Archive for the Computers and Technology Category

SEC employees “disciplined” for accessing porn on govt. computers

Posted in BIG Government, Computers and Technology, FAIL, Government Waste/Fraud/Abuse, UGH! on March 10, 2011 by DaMook

The SEC has finally “disciplined” 33 employees for accessing porn on their government computers (previous posts here and here). According to this story (from WLS-TV) all of the employees have now been “disciplined” or are receiving “counseling.”

The U.S. Securities and Exchange Commission has now disciplined 33 employees for accessing pornography while on the job, using government computers.In this Intelligence Report: Many of them were lawyers and senior officials, and some were in Chicago.

Some of the employees spent every working hour looking at internet pornography then attributed their behavior to an addiction.

This conduct went on for at least five years in some cases and involved numerous high-ranking employees of the federal agency that regulates the securities industry in at least seven SEC offices including Chicago.

In the three years since the American financial system nearly crashed, some top staffers of the federal agency in charge of market recovery spent their days doing something else on their computers– including a senior attorney who spent eight hours a day in his office accessing so much pornography he ran out of hard drive storage and had to transfer photos and video to CDs and DVDs.

According to results of an internal pornography investigation, 33 employees at SEC offices, including Chicago, have now been disciplined or are receiving counseling, including an SEC accountant who searched for pornography via his government computer 16,000 times in a month, bypassing an internal government filter. He received a 14-day suspension.

All of the SEC workers cited for government ethics violations were paid at least $99,000 a year. Seventeen of them were considered senior-level employees earning annual salaries of as much as $222,000.

The SEC has almost 4000 employees and will soon hire more to accommodate the Dodd-Frank boot-to-the-face legislation passed last year. These 33 are just the ones they decided to go after. You can be sure that there are many, many more who either slipped under the radar or where considered little fish.

No details on the “discipline” but none were fired – some even claimed “victim” status. How do you think a private sector company would have handled this? Would any of these porn surfers still be employed?

FAIL: Feds “accidently” shut down 84,000 websites for bogus child porn

Posted in BIG Government, Computers and Technology, FAIL, Government Folly, UGH! on February 17, 2011 by DaMook

porn bannerWith laser-guided precision, the DOJ and Homeland Security dropped the hammer on some child porn websites over the weekend – 84,000 of them. The websites were seized and home pages were replaced with a page accusing them of distributing child porn. Great! Uh, wait a minute… I smell a FAIL coming… Ah yes, here it is (from Gizmodo):

“Operation Protect Our Children” sounded great! The Department of Justice and Homeland Security’s tag-team beatdown was supposed to seize ten criminal sites this past weekend. Instead, it shuttered 84,000 innocent domains. And replaced them with a banner labeling them as child porn traffickers. Whoops!

The 83,990 sites that weren’t hosting underage porn were stuck with a the gigantic graphic seen here for days after the error was realized. Not exactly a trivial accusation—and an extremely damaging one for the sites, which were mostly personal and small business pages. FreeDNS—the domain service behind the affected sites—was forced to comply with the takedown request by court order, but was clearly (and rightfully) pissed at the misuse of their system: “freedns.afraid.org has never allowed this type of abuse,” they commented. At the moment, nobody has any idea how the tremendous screwup happened.

The government’s response to this grossly inept boot-to-the-face? Oh well, at least we got those 10 kiddie porn sites shut down.

Surely, DoJ and DHS must be a little red in the face over the whole thing. Right? Right..? Nope. In a beaming statement released yesterday, Secretary of Homeland Security Janet Napolitano heroically explained that “Each year, far too many children fall prey to sexual predators and all too often, these heinous acts are recorded in photos and on video and released on the Internet. DHS is committed to working with our law enforcement partners to shut down websites that promote child pornography to protect these children from further victimization.”

Child porn is certainly a disgusting problem and the purveyors should be vigorously prosecuted. Unfortunately the assclowns at DOJ and DHS used a tactical nuke instead of a flyswatter. The failure to at least admit that they made a mistake only rubs salt in the wound.

Why is our FAIL tolerance level so high for government?

Feds Accidentally Shut Down 84,000 Websites over Wrongful Kiddie Porn Accusation “Operation Protect Our Children” sounded great! The Department of Justice and Homeland Security‘s tag-team beatdown was supposed to seize ten criminal sites this past weekend. Instead, it shuttered 84,000 innocent domains. And replaced them with a banner labeling them as child porn traffickers. Whoops!

New internet star – Heidi the cross-eyed opossum

Posted in Computers and Technology, Cool Stuff on January 12, 2011 by DaMook
opossum

Heidi

There’s a new internet “star” – at least in Germany. Meet Heidi the cross-eyed opossum (story here).

First, it was Knut, the overwhelmingly cute polar bear. Then, it was Paul, the World Cup oracle octopus. Now, the latest German zoo resident to gain massive fame is Heidi, the cross-eyed opossum, currently in residence at the Leipzig Zoo.Heidi will not be on public view until July, but she already has 50,000 Facebook fans, a YouTube hit and a stuffed doll modeled after her, reports the German news magazine, Der Spiegel.

The adorable, Muppet-like opossum shot to fame after a German tabloid went to photograph the Leipzig Zoo’s new “Gondwanaland,” a theme area designed to recreate primitive times, according to the report. All it took was one look, and the German public was in love.

Heidi is a Virginia Opossum, which the Ohio Department of Natural Resources describes as “one of the oldest and most primitive species of mammal in North America. This animal is little changed from its ancestors 70 million years ago.” Besides being the only marsupial to originate in North America, the species is most famous for giving rise to the phrase “playing possum,” because they frequently react to threats by pretending to be dead.Zoo officials speculate that her crossed eyes might have been caused by a bad diet early in life, Der Spiegel reports. The eyes might look off, but they cause the animal no pain, and don’t affect her ability to get around, according to the zoo. She is, aside from her looks, a normal opossum.

Great story. I love the internet!

Word Lens: iPhone app does instant translation

Posted in Computers and Technology, Cool Stuff, Culture on December 22, 2010 by DaMook

This is amazing – an iPhone app that instantly translates whatever is in front of the camera in real time.

Word Lens for the iPhone is one of the most amazing apps we have ever seen. Take a look at this, but put down any hot liquids first.It’s an augmented-reality, OCR-capable translation app, but that’s a poor description. A better one would be “magic.” World Lens looks at any printed text through the iPhone’s camera, reads it, translates between Spanish and English. That’s pretty impressive already — it does it in real time — but it also matches the color, font and perspective of the text, and remaps it onto the image. It’s as if the world itself has been translated.

Impressed? You’re not the only one. John Gruber of Daring Fireball puts it best: “[It’s] as though near-future time travelers started sending us apps instead of Terminators.”

We’ve tested the app, and it works just as shown in the video. In demo mode, it can rearrange (or blank out) any text in the camera’s field of vision. You need to purchase translation packs to do the actual translation.

I’m not an Apple fan but I’ve got to admit, the iPhone and iPad sure have some amazing apps.

Cool stuff – the Joy of Stats

Posted in Computers and Technology, Cool Stuff, Culture on December 5, 2010 by DaMook

200 countries over 200 years – the Joy of Stats.

I like this…

Stuxnet – the first “weaponized” computer virus

Posted in Computers and Technology, Culture on November 28, 2010 by DaMook

Stuxnet (more here) is a computer virus that was designed to attack Supervisory Control and Data Acquisition (SCADA) systems manufactured by Siemens. These systems are used in a variety of industrial applications including power plants, energy distribution networks and water supplies. The primary target of this sophisticated virus appears to be the Iranian nuclear program and it had a significant effect on their progress. Thus far no one knows exactly who developed Stuxnet but as more info is revealed, it is clear that this was not the work of some kid looking for a thrill. The sheer complexity and stealthiness of this virus pushes the envelope of cyberwarfare. The whole scenario has all the makings of a spy thriller.

The mission: Infiltrate the highly advanced, securely guarded enemy headquarters where scientists in the clutches of an evil master are secretly building a weapon that can destroy the world. Then render that weapon harmless and escape undetected.

But in the 21st century, Bond doesn’t get the call. Instead, the job is handled by a suave and very sophisticated secret computer worm, a jumble of code called Stuxnet, which in the last year has not only crippled Iran’s nuclear program but has caused a major rethinking of computer security around the globe.

Intelligence agencies, computer security companies and the nuclear industry have been trying to analyze the worm since it was discovered in June by a Belarus-based company that was doing business in Iran. And what they’ve all found, says Sean McGurk, the Homeland Security Department’s acting director of national cyber security and communications integration, is a “game changer.”

The construction of the worm was so advanced, it was “like the arrival of an F-35 into a World War I battlefield,” says Ralph Langner, the computer expert who was the first to sound the alarm about Stuxnet. Others have called it the first “weaponized” computer virus.

Simply put, Stuxnet is an incredibly advanced, undetectable computer worm that took years to construct and was designed to jump from computer to computer until it found the specific, protected control system that it aimed to destroy: Iran’s nuclear enrichment program.

The virus was designed to damage (but not destroy) the complex centrifuges which are used to enrich uranium. It did this by changing the rotational speed while hiding it from the built-in sensors. This not only damaged the centrifuge but also the uranium contained inside. Because this was hidden from the internal sensors and controls, the causes for the damage could not easily be determined.

The real genius of Stuxnet however, is in how it penetrated the many levels of security in the Iranian nuclear facilities.

