The syringe slides in between the thumb and index finger. Then, with a click, a microchip is injected in the employee’s hand. Another “cyborg” is created.
What could pass for a dystopian vision of the workplace is almost routine at the Swedish start-up hub Epicenter. The company offers to implant its workers and start-up members with microchips the size of grains of rice that function as swipe cards: to open doors, operate printers or buy smoothies with a wave of the hand.
“The biggest benefit, I think, is convenience,” said Patrick Mesterton, co-founder and chief executive of Epicenter. As a demonstration, he unlocks a door merely by waving near it. “It basically replaces a lot of things you have, other communication devices, whether it be credit cards or keys.”
The technology itself is not new: Such chips are used as virtual collar plates for pets, and companies use them to track deliveries. But never before has the technology been used to tag employees on a broad scale. Epicenter and a handful of other companies are the first to make chip implants broadly available.
And as with most new technologies, it raises security and privacy issues. Although the chips are biologically safe, the data they generate can show how often employees come to work or what they buy. Unlike company swipe cards or smartphones, which can generate the same data, people cannot easily separate themselves from the chips.
[…] When we think about the decreasing importance of cash, if we do, it’s mostly in terms of convenience. It’s just easier to not carry cash; cash can get lost or stolen, and because it’s not tied to our identities, it’s hard to get back. It’s informal and off the information grid, representing only itself and saying nothing about its bearer (putting aside those stories about the vast amount of cash allegedly containing cocaine residue). It’s anonymous in ways that often make it inconvenient for we the consumers.
Conceived of that way—primarily as an inconvenient medium of information exchange—cash’s obsolescence seems an inevitability. But what will replace it? If history is any guide, the next stage in the evolution of money will be completely intangible, existing as ledger marks in digital databases around the world. Bitcoin notwithstanding, it will likely not be decentralized and transparent; it seems much more likely that governments and bankers will maintain their control of currency, creating an opaque system in which we will all be enmeshed, and from which the financiers will take their cut. Money will be tied to identity, its routes traced and monitored. It’ll be a surveillance dystopia, but not of the clumsy, grubby Phildickian variety. It’ll be an ultra-functional, shiny and minimalist nightmare, the kind where you’re not supposed to care how it works, as long as it works for you. Kind of like an iPhone.
That may sound cranky, but it’s worth stepping back for a second to consider how we’re persuaded about the color and contour the future will take. Cash has already begun to be replaced. That’s progress: all that is solid melts into air, software eats the world, cash becomes digits. The sense of inevitability is baked into much of our thinking about (and proselytizing for) new technology. The disrupters and the techno-utopians have a vested interest in presenting their just-over-the-horizon view not as a future, but as the future. The subtle but forceful underlying message goes something like, “A future of infinite convenience is bearing down on you; it is not to be interrogated, and you have no recourse but acquiescence.” Thus the arrival of particular systems—methods for allocating and distributing power—is presented as a law of nature, even a fait accompli.
John* tapped out a simple text message to his wife in January 2016. “I love you,” it read.
But this wasn’t the only message she saw. Unbeknownst to John, his wife had bugged his smart phone. She was spying on John, eavesdropping on all of his texts and multimedia messages, and tracking his every move through the device’s GPS.
She was also stealing all of John’s photos. In one slightly blurred picture, John, a police officer in a small town in the southwestern United States, is knelt over a suspect, who is face down on the curb. In another photograph, John is taking a selfie wearing a dress shirt and a black tie. A third picture shows an email exchange with Facebook’s law enforcement help team, revealing that John was requesting data on a target of an investigation.
These messages and pictures, including some of the couple’s more intimate moments, were taken directly from John’s cellphone by his wife, using a piece of consumer surveillance software made by American company Retina-X. In an ironic twist, the software is called PhoneSheriff.
