Cyberattack 101: Why Hackers Are Going After Universities
Cyberattack 101: Why Hackers Are Going After Universities
With their vast stores of personal data and expensive research, universities are prime targets for hackers looking to graduate from swiping credit card numbers.
Read more here.
Glossary of Computer and Security Terms
Glossary of Computer and Security Terms
Avatar—a personalized graphic file or rendering that represents a computer user or user’s alter ego, often used on Web exchange boards and in online gaming; can be a real-life digital photo, but is more often a graphical representation.
App—a web application, accessed over the Internet, for a mobile device (e.g., smartphone, tablet) that works much like user-installed software on a computer allowing the device to perform specific tasks.
Bandwidth –also called “data transfer rate,” the amount of data that can be carried online from one point to another in a given time period, usually expressed in bits (of data) per second (bps) or bytes per second (Bps). Dial-up Internet accounts, which use a standard telephone line to connect to an Internet Service Provider (ISP), have a very narrow bandwidth (about 50 Kbps or 50,000 bits per second) and take a long time to download data. A broadband Internet account can move data at anywhere from 128 Kbps to 2,000 Kbps or more and can download large files, such as video files, much faster.
Blog—from “web log,” a regularly updated personal journal, conversation, commentary, or news forum on virtually any topic that is published on the Web and may include text, hypertext, images, and links; typically displayed in reverse chronological order, blog posts invite comments from readers creating online communities of individuals with shared interests over time; updating a blog is “blogging,” someone who keeps a blog is a “blogger,” and blog entries are called “posts.”
Botnet—a network of private computers, each of which is called a “bot,” infected with malicious software (malware) and controlled as a group without the owners’ knowledge for nefarious and, often, criminal purposes; computers are typically infected when users open up an infected attachment or visit an infected website.
Browser—short for Web browser, a software application that locates, retrieves, and displays information resources on the World Wide Web. An information resource is identified by a URL (Uniform Resource Locator), and may be a web page, image, video, or other piece of content. Popular browsers include Microsoft Internet Explorer, Firefox, Google Chrome, and Apple Safari.
Byte—a unit of digital information commonly consisting of eight “bits” (a binary unit and the smallest increment of computer data) used as a measurement of computer memory size and storage capacity (usually in terms of MBs or “megabytes,” and GBs or “gigabytes”). Bits and bit rates (bits over time, as in bits per second [bps]) are also commonly used to describe connection speeds. (See bandwidth.)
Cloud computing—a technology that uses the Internet and remote servers to maintain data and applications, allowing users to access applications without installation and access to their personal files from any computer with Internet access; centralizes storage, memory, processing, and bandwidth; examples include Yahoo email or Gmail with the software managed by the cloud service providers Yahoo and Google.
Computer virus—a software program that is designed to replicate itself, spread from one computer to another, and interfere with computer operation; a computer virus may corrupt or delete data on a user’s computer, use an email program to spread itself to other computers, or even erase everything on a user’s hard disk. Computer viruses can be spread by attachments in email messages or instant messaging messages; disguised as attachments of images, greeting cards, or audio and video files, and hidden in illicit software or programs that are downloaded to a computer.
Cookie—also referred to as an “HTTP cookie,” is a small text file that contains a unique ID tag placed on the user’s computer by a Web site to track pages visited on the site and other information; “tracking cookies” and “third-party tracking cookies” are used to compile long-term records of individuals’ browsing histories.
CPU—the central processing unit, the “brain” of the computer, is the hardware within a computer system that carries out the instructions of a computer program by performing the basic arithmetic, logic, and other operations of the system; on personal computers, the CPU is housed in a single chip called a “microprocessor.”
Cyberbullying—bullying that takes place using electronic technology, including the Internet, and related technologies to harm other people, in a deliberate, repeated, and hostile manner; may involve text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, Web sites, or fake profiles.
Cyberstalking—a criminal offense that involves using the Internet or other technology to stalk or harass an individual, a group of individuals, or an organization; it may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, or harassment.
Cyberspace—the global network of interdependent information technology infrastructures, telecommunications networks, and computer processing systems; a metaphor for describing the non-physical terrain created by computer systems, it has come to mean anything associated with the Internet and the diverse Internet culture.
Content management system—a software system that allows website publishing, editing, content storage and modification, database management, and site maintenance from a central Web page; allows multiple users with little knowledge of web programming or markup languages may collaborate to create and manage website content with relative ease.
