... promises to reduce global C02 levels to around the time period of the pre-industrial revolution within 10 years:

Licht calls his approach "diamonds from the sky."

Licht estimates electrical energy costs of this "solar thermal electrochemical process" to be around $1,000 per ton of carbon nanofiber product, which means the cost of running the system is hundreds of times less than the value of product output.

"We calculate that with a physical area less than 10 percent the size of the Sahara Desert, our process could remove enough COto decrease atmospheric levels to those of the pre-industrial revolution within 10 years," he says.

More at this ref: http://www.sciencedaily.com/releases/2015/08/150819083117.htm


Here's a UGP (Underground Product) sticker from back in the day:

Ref: http://tekgnosis.typepad.com/tekgnosis/2015/08/ugp-sticker-from-back-in-the-day.html

A thousand prominent researchers whose laboratories and companies are pursuing the development of artificial intelligence and robotics have issued an open letter urging a moratorium on the creation of offensive autonomous weapons systems:

Autonomous weapons select and engage targets without human intervention. They might include, for example, armed quadcopters that can search for and eliminate people meeting certain pre-defined criteria, but do not include cruise missiles or remotely piloted drones for which humans make all targeting decisions. Artificial Intelligence (AI) technology has reached a point where the deployment of such systems is — practically if not legally — feasible within years, not decades, and the stakes are high: autonomous weapons have been described as the third revolution in warfare, after gunpowder and nuclear arms.

Many arguments have been made for and against autonomous weapons, for example that replacing human soldiers by machines is good by reducing casualties for the owner but bad by thereby lowering the threshold for going to battle. The key question for humanity today is whether to start a global AI arms race or to prevent it from starting. If any major military power pushes ahead with AI weapon development, a global arms race is virtually inevitable, and the endpoint of this technological trajectory is obvious: autonomous weapons will become the Kalashnikovs of tomorrow. Unlike nuclear weapons, they require no costly or hard-to-obtain raw materials, so they will become ubiquitous and cheap for all significant military powers to mass-produce. It will only be a matter of time until they appear on the black market and in the hands of terrorists, dictators wishing to better control their populace, warlords wishing to perpetrate ethnic cleansing, etc. Autonomous weapons are ideal for tasks such as assassinations, destabilizing nations, subduing populations and selectively killing a particular ethnic group. We therefore believe that a military AI arms race would not be beneficial for humanity. There are many ways in which AI can make battlefields safer for humans, especially civilians, without creating new tools for killing people.

Just as most chemists and biologists have no interest in building chemical or biological weapons, most AI researchers have no interest in building AI weapons — and do not want others to tarnish their field by doing so, potentially creating a major public backlash against AI that curtails its future societal benefits. Indeed, chemists and biologists have broadly supported international agreements that have successfully prohibited chemical and biological weapons, just as most physicists supported the treaties banning space-based nuclear weapons and blinding laser weapons.

In summary, we believe that AI has great potential to benefit humanity in many ways, and that the goal of the field should be to do so. Starting a military AI arms race is a bad idea, and should be prevented by a ban on offensive autonomous weapons beyond meaningful human control.

More here:


27 July 2015

WikiLeaks Stratfor Emails Contain Malware


Hi Cryptome -

My name is Josh Wieder. You may remember me recently as one of the guys who helped shut down one of the guys who has been circulating torrents posing as Cryptome. I'm a systems administrator, and have been for about 10 years now. Most of that time I have worked for data centers and hosting companies. One of my responsibilities was helping to manage the abuse response for the networks my companies leased; in practice this meant tracking down hackers and spammers and mitigating the occasional DoS.

I am also a regular reader of Wikileaks (as well as Cryptome!). Back in March, I decided to take a look at the Stratfor emails that Wikileaks got from Lulzsec. Although Wikileaks first publicized the emails in 2012, they did not release all of them until two years later. I thought I might find information that was overlooked after the initial publicity wore off.

What I found, so far, was 18 email attachments infected with malicious software. Most of the malware is embedded inside documents like PDFs, DOCs and Excel spreadsheets. All of the programs allow those who read infected files to be identified and tracked - one script for example scrapes Windows software registration info like name and location and sends it to a remote server. Interestingly, the email headers indicate that nearly all of the malware originates from Stratfor employees. This is not spearphishing.

I tried to contact Wikileaks for over two months via email, the livechat that is supposed to serve as how they receive leaks and finally publicly, through Twitter. I received no response. Because of the lack of response and the risk posed to activists and journalists by leaving these malicious scripts available for download without any sort of warning, I went public. Interestingly, Hector Monsegur - aka 'sabu' - the former leader of Lulzsec and FBI informant who was reportedly involved with handing over the Stratfor emails to Wikileaks, was one of the first people to publicly confirm my findings.

My findings have been verified by several respected news outlets - The Register from the UK



Neue Zürcher Zeitung of Switzerland


I've been interviewed by several other newspapers that are working on features; the I-team editor of one of those newspapers even sent a warning containing my findings to the NICAR mailing list. You can confirm my findings directly using the list of infected files available here:


because Wikileaks is publishing the malware file by file, confirming infection using a tool like Virus Total or something similar would only take a few minutes.

I do not have a bone to pick with Wikileaks - however providing malware that can identify the readers of leaked documents without a warning is without justification. While technically savvy readers likely take precautions when viewing these documents, they are taking precautions against third party surveillance techniques and applications like XKEYSCORE; securing a computer for analysis of active malicious software requires different precautions.

Finally, analysis of the malware - who designed it and how it circulated - is of public interest all on its own. Taken at face value, the email headers of several infected messages indicate that the wife of Stratfor's CEO was circulating infected files as early as 2003. The continued presence of these infected attachments strongly indicates that such intrusions were never discovered, investigated and repaired: a stunning display of operational security incompetence.

Please help me get the word out to activists and journalists as well as tech folks who can help me research the malware iself. I am happy to provide additional information and background to the best of my ability.

All the best,

Josh Wieder

PGP Public Key:


Fingerprint: Fingerprint=040C D852 0EAB 0FCB 5492 5DA0 D059 F15C D355 3EDC

Key ID: D3553EDC


Ref: https://cryptome.org/2015/07/wikileaks-stratfor-malware.htm

Tired of Domination by the Bushes and Clintons?

July 4th is approaching — a great time to declare independence from the Bushes and Clintons who have dominated our country's politics for decades.

More here: