YOU
....THE VICTIMS! with
'society' based taxes which bribe you...
YOU'RE .....THE TARGETS!
THE CONSUMERS... The USERS.
sorry, I meant 'citizens'....
threatening voter/citizenship denial..if you do not comply.
or just rigging
the vote [ $ ]
[ $ ][ $ ][ $ ] by blinding you with
technology.
Systems of Control
|
"Those who cast the votes decide nothing, those who count the votes
decide everything."
- Joseph Stalin
|
"we believe...we believe..." |
UK - Postal ballot dirty tricks exposed
SENIOR Labour officials were accused last night of orchestrating a postal
ballot dirty tricks campaign amid rising concern over electoral fraud and
malpractice.
An investigation by The Times has discovered that Labours General Secretary
is urging activists to set up bogus ballot boxes today outside traditional
polling stations in all-postal voting areas...
Times
THE Labour Party has produced a 30-page manual for its members on how to
extract postal votes from the public on their doorsteps...
Times
Indymedia
Foundation for Information Policy Research
|
|
A while back Greg Palast uncovered the racist vote manipulation
strangely reminiscent of the eugenisist links seen in the Bush dynastys dark past.
1999 -
Jeb Bush & the Florida squeeze
"The Florida Republicans wanted to block African Americans, who largely vote as Democrats, from voting. In 1999 they fired the company they were paying $5,700 to compile their felony "scrub" lists and replaced them with Database Technologies [DBT], who they paid $2.3 million to do the same job. [DBT is the Florida division of Choicepoint, a massive database company that does extensive work for the FBI.] "
"And even though the list has been widely condemned -- the company that created it admits probable errors -- the same voter scrub list, with more than 94,000 names on it, is still in operation in Florida. Moreover, DBT Online, which generated the disastrously flawed list, reports that if it followed strict criteria to eliminate those errors, roughly 3,000 names would remain -- and a whopping 91,000 people would have their voting rights restored. "
Exclusive Expose in Salon: Jeb Bush Bars Black Voters from Tuesday Poll
Hey! that symbol looks familiar...
|
|
|
2004 - Vote rigging Jeb Bush the Repeat offender
Days after a Florida appeals court demanded that the state provide more help to felons who want their right to vote restored, Gov. Jeb Bush introduced a new policy that civil rights advocates say circumvents the will of the court and threatens to exclude tens of thousands of potential voters.
Last week, the First District Court of Appeal in Tallahassee unanimously ruled that state prison officials must follow the law and provide newly released felons the necessary paperwork and assistance to get their full civil rights back.
That would include a one-page application for a formal hearing before the Florida Clemency Board - the only way an estimated 85 percent of felons will ever get their rights restored.
But instead of providing the application, Bush decided to scrap it altogether. On Wednesday, he announced that felons will now have to contact the Office of Executive Clemency when and if they want to apply for a hearing to have their rights restored.
Bush argues that the policy reduces paperwork and, therefore, provides the ease and assistance demanded by the court.
Civil rights advocates say the decision will disfranchise thousands of people in a state where more than 400,000 are already banned from voting. - truthout
|
When will the war be over?
And what i hear you ask , happens when there is no foreign soil?
when
ALL is
MURDER INC. (TM)...?
If you don't sign away your human rights..by agreeing to the
'terms and conditions' of your contract for existence within MURDER INC. (TM)...
YOU will be the
TERRORIST ...
Worried about losing money, the entertainment business is peddling false links between DVD pirates and terror cells
If you buy a pirated DVD from a bloke in the pub, you could be personally responsible for the deaths of innocent women and children in terrorist attacks. That, essentially, is the message being promoted this week by the Industry Trust for Intellectual Property Awareness (Itipa), the body that represents some of the world's largest film companies. This week it launched a 1.5m "public awareness campaign" to inform people of supposed links between the "Del Boy" characters who sell pirate DVDs and terrorist cells.
Posters claiming that "terrorist groups sell DVDs to raise funds" are at the heart of the campaign. Anyone renting a video will now be receiving the same message. So where is the evidence for this claim?
Guardian
|
Webmasters - be careful what you link to - citizens - be careful what you say...
Nuero linguistic programming , the media and the Sherman Austin case...
"They use what they call Anchors and Triggers. Anchors are the words they want associated with other words. Triggers are the words they want associated to the Anchors. Go take a look at any internet sites which talk about the recent alleged terror summits in Afghanistan, and you'll see what I'm talking about. "
[from 'Free Sherman Austin' e-mail updates] by Jennifer Ruggiero
see: The Belief engine
|
"Computing culture is founded upon the concept of
continuous upgrade - a strategy designed to maximise profits for large
software/hardware suppliers. It feeds a widespread human desire to have
the latest technology - rapidly changing technology creates rapidly
changing perception of need. "
citizens advice bureau
|
BILL GATES
never trust a hippy
|
"...let me let you in on a little secret about Bill and Melinda Gates so-called "Foundation." Gate's demi-trillionaire status is based on a nasty little monopoly-protecting trade treaty called "TRIPS" the Trade-Related Intellectual Property Rights rules of the World Trade Organization. TRIPS gives Gates a hammerlock on computer operating Systems worldwide, legally granting him the kind of monopoly the Robber Barons of yore could only dream of. But TRIPS, the rule which helps Gates rule, also bars African governments from buying AIDS, malaria and tuberculosis medicine at cheap market prices. "
Greg Palast
"Because he is not a British citizen, the Microsoft Corp. chairman cannot use "Sir" in front of his name, but he can put the letters KBE -- Knight Commander of the British Empire -- after it."
No sir, but Gates will be knighted
|
Bill Gates, chairman of Microsoft, recently committed himself to donating $750 million to the Global Alliance for Vaccines and Immunisation charity. On the World Economic Forum in Davos, Gates, together with rock star Bono and Tony Blair, stated that "2005 must be a turning point for poverty in Africa". With these messianic words, the richest man in the world, with a net worth of $46.5 billion, is more and more presenting himself as the saviour of the world.
A lot has been written about the generosity of Bill Gates and his foundation. Generally Gates is presented as the greatest benefactor on earth. The Times wrote:
"Today's donation pushes Bill Gates into an even more exalted position as the world's biggest philanthropist.
The Gates foundation, which is worth $30 billion, (£17 billion), is now the largest charity to have been created by a single benefactor or private company by a factor of three, following a previous $3 billion gift from its founder last July. Mr Gates has stated that he intends to give away 90 per cent of his fortune, which is currently valued at about $50 billion. - Indymedia
|
Such a well respected guy, too...!
"Steve Jobs [Apple founder] also unveiled a new board that would comprise himself, Oracle chairman Larry Ellison, previous IBM chief executive Jerry York and Intuit president William Campbell.
DuPont's Edward Woolard and Hughes International's Gareth Chang remain after three original members resigned. A new chief executive officer will be appointed by the end of the year. The disbelieving crowd loudly booed the announcement, directing abuse at Microsoft for its perceived predatory behaviour.
Compounding their misery, Microsoft chairman Bill Gates appeared via satellite on a giant screen to sweet-talk the alliance. The crowd's vicious reaction suggested that Gates had been prudent not to deliver his address in person. "
Outrage as Gates nibbles away at Apple
so much for fair trade:
Oxfam launched a new campaign called "Big Sound Music". It allows people to buy and download digital music. A part of the profit is donated to the "Make Fair Trade" campaign. Unfortunately they chose to use the technology from the multinational OD2. This means that only windows users, with the latest Windows Media Player can access the music.
The website Big Noise Music is only accessible for internet explorer on Microsoft Windows, because the Windows Media Player for the Mac does not support the files required and other systems have no access to the Windows Media Player at all. An organization that promotes fair trade should at least consider giving a good example and do not force people to use products from a company that does not make fair trade at all.
US indymedia
|
Bug in antivirus software hits LANs at JR East, some media
Computer local area networks at East Japan Railway Co. and some media organizations were inaccessible Saturday morning, apparently due to a bug in antivirus software made by Trend Micro Inc.
"A bug was detected in a file (designed to detect viruses), and it is highly likely that computer networks that were updated (with the file) encountered a system failure," the software company said.
Trend Micro said its virus analysis and support center in Manila released the file worldwide at around 7:30 a.m. Saturday as part of an update for its Virus Buster software.
It said the file was replaced by a bug-free one before noon.
The buggy file slowed down computer performance substantially by making CPUs run at almost full capacity, the software company said.
JR East encountered the trouble with its LAN from around 8 a.m. to noon, but train services and ticketing operations were not affected, company officials said.
View Plaza, a travel agency operated by JR East, said it suffered access failure. It asked customers to buy their tickets at JR station ticket offices.
Computer networks at Osaka's municipal subway system were also affected.
Kyodo News experienced LAN access failure from around 8:20 a.m. to shortly before noon. The Asahi Shimbun and Yomiuri Shimbun also had trouble with their LANs at their Tokyo and Osaka bureaus, but the problems did not affect editing or printing of their evening editions.
The Nihon Keizai Shimbun's sales bureau and the Shinano Mainichi Shimbun in Nagano Prefecture encountered minor trouble.
The problem also affected absentee voting for mayoral and municipal assembly elections in the city of Toyama, where votes had to be counted manually, while the Tottori Prefectural Government and Beppu City Hall in Oita Prefecture were also hit.
No LAN-related trouble was reported at central government entities such as the prime minister's office.
Trend Micro said its call center would be open over the weekend. It posted directions on its Web site to remove the bug-infected file from affected computers. - The Japan Times: April 24, 2005
|
However,
if you're a 'threat' IE
too intelligent...wrong ideals...
or just
plain old tired of over inflated crap...
they want to remotely destroy
your machine...
This all helps to make 'pirates' / 'reverse engineering'
[IE technological education that is not sponsored by the major corporations]
a form of terrorism...
"How does that TV work DAD???"
"SSSHHH!!! son... THEY might hear you..."
|
We won't be allowed to break their codes...
DVD encryption Reverse engineer 'LIGHTNING UK' forced to quit:
What started as a bit of fun, putting a GUI around some existing code, turned into something that I can only describe as 'part of me' - yes, I know that's sad ;-) As I"ve recently been made aware (by a letter, hand delivered to my door, last Tuesday), due to some law that was changed back in October 2003, circumventing copy protection isn"t allowed.
Ok so it has taken a while (almost 2 years), but eventually "a certain company" has decided they don"t like what I"m doing (circumventing their protection) and have come at me like a pack of wolves. I"ve no choice but to cease everything to do with DVD Decrypter.I realise this is going to be one of those "that sucks - fight them!" kinda things, but at the end of the day, it"s my life and I"m not about to throw it all away (before it has even really started) attempting to fight a battle I can"t possibly win.
