Science and Technology
Tracking and ID, Mind Control, Super Soldiers...
created 03/12/2003 - 02:16, updated 03/12/2003 - 02:24 by cybe
...The analogy between cars and operating systems is not half bad, and so let
me run with it for a moment, as a way of giving an executive summary of our
Imagine a crossroads where four competing auto dealerships are situated. One
of them (Microsoft) is much, much bigger than the others. It started out years
ago selling three-speed bicycles (MS-DOS); these were not perfect, but they
worked, and when they broke you could easily fix them.
There was a competing bicycle dealership next door (Apple) that one day began
selling motorized vehicles--expensive but attractively styled cars with their
innards hermetically sealed, so that how they worked was something of a mystery.
The big dealership responded by rushing a moped upgrade kit (the original Windows)
onto the market. This was a Rube Goldberg contraption that, when bolted onto
a three-speed bicycle, enabled it to keep up, just barely, with Apple-cars.
The users had to wear goggles and were always picking bugs out of their teeth
while Apple owners sped along in hermetically sealed comfort, sneering out the
windows. But the Micro-mopeds were cheap, and easy to fix compared with the
Apple-cars, and their market share waxed.
Eventually the big dealership came out with a full-fledged car: a colossal
station wagon (Windows 95). It had all the aesthetic appeal of a Soviet worker
housing block, it leaked oil and blew gaskets, and it was an enormous success.
A little later, they also came out with a hulking off-road vehicle intended
for industrial users (Windows NT) which was no more beautiful than the station
wagon, and only a little more reliable.
Since then there has been a lot of noise and shouting, but little has changed.
The smaller dealership continues to sell sleek Euro-styled sedans and to spend
a lot of money on advertising campaigns. They have had GOING OUT OF BUSINESS!
signs taped up in their windows for so long that they have gotten all yellow
and curly. The big one keeps making bigger and bigger station wagons and ORVs.
On the other side of the road are two competitors that have come along more
One of them (Be, Inc.) is selling fully operational Batmobiles (the BeOS).
They are more beautiful and stylish even than the Euro-sedans, better designed,
more technologically advanced, and at least as reliable as anything else on
the market--and yet cheaper than the others.
With one exception, that is: Linux, which is
right next door, and which is not a business at all. It's a bunch of RVs, yurts,
tepees, and geodesic domes set up in a field and organized by consensus. The
people who live there are making tanks. These are not old-fashioned, cast-iron
Soviet tanks; these are more like the M1 tanks of the U.S. Army, made of space-age
materials and jammed with sophisticated technology from one end to the other.
But they are better than Army tanks. They've been modified in such a way that
they never, ever break down, are light and maneuverable enough to use on ordinary
streets, and use no more fuel than a subcompact car. These tanks are being cranked
out, on the spot, at a terrific pace, and a vast number of them are lined up
along the edge of the road with keys in the ignition. Anyone who wants can simply
climb into one and drive it away for free.
Customers come to this crossroads in throngs, day and night. Ninety percent
of them go straight to the biggest dealership and buy station wagons or off-road
vehicles. They do not even look at the other dealerships.
Of the remaining ten percent, most go and buy a sleek Euro-sedan, pausing only
to turn up their noses at the philistines going to buy the station wagons and
ORVs. If they even notice the people on the opposite side of the road, selling
the cheaper, technically superior vehicles, these customers deride them cranks
The Batmobile outlet sells a few vehicles to the occasional car nut who wants
a second vehicle to go with his station wagon, but seems to accept, at least
for now, that it's a fringe player.
The group giving away the free tanks only stays alive because it is staffed
by volunteers, who are lined up at the edge of the street with bullhorns, trying
to draw customers' attention to this incredible situation. A typical conversation
goes something like this:
Hacker with bullhorn: "Save your money! Accept one of our free tanks!
It is invulnerable, and can drive across rocks and swamps at ninety miles an
hour while getting a hundred miles to the gallon!"
Prospective station wagon buyer: "I know what you say is true...but...er...I
don't know how to maintain a tank!"
Bullhorn: "You don't know how to maintain a station wagon either!"
Buyer: "But this dealership has mechanics on staff. If something goes
wrong with my station wagon, I can take a day off work, bring it here, and pay
them to work on it while I sit in the waiting room for hours, listening to elevator
Bullhorn: "But if you accept one of our free tanks we will send volunteers
to your house to fix it for free while you sleep!"
Buyer: "Stay away from my house, you freak!"
Buyer: "Can't you see that everyone is buying station wagons?".....
Complete article: "In
the Beginning was the Command Line" by Neal Stephenson
The author of 100777.com favors Open Source and Free Software, and uses
Gentoo Linux. This site is built on another
open source project called Drupal. ""Save
your money! Accept one free tank! "
created 26/11/2003 - 16:00, updated 13/09/2005 - 12:11 by cybe
By Marjorie Tietjen
"Traditionally, religion has looked on the world of natural science as
opposed to the world of Spirit, but paradoxically, today, it is the world of
science that is unwittingly preparing human thought for this breakthrough, by
uncovering the ephemeral nature of matter at it's basic levels, and showing
the relationship between mind and matter. This makes it easier to concieve of
a mental or a transcendent reality. Thought is more prepared to consider the
spiritual foundations of theology, and eventually to connect
with the creative governing intelligence of the universe, that we call God."
Mindpower and The Spiritual Dimension" by Richard Haw
We are all aware of the many trials and tribulations that our world is presently
experiencing. Evil, in the form of pollution, crime,
hatred, greed, and moral decline, seems to be increasing in proportion to the
current materialistic outlook. It would seem then that the remedy for these
ills is not more materialism, but a looking away from matter towards Spirit,
towards the true nature of our relationship to the Infinite Source of All Being.
This wouldn't mean that we ignore our present basic material needs but when
we turn to the "Divine Mind", the
Collective Conciousness, or Spirit (God), whatever term one wants to use,
then, and only then will we find true, practical and lasting solutions which
would benefit everyone involved. I've
seen this principle demonstrated and therefore know it to be true.
Einstein once said that anyone studying physics long enough is inevitably led
created 19/11/2003 - 00:35, updated 31/05/2004 - 17:59 by cybe
By Tabassum Zakaria
WASHINGTON (Reuters) - A panel of outside experts told the CIA
that advances in technology due to genomic research could produce the worst
known diseases and the "most frightening" biological weapons, a CIA
report said on Friday.
"The effects of some of these engineered biological agents could be worse
than any disease known to man," the panel told the CIA.
The unclassified two-page CIA report dated Nov. 3, 2003, and titled "The
Darker Bioweapons Future," was posted on the Federation of American Scientists
Web site at http:/www.fas.org/irp/cia/product/bw1103.pdf.
It summed up a January workshop of a panel of non-government science experts
who discussed with the CIA the potential threat from new biological weapons.
Growth in biotechnology and a knowledge explosion due to the genomic revolution
which provided an understanding of genes and how they work could be used in
unpredictable ways, the panel warned.
"The same science that may cure some of our worst
diseases could be used to create the world's most frightening weapons,"
the report said.
In the next decade or beyond, some of the unconventional pathogens that could
arise included binary biological warfare agents that only become effective when
two components are combined, such as a mild pathogen and its antidote, the panel
of experts said.
There could be development of "designer" biological warfare agents
created to be antibiotic-resistant or evade an immune response, weaponized gene
therapy vectors that cause permanent change in the victim's genetic makeup,
or a "stealth" virus which could lie dormant inside the victim for
an extended period before being triggered, the report said.
STEALTH VIRUS ATTACK
One panelist gave as an example the possibility of a stealth virus attack that
could cripple a large portion of people in their forties with severe arthritis,
leaving a country with massive health and economic problems.
"The resulting diversity of new BW (biological warfare) agents could enable
such a broad range of attack scenarios that it would be virtually impossible
to anticipate and defend against," the report said. "As a result,
there could be a considerable lag time in developing effective biodefense measures."
Traditional intelligence methods for monitoring development of weapons of mass
destruction "could prove inadequate" in dealing with the threat from
advanced biological weapons, the report said.
Detecting the development of novel bioengineered pathogens will increasingly
depend on human intelligence and require a closer working relationship between
the intelligence and biological sciences community, the report said.
One panelist proposed that the bioscience community help government by acting
as a "living sensor web" at international conferences, in university
labs and through informal networks, to identify and alert about new technical
advances with weaponization potential, the report said.
"The quality of intelligence can only improve from the rough and tumble
of peer review and outside input," said Steven Aftergood, director of the
government secrecy project at the Federation of American Scientists.
"In the past, CIA has been completely insular, they have been unwilling
to engage with outside experts," he said, "and so this is a welcome
departure from that norm."
Copyright © 2003 Reuters Limited. All rights reserved. Republication or
redistribution of Reuters content is expressly prohibited without the prior
written consent of Reuters. Reuters shall not be liable for any errors or delays
in the content, or for any actions taken in reliance thereon.
There is apparently a human gene mutation,
"CCR-5-delta-32", which makes its holders immune to AIDS
The Secrets of the Dead episode
begins not with HIV but by investigating why so many residents of Eyam, England,
survived the Black Death when it hit the remote village in 1665. Research by
geneticist Stephen O'Brien has traced Crohn's DELTA 32 mutation back hundreds of
years to towns like Eyam, where the defensive genetic mutation held off the
Black Death in much the same way it now protects Steve Crohn from HIV. Today,
about 10% of people of European heritage are estimated to be "DELTA
32-homozygous," having inherited the genetic mutation from both parents.
A virus known to cause obesity in animals has been tied to weight problems in humans, raising the possibility that some people "catch" obesity and that, in some cases, it could be an infectious disease...
- TC / TCG / LaGrande
/ NGSCB / Longhorn / Palladium / TCPA -
Version 1.1 (August
1. What is TC - this `trusted
Computing Group (TCG) is an alliance of Microsoft, Intel, IBM, HP
and AMD which promotes a standard for a `more secure' PC. Their
definition of `security' is controversial; machines built
according to their specification will be more trustworthy from the
point of view of software vendors and the content industry, but will
be less trustworthy from the point of view of their owners. In effect,
the TCG specification will transfer the ultimate control of your PC
from you to whoever wrote the software it happens to be running. (Yes,
even more so than at present.)
The TCG project is known by a number
of names. `Trusted computing' was
the original one, and is still used by IBM, while Microsoft calls it
`trustworthy computing' and the Free Software Foundation calls it `treacherous
computing'. Hereafter I'll just call it TC, which you can
pronounce according to taste. Other names you may see include TCPA
(TCG's name before it incorporated), Palladium
(the old Microsoft name for the version due
to ship in 2004) and NGSCB
(the new Microsoft name). Intel has just started calling it `safer
computing'. Many observers believe that this confusion is deliberate -
the promoters want to deflect attention from what TC actually does.
2. What does TC do, in
TC provides a computing platform on
which you can't tamper with the
application software, and where these applications can communicate
securely with their authors and with each other. The original
motivation was digital
rights management (DRM): Disney will be able to sell you DVDs that
will decrypt and run on a TC platform, but which you won't be able to
copy. The music industry will be able to sell you music downloads that
you won't be able to swap. They will be able to sell you CDs that
you'll only be able to play three times, or only on your birthday.
All sorts of new marketing possibilities will open up.
TC will also make it much harder for
you to run unlicensed software.
In the first version of TC, pirate software could be detected and
deleted remotely. Since then, Microsoft has sometimes denied that it
intended TC to do this, but at WEIS 2003 a
senior Microsoft manager refused to deny that fighting piracy was a
goal: `Helping people to run stolen software just isn't our aim in
life', he said. The mechanisms now proposed are more subtle, though.
TC will protect application software registration
mechanisms, so that unlicensed software will be locked out of the
new ecology. Furthermore, TC apps will work better with other TC
apps, so people will get less value from old non-TC apps (including
pirate apps). Also, some TC apps may reject data from old apps whose
serial numbers have been blacklisted. If Microsoft believes that your
copy of Office is a pirate copy, and your local government moves to
TC, then the documents you file with them may be unreadable. TC will
also make it easier for people to rent software rather than buy it;
and if you stop paying the rent, then not only does the software stop
working but so may the files it created. So if you stop paying for
upgrades to Media Player, you may lose access to all the songs you
bought using it.
For years, Bill Gates has dreamed of
finding a way to make
pay for software: TC looks like being the answer to his prayer.
There are many other possibilities.
Governments will be able to
arrange things so that all Word documents created on civil servants'
PCs are `born classified' and can't be leaked electronically to
journalists. Auction sites might insist that you use trusted proxy
software for bidding, so that you can't bid tactically at the
auction. Cheating at computer games could be made more difficult.
There are some gotchas too. For
example, TC can support remote
censorship. In its simplest form, applications may be designed to
delete pirated music under remote control. For example, if a protected
song is extracted from a hacked TC platform and made available on the
web as an MP3 file, then TC-compliant media player software may detect
it using a watermark, report it, and be instructed remotely to delete
it (as well as all other material that came through that platform).
This business model, called traitor tracing, has been researched
extensively by Microsoft (and others). In general, digital objects
created using TC systems remain under the control of their creators,
rather than under the control of the person who owns the machine on
which they happen to be stored (as at present). So someone who writes
a paper that a court decides is defamatory can be compelled to censor
it - and the software company that wrote the word processor could be
ordered to do the deletion if she refuses. Given such possibilities,
we can expect TC to be used to suppress everything from pornography to
writings that criticise political leaders.
The gotcha for businesses is that your
software suppliers can make it
much harder for you to switch to their competitors' products. At a
simple level, Word could encrypt all your documents using keys that
only Microsoft products have access to; this would mean that you could
only read them using Microsoft products, not with any competing word
processor. Such blatant lock-in might be prohibited by the competition
authorities, but there are subtler lock-in strategies that are much
harder to regulate. (I'll explain some of them below.)
continued at http://www.againsttcpa.com/tcpa-faq-en.html
created 17/10/2003 - 14:12, updated 24/09/2005 - 11:12 by cybe
- Exclusive to American
By Gordon Thomas
A top North Korean scientist, working on a race-based bomb, has
vanished. Was he taken by Western intelligence operatives or did the
Chinese nab him?
