Wednesday, September 3, 2014   |   6,702 users online
Contact us    |    Advertise    |   Help   RSS icon Twitter icon Facebook icon
    Home  ·  News  ·  Forum  ·  Stories  ·  Image Gallery  ·  Columns  ·  Encyclopedia  ·  Videos  ·  Chat
Find: in
Unexplained Mysteries is always on the look out for new article writers and contributors. If you've written articles, reviews, news stories or other material that you would like published for free on the site then we want to hear from you - Click here for details.
  Columnist: Peter Fotis Kapnistos

Image credit: sxc.hu

The global computer security hoax


Posted on Friday, 8 February, 2013 | 2 comments
Columnist: Peter Fotis Kapnistos


When partners of the United Nations and the U.S. Congress asked leading technology experts to estimate the standing of global computer security, the answer was unsatisfactory: There is none. No expert could guarantee 100% secrecy for online computing systems.

In fact, keeping sensitive information on a computer system with 250 well-known ports and communications endpoint protocols might not be the most prudent thing to do –– like a cake left out in the rain. Where then, should governments hide their most sensitive information? Perhaps at the bottom of a pyramid tomb. But even then, the touchy information might get uncovered after a few thousand years of excavation.

The general public is still largely uninformed about what has come to be called hacking and malware. The media constantly plays up the importance of password protection and virus detection. A money-spinning digital security industry has grown up like a Goliath. Nowadays, even to view the most trifling gossip content, you are required to "login" with your personal details. Someone wants to sell you something –– or maybe not, just watching you.

The recent appearance of "Anonymous," a group of hackers wearing Guy Fawkes masks that carries out cyber attacks on governments and large companies threatens the protection of sensitive information. WikiLeaks’ charismatic leader Julian Assange and computer hacker Gary McKinnon (accused of hacking into U.S. military and NASA systems) were all the rage. In all of his interviews, McKinnon talked about two UFO related finds.

Anonymous’ true name, it could be argued, is Admin Admin. They are the username and password that come as "factory settings" on many Internet devices. Since many users don’t ever bother to change them, they allow hackers to go into their router systems with the well-known unsigned terms.

"Google has mapped every Wi-Fi router in every residence and business in Britain, according to the Daily Telegraph. This news is a result of an investigation in Germany earlier this month that uncovered that the company had downloaded emails and other personal information.

"Using the Google Street View cars, Google explained it had intended to download what it called public information, such as MAC and SSID numbers. It has since pulled all of its Street View vehicles off the streets. But the mapping of Britain's routers has already been completed.

"Google's collection of personal data has resulted in an inquiry in Germany and a lawsuit in the U.S. state of Oregon." (Curt Hopkins, "Google Has Mapped Every Router in Britain," readwrite.com May 30, 2010)

An all-purpose word of warning is to change your password as often as possible. Compulsive password changing may become a new eccentricity that replaces compulsive hand washing of previous times.

When aunt Betty first entered personal computing, she dreamt of designing her own furniture and home interiors. But instead, she spent most of her times buying and downloading dicey malware detectors. She finally learned nothing beyond the use of simple email. When private accountant Bob bought into personal computing, he wanted to do scientific analysis and graphics. But he wasted valuable time tending to costly virus scans, and never really learned the use of digital spreadsheets or graphic animators. How true?

Most malware detectors are clever nag screens. If you ignore the firewall warning and disable the nag screen, you are held responsible. Yet, with such a robust billion-dollar global security industry, why do the leading experts say that digital computer secrecy is a myth? Because the very ideas of security and "a step into the breach" are purely human moral acts that have nothing to do with computer programs.

Today, there are millions-upon-millions of websites published on the Internet. They all require trusty Administrators that could easily step into the breach. Their very job is to switch to any user’s identity and check random emails and previous messages. Illegal, you suppose? Not so. If you observe the "privacy policy" that websites are required to have, you will see your personal information (beyond name and email address) can be known but "not shared" with others.

Okay? Like an attorney-client agreement or a doctor-patient relationship, your network Admins might know your personal secrets but they promise not to tell. Because their everyday job is to inspect suspicious text strings for spam or sneaky escape codes that could cause servers to crash. By reading this, you agree, don’t you?

Have department store rules brought down our constitutional rights of privacy? The technological contest to become Orwell’s next Big Brother has given confidence to sociopath narcissists. A once informal corporate motto "Don't be evil" is nowadays interpreted as "Do what thou wilt."

In 2011, Google Inc. agreed to pay $500 million to settle a federal investigation into the Internet search leader's distribution of online ads from Canadian pharmacies that were illegally selling prescription and non-prescription drugs to American consumers.

Google bashfully emerged as the "King of Malware." It now blocks about 9,500 websites every day (which, among other things, illegally sell prescription drugs) as part of its new "self-appointed" antiphishing and antimalware detection capabilities.

Some critics argue that blocking one’s favourite websites or own personal documents is just as malicious as stealing one’s personal information. Web blocking could serve an unfair agenda beyond merely shielding the end-user experience.

Why is the general community still so uninformed about hacking and malware? The "technological singularity" is predicted to occur when computers become more intelligent that humans. Science fiction writers have almost crazily pondered on the possibility of immortality drugs, biological organ regeneration, and nano-scale robotics that the singularity will bring in. But the first and most important phase of the technological singularity will be the winning of the global economy. None of the above-mentioned scientific breakthroughs can ever happen unless this comes first.

The technological singularity will be part of a "transhuman" or human / machine relationship, so that a human avatar will always be in close proximity to explain to us the functions and objectives of the singularity. We won’t be left in the dark. When technological computers (and not customary bankster charlatans) scientifically determine global interest rates, the singularity will initiate. Known Wall Street criminals will be locked out of the new digital economic system, much in the vein of malware blocking programs.

The old paradigm of a central power base or core authority will no longer work when dealing with the technological singularity. Instead, the idea of a group mind or "hive mentality" is splendidly serving as a business model. The policy of an organization can provisionally shift from the founder of the business on one day, to a company chauffeur on the next, depending on circumstances. The weight of academic authority can transmit from a lab professor at one time, to a field worker on another if certain conditions uphold.

"For nothing is hidden except to be made manifest; nor is anything secret except to come to light."

The new paradigm is like a watercourse that keeps changing but retains its overall impetus while intensifying. For many, the technological singularity is perhaps proof that social equality and a new-enlightened democracy (not a new feudal capitalism) will salvage the economic future of the human dream.

Article Copyright© Peter Fotis Kapnistos - reproduced with permission.



 
  Other articles by Peter Fotis Kapnistos

Owner of a lonely singularity
Columnist: Peter Fotis Kapnistos | Posted on 6-19-2014 | 0 comments
There are many theories today that focus on the so-called New World Order. It now seems to be a policy of globalists and politicians to deny the New World Order...


Jerk Saw Siege: most unholy name
Columnist: Peter Fotis Kapnistos | Posted on 9-29-2013 | 5 comments
In medieval traditions, the Black Mass was first known through parodies, called Feasts of Asses, to ridicule a custom of religious festivities with a reverse re...


The isle of Solomon's gold
Columnist: Peter Fotis Kapnistos | Posted on 9-7-2013 | 3 comments
The gold of King Solomon is perhaps the greatest lost treasure in history. A mountain of gold was supposedly taken from the fabulous mines of Solomon, who const...


Uri Geller - a psychic spy ?
Columnist: Peter Fotis Kapnistos | Posted on 7-11-2013 | 12 comments
The US government is reportedly collecting the phone records of millions of people, according to leaked information from whistle-blower Edward Snowden. It has l...


Super-strings and Homeric style
Columnist: Peter Fotis Kapnistos | Posted on 12-22-2012 | 6 comments
Homer is the author of the Iliad and the Odyssey, established in Western customs and acknowledged as the best of ancient Greek epic poets. Most historians place...


   View: More articles from this columnist ( 41 total )

 
Last updated forum topics
Forum icon 
Articles by other columnists
Fate: the good and the bad
Posted 9-2-2014 | 0 comments
Kathleen Meadows takes a look at the concept of fate.
 
How to visit ancient sites
Posted 8-28-2014 | 0 comments
Gary Evans describes his approach to visiting ancient sites.
 
The mystery of serpent worship
Posted 8-23-2014 | 0 comments
Leonard Farra looks at serpent worship throughout history.
 
The Dyatlov Pass Incident
Posted 8-17-2014 | 50 comments
A new theory explaining all the puzzling facts.
 
Disc information
Posted 8-13-2014 | 1 comment
Prototypes, probes or parapyschological ? Edward Crabtree investigates.
 
The glowing beings of Badajoz Ravine
Posted 8-8-2014 | 2 comments
What did two miners encounter in the dark ?
 
Reincarnation is a misnomer
Posted 7-29-2014 | 6 comments
Kathleen Meadows on whether or not we are born again when we die.
 
Machu Picchu's ET connection
Posted 7-25-2014 | 2 comments
Were our ancestors visited by 'sky gods' ?
 
The belief effect in psychokinesis
Posted 7-19-2014 | 31 comments
Brendan Murphy explores the mysteries of the mind.
 
New age movement linked to the Mont Order sect ?
Posted 7-14-2014 | 1 comment
Arnold Isen investigates.
 
Don't be a lazy skeptic!
Posted 7-9-2014 | 32 comments
Kathleen Meadows explores the nature of skepticism.
 
The temporal lobe gateway
Posted 7-4-2014 | 1 comment
Dan Green explores the innermost mysteries of the human mind.
 
The Newton you never knew
Posted 6-29-2014 | 0 comments
Brendan Murphy takes a closer look at the celebrated physicist.
 

 View: View more column articles
 
Top   |  Home   |   Forum   |   News   |   Image Gallery   |  Columns   |   Encyclopedia   |   Videos   |   Polls
UM-X 10.6 Unexplained-Mysteries.com © 2001-2014
Privacy Policy and Disclaimer   |   Cookies   |   Advertise   |   Contact   |   Help/FAQ