asterisk2a + internet + intelligence   47

NSA's Hacker-in-Chief: We Don't Need Zero-Days To Get Inside Your Network | Motherboard
“I think a lot of people think the nation states are running on this engine of zero-days. You go out with your skeleton key and unlock the door and you're in. It's not that,” he said. “I will tell you that persistence and focus will get you in, will achieve that exploitation without the zero-days,” he continued “There's so many more vectors that are easier, less risky and quite often more productive than going down that route.”
cyber  crime  cyber  attack  NSA  National  Security  BND  GCHQ  cyber  espionage  cyber  cyber  war  Surveillance-Industrial  Complex  intellectual  property  China  Russia  Israel  USA  UK  Five  Eyes  surveillance  state  Orwellian  Internet  Privacy  Privacy  Intelligence  Agency  Foreign  Intelligence 
february 2016 by asterisk2a
BND spionierte USA und andere Partnerländer aus - SPIEGEL ONLINE
Der Skandal um die sogenannte Selektorenliste der NSA ist noch nicht aufgearbeitet, jetzt geht's um die Vergangenheit des BND: Nach Informationen von SPIEGEL ONLINE spionierte er offenbar selbst in großem Stil Botschaften und andere Institutionen von EU-Ländern und US-Amerikanern aus.
cyber  war  corporate  espionage  industrial  espionage  cyber  espionage  BND  NSA  GCHQ  Five  Eyes  Surveillance-Industrial  Complex  surveillance  state  Orwellian  military–industrial  Wall  Street  profit  maximisation  shareholder  value  Privacy  Internet  Privacy  Nationalism  Foreign  Intelligence  affairs  policy  relations  national  interest  profiteer  human  rights 
october 2015 by asterisk2a
Jung & Naiv - Kommissar für Menschenrechte über die Situation in...
[ right to privacy ] [ institutional ingrained problem ] // Der Menschenrechtskommissar des Europarats, Nils Muižnieks, war heute zu Gast in der BPK und hat über die Menschenrechtslage in Deutschland berichtet. Hier sind unsere naiven Fragen an ihn zu Ehe für alle, Totalüberwachung, institutioneller Rassismus und Menschenrechte in der deutschen Außenpolitik... und seine Antworten.
self-censorship  Internet  Privacy  Privacy  European  Union  human  rights  NSA  oversight  GCHQ  BND  CIA  9/11  War  on  Terror  Secret  Courts  FISA  Court  FISAAA  Patriot  Act  Dataretention  Vorratsdatenspeicherung  Snoopers  Charter  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Career  Politicians  Justice  System  democracy  Law  &  Justice  No  Representation  social  contract  political  theory  political  economy  foreign  affairs  foreign  policy  Intelligence  foreign  relations  Torture  public  awareness  public  debate  public  discourse  public  perception  manufactured  consent  Polarisation  Lügenpresse  Pressefreiheit  freedom  of  press  corporate  media  corporate  state  military–industrial  propaganda  populism  Nationalism  USA  UK  Germany  corporate  espionage  industrial  espionage  cyber  espionage  cyber  Politics 
october 2015 by asterisk2a
U.S. and China Seek Arms Deal for Cyberspace - The New York Times
In the last year there have been devastating Chinese hacks of American computer systems, and the U.S. government has floated the idea of sanctioning China in response. Here's the apparent response: A noticeable downtick in significant hacks of American networks, and news that the U.S. and China are working on a cybersecurity arms deal, ahead of Chinese President Xi Jinping's Thursday arrival in America. The proposed agreement would supposedly prevent either nation from attacking the other's "critical infrastructure" during peacetime.
cyber  war  cyber  attack  military–industrial  complex  military  intervention  Surveillance-Industrial  surveillance  state  Internet  Privacy  Privacy  Five  Eyes  GCHQ  UK  USA  BRIC  China  Russia  Israel  Intelligence  Agency  Foreign  Intelligence  BND  cyber  espionage  corporate  espionage  industrial  espionage  Europe  affairs  policy  relations  Pentagon  CIA  NSA 
september 2015 by asterisk2a
Staff Exodus, Pressure From Microsoft, Apple Hit Google Now | Re/code
According to multiple sources, their initial vision of Now — as a mobile assistant tailored to particular users — works best living on the mobile operating system, not within search. Also, Google is a political place and search is Congress. Big, necessary, stodgy. [...] “‘Look, I’ve got a lot on my plate. Chrome and Android are my top priorities. Google Now is not on that. I can’t fight that battle for you.’” [...] Apple, for its part, looks prepared to launch a competitor to Now on Tap. With its proactive assistant and spotlight search, the Apple entry could elbow Google out. // // Amazon released a (SW/HW)PA for the living room, Apple got Siri & just recently launched its own integrated search engine called "Spotlight" & Google released Google Now (voice activated search in response to Siri) and at last Google I/O, Now on Tap [ Now on Tap will solve app developers’ nagging issue with discovery. ] And FB just came out w an assistant product for Messenger. // &! bit.ly/1JYeNCT
Google  Inc.  Google  Google  Search  Android  Google  Now  augmented  intelligence  Siri  Apple  iOS  Sundar  Pichai  personal  assistant  Software  Is  Eating  The  World  Big  Data  user  Internet  Privacy  Privacy  Facebook  Messenger  Platform  convenience  on-demand  user  behaviour  friction  frictionless  voice  recognition  mobile  homescreen  mobile  first  mobile  phone  Smartphone  Facebook  Appification  Silo  content  discovery  discovery  distribution  model  App  discovery  Apple  App  Store  Google  Play 
august 2015 by asterisk2a
Do You Trust Larry Page? - Stratechery by Ben Thompson
Given the fact that Alphabet née Google is the second most valuable enterprise in the world, it’s striking to consider Larry Page’s 2014 assessment of the company he co-founded with Sergey Brin: I think we’ve not succeeded as much as we’d like. [...] Even Google’s famously far-reaching mission statement, to “organise the world’s information and make it universally accessible and useful”, is not big enough for what he now has in mind. The aim: to use the money that is spouting from its search advertising business to stake out positions in boom industries of the future, from biotech to robotics. [...] Googles non-social approach to advertising vs Facebook and everyone else ] [ ad world begins finally to shift away from TV & other legacy forms & FB/Google are main beneficiaries coming years of changing ad spend ] [ Page/Brin want 2 lead the org 2 a new frontier. A new Google Search. &they think they a near it, ie self-driving car, that they think the timing is right NOW ]
Google  Inc.  Google  Alphabet  Inc.  Larry  Page  Sergey  Brin  Don't  be  evil  Sundar  Pichai  vision  mission  Legacy  self-driving  cars  AI  Transhumanism  artificial  intelligence  autonomous  car  anti-ageing  renewable  energy  Google  X  Robotics  Software  Is  Eating  The  World  machine  learning  ethical  machine  Internet  Privacy  Privacy  Meta  Data  metadata  Big  Data  Google  Search  AdSense  human  rights  antitrust  Europe  FTC  USA  lobbyist  lobby  Lobbying  deep  learning  augmented  intelligence  Google  Glass  Wireless  Carrier  ISP  Google  Fiber  user  Nest  Labs  native  advertising  Social  Media  content  marketing  advertising  Programmatic  advertisement  re-targeting  advertisement  targeting  ad  targeting  Twitter  perma-cookie  cookies  Appification  mobile  homescreen  mobile  first  user  behaviour  vertical  mobile  phone  Android  banner  ads  advertisement  Leadership  conglomerate  operation  operations  Wall  Street  shareholder  value  profit  maximisation  long-term  view  long-term  thinking  short-term  thinking  short-term  view  technological  progress  incrementalism  incremental  counter  culture  Silicon  Valley  wantrepreneur 
august 2015 by asterisk2a
Google’s $6 Billion Miscalculation on the EU - Bloomberg Business
via https://news.ycombinator.com/item?id=10021018 // Google declined to make its executives available for on-the-record interviews, but several concede that the company was caught off guard by the intensity of European criticism, in large part because of its broad popularity with users. Google is so relied upon that many people casually assert that the most prevalent search term on rival Bing is, in fact, “Google.” (Microsoft declines to confirm this.) [...] The more Europeans rely on Google, however, the more they’ve come to fear it, making it an easy target for politicians. Last November members of the European Parliament voted 384 to 174 for a symbolic proposal to break up the search giant into two separate pieces—its monolithic search engine and everything else. [ + agressive tax evasion schemes came under public & political pressure; Amazon, Google, Apple, Facebook, and Co ]
Google  antitrust  Europe  2015  Google  Search  NSA  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Edward  Snowden  corporate  espionage  industrial  espionage  cyber  espionage  Germany  France  Five  Eyes  GCHQ  UK  USA  Silicon  Valley  Stasi  2.0  national  interest  Foreign  Intelligence  affairs  policy  Intelligence  Agency  Google  News  Internet  Privacy  Privacy  Big  Data  right  to  be  forgotten  tax  evasion  tax  avoidance  FTC  Yelp!  Yelp  monopoly  monopsony  oligopoly  oligopol  lobbyist  lobby  Lobbying  revolving  door  Don't  be  evil  Washington  Career  Politicians  No  Representation  Consumer  Protection  Android 
august 2015 by asterisk2a
Russia will fork Sailfish OS to shut out pesky Western spooks
Paranoia over NSA tampering spurs de-Westernisation drive // well only the Paranoid survive. [...] Russia’s Minister of Communications and Mass Media, Nikolai Nikiforov, has taken part in talks to form a consortium that will aid Russia in developing a custom mobile OS, reportedly a forked version of Jolla’s Sailfish OS, to lessen its dependence on Western technology. Nikiforov held a working meeting last week with the leadership of Hong Kong-based Sailfish Holdings, developer of the quietly admired Sailfish OS. Alongside other participants, the parties involved discussed the use of open-source software in the public and private sectors, taking into account technical, economic and political factors, the latter of which is expected to include United States’ interference with exported technologies.
Open  Source  Russia  corporate  espionage  industrial  espionage  cyber  espionage  NSA  Five  Eyes  Nationalism  barackobama  presidency  Europe  GCHQ  UK  Foreign  Intelligence  affairs  relations  2015  cyber  war  encryption  Angela  Merkel  Leadership  Career  Politicians  No  Representation  human  rights  Privacy  Internet  Privacy  Cryptopocalypse  cryptography  national  interest  False  Flag  on  Terror  on  Drugs  organised  crime  backdoors  backdoor  IT  Security  exploit  Germany  FRance  surveillance  Surveillance-Industrial  Complex  surveillance  state  Orwellian  corporate  state  manufactured  consent  Cold  propaganda  populism  Pressefreiheit  Lügenpresse  Vorratsdatenspeicherung  Snoopers  Charter  investigative  journalism  Whistleblower  tracking  bulk  data  collection  democracy  freedom  freedom  of  press  Secret  Courts  FISA  Court  FISAAA  BND  military–industrial 
august 2015 by asterisk2a
Pressure mounts over claims Police Scotland breached rules over spying on journalists (From Herald Scotland)
PRESSURE is mounting on ministers to take action on Police Scotland amid further criticism of the force over claims it illegally spied on a journalist to uncover sources. The force's elite Counter Corruption Unit (CCU) is said to have snooped on the reporter without getting judicial approval - a tactic which was banned on March 25 following a row over officers using the Regulation of Investigatory Powers Act (Ripa) to access journalists’ phone records, texts and emails. // [ endemic and systemic! you are not safe. period. ] // &! bbc.in/1OQEaGJ - Ministers questioned over Police Scotland 'spying' claims // &! bbc.in/1KUFPu9 &! bbc.in/1Maojno << time to get their story right!?
Met  Police  GCHQ  freedom  of  press  UK  journalismus  investigative  journalism  journalism  corporate  state  corporate  media  media  conglomerate  Pressefreiheit  Lügenpresse  Five  Eyes  NSA  Career  Politicians  No  Representation  democracy  Surveillance-Industrial  Complex  surveillance  state  Orwellian  military–industrial  2015  human  rights  Internet  Privacy  Privacy  Snoopers  Charter  Vorratsdatenspeicherung  abuse  of  power  corruption  manufactured  consent  populism  War  on  Terror  False  Flag  organised  crime  cyber  cyber  crime  Cryptopocalypse  cryptography  encryption  backdoors  backdoor  propaganda  Intelligence  Agency  Foreign  Intelligence  corporate  espionage  industrial  espionage  cyber  espionage  Nationalism  national  interest  domestic  affairs  affairs  policy  relations  MI5  MI6  Secret  Courts  FISA  Court  FISAAA 
august 2015 by asterisk2a
Sicherheitshysterie nach britischem Urteil gegen Vorratsdatenspeicherung: „Tausende Leben in Gefahr“ | netzpolitik.org
Die Notwendigkeit der technisierten Überwachung wird gar nicht mehr hinterfragt, die gerichtlichen Backpfeifen an die britische Regierung stattdessen in grotesker Weise kommentiert. So titelt beispielhaft der Telegraph in Anlehnung an eine Aussage der britischen Innenministerin Theresa May: Thousands of lives at risk after High Court rules snooping powers unlawful. // theguardian.com/world/surveillance - bit.ly/1fa4mQP // &! bit.ly/1CMnrUg &! bit.ly/1DoKqiZ - Why appeasing governments over encryption will never work. David Cameron & the director of the FBI have both asked for ‘backdoors’ to be included in encryption software [...] Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications, is worth reading in full. It concludes that proposals for backdoors are “unworkable in practice, raise enormous legal and ethical questions, and would undo progress on security at a time when internet vulnerabilities are causing extreme economic harm”.
