There were only 3 ZIP codes in America without any Ashley Madison accounts — here they are

One of the reasons why the Ashley Madison hack has swept through the US’ imagination to such a profound degree is how all-encompassing it seemed. The hack clawed its way into communities all across the country — well, not quite every community.

Gawker’s Gabrielle Bluestone has uncovered that there are precisely three ZIP codes across the country that have no record of Ashley Madison users. That’s ZIP codes, not area codes. And what do they have in common? They’re partially lacking two things: the internet and a large number of people.

Gawker’s discovery highlights a pretty dark truth. These three ZIP codes are probably the only ones in the US that don’t house spouses looking to cheat — at least not by using Ashley Madison.

Here they are:

Nikolai, Alaska (99691) — Population: 94 (2010 Census)

Most of the residents of Nikolai are indigenous Alaskans, according to Gawker, and the town can dip to 60 below zero in the winter.

pure zip codes 2

Perryville, Alaska (99648) — Population: 113 (2010 Census)

When Gawker asked a local why no one in her town was on Ashley Madison, she replied that there was maybe only 10 households in the entire town that had internet. This town is also predominantly indigenous Alaskan.

pure zip codes 1

Polvadera, New Mexico (87828) — Population: 269 (2010 Census)

An employee at the county clerk’s office told Gawker that there probably was no one on Ashley Madison because you can’t get reception in that area, which is about 4 square miles of rural peace.

pure zip codes 3

And there you have it. Those are the last vestiges of the US left untouched by Ashley Madison — though of course there is the possibility that there are other bastions of innocence that have fake accounts registered to them.

Even so, the ubiquity of Ashley Madison is striking.

Marina Abramović Institute Seeks So Much Unpaid Work

Good news: the Marina Abramović Institute is hiring! Bad news: all four positions listed in this fresh New York Foundation for the Arts (NYFA) ad are unpaid — ahem, volunteer. They’re probably great “opportunities,” though, right?

Let’s take a look.

1. Administrative Volunteer

  • Work: “general administrative duties, planning art-based special events, and development.”
  • Skills required: “excellent writing skills, the ability to multi-task, proficiency in Microsoft Word and Microsoft Excel, and prior experience working in a fast-paced arts non-profit or other administrative position.”
  • (Nonmonetary, intangible) benefits: “the opportunity to grow within the organization and expand professional networks.”

2. Tech and Production Volunteer

  • Work: “development and maintenance of IMMATERIAL, MAI’s digital journal.”
  • Skills required: Unclear, but they are looking for people “who would like to expand their knowledge of Javascript / JSON / Jquery, HTML5, CSS, Video streaming via Vimeo and/or Youtube Live,” which implies that you should already have some knowledge of these things.
  • (Nonmonetary, intangible) benefits: “a unique opportunity to hone technology skills on a highly visible, emerging arts platform.”
  • Bonus job volunteer position: “We also have volunteer opportunities for assistance with video and audio production, photo editing, and print layout.” Awesome, because I was wondering about that.

3. Special Projects Volunteer

  • Work: “preparing and working on collaborative in-person and digital projects.”
  • Skills required: “excellent organization and communication skills, proficiency in Microsoft Office, Adobe Creative Suite and basic HTML / CSS coding, familiarity with non-profit administration, comfort collaborating with partners in and outside of the arts and strong passion for the expanding the role of arts and sciences in various communities”
  • (Nonmonetary, intangible) benefits: none, but “artists are encouraged to apply”!

4. Research Volunteer

  • Work: “researching for the content of IMMATERIAL”
  • Skills required: “based in New York City and have a college-level background in art history, performance art, and/or performance art studies. Strong writing skills required. Additional background in at least two of the following: the sciences, research assistance, curatorial practice, performing arts, fine arts, photography / video.”
  • (Nonmonetary, intangible) benefits: none, unless you are “a critical thinker who wants to apply their skills to a large-scale collaborative project” and find that this fits the bill.

All of these positions have at least two-day-a-week commitments — which, amazingly, makes them sound even more like part-time work than they already do.

Screen Shot 2014-07-31 at 7.08.52 PM

Abramović raised over $660,000 for her institute on Kickstarter in June and recently “collaborated” with Adidas. Yet somehow she cannot afford to pay people to work for MAI. (In the process she makes Jeff Koons, who boasted on Charlie Rose this week about how many people he employs, look like a saint.)

Screen Shot 2014-07-31 at 7.09.21 PM

We can only hope that, one day, someone who toils without compensation within the MAI apparatus will grab hold of their social media and give us something as good as this:

ArtPapers-unpaidintern-tweet

Star Wars: The Force Awakens teaser trailer – eight things we learned

Wake up and smell the lessons … what have we learned from the Star Wars trailer launch?

Eighty-eight seconds of JJ Abrams’s instalment in the Star Wars saga were released today. Ben Child has sifted through the evidence and come to these conclusions

The Force awakens in Tatooine

Star Wars: The Force Awakens teaser trailer

Where else to kick off a new Star Wars trilogy than the home world of Luke and Anakin Skywalker, the desert planet which features heavily in both 1977’s Star Wars and (sorry) 1999’s The Phantom Menace?

Persistent Force Awakens rumours have suggested the storyline for JJ Abrams’ movie concerns two young adventurers (played by John Boyega and Daisy Ridley) from Tatooine who begin their journey amongst the sand dunes before heading off in search of our heroes from the original trilogy, Skywalker, Princess Leia and Han Solo. So far, so spot on.

Max Von Sydow knows his Force

Star Wars: The Force Awakens teaser trailer

Do we detect a Swedish lilt discussing the return of the Force in the manner of Obi Wan Kenobi? If so, we have to assume he’s playing a Sith, a Jedi or perhaps one of the new Inquisitor baddies that were recently introduced in spin-off TV show Star Wars Rebels.

It’s an unbroken Star Wars rule (at least in the original trilogy) that only characters skilled in the use of the Force ever discuss it in any kind of detail. One rumour is that Von Sydow plays an Imperial leader who has stepped into the power vacuum left by the demise of Emperor Palpatine.

John Boyega is indeed a Stormtrooper

Star Wars: The Force Awakens teaser trailer

Here’s another rumour apparently confirmed, that the British star of Attack the Block plays an Imperial Stormtrooper turned to the good side of the force (or at least with Rebel sympathies). And there he is, centre stage in the first few seconds of the trailer.

Could this be a typical Abrams curveball? After all, the first time Luke met Leia it was in the guise of a diminutive member of the Empire’s ivory-suited clone-based army. Does this revelation torpedo the rumour that The Force Awakens opens with a severed robot hand (possibly belonging to Luke Skywalker) tumbling from space?

Lightsabers have had a makeover …

Star Wars: The Force Awakens teaser trailer

The Phantom Menace (again, sorry) gave us the double-edged lightsaber, and Samuel L Jackson got a purple job in Attack of the Clones. The new teaser shows a shadowy, cloaked figure wielding a crucifix-effect number.

Whether this innovation has any particular purpose will no doubt be revealed, but it suggests Abrams already has the confidence to tinker with canonical furniture that would once have been the exclusive preserve of Lucas. As radical shifts go, it’s a whole lot better than retrofitting Jabba the Hutt with the ability to perambulate.

… and R2-D2 could be in need of one

Star Wars: The Force Awakens teaser trailer

While the original Star Wars trilogy took place in a time of struggle, with a once-prosperous society devolved into chaos and division, it still seems remarkable that the future of the galaxy was entrusted on more than once occasion to a trundling tin can and his garrulous golden sidekick.

The new teaser offers a glimpse of the next generation of droids, who seem to have taken a leaf out of the Back to the Future book. Where The Force Awakens is going, they don’t need wheels, and indeed this is exactly the kind of outdated tech that could cause extreme traffic chaos on planets where the nearest thing to a road is a flattened sand dune. Still, R2’s going to look like a Morris Minor in a Formula One race when he eventually turns up. Can this be a good thing?

The trailer’s brief glimpse of the Inside Llewyn Davis actor shot face first in the new, upgraded X-Wing is enough to get the hairs standing up on the back of any self-respecting Star Wars fan’s neck. But might this mean Isaac is only getting a bit-part as an airborne Rebel grunt?

Apart from Luke Skywalker himself, X-Wing pilots were Star Wars’ equivalent of Star Trek’s red-shirted engineering corps, cannon fodder who were always getting killed off by Imperial forces just as they thought they might have a chance of blowing up the Death Star.

Then again, this is a Star Wars universe in which a Stormtrooper looks set to play a vital role: what price that an X-Wing pilot could also be set to move centre stage?

The Millennium Falcon can still make the Kessel Run in 12 parsecs

Star Wars: The Force Awakens teaser trailer

It’s already been caught on camera by over-zealous pilots taking a day trip over Pinewood Studios, but the teaser trailer offers proof that the Star Wars universe’s most iconic spacecraft is about to get its first run out since Return of the Jedi. And she’s still looking pretty zippy. Is that Han Solo in the cockpit, excusing himself from culpability for yet another failure to jump to light speed as he fends off Imperial fire?

Reports of the death of CGI have been greatly exaggerated

Star Wars: The Force Awakens teaser trailer

Lucasfilm boss Kathleen Kennedy is not the only Star Wars head honcho to have talked up a return to the use of real sets and models, rather than the over-reliance on CGI which pretty much ruined the prequel trilogy, for The Force Awakens. Still, don’t try to tell me that droid wasn’t born on a computer, or that the Falcon doesn’t look suspiciously shiny.

Not that there’s anything wrong with that: most Star Wars fans have no problem with digital effects being used sparingly in combination with more realistic techniques, they just don’t want to see appalling computer game aliens parachuted incongruously into non-digital scenes (as with the remastered versions of the original trilogy).

There’s a balance to be struck here: too little CGI, and The Force Awakens might take on a depressingly retro vibe. Too much, and the knives will be out for Star Wars’ new boss man chief. But at first glance, Abrams looks like he can be trusted to get it right.

Extreme violence lies in Isis DNA

It is just over 10 years since Nicholas Berg, an American businessman working in Iraq, was brutally decapitated on video by Abu Musab al-Zarqawi, the thuggish leader of al-Qaeda in Iraq.

With the murder of the American journalist, James Foley, on Tuesday, the US and its Western allies were vividly reminded of the worst excesses of the Iraqi insurgency in the wake of the 2003 invasion.

But it is not just in the manner of its bloodlust that the Islamic State in Iraq and the Levant (Isis) and AQI share a gruesome symmetry.

The two organisations also share a lineage. The threadbare remnants of AQI – all but crushed by the US troop surge in Iraq of 2007 and the “sons of Iraq” movement to turn Sunni tribes against the jihadis – morphed into the earliest version of Isis.

But more importantly, Isis is also the operational, strategic and ideological twin of its predecessor.

“There is almost no difference in the organisations,” says Afzal Ashraf, a former RAF captain in Iraq and now consultant at the Royal United Services Institute.

Mr Ashraf points in particular to the shared heritage of Isis and AQI in drawing on former members of Saddam Hussein’s Ba’athist regime. Both are “parasitic insurgencies” that co-opt disenfranchised factions to their cause, he says.

It is perhaps for this reason that both AQI and Isis have historically shared a primary concern with the “near enemy” – other Arabs – rather than the far enemy – Western infidels – as their main targets. Isis, like AQI, is primarily a sectarian organisation, dedicated to eradicating the Shia governments in Baghdad and the Alawite regime in Damascus.

Military analysts also point to the similarity in battleground tactics used by Isis with those used by AQI, in particular the way both deploy force in circles of pressure, particularly around cities, using waves of car and truck bombs.

An image grab taken from a propaganda video released on July 5 2014 by al-Furqan Media allegedly shows the leader of the Islamic State (IS) jihadist group, Abu Bakr al-Baghdadi, aka Caliph Ibrahim, adressing Muslim worshippers at a mosque in the militant-held northern Iraqi city of Mosul. Baghdadi, who on June 29 proclaimed a "caliphate" straddling Syria and Iraq, purportedly ordered all Muslims to obey him in the video released on social media

For Fawaz Gerges, professor of international relations at the London School of Economics and an expert in al-Qaeda and Islamic extremism, the defining characteristic of the Isis/AQI approach, however is the their particular “use of violence”.

“Groups like al-Qaeda used violence in a tactical way, in a way proportional to their aims,” he says. “For Isis and AQI the savagery is the point. The action is what matters, not the ideas. To Zarqawi and Baghdadi [the Isis leader], the spectacle and the limitless force – beheadings, crucifications, people being buried alive – is what matters.”

Which 4K TVs are worth buying?

Both Netflix and Amazon stream in 4K. Cameras like the Sony a7S and the Panasonic Lumix GH4 can shoot in 4K. Even smartphones have been getting in on the act, with handsets like the LG G Pro 2 and Sony Xperia Z2 capable of recording 4K video.

So with the amount of 4K content available increasing every day, you may have been thinking about buying a 4K set so you too can bask in the glow of 3,840 x 2,160 resolution.

But 4K sets don’t come cheap, and you’re going to want to do a bit of research before dropping that much cash. While we don’t really review televisions here at Engadget, we’ve done the next best thing, compiling the opinions of trusted critics from across the web.

Which set offers you the most bang for your buck? Do bells and whistles like a curved screen make a difference? Check out a few members of the 4K Class of 2014 below.

PANASONIC LIFE+SCREEN AX800At first blush, the Panasonic AX800 series has a lot going for it. It’s a nice-looking set thatPC Mag says is “minimalist and unique,” suited for both TV stands and entertainment centers. Turn it on, and the picture is equally impressive, delivering what AVForums calls “rich textures and nuanced lighting,” while Reviewed.com thinks this LCD could stand toe to toe with a good plasma set, due to its “good black levels, accurate colors and reliable screen uniformity.”

