Archive for the ‘CyberChaos’ Category

Net Neutrality may be on the ropes

Saturday, May 3rd, 2014

– Big money interests don’t give up.   They see the possibility to extract more profits for themselves from a ‘controlled’ Internet and the goal of increasing profits is their one aim.  The idea that it might disadvantage the rest of us simply doesn’t come into it.

– As I have said before, these situations come about because we, humanity, have not come to a clear decision about what our civilization should be about.

– Should we choose to make it a civilization which has the optimization of the quality of life for all of us as its highest priority?

– Or will we allow it to continue, by default, to be a Darwinian stage upon which we all struggle and in which the strongest cyclically and repeatedly corner the power and wealth of the world?   And these cyclic struggles to be periodically  punctuated by wars as different dominant factions vie or by revolutions because the unreasonably repressed and disadvantaged revolt against the unfairness.

– The calls for revolution are growing even now.

– A few years ago, I read the Rifters Trilogy (SciFi) by Peter Watts.  These were Starfish (July 1999), Maelstrom (October 2001) and Behemoth: Seppuku (December 2004).  Excellent books all.

– But what stuck with me from this series was Watts’ prediction that the world’s Internet would at some point be divided up into smaller regional units as a way of dealing with the rise of viruses, malware and attempts by various factions to control the medium of discourse.  

– Interestingly, Europeans are talking about doing just that as are some other countries.  

– Within such regional Internets, each region could have the Internet it wants.  

– And between regional Internets, the interfaces would be a matter of negotiation between regions.   Today, we can see the beginnings of such separations when we observe the Great Firewall of China.

– It is sad that it will come to this but, until we decide on a world for all of us rather than a world for the strong and greedy, we will inevitably have the conflicts and power grabs that will lead us down this road.

– dennis

– – – – – – – – – – – – – – – – – – – – – – –

Net NeutralityLast week, an obscure but potentially internet-transforming document was leaked from the U.S. Federal Communications Commission. It revealed that government regulators are considering rules that would give big companies a chance to make their online services run faster than smaller ones.

The proposed rules were revealed in the New York Timesand they would overturn the principle of “network neutrality” on the internet. Put simply, network neutrality allows you to use services from rich companies like Google and small startups with equal speed through your ISP. You can read a blog hosted on somebody’s home server, and it loads just as quickly as a blog on Tumblr.

Without network neutrality, Tumblr could cut a deal with your ISP — let’s say it’s Comcast — and its blogs would load really quickly while that home server blog might take minutes to load pictures. It might not even load at all. You can see why people in the freedom-of-speech obsessed United States might not be happy with chucking network neutrality. It privileges some speech over others, based on financial resources.

At the same time, ISPs would love to end network neutrality because they want to charge more to major players like Netflix in order to support their streaming content. Now, it looks like the FCC is thinking seriously about letting ISPs have what they want.

Over at Slate, lawyer Marvin Ammori sums up:

The FCC is going to propose that cable and phone companies such as Verizon, AT&T, and Time Warner Cable are allowed to discriminate against them, giving some websites better service and others worse service. Cable and phone companies will be able to make preferred deals with the companies that can afford to pay high fees for better service. They will even be allowed to make exclusive deals, such as making MSNBC.com the only news site on Comcast in the priority tier, and relegating competitors to a slow lane. The FCC is authorizing cable and phone companies to start making different deals with thousands or millions of websites, extracting money from sites that need to load quickly and reliably. So users will notice that Netflix or Hulu works better than Amazon Prime, which buffers repeatedly and is choppy. New sites will come along and be unable to compete with established giants. If we had had such discrimination a decade ago, we would still be using MySpace, not Facebook, because Facebook would have been unable to compete.

The chairman believes he can help us in one way: He will make sure all these highly discriminatory new tolls are “commercially reasonable.” Will that matter? No. Commercially reasonable deals won’t be measured by the market. If Amazon is paying twice what eBay is paying, the FCC will only make sure each price is reasonable, not that the prices are nondiscriminatory.

