Kevin Phillips – Bad Money: Reckless Finance, Failed Politics, and The Global Crisis of American Capitalism — Videos

Posted on December 26, 2015. Filed under: American History, Banking, Blogroll, British History, Congress, Constitution, Economics, European History, Faith, Family, Fiscal Policy, government spending, Investments, Language, Law, liberty, Life, Links, Literacy, Macroeconomics, media, Microeconomics, Middle East, Monetary Policy, Money, People, Philosophy, Photos, Politics, Presidential Candidates, Radio, Talk Radio, Tax Policy, Taxation, Taxes, Television, Video, Wealth, Welfare, Wisdom, Work, Writing | Tags: , , , , , , , , , , , , |

Kevin Phillips – Bad Money: the Global Crisis of American Capitalism

Bad Money: Crisis of American Capitalism

Kevin Phillips – Bad Money: the Global Crisis of American Capitalism

Which Currency Will Replace the Dollar? Finance and the Crisis of Capitalism (2008)

Former GOP Strategist Kevin Phillips on Roots of American Revolution, Future of US Politics

Kevin Phillips Discusses the Role Played by Money, Debt, & Trade in the American Revolution

WALL STREET MELTDOWN Bill Moyers !!!! FULL 1 of 3

WALL STREET MELTDOWN Bill Moyers !!!! FULL 2 of 3

WALL STREET MELTDOWN Bill Moyers !!!! FULL 3 of 3

Kevin Phillips on Bad Money (US money system)-1/2

Kevin Phillips on Bad Money (US money system)-2/2

Book TV: Kevin Phillips on his Writing Habits

Read Full Post | Make a Comment ( None so far )

National Security Agency (NSA) Wants To Build Supercomputer To Crack All Encryption — Videos

Posted on January 2, 2014. Filed under: American History, Blogroll, Communications, Computers, Constitution, Crime, Data Storage, Economics, External Hard Drives, Federal Government, Federal Government Budget, Fiscal Policy, government, government spending, history, History of Economic Thought, Law, liberty, Life, Links, Literacy, media, People, Philosophy, Politics, Press, Psychology, Raves, Regulations, Security, Technology, Video, War, Wealth, Wisdom, Writing | Tags: , , , , , , , , , , , , , , , , , , , , |

NSA wants a supercomputer to crack all encryption

NSA picks locks of Internet encryption

How did the NSA hack our emails?

Glenn Greenwald: The NSA Can “Literally Watch Every Keystroke You Make”

A history of NSA wiretapping, Prism, Edward Snowden, William Binney and Thomas Drake – Truthloader

Spying On Americans By NSA Prism Collection Details Rand Paul On Hannity

NSA and the One Trillion Dollar scam [Empire]

The Truth About Edward Snowden

Vindication for Snowden? Obama Panel Backs Major Curbs on NSA Surveillance, Phone Record Data Mining

A White House-appointed task force has proposed a series of curbs on key National Security Agency surveillance operations exposed by Edward Snowden. On Thursday, the panel recommended the NSA halt its bulk collection of billions of U.S. phone call records, citing ‘potential risks to public trust, personal privacy, and civil liberty.’ The panel says telecommunications providers or a private third party should store the records instead. The panel also calls for banning the NSA from ‘undermining encryption’ and criticizes its use of computer programming flaws to mount cyber-attacks. And it backs the creation of an independent review board to monitor government programs for potential violations of civil liberties. We discuss the panel’s findings with two guests: Ben Wizner, Snowden’s legal advisor and director o

Construction of the NCI supercomputer – timelapse video

NSA’s Largest Spy Center Located in Utah (What you need to know)

What You Should Know About The New NSA Utah Data Center

How NSA Spys On You With Utah Data Center Super Computer

The End of Internet Privacy? Glenn Greenwald On Secret NSA Program to Crack Online Encryption

NSA and the One Trillion Dollar scam [Empire]

NSA seeks to build quantum computer that could crack most types of encryption

By  and Barton Gellman, Updated: Thursday, January 2, 4:00 PM

In room-size metal boxes, secure against electromagnetic leaks, the National Security Agency is racing to build a computer that could break nearly every kind of encryption used to protect banking, medical, business and government records around the world.

