Tuesday, July 25, 2017

Enemies of the internet

*There's a way around everything, trust me.

Artificial Intelligence Is Changing the World, and Humankind Must Adapt


IN A POST entitled “Machine Learning: Bane or Blessing for Mankind?,” I noted that the renowned theoretical physicist Stephen Hawking along with his colleagues Stuart Russell, Max Tegmark, and Frank Wilczek recommend moving cautiously in the development of artificial intelligence (AI), especially in the area of autonomous weapon systems. Hawking and his colleagues understand, however, that the AI genie has already been released from the bottle and there is no way to get it back in.
After noting Hawking’s concerns, Ron Neale comments, “Such a warning about the application of AI and its derivative intelligent machines (IMs), especially in the area of military application, might be appropriate. But what if IMs are really just a new branch on the tree of evolution that has led us from the original Protists to where we are today?” [“Artificial & Machine Intelligence: Future Fact, or Fantasy?” EE Times, 13 May 2014] Although Neale finds the prospect of a Skynet-like system (the AI system in “Terminator” that takes over and starts eradicating humans) frightening, he’s skeptical that such a system will ever exist. He explains:
“Fear not, because in my view, for IMs to come into existence requires a unique evolutionary key [— Synergistic Evolution (SE) —] and it is that aspect of evolution that suggests why it might not ever occur. Synergistic Evolution (SE) requires a species to be aided in its evolutionary process by another species. This is not the same as acting as a food stuff, where the existence of an earlier species acts as the food or fuel that allows those higher up the chain to exist and evolve. Or where species like dogs or horses that exist at the same time, on a different branch, allows a species to more easily obtain food to exist and evolve. The nearest equivalent example of SE might be a species variation such as selective breeding (unnatural selection), where human intervention is used to provide a characteristic, such as additional meat or milk in cattle or in hunting animals, dogs, or horses. In any flight of fancy, I think … three options … must be considered as possibilities: the first option [is the] the evolution of some very clever tools, weapons, and body parts that become an integral part of the human species tree; or the second option … a new branch on the tree of evolution; or the third option an extension of the human branch.”
Frankly, I’m not sure that the biological evolution analogy is a good one. Biological evolution essentially changes the organic characteristics of a species so that beneficial traits can be passed on to subsequent generations. Two of Neale’s options aren’t really biological evolution because they aren’t organic (they fit much neater in the transhumanist framework). Only his “new branch of the tree” option could develop into an evolutionary process; but it wouldn’t be a new branch it would be an entirely new tree.
Regardless of how artificial intelligence develops in the years ahead, almost all pundits agree that the world will forever change as a result of advances in AI. During a speech at the American Enterprise Institute, Bill Gates insisted that the “mindset[s] of the government and people have not adjusted to view the future, even though technology is exploding this decade into a world of the Internet of Things and the propulsion into artificial intelligence.” [“Bill Gates outlines the mindset of A.I. for jobs in the future,” by Victoria Wagner Ross, San Diego Technology Examiner, 14 March 2014]
The greatest worry for many analysts, including Gates, is the number of jobs that artificial intelligence systems are poised to take over. Mark van Rijmenam reports, “The potential of Artificial Intelligence is enormous and in fact a 2013 study by Oxford University estimated that Artificial Intelligence could take over nearly half of all jobs in the United States in the near future.” [“Is Artificial Intelligence About to Change Doing Business Forever?” SmartData Collective, 8 March 2014] Ross also cites the Oxford University study. She writes:
“There are 702 occupations that will be affected by automation into the future of A.I. and robots according to [Carl Benedikt] Frey and his co-author, Michael Osborne, of the study. Frey who is a Ph.D. in economics was surprised how easily the algorithm replaced the loan officer. The loan officer was predicted with a 98% probability of replacement. A safer position at only 11% probability was journalists. Surgeons were at the lowest probability along with elementary school teachers.”
Ross reports that Gates asserted that “there are a couple of decades to re-set the mindset and prepare for the new occupation.” The question is: Exactly what occupations should students being prepared to fill? Gates believes that whatever new occupations emerge, the ones that will pay the best and be the most secure will require a good foundation in science, technology, engineering, and mathematics (STEM). Ross explains, “Preparation will meet opportunity in the future and Gates educates government and people to be prepared to embrace the brave new world of artificial intelligence.” Most of the best jobs that will emerge will require close collaboration between humans and computers. Fortunately, we are raising a generation that is already being exposed to such collaboration.
“AI has allowed us humans to tailor-make robots that fit perfectly into our daily lives,” writes Zachary John, “suggesting faster routes to work, recommending TV shows we might like, even telling us jokes when we’re feeling down.” [“Robots: The Possibilities of Artificial Intelligence,” Guardian Liberty Voice, 22 March 2014] Dr. Kevin Curran, a technical expert at the Institute of Electrical and Electronics Engineers (IEEE), told Lee Bell “that AI is only getting better, as computational intelligence techniques keep on improving, becoming more accurate and faster due to giant leaps in processor speeds.” [“AI will play a vital role in our future, just don’t expect robot butlers,” The Inquirer, 14 March 2014] Like others, Curran believes that AI systems will continue to take on jobs now being filled by humans, especially “humans doing tedious automated tasks.”
Aki Ito reports, “Artificial intelligence has arrived in the American workplace, spawning tools that replicate human judgments that were too complicated and subtle to distill into instructions for a computer. Algorithms that ‘learn’ from past examples relieve engineers of the need to write out every command.” [“Your Job Taught to Machines Puts Half U.S. Work at Risk,” Bloomberg BusinessWeek, 12 March 2014] Like authors cited above, Ito points to the Oxford University study as proof that the future workforce is in need of a serious overhaul. Frey, co-author of that study told Ito that the global workforce would have to transform. “These transitions have happened before,” Frey stated. “What’s different this time is that technological change is happening even faster, and it may affect a greater variety of jobs.” Perhaps the biggest unanswered question is: Will there be enough good jobs to keep the global economy growing? After all, AI systems aren’t consumers and consumers are the sine qua non of economic growth.
Andrew Ng, director of the Stanford Artificial Intelligence Laboratory near Palo Alto, California, told Ito, “There will always be work for people who can synthesize information, think critically, and be flexible in how they act in different situations. Still the jobs of yesterday won’t be the same as the jobs of tomorrow.” Ito concludes, “Workers will likely need to find vocations involving more cognitively complex tasks that machines can’t touch. Those positions also typically require more schooling, said Frey. ‘It’s a race between technology and education.’”
Stephen F. DeAngelis is President and CEO of the cognitive computing firm Enterra Solutions.

