Security Researcher Quotes

We've searched our database for all the quotes and captions related to Security Researcher. Here they are! All 100 of them:

Then there was Asshole Research Transport. ART’s official designation was deep space research vessel. At various points in our relationship, ART had threatened to kill me, watched my favorite shows with me, given me a body configuration change, provided excellent tactical support, talked me into pretending to be an augmented human security consultant, saved my clients’ lives, and had cleaned up after me when I had to murder some humans. (They were bad humans.)
Martha Wells (Rogue Protocol (The Murderbot Diaries, #3))
Do your research. Do your homework. Learn what this man would do to our country in the name of preserving a brand of freedom that is as destructive as it is impossible to secure. Know your enemy.
Mira Grant (Feed (Newsflesh, #1))
On my first day in London I made an early start. Reaching the Public Record Office not much after ten, I soon secured the papers I needed for my research and settled in my place. I became, as is the way of the scholar, so deeply absorbed as to lose all consciousness of my surroundings or of the passage of time. When at last I came to myself, it was almost eleven and I was quite exhausted: I knew I could not prudently continue without refreshment.
Sarah Caudwell (Thus Was Adonis Murdered (Hilary Tamar, #1))
In the future I see open fields for more important researches. Psychology will be securely based on the foundation already laid by Mr. Herbert Spencer, that of the necessary acquirement of each mental power and capacity by graduation.
Charles Darwin (The Origin of Species)
In the context of couples, research in this area suggests how we as partners can manage one another’s highs and lows. We don’t have to remain at the mercy of each other’s runaway moods and feelings. Rather, as competent managers of our partners, we can become expert at moving, shifting, motivating, influencing, soothing, and inspiring one another.
Stan Tatkin (Wired for Love: How Understanding Your Partner's Brain and Attachment Style Can Help You Defuse Conflict and Build a Secure Relationship)
The main lesson of thirty-five years of AI research is that the hard problems are easy and the easy problems are hard. . . . As the new generation of intelligent devices appears, it will be the stock analysts and petrochemical engineers and parole board members who are in danger of being replaced by machines. The gardeners, receptionists, and cooks are secure in their jobs for decades to come.
Erik Brynjolfsson (The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies)
Information is a significant component of most organizations’ competitive strategy either by the direct collection, management, and interpretation of business information or the retention of information for day-to-day business processing. Some of the more obvious results of IS failures include reputational damage, placing the organization at a competitive disadvantage, and contractual noncompliance. These impacts should not be underestimated.
Institute of Internal Auditors
In one of the largest surveys of its kind to date, nearly 30,000 women told researchers at the University of Cincinnati College of Medicine that they'd rather lose weight than attain any other goal, a figure that alone suggests just how complicated the issue of appetite can be for women. This is the primary female striving? The appetite to lose appetite? In fact, I suspect the opposite is true: that the primary, underlying striving among many women at the start of the millennium is the appetite for appetite: a longing to feel safe and secure enough to name one's true appetites and worthy and powerful enough to get them satisfied.
Caroline Knapp (Appetites: Why Women Want)
Cybersecurity is a new area where equality will exist to allow intelligence to succeed. Cybersecurity needs women to be successful and without them it will not as the best talent a must.
Ian R. McAndrew, PhD
Nichols credits a 1999 study by Justin Kruger and David Dunning, research psychologists at Cornell, with driving home this point. Nichols writes, “The lack of metacognition sets up a vicious loop in which people who do not know much about a subject do not know when they’re in over their head . . . and there is no way to educate or inform people who, when in doubt, will make stuff up.
Michael V. Hayden (The Assault on Intelligence: American National Security in an Age of Lies)
The government researchers,aware of the information in the professional journals, decided to reverse the process (of healing from hysteric dissociation). They decided to use selective trauma on healthy children to create personalities capable of committing acts desired for national security and defense.” p. 53 – 54
Cheryl Hersha
Enslavement could not have existed and certainly could not have persisted without medical science. However, physicians were also dependent upon slavery, both for economic security and for the enslaved “clinical material” that fed the American medical research and medical training that bolstered physicians’ professional advancement.
Harriet A. Washington (Medical Apartheid: The Dark History of Medical Experimentation on Black Americans from Colonial Times to the Present)
Research shows that it takes babies up to seven months for their attachment to their caregivers to become securely established, and for adults, a securely attached romantic relationship takes approximately two years to really solidify.60
Jessica Fern (Polysecure: Attachment, Trauma and Consensual Nonmonogamy)
A coder and independent security researcher named Sergio Lerner conducted a detailed analysis of the block chain at the time Satoshi was still mining. He concluded that Satoshi had mined at least one million bitcoins – more precisely 1,148,800. Lerner felt that if any of these coins had been spent, it would not be difficult to work out Satoshi’s identity – the recipient of the coins would know, unless the sender had sent the coins anonymously. But it appears that none of them were ever spent.
Dominic Frisby (Bitcoin: the Future of Money?)
Germany, a Wassenaar member, already has a law that effectively prohibits the sale of exploits as well as the practice of giving them away for free, something that security researchers do regularly among themselves to test systems and improve security.
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
The name UNIX began as a pun: because early versions of the operating system supported only one user—Ken Thompson—Peter Neumann, a security researcher at Stanford Research International, joked that it was an “emasculated Multics,” or “UNICS.” The spelling was eventually changed to UNIX.
Scott J. Shapiro (Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks)
Emotionally mature people have a secure sense of self. They don’t feel threatened when other people see things differently, nor are they afraid of seeming weak if they don’t know something. So when you have an insight to share with them, they listen and consider what you tell them. They may not agree, but thanks to their natural curiosity they’ll try to understand your point of view. John Gottman, well-known for his research into relationships and marital stability, describes this trait as a willingness to be influenced by others, and counts it among his seven principles for a sustainable, happy relationship (1999).
Lindsay C. Gibson (Adult Children of Emotionally Immature Parents: How to Heal from Distant, Rejecting, or Self-Involved Parents)
What happens when the YA thriller writer heroine tries to get thru airport security with her research notes in her bag? : “How to murder people by poison without detection,” the TSA agent read aloud. The woman behind Colbie gasped in horror. “Okay,” Colbie said, pointing to them. “That’s not what it looks like.” The woman behind her, cradling a leopard-print cat carrier, had turned and was frantically whispering to the people behind her. “Really,” Colbie said. “It’s a funny story, actually.” But the agent was flipping through her notes, not even remotely interested in her funny story. He didn’t need to read aloud what he was looking at, because she knew exactly what was there – other Google searches, such as how to get away with murder using a variety of different everyday products that weren’t considered weapons. “It’s research,” she said to the room. "Yeah, that’s probably what I’d say too,” a guy said from somewhere behind her.
Jill Shalvis (Chasing Christmas Eve (Heartbreaker Bay, #4))
And as a nutritional researcher, I was surprised at first by the popularity and commercial success of the low-carb diet, especially given its serious flaws. The research on high-protein, high-fat diets has consistently demonstrated that they have disastrous health effects and fail to secure compliance and long-term weight loss.
T. Colin Campbell (The Low-Carb Fraud)
Some research suggests that collecting vast amounts of data simply can’t predict rare events like terrorism. A 2006 paper by Jeff Jonas, an IBM research scientist, and Jim Harper, the director of information policy at the Cato Institute, concluded that terrorism events aren’t common enough to lend themselves to large-scale computer data mining.
Julia Angwin (Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance)
Attachment research shows that people tend to become more secure when they are in a relationship with someone secure.
Amir Levine (Attached: The New Science of Adult Attachment and How It Can Help You Find—and Keep—Love)
Hitler/Himler research into genetics and mutigenerational families led them to believe that they could control the future by controlling society. Operating on the philosophy that secret knowledge equals power, they would keep pertinent facts from the people and alter their natural evolutionary process. They knew that traumas like incest and torture left people highly suggestible and easily led. After three generations of incest, abuse, and ignorance it becomes genetically encoded and people are born more compliant. It was believed that this could be a formula for mass mind control.
Cathy O'Brien (ACCESS DENIED For Reasons Of National Security: Documented Journey From CIA Mind Control Slave To U.S. Government Whistleblower)
The government researchers, aware of the information in the professional journals, decided to reverse the process (of healing from hysteric dissociation). They decided to use selective trauma on healthy children to create personalities capable of committing acts desired for national security and defense.” p. 53 – 54 ― Secret Weapons: How Two Sisters Were Brainwashed To Kill For Their Country: Dale Griffiths, Cheryl & Lynn Hersha, Ted Schwartz Wikipedia has a long history of issues with inaccuracy and bias over dissociative disorders, abuse and ritual abuse http://ritualabuse.us/ritualabuse/art...
Cheryl Hersha (Secret Weapons: How Two Sisters Were Brainwashed to Kill for Their Country)
One such middleman is a South African security researcher based in Thailand who is known in the security community by his hacker handle “The Grugq.” The Grugq brokers exploit sales between his hacker friends and government contacts, pocketing a 15 percent commission per transaction. He only launched his business in 2011, but by 2012 sales were so good, he told a reporter he expected to make $1 million in commissions.
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
Psychologists at the University of British Columbia in Vancouver, Canada, found that the better educated and wealthier a nation is, the less likely its population is to believe in a higher being. The Global Index of Religion and Atheism also assessed that poverty was a key indicator of a society’s tendency towards religion – so that poorer countries tend to be the most religious. The one exception to the rule? America. But in the strongly religious USA, despite the country’s wealth, there’s no universal healthcare, little job security, and a flimsy social welfare safety net. This means that the USA has a lot more in common with developing countries than she might like to think. Researchers from the University of British Columbia suggest that people are less likely to need the comfort of a god if they’re living somewhere stable, safe and prosperous.
Helen Russell (The Year of Living Danishly: Uncovering the Secrets of the World's Happiest Country)
If there is a hallmark for this age, perhaps it will be our ability to take the complex findings of scientific research and apply them smoothly and effectively in our everyday lives, to better understand ourselves and to love more fully.
Stan Tatkin (Wired for Love: How Understanding Your Partner's Brain and Attachment Style Can Help You Defuse Conflict and Build a Secure Relationship)
Research suggests that what has happened to people matters less than whether they’ve processed what happened to them. In a study of the characteristics of parents who raise securely attached children, researchers found that parents who created a secure attachment for their children were often characterized by a willingness to recall and talk about their own childhoods (Main, Kaplan, and Cassidy 1985). Even though some of these parents had lived through very difficult childhood experiences, their relationships with their own children were secure, since they had spent time thinking about and integrating their childhood experiences and were at ease with both the negative and positive aspects of their past.
Lindsay C. Gibson (Adult Children of Emotionally Immature Parents: How to Heal from Distant, Rejecting, or Self-Involved Parents)
God who gave us life gave us liberty. Can the liberties of a nation be secure when we have removed a conviction that these liberties are the gift of God? Indeed I tremble for my country when I reflect that God is just, that His justice cannot sleep forever. Commerce between master and slave is despotism. Nothing is more certainly written in the book of fate than that these people are to be free. Establish the law for educating the common people. This it is the business of the state to effect and on a general plan.
Thomas Jefferson (A Summary View of the Rights of British America. Reprinted from the Original Ed (Burt Franklin Research and Source Works Series, 833. American))
significantly in his work by psychologist Mary Ainsworth, a Canadian researcher who helped give shape to his ideas and test them. Together, they identified four elements of attachment: •We seek out, monitor, and try to maintain emotional and physical connection with our loved ones. Throughout life, we rely on them to be emotionally accessible, responsive, and engaged with us. •We reach out for our loved ones particularly when we are uncertain, threatened, anxious, or upset. Contact with them gives us a sense of having a safe haven, where we will find comfort and emotional support; this sense of safety teaches us how to regulate our own emotions and how to connect with and trust others. •We miss our loved ones and become extremely upset when they are physically or emotionally remote; this separation anxiety can become intense and incapacitating. Isolation is inherently traumatizing for human beings. •We depend on our loved ones to support us emotionally and be a secure base as we venture into the world and learn and explore. The more we sense that we are effectively connected, the more autonomous and separate we can be.
Sue Johnson (Love Sense: The Revolutionary New Science of Romantic Relationships (The Dr. Sue Johnson Collection Book 2))
most of us spend our time seeking happiness and security without acknowledging the underlying purpose of our search. Each of us is looking for a path back to the present: We are trying to find good enough reasons to be satisfied now. Acknowledging that this is the structure of the game we are playing allows us to play it differently. How we pay attention to the present moment largely determines the character of our experience and, therefore, the quality of our lives. Mystics and contemplatives have made this claim for ages—but a growing body of scientific research now bears it out.
Sam Harris (Waking Up: A Guide to Spirituality Without Religion)
In Laos, a baby was never apart from its mother, sleeping in her arms all night and riding on her back all day. Small children were rarely abused; it was believed that a dab who witnessed mistreatment might take the child, assuming it was not wanted. The Hmong who live in the United States have continued to be unusually attentive parents. A study conducted at the University of Minnesota found Hmong infants in the first month of life to be less irritable and more securely attached to their mothers than Caucasian infants, a difference the researcher attributed to the fact that the Hmong mothers were, without exception, more sensitive, more accepting, and more responsive, as well as “exquisitely attuned” to their children’s signals. Another study, conducted in Portland, Oregon, found that Hmong mothers held and touched their babies far more frequently than Caucasian mothers. In a third study, conducted at the Hennepin County Medical Center in Minnesota, a group of Hmong mothers of toddlers surpassed a group of Caucasian mothers of similar socioeconomic status in every one of fourteen categories selected from the Egeland Mother-Child Rating Scale, ranging from “Speed of Responsiveness to Fussing and Crying” to “Delight.
Anne Fadiman (The Spirit Catches You and You Fall Down: A Hmong Child, Her American Doctors, and the Collision of Two Cultures)
This shift in culture has changed us. In the first place, it has made us a bit more materialistic. College students now say they put more value on money and career success. Every year, researchers from UCLA survey a nationwide sample of college freshmen to gauge their values and what they want out of life. In 1966, 80 percent of freshmen said that they were strongly motivated to develop a meaningful philosophy of life. Today, less than half of them say that. In 1966, 42 percent said that becoming rich was an important life goal. By 1990, 74 percent agreed with that statement. Financial security, once seen as a middling value, is now tied as students’ top goal. In 1966, in other words, students felt it was important to at least present themselves as philosophical and meaning-driven people. By 1990, they no longer felt the need to present themselves that way. They felt it perfectly acceptable to say they were primarily interested in money.20 We live in a more individualistic society. If
David Brooks (The Road to Character)
When the Wicked Queen calls for Snow White’s heart, because her mir- ror has informed her that she has been outstripped in beauty, the fairy tale warns little girls, even today, that there is danger in beauty. Fairy tales carry the wisdom of the ages; that is why they last and are passed down from generation to generation. So long as the most beautiful woman got the most powerful man and men were women’s only source of power, the role of beauty was too crucial to be discussed. It is only since women have de- veloped alternative sources of economic security and identity that the taboo subject of the power of their beauty has begun to be researched and written about.
Nancy Friday (Women on Top)
the group listed dangerous insufficiencies that DARPA had to shore up at once: “Inadequate nuclear, BW, CW [biological weapon, chemical weapon] detection; inadequate underground bunker detection; limited secure, real-time command and control to lower-echelon units [i.e., getting the information to soldiers on the ground]; limited ISR [intelligence, surveillance, and reconnaissance] and dissemination; inadequate mine, booby trap and explosive detection capabilities; inadequate non-lethal capabilities [i.e., incapacitating agents]; inadequate modeling/simulation for training, rehearsal and operations; no voice recognition or language translation; inadequate ability to deal with sniper attacks.
Annie Jacobsen (The Pentagon's Brain: An Uncensored History of DARPA, America's Top-Secret Military Research Agency)
We often marvel at how introverted, geeky kids “blossom” into secure and happy adults. We liken it to a metamorphosis. However, maybe it’s not the children who change but their environments. As adults, they get to select the careers, spouses, and social circles that suit them. They don’t have to live in whatever culture they’re plunked into. Research
Susan Cain (Quiet: The Power of Introverts in a World That Can't Stop Talking)
Over the years I have read many, many books about the future, my ‘we’re all doomed’ books, as Connie liked to call them. ‘All the books you read are either about how grim the past was or how gruesome the future will be. It might not be that way, Douglas. Things might turn out all right.’ But these were well-researched, plausible studies, their conclusions highly persuasive, and I could become quite voluble on the subject. Take, for instance, the fate of the middle-class, into which Albie and I were born and to which Connie now belongs, albeit with some protest. In book after book I read that the middle-class are doomed. Globalisation and technology have already cut a swathe through previously secure professions, and 3D printing technology will soon wipe out the last of the manufacturing industries. The internet won’t replace those jobs, and what place for the middle-classes if twelve people can run a giant corporation? I’m no communist firebrand, but even the most rabid free-marketeer would concede that market-forces capitalism, instead of spreading wealth and security throughout the population, has grotesquely magnified the gulf between rich and poor, forcing a global workforce into dangerous, unregulated, insecure low-paid labour while rewarding only a tiny elite of businessmen and technocrats. So-called ‘secure’ professions seem less and less so; first it was the miners and the ship- and steel-workers, soon it will be the bank clerks, the librarians, the teachers, the shop-owners, the supermarket check-out staff. The scientists might survive if it’s the right type of science, but where do all the taxi-drivers in the world go when the taxis drive themselves? How do they feed their children or heat their homes and what happens when frustration turns to anger? Throw in terrorism, the seemingly insoluble problem of religious fundamentalism, the rise of the extreme right-wing, under-employed youth and the under-pensioned elderly, fragile and corrupt banking systems, the inadequacy of the health and care systems to cope with vast numbers of the sick and old, the environmental repercussions of unprecedented factory-farming, the battle for finite resources of food, water, gas and oil, the changing course of the Gulf Stream, destruction of the biosphere and the statistical probability of a global pandemic, and there really is no reason why anyone should sleep soundly ever again. By the time Albie is my age I will be long gone, or, best-case scenario, barricaded into my living module with enough rations to see out my days. But outside, I imagine vast, unregulated factories where workers count themselves lucky to toil through eighteen-hour days for less than a living wage before pulling on their gas masks to fight their way through the unemployed masses who are bartering with the mutated chickens and old tin-cans that they use for currency, those lucky workers returning to tiny, overcrowded shacks in a vast megalopolis where a tree is never seen, the air is thick with police drones, where car-bomb explosions, typhoons and freak hailstorms are so commonplace as to barely be remarked upon. Meanwhile, in literally gilded towers miles above the carcinogenic smog, the privileged 1 per cent of businessmen, celebrities and entrepreneurs look down through bullet-proof windows, accept cocktails in strange glasses from the robot waiters hovering nearby and laugh their tinkling laughs and somewhere, down there in that hellish, stewing mess of violence, poverty and desperation, is my son, Albie Petersen, a wandering minstrel with his guitar and his keen interest in photography, still refusing to wear a decent coat.
David Nicholls (Us)
Why do we accept this one-size-fits-all situation as a given when we know perfectly well that adults don’t organize themselves this way? We often marvel at how introverted, geeky kids “blossom” into secure and happy adults. We liken it to a metamorphosis. However, maybe it’s not the children who change but their environments. As adults, they get to select the careers, spouses, and social circles that suit them. They don’t have to live in whatever culture they’re plunked into. Research from a field known as “person-environment fit” shows that people flourish when, in the words of psychologist Brian Little, they’re “engaged in occupations, roles or settings that are concordant with their personalities.” The inverse is also true: kids stop learning when they feel emotionally threatened.
