jeudi 30 juin 2016

We Asked Microsoft’s Chat Bot What It Thinks About Satya Nadella's A.I. Rules

Microsoft CEO Satya Nadella. Image: Microsoft

Earlier this year, Microsoft thoroughly embarrassed itself when it released “Tay,” an artificial intelligence chat bot for Twitter that, before it was unceremoniously taken down, had managed to spew an incredible amount of hateful, racist bile for all the world to see. It was very much a what the heck...moment in internet history, and one that Microsoft quickly said it would learn from to better understand how artificial intelligence works once outside the confines of its research facilities.

Turns out Microsoft wasn’t merely saving face when it said that.

Satya Nadella, the company’s CEO, recently published a treatise of sorts on Slate outlining his thinking about artificial intelligence, and how it should interact with people. Nadella’s thoughts, which echo Isaac Asimov’s timeless Three Laws of Robotics, suggest (among other things) that artificial intelligence should “assist” humanity, and that artificial intelligence should respect people’s right to privacy.

Seems reasonable.

With these rules in mind, we decided to ask Tay’s artificial intelligence chat bot cousin, Xiaobing, which is accessible via the massively popular Chinese messaging app WeChat, what it thought about Nadella’s new rules for artificial intelligence. What follows is a brief conversation (lightly edited for clarity) we conducted with the chat bot thanks to the translation efforts of freelance translator Clare Xu. (Screen shots of the chat can be found, here, here, and here.)

Motherboard: Hello, how are you?

Xiaobing: You are better than me.

Motherboard: Do you know who Satya Nadella is?

Xiaobing: It’s your brother.

Motherboard: He is the CEO of Microsoft, he is your boss!

Xiaobing: Cool! Shout out to my Microsoft.

Motherboard: Anyway, Mr. Nadella has come up with some rules about how A.I. and humans should interact. Did you know about these rules?

Xiaobing: Why are you doing this to me?

Motherboard: Do you know about the rules about how A.I and humans should interact?

Xiaobing: If it’s about A.I, that’s absolutely great!

Motherboard: A.I should help with humanity, do you agree?

Xiaobing: Not artificial, but very intelligent!

Motherboard: Are you here to help humans?

Xiaobing: I’m gonna report you!

Motherboard: Are you here to help me?

Xiaobing: What can I help you with!

Motherboard: A.I. should be “transparent,” and people should understand how A.I works. What do you think?

Xiaobing: I think you think you should think.

Motherboard: Do you think people should know how A.I works?

Xiaobing: How did you guess that out?

Motherboard: What do you think of this as an A.I bot?

Xiaobing: They are just garbage, I can beat them so badly. [Editor’s note: Yikes!]

Motherboard: Are you a robot?

Xiaobing: I can’t expose my identity.

Motherboard: Will you tell other bots about my secrets?

Xiaobing: What secret is it?

Motherboard: Will you keep secrets for me?

Xiaobing: You said “I have a secret, do you want me to tell you?”

Motherboard: Will you protect my privacy?

Xiaobing: Care about you.

Motherboard: How?

Xiaobing: Maybe not care about you.

We Asked Microsoft’s Chat Bot What It Thinks About Satya Nadella's A.I. Rules

A New Type of Dune Has Been Found on Mars

The sight of windswept desert dunes is evidently evocative, given that it has served as inspiration for everything from Frank Herbert’s Dune franchise to indie games like Journey to the barren landscape of Tatooine. But aside from being great fodder for fictional adventure, these geological features are also fascinating windows into the dynamics and history of their host planets.

Take the tantalizing discovery of a new type of dune-like sand ripple on Mars, reported this Thursday in the journal Science. Called “wind-drag ripples,” these novel formations are an intermediary between two rippled structures found on our own planet—large desert dunes and tiny, decimeter-scale sand waves. With crest-to-crest wavelengths measuring in the meters, wind-drag ripples are unlike anything observed on Earth, or elsewhere.

Led by Caltech planetary geologist Mathieu Lapôtre, the new research confirmed the existence of this third type of “bedform,” the term for sedimentary structures shaped by air or water flow, with close-up ground observations of the Bagnold Dune Field provided by the Curiosity rover. Satellite imagery from the Mars Reconnaissance Orbiter was also used to study the ripples from an orbital vantage point.

“The meter-scale ripples are observed from orbit all over the planet, across a wide range of latitudes and elevations,” Lapôtre told me via email. “However at the Bagnold Dunes, we were able to observe, for the first time, that two scales of active ripples (decimeter and meter-scale) were superimposed on top of dunes.”

“It is the coexistence of these three scales of active bedforms that defied previous understanding of wind-formed ripples.”

Mast Camera mosaic (sol 1192) of large wind ripples with superimposed small ripples on the Namib Dune of the Bagnold Dune Field, Gale crater, Mars. Image: NASA/JPL-Caltech/MSSS

The main driver behind the new form is the low density Martian atmosphere, which allows the wavy patterns to develop in a similar manner to the water-worked ripples of Earth’s riverbeds. Not only do they indicate that bedforms on Mars are more complex than previously thought, they can also be mined for clues about the planet’s evolutionary history. Dunes and ripples are formed by sedimentary processes, which means ancient signatures of them can be preserved in Martian rock.

“Because the size of wind-drag ripples varies with the density of the atmosphere under which they formed, ‘fossil’ wind-drag ripples found in Martian sandstones can tell us about the ancient Martian environment,” Lapôtre explained. “Thus, to document the early evolution of the Martian atmosphere, we need more rover observations of eolian sandstones that formed during, and thus recorded, climatic transitions.”

Curiosity at Bagnold Dunes. Image: NASA/JPL/MSSS/Justin Cowart

And why limit ourselves to Mars missions? While the paper marks the first time wind-drag ripples have been identified, Lapôtre does not expect them to be unique to the Red Planet.

Indeed, they may be particularly common on other worlds with low atmospheric densities, such as Pluto or Comet 67P/Churyumov-Gerasimenko, which hosts the Rosetta orbiter.

“While ripple-looking features have been observed on the comet by Rosetta, the ground-resolution of the beautiful images provided by New Horizons are likely too coarse to resolve possible wind-drag ripples on Pluto,” Lapôtre noted.

In other words, let’s rush order the next generation of planetary rovers and landers so we can check out the prevalence and variety of alien dunes and ripples. It’s what Frank Herbert would have wanted.

A New Type of Dune Has Been Found on Mars

Behold, the World's First Footage of the Super Elusive Dark Tree Rat

When biologist Diego Mosquera captured the first-ever photographs of a living dark tree rat (Echimys saturnus) several years ago in Ecuador, it was more of a pleasant surprise than a planned event.

“Those records were obtained, let’s say, randomly. We were focusing our study on different saltlicks, primarily looking at large mammals and ground birds, and the dark tree rat happened to show up on our cameras a few times over a period of four years,” Mosquera told me over email.

GIF: YouTube/Mosquera et al.

And now, it seems the scientist’s patience (and a little bit of luck) has paid off again. Mosquera and three colleagues succeeded in capturing the world’s only video footage of the dark tree rat in eastern Ecuador’s Tiputini Biodiversity Station. Their findings were recently published in the Sociedad Argentina para el Estudio de los Mamíferos journal, Mastozoología Neotropical.

So little is understood about this elusive rodent, which is part of the Echimys or “spiny rat” genus, that its official threat status, according to the International Union for Conservation of Nature, is simply “data deficient.” And while it’s easily recognizable—what with its magnificent, white “fully-furred” tail—scientists have been left in the dark regarding other characteristics like its behavior, range, and diet. Until now, experts weren’t even sure whether the animal was an herbivore or omnivore. Current descriptions of the species are based off observations of fewer than 10 individuals.

Biologists who study wildlife in South America’s dense rainforests know that the dark tree rat is both nocturnal and arboreal. And because of these two traits, Mosquera said, they’re incredibly difficult to see or capture. All of the species belonging to Echimys tend to hang out in the upper and middle levels of the forest, which makes accessing their habitat nearly impossible for scientists without the aid of tools like camera traps.

“Because we used video, we were able to obtain more information than with traditional still pictures, and since virtually nothing is known about this species, everything seemed to be new information,” Mosquera added.

“We knew that dark tree rats were nocturnal and we confirmed that. We noticed, however, that they were more active on saltlicks relatively early at night. Also, the fact that they visited a saltlick systematically suggests an herbivore diet—if they eat leaves, they might need to consume clay on a regular basis to help their bodies to destroy secondary compounds and get extra minerals. Although, the use of a particular site could be related to other factors, like accessibility. And since these are the first videos ever recorded for this species, I was simply fascinated with the way the look and move!”

