[Video] How to Anonymize Your Data in a Spreadsheet

How to Anonymize Your Data in a Spreadsheet

Thirteen minute video on how to anonymize your data in a spreadsheet using customer names in a fictitious sales ledger as the example with LibreOffice Calc — a free, open source spreadsheet program similar to Microsoft Excel. LibreOffice Calc has many of the features, functions, and user interface elements of Excel, but has some differences.

Our web site:
https://www.mathematical-software.com/

Last updated August 30, 2024

(C) 2024 by John F. McGowan, Ph.D.

About Me

John F. McGowan, Ph.D. solves problems using mathematics and mathematical software, including developing gesture recognition for touch devices, video compression and speech recognition technologies. He has extensive experience developing software in C, C++, MATLAB, Python, Visual Basic and many other programming languages. He has been a Visiting Scholar at HP Labs developing computer vision algorithms and software for mobile devices. He has worked as a contractor at NASA Ames Research Center involved in the research and development of image and video processing algorithms and technology. He has published articles on the origin and evolution of life, the exploration of Mars (anticipating the discovery of methane on Mars), and cheap access to space. He has a Ph.D. in physics from the University of Illinois at Urbana-Champaign and a B.S. in physics from the California Institute of Technology (Caltech).

[Video] How to Unplug

How to Unplug (Feb. 21, 2021)

Short video on how to unplug from distracting, addictive, anxiety-producing social media, the Internet, cable news and other modern media and devices.

Alternative Video Links: NewTube Archive

Main points in order:

  1. Why unplug
  2. Banish computers, smartphones and other devices from your bedroom.
  3. Turn off screens at least an hour before going to sleep.
  4. Wait at least one half hour before turning on screens when wake up.
  5. Avoid smartphone use.
  6. Avoid/minimize other mobile device use such as laptops.
  7. Take social media apps and other non-essential apps off smartphone. Turn off all notifications except messages from live friends, family, and colleagues.
  8. Don’t watch fear/outrage cable news, television, and other video sources such as Fox News, CNN, and MSNBC. If something makes you fear, hate, scorn or ridicule some other group, stop watching.
  9. Completely unplug from computers and Internet one day (or more) per week. Exercise, read a physical book, spend time with friends or family. (If possible)
  10. Set aside limited time periods for ‘bad news’ or other difficult topics. Don’t allow them to be 24/7.
  11. Diversify away from centralized advertising funded sources such as Google and Facebook that use opaque algorithms and teams to manipulate search results or social media feeds.

Subscribe to our free Weekly Newsletter for articles and videos on practical mathematics, Internet Censorship, ways to fight back against censorship, and other topics by sending an email to: subscribe [at] mathematical-software.com

Avoid Internet Censorship by Subscribing to Our RSS News Feed: http://wordpress.jmcgowan.com/wp/feed/

Legal Disclaimers: http://wordpress.jmcgowan.com/wp/legal/

Support Us:
PATREON: https://www.patreon.com/mathsoft
SubscribeStar: https://www.subscribestar.com/mathsoft

BitChute (Video): https://www.bitchute.com/channel/HGgoa2H3WDac/
Brighteon (Video): https://www.brighteon.com/channels/mathsoft
LBRY (Video): https://lbry.tv/@MathematicalSoftware:5

(C) 2021 by John F. McGowan, Ph.D.

About Me

John F. McGowan, Ph.D. solves problems using mathematics and mathematical software, including developing gesture recognition for touch devices, video compression and speech recognition technologies. He has extensive experience developing software in C, C++, MATLAB, Python, Visual Basic and many other programming languages. He has been a Visiting Scholar at HP Labs developing computer vision algorithms and software for mobile devices. He has worked as a contractor at NASA Ames Research Center involved in the research and development of image and video processing algorithms and technology. He has published articles on the origin and evolution of life, the exploration of Mars (anticipating the discovery of methane on Mars), and cheap access to space. He has a Ph.D. in physics from the University of Illinois at Urbana-Champaign and a B.S. in physics from the California Institute of Technology (Caltech).

How Rational is Suspecting a Conspiracy?

It is rational to suspect a conspiracy in some situations. Conspiracies are difficult to prove and difficult to disprove. Proving a conspiracy usually requires a confession by someone in the conspiracy or evidence such as surveillance audio, video, or documents such as a duplicate set of books in an accounting fraud or a diary. People involved in criminal conspiracies who confess are, almost by definition, unreliable witnesses and can often be called into question because of their admitted moral character.

Disproving a conspiracy is usually very difficult, simply because we generally lack reliable 24/7 surveillance of the alleged conspirators. Specific conspiracy scenarios can be ruled out but it is often impossible to comprehensively rule out all plausible scenarios. Thus, it is often necessary to accept a high level of uncertainty in situations where a conspiracy may be involved; even with a high degree of suspicion, certainty beyond a reasonable doubt is often not possible.

What does historical data show about the frequency of conspiracies and how frequently do they elude discovery? These are some numbers from the US Federal Bureau of Investigation (FBI).

US FBI Homicides by Victim/Offender Situations for 2017 (Screenshot on Feb. 10, 2021)

The FBI reported a total of 15,129 homicides in 2017, the most recent year for which I was able to locate statistics. Of these, 1,781 involved a single victim and multiple offenders — a conspiracy. Three-hundred (300) involved multiple victims and multiple offenders — a conspiracy. Thus, a total of 2,081 or 13.76 percent involved a conspiracy.

Note that the table lists 5,174 (461 + 4,713) or 34.2 percent with an unknown offender or offenders, presumably unsolved. Thus, a substantial number of murder conspiracies avoid detection and prosecution.

The FBI also gives clearance data for 2017 indicating about 38.4 percent of homicides are unsolved. Note that this seems inconsistent with the 34.2 percent number implied by the Homicides by Victim/Offender Situation table above. The meaning of “clearance” is the subject of some controversy and has different definitions in different crime statistics.

US FBI Report on Crime Clearance Rates in 2017 (Screenshot on Feb. 10, 2021)

The history of investigations into organized crime where conspiracies have frequently been proven in a court of law includes numerous unsolved murders and disappearances including such famous cases as the murder of reputed mob boss Arnold Rothstein in 1928, the disappearance of Jimmy Hoffa in 1975, the murder of alleged Chicago mob boss “Sam” Giancana in 1975, and many others.

Thus conspiracies do happen and it is rational to suspect them in some situations. The FBI data indicates conspiracies are involved in about 13.76 percent of murders in the US.

(C) 2021 by John F. McGowan, Ph.D.

About Me

John F. McGowan, Ph.D. solves problems using mathematics and mathematical software, including developing gesture recognition for touch devices, video compression and speech recognition technologies. He has extensive experience developing software in C, C++, MATLAB, Python, Visual Basic and many other programming languages. He has been a Visiting Scholar at HP Labs developing computer vision algorithms and software for mobile devices. He has worked as a contractor at NASA Ames Research Center involved in the research and development of image and video processing algorithms and technology. He has published articles on the origin and evolution of life, the exploration of Mars (anticipating the discovery of methane on Mars), and cheap access to space. He has a Ph.D. in physics from the University of Illinois at Urbana-Champaign and a B.S. in physics from the California Institute of Technology (Caltech).

[Article] There is NO Smartphone Privacy App

There is almost certainly no smartphone privacy app that you can install on your phone to block monitoring and spying by the “government,” meaning the Total Information Awareness system constructed by the NSA and other security/intelligence agencies in the United States. There are almost certainly low level hardware or firmware backdoors in all popular smartphones such as Apple’s iPhone and the many Android phones that enable the “government” to access the phones at will. These backdoors operate at a low level below any installed app.

The Total Information Awareness (TIA) Program’s Original Controversial Logo

In the case of the iPhone the backdoors are probably in the Apple multitouch firmware that customers use to enter their password and interact with the iPhone; it is a little known but not secret fact that the US Central Intelligence Agency (CIA) funded the development of this multitouch technology at Fingerworks which was acquired by Apple both for the software and the Fingerworks development team.

The US Central Intelligence Agency (CIA) Funded the Core Multitouch Technology in the Apple iPhone: qz.com/1669346/mariana-mazzucatos-plan-to-use-governments-to-save-capitalism-from-itself

Also at Yahoo Finance: https://finance.yahoo.com/news/one-world-most-influential-economists-070032353.html

“More directly, academics at the University of Delaware, funded by a National Science Foundation and CIA fellowship program, developed multi-touch scrolling and gestures for screens; they created a company called FingerWorks that was bought by Apple in 2005, two years before the iPhone was launched.”

