Josh Harkinson

Reporter

Born in Texas and based in San Francisco, Josh covers the economy, corporations, and a wide range of political issues in California and the West.

Get my RSS |

Too Much Night Light Makes Us Fat, Cranky—and No Safer

| Mon Feb. 25, 2013 5:15 AM PST
National Park Service

Sometimes a bright idea can be too bright. Today's gas stations and parking lots are often ten times brighter than they were 20 years ago. The ubiquitous glare confuses wildlife, degrades our mental health, and occludes our view of the universe—all because we think that it makes us safer. But does it? Not necessarily, as Paul Bogard, the author of "End of Night: "Searching for Natural Darkness in an Age of Artificial Light," points out:

In 2008, PG&E Corp., the San Francisco-based energy company, reviewed the research and found "either that there is no link between lighting and crime, or that any link is too subtle and complex to have been evident in the data."

The data actually speaks more clearly about how light pollution makes us less safe. A recent American Medical Association report (pdf) concludes that the disrupting effects of nighttime lighting on our bodies' circadian rhythms may contribute to "obesity, diabetes, depression and mood disorders, and reproductive problems." Moreover, artificial light causes our bodies to suppress the release of melatonin, elevating our risk of contracting cancer, and especially breast cancer.

Eight in ten kids born in the US today will never see the Milky Way, according to Bogard. Of course, we have it easy at night compared to songbirds, sea turtles, and countless other creatures whose mating and eating habits have been thrown off by our glare.

None of which is to say we ought to start driving without headlights or getting around Manhattan with flashlights. But why not take a cue from the City of Lights? Starting in July in Paris and other parts of France, window lighting and lights on building facades will be turned off after 1 a.m., saving the annual equivalent of 750,000 households worth of energy. Now there's a truly bright idea.

Advertise on MotherJones.com

California Bill Could Outlaw Driving for up to a Week After Smoking Pot

| Thu Feb. 21, 2013 5:57 AM PST

If you smoke marijuana in California, there's a chance you may have to wait a week or more before you can drive legally. A bill introduced last week by state Senator Lou Correa, a Democrat from Anaheim, would make it illegal to get behind the wheel if your blood contains "any detectable amount" of cannabis—a drug which, unlike alcohol, can persist in the blood of its users for a week or more after the psychoactive effects have worn off.

"This bill would effectively outlaw EVERY driver who has within recent hours or days used marijuana," California NORML director Dale Gieringer told the East Bay Express.

Meet the 3 Chinese Hackers Pwned by Mandiant

| Tue Feb. 19, 2013 3:41 PM PST
Retired PLA rear admiral Zhang Zhaozong, who inspired UglyGorilla.

In case you missed it, the cybersecurity firm Mandiant just released a bombshell report (pdf) on how nearly 150 sophisticated hacking attempts against American corporations and government agencies over the past decade almost certainly originated from a single Shanghai office building controlled by People's Liberation Army (PLA). The hacking group, dubbed APT1 in the report, launches its attacks from roughly the same address in the city's Pudong New Area as the one used by the PLA's Unit 61398, a probable cyberwar division. But the excellent New York Times exclusive on Mandiant's findings omits some colorful details about the hackers themselves. One of them, for instance, is apparently a Harry Potter fan. Here are profiles of the three Chinese hackers Mandiant outed in its report.

Jack Wang, a.k.a. Wang Dong, a.k.a. UglyGorilla

A profile photo used by UglyGorilla

Back in 2004, the cyberwarfare expert Zhang Zhaozhong was participating in an online Q&A hosted by the website China Military Online. A retired PLA rear admiral, professor at China's National Defense University, and strong advocate of the "informationization" of military units, Zhang had written several works on military tech strategy, including "Network Warfare" and "Winning the Information War." One question for Zhang came from a site user with the handle "Greenfield," who brought up the United States' cyberwar capabilities. "Does China have a similar force?" he asked. "Does China have cyber troops?"

Greenfield would soon become one of those troops, according to Mandiant. When he registered for the China Military site, he gave his real name as "Jack Wang" and the email address uglygorilla@163.com—details that would later be associated with the hacker known as UglyGorilla. That October, UglyGorilla registered the hacker zone HugeSoft.org, a name that, as Bloomberg has reported, "combines two common descriptors of a gorilla, along with sub-domains like 'tree' and 'man.'"

In 2007, UglyGorilla authored the first known sample of a widely used family of Chinese malware and brazenly left his signature in the code: "v1.0 No Doubt to Hack You, Writed by UglyGorilla, 06/29/2007."