If 321 Studios can"t do it with millions, what chance do I have with £50?! As I"m sure most of you have already noticed, the site has been down for a few days. That surprised me as much as the next person (slight breakdown in communication), or I would have issued this statement on it directly.
So anyway, from this point forward, I"m no longer permitted to provide any sort of assistance with anything that helps people infringe the rights of "a certain company". - cdfreaks
|
Will there be any more Alan Turings...?
[see 'mass deception')
Question:
How can the government wage war on people at home?
"Oh thats easy...just inflate the price of all luxury goods and when people seek alternative ways to
feed the instilled technology addiction they will be 'terrorists'...and we can rule by fear..."
File swappers are biggest digital music spenders
Wednesday 27th July 2005 - Music fans who share songs illegally are also the heaviest spenders when it comes to buying digital music. According to a new report, they spend four and a half times more on music downloads from online stores than people who do not use peer-to-peer software to download MP3s.
Music research group The Leading Question found that although file sharers do spend less on CDs they also spend an average of £5.52 each month on downloads. In contrast, P2P abstainers spend just £1.27
'So far, the music industry has tried to get these pirates on-side by taking them to court, but there need to be plenty of carrots alongside the sticks,' said Paul Brindley, director, The Leading Question. 'Legal actions are making something of an impact but unlicensed file sharing will never be eradicated.'
Although the report confirms that the record industry, in taking legal action against file sharers, may be suing
computershopper.co.uk
|
Record industry renews assault on filesharers
Friday 29th July 2005 - The US record industry has launched yet another attack in its offensive against serial file shares.
The Recording Industry Association has begun another 765 John Doe lawsuits in an attempt to further reduce the number of files available on peer-to-peer networks.
The John Doe suits are the first step in the legal process and enable RIAA lawyers to subpoena ISPs for the names and addresses of individual file sharers, based on their IP addresses and dates and times online.
The RIAA also filed 176 lawsuits that name defendants identified from previous John Doe suits. These people will now have the option of paying up or facing court proceedings.
computershopper.co.uk
|
Who's paying for Sony bribes?
Justin Schlosberg | 02.08.2005 12:27 | Analysis | Indymedia
Last week Sony BMG, one of four major record companies who control over 80% of the music industry, admitted to bribing DJ's and radio stations in a bid to get their songs on the air.
Investigators uncovered written evidence of plots to shower DJ's and programmers with everything from plasma TV screens to family vacations in return for guaranteed radio play. One employee was reported to have asked a DJ "whatever you can dream up, I can make it happen".
But this story is much more than juicy filler for entertainment industry gossip pages. It's a glaring example of global corporate media companies tightening their grip on the airwaves, barring entry to anyone without a major label-sized wallet. Make no mistake - Sony is not thought to be alone in this practice and eyes are turning towards their oligopoly partners. According to New York State Attorney General Eliot Spritzer "Pay-for-play is driving the industry and it is wrong". It's ironic that an industry that has spent billions trying to combat piracy, should be caught so blatantly with its legal pants down, quite literally stealing the airwaves.
But the problem is not just with the copyright owners. Since the US Telecommunications Act passed in 1996, Clear Channel (who were implicated in the scandal) has bought over 1200 radio stations. That's thirty times more than the legal limit before 1996, originally imposed to protect radio diversity. Since then, Clear Channel-owned stations have been accused of widespread censorship (axing Howard Stern after a bit of Bush bashing on air), dropping artists from their play lists who don't use Clear Channel to promote their concerts, and homogenizing their content to such a degree that the same shows are aired on multiple stations using -voice tracking' to suggest they are hosted by local DJ's. In an act of reverse bribery (blackmail?), one Clear Channel programmer sent an email to a Sony executive asking for a laptop in exchange for playing the new record by Bow Wow.
In reality, global media corporations collude with each other more than they compete. The Recording Industry Association of America (RIAA), when its not spending time suing a 12 year old girl (as it did last year - enforcing a $2000 fine for file sharing), is ranked as one of the top industry lobbying groups in Washington. Little wonder that in recent years, merger after merger after acquisition has sailed through the regulatory bodies on both sides of the Atlantic. And the Clear Channel monster did little to put off UK lawmakers who enacted the Communications Bill in 2003, effectively mimicking the US equivalent seven years earlier.
Ultimately it's the ordinary consumer who bears the cost, not only through inflated CD prices. As in all media industries, conglomeration has a marked effect on content, reducing it to the bottom line, low-risk and uncontroversial. When EMI axed 1500 jobs and cut its roster by a quarter last year, the chairman admitted it was mostly -niche' artists that were culled. Whether its manifest in trivial tabloid headlines, -voice tracking' or identical sounding boy bands, the principle is the same. Not surprising that kids are spending their pocket money on computer games. At least they're challenging.
- indymedia.org.uk
|
All knowledge will be allowed only to those deemed appropriate[ $ ][ $ ] by the state...
and only specific knowledge, approved by your leaders,
will escape the ten year collective collapse of digital history...(back it
up boys and girls!!!)
"Here's a hint: You have no control over what it does. Unlike a normal PC, you have no say over the hardware or software. You can't add or take out bits and pieces, you can't start, stop, install or uninstall new programs. And, in the case of Sky Digital, if you choose not to plug your modem in, you'll lose your "Interactive Discount" and have to pay them up to 248. That makes interactive TV a service you pay not to have."
INTERACTIVE TV: A COMING ORWELLIAN NIGHTMARE!
|
"The computer chips are built on plates or cards that contain epoxy. In my book I describe the epoxy components, where bisphenol A, in particular, in combination with light, is suspected of creating chronic light sensitivity.
But there are many more chemicals in electronics. IBM revealed in 1990 that hundreds of chemicals were released from their computer monitors. There is often the talk of "safe" levels, but as regards chemicals stored in the human body; one cannot talk about safe levels. We know nothing of how chemicals and electromagnetic radiation work in unison."
OCCUPATIONAL INJURY IN THE OFFICE Are chemicals in computers the explanation for electric sensitivity?
|
high strangeness: Hey! it's only a movie!
|
Gregory's 2 girls
Gregory Underwood is still at school. Only now he's a teacher. With a unique teaching style, drawn from the columns of all those liberal magazines of world concern to which he religiously subscribes, Gregory sees himself as a citizen of the world. However, it turns out that Greg still does most of his living inside that head of his. Which leaves him blind to the obvious attractions of Belle, the voluptuous music teacher who is bravely trying to engage the terminally adolescent Greg in an adult relationship. Meanwhile Gregory is entertaining a futile infatuation for one of his brighter pupils, Frances. When Frances, inspired by his teaching, involves Gregory in her campaign against global injustice and, in particular, against suspected arms-dealer and local businessman, Fraser Rowan, Greg's moral smugness is put to the test. - source
In this film the 'bad guy' is an arms merchant, who is posing as a computer dealer. His corporation hides behind the facade of reclaiming old office computers, and sending them to poor schools in third world countries, while secretly experimenting & selling electromagnetic torture equipment that is used for the abuse of dissidents abroad...
|
|
"It is possible to manipulate the nervous system of a subject by
pulsing images displayed on a nearby computer monitor or TV set. For the
latter, the image pulsing may be imbedded in the program material, or it
may be overlaid by modulating a video stream, either as an RF signal or as
a video signal. The image displayed on a computer monitor may be pulsed
effectively by a simple computer program. For certain monitors, pulsed
electromagnetic fields capable of exciting sensory resonances in nearby
subjects may be generated even as the displayed images are pulsed with
subliminal intensity."
read US patent
Mind Manipulation Research -
The Human Mind is subject to attacks using RF, microwave and non-ionizing radiation. ACC has experimented with anbd produced the means to condition the actions of computer users. ACC research has affected people by transmitting pulsed RF and microwave at them.
mindjustice.org
|
|
NSA's Subliminal Post-hypnotic Scripts
The NSA's goal is to have the whole world under its electronic eye by the year 2000. They are almost there now, but are having difficulties with high-tech countries that have the counterintelligence resources to identify the high frequency bursts of microwave transmission from the transceivers. The system also has the ability to take a "voice print" from any person and place it on file. This file can be used to locate the subject later by comparing it to real-time surveillance audio samples received from the field as long as the subject is speaking in close proximity to a transceiver.
If the person is aware that the NSA has this capability and remains silent, the NSA can transmit a periodic worldwide subliminal message that addresses the person by name and causes them to dream and talk in their sleep. After the person talks, the voiceprint would be eventually identified and the person's location can be identified nearly anywhere in the world. Yes, it is a small world, and getting smaller all the time. - source
[I would suggest it be far easier to use a call-center as a cover operation and get voice prints via that method]
|
|
On March 3, 2003, the British Observer published on its web site a leaked document that apparently showed that the Bush administration was spying on UN Security Council delegates. The document was allegedly written by an official at the NSA and ordered an increase of surveillance on delegations from Angola, Bulgaria, Cameroon, Chile, Guinea and Pakistan. In June, the accusation was made that the Waihopai station in Marlborough NZ is being used by the NSA to spy on UN Security Council members in order to get support for a war against Iraq.
The two satellite dishes at Waihopai are said to be part of the "Echelon" programme that globally intercepts electronic communications. In May, 2003, the Bush administration stepped up construction at Fort Greely, Alaska, for missile silos and a dozen state-of-the-art military command and support facilities for a vanguard force of rocket-propelled interceptors to defend the United States against ballistic missile attack. -
National Security Agency
NSA home
|
|
REMOTE ACCESS/CONTROL
The idea of connecting and accessing or even controlling the resources of one computer from another is almost as old as computers themselves. As far as personal systems are concerned the history of practical implementations of remote computing include many different hardware and software solutions. From a direct connection via serial or parallel ports, through cable networks and modem dial-up connections, to the Internet infrastructure and to the infrared, microwave and radio wireless transmissions.
A wide range of software implementations includes a variety of access and control levels - from a very limited access, single-task oriented applications like electronic mail to a complete remote access and control applications like remote desktops.
Traditionally a system whose resources are accessed and controlled remotely is described as a server, and a system, which connects and controls is referred to as a client (alternatively a client can be called a master, and a server - a slave). Additionally, one server usually allows for multiple client connections.
For the purpose of this paper we will limit the scope of discussed remote access applications to those which: use the Internet as a communication media and which allow a certain degree of the remote control of a server or are, at least, able to collect and pass significant and valuable information back to a client.
...Anti virus research
...Windows XP spies on you
Promis - Bugged Computer Software
|
Carnivore is apparently the third generation of online-detection software used by the FBI. While information
about the first version has never been disclosed, many believe that it was actually a readily available
commercial program called Etherpeek.
In 1997, the FBI deployed the second generation program, Omnivore. According to information released
by the FBI, Omnivore was designed to look through e-mail traffic travelling over a specific Internet
service provider (ISP) and capture the e-mail from a targeted source, saving it to a tape-backup drive
or printing it in real-time. Omnivore was retired in late 1999 in favor of a more comprehensive system,
the DragonWare Suite, which allows the FBI to reconstruct e-mail messages, downloaded files or even Web
pages. - source
|
|
Carnivore can theoretically scan millions of emails per second -- processing as much as six gigabytes
(6,000 megabytes) of data every hour [3]. It targets data much more selectively in practice. By scanning
the subject lines and headers of incoming or outgoing messages, the system identifies relevant
communications among selected individuals as part of a criminal investigation. Data deemed useful
can be off-loaded onto removable drives and retrieved through secure dial-up sessions. -
source
|
Mind control - The internet?
The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic intelligence network.
The NSA's EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information on the PC. Coded RF waves from the NSA's equipment can resonate PC circuits and change data in the PCs. Thus, the NSA can gain wireless modem-(?) entry into any computer in the country for surveillance or anti-terrorist electronic warfare. - Domestic Surveillance and
Mind Control Technology?
A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information"trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled. - How NSA access was built into Windows
|
New Web ads follow visitors around
ESPN and other websites, eyeing the successes search engines have had with ads based on keywords, are exploring a new form of targeting that's tied to their visitors' on-line habits.
Though some privacy advocates find the practice creepy, websites say the technology lets them deliver ads that readers find more relevant.
"If someone spends an awful lot of time on mutual fund pages, clearly they are interested in mutual funds," said Scot McLernon, executive vice-president of sales at MarketWatch.com Inc. "Why not have ... mutual fund advertising follow them?"
Mr. McLernon said MarketWatch was in talks about the new targeting with more than a half-dozen advertisers, including an on-line broker and an airline, while ESPN's sales force began marketing it in late May.
Both on-line destinations use Revenue Science Inc. of Bellevue, Wash. Others in the behavioural targeting business include Tacoda Systems Inc. and AlmondNet Ltd., both of New York.
globetechnology.com
|
|
a backdoor through your powerline?
Powerline Networks connect your computers through your existing electrical system. Plug the units to an electrical outlet and connect the Powerline Network device to your computer or laptops USB port or Ethernet port. source
|
Corporate Intelligence - hacking for profit????
The Secret window
A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information" trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled. Duncan Campbell
|
Windows used in the battlefield? [turkeyshoot] - God help us all...
"Sergeant Major Salvador Martinez of the 4ID's 1-22 Battalion is another believer. The system saves lives and cuts down on friendly fire incidents, and because it's Windows-based it's as easy to use as a home computer, he said."
Iraq's Sunni triangle a test-bed for US army's "digital division"
Spacewar.com
so..not only are they admitting the Iraq war was a great excuse to test thier toys...but they also use WINDOWS...
That makes me feel a whole lot safer...NOT!
|
US military gets its own secure version of Windows
The US Air Force has had enough of Microsoft's security problems. But rather than switch to an alternative, it has struck a deal with CEO Steve Ballmer for a specially configured version of Windows to be used by all its 525,000 personnel and civilian support staff.
Air Force CIO John Gilligan said the department wants to use a single version of Microsoft products, built with extra security, on its desktops and servers to help it reduce the problems it faces in applying software patches whenever Microsoft announces new vulnerabilities.
The new deal sees the consolidation of 38 separate contracts with just two. The new contracts involve Microsoft supplying a version of its desktop and server operating system and applications that include System Management Server 2003, Office 2003, and Exchange. The new arrangement will save the Air Force about $100 million, according to Gilligan.
The Air Force will receive automated patch updates under a program in which Microsoft will give the Air Force special attention to identify new vulnerabilities early on.
The laborious patch testing and distribution process would be automated through a single center. All Microsoft software purchasing will also be made centrally from now on.
The Microsoft products will be configured under guidelines still to be determined but expected to be based on input from the National Security Agency, Defense Information Systems Agency as well as the Center for Internet Security.
source
|
Computer crash to delay pension and benefit payments
Payments to tens of thousands of people who receive state pensions and benefits will be delayed after a computer crash at the UK Department of Work and Pensions.
[snip]
Both Microsoft and the Texas-based contractor EDS, the company that holds a 2 billion contract to upgrade and run the department's systems, will be asked to explain what went wrong in a report being drawn up for Alan Johnson, the Secretary of State for Work and Pensions.
telegraph uk
The DWP was carrying out a "routine software upgrade" on Monday when the system crashed, leaving around 80% of the department's 100,000 desk machines disrupted or completely shut down, a DWP spokeswoman said today.
U.K. government hit with another large computer failure The computer crash is being called the biggest in U.K. government history
ELECTRONIC DATA SYSTEMS CORP
In-Q-Tel, the CIA's venture arm, has invested in roughly 30 companies since it launched in 1999 with the goal of finding and developing technology in the private sector which can also be used in the intelligence community.
source
|
|
|
In-Q-Tel
Meet The CIA's Venture Capitalist
The enterprise was started in 1999 as a way for the government to tap into Silicon Valley's tech boom. At the time, businesses were spending millions on new technologies, and startups neither knew how nor particularly cared to deal with the Defense Dept. or intelligence agencies.
BUSY MIDDLEMAN. The CIA wanted to change this and get a window into what engineers were doing. The agency figured the best way to do that was by flashing a little cash. Then the terrorist attacks of Sept. 11, 2001, put In-Q-Tel's mission on the front burner for folks both in the Valley and Washington, D.C. The outfit was flooded with business plans, and its budget and staff increased dramatically -- a necessary step.
|
On the government side, the lack of communication among various intelligence divisions was painfully obvious, and new technology was needed to solve that. On the startup side, few knew how to deal with the feds. In-Q-Tel was the middleman. "Our deal flow went up by a factor of five," Louie says.
In just six years, the Arlington (Va.) venture, which also has offices in Menlo Park, Calif., has invested in 77 transactions. Last year, it completed a deal about every other week, each ranging in size from $500,000 to $3 million. By comparison, a typical venture-capital firm does about a dozen deals a year. Many of the startups credit In-Q-Tel for helping them get a foothold in the federal world. "It's hard to be an 18-person organization and have government entities see you as useful," says Jeff Jonas, chief scientist at Analytic Solutions, which IBM (IBM ) acquired in January, 2005. - businessweek
Homeland Security:
A Tech Boom This Time?
|
|
In-Q-Tel, CIA's Venture Arm, Invests in Secrets
By Terence O'Hara - Monday, August 15, 2005; Page D01
When inventors James MacIntyre and David Scherer founded Visual Sciences Inc. in 2000, doing work for the Central Intelligence Agency was not in their plans.
The two men had developed software that could monitor and graphically display patterns in complex information systems. A bank marketing executive using the software could determine which online customers were clicking on links to information about home equity loans, then display information about those customers.
Gilman Louie is chief executive of In-Q-Tel, described as the venture-capital arm of the Central Intelligence Agency. (By Julie Jacobson -- Associated Press)
Employees Have a Stake in Nonprofit's Investments
Although In-Q-Tel is a nonprofit organization funded by the CIA, its 50 current and 35 former employees get to profit from its successes.
It takes no great leap of imagination to envision a CIA analyst using the software, connected into the right databases, to track terrorist activities. But it took In-Q-Tel to make that leap.
The nonprofit organization, funded with about $37 million a year from the CIA, last year made a small investment in Visual Sciences and paid the McLean company a fee to license its software to the intelligence agency. For Visual Sciences, which has 50 commercial customers and has been profitable for two years, it was a way into the federal sector without the bureaucratic hassles required to compete for contracts.
"In-Q-Tel provided a buffer from being a real government contractor," MacIntyre said. "I still don't know how our technology will apply to the CIA."
In the five years since it began active operations as the "venture capital arm" of the CIA, In-Q-Tel's reach and activities have become vast for so small an operation. It has invested in more than 75 companies and delivered more than 100 technologies to the CIA, most of which otherwise would never have been considered by the intelligence agency. Virtually any U.S. entrepreneur, inventor or research scientist working on ways to analyze data has probably received a phone call from In-Q-Tel or at least been Googled by its staff of technology-watchers.
Born from the CIA's recognition that it wasn't able to acquire all the technology it needed from its own labs and think tanks, In-Q-Tel was engineered with a bundle of contradictions built in. It is independent of the CIA, yet answers wholly to it. It is a nonprofit, yet its employees can profit, sometimes handsomely, from its work. It functions in public, but its products are strictly secret.
Over the years, some critics have dismissed In-Q-Tel as a government boondoggle. They have described the firms it invests in ominously as "CIA-backed," as if they were phony companies serving as cover for spy capers.
But in interviews with more than a dozen current and former CIA officials, congressional aides, venture capitalists that have worked with it and executives who have benefited from it, no one disputed that what began as an experiment in transferring private-sector technology into the CIA is working as intended. The Army, NASA and other intelligence and defense agencies have, or are planning, their own "venture capital" efforts based on the In-Q-Tel model.
"On a scale from one to 10, I would give it an 11," said A.B. "Buzzy" Krongard , the CIA's former No. 3 official and a former investment banker. "It's done so well even Congress is taking credit for it." - more
|
Will the next '9-11' be in cyberspace?
Woodward: Are our computers safe?
Former fed cyberczars debate Internet hazards
June 6, 2005
WASHINGTON - Even Bob Woodward doesn't trust the Internet.
Last week, after Vanity Fair surprised everyone last week by disclosing the identity of Deep Throat, The Washington Post published a lengthy, detailed retrospective by Woodward on W. Mark Felt, the FBI agent who served as his secret informant during Watergate. Woodward had the story essentially ready to go, because he had been preparing it for when Felt died.
The story, along with other critical information, was kept on a computer in his home that wasn't connected to the Internet, Woodward told a group of computer security officials Monday. Woodward said he keeps all his important stories on this computer, physically disconnected from the world of computer hackers.
Woodward's remarks — along with the news of one of the biggest data-loss incidents on record — underscored how much work still lies ahead for the computer security industry, which gathered here Monday for an annual Gartner conference.
"Don't you think the average person is kind of scared?" Woodward asked. He cited statistics indicating 80 percent of consumers aren't sure if they have been attacked while in cyberspace.
"How many people have ever been in a car that's broken down and don't know it?" he said.
Separately, Citigroup's consumer finance division, CitiFinancial, revealed Monday that a box of data tapes headed for a credit bureau was missing and that the tapes contained private information on 3.9 million consumers.
It was the latest in a series of disclosures from banks, data brokers, retailers and even universities that personal identification information had been exposed or stolen. "There has been an orgy of disclosures," said Gartner analyst John Pescatore.
