More here (at the link, scroll down for the whole thread, which contains additional photos and links to more).
B.t.w., per New Orleans locals, most of the pieces he did there have been painted over by graffiti police.
December 30, 2008
Banksy Hits the West Bank
December 29, 2008
Poor Must Hire a Lawyer to Get Lawful Benefits, While Billions to Bankers Vanish with No Accounting
By Jake T. Snake at Whiskey Fire:
I have had a ringside seat to the economic downturn this year. It is not an abstraction to me. The folks at the bottom are always the first to feel the pinch, when it comes. Clients of the agency I work at come through our doors every day requesting assistance with basic necessities like food, clothing, shelter and medications. As the year has progressed and New York State has chosen to repeatedly victimize its most vulnerable citizens, it has become more difficult to help people meet these needs. I have visited food banks with empty shelves, been told clients were ineligible for help when I knew they were and had to challenge these decisions. I have sat with clients while their applications for public assistance were reviewed by fraud investigators at social services. Our local social services department actually hired fraud investigators at the same time that it was laying off child protective workers demonstrating conclusively where our values lie and how genuinely mean spirited we are as a people. At the federal level Social Security routinely denies people eligible for benefits in the hopes that they will not reapply. Many people who receive benefits must hire a lawyer before social security will concede that they are indeed eligible. As the resources have become more limited, the level of scrutiny and inhumanity has risen accordingly.
I have, of course read about the rising unemployment numbers and the ensuing uptick in applicants for public assistance and food stamps nationwide like everyone else. It seems the chickens of Bill Clinton's (Best moderate Republican president ever) welfare reform are finally coming home to roost. We always knew that the flaw of his plan was an economy without jobs and here we are. The reform has no provision for an unemployment rate like we are experiencing now. Once again, our policy in practice serves to punish most harshly children and the elderly. Perhaps, it is time to repeal the child labor laws and begin allowing them to work 12 hour days again.
For nearly 30 years we have done our best to dismantle the safety net for the poor and struggling among us. I keep praying that we have reached the end of this folly. At 42, these policies are what I have known my entire work life. I dream about social service programs and rules that would treat people like human beings, rather than as an undesirable applicant to be culled out. I want so badly for us as a nation to stop punishing people for being poor, or elderly or a child of poor people. This holiday season was hellish as I watched scores of our clients navigate the realities of a holiday with nothing but further grinding poverty. Some days I am just weary from the strain of witnessing the suffering that goes on around me. It takes a toll that is more than physical, it eats away at the soul to see people ask for so little and receive far less.
As I contemplate how to pry a few dollars from these systems designed to humiliate and degrade my clients, already struggling with being social outcasts, chronic illness, drug addiction and mental illness I sigh audibly. I read of billion dollar bailouts and disappearing pallettes of cash as I ponder how to help a family with $400.00 so they will not be homeless in three days. I am so very tired.
December 28, 2008
Need an Audience, or Something?
You can get a whole crowd of cut-outs at Mr. Flat People, which points out that flat people
• Don't need to be fed(Thanks, Ben!) The site lists a bunch of movies in which the cut-outs have been used, including U2.
• Don't make noise
• Don't need breaks
• Don't ask for overtime
• Always do what you say
Reminded me of the Flat Daddy program. You can order your own Flat Daddy for $49.50, but he's only the top half of a man.

UPDATE: Ending the Internet as We've Known It
Sorry to keep pounding this but I can't believe how many people still don't get it.
Via Slashdot,
"Microsoft's vision of your computing future is on display in its just-published patent application for the Metered Pay-As-You-Go Computing Experience. The plan, as Microsoft explains it, involves charging students $1.15 an hour to do their homework, making an Office bundle available for $1/hour, and billing gamers $1.25 for each hour of fun. In addition to your PC, Microsoft also discloses plans to bring the chargeback scheme to your cellphone and automobile — GPS, satellite radio, backseat video entertainment system. 'Both users and suppliers benefit from this new business model,' concludes Microsoft, while conceding that 'the supplier can develop a revenue stream business that may actually have higher value than the one-time purchase model currently practiced.' But don't worry kids, that's only if you do more than 52 hours of homework a year!"This is an important step in the devolution I've outlined in previous posts that's transforming the internets as we've known them into something controlled centrally from the top down by mega-corps and gummints. I realize that that transformation could yield efficiencies in some areas, but I think they'll mainly benefit the controllers (them), not the controllees (us).
