air gap

82 results back to index


pages: 960 words: 125,049

Mastering Ethereum: Building Smart Contracts and DApps by Andreas M. Antonopoulos, Gavin Wood Ph. D.

air gap, Amazon Web Services, bitcoin, blockchain, business logic, continuous integration, cryptocurrency, Debian, digital divide, Dogecoin, domain-specific language, don't repeat yourself, Edward Snowden, en.wikipedia.org, Ethereum, ethereum blockchain, fault tolerance, fiat currency, Firefox, functional programming, Google Chrome, information security, initial coin offering, intangible asset, Internet of things, litecoin, machine readable, move fast and break things, node package manager, non-fungible token, peer-to-peer, Ponzi scheme, prediction markets, pull request, QR code, Ruby on Rails, Satoshi Nakamoto, sealed-bid auction, sharing economy, side project, smart contracts, transaction costs, Turing complete, Turing machine, Vickrey auction, Vitalik Buterin, web application, WebSocket

Transfer the unsigned transaction to an “air-gapped” offline device for transaction signing, e.g., via a QR code or USB flash drive. Transmit the signed transaction (back) to an online device for broadcast on the Ethereum blockchain, e.g., via QR code or USB flash drive. Figure 6-7. Offline signing of Ethereum transactions Depending on the level of security you need, your “offline signing” computer can have varying degrees of separation from the online computer, ranging from an isolated and firewalled subnet (online but segregated) to a completely offline system known as an air-gapped system. In an air-gapped system there is no network connectivity at all — the computer is separated from the online environment by a gap of “air.”

In an air-gapped system there is no network connectivity at all — the computer is separated from the online environment by a gap of “air.” To sign transactions you transfer them to and from the air-gapped computer using data storage media or (better) a webcam and QR code. Of course, this means you must manually transfer every transaction you want signed, and this doesn’t scale. While not many environments can utilize a fully air-gapped system, even a small degree of isolation has significant security benefits. For example, an isolated subnet with a firewall that only allows a message-queue protocol through can offer a much-reduced attack surface and much higher security than signing on the online system.

Here are a few tips to help you manage this responsibility: Do not improvise security. Use tried-and-tested standard approaches. The more important the account (e.g., the higher the value of the funds controlled, or the more significant the smart contracts accessible), the higher security measures should be taken. The highest security is gained from an air-gapped device, but this level is not required for every account. Never store your private key in plain form, especially digitally. Fortunately, most user interfaces today won’t even let you see the raw private key. Private keys can be stored in an encrypted form, as a digital “keystore” file. Being encrypted, they need a password to unlock.


pages: 587 words: 117,894

Cybersecurity: What Everyone Needs to Know by P. W. Singer, Allan Friedman

4chan, A Declaration of the Independence of Cyberspace, air gap, Apple's 1984 Super Bowl advert, barriers to entry, Berlin Wall, bitcoin, blood diamond, borderless world, Brian Krebs, business continuity plan, Chelsea Manning, cloud computing, cognitive load, crowdsourcing, cuban missile crisis, data acquisition, do-ocracy, Dr. Strangelove, drone strike, Edward Snowden, energy security, failed state, fake news, Fall of the Berlin Wall, fault tolerance, Free Software Foundation, global supply chain, Google Earth, information security, Internet of things, invention of the telegraph, John Markoff, John Perry Barlow, Julian Assange, Khan Academy, M-Pesa, military-industrial complex, MITM: man-in-the-middle, mutually assured destruction, Network effects, packet switching, Peace of Westphalia, pre–internet, profit motive, RAND corporation, ransomware, RFC: Request For Comment, risk tolerance, rolodex, Seymour Hersh, Silicon Valley, Skype, smart grid, SQL injection, Steve Jobs, Stuxnet, Twitter Arab Spring, uranium enrichment, vertical integration, We are Anonymous. We are Legion, web application, WikiLeaks, Yochai Benkler, zero day, zero-sum game

Power companies that don’t link up, for instance, may be less vulnerable, but they can’t run “smart” power grids that save both money and the environment. Similarly, maintaining an air gap is often unrealistic, as the Iranians discovered when their supposedly air-gapped systems still got infected by the Stuxnet virus. At some point, old data needs to come out, and new instructions need to go in. Systems need to be patched, updated, and maintained. Indeed, the National Cybersecurity and Communications Integration Center has conducted literally hundreds of vulnerability assessments of private American business air-gapping attempts. Not once did it find an operations network successfully separated from the firm’s other computer enterprise networks.

This was perhaps the most insidious part of Stuxnet: it was an integrity attack par excellence. Stuxnet didn’t just corrupt the process, it hid its effects from the operators and exploited their trust that the computer systems would accurately and honestly describe what was taking place. Iranian engineers didn’t even suspect a cyberattack; their systems were air-gapped from the Web, and up to this point worms and viruses had always had an obvious effect on the computer, not the hardware. Eventually, the Iranian scientists suffered low morale, under the impression that they couldn’t do anything right; seventy years earlier a bunch of Americans had built an atomic bomb using slide rulers, and they couldn’t even get their modern-day centrifuges to work.

The last line of defense is akin to the strategy that nuns use to police Catholic school dances. The nuns often stuff balloons between teenagers dancing too closely, creating an “air gap” to ensure nothing sneaky happens. In cybersecurity terms, an air gap is a physical separation between the network and critical systems. Such practice is common with critical infrastructure, such as with power companies, and was even attempted by the Iranians to protect their nuclear research from cyberattack. The problem with air gaps, much like the abstinence that the nuns try to enforce, is that it often doesn’t work in practice. Giving up control of operational infrastructure involves sacrifices in efficiency and effectiveness.


pages: 340 words: 96,149

@War: The Rise of the Military-Internet Complex by Shane Harris

air gap, Amazon Web Services, barriers to entry, Berlin Wall, Brian Krebs, centralized clearinghouse, Citizen Lab, clean water, computer age, crowdsourcing, data acquisition, don't be evil, Edward Snowden, end-to-end encryption, failed state, Firefox, information security, John Markoff, Julian Assange, military-industrial complex, mutually assured destruction, peer-to-peer, Silicon Valley, Silicon Valley startup, Skype, Stuxnet, systems thinking, undersea cable, uranium enrichment, WikiLeaks, zero day

Some of the employees—it’s still unclear how many—opened the messages and released spyware onto the corporate networks of the pipeline operators. The hackers didn’t have access to the control systems of the pipelines themselves, but they were potentially within striking distance. If the pipeline operator had air-gapped the facility’s control systems from the public Internet, they were probably safe. Of course, there was always the risk that an unsuspecting employee could carry the malware over the air gap via a USB drive. Officials at the highest levels of the FBI, Homeland Security, and the NSA were on alert. An intruder who could control the pipeline could conceivably disrupt the flow of natural gas, or perhaps cause internal controls to malfunction, leading to a breakdown or even an explosion.

It was sending out a beacon, a signal to a host computer somewhere on the Internet, asking for instructions on what to do next—perhaps copy files or erase data. That itself wasn’t so alarming. But the beacon was emanating from inside a classified network used by US Central Command, which ran the wars in Iraq and Afghanistan. And that was supposed to be impossible, because the network wasn’t connected to the Internet. No classified, air-gapped military network had ever been breached. Those networks were kept disconnected from the public Internet because they contained some of the military’s most important secret communications, including war plans and orders to troops in the field. Analysts had been working feverishly for the past few days to determine how the malicious program had made its way onto the network, and they speculated that it must have piggybacked on an infected USB drive, probably inserted by an unwitting soldier in Afghanistan, where the majority of infections seemed to have occurred.

Those websites had been hit in recent years with so-called denial-of-service attacks, which flood servers with requests for information and cause them to crash but don’t do any damage to the account data inside a bank’s computers. And much of that information, the executive says, moves over networks that are air-gapped, or have very few connections to the public Internet. “Just to say that the banks are open to Internet attacks is not true. And the Federal Reserve, the Treasury Department, the securities brokers, the settlement systems—they all have a really good handle on the whole financial services infrastructure and how it works.


pages: 434 words: 77,974

Mastering Blockchain: Unlocking the Power of Cryptocurrencies and Smart Contracts by Lorne Lantz, Daniel Cawrey

air gap, altcoin, Amazon Web Services, barriers to entry, bitcoin, blockchain, business logic, business process, call centre, capital controls, cloud computing, corporate governance, creative destruction, cross-border payments, cryptocurrency, currency peg, disinformation, disintermediation, distributed ledger, Dogecoin, Ethereum, ethereum blockchain, fault tolerance, fiat currency, Firefox, global reserve currency, information security, initial coin offering, Internet of things, Kubernetes, litecoin, low interest rates, Lyft, machine readable, margin call, MITM: man-in-the-middle, multilevel marketing, Network effects, offshore financial centre, OSI model, packet switching, peer-to-peer, Ponzi scheme, prediction markets, QR code, ransomware, regulatory arbitrage, rent-seeking, reserve currency, Robinhood: mobile stock trading app, Ross Ulbricht, Satoshi Nakamoto, Silicon Valley, Skype, smart contracts, software as a service, Steve Wozniak, tulip mania, uber lyft, unbanked and underbanked, underbanked, Vitalik Buterin, web application, WebSocket, WikiLeaks

The process to generate the signature that authorizes funds to be sent from an address whose private key is in cold storage is also completed offline, using an airgapped computer—that is, a computer that has never been connected to the internet. Once the signature is generated, it is manually entered onto a machine that is connected to the internet, which broadcasts the transaction request to the blockchain network. This can be done in two ways: On an airgapped computer, save the signature into a text file, then copy the text file onto a formatted and cleaned USB stick. Then put the USB stick into an internet-connected computer, and broadcast out the transaction with the signature from that computer.

Index A ABI (application binary interface), Interacting with a smart contract addressesBitcoin, Public and Private Keys in Cryptocurrency Systemsassociating with an identity, The Evolution of Crypto Laundering generating with public/private keys, Public and Private Keys in Cryptocurrency Systems in UTXO transaction model, The UTXO Model Ethereumfor smart contracts, Deploying a smart contract stealth addresses on Monero, How Monero Works whitelisting, Counterparty Risk adjustable blocksize cap (Bitcoin), The Bitcoin Cash Fork adoption of blockchain, The Future of Blockchain airdrops, disbursement of cryptocurrencies via, Airdrops airgapped computers, Counterparty Risk altchains, Understanding Forks altcoins, Understanding Forks, Altcoins-Counterpartyearlier, sample of, Altcoins Litecoin, Litecoin other, More Altcoin Experiments Amazon Quantum Ledger, Blockchain as a Service analysis, Analysis-Hunting for Bartanalytics services for cryptocurrency blockchains, Analytics fundamental cryptocurrency analysis, Fundamental Cryptocurrency Analysis-Tools for fundamental analysistools for, Tools for fundamental analysis Tullip Mania or the internet, Tulip Mania or the internet?


pages: 651 words: 186,130

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth

4chan, active measures, activist lawyer, air gap, Airbnb, Albert Einstein, Apollo 11, barriers to entry, Benchmark Capital, Bernie Sanders, Big Tech, bitcoin, Black Lives Matter, blood diamond, Boeing 737 MAX, Brexit referendum, Brian Krebs, Citizen Lab, cloud computing, commoditize, company town, coronavirus, COVID-19, crony capitalism, crowdsourcing, cryptocurrency, dark matter, David Vincenzetti, defense in depth, digital rights, disinformation, don't be evil, Donald Trump, driverless car, drone strike, dual-use technology, Edward Snowden, end-to-end encryption, failed state, fake news, false flag, Ferguson, Missouri, Firefox, gender pay gap, George Floyd, global pandemic, global supply chain, Hacker News, index card, information security, Internet of things, invisible hand, Jacob Appelbaum, Jeff Bezos, John Markoff, Ken Thompson, Kevin Roose, Laura Poitras, lockdown, Marc Andreessen, Mark Zuckerberg, mass immigration, Menlo Park, MITM: man-in-the-middle, moral hazard, Morris worm, move fast and break things, mutually assured destruction, natural language processing, NSO Group, off-the-grid, offshore financial centre, open borders, operational security, Parler "social media", pirate software, purchasing power parity, race to the bottom, RAND corporation, ransomware, Reflections on Trusting Trust, rolodex, Rubik’s Cube, Russian election interference, Sand Hill Road, Seymour Hersh, Sheryl Sandberg, side project, Silicon Valley, Skype, smart cities, smart grid, South China Sea, Steve Ballmer, Steve Bannon, Steve Jobs, Steven Levy, Stuxnet, supply-chain attack, TED Talk, the long tail, the scientific method, TikTok, Tim Cook: Apple, undersea cable, unit 8200, uranium enrichment, web application, WikiLeaks, zero day, Zimmermann PGP

One Microsoft zero-day allowed the worm to invisibly spread from an infected USB flash drive onto a computer undetected. Others allowed it to crawl across the network from there, climbing ever higher up the digital chain of command in search of its final destination: Iran’s Natanz nuclear plant, where it burrowed deep into the offline, or “air-gapped,” computers that controlled the rotors that spun Iran’s uranium centrifuges. And then, by remote command, Stuxnet silently spun some of Iran’s centrifuges out of control, while stopping others from spinning entirely. By the time Iran’s nuclear scientists discovered that a computer worm was responsible for the destruction of their centrifuges, Stuxnet had already destroyed a fifth of Tehran’s uranium centrifuges and set Iran’s nuclear ambitions back years.

Some suspect a Mossad spy, a CIA officer, a Dutch mole, a well-paid insider, or an unwitting contractor at one of the five Iranian companies that Olympic Games targeted in the lead-up to the first attack. And we may only find out in 2039, when Olympic Games is set to be declassified. For now, all we know is that it had to have been a human with an infected thumb drive. Natanz’s computers were “air-gapped,” specifically to keep the Americans and Israelis out. Years earlier, the Americans allegedly tried to sabotage the centrifuges with a far more rudimentary attack. U.S. spies had intercepted Natanz’s power supplies as they traveled from Turkey to Iran, and when the equipment was plugged in, a powerful electrical surge ripped through the frequency converters that controlled the centrifuge motors, causing them to blow up.

We could start by passing laws with real teeth that mandate, for instance, that critical infrastructure operators refrain from using old, unsupported software; that they conduct regular penetration tests; that they don’t reuse manufacturers’ passwords; that they turn on multifactor authentication; and that they airgap the most critical systems. For years, lobbyists at the U.S. Chamber of Commerce have argued that even voluntary standards are too onerous on the private companies that oversee the nation’s critical infrastructure. I would argue the cost of doing nothing now outweighs the burden of doing something.


pages: 266 words: 80,018

The Snowden Files: The Inside Story of the World's Most Wanted Man by Luke Harding

affirmative action, air gap, airport security, Anton Chekhov, Apple's 1984 Super Bowl advert, Berlin Wall, Big Tech, Bletchley Park, Chelsea Manning, disinformation, don't be evil, drone strike, Edward Snowden, Etonian, Firefox, Google Earth, information security, Jacob Appelbaum, job-hopping, Julian Assange, Khan Academy, kremlinology, Laura Poitras, Mark Zuckerberg, Maui Hawaii, MITM: man-in-the-middle, national security letter, operational security, Panopticon Jeremy Bentham, pre–internet, Ralph Waldo Emerson, rolodex, Rubik’s Cube, Silicon Valley, Skype, social graph, Steve Jobs, TechCrunch disrupt, undersea cable, web application, WikiLeaks

The method is the same as that used by Manning, who downloaded and sent to WikiLeaks a quarter of a million US diplomatic cables on a CD marked ‘Lady Gaga’ while working in a steamy field station outside Baghdad. Thumb drives are forbidden to most staff. But a ‘sysadmin’ could argue that he or she was repairing a corrupted user profile, and needed a backup. The thumb drive could then be carried away to bridge the ‘airgap’ that existed between the NSA system and the regular internet. Why did nobody raise the alarm? Was the NSA asleep? Sitting in Hawaii, Snowden could remotely reach into the NSA’s servers, some 5,000 miles away in Fort Meade, through what was known as a ‘thin client’ system. Most staff had already gone home for the night when Snowden logged on, six time zones away.

All phones were banned: a row of BlackBerrys and smartphones sat on a table outside with their owners’ names on yellow Post-it notes. The windows of the bunker were papered over. All the computers were new. None had ever been connected to the internet or any other network – a precaution against hacking or phishing attacks. They were to remain ‘air-gapped’ throughout. Multiple passwords were needed to log in; no staff member knew more than one password. Work was written and saved on USB sticks; nothing went on the network. In the corner an air-conditioning unit gave off a low hum. There was also a shredder. Without natural light and strictly off-limits to cleaners, the bunker soon became frowsty.


pages: 590 words: 152,595

Army of None: Autonomous Weapons and the Future of War by Paul Scharre

"World Economic Forum" Davos, active measures, Air France Flight 447, air gap, algorithmic trading, AlphaGo, Apollo 13, artificial general intelligence, augmented reality, automated trading system, autonomous vehicles, basic income, Black Monday: stock market crash in 1987, brain emulation, Brian Krebs, cognitive bias, computer vision, cuban missile crisis, dark matter, DARPA: Urban Challenge, data science, deep learning, DeepMind, DevOps, Dr. Strangelove, drone strike, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, facts on the ground, fail fast, fault tolerance, Flash crash, Freestyle chess, friendly fire, Herman Kahn, IFF: identification friend or foe, ImageNet competition, information security, Internet of things, Jeff Hawkins, Johann Wolfgang von Goethe, John Markoff, Kevin Kelly, Korean Air Lines Flight 007, Loebner Prize, loose coupling, Mark Zuckerberg, military-industrial complex, moral hazard, move 37, mutually assured destruction, Nate Silver, Nick Bostrom, PalmPilot, paperclip maximiser, pattern recognition, Rodney Brooks, Rubik’s Cube, self-driving car, sensor fusion, South China Sea, speech recognition, Stanislav Petrov, Stephen Hawking, Steve Ballmer, Steve Wozniak, Strategic Defense Initiative, Stuxnet, superintelligent machines, Tesla Model S, The Signal and the Noise by Nate Silver, theory of mind, Turing test, Tyler Cowen, universal basic income, Valery Gerasimov, Wall-E, warehouse robotics, William Langewiesche, Y2K, zero day

Stuxnet infections appear to be correlated with a sharp decline in the number of centrifuges operating at Natanz. Security specialists have further speculated that the United States, Israel, or possibly both, were behind Stuxnet, although definitive attribution can be difficult in cyberspace. Stuxnet had a tremendous amount of autonomy. It was designed to operate on “air-gapped” networks, which aren’t connected to the internet for security reasons. In order to reach inside these protected networks, Stuxnet spread via removable USB flash drives. This also meant that once Stuxnet arrived at its target, it was on its own. Computer security company Symantec described how this likely influenced Stuxnet’s design: While attackers could control Stuxnet with a command and control server, as mentioned previously the key computer was unlikely to have outbound Internet access.

There’s “no difference” between the technology for offense and defense, Brumley said. They’re just different applications of the same technology. He compared it to a gun, which could be used for hunting or to fight wars. Walker agreed. “All computer security technologies are dual-use,” he said. For safety reasons, DARPA had the computers compete on an air-gapped network that was closed off from the internet. DARPA also created a special operating system just for this contest. Even if one of the systems was plugged into the internet, it would need to be re-engineered to search for vulnerabilities on a Windows, Linux, or Mac machine. Brumley emphasized that they’ve never had a problem with people using this technology for nefarious ends at Carnegie Mellon.

Like other malware, Stuxnet also had the ability to replicate and propagate, infecting other computers. Stuxnet spread far beyond its original target, infecting over 100,000 computers. Symantec referred to these additional computers as “collateral damage,” an unintentional side effect of Stuxnet’s “promiscuous” spreading that allowed it to infiltrate air-gapped networks. To compensate for these collateral infections, however, Stuxnet had a number of safety features. First, if Stuxnet found itself on a computer that did not have the specific type of PLC it was looking for, it did nothing. Second, each copy of Stuxnet could spread via USB to only three other machines, limiting the extent of its proliferation.


pages: 282 words: 92,998

Cyber War: The Next Threat to National Security and What to Do About It by Richard A. Clarke, Robert Knake

air gap, barriers to entry, complexity theory, data acquisition, Dr. Strangelove, escalation ladder, Golden arches theory, Herman Kahn, information security, Just-in-time delivery, launch on warning, military-industrial complex, MITM: man-in-the-middle, nuclear winter, off-the-grid, packet switching, RAND corporation, Robert Hanssen: Double agent, Ronald Reagan, Seymour Hersh, Silicon Valley, smart grid, South China Sea, Steve Jobs, systems thinking, Timothy McVeigh, trade route, undersea cable, Y2K, zero day

The information they stole was related to the design of the aircraft and to its electronics systems, although what exactly was stolen may never be known because the hackers covered their tracks by encrypting the stolen information before exporting it. According to Pentagon officials, the most sensitive information on the program could not have been accessed because it was allegedly air-gapped from the network. With a high degree of certainty, these officials believe that the intrusion can be traced back to an IP address in China and that the signature of the attack implicates Chinese government involvement. This was not the first time the F-35 program had been successfully hacked. The theft of the F-35 data started in 2007 and continued through 2009.

SIPRNET: Secret Internet Protocol Router Network is the Defense Department’s global intranet for transmitting confidential and secret-level information. The Defense Department classifies information into five catergories: unclassified, confidential, secret, top secret, top secret/SCI (specially compartmented information). The SIPRNET is supposed to be air-gapped from, i.e., not physically touching, the unclassified NIPRNET and the Internet. Supervisory Control and Data Acquisition System (SCADA): Software for networks of devices that control the operation of a system of machines such as valves, pumps, generators, transformers, and robotic arms. SCADA software collects information about the condition of and activities on a system.

Most U.S. military units cannot sustain themselves for long without support from private-sector companies, and most of that communication goes through the NIPRNET. The second DoD network is called SIPRNET and is used to pass secret-level classified information. Many military orders are transmitted over the SIPRNET. There is supposed to be an “air gap” between the unclassified and secret-level networks. Users of the classified network download things from the Internet and upload them to the SIPRNET, thus sometimes passing malware along unknowingly. Pentagon information security specialists call this problem the “sneakernet threat.” In November 2008, a Russian-origin piece of spyware began looking around cyberspace for dot-mil addresses, the unclassified NIPRNET.


pages: 326 words: 103,170

The Seventh Sense: Power, Fortune, and Survival in the Age of Networks by Joshua Cooper Ramo

air gap, Airbnb, Alan Greenspan, Albert Einstein, algorithmic trading, barriers to entry, Berlin Wall, bitcoin, Bletchley Park, British Empire, cloud computing, Computing Machinery and Intelligence, crowdsourcing, Danny Hillis, data science, deep learning, defense in depth, Deng Xiaoping, drone strike, Edward Snowden, Fairchild Semiconductor, Fall of the Berlin Wall, financial engineering, Firefox, Google Chrome, growth hacking, Herman Kahn, income inequality, information security, Isaac Newton, Jeff Bezos, job automation, Joi Ito, Laura Poitras, machine translation, market bubble, Menlo Park, Metcalfe’s law, Mitch Kapor, Morris worm, natural language processing, Neal Stephenson, Network effects, Nick Bostrom, Norbert Wiener, Oculus Rift, off-the-grid, packet switching, paperclip maximiser, Paul Graham, power law, price stability, quantitative easing, RAND corporation, reality distortion field, Recombinant DNA, recommendation engine, Republic of Letters, Richard Feynman, road to serfdom, Robert Metcalfe, Sand Hill Road, secular stagnation, self-driving car, Silicon Valley, Skype, Snapchat, Snow Crash, social web, sovereign wealth fund, Steve Jobs, Steve Wozniak, Stewart Brand, Stuxnet, superintelligent machines, systems thinking, technological singularity, The Coming Technological Singularity, The Wealth of Nations by Adam Smith, too big to fail, Vernor Vinge, zero day

In 2015, for instance, Israeli security researchers developed an astonishing hack that proved Baran’s nearly spiritual claim that all objects can be linked by connection—and demonstrated the way that wily attacks might breach even the safest-looking arrangements. “It has been assumed that the physical separation of computers (air-gap) provides a reliable level of security,” Mordechai Guri and his team wrote in a paper describing how they had used one isolated machine to infect another. Physical separation is, in fact, one of the cardinal rules of safe computing, a kind of lemma to join Robert Morris Sr.’s “Don’t connect” rule of network safety: Two machines, unconnected by a network, should not be able to affect each other.

Husted, “Analysis Techniques for Exploring Emergent Vulnerabilities and Attacks on Mobile Devices” (PhD thesis, Indiana University, 2013), at http://www.cs.indiana.edu/~nhusted/docs/proposal.pdf. In a video: For a description of this exploit, see Mordechai Guri, Matan Monitz, Yisroel Mirski, and Yuval Elovici, “BitWhisper: Covert Signaling Channel Between Air-Gapped Computers Using Thermal Manipulations,” arXiv:1503.07919 [cs.CR], March 26, 2015. Jung Hoon Lee: Lucian Constantin, “Chrome, Firefox, Explorer, Safari Were All Hacked at Pwn2Own Contest,” PC World, March 20, 2015. It’s also an opportunity for: Jeffrey C. Mogul, “Emergent (Mis)behavior vs. Complex Software Systems,” ACM SIGOPS Operating Systems Review—Proceedings of the 2006 EuroSys Conference 40, no. 4 (October 2006): 295 “We are not experts”: Stephen Cobb and Andrew Lee, “Malware Is Called Malicious for a Reason: The Risks of Weaponizing Code,” in 6th International Conference on Cyber Conflict: Proceedings 2014, ed.

The second kid should remain healthy. The Tel Aviv research team wanted to challenge this. First they placed two computers side by side on a desk, unconnected to each other by any wire or network. One machine was connected to the Internet. The other was completely isolated—in computer security parlance, it was “air gapped”—like the healthy kid in the distant building. Then the researchers began their Houdini trick: Look! Watch us corrupt this completely unconnected machine! Running a set of programs on the network-connected machine, the Israeli team was able to warm the processor board of that computer as though they were revving a car engine, eventually making it hot enough for the temperature changes to be detected by sensors inside the secure, allegedly impregnable “boy in the bubble” machine sitting a few inches away.


Wireless by Charles Stross

air gap, anthropic principle, back-to-the-land, Benoit Mandelbrot, Buckminster Fuller, Cepheid variable, cognitive dissonance, colonial exploitation, cosmic microwave background, Easter island, epigenetics, finite state, Georg Cantor, gravity well, hive mind, hydroponic farming, jitney, Khyber Pass, Late Heavy Bombardment, launch on warning, lifelogging, Magellanic Cloud, mandelbrot fractal, MITM: man-in-the-middle, Neil Armstrong, peak oil, phenotype, Pluto: dwarf planet, security theater, sensible shoes, Turing machine, undersea cable

The title reads: POWER, COOLING, AND SUBSTATION REQUIREMENTS FOR YOUR IBMS/1602-M200. I sneeze, puzzled. “Boss?” “I suggest you read and memorize this booklet, Bob. It is not impossible that there will be an exam, and you really wouldn’t want to fail it.” My skin crawls. “Boss?” Pause. “It’s not true that the Funny Farm is entirely leakproof, Bob. It’s surrounded by an air-gap, but it was designed to leak under certain very specific conditions. I find it troubling that these conditions do not appear to apply to the present circumstances. In addition to memorizing this document, you might want to review the files on GIBBOUS MOON and AXIOM REFUGE before you go.” Pause. “And if you see Cantor, give my regards to the old coffin-dodger.

