HOUSE_OVERSIGHT_018370.jpg

Extraction Summary

4
People
4
Organizations
5
Locations
1
Events
2
Relationships
4
Quotes

Document Information

Type: Book excerpt / congressional oversight record
File Size:
Summary

This document appears to be page 138 from a book (likely 'The Seventh Sense' by Joshua Cooper Ramo, based on the content regarding network topology and the 'Seventh Sense instinct') included in a House Oversight Committee file. The text discusses the philosophy of network connectivity, the malleability of distance in a digital world, and cybersecurity concepts like 'rowhammer.' It references researcher Thomas Dullien (aka Halvar Flake) and defines hacking as 'loss of control without change of ownership.'

People (4)

Name Role Context
Thomas Dullien Researcher
Researcher who discovered 'rowhammer' chip hack; quoted regarding network security.
Halvar Flake Speaker
Cited in footnote 200 for a keynote speech; pseudonym for Thomas Dullien.
John May Editor/Author
Cited in footnote 198 as editor of 'Timespace'.
Nigel Thrift Editor/Author
Cited in footnote 198 as editor of 'Timespace'.

Organizations (4)

Name Type Context
Wall Street
Used as an example of changing topology from the 1920s to the present.
U.S. Naval Institute
Publisher of 'Proceedings' cited in footnote 199.
Routledge
Publisher cited in footnote 198.
Area41 Conference
Event cited in footnote 200.

Timeline (1 events)

2014-06-01
Area41 Conference
Zurich

Locations (5)

Location Context
Financial hub mentioned in historical context.
Country mentioned regarding geopolitical interests.
Country mentioned regarding geopolitical interests.
Publication location for citation 198.
Location of the Area41 Conference mentioned in citation 200.

Relationships (2)

Thomas Dullien Same Person / Pseudonym Halvar Flake
Text attributes a quote to Thomas Dullien; Footnote 200 attributes the source of the quote to Halvar Flake.
John May Co-Editors Nigel Thrift
Cited together in footnote 198 as editors of 'Timespace'.

Key Quotes (4)

"The Seventh Sense instinct – the powerful can become useless because of connection, the useless can become powerful"
Source
HOUSE_OVERSIGHT_018370.jpg
Quote #1
"Location is, in a sense, as changeable as velocity."
Source
HOUSE_OVERSIGHT_018370.jpg
Quote #2
"You don’t have to possess an object in order to control it."
Source
HOUSE_OVERSIGHT_018370.jpg
Quote #3
"Being hacked... is loss of control without change of ownership or possession."
Source
HOUSE_OVERSIGHT_018370.jpg
Quote #4

Full Extracted Text

Complete text extracted from the document (3,271 characters)

connected, and by the speed and thickness of that connection. The topology of Wall Street in the 1920s, for instance, was largely defined by who happened to come to the trading floor on a given day; today it is a global landscape, influenced by news, rumors and real-time profit twitches anywhere on the planet. Just like moving a river from one place to another would radically change the utility of a bridge, a change in topology changes the shape of systems that depend on it. That Seventh Sense instinct – the powerful can become useless because of connection, the useless can become powerful – is earned first through a fluency and even faith in these sorts of rapid, fate-changing topological shifts.
In recent years the topologies of our network world have changed at the pace of technology, which is very fast indeed. Every new piece of a network, every new platform or protocol, alters how we connect. This process works on our sense of distance like an efficient, strange sewing machine: Something very far away can be, suddenly, with one stitch of innovation, right on top of you. The speed and the quality of a connection is what determines how honestly “near” or “far” something is. Location is, in a sense, as changeable as velocity.198
Distance, on any living, networked web, is an endlessly pliable sheet. Just as you can bring two distant points on a piece of paper right next to each other by folding the sheet, so you can glue points in networks together by bending the space on which they are connected. A map of the networked world or of nations or even of our city is not some given, settled graph. One small twist and we are, like it or not, right on top of each other. This makes it particularly murderous to hold onto the old idea that you and I are unconnected points. Do countries like America or China have legitimate interests thousands of miles away from their coastlines? Of course.199 In this way, the entire premise of Enlightenment life, the atomic focus on the power of the individual, becomes dangerous.
It is now essential to use virtual topologies to operate in the real world, to bend these ethereal elements of connection to influence and even total control. Thomas Dullien, one of the researchers who discovered that “rowhammer” chip hack captured this in a new law of network security that echoes, in fact, through all of connected life: You don’t have to possess an object in order to control it. “Being hacked,” he explained in a 2011 speech called Why Johnny Can’t Tell If He’s Compromised, “is loss of control without change of ownership or possession.”200 Your phone, resting constantly in your pocket, may in fact be pwned at every keystroke by someone thousands of miles away. This is an extremely important idea, an expression again of how connection changes the nature of an object: It makes it controllable without possession. An army might be able to master an
198 Location: John May and Nigel Thrift eds. Timespace: Geographies of Temporality (London: Routledge, 2001) 2
199 Of course: Distributed Lethality in Proceedings (U.S. Naval Institute) Jan 2015 p. 343
200 “Being hacked”: Halvar Flake, Why Johnny Can’t Tell If He Is Compromised, keynote Area41 Conference, June 2014, Zurich
138
HOUSE_OVERSIGHT_018370

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein document