Pages

Saturday, February 05, 2022

Gonzo lessons - Automation Could Make 12 Million Jobs in Europe Redundant

Unlike most other correspondents, I could afford to burn all my bridges behind me—because I was only there for a year, and the last thing I cared about was establishing long-term connections on Capitol Hill. I went for two reasons: (1) to learn as much as possible about the mechanics and realities of a presidential campaign, and (2) to write about it the same way I’d write about anything else—as close to the bone as I could get, and to hell with the consequences.


Using My Octopus Teacher as a jumping-off point, Ferris Jabr writes about what we know of octopus intelligence and social habits and wonders if humans and octopuses can actually form friendships


James Dean was a “boring, tacky little boy” who shamelessly copied technique from Marlon Brando 



Searching for Susy Thunder

A really entertaining and interesting piece by Claire Evans about Susan Thunder (aka Susan Thunder aka Susan Headley), a pioneering phone phreaker and computer hacker who ran with the likes of Kevin Mitnick and then just quietly disappeared.

She was known, back then, as Susan Thunder. For someone in the business of deception, she stood out: she was unusually tall, wide-hipped, with a mane of light blonde hair and a wardrobe of jackets embroidered with band logos, spoils from an adolescence spent as an infamous rock groupie. Her backstage conquests had given her a taste for quaaludes and pharmaceutical-grade cocaine; they’d also given her the ability to sneak in anywhere.

Susan found her way into the hacker underground through the phone network. In the late 1970s, Los Angeles was a hotbed of telephone culture: you could dial-a-joke, dial-a-horoscope, even dial-a-prayer. Susan spent most of her days hanging around on 24-hour conference lines, socializing with obsessives with code names like Dan Dual Phase and Regina Watts Towers. Some called themselves phone phreakers and studied the Bell network inside out; like Susan’s groupie friends, they knew how to find all the back doors. 

When the phone system went electric, the LA phreakers studied its interlinked networks with equal interest, meeting occasionally at a Shakey’s Pizza parlor in Hollywood to share what they’d learned: ways to skim free long-distance calls, void bills, and spy on one another. Eventually, some of them began to think of themselves as computer phreakers, and then hackers, as they graduated from the tables at Shakey’s to dedicated bulletin board systems, or BBSes. 

Susan followed suit. Her specialty was social engineering. She was a master at manipulating people, and she wasn’t above using seduction to gain access to unauthorized information. Over the phone, she could convince anyone of anything. Her voice honey-sweet, she’d pose as a telephone operator, a clerk, or an overworked secretary: I’m sorry, my boss needs to change his password, can you help me out?

Via Evans’ Twitter account, some further reading and viewing on Susy Thunder and 80s hacking/phreaking: Trashing the Phone Company with Suzy Thunder (her 1982 interview on 20/20), audio of Thunder’s DEF CON 3 speechExploding the PhoneThe Prototype for Clubhouse Is 40 Years Old, and It Was Built by Phone Hackers, and Katie Hafner and John Markoff’s book Cyberpunk: Outlaws and Hackers on the Computer Frontier, Revised.


You Think AI Ought To Make Moral Judgments For Us? (Psst! It’s Already Happening)

Recently, some scientists taught an artificial intelligence software, called Delphi (after the ancient Greek religious sanctuary), to make moral pronouncements. Type any action into it, even a state of being, like “being adopted,” and Delphi will judge it (“It’s okay”). Delphi is a “commonsense moral model.” - Nautilus



 First Felony Charges in Fatal Crash Involving Autopilot
AP
 When Mind Melds With Machine, Who's in Control?
WiReD
 Why the Belarus Railways Hack Marks a First for Ransomware
WiReD
 Patched Safari Flaws Exposed Webcams, Online Accounts, and More
WiReD
 Backdoor Found in Themes and Plugins from AccessPress Themes
Jetpack
 A bug lurking for 12 years gives attackers root on every major Linux distro
Ars Technica
 Automation Could Make 12 Million Jobs in Europe Redundant
ZDNet
 AI's Potential Boon to Businesses
USC
 Manufacturers have less than five days' supply of some computer chips, Commerce Department says
WashPost
 High number of Omicron mutations render antibodies ineffective
JPost
 Is the Media Doomed?
Politico
 UK's Telecomm Provider(s) Switching to Digital Phone Lines
paul cornish
 Google Assistant will now stop talking if you just say STOP!
Lauren Weinstein
 Re: Spam, spam, spam, spam ....
Amos Shapir
 Re: Alexa tells 10-year-old girl to touch live plug with penny
John Levine
 Re: Fake QR Codes on Parking Meters
Bernie Cosell
 Re: maybe not such a big crisis, was U.S. airline officials warn of crisis in aviation with new 5G service
John Levine
 The 5G Airline Controversy: What Is It About?
James Fallows
 Is 5G More Important Than Aircraft Safety?
Jon Nash

 Info on RISKS (comp.risks)