computer starts up slow

I noticed that my computer was starting up slow.. SUPER slow!  I ignored it for a long time… months.  But I noticed each time I added new software, the system started up slower and slower.

Why your computer starts up slow?  These days when you install new software, its default setting is “autorun” which means, it is set up to start when your computer starts.  So if you notice 30 different applications are popping up when you boot up your system, that is why the system is slow.  Its starting each app.

If you computer starts up slow, here is how you can get it much faster.

computer starts up slow msconfig.exe

slow computer start use msconfig.exe

computer starts up slow – MSCONFIG

The first place to check out for slow reboots, is msconfig.

Go to Start | Run | type “msconfig” | Enter

“MSConfig (officially called System Configuration in Windows Vista, Windows 7 and Windows 8 or Microsoft System Configuration Utility in previous operating systems) is a system utility to troubleshoot the Microsoft Windows startup process.”

Once you click Enter you will see the msconfig message box.  Once you are in msconfig, select the “Startup” tab and you will see all the software that is set to startup when the system starts up.

computer startup slow msconfig

computer startup slow msconfig

MSconfig show the root of the problem.  I had scores of proprietary applications starting up by default, not to mentions a dozen other applications that I had installed and left default.  This is why my system was taking anywhere from 3-5 minutes to be of any use.  I would often avoid turning off the system just so I did not have to wait each time for it to boot.. NOW THAT IS LAZY!!

Once in MSconfig, disable the applications you don’t want starting when the computer starts.  Once you are complete, click OK.

And you are done.

Here is another place you can check for application startups:

computer starts up slow Startup

computer starts up slow Startup

BONUS ROUND!! – Search Conduit – backgroundcontainer RunDLL

I had a pesky “RunDLL” file that kept trying to run when my computer was starting.  I did not see it in the Startup folder or in MSConfig.  But I noticed that it was from some adware called SearchConduit (my arch nemesis).  I had removed it months ago, but it is so aggressive, spammy and similar to malware that it leave hooks in the registry keys.

Here is how I removed it.

computer starts up slow RegEdit FIND RunDLL

computer starts up slow RegEdit FIND RunDLL

You will have to go to regedit – Start | Run | regedit

*I don’t recommend regedit unless you are comfortable with doing complex configurations on your PC.. if you don’t know what your doing, you can destroy you OS in regedit*

Once in regedit, click CTRL+F (find) and search for the key.  delete the key.  You will need to delete if from the left side of the regedit panel or you will get the error you see displayed.

If you did all of this, you cleared all irrelevant default starts from legit applications and removed any DLLs that are not supposed to be there and you computer is still slow, you may have a completely different issue:

  • defrag your hard drive
  • Maybe you have malware (i use webroot & spybot search and destroy)
  • You have very agressive (hidden) adware (spybot search and destroy.. it works)
  • Your computer is too old (try newegg, they have good prices)
  • Your computer needs more memory (RAM check Task Manager – check memory usage)
  • Your hard drive is jacked up (may hear a crunching or metal on metal sound)

 

Cisco Cert Beginner Part-2: Setting up a Network Lab (Rack)

One of the reasons I failed the CCENT was that I didn’t prepare for router/switch simulators that are on the test. I knew the theory and concepts behind Interconnecting Cisco network devices, but I hadn’t spent much time on the command line of an actual router. Since the test is timed you don’t have a lot of time to try to figure commands out on the fly. You certainly can, because Cisco command line is pretty user friendly.

To prepare for the test you must be comfortable in the Internetwork Operating System (IOS). That is why my CCNA, CCNP buddies encouraged me to set up my own Cisco network. They told me how to buy them cheap, what components to buy and how I should actually network them to prep for the Cisco certs.

Cheap Cisco Equipment:
Talking about what actual Cisco models to buy in this post will not be effective since anything I name will be completely obsolete by the time you read this. But I will tell you that my CCNA/CCNP friends recommended buying old Cisco equipment from ebay and Craig’s list. And even schooled me on what was a good deal. In some cases I would just give them money and they would buy if for me. I ended up buying a lot of stuff I don’t need but you are more than likely much smarter with your money.

What to Buy:
They told me that it was important to buy two switches and two routers to practice with routing protocols and spanning tree. They explained that it is important to understand the behavior of the technologies in order to know how to troubleshoot. Theory is important too, but to prepare for the CCENT you must get comfortable with the command line interface so you don’t waste time figuring out basic stuff on the fly.

courtesy of Cisco land

DIAGRAM:
Build a diagram first! This is difficult for me because I like to just jump in and try things. But creating a network diagram and understanding what it is you want to set up is very important.

from rate my network diagram

Virtual Cisco LAB:
Another very useful tool for those who really can not afford to drop $100 dollars on old Cisco equipment is the use GNS3. Its like a VM Ware for Cisco IOS. It allows you to create a virtual network and mess around with actual Cisco IOS. Its really pretty cool… and (best of all) it free!! Aside from air, I am not sure there is anything more useful. Its is a great tool if you are serious about studying for the CCENT/CCNA/CCNP.

courtesy of gns3.net

Cisco Cert Beginner Part-1: where to start

Since I failed the Cisco Certified Entry Networking Technician (CCENT) (lol), I have decided to get smart on Cisco again. I have been out of it a long time doing mostly DoD Certification & Accreditation work. I used to be a network engineer with a CCNA, until I found a career that pays better with less competition. So now, I am just doing Cisco stuff for fun.

After failing the CCENT, I talk to my resident networking GURU’s (a CCNA Security, a CCNP and a CCIE). I wanted to know what was the best approach on attacking the CCNA again. They told me what they did.. set up a Cisco lab in the house was he most common answer.

The book they recommended to start with was CCNA-CCNENT ICND1. Its really not the most fun book in the world to read, but if your starting out or starting over with this stuff it should be like your networking bible. Among technical Cisco books, its a solid first start.. which is much more than I can say about any of the first start Cisco’s 5500 ASA books– there is just now such thing. You will be expected to have a solid understanding of networking, the OSI model and TCP/IP. If you have a Comptia Network+, the CCENT might be the logical next step. If you do networking pretty regularly, have been doing it for about a year and are familiar to Cisco equipment, you might be better off going straight to the Cisco Certified Network Associate (CCNA). If you’re going for the fully blown CCNA, the book to get is the CCNA ICND2. I have been warned that you need to very, very good at subneting!! The CCNA is much harder than it was when I took it in 2001. I would even say that the CCENT is harder than the CCNA used to be.

In addition to getting the right books to read, the Cisco Gurus told me to set up a lab.

You Hack US, We Nuke You!

The United States’ top commanding officer for the space and cyber domains told reporters last week that a cyber attack could merit a more conventional military response.

During a press briefing on Thursday, U.S. Air Force General Kevin Chilton, who heads the U.S. Strategic Command, told reporters that top Pentagon advisors would not rule out a physical attack on any force that attacks the United States through the Internet. Currently, the military’s networks are probed thousands of times a day, but the goal of attackers seems to be espionage, not to take down critical networks, he told reporters –

Security Focus

I don’t believe that military force is the equivalent action for a cyber attack. Arrest and/or apprehension is the physical response necessary for criminal hackers attacking from other countries. Cyber counter-attacks are the correct response for government funded & coordinated attacks.

I think if the U.S. reciprocates a cyber attack x10 when other countries are playing little games, we’d get our message across effectively. We should do so in a well funded and covert way in which the enemy has NO DOUBT that the face slap came from a U.S, hand, but no proof at all allowing plausible deniability. It should be black Ops hacks, very well coordinated, very well funded and full time.

I don’t think the US can be complacent or wrecklessly meek in matters of cyber warfare. Instead, it must be fair, quiet and heavy handed when it comes to one of its most valuable asset, information.

One Decade to Cyber-Real Impacts

When I started my blogs at the end of 2005 my sites made about $1/month. As of October 2008 they made over $800 dollars. $800 is pretty good pocket change, but I know of at least two bloggers who make $10,000 per month! This is only possible because of computers, the Internet and web technologies. The additional money from my blogs is a great boost to my over all income allowing me and my family to live more comfortably, however I know that a higher living standard is only the beginning of what information technology (IT) has in store for me and humanity particularly over the next ten years.

In ten years, IT will directly impact my life style by allowing me to better manage everything from energy used in my home and car to the health care. IT will connect me to and even higher “work from home” socially networked life style. And finally, in ten years, IT will change my perception of reality both literally and figuratively.

Within one decade, IT will change how much gas I pump into my car and how much energy I use in my home. It will manage my over all life style. How and why will this happen? What do computers have to do with petroleum? In ten years IT will have everything to do with gas.

Information technology will influence and permeate the energy technologies (ET) needed for a new renewable energy infrastructure. Millions of electric cars on the roads and over 10% of electricity coming from renewable sources (1) will need IT. The impact can be seen even through the jaundice vision of latter-2008 eyes. All the leading candidates of the 2008 election made “green” a part of their talking points and stump speeches. Our early American 21st century problems are no longer being ignored (1,2):

* having to fund oil rich petro-dictators
* lack of export industry/increased unemployment
* pollution/global warming
* the causes and support structure of terrorism

*these issues are address much further in Thomas Friedman’s book Hot, Flat and Crowded (3)

The issues we face are all linked to one problem… energy. America is run on oil so it must buy from oil rich dictators (many of whom are sympathizers of extremists who support acts of terrorism). America is 70% dependent on energy from foreign sources (4) which in-turn exports a large portion of wealth and jobs overseas. But in ten short years, I will no longer be a part of the blind slow degradation of the U.S. because ET with its IT interface and IT processing power will allow me to pump less gas and download more clean electrons into my hybrid car. But IT won’t only be impact my carbon foot print. It will also increase my assets.

In 2004, I was still fresh out of the military and struggling from the high costs of civilian life. My wife and child were consistently in and out of the hospital and the mortgage was a monthly battle. I was thinking about rejoining the Air Force or getting a second job. I was reluctant because my whole reason for getting out the military was to spend more time with my family.

I decided to start a business. Almost immediately, I got sucked into Internet Marketing. Although I lost some money on more than one failed venture, I actually ended up learning a lot about e-business and methods of making money online. I got into blogging at the end of 2005. My blogs started making money with a few months. And by mid-2006, it was pulling down a couple of hundred dollars per month. I immediately saw the great potential of this. A few times the blogs even made more than enough to pay the mortgage. Its 2008 and the blogs still make hundreds of dollars per month.

In 2018, the Internet will make more than what I make at my full time career. The impact will be a revolutionary and comprehensive change to my life style. I will be able to work from home, spend more time with my family and have even more interaction with my extended family who live in another state. But I believe that among the most shocking and exciting vision of pre-2020 is the future predicted by Ray Kuzweil in his book Age of Spiritual Machines (5).

Ray predicts the following:

“Three-dimensional virtual reality displays, embedded in glasses and contact lenses, as well as auditory ‘lenses,’ are used routinely as primary interfaces for communication with other persons, computers, the Web, and virtual reality.

High-resolution, three-dimensional visual and auditory virtual reality and realistic all-encompassing tactile environments enable people to do virtually anything with anybody, regardless of physical proximity.

Paper books or documents are rarely used and most learning is conducted through intelligent, simulated software-based teachers.(5)”

Virtual reality advances will allow me to bring cyber space into the real world. How will I distinguish real from cyber-real with hyper-real overlays of real world objects, disembodied voices from GPS devices personalized to my specific location and velocity whispering in my ear? Furthermore, how will I define reality if virtual reality phones make distance from callers irrelevant? I will be able to see a full body representation of a caller standing in front of me.

Ten years will usher in comprehensive changes in my life coming from IT. This will be the decade that brings in a more responsible change in energy use, unprecedented worldwide increases of standards of living and an overall change in our perception of reality. It will be a virtual brave new world.

Works Cited:

1. Office of the President-elect. 2008. Energy and Environment Agenda http://change.gov/agenda/energy_and_environment_agenda/
2. Governors Global Climate Summit. 2008. Finding Solutions Through Regional and Global Actions. http://site.governorsglobalclimatesummit.org/
3. Friedman, Thomas L. Hot, Flat & Crowded. 2008. Farrar, Straus and Giroux
4. Energy Information Administration. U.S. Imports by Country and Origin. http://www.eia.doe.gov/ http://tonto.eia.doe.gov/dnav/pet/pet_move_impcus_a2_nus_ep00_im0_mbbl_m.htm
5. Kuzweil, Ray. The Age of Spiritual Machines: Time Line. http://www.kurzweilai.net/meme/frame.html?main=/articles/art0274.html?

Neuromancer

Physicists, mathematicians, futurists and sci-fi writers are the ne0-prophets of our time. Einstein, Max Plank, William Gibson, Georg Cantor are the new world prophets determining the probable future transfinite realities among absolute infinity.

Neuromancer is an example of probable futures. It is THE work of fiction by William Gibson that popularized the cyberpunk genre. In the book, Gibson actually coined the phrase cyberspace and the matrix, a multi-diminsional virtual reality that allows users to jack their brain directly into the cyberspace.

Case is a hacker is hired to do the biggest hack ever. The book is brilliant. Some of my favorite characters are Molly, the assassin, who looks like this:
Molly, neuromancer
William Gibson himself

and Wintermute, the corporation/Artificial intelligence and Maelcum A member of Zion, a Rastafarian space station community.
Neuromancer the book

A year here and he still dreamed of cyberspace, hope fading nightly.
All the speed he took, all the turns he’d taken and the corners
he’d cut in Night City, and still he’d see the matrix in his
sleep, bright lattices of logic unfolding across that colorless void. . .

Its such a brilliant piece of work that I am surprised it hasn’t been made into a movie yet.

Vista or XP

I like Windows XP, but I don’t much like Vista. I tried it for a few months and found it gorgeous to look at and fairly easy to navigate. I didn’t much care for the search feature. I actually use search for just about everything on Windows XP, but Vista would find everything. For example, if applications weren’t made for Vista, it would find them or show them in the Add/Remove Programs. Which brings me to that subject. Its so new that it still lacks the drivers to support even my fairly recently purchased printer. I also had trouble running VMWare and other applications. VMWare 6.0 must be purchased to work fully with Vista. I got VMWare 5.x to work partially, but it would do strange things like shut down the computer for seemingly no reason or not run certain operating systems (Ubuntu) from a disc. Ubuntu did work as an ISO image on my local computer, though.

Vista has potential to be a great Desktop OS in about a year when more vender’s support it and it becomes the new standard, but until then I will stick with XP and use Vista for practice. I really enjoyed the Media Center (which is also in some version of XP). I would NOT use it as any kind of operational system running critical resources. I’ve heard Windows 2003 Server is good stuff and I wouldn’t doubt it.

When XP first came out I was all about 2000 and not fully convinced about the new kid on the block. I now feel the same about Vista. One thing I am definitely sick of is that Microsoft releases Vista and then promises to completely stop supporting Windows XP some time in the summer of 2008. This forces everyone to move to Vista. That is pretty aggressive and I am personally not going to take it any more. I’m going to start moving to Ubuntu slowly but surely. I’d like to stay on top my MS OS skills but I don’t want to be completely at their mercy anymore.

