pipeline

every three weeks Biden exits the basement, tells people not to vote for him, and disappears again

5.jpg

“Attitudes are more important than facts,” Peale preached.

“Formulate and stamp indelibly on your mind a mental picture of yourself as succeeding,” Peale writes in “The Power of Positive Thinking.”

“Hold this picture tenaciously. Never permit it to fade.”

[…]

Paula White, a televangelist, belongs to the Word of Faith movement, which teaches that God bestows health and wealth on true believers.

In a Rose Garden ceremony for the National Day of Prayer earlier this month, White quoted from the Bible’s Book of Job: “If you decree and declare a thing, it will be established.”

“I declare no more delays to the deliverance of Covid-19,” White continued. “No more delays to healing and a vaccination.”

{ CNN | Continue reading }

‘Anything can happen, but it usually doesn’t.’ —Robert Benchley

23.jpg

The Navy records, known as “hazard reports,” describe both visual and radar sightings, including close calls with the aerial vehicles, or “unmanned aircraft systems.”

One incident, on March 26, 2014, over the Atlantic Ocean off Virginia Beach, involved a silver object “approximately the size of a suitcase” that was tracked on radar passing within 1,000 feet of one of the jets, according to the report. […]

Defense Department officials do not describe the objects as extraterrestrial, and experts emphasize that earthly explanations can generally be found for such incidents. Even lacking a plausible terrestrial explanation does not make an extraterrestrial one likely, astrophysicists say.

{ NY Times | Continue reading }

I contacted Alexander Wendt, a professor of international relations at Ohio State University. Wendt is a giant in his field of IR theory, but in the past 15 years or so, he’s become an amateur ufologist. […] “It’s possible they’ve been here all along. And that’s something that I’ve been thinking about lately, which is a bit unsettling. Because it means it’s their planet and not ours. They could just be intergalactic tourists. Maybe they’re looking for certain minerals. It could just be scientific curiosity. It could be that they’re extracting our DNA. I mean, who knows? I have no idea. All I know is that if they are here, they seem to be peaceful. […] I think if they are here, they’ve probably been here a very long time — that’s my guess. ”

{ Vox | Continue reading }

Regarding UFOs, I see three key explanation categories:

Measurement Error – What look like artificial objects with crazy extreme abilities are actually natural stuff looked at wrong. This is widely and probably correctly judged to be the most likely scenario. Nevertheless, we can’t be very confident of that without considering its alternatives in more detail.

Secret Societies – There really are artificial objects with amazing abilities, though abilities may be somewhat overestimated via partially misleading observations. These are created and managed by hidden groups in our world, substantially tied to us. Secret local military research groups, distant secret militaries, non-state Bond-villain-like groups, time-travelers from our near future, dinosaur civilizations hidden deep in the Earth’s crust, etc.

Aliens – Again these objects really do have amazing abilities, and are created by hidden groups. But in this case the relevant groups are much less integrated with and correlated with our societies and history. Little green men, their super-robot descendants, simulation admins, gods, etc. If these groups had a common origin with, competed with, or were much influenced by the groups that we know of, those things mostly happened long ago, and probably far away.

{ Overcoming Bias | Continue reading }

photo {Ansel Adams, The Golden Gate, San Francisco, c. 1950 }

Neighbors from Hell

22.jpg

related { Spite fence | Fontainebleau Hotel Corp. v. Forty-Five Twenty-Five, Inc }

Today a man knocked on my door and asked for a small donation towards the local swimming pool, so I gave him a glass of water

{ as part of his 5 day long experiment into ‘modern survival’, the artist recorded every single search and order placed using his smartphone }

Prepare for self-quarantine

55.jpg

Most estimates suggest 80% of COVID-19 cases are mild and feel roughly like a flu. Estimates I have seen suggest that roughly 10-15% of cases will be more significant and may necessitate hospital visits (see also) with 1-3% potentially needing an ICU. The concern of many governments is the peak number of cases that occur in a given moment. […]

The reported death rate has hovered around 2% but may in reality be 0.2% to 1% depending on country and healthcare system. Many estimates tend to indicate an overall expected mortality rate of ~0.5% globally. The current existing fatality rate is biased upwards by Wuhan cases dominating the mix (which are closer to a 3-4% death rate and make up most cases). It is possible the virus is being undertested for in China / rest of world driving the real death rate down (as many more people are infected than is reported). […]

R0 value: The spread rate of the virus seems to be well over 2 and likely ~3. This means for every person infected at least 2 to 3 more get the disease.

