Blog

Archive for the ‘security’ category: Page 113

Dec 29, 2016

Byline: Is it Finally Time for Open Security?

Posted by in categories: business, internet, security

One of the distinct advantages of working in the IT industry for over 35 years is all of the direct and indirect experience that brings, as well as the hindsight that comes with that.

One of the more personally interesting experiences for me has been watching the growth and ultimate success of the Open Source Software (OSS) movement from a fringe effort (what business would ever run on OSS?) to what has now become a significant component behind the overall success of the Internet. I was initially reminded of the significance of the Open Source Software movement, and how long it’s actually been around when the technology press recognized the 25th anniversary of the Linux kernel. That, and the decision in January of 1998 by Netscape Communications Corp to release the complete source code for the Communicator web browser, are two of the top reasons for the Internet taking off. Well, the first specification for HTTP helped a little as well, I suppose.

There are, of course, many other examples of OSS software that power the Internet, from the numerous Apache Foundation projects, relational and other database management systems like Postgres, MySQL, MongoDB, and Cassandra. The list of markets and technologies for which there are OSS resources is essentially endless.

Read more

Dec 28, 2016

The lie-detecting security kiosk of the future

Posted by in categories: robotics/AI, security, transportation

When you engage in international travel, you may one day find yourself face-to-face with border security that is polite, bilingual and responsive—and robotic.

The Automated Virtual Agent for Truth Assessments in Real Time (AVATAR) is currently being tested in conjunction with the Canadian Border Services Agency (CBSA) to help border security agents determine whether travelers coming into Canada may have undisclosed motives for entering the country.

“AVATAR is a , much like an airport check-in or grocery store self-checkout kiosk,” said San Diego State University management information systems professor Aaron Elkins. “However, this kiosk has a face on the screen that asks questions of travelers and can detect changes in physiology and behavior during the interview. The system can detect changes in the eyes, voice, gestures and posture to determine potential risk. It can even tell when you’re curling your toes.”

Read more

Dec 27, 2016

Does the Unabomber Have a More Realistic Sense of Today’s Existential Risks?

Posted by in categories: existential risks, security, terrorism

A version of this piece appears on the Sociological Imagination website

Twenty years ago Theodore Kaczynski, a Harvard-trained maths prodigy obsessed with technology’s destruction of nature, was given eight consecutive life sentences for sending letter bombs in the US post which killed three people and injured 23 others. Generally known as the ‘Unabomber’, he remains in a supermax prison in Colorado to this day.

It is perhaps easy to forget the sway that the Unabomber held on American society in the mid-1990s. Kaczynski managed to get a 35,000 word manifesto called ‘Industrial Society and Its Future’ published in both The New York Times and The Washington Post. It is arguably the most famous and influential statement of neo-Luddite philosophy and politics to this day. Now he is back with a new book, Anti-Tech Revolution: Why and How.

Continue reading “Does the Unabomber Have a More Realistic Sense of Today's Existential Risks?” »

Dec 22, 2016

Advanced Tissue Biofabrication (ATB) Manufacturing USA Institute Will Focus on 3D Bioprinting Among Other Biofabrication Technologies

Posted by in categories: 3D printing, bioprinting, economics, government, security

logo-header

There’s really no sector in the United States (or much of the world) that has been untouched by the development of advanced manufacturing technologies – and no one seems to be underestimating the importance of the further development of those technologies in order to keep the country competitive. To that end, in 2014 the government established the National Network for Manufacturing Innovation (NNMI), more commonly known as Manufacturing USA.

The program brought together the industrial, academic, nonprofit and governmental sectors to establish a network of advanced manufacturing institutes for the purpose of accelerating new manufacturing technologies. President Obama proposed that the network grow to 45 institutes over the course of 10 years, and as of today, 12 have been established. The 12th, which was just announced by the Department of Defense, will be the Advanced Tissue Biofabrication (ATB) Manufacturing USA Institute, and will be led by the Advanced Regenerative Manufacturing Institute (ARMI), based in Manchester, New Hampshire.