According to documents provided by former NSA contractor Edward Snowden, the effort to build “a cryptologically useful quantum computer” — a machine exponentially faster than classical computers — is part of a $79.7 million research program titled, “Penetrating Hard Targets.” Much of the work is hosted under classified contracts at a laboratory in College Park.

[Read an annotated description of the Penetrating Hard Targets project]

The development of a quantum computer has long been a goal of many in the scientific community, with revolutionary implications for fields like medicine as well as for the NSA’s code-breaking mission. With such technology, all forms of public key encryption would be broken, including those used on many secure Web sites as well as the type used to protect state secrets.

Physicists and computer scientists have long speculated whether the NSA’s efforts are more advanced than those of the best civilian labs. Although the full extent of the agency’s research remains unknown, the documents provided by Snowden suggest that the NSA is no closer to success than others in the scientific community.

“It seems improbable that the NSA could be that far ahead of the open world without anybody knowing it,” said Scott Aaronson, an associate professor of electrical engineering and computer science at MIT.

The NSA appears to regard itself as running neck and neck with quantum computing labs sponsored by the European Union and the Swiss government, with steady progress but little prospect of an immediate breakthrough.

“The geographic scope has narrowed from a global effort to a discrete focus on the European Union and Switzerland,” one NSA document states.

Seth Lloyd, professor of quantum mechanical engineering at MIT, said the NSA’s focus is not misplaced. “The E.U. and Switzerland have made significant advances over the last decade and have caught up to the U.S. in quantum computing technology,” he said.

The NSA declined to comment for this story.

The documents, however, indicate that the agency carries out some of its research in large, shielded rooms known as Faraday cages, which are designed to prevent electromagnetic energy from coming in or out. Those, according to one brief description, are required “to keep delicate quantum computing experiments running.”

[Read a document describing classification levels related to quantum computing efforts]

The basic principle underlying quantum computing is known as “quantum superposition,” the idea that an object simultaneously exists in all states. A classical computer uses binary bits, which are either zeroes or ones. A quantum computer uses quantum bits, or qubits, which are simultaneously zero and one.

This seeming impossibility is part of the mystery that lies at the heart of quantum theory, which even theoretical physicists say no one completely understands.

“If you think you understand quantum mechanics, you don’t understand quantum mechanics,” said the late Nobel laureate Richard Feynman, who is widely regarded as the pioneer in quantum computing.

Here’s how it works, in theory: While a classical computer, however fast, must do one calculation at a time, a quantum computer can sometimes avoid having to make calculations that are unnecessary to solving a problem. That allows it to home in on the correct answer much more quickly and efficiently.

Quantum computing is so difficult to attain because of the fragile nature of such computers. In theory, the building blocks of such a computer might include individual atoms, photons or electrons. To maintain the quantum nature of the computer, these particles would need to be carefully isolated from their external environments.

“Quantum computers are extremely delicate, so if you don’t protect them from their environment, then the computation will be useless,” said Daniel Lidar, a professor of electrical engineering and the director of the Center for Quantum Information Science and Technology at the University of Southern California.

A working quantum computer would open the door to easily breaking the strongest encryption tools in use today, including a standard known as RSA, named for the initials of its creators. RSA scrambles communications, making them unreadable to anyone but the intended recipient, without requiring the use of a shared password. It is commonly used in Web browsers to secure financial transactions and in encrypted e-mails. RSA is used because of the difficulty of factoring the product of two large prime numbers. Breaking the encryption involves finding those two numbers. This cannot be done in a reasonable amount of time on a classical computer.

In 2009, computer scientists using classical methods were able to discover the primes within a 768-bit number, but it took almost two years and hundreds of computers to factor it. The scientists estimated that it would take 1,000 times longer to break a 1,024-bit encryption key, which is commonly used for online transactions.

A large-scale quantum computer, however, could theoretically break a 1,024-bit encryption much faster. Some leading Internet companies are moving to 2,048-bit keys, but even those are thought to be vulnerable to rapid decryption with a quantum computer.

Quantum computers have many applications for today’s scientific community, including the creation of artificial intelligence. But the NSA fears the implications for national security.

“The application of quantum technologies to encryption algorithms threatens to dramatically impact the US government’s ability to both protect its communications and eavesdrop on the communications of foreign governments,” according to an internal document provided by Snowden.

Experts are not sure how feasible a quantum computer is in the near future. A decade ago, some experts said that developing a large quantum computer was likely 10 to 100 years in the future. Five years ago, Lloyd said the goal was at least 10 years away.

Last year, Jeff Forshaw, a professor at the University of Manchester, told Britain’s Guardian newspaper, “It is probably too soon to speculate on when the first full-scale quantum computer will be built but recent progress indicates that there is every reason to be optimistic.”

“I don’t think we’re likely to have the type of quantum computer the NSA wants within at least five years, in the absence of a significant breakthrough maybe much longer,” Lloyd told the Post in a recent interview.

However, some companies claim to already be producing small quantum computers. A Canadian company, D-Wave Systems , says it has been making quantum computers since 2009. In 2012, it sold a $10 million version to Google, NASA and the Universities Space Research Association, according to news reports.

That quantum computer, however, would never be useful for breaking public key encryption like RSA.

“Even if everything they’re claiming is correct, that computer, by its design, cannot run Shor’s algorithm,” said Matthew Green, a research professor at the Johns Hopkins Information Security Institute, referring to the algorithm that could be used to break encryption like RSA.

Experts believe that one of the largest hurdles to breaking encryption with a quantum computer is building a computer with enough qubits, which is difficult given the very fragile state of quantum computers. By the end of September, the NSA expected to be able to have some basic building blocks, which it described in a document as “dynamical decoupling and complete quantum control on two semiconductor qubits.”

“That’s a great step, but it’s a pretty small step on the road to building a large-scale quantum computer,” Lloyd said.

A quantum computer capable of breaking cryptography would need hundreds or thousands more qubits than that.

The budget for the National Intelligence Program, commonly referred to as the “black budget,” details the “Penetrating Hard Targets” project and noted that this step “will enable initial scaling towards large systems in related and follow-on efforts.”

Another project, called the “Owning the Net,” is using quantum research to support the creation of new quantum-based attacks on encryptions like RSA, documents show.

“The irony of quantum computing is that if you can imagine someone building a quantum computer that can break encryption a few decades into the future, then you need to be worried right now,” Lidar said.

http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_print.html

Background Articles and Videos

130607_PRISM_ppt_1.jpg.CROP.original-original

nsa-prism-slide

nsa_prism

prism-slide-2

prism-slide-5

prism-slide-6

top-secret-nsa-prism-slide-7

prism-slide-8

INTERVIEW with NSA WHISTLEBLOWER: Confirm EVERYONE in US is under VIRTUAL SURVEILLANCE since 9/11

He told you so: Bill Binney talks NSA leaks

Related Posts On Pronk Palisades

National Security Agency (NSA) Intercepts FedX and UPS Packages To Install Malware Software — Bugs iPhones and Laptops — Videos

No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Enemy Of The State: Life Imitating Art –National Security Agency Targets American People — Vidoes

Big Brother Barack Targets All The American People As Enemies of The State and Democratic Party — National Security Agency’s PRISM Is The Secret Security Surveillance State (S4) Means of Invading Privacy and Limiting Liberty — Outrageous Overreach–Videos

National Security Agency (NSA) and Federal Bureau Investigation (FBI) Secret Security Surveillance State (S4) Uses Stellar Wind and PRISM To Create Secret Dossiers On All American Citizen Targets Similar To East Germany Stasi Files–Videos

NSA’s PRISM Political Payoff: 40 Million Plus Foreigners Are In USA As Illegal Aliens! — 75% Plus Lean Towards Democratic Party — Pathway To One Party Rule By 2025 If Senate Bill Becomes Law Giving Illegal Aliens Legal Status — 25 Million American Citizens Looking For Full Time Jobs! — Videos

Amnesty Before Enforcement — Congressional Gangsters’ Comprehensive Immigration “Reform” Bill Targets American Citizens For Unemployment — American Citizens Want All Illegal Aliens Deported Not Rewarded With Legal Status — Target The Amnesty Illegal Alien Gangsters For Defeat — Videos

U.S. Hacking China and Hong Kong — Videos

Digital Campaigns Using Microtargeting and Data Mining To Target Voters — Videos

Sasha Issenberg — The Victory Lab: The Secret Science of Winning Campaigns — Videos