Snoopers  Charter  Vorratsdatenspeicherung  DRIPA  data  retention  law  bulk  data  collection  propaganda  surveillance  surveillance  state  Orwellian  False  Flag  War  on  Terror  ISIS  ISIL  Surveillance-Industrial  Complex  military–industrial  UK  GCHQ  MI5  Met  Police  abuse  of  power  transparency  accountability  democracy  Secret  Courts  Five  Eyes  British  Empire  populism  Lügenpresse  manufactured  consent  corporate  state  NSA  Career  Politicians  Tony  Blair  presidency  barackobama  David  Cameron  society  Gesellschaft  European  Union  Internet  Privacy  Privacy  human  rights  self-censorship  encryption  Cryptopocalypse  backdoors  backdoor  FBI  MI6  cyber  corporate  espionage  industrial  espionage  cyber  espionage  Intelligence  Agency  Foreign  Intelligence  national  interest  protectionism  economic  damage  IT  Security  policy  folly  policy  error 
july 2015 by asterisk2a
Telling British tourists to flee Tunisia rewards terrorism | Simon Jenkins | Comment is free | The Guardian
The security hysteria of politicians such as Philip Hammond, our foreign secretary, is the only thing that poses an ‘existential threat’ to Britain [...] ritain has imposed economic sanctions on Tunisia. These are in retaliation for that country’s failure to prevent what the prime minister calls an “existential threat to Britain” from so-called Islamic State terrorists. The head of London’s police, Sir Bernard Hogan-Howe, declared earlier this week that the Tunisia killings meant it was “highly likely” that there “could” be a terrorist attack on London. These responses are outrageous. They play directly into the hands of terrorists, awarding them added glory in their own eyes for their original attack and offering similar publicity to other lunatics eager for martyrdom. &! bit.ly/1IPXSCt &! bit.ly/1eObyBS
UK  War  on  Terror  ISIS  al-Qaida  GCHQ  MI5  MI6  Intelligence  Agency  Foreign  Intelligence  propaganda  military–industrial  complex  manufactured  consent  fear  anxiety  society  corporate  strategy  surveillance  state  Orwellian  media  conglomerate  Lügenpresse  transparency  accountability  Internet  Privacy  Privacy  affairs  policy 
july 2015 by asterisk2a
NSA und GCHQ spähen Anti-Viren-Hersteller wie Kaspersky aus - SPIEGEL ONLINE
[ Washington, even Obama doesn't know about the true extent. NSA, Five Eyes, for profit military and intelligence complex is an entity that is OVER Washington. Because telling Washington would be a National Security risk. ] Frisch veröffentlichte Snowden-Unterlagen zeigen, wie der amerikanische und der britische Geheimdienst gezielt Anti-Viren-Software austricksen und deren Hersteller ausforschen. In den Dokumenten taucht auch ein deutscher Anbieter auf. [...] Der britische Geheimdienst GCHQ und die amerikanische NSA haben gezielt Anti-Viren-Hersteller ausspioniert. Ziel war es offenbar, Wege zu finden, die Virenschutzprogramme auszutricksen: Die Schadsoftware der Geheimdienste sollte von den Programmen unentdeckt bleiben.
NSA  GCHQ  Five  Eyes  surveillance  state  Cryptopocalypse  encryption  backdoors  backdoor  TrueCrypt  Edward  Snowden  Reverse  Engineering  FISA  Court  Secret  Courts  UK  USA  presidency  barackobama  Stasi  2.0  Imperialism  False  Flag  corporate  espionage  industrial  espionage  cyber  espionage  cyber  war  IT  Security  cyber  crime  cyber  cyber  attack  Privacy  Internet  Privacy  Antivirus  Orwellian  Empire  vested  interest  interest  groups  national  interest  military–industrial  complex  Intelligence  Agency  Foreign  Intelligence  Cold  relations  policy  affairs  Wikileaks  cablegate  Career  Politicians  No  Representation  Totalitarian  Despotism  oligarchy  oversight  transparency  democracy  Washington  Security 
june 2015 by asterisk2a
Chris Hedges - Our Only Hope Will Come Through Rebellion - 29th March 2014 - YouTube
military industrial complex does what it wants and asks and gets what it wants. // Truth is hidden. Decent is criminalised. // things are only to get worse. // protect corporate state and spy on other corporate states and corporate entities. // for-profit military industrial complex // 9/11 opportunist, false flag, to profit from program X to protect our nation // no warrent needed - https://en.wikipedia.org/wiki/Warrant_(law) // the corporate state has no incentive to give up Stasi 2.0 // >> = Totalitarian state // we have totalitarian structures! period. // reform can not come from those who are in the center of power and a implicit of the status quo ... meaning only a revolution through rebellion is the option. defying the law and opting for civil disobedience. moral and physical courage needed.
surveillance  state  NSA  GCHQ  Stasi  2.0  Orwellian  Five  Eyes  Cold  War  civil  liberty  Constitution  FISA  Court  FISAAA  Patriot  Act  military–industrial  complex  Whistleblower  democracy  oversight  transparency  accountability  Intelligence  Agency  abuse  of  power  Separation  of  powers  Career  Politicians  No  Representation  Congress  Washington  lobbyist  lobby  Lobbying  National  Security  False  Flag  Privacy  Internet  Privacy  USA  UK  Warrent  metadata  KGB  WMD  Iraq  War  War  on  Drugs  War  on  Terror  organised  crime  Politics  of  Fear  history  Empire  Drone  Strike  Drone  Warfare  Palestine  Gaza-Israel  conflict  Foreign  Intelligence  World  Police  World  G8  Europe  corporate  espionage  industrial  espionage  cyber  espionage  Cryptopocalypse  encryption  Edward  Snowden  Wikileaks  Julian  Assange  Torture  Pressefreiheit  Lügenpresse  media  conglomerate  presidency  barackobama  Angela  Merkel  opportunist  Opportunism  Wall  Street  trust  trustagent  Secret  Courts  Chelsea  Manning  corruption  self-censorship 
june 2015 by asterisk2a
The Surveillance Economy and Extreme Income Inequality: You Can't Have One Without the Other - YouTube
Uber and Airbnb is equal to informal economy (uncertainty) = staying power only for owner of marketplace (wealth accumulation & ultimate bargain power as owner of (monopoly/oligopoly form of marketplace). Silicon Valley made the informal economy cool again bc its on your smartpone (homescreen). Uber & Co are becoming, as owners of said marketplace, the new super elite (with no shared economic interest & no stakeholder in local economy). Disenfranchised & Price war. // The perfect, crazy, too good to be true, idea - will crash eventually (accumulating wealth with little to no input [see stakeholder theory/shared economic interest/long-term views and interest!]). // Start-up Lesson/Advice: "cost of choice" & paying computation with advertising = corruption (Google, Facebook &Co) paying (Wall Street, short-termism [Fast Food]) for micro-management of your life, of your choice. = U loosing free will. // youtu.be/kZO8mgarU0k youtu.be/XdEuII9cv-U youtu.be/cCvf2DZzKX0 youtu.be/5puB_7Q2n74
abuse  of  power  income  inequality  inequality  surveillance  state  Orwellian  democracy  Net  Neutrality  censorship  self-censorship  Gini  coefficient  Career  Politicians  USA  Five  Eyes  World  Police  World  Ian  Bremmer  book  Jaron  Lanier  21stcentury  Privacy  Internet  Privacy  Vorratsdatenspeicherung  Cryptopocalypse  history  Open  Source  transparency  accountability  lobbyist  lobby  Lobbying  stakeholder  Wall  Street  crony  capitalism  tax  evasion  tax  avoidance  profit  maximisation  bribery  corruption  shareholder  value  occupywallstreet  Indignados  Indignants  short-term  thinking  short-term  view  Share  Economy  1099  Economy  marketplace  marketplace  efficiencies  commodity  business  commoditization  Service  Sector  Jobs  Niedriglohn  Niedriglohnsektor  Universal  Basic  Silicon  Valley  tax  free  income  capital  gains  informal  Super  Rich  1%  Uber  AirBnB  self-employment  contractor  Zero  Hour  Contract  Big  Data  analytics  Software  Is  Eating  The  World  augmented  intelligence  Failure  bailout  GFC  Google  oligopoly  oligopol  monopoly  business  model  Start-Up  lesson  Start-Up  advice  cost  of  choice  advertising  economics  of  abundance  marginal  cost  business  plan  long-term  view  long-term  thinking  Zeitarbeit  The  Leih 
june 2015 by asterisk2a
Abgehörtes Merkel-Handy: Generalbundesanwalt stellt Ermittlungen ein - SPIEGEL ONLINE
"Fehlende Auskunft der USA" / http://www.bbc.co.uk/news/world-europe-33106044 --- "The office of federal prosecutor Harald Range said the NSA had failed to provide enough evidence to justify legal action." [ sure, they would self-incriminate and cause a foreign relations hubub. ] [...] It said "the vague statements by US officials about possible surveillance of the chancellor's mobile telecommunication by a US intelligence service - 'not any more' - are not enough to describe what happened''. A German parliamentary committee is also investigating NSA surveillance, but it has not managed to get much help from US officials either, Germany's Spiegel news website reports.
