The Story Of The First Internet Worm

Submitted by: Marc Menninger

Robert Tappan Morris was the first person convicted by a jury under the Computer Fraud and Abuse Act of 1986. The story of the worm he created and what happened to him after it was released is a tale of mistakes, infamy, and ultimately the financial and professional success of its author.

Morris was a 23-year-old graduate student at Cornell University in 1988 when he wrote the first Internet worm in 99 lines of C code. According to him, his worm was an experiment to gain access to as many machines as possible. Morris designed the worm to detect the existence of other copies of itself on infected machines and not reinfect those machines. Although he didn’t appear to create the worm to be malicious by destroying files or damaging systems, according to comments in his source code he did design it to “break-in” to systems and “steal” passwords. Morris’ worm worked by exploiting holes in the debug mode of the Unix

sendmail

program and in the finger daemon

fingerd

.

[youtube]http://www.youtube.com/watch?v=i1Xi3Hng_Z0[/youtube]

On November 2, 1988, Morris released his worm from MIT to disguise the fact that the author was a Cornell student. Unfortunately for Morris, his worm had a bug and the part that was supposed to not reinfect machines that already harbored the worm didn t work. So systems quickly became infested with dozens of copies of the worm, each trying to break into accounts and replicate more worms. With no free processor cycles, infected systems soon crashed or became completely unresponsive. Rebooting infected systems didn t help. Killing the worm processes by hand was futile because they just kept multiplying. The only solution was to disconnect the systems from the Internet and try to figure out how the worm worked.

Programmers at the University of Berkeley, MIT, and Purdue were actively disassembling copies of the worm. Meanwhile, once he realized the worm was out of control, Morris enlisted the help of a friend at Harvard to stop the contagion. Within a day, the Berkeley and Purdue teams had developed and distributed procedures to slow down the spread of the worm. Also, Morris and his friend sent an anonymous message from Harvard describing how to kill the worm and patch vulnerable systems. Of course, few were able to get the information from either the universities or Morris because they were disconnected from the Internet.

Eventually the word got out and the systems came back online. Within a few days things were mostly back to normal. It is estimated that the Morris worm infected more than 6,000 computers, which in 1988 represented one-tenth of the Internet. Although none of the infected systems were actually damaged and no data was lost, the costs in system downtime and man-hours were estimated at $15 million. Victims of the worm included computers at NASA, some military facilities, several major universities, and medical research facilities.

Writing a buggy worm and releasing it was Morris’ second mistake. His first mistake was talking about his worm for months before he released it. The police found him without much effort, especially after he was named in the New York Times as the author.

The fact that his worm had gained unauthorized access to computers of “federal interest” sealed his fate, and in 1990 he was convicted of violating the Computer Fraud and Abuse Act (Title 18). He was sentenced to three years probation, 400 hours of community service, a fine of $10,500, and the costs of his supervision. Ironically, Morris’ father, Robert Morris Sr., was a computer security expert with the National Security Agency at the time.

As a direct result of the Morris worm, the CERT Coordination Center (CERT/CC) was established by the Defense Advanced Research Projects Agency (DARPA) in November 1988 to “prevent and respond to such incidents in the future”. The CERT/CC is now a major reporting center for Internet security problems.

After the incident, Morris was suspended from Cornell for acting irresponsibly according to a university board of inquiry. Later, Morris would obtain his Ph.D. from Harvard University for his work on modeling and controlling networks with large numbers of competing connections.

In 1995, Morris co-founded a startup called Viaweb with fellow Harvard Ph.D. Paul Graham. Viaweb was a web-based program that allowed users to build stores online. Interestingly, they wrote their code primarily in Lisp, an artificial intelligence language most commonly used at universities. Viaweb was a success, and in 1998, ten years after Morris released his infamous worm, Viaweb was bought by Yahoo! for $49 million. You can still see the application Morris and Graham developed in action as Yahoo! Shopping.

Robert Morris is currently an assistant professor at MIT (apparently they forgave him for launching his worm from their network) and a member of their Laboratory of Computer Science in the Parallel and Distributed Operating Systems group. He teaches a course on Operating System Engineering and has published numerous papers on advanced concepts in computer networking.

About the Author: Marc R. Menninger is the founder and site administrator for the OpenCSOProject, a knowledge base for security professionals. To download security policies, articles and presentations, click here:

forum.opencsoproject.org

.

Source:

isnare.com

Permanent Link:

isnare.com/?aid=14431&ca=Computers+and+Technology

Best Place To Get A Massage In Lexington Ky

Best Place to Get a Massage in Lexington KY

by

adamoscar

The best place to get a massage in Lexington, KY, is the Corey Proffitt Studios. Here clients can enjoy a wide range of popular rejuvenating body massages. This is the perfect place to pamper your tired body with an appropriate massage therapy.

While a significant number of people visit massage studios to rejuvenate their stressed body, poor health and body pain are often the key reasons for seeking an appointment with an experienced massage therapist. A trained and experienced therapist knows which therapy works best for a particular condition.

Different Massage Styles

There is a wide range of massage styles. Each style is best suited for certain health conditions or ailments.

Swedish Massage

This traditional massage technique involves application of light to moderate pressure on the muscles with the help of a variety of kneading, gliding and tapping strokes. It helps to reduce muscle tension, boosts blood flow and calms the nerve. It is ideal for stress management. It also accelerates recovery of injured tissues.

[youtube]http://www.youtube.com/watch?v=ZLNXQkqZe6M[/youtube]

Deep Tissue Massage

Deep tissue massage therapy is best suited for treating the painful stiff areas of the body. Although the massaging technique is almost similar to that of Swedish massage, the movements are less rhythmic and slower in deep tissue massage. The massage targets the deep tissues below the skin.

Hawaiian Style Massage

Lomi Lomi, the traditional massaging style of Hawaii, helps to relax the stressed muscles. This refreshing body massage involving use of elbows and forearms for massaging the tissues helps to reduce stress, anxiety and depression and promotes sleep.

Sports Massage

This massaging technique helps in developing muscle systems used in different types of physical activities. It helps to condition muscles before a sporting event. It improves muscle flexibility and reduces risk of muscle strains. It also accelerates healing of injured muscles.

Prenatal Massage

Physical changes that occur during pregnancy increase stress on the muscles and joints, causing body aches. Prenatal massage helps to diminish muscle aches and joint pain. It also helps to reduce swelling in the arms and legs. Emotional stress experienced by women during pregnancy can be alleviated with the help of pregnancy massage.

Reflexology

Reflexology helps to stimulate specific areas of the feet and hands, known as the reflex areas, for treating specific health problems. It aids relaxation, reduces pain, assists in recovery from illnesses and eases pregnancy symptoms.

Hot Stone Massage

Hot stone massage is a variation of the Swedish massage style. In this form of massage, heated stone is used for massaging specific areas of the body.

Read more about

best place to get a massage in lexington ky

and click here

massage-lexington-ky.com/

for professional massage therapy in a safe and relaxing atmosphere.

Read my blog at

adamoscar.yolasite.com/

.

Article Source:

ArticleRich.com

Enjoy Spa Like Luxury At Home By Purchasing A Bamboo Towel Set

byadmin

Even though they can be expensive, bamboo towels are a great choice for people who are environmentally conscious. The fabric made from bamboo is luxuriously soft, yet it is also very strong. Bamboo is known for its strength and besides being used to create fabric, it is also used in many home improvement products.

Bamboo Offers Sustainability

Most of the bamboo processed to make bamboo bath towels is organic. Bamboo grows very easily in many types of climates and it is a hardy plant. Even though it is a very woody plant, it is categorized as a grass. Bamboo is one of the world’s fastest growing grasses and has the ability to grow more than a yard in one day.

When it is harvested, it does not require replanting like trees or cotton because it has a very good root system and bamboo will continue to grow on its own. In addition, bamboo doesn’t require as much water as cotton does to grow. Its hardiness also allows it to grow without the use of pesticides or chemical fertilizers.

Luxury at Home

You don’t have to visit a high-end spa to enjoy using bamboo bath towels. You can buy a bamboo towel set for your own bathroom and enjoy them whenever you wish. Aside from being soft and durable, bamboo towels always smell fresh and the do not mildew like cotton towels can when they get damp or haven’t been completely dried.

Unlike some expensive cotton towels, bamboo bath towels are very absorbent. Sometimes luxury cotton towels can still leave you feeling damp because they don’t fully absorb the water on your skin. However, bamboo towels will pick up all the water so you skin will be dry when you’re ready to get dressed after your shower or bath. Bamboo towels will wick away water three to four times faster than cotton, which is why they are so absorbent.

The fabrics made from bamboo, including those used in towels, are anti-fungal and antibacterial, so you don’t have to worry about getting germs from someone if they accidentally use your towel after they shower. The towels are also great for people with sensitive skin as bamboo is also hypoallergenic.

A Great Gift

A bamboo towel set would be a wonderful gift for a wedding or as a housewarming gift. Most people probably wouldn’t buy bamboo towels for themselves as they can be quite expensive. However, you could buy a set to give to a friend so they can pamper themselves after a bath.

While bamboo towels are becoming more available, the best place to buy them will be online as you will be able to find a larger selection than you will in most stores. Visit here for more info.

Be Aware Of The Misuse Of 3 D Printing Technology}

Be Aware Of The Misuse of 3D Printing Technology

by

Stuart Ting3D printers is the technology of the future that is here to stay. Today, everywhere you look, you can find news about the latest innovations that have come about using a 3D printer. From motorbikes to medical equipments and prosthetic limbs and futuristic gadgets, people have been able to create almost anything out of their imagination into a workable prototype or even a full-fledged product that is ready for the market.

Popularity in Australia

With the technology evolving rapidly, and improvements being made constantly in 3D printer filament, it is no wonder that people in Australia, from hobbyists to entrepreneurs and industrialists, have wholeheartedly embraced the 3D printing technology.

The downside of the technology

However, just like anything else that is man made, 3D printers

have become a double-edged sword that is being used for a lot of shady things. While it may still not be an affordable technology for everyone, the misuse of 3D technology is still widespread and happening because it is available in a convenient way to many industrial houses, developers, programmers, and other people who can afford to buy the best in 3D printers, so this is something that everyone has to be aware of.

What are the dangers of 3D printing technology?

One of the latest cases where 3D printing technology captured the attention of the world for all the wrong reasons was when a law student put up a video of a gun he had designed and got printed using a 3D printer. The CAD design of the gun was downloaded in the thousands before it was removed at the express request of the Department of Homeland Security in the U.S. In Australia too, 3D printers are becoming increasingly popular and there’s no telling what will be cooked up next.

The other dangers of 3D printers

Apart from a deliberate misuse of the printers to create products which may be harmful for the general populace, there are other dangers to 3D printers that people need to be aware of. Knowing these dangers will give people a more comprehensive idea of how to use 3D printers in a way that is safe for themselves and the environment.

Some of these dangers are:

-> Printing or buying guns that are made with plastic from 3D printing technology. The danger of this is that they could pass through metal detectors and be used indiscriminately by anyone with an agenda that is not for the highest good of the public. Printing out firearms using a 3D printer just so that licensing requirements can be circumvented is one of the biggest dangers of the technology. It puts guns in the hands of anyone and everyone. All that is needed is to download the CAD design and get it printed either personally or commercially.

-> Printing of safety gadgets or devices using 3D printers that may not hold up to the rigorous standards that are met when the same product is manufactured using metal. For example, printing of helmets and other safety gear using 3D printers can result in danger to the life of the person if the helmet does not hold up in an accident.

-> Printing of products that absolutely need metal to be effective and functional, but using 3D printing technology to make it instead, in order to save on time and money. This is both unethical and illegal.

-> 3D printed drugs are the latest threat to the public due to the misuse of 3D printing technology. Using a chemical blueprint that can be availed from a pharmacy, 3D printers can be used to print out drugs, so that patients can henceforth print out their own drugs! Though this may not be something that is viable in the near future, if it does become possible, then any drug can be printed using it, from cocaine to cyanide, and the implications of this misuse are enormous.

->Printing out food-related items using 3D printers: Anything from a fork to a plate can be printed out this way, but what are the safety and health risks associated with this?

With 3D printing technology, it is easy to go both ways-create as well as destruct, so it is important to be aware at all times and choose wisely.

Stuart Ting is the owner Infinity 3D Printing which is one of the largest suppliers of 3D printers and filaments across Australia. Infinity 3D Printing stocks a range of 3D printers that are high quality and efficient.

Article Source:

eArticlesOnline.com}

Public disclosure made of final report on deaths of nine in Finnish school shooting

Friday, April 18, 2008

Jokela School, the scene of the shooting

The Finnish National Bureau of Investigation yesterday released 600 pages of the 2,000 page final report into the Jokela school shooting. 18-year-old Pekka-Eric Auvinen opened fire at Jokela High School, killing eight before turning his gun on himself, receiving fatal wounds.

The remaining 1,400 pages of the report are to remain confidential. The public section reveals a number of problems that may have impacted on Auvinen’s decision to conduct the attack, but says that police failed to find any conclusive motive. Also released was an animation depicting events at the school.

The report says Auvinen had been bullied since the age of ten and concludes the extent of this problem was greater than previously thought. Auvinen suffered from anxiety and blushing, especially in lessons, and had been diagnosed with a panic disorder, for which he had been prescribed medication. Auvinen also suffered from sleep disorders and loneliness, and had few friends, although one former bully did go on to become a good friend of Auvinen’s. His mother said inability to settle on a suitable ideology contributed to Auvinen’s depression.

His parents had noticed and reacted to the bullying problem, but their intervention only served to worsen the situation. According to entries in Auvinen’s diary, he first began planning the shooting – which he gave the English name “Operation Main Strike” – about eight months prior to actually conducting the shooting.

Auvinen had told his mother that under certain circumstances he could approve of violence. He had often viewed web sites promoting violence and had a number of online contacts whom he discussed his ideas with. One of these was a United States teen arrested for planning a similar attack, and two others discussed the Columbine High School Massacre with him and traded videos they found online. However, there is no evidence he informed anyone of his plans until immediately prior to the attack.

An interior window shot through by the killer

The report called Auvinen a moderately good student, but noted his mental problems had impacted his performance at school. He had been interested in politics from an early age, being involved with the Centre Party, the Social Democratic Party, the Left Alliance, and the Finnish Communist Party.

“In the best case, this (attack) would create massive destruction and chaos, or even a revolution,” read one diary entry. “In any case, I want this to be remembered forever. Maybe I’ll even have a follower; after all, I am a super-person, almost God.” Another revealed he intended to “kill as many of you bastards as possible”. His diary also reveals he was aware he would be dead by the end of the attack.

He obtained a .22 calliber handgun which he named Catherine, having been denied a license for a 9mm gun, and submitted his plans online – including to YouTube – just 14 minutes prior to firing his first shots, having cycled to school. It was determined that, given the time-frame, there was little that could have been done by anyone who saw the material to prevent the attack. He fired 75 shots, 50 of which struck his eight fatally wounded victims, who were apparently chosen at random. Thirteen others were injured in the event.

The deceased were six students, the school headmistress and the school nurse. Auvinen shot at each several times in the region of the head and upper torso. He ultimately shot himself in the school toilet, and died in hospital from head wounds ten hours later, having never regained consciousness.

Police could not determine why he chose the date he did, although it was noted his online relationship with a foreign girl had ended just days before. It was also determined little could be done to predict and prevent future incidents, although one measure being sought is to require medical checks for gun licences and parental consent for prospective owners under 18.

The confidential section of the report discusses causes of death and police operations.

Retrieved from “https://en.wikinews.org/w/index.php?title=Public_disclosure_made_of_final_report_on_deaths_of_nine_in_Finnish_school_shooting&oldid=1100423”

March against new French copyright law

Sunday, May 7, 2006

At the head of the march, protesters walked clad as prisoners, prosecuted by DRM publishers and “major” record companies (background: column of the Bastille)

Paris, France -Protesters marched denouncing the new copyright bill, known as DADVSI.Opponents to the bill contend that the broad civil and criminal penalties that it enacts in order to fight illegal online copying of copyrighted works will in fact have a chilling effect on a variety of unrelated developments, especially in free software. More than 160,000 people signed the anti-DADVSI petition from EUCD.info, a watchdog group fighting developments of the EU Copyright Directive.

Deputy Martine Billard (Greens, Paris), one of the main debaters when the bill was before the National Assembly, marched in opposition

The protest, uniting elected officials, representatives from computing and Internet organisations, political groups, and simple citizens, walked in a festive and peaceful atmosphere from the Place de la Bastille (site of the former royal prison) to the Ministry of Culture. It was organized by a variety of associations, including StopDRM, APRIL, Odebi league, Audionautes, various free software and Linux user groups, and sponsored by the French Communist Party and its young adult affiliate organisation, the youngs of the French Socialist Party, the youngs of the centrist Union for French Democracy, the young Greens. All the sponsors of this march are listed here. Depending on estimates, between 300 and 800 people marched, a low number by French standards.

According to opponents of the bill, designers of DRM systems could have computer security experts prosecuted for publishing information about security lapses in DRM systems. The sign translates to “I explained a security flaw“.

The DADVSI law, among other issues, enacts an extensive protection of copyrighted content online and a protection of digital rights management techniques, including civil and criminal penalties for help in circumventing them. Opponents contend that the bill, depending on how it is amended in the French Senate, could in effect criminalise the writing of players compatible with new online distribution formats for music, video or even text, and thus make such content unplayable on systems such as Linux, thereby generating a monopoly for established suppliers.

Supporters of the bill, such as cinema and recording industry groups, contend that strong measures are needed to thwart online copying, which, according to them, is responsible for important losses of sales and revenue. They deny the risks for free software and other freedoms, claiming that, despite vague provisions, the law will be enforced wisely by the judiciary. They claim that new online legal commercial downloading platforms will flourish when peer-to-peer copying has stopped.

The bill is due to be examined in the Senate this week. Then, under the fast track procedure requested by the government, it may be signed into law by president Jacques Chirac after a mixed commission merges the text from the Senate and the lower house of Parliament, the National Assembly. Opponents have already indicated they would mount a constitutional challenge before the Constitutional Council. The bill, when it was examined by the National Assembly, proved divisive; the ruling UMP party was split on the issue, some even sponsoring a “legal licence” which would enable French Internet users to copy copyrighted content legally, provided they would pay a flat fee which would be split between the rights holder.

At the end of the march, some protesters sent balloons into the sky over the Palais Royal, where the Ministry of Culture is located

Protesters, as well as deputies from all parties, contend that major lobbies influenced the bill’s passage. Some amendments were nicknamed Vivendi Universal, from the name of a major record company that allegedly suggested it. Protesters recalled that Minister of Culture Renaud Donnedieu de Vabres was convicted of money laundering in 2004.

Retrieved from “https://en.wikinews.org/w/index.php?title=March_against_new_French_copyright_law&oldid=4675076”

Lowest Home Loan Rates In India

Lowest Home loan Rates in India

by

Aman Jaryal

A home is the essential part of life for a person. Getting a house is not that easy for a buyer to buy. Home loans are meant to fulfill your dreams in an easy way. By each passing day, the price of property is increasing on a high scale, and it is usually beyond the approach of a common man. Whether it is your first Home loan, or you are in the process of moving house or you want to reconstruct your home, a Home loan is one of the biggest financial assurances that you can make in your entire life. A mortgage finance broker helps in getting you the best possible home loan available.

[youtube]http://www.youtube.com/watch?v=xam3bdopbrU[/youtube]

There are the types of home loan. For housing finance, it is the secured in which the borrowers have to submit his documents to the bank on behalf of loan taken. The bank possession will be returned after all the EMI s paid by the person. There is the tenure period of maximum 15 years which goes up to 20 in some cases in which the customer have to pay all the EMI. Higher will be the tenure period more will be the interest with low monthly installments. The

Home Loan Interest Rates

on home debt may be floating or fixed. Most of the people opt for fixed rates because it can t get higher with the time. Throughout the tenure period, the interest rate remains the same while in floating it varies. If you have a good credit record then, you may have the best deals available, like you can avail of higher loan amounts or you can avail of the lowest home loan rates.

While applying mortgage loan the bank take account of the customer s age, his salary, credit history, savings, profession, location of property, and other debts. For people with no credit history may face some difficulty to apply for a

home loan but it is better than to have bad credit history as it provides you the high finance rates. The documents required depends either you are salaried, self employed or self employed professionals. Different banks offering different interest rates for home loans like HDFC offering 10.50%-11.0%, AXIS offers 10.50%-11.75%, SBI offers 10.50%-11-25%.A customer can either opt for offline or online housing finance. Offline banking may lead to time consuming as no one have too much time to go and apply these days. Online banking provides the customer to have best comparison between all the banks so that a customer can avail the best deal in the market.Aman Jaryal is a Financial Service Provider from last 5 years. I work in banking Sector. I deal with Services like Home Loan, Loan against Property etc. I have good knowledge of Finance. I have done MBA in Finance from Delhi University.Article Source: ArticleRich.com

Bill Clinton jokingly named professor at Columbia University

Wednesday, November 15, 2006

Columbia University President Lee Bollinger Wednesday jokingly named Bill Clinton to a professorship.

In opening remarks at the Kraft Program Series, “Challenges of New Democracies,” he said that “the last time he was here I said that ‘one more lecture,’ and he’d be up for tenure. So, this is it. Today we welcome professor Bill Clinton.”

Mr. Clinton and former Czech President Václav Havel were guest lecturers at the Morningside Heights campus. Havel is midway through a seven week writing residency at Columbia.

Both nations former leaders spoke about the challenges they faced during their times in office in order to bring the former Warsaw Pact countries into the West.

Havel mentioned that no one anticipated the rise of criminal mafias in the post-communist period, and that he and other dissidents imagined a swift transition from communism to democracy. He cited Czechoslovakia‘s 1948 destruction of civil society as a significant delay.

Clinton urged the United States to use its international economic power to improve the world.

Citing an even distribution of “intelligence and ability… throughout the world,” with India and China’s enormous population, he said that it’s only a matter of time when “other people get their act together” and “have more people than we do” when, “as a nation, we won’t be dominant.”

Acknowledging increasing American reliance upon Chinese economic growth, Clinton said the Chinese government will shortly have “a trillion dollars in cash reserves” while the United States has “a combined annual budget and trade deficit of a trillion dollars.”

Mentioning the Bush administration’s tax cut given to him and others in his income tax class, he said that the United States “had to borrow money from (the Chinese government) to pay for my tax cut.”

He also suggested that increasing American foreign aid to 0.7% of the U.S.’s $11 trillion Gross Domestic Product aid through cuts in the Department of Defense budget would “create a world with more partners and fewer adversaries.”

Mr. Bollinger also mentioned the war in Iraq.

Criticizing a “dubious construction of a very vaguely identified threat of WMDs in Iraq,” Mr. Havel questioned why planners failed to anticipate civil instability after initial combat operations.

Mr. Clinton declined comment citing his recent testimony before the Baker-Hamilton Commission and his wife Hillary’s position as New York senator. He added, however, that “whatever she says, I’m for.”

He acknowledged that it is an international best interest policy if Iraq “held together rather than falling apart, we would be better off if it had some measure of security and couldn’t become a base for terrorist operations.”

Retrieved from “https://en.wikinews.org/w/index.php?title=Bill_Clinton_jokingly_named_professor_at_Columbia_University&oldid=4703632”

Keep your eyes peeled for cosmic debris: Andrew Westphal about Stardust@home

Sunday, May 28, 2006

Stardust@home logoImage: Stardust@home.

Stardust is a NASA space capsule that collected samples from comet 81P/Wild (also known as “Wild 2) in deep space and landed back on Earth on January 15, 2006. It was decided that a collaborative online review process would be used to “discover” the microscopically small samples the capsule collected. The project is called Stardust@home. Unlike distributed computing projects like SETI@home, Stardust@home relies entirely on human intelligence.

Andrew Westphal is the director of Stardust@home. Wikinews interviewed him for May’s Interview of the Month (IOTM) on May 18, 2006. As always, the interview was conducted on IRC, with multiple people asking questions.

Some may not know exactly what Stardust or Stardust@home is. Can you explain more about it for us?

Artist’s rendering of Spacecraft StardustImage: NASA.

Stardust is a NASA Discovery mission that was launched in 1999. It is really two missions in one. The primary science goal of the mission was to collect a sample from a known primitive solar-system body, a comet called Wild 2 (pronounced “Vilt-two” — the discoverer was German, I believe). This is the first [US]] “sample return” mission since Apollo, and the first ever from beyond the moon. This gives a little context. By “sample return” of course I mean a mission that brings back extraterrestrial material. I should have said above that this is the first “solid” sample return mission — Genesis brought back a sample from the Sun almost two years ago, but Stardust is also bringing back the first solid samples from the local interstellar medium — basically this is a sample of the Galaxy. This is absolutely unprecedented, and we’re obviously incredibly excited. I should mention parenthetically that there is a fantastic launch video — taken from the POV of the rocket on the JPL Stardust website — highly recommended — best I’ve ever seen — all the way from the launch pad, too. Basically interplanetary trajectory. Absolutely great.

Is the video available to the public?

Yes [see below]. OK, I digress. The first challenge that we have before can do any kind of analysis of these interstellar dust particles is simply to find them. This is a big challenge because they are very small (order of micron in size) and are somewhere (we don’t know where) on a HUGE collector— at least on the scale of the particle size — about a tenth of a square meter. So

We’re right now using an automated microscope that we developed several years ago for nuclear astrophysics work to scan the collector in the Cosmic Dust Lab in Building 31 at Johnson Space Center. This is the ARES group that handles returned samples (Moon Rocks, Genesis chips, Meteorites, and Interplanetary Dust Particles collected by U2 in the stratosphere). The microscope collects stacks of digital images of the aerogel collectors in the array. These images are sent to us — we compress them and convert them into a format appropriate for Stardust@home.

Stardust@home is a highly distributed project using a “Virtual Microscope” that is written in html and javascript and runs on most browsers — no downloads are required. Using the Virtual Microscope volunteers can search over the collector for the tracks of the interstellar dust particles.

Aerogel slice removed with an ultrasonic blade, showing particle tracks.Image: NASA.

How many samples do you anticipate being found during the course of the project?

Great question. The short answer is that we don’t know. The long answer is a bit more complicated. Here’s what we know. The Galileo and Ulysses spacecraft carried dust detectors onboard that Eberhard Gruen and his colleagues used to first detect and them measure the flux of interstellar dust particles streaming into the solar system. (This is a kind of “wind” of interstellar dust, caused by the fact that our solar system is moving with respect to the local interstellar medium.) Markus Landgraf has estimated the number of interstellar dust particles that should have been captured by Stardust during two periods of the “cruise” phase of the interplanetary orbit in which the spacecraft was moving with this wind. He estimated that there should be around 45 particles, but this number is very uncertain — I wouldn’t be surprised if it is quite different from that. That was the long answer! One thing that I should say…is that like all research, the outcome of what we are doing is highly uncertain. There is a wonderful quote attributed to Einstein — “If we knew what we were doing, it wouldn’t be called “research”, would it?”

How big would the samples be?

We expect that the particles will be of order a micron in size. (A millionth of a meter.) When people are searching using the virtual microscope, they will be looking not for the particles, but for the tracks that the particles make, which are much larger — several microns in diameter. Just yesterday we switched over to a new site which has a demo of the VM (virtual microscope) I invite you to check it out. The tracks in the demo are from submicron carbonyl iron particles that were shot into aerogel using a particle accelerator modified to accelerate dust particles to very high speeds, to simulate the interstellar dust impacts that we’re looking for.

And that’s on the main Stardust@home website [see below]?

Yes.

How long will the project take to complete?

Partly the answer depends on what you mean by “the project”. The search will take several months. The bottleneck, we expect (but don’t really know yet) is in the scanning — we can only scan about one tile per day and there are 130 tiles in the collector…. These particles will be quite diverse, so we’re hoping that we’ll continue to have lots of volunteers collaborating with us on this after the initial discoveries. It may be that the 50th particle that we find will be the real Rosetta stone that turns out to be critical to our understanding of interstellar dust. So we really want to find them all! Enlarging the idea of the project a little, beyond the search, though is to actually analyze these particles. That’s the whole point, obviously!

And this is the huge advantage with this kind of a mission — a “sample return” mission.

Most missions rather do things quite differently… you have to build an instrument to make a measurement and that instrument design gets locked in several years before launch practically guaranteeing that it will be obsolete by the time you launch. Here exactly the opposite is true. Several of the instruments that are now being used to analyze the cometary dust did not exist when the mission was launched. Further, some instruments (e.g., synchrotrons) are the size of shopping malls — you don’t have a hope of flying these in space. So we can and will study these samples for many years. AND we have to preserve some of these dust particles for our grandchildren to analyze with their hyper-quark-gluon plasma microscopes (or whatever)!

When do you anticipate the project to start?

We’re really frustrated with the delays that we’ve been having. Some of it has to do with learning how to deal with the aerogel collectors, which are rougher and more fractured than we expected. The good news is that they are pretty clean — there is very little of the dust that you see on our training images — these were deliberately left out in the lab to collect dust so that we could give people experience with the worst case we could think of. In learning how to do the scanning of the actual flight aerogel, we uncovered a couple of bugs in our scanning software — which forced us to go back and rescan. Part of the other reason for the delay was that we had to learn how to handle the collector — it would cost $200M to replace it if something happened to it, so we had to develop procedures to deal with it, and add several new safety features to the Cosmic Dust Lab. This all took time. Finally, we’re distracted because we also have many responsibilities for the cometary analysis, which has a deadline of August 15 for finishing analysis. The IS project has no such deadline, so at times we had to delay the IS (interstellar, sorry) in order to focus on the cometary work. We are very grateful to everyone for their patience on this — I mean that very sincerely.

And rest assured that we’re just as frustrated!

I know there will be a “test” that participants will have to take before they can examine the “real thing”. What will that test consist of?

The test will look very similar to the training images that you can look at now. But.. there will of course be no annotation to tell you where the tracks are!

Why did NASA decide to take the route of distributed computing? Will they do this again?

I wouldn’t say that NASA decided to do this — the idea for Stardust@home originated here at U. C. Berkeley. Part of the idea of course came…

If I understand correctly it isn’t distributed computing, but distributed eyeballing?

…from the SETI@home people who are just down the hall from us. But as Brian just pointed out. this is not really distributed computing like SETI@home the computers are just platforms for the VM and it is human eyes and brains who are doing the real work which makes it fun (IMHO).

That said… There have been quite a few people who have expressed interested in developing automated algorithms for searching. Just because WE don’t know how to write such an algorithm doesn’t mean nobody does. We’re delighted at this and are happy to help make it happen

Isn’t there a catch 22 that the data you’re going to collect would be a prerequisite to automating the process?

That was the conclusion that we came to early on — that we would need some sort of training set to be able to train an algorithm. Of course you have to train people too, but we’re hoping (we’ll see!) that people are more flexible in recognizing things that they’ve never seen before and pointing them out. Our experience is that people who have never seen a track in aerogel can learn to recognize them very quickly, even against a big background of cracks, dust and other sources of confusion… Coming back to the original question — although NASA didn’t originate the idea, they are very generously supporting this project. It wouldn’t have happened without NASA’s financial support (and of course access to the Stardust collector). Did that answer the question?

Will a project like this be done again?

I don’t know… There are only a few projects for which this approach makes sense… In fact, I frankly haven’t run across another at least in Space Science. But I am totally open to the idea of it. I am not in favor of just doing it as “make-work” — that is just artificially taking this approach when another approach would make more sense.

How did the idea come up to do this kind of project?

Really desperation. When we first thought about this we assumed that we would use some sort of automated image recognition technique. We asked some experts around here in CS and the conclusion was that the problem was somewhere between trivial and impossible, and we wouldn’t know until we had some real examples to work with. So we talked with Dan Wertheimer and Dave Anderson (literally down the hall from us) about the idea of a distributed project, and they were quite encouraging. Dave proposed the VM machinery, and Josh Von Korff, a physics grad student, implemented it. (Beautifully, I think. I take no credit!)

I got to meet one of the stardust directors in March during the Texas Aerospace Scholars program at JSC. She talked about searching for meteors in Antarctica, one that were unblemished by Earth conditions. Is that our best chance of finding new information on comets and asteroids? Or will more Stardust programs be our best solution?

That’s a really good question. Much will depend on what we learn during this official “Preliminary Examination” period for the cometary analysis. Aerogel capture is pretty darn good, but it’s not perfect and things are altered during capture in ways that we’re still understanding. I think that much also depends on what question you’re asking. For example, some of the most important science is done by measuring the relative abundances of isotopes in samples, and these are not affected (at least not much) by capture into aerogel.

Also, she talked about how some of the agencies that they gave samples to had lost or destroyed 2-3 samples while trying to analyze them. That one, in fact, had been statically charged, and stuck to the side of the microscope lens and they spent over an hour looking for it. Is that really our biggest danger? Giving out samples as a show of good faith, and not letting NASA example all samples collected?

