The 7 Best Headphones for Gamers

0 comments

1. Astro A50

1.%2520astro%2520a50
If money is no object, the Astro A50 is about the best pair you can get. For a $300 price tag, you'll get a wireless headset with some of the best sound quality in gaming headphones. The set usually rates high for comfort, despite being a little heavier than most similarly sized models. It has great features for volume control and a mixer on the right earplate.
Image: Astro Gaming

2. Skullcandy PLYR 2

2.%2520skullcandy%2520plyr%25202
This brand has been turning out quality headphones for years. One of its wireless sets, the Skullcandy PLYR 2 has three different audio profiles to match different types of games. The lightweight model is especially good for comfort. It's also an inexpensive choice, running about $130 for a pair.
Image: Skullcandy

3. Logitech G230

3.%2520logitech%2520g230
If you're looking for your first pair of PC gaming headphones, or you just want to stay on a budget, then the Logitech G230 is a good entry point. It has fewer snazzy features than the more expensive models, and the microphone setup may not be ideal for serious voice chatters. But at $59, it's one of the best bargains in terms of cost for sound quality and comfort.
Image: Logitech

4. Razer Kraken Pro

4.%2520razen%2520kraken%2520pro
Razer makes many accessories for gamers and has expanded into a few choices for headphones. The Razer Kraken Pro is one of the strongest options available from the brand. It has powerful sound quality and range for such an inexpensive set, as well as a built-in microphone. A set costs $70 to $80.
Image: Razer

5. Razer Hammerhead Pro

5.%2520razer%2520hammerhead%2520pro
This option from Razer has the distinct benefit of portability. Razer Hammerhead Pro is a good choice if you might be gaming at a friend's house or if you want a set to perform double-duty as transit headphones. The in-ear headphones have great sound quality, with serious bass for such small buds.
Image: Razer

6. Sound Blaster Recon3D Omega Wireless

6.%2520sound%2520blaster
This is a headset for controlling your audio experience. With options to create and save sound profiles for different games, and a multiplayer-focused Scout Mode, the Sound Blaster Recon3D Omega Wireless is a solid choice for people who want serious audio across multiple gaming platforms. They're not a cheap investment considering the almost $200 list price, but nevertheless, a solid all-around choice.

7. Corsair Vengeance 1500

7.%2520vengeance%2520corsair%25201500
This model uses a USB wire, so it's a PC-only option. For that subset of gamers, the Corsair Vengeance 1500 is an excellent choice, using a built-in sound processor and large 50 mm drivers to deliver top audio quality. It's reasonably priced at about $100.

Google: We're Winning Against Phishing and Spam Emails

0 comments

Google can't say "mission accomplished" just yet, but the search giant made it clear that the Internet is winning its decade-old war against phishing and spam emails.

In a blog post published Friday, Google said the Internet-wide efforts against unauthenticated emails, which can be used by spammers and phishers to fake email addresses and deceive users, are working. In fact, the vast majority of non-spam email that Gmail users receive is authenticated with standards designed to fight phishing.

"91.4% of non-spam emails sent to Gmail users come from authenticated senders, which helps Gmail filter billions of impersonating email messages a year from entering our users’ inboxes," Google security researchers Elie Bursztein and Vijay Eranti said in the post.

Since 2004, Internet industry groups and authorities have been pushing for authentication standards, called DomainKey Identified Email and Sender Policy Framework, to be widely enforced. Google said that as much as 74.7% of incoming email on Gmail use both DKIM and SPF, while 14.4% use SPF only and 2.25% use DKIM only. That leaves just 8.6% of emails as non-authenticated.

But the war isn't over yet. As Google points out in the post, phishers can still target unprotected domains, and even protected ones, if they use weak encryption. That's why Bursztein and and Eranti suggested using at least 1024 bit keys, as "the use of weak cryptographic keys — ones that are 512 bits or less — is one of the major sources of DKIM configuration errors (21%)."

How to Get a Time Traveler to Visit You

0 comments
If you often find yourself waiting with bated breath for a time traveler to appear in your midst, and give you the secret to the time-space continuum, we've got just the thing for you: a Craigslist ad.

Because all time travelers must be seeking out friends somewhere, right?

This Doghouse Diaries comic describes the best way to address time travelers so you don't spook them. And remember, you really have to emphasize your ability to keep secrets.

The World's Largest Vessel Is Bigger Than the Empire State Building

0 comments
The world's largest vessel just set sail off the coast of South Korea.
The Prelude is 1,601 feet long — that's 150 feet longer than the Empire State Building is tall. Owned by Shell, the vessel's massive size has earned it the title of largest object currently afloat.
The bright red vessel weighs 600,000 tons and is 243 feet wide, according to Wired.

Construction of the Prelude, which has three engines that pack 20,100 horsepower, took a full year to complete.

So how does Shell plan to use the mammoth vessel? It will be a floating liquefied natural gas facility, where natural gas will be harvested from the depths of the ocean, processed on board and transferred to transport ships waiting in the sea. Wired reported that the Prelude will produce 3.9 million tons each year.

The floating facility will take some of the strain of gas production off the environment, Shell said in a release. "It also avoids the potential environmental impact of constructing and operating a plant on land, including laying pipelines to shore and building other infrastructure."

Since the Prelude is so large, it will require a system of pulleys and levers to haul it across the sea. So while it is entirely mobile, the vessel will remain stationary for large blocks of time. Its first destination, for example, is off the coast of Western Australia, where it will anchor for 25 years.

Responsible for 175 Olympic-sized swimming pools' worth of natural gas at any time, it isn't hard to understand why the vessel has put safety systems in place to combat weather troubles. A turret the height of the Statue of Liberty has been constructed to run through the Prelude, ensuring stability even during a Category 5 hurricane, as the mooring system gently absorbs the force of winds.

While the Prelude will begin its trek to Australia in 2017, Shell is already working on the designs of an even bigger vessel, according to Reuters.

Starbucks Brings Back $450 Laser-Etched Gift Cards

0 comments

What do you get the coffee drinker who has everything? Consider Starbucks‘ version of the “Black Card”— a limited-edition, $450, fancy looking gift card, ideal for that special someone who can’t bear paying with something as pedestrian as cash, credit or even an app. For the second holiday season in a row, the coffee chain is offering its over-the-top metal gift cards, which go on sale at Gilt.com starting Friday at noon.

Before you spit out your latte, consider that this may not be as ridiculous as it sounds. Superfluous, yes, but the gift/reward cards come with $400 in Starbucks credit (enough for 200 coffees!) and offer the highest-level rewards membership. The company claims that the $50 difference doesn’t even cover the cost to produce each card, “so there really is a strong value to the customer,” spokeswoman Linda Mills said in an email. She went on: “It’s completely handmade and features an artisan rose metal base with rose-colored coating. Starbucks lettering is laser-etched on the front, and since it’s in such a small quantity, we do incur quite a bit of expense to produce them.”

Recent history suggests the chain is on to something. Last year, Starbucks offered 5,000 cards in a stainless steel color, and USA Today reports they sold out in about six minutes. Recap: That’s $2.25 million worth of gift cards in 360 seconds. (Now you can spit out your latte.) This year, only 1,000 of the cards will be sold — for a total of $450,000 — because Starbucks wants it to be “a very premium, exclusive offering.” Well, it sure beats a fruitcake.

Bitcoin: It's not just loopy tulip land, it's worse

0 comments
Congratulations, libertarians, your clever little digital currency based on nothing but arithmetic, arrogance and faux-revolutionary Kool-Aid has been smeared in US Senate-love and slid all the way up to the US$1200 mark. Bitcoin is being taken seriously in serious quarters, it seems. Well done. So now it's time to build some structure and regulation around it.

Cue the sound of a million crypto-currency fans screeching a thousand well-parrotted slogans that "explain" why every other monetary system will soon collapse and nations-states will crumble — and why anyone who disagrees is just an ignorant slave to outmoded economic thinking.

Actually, the "why" is never explained, it's just asserted.
Back in April I discussed how Bitcoin is more ideology than trustworthy currency, noting such fun facts as Bitcoin's value seeming to track the number of people searching for it on Google, and that even boosters like Pirate Party founder Rickard Falkvinge consider it "still far from ready for prime time".

The comments in reply were a fascinating jumble of ideas, admittedly not all of which were completely loopy. But you'll get a much better idea of the effervescent assertions emanating from the Bitcoin wonderland by following the Twitter account @bitcoin_txt, which picks out the highlights.

These recent examples illustrate the image problems Bitcoin needs to overcome before ordinary non-geek folk can start taking it seriously.

Bitcoin as magic: "BitCoin will end ALL Hunger & Poverty (at last) through humanities caring and sharing, by instantaneously providing funds to those in need" and "BitCoin heralds the end of the misuse of money and other ponzi schemes including, pensions, copyright, patents, insurance, etc."

Bitcoin is for real men: "The Rise of Bitcoin: Why I for one welcome our new Neckbeard Overlords and how it will lead to Game-Over for Feminism" and "You cannot suppress the free currency. Go back to your clan of ugly, hairy, women" and "Feminism will suffer if crypto currencies take off simply because of reduced tax receipts; no more feminist suckling at the State teat." and "Not only are men going their own way, but they're starting their own currency and economy separate from the feminist system."

Bitcoin as infinite money: "Sigh. Bitcoins are worth at least 126k dollars each." and "a lot of assumptions are made, but i think eventually the bit coin might be worth 1 million or even more."

Bitcoin as alternate history: "THIS IS HUGE! The stuff we are working with is what scared Bill Gates into retirement!"
OK, it's easy to ridicule an idea by focusing on its loopiest supporters. But if Bitcoin wants to be a serious contender for an everyday digital currency, it doesn't need any more of this over-the-top rhetoric, it needs stability and trustworthiness — and while its monetary value may have been soaring on the back of rampant speculation these last few months, those two key attributes haven't exactly been keeping pace.

Bitcoin's wild price swings represent a risk factor that should prevent any sane business from entering into contracts based on the currency. But even if that risk can be hedged against, there's the core issue of trust — not trust in the integrity of Bitcoin's seemingly robust cryptographic protocols, although researchers have warned of fundamental flaws, but trust in Bitcoin's financial community.

When young Australian TradeFortress had a million dollars worth of Bitcoin stolen last month, he didn't report it to the police. "The police don't have access to any more information than any user does when it comes to Bitcoin," he told ABC Radio, seemingly oblivious to all the news stories about law enforcement's access to network data and his own responsibilities as a good-faith custodian of other people's money — although perhaps he was also worried about what the police might think of some of his other online activities.
When some $100 million worth of Bitcoin was stolen from the Sheep Marketplace a few weeks later, we see a few lone hackers trying to track the bandits, but once more no professional law enforcement activity — but given that Sheep Marketplace was a successor to Silk Road, we can guess why.

People accept the risks inherent in handling physical cash because they can mitigate against them with appropriate security procedures. There are specialists to help them, and when cash does get stolen the police are generally brought in to help.

But with Bitcoin, at least so far, the balance seems all wrong. The computing power devoted to transaction-verification and mining is now 256 times the power of the world's top 500 supercomputers combined — does that strike you as efficient? — but rather less effort seems to go into building a trustworthy community.
Meanwhile the speculative Bitcoin bubble continues to inflate. Hard-core Bitcoiners are presumably getting sick of it being compared with the tulip mania of 1637, but the parallels are obvious, what with the constant hype about the ever-soaring value of some random commodity — because Bitcoin is generally being treated as a commodity rather than a currency.

But personally, I'm with former president of the Dutch Central Bank, Nout Wellink, on this one. "This is worse than the tulip mania," he told students this week. "At least then you got a tulip."

China bars banks from bitcoin transactions

0 comments

China's government banned financial institutions from trading in bitcoin on Thursday, in what analysts said was a restrained first step towards regulating the digital currency that has exploded in popularity in China and soared in value in recent months.

A statement by the central bank and four other agencies said that, while the computer-generated currency does not yet pose a threat to China's financial system, it carries risks. It did not, however, curtail the use of bitcoin by individuals.

"I think it's measured and it's positive," said Zennon Kapron, of the financial consultancy Kapronasia. "It does add legitimacy to the idea that it could be a nationwide accepted currency."

The value of bitcoins on Chinese exchanges fell after the announcement, however, with one expert predicting the price could halve in the short-term. Digital currencies are generally highly volatile.

Bitcoins have seen their value relative to the dollar skyrocket some 800 percent in the past two months as speculators have piled into the currency, according to bitcoinity.org.

While there is no official data available, bitcoin market operators say Chinese nationals are major participants in the market and hold an outsized share of the total number of bitcoins in circulation. Shanghai-based BTC China has recently become the world's largest bitcoin exchange by volume.

A statement on the website of the People's Bank of China (PBOC) said that the government would act to prevent money laundering risks from bitcoin, which is not backed by a government or central bank.

The PBOC may have cause to be concerned about bitcoins, which are anonymous, untraceable, and can be carried on memory sticks or transmitted electronically, because they represent a potential hole in the country's capital controls.

However, analysts point out that, given the tiny value of the total bitcoins in circulation relative to other currencies, it is unlikely to have much impact on the wider economy.

EYES ON BITCOIN

More cause for worry is the way these digital currencies have engendered a new wave of creative criminality focused on hacking online platforms and stealing bitcoins stored there, and their potential for use in money laundering, bribery and purchases of illicit products such as drugs and weapons.

The government will require trading platforms that deal in virtual currencies such as bitcoin to register with telecommunications authorities, it said.

The notice was issued jointly by the PBOC, the Ministry of Industry and Information Technology, the China Banking Regulatory Commission and the China Securities Regulatory Commission and China Insurance Regulatory Commission.

"This is an industry that will need to be governed or regulated. The safety and the well-being of the common user has to be taken into consideration. All this is expected," said Ron Cao, Managine Director at Lightspeet
Venture Partners, which recently invested $5 million in BTC China.
"'We've got a long way to go. This thing needs to be regulated at some point. We're studying it. Don't jump into it.' My read is that's the tone of the message."

Bitcoin traders sold on the Chinese government's announcement.
On the Chinese platform FXBTC.com, the yuan-bitcoin exchange rate dropped as much as about 20 percent after the news before rebounding slightly to around 5,800 yuan per bitcoin in heavy trading.

On BTC-e, the dollar-bitcoin rate had fallen about 11 percent to about $945 from $1,063 before the news.
Cao said he would not be surprised to see the value of bitcoins fall as much as 50 percent over the next week or two.

Many bitcoin proponents say the currency's volatility will have to flatten out before it can be adopted more widely as a near-frictionless means of payment and regulation may help.

More regulation was likely, although the initial ban on financial institutions may eventually be lifted, analysts said.
"I would be cautious about jumping the gun and taking today's announcement as indicative as how the space will be regulated in the future," said Mark Natkin, of Beijing-based Marbridge Consulting.

"Once they have a better idea of how the market works and which players are likely to emerge as the leading players, then they'll come out with firmer regulations, with more specific licensing requirements," and possibly minimum capital requirements for firms entering the sector, he said.

This crime-predicting robot aims to patrol our streets by 2015

0 comments
A scene in the 2004 film "I, Robot" involves an army of rogue NS-5 humanoids establishing a curfew and imprisoning the citizens of Chicago, circa 2035, inside their homes. That's not how Knightscope envisions the coming day of deputized bots.

In its far less frightful future, friendly R2-D2 lookalikes patrol our streets, school hallways, and company campuses to keep us safe and put real-time data to good use. Instead of the Asimov-inspired NS-5, Knightscope, a Silicon Valley-based robotics company, is developing the K5.
Officially dubbed the K5 Autonomous Data Machine, the 300-pound, 5-foot-tall mobile robot will be equipped with nighttime video cameras, thermal imaging capabilities, and license plate recognition skills. It will be able to function autonomously for select operations, but more significantly, its software will provide crime prediction that's reminiscent, the company claims, of the "precog" plot point of "Minority Report."


"It can see, hear, feel, and smell and it will roam around autonomously 24/7," said CEO William Santana Li, a former Ford Motor executive, in an interview with CNET.

At the moment, the K5 is only a prototype, and Knightscope next year will launch a beta program with select partners. But the company is shooting to have the K5 fully deployed by 2015 on a machine-as-a-service business model, meaning clients would pay by the hour for a monthly bill, based on 40-hour weeks, of $1,000. The hourly rate of $6.25 means the cost of the K5 would be competitive with the wages of many a low-wage human security guard.

Servicing and monitoring of the bots will depend on client needs, Li said, with either Knightscope or the customer employing someone to manage the bots full-time.

 Crime prediction is one of the more eye-popping features of the K5, but the bot is also packed to the gills with cutting-edge surveillance technology. It has LIDAR mapping -- a technique using lasers to analyze reflected light -- to aid its autonomous movement. "It takes in data from a 3D real-time map that it creates and combines that with differential GPS and some proximity sensors and does a probabilistic analysis to figure out exactly where it should be going on its own," Li explained.

It also has behavioral analysis capabilities and enough camera, audio, and other sensor technology to pump out 90 terabytes of data a year per unit. Down the line, the K5 will be equipped with facial recognition and even the ability to sniff out emanations from chemical and biological weapons, as well as airborne pathogens. It will be able to travel up to 18 mph, and later models will include the ability to maneuver curbs and other terrain.

(Credit: Knightscope)
The K5 will not be armed. Still, teens with late-night bot-tipping ambitions had best beware, lest their hijinks be recorded for posterity, and possible prosecution. Li said that messing with a Knightscope bot -- which would be difficult given its weight -- will have serious ramifications, as would tampering with any other form of security equipment on private property.

Still, the most sci-fi of all its features, the crime prediction algorithms, do sound too good to be true. And to be more precise, the K5 won't be so much predicting crime as much as it will be analyzing multiple data points simultaneously and knowing when a situation may be on the precipice of becoming dangerous.

"Predicting crime is being deployed today, but it's unfortunately using a lot of historical data," Li explained. "What doesn't exist in that algorithm is real-time on-site data. So if you actually had data that was fresh, that was actually from the location you're trying to analyze, it would make that algorithm much more robust." Li noted that the main goal of the crime prediction algorithms and autonomous function is to be able to push out an alert early with that kind of data, as well as aid the K5 in knowing when to charge itself and what time of day or night is optimal for uploading and downloading data in a specific environment.


Meet K5, your friendly neighborhood robo-cop (pictures)


1-2 of 6
Scroll Left Scroll Right

"That extra 30 seconds or that extra 17 minutes ... that time could actually save someone's life," Li added. The K5 will require a human being on the other end, both to manage it in the event it cannot rely on autonomous movement and to be able to interpret the alert data and loop in the necessary law enforcement agencies.
"What security 3.0 looks like: it's a human, it's robotics, and it's actual intelligence," Li said.
 
A K5 in every school, eventually
Security bots are one of the healthier subsets of the robotics industry. iRobot, maker of the popular Roomba vacuum bot, supplies both consumer and military-grade bots that perform a multitude of functions from cleaning floors, pools, and gutters to aiding bomb squads. And a number of smaller companies and research university projects have cooked up everything from consumer robots for personal property to helicopter drones for surveillance purposes.
Where the robotics industry has been lacking is in providing public spaces and large businesses with an all-purpose and highly capable bot that anyone in need of security and surveillance can employ, with military-grade guts that detect deviations from everyday activity.
"Our plan is to be able to cut crime by 50 percent in an area. When we do that, every mayor across this planet is going to be giving us a call," Li said confidently.
Knightscope derives some of its crime-fighting motivation from recent school shootings. "Must a hero be human?" the company asked when it announced in September that the K5 is being designed with the Sandy Hook Promise in mind. It hopes to have its bot one day patrolling schools because "you are never going to have an armed officer in every school," Li told The New York Times recently.

(Credit: Knightscope)
Li cited other examples of situations where security professionals could reasonably expect to need assistance, such as large-scale concert venues and sporting events. The goal is twofold: to offer a security robot that is vastly more capable than current options, but also to reassure the public that the the presence of K5 units is no threat to privacy.
"The likelihood a criminal is going to walk into an area with a few hundred droids, and the community is engaged using this tool and that transparency is there and there's no privacy concerns -- a criminal is going to have second thoughts," Lee said.
While no schools have yet signed up to put K5 machines outside classrooms, Knightscope has partnered with FIFA to bring its bot to the World Cup next year summer in Brazil. It's also working, Li noted, with "some of the largest malls," some private security companies, and a well-known insurance firm.
As for whether Knightscope is working with any defense contractors or the US military, Li was tight-lipped, adding that the company had been approached but could not talk specifics.
 
A better security guard -- at the expense of human jobs
While keeping schools safe is an undeniably noble pursuit, Knightscope, with its competitive hourly pricing model, is also targeting the security industry from the bottom up, taking aim at the particularly vulnerable group of 1.3 million private security guards nationwide who are typically non-unionized workers and who mostly earn a minimum wage that amounts to around $23,000 annually.

Even then, that makes the K5 -- at $6.25 an hour and $36,000 a year, with each unit capable of performing up to three eight-hour shifts a day -- a job-killing prospect. "It is triple-shift-capable," Li said when discussing the K5's endurance, noting that the machine can run up to 24 hours on a single charge.
Li and co-founder Stacey Stephens, a former Texas police officer, chose Sunnyvale, Calif., for Knightscope's headquarters, as a way to appeal to the needs of Apple, Facebook, and the many other Silicon Valley institutions with sprawling campuses and elaborate security needs.
And Knightscope relies on the commonplace line of argument touting the benefits of automation. "That gives a security company a tool that's much more cost-effective and gives security guards and law enforcement a much more meaningful job," Li said. "Those jobs are miserable for a lot of folks."
Google, which maintains a sprawling facility in nearby Mountain View, is currently tangled up in a long-running labor dispute between its non-unionized security guards and the contractor it hires, Security Industry Specialists. Whether the company would do away with security workers aiming to unionize and replace them with robots like the K5 is a debate that is now more timely than ever.

(Credit: Knightscope)
Kevin O'Donnell, a spokesman for the Service Employees International Union's Stand for Security campaign that handles disputes of this nature, doesn't place any blame on Knightscope or the K5 for potential displacement of security guard workers down the line due to automation. Rather, he puts the responsibility on tech companies.
"I would say that companies like Apple and Google need to think about the impact of these decisions on the community in Silicon Valley," O'Donnell said. "What is going to be the economic impact on the community? Already, you see huge rates of homelessness in Silicon Valley, huge rates of poverty, and huge rates of food stamp participation."
Knightscope has not announced any official partnerships with Silicon Valley tech companies for its 2014 beta, but did disclose that will be setting up K5 units in a "particularly large Silicon Valley city."

"What security 3.0 looks like: it's a human, it's robotics, and it's actual intelligence."
William Santana Li, CEO, Knightscope
Still, Li is adamant about Knightscope's vision of bringing to reality what many feel to be the inevitability of automation closer, and sounds a theme often heard from proponents of robots. "Let the human do the strategic work, and the machines do the monotonous and sometimes dangerous work," he said.
O'Donnell pointed out, meanwhile, that even if automation opens up new opportunities, that doesn't automatically equate to better employment of security guards. "If new employment is generated, what kinds of jobs are these going to be? Are they going to be good jobs, and will they sustain communities?" he asked.
"And of course," he added, "who will have access to those jobs?"
Eyes and ears on every street corner
Even if you buy into the proposed benefits of automation and the need for more high-tech security in schools and businesses, privacy issues boil to the surface most notably when it comes to the K5's role in public spaces.
But Li likens the potential privacy infringements of the K5's video and audio recording capabilities -- not to mention its facial and license plate recognition -- to necessary evils that could become inconsequential when weighed against the benefits of robotic security.
"If you're in the public, the assumption of your privacy is a little bit different than in your home," Li said. When asked about the possibility of making people uncomfortable with the 360-degree image-capturing capabilities of the K5, Li defended the approach of pushing the boundaries of privacy in the name of innovation. "Fear doesn't effect or make a positive change. Technology can make a huge change in change in saving people's lives. Our intentions are honorable here," he added.
The company is aiming to make the K5's crime data publicly available on a Web-based platform. It hopes that that measure will reassure communities that the K5 can be a positive force for public safety.
"There's been some concerns about facial recognition," Li acknowledged. "But what if I told you that you could actually match the kid to the right license plate to the right car so the right kid can be going into the right vehicle?" he posited. With the K5's license plate and facial recognition technology -- alongside its LIDAR 3D mapping and predictive software that keeps track of daily patterns -- that may not be a fantasy.
"What puts people on edge is not necessarily privacy. What puts people on edge is being shot at," Li said. "I think we have an opportunity to have those instances stop, or at least significantly decline them by having these types of machines in the community."










Beautiful bacteria

0 comments
Bacteria can do a whole lot of things. Two London-based artists have taken advantage of the fact that some types can be rotated in ways that cause light to scatter, creating a visible shimmer inside liquid, to bring a novel imaging technique to life.

Laura Cinti and Howard Boland combined magnetotactic bacteria, which can orient itself along Earth's magnetic fields, with electronics and photo manipulation to create real-time liquid images. They call their interactive installation "Living Mirror," as the manipulated cells form a "living mirror" within liquid that essentially mimics images captured of people.

"Multiple pulsating waves of bacteria can be made to form a pixelated but recognizable image using tiny electromagnetic coils that shift magnetic fields across surface areas," explain Cinti and Boland of the art-science collective C-Lab. "By taking pixel values from darker and lighter areas in captured images, 'Living Mirror' attempts to programmatically harmonize hundreds of light pulses to re-represent the image inside a liquid culture."

The resulting image might not work for a passport photo, but it does represent a rather unusual blend of art and science.

Teen pays $735 for photo of Xbox One on eBay

0 comments

Peter Clatworthy, a 19-year-old in the UK, has been saving his pounds to buy an Xbox One console for his young son. In particular, he had his sights aimed at the special and hard-to-find Day One edition. Day One editions on eBay UK have been selling for upwards of $800, so Clatworthy thought he had gotten a deal when he found one for $735.

There was one big red flag on the listing. The description noted the item up for auction was a photo. However, since it was listed in the consoles category and the seller had good feedback, Clatworthy went ahead with the purchase. "It said 'photo' and I was in two minds, but I looked at the description and the fact it was in the right category made me think it was genuine," he explained to the Nottingham Post.

Clatworthy's package showed up looking a lot flatter and smaller than he expected. It was, indeed, merely a photo of a Day One Xbox with the words, "Thank you for your purchase" written on the back.
To add insult to injury, the photo wasn't even of a high quality. It looks to have been printed off from an inkjet with failing cartridges. Definitely not suitable for framing.
All is not lost. Clatworthy is working with eBay to get his money back. He has been told he will get a full refund due to the misleading nature of the listing.

A look at completed listings on eBay UK shows several listings with 450 pound ($735) buy-it-now prices with the title "Xbox One Fifa 14 Day One Edition, Photo Brand New UK 2013." The links to the actual listings and descriptions are no longer active.

Clatworthy's disappointing experience should stand as another eBay cautionary tale about reading the fine print and being wary of deals that seem too good to be true, but it's hard to blame him for trying to make his Xbox dreams come true. A quick question asking for clarification might have saved some grief, but the scummy seller is really the heart of the problem.

French central bank warns over bitcoin risks

0 comments

The Bank of France warned on Thursday about risks related to the digital currency bitcoin, adding its voice to growing concerns about the unregulated, online money.

Bitcoin is not backed by any central bank or government, or by physical assets. Their value depends on people's confidence in the currency.

It has been gaining acceptance by the general public and investment community but have yet to become an accepted form of payment on websites of major retailers such as Amazon.com .

The Bank of France said the price of bitcoin in legal currencies was inherently volatile and users may find it difficult to convert to real money.

The anonymity that bitcoin offer users also raises the risk that they could also be used for money-laundering and financing of terrorism, the central bank said in a publication.

"Even if bitcoin is not currently a credible investment vehicle and therefore do not pose a significant risk to financial stability, they represent a financial risk for those who hold them," the Bank of France said.

Though the central bank saw no threat to its monopoly on the issuance of legal tender, bitcoin's growing popularity has increasingly attracted the attention of authorities in several countries, including China and the United States.

The Chinese central bank warned financial institutions on Thursday against trading bitcoin, which has proven particularly popular in China.

The price of the digital currency rose over $1,000 last month for the first time, extending a 400 percent surge in less than a month and fuelling concerns of a bubble in the making.

The Bank of France warned that speculating on the price of bitcoin could become costly if other users became unwilling to convert gains into legal tender, potentially putting the whole system at risk of collapse if bitcoin demand evaporated.

Noting a growing number of retailers and service providers who accept bitcoin for payment in France, the central bank warned they benefited from no guarantee that the bitcoin could be cashed for real money.

The NSA collects nearly 5 billion records a day

0 comments

The NSA collects nearly 5 billion records a day on the locations of cell phones overseas to create a huge database that stores information from hundreds of millions of devices, including those belonging to some Americans abroad, the Washington Post reported Wednesday.

Documents provided to the Post by NSA leaker Edward Snowden detail how this database is able to track people worldwide and map out their relationships with others.

The NSA inadvertently gathers U.S. location records, along with the billions of other records it collects by tapping into worldwide mobile network cables, the Post reported.

The database and projects designed to analyze it have created a mass surveillance tool for the NSA, allowing it to monitor individuals in a way never seen before.

NSA analysts can look at the data and track an individual’s movements throughout the world. They can then map out the person's relationships with others and expose previously unknown correspondence.

The agency collects the large amount of cell phone data in order to find out who is interacting with targets the agency is already tracking, even though most of the records collected are not relevant to national security.

The number of Americans who are tracked as part of the data collection overseas is unclear from the Snowden documents, and a senior intelligence official told the Post it is “awkward for us to try to provide any specific numbers.”

U.S. officials told the Post the programs that collect cell phone data are strictly geared towards tracking foreign intelligence targets, and are not against the law.

How Chinese Censorship Works

0 comments
For almost a year, four journalists at Bloomberg News were investigating the political connections of China's richest man, Wang Jianlin. In October, according to The New York Times, Bloomberg editor-in-chief Matthew Winkler told them the story wouldn't run because if it did, Bloomberg News would lose reporting access in China.
A few days later, Winkler reportedly spiked a second story, on the children of Chinese officials employed by foreign banks, presumably for the same reasons. Winkler reportedly defended his decision by "comparing it to the self-censorship by foreign news bureaus trying to preserve their ability to report inside Nazi-era Germany." Chinese officials responded last week by conduct unannounced investigations of Bloomberg's Chinese bureaus.

What's most surprising about these revelations is not that Winkler allegedly spiked the stories to preserve access, but that he didn't opt to publish the articles under what Bloomberg calls Code 204, which keeps stories from appearing on its financial data terminals in China. Since Code 204 was created in 2011, Bloomberg has used it to block access to its 2011 report on Chinese censorship of “Jasmine Revolution” protests and its 2012 article on Chinese millionaire Xi Jinping, the Times reports. Bloomberg maintains that it is merely holding the Jianlin investigation because it's not yet ready for publication. But its hasty call to withhold both October stories suggests that Bloomberg, like many Chinese media outlets and Internet companies, has but a tenuous grasp on how Chinese censorship operates, and has resorted to self-censorship to stay in business.
As Chinese social media analyst Jason Q. Ng pointed out in a talk at Google last month, China has come to depend upon the subtle “self-censorship by private companies” to maintain the Great Firewall, the government's online censorship and surveillance shield that prevents Chinese citizens from accessing sites like Twitter and the Times. Ng has argued that part of the reason the Great Firewall is so effective is because it encourages self-censorship of two varieties: “the self-censorship by content providers, who must make judgment calls on what needs to be censored in order to stay in the government’s good graces, and self-censorship by users, who face the threat of being detained and punished for anti-government posts.” The Bloomberg incident obviously falls into the former category, and it is not dissimilar from the practices of the more than 1,400 Chinese social media sites that are required to filter their own content to continue doing business in the country.

These sites rely on human censors to manually process all of the content uploaded to the Chinese Internet. 


The censors are responsible for manually ensuring that all content complies with Chinese Internet regulations and the Public Pledge of Self-Regulation and Professional Ethics, but the exact methods they use are kept under wraps. Over the past few months, however, two new academic studies have exposed the capricious apparatus of Chinese censorship, whose many inconsistencies make incidents like the Bloomberg debacle more likely to occur.
The first installment of an ongoing University of Toronto study of Chinese Internet controls, published last month, exposed the censorship of private communications on several instant messaging services in the country. The report found that censorship of Chinese instant messages varies from region to region, and that on at least one service “millions of chat records were being collected and stored on a publicly accessible, unsecured server based in China.” The researchers (of which Ng is one) also compiled a list of known keywords that, if used in an instant message or social media post, would automatically cause the communication to be blocked. Writing in The Atlantic last week, Ng claimed that what’s especially worrisome about the study is that these companies “engaged in pre-emptive self-censorship” in order to continue operating in China. Social media users internalize this self-censorship, Ng writes, citing China scholar Perry Link’s “metaphor of an ‘anaconda in the chandelier’ to describe how the Chinese state cajoles individuals to censor their own thoughts and words, an example that applies neatly to companies like LINE [an instant messaging service] and Bloomberg.”
But according to an October report from Harvard political scientist Gary King, the Chinese government is more concerned with censoring groups of people rather than individuals. In the first large-scale randomized study of Chinese censorship, King and his team attempted to document China’s censorship system. They authored 1,200 posts on 200 social networks throughout China to see which ones would be blocked, and drew up the following map to explain how it works:
screen_shot_2013-12-03_at_1.13.45_pm
Chinese companies have to employ their own censors to make sure they stay in line with the Public Pledge of Self-Regulation. So after analyzing all the posts, King and his team went one step further and built their own social network to test how companies internally interact with censors. “We’d call them up and we’d say, “Hey, how do we stay out of trouble with the Chinese government?” And they’d say “Well, let me tell you,” King explained.

King’s research found that calls for collective action or any kind of large gathering are far more likely to be blocked than political dissent

King’s research found that calls for collective action or any kind of large gathering are far more likely to be blocked than political dissent, but also uncovered the “highly inexact” nature of the algorithms that censors use to detect banned keywords. “Automated methods of text analysis that work based upon keyword algorithms, they work really badly,” King said. In practice, this means that a lot of the time even pro-government posts are blocked and, more broadly, that the apparatus of Chinese censorship is highly variable and subject to human error. Based on their conversations with censors, King’s team concludes that there is “a great deal of uncertainty over the exact censorship requirements and the precise rules for which the government would interfere with the operation of social media sites, especially for smaller sites with limited government connections.”
If there is uncertainty about censorship requirements even among China’s censors, then one might assume there is uncertainty in the Chinese bureaus of traditional media outlets. "The complexity of the censorship system makes 'censor' itself hard to define," says Isaac Mao, a social media researcher who was one of China's first bloggers. After years of perplexing censorship, media outlets operating in China have learned “how to define the red lines spontaneously.” For Bloomberg News, that spontaneity has come at a cost to its reputation — both in the West and with the Chinese government.

India Will Ask the U.S. Government for Help Spying on Its Citizens

0 comments
When you need help with a difficult problem, it’s always wise to turn to an expert. Maybe that’s why India’s home ministry is planning to ask the United States for assistance in decrypting communications over Skype, BlackBerry, WeChat and other services.

The request is on the agenda for the U.S.-Indo police chiefs conference, which starts Wednesday in Delhi, the Economic Times reports, citing an “agenda note” from the ministry. It reads:

The communication over these services is encrypted and the encryption-decryption technologies available with the service providers will be required by security agencies even if the facility for lawful interception of these communications is extended to security agencies in India. The technology in use by US agencies may be an area of co-operation.

While governments in many countries, including India, have reacted with anger to this year’s revelations from former National Security Agency contractor Edward Snowden that the United States spied on foreign officials, several have also been increasing Internet surveillance at home. India has started using a system that allows security agencies and income tax officials to directly intercept phone calls and emails without any court or legislative oversight, Reuters reported this summer.

Blackberry’s encrypted messages, though, have thwarted Indian security officials for years. Authorities threatened to shut down Research in Motion’s services in India, before announcing last year they thought they may have found a way to read BlackBerry messages, a claim that many found hard to believe. The NSA and cracked BlackBerry’s encryption as early as 2009, documents leaked by Snowden show. As the “agenda note” indicates, Indian officials may still need a little help.

Hackers Compromise 2 Million Facebook, Twitter and Gmail Accounts

0 comments

More than 2 million accounts have been compromised from popular sites such as Google, Yahoo, Twitter, Facebook and LinkedIn after malware captured login credentials from users worldwide, according to a new report.

According to web security firm Trustwave, hackers have stolen login usernames and passwords across various sites in the past month with the help of Pony malware, a bit different than a typical breach.

"Although these are accounts for online services such as Facebook, LinkedIn, Twitter and Google, this is not the result of any weakness in those companies networks," said Abby Ross, a spokesperson for Trustwave. "Individual users had the malware installed on their machines and had their passwords stolen.

Pony steals passwords that are stored on the infected users' computers as well as by capturing them when they are used to log into web services."

Although the culprit behind the hack remains unknown, Trustwave wrote on its blog that two targets were Russian-speaking social networking sites (vk.com and odnoklassniki.ru), which could hint at the virus' origin.

"The malware was configured so that the majority of the credential information was sent to a server in the Netherlands," Ross said. "The server does not show from which countries the information came from so we cannot break down exactly how many users from each country were affected. However, we can confirm the attackers targeted users worldwide including in the U.S., Germany, Singapore, Thailand and others."

It's also important to note that the stolen credentials were never publicly posted online. Trustwave researchers were able to access a command and control server used by the Pony botnet and recovered the passwords from there.

"We have reached out to the major service providers affected and they are taking steps to inform their users or remediate the compromised accounts," Ross told Mashable.

Facebook accounted for about 57% of the compromised accounts, followed by Yahoo (10%), Google (9%) and Twitter (3%).
A Facebook spokesperson told Mashable the company has already reached out to those with compromised accounts.

"While details of this case are not yet clear, it appears that people’s computers may have been attacked by hackers using malware to scrape information directly from their web browsers," a Facebook spokesperson told Mashable.

"As a precaution, we've initiated a password reset for people whose passwords were exposed."

Facebook added that its users can protect themselves when using the site by activating login approvals and login notifications in their security settings.

"[These users] will be notified when anyone tries to access their account from an unrecognized browser and new logins will require a unique passcode generated on their mobile phone," the spokesperson said.

The company also discovered most of the compromised passwords were considered "weak."

"In our analysis, passwords that use all four character types and are longer than 8 characters are considered 'excellent,' whereas passwords with four or less characters of only one type are considered 'terrible,'"
 Trustwave wrote on its blog. "Unfortunately, there were more terrible passwords than excellent ones, more bad passwords than good, and the majority, as usual, is somewhere in between in the medium category."

New 'Active' Invisibility Cloak Shields Across Light Frequencies

0 comments

Back in 2006, scientists developed the first invisibility cloak, but it wasn't yet able to make an object appear invisible to human vision. Now, a new type of invisibility cloak takes us one step closer to that goal.

So far, scientists have developed more than 10 cloaking devices, and the latest invisibility cloak is thinner model using "active" technology or electric power. Invented by University of Texas at Austin scientists, the new cloak enables more effective shielding of an object at a wider variety of light frequencies.

For example, an object invisible in red light would also be invisible in blue light; with previous cloaks, an object would disappear in red light, but appear in blue light, as explained in the team's recent research paper on The Physical Review X.

During experimentation, scientists made a cylindrical rod invisible, and determined this with the aid of machines and systems tracking microwave or radio frequencies, which are outside of what humans can see in the visible light spectrum. Light frequencies are all in the electromagnetic spectrum, where visible light wavelengths are a very small part of the spectrum that is visible to the human eye.

Made from a thin layer of metamaterials or synthetic textiles with properties not found in nature, the cloak bends and scatters light around the rod. The cloak then makes the rod disappear at the microwave or radio frequency level.

Led by University of Austin professor Andrea Alù, the research uses electronic amplifiers in the ultra-thin cloak — known as "active" technology — which relies on electrical currents to make an object disappear over a broader light-frequency range. Previous invisibility cloaks were not as physically thin and failed to fully shield an object since the "passive" technology required no power source and used limited bandwidths.

The passive cloaks "scattered more waves than the bare object they were trying to hide - when tested over the whole range of the electromagnetic spectrum," as reported by the BBC. Therefore, passive cloaks only made an object invisible in a specific light frequency range and not across different ranges.

Research team member Jason Soric says electronically powered cloaks change the functionality of previous "passive" cloaking devices. "The active cloaking works over a much larger bandwidth than any other passive cloak, especially considering, that it cloaks at all angles, and not just in one direction.

"Embedding electronics into passive cloaking covers has been shown to allow great control over the surface current needed to cancel the scattering of bare objects," Soric told Mashable in an email.

Currently, the University of Texas scientists are working on a cloak prototype that should be available in the next few years.

20 Hot Games for the Holidays

0 comments
Dead%2520rising%25203

1. Dead Rising 3

Platform: Xbox One
If your gamer waited in line to grab her Xbox One, you absolutely have to get Dead Rising 3, one of, if not the best game currently available for the system.
Fifa%252014

2. FIFA 14

Platforms: 3DS, PS2, PS3, PS4, PS Vita, Wii, PC, Xbox 360, Xbox One
For the star athlete who occasionally likes to cuddle up with a console (or, really, any gaming platform -- it's available for everything) opt for FIFA 14.
Killzone-shadow-fall

3. Killzone: Shadow Fall

Platform: PS4
If the PS4 is at the top of your gamer's wish list, she'll love owning this next-gen first-person shooter, exclusively for PlayStation.
Skylanders%2520swap%2520force

4. Skylanders SWAP Force

Platforms: 3DS, PS3, Wii, Wii U, Xbox 360, PS4, Xbox One
Action figures aren't just for kids. The new Skylanders is available on all consoles and handhelds, and lets you mix and match figures to combine powers.
Image: Activision
Super-mario-3d-world-110

5. Super Mario 3D World

Platform: Wii U
Super Mario 3D World totally justifies purchasing a Wii U. It's a ridiculous amount of fun, alone or with friends.
Image: Nintendo
Actual_1364388007

6. Grand Theft Auto V

Platforms: PS3, Xbox 360
We think there are still a few people left who haven't played the latest installment in the GTA series. If your gamer is one of them, you better make sure to get her up to speed with the rest of the gaming world.
Assassin's%2520creed%25204

7. Assassin's Creed Black Flag

Platform: PS3, Xbox 360, PC, Wii U, PS4, Xbox One
If first-person shooters aren't really her thing, the newest Assassin's Creed is set in the pirate-infested Caribbean.
Image: Ubisoft
Batman-arkham-origins-1

8. Batman: Arkham Origins

Platforms: PC, PS3, Wii U, Xbox 360
This is the origin story your gamer deserves. If she played Arkham Asylum or Arkham City, or if she just can't get enough of the Caped Crusader, Arkham Origins is sure to impress.
No console or gaming PC? You can get Batman: Arkham Origins Blackgate for 3DS and Playstation Vita instead.
Battlefield%25204%25203

9. Battlefield 4

Platforms: PC, Xbox 360, Xbox One, PS3, PS4
Even if your gamer is a Call of Duty purist, Battlefield 4 is a fresher, more hardcore first-person shooter. It's perfect for the video game junkie who needs a challenge.
Cod%2520ghosts%2520multiplayer

10. Call of Duty: Ghosts

Platforms: PC, PS3, Xbox 360, Wii U, Xbox One, PS4
The latest in the massive franchise, Call of Duty: Ghosts is a safe bet if you have no idea what your gamer likes. The series is so popular that at least you know she'll always have someone to play with.
Image: Activision
Injustice-gods-among-us-screenshot-2

11. Injustice: Gods Among Us

Platforms: PS3, Xbox 360, PC, PS4, PS Vita
For the comic book geek-turned-gamer, this game pits superheroes against one another in one-on-one battles.
Lego%2520marvel%2520superheros

12. Lego Marvel Superheroes

Platforms: PC, 3DS, PS3, PS4, PS Vita, Wii U, Xbox 360, Xbox One
Especially great for little ones who want a cool game but shouldn't see all the blood and gore of some on this list, Lego Marvel Superheroes will appeal to young and old gamers alike.
Madden%2520nfl%252025%25202

13. Madden NFL 25

Platforms: PS3, PS4, Xbox 360, Xbox One
How do you know if your gamer will like the new Madden game? Look for any of the 13 previous versions of the game in her collection. See one? Ok, she's probably going to like it.
Image: EA Sports
Nba2k14-1

14. NBA 2k14

Platforms: PC, PS3, PS4, Xbox 360, Xbox One
If your game enthusiast is also a basketball fan, look no further. 2K's newest NBA game will make her feel like their part of the action.
Image: 2K Games
Need%2520for%2520speed%2520rivals%25202

15. Need for Speed Rivals

Platforms: PC, PS3, PS4, Xbox 360, Xbox One
For the gamer who also has a lead foot, this pick will satisfy her Need for Speed without putting you and other passengers in harm's way.
Pokemon%2520x%2520and%2520y

16. Pokemon X and Y

Platform: 3DS
3DS players who still have their binders and binders of Pokemon cards will love the two newest games, Pokemon X and Y.
Tearaway-1

17. Tearaway

Platform: PS Vita
If you want to give your video game nut something unique, Tearaway is a beautiful game that will make full use of the Playstation Vita hardware.
Wii%2520party%2520u

18. Wii Party U

Platform: Wii U
If you actually want to hang out with your gamer this Christmas, pick up Wii Party U
and play with her -- it's tons of fun, we promise.
Image: Nintendo
Zelda%2520wind%2520walker

19. The Legend of Zelda: The Wind Waker HD

Platform: Wii U
The Wind Waker is light and fun -- perfect for new fans looking to get into the Zelda franchise.
Image: Nintendo
Zelda_link_02_thumb

20. The Legend of Zelda: A Link Between Worlds

Platform: 3DS
To take Link and friends on the go, grab the new Zelda game for 3DS, A Link Between Worlds.

