YouTube - Rev. Yearwood speaks re: Police Brutality against him.
Topic: Society
9:24 pm EDT, Sep 13, 2007
Rev.Lennox Yearwood regarding being attacked, arrested, and hospitalized by Capitol Police
This man was denied entrance to the hearing because he had clearly been identified as holding opinions counter to the party line.
Bush's people will do everything in their power to keep dissenting voices away from the media when they have their official digs going on, and make no mistake about it, this is censorship of the worst kind.
Can we file a class-action suit yet, or do we have to wait until Bush's third term so that it gets lost in the shuffle of the switch to despotism?
Six years ago today, some clueless desert dwellers hijacked some planes and smashed them into the World Trade Center, resulting in the unfortunate deaths of almost 3,000 people.
Since then, this event has been shamelessly capitalized upon by politicians and media alike to aggrandize themselves and their own personal agendas, spreading far more fear and uncertainty than any isolated bunch of sand-eating blow-hards would have ever been able to accomplish on their own.
Today, on this day of days, let's take a few seconds to remember the loss of lives with a moment of silence, and then move on with even more silence.
Let this day be the day we simply stopped giving a damn about what some ineffectual backwaters living in caves think, and get back to living our lives like real human beings who believe in life, liberty, and the pursuit of happiness.
Computer security has recently imported a lot of ideas from economics, psychology and sociology, leading to fresh insights and new tools.
I will describe one thread of research that draws together techniques from fields as diverse as signals intelligence and sociology to search for artificial communities.
Evildoers online divide roughly into two categories - those who don't want their websites to be found, such as phishermen, and those who do. The latter category runs from fake escrow sites through dodgy stores to postmodern Ponzi schemes. A few of them buy ads, but many set up fake communities in the hope of having victims driven to their sites for free. How can these reputation thieves be detected?
Some of our work in security economics and social networking may give an insight into the practical effects of network topology. These tie up in various ways with traffic analysis, long used by the signals intelligence agencies which trawl the airwaves and networks looking for interesting targets. I'll describe a number of dubious business enterprises we've unearthed.
Recent advances in algorithms, such as Newman's modularity matrix, have increased the robustness of covert community detection. But much scope remains for wrongdoers to hide themselves better as they become topologically aware; we can expect attack and defence to go through several rounds of coevolution.
I'll therefore end up by talking about some strategic issues, such as the extent to which search engines and other service providers could, or should, share information in the interests of wickedness detection.