Friday, February 28, 2020
AI & Cyberthreats
22-1-23 How Governments Fund Cyberattacks - VisPol > .
24-4-15 AI Deception: How Tech Companies Are [Scamming Investors] - ColdF > .
24-2-19 AI Played Wargames - Result Not Reassuring - Sabine > .
24-1-6 R-U War: First Сyberwar in History 1 - UA > .
23-9-24 Combat Drones & Future Air Warfare - Humans + Wingman - Perun > .
23-9-30 Internet Backbone = Hidden Infrastructure - B1M > .
23-8-29 Major FBI Operation Targeted Qakbot Botnet - Director Wray > .
23-8-18 AI Origins to Catastrophism vs Optimism - gtbt > .
23-5-6 Artificial Intelligence: What's next? - Sabine Hossenfelder > .
23-3-3 Generative AI, ChatGPT, CG Art: Future of Work - Patrick Boyle > . skip > .
22-9-29 Is Your Laptop's Microphone Spying On You? - Seytonic > .
22-9-29 Pegasus: The Most Dangerous Virus In The World - Tech > .
22-8-6 Pegasus Spyware Leaks - Seytonic > .
22-6-21 Understanding R-U War (16) - Technology c Lucia Velasco > .
22-4-25 Ronan Farrow: How Democracies Spy on their Citizens | A&Co > .
22-4-19 How Cyberwarfare Actually Works (Stuxnet +) - Wendover > .
22-3-25 Cyberwarfare during/outset of Russian Invasion of Ukraine - nwyt > .
22-2-24 Pegasus: Israel's Spy system has Scandalized the World - VisPol > .
⧫ Cryptography ..
⧫ Cyberwar, Digital Warfare ..
⧫ Electronic Warfare, Microwave Assault ..
⧫ Future Warfare ..
⧫ Government, Logistics - Hybrid Warfare ..
⧫ Hardware ..
⧫ Hybrid Warfare ..
⧫ Hypothetical Warfare, Wargaming ..
⧫ Intelligence ..
⧫ Internet ..
⧫ IP Theft (industrial, intellectual property theft) ..
⧫ MILDEC - Military Deception ..
⧫ Military ..
⧫ Propaganda, Communications ..
⧫ Cyberwar, Digital Warfare ..
⧫ Electronic Warfare, Microwave Assault ..
⧫ Future Warfare ..
⧫ Government, Logistics - Hybrid Warfare ..
⧫ Hardware ..
⧫ Hybrid Warfare ..
⧫ Hypothetical Warfare, Wargaming ..
⧫ Intelligence ..
⧫ Internet ..
⧫ IP Theft (industrial, intellectual property theft) ..
⧫ MILDEC - Military Deception ..
⧫ Military ..
⧫ Propaganda, Communications ..
⧫ R&D ..
⧫ Surveillance, Spyware ..
⧫ Wargaming, Hypothetical Warfare ..
UK spies will need artificial intelligence - Rusi report: UK spies will need to use artificial intelligence (AI) to counter a range of threats, according to a report based on unprecedented access to British intelligence. Adversaries are likely to use the technology for attacks in cyberspace and on the political system, and AI will be needed to detect and stop them.
AI is unlikely to predict who might be about to be involved in serious crimes, such as terrorism - and will not replace human judgement. Acts such as terrorism are too infrequent to provide sufficiently large historical datasets to look for patterns - they happen far less often than other criminal acts, such as burglary.
Even within that data set, the background and ideologies of the perpetrators vary so much that it is hard to build a model of a terrorist profile. There are too many variables to make prediction straightforward, with new events potentially being radically different from previous ones.
The Royal United Services Institute (Rusi) think tank also argues that the use of AI could give rise to new privacy and human-rights considerations, which will require new guidance. Any kind of profiling could also be discriminatory and lead to new human-rights concerns.
Privacy advocates fear that artificial intelligence will require collecting and analysing far larger amounts of data from ordinary people, in order to understand and search for patterns, that create a new level of intrusion. The authors of the report believe new rules will be needed.
⧫ Surveillance, Spyware ..
⧫ Wargaming, Hypothetical Warfare ..
