Toggle light / dark theme

US Hacker Tools treated like weapons in US arms deals with other countries — why not; the true war is really in Cyber.


The government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to surveillance and hacking software, since they are used for network security.

Read more

Cyber is still a challenge for soldiers on the battlefield.


Editor’s Note: This story has been updated to include comment from an industry official.

WASHINGTON — Cyber vulnerabilities continue to plague the Army’s battlefield communications, according to the Pentagon’s top weapons tester, while the service works to harden its network against cyber attacks.

The Army’s Warfighter Information Network-Tactical (WIN-T), the Mid-Tier Networking Vehicular Radio (MNVR), the Joint Battle Command-Platform (JBC-P) and the Rifleman Radio were all cited as having problematic cybersecurity vulnerabilities in a report released Monday by the Pentagon’s Director, Operational Test & Evaluation (DOT&E), J. Michael Gilmore.

Read more

Cyber attacks on our power grids — As I have highlighted in my Jan 10th Pulse positing “Quantum Computing – things that need to be considered for our future Quantum Computing” we mush get our funding and special projects under way to prevent a possible Quantum hack by overseas hackers. Russia and China are both ramping up their infrastructures to be Quantum to protect their citizens and we must do the same.


Israel’s Electric Authority has revealed its systems have been the target of a “severe cyberattack” which, while under control, is yet to be fully repelled.

“We had to paralyze numerous computers of the Israeli electricity authorities”, he said.

Minister of National Infrastructure says: ‘We are handling the situation and I hope that soon, this very serious event will be over ‘.

Steinitz, meanwhile, told information security conference attendees that the attack against the Electricity Authority is a reminder of “the sensitivity of infrastructure to cyber-attacks, and the importance of preparing ourselves in order to defend ourselves against such attacks”.

Read more

I must admit; I got a little laughter from reading the beginning of this article. However, there is a potential longer term concern around jobs and an even larger concern around data (including IP) when it comes to AI. So, I truly hope folks are strategically planning, designing, and implementing appropriate safeguards around their AI architecture and systems; especially if we look at hacking, etc.


Bill Gates, Elon Musk and Stephen Hawking have all done their part in warning the world of the true power of artificial intelligence. All three men were actually awarded the 2015 Luddite Award, which is given by the Information Technology & Innovation Foundation.

Because of their honest assessment on the power of new technology, these three men have been called alarmists who spread horror. There were 10 total nominees to the prices, and all three received them after getting more 3,680 votes.

Luddite is a word from 19th century England, and it is used to describe someone who is opposed to advances in technology. This is hardly an appropriate denomination for any of these men. Bill Gates is almost single-handedly responsible for putting PC computers in homes, Elon Musk has made a revolution with electric vehicles. Volumes can be written on the impact Stephen Hawking has had on the world.

Read more

Run away AI & Robots in particular do not worry me at this point. When we have Quantum based AI and Robots meaning they can fully operate themselves; that’s when we have to truly consider our real risks and ensure we have proper safe gaurds. The bigger issue with current AI and Robots that are not developed on a Quantum platform or technology is hacking. Hacking by others is the immediate threat for AI & Robots.


In this photo taken Thursday, July 9, 2015, SoftBank Corp.'s new robot Pepper performs during an interview at the technology company's headquarters in Tokyo. (AP Photo/Shizuo Kambayashi)

Read more

As I have mentioned in some of my other reports and writings; infrastructure (power grids, transportation, social services, etc.) is a key area that we need to modernize and get funding soon in place given the changes that are coming. As Russia’s own power stations were hacked; it will not be anything to when the more sophisticated releases of the Quantum Internet and Platforms are finally releasing to the main stream. Someone last week asked me what kept me up at night worrying; I told them our infrastructure and we have not been planning or modernizing it to handle the changes that are coming in the next 5 years much less the next 7 years.


With cyberattacks gaining in sophistication and volume, we can expect to see a range of new targets in the year ahead.

Read more

The Pentagon has quietly put out a call for vendors to bid on a contract to develop, execute and manage its new cyber weaponry and defense program. The scope of this nearly half-billion-dollar “help wanted” work order includes counterhacking, as well as developing and deploying lethal cyberattacks — sanctioned hacking expected to cause real-life destruction and loss of human life.

In June 2016, work begins under the Cyberspace Operations Support Services contract (pdf) under CYBERCOM (United States Cyber Command). The $460 million project recently came to light and details the Pentagon’s plan to hand over its IT defense and the planning, development, execution, management, integration with the NSA, and various support functions of the U.S. military’s cyberattacks to one vendor.

While not heavily publicized, it’s a surprisingly public move for the Pentagon to advertise that it’s going full-on into a space that has historically been kept behind closed doors. Only this past June, the Department of Defense Law of War Manual (pdf) was published for the first time ever and included Cyber Operations under its own section — and, controversially, a section indicating that cyber-weapons with lethal outcomes are sanctioned by Pentagon doctrine.

Read more

6fd2b4af-61c1-4f0c-be45-f87356b66c9b.img

“Companies around the world are bracing themselves for an avalanche of cyber security regulation, as governments scramble to introduce rules forcing corporate groups to build stronger defences against catastrophic hacks.”

Read more

Official video for PostHuman — produced by Colliculi Productions.
Animated sci-fi thriller short film featuring the voice of Tricia Helfer (Battlestar Galactica). Directed by Cole Drumb. Produced by Jennifer Wai-Yin Luk.

Production company: Colliculi Productions.
Animation studio: Humouring The Fates.
Voice of Kali: Tricia Helfer.
Voice of Terrence: Ulric Dihle.
Original Music: Neill Sanford Livingston.
Post Production Sound: Kid Dropper Sound.
Final Post Production Sound: Bad Animals.
Final Video Post Production: Lightpress.

Set in an adrenalized future of espionage, assassins, and out of control super science, PostHuman follows a genius hacker and his dog as they help an enigmatic young woman to free the remaining test subject of a black ops ESP test lab.

http://posthumanthemovie.com/
https://www.facebook.com/PostHumanTheMovie
https://twitter.com/PostHumanFilm
https://twitter.com/JenWLuk
https://twitter.com/ColeDrumb
http://www.imdb.com/title/tt2091950/
http://posthumanthemovie.tumblr.com/

Awards:
Screamfest 2012 — Best Animated Short.
Maelstrom International Fantastic Film Festival 2012 — Best Animation Short.

Arizona Underground Film Festival 2012 — Best Animation Short.
Couch Fest Films 2012 — Best Sci-Fi Animation.

Read more