Full moon falls on June 23, 2013 at 11:32 UTC (6:32 a.m. CDT in the U.S.). Thus, for many, the moon appears about as full in the June 22 evening sky as it does on the evening of June 23. This full moon is not only the closest and largest full moon of the year. It also presents the moon’s closest encounter with Earth for all of 2013. The moon will not be so close again until August, 2014. In other words, it’s not just a supermoon. It’s the closest supermoon of 2013.
We astronomers call this sort of close full moon a perigee full moon. The word perigee describes the moon’s closest point to Earth for a given month. Two years ago, when the closest and largest full moon fell on March 19, 2011, many used the term supermoon, which we’d never heard before.
JM Barrie gave all the rights to Peter Pan to Great Ormond Street Hospital in 1929, and this was later confirmed when he died in 1937.
Since then the hospital has received royalties every time a production of the play is put on, as well as from the sale of Peter Pan books and other products.
Barrie requested that the amount raised from Peter Pan should never be revealed, and the hospital has always honoured his wishes.
Although he and his wife were childless, Barrie loved children and had supported Great Ormond Street Hospital for many years.
In 1929 he was approached to sit on a committee to help buy some land so that the hospital could build a much needed new wing.
Barrie declined to serve on the committee but said that he "hoped to find another way to help".
Two months later, the hospital board was stunned to learn that Sir James had handed over all his rights to Peter Pan.
At a Guildhall dinner later that year Barrie, as host, claimed that Peter Pan had been a patient in Great Ormond Street Hospital and that:
It was he who put me up to the little thing I did for the hospital.
So began the enduring link between the author and the children of Great Ormond Street Hospital.
On 14 December 1929, at Barrie’s suggestion, the cast of a London production of Peter Pan came to the hospital.
They played out the nursery scene for the children, the first of a long tradition.
Look closely at the picture – the man peering over the back to get a better view is none other than Sir James Barrie himself!
Peter Pan archives and memorials
Peter Pan and memorials to J M Barrie can be found throughout the hospital, for example:
A bronze statue of Peter Pan and Tinker Bell outside the hospital entrance.
A Peter Pan café in the reception area.
A plaque dedicated to Barrie in the hospital chapel (unveiled in 1938 by J B Priestley).
Tinker Bell play area in Octav Botnar Wing.
Stained glass window 'The Beginning of Fairies' in the Variety Club Building.
A tiled mural created and donated by the art students of the University of Wolverhampton.
Bambi Note: Visits to the Peter Pan Museum, etc. are by appointment only at the hospital.
More info about the Publishing and stage rights of Peter Pan here.
While much of the news coverage of FBI Director Robert Mueller's Congressional hearing this week focused on his admission that the FBI has used drones domestically, there were some other points raised, including his "defense" of the broad surveillance techniques that appears to amount to the idea that it just takes too long to obey the Constitution and go through the proper procedures before getting information:
Testifying before the Senate Judiciary Committee, Mr. Mueller addressed a proposal to require telephone companies to retain calling logs for five years — the period the N.S.A. is keeping them — for investigators to consult, rather than allowing the government to collect and store them all. He cautioned that it would take time to subpoena the companies for numbers of interest and get the answers back.
“The point being that it will take an awful long time,” Mr. Mueller said.
Well, shucks. Having some amount of oversight, someone in a position to make sure that the data requested is legit would just take too long? It seems like Mueller maybe has been watching too many episodes of 24.
Bambi Note: That is the point. The Constitution is important and should not be subverted or gotten around. It is there to ensure the rights of all Citizens are not trampled on. There may be times when it seems like it takes too long, but that has to be weighed against all Citizens and what the repercussions will be to all of them by subverting and changing things for one or a few. And as the article states when Mueller talks about how you never know what might be needed to connect the dots regarding collecting as many dots as possible to be able to connect the dots later,
Again, this is an anti-Constitutional argument. It's an argument that says any violation of privacy and civil liberties is okay if something collected might possibly be useful later. But that's not how we're supposed to do things in the US. We're only supposed to allow law enforcement to collect the dots if there's evidence that the dots show some law being broken
Not so long ago, people who provided DNA in the course of research studies were told that their privacy was assured. Their DNA sequences were on publicly available Web sites, yes, but they did not include names or other obvious identifiers. These were research databases, scientists said, not like the forensic DNA banks being gathered by the F.B.I. and police departments.
But geneticists nationwide have gotten a few rude awakenings, hints that research subjects in fact could sometimes be identified by their DNA alone, or even by the way their cells were using their DNA. The latest shock came in January, when a researcher at the Whitehead Institute, which is affiliated with the Massachusetts Institute of Technology, managed to track down five people selected at random from a database using only their DNA, ages and the states in which they lived. And he did it in just hours. He also found relatives — a total of close to 50 people.
An anonymous reader writes
"The LA Times mentions that after visiting well known sites such as ADP, Verizon Wireless, Scottrade, Geico, Equifax, PayPal and Allstate, sensitive data remains in the browser disk cache despite those sites using SSL. This included full credit reports, prescription history, payroll statements, partial SSNs, credit card statements, and canceled checks. Web servers are supposed to send a Cache-Control: no-store header to prevent this, but many of the sites are sending non-standard headers recognized only by Internet Explorer, and others are sending no cache headers at all. While browsers were once cautious about writing content received over SSL to the disk cache, today, most do so by default unless the server specifies otherwise."
It has recently been brought to our attention that the MySQL man pages have been relicensed. The change was made rather silently going from MySQL 5.5.30 to MySQL 5.5.31. This affects all pages in the man/ directory of the source code.
You can tell the changes have come during this short timeframe (5.5.30->5.5.31). The old manual pages were released under the following license:
This documentation is free software; you can redistribute it and/or modify it only under the terms of the GNU General Public License as published by the Free Software Foundation; version 2 of the License.
The new man pages (following 5.5.31 and greater – still valid for 5.5.32) are released under the following license:
This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.
This is clearly not very friendly of MySQL at Oracle. The new license has become a lot longer as well (to make it clear it is not released under the GPL). While the following was taken from the resolveip tool, the copyright notice is the same for all the man pages. You can compare the man page in 5.5.30 vs the man page in 5.5.31.
In January, Aaron Swartz, an Internet innovator and activist, decided to end his brief but brilliant life. At the time, Swartz faced the possibility of severe punishment under the CFAA — multiple felony charges and up to 35 years in prison by the government’s own declaration – for what amounted to an act of civil disobedience. Aaron attempted to make documents, many created with public funding, freely available to the public.
But Aaron Swartz was not the first or the last victim of overzealous prosecution under the CFAA.
That’s why we’re authoring bipartisan legislation — which, with the permission of Aaron Swartz’s family, we call “Aaron’s Law” — in the House and Senate to begin the process of updating the CFAA.
Aaron’s Law is not just about Aaron Swartz, but rather about refocusing the law away from common computer and Internet activity and toward damaging hacks. It establishes a clear line that’s needed for the law to distinguish the difference between common online activities and harmful attacks.
In drafting Aaron’s Law — the text of which is available here, along with a detailed summary here – we did not opt for a quick fix of the CFAA that could bring with it unintended consequences.
Bambi Note: This law that would make a very important distinction is vital.
We live in a world where digital information is exploding. Some 90% of the world’s data was generated in the past two years. The obvious question is: how can we store it all?
In Nature Communications today, we, along with Richard Evans from CSIRO, show how we developed a new technique to enable the data capacity of a single DVD to increase from 4.7 gigabytes up to one petabyte (1,000 terabytes). This is equivalent of 10.6 years of compressed high-definition video or 50,000 full high-definition movies.
