Available on the essential Marvin Gaye: “Real Thing: In Performance 1964-1981” dvd
DOES IT HURT? Part 2: "Some other breed of man has won out."
Continuing from Does It Hurt?…
“I had the misfortune to be nourished by the dreams and visions of great Americans—the poets and seers. Some other breed of man has won out. This world which is in the making fills me with dread. I have seen it germinate; I can read it like a blue-print. It is not a world I want to live in. It is a world suited for monomaniacs obsessed with the idea of progress—a false progress, a progress which stinks. It is a world cluttered with useless objects which men and women, in order to be exploited and degraded, are taught to regard as useful. The dreamer whose dreams are non-utilitarian has no place in this world. Whatever does not lend itself to being bought and sold, whether in the realm of things, ideas, principles, dreams or hopes, is debarred. In this world the poet is anathema, the thinker a fool, the artist an escapist, the man of vision a criminal.”
Henry Miller, The Air-Conditioned Nightmare (1945)
(thank you, Molly F. and Mark F.)
DARK CLOUDS (FOR RENT)
from : http://spectregroup.wordpress.com/2010/04/15/dark-clouds-for-rent/

Available Now
http://networkworld.com/community/node/58829
“Who’s got the biggest cloud in the tech universe? Google? Amazon? Lots and lots of servers, but not even close. Their capacity pales to that of the biggest cloud on the planet, the network of computers controlled by the Conficker computer worm. Conficker controls 6.4 million computer systems in 230 countries at 230 top level domains globally, more than 18 million CPUs and 28 terabits per second of bandwidth. Like legitimate cloud vendors, Conficker is available for rent and is just about anywhere in the world a user would want their cloud to be based. Users can choose the amount of bandwidth they want, the kind of operating system they want to use and more. Customers have a variety of options for what services to put in the Conficker cloud, be it a denial-of-service attack, spam distribution or data exfiltration. Conficker is much more competitive than those legit vendors in many ways, Joffe continued. It has much more experience, dating back to 1998, has a larger footprint and unlimited new resources as it spreads malware far and wide to take over more computers. “And there are no costs. And there are no moral, ethical or legal constraints,” Joffe said, to chuckles from the audience. After all, the criminals stole their computing capacity from someone else.”
New Business Models
http://threatpost.com/en_us/blogs/future-botnets-031510
“This solution to the hacker’s problem provides a glimpse into a busines model we might see in the not-too-distant future. It’s an evolutionary version of the botnet-for-hire or malware-as-a-service model that’s taken off in recent years. In Hansen’s model, an attacker looking to infiltrate a specific network would not spend weeks throwing resources against machines in that network, looking for a weak spot and potentially raising the suspicion of the company’s security team. Instead, he would contact a botmaster and give him a laundry list of the machines or IP addresses he’s interested in compromising. If the botmaster already has his hooks into the network, the customer could then buy access directly into the network rather than spending his own time and resources trying to get in. Kind of an interesting/scary thought, but it could easily be used to avoid the cost and danger of individual exploitation against a company for a hacker interested in target attacks. Rather, a brokerage for commodities (bots that come from interesting IPs/domains) could be created and used to sell off the individual nodes. This model makes sense on a number of levels and may well have been implemented already.”
Zeus Found in Amazon Cloud
http://securityfocus.com/brief/1046
“The cybercriminals behind the Zeus botnet used Amazon’s Elastic Computing Cloud (EC2) to host the central server used to control a portion of the compromised machines. A number of security experts have predicted that cybercriminals will increasingly find uses for legitimate cloud services, such as Amazon EC2 and Google’s App Engine. This week, hacker Moxie Marlinspike kicked off a wireless password cracking service hosted in the cloud. The service, WPA Cracker, can compare the hash from a WiFi Protected Access network against 135 million possibilities in 40 minutes.”
Botnet Wars
http://computerworld.com/s/article/9154618/New_Russian_botnet_tries_to_kill_rival
“An upstart Trojan horse program has decided to take on its much-larger rival by stealing data and then removing the malicious program from infected computers. Security researchers say that the relatively unknown Spy Eye toolkit added this functionality just a few days ago in a bid to displace its larger rival, known as Zeus. The feature, called “Kill Zeus,” apparently removes the Zeus software from the victim’s PC, giving Spy Eye exclusive access to usernames and passwords. Turf wars are nothing new to cybercriminals. Two years ago a malicious program called Storm Worm began attacking servers controlled by a rival known as Srizbi. And a few years before that, the authors of the Netsky worm programmed their software to remove rival programs Bagle and MyDoom. Spy Eye sells for about $500 on the black market, about one-fifth the price of premium versions of Zeus.”

