Nabisco’s X-Rated Toy Scandal of 1971

No one at Nabisco’s corporate headquarters in New York City had any idea why members of the National Organization for Women were lined upoutside. It was the fall of 1971, and the manufacturer best known for their Oreo and Chips Ahoy! snacks had not made any obviously sexist advertisements or taken any particular political stance. They sold cookies.

Then they read the signs: “Sick toys for children make for a sick society.”

That May, Nabisco had attempted to diversify by purchasing Aurora Company, the West Hempstead, New York model kit maker best known for their plastic kits of Frankenstein’s monster, the Wolf Man, and other horror film icons. The cheap plastic toys came in pieces and could be glued together and painted.

Unknown to Nabisco, Aurora had recently branched out and begun offering entire model kit dioramas. Instead of a single figure, consumers could buy detailed “sets” for their monsters to interact with. There was a guillotine, a razor-sharp pendulum, and a laboratory; a female protagonist, referred to in the copy as “the Victim,” was scantily-clad and ready to be dismembered, beheaded, or trapped in a spiked cage. Kids could also opt to have Vampirella, the top-heavy villain licensed from Warren Publishing, operate the winch and pulley while her plastic captive was shackled to a table.

Each kit also contained a comic, which instructed builders on how to assemble the torture scenes for maximum enjoyment. A narrator named Dr. Deadly seemed to opine on the appeal of the Victim once she was fully assembled. “Now that you’ve gotten her all together, I think I like the other way. In pieces … yesssss.”

In addition to Fig Newtons, Nabisco realized it had also been peddling tiny torture racks.

LINK: http://mentalfloss.com/article/84257/nabiscos-x-rated-toy-scandal-1971

ANCIENT TREE WITH RECORD OF EARTH’S MAGNETIC FIELD REVERSAL IN ITS RINGS DISCOVERED

The kauri tree unearthed during the expansion of the Ngāwhā Generation geothermal power plant. NELSON PARKER

Earth’s magnetic field is thought to be generated by the iron in the planet’s core. As it moves around, it produces electric currents that extend far into space. The magnetic field acts as a barrier, protecting Earth from the solar wind. This is a stream of charged particles from the Sun that could strip away the ozone layer if it were to impact the atmosphere.

When the magnetic field reverses—or attempts to—it gets weaker, leading to more radiation from the Sun getting through. Previously, scientists have linked extinction events to magnetic field reversals.

LINK: https://www.newsweek.com/ancient-tree-discovered-earths-magnetic-field-1447570

William S. Burroughs lecture,July 20,1976,on paranormal,EVP,text+tape cut-ups,prognostication

This audio recording complements another Burroughs one uploaded to YT earlier (see: “William S. Burroughs lecture,writing class,June 25,1986,on paranormal,synchronicity,dreams” ): http://youtu.be/d-2a0Rti6-Y I’ve also uploaded an entertaining short (9 min.) reading by Burroughs entitled: “The Cat Inside – William S. Burroughs,alternate early draft excerpts,1985 reading”: http://youtu.be/7IppLHP7pvI In this recording Burroughs covers the cut-up method of writing in some detail, & reads from his own cut-up writings, as well as some by Burroughs’ sometime collaborator Brion Gysin. Burroughs describes how some cut-ups appear to be uncanny prognosticators, accurately predicting future events, according to Burroughs. He also describes experiments with audio cut-ups using tape recorders. He had intended to play recordings of some of Gysin’s tape experiments at this lecture, but the tapes had not arrived on time. Instead, Burroughs describes some of the cut-up tape experiments. And he covers other tape experiments that interest him conducted by paranormal investigators & what today is commonly known as EVP (electronic voice phenomena), where tape recorders are supposed to record unexplained mysterious human voices though no such sound input is available to the recorder. Burroughs refers to these as “Paranormal Voices” experiments/phenomena. Burroughs also makes reference to dreams, the last words of Dutch Schultz, Shakespeare, computers, Homer, Gertrude Stein, James Joyce, T.S. Eliot, & Carl Jung. There’s a long Q & A session with students at the end.

Book by suspect in murder of Utah university student Mackenzie Lueck removed from Amazon

Ayoola Ajayi, 31, is charged with aggravated murder, aggravated kidnapping, obstruction of justice and desecration of body.

A book about a teenage boy who witnesses the murder of two people who were burned to death was removed from Amazon’s website in the wake of the author’s being arrested and charged with the murder of Utah college student Mackenzie Lueck.

web page for the book, “Forge Identity,” written by murder suspect Ayoola Ajayi, now displays an error message reading: “SORRY we couldn’t find that page.”

The fictional work tells the story of 15-year-old Ezekiel who witnesses the murders of his neighbor and a “loved one” and then must “decide if he will join the ranks of a criminal mastermind, or fight to escape tyranny that has surrounded his young life,” the book’s description on Goodreads.com states.

LINK: https://www.nbcnews.com/news/us-news/book-suspect-murder-utah-university-student-mackenzie-lueck-removed-amazon-n1025641

Everything you need to know about the explosive new Manson murders exposé Chaos

(Editor’s note: If you find any of these ideas compelling, we recommend  The Manson File: Myth and Reality of an Outlaw Shaman by Nikolas Schreck instead)

Back in November, I attended a dinner sponsored by the publisher Little, Brown and Company that had all the trappings of a traditional book industry event: highly enthusiastic booksellers, a seemingly unending flow of white wine, and a venue that, if I’m being honest, I would never find myself in if it weren’t for the book dinner. Little, Brown’s editors and authors presented their slate for the coming year: a debut about 1920s Paris, a raucous family drama, and one vastly reported nonfiction exposé that caught us all by surprise.

LINK: https://ew.com/movies/2019/06/16/chaos-manson-murders-expose-tom-oneill/

8 Tips for Interviewing a Serial Killer, According to Famed FBI Profiler John Douglas

Over the course of his career, former FBI agent and behavioral analyst John E. Douglas has interviewed criminals ranging from repeated hijacker Garrett Trapnell and cult leader Charles Manson to serial killers Edmund Kemper (a.k.a. the Co-Ed Killer) and Dennis Rader (a.k.a. B.T.K.). In his new book, The Killer Across the Table, Douglas takes readers into the room as he interviews four very different offenders.

LINK: http://mentalfloss.com/article/585986/how-to-interview-serial-killer-expert-tips-john-douglas

Podcast: Crime Reporters On The Growing Popularity Of The True Crime Genre

Reporters Megan Cloherty and Jack Moore covered the trial of the D.C. Mansion Murders in 2015, when a D.C. power couple, their 10-year-old son and housekeeper were held hostage for 22 hours and murdered inside their burning house. They are the creators of the new podcast, “22 Hours: An American Nightmare.”

LINK: https://thefederalist.com/2019/06/17/podcast-crime-reporters-on-the-growing-popularity-of-the-true-crime-genre/

 

Deviant Security: The Technical Computer Security Practices of Cyber Criminals.

Abstract

The dominant academic and practitioners’ perspective on security evolves around law-abiding referent objects of security who are under attack by law-breaking threat agents. This study turns the current perspective around and presents a new security paradigm. Suspects of crime have threat agents as well, and are therefore in need of security. The study takes cyber criminals as referent objects of security, and researches their technical computer security practices. While their protective practices are not necessarily deemed criminal by law, security policies and mechanisms of cyber criminals frequently deviate from prescribed bonafide cyber security standards. As such, this study is the first to present a full picture on these deviant security practices, based on unique access to public and confidential secondary data related to some of the world’s most serious and organized cyber criminals. Besides describing the protection of crime and the criminal, the observed practices are explained by the economics of deviant security: a combination of technical computer security principles and microeconomic theory. The new security paradigm lets us realize that cyber criminals have many countermeasures at their disposal in the preparation, pre-activity, activity and post-activity phases of their modi operandi. Their controls are not only driven by technical innovations, but also by cultural, economical, legal and political dimensions on a micro, meso and macro level. Deviant security is very much democratized, and indeed one of the prime causes of today’s efficiency and effectiveness crisis in police investigations. Yet every modus operandi comes with all kinds of minor, major and even unavoidable weaknesses, and therefore suggestions are made how police investigations can exploit these vulnerabilities and promote human security as a public good for all citizens. Ultimately, the findings of this socio-technical-legal project prove that deviant security is an academic field of study on its own with continually evolving research opportunities.

https://research-information.bristol.ac.uk/files/194364696/DEVIANT_SECURITY_EHAVANDESANDT.pdf