John is just one of tens of thousands of individuals around the world who are unwitting targets of powerful, relatively cheap spyware that anyone can buy. Ordinary people—lawyers, teachers, construction workers, parents, jealous lovers—have bought malware to monitor mobile phones or computers, according to a large cache of hacked files from Retina-X and FlexiSpy, another spyware company.
The breaches highlight how consumer surveillance technology, which shares some of the same capabilities and sometimes even the same code as spy software used by governments, has established itself with the everyday consumer. And it would appear no small number of people are willing to use this technology on their partners, spouses, or children.
In other words, surveillance starts at home.
US President Donald Trump’s decision to launch strikes against Syria in the wake of a major chemical weapons attack provoked outrage from the far-right groups who were his most aggressive supporters. As rumors of the impending strikes broke, they launched an online campaign claiming that the chemical attack had been a hoax.
The hashtag followed two days of reporting by the so-called “alt-right” — anti-Islam, anti-immigrant, socially conservative and, until the strikes, vociferously pro-Trump — that the chemical attack had been staged.
The DFRLab has traced the origins of the story, and found that the alt-right coverage was based on report in a propaganda outlet linked to the Assad regime.
The U.S. Air Force is preparing airmen for a future in which war is waged in space, with training on hardening satellites against anti-jamming technology to protecting spacecraft from incoming missiles.
The goal is to train the service members to combat new and evolving threats against the service’s “vulnerable” space infrastructure, much of which dates to the Cold War, an official said.
The 527th Space Aggressor Squadron at Schriever Air Force Base, Colorado, is tasked with training service members to fight in a contested space environment. Historically, that has meant jamming Global Positioning System and satellite communications signals, making it so troops can’t access the space assets they rely upon and forcing them to think of alternatives.
“There really is no such thing as a space war — it’s just war,” said Lt. Col. Kyle Pumroy, chief of Space Force Structure Plans for the Space and Cyberspace Superiority Division of the Air Force’s Directorate of Strategic Plans. Military.com sat down with Pumroy at the Pentagon before he was awarded the General Bernard Schriever Award by the National Space Club last month for his service and enhanced training techniques while leading the space aggressors in 2016.
WikiLeaks released its third package of CIA documents on Friday which highlight source code used by the CIA to avoid antivirus programs.
The source code is for a tool called “Marble,” what is known as an obfuscator or packer.
Obfuscators are principally designed to jumble the execution of malware so that programs designed to spot malware have trouble determining what it is.
The Marble toolkit includes a variety of different algorithms to accomplish that task.
In its release, WikiLeaks describes the primary purpose of Marble as being to insert foreign language text into the malware to cause malware analysts to falsely attribute code to the wrong nation.
This appears to be an inaccurate description of the primary purpose of the code, however.
Several countries are developing nanoweapons that could unleash attacks using mini-nuclear bombs and insect-like lethal robots.
While it may be the stuff of science fiction today, the advancement of nanotechnology in the coming years will make it a bigger threat to humanity than conventional nuclear weapons, according to an expert. The U.S., Russia and China are believed to be investing billions on nanoweapons research.
“Nanobots are the real concern about wiping out humanity because they can be weapons of mass destruction,” said Louis Del Monte, a Minnesota-based physicist and futurist. He’s the author of a just released book entitled “Nanoweapons: A Growing Threat To Humanity.”
A civil war between news and opinion has broken out at the New York Times.
In a Times op-ed posted online Friday, Louise Mensch, a writer and former member of the UK Parliament, gives her suggestion for what questions the House Intelligence Committee should ask as it holds hearings on Russia’s influence in the US election. Mensch offers Times readers reason to trust her expertise: “In November, I broke the story that a Foreign Intelligence Surveillance Act court had issued a warrant that enabled the F.B.I. to examine communications between ‘U.S. persons’ in the Trump campaign relating to Russia-linked banks,” she writes.
On Twitter, Times reporters lashed out.
“Please note that the NYT newsroom disagrees,” national security reporter Charlie Savage tweeted. Savage highlighted from his report this month knocking down the FISA claim: “To date, reporters for The New York Times with demonstrated sources in that world have been unable to corroborate that the court issued any such order.”
The core of the dispute is whether the FISA court granted a warrant, which the Times and Washington Post have not reported, though the BBC and McClatchy have. The Guardian reported about a June FISA request but stopped short at confirming the supposed October one was granted.
[…] If Russia has ties with WikiLeaks today, that certainly wasn’t the case seven years ago, says Mika Velikovsky, a Russian journalist who worked extensively with WikiLeaks and interviewed Assange three times.
While working for the magazine Russian Reporter, WikiLeaks’ main partner in Russia, Velikovsky received packets of U.S. diplomatic cables from Shamir, sorted through the documents and published articles based upon them. He also worked on the 2012 leak of emails from the intelligence company Stratfor and collaborated with WikiLeaks on the 2013 documentary film Mediastan.
In 2010, Velikovsky defended WikiLeaks on Russian state television’s political talk shows — programs that often reflect the positions of the Kremlin. There, he clashed with pro-Kremlin experts who claimed that WikiLeaks was the anti-Russian project of American spies.
“At the time, it seemed the authorities were worried about WikiLeaks and didn’t know what it was,” he says. “So the Russian mainstream media was very anti-WikiLeaks.”
Then, in 2012, Julian Assange got a show on RT, a Russian state-funded propaganda channel. The development came amid a worldwide financial blockade of WikiLeaks, when the organization desperately needed money. Velikovsky thinks Assange’s appearance on RT marked WikiLeaks’ transformation from a threat to an ally in the eyes of the Russian authorities.
However, he suggests that WikiLeaks’ seeming alliance with Russia stems from Assange’s own personal predicament. Hiding in the Ecuadorian Embassy for over 4 years has robbed Assange of “a lot of the joy [of life] that you and I have,” Velikovsky says. “If someone did that to us, it would be very personal.”
When WikiLeaks released more than 8,000 files about the CIA’s global hacking programs this month, it dropped a tantalizing clue: The leak came from private contractors. Federal investigators quickly confirmed this, calling contractors the likeliest sources. As a result of the breach, WikiLeaks editor Julian Assange said, the CIA had “lost control of its entire cyberweapons arsenal.”
Intelligence insiders were dismayed. Agencies “take a chance with contractors” because “they may not have the same loyalty” as officers employed by the government, former CIA director Leon Panetta lamented to NBC.
But this is a liability built into our system that intelligence officials have long known about and done nothing to correct. As I first reported in 2007, some 70 cents of every intelligence dollar is allocated to the private sector. And the relentless pace of mergers and acquisitions in the spies-for-hire business has left five corporations in control of about 80 percent of the 45,000 contractors employed in U.S. intelligence. The threat from unreliable employees in this multibillion-dollar industry is only getting worse.
Inventor of the World Wide Web Sir Tim Berners-Lee has pointed to the spread of “fake news” as one of three challenges stopping his creation from being “a tool which serves all of humanity”.
The exchange of personal data for free content and a lack of transparency around political advertising were also highlighted as areas of concern for the computer scientist.
In an open letter on the 28th anniversary of his original proposal for the World Wide Web, Berners-Lee set out a five-year plan to tackle these three “complex problems”.
WikiLeaks on Tuesday released a trove of purported CIA documents hailed by security expert Jessalyn Radack as “in same category as [the] biggest leaks of classified info by [whistleblowers] Chelsea Manning and Edward Snowden.”
Indeed, Snowden himself described the leak as “genuinely a big deal” on Twitter. “Looks authentic,” the National Security Agency (NSA) whistleblower added. The New York Times also described the documents’ authenticity as “likely.”
The Times went on to describe the bombshell revelations included in the trove of documents:
Among other disclosures that, if confirmed, would rock the technology world, the WikiLeaks release said that the CIA and allied intelligence services had managed to bypass encryption on popular phone and messaging services such as Signal, WhatsApp, and Telegram. According to the statement from WikiLeaks, government hackers can penetrate Android phones and collect “audio and message traffic before encryption is applied.”
