Murderer buried victim in concrete and sold off his Magic: The Gathering trading cards, then blamed twin

William Cormier III was convicted this week of killing journalist Sean Dugas, burying his body in a concrete-covered pit in Georgia, then selling off his rare Magic: The Gathering playing cards , part of a set valued at $100,000. Defense attorneys said during closing arguments that prosecutors didn’t prove that Cormier killed Dugas, and instead suggested his twin was responsible. Cormier’s twin brother, Christopher, pleaded no contest to charges of helping his brother move Dugas’ body from Florida to Georgia. Christopher Cormier has not been sentenced yet. Dugas’ body was unearthed more than a month after his 2012 death in the backyard of Cormier’s father’s home in Winder, Ga., which is about 300 miles northeast of Pensacola. Cormier was the only witness to testify for the defense. He told jurors Wednesday he was acting under the direction of his twin and that he did not know Dugas’ was dead when he sold more than $12,000 of his cards and cleaned out his home.        

Visit site:
Murderer buried victim in concrete and sold off his Magic: The Gathering trading cards, then blamed twin

Unedited silent footage of Nagasaki bombing

From preparing the bomb to dropping it—the explosion is a few seconds after 8:40. [ Video Link ] This silent film shows the final preparation and loading of the “Fat Man” bomb into “Bockscar,” the plane which dropped the bomb on Nagasaki. It then shows the Nagasaki explosion from the window of an observation plane. This footage comes from Los Alamos National Laboratory. I have not edited it in any way from what they gave me except to improve the contrast a little — it is basically “raw.” I have annotated it with some notes on the bombing and what you can see — feel free to disable it if you don’t want it. I suggest leaving them on. This is the first time I’ve ever seen a video benefit from YouTube annotations! [via Nuclear Secrecy and MeFi ]        

See the article here:
Unedited silent footage of Nagasaki bombing

Man loses rare Twitter handle after PayPal and GoDaddy inadvertently help scammer

Naoki Hiroshima had a rare and valuable Twitter handle, @N . It was extorted from him , he claims, by a scammer who figured out that PayPal reveals part of one’s credit card number during security verification—and that GoDaddy accepts the same part of the number during security verification. I asked the attacker how my GoDaddy account was compromised and received this response: From: SOCIAL MEDIA KING To: Naoki Hiroshima Date: Mon, 20 Jan 2014 19:53:52 -0800 Subject: RE: …hello – I called paypal and used some very simple engineering tactics to obtain the last four of your card (avoid this by calling paypal and asking the agent to add a note to your account to not release any details via phone) – I called godaddy and told them I had lost the card but I remembered the last four, the agent then allowed me to try a range of numbers (00-09 in your case) I have not found a way to heighten godaddy account security, however if you’d like me to recommend a more secure registrar i recommend: NameCheap or eNom (not network solutions but enom.com) GoDaddy outright refused to help him at first, too. It’s shocking how weak account security is there, and at PayPal: “Don’t let companies such as PayPal and GoDaddy store your credit card information,” Hiroshima writes.        

View post:
Man loses rare Twitter handle after PayPal and GoDaddy inadvertently help scammer

Meth offered ‘as casually as a cup of tea’ in North Korea, reports LA Times

There’s not much stigma attached to meth use in harsh North Korea, writes Los Angeles Times reporter Barbara Demick. Some take it to treat colds or boost their energy; students take it to work late. The drug also helps curb appetites in a country where food is scarce. It is offered up as casually as a cup of tea, North Koreans say. “If you go to somebody’s house it is a polite way to greet somebody by offering them a sniff,” said Lee Saera, 43, of Hoeryong, also interviewed in China. “It is like drinking coffee when you’re sleepy, but ice is so much better.” More: LA Times .        

Visit site:
Meth offered ‘as casually as a cup of tea’ in North Korea, reports LA Times

From the Northern to the Southern Cross (astronomy photo by Nicholas Buer)

Image: Nicholas Buer , via APOD . A particularly psychedelic Astronomy Picture of the Day : There is a road that connects the Northern to the Southern Cross but you have to be at the right place and time to see it. The road, as pictured above, is actually the central band of our Milky Way Galaxy; the right place, in this case, is dark Laguna Cejar in Salar de Atacama of Northern Chile ; and the right time was in early October, just after sunset. You can follow APOD on Twitter , too.        

