Archive for the ‘CrashBlogging’ Category

Scientists Warn of Perilous Climate Shift Within Decades, Not Centuries

Saturday, April 2nd, 2016

Sure, we’ve got enough time to agonize over Cruz or Trump, over Hillary or Bernie.  Plenty of time.  What’s that you say, “Nature Bats Last”?

dennis

= = = = = = = = = = = = = = = = = =

The nations of the world agreed years ago to try to limit global warming to a level they hoped would prove somewhat tolerable. But leading climate scientists warned on Tuesday that permitting a warming of that magnitude would actually be quite dangerous.

The likely consequences would include killer storms stronger than any in modern times, the disintegration of large parts of the polar ice sheets and a rise of the sea sufficient to begin drowning the world’s coastal cities before the end of this century, the scientists declared.

“We’re in danger of handing young people a situation that’s out of their control,” said James E. Hansen, the retired NASA climate scientist who led the new research. The findings were released Tuesday morning by a European science journal, Atmospheric Chemistry and Physics.

A draft version of the paper was released last year, and it provoked a roiling debateamong climate scientists. The main conclusions have not changed, and that debate seems likely to be replayed in the coming weeks.

The basic claim of the paper is that by burning fossil fuels at a prodigious pace and pouring heat-trapping gases into the atmosphere, humanity is about to provoke an abrupt climate shift.

Specifically, the authors believe that fresh water pouring into the oceans from melting land ice will set off a feedback loop that will cause parts of the great ice sheets in Greenland and Antarctica to disintegrate rapidly.

That claim has intrigued some experts who say the paper may help explain puzzling episodes in Earth’s past when geological evidence suggests the climate underwent drastic shifts. Yet many other scientists are unconvinced by some of the specific assertions the authors are making.

“Some of the claims in this paper are indeed extraordinary,” said Michael E. Mann, a climate scientist at Pennsylvania State University. “They conflict with the mainstream understanding of climate change to the point where the standard of proof is quite high.”

Despite any reservations they might have about the new paper, virtually all climate scientists agree with Dr. Hansen’s group that society is not moving fast enough to reduce emissions of greenhouse gases, posing grave risks. An agreement reached late last year in Paris seeks to cut emissions, but it is not remotely ambitious enough to limit global warming to the degree Dr. Hansen regards as necessary.

Among Dr. Hansen’s colleagues, some of the discomfiture about the new paper stems from his dual roles as a publishing climate scientist and, in recent years, as a political activist. He has been arrested at rallies, and he has joined with a group of young people who sued the federal government over what they said was its failure to limit global warming.

Dr. Hansen argues that society is in such grave peril that he feels morally compelled to go beyond the normal role played by a scientist and to sound a clear warning.

That stance has made him a hero to college students fighting climate change, but some fellow scientists fear he has opened himself to the charge that he is skewing his scientific research for political purposes.

In 2009, nations agreed to try to limit the planetary warming to 3.6 degrees Fahrenheit, or 2 degrees Celsius, above the preindustrial level. The Earth has already warmed by about half that amount. The climate appears to be destabilizing, virtually all land ice on the planet has started to melt, and the oceans are rising at an accelerating pace.

The paper, written by Dr. Hansen and 18 other authors, dwells on the last time Earth warmed naturally, about 120,000 years ago, when the temperature reached a level estimated to have been only slightly higher than today. Large chunks of the polar ice disintegrated then, and scientists have established that the sea level rose 20 to 30 feet.

Climate scientists agree that humanity is about to cause an equal or greater rise in sea level, but they have tended to assume that such a large increase would take centuries, at least. The new paper argues that it could happen far more rapidly, with the worst case being several feet of sea-level rise over the next 50 years, followed by increases so precipitous that they would force humanity to beat a hasty retreat from the coasts.

“That would mean loss of all coastal cities, most of the world’s large cities and all their history,” Dr. Hansen said in a video statement that accompanied the new paper.

The paper identifies a specific mechanism that the scientists say they believe could help cause such an abrupt climate shift.

Their idea is that the initial melting of the great ice sheets will put a cap of relatively fresh water on the ocean surfaces near Antarctica and Greenland. That, they think, will slow or even shut down the system of ocean currents that redistributes heat around the planet and allows some of it to escape into space. Warmth will then accumulate in the deeper parts of the ocean, the scientists think, speeding the melting of parts of the ice sheets that sit below sea level.

In addition, a wider temperature difference between the tropics and the poles will encourage powerful storms, the researchers contend. The paper cites evidence, much of it contested, that immense storms happened during the warm period 120,000 years ago.

For instance, the paper says such storms might have thrown giant boulders onto coastal ridges in the Bahamas, though other experts think a tsunami might have been responsible.

  • To the original:  

The Revenge of the Lower Classes and the Rise of American Fascism

Monday, March 28th, 2016
  • Not sure I have a lot to say about this other than it makes me feel that where it says “Futurist” on my business card is not unjustified.
  • dennis

= = = = = = = = = = = = = = = = = = = = =

By Chris Hedges

College-educated elites, on behalf of corporations, carried out the savage neoliberal assault on the working poor. Now they are being made to pay. Their duplicity—embodied in politicians such as Bill and Hillary Clinton and Barack Obama—succeeded for decades. These elites, many from East Coast Ivy League schools, spoke the language of values—civility, inclusivity, a condemnation of overt racism and bigotry, a concern for the middle class—while thrusting a knife into the back of the underclass for their corporate masters. This game has ended.

There are tens of millions of Americans, especially lower-class whites, rightfully enraged at what has been done to them, their families and their communities. They have risen up to reject the neoliberal policies and political correctness imposed on them by college-educated elites from both political parties: Lower-class whites are embracing an American fascism.

These Americans want a kind of freedom—a freedom to hate. They want the freedom to use words like “nigger,” “kike,” “spic,” “chink,” “raghead” and “fag.” They want the freedom to idealize violence and the gun culture. They want the freedom to have enemies, to physically assault Muslims, undocumented workers, African-Americans, homosexuals and anyone who dares criticize their cryptofascism. They want the freedom to celebrate historical movements and figures that the college-educated elites condemn, including the Ku Klux Klan and the Confederacy. They want the freedom to ridicule and dismiss intellectuals, ideas, science and culture. They want the freedom to silence those who have been telling them how to behave. And they want the freedom to revel in hypermasculinity, racism, sexism and white patriarchy. These are the core sentiments of fascism. These sentiments are engendered by the collapse of the liberal state.

