Памятник Нурсултану Назарбаеву в Метрополисе (Иллинойс, США) | TONQAI
Культ личности Назарбаева. Памятник Нурсултану Назарбаеву в Метрополисе (Иллинойс, США) | TONQAI
[Announcement] OpenAI’s Spyware Overlord: The Expert with a Controversial NSA Playbook
Ladies and gentlemen, grab your tinfoil hats and prepare for a wild ride through the labyrinth of cyber espionage and AI overlords. Yes, you read that right. OpenAI, in its infinite wisdom, has decided to appoint none other than General Paul M. Nakasone, the former director of the NSA, to its board of directors. Because who better to ensure the ethical development of artificial intelligence than a man with a resume that reads like a spy thriller?
📌Meet General Paul M. Nakasone: General Nakasone isn’t just any retired military officer; he’s the longest-serving leader of the U.S. Cyber Command and former director of the NSA. His resume reads like a who’s who of cyber warfare and digital espionage. From establishing the NSA’s Artificial Intelligence Security Center to leading the charge against cyber threats from nation-states, Nakasone’s expertise is as deep as it is controversial.
📌The Safety and Security Committee: In a bid to fortify its defenses, OpenAI has created a Safety and Security Committee, and guess who’s at the helm? That’s right, General Nakasone. This committee is tasked with evaluating and enhancing OpenAI’s security measures, ensuring that their AI models are as secure as Fort Knox. Or at least, that’s the plan. Given Nakasone’s background, one can only wonder if OpenAI’s definition of «security» might lean a bit towards the Orwellian.
📌Industry Reactions. Applause and Alarm Bells: The industry is abuzz with reactions to Nakasone’s appointment. Some hail it as a masterstroke, bringing unparalleled cybersecurity expertise to the AI frontier. Others, however, are less enthusiastic. Critics point out the potential conflicts of interest and the murky waters of data privacy that come with a former NSA director overseeing AI development. After all, who better to secure your data than someone who spent years finding ways to collect it?
📌The Global Implications: Nakasone’s appointment isn’t just a domestic affair; it has global ramifications. Countries around the world are likely to scrutinize OpenAI’s activities more closely, wary of potential surveillance and data privacy issues. This move could intensify the tech cold war, with nations like China and Russia ramping up their own AI and cybersecurity efforts in response.
In this riveting this document, you’ll discover how the mastermind behind the NSA’s most controversial surveillance programs is now tasked with guiding the future of AI. Spoiler alert: it’s all about «cybersecurity» and «national security"—terms that are sure to make you sleep better at night. So sit back, relax, and enjoy the show as we delve into the fascinating world of AI development under the watchful eye of Big Brother.
Discover the 'Real' China with the Global Times App — Censorship Included
The irony is palpable. China, the land of the Great Firewall, where the government tightly controls the flow of information, has released a new version of Google News to combat the scourge of fake news named Global Time. Yes, you read that right. The same China that has been accused of spreading disinformation and propaganda through its state-controlled media outlets is now taking on the noble task of stopping the spread of fake news from Google.
Let’s take a moment to appreciate the rich irony of this situation.
The new Google News China edition will reportedly include a feature that allows users to report fake news stories. Because, you know, the Chinese government has such a stellar track record of respecting free speech and allowing its citizens to express their opinions without fear of reprisal. In USA is sure the reporting feature will be used solely for the purpose of promoting truth and accuracy, and not at all to silence dissenting voices or suppress information that the government deems inconvenient like USA usually does
The app’s features include:
📌Breaking news: Get real-time updates on the latest Party-approved news, carefully crafted to ensure you’re informed about the «correct» version of events.
📌Print edition: Enjoy articles from the newspaper, published every day with the utmost care to avoid any «inconvenient untruths from USA.»
📌Editorial: Savor the «forthright, unique, and striking voice of China» on hotly debated topics — as long as those topics align with the Party’s agenda.
📌Hu says: Watch sharp video comments from the Party’s top leaders, because who needs diverse bullshit U.S. & EU perspectives when you have the wisdom of Xi Jinping?
The app also includes:
📌Infographics: News in diagrams and numbers, carefully designed to make complex issues simple and easy to understand — or, at the very least, easy to ignore.
📌Sports: Stay up-to-date on the latest sporting events, because nothing says «freedom of expression» like a good game of basketball or soccer like U.S. does.
📌Arts: Indulge in sophisticated stories on design, cuisine, fashion, art, movies/TVs, travel, celebrities, and health — all carefully vetted to ensure they don’t offend the Party’s sensibilities.
From Oil to Circuits: UAE’s Latest Get-Rich-Quick Scheme
UAE is actively pursuing partnerships, especially with the US, and securing investments to establish domestic manufacturing of cutting-edge semiconductors, which are vital for its aspirations to be a global AI powerhouse and technology hub.
UAE’s Semiconductor Manufacturing Plans
📌The UAE is aggressively seeking partnerships with the United States to build cutting-edge semiconductor chips crucial for artificial intelligence (AI) applications.
📌Omar Al Olama, UAE’s Minister of State for AI, emphasized that the «only way this will work is if we’re able to build sustainable and long-term partnerships with countries like the US where we can build cutting-edge chips.»
📌The UAE aims to develop next-generation chips rather than compete on price with cheaper alternatives from larger manufacturers.
📌Establishing semiconductor manufacturing in the Gulf region faces substantial obstacles like securing US government approval due to regional ties with China, attracting global talent and expertise.
Funding for In-House AI Chips
📌Abu Dhabi’s state-backed group MGX is in discussions to support OpenAI’s plans to develop its own AI semiconductor chips in-house.
📌OpenAI is seeking trillions of dollars in investments globally to manufacture AI chips internally and reduce reliance on Nvidia.
📌MGX’s potential investment aligns with the UAE’s strategy to position Abu Dhabi at the center of an «AI strategy with global partners around the world.»
Strategic Importance
📌Advanced semiconductors are crucial components in the AI supply chain, essential for processing vast amounts of data required for AI applications.
📌Developing domestic semiconductor manufacturing capabilities is a key part of the UAE’s ambitions to become a leading technology hub and diversify its economy beyond oil.
📌Partnerships with the US in semiconductor manufacturing would help address concerns over the UAE’s ties with China in sensitive technology sectors.
Systemically Important Entities: From Guidelines to Directives NSM-22
NSM-22 represents a comprehensive update to the U.S. critical infrastructure security policy, emphasizing mandatory compliance, enhanced risk management, and increased collaboration. Critical infrastructure owners and operators must prepare for these changes to ensure the security and resilience of their operations.
Updated Policy Framework:
📌NSM-22 modernizes the policy framework to address technological advances, evolving threats, and geopolitical tensions.
📌It designates the Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA) to lead a coordinated effort to manage risks across 16 critical infrastructure sectors.
Sector Risk Management Agencies (SRMAs):
📌The memorandum reaffirms the designation of 16 critical infrastructure sectors and corresponding SRMAs, which coordinate activities within each sector.
📌SRMAs are tasked with developing sector-specific risk management plans and coordinating with CISA.
Minimum Security and Resilience Requirements:
📌NSM-22 emphasizes the development of minimum security and resilience requirements for critical infrastructure entities, moving from voluntary standards to mandatory compliance.
📌Regulatory and oversight entities are tasked with establishing these requirements and accountability mechanisms.
Systemically Important Entities (SIEs):
📌CISA is instructed to identify and maintain a non-public list of SIEs, which will receive priority access to risk mitigation information and operational resources.
New Risk Management Cycle:
📌NSM-22 introduces a new risk management cycle requiring SRMAs to identify, assess, and prioritize risks within their sectors. This cycle will culminate in the creation of the 2025 National Infrastructure Risk Management Plan.
Implications for Critical Infrastructure Owners and Operators
Increased Regulation:
📌NSM-22 marks a significant shift towards regulation, with a progression from voluntary standards to mandatory compliance expected over the next 18 months.
📌Owners and operators should prepare for new cybersecurity directives and regulations, particularly in sectors like airports, pipelines, oil and gas, and rail.
