Monday, March 19, 2018
Contact us    |    Advertise    |   Help   RSS icon Twitter icon Facebook icon
    Home  ·  News  ·  Forum  ·  Stories  ·  Image Gallery  ·  Columns  ·  Encyclopedia  ·  Videos
Find: in
Unexplained Mysteries is always on the look out for new article writers and contributors. If you've written articles, reviews, news stories or other material that you would like published for free on the site then we want to hear from you - Click here for details.
  Columnist: Peter Fotis Kapnistos

Image credit:

The global computer security hoax

Posted on Friday, 8 February, 2013 | 2 comments
Columnist: Peter Fotis Kapnistos

When partners of the United Nations and the U.S. Congress asked leading technology experts to estimate the standing of global computer security, the answer was unsatisfactory: There is none. No expert could guarantee 100% secrecy for online computing systems.

In fact, keeping sensitive information on a computer system with 250 well-known ports and communications endpoint protocols might not be the most prudent thing to do –– like a cake left out in the rain. Where then, should governments hide their most sensitive information? Perhaps at the bottom of a pyramid tomb. But even then, the touchy information might get uncovered after a few thousand years of excavation.

The general public is still largely uninformed about what has come to be called hacking and malware. The media constantly plays up the importance of password protection and virus detection. A money-spinning digital security industry has grown up like a Goliath. Nowadays, even to view the most trifling gossip content, you are required to "login" with your personal details. Someone wants to sell you something –– or maybe not, just watching you.

The recent appearance of "Anonymous," a group of hackers wearing Guy Fawkes masks that carries out cyber attacks on governments and large companies threatens the protection of sensitive information. WikiLeaks’ charismatic leader Julian Assange and computer hacker Gary McKinnon (accused of hacking into U.S. military and NASA systems) were all the rage. In all of his interviews, McKinnon talked about two UFO related finds.

Anonymous’ true name, it could be argued, is Admin Admin. They are the username and password that come as "factory settings" on many Internet devices. Since many users don’t ever bother to change them, they allow hackers to go into their router systems with the well-known unsigned terms.

"Google has mapped every Wi-Fi router in every residence and business in Britain, according to the Daily Telegraph. This news is a result of an investigation in Germany earlier this month that uncovered that the company had downloaded emails and other personal information.

"Using the Google Street View cars, Google explained it had intended to download what it called public information, such as MAC and SSID numbers. It has since pulled all of its Street View vehicles off the streets. But the mapping of Britain's routers has already been completed.

"Google's collection of personal data has resulted in an inquiry in Germany and a lawsuit in the U.S. state of Oregon." (Curt Hopkins, "Google Has Mapped Every Router in Britain," May 30, 2010)

An all-purpose word of warning is to change your password as often as possible. Compulsive password changing may become a new eccentricity that replaces compulsive hand washing of previous times.

When aunt Betty first entered personal computing, she dreamt of designing her own furniture and home interiors. But instead, she spent most of her times buying and downloading dicey malware detectors. She finally learned nothing beyond the use of simple email. When private accountant Bob bought into personal computing, he wanted to do scientific analysis and graphics. But he wasted valuable time tending to costly virus scans, and never really learned the use of digital spreadsheets or graphic animators. How true?

Most malware detectors are clever nag screens. If you ignore the firewall warning and disable the nag screen, you are held responsible. Yet, with such a robust billion-dollar global security industry, why do the leading experts say that digital computer secrecy is a myth? Because the very ideas of security and "a step into the breach" are purely human moral acts that have nothing to do with computer programs.

Today, there are millions-upon-millions of websites published on the Internet. They all require trusty Administrators that could easily step into the breach. Their very job is to switch to any user’s identity and check random emails and previous messages. Illegal, you suppose? Not so. If you observe the "privacy policy" that websites are required to have, you will see your personal information (beyond name and email address) can be known but "not shared" with others.

Okay? Like an attorney-client agreement or a doctor-patient relationship, your network Admins might know your personal secrets but they promise not to tell. Because their everyday job is to inspect suspicious text strings for spam or sneaky escape codes that could cause servers to crash. By reading this, you agree, don’t you?

Have department store rules brought down our constitutional rights of privacy? The technological contest to become Orwell’s next Big Brother has given confidence to sociopath narcissists. A once informal corporate motto "Don't be evil" is nowadays interpreted as "Do what thou wilt."

In 2011, Google Inc. agreed to pay $500 million to settle a federal investigation into the Internet search leader's distribution of online ads from Canadian pharmacies that were illegally selling prescription and non-prescription drugs to American consumers.

Google bashfully emerged as the "King of Malware." It now blocks about 9,500 websites every day (which, among other things, illegally sell prescription drugs) as part of its new "self-appointed" antiphishing and antimalware detection capabilities.

Some critics argue that blocking one’s favourite websites or own personal documents is just as malicious as stealing one’s personal information. Web blocking could serve an unfair agenda beyond merely shielding the end-user experience.

Why is the general community still so uninformed about hacking and malware? The "technological singularity" is predicted to occur when computers become more intelligent that humans. Science fiction writers have almost crazily pondered on the possibility of immortality drugs, biological organ regeneration, and nano-scale robotics that the singularity will bring in. But the first and most important phase of the technological singularity will be the winning of the global economy. None of the above-mentioned scientific breakthroughs can ever happen unless this comes first.

The technological singularity will be part of a "transhuman" or human / machine relationship, so that a human avatar will always be in close proximity to explain to us the functions and objectives of the singularity. We won’t be left in the dark. When technological computers (and not customary bankster charlatans) scientifically determine global interest rates, the singularity will initiate. Known Wall Street criminals will be locked out of the new digital economic system, much in the vein of malware blocking programs.

The old paradigm of a central power base or core authority will no longer work when dealing with the technological singularity. Instead, the idea of a group mind or "hive mentality" is splendidly serving as a business model. The policy of an organization can provisionally shift from the founder of the business on one day, to a company chauffeur on the next, depending on circumstances. The weight of academic authority can transmit from a lab professor at one time, to a field worker on another if certain conditions uphold.

"For nothing is hidden except to be made manifest; nor is anything secret except to come to light."

The new paradigm is like a watercourse that keeps changing but retains its overall impetus while intensifying. For many, the technological singularity is perhaps proof that social equality and a new-enlightened democracy (not a new feudal capitalism) will salvage the economic future of the human dream.

Article Copyright© Peter Fotis Kapnistos - reproduced with permission.

  Other articles by Peter Fotis Kapnistos

Porous Earth, hidden ocean
Columnist: Peter Fotis Kapnistos | Posted on 10-23-2014 | 1 comment
In ancient times, subterranean realms were associated with the Greek Hades, the Nordic Svartalfheim, the Christian Hell, and the Jewish Sheol. Dante Alighieri’s...

Did Hitler survive WWII ?
Columnist: Peter Fotis Kapnistos | Posted on 10-7-2014 | 3 comments
First published in 1968, “The Death of Adolf Hitler: Unknown Documents from Soviet Archives,” by journalist Lev Bezymenski was the means by which the Soviet Uni...

Aristocrat vampires
Columnist: Peter Fotis Kapnistos | Posted on 9-7-2014 | 6 comments
“They have long been famed for their love of lavish banquets and rich recipes. But what is less well known is that the British royals also had a taste for human...

Owner of a lonely singularity
Columnist: Peter Fotis Kapnistos | Posted on 6-19-2014 | 0 comments
There are many theories today that focus on the so-called New World Order. It now seems to be a policy of globalists and politicians to deny the New World Order...

Jerk Saw Siege: most unholy name
Columnist: Peter Fotis Kapnistos | Posted on 9-29-2013 | 5 comments
In medieval traditions, the Black Mass was first known through parodies, called Feasts of Asses, to ridicule a custom of religious festivities with a reverse re...

   View: More articles from this columnist ( 44 total )

Last updated forum topics
Forum icon 
Articles by other columnists
Weird winged wonders
Posted 3-8-2018
Sean Casteel takes a look at cases of strange flying creatures.
February, the month of the Hierophant
Posted 2-6-2018
Kathleen Meadows talks about love, Valentine's Day and the Hierophant.
Out of our minds: are UFOs thought-forms?
Posted 1-27-2018
Are UFOs physical or psychological in nature ?
Project Magnet 'exposed'
Posted 12-31-2017
A look at the life and work of Canadian radio engineer Wilbert Smith.
Close encounters today: a global UFO update
Posted 12-18-2017
A look at the current state of the UFO phenomenon.
Journey to the Akashic Records
Posted 12-1-2017
A detailed look at the out-of-body experiences of Wesley Meeks.
Physics, the Bible and the parting of the Red Sea
Posted 11-2-2017
Sean Casteel on Reverend Barry Downing.
The real aliens: a survey of 'praying mantis' entity reports
Posted 10-12-2017
Edward Crabtree reports.
Washingtonople: The secret history of America's capital: Part 3
Posted 9-25-2017
From 'Raising Atlantis'.
Words as symbols
Posted 9-11-2017
Kathleen Meadows explores the power of both the spoken and written word.
The treasure of the Knights Templar
Posted 8-30-2017
Did the Knights Templar have a connection to the paranormal ?
A haunted night at Stanley Hotel's Room 217
Posted 8-12-2017
Kirin Johnson checks in.
Reshaping reality while living in an alternative universe
Posted 8-3-2017
What exactly is reality ?

 View: View more column articles
Top   |  Home   |   Forum   |   News   |   Image Gallery   |  Columns   |   Encyclopedia   |   Videos   |   Polls
UM-X 10.7 © 2001-2017
Privacy Policy and Disclaimer   |   Cookies   |   Advertise   |   Contact   |   Help/FAQ