Tuesday’s release of documents comprise part one of a series, WikiLeaks wrote in a press statement. This first installment, titled “Year Zero,” contains “8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Va.,” according to WikiLeaks.
Newly released by WikiLeaks today is a collection of CIA documents referred to as “Vault 7,” detailing the CIA’s hacking and surveillance technology development. The current release spans “Year 0” of the program, with several more years of documents expected to be released.
Officially called “Weeping Angel,” the program sought 0-day exploits in myriad technology, including not just computers and routers, but things like smartphones and even Smart TVs, with documents showing the CIA could make a Samsung-branded TV go into a “fake-off” mode, where it would appear to be turned off, but its microphone was active and the CIA could listen in to everything happening.
The same was true of the phones targeted, with the CIA having what is said to be a large cache of exploits against both Apple and Android-based phones, exploits they carefully kept guarded from the manufacturers of the phones so that the flaws were never properly repaired. The phone breaches were focused in part on having an OS-level exploit that would render security features in encrypted applications useless,
Also among the efforts, the CIA was trying to hack into cars, with an eye toward gaining remote control over cars anywhere in the world, leading to speculation that the cars would be made to “assassinate” the drivers in an undetectable manner.
[…] There are still many ways in which information from Trump Tower phone calls could end up in the hands of intelligence agents or law enforcement officials — even without any knowledge on Obama’s part.
First, they may have come upon Trump Tower phone calls if a targeted foreign agent was on the other end of the line — this method comes from the Foreign Intelligence Surveillance Court, or FISA court. Or Trump Tower digital chatter might have shown up while authorities dug through the vast quantities of data hoovered up via more sweeping foreign surveillance programs.
Second, the FBI could also have asked for a so-called “pen register” or “trap and trace device,” which record only the parties involved in a phone call. These requests have a lower bar for approval.
While it’s unknown whether any of these scenarios occurred, it’s “very likely that the people in the Obama administration had access to the communication of senior Trump officials in the run-up to the election, because they have very, very broad authority,” said Cindy Cohn, executive director of the Electronic Frontier Foundation, which has advocated for revising surveillance laws.
And given the ongoing FBI-led investigation into potential ties between Trump’s associates and Russian officials, it’s plausible that law enforcement officials and intelligence agencies had an interest in — or simply came across — the communications in Trump Tower, specialists said. The government is also investigating an alleged Russian plot to use cyberattacks and disinformation to help Trump win.
[…] “Once Election Day came and went, Peter Thiel was a major force in the transition,” said a senior Trump campaign aide. “When you have offices and you bring staff with you and you attend all the meetings, then you have a lot of power.” At the Presidio, the old Army fort in San Francisco where Thiel’s investment firms are housed, many of his employees have taken to calling him “the shadow president.”
The notion is not entirely absurd. If Steve Bannon, the president’s chief strategist, is one ideological pillar of the Trump White House, Thiel, operating from outside the administration, is the other. Bannon’s ideology is a sort of populist nationalism, while Thiel’s is tech-centric: He believes progress is dependent on a revolution in technology that has been largely stymied by government regulation.
Thiel is a contrarian by nature, and his support for Trump was a signature long-shot bet that is paying big dividends in terms of access to and influence on the new administration.
Trump’s surprise victory in November also gave Thiel a renewed faith in the possibilities of politics, and he has worked around the clock to push friends and associates into positions that will give them sway over science and technology policy, an area he believes has been routinely neglected under previous administrations.
Uber has for years engaged in a worldwide program to deceive the authorities in markets where its low-cost ride-hailing service was resisted by law enforcement or, in some instances, had been banned.