{ EladGil | Continue reading }

Experts think there may be many people with no symptoms at all, or such mild ones that they never bother to seek medical attention. Because those cases have not been counted, it’s not possible now to know the real proportion of mild versus severe cases. […]

After viral infections, people generally develop antibodies in their blood that will fight off the virus and protect them from contracting it again. It’s reasonable to assume that people who have had the new coronavirus will become immune to it.

But it is not known how long that immunity will last. With other coronaviruses, which cause the common cold, immunity can wane.

{ NY Times | Continue reading }

The best estimates so far suggest that Covid-19 kills about 1% of people it infects. That number may go up somewhat or fall significantly; either way it could add up to a dreadful toll.

If 60% of the world’s population is ultimately infected, as suggested by Gabriel Leung, chair of public health medicine at Hong Kong University, a 1% fatality rate would kill almost 50 million people — similar to the 1918 Spanish flu. If that falls to 0.1%, it could still be roughly 10 times more fatal than the 2009 H1N1 influenza outbreak, which killed several hundred thousand in its first year. […]

The most severe period of initial infection could soon be fading. Respiratory diseases flourish in the cold season and taper off as the weather warms up. That should cause infection rates to slow in the northern hemisphere, while continuing at a lower level in tropical regions and spiking in temperate parts of the southern hemisphere where winter will be setting in. When a new year rolls around, the bulk of the disease will shift back to the northern hemisphere, to begin the cycle again.

Subsequent Covid-19 seasons probably won’t be as serious. Those who survive viruses should be immune from reinfection (though there have been reports of people being diagnosed with Covid-19 for a second time), and as the share of survivors in the population rises, it gets harder for a disease to spread. […]

In a best-case scenario, it’s even possible that vaccines may be available in not much more than a year.

{ Bloomberg | Continue reading }

The only path to flattening the curve for COVID-19 is community-wide isolation: the more people stay home, the fewer people will catch the disease. The fewer people who catch the disease, the better hospitals can help those who do. […]

Get a flu shot, if you haven’t already, and stock up supplies at home so that you can stay home for two or three weeks, going out as little as possible. […] Here’s a handy, one-page guide on what you need.

{ Scientific American | Continue reading }

related { CoronaCoin: crypto developers seize on coronavirus for new, morbid token }

The trick is, you use the truth when you wanna tell a lie

{ Thanks Thomas! }

the ffrinch that fire on the Bull that bang

33.jpg

Two programmer-musicians wrote every possible MIDI melody in existence to a hard drive, copyrighted the whole thing, and then released it all to the public in an attempt to stop musicians from getting sued. […]

Riehl and Rubin developed an algorithm that recorded every possible 8-note, 12-beat melody combo. This used the same basic tactic some hackers use to guess passwords: Churning through every possible combination of notes until none remained. Riehl says this algorithm works at a rate of 300,000 melodies per second.

Once a work is committed to a tangible format, it’s considered copyrighted. And in MIDI format, notes are just numbers.

“Under copyright law, numbers are facts, and under copyright law, facts either have thin copyright, almost no copyright, or no copyright at all,” Riehl explained in the talk. “So maybe if these numbers have existed since the beginning of time and we’re just plucking them out, maybe melodies are just math, which is just facts, which is not copyrightable.”

All of the melodies they’ve generated, as well as the code for the algorithm that generated them, are available as open-source materials on Github and the datasets are on Internet Archive.

{ Vice | Continue reading }

Closet for Repeers. 60 Shellburn. Key at Kate’s.

43.jpg

Americans spend an average 2.5 days per year searching for lost items and $2.7 billion a year replacing them. […]

Although 40% of Americans believe getting older causes them to forget where they place their valuables and household items, Millennials are generally twice as likely to misplace items over Boomers and a third more likely to lose items compared to Generation X.

