopped short of blaming the more recent attacks on any country or even trying to explain the hackers’ motives. Chien says the company has found no connections between Sandworm and the intrusions it has tracked. Nor has it directly connected the Dragonfly 2.0 campaign to the string of hacker intrusions at US power companies—including a Kansas nuclear facility—known as Palmetto Fusion, which unnamed officials revealed in July and later tied to Russia.

Chien does note, however, that the timing and public descriptions of the Palmetto Fusion hacking campaigns match up with its Dragonfly findings. “It’s highly unlikely this is just coincidental,” Chien says. But he adds that while the Palmetto Fusion intrusions included a breach of a nuclear power plant, the most serious DragonFly intrusions Symantec tracked penetrated only non-nuclear energy companies, which have less strict separations of their internet-connected IT networks and operational controls. Read the rest of this entry »


Medieval Gospel Made of Sheep, Calves, Deer … and Goat?

Laura Geggel reports: During medieval times, bookmakers fashioned the pages and cover of a rare copy of the Gospel of Luke out of five different types of animals: calves, two species of deer, sheep and goat, according to new research.

In addition, one more type of animal left its mark on the cover of this 12th-century book: Beetle larvae likely chewed holes into the leather binding, the researchers said.

Now, researchers are learning unexpected secrets about the manuscript by noninvasively testing the proteins and DNA on the book’s pages, the researchers told Live Science.

Rare books — such as this copy of the Gospel of Luke — are difficult to study because they’re fragile, prompting many librarians to bar any research that would harm such manuscripts or their pages.

This rule is all too familiar to Matthew Collins, a biochemist at both the University of York in the United Kingdom and the University of Copenhagen. He wanted to sample parchments — documents made from animal skins — as a way to determine how people have managed livestock throughout history.

When Collins and Sarah Fiddyment, a postdoctoral fellow of archaeology at the University of York, approached librarians at the University of York’s Borthwick Institute for Archives, “we were told that we would not be allowed to physically sample any of the parchment documents, as they are too valuable as cultural-heritage objects,” Fiddyment told Live Science.

But Fiddyment didn’t give up. She spent several months learning how librarians conserve rare parchments, and, surprisingly, found a new method that allows scientists to study these specimens without disturbing them — one that involves an eraser.

Typically, librarians “dry clean” parchments by gently rubbing a polyvinyl chloride eraser against them. This technique pulls fibers off the page, and the resulting debris is usually thrown away.

But Fiddyment realized this debris held valuable clues about the book. By isolating proteins and other biological fragments within the debris, and examining them with a mass spectrometer — an instrument that identifies different compounds by their masses — researchers could learn all kinds of information about the manuscripts, she found.

“This was Sarah’s brilliant idea,” Collins told Live Science in an email. “Oddly enough, I think we relished the challenge.”

It wasn’t long before Fiddyment put this technique into action. A historian bought the aforementioned Gospel of Luke at a 2009 Southeby’s auction. An analysis of its “prickly” style of script indicated that scribes at St. Augustine’s Abbey in Canterbury, in the United Kingdom, created it around A.D. 1120, Bruce Barker-Benfield, the curator of manuscripts at the Bodleian Libraries at the University of Oxford, told the journal Science.

To learn more about the gospel, the historian contacted Collins. Using Fiddyment’s method, Collins and his colleagues learned that the book’s white leather cover came from the skin of a roe deer— a common species in the United Kingdom. The book’s strap came from a larger deer species — either a native red deer or a fallow deer, an invasive species likely brought from continental Europe after the Normans invaded in 1066. Read the rest of this entry »


Have Smartphones Destroyed a Generation?

More comfortable online than out partying, post-Millennials are safer, physically, than adolescents have ever been. But they’re on the brink of a mental-health crisis.

writes: One day last summer, around noon, I called Athena, a 13-year-old who lives in Houston, Texas. She answered her phone—she’s had an iPhone since she was 11—sounding as if she’d just woken up. We chatted about her favorite songs and TV shows, and I asked her what she likes to do with her friends. “We go to the mall,” she said. “Do your parents drop you off?,” I asked, recalling my own middle-school days, in the 1980s, when I’d enjoy a few parent-free hours shopping with my friends. “No—I go with my family,” she replied. “We’ll go with my mom and brothers and walk a little behind them. I just have to tell my mom where we’re going. I have to check in every hour or every 30 minutes.

”Those mall trips are infrequent—about once a month. More often, Athena and her friends spend time together on their phones, unchaperoned. Unlike the teens of my generation, who might have spent an evening tying up the family landline with gossip, they talk on Snapchat, the smartphone app that allows users to send pictures and videos that quickly disappear. They make sure to keep up their Snapstreaks, which show how many days in a row they have Snapchatted with each other. Sometimes they save screenshots of particularly ridiculous pictures of friends. “It’s good blackmail,” Athena said. (Because she’s a minor, I’m not using her real name.) She told me she’d spent most of the summer hanging out alone in her room with her phone. That’s just the way her generation is, she said. “We didn’t have a choice to know any life without iPads or iPhones. I think we like our phones more than we like actual people.”

I’ve been researching generational differences for 25 years, starting when I was a 22-year-old doctoral student in psychology. Typically, the characteristics that come to define a generation appear gradually, and along a continuum. Beliefs and behaviors that were already rising simply continue to do so. Millennials, for instance, are a highly individualistic generation, but individualism had been increasing since the Baby Boomers turned on, tuned in, and dropped out. I had grown accustomed to line graphs of trends that looked like modest hills and valleys. Then I began studying Athena’s generation.

Around 2012, I noticed abrupt shifts in teen behaviors and emotional states. The gentle slopes of the line graphs became steep mountains and sheer cliffs, and many of the distinctive characteristics of the Millennial generation began to disappear. In all my analyses of generational data—some reaching back to the 1930s—I had never seen anything like it.

“The allure of independence, so powerful to previous generations, holds less sway over today’s teens.”

At first I presumed these might be blips, but the trends persisted, across several years and a series of national surveys. The changes weren’t just in degree, but in kind. The biggest difference between the Millennials and their predecessors was in how they viewed the world; teens today differ from the Millennials not just in their views but in how they spend their time. The experiences they have every day are radically different from those of the generation that came of age just a few years before them.

What happened in 2012 to cause such dramatic shifts in behavior? It was after the Great Recession, which officially lasted from 2007 to 2009 and had a starker effect on Millennials trying to find a place in a sputtering economy. But it was exactly the moment when the proportion of Americans who owned a smartphone surpassed 50 percent.

Jasu Hu

The more I pored over yearly surveys of teen attitudes and behaviors, and the more I talked with young people like Athena, the clearer it became that theirs is a generation shaped by the smartphone and by the concomitant rise of social media. I call them iGen. Born between 1995 and 2012, members of this generation are growing up with smartphones, have an Instagram account before they start high school, and do not remember a time before the internet. The Millennials grew up with the web as well, but it wasn’t ever-present in their lives, at hand at all times, day and night. iGen’s oldest members were early adolescents when the iPhone was introduced, in 2007, and high-school students when the iPad entered the scene, in 2010. A 2017 survey of more than 5,000 American teens found that three out of four owned an iPhone.

[Read the full story here, at The Atlantic]

The advent of the smartphone and its cousin the tablet was followed quickly by hand-wringing about the deleterious effects of “screen time.” But the impact of these devices has not been fully appreciated, and goes far beyond the usual concerns about curtailed attention spans. The arrival of the smartphone has radically changed every aspect of teenagers’ lives, from the nature of their social interactions to their mental health. These changes have affected young people in every corner of the nation and in every type of household. The trends appear among teens poor and rich; of every ethnic background; in cities, suburbs, and small towns. Where there are cell towers, there are teens living their lives on their smartphone.

To those of us who fondly recall a more analog adolescence, this may seem foreign and troubling. The aim of generational study, however, is not to succumb to nostalgia for the way things used to be; it’s to understand how they are now. Some generational changes are positive, some are negative, and many are both. More comfortable in their bedrooms than in a car or at a party, today’s teens are physically safer than teens have ever been. They’re markedly less likely to get into a car accident and, having less of a taste for alcohol than their predecessors, are less susceptible to drinking’s attendant ills.

