XIAM007

Making Unique Observations in a Very Cluttered World

Saturday, 8 June 2013

Americans starting to realize their paranoid fantasies about government surveillance have come true -


Americans starting to realize their paranoid fantasies about government surveillance have come true - 



For more than a decade now, Americans have made peace with the uneasy knowledge that someone — government, business or both — might be watching.

We knew that the technology was there. We knew that the law might allow it. As we stood under a security camera at a street corner, connected with friends online or talked on a smart phone equipped with GPS, we knew, too, it was conceivable that we might be monitored.

Now, though, paranoid fantasies have come face to face with modern reality: The government IS collecting our phone records. The technological marvels of our age have opened the door to the National Security Agency’s sweeping surveillance of Americans’ calls.

Torn between our desires for privacy and protection, we’re now forced to decide what we really want.

“We are living in an age of surveillance,” said Neil Richards, a professor at Washington University’s School of Law in St. Louis who studies privacy law and civil liberties. “There’s much more watching and much more monitoring, and I think we have a series of important choices to make as a society — about how much watching we want.”

But the only way to make those choices meaningful, he and others said, is to lift the secrecy shrouding the watchers.

“I don’t think that people routinely accept the idea that government should be able to do what it wants to do,” said Marc Rotenberg, president of the Electronic Privacy Information Center. “It’s not just about privacy. It’s about responsibility … and you only get to evaluate that when government is more public about its conduct.”

The NSA, officials acknowledged this week, has been collecting phone records of hundreds of millions of U.S. phone customers. In another program, it collects audio, video, email, photographic and Internet search usage of foreign nationals overseas who use any of the nine major Internet providers, including Microsoft, Google, Apple and Yahoo.

In interviews across the country in recent days, Americans said they were startled by the NSA’s actions. Abraham Ismail, a 25-year-old software designer taking advantage of the free Wi-Fi outside a Starbucks in Raleigh, N.C., said in retrospect, fears had prompted Americans to give up too much privacy.

“It shouldn’t be so just effortless,” he said, snapping his fingers for emphasis, “to pull people’s information and get court orders to be able to database every single call, email. I mean, it’s crazy.”

The clash between security and privacy is far from new. In 1878, it played out in a court battle over whether government officials could open letters sent through the mail. In 1967, lines were drawn over government wiretapping.

Read more - 

New Xbox by NSA partner Microsoft will watch you 24/7 -


New Xbox by NSA partner Microsoft will watch you 24/7 - 




Possible privacy violations by Microsoft’s upcoming Xbox One have come under new scrutiny since it was revealed Thursday that the tech giant was a crucial partner in an expansive Internet surveillance program conducted by the National Security Agency and involving Silicon Valley’s biggest players.

One of the console’s key features is the full integration of the Kinect, a motion sensing camera that allows users to play games, scroll through menus, and generally operate the Xbox just using hand gestures. Microsoft has touted the camera as the hallmark of a new era of interactivity in gaming.

What Microsoft has not promoted, however, is the fact that you will not be able to power on the console without first enabling the Kinect, designed to detect both heartbeats and eye movement. and positioning yourself in front of it.

Disturbingly, a recently published Microsoft patent reveals the Kinect has the capability to determine exactly when users are viewing ads broadcast by the Xbox through its eye movement tracking. Consistent ad viewers would be granted rewards, according to the patent.

Perhaps the feature most worryisome to privacy advocates is the requirement that the Xbox connect to the Internet at least once every 24 hours. Many critics have asserted that Microsoft will follow the lead of other Silicon Valley companies and use their console to gather data about its users, particularly through the Kinect, and collect it through the online connection users can’t avoid.

Microsoft has promised that customers will be able to “pause” the camera’s function, but have put off questions on the precise specifics of their privacy policies.

Read more: -

Food rationing to begin in oil rich Venezuela -


Food rationing to begin in oil rich Venezuela - 



It’s unbelievable that Venezuela has got to this extreme situation where the destruction of the productive apparatus, a sharp disinvestment and a hypercontrolled economy has made the most demand for products and services has to be met with imports.- VenEconomy

In a sign Venezuela’s food shortages could be worsening, restrictions on the sale of 20 basic items subject to price controls, including toilet paper and chicken, are set to begin next week in its most populous state, officials said Tuesday.

A spokesman for President Nicolas Maduro’s government said it is incorrect to call the plan rationing because it is meant to fight smuggling of price-controlled food across the border into Colombia. He said there are no plans to extend the program nationally.

Details of how the system in Zulia state will work are still being worked out, said Blagdimir Labrador, the state governor’s chief of staff.

But Zulia will issue computer chip cards beginning next week that will limit consumer purchases of products including rice, flour, cooking oil, sugar and powdered milk, he said. The quantities each family will be allowed to buy, on a daily or weekly basis, have not yet been determined, he said.

The system will register purchases remotely on computer servers ‘‘so the same person can’t go to a different store on the same day and purchase the same product,’’ Labrador said.

Read more -

Spying on Americans before 9/11: NSA Built Back Door In All Windows Software by 1999 -


Spying on Americans before 9/11: NSA Built Back Door In All Windows Software by 1999 - 



Government Built Spy-Access Into Most Popular Consumer Program Before 9/11

In researching the stunning pervasiveness of spying by the government (it’s much more wide spread than you’ve heard even now), we ran across the fact that the FBI wants software programmers to install a backdoor in all software.

Digging a little further, we found a 1999 article by leading European computer publication Heise which noted that the NSA had already built a backdoor into all Windows software:

A careless mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA “help information” trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.

The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren [an expert in computer security]. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.

***

Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft’s developers had failed to remove or “strip” the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called “KEY”. The other was called “NSAKEY”.

Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to “Advances in Cryptology, Crypto’99″ conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the “NSA” key was built into their software. But they refused to talk about what the key did, or why it had been put there without users’ knowledge.

A third key?!

But according to two witnesses attending the conference, even Microsoft’s top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was “stunned” to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the “entropy” of programming code.

Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers.

Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone’s and everyone’s Windows computer to intelligence gathering techniques deployed by NSA’s burgeoning corps of “information warriors”.

According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system “is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system“. The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards.

***

“How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a ‘back door’ for NSA – making it orders of magnitude easier for the US government to access your computer?” he asked.

Read more -

Friday, 7 June 2013

Asteroid to fly within moon's orbit - will pass within the distance from the Earth to the moon this weekend -


Asteroid to fly within moon's orbit - will pass within the distance from the Earth to the moon this weekend - 



A small, newly discovered asteroid will pass within the distance from the Earth to the moon this weekend, and you can watch its approach live online today.
The space rock, called 2013 LR6, is between 16-53 feet wide and is in no danger of hitting the Earth, experts say. The garbage truck-size asteroid's closest approach will bring it about 68,351 miles above the surface of the planet tomorrow.
You can watch a live asteroid-tracking webcast on SPACE.com today that features views and expert commentary hosted by the Virtual Telescope Project in Italy beginning at 3:30 p.m. EDT. You can also follow the broadcast directly through the Virtual Telescope Project.
"It is a very safe distance, so it will be a great show!" astrophysicist Gianluca Masi with the Virtual Telescope Project wrote in a statement.
At the time of the webcast, the asteroid will be about 186,411 miles away, Masi said.
Tomorrow, when it makes its closest approach, the space rock will be visible from only the Southern Hemisphere. The asteroid, at a magnitude of about 16.5 on the astronomers' brightness scale, is too dim to be seen with the naked eye.
This flyby comes on the heels of another close brush Earth had with a space rock last Friday. An asteroid the size of nine cruise ships dubbed Asteroid 1998 QE2 whizzed by our planet traveling within 3.6 million miles of Earth's surface. 1998 QE2 has its own moon, estimated at 2,000 feet wide, according to NASA.
2013 has been a big year for close encounters with near-Earth objects. On the same day in February, an asteroid the size of a football field flew within 17,200 miles of Earth, while — in an unrelated incident — a meteor exploded over Russia, injuring hundreds and damaging property.


Read more: -

Bear caught opening truck door on video - Smarter than average bear opens vehicle doors and gets inside -


Bear caught opening truck door on video - Smarter than average bear opens vehicle doors and gets inside - 



A Maple Ridge, B.C., resident caught an unusual sight on video this week — a bear standing on its hind legs breaking into a pickup truck.

Rebecca Moore, who took the video and posted it to YouTube on Tuesday, says she and her husband were awakened by a noise outside at about 5:30 a.m.

"By the time we got out of bed, [the bear] was actually inside one of our cars. We saw the car door open and it was just coming out one of our cars," she said.

"We saw him just open the door of the truck, just easy as anything.… He was obviously used to accessing vehicles."

Moore said she just had to capture the "unbelievable" sight on camera.