{ PR News Wire | Continue reading }

Arms apeal with larms

31.jpg

The madman theory is a political theory commonly associated with U.S. President Richard Nixon’s foreign policy. He and his administration tried to make the leaders of hostile Communist Bloc nations think Nixon was irrational and volatile. According to the theory, those leaders would then avoid provoking the United States, fearing an unpredictable American response.

{ Wikipedia | Continue reading }

The author finds that perceived madness is harmful to general deterrence and is sometimes also harmful in crisis bargaining, but may be helpful in crisis bargaining under certain conditions.

{ British Journal of Political Science | Continue reading }

black smoke shells fitted with computer chips { Cai Guo-Qiang, Wreath (Black Ceremony), 2011 }

This is Rooshious balls. This is a ttrinch. This is mistletropes. This is Canon Futter with the popynose.

21.jpg

For more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret.

The company, Crypto AG, got its first break with a contract to build code-making machines for U.S. troops during World War II. Flush with cash, it became a dominant maker of encryption devices for decades, navigating waves of technology from mechanical gears to electronic circuits and, finally, silicon chips and software.

The Swiss firm made millions of dollars selling equipment to more than 120 countries well into the 21st century. Its clients included Iran, military juntas in Latin America, nuclear rivals India and Pakistan, and even the Vatican.

But what none of its customers ever knew was that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence. These spy agencies rigged the company’s devices so they could easily break the codes that countries used to send encrypted messages. […]

“It was the intelligence coup of the century,” the CIA report concludes. […]

The program had limits. America’s main adversaries, including the Soviet Union and China, were never Crypto customers.

{ Washington Post | Continue reading }

related { How Big Companies Spy on Your Emails }

Like Pate-by-the-Neva or Pete-over-Meer

4.jpg

When privately owned land vanishes under the water, who does it belong to?

The problem is a result of the state’s rapidly changing landscape. About 80 percent of Louisiana’s coast is privately owned. But, under an old law, as coastal erosion and sea level rise turn the land into open water the area becomes property of the state, including the mineral rights underneath.

Private landowners have become more adamant about restricting access to water on their property in order to assert their claim to the minerals underneath it. But boaters often have difficulty figuring out where private property ends and public waterways begin. Since 2003, Louisiana law does not require landowners to post signs demarcating their property. The resulting confusion led the Bass Anglers Sportsman Society, or BASS, to announce in 2017 that it would no longer host professional fishing tournaments in Louisiana tidal waters, where fishers risk being arrested.

{ NOLA | Continue reading }

{ Scott Kelly and Ben Polkinghorne, Signs of the Times, 2017 }

Everywhere erriff you went and every bung you arver dropped into, in cit or suburb or in addled areas, the Rose and Bottle or Phoenix Tavern or Power’s Inn or Jude’s Hotel or wherever you scoured the countryside from Nannywater to Vartryville or from Porta Lateen to the lootin quarter

22.jpg

On Monday, the Justice Department announced that it was charging four members of China’s People’s Liberation Army with the 2017 Equifax breach that resulted in the theft of personal data of about 145 million Americans.

Using the personal data of millions of Americans against their will is certainly alarming. But what’s the difference between the Chinese government stealing all that information and a data broker amassing it legally without user consent and selling it on the open market? Both are predatory practices to invade privacy for insights and strategic leverage. […]

Equifax is eager to play the hapless victim in all this. […] “The attack on Equifax was an attack on U.S. consumers as well as the United States,” [Equifax’s chief executive] said. […]

According to a 2019 class-action lawsuit, the company’s cybersecurity practices were a nightmare. The suit alleged that “sensitive personal information relating to hundreds of millions of Americans was not encrypted, but instead was stored in plain text” and “was accessible through a public-facing, widely used website.” Another example of the company’s weak safeguards, according to the suit, shows the company struggling to use a competent password system. “Equifax employed the username ‘admin’ and the password ‘admin’ to protect a portal used to manage credit disputes,” it read.

Though the attack was quite sophisticated — the hackers sneaked out information in small, hard to detect chunks and routed internet traffic through 34 servers in over a dozen countries to cover their tracks — Equifax’s apparent carelessness made it a perfect target.

According to a 2019 class-action lawsuit, the company’s cybersecurity practices were a nightmare. The suit alleged that “sensitive personal information relating to hundreds of millions of Americans was not encrypted, but instead was stored in plain text” and “was accessible through a public-facing, widely used website.” Another example of the company’s weak safeguards, according to the suit, shows the company struggling to use a competent password system. “Equifax employed the username ‘admin’ and the password ‘admin’ to protect a portal used to manage credit disputes,” it read.

The takeaway: While almost anything digital is at some risk of being hacked, the Equifax attack was largely preventable.

{ NY TImes | Continue reading }

related { The End of Privacy as We Know It? }

related { The FBI downloaded CIA’s hacking tools using Starbuck’s WiFi }

ills and ells with loffs of toffs and pleures of bells

6.jpg

With about a dozen trucks an hour setting off from the avocado belt in Mexico’s western state of Michoacán for the U.S., armed robbers are zeroing in on the fast-growing, multibillion-dollar industry. The rise in avocado-related crime has turned parts of the state into no-go areas even for the police. […]

Until recently, Mexico’s organized crime groups’ main source of revenues from avocados centred around extortion — demands for protection money from farmers. But the sharp fall in the price of Mexican opium paste has forced them to diversify, according to analysts.

Increasingly they have started hijacking truckloads of fruit for export. […] The rise in avocado crime is thus indirectly linked to America’s opioid crisis. Americans’ increased use of fentanyl, a synthetic opioid used for pain relief, pushed down the price of heroin, which in turn slashed the price of Mexican opium. […]

Demand for avocados jumps ahead of the Super Bowl, America’s biggest sporting event, with Mexico shipping a record 127,000 tonnes to the U.S. for the occasion. Overall production is rising, hitting 1.09 million tonnes in the 2018-19 season, up nearly 4 per cent from the 1.05 million produced in 2017-18. Exports last season rose 5.4 per cent. Sales to the U.S., the largest importer of Mexican avocados, bring in almost US$2 billion a year, much of it going to smallholders.

{ Financial Post | Continue reading }

art { Evan Roth, Landscapes, 2016-ongoing }

Axe on thwacks on thracks, axenwise. One by one place.

Several delivery services, including Postmates, Seamless, Grubhub, and DoorDash, offer food from restaurants without their explicit permission. The delivery apps pull up restaurant menus listed online, from which customers make their selections, and couriers working for the apps place orders on their behalf. The process essentially inserts third-party apps as middlemen into a service many restaurants say they want control over, or wish to opt out of entirely.

{ Eater | Continue reading }

The Mookse had a sound eyes right but he could not all hear

26.jpg

Now we learn that San Diego City Attorney Mara Elliott gave the approval to General Electric to outfit 4,000 new “smart street lights” with cameras and microphones in 2017. […]

The City paid $30 million for the contract. But the larger issue is that General Electric has already made more than $1 billion dollars selling San Diego residents’ data to Wall Street.

The City of San Diego gave what appears to be unrestricted rights to the private data, according to the contract. […]

San Diego is now home to the largest mass surveillance operation across the country.

General Electric and its subsidiaries* have access to all the processed data in perpetuity with no oversight.

{ California Globe | Continue reading }

photo { Brad Rimmer }

Plato’s Republic though was hardly ever referenced by classical Latin authors like Juvenal, and it has been noted that it simply disappeared from literary awareness for a thousand years except for traces in the writings of Cicero and St. Augustine.

fire.jpg

Old emails, photos and files from years past sit undisturbed, awaiting a search […] The problem is that all those messages require energy to preserve them. […]

Right now, data centers consume about 2 percent of the world’s electricity, but that is expected to reach 8 percent by 2030. Moreover, only about 6 percent of all data ever created is in active use today, according to research from Hewlett Packard Enterprise. That means 94 percent is sitting in a vast “landfill” with a massive carbon footprint.

“It’s costing us the equivalent of maintaining the airline industry for data we don’t even use”

{ Japan Times | Continue reading }

I want to grow my own food but I can’t find bacon seeds

24.jpg

ExxonMobil, Shell, and Saudi Aramco are ramping up output of plastic—which is made from oil and gas, and their byproducts—to hedge against the possibility that a serious global response to climate change might reduce demand for their fuels, analysts say. Petrochemicals, the category that includes plastic, now account for 14 percent of oil use and are expected to drive half of oil demand growth between now and 2050, the International Energy Agency (IEA) says. The World Economic Forum predicts plastic production will double in the next 20 years.

{ Wired | Continue reading | Thanks Tim }

previously { The missing 99%: why can’t we find the vast majority of ocean plastic? }

photo { Kate Ballis }

‘The way in which the other presents himself, exceeding the idea of the other in me, we here name face.’ –Emmanuel Levinas

33.jpg

His tiny company, Clearview AI, devised a groundbreaking facial recognition app. You take a picture of a person, upload it and get to see public photos of that person, along with links to where those photos appeared. The system — whose backbone is a database of more than three billion images that Clearview claims to have scraped from Facebook, YouTube, Venmo and millions of other websites — goes far beyond anything ever constructed by the United States government or Silicon Valley giants. […]

Tech companies capable of releasing such a tool have refrained from doing so; in 2011, Google’s chairman at the time said it was the one technology the company had held back because it could be used “in a very bad way.” Some large cities, including San Francisco, have barred police from using facial recognition technology.

But without public scrutiny, more than 600 law enforcement agencies have started using Clearview in the past year, according to the company, which declined to provide a list. The computer code underlying its app, analyzed by The New York Times, includes programming language to pair it with augmented-reality glasses; users would potentially be able to identify every person they saw. The tool could identify activists at a protest or an attractive stranger on the subway, revealing not just their names but where they lived, what they did and whom they knew.

And it’s not just law enforcement: Clearview has also licensed the app to at least a handful of companies for security purposes. […]

In addition to Mr. Ton-That, Clearview was founded by Richard Schwartz — who was an aide to Rudolph W. Giuliani when he was mayor of New York — and backed financially by Peter Thiel, a venture capitalist behind Facebook and Palantir.

{ NY Times | Continue reading }

Is there ever a day that mattresses are not on sale?

31.jpg

The prospect of data-driven ads, linked to expressed preferences by identifiable people, proved in this past decade to be irresistible. From 2010 through 2019, revenue for Facebook has gone from just under $2 billion to $66.5 billion per year, almost all from advertising. Google’s revenue rose from just under $25 billion in 2010 to just over $155 billion in 2019. Neither company’s growth seems in danger of abating.

The damage to a healthy public sphere has been devastating. All that ad money now going to Facebook and Google once found its way to, say, Conde Nast, News Corporation, the Sydney Morning Herald, NBC, the Washington Post, El País, or the Buffalo Evening News. In 2019, more ad revenue flowed to targeted digital ads in the U.S. than radio, television, cable, magazine, and newspaper ads combined for the first time. It won’t be the last time. Not coincidentally, journalists are losing their jobs at a rate not seen since the Great Recession.

Meanwhile, there is growing concern that this sort of precise ad targeting might not work as well as advertisers have assumed. Right now my Facebook page has ads for some products I would not possibly ever desire.

{ Slate | Continue reading | Thanks Tim }

related { Amazon CEO Jeff Bezos says his company is developing a set of laws to regulate facial recognition technology that it plans to share with federal lawmakers. }

A gull. Gulls. Far calls.

42.jpg

Facebook said on Friday that it had removed hundreds of accounts with ties to the Epoch Media Group. […] Researchers said the profiles used photos generated by artificial intelligence. […]

The people behind the network of 610 Facebook accounts, 89 Facebook Pages, 156 Groups and 72 Instagram accounts posted about political news and issues in the United States, including President Trump’s impeachment, conservative ideology, political candidates, trade and religion. “This was a large, brazen network that had multiple layers of fake accounts and automation that systematically posted content with two ideological focuses: support of Donald Trump and opposition to the Chinese government,” Mr. Brookie said in an interview. […]

The people behind the network used artificial intelligence to generate profile pictures, Facebook said. They relied on a type of artificial intelligence called generative adversarial networks. These networks can, through a process called machine learning, teach themselves to create realistic images of faces, even though they do not belong to a real person. […] This A.I. technique did not actually make it harder for the company’s automated systems to detect the fakes, because the systems focus on patterns of behavior among accounts. […] Facebook said the accounts masked their activities by using a combination of fake and authentic American accounts to manage pages and groups on the platforms. 

{ NYTimes | Continue reading }

photo { Ian Strange, SOS, 2015-2017 }