But if you’re looking to sit down and enjoy some House of Cards in beautiful 4K, you’ll be disappointed — Netflix on the AX800 is limited to 1080p (and lower). Given the relative scarcity of commercial 4K content, the inability to watch a major provider like Netflix is a big ding on an otherwise stellar UHD set. Price: $2,300 and up

SAMSUNG U9000Walk into a room and the first thing you’ll notice about the Samsung U9000 is its curved screen, which CNET says adds a “unique, futuristic look” to a set that is overall “drop-dead gorgeous.” It says the picture is equally stunning, offering “deep black levels, accurate color and great bright-room viewing qualities.”

But what about that curve? Though it’s meant to create a feeling of depth and immersion, CNET found it “didn’t have any major effect on the picture aside from reducing reflections somewhat,” and Reviewed.com found it actually made some reflections worse, such that “lamps and lights are occasionally stretched across the entire arc of the screen.” It’s worth noting that the U9000 also includes an improved Smart Hub experience, but you can also find other Samsung sets that are a lot cheaper (and less curvy). Price: $3,297 and up

SAMSUNG U8550The Samsung U8550 is a set that eschews the curved screen of its high-end sibling U9000 in favor of “trim bezels and a very narrow panel” that Reviewed.com says “lend this television a modern air.”

The picture also does it credit, with LCD TV Buying Guidecomplimenting its “brilliant images in 4K,” while Sound+Vision was impressed with the “crisp detail and the clean, smooth clarity” of its upconversions.As on the U9000, the Smart Hub has been upgraded with “subtle improvements” that “hit the mark” according to LCD TV Buying Guide, and Reviewed.com says it provides “all of the streaming content and web-browsing functions you’d expect for the price.”

And that’s a price that undercuts the competition by $1,000, leaving you some extra cash for an awesome sound or gaming system on the side. Price: $1,597 and up

SONY X900BAt first glance, it’s clear that the Sony X900B is very different from other UHD sets, and even many regular ol’ HDTVs, due to its huge set of front-facing speakers.

The sacrifice of a slim bezel is well worth it, though, as What Hi-Fi compliments its “rich, open and detailed sound quality,” while CNET calls it the “best sound of any TV we’ve heard, bar none.” The picture is also up to the challenge, offering quality that HDTVTest calls “spectacular” andCNET says is the “best picture quality of any 4K TV we’ve tested so far.”

Sure, the X900B isn’t as cheap as some other sets, but unlike the AX800, it supports Netflix and, with those massive speakers flanking the screen, you won’t need to fork out the extra dough for a quality sound system. Price: $2,998 and up

Man Accused of Vandalizing Banksy Images

DAMAGING THE WORK OF STREET ARTIST BANKSY YIELDS A CHARGE OF CRIMINAL MISCHIEF.

Vandalism, like beauty, is apparently in the eye of the beholder.

Prosecutors in Park City, Utah, are charging a man who they allege defaced two works of graffiti by Banksy, the elusive British street artist, with criminal mischief, a second-degree felony.

“It’s not every day I get to prosecute somebody for vandalizing graffiti,” Matthew Bates, lead prosecutor, told the Wall Street Journal.

Protective glass covering this Banksy painting in Park City, Utah, was smashed on New Year’s Eve. Jay Hamburger/Park Record

According to prosecutors, David William Noll shattered the glass protecting the Banksy murals in Park City on New Year’s Eve, and then further damaged one of the works, an image of a boy praying on his knees, with dark brown paint.

Noll faces a fine of up to $10,000 and up to 15 years in prison; according to Bates, a plea deal is being negotiated, with a hearing scheduled for September 15. Police say they have video of Noll at the scene of the alleged crime.

In a television interview with a local California station shortly after prosecutors charged him with the crime, Noll said he supports only “commissioned” graffiti.

Two Banksy pieces were vandalized in Park City, Utah, and a man is charged with a second-degree felony. Jay Hamburger/Park Record

The murals appeared on Park City’s main street in 2010, after Banksy attended the Sundance Festival on behalf of “Exit Through the Gift Shop,” the “mockumentary” he starred in and helped produce.

Both local property owners, recognizing the value of a Banksy work, paid to protect the murals with glass, as others have done in cities around the world–one Brooklyn property owner even installed a metal gate and hired guards.

Banksy’s solo works have sold at auction for as much as $1.3 million; a collaboration with artist Damien Hirst sold for $1.9 million.

CODE ORANGE: The Risk Of An ‘Explosive Subglacial Eruption’ In Iceland Just Went Up

There’s a chance a huge volcano in Iceland could blow.

Lorcan Roche Kelly at Agenda Research tipped us off to the news that the Icelandic government on Monday changed the status of Bardarbunga, a volcano in Iceland located under Europe’s largest glacier, to “orange,” meaning there is a heightened risk of eruption and ash cloud.

A report from Reuters on Monday noted that this is the second-highest risk level on the government’s five-level risk scale.

“Presently there are no signs of eruption, but it cannot be excluded that the current activity will result in an explosive subglacial eruption, leading to an outburst flood and ash emission,” said Iceland’s Met Office.

1024px Sylgjökull_Hamarskriki_1_Iceland.JPG

Bardarbunga, a volcano in Iceland located under Europe’s largest glacier.

Kelly noted, however, that Bardarbunga sits under 700m of ice, or nearly half a mile’s worth, and to break through this an eruption would have to be quite massive.

Reuters noted that the 2010 eruption of Iceland’s Eyjafjallajokull volcano affected more than 10 million air travelers in Europe and cost $1.7 billion.

Kelly runs through a few scenarios if Bardarbunga erupts. Though, of course, we are still very much in the “if” stage.

Here is Kelly’s basic outline:

  • First, to restate, there is a chance there will be no eruption.
  • It could be too small to matter. There was an eruption in the area in 1996 that did not break through the ice. While this eruption did lead to a destructive jökulhlaup a rapid flood of melted water from the glacier damage was restricted to areas the flood hit. There was no ash cloud.
  • It could break though the ice, cause a small ash cloud, but lead to minimal disruption to air traffic. The 2011 eruption of Grimsvotn, also under Vatnajokull, had these characteristics. That eruption only lead to the cancellation of 900 flights and some re-routing on north Atlantic routes.
  • It could be a repeat of Eyjafjallajokull. If the volcano erupts, breaks through the ice-cap and produces large volumes of ash, we will likely see major air travel disruption during what is still peak holiday season.
  • There is a very small chance that an eruption could be something very much larger, along the scale of the 1783 Laki eruption. In the case of an eruption this size, the major problem would not be flight disruption caused by ash, although that certainly would happen but rather the devastating impact on climate and farming across the northern hemisphere. To give an idea of the scale, some research points to the Laki eruption being a trigger for the French Revolution.

