41 years ago:
Photo: NASA/Bill Anders
41 years ago:
Photo: NASA/Bill Anders
USA Today informs us that:
Despite surveillance cameras and heavy security, vandals in a small Swedish town have burned down a giant Yuletide straw goat for the 24th time since 1966, the Associated Press reports.
Here at Emergent Chaos, we’re deeply concerned that the goat ended up with neither privacy nor even temporary safety.
Photo: AP Photo/Pernilla Wahlman
Is over on the New School blog. “An open Letter to the New Cyber-Security Czar.”
Precision blogging gets the scoop:
You’re probably talking about this terrible security disaster already: the largest database leak ever. Arweena, a spokes-elf for Santa Claus, admitted a few hours ago that the database posted at WikiLeaks yesterday is indeed the comprehensive 2009 list of which kids have been naughty, and which were nice. The source of the leak is unclear. It may have come from a renegade reindeer, or it could be the work of a clever programmer in the Ukraine. Either way, it’s a terrible black eye for Santa. Arweena promised that in the future, access to this database would be restricted on a “need to know” basis. And you know who that means!
Let’s see if customers really change their behavior. I know which way I’m betting.
I’ll give you a topic, eh, no I won’t. Have at it, but not at each other.
Secretly stolen from Joy of Tech.
For some time, I’ve watched the War on Bottled Water with amusement. I don’t disagree with figuring out how to reduce waste, and so on and so forth, but the railing against bottled water per se struck me as not thought out very well.
The major reason for my thinking is that I never heard any of the venomous railing against water extending to any other drinks that come in bottles. To my mind, it seemed that a Coke, hey, that’s okay, but if you start with one and take out the sugar, the caffeine, the artificial flavors, and CO2 you end up with water. Coke okay, water evil.
Me, sometimes all I want is a cool drink of water. More often, I want something a little more. I’m very fond of those fizzy waters with a bit of essential oils in them, as well as iced tea. But I don’t want the sugar. I want an artificial sweetener even less, and often when faced with decisions, water is what’s available. When I’m traveling nearly anywhere, I think I’d rather have it in a bottle, thanks.
The prejudice against water comes from thinking that it’s just water. Rarely is there such a thing as just water. The only just water there is is distilled (or in a pinch deionized) water, and that is itself special because it is unusual for something to be just water.
And now, I can’t help but think, “Uh huh” as I read, “Millions in U.S. Drink Dirty Water, Records Show.”
The summary is that more than 20% of US water treatment systems have violated key provisions of the Safe Drinking Water Act over the last five years. The violations include sewage bacteria, known poisons and carcinogens, parasites, and so on. Mid-level EPA investigators say that the government has been interested in other things and just not enforcing things, and they don’t think change will happen.
Security isn’t just going after terrorists, it’s basic thing. Like water.
So after BNY Melon dropped a tape with my social security number and those of millions of my closest neighbors, they bought me a one year subscription to Experian’s “Triple Alert” credit monitoring service. Today, I got email telling me that there was new information, and so I went to login.
Boy, am I glad to know they take my privacy seriously, because otherwise, their failure to fill out fields in their certificate might really worry me.
I mean, I’m not annoyed that BNY Mellon treated my information negligently. Oh, no. I expect that. I am a little annoyed that having done so, they offered me a year of “monitoring” rather than prevention. I’m annoyed that it’s a year, when there’s no evidence that risk of harm falls after a year. And I’m annoyed that the company offering monitoring doesn’t bother to get the little things right.
[Update: This may be a broader issue of all non-EV certs being treated like this. I admit, I rarely check because I rarely care. But when I do care, I reasonably expect it to be done right.]
Next week, I’ll be joining a podcast to discuss “top security stories of the year.”
I have a couple in mind, but I’d love to hear your nominations. What are the most important things which have happened in information security in the last year?
According to “Campbell’s Monkeys Use Affixation to Alter Call Meaning:”
We found that male alarm calls are composed of an acoustically variable stem, which can be followed by an acoustically invariable suffix. Using long-term observations and predator simulation experiments, we show that suffixation in this species functions to broaden the calls’ meaning by transforming a highly specific eagle alarm to a general arboreal disturbance call or by transforming a highly specific leopard alarm call to a general alert call. We concluded that, when referring to specific external events, non-human primates can generate meaningful acoustic variation during call production that is functionally equivalent to suffixation in human language.
Sorta via Wired, who, not being monkeys, did not use the invariable suffix “here’s a link.”
Photo: Macque monkey and kitten by Kaz Campbell.