Toggle light / dark theme

The Pentagon has quietly put out a call for vendors to bid on a contract to develop, execute and manage its new cyber weaponry and defense program. The scope of this nearly half-billion-dollar “help wanted” work order includes counterhacking, as well as developing and deploying lethal cyberattacks — sanctioned hacking expected to cause real-life destruction and loss of human life.

In June 2016, work begins under the Cyberspace Operations Support Services contract (pdf) under CYBERCOM (United States Cyber Command). The $460 million project recently came to light and details the Pentagon’s plan to hand over its IT defense and the planning, development, execution, management, integration with the NSA, and various support functions of the U.S. military’s cyberattacks to one vendor.

While not heavily publicized, it’s a surprisingly public move for the Pentagon to advertise that it’s going full-on into a space that has historically been kept behind closed doors. Only this past June, the Department of Defense Law of War Manual (pdf) was published for the first time ever and included Cyber Operations under its own section — and, controversially, a section indicating that cyber-weapons with lethal outcomes are sanctioned by Pentagon doctrine.

Read more

Official video for PostHuman — produced by Colliculi Productions.
Animated sci-fi thriller short film featuring the voice of Tricia Helfer (Battlestar Galactica). Directed by Cole Drumb. Produced by Jennifer Wai-Yin Luk.

Production company: Colliculi Productions.
Animation studio: Humouring The Fates.
Voice of Kali: Tricia Helfer.
Voice of Terrence: Ulric Dihle.
Original Music: Neill Sanford Livingston.
Post Production Sound: Kid Dropper Sound.
Final Post Production Sound: Bad Animals.
Final Video Post Production: Lightpress.

Set in an adrenalized future of espionage, assassins, and out of control super science, PostHuman follows a genius hacker and his dog as they help an enigmatic young woman to free the remaining test subject of a black ops ESP test lab.

http://posthumanthemovie.com/
https://www.facebook.com/PostHumanTheMovie
https://twitter.com/PostHumanFilm
https://twitter.com/JenWLuk
https://twitter.com/ColeDrumb
http://www.imdb.com/title/tt2091950/
http://posthumanthemovie.tumblr.com/

Awards:
Screamfest 2012 — Best Animated Short.
Maelstrom International Fantastic Film Festival 2012 — Best Animation Short.

Arizona Underground Film Festival 2012 — Best Animation Short.

Having significantly damaged nerve tissue is bad for a lot of reasons because it doesn’t regenerate easily and it can lead to various serious medical conditions including paralysis. But many scientists are already studying ways of fixing this issue, and a team of researchers from the University of Minnesota, Virginia Tech, University of Maryland, Princeton University, and Johns Hopkins University has figured out how to use 3D printing for nerve growth.

DON’T MISS: 85 legitimate iPhone apps that were infected with malware in the big App Store hack

The technology they’ve developer has allowed them to regrow nerve tissue in lab rats and restore normal walking ability 10 to 12 weeks after the 3D printed guide was implanted.

Read more

China is set to complete the installation of the world’s longest quantum communication network stretching 2,000km (1,240miles) from Beijing to Shanghai by 2016, say scientists leading the project. Quantum communications technology is considered to be “unhackable” and allows data to be transferred at the speed of light.

By 2030, the Chinese network would be extended worldwide, the South China Morning Post reported. It would make the country the first major power to publish a detailed schedule to put the technology into extensive, large-scale use.

The development of quantum communications technology has accelerated in the last five years. The technology works by two people sharing a message which is encrypted by a secret key made up of quantum particles, such as polarized photons. If a third person tries to intercept the photons by copying the secret key as it travels through the network, then the eavesdropper will be revealed by virtue of the laws of quantum mechanics – which dictate that the act of interfering with the network affects the behaviour of the key in an unpredictable manner.

Read more