He adds that this “reasonable” pricing will hardly be reasonable, unless your company is insanely rich:

So, according to the FCC, when Verizon discriminates against a startup, we shouldn’t be alarmed, because (while being discriminated against), this startup can hire a lot of expensive lawyers and expert witnesses and meet Verizon (a company worth more than $100 billion) at the FCC and litigate this issue out, with no certainty as to the rule. The startup will almost certainly lose either at the FCC or on appeal to a higher court, after bleeding money on lawyers.

Big internet service companies have been pushing the FCC to craft such regulations for years. In 2010, we wrote about a proposal from Amazon and Google, urging the FCC to adopt pay-to-play rules that would allow some companies to get their content to your eyeballs faster than smaller players. It’s no exaggeration to say that rules like this would destroy the internet as we know it.

Now it looks like the rules that Googlezon wished for are actually in process.

Writing in the New Yorker, law professor Tim Wu explains:

The new rule gives broadband providers what they’ve wanted for about a decade now: the right to speed up some traffic and degrade others. (With broadband, there is no such thing as accelerating some traffic without degrading other traffic.) We take it for granted that bloggers, start-ups, or nonprofits on an open Internet reach their audiences roughly the same way as everyone else. Now they won’t. They’ll be behind in the queue, watching as companies that can pay tolls to the cable companies speed ahead. The motivation is not complicated. The broadband carriers want to make more money for doing what they already do. Never mind that American carriers already charge some of the world’s highest prices, around sixty dollars or more per month for broadband, a service that costs less than five dollars to provide. To put it mildly, the cable and telephone companies don’t need more money.

Wu has studied corporate controls of electronic communication for most of his life, and is the author of a terrific book about telecom monopolies called The Master SwitchHe’s worked as an adviser for the FCC, and has personally talked to President Obama about the need for net neutrality. So his disappointment is palpable when he notes that the leaked rules, confirmed as real by insiders at the agency, would allow internet companies to pay ISPs payola to get their traffic privileged above others.

This is the first step toward a world where corporate monopolies on content start affecting not just what you can see and read online — but also how you gain access to it. The signal will be out there, but your ISP just won’t deliver it to you.

An internet without network neutrality will look a lot like television does now. You’ll depend entirely on your cable company to get broadcasts, and they will only deliver their handpicked channels in their cable packages. There will probably be a little room for the web equivalent of public access television, but it will be so underfunded and slow to load that almost nobody will see it.

It used to be that when a show couldn’t make it on broadcast television, we would watch it online. That’s how amazing stuff like Dr. Horrible made it into the world. But without net neutrality, we lose that option too. If a company doesn’t have the money or legal acumen to get its content included in ISP packages, you will never see its programming. You’ll never have those shows; you’ll never have those apps; and you’ll never know what you’re missing.

– To the original…

 

The Net Closes Around Us

Wednesday, March 26th, 2014

– An intense article, below, about how very much of our digital data is being sucked up and analyzed for all sorts of reasons and we do, and will, have very little to say about it.   

– It’s the digital future – read it and weep.  Some quotes:

“In November, the British tech blogger Doctorbeet discovered that his new LG Smart TV was snooping on him. Every time he changed the channel, his activity was logged and transmitted unencrypted to LG. Doctorbeet checked the TV’s option screen and found that the setting “collection of watching info” was turned on by default. Being a techie, he turned it off, but it didn’t matter. The information continued to flow to the company anyway.”

the Drug Enforcement Administration already subpoenas utility company records to determine if electricity consumption in specific homes is consistent with a marijuana-growing operation. What will come next? Will eating habits collected by smart fridges be repackaged and sold to healthcare or insurance companies as predictors of obesity or other health problems — and so a reasonable basis for determining premiums? Will smart lights inform drug companies of insomniac owners?”

“When everything is increasingly tracked and viewed through the lens of technological omniscience, what will the effect be on dissent and protest? Will security companies with risk assessment software troll through our data and crunch it to identify people they believe have the propensity to become criminals or troublemakers — and then share that with law enforcement? (Something like it already seems to be happening in Chicago, where police are using computer analytic programs to identify people at a greater risk of violent behavior.)”

– dennis

– = – = – = – = – = – = – = – = – = – = –

Twice in my life — in the 1960s and the post-9/11 years — I was suddenly aware of clicks and other strange noises on my phone.  In both periods, I’ve wondered what the story was, and then made self-conscious jokes with whoever was on the other end of the line about those who might (or might not) be listening in.  Twice in my life I’ve felt, up close and personal, that ominous, uncomfortable, twitchy sense of being overheard, without ever knowing if it was a manifestation of the paranoia of the times or of realism — or perhaps of both.

I’m conceptually outraged by mass surveillance, but generally my personal attitude has always been: Go ahead.  Read my email, listen to my phone calls, follow my web searches, check out my location via my cell phone.  My tweets don’t exist — but if they did, I’d say have at ‘em.  I don’t give a damn.

And in some sense, I don’t, even though everyone, including me, is embarrassed by something.  Everyone says something about someone they would rather not have made public (or perhaps have even said).  Everyone has some thing — or sometimes many things — they would rather keep to themselves.

Increasingly, however, as the U.S. surveillance state grows ever more pervasive, domestically and globally, as the corporate version of the same expands exponentially, as prying “eyes” and “ears” of every technological variety proliferate, the question of who exactly we are arises.  What are we without privacy, without a certain kind of unknowability?  What are we when “our” information is potentially anyone’s information?  We may soon find out.  Arecent experiment by two Stanford University graduate students who gathered just a few month’s worth of phone metadata on 546 volunteers has, for instance, made mincemeat of President Obama’s claim that the NSA’s massive version of metadata collection “is not looking at people’s names and they’re not looking at content.”  Using only the phone metadata they got, the Stanford researchers “inferred sensitive information about people’s lives, including: neurological and heart conditions, gun ownership, marijuana cultivation, abortion, and participation in Alcoholics Anonymous.”

And that’s just a crude version of what the future holds for all of us.  There are various kinds of extinctions.  That superb environmental reporter Elizabeth Kolbert has just written a powerful book, The Sixth Extinction, about the more usual (if horrifying) kind.  Our developing surveillance world may offer us an example of another kind of extinction: of what we once knew as the private self.  If you want to be chilled to the bone when it comes to this, check out today’s stunning report by the ACLU’s Catherine Crump and Matthew Harwood on where the corporate world is taking your identity. Tom

Invasion of the Data Snatchers
Big Data and the Internet of Things Means the Surveillance of Everything
By Catherine Crump and Matthew Harwood

Estimates vary, but by 2020 there could be over 30 billion devices connected to the Internet. Once dumb, they will have smartened up thanks to sensors and other technologies embedded in them and, thanks to your machines, your life will quite literally have gone online.

The implications are revolutionary. Your smart refrigerator will keep an inventory of food items, noting when they go bad. Your smart thermostat will learn your habits and adjust the temperature to your liking. Smart lights will illuminate dangerous parking garages, even as they keep an “eye” out for suspicious activity.

Techno-evangelists have a nice catchphrase for this future utopia of machines and the never-ending stream of information, known as Big Data, it produces: the Internet of Things.  So abstract. So inoffensive. Ultimately, so meaningless.

A future Internet of Things does have the potential to offer real benefits, but the dark side of that seemingly shiny coin is this: companies will increasingly know all there is to know about you.  Most people are already aware that virtually everything a typical person does on the Internet is tracked. In the not-too-distant future, however, real space will be increasingly like cyberspace, thanks to our headlong rush toward that Internet of Things. With the rise of the networked device, what people do in their homes, in their cars, in stores, and within their communities will be monitored and analyzed in ever more intrusive ways by corporations and, by extension, the government.

– More…

– Research thanks to:  Piers L.

Nasa-funded study: industrial civilisation headed for ‘irreversible collapse’?

Monday, March 17th, 2014

“With the enemy’s approach to Moscow, the Moscovites’ view of their situation did not grow more serious but on the contrary became even more frivolous, as always happens with people who see a great danger approaching.

At the approach of danger there are always two voices that speak with equal power in the human soul: one very reasonably tells a man to consider the nature of the danger and the means of escaping it; the other, still more reasonably, says that it is too depressing and painful to think of the danger, since it is not in man’s power to foresee everything and avert the general course of events, and it is therefore better to disregard what is painful till it comes, and to think about what is pleasant.”

– Leo Tolstoy – War and Peace

= = = = = = = = = = = = = = = = =

Natural and social scientists develop new model of how ‘perfect storm’ of crises could unravel global system

A new study sponsored by Nasa’s Goddard Space Flight Center has highlighted the prospect that global industrial civilisation could collapse in coming decades due to unsustainable resource exploitation and increasingly unequal wealth distribution.

Noting that warnings of ‘collapse’ are often seen to be fringe or controversial, the study attempts to make sense of compelling historical data showing that “the process of rise-and-collapse is actually a recurrent cycle found throughout history.” Cases of severe civilisational disruption due to “precipitous collapse – often lasting centuries – have been quite common.”

The research project is based on a new cross-disciplinary ‘Human And Nature DYnamical’ (HANDY) model, led by applied mathematician Safa Motesharri of the US National Science Foundation-supported National Socio-Environmental Synthesis Center, in association with a team of natural and social scientists. The study based on the HANDY model has been accepted for publication in the peer-reviewed Elsevier journal, Ecological Economics.

It finds that according to the historical record even advanced, complex civilisations are susceptible to collapse, raising questions about the sustainability of modern civilisation:

“The fall of the Roman Empire, and the equally (if not more) advanced Han, Mauryan, and Gupta Empires, as well as so many advanced Mesopotamian Empires, are all testimony to the fact that advanced, sophisticated, complex, and creative civilizations can be both fragile and impermanent.”

By investigating the human-nature dynamics of these past cases of collapse, the project identifies the most salient interrelated factors which explain civilisational decline, and which may help determine the risk of collapse today: namely, Population, Climate, Water, Agriculture, and Energy.

These factors can lead to collapse when they converge to generate two crucial social features: “the stretching of resources due to the strain placed on the ecological carrying capacity”; and “the economic stratification of society into Elites [rich] and Masses (or “Commoners”) [poor]” These social phenomena have played “a central role in the character or in the process of the collapse,” in all such cases over “the last five thousand years.”

Currently, high levels of economic stratification are linked directly to overconsumption of resources, with “Elites” based largely in industrialised countries responsible for both:

“… accumulated surplus is not evenly distributed throughout society, but rather has been controlled by an elite. The mass of the population, while producing the wealth, is only allocated a small portion of it by elites, usually at or just above subsistence levels.”

The study challenges those who argue that technology will resolve these challenges by increasing efficiency:

“Technological change can raise the efficiency of resource use, but it also tends to raise both per capita resource consumption and the scale of resource extraction, so that, absent policy effects, the increases in consumption often compensate for the increased efficiency of resource use.”

Productivity increases in agriculture and industry over the last two centuries has come from “increased (rather than decreased) resource throughput,” despite dramatic efficiency gains over the same period.

Modelling a range of different scenarios, Motesharri and his colleagues conclude that under conditions “closely reflecting the reality of the world today… we find that collapse is difficult to avoid.” In the first of these scenarios, civilisation:

“…. appears to be on a sustainable path for quite a long time, but even using an optimal depletion rate and starting with a very small number of Elites, the Elites eventually consume too much, resulting in a famine among Commoners that eventually causes the collapse of society. It is important to note that this Type-L collapse is due to an inequality-induced famine that causes a loss of workers, rather than a collapse of Nature.”

Another scenario focuses on the role of continued resource exploitation, finding that “with a larger depletion rate, the decline of the Commoners occurs faster, while the Elites are still thriving, but eventually the Commoners collapse completely, followed by the Elites.”

In both scenarios, Elite wealth monopolies mean that they are buffered from the most “detrimental effects of the environmental collapse until much later than the Commoners”, allowing them to “continue ‘business as usual’ despite the impending catastrophe.” The same mechanism, they argue, could explain how “historical collapses were allowed to occur by elites who appear to be oblivious to the catastrophic trajectory (most clearly apparent in the Roman and Mayan cases).”

Applying this lesson to our contemporary predicament, the study warns that:

“While some members of society might raise the alarm that the system is moving towards an impending collapse and therefore advocate structural changes to society in order to avoid it, Elites and their supporters, who opposed making these changes, could point to the long sustainable trajectory ‘so far’ in support of doing nothing.”

However, the scientists point out that the worst-case scenarios are by no means inevitable, and suggest that appropriate policy and structural changes could avoid collapse, if not pave the way toward a more stable civilisation.

The two key solutions are to reduce economic inequality so as to ensure fairer distribution of resources, and to dramatically reduce resource consumption by relying on less intensive renewable resources and reducing population growth:

“Collapse can be avoided and population can reach equilibrium if the per capita rate of depletion of nature is reduced to a sustainable level, and if resources are distributed in a reasonably equitable fashion.”

The NASA-funded HANDY model offers a highly credible wake-up call to governments, corporations and business – and consumers – to recognise that ‘business as usual’ cannot be sustained, and that policy and structural changes are required immediately.

Although the study is largely theoretical, a number of other more empirically-focused studies – by KPMG and the UK Government Office of Science for instance – have warned that the convergence of food, water and energy crises could create a ‘perfect storm’ within about fifteen years. But these ‘business as usual’ forecasts could be very conservative.

– To the original article:  ➡

 

Energy firm cyber-defence is ‘too weak’, insurers say

Monday, March 3rd, 2014

technology11– I’m not surprised about this development.  Why it has taken this long to bubble up to where it is considered a ‘serious’ threat is beyond me.  

– To see why I say this, check out this article from April of 2009 on Samadhisoft.

– And, if you are wondering how far and how wide these sorts of threats go, then simply click here on the ‘cyber-chaos’ category here on samadhisoft to see all the stories we’ve published on this subject.  

– And we have, I assure you, only touched the tip of the iceberg.

– dennis

= = = = = = = = = = = = = = = = = = =

Power companies are being refused insurance cover for cyber-attacks because their defences are perceived as weak, the BBC has learned.

Underwriters at Lloyd’s of London say they have seen a “huge increase” in demand for cover from energy firms.

But surveyor assessments of the cyber-defences in place concluded that protections were inadequate.

Energy industry veterans said they were “not surprised” the companies were being refused cover.

“In the last year or so we have seen a huge increase in demand from energy and utility companies,” said Laila Khudari, an underwriter at the Kiln Syndicate, which offers cover via Lloyd’s of London.

The market is one of few places in the world where businesses can come to insure such things as container ships, oil tankers, and large development projects and to secure cash that would help them recover after disasters.

‘Worried’

For years, said Ms Khudari, Kiln and many other syndicates had offered cover for data breaches, to help companies recover if attackers penetrated networks and stole customer information.

Now, she said, the same firms were seeking multi-million pound policies to help them rebuild if their computers and power-generation networks were damaged in a cyber-attack.

“They are all worried about their reliance on computer systems and how they can offset that with insurance,” she said.

Any company that applies for cover has to let experts employed by Kiln and other underwriters look over their systems to see if they are doing enough to keep intruders out.

Assessors look at the steps firms take to keep attackers away, how they ensure software is kept up to date and how they oversee networks of hardware that can span regions or entire countries.

Unfortunately, said Ms Khudari, after such checks were carried out, the majority of applicants were turned away because their cyber-defences were lacking.

– More…

 

 

 

Cicada 3301

Monday, December 23rd, 2013

– I’ve been a programmer and systems analyst most of my life.  I started with computers the year before I graduated from university (1976) and I’ve loved the work ever since.   Indeed, I threw over the career that my degree in Microbiology qualified me for to pursue the new (then) world of computers.

– I’ve been all around the block with this career, as you might expect, given the years I’ve spent in it.   And I was lucky (or brash enough) to have found my self in widely disparate areas of the field ranging from applications, web-based and database work to the lowest levels of operating systems written in assembly language.   

– But, no matter how much you’ve seen and how far down the rabbit hole you’ve wandered, there’s always more.  The following article brought that home to me clearly.  

– The Internet that we know is not the Internet that actually exists.  Beyond what most of us have seen as either users or programmers, there’s still another entire world out there.

– Digital spelunking, anyone?   I’ve posted links to two articles you may enjoy, below.

– dennis

= = = = = = = = = = = = = = = = = = = = = =

tunnelsWikipedia’s take

A first hand account

‘Uncomfortable’ climates to devastate cities within a decade, study says

Monday, November 4th, 2013

– This is what John Roach of NBC News has to say on October 9th, 2013

– But this has all been coming, writ large, for a long time.  

-It’s been coming since:

Lyndon Johnson discussed the CO2 we were putting into the atmosphere in 1965.

Since the Club of Rome discussions and their paper on “The Limits to Growth” in 1972.

Since the World Scientists issued their warning to Humanity in 1992.

– But it is only just now beginning to reach the evening news as plausible news.  

– We have just a few greedy, self-centered people and corporations to thank for the fact that their misinformation has been instrumental in delaying humanities waking up on these threats until it is virtually too late.  

Most recently, Naomi Oreskes showed us this in her book, Merchants of Doubt: How a Handful of Scientists Obscured the Truth on Issues from Tobacco Smoke to Global Warming

– Some of us remember how Mussolini ended up.   I wonder, when the damages are finally appreciated, if these folks may fare the same.   I won’t cry any crocodile tears for them; that’s for sure.  

-By their actions many, many millions will die, cities and nations will fall, species innumerable will go extinct and most of our descendants will have less than optimal lives to look forward to; if they manage to live through the changes that are coming.

– dennis

= = = = = = = = = = = = = = = = = = = =

Lesser daysThe world is hurtling toward a stark future where the web of life unravels, human cultures are uprooted, and millions of species go extinct, according to a new study. This doomsday scenario isn’t far off, either: It may start within a decade in parts of Indonesia, and begin playing out over most of the world — including cities across the United States — by mid-century.

What’s more, even a serious effort to stabilize spiraling greenhouse gas emissions will only stave off these changes until around 2069, notes the study from the University of Hawaii, Manoa, published online Wednesday in the journal Nature. The authors warn that the time is now to prepare for a world where even the coldest of years will be warmer than the hottest years of the past century and a half.

“We are used to the climate that we live in. With this climate change, what is going to happen is we’re going to be moving outside this comfort zone,” biologist Camilo Mora, the study’s lead author, told NBC News. “It is going to be uncomfortable for us as humans and it will be very uncomfortable for species as well.”

– To Read More of this article:  

– Still with the doubts, Sweetpea?   Then please read this:

 

Tiles, the NSA and your iPhone – it’s a changing world

Monday, September 16th, 2013

“The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.”  from ProPublica

– dennis

= = = = = = = = = = = = = = = = = = =

As someone who thinks of himself as a futurist, I tend to keep my eyes peeled for patterns and connections which can, possibly, indicate something about our future.

There are two things going on now which I think are going to conjunct and increase the penetration into our personal lives of the nascent police states that most western democracies are steadily becoming.

The first thing

Is already visibly in motion.  That is the efforts of the American NSA to penetrate everyone and everything in the name of national security; as revealed by Edward Snowden’s documents.

It is now open knowledge that the NSA has broken most of the cryptology that we’ve depended on to keep our personal information safe from prying eyes.

This would include your computer passwords.

NSA

And any files you store in encrypted form.  And any files you send.  And any files you receive in encrypted form.

And, if they have access to your computer passwords, then they have full access to all your files and all your stored e-mail.

If they have all of that, then what do you have?

Bupkis – you don’t have much that’s yours, if they want it.

The criminal hackers of the world would be overjoyed to have that sort of access.   If they did, your computers would be full of malware, trojans and key loggers before you could blink.

I suppose we can just hope that the folks in the NSA that have access to this sort of power are using it exclusively for the public good.

The second thing

Has only just recently come into play.   These are the little devices called “Tilesthat you may have seen advertised.  They’ve been sold on-line now for a few months and the first deliveries are scheduled for winter 2013/2014.  I bought one recently for $18.95 USD out of curiosity.

Tile

Tiles help you find things.  They are about an inch square, made of white plastic, about 1/8 of an inch thick and they have a small hole on one corner so you can tie or attach them to things.  You can also stick them onto things with two-sided adhesive.

They have a non-replaceable battery in them that runs for about a year and they communicate back and forth via the Bluetooth short-range radio.   They come with an application program that runs on your iPhone and the program can help you find  one of your Tiles if you’ve lost it and whatever it is attached to like your keys, or your backpack or whatever.

If, for example, you’ve lost your keys, you fire up the Tile application program and ask it to locate the Tile attached to your keys.

If you are within about 50 to 150 feet or so of your keys (the range varies with terrain), the application program will show you on your iPhone where the Tile (and your keys) are … out in the garage.

Ah!  And then you remember that you laid them down on the work bench when your phone rang as you were getting the groceries out of your car.

One more thing about Tiles.  If you really lose something, like your motorcycle is missing through theft, and you were thoughtful enough to have had a Tile attached to it, you can contact the Tile people and they will put out an alert on that Tile.

Once a Tile has an alert on it, any iPhone in the world running the Tile application program that passes with 50 to 150 feet or so of your sought-after Tile, will silently send a message to the Tile people indicating that it ‘saw’ your Tile and provide the GPS location where it was.

The person carrying the iPhone running the Tile application program that located your Tile won’t even know any of this happened.

So, where ever folks are wandering around with the Tile application program on their iPhones, a quiet and constant search is being made all the time for lost Tiles (and whatever’s attached to them).

So, how does this link to the NSA and future developments?

Well, it goes like this.

The first thing to realize is that the NSA folks are certainly smarter than the average bear.  They could, and probably already have, made something very much like the Tile.  Something that’s a lot smaller, harder to detect, has better range, longer battery life and etc.  Let’s call these special NSA versions NSATiles.

The second thing to recognize is that the NSA already has the technology to break and enter into virtually any computer they want to; including our iPhones.

So, if they wish to, they can populate most of the world’s iPhones with a sweet little bit of hidden software that none of us would know about that does just what the Tile application program does; except for NSA’s purposes.

Mmm. Perhaps, I’m not thinking this through clearly?

Why should they need to insert new clandestine software into our iPhones from the outside?

The recent news from Edward Snowden has also revealed that the NSA has, under national security laws, forced some of the major software companies in the US to install ‘backdoors‘ into their software so the NSA can go in and look at what it wants to even while users of that software think their privacy is secure.   Moreover, the NSA has enjoined these companies to say nothing of this; again under the threat of national security laws.

So, why couldn’t the NSA have pressured Apple to add NSATile detection and reporting software?  They’ve done a lot of this sort of thing already.  And, Apple couldn’t warn us without breaking the law.

In short, there’s no reason why the NSA cannot use our millions iPhone devices to clandestinely scan the world for NSATiles that the NSA is interested in tracking.

And, when your iPhone sees such an NSATile, it will silently “phone home”  to the NSA and report it along with its GPS coordinates.  Nice, eh?

So, we will be an entire world of folks wandering around with iPhones doing the NSA’s bidding and looking for anyone or anything that the NSA wants to track geographically.  Terrorists, demonstrators, spies, packages, books, animals, us … you name it.

And all of us doing NSA’s bidding unknowingly.

Will this happen?

The real question, I think, given that capabilities described already exist, is why wouldn’t it be happening now?   After all, knowledge is power and this is government we’re talking here.

In a related development

There’s a parallel development involving very similar technology, see this article which I just encountered today by coincidence.

It is about something called iBeacon which is part of Apple’s newly released iOS 7 software.

This new iBeacon technology will be coming to a shopping center near you soon and it’s going to be talking to your iPhone as you walk by the stores.  It’s going to be trying to sell  you things.

Hackers ‘raid US weapons’

Wednesday, May 29th, 2013

Cultural Revolution

– If China doesn’t implode from its own internal pressures (the failure of the Mandate of Heaven concept), then it is likely that we’re all going to be living in a Chinese dominated world.

– Most of the rest of us are living in debt ridden societies with few realistic ideas of how to break the debt cycles. (Oh, yeah, let’s have another WalMart or Warehouse store so we can buy really cheap shit – that’ll sort things out).

– So here, the Chinese, apparently, have stolen the heart of America’s weapon system designs. They’ve denied it?   Well, what would you expect them to say?