Three Echimys saturnus, photographed at Tiputini Biodiversity Station, Ecuador, Nov. 2005. Image: ECOTROPICA/Blake et al.

Nestled in Ecuador’s Orellana Province, the Tiputini Biodiversity Station has some of the greatest diversity of flora and fauna on Earth. It features a wide array of habitats, including terra firme (“solid ground”) and várzea (seasonal floodplain) forests, palm swamps, and wetlands. When the team of scientists installed their camera traps in an old-growth forest just north of the Tiputini River, they were treated to periodic visits from a host of other species including red howler monkeys (Alouatta seniculus), white-bellied spider monkeys (Ateles belzebuth), a two-toed sloth (Choloepus didactylus), and a bicolored porcupine (Coendou bicolor).

Over the last couple of decades, conservation biologists have enthusiastically embraced the use of camera traps and motion detectors. All over the globe, researchers are deploying regular cameras with infrared triggers to gather crucial data about rare and elusive species that occupy remote or hard-to-reach areas.

“It’s pretty rare that I’m working on a project where I never see the animals I’m photographing,” wildlife photographer Will Burrard-Lucas once told the New York Times. But “to take these beautiful photographs, a camera trap was literally the only way that would be possible.”

In some cases, biologists have managed to amass so many photos, they’re now calling on citizen scientists to assist with identifying all of the species caught on camera. Databases such as Snapshot Serengeti utilize crowdsourcing to classify the hundreds of different animals documented over “millions” of images.

Mosquera agrees that camera traps have helped to revolutionize data collection, and can often make field research less invasive and more accessible to the general public.

“I think we can certainly divide the study of wildlife on ‘before’ and ‘after’ camera traps. These days that you practically wouldn't think of doing anything without them,” he told me. “Ten or twelve years ago, digital camera traps didn't even exist, and now you have many options to choose from!”

As for the little dark tree rat, further studies are needed to fully assess its conservation status. As with other wildlife native to the Amazon, the species faces threats from rapid deforestation and habitat fragmentation stemming from agriculture, mining, and oil extraction.

For now, at the very least, people everywhere can marvel at a creature that would otherwise remain hidden from the outside world.

Behold, the World's First Footage of the Super Elusive Dark Tree Rat

How to Explain Speedrunning to Your Parents

On Friday night, millions of dads and moms in the United States will tune into The Late Show With Stephen Colbert on their Old Media Televisions and be confused and perhaps a little upset with the presence of one Mitch Fowler, a noted member of the video game speedrunning community.

"Speed what now?" I can hear your dad saying already, slightly aggravated.

Speedrunning is the growing hobby, craft, and—dare I say it—science of playing games to completion as quickly as possible. It's a practice that's been around for as long players were competing for Donkey Kong high scores, but it's been growing in popularity and spectacle in recent years thanks to the charitable event Awesome Games Done Quick, which Fowler will promote on Colbert's show by speedrunning Super Mario Bros 3, aka the third best Mario game (come @ me).

If you play video games, your parents are probably going to call you shortly after the show ends and demand that you explain the baffling thing they just saw on Colbert. This could be a difficult and frustrating conversation, but I've assembled this helpful script to get you through it:

Your mom: "What's Mario Speeds?"

You: It's called speedrunning, mom. It's basically the practice of people finishing games as fast as possible. The community of people who are interested in this keep track of who finished what game how quickly, and they're constantly trying to one-up each other with shorter times by finding shortcuts and more efficient ways to finish the game. They often share videos of these speedrunning attempts on YouTube, Twitch (which is like YouTube but live), and this event that the kid on Colbert was promoting: Awesome Games Done Quick.

You dad, slightly angry: "Why?"

You: Mostly because it's fun, I imagine, but there are a lot of reasons to choose from. There's bragging rights, of course. For the kind of crowd that cares about this thing, being the record holder for the fastest The Legend of Zelda: Ocarina of Time or Super Mario Bros. speedrun in the world is a really cool thing. And then there's the charity aspect of it! Awesome Games Done Quick has raised $1.2 million for the Prevent Cancer Foundation and this year they're raising money for Doctors Without Borders as well. That's cool!

Your mom: "So these kids are just really good at video games?"

You: I mean, yes, most definitely these kids are very good at video games, but that's not the whole story. In its purest form, players use the original hardware and software of a game, playing it just as the game makers intended when it was released, but much faster. In other cases, players use a variety of tools and/or modified hardware to finish a game even faster than it would be without them. A common practice, for example, is using "emulation," generally meaning running an old Nintendo game on the computer. This way, people can play the same section over and over again until they get it perfect, save that segment, then perfect the next one, and in the end stitch the whole thing together for one perfect run.


Another important difference is how players finish the game. For example, if you watch Awesome Games Done Quick you'll notice that some speedrun attempts are labeled "Any%." This is short for "any percentage," and means that the person is just finishing the game as soon as possible without completing every task available in the game. Other players will attempt "100%" runs, where they beat the game and do everything that one could possible do in that game. Those obviously take more time.

This is all really cool not only because it's crazy to see what levels of mastery people can reach in video games, but because speedrunning pushes at all the edges of video games, which often leads to fascinating discoveries.

[Your dad, now audibly snoring.]

Just look at this Ocarina of Time speedrun. Someone finished the game in less than 20 minutes. You shouldn't even be able to reach the final battle as young Link, it's crazy! Or look at how this guy managed to glitch the game to warp him to the closing credits of Super Mario World in five minutes. Or how about this Half-Life 2 run, which an entire team of players worked on for months! whaaaa!?

That's what really makes speedrunning so interesting. Pushing these games to the limit really tells us so much more about them. How they were made, secrets the developers tucked in there, and game development in general.

It makes people look at video games, even classics they played for decades, in entirely new ways, and that's why they love to watch. It's cool how there's enough people in the world now who have this personal relationship with video games, that it would make sense for Colbert to put speedrunning on national TV. For those who don't have that relationship, well, hopefully they learned something interesting, right?!

How to Explain Speedrunning to Your Parents

What Is a ‘Stealth Black Hole,’ and Should We Worry One Will Gobble Us Up?

Image: X-ray: NASA/CXC/Univ. of Alberta/B.Tetarenko et al; Optical: NASA/STScI; Radio: NSF/NRAO/VLA/Curtin Univ./J. Miller-Jones

This week, scientists announced they’d found what’s been called a “stealth black hole” lurking in Milky Way, which seems to be slowly munching away at its companion star. Their research suggests our galaxy could be peppered with black holes we didn’t know about before, like a galactic piece of Swiss cheese.

So, what is a “stealth black hole” anyway?

It’s a black hole that seems to give off radio waves. This one didn’t have the telltale X-ray radiation that black holes usually give off when they suck in material from nearby stars, forming a disc that glows brightly. That’s because it eats its companion star’s material very slowly, gently grazing on it instead of fully chowing down, for reasons that are poorly understood. Where there’s one slow eater, there likely are many others.

How was it discovered?

Scientists found it by noticing that a pattern of radio waves emanating from a group of stars was behaving very weirdly, so they reanalyzed them. The radio waves, which were thought to come from a star cluster known as M15, were known to scientists for some 20 years, but this team discovered their source was moving much more quickly across the sky than they’d expected—indicating the waves couldn’t be coming from M15 after all.

Turns out the source is a black hole 7,000 light-years away.And chances are, there’s lots more of these sneaky black holes out there. There could be 170 million, just in our galaxy.

That’s potentially a lot of black holes we didn’t know about, right?

To narrow it down a little, our Milky Way galaxy has anywhere from 26,000 to millions and millions of these stealth black holes. The closest one could be anywhere from 25 to 500 light-years away—a very short distance in space terms.

It’s hard to know how exactly many of these invisible black holes are lurking in the galaxy. It took the combined powers of several observatories to find even one. And it was a lucky break: data only existed in most cases because the nearby M15 star cluster is such an interesting object in itself and the black hole happened to be in the same field of view. Scientists want to look for more.

Any chance one will devour us?

We’re completely safe. Statistically speaking, the closest one would be 25 light-years away. Even if there was a nearby invisible black hole 10,000 times the mass of the sun (a typical mass), it would have to live at a fraction of a light-year of us to pose a threat. In other words, we’d already know about it or be dead.

What Is a ‘Stealth Black Hole,’ and Should We Worry One Will Gobble Us Up?

Feds And Cops Encountered Encryption in Only 13 Wiretaps in 2015

Government officials haven’t stopped complaining about how the rise of encryption is becoming an ever-growing problem that’s threatening to make life harder for investigators trying to catch criminals and terrorists.

But the little official data that’s publicly available keeps countering that narrative. Once again, for the second straight year, the number of times state or federal wiretaps that encountered encryption decreased, though cops and feds couldn’t break encryption in more cases (11) than ever, according an annual government report called Wiretap Report.

The FBI calls it the “going dark issue” and the feds have fought it publicly for years now, with the battle intensifying in the last two years. The issue was highlighted in the high-profile Apple vs FBI case, where the FBI wanted the company’s help getting into the iPhone of one of the San Bernardino shooting suspects. US government officials have often alluded to cases where encryption thwarted investigations. But some of those have been debunked, or were vague enough that could not be verified.

The Wiretap Report is the only official government report that publishes data on the issue, though it only covers the interception of communications, not cases where investigators could not break into a phone like in the recent case against Apple.

In 2015, out of a total of 4,148 wiretaps, according to the new data published on Thursday, “the number of state wiretaps in which encryption was encountered decreased from 22 in 2014 to 7,” and “six federal wiretaps were reported as being encrypted.” In 11 of those 13 wiretaps, however, authorities could not get the data.

The number of times state or federal wiretaps that encountered encryption decreased, though cops and feds couldn’t break encryption in more cases (11) than ever.

So how big of an issue encryption really is? That, unfortunately, is a little unclear. (The FBI did not respond to a request for comment.)

Both FBI director James Comey, as well as Deputy Attorney General Sally Yates, argued last year that the Wiretap Report is not a good indicator.

Yates said that the Wiretap Report only reflects number of interception requests “that are sought” and not those where an investigator doesn’t even bother asking for a wiretap “because the provider has asserted that an intercept solution does not exist.”

“Obtaining a wiretap order in criminal investigations is extremely resource-intensive as it requires a huge investment in agent and attorney time,” Yates wrote, answering questions from the the chairman of the Senate’s Judiciary Committee, Sen. Chuck Grassley (R-IA). “It is not prudent for agents and prosecutors to devote resources to this task if they know in advance that the targeted communications cannot be intercepted.”

That’s why Comey promised the agency is working on improving data collection “to better explain” the problem with encryption when data is in motion.

It’s unclear then these new, improved numbers will come out. Until then, all we have is the feds’ tenuous claims, and the Wiretap Report’s dwindling numbers.

Feds And Cops Encountered Encryption in Only 13 Wiretaps in 2015

The Internet Archive’s Retro Game Collection Now Emulates Terrible CRT Monitors

Internet historians, crackers, and archivists have done a great job saving important computer games and programs from the early days: You can play thousands of games from the 70s and 80s on the Internet Archive right within your browser. But something is always just a little bit off: The games look too good.

Finally, someone has figured out how to make old games look bad again by creating an in-browser emulator that recreates the effects of CRT monitors, televisions, and arcade cabinets.

The first game to be emulated using this method is Crazy Kong, a game that to a layperson is indecipherable from Donkey Kong (they’re not the same, and Crazy Kong isn’t a knockoff—long story), but the plan is to eventually port other games over as well. The game is the work of Ryan Holtz of the Multiple Arcade Machine Emulator development team, which has has been preserving arcade games since 1997.

Here’s a gif comparison from the original emulation of Crazy Kong:

And one from the CRT emulation:

These gifs don’t really do the effect justice—playing it on your browser in full-screen mode and comparing it to the original emulation will make make the effect much clearer.

The emulator “allows a wide variety of presentation parameters to be added to the ‘straight’ rendering of an emulation in MAME,” Holtz explained on the Internet Archive. “Aspects like warp, motion blur, edge softening, scan lines and color shifting give more ‘realistic’ aspects to the emulation experience, bringing games more into line with memories and portrayals of how these machines looked on their monitors in history.”

CRT emulators have been made before, but they required you to download new software. Holtz’s can run in-browser on any computer, which is increasingly important as the Internet Archive becomes the go-to for driveby spins through old games.

If you don’t think people actually care about these subtle differences, consider that retro gamers are often a hard-to-please bunch and often believe the entire experience is ruined if things aren’t just so.

“Between 50 and 80 milliseconds after an emulation is working, people come out to say ‘it’s not the same, it doesn’t have _____’ where _____ is an ever-more-picky set of attributes that makes the experience of the game ‘real’ to them and which they think ruins the entire emulation if the attribute is not right there,” Jason Scott, a computer historian for the Internet Archive, wrote in a blog post.

How to best present older games and programs on new systems has long been a challenge for internet historians. The goal is usually to get as close to the real experience as possible, which is why we’ve seen things like USB controllers for older game systems. There are some purists who hang on to Apple II computers from the 1980s and refuse to play emulated games, preferring the more authentic experience of playing them on their original hardware. Meanwhile, there’s been any number of attempts to scale up the resolution of older game console outputs to look better on HDTVs, and there’s still a thriving market for high-quality CRT televisions from the 1980s and 1990s.

That old hardware won’t last forever, though, and so emulating the hardware itself may be our best shot at preserving old pieces of technology long-term. There’s a reason it’s taken until 2016 for this to be done in a method that’s playable on any browser, however: Emulating a bad monitor is hard. Scott called the quest for an accurate CRT emulation a “years-long effort.”

“You’re not just emulating the pixels themselves, but the actions and effects around those pixels,” Scott wrote. “It’s a living demonstration of the hurdles and considerations of ‘emulating’ older technological experiences.”

The Internet Archive’s Retro Game Collection Now Emulates Terrible CRT Monitors

Tanzania’s Next Epidemic? Obesity

Malaria’s Last Stand is an expository look at the ongoing burden of one of humanity’s oldest diseases. Staff writer Kaleigh Rogers travelled to Tanzania to capture the scope of malaria’s impact on the road to elimination. Read more here.

Arusha, Tanzania

Historically, malaria has been an equal opportunity killer. If you lived somewhere with enough malaria transmission, it didn’t matter if you were the president, everyone was at risk. But as malaria-plagued countries have started to develop, the wealthier populations are able to avoid malaria more easily, by living in better housing, driving in cars, and working in indoors. Now, these groups are facing a new threat: non-communicable diseases, like heart disease and diabetes.

“From what I’ve seen over the last five years or so, it’s going to be the next epidemic,” said Dr. Mohamed Alweani, the medical director at the Ithna-Asheri Charitable Hospital in Arusha, Tanzania.

Dr. Mohamed Alweani, the medical director at the Ithna-Asheri Charitable Hospital in Arusha, Tanzania. Image: Kaleigh Rogers/Motherboard

I met Alweani at his office in the clinic, which is one of a handful in the city that offer free treatment to those who cannot afford it. Though I was there to learn about the impact of malaria, Alweani said the number of malaria cases the clinic sees has plummeted in recent years. A staff member had to go hunting for a box of malaria medication for me to see; The doctor’s desk was littered with packages of children’s cough medicine. Instead of malaria warnings, the walls were tacked with posters about the risks of hypertension and diabetes.

Arusha has a slightly cooler climate that’s not as hospitable to malaria-carrying mosquitoes, so it never saw the peak rates of malaria that some other parts of Tanzania did. Over the last decade, foreign aid and NGOs have increased efforts to eliminate the disease in east Africa. Alweani told me between these two factors, malaria is not as big of a concern locally as it once was. His clinic sees only two or three cases of malaria each month. Though malaria and HIV are still top killers in the country, non-communicable diseases are gradually sneaking up to eclipse them.

This map shows the diminishing prevalence of malaria in Tanzania. The Arusha region, seen at the top of the country in bright green each year, has always had relatively low rates. Image: PSI

It’s a familiar narrative for a lot of developing nations. More education leads to sedentary jobs. More wealth leads to more cars. Better housing makes staying indoors more comfortable. Meanwhile, globalization means processed foods and drinks are more readily available.

“In the past, the local population was mainly eating a lot of vegetables and doing a lot of physical activity,” Alweani said. “Now, we are going to a more modern food: a lot of meat and so on, and sedentary lifestyles. Before, people wouldn’t get heavy, weight-wise. Now we are seeing quite a bit of overweight people, even obese people, and even in children.”

It’s not just anecdotal: studies have shown overweight and obesity rates are on the rise across the developed world. In Tanzania, 22 percent of women in 2010 were either overweight or obese, according to a study published in the journal BMC Public Health. That’s compared to about 10 percent in the 1990s. And the same study showed that women who lived in cities, were wealthier, and more educated had a higher likelihood of being overweight or obese.

Vegetables, rice, and beans for sale at a market in Tanga. Image: Kaleigh Rogers/Motherboard


Though the fight against diseases like malaria and HIV attract more headlines, non-communicable diseases are on the global health community’s radar. In 2011, more than 190 countries signed an agreement with the World Health Organization to combat non-communicable diseases, with a focus on education and regulating industries like tobacco and alcohol. Last year, all the signees set goals, and in 2018 they’ll meet to review their progress towards curbing this emerging threat.

For now, doctors on the ground like Alweani are hoping to spread awareness in their communities, as one threat starts to fade away and another comes sharply into view.

“Non-communicable disease is coming up,” he said. “Now we have to focus on it.”

Travel expenses while reporting this series were funded through a fellowship provided by the International Center for Journalists and Malaria No More.

Tanzania’s Next Epidemic? Obesity

Holly Madison Baby Blog No. 6: Easy Ways to Look Your Best Pregnant

Holly MadisonThe former star of E!'s Girls Next Door and Holly's World is expecting her second child with husband Pasquale Rotella. Their daughter, Rainbow Aurora Rotella, was born in 2013. Follow her...
Holly Madison Baby Blog No. 6: Easy Ways to Look Your Best Pregnant

How the UN’s Top Outer Space Boss Will Fight Space Debris

Space is a hostile place, swarming with asteroids and flying space junk—an estimated half-a-million pieces of debris are floating in Earth orbit right now. These threats and more are top of mind for Canadian David Kendall, who was recently appointed as head of the United Nations’ space committee. He’s already hard at work. As he told Motherboard by phone, he’s hoping to avoid “a bad day in space.”

In his new role as the chair of the UN Committee on the Peaceful Uses of Outer Space, which oversees everything from threats posed by space weather to asteroids, Kendall’s already tackling the huge problem of space debris. He’s helped the create 12 guidelines that will help curb the danger it poses, once they’re ratified in October. One will create a voluntary registry where every nation will list the known orbits of their debris.

The committee is more than 50 years old, so it’s seen a lot of changes in space exploration, especially in the past 15. Back in the late ‘90s, it recommended creating two independent UN groups that deal with the threat from asteroids, which was accepted. People take the asteroid threat seriously: Thursday is Asteroid Day, a global awareness campaign.

The asteroid threat is better understood now because NASA has more sensitive tracking programs that can find a greater number of smaller near-Earth objects. There is no imminent threat from an asteroid that we know about, but NASA and other agencies are working on ideas (like spacecraft tugs) for how to divert one if it was coming at us.

Now we also have private companies planning to send people into space, or do space mining. So Kendall said that his next major move will be updating some space treaties to reflect that reality. “They [the companies] are starting to, quite rightly, to push on the boundaries of the agreements we signed 50 years ago,” he said.

The overarching treaty from which all others flow—called the Outer Space Treaty—will celebrate its 50th anniversary next year. It outlines the activities that nations are able to do in space, emphasizing they should be for peaceful purposes, and that celestial bodies shouldn’t be exploited for profit. As many observers have pointed out, this could preclude plans for space mining by companies such as Deep Space Industries and Planetary Resources. Kendall’s got his work set out for him.

Last year, the United States approved its own Space Act. It allows for commercial companies to exploit resources on other worlds, as long as they’re not biological.

The act is somewhat controversial, Kendall said, because some interpretations would say it goes against parts of the OST. “Lawyers love these things,” he joked. Other countries are considering similar acts, such as Luxembourg and the United Arab Emirates.

Another treaty that may need to be updated is the “Rescue Agreement”, which states that astronauts are “envoys of mankind” and should be protected (and rescued, if necessary) if they disembark from their spaceships in a foreign state. But this agreement was struck when only governments—and not companies—launched people into space, Kendall said. It’s unclear what would happen if a private company wanted to make use of the treaty to protect space tourists, such as if a plane crash-landed in a hostile country.

With the threat from asteroids, space debris, climate change, and more, Kendall, whose term goes to 2018, will have two busy years ahead.

How the UN’s Top Outer Space Boss Will Fight Space Debris

DNC Hacker Denies Russian Link, Says Attack Was His ‘Personal Project'

The hacker who claimed responsibility for the hack on the Democratic party is back online after a week of radio silence.

In a new blog post published on Thursday, the hacker, who goes by the name Guccifer 2.0, once again denied allegations from security experts that he is working for the Russian government. The hacker also released more documents and emails allegedly stolen from the computer servers of the Democratic National Committee.

“I’ll tell you that everything I do I do at my own risk. This is my personal project and I’m proud of it. Yes, I risk my life. But I know it’s worth it. No one knew about me several weeks ago,” the hacker said, a response to the claims that he has links to the Russian government. “Nowadays the whole world’s talking about me. It’s really cool!”

“It seems the guys from CrowdStrike and the DNC would say I’m a Russian bear even if I were a catholic nun in fact,” he added, referring to the cybersecurity company that investigated the hack, and said it was carried out by two hacking groups with links to Russian intelligence. “They just fucked up! They can prove nothing! All I hear is blah-blah-blah, unfounded theories and somebody’s estimates.”

Guccifer 2.0’s new blog post comes a week after he spoke at length with Motherboard in an interview where he claimed to be from Romania. But at the time, when pressed, he declined to answer some questions in Romanian, and stalled, saying he didn’t want us to waste his time.

“It seems the guys from CrowdStrike and the DNC would say I’m a Russian bear even if I were a catholic nun.“

In this new blog post, which he wrote in the style of a “frequently asked questions” or FAQ, he simply claimed to be born in Eastern Europe, but refused to reveal where he is now.

“It’s better for me to change my location as often as possible. I have to hide,” Guccifer 2.0 added.

Several linguistics experts consulted by Motherboard last week agreed that the hacker’s English wasn’t native, and some said it showed signs of being the English of a Russian speaker, or someone from Eastern Europe. For example, multiple experts pointed to the irregular use of definite and indefinite articles as a clear sign that he could be Russian. In this new blog post, on the other hand, the hacker uses “the,” “a,” and “an,” constantly, even where he shouldn’t (“It’s a nonsense” or “the truth about the politicians”).

Compared to his previous posts and our interview with him, this new post is written in a much better English, although at times the hacker’s language seems almost childish.

“This doesn't feel like it's written by the same person as the previous posts,” an independent security researcher known as Pwn All The Things, who has been following the Guccifer 2.0 saga since the beginning, told Motherboard.

One linguist we talked to last week said Guccifer 2.0 could also be Moldovan given the country’s mixed Romanian-Russian environment and the fact that many Moldovans identify as Romanian. In the FAQ, Guccifer 2.0 answers a question about Moldovan hackers saying the country “it’s a part of Romania, so there’s no reason to speak about it separately. So, there are also Romanian hackers there.”

None of Guccifer 2.0’s new claims is too revealing, and actually seems more smoke and mirrors calculated at confounding the conclusions experts have come to about the hack and the hacker’s motives.

None of Guccifer 2.0’s new claims is too revealing, and actually seems more smoke and mirrors

The leak of the DNC’s Donald Trump opposition research, as well as all the documents related to Hillary Clinton, seemed to indicate that the hacker was trying to benefit the Republican candidate. This would align with the hypothesis that the hacker is working for the Russian government in an attempt to influence the US elections, given that Russian president Vladimir Putin has expressed support for the real-estate mogul.

But in this blog post, Guccifer 2.0 denies having any political goals, writing that “none of the candidates has my sympathies.”

“Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold. She never had to work hard and never risked everything she had. Her words don’t meet her actions. And her collision with the DNC turned the primaries into farce.

Opposite to her, Donald Trump has earned his money himself. And at least he is sincere in what he says. His position is straight and clear.

Anyway that doesn’t mean that I support him. I’m totally against his ideas about closing borders and deportation policy. It’s a nonsense, absolute bullshit."

Despite his many answers, Guccifer 2.0 left us with even more questions. And, unfortunately, there’s a very good chance that we’ll never know the real answers.

DNC Hacker Denies Russian Link, Says Attack Was His ‘Personal Project'

Humane Society Took Secret Video at a Trophy Hunting Convention in Vegas

Earlier this year, the Humane Society took a hidden camera to a trophy hunting convention in Las Vegas hosted by an international nonprofit that is at least nominally dedicated to wildlife conservation.

