The US has suffered a massive cyberbreach. It’s hard to overstate how bad it is – The Guardian

Recent news articles have all been talking about the massive Russian cyber-attack against the United States, but thats wrong on two accounts. It wasnt a cyber-attack in international relations terms, it was espionage. And the victim wasnt just the US, it was the entire world. But it was massive, and it is dangerous.

Espionage is internationally allowed in peacetime. The problem is that both espionage and cyber-attacks require the same computer and network intrusions, and the difference is only a few keystrokes. And since this Russian operation isnt at all targeted, the entire world is at risk and not just from Russia. Many countries carry out these sorts of operations, none more extensively than the US. The solution is to prioritize security and defense over espionage and attack.

Heres what we know: Orion is a network management product from a company named SolarWinds, with over 300,000 customers worldwide. Sometime before March, hackers working for the Russian SVR previously known as the KGB hacked into SolarWinds and slipped a backdoor into an Orion software update. (We dont know how, but last year the companys update server was protected by the password solarwinds123 something that speaks to a lack of security culture.) Users who downloaded and installed that corrupted update between March and June unwittingly gave SVR hackers access to their networks.

This is called a supply-chain attack, because it targets a supplier to an organization rather than an organization itself and can affect all of a suppliers customers. Its an increasingly common way to attack networks. Other examples of this sort of attack include fake apps in the Google Play store, and hacked replacement screens for your smartphone.

SolarWinds has removed its customers list from its website, but the Internet Archive saved it: all five branches of the US military, the state department, the White House, the NSA, 425 of the Fortune 500 companies, all five of the top five accounting firms, and hundreds of universities and colleges. In an SEC filing, SolarWinds said that it believes fewer than 18,000 of those customers installed this malicious update, another way of saying that more than 17,000 did.

Thats a lot of vulnerable networks, and its inconceivable that the SVR penetrated them all. Instead, it chose carefully from its cornucopia of targets. Microsofts analysis identified 40 customers who were infiltrated using this vulnerability. The great majority of those were in the US, but networks in Canada, Mexico, Belgium, Spain, the UK, Israel and the UAE were also targeted. This list includes governments, government contractors, IT companies, thinktanks, and NGOs and it will certainly grow.

Once inside a network, SVR hackers followed a standard playbook: establish persistent access that will remain even if the initial vulnerability is fixed; move laterally around the network by compromising additional systems and accounts; and then exfiltrate data. Not being a SolarWinds customer is no guarantee of security; this SVR operation used other initial infection vectors and techniques as well. These are sophisticated and patient hackers, and were only just learning some of the techniques involved here.

Recovering from this attack isnt easy. Because any SVR hackers would establish persistent access, the only way to ensure that your network isnt compromised is to burn it to the ground and rebuild it, similar to reinstalling your computers operating system to recover from a bad hack. This is how a lot of sysadmins are going to spend their Christmas holiday, and even then they cant be sure. There are many ways to establish persistent access that survive rebuilding individual computers and networks. We know, for example, of an NSA exploit that remains on a hard drive even after it is reformatted. Code for that exploit was part of the Equation Group tools that the Shadow Brokers again believed to be Russia stole from the NSA and published in 2016. The SVR probably has the same kinds of tools.

Even without that caveat, many network administrators wont go through the long, painful, and potentially expensive rebuilding process. Theyll just hope for the best.

Its hard to overstate how bad this is. We are still learning about US government organizations breached: the state department, the treasury department, homeland security, the Los Alamos and Sandia National Laboratories (where nuclear weapons are developed), the National Nuclear Security Administration, the National Institutes of Health, and many more. At this point, theres no indication that any classified networks were penetrated, although that could change easily. It will take years to learn which networks the SVR has penetrated, and where it still has access. Much of that will probably be classified, which means that we, the public, will never know.

And now that the Orion vulnerability is public, other governments and cybercriminals will use it to penetrate vulnerable networks. I can guarantee you that the NSA is using the SVRs hack to infiltrate other networks; why would they not? (Do any Russian organizations use Orion? Probably.)

While this is a security failure of enormous proportions, it is not, as Senator Richard Durban said, virtually a declaration of war by Russia on the United States While President-elect Biden said he will make this a top priority, its unlikely that he will do much to retaliate.

The reason is that, by international norms, Russia did nothing wrong. This is the normal state of affairs. Countries spy on each other all the time. There are no rules or even norms, and its basically buyer beware. The US regularly fails to retaliate against espionage operations such as Chinas hack of the Office of Personal Management (OPM) and previous Russian hacks because we do it, too. Speaking of the OPM hack, the then director of national intelligence, James Clapper, said: You have to kind of salute the Chinese for what they did. If we had the opportunity to do that, I dont think wed hesitate for a minute.

We dont, and Im sure NSA employees are grudgingly impressed with the SVR. The US has by far the most extensive and aggressive intelligence operation in the world. The NSAs budget is the largest of any intelligence agency. It aggressively leverages the USs position controlling most of the internet backbone and most of the major internet companies. Edward Snowden disclosed many targets of its efforts around 2014, which then included 193 countries, the World Bank, the IMF and the International Atomic Energy Agency. We are undoubtedly running an offensive operation on the scale of this SVR operation right now, and itll probably never be made public. In 2016, President Obama boasted that we have more capacity than anybody both offensively and defensively.

He may have been too optimistic about our defensive capability. The US prioritizes and spends many times more on offense than on defensive cybersecurity. In recent years, the NSA has adopted a strategy of persistent engagement, sometimes called defending forward. The idea is that instead of passively waiting for the enemy to attack our networks and infrastructure, we go on the offensive and disrupt attacks before they get to us. This strategy was credited with foiling a plot by the Russian Internet Research Agency to disrupt the 2018 elections.

But if persistent engagement is so effective, how could it have missed this massive SVR operation? It seems that pretty much the entire US government was unknowingly sending information back to Moscow. If we had been watching everything the Russians were doing, we would have seen some evidence of this. The Russians success under the watchful eye of the NSA and US Cyber Command shows that this is a failed approach.

And how did US defensive capability miss this? The only reason we know about this breach is because, earlier this month, the security company FireEye discovered that it had been hacked. During its own audit of its network, it uncovered the Orion vulnerability and alerted the US government. Why dont organizations like the departments of state, treasury and homeland security regularly conduct that level of audit on their own systems? The governments intrusion detection system, Einstein 3, failed here because it doesnt detect new sophisticated attacks a deficiency pointed out in 2018 but never fixed. We shouldnt have to rely on a private cybersecurity company to alert us of a major nation-state attack.

If anything, the USs prioritization of offense over defense makes us less safe. In the interests of surveillance, the NSA has pushed for an insecure cellphone encryption standard and a backdoor in random number generators (important for secure encryption). The DoJ has never relented in its insistence that the worlds popular encryption systems be made insecure through back doors another hot point where attack and defense are in conflict. In other words, we allow for insecure standards and systems, because we can use them to spy on others.

We need to adopt a defense-dominant strategy. As computers and the internet become increasingly essential to society, cyber-attacks are likely to be the precursor to actual war. We are simply too vulnerable when we prioritize offense, even if we have to give up the advantage of using those insecurities to spy on others.

Our vulnerability is magnified as eavesdropping may bleed into a direct attack. The SVRs access allows them not only to eavesdrop, but also to modify data, degrade network performance, or erase entire networks. The first might be normal spying, but the second certainly could be considered an act of war. Russia is almost certainly laying the groundwork for future attack.

This preparation would not be unprecedented. Theres a lot of attack going on in the world. In 2010, the US and Israel attacked the Iranian nuclear program. In 2012, Iran attacked the Saudi national oil company. North Korea attacked Sony in 2014. Russia attacked the Ukrainian power grid in 2015 and 2016. Russia is hacking the US power grid, and the US is hacking Russias power grid just in case the capability is needed someday. All of these attacks began as a spying operation. Security vulnerabilities have real-world consequences.

Were not going to be able to secure our networks and systems in this no-rules, free-for-all every-network-for-itself world. The US needs to willingly give up part of its offensive advantage in cyberspace in exchange for a vastly more secure global cyberspace. We need to invest in securing the worlds supply chains from this type of attack, and to press for international norms and agreements prioritizing cybersecurity, like the 2018 Paris Call for Trust and Security in Cyberspace or the Global Commission on the Stability of Cyberspace. Hardening widely used software like Orion (or the core internet protocols) helps everyone. We need to dampen this offensive arms race rather than exacerbate it, and work towards cyber peace. Otherwise, hypocritically criticizing the Russians for doing the same thing we do every day wont help create the safer world in which we all want to live.

Read the original here:

The US has suffered a massive cyberbreach. It's hard to overstate how bad it is - The Guardian

Posted in NSA

No, the United States Does Not Spend Too Much on Cyber Offense – Council on Foreign Relations

In the wake of the SolarWinds incident, critics have pointed to budget and personnel imbalances between offensive and defensive missions. As Alex Stamos pointed out in the Washington Post, the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security has only 2,200 employees for a mission that includes protecting all sixteen critical infrastructure sectors and all federal agencies while the National Security Agency (NSA) alone has more than 40,000 employees. The Department of Defenses (DOD) Cyber Command has over 12,000 personnel, including 6,000 military members.

While total spending on cyber missions at NSA is classified, what is known about federal spending suggests priorities skewed toward offense. As Jason Healey pointed out last spring, the DODs cybersecurity budget is significantly larger than the cybersecurity budgets of all civilian components combined. The federal government spends more than half a billion dollars per year on the headquarters elements of Cyber Command alone and only $400 million on cyber diplomacy at the State department. All of CISAs budget adds up to about half of what DOD spends on just offensive cyber operations.

More on:

Cybersecurity

U.S. Department of Defense

Homeland Security

Defense and Security

The SolarWinds disaster clearly indicates that CISA and federal agencies will need more money in order to develop the capabilities necessary to detect and contain adversaries as capable as Russias Foreign Intelligence Service. Additional funds are also badly needed to scale out efforts to coordinate with the private sector, fund research that the market will not support, and bolster the security of critical infrastructure. That funding, however, should not come out of the current budgets or future budget growth on the offensive side of the equation.

Net Politics

CFR experts investigate the impact of information and communication technologies on security, privacy, and international affairs.2-4 times weekly.

Since cybersecurity first became an issue of national import, cyber policy has been predicated on the idea of a public-private partnership, a term that is now nauseating to much of the community. Yet the phrase captures the reality that the federal government, unlike in other domains, does not assume ultimate responsibility for the security of systems it does not own or operate, including critical infrastructure. In terms of dollars and cents, what this means is that total spending on U.S. cybersecurity is actually heavily skewed toward defense not offense because all the cybersecurity spending in the private sector goes in the defense column.

Alongside DHSs 2,200 employees at CISA, the 6,000 cyber warriors in the Defense Department suggest an imbalance towards offense over defense until you recognize that only about 2,000 of these 6,000 are in units that carry out offensive cyber missions and these 2,000 people are the only people in the United States that are authorized to carry out offensive cyber operations. Even the NSAs 40,000 employees, only a fraction of which are focused on intelligence collection against adversary cyber operators, pale alongside the total cybersecurity workforce estimated at 750,000.

While estimates of total private sector spending in the United States range from $40 billion to $120 billion, even the lower end of that range is more than ten times the Pentagons budget for cyber operations and four times what data leaked from the Snowden disclosures suggested was the NSA's budget. Microsoft alone says that it spends $1 billion a year on cybersecurity, and JP Morgan also spends close to that amount.

No doubt CISA needs to grow several times over to carry out its mission, and other civilian agencies will need a large influx of funds to secure themselves, but relative percentages between defense and offense in the federal budget could look largely the same.

More on:

Cybersecurity

U.S. Department of Defense

Homeland Security

Defense and Security

Digital and Cyberspace Update

Digital and Cyberspace Policy program updates on cybersecurity, digital trade, internet governance, and online privacy.Bimonthly.

While the defense clearly failed, it is becoming increasingly clear that the intelligence community either failed to detect this campaign or lacked the ability to understand and communicate what they saw. Its also possible that the NSA supplied indications and warnings of the campaign to Cyber Command but offensive operators were spread too thin to engage and disrupt the activity. Either way, more spending, not less on offense, could be in the cards.

Here is the original post:

No, the United States Does Not Spend Too Much on Cyber Offense - Council on Foreign Relations

Posted in NSA

Satoshi Nakamoto from NSA, AntiChrist and Other Bitcoin Conspiracy Theories – Cryptonews

Source: Adobe/afxhome

The most popular cryptocurrency, Bitcoin (BTC), is filled with conspiracy theories, ranging from the plausible to the downright absurd.

Lets take a quick look at the most common Bitcoin conspiracy theories for a good laugh or - if you choose to believe them - a peek down the rabbit hole.

On Wednesday, June 20, 2018, a new block was mined on the Bitcoin blockchain. It was a typical block, except that its hash was 00000000000000000021e800c1e8df51b22c1588e5a624bea17e9faa34b2dc4a.

It caused a massive uproar among the community, with Twitter and Reddit awash with speculations concerning the origins and meaning of the number.

The reason for the excitement around this particular block hash, something many within the community are already familiar with, is a number. First, upon a cursory glance, the number of zeros at the beginning of the block hash was similar to the ones in the block hash of the Genesis Block, or the first block of Bitcoin ever mined.

Given the lengths supposedly undertaken by the pseudonymous creator of BTC, Satoshi Nakamoto, to achieve that hash in the Genesis Block, some believe it to be meaningful. Additionally, it was pointed out that it is highly improbable for the June 2018 hash to be generated at random.

Secondly, the number that came after the first zeros was 21e8. This number is an important one in physics because it refers to the E8 Theory, which is an attempt to describe all known fundamental interactions in physics and to stand as a possible theory of everything.

Possible explanations for the event ranged from a simple chance to AI or Nakamotos resurgence and even time travel.

