БЛОГ

Page 10878

Jun 24, 2009

Cyberspace command to engage in warfare

Posted by in categories: cybercrime/malcode, defense, military, policy, robotics/AI

The link is:
http://www.msnbc.msn.com/id/31511398/ns/us_news-military/

“The low-key launch of the new military unit reflects the Pentagon’s fear that the military might be seen as taking control over the nation’s computer networks.”

“Creation of the command, said Deputy Defense Secretary William Lynn at a recent meeting of cyber experts, ‘will not represent the militarization of cyberspace.’”

And where is our lifeboat?

Jun 19, 2009

Asteroid hazard in the context of technological development

Posted by in category: asteroid/comet impacts

Asteroid hazard in the context of technological development

It is easy to notice that the direct risks of collisions with asteroids decreases with technological development. First, they (or, exactly, our estimation of risks) decrease due to more accurate measurement of them — that is, at the expense of more accurate detection of dangerous asteroids and measurements of their orbits we could finally find that the real chance of impact is 0 in the next 100 year. (If, however, will be confirmed the assumption that we live during the episode of comet bombardment, the assessment of risk would increase 100 times to the background.) Second, it decreases due to an increase in our ability to reject asteroids.
On the other hand, the impact of falling asteroids become larger with time — not only because the population density increases, but also because the growing connectedness of the world system, resulting in that damage in one place can spread across the globe. In other words, although the probability of collisions is reducing, the indirect risks associated with the asteroid danger is increasing.
The main indirect risks are:
A) The destruction of hazardous industries in the place of the fall — for example, nuclear power plant. The entire mass of the station in such a case would evaporated and the release of radiation would be higher than in Chernobyl. In addition, there may be additional nuclear reactions because of sudden compression of the station when it is struck by asteroid. Yet the chances of a direct hit of an asteroid in the nuclear plants are small, but they grow with the growing number of stations.
B) There is a risk that even a small group of meteors, moving a specific angle in a certain place in the earth’s surface could lead to lunch of the system for the Prevention of rocket attacks and lead to an accidental nuclear war. Similar consequences could have a small air explosion of an asteroid (a few meters in size). The first option is more likely for developed superpowers system of warning (but which has flaws or unsecured areas in their ABM system, as in the Russian Federation), while the second — for the regional nuclear powers (like India and Pakistan, North Korea, etc.) which are not able to track missiles by radars, but could react to a single explosion.
C) The technology to drive asteroids in the future will create a hypothetical possibility to direct asteroids not only from Earth, but also on it. And even if there will be accidental impact of the asteroid, there will be talks about that it was sent on purpose. Yet hardly anyone will be sent to Earth asteroids, because such action can easily be detected, the accuracy is low and it need to be prepared for decades before event.
D) Deviations of hazardous asteroids will require the creation of space weapons, which could be nuclear, laser or kinetic. Such weapons could be used against the Earth or the spacecrafts of an opponent. Although the risk of applying it against the ground is small, it still creates more potential damage than the falling asteroids.
E) The destruction of the asteroid with nuclear explosion would lead to an increase in its affecting power at the expense of its fragments – to the greater number of blasts over a larger area, as well as the radioactive contamination of debris.
Modern technological means give possibility to move only relatively small asteroids, which are not global threat. The real danger is black comets in size of several kilometers which are moving on elongated elliptical orbits at high speeds. However, in the future, space can be quickly and cheaply explored through self-replicating robots based on nanoteh. This will help to create huge radio telescopes in space to detect dangerous bodies in the solar system. In addition, it is enough to plant one self-replicating microrobot on the asteroid, to multiply it and then it could break the asteroid on parts or build engines that will change its orbit. Nanotehnology will help us to create self-sustaining human settlements on the Moon and other celestial bodies. This suggests that the problem of asteroid hazard will in a few decades be outdated.
Thus, the problem of preventing collisions of the Earth with asteroids in the coming decades can only be a diversion of resources from the global risks:
First, because we are still not able to change orbits of those objects which actually can lead to the complete extinction of humanity.
Secondly, by the time (or shortly thereafter), when the nuclear missile system for destruction of asteroids will be created, it will be obsolete, because nanotech can quickly and cheaply harness the solar system by the middle of 21 century, and may, before .
And third, because such system at time when Earth is divided into warring states will be weapon in the event of war.
And fourthly, because the probability of extinction of humanity as a result of the fall of an asteroid in a narrow period of time when the system of deviation of the asteroids will be deployed, but powerful, nanotechnology is not yet established, is very small. This time period may be equal to 20 years, say from 2030 — until 2050, and the chances of falling bodies of 10 km size during this time, even if we assume that we live in a period comet bombardment, when the intensity is 100 times higher — is at 1 to 15 000 (based on an average frequency of the fall of bodies every 30 million years). Moreover, given the dynamics, we can reject the indeed dangerous objects only at the end of this period, and perhaps even later, as larger the asteroid, the more extensive and long-term project for its deviation is required. Although 1 to 15 000 is still unacceptable high risk, it is commensurate with the risk of the use of space weapons against the Earth.
In the fifth, anti-asteroid protection diverts attention from other global issues, the limited human attention and financial resources. This is due to the fact that the asteroid danger is very easy for understanding — it is easy to imagine, it is easy to calculate the probabilities and it is clear to the public. And there is no doubt of its reality, and there are clear ways for protection. (e.g. the probability of volcanic disaster comparable to the asteroid impact by various estimates, is from 5 to 20 times higher at the same level of energy – but we have no idea how it can be prevented.) So it differs from other risks that are difficult to imagine, that are impossible quantify, but which may mean the probability of complete extinction of tens of percent. These are the risks of AI, biotech, nanotech and nuclear weapons.
In the sixth, when talking about relatively small bodies like Apophis, it may be cheaper to evacuate the area of the fall than to deviate the asteroid. A likely the area of the impact will be ocean.
But I did not call to abandon antiasterod protection, because we first need to find out whether we live in the comet bombardment period. In this case, the probability of falling 1 km body in the next 100 years is equal to 6 %. (Based on data on the hypothetical fall in the last 10 000 years, like a comet Klovis http://en.wikipedia.org/wiki/Younger_Dryas_impact_event , traces of which can be 500 000 in the craters of similar entities called Carolina Bays http://en.wikipedia.org/wiki/Carolina_bays crater, and around New Zealand in 1443 http://en.wikipedia.org/wiki/Mahuika_crater and others 2 impacts in last 5 000 years , see works of http://en.wikipedia.org/wiki/Holocene_Impact_Working_Group ). We must first give power to the monitoring of dark comets and analysis of fresh craters.