"It was just the amazement, really. You just couldn't believe what you were seeing," she said. "It was just too amazing not to take a video."

Moore says she and her husband chased the bear away from the property as soon as they stopped filming.

Conservation officer Denny Chretien believes the three-year-old bear has broken into other cars in the area.

"It's not a common behaviour but it is occurring."

Chretien says conservation officers have received four calls about bears breaking into cars, including one involving a Porsche.

He advises residents not to leave food or lock up garbage in their cars.

"They don't have the container, so they'll go put in in the vehicle and shut the door and bears will just go, 'What is this?' and it's just a bigger container," he said.

"They'll give it a test and there's so much things to grip on to in a vehicle and they just start ripping."

The Moores, meanwhile, say they're just glad they didn't leave the keys in the ignition.



Read more - 

Thursday, 6 June 2013

20 Completely Ridiculous College Courses Being Offered At U.S. Universities -


20 Completely Ridiculous College Courses Being Offered At U.S. Universities - 



Would you like to know what America’s young people are actually learning while they are away at college?  It isn’t pretty.  Yes, there are some very highly technical fields where students are being taught some very important skills, but for the most part U.S. college students are learning very little that they will actually use out in the real world when they graduate.  Some of the college courses listed below are funny, others are truly bizarre, others are just plain outrageous, but all of them are a waste of money.  If we are going to continue to have a system where we insist that our young people invest several years of their lives and tens of thousands of dollars getting a “college education”, they might as well be learning some useful skills in the process.  This is especially true considering how much student loan debt many of our young people are piling up.  Sadly, the truth is that right now college education in the United States is a total joke.  I know – I spent eight years in the system.  Most college courses are so easy that they could be passed by the family dog, and many of these courses “study” some of the most absurd things imaginable.
Listed below are 20 completely ridiculous college courses being offered at U.S. universities.  The description following each course title either comes directly from the official course description or from a news story about the course…
1. “What If Harry Potter Is Real?” (Appalachian State University) – This course will engage students with questions about the very nature of history. Who decides what history is? Who decides how it is used or mis-used? How does this use or misuse affect us? How can the historical imagination inform literature and fantasy? How can fantasy reshape how we look at history? The Harry Potter novels and films are fertile ground for exploring all of these deeper questions. By looking at the actual geography of the novels, real and imagined historical events portrayed in the novels, the reactions of scholars in all the social sciences to the novels, and the world-wide frenzy inspired by them, students will examine issues of race, class, gender, time, place, the uses of space and movement, the role of multiculturalism in history as well as how to read a novel and how to read scholarly essays to get the most out of them.
2. “God, Sex, Chocolate: Desire and the Spiritual Path” (UC San Diego) – Who shapes our desire? Who suffers for it? Do we control our desire or does desire control us? When we yield to desire, do we become more fully ourselves or must we deny it to find an authentic identity beneath? How have religious & philosophical approaches dealt with the problem of desire?
3. “GaGa for Gaga: Sex, Gender, and Identity” (The University Of Virginia) – In Graduate Arts & Sciences student Christa Romanosky’s ongoing ENWR 1510 class, “GaGa for Gaga: Sex, Gender, and Identity,” students analyze how the musician pushes social boundaries with her work. For this introductory course to argumentative essay writing, Romanosky chose the Lady Gaga theme to establish an engaging framework for critical analysis.
4. “Lady Gaga and the Sociology of Fame” (The University Of South Carolina) – Lady Gaga may not have much class but now there is a class on her. The University of South Carolina is offering a class called Lady Gaga and the Sociology of Fame.  Mathieu Deflem, the professor teaching the course describes it as aiming to “unravel some of the sociologically relevant dimensions of the fame of Lady Gaga with respect to her music, videos, fashion, and other artistic endeavours.”
5. “Philosophy And Star Trek” (Georgetown) – Star Trek is very philosophical. What better way, then, to learn philosophy, than to watch Star Trek, read philosophy, and hash it all out in class? That’s the plan. This course is basically an introduction to certain topics in metaphysics and epistemology philosophy, centered around major philosophical questions that come up again and again in Star Trek. In conjunction with watching Star Trek, we will read excerpts from the writings of great philosophers, extract key concepts and arguments and then analyze those arguments.
6. “Invented Languages: Klingon and Beyond” (The University Of Texas) – Why would anyone want to learn Klingon? Who really speaks Esperanto, anyway? Could there ever be a language based entirely on musical scales? Using constructed/invented languages as a vehicle, we will try to answer these questions as we discuss current ideas about linguistic theory, especially ideas surrounding the interaction of language and society. For example, what is it about the structure of Klingon that makes it look so “alien”? What was it about early 20th century Europe that spawned so many so-called “universal” languages? Can a language be inherently sexist? We will consider constructed/invented languages from a variety of viewpoints, such as languages created as fictional plot-devices, for philosophical debates, to serve an international function, and languages created for private fun. We won t be learning any one language specifically, but we will be learning about the art, ideas, and goals behind invented languages using diverse sources from literature, the internet, films, video games, and other aspects of popular culture.
7. “The Science Of Superheroes” (UC Irvine) – Have you ever wondered if Superman could really bend steel bars? Would a “gamma ray” accident turn you into the Hulk? What is a “spidey-sense”? And just who did think of all these superheroes and their powers? In this seminar, we discuss the science (or lack of science) behind many of the most famous superheroes. Even more amazing, we will discuss what kind of superheroes might be imagined using our current scientific understanding.
8. “Learning From YouTube” (Pitzer College) – About 35 students meet in a classroom but work mostly online, where they view YouTube content and post their comments.  Class lessons also are posted and students are encouraged to post videos. One class member, for instance, posted a 1:36-minute video of himself juggling.
