Science & TechnologyS


Magnify

Life on Mars?

biomorph mars meteorite1
© David McKay / NASAThis photomicrograph focuses on a large "biomorph" from a Mars meteorite
fragment known as Nakhla e4150ed. Its chemical spectrum appears to be primarily
iron oxide but with a carbon content slightly greater than the underlying matrix
Do rocks from Mars bear the tiny fossilized signs of life? Scientists who think so say they'll subject meteorites from the Red Planet to a new round of high-tech tests in hopes of adding to their evidence.

For years, only one meteorite has figured in the controversy: ALH84001, a rock that was blasted away from Mars 16 million years ago, floated through space and fell through Earth's atmosphere onto Antarctica about 13,000 years ago. Scientists reported in 1996 that the rock contained microscopic structures that looked like "nano-fossils," but skeptics said the structures could have been created by chemical rather than biological reactions.

In November, the scientists who were behind the earlier research reported fresh findings that they said answered many of the objections from the skeptics - and they said two other space rocks traced to Mars seemed to have "biomorph" structures similar to those found in ALH84001. Pictures of the biomorphs were spread across a couple of Web pages back then, but generated relatively little attention at the time.

Sun

Solar geomagnetic activity at all-time low: only 'zero' could be lower

Image
Back on December 12th 2009 I posted an article titled:

Solar geomagnetic activity is at an all time low - what does this mean for climate?

We then had a string of sunspots in December that marked what many saw as a rejuvenation of solar cycle 24 after a long period of inactivity. See December sunspots on the rise

It even prompted people like Joe Romm to claim:

The hottest decade ends and since there's no Maunder mininum - sorry deniers! - the hottest decade begins

But what Joe doesn't understand is that sunspots are just one proxy, the simplest and most easily observed, for magnetic activity of the sun. It is the magnetic activity of the sun which is central to Svensmark's theory of galactic cosmic ray modulation, which may affect cloud cover formation on earth, thus affecting global temperatures. As the theory goes, lower magnetic activity of the sun lets more GCR's into our solar system, which produce microscopic cloud seed trails (like in a Wilson cloud chamber) in our atmosphere, resulting in more cloud cover, resulting in a cooler planet. Ric Werme has a nice pictorial here.

HAL9000

Google could be granted copyright immunity in UK law

Image
© scroogle.org
Proposed amendment to the Digital Economy Bill exempts search engines from copyright infringement claims from third parties - Rupert Murdoch presumably included

Time for Rupert Murdoch to mobilise the lobbyists? Search engines would be exempted in UK law from any liability for copyright infringement, under a remarkable amendment (292) proposed to the Digital Economy Bill.

Conservative Lord Lucas is proposing a specific new clause so that...
"Every provider of a publicly accessible website shall be presumed to give a standing and non-exclusive license to providers of search engine services to make a copy of some or all of the content of that website, for the purpose only of providing said search engine services ...

"A provider of search engine services who acts in accordance with this section shall not be liable for any breach of copyright..."
Lucas' amendment, "Protection of search engines from liability for copyright infringement", would rewrite the Copyright, Designs and Patents Act 1988.

Meteor

Flashback Asteroids should be next small step for man in space, panel tells President Barack Obama

Image
© GettyAn expert panel appointed by President Barack Obama recommended bypassing the Moon in favour of an asteroid
The next small step for man - and giant leap for mankind - now seems increasingly likely to be bootfall on a lump of rock and metal more than a million miles from Earth.

Even as a rocket designed to help carry astronauts back to the Moon awaits take-off in Florida this week, asteroids have been singled out as the favoured destination for man's return to outer space.

An expert panel appointed by President Barack Obama to assess America's future spaceflight programme last week recommended bypassing the Moon in favour of a mission that sounds as if it is straight out of science-fiction.