Psychologically, however, they are more vulnerable than Millennials were: Rates of teen depression and suicide have skyrocketed since 2011. It’s not an exaggeration to describe iGen as being on the brink of the worst mental-health crisis in decades. Much of this deterioration can be traced to their phones.Even when a seismic event—a war, a technological leap, a free concert in the mud—plays an outsize role in shaping a group of young people, no single factor ever defines a generation. Parenting styles continue to change, as do school curricula and culture, and these things matter. But the twin rise of the smartphone and social media has caused an earthquake of a magnitude we’ve not seen in a very long time, if ever. There is compelling evidence that the devices we’ve placed in young people’s hands are having profound effects on their lives—and making them seriously unhappy. Read the rest of this entry »


Virtual Lip Reading is About to Take Counterfeit News to a New Level 


[VIDEO] Full Measure with Sharyl Attkisson: Surveillance State, July 2, 2017 


Scientists Discover Neural Mechanism—and Possible Fix—for Chronic Pain

Study in mice reveals how brain circuitry goes haywire after peripheral nerve damage.

 reports: Chronic, aching pain after an injury or operation may be all in your head. Researchers now think they’ve figured out exactly how brain wiring goes haywire to cause persistent pain—and how to fix it.

In mice with peripheral nerve damage and chronic pain from a leg surgery, a broken circuit in a pain-processing region of mammalian brains caused hyperactive pain signals that persisted for more than a month. Specifically, the peripheral nerve damage seemed to deactivate a type of interconnected brain cells, called somatostatin (SOM) interneurons, which normally dampen pain signals. Without the restraints, neurons that fire off pain signals—cortical pyramidal neurons—went wild, researchers report in Nature Neuroscience.

But the circuitry could be repaired, the researchers found. Just by manually activating those pain-stifling SOM interneurons, the researchers could shut down the rodents’ chronic pain and keep the system working properly—preventing centralized, chronic pain from ever developing.

“Our findings suggest that manipulating interneuron activity after peripheral nerve injury could be an important avenue for the prevention of pyramidal neuron over-excitation and the transition from acute postoperative pain to chronic centralized pain,” the authors, led by neuroscientist Guang Yang at New York University School of Medicine, conclude. Yang and his colleagues envision future drugs or therapies, such as transcranial magnetic stimulation, to tweak the activity of the interneurons to prevent malfunctioning pain signaling.

The study is just in mice, so it needs repeating and verifying before the line of research can move forward. That said, the work is backed by and in-line with a series of human and animal studies on chronic pain. Read the rest of this entry »


Massive Ransomware Cyber Attack Spreads Across Europe 

Another widespread cyber attack is causing massive problems across Europe Tuesday.

Ukraine has been hit particularly hard as government and company officials have reported serious intrusions across the Ukrainian power grid, banks and government offices. The country’s prime minister says that the cyber attack affecting his country is “unprecedented,” but “vital systems haven’t been affected.”

Russia’s top oil producer Rosneft has said it has been hacked, as well as Danish shipping giant A.P. Moller-Maersk and Britain’s WPP—the largest advertising company in the world.

Ukrainian Deputy Prime Minister Pavlo Rozenko on Tuesday posted a picture of a darkened computer screen to Twitter, saying that the computer system at the government’s headquarters has been shut down.

There’s very little information about who might be behind the disruption, but technology experts who examined screenshots circulating on social media said it bears the hallmarks of ransomware, the name given to programs that hold data hostage by scrambling it until a payment is made.

“A massive ransomware campaign is currently unfolding worldwide,” said Romanian cybersecurity company Bitdefender. In a telephone interview, Bitdefender analyst Bogdan Botezatu said that he had examined samples of the program and that it appeared to be nearly identical to GoldenEye, one of a family of hostage-taking programs that has been circulating for months. Read the rest of this entry »


[VIDEO] LSD Microdosing: The New Silicon Valley Productivity Hack


In 10 Years, Your iPhone Won’t Be a Phone Anymore

Siri will be the conductor of a suite of devices, all tracking your interactions and anticipating your next moves.