Jun 18, 2009

Extra Germs and Toxins Found

Posted by in categories: biological, defense, military

Here’s a story that should concern anyone wanting to believe that the military has a complete and accurate inventory of chemical and biological warfare materials.

“An inventory of deadly germs and toxins at an Army biodefense lab in Frederick found more than 9,200 vials of material that was unaccounted for in laboratory records, Fort Detrick officials said Wednesday. The 13 percent overage mainly reflects stocks left behind in freezers by researchers who retired or left Fort Detrick since the biological warfare defense program was established there in 1943, said Col. Mark Kortepeter, deputy commander of the U.S. Army Medical Research Institute of Infectious Diseases.”

The rest of the story appears here:
http://abcnews.go.com/Health/wireStory?id=7863828

Given that “The material was in tiny, 1mm vials that could easily be overlooked,” and included serum from Korean hemorrhagic fever patients, the lack of adequate inventory controls to this point creates the impression that any number of these vials could be outside their lab. Of course, they assure us they have it all under control. Which will be cold comfort if we don’t have a lifeboat.

Jun 16, 2009

The Lifeboat Conversation

Posted by in categories: education, finance, futurism, lifeboat, policy, space

Many years ago, in December 1993 to be approximate, I noticed a space-related poster on the wall of Eric Klien’s office in the headquarters of the Atlantis Project. We chatted for a bit about the possibilities for colonies in space. Later, Eric mentioned that this conversation was one of the formative moments in his conception of the Lifeboat Foundation.

Another friend, filmmaker Meg McLain has noticed that orbital hotels and space cruise liners are all vapor ware. Indeed, we’ve had few better depictions of realistic “how it would feel” space resorts since 1968’s Kubrick classic “2001: A Space Odyssey.” Remember the Pan Am flight to orbit, the huge hotel and mall complex, and the transfer to a lunar shuttle? To this day I know people who bought reservation certificates for whenever Pan Am would begin to fly to the Moon.

In 2004, after the X Prize victory, Richard Branson announced that Virgin Galactic would be flying tourists by 2007. So far, none.

A little later, Bigelow announced a fifty million dollar prize if only tourists could be launched to orbit by January 2010. I expect the prize money won’t be claimed in time.

Continue reading “The Lifeboat Conversation” »

Jun 16, 2009

Gulches — freedom lifeboats

Posted by in categories: education, geopolitics, habitats, lifeboat, nuclear weapons

Jim Davies of Strike the Root writes about Galt’s Gulch and some gulch-like projects. These appeal to him because of the exponential trends in government power and abuse of power. He writes, in part,

“We have the serious opportunity in our hands right now of terminating the era of government absolutely, and so of removing from the human race the threat of ever more brutal tyranny ending only with WMD annihilation–while opening up vistas of peaceful prosperity and technological progress which even a realist like myself cannot find words to describe. ”

http://www.strike-the-root.com/91/davies/davies11.html

Avoiding those terrible events is what building our Lifeboat is all about. Got Lifeboat?