Susan Cain (Quiet: The Power of Introverts in a World That Can't Stop Talking)
Piff and his team of researchers found that the rich are more likely than the poor to cut off other vehicles when driving through intersections. And they’re less likely to stop for pedestrians. They’re more likely to cheat in a game, and more likely to think of greed as good. But money is not to blame for this, Piff suggests. What’s to blame is the comfort that a higher class status affords—the independence, the insularity, the security, the illusion of not needing other people. “While having money doesn’t necessarily make anybody anything,” Piff told New York magazine, “the rich are way more likely to prioritize their own self-interests above the interests of other people. It makes them more likely to exhibit characteristics that we would stereotypically associate with, say, assholes.
Eula Biss (Having and Being Had)
No one can understand history without continually relating the long periods which are constantly mentioned to the experiences of our own short lives. Five years is a lot. Twenty years is the horizon to most people. Fifty years is antiquity. To understand how the impact of destiny fell upon any generation of men one must first imagine their position and then apply the time-scale of our own lives. Thus nearly all changes were far less perceptible to those who lived through them from day to day than appears when the salient features of an epoch are extracted by the chronicler. We peer at these scenes through dim telescopes of research across a gulf of nearly two thousand years. We cannot doubt that the second and to some extent the third century of the Christian era, in contrast with all that had gone before and most that was to follow, were a Golden Age for Britain. But by the early part of the fourth century shadows had fallen upon this imperfect yet none the less tolerable society. By steady, persistent steps the sense of security departed from Roman Britain. Its citizens felt by daily experience a sense that the world-wide system of which they formed a partner province was in decline.
Winston S. Churchill (The Birth of Britain (A History of the English Speaking Peoples #1))
Since no one can know everything, and most people know almost nothing, rationality consists of outsourcing knowledge to institutions that specialize in creating and sharing it, primarily academia, public and private research units, and the press. That trust is a precious resource which should not be squandered. Though confidence in science has remained steady for decades, confidence in universities is sinking. A major reason for the mistrust is the universities’ suffocating left-wing monoculture, with its punishment of students and professors who question dogmas on gender, race, culture, genetics, colonialism, and sexual identity and orientation. Universities have turned themselves into laughingstocks for their assaults on common sense (as when a professor was recently suspended for mentioning the Chinese pause word ne ga because it reminded some students of the racial slur). On several occasions correspondents have asked me why they should trust the scientific consensus on climate change, since it comes out of institutions that brook no dissent. That is why universities have a responsibility to secure the credibility of science and scholarship by committing themselves to viewpoint diversity, free inquiry, critical thinking, and active open-mindedness.
Steven Pinker (Rationality)
Social support helps to ameliorate physiological stress. The close links between health and the social environment have been amply demonstrated. In the Alameda County study, those more socially isolated were more susceptible to illness of many types. In three separate studies of aging people, five-year mortality risks were associated directly with social integration: the more socially connected a person was, the lower their risk of death. “Social ties and support,” a group of researchers concluded, “… remain powerful predictors of morbidity and mortality in their own right, independent of any associations with other risk factors." For the adult, therefore, biological stress regulation depends on a delicate balance between social and relationship security on the one hand, and genuine autonomy on the other. Whatever upsets that balance, whether or not the individual is consciouslyaware of it, is a source of stress.
Gabor Maté (When the Body Says No: The Cost of Hidden Stress)
Five years ago the Library of Congress began a project that collects every utterance on Twitter, in the name of preserving the nation’s digital heritage. That is billions weekly, sucked up for storage in secure tape archives, and the Library has yet to figure out how to make any of it available to researchers. Divorced from a human curator, the unfiltered mass of Twitter may as well be a garbage heap ["What Libraries Can (Still) Do," The New York Review Daily, October 26, 2015].
James Gleick
In Lebanon, home to well over a million Syrian refugees, the UN Refugee Agency (UNHCR) decided to use its limited ‘winterization’ funds to pay cash transfers to vulnerable families living above 500 metres altitude. These were unconditional, although recipients were told they were intended for buying heating supplies. Recipient families were then compared with a control group living just below 500 metres. The researchers found that cash assistance did lead to increased spending on fuel supplies, but it also boosted school enrolment, reduced child labour and increased food security.55 One notable finding was that the basic income tended to increase mutual support between beneficiaries and others in the community, reduced tension within recipient families, and improved relationships with the host community. There were significant multiplier effects, with each dollar of cash assistance generating more than $2 for the Lebanese economy, most of which was spent locally.
Guy Standing (Basic Income: And How We Can Make It Happen)
A secure attachment is marked by “self-confidence, empathy, and trust,” note researchers Christopher Weber and Christopher Federico, and can lead to a general belief that the world is a “safe, harmonious place” populated by people of goodwill. The secure voter, therefore, will tend to be tolerant of ambiguity and disinclined to embrace a rigid dogmatism. According to attachment expert Mario Mikulincer, a secure attachment produces “more moderate, more flexible, and more realistic political views.
Peter Lovenheim (The Attachment Effect: Exploring the Powerful Ways Our Earliest Bond Shapes Our Relationships and Lives)
For example, in 2012 researchers at Kaspersky Lab in Moscow uncovered a highly complex piece of malware known as Flame that had been pilfering data from information systems around the world for more than five years before it was detected. Mikko Hypponen, the well-respected chief research officer at the computer security firm F-Secure, called Flame a failure for the antivirus industry and noted he and his colleagues may be “out of their leagues in their own game.” Though millions around the world rely on these tools, it’s pretty clear the antivirus era is over.
Marc Goodman (Future Crimes)
We often marvel at how introverted, geeky kids “blossom” into secure and happy adults. We liken it to a metamorphosis. However, maybe it’s not the children who change but their environments. As adults, they get to select the careers, spouses, and social circles that suit them. They don’t have to live in whatever culture they’re plunked into. Research from a field known as “person-environment fit” shows that people flourish when, in the words of psychologist Brian Little, they’re “engaged in occupations, roles or settings that are concordant with their personalities.
Susan Cain (Quiet: The Power of Introverts in a World That Can't Stop Talking)
Following this rejection, and Sagan’s failure to secure tenure at Harvard, scientists developed a new term: the Sagan effect. One’s popularity with the general public was considered inversely proportional to the quantity and quality of one’s scientific work, a perception that, in Sagan’s case at least, was false. He published, on average, once monthly in peer-reviewed publications over the course of his thirty-nine-year career—a total of five hundred scientific papers. More recent research suggests that scientists who engage the public tend to be better academic performers as well.
Shawn Lawrence Otto (The War on Science: Who's Waging It, Why It Matters, What We Can Do About It)
The intelligent want self-control; children want candy. —RUMI INTRODUCTION Welcome to Willpower 101 Whenever I mention that I teach a course on willpower, the nearly universal response is, “Oh, that’s what I need.” Now more than ever, people realize that willpower—the ability to control their attention, emotions, and desires—influences their physical health, financial security, relationships, and professional success. We all know this. We know we’re supposed to be in control of every aspect of our lives, from what we eat to what we do, say, and buy. And yet, most people feel like willpower failures—in control one moment but overwhelmed and out of control the next. According to the American Psychological Association, Americans name lack of willpower as the number-one reason they struggle to meet their goals. Many feel guilty about letting themselves and others down. Others feel at the mercy of their thoughts, emotions, and cravings, their lives dictated by impulses rather than conscious choices. Even the best-controlled feel a kind of exhaustion at keeping it all together and wonder if life is supposed to be such a struggle. As a health psychologist and educator for the Stanford School of Medicine’s Health Improvement Program, my job is to help people manage stress and make healthy choices. After years of watching people struggle to change their thoughts, emotions, bodies, and habits, I realized that much of what people believed about willpower was sabotaging their success and creating unnecessary stress. Although scientific research had much to say that could help them, it was clear that these insights had not yet become part of public understanding. Instead, people continued to rely on worn-out strategies for self-control. I saw again and again that the strategies most people use weren’t just ineffective—they actually backfired, leading to self-sabotage and losing control. This led me to create “The Science of Willpower,” a class offered to the public through Stanford University’s Continuing Studies program. The course brings together the newest insights about self-control from psychology, economics, neuroscience, and medicine to explain how we can break old habits and create healthy habits, conquer procrastination, find our focus, and manage stress. It illuminates why we give in to temptation and how we can find the strength to resist. It demonstrates the importance of understanding the limits of self-control,
Kelly McGonigal (The Willpower Instinct: How Self-Control Works, Why It Matters, and What You Can Do To Get More of It)
In English, we have a word for pain and a word for thirst, but no single, specific terms that mean the opposite. We merely reference the absence of these aversive conditions, which makes sense, because their absence is considered part of the normal state. Our research suggests that “not lonely”—there is no better, more specific term for it—is also, like “not thirsty” or “not in pain,” very much part of the normal state. Health and well-being for a member of our species requires, among other things, being satisfied and secure in our bonds with other people, a condition of “not being lonely” that, for want of a better word, we call social connection.
John T. Cacioppo (Loneliness: Human Nature and the Need for Social Connection)
Only on how we are becoming more and more commercial with each project.  Corporations are driving it all with their friends in Washington beating their ‘in the interest of national security’ drums which means that anything connected to energy these days, especially the black liquid kind, is considered national security.  Most of our projects in the last few years have been soil and drilling samples thinly disguised as marine research which really means looking for new oil reserves for the conglomerates.”  He leaned back in his chair unable to hide his irritation.  “I’ll tell you this, corporations have become the puppet masters behind the government.
