US Congress: Election systems attacked in all 50 states
In the US presidential election, hackers attacked digital election infrastructure in all 50 states. This is the result of an investigation by the US Congress. MEPs warn against incalculable risks, even without manipulated votes.
Read the Senate Intelligence Committee’s report: ‘Russian Efforts Against Election Infrastructure,’ (volume one)
https://games-cdn.washingtonpost.com/notes/prod/default/documents/6d6ee989-d0bf-4d7c-a158-a979c74bad3e/note/fe8e288b-e6fe-45ee-8a8b-c5ec463f293f.pdf
#USA #congress #hackers #russia #attack #election #votes #manipulation
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
In the US presidential election, hackers attacked digital election infrastructure in all 50 states. This is the result of an investigation by the US Congress. MEPs warn against incalculable risks, even without manipulated votes.
Read the Senate Intelligence Committee’s report: ‘Russian Efforts Against Election Infrastructure,’ (volume one)
https://games-cdn.washingtonpost.com/notes/prod/default/documents/6d6ee989-d0bf-4d7c-a158-a979c74bad3e/note/fe8e288b-e6fe-45ee-8a8b-c5ec463f293f.pdf
#USA #congress #hackers #russia #attack #election #votes #manipulation
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Tell us if traceability is technically possible: Madras HC to WhatsApp and IIT Madras professor
India has had a problem with WhatsApp rumours and lies for some time now. Therefore, a court demanded that the number of the original channel be displayed next to a forwarded message. Experts should now clarify how this would be technically possible.
On July 24, Court No. 3 of the Madras High Court was packed with barely any standing room. As item no. 14 drew closer on the roster, more people jammed in. That’s because some of the biggest names in Indian legal fraternity had combined forced to make a case against implementing traceability in WhatsApp as the case examined ways in which cybercrime might be curbed with the assistance of social media companies.
Senior Advocates Kapil Sibal and Arvind Datar defended WhatsApp, as former Attorney General of India, Mukul Rohatgi, represented Facebook. The hearing began at 12:20 pm and went on for almost an hour. It saw representation from the government of Tamil Nadu (E. Manoharan), Twitter (Senior Advocate Sajan Poovayya), and Google (Senior Advocate P. S. Raman). Senior Advocate N. L. Rajah, who had represented WhatsApp in the last hearing, was also present. Internet Freedom Foundation, which had been made an intervener in the last hearing on June 27, was represented by Suhrith Parthasarathy. IFF’s executive director, Apar Gupta, was also present.
If this litany of names wasn’t enough, the presence of Brian Hennessey, the director and associate general counsel of WhatsApp, drove home the point that WhatsApp Inc. is paying particular attention to this case.
👉🏼 Read the full story without ads n shit:
https://rwtxt.lelux.fi/blackbox/tell-us-if-traceability-is-technically-possible-madras-hc-to-whatsapp-and-iit-madras-professor
#DeleteWhatsapp #tracing #india
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
India has had a problem with WhatsApp rumours and lies for some time now. Therefore, a court demanded that the number of the original channel be displayed next to a forwarded message. Experts should now clarify how this would be technically possible.
On July 24, Court No. 3 of the Madras High Court was packed with barely any standing room. As item no. 14 drew closer on the roster, more people jammed in. That’s because some of the biggest names in Indian legal fraternity had combined forced to make a case against implementing traceability in WhatsApp as the case examined ways in which cybercrime might be curbed with the assistance of social media companies.
Senior Advocates Kapil Sibal and Arvind Datar defended WhatsApp, as former Attorney General of India, Mukul Rohatgi, represented Facebook. The hearing began at 12:20 pm and went on for almost an hour. It saw representation from the government of Tamil Nadu (E. Manoharan), Twitter (Senior Advocate Sajan Poovayya), and Google (Senior Advocate P. S. Raman). Senior Advocate N. L. Rajah, who had represented WhatsApp in the last hearing, was also present. Internet Freedom Foundation, which had been made an intervener in the last hearing on June 27, was represented by Suhrith Parthasarathy. IFF’s executive director, Apar Gupta, was also present.
If this litany of names wasn’t enough, the presence of Brian Hennessey, the director and associate general counsel of WhatsApp, drove home the point that WhatsApp Inc. is paying particular attention to this case.
👉🏼 Read the full story without ads n shit:
https://rwtxt.lelux.fi/blackbox/tell-us-if-traceability-is-technically-possible-madras-hc-to-whatsapp-and-iit-madras-professor
#DeleteWhatsapp #tracing #india
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
🇪🇸 El anonimato va camino de desaparecer.
Con solo 15 atributos demográficos es posible identificar a cada uno de los ciudadanos de Estados Unidos.
Hasta ahora nos identificaba nuestro nombre, un número de DNI, un número de teléfono, una dirección postal o de email. Bastaba con ocultar estos detalles en una base de datos para que no pudiera vincularse una serie de informaciones con su propietario. Ya no.
El reguero de datos que dejamos más la capacidad de almacenarlos y tratarlos hacen que sea cada vez más sencillo identificarnos individualmente a partir de lo que hacemos o somos. El anonimato ya no depende de que alguien averigüe nuestro nombre o teléfono. Ahora nuestro comportamiento o identidad puede desanonimizarnos.
Las oficinas de censo, hospitales o empresas comparten muestras anonimizadas de sus inmensas bases de datos por transparencia o para estudios y comprobaciones. El pequeño tamaño de la muestra hacía difícil que esa información acabara vinculándose a un individuo.
Un nuevo estudio publicado por Nature Communications determina que esa incertidumbre es cuantificable. Y puede eliminarse. La coincidencia de unos datos no tenía por qué implicar que era exactamente esa persona. Con 15 atributos es suficiente para distinguir a cada uno de los estadounidenses, sea cual sea el tamaño de la muestra. "Aunque puede haber mucha gente que tiene 30 y pico años, es hombre, vive en Nueva York, muchos menos nacieron un 5 de enero de 1985, conducen un deportivo rojo y viven con dos niñas y un perro", dice Yves-Alexandre de Montjoye, profesor del Imperial College de Londres y uno de los autores de la investigación.
Los factores decisivos no son siempre los mismos o en la misma medida: a veces es el estado civil y otra la raza o cualquier otro. Pero solo tomando 15 factores el modelo es capaz de certificar con una probabilidad del 99,98% que la persona que buscamos es un perfil único entre una enorme base de datos.
Para encontrar a ese individuo hay que conocerlo o tener acceso obviamente a otra base de datos que nos dé parte de la información equivalente para cotejar. Parece difícil, pero la cantidad de combinaciones que pueden darse es cada vez mayor. La información sobre nosotros que puede encontrarse públicamente es cada día mayor.
A lo largo de la última década, los investigadores han encontrado que puede desanonimizarse con multitud de variables si el número de datos es suficiente: uso de redes sociales, datos genéticos, localización, gasto de tarjeta de crédito, historial de navegación, estilo de escritura, código informático.
El presidente Donald Trump ha sido una víctima reciente de la posibilidad de vincular información obtenida por ahí con muestras públicas de bases de datos. El New York Times publicó hace unos meses unos artículos de investigación sobre la declaración de renta del presidente. El periódico logró desanonimizar información fiscal de Trump en una lista de los contribuyentes más ricos del país a partir de unos datos que les había pasado una fuente: "El Times fue capaz de encontrar datos coincidentes en la información fiscal de los mayores contribuyentes (una base de datos disponible públicamente que cada año incluye una muestra de un tercio de esos contribuyentes, con los datos identificativos suprimidos)", dice el periódico.
"Los ataques solo van a mejorar", dice Arvind Narayanan, profesor de la Universidad de Princeton y autor del estudio que demostró que en una base de datos de 2006 solo con la información de evaluación de películas de medio millón de suscriptores de Netflix era posible identificar a individuos. Es decir, la capacidad de vincular nuestro pasado con información de bases de datos anónimas pero públicas solo va a mejorar.
"Nuestra recomendación", añade Narayanan, "es que la carga de la prueba recaiga en el controlador de los datos para que demuestre fehacientemente que los datos anónimos no pueden ser ligados a individuos, en lugar de que sean los defensores de la privacidad los que deban probar que esa relación es posible."
Con solo 15 atributos demográficos es posible identificar a cada uno de los ciudadanos de Estados Unidos.
Hasta ahora nos identificaba nuestro nombre, un número de DNI, un número de teléfono, una dirección postal o de email. Bastaba con ocultar estos detalles en una base de datos para que no pudiera vincularse una serie de informaciones con su propietario. Ya no.
El reguero de datos que dejamos más la capacidad de almacenarlos y tratarlos hacen que sea cada vez más sencillo identificarnos individualmente a partir de lo que hacemos o somos. El anonimato ya no depende de que alguien averigüe nuestro nombre o teléfono. Ahora nuestro comportamiento o identidad puede desanonimizarnos.
Las oficinas de censo, hospitales o empresas comparten muestras anonimizadas de sus inmensas bases de datos por transparencia o para estudios y comprobaciones. El pequeño tamaño de la muestra hacía difícil que esa información acabara vinculándose a un individuo.
Un nuevo estudio publicado por Nature Communications determina que esa incertidumbre es cuantificable. Y puede eliminarse. La coincidencia de unos datos no tenía por qué implicar que era exactamente esa persona. Con 15 atributos es suficiente para distinguir a cada uno de los estadounidenses, sea cual sea el tamaño de la muestra. "Aunque puede haber mucha gente que tiene 30 y pico años, es hombre, vive en Nueva York, muchos menos nacieron un 5 de enero de 1985, conducen un deportivo rojo y viven con dos niñas y un perro", dice Yves-Alexandre de Montjoye, profesor del Imperial College de Londres y uno de los autores de la investigación.
Los factores decisivos no son siempre los mismos o en la misma medida: a veces es el estado civil y otra la raza o cualquier otro. Pero solo tomando 15 factores el modelo es capaz de certificar con una probabilidad del 99,98% que la persona que buscamos es un perfil único entre una enorme base de datos.
Para encontrar a ese individuo hay que conocerlo o tener acceso obviamente a otra base de datos que nos dé parte de la información equivalente para cotejar. Parece difícil, pero la cantidad de combinaciones que pueden darse es cada vez mayor. La información sobre nosotros que puede encontrarse públicamente es cada día mayor.
A lo largo de la última década, los investigadores han encontrado que puede desanonimizarse con multitud de variables si el número de datos es suficiente: uso de redes sociales, datos genéticos, localización, gasto de tarjeta de crédito, historial de navegación, estilo de escritura, código informático.
El presidente Donald Trump ha sido una víctima reciente de la posibilidad de vincular información obtenida por ahí con muestras públicas de bases de datos. El New York Times publicó hace unos meses unos artículos de investigación sobre la declaración de renta del presidente. El periódico logró desanonimizar información fiscal de Trump en una lista de los contribuyentes más ricos del país a partir de unos datos que les había pasado una fuente: "El Times fue capaz de encontrar datos coincidentes en la información fiscal de los mayores contribuyentes (una base de datos disponible públicamente que cada año incluye una muestra de un tercio de esos contribuyentes, con los datos identificativos suprimidos)", dice el periódico.
"Los ataques solo van a mejorar", dice Arvind Narayanan, profesor de la Universidad de Princeton y autor del estudio que demostró que en una base de datos de 2006 solo con la información de evaluación de películas de medio millón de suscriptores de Netflix era posible identificar a individuos. Es decir, la capacidad de vincular nuestro pasado con información de bases de datos anónimas pero públicas solo va a mejorar.
"Nuestra recomendación", añade Narayanan, "es que la carga de la prueba recaiga en el controlador de los datos para que demuestre fehacientemente que los datos anónimos no pueden ser ligados a individuos, en lugar de que sean los defensores de la privacidad los que deban probar que esa relación es posible."
Los métodos deberán ser otros. El uso de grandes bases de datos ayuda a entender una enfermedad, la movilidad en una ciudad u otros comportamientos humanos. Esta labor deberá seguir haciéndose, pero será cada día más difícil. Los organismos o empresas que compartan o pierdan parte de sus bases de datos anonimizadas se creían invulnerables al no estar vinculadas a información personal. Cada vez más sin embargo lo que hacemos queda registrado y es información personal, esté o no ligada a un nombre o identificador único.