– Clearly, they are winning the game against the west and they’ve used our own Capitalistic Systems and greed against us, brilliantly.

– All we can hope for is that their own greed, corruption, and their failure to understand that they too are subject to the consequences of pollution, climate change and global overshoot, is going to pull their system apart before they can take over ours.  

– Then, at least, we can all live equally in a ruined world rather than having to be serfs in a ruined world that they dominate.

– Do you think after reading this that I am prejudiced against the Chinese?  

– No, I’m not.  I differentiate between the people and their culture.   I know and value a number of excellent friends among the Chinese.  

– But their culture is another thing.  These are, after all, the same people that gave the world the spectacle of The Cultural Revolution just a few decades ago.  These same folks drive the Shark Fin markets, the Bear Gall Bladder Markets, the Ivory Markets, and etc.  

– They don’t seem to mind poisoning each other, and other nationalities, in their pursuits of profit.  (Granted, we’ve not been much better).  And, like other cultures before them (and here I very much include ours), they think they are superior, that they are right and that it is their mandate to rule.

– In the end, I think I’d prefer our own assholes to theirs.

– dennis

= = = = = = = = = = = = = = = = = = = = =

Some of America’s key defence items compromised but the culprits are not known.

Designs for some of America’s most important and sensitive weapons systems have been compromised by Chinese hackers, according to a confidential report.

More than two dozen key weapons systems had been affected, including missile defences, fighter jets, helicopters and navy vessels, the report said.

Among those listed are the advanced Patriot missile system, or PAC-3, the F/A-18 fighter jet, the Black Hawk helicopter and the V-22 Osprey, which is able to land and take off vertically.

It was not clear from the report, extracts of which were published by theWashington Post, when or how the designs had been compromised.

Its authors _ the Defence Science Board, an influential advisory body _ stopped short of accusing the Chinese Government of attempting to steal the information.

But senior military sources pointed the finger directly at Beijing, saying the security breaches were part of a “widening Chinese campaign of espionage against US defence contractors and government agencies”.

– More…

– Thanks to Kierin M for the Mandate of Heaven concept.

Anonymous Hacks US Government Site, Threatens Supreme ‘Warheads’

Tuesday, February 12th, 2013

– This YouTube video makes for interesting viewing and it sets out a number of  grievances Anonymous has with the U.S. government’s escalating abuses of the rights of U.S. citizens.   It’s well worth a watch.

– Will it cause the U.S. government to change its ways?   I doubt it.  Most of the people involved on the U.S. government side are simple people doing their jobs who haven’t the courage or the imagination to see that the jobs they are increasingly doing are not in defense of the principles upon which the U.S. was founded but rather in defense of those powerful forces who are in the processing of capturing the U.S. system for their own gains.

– dennis

= = = = = = = = = = = = = = = = = = = = = = = = =

The hacktivist group Anonymous hacked the U.S. federal sentencing website early Saturday, [January 26th, 2013] using the page to make a brazen and boisterous declaration of “war” on the U.S. government.

The group claims mysterious code-based “warheads,” named for each of the Supreme Court Justices, are about to be deployed.

As of midnight Pacific time, the front page of Ussc.gov — the Federal agency that establishes sentencing policies and practices for the Federal courts — is filled with a long screed in green on black, together with this YouTube video:  ➡

 – research thanks to Mashable

$1.6b cyber attack tip of iceberg, says top official

Tuesday, June 26th, 2012

Cyber attacks by a foreign state resulted in a British company losing £800 million ($1.58 billion) in revenue, the head of MI5 revealed yesterday.

This “was not just through intellectual property loss but also from commercial disadvantage in contractual negotiations”, said Jonathan Evans.

“They will not be the only corporate victims. The extent of what is going on is astonishing, with industrial-scale processes involving thousands of people lying behind both state-sponsored cyber espionage and organised cyber crime.”

Most state-organised cyber attacks in Britain are believed to be carried out by China and Russia, with an array of targets ranging from weapons manufacturers to petroleum producers.

The director general said the Security Service was involved in the investigation of “cyber-compromises in over a dozen companies and is working with many others that are potential future targets of hostile state activity. But this is only a tiny proportion of those affected.”

– More…