Stolen cobalt-60 found abandoned

0 comments
MEXICO CITY — A missing shipment of radioactive cobalt-60 was found Wednesday near where the stolen truck transporting the material was abandoned in central Mexico state, the country's nuclear safety director said.

The highly radioactive material was found in an empty lot about a kilometer (a half a mile) from Hueypoxtla, an agricultural town of about 4,000 people, but it poses no threat or a need for an evacuation, said Juan Eibenschutz, director general of the National Commission of Nuclear Safety and Safeguards.

"Fortunately there are no people where the source of radioactivity is," Eibenschutz said.
The cargo truck hauling the extremely dangerous cobalt-60 that had been used in medical equipment was stolen from a gas station early Tuesday, and authorities had put out an alert in six central states and the capital looking for it. Police and the military joined in the hunt.

The truck was taking the cobalt to a nuclear waste facility in the state of Mexico, which is adjacent to Mexico City.

Eibenschutz said direct exposure to cobalt-60 could result in death within a few minutes. He said hospitals near the area were asked to report if they treat anyone exposed to radioactivity.

"This is a radioactive source that is very strong," Eibenschutz told The Associated Press.
But, he added, the material poses no threat to human life if kept at least 500 yards (500 meters) away.

Eibenschutz didn't know the exact weight of cobalt, but said it was the largest amount stolen in recent memory, and the intensity of the material caused the alert.

The material was used in obsolete radiation therapy equipment that is being replaced throughout Mexico's public health system. It was coming from the general hospital in the northern border city of Tijuana, Eibenshutz said.

Before the container was found, he said the thieves most likely wanted the white 2007 Volkswagen cargo vehicle with a moveable platform and crane.

Eibenschutz said there was nothing to indicate the theft of the cobalt was intentional or in any way intended for an act of terrorism.

The truck marked "Transportes Ortiz" left Tijuana on Nov. 28 and was headed to the storage facility when the driver stopped to rest at a gas station in Tepojaco, in Hidalgo state north of Mexico City.

The driver, Valentin Escamilla Ortiz, told authorities he was sleeping in the truck when two men with a gun approached about 1:30 a.m. Tuesday. They made him get out, tied his hands and feet and left him in a vacant lot nearby.

When he was able to free himself, he ran back to the gas station to get help.
On average, a half dozen thefts of radioactive materials are reported in Mexico each year and none have proven to be aimed at the cargo, Eibenschutz said. He said that in all the cases the thieves were after shipping containers or the vehicles.

Unintentional thefts of radioactive materials are not uncommon, said an official familiar with cases reported by International Atomic Energy Agency member states, who was not authorized to comment on the case. In some cases, radioactive sources have ended up being sold as scrap, causing serious harm to people who unknowingly come into contact with it.

In a Mexican case in the 1970s, one thief died and the other was injured when they opened a container holding radioactive material, he said.

The container was junked and sold to a foundry, where it contaminated some steel reinforcement bars made there. Eibenschutz said all foundries in Mexico now have equipment to detect radioactive material.

Hezbollah commander killed in Beirut

0 comments

A Hezbollah commander who fought in Syria's civil war was shot dead outside his home in Lebanon in a killing which the militant Shi'ite Muslim group blamed on Israel.

Hassan al-Laqqis was shot in the head from close range by a silenced gun as he arrived home at around midnight in the Hadath district of Beirut, a source close to Hezbollah said.

Israel, which fought a 34-day war with Hezbollah in 2006, denied any role in the shooting and hinted that the motive may have been Hezbollah's military support for Syrian President Bashar al-Assad in his war with Sunni Muslim rebels.

A previously unknown group, Ahrar al-Sunna Baalbek brigade, claimed responsibility for the attack in a message on Twitter. The claim could not be verified but the name of the purported group suggested Lebanese Sunni Muslim connections.

Film from the scene shown on Hezbollah's Al Manar television showed two bullet marks in a wall and muddy footprints it said had been left by possibly more than one assailant.

"The Israeli enemy tried to get to our martyr brother several times, in more than one location, but these attempts failed until this repugnant assassination," the group said.
Israel would "bear full responsibility and all the consequences for this heinous crime", it said.
Hezbollah said Laqqis had been with the group since it was set up with Iranian support in the 1980s to fight Israeli troops occupying south Lebanon. His son was killed in the 2006 war with Israel. The source close to Hezbollah said Laqqis had taken part recently in several battles in Syria.

Hundreds of mourners attended Laqqis's funeral in Baalbek, following his grey coffin draped in the yellow Hezbollah flag through the rainswept streets of the Bekaa Valley town.

Some blamed Israel for his death. "We are all (heading) this way if God wants it. We are defeating the Zionist plan. This is a Zionist operation," said Ali Saleh.

But Israel denied involvement. "This has strictly nothing to do with Israel," foreign ministry spokesman Yigal Palmor said.

"Hezbollah has made a fool of itself in the past with these automatic and groundless accusations against Israel ... If they are looking for explanations as to what is happening to them, they should examine their own actions."
 
Professional hit
Hezbollah also blames Israel for a Damascus car bomb five years ago which killed top commander Imad Moughniyah. It has vowed to avenge Moughniyah's killing at a time of its choice.

The source close to Hezbollah said Wednesday's attack also bore the hallmarks of an Israeli operation, and analyst Charles Lister of IHS Jane's in London said it suggested an element of "professionalism and prior intelligence".

"But what is very clear is that it comes under the context of Hezbollah and its role in Syria," he said. "It was expected that Hezbollah would blame Israel, but that is not necessarily the case."

The open role of Hezbollah fighters in the Syrian civil war and the steady flow of Lebanese Sunnis joining the anti-Assad rebels have fuelled sectarian strife in Lebanon.

Car bombs killed dozens of people in Beirut in August and a twin suicide attack on the Iranian embassy in the Lebanese capital killed at least 25 people last month.

An Iranian foreign ministry spokeswoman blamed Israel for that attack, but responsibility was claimed by a Lebanon-based al Qaeda-linked group, the Abdullah Azzam brigades.

Hezbollah leader Sayyed Hassan Nasrallah said he believed the group had support from Saudi Arabia, Iran's main regional rival whose backing for Assad's foes has pushed it deeper into a proxy conflict in Syria against Tehran.

Abdullah Azzam "is not a fictitious name," Nasrallah said in an interview broadcast on Lebanese television on Tuesday night. "This group exists ... It has its leadership ... and I am convinced it is linked to Saudi intelligence," he said.