Continue reading “Advanced Tissue Biofabrication (ATB) Manufacturing USA Institute Will Focus on 3D Bioprinting Among Other Biofabrication Technologies” »

Dec 22, 2016

Can technology stop another truck attack?

Posted by in categories: security, transportation

LONDON The attack on a Berlin Christmas market showed the devastation that can be wrought by the simple act of driving a truck into crowds, and the problems in preventing another massacre.

The attack in Germany on Monday, in which 11 people were killed by the truck in addition to the murder of the Polish driver, mirrored a militant raid in the French city of Nice in July that killed 86.

Hauliers increasingly track their vehicles in real time but security experts say the technology cannot be used to stop an attack if a lorry has been hijacked to be used as a weapon.

Read more

Dec 22, 2016

News in brief: Groupon grief; Apple encryption delay; post-quantum crypto

Posted by in categories: encryption, mobile phones, quantum physics, security

Your daily round-up of some of the other security stories in the news

Groupon grief – was it password reuse?

The Telegraph reports that crooks have hijacked a number of Groupon accounts and used them to purchase expensive items like games consoles, iPhones and holidays. Some victims have suffered thousands of pounds of losses.

Continue reading “News in brief: Groupon grief; Apple encryption delay; post-quantum crypto” »

Dec 22, 2016

Sidney Drell, Stanford theoretical physicist and national security expert, dies at 90

Posted by in categories: military, physics, policy, security

RIP dear friend.


A giant in the worlds of both academia and policy, Drell died Wednesday, Dec. 21, at his home in Palo Alto. He was 90 years old.

“An accomplished physicist, his contributions to improve national and international security made our world a better place,” said Tom Gilligan, director of the Hoover Institution at Stanford in a statement. “We are especially grateful for Sid’s relentless dedication to eliminating the threat posed by nuclear weapons and know that his important work will continue to frame the issue.”

Continue reading “Sidney Drell, Stanford theoretical physicist and national security expert, dies at 90” »

Dec 6, 2016

Conroy’s quantum warning: be ready

Posted by in categories: computing, economics, government, quantum physics, security

More folks warning others that you better be planning for a QC transformation as it is coming and is going to be probably the largest scale transformation the we have seen in the history of technology.


Former communications minister, Stephen Conroy has warned that Australian government technology decision makers need to start preparing for the development of quantum computing.

The former senator made the warning during a panel session at the Australian Computer Society’s Reimagination conference late last week. While still in its nascent development stages, the former minister for broadband communications and the digital economy said that it could have major national security implications.

Continue reading “Conroy’s quantum warning: be ready” »

Nov 23, 2016

DARPA is Placing “Big Bets” on Space-Based Weapons Systems

Posted by in categories: neuroscience, security, space

DARPA sees a real possibility for spaced based conflict. So, it’s hoping to create breakthrough technology to dissuade U.S. adversaries who might consider attacking from space.

Defense Advanced Research Projects Agency assists national security with efforts in space. It focuses on making space a “real-time operational domain,” as DARPA Director Dr. Arati Prabhakar recently said.

“The questions we ask ourselves at DARPA about the space domain … is what would it take to make the space domain robust for everything that we need militarily and for intelligence, and what would it take to make space a real-time operational domain, which it’s not at all today,” the director said last week at the 4th annual Defense One Summit. Many nation-states now orbit the Earth. Conflict is a real possibility, believes Prabhakar.

Read more

Nov 22, 2016

China Launches World’s Longest Quantum Communication Line

Posted by in categories: finance, quantum physics, security

In 5 years if you’re looking at QC in your future state roadmap; then welcome to the dinosaur age of technology.


BEIJING: China today launched a 712-km quantum communication line, stated to be the worlds longest secure telecommunications network, which boasts of ultra-high security making it impossible to wiretap, intercept or crack the information transmitted through them.

The new quantum communication line links Hefei, capital of Anhui province, to Shanghai, the countrys financial hub.

Continue reading “China Launches World’s Longest Quantum Communication Line” »