“We have found the biggest threat to the Internet… and he’s standing beside me.”
Grandfather of the Panther Moderns. The creepy guy on the right in the pic is Michael McConnell, former director of national intelligence turned VP for defense contractor Booz Allen Hamilton. During his time as top spook, he wanted the NSA to have absolute, unrestricted access to ALL information on the Internet; The ability to capture and analyze all net traffic without warrants and with impunity, just to capture a few “potential” troublemakers. McConnell knows little about computers, nothing about the Internet, and even less about hacking, but he does have one ability that could get him what he wanted: Scare the living shit out of everyone. Judging on looks alone, he could have done that.
The Washington Post actually wasted bandwidth with an op-ed piece by the Freddy Krueger wannabe (read at own peril), and even CNN went hook-line-sucker with a “special” simulation called “We Were Warned: Cyber-Shockwave” (link to YouTube search, not recommended for weak hearts). Topping it all off, McConnell claims that we (the US) are losing a “cyberwar” that he (and his company) can turn around and win it for us.
Fortunately, not everyone is drinking the kool-aid.
Just call him Elmer FUD. In 2008, McConnell published a “report” that said that the NSA must have the ability to spy on all Internet traffic… worldwide, even… without the restrictions imposed by laws or The Constitution. To back his claim up, he tried to scare everyone, but Wired’s Ryan Singel found out that the cake was a lie:
(Wired) n the piece, McConnell returns, in flamboyant style, to his exaggerating ways, hyping threats and statistics to further his bureaucratic aims. For example, McConnell regurgitates the hoary myth that computer crime costs America $100 billion a year. THREAT LEVEL traced down the source of that fake-factoid in September to a former privacy officer for the state of Colorado.
Even though he’s no longer a spy, McConnell is now honing his scare-tactics and targeting the private sector. His plan: Rebuilt the Internet, making it into a spy-net:
(Wash. Post) We need to develop an early-warning system to monitor cyberspace, identify intrusions and locate the source of attacks with a trail of evidence that can support diplomatic, military and legal options — and we must be able to do this in milliseconds. More specifically, we need to reengineer the Internet to make attribution, geolocation, intelligence analysis and impact assessment — who did it, from where, why and what was the result — more manageable. The technologies are already available from public and private sources and can be further developed if we have the will to build them into our systems and to work with our allies and trading partners so they will do the same.
You can tell from the WaPo piece that McConnell’s head is stuck in Cold-War mode. Now he wants to bring that mentality to cyberspace.
As transparent as mud. Recently, the Obama administration declassified parts of the Comprehensive National Cybersecurity Initiative (another inheritance from the Bush admin). You can read it online here or download the PDF for later. Of particular interest, as Wired points out, are initiatives 2 and 3 which call for the development and deployment of an intrusion detection system called Einstein (versions 2 and 3) that will scan “the content of communications to intercept malicious code before it reaches government networks.” Exactly how far “before” government networks is not specified. Also not specified is the role the government will take in “protecting critical infrastructure networks.”
Now the question is: Which of these events can be turned into a Gulf of Tonkin-like fakery that can create enough fear to let the military and the government turn the open internet into a controlled, surveillance-friendly net.
While there are real threats on the net, like the Mariposa botnet bust, there have been plenty of wolf-cries that make one wonder if this stuff is to be taken seriously anymore. You can probably find a couple of wolf-cries on our site. And it’s not just McConnell crying wolf…
(Wired) Now the problem with developing cyberweapons — say a virus, or a massive botnet for denial-of-service attacks, is that you need to know where to point them. In the Cold War, it wasn’t that hard. In theory, you’d use radar to figure out where a nuclear attack was coming from and then you’d shoot your missiles in that general direction. But online, it’s extremely difficult to tell if an attack traced to a server in China was launched by someone Chinese, or whether it was actually a teenager in Iowa who used a proxy.
That’s why McConnell and others want to change the internet. The military needs targets.
…
Make no mistake, the military industrial complex now has its eye on the internet. Generals want to train crack squads of hackers and have wet dreams of cyberwarfare. Never shy of extending its power, the military industrial complex wants to turn the internet into yet another venue for an arms race.