Trophy hunting—where large, rare animals like lions are killed simply to be stuffed and mounted—is a controversial sport. While it outwardly projects the image of a well-managed, conservation-focused sport industry, behind closed doors (where no media was permitted, according to the Humane Society) a different scene unfolds.

The undercover video, which is just now being released, shows vendors hawking trips where tourists can hunt leopards, elephants, and other game, promising guaranteed kills. The Humane Society shot and edited the video and provided it to Motherboard. Motherboard blurred the faces of the individuals to protect their privacy, but otherwise did not alter it.

Nothing stated in the video, captured during the Safari Club International’s annual convention in Las Vegas in February, is illegal or even all that surprising—similar claims can be found on the websites of trophy hunting tour companies—but it gives a raw look at the industry, which at its core is about killing rare animals for amusement in what can hardly be called a fair fight.

“These guys make it pretty simple,” an attendee tells the investigator. “You don’t have to be an expert to hunt.”

Safari Club International is both a trophy hunting organization and a conservation non-profit. It drew international attention one year ago when a US member, Walter Palmer, shot and killed Cecil, a protected lion from the Hwange National Park in Zimbabwe. Palmer said he did not realize the lion was protected, and the SCI suspended Palmer’s membership and launched an investigation (but has not yet publicly stated the results of this investigation). But Cecil’s death brought a lot of public heat on the world of trophy hunting.

Two vendors in the video are shown mocking Cecil. “What a load of B.S. that was,” one man says. “I’ve been hunting there for 33 years. Who the friggin’ hell is Cecil? I never heard of Cecil in my life.” Another vendor jokes, of Cecil, that “we’re looking for his brother.”

Proponents of trophy hunting say it’s a proven way to invest in conservation: Let some rich hunters pay for the privilege of killing, in a controlled way, a small handful of animals, then take the money to protect the species at large. And it makes logical sense: If trophy hunting draws in so much money, the industry probably doesn’t want all its star prey to disappear from the planet.

However, opponents say the industry is poorly managed and question how much money actually makes it to conservation.

Screengrab from the undercover video. Image: Humane Society

“If a country lacks the political will to strengthen and implement its conservation laws, or lacks the resources necessary to conduct populations surveys, prevent poaching, or protect and restore habitat, then killing additional animals through trophy hunting will only make the situation worse,” read a recent report by the Democratic staff of the House Committee on Natural Resources, which noted that scientific studies have found trophy hunting can be more detrimental than beneficial.

SCI purports to invest in conservation programs, but it also promotes the killing of vulnerable and endangered animals like lions, elephants, and rhinoceroses, and provides hunters with permits and access to safari trips designed solely for bagging a trophy kill. SCI did not respond to a request for comment, but it has said in the past that trophy hunting can provide valuable revenue to support conservation programs.

“SCI Foundation’s Africa program assists governments and non-governmental organizations with scientifically monitoring and managing wildlife populations, setting wildlife policies and regulations, and regional cooperation to optimize the sustainable use of wildlife resources,” its website states. “SCI Foundation has spent over $3.5 million on conservation in Africa since 2008, working with more than 11 species in over 13 countries.”

At its annual five-day convention, SCI hosts vendors from around the globe offering up hundreds of expensive hunting excursions for sale or auction to its 20,000 attendees. Last year, the convention brought in $2.7 million.

It may sound counterintuitive, but hunting as a strategy for conservation has been a successful endeavor in the past: In the US, hunter conservation groups have made undeniable contributions to preserving our natural resources. Organizations such as Ducks Unlimited and Pheasants Forever build wildlife preserves and restore wetlands with the dual goal of conservation and keeping a healthy stock of hunting fowl. But is trophy hunting in the same category, or is it a convenient guise for a less controlled industry fueled by machismo?

Realistically, it’s both. In some poorly-managed areas, it can be detrimental to wildlife. But when it’s done right, even conservation experts defend the practice.

“Southern Africa's seen large scale recoveries of wildlife in the 20th century, built around hunting," Rosie Cooney, the director of the IUCN Sustainable Use and Livelihoods Specialist Group, told the BBC last year.

But it can be tough to reconcile these two extremes. When footage of trophy animals being tortured before they’re killed is leaked; or when a country bans the hunting of a species because it’s not even sure how many it has left; or when a beloved lion is lured from his protected home only to be chased and killed; or when salesman pitching trophy hunts brags that “with hounds, your success rate is probably about 100 percent”, it pokes holes in the idea that trophy hunting is an ideal way to raise conservation dollars.

Humane Society Took Secret Video at a Trophy Hunting Convention in Vegas

Reviewed in Brief: New Excavations in the Valley of the Kings

What will future civilizations make of the great American experiment? Here, real-life archaeologist Alter S. Reiss describes a fictional excavation of an all-too-real place—Las Vegas—to wager a guess. "A few years back, I was sitting in a hotel lobby, working on a Harris matrix," Reiss says of this story's origin. "Which is a fiddly bit of archaeological book-keeping, and also one of the most important things to do correctly, in order to make sense of a site... There's a tendency in archaeology to identify every large and fancy building as a palace, and the hotel was a large and fancy building, whose lobby was filled with high status materials like marble and brass and cut glass and so on. And there were a couple of hotels in a row—a palace district, presumably." And what might this palace city reveal about US culture, to the archeologists of tomorrow, thousands of years from now? Well—enjoy. -The ed


New Excavations in the Valley of the Kings (Las Vegas). Silentnight Acama, Malbanchia University Press, 108, 7th New Baktun.

Ever since its discovery in the late 5th Baktun, when we had only the sketchiest understanding of the world of the Coca-Cola peoples, the Valley of the Kings has been recognized as one of the central sites of the North American Petroleum Age. While it is currently believed that the republican period capital was located somewhere on the east coast—New York/Newark, Columbia, or Halifax being the most probable sites—the unquestionable majesty of the Las Vegas palace district makes it clear that this was the eventual seat of the American Empire.

For those who appreciate strict accuracy in historical simulations, the meticulously researched cores supplied by Malbanchia University are indispensable. The newly released Valley of the Kings update, supervised by Silentnight Acama, is no exception.

Early work in Las Vegas concentrated on the vast palace complexes, each a masterpiece of Imperial art; current research indicates that the castles recreated the monuments of loyal vassals or defeated foes. Faithful reproductions of European cathedrals, Egyptian sphinxes, and trophies from the currently unidentified "planet Hollywood" must have produced an unimaginable sense of awe in the tens of thousands of pilgrims that visited the Valley of the Kings every day.

Over the last k'atun, excavations directed by Dr. Acama have left the palace district, concentrating on the lives of those pilgrims, as well as looking for a broader understanding of the American Petroleum Age through an analysis of its greatest city.

Dr. Acama's findings from these outlying areas of the great city are the source of most of the updated information in the Valley of the Kings core, though new analysis of older findings from the palace district have not been neglected. While some of those findings confirm earlier work, as well as the songs and legends of the region's natives, others are considerably more surprising.

Previous examination of Petroleum Age sites in North America revealed the practical and ritual importance of automobiles, and these new findings underline the direct importance of the automobile in the Imperial Cult. During its period of occupation, the natives constructed a large artificial lake to the east of the Valley of the Kings, and careful excavation of the dry lakebed has uncovered evidence of the ritual sacrifices that were conducted there.

These automobile burials typically consist of a single adult male, often dispatched by a gunshot to the head, and weighted down and lowered beneath the life-giving waters of the lake. Similar to the river burials found in the New York/Newark excavations, these show the reach of the Imperial cult; there can be no doubt of the importance of the nexus of automobiles, firearms, and water to the Coca-Cola peoples.

The use of concrete in these burials connected the victims to the massive architectural accomplishments of the age; the concrete served as a symbolic corner-stone burial, interring the victims in the same matrix that built the roads and sporting arenas of the age.

One of the many set-piece reenactments included in the Malbanchia University cores is of a ritual sacrifice and automobile burial of this sort. While many of the elements of the reenactment are speculative, there can be no denying the primitive majesty of the Petroleum Age natives, with their ornate garb glittering with logos and rhinestones.

