"Cyber Security" myth destroying every level of our individual security

JGeropoulas

The Living Force
Another great article by Paul Craig Roberts
_http://www.paulcraigroberts.org/2017/05/15/exponential-growth-insecurity/

The Exponential Growth of Insecurity
by Paul Craig Roberts
May 15, 2017

There is no such thing as cyber security. The only choice is more security or less security, as the recent hack of the National Security Agency demonstrates.

Hackers stole from NSA a cyber weapon, which has been used in attacks (at time of writing) on 150 countries, shutting down elements of the British National Health Service, the Spanish telecommunications company Telefonica, automakers Renault and Nissan, Russia’s Interior Ministry, Federal Express, the energy company PetroChina, and many more.

The news spin is to not blame NSA for its carelessness, but to blame Microsoft users for not updating their systems with a patch issued two months ago. But the important questions have not been asked: What was the NSA doing with such malware and why did NSA not inform Microsoft of the malware?

Clearly, NSA intended to use the cyber weapon against some country or countries. Why else have it and keep it a secret from Microsoft?

Was it to be used to shut down Russian and Chinese systems prior to launching a nuclear first strike against the countries? Congress should be asking this question as it is certain that the Russian and Chinese governments are. As I previously reported, the Russian High Command has already concluded that Washington is preparing a nuclear first strike against Russia, and so has China.

It is extremely dangerous that two nuclear powers have this expectation. This danger has received no attention from Washington and its NATO vassals.

Microsoft president Brad Smith likened the theft of the NSA’s cyber weapon to “the US military having some of its Tomahawk missiles stolen.” In other words, with cyber weapons, as with nuclear weapons and short warning times, things can go wrong in a big way. _http://www.bbc.com/news/technology-39915440

What if the hackers had successfully attacked the Russian Ministry of Defense or radar warning systems, would the Russian High Command have concluded that the cyber attack was Washington’s prelude to incoming ICBMs?
The fact that no one in Washington or any Western government has stepped forward to reassure the Russian government and demand the removal of the US missile bases surrounding Russia indicates a level of hubris or denial that is beyond comprehension.

In my May 12 posting I wrote: “The costs of the digital revolution exceed its benefits by many times. The digital revolution rivals nuclear weapons as the most catastrophic technology of our time.” In response, Robert Henderson wrote to me from England that he had addressed the enormous costs of the digital revolution in 2010. Here is the link to his article, “Men and Machines: Which is Master Which is Slave?” _https://livinginamadhouse.wordpress.com/2010/09/08/men-and-machines-which-is-master-which-is-slave/

Reading his article will raise your awareness. When you add up the vast financial costs, the depersonalization of human relationships, and the complete loss of individual privacy and security, the benefit of being connected is vastly outweighed by the costs.

Paper files are far more secure. Malware cannot be introduced into them. To steal a person’s information required knowing the location of the information, breaking into the building, searching file cabinets for the information, and copying the information. To intercept a voice communication required a warrant to wiretap a specific telephone line.

People born into a world where the ease of communication comes at the price of the loss of autonomy never experience privacy. They are unaware that a foundation of liberty has been lost.

In our era of controlled print and TV media, the digital revolution serves for now as a check on the ruling elite’s ability to control explanations. However, the same technology that currently permits alternative explanations can be used to prevent them. Indeed, efforts to discredit and to limit non-approved explanations are already underway.

The enemies of truth have a powerful weapon in the digital revolution and can use it to herd humanity into a tyrannical dystopia. The digital revolution even has its own Memory Hole. Files stored electronically by older technology can no longer be accessed as they exist in an outdated electronic format that cannot be opened by current systems in use.

Humans are proving to be the most stupid of the life forms. They create weapons that cannot be used without destroying themselves. They create robots and free trade myths that take away their jobs. They create information technology that destroys their liberty.

Dystopias tend to be permanent. The generations born into them never know any different, and the control mechanisms are total.

And the digital screen serves as Soma.
 
Has the US become only a feeder and not a creator? Perhaps, it seems so.

We create to make something, to improve or advance something, to allow ourselves and others to see something in a different light or fashion or usefulness. Then someone else repurposes it and utilizes it in a way it was never meant to be experienced — the case throughout human history. Those who succumb to greed, power, war, murder, control have always done their worst at others’ expense. We are now noticing it more because the stakes have become higher and the ramifications much, much worse - even to a global scale.

It may mean humans who follow their talents and instincts have blinders on and, as Roberts states, are the most stupid of lifeforms. But the act of creating is the path of life. Just because there are those who choose to destroy, to abscond with a creation for nefarious purposes or to engage it as a vehicle for evil should not disqualify our original effort or intent, nor dissuade us from connecting to what makes us human.

If we all stopped creating in order to never again feed the underbelly of humanity, our lives would come to a standstill, cancelled out. Only by ongoing creation do we progress, improve, remain in the game and hopefully keep the playing field level enough to meet the next challenge.

Mr. Roberts connects dots and sounds the alarms with good intentions. His message and delivery, however, come across as black and white, and maybe this has its purpose: to remind us to be aware and vigilant in our individual and group efforts, seek protections, try hard to see things as they are, recognize the danger but never give up or give in to fear. If we don’t, we risk becoming one more generational casualty in the ongoing and progressive state of dystopia. FWIW
 
A regular person shouldn't be overly concerned about their cyber security. As long as you don't visit shady websites and download random software - you are fine.

People born into a world where the ease of communication comes at the price of the loss of autonomy never experience privacy. They are unaware that a foundation of liberty has been lost.

So true. Does Government really have to "spy" on us to find out details about our privacy? Most people that use facebook upload geotagged photos regularly and give out their privacy for free.
 
Boy, 11, hacks cyber-security audience to give lesson on 'weaponisation' of toys
https://www.theguardian.com/world/2017/may/17/boy-11-hacks-cyber-security-audience-to-give-lesson-on-weaponisation-of-toys

An 11-year-old “cyber ninja” has stunned an audience of security experts by hacking into their Bluetooth devices to manipulate a robotic teddy bear, showing in the process how interconnected smart toys “can be weaponised”.

Reuben Paul, who is in sixth grade at school in Austin, Texas, and his teddy bear Bob wowed hundreds at a cyber-security conference in the Netherlands.

“From airplanes to automobiles, from smartphones to smart homes, anything or any toy can be part of the Internet of Things (IOT),” said the small figure pacing the huge stage at the World Forum in The Hague.

“From terminators to teddy bears, anything or any toy can be weaponised.”

To demonstrate he deployed his cuddly bear, which connects to the cloud via wifi and Bluetooth to receive and transmit messages.

Plugging into his laptop a device known as a “Raspberry Pi” – a small credit-card size computer – Reuben scanned the hall for available Bluetooth devices, and to everyone’s amazement including his own, suddenly downloaded dozens of numbers, including some of top officials.

Then using a computer language called Python he hacked into his bear via one of the numbers to turn on one of its lights and record a message from the audience.

“Most internet-connected things have a Bluetooth functionality ... I basically showed how I could connect to it, and send commands to it, by recording audio and playing the light,” he told AFP later.

“IOT home appliances, things that can be used in our everyday lives, our cars, lights refrigerators, everything like this that is connected can be used and weaponised to spy on us or harm us.”

They could be used to steal private information such as passwords, as remote surveillance to spy on kids, or employ GPS to find out where a person is, he said. More chillingly, a toy could say “meet me at this location and I will pick you up”, Reuben said.

His father, information technology expert Mano Paul, told how aged about six Reuben had revealed early IT skills.

Using a simple explanation from dad on how one smartphone game worked, Reuben then figured out it was the same kind of algorithm behind the popular video game Angry Birds.

“He has always surprised us. Every moment when we teach him something he’s usually the one who ends up teaching us,” Mano Paul told AFP.

But Paul said he been “shocked” by the vulnerabilities discovered in kids’ toys, after Reuben first hacked a toy car, before moving on to more complicated things.

“It means that my kids are playing with timebombs, that over time somebody who is bad or malicious can exploit.”

Now the family has helped Reuben, who is also the youngest American to have become a Shaolin Kung Fu black belt, to set up his CyberShaolin non-profit organisation.

Its aim is “to inform kids and adults about the dangers of cyber-insecurity”, Reuben said, adding he also wants to press home the message that manufacturers, security researchers and the government have to work together.

Reuben also has ambitious plans for the future, aiming to study cyber-security at either CalTech or MIT universities and then use his skills for good.
 
GregoryHH said:
A regular person shouldn't be overly concerned about their cyber security. As long as you don't visit shady websites and download random software - you are fine.

People born into a world where the ease of communication comes at the price of the loss of autonomy never experience privacy. They are unaware that a foundation of liberty has been lost.

So true. Does Government really have to "spy" on us to find out details about our privacy? Most people that use facebook upload geotagged photos regularly and give out their privacy for free.
I think the main point Paul Craig Roberts was making was that the world at large, dominated by machines, which are poorly managed, or used nefariously, is a very insecure world for each individual (i.e. nuclear war or loss of the expectation of privacy threatens everyone: the careful PC user, the careless user or the non-user).

An old post of mine describes a relatively small, localized cyber event which affected a lot of "regular" people. The NSA claimed it was an accident. Maybe it was-- or maybe it was a trial run for more nefarious schemes on a national level one day.

NSA Disables Garage Door Openers "Accidentally"


In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn't budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410.

The mysterious garage door problem quickly became an issue for local politicians. Ultimately, the municipal government solved the riddle. Fault for the error lay with the United States' foreign intelligence service, the National Security Agency, which has offices in San Antonio. Officials at the agency were forced to admit that one of the NSA's radio antennas was broadcasting at the same frequency as the garage door openers. Embarrassed officials at the intelligence agency promised to resolve the issue as quickly as possible, and soon the doors began opening again.

It was thanks to the garage door opener episode that Texans learned just how far the NSA's work had encroached upon their daily lives.
...
(continued here: https://cassiopaea.org/forum/index.php/topic,33557.msg464488.html#msg464488)
 

Trending content

Back
Top Bottom