View the original here:
From the Northern to the Southern Cross (astronomy photo by Nicholas Buer)

FBI agent tries to copyright super-secret torture manual, inadvertently makes it public

The ACLU has spent years in court trying to get a look at a top-secret FBI interrogation manual that referred to the CIA’s notorious KUBARK torture manual. The FBI released a heavily redacted version at one point — so redacted as to be useless for determining whether its recommendations were constitutional. However, it turns out that the FBI agent who wrote the manual sent a copy to the Library of Congress in order to register a copyright in it — in his name! (Government documents are not copyrightable, but even if they were, the copyright would vest with the agent’s employer, not the agent himself). A Mother Jones reporter discovered the unredacted manual at the Library of Congress last week, and tipped off the ACLU about it. Anyone can inspect the manual on request. Go see for yourself! The 70-plus-page manual ended up in the Library of Congress, thanks to its author, an FBI official who made an unexplainable mistake. This FBI supervisory special agent, who once worked as a unit chief in the FBI’s counterterrorism division, registered a copyright for the manual in 2010 and deposited a copy with the US Copyright Office, where members of the public can inspect it upon request. What’s particularly strange about this episode is that government documents cannot be copyrighted. “A document that has not been released does not even need a copyright,” says Steven Aftergood, a government secrecy expert at the Federation of American Scientists. “Who is going to plagiarize from it? Even if you wanted to, you couldn’t violate the copyright because you don’t have the document. It isn’t available.” “The whole thing is a comedy of errors,” he adds. “It sounds like gross incompetence and ignorance.” Julian Sanchez, a fellow with the libertarian Cato Institute who has studied copyright policy, was harsher: “Do they not cover this in orientation? [Sensitive] documents should not be placed in public repositories—and, by the way, aren’t copyrightable. How do you even get a clearance without knowing this stuff?” You’ll Never Guess Where This FBI Agent Left a Secret Interrogation Manual [Nick Baumann/Mother Jones] ( via Techdirt ) ( Image: FBI , a Creative Commons Attribution Share-Alike (2.0) image from 10542402@N06’s photostream )        

Read More:
FBI agent tries to copyright super-secret torture manual, inadvertently makes it public

Bunnie Huang explains the nuts-and-bolts of getting stuff made in Shenzhen

In this talk from Maker Faire New York, Bunnie Huang of Chibitronics gives an amazing run-down of the on-the-ground reality of having electronics manufactured in Shenzhen, China. It’s a wild 30 minutes, covering everything from choosing a supplier to coping with squat toilets and the special horrors awaiting vegetarians in the Pearl River Delta. There are some dropouts at the start of the video that you’ll need to scroll past, but it’s well worth the hassle. Getting it Made: Stories from Shenzhen ( via Make )        

Visit link:
Bunnie Huang explains the nuts-and-bolts of getting stuff made in Shenzhen

Android gives you the ability to deny your sensitive data to apps

Android privacy just got a lot better. The 4.3 version of Google’s mobile operating system now has hooks that allow you to override the permissions requested by the apps you install. So if you download a flashlight app that wants to harvest your location and phone ID , you can install it, and then use an app like AppOps Launcher to tell Android to withhold the information. Peter Ecklersley, a staff technologist at the Electronic Frontier Foundation, has written up a good explanation of how this works , and he attributes the decision to competitive pressure from Ios, which allows users to deny location data to apps, even if they “require” it during the installation process. I think that’s right, but not the whole story: Android has also always labored under competitive pressure from its free/open forks, like Cyanogenmod. In the days when Android didn’t allow tethering (as a sop to the mobile carriers, who are the gatekeepers to new phones for many people), Cyanogenmod signed up large numbers of users, simply by adding this functionality . Google added tethering to Android within a couple of versions. Some versions of Cyanogenmod have had the option tell your phone to lie to apps about its identity, location, and other sensitive information — a way to get around the “all or nothing” installation process whereby your the apps you install non-negotiably demand your “permission” to plunder this information. I’m not surprised to see the same feature moving into the main branch of Android. This dynamic is fascinating to me: Google has to balance all kinds of priorities in rolling out features and “anti-features” (no tethering, non-negotiable permissions) in Android, in order to please customers, carriers and developers. Free/open forks like Cyanogenmod really only need to please themselves and their users, and don’t have to worry so much about these other pressures (though now that Cyanogenmod is a commercial operation , they’ll probably need to start playing nice with carriers). But because Android competes with Cyanogenmod and the other open versions, Google can’t afford to ignore the featureset that makes them better than the official version. It’s a unique, and extremely beneficial outflow of the hybrid free/commercial Android ecosystem. In the early days, that model was at an improvement on its major competitor, Apple’s iOS, which didn’t even have a permissions model. But after various privacy scandals, Apple started forcing apps to ask for permission to collect data: first location and then other categories, like address books and photos. So for the past two years, the iPhone’s app privacy options have been miles ahead of Android’s. This changed with the release of Android 4.3, which added awesome new OS features to enhance privacy protection. You can unlock this functionality by installing a tool like App Ops Launcher. When you run it, you can easily control most of the privacy-threatening permissions your apps have tried to obtain. Want to install Shazam without having it track your location? Easy. Want to install SideCar without letting it read your address book? Done.2 Despite being overdue and not quite complete, App Ops Launcher is a huge advance in Android privacy. Its availability means Android 4.3+ a necessity for anyone who wants to use the OS while limiting how intrusive those apps can be. The Android team at Google deserves praise for giving users more control of the data that others can snatch from their pockets. Awesome Privacy Tools in Android 4.3+        

Continue reading here:
Android gives you the ability to deny your sensitive data to apps