This graphic from the Icelandic Meteroloigcal Office shows the increased risk of a volcano eruption, denoted by the orange triangle over Bardarbunga.

iceland earthquake activity

Pandora deal helps indie musicians get noticed on internet radio

Pandora’s relationship with music labels hasn’t exactly been cozy, with more than a few legal disputes over royalties. Today, though, it’s extending an olive branch. The internet radio service has forged a deal with the Merlin rights agency’s 20,000-plus indie labels to help their artists get discovered.

The move will use Pandora’s music discovery techniques to bring “additional exposure” to these musicians when they’re relevant to listeners. They’ll also have direct access to playback data (to help decide on set lists and tour locations), and they’ll get custom communication channels to reach fans.

The agreement is big, whether you’re an up-and-coming artist or just want to hear music beyond the big three record companies. Merlin’s labels represent about 10 percent of streaming music worldwide, so you’re likely to notice if you listen to enough tunes. Of course, this isn’t quite a selfless gesture.

On top of the extra attention it draws to Pandora, the pact gives the company a better shot at offering service outside of the US. It has offerings in Australia and New Zealand, but the lack of direct artist connections has made it hard to expand elsewhere. That may prove crucial — Pandora has to compete against international heavyweights like Apple and Spotify in the online radio space, so it might not want to depend on one country for its success.

The Supersonic Nazi Rocket Concept Designed to Bomb Any City in 1 Hour

When WWII ended, American engineers examined a trove of Nazi concepts for rocket-powered weapons and airplanes. One of the most terrifying was Eugen Sänger’s antipodal bomber, a manned supersonic plane designed to reach any city on Earth in one hour. Thank heavens it never worked.

Historian Amy Shira Teitel, who runs the fantastic Vintage Space blog over at Popular Science, brings us the story of Eugen Sänger, an Austrian rocket engineer who devised a concept for a rocket plane with a flat-bottomed fuselage.

With the right propulsion—in this case, a rocket-powered slingshot on the runway—Sänger theorized that the plane would climb to the upper reaches of the sky, then skip across the lower levels of the atmosphere like a rock on a pond. He figured a pilot could reach any point on the globe within one hour, drop a bomb, and return to a predetermined landing site.

Thankfully, the concept was never built. Though Sänger first envisioned use as a passenger or cargo plane, he approached the Austrian government for funding in the mid-1930s by highlighting the antipodal plane’s potential as an intercontinental bomber. Unfortunately for Sänger, but fortunately for history, the liquid propulsion system the concept was built around was too unreliable for use, and his project went un-funded

Sänger continued to design experimental rockets for the Nazis, but his work was overshadowed by another Nazi rocket scientist: Wernher von Braun. The latter being German-born, he looked down on the Austrian Sänger’s work, and von Braun convinced the Nazi government to quit funding Sänger’s work.

Over at Vintage Space, you can read about how Sänger’s skip-glide concept was tried by U.S. engineers, while Joseph Stalin attempted to kidnap Sänger to work for the USSR. None of it worked out, and to this day the antipodal bomber remains a terrifyingly futuristic concept that never got off the ground.

Comet chaser Rosetta reaches its target

Europe’s Rosetta has become the first spacecraft to rendezvous with a comet, completing a 10-year 6bn km voyage to meet a strange double-lobed lump called 67P/Churyumov-Gerasimenko.

Scientists at the European Space Agency mission headquarters in Darmstadt, Germany, celebrated the success of the final manoeuvre, which put the €1bn robotic craft into orbit around the comet – after an agonising 22 minute wait for confirmatory radio signals to travel back to Earth.

“What a wonderful moment,” exclaimed Mark McCaughrean, senior ESA scientist. “We’ve arrived.”

Experts watch their screens at the control center of the European Space Agency, ESA, in Darmstadt, Germany, Wednesday, Aug. 6, 2014.

His colleague Alvaro Giménez, ESA’s director of science, added: “We have come an extraordinarily long way since the mission concept was first discussed in the late 1970s, and now we are ready to open a treasure chest of scientific discovery.”

Since mission controllers “woke up” Rosetta in January from an energy-saving interplanetary slumber, it has performed a series of manoeuvres to adjust its speed and trajectory to match comet 67P – a dirty 4km-wide lump of ice, dust and rock hurtling towards the sun at 55,000kph.

The craft is now in a roughly triangular orbit about 100km from the comet’s surface. Over the next few weeks it will edge closer, as its suite of onboard instruments carry out a detailed scientific study of 67P.

epa04342673 A handout image made available by the European Space Agency (ESA) on 06 August 2014 shows an image of comet 67P/Churyumov-Gerasimenko taken by Rosetta spacecraft’s OSIRIS narrow-angle camera on 03 August 2014 from a distance of 285 km. After a decade-long pursuit through space the European Space Agency's (ESA) Rosetta made history 06 August 2014 by meeting up with, and entering orbit around the comet. The tiny spacecraft arrived for its rendezvous with the comet, 405 million kilometres from Earth, shortly after 0900 GMT. EPA/ESA / ROSETTA / MPS HANDOUT HANDOUT EDITORIAL USE ONLY/NO SALES
An image of the comet taken by Rosetta spacecraft’s narrow-angle camera

One has already measured its surface temperature. At -70C, it is warmer than many scientists had expected, indicating that it is covered with dark and probably dusty material rather than clean ice.

“Our first clear views of the comet have given us plenty to think about,” says Matt Taylor, project scientist. “Is this double-lobed structure built from two separate comets that came together in the Solar System’s history, or is it one comet that has eroded dramatically and asymmetrically over time?”

The mission’s highlight is scheduled for November 11, when Rosetta attempts to drop a three-legged lander called Philae on the comet. Because gravity will be too weak to hold Philae in place, it will anchor itself with harpoons while carrying out experiments that include drilling into the surface.

“After landing, Rosetta will continue to accompany the comet until its closest approach to the sun in August 2015 and beyond, watching its behaviour from close quarters to give us . . . real time experience of how a comet works as it hurtles around the sun,” said Mr Taylor.

Visit the Wrong Website, and the FBI Could End Up in Your Computer

Security experts call it a “drive-by download”: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes.

Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.

The approach has borne fruit—over a dozen alleged users of Tor-based child porn sites are now headed for trial as a result. But it’s also engendering controversy, with charges that the Justice Department has glossed over the bulk-hacking technique when describing it to judges, while concealing its use from defendants.

Critics also worry about mission creep, the weakening of a technology relied on by human rights workers and activists, and the potential for innocent parties to wind up infected with government malware because they visited the wrong website.

“This is such a big leap, there should have been congressional hearings about this,” says ACLU technologist Chris Soghoian, an expert on law enforcement’s use of hacking tools. “If Congress decides this is a technique that’s perfectly appropriate, maybe that’s OK. But let’s have an informed debate about it.”