9. “Arguing with Judge Judy” (UC Berkeley) – TV “Judge” shows have become extremely popular in the last 3-5 years. A fascinating aspect of these shows from a rhetorical point of view is the number of arguments made by the litigants that are utterly illogical, or perversions of standard logic, and yet are used over and over again. For example, when asked “Did you hit the plaintiff?” respondents often say, “If I woulda hit him, he’d be dead!” This reply avoids answering “yes” or “no” by presenting a perverted form of the logical strategy called “a fortiori” argument ["from the stronger"] in Latin. The seminar will be concerned with identifying such apparently popular logical fallacies on “Judge Judy” and “The People’s Court” and discussing why such strategies are so widespread. It is NOT a course about law or “legal reasoning.” Students who are interested in logic, argument, TV, and American popular culture will probably be interested in this course. I emphasize that it is NOT about the application of law or the operations of the court system in general.
10. “Elvis As Anthology” (The University Of Iowa) – The class, “Elvis as Anthology,” focuses on Presley’s relationship to African American history, social change, and aesthetics. It focuses not just on Elvis, but on other artists who inspired him and whom he inspired.
11. “The Feminist Critique Of Christianity” (The University Of Pennsylvania) – An overview of the past decades of feminist scholarship about Christian and post-Christian historians and theologians who offer a feminist perspective on traditional Christian theology and practice. This course is a critical overview of this material, presented with a summary of Christian biblical studies, history and theology, and with a special interest in constructive attempts at creating a spiritual tradition with women’s experience at the center.
12. “Zombies In Popular Media” (Columbia College) – This course explores the history, significance, and representation of the zombie as a figure in horror and fantasy texts. Instruction follows an intense schedule, using critical theory and source media (literature, comics, and films) to spur discussion and exploration of the figure’s many incarnations. Daily assignments focus on reflection and commentary, while final projects foster thoughtful connections between student disciplines and the figure of the zombie.
13. “Far Side Entomology” (Oregon State) – For the last 20 years, a scientist at Oregon State University has used Gary Larson’s cartoons as a teaching tool. The result has been a generation of students learning — and laughing — about insects.
14. “Interrogating Gender: Centuries of Dramatic Cross-Dressing” (Swarthmore) – Do clothes make the man? Or the woman? Do men make better women? Or women better men? Is gender a costume we put on and take off? Are we really all always in drag? Does gender-bending lead to transcendence or chaos? These questions and their ramifications for liminalities of race, nationality and sexuality will be our focus in a course that examines dramatic works from The Bacchae to M. Butterfly.
15. “Oh, Look, a Chicken!” Embracing Distraction as a Way of Knowing (Belmont University) – Students must write papers using their personal research on the five senses. Entsminger reads aloud illustrated books The Simple People and Toby’s Toe to teach lessons about what to value by being alive. Students listen to music while doodling in class. Another project requires students to put themselves in situations where they will be distracted and write a reflection tracking how they got back to their original intent.
16. “The Textual Appeal of Tupac Shakur” (University of Washington) – The UW is not the first college with a class dedicated to Shakur — classes on the rapper have been offered at the University of California Berkeley and Harvard — but it is the first to relate Shakur’s work to literature.
17. “Cyberporn And Society” (State University of New York at Buffalo) – With classwork like this, who needs to play? Undergraduates taking Cyberporn and Society at the State University of New York at Buffalo survey Internet porn sites.
18. “Sport For The Spectator” (The Ohio State University) – Develop an appreciation of sport as a spectacle, social event, recreational pursuit, business, and entertainment. Develop the ability to identify issues that affect the sport and spectator behavior.
19. “Getting Dressed” (Princeton) – Jenna Weissman Joselit looks over the roomful of freshmen in front of her and asks them to perform a warm-up exercise: Chart the major moments of your lives through clothes. “If you pop open your closet, can you recall your lives?” she posits on the first day of the freshman seminar “Getting Dressed.”
20. “How To Watch Television” (Montclair) – This course, open to both broadcasting majors and non-majors, is about analyzing television in the ways and to the extent to which it needs to be understood by its audience. The aim is for students to critically evaluate the role and impact of television in their lives as well as in the life of the culture. The means to achieve this aim is an approach that combines media theory and criticism with media education.
Are you starting to understand why our college graduates can’t function effectively when they graduate and go out into the real world?
All of this would be completely hilarious if not for the fact that we have millions of young people going into enormous amounts of debt to pay to go to these colleges.
In America today, college education has become a giant money making scam.  We have a system that absolutely throws money at our young people, but we never warn them about the consequences of all of these loans.  The following is an excerpt from an email that one reader sent me recently about the student loan industry…
For example, one woman told me that her and her husband sat down and thought of every possible expense they could when they were applying for parent/student loan for their daughter. When the approval came back, they were approved for 7k more than they asked for…how about ****! Of course at 7%, why not! Funny thing is they kept the 7k, because she’s in wealth management and said she could “easily” get more than 7% in the stock market……awesome! I have another example of a younger friend of mine who graduated law school from Vanderbilt with 210k in student loans. I asked if tuition was that much there. She said kind of, but they kept offering more than the actual tuition, so she took it and used it for a better lifestyle. Now 20% of her income goes to pay those loans, and it’s still not enough to touch one dollar of the principal…so all she is doing is paying interest, and building on principal…like a revers amortizing mortgage. To make it worse, she was able to save 25k, so she is going to buy a house somehow. Having explained to her that the best investment in the world is to pay off a high interest loan, she said I’m tired of waiting to have a life.
In a recent article entitled “The Student Loan Delinquency Rate In The United States Has Hit A Brand New Record High” I detailed how nightmarish our student loan debt bubble is becoming.  According to the Federal Reserve, the total amount of student loan debt has risen by275 percent since 2003, and it just continues to soar.
A college education can be a wonderful thing, but right now we have got a system that is deeply, deeply broken.
So what do you think about our system of higher education?
Please feel free to express your opinion by posting a comment below…

