cr

TRB Webinar: How To Use Self-Consolidating Concrete in Bridge Applications

Self-consolidating concrete (SCC) is a highly flowable, nonsegregating concrete that is placed without any mechanical consolidation. TRB will conduct a webinar on Thursday, June 11, 2020, from 1:00 PM to 3:00 PM Eastern to discuss how SCC may be used to fill heavily congested or irregularly shaped members in bridge applications more easily while providing improved in-place quality and surface finish.The use of SCC may also decrease construction costs due to the reduced labor requirements during construct...




cr

Determining rubber content in concrete

Rubber Content of Crumb Rubber Modified Bitumen: Soxhlet Method , released by Austroads




cr

ACRP Impacts on Practice - Wayfinding and Signing Guidelines for Airports

The September 2015 issue of TRB’s Airport Cooperative Research Program (ACRP) Impacts on Practice explores how Philadelphia International Airport, Fort Lauderdale-Hollywood International Airport, and Changi Airport in Singapore applied guidance from ACRP Report 52 : Wayfinding and Signing Guidelines for Airport Terminals and Landside to help passengers find their way in and around an airport.



  • http://www.trb.org/Resource.ashx?sn=IOP2015Septcover

cr

Airports and Unmanned Aircraft Systems, Volume 3: Potential Use of UAS by Airport Operators

Introduction of unmanned aircraft systems (UAS) will pose safety, economic, operational, regulatory, community, environmental, and infrastructure challenges to airports. These risks are further complicated by the dynamic nature of UAS technological development. Experiences and lessons learned from recent major aviation system changes demonstrate the critical importance of ensuring that airports have the resources needed to avoid adverse impacts and maximize benefits as early as possible. This pre-publica...



  • http://www.trb.org/Resource.ashx?sn=acrp_rpt_212_vol3

cr

Infectious Disease Mitigation in Airports and on Aircraft

The risk of disease transmission at airports and on aircraft is similar to the risks associated with other densely populated places. There are also unique factors related to the interaction of individuals from geographically diverse regions with differing immunity and endemic diseases. The TRB Airport Cooperative Research Program's ACRP Report 91: Infectious Disease Mitigation in Airports and on Aircraft offers guidance for mitigating the risk of disease spread via droplet, airborne, and contact at airpo...



  • http://www.trb.org/Resource.ashx?sn=cover_acrp_rpt_091copy

cr

Amazon Studios Greenlights Season Two of "Upload" from the Emmy Award-Winning Creator Greg Daniels

Season two will exclusively stream on Amazon Prime Video in more than 200 countries and territories worldwide.




cr

Kenan Thompson, Billy Crystal, Tiffany Haddish and Byron Allen to Co-Host Two-Hour "Feeding America Comedy Festival" on NBC

Will Smith, Will Ferrell, Wanda Sykes, Stephen Colbert and Colin Quinn are among the latest additions.




cr

Criminal Background Check Update

One of the barriers to abuse in the BSA's Youth Protection Program is the Criminal Background Check (CBC) ...




cr

“Ветер был реже, чем дождь” – Сильвия Видаль о первопроходе “Sincronia Màgica”


Фото из архива Сильвии Видаль.

Первопрохождение. Соло. Сильвия Видаль. Не восхищаться этой "Чудо-женщиной" в мире альпинизма и её восхождениями невозможно! На этот раз она отправилась в долину Чилино в Патагонии, чтобы соло проложить новый маршрут по северной стене Сьеро-Чилино-Гранде.




cr

Secret admirer




cr

undercroft




cr

croquembouche




cr

Sacrifice




cr

Cryophilia




cr

Croutons




cr

Acrophobia




cr

Apocrypha




cr

Scroll-work




cr

the crimson queen




cr

The Crimp




cr

strip for April / 22 / 2020 - Like and Subscribe




cr

strip for May / 6 / 2020 - Family Secrets




cr

Is It A Crime to Stop the Economy?

[I am happy to turn this space over to my former colleague and (I trust) lifelong friend Romans Pancs, who offers what he describes as a polemical essay. It has no references and no confidence intervals. It has question marks. It makes a narrow point and does not weigh pros and cons. It is an […]




cr

Creating a simple link registry - Matthias Noback

The problem: if you publish any document as PDF, in print, etc. and the text contains URLs, there is a chance that one day those URLs won't work anymore. There's nothing to do about that, it happens.