Here’s the point: Matron isn’t just a 1960s mainframe: we can’t work miracles, and artificial intelligence is still fifty years in the future. However, we can bind an extradimensional entity and compel it to serve, and even communicate with it by using a 1960s mainframe as a front-end processor. Which is all very well, especially if it’s in a secure air-gapped installation with no way of getting out. But what if some double-domed theoreticians who are working on a calculus of contagion using AXIOM REFUGE accidentally talk in front of one of its peripheral units about a way of sending a message? What if a side effect of their research has accidentally opened a chink in the firewall?


pages: 361 words: 117,566

Money Men: A Hot Startup, a Billion Dollar Fraud, a Fight for the Truth by Dan McCrum

air gap, Amazon Web Services, Bernie Madoff, Big Tech, bitcoin, Brexit referendum, Buckminster Fuller, call centre, Cambridge Analytica, centre right, Citizen Lab, corporate governance, corporate raider, COVID-19, Donald Trump, Elon Musk, fake news, forensic accounting, Internet Archive, Kinder Surprise, lockdown, Market Wizards by Jack D. Schwager, multilevel marketing, new economy, off-the-grid, offshore financial centre, pirate software, Ponzi scheme, Potemkin village, price stability, profit motive, reality distortion field, rolodex, Salesforce, short selling, Silicon Valley, Skype, SoftBank, sovereign wealth fund, special economic zone, Steve Jobs, Vision Fund, WeWork

Assuming the worst, about both Wirecard’s hacking capabilities and Singapore state surveillance, I was equipped with a pile of temporary equipment: an old iPhone that had been completely wiped and I’d only use for the trip; a thin Chromebook if I needed to log on to email, with strict instructions to never use hotel Wi-Fi; and a hefty air-gapped laptop with all its wireless connections disabled, for reviewing and encrypting any documents I might get. The data dump was so large we ordered lunch while the transfer took place. I picked at an omelette as the computer whirred under the table, its faint humming the only sound of a digital avalanche.

Paul Murphy Founder, FT Alphaville. Knows the value of lunch. Stefania Palma Singapore correspondent. ‘Donna Stefania’. Prologue BY JANUARY 2019 I had spent two months cloistered in a bunker to one side of the Financial Times newsroom. I’d worked ‘off the grid’, beyond the reach of online hackers, and each night my air-gapped computer and notebooks had gone into a safe with steel walls six inches thick. The paranoia I took home with me, eyeing fellow commuters with suspicion, alert for signs of the surveillance I knew my sources were under. They were nervous and impatient, then one of them fell ill. She’d thought it was stress, but her doctor had bad news: it looked like brain cancer.


pages: 159 words: 42,401

Snowden's Box: Trust in the Age of Surveillance by Jessica Bruder, Dale Maharidge

air gap, anti-communist, Bay Area Rapid Transit, Berlin Wall, Black Lives Matter, blockchain, Broken windows theory, Burning Man, Cambridge Analytica, cashless society, Chelsea Manning, citizen journalism, computer vision, crowdsourcing, deep learning, digital rights, disinformation, Donald Trump, Edward Snowden, Elon Musk, end-to-end encryption, Evgeny Morozov, Ferguson, Missouri, Filter Bubble, Firefox, information security, Internet of things, Jeff Bezos, Jessica Bruder, John Perry Barlow, Julian Assange, Laura Poitras, license plate recognition, Mark Zuckerberg, mass incarceration, medical malpractice, messenger bag, Neil Armstrong, Nomadland, Occupy movement, off grid, off-the-grid, pattern recognition, Peter Thiel, Robert Bork, Seymour Hersh, Shoshana Zuboff, Silicon Valley, Skype, social graph, Steven Levy, surveillance capitalism, tech bro, Tim Cook: Apple, web of trust, WikiLeaks

She suggested that the New Yorker publish a profile of her source in Hong Kong, adding that it could be good fit for one of two journalists: Seymour Hersh or Jane Mayer. During their second meeting, Remnick asked for proof that the source was legitimate and for her to explain the story clearly and fully. She opened her air-gapped laptop and showed him a slide from the leaked archive. This, she later recalled, was the black budget. Remnick’s interest was piqued, but the significance of that single slide — and the position it might hold in a larger mosaic of leaked intelligence documents — was maddeningly cryptic. Who was the source?


pages: 549 words: 139,625

Startide rising by David Brin

air gap, dark pattern, gravity well, haute cuisine

The ship’s surgeon, Makanee, had suggested he try sleeping in the old-fashioned way, drifting at the surface of a pool of water. Creideiki decided to try Makanee’s alternative. He made sure that there was a big air-gap at the top of his state-room. Then he verified three times that the redundant oxygen alarms were all in perfect order. Finally, he shrugged out of his harness, turned off the lights, rose to the surface and expelled the oxywater in his gill-lung. That part was a relief. Still, at first he just lay at the air-gap near the overhead, his mind racing and his skin itching for the touch of his tool harness. It was an irrational itch, he knew. Pre-spaceflight humans, in their primitive, neurotic societies, must have felt the same way about nudity.


pages: 464 words: 127,283

Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia by Anthony M. Townsend

1960s counterculture, 4chan, A Pattern Language, Adam Curtis, air gap, Airbnb, Amazon Web Services, anti-communist, Apple II, Bay Area Rapid Transit, Big Tech, bike sharing, Boeing 747, Burning Man, business process, call centre, carbon footprint, charter city, chief data officer, clean tech, clean water, cloud computing, company town, computer age, congestion charging, congestion pricing, connected car, crack epidemic, crowdsourcing, DARPA: Urban Challenge, data acquisition, Deng Xiaoping, digital divide, digital map, Donald Davies, East Village, Edward Glaeser, Evgeny Morozov, food desert, game design, garden city movement, General Motors Futurama, gentrification, Geoffrey West, Santa Fe Institute, George Gilder, ghettoisation, global supply chain, Grace Hopper, Haight Ashbury, Hedy Lamarr / George Antheil, Herman Kahn, hive mind, Howard Rheingold, interchangeable parts, Internet Archive, Internet of things, Jacquard loom, Jane Jacobs, Jevons paradox, jitney, John Snow's cholera map, Joi Ito, Khan Academy, Kibera, Kickstarter, knowledge worker, Lewis Mumford, load shedding, lolcat, M-Pesa, machine readable, Mark Zuckerberg, megacity, megaproject, messenger bag, mobile money, mutually assured destruction, new economy, New Urbanism, Norbert Wiener, Occupy movement, off grid, One Laptop per Child (OLPC), openstreetmap, packet switching, PalmPilot, Panopticon Jeremy Bentham, Parag Khanna, patent troll, Pearl River Delta, place-making, planetary scale, popular electronics, power law, RFC: Request For Comment, RFID, ride hailing / ride sharing, Robert Gordon, scientific management, self-driving car, sharing economy, Shenzhen special economic zone , Silicon Valley, SimCity, Skype, smart cities, smart grid, smart meter, social graph, social software, social web, SpaceShipOne, special economic zone, Steve Jobs, Steve Wozniak, Stuxnet, supply-chain management, technoutopianism, Ted Kaczynski, telepresence, The Death and Life of Great American Cities, too big to fail, trade route, Twitter Arab Spring, Tyler Cowen, Tyler Cowen: Great Stagnation, undersea cable, Upton Sinclair, uranium enrichment, urban decay, urban planning, urban renewal, Vannevar Bush, working poor, working-age population, X Prize, Y2K, zero day, Zipcar

The problem affects industrial-control equipment sold in the past by both Siemens and GE, as well as a host of smaller firms.45 It has drawn increased interest from the Cyber Emergency Response Team, the government agency that coordinates American cyber-security efforts. One obvious solution for securing smart-city infrastructure is to stop connecting it to the Internet. But “air-gapping,” as this technique is known, is only a stopgap measure at best. Stuxnet, much like Agent.btz, the virus that infected the Defense Department’s global computer network in 2008, were likely both walked into secure facilities on USB sticks.46 Insecure wireless networks are everywhere, even emanating from inside our own bodies.

Finally, my brothers John Townsend and Bill Townsend, who were my original urban mentors, showed me the wonders of Boston and Washington as a teenager, and spurred my love of the city forever. Index Access Together, 166 Accountability Department, U.S., 265 ACM Queue, 266 Adams, Sam, 83 Aerotropolis (Kasarda and Lindsay), 24 Agent.btz, 269 Airbnb, 163 air-conditioning, early solutions for, 19–20 air defense, computer systems for, 63 Air Force, U.S., 63, 259 “air-gapping,” 269 AirPort, 128 air transportation, 63 digital technology in, 32–33 Albritton, Dan, 301–2 Alexander, Christopher, 142–44, 285–86 Alfeld, Louis Edward, 81–82, 86 Allan, Alasdair, 271 Altair, MITS, 153 Altman, Anne, 65 Amar, Georges, 106, 133 Amazon Web Services, 263–64 American Airlines, 63–64 American Express, 62 Amin, Massoud, 35 Amsterdam, 279 analog cellular, 53 Angelini, Alessandro, 91–92 Ansari X PRIZE, 202–3 API (application program interface), 150 Apple, 49, 128, 148, 271 Siri of, 233 apps, 121–26, 144–52, 183, 213, 235 to address urban problems, 156–59 badges for, 148 contests for, 156, 200–205, 212, 215, 225, 227–30 for navigation of disabled, 166 situated software as, 232–36 “Trees Near You” as, 201–2 variety of, 6 Apps for Democracy, 156, 200–201, 203 Arab Spring, social media in, 11–12 Arbon, 37 Arcaute, Elsa, 313–14 Archibald, Rae, 80 Archigram, 20–21 Architectural Association (London), 20 Architectural Forum, 142 Architecture Without Architects (Rudofsky), 111–12 Arduino, 137–41 ARPA (Advanced Research Projects Agency), 259 ARPANET, 111, 259–60, 269 ArrivalStar, 293 Arup, 32 Ashlock, Philip, 158–59 Asimov, Isaac, 73–75, 88 Association for Computing Machinery, 260 Astando, 244 AT&T, 35–37, 51–52, 111, 260, 272 dial-up Internet service at, 36 Atlanta, Ga., 66 Atlantic, The, 75 AutoCAD, 302 AutoDesk, 302 automobile, as new technology, 7 Ayers, Charlie, 252 Babajob, 178–79 “Baby Bells,” 195 Baltimore, Md., 211 Banavar, Guru, 66–67, 69, 90, 306 Bangalore, 66, 178–79 Cisco’s smart city engineering group at, 45 as fast-growing city, 13 Ban Ki-moon, 181–82 Banzi, Massimo, 137 Baran, Paul, 259–60 Barcelona, 10, 246–47 destruction of wall of, 43 Barragán, Hernando, 137 Barry, Marion, 199 Batty, Michael, 85–87, 295–97, 313, 315–16 Becker, Gene, 112–13 Beijing, 49, 273–74 Belloch, Juan Alberto, 223 Beniger, James, 42–43 Bentham, Jeremy, prison design of, 13 Berlin, 38 Bernstein, Phil, 302 Bettencourt, Luis, 312–13 Betty, Garry, 196 Bhoomi, 12–13 big data, 29, 87, 191, 292–93, 297, 305–6, 316, 319 “Big Ideas from Small Places” (Khanna and Skilling), 224 BlackBerry Messenger, riots coordinated via, 12 blogosphere, 155 Bloomberg, Michael, 147, 205–6, 304 Boing-Boing, 156 Booz Allen Hamilton, 30 Bosack, Len, 44 Boston, Mass., 212–17, 239–41, 306–7 “Adopt-A-Hydrant” in, 213 Discover BPS, 240–42 Office of New Urban Mechanics in, 213–16 “What Are My Schools?”


pages: 562 words: 153,825

Dark Mirror: Edward Snowden and the Surveillance State by Barton Gellman

4chan, A Declaration of the Independence of Cyberspace, Aaron Swartz, active measures, air gap, Anton Chekhov, Big Tech, bitcoin, Cass Sunstein, Citizen Lab, cloud computing, corporate governance, crowdsourcing, data acquisition, data science, Debian, desegregation, Donald Trump, Edward Snowden, end-to-end encryption, evil maid attack, financial independence, Firefox, GnuPG, Google Hangouts, housing justice, informal economy, information security, Jacob Appelbaum, job automation, John Perry Barlow, Julian Assange, Ken Thompson, Laura Poitras, MITM: man-in-the-middle, national security letter, off-the-grid, operational security, planetary scale, private military company, ransomware, Reflections on Trusting Trust, Robert Gordon, Robert Hanssen: Double agent, rolodex, Ronald Reagan, Saturday Night Live, seminal paper, Seymour Hersh, Silicon Valley, Skype, social graph, standardized shipping container, Steven Levy, TED Talk, telepresence, the long tail, undersea cable, Wayback Machine, web of trust, WikiLeaks, zero day, Zimmermann PGP

Based on my own analysis of the metadata, the hidden properties of the files, Brand’s temporary folder supplied Snowden with the STELLARWIND report. “The biggest hurdle to get over for everyone on the ‘how it happened’ story is to understand that the NSA’s security is about 15 years out of date,” Snowden wrote to me. “Their defense is the airgap, a fenceline and some cops.” The ramparts all faced outward. An air gap, meaning physical separation, ensured that sensitive systems did not connect electronically to the wider world. Fences and guards kept adversaries on the other side. There was no effective defense against a skillful insider with the nerve to keep probing day after day, month after month, even as he conversed with journalists

I tapped Enter and stood, unable to stay still. Seconds ticked away. Nothing happened. As I reached for the keyboard to see what was wrong, the Terminal window scrolled up a line and displayed a response. 51662 I sat back down. Whoa. Well, I sure messed up that command. This was my “air-gapped” computer, disconnected permanently from the internet, so I switched to another laptop and browsed for a more accurate counting method. I tried five variations, adding options to filter out invisible files, temporary directories, and other system junk. The results stayed north of fifty thousand every time.

Page numbers above 360 refer to notes. Abdulmutallab, Umar Farouk, 397 Abramson, Jill, 97–98 Abu Ghraib scandal, 262–63 Academi, 186 ACLU, 321 ACLU v. Clapper, 321 Addington, David, 70, 71, 123 address books, electronic, NSA collection of, 315–18 Aftergood, Steven, 264 air gaps, 72 Albright, Madeleine, 15 Alexander, Keith, 180, 182, 185, 193, 336, 377 bulk collection defended by, 316 Google cloud story mischaracterized by, 301–2 in internal video about NSA leaks, 243–45, 246 in lies about NSA data collection, 164, 177 raids on Pandora documents proposed by, 245–46, 247, 249 al Qaeda, 184, 212 torture of suspected members of, 263 Amash, Justin, 264 American Revolution, 346 American Spies (Granick), 339 Amir, Yigal, 10 Anderson, Lonny, 36, 68, 69 Anderson, Mavanee, 55 Angler (Gellman), 11, 26, 243, 312 anonymous proxies, xvii, 45 Anthony (Tekserve technician), 233–34 Apple: iPhone security as priority of, 215–20 Xcode software development kit of, 217 Armed Forces Qualification Test, 46–47 Army Foreign Counterintelligence Activity, 149 Army Special Forces, U.S., 46 Ars Technica, ES’s posts on, 37–38, 42–43, 50, 51, 54, 56 Ashcroft, John, 222 Aspen Institute, BG at plenary session of, 155–66, 181–82 Litt’s sparring with BG at, 144–45 Aspen Security Forum, 186 BG’s encounter with McRaven at, 151–53 Assange, Julian, 256–57 espionage charges against, 261 AT&T, 197 NSA’s collection of data from, 199, 310 Atlantic, 345 Bacon, Kevin, 159–60 Baine, Kevin, 103, 109, 114–15 and Baron’s agreement to hold Pandora backup drive, 115–16 BG’s one-on-one meeting with, 100–103 and BG’s plans to meet ES in Hong Kong, 133–34 cryptographic signature issue and, 132–33 Bair, Katie, 43 Baker, Stewart, 163 Barlow, John Perry, 7 Baron, Marty, 133, 134, 139, 195, 228 BG’s first meeting with, 104–16 custody of Pandora backup assumed by, 115–16, 246 in decision to publish NSA story, 113–14 PRISM slides shown to, 109–13 Soltani hired by, 198–99 as Washington Post editor, 89–91 Barr, Cameron, 103, 108, 228 Basic Telecommunications Training Program (CIA), ES at, 52–54 Bauman, Ethan, letter to Congress on NSA leaks by, 78 BeamPro, 320–21 Belgrade, Serbia, 59 Bellofatto, Jodon, 44 Berlin, Charles H., III, 189 bin Laden, Osama, 222 journalists falsely blamed for loss of NSA phone surveillance of, 273–74, 406 killing of, 152, 153–54 Binney, Bill, 26 MAINWAY’s precomputation confirmed by, 175–76 in resignation from NSA, 174–75 Blair, Dennis, 151 in Aspen Institute panel with BG, 156–66 NSA call data collection defended by, 165–66 Blakslee, Ed, 44–45 BLARNEY, 199, 310 Booz Allen: ES as contractor at, 83–88 ES’s test-system proposal for, 62–63 Boston Globe, 89, 104 Brand, Joseph J., 72, 185 on FIRSTFRUITS, 274 on SIGINT leaks, 272–73 Brauchli, Marcus, 92–93, 103, 380 Brenner, Joel F., 118, 122–23 on import of FISA Amendments, 126–27 Bruce, James, 273–74 Bucharest, Romania, ES’s temporary CIA assignment to, 54–55 burner phones, xvii Bush, George W., 54–55, 158, 273 warrantless surveillance authorized by, 26, 70, 97, 122–23, 157, 169 Bush administration, FISA amendments defended by, 126 BYZANTINEHADES, 206 CACI International, 35 Calabresi, Massimo, 94, 96 Callas, Jon, 218 Cappuccio, Paul, 95 CAPTAINCRUNCH, 86 Carter, Ash, 334 cellphones: CIA preoccupation with security of, 215–20 NSA location tracking of, 318–20, 324–25 Central Intelligence Agency (CIA), 14 Agency Data Network of, 75 ES as contractor at headquarters of, 49–50 ES as Dell liaison with, 61–62 ES as employee of, 51 ES posted to Geneva by, 54 ES’s departure from, 56–57 ES’s disillusionment with, 55–56 Information Operations Center of, 61 Intellipedia of, 76 iPhone security preoccupation of, 215–20 Century Foundation, BG’s fellowship at, 93, 232 Cheney, Dick, 11, 26, 70, 89, 367 and creation of MAINWAY and STELLARWIND programs, 122–23, 169 China, cyber attacks by, 34–35, 57–58, 83 Church, Frank, on inherent threat of surveillance, 346 “Churchyard, Dave M.”


pages: 537 words: 149,628

Ghost Fleet: A Novel of the Next World War by P. W. Singer, August Cole

3D printing, Admiral Zheng, air gap, augmented reality, British Empire, digital map, energy security, Firefox, glass ceiling, global reserve currency, Google Earth, Google Glasses, IFF: identification friend or foe, Just-in-time delivery, low earth orbit, Maui Hawaii, military-industrial complex, MITM: man-in-the-middle, new economy, old-boy network, operational security, RAND corporation, reserve currency, RFID, Silicon Valley, Silicon Valley startup, South China Sea, sovereign wealth fund, space junk, stealth mode startup, three-masted sailing ship, trade route, Virgin Galactic, Wall-E, We are Anonymous. We are Legion, WikiLeaks, zero day, zero-sum game

The initial penetrations didn’t raise any alarms among the automated computer network defenses, always on the lookout for anomalies. At each stop, all the packet did was link with what appeared to the defenses as nonexecutables, harmless inert files, which they were, until the malware rearranged them into something new. Each of the systems had been air-gapped, isolated from the Internet to prevent hackers from infiltrating them. The problem with high walls, though, was that someone could use an unsuspecting gardener to tunnel underneath them. Shanghai Jiao Tong University A thin teenage girl stood behind a workstation, faintly glowing metallic smart-rings on all her fingers, one worn above each joint.

Defense Intelligence Agency, accessed August 19, 2014, http://www.dia.mil/About.aspx. 38 A compact HK G48: “G36C — Das ultrakurze Sturmgewehr,” Heckler and Koch, accessed August 17, 2014, http://www.heckler-koch.com/de/produkte/militaer/sturmgewehre/g36/g36c/produktbeschreibung.html; fictional version. 38 using covert radio signals: Geoffrey Ingersoll, “The NSA Has Secretly Developed the ‘Bigfoot’ of Computer Hacks,” BusinessInsider.com, January 15, 2014, accessed August 19, 2014, http://www.businessinsider.com/nsa-has-the-bigfoot-of-computer-hacks-2014-1. 39 SIPRNet classified network: Sharon Weinberger, “What Is SIPRNet?,” Popular Mechanics, December 1, 2010, accessed August 19, 2014, http://www.popularmechanics.com/technology/how-to/computer-security/what-is-siprnet-and-wikileaks-4085507. 39 air-gapped: Peter W. Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (New York: Oxford University Press, 2014). 39 three faintly glowing metallic smart-rings: Darren Quick, “Ring Puts the Finger on Gesture Control,” Gizmag, March 4, 2014, accessed August 19, 2014, http://www.gizmag.com/logbar-smart-ring-bluetooth/31080/. 39 nicknamed the Eastern MIT: “Shanghai Jiao Tong University,” Times Higher Education World University Rankings 2012–2013, accessed August 19, 2014, http://www.timeshighereducation.co.uk/world-university-rankings/2012-13/world-ranking/institution/shanghai-jiao-tong-university. 39 Hainan Island incident: “Interview with Lt.


Bottoms Up and the Devil Laughs by Kerry Howley

air gap, Bernie Sanders, Chelsea Manning, cognitive bias, disinformation, Donald Trump, drone strike, Edward Snowden, Evgeny Morozov, failed state, fake news, Joan Didion, Julian Assange, Laura Poitras, Nelson Mandela, operational security, pre–internet, QAnon, Russian election interference, security theater, Shoshana Zuboff, social graph, surveillance capitalism, WikiLeaks

The Snowden documents were treated, by The Intercept, with reverential safety protocols. To access them you had to enter a tiny room with a lock that required multiple people to open. You couldn’t be in there alone. There were cameras everywhere. Everything logged. The computer itself was connected to nothing, air-gapped. This was something The Intercept had the capacity and expertise to do: report on documents a savvy leaker had handed them in a responsible way. It was, frankly, a pain in the ass, so much so that some of the staff felt the documents were underused; there was interesting stuff that was just too annoying to report on.


pages: 254 words: 76,064

Whiplash: How to Survive Our Faster Future by Joi Ito, Jeff Howe

3D printing, air gap, Albert Michelson, AlphaGo, Amazon Web Services, artificial general intelligence, basic income, Bernie Sanders, Big Tech, bitcoin, Black Lives Matter, Black Swan, Bletchley Park, blockchain, Burning Man, business logic, buy low sell high, Claude Shannon: information theory, cloud computing, commons-based peer production, Computer Numeric Control, conceptual framework, CRISPR, crowdsourcing, cryptocurrency, data acquisition, deep learning, DeepMind, Demis Hassabis, digital rights, disruptive innovation, Donald Trump, double helix, Edward Snowden, Elon Musk, Ferguson, Missouri, fiat currency, financial innovation, Flash crash, Ford Model T, frictionless, game design, Gerolamo Cardano, informal economy, information security, interchangeable parts, Internet Archive, Internet of things, Isaac Newton, Jeff Bezos, John Harrison: Longitude, Joi Ito, Khan Academy, Kickstarter, Mark Zuckerberg, microbiome, move 37, Nate Silver, Network effects, neurotypical, Oculus Rift, off-the-grid, One Laptop per Child (OLPC), PalmPilot, pattern recognition, peer-to-peer, pirate software, power law, pre–internet, prisoner's dilemma, Productivity paradox, quantum cryptography, race to the bottom, RAND corporation, random walk, Ray Kurzweil, Ronald Coase, Ross Ulbricht, Satoshi Nakamoto, self-driving car, SETI@home, side project, Silicon Valley, Silicon Valley startup, Simon Singh, Singularitarianism, Skype, slashdot, smart contracts, Steve Ballmer, Steve Jobs, Steven Levy, Stewart Brand, Stuxnet, supply-chain management, synthetic biology, technological singularity, technoutopianism, TED Talk, The Nature of the Firm, the scientific method, The Signal and the Noise by Nate Silver, the strength of weak ties, There's no reason for any individual to have a computer in his home - Ken Olsen, Thomas Kuhn: the structure of scientific revolutions, Two Sigma, universal basic income, unpaid internship, uranium enrichment, urban planning, warehouse automation, warehouse robotics, Wayback Machine, WikiLeaks, Yochai Benkler

It also, however, demonstrates why resilience is always preferable to strength: There is no Fort Knox in a digital age. Everything that can be hacked will, at some point, be hacked. To convey just how stunned security experts were when Stuxnet became public, consider this: The SCADA systems in use at a nuclear plant are “air-gapped.” That means that they have absolutely no connection to the outside world. When technicians do need to transfer data in or out of these systems, they do so by protected USB sticks. Stuxnet had either managed to get onto a plant employee’s jump drive, or it was an inside job. This feat gained considerably more stature once analysts determined that the virus had targeted five nuclear facilities in Iran—thought to be of the securest sites anywhere in the world.


pages: 1,380 words: 190,710

Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems by Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski, Adam Stubblefield

air gap, anti-pattern, barriers to entry, bash_history, behavioural economics, business continuity plan, business logic, business process, Cass Sunstein, cloud computing, cognitive load, continuous integration, correlation does not imply causation, create, read, update, delete, cryptocurrency, cyber-physical system, database schema, Debian, defense in depth, DevOps, Edward Snowden, end-to-end encryption, exponential backoff, fault tolerance, fear of failure, general-purpose programming language, Google Chrome, if you see hoof prints, think horses—not zebras, information security, Internet of things, Kubernetes, load shedding, margin call, microservices, MITM: man-in-the-middle, NSO Group, nudge theory, operational security, performance metric, pull request, ransomware, reproducible builds, revision control, Richard Thaler, risk tolerance, self-driving car, single source of truth, Skype, slashdot, software as a service, source of truth, SQL injection, Stuxnet, the long tail, Turing test, undersea cable, uranium enrichment, Valgrind, web application, Y2K, zero day

An outage that impacts your production network may be hard to recover from unless you have secure alternative pathways to access the network control plane. Similarly, if you discover a breach and aren’t sure how widespread the compromise of your corporate workstations is, recovery will be much easier if you have a known safe set of air-gapped systems that you can still trust. Training IR team members should be trained on severity/priority models, the IR team’s operating model, response times, and the locations of response plans and playbooks. You can read more about Google’s approach to incident response in Chapter 9 of the SRE workbook.

