Toggle light / dark theme

Snowden Claims U.S. Policy Is Creating A Black Market For Digital Weapons

— Tech Crunch

Edward Snowden says in a new interview with NOVA Next that the U.S. government wrongly promotes cyber offense strategies at the expense of weakening the system and leaving it open to cyber attacks from the black market.

“We’re creating a class of Internet security researchers who research vulnerabilities, but then instead of disclosing them to the device manufacturers to get them fixed and to make us more secure, they sell them to secret agencies,” Snowden says. “They sell them on the black market to criminal groups to be able to exploit these to attack targets. And that leaves us much less secure, not just on an individual level, but on a broad social level; on a broad economic level. And beyond that, it creates a new black market for computer weapons, basically digital weapons.”

Read more

New Book: An Irreverent Singularity Funcyclopedia, by Mondo 2000’s R.U. Sirius.

Quoted: “Legendary cyberculture icon (and iconoclast) R.U. Sirius and Jay Cornell have written a delicious funcyclopedia of the Singularity, transhumanism, and radical futurism, just published on January 1.” And: “The book, “Transcendence – The Disinformation Encyclopedia of Transhumanism and the Singularity,” is a collection of alphabetically-ordered short chapters about artificial intelligence, cognitive science, genomics, information technology, nanotechnology, neuroscience, space exploration, synthetic biology, robotics, and virtual worlds. Entries range from Cloning and Cyborg Feminism to Designer Babies and Memory-Editing Drugs.” And: “If you are young and don’t remember the 1980s you should know that, before Wired magazine, the cyberculture magazine Mondo 2000 edited by R.U. Sirius covered dangerous hacking, new media and cyberpunk topics such as virtual reality and smart drugs, with an anarchic and subversive slant. As it often happens the more sedate Wired, a watered-down later version of Mondo 2000, was much more successful and went mainstream.”

Read the article here >https://hacked.com/irreverent-singularity-funcyclopedia-mondo-2000s-r-u-sirius/

Legal Consulting Firm Believes Artificial Intelligence Could Replace Lawyers by 2030

Quoted: “Tony Williams, the founder of the British-based legal consulting firm, said that law firms will see nearly all their process work handled by artificial intelligence robots. The robotic undertaking will revolutionize the industry, “completely upending the traditional associate leverage model.” And: “The report predicts that the artificial intelligence technology will replace all the work involving processing information, along with a wide variety of overturned policies.”

Read the article here > https://hacked.com/legal-consulting-firm-believes-artificial…yers-2030/

Corporate Reconnoitering?

Corporate Reconnoitering?


ABSOLUTE END.

Authored By Copyright Mr. Andres Agostini

White Swan Book Author (Source of this Article)

http://www.LINKEDIN.com/in/andresagostini

http://www.AMAZON.com/author/agostini

https://www.FACEBOOK.com/heldenceo (Other Publications)

http://LIFEBOAT.com/ex/bios.andres.agostini

http://ThisSUCCESS.wordpress.com

https://www.FACEBOOK.com/agostiniandres

http://www.appearoo.com/aagostini

http://connect.FORWARDMETRICS.com/profile/1649/Andres-Agostini.html

https://www.FACEBOOK.com/amazonauthor

http://FUTURE-OBSERVATORY.blogspot.com

http://ANDRES-AGOSTINI-on.blogspot.com

http://AGOSTINI-SOLVES.blogspot.com

@AndresAgostini

@ThisSuccess

@SciCzar

Has the flawed password system finally had its day?

— BBC

Passwords are a pain. We choose simple words that are easy to remember, but equally easy for hackers to guess.

Yet we still forget them. And they also get stolen with alarming frequency.

The reported theft of 1.2 billion email passwords by Russian hackers earlier this month was just the latest in a long string of major password security breaches that have led some people to wonder if the use of passwords should be abandoned.

But what are the alternatives?

Read more

Celebgate Could Inspire More Bitcoin Blackmail

Caleb Chen — Cryptocoinsnews

The Celebgate incident is still unfolding, and we are already seeing mainstream media report on the connection between the “nude celebrity photos” and Bitcoin. The original leaker of the pictures returned to 4chan recently to respond to the uproar he had caused. An excerpt from his post highlights Bitcoin’s involvement in Celebgate:

People wanted **** for free. Sure, I got $120 with my bitcoin address, but when you consider how much time was put into acquiring this stuff (i’m not the hacker, just a collector), and the money (i paid a lot via Bitcoin as well to get certain sets when this stuff was being privately traded Friday/Saturday) I really didn’t get close to what I was hoping.

The leaker used bitcoins to purchase the nude photos of 100+ celebrities from the hacker. The leaker went on to explain that as he was posting he started noticing tell-tale signs that his computer actions were being watched and tracked. He further claimed that his “ISP kept cutting out” and that there were “Weird emails coming in..” The FBI is currently investigating both the leaker and the hacker, whom might have used an iCloud exploit.

Read more

The Police Tool That Pervs Use to Steal Nude Pics From Apple’s iCloud

By — Wired

As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims’ iCloud passwords to Apple, whose security flaws may have made that cracking exploit possible in the first place. But one step in the hackers’ sext-stealing playbook has been ignored—a piece of software designed to let cops and spies siphon data from iPhones, but is instead being used by pervy criminals themselves.

Read more

Don’t Get Hacked at Black Hat and DefCon

By Neil J. Rubenking — PC

The trainings component of the 2014 Black Hat USA conference in Las Vegas has already begun. Press folk aren’t invited for trainings, but SecurityWatch will be there to cover the briefings Wednesday and Thursday. The briefings can be shocking. In past years, researchers revealed a technique to pwn any iOS device using a gimmicked charger, described a technique for mining your Twitter feed to create convincing phishing emails, and demonstrated an Android weakness that would allow hackers to Trojanize an Android app undetectably. And those were all part of the relatively sedate Black Hat; things get even hairier at the wild and woolly DefCon that follows.

The world’s best hackers flock to these conferences, people who live and breathe security and hacking. They don’t stop trying to hack all the things just because they’re at a conference. In fact, DefCon features a “Wall of Sheep” to publicly shame any attendees careless enough to get hacked. If you’re attending, you’ll want to crank up your paranoia and be as careful as possible.

Read more

Parables involving the Theft of Knowledge

From CLUBOF.INFO

All religions have points of agreement concerning human toil and its relationship to the divine. This essay considers some of the Biblical and Hellenic parables of human origin, specifically the origins of human knowledge and instrumentality.

Here I want to present how knowledge and instrumentality are reported to originate with an act of mischief, specifically the theft of a divine artifact. My argument is that, although the possession of knowledge may be seen as a sin to be atoned for, the kind of atonement originally promoted may have simply been for us to apply our knowledge constructively in our lives. The concept of atoning for original sin (whether it is the Biblical or Hellenic sin) can then be justified with secular arguments. Everyone can agree that we retain the capacity for knowledge, and this means our atonement for the reported theft of such knowledge would simply rest with the use of the very same tool we reportedly stole.

The story of the titan Prometheus, from ancient Greek mythology, has been interpreted and reinterpreted many times. A great deal of writers and organizations have laid claim to the symbolism of Prometheus, including in modern times. [1] I would argue that too many writers diluted and over-explored the meaning of the parable by comparing everything to it, although this is not the focus of my essay. Greek mythology is notably weak on the subject of “good and evil” because it predates the Judeo-Christian propagation of their dualism, and this means most of the characters in Greek mythology can be defended or condemned without violating Hellenic theology. Prometheus as a mythic figure could be condemned from a Christian standpoint, because he seems strikingly similar to other scriptural characters engaged in a revolt against the divine. Yet the spirit of Prometheus and his theft has also been endorsed by people and organizations, such as the transhumanists who see him as an expression of the noblest human aspirations. [2]

The widely repeated version of the Prometheus story holds that Prometheus was a titan, a primordial deity who literally stole a sample of fire from Olympus and handed it down to humans. Prometheus was subsequently punished by the gods, who nailed him to a mountain and trapped him in a time-loop so that an eagle repeatedly ate his liver before it was regenerated to be eaten yet again. However, contrary to popular belief, the Prometheus parable is not mainly about the theft of fire but about the creation of the first man. According to Apollodorus’ Library dating from the First or Second Century AD:

“After he had fashioned men from water and earth, Prometheus also gave them fire, which he had hidden in a fennel stalk in secret from Zeus. But when Zeus learned of it, he ordered Hephiastos to nail his body to Mount Caucasos (a mountain that lies in Scythia). So Prometheus was nailed to it and held fast there for a good many years; and each day, an eagle swooped down to feed on the lobes of his liver, which grew again by night. Such was the punishment suffered by Prometheus for having stolen the fire, until Heracles later released him, as we shall show in our account of Heracles.” [3]

Immediately, you may be eager to identify the differences between this account of humanity’s creation and the Abrahamic accounts. For example, man is created by the thief, Zeus punishes the thief rather than man (it may seem), and the punishment of the thief is not portrayed as good, because ultimately the hero Heracles is destined to set Prometheus free again. However, the similarities are striking. Mankind is believed, in this parable, to be a source of trouble for the gods because mankind’s unique power derives from the violation and theft of divine power. We also encounter the apparent responsibility of women for the release of evil, found in the parable of Pandora, noted in the Library as being described by Hesiod as a “beautiful evil.” [4] Pandora (meaning women) was inflicted on men as the punishment for their possession of fire, which directly connects the tale of Pandora with the tale of Prometheus. We may speculate that Hesiod’s Pandora story contributed misogyny in the way some have argued that the Genesis account justifies misogyny. [5] However, such misogyny would defy the notion that Pandora, unlike men, was created by the gods [6] and was not punished by them…

The whole article has been reprinted at CLUBOF.INFO

By Harry J. Bentham - More articles by Harry J. Bentham

Originally published on March 4 in OCRT

Steal all the knowledge. Subscribe to receive free CLUBOF.INFO articles by Email

Could Mind-reading Technology Become Harmful?

From CLUBOF.INFO

The increasing detail at which human brains can be scanned is bringing the possibility of mind-reading appliances closer and closer. Such appliances, when complete, will be non-invasive and capable of responding to our thoughts as easily as they respond to keys on a keyboard. Indeed, as emphasized in the Lifeboat Foundation’s 2013 publication, The Human Race to the Future, there may soon be appliances that are operated by thought alone, and such technology may even replace our keyboards.
It is not premature to be concerned about possible negative outcomes from this, however positive the improvement in people’s lifestyles would be. In mind-reading appliances, there are two possible dangers that become immediately obvious.

Danger 1: “Thought police”

Brain-machine interfaces have many possibilities that deserve to be explored by science. However, there are also potentially dystopian threats presented by this technology. Even technologies like personal computers, which were seen as liberating to the individual and not aligned with powerful governments, have also become windows that regimes can use to spy on their citizens.

If hardware eventually allows words to appear on screens simply because of a thought, and the appliances are still vulnerable to hacking or government pressure, does this mean minds can be read without consent? It is very likely that any technology sensitive enough to respond to our thoughts could be programmed by a regime to intercept our thoughts. Even if our hardware was not originally designed to intercept thoughts on behalf of the authorities, the hardware would already meet the requirements for any program written to intercept thoughts for policing and political repression.

The potential negative consequences of mind-reading technology are equivalent to those of “uploading”, the futuristic concept of transferring one’s mind to computers as popularized by Singularitarians, usually following the ideas of Ray Kurzweil. There is a real threat that a technological singularity, as depicted in Kurzweil’s The Singularity is Near, could strengthen a flawed social system by giving the authorities the intrusive ability to monitor what it sees as deviant or threatening thought.

Danger 2: Accidents

It may be that manual or verbal control, still depicted in science fiction as gifts that will be with us for many centuries and taken with humanity’s distant descendants to the stars, are just more practical than mind-reading. Even when limited to practical uses like controlling a vehicle or appliance, mind-reading may simply be destined to take away convenience rather than create convenience for the vast majority of its customers.

Even if driving a car by thought can be made safe, the use of aircraft or weapons systems via mind-reading would certainly be more problematic. When the stakes are high, most of us already agree that it is best not to entrust the responsibility to one person’s thoughts. By not using the body and voice when performing a task, and by not allowing others to intervene in your actions, the chances of an accident are probably always going to be raised. Although we like to think of our own brains as reliable and would probably be eager to try out mind-reading control over our vehicles, we do not think of others peoples’ brains that way, and would be troubled by the lack of any window for intervention in the other person’s actions.

Possible accidents when piloting a complex machine like a helicopter or manning a dangerous weapon may be averted by an experienced hand preventing someone from taking the wrong action. Considering this, old-fashioned manual controls may already be destined to be superior to any mind-reading controls and more attuned to the challenges faced by humans. We evolved to talk and physically handle challenges. Given this fact, removing all the remaining physical challenges of performing a task may only complicate your ability to perform effectively, or result in a higher tendency to err or take rash actions by subverting the ability of others to challenge you as you act.

Recommendation: we should avoid strengthening an undesirable social system

I hope that these objections to mind-reading may be proven invalid, with time. It is certainly likely that some people, such as those with physical disabilities, are going to rely on improvements in mind-reading technology to restore their lives. However, there has been, and continues to be, a very definite danger that a flawed social system and government are going to seek out technologies that can make them more and invulnerable, and this is one such technology. Any potential avenue of invulnerability of governments against their critics is unacceptable and should be challenged, just as the present excess in surveillance has been challenged.

It is important to keep reiterating that it is not the technology itself that is the source of a threat to humanity, but the myopic actions of the likely operators of that technology. Given the experience of government mass espionage, which began without the knowledge or consent of the public, concerns about other unannounced programs exploiting communication technology for “total information awareness” (TIA) are justified.

By Harry J. Bentham - More articles by Harry J. Bentham

Originally published on April 22 in Dissident Voice

Interested in this subject? Subscribe to receive free CLUBOF.INFO articles by Email
/* */