"Necesitamos estándares más altos para lo que constituyan datos anónimos legalmente y empezar a usar herramientas de ingeniería que permitan usar datos que logren preservar la privacidad de la gente", dice De Montjoye.
Este tipo de estudios deben tenerse en cuenta cuando las grandes tecnológicas dicen que no vinculan información personal con nuestros "datos". Para desanonimizar a alguien, ya no hace falta el carné de identidad.
https://elpais.com/tecnologia/2019/07/24/actualidad/1563927638_772353.html
#privacidad #anonimato #rastreo
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
"Necesitamos estándares más altos para lo que constituyan datos anónimos legalmente y empezar a usar herramientas de ingeniería que permitan usar datos que logren preservar la privacidad de la gente", dice De Montjoye.
Este tipo de estudios deben tenerse en cuenta cuando las grandes tecnológicas dicen que no vinculan información personal con nuestros "datos". Para desanonimizar a alguien, ya no hace falta el carné de identidad.
https://elpais.com/tecnologia/2019/07/24/actualidad/1563927638_772353.html
#privacidad #anonimato #rastreo
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
El País
El anonimato va camino de desaparecer
Con solo 15 atributos demográficos es posible identificar a cada uno de los ciudadanos de Estados Unidos
Media is too big
VIEW IN TELEGRAM
Hong Kong police storm Yuen Long MTR station - 11 arrests, 23 injured at banned anti-triad demo
At least 23 people were injured and 11 were arrested following police-protester clashes during a banned anti-mob violence protest in Yuen Long on Saturday.
Among those hospitalised, two people were in a severe condition as of 1am Sunday, with 11 in a stable condition. Ten were discharged. At least four police officers and two journalists were also hurt as the violence escalated into the evening.
📺 https://www.hongkongfp.com/2019/07/28/video-11-arrests-23-injured-banned-anti-triad-demo-hong-kong-police-storm-yuen-long-mtr-station/
#FreeHongKong #freespeach #humanrights #demos #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
At least 23 people were injured and 11 were arrested following police-protester clashes during a banned anti-mob violence protest in Yuen Long on Saturday.
Among those hospitalised, two people were in a severe condition as of 1am Sunday, with 11 in a stable condition. Ten were discharged. At least four police officers and two journalists were also hurt as the violence escalated into the evening.
📺 https://www.hongkongfp.com/2019/07/28/video-11-arrests-23-injured-banned-anti-triad-demo-hong-kong-police-storm-yuen-long-mtr-station/
#FreeHongKong #freespeach #humanrights #demos #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
IP Freely (Screw YouTube)
In this clip from Episode 360 of The Corbett Report podcast, James debuts his blockbuster online protest song, “IP Freely (Screw YouTube),” featuring the #YouTube thoughtcrime chord: the Dsus2!
📺 https://www.corbettreport.com/ip-freely-screw-youtube/
#ScrewYouTube #corbettreport #video #podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
In this clip from Episode 360 of The Corbett Report podcast, James debuts his blockbuster online protest song, “IP Freely (Screw YouTube),” featuring the #YouTube thoughtcrime chord: the Dsus2!
📺 https://www.corbettreport.com/ip-freely-screw-youtube/
#ScrewYouTube #corbettreport #video #podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Home Affairs pushes for cyber spy powers
The Department of Home Affairs is pushing ahead with moves to expand the powers of Australia’s cyber spy agency, the Australian Signals Directorate, to potentially embed ASD within the corporate computer systems that run the nation’s banks, telecommunications and other critical infrastructure.
https://www.thesaturdaypaper.com.au/news/politics/2019/07/27/home-affairs-pushes-cyber-spy-powers/15641496008501
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The Department of Home Affairs is pushing ahead with moves to expand the powers of Australia’s cyber spy agency, the Australian Signals Directorate, to potentially embed ASD within the corporate computer systems that run the nation’s banks, telecommunications and other critical infrastructure.
https://www.thesaturdaypaper.com.au/news/politics/2019/07/27/home-affairs-pushes-cyber-spy-powers/15641496008501
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
YouTuber and IG Metall set YouTube deadline for negotiations
The FairTube campaign demands transparency, independent arbitration and a codetermination for YouTuber. The campaign is backed by YouTubers Union and the IG Metall trade union. If the company has not started negotiations in a month, FairTube wants to sue it for bogus self-employment and DSGVO violations.
📺 🇬🇧 https://www.youtube.com/watch?v=oZZ5Kouj_hQ
📺 🇩🇪 https://www.youtube.com/watch?v=f6ZBfOIerR4v%3DoZZ5Kouj_hQ
#Youtube #FairTube #IGmetall #negotiations #DSGVO
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The FairTube campaign demands transparency, independent arbitration and a codetermination for YouTuber. The campaign is backed by YouTubers Union and the IG Metall trade union. If the company has not started negotiations in a month, FairTube wants to sue it for bogus self-employment and DSGVO violations.
📺 🇬🇧 https://www.youtube.com/watch?v=oZZ5Kouj_hQ
📺 🇩🇪 https://www.youtube.com/watch?v=f6ZBfOIerR4v%3DoZZ5Kouj_hQ
#Youtube #FairTube #IGmetall #negotiations #DSGVO
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
ProtonMail: Secret adjustments to the transparency report
ProtonMail is one of the few Internet companies in Switzerland with a transparency report. The transparency that such a report can create is intended to create trust.
Thanks in part to this transparency report, it became known that real-time monitoring is also possible for ProtonMail.
The ProtonMail Transparency Report, however, has the flaw that it has been adapted considerably over the last few weeks in silence and secrecy.
According to the information in the transparency report, the last adjustment was made on 24 April 2019 (“Updated on 24 April 2019”).
But if you compare the versions that the Internet Archive Wayback machine had saved on April 25 and July 26, 2019 (screenshot), you can see several adjustments, among others:
👉🏼 Read the full (translated) report without ads n shit:
https://rwtxt.lelux.fi/blackbox/protonmail-secret-adjustments-to-the-transparency-report
#ProtonMail #Switzerland #transparency #report
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
ProtonMail is one of the few Internet companies in Switzerland with a transparency report. The transparency that such a report can create is intended to create trust.