Jun 16, 2009

Microbe on Ice

Posted by in categories: biological, lifeboat

It sounds like cryonics is working, at least for microbes. But could any humans now alive have resistance to ancient organisms?

Rational Review carried a link to this story:

http://www.foxnews.com/story/0,2933,526460,00.html

“After more than 120,000 years trapped beneath a block of ice in Greenland, a tiny microbe has awoken. … The new bacteria species was found nearly 2 miles (3 km) beneath a Greenland glacier, where temperatures can dip well below freezing, pressure soars, and food and oxygen are scarce. ‘We don’t know what state they were in,’ said study team member Jean Brenchley of Pennsylvania State University. ‘They could’ve been dormant, or they could’ve been slowly metabolizing, but we don’t know for sure.’”

It is yet another interesting possibility against which humans should prepare to protect ourselves. Where is our Lifeboat?

Jun 9, 2009

Hack-Jet: Losing a commercial airliner in a networked world

Posted by in categories: complex systems, counterterrorism, futurism

Hack-Jet

When there is a catastrophic loss of an aircraft in any circumstances, there are inevitably a host of questions raised about the safety and security of the aviation operation. The loss of Air France flight 447 off the coast of Brazil with little evidence upon which to work inevitably raises the level of speculation surrounding the fate of the flight. Large-scale incidents such as this create an enormous cloud of data, which has to be investigated in order to discover the pattern of events, which led to the loss (not helped when some of it may be two miles under the ocean surface). So far French authorities have been quick to rule out terrorism it has however, emerged that a bomb hoax against an Air France flight had been made the previous week flying a different route from Argentina. This currently does not seem to be linked and no terrorist group has claimed responsibility. Much of the speculation regarding the fate of the aircraft has focused on the effects of bad weather or a glitch in the fly-by-wire systemthat could have caused the plane to dive uncontrollably. There is however another theory, which while currently unlikely, if true would change the global aviation security situation overnight. A Hacked-Jet.

Given the plethora of software modern jets rely on it seems reasonable to assume that these systems could be compromised by code designed to trigger catastrophic systemic events within the aircraft’s navigation or other critical electronic systems. Just as aircraft have a physical presence they increasingly have a virtual footprint and this changes their vulnerability. A systemic software corruption may account for the mysterious absence of a Mayday call — the communications system may have been offline. Designing airport and aviation security to keep lethal code off civilian aircraft would in the short-term, be beyond any government civil security regime. A malicious code attack of this kind against any civilian airliner would, therefore be catastrophic not only for the airline industry but also for the wider global economy until security caught up with this new threat. The technical ability to conduct an attack of this kind remains highly specialized (for now) but the knowledge to conduct attacks in this mold would be as deadly as WMD and easier to spread through our networked world. Electronic systems on aircraft are designed for safety not security, they therefore do not account for malicious internal actions.

While this may seem the stuff of fiction in January 2008 this broad topic was discussed due to the planned arrival of the Boeing 787, which is designed to be more ‘wired’ –offering greater passenger connectivity. Air Safety regulations have not been designed to accommodate the idea of an attack against on-board electronic systems and the FAA proposed special conditions , which were subsequently commented upon by the Air Line Pilots Association and Airbus. There is some interesting back and forth in the proposed special conditions, which are after all only to apply to the Boeing 787. In one section, Airbus rightly pointed out that making it a safety condition that the internal design of civilian aircraft should ‘prevent all inadvertent or malicious changes to [the electronic system]’ would be impossible during the life cycle of the aircraft because ‘security threats evolve very rapidly’.Boeing responded to these reports in an AP article stating that there were sufficient safeguards to shut out the Internet from internal aircraft systems a conclusion the FAA broadly agreed with - Wired Magazine covered much of the ground. During the press surrounding this the security writer Bruce Schneier commented that, “The odds of this being perfect are zero. It’s possible Boeing can make their connection to the Internet secure. If they do, it will be the first time in the history of mankind anyone’s done that.” Of course securing the airborne aircraft isn’t the only concern when maintenance and diagnostic systems constantly refresh while the aircraft is on the ground. Malicious action could infect any part of this process. While a combination of factors probably led to the tragic loss of flight AF447 the current uncertainty serves to highlight a potential game-changing aviation security scenario that no airline or government is equipped to face.