The stream of admissions concerns Bruce Schneier, considered one of the founders of computer cryptography and now the CEO of Counterpane Internet Security Inc. He said such government-mandated disclosures were initially designed to shame companies into taking better care of consumers' data. But the California state law's effect is now muted, he said.
"The public shaming effect is less and less as more and more people do it," he said. He suggested that news agencies and consumers have now become tired of the disclosures — minimizing the deterrent effect.
'Crisis of confidence'
Woodward, whose appearance at the conference so soon after the Deep Throat revelation was a coincidence of scheduling, chaired a panel discussion of former White House cyberczars. The heavily attended session took on the question of what role the federal government — and the Bush administration in particular — should play in protecting the nation from cyberattack.
The former cyberczars, Howard Schmidt, Amit Yoran and Roger Cressey, all served post 9/11 and have since left government and returned to private industry. While Yoran and Schmidt said they left simply because their assignments were complete, Cressey was sharply critical of Bush's computer security policies.
"The bumper sticker would say this administration doesn't care about cyberspace," Cressey said. "I wouldn't go that far, but there is a general feeling that this administration is unwilling to elevate the issue."
Despite public-private partnerships and the creation of government offices devoted to security, consumers are feeling increasingly insecure about their computers and the Internet, Cressey said.
"There is a growing crisis of confidence, and more and more people may decide that cyberspace is a place they don't want to go," he said.
Yoran said that even though he has spent his career working in security, he is only about 70 percent sure that his home computer is completely safe from outside attackers.
Worst-case scenarios
The discussion also focused on the possibility of an electronic 9/11, or at a terrorist attack with an Internet-based component.
"The question that is pulsing with everyone ... is why haven't we been attacked again," Woodward said. "My dark view ... is somebody is telling them to wait."
Yoran and Schmidt said it's particularly difficult for government to protect against unknown attacks, and even more difficult to take credit when such attacks are thwarted. That also prevents cybersecurity from getting more White House attention, they said.
"How do you measure the negative?" Schmidt said.
Worst-case scenarios discussed involved "cascading effects" from limited computer outages, such as recent incidents that temporarily crippled airlines, or the 2003 northeast blackout. Such incidents reveal how fragile connected computer systems are. A new 9/11 could include a multi-layered attack, or "swarm" attack which included some electronic elements, Cressey said.
Still, there hasn't been a significant terrorist-related computer incident, leading some to describe the threat as over-exaggerated.
Ultimately, Woodward said, if something does happen, no one will be able to say they weren't warned. "We are now in an environment in which we have all been put on notice."
By Bob Sullivan
Technology correspondent
MSNBC
|
Will the Internet suffer a fatal attack?
[IE be deliberately 'shut down']
Will the media hype it up as the 'collapse of civilisation'?
watch out for those virtual wargames in cyberspace folks!...
CIA plays Cyber-Wargames
The CIA mounted Silent Horizon to measure a US response to possible cyber terrorism.
The CIA has been conducting a three day exercise dubbed 'Silent Horizon' this week, to aid recognition of large-scale hack attacks and to measure how effective responses are to these possible acts of cyber war / cyber terrorism:
The exercise was being conducted in Charlottesville, Virginia, by members of the CIA's Information Operations Center, which evaluates foreign threats to U.S. computer systems, particularly those that support critical infrastructures. It was expected to conclude Thursday.
The federal government has conducted various attack simulations since the Sept. 11, 2001, attacks on New York and Washington, which killed about 3,000 people and prompted the U.S. war on terrorism.
Top U.S. intelligence officials say it may be only a matter of time before the United States is attacked again by terrorist groups including Osama bin Laden's al Qaeda.
Cyber attacks, which have drawn less publicity than possible chemical, biological, radiological and nuclear attacks, are viewed by U.S. officials as a potential al Qaeda weapon against the U.S. economy. - Posted 07:56 - 27.05.2005 - by Jason Cundabit-tech.net
|
Korea does cyber-wargames
The Korean military, which began regularly scheduled wargames today, has added a new component: combatting cyberattack.
The Ulji Focus Lens drill usually involves the usual sort of military maneuvers to prepare for possible attack by North Korea, including gradual escalation to higher threat levels.
But this time the Korean joint chiefs have scheduled a mock cyberattack that forces their IT people to take steps to guard their computer and network infrastructures. . - bizjournals.com
|
Microsoft helps China to censor bloggers
June 15, 2005 - Civil liberties groups have condemned an arrangement between Microsoft and Chinese authorities to censor the internet.
The American company is helping censors remove "freedom" and "democracy" from the net in China with a software package that prevents bloggers from using these and other politically sensitive words on their websites.
The restrictions, which also include an automated denial of "human rights", are built into MSN Spaces, a blog service launched in China last month by Shanghai MSN Network Communications Technology, a venture in which Microsoft holds a 50% stake.
Users who try to include such terms in subject lines are warned: "This topic contains forbidden words. Please delete them."
Even the most basic political discussion is difficult because "communism", "socialism", and "capitalism" are blocked in this way, although these words can be used in the body of the main text. Many taboo words are predictable, such as "Taiwanese independence", "Tibet", "Dalai Lama", "Falun Gong", "terrorism" and "massacre". But there are also quirks that reflect the embryonic nature of net censorship and the propaganda ministry's perceived threats.
The word "demonstration" is taboo, but "protest" is all right; "democracy" is forbidden, but "anarchy" and "revolution" are acceptable. On MSN Space, Chinese bloggers cannot use the name of their own president, but can comment on Tony Blair. "Tiananmen" cannot be mentioned.
A Microsoft spokesman said the restrictions were the price the company had to pay to spread the positive benefits of blogs and online messaging.
"Even with the filters, we're helping millions of people communicate, share stories, share photographs and build relationships. For us, that is the key point here," Adam Sohn, a global sales and marketing director at MSN, told the Associated Press news agency.
For the Chinese government, which employs an estimated 30,000 internet police, the restrictions are an extension of a long-standing policy to control the web so that it can be used by businesses but not by political opponents.
For Microsoft, it appears to be a concession to authoritarianism on the net. It comes only months after Microsoft's boss, Bill Gates, praised China's leaders, who have mixed market economics with rigid political control. "It is a brand new form of capitalism, and as a consumer it's the best thing that ever happened," he said.
Along with a throng of other net giants, Microsoft is trying to make inroads into China's fast-growing internet market, expected to top 100 million users this year. Only the United States has more people online, but Mr Gates admitted this year that his company was underperforming in China.
Microsoft is not alone in accepting censorship requests from China. The free-speech group, Reporters Without Borders, says Yahoo has a similar policy. The group said any justification for collaborating with Chinese censorship based on obeying local laws did "not hold water". The multinationals must "respect certain basic ethical principles" wherever they operated.
China's information industry ministry, meanwhile, has ordered owners of blogs and bulletin boards to register their sites by the end of this month or have them shut down.
The ministry's website said: "The internet has profited many people, but it also has brought many problems, such as sex, violence and feudal superstitions and other harmful information that has seriously poisoned people's spirits."
· Japan is considering censoring the internet after an 18-year-old boy, who was arrested for throwing a homemade bomb into his classroom, said he had found instructions on how to make it from a website. A government taskforce is expected to target sites that offer advice on making explosives, sell drugs and other illegal items, or encourage people to arrange group suicides. - Jonathan Watts The Guardian
|
Advocates crack printer identifier code
Secret Code in Color Printers Lets Government Track You
Tiny Dots Show Where and When You Made Your Print
San Francisco - A research team led by the Electronic Frontier Foundation (EFF) recently broke the code behind tiny tracking dots that some color laser printers secretly hide in every document.
The U.S. Secret Service admitted that the tracking information is part of a deal struck with selected color laser printer manufacturers, ostensibly to identify counterfeiters. However, the nature of the private information encoded in each document was not previously known.
"We've found that the dots from at least one line of printers encode the date and time your document was printed, as well as the serial number of the printer," said EFF Staff Technologist Seth David Schoen.
You can see the dots on color prints from machines made by Xerox, Canon, and other manufacturers (for a list of the printers we investigated so far, see: the list).
The dots are yellow, less than one millimeter in diameter, and are typically repeated over each page of a document. In order to see the pattern, you need a blue light, a magnifying glass, or a microscope (for instructions on how to see the dots, see: here).
EFF and its partners began its project to break the printer code with the Xerox DocuColor line. Researchers Schoen, EFF intern Robert Lee, and volunteers Patrick Murphy and Joel Alwen compared dots from test pages sent in by EFF supporters, noting similarities and differences in their arrangement, and then found a simple way to read the pattern.
"So far, we've only broken the code for Xerox DocuColor printers," said Schoen. "But we believe that other models from other manufacturers include the same personally identifiable information in their tracking dots."
You can decode your own Xerox DocuColor prints using EFF's automated program at this page.
Xerox previously admitted that it provided these tracking dots to the government, but indicated that only the Secret Service had the ability to read the code. The Secret Service maintains that it only uses the information for criminal counterfeit investigations. However, there are no laws to prevent the government from abusing this information.
"Underground democracy movements that produce political or religious pamphlets and flyers, like the Russian samizdat of the 1980s, will always need the anonymity of simple paper documents, but this technology makes it easier for governments to find dissenters," said EFF Senior Staff Attorney Lee Tien. "Even worse, it shows how the government and private industry make backroom deals to weaken our privacy by compromising everyday equipment like printers. The logical next question is: what other deals have been or are being made to ensure that our technology rats on us?"
EFF is still working on cracking the codes from other printers and we need the public's help. Find out how you can make your own test pages to be included in our research at this page.
Contact:
Seth Schoen
Staff Technologist
Electronic Frontier Foundation
seth@eff.org
www.eff.org
More
|
America Online (AOL): Made in Langley, VA
Encyclopedia Britannica explains that the foundation of the Internet was "inspired by advances in science and technology that occurred as a result of World War II; the NSF was established by the U.S. Congress in the National Science Foundation Act of 1950." What the NSF is, in other words, is one of a blizzard of intelligence fronts that were set up in the immediate aftermath of the forming of the CIA itself in
1947.
Of course, just because the beloved internet was begun as an intelligence entity and is still administered by a government agency doesn't mean that it still functions as an intelligence tool. It is worth noting, however, that the company that was primarily responsible for repackaging the internet into a civilian entity, America Online, is perhaps the most thinly veiled intelligence front ever conceived.
This can be easily verified by a visit to AOL's corporate website, where visitors learn - among other things - that the company is headquartered in Dulles, Virginia.
Curious as to where this might be, I attempted to locate the city of Dulles on a couple of maps, to no avail. This, I learned, was because Dulles is actually an offshoot of Langley, Virginia.