–The nuclear facility in Iran runs an “air gap” security system, meaning it has no connections to the Web, making it secure from outside penetration. Stuxnet was designed and sent into the area around Iran’s Natanz nuclear power plant — just how may never be known — to infect a number of computers on the assumption that someone working in the plant would take work home on a flash drive, acquire the worm and then bring it back to the plant.

–Once the worm was inside the plant, the next step was to get the computer system there to trust it and allow it into the system. That was accomplished because the worm contained a “digital certificate” stolen from JMicron, a large company in an industrial park in Taiwan. (When the worm was later discovered it quickly replaced the original digital certificate with another certificate, also stolen from another company, Realtek, a few doors down in the same industrial park in Taiwan.)

–Once allowed entry, the worm contained four “Zero Day” elements in its first target, the Windows 7 operating system that controlled the overall operation of the plant. Zero Day elements are rare and extremely valuable vulnerabilities in a computer system that can be exploited only once. Two of the vulnerabilities were known, but the other two had never been discovered. Experts say no hacker would waste Zero Days in that manner.

–After penetrating the Windows 7 operating system, the code then targeted the “frequency converters” that ran the centrifuges. To do that it used specifications from the manufacturers of the converters. One was Vacon, a Finnish Company, and the other Fararo Paya, an Iranian company. What surprises experts at this step is that the Iranian company was so secret that not even the IAEA knew about it.

–The worm also knew that the complex control system that ran the centrifuges was built by Siemens, the German manufacturer, and — remarkably — how that system worked as well and how to mask its activities from it.

–Masking itself from the plant’s security and other systems, the worm then ordered the centrifuges to rotate extremely fast, and then to slow down precipitously. This damaged the converter, the centrifuges and the bearings, and it corrupted the uranium in the tubes. It also left Iranian nuclear engineers wondering what was wrong, as computer checks showed no malfunctions in the operating system.

It may take the Iranians more than a year to clean their systems of Stuxnet. Meanwhile a clampdown by the state counterintelligence services will hamper the normal activities of the scientists – a side benefit of the virus.

One additional impact that can be attributed to the worm, according to David Albright of the Center for Strategic and International Studies, is that “the lives of the scientists working in the facility have become a living hell because of counter-intelligence agents brought into the plant” to battle the breach. Ironically, even after its discovery, the worm has succeeded in slowing down Iran’s reputed effort to build an atomic weapon. And Langer says that the efforts by the Iranians to cleanse Stuxnet from their system “will probably take another year to complete,” and during that time the plant will not be able to function anywhere normally.

More details will likely emerge about this affair, although we may never find out who was responsible. Hopefully it will serve as a lesson that we need to step up our efforts to protect all vital computer systems – not just military. Cyberwarefare is real and Stuxnet just raised the threat level.

Friends in high places – Google edition

Posted in BIG Government, Computers and Technology, The Regime on October 29, 2010 by DaMook

Google has apparently taken a page from the Goldman Sachs playbook on how to infiltrate the government (more on Goldman here). All the more reason to give Google the heave-ho (previous post).

In a scandal earlier this year, it was revealed that after being hired by the White House as Deputy Chief Technology Officer, former Google public policy director (lobbyist) Andrew McLaughlin had ongoing discussions with Google lobbyists and officials concerning regime policy. (stories here and here) At the very minimum, this violated WH staff ethics rules. It was also revealed that McLaughlin tried to hide these communications by using private email accounts. He was “reprimanded” by the regime.

This story (from BigGovernment.com) reveals how the FTC dropped its investigation of Google’s spying, data mining, and privacy violations (Wi-Spying) – one week after one of their employees hosted a $30,000 a plate fundraiser featuring our dear comrade leader. As the Church Lady would say, How conveeeeeeeenient! Here’s the timeline:

  • “Google’s Marissa Mayer is hosting President Obama for a Democratic party fundraiser tonight. Tickets are $30,000-a-head….” – San Francisco Chronicle, October 21, 2010
  • “After analyzing the unencrypted WiFi payload data captured by its Street View cars, Google now admits that the system captured entire e-mails, URLs and even user passwords.” – ZDNet, October 23, 2010
  • “The Federal Trade Commission [has] closed its investigation into Google’s collection of consumer data through its Street View cars….”  San Francisco Chronicle, October 27, 2010

The FTC decision is a classic DC whitewash, but it a pattern for this administration which has repeatedly given Google “get out of jail free” cards, no-bid contracts and undisclosed lobbying and business access to top administration officials.  And when Big Government exposed the administration coordinating privately with Google, what happened?

Nothing.

That isn’t true everywhere.

  • The Canadian Privacy Commissioner recently found that Google did indeed capture personal sensitive information as part of its Wi-Spying
  • The British Government just re-opened their investigation into Google Wi-Spy over the weekend
  • Over 35 States Attorneys General continue to investigate privacy violations related to WiSpy

But in the United States, where a top Google executive hosted a $1.8 million fundraiser in her home for President Obama last week?

Nothing.

Google’s Eric Schmidt recently said, “The average American doesn’t realize how much of the laws are written by lobbyists”.  He was clearly speaking from experience.

Congress must hold hearings on this FTC whitewash to put the facts on the table and find the truth.

Indeed. Our dear comrade leader often excoriates the republicans as being in bed with “big business.” Unfortunately the state-run media is asleep at the switch when the regime’s big business ties are exposed.

Good work, BigGovernment.com…

Hey Google – UP YOURS!

Posted in Computers and Technology, Culture, UGH! on October 26, 2010 by DaMook

After reading this story, I have removed the Google toolbar and all links to Google, and closed my GMail account. As far as I’m concerned, I hope this hideous company goes out of business.

Google’s CEO, Eric Schmidt, is not only a high-order douchebag, but also a sanctimonious asswipe to boot. As evidence of this, here are some of his comments on some of the widely-panned and nefarious Google activities that have recently come to light:

  • Addressed criticisms of Google’s stance on privacy by saying, “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”
  • Claimed people want Google to “tell them what they should be doing next.”
  • Said of Google, “We know where you are. We know where you’ve been. We can more or less know what you’re thinking about.”
  • Said this: “One day we had a conversation where we figured we could just try to predict the stock market. And then we decided it was illegal. So we stopped doing that.”
  • Suggested name changes to protect adults from the Web’s record of their youthful indiscretions.
  • Said this: “What we’re really doing is building an augmented version of humanity, building computers to help humans do the things they don’t do well better.”

His most recent comment was the impetus for this post and the final straw for me.

And Schmidt’s far from done. Appearing on CNN’s “Parker Spitzer” program last week, he said that people who don’t like Google’s Street View cars taking pictures of their homes and businesses “can just move” afterward to protect their privacy. Ironically, he said this on the very day that Google admitted those cars captured more than just fragments of personal payload data.

Interestingly, CNN has since edited that quote out of Schmidt’s segment. Did Google ask CNN to remove it? Who knows. Perhaps the company has finally realized that Schmidt’s penchant for indulging in this sort of pedantic dorkery doesn’t do much for its public image.

Freaking people out with asinine power-tripping pronouncements might be great fun for Schmidt, but it isn’t a wise PR strategy, particularly when Google is a company about which the public and government are increasingly concerned.

So if you don’t like having photos of your house shown on a world wide map and your wireless network data stolen, you can “just move?” How about I toss a spike strip or scatter a box of roofing nails in the street the next time I see one of your data stealing cars coming? Too bad you didn’t say this on a real news program instead of the lowest rated primetime cable show.

Previous Google posts:

New FBI computer records system FAIL

Posted in BIG Government, Computers and Technology, FAIL, Government Folly, Huh? WTF?, Take back America on October 21, 2010 by DaMook

Here we are, a decade into the 21st Century, and the FBI caseload system is still largely paper based. Huh, WTF??? I have had a home computer since 1986 and my entire home record and bill paying system has been computerized since 1990. I guess you could call me an early adopter.

The FBI’s first attempt to computerize their caseload system began in 2000 with the Trilogy project. As with almost everything the government does, it was an epic costly FAIL.

In 2000, the FBI began the Trilogy project to upgrade its outdated information technology (IT) infrastructure. This project, originally scheduled to take three years and cost around $380 million, ended up going far over budget and behind schedule. Efforts to deploy modern computers and networking equipment were generally successful, but attempts to develop new investigation software, outsourced to Science Applications International Corporation (SAIC), were a disaster. Virtual Case File, or VCF, as the software was known, was plagued by poorly defined goals, and repeated changes in management.In January 2005, more than two years after the software was originally planned for completion, the FBI officially abandoned the project

Cost to taxpayers for this FAIL – $170M. After taking a Mulligan on Trilogy, the geniuses launched project Sentinel – an even more ambitious effort. Sentinel was supposed to go on line December 2009 at a cost of $425M. What was the result? The only possible result, of course – FAIL. (story here from the Washington Examiner)

After years of costly delays, a long-awaited computerized system for managing the FBI’s caseload remains far from completion and risks coming so late that it will be obsolete on arrival, a Justice Department report warned Wednesday.

The Sentinel system was designed as a user-friendly paperless way to manage cases that would be ready in December 2009 at a cost $425 million. It replaced an earlier $170 million computer program that was scrapped after consultants deemed it outdated and riddled with problems.

The program’s funding was raised to $451 million in 2008 but the Justice Department’s Office of the Inspector General said the project is now $100 million over budget and nowhere near finished.

It warned that the longer Sentinel takes to complete, “the more likely it is that already implemented hardware and software features will become obsolete.”

The report recommended that the FBI reassess the program’s requirements — including one that it integrate millions of records from the largely paper-based system now being used — and to focus on requirements that most affect agents and analysts.

In a letter to the Office of Inspector General, the FBI said it agreed with the recommendations and had already started working on them.

But in a statement issued Wednesday, FBI Associate Deputy Director Thomas J. Harrington criticized the report, saying it relied on outdated cost estimates and didn’t give the FBI enough credit for making changes to the program.

Vermont Democratic Sen. Patrick Leahy, chairman of the Senate Judiciary Committee, called the report “disheartening.”

Disheartening? Wasting 10 years and $620M with almost nothing to show for it. No, Mr. Leahy, I don’t believe that is an appropriate response from a senator who oversees the DOJ and FBI. How about disgusting. Or disastrous. Better yet, how about turning the FBI on its head and shaking out the morons responsible for this failure at all levels. Heads should roll and asses should be kicked. That’s the appropriate response to this.

This used to be a country that led the world in technology innovation. We went from putting monkeys in orbit to landing men on the moon in less than a decade. We simply cannot accept this level of failure from our government any longer.

Full IG report here.

“Progressives” attempt to manipulate internet search results

Posted in Computers and Technology, Culture, UGH! on October 9, 2010 by DaMook

If you get most of your news and information from the internet (as I do), you should take what you read with a grain of salt. You should try to verify the information before you believe it to be true. This is especially the case if you plan to post it or forward it via email. You could end up looking like a jackass.

One way to separate fact from fiction is to do a search for your subject using one of the various search engines like Bing, Google and Yahoo. Generally you can find numerous sources for independent information on virtually any subject. But can you be certain that the search results will lead you to the right source of info? Most of the time, the answer is yes. However, as this article (from Bryan Preston at  PajamasMedia) points out, that may not always be the case – especially if you’re seeking info on republican political candidates.

They’re not calling it Googlebombing, of course. Chris Bowers at Daily Kos has given their new effort a happier name: “Grassroots SEO.”  The SEO stands for “search engine optimization.” It’s actually search engine manipulation:

The goal of Grassroots SEO is to get as many undecided voters as possible to read the most damaging news article about the Republican candidate for Congress in their district. It is based on two simple premises:

  1. One of the most common political activities people take online is to use search engines, mainly Google, to find information on candidates. (For more information, see the Pew Internet and American Life Project’s report on 2008 online political engagement.)
  1. These results of these searches are always in flux based upon hyperlinks anyone posts anywhere on the Internet, including message board comments and social networking sites (but not email).

As a result of this, not only is it possible for us to use our hyperlinks to impact what people find when they search for information on candidates, but we would be foolish not to do so in a way that benefited our preferred candidates. We are already impacting search engine rankings whenever we post any hyperlink anywhere, so we need to make sure the way we use hyperlinks helps result in our preferred political outcomes.

The comments that DKossacks have attached to the post are revealing. Several complain that it’s ethically questionable. Others complain that once the other side learns about it, we’ll either mock it or emulate it, or both.

You have got to hand it to the “progressives” on this point – they have long been technology-savvy, particularly with their use of the internet. Our dear comrade leader’s campaign used the internet to score a pile of cash, including millions from foreign donors (illegally). The complicit state-run media turned a blind eye to this because it was “their guy” who was doing it.

Preston goes on to point out that the Kos campaign is just another tactic of the “Shadow Party.”

I’m here to expose it and point out that it’s another manifestation of the Shadow Party.

The Shadow Party exists, remember, to destroy Republicans by generating complaints against them which generate negative press for them. To that end, the Shadow Party sets up front groups to pose as non-partisan watchdogs or as non-partisan media outlets, and deploys those groups and outlets to build up an echo chamber that generates so much noise that the so-called mainstream press reports on it. The game is to ruin the Republican’s reputation, drive up their negatives, and then have the Democrat in the race win by default. In some cases that I know of in Texas, the actual Democrat being proffered is just a cutout for big money Democrats to control once they’re elected. The whole enterprise is the very “politics of personal destruction” that Democrats busily and dishonestly decry, even while they seek to benefit from it.

And here comes the Daily Kos on the back end of that. They are, by their own admission, searching out the most damaging stories on Republicans and then going to work to drive them higher in Google search rankings so that unsuspecting voters will stumble upon them when seeking out information about their local candidates. This makes DKos and its readers activists, as opposed to bloggers or blog readers. And they are engaging directly in the politics of personal destruction.

Kos will undoubtedly deny any connection to Soros or any other Shadow Party operator or funder.  That’s what he did when I debated him. But Chris Bowers’ post is proof positive that he and his blog are part of the left’s Shadow Party (not that there was any doubt before).  Their “Grassroots SEO” wouldn’t work as well if the Shadow Party hadn’t already laid the necessary groundwork of manipulating a willing press into hounding Republicans on these mostly bogus complaints.

