Steven Aftergood: CRS on US Research & Development (R&D) Funding and Performance – Half a Trillion — 500 Billion — A Year

Commerce, Congressional Research Service, Fact Sheets, Government, IO Impotency
Steven Aftergood

U.S. Research and Development Funding and Performance: Fact Sheet

John F. Sargent Jr.
Specialist in Science and Technology Policy
Congressional Research Service
June 29, 2018

Comment and key graphic from report below the fold.

Continue reading “Steven Aftergood: CRS on US Research & Development (R&D) Funding and Performance – Half a Trillion — 500 Billion — A Year”

Penguin: Swarm – Ethereum’s 3rd Shot at Decentalized Internet

Advanced Cyber/IO, Autonomous Internet, Civil Society, Cultural Intelligence, Ethics, Peace Intelligence

Swarm: Inside Ethereum's Push to Create a Decentralized Internet

The Lead Developer of the Swarm team, Viktor Trón, has announced the immediate release and deployment to the public testnet of Ethereum’s Swarm client v0.3, which represents the third proof-of-concept (POC3) installment of this tool.

Decentralized Technologies like Ethereum, Swarm, and Whisper, which Trón calls “The Holy Trinity”, will revolutionize how we share information, who owns it, and who can profit from it. However, there is still a lot to accomplish before this is possible.

Continue reading “Penguin: Swarm – Ethereum's 3rd Shot at Decentalized Internet”

Norie Huddle: Obama Weaponized IRS, FEC, FBI, DoJ Against Conservatives

04 Education, 07 Other Atrocities, 09 Justice, 11 Society, Corruption, Cultural Intelligence, Government, IO Deeds of War
Norie Huddle

Judicial Watch Obtains IRS Documents Revealing McCain’s [Minority] Subcommittee Staff Director Urged IRS to Engage in “Financially Ruinous” Targeting

“The Obama IRS scandal is bipartisan – McCain and Democrats who wanted to regulate political speech lost at the Supreme Court, so they sought to use the IRS to harass innocent Americans,” said Judicial Watch President Tom Fitton. “The Obama IRS scandal is not over – as Judicial Watch continues to uncover smoking gun documents that raise questions about how the Obama administration weaponized the IRS, the FEC, FBI, and DOJ to target the First Amendment rights of Americans.”

#GoogleGestapo: Facebook & Google Obscure & Manipulate Privacy Settings

Commerce, Corruption, IO Privacy, Media
Click on Image to Enlarge

Facebook and Google use ‘dark patterns' around privacy settings, report says

Facebook, Google and Microsoft push users away from privacy-friendly options on their services in an “unethical” way, according to a report by the Norwegian Consumer Council.

It studied the privacy settings of the firms and found a series of “dark patterns”, including intrusive default settings and misleading wording.

The firms gave users “an illusion of control”, its report suggested.

Continue reading “#GoogleGestapo: Facebook & Google Obscure & Manipulate Privacy Settings”

Stephen E. Arnold: Amazon’s Pharma Play — Selling Names to Police for Gun Confiscation?

Advanced Cyber/IO, Commerce, Corruption, IO Deeds of War, IO Impotency
Stephen E. Arnold

Amazon: Information and Its Pharma Play

Amazon sells quite a few health related products. One I found interesting is Amazon’s hydrogen peroxide. That’s an interesting chemical, and I wondered who has order a higher concentration version. I assumed that Amazon could answer that question, among others; for example, who bought certain books describing the use of the compound.

I thought about Amazon’s health products when I read “Amazon to Buy Online Pharmacy PillPack, Jumping Into the Drug Business.” I think the deal is an interesting one, but my view is different. Hey, I live in rural Kentucky, one of the states associated with opioid abuse.

Continue reading “Stephen E. Arnold: Amazon's Pharma Play — Selling Names to Police for Gun Confiscation?”

Kaliya “Identity Woman” Young: Sixteen Domains of Identity

Advanced Cyber/IO, IO Privacy
Kaliya Young

The Domains of Identity

by Kaliya “Identity Woman” Young, MSIMS

Abstract:  The Domains of Identity outlines sixteen key categories of transactions  which cause personally identifiable information to be stored in databases. The purpose of this research is to address challenges of Identity Management that involve interactions of almost all people in almost all institutional/organizational contexts. Enumerating the sixteen domains and describing the characteristics of each domain is intended to clarify which problems arise and how they can be solved within each domain. Discussions of identity management are often confusing because they mix issues from multiple domains, or because they try unsuccessfully to apply solutions from one domain to problems in another. Part of the objective of this article is to eliminate this confusion and enable clearer conversations about identity management problems and solutions.

FREE with registration for updates

noble gold