Menu

Blog

Archive for the ‘security’ category

Oct 25, 2021

Artificial Intelligence Is Transforming Biotechnology, Especially When It Comes To Innovations In Nitric Oxide

Posted by in categories: biotech/medical, life extension, robotics/AI, security

Recent advancements in biotechnology have immense potential to help address many global problems; climate change, an aging society, food security, energy security, and infectious diseases.

Biotechnology is not to be confused with the closely related field of biosciences. While biosciences refer to all the sciences that study and understand life, biology, and biological organisms, biotechnology refers to the application of the knowledge of biosciences and other technologies to develop tech and commercial products. Biotechnology is the application of innovation to biosciences in a bid to solve real-world medical problems.

Throw Artificial Intelligence into the mix and we suddenly have a really interesting pot of broth. Several AI trends have already proven beneficial to the development of biotechnology. Dr. Nathan S. Bryan, an inventor, biochemist and professor, who made a name for himself as an innovator and pioneer in nitric oxide drug discovery, commercialization, and molecular medicine, offers his insights on these contributions.

Oct 24, 2021

NATO releases first-ever strategy for Artificial Intelligence

Posted by in categories: biotech/medical, information science, law, policy, quantum physics, robotics/AI, security

The strategy outlines how AI can be applied to defence and security in a protected and ethical way. As such, it sets standards of responsible use of AI technologies, in accordance with international law and NATO’s values. It also addresses the threats posed by the use of AI by adversaries and how to establish trusted cooperation with the innovation community on AI.

Artificial Intelligence is one of the seven technological areas which NATO Allies have prioritized for their relevance to defence and security. These include quantum-enabled technologies, data and computing, autonomy, biotechnology and human enhancements, hypersonic technologies, and space. Of all these dual-use technologies, Artificial Intelligence is known to be the most pervasive, especially when combined with others like big data, autonomy, or biotechnology. To address this complex challenge, NATO Defence Ministers also approved NATO’s first policy on data exploitation.

Individual strategies will be developed for all priority areas, following the same ethical approach as that adopted for Artificial Intelligence.

Oct 21, 2021

Deep North, which uses AI to track people from camera footage, raises $16.7M

Posted by in categories: biotech/medical, information science, robotics/AI, security

Deep North, a Foster City, California-based startup applying computer vision to security camera footage, today announced that it raised $16.7 million in a Series A-1 round. Led by Celesta Capital and Yobi Partners, with participation from Conviction Investment Partners, Deep North plans to use the funds to make hires and expand its services “at scale,” according to CEO Rohan Sanil.

Deep North, previously known as Vmaxx, claims its platform can help brick-and-mortar retailers “embrace digital” and protect against COVID-19 by retrofitting security systems to track purchases and ensure compliance with masking rules. But the company’s system, which relies on algorithms with potential flaws, raises concerns about both privacy and bias.

Full Story:

Oct 19, 2021

Validation of Covert Cognizance Active Defenses

Posted by in categories: mathematics, nuclear energy, robotics/AI, security, space

(2021). Nuclear Science and Engineering: Vol. 195 No. 9 pp. 977–989.


Earlier work has demonstrated the theoretical development of covert OT defenses and their application to representative control problems in a nuclear reactor. Given their ability to store information in the system nonobservable space using one-time-pad randomization techniques, the new C2 modeling paradigm6 has emerged allowing the system to build memory or self-awareness about its past and current state. The idea is to store information using randomized mathematical operators about one system subcomponent, e.g., the reactor core inlet and exit temperature, into the nonobservable space of another subcomponent, e.g., the water level in a steam generator, creating an incorruptible record of the system state. If the attackers attempt to falsify the sensor data in an attempt to send the system along an undesirable trajectory, they will have to learn all the inserted signatures across the various system subcomponents and the C2 embedding process.

We posit that this is extremely unlikely given the huge size of the nonobservable space for most complex systems, and the use of randomized techniques for signature insertion, rendering a level of security that matches the Vernam-Cipher gold standard. The Vernam Cipher, commonly known as a one-time pad, is a cipher that encrypts a message using a random key (pad) and can only be decrypted using this key. Its strength is derived from Shannon’s notion of perfect secrecy 8 and requires the key to be truly random and nonreusable (one time). To demonstrate this, this paper will validate the implementation of C2 using sophisticated AI tools such as long short-term memory (LSTM) neural networks 9 and the generative adversarial learning [generative adversarial networks (GANs)] framework, 10 both using a supervised learning setting, i.e., by assuming that the AI training phase can distinguish between original data and the data containing the embedded signatures. While this is an unlikely scenario, it is assumed to demonstrate the resilience of the C2 signatures to discovery by AI techniques.

