Category Archives: Cyber

Elon Musk’s Neuralink And Your Brain’s Magical Future 

But before I can bring you in the time machine to show you what I found, we need to get in our zoom machine—because as I learned the hard way, Elon’s wizard hat plans cannot be properly understood until your head’s in the right place.

So wipe your brain clean of what it thinks it knows about itself and its future, put on soft clothes, and let’s jump into the vortex.”

http://waitbutwhy.com/2017/04/neuralink.html

Elon Musk Lays Out Plans to Meld Brains and Computers

“There are a bunch of concepts in your head that then your brain has to try to compress into this incredibly low data rate called speech or typing,” Mr. Musk told Mr. Urban in his 36,000-word blog post, which at times reads like a neuroscience textbook. “That’s what language is, your brain has executed a compression algorithm on thought, on concept transfer.

“If you have two brain interfaces, you could actually do an uncompressed direct conceptual communication with another person,” Mr. Musk said. He explained how it would be easier if people could beam a picture into the heads of others instead of trying to describe it with word

via Elon Musk Lays Out Plans to Meld Brains and Computers – WSJ

As Zeal for China Dims, Global Companies Complain More Boldly – NYTimes.com

“In late March, a group of more than 50 American lawmakers sent a letter to the Chinese ambassador to the United States, Cui Tiankai, taking direct aim at China’s restrictions on cloud computing. They wrote that current and draft regulations would force the transfer of valuable intellectual property to Chinese companies and effectively bar foreign cloud service providers “from operating or competing fairly in China.”

https://mobile.nytimes.com/2017/04/19/business/china-companies-complain.html

Lockheed Demos Unmanned F-16

Lockheed Martin says the plane successfully demonstrated an ability to plan and execute the mission, react to a changing threat environment, and automatically manage itself to avoid capability errors.This was the second demonstration in a series of planned flight tests known as Have Raider II. The first test focused on flight maneuvers. The tests have been done earlier in the form of computer simulations, but this was the first field test.

via Lockheed Demos Unmanned F-16 | Industrial Equipment News

Workplace Surveillance Is The New Office ‘Perk’

Whether through “voluntary” corporate wellness programs, smart badges that record voices and GPS locations, or surveillance apps in their mobile phones and personal computers, Americans are offering up more and more personal data at work. Most of them don’t have much idea of where that data goes, or how it will be used — and there aren’t that many limits on what employers can find out about their employees, or what they can do with the data. The more people who opt in now, the harder it will be to opt out in the future.

And it’s about to get much worse.

via Workplace Surveillance Is The New Office ‘Perk’ – Vocativ

Four Flavors of Automated License Plate Reader Technology

Automated License Plate Readers (ALPRs) may be the most common mass surveillance technology in use by local law enforcement around the country—but they’re not always used in the same way.

via The Four Flavors of Automated License Plate Reader Technology | Electronic Frontier Foundation

Jade Helm and the ‘Human Domain’ – Liberty Unyielding

“Almost nothing has been said in public about the IT element in human domain operations, as it relates to Jade Helm.  But if you investigate human domain theory, IT figures hugely in it.  Much of operationalizing the human domain concept is about leveraging – wait for it – “Big Data”: that universe of data now floating around on people and events.

An example that would probably apply to an exercise like Jade Helm is monitoring the routine communications of the local population, whether by scooping in data from social media or by some means of watching patterns in communications metadata (e.g., big spikes in cell-phone calls just before major events, or just after something unique has been detected by the locals).  These are simplified examples, meant to suggest the categories of phenomena that human domain intelligence would be looking for.”

http://libertyunyielding.com/2015/06/20/more-straight-dope-on-jade-helm-2015-and-the-human-domain/

Obama and the intel community’s ‘Leaks against Trump’ campaign – Liberty Unyielding

“And this next point can’t be overemphasized: the intel cycle paradigm shifted after 9/11 from priority- and event-driven collection to event-driven data retrieval, with collection as an ongoing, environmental condition.  (For a fairly deep dive into this, see my 2015 commentary on the big-data focus of the Jade Helm exercise.)”
http://libertyunyielding.com/2017/02/23/obama-intel-communitys-leaks-trump-campaign/

Cyber Firm Behind “Russian Hacking” Claims Has Ties To Soros-Supported Think Tank

The cyber firm Crowdstrike has been one of the main proponents of allegations that Russia interfered in the 2016 American presidential elections using their cyber capabilities. The analysis performed by Crowdstrike was relied on almost exclusively by the Democratic National Committee (DNC) to establish their claims of “Russian hacking.”

It has subsequently been revealed that Crowdstrike has in the past both misrepresented data in an attempt to frame the Russian government for cyber attacks and also failed to account for known capabilities of third parties which enable them to impersonate Russian hackers. The founder of Crowdstrike is also tied to the Atlantic Council, a think tank supported by George Soros which has been accused of accepting funds in exchange for support of favored policy positions as well as promoting disinformation and propaganda attacks against anti establishment figures.”

http://disobedientmedia.com/cyber-firm-behind-russian-hacking-claims-has-ties-to-soros-supported-think-tank/

Fake News and the Digital Duopoly – WSJ

“Look at how Google games searches. A study reported in The Wall Street Journal found that in 25,000 random Google searches ads for Google products appeared in the most prominent slot 91% of the time. How is that not the unfair leveraging of search dominance and the abuse of algorithm? All 1,000 searches for “laptops” started with an ad for Google’s Chromebook—100% of the time. Kim Jong Un would be envious of results like that at election time.”
https://www.wsj.com/articles/fake-news-and-the-digital-duopoly-1491335062

Post 9/11… what the hell happened?