Military's 'sock puppet' software creates fake online identities to spread pro-American propaganda Jeff Jarvis: Washington shows the morals of a clumsy spammer Nick Fielding and Ian Cobain The Guardian, Thursday 17 March 2011 "The multiple persona contract is thought to have been awarded as part of a programme called Operation Earnest Voice (OEV), which was first developed in Iraq as a psychological warfare weapon against the online presence of al-Qaida supporters and others ranged against coalition forces. Since then, OEV is reported to have expanded into a $200m programme and is thought to have been used against jihadists across Pakistan, Afghanistan and the Middle East."
Petra Sorge, Cicero Weltbühne 15 Maj 2014: "Indeed, Edward Snowden would not have been able to escape his Russian asylum in order to go to Stockholm. However, his invitation would have been a symbol. With a little imagination the hosts could have included him anyway. The German NSA parliamentary committee is currently discussing a video interrogation. Snowden has already answered questions posed by the European Council via a live broadcast; that was also the way he chose to spoke to participants of a tech festival in Texas. Sweden could also have allowed Snowden’s confidantes to speak for him. That’s what other hosts of large computer and internet conferences have recently done. The Net Mundial in São Paulo, Brazil, chose a live broadcast with Wikileaks founder Julian Assange, hacker Jacop Appelbaum was there personally. The Chaos Communication Congress had Glenn Greenwald speaking via video. Appelbaum and Harrison spoke there too, as well as at Berlin’s re:publica."
By Jeremy Hsu, Posted 14 Mar 2014 "We should be more concerned about bullets than bytes at this time," Bumgarner says" "Hacker groups will do what they will outside of government control. But the Georgia incident and the more recent Ukrainian incident suggest that Russia has shown great restraint in its strategic use of cyber attacks, Bumgarner says."
Cognitive Design 2005 @mprove Technological Dreams & Nightmares – An Outlook To The (Near) Future Hermann Maurer, Professor at the Technical University of Graz, Director IICM & Chairman Hyperwave Inc. Memory, Plato etc ca 23 min into the video "what we really have to think about is not how we learn but whnhat we should learn" "we are on very shake grounds
Sweden will soon hold the Stockholm Internet Forum to discuss global development and global surveillance. The forum will open on 26 May and will be held in the famed Stadshuset, site of the annual Nobel banquet. The motto of the conference will be 'Internet Freedom for Global Development'.
Netnod manages i.root-servers.net, one of the 13 logical Internet DNS root name servers. i.root-servers.net was the first DNS root server to be established outside the USA. (Today there are also DNS root servers operating from Amsterdam and Tokyo.) It has changed configurations a number of times during the years from its humble beginnings as a Sun 3/60 with 4MB RAM.
By Primavera De Filippi , Wired 03.08.14 "As opposed to the other blockchain-based distributed applications described above — from messaging to contracts — Ethereum can be regarded as a kind of distributed operating system: a platform allowing for new applications to be developed upon it, so as to eventually create self-validating contracts and autonomous systems that operate directly on the blockchain."
Aftonbladet 17.5.2000: "Shirley MacLaine och Olof Palme under ett möte i Stockholm 1977 då de båda deltog i en tv-inspelning" (foto: Lennart Halvarsson)
Dan Åkerlund disputerar fredagen den 17 januari 2014 kl. 14 i Akademisalen, Academill, Strandgatan 2, Vasa. Opponent är professor Ola Erstad, Universitetet i Oslo, Norge och kustos är docent Anna Slotte-Lüttge, Åbo Akademi (jfr notis i ÖN 18.1.14)
Andreas Whittam Smith 16.12.10: comparison of of al-qaida and anonymous "it is global, it is networked and it is decentralised", but: "Anonymous seems to lack a command structure (al-Qa'ida "central", as it is known, undoubtedly does have one)" "Mr Bobbitt didn't feel the need to explain "informational", but the WikiLeaks publications of US State Department cables and the subsequent so-called cyber war show what he had in mind. Who controls information is now a central issue... Mr Bobbitt's larger point is that the terrorism of the age always closely reflects the existing constitutional arrangements."
Posted: 9 January 14 Martin Upchurch - WBC, Web-based communication - RFID armbands on workers - system for monitoring student performance (SIMS-schools information management system) - the Quantified Self movement whereby individuals constantly self-track their vital health signs - blogging about work - clicktivism
Nir Eyal 23.6.2012: “What people aren’t telling you,” Peter Thiel taught his class at Stanford, “can very often give you great insight as to where you should be directing your attention.” - "monetizable secrets" abt "user behavior", and network effects - "software continues to eat the world"