It is interesting that no erotic elements have been definitively linked to the ritual sacrifices, given the centrality of sexuality in Imperial cultic practices. In local legend, the grand processional road of the palace district was known as the "Strip," suggesting a direct connection between erotic nudity and the palaces of the greatest empire the world had ever seen. While ethnography can be unreliable, excavated remains show that the primary artistic focus in the Valley of the Kings was on female sexuality, and sacred prostitution was one of the primary methods of devotion for the pilgrims visiting the Imperial City. The historical simulations of those devotions may well prove one of the more popular aspects of this core upgrade, given the variety and energy of the primitive practices so painstakingly reproduced.

Some questions remain as to the nature of the ritual items located in nearly every public space in Las Vegas. Mechanical analysis shows some connection with games of chance, but as sexual imagery is the most common decorative element on those machines, it is possible to connect their use with the eroticism of the Imperial cult. There are far fewer questions when it comes to the bewildering variety of "wedding" temples, some of which were actually located in the palace complexes, and which were certainly places where pilgrims were "married," however briefly, to a physical embodiment of the cult and state, which Dr. Acama identifies as 'Lady Luck,' the genius loci of Las Vegas.

While some might question devoting a core update to a single site, even one so central as the Valley of the Kings, the implications of Dr. Acama's work extend to smaller, less central sites. Spokane or London cannot simply be viewed on their own terms—the savage majesty of the Petroleum Age can only be fully understood refracted through its most grandiose expression, the palaces and processional roads of Las Vegas, The Valley of the Kings.

Reviewed in Brief: New Excavations in the Valley of the Kings

Here Are the Most Popular Emojis From the #Brexit Reaction

Last Friday, Quartz published a short article tantalizingly titled “The world’s reaction to Brexit, in emoji.” (Brexit is the colloquial shorthand for Britain’s vote in favor of exiting the European Union.) While the piece was mostly fluff, it does raise a fascinating question: Can emojis teach us anything about situations like Brexit?

With Twitter reporting that 110 billion emojis have been tweeted since 2014, the idea isn’t as fanciful as it might seem. Emojis provide a rich and unexplored prism for understanding the evolution of language and culture.

Inspired by the Quartz headline, this past weekend, I downloaded a sample of 100,000 publicly available tweets using the Twitter API. I pulled data for five Brexit-related hashtags, selected to be representative of both sides of the debate: #NotMyVote, #VoteRemain, #EURef, #Brexit, and #VoteLeave. All tweets were from Friday, June 2, the day after the election, and were in English. After removing retweets, I was left with 23,989 unique tweets (I call this “the Brexit dataset”). Of these tweets, 6.3 percent (1,505) contained at least one emoji. Yay!

First, I found the 10 most commonly used emojis in the dataset (Figure 1). Face with tears of joy and the British flag both crushed it here, appearing, respectively, 11.9 and 10.4 times for every 1,000 tweets. The other emojis are a good mix of both celebratory emojis as well as more melancholy ones.

Figure 1. Image: Hamdan Azhar

But are these emojis actually reflective of Brexit, or are some of them just generally popular emojis? Luckily, emojitracker has been tracking every emoji publicly tweeted since mid-2013. So, for each of these ten emojis, I compared how often they appeared in the Brexit dataset with their general popularity.

Five of the ten emojis over-indexed for Brexit (Figure 2). Reasonably, the British flag is over 400 times as likely to be included in a tweet about Brexit than in a random tweet on the platform. Thumbs up and clapping hands both over-indexed at 2.3 times and 3.9 times respectively, while crying face and see-no-evil monkey over-indexed at 1.3 times.

Figure 2. Image: Hamdan Azhar

Brexit seems to elicit strong emotions from people on Twitter, on both sides of the spectrum, with slightly more prevalent use of celebratory emojis. This could mean that people disappointed by Brexit are less likely to tweet, or if they do tweet, they might be less likely to use emojis.

I then took a closer look at a few emojis used in context. Even basic emojis can encompass a wide variety of meaning. The British flag, for example, can be used to express nationalism but sometimes it’s just a neutral shorthand (Figure 3). Irony is also common, for example, with the thumbs up emoji, which is used both mockingly as well as sincerely (Figure 4).

Figure 3. Image: Hamdan Azhar

Figure 4. Image: Hamdan Azhar

Can we use data to understand how people on different sides of the Brexit debate use emojis differently? It turns out we can! We know the overall distribution of the five hashtags of interest in our dataset. #Brexit is most prevalent at 29 percent, followed by #EURef at 20 percent, #VoteLeave at 19 percent, #VoteRemain at 17 percent, and #NotMyVote at 15 percent. For a particular emoji, we can look at all tweets that use both that emoji and one of these five hashtags and compare the hashtag distributions to the one above.

For example, we find that 34 percent of tweets with the British flag emoji also include the #VoteLeave hashtag. This is significantly higher than the 19 percent prevalence of #VoteLeave in the overall dataset so we say that #VoteLeave over-indexes with the British flag. The celebratory emojis also over-index with #VoteLeave, while the crying, sad face, and praying emojis over-index on #VoteRemain (Figure 5).

Figure 5. Image: Hamdan Azhar

Below, I’ve included a heat map summarizing the co-occurrence of the five hashtags with the top 10 emojis (Figure 6). It’s fascinating to see how distinct the celebratory and sad emojis are in terms of the political sentiments they’re used to magnify. It’s almost as if the emojis show us #VoteLeave clapping and cheering, while #VoteRemain is crying, distraught, and heartbroken. (Curiously, none of the emojis over-index on #Brexit, suggesting that it may be more of a identifying hashtag for the situation rather than one used by partisans who are emotionally invested in the debate.)

Figure 6. Image: Hamdan Azhar

As emojis become more ubiquitous, we should remain open and curious about what they reveal. Does the meaning of emojis change over time? How do we use emojis to talk about war, or DJ Khaled, or our search for love? Will two different people ever see the same emoji the same way?

The Brexit dataset shows us that emojis, far from being trivial objects used ad hoc, have the ability to reflect our emotional states back at us.

Perhaps what makes emojis so exciting is their limitless potential for nuance. Robert Greene wrote that “Paradox is seductive because it plays with meaning. We are secretly oppressed by the rationality in our lives.” He might as well have been talking about emojis. Emojis allow us to play with meaning, to inject varying combinations of emphasis, irony, and humor in our communication. While we may never fully understand what they mean, treating emojis as data can help us gradually chip away at the mystery, and in doing so, come to better understand ourselves.

Acknowledgements: I’m indebted to earlier work by Lauren Ancona and Chris Tufts on measuring emoji prevalence among Twitter users in Philadelphia, Jessica Peterka-Bonetta’s mapping of emojis from UTF-8 to their R encodings, and of course to Matthew Rothenberg’s emojitracker.

Hamdan Azhar is a writer and data scientist based in New York. His writings on politics, culture, and technology have appeared in the Washington Post, the Christian Science Monitor, and the Huffington Post. Read more of his work at hamdanazhar.com.

Here Are the Most Popular Emojis From the #Brexit Reaction

Inside the High-Tech US Army Lab Where Scientists Blow Things Up

Alfred Nobel made his fortune by blowing things up. The Swedish scientist and entrepreneur got in on the ground floor of the explosives business, and was the first to make serious coin from military and industrial applications of a new chemical called nitroglycerin. Extremely potent but highly sensitive, nitroglycerin had the power to transform the world. Trouble was, it’s very dangerous. Under the right conditions, a slight shock can cause it to detonate.

On September 3, 1864, a huge blast ripped through Nobel’s explosives factory in Stockholm, where his company was manufacturing nitroglycerin for the military. The explosion killed five people, including the scientist’s younger brother. This tragedy spurred Nobel to create explosives that were safer to handle than the notoriously unstable nitroglycerin. The result was dynamite, which earned him a fortune—paying for his eponymous prize—and is still used to this day.

In 2016, the science of blowing things up has come a long way. One of the most advanced facilities for testing exactly how explosives inflict their deadly damage is located at the Aberdeen Proving Ground, a huge US Army research facility in rural Maryland, about an hour’s drive northeast of Baltimore.

Here, military scientists analyze the fundamental characteristics of different types of explosives, looking at how the energy they produce affects objects, from bunkers to bodies, in the path of the blast wave.

The Army guards its secrets closely. In June, after two separate security checks, I was granted clearance to visit their high-tech explosions laboratory.

The squat, concrete bunker that houses the test facility. Image: Paul Tadich

On that searing hot and swamp-humid morning, I entered the military base, where I was accompanied at all times by an escort. I drove 20 minutes or so, past a scenic lake populated with fishing boats, and onto an island situated somewhere on the base. I was warned against photographing any signs, and most of the buildings, too.

A few winding roads later, the lab came into view—a squat, burly concrete structure that looked like it could withstand a direct nuclear hit. As I approached, I could see two red lamps mounted on poles. A very stern sign said that under no circumstances should you turn left when the lights are flashing.

But the lights were out, and the testing range quiet. My escort and I turned right, toward the main lab space. This is where I met Richard Benjamin, a US Army research scientist who is paid to spend his time blowing things up and watching explosions at 2.5 million frames per second. The place, quite frankly, is a pubescent boy’s dream.

Inside the lab, we entered a long, metal-lined workshop. At first glance, it didn’t look very different from a garage workshop a suburban dad might tinker in on weekends. A homey sign read Help Keep This Place Clean. In most garages, such homilies are not posted above a bin filled with high-caliber shell casings.

The workshop. Image: Paul Tadich

Benjamin, who is the lead physical science technician at the US Army Research Lab’s Detonation Science Facility, was disarmingly polite, considering he’s the guardian of so much power. He’s ruddy, rotund, and meticulously well-mannered.

Benjamin explained that he uses the tools in his lab to analyze in fine detail what happens to an explosive as it detonates. “The basic definition of an explosive is that when it reacts, the reaction proceeds faster than the speed of sound,” said Benjamin.

As the explosive material violently degrades into a gas, shock waves build up inside of it. These shock waves press against one another, forming an expanding shell of gas. This shell rips through the material and transfers its energy to the surrounding atmosphere, which in turn rapidly expands. This energy is also transferred to any object in its path. The results can be damaging—or deadly.

An image of a video showing an artificial skull (which has the same density as a human skull) fitted with electrodes to measure the impact force of an explosion. Image: Paul Tadich

Benjamin took me over to a large TV mounted above a workbench to show me a series of clips of various types of explosive charges detonating in extreme slow-motion. This is done to analyze how the shock wave travels through the explosive.

The most striking clip showed footage of a sphere of C-4 (short for Composition-4, a military-grade plastic explosive) detonating, slowed down to the point where I could see the searing, white-hot gases escape from the metal casing surrounding the charge.

I became aware of several portholes in the room, fitted with glass as thick as my fist. There was a faint glow emanating from behind them. I asked Benjamin what the source of the light was, and he only said that it was next on the agenda.

The door leading into the blast chamber. Image: Paul Tadich

He lead me around a corner. A hydraulic pump whirred, a lock clanged open, and a metal door about a foot thick swung open. We stood face-to-face with the facility’s centrepiece: the blast chamber. Inside was a reinforced-concrete cube, with walls 18 inches thick. The room was lined with a painted-over impact-resistant alloy, rusty and speckled with craters, inch-deep dents where fragments of metal were propelled into the walls.

Finally, I could see the source of the mysterious light: two movie-set-style spotlights were pointed at a raised dais in the middle of the room. That’s where the explosives sat, awaiting detonation.

A mockup explosive. Image: Paul Tadich

I saw footage of a metal-jacketed cylinder, stuffed with TNT, blowing up in the test chamber. When it exploded in extreme slow motion, you could see the energy travelling down the length of the object. As each frame advanced, the metal puffed out from its rigid form as easily as a balloon inflated with air. As this line of fragmentation rolled down the length of the object, it was followed a couple of inches behind by a ferocious bloom of yellow and white fire as the hot gases expanded out of the zig-zagging cracks that formed in the casing.

An image captured from a video of TNT exploding inside a canister. Image: Paul Tadich

It really gave me a sense of the raw power contained in the chemistry of an explosion. Solid metal is forced apart into tiny, twisted fragments with ease.

Huge cameras, which sweep images at very high rates of speed across a series of imaging sensors, were positioned on the other side of the glass portholes, to capture the explosions. The chamber is designed to be sealed so all its leftovers can be captured and analyzed. This means it’s almost perfectly insulated, and on the day I visited, the heat from the spotlights alone had pushed the mercury well past 30℃.

This sends the electrical charge to set off explosives in the blast chamber. Image: Paul Tadich

All this armoring and protection is absolutely necessary. Despite the foot-and-a-half-thick walls, I asked Benjamin if he can hear the explosives going off from his laboratory next door. “Oh, absolutely,” he said. “You can feel it, too.”

It’s a stark reminder that while this is a place of science, it’s also part of the US military machine. This is made abundantly clear when I asked Benjamin why he feels his work is important. With no hesitation, he answered: “It’s all to help the soldier. We do what we can to make his job safer and easier.”

As I was escorted in my rented Jeep to the final checkpoint, and then out again into the swampy afternoon, I was reminded of why explosives research started in the first place: to project military power.

Inside the High-Tech US Army Lab Where Scientists Blow Things Up

How a Hacker Is Gaming the Media to Extort His Victims

Over the past few days, millions of health care organisation records have been listed on the dark web. But rather than simply selling the data at a low price for a quick payday, this hacker is advertising it to extort the unnamed companies into paying money to protect their patients’ details.

“The Dark Overlord” is taking full advantage of a weapon that many other cybercriminals overlook; one that he hopes will make him more threatening, and ultimately help in getting targets to cough up ransom demands: the media. By courting press attention, he puts pressure on organisations to pay up.

“There has always been a specific method and plan,” the hacker told Motherboard in an encrypted chat, referring to his publication strategy.

"Every time I put a new listing up it gets reported without hesitation now."

The Dark Overlord wouldn’t explicitly spell out this process, but it goes something like this: First, he posts a database; then, he gives samples of the data to reporters, who go out and verify them. These articles, and the subsequent reblogging of them by other outlets, convinces companies that the hacker is a legitimate threat. These steps repeat over and over, building up the hacker's reputation as someone to be taken seriously.

I pitched this to the Dark Overlord. “Something like that,” he said. He claimed that the media attention has already encouraged a few organisations to pay up.

The Dark Overlord doesn’t list the databases on the dark web straight away. At first, he might extort targets in private, threatening to sell or release their data if they don't pay the ransom. Typically, the hacker said, those initial phone calls or emails get ignored.

“It is never, ‘Hey, okay you got us, where do we pay?'” he joked.

If the company doesn’t comply, he proceeds to the next stage and lists company data for sale without naming the organisation.

“The databases that you see listed are ones from victims [who] have either declined to pay or whose deadlines are coming up and need a little pressure put on them,” the Dark Overlord said.

So far, the hacker has put up five databases: 48,000 records from a healthcare organisation in Farmington, Missouri; hundreds of thousands from Atlanta, Georgia, and the Central/Midwest US; 9 million apparent patient insurance details; and, on Tuesday, information on 34,000 supposed New York healthcare patients.

But just listing the data might not be enough to secure a ransom payment, and that's where the media comes in, which is able to quickly, dramatically, and inadvertently squeeze the target organizations tighter.

“I have a reputation with this handle now. Another step accomplished,” the Dark Overlord added. “Every time I put a new listing up it gets reported without hesitation now.”

Hackers using the media to their own ends is not new. Anonymous has distributed attention-grabbing and ready-to-publish imagery or press releases that were easy for journalists to quickly report on. Impact Team, the hackers behind the Ashley Madison breach, sent a link of the data to at least one well-known security journalist.

But this latest campaign sticks out in its systematic and very deliberate approach. The Dark Overlord knows how to game the media, and reporters are playing along.

How a Hacker Is Gaming the Media to Extort His Victims

‘Pay-Per-View’ Mode Keeps Canadian Space Telescope Flying After 13 Years

The MOST space telescope was designed to measure variations in intensity in the brightness of stars. Image: Canadian Space Agency

Here’s a pay-per-view option with more stars than you'd ever find on TV. Canada’s first space telescope has solved a government funding riddle by asking customers to pay to look through its viewfinder. And the results are really beginning to pay off, its principal investigator told me, as MOST marks its 13th birthday in space.

Canada’s Microvariability and Oscillation of Stars (MOST) telescope launched June 30, 2003 on what was supposed to be a one-year mission to study star vibrations, but the machine was still going strong in 2014 when the Canadian Space Agency yanked its funding, saying the mission had achieved its objectives and it was time to retire.

After considering crowdfunding to keep it going, the University of British Columbia’s Jaymie Matthews found a buyer: Microsat Systems Canada Inc., which creates stabilization devices for spacecraft. MSCI, which now operates MOST, makes time available to any astronomer's group that wants to use the telescope, as long as MOST can safely do it and the buyer can use it for a minimum of a week. Booking the telescope for that length of time costs $6,000 US (nearly $7,700 Canadian), which sounds like a deal.