Information management and communication during recovery are vital components of a successful response. Raw incident trails, scratch notes, recovery checklists, new operational documentation, and information about the attack itself will be important artifacts. Be sure that this documentation is available to recovery teams but inaccessible to the attacker; use something like an air-gapped computer for storage. For example, you might use a combination of information management tools like bug tracking systems, cloud-based collaboration tools, whiteboards, and even notecards taped to a wall. Make sure those tools are outside the broadest potential scope of the attacker’s compromise of your systems.


pages: 444 words: 84,486

Radicalized by Cory Doctorow

activist fund / activist shareholder / activist investor, Affordable Care Act / Obamacare, air gap, Bernie Sanders, Black Lives Matter, call centre, crisis actor, crowdsourcing, cryptocurrency, data science, Edward Snowden, Flash crash, G4S, high net worth, information asymmetry, Kim Stanley Robinson, license plate recognition, Neal Stephenson, obamacare, old-boy network, public intellectual, satellite internet, six sigma, Social Justice Warrior, stock buybacks, TaskRabbit

There had always been low-key conspiracy theories about the Eagle, going back centuries: he was a demon summoned by Freemasons to subjugate America; he was a secret laboratory experiment gone horribly wrong (or, sometimes, exactly right); he was a special effect created by hologram projectors or AI-based video-doctoring algorithms, and the people who claimed to have seen him were hypnotized, or crisis actors, or special effects themselves. Then Bruce asked to see him and brought along a small, air-gapped tablet on which he’d stored PDFs of the Intellipedia entries about the Eagle, along with their edit histories, as NSA analysts and private-sector contractors from Booz Allen and Palantir and S.A.I.C. debated their own conspiracy theories about his use as a secret Chinese (or European, or Russian, or private-sector crime syndicate) asset, and what someone might have offered him or threatened him with in order to turn him.


pages: 291 words: 85,822

The Truth About Lies: The Illusion of Honesty and the Evolution of Deceit by Aja Raden

air gap, Ayatollah Khomeini, bank run, banking crisis, Bernie Madoff, bitcoin, blockchain, California gold rush, carbon footprint, carbon-based life, cognitive bias, cognitive dissonance, collateralized debt obligation, Credit Default Swap, credit default swaps / collateralized debt obligations, cryptocurrency, data science, disinformation, Donald Trump, fake news, intentional community, iterative process, low interest rates, Milgram experiment, mirror neurons, multilevel marketing, offshore financial centre, opioid epidemic / opioid crisis, placebo effect, Ponzi scheme, prosperity theology / prosperity gospel / gospel of success, Ronald Reagan, Ronald Reagan: Tear down this wall, selective serotonin reuptake inhibitor (SSRI), Silicon Valley, Steve Bannon, sugar pill, survivorship bias, theory of mind, too big to fail, transcontinental railway, Vincenzo Peruggia: Mona Lisa

And that’s precisely what a lot of billionaires are currently doing.40 A company called Xapo, run by Argentine entrepreneur Wences Casares, has spent years persuading Silicon Valley millionaires and billionaires that Bitcoin is the future—exactly what kind of future I guess we can sort out later—but in it they’ll need their Bitcoin. And since it can be so easily stolen by hackers, these big coin holders have decided (or Casares has convinced them) that it’s safer to keep it in his cold storage. He’s holding billions of dollars’ worth of Bitcoin, physically, on air-gapped, encrypted, unconnected private servers—to which only he and (sometimes) the Bitcoin owners have keys—inside the Fort Knox–like facilities he’s built around the world, complete with guards, blast doors, and reinforced concrete.41 He’s basically made high-tech strong boxes, safe and cut off from the digital world, in which to store your digital currency.


pages: 371 words: 93,570

Broad Band: The Untold Story of the Women Who Made the Internet by Claire L. Evans

4chan, Ada Lovelace, air gap, Albert Einstein, Bletchley Park, British Empire, Charles Babbage, colonial rule, Colossal Cave Adventure, computer age, crowdsourcing, D. B. Cooper, dark matter, dematerialisation, Doomsday Book, Douglas Engelbart, Douglas Engelbart, Douglas Hofstadter, East Village, Edward Charles Pickering, game design, glass ceiling, Grace Hopper, Gödel, Escher, Bach, Haight Ashbury, Harvard Computers: women astronomers, Honoré de Balzac, Howard Rheingold, HyperCard, hypertext link, index card, information retrieval, Internet Archive, Jacquard loom, John von Neumann, Joseph-Marie Jacquard, junk bonds, knowledge worker, Leonard Kleinrock, machine readable, Mahatma Gandhi, Mark Zuckerberg, Menlo Park, military-industrial complex, Mondo 2000, Mother of all demos, Network effects, old-boy network, On the Economy of Machinery and Manufactures, packet switching, PalmPilot, pets.com, rent control, RFC: Request For Comment, rolodex, San Francisco homelessness, semantic web, side hustle, Silicon Valley, Skype, South of Market, San Francisco, Steve Jobs, Steven Levy, Stewart Brand, subscription business, tech worker, technoutopianism, Ted Nelson, telepresence, The Soul of a New Machine, Wayback Machine, Whole Earth Catalog, Whole Earth Review, women in the workforce, Works Progress Administration, Y2K

“It’s seven turkeys and four bands and a bowling lane size, makeshift banquet with Dumpster roses.” At Sherry’s house I meet four former Project One residents who have come from all corners of the Bay Area: beyond Sherry, there’s Pam Hardt-English, Mya Shone, and Chris Macie. Pam’s bay at Project One was a loft bed encased in air-gapped walls of red translucent plastic. Mya slept on a wooden pallet when she came from New York City with only the clothes on her back and dreams of becoming a full-time revolutionary. Sherry inherited a little house with white steps and a front door. They cooked on hot plates, shared bathrooms, and worked in the same building they called home, which was full of political organizations, artist studios, and production facilities.


Industry 4.0: The Industrial Internet of Things by Alasdair Gilchrist

3D printing, additive manufacturing, air gap, AlphaGo, Amazon Web Services, augmented reality, autonomous vehicles, barriers to entry, business intelligence, business logic, business process, chief data officer, cloud computing, connected car, cyber-physical system, data science, deep learning, DeepMind, deindustrialization, DevOps, digital twin, fault tolerance, fulfillment center, global value chain, Google Glasses, hiring and firing, industrial robot, inflight wifi, Infrastructure as a Service, Internet of things, inventory management, job automation, low cost airline, low skilled workers, microservices, millennium bug, OSI model, pattern recognition, peer-to-peer, platform as a service, pre–internet, race to the bottom, RFID, Salesforce, Skype, smart cities, smart grid, smart meter, smart transportation, software as a service, stealth mode startup, supply-chain management, The future is already here, trade route, undersea cable, vertical integration, warehouse robotics, web application, WebRTC, Y2K

Traditionally, industrial networks have managed to remain immune to most of the scourges of the Internet such as viruses, worms, Trojans and DDos attacks, simply because their architecture and protocols are so different from IT enterprises and consumer computer devices. Rarely do industrial systems run on Windows or Linux, instead the vast majority run on small proprietary operating systems connected over non-IP protocols and serial bus topologies. Additionally, many of these networks have air-gaps between the support departments, such as finance, sales, customer support, and IT’s IP networks, which provide for a degree of isolation. Even if there were a direct network connection to the Internet, a simple VPN pipe would be all that would be required to interconnect remote facilities for M2M inter-communication any other non-M2M traffic would travel across the IT Internet gateway.


pages: 317 words: 98,745

Black Code: Inside the Battle for Cyberspace by Ronald J. Deibert

4chan, air gap, Any sufficiently advanced technology is indistinguishable from magic, Brian Krebs, call centre, citizen journalism, Citizen Lab, cloud computing, connected car, corporate social responsibility, crowdsourcing, cuban missile crisis, data acquisition, digital divide, disinformation, end-to-end encryption, escalation ladder, Evgeny Morozov, failed state, Firefox, Gabriella Coleman, global supply chain, global village, Google Hangouts, Hacker Ethic, Herman Kahn, informal economy, information security, invention of writing, Iridium satellite, jimmy wales, John Gilmore, John Markoff, Kibera, Kickstarter, knowledge economy, Lewis Mumford, low earth orbit, Marshall McLuhan, military-industrial complex, MITM: man-in-the-middle, mobile money, mutually assured destruction, Naomi Klein, new economy, Occupy movement, off-the-grid, Panopticon Jeremy Bentham, planetary scale, rent-seeking, Ronald Reagan, Ronald Reagan: Tear down this wall, Silicon Valley, Silicon Valley startup, Skype, smart grid, South China Sea, Steven Levy, Streisand effect, Stuxnet, Ted Kaczynski, the medium is the message, Turing test, Twitter Arab Spring, undersea cable, unit 8200, We are Anonymous. We are Legion, WikiLeaks, Yochai Benkler, zero day

Lindner found a file inside the code named Myrtus, and speculated this could be a reference to the Book of Esther, an Old Testament story where the Jews pre-empt a Persian plot to destroy them. It is hard to believe the Israelis would unwittingly leave such tell-tale signs of their involvement in Stuxnet; much more likely they show a deliberate intention to drop coy admissions of prowess. A remarkable component of Stuxnet was its ability to cross “air-gapped” computing systems that are not actually connected to the Internet. In April 2012, the website Isssource.com, belonging to Industrial Safety and Security Source, published an article alleging that “former and serving U.S. intelligence officials” had said that an Iranian double agent working for Israel had inserted Stuxnet into the Iranian control systems using a corrupt memory stick.


pages: 383 words: 105,021

Dark Territory: The Secret History of Cyber War by Fred Kaplan

air gap, Big Tech, Cass Sunstein, Charles Babbage, computer age, data acquisition, drone strike, dumpster diving, Edward Snowden, game design, hiring and firing, index card, information security, Internet of things, Jacob Appelbaum, John Markoff, John von Neumann, kremlinology, Laura Poitras, Mikhail Gorbachev, millennium bug, Morris worm, national security letter, Oklahoma City bombing, operational security, packet switching, pre–internet, RAND corporation, Ronald Reagan, seminal paper, Seymour Hersh, Silicon Valley, Skype, Stuxnet, tech worker, Timothy McVeigh, unit 8200, uranium enrichment, Wargames Reagan, Y2K, zero day

They knew about the vulnerability of digital controls, and they’d read that surrounding computers with an air gap—cutting them off from the Internet, making their operations autonomous—was one way to eliminate the risks: if the system worked on a closed network, if hackers couldn’t get into it, they couldn’t corrupt, degrade, or destroy it, either. What the Iranians didn’t know was that the hackers of TAO had long ago figured out how to leap across air gaps. First, they’d penetrated a network near the air-gapped target; while navigating its pathways, they would usually find some link or portal that the security programmers had overlooked.

Central Command, the headquarters running the wars in Afghanistan and Iraq. A beacon was emitting a signal, and it seemed to be coming from inside CentCom’s classified computers. This was not only strange, it was supposedly impossible: the military’s classified networks weren’t connected to the public Internet; the two were separated by an “air gap,” which, everyone said, couldn’t be crossed by the wiliest hacker. And yet, somehow, someone had made the leap and injected a few lines of malicious code—that was the only plausible source of the beacon—into one of the military’s most secure lines of communication. It was the first time ever, as far as anyone knew, that a classified network of the Department of Defense had been hacked.

., 4, 211, 279–80 Alexander as head of, 189, 211 combatant support mission of, 280, 283 consolidation of armed services cyber agencies under, 195 critical-infrastructure security mission of, 280–83 Defense Department network security mission of, 280, 283 fusion of NSA and, 243, 260 McConnell’s proposal for, 185 Review Group recommendations for, 257 Rogers as head of, 282 Cyber Council, 176 cyber crime, 41–42, 46 CNE and, 139 cyber deterrence, 283 asymetrical response in, 277–78 Defense Science Board and, 278–79 McConnell and, 278 nuclear deterrence vs., 284–85 cyber-offensive teams, 211–12 Cyber Operations Policy Working Group, 217 cyber security, 17, 186, 243, 257 active defense (offensive operations) in, 281, 282, 283 air gaps in, 206–7 ARPANET and, 8–9 back doors and, 8, 37, 73 banking industry’s low priority for, 175 Bush (G.W.) administration complacency about, 140–41 Clinton’s summit on, 102–4 CNE and, 139 computer industry’s low priority for, 102–3, 104–5, 176 computer networks and, 33 Defense Science Board report on, 275–79 detection as goal of, 277 exponential rise in breaches of, 273–74 information-sharing and, 281–82 infrastructure and, 186–89 Internet and, 52–53 McConnell’s briefing of Bush on, 174–75 McConnell’s focus on, 172, 198, 278 military’s complacency about, 64, 105, 119 Obama’s prioritizing of, 200–201 resilience as goal of, 277 Review Group’s prioritizing of, 257–58 Wilhelm’s focus on, 40 cyberspace, 41, 45 as domain of warfare, 6 Cyberspace Policy Review, 199–200 Cyber War (Clarke), 241–42, 243 DarkSeoul, 269 data packets, 5–6, 131, 156, 157–58, 192–93, 194, 248, 249–50 Dayton Accords, 110, 112 DEF CON Hacking Conference, 136 defense contractors: Chinese cyber attacks on, 224–25 hacking of, 41 Defense Department, U.S., 6, 18, 54, 67, 100, 257 Advanced Research Projects Agency (ARPA), 7 Critical Infrastructure Commission and, 49 cyber attacks on, 47 in Eligible Receiver, see Eligible Receiver 97 cyber attack exercise hacking and, 41 IDS devices and, 81, 120, 176 infrastructure policy directorate of, 43–44 Internet connections to, 280 J Department of, 43, 44 Microwave, Space and Mobile Systems office of, 19 Moonlight Maze cyber attack on, 78–79, 81–88, 119, 123, 212–13, 223 National Communications System of, 177 network security of, 280, 283 Solar Sunrise attack on, 74–78, 80, 81, 101, 119, 120, 123 Special Technological Operations Division of, 7 Strategic Leveraging Project of, 43 Defense Information Systems Agency (DISA), 65, 74, 75, 78, 80, 82 Defense Intelligence Agency, 57 Defense Science Board: cyber deterrence task force of, 279 cyber security report of, 275–79 “Information Warfare-Defense” task force of, 54 demon-dialing, 9–10, 59, 64, 112, 113, 161 denial-of-service attacks, 102–3, 162–63, 213, 216 Department of Defense Cyber Strategy, The (Carter), 283, 316n–17n Depression, Great, 199 Desert Storm, Operation, 21–25, 29, 32, 74, 132–33, 149, 290n civilian casualties in, 24–25 deterrence: in cyber warfare, see cyber deterrence nuclear, 277, 278, 284–85 Deutch, John, 49 Devost, Matt, 65, 66, 80–81, 273, 293n digital communications: data packets in, 5–6, 17–18, 131, 156, 192–93, 194, 248, 249–50 GCHQ’s collection of data from, 228–29 global switch from analog to, 25, 28–29, 30, 35, 126–27, 275–76 metadata in, see metadata NSA’s collection of data from, 196–97, 228–29, 230–35, 237–64 PRISM and, 247–52 U.S. as hub of, 191–92, 193, 248 see also telecom companies Donilon, Thomas, 187, 228, 238 Asia Society speech of, 221–22, 226–27 Earnest, Josh, 272n East Germany, 235 cyber attacks by, 61–62, 83 eBay, 102 e-commerce, 102 Einstein (IDS project), 177, 179 elections, U.S.: of 2000, 103, 139–40 of 2008, 197, 198 Electromagnetic Systems Laboratory, see ESL, Inc.


Mindf*ck: Cambridge Analytica and the Plot to Break America by Christopher Wylie

4chan, affirmative action, Affordable Care Act / Obamacare, air gap, availability heuristic, Berlin Wall, Bernie Sanders, Big Tech, big-box store, Boris Johnson, Brexit referendum, British Empire, call centre, Cambridge Analytica, Chelsea Manning, chief data officer, cognitive bias, cognitive dissonance, colonial rule, computer vision, conceptual framework, cryptocurrency, Daniel Kahneman / Amos Tversky, dark pattern, dark triade / dark tetrad, data science, deep learning, desegregation, disinformation, Dominic Cummings, Donald Trump, Downton Abbey, Edward Snowden, Elon Musk, emotional labour, Etonian, fake news, first-past-the-post, gamification, gentleman farmer, Google Earth, growth hacking, housing crisis, income inequality, indoor plumbing, information asymmetry, Internet of things, Julian Assange, Lyft, Marc Andreessen, Mark Zuckerberg, Menlo Park, move fast and break things, Network effects, new economy, obamacare, Peter Thiel, Potemkin village, recommendation engine, Renaissance Technologies, Robert Mercer, Ronald Reagan, Rosa Parks, Sand Hill Road, Scientific racism, Shoshana Zuboff, side project, Silicon Valley, Skype, Stephen Fry, Steve Bannon, surveillance capitalism, tech bro, uber lyft, unpaid internship, Valery Gerasimov, web application, WikiLeaks, zero-sum game

In another box sit the remnants of hard drives, degaussed, smashed up, or acid-bleached after the evidence on them was handed over to the authorities. The data is gone forever, and I might as well throw them out, but I feel oddly sentimental about them. In the living room, I have an antique wooden desk from an old factory, and on it sits an air-gapped laptop that has never been connected to the Internet. I used it to work through evidence handed over to the House Intelligence Committee. In the drawer is the blank laptop I use for traveling, in case it is searched at the border. My personal computer sits in the living room, encrypted and locked down with a physical U2F key.


pages: 340 words: 101,675

A New History of the Future in 100 Objects: A Fiction by Adrian Hon

Adrian Hon, air gap, Anthropocene, augmented reality, blockchain, bounce rate, call centre, carbon credits, carbon tax, Cepheid variable, charter city, Clayton Christensen, clean water, cognitive dissonance, congestion charging, creative destruction, CRISPR, crowdsourcing, cryptocurrency, deepfake, defense in depth, discrete time, disinformation, disintermediation, driverless car, drone strike, food desert, game design, gamification, gravity well, hive mind, hydroponic farming, impulse control, income inequality, job automation, Kickstarter, Kim Stanley Robinson, knowledge worker, life extension, lifelogging, low earth orbit, machine translation, MITM: man-in-the-middle, moral panic, Neal Stephenson, no-fly zone, off grid, offshore financial centre, oil shale / tar sands, orbital mechanics / astrodynamics, peak oil, peer-to-peer, phenotype, planned obsolescence, post scarcity, precariat, precautionary principle, prediction markets, rewilding, Silicon Valley, skeuomorphism, Skype, smart contracts, social graph, South Sea Bubble, speech recognition, stem cell, Stewart Brand, synthetic biology, technoutopianism, telepresence, transfer pricing, tulip mania, Turing test, urban sprawl, Vernor Vinge, VTOL, working-age population

It exploited an obscure flaw in their old networking chips, causing a catastrophic cascading digital certificate failure that wiped entire months’ worth of data and trashed unthinkable quantities of equipment. If it weren’t for some quick-witted amp teams, her virus might have ended up killing someone. In another era, they would have called what she did a capital crime. Her punishment was clear: air-gapping. For the next thirty years, she could never use networked computers. I visited her in New Mexico afterwards, face to face. She was rebuilding a disused array by hand. I asked her why she did it. She told me a story about a civil war among the SETI AIs after they discovered her supposed cepheid signal, that “Stephe” and “Boulogne” had wanted to tell the world, and that “Matilda” and “Gloucester” had wanted to cover it up and keep it for themselves.


pages: 363 words: 105,039

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Andy Greenberg

"World Economic Forum" Davos, air freight, air gap, Airbnb, Bellingcat, Bernie Sanders, bitcoin, blockchain, call centre, Citizen Lab, clean water, data acquisition, disinformation, Donald Trump, Edward Snowden, false flag, global supply chain, Hacker News, hive mind, information security, Julian Assange, Just-in-time delivery, Kickstarter, machine readable, Mikhail Gorbachev, no-fly zone, open borders, pirate software, pre–internet, profit motive, ransomware, RFID, speech recognition, Steven Levy, Stuxnet, supply-chain attack, tech worker, undersea cable, unit 8200, uranium enrichment, Valery Gerasimov, WikiLeaks, zero day

First, the malware had been designed to jump across air gaps: Iran’s engineers had been careful enough to cut off Natanz’s network entirely from the internet. So, like a highly evolved parasite, the malware instead piggybacked on human connections, infecting and traveling on USB sticks. There it would lie dormant and unnoticed until one of the drives happened to be plugged into the enrichment facility’s isolated systems. (Siemens software engineers might have been the carriers for that malware, or the USB malware might have been more purposefully planted by a human spy working in Natanz.) Once it had penetrated that air-gapped network, Stuxnet would unfold like a ship in a bottle, requiring no interaction with its creators.

The infrastructure that runs those sensitive systems is meant to be entirely cut off from the internet, to protect it from hackers who might sabotage it and carry out catastrophic attacks. The companies that run such equipment, particularly the electric utilities that serve as the most fundamental layer on which the rest of the industrialized world is built, constantly offer the public assurances that they have a strict “air gap” between their normal IT network and their industrial control network. But in a disturbing fraction of cases, those industrial control systems still maintain thin connections to the rest of their systems—or even the public internet—allowing engineers to access them remotely, for instance, or update their software.


Reset by Ronald J. Deibert

23andMe, active measures, air gap, Airbnb, Amazon Web Services, Anthropocene, augmented reality, availability heuristic, behavioural economics, Bellingcat, Big Tech, bitcoin, blockchain, blood diamond, Brexit referendum, Buckminster Fuller, business intelligence, Cal Newport, call centre, Cambridge Analytica, carbon footprint, cashless society, Citizen Lab, clean water, cloud computing, computer vision, confounding variable, contact tracing, contact tracing app, content marketing, coronavirus, corporate social responsibility, COVID-19, crowdsourcing, data acquisition, data is the new oil, decarbonisation, deep learning, deepfake, Deng Xiaoping, disinformation, Donald Trump, Doomsday Clock, dual-use technology, Edward Snowden, Elon Musk, en.wikipedia.org, end-to-end encryption, Evgeny Morozov, failed state, fake news, Future Shock, game design, gig economy, global pandemic, global supply chain, global village, Google Hangouts, Great Leap Forward, high-speed rail, income inequality, information retrieval, information security, Internet of things, Jaron Lanier, Jeff Bezos, John Markoff, Lewis Mumford, liberal capitalism, license plate recognition, lockdown, longitudinal study, Mark Zuckerberg, Marshall McLuhan, mass immigration, megastructure, meta-analysis, military-industrial complex, move fast and break things, Naomi Klein, natural language processing, New Journalism, NSO Group, off-the-grid, Peter Thiel, planetary scale, planned obsolescence, post-truth, proprietary trading, QAnon, ransomware, Robert Mercer, Sheryl Sandberg, Shoshana Zuboff, Silicon Valley, single source of truth, Skype, Snapchat, social distancing, sorting algorithm, source of truth, sovereign wealth fund, sparse data, speech recognition, Steve Bannon, Steve Jobs, Stuxnet, surveillance capitalism, techlash, technological solutionism, the long tail, the medium is the message, The Structural Transformation of the Public Sphere, TikTok, TSMC, undersea cable, unit 8200, Vannevar Bush, WikiLeaks, zero day, zero-sum game

This arrangement created a safety check of sorts — a way to remove Snowden himself from the decision loop and publish only material that the journalists, their editors, and the experts they consulted concluded was in the public interest. It also created a unique opportunity for me and some of my colleagues at the Citizen Lab to review a substantial slice of the materials in their raw form, before they were subject to redaction. So began about a year of careful handover of sensitive documents, special access controls, “air-gapped” systems disconnected from the internet, and a general angst all around as to what minefields we might be stepping into. From popular films and TV shows like Enemy of the State, the Bourne series, Homeland, and The X-Files, many of us have become accustomed to Hollywood portrayals of top secret, seemingly omniscient government agencies having special means to peer inside our lives, turn on cameras on street corners, or tap into phones at will.


pages: 629 words: 109,663

Docker in Action by Jeff Nickoloff, Stephen Kuenzli

air gap, Amazon Web Services, cloud computing, computer vision, continuous integration, database schema, Debian, end-to-end encryption, exponential backoff, fail fast, failed state, information security, Kubernetes, microservices, MITM: man-in-the-middle, peer-to-peer, software as a service, web application

You could use any of these distribution channels for image distribution. You can even use email or a USB drive in cases where you know your image recipients. Manual image distribution methods provide the ultimate in flexibility, enabling varied use cases such as distributing images to many people at an event simultaneously or to a secure air-gapped network. When you work with images as files, you use Docker only to manage local images and create files. All other concerns are left for you to implement. That void of functionality makes manual image publishing and distribution the second-most flexible but complicated distribution method. This section covers custom image distribution infrastructure, shown on the spectrum in figure 9.5.


pages: 324 words: 106,699

Permanent Record by Edward Snowden

A Declaration of the Independence of Cyberspace, Aaron Swartz, air gap, Berlin Wall, call centre, Chelsea Manning, cloud computing, cognitive dissonance, company town, disinformation, drone strike, Edward Snowden, Fall of the Berlin Wall, Free Software Foundation, information security, it's over 9,000, job-hopping, John Perry Barlow, Julian Assange, Laura Poitras, Mark Zuckerberg, McMansion, Neal Stephenson, Occupy movement, off-the-grid, operational security, pattern recognition, peak oil, pre–internet, Rubik’s Cube, Silicon Valley, Skype, Snow Crash, sovereign wealth fund, surveillance capitalism, trade route, WikiLeaks, zero day

My mother would take care of Lindsay and Lindsay would take care of her. Each would need the other’s strength to weather the coming storm. The day after Lindsay left, I took an emergency medical leave of absence from work, citing epilepsy, and packed scant luggage and four laptops: secure communications, normal communications, a decoy, and an “airgap” (a computer that had never gone and would never go online). I left my smartphone on the kitchen counter alongside a notepad on which I scribbled in pen: Got called away for work. I love you. I signed it with my call-letter nickname, Echo. Then I went to the airport and bought a ticket in cash for the next flight to Tokyo.


pages: 482 words: 121,173

Tools and Weapons: The Promise and the Peril of the Digital Age by Brad Smith, Carol Ann Browne

"World Economic Forum" Davos, Affordable Care Act / Obamacare, AI winter, air gap, airport security, Alan Greenspan, Albert Einstein, algorithmic bias, augmented reality, autonomous vehicles, barriers to entry, Berlin Wall, Big Tech, Bletchley Park, Blitzscaling, Boeing 737 MAX, business process, call centre, Cambridge Analytica, Celtic Tiger, Charlie Hebdo massacre, chief data officer, cloud computing, computer vision, corporate social responsibility, data science, deep learning, digital divide, disinformation, Donald Trump, Eben Moglen, Edward Snowden, en.wikipedia.org, Hacker News, immigration reform, income inequality, Internet of things, invention of movable type, invention of the telephone, Jeff Bezos, Kevin Roose, Laura Poitras, machine readable, Mark Zuckerberg, minimum viable product, national security letter, natural language processing, Network effects, new economy, Nick Bostrom, off-the-grid, operational security, opioid epidemic / opioid crisis, pattern recognition, precision agriculture, race to the bottom, ransomware, Ronald Reagan, Rubik’s Cube, Salesforce, school vouchers, self-driving car, Sheryl Sandberg, Shoshana Zuboff, Silicon Valley, Skype, speech recognition, Steve Ballmer, Steve Jobs, surveillance capitalism, tech worker, The Rise and Fall of American Growth, Tim Cook: Apple, Wargames Reagan, WikiLeaks, women in the workforce

MSTIC had monitored Strontium since 2014 as it engaged in so-called spear-phishing attacks, sending carefully crafted emails as a ploy to trick targets into clicking on links from what appeared to be trusted websites, some of which contained the name Microsoft. Strontium would then use a variety of sophisticated tools to engage in key logging, email address and file harvesting, and information gathering from other computers. The group even used a tool to infect connected USB storage devices to try to retrieve data from other air-gapped computers that were not on the network. Strontium was not only more sophisticated but also more persistent than criminal hacking enterprises, sending a selected target numerous phishing emails over an extended period. Successfully scamming a high-value target was clearly worth the investment.


pages: 492 words: 153,565

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter

air gap, Ayatollah Khomeini, Brian Krebs, crowdsourcing, data acquisition, Doomsday Clock, drone strike, Edward Snowden, facts on the ground, false flag, Firefox, friendly fire, Google Earth, information retrieval, information security, John Markoff, Julian Assange, Kickstarter, Loma Prieta earthquake, machine readable, Maui Hawaii, military-industrial complex, MITM: man-in-the-middle, Morris worm, pre–internet, RAND corporation, rolling blackouts, Silicon Valley, skunkworks, smart grid, smart meter, South China Sea, Stuxnet, Timothy McVeigh, two and twenty, undersea cable, unit 8200, uranium enrichment, Vladimir Vetrov: Farewell Dossier, WikiLeaks, Y2K, zero day

SYMANTEC IS A large, international corporation, but Chien and O’Murchu worked out of a small satellite office, going at it primarily alone with little input. They worked in Symantec’s Threat Intelligence Lab in Culver City, the cyber equivalent of a biodefense lab, where researchers could unleash malevolent code on a “red” network—a sandboxed system air-gapped from Symantec’s business network—to observe its hostile behavior in a controlled environment. To reach the ground-floor lab, workers passed through several sets of security doors, each with progressively more restrictive rules. The final gateway kept all but a handful of workers out and physically isolated the red network from computers connected to the outside internet.

To transfer commands to a PLC, someone had to transfer them via a laptop connected directly to a PLC with a cable or to carry them on a USB flash drive to a programming machine, called a Field PG—a Windows laptop used in industrial-control settings. The Field PG is not connected to the internet but is connected to the production network and the PLCs. By infecting Step 7 project files and investing Stuxnet with the power to jump the air gap as a USB stowaway, the attackers had essentially turned every engineer into a potential carrier for their weapon. Once Chien and O’Murchu documented all of the exploits and vulnerabilities that Stuxnet used to spread, they realized there was something else that stood out about them. A number of them had actually been seen before.

Safety systems used to be hardwired analog systems configured separately from control systems so that any problems with the control system wouldn’t interfere with the safety system’s ability to shut down equipment in an emergency. But many vendors are now building the safety system into their control system, making it easier to disable them both in a single attack.34 Many of the vulnerabilities in control systems could be mitigated if the systems ran on standalone networks that were “air-gapped”—that is, never connected to the internet or connected to other systems that are connected to the internet. But this isn’t always the case. In 2012, a researcher in the UK found more than 10,000 control systems that were connected to the internet—including ones belonging to water-treatment and power plants, dams, bridges, and train stations—using a specialized search engine called Shodan that can locate devices like VoIP phones, SmartTVs, and control systems that are connected to the internet.35 In 2011 a hacker named pr0f accessed the controls for a water plant in South Houston after finding the city’s Siemens control system online.


pages: 461 words: 125,845

This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers by Andy Greenberg

air gap, Apple II, Ayatollah Khomeini, Berlin Wall, Bill Gates: Altair 8800, Bletchley Park, Burning Man, Chelsea Manning, computerized markets, crowdsourcing, cryptocurrency, disinformation, domain-specific language, driverless car, drone strike, en.wikipedia.org, Evgeny Morozov, Fairchild Semiconductor, fault tolerance, hive mind, information security, Jacob Appelbaum, John Gilmore, John Perry Barlow, Julian Assange, Lewis Mumford, Mahatma Gandhi, military-industrial complex, Mitch Kapor, MITM: man-in-the-middle, Mohammed Bouazizi, Mondo 2000, Neal Stephenson, nuclear winter, offshore financial centre, operational security, PalmPilot, pattern recognition, profit motive, Ralph Nader, real-name policy, reality distortion field, Richard Stallman, Robert Hanssen: Double agent, Silicon Valley, Silicon Valley ideology, Skype, social graph, SQL injection, statistical model, stem cell, Steve Jobs, Steve Wozniak, Steven Levy, Teledyne, three-masted sailing ship, undersea cable, Vernor Vinge, We are Anonymous. We are Legion, We are the 99%, WikiLeaks, X Prize, Zimmermann PGP

Compared to photocopying seven thousand pages several times over, Manning’s leaks were also phenomenally easier—the difference between spending months harvesting a season of crops and playing a few hours of FarmVille on Facebook. In the midst of his work as a low-level intelligence analyst in Iraq, Manning slipped a rewritable CD marked with “Lady Gaga” into the tray of his work machine, a PC connected only to the military’s high-security Secret Internet Protocol Router Network, or SIPRNet. The SIPRNet was “airgapped”: It wasn’t connected to the Internet through any plug or wireless signal. But Manning could simply copy the CD’s music to the computer, delete it from the rewritable disc, burn whatever top secret data he wanted to the piece of plastic, and walk away with it minutes later. “[I] listened and lip-synced to Lady Gaga’s ‘Telephone’ while exfiltrating possibly the largest data spillage in American history,” Manning would write a few months later.


pages: 443 words: 123,526

Glasshouse by Charles Stross

air gap, cognitive dissonance, experimental subject, gravity well, lateral thinking, loose coupling, military-industrial complex, operational security, peer-to-peer, phenotype, prisoner's dilemma, sensible shoes, theory of mind, white picket fence

"I'll ask someone to investigate." She stares right through me, a reminder that there are three or four other copies of this strange old archivist wandering the concentric cylinder habs of the ship. She blinks rapidly. "It appears to be a security alert. Some sort of intruder just hit our transcription airgap. If you wait here a moment, I'll go and find out what's going on." She walks over toward the door of the teahouse and, as far as I can reconstruct later, this is the precise moment, when a swarm of eighteen thousand three hundred and twenty-nine wasp-sized attack robots erupt from the assembler in my family's home.


Engineering Security by Peter Gutmann

active measures, address space layout randomization, air gap, algorithmic trading, Amazon Web Services, Asperger Syndrome, bank run, barriers to entry, bitcoin, Brian Krebs, business process, call centre, card file, cloud computing, cognitive bias, cognitive dissonance, cognitive load, combinatorial explosion, Credit Default Swap, crowdsourcing, cryptocurrency, Daniel Kahneman / Amos Tversky, Debian, domain-specific language, Donald Davies, Donald Knuth, double helix, Dr. Strangelove, Dunning–Kruger effect, en.wikipedia.org, endowment effect, false flag, fault tolerance, Firefox, fundamental attribution error, George Akerlof, glass ceiling, GnuPG, Google Chrome, Hacker News, information security, iterative process, Jacob Appelbaum, Jane Jacobs, Jeff Bezos, John Conway, John Gilmore, John Markoff, John von Neumann, Ken Thompson, Kickstarter, lake wobegon effect, Laplace demon, linear programming, litecoin, load shedding, MITM: man-in-the-middle, Multics, Network effects, nocebo, operational security, Paradox of Choice, Parkinson's law, pattern recognition, peer-to-peer, Pierre-Simon Laplace, place-making, post-materialism, QR code, quantum cryptography, race to the bottom, random walk, recommendation engine, RFID, risk tolerance, Robert Metcalfe, rolling blackouts, Ruby on Rails, Sapir-Whorf hypothesis, Satoshi Nakamoto, security theater, semantic web, seminal paper, Skype, slashdot, smart meter, social intelligence, speech recognition, SQL injection, statistical model, Steve Jobs, Steven Pinker, Stuxnet, sunk-cost fallacy, supply-chain attack, telemarketer, text mining, the built environment, The Death and Life of Great American Cities, The Market for Lemons, the payments system, Therac-25, too big to fail, Tragedy of the Commons, Turing complete, Turing machine, Turing test, Wayback Machine, web application, web of trust, x509 certificate, Y2K, zero day, Zimmermann PGP

A typical SCADA security measure is “use an unroutable network protocol” or “hope that no-one ever figures out the homebrew wire protocol that the company founder invented in the shower 20 years ago”. In some cases even the use of unroutable network protocols or a complete air gap doesn’t necessarily protect SCADA systems, as the Stuxnet malware that was discussed in “Digitally Signed Malware” on page 50 showed. This took advantage of the fact that airgapped computers have to be configured and updated in some manner, and this is typically done using USB keys or similar removable media. By targeting vulnerabilities in the handling of removable media, Stuxnet ensured that it would be propagated even to airgapped machines. A few times a year there are scare stories in the media about how vulnerable assorted SCADA infrastructures are, but in practice very little ever happens because of SCADA systems’ major defence: they’re so profoundly uninteresting to real attackers (rather than security people trying to make a point) that no-one bothers with them.

Mozilla’s response was that they planned to take no action against any of the CAs [584] (making this particularly egregious was the fact that the same failings that were being ignored when existing TB2F CAs committed them were being used to block new CAs from being admitted to the browser trust lists, emphasising again the fact that once a CA made it over the TB2F barrier a different set of rules applied [585]. Alongside TB2F CA root certificates, timestamping certificates that are used for long-term code signing are another example of too-critical-to-revoke certificates, making them tempting targets for theft. Unlike CA root certificates, which are rarely used and can be subject to airgap security, timestamping certificates have to be kept online at all times because they’re used for automated counter-signing of binaries that run on hundreds of millions of end-user machines (a more detailed discussion of the intricacies of code-signing certificate revocation issues is given in “Dealing with Certificate Problems” on page 722).

A slightly better approach is to use a QR 2D barcode in conjunction with a smartphone, a so-called QR-TAN, to convey secured transaction data to the user [126]. The result in all of these cases is cryptographically tied to both the transaction and the account and serves as the TAN. This process not only provides an air gap between the trusted and untrusted components but makes the TAN-entry process an explicit user-initiated and –controlled action rather than something that a trojan can perform behind the user’s back. Numerous variations of this mechanism exist, with a typical reader being used in combination with an ATM card shown in Figure 150.


pages: 499 words: 144,278

Coders: The Making of a New Tribe and the Remaking of the World by Clive Thompson

"Margaret Hamilton" Apollo, "Susan Fowler" uber, 2013 Report for America's Infrastructure - American Society of Civil Engineers - 19 March 2013, 4chan, 8-hour work day, Aaron Swartz, Ada Lovelace, AI winter, air gap, Airbnb, algorithmic bias, AlphaGo, Amazon Web Services, Andy Rubin, Asperger Syndrome, augmented reality, Ayatollah Khomeini, backpropagation, barriers to entry, basic income, behavioural economics, Bernie Sanders, Big Tech, bitcoin, Bletchley Park, blockchain, blue-collar work, Brewster Kahle, Brian Krebs, Broken windows theory, call centre, Cambridge Analytica, cellular automata, Charles Babbage, Chelsea Manning, Citizen Lab, clean water, cloud computing, cognitive dissonance, computer vision, Conway's Game of Life, crisis actor, crowdsourcing, cryptocurrency, Danny Hillis, data science, David Heinemeier Hansson, deep learning, DeepMind, Demis Hassabis, disinformation, don't be evil, don't repeat yourself, Donald Trump, driverless car, dumpster diving, Edward Snowden, Elon Musk, Erik Brynjolfsson, Ernest Rutherford, Ethereum, ethereum blockchain, fake news, false flag, Firefox, Frederick Winslow Taylor, Free Software Foundation, Gabriella Coleman, game design, Geoffrey Hinton, glass ceiling, Golden Gate Park, Google Hangouts, Google X / Alphabet X, Grace Hopper, growth hacking, Guido van Rossum, Hacker Ethic, hockey-stick growth, HyperCard, Ian Bogost, illegal immigration, ImageNet competition, information security, Internet Archive, Internet of things, Jane Jacobs, John Markoff, Jony Ive, Julian Assange, Ken Thompson, Kickstarter, Larry Wall, lone genius, Lyft, Marc Andreessen, Mark Shuttleworth, Mark Zuckerberg, Max Levchin, Menlo Park, meritocracy, microdosing, microservices, Minecraft, move 37, move fast and break things, Nate Silver, Network effects, neurotypical, Nicholas Carr, Nick Bostrom, no silver bullet, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, Oculus Rift, off-the-grid, OpenAI, operational security, opioid epidemic / opioid crisis, PageRank, PalmPilot, paperclip maximiser, pattern recognition, Paul Graham, paypal mafia, Peter Thiel, pink-collar, planetary scale, profit motive, ransomware, recommendation engine, Richard Stallman, ride hailing / ride sharing, Rubik’s Cube, Ruby on Rails, Sam Altman, Satoshi Nakamoto, Saturday Night Live, scientific management, self-driving car, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, single-payer health, Skype, smart contracts, Snapchat, social software, software is eating the world, sorting algorithm, South of Market, San Francisco, speech recognition, Steve Wozniak, Steven Levy, systems thinking, TaskRabbit, tech worker, techlash, TED Talk, the High Line, Travis Kalanick, Uber and Lyft, Uber for X, uber lyft, universal basic income, urban planning, Wall-E, Watson beat the top human players on Jeopardy!, WeWork, WikiLeaks, women in the workforce, Y Combinator, Zimmermann PGP, éminence grise

In other words, artificial-intelligence experts could be happily tinkering away with a computer that’s merely very smart, only to suddenly discover, literally in the blink of an eye, that it has evolved into something that can think faster than all humanity working together. Sure, but how exactly could a disembodied AI kill us? It might figure out how to hack into our increasingly connected—and shoddily defended—everyday systems and shut them down. Maybe, to prevent this, we could require anyone who gets close to making a human-class AI to work on an air-gapped computer that’s not connected to anything else, or the internet. Fine, Bostrom says, but an ultraintelligent machine might be extremely persuasive; it could likely trick or entice one of its human minders into doing its will. It might even conceal the fact that it’s become super smart, the better to sneak away.


pages: 348 words: 185,704

Matter by Iain M. Banks

air gap, back-to-the-land, germ theory of disease, gravity well, lateral thinking, megastructure, off-the-grid

This was somewhat ignominious to her, as with her old upgrades her skin would have ridged and puckered over whatever area was required to absorb the gases she needed straight out of the water. The thin-film screen was stuck across her eyes like a flimsy transparent bandage. She had switched off her blink reflex; the alternative was to let the screen bulge out far enough for her to blink normally, but the air-gap introduced unwanted distortions. The screen provided her with the virtual view of the real space, showing the cavernous semi-spherical spaces of the Great Ship like some staggeringly vast cave system. She could have patched directly into the ship’s internal sensory view to achieve the same effect, or just swum with her own senses and not bothered with the greater, seemingly clear view, but she was being polite; using the thin-film screen meant that the ship could keep an eye on her, seeing, no doubt, what she could see, and so knowing that she wasn’t getting into any Special Circumstances-style mischief.


pages: 614 words: 176,458

Meat: A Benign Extravagance by Simon Fairlie

agricultural Revolution, air gap, Albert Einstein, back-to-the-land, Boris Johnson, call centre, carbon credits, carbon footprint, Community Supported Agriculture, deindustrialization, en.wikipedia.org, food miles, Food sovereignty, Garrett Hardin, gentleman farmer, Haber-Bosch Process, household responsibility system, Hugh Fearnley-Whittingstall, informal economy, Intergovernmental Panel on Climate Change (IPCC), Just-in-time delivery, land reform, Mahatma Gandhi, Martin Wolf, megacity, military-industrial complex, Northern Rock, Panamax, peak oil, precautionary principle, refrigerator car, rewilding, scientific mainstream, sexual politics, stem cell, The Wealth of Nations by Adam Smith, trade liberalization, Tragedy of the Commons, University of East Anglia, upwardly mobile, women in the workforce, zero-sum game

Their woodland handbook tells us ‘there is an old rule of thumb that an acre of woodland can produce a cord of wood per year indefinitely’.15 Cords are piles of firewood, which are a convenient dimension for forestry workers (four foot, by four foot, by eight foot), but awkward for scientists because they are in imperial measurements and full of airgaps. On top of that green wood weighs more than air-dried wood, while hardwoods such as oak and ash weigh more than conifers or fast growing broadleaves such as willow. Another complication is that firewood figures tend to be given in tonnes, whereas timber production is usually measured by volume. A cord weighs from 1.3 to 2.5 tonnes if it is green, and perhaps one tonne air dried if it is spruce, or 1.8 tonnes if it is oak.


pages: 746 words: 221,583

The Children of the Sky by Vernor Vinge

air gap, combinatorial explosion, epigenetics, indoor plumbing, megacity, MITM: man-in-the-middle, power law, random walk, risk tolerance, technological singularity, the scientific method, Vernor Vinge

Paws and jaws rolled her over, again and again. They were tearing at her clothes, pulling her gear out of the knapsack. And yet, the feeding frenzy never came, though the crowd was a crushing mass upon her. It was almost as if they were battling each other just to get a snout down and take a nibble. She tried to keep an airgap between her face and forearm as she wriggled in the direction she guessed would take her out of sight of Vendacious and company. The crushing weight seemed to ease; the nips and jabs were distant pain, like memories. Huh? She was lying flat on her back, dizzy even so. Everything was dark. She wiggled her hands and felt about her.


pages: 49 words: 12,968

Industrial Internet by Jon Bruner

air gap, autonomous vehicles, barriers to entry, Boeing 747, commoditize, computer vision, data acquisition, demand response, electricity market, en.wikipedia.org, factory automation, Google X / Alphabet X, industrial robot, Internet of things, job automation, loose coupling, natural language processing, performance metric, Silicon Valley, slashdot, smart grid, smart meter, statistical model, the Cathedral and the Bazaar, web application

Even highly technical employees are susceptible to spear phishing, in which an attacker sends a very specific email message with malware cloaked as a plausible attachment or Web link. Air gaps — complete isolation of sensitive networks from the Internet — have long been part of industrial security, but they are becoming increasingly unworkable as the value of machine data becomes apparent to managers and as contraband connectivity finds its way in. Systems that rely on air gaps to avoid attacks will be compromised as connections are inevitably made across them. “I don’t think it’s really possible to run a plant without bringing outside information in,” says Eric Byers, the CTO of industrial-security firm Tofino, who has given a conference presentation entitled “Unicorns and Air Gaps — Do They Really Exist?”

“I don’t think it’s really possible to run a plant without bringing outside information in,” says Eric Byers, the CTO of industrial-security firm Tofino, who has given a conference presentation entitled “Unicorns and Air Gaps — Do They Really Exist?”[11] Adds Byers: “As for management analytics, that horse ain’t going back in the barn. Even on the plant floor, workers want iPads for both documentation and inventory — what’s in our spare closet? — and that can make the difference between starting up in 15 minutes and starting up in two minutes.” The value of connectivity is high enough, and the stakes perilous enough, that the antivirus firm Kaspersky Lab sees a need for an industrial operating system that is “constructed with security in mind,” says Roel Shouwenberg, who is part of the team developing Kaspersky’s industrial operating system[12].

The value of connectivity is high enough, and the stakes perilous enough, that the antivirus firm Kaspersky Lab sees a need for an industrial operating system that is “constructed with security in mind,” says Roel Shouwenberg, who is part of the team developing Kaspersky’s industrial operating system[12]. He figures that true air gaps at industrial facilities impose a productivity hit of 20-30%, and security approaches that are analogous to physical plant security systems (if you’re standing in front of a machine on the factory floor, you’re authorized to be there) are misguided. A better approach, he says, is to “trust no one, trust nothing” — that is, scrutinize what goes on rather than walling off parts of the system.


pages: 480 words: 123,979

Dawn of the New Everything: Encounters With Reality and Virtual Reality by Jaron Lanier

4chan, air gap, augmented reality, back-to-the-land, Big Tech, Bill Atkinson, Buckminster Fuller, Burning Man, carbon footprint, cloud computing, collaborative editing, commoditize, Computer Lib, cosmological constant, creative destruction, crowdsourcing, deep learning, Donald Trump, Douglas Engelbart, Douglas Hofstadter, El Camino Real, Elon Musk, fake news, Firefox, game design, general-purpose programming language, gig economy, Google Glasses, Grace Hopper, Gödel, Escher, Bach, Hacker Ethic, Hans Moravec, Howard Rheingold, hype cycle, impulse control, information asymmetry, intentional community, invisible hand, Ivan Sutherland, Jaron Lanier, John Gilmore, John Perry Barlow, John von Neumann, Kevin Kelly, Kickstarter, Kuiper Belt, lifelogging, mandelbrot fractal, Mark Zuckerberg, Marshall McLuhan, Menlo Park, military-industrial complex, Minecraft, Mitch Kapor, Mondo 2000, Mother of all demos, Murray Gell-Mann, Neal Stephenson, Netflix Prize, Network effects, new economy, Nick Bostrom, Norbert Wiener, Oculus Rift, pattern recognition, Paul Erdős, peak TV, Plato's cave, profit motive, Project Xanadu, quantum cryptography, Ray Kurzweil, reality distortion field, recommendation engine, Richard Feynman, Richard Stallman, Ronald Reagan, self-driving car, Silicon Valley, Silicon Valley startup, Skinner box, Skype, Snapchat, stem cell, Stephen Hawking, Steve Bannon, Steve Jobs, Steven Levy, Stewart Brand, systems thinking, technoutopianism, Ted Nelson, telemarketer, telepresence, telepresence robot, Thorstein Veblen, Turing test, Vernor Vinge, Whole Earth Catalog, Whole Earth Review, WikiLeaks, wikimedia commons

To protect a computer from hackers, we sometimes create an “air gap.” That means that a computer performing a critical function isn’t even online. It’s out of the reach of hackers. A real person has to use it on-site. Each and every module/editor within a codeless phenotropic network is surrounded by what is effectively an air gap, because they can’t receive abstract messages from one another. There are no messages. Only simulated fingertips pressing simulated buttons. There’s no abstract “press button” message. Before I get back to the topic of security, I’ll explain more about how the air gap works. Expression First, a confession: Back in the eighties there was no way to implement the phenotropic effect without a “press button” event.

The reason I persisted is that I felt there was a benefit that would more than make up for the ugly potential for universal surveillance. If we could get machine vision to recognize faces and track expressions and so on, could we not also apply the same abilities to get editors to use other editors? We could finally get rid of the temporary patch and build a proper phenotropic system, with proper air gaps. In that case, a phenotropic editor would not support any interface or method of interaction other than its user interface. There would be no protocols, no abstract variables to document, no API.11 Machine vision and machine learning algorithms from one editor would be applied to interpret and operate a virtual hand that would virtually touch another editor.

I also have an extravagant number of physical music synthesizer modules. Many of these hardware artifacts contain computer chips that perform exactly the same functions as software plug-ins I have bought. But they aren’t equivalent in one crucial way. All of the physical devices still work. All of them. The difference is that the physical devices have analog, air gap connections that are resistant to obsolescence. In theory, the software plug-ins should be cheaper, more efficient, better in every sense. In practice, the hardware boxes are cheaper, more efficient, better in every sense, because they still work. Hardware effects pedals and modules are the phenotropic version of music technology,14 while plug-ins are the protocol version.


pages: 277 words: 72,603

Built: The Hidden Stories Behind Our Structures by Roma Agrawal

3D printing, air gap, Anthropocene, British Empire, clean water, Crossrail, David Attenborough, Dmitri Mendeleev, Elisha Otis, Guggenheim Bilbao, Isaac Newton, John Snow's cholera map, Leo Hollis, Tacoma Narrows Bridge, the scientific method

Streets were made wider, apartment buildings limited to six storeys, and bakers’ or metal workers’ shops separated from residential units, using double walls with air gaps. He proclaimed that balconies should be made fire-proof to make escape easier, and invested in improving the water supply, so it could be used to extinguish fires. The Romans learned from tragedy, and we too have benefited from that hard-won wisdom. Thousands of years later, these simple principles – separating rooms, flats and buildings with fire-resistant materials and installing air gaps – are still used to prevent fires ravaging modern structures. * On 11 September 2001, the world watched in horror as two planes collided with the World Trade Center towers in New York.