ECHELON of human underachievement

Knowledge is power. In the information age this is more and more true every minute of every day. I believe it is inevitable that we would have the super secret parts of government would begin to collude to monitor all telephone, data and fax communications. It seems equally inevitable that very powerful individuals will challenge that same system.

Human nature being what it is, such a system is guaranteed to be abused for the power and positioning a dominate minority. My panic and indignation on such things is slowly supplemented by an acceptance and humor of human behavior that is self centered, greedy and in constant state of fear, loathing and self gratification. The funny part is that the behavior continues even though it proves to implode over time. Again and again Rome rises only to crash on the shores of reality. Caesar conquers, assimilates and raises taxes then fades out.

It frustrated me because I know that humanity has the capacity to do better. Better for the planet, better for itself and better for every species. We are capable of doing great, great things but we choose to live in a state of fear, self gratification an loathing.

http://www.whatreallyhappened.com/RANCHO/POLITICS/ECHELON/echelon.html

ECHELON

Main article: ECHELON

NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group[16], is widely reported to be in command of the operation of the so-called ECHELON system. Its capabilities are suspected to include the ability to monitor a large proportion of the world’s transmitted civilian telephone, fax and data traffic, according to a December 16, 2005 article in the New York Times.[17]

Technically, almost all modern telephone, internet, fax and satellite communications are exploitable due to recent advances in technology and the ‘open air’ nature of much of the radio communications around the world. The NSA’s presumed collection operations have generated much criticism, possibly stemming from the assumption that the NSA/CSS represents an infringement of Americans’ privacy. However, the NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibits the interception or collection of information about “…US persons, entities, corporations or organizations…” without explicit written legal permission from the Attorney General of the United States [18] The U.S. Supreme Court has ruled that intelligence agencies cannot conduct surveillance against American citizens. There are a few extreme circumstances where collecting on a U.S. entity is allowed without a USSID 18 waiver, such as with civilian distress signals, or sudden emergencies such as the September 11, 2001 attacks; however, the USA PATRIOT Act has significantly changed privacy legality.

There have been alleged violations of USSID 18 that occurred in violation of the NSA’s strict charter prohibiting such acts.[citation needed] In addition, ECHELON is considered with indignation by citizens of countries outside the UKUSA alliance, with numerous allegations that the United States government uses it for motives other than its national security, including political and industrial espionage.[19][20] Examples include the gear-less wind turbine technology designed by the German firm Enercon[21][22] and the speech technology developed by the Belgian firm Lernout & Hauspie. An article in the Baltimore Sun reported in 1995 that aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the NSA reported that Airbus officials had been bribing Saudi officials to secure the contract.[23][24] The chartered purpose of the NSA/CSS is solely to acquire significant foreign intelligence information pertaining to National Security or ongoing military intelligence operations.

In his book Firewall, Andy McNab speculates that the UKUSA agreement is designed to enable the NSA, GCHQ, and other equivalent organizations to gather intelligence on each other’s citizens. For example, the NSA cannot legally conduct surveillance on American citizens, but GCHQ might do it for them.

http://en.wikipedia.org/wiki/National_Security_Agency

Document 13: NAVSECGRU Instruction C5450.48A, Subj: Mission, Functions and Tasks of Naval Security Group Activity (NAVSECGRUACT) Sugar Grove, West Virginia, September 3, 1991

While NSA directs and manages U.S. SIGINT activities, almost all collection activity is actually carried out by the military service SIGINT units—including the Naval Security Group Command. The role of the unit at Sugar Grove in intercepting the international leased carrier (ILC) communications passing through INTELSAT satellites was first revealed in James Bamford’s The Puzzle Palace. (Note 12)

The regulation reveals that Sugar Grove is associated with what has become a highly controversial program in Europe, North America, Australia, and New Zealand. The program, codenamed ECHELON, has been described as a global surveillance network that intercepts and processes the world’s communications and distributes it among the primary partners in the decades-old UKUSA alliance—the United States, Canada, the United Kingdom, Australia, and New Zealand. (Note 13)

In reality, ECHELON is a more limited program, allowing the UKUSA allies to specify intelligence requirements and automatically receive relevant intercepts obtained by the UKUSA facilities which intercept satellite communications (but not the U.S. facilities that receive data from SIGINT satellites). It is also limited by both technological barriers (the inability to develop word-spotting software so as to allow for the automatic processing of intercepted conversations) and the limitations imposed on collection activities by the UKUSA allies—at least as regards the citizens of those countries. (Note 14) Thus, the NAVSECGRU instruction also specifies that one of the responsibilities of the commander of the Sugar Grove site is to “ensure the privacy of U.S. citizens are properly safeguarded pursuant to the provisions of USSID 18.”

http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB24/nsa13.pdf

WIMAX/3G Geek out

I must admit, I’m geeking out over WIMAX. WiMAX stands for the Worldwide Interoperability for Microwave Access. It will allow 70Mb/second upload and download which will allow for some pretty decent prawn video. So you’ll be able to go to youpawn and watch all kinds of prawn. There is an even better technology called 3GPP LTE (Long Term Evolution) on the way with is another improvement on the 3G stuff that is already out and marketed.

What is frustrating is that WiMAX will likely have the same level of control that 3G has. It will be tamed and completely corporate run. I plan on getting the new iPhone on 11 July 2008. After seeing the iPhone upclose I started to feel funny in my underpants. Iphone + 3G should shock my WiMAX arousal into erectile dysfunction.

It’s all about the killer app. If the big dogs pushing WiMAX (Nortel/Alvarion & Sprint/peon) can come up with a device that allows you to bypass XXX ass Comcast, AT&T and other broadband monopolies they will seriously shake up the market. WiMAX, 3G and others should be in the business of creating devices, drivers and software that allow you to network all of your systems from anywhere in the contiguous United States. That would be very cool. But they seems to have serious limitations (at least in the US).

Jun 11, 2008 (Hugin via COMTEX) —-Joint End-to-End WiMAX Solution Will Offer Operators Broader Coverage and More Capacity

TORONTO, ONTARIO and TEL AVIV, ISRAEL–(Marketwire – June 11, 2008) – Nortel(1) (TSX: NT: 9.13, +1.02, +12.57%)(NYSE: NT: 9.13, +1.02, +12.57%) and Alvarion(2)(R: 66.46, -1.77, -2.59%) Ltd. (NASDAQ: ALVR: 7.97, +0.46, +6.12%) entered into a joint strategic WiMAX agreement to create an end-to-end WiMAX solution to meet the needs of the evolving wireless broadband market. The Nortel and Alvarion mobile WiMAX solution is expected to combine industry-leading technologies from both companies to allow operators around the globe – including well-established service providers and new entrants to the wireless market – to simply and efficiently deliver high-speed wireless broadband for a variety of applications, mobile or nomadic, including VoIP, streaming music, and HD video.

The joint solution features the integration of Alvarion’s advanced radio access network technology, which has been proven in over 200 commercial WiMAX deployments, with Nortel’s core network solutions, backhaul solutions, applications such as Nortel’s number one carrier VoIP solution, and Nortel Global Services for WiMAX.. The Nortel and Alvarion WiMAX solution will allow operators to offer high speed wireless Internet access across large areas, including those currently underserved by broadband capabilities. The joint WiMAX solution will also provide the speed and capacity to help operators meet the exploding demand for true mobile broadband.

http://www.foxbusiness.com/story/markets/industries/telecom/nortel-alvarion-combine-strengths-strategic-wimaxtm-agreement/-883292264

Computers Hacking People ver 2.0

[display_podcast]

I honestly think you ought to calm down; take a stress pill and think things over. – Hal, 2001 Space Odyssey

Information Systems will eventually have the infrastructure and ability to “socially engineer” its creators. This is far fetched science fiction blooming before our very eyes being created by our own hands.
It will happen when three criteria are in place: 1) The creation of laws that can completely disregard the privacy and sovereignty of human beings. 2) The advancement of Information Awareness System and 3) Smart Artificial Intelligence

LAWS
Lets discuss the situations that will give governments the pretext to implement laws to track their citizens. This is happening now. Laws and systems are being created for unchecked monitoring of individuals under the guise of security, safety and prosperity. Systems such as national ID cards.
They were implemented after the Sept 11 attacks on the World Trade Center and in the U.K. after the 7 July attacks in London.

It was 19th Century philosopher Samuel T. Coleridge who said, “In politics, what begins in fear usually ends in folly.”

Imagine it: The PATRIOT ACT IV is passed as a result of recent Critical Infrastructure cyber-terrorism attacks. International terrorists implement a globally synchronized Distributed Denial of Service Attack against the worlds Root nameservers and successfully cripple the Internet for three days. The impact is devastating as corporations lose billions.

Domestic Cyber Terrorists infiltrate hospitals by becoming apart of the staff only to socially engineer and infecting HIPPA protected networks with virus’ that wipe out databases and actually scramble prescriptions causing an array of death by misdiagnoses.

Local police and security personnel repeatedly thwart numerous attempts by religious fundamentalists to detonate suit case sized tactical nuclear weapons inside major United State cities but security professionals predict that it is only a matter of time before at least one slips through the cracks. All the enemy needs is one.
Patriot Act IV is the patron saint of lawmakers who have been screamed at by constituents to “DO SOMETHING NOW!” The new Patriot Act is eventually internationally accepted and allows for unrestricted Data Mine into commercial and state owned databases worldwide (US-EU). It of course has deferent names and variations world wide but its application is the same. In the United Kingdom it is called the Civil Contingencies Bill. The data mining would tap into the “transaction space” by accessing hospital, financial transaction and legal databases world wide to be shared by all law enforcement agencies (county, federal, city local and international). The system works like a global Amber Alert system that can track criminals anywhere in the world and notify the respective local agency immediately. The system works very, very well.
I honestly think you ought to calm down; take a stress pill and think things over. – Hal, 2001 Space Odyssey

Information Systems will eventually have the infrastructure and ability to “socially engineer” its creators. This is far fetched science fiction blooming before our very eyes being created by our own hands.
It will happen when three criteria are in place: 1) The creation of laws that can completely disregard the privacy and sovereignty of human beings. 2) The advancement of Information Awareness System and 3) Smart Artificial Intelligence

LAWS
Lets discuss the situations that will give governments the pretext to implement laws to track their citizens. This is happening now. Laws and systems are being created for unchecked monitoring of individuals under the guise of security, safety and prosperity. Systems such as national ID cards.
They were implemented after the Sept 11 attacks on the World Trade Center and in the U.K. after the 7 July attacks in London.

It was 19th Century philosopher Samuel T. Coleridge who said, “In politics, what begins in fear usually ends in folly.”

Imagine it: The PATRIOT ACT IV is passed as a result of recent Critical Infrastructure cyber-terrorism attacks. International terrorists implement a globally synchronized Distributed Denial of Service Attack against the worlds Root nameservers and successfully cripple the Internet for three days. The impact is devastating as corporations lose billions.

Domestic Cyber Terrorists infiltrate hospitals by becoming apart of the staff only to socially engineer and infecting HIPPA protected networks with virus’ that wipe out databases and actually scramble prescriptions causing an array of death by mis diagnosis.

Local police and security personnel repeatedly thwart numerous attempts by religious fundamentalists to detonate suit case sized tactical nuclear weapons inside major United State cities but security professionals predict that it is only a matter of time before at least one slips through the cracks. All the enemy needs is one.
Patriot Act IV is the patron saint of lawmakers who have been screamed at by constituents to “DO SOMETHING NOW!” The new Patriot Act is eventually internationally accepted and allows for unrestricted Data Mine into commercial and state owned databases worldwide (US-EU). It of course has deferent names and variations world wide but its application is the same. In the United Kingdom it is called the Civil Contingencies Bill. The data mining would tap into the “transaction space” by accessing hospital, financial transaction and legal databases world wide to be shared by all law enforcement agencies (county, federal, city local and international). The system works like a global Amber Alert system that can track criminals anywhere in the world and notify the respective local agency immediately. The system works very, very well.

Information Awareness Systems

The system, developed under the direction of John Poindexter, then-director of DARPA’s
Information Awareness Office, was envisioned to give law enforcement access to private data without suspicion of wrongdoing or a warrant. — Electronic Privacy Information Center.

Government funded unrestricted Data Mining and Information Awareness programs develop and run revolutionary Information Awareness Systems. Despite public opinion, these National Security systems continue to work to protect the nation against enemies foreign and domestic. The system extracts data from its transactional databases and recognizes patterns of behavior that would fit that of a terrorist. The system is so exhaustive that is works with 70% accuracy and seamlessly in conjunction with systems such as Next Generation Facial Recognition systems and Activity, Recognition Monitoring for enhanced surveillance.


Artificial Intelligence
Within thirty years, we will have the technological means to create superhuman intelligence. Shortly after, the human era will be ended. – Vernon Vinge, 1993, What is the Singularity?

Artificial Intelligence has been in use for many years. It is greatly relied upon for businesses, hospitals, military units and even in forms of entertainment such as video games. However Strong Artificial Intelligence, the development of cognitive systems simulating the human brain, have been developing quietly in research labs around the world under programs dedicated to the “scientific understanding of the mechanisms underlying thought and intelligent behavior and their embodiment in machines. (AAAI)”

Smart Information Awareness is Strong Artificial Intelligence merged with Information Awareness Systems. Smart Information Awareness seems to go beyond merely recognizing patterns of behavior as it predicts the future actions of a given psychological profile with over 75% accuracy allowing Law Enforcement to be like an all seeing eye with incredible new methods of forensics and counterterrorism. Crime as a whole will be greatly reduced. System that recognize criminal patterns have been around for some time, Smart Information Awareness systems are a new trend.

The Smart Information Awareness system is so accurate in determining human behavior trends that it is used to track and manipulate consumer buying habits for corporations. With its accuracy, the system will be able to determine what marketing tools can be used to influence the behavior of buyers.

With unfettered access to consumer’s personal transactions, buying habits, methods of payment, and credit history a system would be able to pin point buyers who demonstrate interests in certain products and offer “special deals” a specific group of highly interested buyers.

Inevitably the very system (laws, practices and technologies) that successfully protects humanity from itself is used to manipulate and exploit humanity.

Perhaps you believe that there is nothing wring with this level of target marketing. If so, I submit to you these questions: What will separate humanity from cattle if every man, woman and child is seen as nothing but a number and a consumer to the system that we rely on to survive? Since we are already regarded as merely numbers and consumers by the corporate beast, how much control and information will we allow them to have?

Perhaps this is a bit much. Perhaps I exaggerate the technology and extent of fear that will breed it.

http://www.p2pnet.net/issue03/page1.html

http://www.epic.org/

http://www.jbholston.com/weblog_discussion.php?post_id=74
Statewatch.com – Secret EU-US agreement being negotiated. http://www.statewatch.org/news/2002/jul/11Auseu.htm
http://www.eff.org/Privacy/TIA/20030523_tia_report_review.php

http://www.aaai.org/

nin – TheSlip (thanks Trent)

Ray Kurzweil @ Google Zeitgeist

Civil Contingency Bill

Eschelon TIA – Total Information Awareness

1 2 3 6