The future threats could include using AI to develop deep fakes - where a computer can learn to generate convincing faked video of a real person - in order to manipulate public opinion and elections. It might also be used to mutate malware for cyber-attacks, making it harder for normal systems to detect - or even to repurpose and control drones to carry out attacks. In such cases, AI will be needed to counter AI.
AI is unlikely to predict who might be about to be involved in serious crimes, such as terrorism - and will not replace human judgement. Acts such as terrorism are too infrequent to provide sufficiently large historical datasets to look for patterns - they happen far less often than other criminal acts, such as burglary.
Even within that data set, the background and ideologies of the perpetrators vary so much that it is hard to build a model of a terrorist profile. There are too many variables to make prediction straightforward, with new events potentially being radically different from previous ones.
In practice, in fields like counter-terrorism, the report argues that "augmented" - rather than artificial - intelligence will be the norm - where technology helps human analysts sift through and prioritise increasingly large amounts of data, allowing humans to make their own judgements.
One of the thorny legal and ethical questions for spy agencies, especially since the Edward Snowden revelations, is how justifiable it is to collect large amounts of data from ordinary people in order to sift it and analyse it to look for those who might be involved in terrorism or other criminal activity. A related question concerns how far privacy is violated when data is collected and analysed by a machine versus when a human sees it.
Privacy advocates fear that artificial intelligence will require collecting and analysing far larger amounts of data from ordinary people, in order to understand and search for patterns, that create a new level of intrusion. The authors of the report believe new rules will be needed.
AI Weaponry
.
24-4-5 Israel's Lavender System, AI Targeting, Battlefield Informatics - McBeth > .
22-10-14 US-China: Tech | Semiconductors - Update > .
22-2-27 Armed Drones Disrupt Modern Warfare (Nagorno-Karabakh) - Asianometry > .
21-3-23 RADICAL RESHAPE For The UK Military - Forces > .
21-3-23 RADICAL RESHAPE For The UK Military - Forces > .
Lethal Autonomous Weapon Systems (LAWS), AI algorithms,
⧫ Cryptography ..
⧫ Cyberwar, Digital Warfare ..
⧫ Electronic Warfare, Microwave Assault ..
⧫ Future Warfare ..
⧫ Government, Logistics - Hybrid Warfare ..
⧫ Hardware ..
⧫ Hybrid Warfare ..
⧫ Hypothetical Warfare, Wargaming ..
⧫ Intelligence ..
⧫ Internet ..
⧫ IP Theft (industrial, intellectual property theft) ..
⧫ MILDEC - Military Deception ..
⧫ Military ..
⧫ Propaganda, Communications ..
⧫ Cyberwar, Digital Warfare ..
⧫ Electronic Warfare, Microwave Assault ..
⧫ Future Warfare ..
⧫ Government, Logistics - Hybrid Warfare ..
⧫ Hardware ..
⧫ Hybrid Warfare ..
⧫ Hypothetical Warfare, Wargaming ..
⧫ Intelligence ..
⧫ Internet ..
⧫ IP Theft (industrial, intellectual property theft) ..
⧫ MILDEC - Military Deception ..
⧫ Military ..
⧫ Propaganda, Communications ..
The report counters that if autonomous weapons systems have been properly tested and are authorised for use by a human commander, then they should be consistent with International Humanitarian Law.
Much of the 750-page report focuses on how to counter China's ambition to be a world leader in AI by 2030. It says that senior military leaders have warned the US could "lose its military-technical superiority in the coming years" if China leapfrogs it by adopting AI-enabled systems more quickly - for example by using swarming drones to attack the US Navy.
The report maintains that the White House should press Moscow and Beijing to issue public commitments of their own over this matter.
Other proposals include:
- creating a new body to help the president guide the US's wider AI policies
- relaxing immigration laws to help attract talent from abroad, including an effort to increase a "brain drain" from China
- creating a new university to train digitally-talented civil servants
- accelerating the adoption of new technologies by the US's intelligence agencies
President Biden has already ordered a review of the US semiconductor industry, and last week pledged support for a $37bn plan by Congress to boost local output.
The report contends that export restrictions need to be put in place to prevent China being able to import the photolithography machines required to make the most advanced types of chips with the smallest transistors. This, it says, will require the co-operation of the governments of the Netherlands and Japan, whose companies specialise in these tools.
The report contends that export restrictions need to be put in place to prevent China being able to import the photolithography machines required to make the most advanced types of chips with the smallest transistors. This, it says, will require the co-operation of the governments of the Netherlands and Japan, whose companies specialise in these tools.
China's semiconductor-makers have been seeking out second-hand photolithography equipment to do this, buying up as much as 90% of available stock, according to a report in Nikkei Asia. However, these older machines are not capable of producing the most advanced chips, which are prized for use in both the latest smartphones and other consumer gadgets, as well as military applications.
In addition, the report says US firms that export chips to China should be compelled to certify they are not used to "facilitate human rights abuses", and should submit quarterly reports to the Department of Commerce listing all chip sales to China. This follows allegations that chips from American firms Intel and Nvidia were used to conduct mass surveillance against China's Uighur ethnic minority in its Xinjiang region.
Thursday, February 27, 2020
Belarus↔(Russia)→Lithuania, Poland, EU
23-12-23 Why Poland is Divided - Present Past > .
22-12-30 Suwalki Gap: NATO's Weakest Point? | BFBS > .
21-12-14 Belarus Against Europe - RealLifeLore > .
> EU Migrant Crisis >> Economic & Climate Migrants
24-3-14 German-Polish Tensions - Modern > .
24-5-17 Poland Preparing for War - T&P > .
Proxy War
23-8-19 Art of War: Proxy Warfare - Warographics > . skip > .
00:00 Intro
00:45 Border Crisis
05:55 Information Warfare
13:45 The End of Strategic Sleep
17:35 Outro
00:45 Border Crisis
05:55 Information Warfare
13:45 The End of Strategic Sleep
17:35 Outro
British Army - Digital Transformation
21-5-12 Digital Transformation: How Can The Army Adapt For Future Warfare? > .
24-2-19 AI Played Wargames - Result Not Reassuring - Sabine > .
24-2-6 Exclusive: Head of UK Strategic Command's full in-depth interview - Forces > .
24-2-1 Could National Service fix British forces recruitment crisis? | Sitrep > .
23-9-11 British Army ⇒ most lethal army in Europe by 2030 - CGS - Forces > .
23-7-19 Cyber & Technologies in Defence Command Paper - Forces > .
23-7-18 Futureproofing for changing threats; Defence Command Paper - Forces > .
22-9-29 Is Your Laptop's Microphone Spying On You? - Seytonic > .
22-9-29 Pegasus: The Most Dangerous Virus In The World - Tech > .
> EuM - European Defense >> EU Army?
> Future Combat >> >> Future >>>
British Forces - 21st C ..
⧫ Cryptography ..
⧫ Cyberwar, Digital Warfare ..
⧫ Electronic Warfare, Microwave Assault ..
⧫ Future Warfare ..
⧫ Government, Logistics - Hybrid Warfare ..
⧫ Hardware ..
⧫ Hybrid Warfare ..
⧫ Hypothetical Warfare, Wargaming ..
⧫ Intelligence ..
⧫ Internet ..
⧫ IP Theft (industrial, intellectual property theft) ..
⧫ MILDEC - Military Deception ..
⧫ Military ..
⧫ Propaganda, Communications ..
⧫ Cyberwar, Digital Warfare ..
⧫ Electronic Warfare, Microwave Assault ..
⧫ Future Warfare ..
⧫ Government, Logistics - Hybrid Warfare ..
⧫ Hardware ..
⧫ Hybrid Warfare ..
⧫ Hypothetical Warfare, Wargaming ..
⧫ Intelligence ..
⧫ Internet ..
⧫ IP Theft (industrial, intellectual property theft) ..
⧫ MILDEC - Military Deception ..
⧫ Military ..
⧫ Propaganda, Communications ..
Wednesday, February 26, 2020
China-US-USSR Cyberwar
21-12-25 Economics of War - Learn Economics > .
19-8-26 Resurgent Russia > .
20-3-3 China economy: Why it matters > .
19-8-26 Resurgent Russia > .
20-3-3 China economy: Why it matters > .
22-2-24 Pegasus: Israel's Spy system has Scandalized the World - VisPol > .
Proxy War
23-8-19 Art of War: Proxy Warfare - Warographics > . skip > .
⧫ Cryptography ..
⧫ Cyberwar, Digital Warfare ..
⧫ Electronic Warfare, Microwave Assault ..
⧫ Future Warfare ..
⧫ Government, Logistics - Hybrid Warfare ..
⧫ Hardware ..
⧫ Hybrid Warfare ..
⧫ Hypothetical Warfare, Wargaming ..
⧫ Intelligence ..
⧫ Internet ..
⧫ IP Theft (industrial, intellectual property theft) ..
⧫ MILDEC - Military Deception ..
⧫ Military ..
⧫ Propaganda, Communications ..
⧫ Cyberwar, Digital Warfare ..
⧫ Electronic Warfare, Microwave Assault ..
⧫ Future Warfare ..
⧫ Government, Logistics - Hybrid Warfare ..
⧫ Hardware ..
⧫ Hybrid Warfare ..
⧫ Hypothetical Warfare, Wargaming ..
⧫ Intelligence ..
⧫ Internet ..
⧫ IP Theft (industrial, intellectual property theft) ..
⧫ MILDEC - Military Deception ..
⧫ Military ..
⧫ Propaganda, Communications ..
CIA Spy Gadgets
22-9-27 Most Unbelievable Things the CIA Has Done - Side > .
22-8-6 Pegasus Spyware Leaks - Seytonic > .
⧫ CIA ..
⧫ Cryptography ..
⧫ Cyberwar, Digital Warfare ..
⧫ Electronic Warfare, Microwave Assault ..
⧫ Future Warfare ..
⧫ Government, Logistics - Hybrid Warfare ..
⧫ Hardware ..
⧫ Hybrid Warfare ..
⧫ Hypothetical Warfare, Wargaming ..
⧫ Intelligence ..
⧫ Internet ..
⧫ IP Theft (industrial, intellectual property theft) ..
⧫ MILDEC - Military Deception ..
⧫ Military ..
⧫ Propaganda, Communications ..
⧫ Cyberwar, Digital Warfare ..
⧫ Electronic Warfare, Microwave Assault ..
⧫ Future Warfare ..
⧫ Government, Logistics - Hybrid Warfare ..
⧫ Hardware ..
⧫ Hybrid Warfare ..
⧫ Hypothetical Warfare, Wargaming ..
⧫ Intelligence ..
⧫ Internet ..
⧫ IP Theft (industrial, intellectual property theft) ..
⧫ MILDEC - Military Deception ..
⧫ Military ..
⧫ Propaganda, Communications ..
Conflict - Covert, Overt
23-5-30 Ruscia, Xina and Iran - New Axis [of Evil] - K&G > .
24-6-12 [Raisi, water, Iran, Azerbaijan, Armenia, Ruscia, Turkey] | gtbt > .
24-5-14 Calder Walton's "Spies": Century-long East-West Espionage War - SiCu > .
24-4-17 [XiP00gandistic Hypocrisy & Strategic Dicklomatic Stumbles] - Digging > .
24-3-6 Could the Mossad Have Stopped Iran? | Unpacked > .
24-3-5 Alliance Between Venezuela and Iran - IDF > .
24-2-8 Israel: High-Tech Military; Intelligence Failure - Caspian > .
24-1-6 R-U War: First Сyberwar in History 1 - UA > .
23-12-20 Undersea fibre-optic cables could be geopolitical frontier | ABC Aus > .
23-11-5 [XIR] Corrupt, Sanctioned Iran's Military, Proxies, Power Projection - Perun > .
23-10-25 US & [I-P-CW] vs Xina: Preparations to Fight War - Real > .
23-10-25 [Five Eyes Summit; XiXiP Whining About Exposure] - Update > .
23-10-24 [PooXi, P00ti Secrets at BRI Forum: NoXious World Order - Insight > .
23-10-17 Xina’s Illegal Man-Made Military Islands = Ecological Disaster - Map > .
23-10-16 Xina's Hypocrisy re Hamas Atrocities-Israel's Response - Digging > .
23-10-14 [Nefarious Hybrid XIR "want to destroy America" Plot] - Versed > .
23-10-12 Killing Civilians: The New Normal | Wonder Land: WSJ > .
23-10-6 [Latest Orcine Terrorism & P00ti's Latest Terrified LIES] (subs) - Katz > .
23-9-29 Decoding P00ti-PooXi blueprint for NoXious World Order | DW > .
23-9-16 "Belt & Road to Death" - [XiXiP targeted corrupt governments] - Obs > .
23-9-14 Kill or capture? Morality of assassination in war | DiD - Tele > .
23-9-30 Internet Backbone = Hidden Infrastructure - B1M > .
Hybrid warfare (covert military strategy) which employs political warfare and blends conventional warfare, irregular warfare, and cyberwarfare with other influencing methods, such as fake news, diplomacy, lawfare and foreign electoral intervention. By combining kinetic operations with subversive efforts, the aggressor intends to avoid attribution or retribution.
23-6-9 33 Strategies of War - RoGr > .
Anti-XIR
Communications Infrastructure
"Kinetic military action" is a euphemism for (overt) military action involving active warfare, including lethal force. The phrase is used to contrast between conventional military (kinetic) action from "soft" force increasingly used against enemies, including diplomacy, sanctions and cyber warfare.
Innovation, Invention ↠
Active measures . Asymmetric warfare . Critical infrastructure protection . Proactive cyber defence . Unconventional warfare . Corporate warfare . Economic warfare . Psychological warfare . Political warfare . Organized crime . Cold War II § Novel risks and measures for preventing escalation . Internet manipulation . Accelerated pluralism . Destabilisation . European Centre of Excellence for Countering Hybrid Threats . Cabbage tactics . Unit 29155 .
33 Strategies of War - RoGr = 1) Declare War on Your Enemies 2) Do Not Fight the Last War 3) Do Not Lose Your Presence of Mind 4) Create a Sense of Urgency & Desperation 5) Avoid The Snare of Groupthink 6) Segment Your Forces 7) Transform Your War into a Crusade 8) Pick Your Battles 9) Turn the Tables 10) Create a Threatening Presence 11) Trade Space for Time 12) Lose The Battles But Win The War 13) Know Your Enemy 14) Overwhelm Resistance With Speed and Suddenness 15) Control the Dynamic 16) Hit Them Where it Hurts 17) Defeat Them in Detail 18) Expose and Attack Your Enemy's Soft Flank 19) Envelop The Enemy 20) Maneuver Them Into Weakness 21) Negotiate While Advancing 22) Know How To End Things 23) Weave a Seamless Blend of Fact and Fiction 24) Take The Line of Least Expectation 25) Occupy the Moral High Ground 26) Deny Them Targets 27) Seem to Work for the Interests of Others 28) Give Your Rivals Enough Rope To Hang Themselves 29) Take Small Bites 30) Penetrate Their Minds 31) Destroy From Within 32) Dominate While Seeming to Submit 33) The Chain Reaction Strategy
33 Strategies of War - RoGr = 1) Declare War on Your Enemies 2) Do Not Fight the Last War 3) Do Not Lose Your Presence of Mind 4) Create a Sense of Urgency & Desperation 5) Avoid The Snare of Groupthink 6) Segment Your Forces 7) Transform Your War into a Crusade 8) Pick Your Battles 9) Turn the Tables 10) Create a Threatening Presence 11) Trade Space for Time 12) Lose The Battles But Win The War 13) Know Your Enemy 14) Overwhelm Resistance With Speed and Suddenness 15) Control the Dynamic 16) Hit Them Where it Hurts 17) Defeat Them in Detail 18) Expose and Attack Your Enemy's Soft Flank 19) Envelop The Enemy 20) Maneuver Them Into Weakness 21) Negotiate While Advancing 22) Know How To End Things 23) Weave a Seamless Blend of Fact and Fiction 24) Take The Line of Least Expectation 25) Occupy the Moral High Ground 26) Deny Them Targets 27) Seem to Work for the Interests of Others 28) Give Your Rivals Enough Rope To Hang Themselves 29) Take Small Bites 30) Penetrate Their Minds 31) Destroy From Within 32) Dominate While Seeming to Submit 33) The Chain Reaction Strategy
Cyberwar - Xina vs USA
2021 Cyber War - US vs China: Has the US Already Lost? - CoCa > .
24-1-29 [Did E Peng III cut Baltic submarine cable?] - Update > .
