Berto Jongman: Bits, Bytes, & Stuff

ANALYSIS: Methodology to Analyze Future Security Threats (3): Scenarios as an Organic Living System BOOK: Evaluation Methodologies for Aid in Conflict BOOK: Global Intellectual History BOOK: Governing the World: The History of an Idea, 1815 to the Present CYBER: BIOS Malware Can Destroy Any Computer

Stephen E. Arnold: Goldman Sachs Web Conference Leaves Out Search Vendors

Goldman Sachs Web Conference Leaves Out Search Vendors What tech companies does the financial sector think are on top right now? TechCrunch discussed invitees ahead of the recent Goldman Sachs Private Internet Company Conference in Las Vegas in, “Here Are the Hottest Companies in Tech Right Now, According to Goldman Sachs.” Reporter Colleen Taylor reproduces …

Jean Lievens: Demonetization – Replacing Transactions with Social Relationships

The Demonetization Agenda – replacing transactions with social relations Republished from Stefan Meretz: “The question of how we deal with and act within the given monetary environment is crucial for the commons movement, since the monetary logic and the commons logic are opposites. Contrary to the claims of mainstream economics, money is not neutral or …

SmartPlanet: Voiceprints to Fight Fraud? 97% Accuracy, 100 Identifiable Attributes

What businesses want with your voice You’d be forgiven for not wanting to give businesses a recording of your voice. They get your email address and your inbox is flooded; the same goes for physical address. But, if a business asks for voiceprint in the near future, it might actually be for your own benefit. …

Berto Jongman: Bits, Bytes, & Stuff

Assasins for Hire – Pay with Bitcoin China and Bitcoin Cyber Security Tools List Cyber Threat to Energy Sector CryptoLocker Protection Dark Money Groups Fueled by Cable Deterrence? A Revaluation of Premises (Russ Wellen) Hanford Nuclear Gets Worse Happiness is Love.  Period. (Harvard Study, 75 Years) Intelligence Information Sharing (Small Wars Journal) Malware Epidemics (Recorded …

Event: 22-24 JAN 14 Nashville TN InfoWarCon 2014

Beyond Information Warfare “Mr. Schwartau, why would the bad guys ever want to use the internet…?” (Congressman Glickman during Congressional Testimony, June 1991) It was obvious. To some of us. Now, it is almost impossible to quantify how far behind we really are. Information Warfare (some relegated the term as politically incorrect) or CyberWar or …