Possibly, the biggest mystery (together with when moon?) in the Bitcoin world is its creator Satoshi Nakamoto. It is assumed this was either a person or a group of people working in concert to create the worlds first decentralized digital currency. The people listed as possible Nakamoto candidates reads like the whos who of the cypherpunk movement, such as Hal Finney, Adam Back, and Nick Szabo, computer scientist, legal scholar, and cryptographer known for his research in cryptocurrency.

Meanwhile, Finey, who died in 2014, was the first-ever recipient of a BTC transaction sent from Satoshi. Also, he was identified as a possible Nakamoto ghostwriter by Newsweek and the New Yorker. In fact, shortly before his death, Forbes wrote about the fact that Finney, a cryptography pioneer, had a neighbor named Nakamoto.

Also, Adam Back, CEO of major blockchain technology firm Blockstream, was one of the first two people to receive an email from Satoshi, and he was also cited in the Bitcoin white paper.

Another computer scientist, Craig S. Wright has infamously claimed to be Nakamoto but has never been able to prove it.

Given the complexity of Bitcoin and the deep understanding of economics showcased by Nakamoto, many are of the opinion that Nakamoto was actually a group of people. Many contend that it is improbable that one person could be so well versed in many different areas of scholarship to create a technological tool so robust that it continues to stand the test of time today.

The etymology of Satoshi Nakamoto corresponds to knowledge or enlightenment and the middle or center. The vague nature of the words can mean one of two things, either awoken by being at the source or central intelligence. The latter is a much-speculated theory, that the US National Security Agency (NSA) (or some other government intelligence operation) created the cryptocurrency.

The most quoted evidence backing this theory is the fact that Bitcoin employs a common cryptography tool to create its public and private keys. The theory is that this in itself could provide the NSA with a back door to the Bitcoin blockchain.

Another reason cited by pundits of this theory is the fact that social media threads, on sites like Reddit, which question the NSA/Bitcoin connection are deleted. Finally, even Ethereum (ETH) co-founder Vitalik Buterin (before his ETH career even started) reportedly said that he wouldnt be surprised if [Nakamoto] is actually an American working for the NSA specializing in cryptography. Then he got sick of the governments monetary policies and decided to create Bitcoin. He also added: Or the NSA itself decided to create Bitcoin.

However, several years later, Buterin clarified that his opinions have changed a lot since his NSA-related statements in 2011.

Blockstream is a blockchain technology company staffed by well-known and well-regarded developers. It is led by aforementioned Adam Back, a cryptographer aligned with the cypherpunk movement. It is through these endeavors where he interacted with Satoshi Nakamoto, corresponding with him, which led to him being cited in the Bitcoin whitepaper.

Blockstream describes itself as the global leader in Bitcoin and blockchain technology. Founded in 2014, the company aims to create a range of products and services which should ease the use and adoption of bitcoin and other blockchain-based digital currencies. Blockstream has raised large amounts in its funding rounds since its inception.

To the onlooker, Blockstream should be a well-regarded institution within the space. Meanwhile, for a number within the space, Blockstream seems to be hell-bent on destroying the original intent of Bitcoin with its driving motivations being profit.

However, these accusations can be heard from the Bitcoin Cash (BCH), which is a hard fork of Bitcoin, camp mostly. They claim that Blockstream is against any changes that may scale Bitcoin because they want users to use their proprietary sidechains, such as the Liquid Network.

Given that many of the Bitcoin Core developers also work at Blockstream, this is an "interesting" accusation, to say the least. While it is an old conspiracy theory, it keeps morphing with time.

In 2018, a Danish firm called BiChip (which, ironically, seems to be spreading vaccines-related conspiracy theories by itself) released an update to their subdermal chip, allowing people to store the XRP token inside themselves. By writing the chip, users could transact with their XRP holdings. The chip has since expanded its abilities and can now be used by BTC users too.

Conservative and religious circles were quick to point out the similarities between the emerging tech and the mark of the beast.

The mark of the beast references a theme in the Book of Revelations where people in the end times will be unable to trade without having the mark of the beast, either in their hand or on their forehead. Given the subdermal nature of the chip, speculation was rife and the theory took hold quickly.

That speculation inspired even more end-time related theories, with people claiming that Bitcoin was intended to usher in the New World Order where artificial intelligence would be lord to all. The theory is that AI created Bitcoin, using the prospect of profit as a lure to trap humanity into worshipping it.

___

In either case, despite all these conspiracists, Bitcoin is about to turn 12 on January 3, the anniversary of the first block in the Bitcoin blockchain mined, and it looks ready to ignore even more and even crazier conspiracy theories going forward.

___

Learn more: Bitcoin Wheel Cannot Be StoppedCrypto in 2021: Bitcoin To Ride The Same Wave Of Macroeconomic ProblemsCrypto Adoption in 2021: Bitcoin Rules, Ethereum Grows & Faces RivalsCrypto in 2021: Institutions Prefer Bitcoin, Retail Open to Altcoins

Continued here:

Satoshi Nakamoto from NSA, AntiChrist and Other Bitcoin Conspiracy Theories - Cryptonews

Posted in NSA

How A Cybersecurity Firm Uncovered The Massive Computer Hack – NPR

Kevin Mandia, CEO of the cybersecurity firm FireEye, testifies before the Senate Intelligence Committee in 2017. Mandia's company was the first to sound the alarm about the massive hack of government agencies and private companies on Dec. 8. Susan Walsh/AP hide caption

Kevin Mandia, CEO of the cybersecurity firm FireEye, testifies before the Senate Intelligence Committee in 2017. Mandia's company was the first to sound the alarm about the massive hack of government agencies and private companies on Dec. 8.

The first word that hackers had carried out a highly sophisticated intrusion into U.S. computer networks came on Dec. 8, when the cybersecurity firm FireEye announced it had been breached and some of its most valuable tools had been stolen.

"We escalated very quickly from the moment I got the first briefing that, 'Hey, we have a security incident of some magnitude,' " FireEye CEO Kevin Mandia told All Things Considered co-host Mary Louise Kelly. "My gut was telling me it was something we needed to put people on right away."

Mandia was right. Within days, the scope of the hack began to emerge.

Multiple U.S. agencies were successfully targeted, including the departments of State, Treasury, Commerce, Energy and Homeland Security as well as the National Institutes of Health.

The hackers attached their malware to a software update from Austin, Texas-based company SolarWinds, which makes software used by many federal agencies and thousands of private companies to monitor their computer networks.

The SVR, Russia's foreign intelligence agency, is considered the most likely culprit, according to Secretary of State Mike Pompeo and some members of Congress who have been briefed by the U.S. intelligence community. But the Trump administration has not formally attributed blame.

"What I've seen is 2020 has been about the hardest year, period, to be an information security officer," Mandia said. "It's time this nation comes up with some doctrine on what we expect nations' rules of engagement to be, and what will our policy, or proportional response, be to folks who violate that doctrine. Because right now there's absolutely an escalation in cyberspace."

Here are excerpts from Mandia's interview:

What was that moment like when you're figuring out it's your cybersecurity company that has been hacked?

If you wrote down the reasons why another nation might want to compromise FireEye, you can come up with some reasons. What we do is we track attackers and quite frankly, we out them. We try to figure out here's their fingerprints, let's share those fingerprints with everybody so they can't get away with what they're doing.

[Early on] there was enough operational security by the attacker that I knew it was professional. This wasn't the first rodeo for these attackers. In fact, they followed a tradecraft that the more I learned, the more this was a unit that's been operational for a decade or more. They knew what they were doing, they had novel techniques. So we knew we would have to do the full-court press on our investigation. And we did.

Who is behind this attack?

For me, it's definitely a nation. In regards to the supply chain compromise at SolarWinds, they did an innocuous addition of code in October 2019 inside the supply chain, saw that it was provisioned and deployed so they knew that their techniques on offense to hack the supply chain were efficient and effective. They went live with actual malicious code inside of the SolarWinds in March through June of this year.

So this is somebody who is patient, professional, and what made this interesting to me is I felt they were more interested in staying surreptitious and clandestine than they were about accomplishing their mission.

What nations have this kind of capability?

Not a lot. It's very consistent with what Russia could do. There might be a group out of China that might be able to do it. And that's probably it.

Is there any signature to this attack that would be consistent with other hacks you've seen?

There's probably about six to eight technical details that made me realize this is a nation, and most likely a foreign intelligence service doing this breach. One of them is this: They used an infrastructure to attack FireEye. The IP addresses or systems they use to attack FireEye were not used in any other incident we're aware of.

In other words, the attackers set up an infrastructure to attack FireEye that was wholly unique to attacking FireEye. That takes a lot of maintenance. That takes a lot of coordination. That's an operation not just a hack. Most threat groups, when they attack, will use shared infrastructure to attack many companies. This group does not do that. That in and of itself made me realize it was an operation.

What should we take from the fact that it was FireEye, a private cybersecurity firm, that alerted the U.S. government and not the other way around?

We're all in this together, period. And there's different visibility at different places. When the attacks were happening against FireEye, all the IP addresses used to attack us [were] all inside the United States. And I'm pretty aware that the [National Security Agency] does not do collections within the United States. So we were the ones, kind of on our own, to be able to see this and detect it.

So you're saying you were able to see things that the NSA, despite all of its vast resources, have firewalls against being able to see, domestically?

Well, I wouldn't call it firewalls necessarily. It's just legal remit. You know, when you look at what these attackers do, they're attacking U.S. companies from the United States. That doesn't necessarily mean the attackers are sitting in the United States but the infrastructure they're setting up to attack companies like FireEye are all in the United States. So the malicious intent may not be visible outside the United States and may only be visible inside.

We have thousands and thousands of computers that we inspected for evidence that they were compromised, and we couldn't get anything earlier in the time frame than a SolarWinds system. We sat there looking at the SolarWinds system saying, "We can't find anything bad on it right now, but it's our earliest evidence of compromise. Something's wrong."

So we then had to turn it over to our reverse engineers. This is something most companies can't do. We went through 14 gig of information, over 18,000 files in the update that we got from SolarWinds, over 4,000 executable files. We decompiled them into millions of lines. And then with real malware analysts, we found the needle in the haystack.

Do we know whether the NSA itself was hacked?

I don't have any idea.

So what now? There's a statement from the FBI and the director of national intelligence and the cybersecurity arm of Homeland Security that says this breach is ongoing.

I think as folks are being notified or learning that they're compromised, they're going to have a lot of work to do. All these organizations are both going to have to investigate what happened and figure out the scale and scope of it, and then they're going to have to eradicate the attackers from their network if they're still active.

Even if they're not active, you're going to flex your muscle a little bit to do a lot of remediation. That's going to take months.

But one thing that's definitely clear to me: The attackers have no idea what is the envelope of behavior, what are the rules of engagement.

We're a nation losing billions of dollars to ransomware. And we are a nation that just had potentially one of the most successful cyberespionage campaigns ever done on it.

Read the original post:

How A Cybersecurity Firm Uncovered The Massive Computer Hack - NPR

Posted in NSA

Snowden and Assange Deserve Pardons. So Do the Whistleblowers Trump Imprisoned. – The Intercept

In 2007, the Bush administrations Justice Department sent me a letter saying it was conducting a criminal investigation into the unauthorized disclosure of classified information in my 2006 book, State of War.

When my lawyers called the Justice Department about the letter, the prosecutors refused to say I was not a subject of their leak investigation. That was ominous. If I were considered a subject, rather than simply a witness, it meant the government hadnt ruled out prosecuting me for publishing classified information.

From left to right: Julian Assange, Edward Snowden, and Reality Winner.

Photo: Getty Images

Eventually after the Obama administration took over the case the Justice Department decided to treat me only as a witness and did not try to prosecute me.

But in the future, the outcome of a similar case for a journalist might be very different if Julian Assange is successfully prosecuted on the charges brought against him by President Donald Trumps Justice Department.

The Trump administration has charged Assange under the Espionage Act for conspiring to leak classified documents. The indictment focuses on his alleged efforts to encourage former Army intelligence analyst Chelsea Manning to leak classified documents to him and WikiLeaks. If the Assange prosecution is successful, it will set a dangerous precedent: that journalists can be prosecuted based on their interactions with sources who provide them with government secrets.

Such a precedent could make it extremely difficult for journalists to cover military, intelligence, and related national security matters, and thus leave the public in the dark about what the government is really doing around the world.

That is why the U.S. indictment of Julian Assange is so dangerous to liberty in America, and why the case against Assange should be dropped and he should be pardoned.

While Trump has still not publicly accepted his defeat in the 2020 presidential election, he has begun to issue a spate of pardons. On Tuesday, he issued pardons to a group that included two convicted of crimes in connection with the Trump-Russia investigation, and four former Blackwater contractors convicted of killing Iraqi civilians.

Despite the stench surrounding Trumps latest pardons, supporters of several whistleblowers have launched public campaigns to lobby for pardons; the supporters of Assange and Edward Snowden have been the most vocal.

Like Assange, Snowden clearly deserves a pardon. Snowdens massive 2013 leak documented the full extent of the National Security Agencys domestic spying on Americans. But rather than recognize that Snowden has performed a public service, the U.S. government has forced him into exile in Russia. Meanwhile, Assange now sits in prison in Britain, awaiting extradition to face prosecution in the United States.

Supporters of WikiLeaks founder Julian Assange demonstrate outside the Central Criminal Court after Assange appeared in court for a full extradition hearing on the last day of the trials in London on Oct. 01, 2020.

Photo: Hasan Esen/Anadolu Agency/Getty Images

Public support for the pardon of whistleblower Reality Winner has also begun to build. Winner was arrested in 2017 and accused of anonymously leaking an NSA document disclosing that Russian intelligence was seeking to hack into U.S. election voting systems. That document was allegedly leaked to The Intercept, which had no knowledge of the identity of its source. (The Intercepts parent company supported Winners legal defense through the First Look Medias Press Freedom Defense Fund, which I direct.) She pleaded guilty in the case in 2018 and was sentenced to more than five years in prison, the longest sentence ever imposed in a case involving a leak to the press.

Earlier this month, a federal appeals court denied Winners request for compassionate early release after she contracted Covid-19 in prison. She remains in federal prison today.

Former Pentagon official J. William Leonard wrote an op-ed in the Washington Post earlier this week calling for Winners pardon, arguing in part that her prosecution constituted overreach by the government.

But there are other whistleblowers who deserve pardons as well.

During Trumps four years in office, his administration has arrested and charged eight government officials in leak cases. That is almost equal to the record nine (or 10, depending on how you count) leak prosecutions conducted by the Obama administration over eight years.

Four of the leak cases during the Trump administration were connected to disclosures related to Trump, the circle of people around him, and the Trump-Russia inquiry. The Justice Department was clearly under intense pressure from Trump to go after people who leaked stories that Trump didnt like.

Winners case was the first of those four. In addition, James Wolfe, the director of security for the Senate Select Committee on Intelligence, was charged in 2018 with making false statements to the FBI in connection with a leak investigation into a Washington Post story revealing that the government had obtained a Foreign Intelligence Surveillance Act warrant to monitor Carter Page, a former foreign policy adviser to the Trump campaign.

Wolfe pleaded guilty in 2018 to lying to federal investigators about his contacts with reporters and was sentenced to two months in prison.

Also in 2018, Natalie Mayflower Sours Edwards, who was a senior adviser at the Treasurys Financial Crimes Enforcement Network, was charged with disclosing reports about financial transactions related to people under scrutiny in the Trump-Russia inquiry, including former Trump campaign chair Paul Manafort. She allegedly leaked the information to BuzzFeed News. In 2020, she pleaded guilty, and her sentencing is now scheduled for January 2021.

In 2019, John Fry, an IRS employee, was charged with leaking suspicious activity reports involving the financial transactions of Trumps former lawyer, Michael Cohen, including information about how a company owned by Cohen received $500,000 from a company with ties to a Russian oligarch. The Trump Justice Department recommended prison time for Fry, but in 2020, a federal judge instead gave Fry probation and ordered him to pay a $5,000 fine.

Other whistleblowers have also been caught up in Trumps crackdown, including FBI agent Terry Albury, who was arrested in 2018 and charged with leaking information about the systemic racial biases at the bureau, which were reported by The Intercept. And former intelligence analyst Daniel Hale was also arrested in 2019, charged with leaking information about the U.S. militarys use of drones to conduct targeted assassinations, also allegedly to The Intercept.

Former Minneapolis FBI agent Terry Albury, front, followed by his attorney, walks out of the federal courthouse in St. Paul after Albury was sentenced to four years in prison for leaking classified defense documents to a reporter on Oct. 18, 2018.

Photo: Shari L. Gross/Star Tribune/AP

While most of the public lobbying for pardons for whistleblowers has focused on Assange and Snowden, and to a lesser extent Winner, the other whistleblowers prosecuted by Trump have largely been forgotten.

For the most part, the small press freedom community has made the case for Assange and Snowden on the grounds of the First Amendment, press freedom, and government transparency. Yet the campaign to convince Trump to pardon Snowden and Assange has also attracted a strange group of extreme Trump supporters. They argue that pardoning the two men offers Trump the opportunity to stick it to the so-called deep state.

The deep state is, of course, the mythical beast at the heart of so many of Trumps conspiracy theories. Trump believes that a secret cabal of intelligence and national security officials has been trying to destroy him personally since at least the 2016 campaign.

It is important for press freedom advocates to steer clear of these deep state conspiracy theories and instead continue to argue for the pardons on the merits of press freedom. Indulging in Trumps fantasies in order to win the pardons will only taint the cause of press freedom in the future.

Its important for press freedom advocates to steer clear of deep state conspiracy theories and instead continue to argue for the pardons on the merits of press freedom.

As a journalist, I have spent much of my career covering, exposing, and criticizing the American national security establishment. Let there be no mistake: There is, in fact, a massive U.S. military-industrial complex, and a newer post-9/11 homeland security-industrial complex. Those two complexes overlap, comprising career military, intelligence, and federal law enforcement officials, executives at giant defense companies, and legions of smaller defense and intelligence contractors, as well as career political figures who take top positions in the defense and intelligence agencies when their party is in power, and become consultants or think-tank pundits when their party is out of power.

The military-industrial complex and the newer homeland security-industrial complex tend to support expansionist American national security and foreign policies, and since 9/11 have pushed for a continuation of American military involvement in the Middle East, particularly in Iraq and Afghanistan.

They are driven by greed and power, and they believe that endless war is good for business. As I wrote in Pay Any Price, my 2014 book, America has become accustomed to a permanent state of war. Only a small slice of society including many poor and rural teenagers fight and die, while a permanent national security elite rotates among senior government posts, contracting companies, think tanks and television commentary, opportunities that would disappear if America was suddenly at peace. To most of America, war has become not only tolerable but profitable, and so there is no longer any great incentive to end it.

Whats more, the national security establishments power stems in part from its ability to suppress the truth about its activities at home and abroad, and thus it seeks to punish whistleblowers and journalists who try to disclose the truth. The CIA, the NSA, and other elements of the national security apparatus frequently apply pressure on the Justice Department and the White House to prosecute whistleblowers who disclose their abuses.

I have had firsthand experience with this ugly phenomenon.

But acknowledging the gravitational pull of a militaristic national security establishment toward war and imperialism doesnt mean that you believe in the existence of a deep state, as imagined by Trump and his allies.

Demagogues like Trump are dangerously effective at taking bits of truth and weaving conspiracy theories out of them. Trump has taken the truth about the existence of a military-industrial complex and twisted it into a conspiracy theory that claims that the military-industrial complex is actually a deep state out to destroy him personally. It is conspiracy theory victimology taken to its most extreme.

Rudy Giuliani appears before the Michigan House Oversight Committee for suspicion of voter fraud in Lansing, Mich., on Dec. 2, 2020.

Photo: Jeff Kowalsky/AFP/Getty Images

Among Trumps ardent supporters, talk of a deep state often quickly descends into the madness of vile, rambling QAnon conspiracy theories.

Right-wing pundits and pro-Trump political figures, many of whom were longtime supporters of the governments draconian counterterrorism measures instituted after 9/11, including the NSAs illegal domestic spying program, suddenly became skeptics of the national security establishment when Trump began to complain about the investigation, conducted first by the FBI and later by special counsel Robert Mueller, into Russian meddling in the 2016 presidential election and possible collaboration by the Trump campaign. Trumps claims that he has been the victim of a witch hunt, a hoax investigation perpetrated against him by the deep state, have been the central theme of his conspiracy theory-laden presidency. And so ardent Trump supporters who accepted Trumps deep state conspiracy theories now view pardons for Assange and Snowden through the Russia hoax narrative.

Newsmax, the pro-Trump website, recently published a column calling for pardons for Assange and Snowden. If there is any way to thoroughly get back at the left over the next month, President Trump should make it a priority to pardon those individuals whose clemency would get the attention of the deep state, wrote Kenny Cody at Newsmax. For the deep state has worked against this president and his administration unlike any other previously. Marjorie Taylor Greene, a newly elected Republicanrepresentative from Georgia who has been criticized for being a QAnon supporter, also tweeted her support for pardons for Assange and Snowden.

A smattering of Assange supporters are echoing the line of these pro-Trump pundits and right-wing politicians.

For example, Assanges partner, Stella Morris, said on Fox News recently that she wants Trump to pardon Assange to protect him from the deep state. George Christensen, a member of Australias parliament, sent a message to Trump on a website devoted to a pardon for Assange, who is also an Australian.Christensen wrote, The same people who are trying to take the election from you are the ones trying to prosecute Julian Assange.

Rep.Tulsi Gabbard, a Hawaii Democrat and one-time Democratic presidential candidate, tweeted that Trump should pardon Snowden and Assange because they exposed the deception and criminality of those in the deep state.

What makes any endorsement of the deep state trope by advocates of Assange and Snowden particularly dangerous now is that it comes at the same time that Trump is employing his persecution fantasies to claim that the 2020 election was stolen from him by a pro-Biden deep state.

The danger of enabling Trumps deep state rhetoric was highlighted by a frightening story on Saturday, when the New York Times reported that Trump met on Friday with conspiracy theorist Sidney Powell and discussed making her some sort of special counsel to investigate baseless claims of voter fraud that Trump believes cost him the election. The same story revealed that Trump lawyer Rudy Giuliani has talked about trying to seize voting machines from around the country to try to prove the fiction that they were rigged against Trump.

As the pro-Trump supporters pushing for pardons for Assange and Snowden remain silent on so many of the other leak cases brought during the Trump administration, they have also said nothing to counter Trumps dangerous and hateful anti-press rhetoric, which has created a toxic climate for reporters working in the United States. Trumps constant attacks on the press have convinced his supporters as well as local, conservative politicians and law enforcement officials to intensify their rhetorical, legal, and physical attacks on journalists around the nation.

The U.S. Press Freedom Tracker, managed by the Freedom of the Press Foundation, shows that there have been 120 cases of a journalist arrested or detained on the job in the United States in 2020. The tracker found that during one week at the height of the racial justice protests in late May and early June, more reporters were arrested in the U.S. than in the previous three years combined. The tracker also found that more than a third of those journalists arrested were also beaten, hit with rubber bullets, or chemical agents.

The bottom line: Advocates of press freedom must remain disciplined as they campaign for the pardons for whistleblowers and make their arguments on the merits of press freedom. They must be careful not to indulge Trumps conspiracy theories while they lobby for the pardons.

Accepting Trumps insane conspiracy theories in order to get him to do the right thing has been the downfall of many prominent figures during Trumps presidency. Enabling Trumps worst instincts never works and only shreds the reputations of those who have sought to appease him.

Go here to see the original:

Snowden and Assange Deserve Pardons. So Do the Whistleblowers Trump Imprisoned. - The Intercept

Posted in NSA

All of the best Mac and iOS Christmas app deals – 9to5Toys

As is usual at this time of year, we are now tracking a massive collection of Christmas iOS app deals, alongside a selection of Mac price drops. Over the last week or so the App Store has been exploding with big-time discounts on just about all of the most popular titles available for your iPhone, iPad, Apple Watch, and Apple TV. With so many folks stuck indoors this year, scoring some Christmas iOS app deals might be a great way to keep everyone occupied and entertained over what will likely be a bit of an extended break for some. Head below for a gigantic roundup of all of the most notable Mac and iOS apps on sale for the holidays.

This years Christmas iOS app deals are once again focused on games, but you will also find some notable productivity and photography suites on tap down below as well. Also anchoring todays massive list, there are some of the best Mac App Store price drops we have tracked as well as a series of music production gear and much more. Dive in below:

iOS Universal:Altos Odyssey:$1(Reg. $5)

iOS Universal:Altos Adventure:$1(Reg. $5)

iOS Universal:This War of Mine:$2(Reg. $15)

iOS Universal:MudRunner Mobile:$4(Reg. $6)

iOS Universal:Beholder 2:$4(Reg. $8)

iOS Universal:Slayaway Camp:$1(Reg. $3)

iOS Universal:PAKO 2:$1(Reg. $2)

iOS Universal:Tengami:$1(Reg. $5)

iOS Universal:Earth Atlantis:$3(Reg. $5)

iOS Universal:Agent A: A puzzle in disguise:$1(Reg. $6)

iOS Universal:Hidden Folks:$2(Reg. $5)

iOS Universal:Beat Cop:$1(Reg. $5)

iOS Universal:Star Traders: Frontiers:$4(Reg. $7)

iOS Universal:The Escapists: Prison Escape:$1(Reg. $5)

iOS Universal:Escapists 2: Pocket Breakout:$2(Reg. $7)

iOS Universal:Star Wars Pinball 7:$1(Reg. $2)

iOS Universal:Baldurs Gate:$5(Reg. $10)

iOS Universal:Severed:$1(Reg. $7)

iOS Universal:Machinarium:$1(Reg. $3)

iOS Universal:CHUCHEL:$1(Reg. $3)

iOS Universal:Samorost 3:$1(Reg. $3)

iOS Universal:60 Seconds! Atomic Adventure:$1(Reg. $4)

iOS Universal:Super Crossfighter:$1(Reg. $3)

iOS Universal:Steam: Rails to Riches:$3(Reg. $5)

iOS Universal:Assassins Creed Identity:$1(Reg. $2+)

iOS Universal:FINAL FANTASY:$4(Reg. $8)

iOS Universal:FINAL FANTASY II:$4(Reg. $8)

iOS Universal:FINAL FANTASY III:$7(Reg. $15)

iOS Universal:FINAL FANTASY IV:$7(Reg. $15)

iOS Universal:FINAL FANTASY V:$7(Reg. $15)

iOS Universal:FINAL FANTASY VI:$7(Reg. $15)

iOS Universal:FINAL FANTASY TACTICS:$8(Reg. $16)

iOS Universal:FINAL FANTASY TACTICS :WotL:$7(Reg. $14)

iOS Universal:CHRONO TRIGGER (Upgrade Ver.):$5(Reg. $10)

iOS Universal:Secret of Mana:$4(Reg. $8)

iOS Universal:DRAGON QUEST:$2(Reg. $3)

iOS Universal:DRAGON QUEST II:$3(Reg. $5)

iOS Universal:DRAGON QUEST III:$7(Reg. $10)

iOS Universal:DRAGON QUEST IV:$10(Reg. $15)

iOS Universal:DRAGON QUEST VIII:$15(Reg. $20)

iOS Universal:Kingdom Two Crowns:$6(Reg. $10)

iOS Universal:Kingdom: New Lands:$3(Reg. $10)

iOS Universal:Lovecrafts Untold Stories:$2(Reg. $10)

iOS Universal:Rule with an Iron Fish:$2(Reg. $4)

iOS Universal:7 Billion Humans:$3(Reg. $5)

iOS Universal:Galaxy Trucker:$3(Reg. $5)

iPhone:Galaxy Trucker Pocket:$3(Reg. $5)

iOS Universal:Meteorfall: Krumits Tale:$5(Reg. $7)

iOS Universal:Bad North: Jotunn Edition:$3(Reg. $5)

iOS Universal:Pandemic: The Board Game:$2(Reg. $5)

iOS Universal:Ticket to Ride Train Game:$3(Reg. $7)

iOS Universal:Carcassonne Tiles & Tactics:$2(Reg. $5)

iOS Universal:Iron Marines:$1(Reg. $3)

iOS Universal:Kingdom Rush Vengeance:$3(Reg. $5)

iPhone:Kingdom Rush Origins:$1(Reg. $3)

iPad:Kingdom Rush Origins HD:$3(Reg. $5)

iPhone:Kingdom Rush Frontiers:$1(Reg. $2)

iPad:Kingdom Rush Frontiers HD:$1(Reg. $2)

iOS Universal:Terraforming Mars:$5(Reg. $9)

iOS Universal:Muse Dash:$1(Reg. $3)

iOS Universal:Inspire Pro:$10(Reg. $20)

iOS Universal:Cat Lady The Card Game:$1(Reg. $2)

iOS Universal:One Deck Dungeon:$3(Reg. $7)

iOS Universal:Mystic Vale:$3(Reg. $5)

iOS Universal:Kathy Rain:$2(Reg. $5)

iOS Universal:Sentinels of the Multiverse:$1(Reg. $7)

iOS Universal:PlantSnap Pro: Identify Plants:$15(Reg. $25)

iOS Universal:Swift Miles Mileage Tracker:FREE(Reg. $5)

iOS Universal:PhotoMapper: GPS EXIF Editor:FREE(Reg. $2)

iOS Universal:PDF Max Pro #1 PDF app!:FREE(Reg. $5)

iOS Universal:Plant Light Meter:FREE(Reg. $1)

iOS Universal:Depello color splash photos:FREE(Reg. $1)

iOS Universal:Awesome Calendar:$10(Reg. $20)

iOS Universal:ProShot:$1(Reg. $6)

iOS Universal:Pixel Weather Forecast:$3(Reg. $5)

iOS Universal:FineScanner PRO-PDF Scanner:$29(Reg. $60)

iOS Universal:ABBYY Business Card Reader Pro:$29(Reg. $60)

iOS Universal:Widget Calendar:$1(Reg. $2)

iOS Universal:GoCoEdit Code & Text Editor:$7(Reg. $9)

iOS Universal:Threema. The Secure Messenger:$1(Reg. $3)

iOS Universal:Money Pro: Personal Finance AR:$1(Reg. $5)

iOS Universal:KORG Gadget 2:$20(Reg. $40)

iOS Universal:KORG Module Pro:$20(Reg. $40)

iOS Universal:KORG iKaossilator:$10(Reg. $20)

iOS Universal:KORG iM1:$15(Reg. $30)

iOS Universal:ARP ODYSSEi:$15(Reg. $30)

iOS Universal:KORG iMS-20:$15(Reg. $30)

iOS Universal:KORG ELECTRIBE Wave:$15(Reg. $30)

iOS Universal:Agonizer:$10(Reg. $20)

iOS Universal:VOLT Synth:$10(Reg. $20)

iOS Universal:Cubasis 2:$16(Reg. $24)

iOS Universal:Cubasis 3:$34(Reg. $50)

iOS Universal:WaveStorm:$3(Reg. $8)

iOS Universal:GeoShred:$15(Reg. $25)

Mac:Money Pro: Personal Finance:$3(Reg. $15)

Mac:Earth 3D:$1(Reg. $3)

Mac:Kingdom Rush HD:$7(Reg. $10)

Mac:Samorost_2:$2(Reg. $5)

See the original post:

All of the best Mac and iOS Christmas app deals - 9to5Toys

The rise and fall of Netflix – Spectator.co.uk

In 2010, Jeff Bewkes, then CEO of Time Warner, was asked if he thought Netflix had any chance of taking over Hollywood. His sarcastic answer deserves to go down as one of the all-time dumb predictions. Bewkes (like the dude who wrote the internal Western Union memo that said telephones were a waste of time) was not taking Netflix seriously: Is the Albanian army going to take over the world?

A decade later, Netflix is not Albania. Its imperial Spain during el Siglo de Oro. Massive, relentlessly mercantile and ruthlessly acquisitive, Netflix has rippled over the world to become one of the largest media businesses ever known. Count the hundreds of millions of subscribers, or the billion-dollar content deals. The old Hollywood system, the studios, the cinema chains an entire infrastructure of production has been torched and replaced by Netflixs subscription-based streaming model. Its major competitors are all imitators: Hulu, Disney+, Apple TV, HBO Max and Amazon Prime Video.

The extinction of old forms, Darwin wrote in 1859, is the almost inevitable consequence of the production of new forms. The old moguls were outflanked, outfought, outbought. Now theyre on their way out or being assimilated by Netflix entirely. The earliest premonitions of streaming date back to the 1920s, but streaming video from a seemingly endless library content was a new form. In the public mind that form belonged to Netflix. The public wallet opened. The binge-watch was born.

Thanks to whoever ate that pangolin in Wuhan in 2019, 2020 seems to be the year that cemented Netflixs triumph. The pandemic saw 15 million new subscribers, and Netflixs stock soared. Mass unemployment and all the other horsemen of the apocalypse were galloping out of the paddock. Huddled anxiously indoors, the masses streamed Sex Education. Europeans binge-watched so ferociously in March that the continents internet threatened to collapse. Our pandemic nightmare was a dream come true for Netflix founder Reed Hastings. Perhaps only Xi Jinping had a better Covid-19.

Until August. Late that month, Netflixs promotional team tweeted out a teaser for a trs French film called Cuties, which is a fair translation of its French title, Mignonnes. Amy is a Senegalese immigrant, living in a crumbling Parisian project with her mother (a devout Muslim) and two brothers. She is bored, lonely and waiting with the rest of her family for her father to arrive from Senegal. She befriends her boisterous, modern neighbour Angelica and slowly, dance step by dance step, becomes a part of Angelicas hip-hop crew, the Cuties. Amys mother is appalled; Amy feels liberated as she twerks with her new pals on stage at a dance competition.

The director, Mamouna Doucour, doesnt flinch and the girls are 11-year-olds. The original French poster showed them, wide-shot, walking down a cobble-stone street carrying bags of clothes. Netflix made a new poster which showed the girls in tight, glittery outfits. Its often been said in the past four years that while Donald Trump may not be a white supremacist per se, there was no white supremacist who didnt vote for him. Well, Mamouna Doucours film was not made for paedophiles, but its execution was so atrocious that there probably wasnt a paedophile in the world who didnt enjoy it. After it was far too late, after even 4chan an online message board not known for decorum or refined taste had banned sharing images from Cuties, Netflix withdrew the promotional materials. They apologised, then released the film anyway.

Ours is an era seething with underground, folkloric rumblings about sexual misdemeanours. Pizzagate, QAnon, Epstein didnt kill himself, #MeToo, Michael Jackson. These theories spread the idea that powerful forces in society are cleaning up after elite paedophile rings. Releasing a high-minded but crudely realised film that sexualises 11-year-olds would have been inadvisable at any time. It was particularly idiotic in the current environment. Heavy criticism of Cuties turned into fury and an indictment before a Texas grand jury.

Netflixs CEO, Ted Sarandos, not understanding that hatred of Cuties might also reflect hatred of Epstein and an entertainment-industrial complex addicted to sexual imagery, defended the film. This was about censorship, Sarandos said in October. This was a conversation about censorship in America, in the year 2020, said Sarandos, as if he were shielding Salman Rushdie from a fatwa, rather than defending sordid depictions of minors. The film was uniquely misunderstood in the United States, he reckoned. His gist was: I am a global CEO. Netflix is a global company. The red-state hicks dont understand art. He and his enterprise have long ago seceded from parochial concerns like not making films about twerking children. The message was clear: when youre running an empire, there are always going to be bust-ups with the natives.

The sheer scale and reach of Netflix 182 million subscribers in 190 countries meant its choices were bound to take on political significance. What was odd about the Cuties affair was how reluctant the company was to back down. When the government of Singapore demanded the removal of Martin Scorseses The Last Temptation of Christ (1988) from the platform last year, it rolled over like a kitten looking for a belly rub. When the Saudi government asked Netflix to withdraw an episode of Patriot Act with Hasan Minhaj that covered Jamal Khashoggis murder, Netflix complied once again. It looked like one rule for the complaints of quasi-dictatorships, another for the complaints of Americans. Reed Hastingss answer to all this was even less satisfactory than Sarandoss defense of Cuties. Were not in the news business, he told the New York Times. Were trying to entertain.

There was another possibility: Netflix was an entertainment business that manufactured information on the side just like the New York Times, really. By the late 2010s there was no demilitarised border separating news from entertainment. What else could explain Netflixs huge selection of socio-political documentaries? There was Get Me Roger Stone (2017) and RBG (2018), Knock Down the House (2019) and The Great Hack (2019) and many more to come, with Barack Obama and Meghan Markle on board.

Though the subject matter of each film differed, the values that suffused them clipped from the op-ed pages of any centre-left newspaper in the western world were identical. Here was the hyperliberal reaction of the Trump era, a splenetic mixture of fear and sentimentality. Fear of Russians, Republicans and sinister algorithms. Sentimentality about how minority identity groups were all good liberals, and only the frail shell of Ruth Bader Ginsburg protected America from anew dark age.

Was this entertainment, or was it masochism? If you want to understand the spectacular implosion of liberalism over the past five years how it became twitchily paranoid, how it abandoned scepticism and tolerance, how it embraced irrationality and identity politics all you need is a Netflix subscription and the heroic fortitude required to sit through these movies.

This worldview has deep roots within the company. Eleven years ago, a document appeared online called The Netflix Culture Doc. This was Netflixs corporate doctrine, conceived in 124 slides by Reed Hastings and his then-HR chief Patty McCord. In Silicon Valley these 124 slides have the same historic significance as the 95 theses Luther nailed to that church door in Wittenberg in 1517. Sheryl Sandberg called it the most important document ever to come out of the Valley.

What does it say? The slideshow calls for radical freedom and responsibility among employees. Rules have names like High Talent Density and Maxing Up Candor. The latter gets rid of normal polite human protocols, replacing them with a daily Circle of Feedback and Live 360 Assessments, struggle sessions in which employees meet with their colleagues to have their work ripped to shreds.

If Ayn Rand and Chairman Mao had a baby, and that baby grew up to become an HR manager, it would write something like The Netflix Culture Doc. What are the results? A brutally competitive office culture, firings and breakdowns galore, and a workplace once described as reminiscent of North Korea. There is a direct line between the paranoia of Netflixs factual programming and the Youve got to earn it every year environment in which Netflixs professionals work.

Even as they arduously trudge through this libertarian jungle, the Netflix class has to maintain the fiction that theyre nice cuddly libs. In 2016 employees sent 98 per cent of their donations to Democrats. This rose to 99.6 per cent for the 2018 midterm elections. There was more than a whiff of misplaced guilt about all this. The biggest individual collectors of Netflix cash in 2020 were Bernie Sanders and Elizabeth Warren, while Reed Hastings made his largest donations to Pete Buttigieg and Joe Biden.

Even by Valley standards, Netflix was an outlier in terms of the one-sidedness of its politics. The Democrats reciprocated, as they did for giant Wall Street firms and other enormous technology companies, by offering Netflix a reputation-laundering service, a way to cloak its dubious labour practices in an ostensibly compassionate politics. Netflix hired the biggest, starriest creators it could get to perform the same function. Could Netflix really be such a bad place if Barack Obama was on board, producing mind-bendingly dull documentaries about his own wife with the company? Was the Circle of Feedback actually a good thing if Meghan Markle and Prince Harry had chosen Netflix as a home over Windsor Castle?

Signing up the Sussexes may end up marking the apogee of the Netflix empire. The Albanian army had taken Hollywood, and now it was kidnapping members of the British royal family. The only problem for Netflix was that it had no idea what to do with its power. Its narrowly cosmopolitan politics had been bleeding into its programming for a long time. Its content was centred on social messaging racial justice, gender equity, environmental stewardship that appealed to imaginary do-gooders, not real audiences.

It was telling that the most-watched shows on Netflix Friends and The Office were not original content and had been produced in the less politically charged era before Trump. Both shows would soon move to rival streaming services. After the Cuties fiasco, Netflix saw a pyrotechnic 800 per cent spike in canceled subscriptions. Four top executives have left the company since September. Disney+, a rival only a year into its existence, now has 60 million subscribers. Netflix now has so many competitors and there is so much content available that the entire streaming model begins to look like yet another online media bubble.

Perhaps Netflixs advanced politics will protect them from the storm to come? Five days before the election, whoever ran Joe Bidens Twitter account criticised Netflix for paying less in federal income taxes than the average American. It was another bad sign in a year that ought to have been a triumph.

This article was originally published in The Spectators December 2020 US edition.

Read this article:

The rise and fall of Netflix - Spectator.co.uk

Soul Review: Life, and How to Live It – Rolling Stone

What is soul? Is it that feeling you get when you tap into the flow between emotion and expression, the spiritual and the physical? Is it something personal percolating within you, waiting to be unleashed? Is it the essence of humanity in a nutshell? Defining the concept is like aiming at a constantly skittering target. You sense it when you sense it. I know youve got soul.

No questions necessary, however, when it comes to understanding what Soul is all you need to hear is the phrase the new movie from Pixar. (Or for that matter, where you can see it: on Disney+, starting Christmas Day.) Its an animated movie, located right at the crossroads of absurdity and profundity, and likely to tickle funny bones as well as lubricate tear ducts. It will feature celebrity voices, be filled with both pop-culture parodies and high-art references, and present a depth and sophistication far above the usual family-friendly fare. A certain amount of quality is a given. (Unless it involves nothing but anthropomorphic cars. Then all bets are off.) And while Pete Docters follow-up to Inside Out is nowhere near that particular Pixar highpoints resonance and ingenuity, it does make for an odd fraternal twin to his 2015 teen-angst magnum opus. Whereas that candy-colored trip through an adolescent girls cerebral cortex concentrated on the brain, Soul naturally focuses on pinpointing the anima. And that existential query posed up top is one of many deep thoughts that are very much on the movies mind. Why are we here? Whats your spark? What makes your life worth living?

For Joe Gardner (voiced by Jamie Foxx), the answer is: music. Ever since his dad took him downtown to see a performance at the Half Note when he was a boy, all hes ever wanted to do is to become the next Duke Ellington. Except the now middle-aged Average Joe is stuck teaching standards to mostly disinterested middle-school kids. (The name of the composition his band class is currently butchering: Things Aint What They Used to Be.) He has the chance to turn this part-time gig into his full-time job, which means stability, a steady paycheck and a dream of a Monk-ish life permanently deferred. Then a call from an old pupil, a drummer (Questlove, because of course!), presents an opportunity. The pianist for the legendary Dorothea Williams Quartet has dropped out at the last second. Would Joe wanna throw his fedora in the ring to replace him?

Joe passes both the muster of the skeptical, take-no-shit bandleader (Angela Bassett) and the audition. Hes so ecstatic about his big break that hes oblivious to the open manhole he falls in, which is where Soul s narrative proper sputters to life. Or rather, into the void: a cosmic conveyor belt carries a small, blobbish figure with glasses and a porkpie-shaped noggin I Am Joes Lifeforce toward the Great Beyond. He isnt ready to go into the light, jumps off the heavenly treadmill and soon finds himself in the Great Before. Imagine if Fischer-Price designed a pastel purgatory. This is where souls-to-be reside before they fly down to earth, lorded over by walking, talking one-dimensional Picasso sketches all named Jerry. According to those Cubist bureaucrats, the little blue soul-toddlers need mentorship first. They need likes, dislikes, passions, characteristics. They must form a nature-not-nurture personality (Im an agreeable skeptic whos cautious yet flamboyant!) before they can enter their corporeal phase. Our fugitive from death hatches an escape plan: steal an identity, help a newbie, swipe their earth pass and get back to his body before the gig. Easy-peasy, until No. 22 enter the picture.

Thats the Little Soul Who Wouldnt, a tenacious pain of a shmoo whos stymied the efforts of past mentors such as Abraham Lincoln and Copernicus, once made Mother Theresa cry and, as voiced by Tina Fey, No. 22 is blessed with a maximum girlboss puckishness that singlehandedly sells the character. No. 22 doesnt want to discover her purpose for existing. She does not even want to be alive. Joe has to inspire her or perish before he can show the world hes more than the guy he sees in this limbos flashback-accomplishments hallway, i.e. someone who seems to be killing time while waiting for an already-in-progress life to start.

Without venturing too deep into spoiler territory, its safe to say they do both end up together on the third rock from the sun, just not how they imagined. Fans of a certain strain of popular 80s comedies (notably one featuring a famous stand-up, a pioneer of one-woman shows and a magic bowl) are likely to find themselves in pleasantly familiar territory. The fact that Soul features an African-American lead, was cowritten and codirected by the playwright Kemp Powers (One Night in Miami) and weaves in aspects of middle-class African-American culture while treating race as a matter of fact rather than a back-patting novelty, a look-ma-Im-woke box to be ticked or Hollywoodized exotica feels quietly revolutionary. So does the rainbow coalition of supporting voices here, which includes Sonia Braga, Rachel House, Wes Studi and Richard Aayode. Youre constantly reminded that no one in the animation game can marshal a mix-and-match of creative talent and a Stradivarius-maestro level of heartstring plucking with such accessibility and verve.

Which is why Soul soars above its two-dimensional toon peers, even if sort of pales in comparison to Pixars previous milestones. It doesnt have the eye-popping wow of Coco (2017), another netherworld jaunt that turned a Dia de los Muertos visual palette into something both culturally specific and universal. There are a number of moments, however, where you can feel the animators imagination kick into fourth gear, notably via a psychedelic galleon used by Mystics Without Borders and the be-bop aurora borealis that appears when Joe is lost in his own playing, courtesy of Jon Batistes vigorous jazz compositions. The rubber-limbed human characters, who come in caricaturish shapes ranging from pear to stringbean, get more of a chance to strut and fret (and wobble and flop and shudder and leap) upon the stage once things switch from Great Before to terra firma, and its the slice of life stuff that works even better than the admittedly deft slapstick bits. For that matter, a sequence in a barbershop and a brief heart to heart in the tailor shop Joes mom (Phylicia Rashad) do more heavy emotional lifting than the more obvious tearjerking climax(es) as the clock ticks down. Per most Pixar joints, a box of Kleenex is a must-have accessory, though New Yorkers may find themselves welling up more at the sight of our photorealistic city rendered in all its autumnal late-afternoon glory, and still forever blessed with jazz clubs, used bookstores and bustling street life, more than anything else.

Still, theres a tendency for its story of midlife crises and posthumous second chances to tonally devolve into a self-help guide a Zen and the Art of Emotional-Cycle Maintenance 101 primer that gets a little touchy-feely about following your bliss by the end. (Though is it preferable to, say, going full Ayn Rand a la The Incredibles? Yes.) For all of the ways Pixar has helped evolve kids-movie parables as a genre and animation as an art form, its still prone to a pop-psychology default mode that can border on platitude pimping an accusation that wont necessarily be discounted after dinging Joe for not fulfilling his potential, or seeing the forest for the trees, or acknowledging that the mere notion of a forest full of trees is a joyous miracle unto itself.

There are many elaborate lessons on life and how to live it in Soul, though its best may ironically be its simplest: Look. Listen. Learn. Enjoy. You may not turn the film off with an answer to what a soul is. But you may find yourself wondering if youre forgetting to occasionally connect with your own.

Visit link:

Soul Review: Life, and How to Live It - Rolling Stone

Wonder Woman 1984: Who plays the ‘other’ Steve Trevor? – Looper

Outside of television series, Polaha has appeared in a number of films both on the big screen and on his tried-and-true small screen.

His first feature film role came in 2008, when he playeda youngCharles Templeton, a formerChristian evangelist, in the biopicBilly: The Early Years. The film tells the story of well-known Christian evangelist Billy Graham (played by Armie Hammer) as seen from the perspective of Templeton, who became an agonistic after experiencing doubts with religion and who subsequently lost his friendship with Graham.Five years later, Polaha starred in another biopic: 2013'sDevil's Knot, a harrowing depiction of the story of three teenagers (dubbed the West Memphis Three) who murdered three children during the Satanic Panic of the 1980s. Alongside Reese Witherspoon as Pamela Hobbs, a mother of one of the murdered boys, and Colin Firth as private investigatorRon Lax, Polaha playedVal Price, the public defender assigned to murder suspectDamien Echols.

In 2014, Polaha starred inAtlas Shrugged Part III: Who Is John Galt?, the third film in theAtlas Shrugged film series. He portrayed the titular John Galt, a philosopher, inventor, and engineer who's a major force in Ayn Rand's novelAtlas Shrugged, upon which the film franchise is based. That same year found Polaha playingLen Brenneman in the comedy flickBack in the Day, and in 2015, he tugged on heartstrings as Calvin Campbell in the drama filmWhere Hope Grows.

Polaha's other film credits include projects likeVineland, Frontman, Bachelor Lions,Beneath the Leaves, andRun the Race, but since 2016, the actor has largely focused on starring in Hallmark movies. He's beenMatt Crawford in 2016'sHearts of Christmas, Graham Mitchell in 2017'sRocky Mountain Christmas,Emmett Turner in 2018'sA Small Town Christmas, andChris in 2019's Double Holiday. Polaha got the best of both worlds when landing the role of police detective Travis Burke in a multi-partHallmark Movies & Mysteries project consisting ofMystery 101,Mystery 101: Playing Dead, Mystery 101: Words Can Kill, Mystery 101: Dead Talk,andMystery 101: An Education in Murder, which aired in March 2020.

Perhaps the most exciting Hallmark movie Polaha has starred in is 2016'sDater's Handbook, led by Meghan Markle, the actress-turned-royal who became the Ducchess of Sussex upon marryingPrince Harry, Duke of Sussex, in 2018.

Continued here:

Wonder Woman 1984: Who plays the 'other' Steve Trevor? - Looper

Study of More Than 1,400 Protein-Coding Genes Resolves Long Standing Mystery in the Evolution of Insects – SciTechDaily

A study of more than 1,400 protein-coding genes of fleas has resolved one of the longest standing mysteries in the evolution of insects, reordering their placement in the tree of life and pinpointing who their closest relatives are.

The University of Bristol study, published in the journal Palaeoentomology, drew on the largest insect molecular dataset available. The dataset was analyzed using new statistical methods, including more sophisticated algorithms, to test all historically proposed hypotheses about the placement of fleas on the insect tree of life and search for new potential relationships.

The findings overturn previously held theories about fleas, the unusual anatomy of which has meant that they eluded classification in evolutionary terms. According to the authors of the study, contrary to popular belief, fleas are technically scorpionflies, which evolved when they started feeding on the blood of vertebrates sometime between the Permian and Jurassic, between 290 and 165 million years ago.

The closest living relatives of fleas are the members of the scorpionfly family Nannochoristidae, a rare group with only seven species native to the southern hemisphere. Unlike the blood-thirsty fleas, adult nannochoristid scorpionflies lead a peaceful existence feeding on nectar.

Of all the parasites in the animal kingdom, fleas hold a pre-eminent position. The Black Death, caused by a flea-transmitted bacterium, was the deadliest pandemic in the recorded history of mankind; it claimed the lives of possibly up to 200 million people in the 14th century, says lead author and undergraduate student Erik Tihelka from the School of Earth Sciences.

Genomic study of fleas finds them to be related to scorpionflies.

Yet despite their medical significance, the placement of fleas on the tree of life represents one of the most persistent enigmas in the evolution of insects.

It used to be thought that all blood-feeding parasitic insects began life as either predators or by living alongside vertebrate hosts in their nests. In actual fact, blood feeding can evolve in groups that originally fed on nectar and other plant secretions.

It seems that the elongate mouthparts that are specialized for nectar feeding from flowers can become co-opted during the course evolution to enable sucking blood, says Mattia Giacomelli, a PhD student at the University of Bristol who participated in the study.

Previous studies had suggested a connection between fleas and anatomically unusual groups of scorpionflies, but their exact relationships remained unresolved. The mystery was prolonged by the fact that flea genomes underwent rapid evolution, which makes reconstructing ancient evolutionary relationships challenging. Moreover, the nannochoristids are a quite rare and little-studied group that only occurs in New Zealand, southeastern Australia, Tasmania, and Chile, so they are easy to overlook.

The new results suggest that we may need to revise our entomology textbooks. Fleas no longer deserve the status of a separate insect order, but should actually be classified within the scorpionflies, says Chenyang Cai, associate professor at the Nanjing Institute of Geology and Palaeontology (NIGP) and a research fellow at the University of Bristol specializing on Mesozoic insects.

We have exceptionally preserved fossil fleas from the Jurassic and Cretaceous. In particular, some Jurassic fleas from China, about 165 million years old, are truly giant and measure up to two centimeters. They may have fed on dinosaurs, but that is exceedingly difficult to tell. What is more interesting is that these ancient fleas share important characters with modern scorpionflies.

Reference: Fleas are parasitic scorpionflies by Erik Tihelka, Mattia Giacomelli, Di-Ying Huang, Davide Pisani, Philip C. J. Donoghue and Chen-Yang Cai, December 2020, Palaeoentomology.DOI: 10.11646/palaeoentomology.3.6.16

Original post:

Study of More Than 1,400 Protein-Coding Genes Resolves Long Standing Mystery in the Evolution of Insects - SciTechDaily

Big Data Analytics, AI, and Collaborative Combat Driving the Evolution of Land-based EO/IR CONOPS, 20192029 – GlobeNewswire

New York, Dec. 28, 2020 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Big Data Analytics, AI, and Collaborative Combat Driving the Evolution of Land-based EO/IR CONOPS, 20192029" - https://www.reportlinker.com/p06000045/?utm_source=GNW This study identifies emerging trends that will have an impact on the EO/IR industry and highlights areas of opportunities in the land segments and also the technology adoption that will potentially add value in terms of helping the security objectives.

All security industry participants and other industry verticals will benefit from this research as this is a growth insight study investigating potential impact that future technologies will have on the market and how it will evolve during the forecast period. Technology companies who are looking at new avenues to add capabilities to their portfolio will also benefit from this study.What makes our reports unique? We provide diverse research services focused on existing and evolving markets across the aerospace, defense, and security (ADS) markets, covering them at global and regional levels. We provide specialist studies focused on specific product or market segments which provide a deep-dive opportunity for strategists and investors who wish to learn about the future state of any ADS market or product in terms of addressable markets, opportunities, and future disruptions.Read the full report: https://www.reportlinker.com/p06000045/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

See the original post:

Big Data Analytics, AI, and Collaborative Combat Driving the Evolution of Land-based EO/IR CONOPS, 20192029 - GlobeNewswire

A 350,000-year-old turning point in human evolution found in Israel – Haaretz.com

A turning point in human evolution has been identified through reanalysis of a single stone tool found in Tabun Cave in northern Israel, from about 350,000 years ago. It had been used not to bash animals or butcher their carcasses but to abrade soft material, possibly animal hides, much earlier in human evolution than had been thought, say Ron Shimelmitz, Iris Groman-Yaroslavski, Mina Weinstein-Evron and Danny Rosenberg from the Zinman Institute of Archaeology at the University of Haifa.

Grinding and abrading (scraping) had only been thought to have developed much later, Shimelmitz explains to Haaretz. The entire engagement in this technology is much later, around 200,000 years ago, he says.

How Bibi pushed a 4th election and 3rd lockdown, and how we exposed his secret flights. LISTEN

>>Never miss an archaeology story. Sign up for free to our weekly newsletter

Yes, based on one tool, this discovery, reported in the Journal of Human Evolution, changes our thinking about part of our deep technological evolution.

Abrading stones abound in Africa and Europe starting about 200,000 years ago, from which point there was more frequent evidence of that technology, explains Shimelmitz, an expert in the evolution of technology. But it is also true that given that assumption, archaeologists hadnt necessarily been looking for such artifacts at earlier sites for one thing, theyre very hard to identify. You need to look for them, he adds.

You can fairly easily identify a knapped stone, especially the likes of arrowheads or spear points and especially when theyre made of flint a stone widely preferred because its so hard. They look quite unnatural. It is, conversely, not trivial to identify an abrading or grinding stone, which looks like a stone.

However, the authors point out that this particular piece of dolomite stood out among the tens of thousands of knapped stone tools found in Tabun Cave, located on the Mount Carmel range south of Haifa, from various periods of occupation. And they concluded that it wasnt just any chalky rock, but a tool, through microscopic use-wear analysis, including examination of the patterns on the cobbles surface, which were compared with known naturally weathered surfaces.

The importance of this technology [abradement] hadnt been on the table regarding the ancient world, Shimelmitz says. And why was the invention of abrading a crucial turning point? Because thats the way of humankind, he explains. To shape materials and our environment, to improve our adaptation to situations. The tools are external to our bodies and enable us to do things we couldnt do without them. Abradement is another significant technology within our possibility to adapt the environment. It appeared relatively late in human evolution; we thought very late; and now we show that its roots are deeper. We need to open our eyes wider.

Asked why, actually, abrading was so significant to our evolution, he brings the example of hides. You cant just skin an animal and comfortably wear its pelt. It is better to scrape off the fat and muscle remains, and soften the hide by abrading a precursor to proper tanning than to strut around garbed in decaying aurochs.

Does this mean the abrasion-stone of Tabun indicates there was a Middle Stone Age fashion? Not necessarily. The use-wear experiments conducted on the ground-breaking stone indicate that it was used on soft material (as opposed to bone, for instance), but not which soft material. It could have been hides used for clothing, or might not have been.

Great leaps forward

Usage of stone tools goes back at least 3.3 million years, well before modern humans were even a gleam in the eye of evolution. The first tools were large, crude hammers. Over the ages, as hominins gained sophistication, tool manufacture and use became more finely developed.

But throughout the period loosely known as the Early Stone Age, usage was confined to vertical motions: striking, battering and pounding, and then using knapped stones as knives as the researchers put it, applying a thin or narrow working edge of the stone tool.

In any case abradement, now known to have begun at least 350,000 years ago, is a precursor to a game-changer in human behavior and evolution: grinding grain.

Grinding grain comes much later, nearer the modern time and not the prehistoric time, Shimelmitz qualifies. Thats the end of the process. But this was a significant addition to the human tool chest. We note that mortars used possibly to grind grain have been found in Neolithic sites in Israel, from over 10,000 years ago.

The discovery of abrading in the Middle Pleistocene, which requires applying a wide working surface of the tool by means of sequential horizontal motions to modify or reduce the target surfaces of a materia,l rather than banging or stabbing at it, fits in with the bigger figure of huge strides among early hominin abilities to harness technology to shape their environment, the team explains.

Asked to elaborate, Shimelmitz points to two key behaviors that developed during that span one being a leap forward in the use of fire.

It remains an open question when fire was tamed in the sense that archaic humans could help themselves to a burning bush in order to roast their dinner and when our ancestors achieved control of fire, meaning they could ignite it at will. At sites dating to the Middle Pleistocene there is a giant step up in the discovery of purposely burned stuff, he say. One of those sites, by the way, is Tabun itself.

Another marked change in behavior is that during the Middle Pleistocene, hominins seem to have developed the concept of base camps, meaning a place they were leaving and coming back to every day (where they could curl up by their fire). Base camp and fire became a way of life during the Middle Stone Age, Shimelmitz says.

Asked if the upswing in intensity of occupation doesnt mean home, Shimelmitz agrees that one could see it that way. And this intensification also speaks to socialization and group structure. There is a reason early humans would return to their base camp every day. This was a period of intense change in the behavior of humankind, he sums up.

Israel has apparently been on the migration route for the human species for almost two million years. While solid evidence of hominin migration that far back is sparse, it has been demonstrated that the environmental conditions in the key region of the Negev desert were hospitable at the time, and hominin remains going back hundreds of thousands of years, as well as modern human remains, abound in this area. It begs qualifying that the study by Shimelmitz and his colleagues reevaluated previous discoveries at Tabun Cave, which had been used by hominins for hundreds of thousands of years, as of the early Stone Age. The cave was first explored by the famed British archaeologist Dorothy Garrod in the 1930s.

>>Never miss an archaeology story. Sign up for free to our weekly newsletter

At the end of the day, this is less a story about one rock found around 150,000 years earlier than had been expected, and more a story about what the artifact represents how deep abrading behavior, a totally different form of tool use, goes back in time.

Excerpt from:

A 350,000-year-old turning point in human evolution found in Israel - Haaretz.com

#5 Story of 2020: Coronavirus, Intelligent Design, and Evolution – Discovery Institute

Photo credit: Airman 1st Class Alexis Christian, via Peterson Air Force Base.

Editors note: Welcome to anEvolution Newstradition: a countdown of our Top 10 favorite stories of the past year, concluding on New Years Day. Our staff are enjoying the holidays, as we hope that you are, too!Help keep the daily voice of intelligent design going strong. Please give whatever you can to support the Center for Science & Culture before the end of the year!

The following wasoriginallypublished on March 30,2020.

Many people have been wondering about the relevance of intelligent design (ID) or evolution to the new coronavirus reported in Wuhan, China, in December 2019. What follows is my view as a molecular biologist.

The new virus goes by several names. It was initially called2019-nCoVby the World Health Organization (with n standing for new). Since its RNA sequence is similar to that of the coronavirus that causedSevere Acute Respiratory Syndrome(SARS) in 2003, the International Committee on Taxonomy of Viruses renamed itSARS-CoV-2in March 2020. The disease caused by the virus has been calledCOVID-19(with d standing for disease).

There are other coronaviruses (includingMERS-CoV, the virus that caused the 2012 epidemic of Middle East Respiratory Syndrome). To avoid confusion, I will refer to the latest coronavirus by its technical name, SARS-CoV-2.

Some people have maintained that SARS-CoV-2 is a product of human design. According to a FebruaryNew York Postarticle, it may have escaped from a microbiology laboratory at the Wuhan Institute of Virology. But I have seen no scientific evidence to support this claim.

On March 17, 2020, an analysis of RNA from several different coronaviruses was published inNature Medicine. The authors concluded, Our analyses clearly show that SARS-CoV-2 is not a laboratory construct or a purposefully manipulated virus.

Jonathan Bartlett, who has studied the logic ofdesign inferencesin depth, subsequently argued that the scientists had ruled out only one design hypothesis, so design was still theoretically possible. But Bartlett did not maintain that SARS-CoV-2 is a product of human design.

Could SARS-CoV-2 have evolved from another coronavirus by mutation and natural selection? I dont see why not, though there is only indirect evidence (from RNA sequences) to support the idea. If it had happened, however, it would not provide support forDarwinianevolution.

First, viruses are not living organisms: They are just pieces of DNA or RNA enclosed in a protein coat. They do not carry out metabolism (the chemical processes that are essential for life), and they do not reproduce themselves (only living cells or skilled genetic engineers can make copies of them). Second, even if viruses were considered living things, the evolution of SARS-CoV-2 from another coronavirus would be akin to microevolution minor changes within existing biological species. (Species are not even defined the same way in viruses as they are in living organisms.)

But Darwin did not write a book titledHow Existing Species Change Over Time. He wrote a book titledThe Origin of Species. In other words, Darwin attempted to explain macroevolution the origin of new species, organs, and body plans.

What, then, is the relevance of ID or evolution to SARS-CoV-2? As we have seen, their relevance to the origin of the coronavirus is unclear. But what about their relevance to combating the disease, COVID-19? According to DarwinistTheodosius Dobzhansky(who distinguished between microevolution and macroevolution in the 1930s), nothing in biology makes sense except in the light of evolution. In 2003, Texas Tech University professorMichael Diniwrote:

The central, unifying principle of biology is the theory of evolution. How can someone who does not accept the most important theory in biology expect to properly practice in a field [medicine] that is so heavily based on biology?

Yet the measures being taken against the SARS-CoV-2 pandemic owe nothing to evolutionary theory. The use ofquarantineto block the spread of disease began in the fourteenth century. In the 1790s,Edward Jennervaccinated people to protect them from smallpox. In 1847, Hungarian obstetricianIgnc Semmelweisdemonstrated that proper hand washing lowers mortality from infectious disease. Theadministration of oxygento patients with labored breathing was first reported in the years just following the publication ofThe Origin of Species, but the practice was based on physiological and clinical considerations, not evolution. And if any treatments are found to cure COVID-19 or lessen its effects, they will come from the intelligently designed efforts of virologists, biochemists, and clinicians not evolutionary biologists.

Editors note: This article was updated on April 5, 2020.

Excerpt from:

#5 Story of 2020: Coronavirus, Intelligent Design, and Evolution - Discovery Institute

Research Reveals Origins of River, Evolution of Ancient Landscape – Davidson News

The question facing Johnson, chair and associate professor of Environmental Studies, was simple: Why is the Gorge so deep? What makes it so different than other rivers in the area?

While he stared at the maps, Olivia Stanley, an environmental studies major and 2020 graduate, came to him with findings from a research project. Her work transformed how Johnson saw his research.

I had spent the better part of my last two years at Davidson researching the Gorge, Stanley said. In the summer of 2019, with a grant from the Davidson Research Initiative, I walked miles and miles of riverside trails, taking field notes and turning them into a digital mapping of the Linville River and Gorge.

That map showed that the Linville River starts much farther up in the Blue Ridge than other streams around it, Johnson said. It looked just like stream profiles in Virginia that we had looked at in class the day before.

That paper focused on stream capturethe geological phenomenon when water from one stream is diverted into another, steeper stream. The similarity between the captured streams in Virginia and the Linville River seemed to indicate that stream capture might help to explain the unique nature of Linville Gorge.

At its most simple, it is really a question of which way a river flows, Johnson said. Rivers on top of the Blue Ridge Escarpmentthe steep section of terrain that leads into the mountainstend to be slow, meandering rivers that eventually drain toward the Gulf of Mexico. Meanwhile, streams on the face of the Blue Ridge Escarpment are much steeper and drain toward the Atlantic. This creates a situation where the steeper streams that drain east can steal flow from the lazier streams on top.

The rest is here:

Research Reveals Origins of River, Evolution of Ancient Landscape - Davidson News

New book explores Wesleyan and evolution of High Street in Middletown – Middletown Press

MIDDLETOWN A new Images of America book about the history of Wesleyan University and the street it dominates was a meticulously researched labor of love for its coauthors, they said.

Middletown municipal historian Deborah Shapiro and Portland architect Alain Munkittrick, a 1973 graduate of Wesleyan, teamed up on Middletowns High Street & Wesleyan University, a 12-month-long intensive project published in this year.

Shapiro, retired 10-year executive director of the Middlesex County Historical Society, has contributed to several other Images of America books, including Legendary Locals of Middletown, co-authored by Robert and Kathleen Hubbard.

Munkittrick wrote his senior thesis on the Samuel Russell House, which can be found at the corner of Washington and High streets. He was the only student named to the Wesleyan Landmarks Advisory Board, set up to help the college learn how to care for and restore its historic properties, he said. That piqued his interest even further.

It took close to a year to research, gather photos, and edit the 127-page volume, chock full of details discovered through land records, area libraries, and online and other sources. For me, that was the most enjoyable aspect, to learn even more about High Street, Munkittrick said.

The architects biggest asset was in describing the buildings, Shapiro said. My strength was bringing my lawyerly skills in the title searching, and going back and putting the pieces together.

That was necessary because the properties there now used to be much larger parcels situated in a rural, agriculture area, she said.

When you get into the early 1800s, late 1700s, it gets a little dicey, because the descriptions are this is the Pearce place by the oak tree, which, of course, the oak tree met its demise many years ago, Shapiro said.

Materials at Wesleyans Special Collections & Archives, the Middletown Room at the Russell Library, and the historical societys own extensive collection were among items used for research.

Over the course of five chapters, consisting of dozens upon dozens of historical photographs, the authors tell the story of the once highly regarded road, home to Wesleyan Row, the group of brownstone buildings at the center of the block. Its scope covers the area from Washington Street south to Warwick Street.

The writers were constrained by the Images of America parameters, which allowed for no more than 70 words per caption, Shapiro said. We encountered a lot of stories that didnt make it into the book. We chose the [photos] that were the most compelling, and would tell the most complete story, because we were starting with the settlement of the street in the late 1600s, early 1700s, when photography hadnt been invented yet.

Most illustrations from that era are paintings.

High Street is perched high on a hill, hence its name, and once afforded people a sense of prestige and sweeping view of the Connecticut River, now mostly obstructed by buildings, trees and other obstacles.

Many stories couldnt fully fit into the book, the authors said. For instance, the Rev. Enoch Huntington, minister of First Church, which used to occupy High Street, headed the parish during the Revolutionary War, Shapiro said. His brother Samuel signed the Declaration of Independence from Connecticut. He was the first president of the Continental Congress, Munkittrick said.

Samuel Huntingtons daughter Mary married Matthew Talcott Russell, cousin of Samuel Russell. Their son, William Huntington Russell, became a distinguished general, Shapiro said. He and Alphonso Taft, father of President William Howard Taft, founded the Skull and Bones Society at Yale University in New Haven.

A generation later, president Taft and William Huntington Russells son courted another woman named Mary. Taft lost out, Shapiro said. Mary was the great-grandmother of Jill Hunting, a writer from California, who discovered she was a descendant of Enoch Huntingon.

Hunting later visited Middletown, and she and Shapiro spent an afternoon talking about her ancestors. One day, Shapiro was watching the Ken Burns series on the Vietnam War, and saw Huntings name run quickly through the credits.

Shapiro wondered what her contribution was to the movie. Huntings brother, Pete Hunting, a 1963 graduate of Wesleyan, had become a civilian aid worker in Vietnam. It turned out he was the first American non-military member killed in the Vietnam War, Shapiro said.

Shapiro spent a great deal of time in the town clerks office, deep in the basements vault so much so that workers joked they should name the room after her. There, records turned up family names, which the two used to search newspapers online, Munkittrick said. That added a lot of flavor to the story and rounded out the picture of who these people were, what their occupations were, how they may have been related to other families on the street, he said.

That process was a lot of fun, said Munkittrick, who found a photo of Mr. and Mrs. Charles and Amelia H. Vinal (whom the state technical school is named for) among the cemetery records compiled on the Find a Grave site. Since every illustration can only be used with permission, he discovered the owner just so happens to live down the road from him.

This person could be anywhere in the world, and it turns out, shes a descendant of the Vinals and she lives in East Hampton, said Munkittrick, who spent an afternoon talking to her about the family history.

Munkittrick calls High Street a museum of American architectural building styles, ranging from the early 18th century through to modern day. Among them Greek Revival, Italianate, stick style, Second Empire, Gothic Revival and Eclecticism. All those styles you can find a great example of on High Street, he said.

The 127-page book, printed by Arcadia Publishing, is available at area bookstores, including Wesleyan R.J. Julia Bookstore, at 413 Main St.; the historical society, 151 Main St., by calling 860-346-0746; Arcadia Publishing, Amazon.com, as well as other online retailers. All proceeds go to the historical society.

Read more from the original source:

New book explores Wesleyan and evolution of High Street in Middletown - Middletown Press

Exploring the Origin and Evolution of the Kepler 36 System – Oxford Academic

We examine the origins of the Kepler 36 planetary system, which features two very different planets: Kepler 36b, (|$rm rho = 7.46$| |$rm g$| |$rm cm^{-3}$|) and Kepler 36c (|$rm rho = 0.89$| |$rm g$| |$rm cm^{-3}$|). The planets lie extremely close to one another, separated by just 0.01AU, and they orbit just a tenth of an AU from the host star. In our origin scenario, Kepler 36b starts with far less mass than Kepler 36c, a gaseous giant planet that forms outside the ice line and quickly migrates inward, capturing its neighbour into its 2:1 mean-motion resonance while continuing to move inward through a swarm of planetesimals and protoplanets. Subsequent collisions with these smaller bodies knock Kepler 36b out of resonance and raise its mass and density (via self-compression). We find that our scenario can yield planets whose period ratio matches that of Kepler 36b and c, although these successes are rare, occurring in just 1.2 per cent of cases. However, since systems like Kepler 36 are themselves rare, this is not necessarily a drawback.

This content is only available as a PDF.

2020 The Author(s) Published by Oxford University Press on behalf of the Royal Astronomical Society

Read the rest here:

Exploring the Origin and Evolution of the Kepler 36 System - Oxford Academic

Top 9 Discoveries in Human Evolution, 2020 Edition – PLoS Blogs

2020 has been quite the year! The pandemic changed a lot about the world including the ways in which paleoanthropologists, archaeologists, and other fieldwork-based researchers operate. This year, we want to highlight the different lines of evidence that are used in human origins research so weve organized our nine highlighted discoveries into four broader lines of evidence categories. Since many scientific articles are years in the making, a lot of exciting discoveries were still revealed in 2020!

1. Fossil footprints tell us where and how modern humans traveled the globe

While we may not be able to move around much this year, three studies on fossil human footprints published in 2020 revealed a lot more about where ancient humans traveled and how they moved together in groups. Unlike body fossils, footprints (and other trace fossils) offer us a snapshot of an exact moment in time, or at least a very short time interval. In December, the longest trackway of fossil human footprints was announced by Matthew R. Bennett and colleagues. This ~11,500-13,000 year old, 1.3 km/0.8 mile long trackway, roughly the length of 14 football fields, was made by a woman (or juvenile male) holding a 2-3 year old toddler while on their journey through a rough and dangerous landscape. How do we know? Every so often the adult footprints pause and are joined by a childs footprints. The footprints go in a straight and definite line, and pretty fast, indicating a deliberate end target; they then return in the opposite direction, this time without the child.

But did Pleistocene humans always travel solo? Heck no! Another 2020 announcement, this one in May from Chatham Universitys Kevin Hatala and colleagues (including Briana Pobiner!), analyzed the largest fossil footprint assemblage in Africa. Between 6,000 19,000 years ago, a group of modern humans walked through a mudflow in the shadow of the Oldoinyo Lengai volcano in Tanzania. The 408 footprints left behind by 17 individuals help us understand not only the heights and weights of the footprint-makers, but using statistical analysis based on a large data set of modern human feet, the team determined that the walking group probably consisted of 14 female and 2 male individuals. Comparing this to ethnographic data from modern forager groups such as the Hadza in Tanzania, they concluded that the footprints were probably made by adult females with occasional visits or accompaniment by a few adult males during a food gathering session. Finally, footprints can simply reveal that humans were someplace we didnt know they were at that time, like with these ~120,000 year old human and animal footprints found on an ancient lake surface in a current Saudi Arabian desert by Michael Petraglia from the Max Planck Institute for the Science of Human History and colleagues. Before this discovery, the earliest evidence of humans moving into the heart of Arabia dated back to ~85,000 years ago.

2. Fossil primates also undertook major journeys

While discoveries directly related to humans evolutionary journey are important, understanding how now-extinct primates survived, thrived, and traveled across the globe is just as exciting! In October , a team led by Nina Jablonski and Xueping Ji from Penn State University and Yunnan Institute of Cultural Relics and Archaeology respectively, found three new ~6.4 million year old Mesopithecus pentelicus fossils in Yunan Province, China. These late Miocene fossils indicate that this ecologically versatile and adaptable ancient monkey lived in Asia at the same time as apes and the likely descendants of this species (modern colobines of Asia) have continued this trend by inhabiting some of the most highly seasonal and extreme habitats occupied by nonhuman primates.

Speaking of extreme did you know that researchers think monkeys rafted all the way across the Atlantic? In April, Erik Seiffert from University of Southern California and colleagues announced a new tiny soup-can-sized fossil monkey species Ucayalipithecus perditabased on four fossil monkey teeth that they found deep in the Peruvian Amazon. This newly discovered species belongs to an extinct family of African primates known as parapithecids, which are now the third lineage of mammals that made the >900 mile transatlantic journey to get from Africa to South America, most likely on floating rafts of vegetation that broke off from coastlines during a storm. Sounds improbable, but monkeys can survive without access to fresh water if they get enough food like fruit that could have been on a tree on the vegetation raft. Finally, in September, a team led by Hunter Colleges Christopher C. Gilbert announced another new fossil primate: this time a ~13 million year old ape, Kapi ramnagarensis, from a fossil molar found at Ramnagar in northern India. This new species pushes the fossil record of gibbons back by about five million years, and provides significant information about when the ancestors of todays gibbons migrated to Asia from Africa which was around the same time ancient great apes were undertaking the same migration.

3. New fossils hominins from Drimolen, South Africa

No list of important finds in human evolution would be complete without fossil evidence of hominins themselves, and this year the site of Drimolen in South Africa was the big winner. First, in April, a team led by Andy I. R. Herries from La Trobe University announced new fossils of both Paranthropus robustus (DNH 152) and Homo erectus (DNH 134) dating to between ~2.04 and 1.95 million years ago, making these the oldest fossils of both of these hominin species. These finds demonstrate the contemporaneity of these two species at this site with Australopithecus africanus and DNH 134 pushes back the origin of Homo erectus by about 150,000 200,000 years. And aspiring paleoanthropologists, check this out: Jesse Martin and Angeline Leece, who were both students attending a field school at Drimolen when DNH 143 was found in 2015, got to clean and reconstruct the skull. They had to hold the specimen, which consisted of more than 150 pieces of a ~3 year old child, together without coughing, sneezing, or even talking, and controlling their breathing for up to 40 minutes at a time!

Drimolen seems to be the gift that keeps on giving (us fossils): in 2018, the team found two more Paranthropus fossils, including the ~2 million year old DNH 155 adult male cranium (also found by a field school student, Samantha Good). The analysis of this specimen led by Jesse M. Martin from La Trobe University was published this year in November, and especially comparisons to other adult male Paranthropus robustus fossils from Drimolen and elsewhere in South Africa, suggests that differences previously ascribed to sexual dimorphism (differences between males and females) are actually examples of microevolution related to ecological change within this early hominin species.

4. Denisovan DNA found in cave sediments and modern humans

Back to our theme of migration (can you tell we miss being able to, you know, go places?!?) One of this years big announcements, in October, was the first definitive evidence of Denisovans outside of Denisova Cave in Siberia from ~2800 km/~1,740 miles away in Tibet! A team led by Dongju Zhang from Lanzhou University wanted to test the hypothesis that a ~160,000 year old partial jawbone found by a Buddhist monk in Baishiya Karst Cave might be the remains of a Denisovan. First, in 2019, they used a new method based on protein variations to identify the jaw as Denisovan; but the novel method and unknown exact location of where the jaw was found in the cave led to continued skepticism. Determined to find more evidence, Zhang and her team returned to the cave. They agreed to excavate only in winter and at night, in sub-zero temperatures, to avoid disturbing worshippers and were rewarded by Denisovan mitochondrial DNA from the cave sediments, dated to between 100,000 60,000 years ago, and possibly as recently as 45,000 years ago. The research team also found charcoal from fires Denisovans built in the cave, as well as stone tools and fossil animal bones.

Also in October, a team led by the Max Planck Institute for Evolutionary Anthropologys Svante Pbo and Diyendo Massilani analyzed a ~34,000 year old modern human womans skullcap found by miners in 2006 the only Pleistocene fossil currently known from Mongolia as well as a ~40,000 year old modern human male skull from Tianyuan Cave in China. They found that both fossils contain DNA from both Neanderthals and Denisovans. What does this evidence mean for interactions and migrations among Eurasian Pleistocene populations? Well, it was complicated. Because the Denisovan DNA sequences in these fossils around not found in present-day Oceanians (Australian Aboriginals and New Guineans), but they are found in present-day East Asians, modern humans must have met and exchanged genes with two different populations of Denisovans one in Southeast Asia, and one in mainland Asia. This suggests that Denisovans once inhabited a pretty large area of Asia. Looks like its time to find more Denisovan fossils (fingers crossed)!

In the meantime, museums are continuing to work on digitization programs so that scientists can study and have access to collections regardless of pandemics or long distances: the National Museums of Kenya and our own Smithsonian institution have already been working to make 3D reconstructions of their fossils available to researchers from around the world. If youve also been missing visiting museums, like us, the Smithsonian has created a way to view fossils from the safety of your own home! While we wait for more Denisovan fossils to be discovered, you can use this VR technology to see through a Neanderthals eyes and get up close and personal with some mammoths!

Featured image by Karen Carr/National Park Service.

Edited by Jason Organ, PhD, Indiana University School of Medicine.

Read the original here:

Top 9 Discoveries in Human Evolution, 2020 Edition - PLoS Blogs

Geopolitical Instability such as Chinese Naval Expansionism Driving Evolution across the Global Naval Command and Control Market – Yahoo Finance

TipRanks

Semiconductors are one of the modern worlds essential industries, making possible so much of what we rely on or take for granted: internet access, high-speed computers with high-speed memory, even the thermostats that control our air conditioning there isnt much, tech-wise, that doesnt use semiconductor chips.With the end of 2020 in sight, its time for the annual ritual of evaluating the equities for the New Year. Wells Fargo analyst Aaron Rakers has cast his eye on the chip industry, tagging several companies as likely gainers next year.The analyst sees several factors combining to boost demand for chips in 2021, including cloud demand, new gaming consoles, and a market resolution to the future of the PC segment. Overall, however, Rakers expects that memory chips and 5G enabled chips will emerge as the drivers of the industry next year. The analyst expects that semiconductor companies, as a group, will see between 10% and 12% growth over the next 12 months.Thats an industry-wide average, however. According to Raker, some chip companies will show significantly higher growth, on the order of 30% to 40% in year ahead. We can look at those companies, along with the latest TipRanks data, to find out what makes these particular chip makers so compelling.Micron Technology (MU)Among the leading chip makers, Micron has staked out a position in the memory segment. The company has seen its market cap expand to $78 billion this year, as shares have appreciated 32% year-to-date. The surge comes on a product line heaving on computer data storage, DRAM, and flash storage.Look back at 2020, Micron has seen revenues increase each quarter, from $4.8 billion in Q1 to $5.4 billion in Q2 to $6.1 billion in Q3. Earnings came in at 87 cents per share, up from 71 cents in Q2 and 36 cents in Q1.The calendar third quarter was Microns 4QFY20, and the full fiscal year showed a decline due attributed to the COVID pandemic. Revenue came in at $21.44 billion, down 8.4% year-over-year, and operating cash flow fell to $8.31 billion from $13.19 billion in FY19. During this past quarter, Microns 1QFY21, the company announced the release of the worlds first 176-layer 3D NAND chip. The new chip promises higher density and faster performance in flash memory, and the architecture is described as a radical breakthrough. The layer count is 40% higher than competing chips.Looking ahead, Micron has updated its F1Q21 guidance, predicting total revenue of $5.7 billion to $5.75 billion. This is a 10% increase from the previous guidance.Wells Fargo's Aaron Rakers calls Micron his top semiconductor idea for 2021. He points out a deepening positive view on the memory, and in particular the DRAM industry. DRAM accounts for approximately two-thirds of Microns revenue and over 80% of the companys bottom-line profits. In addition, Rakers notes Microns technology execution 1Znm DRAM leadership; recently outlined 1nm ramp into 2021, as well as Microns move to 176-Layer 2nd -gen Replacement Gate 3D NAND to drive improved cost curve. We would also highlight Microns execution on graphics memory (e.g., GDDR6X), Multi-Chip Packages (MCPs), and High-Bandwidth Memory (e.g., HBME2) as positives.In line with these comments, Rakers rates Micron shares a Buy, along with a $100 price target. This figure suggests room for 41% growth in 2021. (To watch Rakers track record, click here)Micron has 24 recent reviews on record, breaking down to 19 Buys, 4 Holds, and 1 Sell, and giving the stock a Strong Buy from the analyst consensus. Shares are priced at $70.96, and recent appreciation has pushed them almost to the $74.30 average price target. But as Rakers outlook suggests, there may be more than just 4.5% upside available here. (See MU stock analysis on TipRanks)Advanced Micro Devices (AMD)With $6.5 billion in total sales last year, and a market cap of $110.7 billion, AMD is a giant company but it doesnt even crack the top five of the worlds largest chip makers. Still, AMD has a solid position in the industry, and its x86 processors provide stiff competition for market-leading Intel (INTC). AMD shares have shown solid growth this year, and are up 101% as 2020 comes to a close.The share growth rides on the back of steady revenue gains since the corona crisis peaked in Q1. AMDs Q3 top line came in at $2.8 billion, up 55% from the $1.8 billion recorded in the year-ago quarter and beating the forecast by 10%. Earnings, at 37 cents per share, were up 220% year-over-year. The company credited the growth to solid results in the PC, gaming, and data center product lines, and boasted that it was the fourth consecutive quarter with >25% yoy revenue growth.AMD announced last month a new product for the scientific research market, the Instinct MI100 accelerator. The new chip is billed as the worlds fasted HPC GPU, and the first such x86 server to exceed 10 teraflops performance.Covering AMD for Wells Fargo, Rakers wrote: We remain positive on AMDs competitive positioning for continued sustained gradual share gains in PCs We also believe AMDs deepening data center GPU strategy with new Instinct MI100 GPUs and the release of RoCM 4.0 software platform could become increasingly visible as we move through 2021. AMDs roadmap execution would remain an important focus 7nm+ Ryzen 4000-series, new RDNA Radeon Instinct data center GPUs (MI100 / MI120), and the 3 rd -gen 7nm+ EPYC Milan CPUsRakers stance supports his Buy rating, and his $120 price target implies a 30% one-year upside to the stock.The Moderate Buy analyst consensus view on AMD reflects some residual Wall Street caution. The stocks 20 recent reviews include 13 Buys, 6 Holds, and 1 Sell. AMD shares are selling for $91.64, and like Micron, their recent appreciation has closed the gap with the $94.71 average price target. (See AMD stock analysis on TipRanks)Western Digital Corporation (WDC)Closing out the Wells Fargo picks on this list is Western Digital, a designer and manufacturer of memory systems. The companys products include hard disk drives, solid state drives, data center platforms, embedded flash drives, and portable storage including memory cards and USB thumb drives. WDC has had a tough year in 2020, with shares down 19% year-to-date. Still, the stock has seen gains in November and December, on the heels of what was seen as a strong fiscal 1Q21 report.That earnings report showed $3.9 billion in revenue, which was down 3% year-over-year, but the EPS net loss, at 19 cents, was a tremendous yoy improvement from the 93-cent net loss in the year-ago quarter. The earnings improvement, which beat the forecast by 20%, was key for investors, and the stock is up 30% since the quarterly report. The company also generated a solid cash flow in the quarter, with cash from operations growing 111% sequentially.Wells Fargos Rakers acknowledges WDCs difficulties in 2020, but even so, he believes that this is a stock which is worth the risk.Western Digital has been our toughest constructive call of 2020 and while we believe calling a bottom in NAND Flash (mid/2H2021?) remains difficult and WDs execution in enterprise SSDs will remain choppy, our SOTP analysis leaves us to continue to believe that shares present a compelling risk / reward. We continue to believe that Western Digital can drive to a ~$7/sh.+ mid-cycle EPS story; however, we continue to think a key driver of this fundamental upside will not only be a recovery in the NAND Flash business, coupled with WDs ability to see improved execution in enterprise SSDs, but also a continued view that WDs HDD gross margin can return to a sustainable 30%+ level, Rakers opined.To this end, Rakers rates WDC a Buy along with a $65 price target. Should the target be met, investors could pocket gains of 29% over the next months Where does the rest of the Street side on this computer-storage maker? It appears mostly bullish, as TipRanks analytics demonstrate WDC as a Buy. Out of 11 analysts tracked in the last 3 months, 7 are bullish, while 4 remain sidelined. With a return potential of 9%, the stocks consensus target price stands at $54.44. (See WDC stock analysis on TipRanks)To find good ideas for tech stocks trading at attractive valuations, visit TipRanks Best Stocks to Buy, a newly launched tool that unites all of TipRanks equity insights.Disclaimer: The opinions expressed in this article are solely those of the featured analysts. The content is intended to be used for informational purposes only. It is very important to do your own analysis before making any investment.

The rest is here:

Geopolitical Instability such as Chinese Naval Expansionism Driving Evolution across the Global Naval Command and Control Market - Yahoo Finance

The Evolution Of Taking Someone’s Temperature – HealthTechZone

When a persons feeling ill and warm, we tend to check their temperature to see if theyre experiencing any fever, allowing you to determine if they should be brought to the hospital immediately. Fortunately, there are a ton of ways on how you can take someones temperature. It can be done through the mouth, ears, forehead, underarm, or rectal.

Along with this, the device that you use to take the temperature has made an evolution that allows you to accurately take ones temperature. One of the most advanced devices in taking someones temperature would be a temperature screening kiosk thats designed for business use. Not only that theyre able to capture ones temperature, but theyre also able to capture the persons photo for database management.

Heres how taking temperatures progressed:

Mercury Thermometer

The mercury thermometer is the oldest medical instrument thats used to detect ones thermometer. Theyre made out of glass and have liquid mercury inside of it that rises up or down, depending on the temperature of the metal end. Along with the glass, it also includes a scale to further help you identify the temperature of a person.

When using this type of thermometer, its best that you gently shake it to reduce the mercury level, capturing better results after it lowers in height. You can use this orally, rectally, and placing it in between your underarms. You just have to wait until the liquid mercury stops moving to make sure that it has made its final count.

Take note that you need to be extra careful when handling mercury thermometer as theyre prone to breakage. Liquid mercury can be toxic and extremely dangerous.

Digital Thermometer

A digital thermometer is a plastic device that uses a sensor instead of a liquid, providing maximum safety in case of breakage.

The digital thermometer is a relatively new invention that makes it easy to keep track of ones temperature. A digital thermometer has no moving parts so it can be kept anywhere. Instead, a digital thermometer contains a microprocessor chip and a small resistor. When a temperature change occurs, the microprocessor senses a slight change in the resistance. The chip then converts the slight change in resistance into an electrical signal and transmits it to the microprocessor's internal memory. The microprocessor interprets the voltage change and provides an electronic readout on the thermometer's display in degrees (Fahrenheit or Celsius).

You must learn to disinfect your thermometer after each use, most especially when you use this at a hospital.

Basal Thermometer

Much like a standard digital thermometer, a basal thermometer simply measures your bodys temperature. The main difference is that it only measures very little incrementsa fraction of a degree or a tenth of a degree.

There are plenty of advantages when using basal thermometers over regular digital thermometers. For one, theyre a lot more accurate than other thermometers. This is because they require less information, giving you accurate readings. Most of them give readings that are within an inch or two of each other.

Temporal Artery Thermometer (TAT)

The TAT is another portable and lightweight handheld device that allows you to capture the temperature of one person without inserting the device into their mouth. All you need to do is to point the sensor on their forehead, press the button, and you should see the results in seconds.

The TAT captures the heat thats naturally released by the skin through the temporal artery. Take note that the arteries receive blood directly from the heart, making it a great and convenient way to check the hearts temperature.

Tympanic Thermometer

A tympanic thermometer refers to a simple apparatus thats commonly used to determine the bodys temperature. This is a handheld, wand-like device that captures a persons temperature from their ear.

It works by using infrared light that helps detect thermal radiation that's emitted from the tympanic membrane. With this, it calculates the emission gathered and converts it into a numerical temperature that allows you to determine the persons temperature. A Tympanic Thermometer should be used by a healthcare professional so can provide accurate results.

Conclusion

With the modern world today, we now have thermometers that allow us to capture a persons temperature without direct contact. This is helpful most especially when youre using this in hospitals since direct contact might result in unintentionally spreading a disease.

Not only has the thermometer evolved, but medical technology has evolved as well, enabling healthcare professionals to help more people as much as they possibly can.

If your fever is above 38C for more than 2 days, you should consult with your doctor immediately. If you reached 40C, immediately contact your doctor and dont wait for other symptoms to show up. Its always important that you look out for your temperature especially when youre sick.

Lori Graham

Lori Graham is full-time blogger who writes articles about the developments in the healthcare industry. Lori aims to help her readers improve the quality of their lives by educating and encouraging the make the most out of the newest trends from the healthcare industry.

During her leisure, Lori loves to read books at home.

See the original post:

The Evolution Of Taking Someone's Temperature - HealthTechZone

The next evolution of food retail: Pivot, or you’re out – Food Business News

CHICAGO So much has changed in one year. And its still changing. As the world evolves, the food supply chain is looking to the COVID-19 retail landscape to prepare for the future.

The pace and breadth of change has been stunning and is really putting a premium on your ability as a retailer to be agile and to adopt and be willing to make changes on the fly, said Walter Robb, former longtime co-chief executive officer of Whole Foods Market, Austin, Texas, and current executive-in-residence at S2G Ventures, Chicago, during a Dec. 1 webinar hosted by Spark Change and presented by Naturally Chicago and New Hope Network. Why does retail matter? Because retail mirrors, reects and captures the rhythms of our lives. Everything that happens at retail touches everything across the entire food supply chain.

A recent report from S2G Ventures, The Future of Food: Through the Lens of Retail, was the catalyst for the webinar. Mr. Robb and co-author S2G vice president Audre Kapacinskas wrote, The pandemic has shined the brightest of lights on our food system, and retailers sit squarely in the middle. Each new day brings new innovation and evolution in customer choice and system changes.

S2G Ventures mission is to back the best entrepreneurs that are improving the overall health and sustainability of the food system. COVID-19 helped them identify opportunities for more improvements. Mr. Robb explained that the changes the natural products industry has seen this year were not revolutionary but rather accelerations of evolutionary trends already in progress.

Retailing of the future is going to be dimensional, he said. Its not just about the products and values. Its also the community in which it is situated and also the way in which commerce is done.

According to the report, in this next evolution of food, much of what was once aspirational will be considered table stakes.

Theres much more context going on, Mr. Robb said. Delivery and curbside pickup are absolute table stakes going forward. It is going to be essential to provide those services to customers if you want to play in this new world order.

Every retailer will need to experiment with new formats, everything from design to location to size. Retailers need to prepare for the return of restaurants. To stay competitive, retail foodservice needs to change.

The perimeter of the store is such an important area in every way, including profitability, said Brandon Barnholt, CEO of KeHE Distributors, Naperville, Ill. The perimeter is changing in front of our eyes.

Bulk foods scooping stuff into bags shut down immediately (at the onset of the pandemic). Retailers responded with contactless bulk.

Fresh Thyme, Downers Grove, Ill., for example, built a business around bulk ingredients and snack foods, as well as grab-and-go bakery items, antipasto buffet and soup/salad bar. The store even had a grind-your-own oats machine; pour-your-own honey, vinegar and olive oil; and cream-your-own nut butter. Now Fresh Thyme offers shoppers contactless bulk for dry items, as well as pre-packaged bulk in many varied sizes. Fluid bulk is pre-portioned in containers on an as-needed basis. Stores recently opened the self-serve soup bar, with an enhanced plastic shield and instructions to use a napkin when touching the ladle. Hand sanitizing stations are adjacent.

Its all about quick pivots, Mr. Barnholt said. Doing everything they can do to serve customers.

Mr. Robb predicted that future growth in food retail will be driven by an interaction between community/customer engagement (digital engagement, frictionless instore experience and transparency); commerce/sales channel (omnichannel capabilities, smart fulfillment and resilient fresh food); and content/products sold (product curation, farmacy focus, values-first marketing and sustainability as brand affinity).

Theres a need for innovation to address these opportunities within commerce, community and content in order to drive future growth for food retailers, Mr. Robb said.

Anu Goel, president of client growth solutions, SPINS, Chicago, said, Weve advanced four to five years technologically. Theres a broadening of who is shopping online and what is being shopped. Everybody is doing it now, and across all categories.

Whereas the online shopper before the pandemic skewed younger, today four different generations are actively engaging. Eating at home is one COVID-19 impact that is likely to have staying power with the rise of grocery pickup and delivery, as well as the growth in ghost kitchens and food delivery options. Retailers need to pivot to stay relevant.

See the article here:

The next evolution of food retail: Pivot, or you're out - Food Business News