Menu

Blog

Archive for the ‘security’ category: Page 139

Oct 20, 2015

GAO Reports: The Internet of Things — FAQs

Posted by in categories: futurism, internet, privacy, security, virtual reality, wearables

I think about pros and cons of living in a connected world … think about it …sometimes the answer it is not so simple, nor unique.

http://www.fas.org/sgp/crs/misc/R44227.pdf by Eric A. Fischer — Senior Specialist in Science and Technology, October 13, 2015

Oct 20, 2015

U.S. Plans $6 Billion Investment in Space Situational Awareness

Posted by in categories: business, military, satellites, science, security, space, surveillance

http://spacenews.com/planned-u-s-investment-in-space-awarene…PqrOS.dpuf

Oct 16, 2015

Experts Warn UN Panel About the Dangers of Artificial Superintelligence

Posted by in categories: materials, robotics/AI, security

https://www.youtube.com/watch?v=W9N_Fsbngh8

During a recent United Nations meeting about emerging global risks, political representatives from around the world were warned about the threats posed by artificial intelligence and other future technologies.

The event, organized by Georgia’s UN representatives and the UN Interregional Crime and Justice Research Institute (UNICRI), was set up to foster discussion about the national and international security risks posed by new technologies, including chemical, biological, radiological, and nuclear (CBRN) materials.

Continue reading “Experts Warn UN Panel About the Dangers of Artificial Superintelligence” »

Oct 14, 2015

Nick Bostrom sets out threats from future technologies at UN meeting

Posted by in categories: education, materials, robotics/AI, security

Professor Nick Bostrom briefed political representatives from around the world on the national and international security risks posed by artificial intelligence and other future technologies at a UN event last week.

Professor Bostrom, Director of the Future of Humanity Institute, Oxford Martin School, was invited to speak at a special side event examining the challenges posed by chemical, biological, radiological and nuclear (CBRN) materials and weapons, held during the UN’s 2015 General Assembly meeting.

The event was organised by Georgia’s UN representatives, in collaboration with the United Nations Interregional Crime and Justice Research Institute (UNICRI), with the aim of understanding the implications of new technologies, ensuring responsible development and mitigating against misuse.

Read more

Sep 19, 2015

This Is How Much Food It Would Take to End World Hunger

Posted by in categories: food, security

There are over 500 million hungry people in the world—but that number only tells part of the story. The other part of it is the amount of the actual food shortfall. So how much food would we need to make up the gap? There’s now an exact number.

The latest International Food Security report is out, and the good news is that global food insecurity has been falling—and it’s projected to keep on doing that over the next 10 years. The bad news? It’s not falling everywhere. Sub-Saharan Africa is especially being shut out of these gains.

But how much food would it take to close the gap for every food insecure person on the planet to have access to 2,100 calories a day? The USDA has calculated a figure: 11.8 million tons of grain.

Read more

Sep 10, 2015

Blockchain & Artificial Intelligence

Posted by in categories: bitcoin, electronics, entertainment, existential risks, internet, lifeboat, robotics/AI, security

A piece I wrote recently about blockchain & AI, and how I see the Lifeboat Foundation as a crucial component in a bright future.


Blockchain technology could lead to an AI truly reminiscent of the human brain, with less of its frailties, and more of its strengths. Just as a brain is not inherently dictated by a single neuron, neither is the technology behind bitcoin. The advantage (and opportunity) in this sense, is the advent of an amalgamation of many nodes bridged together to form an overall, singular function. This very much resembles the human brain (just as billions of neurons and synapses work in unison). If we set our sights on the grander vision of things, humans could accomplish great things if we utilize this technology to create a truly life-like Artificial Intelligence. At the same time, we need to keep in mind the dangers of such an intelligence being built upon a faultless system that has no single point of failure.

Just as any technology has upsides and corresponding downsides, this is no exception. The advantages of this technology are seemingly endless. In the relevant sense, it has the ability to create internet services without the same downfalls exploited in the TV show ‘Mr. Robot,’ where a hacker group named “fsociety” breached numerous data centers and effectively destroyed every piece of data the company held, causing worldwide ramifications across all of society. Because blockchain technology ensures no centralized data storage (by using all network users as nodes to spread information), it can essentially be rendered impossible to take down. Without a single targeted weak point, this means a service that, in the right hands, doesn’t go offline from heavy loads, which speeds up as more people use it, has inherent privacy/security safeguards, and unique features that couldn’t be achieved with conventional technology. In the wrong hands, however, this could be outright devastation. Going forward, we must tread lightly and not forget to keep tabs on this technology, as it could run rampant and destroy society as we know it.

