Blog

Archive for the ‘security’ category: Page 125

Apr 25, 2016

AI Helps Scientists Develop Anti-Poaching System

Posted by in categories: computing, information science, mathematics, robotics/AI, security

A team of computer scientists from the University of Southern California (USC) have been successful in developing a new method to alleviate wildlife poaching. The National Science Foundation (NSF) funded the project that has created a model for ‘green security games’.

This model is based on game theory to safeguard wildlife from poachers. Game theory involves predicting the actions of enemy using mathematical equations and subsequently formulating the best possible restrain moves. This model will enable more efficient patrolling of parks and wildlife by park rangers.

An artificial intelligence (AI) application, known as Protection Assistant for Wildlife Sanctuary (PAWS) was developed by Fei Fang, a Ph.D. candidate in the computer science department at USC and Milind Tambe, a professor of computer science and systems engineering at USC, in 2013. The team has since then spent a couple of years to test the effectiveness of the application in Uganda and Malaysia.

Continue reading “AI Helps Scientists Develop Anti-Poaching System” »

Apr 23, 2016

Why messaging bots are a looming security threat

Posted by in categories: robotics/AI, security

I almost snickered at this article because many of us have been highlighting many of the issues with AI. I am glad to see someone else also speaking up with the bigger issue with AI which is poor security due to the existing net infrastructure.


Facebook and others are all working on simplifying users’ lives with bots, but these novel interactive programs change the game in terms of security.

Read more

Apr 19, 2016

JROC Speeds Up & Opens Up: Reforming The Dark Heart of Acquisition

Posted by in categories: military, security

Nice and long overdue; however, finally happening and that’s good as long as security and safety are not compromised.


PENTAGON: One of the most important — and most maligned — elements of the Pentagon bureaucracy has gotten 30 percent faster, according to data exclusively compiled for Breaking Defense by the staff of the Joint Requirements Oversight Council. In a new drive for openness, the infamously opaque JROC is also bringing in outside expertise from industry, military laboratories and the Defense Department’s in-house disruptive innovators at DARPA.

Reforming the Joint Requirements Oversight Council is a big deal. The military’s weapons-buying bureaucracy is a maze, and at the dark heart of the labyrinth lurks the JROC, which must approve the official wish list — the requirements — for almost any major program. Led by the vice-chairman of the Joint Chiefs, Gen. Paul Selva, and comprising the No. 2 officers of each service, supported by lesser boards and lower-ranking working groups, the JROC has a reputation for delaying, watering down, or killing the armed services’ proposals. Many believe it’s where good ideas go to die — slowly.

Continue reading “JROC Speeds Up & Opens Up: Reforming The Dark Heart of Acquisition” »

Apr 18, 2016

Implanted Medical Devices Save Our Lives And Tempt Computer Hackers

Posted by in categories: biotech/medical, computing, cyborgs, health, internet, mobile phones, neuroscience, security

All true and good points. Until the under pinning technology and net infrastructures are update; all things connected will mean all things hackable.


Medical devices like pacemakers and insulin pumps will save many lives, but they also represent an opportunity to computer hackers who would use the Internet to cause havoc. Former futurist-in-residence at the FBI, Marc Goodman says it is easy to take for granted how connected we’ve already become to the Internet. Most American adults keep their phones within arm’s reach all day, and keep their devices on their nightstand while they sleep — and forget about actually remembering people’s phone numbers. That is a job we have outsourced to machines.

In this sense, says Goodman, we are already cyborgs. But digital devices connected to the Internet will continue to move inside our bodies, just as pacemakers and insulin pumps have. In his interview, Goodman discusses cases of computer hackers taking advantage of these devices’ connectivity to show how vulnerable we could soon become to their potentially destructive wishes. In one case, a hacker demonstrated he could release several weeks of insulin into a diabetic’s body, certain to cause a diabetic coma and death. In another, hackers induced epileptic seizures by hacking the Epilepsy Foundation’s webpage.

Continue reading “Implanted Medical Devices Save Our Lives And Tempt Computer Hackers” »

Apr 15, 2016

Ghost in the Shell and the transhumanist future of sexuality

Posted by in categories: military, security, surveillance, transhumanism

The sky above Osaka Bay is saturated in light pollution teeming from the neon-soaked metropolis below. Military bi-copters circle in patterns between the antenna towers of Niihama City’s looming skyscrapers as they survey the scene of an ongoing domestic security operation. Kneeling from atop the edge of one of these towers is a figure; a mauve-haired saboteur of the state clad in a leotard, side holster, and leather jacket. Combat boots and leggings hiked just past her knees with her upper thighs left exposed. An external HD cable juts from a small input jack indented at the base of her neck.

Her pupils dilate, sifting through the visual noise of an embedded surveillance feed while combing the room below for suspicious movements. She detaches the cable at her subordinate’s signal, stands upright and removes her clothing. She leans over the edge of the building, a smirk streaking across her otherwise stoic expression. A rappel line heaves sharply, suspending her body directly adjacent to that of her target, who is now only a trigger pull from annihilation.

Read more

Apr 12, 2016

Long-range secure quantum communication system developed

Posted by in categories: business, encryption, finance, information science, quantum physics, security

Scientists from ITMO University in Saint Petersburg, Russia have enabled the longer distance (250 Kilos) of secured data transmission occur via Quantum. Nice; and should be a wake up call to the US as well on advancing their efforts more.


A group of scientists from ITMO University in Saint Petersburg, Russia has developed a novel approach to the construction of quantum communication systems for secure data exchange. The experimental device based on the results of the research is capable of transmitting single-photon quantum signals across distances of 250 kilometers or more, which is on par with other cutting edge analogues. The research paper was published in the Optics Express journal.

Information security is becoming more and more of a critical issue not only for large companies, banks and defense enterprises, but even for small businesses and individual users. However, the data encryption algorithms we currently use for protecting our data are imperfect — in the long-term, their logic can be cracked. Regardless of how complex and intricate the algorithm is, getting round it is just the matter of time.

Continue reading “Long-range secure quantum communication system developed” »

Apr 10, 2016

Researchers: Attackers could use holes in Firefox add-ons to target your PC

Posted by in categories: computing, security

It goes without saying that any given piece of computer code—be it an app, a part of your operating system, or even a browser plug-in—may contain flaws that could leave your PC open to attack. But a team of researchers from Northwestern University have come across a new method of attack that can take advantage of holes in one or more installed Firefox add-ons.

According to the team’s research paper (PDF), this newly discovered attack “leverages capability leaks from legitimate extensions to avoid the inclusion of security-sensitive API calls within the malicious extension itself.”

Put another way: Firefox doesn’t enforce any isolation between the add-ons you install, as Ars Technica notes, which could potentially result in security problems. As a result of this lack of isolation, researchers say, an attacker could write a malicious Firefox add-on that appears harmless, but can use security flaws in other installed add-ons to do its bidding.

Continue reading “Researchers: Attackers could use holes in Firefox add-ons to target your PC” »

Apr 10, 2016

Statements: OSAKA – When the foreign ministers from the Group of Seven industrialized nations gather in Hiroshima for a two-day meeting from Sunday

Posted by in categories: government, military, security

They will visit Hiroshima Peace Park and conclude their gathering with a “Hiroshima Declaration” that will likely express hope for a world without nuclear weapons.

The future of such weapons and how to reduce them is shaping discussions in Tokyo and Hiroshima this year, following the nuclear security summit held in Washington on March 31 and April 1 and the upcoming G-7 Ise-Shima summit at the end of next month.

But even as Japan seeks to play a larger role in international nonproliferation efforts, past personal statements by Prime Minister Shinzo Abe, his allies, and, more recently, official government replies about nuclear weapons for Japan, raise questions about how politically credible any leadership in that role might be.

Continue reading “Statements: OSAKA – When the foreign ministers from the Group of Seven industrialized nations gather in Hiroshima for a two-day meeting from Sunday” »

Apr 10, 2016

Alphabet Inc Uses Its Head in AI

Posted by in categories: business, information science, robotics/AI, security, singularity

I imagine that Alphabet has been already exploring the whole online bot technology with its cloud as well as other AI technology. However, one real opportunity in the online cloud services is the “personable” experiences for consumers and businesses. Granted big data & analytics in the cloud is proving to be exceptional for researchers and industry; however, how do we now make the leap to make things more of a personable experience as well as make it available/ attractive for individual consumers & small business especially we look at connected AI & singularity. Personally, I have not seen any viable and good answers at the moment to my question. Security & privacy still is a huge hurdle that must be addressed properly to ensure adoption by consumers from a personable experience perspective.


The market for cloud services is expected to skyrocket in the years ahead. With hundreds of billions of dollars at stake, industry leaders including Microsoft, IBM, and Alphabet are going all-in to capture their fair share of the cloud revenue pie. Alphabet has taken a different path than its tech brethren in the cloud market, but it appears that’s about to change.

Until recently, Alphabet seemed content to focus its cloud efforts on data hosting, or Infrastructure-as-a-Service (IaaS). Not a bad plan given that the amount of data amassed in today’s digital world is unparalleled and is expected to continue growing as consumers become more connected. But even at this early stage of the cloud, data hosting has become a commodity. The real opportunity lies in cloud-based Software-as-a-Service (SaaS) and data analytics solutions, which Alphabet is beginning to address.

Continue reading “Alphabet Inc Uses Its Head in AI” »

Apr 10, 2016

Second digital revolution

Posted by in categories: habitats, internet, neuroscience, quantum physics, robotics/AI, security

Many folks talk about the whole AI revolution; and indeed it does change some things and opens the door the for opportunities. However, has it truly changed the under lying technology? No; AI is still reliant on existing digital technology. The real tech revolution will come in the form of Quantum tech over the next 7 to 8 years; and it will change everything in our lives and industry. Quantum will change everything that we know about technology including devices, medical technologies, communications including the net, security, e-currency, etc. https://lnkd.in/bJnS37r


If you were born in the 1970s or 1980s, you probably remember the Jetsons family. The Jetsons are to the future what the Flintstones are to the past. That futuristic lifestyle vision goes back several decades; self-driving vehicles, robotic home helpers and so on. What looked like a cartoon series built on prolific imagination seems somewhat more real today. Newly developed technologies are becoming available and connecting everything to the internet. This is the-internet-of-things era.

These ‘things’ are not new. They are just standard devices – lights, garage doors, kitchen appliances, household appliances – equipped with a little intelligence. Intelligence that is possible thanks to three emerging technologies: sensors to collect information from surroundings; the ability to control something; and communication capability allowing devices to talk to each other.

Continue reading “Second digital revolution” »