Meanwhile : Africa Gets Broadband
http://intellibriefs.blogspot.com/2009/10/africa-home-of-worlds-largest-cyber.html
“Africa is home to about 100 million PCs, 80% of which are estimated to be infected with some kind of malware. This has occurred because the intense poverty throughout the continent has resulted in a pervasive distribution of pirated software and the inability to pay for Anti-Virus protection. Currently, most Internet access is via dial-up, but once broadband comes to Africa, all of those infected PCs will become an easy target for bot herders looking to build the next mega-botnet. What could a bad operator do with a botnet of that size? Pretty much anything he wants, including paralyzing an entire nation’s networked infrastructure. That’s all systems connected to the Internet, including power, water, communications, commerce, etc. Since Microsoft Windows is the OS that we are talking about, it falls on Microsoft to do something about this problem. One good first step would be what Microsoft’s Paul Cooke discusses – support pirated versions of Windows 7 with patches.”
PROGRESSIVE EDUCATION with Thurston Moore and Bill Nace
“Avant Garde Preschool series. A great talk and improvisation, followed by a performance by the kids. Read my report here: http://bit.ly/9E02j5”
Herzog on venturing into Chauvet-Pont-d'Arc
Werner Herzog discusses his current 3-D film about the Cave of Chauvet-Pont-d’Arc. Filmed by Roger Ebert at the 2010 Conference on World Affairs in Boulder
A recommended book on this subject, by scholar David S. Whitley…
Another recommended book that’s still in print, by French archaeologist Jean Clottes…
And two more speculative books on the subject by scholar David Lewis-Williams that we’ve spotlighted here before…
THE WORLD'S FAIR POVERTY PAVILION by John Francis Putnam and Mort Gerberg
First page from this piece in The Realist, Issue No. 50, May 1964. Click to enlarge.
Two more pages, published as a centerfold…
Complete story at: The Realist Archive Project
DJ Awesome Tapes from Africa at Treehouse in Brooklyn, tonight!
Arthur pal Raspberry Jones hits us with this last minute update on tonight’s festivities in Brooklyn featuring the dude from Awesome Tapes from Africa, one of our daily must-listen audioblogs:
Hi friends!
Forgive the late notice, but…Treehouse returns tonight, with special guest Brian from the excellent Awesome Tapes From Africa blog. Like the name implies, Awesome Tapes features rare/obscure African music. We’re excited to have Mr. Africa on the Littlefield hi-fi this month, unearthing treasures from his pan-African bag of musical treasures and secrets. Raspberry Jones and Treeboy will likely branch out into the realm of global music as well for the evening.
So if you ain’t going to Coachella – or if you’ve packed already and want a freaky night out with friends and good tunes — we’d love to see you.
Looks like a beautiful night too. Note the later start time again (10pm).
And hey, Treehouse turns 1 this month!
Click the flyer up top, or find all the details after the jump!
A Poem from Dirk Michener

We Can Smell Invisible
by dirk michener
Sometimes people can smell ghosts – or god or a miracle happening
Moving around doing invisible business
Producing it’s own rankness between sulfur and plasma
Much like lightening- invisibility strikes
It’s a little funky
Like baking cookies and boiling down cabbage.
I came home one day and the apartment smelled like garbage
& I says, I says “what’s that awful smell?”
& Reed says “it’s my food. But it rhymes with garbage”
…later that night we made a special trip to the dumpster behind Einstein’s
to get a double bagged bundle of day old bagels
you see, they have to throw them away
otherwise they’d have to mark the price down
then everyone on the strip would stop buying fresh bagels
in lieu of saving a dollar
which is smart, on the parts of both parties
Invisibility is a chemical reaction
Like AIDS or bombs or Dr. Pepper or schizophrenia or spontaneous combustion
There’s a time and a place and person or a people
When all the factors are in order
The unseen mathematics begin rounding and rounding
Multiplying and dividing
The next thing you know you’re about to get laid
And you realize the pheromone spray is paying off
And the breath spray is doing its job
And the hairspray has remained wholly steadfast if only a little flaky
You take off your watch
You roll on your latex
And disappear
Your partner suddenly looks up
At no one
And you think
-why is she looking at me like that
why is she looking through me.
MESSAGE FROM RECORD STORE DAY 2010'S AMBASSADOR
Arthur Radio Transmission #13: CLOUDS IN THE HERMAPHRODITIC MIRROR
This week’s collage, including illustration of Alejandro Jodorowsky by Will Sweeney and photo of Ira Cohen by Gerard Malanga. Double-click for fullscreen + scroll.
Let’s take a silver train underground
to the back streets of Atlantis
thru the corrugated iron roots &
then to the peak itself, to the
saddle of the last ridge past strewn
boulders,
finally meandering thru cascading snow
wearing miner’s hats on the perpendicular
dark night &
going up to the edge of the Southern Cross
where we reach at last the pure white
glistening glaciers &
begin to chant over bones in rags
of Scorpio
Armless in the sticky substance how could
they ever have had a chance?
Permission will not be required
only poems of blood offered to
the memory of TREE
It is not ice which is eternal
but the fury of the absolute
separating the void from the spirit
of man,
uplifting like life when it is used
against itself,
that is, Radical Love — & again, we
are reduced to living beings
Caught by the instant
we are taken away
We live in the imprint of the flame
& we are helmeted within the internal
blackness
where the ray begins its passage
across the indignant sky
Vain clouds uncaring in a tangle of
crossbeams
culminate in the hermaphroditic mirror…
– Ira Cohen (taken from “Atlantis Express”)
Read more of Ira’s dome-shaking poetry here.

Stream: [audio:http://www.arthurmag.com/magpie/wp-content/uploads/2010/04/Arthur-Radio-Transmission-13-4-11-2010.mp3%5D
Download: Arthur Radio Transmission #13 4-11-2010
This week’s playlist…
Continue reading