Continue reading “Blockchain & Artificial Intelligence” »

Sep 8, 2015

Nanotubes open new path toward quantum information technologies

Posted by in categories: computing, materials, nanotechnology, quantum physics, security

“Beyond implementation of quantum communication technologies, nanotube-based single photon sources could enable transformative quantum technologies including ultra-sensitive absorption measurements, sub-diffraction imaging, and linear quantum computing. The material has potential for photonic, plasmonic, optoelectronic, and quantum information science applications…”


In optical communication, critical information ranging from a credit card number to national security data is transmitted in streams of laser pulses. However, the information transmitted in this manner can be stolen by splitting out a few photons (the quantum of light) of the laser pulse. This type of eavesdropping could be prevented by encoding bits of information on quantum mechanical states (e.g. polarization state) of single photons. The ability to generate single photons on demand holds the key to realization of such a communication scheme.

By demonstrating that incorporation of pristine into a silicon dioxide (SiO2) matrix could lead to creation of solitary oxygen dopant state capable of fluctuation-free, room-temperature single , Los Alamos researchers revealed a new path toward on-demand single photon generation. Nature Nanotechnology published their findings.

Read more

Aug 31, 2015

Quantum revolution: China set to launch ‘hack proof’ quantum communications network

Posted by in categories: cybercrime/malcode, particle physics, security

China is set to complete the installation of the world’s longest quantum communication network stretching 2,000km (1,240miles) from Beijing to Shanghai by 2016, say scientists leading the project. Quantum communications technology is considered to be “unhackable” and allows data to be transferred at the speed of light.

By 2030, the Chinese network would be extended worldwide, the South China Morning Post reported. It would make the country the first major power to publish a detailed schedule to put the technology into extensive, large-scale use.

The development of quantum communications technology has accelerated in the last five years. The technology works by two people sharing a message which is encrypted by a secret key made up of quantum particles, such as polarized photons. If a third person tries to intercept the photons by copying the secret key as it travels through the network, then the eavesdropper will be revealed by virtue of the laws of quantum mechanics – which dictate that the act of interfering with the network affects the behaviour of the key in an unpredictable manner.

Read more

Aug 30, 2015

AI Dangerous for Economics? The Other Threat Flying Under Radars

Posted by in categories: economics, machine learning, security

Dr. Nils J. Nilsson spent almost a lifetime in the field of Artificial Intelligence (AI) before writing and publishing his book, The Quest for Artificial Intelligence (2009). I recently had the opportunity to speak with the former Stanford computer science professor, now retired at the age of 82, and reflect on the earlier accomplishments that have led to some of the current trends in AI, as well as the serious economic and security considerations that need to be made about AI as society moves ahead in the coming decades.

The Early AI that Powers Today’s Trends

One key contribution of early AI developments included rules-based expert systems, such as MYCIN, which was developed in the mid-1970s by Ted Shortliffe and colleagues at Stanford University. The information built into the diagnostic system was gleaned from medical diagnosticians, and the system would then ask questions based on that information. A person could then type in answers about a patient’s tests, symptoms, etc., and the program would then attempt to diagnose diseases and prescribe therapy.

“Bringing us more up to the future was the occurrence of huge databases (in the 1990s) — sometimes called big data — and the ability of computers to mine that data and find information and make inferences,” remarks Nils. This made possible the new work on face recognition, speech recognition, and language translation. “AI really had what might be called a take off at this time.” Both of these technologies also feed into the launch of IBM’s Watson Healthcare, which combines advanced rules-based systems with big data capabilities and promises to give healthcare providers access to powerful tools in a cloud-based data sharing hub.

Work in neural networks, another catalyst, went through two phases, an earlier phase in the 1950s and 1960s and a latter phase in the 1980s and 1990s. “The second phase (of neural networks) allowed…people to make changes in the connected strength in those networks and multiple layers, and this allowed neural networks that can steer and drive automobiles.” More primitive networks led to the cutting-edge work being done by today’s scientists in the self-driven automobile industry via companies like Tesla and Google.

Continue reading “AI Dangerous for Economics? The Other Threat Flying Under Radars” »

Aug 13, 2015

Dropbox now lets you log in with a USB key for universal 2nd factor authentication

Posted by in category: security

Dropbox today announced that it has started to allow users to log in using USB keys as a universal second factor (U2F) of authentication.

U2F, a protocol promoted by the FIDO Alliance, isn’t the most trendy form of secure authentication for consumer web services. What’s far more common is two-factor authentication that you can sign on with by entering a code that’s sent to your phone. Dropbox already allows its users to do that, but now it’s gone further.

“After typing in your password, just insert your key into a USB port when you’re prompted, instead of typing in a six-digit code,” Dropbox’s Patrick Heim and Jay Patel wrote in a blog post today. “And unlike two-step with a phone, you’ll never have to worry about your battery going dead when you use a security key.”

Read more