The American Civil Liberties Union (ACLU) has sued the FBI about their mysterious iPhone breaking capabilities.

It is also a little known fact that the US CIA was an early customer of Steve Jobs Next Computer company before it was acquired by Apple. (see the original hardcover edition of Steve Jobs and the NeXT Big Thing by Randall Stross).

Low Level Smartphone Backdoors are Very Risky

These low level smartphone backdoors are very risky. With a large fraction of the human race using smartphones, they are tempting for abuse and almost certainly are being badly abused by the small cadre of intelligence officials with access to the system. The most likely abuse is mass/global scale blackmail and psychological manipulation for the acquisition of money and power. As the case of former New York governor Elliot Spitzer illustrates, many powerful people are remarkably careless with their electronic communications and would be subject to manipulation or blackmail by anyone with access to this system.

These backdoors are a high value target for the intelligence services of various nations such as Russia and China as well as organized criminal gangs, terrorists, and other groups. They are vulnerable to technological surprise by other as yet unknown actors who may develop the technology to take over the system or somehow already have the capability.

What Can You Do to Protect Your Privacy?

The reality is there is no app you can install to protect yourself and continue to use a smartphone — or many other devices — in the modern world of nearly ubiquitous high speed wireless networks. The practical options at present are either simply to stop using smartphones entirely or keep them in a sealed radio proof case, a “Faraday bag,” except for emergencies and special situations.

Such cases are currently available for purchase at Amazon and other sources. One can also use hermetically sealed metal food containers that are still widely available. Some games and other products are also marketed in such containers. It is possible to make secure cases for smartphones using metal foil (aluminum foil), painters tape or other tapes, and a ruler and pair of scissors — all common inexpensive household items.

Commercially Available Secure Case for a Smartphone
Hermetically Sealed Food Container that Can Isolate Smartphone from the Radio Networks
DIY Secure Case Made with Painter’s Tape and Aluminum Foil

More detailed information on these options can be found here:

How to Make a Spyproof Case for Your Phone

and here:

Alternate Video Links: BitChute NewTube Brighteon

How to Stop Your Phone from Spying on You? Demonstrates methods to isolate your phone from cellular and other radio networks while keeping the phone easily accessible for emergencies or other special cases.

Products Demonstrated:

Secure Case (Faraday Bag): https://www.amazon.com/gp/product/B01HETGX00/

ZOMAKE Lightweight Backpack: https://www.amazon.com/ZOMAKE-Lightweight-Packable-Backpack-Resistant/dp/B074SG7ZTK

We do not receive any compensation for using or demonstrating these products.

(C) 2020 by John F. McGowan, Ph.D.

About Me

John F. McGowan, Ph.D. solves problems using mathematics and mathematical software, including developing gesture recognition for touch devices, video compression and speech recognition technologies. He has extensive experience developing software in C, C++, MATLAB, Python, Visual Basic and many other programming languages. He has been a Visiting Scholar at HP Labs developing computer vision algorithms and software for mobile devices. He has worked as a contractor at NASA Ames Research Center involved in the research and development of image and video processing algorithms and technology. He has published articles on the origin and evolution of life, the exploration of Mars (anticipating the discovery of methane on Mars), and cheap access to space. He has a Ph.D. in physics from the University of Illinois at Urbana-Champaign and a B.S. in physics from the California Institute of Technology (Caltech).

[Video] How to Make a Spy Proof Case for Your Phone

How to Make a Spy Proof Case for Your Phone

Complete demo how to make a spyproof case for your smartphone using aluminum foil, painter’s tape, a ruler, and a pair of scissors. Inexpensive DIY home project.

Alternative Video Links: NewTube BitChute LBRY Archive Brighteon

Backdoors in widely used hardware?

The Intel Management Engine

“Intel x86s hide another CPU that can take over your machine (you can’t audit it)”
by Damien Zammit, June 15, 2016
https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html

The US Central Intelligence Agency (CIA) Funded the Core Multitouch Technology in the Apple iPhone
https://qz.com/1669346/mariana-mazzucatos-plan-to-use-governments-to-save-capitalism-from-itself/

“More directly, academics at the University of Delaware, funded by a National Science Foundation and CIA fellowship program, developed multi-touch scrolling and gestures for screens; they created a company called FingerWorks that was bought by Apple in 2005, two years before the iPhone was launched.”

