Toggle light / dark theme

Decentralization of technology and ever cheaper electronics and materials will also bring more risks. Not to mention the serious risks of terrorism.

Here is a less harmful example of what decentralized tech can do.


Using computers they’d built out of discarded electronics and hidden in a closet ceiling, two inmates in an Ohio prison hacked the facility’s network, downloaded porn, and applied for credit cards with stolen information, according to a report released Tuesday (April 11) by Ohio’s inspector general’s office.

The computers were discovered in 2015 after the IT department at the Marion Correctional Institution, a medium-security prison, noticed that a computer on the network had exceeded its daily usage limit. Alerts indicated that the computer had attempted to hack through the network’s controls, but was unsuccessful.

Although a contractor for the prison was logged into the computer in question, the IT department believed someone else was responsible for the breaches, as the flagged activity had taken place outside of working hours. After obtaining the computer’s name and IP address, the IT workers determined it was an unauthorized device, “because part of its computer name, ‘-lab9-,’ fell outside of the numbers assigned to the six known computers used in the PC training area.”

Read more

A new well written but not very favorable write-up on #transhumanism. Despite this, more and more publications are tackling describing the movement and its science. My work is featured a bit.


On the eve of the 20th century, an obscure Russian man who had refused to publish any of his works began to finalize his ideas about resurrecting the dead and living forever. A friend of Leo Tolstoy’s, this enigmatic Russian, whose name was Nikolai Fyodorovich Fyodorov, had grand ideas about not only how to reanimate the dead but about the ethics of doing so, as well as about the moral and religious consequences of living outside of Death’s shadow. He was animated by a utopian desire: to unite all of humanity and to create a biblical paradise on Earth, where we would live on, spurred on by love. He was an immortalist: one who desired to conquer death through scientific means.

Despite the religious zeal of his notions—which a number of later Christian philosophers unsurprisingly deemed blasphemy—Fyodorov’s ideas were underpinned by a faith in something material: the ability of humans to redevelop and redefine themselves through science, eventually becoming so powerfully modified that they would defeat death itself. Unfortunately for him, Fyodorov—who had worked as a librarian, then later in the archives of Ministry of Foreign Affairs—did not live to see his project enacted, as he died in 1903.

Fyodorov may be classified as an early transhumanist. Transhumanism is, broadly, a set of ideas about how to technologically refine and redesign humans, such that we will eventually be able to escape death itself. This desire to live forever is strongly tied to human history and art; indeed, what may be the earliest of all epics, the Sumerian Epic of Gilgamesh, portrays a character who seeks a sacred plant in the black depths of the sea that will grant him immortality. Today, however, immortality is the stuff of religions and transhumanism, and how these two are different is not always clear to outsiders.

Contemporary schemes to beat death usually entail being able to “upload” our minds into computers, then downloading our minds into new, better bodies, cyborg or robot bodies immune to the weaknesses that so often define us in our current prisons of mere flesh and blood. The transhumanist movement—which is many movements under one umbrella—is understandably controversial; in 2004 in a special issue of Foreign Policy devoted to deadly ideas, Francis Fukuyama famously dubbed transhumanism one of the most dangerous ideas in human history. And many, myself included, have a natural tendency to feel a kind of alienation from, if not repulsion towards, the idea of having our bodies—after our hearts stop—flushed free of blood and filled with cryonic nitrogen, suspending us, supposedly, until our minds can be uploaded into a new, likely robotic, body—one harder, better, and faster, as Daft Punk might have put it.

Read more

Everyone knows prevention is better than a cure, and that’s as true for law enforcement as it is for medicine. But there’s little evidence that a growing trend towards “predictive policing” is the answer, and it could even bake in racial bias.

Police departments faced with tight budgets are increasingly turning to machine learning-enabled software that can sift through crime data to help predict where crimes are likely to occur and who might commit them.

Using statistics in law enforcement is nothing new. A statistical system for tracking crime called Compstat was pioneered in New York in 1994 and quickly became popular elsewhere. Since then, crime has fallen 75 percent in New York, which has been credited by some to the technology. But while Compstat simply helped identify historical hotspots, “predictive policing” uses intelligent algorithms to forecast tomorrow’s hotspots and offenders.

Read more

Glad I wasn’t on TOR for a while.


Visitors to more than 10,000 Tor-based websites were met with an alarming announcement this morning: “Hello, Freedom Hosting II, you have been hacked.” A group affiliating itself with Anonymous had compromised servers at Freedom Hosting II, a popular service for hosting websites accessible only through Tor. Roughly six hours after the initial announcement, all the sites hosted by the service are still offline.

In the message, the group offers to sell the compromised data back to Freedom Hosting II in exchange for 0.1 bitcoin, or just over $100, although it is unclear whether the offer is in earnest.

The hackers also claim child pornography made up more than half the data stored on the servers. It’s impossible to verify that claim without seeing the data itself, but it’s consistent with what we know about previous dark-web hosting companies. The original Freedom Hosting was compromised by law enforcement in 2013, resulting in a number of child pornography prosecutions. At the time, the service hosted as many as half of the websites accessible only through Tor, commonly referred to as the Dark Web.

Read more

And, the laws are slowly try to catch up to tech.


SANTA FE, N.M. (Jan. 27, 2017) – A bill introduced in the New Mexico Senate would limit the warrantless use of surveillance drones. The legislation would not only establish important privacy protections at the state level, it would also help thwart the federal surveillance state.

Sen. Gerald Ortiz y Pino (D-Albuquerque) introduced Senate Bill 167 (SB167) on Jan. 19. Titled The Freedom from Unwanted Surveillance Act, the legislation would prohibit federal, state and local law enforcement from using a drone with the intent to gather evidence on private property without a warrant in most cases.

The proposed law would allow for the warrantless drone surveillance when exigent circumstances exist.

Read more

Luv the map; however, missing a lot of info. Namely, many decades and contributors. QC officially recorded to start in 1960 with Stephen Wiesner discovery of a cryptographic tool. And, even modern day QC such as a QC Net has been in existence since late 90s with Los Alamos.

Still nice colored map for a limited view of 2014, 2015, and current. However, I don’t see the ORNL, Oxford, U. of Sydney, China, USC, MIT, etc. breakthroughs most importantly the scalable Quantum, syn. diamonds contribution to enable stable QC and QC Net.


From law enforcement to criminals, governments to insurgents, and activists to Facebook dabblers, many people have come to rely on encryption to protect their digital information and keep their communications secure. But the current forms of encryption could be obsolete the moment anyone succeeds in building a quantum computer. A what! Read on about the brave new world awaiting us.

Quantum Computers and the End of Privacy

Infographic by: www.whoishostingthis.com

Read more

Tune in tomorrow (Thursday, Nov 10, 2016) at 4:30PM Eastern. Find out what Edward Snowden has to say on the future of the US. [Source: StartPage via Engadget]

edward-snowden

American technology policies could change significantly under Donald Trump, and that includes its stance on privacy. How will the new leader alter government surveillance, for example? Edward Snowden might have an answer. The whistleblower and Dutch search engine StartPage are hosting a live event on November 10th at 4:30PM Eastern to address what happens to privacy in the Trump era, among other questions. Snowden speaking engagements are nothing new, but this is special — he’s more than a little familiar with government spying activities, and this is his first chance to opine on how things might be different under a new administration.

Snowden hasn’t said much of anything about the subject as of this writing. However, Trump doesn’t exactly have a stellar record on internet privacy so far. He has proposed reauthorizing the Patriot Act and the previous, less restrained NSA mass surveillance that took place while the Act was in force. He tends to “err on the side of security” over privacy, even if he’s not especially fond of it. As such, Snowden probably won’t have many kind things to say. He’s in favor of more privacy wherever possible, and that could easily put him at greater odds with the US government than he is now.

A Chinese man has been sentenced to three years in a U.S. prison for conspiring to steal high-tech U.S. corn seeds with the intention of transporting them to China, the U.S. Justice Department said on Wednesday.

Mo Hailong, 46, pleaded guilty in January in federal court in Iowa to conspiring to steal patented corn seeds from DuPont Pioneer and Monsanto Co. Mo was employed as director of the international business of the Beijing Dabeinong Technology Group Co Ltd.

(Reporting by Eric Beech; Editing by Mohammad Zargham)

Read more

SEOUL: China is investigating executives of a North Korean bank believed to finance the illicit procurement of arms and materials related to the isolated country’s banned nuclear programme, South Korea’s JoongAng Daily reported on Monday.

China and the United States have agreed to step up cooperation in the U.N. Security Council and in law enforcement channels after North Korea’s fifth nuclear test on Sept. 9, the White House said last week.

While China is North Korea’s sole major ally, it disapproves of its nuclear and missile programmes.

Read more

My new story for VentureBeat on the coming of robot bodyguards. I’ll be speaking about this next week at RoboBusiness 2016, a major robotics conference in San Jose:


I recently consulted with the US Navy on all things “transhuman.” In those conversations about how science and technology can help the human race evolve beyond its natural limits, it was clear that military is keen on replacing human soldiers with both fighting and peacekeeping machines so American military lives never have to come under fire or be in harm’s way.

However, it’s the peacekeeping technology that is particularly interesting for many civilians. While you wouldn’t want an armed Terminator in your home, you might like a robot that travels with you and offers personal protection, like a bodyguard. In a survey by Travelzoo of 6,000 participants, nearly 80 percent of people said they expect robots to be a significant part of their lives by 2020 — and that those robots might even join them on holidays.

The robotics industry is already considering this, and recently debuted some security models. A few months ago China came out with its Anbot, which can taser people and be used for riot control. And South Korea already uses mobile robot guards in its prisons. Even in San Francisco, you can rent out robot guards to protect your businesses and property. However, the rent-a-robot company, Knightscope, recently came under fire for accidentally running over a toddler at the Stanford Shopping Center.

Needless to say, problems are expected as the burgeoning field of robot-human interaction evolves. The good news is, there’s already years of information to draw on. Human-robot interaction and protection have been here in the form of robotic dogs for nearly a decade. There are dozens of different brands and models available — some of which offer motion detector warnings to protect against burglars and can be programmed to bark at intruders. While some will say robot pets are no more efficient than well-placed cameras, microphones, or speakers, they do offer genuine and personal protection for consumers – not to mention a sense of novelty and enjoyment.

Read more