Jump to content


Surveillance and Misinformation!

86 replies to this topic

#81 status - Great Architect

status - Great Architect
  • Guests

Posted 12 March 2018 - 02:46 PM

The next stop on the road to revolution is ambient intelligence


Digital technologies now surround us, with many people having multiple devices for business and personal use. When combined with the Internet of Things and its assortment of embedded sensors and connected devices in the home, the enterprise and the world at large, we will have created a digital intelligence network that transcends all that has gone before. Some have referred to this as a “third wave” of computing, where technology gains the ability to sense, predict and respond to our needs and is being integrated into our natural behaviors.

Ambient is generally defined as “surrounding on all sides.” Ambient intelligence is born of digital interconnectedness to produce information and services that enhance our lives. This is enabled by the dynamic combination of mobile computing platforms, the cloud and big data, neural networks and deep learning using graphics processing units (GPUs) to produce artificial intelligence (AI).

An example travel scenario set 10-15 years into the future outlined in Information Week describes arriving in San Francisco. Upon exiting the plane, a traveler will get a message that says, “Welcome to San Francisco. Please go to the curb after picking up your bag.” When at the curb, a self-driving car will meet them and, once inside, advise that the destination is the Marriott hotel.

A recent story notes that computing is on its way to becoming a sea of background data processing that bears little or no relation to the familiar world of PCs and servers. “We will talk, and the world will answer.” We have more than a hint of this with current implementations of Siri, Cortana and Echo. Using natural language processing and AI, these devices understand what we are asking and supply us with useful information.

Much of AI is built upon the voluminous amount of data — so-called big data — being collected through search, apps and the Internet of Things. These data provide the opportunity for neural networks to learn what people do, how they respond and their interests, providing the basis for deep learning-derived personalized information and services based on increasingly educated guesses within any given context.

In Shots of Awe, philosopher and technologist Jason Silva says AI is simply the outsourcing of cognition to machines, amplifying the most powerful force in the universe, which is intelligence. He adds there’s no reason to fear this, it’s just evolution.

What is clear is that our AI-powered assistants will increasingly manage our digital activities and address increasingly complex questions and situations. We don’t know what devices are coming, whether lapel pins, augmented reality visors or something else, but we know they’re coming. We are fully within the rainbow of digitally driven change. Will these make life better or somehow easier? We will definitely be more guided by the technology, relegating mundane tasks to ambient intelligence.


  • 0

#82 status - Hogwarts

status - Hogwarts
  • Guests

Posted 20 March 2018 - 02:07 AM


Defensive architecture is an option. It can be weaponized as well. Imagine a school shaped like this: 
Only the 'cell' space would be classroom size.
A large open space contains this form:
Expand the idea further and take a look at a community:
Would you feel safe having your children learn in this environment?




  • 0

#83 status - Innerspace

status - Innerspace
  • Guests

Posted 27 April 2018 - 06:29 PM

Don't forget about all the pipes and wires...



  • 0

#84 status - Guest

status - Guest
  • Guests

Posted 19 July 2018 - 06:42 PM


So What Is Social Engineering?
Wondering what is social engineering? It’s a term that covers a variety of social engineering attacks — each of which you’ll read about below — that are geared towards attacking humans or a group of humans in order to obtain information or data for malicious use. Keep reading to learn more social engineering examples…
What is a Social Engineering Attack?
A social engineering attack is an orchestrated campaign against employees at either a variety of companies or one high valued business using a variety of digital, in-person or over the phone techniques to steal intellectual property, credentials or money.
Aren’t There More Efficient Ways than Social Engineering?
Hackers prefer social engineering because it’s much easier to hack a human than a business. Social engineering attacks allow the hacker to combine multiple efforts and even cover their tracks, because they can use the human to take money or install malware under their persona.
According to Nick Espinosa, CIO at BSSi2 where they do white hat hacking for their clients, “a [social engineering target] can either get [the hacker] access to the network by the [target] validating their malicious software or by actually having the person do the work for them.”
This problem is growing and our goal is to arm you against these attacks. With this list of social engineering attacks, you can educate your users and help them avoid falling for the insanely easy social engineering attacks that result in major security breaches. We’ve also included some ethical hacking ideas so you can test your users.
1. Pretexting
2. Blackmail
3. Phishing
4. The Friendly Hacker
5. Vendor Scams for API Keys
6. Typosquatting
7. Device Leave Behind
8. Malware Piggyback
9. Social Media Based Phishing
10. Neuro-Linguistic Programming (NLP)
11. Classic Piggyback
12. The Cable Guy
13. Reverse Social Engineering
14. Rogue Employee
15. Open Access
16. Six Degrees of Separation
17. Bar Hopping
18. Cause a Panic and Take Advantage
19. Anger
20. Whale Hunting
21. Election Season
22. Vishing
23. Vendor Scams for Wire Transfers