Apple Inc. will still sell an iPhone, but expect the device to morph into a suite of apps and services, enhanced with AI and AR, part of a ‘body area network’ of devices, batteries and sensors.

writes: It’s 2027, and you’re walking down the street, confident you’ll arrive at your destination even though you don’t know where it is. You may not even remember why your device is telling you to go there.

There’s a voice in your ear giving you turn-by-turn directions and, in between, prepping you for this meeting. Oh, right, you’re supposed to be interviewing a dog whisperer for your pet-psychiatry business. You arrive at the coffee shop, look around quizzically, and a woman you don’t recognize approaches. A display only you can see highlights her face and prints her name next to it in crisp block lettering, Terminator-style. Afterward, you’ll get an automatically generated transcript of everything the two of you said.

As the iPhone this week marks the 10th anniversary of its first sale, it remains one of the most successful consumer products in history. But by the time it celebrates its 20th anniversary, the “phone” concept will be entirely uprooted: That dog-whisperer scenario will be brought to you even if you don’t have an iPhone in your pocket.

Sure, Apple AAPL 0.45% may still sell a glossy rectangle. (At that point, iPhones may also be thin and foldable, or roll up into scrolls like ancient papyri.) But the suite of apps and services that is today centered around the physical iPhone will have migrated to other, more convenient and equally capable devices—a “body area network” of computers, batteries and sensors residing on our wrists, in our ears, on our faces and who knows where else. We’ll find ourselves leaving the iPhone behind more and more often.

Trying to predict where technology will be in a decade may be a fool’s errand, but how often do we get to tie up so many emerging trends in a neat package?

Apple is busy putting ever more powerful microprocessors, and more wireless radios, in every one of its devices. Read the rest of this entry »


[VIDEO] Blockstack: A New Internet That Brings Privacy & Property Rights to Cyberspace


Theresa May Wants to End ‘Safe Spaces’ for Terrorists on the Internet. What Does That Even Mean? 

In the wake of the U.K.’s most recent terrorist attacks, its prime minister is talking tough on Internet regulation, but what she’s suggesting is impractical.

Tragically, there have been three major terrorist attacks in the U.K. in less than three months’ time. After the second, in Manchester, May and others said they would look into finding ways to compel tech companies to put cryptographic “back doors” into their services, so that law enforcement agencies could more easily access suspects’ user data.

May repeated her stance in broaders terms Sunday, following new attacks in London. “The Internet, and the big companies” are providing “safe spaces” for extremism, she said, and new regulations are needed to “regulate cyberspace.” She offered no specifics, but her party’s line, just days from the June 8 national election, is clear: a country that already grants its government some of the most sweeping digital surveillance powers of any democracy needs more and tougher laws to prevent terrorism (see “New U.K. Surveillance Law Will Have Worldwide Implications”).

The trouble is, this kind of talk ignores how the Internet and modern consumer technology works. As Cory Doctorow points out in a detailed look at how you would actually go about creating services with cryptographic holes, the practicalities of such a demand render it ludicrous bordering on impossible. Even if all of the necessary state-mandated technical steps were taken by purveyors of commercial software and devices—like Google or Apple, say—anyone who wanted to could easily skirt their restrictions by running open-source versions of the software, or unlocked phones.

That isn’t to say that May and the Conservatives’ general idea that the government should be able to probe user data as part of an investigation should be dismissed out of hand. The balancing act between national security and digital privacy has become one of the central themes of our digital lives (see “What If Apple Is Wrong?”). And while there are advocates aplenty on both sides, simple answers are hard to come by. Read the rest of this entry »


[VIDEO] Bill Whittle: ‘Bill Nye The Science Lie’


[VIDEO] How Deregulation Gave Us FM Radio, HBO, and the iPhone


“We’ve gone to a modern [broadcast] system that has a lot of places where stuff can happen without permission,” says Thomas W. Hazlett, who’s the FCC‘s former chief economist, a professor at Clemson University, and author of the new book The Political Spectrum: The Tumultuous Liberation of Wireless Technology, from Herbert Hoover to the Smartphone. “And we have seen that the smartphone revolution and some other great stuff in the wireless space has really burgeoned…That comes from deregulation.”