Continue reading “Hack-Jet: Losing a commercial airliner in a networked world” »

Jun 9, 2009

Be Careful What You Wish For

Posted by in category: nanotechnology

People have been worried about nanotechnology for quite some time now; nano-asbestos, advanced nano-enabled weapons, and self-replicating “gray goo” nanobots that accidentally go out of control. But what if everything goes right? What if nanotubes and nanoparticles are functionalized to stay out of the ecosystem? What if there are no major wars? What if nanoreplicators are never built, or if they are, they use modern error correction software to never mutate? What happens if nanotechnology fulfills humanity’s desires perfectly?

In the next decade or so, a new type of desktop appliance will be developed—a nanofactory that consists of very many productive nanosystems—atomically precise nanoscale machines that work together to build bulk amounts of atomically precise products.

The Foresight Technology Roadmap for Productive Nanosystems has identified a number of different approaches for building these atomically precise systems of machines that can produce other nanosystems http://www.foresight.org/roadmaps/. These approaches include Paul Rothemund’s DNA Origami, Christopher Schafmeister’s Bis-proteins, Joe Lynden’s Patterned Atomic Layer Epitaxy, and Robert Freitas and Ralph Merkle’s Diamondoid Mechanosynthesis http://www.rfreitas.com/Nano/JNNDimerTool.pdf, http://e-drexler.com/d/05/00/DC10C-mechanosynthesis.pdf, and http://www.molecularassembler.com/Papers/JCTNPengFeb06.pdf. Each of these approaches has the potential of building the numerous nanoscale electronic, mechanical, and structural components that comprise productive nanosystems.

The ultimate result will be a nanofactory that can build virtually anything—limited only by the laws of physics, the properties of the input feedstock, and the software that controls the device.

Continue reading “Be Careful What You Wish For” »

Jun 4, 2009

Ripsaw Tank Delivers Death at 60MPH — Popular Science

Posted by in categories: counterterrorism, defense, engineering, military, robotics/AI
An unmanned beast that cruises over any terrain at speeds that leave an M1A Abrams in the dust
Mean Machine: Troops could use the Ripsaw as an advance scout, sending it a mile or two ahead of a convoy, and use its cameras and new sensor technology to sniff out roadside bombs or ambushes John B. Carnett

Continue reading “Ripsaw Tank Delivers Death at 60MPH — Popular Science” »

May 30, 2009

Create an AI on Your Computer

Posted by in categories: complex systems, human trajectories, information science, neuroscience, robotics/AI, supercomputing

Singularity Hub

Create an AI on Your Computer

Written on May 28, 2009 – 11:48 am | by Aaron Saenz |

If many hands make light work, then maybe many computers can make an artificial brain. That’s the basic reasoning behind Intelligence Realm’s Artificial Intelligence project. By reverse engineering the brain through a simulation spread out over many different personal computers, Intelligence Realm hopes to create an AI from the ground-up, one neuron at a time. The first waves of simulation are already proving successful, with over 14,000 computers used and 740 billion neurons modeled. Singularity Hub managed to snag the project’s leader, Ovidiu Anghelidi, for an interview: see the full text at the end of this article.

The ultimate goal of Intelligence Realm is to create an AI or multiple AIs, and use these intelligences in scientific endeavors. By focusing on the human brain as a prototype, they can create an intelligence that solves problems and “thinks” like a human. This is akin to the work done at FACETS that Singularity Hub highlighted some weeks ago. The largest difference between Intelligence Realm and FACETS is that Intelligence Realm is relying on a purely simulated/software approach.

Which sort of makes Intelligence Realm similar to the Blue Brain Project that Singularity Hub also discussed. Both are computer simulations of neurons in the brain, but Blue Brain’s ultimate goal is to better understand neurological functions, while Intelligence Realm is seeking to eventually create an AI. In either case, to successfully simulate the brain in software alone, you need a lot of computing power. Blue Brain runs off a high-tech supercomputer, a resource that’s pretty much exclusive to that project. Even with that impressive commodity, Blue Brain is hitting the limit of what it can simulate. There’s too much to model for just one computer alone, no matter how powerful. Intelligence Realm is using a distributed computing solution. Where one computer cluster alone may fail, many working together may succeed. Which is why Intelligence Realm is looking for help.

The AI system project is actively recruiting, with more than 6700 volunteers answering the call. Each volunteer runs a small portion of the larger simulation on their computer(s) and then ships the results back to the main server. BOINC, the Berkeley built distributed computing software that makes it all possible, manages the flow of data back and forth. It’s the same software used for SETI’s distributed computing processing. Joining the project is pretty simple: you just download BOINC, some other data files, and you’re good to go. You can run the simulation as an application, or as part of your screen saver.

Continue reading “Create an AI on Your Computer” »