Computer actions:
Clicking—to tap on a mouse button, press it down, and immediate releasing it; to click on means to select a computer screen object by moving the mouse pointer to the object’s position and clicking a mouse button; some operations require a double click, clicking a mouse button twice in rapid succession.
Downloading—the transmission of a file from one computer system to another; to download a file is to request it from one computer (or from a Web page) and to receive it on another computer. Uploading is the transmission of a file in the other direction, from one computer to another.
Posting—to publish a message in an online forum, such as a blog, or newsgroup; a post is a message published in an online forum or newsgroup.
Logon—also called logging in or on, the process used to get access to an operating system or application; most logon procedures require a user to have a user ID and a password.
Denial of Service Attack—type of online computer attack designed to deprive user or groups of users normally accessible online services; generally involves effort by hackers to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
Digital—term commonly used in computing and electronics, describes any system in which data is converted to binary numeric form as in digital audio and digital photography; computers are digital machines because at their most basic level they can distinguish between just two values, 0 and 1, or off and on. All data that a computer processes must be encoded digitally as a series of zeroes and ones. The opposite of digital is analog; a typical analog device is a clock in which the hands move continuously around the face.
Digital Signature—an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document; can also be used to ensure that the original content of the message or document that has been sent is unchanged; often used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.
Domain Name System (DNS)—a database system that translates Internet domain and host names to IP addresses; DNS automatically converts the name typed into a Web browser address bar to the IP addresses of Web servers hosting those sites.
E-book reader—a portable electronic device that is designed primarily for the purpose of reading digital books and periodicals.
Email—short for electronic mail, the transmission of digital messages over communications networks, including the Internet; consists of three components: the message envelope, the message header, and the message body.
Encryption—the conversion of digital information into a format unreadable to anyone except those possessing a “key” through which the encrypted information is converted back into its original form (decryption), making it readable again.
Firewall—software or hardware that, after checking information coming into a computer from the Internet or an external network, either blocks the transmission or allows it to pass through, depending on the pre-set firewall settings, preventing access by hackers and malicious software ; often offered through computer operating systems.
Geotagging—the process of adding geographical location, or label, to photographs, videos, website, SMS messages, QR Codes, or RSS feeds; a geotag usually consists of latitude and longitude coordinates, altitude, distance, place names, and other details about the origin of the media being tagged helping users find a variety of online location-specific information.
Global Positioning System (GPS)—space-based satellite navigation system that provides positioning, navigation, and timing/distance information; maintained by the United States government and freely accessible to anyone with a GPS receiver.
Hardware—specifically, computer hardware, is the collection of physical elements that comprise a computer system, including a CPU, monitor, keyboard, hard disk, and printer. In contrast, software (specifically, computer software) is a collection of computer programs, procedures, algorithms, and its documentation that provides instructions for telling a computer what to do and how to do it.
Hashtag—words or phrases prefixed with the symbol # (the pound sign); used to mark keywords or topics in a Tweet or social networking service.
Hyperlink—an element in an electronic document that links to another place in the same document or to an entirely different document; typically, you click on the hyperlink to follow the link. Hypertext is text with hyperlinks.
HTML—HyperText Markup Language is the main markup language for displaying web pages and other information that can be displayed in a web browser; HTML elements, which form the building blocks of all Web sites, consist of tags enclosed in angle brackets (e.g.,); browsers do not display the HTML tags, which provide instructions about the appearance and content of the page, but use the tags to interpret the content of the page.
HTTP—Hypertext Transfer Protocol, the foundation of data communication for the World Wide Web, defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when an URL is entered into a browser, an HTTP command is sent to the Web server directing it to retrieve and transmit the requested Web page.
HTTPS—Hypertext Transfer Protocol Secure, provides secure communication over a network, such as the Internet; basically layers additional security measures over HTTP; used by financial and online commerce Web sites to ensure the security of private information.
IP Address—a unique identifier in the form of a numerical label assigned to each device, such as a personal computer or server, participating in a network, such as the Internet.
Intellectual property—usually governed by patent, trademark, and copyright law, a set of rights that are recognized for owners of various property (e.g., machines, musical, literary and artistic works, discoveries and inventions, and applications); applicability to digital realm is hotly contested area of the law.
Internet—a worldwide collection of computer networks that use the standard Internet Protocol Suite to serve billions of users interconnected by a broad array of electronic, wireless, and optical networking technologies; the Internet carries an extensive range of information resources and services, including inter-linked hypertext documents of the World Wide Web and the infrastructure to support email.
Internet Service Provider (ISP)—an organization, usually a private business, that provides personal and business computers access to the Internet; users usually pay a monthly fee to an ISP for this service.
Keylogger—also called keylogging and keystroke logging, is the action of tracking (or logging) the keys struck on a computer keyboard; usually runs hidden in the background and automatically records all keystrokes so that users are unaware of its presence and that their actions are being monitored.
Keyword—in computer programming, a word or identifier that has a particular meaning to the programming language; also a term that captures the essence of the topic of a document used by a search engine to retrieve online documents related to that term or terms.
JPEG—a standard method of compressing photographic images for storing and transmitting on the World Wide Web; JPEG is also the file format which employs this compression (with the following file extensions: .JPEG, .JFIF, .JPE, .JPG); the term is an acronym for Joint Photographic Experts Group, which created the standard.
Laptop –a personal computer for mobile use that integrates most of the typical components of a desktop computer (i.e., display, keyboard, touchpad); sometimes called notebook computers, notebooks, or netbooks.
Malware—short for malicious software, software that disrupts or damages a computer’s operation, gathers sensitive or private information, or gains access to private computer systems; may include botnets, viruses, worms, Trojans, keyloggers, spyware, adware, and rootkits.
Botnet—a network of private computers, each of which is called a “bot,” infected with malicious software (malware) and controlled as a group without the owners’ knowledge for nefarious and, often, criminal purposes.
Virus—type of malware that has a reproductive capacity to transfer itself from one computer to another spreading infections between online devices.
Worm—type of malware that replicates itself over and over within a computer.
Trojan—type of malware that gives an unauthorized user access to a computer.
Spyware—type of malware that quietly sends information about a user’s browsing and computing habits back to a server that gathers and saves data.
Adware—type of malware that allows popup ads on a computer system, ultimately taking over a user’s Internet browsing.
Rootkit—a type of malware that opens a permanent “back door” into a computer system; once installed, a rootkit will allow more and more viruses to infect a computer as various hackers find the vulnerable computer exposed and attack.
Mobile device—also called a handheld, handheld device, or handheld computer, a pint-sized computer device, typically having a display screen with touch input or a miniature keyboard; most common types are smartphones, PDA, pagers, and personal navigation devices.
Modem—an electronic device that converts a computer’s digital signals into specific frequencies to travel over telephone or cable television lines; computers use modems to communicate with one another over a network; often used to link home computers to the Internet through an Internet Service Provider.
Network—also called a computer network, is a collection of computers interconnected by communication channels that allow sharing of resources (hardware, data, and software) and information; most common is the local area network or LAN, anywhere from a few computers in a small office to several thousand computer spread through dozens of buildings; a wide area network or WAN connects computers across multiple geographic locations, even on different continents.
Online gaming—any type of game played through the Internet, over a computer network, or on a video game console (e.g., Xbox 360 and Playstation 3); usually refers to video games played over the Internet, where multiple players are in different geographic locations.
Open source software—software often developed and distributed to users at no cost in a public, collaborative manner; permits users to study, change, improve, and at times also distribute the software.
Operating system—a set of software or software platform on top of which other programs, called application programs, can run.
PDF—developed by Adobe Systems, a portable document format file that is a self-contained cross-platform document so that files will look the same on the screen and in print, regardless of the computer or printer being used or software used to originally create the file.
Personal computer (PC)—any general-purpose computer whose size, capabilities, and cost make it useful for individuals; PC software applications include, but are not limited to, word processing, spreadsheets, databases, databases, Web browsers, email, and games; may be a desktop computer, laptop, table, or a handheld PC. The term PC has been traditionally used to describe an “IBM-compatible” personal computer, in contrast to an Apple Macintosh computer.
Phishing—sending emails that attempt to fraudulently acquire personal information, such as usernames, passwords, social security numbers, and credit card numbers, by masquerading as a trustworthy entity, such as a popular social website, financial site, or online payment processor; often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
Plug-ins—sometimes called add-ons, are software modules that add functionality to an application; commonly used in web browsers to play video, scan for viruses, and display new file types; well-known plug-in examples include Adobe Flash Player, QuickTime, and Microsoft Silverlight.
Podcast—an audio digital file that is received from the Internet and then downloaded and synced to a portable media player or computer; files are received by subscribing to a podcast feed (sometimes called an RSS feed); the term combines “broadcast” and “pod” from the success of the iPod, although podcasts can be listened to on any portable media player.
Pop-ups—or pop-up ads, are a form of online advertising on the World Wide Web intended to attract web traffic or capture email addresses; created by advertisers, pop-ups generally appear unexpectedly in a small web browser window when a user is linking to a new Web site.
Pop-up blockers—a web browser feature, software, or application that allows users to limit or block pop-up ads; users may often set the preferred level of blocking, from total blocking to minimal blocking.
RSS—Really Simple Syndication is a family of web feed formats used to publish frequently updated works, such as blog entries, news headlines, audio, and video—in a standardized format; users subscribe to RSS feeds, which automatically send favorite content to users who have signed up for the feeds.
Search engine—program that searches documents for specified keywords and returns a list of the documents where the keywords were found; often used to describe systems, including Google, Bing, and Yahoo! Search that enable users to search for documents on the World Wide Web.
Security software—a generic term referring to any computer program that secures a computer system or computer network; the two main types of security software are virus protection software and software that removes adware and spyware (both require regular updating to remain effective).
Server—a computer program or physical computer that services other computers over a local network or the Internet; network servers typically are configured with additional processing, memory, and storage capacity; specific to the Web, a Web server is a computer program (housed in a computer) that serves requested HTML pages or files.
SMTP—Simple Mail Transfer Protocol is a protocol for sending e-email messages between servers.
Smart phone—handheld device built on a mobile computing platform that features, typically, a digital camera, video camera, Global Positioning System (GPS), e-mail, and all the features of a standard cell phone; usually equipped with a high-definition, touch pad screen and miniature keyboard, smartphone allows downloading of apps for a wide range of uses.
Social networking—using Internet-based tools that allow people to listen, interact, engage, and collaborate with each other; popular social networking platforms include Facebook, MySpace, YouTube, LinkedIn, and Twitter.
Software—specifically, computer software, is a collection of computer programs, procedures, algorithms, and its documentation that provides instructions for telling a computer what to do and how to do it. In contrast, hardware (specifically, computer hardware) is the collection of physical elements that comprise a computer system, including a CPU, monitor, keyboard, hard disk, and printer.
Spam—the use of electronic messaging systems to send unsolicited bulk messages (usually advertising or other irrelevant posts) to large lists of email addresses indiscriminately.
Spyware—a type of malware (malicious software) installed on computers that collects information about users without their knowledge; can collect Internet surfing habits, user logins and passwords, bank or credit account information, and other data entered into a computer; often difficult to remove, it can also change a computer’s configuration resulting in slow Internet connection speeds, a surge in pop-up advertisements, and un-authorized changes in browser settings or functionality of other software.
SQL—structured query language, a special-purpose programming language designed for managing data in relational database management systems.
TLS—transport layer security (and its predecessor, secure sockets layer/SSL), are cryptographic protocols that provides communication security over the Internet.
Sexting—the act of sending sexually explicit messages or photographs primarily between mobile phones.
Syncing—the process of copying all electronic files and folders from one device to another (e.g., from a smartphone to a personal computer) through an Internet connection.
Tablet Computer—a kind of mobile computer, larger than a mobile phone or personal digital assistant, usually having a flat touchscreen or pen-enabled interface.
Twitter—an online social networking service that enables users to send and read text-based posts of up to 140 characters, known as “tweets.”
URL—the Uniform Resource Locator is the global address of documents and other resources on the World Wide Web; a URL contains the name of the protocol to be used to access the file resource, a domain name that identifies a specific computer or server on the Internet, and a pathname, a hierarchical description that specifies the location of a file on that computer or server.
USB Flash Drive—also called a jump drive or thumb drive, is a data storage device that is typically removable (plugged into a USB/Universal Serial Bus port on a personal computer) and rewritable, and physically much smaller than a floppy disk.
USB Port—Universal Serial Bus port, a single, standardized way to connect devices (modems, printers, scanners, digital cameras, etc.) to a personal computer.
Virtual reality—an artificial environment created with computer software that can simulate physical presence in places in the real world, as well as in imaginary worlds, primarily through sight and sound experiences; may range from a three-dimensional image that can be explored interactively at a personal computer to more sophisticated approaches involving wrap-around display screens, rooms with wearable computers, and devices that let you feel the display images.
Voice chat—a modern form of communication using the Internet through services such as Skype, Yahoo! Messenger, AOL Instant Messenger, or Windows Live Messenger.
VoIP—Voice over Internet Protocol, a technology that allows voice calls using a broadband Internet connection instead of a regular (or analog) phone line.
Wi-Fi—a technology that allows an electronic device (personal computer, video game console, smartphone, tablet, digital audio player) to exchange data wirelessly (using radio waves) over a computer network.
Wi-Fi Hotspot—a wireless access point to the Internet or other computer network over a wireless local area network through the use of a router connected to a link to an Internet service provider; frequently found in coffee shops and other public establishments, a hotspot usually offers Internet access within a range of about 65 feet (20 meters) indoors and a greater range outdoors; many smartphones provide built-in ability to establish a Wi-Fi hotspot.
Webcam—a video camera that feeds images in real time to a computer or computer network; can be used to establish video links permitting computers to act as videophones or videoconference stations; also used for security surveillance, video broadcasting, and social videos (such as many viewed on YouTube).
WWW—the World Wide Web (commonly known as “the Web” or the “Information Superhighway”), a vast collection of linked files accessed over the Internet using a protocol called HTTP (Hypertext Transfer Protocol); the system supports documents specially formatted in a markup language called HTML (Hyper Text Markup Language) that supports links to other documents, as well as graphics, audio, and video files. With an Internet “web browser,” one can view “web pages” that may contain text, images, video, and other multimedia, and “navigate” between them via “hyperlinks.” World Wide Web is not synonymous with the Internet. The WWW is just one of many applications of the Internet and computer networks.
Web server—computer hardware and software that runs a website and is always connected to the Internet; using HTTP (Hypertext Transfer Protocol), a Web server delivers Web pages to browsers and other data files to Web-based applications; every Web server has an IP address and often a domain name.
Website—a collection of specially formatted, related Web files (or pages) on a particular subject or organization that are stored on a computer known as a web server and accessible through a network such as the Internet; include a beginning file called a home page; a web page can contain any type of content, including text, color, graphics, animation, and sound.
ZIP—a file format used for data compression and archiving; a zip file contains one or more files that have been compressed to make file size considerably smaller than the original file; the zipped version of files have a .zip file extension; can significantly reduce e-mail transmission time and save on storage space.
Creating a username and password to access OpenVAS
Creating a username and password to access OpenVAS
1. Open a terminal
2. Issue command → sudo openvasmd –create-user admin
3. Issue command → sudo openvasmd –user=admin –new-password=letmein
4. Issue command → sudo openvassd stop
5. Issue command → sudo openvasmd stop
6. Issue command → sudo gsad stop
7. Issue command → sudo openvassd
8. Issue command → sudo openvasmd
9. Issue command → sudo gsad
10. call up the URL on your browser Issue command → https://localhost:9392/
11. log-in using the new username and password you created
CSI: Cyber Season 1 Episode 2 Recap: CMND:CRASH
CSI: Cyber Season 1 Episode 2 Recap: CMND:CRASH
Episode Info
| Air Date: | Mar 11, 2015 |
A roller coaster crash is investigated and the probe reveals it was caused by someone who hacked into the ride’s internal computer.
My Security Thoughts – A Panel Discussion
My Security Thoughts – A Panel Discussion
Melvin: Tony/Brian, you both have read my thoughts on automation and that it will have a negative impact on civilization. The paper is located here: https://securityorb.com/security-thoughts-mhbjr/. To add into this we have seen the uprising in France from cab drivers against Uber. This has resulted in France ruling that the uberPOP app is illegal though Uber is appealing the ruling it is another hurdle for the service.
Now to me the French are known to protest against things that go against their comfort but are they onto something. Uber maybe the first step on a path to where not only are the cab drivers out of business but Uber drivers become extinct as well with driverless cars.
What will automation do to our world? Will there be no need for the average human? Will life end for those that are not super rich? Where will it end?
We have seen the increase use of drones by the military. They have said that using drones will save lives. That is obviously true but if you eliminate the horror of war for one side then what is the incentive to stop fighting?
Thoughts?
Tony: Rise of the SLUHs, eh? Hmmm, I don’t think so! I have had several conversations this last week about technology destroying the human condition. In fact, so much so…that it has led me to coin the term “Stupid, Low Energy, Under-employed Humans”…SLUH. One would use it in a sentence like “Hey Sluh, what you doin’?”
Ok, seriously thought, I mean that’s basically the argument I hear over and over…so let me define the acronym and then get on with it.