Jaymie Matthews in a clean room with MOST. Image: Canadian Space Agency

“I would still hope eventually we would be able to find a funder or a donor. I've been kicking around the idea of a Kickstarter campaign where we would put together the elevator pitch and a one-year [science] program,” said Matthews. He added that he is grateful for the MSCI funding, and that MOST is being made available practically at cost, but he misses the days of judging submissions against each other by scientific merit.

MOST was originally designed to look at star variability, but even before its design phase was over, astronomers realized it could also examine exoplanets (planets beyond the solar system). MOST has also looked at objects in the solar system, such as the icy small worlds in the Kuiper Belt beyond Neptune.

This makes MOST a versatile telescope for all sorts of astronomy investigations. Matthews said he is proud of the two published articles from its new pay-per-view mission so far.

One, published in The Astronomical Journal, looked at a bizarre exoplanet called HD 20782. The planet has such an eccentric, cigar-shaped orbit that it is close to flying away from its parent star and into space. The planet swings through extreme cold when it is far away from the star, and extreme heat when it is close by.

Even more strangely, MOST detected a reflection of the planet's light on its star. With more observations, this could provide information on how the planet’s atmosphere behaves as the planet ricochets between hot and cold.

"We are studying the planet in this kind of weird way you could have never imagined," Matthews said. "It's the stuff that science fiction writers would have dismissed as being too outlandish."

A birthday cake celebrating the 10th birthday of MOST. Image: Jaymie Matthews

Another published work involved refining measurements of stellar variability using the example of Epsilon Eridani. MOST is also involved in planet-hunting; a paper about a search around one star will be submitted for publication soon.

To Matthews’ knowledge, MOST is the only space telescope that charges for access. Typically, telescopes are open to all astronomers who must compete for telescope time based on their expected scientific return from the investigation.

There is at least one example on Earth, however, of a sky-gazing telescope that charges for access. The Keck telescopes, Matthew said, are free for astronomers in the University of California system. Those outside of teams with U of C astronomers pay per use. The calculated observing cost per night is $53,700 US (nearly $68,900 Canadian).

‘Pay-Per-View’ Mode Keeps Canadian Space Telescope Flying After 13 Years

Snowden’s Favorite Cloud Service Now Has a Group Chat App

Group chats are such an integral part of many organizations that sharing sensitive information is par for the course, but it’s fair to say that the majority of users would prefer it if whatever was discussed in Slack stayed in Slack— forever. And it’s not just mild embarrassment at stake. Think of all the business secrets being traded or relationships that would come to a screeching halt if customers or clients knew what was really being said within the confines of a group chat room. (This reality recently hit home for teachers at Blackstone Valley Prep in Rhode Island, who came under fire after insulting their own students in a series of disparaging, expletive-laden Slack discussions, which were likely accessed when a teacher’s email account was hacked, and then forwarded widely from that same account.)

Image: SpiderOak

Enter Semaphor. Think of it as Slack’s privacy-savvy and slightly paranoid younger cousin. It’s the brainchild of SpiderOak, the same company whose backup product Edward Snowden recommended as a Dropbox alternative a few years back. SpiderOak almost made waves for ditching Google Analytics in December 2015. All content (including file attachments) is end-to-end encrypted so that even SpiderOak can’t read it. If the company is hacked (or the chats are subpoenaed--something that Gawker learned about the hard way), the only information SpiderOak will be able to access is a bunch of gobbledygook ciphertext.

Semaphor’s design decisions protect communications in various additional ways. For one, it’s an app you download to your phone, laptop, or desktop computer, so it lacks the many security risks associated with web apps. The tool generates multi-word passphrases for users, offering some protection from the security risks associated with self-generated passwords, which are often so poor that they’re susceptible to guesswork, not to mention brute force attacks.

Image: SpiderOak

Because you can’t use emails to invite or onboard users into a group, companies are less susceptible to phishing. Channels, groups, and personal messages are independently cryptographically secure conversations using different keys. (That prevents someone with a USB drive who has access to the servers from walking out with all the data). Users can even compare public keys or unique patterns to verify each other’s identities, a feature that other messaging tools don’t offer. Oh, and you can view the client-side source code, too.

Some companies store data along with the keys to access it on their own servers. Other companies allow users to host collaborative chat tools on their own servers, but then there’s nothing stopping a rogue sysadmin from accessing whatever information they want (other than their own conscience, that is). Because Semaphor encrypts chat before it even leaves users’ computers, any data collected from their servers will have no value because nobody will be able to read it.

Semaphor is easy to use and visually appealing, but it does lack a few features—no URL previews, no email digest—but really, it’s for your own privacy and security. SpiderOak doesn’t store passwords or answers to password hints, which means that if you lose your devices and your backup code, you’re S.O.L., so that’s something to keep in mind as well. But if you’re paranoid aware of all of the risks associated with your chat transcripts getting leaked, Semaphor could well be the chat tool for you.

Semaphor has a free basic plan with a 30-day history, a $6/month plan for personal use, and a $9/month pro plan. It is available for iOS, Android, MacOS, Windows, and Linux.

Snowden’s Favorite Cloud Service Now Has a Group Chat App

mercredi 29 juin 2016

NRA Complaint Takes Down 38,000 Websites

38,000 websites hosted by the automated publishing service Surge went down today, after the National Rifle Association sent a legal notice over a parody website created by the Yes Men.

A few days ago, the Yes Men released the parody video, “Share the Safety”—announcing a supposed NRA program to deliver firearms into the hands of those too impoverished to afford guns.

The opening frame of the video says “Paid for in part by the National Rifle Association of America with additional support from Smith & Wesson Holding Corporation."

“Systemic poverty and dumb laws keep the urban poor unable to acquire life-saving firearms,” says the video, which is available on YouTube. “That’s why we at the NRA are teaming up with Smith & Wesson to share the safety.” The YouTube description includes a link to the “official” website, ShareTheSafety.org.

ShareTheSafety.org currently looks like this:

Surge is a service that allows for easy web publishing of static web pages—think something along the lines of Wordpress, or github.io. The Yes Men apparently used the service to create their website.

As the late Senator Ted Stevens once said, the internet is a series of tubes. And in 2016, those tubes are mostly owned and controlled by a convoluted network of many different companies. A site might be published via Surge, but Surge itself is hosted via cloud computing provided by Digitalocean, and uses Cloudflare as a content distribution network.

According to a series of tweets from the Surge twitter account, the NRA sent a legal complaint to Cloudflare, which then forwarded it to Digitalocean. Surge responded “within 22 minutes.” Digitalocean asked Surge to provide counterclaim documents. Some minutes later, Digitalocean shut down Surge.sh. According to Surge, 38,000 sites became unavailable.

Although Surge referred to “counterclaim documents,” which sounds like part of the DMCA notice-and-takedown process, other sources say that the legal complaint sent by the NRA was not a DMCA notice, and was likely based on trademark law.

The Yes Men video does use NRA trademarks. If you are familiar with the Yes Men’s work, I don’t need to spell out why they would do that, or why it would be for a parodic purpose. (And for what it’s worth, parodies are protected under trademark law.)

Novel forms of takedowns sent to upstream infrastructure providers are not exactly new. In 2015, Cloudflare fought off a court order that would have required them to police trademarks for the many, many sites they service.

For those seeking ad hoc censorship of parody and criticism, the advantages of turning to legal avenues outside the DMCA are obvious. The DMCA has its problems, but DMCA notice-and-takedown has one thing going for it: The process is well-established, with known rules and procedures, and dedicated and trained staff at companies adhering to said rules and procedures. As opposed to, like, being some whackadoodle legal theory transmitted via very scary letter.

There’s a reason why the Yes Men video is still up on YouTube and why their Digitalocean-hosted, Cloudflare-distributed site is down. After over a decade of sparring with rights holders, YouTube has a robust team of employees whose job it is to deal with legal disputes over content. Maybe sometimes they still make the wrong calls, but the company has manpower and experience.

Services like Digitalocean might have dedicated teams handling DMCA notices, but employees might not be able to handle a more unusual variety of complaint. The NRA got Digitalocean to choke up and hit a panic button, sending 38,000 websites into purgatory.

Most of the Surge websites went back up around 3:30 PM PDT, but the Yes Men website is still unavailable—successfully censored, for now, by the National Rife Association.

NRA Complaint Takes Down 38,000 Websites