Menu

Blog

Archive for the ‘surveillance’ category: Page 26

Jan 16, 2014

The Future of Spage-Age Management, Today!

Posted by in categories: biotech/medical, ethics, existential risks, finance, food, fun, futurism, general relativity, genetics, geopolitics, government, habitats, hardware, health, human trajectories, information science, innovation, law, law enforcement, life extension, military, nanotechnology, neuroscience, nuclear energy, nuclear weapons, open access, open source, philosophy, physics, policy, posthumanism, robotics/AI, science, scientific freedom, security, singularity, space, space travel, supercomputing, surveillance, sustainability, transhumanism, transparency, transportation, treaties

The Future of Spage-Age Management, Today! by Mr. Andres Agostini at http://lnkd.in/d7zExFi
T R A N S    7
This is an excerpt from the conclusion section o, “…The Future of Spage-Age Management, Today!..,” that discusses some management strategies. To read the entire piece, just click the link at the end of article:

BEGINNING OF EXCERPT.

Mr. David Shaw’s question, “…Andres, from your work on the future which management skills need to be developed? Classically the management role is about planning, organizing, leading and controlling. With the changes coming in the future what’s your view on how this management mix needs to change and adapt?…” This question was posited on an Internet Forum, formulated by Mr. David Shaw (Peterborough, United Kingdom) at http://lnkd.in/ba6xX-K on October 09, 2013.

This P.O.V. addresses practical and structural solutions, not onerous quick fixes. THIS P.O.V. WILL BE COMMUNICATED UNAMBIGUOUSLY AND EMPHATICALLY.

Continue reading “The Future of Spage-Age Management, Today!” »

Jan 15, 2014

N.S.A. Devises Radio Pathway Into Computers

Posted by in categories: government, security, surveillance

WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

Read more

Jan 9, 2014

With Great Computing Power Comes Great Surveillance

Posted by in category: surveillance
The dark side of Moore’s Law,

Nearly 50 years ago, Gordon Moore suggested that the number of transistors that could be placed on a silicon chip would continue to double at regular intervals for the foreseeable future. Known as Moore’s law, the truth of that observation has made computers cheap and ubiquitous. Cellphones are so inexpensive there are now more than six billion of themalmost one for every person on the planet.

Read more

Jan 3, 2014

Researchers Crack 4096-bit RSA Encryption With a Microphone

Posted by in categories: security, surveillance

- Extreme Tech

Acoustic cryptanalysis of RSA decryption keys using a parabolic microphone

Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening – yes, with a microphone — to a computer as it decrypts some encrypted data. The attack is fairly simple and can be carried out with rudimentary hardware. The repercussions for the average computer user are minimal, but if you’re a secret agent, power user, or some other kind of encryption-using miscreant, you may want to reach for the Rammstein when decrypting your data.

Read More

Dec 29, 2013

A Guide To Spotting And Hiding From Drones

Posted by in categories: defense, drones, education, military, security, surveillance

Kelsey D. Atherton — Popular Science

Consider it a rough Audubon guide to the mechanical fauna of battlefields. Created by Amsterdam-based designer Ruben Pater, the Drone Survival Guide is, on one side, a rough bird watcher’s guide to the modern robot at war. The other side is a short section of printed survival tips, and the guides are available in Pashto, Dutch, German, Italian, Indonesian, Arabic, and English.

The selection of drones included in the guide leads heavily towards those from NATO member countries, with the United Kingdom, Canada, France, Germany, and the United States all represented, as well as NATO itself, for the other member countries that use these drones. Partly because those are the countries that have used drones, in Afghanistan and elsewhere, the most, but partly because they are just the countries where it is easier to get information about the scale and wingspan of their flying robots.

Read more

Dec 26, 2013

Using Pigeons to Avoid Government Surveillance: Not as Crazy as It Sounds

Posted by in category: surveillance

— Slate

168335863

This essay originally appeared in Internet Monitor 2013: Reflections on the Digital World, published by the Internet Monitor project at Harvard’s Berkman Center for Internet & Society. It is licensed under a Creative Commons Attribution 3.0 Unported license and has been lightly edited to align with Slate’s style guide.

On June 30, 2013, prompted by revelations of surveillance programs in the United States and United Kingdom, former Union of International Associations Assistant Secretary-General Anthony Judge published a detailed proposal titled “Circumventing Invasive Internet Surveillance With Carrier Pigeons.” In it, Judge discusses the proven competence of carrier pigeons for delivering messages, their non-military and military messaging capacity, and Chinese experiments to create pigeon cyborgs. Judge acknowledges that pigeon networks have their own vulnerability (such as disease, hawks, or being lured off course by sexy decoys), but argues that others have proven pigeons are effective at transmitting digital data.

Continue reading “Using Pigeons to Avoid Government Surveillance: Not as Crazy as It Sounds” »

Dec 20, 2013

Surveillance blimp will help police border

Posted by in categories: geopolitics, law enforcement, surveillance

By DAN SANTELLA The Monitor

PEÑITAS — It’s a bird, it’s a plane, it’s … no, it’s a Border Patrol blimp. Mobile, unmanned, aerial security surveillance has arrived in the Rio Grande Valley.

A so-called aerostat surveillance blimp was unveiled to media Thursday afternoon in a field south of Interstate 2/Expressway 83. Standing behind a U.S. Department of Homeland Security dais, local and national officials introduced the big, white airship and fielded questions about its upcoming use.

Noting how border fencing ends near Peñitas, Rosendo Hinojosa, chief patrol agent of the Border Patrol’s Rio Grande Valley Sector, said that the aerostat will provide Valley authorities with means previously unavailable to them.

Continue reading “Surveillance blimp will help police border” »

Dec 12, 2013

DARPA designs giant foldable satellite capable of surveiling 40% of Earth (VIDEO)

Posted by in categories: military, space, surveillance

Allen McDuffee

Spying could become much easier if a new lightweight, folding satellite concept gets off the ground.

Darpa, the military’s futuristic research agency, says it has plans to “break the glass ceiling” of space telescopes by shooting a new design into orbit that’s made of plastic and unfolds into a mammoth satellite that would dwarf the world’s most famous telescopes.

Continue reading “DARPA designs giant foldable satellite capable of surveiling 40% of Earth (VIDEO)” »

Dec 11, 2013

Applied Omniscience in Transformative and Integrative Risk Management!

Posted by in categories: big data, biological, biotech/medical, bitcoin, business, climatology, complex systems, cosmology, counterterrorism, defense, economics, education, energy, engineering, environmental, ethics, existential risks, finance, food, futurism, genetics, geopolitics, government, habitats, health, information science, life extension, nanotechnology, neuroscience, physics, policy, robotics/AI, science, scientific freedom, security, singularity, space, supercomputing, surveillance, sustainability, transhumanism, transparency, transportation, treaties

Applied Omniscience in Transformative and Integrative Risk Management! By Mr. Andres Agostini
OMNISCIENCE
This is an excerpt from the presentation, “…Applied Omniscience in Transformative and Integrative Risk Management!…” that discusses some management theories and practices. To read the entire piece, just click the link at the end of article:

Please see the graphic at http://lnkd.in/dUstZEk

Dec 9, 2013

Google catches French finance ministry pretending to be Google

Posted by in categories: cybercrime/malcode, ethics, government, surveillance

By

Summary:

The incident, which was probably a case of the French finance ministry going overboard in its efforts to monitor employee activities, provides a timely reminder of how certificates are the weak point in online security.

Google appears to have caught the French finance ministry spying on its workers’ internet traffic by spoofing Google security certificates, judging from an episode that took place last week.

Continue reading “Google catches French finance ministry pretending to be Google” »

Page 26 of 27First2021222324252627