The program, involving a tool called Greyball, uses data collected from the Uber app and other techniques to identify and circumvent officials who were trying to clamp down on the ride-hailing service. Uber used these methods to evade the authorities in cities like Boston, Paris and Las Vegas, and in countries like Australia, China and South Korea.
Greyball was part of a program called VTOS, short for “violation of terms of service,” which Uber created to root out people it thought were using or targeting its service improperly. The program, including Greyball, began as early as 2014 and remains in use, predominantly outside the United States. Greyball was approved by Uber’s legal team.
Greyball and the VTOS program were described to The New York Times by four current and former Uber employees, who also provided documents. The four spoke on the condition of anonymity because the tools and their use are confidential and because of fear of retaliation by Uber.
You can now add bees to the rarefied list of tool-using animals, which already includes primates, crows, octopods, otters, porpoises, and more. A fascinating set of experiments has revealed that bees can be taught to use tools, even though they don’t use them in the wild.
Queen Mary University of London biologist Olli J. Loukola and his colleagues wanted to find out more about how bee intelligence works. Previous experiments with the insects have shown that they can count, communicate with each other using “waggle dances” that reveal the direction of food, and pull strings to get access to food. Loukola’s new tool use test showed that not only are bees good with tools, but they can also extemporize to use them more effectively.
Science is facing a “reproducibility crisis” where more than two-thirds of researchers have tried and failed to reproduce another scientist’s experiments, research suggests.
This is frustrating clinicians and drug developers who want solid foundations of pre-clinical research to build upon.
From his lab at the University of Virginia’s Centre for Open Science, immunologist Dr Tim Errington runs The Reproducibility Project, which attempted to repeat the findings reported in five landmark cancer studies.
“The idea here is to take a bunch of experiments and to try and do the exact same thing to see if we can get the same results.”
You could be forgiven for thinking that should be easy. Experiments are supposed to be replicable.
The authors should have done it themselves before publication, and all you have to do is read the methods section in the paper and follow the instructions.
Sadly nothing, it seems, could be further from the truth.
Donald Trump has inherited the most powerful machine for spying ever devised. How this petty, vengeful man might wield and expand the sprawling American spy apparatus, already vulnerable to abuse, is disturbing enough on its own. But the outlook is even worse considering Trump’s vast preference for private sector expertise and new strategic friendship with Silicon Valley billionaire investor Peter Thiel, whose controversial (and opaque) company Palantir has long sought to sell governments an unmatched power to sift and exploit information of any kind. Thiel represents a perfect nexus of government clout with the kind of corporate swagger Trump loves. The Intercept can now reveal that Palantir has worked for years to boost the global dragnet of the NSA and its international partners, and was in fact co-created with American spies.
Peter Thiel became one of the American political mainstream’s most notorious figures in 2016 (when it emerged he was bankrolling a lawsuit against Gawker Media, my former employer) even before he won a direct line to the White House. Now he brings to his role as presidential adviser decades of experience as kingly investor and token nonliberal on Facebook’s board of directors, a Rolodex of software luminaries, and a decidedly Trumpian devotion to controversy and contrarianism. But perhaps the most appealing asset Thiel can offer our bewildered new president will be Palantir Technologies, which Thiel founded with Alex Karp and Joe Lonsdale in 2004.
Palantir has never masked its ambitions, in particular the desire to sell its services to the U.S. government — the CIA itself was an early investor in the startup through In-Q-Tel, the agency’s venture capital branch. But Palantir refuses to discuss or even name its government clientele, despite landing “at least $1.2 billion” in federal contracts since 2009, according to an August 2016 report in Politico. The company was last valued at $20 billion and is expected to pursue an IPO in the near future. In a 2012 interview with TechCrunch, while boasting of ties to the intelligence community, Karp said nondisclosure contracts prevent him from speaking about Palantir’s government work.
[…] The press didn’t make Sandberg into a feminist tech hero, she did. There was no pressure or precedent for female tech leaders to identify so heavily with women’s issues. And that’s why she struck such a chord with so many women. Finally a woman in power was saying all the things we all felt. It was particularly meaningful to me that she openly talked about motherhood– the joys, the challenges, and the strength of it.