Luckily, this is a solved problem. The solution is to link to a stable and trustworthy website, that is, one that you maintain and host (of course, you're trustworthy!). Then in the document you link to that website, and the website redirects visitors to the actual location.

An example: my book contains a link to https://enjoy.gitstore.app/repositories/matthiasnoback/read-with-the-author. When I moved that repository to a new organization on GitHub, this link resulted in a 404 Page not found error. The proper URL is now https://enjoy.gitstore.app/repositories/read-with-the-author/read-with-the-author. Chris from Gitstore was able to save the day by setting up a redirect on their site, but I wanted to make sure this kind of problem would never be a problem for me again.

The ingredients for the solution:

  • A domain name (I registered advwebapparch.com)
  • A simple website that can redirect visitors to the actual locations

I wanted to hook this new website into my existing Docker-based setup which uses Traefik to forward traffic to the right container based on labels. It turns out, with a simple Nginx image and some custom setup we can easily set up a website that is able to redirecting visitors.

The Dockerfile for such an image:

FROM nginx:stable-alpine
COPY default.conf /etc/nginx/conf.d/default.conf

Where default.conf looks like this:

server {
    listen 80 default_server;
    index index.html;
    root /srv;

    error_page 404 /404.html;

    rewrite /repository https://enjoy.gitstore.app/repositories/read-with-the-author/read-with-the-author redirect;
}

This already works, and when I deploying the resulting image to the server that receives traffic for advwebapparch.com, a request for /repository will indeed redirect a visitor to https://enjoy.gitstore.app/repositories/read-with-the-author/read-with-the-author using a temporary redirect.

Generating the Nginx configuration from a text file

When I'm working on my book, I don't want to manually update a server configuration file every time I'm adding a URL. Instead, I'd like to work with a simple text file. Let's name this file forwards.txt:

/repository https://enjoy.gitstore.app/repositories/read-with-the-author/read-with-the-author
/blog https://matthiasnoback.nl

And then I want the Docker image build process to add rewrite rules automatically, So I wrote a little PHP script that does this runs during the build. Here's what the Dockerfile looks like. It uses a multi-stage build:

FROM php:7.4-alpine as php
# This will copy build.php from the build context to the image
COPY . .
# This will generate default.conf based on template.conf
RUN php build.php

FROM nginx:stable-alpine
# Copy the default.conf from the php image to the nginx image
COPY --from=php default.conf /etc/nginx/conf.d/default.conf

Here's what happens inside the PHP script:

function insertRewritesInNginxConf(string $conf): string
{
    $rewrites = [];

    foreach (file('forwards.txt') as $line) {
        $line = trim($line);
        if (empty($line)) {
            continue;
        }

        $rewrites[] = '    ' . 'rewrite ' . $line . ' redirect;';
    }

    return str_replace(
        '%INSERT_URL_REWRITES_HERE%',
        implode("
", $rewrites),
        $conf
    );
}

/*
 * Generate the Nginx configuration which includes all the actual
 * redirect instructions
 */
file_put_contents(
    'default.conf',
    insertRewritesInNginxConf(file_get_contents('template.conf'))
);

We should add a bit of validation for the data from the forwards.txt file so we don't end up with a broken Nginx configuration, but otherwise, this works just fine.

I don't want to manually check that all the links that are inside the "link registry" still work. Instead, I'd like to use Oh Dear for that, which does uptime monitoring and checks for broken links as well.

For this purpose I added another function to the PHP script, which, based

Truncated by Planet PHP, read more at the original (another 1844 bytes)




cr

'Job Creating' Sprint T-Mobile Merger Triggers Estimated 6,000 Non-Covid Layoffs

Back when T-Mobile and Sprint were trying to gain regulatory approval for their $26 billion merger, executives repeatedly promised the deal would create jobs. Not just a few jobs, but oodles of jobs. Despite the fact that US telecom history indicates such deals almost always trigger mass layoffs, the media dutifully repeated T-Mobile and Sprint executive claims that the deal would create "more than 3,500 additional full-time U.S. employees in the first year and 11,000 more people by 2024."

About that.

