Friday, November 23, 2012

Book Recommendations [1] UK Crime [2] 2012




This is How You Lose Her by Junot Díaz
I read this book BEFORE I read "The Brief Wondrous Life of Oscar Wao" and it was so amazing that I immediately started reading his earlier work. 


Zona: A Book About a Film About a Journey to a Room by Geoff Dyer
Dyer's part memoir, part commentary is incredibly artful and engaging
Birds of a Lesser Paradise by Megan Mayhew Bergman
These short stories paint our complicated relationship with nature, from the hypocrisy of Greenpeacers to the sometimes animal-like capriciousness of our emotions.

Gone Girl by Gillian Flynn
I hadn't read a thriller since high school, but this book came so highly recommended that I had to read it. It certainly didn't disappoint. This tale of the aftermath of a woman gone missing will keep you up 
reading all night just so you can get to the very satisfying, very chilling ending. 

As If by Michael Saler
Saler explores the motives behind members of societies devoted to imaginary worlds, such as those created by Tolkien and Doyle, and in doing so uncovers some fascinating truths about society.


Farther Away: Essays by Jonathan Franzen
If you haven't read Franzen's nonfiction, it's worth a look - I'd even say it's his strength.



How Should a Person Be?: A Novel from Life by Sheila Heti

Black and Blue by Ian Rankin
Rankin is very much the king of British crime fiction and if you haven’t read him yet there is a big chunk of pleasure missing from your life. This is the book that made his hero, Detective Inspector John Rebus, a household name. It sees Rebus juggling four cases trying to nail one killer - who might just lead back to the infamous killer Bible John. And he's doing it under the scrutiny of an internal inquiry led by a man he has just accused of taking backhanders from Glasgow's Mr Big..




6. The Hanging Shed by Gordon Ferris
Tartan noir gets no better than this. Set in Glasgow just after the war, it sees disenchanted ex-soldier Douglas Brodie try to save his childhood friend from the gallows in a dark, atmospheric tale. 


The Black House by Peter May
The first in the Isle of Lewis trilogy, this thriller is so atmospheric that you’ll feel genuinely windswept and exhausted by the end of it. It sees Edinburgh detective Fin Macleod return to the island of his birth, where a childhood nemesis has been found brutally killed. On the island, Fin must face ghosts from his own dark past. 


Dead Scared by S J Bolton
When a Cambridge student dramatically attempts to take her own life, DI Mark Joesbury realizes that the university has developed an unhealthy record of young people committing suicide in extraordinary ways. Young policewoman DC Lacey Flint is sent to work under-cover, posing as a depression-prone, vulnerable student. It’s a game of cat-and-mouse that will scare your pants off. It’s bound to be a movie soon but please read the book first. It’s unputdownable.

Friday, November 16, 2012

Trying to Keep Your E-Mails Secret When the C.I.A. Chief Couldn’t


Trying to Keep Your E-Mails Secret When the C.I.A. Chief Couldn’t

If David H. Petraeus couldn’t keep his affair from prying eyes as director of the Central Intelligence Agency, then how is the average American to keep a secret?

