Toggle light / dark theme

Adjuncting has grown as funding for public universities has fallen by more than a quarter between 1990 and 2009. Private institutions also recognize the allure of part-time professors: generally they are cheaper than full-time staff, don’t receive benefits or support for their personal research, and their hours can be carefully limited so they do not teach enough to qualify for health insurance.


Adjunct professors in America face low pay and long hours without the security of full-time faculty. Some, on the brink of homelessness, take desperate measures.

Read more

In a mind-boggling world first, a team of biologists and security researchers have successfully infected a computer with a malicious program coded into a strand of DNA.

It sounds like science fiction, but I assure you it’s quite real — although you probably don’t have to worry about this particular threat vector any time soon. That said, the possibilities suggested by this project are equally fascinating and terrifying to contemplate.

The multidisciplinary team at the University of Washington isn’t out to make outlandish headlines, although it’s certainly done that. They were concerned that the security infrastructure around DNA transcription and analysis was inadequate, having found elementary vulnerabilities in open-source software used in labs around the world. Given the nature of the data usually being handled, this could be a serious problem going forward.

Read more

SAN FRANCISCO (AP) — Security guard Eric Leon watches the Knightscope K5 security robot as it glides through the mall, charming shoppers with its blinking blue and white lights. The brawny automaton records video and sounds alerts. According to its maker, it deters mischief just by making the rounds.

Leon, the all-too-human guard, feels pretty sure that the robot will someday take his job.

“He doesn’t complain,” Leon says. “He’s quiet. No lunch break. He’s starting exactly at 10.”

Read more

Nigerian Oshi Agabi has unveiled a computer based not on silicon but on mice neurons at the TEDGlobal conference in Tanzania.

The system has been trained to recognise the smell of explosives and could be used to replace traditional airport security, he said.

Eventually the modem-sized device — dubbed Koniku Kore — could provide the brain for future robots.

Read more

My new Op-Ed for The San Francisco Chronicle: http://www.sfchronicle.com/opinion/openforum/article/Chip-im…003194.php #transhumanism


Wisconsin company Three Square Market recently announced it will become the first U.S. company to offer its employees chip implants that can be scanned at security entrances, carry medical information and even purchase candy in some vending machines. A company in Europe already did this last year.

For many people, it sounds crazy to electively have a piece of technology embedded in their body simply for convenience’s sake. But a growing number of Americans are doing it, including me.

I got my RFID implant two years ago, and now I use it to send text messages, bypass security codes on my computer, and open my front door. Soon I’ll get the software to start my car, and then my life will be totally keyless.

The risk factor is that iCarbonX is handling more than personal data, but potentially vulnerable data as the company uses a smartphone application, Meum, for customers to consult for health advice. Remember that the Chinese nascent genomics and AI industry relies on cloud computing for genomics data-storage and exchange, creating, in its wake, new vulnerabilities associated with any internet-based technology. This phenomenon has severe implications. How much consideration has been given to privacy and the evolving notion of personal data in this AI-powered health economy? And is our cyberinfrastructure ready to protect such trove of personal health data from hackers and industrial espionage? In this new race, will China and the U.S. have to constantly accelerate their rate of cyber and bio-innovation to be more resilient? Refining our models of genomics data protection will become a critical biosecurity issue.

Why is Chinese access to U.S. genomic data a national security concern?

Genomics and computing research is inherently dual-use, therefore a strategic advantage in a nation’s security arsenal.

Read more

Zero-day vulnerabilities targeting popular secure messenger applications, like Signal, Telegram and WhatsApp, can fetch payments of up to $500,000 from Zerodium, a buyer and seller of zero-day research, based on a newly released list of available awards offered by the U.S. firm.

The market for zero-day vulnerabilities — an undisclosed software security hole that can be exploited by hackers — is notoriously rich and murky. Traders tend to operate away from public scrutiny for a number of reasons that make it difficult to learn about the market.

Although Zerodium isn’t known for the transparency of its business, the company’s listings for vulnerabilities provides a window into the supply and demand behind the vulnerability resale industry.

Read more

It’s getting too easy to create dangerous viruses. The upcoming national biodefense strategy should ensure that scientific journals don’t help terrorists learn how.

The news that researchers have recreated an extinct cousin to the smallpox virus using only commercially available technology and items purchased over the Internet renews concerns that bioterrorists could do the same if detailed information about the methods were published. Here’s the problem: scientific journals are geared toward publication, often without sufficient understanding of the public-security risks. We need a better system to ensure that information that could help bad actors stays unpublished.

It took David Evans’ team of scientists at the University of Alberta in Edmonton, Canada, about six months and $100,000 to recreate the horsepox virus, a close relative of the smallpox virus that killed perhaps 300 million people in the 20th century before it was eradicated in 1980. In a summary of the research, the World Health Advisory Committee on Variola Virus Research wrote that “recreation of such viral genomes did not require exceptional biochemical knowledge or skills, significant funds, or significant time.”

Read more

With sufficient training on digitized writing, spoken words, images, video streams and other digital content, ML has become the basis of voice recognition, self-driving cars, and other previously only-imagined capabilities. As billions of phones, appliances, drones, traffic lights, security systems, environmental sensors, and other radio-connected devices sum into a rapidly growing Internet of Things (IoT), there now is a need to apply ML to the invisible realm of radio frequency (RF) signals, according to program manager Paul Tilghman of DARPA’s Microsystems Technology Office. To further that cause, DARPA today announced its new Radio Frequency Machine Learning Systems (RFMLS) program. Find out more: http://www.darpa.mil/news-events/2017-08-11a

Read more