Eric Schlosser's book and filmCommand and Control look at the terrifying prospects of nuclear friendly fire, where one of America's nukes detonates on US soil. It also looks at what might happen if a false alarm gets relayed to a trigger-happy general or President. He starts this New Yorker piece with a terrifying story from June 3, 1980:
President Jimmy Carter’s national-security adviser, Zbigniew Brzezinski, was asleep in Washington, D.C., when the phone rang. His military aide, General William Odom, was calling to inform him that two hundred and twenty missiles launched from Soviet submarines were heading toward the United States. Brzezinski told Odom to get confirmation of the attack. A retaliatory strike would have to be ordered quickly; Washington might be destroyed within minutes. Odom called back and offered a correction: twenty-two hundred Soviet missiles had been launched.
Brzezinski decided not to wake up his wife, preferring that she die in her sleep. As he prepared to call Carter and recommend an American counterattack, the phone rang for a third time. Odom apologized—it was a false alarm. An investigation later found that a defective computer chip in a communications device at norad headquarters had generated the erroneous warning. The chip cost forty-six cents.
Published by the fine fringe culture explorers at Daily Grail, the new essay anthology Spirits of Place features stories by the likes of Alan Moore, Maria J. Pérez Cuervo, Warren Ellis, Gazelle Amber Valentine, Iain Sinclair, Mark Pesce, and many other mutant thinkers riffing on how we connect with the locations we inhabit. You can […]
Anthropologist Emma Tarlo just published a new book, Entanglement: The Secret Lives of Hair, investigating the weird culture and business surrounding hair, from Jewish wig parlors to its use in Hindu temples to hair loss clinics. In an excerpt at Smithsonian, Tarlo tells of the hair trade, tracing the path from the growers to the […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]