So how did we manage to achieve such a huge boost in data storage? First, we need to understand how data is stored on optical discs such as CDs and DVDs.
'Ales' is the first Muppet to have a dad in jail
The long-running kid's favorite has launched an educational program to help child comes to terms with having a parent behind bars
It is aimed at children aged 3-8 years of age
The U.S. has the highest incarceration rate in the world with one in 28 children having a parent in jail
More men are in jail in the U.S. than are deployed for the U.S. military
Organizers say the campaign is aimed at helping kids aged three to eight in the U.S., which has the highest incarceration rate in the world
We found a number of interesting disclosures in two documents released by the newspaper. Among them:
1) The NSA generally destroys communication of U.S. persons that are collected incidental to collecting data on foreign individuals — unless the communication is encrypted, which means that encrypted email and text communications involving U.S. persons that are collected by the NSA in the course of conducting bulk collections would be retained by the agency. It does this as a matter of course, the document appears to say, to further its research and assessment into cracking encryption. The NSA may retain the encrypted communications for “any period of time” during which it might prove to be useful.
2) The NSA maintains a massive database of U.S. email addresses and phone numbers. The agency says it does this only to help determine who is a U.S. citizen and therefore make sure that it’s not accidentally spying on those people.
3) The NSA also maintains a database of information incidentally collected from GSM and Home Location Registers to determine when a foreign person being targeted has entered the U.S. According to the document, “These registers receive updates whenever a GSM phone moves into a new service area. Analysis of this HLR information provides a primary indicator of a foreign user of a mobile telephone entering the United States.”
4) When the NSA does pick up purely domestic communications, it can still use or pass the intercepted call or email to the FBI or other federal agencies if there is evidence of a crime or a national security leak. Although the NSA has long been allowed by statute to refer to the FBI information collected in national security investigation if it shows evidence of a crime, this has always been presumed to refer to targeted investigations. But it takes on new meaning in light of what we now know about the kinds of bulk collections the NSA is doing of internet communications, including of U.S. data, and raises the possibility for the government to do pattern analysis to uncover criminal activity on large sets of data.
Bambi Note: Much more in the article - greater detail/further information.
Google asked the secretive Foreign Intelligence Surveillance Court on Tuesday to ease long-standing gag orders over data requests the court makes, arguing that the company has a constitutional right to speak about information it is forced to give the government.
The legal filing, which invokes the First Amendment’s guarantee of free speech, is the latest move by the California-based tech giant to protect its reputation in the aftermath of news reports about broadNational Security Agency surveillance of Internet traffic.
[Editor’s note: Last week, the Guardian reached out to a number of experts and technologists to gauge reactions on revelations of the massive National Security Agency spying program that recently came to light. Shava Nerad, who started her career as a software engineer and was previously involved with the Tor Project, which offers online anonymity in web browsing, has also been engaged in various forms of political activism. Nerad submitted comments via email in response to the Bay Guardian’s request for an interview. We've published an edited version of her thoughts here.]
Must read! Excellent article.
Exclusive: British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal
Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).
The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.
It's a brave new world of information mining. Here are a few ways your data are already being collected and put to use, even if you don't know it.
1. Facebook knows what you're buying.
2. Your Facebook likes reveal personality traits.
3. Ad firms watch your tweets to better market to you.
4. Companies use retina trackers to see how your eyes move in the store.
5. Department stores can track your smartphone.
6. Amazon has ads that watch what you look at online.
7. Target can tell if you're pregnant before you do.
8. Qantas Airlines flight attendants carry iPads with up-to-the-minute data on frequent flyers.
9. An app can use data from your smartphone pictures to pinpoint where you took the photo.
10. DNA databases are not just for the FBI anymore.
Much more in the article including details on each item.
Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.
The revelation comes as Britain prepares to host another summit on Monday – for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week.
The disclosure raises new questions about the boundaries of surveillance by GCHQ and its American sister organisation, the National Security Agency, whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey.
Irrespective of the details of the current revelations about US spying being provided by Edward Snowden in the Guardian, there is already a huge collateral benefit. On the one hand, the US government is falling over itself to deny some of the allegations by offering its own version of the story. That for the first time gives us official details about programmes that before we only knew through leaks and rumours, if at all. Moreover, the unseemly haste and constantly-shifting story from the US authorities is confirmation, if anyone still needed it, that what Snowden is revealing is important - you don't kick up such a fuss over nothing.
But perhaps even more crucially, other journalists have finally been shamed into asking some of the questions they ought to have asked years and even decades ago. This has resulted in a series of extremely interesting stories about NSA spying, many of which contain ancillary information that is just as important as the main story. Here's a great example that appeared over the weekend on the Bloomberg site.
Among other things, it is about Microsoft, and the extent to which it has been helping the NSA spy on the world. Of course, that's not a new fear.
Bambi Note: There is so much good information here. So, of course, this makes me wonder why Apple Mac OS X incorporates SMB2 networking as default sharing in Mavericks.
American spies based in the UK intercepted the top-secret communications of the then Russian president, Dmitry Medvedev, during his visit to Britain for the G20 summit in London, leaked documents reveal.
The details of the intercept were set out in a briefing prepared by the National Security Agency (NSA), America’s biggest surveillance and eavesdropping organisation, and shared with high-ranking officials from Britain, Australia, Canada and New Zealand.
The document, leaked by the NSA whistleblower Edward Snowden and seen by the Guardian, shows the agency believed it might have discovered “a change in the way Russian leadership signals have been normally transmitted”.
Today, the United States is conducting offensive cyberwar actions around the world.
More than passively eavesdropping, we're penetrating and damaging foreign networks for both espionage and to ready them for attack. We're creating custom-designed Internet weapons, pre-targeted and ready to be "fired" against some piece of another country's electronic infrastructure on a moment's notice.
This is much worse than what we're accusing China of doing to us. We're pursuing policies that are both expensive and destabilizing and aren't making the Internet any safer. We're reacting from fear, and causing other countries to counter-react from fear. We're ignoring resilience in favor of offense.
CNN Editor's note: Bruce Schneier is a security technologist and author of "Liars and Outliers: Enabling the Trust Society Needs to Survive."
Much more in the article - This was just the tip of the proverbial iceberg!
The roadblocks went up on a Friday at several points in two Alabama towns, about 40 miles on either side of Birmingham.
For the next two days, off-duty sheriff's deputies in St. Clair County, to the east, and Bibb County, to the southwest, flagged down motorists and steered them toward federal highway safety researchers. The researchers asked them a few questions about drinking and drug use and asked them for breath, saliva and blood samples -- offering them $10 for saliva and $50 to give blood.
"The survey provides useful data about alcohol and drug use by drivers, and participation is completely voluntary and anonymous," it said. "More than 60 communities across the country will participate this year, including two Alabama counties, both of which also participated in the previous survey in 2007. NHTSA always works closely with state safety officials and local law enforcement to conduct these surveys as we work to better inform our efforts to reduce drunk and drugged driving."
Drones are becoming dated technology: we may now be able to hand over some of the life-and-death decisions of war to robots.
From the perspective of those engaged in modern warfare, lethal autonomous robots (LARs) offer distinct advantages. They have the potential to process information and to act much faster than humans in situations where nanoseconds could make the difference. They also do not act out of fear, revenge or innate cruelty, as humans sometimes do.
A drone still involves a human "in the loop" – someone, somewhere presses the button. This is slowed down by satellite communications (think of the time-lag when foreign correspondents speak on TV) and these communications can be interrupted by the enemy. So why not take the human "out of the loop", and install an on-board computer that, independently, is able to identify and to trigger deadly force against targets without human intervention?
There are good reasons to be cautious about permitting this.
Bambi Note: War Games and Terminator all over again?!