DOTA, a.k.a. Rodney, a.k.a. Raith

DOTA may have taken his or her name from the video game "Defense of the Ancients," commonly abbreviated DotA. The name shows up in dozens of email accounts that DOTA created for social engineering and phishing attacks, according to Mandiant. It appears Mandiant was able to hack some of these accounts, allowing them to get DOTA's phone number (a mobile phone in Shanghai) and the username of DOTA's (blank) US-based Facebook account, where DOTA registered as female. Mandiant published a screen-grab of one of DOTA's Gmail accounts:

DOTA appears to speak fluent English and may be a fan of American and British pop culture. The answers to security questions associated with his or her internet accounts—such as, "Who is your favorite teacher?" or "Who is your best childhood friend?"—are often some variation of "Harry" and "Poter."

Mandiant linked some of DOTA's other passwords to a pattern that seems to be associated with Unit 61398, the PLA's cyberwar division.

Mei Qiang, a.k.a. SuperHard

Similar to UglyGorilla, Mei Qiang signs much of his work by embedding his name into the code. His malware is often signed "SuperHard" and his Microsoft hacking tools are altered from "Microsoft corp." to "superhard corp."

SuperHard primarily works on tools used by other Chinese hackers; he's probably employed in APT1's research and development arm, according to Mandiant. He has also volunteered to write Trojan software for money. Mandiant researchers gained access to some of the hacker's internet accounts. They believe he (or she; it's hard to know) used the email address mei_quiang_82@sohu.com, which, based on Chinese habit, suggests that the user is named Mei Quiang and born in 1982. They also traced SuperHard to Shanghai's Pudong New Area—information that should give US security experts plenty of leads, assuming the hacker hasn't been fired yet.

 

Can Police Be Trusted With Drones?

| Tue Feb. 19, 2013 4:02 AM PST
The Aeryon Scout unmanned drone.

Alameda County Sheriff Gregory Ahern wants to buy a surveillance drone, or, as he prefers to call it, a "small Unmanned Aerial System." At a meeting before the county's Board of Supervisors last week, he claimed that he'd only use the drone for felony cases, not to spy on people or monitor political activists. But a few minutes later he'd seemed to change his mind, adding: "I don't want to lock myself into just felonies."

Catcalls and hisses erupted from a crowd of some 100 anti-drone activists. One man later called the proposal "an assault on my community."

Around the country, a small but growing number of localities are considering the use of domestic drones—aircraft that are smaller, lighter, and cheaper (though not much less controversial) than what the military uses in Afghanistan. Police departments could outfit drones with infrared sensors that see through walls, with facial recognition software, or with technology that intercepts calls and emails. Yet the the federal government doesn't do much to regulate how drones can use such technologies to collect information on private citizens.

Thu Sep. 1, 2011 3:46 PM PDT
Wed Aug. 17, 2011 3:05 AM PDT
Fri Jul. 29, 2011 9:53 AM PDT
Fri Jul. 29, 2011 5:21 AM PDT
Wed Jul. 27, 2011 8:50 AM PDT
Tue Jul. 26, 2011 11:31 AM PDT
Mon Jul. 25, 2011 11:25 AM PDT
Tue Jun. 28, 2011 8:04 AM PDT
Mon Jun. 20, 2011 1:42 PM PDT
Mon Jun. 20, 2011 3:00 AM PDT
Fri May. 27, 2011 9:42 AM PDT
Thu May. 19, 2011 11:39 AM PDT
Wed May. 18, 2011 5:30 PM PDT
Wed May. 18, 2011 3:00 AM PDT
Tue May. 17, 2011 1:58 PM PDT
Mon May. 16, 2011 12:30 PM PDT
Thu May. 12, 2011 4:02 PM PDT
Thu May. 12, 2011 11:31 AM PDT
Wed May. 11, 2011 4:08 AM PDT
Wed Apr. 27, 2011 3:09 AM PDT
Wed Apr. 20, 2011 4:20 AM PDT
Mon Apr. 18, 2011 3:06 AM PDT
Mon Apr. 11, 2011 11:36 AM PDT
Fri Apr. 8, 2011 3:14 AM PDT
Tue Apr. 5, 2011 3:00 PM PDT
Mon Apr. 4, 2011 3:17 AM PDT
Thu Mar. 31, 2011 3:35 AM PDT
Fri Mar. 25, 2011 10:10 AM PDT
Tue Mar. 22, 2011 5:57 PM PDT
Sat Mar. 19, 2011 3:03 AM PDT
Tue Mar. 15, 2011 3:46 AM PDT
Fri Mar. 4, 2011 12:09 PM PST
Tue Mar. 1, 2011 4:00 AM PST
Fri Feb. 11, 2011 7:01 PM PST
Thu Feb. 10, 2011 5:31 AM PST
Wed Feb. 9, 2011 11:17 AM PST