The FBI’s use of malware is not new. The bureau calls the method an NIT, for “network investigative technique,” and the FBI has been using it since at least 2002in cases ranging from computer hacking to bomb threats, child porn to extortion. Depending on the deployment, an NIT can be a bulky full-featured backdoor program that gives the government access to your files, location, web history and webcam for a month at a time, or a slim, fleeting wisp of code that sends the FBI your computer’s name and address, and then evaporates.

What’s changed is the way the FBI uses its malware capability, deploying it as a driftnet instead of a fishing line. And the shift is a direct response to Tor, the powerful anonymity system endorsed by Edward Snowden and the State Department alike.

Tor is free, open-source software that lets you surf the web anonymously. It achieves that by accepting connections from the public Internet—the “clearnet”—encrypting the traffic and bouncing it through a winding series of computers before dumping it back on the web through any of over 1,100 “exit nodes.”

The system also supports so-called hidden services—special websites, with addresses ending in .onion, whose physical locations are theoretically untraceable. Reachable only over the Tor network, hidden services are used by organizations that want to evade surveillance or protect users’ privacy to an extraordinary degree.

Some users of such service have legitimate and even noble purposes—including human rights groups and journalists. But hidden services are also a mainstay of the nefarious activities carried out on the so-called Dark Net: the home of drug markets, child porn, murder for hire, and a site that does nothing but stream pirated My Little Pony episodes.

Law enforcement and intelligence agencies have a love-hate relationship with Tor. They use it themselves, but when their targets hide behind the system, it poses a serious obstacle. Last month, Russia’s government offered a $111,000 bounty for a method to crack Tor.

The FBI debuted its own solution in 2012, in an investigation dubbed “Operation Torpedo,” whose contours are only now becoming visible through court filings.

Operation Torpedo began with an investigation in the Netherlands in August 2011. Agents at the National High Tech Crime Unit of the Netherlands’ national police force had decided to crack down on online child porn, according to an FBI affidavit. To that end, they wrote a web crawler that scoured the Dark Net, collecting all the Tor onion addresses it could find.

The NHTCU agents systematically visited each of the sites and made a list of those dedicated to child pornography. Then, armed with a search warrant from the Court of Rotterdam, the agents set out to determine where the sites were located.

That, in theory, is a daunting task—Tor hidden services mask their locations behind layers of routing. But when the agents got to a site called “Pedoboard,” they discovered that the owner had foolishly left the administrative account open with no password. They logged in and began poking around, eventually finding the server’s real Internet IP address in Bellevue, Nebraska.

They provided the information to the FBI, who traced the IP address to 31-year-old Aaron McGrath. It turned out McGrath was hosting not one, but two child porn sites at the server farm where he worked, and a third one at home.

Instead of going for the easy bust, the FBI spent a solid year surveilling McGrath, while working with Justice Department lawyers on the legal framework for what would become Operation Torpedo. Finally, on November 2012, the feds swooped in on McGrath, seized his servers and spirited them away to an FBI office in Omaha.

A federal magistrate signed three separate search warrants: one for each of the three hidden services. The warrants authorized the FBI to modify the code on the servers to deliver the NIT to any computers that accessed the sites. The judge also allowed the FBI to delay notification to the targets for 30 days.

Operation Torpedo search warrant

This NIT was purpose-built to identify the computer, and do nothing else—it didn’t collect keystrokes or siphon files off to the bureau. And it evidently did its job well. In a two-week period, the FBI collected IP addresses, hardware MAC addresses (a unique hardware identifier for the computer’s network or Wi-Fi card) and Windows hostnames on at least 25 visitors to the sites. Subpoenas to ISPs produced home addresses and subscriber names, and in April 2013, five months after the NIT deployment, the bureau staged coordinated raids around the country.

Today, with 14 of the suspects headed toward trial in Omaha, the FBI is being forced to defend its use of the drive-by download for the first time. Defense attorneys have urged the Nebraska court to throw out the spyware evidence, on the grounds that the bureau concealed its use of the NIT beyond the 30-day blackout period allowed in the search warrant. Some defendants didn’t learn about the hack until a year after the fact. “Normally someone who is subject to a search warrant is told virtually immediately,” says defense lawyer Joseph Gross Jr. “What I think you have here is an egregious violation of the Fourth Amendment.”

But last week U.S. Magistrate Judge Thomas Thalken rejected the defense motion, and any implication that the government acted in bad faith. “The affidavits and warrants were not prepared by some rogue federal agent,” Thalken wrote, “but with the assistance of legal counsel at various levels of the Department of Justice.” The matter will next be considered by U.S. District Judge Joseph Bataillon for a final ruling.

The ACLU’s Soghoian says a child porn sting is probably the best possible use of the FBI’s drive-by download capability. “It’s tough to imagine a legitimate excuse to visit one of those forums: the mere act of looking at child pornography is a crime,” he notes. His primary worry is that Operation Torpedo is the first step to the FBI using the tactic much more broadly, skipping any public debate over the possible unintended consequences. “

You could easily imagine them using this same technology on everyone who visits a jihadi forum, for example,” he says. “And there are lots of legitimate reasons for someone to visit a jihadi forum: research, journalism, lawyers defending a case. ACLU attorneys read Inspire Magazine, not because we are particularly interested in the material, but we need to cite stuff in briefs.”

Soghoian is also concerned that the judges who considered NIT applications don’t fully understand that they’re being asked to permit the use of hacking software that takes advantage of software vulnerabilities to breach a machine’s defenses. The Operation Torpedo search warrant application, for example, never uses the words “hack,” “malware,” or “exploit.” Instead, the NIT comes across as something you’d be happy to spend 99 cents for in the App Store. “Under the NIT authorized by this warrant, the website would augment [its] content with some additional computer instructions,” the warrant reads.

From the perspective of experts in computer security and privacy, the NIT is malware, pure and simple. That was demonstrated last August, when, perhaps buoyed by the success of Operation Torpedo, the FBI launched a second deployment of the NIT targeting more Tor hidden services.

This one—still unacknowledged by the bureau—traveled across the servers of Freedom Hosting, an anonymous provider of turnkey Tor hidden service sites that, by some estimates, powered half of the Dark Net.

The payload for the Tor Browser Bundle malware is hidden in a variable called “magneto”.

The payload for the Tor Browser Bundle malware is hidden in a variable called “magneto”.

This attack had its roots in the July 2013 arrest of Freedom Hosting’s alleged operator, one Eric Eoin Marques, in Ireland. Marques faces U.S. charges of facilitating child porn—Freedom Hosting long had a reputation for tolerating child pornography.

Working with French authorities, the FBI got control of Marques’ servers at a hosting company in France, according to testimony in Marques’ case. Then the bureau appears to have relocated them—or cloned them—in Maryland, where the Marques investigation was centered.