Continue reading “Validation of Covert Cognizance Active Defenses” »

Oct 17, 2021

What Role Can Artificial Intelligence Play in Fixing the Security Skills Shortage?

Posted by in categories: education, robotics/AI, security

Demand for highly desirable digital skills is hitting new heights. A recent Learning and Work Institute report noted that one in four (27%) employers now need the majority of their workers to have in-depth specialist knowledge in one or more technology areas. And 60% of those surveyed expect their reliance on advanced digital skills to increase over the next five years.

The skills gap is particularly prevalent in the security tech sector. A global study from the Center for Cyber Safety and Education predicted a terrifying shortage of 1.8 million security workers by 2022. This is made worse by the number of young people taking IT-related GCSEs in the UK, falling by 40% since 2015 (according to Learning and Work Institute data).

This scarcity of qualified professionals has inflated salaries, making it hard for firms that cannot afford to offer large paychecks and grand benefit packages to secure top talent.

Oct 10, 2021

The Security Challenge Of Protecting Smart Cities

Posted by in categories: government, security

Creating and building a “Secure Smart City” requires strong Private Public Partnerships that incorporate people, policies, processes and technology from both government and industry into the overall strategy process.

Oct 9, 2021

AI Weekly: EU facial recognition ban highlights need for U.S. legislation

Posted by in categories: food, government, information science, law enforcement, privacy, robotics/AI, security, terrorism

This week, The European Parliament, the body responsible for adopting European Union (EU) legislation, passed a non-binding resolution calling for a ban on law enforcement use of facial recognition technology in public places. The resolution, which also proposes a moratorium on the deployment of predictive policing software, would restrict the use of remote biometric identification unless it’s to fight “serious” crime, such as kidnapping and terrorism.

The approach stands in contrast to that of U.S. agencies, which continue to embrace facial recognition even in light of studies showing the potential for ethnic, racial, and gender bias. A recent report from the U.S. Government Accountability Office found that 10 branches including the Departments of Agriculture, Commerce, Defense, and Homeland Security plan to expand their use of facial recognition between 2020 and 2023 as they implement as many as 17 different facial recognition systems.

Commercial face-analyzing systems have been critiqued by scholars and activists alike throughout the past decade, if not longer. The technology and techniques — everything from sepia-tinged film to low-contrast digital cameras — often favor lighter skin, encoding racial bias in algorithms. Indeed, independent benchmarks of vendors’ systems by the Gender Shades project and others have revealed that facial recognition technologies are susceptible to a range of prejudices exacerbated by misuse in the field. For example, a report from Georgetown Law’s Center on Privacy and Technology details how police feed facial recognition software flawed data, including composite sketches and pictures of celebrities who share physical features with suspects.

Continue reading “AI Weekly: EU facial recognition ban highlights need for U.S. legislation” »

Oct 4, 2021

Quenching the world’s thirst with off-grid water desalination

Posted by in categories: security, sustainability

Desalination is the answer to long-term water security, but it’s also expensive and energy-intensive. The good news is that scientists are developing some viable solutions.

The first plant in Europe was built in Spain nearly a half century ago. Since then, facilities have sprung up in water-stressed regions throughout Europe. Just a few years ago, the residents of the small Greek island of Ikaria finally got access to an abundant source of clean drinking water—all thanks to a new desalination plant.

Continue reading “Quenching the world’s thirst with off-grid water desalination” »

Oct 1, 2021

Chinese espionage group deploys new rootkit compatible with Windows 10 systems

Posted by in categories: computing, security

At the SAS 2021 security conference today, analysts from security firm Kaspersky Lab have published details about a new Chinese cyber-espionage group that has been targeting high-profile entities across South East Asia since at least July 2020.

Named GhostEmperor, Kaspersky said the group uses highly sophisticated tools and is often focused on gaining and keeping long-term access to its victims through the use of a powerful rootkit that can even work on the latest versions of Windows 10 operating systems.

“We observed that the underlying actor managed to remain under the radar for months,” Kaspersky researchers explained today.

Continue reading “Chinese espionage group deploys new rootkit compatible with Windows 10 systems” »

Sep 22, 2021

The U.S. Is Losing the Global Race to Decide the Future of Money —and It Could Doom the Almighty Dollar

Posted by in categories: cryptocurrencies, economics, security

What must the US do Eric Klien?


Read More: How China’s Digital Currency Could Challenge the Almighty Dollar

China has already largely moved away from coin and paper currency; Chinese consumers have racked up more than $41 trillion in mobile transactions, according to a recent research paper from the Brookings Institution, with the lion’s share (92%) going through digital payment processors WeChat Pay and Alipay.

Continue reading “The U.S. Is Losing the Global Race to Decide the Future of Money —and It Could Doom the Almighty Dollar” »

Page 1 of 8212345678Last