Thanks in part to this transparency report, it became known that real-time monitoring is also possible for ProtonMail.
The ProtonMail Transparency Report, however, has the flaw that it has been adapted considerably over the last few weeks in silence and secrecy.
According to the information in the transparency report, the last adjustment was made on 24 April 2019 (“Updated on 24 April 2019”).
But if you compare the versions that the Internet Archive Wayback machine had saved on April 25 and July 26, 2019 (screenshot), you can see several adjustments, among others:
👉🏼 Read the full (translated) report without ads n shit:
https://rwtxt.lelux.fi/blackbox/protonmail-secret-adjustments-to-the-transparency-report
#ProtonMail #Switzerland #transparency #report
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Kazakhstan's HTTPS Interception
This post describes our analysis of carrier-level HTTPS interception ordered by the government of Kazakhstan.
The Kazakhstan government recently began using a fake root CA to perform a man-in-the-middle (MitM) attack against HTTPS connections to websites including Facebook, Twitter, and Google. We have been tracking the attack, and in this post, we provide preliminary results from our ongoing research and new technical details about the Kazakh interception system.
👉🏼 Read more:
https://censoredplanet.org/kazakhstan
#kazakhstan #HTTPS #interception #websites #MitM #tracking #attack #research #analysis #facebook #twitter #google
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
This post describes our analysis of carrier-level HTTPS interception ordered by the government of Kazakhstan.
The Kazakhstan government recently began using a fake root CA to perform a man-in-the-middle (MitM) attack against HTTPS connections to websites including Facebook, Twitter, and Google. We have been tracking the attack, and in this post, we provide preliminary results from our ongoing research and new technical details about the Kazakh interception system.
👉🏼 Read more:
https://censoredplanet.org/kazakhstan
#kazakhstan #HTTPS #interception #websites #MitM #tracking #attack #research #analysis #facebook #twitter #google
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Facebook is funding brain experiments to create a device that reads your mind
Big tech firms are trying to read people’s thoughts, and no one’s ready for the consequences.
In 2017, Facebook announced that it wanted to create a headband that would let people type at a speed of 100 words per minute, just by thinking.
Now, a little over two years later, the social-media giant is revealing that it has been financing extensive university research on human volunteers.
Today, some of that research was described in a scientific paper from the University of California, San Francisco, where researchers have been developing “speech decoders” able to determine what people are trying to say by analyzing their brain signals.
The research is important because it could help show whether a wearable brain-control device is feasible and because it is an early example of a giant tech company being involved in getting hold of data directly from people’s minds.
To some neuro-ethicists, that means we are going to need some rules, and fast, about how brain data is collected, stored, and used.
In the report published today in Nature Communications, UCSF researchers led by neuroscientist Edward Chang used sheets of electrodes, called ECoG arrays, that were placed directly on the brains of volunteers.
The scientists were able to listen in in real time as three subjects heard questions read from a list and spoke simple answers. One question was “From 0 to 10, how much pain are you in?” The system was able to detect both the question and the response of 0 to 10 far better than chance.
Another question asked was which musical instrument they preferred, and the volunteers were able to answer “piano” and “violin.” The volunteers were undergoing brain surgery for epilepsy.
Facebook says the research project is ongoing, and that is it now funding UCSF in efforts to try to restore the ability to communicate to a disabled person with a speech impairment.
Eventually, Facebook wants to create a wearable headset that lets users control music or interact in virtual reality using their thoughts.
To that end, Facebook has also been funding work on systems that listen in on the brain from outside the skull, using fiber optics or lasers to measure changes in blood flow, similar to an MRI machine.
Such blood-flow patterns represent only a small part of what’s going on in the brain, but they could be enough to distinguish between a limited set of commands.
👉🏼 Read more:
https://www.technologyreview.com/s/614034/facebook-is-funding-brain-experiments-to-create-a-device-that-reads-your-mind/
💡 Also intresting:
https://www.ucsf.edu/news/2019/07/415046/team-ids-spoken-words-and-phrases-real-time-brains-speech-signals
#DeleteFacebook #experiments #brain #SpeechSignals #BigTech #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Big tech firms are trying to read people’s thoughts, and no one’s ready for the consequences.
In 2017, Facebook announced that it wanted to create a headband that would let people type at a speed of 100 words per minute, just by thinking.
Now, a little over two years later, the social-media giant is revealing that it has been financing extensive university research on human volunteers.
Today, some of that research was described in a scientific paper from the University of California, San Francisco, where researchers have been developing “speech decoders” able to determine what people are trying to say by analyzing their brain signals.
The research is important because it could help show whether a wearable brain-control device is feasible and because it is an early example of a giant tech company being involved in getting hold of data directly from people’s minds.
To some neuro-ethicists, that means we are going to need some rules, and fast, about how brain data is collected, stored, and used.
In the report published today in Nature Communications, UCSF researchers led by neuroscientist Edward Chang used sheets of electrodes, called ECoG arrays, that were placed directly on the brains of volunteers.
The scientists were able to listen in in real time as three subjects heard questions read from a list and spoke simple answers. One question was “From 0 to 10, how much pain are you in?” The system was able to detect both the question and the response of 0 to 10 far better than chance.
Another question asked was which musical instrument they preferred, and the volunteers were able to answer “piano” and “violin.” The volunteers were undergoing brain surgery for epilepsy.
Facebook says the research project is ongoing, and that is it now funding UCSF in efforts to try to restore the ability to communicate to a disabled person with a speech impairment.
Eventually, Facebook wants to create a wearable headset that lets users control music or interact in virtual reality using their thoughts.
To that end, Facebook has also been funding work on systems that listen in on the brain from outside the skull, using fiber optics or lasers to measure changes in blood flow, similar to an MRI machine.
Such blood-flow patterns represent only a small part of what’s going on in the brain, but they could be enough to distinguish between a limited set of commands.
👉🏼 Read more:
https://www.technologyreview.com/s/614034/facebook-is-funding-brain-experiments-to-create-a-device-that-reads-your-mind/
💡 Also intresting:
https://www.ucsf.edu/news/2019/07/415046/team-ids-spoken-words-and-phrases-real-time-brains-speech-signals
#DeleteFacebook #experiments #brain #SpeechSignals #BigTech #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
🇪🇸 Multas millonarias en protección de datos para British Airways y Marriott…y estas son solo las primeras.