Before the ink on the deal was even dry, T-Mobile began shutting down its Metro prepaid business and laying off impacted employees. When asked about the conflicting promises, T-Mobile refused to respond to press inquiries. Now that shutdown has accelerated, with estimates that roughly 6,000 employees at the T-Mobile subsidiary have been laid off as the freshly-merged company closes unwanted prepaid retailers. T-Mobile says the move, which has nothing to do with COVID-19, is just them "optimizing their retail footprint." Industry insiders aren't amused:

"Peter Adderton, the founder of Boost Mobile in Australia and in the U.S. who has been a vocal advocate for the Boost brand and for dealers since the merger was first proposed, figures the latest closures affect about 6,000 people. He cited one dealer who said he has to close 95 stores, some as early as May 1.

In their arguments leading up to the merger finally getting approved, executives at both T-Mobile and Sprint argued that it would not lead to the kind of job losses that many opponents were predicting. They pledged to create jobs, not cut them.

“The whole thing is exactly how we called it, and no one is calling them out. It’s so disingenuous,” Adderton told Fierce, adding that it’s not because of COVID-19. Many retailers in other industries are closing stores during the crisis but plan to reopen once it’s safe to do so."

None of this should be a surprise to anybody. Everybody from unions to Wall Street stock jocks had predicted the deal would trigger anywhere between 15,000 and 30,000 layoffs over time as redundant support, retail, and middle management positions were eliminated. It's what always happens in major US telecom mergers. There is 40 years of very clear, hard data speaking to this point. Yet in a blog post last year (likely to be deleted by this time next year), T-Mobile CEO John Legere not only insisted layoffs would never happen, he effectively accused unions, experts, consumer groups, and a long line of economists of lying:

"This merger is all about creating new, high-quality, high-paying jobs, and the New T-Mobile will be jobs-positive from Day One and every day thereafter. That’s not just a promise. That’s not just a commitment. It’s a fact....These combined efforts will create nearly 5,600 new American customer care jobs by 2021. And New T-Mobile will employ 7,500+ more care professionals by 2024 than the standalone companies would have."

That was never going to happen. Less competition and revolving door, captured regulators and a broken court system means there's less than zero incentive for T-Mobile to do much of anything the company promised while it was wooing regulators. And of course such employment growth is even less likely to happen under a pandemic, which will provide "wonderful" cover for cuts that were going to happen anyway.

Having watched more telecom megadeals like this than I can count, what usually happens is the companies leave things generally alone for about a year to keep employees calm and make it seem like deal critics were being hyperbolic. Then, once the press and public is no longer paying attention (which never takes long), the hatchets come out and the downsizing begins. When the layoffs and reduced competition inevitably arrives, they're either ignored or blamed on something else. In this case, inevitably, COVID-19.

In a few years, the regulators who approved the deal will have moved on to think tank, legal or lobbying positions at the same companies they "regulated." The same press that over-hyped pre-merger promises won't follow back up, because there's no money in that kind of hindsight policy reporting or consumer advocacy. And executives like John Legere (who just quit T-Mobile after selling his $17.5 million NYC penthouse to Giorgio Armani) are dutifully rewarded, with the real world market and human cost of mindless merger mania quickly and intentionally forgotten.




cr

Appeals Court Says Prosecutors Who Issued Fake Subpoenas To Crime Victims Aren't Shielded By Absolute Immunity

For years, the Orleans Parish District Attorney's Office in Louisiana issued fake subpoenas to witnesses and crime victims. Unlike subpoenas used in ongoing prosecutions, these were used during the investigation process to compel targets to talk to law enforcement. They weren't signed by judges or issued by court clerks but they did state in bold letters across the top that "A FINE AND IMPRISONMENT MAY BE OPPOSED FOR FAILURE TO OBEY THIS NOTICE."

Recipients of these bogus subpoenas sued the DA's office. In early 2019, a federal court refused to grant absolute immunity to the DA's office for its use of fake subpoenas to compel cooperation from witnesses. The court pointed out that issuing its own subpoenas containing threats of imprisonment bypassed an entire branch of the government to give the DA's office power it was never supposed to have.

Allegations that the Individual Defendants purported to subpoena witnesses without court approval, therefore, describe more than a mere procedural error or expansion of authority. Rather, they describe the usurpation of the power of another branch of government.

The court stated that extending immunity would be a judicial blessing of this practice, rather than a deterrent against continued abuse by the DA's office.

The DA's office appealed. The Fifth Circuit Appeals Court took the case, but it seemed very unimpressed by the office's assertions. Here's how it responded during oral arguments earlier this year:

“Threat of incarceration with no valid premise?” Judge Jennifer Elrod said at one point during arguments. She later drew laughter from some in the audience when she said, “This argument is fascinating.”

“These are pretty serious assertions of authority they did not have,” said Judge Leslie Southwick, who heard arguments with Elrod and Judge Catharina Haynes.

The Appeals Court has released its ruling [PDF] and it will allow the lawsuit to proceed. The DA's office has now been denied immunity twice. Absolute immunity shields almost every action taken by prosecutors during court proceedings. But these fake subpoenas were sent to witnesses whom prosecutors seemingly had no interest in ever having testify in court. This key difference means prosecutors will have to face the state law claims brought by the plaintiffs.

Based upon the pleadings before us at this time, it could be concluded that Defendants’ creation and use of the fake subpoenas was not “intimately associated with the judicial phase of the criminal process,” but rather fell into the category of “those investigatory functions that do not relate to an advocate’s preparation for the initiation of a prosecution or for judicial proceedings.” See Hoog-Watson v. Guadalupe Cty., 591 F.3d 431, 438 (5th Cir. 2009)

[...]

Defendants were not attempting to control witness testimony during a break in judicial proceedings. Instead, they allegedly used fake subpoenas in an attempt to pressure crime victims and witnesses to meet with them privately at the Office and share information outside of court. Defendants never used the fake subpoenas to compel victims or witnesses to testify at trial. Such allegations are of investigative behavior that was not “intimately associated with the judicial phase of the criminal process.”

Falling further outside the judicial process was the DA's office itself, which apparently felt the judicial system didn't need to be included in its subpoena efforts.

In using the fake subpoenas, Individual Defendants also allegedly intentionally avoided the judicial process that Louisiana law requires for obtaining subpoenas.

The case returns to the lower court where the DA's office will continue to face the state law claims it hoped it would be immune from. The Appeals Court doesn't say the office won't ultimately find some way to re-erect its absolute immunity shield, but at this point, it sees nothing on the record that says prosecutors should be excused from being held responsible for bypassing the judicial system to threaten crime victims and witnesses with jail time.




cr

Harrisburg University Researchers Claim Their 'Unbiased' Facial Recognition Software Can Identify Potential Criminals

Given all we know about facial recognition tech, it is literally jaw-dropping that anyone could make this claim… especially without being vetted independently.

A group of Harrisburg University professors and a PhD student have developed an automated computer facial recognition software capable of predicting whether someone is likely to be a criminal.

The software is able to predict if someone is a criminal with 80% accuracy and with no racial bias. The prediction is calculated solely based on a picture of their face.

There's a whole lot of "what even the fuck" in CBS 21's reprint of a press release, but let's start with the claim about "no racial bias." That's a lot to swallow when the underlying research hasn't been released yet. Let's see what the National Institute of Standards and Technology has to say on the subject. This is the result of the NIST's examination of 189 facial recognition AI programs -- all far more established than whatever it is Harrisburg researchers have cooked up.

Asian and African American people were up to 100 times more likely to be misidentified than white men, depending on the particular algorithm and type of search. Native Americans had the highest false-positive rate of all ethnicities, according to the study, which found that systems varied widely in their accuracy.

The faces of African American women were falsely identified more often in the kinds of searches used by police investigators where an image is compared to thousands or millions of others in hopes of identifying a suspect.

Why is this acceptable? The report inadvertently supplies the answer:

Middle-aged white men generally benefited from the highest accuracy rates.

Yep. And guess who's making laws or running police departments or marketing AI to cops or telling people on Twitter not to break the law or etc. etc. etc.

To craft a terrible pun, the researchers' claim of "no racial bias" is absurd on its face. Per se stupid af to use legal terminology.

Moving on from that, there's the 80% accuracy, which is apparently good enough since it will only threaten the life and liberty of 20% of the people it's inflicted on. I guess if it's the FBI's gold standard, it's good enough for everyone.

Maybe this is just bad reporting. Maybe something got copy-pasted wrong from the spammed press release. Let's go to the source… one that somehow still doesn't include a link to any underlying research documents.

What does any of this mean? Are we ready to embrace a bit of pre-crime eugenics? Or is this just the most hamfisted phrasing Harrisburg researchers could come up with?

A group of Harrisburg University professors and a Ph.D. student have developed automated computer facial recognition software capable of predicting whether someone is likely going to be a criminal.

The most charitable interpretation of this statement is that the wrong-20%-of-the-time AI is going to be applied to the super-sketchy "predictive policing" field. Predictive policing -- a theory that says it's ok to treat people like criminals if they live and work in an area where criminals live -- is its own biased mess, relying on garbage data generated by biased policing to turn racist policing into an AI-blessed "work smarter not harder" LEO equivalent.

The question about "likely" is answered in the next paragraph, somewhat assuring readers the AI won't be applied to ultrasound images.

With 80 percent accuracy and with no racial bias, the software can predict if someone is a criminal based solely on a picture of their face. The software is intended to help law enforcement prevent crime.

There's a big difference between "going to be" and "is," and researchers using actual science should know better than to use both phrases to describe their AI efforts. One means scanning someone's face to determine whether they might eventually engage in criminal acts. The other means matching faces to images of known criminals. They are far from interchangeable terms.

If you think the above quotes are, at best, disjointed, brace yourself for this jargon-fest which clarifies nothing and suggests the AI itself wrote the pullquote:

“We already know machine learning techniques can outperform humans on a variety of tasks related to facial recognition and emotion detection,” Sadeghian said. “This research indicates just how powerful these tools are by showing they can extract minute features in an image that are highly predictive of criminality.”

"Minute features in an image that are highly predictive of criminality." And what, pray tell, are those "minute features?" Skin tone? "I AM A CRIMINAL IN THE MAKING" forehead tattoos? Bullshit on top of bullshit? Come on. This is word salad, but a salad pretending to be a law enforcement tool with actual utility. Nothing about this suggests Harrisburg has come up with anything better than the shitty "tools" already being inflicted on us by law enforcement's early adopters.

I wish we could dig deeper into this but we'll all have to wait until this excitable group of clueless researchers decide to publish their findings. According to this site, the research is being sealed inside a "research book," which means it will take a lot of money to actually prove this isn't any better than anything that's been offered before. This could be the next Clearview, but we won't know if it is until the research is published. If we're lucky, it will be before Harrisburg patents this awful product and starts selling it to all and sundry. Don't hold your breath.




cr

Senator Wyden And Others Introduce Bill Calling The DOJ's Bluff Regarding Its Attempt To Destroy Section 230 & Encryption

One of the key points we've been making concerning Attorney General William Barr and his DOJ's eager support for the terrible EARN-IT Act, is that much of it really seems to be to cover up the DOJ's own failings in fighting child porn and child exploitation. The premise behind the EARN IT Act is that there's a lot of child exploitation/child abuse material found on social media... and that social media companies should do more to block that content. Of course, if you step back and think about it, you'd quickly realize that this is a form of sweeping the problem under the rug. Rather than actually tracking down and arresting those exploiting and abusing children, it's demanding private companies just hide the evidence of those horrific acts.

And why might the DOJ and others be so supportive of sweeping evidence under the rug and hiding it? Perhaps because the DOJ and Congress have literally failed to live up to their mandates under existing laws to actually fight child exploitation. Barr's DOJ has been required under law to produce reports showing data about internet crimes against children, and come up with goals to fight those crimes. It has produced only two out of the six reports that were mandated over a decade ago. At the same time, Congress has only allocated a very small budget to state and local law enforcement for fighting internet child abuse. While the laws Congress passed say that Congress should give $60 million to local law enforcement, it has actually allocated only about half of that. Oh, and Homeland Security took nearly half of its "cybercrimes" budget and diverted it to immigration enforcement, rather than fighting internet crimes such as child exploitation.

So... maybe we should recognize that the problem isn't social media platforms, but the fact that Congress and law enforcement -- from local and state up to the DOJ -- have literally failed to do their job.

At least some elected officials have decided to call the DOJ's bluff on why we need the EARN IT Act. Led by Senator Ron Wyden (of course), Senators Kirsten Gillbrand, Bob Casey, Sherrod Brown and Rep. Anna Eshoo have introduced a new bill to actually fight child sex abuse online. Called the Invest in Child Safety Act, it would basically make law enforcement do its job regarding this stuff.

The Invest in Child Safety Act would direct $5 billion in mandatory funding to investigate and target the pedophiles and abusers who create and share child sexual abuse material online. And it would create a new White House office to coordinate efforts across federal agencies, after DOJ refused to comply with a 2008 law requiring coordination and reporting of those efforts. It also directs substantial new funding for community-based efforts to prevent children from becoming victims in the first place.