10 Scary Modern Technologies

*As long as we're at it... I found these a few months back and bench tested them. I found three that were close yet didn't sink the basket.


Technology makes our lives better. You're taking a MOOCclass, and have your appointments organized on your computer. You watch wepisodes on your internet-capable high-definition television. You pay your bills electronically and save time and money. That's fine and dandy, until someone takes out the electronic banking system and the machines take over the planet.
Sounds crazy? Perhaps. None of the gadgets and innovations we included in our list of 10 scary technologies is likely to rain death and destruction on our little planet, though that doesn't prevent people from being unnerved by them. Read on to find out what weirdness may await in the future.

You can take it from here > 
  • Reverse IP Search for End Users Revisited / You can be tracked and found

    This is a common fiber burial box I passed on my daily stroll for fresh fish to have breakfast.


    The contracted will place an identifier like this up when they finish.


     There is no FttD here, verified. From this burial there will be a flop over to snail wire / Cat 3, Cat 5 at best. That run from the CO to your home, business, condo is going to be less than 400ft by the TIA standards before I left a few years back.

     Which means, "When I do a reverse IP search" you or the location you use that hard wired device at are within 400ft of my results.

     I've tested three random neighbors and I was never more than 400ft away / more like 275ft. Does that sound familiar?

     When these sites say this can't be done they're either ignorant of the fact or it's for a reason unbeknownst to me.

     IT Can Be Done.