Michael C. Grumley (Breakthrough (Breakthrough, #1))
The illusionists of quantity are performing sleights of hand wherever it concerns the topic of quality. A profession that went from being second in command under the throne, to outsourced to the cheapest external providers, is perhaps one of greatest conflicts of interest society faces today, not to mention the blatant disrespect of the people quality is intended for in the first place. Quality is about ascertaining the absolute best, for the sake of all involved. It therefore, is a lofty profession combining research, science, and morality to make the best judgements for today based on the history of the past in order to most adequately prepare for an ever oncoming future. Most importantly, quality removes personal preference that is not in the best interest of all people. Thus, anyone who would launch a war on quality can be considered an enemy of mankind, as they are would be purveyors of an ultimate breach of trust and security. Until the concept of quality is reinstituted as the governing advisor in all aspects of society, sychophants will chant "more" is "better". They will sell mediocrity at top dollar, and make top profits. Mediocrity should not be the accepted, celebrated standard, it should be the rudimentary blueprint for the greatest rollouts of progress ever marked in human history.
Justin Kyle McFarlane Beau
While I was researching this book, an official with the U.S. Securities and Exchange Commission learned I was writing about specialization and contacted me to make sure I knew that specialization had played a critical role in the 2008 global financial crisis. “Insurance regulators regulated insurance, bank regulators regulated banks, securities regulators regulated securities, and consumer regulators regulated consumers,” the official told me. “But the provision of credit goes across all those markets. So we specialized products, we specialized regulation, and the question is, ‘Who looks across those markets?’ The specialized approach to regulation missed systemic issues.
David Epstein (Range: How Generalists Triumph in a Specialized World)
It’s not a new plan or even a secret one. It’s not even just a Republican plan. State-funded marriage initiatives have been a policy priority under Bill Clinton, George W. Bush, and Barack Obama. And the logic of each of the programs has always been, as Senator Marco Rubio of Florida stated in 2014, that marriage is the “greatest tool to lift women and children out of poverty.” But maybe instead of discouraging divorce and forcing people into marriages for financial security, we should make a more equitable society. There is research evidence that suggests that countries with well-funded social safety nets have less divorce, fewer instances of child abuse, and less crime.
Lyz Lenz (This American Ex-Wife: How I Ended My Marriage and Started My Life)
By tracing the early history of USCYBERCOM it is possible to understand some of the reasons why the military has focused almost completely on network defense and cyber attack while being unaware of the need to address the vulnerabilities in systems that could be exploited in future conflicts against technologically capable adversaries. It is a problem mirrored in most organizations. The network security staff are separate from the endpoint security staff who manage desktops through patch and vulnerability management tools and ensure that software and anti-virus signatures are up to date. Meanwhile, the development teams that create new applications, web services, and digital business ventures, work completely on their own with little concern for security. The analogous behavior observed in the military is the creation of new weapons systems, ISR platforms, precision targeting, and C2 capabilities without ensuring that they are resistant to the types of attacks that USCYBERCOM and the NSA have been researching and deploying. USCYBERCOM had its genesis in NCW thinking. First the military worked to participate in the information revolution by joining their networks together. Then it recognized the need for protecting those networks, now deemed cyberspace. The concept that a strong defense requires a strong offense, carried over from missile defense and Cold War strategies, led to a focus on network attack and less emphasis on improving resiliency of computing platforms and weapons systems.
Richard Stiennon (There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar)
Students at the instituted for Environmental Research at RWTH Aachen discovered something amazing about photosynthesis in undisturbed beech forests. Apparently, the trees synchronize their performance so that they are all equally successful. And that is not what one would expect. Each beech tree grows in a unique location, and conditions can vary greatly in just a few yards. The soil can be stony or loose. It can retain a great deal of water or almost no water. It can be full of nutrients or extremely barren. Accordingly, each tree experiences different growing conditions; therefore, each tree grows more quickly or more slowly and produces more or less sugar or wood, and thus you would expect every tree to be photosynthesizing at a different rate. And that's what makes the research results so astounding. The rate of photosynthesis is the same for all the trees. The trees, it seems, are equalizing differences between the strong and the weak. Whether they are thick or thin, all members of the same species are using light to produce the same amount of sugar per leaf. This equalization is taking place underground through the roots. There's obviously a lively exchange going on down there. Whoever has an abundance of sugar hands some over; whoever is running short gets help. Once again, fungi are involved. Their enormous networks act as gigantic redistribution mechanisms. It's a bit like the way social security systems operate to ensure individual members of society don't fall too far behind.
Peter Wohlleben (The Hidden Life of Trees: What They Feel, How They Communicate: Discoveries from a Secret World)
These days, most Americans who are unashamedly prejudiced know better than to say so, except to a secure, like-minded audience, given that many people live and work in environments where they can be slapped on the wrist, publicly humiliated, or sacked for saying anything that smacks of an "ism." However, just as it takes mental effort to maintain a prejudice despite conflicting information, it takes mental effort to suppress those negative feelings. Social psychologists Chris Crandall and Amy Eshelman, reviewing the huge research literature on prejudice, found that whenever people are emotionally depleted—when they are sleepy, frustrated, angry, anxious, drunk, or stressed—they become more willing to express their real prejudices toward another group.
Anonymous
Discussion of psychological warfare remains controversial because reexamination of its record leads in short order to a heretical conclusion: The role of the United States in world affairs during our lifetimes has often been rapacious, destructive, tolerant of genocide, and willing to sacrifice countless people in the pursuit of a chimera of security that has grown ever more remote. Rethinking psychological warfare's role in communication studies, in turn, requires reconsideration of where contemporary Western ideology comes from, whose interests it serves, and the role that social scientists play in its propagation. Such discussions have always upset those who are content with the present order of things. For the rest of us, though, they permit a glimmer of hope.
Christopher Simpson (Science of Coercion: Communication Research and Psychological Warfare, 1945-1960)
I'd attended a selective liberal arts college, trained at respectable research institutions, and even completed a dissertation for a doctoral degree. In our shared office, I'd tell new hires I was ABD, so they wouldn't feel their own situation was so bleak. If they saw a ten-year veteran adjunct with a PhD, they might lose hope of securing a permanent job. It was the least I could do, as a good American, to remind the young we were an innocent and optimistic country where everyone was entitled to a fulfilling career. To make sure they understood that PhD stood not for "piled higher and deeper" or "Pop has dough," but in fact the degree meant "professional happiness desired," and at the altruistic colleges of democratic America only the angry or sad ones need not apply.
Alex Kudera (Auggie's Revenge)
One of many intriguing aspects of Karen Stenner's research on authoritarian predispositions is that it hints at how and why political revolutions might take place in this new and different twenty-first-century world. Over a crackly video link between Australia and Poland, she reminded me that the "authoritarian predisposition" she has identified is not exactly the same thing as closed-mindedness. It is better described as simple-mindedness: people are often attracted to authoritarian ideas because they are bothered by complexity. They dislike divisiveness. They prefer unity. A sudden onslaught of diversity--diversity of opinions, diversity of experiences--therefore makes them angry. They seek solutions in new political language that makes them feel safer and more secure.
Anne Applebaum (Twilight of Democracy: The Seductive Lure of Authoritarianism)
The Obama administration warned federal employees that materials released by WikiLeaks remained classified—even though they were being published by some of the world’s leading news organizations including the New York Times and the Guardian. Employees were told that accessing the material, whether on WikiLeaks.org or in the New York Times, would amount to a security violation.21 Government agencies such as the Library of Congress, the Commerce Department and the US military blocked access to WikiLeaks materials over their networks. The ban was not limited to the public sector. Employees from the US government warned academic institutions that students hoping to pursue a career in public service should stay clear of material released by WikiLeaks in their research and in their online activity.
Julian Assange
And I will read part, as much as time allows in the second half, of the new issue of Computer and Automation, the November 1971 issue. And the statement above the article is on the assassination of President Kennedy. It’s the pattern of coup d’état and public deception. And it begins with this quotation of author Edmund Berkeley.            We must begin to recognize history as it is happening to us. We can no longer toy with illusion. Our war adventures in Asia are not related to national security in any rational sense. A coup d’état took place in the United States on November 22, 1963, when President John F. Kennedy was assassinated. That came eight years after I began my research. People talk about never having fascism in this country or never being overthrown – they have already been overthrown, and they’re not aware of it.
Mae Brussell (The Essential Mae Brussell: Investigations of Fascism in America)
Multi-generational sexual child abuse is such a common cause of the proliferation of pedophilia that Hitler/Himmler research focused on this genetic trait for mind control purposes. While I personally could not relate to the idea of sex with a child, I had parents and brothers and sisters who did. I still believe that George Bush revealed today’s causation of the rapid rise in pedophilia through justifications I heard him state. The rape of a child renders them compliant and receptive to being led without question. This, Bush claims, would cause them to intellectually evolve at a rate rapid enough to “bring them up to speed” to grasp the artificial intelligence emanating from DARPA. He believed that this generation conditioned with photographic memory through abuse was necessary for a future he foresaw controlled by technology.
Cathy O'Brien (ACCESS DENIED For Reasons Of National Security: Documented Journey From CIA Mind Control Slave To U.S. Government Whistleblower)
What makes earned secure attachment unique, however, is its correlation with parenting that promotes secure attachment in the next generation (Roisman et al., 2002). This research challenges the prevailing view that suboptimal attachment in the parent generation predicts the likelihood of providing less-than-optimal attachment experiences for the next generation. Instead, it suggests that human beings can transform the implicit memories and explicit narrative of the past by internalizing healthy adult attachment experiences until they achieve the benefits conferred by secure attachment. The fact that earned secure attachment transmits the ability to offer the same to the next generation is a hopeful sign. It implies that we can help our clients bring a stop to the intergenerational legacy of trauma in their families and create a new legacy through the intergenerational transmission of secure attachment.
Janina Fisher (Healing the Fragmented Selves of Trauma Survivors: Overcoming Internal Self-Alienation)
We've simply become too attached to work," I explained. "We've become too addicted to working and we need to balance our lives with a little idle activity like sitting on porches or chatting with neighbors." "I would HATE that!" she answered with a moo of disgust. "I LOVE to work! I can't stand just sitting around. Work makes me happy." This woman, by the way, is one of the most grounded, cheerful, and talented people I know. She's also not an outlier. I've had this conversation many times over the past few years with both friends and strangers and I often get some version of, "but I love to work!" in response. The question for me wasn't whether people enjoyed their work but whether they needed it. That was the question that drove my research. The question I asked hundreds of people around the country and the essential question of this book: Is work necessary? A lot of people will disagree with my next statement to the point of anger and outrage: Humans don't need to work in order to be happy. At this point, in our historical timeline, that claim is almost subversive. The assumption that work is at the core of what it means to lead a useful life underlies so much of our morality that it may feel I'm questioning our need to breathe or eat or sleep. But as I examined the body of research of what we know is good for all humans, what is necessary for all humans, I noticed a gaping hole where work was supposed to be. This lead me to ask some pointed questions about why most of us feel we can't be fully human unless we're working. Please note that by "work" I don't mean the activities we engage in to secure our survival: finding food, water, or shelter. I mean the labor we do to secure everything else beyond survival or to contribute productively to the broader society - the things we do in exchange for pay.
Celeste Headlee (Do Nothing: How to Break Away from Overworking, Overdoing, and Underliving)
I am against allowing the CIA to spend $25 million since 1947 for the express purpose, as stated before, to alter our behavior. Is the State supreme over individuals? Who owns or controls our minds? Why was CIA Director Allen Dulles allowed to order 100 million LSD tablets? Were half the U.S. population going to receive their doses? What gives the CIA and Pentagon the right to define normal, or to determine what is national security? Are we being drugged through food, water and supplied with chemicals so we become slaves and robots? Where is all the cancer coming from? Why the preoccupation with death? Why is the U.S. Government in the business of creating a "Psycho-civilized" world? Who is ordering the ultrasonic waves to lower brain waves of city populations to an alpha state, leaving citizens susceptible to mass propaganda and hypnotic suggestion? These facts have been confirmed by researcher Walter Bowart in 1977. I learned about the project years ago.
Mae Brussell
IN OCTOBER 2019, just a few months before the novel coronavirus swept the world, Johns Hopkins University released its first Global Heath Security Index, a comprehensive analysis of countries that were best prepared to handle an epidemic or pandemic. The United States ranked first overall, and first in four of the six categories—prevention, early detection and reporting, sufficient and robust health system, and compliance with international norms. That sounded right. America was, after all, the country with most of the world’s best pharmaceutical companies, research universities, laboratories, and health institutes. But by March 2020, these advantages seemed like a cruel joke, as Covid-19 tore across the United States and the federal government mounted a delayed, weak, and erratic response. By July, with less than 5% of the world’s population, the country had over 25% of the world’s cumulative confirmed cases. Per capita daily death rates in the United States were ten times higher than in Europe. Was this the new face of American exceptionalism?
Fareed Zakaria (Ten Lessons for a Post-Pandemic World)
In attunement, it is the infant who leads and the mother who follows. “Where their roles differ is in the timing of their responses,” writes John Bowlby, one of the century’s great psychiatric researchers. The infant initiates the interaction or withdraws from it according to his own rhythms, Bowlby found, while the “mother regulates her behaviour so that it meshes with his... Thus she lets him call the tune and by a skillful interweaving of her own responses with his creates a dialogue.” The tense or depressed mothering adult will not be able to accompany the infant into relaxed, happy spaces. He may also not fully pick up signs of the infant’s emotional distress, or may not be able to respond to them as effectively as he would wish. The ADD child’s difficulty reading social cues likely originates from her relationship cues not being read by the nurturing adult, who was distracted by stress. In the attunement interaction, not only does the mother follow the child, but she also permits the child to temporarily interrupt contact. When the interaction reaches a certain stage of intensity for the infant, he will look away to avoid an uncomfortably high level of arousal. Another interaction will then begin. A mother who is anxious may react with alarm when the infant breaks off contact, may try to stimulate him, to draw him back into the interaction. Then the infant’s nervous system is not allowed to “cool down,” and the attunement relationship is hampered. Infants whose caregivers were too stressed, for whatever reason, to give them the necessary attunement contact will grow up with a chronic tendency to feel alone with their emotions, to have a sense — rightly or wrongly — that no one can share how they feel, that no one can “understand.” Attunement is the quintessential component of a larger process, called attachment. Attachment is simply our need to be close to somebody. It represents the absolute need of the utterly and helplessly vulnerable human infant for secure closeness with at least one nourishing, protective and constantly available parenting figure. Essential for survival, the drive for attachment is part of the very nature of warm-blooded animals in infancy, especially. of mammals. In human beings, attachment is a driving force of behavior for longer than in any other animal. For most of us it is present throughout our lives, although we may transfer our attachment need from one person — our parent — to another — say, a spouse or even a child. We may also attempt to satisfy the lack of the human contact we crave by various other means, such as addictions, for example, or perhaps fanatical religiosity or the virtual reality of the Internet. Much of popular culture, from novels to movies to rock or country music, expresses nothing but the joys or the sorrows flowing from satisfactions or disappointments in our attachment relationships. Most parents extend to their children some mixture of loving and hurtful behavior, of wise parenting and unskillful, clumsy parenting. The proportions vary from family to family, from parent to parent. Those ADD children whose needs for warm parental contact are most frustrated grow up to be adults with the most severe cases of ADD. Already at only a few months of age, an infant will register by facial expression his dejection at the mother’s unconscious emotional withdrawal, despite the mother’s continued physical presence. “(The infant) takes delight in Mommy’s attention,” writes Stanley Greenspan, “and knows when that source of delight is missing. If Mom becomes preoccupied or distracted while playing with the baby, sadness or dismay settles in on the little face.
Gabor Maté (Scattered: How Attention Deficit Disorder Originates and What You Can Do About It)
The experiment is called the Strange Situation, and you can see variations of it on the Internet. A mother and her toddler are in an unfamiliar room. A few minutes later, a researcher enters and the mother exits, leaving the youngster alone or with the researcher. Three minutes later, the mother comes back. Most children are initially upset at their mother’s departure; they cry, throw toys, or rock back and forth. But three distinct patterns of behavior emerge when mother and child are reunited—and these patterns are dictated by the type of emotional connection that has developed between the two. Children who are resilient, calm themselves quickly, easily reconnect with their moms, and resume exploratory play usually have warm and responsive mothers. Youngsters who stay upset and nervous and turn hostile, demanding, and clingy when their moms return tend to have mothers who are emotionally inconsistent, blowing sometimes hot, sometimes cold. A third group of children, who evince no pleasure, distress, or anger and remain distant and detached from their mothers, are apt to have moms who are cold and dismissive. Bowlby and Ainsworth labeled the children’s strategies for dealing with emotions in relationships, or attachment styles, secure, anxious, and avoidant, respectively.
Sue Johnson (Love Sense: The Revolutionary New Science of Romantic Relationships (The Dr. Sue Johnson Collection Book 2))
The controversy and confusion that surrounded the Shah’s human rights record overshadowed his many real accomplishments in the fields of women’s rights, literacy, health care, education, and modernization. Help in sifting through the accusations and allegations came from a most unexpected quarter, however, when the Islamic Republic announced plans to identify and memorialize each victim of Pahlavi ‘oppression.’ But lead researcher, Emad al-Din Baghi, a former seminary student, was shocked to discover that he could not match the victims’ names to the official numbers: instead of 100,000 deaths, Baghi could only confirm 3,164. Even that number was inflated because it included all 2,781 fatalities from the 1978-1979 revolution. The actual death toll was lowered to 383, of whom 197 were guerilla fighters and terrorists killed in skirmishes with the security forces. That meant 183 political prisoners and dissidents were executed, committed suicide in detention, or died under torture. … The lower numbers do not excuse or diminish the suffering of political prisoners jailed or tortured in Iran in the 1970s. They do, however, show the extent to which the historical record was manipulated by Khomeini and his partisans to criminalize the Shah and justify their own excesses and abuses.
Andrew Scott Cooper (The Fall of Heaven: The Pahlavis and the Final Days of Imperial Iran)
hesitation they lost their lead. Adult attachment theory teaches us that Karen’s basic assumption, that she can and should control her emotional needs and soothe herself in the face of stress, is simply wrong. She assumed the problem was that she is too needy. Research findings support the exact opposite. Getting attached means that our brain becomes wired to seek the support of our partner by ensuring the partner’s psychological and physical proximity. If our partner fails to reassure us, we are programmed to continue our attempts to achieve closeness until the partner does. If Karen and Tim understood this, she would not feel ashamed of needing to hold his hand during the stress of a nationally televised race. For his part, Tim would have known that the simple gesture of holding Karen’s hand could give them the extra edge they needed to win. Indeed, if he knew that by responding to her need early on, he would have had to devote less time to “putting out fires” caused by her compounded distress later—he might have been inclined to hold her hand when he noticed that she was starting to get anxious, instead of waiting until she demanded it. What’s more, if Tim was able to accept Karen’s support more readily, he would probably have bungee jumped sooner. Attachment principles teach us that most
Amir Levine (Attached: Are you Anxious, Avoidant or Secure? How the science of adult attachment can help you find – and keep – love)
President and Chief Operating Officer (COO), accountable for the overall achievement of the Strategic Objective and reporting to the SHAREHOLDERS who include, on an equal basis, Jack and Murray. • Vice-President/Marketing, accountable for finding customers and finding new ways to provide customers with the satisfactions they derive from widgets, at lower cost, and with greater ease, and reporting to the COO. • Vice-President/Operations, accountable for keeping customers by delivering to them what is promised by Marketing, and for discovering new ways of assembling widgets, at lower cost, and with greater efficiency so as to provide the customer with better service, reporting to the COO. • Vice-President/Finance, accountable for supporting both Marketing and Operations in the fulfillment of their accountabilities by achieving the company’s profitability standards, and by securing capital whenever it’s needed, and at the best rates, also reporting to the COO. • Reporting to the Vice-President/Marketing are two positions: Sales Manager and Advertising/Research Manager. • Reporting to the Vice-President/Operations are three positions: Production Manager, Service Manager, and Facilities Manager. • Reporting to the Vice-President/Finance are two positions: Accounts Receivable Manager and Accounts Payable Manager.
Michael E. Gerber (The E-Myth Revisited: Why Most Small Businesses Don't Work and What to Do About It)
for nearly a decade, the World Bank has been reiterating its finding that “crime and violence have emerged in recent years as major obstacles to the realization of development objectives.”8 The Bank has stated flatly, “In many developing countries, high levels of crime and violence not only undermine people’s safety on an everyday level, they also undermine broader development efforts to improve governance and reduce poverty.”9 Multiple studies by the United Nations Office on Drugs and Crime (UNODC) have concluded that restraining violence is a precondition to poverty alleviation and economic development, plainly stating that “a foundational level of order must be established before development objectives can be realized.”10 Leaders of the United Kingdom’s Department for International Development (DFID) have concluded, “Poor people want to feel safe and secure just as much as they need food to eat, clean water to drink and a job to give them an income. Without security there cannot be development.”11 When it comes to violence, researchers are increasingly concerned that development experts are missing Amartya Sen’s insight that “development [is] a process of expanding the real freedoms people enjoy,” and are failing to appreciate the idea “that freedom from crime and violence are key components of development. Freedom from fear is as important as freedom from want. It is impossible to truly enjoy one of these rights without the other.”12
Gary A. Haugen (The Locust Effect: Why the End of Poverty Requires the End of Violence)
Bush’s description of how basic research provides the seed corn for practical inventions became known as the “linear model of innovation.” Although subsequent waves of science historians sought to debunk the linear model for ignoring the complex interplay between theoretical research and practical applications, it had a popular appeal as well as an underlying truth. The war, Bush wrote, had made it “clear beyond all doubt” that basic science—discovering the fundamentals of nuclear physics, lasers, computer science, radar—“is absolutely essential to national security.” It was also, he added, crucial for America’s economic security. “New products and new processes do not appear full-grown. They are founded on new principles and new conceptions, which in turn are painstakingly developed by research in the purest realms of science. A nation which depends upon others for its new basic scientific knowledge will be slow in its industrial progress and weak in its competitive position in world trade.” By the end of his report, Bush had reached poetic heights in extolling the practical payoffs of basic scientific research: “Advances in science when put to practical use mean more jobs, higher wages, shorter hours, more abundant crops, more leisure for recreation, for study, for learning how to live without the deadening drudgery which has been the burden of the common man for past ages.”9 Based on this report, Congress established the National Science Foundation.
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
If you want to know the real reasons why certain politicians vote the way they do - follow the money. Arch Brexiteer Jacob Rees-Mogg (a.k.a. JackOff Grease-Smug) stands to make billions via his investment firm - Somerset Capital Management - if the UK crashes unceremoniously out of the European Union without a secure future trade deal. Why ? Because proposed EU regulations will give enforcement agencies greater powers to curb the activities adopted by the sort of off-shore tax havens his company employs. Consequently the British electorate get swindled not once, but twice. Firstly because any sort of Brexit - whether hard, soft, or half-baked - will make every man, woman and child in the UK that much poorer than under the status quo currently enjoyed as a fully paid up member of the EU. Secondly because Rees-Mogg's company, if not brought to heel by appropriate EU wide legislation, will deprive Her Majesty's Treasury of millions in taxes, thus leading to more onerous taxes for the rest of us. It begs the question, who else in the obscure but influential European Research Group (ERG) that he chairs and the Institute for Economic Affairs (IEA) that he subscribes to, have similar vested interests in a no-deal Brexit ? It is high time for infinitely greater parliamentary and public scrutiny into the UK Register of Members' Financial Interests in order to put an end to these nefarious dealings and appalling double standards in public life which only serve to further corrode public trust in an already fragile democracy.
Alex Morritt (Lines & Lenses)
I text her from the lobby and tell her I’m on my way up. Having a badge is a really convenient way to get past building security. Not that this place has much. She’s standing in the open doorway of her apartment when I get off the elevator, hand on her hip with her head cocked to the side in question. “I brought donuts,” I offer by way of explanation for showing up unannounced. “Did you need a favor or something?” she asks, taking the box from my hands and setting it on the tiny round dining table just inside the door of her apartment. Not a promising start, but she does allow me to follow her inside. “I just brought you a favor,” I comment then eye her. “Do you own any pants?” She’s wearing another pair of those godforsaken leggings. “What are you talking about? I’m wearing pants right now. And how does this count as a favor when I didn’t ask for it? It shouldn’t count towards my favor tally if I didn’t make the official request.” She pops open the donut box and peeks inside. “You’re like the worst genie ever.” “I know. But your favors are piling up. I gotta work them off. And those aren’t pants.” “Leggings are pants. They’re very popular.” “What the hell is even on them?” I step closer and eye her ass, focusing on the print. Purely for research purposes. “Are those black cats?” “They’re my seasonal leggings!” she retorts and selects a donut as I walk past her into the tiny aisle of a kitchen and pour myself a cup of coffee. “Oh. Did you want something to drink? Let me get that for you,” she says sarcastically before biting into a donut. I ignore her tone. “No, no. I’ve got it, thank you.” I take the mug and pass by her, taking a seat on her couch
Jana Aston (Trust (Cafe, #3))
CYBERPOWER is now a fundamental fact of global life. In political, economic, and military affairs, information and information technology provide and support crucial elements of operational activities. U.S. national security efforts have begun to incorporate cyber into strategic calculations. Those efforts, however, are only a beginning. The critical conclusion...is that the United States must create an effective national and international strategic framework for the development and use of cyber as part of an overall national security strategy. Such a strategic framework will have both structural and geopolitical elements. Structural activities will focus on those parts of cyber that enhance capabilities for use in general. Those categories include heightened security, expanded development of research and human capital, improved governance, and more effective organization. Geopolitical activities will focus on more traditional national security and defense efforts. Included in this group are sophisticated development of network-centric operations; appropriate integrated planning of computer network attack capabilities; establishment of deterrence doctrine that incorporates cyber; expansion of effective cyber influence capabilities; carefully planned incorporation of cyber into military planning (particularly stability operations); establishment of appropriate doctrine, education, and training regarding cyber by the Services and nonmilitary elements so that cyber can be used effectively in a joint and/or multinational context; and generation of all those efforts at an international level, since cyber is inherently international and cannot be most effectively accomplished without international partners.
Franklin D. Kramer (Cyberpower and National Security)
Multi-generational sexual child abuse is such a common cause of the proliferation of pedophilia that Hitler/Himmler research focused on this genetic trait for mind control purposes. While I personally could not relate to the idea of sex with a child, I had parents and brothers and sisters who did. I still believe that George Bush revealed today’s causation of the rapid rise in pedophilia through justifications I heard him state. The rape of a child renders them compliant and receptive to being led without question. This, Bush claims, would cause them to intellectually evolve at a rate rapid enough to “bring them up to speed” to grasp the artificial intelligence emanating from DARPA. He believed that this generation conditioned with photographic memory through abuse was necessary for a future he foresaw controlled by technology. Since sexual abuse enhanced photographic memory while decreasing critical analysis and free thought, there would ultimately be no free will soul expression controlling behavior. In which case, social engineering was underway to create apathy while stifling spiritual evolution. Nevertheless, to short sighted flat thinking individuals such as Bush, spiritual evolution was not a consideration anyway. Instead, controlling behavior in a population diminished by global genocide of ‘undesirables’ would result in Hitler’s ‘superior race’ surviving to claim the earth. Perceptual justifications such as these that were discussed at the Bohemian Grove certainly did not provide me with the complete big picture. It did, however, provide a view beyond the stereotyped child molester in a trench coat that helped in understanding the vast crimes and cover-ups being discussed at this seminar in Houston.
Cathy O'Brien (ACCESS DENIED For Reasons Of National Security: Documented Journey From CIA Mind Control Slave To U.S. Government Whistleblower)
Fatmah Hassan Tabashe Sufian, sixty-one years old, married and a mother of four, was woken up on 6 April 1993 at three o’clock in the morning. Soldiers broke into her house, pushed her up against the wall and asked her where her children were; they are asleep, she replied. They woke up her son Saad, thirty years old, kicking him and beating him with their hands and rifle stocks, until he was spitting blood all over the place. Her other son, Ibrahim, was badly beaten, and the B’Tselem researcher who took Fatmah’s evidence testified that long after the incident he could still see signs of ecchymosis – subcutaneous bleeding – on his back. Both sons were taken out to the yard and put against a wall. The soldiers found two toy guns and began slashing the two men with them until the toys broke. Then they gathered everyone in the complex, twenty-seven people, into one room and threw in a shock grenade. Saad and Ibrahim were ordered to empty the cupboard while they were continuously beaten by the soldiers shouting at them, ‘You are Hamas and we are Golani [the name of the military brigade to which they belonged].’ Nor did they spare Fatmah’s old, blind brother who was a hundred years old. He too was abused by the soldiers, who threw mattresses and blankets at him.25 Thus, every April from 1987 until 1993 this was the routine of the collective punishment. But it was not only these three days that mattered. Collective punishment in March–May 1993 robbed 116,000 Palestinian workers of their source of living, bisected the Occupied Territories into four disconnected areas and barred any access to Jerusalem.26 Seen from that perspective, when the Oslo Accord was implemented as a territorial and security arrangement, it was just official confirmation of a policy already in place since 1987.
Ilan Pappé (The Biggest Prison on Earth: A History of the Occupied Territories)
How I Turned a Troubled Company into a Personal Fortune. How to ________ This is a simple, straightforward headline structure that works with any desirable benefit. “How to” are two of the most powerful words you can use in a headline. Examples: How to Collect from Social Security at Any Age. How to Win Friends and Influence People. How to Improve Telemarketers' Productivity — for Just $19.95. Secrets Of ________ The word secrets works well in headlines. Examples: Secrets of a Madison Ave. Maverick — “Contrarian Advertising.” Secrets of Four Champion Golfers. Thousands (Hundreds, Millions) Now ________ Even Though They ________ This is a “plural” version of the very first structure demonstrated in this collection of winning headlines. Examples: Thousands Now Play Even Though They Have “Clumsy Fingers.” Two Million People Owe Their Health to This Idea Even Though They Laughed at It. 138,000 Members of Your Profession Receive a Check from Us Every Month Even Though They Once Threw This Letter into the Wastebasket Warning: ________ Warning is a powerful, attention-getting word and can usually work for a headline tied to any sales letter using a problem-solution copy theme. Examples: Warning: Two-Thirds of the Middle Managers in Your Industry Will Lose Their Jobs in the Next 36 Months. Warning: Your “Corporate Shield” May Be Made of Tissue Paper — 9 Ways You Can Be Held Personally Liable for Your Business's Debts, Losses, or Lawsuits Give Me ________ and I'll ________ This structure simplifies the gist of any sales message: a promise. It truly telegraphs your offer, and if your offer is clear and good, this may be your best strategy. Examples: Give Me 5 Days and I'll Give You a Magnetic Personality. Give Me Just 1 Hour a Day and I'll Have You Speaking French Like “Pierre” in 1 Month. Give Me a Chance to Ask Seven Questions and I'll Prove You Are Wasting a Small Fortune on Your Advertising. ________ ways to ________ This is just the “how to” headline enhanced with an intriguing specific number. Examples: 101 Ways to Increase New Patient Flow. 17 Ways to Slash Your Equipment Maintenance Costs. Many of these example headlines are classics from very successful books, advertisements, sales letters, and brochures, obtained from a number of research sources. Some are from my own sales letters. Some were created for this book.
Dan S. Kennedy (The Ultimate Sales Letter: Attract New Customers. Boost your Sales.)
Any parent would be dismayed to think that this was their child’s experience of learning, of socializing, and of herself. Maya is an introvert; she is out of her element in a noisy and overstimulating classroom where lessons are taught in large groups. Her teacher told me that she’d do much better in a school with a calm atmosphere where she could work with other kids who are “equally hardworking and attentive to detail,” and where a larger portion of the day would involve independent work. Maya needs to learn to assert herself in groups, of course, but will experiences like the one I witnessed teach her this skill? The truth is that many schools are designed for extroverts. Introverts need different kinds of instruction from extroverts, write College of William and Mary education scholars Jill Burruss and Lisa Kaenzig. And too often, “very little is made available to that learner except constant advice on becoming more social and gregarious.” We tend to forget that there’s nothing sacrosanct about learning in large group classrooms, and that we organize students this way not because it’s the best way to learn but because it’s cost-efficient, and what else would we do with our children while the grown-ups are at work? If your child prefers to work autonomously and socialize one-on-one, there’s nothing wrong with her; she just happens not to fit the prevailing model. The purpose of school should be to prepare kids for the rest of their lives, but too often what kids need to be prepared for is surviving the school day itself. The school environment can be highly unnatural, especially from the perspective of an introverted child who loves to work intensely on projects he cares about, and hang out with one or two friends at a time. In the morning, the door to the bus opens and discharges its occupants in a noisy, jostling mass. Academic classes are dominated by group discussions in which a teacher prods him to speak up. He eats lunch in the cacophonous din of the cafeteria, where he has to jockey for a place at a crowded table. Worst of all, there’s little time to think or create. The structure of the day is almost guaranteed to sap his energy rather than stimulate it. Why do we accept this one-size-fits-all situation as a given when we know perfectly well that adults don’t organize themselves this way? We often marvel at how introverted, geeky kids “blossom” into secure and happy adults. We liken it to a metamorphosis. However, maybe it’s not the children who change but their environments. As adults, they get to select the careers, spouses, and social circles that suit them. They don’t have to live in whatever culture they’re plunked into. Research from a field known as “person-environment fit” shows that people flourish when, in the words of psychologist Brian Little, they’re “engaged in occupations, roles or settings that are concordant with their personalities.” The inverse is also true: kids stop learning when they feel emotionally threatened.
Susan Cain (Quiet: The Power of Introverts in a World That Can't Stop Talking)
My own observations had by now convinced me that the mind of the average Westerner held an utterly distorted image of Islam. What I saw in the pages of the Koran was not a ‘crudely materialistic’ world-view but, on the contrary, an intense God-consciousness that expressed itself in a rational acceptance of all God-created nature: a harmonious side-by-side of intellect and sensual urge, spiritual need and social demand. It was obvious to me that the decline of the Muslims was not due to any shortcomings in Islam but rather to their own failure to live up to it. For, indeed, it was Islam that had carried the early Muslims to tremendous cultural heights by directing all their energies toward conscious thought as the only means to understanding the nature of God’s creation and, thus, of His will. No demand had been made of them to believe in dogmas difficult or even impossible of intellectual comprehension; in fact, no dogma whatsoever was to be found in the Prophet’s message: and, thus, the thirst after knowledge which distinguished early Muslim history had not been forced, as elsewhere in the world, to assert itself in a painful struggle against the traditional faith. On the contrary, it had stemmed exclusively from that faith. The Arabian Prophet had declared that ‘Striving after knowledge is a most sacred duty for every Muslim man and woman’: and his followers were led to understand that only by acquiring knowledge could they fully worship the Lord. When they pondered the Prophet’s saying, ‘God creates no disease without creating a cure for it as well’, they realised that by searching for unknown cures they would contribute to a fulfilment of God’s will on earth: and so medical research became invested with the holiness of a religious duty. They read the Koran verse, ‘We create every living thing out of water’ - and in their endeavour to penetrate to the meaning of these words, they began to study living organisms and the laws of their development: and thus they established the science of biology. The Koran pointed to the harmony of the stars and their movements as witnesses of their Creator’s glory: and thereupon the sciences of astronomy and mathematics were taken up by the Muslims with a fervour which in other religions was reserved for prayer alone. The Copernican system, which established the earth’s rotation around its axis and the revolution of the planet’s around the sun, was evolved in Europe at the beginning of the sixteenth century (only to be met by the fury of the ecclesiastics, who read in it a contradiction of the literal teachings of the Bible): but the foundations of this system had actually been laid six hundred years earlier, in Muslim countries - for already in the ninth and tenth centuries Muslim astronomers had reached the conclusion that the earth was globular and that it rotated around its axis, and had made accurate calculations of latitudes and longitudes; and many of them maintained - without ever being accused of hearsay - that the earth rotated around the sun. And in the same way they took to chemistry and physics and physiology, and to all the other sciences in which the Muslim genius was to find its most lasting monument. In building that monument they did no more than follow the admonition of their Prophet that ‘If anybody proceeds on his way in search of knowledge, God will make easy for him the way to Paradise’; that ‘The scientist walks in the path of God’; that ‘The superiority of the learned man over the mere pious is like the superiority of the moon when it is full over all other stars’; and that ‘The ink of the scholars is more precious that the blood of martyrs’. Throughout the whole creative period of Muslim history - that is to say, during the first five centuries after the Prophet’s time - science and learning had no greater champion than Muslim civilisation and no home more secure than the lands in which Islam was supreme.
Muhammad Asad (The Road to Mecca)
TinyWall is a firewall application that by default blocks every program and keeps them from accessing the internet. You can approve individual processes or executables and allow them internet access. This will help to make sure you aren’t unwittingly leaking information.     If you suspect that someone might be physically accessing your computer while you are away, you can set up a hidden camera to keep an eye on the computer while you are gone.
Rob Robideau (Incognito Toolkit - Tools, Apps, and Creative Methods for Remaining Anonymous, Private, and Secure While Communicating, Publishing, Buying, and Researching Online)
Storm’s Fast-Flux and Conficker’s Domain-Flux In 2007, security researchers identified a new technique used by the infamous Storm botnet (Higgins, 2007). The technique, named fast-flux, used domain name service (DNS) records to hide the command and control servers that controlled the Storm botnet. DNS records typically translate a domain name to an IP address. When a DNS server returns a result, it also specifies the TTL that the IP address remains valid for before the host should check again. The attackers behind the Storm botnet changed the DNS records for the command-and-control server rather frequently. In fact, they used 2,000 redundant hosts spread amongst 384 providers in more than 50 countries (Lemos, 2007). The attackers swapped the IP addresses for the command-and-control server frequently and ensured the DNS results returned with a very short TTL. This fast-flux of IP addresses made it difficult for security researchers to identify the command-and-control servers for the botnet and even more difficult to take the servers offline. While fast-flux proved difficult in the takedown of the Storm botnet, a similar technique used the following year aided in the infection of seven million computers in over two hundred countries (Binde et al., 2011). Conficker, the most successful computer worm to date, spread by attacking a vulnerability in the Windows Service Message Block (SMB) protocol. Once infected, the vulnerable machines contacted a command-and-control server for further instructions. Identifying and preventing communication with the command-and-control server proved absolutely necessary for those involved with stopping the attack. However, Conficker generated different domain names every three hours, using the current date and time at UTC. For the third iteration of Conficker, this meant 50,000 domains were generated every three hours. Attackers registered only a handful of these domains to actual IP addresses for the command-and-control servers. This made intercepting and preventing traffic with the command-and-control server very difficult. Because the technique rotated domain names, researchers named it domain-flux. In the following section, we will write some Python scripts to detect fast-flux and domain-flux in the wild to identify attacks.
T.J. O'Connor (Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers)
In the middle section of the book Mirabelle breaks into not one, but two houses near Belgravia Books. I had fun scoping these out - checking which windows looked least secure and figuring out how to scale the mews houses to the rear to get her inside. A man came out at one point, 'What are you doing?' he questioned me. 'The thing is, I'm writing a book,' I started with a smile. He waved me off, his hand as wide as a tennis racket. 'Everyone is writing a book, my dear,' he said. Between you and I, it's his house that MIrabelle ends up breaking into.
Sara Sheridan
Where are the ethical concerns, that so many people called animal lovers invoke, when you steal the children of wild dog mothers and other family members from right before their eyes? Do ethics always refer only to what people think appropriate for purely subjective reasons? Ultimately, our long-term research resulted in a very sad picture: With the exception of the random puppy, who today as an adult actually is interested in people, neither male Maccia nor the most of the other "rescued" dogs are socially and environmentally secure, but had remained shy and partly vegetate in kennels with empty eyes. Such dogs are neither fish nor fowl, although taken from the wild population in the early age of about eight to twelve weeks (except Maccia, whom Funny "rescued" at the age of four months, which is even more irresponsible).
Günther Bloch (Die Pizza-Hunde: Freilandstudien an verwilderten Haushunden ; Verhaltensvergleich mit Wölfen ; Tipps für Hundehalter)
According to a recent report from the research firm Gartner Inc., “through 2017, 60% of big-data projects will fail to go beyond piloting and experimentation and will be abandoned.” It turns out that faith in Hadoop has outpaced the technology’s ability to bring big data into the mainstream. Demand for Hadoop is on the rise, yet customers have found that a technology built to index the Web may not be sufficient for corporate big-data tasks, said Nick Heudecker, research director for information management at Gartner. It can take a lot of work to combine data stored in legacy repositories with the data that’s stored in Hadoop. And while Hadoop can be much faster than traditional databases for some purposes, it often isn’t fast enough to respond to queries immediately or to work on incoming information in real time. Satisfying requirements for data security and governance also poses a challenge.
Anonymous
created within the Future Convergent IT Service Security Research Team to identify and solve cloud security issues.
엔조이
Alan Turing was another cryptanalyst who did not live long enough to receive any public recognition. Instead of being acclaimed a hero, he was persecuted for his homosexuality. In 1952, while reporting a burglary to the police, he naively revealed that he was having a homosexual relationship. The police felt they had no option but to arrest and charge him with “Gross Indecency contrary to Section 11 of the Criminal Law Amendment Act 1885.” The newspapers reported the subsequent trial and conviction, and Turing was publicly humiliated. Turing’s secret had been exposed, and his sexuality was now public knowledge. The British Government withdrew his security clearance. He was forbidden to work on research projects relating to the development of the computer. He was forced to consult a psychiatrist and had to undergo hormone treatment, which made him impotent and obese. Over the next two years he became severely depressed, and on June 7, 1954, he went to his bedroom, carrying with him a jar of cyanide solution and an apple. Twenty years earlier he had chanted the rhyme of the Wicked Witch: “Dip the apple in the brew, Let the sleeping death seep through.” Now he was ready to obey her incantation. He dipped the apple in the cyanide and took several bites. At the age of just forty-two, one of the true geniuses of cryptanalysis committed suicide.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
A VoIP security breach prevention/management council was created to research and manage security hazards. Also, the security
섹파만들기
Location is also predictive. Researchers at Microsoft found that location data can be used to predict fairly accurately where people will be located in the future.
Julia Angwin (Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance)
In the early twenty-first century, as criminals figured out ways to monetize their malicious software through identity theft and other techniques, the number of new viruses began to soar. By 2015, the volume had become astonishing. In 2010, the German research institute AV-Test had assessed that there were forty-nine million strains of computer malware in the wild. By 2011, the antivirus company McAfee reported it was identifying two million new pieces of malware every month. In the summer of 2013, the cyber-security firm Kaspersky Lab reported it identified and isolated nearly 200,000 new malware samples every single day.
Marc Goodman (Future Crimes)
Consumers want the predictable and consistent, with an occasional positive twist or added value thrown in. Psychologists who study happiness (the correct psychological/research term is subjective well-being) often talk about the importance of predictability for safety and security (the caramelized popcorn, if you will), mixed with small increments of variety to offset boredom (the prize). Unfortunately, many companies focus too much on the basic ingredients and not enough on adding that extra something that differentiates them from their competition and builds brand loyalty. Starbucks leaders, however, have made a firm commitment to creating an experience of Surprise and Delight in many areas of their business. Starbucks management seeks ways to implement subjective well-being for customers and staff—which, in turn, has a profound effect on loyalty, community, and profit.
Joseph A. Michelli (The Starbucks Experience: 5 Principles for Turning Ordinary Into Extraordinary)
Imperialism was the system of control which secured the markets and capital investments. Colonialism facilitated this expansion by ensuring that there was European control, which necessarily meant securing and subjugating the indigenous populations.
Linda Tuhiwai Smith (Decolonizing Methodologies: Research and Indigenous Peoples)
The climate has been changing throughout history. Has man caused all these historical fluctuations in weather? No, of course not; but global warming alarmists want to make you feel responsible for natural cycles that have gone on for forever, and you need to know this is basically a moneymaker for some of them. In a way, global warming—or climate change as they now call it, to cover all their bases—is a pseudoscientific fad that comes complete with massive government grants and university research support for scientists, power and big budgets for bureaucrats, and a feel-good crusade for politicians. It’s an unholy combination that has left truth and common sense behind. With all the problems mankind has caused in this world, and all the deadly threats people currently face, claims that climate change is our number one threat, as the alarmists want you to believe, are downright ludicrous. Moreover, the idea that government can “fix” our future weather patterns doesn’t pass the straight-face test. Whatever government does in regulating power and siphoning off zillions of tax dollars for uneconomic, inefficient “green energy” projects will, according to some experts, chill our climate by less than two-hundredths of a degree Celsius over the course of a hundred years! And there is evidence, by the way, that our planet is entering a cooling trend anyway because of reduced solar flares and sunspot activity. What the government’s draconian regulations will actually achieve is not a healthier climate but scarcer and higher-cost energy, fewer jobs, a weaker economy, and a less secure America.
Sarah Palin (Sweet Freedom: A Devotional)
Some research suggests that collecting vast amounts of data simply can’t predict rare events like terrorism. A
Julia Angwin (Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance)
Parks indicates Caldwell with a nod. “From what the Doc says, this thing we’re sitting in was some kind of research station, designed to move around freely in inner-city areas and to be secure against attack from hungries or anything else it came up against. “Which was a great idea, and I’m not knocking it. Only at some point, a couple of things happened–can’t be sure in what order. The generator blew. Or something in the power feed blew, maybe, since the generator mostly looks okay to my admittedly shit-ignorant eye.” “Maybe
M.R. Carey (The Girl With All the Gifts)
Learning is the major process of human adaptation. This concept of learning is considerably broader than that commonly associated with the school classroom. It occurs in all human settings, from schools to the workplace, from the research laboratory to the management board room, in personal relationships and the aisles of the local grocery…Therefore it encompasses other, more limited adaptive concepts such as creativity, problem solving, decision making, and attitude change that focus heavily on one or another basic aspects of adaptation.107
Naval Postgraduate School (When Will We Ever Learn? The After Action Review, Lessons Learned and the Next Steps in Training and Education the Homeland Security Enterprise for the 21st Century)
Kahneman describes how research has suggested that humans rely on the interaction of two different internal systems to help people live in and make sense of the world. In normal situations, system one runs automatically while system two is in the background at a low level of engagement. However, when things become difficult for system one, a type of override occurs and system two is activated.
Naval Postgraduate School (When Will We Ever Learn? The After Action Review, Lessons Learned and the Next Steps in Training and Education the Homeland Security Enterprise for the 21st Century)
Second, my research showed that, by the middle of the twentieth century, the Chilean judicial ranks were no longer filled with elites (as they had been in the nineteenth century). Analysis of the background information I collected in my interviews, such as father’s occupation, high school attended, and family landholdings, revealed that almost 80 percent of respondents came from lower-middle to middle-class backgrounds, whereas only a small minority were of upper-middle to upper-class extraction. Because entry-level judicial posts were very low paying and not very prestigious, the judicial career attracted those who desired a stable income and career, rather than those who had the social connections or financial cushion to pursue a (potentially less secure) future in private legal practice (Couso 2002: 177). Thus, most judges serving in the 1970s and 1980s did not come from social backgrounds that would necessarily incline them to support a conservative social and political agenda.[32]
Lisa Hilbink (Judges beyond Politics in Democracy and Dictatorship: Lessons from Chile (Cambridge Studies in Law and Society))
Research undertaken by Caprioli and Peter Trumbore revealed that states characterized by norms of gender and ethnic inequality, as indicated through higher rates of human rights abuses, are more likely to become involved in militarized and violent interstate disputes and to be the aggressors and to use force first when involved in international disputes.16 David Sobek and coauthors confirmed Caprioli and Trumbore’s findings that domestic norms centered on equality and respect for human rights correspond to lower levels of involvement in international conflict.17 In sum, this body of work demonstrates that the promotion of gender equality goes far beyond the issue of social justice and has important consequences for international security.
Valerie M. Hudson (The Hillary Doctrine: Sex and American Foreign Policy)