Posts Tagged ‘Wired’

Hastings-carcrash-300x166Journalist Michael Hasting’s Mercedes Benz,
suspected of being destroyed in a car hacking attack.

Wired:

Charlie Miller, left, a security researcher at Twitter,  and Chris Valasek, right, director of Vehicle Security Research at IOActive, have exposed the security vulnerabilities in automobiles by hacking into cars remotely, controlling the cars' various controls from the radio volume to the brakes. Photographed on Wednesday, July 1, 2015 in Ladue, Mo. (Photo © Whitney Curtis for WIRED.com)

Charlie Miller, left, a security researcher at Twitter, and Chris Valasek, right, director of Vehicle Security Research at IOActive, have exposed the security vulnerabilities in automobiles by hacking into cars remotely, controlling the cars’ various controls from the radio volume to the brakes. Photographed on Wednesday, July 1, 2015 in Ladue, Mo. (Photo © Whitney Curtis for WIRED.com)

Hackers Remotely Kill a Jeep on the Highway—With Me in It

11096442-large

The usual myths and all sources are from establishment politicians and their opinions, as if we hadn’t heard enough out of them–

A third party won’t fix what’s broken in American politics

They call Ralph Nader a “spoiler” for Al Gore, despite the Bush clan clearly stealing the Florida election, as if that didn’t merit any mention.

Even assuming his analysis of institutional barriers is correct, the article ignores grassroots movements at the local and state level. These can build to become national leaders over time, but no mention of local and state gains makes it into this misleading article.

Nor do the disenfranchised, the people who refuse to vote for the kakistocracy. These are the base looking for a third party, but propaganda like Vox’s serves to discourage real alternatives. They are part of the controlled manipulation of the public. They want you to believe you are powerless and that there are no alternatives to their rape and pillage. That is the narrative they sell you.

Screen-Shot-2014-04-22-at-4.45.06-PM-660x335

 

Wired covers a new “Decentralized Market” that seeks to replace Silk Road.  The implications for crime are obvious.  What do you think should be the limits of this secret black market technology?  Obviously the governments of the world will be tracking this progress closely.

Western governments are doing everything in their power to centralize control and monitor all activity that exists, anywhere, in any form.  This development is a logical response to that, but it brings with it sinister implications.

I’m not at all sure the developers care about the harm this may bring to the world.  This isn’t a neutral type of technology, but disruptive.  Its legitimate uses are not so easy to see.

 

Biometric Database of All Adult Americans Hidden in Immigration Reform

biometrics-660x880

 

Latest “Immigration Reform” bill creates biometric database of ALL AMERICANS controlled by high priests in the Department of Homeland Security (SS).

WIRED:

“Buried in the more than 800 pages of the bipartisan legislation (.pdf) is language mandating the creation of the innocuously-named “photo tool,” a massive federal database administered by the Department of Homeland Security and containing names, ages, Social Security numbers and photographs of everyone in the country with a driver’s license or other state-issued photo ID.

Employers would be obliged to look up every new hire in the database to verify that they match their photo.

…It starts to change the relationship between the citizen and state, you do have to get permission to do things,” said Chris Calabrese, a congressional lobbyist with the American Civil Liberties Union. “More fundamentally, it could be the start of keeping a record of all things.”

For now, the legislation allows the database to be used solely for employment purposes. But historically such limitations don’t last. The Social Security card, for example, was created to track your government retirement benefits. Now you need it to purchase health insurance.