24-6-20 Hazardous Life of an Undersea Cable - Asianometry > .
24-4-15 AI Deception: How Tech Companies Are [Scamming Investors] - ColdF > .
24-2-16 Undersea Cables, Sabotage, Internet, Surveillance - CuDr > . skip > .
24-2-15 H4D - Hacking for Defense, Gordian Knot | Policy Stories - Hoover > .
24-1-6 R-U War: First Сyberwar in History 1 - UA > .
23-12-20 Undersea fibre-optic cables could be geopolitical frontier | ABC Aus > .
23-10-18 US-Xina Tech Competition | Update > .
23-9-9 Tech War: Xina's Future Shaky; AI Industry Competion - BuBa > .
23-9-30 Internet Backbone = Hidden Infrastructure - B1M > .
23-8-29 Major FBI Operation Targeted Qakbot Botnet - Director Wray > .
23-8-18 AI Origins to Catastrophism vs Optimism - gtbt > .
23-6-19 Xina's Spy Base in Cuba = Creeping On America's Doorstep - Uncensored > .
23-5-6 Artificial Intelligence: What's next? - Sabine Hossenfelder > .
23-3-3 Generative AI, ChatGPT, CG Art: Future of Work - Patrick Boyle > . skip > .
22-10-12 Biden Bans Xina's Access to Advanced Semiconductors | Zeihan - now > .
22-9-29 Is Your Laptop's Microphone Spying On You? - Seytonic > .
22-9-29 Pegasus: The Most Dangerous Virus In The World - Tech > .
22-8-6 Pegasus Spyware Leaks - Seytonic > .
22-4-25 Ronan Farrow: How Democracies Spy on their Citizens | A&Co > .
22-4-19 How Cyberwarfare Actually Works (Stuxnet +) - Wendover > .
21-5-16 Next Phase in Cyber Warfare - Red Line Podcast > .
⧫ Cryptography ..
⧫ Cyberwar, Digital Warfare ..
⧫ Electronic Warfare, Microwave Assault ..
⧫ Future Warfare ..
⧫ Government, Logistics - Hybrid Warfare ..
⧫ Hardware ..
⧫ Hybrid Warfare ..
⧫ Hypothetical Warfare, Wargaming ..
⧫ Intelligence ..
⧫ Internet ..
⧫ IP Theft (industrial, intellectual property theft) ..
⧫ MILDEC - Military Deception ..
⧫ Military ..
⧫ Propaganda, Communications ..
⧫ Cyberwar, Digital Warfare ..
⧫ Electronic Warfare, Microwave Assault ..
⧫ Future Warfare ..
⧫ Government, Logistics - Hybrid Warfare ..
⧫ Hardware ..
⧫ Hybrid Warfare ..
⧫ Hypothetical Warfare, Wargaming ..
⧫ Intelligence ..
⧫ Internet ..
⧫ IP Theft (industrial, intellectual property theft) ..
⧫ MILDEC - Military Deception ..
⧫ Military ..
⧫ Propaganda, Communications ..
Subscribe to:
Posts (Atom)
sī vīs pācem, parā bellum
igitur quī dēsīderat pācem praeparet bellum therefore, he who desires peace, let him prepare for war sī vīs pācem, parā bellum if you wan...
-
>>> Economic > >>> Geopolitics > >>> Military > >>> Resources > > >> Sociopoli...
-
>> playlists >> » >> pages □□ »□ ⧫⧫ section indexes ⧫⧫ ⧫⧫ & ⧫ alphabetic index ⧫⧫ & ⧫ ● Geographic Entities ...
-
> > Alliances > > > > Authoritarianism > > > > Civil Wars > > > > Ċold Ŵar 2 Geopolitics ...