On August 1, 2013, some savvy Tor users began noticing that the Freedom Hosting sites were serving a hidden “iframe”—a kind of website within a website. The iframe contained Javascript code that used a Firefox vulnerability to execute instructions on the victim’s computer. The code specifically targeted the version of Firefox used in the Tor Browser Bundle—the easiest way to use Tor.

This was the first Tor browser exploit found in the wild, and it was an alarming development to the Tor community. When security researchers analyzed the code, they found a tiny Windows program hidden in a variable named “Magneto.” The code gathered the target’s MAC address and the Windows hostname, and then sent it to a server in Virginia in a way that exposed the user’s real IP address. In short, the program nullified the anonymity that the Tor browser was designed to enable.

As they dug further, researchers discovered that the security hole the program exploited was already a known vulnerability called CVE-2013-1690—one that had theoretically been patched in Firefox and Tor updates about a month earlier. But there was a problem: Because the Tor browser bundle has no auto-update mechanism, only users who had manually installed the patched version were safe from the attack. “It was really impressive how quickly they took this vulnerability in Firefox and extrapolated it to the Tor browser and planted it on a hidden service,” says Andrew Lewman, executive director of the nonprofit Tor Project, which maintains the code.

The Freedom Hosting drive-by has had a lasting impact on the Tor Project, which is now working to engineer a safe, private way for Tor users to automatically install the latest security patches as soon as they’re available—a move that would make life more difficult for anyone working to subvert the anonymity system, with or without a court order.

Unlike with Operation Torpedo, the details of the Freedom Hosting drive-by operation remain a mystery a year later, and the FBI has repeatedly declined to comment on the attack, including when contacted by WIRED for this story. Only one arrest can be clearly tied to the incident—that of a Vermont man named Grant Klein who, according to court records, was raided in November based on an NIT on a child porn site that was installed on July 31, 2013. Klein pleaded guilty to a single count of possession of child pornography in May and is set for sentencing this October.

But according to reports at the time, the malware was seen, not just on criminal sites, but on legitimate hidden services that happened to be hosted by Freedom Hosting, including the privacy protecting webmail service Tormail. If true, the FBI’s drive-by strategy is already gathering data on innocent victims.

Despite the unanswered questions, it’s clear that the Justice Department wants to scale up its use of the drive-by download. It’s now asking the Judicial Conference of the United States to tweak the rules governing when and how federal judges issue search warrants. The revision would explicitly allow for warrants to “use remote access to search electronic storage media and to seize or copy electronically stored information” regardless of jurisdiction.

The revision, a conference committee concluded last May (.pdf), is the only way to confront the use of anonymization software like Tor, “because the target of the search has deliberately disguised the location of the media or information to be searched.”

Such dragnet searching needs more scrutiny, Soghoian says. “What needs to happen is a public debate about the use of this technology, and the use of these techniques,” he says. “And whether the criminal statutes that the government relies on even permit this kind of searching. It’s one thing to say we’re going to search a particular computer. It’s another thing to say we’re going to search every computer that visits this website, without knowing how many there are going to be, without knowing what city, state or countries they’re coming from.”

“Unfortunately,” he says, “we’ve tiptoed into this area, because the government never gave notice that they were going to start using this technique.”

Putin’s Espionage Offensive Against France

One of the major themes of my work is how Russia, drawing on decades of rich experience with espionage, aggressively employs intelligence in what I term Special War to defeat, dissuade, and deter its enemies without fighting.

As I’ve reported many times, Russian espionage against the West has been rising since the mid-2000’s and has returned to Cold War levels of effort and intensity — and in some cases, more so. In recent years, the Kremlin has endorsed aggressive espionage against a wide range of Western countries, members of NATO and the European Union (often both), to learn secrets and gain political advantage.

This is simply what the Russians do, as Vladimir Putin, the former KGB officer, understands perfectly. Such things are well known to counterintelligence hands the world over, but are seldom discussed in public.

What this looks like up close has recently been exposed by the Parisian newsmagazine Le Nouvel Observateur, in an exclusive report that draws on deep research and interviews with a wide array of in-the-know French intelligence officials. The world-weary French are a pretty unflappable bunch in matters of espionage, but the piece, which has caused worried discussion in Paris, makes clear that Moscow’s spies are aggressive, indeed “hyperactive,” in France, representing a serious threat to the country’s security and well-being.

The story begins with the case of Colonel Ilyushin, who was ostensibly the deputy air attache at the Russian Embassy in Paris, but in reality was an officer of the Main Intelligence Directorate of the Russian General Staff (GRU), who was discovered to be peeking a bit too closely into President Francois Hollande. Specifically, Ilyushin was detected by French counterintelligence trying to recruit one of Hollande’s senior aides; in other words, GRU was seeking a mole at the president’s side. Ilyushin wanted information not just regarding matters of state, but about the president’s salacious personal life too. Fortunately, French counterspies were onto the GRU officer, and surveilled him for months, cutting short his secret plan. But the French were impressed by the colonel, only thirty years of age and a diligent case officer; unlike many of his predecessors dispatched to Paris by the Kremlin, particularly in Cold War days, Ilyushin was neither a drunkard nor a slacker.

Ilyushin was a busy man, always on the lookout for recruits. He regularly made his presence felt at a wide array of French defense establishments and think tanks, where he constantly tried to “bump into” senior officials, researchers, and journalists, especially those working on security affairs. As a French counterintelligence official explained about Ilyushin’s efforts to recruit influential Parisian reporters,

 “Before approaching them, he learned everything about them: their families, their tastes, their weaknesses too.” He would invite promising targets to lunch at an expensive restaurant and continue to do so every two weeks, per usual GRU practice. During these meetings, Ilyushin would volunteer juicy insider information about Russian defense matters and ties between Moscow and Paris.

At first, he asked for nothing in exchange. Au contraire, Ilyushin was a generous man, and eventually he would offer his quarry a nice gift, an expensive pen or high-end bottle of liquor: “standard first gifts from the former KGB, sufficiently expensive for being a little compromising, but not expensive enough to be considered corruption,” as Le Nouvel Observateur noted. If the gift was accepted, Ilyushin would move forward to full-fledged recruitment of the source. What followed conforms to standard Russian practice in such matters:

Then Ilyushin asked for information, initially anodyne, then less and less so. He put forward to them some small pre-written article, part of a disinformation campaign conceived in Moscow. In exchange, he offered more substantial gifts: for example, a family trip to some sunny paradise. If the interlocutor accepted, he entered into the murky world of espionage. Like in manuals, Ilyushin moved to phase three, the handling (“manipulation”) of his agent, with clandestine meetings abroad and stacks of cash.