NSA  Angela  Merkel  surveillance  state  Orwellian  Europe  corporate  espionage  espionage  industrial  espionage  cyber  espionage  Career  Politicians  No  Representation  Principle  USA  presidency  barackobama  Intelligence  Agency  Foreign  Intelligence  Selectors  GCHQ  UK  policy  affairs  relations  False  Flag  World  Police  Privacy  Internet  Privacy  GroKo  BND  Wikileaks  Edward  Snowden  cablegate  Julian  Assange  BND-Affäre  BND-Skandal 
june 2015 by asterisk2a
Datenschutzbeauftragte warnt vor Verfassungsschutzreform - SPIEGEL ONLINE
Nach dem Entwurf der Koalition dürfen Polizei und Verfassungsschutz nahezu beliebig personenbezogene Daten austauschen: "Damit sind die Barrieren für einen umfassenden, fast voraussetzungslosen und verfassungswidrigen Datenfluss gefallen", so Voßhoff. Kritisch bewertet sie auch, dass das Bundesamt für Verfassungsschutz (BfV) offenbar Zugriff auf "alle Informationen" der Landesbehörden haben solle. Dabei seien die Zuständigkeiten des Bundesamts klar durch das Grundgesetz beschränkt. Diese Begrenzung wolle die Koalition nun "zu einer Erweiterung umdrehen", klagt Voßhoff - das sei ein Verstoß gegen das Grundrecht auf informationelle Selbstbestimmung. [...] wolle die Regierung "BND und BfV bedingungslos weiter hochrüsten." Das sei mit den Grundrechten unvereinbar.
Vorratsdatenspeicherung  surveillance  state  Justice  System  abuse  of  power  corruption  Career  Politicians  No  Representation  Orwellian  Big  Data  Grundgesetz  Grundrecht  human  rights  Privacy  Internet  Privacy  Dataretention  BND  Intelligence  Agency  domestic  affairs  GroKo  Angela  Merkel  Postgeheimnis 
may 2015 by asterisk2a
Jeremy Rifkin at the #CGC15: “The Zero Marginal Cost Society” - YouTube
From Top-Down Corporations to Prosumer (ProAm) to everybody being a potentially player! thus entrepreneurship, differentiation, being remarkable (Seth Godin). Distributed. Collaborative. Open. Transparent. (Open Source). Lateral Power. (TaxiOS project (collaborative) vs Uber (top-down Wall Street proprietary profit maximisation shareholder value with no shared economic interest, crony capitalism [ youtu.be/wCLPizjSe6I ]). // GFC 147$/barrel of oil. Started at 90$/barrel of oil --- globalisation/economic growth has a ceiling its 147$ and its starts to get prohibitive at 90$ // aggregate energy efficiency // Transport, Smart Grid, Internet, IoT; moving power, thus economic power. economic value chain // human capital; economic activity entity // digital goods = zero marginal cost of additional unit sold // Share Economy transforms Capitalism which will not be the primary exclusive arbiter of economic life // favours electricity cooperatives, E.ON, EDF, RWE & Co have to pivot //
marginal  cost  economics  of  abundance  book  Industrial  Revolution  2.0  Future  of  Work  Mobile  Creatives  Mobile  Creative  global  citizenship  Energy  Internet  Smart  Grid  renewable  green  transportation  public  transportation  policy  price  wind  security  efficiency  economic  history  Software  Is  Eating  The  World  augmented  intelligence  algorithm  algorithms  GFC  productivity  austerity  IoT  Big  Data  analytics  efficiency  Capitalism  Share  Economy  vocational  education  education  policy  practical  skills  practical  skill  set  MOOC  entrepreneurship  entrepreneur  differentiate  differentiation  Seth  Godin  society  culture  Universal  Basic  Income  3D  printing  Manufacturing  Moore's  Law  democracy  logistics  Internet 
may 2015 by asterisk2a
Danny Boyle: the Olympic opening ceremony would be done differently in 2015 - Newsnight - YouTube
do we want to give them the data, our lives?! it seems positive and benign, but it changes our lives in the long-term and we are only seen as data pools. // dave eggers novel the circle
Internet  Privacy  book  Facebook  Google  Big  Data  perma  cookie  Orwellian  State  surveillance  FISA  Court  FISAAA  Secret  Courts  NSA  GCHQ  Foreign  Intelligence  Intelligence  Agency  corruption  abuse  of  power  Privacy  human  rights  analytics  Vorratsdatenspeicherung  Five  Eyes  False  Flag  War  on  Terror  cyber  cyber  espionage  corporate  espionage  industrial  espionage  Microsoft  backdoors  backdoor  encryption  cryptography  Cryptopocalypse 
may 2015 by asterisk2a
Snowden documents show spy agencies exploiting issues with China’s most popular browser | PandoDaily
New reports from CBC News and the Intercept show that intelligence agencies in Canada, the United States, Australia, the United Kingdom, and New Zealand exploited vulnerabilities in Alibaba’s UC Browser to surveil 500 million people. The agencies also planned to use various app stores to distribute their spyware. The reports indicate that UC Browser offered up all kinds of information about its users. This is notable because it’s the most popular Web browser in China and has an estimated 500 million users, making it a valuable target for spying. The problems are said to be limited to the Android version of the Web browser.
Five  Eyes  NSA  Alibaba  Edward  Snowden  War  on  Terror  surveillance  state  Orwellian  False  Flag  GCHQ  Intelligence  Agency  Foreign  Intelligence  cyber  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  human  rights  presidency  barackobama  corporate  espionage  industrial  espionage  cyber  espionage  cyber  attack 
may 2015 by asterisk2a
Law changed to allow GCHQ hacking ... just as GCHQ hauled into court for hacking • The Register
[ unaccountable, free for all to hack anything that is in the domestic interest, can be corporate intelligence, trade secrets, patents, corporate documents & communications; Russia, China, Germany, Brazil, India. The NEW COLD WAR. see also 2015 BND affair with selectors. ] Government legislation to exempt GCHQ from prosecution on charges of illegal hacking has been passed and come into effect – apparently torpedoing an ongoing claim against the surveillance agency being heard by the Investigatory Powers Tribunal. Last July, a coalition of internet service providers and international organisations teamed up with Privacy International to take legal action against GCHQ. Their claim, which arrived in court today, has been hobbled by what the privacy warriors said was the revelation that the government had quietly ushered through legislation amending the Computer Misuse Act to exempt GCHQ and law enforcement from prosecution, and did so while the case was ongoing.
cyber  war  cyber  attack  GCHQ  on  Terror  organised  crime  on  Drugs  accountability  surveillance  state  Orwellian  2015  corporate  espionage  industrial  espionage  cyber  espionage  NSA  USA  UK  presidency  barackobama  David  Cameron  encryption  Europe  trade  secret  corporate  intelligence  Airbus  Five  Eyes  Agency  domestic  interest  abuse  of  power  corruption  FISA  Court  FISAAA  Patriot  Act  Act  Courts  Cold  Cold  2.0  BND  selector  Wall  Street  Internet  Privacy  IT  Security  geopolitics  Foreign  National  Security  globalisation  globalization 
may 2015 by asterisk2a
Bundesnachrichtendienst entlastet sich in Geheimbericht selbst - SPIEGEL ONLINE
"Merkelig" "Merkelich" - http://www.spiegel.de/politik/deutschland/angela-merkel-in-der-bnd-affaere-angriff-auf-die-chefin-a-1032008.html "Der Auftritt offenbart das Dilemma der Kanzlerin. Sie muss sich messen lassen an ihrer moralischen Aussage, den USA in ihrem Datensammlungswahn die Grenzen aufzuzeigen. Sie will nicht, dass der BND in der Öffentlichkeit dasteht als willfähriges Werkzeug der USA. Zugleich ist sie überzeugt: Ohne die Zusammenarbeit mit den US-Diensten kann sich Deutschland nicht ausreichend vor internationalem Terror schützen." << Leader without principles. Line. Vision. Mission. // &! Die SPD erhöht in der Geheimdienstaffäre den Druck auf Angela Merkel. Parteichef Gabriel betont, er habe das Wort der Kanzlerin: Sie habe ihm versichert, der BND helfe der NSA nicht bei Wirtschaftsspionage. - spiegel.de/politik/deutschland/bnd-affaere-gabriel-rueckt-merkel-in-den-fokus-a-1031977.html // bit.ly/1DPyl53 &! bit.ly/1dImxwr &! bit.ly/1KHeOd2 (Pando) &! bit.ly/1EV9LVr
Angela  Merkel  GroKo  BND  NSA  Five  Eyes  GCHQ  corporate  espionage  industrial  espionage  cyber  espionage  Foreign  Intelligence  presidency  barackobama  Leadership  Career  Politicians  Internet  Privacy  Privacy  War  on  Terror  War  on  Drugs  organised  crime  False  Flag  Act  Patriot  Act  double  standard  human  rights  surveillance  state  Orwellian 
may 2015 by asterisk2a
Die BND-Affäre ist eine Merkel-Affäre - Lobo-Kolumne - SPIEGEL ONLINE
Die Regierung in der Geheimdienst-Krise: Die Vertuschung der BND-Hilfe für die NSA bei der Ausforschung von Unternehmen und Politikern in Deutschland offenbart ein demokratiegefährdendes Staatsverständnis im Kanzleramt. // &! Nachrichtendienst-Affäre: BND half NSA beim Ausspionieren der französischen Regierung - bit.ly/1ErbbWm // &! BND-Affäre: Die Bundesauskunftsverweigerer - bit.ly/1Gxwow9 // &! bit.ly/1bWkKmO // &! BDI-Chef über BND-Affäre: "Verhältnis zwischen Staat und Industrie ist erheblich belastet" - bit.ly/1HRkFMM // &! BND-Affäre: Regierung machte falsche Angaben zur NSA-Spionage - bit.ly/1KsoUhG
Angela  Merkel  GroKo  BND  NSA  corporate  espionage  industrial  espionage  cyber  espionage  profiling  GCHQ  surveillance  state  Orwellian  Career  Politicians  democracy  transparency  accountability  No  Representation  Privacy  Internet  Privacy  Europe  Leadership  Wirtschaftsspionage  Edward  Snowden  Germany  USA  presidency  barackobama  Foreign  Intelligence 
april 2015 by asterisk2a
Kommentar: Warum die aktuellen Erkenntnisse über das Versagen des Kanzleramtes bei BND-Aufsicht schon lange abzusehen waren | netzpolitik.org
"Beihilfe." // &! Eiertanz: Viele, viele naive Fragen zum BND-Skandal - youtu.be/y9pRz5KQ6vo // &! Wirtschaftsspionage für Amerika? "Das Ganze ist ein Riesenskandal", sagt Hans-Christian Ströbele (Grüne) zur BND-Spitzelaffäre. - on.fb.me/1GznzV8 profiling of EU politicians, policy makers as well as EADS, EuroCopter and other stuff, shows that War on Terror, Drugs, and organised crime as a pretence is wrong to a certain extent, it shows that power corrupts and absolute power corrupts absolutely. // &! Der BND-Skandal - Worum geht's eigentlich? youtu.be/pcGzfv-Fndc // &! on.fb.me/1POvdPJ - Was ist mit der Bundeskanzlerin? Wann spricht sie zum BND-Skandal? // German intelligence agency knew NSA was spying on European leaders as early as 2008 - bit.ly/1DEvH3h "It was too worried about the NSA retaliating by limiting the information it shares." Stockholm Syndrome. No Leadership. Only Career Politicians.
surveillance  state  Orwellian  NSA  BND  cyber  espionage  corporate  espionage  industrial  espionage  Five  Eyes  GCHQ  Angela  Merkel  barackobama  presidency  GroKo  Career  Politicians  transparency  democracy  No  Representation  FBI  Torture  accountability  profiling  military–industrial  complex  cyber  crime  cyber  security  cyber  war  Foreign  Intelligence  policy  affairs  USA  World  Police  relations  corruption  abuse  of  power  Edward  Snowden  Privacy  Internet  Privacy  encryption  IT  National  security  cybersecurity  online  security 
april 2015 by asterisk2a
John Oliver Edward Snowden Interview - YouTube
language shapes thoughts. how you communicate and on what level. US elected official talk is always about "keeping America and Americans, safe." what % of baby boomers or millennial do knows what meda data, profiling, and big data is or do or how it can be leveraged. they know what a selfie and a selfie stick is. That's why Career Politicians and Lobby organisations hire PR people. CORPORATE (Wall Street) PR PEOPLE!!! Talking 5 minutes to the nation and saying nothing at all of concrete notion, IS CORPORATE PR SPEAK. Setting the tone for the public discourse, its sort of art and honed down to a science. // &! Last Week Tonight with John Oliver: Government Surveillance (HBO) >> https://youtu.be/XEVlyP4_11M >> Section 215 - bulk collection // principle, no to self-censorship
Edward  Snowden  surveillance  state  Orwellian  public  discourse  public  awareness  public  interest  public  perception  communication  language  Internet  Privacy  Privacy  Career  Politicians  No  Representation  Five  Eyes  public  relations  interest  groups  lobbyist  Lobbying  lobby  presidency  barackobama  public  opinion  publicrelations  Policy  Makers  social  cohesion  Millennials  short-term  thinking  short-term  view  crony  capitalism  Wall  Street  FISA  Court  FISAAA  Patriot  Act  War  on  Terror  False  Flag  military–industrial  complex  metadata  Vorratsdatenspeicherung  Intelligence  Agency  Foreign  Intelligence  World  Police  abuse  of  power  USA  UK  Imperialism  National  Security  vested  interest  interest  bulk  collection  reform  Constitution  corporate  espionage  industrial  espionage  cyber  espionage  Europe  Empire  British  Empire  CIA  self-censorship 
april 2015 by asterisk2a
Linux Journal - Wikipedia, the free encyclopedia
In early July 2014 it was revealed that the NSA's XKeyscore program targeted readers of Linux Journal, which the NSA considers an "extremist forum". // &! NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance - http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance // &! NSA targets the privacy-conscious - http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html "Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA." - visiting site X puts you on watch list/collect data list - ie Wikileaks, Tor, Linux Journal, CCC unter anderem !+& bit.ly/1sZSWV9 >> leads to self-censorship like in East Germany.