Related Posts on Pronk Pops

Pronk Pops Show 112, June 7, 2013, Segment 0: Marxist-Leninists Go To The Wall With Holder — The Man Who Knows Where The Bodies Are Buried Enjoys President Obama’s Full Confidence Says Political Fixer Valerie Jarrett — Wall Street Wants Holder To Hang On — American People Say Hit The Road Jack — Videos

Pronk Pops Show 112, June 7, 2013: Segment 1: U.S. Real Gross Domestic Product Growth Still Stagnating At 2.4% in First Quarter of 2013 As Institute for Supply Management Factory Index Sinks to 49.0 Lowest Since June 2009 — Videos

Pronk Pops Show 112, June 7, 2013, Segment 2: Federal Advisory Council (FAC) May 17, 2013 Report — No Exit To A Bridge Over Troubled Waters — Keyboarding Money — We’re screwed! — Videos

Pronk Pops Show 112, June 7, 2013, Segment 3: Official Unemployment Rate Rises To 7.6% with 11.8 Million Americans Unemployed and Only 175,000 Jobs Created in May — Videos

Pronk Pops Show 112, June 7, 2013, Segment 4: No Such Agency — NSA — National Security Agency — Threat To The Liberty and Privacy of The American People — None Of Their Damn Business — Still Trust The Federal Government? — Videos

Read Full Post | Make a Comment ( None so far )

Disaster at Chernobyl–Videos

Posted on March 13, 2011. Filed under: Biology, Blogroll, Chemistry, Communications, government, government spending, Language, Law, liberty, Life, Links, media, People, Philosophy, Physics, Politics, Psychology, Rants, Raves, Resources, Science, Security, Strategy, Technology, Video, War, Wisdom | Tags: , , , , , , , , , |

Disaster at Chernobyl part 1 of 6

 

Disaster at Chernobyl part 2 of 6

 

Disaster at Chernobyl part 3 of 6

 

Disaster at Chernobyl part4 of 6

 

Disaster at Chernobyl part 5 of 6

 

Disaster at Chernobyl part 6 of 6

 

Chernobyl disaster incident PART 1

 

Chernobyl disaster incident PART 2

 

Chernobyl disaster incident PART 3

 

Chernobyl disaster incident PART 4

 

Chernobyl disaster incident PART 5

 

Chernobyl disaster incident PART 6

 

Chernobyl disaster incident PART 7

 

Chernobyl disaster incident PART 8

 

Chernobyl disaster incident PART 9

 

Chernobyl disaster incident PART 10

 

Related Posts On Pronk Palisades 

Shaken and Stirred–Japanese 9.0 Richter and X Mercalli Scale Earthquake Shifts Earth’s Axis and Giant Tsunami Ocean Wave Moves Japanese Coast–Thousands Feared Dead–Videos

Michael Crichton–The Language of Fear–Nuclear Plants From Chernobyl To Fukushima–The First Information Casualty Is The Truth–Video

Earthquake Damages Japanese Nuclear Plant At Fukushima Daiichi, Four Explosions and Four Nuclear Reactors Flooded With Seawater To Contain Release Of Radioactive Material and Plant Released Radioactive Materials To Stop Pressure Buildup–Partial Meltdown Of Nuclear Core Feared–Radioactive Material Escaping From Plant–Over 250,000 Ordered Evacuated From 20 Kilometer (12.4 Miles) Radius From Plant–Videos

Meltdown At Three Mile Island–Videos

Nuclear Safety, Is It Possible–Yes We Can!–Videos

Nuclear Renaissance–Videos

 

Read Full Post | Make a Comment ( None so far )

Eric Schmidt–Videos

Posted on February 2, 2010. Filed under: Blogroll, Communications, Computers, Demographics, Economics, Education, Employment, Federal Government, Fiscal Policy, Foreign Policy, government, government spending, Immigration, Investments, Law, liberty, Life, Links, Monetary Policy, People, Philosophy, Politics, Quotations, Raves, Resources, Reviews, Science, Security, Taxes, Technology, Video, Wisdom | Tags: , , , , , |

Eric Schmidt on technology, innovation & the global economy

Eric Schmidt at the Celebration of Teaching and Learning

Eric Schmidt at the Aspen Ideas Festival

Eric Schmidt at Bloomberg on the Future of Technology

Eric Schmidt at Virginia Business Higher Education Council

Eric Schmidt at Morgan Stanley Technology Conference

Eric Schmidt in conversation with Audrey Russo

Eric Schmidt at NASA 50th Anniversary Lecture Series

Eric Schmidt at the NAA

Eric Schmidt at the Management Lab Summit

Eric Schmidt at the WSJ ECO:nomics conference

Eric Schmidt at the Economic Club

Eric Schmidt on Strategies and Solutions for Energy Security

Eric Schmidt on policy priorities for 2009

Eric Schmidt at HIMSS

Eric Schmidt on the Precourt Institute for Energy

Eric Schmidt Conversation with Ken Auletta

Eric Schmidt, CEO of Google, interviewed at Gartner Symposium/ITxpo Orlando 2009

Eric Schmidt at the Web 2.0 Expo

Eric Schmidt at the NAA

Eric Schmidt Public Speaking Class

 

Background Articles and Videos

Eric Schmidt

“..Eric Emerson Schmidt (born April 27, 1955(1955-04-27))[3] is an engineer, Chairman/CEO of Google Inc. and a former[4] member of the Board of Directors of Apple Inc.[5] He also sits on the boards of trustees for Carnegie Mellon University[6] and Princeton University.[7]

Biography

Schmidt was born in Washington, D.C. After graduating from Yorktown High School (Virginia)[8], Schmidt attended Princeton University where he earned a BSEE in 1976.[9] At the University of California, Berkeley, he earned an MS in 1979, for designing and implementing a network linking the campus computer center, the CS and the EECS departments[10][11] and a PhD in 1982 in EECS with a dissertation about the problems of managing distributed software development and tools for solving these problems[12] He was joint author of lex (a lexical analyzer and an important tool for compiler construction). He taught at Stanford Business School as a part time professor.[13]

He lives in Atherton, California with his wife Wendy.[14]

He is also on the list of ARTnews 200 top art collectors.[15]

The Schmidt Family Foundation addresses issues of sustainability and the responsible use of natural resources. Wendy Schmidt, working with Hart Howerton, a San Francisco architectural firm that specializes in large-scale land use, has inaugurated several projects on the island of Nantucket that seek to sustain the unique character of the island, and to minimize the impact of seasonal visitation on the island’s core community.

Career

Early career

Early in his career, Schmidt held a series of technical positions with IT companies, including Bell Labs, Zilog and Xerox’s famed Palo Alto Research Center (PARC). He joined Sun Microsystems in 1983, led its Java development efforts and rose to become Chief Technology Officer. In 1997, he was appointed CEO of Novell.

Schmidt left Novell after the acquisition of Cambridge Technology Partners. Google founders Larry Page and Sergey Brin interviewed Schmidt. Impressed by him,[16] they recruited Eric Schmidt to run their company in 2001 under the influence of venture capitalists John Doerr and Michael Moritz.

Google

Schmidt joined Google’s board of directors as chairman in March 2001 and became the company’s CEO in August 2001. At Google, Schmidt shares responsibility for Google’s daily operations with founders Page and Brin. As indicated by page 29 of Google’s 2004 S-1 Filing[17] Schmidt, Page, and Brin run Google as a triumvirate. Schmidt possesses the legal responsibilities typically assigned to the CEO of a public company and focuses on management of the vice presidents and the sales organization.

According to Google’s website, Schmidt also focuses on “building the corporate infrastructure needed to maintain Google’s rapid growth as a company and on ensuring that quality remains high while product development cycle times are kept to a minimum.”[18]

…”

http://en.wikipedia.org/wiki/Eric_E._Schmidt

Recommended Posts On Pronk Palisades

Ray Kurzweil Videos

Bill Gates–Hope, Change and Rapid Affluence Development–Creative Capitalism!

Saving The World: The Importance of Getting The Priorities Right

A Kinder Gentler Wiser Microsoft Gives Away Valuable Software Developer Tools to Students Around The World!

Al Gore 2.0 and The Coming Renewable Energy Ice Age–The Big Chill

Read Full Post | Make a Comment ( None so far )

Liked it here?
Why not try sites on the blogroll...