Chester Higgins Jr./The New York Times
"Everyone is reading everyone else’s e-mails," says Dan Kaminsky, an Internet security expert, "because it’s just so easy to do."
In the past, a spymaster might have placed a flower pot with a red flag on his balcony or drawn a mark on page 20 of his mistress’s newspaper. Instead, Mr. Petraeus used Gmail. And he got caught.
Granted, most people don’t have the Federal Bureau of Investigation sifting through their personal e-mails, but privacy experts say people grossly underestimate how transparent their digital communications have become.
“What people don’t realize is that hacking and spying went mainstream a decade ago,” said Dan Kaminsky, an Internet security researcher. “They think hacking is some difficult thing. Meanwhile, everyone is reading everyone else’s e-mails — girlfriends are reading boyfriends’, bosses are reading employees’ — because it’s just so easy to do.”
Face it: no matter what you are trying to hide in your e-mail in-box or text message folder — be it an extramarital affair or company trade secrets — it is possible that someone will find out. If it involves criminal activity or litigation, the odds increase because the government has search and subpoena powers that can be used to get any and all information, whether it is stored on your computer or, as is more likely these days, stored in the cloud. And lawyers for the other side in a lawsuit can get reams of documents in court-sanctioned discovery.
Still determined? Thought so. You certainly are not alone, as there are legitimate reasons that people want to keep private all types of information and communications that are not suspicious (like the contents of your will, for example, or a chronic illness). In that case, here are your best shots at hiding the skeletons in your digital closet.
KNOW YOUR ADVERSARY. Technically speaking, the undoing of Mr. Petraeus was not the extramarital affair, per se, it was that he misunderstood the threat. He and his mistress/biographer, Paula Broadwell, may have thought the threat was their spouses snooping through their e-mails, not the F.B.I. looking through Google’s e-mail servers.
“Understanding the threat is always the most difficult part of security technology,” said Matthew Blaze, an associate professor of computer and information science at the University of Pennsylvania and a security and cryptography specialist. “If they believed the threat to be a government with the ability to get their login records from a service provider, not just their spouse, they might have acted differently.”
To hide their affair from their spouses, the two reportedly limited their digital communications to a shared Gmail account. They did not send e-mails, but saved messages to the draft folder instead, ostensibly to avoid a digital trail. It is unlikely either of their spouses would have seen it.
But neither took necessary steps to hide their computers’ I.P. addresses. According to published accounts of the affair, Ms. Broadwell exposed the subterfuge when she used the same computer to send harassing e-mails to a woman in Florida, Jill Kelley, who sent them to a friend at the F.B.I.
Authorities matched the digital trail from Ms. Kelley’s e-mails — some had been sent via hotel Wi-Fi networks — to hotel guest lists. In crosschecking lists of hotel guests, they arrived at Ms. Broadwell and her computer, which led them to more e-mail accounts, including the one she shared with Mr. Petraeus.
HIDE YOUR LOCATION The two could have masked their I.P. addresses using Tor, a popular privacy tool that allows anonymous Web browsing. They could have also used a virtual private network, which adds a layer of security to public Wi-Fi networks like the one in your hotel room.
By not doing so, Mr. Blaze said, “they made a fairly elementary mistake.” E-mail providers like Google and Yahoo keep login records, which reveal I.P. addresses, for 18 months, during which they can easily be subpoenaed. The Fourth Amendment requires the authorities to get a warrant from a judge to search physical property. Rules governing e-mail searches are far more lax: Under the 1986 Electronic Communications Privacy Act, a warrant is not required for e-mails six months old or older. Even if e-mails are more recent, the federal government needs a search warrant only for “unopened” e-mail, according to the Department of Justice’s manual for electronic searches. The rest requires only a subpoena.
Google reported that United States law enforcement agencies requested data for 16,281 accounts from January to June of this year, and it complied in 90 percent of cases.
GO OFF THE RECORD At bare minimum, choose the “off the record” feature on Google Talk, Google’s instant messaging client, which ensures that nothing typed is saved or searchable in either person’s Gmail account.
ENCRYPT YOUR MESSAGES E-mail encryption services, like GPG, help protect digital secrets from eavesdroppers. Without an encryption key, any message stored in an in-box, or reached from the cloud, will look like gibberish. The intended recipient must get a key from the sender to read the message. The drawback is that managing those keys — which often involves writing them down — can be cumbersome. And ultimately, even though a message’s contents are unreadable, the frequency of communication is not. That is bound to arouse suspicions.
Wickr, a mobile app, performs a similar service for smartphones, encrypting video, photos and text and erasing deleted files for good. Typically, metadata for deleted files remains on a phone’s hard drive, where forensics specialists and skilled hackers can piece it back together. Wickr erases those files by writing gibberish over the metadata.
SET YOUR SELF-DESTRUCT TIMER Services like 10 Minute Mail allow users to open an e-mail address and send a message, and the address self-destructs 10 minutes later. Wickr also allows users to set a self-destruct timer for mobile communications so they can control how long a recipient can view a file before it disappears. But there is always the chance that your recipient captured screenshots.
DROP THE DRAFT FOLDER IDEA It may sound clever, but saving e-mails in a shared draft folder is no safer than transmitting them. Christopher Soghoian, a policy analyst at the American Civil Liberties Union, noted that this tactic had long been used by terrorists — Khaled Sheikh Mohammed, the mastermind of the 9/11 attacks, and Richard Reid, “the shoe bomber,” among them — and it doesn’t work. E-mails saved to the draft folder are still stored in the cloud. Even if they are deleted, e-mail service providers can be compelled to provide copies.
USE ONLY A DESIGNATED DEVICE Security experts suggest using a separate, designated device for sensitive communications. Of course, few things say philanderer, or meth dealer for that matter, like a second cellphone. (Watch “Breaking Bad.”)
GET AN ALIBI Then there is the obvious problem of having to explain to someone why you are carrying a pager or suddenly so knowledgeable about encryption technologies. “The sneakier you are, the weirder you look,” said Mr. Kaminsky.
DON’T MESS UP It is hard to pull off one of these steps, let alone all of them all the time. It takes just one mistake — forgetting to use Tor, leaving your encryption keys where someone can find them, connecting to an airport Wi-Fi just once — to ruin you.
“Robust tools for privacy and anonymity exist, but they are not integrated in a way that makes them easy to use,” Mr. Blaze warned. “We’ve all made the mistake of accidentally hitting ‘Reply All.’ Well, if you’re trying to hide your e-mails or account or I.P. address, there are a thousand other mistakes you can make.”
In the end, Mr. Kaminsky noted, if the F.B.I. is after your e-mails, it will find a way to read them. In that case, any attempt to stand in their way may just lull you into a false sense of security.
Some people think that if something is difficult to do, “it has security benefits, but that’s all fake — everything is logged,” said Mr. Kaminsky. “The reality is if you don’t want something to show up on the front page of The New York Times, then don’t say it.”