NSA  Internet  Privacy  Privacy  human  rights  XKeyscore  Linux  CCC  activism  activists  Hacktivism  target  targeting  GCHQ  encryption  cryptography  Cryptopocalypse  IT  Security  cyber  cyber  war  cyber  espionage  corporate  espionage  industrial  espionage  espionage  FISA  Court  FISAAA  Foreign  Intelligence  Five  Eyes  presidency  barackobama  Stasi  Stasi  2.0  history  backdoor  backdoors  abuse  of  power  surveillance  state  Orwellian  Big  Data  Meta  Data  Unix  Google  Search  Tor  VPN  anonymity  self-censorship  free  speech  freedom  of  press  freespeech  free  press  Pressefreiheit  Meinungsfreiheit  Information  wants  to  be  free  knowledge  M 
february 2015 by asterisk2a
Kaspersky claims US spies can infect computers with malware that is almost impossible to detect | PandoDaily
NSA has found a way to infect computers targeted for surveillance with malware that is almost impossible to detect and even harder to remove. Kaspersky Lab says in its report that a threat actor known as the Equation Group made this possible by infecting firmware used in hard drives made by the world’s top manufacturers. // &! Reddit - bit.ly/1ATpm6v >> According to Kaspersky, getting the malicious code into a drive’s firmware is not an easy task, and can’t be done with help of public tools, meaning that the NSA had to have access to source codes for hard drives produced by these companies. [meaning they asked for access (and or intercepted orders) when OEM orders came from targeted countries/firms? or spoof hw vendor sites and let them download the manipulated firmware] &! bit.ly/19vzSpI - ie Iran and Russia.
NSA  CIA  surveillance  state  Orwellian  Foreign  Intelligence  corporate  espionage  cyber  espionage  espionage  industrial  espionage  GCHQ  Five  Eyes  backdoor  backdoors  corporate  values  corporate  governance  ethical  machine  FISA  Court  FISAAA  Regin  Whistleblower  rootkit  cyber  war  Iratemonk  Firmware  nls_933w.dll  USB  Air  Gap  cyber  security  cyber  attack  cyber  crime  USA  presidency  barackobama  Stuxnet  organised  crime  human  rights  cryptography  Cryptopocalypse  encryption  IT  on  Terror  Malware  Internet  Privacy  Privacy 
february 2015 by asterisk2a
TimesTalks - Laura Poitras, Glenn Greenwald and Edward Snowden with David Carr
Don’t miss this special opportunity to hear the director of CITIZENFOUR – the film nominated for the Academy Award for Best Documentary Feature – the first journalist to write about Snowden’s revelations and Snowden himself (via live video) in conversation with New York Times media columnist David Carr about the film and the issues it raises. // min 43 --- presidency barack obama worst administration ever for clamping down on freedom of press, whistleblowers, against transparency, governance, seperation of powers/checks and balances (NSA/CIA), - Obama got the executive power to close guantanamo, shut off surveillance without warrants. // subverts democracy. &! &! U.S. DROPS TO 49TH IN WORLD PRESS FREEDOM RANKINGS, WORST SINCE OBAMA BECAME PRESIDENT - bit.ly/1zaIdVO
CITIZENFOUR  Edward  Snowden  Laura  Poitras  Glenn  Greenwald  presidency  barackobama  transparency  NSA  governance  oversight  accountability  Whistleblower  freedom  of  press  freepress  Pressefreiheit  free  press  free  speech  Torture  Foreign  Intelligence  Intelligence  Agency  GCHQ  CIA  Warrant  FISAAA  FISA  Court  Europe  China  cyber  war  values  idealism  surveillance  state  Orwellian  moral  beliefs  ethical  machine  ethical  beliefs  corporate  espionage  cyber  espionage  industrial  espionage  espionage  democracy  No  Representation  Privacy  Internet  Privacy  encryption  cryptography  Cryptopocalypse  human  rights  Act  Patriot  Act 
february 2015 by asterisk2a
I challenged hackers to investigate me and what they found out is chilling | PandoDaily
see Planning section; all the vectors of attack // and the weakest component is almost always the human being in some sort of way.
corporate  espionage  cyber  espionage  industrial  espionage  espionage  Foreign  Intelligence  NSA  CIA  surveillance  state  Orwellian  IT  Security  cyber  internet  online  password  cyber  war  cyber  attack  cyber  crime  FISA  Court  Warrant  wiretapping  FISAAA  black  hat  hacker  white  hat  hacker  phishing  phishing  scam 
february 2015 by asterisk2a
With the help of Pinterest, Twitter, and others, a new Facebook platform wants to keep the web secure | PandoDaily
The service is called ThreatExchange, and companies like Yahoo, Twitter, and Pinterest have all agreed to share threat information with each other via the boringly-named tool. But these companies aren’t the only ones worried that information about digital threats isn’t shared as well as it could be. A new agency, the Cyber Threat Intelligence Integration Center, has been formed to facilitate similar sharing amongst various intelligence agencies. ThreatExchange and CTIIT were both formed out of the belief that digital threats are a puzzle whose pieces are held by various groups. The only way to solve that puzzle, then, is to convince everyone to share their pieces. Otherwise the puzzle will always be incomplete. // what if NSA abuses knowledge this org got (of US companies) to abuse the knowledge via FISA Court injunction not to release it to public knowledge - ie to compromise and or steal intelligence from non-US firms.
IT  Security  cyber  encryption  ThreatExchange  Silicon  Valley  internet  online  cryptography  Cryptopocalypse  DDoS  NSA  CIA  BND  Five  Eyes  surveillance  state  Orwellian  Intelligence  Agency  Foreign  Intelligence  transparency  governance  accountability  Europe  China  FISA  Court  FISAAA  ethical  machine  cyber  espionage  corporate  espionage  industrial  espionage  cyber  attack  cyber  war  cyber  crime 
february 2015 by asterisk2a
EFF’s Game Plan for Ending Global Mass Surveillance | Electronic Frontier Foundation
[...] Most people haven’t even heard of it, but Executive Order 12333 is the primary authority the NSA uses to engage in the surveillance of people outside the U.S. While Congress is considering much-needed reforms to the Patriot Act, there’s been almost no debate about Executive Order 12333. [...] [... and its also the private industry as contractor shovelling money for Wall Street shareholders, paid for by tax payer money ...]
EFF  surveillance  state  Orwellian  NSA  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  Big  Data  metadata  Meta  Data  human  rights  USA  Five  Eyes  Foreign  Intelligence  Intelligence  Agency  GCHQ  backdoor  backdoors  CIA  FBI  cyber  security  cyber  attack  cyber  war  cyber  espionage  corporate  espionage  espionage  FISA  Court  FISAAA  presidency  barackobama  David  Cameron  democracy  governance  transparency  accountability  Career  Politicians  Patriot  Act  Act  Whistleblower 
february 2015 by asterisk2a
A court managed what the complicit UK press couldn't: force GCHQ to tell the truth | Trevor Timm | Comment is free | The Guardian
A UK court vindicated Edward Snowden’s whistleblowing on Friday by ruling that the secrecy surrounding one of the programs he exposed was, in fact, illegal. The decision is more evidence that not only were the Snowden revelations necessary and justified, but are also slowly forcing changes in both US and UK, even as both governments fiercely resist. In a stunning ruling, the Investigatory Powers Tribunal (IPT) – which oversees (and usually rubber stamps) Britain’s spy agencies – declared that the intelligence-sharing rules between the NSA and GCHQ (Britain’s NSA equivalent and partner-in-crime) governing their mass surveillance program violated UK human rights laws because they were kept secret for so long. [...] Snowden once rightly called the UK media’s coverage of the GCHQ story “a disservice to the public.”
GCHQ  NSA  human  rights  governance  oversight  transparency  democracy  Career  Politicians  Philosophy  Political  accountability  surveillance  state  Orwellian  Privacy  Internet  Privacy  War  on  Terror  abuse  of  power  organised  crime  War  on  Drugs  No  Representation  Foreign  Intelligence  Intelligence  Agency  Five  Eyes  investigative  journalism  journalism  journalismus  freepress  Pressefreiheit  freedom  of  press  free  speech  Whistleblower  Edward  Snowden  National  Security  mainstream  media  Lügenpresse 
february 2015 by asterisk2a
UK government asks: How's our hacking?
UK gov releases equipment interference guidelines for spy & law enforcement agencies; the guidelines never calls it hacking but 'interference activities; Deputy Director @ Privacy International Eric King (@e3i5) says it's the UK gov's attempt to grant itself some of the most intrusive powers. // "This is the first time that the agencies have admitted that they are in the hacking business," Eric King, the deputy director of London-based digital rights watchdog Privacy International, told Mashable. King said that it amounts to a belated attempt to give these activities a scrap of legal basis, in the face of a lawsuit filed by his group last year, which challenged the legality of the UK intelligence service GCHQ's hacking activities, revealed by Edward Snowden documents. For King, the document is basically an attempt by the UK government to grant itself "some of the most invasive and intrusive" powers it has at its disposal.
UK  GCHQ  David  Cameron  surveillance  state  Orwellian  cyber  espionage  corporate  espionage  espionage  Intelligence  Agency  Foreign  Intelligence  presidency  barackobama  NSA  CIA  FBI  relations  policy  affairs  Politics  Political  Governance  corporate  ethical  machine  Europe  Five  Eyes  Career  Politicians  abuse  of  power  transparency  accountability  trust  trustagent  confidence  democracy  unintended  consequences  Internet  Privacy  Privacy  human  rights  War  on  Terror  War  on  Drugs  organised  crime  encryption  backdoor  backdoors  wiretapping  interdiction 
february 2015 by asterisk2a
Here’s how reporters are reacting to Snowden’s revelations | PandoDaily
The global surveillance programs revealed by Edward Snowden have caused journalists to change how they operate, question what the government knows about them, and consider abandoning investigative reporting, according to a survey from the Pew Research Center. A significant number of the journalists surveyed said they had changed their behavior, whether it’s how they store sensitive files (49 percent), how they communicate with other journalists (29 percent), whether they’ve reached out to a source (13 percent), or pursued a specific story (2 percent). Many are also convinced the government is gathering information about them. Some 64 percent of journalists believed intelligence agencies had “probably collected data” about them. (The other 36 percent, as “InfoSec Taylor Swift” joked, must not read the news.)
investigative  journalism  journalism  journalismus  presidency  barackobama  surveillance  state  Orwellian  encryption  Internet  Privacy  Privacy  Whistleblower  NSA  CIA  FBI  GCHQ  BND  Five  Eyes  Wikileaks  Intelligence  Agency  foreign  relations  foreign  policy  foreign  affairs  Career  Politicians  Politics  David  Cameron  UK  USA  Europe  Espionage  Act  corporate  cyber  FISA  Court  FISAAA  Secret  Courts  leverage  Power  Play  Political  Governance  oversight  accountability  trust  trustagent  confidence  democracy  transparency  No  Representation  short-term  view  short-term  thinking  unintended  consequences  Lügenpresse  Pressefreiheit  freedom  of  press  wiretapping  folly  science  error  distrust  fairness  Law  &  Justice  Justice  System  complexity 
february 2015 by asterisk2a
Jonathan MacDonald - Building Windmills : Opportunities - LeWeb'14 Paris - YouTube
in times of change, build windmills, not walls. // outcome through motivation, that many desire. // technology + people = win, beats human only and technology only performance - ie in Chess ... ie Airline Pilots, Medicine, Teaching, Folding of Proteins - as Game << been done, // min 9 - build AI, AI detects we are weakest link and destroying earth, AI destroys us or minimises population ... // ... what is this guys pain point?
Net  Neutrality  Share  Economy  Start-Up  lesson  Start-Up  advice  protectionism  flat  world  globalization  globalisation  society  rapid  change  skill-biased  technological  change  Software  Is  Eating  The  Future  of  Work  Perspective  Mobile  Creative  Mobile  Creatives  Year  of  Code  darknet  Dark  Internet  Silk  Road  AI  artificial  intelligence 
december 2014 by asterisk2a
Geheimdienst-Untersuchungsausschuss: Das zweifelhafte Gebaren von BND und Bundesregierung | netzpolitik.org
a farce that produces nothing. that is like '1 Euro Job' for Career Politicians and Policy Makers. nothing productive. nothing positive. nothing benefiting transparency and democracy. just burning time and money ... showing that they do something, if even it is nothing of value and substance.
Edward  Snowden  Bundestag  Angela  Merkel  NSA  GCHQ  BND  surveillance  state  transparency  oversight  accountability  foreign  affairs  foreign  relations  foreign  policy  Germany  Democratic  Process  democracy  Intelligence  Agency  Orwellian  Career  Politicians  War  on  Terror  War  on  Drugs  organised  crime  No  Representation  Privacy  Internet  Privacy 
november 2014 by asterisk2a
re:publica 2014 - Sarah Spiekermann: Die ethische Maschine - YouTube
From Technological hype cycles to Singularity and Ethics. Humans stand above technology. - www.google.co.uk/search?q=ray+kurzweil+transhumanism + google.co.uk/search?q=Peter+Thiel+singularity + google.co.uk/search?q=chomsky+singularity
Sarah  Spiekermann  Silicon  Valley  hype  hype  cycle  buzzword  Big  Data  mobile  first  cloudcomputing  context  location  personalisation  personalized  design  Transhumanism  singularity  Ray  Kurzweil  peterthiel  evolution  Noam  Chomsky  Peter  Thiel  ethics  governance  corporate  governance  Google  Robotics  Don't  be  evil  Gesellschaftswerte  Gesellschaftsform  Privacy  Facebook  Values  systems  design  transparency  ethical  machine  identity  individuality  personal  vault  personal  agent  emotion  product  design  reflection  Philosophy  humanity  human  progress  human  rights  FNAC  Function-Hype  innovation  innovator  morality  morals  AI  artificial  intelligence  Internet  Privacy  system  design  Turing  Test  Three  Laws  of  Robotics  Isaac  Asimov 
may 2014 by asterisk2a

related tags

&  1%  2.0  3D  9/11  21stcentury  30C3  abundance  abuse  accountability  Act  activism  activists  ad  ads  AdSense  advertisement  advertising  advice  affairs  Agency  agent  AI  Air  AirBnB  Airbus  al-Qaida  algorithm  algorithms  Alibaba  Alphabet  American  analytics  Android  Angela  Annie  anonymity  anti-ageing  antitrust  Antivirus  anxiety  App  Appification  Apple  artificial  Asimov  Assange  assistant  attack  augmented  austerity  Austria  autonomous  avoidance  awareness  backdoor  backdoors  bailout  banner  barackobama  Basic  be  behaviour  Belgacom  beliefs  Big  black  Blair  BND  BND-Affäre  BND-Skandal  book  Bremmer  bribery  BRIC  Brin  British  bulk  Bundestag  Bundestags  business  buzzword  cablegate  Cameron  Cannabis  capital  capitalism  car  Career  Carrier  cars  CCC  censorship  change  Charter  Chelsea  China  choice  Chomsky  CIA  CITIZENFOUR  citizenship  civil  Class  cloudcomputing  Code  coefficient  cohesion  Cold  collection  commoditization  commodity  communication  complex  complexity  confidence  conflict  conglomerate  Congress  consent  consequences  Constitution  Consumer  content  context  contract  contractor  convenience  cookie  cookies  corporate  corporatism  corruption  cost  counter  courage  Court  Courts  creative  Creatives  creator  crime  crony  cryptography  Cryptopocalypse  culture  cyber  cyberattack  cyberespionage  cybersecurity  cyberwar  cycle  damage  Dark  darknet  DARPA  data  Dataretention  David  DDoS  debate  deep  democracy  Democratic  design  Despotism  destruction  differentiate  differentiation  diplomacy  discourse  discovery  distribution  distrust  domestic  Don't  door  double  Dream  DRIPA  Drone  Drugs  EADS  Eating  economic  economics  economy  education  Edward  EFF  efficiencies  efficiency  emotion  Empire  encryption  energy  Engineering  entrepreneur  entrepreneurship  error  espionage  ethical  ethics  Europe  European  evasion  evil  evolution  exploit  Eyes  Facebook  Failure  fairness  False  FBI  fear  Fiber  Firmware  first  FISA  FISAAA  Five  Flag  flat  FNAC  folly  foreign  forgotten  FRance  France  free  freedom  freelance  freepress  freespeech  friction  frictionless  FTC  Function-Hype  Future  G8  gains  Gap  Gaza-Israel  GCHQ  geopolitics  Germany  Gesellschaft  Gesellschaftsform  Gesellschaftswerte  GFC  Gini  Glass  Glenn  global  globalisation  globalization  Godin  Google  governance  green  Greenwald  Grid  GroKo  groups  Grundgesetz  Grundrecht  hacker  Hacktivism  hat  history  homescreen  Hour  human  humanity  hype  Ian  idealism  identity  Imperialism  Inc.  income  incremental  incrementalism  Indie  Indignados  Indignants  individuality  industrial  inequality  informal  Information  innovation  innovator  intellectual  intelligence  interdiction  interest  internet  intervention  investigative  iOS  IoT  Iraq  Iratemonk  Is  Isaac  ISIL  ISIS  ISP  Israel  IT  Jaron  Jobs  journalism  journalismus  Julian  Justice  KGB  knowledge  Kurzweil  Labs  language  Lanier  Larry  Laura  law  Laws  Leadership  learning  Legacy  Leiharbeit  lesson  leverage  liberty  Linux  lobby  Lobbying  lobbyist  location  logistics  long-term  Lügenpresse  M  machine  Machon  mainstream  Makers  Malware  Manning  manufactured  Manufacturing  marginal  marketing  marketplace  maximisation  media  Meinungsfreiheit  Merkel  Messenger  Met  Meta  metadata  method  MI5  MI6  Microsoft  Middle  military  military–industrial  Millennials  mission  mobile  model  monopoly  monopsony  MOOC  Moore's  moral  morality  morals  Music  national  Nationalism  native  neoconservatism  neoconservatives  neoliberal  neoliberalism  Nest  Net  net-neutrality  Netzneutralität  Neutrality  News  Niedriglohn  Niedriglohnsektor  nls_933w.dll  No  Noam  Now  NSA  occupywallstreet  of  oligarchy  oligopol  oligopoly  on  on-demand  online  Open  operation  operations  opinion  Opportunism  opportunist  organised  Orwellian  oversight  Page  Palestine  password  Patriot  patriotact  Pentago  Pentagon  perception  perma  perma-cookie  personal  personalisation  personalized  Perspective  Peter  peterthiel  Philosophy  phishing  phone  Pichai  plan  Platform  Play  Poitras  Polarisation  Police  policy  political  Politicians  Politics  populism  Postgeheimnis  power  powers  practical  presidency  press  Pressefreiheit  price  Principle  printing  Privacy  Process  product  productivity  profiling  profit  profiteer  Programmatic  progress  propaganda  property  Protection  protectionism  public  publicrelations  quo  rapid  Ray  re-targeting  recognition  reflection  reform  Regin  relations  renewable  Representation  retention  Reverse  Revolution  revolving  Rich  right  rights  Road  Robotics  rootkit  Russia  Sarah  scam  science  Search  secret  Sector  security  Security-Industrial  selector  Selectors  self-censorship  self-driving  self-employment  Separation  Sergey  Service  set  Seth  Share  shareholder  short-term  Silicon  Silk  Silo  singularity  Siri  skill  skill-biased  skills  Smart  Smartphone  Snoopers  Snowden  social  society  socratic  Software  Source  speech  Spiekermann  Spin  squeezed  stakeholder  standard  Start-Up  Stasi  state  status  Store  strategy  Street  Strike  Stuxnet  Sundar  Super  surveillance  Surveillance-Industrial  system  systems  target  targeting  tax  TaxiOS  technological  Terror  Test  The  theory  Thiel  thinking  ThreatExchange  Three  to  Tony  Tor  Torture  Totalitarian  tracking  trade  Transhumanism  transparency  transportation  Trojan  Trojaner  TrueCrypt  trust  trustagent  Turing  Twitter  Uber  UK  unintended  Union  Universal  Unix  USA  USB  user  Valley  value  values  vault  vertical  vested  view  vision  vocational  voice  Vorratsdatenspeicherung  VPN  Wall  wantrepreneur  wants  war  Warfare  Warrant  Warrent  Wars  Washington  Werkvertrag  Whistleblower  white  Wikileaks  wind  Wireless  wiretapping  Wirtschaftsspionage  WMD  Work  world  X  XKeyscore  Year  Yelp  Yelp!  YouTube  Zeitarbeit  Zero  Zivilcourage 

Copy this bookmark:



description:


tags: