“Certain monitors can emit electromagnetic field pulses that excite a sensory resonance in a nearby subject, through image pulses that are so weak as to be subliminal. This is unfortunate since it opens a way for mischievous application of the invention, whereby people are exposed unknowingly to manipulation of their nervous systems for someone else’s purposes. Such application would be unethical and is of course not advocated. It is mentioned here in order to alert the public to the possibility of covert abuse that may occur while being online, or while watching TV, a video, or a DVD.”
The new cell network uses high-band radio frequency millimeter waves to deliver high bandwidth data to any device within line of sight.
Among the many potential problems with exposure to 5G radio waves are issues with the skin, which is interesting when you consider that this technology is already being used in the military for crowd control purposes.
Whole way in which information and society are organized has changed. From stovepipes to networks — growing power of audience and authentity. This is a threat to the whole Westphalian order of nations (i.e. top-down “because we say so” hierarchical authority). State-owned media now setting the new standard for message delivery while the Western media is collapsing for lack of viability of the advertising – print – broadcast models. Western media is spending too much time on minutia of single events and not enough time on framing, context, and meaning.
“It is time for schools to come down from the ivory tower…and start engaging with the public, doing news analysis, data dives, informing the public [in ways that] the media cannot. . . . This is an opportunity as well as a responsibility.”
YouTube (14:17) Below the Fold
A Conversation with Mary Rothschild
Three bottom lines:
01 Digital world is a trap — everything is pre-programmed
02 First seven years are vital if a child is to grow up with a free open mind
03 Digital world has displaced parental attention.
I joined the Qatar Computing Research Institute (QCRI) well over 3 years ago with a very specific mission and mandate: to develop and deploy next generation humanitarian technologies. So I built the Institute’s Social Innovation Program from the ground up and recruited the majority of the full-time experts (scientists, engineers, research assistants, interns & project manager) who have become integral to the Program’s success.
I read “Oracle’s Chief Security Officer Mary Ann Davidson Just Made as Rookie Mistake.” No, it has nothing to do with trying to breathe life into Oracle Secure Enterprise Search or increasing the content processing speed of Endeca. Those might be really difficult tasks.
Two of technology’s most pioneering developers have strongly criticised the current state of the industry, warning that the right to encryption is doomed and that users are exploited by the software that they use.
Open sourcerer Richard Stallman has painted a very bleak picture of today’s technology and communications environment, describing proprietary software as “malware”.
Stallman, the founder of the free software movement, perhaps not surprisingly has a very jaundiced view of proprietary software, and of Microsoft Windows especially. “What kinds of programs constitute malware? Operating systems, first of all. Windows snoops on users, shackles users and, on mobiles, censors apps,” he wrote in a newspaper editorial.
The World Humanitarian Summit (WHS) is an initiative by United Nations Secretary-General Ban Ki-moon to improve humanitarian action. The Summit, which is to be held in 2016, stands to be one of the most important humanitarian conferences in a decade. One key pillar of WHS is humanitarian innovation. “Transformation through Innovation” is the WHS Working Group dedicated to transforming humanitarian action by focusing explicitly on innovation. I have the pleasure of being a member of this working group where my contribution focuses on the role of new technologies, data science and advanced computing. As such, I’m working on an applied study to explore the role of computing research institutes as an innovation pathway for humanitarian technology. The purpose of this blog post is to invite feedback on the ideas presented below.
Why Clouds Give Me a Case of the Vapors
IEEE Computer, 1 November 2014
In my personal life I build trusted relationships one tax-avoiding, jurisdiction-shopping multinational corporation at a time. Show me a company that engages in labor arbitraging and offshore production in third-world countries paying starvation wages3 and that avoids taxes through shadow companies in Ireland (Apple Operations International) so it can reap real profits in the US only to pay virtual taxes in invisible jurisdictions4—what The New York Times calls the “Double Irish with a Dutch Sandwich”5—and I’ll show you a company that deserves my full faith and confidence. Passwords? Crypto keys? Security
questions? Not needed. Oh, corporate giants, have your digital way with me!
PDF (4 Pages): Hal on Cloud Insecurity 11-14