This matters because Sandberg is easily the most senior woman in tech, and the most respected despite not being a founder or a CEO. According to First Round’s 2016 State of Startups, Sandberg was the most cited female answer to what tech leader people admire most. She got 1% of overall responses, compared to 6% for Mark Zuckerberg and 5% for Steve Jobs. She got 5% of the write-ins from female respondents. No other female leader came close.
Is that brand, that admiration solely because she is the COO of the only major super unicorn of the social networking era, and one of a few companies bucking to be the first $1 trillion market cap super duper unicorn? Maybe. But my hunch is her positioning as the flawed and vulnerable and yet commanding and respected woman a top that company, a woman who helps lift up other women, has played a massive role in people’s esteem for her.
So having voluntarily taken on this cause– and let’s face it, benefitted from that it in many ways– Sandberg must be well positioned to be a leader in this precise moment of feminist consciousness, right?
To the untrained eye the Daily Mail may appear to be a newspaper, but it’s no such thing. It’s an extreme-right propaganda empire that has been owned and operated by the tax-dodging billionaire Harmsworth family for generations.
I’m sure we can all think of examples that demonstrate that the Daily Mail is savagely right-wing propaganda rag: Their support for Hitler and Oswald Mosley’s British Union of Fascists in the 1930s; their homophobic rants; their smearing of dead war heroes; their constant anti-immigrant hatemongering; their support for extreme-right candidates on the continent; their blaming a murder victim for their own death; their habit of mocking the gullibility of their own readers; their support for Theresa May’s effort to scrap parliamentary sovereignty and turn herself into an all-powerful autocrat who can make and repeal laws as they please.
Interestingly Wikipedia have cottoned on to what an incredibly dodgy extreme-right propaganda empire the Daily Mail is, and after deliberation, the consensus amongst the community of Wikipedia editors is that the Daily Mail is an unreliable source that should no longer be used as a reference (unless absolutely necessary).
At the Republican party convention in Cleveland last July, Trump donor Peter Thiel declared himself ‘“most of all, proud to be an American”. So it came as something of a surprise for New Zealanders to discover that the PayPal co-founder and Facebook board member had become an honorary Kiwi – joining a growing band of wealthy Americans seeking a haven from a possible global apocalypse.
Thiel was recently revealed to have bought a £4.5m lakeside property near the New Zealand town of Wanaka in 2015. When New Zealand Herald reporter Matt Nippert asked why Thiel had been allowed to buy land that appears to fit the classification of “sensitive” without permission from the country’s Overseas Investment Office, he was told it wasn’t necessary – Thiel was already a citizen.
The revelation was met with confusion. By the time of his appearance at the Republican convention, Thiel had already bought 193 hectares of pristine South Island land using his rights as a Kiwi. Politicians asked why a billionaire most famous for adamantly supporting Donald Trump and bankrolling the lawsuits that bankrupted Gawker Media had been allowed not only to buy land in New Zealand, but to make the country part of his future and identity. Winston Peters, leader of the New Zealand First party, accused the National government of “selling citizenship” to foreigners.
Jeff Schechtman recently spoke with Mara Einstein, professor, independent marketing consultant and the author of a new book titled: Black Ops Advertising: Native Ads, Content, Marketing, and the Covert World of the Digital Sell. (Who What Why)
[…] The Trump transition office announced Thursday morning that Giuliani, part of a core group of Republican Trump loyalists during the campaign, had been tapped to “lend expertise to cybersecurity efforts.” The announcement didn’t offer many details about how Giuliani would fulfill his role, noting simply that hacks are rampant.
“Cyber intrusion is the fastest growing crime in the United States and much of the world,” the statement said.
The announcement prompted a few programmers to conduct their own free website analysis of giulianipartners.com. Their verdict? Pathetic. Sad.