  • 0

#85 status - Guest

status - Guest
  • Guests

Posted 24 July 2018 - 03:07 PM


Remember the Panopticon?
Academics of a certain age will remember when you couldn’t take a seminar without hearing about Foucault and the Panopticon. The panopticon was Jeremy Bentham’s design, intended for a prison. 
Although Foucault liked to discuss what he called the “capillaries of power,” the panopticon was still an easily located, centralized thing. It was a tool of a single central authority. The jail would deploy surveillance to control the inmates. You knew who was in charge of the tower, even if you didn’t know if it was being used at any given time
In the age of camera phones, though, you don’t know who’s doing the watching. Lenses are everywhere, rather than in the middle, and control has been, well, decentered. In the age of social media, someone in the back row can isolate a single statement -- heard correctly or incorrectly -- and loose it upon a world with multiple and conflicting agendas.
But awareness of the possibility of that kind of surveillance also rewards a certain blandness, grounded in a warranted paranoia. If you don’t know when you’re being watched, you start to watch yourself. Error avoidance can easily become risk avoidance.  From there, it’s a short step to stagnation and decline. Innovation is messy. We need some tolerance for messiness if we want it to thrive. Candor is sometimes awkward and halting; subjecting it to too much scrutiny at an early stage can kill it.  If every decision is premised on “how would this look if…,” we’ll die of caution. That’s not an inspiring way to go.




I see a similar design here...








Forms of biometrics
Iris recognition
Facial recognition
Voice recognition
Gait recognition
DNA analysis
Fingerprint Recognition
Fingerprint recognition refers to the automated method of identifying or confirming the identity of an individual based on the comparisson of two fingerprints. Fingerprint recognition is one of the most well known biometrics, and it is by far the most used biometric solution for authentication on computerized systems. The reasons for fingerprint recognition being so popular are the ease of acquisition, established use and acceptance when compared to other biometrics, and the fact that there are numerous (ten) sources of this biometric on each individual.
Iris Recognition vs. Retina Scanning – What are the Differences?
In biometrics, iris and retinal scanning are known as “ocular-based” identification technologies, meaning they rely on unique physiological characteristics of the eye to identify an individual. Even though they both share part of the eye for identification purposes, these biometric modalities are quite different in how they work. Let’s take a closer look at both and then explain the similarities and differences in detail:
Facial recognition: is the technology taking away your identity?
Facial recognition technology is being used by companies such as Tesco, Google and Facebook, and it has huge potential for security. Concerned? It may be too late to opt out…
And while facial recognition algorithms may be neutral themselves, the databases they are tied to are anything but. Whether a database concerns criminal suspects or first-class travellers, they are still designed to sort us into categorisable groups.
"These databases are what define our social mobility and our ability to move through the world," says Gates. "Individual identification is always tied to social classification. It's always there for some specific purpose, and that's usually to determine someone's level of access or privilege. The ethical questions in facial recognition relate to those social hierarchies and how they're established."
Biometric identification that goes beyond fingerprints
Ready for ID by body odor? Or the butt scan?
Neither are we. But in the brave new world of the biometric revolution, biomarkers like scent and derrière shape could open doors — literally. Or start your car. Or let you vote.
This is not the distant future. Around the world, governments are rolling out massive biometric identification programs. Smartphone makers are acquiring all sorts of Minority Report-ish techologies. And for scientists, the race is on to find new, workable biomarkers, which go away beyond the iris scans and fingerprints we have now.
Think recognition by gait, electrocardiogram, palm vein — and, yes, eau de you and tush shape, too.
The Fear That Has 1,000 Eyes 





Trending on Fooooooox



  • 0

#86 status - Roger Roger

status - Roger Roger
  • Guests

Posted 24 July 2018 - 03:12 PM

I see what you did there...

I can see you in the morning when you go to school
Don't forget your books, you know you've got to learn the golden rule,
Teacher tells you stop your play and get on with your work
And be like Johnnie-too-good, well don't you know he never shirks
He's coming along

After school is over you're playing in the park
Don't be out too late, don't let it get too dark
They tell you not to hang around and learn what life's about
And grow up just like them, won't you let it work it out
And you're full of doubt

Don't do this and don't do that
What are they trying to do?
Make a good boy of you
Do they know where it's at?
Don't criticize, they're old and wise
Do as they tell you to
Don't want…







  • 0

#87 status - Guest

status - Guest
  • Guests

Posted 24 July 2018 - 03:42 PM



  • 0

Reply to this topic


Similar Topics Collapse

IPB Skin By Virteq