Toggle light / dark theme

Even the CIA is developing an AI chatbot

“The CIA and other US intelligence agencies will soon have an AI chatbot similar to ChatGPT. The program, revealed on Tuesday by Bloomberg, will train on publicly available data and provide sources alongside its answers so agents can confirm their validity. The aim is for US spies to more easily sift through ever-growing troves of information, although the exact nature of what constitutes “public data” could spark some thorny privacy issues.

“We’ve gone from newspapers and radio, to newspapers and television, to newspapers and cable television, to basic internet, to big data, and it just keeps going,” Randy Nixon, the CIA’s director of Open Source Enterprise, said in an interview with Bloomberg. “We have to find the needles in the needle field.” Nixon’s division plans to distribute the AI tool to US intelligence agencies “soon.””.


The CIA confirmed that it’s developing an AI chatbot for all 18 US intelligence agencies to quickly parse troves of ‘publicly available’ data.

New AI algorithm promises defense against cyberattacks on robots

The researchers tested their algorithm on a replica of a US Army combat ground vehicle and found it was 99% effective in preventing a malicious attack.

Australian researchers have developed an artificial intelligence algorithm to detect and stop a cyberattack on a military robot in seconds.


The research was conducted by Professor Anthony Finn from the University of South Australia (UniSA) and Dr Fendy Santoso from Charles Sturt University in collaboration with the US Army Futures Command. They simulated a MitM attack on a GVT-BOT ground vehicle and trained its operating system to respond to it, according to the press release.

According to Professor Finn, an autonomous systems researcher at UniSA, the robot operating system (ROS) is prone to cyberattacks because it is highly networked. He explained that Industry 4, characterized by advancements in robotics, automation, and the Internet of Things, requires robots to work together, where sensors, actuators, and controllers communicate and share information via cloud services. He added that this makes them very vulnerable to cyberattacks. He also said that computing power is increasing exponentially every few years, enabling them to develop and implement sophisticated AI algorithms to protect systems from digital threats.

New cyber algorithm shuts down malicious robotic attack

Australian researchers have designed an algorithm that can intercept a man-in-the-middle (MitM) cyberattack on an unmanned military robot and shut it down in seconds.

In an experiment using deep learning to simulate the behavior of the human brain, artificial intelligence experts from Charles Sturt University and the University of South Australia (UniSA) trained the robot’s operating system to learn the signature of a MitM eavesdropping cyberattack. This is where attackers interrupt an existing conversation or .

The algorithm, tested in real time on a replica of a United States army combat ground vehicle, was 99% successful in preventing a malicious attack. False positive rates of less than 2% validated the system, demonstrating its effectiveness.

Rewiring the Brain: The Neural Code of Traumatic Memories

Summary: Unveiling the neurological enigma of traumatic memory formation, researchers harnessed innovative optical and machine-learning methodologies to decode the brain’s neuronal networks engaged during trauma memory creation.

The team identified a neural population encoding fear memory, revealing the synchronous activation and crucial role of the dorsal part of the medial prefrontal cortex (dmPFC) in associative fear memory retrieval in mice.

Groundbreaking analytical approaches, including the ‘elastic net’ machine-learning algorithm, pinpointed specific neurons and their functional connectivity within the spatial and functional fear-memory neural network.

Scientist publishes ‘evidence’ that we really could all be living in the Matrix

The Matrix is everywhere. It is all around us. Even now in this very room.

So says Laurence Fishburne’s Morpheus in sci-fi classic ‘ The Matrix ’ as he offers Keanu Reeves’s Neo the choice to find out just how “deep the rabbit hole goes”.

Now, just as Neo discovered that the “life” he’d been living was little more than an algorithmic construct, scientists and philosophers are arguing that we could be stuck inside a simulation ourselves.

New AI model uncovers how and why the human brain ages

Researchers developed ‘HistoAge,’ an algorithm that unravels brain aging and neurodegenerative disorders.

As we age, our brains undergo structural and cellular changes influenced by intrinsic and external factors. Accelerated aging in the brain can result in an increased risk of neurodegenerative conditions, bipolar disorder, and mortality. In a bid to deeply understand how an aging brain works, researchers say they have built a powerful AI tool that can identify regions in the brain vulnerable to age-related changes.

The team used AI to develop an algorithm called ‘HistoAge,’ which predicts age at death based on the cellular composition of human brain tissue specimens with an average accuracy… More.


RapidEye/iStock.

ATLAS sets stringent limits on the existence of supersymmetric dark matter particles

If new particles are out there, the Large Hadron Collider (LHC) is the ideal place to search for them. The theory of supersymmetry suggests that a whole new family of partner particles exists for each of the known fundamental particles. While this might seem extravagant, these partner particles could address various shortcomings in current scientific knowledge, such as the source of the mysterious dark matter in the universe, the “unnaturally” small mass of the Higgs boson, the anomalous way that the muon spins and even the relationship between the various forces of nature. But if these supersymmetric particles exist, where might they be hiding?

This is what physicists at the LHC have been trying to find out, and in a recent study of proton–proton data from Run 2 of the LHC (2015–2018), the ATLAS collaboration provides the most comprehensive overview yet of its searches for some of the most elusive types of supersymmetric particles—those that would only rarely be produced through the “weak” nuclear force or the electromagnetic force. The lightest of these weakly interacting supersymmetric particles could be the source of dark matter.

The increased collision energy and the higher collision rate provided by Run 2, as well as new search algorithms and machine-learning techniques, have allowed for deeper exploration into this difficult-to-reach territory of supersymmetry.

Possible Quantum Decryption Breakthrough

Researcher show that n-bit integers can be factorized by independently running a quantum circuit with orders of magnitude fewer qubits many times. It then use polynomial-time classical post-processing. The correctness of the algorithm relies on a number-theoretic heuristic assumption reminiscent of those used in subexponential classical factorization algorithms. It is currently not clear if the algorithm can lead to improved physical implementations in practice.

Shor’s celebrated algorithm allows to factorize n-bit integers using a quantum circuit of size O(n^2). For factoring to be feasible in practice, however, it is desirable to reduce this number further. Indeed, all else being equal, the fewer quantum gates there are in a circuit, the likelier it is that it can be implemented without noise and decoherence destroying the quantum effects.

The new algorithm can be thought of as a multidimensional analogue of Shor’s algorithm. At the core of the algorithm is a quantum procedure.

/* */