We talk about major threats to security, mainly focussed on future threats and the reaction from security services. Some keywords are: Nuclear proliferation, robotic warfare, technology regulation, surveillance state, bioterrorism, and omniviolence.
Subscribe
Pocket CastsSpotifyStitcherApple PodcastsOvercastGoogle PodcastsPlayerFMYouTubeShow Notes
Section I Future of Security
Introduction: Emotional Reach, Classifying the Population, Keeping the Legitimacy
00:02:16 Crimes that really matter: How do security forces selectthe crimes they battle against, which ones are ignored.
00:02:33 Limitations of Crimefighting: War on drugs is ongoing,street robberies, etc.
00:03:30 State is focussing on crimes that risk itself, and on highpublic image.
00:04:30 Public percerption is high when public can identify andempathize with the victim (child abuse, burglary).
00:05:45 Germany: First case of predictive policing was burglary.00:07:40 The victim matters / vulnerability: People do react lesswith assault of a 20-30 year old man, than with the elderly, women,
or children.
00:09:13 Child porn is the universal crime where everybody getsbehind the police, …and that is used for higher surveillance.
Child pornography is the abdomination of the 21st century.
00:10:15 A lot of murder, a lot of kidnapping, a lot of burglariesetc, undermindes the belief in the state. Other crimes do not affect
the trust so much, i.e. insurance fraud. Nobody’s sorry about big
corporations being scammed.
Systemic Risk Categories: Crimes That Matter
First Example
00:11:34 First Example: Proliferation. Atomic weapon possessiondivide Good states from Bad States.
00:12:05 BND (Bundesnachrichtendienst) and Proliferation.00:12:30 Enemy States cooperated at the fall of Soviet Block andUdSSR, because of Proliferation.
00:15:20 Blind field of Proliferation: Smuggling of NuclearMaterial, Technology, Warheads. Sensor Networks to detect nuclear
material (isotope scanners).
00:17:40 Rumors: Unofficial and missing warhead counts (formerSoviet, US, Plane incidents over Mediterrean Sea).
00:20:04 Rumors: Cold War Soviet Union Sleeper Agents with SuitcaseBombs (not all recovered).
00:22:00 Small States profit from deterrent threat of Warheads, lesslikely to actually use them (cannot be retrieved).
00:22:50 Terrorist Organizations and Warheads: rely on secureterritory (hollowed out state): Iran, Afghanistan, Mexico.
00:24:07 Example: Afghanistan tolerating Al-Qaeda and 9/11.00:25:15 Just having the device doesn’t mean you’re able to triggerit: where is it from, maintenance, deploy (actors who follow
through, reliable remote triggers), maybe a lot of the old warheads
are not usable (physical trigger method is lost).
Second Example
00:30:35 Second Example: Transnational Organized Crime (NarcoCartels, MS-13, Triads, etc).
00:32:00 Safe Havens (no-go-areas) by MS-13 and Al-Qaeda: low levelof immunity and souvereignity.
00:35:35 Narco-Terrorism: Cooperations between terroristorganizations and pure criminal organizations.
00:36:50 Iran-Contra (Freedom Fighter VS Terrorist).00:37:47 A scared population is more likely to use drugs.00:38:25 Big criminal organizations undermine the stateinstitutions: corruption, blackmail, threats.
00:39:35 Loyalty and Trust within Institutions is undermined, andthus the political head becomes just an illusion of power (Mexico,
Miami in the 80s, etc).
Third Example
00:37:47 Third Example: Bioterrorism.00:43:12 CRISPR sequencing, “build your own smallpox”.00:44:00 Non-state actors: Aum Shinrikyo (Aleph) and Tokyo SubwayAttacks (Sarin Gas).
00:46:19 2001 Anthrax Attacks in the US.00:47:16 Rumor: Wuhan might be a targeted virus attack, but it’shard and too early to tell.
00:48:14 For states: bioweapons would also attack own citizens,unlimited transmission, contagion risks high (better: easy to
contain, infectious chain are short and unstable).
00:49:30 Terrorists: cannot attach threats or demands, since virusesare non-attributable. Exceptions: doomsday sects, radical
environmentalists.
Wrap-Up Section I
00:50:47 Wrap-Up first Part: Crimes That Matter. All are technologysupported crimes.
00:51:33 Transnational organized crime is a late development (cheaptravels, cheap organization and management technologies, cheap
communication), also a part of globalization.
00:52:49 Technological developments are supporting two classes ofcriminals: random criminals, child pornography.
00:53:05 Random Criminal: uses technology to amplyfy his effect.00:53:25 Child Pornography: digital cameras and internet made itreally problematic, because it became cheap and easy (all you need
is a mobile phone).
Section II Dystopian Side
Cybercrime, Robotic Warfare, Omniviolence
00:56:38 Skimming: copying credit cards, via cheap tech from thedarknet and Aliexpress.
00:58:35 Issue of non-attribution in Cybercrime: you don’t have tobe very smart, you randomly target victims, plus degree of
seperation (=every idiot can become a phisher).
00:59:34 High IQ cyber-criminals plus tech: bigger and much moreefficient organizations are possible (Paul LeRoux).
01:01:10 Strategic thinking criminals: do no make random mistakes,access to cheap and easy components (Shenzhen), low morals,
power-hungry individuals.
01:03:00 Omniviolence: Killer to killed persons ratio increases,systemic risks to countries, maybe entire planet (Example: nuclear
and bio weapons).
01:04:22 Robotic warfare: Drones plus biometrics.01:06:00 The State and Omniviolence: Intelligence services alreadyworking on it. Threat becomes increasingly realistic, while not
being trivial to deal with, or understand. Thing that is most likely
to shape the future.
01:07:19 Realistic scenario by now: Quadrocopter drones, single shotexplosive inside, plus facial recognition (ESP32 development kit).
01:08:55 Ground based autonomous vehicles is in the future of nextgeneration: DJi RoboMaster-s1, educational toy for children,
available today. Already has face and object recognition, autonomy
features.
01:10:21 Next 5-10 years: First autonomous robot school killing isrealistic.
01:10:38 There happen to be people out there, who are relativelysmart, and there happens to be a huge technological toolbox to
select from. Given it enough intelligence, and enough energy, drive,
and goals, you can be really dangerous these days.
01:11:10 Book: “Gefährliche Menschen (Dangerous Humans)” near-futuredystopian world where the whole system is focussed on preventing
omniviolence.
01:12:47 State tries to counteract omniviolence and others byregulating technology.
Drugs and Butterflies
01:13:07 How can you control potentially dangerous people?01:13:50 The tech industry and self-medicating with legal andillegal drugs, and an unrealistic dream.
01:15:38 Advertisement of drugs as “rebellious”. Drugs beingmarketed as rebellion,… (they) don’t help you to become an actual
rebel, and actually being effective.
01:16:24 Academia: The clever people trap, researching butterflies(you are being seen and heard, aurelians and lepidopterists, and
your work matters).
Preventive detention
01:17:47 Preventive detention. “If I lock this person up, I canprevent crime in the future.”
01:19:05 Psychiatric detention, used to silence people and put themaway (Gustl Mollath).
01:20:40 New preventive detention laws: limiting personal liberty toprevent crimes? Social and economic consequences.
Surveillance, Cryptography, and Regulations
01:21:50 Surveillance is everywhere.01:22:33 Growth of surveillance: Commercial interest, collectingdata, nudging.
01:22:50 Using surveillance data for AI training, run through neuralnetworks (health: predict illnesses), can also be used to predict
behavior.
01:24:05 Nation-States surveil the shit out of everything toincrease their security status (international trend).
01:24:17 New proposals for regulation, or ban, of face-recognition(EU, some US states).
01:25:00 Limitations of face-recognition: black people with darkskin. AI training sets are mostly light-skinned.
01:26:25 Why states might be open to proposals: Accusations ofracial bias, easy thing to give up (it’s commercialized already, see
ClearView AI).
01:27:17 Face Recognition Apps (Russia: FindFace App), FaceRecognition Spiders (原谅宝官方 yuanliang bao guanfang,
https://pornstarbyface.com/, https://deepmindy.com/)
01:28:13 Navigate the tech landscape through regulations: exampledrone sector.
01:31:00 Regulating cryptography: access to good cryptography foraverage joe is hard.
01:31:22 Even for relatively smart and motivated people, …implementing cryptographic systems by people who are not specialized
in that, usually goes wrong. It’s really hard to build secure
cryptographic software, even with libraries out there, etc.
01:33:20 Regulations of sales controls: example chemicals,pharmarcies.
01:34:00 State will increase security in the future by regulatingtechnology (regulating both components and knowledge).
01:34:50 Dystopian Vision, “black ball events”: Omniviolence will beprevented by total surveillance combined with AI. (Bostrom:
Vulnerable World Paper)
01:36:04 Anomaly detection: preventing anyone from buildingpotentially threatening tech, without actually understanding or
knowing what this tech is.
01:36:59 Securocrat’s decisions are based on body-count and not onlife quality.
01:37:20 Some cattle farmer talk: Consume, pay taxes, and put yourVR goggles on.
01:40:10 Preventing people who are too intelligent, too creative,from getting anywhere in life.
01:41:00 Cambridge Analytics for the Masses, Psychography: limitaccess, social scoring systems (today mostly reactive).
01:42:20 Predictive Technologies: sentencing rules in US.01:43:20 Creativity problem: detect outliers, categorize in good orbad, adjust access to technology. (Ender’s Game pilots)
01:44:44 Already using licensing by personality: bank accounts, gunlicenses. Where does the reliability score come from? Future might
be more automated.
01:46:50 Future: Same thing, but advanced by modern technology.01:47:08 Reactive scores, predicitive regulation: lawyers, MDs,pilot and weapon licenses. If you have a lot of points, they won’t
give you the license.
01:47:32 e-Government: maybe no human judgement in the futureneeded.
01:49:00 Looking at the Chinese petri dish: since Wuhan epidemic,deploying surveillance is cranked up.
01:50:37 Data Analysis, Laboratory for Surveillance: Locking downneighborhoods, limit travel within city, using drones, using CCTV
cameras to check masks and temperature, booking details, location
tracking, etc.
01:55:00 Wuhan as a dystopian prison: at least as frightening as thepandemic.
01:56:03 Control ratio: the amount of people you need to control ahuge population is going down.
01:56:20 Conflict Turkey-Syria, Idlib region: areal control bygrenade launchers, automatically engaged.
01:58:48 South Korea Border Patrol Bots: automated targeting (SentrySGR-A1, Hankook Mirae Method-2?)
01:59:33 UAV Drones: autonomous suicide drones, waiting for targetor flying into target.
02:00:09 Germany declared AI a “critical defense technology” =weapon technology for killing people.
Section III Less Dystopian Side
02:01:44 Donation Report02:04:25 Forum/ BBS: Async.preFrank and Smuggler answering your questions!
02:05:49 Question Section02:05:57 Forum: How would the average aspiring second-realmer gettheir nym used in legal documents or at their work place? Is that a
realistic goal?
02:14:00 Forum: I’d really like to see you guys cover the art ofclandestine purchasing. For example, do 3D printers have hidden
tracking codes like paper printers? Discussing details on aquiring
something like this with a pre-paid credit card and how to ship it
to a non-attributate address would be cool.
02:15:35 Forum: One Issue that I always find very hard is receivingshipments by mail. Not necessarily very illegal items, but maybe
items you just don’t want to receive at an attributable adress and
that are larger than what fits in a standard letterbox. How to
receive things in another name and where with the least amount of
trouble and risk?
02:20:25 Forum: How to beat facial recognition duringdrop-operations and otherwise? What methods are effective? How often
worn outside the TAZ?
02:23:25 Twitter: How to go into darknet? Virtual box and TOR? WhichOS?
02:25:27 Twitter: In terms of cyber-warfare, which state (or stateproxy) has the most tactical technical capacity for attacks and
defense?
02:33:55 Thoughts on accelerationism?02:37:14 Mail: I find howtovanish.com very helpful, even though itis outdated and US-centric. Are there more current and EU-centric
versions of the topic, how can I make my life as anonymous as
possible?
Minimum Wage Report
02:45:58 Minimum Wage ReportReading Recommendations
“The Future of Violence” by Benjamin Wittes & Gabriella Blum. ISBN978-0-465-05670-5
Vulnerable WorldHypothesis
SlaughterbotsSuperintelligence and the Future of Governance: On Prioritizing theControl Problem at the End of
History
DJI Robomaster S1GefaehrlicheMenschen
The Gustl Mollath CaseProject about facial recognition + porn + social media:done in May 2019 by 将记忆深埋interview, partially translatedarticle in ChineseEnder’s GameDiscuss
We’re on bbs.anarplex.net with our own board to discuss!
Hosts
Smuggler (Twitter)Frank Braun (Twitter)Contact
PGP fingerprint: 1C4A EFDB 8783 6614 C54D E230 2500 7933 D85F 2119 (key)Snail mail
Bitstream
Scanbox #06965
Ehrenbergstr. 16a
10245 Berlin
Germany
Please send us feedback letters, postcards, and interesting books. You can also send us your dirty fiat by cash in the mail! We take all currencies.
Support
Please support Cypherpunk Bitstream by donating to:
Bitcoin: 38mzCtXHjgq6RusYQsFy2TQiLvLK7vN5JF (also via lightning network)
Bitcoin Cash: qrpwhtsag0u4rnuam9a5vwmqnly96znas5f5txjc35
Decred: Dsi9j7SdwZrHtCfUmxTNgpVGx2YAboZc7ve
Monero: 87UPx5sBS6g6wTvyRqqSMfFM6DzfHCPtFE25VC62vfohZVv4RRNcwif1XAPWTF27U1BKZEsrEXzDr6bMnGoTcThATvamE73
Zcash: t1ewcXqQ9Uog5gMYjeeV46WiWB5j2SwD9Sv