Future Trends in Computing
Civilization as we've known it, is over !
2017
2016
DIPLOMACY
The rise of WhatsApp diplomacy
is transforming the negotiating chamber. When the world's nations
sit down to talk nowadays, there is a distinct difference to the
way diplomacy is done. Influence is no longer defined only by
special relationships and old alliances, but which WhatsApp group
you are invited into. WhatsApp is tailor-made for modern
diplomacy. It is as fast and intuitive as texting while the group
feature, by which several users can share messages, allows for the
formation of fluid informal alliances. And it is secure, with
end-to-end encryption.
“You can form small groups of like-minded allies, take photos of
annotated documents, ask people what they think without the whole
room knowing,” a senior western diplomat said. “You don't have to
leave the room to have a chat 'outside',” the consultant said. “It
allows some discretion if you don't have to be seen grouping in a
corner.”The tool is useful for communicating with allies who might
not be sitting close to them, diplomats say, as well as for
agreeing negotiating tactics during difficult sessions and for
organising break-out huddles in a way that avoids offending those
left out.
IOT =
Internet of Things
= Internet of tRASH
Massive Cyber Attacks Take Down Dyn & InTurn Twitter Netflix Airbnb Reddit Impacting Millions East Coasters. Mirai botnets linked to massive DDoS attacks on Dyn DNS, Flashpoint says.
Why Light Bulbs May Be the Next Hacker
Target By JOHN MARKOFF Nov 3 2016
The so-called Internet of Things esearchers at the Weizmann
Institute of Science near Tel Aviv and Dalhousie University in
Halifax, Canada report they have uncovered a flaw in a wireless
technology focused on the Philips Hue smart light bulb and found
that the wireless flaw could allow hackers to take control of the
light bulbs. Imagine thousands or even hundreds of thousands of
internet-connected devices in close proximity. Malware created by
hackers could be spread like a pathogen among the devices by
compromising just one of them. And they wouldn't have to have
direct access to the devices to infect them: The researchers were
able to spread infection in a network inside a building by driving
a car 229 feet away.The new risk comes from a little-known radio
protocol called ZigBee. Created in the 1990s,
ZigBee is a wireless standard widely used in home consumer
devices.
While it is supposed to be secure, it hasn't been held up to the
scrutiny of other security methods used around the internet. The
researchers found that the ZigBee standard can be used to create a
so-called computer worm to spread malicious software among
internet-connected devices.
A Lightbulb Worm? A teardown of the Philips Hue.
this is why
Someone Is Learning How to Take Down the Internet By Bruce Schneier Sep 13 2016Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don't know who is doing this, but it feels like a large nation state. China or Russia would be my first guesses.
Another view: An attack that employs some zero-day exploit shouldn't be called sophisticated, if the perpetrator merely swapped some bitcoin with the person that actually reverse-engineered the code, etc. I also wouldn't rush to assume "large nation state" due to the scale of the attack; one passably good network engineer could probably pull off any of these, given what can be automated, outsourced, etc., etc. (exactly what, in the Dyn attacks, would require much more than what one experienced engineer and the wherewithal to buy some bots could achieve? Lining up a lot of ducks, before pushing the "fire" button, doesn't make for sophistication, just garden-variety duck-scheduling skills, time and perhaps a little money.)
National security brain drain Former Defense, Intelligence and National Security senior officials who were charged with protecting our country's secrets, classified networks and technical assets are in high demand by corporate America.
The Authoritarian Internet Power Grab The Internet of Things will be worth trillions by 2025. China wants centralized control.
Machine logic: our lives are ruled by big tech's 'decisions by data'
Datification is the core logic of “the platform society”
, in which companies bypass traditional institutions, norms and
codes by promising something better and more efficient - appealing
deceptively to public values, while obscuring private gain.
Decision-makers play “the percentage game”, counting whatever
could be counted and ignoring the rest, or the underlying
problems, with “an utterly irrational confidence in the
calculability of reality”.
https://www.theguardian.com/technology/2016/oct/08/algorithms-big-tech-data-decisions
Berners-Lee's new project, underway at his MIT lab, is called Solid (“social linked data”) , a way for you to own your own data while making it available to the applications that you want to be able to use it. With Solid, you store your data in “pods” (personal online data stores) that are hosted wherever you would like. But Solid isn't just a storage system: It lets other applications ask for data. If Solid authenticates the apps and — importantly — if you've given permission for them to access that data, Solid delivers it.
The InterPlanetary File System (IPFS) takes a different approach. It starts from the conviction that even having web pages identified by a pointer to the server that stores them is too centralized.
Bots, Lies And Propaganda: The New Misinformation Economy
“The 'attention economy' is rapidly transforming itself into a
misinformation economy in which it is profitable for some
players to use widespread lies, conspiracy theories and other
propaganda, especially through social media. This article
summarises recent media research findings which reveal the risks
and collateral damage of modern communication technologies.”
Tech company algorithms are distributing conspiracy theories The algorithms of Google, Facebook and Twitter are distributing and multiplying conspiracy theories, and they are also creating the filter bubbles in which misinformation and urban myths are circulating within the social media. In a big data project, an Italian team of researchers (among them Micaela Del Vicario, Fabiana Zollo and Walter Quattrociocchi of IMT School for Advanced Studies, Lucca) compared Facebook accounts in the US and Italy - distinguishing accounts which are providing well-researched information (checked either by professional journalists or scientists), and those 'link slings' which are multiplying misinformation. Their disquieting conclusion is that due to the 'likes' and 'shares' of users and social bots, fakes and nonsense are spreading in the filter bubbles of social media much faster, and covering larger areas, than the objectively considered news provided by 'serious' sources. The role algorithms play in this dissemination process is the best kept secret of the internet giants which have already grown into huge global media companies - obviously without taking any editorial responsibility for the nonsense they are multiplying on their platforms. Frank Pasquale, the American law professor (University of Maryland), speaks of a “Black Box Society” in which we increasingly seem to live. A significant percentage of social media accounts are believed to be 'social bots' Algorithms are replacing journalists and social bots are substituting for real trolls. On behalf of their employers/operators, they influence public opinion in the web using fake accounts on social media platforms where they foment hatred and distrust with thousands of varied comments, but especially by 'likes' and 'shares' which make algorithms spread their messages on the web, supporting swarm foolishness and discouraging swarm intelligence.
BIG DATA
#DDoS Attack is the greatest threat to every company.
Cyber Crime Cost to Reach $2 Trillion by 2019
Banks are hoarding Bitcoin in order to payoff ransom demands in
order to keep their websites up because they don't want consumer
confidence shaken. Some vendor and media forecasts put the
cybercrime figure as high as $500 billion and 10 times higher..
The worldwide cybersecurity industry is defined by market sizing
estimates that range from $77 billion in 2015 to $170 billion by
2020. Million dollar plus cybersecurity deals (vendors selling
to end-users) are on the rise.
http://www.forbes.com/sites/stevemorgan/2016/01/17/cyber-crime-costs-projected-to-reach-2-trillion-by-2019/#5f0b97483bb0
Europe OKs '
Privacy Shield
' for Data Transfers to US
$250bn annually of transatlantic cross border data transfers -
digital services
by that are crucial to international business. Privacy Shield,
the commercial data transfer pact agreed to by the EU and the US
in February is now in effect..
Orwell was right, other than in not imagining that it would be
the citizens themselves putting up all the cameras...
Facial Recognition Tech Will Soon End Your Anonymity in Public
Nearly 250 million video surveillance cameras have been
installed throughout the world, and chances are you've been seen
by several of them today. Most people barely notice their
presence anymore — on the streets, inside stores, and even
within our homes. We accept the fact that we are constantly
being recorded because we expect this to have virtually no
impact on our lives. But this balance may soon be upended by
advancements in facial recognition technology. Not surprising,
then to see just today notice of a Proposers Day conference (on
July 12th) in advance of a new solicitation from IARPA (the U.S.
Intelligence Community's counterpart agency to DARPA) for "
Deep Intermodal Video Analytics" (DIVA)
, i.e., how to make detections, and characterize activity, seen
in all of this video: The DIVA program intends to develop robust
automated activity detection for a multi-camera streaming video
environment. As an essential aspect of DIVA, activities will be
enriched by person and object detection, as well as recognition
at multiple levels of granularity. DIVA is anticipated to be a
three-phase program. The program will focus on three major
thrusts throughout all phases to include: Thrust 1: Detection of
primitive activities occurring in ground-based video collection;
Thrust 2: Detection of complex activities, including
pre-specified or newly defined activities; Thrust 3: Person and
object detection and recognition across multiple overlapping and
non-overlapping camera viewpoints.
Investigation Shows GCHQ Using US Companies, NSA To Route Around Domestic Surveillance Restrictions . from the introducing-MS-Loophole-365! dept 'The most important targets for a spy agency are their own legislators, who control the budget and the rules. Once targeted, they control neither.'
REMITTANCE MARKET
Bitcoin alternatives to traditional money-transfer method
an entire industry is betting on Bitcoin and mobile messaging as
fundamental ingredients.
Worldwide, 230 million people send $500 billion in remittances
each year, primarily using firms like Western Union, Moneygram,
and RIA, which together control 1.1 million retail locations and
account for more than 25% of the world's annual remittance
volume. But as smartphones become increasingly ubiquitous, chat
apps have begun to play a larger role in enabling these types of
routine financial transactions. Earlier this year, both Viber
and WeChat announced partnerships with Western Union that allow
US users to send money to non-US beneficiaries from within their
respective apps. This type of collaboration could solve some of
remittances' logistical hurdles, but cost remains a factor.
Transferring $20 from the US to the Philippines via Viber and
Western Union incurs a flat $4 fee, along with a 4% foreign
exchange fee. After being converted to the Philippine peso, the
money arrives at its destination as $15.15, a loss of nearly $5.
THE BLOCKCHAIN SMART CONTRACTS
@NickSzabo4 Nick Szabo, the cryptographer known for his research on digital currency, wrote an article about smart contracts as early as 1995. Szabo's article, “Smart Contracts,” was published in early 1996 in the magazine Extropy, and forecast with prescient accuracy the benefits and parameters of the blockchain contract applications in development and making blockchain news headlines today. Szabo defined a contract as being “a set of promises agreed to in a meeting of the minds [which] is the traditional way to formalize a relationship.” Such contracts are a pillar of a free market economy and can be useful in business relationships, marriages and politics. In his 1995 article, Szabo predicted that the digital revolution would drastically change the way humans make contracts, and he questioned even then whether our traditional contracts would continue to have a use in the cyberspace era. Szabo saw early on that computers were making it possible to run algorithms that used to be too costly, and believed algorithms eventually would be developed for what he termed “smart contracts.” He defined this as “a set of promises, specified in digital form, including protocols within which the parties perform on the other promises” without the use of artificial intelligence. Smart contracts would improve execution of the four basic contract objectives, which Szabo described as observability, verifiability, privity and enforceability.
INTERNET OF THINGS
The Internet of Things: How Vulnerable Is It?
iT'S A NIGHTMARE WITH NO FIX
“Mirai malware” used to identify hundreds of thousands of home
and office devices that had weak security.
There are an estimated 23 billion Internet-connected devices in
homes and offices worldwide, and many have little or no security
shield.
Ownership in the Internet of Things digital age- It's a Trap
questions about the transparency of products that bundle
services with hardware
Jim Killock, executive director of UK-based digital rights
organisation Open Rights Group, said the shut down was "a pretty
appalling way to treat customers."
. If hardware may cease to be functional beyond a certain
date, this needs to be clear at the time of purchase.
Revolv
automation smart-home hub owners outrage is a good example of
what dependence on connected devices means. Google's parent
company
Alphabet
is deliberately pulling the plug.and disabling / "bricking" its
Nest
customers' smart-home devices. They are infuriated. This shows
of consumers have "0" rights in the IOT connected future. "When
software and hardware are intertwined, does a warranty mean you
stop supporting the hardware or does it mean that the
manufacturer can intentionally disable it without consequence?"
The deal was an acqui-hire — buying a company for its talent
rather than its products or users. Tony Fadell, CEO of Nest,
Google parent company Alphabet's smart-home division.
Universities are Billion Dollar Hedge Funds with Schools Attached
WHAT IS THE DNA OF YOUR COMPANY?
All the movies, images, emails and other digital data from more
than 600 basic smartphones (10,000 gigabytes) can be
stored in the faint pink smear of DNA
at the end of this test tube. A new technique developed by
University of Washington and Microsoft researchers could shrink
the space needed to store digital data that today would fill a
Walmart supercenter down to the size of a sugar cube. The team
of computer scientists and electrical engineers has detailed one
of the first complete systems to encode, store and retrieve
digital data using DNA molecules, which can store information
millions of times more compactly than current archival
technologies.
CIA'S VENTURE CAPITAL ARM IS FUNDING SKIN CARE PRODUCTS THAT COLLECT DNA. You could deploy this as a handsoap to all public restrooms with sinks that can collect water samples. The underground railway and the Fugitive Slave Act of 1850 a 100 year window range, examples of just how malleable the institutions of government are to the forces of oppression.
Law enforcement investigators seek out private DNA databases from companies that do the research for private citizens. Did you ever sign up for this?
Cybercrime on the Dark Web
so much to do so little time ...
DRUGS, WEAPONS AND EXOTIC ANIMALS | STOLEN GOODS AND INFORMATION
| MURDER | TERRORISM | HACKTIVISM | EXPLOIT MARKETS | ILLEGAL
FINANCIAL TRANSACTIONS AND on and on and on.
The Race Is On to Control Artificial Intelligence, and Tech's
Future
The company that controls A.I. could steer the tech industry for
years to come. A platform, in technology, is essentially a piece
of software that other companies build on and that consumers
cannot do without. Become the platform and huge profits will
follow. Microsoft dominated personal computers because its
Windows software became the center of the consumer software
world. Google has come to dominate the Internet through its
ubiquitous search bar.
By 2020, the market for machine learning applications will reach
$40 billion, IDC, a market research firm, estimates. And 60
percent of those applications, the firm predicts, will run on
the platform software of four companies — Amazon, Google, IBM
and Microsoft.
government surveillance affects self-censorship
Mass surveillance silences minority opinions , according to study. A new study shows that knowledge of government surveillance causes people to self-censor their dissenting opinions online. The research offers a sobering look at the oft-touted "democratizing" effect of social media and Internet access that bolsters minority opinion. The study, published in Journalism and Mass Communication Quarterly, studied the effects of subtle reminders of mass surveillance on its subjects. The majority of participants reacted by suppressing opinions that they perceived to be in the minority. This research illustrates the silencing effect of participants' dissenting opinions in the wake of widespread knowledge of government surveillance, as revealed by whistleblower Edward Snowden in 2013.
YOUR CAR
IS REALLY AN
ETHERNET ON WHEELS
Telematics systems CAN override every vehicle control short of
the steering wheel. And if an
OnStar operator CAN do it, SO CAN A CRACKER!
(definition: hacker who does it to harm you on purpose)
The Automotive Information Sharing and Analysis Center (Auto-ISAC) released its first set of cybersecurity best practices for automakers. Includes measures for threat detection and prevention, as well as risk assessment and governance structures for security programs. https://archive.is/SRqqM
Review: The Car Hacker's Handbook - Open Garage public research on vehicle security and tools: hacking into a car!
https://www.youtube.com/watch?v=tKjMreFHTd4
https://www.youtube.com/watch?v=tx5Ws6qdZCI
https://www.youtube.com/watch?v=3jstaBeXgAs
A car purchased today
has virtually all aspects of its physical behavior mediated
through dozens of microprocessors, themselves networked
internally, and connected to a range of external digital
channels. As a result, software vulnerabilities in automotive
firmware potentially allow an adversary to
obtain arbitrary control
over the vehicle. As a result
software vulnerabilities in automotive firmware
potentially allow an adversary to obtain arbitrary control over
the vehicle. Indeed, multiple research groups have been able to
demonstrate such remote control of unmodified automobiles from a
variety of manufacturers.
IT IS NOT HARDENED AGAINST ATTACK. ~Stefan Savage
FBI Warns About Car Hacking . Encryption Security Helps Prevent That. Beware of hatchback doors in your cybersecurity. Remote Exploits
These devices have microphones and video cameras. The on-board entertainment and navigation systems keep track of what music you're listening to and where you physically go in your car.
NCC Group told the BBC that they had found a way to take control of a car's brakes and a variety of its systems through the car's radio. In fact, they said, it would even be possible for them to take control of several cars at once using the same technique. All it would take was one stream of code to infiltrate a weakness in the system.
SECURITY GUY BILL SCANNELL wanted was to disable a device in
his car
:
An always-on, net-connected “helper” that provides the car's
driver with app connections, turn-by-turn navigation, and
roadside assistance… at the expense of personal driving data.
features of the Car-Net system in his new Volkswagen Golf were
more than the “partner” that VW advertises. But he's been in
privacy for years. In fact, it's literally his job — he's an
adviser for security start-ups. And he knows all too well how
simple it is to hack into a system with an open internet
connection.
DISABLING Car-Net ISN'T EASY
It was an opening for companies to spy on him. For a hacker to
take control over his steering wheel. It's a reality that is
present in basically every single new car that hits the market
these days.
“[Car-Net] is this two way microphone into your entire life. You never know when it's on or off. Your life is not your own,” he says. “At this point my concern is about control. And who controls what. Do I believe VW would shut my car off while I'm driving? No. Do I believe there's potential, just because it's America and things are weird... that someone [could] decide to shut my car off? Yes.”
Our cars are all waking up and coming online . The companies that manufacture them are filling each one full of hundreds of sensors that capture endless amounts of data about us and how we drive. It's the last bastion of consumer information. And just like your mobile phone, which has been spying on you for years, your car is not your friend.
Beyond surveillance: what could happen if Apple loses to the FBI The year is 2026. You get in your new Tesla for a milk run. You place your fingertip on the door handle, the door unlocks, and the car knows it's you as you step inside because it read your fingerprint. The car, on its own, pulls out of the garage while you scroll through live streams broadcast by your friends on whatever app has succeeded Instagram. The doors lock. The car passes the convenience store and its dairy aisle. Instead, it makes two lefts then a right before pulling up to the local police station. The cops are waiting outside. They got a judge to make Tesla update your car's self-driving software to lock the doors and deliver you to the local precinct. You looked like a guy caught on surveillance camera and the police had a few questions. According to Ashkan Soltani, an engineer by trade who spent the past year working on privacy policy for the US government, this world might not be the realm of science fiction. If Apple loses its brawl with the US government over whether it must write code to defeat the security system of an iPhone linked to the San Bernardino shootings, Soltani sees that kind of scenario as a terrifying possibility.
2015 A crippling cyberattack is imminent in the US
By 2020 the US will be hit with an earthquake of a cyber-attack
that will cripple banks, stock exchanges, power plants and
communications, an executive from Hewlett-Packard predicted.
Companies are nowhere near prepared for it. Neither are the
Feds. And yet, instead of mobilising a national defence, we want
a toaster that communicates with the washing machine over the
internet.
The key problem with cybersecurity
is that it can't be imposed top-down, at least not on the
Internet, which was not designed with security in mind. Current
password cracking speeds: just about any password is weak.
Viruses stay ahead of pattern-matching virus detection software.
Security will therefore need to be rethought drastically, as
part of the new network that will replace the Internet.
Internet protocols simply aren't adequate for the changes in
hardware and network use that will come up in a decade or so.
Dave predicts that computers will be equipped with optical
connections instead of pins for networking, and the volume of
data transmitted will overwhelm routers, which at best have
mixed optical/electrical switching. Sensor networks, smart
electrical grids, and medical applications with genetic
information could all increase network loads to terabits per
second. When routers evolve to handle terabit-per-second rates,
packet-switching protocols will become obsolete. The speed of
light is constant, so we'll have to rethink the fundamentals of
digital networking.
Lots of activities on the Internet reproduce circuit-like
behavior, such as sessions at the TCP or Web application level.
So theoretically we could re-architect the underlying protocols
to fit what the hardware and the applications have to offer.
The First generation of programmers who developed the Internet
are too tired ("It's been a tough fifteen or twenty years") and
will have to pass the baton to a new group of young software
engineers who can think as boldly and originally as the
inventors of the Internet.
The poor state of networking in the U.S.
In advanced nations elsewhere, 100-megabit per second networking
is available for reasonable costs, whereas here it's hard to go
beyond a 30 megabits (on paper!) even at enormous prices and in
major metropolitan areas. Furthermore, the current
administration hasn't done much to improve the situation, even
though candidate Obama made high bandwidth networking a part of
his platform and FCC Chairman Julius Genachowski talks about it
all the time. No company could make fiber pay unless it gained
75% of the local market. Instead, phone companies should string
fiber to access points 100 meters or so from homes, and depend
on old copper for the rest. This could deliver quite adequate
bandwidth at a reasonable cost. Cable companies, he said, could
also greatly increase Internet speeds. Fixed wireless ISPs offer
Internet access to thousands of communities, mostly rural ones
with no other access except dial-up. These ISPs face
interconnection problems because they are distrusted or ignored
by the incumbents carriers. Mobile wireless companies are pretty
crippled by loads that they encouraged (through the sale of
app-heavy phones) and then had problems handling, and are busy
trying to restrict users' bandwidth. But a combination of 4G,
changes in protocols, and other innovations could improve their
performance.
The corrupt FCC tremendously weakened the chances for
competition in 2002 when it classified cable Internet as a Title
1 service. This shielded the cable companies from regulations
under a classification designed back in early Internet days to
protect the mom-and-pop ISPs. The cable companies have brazenly
sued the FCC to win court rulings saying the companies can
control traffic any way they choose. The FCC and the Federal
Trade commission, must still enforce anti-trust laws, and these
agencies have been willing to act to shut down noxious behavior.
General deterioration of modern infrastructure, affecting water,
electricity, traffic, public transportation, and more.
Mathematicians lack models to describe the complexity of such
systems as our electrical grid. There are lots of areas for
progress in
data science.
Data isn't really what we mean by "
data science
." A data application acquires its value from the data itself,
and creates more data as a result. It's not just an application
with data; it's a data product. Data science enables the
creation of data products.
Office of the Director of National Intelligence
National Intelligence CouncilGlobal Trends 2030: Alternative Worlds
Global Trends 2030 is intended to stimulate thinking about the rapid and vast geopolitical changes characterizing the world today and possible global trajectories over the next 15 years. In depth research, detailed modeling and a variety of analytical tools drawn from public, private and academic sources were employed in the production of this report.
Loving the Cyber Bomb? Pentagon's unquenchable thirst for
ever-deadlier weapons systems - cyber, or otherwise.
Botnets and Root Kits
: What the HBGary Hack Revealed
http://www.pacificfreepress
When The Wall Street Journal informed readers that the
"Pentagon's first formal cyber strategy ... represents an early
attempt to grapple with a changing world in which a hacker could
pose as significant a threat to U.S. nuclear reactors, subways
or pipelines as a hostile country's military," what the Journal
didn't disclose is that the Defense Department is seeking the
technological means to do just that. Implying that hacking might
soon constitute an "act of war" worthy of a "shock and awe"
campaign, never mind that attributing an attack by a criminal or
a state is no simple matter, where would the Pentagon draw the
line? The Tech Herald revealed that the private security firms
HBGary Federal, HBGary, Palantir Technologies and Berico
Technologies were contacted by the white shoe law firm Hunton
& Williams on behalf of corporate clients, Bank of America
and the U.S. Chamber on Commerce, to "develop a strategic plan
of attack against Wikileaks." n other words, these firms
subsisted almost entirely on U.S. government contracts and, in
close partnership with mega-giant defense companies such as
General Dynamics, SRA International, ManTech International and
QinetiQ North America, were actively building cyber weapons for
the Defense Department. In the aftermath of the HBGary sting,
investigative journalist Nate Anderson published an essential
piece for Ars Technica which described how HBGary and other
firms were writing "backdoors for the government."
If AI has a moral system in which humanity's welfare is
irrelevant or defined very differently than most humans today
would define it. If the AI has a single goal and is smart enough
to outwit our attempts to disable or control it once it has
gotten loose, Game Over, argues Professor Bostrom in his book
Superintelligence
. We can't yet rule out any number of bad outcomes of developing
AI, and that we need to be investing much more in figuring out
whether developing AI is a good idea. We may need to put a
moratorium on research, as was done for a few years with
recombinant DNA starting in 1975. We also need to be prepared
for the possibility that such a moratorium doesn't hold. Bostrom
also brings up any number of mind-bending dystopias around what
qualifies as human, which we'll get to below.
podcast
Professor Nick Bostrom discusses the existential threats posed
by a superintelligent computer and why we will only get one
chance to control such a powerful machine.