These will be the first measurements, probably, that we’ll make on the interstellar dust There is always a risk of loss. Fortunately for the cometary samples there is quite a lot there, so it’s not a disaster. NASA has some analytical capabilities, particularly at JSC, but the vast majority of the analytical capability in the community is not at NASA but is at universities, government labs and other institutions all over the world. I should also point out that practically every analytical technique is destructive at some level. (There are a few exceptions, but not many.) The problem with meteorites is that except in a very few cases, we don’t know where they specifically came from. So having a sample that we know for sure is from the comet is golden!

I am currently working on my Bachelor’s in computer science, with a minor in astronomy. Do you see successes of programs like Stardust to open up more private space exploration positions for people such as myself. Even though I’m not in the typical “space” fields of education?

Can you elaborate on your question a little — I’m not sure that I understand…

Well, while at JSC I learned that they mostly want Engineers, and a few science grads, and I worry that my computer science degree with not be very valuable, as the NASA rep told me only 1% of the applicants for their work study program are CS majors. I’m just curious as to your thoughts on if CS majors will be more in demand now that projects like Stardust and the Mars missions have been great successes? Have you seen a trend towards more private businesses moving in that direction, especially with President Bush’s statement of Man on the Moon in 2015?

That’s a good question. I am personally not very optimistic about the direction that NASA is going. Despite recent successes, including but not limited to Stardust, science at NASA is being decimated.

I made a joke with some people at the TAS event that one day SpaceShipOne will be sent up to save stranded ISS astronauts. It makes me wonder what kind of private redundancy the US government is taking for future missions.

I guess one thing to be a little cautious about is that despite SpaceShipOne’s success, we haven’t had an orbital project that has been successful in that style of private enterprise It would be nice to see that happen. I know that there’s a lot of interest…!

Now I know the answer to this question… but a lot do not… When samples are found, How will they be analyzed? Who gets the credit for finding the samples?

The first person who identifies an interstellar dust particle will be acknowledged on the website (and probably will be much in demand for interviews from the media!), will have the privilege of naming the particle, and will be a co-author on any papers that WE (at UCB) publish on the analysis of the particle. Also, although we are precluded from paying for travel expenses, we will invite those who discover particles AND the top performers to our lab for a hands-on tour.

We have some fun things, including micromachines.

How many people/participants do you expect to have?

About 113,000 have preregistered on our website. Frankly, I don’t have a clue how many will actually volunteer and do a substantial amount of searching. We’ve never done this before, after all!

One last thing I want to say … well, two. First, we are going to special efforts not to do any searching ourselves before we go “live”. It would not be fair to all the volunteers for us to get a jumpstart on the search. All we are doing is looking at a few random views to make sure that the focus and illumination are good. (And we haven’t seen anything — no surprise at all!) Also, the attitude for this should be “Have Fun”. If you’re not having fun doing it, stop and do something else! A good maxim for life in general!

Retrieved from “https://en.wikinews.org/w/index.php?title=Keep_your_eyes_peeled_for_cosmic_debris:_Andrew_Westphal_about_Stardust@home&oldid=4608360”

UK drivers urged not to panic buy during delivery strikes

Friday, June 13, 2008

A Shell tanker truck Image: Nachoman-au.

British drivers have been urged not to panic buy fuel because of the 4-day walkout by delivery drivers working for companies delivering to Shell petrol stations. The 600 workers have walked out over pay disagreements, wanting an increase to their current pay of £36,500, however their union Unite turned down a last-minute offer of £41,500.

Hoyer UK, which employs tanker drivers for Shell, said, “We extended our offer to the very limits that our business could sustain.” However Unite said in a press release that, “this dispute could have been resolved if Shell had advanced a fraction of the billions of pounds in profit they make every month”, continuing to say, “one of the world’s richest companies is prepared to play Pontius Pilate and see the British public inconvenienced rather than settle this dispute for a sum smaller than the chairman’s pay increase last year”

Shell admitted that the walkout could leave some of its 1,000 forecourts without fuel, but the UK Petrol Industry Association, which represent oil refiners, said that forecourts would have around 4 days of supply, maintaining usual stocking levels. Shell also commented that the strike impact would be “significant”, as the company runs around 1 in 10 of all petrol stations in the UK.

Despite warnings, some filling stations found their supplies exhausted on Friday evening

British Business Secretary, John Hutton, said that “the strike, which will have a disproportionate effect on people in Britain, cannot be justified,” and urged both sides to resume negotiations in order to settle the dispute. “We have been working closely with industry to put in place detailed contingency plans to reduce as far as possible the disruption for the driving public,” he added. Unite’s press release also confirms that “provision has been made for fire, police and the emergency services.”

Tanker drivers on strike have set up picket lines at many of Shell’s UK refineries, including those in Stanlow, Avonmouth, Plymouth, Pembroke, Cardiff, Kingsbury, Basildon, Grangemouth, Aberdeen, Inverness, Jarrow and Luton Airport.

Retrieved from “https://en.wikinews.org/w/index.php?title=UK_drivers_urged_not_to_panic_buy_during_delivery_strikes&oldid=2541546”