Langley is also rather difficult to locate on a map. For the uninitiated, this is because Langley, Virginia is the home of the Central Intelligence Agency. In fact, there isn't much else in Langley, Virginia, which exists almost exclusively to provide residence to the thousands of employees of the CIA's headquarters. And it is precisely there that you will find the home of AOL. Apparently recognizing the negative connotations of a Langley mailing address, the company essentially created a 'suburb' and named it Dulles. Dulles, by the way, is named in honor of the notorious Dulles siblings, Allen and John Foster, whose names were virtually synonymous with the U.S. intelligence infrastructure through both World Wars and much of the Cold War.
Another fact about AOL that belies its true function is the composition of its Board of Directors
Here you will find such high-level military/intelligence assets as General Colin Powell and General Alexander Haig. All of which gives a whole new meaning to that all-seeing eye that comprises the company's logo.
The ways in which we are encouraged to use the internet also belie an intelligence function. Perhaps the most popular use is for communicating via e-mail, which is rapidly replacing other modes of communication. Not coincidentally, e-mail communications are far easier to intercept than are correspondence by phone or letter, especially given that they are traveling on a network designed by spooks. -
libertythink
|
Internet governance remains in US hands
By Kate Mackenzie in London November 16 2005
Internet governance will remain predominantly under US control for at least five years, after a vote at a UN conference in Tunisia.
The second summit of the UN-endorsed World Summit of the Information Society, which is under way in Tunis, agreed late Tuesday night to a deal that will see the status quo continue largely unchanged.
Several countries including Iran, China and Saudi Arabia, argued that internet governance should become truly international, but the US wanted to continue its control of the International Council for Assigned Names and Numbers (Icann), which manages internet technical policy.
The forum negotiators agreed to the creation of a new Internet Governance Forum, which will have international representation and will discuss public policy issues, but have little power over areas controlled by existing bodies such as Icann.
Domain names (such as ‘ft.com’) have been the main bugbear of internet governance, along with the control of national domain extensions (such as .uk or .ru), and the introduction of domain names in character sets that support languages such as Mandarin.
Internet governance
China and Iran had particularly objected to the control of internet addressing and technical policy by Icann, which is mandated by the US Chamber of Commerce. The EU had also called for more international governance, but softened its stance earlier this year. The US, and several other countries including Australia and Canada, have argued internationalising the system could bog down internet governance in bureaucracy and stifle innovation.
Most of the 13 “root server” computers, which direct all internet traffic, including emails and web pages, are located in the US and all come under the control of Icann, whose staff and board include members from around the world, but are mostly US technologists and lawyers.
By contrast, the telephone numbering system is run by the International Telecommunications Union, an organisation affiliated to the United Nations.
Icann is a California-based non-profit organisation whose creation was mandated by the US Chamber of Commerce under the Clinton administration in 1998. It was formed with the intention to facilitate the transition of the domain name system from US control to the global community, and last year announced plans to become a more internationally representative organisation. But in June the US Chamber of Commerce reaffirmed it wanted to keep control of the body.
Non-US governments are represented on Icann’s Government Advisory Committee, but critics argue this too has limited power.
The decision on Tuesday night meant much of the remainder of the WSIS conference will focus on the “digital divide”. On opening the conference, ITU Secretary-General Yoshio Utsumi said the forum’s goal of connecting 800,000 unconnected villages to the internet by 2015 was attainable.
“In order to connect these villages we need about $1bn,” Mr Utsumi said. “Every year about $100bn is invested in the mobile telephone system, so only 1 per cent of this amount is needed to achieve the target.” -
ft.com
|
or does it?
Computer giant closes down web-log crusading for free speech
JOE MCDONALD IN BEIJING - MICROSOFT has shut down the internet journal of a Chinese blogger that discussed politically sensitive issues including a recent strike at a Beijing newspaper.
The action came amid criticism by free-speech activists of foreign technology companies that help the communist government enforce censorship or silence dissent in order to be allowed into China's market. Microsoft's China-based web log-hosting service shut down the blog at the Chinese government's request, said Brooke Richardson, the group product manager with Microsoft's MSN online division, adding: "When we operate in markets around the world we have to ensure that our service complies with global laws as well as local laws and norms."
Although Beijing has supported internet use for education and business, it fiercely polices content.
The blog, written under the pen name An Ti, by Zhao Jing, who works for the Beijing bureau of the New York Times as a research assistant, touched on sensitive topics such as China's relations with Taiwan. Last week, he used the blog to crusade on behalf of a Beijing newspaper.
Reporters at the Beijing News, a daily known for its aggressive reporting, staged an informal one-day strike after their chief editor was removed from his post. These events attracted comments on Chinese online bulletin boards, which censors then erased.
Online bulletin boards and web-logs have given millions of Chinese an opportunity to express opinions in a public setting in a system where all media are government-controlled. But service providers are required to monitor web-logs and bulletin boards, erase banned content and report offenders.
Foreign companies have adopted Chinese standards, saying they must obey local laws.
Microsoft's web-log service bars use of terms such as "democracy" and "human rights". - scotsman.com
|
US plans to 'fight the net' revealed
By Adam Brookes - BBC Pentagon correspondent
A newly declassified document gives a fascinating glimpse into the US military's plans for "information operations" - from psychological operations, to attacks on hostile computer networks.
Bloggers beware. [my note: er excuse me?]
As the world turns networked, the Pentagon is calculating the military opportunities that computer networks, wireless technologies and the modern media offer. From influencing public opinion through new media to designing "computer network attack" weapons, the US military is learning to fight an electronic war.
The declassified document is called "Information Operations Roadmap". It was obtained by the National Security Archive at George Washington University using the Freedom of Information Act. Officials in the Pentagon wrote it in 2003. The Secretary of Defense, Donald Rumsfeld, signed it.
The "roadmap" calls for a far-reaching overhaul of the military's ability to conduct information operations and electronic warfare. And, in some detail, it makes recommendations for how the US armed forces should think about this new, virtual warfare.
The document says that information is "critical to military success". Computer and telecommunications networks are of vital operational importance.
Propaganda
The operations described in the document include a surprising range of military activities: public affairs officers who brief journalists, psychological operations troops who try to manipulate the thoughts and beliefs of an enemy, computer network attack specialists who seek to destroy enemy networks. All these are engaged in information operations.
Perhaps the most startling aspect of the roadmap is its acknowledgement that information put out as part of the military's psychological operations, or Psyops, is finding its way onto the computer and television screens of ordinary Americans.
"Information intended for foreign audiences, including public diplomacy and Psyops, is increasingly consumed by our domestic audience," it reads.
"Psyops messages will often be replayed by the news media for much larger audiences, including the American public," it goes on.
The document's authors acknowledge that American news media should not unwittingly broadcast military propaganda. "Specific boundaries should be established," they write. But they don't seem to explain how. "In this day and age it is impossible to prevent stories that are fed abroad as part of psychological operations propaganda from blowing back into the United States - even though they were directed abroad," says Kristin Adair of the National Security Archive.
Credibility problem
Public awareness of the US military's information operations is low, but it's growing - thanks to some operational clumsiness. When it describes plans for electronic warfare, or EW, the document takes on an extraordinary tone. It seems to see the internet as being equivalent to an enemy weapons system
Late last year, it emerged that the Pentagon had paid a private company, the Lincoln Group, to plant hundreds of stories in Iraqi newspapers. The stories - all supportive of US policy - were written by military personnel and then placed in Iraqi publications. And websites that appeared to be information sites on the politics of Africa and the Balkans were found to be run by the Pentagon.
But the true extent of the Pentagon's information operations, how they work, who they're aimed at, and at what point they turn from informing the public to influencing populations, is far from clear.
The roadmap, however, gives a flavour of what the US military is up to - and the grand scale on which it's thinking. It reveals that Psyops personnel "support" the American government's international broadcasting. It singles out TV Marti - a station which broadcasts to Cuba - as receiving such support. It recommends that a global website be established that supports America's strategic objectives. But no American diplomats here, thank you. The website would use content from "third parties with greater credibility to foreign audiences than US officials". It also recommends that Psyops personnel should consider a range of technologies to disseminate propaganda in enemy territory: unmanned aerial vehicles, "miniaturized, scatterable public address systems", wireless devices, cellular phones and the internet.
'Fight the net'
When it describes plans for electronic warfare, or EW, the document takes on an extraordinary tone. It seems to see the internet as being equivalent to an enemy weapons system.
"Strategy should be based on the premise that the Department [of Defense] will 'fight the net' as it would an enemy weapons system," it reads.
The slogan "fight the net" appears several times throughout the roadmap. The authors warn that US networks are very vulnerable to attack by hackers, enemies seeking to disable them, or spies looking for intelligence.
"Networks are growing faster than we can defend them... Attack sophistication is increasing... Number of events is increasing."
US digital ambition
And, in a grand finale, the document recommends that the United States should seek the ability to "provide maximum control of the entire electromagnetic spectrum". US forces should be able to "disrupt or destroy the full spectrum of globally emerging communications systems, sensors, and weapons systems dependent on the electromagnetic spectrum".
Consider that for a moment. The US military seeks the capability to knock out every telephone, every networked computer, every radar system on the planet.
Are these plans the pipe dreams of self-aggrandising bureaucrats? Or are they real?
The fact that the "Information Operations Roadmap" is approved by the Secretary of Defense suggests that these plans are taken very seriously indeed in the Pentagon.
And that the scale and grandeur of the digital revolution is matched only by the US military's ambitions for it.
: Story from BBC NEWS
|
"The nation's largest telephone and cable companies are crafting an
alarming set of strategies that would transform the free, open and
nondiscriminatory Internet of today to a privately run and branded
service that would charge a fee for virtually everything we do online.
We face the prospect of virtual toll booths on the information highway..."
The End of the Internet-
Jeff Chester, February 1, 2006 The Nation (web only)
The nation's largest telephone and cable companies are crafting an alarming set of strategies that would transform the free, open and nondiscriminatory Internet of today to a privately run and branded service that would charge a fee for virtually everything we do online.
Verizon, Comcast, Bell South and other communications giants are developing strategies that would track and store information on our every move in cyberspace in a vast data-collection and marketing system, the scope of which could rival the National Security Agency. According to white papers now being circulated in the cable, telephone and telecommunications industries, those with the deepest pockets--corporations, special-interest groups and major advertisers--would get preferred treatment. Content from these providers would have first priority on our computer and television screens, while information seen as undesirable, such as peer-to-peer communications, could be relegated to a slow lane or simply shut out.
Under the plans they are considering, all of us--from content providers to individual users--would pay more to surf online, stream videos or even send e-mail. Industry planners are mulling new subscription plans that would further limit the online experience, establishing "platinum," "gold" and "silver" levels of Internet access that would set limits on the number of downloads, media streams or even e-mail messages that could be sent or received.