Wednesday, November 14, 2012

Articles to read later

Life in America -- Best jobs chart

For the professional blog:
http://mediamatters.org/issues/immigration-reform
http://mediamatters.org/issues/immigration-myths

http://chronicle.com/article/In-Defense-of-Favoritism/135610/

For ecologists #2, Marc W, Hugh:
Only connect - Buddhism and Ecology

For Angiebunny:

Why it's necessary to tell stories: http://www.psychologytoday.com/articles/201103/the-inside-story

* The first rule of telling stories is to give the audience—whether it's one business person or a theater full of moviegoers—an emotional experience. The heart is always the first target in telling purposeful stories.
* Most compelling stories have a sympathetic hero. And they are shaped by three critical elements—a challenge, struggle, and some resolution
* Prepare your stories in advance. But before you launch into your script, take some time to learn about your audience.
For John Mapes and Sal Mo:

Intralign
Newyorker articles on the health system by Atul Gawande, MD
http://www.newyorker.com/reporting/2009/06/01/090601fa_fact_gawande
http://www.newyorker.com/reporting/2011/01/24/110124fa_fact_gawande
http://www.newyorker.com/reporting/2012/08/13/120813fa_fact_gawande

Lumosity and Fitbrains offer a range of simple online exercises that are proven to train your brain to both retain information and think faster.

http://gmailblog.blogspot.com/2009/02/tip-manage-several-email-accounts-with.html#!/2009/02/tip-manage-several-email-accounts-with.html

http://lifehacker.com/5157825/use-gmails-multiple-inboxes-feature-to-manage-multiple-addresses

for shoes: wire coat hangers cut off & bent into hooks

Use website-blocking software to get rid of tempting distractions while you work.
Cold Turkey is an easy to use free software.

Big 5 elements

The Science

jobFig utilizes the Five Factor Model of Personality to build a representation of how you display yourself to the world. This model shows your level of demonstration of five core personality traits shared by all people. It is widely accepted as a leading method of psychometric assessments. Each of the 5 personality traits have 6 subtraits. The five personality traits are as follows:
  1. Openness
  2. Conscientiousness
  3. Extraversion
  4. Agreeableness
  5. Neuroticism (Emotional Stability)
We convert the completed assessment into scores of personality representing how much that candidate or employee demonstrates of that particular trait. The level of demonstration will dictate the most likely behaviors that are driven by the traits and which will also be influenced by the other members of the group and be moderated by company guidelines, upbringing, education and group work experience.
With each candidate hired, the system gathers new insights into how to predict success for successive candidates and teams.


Openness

The first trait measures a person’s openness to new experiences. If a person demonstrates a high level of openness, they are likely to show an appreciation for art. They have a vivid imagination and a high intellectual curiosity. On the other side of the spectrum, “closed” people will resist change and are skeptical to accept new ideas. They are more reserved and conservative.
There are 6 facets of Openness in the Five Factor Model that a person is rated on. They are:
  1. Imagination
  2. Artistic Interests
  3. Emotionality
  4. Adventurousness
  5. Intellect
  6. Liberalism


Conscientiousness

Conscientiousness is the measure of how well a person controls his/her impulses. The main component of conscientiousness is self-discipline. A highly conscientious person plans ahead and pre-weighs the consequences of his/her actions. Someone with a low level of conscientiousness is highly impulsive. They act spontaneously and with little planning.
There are 6 facets of Conscientiousness to be evaluated on. They are:
  1. Self-Efficacy
  2. Orderliness
  3. Dutifulness
  4. Achievement-Striving
  5. Self-Discipline
  6. Cautiousness


Extraversion

The third personality trait measured by the Five Factor Model is Extraversion. This is the measure of how involved a person is with others. Highly extraverted individuals seek gratification from outside influences. They are enthusiastic and outgoing. Introverts are the opposite. Not to be taken as anti-social or shy, introverts require less stimulation from other people in their daily lives. They are independent and prefer to be alone.
The 6 facets of Extraversion are as follows:
  1. Friendliness
  2. Gregariousness
  3. Assertiveness
  4. Activity Level
  5. Excitement Seeking
  6. Cheerfulness


Agreeableness

Agreeableness measures the person’s concern with cooperation and social harmony. An agreeable person is friendly, optimistic, and works well with others. They value getting along with their peers. A disagreeable person on the other hand, is not considerate of other people’s feelings and well-being. They tend be less trusting and more skeptical of their peers.
The 6 facets of Agreeableness are:
  1. Trust
  2. Morality
  3. Altruism
  4. Cooperation
  5. Modesty
  6. Sympathy


Neuroticism (Emotional Stability)

The final trait of the Five Factor Model is Neuroticism. In a nutshell, neuroticism is the tendency to experience negative emotions. It is the measure of a person’s (lack of) emotional stability. A highly neurotic individual frequently shows feelings of anger, frustration, and anxiety. Emotion plays a significant role in a neurotic person’s behavior. On the other hand, someone with a low level of neuroticism is much less emotionally affected by external events. They tend to be more calm, low-key, and stable with their feelings. These individuals are much more relaxed in stressful situations.
The 6 facets of neuroticism are:
  1. Anxiety
  2. Anger
  3. Depression
  4. Self-Consciousness
  5. Immoderation
  6. Vulnerability


Openness   

  • 100         Imagination          This person will most likely enjoy brain storming sessions and thinking through future scenarios.
  • 100         Artistic Interests This person will most likely have a strong opinion on design ideas and be enthused about contributing aesthetically.
  • 100         Emotionality         This person won't have a problem showing emotions or being around emotional people. This makes them natural spokesmodels for a cause, but can also make objective decisions difficult.
  • 94           Adventurousness                This person will jump at the opportunity to try new things or work on new projects. They likely find the risk of failure exciting, and consider the challenge to be as rewarding as success.
  • 100         Intellect This person loves abstract thinking and can handle a lot of information without being overloaded. May enjoy intellectual challenges such as sudoku or crossword puzzles.
  • 81           Liberalism             This person is most likely very liberal, standing up for non-conformists and individual freedom of expression.


  • 75           Self-Efficacy           This person is aware of their capabilities, and may be prone to over-confidence. Words of restraint will be of benefit to keep them from getting overextended.
  • 50           Orderliness           This person is generally organized, but will not be overly upset with cluttered workspaces or undefined processes.
  • 94           Dutifulness            This person is usually a few minutes early to everything and feels that meeting their commitments is of the utmost importance.
  • 63           Achievement-Striving         This person has a strong desire to perform well at work, but is not willing to sacrifice their personal life or health.
  • 56           Self-Discipline       This person will usually begin tasks and set project goals shortly after receiving new work, but may occasionally become distracted and fall behind on their work.
  • 31           Cautiousness        This person will usually strike a good balance between caution and calculated risk-taking.


  • 94           Friendliness          This person will want to get to know everyone in the company and will typically enjoy ongoing interactions in a group setting.
  • 44           Gregariousness    This person is capable of enjoying working alone or in groups. They will form relationships at work, but likely need alone time as well.
  • 50           Assertiveness       This person will be clear in their desires, but will not be overly aggressive in trying to get their way.
  • 63           Activity Level        This person likely enjoys high paced work, but needs downtime. They are likely to have a regular exercise practice, but are probably not the star office athlete.
  • 81           Excitement Seeking            This person loves adrenaline and pushing their limits. They are likely to regularly try new activities and may be considered a thrill-seeker by others.
  • 75           Cheerfulness        This person is able to remain cheerful even under the most trying of circumstances.


  • 94           Trust       This person is very trusting of others, possibly to the point of being naive. This person generally has a natural sincerity which is quickly picked up by those around them.
  • 75           Morality This person has a clear sense of right and wrong and strives to maintain a moral code. Treating others fairly and honestly are both practices of someone with a high morality.
  • 94           Altruism                This person will quickly offer to help those in need, whether friend or stranger. This person may sacrifice opportunities or their own well being to support another person.
  • 81           Cooperation         This person is conciliatory and likes to work with others. They seek consensus and enjoy achieving success as a group.
  • 19           Modesty                This person has a high opinion of their abilities, warranted or not, and may try to draw attention to themselves through their dress or actions.
  • 94           Sympathy              This person may be highly empathetic and easily affected by the suffering of others. They try to help ease other's pain as much as possible.


  • 25           Anxiety  This person stays calm and does not worry too much about future outcomes or past actions. They likely use available information to quickly make informed decisions.
  • 19           Anger     This person is not easily upset by others or their actions. They typically maintain a calm, collected approach even under trying circumstances.
  • 38           Depression            This person may have mild mood swings but will generally maintain a positive outlook.
  • 44           Self-Consciousness              This person may go into new social situations willingly, but likely feels most comfortable doing so with a group of trusted friends.
  • 44           Immoderation     This person may have guilty pleasures that they indulge in privately, but they are likely to maintain a professional, reserved persona in public situations.
  • 19           Vulnerability         This person is likely to remain calm despite a sudden change in events and will have confidence in their ability to still accomplish their goals.

FDR: "I agree with you. Now make me do it."

List of 'to-do's' for Obama's 2nd term:

Obama absolutely needs to be pushed in order to make important decisions. Remember, he's always being pushed, if not by the side of the 99%, it's by the side of the 1%, so it's not a matter of pushing or letting him govern in peace.

My list would start with Immigration.
specifically, I'd like:

  1. Marriage equality -- Make it clear that all immigration agencies, DHS, DOS, DOL, all should treat all marriages equally. In places where legal marriage is not yet allowed, couples should be allowed to present the facts of the case for consideration: if the relationship looks, sounds and feels like a marriage, the adjudicators should be able to give it the importance given to a legal marriage.
  2. Waiver Applications within the US -- Allow us to file applications for all kinds of waivers within the US instead of having to wait to file them after the individual has gone to the US consulate abroad. This would avoid unnecessary hardhip to thousands of families.
  3. DACA expansion -- Allow applicants to file waiver applications along with their DACA applications. This would allow consideration of more complicated cases.
  4. Morton Memo Affirmative Applications -- Expand the age groups allowed to file for DACA-type programs. The Morton Memo on exercise of prosecutorial discretion is the memo that underlies DACA. It sets out the priorities for ICE enforcement. Create a procedure for us to present the facts that show that we have been good members of society, and should not be living in constant fear of deportation.
  5. Allow waivers of unlawful presence which include hardship to US employeers, using the PERM labor certification process. US employers often have key employees who turn out to be out of status. The employers should have a way to present the importance of those individuals to their companies for consideration.
  6. STEM graduates.
    1. Expand OPT.
    2. Use Group A Schedule II 'pre-certification' to establish priorities for who can be petitioned for green cards without waiting.
    3. Use EB-5 conditional residence and Canadian provincial programs as models to allow priorities for underserved areas. We don't need a one-size-fits-all system. If anti-immigrant states want to opt out, fine, let them.
  7. Expand the visa quota for EB-2 at least to eliminate the backlog for these highly valuable immigrants. They are force-multipliers, creating many more jobs.
  8. Use L-1A New Office as a model for a start-up visa class for entrepreneurs without regard to oversease companies.

http://www.huffingtonpost.com/arianna-huffington/the-president-asked-us-to_b_2130035.html

Here's Arianna's list, all of which look good to me:
  1. Foreclosures
  2. Drones
  3. Prisons
  4. Drug Ware
  5. Climate Change
  6. Voting

Music and personality


http://www.scienceofrelationships.com/home/2012/1/27/i-need-to-see-your-ipod-before-we-can-go-out.html

Music and social trends:
http://www.huffingtonpost.com/2012/11/13/pop-music-study-minor-key_n_2122726.html?ref=topbar


Tuesday, November 13, 2012

The Myth of the Allergy-Free Dog

http://well.blogs.nytimes.com/2011/07/11/the-myth-of-the-allergy-free-dog/