Blog

Archive for the ‘privacy’ category

Apr 16, 2018

Team develops face recognition technology that works in the dark

Posted by in categories: military, privacy, robotics/AI, surveillance

Army researchers have developed an artificial intelligence and machine learning technique that produces a visible face image from a thermal image of a person’s face captured in low-light or nighttime conditions. This development could lead to enhanced real-time biometrics and post-mission forensic analysis for covert nighttime operations.

Thermal cameras like FLIR, or Forward Looking Infrared, sensors are actively deployed on aerial and ground vehicles, in watch towers and at check points for surveillance purposes. More recently, thermal cameras are becoming available for use as body-worn cameras. The ability to perform automatic face recognition at nighttime using such thermal cameras is beneficial for informing a Soldier that an individual is someone of interest, like someone who may be on a watch list.

The motivations for this technology—developed by Drs. Benjamin S. Riggan, Nathaniel J. Short and Shuowen “Sean” Hu, from the U.S. Army Research Laboratory—are to enhance both automatic and human-matching capabilities.

Continue reading “Team develops face recognition technology that works in the dark” »

Apr 13, 2018

12 Futuristic Technologies That Could Become Reality in 2018

Posted by in categories: business, privacy, robotics/AI, transportation

In the last year, the business and consumer markets alike have seen the release of advanced technologies that were once considered the stuff of science fiction. Smart gadgets that control every facet of your home, self-driving vehicles, facial and biometric identification systems and more have begun to emerge, giving us a glimpse of the high-tech reality we’re moving towards.

To find out which futuristic technologies are on the horizon, we asked a panel of YEC members the following question:

Read more

Mar 30, 2018

All visa applicants will have to disclose social media accounts after new proposal

Posted by in category: privacy

Unveiled in the Federal Register today, new visa forms would require any Facebook and Twitter screennames used in the last five years.

Read more

Mar 9, 2018

Biometric Data And The Rise Of Digital Dictatorship

Posted by in categories: futurism, privacy

Is humanity doomed? Are we one of the last generations of homo sapiens — soon to be supplanted by engineered cyberbeings, with a distant semblance to their creators (us)?

On Jan. 24, historian and international best-selling author Yuval Noah Harari presented his view of the future at the World Economic Forum in Davos, Switzerland. Harari wrote Sapiens: A Brief History of Humankind and also Homo Deus: A Brief History of Tomorrow.

In a riveting 25-minute presentation, Harari painted a very gloomy — but possible — view of the future, based on his thesis that we are now in our third grand revolution: the control of data, following the control of land (Agrarian Revolution) and the control of machinery (Industrial Revolution). The point of no return, Harari contends, will happen when technology will be able to extract high-precision biometric data from people and report back to a centralized decision-making control system, owned by governments or by corporations — or both. By biometric, he means your pulse, pressure, sweat composition, dilation of your pupils, etc.: kind of a lie-detector on steroids.

Continue reading “Biometric Data And The Rise Of Digital Dictatorship” »

Mar 6, 2018

The increasing use of artificial intelligence is stoking privacy concerns in China

Posted by in categories: economics, privacy, robotics/AI

State broadcaster China Central Television (CCTV) and Tencent Research surveyed 8.000 respondents on their attitudes toward AI as part of CCTV’s China Economic Life Survey. The results show that 76.3 per cent see certain forms of AI as a threat to their privacy, even as they believe that AI holds much development potential and will permeate different industries. About half of the respondents said that they believe AI is already affecting their work life, while about a third see AI as a threat to their jobs.


A China Central Television and Tencent Research survey found that three in four respondents are worried about the threat that artificial intelligence poses to their privacy.

Read more

Feb 17, 2018

Worldwide AI consciousness may replace human speech

Posted by in categories: privacy, robotics/AI

In just 32 years, humans won’t speak to each other and will instead communicate through a worldwide consciousness instead – using just our brains — new research shows.

According to artificial intelligence research, this “hybrid intelligence” will understand the feelings of the people connected to it, and use their minds to help it grow.

Called HIBA, which stands for Hybrid Intelligence Biometric Avatar, it will take on the personas of its users, exchange information with them and become part of the very fabric of the human brain.

Continue reading “Worldwide AI consciousness may replace human speech” »

Feb 17, 2018

Japanese researchers develop ultrathin, highly elastic skin display

Posted by in categories: biotech/medical, health, mobile phones, privacy, wearables

A new ultrathin elastic display that fits snugly on the skin can show the moving waveform of an electrocardiogram recorded by a breathable, on-skin electrode sensor. Combined with a wireless communication module, this integrated biomedical sensor system, called “skin electronics,” can transmit biometric data to the cloud.

This latest research by a Japanese academic-industrial collaboration, led by Professor Takao Someya at the University of Tokyo’s Graduate School of Engineering, is slated for a news briefing and talk at the AAAS Annual Meeting in Austin, Texas on February 17th.

Thanks to advances in semiconductor technology, wearable devices can now monitor health by measuring vital signs or taking an electrocardiogram, and then transmitting the data wirelessly to a smartphone. The readings or electrocardiogram waveforms can be displayed on the screen in real time, or sent to the cloud or a memory device where the information is stored.

Continue reading “Japanese researchers develop ultrathin, highly elastic skin display” »

Jan 28, 2018

How the (Likely) Next NSA/CyberCom Chief Wants to Enlist AI

Posted by in categories: cybercrime/malcode, military, privacy, robotics/AI

A look at Lt. Gen. Paul Nakasone’s public statements about artificial intelligence, offense, and defense.

The Army general likely to be tapped to head U.S. Cyber Command and the NSA has some big plans for deploying cyber forces and using artificial intelligence in information attacks.

Lt. Gen. Paul Nakasone, who currently leads U.S. Army Cyber Command, is expected to nominated in the next few months to replace Adm. Michael Rogers, as first reported by The Cipher Brief (and confirmed by the Washington Post and a Pentagon source of our own). But caution is in order: the rumor mill says several other contenders are in the running, including Army Lt. Gen. William Mayville. Neither Cyber Command nor the Pentagon would comment about the potential nomination.

Continue reading “How the (Likely) Next NSA/CyberCom Chief Wants to Enlist AI” »

Jan 12, 2018

The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators

Posted by in categories: encryption, military, privacy

DISA director Lt. Gen. Alan Lynn talks about the tech he’s eyeing, some of which is barely out of the theoretical realm.

Tomorrow’s soldiers will wield encrypted devices that unlock to their voices, or even their particular way of walking, and communicate via ad-hoc, software-defined networks that use not radio waves but light according to Lt. Gen. Alan Lynn, who leads the Defense Information Systems Agency, the U.S. military’s IT provider. On Tuesday, Lynn talked about next-generation technologies that DISA is looking into, some of which are barely experimental today.

Here are few of the key areas:

Continue reading “The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators” »

Dec 10, 2017

The WIRED Guide to Digital Security

Posted by in categories: cybercrime/malcode, mobile phones, privacy

IN AN AGE of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.


In an age of nonstop breaches and hacks, getting a handle on your own digital security matters more than ever. But everyone has their own threat model—a set of concerns unique to themselves. The average smartphone user doesn’t need to know what a Faraday cage is; an NSA contractor probably already has a good grasp of security basics. (Or … do they?) In this guide, we’ve included a few ways to improve your online security posture based on those different levels of risk. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.

Read more

Page 1 of 1412345678Last