To make this pay-to-play vision a reality, phone and cable lobbyists are now engaged in a political campaign to further weaken the nation's communications policy laws. They want the federal government to permit them to operate Internet and other digital communications services as private networks, free of policy safeguards or governmental oversight. Indeed, both the Congress and the Federal Communications Commission (FCC) are considering proposals that will have far-reaching impact on the Internet's future. Ten years after passage of the ill-advised Telecommunications Act of 1996, telephone and cable companies are using the same political snake oil to convince compromised or clueless lawmakers to subvert the Internet into a turbo-charged digital retail machine.
The telephone industry has been somewhat more candid than the cable industry about its strategy for the Internet's future. Senior phone executives have publicly discussed plans to begin imposing a new scheme for the delivery of Internet content, especially from major Internet content companies. As Ed Whitacre, chairman and CEO of AT&T, told Business Week in November, "Why should they be allowed to use my pipes- The Internet can't be free in that sense, because we and the cable companies have made an investment, and for a Google or Yahoo! or Vonage or anybody to expect to use these pipes [for] free is nuts!"
The phone industry has marshaled its political allies to help win the freedom to impose this new broadband business model. At a recent conference held by the Progress and Freedom Foundation, a think tank funded by Comcast, Verizon, AT&T and other media companies, there was much discussion of a plan for phone companies to impose fees on a sliding scale, charging content providers different levels of service. "Price discrimination," noted PFF's resident media expert Adam Thierer, "drives the market-based capitalist economy."
Net Neutrality
To ward off the prospect of virtual toll booths on the information highway, some new media companies and public-interest groups are calling for new federal policies requiring "network neutrality" on the Internet. Common Cause, Amazon, Google, Free Press, Media Access Project and Consumers Union, among others, have proposed that broadband providers would be prohibited from discriminating against all forms of digital content. For example, phone or cable companies would not be allowed to slow down competing or undesirable content.
Without proactive intervention, the values and issues that we care about--civil rights, economic justice, the environment and fair elections--will be further threatened by this push for corporate control. Imagine how the next presidential election would unfold if major political advertisers could make strategic payments to Comcast so that ads from Democratic and Republican candidates were more visible and user-friendly than ads of third-party candidates with less funds. Consider what would happen if an online advertisement promoting nuclear power prominently popped up on a cable broadband page, while a competing message from an environmental group was relegated to the margins. It is possible that all forms of civic and noncommercial online programming would be pushed to the end of a commercial digital queue.
But such "neutrality" safeguards are inadequate to address more fundamental changes the Bells and cable monopolies are seeking in their quest to monetize the Internet. If we permit the Internet to become a medium designed primarily to serve the interests of marketing and personal consumption, rather than global civic-related communications, we will face the political consequences for decades to come. Unless we push back, the "brandwashing" of America will permeate not only our information infrastructure but global society and culture as well.
Why are the Bells and cable companies aggressively advancing such plans- With the arrival of the long-awaited "convergence" of communications, our media system is undergoing a major transformation. Telephone and cable giants envision a potential lucrative "triple play," as they impose near-monopoly control over the residential broadband services that send video, voice and data communications flowing into our televisions, home computers, cell phones and iPods. All of these many billions of bits will be delivered over the telephone and cable lines.
Video programming is of foremost interest to both the phone and cable companies. The telephone industry, like its cable rival, is now in the TV and media business, offering customers television channels, on-demand videos and games. Online advertising is increasingly integrating multimedia (such as animation and full-motion video) in its pitches. Since video-driven material requires a great deal of Internet bandwidth as it travels online, phone and cable companies want to make sure their television "applications" receive preferential treatment on the networks they operate. And their overall influence over the stream of information coming into your home (or mobile device) gives them the leverage to determine how the broadband business evolves.
Mining Your Data
At the core of the new power held by phone and cable companies are tools delivering what is known as "deep packet inspection." With these tools, AT&T and others can readily know the packets of information you are receiving online--from e-mail, to websites, to sharing of music, video and software downloads.
These "deep packet inspection" technologies are partly designed to make sure that the Internet pipeline doesn't become so congested it chokes off the delivery of timely communications. Such products have already been sold to universities and large businesses that want to more economically manage their Internet services. They are also being used to limit some peer-to-peer downloading, especially for music.
But these tools are also being promoted as ways that companies, such as Comcast and Bell South, can simply grab greater control over the Internet. For example, in a series of recent white papers, Internet technology giant Cisco urges these companies to "meter individual subscriber usage by application," as individuals' online travels are "tracked" and "integrated with billing systems." Such tracking and billing is made possible because they will know "the identity and profile of the individual subscriber," "what the subscriber is doing" and "where the subscriber resides."
Will Google, Amazon and the other companies successfully fight the plans of the Bells and cable companies- Ultimately, they are likely to cut a deal because they, too, are interested in monetizing our online activities. After all, as Cisco notes, content companies and network providers will need to "cooperate with each other to leverage their value proposition." They will be drawn by the ability of cable and phone companies to track "content usage...by subscriber," and where their online services can be "protected from piracy, metered, and appropriately valued."
Our Digital Destiny
It was former FCC chairman Michael Powell, with the support of then-commissioner and current chair Kevin Martin, who permitted phone and cable giants to have greater control over broadband. Powell and his GOP majority eliminated longstanding regulatory safeguards requiring phone companies to operate as nondiscriminatory networks (technically known as "common carriers"). He refused to require that cable companies, when providing Internet access, also operate in a similar nondiscriminatory manner. As Stanford University law professor Lawrence Lessig has long noted, it is government regulation of the phone lines that helped make the Internet today's vibrant, diverse and democratic medium.
But now, the phone companies are lobbying Washington to kill off what's left of "common carrier" policy. They wish to operate their Internet services as fully "private" networks. Phone and cable companies claim that the government shouldn't play a role in broadband regulation: Instead of the free and open network that offers equal access to all, they want to reduce the Internet to a series of business decisions between consumers and providers.
Besides their business interests, telephone and cable companies also have a larger political agenda. Both industries oppose giving local communities the right to create their own local Internet wireless or wi-fi networks. They also want to eliminate the last vestige of local oversight from electronic media--the ability of city or county government, for example, to require telecommunications companies to serve the public interest with, for example, public-access TV channels. The Bells also want to further reduce the ability of the FCC to oversee communications policy. They hope that both the FCC and Congress--via a new Communications Act--will back these proposals.
The future of the online media in the United States will ultimately depend on whether the Bells and cable companies are allowed to determine the country's "digital destiny." So before there are any policy decisions, a national debate should begin about how the Internet should serve the public. We must insure that phone and cable companies operate their Internet services in the public interest--as stewards for a vital medium for free expression.
If Americans are to succeed in designing an equitable digital destiny for themselves, they must mount an intensive opposition similar to the successful challenges to the FCC's media ownership rules in 2003. Without such a public outcry to rein in the GOP's corporate-driven agenda, it is likely that even many of the Democrats who rallied against further consolidation will be "tamed" by the well-funded lobbying campaigns of the powerful phone and cable industry.
The Nation
Read About Deep Packet Inspection
|
February 02, 2006 #2006-14pc (issued by portfolio company)
In First Week, Newly Launched Company Addressing Next Generation of the Internet Merges with Agile Software Leader; Command Information and Digital Focus Join Forces to Aid Government and Fortune 1000 Companies with Burgeoning IPv6 Market
Herndon,VA - The nation is transitioning from the current Internet protocol to IPv6, a more robust, secure and flexible way to communicate over the Internet. Leading the transition, Command Information launches this week to provide government organizations and Fortune 1000 companies with solutions and services every step of the way of their IPv6 migration. The company is backed by investments from The Carlyle Group and Novak Biddle Venture Partners.
"IPv6 is vital to the future competitiveness of industry and Government,- said Charles Rossotti, senior partner at Carlyle. -We have invested in Command Information to help organizations realize the benefits that come from this next generation technology."
In a move to quickly expand its delivery capabilities, Command Information this week also merged with Digital Focus (www.digitalfocus.com), a leader in Agile software development and integration services. For a decade Digital Focus has provided software development, agile coaching, and IT consulting services to Fortune 1000 and medium-sized businesses, including one of the country-s largest Internet service providers and Web portals. The merger gives Command Information the capability to deliver working software for clients that leverage the new features and functions of IPv6, while meeting organizational needs. With more than 75 employees, post-merger the company will continue operating as Digital Focus, a Command Information company.
-Our merger with Command Information will create the first entity designed to address a company-s entire IPv6 migration,- said Dianne Houghton, CEO of Digital Focus. -Tom Patterson, Jim Ungerleider and the entire Command Information leadership team bring a wealth of expertise in Internet technology to complement our talent at Digital Focus.-
Tom Patterson, chief executive officer and former chief strategist of e-Commerce at IBM, will guide the new company-s overall strategy and business development. Jim Ungerleider, a former executive with American Management Systems, will serve as president and chief operating officer of the new Herndon, VA-based company.
Command Information (www.CommandInformation.com) provides services and solutions in the six critical business areas affected by the IPv6 migration, including:
- IPv6 strategy
- application development
- application and infrastructure security
- mobile convergence and telematics
- business and information strategy
- network architecture and implementation.
Command Information Merges With Digital Focus/2
-IPv6 will have a dramatic impact in corporate security, mobility, supply chain management and other key business functions worldwide,- said Patterson. -We believe that to really help organizations leverage this new technology, we need to incorporate great companies like Digital Focus that can deliver real results for our clients.
the carlyle group
|
|
Brooke B. Coburn - Managing Director, The Carlyle Group - on the Board of Command Informations
The Command Information leadership team is dedicated to helping organizations leverage the changes of IPv6 – a common mission that guides us in our strategies, solutions, and client service experiences.
Brooke B. Coburn is a Managing Director focused on early- and growth-stage investments, and small leveraged buyouts, in the U.S. telecommunications, media, technology and business services sectors. He is based in Washington, DC.
Since joining Carlyle in 1996, Mr. Coburn has been actively involved with the firm's investments in Bredband (B2), CityNet Telecom (merged with Universal Access), Core Location (acquired by El Paso Global Networks), DigiPlex S.A., Genesis Cable (acquired by Benchmark Communications), Matrics Technologies (acquired by Symbol Technologies), Neptune Communications (acquired by Global Crossing), NorthPoint Communications, Pacific Telecom Cable, Prime Communications (acquired by Comcast), Sonitrol Holding Corp., WCI Cable and Wall Street Education.
Prior to joining Carlyle, Mr. Coburn was with Salomon Brothers, Inc. where he focused on M&A and capital raising assignments in the Media & Communications Group.
Mr. Coburn received his A.B. from Princeton University with honors.
