Trolls | SeMeN SPeRmS SuPeR SiTe

Trolls Attack

File under SeMeN SPeRmS BLArRrG

Conjured by o~ SeMeN SPeRmS ~o on June 28, 2014

Tags: , ,

Money $hot$

Cop Money Shot
.
.

Fake Walnuts Filled with Concrete in China

There’s a set of photos making the rounds on the Internet these days, but even though they recently went viral, they were actually released a year ago. They show a bunch of normal-looking walnuts that when cracked open reveal a very hard filling – concrete pebbles. According to Ministry of Tofu, these fake walnuts were bought by a certain Mr. Li, last February, from a street vendor in Zhengzou, Henan province. When he got home and started cracking them, he noticed that instead of a meaty seed, many were actually filled with concrete pebbles wrapped in tissue. But Li’s case is not an isolated one. Apparently, many Chinese walnut vendors try to maximize their profits by carefully cracking open the hard shell, taking out the nutmeat, replacing it with concrete and tissue so it doesn’t make a strange noise, and gluing it shut. This way they can sell the nuts and the seeds separately.
.
.
Here’s How You Buy Your Way Onto The New York Times Bestsellers List – Forbes
So it would’ve cost more than $211,000, and that’s before ResultSource’s fee, which is typically more than $20,000. Kaplan settled for making the Journal’s list, reaching the pre-sale figure of 3,000 by securing commitments from corporate clients, who agreed to buy copies as part of his speaking fees, and by buying copies for himself to resell at public appearances. Kaplan expresses significant reservations about taking part in what is essentially a laundering operation aimed at deceiving the book-buying public into believing a title is more in-demand than it is. “It’s no wonder few people in the industry want to talk about bestseller campaigns,” he writes “Put bluntly, they allow people with enough money, contacts, and know-how to buy their way onto bestseller lists.”
.
.

Napster: the day the music was set free

I was 17, and the owner of an irregular music collection that numbered about 20 albums, most of them a real shame (OMC’s How Bizarre, the Grease 2 soundtrack). One day I had unsupervised access to the family PC and, for reasons forgotten, an urge to hear the campy orchestral number from the film Austin Powers. I was a model Napster user: internet-equipped, impatient and mostly ignorant of the ethical and legal particulars of peer-to-peer file-sharing. I installed the software, searched Napster’s vast list of MP3 files, and soon had Soul Bossa Nova plinking kilobyte by kilobyte on to my hard drive. “It’s difficult to describe to people… how much material was suddenly available,” the technology guru John Perry Barlow tells Alex Winter, the director of Downloaded, in his new documentary. Speaking to me on the phone from the US, Winter added: “There was no ramp up. There was no transition. It was like that famous shot from 2001: A Space Odyssey, when the prehistoric monkey throws a b…
.
.

Emoticon-based “Moby Dick” gets its day in the sun: In the US Library of Congress

The US Library of Congress welcomed Moby Dick onto its vaunted shelves this week but it wasn’t the famous Herman Melville-penned whale tale version oh no, it was the version told exclusively in emoticon – you know those little signs like J, ;). Emoji are the emoticons typically used in Japanese texting though they obviously are used world-wide to annoy or entertain everyone depending on your opinion of them. Called “Emoji Dick,” the emoticon book project was undertaken back in 2009 by data engineer Fred Benenson. According to the Library of Congress’ blog, in 2009 Benenson started a campaign to fund the “Emoji Dick” project and within a month raised enough money to put it together – $3,500.
.
.

NASCAR Crash Daytona 500 2013 [Video]

Fans sprayed with debris. Someone got mashed by a tire. NASCAR tried to take this down.
.
.

Kurt Cobain had the worst jeans.

.
.

Kara Vandereyk – Jailed After Having Sex With Pit Bull In Front Yard

According to Las Vegas Metro Police, an officer was patrolling the 300 block of N. 16th st. Tuesday when he came across a naked woman who appeared to be engaged in sexual relations with a dog. Officers arrived on the scene to find the woman, who was still undressed, laying on the ground. When the woman saw officers approaching, she said “Hi” to them and then began fondling the dog in a sexual manner.
.
.

Drivers stoned on marijuana test their driving skills

CNN may have just posted their best piece of investigative journalism in years. In the following video, three drivers of varying ages got incredibly high on marijuana and test-drove cars around a course. A driving-ed instructor accompanied them to avert any chance of an accident, and police watched from the sidelines to spot any visible ‘signs’ of inebriation in their movements.
.
.

An ‘alternative universe’ will eventually destroy ours, says Higgs researcher

Remember that Higgs-like particle that scientists finally managed to pin down last year at the Large Hadron Collider? Well, it’s proving to be a harbinger of bad news. According to Joseph Lykken, a theoretical physicist at the Fermi National Accelerator Laboratory, the mass of the Higgs boson indicates that “the universe we live in is inherently unstable, and at some point billions of years from now it’s all going to get wiped out.”
.
.

Gallon Smashing: The Video Sensation Out To Destroy Harlem Shake

I love this. I know that the comments are going to be filled with people decrying the destructive aspects of ‘Gallon Smashing,’ and they’re not wrong, but there’s so much that’s great about this concept. There’s a level of straight up slapstick comedy that is incredible. This kid (is it the same kid every time? I think it might be) has the moves of a silent comedy star. I like that the prank isn’t necessarily about getting other people wet or anything (although that happens, as is the unpredictable nature of smashing gallons of milk). And I like that this guy seems to be in his teens – exactly the right age to be doing stupid, destructive, anti-social prank behavior. When frat boys start doing this it won’t be funny.
.
.

College women told to urinate or vomit to deter a rapist

The list of 10 tips by the University of Colorado at Colorado Springs was billed as “last resort” options to deter a sexual assault. “Tell your attacker that you have a disease or are menstruating,” read one tip. “Vomiting or urinating may also convince the attacker to leave you alone,” read another.
Thanks Jasmine
.
.

Scorecard: How Many Rights Have Americans REALLY Lost?

For example, the following actions may get an American citizen living on U.S. soil labeled as a “suspected terrorist” today: Being young (if you live near a battle zone, you are fair game; and see this) Using social media Reporting or doing journalism Speaking out against government policies Protesting anything (such as participating in the “Occupy” movement) Questioning war (even though war reduces our national security; and see this) Criticizing the government’s targeting of innocent civilians with drones (although killing innocent civilians with drones is one of the main things which increases terrorism. And see this) Asking questions about pollution (even at a public Congressional hearing?) Paying cash at an Internet cafe Asking questions about Wall Street shenanigans Holding gold Creating alternative currencies Stocking up on more than 7 days of food (even though all Mormons are taught to stockpile food, and most …
.
.

How a “revenge porn” site got built: Fake identities to trade photos

Earlier this month, “revenge porn” entrepreneur Craig Brittain sat for an on-camera interview with CBS4-Denver, where he explained how his website IsAnybodyDown is nothing more than “entertainment.” Brittain’s site shows nude pictures of people, mostly women, without their consent, along with their personal contact info. The website advertises links to a service called “Takedown Hammer” which promises to get victims off the site if they pay $250. Many assume the “Hammer” is Brittain, since its e-mails come from the same IP address; Brittain denies it. In any case, to many of the victims, Brittain’s site looks like a simple extortion scheme.
.
.

USA vs China: Who Is Hacking Who? Part 2 – Eastern Europe

Facebook, Twitter, The New York Times. The United States of America. All seemingly hacked by the Chinese. China. Seemingly hacked by the US. Big time. But is there another option? “At least 40 companies including Apple Inc., Facebook Inc. and Twitter Inc. were targeted in malware attacks linked to an Eastern European gang of hackers that is trying steal company secrets, two people familiar with the matter said.” Bloomberg Chinese-hackers According to Tom Kellerman of Trend Micro there could well be – “We’ve all been watching China, but they’re not the most advanced cybercriminals. The most advanced are from the Eastern Bloc and Russia.” Tom Kellerman via CNN
.
.

Dairy farmers spray milk at the European Parliament in Brussels

A protest staged by dairy farmers in Brussels has entered its second day. Farmers sprayed thousands of litres of fresh milk at the European Parliament in Brussels on Monday in protest at what they say are excessive milk quotas and prices below the cost of production.
.
.

Airport diamond heist: It is shockingly easy to breach perimeter security at most airports.

The testimony at the hearing made it very clear that airport security is only as strong as its weakest link. This seems self-evident. Yet, despite all the money and manpower wasted on airport security theater in this country and around the world, perimeter security remains so lax that a guy with a costume and some bolt cutters can make a hole large enough to drive a van through. This is great news for heist fans, to be sure. But it’s pretty alarming for everyone else.
.
.

Power and the Internet

All disruptive technologies upset traditional power balances, and the Internet is no exception. The standard story is that it empowers the powerless, but that’s only half the story. The Internet empowers everyone. Powerful institutions might be slow to make use of that new power, but since they are powerful, they can use it more effectively. Governments and corporations have woken up to the fact that not only can they use the Internet, they can control it for their interests. Unless we start deliberately debating the future we want to live in, and the role of information technology in enabling that world, we will end up with an Internet that benefits existing power structures and not society in general.
.
.

‘I’ve been cleared to have sex!’ Porn legend Ron Jeremy gets back to business after near-fatal aneurysm

Porn legend Ron Jeremy, 59, has been released from hospital after a near-death experience and he’s already planning on getting back to business. Doctors have told the prolific star that he’s cleared to have sex after he left Cedars-Sinai Medical Center in Los Angeles around week ago.
.
.

Large Labia Project Tumblr

.
.

Earlie Johnson’s vintage porn collection stolen

“I had a sinking felling because my porn collection is valuable, man,” Johnson told WZZM 13. Johnson collects rare performances by black adult film stars that were difficult for him to find and impossible to replace. He says the stolen pornography collection is worth $7,500, much more than the televisions that were taken. “I had a collection that had every African American that’s ever been in porn, from the 70s up until now,” explained Johnson. “My collection was the best in Michigan– a guy in Connecticut told me that,” said Johnson. He believes the thieves realized the value when they stumbled on the porn. “They came upon it and looked at the titles and realized what they had ran across… and realized people will pay cash money for them DVDs.” Johnson says his rare footage can’t be found on the internet. “I trade and I collect and I look at them too. I ain’t got no problem with that,” said Johnson.
.
.

Chinese Eugenics

The BGI Cognitive Genomics Project is currently doing whole-genome sequencing of 1,000 very-high-IQ people around the world, hunting for sets of sets of IQ-predicting alleles. I know because I recently contributed my DNA to the project, not fully understanding the implications. These IQ gene-sets will be found eventually—but will probably be used mostly in China, for China. Potentially, the results would allow all Chinese couples to maximize the intelligence of their offspring by selecting among their own fertilized eggs for the one or two that include the highest likelihood of the highest intelligence. Given the Mendelian genetic lottery, the kids produced by any one couple typically differ by 5 to 15 IQ points. So this method of “preimplantation embryo selection” might allow IQ within every Chinese family to increase by 5 to 15 IQ points per generation. After a couple of generations, it would be game over for Western global competitiveness.
.
.

New anti-piracy system will hit U.S. Internet users next week

Starting next week, most U.S. Internet users will be subject to a new copyright enforcement system that could slow the Internet to a crawl and force violators to take educational courses. A source with direct knowledge of the Copyright Alert System (CAS), who asked not to be named, has told the Daily Dot that the five participating Internet service providers (ISPs) will start the controversial program Monday. The ISPs—industry giants AT&T, Cablevision, Comcast, Time Warner, and Verizon—will launch their versions of the CAS on different days throughout the week. Comcast is expected to be the first, on Monday.
.
.

Boy meets girl. Girl strips on webcam. Tells boy to do the same. Girl blackmails boy

Now, people are being warned about another risk of finding love in the online world – webcam extortion. Webcam extortion. Image from ShutterstockBut it’s not the familiar headline of perverted hackers blackmailing young women into stripping in front of the camera. This time the tables have turned, and it’s *men* who are being victimised by *women*, in a peculiar twist on traditional webcam extortion. Singapore’s Police Force has warned of femme fatales befriending potential victims on sites such as Facebook and Tagged.com. The women enter steamy webcam conversations with their prey, where they strip and encourage their male victim to do the same. What the man doesn’t realise, as he feverishly rips his clothes off and agrees to engage in various sexual acts in front of the camera, is that his female love interest is secretly recording everything that’s going on. The male victim is then blackmailed for money by the woman who threatens to circulate the compromising photographs
.
.

As Secretive “Stingray” Surveillance Tool Becomes More Pervasive, Questions Over Its Illegality Increase

Of course, we’ve seen this pattern over and over and over. The government uses “terrorism” as a catalyst to gain some powerful new surveillance tool or ability, and then turns around and uses it on ordinary citizens, severely infringing on their civil liberties in the process. Stingrays are particularly odious given they give police dangerous “general warrant” powers, which the founding fathers specifically drafted the Fourth Amendment to prevent. In pre-revolutionary America, British soldiers used “general warrants” as authority to go house-to-house in a particular neighborhood, looking for whatever they please, without specifying an individual or place to be searched. The Stingray is the digital equivalent of the pre-revolutionary British soldier. It allows police to point a cell phone signal into all the houses in a particular neighborhood, searching for one target while sucking up everyone else’s location along with it. With one search the police could potentially invade count…
.
.

Banksy Work, Taken From London Wall, Turns Up in Miami, for Auction

“Slave Labor (Bunting Boy),” a 2012 work by the mysterious British graffiti artist Banksy, has vanished from a wall outside a discount store in London, and turned up at an auction house in Miami. And the town council in Haringey, the north London borough where the Banksy work appeared last May and disappeared last week, say that they want the piece returned. The stenciled piece, which shows a young boy at an old fashioned sewing machine creating a string of Union Jacks – the flags are in bright red, white and blue; the rest of the picture is in black, white, grey and sepia – appeared last year during the celebrations commemorating Queen Elizabeth’s 60 years on the throne. It was taken as an acerbic social comment, as most of Banksy’s works are, and has been regarded as a cultural attraction in the Turnpike Lane neighborhood where it stood.
.
.

More on Chinese Cyberattacks

Wow, is this a crazy media frenzy. We should know better. These attacks happen all the time, and just because the media is reporting about them with greater frequency doesn’t mean that they’re happening with greater frequency. Hype aside, the Mandiant report on the hackers is very good, especially the part where the Chinese hackers outted themselves through poor opsec: they logged into Facebook from their work computers. But this is not cyberwar. This is not war of any kind. This is espionage, and the difference is important. Calling it war just feeds our fears and fuels the cyberwar arms race.
.
.

JStylo-Anonymouth – Writing Style Anonymization

JSAN is a writing style anonymization framework. It consists of two parts: JStylo and Anonymouth. JStylo is a standalone platform for authorship attribution. It is used as an underlying feature extraction and authorship attribution engine. Anonymouth is the writing style anonymization platform. It uses the extracted stylometric features and classification results obtained through JStylo and suggests users changes to anonymize their writing style.
.
.

Science of Stylometry a Weapon Against Hackers, Trolls, Malware

It’s been used to question or confirm the authorship of Shakespeare’s plays, Homer’s Illiad and Odyssey and St Paul’s letters for hundreds of years. Now the science of stylometry could be used in the fight against hackers, trolls and malware writers that wreak havoc on the web. At the same time, stylometry – the analysis of a person’s unique writing style – could also be used by employers to identify whistleblowers or whingers among their staff. What you say online could be traced back to you using stylometry. “Your writing style can give you away and on the internet anonymity is difficult to achieve,” say the US researchers who have developed online tools to analyse writing. Advertisement The researchers, from Drexel University in Philadelphia, studied the leaked conversations and contributions of hundreds of anonymous users in underground online forums. They were able to identify 80 per cent of users using stylometric analysis to match writing styles to authors.
.
.

Barnacle sex, superlong penises and spermcasting

Barnacles are known for having very long penises. National Geographic reported in 2008: To cope with changing tides and a sedentary lifestyle, the gnarly crustaceans have evolved penises that are eight times the length of their bodies—the longest relative to body size of any animal. My sedentary lifestyle has had no such effect. I feel cheated. That article also noted that barnacles have the ability to change the size and shape of their penises to suit their living conditions. Barnacles living in gentle waters have long, thin penises best equipped for maximum reach, the study found. But those animals living in rough waters have shorter, stouter penises that are better able to withstand strong waves. […] The researchers also transplanted barnacles living in gentle waters to rough waters and vice versa, to make sure the penis variations they observed were a result of the environment and not due to genetic differences. The results showed that barnacles coul…
.
.

Facebook Hacked! Facebook OAuth flaw allows gaining full control over any Facebook account – Hacking News

Facebook OAuth is used to communicate between Applications & Facebook users, to grant additional permissions to your favorite apps. To make this possible, users have to ‘allow or accept’ the application request so that app can access your account information with required permissions. As a normal Facebook user we always think that it is better than entering your Facebook credentials, we can just allow specific permissions to an app in order to make it work with your account.
.
.

Circumcision: The History of Metzitzah BʼPeh Disease Transmission

More than 200 years of disease and death transmitted through metzitzah b’peh, the direct mouth-to-genital suction done by mohels to the bleeding just-circumcised-penises of baby boys.
.
.

Revealed: al-Qaeda’s 22 tips for dodging drones

The document includes advice such as “hide under thick trees” (believed to be bin Laden’s contribution), and instructions for setting up a “fake gathering” using dolls to “mislead the enemy”. Found by the Associated Press in a building in Timbuktu, the ancient city occupied by Islamists last year, the document is believed to have been abandoned as extremists fled a French military intervention last month. It is a Xeroxed copy of a tipsheet authored by a Yemeni extremist that has been published on some jihadi forums, but that has made little appearance in English. The list reflects how al-Qaeda in the Islamic Maghbreb anticipated a military intervention that would make use of drones, as the war on terror shifts from the ground to the air.
.
.

Submit Links:
SeMeNSPeRmS@SeMeNSPeRmS.com

File under Comedy, Fashion, Graffiti, Music, SeMeN SPeRmS BLArRrG, SeMeN SPeRmS Links 'o Death, Sex

Conjured by o~ SeMeN SPeRmS ~o on February 25, 2013

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Militainment

.
.
✪ Baby soaps and shampoos trigger positive marijuana tests
Commonly used baby soaps and shampoos, including products from Johnson & Johnson, Aveeno and CVS, can trigger a positive result on newborns’ marijuana screening tests, according to a recent study. A minute amount of the cleansing products in a urine sample — just 0.1 milliliters or less — was found to cause a positive result.
The Pentagon’s grip on Hollywood
The military entertainment complex is an old phenomenon that binds Hollywood with the US military. Known as militainment, it serves both parties well. Filmmakers get access to high tech weaponry – helicopters, jet planes and air craft carriers while the Pentagon gets free and positive publicity. The latest offering to come from this relationship is Act of Valor and it takes the collaboration one step further. The producers get more than just equipment — they have cast active-duty military personnel in the lead roles, prompting critics to say the lines have become so blurred that it is hard to see where Hollywood ends and Pentagon propaganda begins. In this week’s feature, the Listening Post’s Nic Muirhead looks at the ties between the US military and Hollywood.
✪ SWAT Team Brings TV Crew To Film Raid Against Threatening Internet Critic — Raids Innocent Grandma Instead
Evansville, Indiana police intent on “sending a message” that online threats against police will not be tolerated organized a massive raid against a forum troll on an online forum. The police decided to bring a TV crew to film their raid against their critic, they also brought a SWAT team. Rather than knock on the accused’s front door, which was wide open, the police instead threw two flash-bang stun grenades through their front window and storm door. Unfortunately, rather than finding the home occupied by a gun-toting cop killer, they found an entirely innocent grandmother and 18-year-old girl, who were both shocked and confused.
✪ Small-Town Cops Pile Up on Useless Military Gear
Small police departments across America are collecting battlefield-grade arsenals thanks to a program that allows them to get their hands on military surplus equipment – amphibious tanks, night-vision goggles, and even barber chairs or underwear – at virtually no cost, except for shipment and maintenance. Over the last five years, the top 10 beneficiaries of this “Department of Defense Excess Property Program” included small agencies such as the Fairmount Police Department. It serves 7,000 people in northern Georgia and received 17,145 items from the military. The cops in Issaquah, Washington, a town of 30,000 people, acquired more than 37,000 items
✪ Our Web Videos Reveal More Than We Realize, and Perhaps More Than We Want
That new capability will drive the demand for even more raw data. The Intelligence Advanced Research Projects Activity (IARPA) agency, overseen by the U.S. director of national intelligence, has launched two projects that may help analysts use civilian video from YouTube, Vimeo and other sources. Investigators at the Finder program are studying ways to locate where and when a video was taken based solely on the image itself. That’s hard enough. But researchers at IARPA’s Aladdin are working on an even more challenging task: how to search for “specific events of interest.” If they succeed, analysts could feed in a name, a simple text description or a few sample videos of what they seek—say, “five people wearing backpacks next to a pickup truck”—and get back any number of clips that match the query.
✪ Silencing the trolls: Twitter considers ‘hate speech’ censorship
To stop the ‘hate speech’ anarchy, Twitter is considering starting off by blocking the very possibility of replies from so-called ‘non-authoritative’ users, marked out by the absence of a profile picture, followers or bio information, as FT.com reports. This is the first step, but there might be more to come. However, the company’s management is concerned that by installing any kinds of ‘selective’ measures, they may put an end to the unique Twitter-style ‘freedom of tweets’ that has helped Arab revolutions. Anonymity was the key factor that allowed so many users there to join and have their say. “The reason we want to allow pseudonyms is there are lots of places in the world where it’s the only way you’d be able to speak freely,” FT quotes Dick Costolo as saying. Twitter is basically the ‘last harbor’ of anonymity, as it does not have to be linked with such powerful database platforms as Facebook and Google. Silencing trolls may hit those ‘revolutionary’ users as well.
✪ Perverted Police Officer Popped For Giving 15-Year-Old Girl A “Sex Exam”
“Well, were you having sex? What are you doing here?” The girl quickly responded “no, no, no, officer no,” the affidavit said. The girl told police she and her friend were just talking. But the man told the girl he “needed to check.” The girl asked “Check what?” “I need to see inside,” he responded. That’s when he ordered her to take off her pants and underwear so he could look for bruising or other evidence of sexual activity. In fear, the affidavit said, she complied. The girl told police she thought it “was the right thing to do” because he was an officer. Her 19-year-friend turned away, unable to watch, according to the affidavit. He told police he heard the man tell the girl “I need you to spread your legs wider so I can see.” The officer then used a flashlight to “inspect” her and told her to pull down her blouse so he could check for bruising, according to the police report. Then he returned the driver’s license to the boy and told them “Go home.”
✪ ‘Animal’ couple busted for child abuse, child porn after sickening images found on cell phone they left at Walmart
Two north Florida “animals” are facing child porn charges after photos showing them raping a 4-year-old girl were found on a cell phone they left at a Walmart. Pictures on the phone showed convicted sex offender Alan Johnson, 33, and his girlfriend, Jennifer Sparks, 37, abusing the girl “in every way imaginable,” Lee County Sheriff Mike Scott told WSOC-TV. “My most seasoned detectives here said that its the worst they’ve ever seen,” he said. A shopper found the phone in a shopping cart at a Cape Coral Walmart on June 2 and turned it in, police said.
✪ ‘Leap Second’ Bug Wreaks Havoc Across Web
On Saturday, at midnight Greenwich Mean Time, as June turned into July, the Earth’s official time keepers held their clocks back by a single second in order to keep them in sync with the planet’s daily rotation, and according to reports from across the web, some of the net’s fundamental software platforms — including the Linux operating system and the Java application platform — were unable to cope with the extra second.
✪ Satanists Claim Theft Is Hate Crime
A local couple who claim to be Satanists believe they’re a victim of a hate crime and were targeted because of their religious beliefs. Someone cut down a political poster stating, “VOTE SATAN” from their front porch where they live in Mountain View, a suburb of Denver. “We are Satanists… Satanists,” said Luigi Bellaviste. Luigi and Angie Bellaviste belong to the Church of Satan. They even have a Satanic Bible in their home. Thanks Jasmine
✪ Dumb Hikers With Smartphones
Increasingly, smartphones are creating problems in the backcountry, particularly in New Hampshire’s White Mountains, where, officials say, more hikers are skipping basic gear — particularly a map, compass, and flashlight – and relying too heavily on phones with GPS and a slew of gear-like apps, including compasses and trail maps, to bail them out of a jam. “Being prepared for a hike does not mean having your cellphone charged,” said Major Kevin Jordan from the New Hampshire Fish and Game Department, which oversees 150 to 180 rescues each year. “To find people with a map and compass is just incredibly rare. It boggles my mind. But when we rescue someone, I hear a lot of regret, a lot of people saying, ‘I should have brought more than my phone, but everywhere I go at home I have cellphone coverage.’ ”
✪ Agents remove 41,000 marijuana plants from 40-acre site in San Diego County
Drug agents removed more than 41,000 marijuana plants from a 40-acre area near Warner Springs in northeastern San Diego County, Drug Enforcement Administration officials announced Monday. The haul, conducted Sunday and Monday, was the largest marijuana seizure on private property in the county’s history, DEA officials said. No arrests were made, but the investigation is continuing, officials said. The removal, from a remote, secluded area called Sunshine Summit, required 35 DEA agents and officers from the multi-agency Narcotics Task Force. Also found on the property were two large water tanks, chemicals for fertilizer, and a 30-round magazine for a semiautomatic weapon. The marijuana removed from the site was estimated to have a wholesale value of $41 million.
✪ Deputy who tried to smuggle drug-stuffed burrito gets 2 years
A former Los Angeles County sheriff’s deputy accused of trying to smuggle a burrito stuffed with heroin into a courthouse lockup was sentenced Monday to two years in jail. Henry Marin, who was once portrayed as a dim-witted bumbler on a reality television show that focused on sheriff’s recruits, said nothing as a courtroom deputy handcuffed him and led him away to the type of cell he was once responsible for guarding.
✪ World’s First Genetically Modified Babies ‘Created’ in US
The ‘GM babies’ were born into women who had trouble conceiving their own children. In order to ‘birth’ the babies, extra genes from a female donor were inserted into the women’s eggs before they were fertilized. After conception, scientists fingerprinted 2 of the one-year-old children and confirmed that they inherited DNA from 3 adults — one man and 2 women. What this means is that due to inheriting these extra genes through the genetic modification process, they will now be able to pass them along to their offspring. In other words, these genetically modified babies — if allowed to mate with non-GM humans — could potentially alter the very genetic coding of generations to come. Genetecists state that this genetic modification method may one day be used to create babies “with extra, desired characteristics such as strength or high intelligence.”
✪ Brazilian ‘chain gangs’ pedal power path to freedom
Inmates in a Brazilian prison can shave time off their sentences by becoming living sources of green energy. All they need to do is turn the wheel of a bike connected to a power generator. For every 16 hours of pedaling the inmates of the Santa Rita do Sapucaí prison have their sentences reduced by one day, according to a Jornal Nacional report. The generators the prisoners put in motion charge batteries, which are taken to the city center to power some of the street lights. The two bikes installed in the prison are enough to light six bulbs. The reason behind the offer is not to profit from free labor however. Rather it is meant to give inmates an incentive to keep themselves in good shape, says city judge José Henrique Mallmann, who introduced the idea. Thanks Bjarni
✪ Colombia decriminalizes cocaine, marijuana
Colombia has decriminalized cocaine and marijuana, saying that people cannot be jailed for possessing the drugs for personal use. Anyone caught with less 20 grams (0.705 ounces) of marijuana or one gram (0.035 ounces) of cocaine for personal use will not be prosecuted or detained, but could be required to receive physical or psychological treatment, depending on their level of intoxication, according to Colombia Reports. Colombian Defense Minister Juan Carlos Pinzon said law enforcement would continue its fight against drug trafficking, but would not make further comment.
✪ U.S. Tax Dollars At War
Do you know how your tax dollars are spent? US radio host Dennis Bernstein and investigative reporter Dave Lindorff illustrate just how much US tax money goes towards the country’s war chest. “People have to realise that 53 cents of every dollar that they are paying into taxes is going to the military to an astonishing figure there is an enormous, enormous amount of money being blown on war an killing and destruction.”
✪ Fraud Ring In Hacking Attack On 60 Banks
Sixty million euro has been stolen from bank accounts in a massive cyber bank raid after fraudsters raided dozens of financial institutions around the world. According to a joint report by software security firm McAfee and Guardian Analytics, more than 60 firms have suffered from what it has called an “insider level of understanding”. “The fraudsters’ objective in these attacks is to siphon large amounts from high balance accounts, hence the name chosen for this research – Operation High Roller,” the report said. “If all of the attempted fraud campaigns were as successful as the Netherlands example we describe in this report, the total attempted fraud could be as high as 2bn euro (£1.6bn).” The automated malicious software programme was discovered to use servers to process thousands of attempted thefts from both commercial firms and private individuals. The stolen money was then sent to so-called mule accounts in caches of a few hundreds and 100,000 euro (£80,000) at a time.
✪ How a Grad Student Scooped the Government and Uncovered One of the Biggest Internet Privacy Scandals
Nearly every day, and often several times a day, there is fresh news of privacy invasions as companies hone their ability to imperceptibly assemble a vast amount of data about anyone with a smartphone, laptop or credit card. Retailers, search engines, social media sites, news organizations — all want to know as much as they can about their visitors and users so that ads can be targeted as precisely as possible. But data mining, which has become central to the corporate bottom line, can be downright creepy, with companies knowing what you search for, what you buy, which websites you visit, how long you browse — and more. Earlier this year, it was revealed that Target realized a teenage customer was pregnant before her father knew; the firm identifies first-term pregnancies through, among other things, purchases of scent-free products. It’s akin to someone rifling through your wallet, closet or medicine cabinet, but in the digital sphere no one picks your pocket or breaks into your house
✪ Cellphone Companies Will Share Your Location Data – Just Not With You
As location tracking by cell phone companies becomes increasingly accurate and widespread, the question of who your location data actually belongs to remains unresolved. Privacy activists in the U.S. say the law has not kept pace with developing technology and argue for more stringent privacy standards for cell phone companies. As Matt Blaze, a University of Pennsylvania professor put it, “all of the rules are in a state of enormous uncertainty and flux.” The Obama administration has maintained that mobile phone users have “no reasonable expectation of privacy.” The administration has argued against more stringent standards for police and the FBI to obtain location data.
✪ Texas college hacks drone in front of DHS
After being challenged by his lab, the DHS dared Humphreys’ crew to hack into a drone and take command. Much to their chagrin, they did exactly that. Humphrey tells Fox News that for a few hundreds dollar his team was able to “spoof” the GPS system on board the drone, a technique that involves mimicking the actual signals sent to the global positioning device and then eventually tricking the target into following a new set of commands. And, for just $1,000, Humphreys says the spoofer his team assembled was the most advanced one ever built. “Spoofing a GPS receiver on a UAV is just another way of hijacking a plane,” Humphreys tells Fox. The real danger here, however, is that the government is currently considering plans that will allow local law enforcement agencies and other organizations from coast-to-coast to control drones of their own in America’s airspace.
✪ Ad Biz Claims It Must Disregard User Privacy Choices to Safeguard “Cybersecurity”
At a hearing yesterday, the Senate Commerce Committee took up the issue of online tracking, the browser-based Do Not Track flag, and, in an unlikely turn of events, cybersecurity. The hearing included testimony from Ohio State University Law School’s Prof. Peter Swire, Mozilla’s Alex Fowler, the Association of National Advertisers’ Bob Liodice, and TechFreedom’s Berin Szoka. While there were a number of heated moments in the hearing, the most surprising was the advertising industry’s claim that respecting consumer choice will harm “cybersecurity.” This new argument from the advertising industry only raises more concerns for the civil liberties implications of online tracking and was, as Rockefeller aptly noted, little more than a “red herring.”
✪ Your E-Book Is Reading You
EFF has pressed for legislation to prevent digital book retailers from handing over information about individuals’ reading habits as evidence to law enforcement agencies without a court’s approval. Earlier this year, California instituted the “reader privacy act,” which makes it more difficult for law-enforcement groups to gain access to consumers’ digital reading records. Under the new law, agencies must get a court order before they can require digital booksellers to turn over information revealing which books their customers have browsed, purchased, read and underlined. The American Civil Liberties Union and EFF, which partnered with Google and other organizations to push for the legislation, are now seeking to enact similar laws in other states. Bruce Schneier, a cyber-security expert and author, worries that readers may steer clear of digital books on sensitive subjects such as health, sexuality and security—including his own works—out of fear that their reading is being tracked
✪ What is causing the outbreak of Flesh Eating Diseases?
However, some people have surmised that the use of antibiotics in our food supply is the main culprit while the overuse of antibiotics by doctors further exasperates the problem. In the 1940’s farmers began treating their livestock with antibiotics. It was soon discovered that if you fed antibiotics to your chickens, pigs and cows on a regular basis that the animals would get fatter quicker and with less feed. In order to compete with the other factory farms farmers started feeding their animals antibiotics everyday! And as we all know by now, the more antibiotics one takes whether through a prescription or through eating antibiotic laden meat, the more resistant one gets. As a side note I also wonder if eating all this antibiotic laden meat has contributed to the obesity epidemic in America..I mean if large doses of antibiotics cause animals to get fat while eating less, wouldn’t that do the same in humans?
✪ How to Make Eyes Look Asian
Asian eyes are traditionally thinner and narrower than Caucasian or African-American eyes, which tend to be rounder and wider. Asian eyes tend to resemble the oval shape of almonds, although some can look even narrower than that. Most Asians have only a single eyelid (meaning their eyelids don’t have a prominent crease). You can make your eyes look Asian by using makeup or undergoing plastic surgery.
✪ How to Look Asian (for a Play, Convention, Etc.): 8 steps
There are many reasons why you might want to look Asian: maybe you’re playing an Asian person in a school play, maybe you’re going to an anime convention and want to look like a certain character, maybe you’re dressing up for a costume party or for Halloween, or maybe you just want to change your appearance for fun, or to disguise your appearance to evade the law. In any case, this article will allow you to (sort of) go from looking White to looking Asian, without much fuss or money needed.
✪ NSA Won’t Disclose How Many Americans are Being Spied On
As the sprawling surveillance site being constructed by the National Security Agency (NSA) in Utah grows larger and nearer completion every day, the domestic spy service remains tightlipped about just how much and what kind of personal electronic data they have already collected and collated. Not only does the NSA refuse to provide such information, it insists that it cannot be forced to.
✪ Bates Family Home Was Meth Lab: John, Jessie, Tyler Bates’ Chronic Sickness Explained
John and Jessie Bates and their 7-year-old son, Tyler, began experiencing mysterious health problems months after after moving into a new home in Suquamish, Washington in March 2007. Tyler was having trouble breathing, Jessie developed a bizarre rash, and John was “perpetually sick,” according to My Fox Phoenix. Though a standard inspection found no problems, the family suspected the house itself was the culprit. A year and a half later, a neighbor revealed the home’s sordid secret: the previous occupant had used it as a meth lab. Even more certain that the building was behind their ailments, the Bates began ripping up the floors and walls. They found “iodine-like staining on the walls and human feces under the floor,” Jessie told Fox News.
✪ Spok, Neko, and Rosh Bomb Madrid’s Main Street by Cutting Massive Vinyl Ad
Madrid’s own Spok, Neko and Rosh bombed Gran Via, the main street of “Mad City” using an innovative technique which consists of cutting vinyl from a massive block-long advertisement and then peeling off their letters. This new subtractive method makes a permanent mark on the street with minimum effort. Quick, smooth and real nice work from these three amigos.
✪ In Their Own Words: ‘Study Drugs’
After inviting students to submit personal stories of the abuse of prescription drugs for academic advantage, The Times received almost 200 submissions. While a majority focused on the prevalence of these drugs on college campuses, many wrote about their increasing appearance in high schools, the focus of our article on Sunday. We have highlighted about 30 of the submissions below, almost all written by current high school students or recent graduates. In often vivid detail — snorting their own pills, stealing pills from friends — the students described an issue that they found upsetting, valuable, dangerous and, above all else, real. Most of them claimed that it was a problem rooted not in drugs per se, but with the pressure that compelled some youngsters to use them.
✪ Theft, Pedophilia, Murder Among TSA Employees’ Crimes
Theft is followed closely by sex crimes and child pornography charges, with 14 such incidents listed in Blackburn’s report. Six TSA employees were charged with possession of child pornography; one of them got caught because he “uploaded explicit pictures of young girls to an Internet site on which he also posted a photograph of himself in his TSA uniform,” the report notes. Eight others were charged variously with child molestation, rape (including child rape), and even running a prostitution ring. It’s not hard to figure out why persons possessing such proclivities would seek jobs where they would be able to ogle and grope other people’s private parts with impunity.
✪ $29.5 Billion in Overdraft Fees? How the Big Banks Are Still Screwing Us
About those “extended overdraft” fees: consumer advocates have noted that they are not unlike shady payday loans that charge consumers a tremendous amount of interest to get some needed cash in the short term. The Consumer Federation of America recently compared the two practices, and came up with some disturbing findings: As it has before, the Consumer Federation reported the cost at each bank of a $100 overdraft repaid two weeks later as if it were a short-term loan. It said the best deal, at Citibank, was equivalent to a loan with an annual percentage rate of 884 percent. Some banks, including PNC and RBS Citizens, charge more than 2,000 percent. Another thing: the banks examined in the Pew report have continued to reserve the right to process withdrawals by dollar amount, rather than chronologically. This practice “maximizes the number of times an account goes negative, thus increasing overdraft fees” – and the banks can choose to reorder transactions whenever they want

 

 

Submit Links:
SeMeNSPeRmS@SeMeNSPeRmS.com

File under SeMeN SPeRmS BLArRrG, SeMeN SPeRmS Links 'o Death, Sex

Conjured by o~ SeMeN SPeRmS ~o on July 3, 2012

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Abducted By Trolls

File under SeMeN SPeRmS BLArRrG

Conjured by o~ SeMeN SPeRmS ~o on April 16, 2012

Tags: ,