The Democrats are playing a very dangerous game by anointing Hillary Clinton as their presidential candidate. She epitomizes the double-dealing of the college-educated elites, those who speak the feel-your-pain language of ordinary men and women, who hold up the bible of political correctness, while selling out the poor and the working class to corporate power.

The Republicans, energized by America’s reality-star version of Il Duce, Donald Trump, have been pulling in voters, especially new voters, while the Democrats are well below the voter turnouts for 2008. In the voting Tuesday, 5.6 million votes were cast for the Democrats while 8.3 million went to the Republicans. Those numbers were virtually reversed in 2008—8.2 million for the Democrats and about 5 million for the Republicans.

Richard Rorty in his last book, “Achieving Our Country,” written in 1998, presciently saw where our postindustrial nation was headed.

Many writers on socioeconomic policy have warned that the old industrialized democracies are heading into a Weimar-like period, one in which populist movements are likely to overturn constitutional governments. Edward Luttwak, for example, has suggested that fascism may be the American future. The point of his book The Endangered American Dream is that members of labor unions, and unorganized unskilled workers, will sooner or later realize that their government is not even trying to prevent wages from sinking or to prevent jobs from being exported. Around the same time, they will realize that suburban white-collar workers—themselves desperately afraid of being downsized—are not going to let themselves be taxed to provide social benefits for anyone else.

At that point, something will crack. The nonsuburban electorate will decide that the system has failed and start looking around for a strongman to vote for—someone willing to assure them that, once he is elected, the smug bureaucrats, tricky lawyers, overpaid bond salesmen, and postmodernist professors will no longer be calling the shots. A scenario like that of Sinclair Lewis’ novel It Can’t Happen Here may then be played out. For once a strongman takes office, nobody can predict what will happen. In 1932, most of the predictions made about what would happen if Hindenburg named Hitler chancellor were wildly overoptimistic.

One thing that is very likely to happen is that the gains made in the past forty years by black and brown Americans, and by homosexuals, will be wiped out. Jocular contempt for women will come back into fashion. The words “nigger” and “kike” will once again be heard in the workplace. All the sadism which the academic Left has tried to make unacceptable to its students will come flooding back. All the resentment which badly educated Americans feel about having their manners dictated to them by college graduates will find an outlet.

Fascist movements build their base not from the politically active but the politically inactive, the “losers” who feel, often correctly, they have no voice or role to play in the political establishment. The sociologist Émile Durkheim warned that the disenfranchisement of a class of people from the structures of society produced a state of “anomie”—a “condition in which society provides little moral guidance to individuals.” Those trapped in this “anomie,” he wrote, are easy prey to propaganda and emotionally driven mass movements. Hannah Arendt, echoing Durkheim, noted that “the chief characteristic of the mass man is not brutality and backwardness, but his isolation and lack of normal social relationships.”

In fascism the politically disempowered and disengaged, ignored and reviled by the establishment, discover a voice and a sense of empowerment.

As Arendt noted, the fascist and communist movements in Europe in the 1930s “… recruited their members from this mass of apparently indifferent people whom all other parties had given up as too apathetic or too stupid for their attention. The result was that the majority of their membership consisted of people who had never before appeared on the political scene. This permitted the introduction of entirely new methods into political propaganda, and indifference to the arguments of political opponents; these movements not only placed themselves outside and against the party system as a whole, they found a membership that had never been reached, never been ‘spoiled’ by the party system. Therefore they did not need to refute opposing arguments and consistently preferred methods which ended in death rather than persuasion, which spelled terror rather than conviction. They presented disagreements as invariably originating in deep natural, social, or psychological sources beyond the control of the individual and therefore beyond the control of reason. This would have been a shortcoming only if they had sincerely entered into competition with either parties; it was not if they were sure of dealing with people who had reason to be equally hostile to all parties.”

Fascism is aided and advanced by the apathy of those who are tired of being conned and lied to by a bankrupt liberal establishment, whose only reason to vote for a politician or support a political party is to elect the least worst. This, for many voters, is the best Clinton can offer.

Fascism expresses itself in familiar and comforting national and religious symbols, which is why it comes in various varieties and forms. Italian fascism, which looked back to the glory of the Roman Empire, for example, never shared the Nazis’ love of Teutonic and Nordic myths. American fascism too will reach back to traditional patriotic symbols, narratives and beliefs.

Robert Paxton wrote in “The Anatomy of Fascism”:

The language and symbols of an authentic American fascism would, of course, have little to do with the original European models. They would have to be as familiar and reassuring to loyal Americans as the language and symbols of the original fascisms were familiar and reassuring to many Italians and Germans, as [George] Orwell suggested. Hitler and Mussolini, after all, had not tried to seem exotic to their fellow citizens. No swastikas in an American fascism, but Stars and Stripes (or Stars and Bars) and Christian crosses. No fascist salute, but mass recitations of the pledge of allegiance. These symbols contain no whiff of fascism in themselves, of course, but an American fascism would transform them into obligatory litmus tests for detecting the internal enemy.

Fascism is about an inspired and seemingly strong leader who promises moral renewal, new glory and revenge. It is about the replacement of rational debate with sensual experience. This is why the lies, half-truths and fabrications by Trump have no impact on his followers. Fascists transform politics, as philosopher and cultural critic Walter Benjamin pointed out, into aesthetics. And the ultimate aesthetic for the fascist, Benjamin said, is war.

Paxton singles out the amorphous ideology characteristic of all fascist movements.

Fascism rested not upon the truth of its doctrine but upon the leader’s mystical union with the historic destiny of his people, a notion related to romanticist ideas of national historic flowering and of individual artistic or spiritual genius, though fascism otherwise denied romanticism’s exaltation of unfettered personal creativity. The fascist leader wanted to bring his people into a higher realm of politics that they would experience sensually: the warmth of belonging to a race now fully aware of its identity, historic destiny, and power; the excitement of participating in a wave of shared feelings, and of sacrificing one’s petty concerns for the group’s good; and the thrill of domination.

There is only one way left to blunt the yearning for fascism coalescing around Trump. It is to build, as fast as possible, movements or parties that declare war on corporate power, engage in sustained acts of civil disobedience and seek to reintegrate the disenfranchised—the “losers”—back into the economy and political life of the country. This movement will never come out of the Democratic Party. If Clinton prevails in the general election Trump may disappear, but the fascist sentiments will expand. Another Trump, perhaps more vile, will be vomited up from the bowels of the decayed political system. We are fighting for our political life. Tremendous damage has been done by corporate power and the college-educated elites to our capitalist democracy. The longer the elites, who oversaw this disemboweling of the country on behalf of corporations—who believe, as does CBS Chief Executive Officer Leslie Moonves, that however bad Trump would be for America he would at least be good for corporate profit—remain in charge, the worse it is going to get.

  • to the original:

Four billion people face severe water scarcity, new research finds

Tuesday, February 16th, 2016

Water shortages affecting two-thirds of world’s population for a month every year and the crisis is far worse than previously thought

At least two-thirds of the global population, over 4 billion people, live with severe water scarcity for at least one month every year, according to a major new analysis.

The revelation shows water shortages, one of the most dangerous challenges the world faces, is far worse previously than thought.

The new research also reveals that 500m people live in places where water consumption is double the amount replenished by rain for the entire year, leaving them extremely vulnerable as underground aquifers run down.

Many of those living with fragile water resources are in India and China, but other regions highlighted are the central and western US, Australia and even the city of London.

These water problems are set to worsen, according to the researchers, as population growth and increasing water use – particularly through eating meat – continues to rise.

In January, water crises were rated as one of three greatest risks of harm to people and economies in the next decade by the World Economic Forum, alongside climate change and mass migration. In places, such as Syria, the three risks come together: a recent study found that climate change made the severe 2007-2010 drought much more likely and the drought led to mass migration of farming families into cities.

“If you look at environmental problems, [water scarcity] is certainly the top problem,” said Prof Arjen Hoekstra, at the University of Twente in the Netherlands and who led the new research. “One place where it is very, very acute is in Yemen.”

Yemen could run out of water within a few years, but many other places are living on borrowed time as aquifers are continuously depleted, including Pakistan, Iran, Mexico, and Saudi Arabia.

Hoekstra also highlights the Murray-Darling basin in Australia and the midwest of the US. “There you have the huge Ogallala acquifer, which is being depleted.” He said even rich cities like London in the UK were living unsustainably: “You don’t have the water in the surrounding area to sustain the water flows” to London in the long term.

The new study, published in the journal Science Advances on Friday, is the first to examine global water scarcity on a monthly basis and at a resolution of 31 miles or less. It analysed data from 1996-2005 and found severe water scarcity – defined as water use being more than twice the amount being replenished – affected 4 billion people for at least one month a year.

“The results imply the global water situation is much worse than suggested by previous studies, which estimated such scarcity impacts between 1.7 billion and 3.1 billion people,” the researchers concluded. The new work also showed 1.8 billion people suffer severe water scarcity for at least half of every year.

Farming is the biggest user of water and the growing global population requires more food. Furthermore, changing diets are having a major impact, as people with rising incomes eat more meat.

“Taking a shorter shower is not the answer” to the global problem, said Hoekstra, because just 1-4% of a person’s water footprint is in the home, while 25% is via meat consumption. It takes over 15,000 litres of water to make 1kg of beef, with almost all of that used to irrigate the crops fed to the cattle.

Another unique aspect of the new research was that it included environmental water requirements, ie the water needed to ensure that life survives in the rivers and lakes. Fish can be important sources of food for people, who also use waterways for transport.

Even just one month of severe water scarcity can have a devastating impact on the health of a river, said Hoekstra: “An empty river is not a river.” Rivers that run dry before they reach the end of their course, or come close to doing so, include the Colorado river in the western US and the Yellow river in China.

David Tickner, chief freshwater adviser at WWF-UK, said: “This paper is another pointer to the urgency of this challenge. Billions of people, and many economies, are increasingly suffering because of water-related risks which could be better managed. The same risks are causing a collapse in aquatic wildlife around the globe.”

Hoekstra said caps on water use should be put in place for all river basins, companies should be transparent about how much water is needed to make their products and look to reduce it while investors should incorporate water sustainability into their decision-making.

  • To the Original:

Maybe Better If You Don’t Read This Story on Public WiFi

Thursday, January 7th, 2016

– I knew things were bad – but I didn’t know they were this bad.

– Unless you want to be in complete denial about your computer security issues, you will want to read this.

– dennis

– – – – – – – – – – – – – – – –

We took a hacker to a café and, in 20 minutes, he knew where everyone else was born, what schools they attended, and the last five things they googled.

In his backpack, Wouter Slotboom, 34, carries around a small black device, slightly larger than a pack of cigarettes, with an antenna on it. I meet Wouter by chance at a random cafe in the center of Amsterdam. It is a sunny day and almost all the tables are occupied. Some people talk, others are working on their laptops or playing with their smartphones.

Wouter removes his laptop from his backpack, puts the black device on the table, and hides it under a menu. A waitress passes by and we ask for two coffees and the password for the WiFi network. Meanwhile, Wouter switches on his laptop and device, launches some programs, and soon the screen starts to fill with green text lines. It gradually becomes clear that Wouter’s device is connecting to the laptops, smartphones, and tablets of cafe visitors.

On his screen, phrases like “iPhone Joris” and “Simone’s MacBook” start to appear. The device’s antenna is intercepting the signals that are being sent from the laptops, smartphones, and tablets around us.

More text starts to appear on the screen. We are able to see which WiFi networks the devices were previously connected to. Sometimes the names of the networks are composed of mostly numbers and random letters, making it hard to trace them to a definite location, but more often than not, these WiFi networks give away the place they belong to.

We learn that Joris had previously visited McDonald’s, probably spent his vacation in Spain (lots of Spanish-language network names), and had been kart-racing (he had connected to a network belonging to a well-known local kart-racing center). Martin, another café visitor, had been logged on to the network of Heathrow airport and the American airline Southwest. In Amsterdam, he’s probably staying at the White Tulip Hostel. He had also paid a visit to a coffee shop called The Bulldog.

Session 1:

Let everyone connect to our fake network

The waitress serves us our coffee and hands us the WiFi password. After Slotboom is connected, he is able to provide all the visitors with an internet connection and to redirect all internet traffic through his little device.

Most smartphones, laptops, and tablets automatically search and connect to WiFi networks. They usually prefer a network with a previously established connection. If you have ever logged on to the T-Mobile network on the train, for example, your device will search for a T-Mobile network in the area.

Slotboom’s device is capable of registering these searches and appearing as that trusted WiFi network. I suddenly see the name of my home network appear on my iPhone’s list of available networks, as well as my workplace, and a list of cafes, hotel lobbies, trains, and other public places I’ve visited. My phone automatically connects itself to one of these networks, which all belong to the black device.

Slotboom can also broadcast a fictitious network name, making users believe they are actually connecting to the network of the place they’re visiting. For example, if a place has a WiFi network consisting of random letters and numbers (Fritzbox xyz123), Slotboom is able to provide the network name (Starbucks). People, he says, are much more willing to connect to these.

We see more and more visitors log on to our fictitious network. The siren song of the little black device appears to be irresistible. Already 20 smartphones and laptops are ours. If he wanted to, Slotboom could now completely ruin the lives of the people connected: He can retrieve their passwords, steal their identity, and plunder their bank accounts. Later today, he will show me how. I have given him permission to hack me in order to demonstrate what he is capable of, though it could be done to anyone with a smartphone in search of a network, or a laptop connecting to a WiFi network.

Everything, with very few exceptions, can be cracked.

The idea that public WiFi networks are not secure is not exactly news. It is, however, news that can’t be repeated often enough. There are currently more than 1.43 billion smartphone users worldwide and more than 150 million smartphone owners in the U.S. More than 92 million American adults own a tablet and more than 155 million own a laptop. Each year the worldwide demand for more laptops and tablets increases. In 2013, an estimated 206 million tablets and 180 million laptops were sold worldwide. Probably everyone with a portable device has once been connected to a public WiFi network: while having a coffee, on the train, or at a hotel.

The good news is that some networks are better protected than others; some email and social media services use encryption methods that are more secure than their competitors. But spend a day walking in the city with Wouter Slotboom, and you’ll find that almost everything and everyone connected to a WiFi network can be hacked. A study from threat intelligence consultancy Risk Based Security estimates that more than 822 million records were exposed worldwide in 2013, including credit card numbers, birth dates, medical information, phone numbers, social security numbers, addresses, user names, emails, names, and passwords. Sixty-five percent of those records came from the U.S. According to IT security firm Kaspersky Lab, in 2013 an estimated 37.3 million users worldwide and 4.5 million Americans were the victim of phishing—or pharming—attempts, meaning payment details were stolen from hacked computers, smartphones, or website users.

Report after report shows that digital identity fraud is an increasingly common problem. Hackers and cybercriminals currently have many different tricks at their disposal. But the prevalence of open, unprotected WiFi networks does make it extremely easy for them. The Netherlands National Cyber ??Security Center, a division of the Ministry of Security and Justice, did not issue the following advice in vain: “It is not advisable to use open WiFi networks in public places. If these networks are used, work or financial related activities should better be avoided.”

Slotboom calls himself an “ethical hacker,” or one of the good guys; a technology buff who wants to reveal the potential dangers of the internet and technology. He advises individuals and companies on how to better protect themselves and their information. He does this, as he did today, usually by demonstrating how easy it is to inflict damage. Because really, it’s child’s play: The device is cheap, and the software for intercepting traffic is very easy to use and is readily available for download. “All you need is 70 Euros, an average IQ, and a little patience,” he says. I will refrain from elaborating on some of the more technical aspects, such as equipment, software, and apps needed to go about hacking people.

Session 2:

Scanning for name, passwords, and sexual orientation

Armed with Slotboom’s backpack, we move to a coffeehouse that is known for the beautiful flowers drawn in the foam of the lattes, and as a popular spot for freelancers working on laptops. This place is now packed with people concentrating on their screens.

Slotboom switches on his equipment. He takes us through the same steps, and within a couple of minutes, 20 or so devices are connected to ours. Again we see their Mac-addresses and login history, and in some cases their owners’ names. At my request, we now go a step further.

Slotboom launches another program (also readily available for download), which allows him to extract even more information from the connected smartphones and laptops. We are able to see the specifications of the mobile phone models (Samsung Galaxy S4), the language settings for the different devices, and the version of the operating system used (iOS 7.0.5). If a device has an outdated operating system, for example, there are always known “bugs,” or holes in the security system that can be easily exploited. With this kind of information, you have what you need to break into the operating system and take over the device. A sampling of the coffeehouse customers reveals that none of the connected devices have the latest version of the operating system installed. For all these legacy systems, a known bug is listed online.

We can now see some of the actual internet traffic of those around us. We see that someone with a MacBook is browsing the site Nu.nl. We can see that many devices are sending documents using WeTransfer, some are connecting to Dropbox, and some show activity on Tumblr. We see that someone has just logged on to FourSquare. The name of this person is also shown, and, after googling his name, we recognize him as the person sitting just a few feet away from us.

Information comes flooding in, even from visitors who are not actively working or surfing. Many email programs and apps constantly make contact with their servers—a necessary step for a device to retrieve new emails. For some devices and programs, we are able to see what information is being sent, and to which server.

And now it’s getting really personal. We see that one visitor has the gay dating app Grindr installed on his smartphone. We also see the name and type of the smartphone he’s using (iPhone 5s). We stop here, but it would be a breeze to find out to who the phone belongs to. We also see that someone’s phone is attempting to connect to a server in Russia, sending the password along with it, which we are able to intercept.

Session 3:

Obtaining information on occupation, hobbies, and relational problems

Many apps, programs, websites, and types of software make use of encryption technologies. These are there to ensure that the information sent and received from a device is not accessible to unauthorized eyes. But once the user is connected to Slotboom’s WiFi network, these security measures can be circumvented relatively easily, with the help of decryption software.

To our shared surprise, we see an app sending personal information to a company that sells online advertising. Among other things, we see the location data, technical information of the phone, and information of the WiFi network. We can also see the name (first and last) of a woman using the social bookmarking website Delicious. Delicious allows users to share websites—bookmarks—they are interested in. In principle, the pages that users of Delicious share are available publicly, yet we can’t help feeling like voyeurs when we realize just how much we are able to learn about this woman on the basis of this information.

First we google her name, which immediately allows us to determine what she looks like and where in the coffeehouse she is sitting. We learn that she was born in a different European country and only recently moved to the Netherlands. Through Delicious we discover that she’s been visiting the website of a Dutch language course and she has bookmarked a website with information on the Dutch integration course.

In less than 20 minutes, here’s what we’ve learned about the woman sitting 10 feet from us: where she was born, where she studied, that she has an interest in yoga, that she’s bookmarked an online offer for a anti-snore mantras, recently visited Thailand and Laos, and shows a remarkable interest in sites that offer tips on how to save a relationship.

Slotboom shows me some more hacker tricks. Using an app on his phone, he is able to change specific words on any website. For example, whenever the word “Opstelten” (the name of a Dutch politician) is mentioned, people see the word “Dutroux” (the name of a convicted serial killer) rendered on the page instead. We tested it and it works. We try another trick: Anyone loading a website that includes pictures gets to see a picture selected by Slotboom. This all sounds funny if you’re looking for some mischief, but it also makes it possible to load images of child pornography on someone’s smartphone, the possession of which is a criminal offense.

Password intercepted

We visit yet another cafe. My last request to Slotboom is to show me what he would do if he wanted to really harm me. He asks me to go to Live.com (the Microsoft email site) and enter a random username and password. A few seconds later, the information I just typed appears on his screen. “Now I have the login details of your email account,” Slotboom says. “The first thing I would do is change the password of your account and indicate to other services you use that I have forgotten my password. Most people use the same email account for all services. And those new passwords will then be sent to your mailbox, which means I will have them at my disposal as well.” We do the same for Facebook: Slotboom is able to intercept the login name and password I entered with relative ease.

Another trick that Slotboom uses is to divert my internet traffic. For example, whenever I try to access the webpage of my bank, he has instructed his program to re-direct me to a page he owns: a cloned site that appears to be identical to the trusted site, but is in fact completely controlled by Slotboom. Hackers call this DNS spoofing. The information I entered on the site is stored on the server owned by Slotboom. Within 20 minutes he’s obtained the login details, including passwords for my Live.com, SNS Bank, Facebook, and DigiD accounts.

I will never again be connecting to an insecure public WiFi network without taking security measures.

– Follow this link to the original of this story…

Iranian hackers infiltrated U.S. power grid, dam computers, reports say

Thursday, December 24th, 2015
  • This is a scary article.  And reading it, you might be forgiven if you think this is something new and that our government’s security folks will be all over soon to quash it.
  • But,in fact, it is not new.  Not hardly.  The United State’s power structures have been under attack by foreign hackers and very likely compromised for sometime now.
  • Compromised how?  And how badly, you say?
  • Well, first they are compromised primarily because the Internet and the power grid networks involved are just simply too much and too complicated. The number of people who really understand technical stuff at this level are few. And the need to have our power infrastructure all up and running all the time is intense. We have thousands of facilities, thousands of people working in the industry and God only knows how many software vendors have written packages to help make it all run and sold the packages to the industry. Just think of how little you, your friends and your neighbors (and virtually all the people you know) really know about computers and networks and you’ll begin to see how few are protecting so many from so much.
  • And how badly are we compromised?
  • Well, you’ll have to read the article to get some idea of how badly we’re compromised – but know this:  this is not new.  Here’s a link to an article I posted back in April of 2009 – on this same subject.  You might read it first and then read the new article and see if you think ‘the government’s security folks will be all over [this situation] soon to quash it’.
  • Here’s a few quotes from the new article to get your juices flowing:
  •  
    • “The hackers have gained access to an aging, outdated power system. Many of the substations and equipment that move power across the U.S. are decrepit and were never built with network security in mind; hooking the plants up to the Internet over the last decade has given hackers new backdoors in.”
    • “Last year, Homeland Security released several maps that showed a virtual hit list of critical infrastructure, including two substations in the San Francisco Bay area, water and gas pipelines and a refinery. And according to a previously reported study by the Federal Energy Regulatory Commission, a coordinated attack on just nine critical power stations could cause a coast-to-coast blackout that could last months, far longer than the one that plunged the Northeast into darkness in 2003.”
  • dennis

= = = = = = = = = = = = = = = = = = = = = = =

Iranian hackers breached the control system of a dam near New York City in 2013, and are also implicated in some of a dozen attacks that have infiltrated the U.S. power grid system in the last decade, say two separate reports.

The reports by the Wall Street Journal and the Associated Press both raise concerns about the security of the country’s aging infrastructure.

Two people familiar with the dam breach told the Wall Street Journal it occurred at the Bowman Avenue Dam in Rye, New York. The small structure about 20 miles from New York City is used for flood control.

The hackers gained access to the dam through a cellular modem, the Journal said, citing an unclassified Department of Homeland Security summary of the incident that did not specify the type of infrastructure.

The breach came as hackers linked to the Iranian government were attacking U.S. bank websites after American spies damaged an Iranian nuclear facility with the Stuxnet computer worm.

Homeland Security spokesman S.Y. Lee would not confirm the breach to Reuters. He said the department’s 24-hour cybersecurity information-sharing hub and an emergency response team coordinate responses to threats to and vulnerabilities in critical infrastructure.

Meanwhile, about a dozen times in the last decade, sophisticated foreign hackers have gained enough remote access to control the operations networks that keep the lights on, according to top experts who spoke only on condition of anonymity due to the sensitive nature of the subject matter, the Associated Press found.

Security researcher Brian Wallace was on the trail of hackers who had snatched a California university’s housing files when he stumbled into one example: Cyberattackers had opened a pathway into the networks running the United States power grid.

Digital clues pointed to Iranian hackers. And Wallace found that they had already taken passwords, as well as engineering drawings of dozens of power plants, at least one with the title “Mission Critical.”

The drawings were so detailed that experts say skilled attackers could have used them, along with other tools and malicious code, to knock out electricity flowing to millions of homes.

The attack targeted Calpine Corp., a power producer with 82 plants operating in 18 states and Canada — it has one plant in Courtright, Ont. The hacking software appeared to originate in Iran, but the hacking group included members in the Netherlands, Canada, and the United Kingdom.

Wallace was astonished. But this breach, The Associated Press has found, was not unique.

Capability to strike at will

These intrusions have not caused the kind of cascading blackouts that are feared by the intelligence community. But so many attackers have stowed away in the systems that run the U.S. electric grid that experts say they likely have the capability to strike at will.

The hackers have gained access to an aging, outdated power system. Many of the substations and equipment that move power across the U.S. are decrepit and were never built with network security in mind; hooking the plants up to the Internet over the last decade has given hackers new backdoors in.

Distant wind farms, home solar panels, smart meters and other networked devices must be remotely monitored and controlled, which opens up the broader system to fresh points of attack. Hundreds of contractors sell software and equipment to energy companies, and attackers have successfully used those outside companies as a way to get inside networks tied to the grid.

None of the world’s top industries would be profitable if they paid for the natural capital they use

Saturday, December 19th, 2015
  • With truths like this laying about on the ground around us, is it any wonder some of us get discouraged about our prospects.
  • dennis

—– —– —– —– —– —– —– —– —–

The notion of “externalities” has become familiar in environmental circles. It refers to costs imposed by businesses that are not paid for by those businesses. For instance, industrial processes can put pollutants in the air that increase public health costs, but the public, not the polluting businesses, picks up the tab. In this way, businesses privatize profits and publicize costs.

While the notion is incredibly useful, especially in folding ecological concerns into economics, I’ve always had my reservations about it. Environmentalists these days love speaking in the language of economics — it makes them sound Serious — but I worry that wrapping this notion in a bloodless technical term tends to have a narcotizing effect. It brings to mind incrementalism: boost a few taxes here, tighten a regulation there, and the industrial juggernaut can keep right on chugging. However, if we take the idea seriously, not just as an accounting phenomenon but as a deep description of current human practices, its implications are positively revolutionary.

To see what I mean, check out a recent report [PDF] done by environmental consultancy Trucost on behalf of The Economics of Ecosystems and Biodiversity (TEEB) program sponsored by United Nations Environmental Program. TEEB asked Trucost to tally up the total “unpriced natural capital” consumed by the world’s top industrial sectors. (“Natural capital” refers to ecological materials and services like, say, clean water or a stable atmosphere; “unpriced” means that businesses don’t pay to consume them.)

It’s a huge task; obviously, doing it required a specific methodology that built in a series of assumptions. (Plenty of details in the report.) But it serves as an important signpost pointing the way to the truth about externalities.

Here’s how those costs break down:

The majority of unpriced natural capital costs are from greenhouse gas emissions (38%), followed by water use (25%), land use (24%), air pollution (7%), land and water pollution (5%), and waste (1%).

So how much is that costing us? Trucost’s headline results are fairly stunning.

First, the total unpriced natural capital consumed by the more than 1,000 “global primary production and primary processing region-sectors” amounts to $7.3 trillion a year — 13 percent of 2009 global GDP.

(A “region-sector” is a particular industry in a particular region — say, wheat farming in East Asia.)

Second, surprising no one, coal is the enemy of the human race. Trucost compiled rankings, both of the top environmental impacts and of the top industrial culprits.

Here are the top five biggest environmental impacts and the region-sectors responsible for them:

UNEP: top five environmental impacts
Click to embiggen.
UNEP

The biggest single environmental cost? Greenhouse gases from coal burning in China. The fifth biggest? Greenhouse gases from coal burning in North America. (This also shows what an unholy nightmare deforestation in South America is.)

Now, here are the top five industrial sectors ranked by total ecological damages imposed:

 

UNEP: top five industrial sectors by impact
Click to embiggen.
UNEP

It’s coal again! This time North American coal is up at number three.

Trucost’s third big finding is the coup de grace. Of the top 20 region-sectors ranked by environmental impacts, none would be profitable if environmental costs were fully integrated. Ponder that for a moment: None of the world’s top industrial sectors would be profitable if they were paying their full freight. Zero.

That amounts to an global industrial system built on sleight of hand. As Paul Hawken likes to put it, we are stealing the future, selling it in the present, and calling it GDP.

This gets back to what I was saying at the top. The notion of “externalities” is so technical, such an economist’s term. Got a few unfortunate side effects, so just move some numbers from Column A to Column B, right?

But the UNEP report makes clear that what’s going on today is more than a few accounting oversights here and there. The distance between today’s industrial systems and truly sustainable industrial systems — systems that do not spend down stored natural capital but instead integrate into current energy and material flows — is not one of degree, but one of kind. What’s needed is not just better accounting but a new global industrial system, a new way of providing for human wellbeing, and fast. That means a revolution.

  • To the original article:

More on ISIS

Monday, November 16th, 2015
  • Back on May 8th, 2015, while we were in Montreal, Canada, I wrote a piece on ISIS (here).  In it, I confessed I was mystified by many things about ISIS.  Such as where did it come from, how did it get so powerful, how did it have so much money and why did the west’s response to it seem so muted.
  • In the last day, I’ve read two articles have significantly enlightened me.
  • The first is entitled, “You can’t understand ISIS if you don’t know the history of Wahhabism in Saudi Arabia” and which was penned by Alastair Crooke writing in The World Post
  • The second is entitled, “Why ISIS fights” by Martin Chulov writing for the Guardian in the U.K.
  • I highly recommend that you read them.  They are a bit long and dense with history and information but will be well worth your effort.  If you can only read one, then I recommend the first.
  • I am going to cut-to-the-chase, as they say, and tell you what I’ve gotten from reading them.  If you don’t like spoilers, then go read the articles now before you continue.  This will be a good thing to do because then you will be able to see if you come to the same conclusions as I have.

——-

  • The central thread that comes out of these articles is the long-standing and pervasive influence of Wahhabism (Wiki article on this here) in the Middle East and most especially in the Arabian Peninsula.
  • Wahhabism is considered to be a branch of Sunni Islam and it is a very conservative form of that faith which traces it roots to the 18th century and a man named, Muhammad ibn Abd al-Wahhab.
  • The fortunes of this branch of Islam and those of the Saud family, have waxed and waned in Arabia for nearly 150 years since al-Wahhab first began preaching.
  • It is key to note that Wahhabism is the variety of Islam that is practiced in Saudi Arabia today and that the Saud family became, and has been for many years, the Saudi Royal Family.

——

  • ISIS today is a reinvigorated version of Wahhabism.  A version that has reinvented itself to be true to its original tenants.
  • Pure Wahhabism is a very conservative faith and its ISIS practitioners strongly feel that the version of Wahhabism practiced now in Saudi Arabia has lost its way due to the influence of oil, the west and the Saud family itself.  They also feel that anything other than pure Wahhabism is simply wrong and such people only deserve killing.
  • And many very wealthy Saudis have sympathy for these fundamentalist Wahhabian views and herein lies the source of the vast wealth that underlies ISIS.
  • It gets worse.
  • Saudi Arabia, where these donors live, is a major ally of the United States in it struggle against other disruptive forces in the Middle East.  Struggles against Al Qaeda and the Taliban, for example and against the growing threat and influence of Iran.

——

  • So, for the U.S. and the west to go to war aggressively against ISIS is tantamount to confronting the most conservative elements in Saudi society and could unravel or seriously weaken the U.S.’s alliance with Saudi Arabia.

——

  • So, there we are.  If the U.S. and/or the other western powers seriously try to crush ISIS, other parts of the house of cards we’ve built in the Middle East, beginning with our alliance with Saudi Arabia, may well crumble and who knows where that will lead?
  • As just one factor, Saudi Arabia controls a serious percentage of the world’s oil.
  • And the Saudis have been well-armed (by the west, of course).

——

  • But, given ISIS’s monomaniacal focus to push unrelentingly for an Islam (their version of Islam) that dominates the world, a confrontation with them is going to be a hard confrontation to avoid.  Witness what just happened with the ISIS terrorist attacks in Paris in which 129 people died.
  • But at least I understand now where they’ve gotten their enormous supply of money and why the west has been slow off the mark to crush them.
  • But this problem is not going to go away.

 

– research thanks to Colette M., Piers L. and Kierin M.

Small town mayor relinquishes electronics and passwords to agents at SFO

Monday, October 5th, 2015
  • An interesting story. Prescient of our future?  
  • Just last month, I read in an American publication about a news conference held by the senior leaders of the NSA, the CIA, the FBI and several other security-related agencies.  The reason they held the conference was to say to the press and the American public that this ‘tension’ between them and the public needs to be toned down.  That they are only trying to protect our security interests and that they need to be free to get on with it.
  • Interesting that they failed to note that a lot of this started when Edward Snowdon pulled the covers back from their secret programs and the public found much of what was revealed deeply unpalatable.  No comment on that and little has been done about it save for imposing a few small limitations here and there.
  • But, if those limitations are reimplemented, we’ll never know about it because it will all be done behind those same secret curtains again (and for our own good, I’m sure).
  • So, here they are in this story forcing their way into a private citizen’s private affairs/data with no warrant, no probable cause and no comment when asked about it by the press.  Basically, “Nothing to see here.  Just move along now, move along.”
  • Is this how they are going to win the public’s trust again?
  • And, isn’t the deepest irony here that if the fellow searched had wanted to hide something, he simply could have dropped an encrypted copy of it onto any of a hundred places out in the Internet cloud and erased it from his phone before entering the country.  Once home, he grabs it again from the web, decrypts it and he’s done.
  • The only criminals and terrorists the Feds are going to capture these Bully-Boy methods are the dumbest of the dumb.  
  • So what is the point then?  Simple harassment of the public? A flexing of their muscles so we can all see how very powerful they really are?  Or just a profound example of bureaucratic ineptitude wherein the left hand has no idea what the right hand’s doing?
  • dennis

= = = = = = = = = = = = = = = = = = = = = = =

As feds battle over privacy, mayor compares the situation to North Korea.

Stockton, California Mayor Anthony R. Silva attended a recent mayor’s conference in China, but his return trip took a bit longer than usual. At the San Francisco International Airport (SFO) this week, agents with the Department of Homeland Security detained Silva and confiscated his personal cell phone among other electronics. According to comments from the mayor, that may not even be the most alarming part.

“Unfortunately, they were not willing or able to produce a search warrant or any court documents suggesting they had a legal right to take my property,” Silva told SFGate. “In addition, they were persistent about requiring my passwords for all devices.”

The mayor’s attorney, Mark Reichel, told SFGate that Silva was not allowed to leave the airport without forfeiting his passwords. Reichel was not present for Silva’s interaction with the DHS agents, either. The mayor was told he had “no right for a lawyer to be present” and that being a US citizen did not “entitle me to rights that I probably thought,” according to the paper.

As of Friday, Silva had not yet received his property from the SFO detention. SFGate reports Reichel contacted the US Attorney’s Office in Sacramento, but they would not comment on whether they still had the mayor’s possessions. The paper also reached out to a spokesperson at US Immigration and Customs Enforcement, but that office also refused comment. (Ars has reached out to the mayor’s office for any new information, and we’ll update this story accordingly if we hear back.)

Authorities demanding access to password-protected devices has become a hot-button issue across the country, highlighted in particular by the federal government’s ongoing battle with Silicon Valley over the lack of crypto backdoors in modern smartphones. At the end of last month, one US District Judge in Pennsylvania ruled that forcing suspects to surrender their passwords was unconstitutional on Fifth Amendment grounds.

Evidently, Silva was well aware of the situation and only had his concerns heightened by first-hand experience. Talking to SFGate, he briefly compared the government battle on privacy to notorious dictatorships worldwide.

“I think the American people should be extremely concerned about their personal rights and privacy,” Silva told the paper. “As I was being searched at the airport, there was a Latino couple to my left, and an Asian couple to my right also being aggressively searched. I briefly had to remind myself that this was not North Korea or Nazi Germany. This is the land of the Free.”

  • To the original in Ars Technica:  

Why are houses so expensive? (UK article)

Friday, September 18th, 2015
  • As time passes, my ideas about what and where our problems are shifting too.  
  • Currently, I’m focused on the idea that our representative democracies, which are primarily a balancing of self interests; one against each other, are, by their very nature, incapable of dealing with problems affecting our ‘commons’.
  • The housing cost problems described in this Guardian article make this point particularly well.  
  • It is in the majority’s common interests that most of us should be able to find and afford reasonably priced housing.  But a minority of us, well positioned to take advantage of the situation, have elevated their minority self interests over the majority and, in their greed, they are making a bad situation worse.
  • This has happened because ‘we’ the people have never decided to implement governments which look out for our common interests as their top priority.  
  • And you can be sure that those who are looking after their self interests and wealth are never going to support this.  They will, in fact, actively suppress the idea.
  • dennis

= = = = = = = = = = =

There’s a sizeable chance that many people born before me in the late 1980s – and far more who were born after me – will never own their home in the UK. The goal for most people is now to get on “the housing ladder”: buy a small house or flat, and gradually move to a nicer area and bigger home as your profits increase. This wasn’t always the case. Back in the early 1980s, around half the population of the country owned their own home, and half rented – 30% in social housing, from their local council, and 20% from private landlords.

Margaret Thatcher’s introduction of right to buy meant that those who bought their council home saw the value of their subsidised purchase rise rapidly, meaning housing was seen less as a permanent home, more as an investment. At the same time, councils stopped building homes partly due to economic constraints, and partly due to the ideological shift away from renting and towards home ownership.

But now we’re in a crisis. Homes cost an awful lot in many places in the UK, and wages haven’t kept pace with inflation, or risen as much as house prices, post-recession. The young, in particular, find their earning potential and borrowing allowances have been harder hit than most. Meanwhile, the vast majority of new private-sector jobs are in the capital, where house prices are exorbitant.

The average house price for the UK was £282,000 in July according to the Office for National Statistics, which, if you live in London, sounds like nothing – the average house price there nudged £525,000 this month. But the average UK earner, who takes home £24,648 gross, including bonuses, can only afford a house worth around £110,000, if you imagine them taking out a mortgage worth 4.5 times their salary. To find a job paying that much and a house that costs that little isn’t easy – saving for a deposit while paying market rents is even harder.

Part of the problem is scarcity. Britain simply isn’t building enough housing to meet the demand for homes. Part of that is due to a brick shortage that began before the recession, and a skills shortage: British workers predominantly don’t want to be builders, and the rhetoric against hiring in skilled workers from the EU and beyond also stymies attempts to build more.

But many people profit from rising house prices: landbanking is a huge problemthat exacerbates the housing crisis. In areas where homes are needed, it works in private companies’ interests to sit on land that could be developed, inflating its prices, and in turn inflating house prices.

Where housing expansion has happened is in private renting, the sector least likely to increase the home ownership rate in Britain. If you ask most people what is the biggest barrier to raising the capital necessary for a deposit, most will say that it’s high rents. It’s in landlords’ interests to keep people renting, rather than buying. An interest-only mortgage lets you cream off a considerable profit while buying more properties.

And once profits rise in houses, and people see property not as a home but as an investment opportunity, outside investors pour in. Concerns have been raised at the proportion of new-build properties in London being bought and treated as asset lockers in the capital – left empty, while appreciating in value at very little risk for the predominantly foreign buyers. Meanwhile, families flounder on the housing waiting lists, or are forced out to far-flung towns, away from their children’s schools or support networks.

Houses aren’t expensive simply because of supply and demand. As long as houses are expensive, people will work to keep them expensive – buy-to-let landlords with far more capital can buy up houses and rent them out at high costs, wealthy British and foreign investors can buy up land and new-build luxury property knowing that the likelihood of profit is a far better bet than with any other investment. Keeping families and individuals locked out of home ownership for a lifetime works as a financial racket, which is precisely what we’re dealing with.

There’s also the massive regional disparity – growing up, I remember working out exactly how much I’d need to earn to afford a mortgage on my own home. It seemed achievable, because I foolishly hadn’t assumed a global recession would cause stagnant wages while house prices continued rising unhindered. And to get a mortgage on a property where I grew up in Newport, at an average of £115,828I’d need to earn around £29,000 per year. I’ll admit to earning far more. But to buy the average home where I currently live near Clapham, I’d need to earn £182,809. I earn far less. Why do I stay, rather than returning home and snapping up a four-bed house? The same reason anyone does – friends, work opportunities, and an emotional investment in the local surroundings.

But across England and Wales, the average home costs 8.8 times the average salary. In Westminster, it’s 24 times the local salary, compared to 12 times a decade earlier. Everywhere in England and Wales, the house price/local salary ratio has risen since 2002. Part of the reason so many people want to buy is because renting conditions can be so poor, while rent is so high. Those hoarding properties can hike up house prices as people become increasingly desperate to get on “the ladder”.

Scarcity causes a number of responses: firstly panic – watch any queue outside a house in Walthamstow, or try to rent a room in London or Oxford, and realise how many people are scrabbling for any opportunity to solve their personal housing crisis. But it also encourages hoarding: the financially solvent notice an asset’s sharp increase in value and hoard that asset, inflating the price and their profits at the same time. One in five homes in the UK is now owned by a private landlord, yet landlords only account for 2% cent of the adult population.

But crises reach a head: at the moment, house prices are so expensive, many people will be unable to afford to buy at all, which impacts on birth rates, encourages people to move abroad, and affects the economy, both because people are spending more on rent and less on goods that boost the economy, and because housing is a precarious market to rely on to prop up GDP. It’s because the market has been allowed to grow unchecked, and landlords and investors allowed to distort and inflate the market, that houses are expensive. But to bring prices down, some homeowners have to lose out and end up in negative equity. It depends on who politicians value most – homeowners, or Generation Rent. Or, we can all sit tight and wait for the bubble to burst.

  • To the original in the Guardian:  

 

The California Drought Is Just the Beginning of Our National Water Emergency

Friday, August 21st, 2015

For years, Americans dismissed dire water shortages as a problem of the Global South. Now the crisis is coming home

The United Nations reports that we have 15 years to avert a full-blown water crisis and that, by 2030, demand for water will outstrip supply by 40 percent. Five hundred renowned scientists brought together by UN Secretary-General Ban Ki-moon said that our collective abuse of water has caused the earth to enter a “new geologic age,” a “planetary transformation” akin to the retreat of the glaciers more than 11,000 years ago. Already, they reported, a majority of the world’s population lives within a 30-mile radius of water sources that are badly stressed or running out.