    *I wonder why that's a Verizon box? Did Brighthouse now Spectrum get a good deal?

     Re:
    Even if it's a coaxial run, the "TIA" standard in 2012 was 2000ft which still places the searcher in your neighborhood, I can't see that being major obstacle.


    My financial institution flagged my account

    I was totally unaware that my bank account had been flagged while staying in Cambodia.
    "Flagged", meaning I was being monitored for suspicious activity without any type of notice as a result of the Patriot Act.

     My financial institution never gave me notice and I would have never known but I attempted to move money exceeding $10,000.

     I did some "border line legal" cyber digging and found that my institution has the ability to track ATM activity around the world yet they don't = possibly set by some standard of govt or lack of funding for such monitoring.

     I established that they have the ability to track cookies (I'm a cookie monster / entirely different level and can never be found on the net to my knowledge) but this is inoperable most likely for the same reason I mentioned in the latter paragraph.

     I'm posting this for you to be aware of where you travel and the secret is right there in front of your face by using deductive reasoning.
     Google, "I want to expat to "X" country and draw money from my American bank". If that country is not on the list, you will be flagged.

    Why You Should Let Your Employees Nap at Work

    *This is a practice in Asia that dayes back before my birth.

    Sleeping on the job may still be frowned upon as a sign of laziness, but in recent years, many progressive companies have begun to encourage employees to take mid-day naps to recharge.

    Marketing-software company, HubSpot has a nap room featuring a hammock suspended above a plush carpet and soothing cloud-covered walls to encourage its 750 employees to catch some z’s at work. CMO Mike Volpe, who is known to use the nap room frequently, says a 20-minute nap is often all he needs to regain focus and re-energize to be more productive for the rest of the day.
    The nap room is seen as a way to help employees balance the demands of work and home life. A father of two young children, Volpe often finds himself chasing after the elusive full night’s sleep, leaving him fighting fatigue during the workday.
    “If I have things that are particularly draining for me, like a presentation or lots of interviews, getting 20 or 30 minutes to pay back some of the sleep I lost the night before can make me so much more effective,” he says.
    The nap room is also often used by frequent travellers. “We do a fair amount of business in California and we have an office in Dublin so we’re often coming back to the office after a red-eye,” says Volpe. Rather than trying to slog through the day, which can lead to errors in judgement and a decline in productivity, HubSpot has found allowing employees to have a rest can help make the day much more productive.
    Napping has become increasingly popular in the tech industry, where developers are often required to work long hours, but where company culture hinges on creating a laid-back atmosphere in order to attract top talent and compete with companies who offer perks such as game rooms, lounges and on-site frozen yogurt stations. Google was among the first large tech companies to promote napping. The tech giant introduced energy pods -- reclining chairs that sit inside a large bubble and include built-in music producing soothing sounds and an alarm that wakes up nappers with lights and vibration.
    Offering employees a space to catch a mid-day siesta is now becoming a common amenity for companies looking to position themselves as progressive, dynamic places to work – almost as attractive as the office coffee machine, yet perhaps more beneficial. A 2008 study showed a power nap is more effective than caffeine.
    Although napping is becoming a more popular employee perk in some industries, there’s still a great deal of resistance in the corporate world towards sleeping on the job, says Terry Cralle, a certified sleep expert who helps companies to implement a company culture that encourages napping.
    “I’m still surprised that people are put off by napping," she says. "We’ve got great research supporting the fact that naps can help corporations and employees, yet we still feel reluctant to make it an acceptable part of a healthy lifestyle and a healthy workday."
    The problem, she says, is that many employers and executives equate naps with slacking off, something Cralle says couldn’t be farther from the truth. “Some large companies have workout areas or gyms on-site and yet we’re turning a blind eye to sleep and it’s a biological necessity,” she says.
    Here’s what to consider when encouraging napping in your workplace:
    Build a separate room. A quiet room with couches, a hammock or, if you have the funds, a sleep pod, is essential to encouraging employees to nap. HubSpot’s nap room is located in a quiet part of the office and painted a calming shade of green with clouds and a soft carpet below the hammock to encourage drifting off. Cralle says while the mid-afternoon nap comes naturally to some, others need to learn how to nap. Having a space that encourages the body to shut down is key to training them to nap.
    Make napping part of company culture. Making napping a part of company culture means employees won’t be sneaking shut-eye away from supervisors and co-workers, but rather sends the message that naps are encouraged as a way to help employees perform at their best. At HubSpot, the nap room is booked like a conference room. There are no rules about how often employees can use it, but Volpe says there haven’t been any issues around misuse. “Anyone can book it for as short or as long and as often as they want, as long as they’re meeting their performance goals,” he says.
    Encourage employees to time their naps appropriately. A nap before a meeting or a major presentation could make all the difference between success or a performance flop. A NASA study showed a nap of just 26 minutes can boost productivity by as much as 34 percent and increase alertness by 54 percent.
    LISA EVANS

