Soon, Programmers will be Licensed, and Software will be Verboten.

European Council: Creating hacking tools should be criminal across EU
Ministers want Europe-wide legal net for cybercrookery

Posted in Crime, 14th June 2011 15:11 GMT
The making of hacking tools and computer viruses should be a criminal act across Europe, EU ministers have said.

The EU's Council of Ministers has backed the extension of criminal sanctions to toolmakers in response to European Commission plans to update EU laws tackling attacks against computer systems. Responding to European Commission plans to create a new anti-hacker Directive, the Council has said that the making of hacking tools should be criminalised, adding this to the list of currently criminal practices.

"The following new elements [should include] penalisation of the production and making available of tools (eg, malicious software designed to create 'botnets' or unrightfully obtained computer passwords) for committing the offences [of attacks against computer systems]," the Council of Ministers said in a statement (pages 18-19 of 38-page/176KB PDF).
Under the Act a person is guilty of an offence if he "makes, adapts, supplies or offers to supply any article intending it to be used to commit, or to assist in the commission of, [a hacking offence]." The word "article" is defined in the Act to include "any program or data held in electronic form".

Read more:


1) Of course, the first target is the indefensible (botnets) in order to keep resistance to this new policy at a minimum.
2) The reality is that a big move is being made: where before it was criminal to make _use_ of hacking-oriented software, but soon it will be criminal simply to author such software--or by logical extension, even to be in _possession_ of it.

Julian Assange, quote for the ages

Julian Assange wrote:

"Plans which assist authoritarian rule, once discovered, induce resistance. Hence these plans are concealed by successful authoritarian powers. This is enough to define their behavior as conspiratorial."

"Conspiracies are cognitive devices. They are able to outthink the same group of individuals acting alone Conspiracies take information about the world in which they operate (the conspiratorial environment), pass through the conspirators and then act on the result. We can see conspiracies as a type of device that has inputs (information about the environment), a computational network (the conspirators and their links to each other) and outputs (actions intending to change or maintain the environment)."

" a world where leaking is easy, secretive or unjust systems are nonlinearly hit relative to open, just systems. Since unjust systems, by their nature induce opponents, and in many places barely have the upper hand, mass leaking leaves them exquisitely vulnerable to those who seek to replace them with more open forms of governance."

"The powers that be" began to learn all about our...

Read the full article by Vivek Wadhwa here:

Over the centuries, we gathered a lot of data on things such as climate, demographics, and business and government transactions. Our farmers kept track of the weather so that they would know when to grow their crops; we had land records so that we could own property; and we developed phone books so that we could find people. Web 1.0 made it possible to make this information globally available and searchable.

This rapidly evolved into Web 2.0. Now data were being captured on what news we read, where we shopped, what sites we surfed, what music we listened to, what movies we watched, and where we travelled. And “the powers that be” started gathering information about our age, health, education, and socioeconomic status.

With the advent of LinkedIn, Myspace, Facebook, Twitter, and the many other social-media tools, the Web became “social” and “the powers that be” began to learn all about our work history, social and business contacts, and what we like—our food, entertainment, sexual preferences, etc. This is what Reid Hoffman calls Web 3.0.

In 2009, President Obama launched an ambitious program to modernize our healthcare system by making all health records standardized and electronic. The goal is to have all paper medical records—for the entire U.S. population—digitized and available online. This way, an emergency room will have immediate access to a patient’s medical history, the effectiveness of medicines can be researched over large populations, and general practitioners and specialists can coordinate their treatments. Click "Read more" ===>

Wal-Mart CEO: U.S. consumers face "serious" inflation.

U.S. consumers face "serious" inflation in the months ahead for clothing, food and other products, the head of Wal-Mart's U.S. operations warned Wednesday.

The world's largest retailer is working with suppliers to minimize the effect of cost increases and believes its low-cost business model will position it better than its competitors.

Still, inflation is "going to be serious," Wal-Mart U.S. CEO Bill Simon said during a meeting with USA TODAY's editorial board. "We're seeing cost increases starting to come through at a pretty rapid rate."

Along with steep increases in raw material costs, John Long, a retail strategist at Kurt Salmon, says labor costs in China and fuel costs for transportation are weighing heavily on retailers. He predicts prices will start increasing at all retailers in June.

"Every single retailer has and is paying more for the items they sell, and retailers will be passing some of these costs along," Long says. "Except for fuel costs, U.S. consumers haven't seen much in the way of inflation for almost a decade, so a broad-based increase in prices will be unprecedented in recent memory."

Read more:

"The army was using heavy machine guns ... against little kids ..."

"I saw carnage," said an American evacuee in Valletta. He declined to give his name as he has family in Libya still and fears for their safety.

"The army was using heavy machine guns and automatic rifles against little kids that were carrying nothing more than pebbles. ... They shot first. They didn't ask questions," he said, describing a crackdown in Tripoli.

===> In the United States, people think of the "threat of a standing army" as a quaint concept from the time of the Revolutionary War. These days Americans love their military, and many wonder why the military is not allowed to be used domestically.

===> This is because Americans are spoiled and have grown naive in their luxury. In Libya, on the other hand, people still have a healthy understanding of the true dangers of standing armies.

===> Under a government where human rights are not protected, the standing army simply becomes the meat grinder by which the regime maintains fear.

Coming soon: Social Security Reform

Social security reform will consist of individual retirement accounts...
...with a mandatory minimum percentage stored in safe US Treasury bonds.

The frog can then be boiled slowly, using incentives and penalties that change over time.

Conservatives will go for it since the percentage will start out low, and they will perceive it as a "victory" on social security.

Over time, the distributions and "accounts" will be changed to annuities, so that any remaining funds are kept by the government after death, and not the heirs. People will stop thinking in terms of their "nest egg" and instead in terms of their "payment".

Of course this will not solve the ultimate lie of social security, which is unsustainable, but may delay its effects, so that the sins of the fathers would be passed along to their sons.

This also does not solve the ultimate problem of finding an unlimited source of buyers for United States government debt, but merely delays it by way of first bankrupting most of the retirement accounts in the nation.

The Future on the Network

The current Internet is like a utility service, like cable TV or electricity. It can be tracked and it can be deactivated. It's greatly centralized.

What if all of the devices on the Internet simply sent messages through each other? A mesh network. The router in your house? Instead of connecting upstream to the cable company, it simply connects to all the neighbors' routers, using a wireless mesh protocol.

On a mesh network, devices pop in and out. Just as your iPhone connects to your home router automatically when it comes within range, so can your router itself connect to the routers of your neighbors. Messages are passed peer-to-peer until they reach their destination.

This mesh network will fully interoperate with the existing Internet and indeed will someday outgrow and envelop it. Here is a diagram:

Digital cash will be used for solving issues of resource allocation on such networks. Why did your router transmit packets for this device instead of that one? Because this one offered some digital cash postage.

I realized the eventuality of this when I considered the coming impact of robotics. By the way, check out Gostai Suite for robotics:

Gostai has released an open-source robotics library, Urbi, which allows for loosely-coupled robotics and AI modules (written in lower-level C++) to be connected and parallelized using a higher-level scripting language.

Urbi is now open source. If you'd like to start contributing to open-source robotics, or download some modules yourself, you can get it here:

You can test your robot in a simulator: