Tag Archives | Internet

The Hilarious and Disturbing History of Shaye St. John

Screen Shot 2015-03-01 at 6.47.06 PM

The Internet is home to some of the strangest and most wonderful oddities. It’s also filled with opportunists who try to capitalize on trends, eventually transforming once original ideas into kitsch filled circle jerks. That’s why it’s especially captivating to come across something wholly original. And the story of Shaye St. John is just that: captivating.

Many of you already know about Shaye’s horrendous past and have most likely seen many of her videos. But for those of you that haven’t, prepare to be disturbed, but strangely intrigued. Shaye St. John’s videos seem to be a mash-up of Lynchian uncomfortableness, Tim and Eric’s humor, with a bit of Harmony Korine’s oft-used lo-fi shock value. She is the brainchild of the late comedian, Eric Fournier.

Shaye St. John was once a supermodel who was hit by a train (car? I’ve heard both versions) that horribly disfigured her face and resulted in the amputation of both her arms and legs.… Read the rest

Continue Reading

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

Glenn Greenwald writes at the Intercept:

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses.

Read the rest
Continue Reading

The World’s Email Encryption Software Relies on One Guy, Who is Going Broke

Via Julia Angwin at ProPublica:

Update, Feb. 5, 2015, 8:10 p.m.: After this article appeared, Werner Koch informed us that last week he was awarded a one-time grant of $60,000 from Linux Foundation’s Core Infrastructure Initiative. Werner told us he only received permission to disclose it after our article published. Meanwhile, since our story was posted, donations flooded Werner’s website donation page and he reached his funding goal of $137,000. In addition, Facebook and the online payment processor Stripe each pledged to donate $50,000 a year to Koch’s project.

The man who built the free email encryption software used by whistleblower Edward Snowden, as well as hundreds of thousands of journalists, dissidents and security-minded people around the world, is running out of money to keep his project alive.

Werner Koch wrote the software, known as Gnu Privacy Guard, in 1997, and since then has been almost single-handedly keeping it alive with patches and updates from his home in Erkrath, Germany.

Read the rest
Continue Reading

China adopts new real-name policy because pseudonymity has “polluted the Internet ecology”

openDemocracy (CC BY-SA 2.0)

openDemocracy (CC BY-SA 2.0)

By Nathaniel Mott Via Pando Daily:

China will soon enforce a rule which requires its citizens to share their real name and identification number whenever they create a new account with a website.

Internet users will still be allowed to set their own usernames — albeit with restrictions against using content the government deems inappropriate — but they must also register their real names and identifying information with the services.

The government-run China News Service claims pseudonymous accounts have “polluted the Internet ecology, harmed the interests of the masses and seriously violated core socialist values,” according to a report from the Wall Street Journal.

Continue reading.

Read the rest

Continue Reading

The 6 Grand Illusions That Keep Us Enslaved

Via Sigmund Fraud at Waking Times:

“In prison, illusions can offer comfort.” — Nelson Mandela.

For a magician to fool his audience his deceit must go unseen, and to this end he crafts an illusion to avert attention from reality. While the audience is entranced, the deceptive act is committed, and for the fool, reality then becomes inexplicably built upon on a lie. That is, until the fool wakes up and recognizes the truth in the fact that he has been duped.

Maintaining the suspension of disbelief in the illusion, however, is often more comforting than acknowledging the magician’s secrets.

We live in a world of illusion. So many of the concerns that occupy the mind and the tasks that fill the calendar arise from planted impulses to become someone or something that we are not. This is no accident. As we are indoctrinated into this authoritarian-corporate-consumer culture that now dominates the human race, we are trained that certain aspects of our society are untouchable truths, and that particular ways of being and behaving are preferred.

Read the rest
Continue Reading

Celluloid and Simulation

832622_56089981252_406334_large

Via Cary Hill at Moviepilot

The medium is the message. This is merely to say that the personal and social consequences of any medium – that is, of any extension of ourselves – result from the new scale that is introduced into our affairs by each extension of ourselves, or by any new technology.
— Marshall McLuhan

A friend recently remarked to me that it felt increasingly more like his childhood was being repackaged and sold back to him. We were discussing the recent rash of movies, toys, and TV shows based on things from our childhood: GI Joe, Transformers, etc. New Hollywood franchises (including merchandise) are being launched from shows we watched 30 years ago, targeting our generation and our children. Nostalgia is now big business.

So I wondered: If the majority of Hollywood’s efforts are being put to resurrecting original content from decades ago in an attempt to exploit nostalgia, what happens when all new films and toys are based on prior existing material?

Read the rest
Continue Reading

The loneliness of the long-distance drone pilot

Aaron Sankin via The Kernel:

Bruce Black had been preparing for this moment for most of his life.

Growing up, he always wanted to be a pilot. After graduating from New Mexico State University in 1984 with a degree in geology, Black was commissioned as an officer in the Air Force. He spent years as an instructor pilot before quitting to join the FBI, where he specialized in chasing down white-collar criminals, but the pull of military was too strong. He eventually found himself in the air above Afghanistan.

Black flew constantly. Once, in the spring of 2007, Black’s job was to serve as another set of eyes high above a firefight happening on the ground. An Army convoy had been patrolling near a site of a previous strike and gotten ambushed by Taliban fighters while returning to base. Black was acting as a crucial communications relay, sending life-and-death updates back and forth from the men and women on the ground to the Pentagon and a network of support staff located around the world through the military’s version of the Internet.

Read the rest
Continue Reading

Living Bits: Information and the Origin of Life

Image: Flickr user Tau Zero, adapted under a Creative Commons license.

Image: Flickr user Tau Zero, adapted under a Creative Commons license.

Via Chris Adami at PBS.org:

What is life?

When Erwin Schrödinger posed this question in 1944, in a book of the same name, he was 57 years old. He had won the Nobel in Physics eleven years earlier, and was arguably past his glory days. Indeed, at that time he was working mostly on his ill-fated “Unitary Field Theory.” By all accounts, the publication of “What is Life?”—venturing far outside of a theoretical physicist’s field of expertise—raised many eyebrows. How presumptuous for a physicist to take on one of the deepest questions in biology! But Schrödinger argued that science should not be compartmentalized:

“Some of us should venture to embark on a synthesis of facts and theories, albeit with second-hand and incomplete knowledge of some of them—and at the risk of making fools of ourselves.”

Schrödinger’s “What is Life” has been extraordinarily influential, in one part because he was one of the first who dared to ask the question seriously, and in another because it was the book that was read by a good number of physicists—famously both Francis Crick and James Watson independently, but also many a member of the “Phage group,” a group of scientists that started the field of bacterial genetics—and steered them to new careers in biology.

Read the rest
Continue Reading

If Obama Gets His Way, Sharing This Story Will Soon Be a Felony

Johan Larsson (CC BY 2.0)

Johan Larsson (CC BY 2.0)

Gregory Krieg Via Policy.Mic

On Jan. 20, this website published a story titled, “If This Is Your Password, Change It Immediately.” The article included a list of the 25 personal passwords — “password” and “abc123″ among them — most commonly found in databases of personal account information routinely leaked by hackers. The material came from SplashData, an internet security firm that seeks out vulnerable targets and reports on them to an often endangered public. The list of passwords appeared in various forms on outlets including CBS NewsNPR and the BBC, to name a few.

Later that night, President Barack Obama in his State of the Union address made the case for a new proposal to rewrite and tighten federal cybersecurity laws, so that no “foreign nation” or “hacker” would have the ability to “shut down our networks, steal our trade secrets or invade the privacy of American families.

Read the rest
Continue Reading