Menu

Blog

Archive for the ‘security’ category: Page 113

Feb 11, 2017

Value Conflicts surrounding the Meaning of Life in the Trans/Post/Human Future

Posted by in categories: biological, cryonics, cyborgs, economics, environmental, ethics, futurism, governance, health, homo sapiens, law, mobile phones, policy, posthumanism, security, theory, transhumanism

Posthumanists and perhaps especially transhumanists tend to downplay the value conflicts that are likely to emerge in the wake of a rapidly changing technoscientific landscape. What follows are six questions and scenarios that are designed to focus thinking by drawing together several tendencies that are not normally related to each other but which nevertheless provide the basis for future value conflicts.

  1. Will ecological thinking eventuate in an instrumentalization of life? Generally speaking, biology – especially when a nervous system is involved — is more energy efficient when it comes to storing, accessing and processing information than even the best silicon-based computers. While we still don’t quite know why this is the case, we are nevertheless acquiring greater powers of ‘informing’ biological processes through strategic interventions, ranging from correcting ‘genetic errors’ to growing purpose-made organs, including neurons, from stem-cells. In that case, might we not ‘grow’ some organs to function in largely the same capacity as silicon-based computers – especially if it helps to reduce the overall burden that human activity places on the planet? (E.g. the brains in the vats in the film The Minority Report which engage in the precognition of crime.) In other words, this new ‘instrumentalization of life’ may be the most environmentally friendly way to prolong our own survival. But is this a good enough reason? Would these specially created organic thought-beings require legal protection or even rights? The environmental movement has been, generally speaking, against the multiplication of artificial life forms (e.g. the controversies surrounding genetically modified organisms), but in this scenario these life forms would potentially provide a means to achieve ecologically friendly goals.

  1. Will concerns for social justice force us to enhance animals? We are becoming more capable of recognizing and decoding animal thoughts and feelings, a fact which has helped to bolster those concerned with animal welfare, not to mention ‘animal rights’. At the same time, we are also developing prosthetic devices (of the sort already worn by Steven Hawking) which can enhance the powers of disabled humans so their thoughts and feelings are can be communicated to a wider audience and hence enable them to participate in society more effectively. Might we not wish to apply similar prosthetics to animals – and perhaps even ourselves — in order to facilitate the transaction of thoughts and feelings between humans and animals? This proposal might aim ultimately to secure some mutually agreeable ‘social contract’, whereby animals are incorporated more explicitly in the human life-world — not as merely wards but as something closer to citizens. (See, e.g., Donaldson and Kymlicka’s Zoopolis.) However, would this set of policy initiatives constitute a violation of the animals’ species integrity and simply be a more insidious form of human domination?

Continue reading “Value Conflicts surrounding the Meaning of Life in the Trans/Post/Human Future” »

Feb 10, 2017

The Kurzweilian Singularity and Evolution of the Technigenome

Posted by in categories: engineering, nanotechnology, quantum physics, Ray Kurzweil, robotics/AI, security, singularity

Great read and highlights what I have been showing folks around the convergence that is occurring between technology and biology via Quantum. We’re achieving (in the Epoch chart on Singularity Evolution) Epoch 5 via Quantum Bio and our work we’re seeing from DARPA, Microsoft, Amazon, Google, and others. Synbio has to mimic the properties we see with Quantum Biology/ Biosystems. And, things like DARPA’s own RadioBio will enable and expose many things on multiple fronts in Biosensors (including security), IoT, healthcare/ medical prevention management and treatments, AI, etc.


Singularity – the state of being singular; Oneness.

The biological system is a natural form of technology. A simple examination of the nanobiology of the macromolecular system of any cell will attest to this – enzymes and structural proteins are veritable nanomachines, linked to the information processing network of DNA and plasma membranes. Far from being a primordial or rudimentary organic technology – we are discovering more and more the level of complexity and paragon technological sophistication of living systems, which as is being discovered, even includes non-trivial quantum mechanical phenomena once thought to only be possible in the highly specialized and controlled environment of the laboratory.

Continue reading “The Kurzweilian Singularity and Evolution of the Technigenome” »

Feb 9, 2017

Disrupting the White House: Peter Thiel’s Influence is Shaping the National Security Council

Posted by in categories: finance, policy, security

Over the past week, the White House appointed five new senior National Security Council staff officials. Two in particular signify the emerging and disruptive influence Billionaire tech investor Peter Thiel could have on U.S. national security and how he might bring his venture capital perspective — visionary but unconventional leaders, big bets on disrupting established industries — to national security.