One of the journalists whom Ilyushin was seeking to recruit became wary, and he turned to French counterintelligence just in time, as the man had access to Hollande’s inner circle, just as GRU wanted. When the journalist realized he was soon to be a paid Russian agent, he told his story to Parisian counterspies (DCRI, since May termed DGSI), specifically their H4 team that conducts counterintelligence operations against the Russians in France, which already was aware of who the “deputy air attache” really was. Ilyushin was summoned for a meeting and told by French officials to cease his espionage. When he did not do so, a few months later Ilyushin was sent packing back to Moscow, where he was promoted to general, presumably as a reward for his excellent clandestine work in Paris.

The never-before-revealed Ilyushin case represents, in the words of Le Nouvel Observateur, “but the tip of the iceberg that is the broad offensive by Russian spies in Europe, in particular in France.” As a senior French official explained, “In the last few years, particularly after Putin’s return at the Kremlin, they are increasingly numerous and aggressive.” Another added, “They are twice as active as during the Cold War.” The Ukraine crisis has only made Russian spies in France more zealous, and they are seeking everything: political secrets, military secrets, nuclear secrets, economic secrets, plus anything to do with French relations with NATO, the EU and the UN. Hence DGSI’s H4 team is very busy and has been increased to meet this new threat, but today they only number thirty, including secretaries, versus more than eighty when the Berlin Wall fell.

French counterintelligence is aware that several members of the French parliament have been approached by Russian intelligence over the last two or three years; the Russians especially look for unwitting sources who inadvertently reveal too much about defense and security matters. DGSI recently detected one such seeker of “soft” intelligence, Vladimir F., ostensibly a press attache at the Russian Embassy but actually an officer of the Foreign Intelligence Service (SVR). Once detected, he was discreetly sent back to Russia.

SVR officers try to recruit politicians and also influence-shapers in Paris: “Some MP’s agree to relay information supplied by these spies, most of the time without realizing it, acting like ‘useful idiots’ … Some give diplomatic cables to their new ‘Russian friends’.” Think tanks represent another common SVR and GRU target, with prominent researchers reporting many approaches from suspected Russian intelligence officers, while French counterintelligence has tried to keep known Russian operatives away from prominent think tanks, not always successfully.

Industrial espionage is a perennial Kremlin interest, having been a major source of Soviet technology during the Cold War, since it is always cheaper and easier to steal cutting-edge technology than to develop it, but it is now perhaps less tempting than in the past:

These days, the Russian secret services, obsessed as they are with political and military matters, are less effective as regards economic intelligence than their counterparts.”

Nevertheless, there are Russian successes in this arena too. Last year, according to DGSI, the Russian company Rosatom sold a nuclear reactor to a European country because the SVR had been secretly informed about the offer made by its French competitor, Areva.

Back in 2010, then-President Nicolas Sarkozy warned Vladimir Putin about rising Russian espionage. According to one of his top aides, Sarkozy told his Russian counterpart, “almost as if in jest: ‘Instead of spying on our country, you had better deal with terrorists’.” This came after a major spy scandal, never before revealed to the public. A Russian deputy naval attache at the Paris embassy — again, a GRU officer, in reality — sought super-secret information about the sound signatures emitted by new French nuclear submarines.

He developed a French naval officer, gradually, eventually showing up at his house with a suitcase filled with cash to exchange for the desired purloined data. But the French officer had reported the GRU approaches, and French counterintelligence played a trick on the Russians. The “top secret” documents exchanged for cash were fakes. Although Paris hushed up the affair, the GRU officer was declaredpersona non grata and sent home without delay.

Sarkozy’s warning had no effect, and Russian espionage against France is today more robust than ever. According to French counterintelligence, there are some fifty Russian intelligence officers — roughly forty SVR and ten GRU — posing under diplomatic cover at the Paris embassy and the Russian consulates in Nice, Marseille, and Strasbourg. There are also a few officers of the Federal Security Service (FSB)* in France serving undercover as well. The head of SVR activities in France, termed the rezident by the Russians, usually poses as a third secretary at the embassy in Paris, while the GRU rezident masquerades as a TASS journalist or as the senior naval attache.

The Russians also employ Illegals, meaning intelligence operatives who work without benefit of any formal cover. They enter the country under aliases and wholly fake identities, through third countries, following years of training, and are notoriously difficult for even top-notch counterintelligence services to detect. (America got a rare break in 2010 when it rolled up a ten-strong SVR Illegals network in the USA, including the famously photogenic Anna Chapman.)

There is as little contact as possible between the SVR’s “legal” presence, meaning officers serving under various official covers like diplomats and journalists, and Illegals, to protect the identities of these elite spies. French counterintelligence estimates that there are between ten and twenty Russian Illegals currently in the country. How DGSI’s H4 team came to this number was explained by an official:

SVR headquarters in Moscow communicates with Illegals by regularly sending flash high-emission frequencies. They last about half a second and they are encrypted. A spy receives them at their place on an ad hoc receiver-transmitter piece of equipment. The discreet radio-electric DGSI center in Boullay-les-Troux in the Essonne, is capable of intercepting all these emissions. Given that there are some twenty different ones, and that some are probably for training purposes, one can estimate that the clandestine people are between ten and twenty.

Paris believed that there were as many as sixty KGB Illegals in France when the Cold War ended, but French counterintelligence never had much success detecting exactly who they were. Now, however, DGSI claims to have a better handle on Moscow’s Illegals. One official revealed that the Anna Chapman network rolled up in the USA in 2010 had links to an Illegal in France as well:

 “We discovered his apartment, in which there was material for transmissions. We did not arrive in time to arrest him, he had disappeared.” Nevertheless, officials toldLe Nouvel Observateur that DGSI has good information on SVR Illegals in France but is playing the long game: “We are watching them permanently. We learn. We will ‘squeeze’ them at the right time…” 

Cooperation among Western security services is a major help in detecting Russian espionage. Such collaboration has never been better, Parisian officials made clear. Everybody in the West is on a heightened state of alert these days regarding Kremlin espionage:

 “Every time we identify a Russian spy, particularly a rezident, we warn our friends in Berlin, London, or Warsaw,” explained a French official. Top security officials in Germany and Britain have admitted that Russian espionage is at unprecedented levels in their countries as well, while the head of the Belgian security service recently stated that there are “hundreds” of spies operating in Brussels, where NATO and the European Commission are headquartered, “chiefly Russians.”

In contrast, French officials have been more circumspect in public, rarely mentioning the extent of Russian espionage in their country. Indeed, the last time Parisian higher-ups raised a public fuss about such Kremlin activities was way back in 1992, when a French nuclear official was caught passing top secret documents to the Russians. Why this silence persists despite the rising clandestine threat from the East is not difficult to discern. As one Paris official noted wryly:

“How can one explain to public opinion that Russian spies are a threat and, at the same time, that it is necessary to deliver Mistral warships to Moscow?” 

This laissez-faire attitude in Paris about Russian espionage seems unlikely to change soon. The only game-changer potentially on the horizon would be Western reactions in the event Russia actually invades Ukraine with major conventional forces. In that case, the counterintelligence gloves would come off and Russian spies — hundreds of them — who are known to Western counterspies would be expelled en masse.

Unless that happens, Russian espionage in France will continue at a fever pitch. Although DGSI and other French security services are highly professional, and get a great deal of help from Western partners in identifying and blunting SVR and GRU activities to the extent that they can, without political resolve to seriously confront this problem it can only be expected to get worse.

Moreover, the same tradecraft employed by Russian spies in France is played out on a daily basis in every Western country, including — perhaps especially — in the United States. American politicians, journalists, researchers, and academics are targeted by the SVR and GRU just as their counterparts in France are and, we can assume, with similar success. This is a SpyWar, and Moscow intends to win.

*Although Le Nouvel Observateur does not state this, these FSB officers working undercover in France are mostly signals intelligence (SIGINT) specialists conducting covert electronic collection from Russian diplomatic facilities, as the FSB is Russia’s civilian SIGINT agency, as well as the domestic security service.

Israeli spy agency Mossad ‘Wiretapped John Kerry’s Phone During Peace Talks’

Intelligence sources claim Mossad intercepted John Kerry’s calls during peace talks earlier this year.

Israel wiretapped US Foreign Secretary John Kerry’s phone while he was brokering peace talks between the Palestinian Authority and the Jewish state, intelligence sources have claimed.

Israeli intelligence agencies intercepted Kerry’s phone calls and listened to his conversations via satellite while he was attempting to reach a peace deal between Israel and Palestine earlier this year, German news magazine Der Spiegel reported.

The Israeli government then used the information obtained from Kerry’s conversations in its negotiations. The US-led peace talks fell apart at the end of April.

The US State Department and Israel both declined Der Spiegel‘s request for comment on the matter.

Kerry used encrypted phone lines, but also discussed issues with Israel, Palestine and the Arab states on normal phones, allowing Israeli spies to intercept his unsecured conversations.

Israeli Prime Minister Benjamin Netanyahu (L) meets with US Secretary of State John Kerry during a meeting in Jerusalem.
Israeli Prime Minister Benjamin Netanyahu (L) meets with US Secretary of State John Kerry during a meeting in Jerusalem.(Reuters)
In addition to Israel’s intelligence agencies, at least one other spy service monitored Kerry’s calls, Der Spiegel reported.

The revelations could further fracture US-Israeli relations, which are already strained following Israel’s military offensive on the Gaza Strip, which has killed almost 200 Palestinians since the latest ceasefire broke down.

UK Foreign Secretary Phillip Hammond said that the conflict in Gaza has become “intolerable”.

Some 1,740 Palestinians have died since Israel launched its military incursion “Operation Protective Edge” at the start of July. An estimated 65 Israelis have been killed.

On Sunday, it was reported that at least 10 people and a further 30 were injured when a school run by the United Nations in Rafah, southern Gaza was hit by an Israeli airstrike.

Robert Turner, director of the United Nations Relief and Works Agency, said the attack could not have been an accident because the agency informs the Israeli Defence Force of all its sites and shelters daily.

At least six UN shelters have been hit by Israeli airstrikes since the conflict began, killing several people including many children.

Obama’s FBI to hire firm to rate ‘positive’ and ‘negative’ stories about the agency

The FBI is hiring a contractor to grade news stories about the agency as “positive” “neutral” or “negative,” but the agency won’t say why officials need the information or what they plan to do with it.

FBI officials wouldn’t even reveal how they will go about assigning the grades, which were laid out in a recent contract solicitation. The contract tells potential bidders to “use their judgment” in scoring news coverage as part of a new “daily news briefing” service the agency is seeking as part of a contract that could last up to five years.

The move is reminiscent of a similar effort the Obama administration made to grade media coverage of its response to the BP oil spill. A separate defense contract rating reporters’ work was scrapped in 2009.

In a statement of work, the agency says its public affairs office needs a contractor to help monitor “breaking news, editorials, long-form journalism projects and the larger public conversation about law enforcement.”

But the lack of clear public methods and goals raises “troubling questions,” said Dan Kennedy, a journalism professor at Northwestern University.

“You would certainly worry this could affect access,” he said. “It might affect the way they’re going to approach your questions, whether they’re going to be extra careful not to make news if you’re on the ‘bad list.’”

Mr. Kennedy also pointed out that journalism can be nuanced and complicated, raising questions about what sort of guidance the agency provides to contractors to fit stories into positive, neutral or negative boxes.

“If you’re rigorously fair about it and you’re getting the FBI’s point of view out there, they would probably write that as a negative story, but it strikes me as neutral,” he said.

David Williams, president of the Taxpayers Protection Alliance, said the FBI, like many agencies, may want to know what people are saying and writing about them. And media-clipping services, while often done in-house, aren’t an unusual use of resources, he said.

But he questioned how rating journalists fits with the agency’s core mission of enforcing federal laws.

“It just seems like you’re creating a whole other layer of work,” he said.

The contractor must “characterize the coverage such that FBI officials can quickly get a sense of how widely various story elements were run and also for the general tonality of the coverage,” FBI officials said in the contract’s statement of work.

It’s not the first time the Obama administration has sought outside help in deciphering media coverage.

In 2011, The Associated Press reported on an $18,000 contract that called, in part, for a vendor to assess the “tone” of news stories about the administration’s response to the BP oil spill.

Past contracts have created problems too, the AP noted, referring to a 2009 defense contract grading journalists’ work before they embedded with troops.

Ultimately, the Pentagon scrapped that contract, which graded reporters’ work as “positive,” “negative” or “neutral,” according to Stars and Stripes.

The decision to scrap the contract came after the newspaper reported that military officials were using the contractor-created profiles to help decide whether to grant or deny “embed” requests.

Under the FBI contract proposal, the vendor would deliver a daily news briefing through a website using “extremely fresh” content each day, including links to media coverage, by 7 a.m. Monday through Friday.

“This service shall allow personnel to have better situational awareness as well as support both proactive and reactive public communications strategies,” officials stated in the statement of work.

The briefing materials would include date of coverage, tonality, story focus, type of media outlet and “overall impact” of news coverage in chart and graph form, records show. The FBI also would have the right to archive the daily briefings indefinitely.

Facebook Went Down And People Started Calling The Cops

Do we spend too much time on Facebook? Depends. When the site goes down, do you consider it to be an emergency?

We hope you answered “obviously not,” but according to Los Angeles Sherrif Department Sgt. Burton Brink, lots of people call the authorities when their favorite social network appears to be offline.

Facebook went down around 12:30pm today, according to a breaking news report on NBC.

View image on Twitter

Soon after, Brink tweeted the following:

facebookdown

He continued to tweet, explaining that this “happens a lot.”

facebookdown2

Business Insider reached out to Brink for comment but he was unavailable.

Don’t worry everyone, Facebook is back. Next time the site goes down, remember to leave the police lines open for real emergencies.