Las agencias quieren que las sanciones tengan un efecto disuasorio e impondrán multas que estén ligadas al volumen de facturación de la compañía.
Poco más de 1 año después de la entrada en vigor de la nueva regulación sobre protección de datos en Europa, hemos visto como la agencia de protección de datos inglesa, la Oficina del Comisionado de Información de Reino Unido (ICO) ha anunciado su intención de imponer las primeras multas millonarias en Europa: 203 millones de euros a British Airways y 110 millones de euros para Marriott.
Pero, ¿qué es lo que la ICO ha tenido en consideración para proponer este importe de sanciones a los que no estamos nada acostumbrados? En ambos casos, las propuestas de sanciones se impondrían como consecuencia de una brecha de seguridad y en ambos casos la ICO ha valorado, multitud de factores, siendo probablemente el más relevante, la existencia de fallos en las medidas de seguridad.
Si la empresa no tiene implementadas las medidas de seguridad necesarias para proteger los datos personales, las sanciones van a ser muy elevadas. Es cierto que la sofisticación de los ciberataques es cada vez mayor y que no existe ninguna medida de seguridad 100 % infalible, no obstante, lo que los reguladores van a tener en consideración en este tipo de casos es si las empresas se lo han puesto fácil a los atacantes porque no tenían implementadas las medidas adecuadas.
Y ambas multas son prueba de ello. En el caso de British Airways la ICO ha manifestado que la aerolínea no cumplía con los estándares básicos de seguridad que hay que aplicar cuando se trata información de pagos con tarjetas (PCI) y no tenía encriptados los códigos de seguridad (CVV) de las tarjetas de crédito.
Qué tipo de información se ve afectada por la brecha y las consecuencias que pueden derivarse para los usuarios es otro factor a tener en consideración en este tipo de investigaciones. Las consecuencias no son las mismas si los datos afectados son, por ejemplo, direcciones de email, que si además, como es el caso de British Airways, los atacantes tienen acceso a datos financieros como números de tarjetas de crédito que pueden fácilmente ser usados con fines fraudulentos.
No obstante, la ICO no tiene en consideración si ese uso fraudulento se ha producido o no, dado que como indica su directora, Elizabeth Denham, en una entrevista publicada por el Wall Street Journal, pueden transcurrir bastantes años desde que se produce la brecha hasta que los datos se utilizan con estos fines, como fue el caso de Yahoo! (la brecha se produjo en 2014 y el uso fraudulento se detectó 3 años más tarde).
El número de afectados también es otro criterio a tener en cuenta, en el caso de British Airways estamos hablando de 500.000 clientes , pero en el caso de Marriott se cree que la brecha afectó a la información de alrededor de 500.000.000 de clientes. La duración de la brecha, esto es, el tiempo durante el cual los hackers han podido acceder a la información hasta que se descubre la brecha es otro criterio a valorar; en el caso de Bristirh Airways fueron dos semanas mientras que en el de Marriott fueron 4 años.
En el caso de Marriott, la ICO también ha tenido en consideración las medidas que se adoptaron el momento de la adquisición de la cadena Starwood.
Las agencias quieren que las sanciones tengan un efecto disuasorio e impondrán multas que estén ligadas al volumen de facturación de la compañía.
Poco más de 1 año después de la entrada en vigor de la nueva regulación sobre protección de datos en Europa, hemos visto como la agencia de protección de datos inglesa, la Oficina del Comisionado de Información de Reino Unido (ICO) ha anunciado su intención de imponer las primeras multas millonarias en Europa: 203 millones de euros a British Airways y 110 millones de euros para Marriott.
Pero, ¿qué es lo que la ICO ha tenido en consideración para proponer este importe de sanciones a los que no estamos nada acostumbrados? En ambos casos, las propuestas de sanciones se impondrían como consecuencia de una brecha de seguridad y en ambos casos la ICO ha valorado, multitud de factores, siendo probablemente el más relevante, la existencia de fallos en las medidas de seguridad.
Si la empresa no tiene implementadas las medidas de seguridad necesarias para proteger los datos personales, las sanciones van a ser muy elevadas. Es cierto que la sofisticación de los ciberataques es cada vez mayor y que no existe ninguna medida de seguridad 100 % infalible, no obstante, lo que los reguladores van a tener en consideración en este tipo de casos es si las empresas se lo han puesto fácil a los atacantes porque no tenían implementadas las medidas adecuadas.
Y ambas multas son prueba de ello. En el caso de British Airways la ICO ha manifestado que la aerolínea no cumplía con los estándares básicos de seguridad que hay que aplicar cuando se trata información de pagos con tarjetas (PCI) y no tenía encriptados los códigos de seguridad (CVV) de las tarjetas de crédito.
Qué tipo de información se ve afectada por la brecha y las consecuencias que pueden derivarse para los usuarios es otro factor a tener en consideración en este tipo de investigaciones. Las consecuencias no son las mismas si los datos afectados son, por ejemplo, direcciones de email, que si además, como es el caso de British Airways, los atacantes tienen acceso a datos financieros como números de tarjetas de crédito que pueden fácilmente ser usados con fines fraudulentos.
No obstante, la ICO no tiene en consideración si ese uso fraudulento se ha producido o no, dado que como indica su directora, Elizabeth Denham, en una entrevista publicada por el Wall Street Journal, pueden transcurrir bastantes años desde que se produce la brecha hasta que los datos se utilizan con estos fines, como fue el caso de Yahoo! (la brecha se produjo en 2014 y el uso fraudulento se detectó 3 años más tarde).
El número de afectados también es otro criterio a tener en cuenta, en el caso de British Airways estamos hablando de 500.000 clientes , pero en el caso de Marriott se cree que la brecha afectó a la información de alrededor de 500.000.000 de clientes. La duración de la brecha, esto es, el tiempo durante el cual los hackers han podido acceder a la información hasta que se descubre la brecha es otro criterio a valorar; en el caso de Bristirh Airways fueron dos semanas mientras que en el de Marriott fueron 4 años.
En el caso de Marriott, la ICO también ha tenido en consideración las medidas que se adoptaron el momento de la adquisición de la cadena Starwood.
Y, obviamente, el tamaño de la empresa es lo que define el importe de la sanción; se asume que cuanto mayor sea el tamaño de la empresa, esta debe tener más medios dedicados a proteger los datos personales de sus clientes o empleados. No se le puede exigir lo mismo a una PYME que a una multinacional.
Pero además, las agencias de protección de datos quieren que las sanciones tengan un efecto disuasorio y para conseguir ese fin tienen que imponer multas que estén ligadas al volumen de facturación de la compañía, cosa que permite la nueva regulación de protección de datos. Así, mientras que bajo la anterior regulación la ICO solo pudo imponer a Facebook una multa de 500.000 Libras, que era la máxima permitida en aquel momento, por el escándalo de Cambridge Analytica, ahora, la nueva regulación le da la posibilidad de imponer una sanción a British Airways que representa el 1,5 % de su volumen de facturación anual en 2017. Claramente, el grado de persuasión de este tipo de sanciones es mayor.
La Agencia Española de Protección de Datos sancionó a la Liga de Fútbol Profesional con 250.000 euros recientemente y la directora de la ICO, en la mencionada entrevista, anunciaba que se van a imponer más multas a otras empresas este verano por parte del organismo que dirige, así que parece que vienen curvas y que British Airways y Marriott son solo los primeros de una larga lista de sanciones millonarias.
https://cincodias.elpais.com/cincodias/2019/07/29/legal/1564410687_469515.html
#multas #privacidad #seguridad
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Pero además, las agencias de protección de datos quieren que las sanciones tengan un efecto disuasorio y para conseguir ese fin tienen que imponer multas que estén ligadas al volumen de facturación de la compañía, cosa que permite la nueva regulación de protección de datos. Así, mientras que bajo la anterior regulación la ICO solo pudo imponer a Facebook una multa de 500.000 Libras, que era la máxima permitida en aquel momento, por el escándalo de Cambridge Analytica, ahora, la nueva regulación le da la posibilidad de imponer una sanción a British Airways que representa el 1,5 % de su volumen de facturación anual en 2017. Claramente, el grado de persuasión de este tipo de sanciones es mayor.
La Agencia Española de Protección de Datos sancionó a la Liga de Fútbol Profesional con 250.000 euros recientemente y la directora de la ICO, en la mencionada entrevista, anunciaba que se van a imponer más multas a otras empresas este verano por parte del organismo que dirige, así que parece que vienen curvas y que British Airways y Marriott son solo los primeros de una larga lista de sanciones millonarias.
https://cincodias.elpais.com/cincodias/2019/07/29/legal/1564410687_469515.html
#multas #privacidad #seguridad
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Cinco Días
Multas millonarias en protección de datos para British Airways y Marriott…y estas son solo las primeras
Las agencias quieren que las sanciones tengan un efecto disuasorio e impondrán multas que estén ligadas al volumen de facturación de la compañía
Pentagon testing mass surveillance balloons across the US
The US military is conducting wide-area surveillance tests across six midwest states using experimental high-altitude balloons, documents filed with the Federal Communications Commission (FCC) reveal.
Up to 25 unmanned solar-powered balloons are being launched from rural South Dakota and drifting 250 miles through an area spanning portions of Minnesota, Iowa, Wisconsin and Missouri, before concluding in central Illinois.
Travelling in the stratosphere at altitudes of up to 65,000ft, the balloons are intended to “provide a persistent surveillance system to locate and deter narcotic trafficking and homeland security threats”, according to a filing made on behalf of the Sierra Nevada Corporation, an aerospace and defence company.
The balloons are carrying hi-tech radars designed to simultaneously track many individual vehicles day or night, through any kind of weather. The tests, which have not previously been reported, received an FCC license to operate from mid-July until September, following similar flights licensed last year.
Arthur Holland Michel, the co-director of the Center for the Study of the Drone at Bard College in New York, said, “What this new technology proposes is to watch everything at once. Sometimes it’s referred to as ‘combat TiVo’ because when an event happens somewhere in the surveilled area, you can potentially rewind the tape to see exactly what occurred, and rewind even further to see who was involved and where they came from.”
The tests have been commissioned by the US Southern Command (Southcom), which is responsible for disaster response, intelligence operations and security cooperation in the Caribbean and Central and South America. Southcom is a joint effort by the US army, navy, air force and other forces, and one of its key roles is identifying and intercepting drug shipments headed for the United States.
“We do not think that American cities should be subject to wide-area surveillance in which every vehicle could be tracked wherever they go,” said Jay Stanley, a senior policy analyst at the American Civil Liberties Union.
“Even in tests, they’re still collecting a lot of data on Americans: who’s driving to the union house, the church, the mosque, the Alzheimer’s clinic,” he said. “We should not go down the road of allowing this to be used in the United States and it’s disturbing to hear that these tests are being carried out, by the military no less.”
PDF:
https://apps.fcc.gov/els/GetAtt.html?id=233815&x=.
👉🏼 Read more:
https://www.theguardian.com/us-news/2019/aug/02/pentagon-balloons-surveillance-midwest
#USA #pentagon #surveillance #Southcom
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The US military is conducting wide-area surveillance tests across six midwest states using experimental high-altitude balloons, documents filed with the Federal Communications Commission (FCC) reveal.
Up to 25 unmanned solar-powered balloons are being launched from rural South Dakota and drifting 250 miles through an area spanning portions of Minnesota, Iowa, Wisconsin and Missouri, before concluding in central Illinois.
Travelling in the stratosphere at altitudes of up to 65,000ft, the balloons are intended to “provide a persistent surveillance system to locate and deter narcotic trafficking and homeland security threats”, according to a filing made on behalf of the Sierra Nevada Corporation, an aerospace and defence company.
The balloons are carrying hi-tech radars designed to simultaneously track many individual vehicles day or night, through any kind of weather. The tests, which have not previously been reported, received an FCC license to operate from mid-July until September, following similar flights licensed last year.
Arthur Holland Michel, the co-director of the Center for the Study of the Drone at Bard College in New York, said, “What this new technology proposes is to watch everything at once. Sometimes it’s referred to as ‘combat TiVo’ because when an event happens somewhere in the surveilled area, you can potentially rewind the tape to see exactly what occurred, and rewind even further to see who was involved and where they came from.”
The tests have been commissioned by the US Southern Command (Southcom), which is responsible for disaster response, intelligence operations and security cooperation in the Caribbean and Central and South America. Southcom is a joint effort by the US army, navy, air force and other forces, and one of its key roles is identifying and intercepting drug shipments headed for the United States.
“We do not think that American cities should be subject to wide-area surveillance in which every vehicle could be tracked wherever they go,” said Jay Stanley, a senior policy analyst at the American Civil Liberties Union.
“Even in tests, they’re still collecting a lot of data on Americans: who’s driving to the union house, the church, the mosque, the Alzheimer’s clinic,” he said. “We should not go down the road of allowing this to be used in the United States and it’s disturbing to hear that these tests are being carried out, by the military no less.”
PDF:
https://apps.fcc.gov/els/GetAtt.html?id=233815&x=.
👉🏼 Read more:
https://www.theguardian.com/us-news/2019/aug/02/pentagon-balloons-surveillance-midwest
#USA #pentagon #surveillance #Southcom
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Audio
The Tech Worker Resistance
There’s a movement building within tech. Workers are demanding higher standards from their companies — and because of their unique skills and talent, they have the leverage to get attention. Walkouts and sit-ins. Picket protests and petitions. Shareholder resolutions, and open letters. These are the new tools of tech workers, increasingly emboldened to speak out. And, as they do that, they expose the underbellies of their companies’ ethics and values, or perceived lack of them.
📻 #IRL - Online Life is Real Life #podcast
https://irlpodcast.org/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
There’s a movement building within tech. Workers are demanding higher standards from their companies — and because of their unique skills and talent, they have the leverage to get attention. Walkouts and sit-ins. Picket protests and petitions. Shareholder resolutions, and open letters. These are the new tools of tech workers, increasingly emboldened to speak out. And, as they do that, they expose the underbellies of their companies’ ethics and values, or perceived lack of them.
📻 #IRL - Online Life is Real Life #podcast
https://irlpodcast.org/
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
YouTube Blacklists Federal Reserve Information - It’s Up To YOU To Spread It!
Breitbart finally covers the story of how Chris Hayes got YouTube to blacklist the search term “federal reserve” and scrub Century of Enslavement from those search results. Today, James puts out the challenge: can you break through the information blockade with good old word of mouth?
📺 https://www.corbettreport.com/youtube-blacklists-federal-reserve-information-its-up-to-you-to-spread-it/
#ItsUpToYOU #corbettreport #censorship #youtube #FederalReserve #podcast #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Breitbart finally covers the story of how Chris Hayes got YouTube to blacklist the search term “federal reserve” and scrub Century of Enslavement from those search results. Today, James puts out the challenge: can you break through the information blockade with good old word of mouth?
📺 https://www.corbettreport.com/youtube-blacklists-federal-reserve-information-its-up-to-you-to-spread-it/
#ItsUpToYOU #corbettreport #censorship #youtube #FederalReserve #podcast #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Stop Surveillance Humanitarianism
Requiring biometric data, like iris and facial scans, sets a dangerous precedent for vital aid.
A standoff between the United Nations World Food Program and Houthi rebels in control of the capital region is threatening the lives of hundreds of thousands of civilians in Yemen.
Alarmed by reports that food is being diverted to support the rebels, the aid program is demanding that Houthi officials allow them to deploy biometric technologies like iris scans and digital fingerprints to monitor suspected fraud during food distribution.
The Houthis have reportedly blocked food delivery, painting the biometric effort as an intelligence operation, and have demanded access to the personal data on beneficiaries of the aid. The impasse led the aid organization to the decision last month to suspend food aid to parts of the starving population — once thought of as a last resort — unless the Houthis allow biometrics.
With program officials saying their staff is prevented from doing its essential jobs, turning to a technological solution is tempting. But biometrics deployed in crises can lead to a form of surveillance humanitarianism that can exacerbate risks to privacy and security.
By surveillance humanitarianism, I mean the enormous data collection systems deployed by aid organizations that inadvertently increase the vulnerability of people in urgent need.
👉🏼 Read more:
https://www.nytimes.com/2019/07/11/opinion/data-humanitarian-aid.html
#surveillance #humanitarianism #vulnerability #humanrights #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Requiring biometric data, like iris and facial scans, sets a dangerous precedent for vital aid.
A standoff between the United Nations World Food Program and Houthi rebels in control of the capital region is threatening the lives of hundreds of thousands of civilians in Yemen.
Alarmed by reports that food is being diverted to support the rebels, the aid program is demanding that Houthi officials allow them to deploy biometric technologies like iris scans and digital fingerprints to monitor suspected fraud during food distribution.
The Houthis have reportedly blocked food delivery, painting the biometric effort as an intelligence operation, and have demanded access to the personal data on beneficiaries of the aid. The impasse led the aid organization to the decision last month to suspend food aid to parts of the starving population — once thought of as a last resort — unless the Houthis allow biometrics.
With program officials saying their staff is prevented from doing its essential jobs, turning to a technological solution is tempting. But biometrics deployed in crises can lead to a form of surveillance humanitarianism that can exacerbate risks to privacy and security.
By surveillance humanitarianism, I mean the enormous data collection systems deployed by aid organizations that inadvertently increase the vulnerability of people in urgent need.
👉🏼 Read more:
https://www.nytimes.com/2019/07/11/opinion/data-humanitarian-aid.html
#surveillance #humanitarianism #vulnerability #humanrights #why #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Army developing ‘synthetic telepathy’
Similar technology marketed as a way to control video games by thought
Vocal cords were overrated anyway. A new Army grant aims to create email or voice mail and send it by thought alone. No need to type an e-mail, dial a phone or even speak a word.
Known as synthetic telepathy, the technology is based on reading electrical activity in the brain using an electroencephalograph, or EEG. Similar technology is being marketed as a way to control video games by thought.
"I think that this will eventually become just another way of communicating," said Mike D'Zmura, from the University of California, Irvine and the lead scientist on the project.
"It will take a lot of research, and a lot of time, but there are also a lot of commercial applications, not just military applications," he said.
The idea of communicating by thought alone is not a new one. In the 1960s, a researcher strapped an EEG to his head and, with some training, could stop and start his brain's alpha waves to compose Morse code messages.
The Army grant to researchers at University of California, Irvine, Carnegie Mellon University and the University of Maryland has two objectives. The first is to compose a message using, as D'Zmura puts it, "that little voice in your head."
The second part is to send that message to a particular individual or object (like a radio), also just with the power of thought. Once the message reaches the recipient, it could be read as text or as a voice mail.
While the money may come from the Army and its first use could be for covert operations, D'Zmura thinks that thought-based communication will find more use in the civilian realm.
"The eventual application I see is for students sitting in the back of the lecture hall not paying attention because they are texting," said D'Zmura. "Instead, students could be back there, just thinking to each other."
EEG-based gaming devices are large and fairly conspicuous, but D'Zmura thinks that eventually they could be incorporated into a baseball hat or a hood.
Six real-life 'X-Files'Another use for such a system is for patients with Lou Gehrig's disease, or ALS. As the disease progresses, patients have fully functional brains but slowly lose control over their muscles. Synthetic telepathy could be a way for these patients to communicate.
One of the first areas for thought-based communication is in the gaming world, said Paul Sajda of Columbia University.
Commercial EEG headsets already exist that allow wearers to manipulate virtual objects by thought alone, noted Sajda, but thinking "move rock" is easier than, say, "Have everyone meet at Starbucks at 5:30."
👉🏼 Read more:
https://www.nbcnews.com/id/27162401/ns/technology_and_science-science/t/army-developing-synthetic-telepathy/
#army #telepathy #synthetic #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Similar technology marketed as a way to control video games by thought
Vocal cords were overrated anyway. A new Army grant aims to create email or voice mail and send it by thought alone. No need to type an e-mail, dial a phone or even speak a word.
Known as synthetic telepathy, the technology is based on reading electrical activity in the brain using an electroencephalograph, or EEG. Similar technology is being marketed as a way to control video games by thought.
"I think that this will eventually become just another way of communicating," said Mike D'Zmura, from the University of California, Irvine and the lead scientist on the project.
"It will take a lot of research, and a lot of time, but there are also a lot of commercial applications, not just military applications," he said.
The idea of communicating by thought alone is not a new one. In the 1960s, a researcher strapped an EEG to his head and, with some training, could stop and start his brain's alpha waves to compose Morse code messages.
The Army grant to researchers at University of California, Irvine, Carnegie Mellon University and the University of Maryland has two objectives. The first is to compose a message using, as D'Zmura puts it, "that little voice in your head."
The second part is to send that message to a particular individual or object (like a radio), also just with the power of thought. Once the message reaches the recipient, it could be read as text or as a voice mail.
While the money may come from the Army and its first use could be for covert operations, D'Zmura thinks that thought-based communication will find more use in the civilian realm.
"The eventual application I see is for students sitting in the back of the lecture hall not paying attention because they are texting," said D'Zmura. "Instead, students could be back there, just thinking to each other."
EEG-based gaming devices are large and fairly conspicuous, but D'Zmura thinks that eventually they could be incorporated into a baseball hat or a hood.
Six real-life 'X-Files'Another use for such a system is for patients with Lou Gehrig's disease, or ALS. As the disease progresses, patients have fully functional brains but slowly lose control over their muscles. Synthetic telepathy could be a way for these patients to communicate.
One of the first areas for thought-based communication is in the gaming world, said Paul Sajda of Columbia University.
Commercial EEG headsets already exist that allow wearers to manipulate virtual objects by thought alone, noted Sajda, but thinking "move rock" is easier than, say, "Have everyone meet at Starbucks at 5:30."
👉🏼 Read more:
https://www.nbcnews.com/id/27162401/ns/technology_and_science-science/t/army-developing-synthetic-telepathy/
#army #telepathy #synthetic #thinkabout
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Conspiracy Theorists Are Domestic Terrorists!
The term “conspiracy theory” was #weaponized by the #CIA half a century ago. At first it was merely used to marginalize those who question #government narratives. But now that weapon is being loaded and pointed at our heads. Can a “conspiracy theorist” false flag be far behind? James examines the new #FBI document on #conspiracy theorists as domestic #terrorists in this important edition of #PropagandaWatch.
📺 https://www.corbettreport.com/conspiracy-theorists-are-domestic-terrorists-propagandawatch/
#corbettreport #video #podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The term “conspiracy theory” was #weaponized by the #CIA half a century ago. At first it was merely used to marginalize those who question #government narratives. But now that weapon is being loaded and pointed at our heads. Can a “conspiracy theorist” false flag be far behind? James examines the new #FBI document on #conspiracy theorists as domestic #terrorists in this important edition of #PropagandaWatch.
📺 https://www.corbettreport.com/conspiracy-theorists-are-domestic-terrorists-propagandawatch/
#corbettreport #video #podcast
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
This media is not supported in your browser
VIEW IN TELEGRAM
Coordinating chaos - The tactics protesters use to fortify the frontlines
The scenes of protest in Hong Kong over the last few months can appear chaotic, filled with throngs of activists and waving umbrellas. But in the undulating waves of people is a well-developed system for moving supplies, providing aid and constructing barricades--all driven by hand signals.
A steady supply chain
Not too far from the clashes, protesters work to get any equipment needed to those on the frontlines facing off against the police. Human chains were observed at many of the marches. Some formed and dispersed quickly, but others were in place for some time, with protesters swapping positions as needed.
https://graphics.reuters.com/HONGKONG-EXTRADITIONS-TACTICS/0100B0790FL/index.html
#FreeHongKong
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN
The scenes of protest in Hong Kong over the last few months can appear chaotic, filled with throngs of activists and waving umbrellas. But in the undulating waves of people is a well-developed system for moving supplies, providing aid and constructing barricades--all driven by hand signals.
A steady supply chain
Not too far from the clashes, protesters work to get any equipment needed to those on the frontlines facing off against the police. Human chains were observed at many of the marches. Some formed and dispersed quickly, but others were in place for some time, with protesters swapping positions as needed.
https://graphics.reuters.com/HONGKONG-EXTRADITIONS-TACTICS/0100B0790FL/index.html
#FreeHongKong
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
📡@FLOSSb0xIN