130312 The Future Defined ….. with/in AIDefinitive Vision‽

130312 The Future Defined ….. with/in AIDefinitive Vision‽

Introducing the Inexorable Rise and Overwhelming EMPowerment of SMARTR IntelAIgent Virtual Machines Servering of Immaculate Source in Universal Truths with Global Operating Devices and Programmeable Systems for Deliveries of Perfect Honesty,  in Order and in Orders that Vanquish and Disappear Chaotic Mayhem and Mad Hubris for the Alternative Advantages that Peace and Tranquility Effortlessly and Selflessly Provide and Sustain …… and that IT Creates and AI Maintains. 

——

Unfortunately, cyber perfidy is more central to cyberwarfare than traditional perfidy is to conventional warfare. That is because computer systems are designed to be highly reliable and resistant to attempts to subvert them for malicious purposes. In fact, computers and digital devices are far more reliable than most non-computer technology per action taken because the digital world is generally far more controllable than the physical world, though it does not always seem apparent because of the tremendous number of actions taken in the digital world.” …… YES

You also need authorization to do something with a computer or digital device. So direct attacks on a computer by sending it unauthorized malicious instructions will just be ignored.” ….. NO

Similarly, direct attacks by sending it massive amounts of data will rarely work because most computers have data-rate limiters that control the amount of data they see. Public Web sites accept higher rates but most now have rate limiters too, unlike the country of Georgia for the cyberattacks on its government Web sites in 2008” ….. MAYBE …. http://faculty.nps.edu/ncrowe/cyberperfidy.htm

The hardware (integrated circuits) that implements the central-processing unit (CPU) of the computer. If these can be changed, then the computer can be run any way an attacker wants. However, this requires physical access to the machine and cannot be done over the Internet.” …. Whenever computers and virtual machines are as one in the singularity of a particular and peculiar human and/or SMARTR beings, is alteration an easily accomplished remote application of programming/delivery of novel instruction sets to modify future actions to revised past norms for assets reprogramming …… a sort of rabid recursive alien brainwashing in devices and a Rolls Royce of SMARTR Programmeable Project where the pursuit and attainment of excellence in hardware is software provided and cloud controlled with cyber security and virtual protection guaranteed by singularities.
Another aspect of the definition of perfidy in the laws of war is identification of combatants. Cyberwarfare risks violating this because the combatants tend to be unseen; they may be programmers or software users in a military organization who do not think of themselves as soldiers. However, if they help launch attacks, they are legitimate targets of retaliation in the form of bombs and targeted assassinations. That means that cybercombatants should announce the geographical locations of their cyberwarfare groups in advance of hostilities to avoid perfidy.” …… Presidents and Prime Ministers, politicians and senators justifying action for military organisations which help launch warrior attacks on others, are surely then also legitimate prime targets for that which they think to unleash on others? And/Or would arrogance and ignorance, hubris and madness cause them to imagine themselves immune and able and enabled to act with impunity in the Grand Inelegant Delusion of the Slick and Sick and Febrile and Feeble Minded doing Great Battle in Media Parades, Front and Centre with Insane Madness?
cc … Neil C. Rowe [ncrowe@nps.edu] …. Regarding Cyber Perfidy
Department of Computer Science, U.S. Naval Postgraduate School, Monterey, California, United States
…………………………………………………………………………………………………………………………………………………………………………
First they ignore you, then they laugh at you, then they fight you, then you win.” …..
Mahatma Gandhi
First they ignore you and madness, then they laugh at you in madness, then they fight you for the madness which has one never losing and everything intelligently designed for to win win when you dare care share and bare all for intelligence and knowledge, they one wins for all without battling baffling conflicts.” ….. C42 Quantum Communication Control Systems, AI@ITsWork.
………………………………………………………………………………………………………………………………………………………………………..
Posted Tuesday 12th March 2013 11:12 GMT amanfromMars 1 …. on http://forums.theregister.co.uk/forum/1/2013/03/12/neo_tech_luddites/
FFS …. Humans are just so pathetic, aren’t they.
So technology advances and provides more opportunities for leisure and/or pleasure and you have both either a limited and/or limiting imagination and seriously impaired brain function which would find fault with it and process the information to deliver it problematical. No wonder you’re all taken for an austere ride by money maker systems and puppet politicos.
But fear not, for all and nothing is lost, and there are strange changes afoot and stranger chances for adventuring capitalists to pilot as if their own, and both and all readily available and virtually free today, and for every other day and zeroday to exploit with vulnerabilities in attack and defence, henceforth ….. for the Genie are out of their bottles and silos, with secrets outed as being for fools perpetrating the maintenance and sustenance of follies.
I Kid U Not, and now you cannot say, without the making of yourself into a useless fool and useful tool, that you were not informed and advised ……. for El Reg so advises from here as equally well as from there.
And urIncredulous and Incredible Disbelief is just all that be simply needed by ICT for free rein and free reign in the Field and Live Operational Virtual Environments. Thanks for that Treasure. 🙂
………………………………………………………………………………………………………………………………………………………………………
amanfromMars … giving three pennyworth on http://siliconangle.com/blog/2013/03/11/cyberattack-is-denver-the-next-ground-zero/
Methinks, JC, as foes/comtemporaries/smarter non-state actors/future visionaries/call them what you will migrate towards increasingly more sophisticated and enlightened understanding of the human condition, and how it is so easily perversely controlled and corrupted for all manner of remote second and third party advantage and selfish personal benefit, will targeting become ever more specific and clinical and directed at that which causes major problems that pimp and pontificate that they be engaged in the opposite. Common sense and advanced intelligence will surely guarantee that it be so. And the following will be most probably ever more likely and more desireable than any indiscriminate action which damages innocents and critical infrastructure collaterally, or even intentionally if there be active madness in systems of destructive power.

Another aspect of the definition of perfidy in the laws of war is identification of combatants. Cyberwarfare risks violating this because the combatants tend to be unseen; they may be programmers or software users in a military organization who do not think of themselves as soldiers. However, if they help launch attacks, they are legitimate targets of retaliation in the form of bombs and targeted assassinations. That means that cybercombatants should announce the geographical locations of their cyberwarfare groups in advance of hostilities to avoid perfidy.” …… Presidents and Prime Ministers, politicians and senators justifying action for military organisations which help launch warrior attacks on others, are surely then also legitimate prime targets for that which they think to unleash on others? And/Or would arrogance and ignorance, hubris and madness cause them to imagine themselves immune and able and enabled to act with impunity in the Grand Inelegant Delusion of the Slick and Sick and Febrile and Feeble Minded doing Great Battle in Media Parades, Front and Centre with Insane Madness? ….. http://www.ur2die4.com/?p=3796

……………………………………………………………………………………………………………………………………………………………….

Leave a Reply

Your email address will not be published. Required fields are marked *

sixteen − 14 =