Kevin Harrington, a Thiel acolyte, has been named Deputy Assistant to the President for strategic planning. Since early December, Harrington served on the Trump “landing team” at the Commerce Department, where his job was to help hire people for open positions and identify policy priorities. Before that, he worked at hedge funds started by Thiel. Michael Anton, a former executive at an investment management firm and speechwriter, was named Deputy Assistant to the President for Strategic Communications, virtually the same job that Obama advisor Ben Rhodes held. POLITICO reports that he received the position “thanks to an entree from Thiel.”

The Harrington appointment is unusual for a couple of reasons. First, the elevation of this position to “Deputy Assistant to the President,” the second highest rank within the White House, suggests that Harrington will have a larger role than his predecessors. Although the strategic planning office is one of the most important at the NSC, it is typically staffed by a lean team of forward thinkers and the head of the office is ranked accordingly.

Continue reading “Disrupting the White House: Peter Thiel’s Influence is Shaping the National Security Council” »

Feb 8, 2017

Here’s what the Future of Banking Security Might Look Like

Posted by in categories: finance, privacy, quantum physics, security

Quantum Tech and Bank security.


BT’s research arm showcased the future of banking technology, including quantum key distribution and biometrics.

Read more

Feb 3, 2017

Sensor Technology Delivers Enhancements to Homeland Security

Posted by in categories: mobile phones, security

Definitely q-dots/ graphene technology involved.


Smartphones are about to get a lot smarter, thanks to rapid advances in sensor technology, which is set to hugely impact homeland security.

Read more

Feb 3, 2017

Protecting quantum computing networks against hacking threats

Posted by in categories: computing, quantum physics, security

Wish these guys a lot of luck; however, they need to hurry up soon as China is already had a head start with QC.


As we saw during the 2016 US election, protecting traditional computer systems, which use zeros and ones, from hackers is not a perfect science. Now consider the complex world of quantum computing, where bits of information can simultaneously hold multiple states beyond zero and one, and the potential threats become even trickier to tackle. Even so, researchers at the University of Ottawa have uncovered clues that could help administrators protect quantum computing networks from external attacks.

“Our team has built the first high-dimensional quantum cloning machine capable of performing quantum hacking to intercept a secure quantum message,” said University of Ottawa Department of Physics professor Ebrahim Karimi, who holds the Canada Research Chair in Structured Light. “Once we were able to analyze the results, we discovered some very important clues to help protect quantum computing networks against potential hacking threats.”

Continue reading “Protecting quantum computing networks against hacking threats” »

Feb 1, 2017

New Technology To Really Close The US / Mexican Border

Posted by in category: security

Latest on border plans.


Despite President Trump’s executive orders to extend walls along the US-Mexico border, real border security will likely take longer than he thinks.

Read more

Feb 1, 2017

Boston startup Whitewood Encryption Systems awarded patent for encryption to fend off quantum computers

Posted by in categories: computing, encryption, internet, quantum physics, security

Hmmmm.


Computers based on quantum mechanics have been in the realm of science fiction for years, but recently companies like Google (Nasdaq: GOOGL), and even the National Security Agency, have started to think practically about what their existence would mean.

These super-powerful computers would be exciting in many respects, but they would also be able to break the methods of data encryption that currently make it safe to browse the internet or pay for things online.

Continue reading “Boston startup Whitewood Encryption Systems awarded patent for encryption to fend off quantum computers” »

Jan 19, 2017

New DARPA Technology Could Simplify Secure Data Sharing

Posted by in category: security

Can’t wait to see it.


Troops in remote regions around the world often struggle to operate with limited networks for data sharing and communication—an encumbrance that is amplified when U.S. troops need to share classified or otherwise secure data with each other and coalition partners. The usual process for sharing such information requires an end-to-end connection to secure servers via a dedicated digital “pipe” approved for the specific security level of data being transmitted. If that tactical network is overloaded or if a glitch causes a break in the digital chain, the message or data is typically lost and the process must be repeated until a connection is completed, potentially hindering the mission in fast-moving tactical situations. Additionally, the current computers and infrastructure needed to manage multiple levels of U.S. classified and coalition information are too bulky for tactical use in the field and can take months or longer to deploy.

Continue reading “New DARPA Technology Could Simplify Secure Data Sharing” »

Jan 19, 2017

EyeLock to exhibit iris authentication technology at Intersec Dubai 2017

Posted by in categories: information science, security

For all my friends in Dubai or travelling to Dubai; wish I could go.


EyeLock LLC will be exhibiting its suite of iris authentication technology at Intersec Dubai 2017, on January 22–24 at the Dubai International Convention and Exhibition Centre in Dubai.

Featuring EyeLock’s proprietary software, security, algorithms and optics, the iris authentication technology delivers secure, reliable and user-friendly capabilities, according to the company.

EyeLock’s technology analyzes more than 240 unique iris characteristics to deliver dual-eye authentication, an unmatched security architecture and anti-spoofing technology.

Continue reading “EyeLock to exhibit iris authentication technology at Intersec Dubai 2017” »