The Pentagon is preparing for the first time to let documents graded as “impact level 6,” or sensitive, high risk data, be stored on the digital cloud to be shared around the world on the web.
A request for information published [PDF] earlier this month by the United States Defense Information Systems Agency reveals that the Pentagon wants IT companies that administer cloud services, like the one run by Amazon, to provide the United States government with a plan for a similar system where classified information can be shared securely. Continue reading »
- All Supply of the $1,200 Machine for Making Guns Has Sold Out in 36 Hours (ZeroHedge, Oct 6, 2014):
Last May, I covered the work of Defense Distributed with regard to its building of tools for individuals to 3D-print their own firearms in the post. Meet “The Liberator”: The World’s First Fully 3D-Printed Firearm, In it, I noted:
3D-printing, like decentralized crypto currencies, have the potential to change the world in which we live in extraordinary ways. Ways that are almost inconceivable at this point given we are so early in the game. More than anything else, these technologies can empower the individual like never before, and I think that is generally a very good thing.
While all sixteen pieces of the Liberator were printed in ABS plastic, the $1,200 computer-controlled (CNC) milling machine called the “Ghost Gunner,” is capable of automatically carving polymer, wood, and metal in three dimensions. More from Wired: Continue reading »
- UK school to fingerprint children like criminals in order to monitor their diets (Natural News, Sep 29, 2014):
In another stellar example of the nanny state run amok, a public school in Britain has taken to fingerprinting students so officials there can keep an eye on what they are eating.
According to the Express & Star, a British newspaper, the Redhill School in Stourbridge is introducing a controversial (and costly) new biometric system “as part of a plan to implement a cashless system throughout the school.” Continue reading »
- New ‘Bash’ software bug may pose bigger threat than ‘Heartbleed’ (Reuters, Sep 24, 2014):
A newly discovered security bug in a widely used piece of Linux software, known as “Bash,” could pose a bigger threat to computer users than the “Heartbleed” bug that surfaced in April, cyber experts warned on Wednesday.
Bash is the software used to control the command prompt on many Unix computers. Hackers can exploit a bug in Bash to take complete control of a targeted system, security experts said. Continue reading »
- Nowhere To Hide As Minority Report-Style Facial Recognition Technology Spreads Across America (Economic Collapse, Sep 17, 2014):
What is our society going to look like when our faces are being tracked literally everywhere that we go? As part of the FBI’s new Next Generation Identification System, a facial recognition database known as the Interstate Photo System will have collected 52 million of our faces by the end of 2015. But that is only a small part of the story. According to Edward Snowden, the NSA has been using advanced facial recognition technology for years. In addition, as you will see below, advertising companies are starting to use Minority Report-style face scanners in their billboards and many large corporations see facial recognition technology as a tool that they can use to serve their customers better. Someday soon it may become virtually impossible to go out in public in a major U.S. city without having your face recorded. Is that the kind of society that we want? Continue reading »
- Steve Jobs Was a Low-Tech Parent (New York Times, Sep 10, 2014):
When Steve Jobs was running Apple, he was known to call journalists to either pat them on the back for a recent article or, more often than not, explain how they got it wrong. I was on the receiving end of a few of those calls. But nothing shocked me more than something Mr. Jobs said to me in late 2010 after he had finished chewing me out for something I had written about an iPad shortcoming.
“So, your kids must love the iPad?” I asked Mr. Jobs, trying to change the subject. The company’s first tablet was just hitting the shelves. “They haven’t used it,” he told me. “We limit how much technology our kids use at home.”
I’m sure I responded with a gasp and dumbfounded silence. I had imagined the Jobs’s household was like a nerd’s paradise: that the walls were giant touch screens, the dining table was made from tiles of iPads and that iPods were handed out to guests like chocolates on a pillow.
Nope, Mr. Jobs told me, not even close.
Since then, I’ve met a number of technology chief executives and venture capitalists who say similar things: they strictly limit their children’s screen time, often banning all gadgets on school nights, and allocating ascetic time limits on weekends.
I was perplexed by this parenting style. After all, most parents seem to take the opposite approach, letting their children bathe in the glow of tablets, smartphones and computers, day and night.
Yet these tech C.E.O.’s seem to know something that the rest of us don’t. Continue reading »
- Artificial Micro-Humans to Replace Animals in Lab Tests: 90 Million Animal Lives Would be Saved (International Business Times, Sep 2, 2014):
As an attempt to save millions of animal lives that are lost during laboratory testing, scientists are creating artificial micro humans that would replace these animals. Up to 90 million animal lives are lost each year due to experiments conducted on them.
The artificial human machines that are being developed will be as small as a microchip. Researchers also said that they would produce the same responses that humans would when exposed to certain substances, “either when inhaled, absorbed in the gut or circulated through the bloodstream.” Continue reading »
- Stanford engineers aim to connect the world with ant-sized radios (Stanford, Sep 9, 2014):
Costing just pennies to make, tiny radios-on-a-chip are designed to serve as controllers or sensors for the ‘Internet of Things.’
Stanford engineering team, in collaboration with researchers from the University of California, Berkeley, has built a radio the size of an ant, a device so energy efficient that it gathers all the power it needs from the same electromagnetic waves that carry signals to its receiving antenna – no batteries required. Continue reading »
A new paper titled “Microchip-Induced Tumors in Laboratory Rodents and Dogs: A Review of the Literature 1990–2006” has been released…
… and that is the least problem we face from having microchip implants.
They are already secretly implanting people:
As I and others have warned many times:
There is one thing the people have to resist or it is all over and that is microchip implants.
I love dogs (and animals in general), but having one with a microchip implant is impossible for me.
CIA Funded Mind Control Experiments – Bull & Cat Tests by Dr Delgado in the 1960s
And that was in the 1960s and that was what they wanted us to know about!!!
A microchip is not just a sender and storage of information, it is also a receiver of information.
If you have a microchip in your body, then they can do to you and make you do whatever they want.
- The Era Of Widespread Biometric Indentification And Microchip Implants Is Here (Economic Collapse, Sep 9, 2014):
Are you ready to have your veins scanned every time you use your bank account? Are you ready to use a “digital tattoo” or a microchip implant to unlock your telephone? Once upon a time we read about such technologies in science fiction novels, but now they are here. The era of widespread biometric identification and microchip implants is upon us, and it is going to change the way that we live. Proponents of these new technologies say that they will make our private information and our bank accounts much more secure. But there are others that warn that these kinds of “Big Brother technologies” will set the stage for even more government intrusion into our lives. In the wrong hands, such technologies could prove to be an absolute nightmare.
Barclays has just announced that it is going to become the first major bank in the western world to use vein scanning technology to control access to bank accounts. There will even be a biometric reader that customers plug into their computers at home… Continue reading »
- Japan to start reopening nuclear reactors under new safety regulations (RT, Sep 10, 2014):
Japan’s nuclear regulator gave the go-ahead to reopen some of the nation’s nuclear reactors, after nearly a year without nuclear energy. The restart of the industry will also result in the permanent closure of older plants.
The watchdog’s decision-making panel approved the final version of the screening report, which included public feedback. On August 19 the Nuclear Regulation Authority (NRA) said that it received some 17,000 comments from the public on the draft version of the document. Continue reading »
- The New Terahertz Night Vision Can See Through Walls, Skin (Motherboard, Sep 7, 2014):
In the unfiltered world there are no secrets. A wall or cloak blocks observation only by virtue of the limitations of vision, whether it’s those of the naked human eye or mechanical seeing devices designed around the parameters of a naked eye. If somehow humans could see light waves at all frequencies (and make sense of it), we could see everything.
We’ve developed an impressive array of tools with which it’s become possible to view the world at different frequencies of light, whether that involves the X-ray wavelengths used in radiography or the millimeter wave scanners (the sort that see through clothing) used now in many airports. While humans evolved to see a certain range of wavelengths for very good reasons—that’s where most of the useful information about our physical, terrestrial world can be found—technology has made much more available to us. Continue reading »
- Army’s New Laser Cannon Blasts Drones Out of the Sky, Even in Fog (Wired, Sep 5, 2014):
Boeing is building a laser cannon for the U.S. Army, and the new weapon has now proved it will be as capable at sea as on land. The High Energy Laser Mobile Demonstrator (HEL MD)—basically a high-energy laser mounted on top of a big truck—was successfully used to blast some UAV drones and 60mm mortars out of the Florida sky earlier this year, Boeing announced Thursday. Continue reading »
- US Corporate Espionage (Washington’s Blog, Sep 6, 2014):
- “Hello, Computer” – Intel’s New Mobile Chips Are Always Listening (MIT Technology Review, Sep 5, 2014):
Tablets and laptops coming later this year will be able to constantly listen for voice commands thanks to new chips from Intel.
A new line of mobile chips unveiled by Intel today makes it possible to wake up a laptop or tablet simply by saying “Hello, computer.” Once it has been awoken, the computer can operate as a voice-controlled virtual assistant. You might call out “Hello, computer, what is the weather forecast today?” while getting out of bed.
Tablets and lightweight laptops based on the new Core M line of chips will go on sale at the end of this year. They can constantly listen for voice instructions thanks to a component known as a digital signal processor core that’s dedicated to processing audio with high efficiency and minimal power use. Continue reading »
- At Least 17 Fake Cellphone Towers Capable of Invasive Spying Have Been Discovered Across America (Liberty Blitzkrieg, Sep 4, 2014):
When Lee Goldsmith drives by one of the many fake cellphone towers being discovered throughout the U.S., his $3,500 CryptoPhone 500 will immediately display the warning message in the thumbnail image to the left.
When you drive by the same fake towers, known as “interceptors,” your run of the mill iPhone or Samsung Galaxy won’t alert you to any potential security breach. And that’s exactly how those people who installed these interceptors, whoever they are, like it. Continue reading »
- Apple Doesn’t Take Customer Security Seriously – 5 Irresponsible and Shocking Lapses (Liberty Blitzkrieg, Sep 3, 2014):
I’m the furthest thing in the world from a technology or security expert, but what I have learned in recent years is that a dedicated, sophisticated and well funded hacker can pretty much own your data no matter how many precautions you take. Nevertheless, the major technology companies on the planet shouldn’t go out of their way to make this as easy as possible.
In the wake of the theft of private images from several prominent celebrities, many people are rightly wondering whether how vulnerable their data is. The answer appears to be “very,” and if you use Apple, the following article from Slate may leave you seething with a sense of anger and betrayal.
“NASA’s drone traffic control centers will be fully automated”
What could possibly go wrong?
- NASA is building an air traffic control system for drones (The Verge Sep 1, 2014):
Space agency says system will be used for agriculture next year
NASA is developing an air traffic control system for drones. The New York Times reports the US space agency is working on creating a management system for vehicles that fly at around 400 to 500 feet off the ground — much lower than conventional aircraft — at its Moffett Field base around four miles from Google’s Mountain View headquarters. The system would check for other low-flying drone traffic, help the small unmanned vehicles avoid buildings, and scan for adverse weather conditions that might knock a drone out of the sky. Continue reading »
- Newly declassified documents reveal how U.S. agreed to Israel’s nuclear program (Huffington Post, Aug 30, 2014):
Documents reveal contacts between Washington and Jerusalem in late 1960s, when some Americans believed the nuclear option would not deter Arab leaders but would trigger an atom bomb race.
The Obama administration this week declassified papers, after 45 years of top-secret status, documenting contacts between Jerusalem and Washington over American agreement to the existence of an Israeli nuclear option. The Interagency Security Classification Appeals Panel (ISCAP), which is in charge of approving declassification, had for decades consistently refused to declassify these secrets of the Israeli nuclear program.
The documents outline how the American administration worked ahead of the meeting between President Richard Nixon and Prime Minister Golda Meir at the White House in September 1969, as officials came to terms with a three-part Israeli refusal – to sign the Non-Proliferation Treaty; to agree to American inspection of the Dimona nuclear facility; and to condition delivery of fighter jets on Israel’s agreement to give up nuclear weaponry in exchange for strategic ground-to-ground Jericho missiles “capable of reaching the Arab capitals” although “not all the Arab capitals.”
The officials – cabinet secretaries and senior advisers who wrote the documents – withdrew step after step from an ambitious plan to block Israeli nuclearization, until they finally acceded, in internal correspondence – the content of the conversation between Nixon and Meir is still classified – to recognition of Israel as a threshold nuclear state.
In fact, according to the American documents, the Nixon administration defined a double threshold for Israel’s move from a “technical option” to a “possessor” of nuclear weapons. Continue reading »