Stephen E. Arnold: Bloomberg Exposed for Surveillance & Two-Way Exploitation of All Bloomberg Terminals

Bloomberg and Alleged Two Way Systems Just a small thing, the Bloomberg privacy breach allegations. There are far weightier matters in search; for example, are evaluations and ratings of search vendors objective? Someone on the LinkedIn Enterprise Search Engine Professional Group even raised the possibility that vendors “pay” for coverage in some consultants’ evaluations of …

Marcus Aurelius: The Cyber-Dam Break — “Blame It On China” Goes Into High Gear

The Cyber-Dam Breaks Sensitive Army database of U.S. dams compromised; Chinese hackers suspected BY: Bill Gertz The Washington Free Beacon, May 1, 2013 U.S. intelligence agencies traced a recent cyber intrusion into a sensitive infrastructure database to the Chinese government or military cyber warriors, according to U.S. officials. The compromise of the U.S. Army Corps …

Berto Jongman: Kurzweil on Global Networks Must be Redesigned

Missing from all this is the OSC/M4IS2 solution. Global networks must be redesigned May 2, 2013 Our global networks have generated many benefits and new opportunities. However, they have also established highways for failure propagation, which can ultimately result in man-made disasters. For example, today’s quick spreading of emerging epidemics is largely a result of …

Eagle: Ten Civilization-Destructive Trends in 2013

List only — read article for elaboration. Ten civilization-shaping trends for 2013 that are driving us into social and spiritual crisis Mike Adams Natural News, 1 May 2013 #1) The rise of human engineered genetics #2) Reality escapism via gaming, social networks and computer-human interface devices such as Google Glass, VR helmets #3) The demonization …

Richard Stallman: Free Software Supporter Issue 61 April 2013

Free Software Supporter Issue 61, April 2013 Welcome to the Free Software Supporter, the Free Software Foundation’s monthly news digest and action update — being read by you and 68,579 other activists. That’s 686 more than last month! View this issue online here: http://www.fsf.org/free-software-supporter/2013/free-software-supporter-issue-61-april-2013 Encourage your friends to subscribe and help us build an audience …

Berto Jongman: Computational Intelligence (aka Artificial Intelligence and/or Intelligent Systems)

2013  Computational Intelligence: A Methodological Introduction 2012 Computational Intelligence and Decision Making: Trends and Applications (Intelligent Systems, Control and Automation: Science and Engineering) 2012 Computational Intelligence and Its Applications: Evolutionary Computation, Fuzzy Logic, Neural Network and Support Vector Machine Techniques 2012 Computational Intelligence for Privacy and Security (Studies in Computational Intelligence) 2012 Modern Advances in …

Review (Guest): Surveillance or Security?: The Risks Posed by New Wiretapping Technologies

Susan Landau 5.0 out of 5 stars Definitive text on the topic July 8, 2011 Ben Rothke Surveillance or Security?: The Risks Posed by New Wiretapping Technologies is a hard book to categorize. It is not about security, but it deals extensively with it. It is not a law book, but legal topics are pervasive …