Government Attempts to Ban Strong Encryption and Other Privacy Measures:
https://reason.com/2020/03/09/senators-push-sneaky-anti-privacy-bill/

Will they ban secure cases for smartphones and other devices?

Censored Search: https://censored-search.com/
Find the answers to your problems censored by advertisers and other powerful interests!

A search engine for censored web sites and content.

Subscribe to our free Weekly Newsletter for articles and videos on practical mathematics, Internet Censorship, ways to fight back against censorship, and other topics by sending an email to: subscribe [at] mathematical-software.com

Avoid Internet Censorship by Subscribing to Our RSS News Feed: http://wordpress.jmcgowan.com/wp/feed/

Legal Disclaimers: http://wordpress.jmcgowan.com/wp/legal/

Support Us:
PATREON: https://www.patreon.com/mathsoft
SubscribeStar: https://www.subscribestar.com/mathsoft

BitChute (Video): https://www.bitchute.com/channel/HGgoa2H3WDac/
Brighteon (Video): https://www.brighteon.com/channels/mathsoft
LBRY (Video): https://lbry.tv/@MathematicalSoftware:5

(C) 2020 by John F. McGowan, Ph.D.

About Me

John F. McGowan, Ph.D. solves problems using mathematics and mathematical software, including developing gesture recognition for touch devices, video compression and speech recognition technologies. He has extensive experience developing software in C, C++, MATLAB, Python, Visual Basic and many other programming languages. He has been a Visiting Scholar at HP Labs developing computer vision algorithms and software for mobile devices. He has worked as a contractor at NASA Ames Research Center involved in the research and development of image and video processing algorithms and technology. He has published articles on the origin and evolution of life, the exploration of Mars (anticipating the discovery of methane on Mars), and cheap access to space. He has a Ph.D. in physics from the University of Illinois at Urbana-Champaign and a B.S. in physics from the California Institute of Technology (Caltech).

[Video] This Week in Internet Censorship: Giuliani, YouTube Purge, and the National Enquirer

This Week in Internet Censorship: Giuliani, YouTube Purge, and the National Enquirer (Oct. 18, 2020)

Short video on Internet Censorship this week discussing censorship of Rudy Giuliani’s allegations about Hunter Biden and the Biden family by Facebook and Twitter, the YouTube purge of alternative creators, and a deep dive into the National Enquirer and herding alternative sources and information into content “ghettos” that discredit them by association with outlandish, offensive, or false content.

References:

Glenn Greenwald on Facebook and Twitter Censorship: https://theintercept.com/2020/10/15/facebook-and-twitter-cross-a-line-far-more-dangerous-than-what-they-censor/

YouTube Purge: https://www.sgtreport.com/2020/10/blatant-censorship-the-great-youtube-purge/

Rudy Giuliani’s YouTube Channel: https://www.youtube.com/c/RudyWGiuliani

The Godfather of the Tabloid Book: https://www.amazon.com/Godfather-Tabloid-Generoso-National-Enquirer/dp/0813125030/

The National Enquirer on Jeff Bezos: https://www.nationalenquirer.com/videos/jeff-bezos-divorce-lauren-sanchez-cheating-affair-photos-exclusive/

Donald Trump and the National Enquirer: https://www.newsweek.com/donald-trump-david-pecker-national-enquirer-630892

Our Latest Article on the CDC’s Contradictory Death Numbers: https://tinyurl.com/y33st9ww

Avoid Internet Censorship by Subscribing to Our RSS News Feed: http://wordpress.jmcgowan.com/wp/feed/

Legal Disclaimers: http://wordpress.jmcgowan.com/wp/legal/

Support Us:
PATREON: https://www.patreon.com/mathsoft
SubscribeStar: https://www.subscribestar.com/mathsoft

BitChute (Video): https://www.bitchute.com/channel/HGgoa2H3WDac/
Brighteon (Video): https://www.brighteon.com/channels/mathsoft
LBRY (Video): https://lbry.tv/@MathematicalSoftware:5

(C) 2020 by John F. McGowan, Ph.D.

About Me

John F. McGowan, Ph.D. solves problems using mathematics and mathematical software, including developing gesture recognition for touch devices, video compression and speech recognition technologies. He has extensive experience developing software in C, C++, MATLAB, Python, Visual Basic and many other programming languages. He has been a Visiting Scholar at HP Labs developing computer vision algorithms and software for mobile devices. He has worked as a contractor at NASA Ames Research Center involved in the research and development of image and video processing algorithms and technology. He has published articles on the origin and evolution of life, the exploration of Mars (anticipating the discovery of methane on Mars), and cheap access to space. He has a Ph.D. in physics from the University of Illinois at Urbana-Champaign and a B.S. in physics from the California Institute of Technology (Caltech).

[Video] This Week in Internet Censorship Episode One

This Week in Internet Censorship Episode One (Oct 7, 2020)

This Week in Internet Censorship Episode 1 (Oct 7, 2020)

A short video report on Internet Censorship. Links to web sites mentioned in the video:

Censored Search (search engine for censored Internet content): https://censored-search.com/

Questioning Authority Banned by YouTube: https://www.youtube.com/watch?v=9y8PTRouF5o
Heiko Schoning: https://acu2020.org/english-versions/
Tony Heller NewTube Channel: https://newtube.app/user/TonyHeller
Tony Heller’s Real Climate Science Web Site: https://realclimatescience.com/
Robert F Kennedy Jr and Taylor Winterstein: https://childrenshealthdefense.org/news/truth-with-robert-f-kennedy-jr-and-health-freedom-advocate-taylor-winterstein-how-is-covid-affecting-vaccine-safety-advocacy/

Freedom House “Democracy under Lockdown:” https://freedomhouse.org/report/special-report/2020/democracy-under-lockdown

Avoid Internet Censorship by Subscribing to Our RSS News Feed: http://wordpress.jmcgowan.com/wp/feed/

Legal Disclaimers: http://wordpress.jmcgowan.com/wp/legal/

Support Us:
PATREON: https://www.patreon.com/mathsoft
SubscribeStar: https://www.subscribestar.com/mathsoft

BitChute (Video): https://www.bitchute.com/channel/HGgoa2H3WDac/
Brighteon (Video): https://www.brighteon.com/channels/mathsoft
LBRY (Video): https://lbry.tv/@MathematicalSoftware:5

(C) 2020 by John F. McGowan, Ph.D.

About Me

John F. McGowan, Ph.D. solves problems using mathematics and mathematical software, including developing gesture recognition for touch devices, video compression and speech recognition technologies. He has extensive experience developing software in C, C++, MATLAB, Python, Visual Basic and many other programming languages. He has been a Visiting Scholar at HP Labs developing computer vision algorithms and software for mobile devices. He has worked as a contractor at NASA Ames Research Center involved in the research and development of image and video processing algorithms and technology. He has published articles on the origin and evolution of life, the exploration of Mars (anticipating the discovery of methane on Mars), and cheap access to space. He has a Ph.D. in physics from the University of Illinois at Urbana-Champaign and a B.S. in physics from the California Institute of Technology (Caltech).

[Video/Article] How to Search for Censored Internet Content

The Censored Search web site is a search engine for censored, banned, and shadow banned web sites that discloses the algorithms used to find and rank the search results and enables paying customers to configure the algorithms for their needs.

Search engines such as Google and social media services such as Facebook are funded by advertisers such as giant health and pharmaceuticals companies and billionaires who pay them to promote their products and services. Even if those products or services are overpriced, ineffective, or dangerous. Major search engines and social media are NOT funded by end users like you.

Find the answers to your problems censored by advertisers and other powerful interests!
Censored Search: https://censored-search.com/

Censored Search Demo Video: https://tinyurl.com/y3nehncc

If you are a censored web site, you need an alternative to Google and other search engines to continue to reach your current audience and expand your audience in the face of growing censorship. Mailing lists and RSS subscriptions do not give your audience an easy way to quickly find your content that is relevant to their concerns. Please submit your web site to our censored site search engine at https://suggest.censored-search.com and share our site with your audience.

(C) 2020 by John F. McGowan, Ph.D.

About Me

John F. McGowan, Ph.D. solves problems using mathematics and mathematical software, including developing gesture recognition for touch devices, video compression and speech recognition technologies. He has extensive experience developing software in C, C++, MATLAB, Python, Visual Basic and many other programming languages. He has been a Visiting Scholar at HP Labs developing computer vision algorithms and software for mobile devices. He has worked as a contractor at NASA Ames Research Center involved in the research and development of image and video processing algorithms and technology. He has published articles on the origin and evolution of life, the exploration of Mars (anticipating the discovery of methane on Mars), and cheap access to space. He has a Ph.D. in physics from the University of Illinois at Urbana-Champaign and a B.S. in physics from the California Institute of Technology (Caltech).

Censored Search: A Search Engine for the Censored Internet

Censored Search Announcement

The Censored Search web site is a search engine for censored, banned, shadow-banned, and otherwise deprecated web sites.

Find the Answers Big Tech is Hiding from You
Censored Search: https://censored-search.com/

Censored Search Demo Video: https://tinyurl.com/y2525mtf

If you are a censored web site, please consider submitting your web site to our censored site search engine at https://censored-search.com/suggest_a_site_cgi.html and sharing our site with your audience.

Sincerely,

John F. McGowan, Ph.D.

Mathematical Software
https://www.mathematical-software.com/

Avoid Internet Censorship by Subscribing to Our RSS News Feed: http://wordpress.jmcgowan.com/wp/feed/

Legal Disclaimers: http://wordpress.jmcgowan.com/wp/legal/

Support Us:
PATREON: https://www.patreon.com/mathsoft
SubscribeStar: https://www.subscribestar.com/mathsoft

BitChute (Video): https://www.bitchute.com/channel/HGgoa2H3WDac/
DTube (Video): https://d.tube/#!/c/mathsoft
Brighteon (Video): https://www.brighteon.com/channels/mathsoft
LBRY (Video): https://lbry.tv/@MathematicalSoftware:5

(C) 2020 by John F. McGowan, Ph.D.

About Me

John F. McGowan, Ph.D. solves problems using mathematics and mathematical software, including developing gesture recognition for touch devices, video compression and speech recognition technologies. He has extensive experience developing software in C, C++, MATLAB, Python, Visual Basic and many other programming languages. He has been a Visiting Scholar at HP Labs developing computer vision algorithms and software for mobile devices. He has worked as a contractor at NASA Ames Research Center involved in the research and development of image and video processing algorithms and technology. He has published articles on the origin and evolution of life, the exploration of Mars (anticipating the discovery of methane on Mars), and cheap access to space. He has a Ph.D. in physics from the University of Illinois at Urbana-Champaign and a B.S. in physics from the California Institute of Technology (Caltech).

[Video/Article] How to Defeat Internet Censorship with Thunderbird

Internet Censorship can be defeated using the RSS (Really Simple Syndication) News Feed, Mail Filters, and Message Search Function in the free open-source Thunderbird email and personal communication program and similar programs. This post demonstrates how to use Thunderbird to do this.

Written Article (reading is faster): http://wordpress.jmcgowan.com/wp/how-to-defeat-internet-censorship-with-thunderbird/

How to Defeat Internet Censorship with Thunderbird (Video)

Avoid Internet Censorship by Subscribing to Our RSS News Feed: http://wordpress.jmcgowan.com/wp/feed/

Legal Disclaimers: http://wordpress.jmcgowan.com/wp/legal/

Support Us:
PATREON: https://www.patreon.com/mathsoft
SubscribeStar: https://www.subscribestar.com/mathsoft

BitChute (Video): https://www.bitchute.com/channel/HGgoa2H3WDac/
DTube (Video): https://d.tube/#!/c/mathsoft
Brighteon (Video): https://www.brighteon.com/channels/mathsoft
LBRY (Video): https://lbry.tv/@MathematicalSoftware:5

(C) 2020 by John F. McGowan, Ph.D.

About Me

John F. McGowan, Ph.D. solves problems using mathematics and mathematical software, including developing gesture recognition for touch devices, video compression and speech recognition technologies. He has extensive experience developing software in C, C++, MATLAB, Python, Visual Basic and many other programming languages. He has been a Visiting Scholar at HP Labs developing computer vision algorithms and software for mobile devices. He has worked as a contractor at NASA Ames Research Center involved in the research and development of image and video processing algorithms and technology. He has published articles on the origin and evolution of life, the exploration of Mars (anticipating the discovery of methane on Mars), and cheap access to space. He has a Ph.D. in physics from the University of Illinois at Urbana-Champaign and a B.S. in physics from the California Institute of Technology (Caltech).