- Stupid – Technology is making us/humans stupid, calculators, the internet…omg!
- Low Energy – Technology is making us lazy…just get up and change the channel you lazy human!
- Under-employed – Technology like drones, driverless cars, robots are taking our well paying jobs!
- Human – Technology is antithetical to humans…so take off that damn prothesis and deal with life, you whiner!
If you want to get at my thoughts in detail about SLUHs go ahead, but for the moment I will address your position, Mel. Your position speaks to Stupid (“Will there be no need for the average human?”) and Under-employed (“Will life end for those that are not super rich?”). In short, tomorrow’s average human will be less average than today’s average human. Those average workers displaced by technology will become adept in using and maintaining the technology that replaced them. They will have to adapt to the new workplace that has less labor and more thinking. The good news is that technology is making humans better thinkers and collaborators anyway. Data visualization tools expand our understanding and imagination, the internet and social tools enable collective thought worldwide…this is unimaginably awesome “force multiplying stuff”. The world is full of innovation and opportunity, automation frees up humans to do more of this. We are centuries away from automation leaving no jobs for humans. Hell, we will be off the planet by then!
Hmm, I really don’t have to heart to talk about the efficiency of drones/killing. I have to believe human nature (e.g., compassion et al) is the balancing force against the overall efficiency of war & killing people. And if it’s not then…perhaps we should not live amongst the stars anyway!
Brian: To a certain extent you can see what is happening with the demand for increased wages, and the cost of automation – when you are forced pay $15-20/hour for someone to punch a picture, you start looking for ways to cut costs. You can see it happening, putting kiosks that let the person ordering push the button and get rid of the cashier. With the advent of the government forcing more and more businesses out of taking paper money – you have a perfect storm, where you place your order, swipe your credit card – or cell phone – and you get your burger all by machine – no humans are needed anymore and only screw things up, and more and more places are having the outside order go to India and be sent electronically back to that McDonald’s since that is cheaper than having someone inside take the customer’s order. That is what is happening now – right now they still have humans in the back frying things at some locations, but they are getting rid of the humans in CA where the costs make it prohibitive to have a human due to all of the associated fees that the government is slathering on top of things. Basically, entry level positions are becoming a thing of the past – McDonald’s is seeing it’s profits disappear so it is looking to cut corners as much as possible. So that is one side of the coin, and I see that growing in the future. Most of what used to be “entry” level positions will disappear over the next 5-10 years. The other side of the above trend is that humans are “freed” to do more of what they want when they want – if they can get that nasty how to live day-to-day out of the way. To a certain extent people are working less – since you can’t be taxed on your personal time, so giving less of your money to the government and only working for what they need in increasing and is a trend I see as growing in the future. Look at the people who drive for Uber – they work when they need money, and only when they need money, and a lot of it is “off the books”. I see that trend increasing in the years to come. Now this has other ramifications in that there is less money for infrastructure, and so forth, but when people are earning just enough to “live” how do you “encourage” them to do more, when the taxes make it so that doing more results in less?
You see this a LOT in today’s young men – who are on average working less than ever before, and not marrying or taking on any responsibilities. A man can live on little and doesn’t mind living without a shower and so forth – or showing in the gym- so I see more of this “free-range men” syndrome. Sure there will be people that buck that trend, but it certainly seems to be growing. Men living on the beach in San Francisco are exploding – this is a trend that I think will increase. Sure there will be people who still go the traditional school, and 9-5 but I think they will start looking for less money and more perks – free car, free housing, child-care, etc. – things that can be “written” off or now taxed.
Also, with cars driving themselves we will see more “robots” doing more things that used to be exclusively reserved for humans – I saw a drone fire a gun earlier this week. What will happen when someone uses one to rob a bank? (I expect it in the next few years.) Kill someone? (That will probably be sooner rather than later.) How to you get “forensics” when the criminal is a machine? The government pioneered the use of “drones” and people will run with it – they are already being used for anything and everything. Humans are innovative in ways that you may not want them to be. Of course the government will try to do what they always do – make things illegal, and everyone will ignore it. When everything is illegal – everyone is a criminal. Heck, I saw a thing a few years ago where the average person commits 1-2 felonies every day – yes, felonies. Most of that is due to the stupidity of what is now a crime – I see this continuing…
One area that will explode is the area of 3D printing – they are still doing plastics, but I saw a company experimenting with a type of “liquid-metal” – that will be a game changer. Think about when you can print what you need – need valve? Or something you don’t know what the name is? Print it and use it. They are doing that in a number of places already – auto manufacturing – and that will spread.
Melvin: Let me address Tony’s response first. I was not going down the SLUH road. I don’t feel that people cannot compete or be of use. My reasoning is that automation cost less than paying a human to do the same job. As automation becomes more efficient and cost to automate decrease than more people will be out of work.
I am looking at the future where unemployment is increasing not because we cannot teach people or that they cannot do the work it is just that profit will win in any business so they will let people go. Brian talked about Uber. What happens when Uber uses self-driving cars? Those people that were working when they needed money are now not needed.
I look again at China where there are over a billion people in China. They have an urban unemployment rate between 4 – 4.5%. They do not take into account the 300 million migrant farm workers and there are a number of groups in China that are also not accounted for in their published numbers. Even so we can just look at a company like Foxcom that makes products for Apple and other companies. It employs tens of thousands and is just one of the mega manufacturing companies. As they are able to increase the amount of automation in their factories they will do so. Where will those workers go?
No nation on Earth can count on colonization to alleviate overcrowding and to find another source of trade, new trade that will bring new profit and expansion. Automation can lead to a collapse of the economy. If people cannot work because they are not needed then they will not have any money to buy things to keep the economy moving.
Tony: Hmm, this sounds a bit like the Industrial Revolution argument back in the day. Ok well I guess it all depends on your timeframe, Automation will definitely displace workers but my bottomline is that humans will adapt and move on. I mean this timeframe seems soooo far out…farther out then the industrial revolution. Additionally, we have so much technology that makes the world a smaller community, a community that can better absorb displaced workers. Automation takes time and repeatability, so every industry will not become automated overnight. I just do not see enough automation that will make a dent even close to the industrial revolution.
I do like Brian’s “free range men” though…the graphic alone is pretty funny. Dudes grazing and grifting the country-side. Man, you all are making me think Automation equals the Apocalyse…pretty bleak stuff. I just don’t like the math though; there are so many problems to be solved that need labor and new problems are coming along every day. Automation is a very manufactured thing that takes significant time and planning to move across numerous industries; and we are on the cusp of so many technologies that can change the landscape and job prospects. The automation argument feels like shadow boxing to me…no opponents…the real world will feint, jab and right hook
Brian: Melvin you are correct – Uber is purely a temporary solution – very much like contracting back in the 90’s was – when you could contract to provide something that did X for $Y – the company paying you didn’t pay for your time, but your skills. So if you could do it in an hour, great – otherwise they didn’t care – you had control again and that business model thrived for a while – I made lot as a grad-student during that time. But that situation didn’t last long – quickly the government got involved – too much cash changing hands, and various legalities were put in place to stop it, so that today that type of piece-meal contract work is for all intents illegal, at least in the US although thriving in other countries. It is THE business model in India and places in China for the moment.
But in the US you MUST work for a company – even if you are the company – 1099’s are increasingly difficult and becoming a thing of the past. It’s just a way to up the cost so that fewer people can stay in the game. This country always tries to figure out how to make money off something – because a growing number of bureaucrats are supported by that money. I saw that the US took in more money than ever in taxes this year – think about that for a minute, yet fewer people than ever are working – that is unsustainable, and we are well beyond what the Laffer curve predicted for the point where you discourage people from working (https://en.wikipedia.org/wiki/Laffer_curve) Look at how many older companies are now leasing cars for their workers, and I saw one in CA is providing housing if you work for them since they can write it off as a “tax” expense. That is where more opportunities are. I think that is what Uber, and Airbnb are all about – staying ahead of the taxman. Of course, this is a dangerous area as most bureaucrats are – shall we say, less than intelligent when it comes to technology? Or more importantly seeing the obvious ramifications of their laws.
Since I mentioned it, let’s look at AirBnB – that is in direct answer to the high taxes many cities layer on normal hotels, and AirBnb knows it and refuses to release names of the people who are participating in their business model. Why? Because today’s “business” environment for many cities (New York, San Francisco, etc) are unsustainable – it’s obvious, so technology is coming up with ways to dodge the laws and make money while they can – I saw a statistic where more companies are going out of business each year than are being started – which is a first for the US. And it’s been going on for a while. But that only works for so long.
There is an interesting article about China – they replaced 90% of their workforce in a plant and achieved an increase in efficiency of 90% (http://www.techrepublic.com/article/chinese-factory-replaces-90-of-humans-with-robots-production-soars/) That is the way of the future – but where do those 90% who were displaced go for a job? That is the question for the next decade…
Cheating website subscribers included WH, Congress workers
By JACK GILLUM and TED BRIDIS
Published: Aug 20, 2015
WASHINGTON (AP) – Hundreds of U.S. government employees – including some with sensitive jobs in the White House, Congress and law enforcement agencies – used Internet connections in their federal offices to access and pay membership fees to the cheating website Ashley Madison, The Associated Press has learned.
The AP traced many of the accounts exposed by hackers back to federal workers. They included at least two assistant U.S. attorneys; an information technology administrator in the Executive Office of the President; a division chief, an investigator and a trial attorney in the Justice Department; a government hacker at the Homeland Security Department and another DHS employee who indicated he worked on a U.S. counterterrorism response team.
Few actually paid for their services with their government email accounts. But AP traced their government Internet connections – logged by the website over five years – and reviewed their credit-card transactions to identify them. They included workers at more than two dozen Obama administration agencies, including the departments of State, Defense, Justice, Energy, Treasury, Transportation and Homeland Security. Others came from House or Senate computer networks.
The AP is not naming the government subscribers it found because they are not elected officials or accused of a crime.
Hackers this week released detailed records on millions of people registered with the website one month after the break-in at Ashley Madison’s parent company, Toronto-based Avid Life Media Inc. The website – whose slogan is, “Life is short. Have an affair” – is marketed to facilitate extramarital affairs.
Many federal customers appeared to use non-government email addresses with handles such as “sexlessmarriage,” ”soontobesingle” or “latinlovers.” Some Justice Department employees appeared to use pre-paid credit cards to help preserve their anonymity but connected to the service from their office computers.
“I was doing some things I shouldn’t have been doing,” a Justice Department investigator told the AP. Asked about the threat of blackmail, the investigator said if prompted he would reveal his actions to his family and employer to prevent it. “I’ve worked too hard all my life to be a victim of blackmail. That wouldn’t happen,” he said. He spoke on condition of anonymity because he was deeply embarrassed and not authorized by the government to speak to reporters using his name.
The AP’s analysis also found hundreds of transactions associated with Department of Defense networks, either at the Pentagon or from armed services connections elsewhere.
Defense Secretary Ash Carter confirmed the Pentagon was looking into the list of people who used military email addresses. Adultery can be a criminal offense under the Uniform Code of Military Justice.
“I’m aware it,” Carter said. “Of course it’s an issue because conduct is very important. And we expect good conduct on the part of our people. … The services are looking into it and as well they should be. Absolutely.”
The AP’s review was the first to reveal that federal workers used their office systems to access the site, based on their Internet Protocol addresses associated with credit card transactions. It focused on searching for government employees in especially sensitive positions who could perhaps become blackmail targets. The government hacker at the Homeland Security Department, who did not respond to phone or email messages, included photographs of his wife and infant son on his Facebook page.
One assistant U.S. attorney declined through a spokesman to speak to the AP, and another did not return phone or email messages.
A White House spokesman said Thursday he could not immediately comment on the matter. The IT administrator in the White House did not return email messages.
Federal policies vary for employees by agency as to whether they would be permitted during work hours to use websites like Ashley Madison, which could fall under the same category as dating websites. But it raises questions about what personal business is acceptable – and what websites are OK to visit – for government workers on taxpayer time, especially employees who could face blackmail.
The Homeland Security Department rules for use of work computers say the devices should be used for only for official purposes, though “limited personal use is authorized as long as this use does not interfere with official duties or cause degradation of network services.” Employees are barred from using government computers to access “inappropriate sites” including those that are “obscene, hateful, harmful, malicious, hostile, threatening, abusive, vulgar, defamatory, profane, or racially, sexually, or ethnically objectionable.”
The hackers who took credit for the break-in had accused the website’s owners of deceit and incompetence, and said the company refused to bow to their demands to close the site. Avid Life released a statement calling the hackers criminals. It added that law enforcement in both the U.S. and Canada is investigating and declined comment beyond its statement Tuesday that it was investigating the hackers’ claims.
___
Associated Press writers Alicia Caldwell and Lolita C. Baldor in Washington and Raphael Satter in London contributed to this report.
___
Follow Jack Gillum on Twitter at https://twitter.com/jackgillum and Ted Bridis at https://twitter.com/tbridis