Blogs and, more importantly, candidates on the right should take note of the DKos “Grassroots SEO” effort and see it for what it is: an attempt to fool unsuspecting voters into pulling the lever based not on issues, but on manipulation and lies.  Of course, this isn’t new, it’s just a new version of what these folks have been doing for years.

Kudos to Mr. Preston for shining a light on this nefarious business.

As an aside, I have known for quite some time that Google manipulates search results to fit its social (leftist) agenda. (previous post here) It is now my #3 search engine behind Bing and Yahoo.

Wind power FAIL in England

Posted in BIG Government, Climategate, Computers and Technology, Government Folly, Government Waste/Fraud/Abuse on August 17, 2010 by DaMook

In case you think I’m a naysayer on sustainable (green) power generation, I assure you, I am not. I believe that we should be pursuing such technology. What I don’t believe is that the government should force it upon us while it is still clearly not sustainable. We should be looking at these technologies for the long term while, at the same time, investing in new technology for recovering and enhancing our current energy production. Let’s face it – until there are major breakthroughs in wind and solar power technology, we need to focus more resources on gas/oil/coal to get us through the short term. Electricity and fuel production capacity in the US is strained to the breaking point and green power will not address this problem.

I have posted on this before (here, here, and here) and this article (from the Daily Mail) is yet another example of green government FAIL. More than half of the wind farms built in England were placed in areas where there isn’t enough wind. They are operating at less than 25% of their rated power, costing taxpayers millions.

It’s not exactly rocket science – when building a wind farm, look for a site that is, well, quite windy.

But more than half of Britain’s wind farms are operating at less than 25 per cent capacity.

In England, the figure rises to 70 per cent of onshore developments, research shows.

Experts say that over-generous subsidies mean hundreds of turbines are going up on sites that are simply not breezy enough.

Britain’s most feeble wind farm is in Blyth Harbour in Northumberland, where the nine turbines lining the East Pier reach a meagre 4.9 per cent of their capacity.

Another at Chelker reservoir in North Yorkshire operates at only 5.3 per cent of its potential, the analysis of 2009 figures provided by energy regulator Ofgem found.

The ten turbines at Burton Wold in Northamptonshire have been running for just three years, but achieved only 19 per cent capacity.

Europe’s biggest wind farm, Whitelee, near Glasgow, boasts 140 turbines. But last year they ran at less than a quarter of their capacity.

The revelation that so many wind farms are under-performing will be of interest to those who argue that they are simply expensive eyesores.

So in the rush to get this green technology on line, apparently no one considered the little detail that you actually need some wind to spin the turbine so it makes electricity.  What motivates this foolishness? Government subsidies – from the taxpayers.

Under the controversial Renewable Obligation scheme, British consumers pay £1billion a year in their fuel bills to subsidise the drive towards renewable energy.

Turbines operating well under capacity are still doing well out of the scheme, but Professor Jefferson, of the London Metropolitan Business School, wants the cash to be reserved for the windiest sites.

He said: ‘There is a political motivation to drive non-fossil fuel energy, which I very much respect, but we need more focus.’

He suggests that the full subsidy be restricted to turbines which achieve capacity of 30 per cent or more – managed by just eight of England’s 104 on-shore wind farms last year.

There are several major problems with this buffoonery. First, the public is paying twice for this: on the consumer level in the form of higher energy prices, and on a taxpayer level in the form of subsidies. Second, the government subsidies wasted on this could have gone toward more efficient gas/oil/coal recovery and production – goals which are more realistic and attainable. By not addressing the immediate needs for more power and less dependence on foreign sources, we are facing an energy shortage in the immediate future.

The pursuit of failure is inexcusable.

Solar flares and the threat to our power grid

Posted in Computers and Technology, Culture, Government Folly on August 16, 2010 by DaMook

Sun spots have long fascinated astronomers and scientists. Following an approximate 11 year cycle of maximums and minimums, they are thought to be responsible for solar flares and coronal mass ejections. Both these phenomena are known to cause problems with communications, satellites, and the power grid. According to this story, as the sun awakens from its current 11 year minimum, it could present serious problems for the power grid.

Recent warnings by NASA that the Sun’s current lack of activity may soon come to an end with dire implications for the world’s power sector have refocused attention on the effort being made to harden the world’s electricity networks against electromagnetic interference.

To give some idea of the potential scale of such events, it is worth looking at the largest geomagnetic storm on record, which affected much of the northern hemisphere and lasted from August 28 to September 2, 1859. It disrupted power across most of Quebec and was caused by a coronal mass ejection (CME) from the Sun. Such was its ferocity that it took only 18 hours to reach earth instead of the several days normally required by similar phenomena. The impact was largely limited by the fact that the world’s love affair with electricity had only just begun. Now that the developed world is utterly reliant on stable power supplies for the delivery of all essential services, a similar event could result in a radically different outcome.

According to NASA, a solar maximum should arrive between 2012 and 2015. Because the most recent minimum was a period of unusually low solar activity, some are predicting the sun to come back with a vengeance.

Unfortunately, current projections by NASA suggest that we may soon be due for a CME on the scale of the 1859 event. According to Dr Richard Fisher, director of the agency’s heliophysics division, solar flare activity varies in accordance with an 11-year cycle and is currently emerging from a quiet period, while the sun’s magnetic energy peaks every 22 years. As a result, solar activity is set to reach its maximum during the 2012-2015 period.

Think for a moment of what life would be like without power for an extended period – like a year or two. It wouldn’t be pretty. One possible scenario is illustrated in the book One Second After by William Forstchen.

We need to stop wasting time, energy and resources on stupid nanny state bullshit and start looking at the real threats to our existence. Hardening the power grid is something that should be getting attention instead of how fat our kids are.

Happy Birthday PC

Posted in Computers and Technology, Cool Stuff on August 12, 2010 by DaMook

IBM PCTwenty nine years ago today IBM released the first true Personal Computer. It was obscenely expensive and had less computing power than your cell phone but it launched one of the greatest eras of technological advancement in history.

At the time I had a TI-99 and was suffering from serious PC envy. I was finally able to scrape up enough to buy a (non-IBM) PC XT in 1985. It had an Intel 8088 processor, 64MB RAM, CGA (16 color) graphics, a 5 1/2″ floppy drive and a huge 20MB hard drive. It set me back $3000 – $6152 adjusted for inflation.

It is amazing to consider what has happened with computers over the last 29 years…

Woman sues Google for bad directions

Posted in Computers and Technology, Culture, UGH! on June 2, 2010 by DaMook

Taking a page out of the McDonalds “hot coffee” lawsuit, a Los Angeles woman is suing Google for bad walking directions. It seems that the directions she got from Google Maps put her on a rural highway that didn’t have sidewalks so this idiot walked in the middle of the road and was hit by a car. (story here from PC World)

On January 19, 2010, Rosenberg was apparently trying to get from 96 Daly Street, Park City, Utah, to 1710 Prospector Avenue, Park City, Utah. She looked up the walking directions using Google Maps on her Blackberry. Google Maps suggested a route that included a half-mile walk down “Deer Valley Drive,” which is also known as “Utah State Route 224.”

There’s not much more to say–she started walking down the middle of a highway, and a car hit her. Who wouldn’t have seen that one coming?

This comment by the author of the story is pure gold:

For the record, when I look up driving directions from my current city (San Francisco, California) to the city I grew up in (Tokyo, Japan), Google Maps suggests I kayak across the Pacific Ocean (with a rest stop in Hawaii, of course).

I can’t wait until Ms. Rosenberg tries to travel overseas (“The plaintiff was unaware that attempting to kayak 5,100 miles is an unreasonable endeavor”).

I can’t see where Google can be held responsible for this woman’s profound stupidity. This is yet another example of why we need some serious tort reform.

The Google Beast

Posted in Computers and Technology, Culture, UGH! on May 20, 2010 by DaMook

The phenomenal success of Google is truly amazing and a testament to the concept of free enterprise. Google is also an example of crony capitalism growing out of control with the recent controversy involving one of its former employees who now works for the administration of our dear comrade leader. (story here) Talk about an inside track to the government – ugh.

One of the most disturbing revelations to come to light recently illustrates how Google has become a data sucking monster that threatens everyone’s privacy. Unlike the recent privacy concerns involving Facebook, where you have the option to cancel your account or not open one to begin with, Google’s data mining affects everyone within range of their Street View vehicles. As this story (from PCWorld) points out, Google has been collecting info from wireless networks while photographing.

Right about now Facebook should be sending Google a bouquet of roses and a box of chocolates, because the search/advertising giant has committed a privacy violation that makes Facebook’s recent troubles seem trivial.The skinny: Google has been Hoovering up data from open WiFi networks around the world — some 600 gigs’ worth, according to the AP — which is tantamount to wiretapping and may well violate federal and international laws.

Now that I’ve got your attention, here’s some background.

When Google sends its fleet of camera-equipped cars into the streets to snap pictures of your neighborhood for its Street View product, these cars are also collecting something a little extra: The name and unique MAC address of every open WiFi network they encounter along the way.

While most people have encrypted networks, there are still many who run them wide open. Of the 7 wireless networks I can see from my laptop at home, 4 of them are not password protected. These people are at risk in more ways than one.

Here’s something nobody — including apparently most of the people at Google — knew until last week. In addition to the SSID and MAC address, Google’s WiFi antennas were also siphoning off unencrypted data as it passed through wireless routers and out onto the InterWebs. That could potentially include email, passwords, Facebook or Twitter status updates, Web sites visited — really, anything not protected by an encrypted SSL (https:) connection.

According to the article, this was a result of a bug in Google’s software – at least that’s what Google claims.

Apparently, a bug in the software Google has been using since 2007 automatically collected some of this data. Google itself wasn’t even aware of this data collection (and as recently as April 27 firmly denied it). Google only discovered this after the Data Protection Authority in Hanover, Germany, demanded Google audit its WiFi data.

Since then, Google has admitted it screwed up, bad. It’s stopped collecting this data and begun deleting it, under the direction of various countries where the data was collected. And it will introduce an encrypted search option next week.

Combine this with Google’s tentacles into the federal government and you have a prescription for disaster.

Feds pushing harder for internet regulation

Posted in BIG Government, Computers and Technology on May 7, 2010 by DaMook

The internet has exploded over the past 10 years or so. (statistics here) In North America 76% of residents are connected – an increase of 177% in 10 years. This is no accident as the internet is one of the last industries relatively free of boot-to-the-face government meddling regulation. It is a prime example of free market economics. Access and bandwidth have increased substantially because of competition. This obviously presents a dilemma for our dear comrade leader and the majority in the politboro and they are hard at work trying to fix it. (Story here from the WSJ)

After being slapped down by a federal court that failed to see where the FCC had any regulative authority over broadband lines, FCC Commissar Julius Genachowski is now seeking to apply existing telecommunication regulation to the internet.

WASHINGTON—In a move that will stoke a battle over the future of the Internet, the federal government plans to propose regulating broadband lines under decades-old rules designed for traditional phone networks.

The decision, by Federal Communications Commission Chairman Julius Genachowski, is likely to trigger a vigorous lobbying battle, arraying big phone and cable companies and their allies on Capitol Hill against Silicon Valley giants and consumer advocates.

Breaking a deadlock within his agency, Mr. Genachowski is expected Thursday to outline his plan for regulating broadband lines. He wants to adopt “net neutrality” rules that require Internet providers like Comcast Corp. and AT&T Inc. to treat all traffic equally, and not to slow or block access to websites.

The decision has been eagerly awaited since a federal appeals court ruling last month cast doubt on the FCC’s authority over broadband lines, throwing into question Mr. Genachowski’s proposal to set new rules for how Internet traffic is managed. The court ruled the FCC had overstepped when it cited Comcast in 2008 for slowing some customers’ Internet traffic.

In a nod to such concerns, the FCC said in a statement that Mr. Genachowski wouldn’t apply the full brunt of existing phone regulations to Internet lines and that he would set “meaningful boundaries to guard against regulatory overreach.”

And what would those “meaningful boundaries” be? Didn’t the court already set those boundaries? What part of “NO” doesn’t the commissar understand?

What does government interference regulation mean for the internet?

Telecom executives say privately that limits on their ability to change pricing would make it harder to convince shareholders that the returns from spending billions of dollars on improving a network are worth the cost.

Carriers fear further regulation could handcuff their ability to cope with the growing demand put on their networks by the explosion in Internet and wireless data traffic. In particular, they worry that the FCC will require them to share their networks with rivals at government-regulated rates.

Mike McCurry, former press secretary for President Bill Clinton and co-chair of the Arts + Labs Coalition, an industry group representing technology companies, telecom companies and content providers, said the FCC needs to assert some authority to back up the general net neutrality principles it outlined in 2005.

“The question is how heavy a hand will the regulatory touch be,” he said. “We don’t know yet, so the devil is in the details. The network operators have to be able to treat some traffic on the Internet different than other traffic—most people agree that web video is different than an email to grandma. You have to discriminate in some fashion.”

UBS analyst John Hodulik said the cable companies and carriers were likely to fight this in court “for years” and could accelerate their plans to wind down investment in their broadband networks.

“Net neutrality” my ass…

20 years of Photoshop

Posted in Computers and Technology, Cool Stuff on March 7, 2010 by DaMook

Adobe has made a mint on Photoshop and rightfully so. It is hands down the best image editing software available. A skilled Photoshop artist can create fiction from fact and make you question your lying eyes. This is an excellent story celebrating 20 years of Photoshop.

IE users beware F1 key virus

Posted in Computers and Technology on March 5, 2010 by DaMook

If you use Internet Explorer, beware that there is a new virus just waiting for you. If you get a popup message telling you to press the F1 key – don’t. The vulnerability only affects Windows XP, Windows 2000, and Server 2003 so if you’re using Vista or Win 7, you’re not at risk.