NetHappenings // K12Newsletters 6.19.19
Discover the right school for your child. https://k12playground.com/
Internet Pioneer Gleason Sackmann’s 1996 “Hot List” text file of the first K12 School websites into the first public public project in the world launched online July 9, 1998. The public is still invited to submit their school information and website data . Once you’ve located your school, update the information about the school such as the amenities, features or programs that make this school special. Compare K12 Schools and School Districts in the USA. Join Interdisciplinary #STEAM #STEM K12 School Projects. Link to your video project from your school information page and promote your work.
Trump administration quietly makes it legal to bring elephant parts to the U.S. as trophies WP
Africa’s proverb of the day BBC
You think of water when the well is empty. Sent by Agata Kassa, Addis Ababa, Ethiopia.
There Should Be an Age Limit for Presidents
Tyranny of the 70-Somethings The Democratic Party’s gerontocracy is holding back the political causes it claims to want to advance.
Can Elizabeth Warren Win It All New Yorker
Hypersonic Missiles Are Unstoppable. And They’re Starting a New Global Arms Race. NYT
Reuters Around the world, the proportion paying for any online news has increased only slightly, with this growth being limited to a few Nordic countries. Even in countries where people pay in higher numbers, most only do so for one title.
Social communication is becoming more private with people continuing to turn away from Facebook. WhatsApp is becoming the primary social communication tool for news in many countries in the Global South including Brazil (53% usage for news), Malaysia (50%) and South Africa (49%).
Concern around misinformation is high in many countries despite efforts by platforms and publishers to build public confidence.
Trust in news in general is down by 2 percentage points to 42%, and less than half (49%) trust the news that they themselves use.
Genius hid a Morse code message in song lyrics to prove Google was copying them “Over the last two years, we’ve shown Google irrefutable evidence again and again that they are displaying lyrics copied from Genius,” Gross said. To catch Google, Genius watermarked lyrics with the help of apostrophes, alternating between straight and curly single-quote marks in exactly the same sequence for every song. When turned into dots and dashes, the apostrophes spell the words Red Handed, which is a smart trick. bgr.com
This week, U.S. Customs and Border Protection announced that hackers compromised traveler images and license plate photos from one of the agency’s contractors. vice.com
Hong Kong ‘Police given secret access to hospital database’ The police were able to find and arrest people injured in last Wednesday’s extradition bill protests because officers have been given secret backdoor access to the Hospital Authority’s patient database, medical sector lawmaker Pierre Chan said on Monday. rthki.hk
Google Made $4.7 Billion From the News Industry in 2018, Study Says NYT
Google and PayPal explored OCC’s fintech charter, then walked away
“HK protesters have developed “Protest Sign Language”: Hand signals to request helmet, eye goggle, face mask
vice.com “the artist who created the Zuckerberg deepfake from earlier this week made another one, to protest suppression of his art. Facebook is now tasked with the hard job of defining what is art, what is satire, and reading two billion minds:
Top AI researchers race to detect ‘deepfake’ videos: ‘We are outgunned’ By Drew Harwell June 12 WP
Canary in the Coal Mine Bitcoin has rightfully earned the dubious title of “Canary in the Coal Mine” because numerous financial analysts expect that the first target of a quantum computer criminal will be mining the entire lode of Bitcoin; it’s a big, juicy target.
How To Secure Your Network: Five Modern Alternatives to VPN
Hackers Remotely Kill a Jeep on the Highway—With Me in It
Samsung’s Smart TV Malware Scan Reminder Met by User Criticism
Back in 2017, WikiLeaks revealed information on malware dubbed Weeping Angel, developed by the CIA in collaboration with Britain’s MI5/BTSS department and capable of infecting Samsung F800 TVs. According to the info leaked by WikiLeaks, Weeping Angel can record ambient sound using the built-in microphone, collect browser and WiFi credentials, block updates, and much more. Samsung customers who want to detect and get rid of the odd malware that escaped through the fingers of their Smart TV’s security solution can manually scan for viruses which might have crept in undetected by going into their device’s Options > General > System Manager > Smart Security menu and then hit “Scan.”
Industrial methane emissions are 100 times higher than reported, researchers say phys.org
F-35 Hit With Cluster Bomb Of Damning Reports As Pentagon Eyes Full Rate Production Less than 48 hours after Lockheed Martin and the Pentagon reached a handshake agreement on the purchase of a whopping 480 F-35 Joint Strike Fighters, an absolute cluster bomb of stories has dropped detailing significant technical issues with the jets. The revelations cover ongoing problems for all three F-35 variants, including performance limitations, troubles when operating in very hot or very cold weather, dangerous cockpit pressure incidents, faults in the helmet-mounted display, serious safety concerns in the event of a blown tire, and much more. The new details underscore the Joint Strike Fighter’s ongoing troubles as the Pentagon’s central Joint Program Office, or JPO, seeks to move the aircraft out of its developmental phase for good, as well as highlighting a worrying, but long-standing lack of transparency about the state of the program. thedrive
The treachery of Julian Assange
It is hard to believe now, but honest people once worked for WikiLeaks for all the right reasons. Like me, they saw the site as a haven; a protected space where writers could publish stories that authoritarian censors and libel lawyers would otherwise have suppressed.
Reuters Top U.S. universities took funds from Chinese firm tied to Xinjiang security The Massachusetts Institute of Technology and at least one other university have research partnerships with a Chinese artificial intelligence company that has business ties with police in China’s Xinjiang region, where a sweeping crackdown on Uighurs has drawn international condemnation. Reuters found no evidence that any of the universities were directly involved in creating technology for iFlytek, or that their work was intended for use in Xinjiang, where Uighurs, a Muslim minority group, are kept under tight surveillance, including in “reeducation camps.” MIT last year announced a five-year agreement under which iFlytek would help underwrite three research projects at the university’s renowned Computer Science and Artificial Intelligence Laboratory (CSAIL).
Scientists Are Aiding Apartheid in China
The Chinese government has effectively created a system of apartheid in its resource-rich and strategically important northwestern Xinjiang region. It is targeting Uyghurs and other Turkic minorities based on their racial identity with its use of internment camps, mass surveillance, repression of political and cultural expression, and other forms of discrimination.
As part of these efforts, the Chinese government has genetically profiled much of the population of Xinjiang — everyone between 12 and 65 — as part of the most comprehensive and intrusive system of biometric surveillance ever implemented.
On the face of it, trying to use forensic genetic technologies to distinguish one group of people from another may not seem too problematic if it helps police or national security investigations. But when you consider the history of using science for the purpose of oppression, the ongoing genetic research is a serious potential threat to human and legal rights.
Following the horrors of Nazi medical experimentation and the attendant decline of eugenics, the use of racial categories in science lost much of its credibility and legitimacy. However, in the aftermath of 9/11, by using euphemisms like biogeographic ancestry and phenotypical appearance, the international forensic genetic community resurrected once discredited notions of race, arguing that these categories can potentially assist police investigations and national security. But scholars, like Troy Duster of University of California, Berkeley, and Duana Fullwiley of Stanford University, have argued that this normalization of racial categories in forensic genetic research could make these technologies of oppression against marginalized peoples. In Xinjiang, we see the realization of the draconian potential of this resurrection of race.