Monday, August 19, 2013

Unit 61398: The People’s Republic of China’s Cyber Warfare Center?



Even though the Beijing government denies if the unit’s involved in current cyber attacks and often finger-point to Edward Snowden and the NSA, nonetheless is the Unit 61398 Mainland China’s “cyber warfare center of operations?”

By: Ringo Bones 

The Uyghur and Tibetan Diaspora – or anyone labeled by the Beijing government as a “terrorist group” – seems to agree that Edward Snowden’s cyber-shenanigans pointing the United States’ National Security Agency resources is eavesdropping on everyone’s online data transactions is a lesser evil compared to the “Beijing 50-Cent Cyber Army” and other “Cyber-Terrorist” organizations actively sponsored by the Beijing government is that the NSA will probably never wreck your microfinance business’ database with malware. Back in February 3, 2013, Google chairman Eric Schmidt calls the People’s Republic of China an “internet menace” due to the Beijing government’s act of actively supporting home-grown top-notch cyber-criminals in order to achieve its own political and economic ends. Though the free world’s wariness of the Beijing sponsored cyber attacks had since been noted way before the September 11, 2001 terror attacks, no one on this side of the “Great Firewall of China” has any idea what a top-notch Beijing government sponsored cyber warfare center looks like until February 20, 2013 when it was divulged that a certain non-descript government building in Shanghai was the nerve center of the Beijing government’s “Cyber Warfare Corps”. 

The cyber attack culprit was then traced to the Unit 61398 of the Mainland Chinese People’s Liberation Army. Look-wise, it is a non-descript looking 12-storey government building in an army base in the middle of Shanghai that is surrounded by a local run-down neighborhood that for a number of years now had launched cyber attacks on American I.T. companies with ongoing US government contracts. Western cyber security analysts still only had speculations on the structural hierarchy of the Beijing government’s “cyber warfare corps” – whether they employ civilian cyber criminals / cyber terrorists / hackers or it is mostly manned by People’s Liberation Army personnel with advanced computer skills; Though the “Comment Crew” and “Shanghai Group” had been speculated to consist mostly of the Mainland Chinese People’s Liberation Army’s elite crew of master cyber warriors. 

For a number of years now, the Obama administration had been wary of the Beijing government’s carte blanche attitude of its homegrown cyber terrorists / cyber criminals as long as these online outlaws work in maintaining Beijing’s interests. And unlike the secret eavesdropping activities since divulged by disenfranchised NSA private intelligence contractor Edward Snowden, the cyber-shenanigans done in the name of the Beijing government doesn’t just involve mere unauthorized looking into everyone’s private data but more often than not involve launching Directed Denial of Service or DDOS attacks on groups the Beijing government perceives as their “enemy” – i.e. the online computer infrastructures of Tibetan and Uyghur Diaspora living in the United States and elsewhere.  

Monday, March 25, 2013

Practical Quantum Data Encryption


If at present quantum computers are still “science fiction”, can microscopic sized diamonds provide practical quantum data encryption for sensitive internet data right now using currently available technology? 

By: Ringo Bones 

The promise of ultra fast quantum computers and the benefit of ultra secure quantum encryption of sensitive computer data may be a few years away but materials scientists say they may be a way to provide quantum level encryption of computer data uploaded by users on the internet using current practical technology via the use of microscopic sized diamonds. But will such methods work? 

Recent advancements in the relatively cost competitive manufacture of gem quality microdiamonds by the thimbleful may be a way to provide current practical way to provide single photon key encryption of private messages and other sensitive data being sent on the internet or being saved on some “cloud computing site”. Diamonds possessing the desired optical properties that can process data stream a single photon at a time is the key for a practical single photon encryption / decryption method that is compatible with our current internet telecommunications infrastructure.

Using microdiamonds with a “perfect imperfection” –i.e. getting single impurity inside a microdiamond using existing laser deposition technology to provide that microdiamond the desired optical property to enable single photon key processing. This method could provide quantum level data cryptography using existing computer technology. Though still at the lab stage, microdiamonds with the requisite optical properties to perform single key encryption and decryption could easily be mounted on chips using existing chip manufacturing methods. 

Another advantage of such a scheme is that it could also perform the function of a true blue quantum computer’s ability to check and detect if encrypted data are already compromised by unauthorized hacking. If funding permits, microdiamond chips - or a microdiamond array on a chip - that enable current computers to perform quantum level encryption / decryption of sensitive data could probably be on the market as soon as five years from now – while costing the same or just a little bit more than ones already on the market today. 

Friday, January 18, 2013

Catfishing: A Not So Victimless Crime?


Named after “Catfish”, an MTV in-depth report special about people using Facebook or other social media to pose as someone else, is catfishing truly a victimless crime it once believed it to be?

By: Ringo Bones

One of the most bizarre incidents I experienced first hand online was when I made my Facebook account a few years ago. Within 20 minutes or so of setting-up my Facebook account a friend request suddenly popped up because back then I genuinely believe that the “goal” of Facebook is to amass 5,000 friends in as sort amount of time so I was a bit lazy in doing the requisite background check of friend requests. It was someone whose name I now forgot using the metal band Night Ranger’s guitarist as his profile photo who – this was 20 mines into setting up my Facebook account – keep insistently asking me why I only have one photo. I responded I’m only into Facebook for a quarter of an hour or so my “new Facebook friend” started accusing me as a “fake profile”. I since unfriended and blocked the bastard, and given the recent news story of the Notre Dame football team star linebacker by the name of Manti Te’o’s “dead girlfriend hoax”, I know wonder – I am almost a victim of this so called “catfish” or “catfishing” social media / Facebook malarkey a few years ago?

Currently my Facebook friend roster sits at around the 500 mark, given the rather rigorous and draconian screening of prospective Facebook friend requests. Of the 500 or so, only about 30 of them I ever met face to face during the last few years or so – making them qualify for the “realness” category. And only two of them that I actually met when I was only a toddler back in 1975 or so. Does this mean that social media like Facebook is now so full of this “catfish” malarkey that the only criterion we have for giving the green light on Facebook friend requests is weather or not we have actually met them face to face?

Well, some of my “real” Facebook friends that I have actually met face to face – a couple of them – used to act like that “Notorious Nigerian Prince” extorting me charity money to support their causes even resorting to using “guilt tactics” if I ignore them. And I am very, very tempted to unfriend and block them this very moment. Surprisingly, there are those that I suspect to be “posers” seem to act like social media saints by only posting necessary messages on my Facebook wall. One at best can only be pragmatic when dealing the problem of fake social media profiles and catfishing on Facebook on a case-to-case basis so exercise with “caveat emptor” when selecting your prospective Facebook and other social media friends. 

Friday, January 11, 2013

Africa: New Haven For Cyber Criminals?


Even though that notorious “Nigerian Prince” may be lying low for now, will Africa’s newly improved internet infrastructure make it the new haven for the world’s cyber criminals?

By: Ringo Bones

That notorious “Nigerian Prince” may have had his day of victimizing millions of unwary internet surfers during the first decade of the 21st Century cyber security experts now predict that Africa – with a now newly upgraded internet infrastructure via newly set-up fiber optic cables and power plants – could become the next haven of choice for the world’s cyber criminals. And unlike that notorious “Nigerian Prince”, those cyber criminals may not even be native residents on the African continent but more often than not are by cyber criminal syndicates based in Eastern Europe or South-East Asia that program their so-called bot-nets to hijack unsecured computers and internet hubs physically located on African soil.

The likely victim of those newly established cyber criminals using the African continent as their very own “pirate haven” will be European Union based web-surfing citizens. Given that ¾ of Europeans now use the internet as their primary way to conduct monetary-based business and commercial transactions – compared to only 1/3 of the rest of the planet, Europe’s online business transactions could be the so-called “low-lying” fruit that cyber criminals could exploit of if its online security infrastructure is not upgraded to be resistant to cyber crime.

Troels Oerting of the European Cyber Crime Center says in a recent BBC interview that Africa’s continually improving internet infrastructure now make the continent a prime home-base of choice of the world’s cyber criminals. And given that Europe is now increasingly reliant on internet based commerce, cyber crime has been costing European Union citizens and companies collectively on average 1.5 billion euros a year. The newly upgraded office of the European Cyber Crime Center or EC3 in the Hague now features a Faraday Cage shielded computer room to study how sensitive data could be hacked by cyber criminals plus other R-n’-D labs for forensic analysis of cyber crime incidences.

Monday, January 7, 2013

Death of the Desktop PC: A Completely Exaggerated Rumor?


Despite the rumors of the death of the desktop PC being “exaggerated” since the start of 2012, when was the last time you saw your computer savvy pal replacing the video-card of his tablet computer?

By: Ringo Bones

Despite of the 2012 CES Las Vegas unleashing products designed to consign the supposedly “dated” desktop PC to the dustbin of history, it seems that the rumors of the death of the desktop personal computer had been completely exaggerated for little over a year now. The latest – i.e. 2012 era – tablet computers, internet-capable smart-phones and razor-thin laptops may be the hippest must own products for every self-respecting computer-savvy “technocrat” for the whole of 2012, but have you ever seen any “computer-savvy-technocrat” replace the video-card of his or her tablet computer, razor-thin laptop or internet-connected smart-phone PC after his or her attempt at computer animation kept crashing his or her latest ultra-thin portable PC type device that he or she bought last year? Does the bigger bits – i.e. active and passive electronic components - of the old-fashioned desktop PC the “very bit” that makes it infinitely upgradable by DIY computer enthusiasts?

The last time I visit our local computer shop just 4 days before the Christmas of 2012, video-cards, the latest 2to 3-gigahertz capable multi-core central processing unit boards – in a size/dimension that can comfortably fit inside the housing of a traditional desktop PC – are still available and selling like hotcakes to prospective computer / desktop PC do-it-yourselfers. And try as I might, I never managed to find user-insert-able / user replaceable CPU boards and video boards for any 2012-era razor thin tablet and laptop PCs, never mind those for internet-connected smart-phones. Inexplicably, our local shop doesn’t even carry those external solar-photovoltaic battery chargers allegedly used by the US Navy’s SEAL Team VI’s tablet computers / smart-phones that they use during their clandestine missions even though similar solar-photovoltaic chargers where exhibited during the 2012 CES in Las Vegas.

While waiting for any of the latest computer-tech bulletins of the upcoming 2013 CES in Las Vegas, I do wonder what the top personal computer manufacturers’ roll-out this time to “allegedly” once and for all consign those good old desktop personal computers to the technological dustbin of history. If the wares they rollout are just a bit better vaporware versions of 2012’s offerings, the traditional desktop PC could get another reprieve from being consigned to the technological dustbin of history. Unless these top manufacturers manage to design nano-machines that can speed up post-manufactured tablet computers and smart-phones already in the field.

Friday, November 23, 2012

Online Social Networks: Main Predictors of US Presidential Election Results?


Given that they eerily seem to uncannily predict the results of the 2012 US Presidential Elections, are online social media networks just became the new election prognosticators?

By: Ringo Bones

Statistician Nate Silver may have created a mathematical algorithm that uncannily predicted President Obama’s victory more accurately than “traditional” political pundits but in hindsight, are online social media networks are now better at prognosticating election results compared to the previous US Presidential Elections four years ago? Does this mean that the “digital native” generation who has just became old enough to vote back in the November 6, 2012 US elections just became the new “Swing State” in America?

Months prior to the 2012 US Presidential Elections, President Obama and his Democratic Party had been very busy winning fans in the online social media world of Facebook, Twitter, Tumblr and other leading social media sites on the internet – while challenger Mitt Romney’s Republican Party seems to be “sitting on the fence” when it comes to winning voters in the online social media scene. Though many tenured analysts now point out that recent – but gradual - demographic shifts in the American electorate may be the true culprit on why the Republican Party challenger lost to the Democrat incumbent – as in the Republicans tend to stick to its core cause of promoting white-Anglo-Saxon-Protestant values at the expense of the basic rights of Americans of non-white Anglo Saxon ethnicity. Does this mean that online social network sourced “Big Data” may now be the new “Crystal Ball” when it comes to predicting future election results?

According to Charles Duhigg – author of The Power of Habit – traditional political pundits should now look into the “predictive” importance of online social network big data during election time and the role of shame and social pressure on the shifting demographic makeup of the American voting landscape. To the “internet novice”, the term “Big Data” is a form of data created when an online user uses a credit card when buying something via the internet, or when expressing their likes and dislikes by posting them on social media networks like Facebook or Twitter. This means online data points of you and other people are now very useful during election time. Does this mean that “information technology” or I.T. is the future of politics?

In a recent online big data study conducted a few months before the 2012 US Presidential Elections, it was found out that Romney supporters tend to eat at Olive Garden while Obama supporters tend to dine out at Red Lobster. Not only that, even one’s taste in music could serve as a very accurate predictor of who you will vote for. Looking back, one could easily conclude that President Obama had an “unfair” head start when it comes to establishing a homegrown database via online social networks of his supporters – even though Obama can freely buy political advertisement time in both Olive Garden and Red Lobster. 

Wednesday, October 31, 2012

Spiritualism in the Smartphone Age


Given that the Catholic Church in Poland has just been again riding every teens’ ass over their “occult” Halloween practices, shouldn’t we have the right to freely practice spiritualism that pre-dates Organized Christianity by thousands of years?

By: Ringo Bones

Just like clockwork, every Organized Christian Demagogue is again blaming Halloween for the ills of the world every last week of October, but where are these so-called demagogues when such practices were the norm thousands of years ago? Well, here’s something that might not be older than Queen Victoria but at least it is enough to rouse up every Organized Christian Demagogue who are up in arms since the Y2K Scare, the date May 5, 2000 was found out to be scrolled on Albert Einstein’s diary and the coming Mayan December 21, 2012 Apocalypse – a Ouija Board app for your Smartphone. But what is a Ouija Board you may ask?

A Ouija Board is an occult board / paraphernalia often used by spiritual mediums. The board consists of letters and numbers, including the words “yes” and ”no” printed on it that is used with a planchette to seek spiritualistic or telepathic messages. The origin of the name Ouija comes from the French word “oui” and the German word “ja” – both of which translates to “yes” in English. Whether or not it was in use before the Victorian era, Ouija Boards had been a traditional symbol for Halloween for centuries – right up there with carved likeness of Samhain using pumpkins.  

Given that the layout and use of a typical Ouija Board easily translates to use into the screens of every Smartphone – and even touch-screen capable tablet computers currently made by leading manufacturers, it could be quite fun for this Halloween to check out if a newfangled app version of the Ouija Board is as effective as it’s traditional “wooden” counterpart. At least Ouija Board Apps can be a good way to contact the dearly departed that made our internet age possible. Just post it here if Nikola Tesla or Steve Jobs had any new to say for the 2012 Halloween.