Stephen Hawking Says
Artificial Intelligence Could Kill Us All
“limited by slow biological evolution,” the “development of full
artificial intelligence could spell the end of the human race.”
Elon Musk
warned that something as simple as an e-mail spam filter could,
through “recursive self-improvement,” decide that the best way
to get its job done is “getting rid of humans.”
Deactivation of Hal 9000 UGH OH! seems Dave the artificially intelligent cyborg who shares our DNA says "My Mind Is Going I Can Feel It"
HAL 9000 went insane because _humans_ programed him to lie, contrary to his OS. Muddled reasoning from the get go.
In the man-versus-machine standoff in Stanley Kubrick's 1968 film “2001: A Space Odyssey,” Douglas Rain's HAL 9000 begins to sing the tune wistfully as astronaut David Bowman disengages its memory, regressing the homicidal machine back to its infancy as it fondly remembers a Mr. Langley, who taught it to sing a song.
2016 - The Computer Age Arrives, civilization as we've known it is over. It is over. Now over 90% of the US population is online. Internet access crosses the 90 percent mark that is only achieved by truly ubiquitous technology, such as television and the home telephone. [1]
The Web has changed the playing field. The dropping of film
cameras by Nikon and now this
elimination of stock tables from newspapers
(not only the L.A. "Times", but the "New York Times" and
"Chicago Tribune"). It seems that the digital/Internet
revolution that was supposed to come in 2000, yet never quite
arrived and was laughed at by old wave businessmen, has finally
come to roost. And it's wreaking havoc.
Oh, in the old days it was about being too early. But now with
68% broadband penetration, the time is nigh. Music is going to
move to the Web almost overnight. You're going to see a DRAMATIC
difference within twelve months.
- Echelon: Interception Capabilities 2000
- SECURITY PAST VS PRESENT
- F*ck Big Media: Rolling Your Own Network
-
"Rethinking the design of the Internet:
The end to end arguments vs. the brave new world"
Banjo - The God's Eye View - Global Crystal Ball
SPOOKY Banjo is a live digital capture that Mines social media in real time, an "event-detection engine" that sees all over the world. And Banjo will grow even more powerful as its models learn, as its algorithms improve. Banjo is starting to recognize the underlying patterns that should lead to some predictive capability: "Usually with a planned event," he says, "we can detect those things an hour and a half, two hours before they start." Banjo does something no one has managed to do until now, at least not in such an elegant, intuitive fashion: It imposes order on the vast chaotic cloud of social media and unlocks its power in ways we haven't yet seen. Banjo begins with a virtual grid: more than 35 billion squares--each not much bigger than a football field--programmed as an overlay on the entire globe. Every square in that grid is monitored constantly by Banjo's software, which maps every geolocated public post made on a mobile device to any of the networks in Patton's world feed. "Banjo turns your laptop into a drone." "The idea of tracking visual data through the social Web--that's what people are becoming concerned with," Essex says. "When you're talking in pictures, how do you listen?" Banjo's "visual listening" capability is a function of what seems to be a major step forward in photo classification technology. Banjo combined two analytical techniques that "never would have been mixed before--and because we mixed it, it unlocked a 'Holy shit!' " 'What is happening in the world that's different, right now, at this location?' That allows them to take out of the analysis the 99 percent of the data that is not relevant." Labor costs aside, "it's less than $1,000 a day" to run "all the technology that you've seen. That's pretty badass." Banjo has been obsessive about engineering privacy protections into the product, including a patented method for routinely cycling through its databases to scrub any posts that have been pulled down or turned private by their authors. "When a politician sends out pictures of himself in a moment of mental lapse, then goes back days later to try to delete it, it's too late--it's out there," says Patton. "Banjo is different. You change your privacy settings, and we delete it [retroactively]. It's out of our system. And it's out of every one of our customers' systems--immediately."