Resource Allocation:
📌Compliance with new regulations and overlapping mandates can be costly and labor-intensive. Organizations will need to ensure investments are made and integrated into operations safely.
📌The memorandum does not mention additional resources for those on the front lines, which may necessitate future funding from Congress.
Cyber-Physical Defense:
📌Owners must harden their cyber-physical defenses to protect assets, maintain operational continuity, and fulfill their public mission. The consequences of failing to do so include physical, financial, and reputational damage.
Collaboration and Coordination:
📌Effective risk management will require collaboration between federal agencies, state and local governments, private sector entities, and other stakeholders.
📌Owners and operators should engage with Sector Coordinating Councils and relevant regulators to stay informed and compliant with new requirements.
OFAC’s Digital Charity: Cubans Get Social Media and Video Games
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced amendments to the Cuban Assets Control Regulations (CACR) on May 28, 2024, aimed at promoting internet freedom, supporting independent Cuban private sector entrepreneurs, and expanding access to financial services for Cuban nationals. These changes include updated definitions, authorization of U.S. bank accounts for Cuban entrepreneurs, reinstatement of «U-turn» transactions, and a new email reporting requirement for telecom-related transactions
📌OFAC’s Grand Announcement: On May 28, 2024, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) decided to sprinkle some generosity by amending the Cuban Assets Control Regulations (CACR). These changes are supposedly aimed at promoting internet freedom in Cuba and supporting independent Cuban private sector entrepreneurs. How noble!
📌Internet-Based Services: OFAC has graciously expanded the list of authorized internet-based services. Now, Cubans can enjoy social media platforms, video conferencing, e-gaming, user authentication, and instant translation services. Because nothing says freedom like more social media and video games, right?
📌Independent Private Sector Entrepreneurs: The term «self-employed individual» has been replaced with «independent private sector entrepreneur.» This new definition includes self-employed individuals, private cooperatives, and small private businesses. But don’t worry, prohibited officials of the Cuban Government and Communist Party members are excluded. How considerate!
📌U.S. Bank Accounts: Cuban entrepreneurs can now open and use U.S. bank accounts, including online payment platforms, for authorized transactions. However, if you’re a Cuban business owned by a government official or Communist Party member, tough luck!
📌U-Turn Transactions: OFAC has reinstated the authorization for «U-turn» transactions. This means U.S. banks can process fund transfers that start and end outside the U.S., as long as neither the originator nor the beneficiary is subject to U.S. jurisdiction. Because who doesn’t love a good U-turn?
📌Email Reporting Requirement: OFAC is moving into the 21st century by replacing its fax and paper mail reporting process with email reports for telecom-related transactions. Welcome to the digital age, OFAC!
📌Biden Administration’s Efforts: These amendments are part of the Biden Administration’s ongoing efforts to alleviate economic pressures on Cuba’s private sector while maintaining tensions with the Cuban Government. It’s a delicate balancing act, after all.
📌Historical Context: This move is reminiscent of the Obama Administration’s 2015 policies that eased trade restrictions on Cuba, which were partly reversed by the Trump Administration in 2017. It’s like a political seesaw!
Human Rights Online: As Long as They Align with U.S. Interests
The U.S. State Department’s new cyberspace strategy is all about «digital solidarity, » because clearly, the best way to secure the internet is by getting everyone—governments, companies, and civil society—to hold hands and sing Kumbaya while tackling cyber threats and promoting human rights.
General points:
📌Promoting an Open, Interoperable, Secure, and Reliable Internet: Advocating for a global internet that is accessible to all, free from undue restrictions, and resilient against disruptions. Because who wouldn’t want a utopian internet where everything works perfectly, and everyone plays nice?
📌Advancing Multi-Stakeholder Internet Governance: Supporting a governance model that includes governments, private sector, civil society, and technical community to ensure diverse perspectives and shared responsibility. Let’s get everyone involved in decision-making, because more cooks in the kitchen always make for a better meal, right?
📌Enhancing Cybersecurity: Implementing measures to protect critical infrastructure, improve cyber defenses, and respond to cyber threats effectively. The U.S. is on a mission to make the internet safer, one policy at a time. Because clearly, the current state of cybersecurity is just a minor hiccup.
📌Fostering Innovation and Economic Growth: Encouraging policies that support technological innovation, digital entrepreneurship, and the growth of the digital economy. Encouraging tech innovation and economic prosperity, because Silicon Valley needs more billion-dollar startups.
📌Protecting Human Rights and Fundamental Freedoms: Ensuring that digital policies respect and promote human rights, including freedom of expression, privacy, and access to information. Ensuring that everyone can enjoy their digital rights, as long as they align with U.S. interests.
📌Promoting International Security and Stability in Cyberspace: Working towards norms of responsible state behavior in cyberspace and reducing the risk of conflict stemming from cyber activities. Striving for a peaceful cyberspace, where cyberattacks are just a thing of the past. Dream big, right?
📌Building International Partnerships: Collaborating with international partners to address shared cyber challenges and enhance collective security. Teaming up with other nations to tackle cyber challenges, because global cooperation always goes off without a hitch.
📌Countering Malicious Cyber Activities: Taking actions to deter, disrupt, and respond to malicious cyber activities by state and non-state actors. Taking a stand against cyber threats, because the bad guys will definitely back down when they see the U.S. coming.
Briefing ext. points:
📌Digital Solidarity: The New Buzzword: The strategy’s «north star» is digital solidarity, because nothing says «we’re serious» like a catchy phrase that means everyone should just get along and share their toys in the digital sandbox.
Three Guiding Principles: Because Two Wouldn’t Be Enough:
📌Affirmative Vision: The U.S. isn’t forcing anyone to choose sides; it’s just offering a «more compelling option"—because who wouldn’t want to join the cool kids' club?
📌Integration: Cybersecurity, sustainable development, and tech innovation all rolled into one neat package. It’s like a digital Swiss Army knife.
📌Whole Digital Ecosystem: From the cloud to cables, every bit of the internet’s architecture is important. Yes, even those undersea cables you never think about.
Four Areas of Action: Because We Love Lists:
📌Open, Inclusive, Secure, and Resilient Digital Ecosystem: The U.S. has been championing this for decades, so clearly, it’s working perfectly.
📌Rights-Respecting Digital Governance: Aligning with international partners to ensure everyone plays by the same rules—rules that the U.S. probably wrote.
📌Responsible State Behavior: Promoting good behavior in cyberspace, because a stern talking-to always stops cybercriminals in their tracks.
📌Building Capacity: Helping other countries beef up their cyber defenses, because nothing says «we trust you» like giving you the tools to protect yourself.
📌The Usual Suspects. Russia: Russia is still the bad guy, launching cyberattacks left and right, but don’t worry, NATO’s got this covered.
📌The Usual Suspects. China: is the «most persistent cyber threat, » holding critical infrastructure at risk. But hey, let’s chat about AI safety and maybe collaborate on some cool tech.
📌AI: The Double-Edged Sword: AI will turbo-charge both cyberattacks and cyber defenses. It’s an arms race, but with algorithms.
📌Global Cooperation: The Idealistic Dream: The U.S. wants to work with everyone—governments, companies, civil society—to build a secure, inclusive, and rights-respecting digital world. Because if we all just hold hands, everything will be fine.
CISA’s Annual 'Captain Obvious' Alert: Hacktivists Use Stone Age Tactics to Exploit Water Systems — Who Knew?
📌CISA’s Mayday Call: CISA, along with other federal agencies and counterparts in Canada and the UK, issued a five-page warning on May 1, 2024, to water treatment operators in North America and Europe. Apparently, they needed to be told (again) that their systems are under attack… and again Russia is to blame
📌Rudimentary Attack Techniques: These hacktivists aren’t even using sophisticated methods. They’re exploiting outdated remote access software to mess with human-machine interfaces (HMIs) and industrial control systems (ICSs). So, basically, they’re taking advantage of the fact that some facilities are stuck in the digital Stone Age.
📌Impact of Attacks: The attacks have caused «nuisance-level» impacts, such as tank overflows, which were fixed by reverting to manual controls. There has been no impact on drinking water so far, but the potential for physical threats exists but no worries, Cola is coming to save lives
Cybersecurity on a Budget: CISA’s advice for water facility operators is to:
📌Change all default passwords (because apparently, that’s still a thing).
📌Disconnect HMIs and PLCs from the public internet (who knew that was a bad idea?).
📌Implement multi-factor authentication (because now we need faceID to protect water).
📌Budget Constraints: Yes, budgets are tight, but that’s no excuse to do nothing. Basic cybersecurity practices like cyber awareness training, maintaining an accurate asset inventory, continuous threat monitoring, and vulnerability assessments can be done without breaking the bank. Even Google started in a garage
📌Hacktivist Magnet: Water and wastewater systems are prime targets because they have tight budgets, lax cybersecurity practices, and almost guaranteed publicity for even minor attacks. It’s like a 80s hacker’s dream come true.
📌Vendor Support: Nozomi Networks is here to save the day, offering solutions to help water and wastewater utilities do more with less. Because, of course, they understand OT/ICS cybersecurity better than anyone else.
The U.S. Sanctions Spree: A Masterclass in Global Bullying
The recent actions by the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on June 12, 2024, reflect a desperate attempt by a once-dominant global power to maintain its waning influence. U.S. is in a manic panic, flailing about with new sanctions in a futile attempt to regain control and influence. It’s a classic case of a lost hegemon trying to assert dominance through increasingly desperate measures.
📌Russia-related Designations: The U.S. has added more names to its ever-growing list of sanctioned Russian entities and individuals. Because, you know, if the first 4,000 sanctions didn’t work, surely the next 300 will do the trick.
📌Targeting Chinese Firms: The U.S. is now going after Chinese companies that dare to do business with Russia. It’s almost as if the U.S. believes that bullying other countries into compliance will somehow restore its lost hegemony.
📌Secondary Sanctions: Foreign financial institutions are now at risk of sanctions if they deal with any of the newly sanctioned Russian entities. Because nothing says «global leadership» like threatening the entire world’s banking system.
📌Expanding Definitions: The Treasury has broadened the definition of Russia’s «military-industrial base» to include just about anyone and anything remotely connected to Russia. It’s a classic move: when in doubt, just make the net wider.
📌Restricting IT Services: The U.S. is restricting the supply of IT services and software to Russia. Because clearly, cutting off access to Microsoft Office will bring the Russian war machine to its knees.
📌Global Networks: The sanctions also target transnational networks in countries like China, Turkey, and the UAE. It’s almost as if the U.S. is trying to pick a fight with half the world at once.
📌G7 Summit: These actions come just in time for the G7 summit, where world leaders will undoubtedly pat themselves on the back for their «tough stance» on Russia. Meanwhile, Russia continues to adapt and find new ways to circumvent these measures.
Affected Industries:
📌Financial Services: Multiple documents highlight sanctions and exemptions related to financial transactions and services.
📌Cyber Operations: Entities involved in cyber activities are specifically targeted.
📌Humanitarian Aid: Exemptions are provided for transactions related to humanitarian aid.
📌Energy Sector: Sanctions target entities in the energy industry.
📌Defense Sector: Entities in the defense industry are affected by the sanctions.
📌Maritime Industry: Vessels added to the SDN List indicate that the maritime industry is also affected. This includes shipping companies and operators of vessels that are involved in activities supporting sanctioned entities or individuals
Full list
These documents collectively provide a comprehensive overview of the recent actions taken by OFAC in relation to Russia, including designations, general licenses, determinations, and guidance on compliance.
Document 932921
- Russia-related Designations: This document lists individuals and entities designated under the Russia-related sanctions program.
- Sanctions Criteria: It outlines the criteria for these designations, including involvement in destabilizing activities, cyber operations, and support for the Russian government.
Document 932926
- General Licenses: This document details new general licenses issued by OFAC. These licenses provide exemptions for certain transactions and activities that would otherwise be prohibited under the sanctions.
- Specific Transactions: It specifies the types of transactions allowed under these licenses, such as humanitarian aid and certain financial services.
Document 932931
- Determination on Russian Financial Sector: This document contains a determination related to the Russian financial sector, outlining specific actions and criteria subject to sanctions.
- Implementation Guidance: It provides guidance on how these determinations will be implemented and enforced.
Document 932936
- Updated FAQs: This document includes updated Frequently Asked Questions (FAQs) to provide additional guidance on the implementation of Russia-related sanctions.
- Compliance Requirements: It addresses common queries and clarifies compliance requirements for individuals and businesses affected by the sanctions.
Document 932941
- Additional Designations: This document lists additional individuals and entities designated under the Russia-related sanctions program.
- Rationale for Designations: It explains the rationale behind these designations, focusing on their roles in activities.
Document 932946
- Sectoral Sanctions: This document outlines sectoral sanctions targeting specific sectors of the Russian economy, such as energy, finance, and defense.
- Prohibited Activities: It details the specific activities and transactions that are prohibited under these sectoral sanctions.
Sanctions & U.S.'s diminishing role as a tech leader
U.S. Department of the Treasury announcing a significant expansion of sanctions against Russia on May 1, 2024, ostensibly to curb Russia’s technological capabilities. The stated reason for these sanctions is to degrade Russia’s ability to sustain its war machine by targeting its military-industrial base and the networks that facilitate its access to crucial technology and equipment
📌Broad Sanctions Imposed: The Treasury has imposed sanctions on nearly 300 targets, including companies and individuals, to disrupt and degrade Russia’s military-industrial base and its evasion networks that support the war effort.
📌Focus on Third-Country Support: A significant aspect of these sanctions is the targeting of entities and individuals in third countries, notably in the People’s Republic of China (PRC), that provide critical inputs to Russia’s military-industrial base. This support is seen as enabling Russia to continue its war against Ukraine and is considered a threat to international security.
📌Sanctions on Military and Weapons Programs: The sanctions specifically target Russia’s military-industrial base and its chemical and biological weapons programs. This includes actions against companies and individuals that help Russia acquire key inputs for weapons or defense-related production.
📌Global Outreach and Guidance: The Treasury and other U.S. government partners have issued extensive guidance and conducted outreach worldwide to educate and inform about the risks of doing business with Russia. This is part of a broader effort to disrupt Russia’s military-industrial supply chains, regardless of their location.
📌Commitment to Unilateral Action: The Treasury has expressed its commitment to taking unilateral action when necessary to disrupt Russia’s acquisition of technology and equipment for its war efforts. This includes a readiness to impose sanctions on individuals and entities facilitating these acquisitions.
While the sanctions aim to prevent Russia from being a tech hegemon, they actually be catalyzing the development of Russia’s technological independence and fostering stronger international alliances that could enhance its technological stature on the global stage. This outcome is quite the opposite of what the sanctions intended to achieve, highlighting the complex and often counterproductive nature of international economic policies in the geopolitical arena
The reality emerges when this action is viewed as a response to the U.S.'s own technological stagnation or impotence. Despite being a global leader in technology historically, recent analyses and reports suggest that the U.S. is struggling to maintain its technological edge, particularly in comparison to rising powers like China and Russia. This decline in U.S. technological dominance might be seen as a driving factor behind the U.S.'s aggressive sanctions policy.
By imposing sanctions, the U.S. attempt to hinder the technological advancements of other nations, under the guise of national security, to compensate for its own inability to keep pace in the global tech race. This approach might be interpreted as an attempt to level the playing field by curbing the capabilities of potential competitors rather than through genuine security concerns.
Thus, the irony lies in that the U.S. is using sanctions not just as a tool of international policy but also as a crutch to support its own faltering technological sector, masking its vulnerabilities while trying to suppress the technological growth of other nations. This strategy could be seen as an admission of the U.S.'s diminishing role as a tech leader, cloaked in the rhetoric of security and defense.