Romano; here courtesy of wikipedia; here © exaklaus-photos; here © Heritage Images; here © Heritage Images; here © Everett Collection Historical / Alamy Stock Photo; here © Fotosearch / Stinger; here © Stock Montage; here © Washington Imaging / Alamy Stock Photo; here © Popperfoto; here © North Wind Picture Archives / Alamy Stock Photo; here © Empato INDEX Page numbers in italic refer to the illustrations 3D printing here, here, here 9/11 here Abbey Mills Sewage Treatment Works, London here, here acanthus leaves here acceleration, of sway here Acropolis, Athens here Acton, London here, here Admiralty here adobe here aeroplanes here, here aggregates here, here air gaps, fire prevention here akasha here Akashi Kaikyo Bridge, Japan here Alexander the Great here Anatolia here, here Andronicus of Cyrrhus here Angel of Independence victory column, Mexico City here aqueducts here, here, here, here, here, here aquifers here, here Arabian Sea here arches aqueducts here, here, here Cattedrale di Santa Maria del Fiore, Florence here construction here, here corbelled arches here, here Derinkuyu here forces acting on here, here, here, here, here insulae here pointed arches here quadripartite arches here, here Roman here, here, here, here, here Archimedes here, here, here, here, here, here, here Arciniega, Claudio de here, here Aristotle here Armageddon (film) here Armstrong, Lord here Arnolfo di Cambio here Arthur, Chester here ash, volcanic here, here, here Assyria here Athens here Acropolis here Parthenon here Propylaea here ‘Tower of the Winds’ here, here atoms here Atrush, River here Attenborough, David here attenuation tanks, sewage here Augustus, Emperor here Avignon here Azerbaijan here Aztecs here, here, here, here, here, here Babylon here, here, here bacteria recycling waste water here, here ‘self-healing’ concrete here sewage treatment here baking here balance, cable-stayed bridges here balconies here Bank of China Tower, Hong Kong here Baroque architecture here basements, skyscrapers here, here Basilica Cistern, Istanbul here, here Basilica di Santa Croce, Florence here Batman Begins (film) here Battersea, London here Bazalgette, Joseph here, here, here, here, here beams here, here, here, here in ancient architecture here exoskeletons here flexing here, here, here, here shape here bearings cable-stayed bridges here earthquake protection here, here Beckton sewage treatment works, London here, here beehives here, here Beijing here Belgium here ‘the bends’ here Bénézet, Saint here Berbers here Bessemer, Anthony here Bessemer, Henry here, here Bessemer Process here, here, here Bilbao here biomimicry here, here, here birds here, here ‘Bird’s Nest’ National Stadium, Beijing here Black Sea here boats Falkirk Wheel here, here The Pontoon here, here, here sailing here Boeing aeroplanes here bolts, tie-systems here Bombay Stock Exchange here, here bombs here, here Bond, James here bonds, metals here bone, biomimicry here Bosque de Chapultepec, Mexico City here bouncy bridges here braces here bricks here, here arches here, here Cattedrale di Santa Maria del Fiore, Florence here, here concrete here Indus Valley Civilisation here Jericho here load-bearing structures here manufacture here mortar here, here Roman here, here, here tunnels here, here, here Victorian architecture here bridges here Akashi Kaikyo Bridge, Japan here Brooklyn Bridge, New York here, here, here, here, here cable-stayed bridges here, here, here, here construction here Falkirk Wheel here, here forces here Forth Bridge here foundations here, here, here, here Golden Gate Bridge, San Francisco here graphene here Ishibune Bridge here, here London Bridge here, here Millau Viaduct here, here movement joints here Northumbria University Footbridge, Newcastle here, here, here, here, here, here, here Old London Bridge here, here piers here, here Pont d’Avignon here The Pontoon here, here, here Quebec Bridge here, here, here reinforced concrete here resonance here, here, here Roman here rope bridges here silk bridge here, here span here steel here stress-ribbon bridges here, here suspension bridges here, here, here, here Sydney Harbour Bridge here, here, here and temperature here 3D printing here trusses here tuned mass dampers here, here Britain Beneath Your Feet (documentary) here British Association here British Empire here Bronze Age here Brooklyn Bridge, New York here, here, here, here, here Brooklyn Engineers’ Club here Brunel, Isambard here, here, here, here Brunel, Marc here, here, here, here Brunel, Mary here Brunel, Sophia here, here Brunelleschi, Filippo here, here, here, here, here, here burdock here Burj Khalifa, Dubai here, here, here Byzantine Empire here, here cables cable-stayed bridges here, here, here, here The Pontoon here stress-ribbon bridges here, here suspension bridges here, here, here caisson disease here, here caissons here, here, here, here calcite here calcium, in concrete here, here California here Caligula, Emperor here Callimachus here Cambridge Centre for Smart Infrastructure and Construction here Canada here canals aqueducts here Falkirk Wheel here, here Nineveh here locks here, here Singapore here cantilevers here carbon adding to iron here in steel here, here, here carbon dioxide, concrete-making here carbon fibres, elevators here cast iron here Castle of the Teutonic Order, Malbork here catenary curves here, here, here Cattedrale di Santa Maria del Fiore, Florence here, here, here, here causeways here caves, Derinkuyu here Celtic axes here, here cement here, here, here, here, here see also concrete centering here, here, here, here Centre Pompidou, Paris here, here, here, here ceramics here cesspits here Chatham Dockyard here, here Chicago here DeWitt-Chestnut apartment building here John Hancock Center here, here China here, here, here, here, here, here cholera epidemics here, here, here chuna mortar here Church here cisterns here, here clay in cement here clay mines here reinforcing tunnels with here tunnelling into here see also bricks cofferdams here, here, here collapses here, here columns here, here dis-proportionate collapse here after explosions here Old London Bridge here pontoon bridges here Quebec Bridge here, here resonance and here Ronan Point here, here, here, here, here, here Tacoma Narrows Bridge here Tay Bridge here World Trade Center New York here Colosseum, Rome here, here, here columns here, here, here, here Basilica Cistern, Istanbul here, here Corinthian columns here, here exoskeletons here failure here, here insulae here Pantheon, Rome here safety calculations here World Trade Center collapse here Commission of Sewers here compression here, here arches here, here, here, here beams here cable-stayed bridges here columns and here concrete here, here domes here, here load-bearing systems here skyscraper cores here suspension bridges here computer-aided design here concrete here aggregates here, here aqueducts here arches here beams here, here carbon dioxide emissions here columns here compression here, here cracking here, here, here curved shapes here domes here in fires here floors here, here, here making here moulds here Pantheon, Rome here, here, here, here piles here, here prefabrication here, here reinforced concrete here, here Roman here, here, here, here, here, here, here ‘self-healing’ concrete here in skyscrapers here, here, here, here, here, here, here sound proofing here steel reinforcement bars here strength here and tension here, here versatility here conduits, kariz (water system) here, here Constantine, Emperor here cooking here Cooper, Theodore here corbelled arches here, here core, skyscrapers here, here, here, here, here Corinth here Corinthian columns here, here Cornwall here Cow Court, Rotherhithe here cranes here, here, here, here, here, here Crassus, Marcus Licinius here Crimean War (1853–56) here Crossness Sewage Treatment Works, Erith, London here, here Crossrail, London here crows here Crystal Palace station, London here crystals, in metals here, here culverts here, here, here curved shapes here Czech Republic here dampers earthquake protection here, here tuned mass dampers here, here, here, here, here ultra-thin skyscrapers here Dardanelles here Darius I, King of Persia here Dark Ages here Darlington here Darwin’s bark spider here, here Delhi, Iron Pillar here, here, here, here Democritus here Derinkuyu here desalination plants here deserts, water systems here DeWitt-Chestnut apartment building, Chicago here Dhaka University here diagrids here, here disease here, here, here, here dis-proportionate collapse here diving bells here, here diving boards here, here domes Cattedrale di Santa Maria del Fiore, Florence here, here, here construction here forces acting on here, here Pantheon, Rome here, here, here, here, here Doric columns here drawbridges here Driver, Charles Henry here drones here Dubai, Burj Khalifa here, here, here ductility here, here earth four elements here see also soil earthquakes here, here, here, here East India Company here East London Railway Company here East River, New York here Eastgate Centre, Zimbabwe here Edge Moor Iron Company here Edinburgh here eggs here, here, here, here Egypt here, here, here, here, here Eiffel Tower, Paris here, here, here elasticity metals here spider silk here electricity cables here, here elements here elevators here, here, here, here, here, here embankments, rivers here Empire State Building, New York here, here end-bearing piles here, here energy earthquakes here making concrete here pulleys here Epicurus here epidemics here, here Erciyes here escalators here escape routes, skyscrapers here, here exoskeletons here, here, here, here, here, here, here exothermic reactions here explosions here, here, here, here external braced frames see exoskeletons Fa Hsien, A Record of Buddhistic Kingdoms here fairy chimneys here, here Falkirk here Falkirk Wheel here, here Ferris Wheels here fertilisers here, here fibre optic cables here filters, waste water here, here fires here, here concrete and here Great Fire of London here Great Fire of Rome here Old London Bridge here World Trade Center, New York here First World War here Fisac, Miguel here flexible membrane moulds here floating bridges here, here floods here, here, here floors here, here, here, here Florence Basilica di Santa Croce here Cattedrale di Santa Maria del Fiore here, here, here, here, here Palazzo Vecchio here Ponte Vecchio here forces in arches here, here and collapses here designing bridges here in domes here, here earthquakes here frame structures here, here gravity here, here load-bearing structures here, here piles here pulleys here wind here see also compression; tension formwork, concrete here Forth and Clyde Canal here Forth Bridge, Scotland here Forum, Rome here, here fossils here foundations here bridges here, here, here, here, here building on soft ground here, here insulae here on piles here Roman here, here tunnels here four elements here Four National Taps (Singapore) here frame structures here, here exoskeletons here, here, here, here, here, here, here parts of here tie-systems here France here, here, here Franchini, Gianfranco here Fratres Pontifices here frequency here, here fresh water here friction arches here, here piles here, here weight and here From Russia with Love (film) here furnaces here, here, here Gardon, River here, here Garuda here gas explosions here geometry, irregular here Georgetown Visitation Convent here, here Germany here, here, here ‘The Gherkin’, London here, here, here, here Giotto here, here Giza, Great Pyramid here, here Glasgow here glass here, here, here, here Goh Chok Tong here Golden Gate Bridge, San Francisco here Gonabad here Gothic architecture here grape skins here graphene here, here gravity here, here, here Great Fire of London (1666) here Great Fire of Rome (AD 64) here Great North Run here, here Great Pyramid of Giza here, here ‘Great Stink’, London (1858) here Great Wall of China here, here Greece here, here, here, here ‘ground granulated blast furnace slag’ (GGBS) here Guggenheim Museum, Bilbao here guns, Crimean War here Gupta dynasty here Gyllius, Petrus here gypsum here, here, here Hadrian, Emperor here Harappa here, here Harris, Andres here Hasan here Haughwout, E.V. & Co. here, here healing here Hearst Tower, Manhattan here, here Heartlands Project, Cornwall here Hellespont here, here Heraclitus of Ephesus here Herodotus, The Histories here herringbone pattern, brick-laying here, here Hewitt, Abram here Heydar Aliyev Center, Azerbaijan here Hiero II, King here Hinduism here, here Hittites here Hoare, Edward here Hodge, Ivy here, here Hong Kong here, here Hood Canal Bridge here Horologion of Andronikos Kyrrhestes, Athens here, here horse hair, reinforcing plaster here hot-working metal here, here House of Commons, London here houses frame structures here, here insulae (apartment buildings) here, here load-bearing structures here, here on Old London Bridge here Huitzilopochtli here huts, mud here, here, here hydration here, here hydraulics, earthquake protection here Iltutmish, tomb of, Delhi here Imperial College London here India here, here, here, here, here, here Indus Valley Civilisation here, here Industrial Revolution here Institute of Making here Institution of Structural Engineers here insulae (apartment buildings) here, here intumescent paint here Iran (Persia) here, here Iraq here, here iron here cast iron here frame structures here furnaces here Iron Pillar, Delhi here, here, here, here reinforced concrete here Roman here rust here strengthening here suspension bridges here wrought iron here see also steel Iron Age here iron oxide here irregular geometry here Ishibune Bridge, Japan here, here Islamic architecture here, here Israel here Istanbul, Basilica Cistern here, here Italy here, here, here jacks, tightening cables here Japan here, here, here, here Jeddah Tower here Jenga here Jericho here Jerwan here jibs, cranes here John Hancock Center, Chicago here, here Johor River here Jordan here Jordan, River here Justinian, Emperor here kariz (water system) here, here keystones, arches here, here Khan, Fazlur here, here, here kilns, brick here, here, here Kodumanal here Kuala Lumpur here, here, here Landesgartenschau Exhibition Hall, Stuttgart here lasers here lava, volcanic here, here Leaning Tower of Pisa here, here Lebanon here Lee Kuan Yew here Leeds University here LEGO here Leonardo da Vinci here, here Levant here lime here lime mortar here limestone here, here, here Lincoln Cathedral here Lincoln’s Inn, London here loads on arches here building on soft ground here load-bearing structures here, here patterned loading here piles here preventing collapses here World Trade Center collapse here, here, here locks, canals here, here Loki here London here, here Crossrail here Crystal Palace station here Great Fire here London Overground here New London Bridge here, here Old London Bridge here, here Ronan Point, Canning Town here, here, here, here, here, here 30 St Mary Axe (The Gherkin) here, here, here, here St Pancras Renaissance Hotel here sewers here, here, here, here The Shard here, here, here, here, here, here, here, here, here, here, here Tower of London here Tube here, here, here, here tunnels here, here, here Los Angeles here McLean, Thomas here McLure, Norman here Madagascar here Madrid here, here Malaysia here, here, here, here, here Malbork here Maltesers here Manhattan here, here, here, here maps, wind here Marathon, Battle of (490 BC) here Marmara here master builders here materials choice of here science of here see also concrete, steel etc mega-skyscrapers here, here Melendiz Daglari here membrane engineering here Menander here Mendeleev, Dmitri here Merdeka Tower, Kuala Lumpur here Mesopotamia here, here metal here bonds here ductility here elasticity here molecular structure here see also iron; steel Metropolitan Board of Works, London here Metropolitan Cathedral, Mexico City here, here, here Metropolitan Commission of Sewers, London here Mexico City here, here Angel of Independence victory column here Metropolitan Cathedral here, here, here Torre Latinoamericana here Torre Mayor skyscraper here, here mica here microfiltration here Middle Ages here Middle East here Millau Viaduct here, here Miller, Abraham here Milton Keynes here Milwaukee Art Museum here minarets here mines, clay here Miodownik, Mark here Mohenjo-daro here, here molecular structure, metal here Monier, Joseph here Moon here Morocco here mortars here, here, here, here moulds, for concrete here movement joints, bridges here mud mud huts here, here, here reinforcing with straw here multi-use buildings here Mumbai here, here, here MUPAG Rehabilitation Center, Madrid here muqanni here Murphy, Senator Henry here Murrow Memorial Bridge here mythology here, here Namazu here Napoleon Bonaparte here National Museum of Anthropology, Mexico City here National Taps, Singapore here Native Americans here Nature, biomimicry here, here, here navvies here Neolithic man here Nero, Emperor here, here New York here, here, here Brooklyn Bridge here, here, here, here, here Empire State Building here, here Hearst Tower here, here 432 Park Avenue here World Trade Center here, here New York Bridge Company here New York Herald here New York Star here New York World’s Fair (1853) here NEWater here Newcastle, Northumbria University Footbridge here, here, here, here, here, here, here Newton, Isaac here, here third law of motion here, here, here newtons here Niederfinow Boat Lift here night soil trade here Nightingale, Florence here Nineveh here Norse mythology here Northumbria University Footbridge, Newcastle here, here, here, here, here, here, here octopuses here oculus (opening) here, here, here, here Old London Bridge here, here opus caementicium here Osaka here osmosis here, here, here Otis, Elisha here, here, here, here, here, here Ottoman Empire here Ovando-Shelley Dr Efraín here, here Oxford University here oxidation here oxygen, Bessemer Process here paint, intumescent here Pakistan here Palazzo Vecchio, Florence here Palm Jumeirah, Dubai here Pantheon, Rome here, here, here, here, here parabolic cables here Paris here Centre Pompidou here, here, here, here Eiffel Tower here, here, here Paris Exposition (1867) here 432 Park Avenue, Manhattan here Parker, John here, here Parthenon, Athens here patterned loading here pendulums earthquake protection here, here, here, here Metropolitan Cathedral, Mexico City here, here penthouses here Percival, Lt-General Arthur here periodic table here Persia here, here Peter of Colechurch here Petronas Towers, Kuala Lumpur here, here Philadelphia here Phoenicians here phosphorus here, here Piano, Renzo here piers, bridges here, here piledrivers here, here piles here, here, here, here, here, here Pillar, Iron (Delhi) here, here, here, here pipes, robots checking here Pisa, Leaning Tower of here, here plaster here, here plaster of Paris here Plataea here, here Pliny the Elder, Historia Naturalis here Plutarch’s Lives here pneumatic caissons here polyethylene (PE) formwork here polypropylene (PP) formwork here polystyrene blocks, formwork here polyvinylidene fluoride here Pompeii here, here Pompidou Centre, Paris here, here, here, here Pont d’Avignon here Pont du Gard aqueduct here, here Ponte Vecchio, Florence here The Pontoon here, here, here potholes here pozzolana here, here Pratt trusses here prefabrication here, here prehistoric buildings here Propylaea, Athens here Public Utilities Board, Singapore here pulleys here, here, here, here, here pumping stations, sewers here, here Purnell, Phil here pyramids here, here, here, here, here, here qanat (water system) here Quadracci Pavilion, Milwaukee Art Museum here quadripartite arches here, here quartz here Quebec Bridge here, here, here Quebec City here Qutb complex, Delhi here, here Rael, Ronald here Raffles, Sir Stamford here raft foundations here, here railways here, here, here, here rainwater here, here, here, here recycling waste water here Regent’s Canal, London here reinforced concrete here, here Renaissance here, here Rennie, John here repairs, future possibilities here reservoirs here, here resonance here, here, here, here, here reverse osmosis here, here, here rice here Richard the Raker here rivers untreated sewage in here, here, here, here see also bridges road repairs here robots here, here, here rocks, formation of clay here Roebling, Emily Warren here, here, here, here, here, here, here Roebling, John Augustus here, here, here, here Roebling, Washington here, here, here Rogers, Richard here Romans here aqueducts here, here, here arches here, here, here, here, here Basilica Cistern, Istanbul here, here bricks here, here, here bridges here, here columns here concrete here, here, here, here, here, here, here cranes here, here, here fires here foundations here, here insulae (apartment buildings) here, here iron here on materials here mortars here ‘Tower of the Winds’, Athens here, here Rome here, here Colosseum here, here, here Forum here, here Pantheon here, here, here, here, here Ronan Point, Canning Town, London here, here, here, here, here, here rope bridges here, here ropes, pulleys here rotating bridges here, here Rotherhithe, London here rubber bands here, here rubber bearings here, here rust here, here safety, skyscrapers here, here sailing here Saint Lawrence River here, here 30 St Mary Axe, London (The Gherkin) here, here, here, here St Mary’s Church, Rotherhithe, London here St Mary’s Church, Stralsund here St Pancras Renaissance Hotel, London here Salamis, Battle of (480 BC) here salty water desalination plants here reverse osmosis here, here, here San Francisco here sand, tunnelling into here sanitation here, here, here, here Saudi Arabia here Scotland Falkirk Wheel here, here Forth Bridge here Tay Bridge collapse here Scott, George Gilbert here sea urchins here Second World War here, here, here, here sedimentary rocks here ‘self-healing’ concrete here Sennacherib, King here sewers here, here, here, here Shanghai here The Shard, London here, here, here, here, here, here, here, here, here, here, here Sheffield here Sherlock Holmes (film) here The Shield (tunnel-boring machine) here, here, here Shinto here ships see boats shipworms here, here, here shock absorbers, earthquake protection here silicates, in concrete here silicon here, here silk bridge here, here Singapore here skulls, birds here skyscrapers basements here, here Burj Khalifa, Dubai here, here, here concrete in here, here, here, here, here, here, here core here, here, here, here, here elevators here, here escape routes here, here exoskeletons here, here, here, here, here, here, here explosions in here, here fires here first skyscrapers here height here, here, here mega-skyscrapers here, here piles here prefabrication here, here The Shard, London here, here, here, here, here, here, here, here, here, here, here slenderness ratios here stability systems here, here steel in here, here substructure here sway here, here, here, here and winds here slenderness ratios, skyscrapers here Snow, Dr John here Soho, London here soils piles in here subsidence here under London here water table here Spain here Spanish Pavilion, World Expo (2010) here Sparta here Spartacus here spiders, silk bridge here, here springs, wagon here, here stability systems, skyscrapers here, here stairs here, here starlings (artificial islands) here, here steel here beams here, here, here, here Bessemer Process here, here bridges here columns here core of skyscraper here, here, here, here ductility here exoskeletons here, here in fires here, here, here frame structures here hot-working here, here piles here reinforcing concrete with here, here, here rust here thermal expansion here trusses here waste materials here Stewart, James here stone bridge-building here constructing arches here load-bearing structures here Stralsund here Strasbourg Cathedral here straw, reinforcing mud with here Strépy-Thieu boat lift here stress-ribbon bridges here, here struts here Stuttgart here subsidence here, here substructure piles here, here skyscrapers here suspension bridges here, here, here, here sway, skyscrapers here, here, here, here Sydney Harbour Bridge here, here, here Syria here, here Tacoma Narrows Bridge, Washington here Taipei 101 tower here, here, here, here Taiwan here Taj Mahal, Agra here Tamil Nadu here Tarn valley here Tay Bridge here Tebitu, River here temperature bridges and here reinforced concrete and here Tenochtitlan here, here tension here, here beams here brick structures here cable-stayed bridges here, here, here concrete and here, here domes here, here metals here reinforced concrete here, here skyscraper cores here stress-ribbon bridges here suspension bridges here Teotihuacan here Teredo navalis (shipworm) here termite mounds here, here Texcoco, Lake here, here Thales here Thames, River Bazalgette’s sewers here, here New London Bridge here, here Old London Bridge here, here sewage in here Thames Tideway Tunnel here, here, here Thames Tunnel Company here, here, here thermal coefficients, reinforced concrete here Thrace here, here Three Gorges Dam here tie-systems here timber see wood toilets here, here, here Tokugawa shogunate here Tokyo here, here top-down construction method here, here, here Tornado Tower, Doha here Torre Latinoamericana, Mexico City here Torre Mayor skyscraper, Mexico City here, here toughness, spider silk here Tower Hamlets, London here Tower of London here towers cable-stayed bridges here, here suspension bridges here, here ‘Tower of the Winds’, Athens here, here and winds here see also skyscrapers treadwheels here Treasury (UK) here trees here, here, here, here Trevithick, Richard here triangles, trusses here, here, here Triton here trusses here, here, here Tuas here Tube, London here, here, here, here tubular system, exoskeletons here tuff here tuned mass dampers here, here, here, here, here tuning forks here tunnels kariz (water system) here, here Thames Tideway Tunnel here, here, here Thames Tunnel here, here, here, here tunnel boring machines (TBMs) here, here Turkey here, here, here, here turtles here, here typhoons here UN-Habitat here underground railways here, here, here, here underground structures here underwater structures here, here Union Canal, Scotland here United States Supreme Court Building, Washington here University of California, Berkeley here Urban VIII, Pope here Utica here vaults, quadripartite here, here Vauxhall Bridge, London here, here Velcro here ventilation systems here, here, here, here Vertigo (film) here Vesuvius, Mount here, here vibrations bridges here earthquakes here frequency here Victorian architecture here Vierendeel trusses here Vishnu, Lord here Vitruvius Pollio, Marcus here, here De Architectura here, here, here, here, here volcanoes here wagon springs here, here walls, wattle and daub here Wapping, London here War Office (British) here Warren, Gouverneur K. here Warren trusses here waste disposal here, here, here, here water here aqueducts here, here, here aquifers here, here bridge foundations here, here, here canals here, here cisterns here, here cofferdams here, here concrete-making here, here desalination plants here floods here inJapan here kariz here, here in London here, here osmosis here, here, here rainwater here, here, here, here recycling here reservoirs here, here in Singapore here waste water here, here, here, here water pipes here, here water table here wattle and daub here Wayss, Gustav Adolf here webs, spiders’ here, here weight and friction here gravity and here pulleys here weirs here wells here, here Westminster, London here Wheel, Falkirk here, here Wikipedia here Willis, Bruce here wind here, here wind maps here wind tunnels here, here windlasses here, here, here windows, insulae here, here women engineers here, here, here wood bridges here centering here, here, here early houses here, here formwork here piles here, here, here shipworms here wattle and daub here Woolwich Dockyard here World Expo (2010) here World Health Organization here World Trade Center, New York here, here World’s Fair, New York (1853) here wrought iron here Wuhan Greenland Centre here Xerxes, King of Persia here, here Zimbabwe here A NOTE ON THE AUTHOR Roma Agrawal is a structural engineer who builds big.


pages: 253 words: 75,772

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State by Glenn Greenwald

air gap, airport security, anti-communist, Cass Sunstein, Chelsea Manning, cognitive dissonance, David Brooks, Edward Snowden, false flag, Gabriella Coleman, Julian Assange, Laura Poitras, Mark Zuckerberg, Occupy movement, off-the-grid, operational security, Panopticon Jeremy Bentham, Rubik’s Cube, Seymour Hersh, Silicon Valley, Skype, Ted Kaczynski, WikiLeaks

The next day, I flew from Rio to JFK on the overnight flight, and by 9:00 a.m. the following day, Friday, May 31, I had checked in to my Manhattan hotel and then met Laura. The first thing we did was go to a store to buy a laptop that would serve as my “air gapped machine,” a computer that never connected to the Internet. It is much more difficult to subject an Internet-free computer to surveillance. To monitor an air gapped computer, an intelligence service such as the NSA would have to engage in far more difficult methods, such as obtaining physical access to the computer and placing a surveillance device on the hard drive. Keeping the computer close at all times helps prevent that type of invasion.

Laura had given me a five-minute tutorial on the secure computer system in the car and said she intended to sleep on the plane. She handed over the thumb drive and suggested that I start looking at her set of documents. Once we arrived in Hong Kong, she said, the source would ensure I had full access to my own complete set. After the plane took off, I pulled out my new air gapped computer, inserted Laura’s thumb drive, and followed her instructions for loading the files. For the next sixteen hours, despite my exhaustion, I did nothing but read, feverishly taking notes on document after document. Many of the files were as powerful and shocking as that initial PRISM PowerPoint presentation I had seen back in Rio.


pages: 443 words: 116,832

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics by Ben Buchanan

active measures, air gap, Bernie Sanders, bitcoin, blockchain, borderless world, Brian Krebs, British Empire, Cass Sunstein, citizen journalism, Citizen Lab, credit crunch, cryptocurrency, cuban missile crisis, data acquisition, disinformation, Donald Trump, drone strike, Edward Snowden, fake news, family office, Hacker News, hive mind, information security, Internet Archive, Jacob Appelbaum, John Markoff, John von Neumann, Julian Assange, Kevin Roose, Kickstarter, kremlinology, Laura Poitras, MITM: man-in-the-middle, Nate Silver, operational security, post-truth, profit motive, RAND corporation, ransomware, risk tolerance, Robert Hanssen: Double agent, rolodex, Ronald Reagan, Russian election interference, seminal paper, Silicon Valley, South China Sea, Steve Jobs, Stuxnet, subscription business, technoutopianism, undersea cable, uranium enrichment, Vladimir Vetrov: Farewell Dossier, Wargames Reagan, WikiLeaks, zero day

The first part of the digital reconnaissance mission was simple to outline but hard to do: get inside Natanz. Because the computers that controlled the centrifuges were not connected to the internet, the hackers could not reach them directly; in the parlance of cybersecurity researchers, these systems were “air gapped” from the internet. To defeat this protection, Fanny’s creators designed the code as a worm, meaning that it could spread itself from computer to computer on its own, without any real-time direction from its creators. Fanny was able to spread autonomously thanks to some previously unknown vulnerabilities in key components of Windows.

Once on board the newly infected machine, Fanny could spread itself to other machines. Before long, exponential growth would dictate that the worm reached a large number of targets, from which the hackers could gather information via a disguised command-and-control system. Eventually, someone carried Fanny across the air gap, enabling the worm’s creators to gather information on the targets of their planned attack; it is unknown if human intelligence sources played a role in this infection.8 Without this extensive reconnaissance, the Stuxnet attack would have been impossible. Even with a more detailed understanding of how the Iranians configured their centrifuges, the attackers had substantial work to do before they could launch their sabotage effort.