    Monday, July 24, 2017

    Panopticopter: DIY Weaponized Drones

    *Technology is a breeze, for over 6 years I've been trying to find a definitive answer as to, "Why people believe lies before they believe the truth", baffling.


    *They need $10,000, what are they building just 1?

    You've probably seen stories about drone strikes in the news. The U.S. military has been using drones (also referred to as "unmanned aerial vehicles" or "UAVs") with mixed success since 2001, when they were first used in Afghanistan. While drones have provided the U.S. military with the ability to perform airstrikes in highly sensitive areas, modern weaponized drones are anything but perfect. In particular, U.S. military drones have been criticized for their lack of precision, leading in some cases to unnecessary civilian deaths.
    This is where we come in: we think we can build a better drone for a fraction of the price.
    We're DIY Drone Labs, a group of three MIT engineering students who have been experimenting with drones built using open-source components like the Arduino microcontroller and BeagleBoard single-board computer. We think for just a few thousand dollars, we can build a prototype drone that has more accurate image-capture and image-processing abilities than the current generation of drones being used by the U.S. military. What's more, we're working with explosives experts to design an alternative to the Hellfire missiles being used by U.S. military drones. We think we can engineer a new kind of explosive that's capable of performing strikes with surgical accuracy, thereby greatly reducing the potential for unnecessary civilian casualties.
    The U.S. Department of Defense (DoD) has already expressed interest in our project and the speed at which it is progressing. While the DoD currently has a number of advanced drone projects in development, it will likely be years before any of these vehicles see the light of day and there's a pressing need for more advanced drones in the air right now. That's why we're asking the Kickstriker community for support, so that the three of us (Brandon McCartney, Natassia Zolot and Radric Davis) can spend the summer focusing on the Panopticopter, a weaponized drone that will incorporate everything we've learned from years' worth of experiments. Our goal is to have a working prototype of the Panopticopter ready for testing by the end of summer. Can you help us get there?
    Of course, there's something in it for you as well. Check out our reward levels to see what you'll get for helping push the Panopticopter project to the finish line. We're giving away signed schematics, videos of tests performed in our lab in Cambridge, MA and do-it-yourself drone building kits (non-weaponized, of course). As an added bonus for the Kickstriker community, if we meet our funding goal, we will release all of our schematics and source code for the Panopticopter under a Creative Commons license, making it the world's first open-source drone!
    Thanks in advance for your support,
    The DIY Drone Labs Team (Brandon, Natassia and Radric)

    Trump promises ‘great rebuilding of the Armed Forces’ while signing executive order at the Pentagon

    *I thought he was impeached? Maybe I should turn on a TV


    President Trump signed an executive order Friday to launch what he called a “great rebuilding of the Armed Forces” that is expected to include new ships, planes and weapons and the modernization of the U.S. nuclear arsenal.
    Trump, making his first visit to the Pentagon since his Jan. 20 inauguration, said the order was signed “to ensure the sacrifices of our military are supported by the actions of our government.”
    The order calls for new Defense Secretary Jim Mattis to carry out a 30-day “readiness review” that is expected to examine needs for the war against the Islamic State, along with training, equipment maintenance, munitions, modernization and infrastructure. A draft of the order obtained by The Washington Post on Thursday also said it would examine how to carry out operations against unnamed “near-peer competitors,” a term that U.S. officials typically use to mean China and Russia, but that language is not in the final version.
    Within 60 days, Mattis also must submit to Trump a plan to improve overall readiness in the military by fiscal 2019. It will focus on everything from maintenance backlogs to the availability of training ranges and manpower shortages, and the time needed to coordinate and carry out military training.

