БЛОГ

Archive for the ‘policy’ category: Page 73

Mar 18, 2016

Who’s Afraid of Existential Risk? Or, Why It’s Time to Bring the Cold War out of the Cold

Posted by in categories: defense, disruptive technology, economics, existential risks, governance, innovation, military, philosophy, policy, robotics/AI, strategy, theory, transhumanism

At least in public relations terms, transhumanism is a house divided against itself. On the one hand, there are the ingenious efforts of Zoltan Istvan – in the guise of an ongoing US presidential bid — to promote an upbeat image of the movement by focusing on human life extension and other tech-based forms of empowerment that might appeal to ordinary voters. On the other hand, there is transhumanism’s image in the ‘serious’ mainstream media, which is currently dominated by Nick Bostrom’s warnings of a superintelligence-based apocalypse. The smart machines will eat not only our jobs but eat us as well, if we don’t introduce enough security measures.

Of course, as a founder of contemporary transhumanism, Bostrom does not wish to stop artificial intelligence research, and he ultimately believes that we can prevent worst case scenarios if we act now. Thus, we see a growing trade in the management of ‘existential risks’, which focusses on how we might prevent if not predict any such tech-based species-annihilating prospects. Nevertheless, this turn of events has made some observers reasonably wonder whether indeed it might not be better simply to put a halt to artificial intelligence research altogether. As a result, the precautionary principle, previously invoked in the context of environmental and health policy, has been given a new lease on life as generalized world-view.

The idea of ‘existential risk’ capitalizes on the prospect of a very unlikely event that, were it to pass, would be extremely catastrophic for the human condition. Thus, the high value of the outcome psychologically counterbalances its low probability. It’s a bit like Pascal’s wager, whereby the potentially negative consequences of you not believing in God – to wit, eternal damnation — rationally compels you to believe in God, despite your instinctive doubts about the deity’s existence.

However, this line of reasoning underestimates both the weakness and the strength of human intelligence. On the one hand, we’re not so powerful as to create a ‘weapon of mass destruction’, however defined, that could annihilate all of humanity; on the other, we’re not so weak as to be unable to recover from whatever errors of design or judgement that might be committed in the normal advance of science and technology in the human life-world. I make this point not to counsel complacency but to question whether ‘existential risk’ is really the high concept that it is cracked up to be. I don’t believe it is.

Continue reading “Who's Afraid of Existential Risk? Or, Why It's Time to Bring the Cold War out of the Cold” »

Mar 16, 2016

The 21st century Star Wars — By Dr Patricia Lewis | The World Today

Posted by in categories: governance, government, law, policy, satellites, security, space, transparency, treaties, weapons

Cover pic_0

“Modern life relies on satellite sytems but they are alarmingly vulnerable to attack as they orbit the Earth. Patricia Lewis explains why defending them from hostile forces is now a primary concern for states”

Read more

Mar 1, 2016

Autonomous Killing Machines Are More Dangerous Than We Think

Posted by in categories: cybercrime/malcode, drones, ethics, law, military, policy, robotics/AI

I see articles and reports like the following about military actually considering fully autonomous missals, drones with missals, etc. I have to ask myself what happened to the logical thinking.


A former Pentagon official is warning that autonomous weapons would likely be uncontrollable in real-world situations thanks to design failures, hacking, and external manipulation. The answer, he says, is to always keep humans “in the loop.”

The new report, titled “ Autonomous Weapons and Operational Risk,” was written by Paul Scharre, a director at the Center for a New American Security. Scharre used to work at the office of the Secretary of Defense where he helped the US military craft its policy on the use of unmanned and autonomous weapons. Once deployed, these future weapons would be capable of choosing and engaging targets of their own choosing, raising a host of legal, ethical, and moral questions. But as Scharre points out in the new report, “They also raise critically important considerations regarding safety and risk.”

Continue reading “Autonomous Killing Machines Are More Dangerous Than We Think” »

Feb 28, 2016

Report Cites Dangers of Autonomous Weapons

Posted by in categories: cybercrime/malcode, military, policy, robotics/AI

I agree 100% with this report by former pentagon official on AI systems involving missiles.


A new report written by a former Pentagon official who helped establish United States policy on autonomous weapons argues that such weapons could be uncontrollable in real-world environments where they are subject to design failure as well as hacking, spoofing and manipulation by adversaries.

In recent years, low-cost sensors and new artificial intelligence technologies have made it increasingly practical to design weapons systems that make killing decisions without human intervention. The specter of so-called killer robots has touched off an international protest movement and a debate within the United Nations about limiting the development and deployment of such systems.

Continue reading “Report Cites Dangers of Autonomous Weapons” »

Feb 26, 2016

Unprecedented scientific report says decline of pollinators a threat to food security

Posted by in categories: food, health, policy, security

Around the world, the animals that pollinate our food crops — more than 20,000 species of bees, butterflies, bats and many others — are the subject of growing attention. An increasing number of pollinator species are thought to be in decline, threatened by a variety of mostly human pressures, and their struggles could pose significant risks for global food security and public health.

Until now, most assessments of pollinator health have been conducted on a regional basis, focusing on certain countries or parts of the world. But this week, a United Nations organization has released the first-ever global assessment of pollinators, highlighting their importance for worldwide food and nutrition, describing the threats they currently face and outlining strategies to protect them.

The report, which was released Friday by the U.N.’s Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services (IPBES), has been in the works since the summer of 2014. The research team consisted of more than 70 experts, who drew on the most up-to-date global pollinator science, as well as local and indigenous knowledge, to complete the assessment.

Continue reading “Unprecedented scientific report says decline of pollinators a threat to food security” »

Feb 25, 2016

Need To Beef Up India’s Cyber Security Policies And Mechanisms – Analysis

Posted by in categories: cybercrime/malcode, finance, government, policy, robotics/AI

I luv it — India get’s it. You have to make sure that your IT foundation is solid first before unleashing things like AI. Connected AI requires a solid and secured infrastructure foundation 1st. In order for customers to buy into Cloud & the whole IoT, and connected AI set of products and services; the customer must feel that they can trust you fully.


By Jayadev Parida

Take a stock of the past, analyse the present cliché and frame a strategy for future. In the recent years, India’s approach to cyber security has experienced a shift from style to substance. Prime Minister Modi’s foreign policy has made various strong interventions on cyber security matters. Those interventions need to be materialised to manoeuvre the interest. Presumably, the Prime Minister Office (PMO) is likely to invest both political and capital energy to enhance a cautious cyber-strategy. A dedicated Division in the Indian Ministry of External Affairs (MEA) for cyber security is a value addition to that. In 2015, Minister of Communications and Information Technology in a written reply to the Lok Sabha stated that government allocated Rs 755 crore to combat cyber security threats over a period of five years. But, this financial outlay is quite negligible as the nature of threat is quite huge and unpredictable.

Continue reading “Need To Beef Up India’s Cyber Security Policies And Mechanisms – Analysis” »

Feb 24, 2016

The Apple-FBI Fight Isn’t About Privacy vs. Security. Don’t Be Misled — By Brian Barrett | Wired

Posted by in category: policy

Apple_Backdoor

““You hear over and over and over again, from the pro-backdoor camp, that we need to strike a balance, we need to find a compromise,” says Cardozo. “That doesn’t work. Math doesn’t work like that. Computer security doesn’t work like that … It’s kind of like climate change. There are entrenched political interests on one side of a ‘debate,’ and on the other side is the unanimous scientific and technical community.””

Read more

Feb 23, 2016

Calif.‘s Harris Outlines ‘Reasonable’Data Security

Posted by in categories: business, cybercrime/malcode, internet, law, policy, quantum physics

I wish the CA AG a lot of luck; however, her approach is very questionable when you think about downstream access and feed type scenarios. Example, Business in Boston MA has an agreement with a cloud host company in CA, and Boston also has data that it pulls in from Italy, DE, etc. plus has a service that it offers to all of users and partners in the US and Europe that is hosted in CA.

How is the CA AG going to impose a policy on Boston? It can’t; in fact the business in Boston will change providers and choose to use someone in another state that will not impact their costs and business.

BTW — I didn’t even mention the whole recent announcement from China on deploying out a fully Quantum “secured” infrastructure. If this is true; everyone is exposed and this means there is no way companies can be held accountable because US didn’t have access to the more advance Quantum infrastructure technology.

Continue reading “Calif.‘s Harris Outlines ‘Reasonable’Data Security” »

Feb 23, 2016

Homesteading in Space: White House Science Office Seeks Sci-Fi Inspiration

Posted by in categories: policy, science, space

Today at the California NanoSystems Institute/ UCLA in Los Angeles, California, the White House Office of Science and Technology Policy (OSTP) co-sponsored a look at humanity’s space future.

Read more

Feb 22, 2016

Is San Bernardino iPhone Fully Encrypted?

Posted by in categories: encryption, government, hacking, law enforcement, mobile phones, policy, privacy, security

Here is a question that keeps me up at night…

Is the San Bernardino iPhone just locked or is it properly encrypted?

Isn’t full encryption beyond the reach of forensic investigators? So we come to the real question: If critical data on the San Bernardino iPhone is properly encrypted, and if the Islamic terrorist who shot innocent Americans used a good password, then what is it that the FBI thinks that Apple can do to help crack this phone? Doesn’t good encryption thwart forensic analysis, even by the FBI and the maker of the phone?

iphone-01In the case of Syed Rizwan Farook’s iPhone, the FBI doesn’t know if the shooter used a long and sufficiently unobvious password. They plan to try a rapid-fire dictionary attack and other predictive algorithms to deduce the password. But the content of the iPhone is protected by a closely coupled hardware feature that will disable the phone and even erase memory, if it detects multiple attempts with the wrong password. The FBI wants Apple to help them defeat this hardware sentry, so that they can launch a brute force hack—trying thousands of passwords each second. Without Apple’s help, the crack detection hardware could automatically erase incriminating evidence, leaving investigators in the dark.

Continue reading “Is San Bernardino iPhone Fully Encrypted?” »

Page 73 of 92First7071727374757677Last