View allAll Photos Tagged encryption

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

They Type VIII, or Tigershark, is the Meermacht's first practical attack submarine since the dawn of the submarine warfare age in the Great War of the 1920's. The Type VII is much larger and more powerful than previous u-boat designs, but a tad slow compared to its contemporaries. This is made up for by a healthy armament as well as perhaps the world's most unbreakable cipher for radio transmissions, based on the Maian hieroglyphic script (which itself IRL took literally hundreds of years to decipher). To anyone who captures a V-boat and tries to decipher its encryption devices, I say to you, good luck.

 

Thanks to Wolfie for the hull, Nightmaresquid for the conning tower, and Brian Fitzsimmons for the bulge on the side of the hull.

 

PERKS & QUIRKS:

Gun: 88mm (+0)

Torpedoes: 14-16 (+0)

AA Guns: 2 (+0)

Speed: 18kn/9kn (+1)

Great Codes: +1

Vera Wilde, artist-in-residence at Hack42. Because Art & Science!

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.

The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

Vera's third photo-shoot, in which we get to play with some theatrical props and explore extreme opposites.

MYK-78T ("Clipper") encryption chip, installed in an AT&T TSD-3600E Telephone Security Device, an encrypting telephone from 1993.

 

The Clipper chip was the flagship component of a controversial National Security Agency-designed "key escrow" cryptography scheme, in which intercepted encrypted traffic could be decrypted easily by law enforcement or intelligence agencies for surveillance purposes. The program was extremely controversial and, in the end, not a success. Aside from the obvious fundamental problems (the security risks of having a large database of citizen's keys, the need to implement cryptography in expensive secret hardware, etc), the Clipper architecture had technical flaws that made it possible to circumvent the escrow features and preclude the possibility of law enforcement access. (See "Protocol Failure in the Escrowed Encryption Standard" [pdf format], for details.)

 

AT&T (my employer at the time) was the first (and ultimately only) company to produce a product based on the ill-fated system. The AT&T TSD-3600, announced in 1992, was a voice encryption device designed to be installed in a standard telephone (between the phone base and the handset). Calls placed to other TSD-3600-equipped telephones could be automatically digitized and encrypted, making eavesdropping on the conversation (by legal or illegal means) effectively infeasible. When the US government learned of AT&T's plans to market the device, it worried that criminals might used them to thwart wiretaps. Plans for a new encryption system with a wiretap backdoor were hurriedly drawn up by the NSA, and AT&T was persuaded to replace the regular (non-escrowed) DES-based encryption scheme in the original TSD product with the new system, called the Clipper chip. The Clipper-based model TSD-3600E hit the market in 1993. As incentive for AT&T's cooperation, the government agreed to purchase a significant quantity of Clipper-equipped TSD-3600Es, which sold for over $1000 each in quantity.

 

Hobbled by the controversial key escrow features and the high retail price, the government ended up being the TSD's only major customer, and even most of the units they bought sat unopened in storage for over ten years. AT&T, for its part, eventually sold off the division that produced the product.

 

I'm aware of five different TSD-3600 models produced between 1992 and the product's cancellation, differing in the cipher algorithm used. The TSD-3600D was the original, using standard DES with a 56 bit key. (These were quickly recalled and disappeared from the market after Clipper was announced). The 3600F was an exportable model that used a proprietary 40 bit cipher that, I was told, was "embarassingly" weak even given the short key. The 3600P used a proprietary 56 bit cipher similar to DES (but not inter-operable with the 3600D). The 3600E was the first controversial key escrowed model, with the then-classified Skipjack cipher and key escrow features implemented on a tamper-resistant MYK-78T Clipper chip. A later model, the 3600S, included a Clipper chip but would also downgrade (or upgrade, depending on your opinion of key escrow) to the F or P ciphers when communicating with those models. All five models use a Diffie-Hellman key exchange (768 bit, if I recall correctly) to establish a session key, a 4 character hash of which is displayed on each unit's LCD. To detect "man-in-the-middle" attacks, users could verify (by voice) that their displayed hashes matched.

 

This pictures shows the 1/2 inch square MYK-78T Clipper encryption chip, as installed on the TSD-3600E main circuit board.

 

Nikkor AM-120mm/5.6, Sinar P, BetterLight Super 6K-HS. Full resolution (6000x8000) version available.

 

Disclaimer: No emulsions were harmed in the making of this image.

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

Icon of Plugin in Mozilla Firefox

 

StormFish is a Plugin for Mozilla Firefox.

This work had the support of Afonso França for developing of graphical ideia.

FISH name derives from an encryption algorithm algoritm named "blowfish".

*Not yet avaible on the market .In the process of Beta Testing

   

StormFish é um Plugin para Mozilla Firefox.

Neste trabalho tive a colaboração de Afonso França para desenvolvimento da ideia gráfica.

O nome FISH deriva de um algoritmo de criptografia nomeada "BlowFish".

*Ainda não disponível no mercado. Em fase de Beta Teste.

 

mais detalhes www.behance.net/gallery/StormFish/648618

BETRAYED BY A Crossword Puzzle, Ninnies, and the BBC :::: 73 Years Ago in Canadian History!!

 

Well-trained fighting men.

CHECK.

 

Newest and the best contemporary military technology on land, sea, or in the air (above - Canadian Churchill Tank captured by Nazis).

CHECK.

 

Eager, fearless, and courageous Canadians, British, and American Infantry.

CHECK.

 

Hasty, cavalier plan of attack with unrealistic objectives (capture the port and hold it for two tides, gather intelligence from prisoners and captured material, lure the Luftwaffe into open battle, and steal German encryption equipment for Allied code-breakers) .

CHECK.

 

Imminent disaster for all involved.

CHECK. CHECK.

  

AUGUST 19, 1942…all of Europe was under Nazi domination.

 

Ignoring that sobering point that should have been reflected upon…the Raid on the French coastal town of Dieppe began in earnest, at 5am…as 6,000 men storm the six beaches of Dieppe.

 

While Churchill and Admiral Mountbatten presumptuously oversaw and authorized the raid, months before General Montgomery had been firmly against raiding the French sea port, or any French sea port. He predicted disaster. However, and unfortunately for Canada, Montgomery was now in North Africa heading up the desert campaign…so cooler heads would not prevail in this August of '42, as the Canadian government and the Chiefs of Staff concurred with Churchill and Mountbatten to authorize the suicidal raid that consisted mostly of Canadians.

 

Since June, months before the ill-fated raid, the BBC had been warning the occupied French coastal towns to evacuate because war was coming to the neighbourhood. Typical misguided leftist sympathies. And what was the actual effect of these dire BBC radio warnings? Did the French citizens leave?

 

Nope.

 

But the Germans listened and dug in even deeper and reinforced the entire French coast against such an attack!

 

Good one, BBC!

 

Air recon units of the Nazi Luftwaffe confirmed a build up of Allied military activity along the Southern English coast, while simultaneously French double-agents warned of a British interest in Dieppe.

 

And to add a final stupidity to the mix, those emasculated Canadian and British military personnel ninnies that planned the Dieppe Raid felt they should play nice, avoid civilian losses, and not anger the traitorous collaborating Vichy government by letting the beach area reap the whirlwind.

 

So the trusting Canadians were expected to make a full frontal assault on those fortified beaches of Dieppe without prior air and naval bombardment of the port city's defences!

 

Huh?

 

THAT was never done before. Ever.

 

You always bomb the hell out of the landing arena.

 

How do you spell die, as one of the Canadian soldiers from the 2nd Canadian Infantry noted while enroute to his demise at Dieppe?

 

"Why look the first three letters of Dieppe are D-I-E …" he noted ominously.

 

Two days before the raid, on August 17, former footballer turned high school teacher, Leonard Dawe compiled the Daily Telegraph crossword with the clue "French port". The answer appeared in the English newspaper the following day. The answer was Dieppe!

 

Was Dawe passing intelligence on to the enemy?

 

The War Office called up the Scot, Lord Tweedsmuir, who was then assisting the Canadian Army as a senior intelligence officer. Dawe needed to be investigated. Tweedsmuir called upon MI5, the counter-intelligence and security agency of Great Britain.

 

After an immediate and intense inquiry of Dawe, at his home, it was determined the crossword containing the solution, was a complete fluke, a MERE coincidence!

 

Dawe was cleared of any suspicion.

 

Fast forward to 1944, one month before D-Day. Another crossword coincidence authored by Dawe appears in the Telegraph. This time there are multiple references to Operation Overlord, or D-Day, the Allied invasion of North Eastern Europe. Heck, even Overlord appeared in the crossword on May 27! Previous Dawe crosswords had contained, Juno, Gold, Sword and Omaha which were all code names for beaches assigned to various Allied forces. Juno was the beach assigned to the Canadian attack force. This was too much. MI5 was again called in to investigate the crossword compiler, Dawe.

 

In the end it is again concluded that relevant invasion terms that appear in Dawe's Telegraph crossword were an explainable coincidence.

 

However, the general public didn't find out the "rest of the story" until 1958 when Dawe appeared in a BBC TV interview. At the time, during the war, Dawe would encourage his school kids to come into his study and help him fill in the blank crossword puzzles. They provided the solution word. Then Dawe would create the clues for their chosen words.

 

In the end, the British teenagers were getting the code words from Canadian and American soldiers who were billeted close to Dawe's school!

 

Mystery solved. Now, back to the raid.

 

When the Dieppe Raid was over at 10:50 am that morning, 3,367 Canadians were dead, wounded or captured! The Canadians had landed on the beach only to be pinned down, and trapped on that beach by the high sea wall and the German machine guns.

 

The British suffered 934 dead, wounded, or captured.

 

The Germans were unimpressed with the raid.

 

General Conrad Haase described the Dieppe Raid as "incomprehensible". How could a single division be expected to overrun a German regiment that was heavily fortified in its surroundings and supported in that position by heavy artillery.

 

The Churchill tanks although a new and fresh British design were "easy to fight", "poor and obsolete".

 

German Field Marshall Von Rundstedt noted the Allies would not have another Dieppe because "it has gained that experience dearly."

 

…and notably, from Wikipedia,

 

ALLIED ANAYSIS of the DIEPPE RAIDTHE LESSONS LEARNED AT DIEPPE essentially became the textbook of “what not to do” in future amphibious operations, and laid the framework for the Normandy landings two years later.

 

Most notably, Dieppe highlighted:

 

1. the need for preliminary artillery support, including aerial bombardment;

 

2. the need for a sustained element of surprise;

 

3. the need for proper intelligence concerning enemy fortifications;

 

4. the avoidance of a direct frontal attack on a defended port city; and,

 

5. the need for proper re-embarkation craft.

 

As a consequence of the lessons learned at Dieppe, the British developed a whole range of specialist armoured vehicles which allowed their engineers to perform many of their tasks protected by armour, most famously Hobart's Funnies. The operation showed major deficiencies in RAF ground support techniques, and this led to the creation of a fully integrated Tactical Air Force to support major ground offensives.

 

Another effect of the raid was change in the Allies' previously held belief that seizure of a major port would be essential in the creation of a second front. Their revised view was that the amount of damage that would be done to a port by the necessary bombardment to take it, would almost certainly render it useless as a port afterwards. As a result, the decision was taken to construct prefabricated harbours, codenamed "Mulberry", and tow them to lightly defended beaches as part of a large-scale invasion.

 

(FAMOUS DIEPPE photos tinted, cropped, enhanced by me)

 

A World War 2 German Enigma machine on display in the Jersey War Tunnels (formerly known as the Underground Hospital), Jersey.

 

Although the small amount of text near the display isn't specific, I have exchanged correspondence with the world's leading authority on Enigma machines, Prof Tom Perrera, who has confirmed that it's an authentic original machine. It's in very good condition and - like the rest of the Museum - well worth a look.

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting. The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

I was asked to shoot a couple of photos of Vera. We connected really well and it turned into a two hour photo-shoot in which we had great fun driving around the hackerspace and Buitenplaats Koningsweg compound looking for shooting locations during golden hour.

Vera Wilde, artist-in-residence at Hack42. Because Art & Science!

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.

The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

This is our second photo-shoot together. We have great chemistry and it's loads of fun to shoot with her.

We got to play with a few props, listen to some music and experiment with light and posing.

Image is available for licensing, please contact me.

70 Years Old this week. A picture of the tape drive for the Colossus rebuild at Bletchley Park (National Museum of Computing). Note the 5 bits.

Why? Because I can now use it with WinAmp!! (via ml_ipod) Before only FW1.x could be used with ml_ipod as Apple did some encryption trickery on the FW2.x iPod Touch/iPhone. It has been broken finally and my unit has been liberated from iTunes!! I'm so happy.

 

I was just using it to read email and surf the web -- now I can finally listen to music on it again. The cover art you see there was loaded via WinAmp.

 

Finally all three of my iPods can live in harmony, sharing playcounts, ratings and my top rated music!

 

I tried iTunes and it was OK -- but it's so inflexible compared to WinAmp. Specifically you cannot sync ratings and playcounts back to your computer from the iPod if you manage your music manually!! I have to do this as my library is about 130gigs -- much bigger than my iPods. If I like a song, I rate it on the iPod and that rating needs to go back to my PC. With iTunes, not possible. With Winamp, works perfectly!

Vera Wilde, artist-in-residence at Hack42. Because Art & Science!

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.

The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

Vera's third photo-shoot, in which we get to play with some theatrical props and explore extreme opposites.

I wanted a high res image of the NYC subway map for my iPad. This is a direct extraction from their PDF on the MTA site. It was difficult to do becuase their PDF has encryption on it.

Normal daily life along a different timeline - which we cannot find - but have the feeling that it exists - but

 

Certainly!

 

Quantum computing represents a groundbreaking advancement in technology, deeply intertwined with the concepts of superposition, entanglement, and interference from quantum physics. Unlike classical computing, which processes information in a linear fashion using bits (0s and 1s), quantum computing utilizes quantum bits or qubits that can exist in multiple states simultaneously. This enables quantum computers to perform numerous calculations at once, effectively navigating through a vast landscape of potential solutions.

 

The idea of parallel timelines can be likened to the way quantum computers operate. Each decision or computation can be viewed as branching into multiple outcomes, similar to how different timelines might unfold based on various choices. This means that a quantum computer can explore various paths to a solution simultaneously, leading to remarkable efficiencies in solving complex problems.

 

In practical terms, this capability could revolutionize fields such as cryptography, where quantum computers may break existing encryption methods faster than classical computers. In material science, they could simulate quantum phenomena to discover new materials with desirable properties. Additionally, in optimization problems across various industries, quantum computing offers the potential to find the most efficient solutions more rapidly than traditional methods.

 

In summary, the link between quantum computing and the concept of parallel timelines highlights a fascinating intersection of technology and theoretical physics, suggesting that our understanding of reality may be more complex and interconnected than we previously imagined.

Hackerspace Hack42 is proudly housing and hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting. The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

I was asked to shoot a couple of photos of Vera. We connected really well and it turned into a two hour photo-shoot in which we had great fun driving around the hackerspace and Buitenplaats Koningsweg compound looking for shooting locations during golden hour.

German WWII Enigma encryption machine

Russia’s accession to the WTO cleared a major hurdle when the WTO Working Party on its accession approved, ad referendum on 10 November 2011, the package spelling out Russia’s terms of entry to the organization. The Working Party will now send its accession recommendation to the 15 —17 December Ministerial Conference, where Ministers are expected to approve the documents and accept Russia as a WTO Member.

 

On 10 November 2011, the Working Party on Russia’s accession, chaired by Ambassador Stefán Jóhannesson (Iceland), agreed, ad referendum, on the terms of the country’s membership to the WTO by adopting the package containing reforms to Russia’s trade regime, and the commitments that Russia undertook to implement as part of its WTO accession.

 

“It has been a long journey, but today Russia has taken a big step towards its destination of membership in the WTO. In acceding to the WTO, Russia embraces a series of rules and commitments that are the foundation of an open, transparent and non-discriminatory global trading system. This system provides important guarantees for Russia and for the 153 other Members of our organization. This win-win result will bring Russia more firmly into the global economy and make it a more attractive place to do business. For the WTO, it comes as a most welcome deliverable for the upcoming WTO Ministerial Conference and signals anew the relevance and vibrancy of the WTO as an instrument for international co-operation,” said Director-General Pascal Lamy.

 

“It is gratifying to see that after 18 years of sometimes uneasy negotiations the process of WTO accession is completed today. The agreement as negotiated brings us into the system of multilateral trading rules, creating new opportunities for our traders and investors and enabling us to protect their commercial interests even more effectively than before,” said Maxim Medvedkov, chief negotiator for the Russian Federation.

 

“The completion of this Working Party’s activity represents an historic achievement for the WTO. I am convinced that Russia’s accession to the WTO will bring substantial benefits both to Russia and to the Members of this organization. In these difficult economic times, this represents good news and I have no doubt that Russia joining our WTO family will strengthen the multilateral trading system and enhance global economic cooperation,” said Working Party Chairman Ambassador Jóhannesson.

   

Information about the

Russian Federation’s WTO commitments

 

As part of the accession accord, Russia has agreed to undertake a series of important commitments to further open its trade regime and accelerate its integration in the world economy. The deal offers a transparent and predictable environment for trade and foreign investment.

 

From the date of accession, the Russian Federation has committed to fully apply all WTO provisions, with recourse to very few transitional periods (see details below). The Russian Federation’s commitments will include the following:

   

Market access for goods and services

 

As part of the accession, Russia concluded 30 bilateral agreements on market access for services and 57 on market access for goods.

 

Market access for goods — tariff and quota commitments

 

On average, the final legally binding tariff ceiling for the Russian Federation will be 7.8% compared with a 20111 average of 10% for all products2:

 

The average tariff ceiling for agriculture products will be 10.8%, lower than the current average of 13.2%

The ceiling average for manufactured goods will be 7.3% vs. the 9.5% average today on manufactured imports.

  

Russia has agreed to lower its tariffs on a wide range of products. Average duties after full implementation of tariff reductions will be:

 

14.9% for dairy products (current applied tariff 19.8%)

10.0% for cereals (current applied tariff 15.1%)

7.1% for oilseeds, fats and oils (current applied tariff 9.0%)

5.2% for chemicals (current applied tariff 6.5%)

12.0% for automobiles (current applied tariff 15.5%)

6.2% for electrical machinery (current applied tariff 8.4%)

8.0% for wood and paper (current applied tariff 13.4%)

Final tariffs will be bound at zero for cotton and information technology (ITA) products (current applied tariff on ITA products is 5.4%).

 

The final bound rate will be implemented on the date of accession for more than one third of national tariff lines with another quarter of the tariff cuts to be put in place three years later. The longest implementation period is 8 years for pork, followed by 7 years for motor cars, helicopters and civil aircraft.

 

Tariff rate quotas (TRQs) would be applied to beef, pork, poultry and some whey products. Imports entering the market within the quota will face lower tariffs while higher duties will be applied to products imported outside the quota.

 

The in-quota and out of quota rates are listed below with the out of quota rates in parentheses:

 

For beef 15% (and 55%)

For pork zero (and 65%). The TRQ for pork will be replaced by a flat top rate of 25% as of 1 January 2020.

25% (and 80%) for some selected poultry products

10% (and 15%) for some whey products

Some of these quotas are also subject to member-specific allocations

  

Market access for services

 

The Russian Federation has made specific commitments on 11 services sectors and on 116 sub-sectors.

 

On telecommunications, the foreign equity limitation (49%) would be eliminated four years after accession. The Russian Federation also agreed to apply the terms of the WTO’s Basic Telecommunications Agreement.

 

Foreign insurance companies would be allowed to establish branches nine years after Russia accedes.

 

Foreign banks would be allowed to establish subsidiaries. There would be no cap on foreign equity in individual banking institutions, but the overall foreign capital participation in the banking system of the Russian Federation would be limited to 50% (not including foreign capital invested in potentially privatized banks).

 

On transport services, the Russian Federation made commitments in maritime and road transport services, including the actual transportation of freight and passengers.

 

On distribution services, Russia would allow 100% foreign-owned companies to engage in wholesale, retail and franchise sectors upon accession to the WTO.

   

Export duties

 

Export duties would be fixed for over 700 tariff lines, including certain products in the sectors of fish and crustaceans, mineral fuels and oils, raw hides and skins, wood, pulp and paper and base metals.

   

General commitments on market access

 

Quantitative restrictions on imports, such as quotas, bans, permits, prior authorization requirements, licensing requirements or other requirements or restrictions that could not be justified under the WTO provisions would be eliminated and not (re) introduced.

 

Railway transportation charges on goods in transit would, by 1 July 2013, be applied in a manner which conforms with the WTO provisions. The Russian Federation would apply the same rail transportation charges to imported products as they do to similar products moving between domestic locations. Regulated railway tariffs for transit of goods would be published before their entry into force.

 

From the date of accession, importers of alcohol, pharmaceuticals and some products with encryption technology would not need import licences.

 

Upon accession, the Russian Federation would apply the Custom Union Generalised System of Preferences scheme (CU GSP) for developing and least-developed countries. 152 developing countries and least-developed countries benefit from the CU GSP.

Under this scheme, the import duties applicable to products eligible for tariff preferences and originating from developing countries were at the level of 75% of the MFN duty rates and from least-developed countries at the level of 0%.

 

The Russian Federation would reform its tariff regime for sugar in 2012, with a view to further liberalisation.

 

By the date of accession, any tariff exemption for space equipment would be provided on a Most Favoured Nation basis.

 

No licences would be required for imports of more than a dozen encryption technology products (the list includes electronic digital signature devices, personal smart-cards or wireless radio equipment). For those products, any existing import restrictions would be eliminated. No new restrictions, including experts’ evaluations, approvals, and licences, would be adopted or applied. For those encryption technology related products needing an import licence, expert evaluation and approval would only be needed once.

 

Products including alcohol, wood and meat would be subject to measures requiring their declaration and/or entry at designated customs checkpoints. Any measures contrary to the WTO Agreement would be eliminated as of the date of accession. The Russian Federation would not apply country-specific customs procedures.

 

The Russian Federation would apply all its laws, regulations and other measures governing transit of goods (including energy) in conformity with GATT and WTO provisions. From accession, all laws and regulations regarding the application and the level of charges and customs fees imposed in connection with transit would be published.

 

The Russian Federation would review market access requirements for the establishment of direct branches of foreign banks and securities firms in the context of future negotiations on the accession of the Russian Federation to the OECD or within the framework of the next round of WTO multilateral trade negotiations.

 

In its participation in preferential trade agreements, Russia would observe the provisions of the WTO Agreement without any differentiating between those agreements already in effect upon accession and those which would come into effect in the future.

Government Procurement Agreement

 

The Russian Federation intends to join the WTO Government Procurement Agreement (GPA) and would notify this intention to the WTO Government Procurement Committee at the time of accession. Russia would become an observer to the GPA and would initiate negotiations for membership within four years of its accession. Russian government agencies would, upon accession, award contracts in a transparent manner.

   

Industrial and agricultural subsidies

 

Industrial subsidies

 

The Russian Federation would eliminate all its industrial subsidies programmes or modify them so that any subsidy provided would not be contingent upon exportation or upon the use of domestic over imported goods. The Russian Federation would notify its subsidies to the WTO and would not invoke any of the provisions of Articles 27 and 28 of the WTO Agreement on Subsidies and Countervailing Measures.

 

Agricultural subsidies

 

The total trade distorting agricultural support would not exceed USD 9 billion in 2012 and would be gradually reduced to USD 4.4 billion by 2018.

 

To avoid excessive concentration of support on individual products, from the date of accession to 31 December 2017, the annual agricultural support going to specific products would not exceed 30% of the agriculture support that is not for specific products.

 

All agricultural export subsidies will be bound at zero.

 

The VAT exemption applied to certain domestic agricultural products would be eliminated upon accession.

   

Pricing of energy

 

Producers and distributors of natural gas in the Russian Federation would operate on the basis of normal commercial considerations, based on recovery of costs and profit.

 

The Russian Federation would continue to regulate price supplies to households and other non-commercial users, based on domestic social policy considerations.

   

Sanitary and phytosanitary measures (SPS) and technical barriers to trade (TBT)

 

All SPS measures would be developed and applied in the Russian Federation and the Custom Union, in accordance with the WTO Agreement.

 

The Russian Federation would ensure that all legislation related to technical regulations, standards and conformity assessment procedures complies with the WTO TBT Agreement.

 

The Russian Federation would develop and apply international standards on SPS measures through membership and active participation in the Codex Alimentarius, the World Organization for Animal Health (OIE) and the International Plant Protection Convention.

 

The reasons for suspension, cancellation, or refusal of an import permit would be consistent with international standards, recommendations, and guidelines as well as the WTO SPS Agreement.

 

The Russian Federation would negotiate veterinary export certificates that include requirements different from those of the Custom Union if an exporting country made a substantiated request prior to 1 January 2013 to negotiate such a certificate.

 

Except in case of serious risks of animal or human health, Rosselkhoznadzor, the Federal Service for Veterinary and Phytosanitary Surveillance, would not suspend imports from establishments based on the results of on-site inspection before it had given the exporting country the opportunity to propose corrective measures. Rosselkhoznadzor would send a preliminary report to the competent authority of the exporting country for comments.

 

The Russian Federation would use international standards for the development of technical regulations unless they were an ineffective or inappropriate means for achieving the pursued objectives.

 

By the end of 2015, mandatory requirements for telecommunication equipment used in public networks would be limited to the requirements contained in technical regulations adopted consistently with the Eurasian Economic Community and Custom Union agreements.

 

The Russian Federation would regularly review its lists of products subject to obligatory certification or declaration of conformity, as well as all the technical regulations applied on its territory (Custom Union and Eurasian Economic Community included) to ensure that they remained necessary to achieve the Federation’s objective, in accordance with the WTO TBT Agreement.

 

Certified accreditation bodies would be replaced by a single national accreditation body no later than 30 June 2012. The name and other information regarding this body would be published on the Rosstandart website and the website of the Custom Union Commission.

   

Trade-related investment measures

 

The Russian Federation would ensure that all laws, regulations and other measures related to the Agreement on Trade-Related Investment Measures would be consistent with the WTO provisions.

 

All WTO-inconsistent investment measures, including preferential tariffs or tariff exemptions, applied in relation to the existing automobile investment programmes and any agreements concluded under them would be eliminated by 1 July 2018. No other trade related investment measures inconsistent with the WTO Agreement may be applied after Russia’s accession to the WTO.

   

Protection of trade-related intellectual property

 

The Russian Federation would fully apply the provisions of the WTO Agreement on Trade-related Aspects of Intellectual Property Rights including provisions for enforcement, without recourse to any transitional period.

 

The Russian government would continue to take actions against the operation of websites (with servers located in the Russian Federation) that promote illegal distribution of content protected by copyright or related rights.

 

The Russian Federation would investigate and prosecute companies that illegally distribute objects of copyright or related rights on the Internet.

 

By the time of its accession, the Russian Federation would apply all rules of the Berne Convention for the Protection of Literary and Artistic Works.

   

Transparency

 

The provisions of the WTO Agreement would be applied uniformly throughout the Russian Federation territory, including in regions engaging in frontier traffic, special economic zones and other areas where special regimes for tariffs, taxes and regulations could be established.

 

All legislation affecting trade in goods, services and intellectual property rights would be published promptly, consistent with WTO requirements. The Russian Federation would regularly update its official publications including websites and make these laws readily available to WTO members, individuals and enterprises.

 

To improve access to official publications, the Russian Federation would establish an enquiry point providing assistance to members and all other stakeholders.

 

In particular, the Russian Federation would publish all legislation, affecting trade in goods, services, or intellectual property rights, prior to their adoption and would provide a reasonable period of time, no less than 30 days, for members to comment, except for emergency cases, national security, monetary policy, measures whose publication would impede law enforcement, be contrary to the public interest, or prejudice the commercial interest of particular public or private enterprises. No legislation affecting trade in goods, services or intellectual property rights would become effective prior to publication.

 

The Russian Federation would provide annual reports to WTO members on developments in its on-going privatization programme for as long as it would be in existence.

 

Lists of goods and services subject to state price controls would be published in the Rossiiyskaya Gazeta from the date of accession. Russia would apply price controls on certain products and services, including natural gas, raw diamonds, vodka, water supply services, gas transportation services, baby food, medical goods, public transport services and railway transportation services. Price control measures would not be used for purposes of protecting domestic products, or services provided.

   

Functioning of the Custom Union between Russia, Kazakhstan and Belarus

 

The Custom Union between Russia, Kazakhstan and Belarus was created on 1 January 2010. All customs borders were removed between the three countries on 1 July 2011.

 

From 1 January 2012, the three states would have a single economic space.

 

The Russian Federation would publish any Custom Union legislation before adoption and would provide a reasonable period of time for WTO members and all stakeholders to comment to the competent Custom Union Body.

   

Next steps

 

Members agreed to directly forward Russia’s accession package to the 8th Ministerial Conference for adoption by Ministers on 15-17 December 2011.

 

Russia should ratify its accession package within 220 days as of the Ministerial decision (until about 22 July 2012).

 

Thirty days after the notification to the WTO of the ratification, the Russian Federation will become a fully-fledged member.

   

Background information on

the Russian Federation accession process

 

The Russian Federation applied to the WTO in June 1993.

The Working Party was created on 16-17 June 1993.

The first meeting of the Working Party took place in July 1995.

The Working Party has met formally 31 times since 1995. Numerous informal meetings also took place.

Three ambassadors chaired the Working Party: Ambassador William Rossier (Switzerland) from 1995 to 2000, Ambassador Kare Bryn (Norway) from 2000 to 2003 and Ambassador Stefán Jóhannesson (Iceland) from 2003 to 2011.

 

General statistical information about the Russian Federation

(Sources: WTO statistics and World Bank)

 

Basic indicators

 

Population (thousands, 2010): 141 750

GDP (million current US$, 2010): 1 479 819

Current account balance (million US$, 2010): 71 129

Trade per capita (US$, 2008-2010): 5 279

Trade to GDP ratio (2008-2010): 51.5

Life expectancy at birth, total (years): 69 (2009)

Poverty headcount ratio at national poverty line (% of population): 11.1% (2006)

Unemployment, total (% of total labour force): 8.2% (2009)

CO2 emissions (metric tons per capita): 10.8 (2007)

Rank in world trade (2010)

 

Merchandise: 12 (exports) and 18 (imports)

Commercial services: 23 (exports) and 16 (imports)

Merchandise trade (2010)

 

Merchandise exports, f.o.b. (million US$): 400 132

Merchandise imports, f.o.b. (million US$): 248 738

Main destination of exports: European Union (52.2%), Ukraine (5.8%), Turkey (5.1%), China (5.1%) and Belarus (4.5%)

Main origin of imports: European Union (38.3%), China (15.7%), Ukraine (5.6%), United States (4.5%) and Japan (4.1%)

Principal goods traded (exports and imports): agriculture, fuels and mining products, manufactured products

Share in world total exports: 2.63%

Share in world total imports: 1.61%

Commercial services trade (2010)

 

Commercial services exports (million US$): 43 961

Commercial services imports (million US$): 70 223

Principle services traded (exports and imports): Transportation and travel

Share in world total exports: 1.19%

Share in world total imports: 2%

  

Linux TCP flaw lets 'anyone' hijack Internet traffic0

SYSTEM ERROR

 

FOLLOWING MESSAGE IS CORRUPT

 

//rd. SYSTEM WIDE CHANNEL

//Encryption value #967J6_K8__46R-657H34S

M_ssage re_ds:

 

//D_spa_ch: ________ division, now designa_ed HITTEAM has l_ft the ISLAND. All units battle ready ACTIVE IMMEDI_TE_Y

 

ERROR...DATA VALUES MISSING

 

//: Precautions activat_d, ISLAND is sealed.

//HITTEAM We are on th_ m_ve. Land now designa_ed CROSSBOW. Air now designated SLINGSHOT. All un_ts provide code w_rd autho_iz_tion.

//CROSSBOW Kingfisher.

//SLINGSHOT Ferris Wheel.

 

//: Cod_s Acc_pted. Defense divis_ons report code w_rd.

 

//Def_nce: Ember.

 

// Acc_pted. Operation P_rad_se will procc_ed.

   

Borders are lines on paper.

 

[1][2][3][4]

Star Trek, First Contact (Paramount, 1996).

youtu.be/wxyZQR2d6yw Trailer

 

youtu.be/GTQzusrfCxc?t=3s

Star Trek - 'Beyond First Contact' The Borg - Making The Movie.

 

Starring Patrick Stewart, Jonathan Frakes, Brent Spiner, LeVar Burton, Michael Dorn, Gates McFadden, Marina Sirtis, Alfre Woodard, James Cromwell, Alice Krige, Neal McDonough, Robert Picardo, and Dwight Schultz. Directed by Jonathan Frakes.

 

Captain Jean-Luc Picard awakens from a nightmare about his Borg assimilation experience to an incoming message from Admiral Hayes. Hayes informs Picard that Deep Space Five reported that a colony has been destroyed. Completing the Admiral's sentence, Picard realizes who destroyed the colony — the Borg.

 

Picard calls a meeting and informs his senior officers that their ship has been instructed to patrol the Neutral Zone. Their orders are to protect the area from any possible Romulan uprising during a Borg attack. Despite protests from his officers, Picard remains faithful to his orders and the U.S.S. Enterprise NCC 1701-E begins to patrol the area. Later, Picard regretfully tells Riker that it is his own fault they are stuck in the Neutral Zone. Starfleet believes Picard to be too emotionally involved with the Borg because of his previous assimilation to tactically complete a mission against them.

 

The men return to the bridge to learn that Starfleet has engaged in combat with the Borg. Intercepting messages between the starships, the crew learns that the Federation is losing. Picard, with his Borg experience, knows he can help the fleet. He informs his staff that he will make a decision directly in opposition to Starfleet commands. With no objections from his crew, Captain Picard gives the order and the starship Enterprise sets a course for Earth and the attacking Borg cube.

 

A massive battle ensues and it appears that the Federation will lose the fight. Despite serious structural damage to the Borg cube, their strength does not weaken. Even the U.S.S. Defiant, commanded by Worf, does not appear to be able to turn the tides of the battle. As the starship Defiant is about to ram the Borg ship on a suicide run, the U.S.S. Enterprise beams aboard its crew, including Worf. Picard, having an inside perspective of the Borg and their vessel, focuses the firepower of the fleet on coordinates he knows to be critical. Just as the main ship is destroyed, a spherical escape pod flies out. The sphere creates a temporal vortex, catching the starship Enterprise in its wake. Immune to the paradoxes created by the time travel, the starship's crew learns that Earth at the present time appears to be inhabited entirely by the Borg. The commanding officers realize that the Borg have gone into the past and assimilated Earth, so they follow them back in time to repair the damage the Borg have done.

 

On Earth, over three centuries earlier, a somber Lily Sloane accompanies a stumbling, drunk Zefram Cochrane out of a bar after a night of revelry. Then, Lily notices a fast moving light. She hardly has time to ask what the object is, when the Borg vessel attacks. Back aboard the Enterprise, Picard demands that Data tell him the exact date and location the Borg ship is attacking. The location: central Montana. The date: April 4, 2063 — the day before First Contact. Realizing that the Borg have come to prevent first contact between alien life forms and humans, the crew knows they must stop the Borg and facilitate this exchange. They destroy the Borg sphere, and Dr. Crusher, Captain Picard, Commander Data, Commander Riker, Counselor Troi and other U.S.S. Enterprise crew transport down to Earth to survey the damage.

 

At the Borg attack site in Montana, the crew finds destruction and chaos. They split into groups to search for Cochrane. Data and Picard hunt for Cochrane's warp ship, the Phoenix. There they encounter a very angry and confused Lily, who believes Data and Picard to be members of a coalition that broke the cease-fire after World War III. She shoots at them in a rage, but impervious to bullets, Data approaches Lily. Overcome by fear and radiation, she falls to the ground. Dr. Crusher diagnoses Lily with radiation sickness caused by the damaged Phoenix, and inoculates the entire crew. Against Picard's better judgment, Crusher takes Lily to sickbay. Geordi is called to help repair the warp vessel and Picard becomes intrigued by its historical significance. In this vessel began the future as the world would know it, and the past as Picard remembers it. He reaches out to touch the ship. Data, curious about the human need for tactile reinforcement, attempts to create the same feelings he observes in Picard, but is unsuccessful in duplicating this aspect of humanity.

 

Aboard the ship, two crewmembers are sent to examine unexplained maintenance problems, and both disappear. Picard is called to the ship and discovers that the survivors from the Borg sphere have transported onto the ship and are taking over Deck 16. While Picard arranges teams to fight them, the Borg manipulate the climate of the deck to suit their needs and begin to spread throughout the ship. When the Borg attack sickbay, Crusher, her staff, and Lily escape through a Jeffries tube, thanks to a distraction by the ship's Emergency Medical Hologram. While Crusher leads the group down the passageway, Lily steals away in a different direction.

 

On Earth, Riker finds Troi and Cochrane drunk in a bar. Troi justifies that the only way she could get Cochrane to talk to her was by shooting Tequila with him. Denying her drunken state, Troi offers her professional opinion on Cochrane. She explains, "He's nuts."

 

Picard and his team are tracking the Borg through the starship. As Crusher and her staff find Worf's team, Picard's team encounters the Borg, who have begun to assimilate U.S.S. Enterprise crewmembers. Worf's team engages the Borg in combat, but the enemies adapt to the crew's weapons too quickly to make any difference. The teams are ordered to regroup on Deck 15, but Data is captured. Picard cannot save him, so he quickly crawls into a Jeffries tube to escape. Face to face with Picard, Lily steals his phaser and demands an explanation and escape route. Picard agrees.

 

Geordi shows Cochrane the starship Enterprise through a large telescope on Earth and tries to convince him to launch his vessel the next morning. Geordi glorifies Cochrane by explaining that his ship will make first contact with alien life forms. Humanity will be saved if Cochrane launches his ship. Still drunk, Cochrane agrees.

 

Aboard the ship, the Borg Queen introduces herself to a bound Data, claiming that she is the Collective. Reactivating Data's emotion chip, the Borg begin to graph organic, human skin onto the android's arm. As Data is overcome by this new human sensation of touch, something he never thought possible, the Borg continue their work.

 

Lily and Picard wander through the service deck as the captain attempts to explain what has happened between Lily's time and his own. She begins to calm down until they suddenly run into a Borg-infested area. Quickly escaping in the Holodeck, Picard activates a Dixon Hill program. At a dance, he and Lily try to blend in without being noticed by the Borg. Following the Holodeck's story, Picard searches for Nicky the Nose and takes his machine gun. Killing the Borg with the gun, Picard retrieves the memory chip that contains all of the information the Borg has received. Lily then notices that the two dead Borg were once crewmembers of the U.S.S. Enterprise.

 

Back on Earth, Cochrane keeps hearing what an amazing historical figure he is and begins to question whether or not he wants to go through with the launch. He doubts his own nobility and flees the launch site. Geordi and Riker attempt to catch up with Cochrane in the woods and are forced to stun him with a phaser to return him to the Phoenix.

 

Lily and Picard join the rest of the surviving crew and discover that the Borg are outside of the ship. The retrieved memory chip reveals that they are reconfiguring the main deflector in order to contact the Borg of this century, calling them to Earth to assimilate the planet. Picard, Worf and Lieutenant Hawk put on space suits and venture onto the surface of the starship to stop the Borg.

 

Aware of Data's desire to become human, the Borg Queen offers him the chance to be entirely covered in human flesh and join the Borg, in an attempt to get the encryption codes from Data so she can obtain total control over the U.S.S. Enterprise. Outside the Enterprise, Hawk, Worf and Picard attempt to unlock the deflector dish. Attacked by a Borg, Worf's suit begins to depressurize. Two Borg are killed and Hawk is attacked. As the dish is released, a now-assimilated Hawk attempts to kill Picard. Worf saves the captain, but Hawk is killed. Picard and Worf then destroy the free-floating deflector dish.

 

On Earth, Cochrane explains to Riker that his only motivation for inventing warp travel was money. He never expected to save mankind, become a hero, or be instrumental in the founding of a new civilization. He simply wanted to retire in peace.

 

An argument ensues aboard the Enterprise as the majority of the senior officers believe that they should evacuate the ship, destroying it and the Borg. Picard won't give up, and insists they stay. Challenged by Worf, Picard orders him off the Bridge. Lily follows Picard into his ready room and demands that he explain his obsession with fighting the Borg. Picard declares he won't sacrifice the starship, and swears to finally make the Borg pay for all they've done. Lily quietly and calmly compares Picard to Captain Ahab, forever fighting his white whale — the Borg. Realizing that this fight could only destroy himself and his crew, Picard decides to evacuate the ship. Worf, Picard and Crusher activate the ship's self-destruct sequence. The countdown begins, and the crew leaves in escape pods. Picard surveys his ship and prepares to leave when he hears Data calling him.

 

Meanwhile , the earth-bound crew and Cochrane begin takeoff. Cochrane, Geordi and Riker take off in the Phoenix, and with music blaring, the three men launch successfully into orbit.

 

On the ship, Lily and Picard say good-bye and the captain goes to save Data. Entering Engineering, Picard confronts the Borg Queen, whom he knows from his experience with the Borg. The queen reminds Picard that it was not enough that he was assimilated, but that he needed to give himself freely to the Borg — she wished him to stand by her side as an equal to further the power of the Collective. Picard offers himself in exchange for Data, but the android does not comply. He refuses to leave, and at the queen's command, disarms the self-destruct sequence. He quickly enters the encryption codes, offering full control of the Enterprise to the Borg.

 

As Cochrane's ship nears warp, Data arms the U.S.S Enterprise's weapons and aims them at the defenseless Phoenix. At the Borg Queen's order, Data fires, but the missiles fail to hit the Phoenix. His deception of the Borg complete, Data smashes a conduit, releasing a gas that floods engineering, killing all organic material. As the Borg are destroyed, Picard climbs to safety and the Borg Queen falls into the deadly gas. With the Borg threat gone, Cochrane safely completes humanity's first warp flight.

 

Celebrating the flight back on Earth that night, Cochrane and the Enterprise crew see an alien ship land nearby. The doors open, and Zefram Cochrane makes Earth's first contact with an alien race — the Vulcans. Picard and his crew beam out, having witnessed this historic event, and the U.S.S Enterprise NCC 1701-E returns to the 24th century.

 

Fortune Brainstorm TECH 2016

WEDNESDAY, JULY 13TH, 2016: ASPEN, CO

 

8:00 AM–8:45 AM

BREAKFAST ROUNDTABLES

ENCRYPTION AND SECURITY FOR THE THREAT-SET

Ask any board chairman or CEO—the most pressing issue by far at any corporation this year is cybersecurity. Have you been hacked? (Yes.) Will you be hacked again? (Yes.) What can you do about it? Attend this session and hear from top industry experts about what to look for and what to do about it.

Steve Herrod, Managing Director, General Catalyst Partners

Paul Judge, Chairman, Luma

Lara J. Warner, Chief Compliance and Regulatory Affairs Officer, Credit Suisse Group

Michelle Zatlyn, Head of User Experience, CloudFlare

Moderator: Robert Hackett, Fortune

Intelligence track hosted by KPMG

 

PHOTOGRAPH BY Stuart Isett/Fortune Brainstorm TECH

This 7 days, we went to Barcelona for Mobile World Congress 2016. We covered a panel about cell advert blocking, Mark Zuckerberg talked about Absolutely free Fundamentals and encryption, Samsung announced the Galaxy S7 and S7 Edge, we went hands on with the modular LG G5, and oh, by the way, ...

First 1000 businesses who contacts honestechs.com will receive a business mobile app and the development fee will be waived. Contact us today.

‪#‎electronics‬ ‪#‎technology‬ ‪#‎tech‬ ‪#‎electronic‬ ‪#‎device‬ ‪#‎gadget‬ ‪#‎gadgets‬ ‪#‎instatech‬ ‪#‎instagood‬ ‪#‎geek‬ ‪#‎techie‬ ‪#‎nerd‬ ‪#‎techy‬ ‪#‎photooftheday‬ ‪#‎computers‬ ‪#‎laptops‬ ‪#‎hack‬ ‪#‎screen‬

 

honestechs.com/2016/02/27/highlights-from-mobile-world-co...

Wondering “is BitLocker good and a reliable solution to protect sensitive information from unauthorized access”? Microsoft BitLocker is a volume encryption feature that keeps the files safe and ensures efficient drive encryption. However, managing the BitLocker systems is itself a challenge which is possible to do effectively with the centralized cloud-based solution-BitTruster.

dark | light | closer

 

[1] [2] [3] [4] [5] [6] :: [semaphore] sensory

 

visual study in

perception of self

and the environment

in relation to the five

physical senses

  

A small compact Wi-Fi cloud camera with a ton of features to protect what you value the most. Check the best price at: koacctv.com/ezviz-mini-720p-hd-wi-fi-ip-camera/

• CLEAR VIDEO in 720p high definition

• 8x ZOOM & AUDIO RECORDING CAPABILITY

• GREATER VISIBILITY WITH NIGHT VISION

• MOTION DETECTION ALERTS

• MULTILAYER ENCRYPTION

• 16 GB LOCAL STORAGE, SD cards up to 64 GB

• EASY INSTALLATION

‪#‎Wi_Fi_camera‬, ‪#‎ezviz_camera‬ ‪#‎Ezvoz_mini‬ ‪#‎KOACCTV‬ ‪#‎security_camera‬

-Oof! Here we are. Why’re we looking at this old place, anyways?-

 

Commissioner got an anonymous tip about it. Apparently Freeze’s been making trips here every now and then in-between attacks- dropping by with supplies and stuff like that.

 

-Ah- so it’s his base?-

 

That’s what Gordon thinks. Word is he’s got a high-tech lab in the basement. Seems important to him.

 

-Hey- what's this thing in the middle of the floor?-

 

-Yeah, what does he need this much tech for?-

 

-Probably a life-support system. You heard about his wife, right?-

 

Well, only one way to find out. C’mon, let’s move to the basement.

 

-------------------------------

 

Extracted From: Security Camera #992 at Cybertron Robotics

Video Recorded 10/6 16:14

Accessed 10/6 by commjgordon@gcpd.net passcode 09141992

CLASSIFIED

 

Emailed to: waynesecurity@oracle.net

Subject Line: Investigations

Encrypted Message Decrypt key 02011968

Still using codespeak? Encryption much faster. First part of security vid attached. They've gone offline in basement, try to boost power there- we need that footage.

Also- something going on at Club Olympus. Some sort of lighting storm building up- I don't trust it.

Can one of you check it out?

 

- G

Vera Wilde, artist-in-residence at Hack42. Because Art & Science!

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.

The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

Vera's third photo-shoot, in which we get to play with some theatrical props and explore extreme opposites.

 

1. The first paper shredding machine was patented by inventor Abbot Augustus Lowe in 1909. But his prototype never saw mass production -- Lowe died only three years after patenting it.

 

2. In 1935, a German engineer named Adolf Ehinger created a second machine designed for paper shredding. He had to create it in a hurry: Its purpose was to shred hundreds of volumes of anti-Nazi propaganda before Hitler's secret police could find them.

 

3. Paper shredding isn't just something that happens in the office. Many firms' need for document destruction is so great that they hire dedicated shredding companies to visit their offices with huge ten-wheel trucks with giant paper shredding machines mounted on the back.

 

4. Doctors and health insurance providers are legally tasked with document shredding duties. Because their patients' and clients' information is so sensitive, state and federal laws dictate that all medical organizations have comprehensive data-destruction plans.

 

5. The practice of paper shredding gained a questionable reputation in 1972, when President Nixon's operatives shredded huge amounts of paperwork in an attempt to cover up the bungled attempt to burglarize the Democratic National Committee headquarters at the Watergate Hotel.

 

6. The biggest paper shredding machines on the market make your office shredder look like a plaything in comparison. Many of them eat just about anything, including (but probably not limited to) binder clips, rubber bands and hanging file folders. Do not anger these machines.

 

7. Because of state and federal laws aimed at preventing identity theft, paper shredding has grown into its very own industry. Many waste management companies have introduced document destruction into their service menus.

 

8. Paper shredding in the home saw a marked rise in popularity in 1988 -- the year the United States Supreme Court ruled that personal trash became public property once it hit the curb.

 

9. Many document destruction services offer a "Certificate of Destruction" -- a legal document that ensures that certain practices were followed in the destruction of documents, and that all of the documents were completely destroyed.

 

10. Paper shredding used to be all any business needed to worry about. But as digitally-stored information became more widespread, the need for specialized services to erase and destroy computer hard drives followed suit.

 

11. Like doctors and health insurance professionals, accountants are legally bound to adhere to certain document shredding standard. The Gramm-Leach Bliley Financial Modernization Act of 1993 outlined the measures that must be taken to destroy sensitive client information.

 

12. Iranian revolutionaries changed the way we approach paper shredding in 1979, when several of them stormed the American embassy and seized piles of shredded documents. Since the embassy's shredders only cut paper into long, thin strips, it was simple for the revolutionaries to paste the documents back together to access the (highly secret) information they held. After this, cross-cut shredders became the norm.

 

13. According to a survey by the nonprofit Identity Theft Resource Center and Fellowes, Inc., many Americans believe identity theft is more likely to occur during online exchanges -- even though online exchanges represent less than 10 percent of identity theft cases.

 

14. Some of the most technologically advanced shredding machines cut documents into pieces measuring just 3mm by 9mm.

 

15. The National Association for Information Destruction is the shredding industry's nationally recognized trade association. It is headquartered in Phoenix, AZ.

 

Does your office look like a mess? Do you need a clear cut option to get your act together soon? If you answered "yes," you need document scanning and document shredding services.

 

What comprises document scanning services?

 

Document scanning services mean scanning paper-based documents and converting these to digital files. If a person were to do this manually, one would need a computer, a scanner, and a storage device for the purpose. The individual loads the needed files onto a scanner, waits for the machine to perform its action, and check the file on a PC. Saved data can go to the computer's internal memory or transferred onto a CD, flash drive or external hard drive.

 

How is this different from company-based services?

 

Document scanning services offered by companies rely on the said procedures on a large-scale. Some companies have separate personnel for different tasks. The setup includes some staff members scanning the documents, while others are checking the loaded image on the computer. These firms often also have their own software and equipment they can bring on your location.

 

Storage options offered also vary. Several companies support storing data on devices only, while others provide online access. Online access indicates viewing scanned images using the Web. Depending on the company hired, you can receive an account with a corresponding password to view files. The company can also categorize each file for document archiving. Saving and storing the viewed files is also possible with this service.

 

Which industries use this service?

 

Law offices and hospitals often use this service. Law firms require scanned documents as their business generate mountains of paperwork daily. Scanned documents help keep a tidier and more professional looking space. It also helps lawyers access files easily to prepare or review their cases.

 

Medical facilities, especially larger ones, need medical records scanning to keep patient records. Doctors and or surgeons can review these records for diagnosis or prescribing treatments.

 

Other industries like those involved in sales and manufacturing use this service to track their sales and inventory. The records become important for tax purposes, disputes, and other related events. Company owners can simply pull out records when needed. These digital files can also serve as reference or evidence if lawsuits arise.

 

What are document shredding services?

 

Document shredding services involve document destruction. A paper shredder is likely the one used by companies in this business. Again, the difference is that firms have larger equipment and personnel to cover the task.

 

Many companies hire document shredding services while they also get document scanning. As they have digital files stored in devices or kept online, they get rid of physical copies to lessen risk of data theft. They also do this to reduce possible costs for storing documents in storage houses.

 

How much will it cost?

 

Payments depend on services offered and its frequency. To know exact cost, you need to get quotes from companies. You can get the information if you search on the Web. Obtain several quotations and compare rates before deciding to get the most of your money.

 

The business of paper shredding is becoming more and more popular as more companies and firms find their services preferable and suitable. When documents become outdate or are no longer being used, most companies these days prefer shredding them to pieces and recycling them as opposed to other methods of disposal. But for proper shredding of your documents you need to make sure that you have hired a company that has a strong reputation in this field. One can never really over emphasize the importance for hiring shredding services.

 

Firstly, by hiring their services, you are assured that all the documents will get shredded and not run a risk of having them end up in the wrong hands. Moreover, you are using an eco-friendly way of getting rid of papers. This is because the shredding companies, once they are through with the shredding job, recycle the shredded paper so that it can be used again. This ensures that there are no piles of shredded paper dumped somewhere, which would eventually cause harm to the environment. Hence, you also contribute to lessening the effects of global warming, which is one of the biggest problems faced by environmentalists today.

 

Secondly, most of these paper shredding services are very effective therefore they will save you and your company time that would have otherwise been used to shredding the paper manually. This time spared can now be used to deal with more important matters concerning the business. Thirdly, by hiring document shredding services, you are assured of security compliance given by these companies since they are very knowledgeable about the compliance required by law. Their knowledge of the law regarding privacy during paper shredding is also an assurance that your documents are safe in their hands. But if you were to hire paper shredding services that are unethical then you ran a risk of having your documents given to the wrong people like your competitors.

 

Most paper shredding services are flexible and therefore are ready to be called upon at any moment. Their flexibility comes in handy when you need some of your documents shredded immediately. Everyone who runs a business will at one time need the services of a shredding company for the safe disposal of documents that were once important and can spell doom for that company if they fall in the wrong hands. Private businesses are not the only ones that need or use these shredding services, as organizations and governments also use their services to be protected from criminals as well as corporate espionage.

 

Always keep in mind that not all companies who offer document shredding services offer the same quality of service or have the same level of attention to detail. Professional companies put potential employees through intense hiring procedures which include background checks to ensure their workers are trust worthy and reliable. Any company that is service based runs on the hard work of their employees, and in the paper shredding business, reliability and trust is the name of the game. When looking for a company to handle your document shredding needs, make sure you can trust them with your important documents.

 

If you run a business that regularly has to dispose of large amounts of sensitive documents and information you probably understand that using a regular paper shredder just doesn't cut it. While great for home use paper shredders in most cases simply take too long to utilise when you're trying to dispose of massive amounts of paperwork.

 

In some situations companies turn to professional paper shredding services and take their documents to those facilities. This can be problematic though due to the fact that this can lead to lost paperwork that could easily fall into the wrong hands. Losing sensitive information can not only compromise your company's security it can also land you in trouble with the law if you lose sensitive information on one of your clients thanks to the Data Protection Act of 1998.

 

On the other hand, mobile document shredding services take away all of the risk of transporting highly sensitive documents and make the shredding process easy for you. They come directly to your location and shred all of your paperwork on site using their cutting-edge paper shredding equipment. Not only do you get the benefit of ensuring that all of your paperwork is destroyed quickly and efficiently you also typically get a receipt or certificate of some sort as proof of the documents destruction. This can be a great way to impress your clients and let them know that you take protecting their data seriously.

 

When looking for a local mobile shredding company there are certain factors you're going to want to look for. First of all you want to make sure the company is reputable and does not hire any shady characters who might be tempted to snatch a few of your documents for personal gain or identity theft. Asking other businesses in the area for references is a great strategy and in many cases you can also look up a company online to see if there are any reviews for their services.

 

Another thing you should do is check to see how much experience a mobile paper shredding company has. This isn't to say that new companies aren't for you it just pays to check and see which companies have developed a good reputation and know their trade.

 

You're also going to want to ensure that your mobile shredding company suits your schedule. You're probably not going to be their only client and their shredding schedule could be dependent on several factors. It may be done by rout or it may be a first come first serve basis. Make sure that they are able to show up when you need them.

 

One last thing you should keep in mind is the fact that it doesn't hurt to have one of your employees oversee the shredding process. While this may seem like an act of mistrust it never hurts to be on the safe side. Even if a mobile shredding company is one the up-and-up there is still the possibility of a bad apple getting hired and taking advantage of having access to sensitive information.

 

Identity theft is one of the biggest problems spawned by today's economy. After all, many major business transactions require a valid identification, and one that has a good credit score. This is why you should be very strict with protecting your identity. Putting important documents in a secure place and getting document shredding services can help prevent identity thieves from using your personal files against you.

 

Losing yourself

 

Identity thieves have many ways to steal your identity. Although people are most aware of how this is done online, many stolen identities happen offline, and in some of the most unlikely places.

 

Dumpster diving gave rise to laws that mandated document shredding services to certain businesses. As the name implies, this is nothing more than someone going through your trash. In this case, it is the trash heap found in the dark alley behind most American offices where the dumpster is.

 

Dumpster diving depends on the carelessness of people. At an automated teller machine, most people would just throw the receipt away, especially if their transaction went without a hitch. The same goes for forms where you made a mistake. You probably crumpled it and threw the sheet to the nearest trash can. Later, an identity thief found your partially filled form and now most likely has your full name, maiden name or mother's maiden name plus your address.

 

There are other ways for data thieves to get at your personal information. Many require sophisticated electronics like when they use a special RFID scanner to lift your credit card information. Some use misdirection like in phishing or pretexting. None are as simple but effective as dumpster diving.

 

Protecting yourself

 

The effectiveness of dumpster diving made States pass laws that require business like hospitals and medical service providers to get document shredding services. If your business deals with sensitive personal information, properly dispose of your documentation. Some even offer digital media disposal, like making sure old hard drives do not contain any byte of someone's personal information.

 

You can protect yourself from identity theft in several ways. The first is having the discipline or habit to not throw away credit card or ATM receipts anywhere, most especially in the trash can beside the machine. The same goes for your old credit card and utilities bills.

 

Important documents should not be left where identity thieves can get access. In the office, files with such information should not be left lying around in public areas. Make it a habit to avoid leaving important documents in your car. Identity thieves will break your car windows if they think a folder left inside might contain personal information.

 

If you are more secure with storing information in data storage medium, you might want to get document scanning services. Proper encryption and firewalls can go a long way to helping secure your important personal information in digital format.

  

Evolution knows no math, but it knows how to count. It pays scant regard to geometry and calculus, but it effortlessly employs techniques that make use of those very principles. It does not have intelligence, but it can build brains. It knows nothing of electrical engineering, but it constructs nervous systems we can only admire for their complexity and functionality.

 

How come?

 

We say we are rational beings and we trust in the scientific method. At the same time we entrust our systems to our unproven beliefs. We commit our governments’ secrets, and all of our Internet commerce, to mathematical encryption - which is based upon a single assumption: that multiplication cannot easily be reversed. We send people to war based upon assumptions, only to find out we were wrong afterwards. We assume that our systems and our strategies can protect us from natural disasters, and then New Orleans happens.

 

Why are we so confident?

 

If all else fails, most claim that they trust in God. But do we really? Given how little we know about ourselves and about the laws of nature, what makes us think we know more about Him?

 

Are we assuming too much?

 

Vera Wilde, artist-in-residence at Hack42. Because Art & Science!

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.

The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

This is our second photo-shoot together. We have great chemistry and it's loads of fun to shoot with her.

We got to play with a few props, listen to some music and experiment with light and posing.

Board game letters spelling out privacy and encrypt. For attribution please link to www.comparitech.com/ Thanks!

Digital files can be uploaded to the bitcoin blockchain, to be propagated with every transaction, and critically, in the current implantation, they can not be removed by anyone. As an early proof of principle, a picture was permanently inserted in 2011.

 

Now imagine that illegal content is inserted by someone (presumably from a geography where it is not illegal by international jurisdiction). From that point on, every participant will be trafficking in that illegal content, knowingly once the word gets out. So, the question becomes: what kind of content would motivate enforcement of the law, and/or public rejection of the system? DMCA and munition (encryption code) export violations are not quite motivating enough. Perhaps child porn or denigrating cartoons of Allah would do the trick in certain cultures. Anyone using bitcoin would be trafficking in these steganographically encoded images.

 

What am I missing? (And clearly, some people would not care about any of this; my question is whether this easy act would cripple mainstream adoption)

 

Meanwhile, HAPPY BIRTHDAY Bitcoin!

Today is six years from the first block.

"Cypherpunks is gripping, vital reading, explaining clearly the way in which corporate and government control of the internet poses a fundamental threat to our freedom and democracy". — Oliver Stone

 

"Obligatory reading for everyone interested in the reality of our freedoms." — Slavoj Zizek

 

"The power of this book is that it breaks a silence. It marks an insurrection of subjugated knowledge that is, above all, a warning to all." — John Pilger

 

Buy Cypherpunks Freedom and the Future of the Internet here: stores.ebay.co.uk/Iron-Man-Shop

 

Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.

 

Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?

 

The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.

 

Publication November 2012 • 192 pages

Paperback ISBN 978-1-939293-00-8 • Ebook ISBN 978-1-939293-01-5

 

Julian Assange is the editor in chief of WikiLeaks. An original contributor to the cypherpunk mailing list, Assange is the author of numerous software projects in line with the cypherpunk philosophy, including the Rubberhose encryption system and the original code for WikiLeaks. An 'ethical hacker' in his teens, and subsequently an activist and internet service provider to Australia during the 1990s, he is the co-author (with Sulette Dreyfus) of Underground, a history of the international hacker movement. "Julian is currently a refugee under the protection of the government of Ecuador, and lives in the Ecuadorian embassy in London."

 

Jacob Appelbaum is a staff research scientist at the University of Washington, and a developer and advocate for the Tor Project, which is an online anonymity system for everyday people to fight against surveillance and against internet censorship.

 

Andy Müller-Maguhn is a long time member of, and former spokesman for, the Chaos Computer Club in Germany. A specialist on surveillance he runs a company called Cryptophone, which markets secure voice communication devices to commercial clients.

 

Jérémie Zimmermann is the co-founder and spokesperson for the citizen advocacy group La Quadrature du Net, the most prominent European organization defending anonymity rights online and promoting awareness of regulatory attacks on online freedoms.

 

AN EXCHANGE FROM CYPHERPUNKS:

 

JULIAN:

I want to look at what I see as a difference between a US cypherpunk perspective and the European perspective, which I think is quite interesting. The US Second Amendment is the right to bear arms. Just recently I was watching some footage that a friend shot in the US on the right to bear arms, and above a firearms store it says 'Democracy, Locked and Loaded,' and that’s the way that you ensure that you don’t have totalitarian regimes – that people are armed and if they are pissed off enough, then they simply take their arms and they retake control by force. Whether that argument is still valid now is actually an interesting one because of the difference in the types of arms that have occurred over the past 30 years. So, we can look back to this declaration that code-making, providing secret cryptographic codes that the government couldn’t spy on, was in fact a munition, and this big war that we fought in the 1990s to try and make cryptography available to everyone, which we largely won.

 

JAKE:

In the West?

 

JULIAN:

In the West we largely won and it's in every browser – it is now perhaps being back-doored and subverted in different kinds of ways. The notion is that you cannot trust a government to implement the policies that it says that it is implementing, and so we must provide the underlying tools, cryptographic tools that we control, as a sort of use of force, in that if the ciphers are good no matter how hard it tries a government cannot break into your communications directly. Maybe it can put a bug in your house or whatever.

 

JAKE:

Force of authority is derived from violence. One must acknowledge with cryptography no amount of violence will ever solve the math problem.

 

JULIAN:

Exactly.

 

JAKE:

And this is the important key. It doesn't mean you can't be tortured, it doesn't mean that they can't try and bug your house or subvert it some way but it means that if they find an encrypted message it doesn't matter if they have the force of the authority behind everything that they do, they cannot solve that math problem. This is the thing though that is totally non-obvious to people that are non-technical and it has to be driven home. If we could solve all of those math problems, it would be a different story and, of course, the government will be able to solve those math problems if anyone could.

 

JULIAN:

But it's just a fact. It just happens to be a fact about reality, such as that you can build atomic bombs, that there are math problems that you can create that even the strongest state cannot directly break. I think that was tremendously appealing to Californian libertarians and others who believed in this sort of 'democracy locked and loaded,' and here was a very intellectual way of doing it – of a couple of individuals with cryptography standing up to the full power of the strongest suit of power in the world. And we're still doing that a little bit, but I wonder, I have a view that the likely outcome is that those are really tremendously big economic forces and tremendously big political forces, like Jérémie was saying, and that the natural efficiencies of these technologies compared to the number of human beings will mean that slowly we will end up in a global totalitarian surveillance society. By totalitarian I mean a total surveillance, and that perhaps there'll just be the last free living people – and these last free living people are those who understand how to use this cryptography to defend against this complete, total surveillance, and some people who are completely off-grid, neo-Luddites that have gone into the cave, or traditional tribes-people. And these traditional people have none of the efficiencies of a modern economy so their ability to act is very small. Are we headed for that sort of scenario?

 

JÉRÉMIE:

First of all, if you look at it from a market perspective, I'm convinced that there is a market in privacy that has been mostly left unexplored, so maybe there will be an economic drive for companies to develop tools that will give users the individual ability to control their data and communication. Maybe this is one way that we can solve that problem. I'm not sure it can work alone, but this may happen and we may not know it yet. Also it is interesting to see that what you’re describing is the power of the hackers, in a way – 'hackers' in the primary sense of the term, not a criminal. A hacker is a technology enthusiast, is somebody who likes to understand how technology works, not to be trapped into technology but to make it work better. I suppose that when you were five or seven you had a screwdriver and tried to open devices to understand what it was like inside. So, this is what being a hacker is, and hackers built the Internet for many reasons, also because it was fun, and they have developed it and have given the Internet to everybody else. Companies like Google and Facebook saw the opportunity to build business models based on capturing users' personal data. But still we see a form of power in the hands of hackers and what is my primary interest these days is that we see these hackers gaining power, even in the political arenas. In the US there has been these SOPA (Stop Online Piracy Act) and PIPA (Protect IP Act) legislations – violent copyright legislation that basically gives Hollywood the power to order any Internet company to restrict access and to censor the internet.

 

JULIAN:

And banking blockades like the one we're suffering from.

 

JÉRÉMIE:

Exactly. What happened to WikiLeaks from the banking companies was becoming the standard method to fight the evil copyright pirates that killed Hollywood and so on. And we witnessed this tremendous uproar from civil society on the Internet – and not only in the US, it couldn't have worked if it was only US citizens who rose up against SOPA and PIPA. It was people all around the world that participated, and hackers were at the core of it and were providing tools to the others to help participate in the public debate.

Vera Wilde, artist-in-residence at Hack42. Because Art & Science!

 

Hackerspace Hack42 is proudly hosting a new artist-in-residence. Dr. Vera K. Wilde (PhD PoliSci) is a (former) Harvard Kennedy School researcher. She is working on re-branding the Dark-Web to the EDTR-web, a place for Expressing, Dissenting, Teaching and Resisting.

The EDTR-web is using technologies like TOR and encrypted communications tools to create a place of freedom where centralised power cannot reach.

Vera will be using arts (oil painting and songwriting) as well as writing and political science methods to define and develop the EDTR-web as a social space and technological phenomenon.

 

This is our second photo-shoot together. We have great chemistry and it's loads of fun to shoot with her.

We got to play with a few props, listen to some music and experiment with light and posing.

Motorola SECTEL 3500 STU-III phone installed with VDU (video display unit).

 

Allows encrypted video conferences, and attaches to larger screens & better cameras via RCA video/audio inputs and outputs in rear.

 

Requires 40w power adapter.

1 2 ••• 4 5 7 9 10 ••• 79 80