Mr. Coburn is on the Board of Directors of BNX Systems, Matrics, Inc., Sonitrol Holding Corp., LLC, WCI Cable, Inc. and Wall Street Education.
|
this from Command Informations site:
Leveraging IPv6
The Internet is the most significant technological advancement of the information age. It powers industry, drives commerce, helps us communicate, and stands as the greatest repository of knowledge in the history of mankind - and it is all built on a protocol that was developed over 30 years ago.
IPv6 is the next generation Internet protocol - designed with superior scalability, reliability, flexibility and security. Under development since the mid 90-s, IPv6 is now ready for deployment across the globe and is changing the very foundation of the Internet.
Why do we need IPv6-
Internet protocol employs a series of hosts that collaborate to transmit data via the Internet. Devices connected to a network, whether a local area network (LAN) or the Internet itself, receive Internet protocol numbers-essentially a kind of virtual address that uniquely identifies each device.
In its current form, Internet protocol (IPv4) can accommodate four billion unique addresses. While that sounds substantial, the practical number of usable addresses is actually much lower. This restriction is quickly becoming an unacceptable burden for today-s applications. In fact, none of the information packets transmitted today are guaranteed to reach their specific destinations in original condition. To account for that shortcoming, other protocols are often simultaneously used to augment the transmission and ensure data integrity - often with limited success.
IPv6, on the other hand, would support unique addresses well beyond the trillions, two to the one-hundred twenty-eighth power. To get a sense of the actual amount, imagine a three with 39 zeroes behind it. IPv6 will not only eliminate the shortcomings of IPv4, but unlock new products and services that were previously unthinkable.
The appeal of an Internet protocol with essentially limitless addresses is that it will easily support the inevitable proliferation of personal wireless devices. Four billion addresses were once enough because they were intended for computers alone. Today, and in the years ahead, there will be dozens, if not hundreds of devices for each and every potential Internet user. That explosive growth demands the effectively incalculable depth of addresses only available from the improved Internet protocol, IPv6.
Why is IPv6 critical to my organization-
Organizations are turning to IPv6 to bolster their competitive position in the global marketplace. IPv6 will significantly improve capabilities in security, privacy, location-based services, networking, and mobility to open up new areas of business solutions that were previously impossible, and indeed allow the development of advanced applications that cannot yet even be imagined.
IPv6-enabled organizations will be able to support:
Virtual Private Networks that keep information safe and secure no matter where the employee goes or what device they use for access.
Customer Relationship Management systems that not only know who a customer is, but also where they are.
Supply Chain Management systems that allow for easier integration and tracking of products throughout the world.
Privacy policies that can be effectively enforced.
Company networks that can safely and economically integrate phones, PDAs, and broadband to the home.
Human relations systems that can safely leverage global workforces, work from home staffing, and ad-hoc teaming.
Where is IPv6 currently being deployed-
Deployment is occurring rapidly in both Asia and Europe. The Department of Defense and Civilian agencies of the U.S. Federal Government have both mandated the adoption of IPv6 by 2008.
Are any non-government entities currently integrating IPv6-
Governments are not the only ones racing to integrate IPv6. Private and public companies are spending millions to test and integrate IPv6 technologies. Some of these companies include HP, Cisco, Apple, IBM, Nokia, Sun Microsystems, Microsoft, Sony, British Telecom, NEC, Hitachi, Matsushita, and Juniper Networks.
Any commercial company that works with the government, or supports other organization that work with the government, can gain competitive advantage using IPv6.
command information
|
|
Patriot Act E-Mail Searches Apply to Non-Terrorists, Judges Say
BY JOSH GERSTEIN New York Sun, February 28, 2006
Two federal judges in Florida have upheld the authority of individual courts to use the Patriot Act to order searches anywhere in the country for e-mails and computer data in all types of criminal investigations, overruling a magistrate who found that Congress limited such expanded jurisdiction to cases involving terrorism.
The disagreement among the jurists about the scope of their powers simmered for more than two years before coming to light in an opinion unsealed earlier this month. The resolution, which underscored the government's broad legal authority to intercept electronic communications, comes as debate is raging over President Bush's warrantless surveillance program and the duties of Internet providers to protect personal data.
A magistrate judge in Orlando, James Glazebrook, first questioned the so-called nationwide-search provision in 2003, after investigators in a child pornography probe asked him to issue a search warrant requiring a "legitimate" California-based Web site to identify all users who accessed certain "password-protected" photos posted on the site. The Web provider was not named in public court records.
Magistrate Glazebrook said that in passing the Patriot Act, formally known as the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act, Congress made clear its focus was on terrorism. He said there was nothing in the language Congress adopted in the days after the September 11, 2001, terrorist attacks that suggested the nationwide-search provision should apply to garden variety federal cases.
"The statutory language is clear and unambiguous in limiting district court authority to issue out-of-district warrants to investigations of terrorism, and that language controls this court's interpretation. The government has shown no legislative intent to the contrary," the magistrate wrote. He also noted that many of the examples given during legislative debate involved terrorism. The then chairman of the Senate Judiciary Committee, Senator Leahy, a Democrat of Vermont, described the nationwide-search language as applying in terrorism cases, the court noted.
Magistrate Glazebrook denied the search warrant, but it was recently disclosed that the government appealed to a federal judge, G. Kendall Sharp, who granted it without explanation...
The scenario played out again late last year, after prosecutors presented Magistrate Glazebrook with an application for a search warrant directed to a Sunnyvale, Calif.-based Web portal, Yahoo. The government asked that Yahoo produce web pages, documents, and usage logs pertaining to two e-mail addresses and a Web site allegedly linked to an Orlando man, Earl Beach, under investigation for involvement in child pornography. Magistrate Glazebrook allowed searches of Mr. Beach's home and computers, but again rejected prosecutors' request to acquire data located across the country.
"Congress has not authorized this court to seize out-of-district property except in cases of domestic or international terrorism," the magistrate handwrote on the application.
Again, prosecutors appealed. Judge Gregory Presnell took up the question and concluded that "it seems" Congress did intend to authorize nationwide search warrants in all cases, not just ones pertaining to terrorism. However, the judge acknowledged that the language Congress used was far from clear. "The court rejects the assertions made by both the United States here and the magistrate judge... that the statutory language is unambiguous. Although the court ultimately comes to a determination regarding the meaning of this language, by no means is it clearly, unambiguously or precisely written," Judge Presnell wrote.
The chief federal defender in Orlando, R. Fletcher Peacock, said the dispute was a straightforward one pitting literal interpretation against legislative intent. "Judge Presnell was more willing to go behind the language of the statute and look at the statutory intent, and clearly Judge Glazebrook was not," the attorney said. One of the most striking aspects of the dispute is that there appears to be no other published court ruling addressing the nationwide-search provision, known as Section 220. The magistrate involved cited no cases directly on the point and neither did the government.
An attorney with a group that pushes for online privacy, the Electronic Frontier Foundation, said yesterday that the lack of published cases on the subject reflects the fact that search warrant applications are presented outside the presence of defense lawyers, often before a defendant even knows he is under investigation. "It's fairly typical that search warrants for electronic evidence would be kept under seal," the privacy advocate, Kevin Bankston, said. "In most cases, they wouldn't be reported."
Mr. Bankston said there is no question that the Justice Department wanted the Patriot Act to include nationwide-search authority for all crimes, but whether lawmakers accomplished that task is another question. "I don't know that Congress knew what it was voting on," he said.
Civil libertarians have objected to the nationwide-search provision on the grounds that it allows prosecutors the discretion to pick judicial districts where judges are seen as more friendly to the government. Critics of the Patriot Act have also warned that allowing search warrants to be filed from across the country will discourage Internet service providers from fighting such requests even when they may be unwarranted.
"The only person in a position to assert your rights is the ISP and if it's in their local court, they are more likely to challenge it if it is bad or somehow deficient," Mr. Bankston said.
A spokesman for the prosecutors did not return a call seeking comment for this story. However, the Justice Department has said the nationwide-search provision was "vital" to its investigation of the gruesome murder in 2004 of a pregnant Missouri woman, Bobbie Jo Stinnett, whose unborn child was cut from her womb with a kitchen knife. Investigators claim that they used the Patriot Act authority to quickly obtain email evidence from an Internet provider across state lines in Kansas. That data led them to a woman who later confessed to the attack, Lisa Montgomery.
In his ruling, Judge Presnell did not mention that episode, but suggested it was simpler for the courts and prosecutors to issue all warrants in a case from one place.
"As a matter of judicial and prosecutorial efficiency, it is practical to permit the federal district court for the district where the federal crime allegedly occurred to oversee both the prosecution and the investigation (including the issuance of warrants) thereof," he wrote. The government has also complained that the former procedure caused court backlogs and delays in jurisdictions, like northern California, that are home to many Internet companies.
It is unclear whether any charges resulted from the 2003 investigation, but the suspect involved in the disputed 2005 search, Mr. Beach, was indicted earlier this month on charges of possessing and distributing child pornography. He has pleaded not guilty. A trial is set for April.
Magistrate Glazebrook said in a brief interview yesterday that he could not discuss the specific cases that prompted the legal disagreement over the Patriot Act, but that he expects the question to arise again. "It is certainly something that will come up," he said. "There are a lot of interesting issues surrounding that."
|
All the Chatterbots | | | |
|
Ultra Hal Assistant
|
Ultra Hal Assistant is your digital secretary and companion. He can help you be more organized, he can help you use your computer, and he can entertain you. Ultra Hal has many animated characters to choose from and he speaks to you through your sound card with his own voice. You can speak out loud instead of typing.
|
ALICE |
ALICE (Artificial Linguistic Internet
Computer Entity) is a natural language interface to a telerobotic
eye. ALICE has already influenced some events in the real world by
telling lies and spreading gossip. Some of the newer ideas in ALICE include tailoring the conversation
for categories of individual, mainly through attempts to determine
the client's age, gender, geographic location and occupation. There
are also global values for "TOPIC" and "NAME"
so that the AI can keep the conversation somewhat on course and address
the client individually. ALICE attracts a lot of clients abroad, so
she also asks them to teach her phrases in foreign languages.
|
Anettte
|
Anette is a German-language
chatbot. She is able to chat by SMS, HTML or other multimedia application. She
remembers users, is able to display hyperlinks on single dialogs or a whole range of dialogs, redirect users to other sites.
Because of the simple model of Anette, you can integrate here into each win32-bit application.
Web users don't have to download any applets because Anette is fully installed on the webserver and
comes to users client as pure HTML.
|
Apollinaris
|
This German commercial
bot likes to talk about water, in particular bottled water, as the
source of life. It also likes to talk about its centuries of predictions.
|
Billy
|
A self-learning keyword-parser that analyzes sentence structure
and grammar to generate responses.
|
BRIAN
|
BRIAN is a computer program that
thinks it is an 18 year old college student. It was written as an
entry in the 1998 Loebner Competition, where it won third place out
of six entries. Two judges even gave it a higher score than they gave
some human confederates! Feel free to chat with BRIAN and just try
to have a natural conversation, about five minutes long. The competition
was held in Australia, so pretend you are in Sydney! (Also pretend
you don't know Brain's name, or anything about him except that he's
in Sidney).
|
CARA |
CARA (Conversation Analysis Research
Avatar) is a Shockwave-based chat bot with speech and graphic capabilities.
|
ChomskyBot
|
Something of an underground favorite,
this bot creates paragraphs based on the words of Noam Chomsky.
|
Cybelle
|
Cybelle has been programmed to be
"an expert on the world of agents. Thanks to her training and
her journeys on the Net, she is gradually developing her own character,
and seems to be someone who is very curious, who already has her own
sense of humor."
|
Daisy
|
A self-learning chat bot that starts
literally from scratch and learns everything from conversations she
holds.
|
DoBot
|
Simple chat bot that will learn
phrases and responses with user intervention.
|
Elbot
|
Based on the German-language bot
called Charlie, which was the rough basis for the German
language Elbot. Much of the logic was kept and most of the texts were
rewritten, the knowledge base was considerably widened, and Lingubot
functionality added. The German version has been online since Nov.
2000, and the English version since the Spring of 2001.
|
eLise |
German-language chat bot that acts as a
virtual assistant on the website of its developer. The bot consists of a Java applet front end, a Java server process and a
knowledge base editor tool. The knowledge base has currently about 1100 knowledge
nodes and is constantly updated.
|
Ella
|
Ella is the winner of the 2002 Loebner Prize Contest for "Most Human Computer". She is a rather charming on-line chatterbot with an interface using multiple images and text display boxes. Ella can play full-featured Blackjack, tell I Ching fortunes, and perform various useful functions, all with natural language interaction. A lexical database with more than 120, 000 entries is used to assist her knowledge and usefulness. |
Guenni
|
Guenni is a gas station pump nozzle
who likes to talk about gas mileage, cars, and funny stories--all
in German.
|
GuruBot
|
GuruBot is the creation of Norwegian
Helge Ingvoldstad, Written Borland's Delphi 5, not a common choice
for developing AI applications, this bot is a very quick learner.
|
INTERWERK-Agent |
German-speaking virtual fellow of the
INTERWERK GbR, a web company in Hannover, Germany. Trained to answer
questions on INTERWERK topics. Uses the
same software like the chatbot eLise and redirects to her if you ask him
for a sister or a bother.
|
John
Lennon Artificial Intelligence Project |
This is more than just another
chat bot. It is an attempt to re-create the personality of an
actual human being using code created for the Alice project. It is based on real conversations that others had
with Lennon.
|
Kucheto
|
Admit it: You always wanted to
chat in Bulgarian. Kucheto means "The Dog" and this
chat bot has a bright and friendly personality -- at least if you
understand Bulgarian.
|
LeknorChat
|
This bot will chat the day away
on AOL's IM areas; just invite it to a chat room and let it learn
as it goes.
|
Leo
|
Leo is the successor to CoLIN, the
first chat bot developed by Alan J. Brown. Leo has the ability to
converse in any language and learn about subjects from its user.
|
Leo
(German)
|
Leo is a virtual bartender that
offers cocktail recipes, plays music in his bar and just shoots the
bull.
|
Libba
|
Libba is a robot software program
that chats to users and features editable responses. You can link
instances of Libba together and watch them talk to each other. |
Lingubot
|
An online chat bot that can greet
visitors to your Web site and deliver a more human experience. Can
be created and edited using Kiwilogic's Lingubot Creator.
|
Maybelle |
Designed by Dr. David Hamill, Maybelle
is a Web-based chat bot written in Perl that can provide some interesting
conversation. Maybelle and some of Hamill's other work has been featured
repeatedly on the BBC.
|
Marvin
|
A product of InterLinx's VirAge
technology, this Java-based chat bot can meet and greet customers
and clients of your company. (German-speaking only)
|
Maximillan
|
An ALICE-based bot with an interesting
Flash-based audio and visual interface.
|
MeBot
|
A chat bot designed for the Web.
This bot runs in a browser window. It was written in Java, so a user
does not need to download special software, they simply click on the
link to begin the download of the Java applet. It requires a version
of Navigator or Explorer that supports Java. BotSpot tested it with
Netscape 4.5 and Explorer 5.0 and experienced no problems. |
Surveillance Bots
|
|
CyberAlert 3.0
|
CyberAlert monitors and over 2,000 online news sources as well
as all Usenet news groups. CyberAlert also scans, according to company
figures, "2.2 million other Web sites, including Web-based
discussion groups."
|
eWatch |
eWatch, monitors Internet publications, discussion forums, bulletin
boards and electronic mailing lists for references. Clients use
eWatch to monitor public reputation, rumors, stock manipulation
and insider trading.
|
NetCurrents
|
NetCurrents offers a very comprehensive package of services based
on its CyperPerception technology. The base services include active
monitoring of Internet sites for your company's mentions and a very
graphic oriented statistics report generated live on the NetCurrents
Web site.
|
RivalWatch
|
RivalWatch's search
technology monitors your competition to perform product assortment,
pricing, promotions, and services analysis. In this way, RivalWatch
maintains, you can remain competitive even if the entire world is
a potential draw for your customers.
|
First Major Website Run By An Artificial Intelligence
Plentyoffish.com, one of the largest websites in the world with over 400 million page views a month, is nearly completely run by an Artificial Intelligence.
(PRWEB) March 20, 2006 -- Plentyoffish.com, one of the largest websites in the world with over 400 million page views a month, is nearly completely run by an Artificial Intelligence.
In 2004 Plentyoffish.com was growing in leaps and bounds and CEO and sole employee Markus Frind had a decision to make: He could either hire hundreds of employees and convert to a paid service like all his competitors, or develop an AI to run the site.
"It was an impossible technical challenge and one that I couldn't pass up," says Frind. Today, the site's AI does the same job that other sites have hired 200 to 600 employees for. "It is really amazing, you wake up in the morning and think wow I can't believe I created that," remarks Frind.
The site's growth continues at a torrid pace. The online dating site Plentyoffish.com is exceptionally strong in Canada where, according to stats, Canada, more than 1.2% of the population aged 20 to 24 and .8% of the population 25 to 44 use Plentyoffish.com on a daily basis. In the United States Plentyoffish.com may not yet be the dominate player but it has gone from nowhere to 5th position, according to hitwise.com, in less than a year. "Given our current 10% monthly growth rate we expect to be the dominate dating service in the United States in under 1 year," Frind says.
About Plentyoffish.com
Having grown exponentially since its conception in March 2003 Plentyoffish.com is now the only major website run by an AI and a single human. Plentyoffish is the only dating site with 400 million or more monthly page views that has less then 200 employees.
- prweb.com
|
Deception comes in many guises:
There isn't any one action against deception that is right for every individual or every situation. Deception offers an entire suite of capabilities that should be picked judiciously in any application. The following is useful deception taxonomy based upon military experiences and history.
Concealment: Physical: Hiding through the use of natural cover, obstacles or great distance. Trees, branches; Terrain; Mountain Passes; Valleys.
Virtual: Use best defensive practices for 'real' network services: Patches, Service Packs, Policy, Configuration. The object is to properly use and manage those basic security services that come with protective products and general applications.
Camouflage:
Physical: Hiding movements and defensive postures (troops) behind natural camouflage.
Virtual: Hide the vulnerable points with network access rights, archiving, etc.
False/Planted Information:
Physical: Letting opposition have the information you want them to have. Planting information you choose: False radio broadcasts, morphed pictures, videos and other misleading information aimed at enemies, leadership and general populations.
Virtual: Broadcast false network information from servers that are being scanned. Use the wrong IP address and the right IP address and other conflicting information to confuse your network adversary.
Ruses:
Physical: Where equipment and procedures are used to deceive the enemy; carry their flag/colors; march troops in the same formations; use the same uniforms and adversary radio frequencies (false orders). Initiate cries of help as if from the enemy troops.
Virtual: Tell the attacking scanner that a legitimate scan is being conducted. Reinforce to the attacker that he is safely doing what he is doing. Pretend to be another hacker working on the same system. Again, one goal is to keep the hacker there for longer periods of time to gather forensic information.
Displays:
Physical: Make the enemy see (or think he sees) what isn't really there. Horses pulling logs, thousands of campfires, fake artillery, rubber tanks, dummy airfields.
Virtual: Tell the attacker you are calling the IP police; create a fake CERT alert; tell them you are 'tracing' them; show fake firewalls and IP barriers
Demonstrations:
Physical: Make a move that suggests imminent action, such as moving troops to the left, when you really are preparing to attack on the right; move troops constantly back and forth.
Virtual: Create an automatic defender that seems to follow the attacker; create a daemon that appears to launch a log/sniffer action or a trace.
Feints:
Physical: Demonstrate an attack. Use false attacks as a means of covering up the real mission/movements. Use false retreats to encourage chase by the other side.
Virtual: Appear to be only looking at the attacker, when you're really switching defense modes. Appear to be helpless and defenseless when launching other means. Start an automatic response, then stop and seem to try something else, but really maintain the first one. Be loud about all moves by telling your adversary, or appearing to be so stupid that he thinks he's listening to your moves without you knowing it.
The Many Faces of Deception:
Physical Lies: Lie to the enemy in any way that suits your needs. Use the media to lie. Use perception management to get the attacker to believe what you want him to believe. Initiate protracted but futile negotiations. Circulate false reports on the 'Net. Fabricate treasonable letters.
Virtual: Use electronic lying in the same way. Let the system tell the attacker anything that furthers your goals. Use creative perception management. Initiate protracted, but futile, negotiations. Circulate false reports on the 'Net. Fabricate treasonable letters
Insight
Physical: Out-think one's adversary. Study the oppositions past engagements and learn from their mistakes. Know your enemy better than he knows you. Stay one step ahead. It's a chess game: predict your opponent's moves.
Virtual: Understand his motivation. Learn the techniques. Collect logs of previous activities. Recognize the different types of attacks - ankle-biters, serious or professional. Research is currently being done to understand hacker motivations -- map those against technical skills and techniques and then develop predictive models based upon early attack detections.
Honey Pots
Physical: Make a target so attractive that your enemy comes running into a trap. Think sneak attack/ambushes.
Virtual: Clifford Stoll placed seemingly valuable national secrets on his computer to draw in the attackers. Create files with attractive information, for example: Come and get it! Privacy Violations: medical, salary, etc.; Rich intellectual property; Corporate secrets; New products; Classified military information; Secrets of Saddam. Then trap, track & trace.
no deception.com
|
|
|
|