Category Archives: computers

Who is Watching the ‘Deep State’ Watchers?

Bill Binney Quotes:

” I should apologize to the American people. It’s (the NSA)                         violated everyone’s rights. It can be used to eavesdrop on the whole world.”

“FBI (and NSA) wants to know everything about you, and you’re not supposed to know anything about them.”

“The ultimate goal of the NSA is total population control”

Are you scared about Donald Trump having the NSA capabilities and powers in his hands?
“I look at it in this way: he is doing exactly as he said he would do in the campaign. During the campaign he said he would abide by the Constitution of the United States, now if he does that, he has to stop these programs, because they are unconstitutional, obviously. On the other hand, if he adopts this process, he is going to have the same powers as Obama had. That kind of power should not exist in any kind of government, because it really creates a totalitarian state. It’s like Stasi on super-steroids; instead of having folders with papers on everybody, they have everything that you do stored electronically, so it is a much more complete, up-to-date and mineable set of information and they can manipulate it, and do anything they want to you. That is the problem with it: no government should have it”. (read full interview)

 




Breitbart: Robert Barnes: ‘Ludicrous’ to Claim Obama Never Spied on Americans When He ‘Drone-Bombed American Citizens Around the World’

Court case: Jewel vs NSA: Binney declaration

NSA and ‘targeted individuals’

William Binney: “I would disconnect everything

 

 

 

‘virtual unwrapping’: unlocks writings in the ancient En-Gedi scroll

Via : livescience.com

1,700-Year-Old Dead Sea Scroll ‘Virtually Unwrapped,’ Revealing Text     By Laura Geggel

“The En-Gedi scroll, a text that includes part of the Book of Leviticus in the Hebrew Bible that was ravaged by fire about 1,400 years ago, is now readable, thanks to a complex digital analysis called “virtual unwrapping.”

Rather than physically unfurl the scroll, which would have destroyed the crumbling artifact, experts digitally scanned the document, and then virtually flattened the scanned results, allowing scholars to read its ancient text.”

Read the full article

 

Science Advances: Reading the scroll from En-Gedi

 

 

 

 

Can Dancing Holograms Teach You How To Play Piano?

Ever wanted to learn piano? Andante, which comes out of MIT’s Tangible Media Lab, is the program to help you learn keystrokes visually.

Andante from Tangible Media Group on Vimeo.

Andante: Walking Figures on the Piano Keyboard to Visualize Musical Motion

Popular Science: Animated figures walk, dance, and lumber across the  piano keyboard

 

 

Acoustic Levitation: Tractor Beams And Holograms

Via: highpants.net

A team of Japanese researchers have this week demonstrated the first technology that not only brings the mythology of levitation to life but leap frogs it to create a tractor beam, lifting and moving objects across 3 dimensions using sound alone.

Read the full article

Sound is not often thought of as being a physical force, music may make you move your feet but no one would believe that it could lift you out of your seat. That was until this week when an international team of researchers led by Bristol University demonstrated the latest advancements of acoustic projection that is able to build acoustic holograms that can levitate objects or act as a tractor beam.

Read the full article

 

 

 

 

 

Michael Lewis: High-Speed Traders Have Rigged The Stock Market

(Reuters)

(Reuters) – The U.S. stock market is rigged in favor of high-speed electronic trading firms, which use their advantages to extract billions from investors, according to Michael Lewis, author of a new book on the topic, “Flash Boys: A Wall Street Revolt.”

High-frequency trading (HFT) is a practice carried out by many banks and proprietary trading firms using sophisticated computer programs to send gobs of orders into the market, executing a small portion of them when opportunities arise to capitalize on price imbalances, or to make markets. HFT makes up more than half of all U.S. trading volume.

Read the full article

CBS News: Is The U.S. Stock Market Rigged?

 

 

 

Why Is High Frequency Trading Tolerated?

Wikipedia: Front running

ebook preview: Flash Boys

 

 

 

Raffaello D’Andrea: The astounding athletic power of quadcopters

Via: ted

In a robot lab at TEDGlobal, Raffaello D’Andrea demos his flying quadcopters: robots that think like athletes, solving physical problems with algorithms that help them learn. In a series of nifty demos, D’Andrea show drones that play catch, balance and make decisions together — and watch out for an I-want-this-now demo of Kinect-controlled quads.

Roboticist Raffaello D’Andrea explores the possibilities of autonomous technology by collaborating with artists, architects and engineers.

 

 

 

Raffaello D’Andrea quote:

My work is focused on the creation of systems that leverage technological innovations, scientific principles, advanced mathematics, algorithms, and the art of design in unprecedented ways, with an emphasis on advanced motion control.

By their very nature, these creations require a team to realize. Many are enabled by the research I conduct with my graduate students. Many are also the fruit of collaborations with architects, entrepreneurs, and artists.

My hope is that these creations inspire us to rethink what role technology should have in shaping our future.”

 

Dynamic Works – Highlights from Raffaello D’Andrea on Vimeo.

Website:  Raffaello D’Andrea – Dynamic Works

Creepiest SmartPhone App Yet Scans Crowd for People with Dating Site Profiles

Via: The Daily Sheeple

by Kimberly Paxton

nametag_slide1

Imagine for a moment, that you are at the farmer’s market on a Saturday morning, getting your veggies and minding your own business. Suddenly, a creepy guy with a comb-over approaches you. “Hey, there.  I bet you like long walks on the beach and strawberry margaritas, baby.”  

What? you think. How on earth did he know that?

Then he begins to talk to you, and it’s eerie, simply uncanny all the things Mr. Creepster has in common with you.  Suddenly you realize, he is all but plagiarizing that profile you put on OKCupid last month in the hopes of meeting Mr. Right. He knows that you don’t smoke, that you have 3 children, the city in which you reside, what you do for a living, and that you go hiking alone to enjoy the solitude of a nearby mountain trail every single weekend. 

Putting the “stalk” in stalker, a new facial recognition app for Smartphones will allow a user to scan a crowd and pinpoint people with profiles on online dating sites or social media sites. Nametag, designed for Android and iOS, scans a person in whom the user is interested and looks for that person on dating sites such as PlentyOfFish, OkCupid, and Match as well as social media sites like Facebook, Twitter, and LinkedIn.

NameTag wirelessly sends the photo that the user has surreptitiously taken of the prospective date to a server, where it is then compared to millions of records. In seconds, a match is returned that has the unwitting victim’s full name, additional photos and all social media profiles.

Check out this rather disturbing blurb on the NameTag website, where they’re actually encouraging people to register their photos voluntarily:

With NameTag, Your Photo Shares You.

Why leave meeting amazing people up to chance? Don’t miss out on the opportunity to connect with others who share your passions!

Connect your info and interests with the world by simply sharing your most unique feature – your face.  Nametag links your face to a single, unified online presence that includes your contact information, social media profiles, interests, hobbies and passions and anything else you want to share with the world.

Using the NameTag smartphone or Google Glass app, simply snap a pic of someone you want to connect with and see their entire public online presence in one place.

Don’t be a Stranger :)

The app strongly encourages you to register yourself so that people on the street can instantly know everything about you. Who on earth would think that this is a good idea?  I fear an alarming number of people might think so, sadly.

Here’s Jane, NameTag’s example profile holder.

Meet Jane – by using NameTag

Jane has lots of different social media profiles and loves to meet new people. By using NameTag, she can link all her social networks to her face and share her information and meet new people in an instant. At work, she opts to have just her Professional Profile information visible, but when she goes out to happy hour with her friends, she changes her profile settings to Personal and displays more details, like her hobbies, interests and relationship status.

Bad idea, Jane. There’s a pervy dude that just took your picture and is now salaciously thinking about your single self doing yoga.

The techy folks think that this is just great:

NameTag’s creator Kevin Alan Tussy said: ‘I believe that this will make online dating and offline social interactions much safer and give us a far better understanding of the people around us.

‘It’s much easier to meet interesting new people when we can simply look at someone, see their Facebook, review their LinkedIn page or maybe even see their dating site profile. Often we were interacting with people blindly or not interacting at all. NameTag can change all that.’

Tom Wiggins, Deputy Editor of tech mag Stuff, thinks the app is a good idea, but that users should exercise caution.

He said: ‘It could be very handy if you’re not afraid of scaring people off with your creepy app. It’s evidently pretty clever but I think most people would find it quite invasive. And isn’t the point of dating to find out more about people? This kind of defeats the object.

‘In terms of privacy, I assume it’s only finding information that you’ve already put online, so it’s not really any more of a risk to privacy than adding photos to Facebook.’ (source)

Could it get any creepier or more invasive? I’m glad you asked. YES! It actually CAN.

The app doesn’t stop at accessing dating profiles and Facebook accounts.  Oh no!  Just like a Ginsu knife commercial, wait, there’s more! If you order right now, you’ll get this great bonus!

For added peace of mind, the user can also cross-reference the photos against more than 450,000 entries in the National Sex Offender Registry and other criminal databases. (source)

So this cheapo app is going to take ONE PICTURE and tell you that someone is in a criminal data base.   Can you imagine the potential vigilante applications of this?

First of all, we all know that the “justice” system is anything that just, and that not everyone who is registered as a “sex offender” is actually a threat to society. Think about an 18 year old who dated a 16 year old, for example. Suddenly anyone could be pinpointed as a sex offender, while they’re just going about their business at the grocery store or the mall.

Secondly, this is not a state-of-the-art facial recognition program. What if it’s wrong? What if it says that guy pushing the grocery cart full of juice boxes and animal crackers to the checkout stand is a purveyor of kiddie porn, but he’s actually just a dad with 3 kids at home?

SmartPhones seem to have taken the place of SmartPeople. Not only have electronic devices taken away many interpersonal communications and experiences (see this video), now they’re taking away the mystery of getting to know somebody new, and they’re boiling the magic of attraction down to facial recognition and algorithms.

With stuff like this, the eugenicists won’t need birth control to depopulate the world.  People will just connect via their smartphones. Problem solved.

Delivered by The Daily Sheeple

Daily Mail: The Future Of Online Dating

 

 

 

 

Texas Library Offers Glimpse Of Bookless Future

Via: news.yahoo.com

by Paul J. Weber

Texas has seen the future of the public library, and it looks a lot like an Apple Store: Rows of glossy iMacs beckon. iPads mounted on a tangerine-colored bar invite readers. And hundreds of other tablets stand ready for checkout to anyone with a borrowing card.

Even the librarians imitate Apple’s dress code, wearing matching shirts and that standard-bearer of geek-chic, the hoodie. But this $2.3 million library might be most notable for what it does not have — any actual books.

Read the full story

 

 

NPR: Opening of the BiblioTech library

Car Locks Hacked With A Handheld Device

Via:ksdk.com/news

By Kyung Lah, CNN

Police across the country are stumped by a rash of car thefts. In surveillance video of the thefts, criminals appear to open locked cars with a mysterious handheld device.

Nobody, not even the car manufacturers, knows how it works.

In Long Beach, Calif. The man walked up to the car, and used a small box to open it. Right next to him another man, also using a box, opens that car.

The problem is they’re thieves without keys. Now they’ve swiped all valuables from the cars.

In Chicago, it was the exact same scenario. A man by a sedan unlocked it without a key. The alarm was disabled by some mystery device.

The same thing happened to Steven Doi of Corona, Calif. His car’s computer system was hacked. But the crook didn’t get away clean. Doi’s dash-cam, pointing toward the front of his escalade, caught the suspect pacing and holding some mystery box.

“I was like whoa. You see this guy walking back and forth in front of the car,” said Doi.

In just 18 seconds the crook emptied out $3,000 worth of electronics.

Mike Bender, ex-police officer and auto theft expert, calls it the latest high tech crime tool hitting New York to Los Angeles.

And like police across the country, he doesn’t know exactly what it is.


Read the rest of the story

 

Dianne Feinstein Accidentally Confirms That NSA Tapped The Internet Backbone

Via: Techdirt.com

by Mike Masnick

It’s widely known that the NSA has taps connected to the various telco networks, thanks in large part to AT&T employee Mark Klein who blew the whistle on AT&T’s secret NSA room in San Francisco. What was unclear was exactly what kind of access the NSA had. Various groups like the EFF and CDT have both been asking the administration to finally come clean, in the name of transparency, if they’re tapping backbone networks to snarf up internet communications like email. So far, the administration has declined to elaborate. Back in August, when the FISA court declassified its ruling about NSA violations, the third footnote, though heavily redacted, did briefly discuss this “upstream” capability:

In short, “upstream” capabilities are tapping the backbone itself, via the willing assistance of the telcos (who still have remained mostly silent on all of this) as opposed to “downstream” collection, which requires going to the internet companies directly. The internet companies have been much more resistant to government attempts to get access to their accounts. And thus, it’s a big question as to what exactly the NSA can collect via its taps on the internet backbone, and the NSA and its defenders have tried to remain silent on this point, as you can see from the redactions above.

However, as Kevin Bankston notes, during Thursday’s Senate Intelligence Committee hearing, Dianne Feinstein more or less admitted that they get emails via “upstream” collection methods. As you can see in the following clip, Feinstein interrupts a discussion to read a prepared “rebuttal” to a point being made, and in doing so clearly says that the NSA can get emails via upstream collections:

Upstream collection… occurs when NSA obtains internet communications, such as e-mails, from certain US companies that operate the Internet background, i.e., the companies that own and operate the domestic telecommunications lines over which internet traffic flows.

She clearly means “backbone” rather than “background.” She’s discussing this in an attempt to defend the NSA’s “accidental” collection of information it shouldn’t have had. But that point is not that important. Instead, the important point is that she’s now admitted what most people suspected, but which the administration has totally avoided admitting for many, many years since the revelations made by Mark Klein.

So, despite years of trying to deny that the NSA can collect email and other communications directly from the backbone (rather than from the internet companies themselves), Feinstein appears to have finally let the cat out of the bag, perhaps without realizing it.