Archive for May 2017

You are browsing the archives of 2017 May.

Integrated Attack Strategy

Integrated attack strategies involve combining hacking computer systems with attack vectors such as: espionage, blackmail, medical/health attacks, asymmetric “guerrilla-style” attacks, weapons of mass destruction, and conventional kinetic military attacks. The video below shows an example using a medical vector, and an unprotected printer, to compromise patient and identity records that can be used in future […]

LUNAR – an extension of humanity

The single greatest extension of the human race so far has been the U.S. space program that culminated in reaching the Moon in 1969. The Apollo program ended in 1972. This short film is an animation of actual NASA photographs that portray the Moon landing effort.

We Grow As Our Machines Grow

Human civilization history is a record of extending human effort through external means. The means used are often called “machines”. Our machines extend our reach and amplify our effort. They make us stronger, faster, more accurate, and even smarter. We began with simple tools made from bones and rocks. We learned to use fire as […]

Awareness of Information Security

Awareness of a problem is always one of the first prerequisites to finding a solution. In everyday life, many people are grossly unaware of many threats around them. Technology always amplifies things and that happens without discrimination or moral clauses. It amplifies both good and bad. It can make our information more safe and less […]

1901 – Fermi – bio

Enrico Fermi was born in Rome, Italy in 1901 and was known as a physicist who helped to create the first nuclear reactor. He worked on the project known as “Chicago Pile-1” which created the first controlled nuclear fission reaction. Subatomic particles that follow Fermi-Dirac statistics are called “fermions” in his honor. At Los Alamos, […]

A Future Based on the Past

In order to predict what will happen in our future, we look at how we can describe our present, how we got there from the past, and then extend the trend lines we can observe into the future. One way to do that is to break out some categories of ethical concern. Ethics dictates that […]