The Pentagon better be careful of what it wishes for. The next weapon they develop may shoot them in the foot… IF they’re lucky.
One more thing… About the same time Wired posted the cyberwar shenanigan piece, another post appeared by Joe Brown about Six Elements Every Conspiracy Theory Needs, almost as if Joe was calling Ryan’s article shenanigans.
You might have seen this coming. Seems like no sooner than the US Supreme Court gave corporations the right to flood our already fucked-up political system with money than one megacorp manages to get the plug pulled on a whistle blowing site. The site, Cryptome, was taken offline for a while because they released a “secret’ document earlier last week that shows how a company retains data regarding a user’s activities online… and how law enforcement can obtain that data. The corporate target: None other than Microsoft itself.
(Wired) For instance, Xbox Live records every IP address you ever use to login and stores them for perpetuity. While that’s going to be creepy for some, there’s an upside if your house gets robbed, according to the document: “If your investigation involves a stolen Xbox console, if the console serial number or Xbox LIVE user gamertag is provided and the console has been connected to the Internet, IP connection records may be available.”
…
Microsoft retains only the last 10 login records for Windows Live ID. As for your instant messages, it tells police that it keeps no record of what anyone says over Microsoft Messenger - though it will turn over who is on your buddy list.
And if you like to use Microsoft’s social networking products — like its old-school Group mailing list or its Facebook-like Spaces product, be aware that it’s very social when it comes to law enforcement or court subpoenas.
As Microsoft tells potential subpoenaees, “when you are looking for information on a specific incident like a photo posting or message posting, please request all group content and logs. We cannot retrieve single incident data.” The same holds for Spaces — if you are interested in a single picture, just request the entire thing. Call it Subpoena 2.0.
Helping Hands. Naturally, Cryptome wouldn’t bow to MS’s DMCA “takedown” notice, not when even governments couldn’t rattle them. Unfortunately, Cryptome’s registrar, Network Solutions, apparently got nervous and took them offline and locked their domain. Apparently, Microsoft only wanted the “infringing” file to taken offline, not the whole site. They withdrew their takedown notice and Network Solutions restored access to Cryptome. On Cryptome’s sites there are emails that show the progress of the fight from the issuance of the takedown notice to the restoration of Cryptome.
The file, The Microsoft® Online Services Global Criminal Compliance Handbook, is still available on Cryptome’s sites, as well as WikiLeaks, and even readable online through Wired’s article. Better download while you still can.
Borgs will be Borgs. Those familiar with the history of the net know of Microsoft’s often strong-arm tactics to become the dominant player in operating systems and the Internet. Very rarely does one hear of them backtracking, but the potential bad press that could have (and probably may still) occur may have been enough for them to reconsider. MS still has not apologized for the shuttering, and may continue using the DMCA to keep such documents “offline” in future cases. As Wired’s Ryan Singel wrote:
Cox Communications, which runs the nation’s third largest ISP, has long made its law enforcement subpoena page — including prices — public.
But Microsoft, Google, Facebook and Yahoo do not follow that example, even though all of them want their users to trust them with their most sensitive data and communications. Nor do any of them publish the most basic statistics on how often law enforcement comes knocking with subpoenas and warrants.
In fact, the simplest lesson here is that none of the pixels published over this incident would have been necessary if Microsoft had just published this document in the first place, which few people would have ever bothered to go read. Instead, these companies prefer to worry about the sensitivities of corporate-ass-covering lawyers and law enforcement agencies instead of putting their users and transparency first.
The Public Library of Science (PLoS) have published an essay by two Swiss researchers who are working with robots that “evolve” via darwinian methods. Pictured are a “prey” and “predator” robot used in the study.
Robots do evolve, and Chuck D. thanks them. Two Swiss researchers set out on what could be called an ambitious project: To show that robots can evolve like organic creatures… and piss off the creationists. While their work is considerably simpler than trying to evolve humans out of chimps, it does pave the way for better understanding organic evolution…
… and for a possible robot takeover of the world, or (if humanity is lucky enough) the emergence of the Borg.
You can check out the details from the PLoS site where you can download the PDF or XMS for leisurely reading offline. Caution: It is a scholarly work.
The results are in. In their experiments, the researchers used a “darwinian algorithm.”
This “algorithm” shows how the robots evolved during the various tasks they performed. Those tasks were navigation, homing, predation, brain and body morphology, and foraging (cooperation and altruism).
They found that, after a couple of hundred “generations” (loops of the algorithm), the bots were able to move through a maze without bumping into walls, adapt and change strategies for hunting and evasion, find their way “home,” and adapt to new bodies. They even found that, during the foraging exercises, the robots were able to cooperate in the task, and some even sacrificed personal gain for group gain.
These examples of experimental evolution with robots verify the power of evolution by mutation, recombination, and natural selection. In all cases, robots initially exhibited completely uncoordinated behaviour because their genomes had random values. However, a few hundreds of generations of random mutations and selective reproduction were sufficient to promote the evolution of efficient behaviours in a wide range of environmental conditions. The ability of robots to orientate, escape predators, and even cooperate is particularly remarkable given that they had deliberately simple genotypes directly mapped into the connection weights of neural networks comprising only a few dozen neurons.
It’s official… Humanity is SCREWED. Not quite yet…
As stated, it took these robots several hundred generations to do seemingly “simple” tasks. Humans have been at it for several thousand generations (and they still find ways of mucking things up). So it will be some time before we see a Cyberdyne series 800 model 101 walking down the street with an Uzi in each hand…
In the meantime, other scientists can use this new field of Evolutionary Robotics to further their studies…
A ruling by the United States Supreme Court strikes down a law that has kept corporate dollars limited in politics. Now, the floodgates may have been opened for corporate influence… and corruption.
A historic moment in WTF? Depending on how you want to look at the ruling of the US Supreme Court on 21-Jan-2010, it could be either a major step twords the cyberpunk world you always wanted to (not) live in, or the beginning of the end of American democracy… maybe both. In a 5-4 split decision, the high court declared “unconstitutional” laws that kept corporations from using its own money to finance campaigns advertisements, stating that such laws were “a form of censorship.” Here are some of the details of the decision (Yahoo! News via Associated Press):
OVERTURNED
_A 63-year-old law, and two of its own decisions, that barred corporations and unions from spending money directly from their treasuries on ads that advocate electing or defeating candidates for president or Congress but are produced independently and not coordinated with the candidate’s campaign.
_The prohibition in the McCain-Feingold Act that since 2002 had barred issue-oriented ads paid for by corporations or unions 30 days before a primary and 60 days before a general election.
LEFT IN PLACE
_The century-old ban on donations by corporations from their treasuries directly to candidates.
_The ability of corporations, unions or individuals to set up political action committees that can contribute directly to candidates but can only accept voluntary contributions from employees, members and others and cannot use money directly from corporate or union treasuries.
_The McCain-Feingold provision that anyone spending money on political ads must disclose the names of contributors.
The gory details. The ruling came about due to a 2008 “documentary” called Hillary: The Move produced by a conservative “nonprofit” group called “Citizens United.” The group tried to use its own money, as opposed to money from its political committee, to have it distributed. But that ran against the Federal Election Commission’s rules. The group challenged the rules, and succeeded.
Fallout, and a double-edged sword? The ruling has already caused repercussions and speculations of America’s downfall. An international human rights group said that the ruling “threatens to further marginalize candidates without strong financial backing or extensive personal resources.” (Associated Press/San Francisco Chronicle SFGate). Slate calls the ruling misguided (money is speech, corporations are people), while Time Magazine’s David Von Drehle claims the ruling will give “more Americans (have) more access to more streams of political communication than ever before,” and that labor unions will be able to challenge corporate dollars with their own. USELESS FACT: Many labor unions have far less money than corporations. When money talks, whose voice do you think will be heard? Here’s a little clue from Signe Wilkinson:
Corporate control over society: Cyberpunk almost always has an ever powerful controlling entity that directs society. Most often this is represented as a corporation. Some times its simply an ever present singular government. A common theme for corporate control involves a futuristic dystopia, where the last traces of high civilization exist only in an enclosed and protected city, where civil liberties are removed under the guise of protecting humanity.
From 3AM on Wednesday November 25, 2009, until 3AM the following day (US east coast time), WikiLeaks released half a million US national text pager intercepts. The intercepts cover a 24 hour period surrounding the September 11, 2001 attacks in New York and Washington.
The messages were broadcasted “live” to the global community — sychronized to the time of day they were sent. The first message was from 3AM September 11, 2001, five hours before the first attack, and the last, 24 hours later.
Text pagers are usualy carried by persons operating in an official capacity. Messages in the archive range from Pentagon, FBI, FEMA and New York Police Department exchanges, to computers reporting faults at investment banks inside the World Trade Center
The archive is a completely objective record of the defining moment of our time. We hope that its entrance into the historical record will lead to a nuanced understanding of how this event led to death, opportunism and war.
This message, on the WikiLeaks 9/11 site (click the logo above to access), is WikiLeaks’ explanation for broadcasting some half-million intercepted pager messages. Also on the site is an index of the messages, and a zip file to download.
While WikiLeaks intentions may seem honest, there are questions concerning the pages. The most important question being:
WHO INTERCEPTED THESE PAGES?
Inquiring minds want to know. The question surrounding the pager intercepts has not gone unnoticed in DC. From Newsday.com:
Concerned about the release of 500,000 intercepted pager messages from Sept. 11, 2001, Rep. Peter King said he plans to have his Washington staff begin a preliminary investigation.
“It does raise security issues, and we will look into it in Washington,” King (R-Seaford), the ranking Republican on the House Committee on Homeland Security, said Friday.
Note: The link may not work properly unless you disable javascript for newsday.com. If left enabled, you will only get the first paragraph along with requests to subscribe to see the rest.
The fact that someone had intercepted such traffic, albeit unencrypted, is giving some security people like King concerns about why such the intercepting was going on… and by whom.
Most pager users either don’t need to intercept the traffic or do not have the expertise to do so, (Phil) Lieberman (president of Lieberman Software Corp. of Los Angeles) said.
But clearly, those with the right technology can accomplish it. Literature of one pager company acknowledges that an experienced person with sophisticated equipment can break into the data transmitted for pagers.
Since, at the time, the World Trade Center was home to many financial companies, someone who has the means to intercept the pager traffic would have unprecedented access to information that could have altered markets.
History rewind… In what has to be an unfortunate timing of news stories, a story from the subscription site Wayne Madsen Report re-posted on Online Journal and Op-Ed News reminds us that someone had indeed been engaged in snooping on America’s electronic messages long before the towers came down. From writer Wayne Madsen:
National Security Agency (NSA) sources have reported to WMR that the signals intelligence agency’s warrantless wiretapping program was more widespread than originally reported and that it began shortly after the 2001 inauguration of George W. Bush and Dick Cheney, some six months prior to the 9/11 attacks.
Former Qwest CEO Joseph Nacchio reported that NSA requested that his firm take part in the warrantless wiretapping program in a February 27, 2001, meeting but that he told NSA that Qwest would refuse to participate. AT&T, BellSouth, SBC, Sprint, and Verizon all agreed to participate in the wiretapping program, which resulted in such a large database of intercepted calls, faxes, and e-mails, that NSA recently announced it was building a huge 1 million square feet data warehouse at a cost of $1.5 billion at Camp Williams in Utah, as well as another massive data warehouse in San Antonio. The cover story is that the warehouses are part of NSA’s new Cyber Command responsibilities. NSA sources have told WMR that the warehouses are to store the massive amount of intercepts collected by the ongoing Terrorist Surveillance Program, an above top secret program once code named STELLAR WIND by the NSA.
Nacchio was later convicted on 19 counts of insider trading of Qwest stock and sentenced to six years in federal prison. Nacchio maintained that his prosecution and conviction was in retaliation for his refusal to participate in the illegal NSA surveillance program. NSA also canceled a major contract with Qwest over its refusal to wiretap calls without warrants.
This would certainly answer who and possibly why. Following money trails to “terrorists” might seem logical, and the WTC would be the most likely spot to intercept the messages. But if it really was the NSA intercepting the pages, why post them to WikiLeaks? Did someone have a guilty conscience and wanted to come clean? Or was it the NSA’s way of saying “This is what we can find out about you, and you brain-dead sacks of sheep-shit can’t do a fucking thing about it!”
If it was the NSA, they’re not saying… and neither are their corporate allies, as one curious Indiana University grad student found out when he asked about what customers are being charged for wiretaps. From Wired:
Want to know how much phone companies and internet service providers charge to funnel your private communications or records to U.S. law enforcement and spy agencies?
That’s the question muckraker and Indiana University graduate student Christopher Soghoian asked all agencies within the Department of Justice, under a Freedom of Information Act (FOIA) request filed a few months ago. But before the agencies could provide the data, Verizon and Yahoo intervened and filed an objection on grounds that, among other things, they would be ridiculed and publicly shamed were their surveillance price sheets made public.
Yahoo! claimed that releasing such information can embarrass them, while Verizon objected on the grounds that customers may get confused and scared. Like having jumbo-jets crash into buildings won’t confuse and scare people enough.
A demonstration from Philips Electronics showing the possibilities of implanted LED “tattoos.” Pretty kinky, but there are already practical applications being considered.
The Illustrated Man. Tattoos have mostly been static graphics, limited in their usefulness in communication certain info. But researchers from the University of Pennsylvania have now come up with LED tattoos that can turn your skin into a living screen. And to help get this tech inside you, the Beckman Institute at the University of Illinois at Champaign-Urbana have found a way to use silk to implant the circuits.
A silky entry. Why silk to implant electronics? From Technology Review:
By building thin, flexible silicon electronics on silk substrates, researchers have made electronics that almost completely dissolve inside the body. So far the research group has demonstrated arrays of transistors made on thin films of silk. While electronics must usually be encased to protect them from the body, these electronics don’t need protection, and the silk means the electronics conform to biological tissue. The silk melts away over time and the thin silicon circuits left behind don’t cause irritation because they are just nanometers thick.
Silk has been used before and is approved by the US Food and Drug Administration for medical use. So far, all that’s left is to nano-size the electronics and make the connections better. Once that happens, then what?
Tramp stamp one second, instructions the next.
It’s written all over your face… and the back of your wrist. Currently the technology is limited to monochrome displays, but even so, they can be just as useful. Blood-sugar readings are just a start. From H+:
Professor Litt’s laboratory is a collaboration between Neurology, Neurosurgery, Neuroscience, and Engineering. While epilepsy is the lab’s core focus, other research includes implantable neurodevices, functional neurosurgery, network and computational neuroscience, movement disorders, intra-operative and ICU monitoring, major mental illness, and other brain network disorders.
Ultimately, they can be interfacing with the brain to allow the implantee to control the tattoos.
The future isn’t black and white. Making the millions-of-colors tattoos may still be ways off, but that isn’t stopping Wired from speculating about future uses:
GPS, with a map readout on the back of the wrist would certainly be useful, as would chips that cover your eyeballs and can darken down when the sun is shining too bright.
And a full-body display will eventually be used for advertising. Combine this with bioluminescent ink, for example, and you could turn yourself into a small, walking version of Times Square. At least, unlike a real tattoo, you can switch this one off.
I’m thinking about simply changing skin color to start, like going from Albino white to dark chocolate African, or maybe steel gray… or alien green.
Like most bloggers, Tim O’Riley (O’Riley Radar) uses Twitter which can post to his Facebook page. Last Friday (13-Nov-09), he noticed a problem with his Facebook links… and with what is happening on the net as a whole. (Click the pic to see his blog.)
A chain of broken links. Tim O’Riley tried to post a link from URL shortening service bit.ly that lead to a NASA article. Normally, Facebook would turn the plain-text link into a clickable URL, but on this occasion, it wasn’t happening (screencap). It turns out Tim wasn’t the only one with the problem. From Mashable:
if you’re posting web links (Bit.ly, TinyURL) to your Twitter feed and using the Twitter Facebook app to share those updates on Facebook too, none of those links are hyperlinked. Your friends will need to copy and paste the links into a browser to make them work.
If this is a design decision on Facebook’s part, it’s an extremely odd one: we’d like to think it’s an inconvenient bug, and we have a mail in to Facebook to check. Suffice to say, the issue is site-wide: it’s not just you.
That’s not a bug, that’s… OK, it’s a bug. Facebook quickly corrected the problem early Saturday. Apparently the snafu was Facebook’s latest effort to “protect” users from the wild west of the Internet. Facebook had the right idea, though…
I can tell you, from personal experience, that while the URL shortening makes tweeting links easier to fit into its limited text length, it is dangerous to end users since it effectively hides malicious sites that would normally be filtered or blocked. Here’s an article from Wired about the abuse of shortening services to deliver malware through Twitter. I clicked on a shortened link in Reddit expecting to read an article on robotic fish-eye-lens cameras… only to be greeted with a screen full off meatspin. That which once seen…
The Facebook link problem has been solved for now, but for Tim, it has given him some cause for alarm.
Beyond Facebook. Tim O’Riley is involved with the making of Web 2.0, and has expressed a desire to make it more open(-source). Already he sees problems arising from the likes of Apple’s iPhone:
The Apple iPhone is the hottest web access device around, and like Facebook, while it connects to the web, it plays by a different set of rules. Anyone can put up a website, or launch a new Windows or Mac OS X or Linux application, without anyone’s permission. But put an app onto the iPhone? That requires Apple’s blessing.
There is one glaring loophole: anyone can create a web application, which any user can save as clickable application on their phone. But these web applications have limits - there are key capabilities of the phone that are not accessible to web applications. HTML 5 can introduce all the new application-like features it wants, but they will work only for web applications, and can’t access key aspects of the phone with Apple’s permission. And as we saw earlier this year with Apple’s rejection of the Google Voice application, Apple isn’t shy about blocking applications that it considers threatening to their core business, or that of their partners.
Tim is concerned about the net becoming monopolized and homogenized through attrition; Survival of the fittest corporation gets control of the Internet… and all the data on it. He gives the recent introduction of Google’s Android phones and their competition with Apple iPhones as an example of what’s to come, because it’s also a sign just how competitive the web is getting, and just how powerful Google is getting, because they understand that “data is the Intel Inside” of the next generation of computer applications.
A call to arms. Tim wants to stop the corporate wars for the Internet in its tracks before they can even start with a plea to developers:
It could be that everyone will figure out how to play nicely with each other, and we’ll see a continuation of the interoperable web model we’ve enjoyed for the past two decades. But I’m betting that things are going to get ugly. We’re heading into a war for control of the web. And in the end, it’s more than that, it’s a war against the web as an interoperable platform. Instead, we’re facing the prospect of Facebook as the platform, Apple as the platform, Google as the platform, Amazon as the platform, where big companies slug it out until one is king of the hill.
And it’s time for developers to take a stand. If you don’t want a repeat of the PC era, place your bets now on open systems. Don’t wait till it’s too late.
This past Sunday’s (8-Nov-2009) 60 Minutes broadcast included this piece about Brazil’s blackout and how hackers were involved. But were hackers really involved? Anyone up for a history lesson?
Stop me if you’ve heard this before… There has been a massive blackout in Brazil affecting Rio de Janeiro , Sao Paulo, and parts of Paraguay (BBC,Guardian.co.uk). The blackout is reportedly caused by problems at the Itaipu dam, some say by a storm in the area, others say corporate incompetence is to blame.
Don’t mention that to CBS News, though. They have already decided that “hackers” were the cause. The same “hackers” who caused Brazil to go dark in 2007:
“We know that cyber intruders have probed our electrical grid, and that in other countries cyber attacks have plunged entire cities into darkness,” the president said.
President Obama didn’t say which country had been plunged into darkness, but a half a dozen sources in the military, intelligence, and private security communities have told us the president was referring to Brazil.
Several prominent intelligence sources confirmed that there were a series of cyber attacks in Brazil: one north of Rio de Janeiro in January 2005 that affected three cities and tens of thousands of people, and another, much larger event beginning on Sept. 26, 2007.
That one in the state of Espirito Santo affected more than three million people in dozens of cities over a two-day period, causing major disruptions. In Vitoria, the world’s largest iron ore producer had seven plants knocked offline, costing the company $7 million. It is not clear who did it or what the motive was.
And to back up their claim, CBS News interviews some government-military-intelligence types who say “The US is not ready for a cyber-attack,” or some sound-alike crap, I really wasn’t paying too much attention.
Chicken Little. We’ve heard the stories about multi-million dollar thefts due to hacks, and we do tend to believe them. CBS tries to make the big leap to infrastructure attacks by adding how hackers have penetrated military and government systems by leaving USB thumbdrives lying around for sheeple to find and plug into their systems, infecting them and leaving backdoors open for further intrusions and attacks. It sounds like if such an attack is possible, it was made so by clueless soldiers and wage-slaves.
But are such attacks possible, even by “foreign” government agents? I wouldn’t put it pass them… but then again, I did read The Hacker Crackdown (I have to get a review up here!), and knowing that there’s a war for control of the Internet on, I would have to call shenanigans.
Someone beat me to the phone…
Wired Calls Shenanigans. (Wired) No sooner than CBS News puts the video and transcription up for public review, Wired’s Marcelo Soares knocks the foundation out from under:
Brazilian government officials disputed the report over the weekend, and Raphael Mandarino Jr., director of the Homeland Security Information and Communication Directorate, told the newspaper Folha de S. Paulo that he’s investigated the claims and found no evidence of hacker attacks, adding that Brazil’s electric control systems are not directly connected to the internet.
Uh oh. It looks like Brazil did something right (not connecting directly to the Internet), so CBS’s hacker claim is just some gov-mil-corp scare tactic. But if hackers didn’t cause those blackouts, what did?
The earliest explanation for the blackout came from Furnas (Centrais Elétricas) two days after the Sept. 26, 2007, incident began. The company announced that the outage was caused by deposits of dust and soot from burning fields in the Campos region of Espirito Santo. “The concentration of these residues would have been exacerbated by the lack of rain in the region for eight months,” the company said.
Brazil’s independent systems operator group later confirmed that the failure of a 345-kilovolt line “was provoked by pollution in the chain of insulators due to deposits of soot” (.pdf). And the National Agency for Electric Energy, Brazil’s energy regulatory agency, concluded its own investigation in January 2009 and fined Furnas $3.27 million (.pdf) for failing to maintain the high-voltage insulators on its transmission towers.
(Note: See the original article from Wired for links to the pdf files mentioned above)
Yep, corporate incompetence caused the blackouts. Don’t mention that to CBS News, though. It’ll ruin their image as a corporate propaganda machine.
There’s a (maybe not-so) secret war going on, not just on the Internet, but for control of it. And those seeking control have good reason to be afraid of it.
It’s ON. While the activities after the Iranian elections earlier this year have mostly quieted down, the Internet’s impact can still be felt from the Twitter messages that flowed from the Muslim theocracy crackdown on dissidents. The Internet showed how powerful it can be when the truth needed to get out…
… and that is why several countries (dictatorships mostly) do not like the Internet. They are currently engaged in a war against the net, seeking to control access to it, and possibly control of it.
The only thing they have to fear is… The Internet has become known as a form of “disruptive technology” because, as WikiPedia’s Disruptive Technology article points out: Disruptive technologies are particularly threatening to the leaders of an existing market, because they are competition coming from an unexpected direction. When you prefer to lead with an iron fist, competition is the last thing you want, and the global nature of the Internet magnifies that competition billions of times over as a global community of the common people (as opposed to controllable politicos) outside your stronghold are now turned against you.
The power of technology - such as blogs - meant that the world could no longer be run by “elites”, Mr (Gordon) Brown said.
For those type of tyrants, the only viable solution is to cut the cables of the Internet; Put up firewalls and filters to weed out such disruptions and the like:
Most of these actions are aimed at stifling political debate. “Political filtering is the common denominator,” says Helmi Noman of the Berkman Center for Internet and Society in Boston, who compiled the report. “It’s the main target.”
…
Governments also keep tabs on who is using the internet and what they are viewing. In March, newspapers in Saudi Arabia reported that police had started visiting internet cafes to ensure that owners had installed cameras to monitor users, as the country’s law requires. In Jordan, cafe owners have to record their customers’ names and monitor the sites they visit.
Noman says that filtering and monitoring have become more widespread as the internet’s role in political activity has increased. “More activists are going online and more activists are being created online,” he says.
Monitoring has become more widespread as the internet’s role in political activity has increased
What’s happening in the region is echoed to some extent in most other parts of the world. Online users almost everywhere are subject to some kind of censorship, the ONI says.
Such activities range from the use of firewall blacklists to more personal Internet attacks. How personal? Just ask this Georgian blogger. You can find other such anti-Internet, or at least anti-blogging, threats like jail time and possible military strikes against bloggers if you search the net enough.
While more democratic nations don’t experience that type of political censorship (unless they watch Fox “News”), there have been more “subtle” ways to silence websites by calling “child pornography” like Australia’s recent (epically failed) attempt at Internet censorship. But politics and porn aside, there’s an even bigger threat to the Internet, in case you haven’t heard…
Don’t fuck with our profit margins! BREAKING NEWS: The Pirate Bay has been (temporarily) taken offline by their ISP who was “threatened” with “legal action.” (TorrentFreak). They already have a new home (for now), though their tracking system is still down.
Ever since the Net exploded in the mid 90’s, everybody has been trying to make a profit off it. Not just the advert-perverts, but the ISPs who see themselves as “gatekeepers” of the Internet. They have been trying to throttle people’s use of the Internet by claiming that the bandwidth is running out, only they just want more of that bandwidth to force more adverts (and government propaganda) down our throats. And if they can’t do that, they’ll just let the NSAs tap whatever wires they want so they can call high-bandwidth users “terrorists.” That might free up some bandwidth and cut down on all the torrenting going on.
Freedom Fighters There have been some calls for a Digital Bill of Rights, but whether that would be any more effective in keeping people safe from the Gov-Telco-Media complex than a stash of high-powered firearms is questionable. Until we can get the GTM thugs offline permanently, best just keep all your drives and transmissions encrypted, and invest in firearms. In the meantime, I’m going to see if I can find more info about HP’s Darknet project.
NY Times reporter John Markoff expresses the concerns of some scientists who want to slow or stop research into robotic autonomy, fearing that loss of human control may lead to a “robot revolt.”
Cyberphobes, please.
Impressed and alarmed by advances in artificial intelligence, a group of computer scientists is debating whether there should be limits on research that might lead to loss of human control over computer-based systems that carry a growing share of society’s workload, from waging war to chatting with customers on the phone.
Their concern is that further advances could create profound social disruptions and even have dangerous consequences.
Earlier this year (in February) a group of scientists from the Association for the Advancement of Artificial Intelligence met in California’s Asilomar Conference grounds to discuss possible impacts of human-level artificial intelligences, aka “The Singularity.” A report from the conference will be released later this year… we hope. The conference was about discussing certain issues that might arise due to the Singularity and loss of human control of cybernetic technologies. Topics included the possible effects of a “robotic takeover” leading to massive job loss, legal and ethical problems in dealing with human-like AIs, and maybe some plans in case a HAL, SHODAN, or Skynet should go online.
The Singularity Time Table. Depending on who you ask, the Singularity will appear definitely before 2050, and possibly as soon as 2020. Even so, that may be latter than we think, as scientist say that they can create a working human brain in 10 years. More recently, Chinese scientist have reportedly been able to grow mice from skin. It shouldn’t be too hard to think of human clones before long, and the possibilities of the Singularity. But just as another meeting at Asilomar dealt with genetics in the mid-70s, this conference deals with cybernetics. Specifically, how to proceed with AI research that will benefit humanity and eliminate the possibilities of a HAL/SHODAN/Skynet.
The A.A.A.I. report will try to assess the possibility of “the loss of human control of computer-based intelligences.” It will also grapple, Dr. Horvitz said, with socioeconomic, legal and ethical issues, as well as probable changes in human-computer relationships. How would it be, for example, to relate to a machine that is as intelligent as your spouse?
Dr. Horvitz said the panel was looking for ways to guide research so that technology improved society rather than moved it toward a technological catastrophe. Some research might, for instance, be conducted in a high-security laboratory.