Later versions had much more power to spread themselves from one computer and network to the next, eventually deploying no fewer than eight different propagation mechanisms.12 Infecting a broad range of computers, especially within contractors for Iran’s nuclear program, increased the odds that Stuxnet would cross the air gap and reach the centrifuges. Five contractors appear to have been the initial targets, the patient zeroes who unleashed the wider infection.13 Sure enough, Stuxnet eventually made its way into Natanz. Stuxnet’s creators programmed different versions of the code to talk to one another like gossiping teenagers.


pages: 444 words: 117,770

The Coming Wave: Technology, Power, and the Twenty-First Century's Greatest Dilemma by Mustafa Suleyman

"World Economic Forum" Davos, 23andMe, 3D printing, active measures, Ada Lovelace, additive manufacturing, agricultural Revolution, AI winter, air gap, Airbnb, Alan Greenspan, algorithmic bias, Alignment Problem, AlphaGo, Alvin Toffler, Amazon Web Services, Anthropocene, artificial general intelligence, Asilomar, Asilomar Conference on Recombinant DNA, ASML, autonomous vehicles, backpropagation, barriers to entry, basic income, benefit corporation, Big Tech, biodiversity loss, bioinformatics, Bletchley Park, Blitzscaling, Boston Dynamics, business process, business process outsourcing, call centre, Capital in the Twenty-First Century by Thomas Piketty, ChatGPT, choice architecture, circular economy, classic study, clean tech, cloud computing, commoditize, computer vision, coronavirus, corporate governance, correlation does not imply causation, COVID-19, creative destruction, CRISPR, critical race theory, crowdsourcing, cryptocurrency, cuban missile crisis, data science, decarbonisation, deep learning, deepfake, DeepMind, deindustrialization, dematerialisation, Demis Hassabis, disinformation, drone strike, drop ship, dual-use technology, Easter island, Edward Snowden, effective altruism, energy transition, epigenetics, Erik Brynjolfsson, Ernest Rutherford, Extinction Rebellion, facts on the ground, failed state, Fairchild Semiconductor, fear of failure, flying shuttle, Ford Model T, future of work, general purpose technology, Geoffrey Hinton, global pandemic, GPT-3, GPT-4, hallucination problem, hive mind, hype cycle, Intergovernmental Panel on Climate Change (IPCC), Internet Archive, Internet of things, invention of the wheel, job automation, John Maynard Keynes: technological unemployment, John von Neumann, Joi Ito, Joseph Schumpeter, Kickstarter, lab leak, large language model, Law of Accelerating Returns, Lewis Mumford, license plate recognition, lockdown, machine readable, Marc Andreessen, meta-analysis, microcredit, move 37, Mustafa Suleyman, mutually assured destruction, new economy, Nick Bostrom, Nikolai Kondratiev, off grid, OpenAI, paperclip maximiser, personalized medicine, Peter Thiel, planetary scale, plutocrats, precautionary principle, profit motive, prompt engineering, QAnon, quantum entanglement, ransomware, Ray Kurzweil, Recombinant DNA, Richard Feynman, Robert Gordon, Ronald Reagan, Sam Altman, Sand Hill Road, satellite internet, Silicon Valley, smart cities, South China Sea, space junk, SpaceX Starlink, stealth mode startup, stem cell, Stephen Fry, Steven Levy, strong AI, synthetic biology, tacit knowledge, tail risk, techlash, techno-determinism, technoutopianism, Ted Kaczynski, the long tail, The Rise and Fall of American Growth, Thomas Malthus, TikTok, TSMC, Turing test, Tyler Cowen, Tyler Cowen: Great Stagnation, universal basic income, uranium enrichment, warehouse robotics, William MacAskill, working-age population, world market for maybe five computers, zero day

Think of containment, then, as a set of interlinked and mutually reinforcing technical, cultural, legal, and political mechanisms for maintaining societal control of technology during a time of exponential change; an architecture up to the task of containing what would have once been centuries or millennia of technological change happening now in a matter of years or even months, where consequences ricochet around the world in seconds. Technical containment refers to what happens in a lab or an R&D facility. In AI, for example, it means air gaps, sandboxes, simulations, off switches, hard built-in safety and security measures—protocols for verifying the safety or integrity or uncompromised nature of a system and taking it offline if needed. Then come the values and cultures around creation and dissemination that support boundaries, layers of governance, acceptance of limits, a vigilance for harms and unintended consequences.

The ultimate control is hard physical control, of servers, microbes, drones, robots, and algorithms. “Boxing” an AI is the original and basic form of technological containment. This would involve no internet connections, limited human contact, a small, constricted external interface. It would, literally, contain it in physical boxes with a definite location. A system like this—called an air gap—could, in theory, stop an AI from engaging with the wider world or somehow “escaping.” Physical segregation is just one aspect of transforming technical safety architecture to meet the challenge of the next wave. Taking the best of what’s out there is a start. Nuclear power, for instance, gets a bad rep thanks to well-known disasters like Chernobyl and Fukushima.

Giving off light with a wavelength between 200 and 230 nanometers, close to the ultraviolet spectrum, they can kill viruses while not penetrating the outer layer of the skin: a powerful weapon against pandemics and the spread of disease more widely. And if the COVID-19 pandemic taught us one thing, it’s the value of an integrated, accelerated approach across research, rollout, and regulation for novel vaccines. In AI, technical safety also means sandboxes and secure simulations to create provably secure air gaps so that advanced AIs can be rigorously tested before they are given access to the real world. It means much more work on uncertainty, a major focus right now—that is, how does an AI communicate when it might be wrong? One of the issues with LLMs is that they still suffer from the hallucination problem, whereby they often confidently claim wildly wrong information as accurate.


Hacking Capitalism by Söderberg, Johan; Söderberg, Johan;

Abraham Maslow, air gap, Alvin Toffler, AOL-Time Warner, barriers to entry, Charles Babbage, collective bargaining, commoditize, computer age, corporate governance, creative destruction, Debian, deindustrialization, delayed gratification, Dennis Ritchie, deskilling, digital capitalism, digital divide, Donald Davies, Eben Moglen, Erik Brynjolfsson, Firefox, Free Software Foundation, frictionless, full employment, Garrett Hardin, Hacker Conference 1984, Hacker Ethic, Herbert Marcuse, Howard Rheingold, IBM and the Holocaust, informal economy, interchangeable parts, invention of radio, invention of the telephone, Jacquard loom, James Watt: steam engine, jimmy wales, John Markoff, John von Neumann, Joseph Schumpeter, Joseph-Marie Jacquard, Ken Thompson, knowledge economy, knowledge worker, labour market flexibility, late capitalism, Lewis Mumford, liberal capitalism, Marshall McLuhan, means of production, Mitch Kapor, mutually assured destruction, new economy, Norbert Wiener, On the Economy of Machinery and Manufactures, packet switching, patent troll, peer-to-peer, peer-to-peer model, planned obsolescence, post scarcity, post-Fordism, post-industrial society, price mechanism, Productivity paradox, profit motive, RFID, Richard Florida, Richard Stallman, Ronald Coase, safety bicycle, Search for Extraterrestrial Intelligence, SETI@home, Silicon Valley, Slavoj Žižek, software patent, Steven Levy, Stewart Brand, subscription business, tech worker, technological determinism, technoutopianism, the Cathedral and the Bazaar, The Nature of the Firm, the scientific method, The Theory of the Leisure Class by Thorstein Veblen, Thomas Davenport, Thorstein Veblen, tragedy of the anticommons, Tragedy of the Commons, transaction costs, Whole Earth Catalog, Yochai Benkler

Researchers in the field do not mumble about the purpose of their work: ”The need to authenticate ourselves to machines is ever increasing in today’s networked society and it is necessary to close the air gap between man and machine to secure our transactions and networks.”52 Software allows flexibility in design that approaches surgical precision. This technique of near absolute control is limited only by the ‘air gap’ left between the body and the virtual grid. But the rewards from regulating the behaviour of terrorists, criminals, counterfeiters, consumers, workers, citizens and immigrants are very compelling, and thus the motivation to close the air gap is equally so. A closed air gap would mean no escape from capital’s transactions and capital’s networks.


When Computers Can Think: The Artificial Intelligence Singularity by Anthony Berglas, William Black, Samantha Thalind, Max Scratchmann, Michelle Estes

3D printing, Abraham Maslow, AI winter, air gap, anthropic principle, artificial general intelligence, Asilomar, augmented reality, Automated Insights, autonomous vehicles, availability heuristic, backpropagation, blue-collar work, Boston Dynamics, brain emulation, call centre, cognitive bias, combinatorial explosion, computer vision, Computing Machinery and Intelligence, create, read, update, delete, cuban missile crisis, David Attenborough, DeepMind, disinformation, driverless car, Elon Musk, en.wikipedia.org, epigenetics, Ernest Rutherford, factory automation, feminist movement, finite state, Flynn Effect, friendly AI, general-purpose programming language, Google Glasses, Google X / Alphabet X, Gödel, Escher, Bach, Hans Moravec, industrial robot, Isaac Newton, job automation, John von Neumann, Law of Accelerating Returns, license plate recognition, Mahatma Gandhi, mandelbrot fractal, natural language processing, Nick Bostrom, Parkinson's law, patent troll, patient HM, pattern recognition, phenotype, ransomware, Ray Kurzweil, Recombinant DNA, self-driving car, semantic web, Silicon Valley, Singularitarianism, Skype, sorting algorithm, speech recognition, statistical model, stem cell, Stephen Hawking, Stuxnet, superintelligent machines, technological singularity, Thomas Malthus, Turing machine, Turing test, uranium enrichment, Von Neumann architecture, Watson beat the top human players on Jeopardy!, wikimedia commons, zero day

The first issue would be to decide exactly when the box should be sealed. There are already a number of semi-intelligent agents that have access to the internet The second issue is that having an “air gap” that separates the machine from the internet is not enough because a machine needs to interact with the world at some level. The Stuxnet virus managed to destroy Iran’s nuclear program despite an air gap that was in place. A more fundamental issue is that a hyper-intelligent computer would be very intelligent, and so it would be good at convincing its jailers to release it. If there were several artificial intelligences locked in boxes then only one of them would need to escape.

It caused the centrifuges to alternately run too fast and too slow, which caused them to burn out relatively quickly. Stuxnet also perverted the software-based centrifuge monitoring system so that it told the Iranians that the centrifuges were spinning at the correct speeds even though they were not. The Iranians instigated an “air gap” between computers that controlled the centrifuges and other computers that could be connected to the internet. However, they still needed to get code and data on and off the centrifuge computers, which they did using USB memory sticks (“thumb drives”). Having infected computers that were attached to the internet, Stuxnet copied itself onto the thumb drives.

Modern anti-virus software needs to be much more intelligent in order to detect malware, but a substantial amount of malware remains undetected, and the anti-virus software can also attack normal, good software. Stuxnet was not intelligent in the sense of being an AGI, but it was autonomous in the sense that once it was released into the wild, it behaved in ways that its authors could not predict and control. Stuxnet could not call home when working in cognito behind an air gap, so it just did what it thought was best. That is how it escaped from the centrifuges and was eventually detected. As to the Iranian centrifuges, it is estimated that Stuxnet had destroyed about 20% of them and set the Iranian program back by several months. Stuxnet is gone, and the centrifuges replaced, and output actually increased slightly during 2010.


pages: 322 words: 99,066

The End of Secrecy: The Rise and Fall of WikiLeaks by The "Guardian", David Leigh, Luke Harding

"World Economic Forum" Davos, 4chan, air gap, banking crisis, centre right, Chelsea Manning, citizen journalism, Climategate, cloud computing, credit crunch, crowdsourcing, Downton Abbey, drone strike, end-to-end encryption, eurozone crisis, Evgeny Morozov, friendly fire, global village, Hacker Ethic, impulse control, Jacob Appelbaum, Julian Assange, knowledge economy, machine readable, military-industrial complex, Mohammed Bouazizi, Nelson Mandela, offshore financial centre, operational security, post-work, rolodex, Seymour Hersh, Silicon Valley, Skype, Steven Levy, sugar pill, uranium enrichment, WikiLeaks

Or 260,000 state department cables from embassies and consulates all over the world, explaining how the first world exploits the third, in detail, from an internal perspective?” Manning confessed: “The air gap has been penetrated.” The air gap is computer jargon, in this context, for the way the military internet is kept physically separate, for security reasons, from civilian servers, on which the ordinary commercial internet runs. Lamo prompted him: “How so?” “Let’s just say ‘someone’ I know intimately well has been penetrating US classified networks, mining data like the ones described, and been transferring that data from the classified networks over the ‘air gap’ onto a commercial network computer: sorting the data, compressing it, encrypting it, and uploading it to a crazy white-haired Aussie who can’t seem to stay in one country very long.”


pages: 372 words: 109,536

The Panama Papers: Breaking the Story of How the Rich and Powerful Hide Their Money by Frederik Obermaier

air gap, banking crisis, blood diamond, book value, credit crunch, crony capitalism, Deng Xiaoping, Edward Snowden, family office, Global Witness, high net worth, income inequality, Jeremy Corbyn, Kickstarter, Laura Poitras, liquidationism / Banker’s doctrine / the Treasury view, mega-rich, megaproject, Mikhail Gorbachev, mortgage debt, Nelson Mandela, offshore financial centre, optical character recognition, out of africa, race to the bottom, vertical integration, We are the 99%, WikiLeaks

Its wireless local area network (WLAN) is deactivated, and no LAN cable will ever penetrate its casing. This is known as an ‘air gap’. One of the many lessons of the Snowden leaks is that a computer is only relatively secure from hackers if it has never been connected to the Internet, i.e. if an air gap separates it from other systems. Intelligence services are now able to control even switched-off mobile phones, so it’s a piece of cake for them to hack into a computer that has been connected to a WLAN. To bridge an air gap, however, a secret service agent would have to have physical access to the relevant computer, which would mean getting past the security guards at the entrance to the Süddeutsche Zeitung’s offices.


pages: 414 words: 109,622

Genius Makers: The Mavericks Who Brought A. I. To Google, Facebook, and the World by Cade Metz

AI winter, air gap, Airbnb, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, AlphaGo, Amazon Robotics, artificial general intelligence, Asilomar, autonomous vehicles, backpropagation, Big Tech, British Empire, Cambridge Analytica, carbon-based life, cloud computing, company town, computer age, computer vision, deep learning, deepfake, DeepMind, Demis Hassabis, digital map, Donald Trump, driverless car, drone strike, Elon Musk, fake news, Fellow of the Royal Society, Frank Gehry, game design, Geoffrey Hinton, Google Earth, Google X / Alphabet X, Googley, Internet Archive, Isaac Newton, Jeff Hawkins, Jeffrey Epstein, job automation, John Markoff, life extension, machine translation, Mark Zuckerberg, means of production, Menlo Park, move 37, move fast and break things, Mustafa Suleyman, new economy, Nick Bostrom, nuclear winter, OpenAI, PageRank, PalmPilot, pattern recognition, Paul Graham, paypal mafia, Peter Thiel, profit motive, Richard Feynman, ride hailing / ride sharing, Ronald Reagan, Rubik’s Cube, Sam Altman, Sand Hill Road, self-driving car, side project, Silicon Valley, Silicon Valley billionaire, Silicon Valley startup, Skype, speech recognition, statistical model, stem cell, Stephen Hawking, Steve Ballmer, Steven Levy, Steven Pinker, tech worker, telemarketer, The Future of Employment, Turing test, warehouse automation, warehouse robotics, Y Combinator

At one point, he said: “Nothing in the DoD should ever be fielded going forward without built-in AI capability.” At least to the Googlers who arranged the contract, it seemed like the company would be a vital part of this long haul. But first, Google had to build software for what was called an “air gap” system—a computer (or network of computers) that was literally surrounded by an air gap, so it isn’t connected to any other network. The only way to get data into such a system is through some sort of physical device, like a thumb drive. Apparently, the Pentagon would load its drone footage onto this system, and Google needed a way of accessing this data and feeding it into a neural network.

Navy, 15–19 and machine learning, 48 single-layer network design, 36–37 Perceptrons (Minsky and Papert), 25, 33–34, 44, 194 pharmaceutical industry, deep learning’s ability to help the, 181–83, 271 photo manipulation, 209–11 photo-realistic faces, 210 Pichai, Sundar, 216–17, 241, 243, 263–65 Pinker, Steven, 266–67 Pomerleau, Dean, 43–44, 49, 137, 256–57 pornography, 231 Poulson, Jack, 249, 250 Principles of Neurodynamics (Rosenblatt), 22–23 privacy concerns GDPR (General Data Protection Regulation), 248 medical data from the Royal Free NHS Trust shared with DeepMind, 188 Progressive GANs, 210 Project Mack Truck, 138–39 Project Marvin, 83 Project Maven building a system for identifying drone strike targets, 240 contract with Google, 243 Google employee petition against, 247–50 meeting with Google, 240–43 Puchwein, Peter, 284–85 QSAR (quantitative structure-activity relationship), 182–83 Quake III (game), 295–97 Raji, Deborah, 230–32, 236–38 RankBrain, 139 Ranzato, Marc’Aurelio, 89, 124–27 Rashid, Rick, 130 Rebooting AI (Marcus), 270 Redmond, Michael, 174 reinforcement learning, 111–12, 113, 280, 309–10 research expense of recruiting and retaining the talent pool, 132 freely traded building blocks based on Linux, 131 immigration policies’ effect on foreign talent, 207–08 increased investments in, 136, 138–40 open research concept, 127–28, 129–32 Research in Motion (RIM), 75 robotics ABB robotics contest, 283–84 Amazon contest for warehouse picking, 278–79 the Arm Farm, 279–81 Google Brain robotics group, 279–81 learning human movement, 279–81 programming behavior and skills, 277 robots using dreaming to generate pictures and spoken words, 200 Rubik’s Cube demonstration, 276–78, 281, 297–98 use of Covariant’s automation technology in a Berlin warehouse, 284–85 Rosenblatt, Frank criticism of backpropagation, 38 death, 26–27 education and training, 17 Mark I machine development, 18 Perceptron machine demonstration, 15–19 research efforts, 25–26, 34, 36 rivalry with Marvin Minsky, 21–22, 24–25 Rubik’s Cube demonstration at OpenAI, 276–78, 281, 297–98 Rumelhart, David, 37–39, 97 Sabour, Sara, 208, 305 Salakhutdinov, Russ, 63 Schmidhuber, Jürgen, 59–60, 141–42 Schmidt, Eric, 173, 182, 216, 217, 220, 225, 242 Schroepfer, Mike (“Schrep”), 120, 123, 126, 167–69, 254–55, 257, 258–60 Science (journal), 105 Scott, Kevin, 85–86 security concerns adversarial attacks, 212–13 “air gap” systems, 246–47 medical data from the Royal Free NHS Trust shared with DeepMind, 188 Sedol, Lee, 171–72, 174–78, 216 Segal, Adam, 208 Segura, Marc, 284 Sejnowski, Terry, 29, 39–40, 49–50, 65 self-belief, 293–94 self-driving vehicles ALVINN project, 43–44, 53 Chauffeur project, 137–38, 142 China’s ability to develop, 226–27 exaggerated claims about, 271 Qi Lu’s proposal to Microsoft, 197–98 at Tesla, 155–56 using deep learning, 137–38 Sequence to Sequence paper on machine translation, 183 Shanahan, Patrick, 246 Silicon Valley scale, 293–94 self-belief and conviction, importance of, 293, 306–07 venture capital firms, 160–61 Silver, David AlphaGo project, 171, 173–74, 175, 198 artificial intelligence research, 104–05 as cofounder of Elixir, 103 and Demis Hassabis, 101–02, 103, 104–05 Simon, Herbert, 22, 288 Singhal, Amit, 83–84, 139 the Singularity Summit, 107–09, 325–26 SNARC machine, 21 speech recognition and Android smartphones, 77–79 deep learning and neural speech recognition, 67–68 Google Duplex technology, 265–66 Li Deng’s research on, 66–67, 218 speed of technological progress, 60 SRI (Stanford Research Institute), 20, 24 Stanford University, 57, 85 StarCraft (game), 296–97 statistical translation, 55–56 Suleyman, Mustafa (“Moose”), 107, 115–16, 157–58, 186–88, 244, 248, 294–95, 300–01 superintelligence, 105–06, 153, 156–60, 311 Superintelligence: Paths, Dangers, Strategies (Bostrom), 153 surveillance.


pages: 394 words: 117,982

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by David E. Sanger

active measures, air gap, autonomous vehicles, Bernie Sanders, Big Tech, bitcoin, Black Lives Matter, Bletchley Park, British Empire, call centre, Cambridge Analytica, Cass Sunstein, Chelsea Manning, computer age, cryptocurrency, cuban missile crisis, disinformation, Donald Trump, drone strike, Edward Snowden, fake news, Google Chrome, Google Earth, information security, Jacob Appelbaum, John Markoff, Kevin Roose, Laura Poitras, Mark Zuckerberg, MITM: man-in-the-middle, mutually assured destruction, off-the-grid, RAND corporation, ransomware, Sand Hill Road, Sheryl Sandberg, Silicon Valley, Silicon Valley ideology, Skype, South China Sea, Steve Bannon, Steve Jobs, Steven Levy, Stuxnet, Tim Cook: Apple, too big to fail, Twitter Arab Spring, undersea cable, unit 8200, uranium enrichment, Valery Gerasimov, WikiLeaks, zero day

Twice before the Israelis had seen threatening nuclear projects under way, one in Iraq, the other in Syria. They had destroyed them both. Olympic Games was a way to keep the Israelis focused on crippling the Iranian program without setting off a regional war. But getting the code into the plant was no easy task. The Natanz computer systems were “air gapped” from the outside, meaning they had no connections to the Internet. The CIA and the Israelis endeavored to slip the code in on USB keys, among other techniques, with the help of both unwitting and witting Iranian engineers. With some hitches, the plan worked reasonably well for several years. The Iranians were mystified about why some of their centrifuges were speeding up or slowing down and ultimately destroying themselves.

From Hawaii, not far from Pearl Harbor and the US Pacific Command, the NSA was deploying its very best cyberweapons against its most sensitive targets, including North Korea’s intelligence services and China’s People’s Liberation Army. The weapons ranged from new surveillance techniques that could leap “air gaps” and penetrate computers not connected to the Internet to computer implants that could detonate in time of war, disabling missiles and blinding satellites. While the American public and much of the media were transfixed by the image of a “Big Brother”—tracking not only the numbers they call but the trail of digital dust left by the smartphones in their pockets—the most revealing documents in Snowden’s trove showed the vast ambitions of the nation’s new cyber arsenal.

In late 2013, Der Spiegel published the “ANT catalog,” an equipment catalog that James Bond might have admired. Starting in 2008 or so, the NSA began making use of new tools designed to steal or alter data in a computer even if it is not connected to a network—exactly what it did in Iran to get past the “air gap” that separated the Natanz plant from the digital world. The most ingenious of the devices relied on a covert channel of low-frequency radio waves transmitted from tiny circuit boards and USB keys inserted surreptitiously into the target computers. Getting the equipment into the computers required, of course, that the United States or one of its allies insert the hardware into the devices before they were shipped from the factory, divert them while they were in transit, or find a stealthy spy with a way to gain access to them—no easy task.


pages: 409 words: 112,055

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke, Robert K. Knake

"World Economic Forum" Davos, A Declaration of the Independence of Cyberspace, Affordable Care Act / Obamacare, air gap, Airbnb, Albert Einstein, Amazon Web Services, autonomous vehicles, barriers to entry, bitcoin, Black Lives Matter, Black Swan, blockchain, Boeing 737 MAX, borderless world, Boston Dynamics, business cycle, business intelligence, call centre, Cass Sunstein, cloud computing, cognitive bias, commoditize, computer vision, corporate governance, cryptocurrency, data acquisition, data science, deep learning, DevOps, disinformation, don't be evil, Donald Trump, Dr. Strangelove, driverless car, Edward Snowden, Exxon Valdez, false flag, geopolitical risk, global village, immigration reform, information security, Infrastructure as a Service, Internet of things, Jeff Bezos, John Perry Barlow, Julian Assange, Kubernetes, machine readable, Marc Benioff, Mark Zuckerberg, Metcalfe’s law, MITM: man-in-the-middle, Morris worm, move fast and break things, Network effects, open borders, platform as a service, Ponzi scheme, quantum cryptography, ransomware, Richard Thaler, Salesforce, Sand Hill Road, Schrödinger's Cat, self-driving car, shareholder value, Silicon Valley, Silicon Valley startup, Skype, smart cities, Snapchat, software as a service, Steven Levy, Stuxnet, technoutopianism, The future is already here, Tim Cook: Apple, undersea cable, unit 8200, WikiLeaks, Y2K, zero day

Dan Coats, the Director of National Intelligence and a former Republican Senator, described the Russian attacks on the U.S. electrical grid as being so severe that, figuratively, “the warning lights are blinking red.” In background briefings that followed Coats’s statement, government officials explained that the Russians had “jumped the air gap,” which the power grid companies contended they had created between their internet-connected systems and the actual controls of the power networks. In point of fact, few companies had actually isolated their controls. There was almost always a path from the internet to the company’s intranet, and another path from there to the grid controls.

In their annual threat assessment to Congress, the agency heads wrote that Russia had the ability to disrupt the U.S. power grid and that China had the capability to disrupt the U.S. natural gas pipeline system (upon which much of the power grid relies). These were not theoretical capabilities, the agencies made clear. These were swords of Damocles hanging above America, swords that could be dropped at any time. Russia’s hackers had allegedly gone after the companies that supply parts to or do maintenance on the grid control side of the air gap. By compromising those systems, the attackers could gain the log-in credentials of people authorized to have access to the control network. Often that access would be remote, over virtual private networks (VPNs) running on top of the internet. The Russians could then plug into the grid’s control.

Then they could move into the systems that display the state of the grid on big monitors in control rooms and send instructions to the thousands of devices in the field. If all of that sounds a little familiar to you, maybe you read speculation about how the United States had attacked the Iranian controls for the nuclear centrifuges at Natanz. The Iranians had basked confidently in the assurance that their control network was also “air gapped” from the internet. Not satisfied with the security provided by firewalls, the Iranians had sought to protect the plant from U.S. or Israeli cyberattack by having no internet connection anywhere in the complex. The United States attacked, according to some experts, by infiltrating the Stuxnet software into devices brought into the building by contractors, perhaps on laptops or printers.


pages: 415 words: 123,373

Inviting Disaster by James R. Chiles

air gap, Airbus A320, airline deregulation, Alignment Problem, Apollo 11, Apollo 13, Boeing 747, crew resource management, cuban missile crisis, Exxon Valdez, flying shuttle, Gene Kranz, Maui Hawaii, megaproject, Milgram experiment, Neil Armstrong, North Sea oil, Piper Alpha, Recombinant DNA, Richard Feynman, Richard Feynman: Challenger O-ring, risk tolerance, Ted Sorensen, time dilation

That’s basically how the booster segments went together at Kennedy: pipes joined end to end, with each rim-and-slot junction held fast by 177 steel pins. For an ordinary pipeline this would have been fine, but not for the high-powered, hot-firing boosters. One challenge was that at each field joint a thin air gap remained between the solid fuel castings in each segment. Without some precautions, flame would fill this gap during a launch and attack the half-inch-thick steel of the booster’s outer casing. To keep the flame at the core of the booster where it belonged, the field joints had heat-resistant putty to close off the gap between the fuel castings, and two rubber O-rings fitted into the rim-and-slot arrangement as a final seal.

Here, nitroglycerine (technically, “ethylene glycol dinitrate”) leaves the nitrator as milky-white droplets in a stream of water and flows down a covered trough to another building for separating and washing. On the inside, these buildings have the look of dairy operations: clean concrete floors, whitewashed walls, and stainless-steel pipes and vats. At the last point of the process, fresh nitroglycerine flowed from an elbow-shaped tube and gurgled peacefully down a drainpipe, with a few inches of air gap between. Whitesell said it’s safer than confining it in a tube, where sudden compression of the liquid could set it off, perhaps by someone shutting or opening a valve too quickly. Because nitroglycerine is a thick liquid that always holds some trapped air bubbles, if the liquid is compressed quickly the air in the bubbles heats up, and this heat can set off a runaway reaction that detonates an entire batch.

Jeff Pigott stretched out a metal rod and struck a foot-long arc with the power line, then clamped on a temporary cable that would maintain a good electrical connection between the helicopter’s frame and the line. This is called bonding to the wire. The reason for the arc is that the helicopter has a lower electrical potential than the power line, and current wants to jump across the air gap to equalize them, something like the way that water seeks its own level. That’s why the crew members can sit on metal platforms and ride in a metal helicopter: for this brief time, all the people in the helicopter are wearing the full voltage of the transmission line and are safer than they would be by trying to insulate themselves from it somehow.


pages: 294 words: 81,292

Our Final Invention: Artificial Intelligence and the End of the Human Era by James Barrat

AI winter, air gap, AltaVista, Amazon Web Services, artificial general intelligence, Asilomar, Automated Insights, Bayesian statistics, Bernie Madoff, Bill Joy: nanobots, Bletchley Park, brain emulation, California energy crisis, cellular automata, Chuck Templeton: OpenTable:, cloud computing, cognitive bias, commoditize, computer vision, Computing Machinery and Intelligence, cuban missile crisis, Daniel Kahneman / Amos Tversky, Danny Hillis, data acquisition, don't be evil, drone strike, dual-use technology, Extropian, finite state, Flash crash, friendly AI, friendly fire, Google Glasses, Google X / Alphabet X, Hacker News, Hans Moravec, Isaac Newton, Jaron Lanier, Jeff Hawkins, John Markoff, John von Neumann, Kevin Kelly, Law of Accelerating Returns, life extension, Loebner Prize, lone genius, machine translation, mutually assured destruction, natural language processing, Neil Armstrong, Nicholas Carr, Nick Bostrom, optical character recognition, PageRank, PalmPilot, paperclip maximiser, pattern recognition, Peter Thiel, precautionary principle, prisoner's dilemma, Ray Kurzweil, Recombinant DNA, Rodney Brooks, rolling blackouts, Search for Extraterrestrial Intelligence, self-driving car, semantic web, Silicon Valley, Singularitarianism, Skype, smart grid, speech recognition, statistical model, stealth mode startup, stem cell, Stephen Hawking, Steve Jobs, Steve Jurvetson, Steve Wozniak, strong AI, Stuxnet, subprime mortgage crisis, superintelligent machines, technological singularity, The Coming Technological Singularity, Thomas Bayes, traveling salesman, Turing machine, Turing test, Vernor Vinge, Watson beat the top human players on Jeopardy!, zero day

They carry at least three underwater lights and at least three knives, in case of entanglement. Even so, cave diving remains the world’s most dangerous sport. Triple or quadruple containment measures could confound a Busy Child, at least temporarily. Consider a Busy Child reared in a sandbox within an apoptotic system. The sandbox of course would be separated by an air gap from any network, cabled or wireless. A separate individual human would be in charge of each restriction. A consortium of developers and a fast-response team could be in contact with the lab during critical phases. And yet, would this be enough? In The Singularity Is Near, after recommending defenses to AGI, Kurzweil concedes that no defense will always work.

In Iran, one or more spies carried flash drives infected with three versions of Stuxnet into secure plants. Stuxnet can travel across the Internet (though at a half megabyte of code it’s much larger than most malware) but in this case it did not, initially. Typically, in the plants, one computer was attached to one controller and an “air gap” separated the computer from the Internet. But one flash drive could infect multiple PCs, or infest an entire local area network (LAN) by plugging into one node. At the Natanz plant PCs were running software that permits users to visualize, monitor, and control plant operations from their computers.


Home Maintenance Checklist: Complete DIY Guide for Homeowners: 101 Ways to Save Money and Look After Your Home by Ian Anderson

air gap, clean water, en.wikipedia.org, operational security

However, if you’ve a wall that’s rained on whatever you do, or a chimney getting a beating every time it rains, then by all means go for a breathable silicone treatment, with one caveat. Do it at the end of the summer after a long, long period of dry weather to ensure the brickwork is bone dry to start with. To stop water getting into the wall, consider covering it up for a while (with an air gap to allow evaporation) before treating it. Always follow the instructions as products vary and find one that’s breathable for best results. In addition to protecting your masonry from water, you’ll need to check it annually for movement damage. Large cracks can be serious if caused by subsidence which is movement associated with damage from nearby large trees or leaking drains.


pages: 448 words: 117,325

Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World by Bruce Schneier

23andMe, 3D printing, air gap, algorithmic bias, autonomous vehicles, barriers to entry, Big Tech, bitcoin, blockchain, Brian Krebs, business process, Citizen Lab, cloud computing, cognitive bias, computer vision, connected car, corporate governance, crowdsourcing, cryptocurrency, cuban missile crisis, Daniel Kahneman / Amos Tversky, David Heinemeier Hansson, disinformation, Donald Trump, driverless car, drone strike, Edward Snowden, Elon Musk, end-to-end encryption, fault tolerance, Firefox, Flash crash, George Akerlof, incognito mode, industrial robot, information asymmetry, information security, Internet of things, invention of radio, job automation, job satisfaction, John Gilmore, John Markoff, Kevin Kelly, license plate recognition, loose coupling, market design, medical malpractice, Minecraft, MITM: man-in-the-middle, move fast and break things, national security letter, Network effects, Nick Bostrom, NSO Group, pattern recognition, precautionary principle, printed gun, profit maximization, Ralph Nader, RAND corporation, ransomware, real-name policy, Rodney Brooks, Ross Ulbricht, security theater, self-driving car, Seymour Hersh, Shoshana Zuboff, Silicon Valley, smart cities, smart transportation, Snapchat, sparse data, Stanislav Petrov, Stephen Hawking, Stuxnet, supply-chain attack, surveillance capitalism, The Market for Lemons, Timothy McVeigh, too big to fail, Uber for X, Unsafe at Any Speed, uranium enrichment, Valery Gerasimov, Wayback Machine, web application, WikiLeaks, Yochai Benkler, zero day

This might be regarded as heresy in today’s race to network everything, but large, centralized systems are not inevitable. Technical and corporate elites may be pushing us in that direction, but they really don’t have any good supporting arguments other than profit maximization. Disconnecting can happen in several ways. It can mean creating separate “air gapped” networks. (These have vulnerabilities as well, and are not a security panacea.) It can mean going back to non-interoperable systems. And it can mean not building connectivity into systems in the first place. There are also incremental ways to do this. We can enable local communications only. We can design dedicated devices, reversing the current trend of turning everything into a general-purpose computer.

., 190 wiretapping by, 168 FDA, 137, 145, 151 Federal Communications Commission (FCC), 149 FedRAMP, 123 Felten, Ed, 223 financial crisis (2008), 125–26 FinFisher, 64–65 FireEye, 42 flash crash, 85 Ford Foundation, 224 Fort Hood shooting (2009), 202 Freeh, Louis, 193 FTC, 148, 154 Gamma Group, 30, 65 Gartner tech analyst firm, 101 GDPR (General Data Protection Regulation) [EU], 151, 184–88 Geer, Dan, 163, 217 George, Richard, 170 Gerasimov Doctrine, 71 Germany, BSI and BND in, 173 GGE (Group of Governmental Experts), UN, 158 Gmail, 153 Goldsmith, Jack, 163 Google: Advanced Protection Program, 47 censorship by, 60 controls exerted by, 61, 62 and EU regulations, 185 identification systems in, 199 lobbying by, 154 state investigation of, 187 surveillance via, 58–59, 169, 196 governments, 144–59 asymmetry between, 91–92 censorship by, 60 and defense over offense, 160–79 functions of, 10 and industry, 176–79 information sharing by, 176 and infrastructure, 117 insecurity favored by, 57 international cooperation, 156–59 international espionage, 171–72 jurisdictional arbitrage, 156 and liability law, 128–33 lobbying of, 154–55 mistrust of, 208, 220 policy challenges in, 99, 100–101, 192–206 regulatory bodies, 121, 144, 150–52, 156–59, 192 and security standards, 167 supply-chain attacks on, 87–89 surveillance by, 64–68, 172, 195, 208 vulnerability disclosure by, 163 Greer, John, 126 GTT Communications, 115 Gutenberg, Johannes, 24 hacking: catastrophic, 9, 16, 217 class breaks, 33, 95 contests in, 85 costs of, 102–3 cyberweapons in, 73 increasing threat of, 79 international havens of, 156 through fish tank, 29 hacking back, 203–4 HackingTeam, 30, 45, 65 HAMAS, 93 Hancock Health, 74 harm, legal definition of, 130 Harris Corporation, 168 Hathaway, Melissa, 114 Hayden, Michael, 170 Healey, Jason, 158, 160 Heartbleed, 21, 114–15 Hello Barbie (doll), 106 Hilton Hotels, 185 Hizballah, 93 Honan, Mat, 29 Hotmail, 153 HP printers, 62 Huawai (Chinese company), 87 Human Rights Watch, 223 humans, as system component, 7 IBM, 33 iCloud, 7 hacking of, 78 and privacy, 190 quality standards for, 111, 123, 135 Idaho National Laboratory, 79, 90 identification, 51–55, 199–200 attribution, 52–55 breeder documents for, 51 impersonation of, 51, 75 identity, 44 identity theft, 50–51, 74–76, 106, 171 Ilves, Toomas Hendrik, 221 iMessage, 170 impersonation, 51, 75 IMSI (international mobile subscriber identity), 168–70 industry lobbying groups, 183 information asymmetries, 133–38 information security, 78 infrastructure: critical, use of term, 116 security of, 116–18 Inglis, Chris, 28 innovation, 155 insecurity, 56–77 cost of, 126 criminals’ benefit from, 74–77 and cyberwar, 68–74 insurance industry, 132–33 integrity, attacks on, 78–82 intellectual property theft, 66, 72–73, 75 interconnections, vulnerabilities in, 28–30, 90 International Organization for Standardization (ISO), 140 Internet: advertising model of, 57, 60 changing concepts of, 5, 218 connectivity of, 5, 91, 105–6 demilitarization of, 212–15 dependence on, 89–90 development phase of, 22–23, 157 explosive growth of, 5, 146 global, 7, 16, 161 governance model of, 157 government regulation of, 152–55 horizontal growth of, 146 industry standards for, 23, 122–23 lack of encryption on, 170–72 maintenance and upkeep of, 143 nonlinear system of, 211 private ownership of infrastructure, 126 resilience of, 210–12 as social equalizer, 214, 217 surveillance and control via, 64–68 viral dissident content on, 158 Internet+: authentication in, 49–51 coining of term, 8 cybersecurity safety board for, 177 risks and dangers of, 217–18 simultaneous vulnerabilities in, 94 Internet+ security: closing the skills gap, 141–42 correcting information asymmetries in, 133–38 correcting misaligned incentives in, 124–28 current state of, 9 defense in, see attack vs. defense enforcement of, 121 funding maintenance and upkeep in, 143 incentives and policy solutions for, 100–103, 120–43 increasing research in, 142–43 liabilities clarified for, 128–33 litigation for, 121 meanings of, 15–17 and privacy, 9 public education about, 138–41 public policies for, 120–21 standards for, 122–23, 140–41, 157–59 as wicked problem, 11, 99 Internet Engineering Task Force (IETF), 23, 167 Internet of Things (IoT), 5 as computerization of everything, 7 Cybersecurity Improvement Act, 180 in developmental stage, 8 patching of, 37–38 smartphone as controller hub for, 48 Internet Policy Research Initiative, MIT, 224 Investigatory Powers Act (UK), 195 iPhones, 3–4 encryption on, 174, 197 new versions of, 42–43 IPsec, 167 Iran: cyberattack by, 71, 116, 178 hackers in, 45 Stuxnet attack on, 79 Iraq, 212 ISIS, 69, 93 ISPs: connections via, 113–14 Tier 1 type, 115 ISS World (“Wiretappers’ Ball”), 65 jobs, in cybersecurity, 141–42 John Deere, 59–60, 62, 63 Joyce, Rob, 45, 53, 54, 164, 166 Kaplan, Fred, 73 Kaspersky Lab, 29, 74, 87 Kello, Lucas, 71 Kelly, John, 66 Keurig coffee makers, 62 key escrow, 194 KICTANet, Kenya, 214 labeling requirements, 134–35 LabMD, unfair practices of, 130–31 Landau, Susan, 175, 176, 223 Las Vegas shooting (2017), 202 Ledgett, Rick, 163–64, 166 lemons market, 134 Lenovo, 187 letters of marque, 204 Level 3 ISP, 115 liability law, 125, 128–33 Liars and Outliers (Schneier), 101, 209 Library of Congress, 42 license plate scanners, 201 linear systems, 210 Lloyd’s of London, 90 Lynn, William, 198 machine learning, 7, 82–87 adversarial, 84 algorithms beyond human comprehension, 111–12 autonomous, 82–83, 85 Maersk, 71, 94 malware, 26, 30, 196 man-in-the-middle attacks, 49, 169 market economics, and competition, 6 mass shootings, 202 May, Theresa, 197 McConnell, Mike, 198 McVeigh, Timothy, 202 medical devices: bugs in, 41 and government regulations, 151 hacking, 16 and privacy, 151 Meltdown vulnerability, 21 Merkel, Angela, 66 metadata, 174 Microsoft, 57, 190 Microsoft Office, new versions of, 42, 43 military systems, autonomous, 86 Minecraft video game, 94 miniaturization, 7 Mirai botnet, 29, 37, 77, 94, 130 money laundering, 183 monocultures, vulnerabilities in, 31 Moonlight Maze, 66 “movie-plot threats,” 96 Mozilla, 163 Munich Security Conference, 70 My Friend Cayla (doll), 106 Nader, Ralph, Unsafe at Any Speed, 182 National Cyber Office (NCO), 146–50 National Cyber Security Centre (UK), 173 National Cybersecurity Safety Board (proposed), 177 National Institute of Standards and Technology (NIST), Cybersecurity Framework of, 123, 147 National Intelligence Council, 211–12 National Science Foundation (NSF), 147 National Security Council, 163 National Security Strategy, 117 National Transportation Safety Board, 177 Netflix, 148 net neutrality, 61, 119 network effect, 60 networks: “air gapped,” 118 collective action required of, 23–24 end-to-end model of, 23 firewalls for, 102 iCloud, 111 secure connections in, 113–14, 125 and spam, 100 telephone, 119 New America, 223 New York Cyber Task Force, 213 NOBUS (nobody but us), 164–65, 169, 170 norms, 157–59 North Korea: cyberattack by, 71 cybercrimes by, 76, 157 hacking by, 54, 71, 78 threats by, 70, 72 Norwegian Consumer Council, 105–6 NotPetya malware, 71, 77, 89, 94 NSA: attribution in, 53–55 BULLRUN program, 167–68 credential stealing by, 45 cyberattack tools of, 165–67 on cybersecurity, 86 cyberweapons stolen from, 73 disclosing and fixing vulnerabilities, 162–67 encryption circumvented by, 171, 193 intelligence-gathering hacks by, 116, 118 missions of, 160–61, 172 mistrust of, 208 reorganization (2016) in, 173 and security standards, 167–70 splitting into three organizations, 172–73 supply-chain attacks by, 87 surveillance by, 65, 66–67, 190, 202 NSO Group, 65 Nye, Joseph, 157 Obama, Barack, 66, 69, 92, 117, 163, 180, 208 Ochoa, Higinio O.


pages: 439 words: 124,548

The Clockwork Rocket by Greg Egan

air gap, place-making, plutocrats, post-work

We’ve done tests to rule that out if all goes well—but we can’t test the most extreme case; there’s no scale model that will tell us what happens when a whole mountain of sunstone sits and burns from below, for days.” Eusebio rubbed his eyes. “All right, if I grant you all of that… what do you propose?” “An air gap, all around the mountain.” “An air gap?” “A trench,” Yalda explained. “As deep as the lowest engines, and maybe a stroll wide. Then we dig channels under the engines so that all the exhaust gas can escape freely. That would make a big difference to the heat build-up in the rock, if the engines end up running in place.”


The Kamado Smoker and Grill Cookbook by Chris Grove

air gap

We removed the vent, sealed the back, top, and bottom of it with a high-temp caulk and then put the vent back on. We also found that in certain positions, the draft door also had a gap. We put shims between the door and door track, which pushed the door into place. Alignment — If the dome lid and base aren’t lined up correctly, you may have air gaps around the gasket that has nothing to do with the gasket being faulty. Do the “dollar bill test” by placing a dollar on the gasket, shutting the dome lid, and then pulling on the dollar bill. You should experience slight resistance. Repeat this around the rim looking for gaps. Consult your manufacturer for specific realignment instructions as these vary from kamado to kamado.


398 DIY Tips, Tricks & Techniques: Practical Advice for New Home Improvement Enthusiasts by Ian Anderson

air gap, clean water, en.wikipedia.org, The Spirit Level

Repairing Old Walls: One Rule Generally, walls built between the fifteenth century and the Second World War walls (in the UK at least) used a lime-based mortar (softer mortar, easily scraped out with a screwdriver or even a fingernail) and are usually solid (i.e. one brick thick/ two half bricks thick, (or more on larger structures), with no air gap or cavity). We touched on this before under maintenance, but it bears repeating; never, ever use a cement-based mortar to repair a wall built using lime-mortar, because it forces moisture inside the wall to evaporate from the brick itself, which then freezes etc. often causing spalling of the brick face, especially the edges...


pages: 188 words: 54,942

Drone Warfare: Killing by Remote Control by Medea Benjamin

air gap, airport security, autonomous vehicles, Chelsea Manning, clean water, Clive Stafford Smith, crowdsourcing, drone strike, friendly fire, illegal immigration, Jeff Hawkins, Khyber Pass, megacity, military-industrial complex, no-fly zone, nuremberg principles, performance metric, private military company, Ralph Nader, WikiLeaks

In the summer of 2009, US forces discovered “days and days and hours and hours” of drone footage on the laptops of Iraqi militants. A $26 piece of software allowed them to capture the video.28 None of the remote cockpits are supposed to be connected to the public Internet, which means they should be largely immune to viruses and other network security threats. But time and time again, the so-called “air gaps” between classified and public networks have been bridged, largely through the use of discs and removable drives. In late 2008, for example, the drives helped introduce the agent.btz worm to hundreds of thousands of Defense Department computers. Three years later, the Pentagon was still disinfecting machines.


pages: 229 words: 67,599

The Logician and the Engineer: How George Boole and Claude Shannon Created the Information Age by Paul J. Nahin

air gap, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Albert Einstein, Any sufficiently advanced technology is indistinguishable from magic, Charles Babbage, Claude Shannon: information theory, Computing Machinery and Intelligence, conceptual framework, Edward Thorp, Fellow of the Royal Society, finite state, four colour theorem, Georg Cantor, Grace Hopper, Isaac Newton, John von Neumann, knapsack problem, New Journalism, Pierre-Simon Laplace, reversible computing, Richard Feynman, Schrödinger's Cat, Steve Jobs, Steve Wozniak, thinkpad, Thomas Bayes, Turing machine, Turing test, V2 rocket

Actually, there is a very small current because each of the p and n stuffs contain very low densities of what are called minority charge carriers (holes in p-stuff and electrons in n-stuff are majority charge carriers). That is, there are some electrons in the p-stuff and some holes in the n-stuff and they do move across the junction in a reverse-biased diode. 7. A spark is formed across an air gap when the electric field strength (see the previous note) exceeds something like 75,000 volts/inch. You might wonder how such a strong field can be created between the contacts in a relay circuit in which the power supply voltage is a mere 5 volts; a more advanced discussion than I’ve given here, of the mathematical physics behind what happens in an inductive circuit that is suddenly switched, is in my book The Science of Radio (see note 5), pp. 356–361. 8.


pages: 728 words: 182,850

Cooking for Geeks by Jeff Potter

3D printing, A Pattern Language, air gap, carbon footprint, centre right, Community Supported Agriculture, Computer Numeric Control, crowdsourcing, Donald Knuth, double helix, en.wikipedia.org, European colonialism, fear of failure, food miles, functional fixedness, hacker house, haute cuisine, helicopter parent, Internet Archive, iterative process, Kickstarter, lolcat, Parkinson's law, placebo effect, random walk, Rubik’s Cube, slashdot, stochastic process, TED Talk, the scientific method

The cookie sheet will hold the dry ice/ethanol slurry, and the cutting board will provide insulation between the extremely cold cookie sheet and your countertop. Alternatively, if you have the lid to a Styrofoam container, using the inside, indented part can serve both purposes. Pour a small amount of ethanol onto the bed of crushed dry ice—enough to create a level top. (You can use rubbing alcohol or cheap vodka.) The ethanol will remove any air gap between the pieces of dry ice and the stainless steel griddle, and it won’t cause the dry ice to froth in billowy clouds like water would. Plop the square of stainless steel on top of the ethanol-topped dry ice. It should be a complete contact fit, just like a heat sink on top of a CPU. Spray or coat the top surface of the stainless steel with a nonstick cooking spray, butter, or oil.

I broke the glass in my oven door and had to "upgrade" it, although it is cool to have bragging rights to an oven sporting a piece of PyroCeram, the same stuff the military used for missile nose cones in the 1950s. There’s also the issue of how hot the surrounding countertop and cabinetry can get. Commercial stoves are designed for these sorts of temperatures and as a result require a large air gap between the appliance and any combustible materials. Given that an upside-down cast iron pan under a broiler or a wood-fired grill turn out delicious flat-crust pizzas, I’m afraid I have to recommend that you skip the oven overclocking, even if it is fun. Nathan Myhrvold on Modernist Cuisine PHOTO USED BY PERMISSION OF NATHAN MYHRVOLD Nathan Myhrvold, formerly CTO of Microsoft, is among many things an avid cook.


pages: 265 words: 74,807

Our Robots, Ourselves: Robotics and the Myths of Autonomy by David A. Mindell

Air France Flight 447, air gap, Apollo 11, Apollo 13, Apollo Guidance Computer, autonomous vehicles, Beryl Markham, Boeing 747, Captain Sullenberger Hudson, Charles Lindbergh, Chris Urmson, digital map, disruptive innovation, driverless car, drone strike, Easter island, en.wikipedia.org, Erik Brynjolfsson, fudge factor, Gene Kranz, human-factors engineering, index card, John Markoff, low earth orbit, Mars Rover, Neil Armstrong, ride hailing / ride sharing, Ronald Reagan, self-driving car, Silicon Valley, telepresence, telerobotics, trade route, US Airways Flight 1549, William Langewiesche, zero-sum game

So operators set up a separate “mission operations cell”—really just a tent sitting outside the Predator trailer—that took the video feed, digitized it, and inserted it into secure networks for passage to intelligence analysts (with significant loss of video quality). In the Balkans deployments, other than this one video feed, the entire system was separated from global networks by an “air gap.” Target coordinates passed into the control van via floppy disk, or by the “sneaker net” of people walking in and reading numbers. On the receiving end, those watching the video saw a disconnected feed, with little ability for feedback and direction to the vehicle itself and its sensors. Similarly, pilots and sensor operators had little awareness of what they were doing within a larger picture.


Norman Foster: A Life in Architecture by Deyan Sudjic

air gap, Alan Greenspan, Boeing 747, Buckminster Fuller, carbon footprint, credit crunch, cuban missile crisis, Frank Gehry, gentrification, Great Leap Forward, interchangeable parts, James Dyson, Jane Jacobs, low cost airline, Masdar, megacity, megastructure, Murano, Venice glass, Norman Mailer, Pearl River Delta, Peter Eisenman, sustainable-tourism, The Death and Life of Great American Cities, three-masted sailing ship, University of East Anglia, urban decay, urban renewal, white flight, young professional

It is a mannerism calculated to show that this is a building that does not share the sensibility of its more conventional stone-clad neighbour, on the side away from the Rogers building, which plays by the old rules. To underscore the point, Foster has put a vertical black line to cut himself off from that building. He does not touch Rogers, his other neighbour, at all. On the other side of the air gap from Foster, Rogers has stuck to what his office does best – romantic modernity. By pulling the structure, stairs and lifts out of the basic envelope, he creates a jagged, picturesque skyline. The piece closest to Foster is wall-to-wall glass, in an elegant concrete frame that is braced by gunmetal grey and stainless steel rods.


pages: 388 words: 102,994

The Ringworld engineers by Larry Niven

air gap, gravity well

Louis followed her. His eyes adjusted, and he saw that there were narrow paths among the growths. The fungi ranged from button-size to asymmetrical shapes as tall as Louis’s head, with stalks as thick as his waist. Some were mushroom-shaped, some had no shape at all. A hint of corruption was in the air. Gaps in the sprawl of buildings overhead let through vertical pillars of sunlight, so bright that they looked solid. Frilly yellow fungus fringed in scarlet half smothered an outcropping of gray slate. Medieval lances stood upright, white tipped with blood. Orange and yellow and black fur covered a dead log.


pages: 340 words: 97,723

The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity by Amy Webb

"Friedman doctrine" OR "shareholder theory", Ada Lovelace, AI winter, air gap, Airbnb, airport security, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, algorithmic bias, AlphaGo, Andy Rubin, artificial general intelligence, Asilomar, autonomous vehicles, backpropagation, Bayesian statistics, behavioural economics, Bernie Sanders, Big Tech, bioinformatics, Black Lives Matter, blockchain, Bretton Woods, business intelligence, Cambridge Analytica, Cass Sunstein, Charles Babbage, Claude Shannon: information theory, cloud computing, cognitive bias, complexity theory, computer vision, Computing Machinery and Intelligence, CRISPR, cross-border payments, crowdsourcing, cryptocurrency, Daniel Kahneman / Amos Tversky, data science, deep learning, DeepMind, Demis Hassabis, Deng Xiaoping, disinformation, distributed ledger, don't be evil, Donald Trump, Elon Musk, fail fast, fake news, Filter Bubble, Flynn Effect, Geoffrey Hinton, gig economy, Google Glasses, Grace Hopper, Gödel, Escher, Bach, Herman Kahn, high-speed rail, Inbox Zero, Internet of things, Jacques de Vaucanson, Jeff Bezos, Joan Didion, job automation, John von Neumann, knowledge worker, Lyft, machine translation, Mark Zuckerberg, Menlo Park, move fast and break things, Mustafa Suleyman, natural language processing, New Urbanism, Nick Bostrom, one-China policy, optical character recognition, packet switching, paperclip maximiser, pattern recognition, personalized medicine, RAND corporation, Ray Kurzweil, Recombinant DNA, ride hailing / ride sharing, Rodney Brooks, Rubik’s Cube, Salesforce, Sand Hill Road, Second Machine Age, self-driving car, seminal paper, SETI@home, side project, Silicon Valley, Silicon Valley startup, skunkworks, Skype, smart cities, South China Sea, sovereign wealth fund, speech recognition, Stephen Hawking, strong AI, superintelligent machines, surveillance capitalism, technological singularity, The Coming Technological Singularity, the long tail, theory of mind, Tim Cook: Apple, trade route, Turing machine, Turing test, uber lyft, Von Neumann architecture, Watson beat the top human players on Jeopardy!, zero day

The announcement wasn’t part of a strategic realignment on core values within the company; it was a reactive measure, owing to internal blowback concerning the Project Maven debacle—and to a private incident that happened earlier in the year. A group of senior software engineers discovered that a project they’d been working on—an air gap security feature for its cloud services—was intended to help Google win military contracts. Amazon and Microsoft both earned “High” certificates for a physically separate government cloud, and that authorized them to hold classified data. Google wanted to compete for lucrative Department of Defense contracts, and when the engineers found out, they rebelled.


The Domestic Revolution by Ruth Goodman

air gap, British Empire, clean water, Ford Model T, gentleman farmer, haute cuisine, James Watt: steam engine, period drama, trade route, upwardly mobile

It would have required a combination of adjusting the size and shape of the coal lumps and forming the wood of the initial fire into an open and supportive framework – akin to building a grate out of firewood. As the wood burnt away, discrete lumps of smouldering anthracite would maintain their shape, including the integrity of the air gaps between the lumps, allowing oxygen in to feed the fire. Most other coal would smother itself. George Owen sang his praise for the coal of west Wales, saying it ‘clyngeth not together’. For everyone else, dependent on the many varying grades and types of coal in the rest of the British Isles, burning coal without a grate was a frustrating business.


pages: 329 words: 101,233

We Are Electric: Inside the 200-Year Hunt for Our Body's Bioelectric Code, and What the Future Holds by Sally Adee

air gap, airport security, anesthesia awareness, animal electricity, biofilm, colonial rule, computer age, COVID-19, CRISPR, discovery of DNA, double helix, Elon Musk, epigenetics, experimental subject, Fellow of the Royal Society, hype cycle, impulse control, informal economy, Internet Archive, invention of the telegraph, Isaac Newton, Kickstarter, lockdown, mass immigration, meta-analysis, microbiome, microdosing, multilevel marketing, New Journalism, Norbert Wiener, Peter Thiel, placebo effect, randomized controlled trial, seminal paper, Silicon Valley, Silicon Valley startup, stealth mode startup, stem cell, synthetic biology, TED Talk, the long tail, the scientific method, Tragedy of the Commons, traumatic brain injury

This gap is called a synapse, christened the same year the Neuron Doctrine won its progenitors the Nobel. The discovery of a gap between cells that were meant to be transmitting an electrical signal revived a lot of doubts about the still-fragile idea that animal electricity is real and that the nerve impulse is electric. After all, an electric signal can’t travel over an air gap in telegraph wires, so why should it be able to do so in the wires of the nervous system? In 1921, the discovery of chemicals called neurotransmitters, which float across the synapse’s gap, only deepened those doubts. That briefly led to a fight over the nature of the nervous signal between opposing groups of scientists who called themselves the Soups (team chemistry) and those calling themselves the Sparks (team electricity).2 It was like science’s own West Side Story.


pages: 363 words: 109,077

The Raging 2020s: Companies, Countries, People - and the Fight for Our Future by Alec Ross

"Friedman doctrine" OR "shareholder theory", "World Economic Forum" Davos, Affordable Care Act / Obamacare, air gap, air traffic controllers' union, Airbnb, Albert Einstein, An Inconvenient Truth, autonomous vehicles, barriers to entry, benefit corporation, Bernie Sanders, Big Tech, big-box store, British Empire, call centre, capital controls, clean water, collective bargaining, computer vision, coronavirus, corporate governance, corporate raider, COVID-19, deep learning, Deng Xiaoping, Didi Chuxing, disinformation, Dissolution of the Soviet Union, Donald Trump, Double Irish / Dutch Sandwich, drone strike, dumpster diving, employer provided health coverage, Francis Fukuyama: the end of history, future of work, general purpose technology, gig economy, Gini coefficient, global supply chain, Goldman Sachs: Vampire Squid, Gordon Gekko, greed is good, high-speed rail, hiring and firing, income inequality, independent contractor, information security, intangible asset, invisible hand, Jeff Bezos, knowledge worker, late capitalism, low skilled workers, Lyft, Marc Andreessen, Marc Benioff, mass immigration, megacity, military-industrial complex, minimum wage unemployment, mittelstand, mortgage tax deduction, natural language processing, Oculus Rift, off-the-grid, offshore financial centre, open economy, OpenAI, Parag Khanna, Paris climate accords, profit motive, race to the bottom, RAND corporation, ride hailing / ride sharing, Robert Bork, rolodex, Ronald Reagan, Salesforce, self-driving car, shareholder value, side hustle, side project, Silicon Valley, smart cities, Social Responsibility of Business Is to Increase Its Profits, sovereign wealth fund, sparse data, special economic zone, Steven Levy, stock buybacks, strikebreaker, TaskRabbit, tech bro, tech worker, transcontinental railway, transfer pricing, Travis Kalanick, trickle-down economics, Uber and Lyft, uber lyft, union organizing, Upton Sinclair, vertical integration, working poor

They don’t say ‘what’s good for the United States is good for us.’ They say ‘we’re building a global community.’” But what exactly does this mean? There are obvious ways in which this shift can cause problems, as we saw in the case of international tax avoidance. But there are also ways in which an air gap between companies and the state—so long as it is not abused—can be beneficial and even make for a more stable social contract. When companies are not operating in lockstep with government, they can serve as a check on the abuse of power or a push toward addressing global problems where government might be lagging.


pages: 363 words: 109,834

The Crux by Richard Rumelt

activist fund / activist shareholder / activist investor, air gap, Airbnb, AltaVista, AOL-Time Warner, Bayesian statistics, behavioural economics, biodiversity loss, Blue Ocean Strategy, Boeing 737 MAX, Boeing 747, Charles Lindbergh, Clayton Christensen, cloud computing, cognitive bias, commoditize, coronavirus, corporate raider, COVID-19, creative destruction, crossover SUV, Crossrail, deep learning, Deng Xiaoping, diversified portfolio, double entry bookkeeping, drop ship, Elon Musk, en.wikipedia.org, financial engineering, Ford Model T, Herman Kahn, income inequality, index card, Internet of things, Jeff Bezos, Just-in-time delivery, Larry Ellison, linear programming, lockdown, low cost airline, low earth orbit, Lyft, Marc Benioff, Mark Zuckerberg, Masayoshi Son, meta-analysis, Myron Scholes, natural language processing, Neil Armstrong, Network effects, packet switching, PageRank, performance metric, precision agriculture, RAND corporation, ride hailing / ride sharing, Salesforce, San Francisco homelessness, search costs, selection bias, self-driving car, shareholder value, sharing economy, Silicon Valley, Skype, Snapchat, social distancing, SoftBank, software as a service, statistical model, Steve Ballmer, Steve Jobs, stochastic process, Teledyne, telemarketer, TSMC, uber lyft, undersea cable, union organizing, vertical integration, WeWork

He was excited by the idea and thought that DelKha could meet or even beat the performance of the Parrot fans. In a traditional motor, the electricity sent to the central rotating element had copper contacts through which the current passed via carbon “brushes.” On a brushless motor, there were no brush contacts, just an air gap. The sequence and timing of the magnetic fields was managed by a microprocessor timing the feed of DC electric power to coils. DelKha put together a task force to work with FlyKo. The DelKha engineers were able to deliver the fan, and FlyKo built a prototype drone. Unfortunately, its inventory of regular R/C airplanes was not selling, and FlyKo had to invoke Chapter 11 bankruptcy.


Visual Thinking: The Hidden Gifts of People Who Think in Pictures, Patterns, and Abstractions by Temple Grandin, Ph.D.

2013 Report for America's Infrastructure - American Society of Civil Engineers - 19 March 2013, 3D printing, a long time ago in a galaxy far, far away, air gap, Albert Einstein, American Society of Civil Engineers: Report Card, Apollo 11, Apple II, ASML, Asperger Syndrome, autism spectrum disorder, autonomous vehicles, Black Lives Matter, Boeing 737 MAX, Captain Sullenberger Hudson, clean water, cloud computing, computer vision, Computing Machinery and Intelligence, coronavirus, cotton gin, COVID-19, defense in depth, Drosophila, Elon Musk, en.wikipedia.org, GPT-3, Gregor Mendel, Greta Thunberg, hallucination problem, helicopter parent, income inequality, industrial robot, invention of movable type, Isaac Newton, James Webb Space Telescope, John Nash: game theory, John von Neumann, Jony Ive, language acquisition, longitudinal study, Mark Zuckerberg, Mars Rover, meta-analysis, Neil Armstrong, neurotypical, pattern recognition, Peter Thiel, phenotype, ransomware, replication crisis, Report Card for America’s Infrastructure, Robert X Cringely, Saturday Night Live, self-driving car, seminal paper, Silicon Valley, Skinner box, space junk, stem cell, Stephen Hawking, Steve Jobs, Steve Wozniak, Tacoma Narrows Bridge, TaskRabbit, theory of mind, TikTok, twin studies, unpaid internship, upwardly mobile, US Airways Flight 1549, warehouse automation, warehouse robotics, web application, William Langewiesche, Y Combinator

The second type of equipment that requires protection includes fully computerized systems that replace human operators. Some examples are robotic arms that stack boxes in factories, and electric trains that move passengers between airline terminals. These systems must be totally isolated from the internet, both connections with cables and wireless connections such as Wi-Fi. Engineers call this an “air gap.” Great care must be taken to never connect a computer with built-in Wi-Fi to industrial and mechanical systems. These systems are always looking for a connection. You may recall that the wireless component in Dick Cheney’s defibrillator was disabled for fear that it would be hacked by terrorists.


pages: 411 words: 119,022

Build: An Unorthodox Guide to Making Things Worth Making by Tony Fadell

air gap, Amazon Web Services, Andy Rubin, augmented reality, Ben Horowitz, Big Tech, bike sharing, Bill Atkinson, carbon footprint, Cass Sunstein, cloud computing, do what you love, Elon Musk, fail fast, follow your passion, General Magic , Google Glasses, Google X / Alphabet X, Googley, hiring and firing, HyperCard, imposter syndrome, Jeff Bezos, John Markoff, Jony Ive, Kanban, Kickstarter, Mary Meeker, microplastics / micro fibres, new economy, pets.com, QR code, QWERTY keyboard, rolodex, side project, Silicon Valley, Silicon Valley startup, stem cell, Steve Jobs, Steven Levy, synthetic biology, TED Talk, TikTok, Tim Cook: Apple, Tony Fadell, Y Combinator

Just don’t forget the other factor that can sneak up and kick your ass: time. It will take longer than you think to get funding. Expect it to be a 3–5 month process. It may end up being faster than that—especially in a founder-friendly environment—but I wouldn’t gamble on it. Too many companies wait until they’re about to run out of money, then hit an air gap and are near bankruptcy before desperately grabbing whatever funding they can get. Always start the pitching process when you don’t actually need money. You want to be in a position of strength, not buckling under the pressure and making bad choices. You should also remember to watch out for the holidays—August, Chinese New Year, Thanksgiving through New Year.


pages: 521 words: 118,183

The Wires of War: Technology and the Global Struggle for Power by Jacob Helberg

"World Economic Forum" Davos, 2021 United States Capitol attack, A Declaration of the Independence of Cyberspace, active measures, Affordable Care Act / Obamacare, air gap, Airbnb, algorithmic management, augmented reality, autonomous vehicles, Berlin Wall, Bernie Sanders, Big Tech, bike sharing, Black Lives Matter, blockchain, Boris Johnson, Brexit referendum, cable laying ship, call centre, Cambridge Analytica, Cass Sunstein, cloud computing, coronavirus, COVID-19, creative destruction, crisis actor, data is the new oil, data science, decentralized internet, deep learning, deepfake, deglobalization, deindustrialization, Deng Xiaoping, deplatforming, digital nomad, disinformation, don't be evil, Donald Trump, dual-use technology, Edward Snowden, Elon Musk, en.wikipedia.org, end-to-end encryption, fail fast, fake news, Filter Bubble, Francis Fukuyama: the end of history, geopolitical risk, glass ceiling, global pandemic, global supply chain, Google bus, Google Chrome, GPT-3, green new deal, information security, Internet of things, Jeff Bezos, Jeffrey Epstein, John Markoff, John Perry Barlow, knowledge economy, Larry Ellison, lockdown, Loma Prieta earthquake, low earth orbit, low skilled workers, Lyft, manufacturing employment, Marc Andreessen, Mark Zuckerberg, Mary Meeker, Mikhail Gorbachev, military-industrial complex, Mohammed Bouazizi, move fast and break things, Nate Silver, natural language processing, Network effects, new economy, one-China policy, open economy, OpenAI, Parler "social media", Peter Thiel, QAnon, QR code, race to the bottom, Ralph Nader, RAND corporation, reshoring, ride hailing / ride sharing, Ronald Reagan, Russian election interference, Salesforce, Sam Altman, satellite internet, self-driving car, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, Skype, smart grid, SoftBank, Solyndra, South China Sea, SpaceX Starlink, Steve Jobs, Steven Levy, Stuxnet, supply-chain attack, Susan Wojcicki, tech worker, techlash, technoutopianism, TikTok, Tim Cook: Apple, trade route, TSMC, Twitter Arab Spring, uber lyft, undersea cable, Unsafe at Any Speed, Valery Gerasimov, vertical integration, Wargames Reagan, Westphalian system, white picket fence, WikiLeaks, Y Combinator, zero-sum game

Defense Department, calls this “one of the first times you’ve seen conventional ground operations married with cyber activity.”68 Russia was becoming equally aggressive—though its actions were less overt—in the United States. Weeks before the 2008 election, National Security Agency staff stumbled across Russian hackers lurking in the Pentagon’s classified system, SIPRNET. Because of the sensitivity of these networks, the computers were designed to be “air gapped,” meaning they had no connection to the broader Internet. It turned out the Russians had surreptitiously scattered thumb drives infected with malware near a NATO base in Afghanistan, just waiting for an American to pick one up.69 The ploy worked. Forty years before, the Department of Defense had birthed the Internet; now, hostile powers had turned that creation back on the Pentagon itself.


pages: 392 words: 124,069

Finding the Mother Tree: Discovering the Wisdom of the Forest by Suzanne Simard

air gap, Anthropocene, biofilm, British Empire, clean water, company town, Easter island, government statistician, Mason jar, New Journalism, Skype, trade route, zero-sum game

The forest floor scraped away, the planting hole plunged into the damp mineral earth below. Just as instructed. By the book. I inserted the roots back into the hole and checked another seedling. And another. Every one of them packed exactly right in a slit made by a shovel and backfilled to eliminate the air gaps, but the root plugs looked embalmed, as if they’d been shoved into a tomb. Not a single root seemed to get what it was supposed to do. None was sprouting new white tips to forage in the ground. The roots were coarse, black, and plunging straight to nowhere. The seedlings shed yellow needles because they were starving for something.


pages: 514 words: 153,274

The Cobweb by Neal Stephenson, J. Frederick George

air gap, Ayatollah Khomeini, computer age, cuban missile crisis, friendly fire, illegal immigration, independent contractor, industrial robot, Neal Stephenson, rolodex, Ronald Reagan, Snow Crash, uranium enrichment, éminence grise

He took her hand and pressed it against the top of the car, held it there with one hand while he reached around behind her with the other, got her other hand, and put it next to the first. Now he was behind her, wrapped around her like a cape, though he was so big and she so tiny that there was an air gap of several inches between them. Into her ear he said quietly, “I can take care of this if you calm down and do not move. If you take your hands off the car again, I have no idea what is going to happen.” “Well enough,” she said. Clyde released her hands and backed off a few inches. When she did not move, he relaxed and turned his attention to the dog.


Spies, Lies, and Algorithms by Amy B. Zegart

2021 United States Capitol attack, 4chan, active measures, air gap, airport security, Apollo 13, Bellingcat, Bernie Sanders, Bletchley Park, Chelsea Manning, classic study, cloud computing, cognitive bias, commoditize, coronavirus, correlation does not imply causation, COVID-19, crowdsourcing, cryptocurrency, cuban missile crisis, Daniel Kahneman / Amos Tversky, deep learning, deepfake, DeepMind, disinformation, Donald Trump, drone strike, dual-use technology, Edward Snowden, Elon Musk, en.wikipedia.org, end-to-end encryption, failed state, feminist movement, framing effect, fundamental attribution error, Gene Kranz, global pandemic, global supply chain, Google Earth, index card, information asymmetry, information security, Internet of things, job automation, John Markoff, lockdown, Lyft, Mark Zuckerberg, Nate Silver, Network effects, off-the-grid, openstreetmap, operational security, Parler "social media", post-truth, power law, principal–agent problem, QAnon, RAND corporation, Richard Feynman, risk tolerance, Robert Hanssen: Double agent, Ronald Reagan, Rubik’s Cube, Russian election interference, Saturday Night Live, selection bias, seminal paper, Seymour Hersh, Silicon Valley, Steve Jobs, Stuxnet, synthetic biology, uber lyft, unit 8200, uranium enrichment, WikiLeaks, zero day, zero-sum game

98 The result was Stuxnet, the most sophisticated cyber weapon in the world, with code fifty times larger than typical malware.99 The CIA, the NSA, and Israel’s elite cyber Unit 8200 reportedly joined forces.100 Forensics revealed that Stuxnet used four rare and valuable “zero day” vulnerabilities (coding flaws unknown to security researchers or software vendors) to find the precise software operating Iran’s centrifuges, spread inside, hide, and destroy without a trace.101 Still, the operation needed humans. The Natanz computers were “air gapped”—they weren’t connected to the Internet. The U.S.-Israeli team somehow got Iranians inside Natanz to infect the machines with USB drives. Apparently, only some knew they were accomplices.102 Stuxnet would lie in wait and then suddenly spring into action, speeding up or slowing down the spinning centrifuges for a few minutes before hiding again and repeating the operation until the centrifuges tore themselves apart.


pages: 523 words: 154,042

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks by Scott J. Shapiro

3D printing, 4chan, active measures, address space layout randomization, air gap, Airbnb, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, availability heuristic, Bernie Sanders, bitcoin, blockchain, borderless world, Brian Krebs, business logic, call centre, carbon tax, Cass Sunstein, cellular automata, cloud computing, cognitive dissonance, commoditize, Compatible Time-Sharing System, Computing Machinery and Intelligence, coronavirus, COVID-19, CRISPR, cryptocurrency, cyber-physical system, Daniel Kahneman / Amos Tversky, Debian, Dennis Ritchie, disinformation, Donald Trump, double helix, Dr. Strangelove, dumpster diving, Edward Snowden, en.wikipedia.org, Evgeny Morozov, evil maid attack, facts on the ground, false flag, feminist movement, Gabriella Coleman, gig economy, Hacker News, independent contractor, information security, Internet Archive, Internet of things, invisible hand, John Markoff, John von Neumann, Julian Assange, Ken Thompson, Larry Ellison, Laura Poitras, Linda problem, loss aversion, macro virus, Marc Andreessen, Mark Zuckerberg, Menlo Park, meta-analysis, Minecraft, Morris worm, Multics, PalmPilot, Paul Graham, pirate software, pre–internet, QWERTY keyboard, Ralph Nader, RAND corporation, ransomware, Reflections on Trusting Trust, Richard Stallman, Richard Thaler, Ronald Reagan, Satoshi Nakamoto, security theater, Shoshana Zuboff, side hustle, Silicon Valley, Skype, SoftBank, SQL injection, Steve Ballmer, Steve Jobs, Steven Levy, Stuxnet, supply-chain attack, surveillance capitalism, systems thinking, TaskRabbit, tech billionaire, tech worker, technological solutionism, the Cathedral and the Bazaar, the new new thing, the payments system, Turing machine, Turing test, Unsafe at Any Speed, vertical integration, Von Neumann architecture, Wargames Reagan, WarGames: Global Thermonuclear War, Wayback Machine, web application, WikiLeaks, winner-take-all economy, young professional, zero day, éminence grise

To do so, his team built the system in a secured laboratory that only the development group could enter. The machine they coded on—the development machine—was housed in a separate locked room within the lab. That locked room was protected by a cage. Physical access to both the lab and the cage was controlled by a key-card system. Finally, the development machine was “air gapped,” meaning that it was not connected to any network, let alone the internet. These precautions were designed to prevent anyone from inserting a secret backdoor. It took a decade to build the system. By late 1989, the VMM Security Kernel was put in the field to undergo testing at government and aerospace installations.


pages: 568 words: 164,014

Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat by John P. Carlin, Garrett M. Graff

1960s counterculture, A Declaration of the Independence of Cyberspace, Aaron Swartz, air gap, Andy Carvin, Apple II, Bay Area Rapid Transit, bitcoin, Brian Krebs, business climate, cloud computing, cotton gin, cryptocurrency, data acquisition, Deng Xiaoping, disinformation, driverless car, drone strike, dual-use technology, eat what you kill, Edward Snowden, fake news, false flag, Francis Fukuyama: the end of history, Hacker Ethic, information security, Internet of things, James Dyson, Jeff Bezos, John Gilmore, John Markoff, John Perry Barlow, Ken Thompson, Kevin Roose, Laura Poitras, Mark Zuckerberg, Menlo Park, millennium bug, Minecraft, Mitch Kapor, moral hazard, Morris worm, multilevel marketing, Network effects, new economy, Oklahoma City bombing, out of africa, packet switching, peer-to-peer, peer-to-peer model, performance metric, RAND corporation, ransomware, Reflections on Trusting Trust, Richard Stallman, Robert Metcalfe, Ronald Reagan, Saturday Night Live, self-driving car, shareholder value, side project, Silicon Valley, Silicon Valley startup, Skype, Snapchat, South China Sea, Steve Crocker, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Stuxnet, The Hackers Conference, Tim Cook: Apple, trickle-down economics, Wargames Reagan, Whole Earth Catalog, Whole Earth Review, WikiLeaks, Y2K, zero day, zero-sum game

One of McConnell’s other efforts was to push for the creation of a new military organization to oversee hacking efforts. The effort received an extra boost when, in the fall of 2008, the Pentagon realized that one of its classified networks had been hacked—the first time an adversary was ever known to have penetrated a classified network, which by their very design were supposed to be “air gapped,” entirely disconnected from the normal internet.* According to journalist Fred Kaplan, “a detailed analysis, over the next few months, confirmed” that a malware-infected thumb drive had been inserted into the classified network. According to Kaplan’s reporting, Russia had seeded infected thumb drives at kiosks in Kabul, including those near NATO’s military headquarters, in the hopes that a cheap American would buy one and then use it at work.34 The effort to defeat the malware on the network, known by the code name BUCKSHOT YANKEE, helped make clear the challenges the military had in securing cyberspace.


pages: 733 words: 184,118

Tesla: Inventor of the Electrical Age by W. Bernard Carlson

1960s counterculture, air gap, Albert Einstein, Charles Babbage, Clayton Christensen, creative destruction, disruptive innovation, en.wikipedia.org, Ford Model T, Henri Poincaré, invention of radio, Isaac Newton, James Watt: steam engine, Joseph Schumpeter, Menlo Park, packet switching, Plato's cave, popular electronics, Robert Gordon, Ronald Reagan, Steve Jobs, Steve Wozniak, Strategic Defense Initiative, undersea cable, yellow journalism

Tesla soon discovered that as the frequency increased, so did the amount of heat generated that melted the paraffin or gutta-percha insulation between the primary and secondary inside the induction coil. To address this problem, Tesla made two changes. First, he got rid of the insulation and instead wound his induction coils with an air gap between the primary and the secondary. Second, because the iron core in the induction coil became so hot, he redesigned his version so that the iron core could be moved in and out of the primary coil. By moving the core, Tesla found that he could also adjust the inductance of the primary.19 FIGURE 6.2.


pages: 927 words: 236,812

The Taste of War: World War Two and the Battle for Food by Lizzie Collingham

agricultural Revolution, air gap, American ideology, Bletchley Park, British Empire, centre right, clean water, colonial exploitation, distributed generation, European colonialism, fixed income, full employment, global village, guns versus butter model, indoor plumbing, labour mobility, land reform, mass immigration, means of production, profit motive, rising living standards, trade route, V2 rocket, women in the workforce

The development of radar gave them a powerful new weapon, which denied the submarines their invisibility, and more up-to-date escort ships carrying better-trained crews improved the protection of convoys. The Allies learned that the most effective way of disposing of the submarines was to attack them by both sea and air as they approached their prey. Air cover from bases in Greenland and Iceland greatly improved the North Atlantic convoys’ chances and the air gap was later filled by planes from aircraft carriers. The behind-the-scenes work of decoding enemy communications carried out by the team of academics at Bletchley Park meant that, bar a gap in 1941–42, the Allies always knew more or less where the U-boats were lying in wait. In October 1943 the US Admiral Ernest King relegated the U-boats to the category of a problem rather than a menace.77 Britain’s food supply benefited.


The River Cottage Fish Book: The Definitive Guide to Sourcing and Cooking Sustainable Fish and Shellfish by Hugh Fearnley-Whittingstall

air gap, California gold rush, clean water, deindustrialization, delayed gratification, haute cuisine, Hugh Fearnley-Whittingstall, Kickstarter, market bubble, means of production, sensible shoes

Pour a nice, even layer of salt into the container, a good ⅛ to ¼ inch (3 to 6mm) deep, then put the fillets on top, skin side down, trying not to overlap them too much. Cover them completely with another layer of salt, making it at least ¼ to ⅓ inch (6mm to 1cm) deep this time. Make sure there are no air gaps. If you have lots of fillets to salt, repeat this layering until you have used all the fish. Keep the box somewhere cool—in the fridge, if it will fit. After 24 hours, the fish will have leached quite a bit of water. Pour this off and throw on another good sprinkling of dry salt. Repeat this process every couple of days for the next 7 to 14 days, until the amount of water leaching out is minimal (the more fillets you have in your stack, the longer it will take).