Cow Skull

A Comparison of the Effects of Three GM Corn Varieties on Mammalian Health

Abstract

We present for the first time a comparative analysis of blood and organ system data from trials with rats fed three main commercialized genetically modified (GM) maize (NK 603, MON 810, MON 863), which are present in food and feed in the world. NK 603 has been modified to be tolerant to the broad spectrum herbicide Roundup and thus contains residues of this formulation. MON 810 and MON 863 are engineered to synthesize two different Bt toxins used as insecticides. Approximately 60 different biochemical parameters were classified per organ and measured in serum and urine after 5 and 14 weeks of feeding. GM maize-fed rats were compared first to their respective isogenic or parental non-GM equivalent control groups. This was followed by comparison to six reference groups, which had consumed various other non-GM maize varieties. We applied nonparametric methods, including multiple pairwise comparisons with a False Discovery Rate approach. Principal Component Analysis allowed the investigation of scattering of different factors (sex, weeks of feeding, diet, dose and group). Our analysis clearly reveals for the 3 GMOs new side effects linked with GM maize consumption, which were sex- and often dose-dependent. Effects were mostly associated with the kidney and liver, the dietary detoxifying organs, although different between the 3 GMOs. Other effects were also noticed in the heart, adrenal glands, spleen and haematopoietic system. We conclude that these data highlight signs of hepatorenal toxicity, possibly due to the new pesticides specific to each GM corn. In addition, unintended direct or indirect metabolic consequences of the genetic modification cannot be excluded.

Gear

Google being plain evil? Just two Gmail accounts were "hacked" in December

Image
© Unknown
Google plans to curb its controversial practice of censoring search results in China after uncovering a "highly sophisticated and targeted attack" designed to steal information about human rights activists from its Gmail service and at least 20 other large companies.

The attack that hit Google in mid-December originated in China and was aimed at accessing the Gmail accounts of human rights activists. Although only two email accounts appear to have been breached, "accounts of dozens of US-, China- and Europe-based Gmail users who are advocates of human rights in China" have been routinely breached, most likely as a result of phishing or malware attacks, the company said Tuesday.

MIB

Google moves to encrypt all users' emails following its allegations that Chinese government hacked accounts

Image
© Scroogle.org
Just hours after Google disclosed it and at least 20 other large companies were the targets of highly sophisticated cyberattacks, the online giant said it would enhance the security of its email service by automatically encrypting entire web sessions.

The change, which Google is in the process of rolling out now, means Gmail sessions will be automatically protected from start to finish with the SSL, or secure sockets Layer, protocol, even if a user doesn't specifically ask for it. Up until now, users had to check a setting in their Gmail options to get always-on encryption.

The change bolsters Google's already significant lead in protecting web users against so-called man-in-the-middle attacks, which allow miscreants to read and modify web traffic by sitting in between victims and the sites they surf. Yahoo Mail, eBay, MySpace, Facebook, and a wide variety of other sites continue to offer https encryption only when users are logging in, making email and other sensitive pages that are visited later susceptible to so-called sidejacking and similar attacks.

Info

HERMES, new computer vision system for the analysis of human behavior

The system uses natural language to describe human actions and predict them based on the movements it recognizes

A consortium of European researchers, coordinated by the Computer Vision Centre (CVC) of Universitat Autònoma de Barcelona (UAB), has developed HERMES, a cognitive computational system consisting of video cameras and software able to recognise and predict human behaviour, as well as describe it in natural language. The applications of the Hermes project are numerous and can be used in the fields of intelligent surveillance, protection of accidents, marketing, psychology, etc.

HERMES (Human Expressive Graphic Representation of Motion and their Evaluation in Sequences) analyses human behaviour based on video sequences captured at three different focus levels: the individual as a relatively distant object; the individual's body at medium length so as to be able to analyse body postures; and the individual's face, which allows a detailed study of facial expressions. The information obtained is processed by computer vision and artificial intelligence algorithms, which permits the system to learn and recognise movement patterns.

HAL9000

Google's Chinese rival Baidu.com knocked offline

Image
© Oriental Guardian
As Internet news outlets move on to the latest search engine bombshell - Google's announcement that it might pull out of China altogether - China's newspapers were still covering the news of yesterday's hacker attack on Baidu.

The Oriental Guardian gets points for its eye-catching magazine-style cover design that puts a "Baidu hacked" keyword into a Google search box.

The article inside gives a minute-by-minute account of the attack, which replaced Baidu's homepage with text reading "hacked by Iranian Cyber Army."

Despite the cover image, the only significants mention of Google in the article itself are a quote from a Baidu user ("Baidu's just easier to use. I always feel that Google's search results don't really fit the habits of Chinese people") and speculation that the hack was engineered by Google lovers.

Comment: Large-scale successful attacks are the stock-in-trade of the Pentagon's new CYBERCOM cyber-warfare division:

Doing its part for the empire: Google threatens to pull out of China 'over censorship'


HAL9000

Best of the Web: Doing its part for the empire: Google threatens to pull out of China 'over censorship'

Image
© Phillipe Lopez/AFP/Getty ImagesHillary Clinton has called on Beijing to explain cyber-attacks originating from China against Google.
Beijing yet to respond to search engine's move apparently prompted by hacking of human rights activists' Gmail accounts

Google has thrown down the gauntlet to China by saying it is no longer willing to censor search results on its Chinese service.

The world's leading search engine said the decision followed a cyber-attack that it believes was aimed at gathering information on Chinese human rights activists. It also cited a clampdown on the internet in China over the past year. Its statement raised the prospect of closing Google.cn and potentially its offices in China.

The Chinese government issued its first, cautious response several hours after the announcement, saying it was "seeking more information". In a statement published via the state news agency Xinhua, an unnamed official from China's state council information office ‑ the cabinet spokesman's office ‑ added: "It is still hard to say whether Google will quit China or not. Nobody knows."

Comment: The idea that Google has donned the role of knights in shining armour and suddenly developed concern for "human rights" is risible given its unctious predatory market behaviour this past decade. Many governments, especially the US government, routinely monitor ALL emails with the help of its obedient assistants at Google. So what is really going on here?

It's important to realise that we're not looking at "human rights activists" in this case, but separatist groups like the Uighur World Movement, essentially a US intelligence operation to destabilise China (as we witnessed in the summer of 2009). With its headquarters in Germany and the US, it's little wonder that the Chinese government is keeping tabs on this trojan horse.

The last time a 'massive hack' was attributed to an East Asian country, it soon emerged that the Pentagon's new cyber-warfare unit had been testing its capabilities: the third party false-flag cyber-attack that blamed North Korea was traced to servers in the UK and was likely a trial run for attacks like yesterday's on China's largest search engine.

From our July installment of Connecting the Dots:
By Way of Deception, Thou Shalt Do CyberWar

Set against a background of media hystrionics about cybercrime and claims of multimillion-fold increases in 'cyberattacks' against American government and corporate websites, Team Obama announced the introduction of a new CyberSecurity Office within the White House, complete with Cyber Czar to coordinate policy. With its emphasis on 'defensive' strategy to counter the threat posed by those cybercriminals 'out there', we naturally wonder if the timing relates to the announcement earlier this summer of the Pentagon's new CyberCommand (CYBERCOM) unit, whose definition of the concept of 'defensive strategy' is somewhat more plastic. If past activities are anything to go by, we can expect the Pentagon to preemptively launch cyberwarfare against cyberterrorists by engaging in . . . cyberterrorism.

Never wanting to feel left out of imperial projects for total world domination, the UK followed up with an announcement of its own: "this [cyber security] work was previously handled by an office related to the security services, and it will now be widened out." In other words; we are making overt what we've been doing covertly for some time because the conditions are now suitable for us to come out and tell you that we hate you and seek to watch everything you do, say, buy and think in order to control you.

Every cyberwar needs good cyberwarriors. If soldiers are hired killers, then the Pentagon's virtual warfare requires hired hackers. Profiteers in death like Raytheon are only too happy to step up to the plate and announce its recruitment drive:
"President Obama recently announced that cyber security is one of our country's most urgent national security priorities," reads the ad. "Raytheon is answering that call by hiring more cyber warriors this year to help fight the digital cyber war."

Raytheon also has positions available for something called "media sanitation specialists."

The latter probably refers to workers skilled at erasing data from hard drives and other storage.
Lest there be any doubt as to the 'defensive' nature of these new weapons of mass disruption, the military makes it quite clear that it will be 'taking the battlefield to the enemy':
The Pentagon plan calls for an offensive capacity, one that will deploy cyber weapons against imperialism's adversaries [...] designating CYBERCOM a STRATCOM branch all but guarantees an aggressive posture.

Others within the defense bureaucracy are far more enthusiastic, and forthright, when it comes to recommending that cyber armaments be fielded as offensive weapons of war. Indeed,

Armed Forces Journal featured a lengthy analysis advocating precisely that:
The world has abandoned a fortress mentality in the real world, and we need to move beyond it in cyberspace. America needs a network that can project power by building an af.mil robot network (botnet) that can direct such massive amounts of traffic to target computers that they can no longer communicate and become no more useful to our adversaries than hunks of metal and plastic. America needs the ability to carpet bomb in cyberspace to create the deterrent we lack. (Col. Charles W. Williamson III, "Carpet Bombing in Cyberspace," Armed Forces Journal, May 2008)
Infected computers are referred to as "zombies" that can be controlled remotely from any point on the planet by "master" machines. Unwary users are often "spoofed" by hackers through counterfeit e-mails replete with embedded hyperlinks into "cooperating" with the installation of malicious code.

While criminals employ botnets to generate spam or commit fraudulent transactions, draining a savings account or running-up credit card debt through multiple purchases for example, botnets also have the capacity to launch devastating distributed denial of service (DDOS) attacks against inadequately defended computers or indeed, entire networks.

In other words, should an "individual theatre commander" desire to suddenly darken a city or wreck havoc on a nation's electrical infrastructure at the behest of his political masters then by all means, go right ahead!
These operations will deny, degrade, disrupt, destroy, or deceive an adversary. We will enhance our capabilities to conduct electronic systems attack, electromagnetic systems interdiction and attack, network attack, and infrastructure attack operations.
Simply put, the Pentagon intends to build an infrastructure fully-capable of committing high-tech war crimes.
And the best part about it is. . . CyberCommand will be placed in the capable hands of the NSA, that same ubiquitous behemoth super-spy agency responsible for spying on millions of American citizens during the Bush years. It becomes apparent that Obama's Cyber Czar office for cyber crimes is really political cover for the entrenchment of everything illegal the media created a false hoopla over towards the end of Bush's reign.

'Cyberterrorists' conveniently christened the new regime by hacking websites in a Denial of Service (DoS) attack we are told continued for several days. Sites affected were located in South Korea and the US, the most high-profile of which was the White House website, hit on July 4th no less. While a US government spokesman reassured us on the one hand "that these types of Internet attacks happen everyday on government networks", that government sites were unaffected and that it was premature to say whodunnit, South Korea's intelligence agency immediately fingered North Korea as the source.

As we noted at the time,
the nature of global IT systems are such that 'cyber attacks' can be made to appear to come from any source. Given the benign effects this attack produced, we think it more probable that this was an 'in-house' test of operational capabilities, especially coming so soon after the White House announcement that CYBERCOM is operational and will soon be interfering with internal affairs in a country near you.

Furthermore, framing North Korea conveniently fits its current role as useful bogeyman and deflects attention from certain other countries currently deploying cyber attacks in geo-political hotspots.
Well the Americans got one thing right when they said it was premature to identify the source of the attacks, because an investigation later found the source to be the UK:
We found a master server located in UK which controls all of the 8 C&C servers to make a series of cyber-attack last week. So the source of the attacks has been identified to be in UK. The existence of master server has never been reported before.

there have been 166,908 zombies from 74 countries around the world that have been used for the attacks.
Remember what was said above:
Infected computers are referred to as "zombies" that can be controlled remotely from any point on the planet by "master" machines. Unwary users are often "spoofed" by hackers through counterfeit e-mails replete with embedded hyperlinks into "cooperating" with the installation of malicious code.
This appears to be how this 'false-flag cyber operation' was executed.
And yesterday's cyber-attack looks like another such operation. The first red flag to note is that the hacks into the Gmail accounts of the "human rights activists" took place in December. Is it just an amazing coincidence that the day before Google Inc. should declare "cyberwar" on behalf of so-called "human rights activists" (but really on behalf of its Pentagon masters), China's Google equivalent - Baidu - is knocked off line? Not only that, but the attack is made to look like it came from Iran!

Baidu, China's Largest Search Engine, Hacked by "Iranian Cyber Army"

Image
© Budi PutraScreenshot of Baidu (China's most popular internet search engine) after it was hacked by ... ahem, "Iranian Cyber Terrorists"
Accused of "censorship" and 'being anti-free speech', these two countries, China and Iran, are in fact defending their networks from the Pentagon's cyber-warfare" in the form of DDoS attacks and directed propaganda coming through sites like Google and Twitter.