Basically, the bill would do a bunch of things to make sure that law enforcement is actually dealing with the very real problem of child exploitation, rather than demanding that internet companies (1) sweep evidence under the rug, and (2) break encryption:

  • Quadruple the number of prosecutors and agents in DOJ’s Child Exploitation and Obscenity Section from 30 FTEs to 120 FTEs;
  • Add 100 new agents and investigators for the Federal Bureau of Investigation’s Innocent Images National Initiative, Crimes Against Children Unit, Child Abduction Rapid Deployment Teams, and Child Exploitation and Human Trafficking Task Forces;
  • Fund 65 new NCMEC analysts, engineers, and mental health counselors, as well as a major upgrade to NCMEC’s technology platform to enable the organization to more effectively evaluate and process CSAM reports from tech companies;
  • Double funding for the state Internet Crimes Against Children (ICAC) Task Forces;
  • Double funding for the National Criminal Justice Training Center, to administer crucial Internet Crimes Against Children and Missing and Exploited Children training programs;
  • Increase funding for evidence-based programs, local governments and non-federal entities to detect, prevent and support victims of child sexual abuse, including school-based mental health services and prevention programs like the Children’s Advocacy Centers and the HHS’ Street Outreach Program;
  • Require tech companies to increase the time that they hold evidence of CSAM, in a secure database, to enable law enforcement agencies to prosecute older cases;
  • Establish an Office to Enforce and Protect Against Child Sexual Exploitation, within the Executive Office of the President, to direct and streamline the federal government’s efforts to prevent, investigate and prosecute the scourge of child exploitation;
  • Require the Office to develop an enforcement and protection strategy, in coordination with HHS and GAO; and
  • Require the Office to submit annual monitoring reports, subject to mandatory Congressional testimony to ensure timely execution.
While I always have concerns about law enforcement mission creep and misguided targeting of law enforcement efforts, hopefully everyone can agree that child exploitation does remain a very real problem, and one that law enforcement should be investigating and going after those who are actually exploiting and abusing children. This bill would make that possible, rather than the alternative approach of just blaming the internet companies for law enforcement's failure to take any of this seriously.




cr

Secret Service Sends FOIA Requester A Redacted Version Of A Public DOJ Press Release

The government loves its secrets. It loves them so much it does stupid things to, say, "secure the nation..." or "protect the integrity of deliberative processes" or whatever the fuck. We should not trust the government's reasoning when it chooses to redact information from documents it releases to FOIA requesters. These assertions should always be challenged because the government's track record on redactions is objectively awful.

Here's the latest case-in-point: Emma Best -- someone the government feels is a "vexatious" FOIA filer -- just received a completely stupid set of redactions from the Secret Service. Best requested documents mentioning darknet market Hansa, which was shut down (along with Alpha Bay) following an investigation by US and Dutch law enforcement agencies.

The documents returned to Best contained redactions. This is unsurprising given the nature of the investigation. What's surprising is what the Secret Service decided to redact. As Best pointed out on Twitter, the Secret Service decided public press releases by the DOJ were too sensitive to be released to the general public.

Here's one of the redactions [PDF] the Secret Service applied to a press release that can be found unaltered and unedited at the Justice Department's publicly-accessible website:

And here's what the Secret Service excised, under the bullshit theory that a publicly-released press statement is somehow an "inter-agency or intra-agency memorandums or letter which would not be available by law to a party other than an agency in litigation with the agency."

“This is likely one of the most important criminal investigations of the year – taking down the largest dark net marketplace in history,” said Attorney General Jeff Sessions. “Make no mistake, the forces of law and justice face a new challenge from the criminals and transnational criminal organizations who think they can commit their crimes with impunity using the dark net. The dark net is not a place to hide. The Department will continue to find, arrest, prosecute, convict, and incarcerate criminals, drug traffickers and their enablers wherever they are. We will use every tool we have to stop criminals from exploiting vulnerable people and sending so many Americans to an early grave. I believe that because of this operation, the American people are safer – safer from the threat of identity fraud and malware, and safer from deadly drugs.”

Um. Is Jeff Sessions being Yezhoved by the Secret Service? Does the agency consider him to be enough of a persona non grata after his firing by Trump to be excised from the Secret Services' official recollection of this dark web takedown? This insane conspiracy theory I just made up makes as much sense as anything the Secret Service could offer in explanation for this redaction. The redaction removed nothing but the sort of swaggering statement Attorney Generals always make after a huge bust.

Needless to say, Emma Best is challenging the Secret Service's redactions. Pithily.

I am appealing the integrity of the redactions, as you withheld public press releases under b5, which is grossly inappropriate.

Yeah. That's an understatement. The Secret Service has no business redacting publicly-available info. Even if this was a clerical error, it's so bad it's insulting. And that's why you can't trust the government on things like this: when it's not being malicious, it's being stupid.




cr

Tales From The Quarantine: People Are Selling 'Animal Crossing' Bells For Real Cash After Layoffs

This seems to be something of a thing. Our last "Tales From the Quarantine" post focused on how television celebrities had taken to offering people help on Twitter with their virtual home decor in the latest Animal Crossing game. This post also involves Animal Crossing, but in a much more direct way. Due to the COVID-19 pandemic, there are enormous numbers of people who have suddenly found themselves without jobs or regular income. And, so, they've turned to irregular sources of income instead.

Ars Technica has an interesting interview with one of many people who have taken to the internet to indirectly sell Animal Crossing's "bells", the currency of the game.

In the midst of COVID-19, some New Horizons players are turning to World of Warcraft-style gold farming methods to make ends meet. In early April, Lexy, a 23-year-old recent college grad, created a Twitter account offering up bells (Animal Crossing’s in-game currency) for real-world cash (she requested we refer to her by a nickname to avoid potential reprisal from Nintendo). “I got laid off due to COVID so I'm farming bells in ACNH,” she wrote. “I really need to make rent this month so I'm selling 2 mil bells per $5, please message me if interested, I'll give you a discount the more you buy.”

Before setting up this unorthodox income stream, Lexy had been working at a supermarket while developing her animation portfolio. She began exploring the idea of turning bells into cash after showing friends just how much in-game income she’d been making. “One of them asked to legitimately buy some for me,” she recalled in a Twitter interview. “I did some research and found some people selling bells on sites such as eBay, but for pretty ridiculous prices.” (Current prices on eBay seem more competitive, with some sellers offering rare gold tools and gold nuggets to sweeten the deal).

The threat from Nintendo is probably real. After all, unlike some other games where people do this sort of thing, Nintendo's game doesn't include any method for selling in-game resources for real currency. Nintendo is also notoriously prudish about things like this. And, finally, to make an effective go at this sort of thing, it takes some manipulation of the console in a way that is somewhat controversial with gamers generally.

Understandably, Lexy adjusts the clock on her Nintendo Switch to speed up the game’s slow, “natural” money-making cycle of harvesting daily fruit, digging up bells from the ground, and planting a daily “money tree” that can yield big profits. This kind of in-game “time traveling” is controversial practice among casual Animal Crossing players, but it's a practical necessity to maximize real-world bell-farming profits.

As for how much money people like Lexy are bringing in, it's in the four figures, but she wasn't any more specific than that. Payments are made through digital apps like PayPal, after which she visits the game islands of others and deposits the bells.

That all of this is going on during a global pandemic that has some folks farming bells to make ends meet and others with apparently enough disposable income to be buyers is all, of course, deeply strange. But it's also just yet another way technology is having an impact on our lives during the COVID-19 pandemic.




cr

From Playing Games to Committing Crimes: A Multi-Technique Approach to Predicting Key Actors on an Online Gaming Forum

I recently travelled to Pittsburgh, USA, to present the paper “From Playing Games to Committing Crimes: A Multi-Technique Approach to Predicting Key Actors on an Online Gaming Forum” at eCrime 2019, co-authored with Ben Collier and Alice Hutchings. The accepted version of the paper can be accessed here. The structure and content of various underground … Continue reading From Playing Games to Committing Crimes: A Multi-Technique Approach to Predicting Key Actors on an Online Gaming Forum




cr

Three Paper Thursday: The role of intermediaries, platforms, and infrastructures in governing crime and abuse

The platforms, providers, and infrastructures which together make up the contemporary Internet play an increasingly central role in the business of governing human societies. Although the software engineers, administrators, business professionals, and other staff working at these organisations may not have the institutional powers of state organisations such as law enforcement or the civil service, … Continue reading Three Paper Thursday: The role of intermediaries, platforms, and infrastructures in governing crime and abuse