My main concerns relate to the power of those who own or control the more centralized system, which power will be enormously enhanced to do any or all of the following:
(1) To charge us whatever they like for their services, including but not limited to forcing us to pay for and use upgrades that we don't want or that are incompatible with older documents or software that we still want to use;As I said in my 6/3/07 post, "effective regulation or oversight over those in possession of that ownership and control [of the devolved system] would become impossible, since they would have the power with a few keystrokes to alter every digital record on the planet . . . ."
(2) To surveille us without any "probable cause" to suspect us of wrongdoing, in violation of the U.S. Constitution, esp. the Fourth Amendment; and
(3) To alter or delete any information or data, whether accidentally or intentionally, if they consider it a "threat" or simply inconsistent with their own interests.
The following is from my 10/3/07 post on the subject:
Free speech in general and the internet in particular seem to worry control freaks.(There's a "Search Blog" function at upper left on this page; you can enter "internet" or other terms to find additional, related posts.)
As of 2000, just five megacorporations – Time Warner, Disney, Murdoch's News Corporation, Bertelsmann of Germany, and Viacom (formerly CBS) – controlled over 90% of the media industry in the U.S., with General Electric's NBC a close sixth (see here, here, here, and here).
In 2003, despite the largest public outcry in FCC history, the FCC adopted rules loosening restrictions on media ownership (stories here, here, and here) . . . .
Certain people have spent a lot of money to gain all that control, and notwithstanding claims of hard times in the media biz, the investment has in fact proved profitable; but one of the main benefits that might have been hoped for – control over the agenda and messages reaching audiences of any significant size – is threatened by the 'net.
* * * * *
In an earlier post, I discussed conservatives' plans to replace the internet as we know it with something called the "Worldbeam" (a.k.a. the "Cloud"), a system in which, instead of storing all your personal docs, files, and software on your own computer at home, everything would be stored on larger computers elsewhere, and you would just have a box that would be little more than a gateway to the Beam.
Instead of buying your own copies of applications, the most basic might (or might not) be provided on the Beam for free, and you'd pay license fees for anything fancy, so vendors could force you to upgrade whenever they liked. Although access to your own data would theoretically be protected by a password or other security, the gummint or others who controlled the Beam could access, modify, or simply delete any or all of your or others' data much more easily than now.
The internet would have been transformed into a massive, top-down surveillance system while conferring virtually unlimited power on those who controlled it to re-write "reality." [As I said in my 6/3/07 post, "[w]ho controls the Beam will control history, and thus will have the power to botch if not completely control the present and future."]
I was worried, but thought it would be some years before the "Beam" replaced the 'net as we know it.
Duh. It's finally dawned on me, there's no need for those desiring Beam-like control to engineer any single, vast switch-over to a new system. They're simply colonizing the 'net little by little – and many of us are unwittingly helping them.
Think MySpace, Facebook, Flickr, MeetUp, LinkedIn, del.icio.us, Ancestry.com, and yes, Blogspot – you upload or create tons of data about yourself and your activities, opinions, social and other relationships, and personal preferences into online facilities that are maintained and controlled by other people. You may or may not even keep copies on your own computer of everything you put on the 'net. Think online banking and investment, every airplane ticket you've ever bought and hotel you've booked, every comment you've ever posted, and every purchase you've ever made esp. from vendors like amazon that keep track so as to make recommendations. Think on-line spam filter services (I realize AT&T is probably already giving the gummint copies of every e-mail that passes through AT&T's "pipes," in direct violation of our constitutional rights -- see here [and here, here, here, and here] -- but hey, we managed to shut that down, didn't we? Oops, guess not [link supplied].) . . .
* * * * *
At least now, of course, we CAN keep copies of our stuff on our own computers. My computer can of course be infected or hacked; but I can fight that in various ways that at least make it more difficult for my privacy etc. to be massively violated by the gummint, etc. Theoretically, I could even put stuff on a computer that has no wireless port and isn't otherwise connected to the 'net, so someone would have to have actual physical access to it in order to alter or delete it [and if you are an activist who opposes gummint policies, I recommend you do this].
As I look back at what I've posted before, the only thing that's changed is that the devolution is happening even more quickly than I imagined possible.
As I also said in my 6/3/07 post, "I happen to agree that all information is good information. But what needs to be spelled out in no uncertain terms is that because knowledge is power, a balance of power requires a balance of knowledge." Right now, the powerful know a lot more about us than we know about them; that needs to change.
December 27, 2008
Big Brother Suffers Further Pranks
This, via J-Walk Blog (original story in The Sentinel) is even better:
"[S]tudents from local high schools have been taking advantage of the county's Speed Camera Program in order to exact revenge on people who they believe have wronged them in the past, including other students and even teachers . . .Funny how much money and effort Big Brother devotes to keeping an eye on the little guys, while arguing it's futile to try to regulate Wall Street . . .
"Originating from Wootton High School, the parent said, students duplicate the license plates by printing plate numbers on glossy photo paper, using fonts from certain websites that "mimic" those on Maryland license plates. They tape the duplicate plate over the existing plate on the back of their car and purposefully speed through a speed camera, the parent said. The victim then receives a citation in the mail days later."
(Thanks, Ben!)
December 24, 2008
Santas Wrap Surveillance Cameras!
It would be even easier to paint the lenses. I think I'd go with black.
December 20, 2008
Great Read for Kids and Others: "Little Brother"
You can download it for free here (you can also buy it already printed; per amazon, it's 384 pp.). I'm really enjoying it; and it's gotten lots of awards.
The author, Cory Doctorow, is inviting everyone to download and modify the book any way they like, subject only to a Creative Commons Attribution-Noncommercial-Share Alike license.
More info from Doctorow:
Additional details here.Marcus, a.k.a "w1n5t0n,” is only seventeen years old, but he figures he already knows how the system works–and how to work the system. Smart, fast, and wise to the ways of the networked world, he has no trouble outwitting his high school’s intrusive but clumsy surveillance systems.
But his whole world changes when he and his friends find themselves caught in the aftermath of a major terrorist attack on San Francisco. In the wrong place at the wrong time, Marcus and his crew are apprehended by the Department of Homeland Security and whisked away . . . .
When the DHS finally releases them, Marcus discovers that his city has become a police state where every citizen is treated like a potential terrorist. He knows that no one will believe his story, which leaves him only one option: to take down the DHS himself.
* * * * *
This book is meant to be something you do, not just something you read. The technology in this book is either real or nearly real. You can build a lot of it. . . . [and y]ou can use the ideas . . . . to defeat censorship and get onto the free Internet, even if your government, employer or school doesn't want you to.
Making stuff: The folks at Instructables have put up some killer HOWTOs for building the technology in this book [, here]. [Also, t]he afterword for this book has lots of resources for increasing your online freedom, blocking the snoops and evading the censorware blocks. . . .
E.g., early in the book, Marcus shares his hack for connecting to his school's wireless internet without being tracked. Sure sounds like it might work:
I turned to my SchoolBook and hit the keyboard. The web-browser we used was supplied with the machine. It was a locked-down spyware version of Internet Explorer, Microsoft's crashware turd that no one under the age of 40 used voluntarily.You can order Little Brother in hardcover here; no paperback available yet.
I had a copy of Firefox on the USB drive built into my watch, but that wasn't enough -- the SchoolBook ran Windows Vista4Schools, an antique operating system designed to give school administrators the illusion that they controlled the programs their students could run.
But Vista4Schools is its own worst enemy. There are a lot of programs that Vista4Schools doesn't want you to be able to shut down -- keyloggers, censorware -- and these programs run in a special mode that makes them invisible to the system. You can't quit them because you can't even see they're there.
Any program whose name starts with $SYS$ is invisible to the operating system. it doesn't show up on listings of the hard drive, nor in the process monitor. So my copy of Firefox was called $SYS$Firefox -- and as I launched it, it became invisible to Windows, and so invisible to the network's snoopware.
Now I had an indie browser running, I needed an indie network connection. The school's network logged every click in and out of the system, which was bad news if you were planning on surfing over to the Harajuku Fun Madness site for some extra-curricular fun.
The answer is something ingenious called TOR -- The Onion Router. An onion router is an Internet site that takes requests for web-pages and passes them onto other onion routers, and on to other onion routers, until one of them finally decides to fetch the page and pass it back through the layers of the onion until it reaches you. The traffic to the onion-routers is encrypted, which means that the school can't see what you're asking for, and the layers of the onion don't know who they're working for. There are millions of nodes -- the program was set up by the US Office of Naval Research to help their people get around the censorware in countries like Syria and China, which means that it's perfectly designed for operating in the confines of an average American high school.
TOR works because the school has a finite blacklist of naughty addresses we aren't allowed to visit, and the addresses of the nodes change all the time -- no way could the school keep track of them all. Firefox and TOR together made me into the invisible man, impervious to Board of Ed snooping, free to check out the Harajuku FM site and see what was up.
(Thanks, Ben!)