Indeed, some may have tried their hand at a little mischief. “Service temporarily unavailable,” flashed the screen when one visitor sought to browse there in the afternoon.
“Seems Rudy may need a cybersecurity chief for himself,” tweeted Jeremiah Grossman, whose profile said he is chief of security strategy for SentinelOne, a cybersecurity company.
Others came to Giuliani’s defense.
With mere days left before President-elect Donald Trump takes the White House, President Barack Obama’s administration just finalized rules to make it easier for the nation’s intelligence agencies to share unfiltered information about innocent people.
New rules issued by the Obama administration under Executive Order 12333 will let the NSA—which collects information under that authority with little oversight, transparency, or concern for privacy—share the raw streams of communications it intercepts directly with agencies including the FBI, the DEA, and the Department of Homeland Security, according to a report today by the New York Times.
That’s a huge and troubling shift in the way those intelligence agencies receive information collected by the NSA. Domestic agencies like the FBI are subject to more privacy protections, including warrant requirements. Previously, the NSA shared data with these agencies only after it had screened the data, filtering out unnecessary personal information, including about innocent people whose communications were swept up the NSA’s massive surveillance operations.
At Donald Trump’s now-notorious press conference on Tuesday, lost amidst his threats to news organizations and denunciations of his enemies, the president-elect claimed he would soon assemble “some of the greatest computer minds anywhere in the world” to tackle the US government’s cybersecurity problem. On Thursday, he went the opposite route instead and hired Rudy Giuliani.
Giuliani, Trump election surrogate and the disgraced former mayor of New York, is apparently going to head up Trump’s efforts to coordinate “cybersecurity” issues between the federal government and the private sector, the transition team announced Tuesday. But what does Giuliani, last seen on the campaign trail claiming the president can break whatever law he likes in a time of war, know about cybersecurity? From the look and sound of it, not much.
Giuliani does head a consulting firm in New York called Giuliani Partners that supposedly focuses on cybersecurity, but Vice’s Motherboard reported yesterday, it’s tough to tell what they actually do, and it’s even tougher to tell what Giuliani does for them, besides being the face of the operation while saying outrageous things on television.
Amy Goodman and Nermeen Shaikh speaks to Brewster Kahle, the founder of the Internet Archive, which has announced that it will be moving a copy of its archive to Canada in the wake of Trump winning the 2016 election. The archive is one of the world’s largest public digital libraries. Part of the site includes the Wayback Machine, which preserves old websites, allowing researchers to access pages deleted by politicians and others. Laurie Allen of #DataRefuge Project also briefly joins the discussion to talk about climate change. (Democracy Now!)
Remembering Vera Rubin: The Trailblazing Astrophysicist Who Confirmed the Existence of Dark Matter and Paved the Way for Modern Women in Science
In his insightful reflection on the crucial difference between talent and genius, Schopenhauer likened talent to a marksman who hits a target others cannot hit, and genius to a marksman who hits a target others cannot see. Among humanity’s rare genius-seers was pioneering astrophysicist Vera Rubin (July 23, 1928–December 25, 2016) — a coruscating intellect animated by a sinewy tenacity, who overcame towering cultural odds by the sheer force of her unbridled curiosity and rigorous devotion to science. In confirming the existence of dark matter, Rubin revolutionized our understanding of the universe, paved the way for modern women in science, and recalibrated the stilted norms of her profession.
Rubin fell in love with the night sky as a young girl, but knew no astronomer, living or dead, to hold as a role model. Eventually, she came upon a children’s book about 19th-century trailblazer Maria Mitchell — America’s first professional female astronomer and the first woman admitted into the American Academy of Arts and Sciences — whose story reframed Rubin’s landscape of possibility and emboldened her to pursue stargazing as a vocation rather than a hobby. “It never occurred to me that I couldn’t be an astronomer,” she told Alan Lightman many years later in their wonderful 1990 conversation.