    [Placing Russia first among threats, Mattis warns of Kremlin attempts to ‘break’ NATO]

    Trump also called for reviews of the U.S. military’s nuclear arsenal and of ballistic missile defense. The draft document suggested that the Pentagon also would suggest programs that might be cut, but that language did not appear in the final order Trump signed.

    Trump signed the order at the Pentagon hours after he said at the White House that he will allow Mattis, who retired as a Marine general in 2013, to “override” him on whether the United States tortures terrorism suspects. Trump has said he is convinced torture works, while Mattis believes interrogations should be carried out according to U.S. military guidelines, which specifically ban techniques such as waterboarding.

    “He’s an expert. He’s highly respected. I happen to feel that it does work,” Trump said, without mentioning that Congress has banned torture. “I’ve been open about that for a long period of time. But I am going with our leaders.”
    Later, at the Pentagon, Trump promised U.S. troops that his administration “will always have your back.” The president, speaking six days after claiming that the media misreported the size of his inauguration crowd in front of a memorial wall at the Central Intelligence Agency, struck a more somber tone and read from prepared remarks. He called the Pentagon’s Hall of Heroes “sacred” and added that the “soul of our nation lives between these walls.” The room recognizes the bravery of Medal of Honor recipients.

    My personal suggestion for learning about computers (Updated)

    Play and have fun with them


     Buy an el-cheapo from a pawn shop, C List, Backpage, Flea Market, anywhere and play with it.

     Try to download, upload, change font, simply try anything you'd like.

     Having fun and laughing about it can beat any post, any school or any training to a given point.

     Enjoy.

    *Only 1 RE: Today
     If I had ever had a child, he / she would have never gone to school past kindergarten, would have never been introduced to any religion and never would have been taught about money.

     It wouldn't have not been "home schooling", it would have been "life" schooling. I would have let the child progress in any way he / she found Joy and I would have guided that child as to how to make it profitable. (Profit is not $$$, it's being able to trade, barter and have the occasional currency to bridge the gaps. Very few Americans will agree with this yet I have no debt, no worries and no headaches except for the occasional layover at various airports)

     1 more then I have to divert the emails to the pond (Learned that in Okinawa)
     I went to 3 colleges and dropped out of all 3 and I'm an electrical systems engineer meeting the minimum required standards of the state of Maryland and IBM / Gaithersburg MD.
    *I show up with the .docs in foreign countries and they throw all that in the trash. I'm immediately put to work to prove I can complete the task at hand.

     Ok that's it.

    Hackers vs. Cyber Criminals: Know the Difference


    Short Bytes: People are often confused between two terms: hackers and cyber criminals. In this article, I’m sharing a video that tells you the difference between these two.
    Cyber crime occurs when breaking into the private worlds of people, these bad hackers start to misuse the information for their own benefit and loss of others. The story of hacking and cyber crime goes back to early 1950s when some phone freaks, commonly known as “phreaks”, started hijacking world’s phone networks and making long-distance calls.
    A report sponsored by the security firm McAfee estimates the annual damage to the global economy due to cyber crimes at $445 billion and near about $1.5 billion was lost in the year 2012 due to online debit and credit card fraud in the US.
    According to me, there are two types of hackers: good hackers and bad hackers. The bad hackers are the ones who commit cyber crime.  Here’s a video that shows how Darren Kitchen, a hacker and the host of tech show Hak5, tells how hacking is different from cyber crime:

    Hacking from A to Z.