  • Three Paper Thursday

cr

Three Paper Thursday: Exploring the Impact of Online Crime Victimization

Just as in other types of victimization, victims of cybercrime can experience serious consequences, emotional or not. First of all, a repeat victim of a cyber-attack might face serious financial or emotional hardship. These victims are also more likely to require medical attention as a consequence of online fraud victimization. This means repeat victims have a … Continue reading Three Paper Thursday: Exploring the Impact of Online Crime Victimization




cr

#440993 - Fresh Cranberry Chutney Recipe



Fresh Cranberry Chutney ~ A very delicious fresh and easy to make berry chutney

craving more? check out TasteSpotting




cr

#441012 - Coconut Keto Crepes Low Carb Recipe



Coconut flour keto crepes are easy to make and absolutely delicious. You can fill them with your favorite sweet low-carb fillings for a great breakfast or healthy dessert.

craving more? check out TasteSpotting




cr

#441014 - Instant Pot Cranberry Cornbread Bites Recipe



Instant Pot Cranberry Cornbread Bites shaped like Christmas Jingle Bells, pair up for the perfect bite of sweet and tart spiced cranberries.

craving more? check out TasteSpotting




cr

Fake crypto-wallet extensions appear in Chrome Web Store once again, siphoning off victims' passwords

'Seriously sometimes seems Google's moderators are only optimized to respond to social media outrage'

Three weeks after Google removed 49 Chrome extensions from its browser's software store for stealing crypto-wallet credentials, 11 more password-swiping add-ons have been spotted – and some are still available to download.…




cr

Non-human Microsoft Office users get their own special licences

Automated operators can pay up like anyone – or anything – else

Microsoft has detailed a new form of software licence it offers to non-human users.…




cr

What do you call megabucks Microsoft? No really, it's not a joke. <i>El Reg</i> needs you

It is time. We need a new Regism and cannot go to the pub to think of one. Can you help?

It is no secret that we like to use the odd bit of shorthand at The Register when biting the hand that feeds IT. Now we need a fresh one for Microsoft.…




cr

GitHub Codespaces: VS Code was 'designed from the get-go' for this, says Microsoft architect

A compelling addition to repo house – but is the Redmond flavour too strong?

GitHub had a lot to say about its plans at its virtual Satellite event yesterday, but the most far-reaching was the advent of Codespaces, the ability to edit code online, integrated into the GitHub user interface.…




cr

Bored at home? Cisco has just the thing: A shed-load of security fixes to install, from a Kerberos bypass to crashes

Switchzilla issues a whopping 30+ patches in time for the long UK weekend

Cisco has emitted a fresh round of software updates to address nearly three dozen security holes in its products.…




cr

The point of containers is they aren't VMs, yet Microsoft licenses SQL Server in containers as if they were VMs

And now to avoid container sprawl costing you plenty

Microsoft has slipped out licensing details for SQL Server running in containers and it will likely encourage developers to be pretty diligent in their use of Redmond’s database.…




cr

Behold: The ghastly, preening, lesser-spotted Incredible Bullsh*tting Customer

If you listen closely, you can hear how the creatures' full-throated call increases in volume when you are on holiday

On Call Friday is here! How is your weekend looking? Same as the last one, and the one before that? Never mind – before breaking into the lockdown lagers, join us for another entry in The Register's tales of those brave souls who are On Call.…




cr

Microsoft claims AWS has used new JEDI mind trick with secret contract objection filing

It's over, Amazon, we have the high ground (and all you had was a high price) says Redmond

Updated Amazon.com has filed a second, secret, appeal against the decision to award Microsoft the Pentagon's $10bn Joint Enterprise Defense Infrastructure (JEDI) cloud contract.…




cr

I've seen things you people wouldn't believe. Spacecraft with graphene sails powered by starlight and lasers

Nice way to get to Alpha Centauri though boffin tells us: 'Such a laser system could be used as a weapon'

Coin-sized pieces of graphene can be accelerated by firing low-powered lasers at them in micro-gravity conditions, say scientists. The technology could be a stepping stone to graphene solar sails, which could propel future spacecraft using starlight or a laser array.…




cr

3/23/14 - This might sound crazy




cr

01/17/16 - Out there creating memories




cr

04/02/17 - Finally stopped crying





cr

Microsoft показала первые игры для Xbox Series X

Вам понравятся.