The document discusses the concept of an "infocalypse" or breakdown of the information society due to issues of data manipulation, lack of trust and security vulnerabilities. Some key points made include:
- All digital data can potentially be manipulated, hacked or destroyed as there is no absolute security. Reliance on digital systems makes critical infrastructure vulnerable.
- Several major data breaches like the Ashley Madison hack have already exposed vulnerabilities and shaken trust in systems. A worse scenario could involve widespread data destruction or manipulation leading to information warfare and infrastructure collapse.
- Solutions proposed include rebuilding some analog backup systems, limiting data collection and sharing, increasing cost transparency for "free" digital services, and reducing overreliance
4. “…certain frequencies are in fact greatly
amplified. These amplified frequencies coincide
with radio bands reserved for government use
according to the Federal Communication
Commission (FCC). Statistical evidence
suggests the use of helmets may in fact enhance
the government's invasive abilities. We
speculate that the government may in fact have
started the helmet craze for this reason’
http://web.archive.org/web/20100708230258/http://people.csail.mit.edu/rahimi/helmet/
Ali Rahimi1,
Ben Recht 2,
Jason Taylor
2, Noah
Vawter 2
17 Feb 2005
5. BUT ITS WORSE: TRUMAN SHOW DELUSION
COINED 2008 by brothers Joel and Ian Gold
'There are eyes everywhere.
No blind spot left. What
shall we dream of when everything becomes visible? We'll
dream of being blind …” - Paul Virilio
7. pri•va•cy (prīˈvə-sē)▶
n.
The quality or condition of being
secluded from the presence or view of
others.
aka: Not being filmed, registrated or
being followed
The state of being free from
unsanctioned intrusion: a person's
right to privacy.
aka: Drawing the Curtains
n.
The state of being concealed;
secrecy.
ANONYMOUS?
10.
Some people here THOUGHT they were
anonymous….
….and discovered what privacy is….
You do that, when you LOSE it!
…and SECRETS are part of human nature…sorry…
11. figures from Ashley
madison hack
Attackers: “The Impact Team"
Datadump: +25 gigabytes of company data, including user
details.
Only 12.000 of ca. 5 mill. FEMALE user accounts were real
Unfortunately 5.9 mill MALE user accounts were real…
1200 saudi men were in the database=in saudi adultery is a
death sentence offence…
One company started offering a "search engine" where people
could type email addresses of colleagues or their spouse into the
website, and if the email address was on the database leak, then
the company would send them letters threatening that their
details were to be exposed unless they paid money to the
company.
And theres more…
12. SUICIDES….
On 24 August 2015, Toronto police announced that two
unconfirmed suicides had been linked to the data breach, in
addition to "reports of hate crimes connected to the hack.”
Unconfirmed reports say a man in the U.S. died by suicide.
On 24 August 2015, a pastor and professor at the New
Orleans Baptist Theological Seminary committed suicide
citing the leak that had occurred six days before.
Users whose details were leaked are filing a $567 million
class-action lawsuit against Avid Dating Life and Avid Media,
the owners of Ashley Madison, through Canadian law firms
Charney Lawyers and Sutts, Strosberg LLP.
13. HOW THE HELL COULD IT HAPPEN?
SECURE DELETE: PROMISES WERENT KEPT!
AM made megadatabase - bad encryption…..
14. WHO ARE YOU?
Latanya Sweeney, data privacy lap, in 2000, she showed that
87 percent of all Americans could be uniquely identified using
only three bits of information: ZIP code, birthdate, and sex.
‘For almost every person on earth, there is at least one fact
about them stored in a computer database that an
adversary could use to blackmail, discriminate against,
harass, or steal the identity of him or her. I mean more than
mere embarrassment or inconvenience; I mean legally
cognizable harm’
Law professor Paul Ohm
When AOL researchers released a massive dataset of search
queries, they first "anonymized" the data by scrubbing user IDs
and IP addresses. When Netflix made a huge database of
movie recommendations available for study, it spent time doing
the same thing. Despite scrubbing the obviously identifiable
information from the data, computer scientists were able to
identify individual users in both datasets. (The Netflix team then
moved on to Twitter users.)
18. Cybercommand
CYBERWEAPONS
"USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the
operations and defense of specified Department of Defense information networks and; prepare to, and when
directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains,
ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.”
6000 employes
133 teams!
22. Digital single market
BIG DATA - Health, trade, Law Enforcement(europol), education
MEGADATABASE
SINGLE POINT OF FAILURE
23. BLUESHIRTS
Know how to:
Use iPhones
Use Facebook and Google
Use Spreadsheets/powerpoint
Knows NOTHING about:
Computers
Information Security
Privacy
24. Blueshirts
Can be very dangerous because they:
Are Executives or Politicians
Wants fast results/money
Believes what other blueshirts tell them
and hates/are bored by really skilled persons - especially in computers
and they love…..SMART!
45. INFOCAPOLYPSE IS:
Breakdown of informationsociety
No trust
Broken/manipulated data(and all digital CAN and will
be manipulated!)
Broken infrastructure
Leading to:
Information/CYBER-warfare
Leading to:
50. SCENARIO 2:
All data in privat and public databases are destroyed/copied/maniupulated.
Outside competition rips off all our data, uses it to bankrupt us
Terrorists steals all data - destroys it - destroys us
We fuck up systems and destroy data ourselves
No analog backup - infrastructure starts to collaps.
Moneysystem hacked, trust destroyed - since noone has cash anymore -
panic arises.
Citizens lose all trust in the state.
Revolt, kaos…etc…
51. Three main points:
Everything digital can be
manipulated
Everything worth hacking, will be hacked, sometime.
THERE IS NO SUCH THING AS ABSOLUTE
DATASECURITY, AND THERE NEVER WILL.
DIGITAL AND SECURE ARE
CONTRADICTIONARY TERMS
52. WHAT TO DO?Up to you, actually - You can code!
New businessmodel on the net where things cost, what their value
is=no more swapping free for surveillance!
Rebuilding of critical infrastructure keeping some analog systems
- either as a backup - or as the solution.
KILL bad IOT, get control over SCADA.
KEEP CASH!
Stop Big Data - seperate databases.
REAL COST-BENEFIT ANALYSIS OF DIGITALIZATION NOW!
ASK CITIZENS BEFORE YOU STORE DATA ABOUT THEM
STORE AS LITTLE DATA AS POSSIBLE.
GET STATES AND GOVERMENT OUT OF FACEBOOK and SOME
IN GENERAL - they will be manipulated!
53. AND
QUIT PHONE- AND BIGDATA/COMPUTER-FETISHISM
its enough, now, right?
THINK ABOUT HOW TO GET PEOPLE TO LEAVE THIER
SCREENS
NOT HOW TO MAKE THEM STAY PUT
IN FRONT OF THEM
LETS BREAK THE TRUMAN SHOW DELUSION
We can DO IT!
Together!