- Has Dr. Ri Chae Woo, North Korea,s
world-ranking expert working on a "whites-only" racial/genetic bomb,
been snatched in a combined CIA, MI6 and Australian
secret service operation? Or has Ri been grabbed by the Chinese Secret
Intelligence Service"so that the communist government can discover just
how far Kim Jong II, North Korea,s unpredictable dictator, has advanced
his threat to launch the ethnic bomb upon the world?
created 16/10/2003 - 00:54, updated 16/10/2003 - 00:58 by cybe
So is the bible scientifically reliable? Does it contain insightful
scientific truths way ahead of its time? First, let's consider some
ancient eastern wisdom: "The moon is
50,000 leagues higher than the sun, and shines by its own light; night
is caused by the sun's setting behind a huge mountain several thousand
feet high, located in the centre of the earth, that this world, flat
and triangular is composed of 7 states - one of honey, another of
sugar, a third of butter, and still another of wine, and the whole mass
is borne on the heads of countless elephants which in shaking produce
No it's not a joke, this is from the Hindu sacred book known as the
Vedas. This great wisdom represents the popular cosmology of the day.
The pagans said that the earth was supported by a giant man called
atlas, while the Greeks had horses, elephants and snakes supporting the
planet. This 'knowledge' was well known and trusted at the time the
bible was being written, yet one of the oldest books of the bible
"He stretches out the north over empty space; He
hangs the earth on nothing." Job 26:7 (NKJV) "He sits enthroned upon
the circle of the earth" Isaiah 40:22*
The bible writers somehow resisted the temptation to follow the
science of their day, choosing instead to portray some astonishing
scientific truth, way ahead of its time:
Before we look at these "scientific facts" in the Bible, I must
preface them with some very important information. To do this, I will
have to quote the Bible. This is not using what is commonly called
"circular reasoning." I simply want to make a point that is relevant to
what I am going to present.
created 29/09/2003 - 17:01, updated 19/12/2004 - 03:50
`Trusted Computing' Frequently Asked Questions
Version 1.1 (August 2003)
Trusted Computing' Frequently Asked Questions
- TC / TCG / LaGrande / NGSCB / Longhorn / Palladium / TCPA
1. What is TC - this `trusted computing' business?
created 29/09/2003 - 17:01, updated 19/12/2004 - 03:51
Bush creates Orwellian society
By Matthew Brophy
September 27, 2002
Freedom is Slavery; War is Peace; Ignorance is Strength. This is the
heralded by Big Brother in George Orwell's book, "1984." This motto
as well be from the George W. Bush administration. Since the tragic
created 25/06/2003 - 17:42, updated 25/06/2003 - 17:52 by cybe
by Michel Chossudovsky [11-26-2000]
Professor of Economics, University of Ottawa, author of The Globalization of
Poverty, second edition, Common Courage Press, 2000.
The important debate on global warming under UN auspices
provides but a partial picture of climate change; in addition to the devastating
impacts of greenhouse gas emissions on the ozone layer, the World's climate
can now be modified as part of a new generation of sophisticated "non-lethal
weapons." Both the Americans and the Russians have developed capabilities
to manipulate the World's climate.
In the US, the technology is being perfected under the High-frequency Active
Aural Research Program (HAARP) as part of the ("Star Wars") Strategic
Defence Initiative (SDI). Recent scientific evidence suggests that HAARP is
fully operational and has the ability of potentially triggering floods, droughts,
hurricanes and earthquakes. From a military standpoint, HAARP is a weapon of
mass destruction. Potentially, it constitutes an instrument of conquest capable
of selectively destabilising agricultural and ecological systems of entire regions.
created 05/06/2003 - 14:35, updated 05/06/2003 - 14:40 by cybe
June 3, 2003 05:14
(AP) A Pentagon project to develop a digital "super diary" that records
heartbeats, travel, Internet chats - everything a person does - also could provide
private companies with powerful software to analyze behavior.
That has privacy experts worried.
created 31/05/2003 - 20:27, updated 01/06/2003 - 18:52 by cybe
No one can be certain what genius first realized that disease could be turned from an uncontrollable killer into a weapon. Maybe some fourteenth-century Tartar. Perhaps the same one who got the bright idea, as he watched his comrades dropping from plague during their three-year siege of the Genoan-occupied Black Sea town of Caffa, to catapult cadavers over the city walls.