Read more - 

Army’s new robotic bird drone is so realistic it gets attacked by hawks -


Army’s new robotic bird drone is so realistic it gets attacked by hawks - 



A robotic bird created for the U.S. Army for use as a miniature spy drone is so convincing that it has been attacked by hawks and eagles, according to researchers. 
The Robo-Raven, as the solar-powered, remotely piloted surveillance aircraft is called, was designed and built at the University of Maryland’s Maryland Robotics Center — an interdisciplinary research establishment in the university’s A. James Clark School of Engineering. The center posted a video of a test flight this week.

The Robo-Raven “already attracts attention from birds in the area which tends to hide its presence,” said John Gerdes, a mechanical engineer with the Vehicle Technology Directorate at the U.S. Army’s Aberdeen Proving Ground in Maryland.
Seagulls, songbirds and sometimes crows tend to try to fly in formation with the robotic bird during testing, but birds of prey, such as falcons and hawks, take a much more aggressive approach, he said.
“Generally we don’t see them coming,” Mr. Gerdes said on the center’s website. “They will dive and attack by hitting the bird from above with their talons, then they typically fly away.”
The Robo-Raven’s wings flap completely independently of each other and “can be programmed to perform any desired motion,” enabling the bird to carry out aerobatic flight maneuvers, such as diving and rolling, never before possible.


Read more: - 

World's Oldest Cancer Found in Bone of 120,000 Year-Old Neanderthal... -


World's Oldest Cancer Found in Bone of 120,000 Year-Old Neanderthal... - 
The cancerous bone is a 30-millimeter-long fragment of the left rib (University of Kansas)

The world's oldest known human tumour has been found in the rib bone of a Neanderthal who lived more than 120,000 years ago.

The bone was evacuated from a site in Krapina, Croatia more than 100 years ago and has been found to have contracted the fibrous dysplasia  tumour, a cancer which is common among modern-day humans.

This discovery by David Frayer from the University of Kansas predates previous evidence of the tumour by more than 100,000 years.

Before this discovery, the earliest bone tumour was seen in an Egyptian mummy around 2,000 years ago.

David Frayer, professor of anthropology at the University of Kansas, said: "It's evidence that Neanderthals suffered tumours - that they were susceptible to the same kinds of diseases that we see in modern humans.

"This is 100,000 years older than the previous tumour that has been found. There is no evidence of cancer older than this in the human fossil record."

Researchers said it is rare to discover evidence of cancer in the  prehistoric population as they were not exposed to toxins, pollution, radiation and unhealthy diets over a long period of time which has been seen to cause cancer in today's humans.

Fibrous dysplasia in modern-day humans is the most frequent of the bone-tumours, but Frayer adds that "This case shows that Neanderthals, living in an unpolluted environment, were susceptible to the same kind of cancer as living humans."

When the bone with tumour was discovered  between 1899 and1905 in a cave in Croatia, it wasn't associated with a complete skeleton. As a result researchers did not know if the tumour afflicted a male or female, the age of the individual at the time of death, nor if the tumour was the cause of death.

"It wasn't a small tumor," Frayer said. "It was a fairly large one, probably bulging at the base of the rib. We're not sure how far along it was, but it was well-expressed in the bone. It was in the upper third of the back, and muscles attach there that are associated with raising the arm."

The study, published in the journal PLOS ONE, concludes: "Given these factors, cases of neoplastic disease are rare in prehistoric human populations. Against this background, the identification of a more than 120,000-year-old Neanderthal rib with a bone tumour is surprising, and provides insights into the nature and history of the association of humans to neoplastic disease." 

Read more - 

Wednesday, 5 June 2013

Giant ‘Frankenfish’ caught in Virginia may be biggest ever -


Giant ‘Frankenfish’ caught in Virginia may be biggest ever - 



t was already a special day for Caleb Newton and Phil Wilcox — the two friends enjoying a bass-fishing bachelor party on the Potomac River. But when the men spotted a long shadow swimming among the reeds, they knew things were only going to get more interesting.
Gliding among the grass was a northern snakehead, a gruesome animal known as a “Frankenfish” by some. And it was big. But it wasn’t until they wrestled it into the boat that they realized it might be the biggest anyone has ever caught with a hook and line.
“I knew it was a good fish, but I didn’t know how good,” Mr. Newton, 27, said Tuesday.
The two men have been fishing partners for years, and they know the Potomac River and its tributaries like the back of their hands. On Saturday, they joined friends and family for the Big Bass Bachelor Fishing Tournament in honor of Mr. Wilcox’s upcoming wedding.
“We pulled up to the spot, put the trolling motor down on the boat, and I saw the fish in the water,” Mr. Wilcox said. “It was absolutely huge.”

Mr. Newton said he “could just tell by the reaction and tone of his voice,” that his buddy had spotted a keeper.
After a few attempts at luring the fish to bite, the animal finally latched on and took off.
“It went crazy, the water got to boiling, the grass was coming up, so I let the line go on its own,” Mr. Newton said. “With this fish you had to let him play his game.”
After about two minutes, the fish was reeled in close enough to the boat for Mr. Wilcox to scoop the beast out of the water.
Weighing in at 17 pounds, 6 ounces, the fish that Mr. Newton hauled in could be declared the largest snakehead caught on hook and line in the world, a title currently held by a fisherman in Japan for a snakehead only 2 ounces lighter.
News of the haul was first reported by the Fredericksburg, Va., Free Lance-Star.
Mr. Newton must send in pictures of the fish from various angles, along with photos of the rod and reel used, to the International Game Fish Association. The Dania Beach, Fla.-based organization handles records for hook-and-line-only catches.
He also has to submit the tackle he used, as well as verification of the scale that was used to weigh the fish.
“Thank God he doesn’t have to send the fish,” said Jack Vitek, the world record coordinator with the International Game Fish Association.
Mr. Newton must also fill out an application, asking what he was using to catch the fish and the location.


Read more: -