Menu

Blog

Archive for the ‘security’ category: Page 76

Nov 29, 2014

The Most Wanted Man in the World

Posted by in categories: government, hacking, privacy, security, surveillance

Wired.com

The message arrives on my “clean machine,” a MacBook Air loaded only with a sophisticated encryption package. “Change in plans,” my contact says. “Be in the lobby of the Hotel ______ by 1 pm. Bring a book and wait for ES to find you.”

ES is Edward Snowden, the most wanted man in the world. For almost nine months, I have been trying to set up an interview with him—traveling to Berlin, Rio de Janeiro twice, and New York multiple times to talk with the handful of his confidants who can arrange a meeting. Among other things, I want to answer a burning question: What drove Snowden to leak hundreds of thousands of top-secret documents, revelations that have laid bare the vast scope of the government’s domestic surveillance programs? In May I received an email from his lawyer, ACLU attorney Ben Wizner, confirming that Snowden would meet me in Moscow and let me hang out and chat with him for what turned out to be three solid days over several weeks. It is the most time that any journalist has been allowed to spend with him since he arrived in Russia in June 2013. But the finer details of the rendezvous remain shrouded in mystery. I landed in Moscow without knowing precisely where or when Snowden and I would actually meet. Now, at last, the details are set.

Read more

Nov 23, 2014

BitCoin, Cryptocurrency, and Blockchain Technology — The Ethereum Primer

Posted by in categories: automation, big data, biotech/medical, bitcoin, business, complex systems, computing, disruptive technology, economics, encryption, energy, engineering, ethics, finance, futurism, geopolitics, government, hacking, hardware, human trajectories, information science, innovation, internet, journalism, law, materials, military, neuroscience, open access, open source, philosophy, physics, policy, privacy, science, scientific freedom, security, software, supercomputing, transparency

Quoted: “Ethereum will also be a decentralised exchange system, but with one big distinction. While Bitcoin allows transactions, Ethereum aims to offer a system by which arbitrary messages can be passed to the blockchain. More to the point, these messages can contain code, written in a Turing-complete scripting language native to Ethereum. In simple terms, Ethereum claims to allow users to write entire programs and have the blockchain execute them on the creator’s behalf. Crucially, Turing-completeness means that in theory any program that could be made to run on a computer should run in Ethereum.” And, quoted: “As a more concrete use-case, Ethereum could be utilised to create smart contracts, pieces of code that once deployed become autonomous agents in their own right, executing pre-programmed instructions. An example could be escrow services, which automatically release funds to a seller once a buyer verifies that they have received the agreed products.”

Read Part One of this Series here » Ethereum — Bitcoin 2.0? And, What Is Ethereum.

Read Part Two of this Series here » Ethereum — Opportunities and Challenges.

Read Part Three of this Series here » Ethereum — A Summary.

Nov 20, 2014

Bitcoin, Cryptocurrency, and Blockchain Technology — Voting Systems

Posted by in categories: automation, big data, bitcoin, business, complex systems, computing, disruptive technology, economics, encryption, engineering, ethics, geopolitics, government, hacking, hardware, information science, innovation, law, materials, open access, open source, philosophy, policy, polls, privacy, science, security, software, supercomputing, transparency, treaties

Quoted: “Bitcoin technology offers a fundamentally different approach to vote collection with its decentralized and automated secure protocol. It solves the problems of both paper ballot and electronic voting machines, enabling a cost effective, efficient, open system that is easily audited by both individual voters and the entire community. Bitcoin technology can enable a system where every voter can verify that their vote was counted, see votes for different candidates/issues cast in real time, and be sure that there is no fraud or manipulation by election workers.”


Read the article here » http://www.entrepreneur.com/article/239809?hootPostID=ba473f…aacc8412c7

Nov 19, 2014

BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM

Posted by in categories: automation, big data, biotech/medical, bitcoin, business, complex systems, computing, disruptive technology, economics, education, encryption, engineering, environmental, ethics, finance, futurism, geopolitics, hacking, information science, law, materials, open access, policy, science, security, software, supercomputing, transparency

Quoted: “The Factom team suggested that its proposal could be leveraged to execute some of the crypto 2.0 functionalities that are beginning to take shape on the market today. These include creating trustless audit chains, property title chains, record keeping for sensitive personal, medical and corporate materials, and public accountability mechanisms.

During the AMA, the Factom president was asked how the technology could be leveraged to shape the average person’s daily life.”

Kirby responded:

“Factom creates permanent records that can’t be changed later. In a Factom world, there’s no more robo-signing scandals. In a Factom world, there are no more missing voting records. In a Factom world, you know where every dollar of government money was spent. Basically, the whole world is made up of record keeping and, as a consumer, you’re at the mercy of the fragmented systems that run these records.”

Continue reading “BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM” »

Nov 17, 2014

A New Economic Layer — BitCoin, Cryptorcurrency, and Blockchain Technology

Posted by in categories: big data, bitcoin, business, complex systems, computing, disruptive technology, economics, electronics, encryption, engineering, ethics, finance, futurism, geopolitics, hacking, human trajectories, information science, innovation, internet, law, materials, media & arts, military, open access, open source, policy, privacy, science, scientific freedom, security, software, supercomputing

Preamble: Bitcoin 1.0 is currency — the deployment of cryptocurrencies in applications related to cash such as currency transfer, remittance, and digital payment systems. Bitcoin 2.0 is contracts — the whole slate of economic, market, and financial applications using the blockchain that are more extensive than simple cash transactions like stocks, bonds, futures, loans, mortgages, titles, smart property, and smart contracts

Bitcoin 3.0 is blockchain applications beyond currency, finance, and markets, particularly in the areas of government, health, science, literacy, culture, and art.

Read the article here » http://ieet.org/index.php/IEET/more/swan20141110

Oct 22, 2014

Pentagon preparing for mass civil breakdown

Posted by in categories: defense, government, security

— The Guardian

Pentagon Building in Washington

A US Department of Defense (DoD) research programme is funding universities to model the dynamics, risks and tipping points for large-scale civil unrest across the world, under the supervision of various US military agencies. The multi-million dollar programme is designed to develop immediate and long-term “warfighter-relevant insights” for senior officials and decision makers in “the defense policy community,” and to inform policy implemented by “combatant commands.”

Launched in 2008 – the year of the global banking crisis – the DoD ‘Minerva Research Initiative’ partners with universities “to improve DoD’s basic understanding of the social, cultural, behavioral, and political forces that shape regions of the world of strategic importance to the US.”

Read more

Oct 21, 2014

US Now Faces Threat of US-Made Weapons in Iraq

Posted by in categories: military, security
Douglas Birch, Center for Public Integrity / News Investigation — Nation of Change

Never mind that the vehicle is a boxy, lumbering, second-hand set of wheels with a top speed of just 60 mph. To some of the fighters of the Islamic State in Iraq and Syria, the U.S. M1117, aka the Guardian Armored Security Vehicle, has become their favorite ride.

Or so says Jeremy Binnie, editor of Jane’s Terrorism and Security Monitor, who has monitored propaganda sites for reports of jihadis toting, towing or tooling around in some of the millions of dollars’ worth of U.S.- and other foreign-built military equipment that ISIS captured after it swept into northern Iraq in early June.

Read more

Sep 11, 2014

Justice Beyond Privacy

Posted by in categories: computing, disruptive technology, ethics, government, hacking, internet, law, policy, privacy, security

As the old social bonds unravel, philosopher and member of the Lifeboat Foundation’s advisory board Professor Steve Fuller asks: can we balance free expression against security?

justice

Justice has been always about modes of interconnectivity. Retributive justice – ‘eye for an eye’ stuff – recalls an age when kinship was how we related to each other. In the modern era, courtesy of the nation-state, bonds have been forged in terms of common laws, common language, common education, common roads, etc. The internet, understood as a global information and communication infrastructure, is both enhancing and replacing these bonds, resulting in new senses of what counts as ‘mine’, ‘yours’, ‘theirs’ and ‘ours’ – the building blocks of a just society…

Read the full article at IAI.TV

Aug 29, 2014

The Globalized Smartification and Changing for the Better Via Simultaneous: Activated and Deactivated Kaisen!

Posted by in categories: business, complex systems, computing, economics, education, engineering, futurism, physics, science, scientific freedom, security

The Globalized Smartification and Changing for the Better Via Simultaneous: Activated and Deactivated Kaisen!

We Activate Kaisen and We Deactivate Kaisen

Chiefly, this brief post is about the pictorial I composed here.

Pay great attention to this proprietary image. I greatly value Japanese execs and sages but they focus only on throughputting( the Known Inputs Into Desirable Outputs inside their premises, without considering the Non-Existential and Existential Risk of the External Environment (outside their industrial facade) at large as we do in the White Swan’s Tranformative and Integrative Risk Management Services.

Continue reading “The Globalized Smartification and Changing for the Better Via Simultaneous: Activated and Deactivated Kaisen!” »

Aug 21, 2014

Getting Sexy and the Undivided Attention of Your Fortune-500 Client CEOs! Aug 22 2014

Posted by in categories: architecture, big data, business, complex systems, disruptive technology, economics, education, engineering, ethics, existential risks, finance, futurism, government, information science, innovation, physics, science, scientific freedom, security

Getting Sexy and the Undivided Attention of Your Fortune-500 Client CEOs! (Excerpt from the White Swan book) By Andres Agostini at www.linkedin.com/in/andresagostini

0 ab

(1.- of 17 ).- If you want to seize the undivided attention of top executives at Los Alamos National Laboratory and Procter & Gamble, talk to them through the notions of and by Process Re-engineering.

(2.- of 17 ).- If you want to seize the undivided attention of top executives at GE, talk to them through the notions of and by Six Sigma, and Peter F. Drucker’s Management by Objective (MBO). While you are with them, remember to commend on the Jack Welch’ and Jeff Immelt’s master lectures at GE’s Crotonville.

Continue reading “Getting Sexy and the Undivided Attention of Your Fortune-500 Client CEOs! Aug 22 2014” »

Page 76 of 81First7374757677787980Last