    One of the challenges of writing—and reading—about hacking is that it's a world full of jargon and technical terms. It's our job as journalists to translate this lingo and make it understandable to the average reader.
    Still, accuracy is important and sometimes you have to use the right terms. To help you navigate our stories during our special week on cybersecurity, The Hacks We Can't See, (and our future and continued coverage of hacking) we thought it'd be good to have a little glossary.

    A

    Attribution
    Attribution is the process of establishing who is behind a hack. Often, attribution is the most difficult part of responding to a major breach since experienced hackers may hide behind layers of online services that mask their true location and identity. Many incidents, such as the Sony hack, may never produce any satisfactory attribution.

    B

    Backdoor
    Entering a protected system using a password can be described as going through the front door. Companies may build "backdoors" into their systems, however, so that developers can bypass authentication and dive right into the program. Backdoors are usually secret, but may be exploited by hackers if they are revealed or discovered.
    Black hat
    A black hat hacker is someone who hacks for personal gain and/or who engages in illicit and unsanctioned activities. As opposed to white hack hackers (see below), who traditionally hack in order to alert companies and improve services, black hat hackers may instead sell the weaknesses they discover to other hackers or use them.
    Botnet
    Is your computer part of a botnet? It could be, and you might not know it. Botnets, or zombie armies, are networks of computers controlled by an attacker. Having control over hundreds or thousands of computers lets bad actors perform certain types of cyberattacks, such as a DDoS (see below). Buying thousands of computers wouldn't be economical, however, so hackers deploy malware to infect random computers that are connected to the internet. If your computer gets infected, your machine might be stealthily performing a hacker's bidding in the background without you ever noticing.
    Brute force
    A brute force attack is arguably the least sophisticated way of breaking into a password-protected system, short of simply obtaining the password itself. A brute force attack will usually consist of an automated process of trial-and-error to guess the correct passphrase. Most modern encryption systems use different methods for slowing down brute force attacks, making it hard or impossible to try all combinations in a reasonable amount of time.
    Bug
    You've probably heard of this one. A bug is a flaw or error in a software program. Some are harmless or merely annoying, but some can be exploited by hackers. That's why many companies have started using bug bounty programs to pay anyone who spots a bug before the bad guys do.

    C

    Cracking
    A general term to describe breaking into a security system, usually for nefarious purposes. According to the New Hacker's Dictionary published by MIT Press, the words "hacking" and "hacker" (see below) in mainstream parlance have come to subsume the words "cracking" and "cracker," and that's misleading. Hackers are tinkerers; they're not necessarily bad guys. Crackers are malicious. At the same time, you'll see cracking used to refer to breaking, say, digital copyright protections—which many people feel is a just and worthy cause—and in other contexts, such as penetration testing (see below), without the negative connotation.
    Crypto
    Short for cryptography, the science of secret communication or the procedures and processes for hiding data and messages with encryption (see below).
    Chip-off
    A chip-off attack requires the hacker to physically remove memory storage chips in a device so that information can be scraped from them using specialized software. This attack has been used by law enforcement to break into PGP-protected Blackberry phones.

    D

    Dark web
    The dark web is made up of sites that are not indexed by Google and are only accessible through specialty networks such as Tor (see below). Often, the dark web is used by website operators who want to remain anonymous. Everything on the dark web is on the deep web, but not everything on the deep web is on the dark web.
    DDoS
    This type of cyberattack has become popular in recent years because it's relatively easy to execute and its effects are obvious immediately. DDoS stands for Distributed Denial of Service Attack, which means an attacker is using a number of computers to flood the target with data or requests for data. This causes the target—usually a website—to slow down or become unavailable. Attackers may also use the simpler Denial of Service attack, which is launched from one computer.
    Deep web
    This term and "dark web" or "dark net" are sometimes used interchangeably, though they shouldn't be. The deep web is the part of the internet that is not indexed by search engines. That includes password-protected pages, paywalled sites, encrypted networks, and databases—lots of boring stuff.
    DEF CON
    One of the most famous hacking conferences in the US and the world, which started in 1992 and takes place every summer in Las Vegas.

    Featured Posts

    Beautiful American Bully Pups for Sale

     

    Popular Posts