Skip to main content

Home/ Indie Nation/ Group items tagged destructive

Rss Feed Group items tagged

John Lemke

Destructive cyber attack inevitable: NSA chief - 0 views

  •  
    The US National Security Agency (NSA) chief General Keith Alexander, pictured here in 2010, on Thursday urged top computer security specialists to harden the nation's critical infrastructure against inevitable destructive cyber attacks. LUMPY HAS NOTES BELOW THISQUOTE Ties in with Stuxnet and Anonymous and Antonymous having Stuxnet.  Might make a nice security and malware 30 news shows
John Lemke

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputatio... - 0 views

  • “The Art of Deception: Training for Online Covert Operations.”
  • Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. 
  • Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends. The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
    • John Lemke
       
      Wow, how is not changing pictures and creating false victims not identity theft and conspiracy?  
  • ...4 more annotations...
  • it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption.
    • John Lemke
       
      Not only are you now guilty until proven innocent but, if you are guilty enough, we shall create a situation so that you are.
  • Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).
    • John Lemke
       
      So one of the guys who advocates this and approves of it, gets to be on the NSA review committee?  Isn't that like Ted Kennedy on the Ethics Review Committee or the Warren Commission?
  • Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
John Lemke

Foxconn worker riot closes factory | Ars Technica - 0 views

  • Early Monday morning, Foxconn released a statement indicating that the riot started as a personal disagreement between factory workers in a dormitory and was eventually brought under control by police, but this clashes with reports trickling in from users of China's version of Twitter, Sina Weibo. Much like with the situations in Egypt and other Arab Spring countries earlier this year, microbloggers are painting a different picture than the one presented by official sources; numerous Weibo posts indicate that the riots were started not by a fight between workers in off-campus housing, but instead by security guards beating one or more workers nearly to death. Regardless of the cause, pictures leaking out from the scene show some destruction, including broken windows and a toppled guard post building.
John Lemke

Elusive particle that is its own antiparticle observed -- ScienceDaily - 0 views

  • Using a two-story-tall microscope floating in an ultralow-vibration lab at Princeton's Jadwin Hall, the scientists captured a glowing image of a particle known as a "Majorana fermion" perched at the end of an atomically thin wire -- just where it had been predicted to be after decades of study and calculation dating back to the 1930s.
  • The hunt for the Majorana fermion began in the earliest days of quantum theory when physicists first realized that their equations implied the existence of "antimatter" counterparts to commonly known particles such as electrons. In 1937, Italian physicist Ettore Majorana predicted that a single, stable particle could be both matter and antimatter. Although many forms of antimatter have since been observed, the Majorana combination remained elusive.
  • Despite combining qualities usually thought to annihilate each other -- matter and antimatter -- the Majorana fermion is surprisingly stable; rather than being destructive, the conflicting properties render the particle neutral so that it interacts very weakly with its environment. This aloofness has spurred scientists to search for ways to engineer the Majorana into materials, which could provide a much more stable way of encoding quantum information, and thus a new basis for quantum computing.
1 - 4 of 4
Showing 20 items per page