So-called net neutrality rules are designed to solve a non-existent problem and threaten to restrict consumer choice, Hazlett tells Reason’s Nick Gillespie. “The travesty is there’s already a regulatory scheme [to address anti-competitive behavior]—it’s called antitrust law.”

Greater autonomy and consumer freedom led to the development of cable television, the smartphone revolution, and the modern internet. While we’ve come a long way from the old days of mother-may-I pleading with the FCC to grant licenses for new technology, Hazlett says, “there’s a lot farther to go and there’s a lot of stuff out there that’s being suppressed.”

He points to the history of radio and television. Herbert Hoover and Lyndon Johnson exercised extraordinary control over spectrum allocation, which they used for their own political and financial gain. With liberalization, we now have hundreds of hours of varied television programming as compared to the big three broadcast networks of the ’60s, an abundance of choices in smartphone providers and networks as compared to the Ma Bell monopoly, and more to come. Read the rest of this entry »


Is the U.S. on the Verge of a Historic Innovation Boom? 


Why LSD Trips Last Forever, What Happens When You Inject Psilocybin

And other fun notes from the world’s largest gathering of psychedelic researchers.

What happens when you inject psilocybin? The psilocybin-assisted therapy study conducted by Johns Hopkins Universitywhich found that moderate and high doses of psilocybin, in conjunction with psychotherapy, reduced anxiety and depression in cancer patients–used gel caps as the method of administration.

[Read the full story here, at Reason.com]

Most recreational users just eat the mushrooms or brew them into tea. Over in Europe, however, researchers have experimented with intravenous administration. Apparently, it’s like “rocketing [someone] out of a cannon”; the come-up takes place over roughly a minute, rather than half an hour. Well, duh. Except, at a Q&A later in the day, Nichols revealed LSD doesn’t work any quicker when administered via IV. It truly is the Good Friday mass of psychedelic drugs. Read the rest of this entry »


Bill Nye, Progressive Science, and the Threat of Nature

Alastair's Adversaria

Over the last couple of days, I’ve seen a number of people sharing clips from episode 9 of Bill Nye’s new Netflix show, Bill Nye Saves the World. The videos in question were of two segments of the show. In the first, Rachel Bloom of Crazy Ex-Girlfriend sings and raps rather discordantly about not ‘boxing in’ her ‘sex junk’. She tells people to get off their ‘soapbox’, declaring ‘sex how you want: it’s your goddamn right!’

In the other video from the show, much the same message—that there are ‘lots of flavours to sexuality’—is communicated using anthropomorphized ice creams. Vanilla starts a group for ice cream conversion therapy, declaring that, as vanilla, he feels that he is ‘the most natural of the ice creams’ and that to ‘get right with the big ice cream in the sky,’ the others should change their flavour by wishing to be vanilla. The…

View original post 2,805 more words


Ronald Bailey: Do Researchers Risk Becoming Just Another Leftwing Interest Group?

“We face a possible future where people not only ignore scientific evidence, but seek to eliminate it entirely,” warns the march’s mission statement. “Staying silent is a luxury that we can no longer afford. We must stand together and support science.”

From whom do the marchers hope to defend science? Certainly not the American public: Most Americans are fairly strong supporters of the scientific enterprise. An October 2016 Pew Research Center poll reported, “Three-quarters of Americans (76%) have either a great deal (21%) or a fair amount of confidence (55%) in scientists, generally, to act in the public interest.” The General Social Survey notes that public confidence in scientists stands out among the most stable of about 13 institutions rated in the GSS survey since the mid-1970s. (For what it’s worth, the GSS reports only 8 percent of the public say that they have a great deal of confidence in the press, but at least that’s higher than the 6 percent who say the same about Congress.)

The mission statement also declares, “The application of science to policy is not a partisan issue. Anti-science agendas and policies have been advanced by politicians on both sides of the aisle, and they harm everyone—without exception.”

I thoroughly endorse that sentiment. But why didn’t the scientific community march when the Obama administration blocked over-the-counter access to emergency contraception to women under age 17? Or dawdled for years over the approval of genetically enhanced salmon? Or tried to kill off the Yucca Mountain nuclear waste storage facility? Or halted the development of direct-to-consumer genetic testing? Read the rest of this entry »


[VIDEO] MEET THE MOTHER: The MOAB GBU-43/B Massive Ordnance Air Blast

The GBU-43/B Massive Ordnance Air Blast (commonly known as the Mother of All Bombs) is a large-yield conventional (non-nuclear) bomb, developed for the United State military by Albert L. Weimorts, Jr. of the Air Force Research Laboratory. At the time of development, it was touted as the most powerful non-nuclear weapon ever designed.

The bomb was designed to be delivered by a C-130 Hercules, primarily the MC-130E Combat Talon I or MC-130H Combat Talon II variants.

The GBU-43/B Massive Ordnance Air Blast (MOAB pronounced /ˈm.æb/, commonly known as the Mother of All Bombs) is a large-yield conventional (non-nuclear) bomb, developed for the United States military by Albert L. Weimorts, Jr. of the Air Force Research Laboratory. At the time of development, it was touted as the most powerful non-nuclear weapon ever designed. The bomb was designed to be delivered by a C-130 Hercules, primarily the MC-130E Combat Talon I or MC-130H Combat Talon II variants.

C9Tw_XWWAAEHCWg.jpg

Since then, Russia has tested its “Father of All Bombs“, which is claimed to be four times as powerful as the MOAB.

The U.S. military dropped the largest non-nuclear bomb in eastern Afghanistan on Thursday just days after a Green Beret was killed fighting ISIS there, a U.S. defense official confirmed to Fox News.

The GBU-43B, a 21,000-pound conventional bomb, was dropped in Nangarhar Province.

The MAOB (Massive Ordinance Air Blast) is also known as the “Mother Of All bombs.” It was first tested in 2003, but hadn’t been used before Thursday.

For comparison, each Tomahawk cruise missile launched at Syria last week was 1,000-pounds each … (more)

Operational history

MOAB was first tested with the explosive tritonal on 11 March 2003, on Range 70 located at Eglin Air Force Base in Florida. It was again tested on 21 November 2003.[2]

Aside from two test articles, the only known production is of 15 units at the McAlester Army Ammunition Plant in 2003 in support of the Iraq War. As of early 2007, none of those were known to have been used, although a single MOAB was moved to the Persian Gulf area in April 2003.[4]

On April 13, 2017, a MOAB was dropped on a target in the Nangarhar Province inside Afghanistan. It was the first non-testing use of the bomb.

Evaluations

The basic operational concept bears some similarity to the BLU-82 Daisy Cutter, which was used to clear heavily wooded areas in the Vietnam War and in Iraq to clear mines and later as a psychological weapon against the Iraqi military. After the psychological impact of the BLU-82 on enemy soldiers was witnessed, and no BLU-82 weapons remained, the MOAB was developed partly to continue the ability to intimidate Iraqi soldiers. Pentagon officials had suggested their intention to use MOAB as an anti-personnel weapon, as part of the “shock and awe” strategy integral to the 2003 invasion of Iraq. Read the rest of this entry »


[VIDEO] Terror Groups Using Commercial Drones in Attacks


The Defense Department still uses 8-inch floppy disks and computers from the 1970s to coordinate nuclear forces

pentagon

writes: Dale Hayden, a senior researcher at the Air Force’s Air University, told an audience of aerospace experts earlier this month that proliferation of antisatellite technology has put America’s communications networks at risk. “In a conflict, it will be impossible to defend all of the space assets in totality,” he said. “Losses must be expected.”

It has never been easier for America’s adversaries—principally Russia and China, but also independent nonstate actors—to degrade the U.S. military’s ability to fight and communicate. Senior military officials have expressed grave doubts about the security of the Pentagon’s information systems and America’s ability to protect the wider commercial virtual infrastructure.

The U.S. Navy, under its mission to keep the global commons free, prevents tampering with undersea cables. But accidents—and worse—do happen. Last year a ship’s anchor severed a cable in the English Channel, slowing internet service on the island of Jersey. In 2013 the Egyptian coast guard arrested three scuba divers trying to cut a cable carrying a third of the internet traffic between Europe and Egypt. “When communications networks go down, the financial services sector does not grind to a halt, rather it snaps to a halt,” warned a senior staffer to Federal Reserve Chairman Ben Bernanke in 2009. Trillions of dollars in daily trading depends on GPS, which is kept free by the Air Force.

There are now an estimated 17.6 billion devices around the world connected to the internet, including more than six billion smartphones. The tech industry expects those numbers to double by 2020. That growth is dependent, however, on secure and reliable access to intercontinental undersea fiber-optic cables, which carry 99% of global internet traffic, and a range of satellite services.

The U.S. military is working on ways of making them more resilient. For instance, the Tactical Undersea Network Architectures program promises rapidly deployable, lightweight fiber-optic backup cables, and autonomous undersea vehicles could soon be used to monitor and repair cables. In space, the military is leading the way with advanced repair satellites as well as new and experimental GPS satellites, which will enhance both military and civilian signals. Read the rest of this entry »


[VIDEO] This Self-Taught Programmer Is Bringing Transparency to California Politics 

Rob Pyers was a laid-off grocery bagger who learned to code on YouTube. Now the website he runs, the California Target Book, is shining a light on spending by politicians, their campaigns, and outside groups.

Rob Pyers didn’t set out to bring transparency to establishment politics. In fact, he didn’t even have any programming experience before he built the electronic systems for the California Target Book, a go-to resource for political transparency in the state. He initially came to Los Angeles with aspirations of becoming a screenwriter, but ended up stuck in his day job, bagging groceries. Then Walgreen’s laid him off, and he needed something else to do.

After joining the Target Book, Pyers taught himself how to code, mostly by watching YouTube videos. Two years later, the 41-year-old has built its systems from the ground up, and now runs the website from his cramped West Hollywood one-bedroom. He is often the first to publicize major donations and new candidates, making his Twitter feed invaluable to campaign consultants and journalists alike.

Pyers, who describes himself as “95 lbs of concentrated tech geek,” has become an expert on pulling data from hundreds of voter databases, election filings, and campaign finance disclosures. He’s done all this despite the fact that the state’s main resource for campaign information is an inaccessible hodgepodge of ZIP archives and tables that even the current Secretary of State has called a “Frankenstein monster of outdated code.”

“California’s Cal-Access website is notorious for being just sort of an ungodly, byzantine mess,” says Pyers. “If you have no idea what you’re doing, it’s almost impossible to get any useful information out of.”

The state is currently working on a multi-million dollar upgrade to the site, with an expected rollout in 2019. But while the government builds its new system, the Target Book has already proven its worth. During one 2016 Congressional race, the L.A. Times used Pyers’ data to reveal that candidate Isadore Hall may have misused hundreds of thousands of dollars of campaign cash. Read the rest of this entry »


[VIDEO] White Hot Tungsten Cube (over 3000°C) Vs. Watermelon and Steak 


[VIDEO] #SXSW: How Activists Are Using Technology to Fight Dictators

Dissidents are using USB drives to smuggle information into authoritarian regimes.

But if you were looking for something truly disruptive at SXSW, look no further than a group of activists using tech to spread information to citizens oppressed by authoritarian regimes.

“The people out there they don’t have satellites, they don’t have internet, they have nothing,” says Abdalaziz Alhamza who escaped Syria and co-founded Raqqa is Being Slaughtered Silently. “To be stuck with only ISIS propaganda, it will affect them.”

Alhamza and dissidents from Eritrea, Afghanistan and Cuba were brought together by the Human Rights Foundation (HRF) for a panel discussion called “The Real Information Revolution.” Reason caught up with the group at the HRF booth on the convention floor, centered around a large wall of Kim Jong Un faces with USB ports for mouths. Attendees were invited to donate USB drives into the display. The drives will later be smuggled into North Korea after being wiped and filled with films and information from the outside world. Read the rest of this entry »


[VIDEO] DIY Biohacking Can Change The World, If the Government Allows It