Pages

Sunday, 1 December 2013

TOP 10 SCARY MODERN TECHNOLOGIES


New Picture 73
Top 10 Scary Modern Technologies
By Chris Pollette and Dave Roos,
How Stuff Works, 30 November 2013.

Technology makes our lives better. You're taking a MOOC class, and have your appointments organized on your computer. You watch wepisodes on your internet-capable high-definition television. You pay your bills electronically and save time and money. That's fine and dandy, until someone takes out the electronic banking system and the machines take over the planet.

Sounds crazy? Perhaps. None of the gadgets and innovations we included in our list of 10 scary technologies is likely to rain death and destruction on our little planet, though that doesn't prevent people from being unnerved by them. Read on to find out what weirdness may await in the future.

10. Hearing Voices at the Store

New Picture 74
That voice you hear in the store urging you to buy something you hadn't planned on may not be inside your head.

Imagine that you walk into your friendly neighbourhood big box store and instead of being greeted by a smiling retiree, you hear whispered voices prompting you to buy things. You spin around to see who's speaking, but there's no one there and none of the other shoppers seem alarmed. Have you finally gone nuts? No, but the advertising industry has.

A company called Holosonics has developed a technology called the Audio Spotlight system, which uses tiny speakers to focus sound into a very narrow beam. Ultrasonic frequencies are too high for the human ear to hear, but as the sound travels from the Audio Spotlight system's speakers, air distorts the sound and makes it audible. It's perfect for in-store advertising, but you'd have to be standing in the right place to hear it.

9. DNA Hacking

New Picture 75
J. Craig Venter speaks after a screening of "Cracking the Ocean Code," at the American Museum of
Natural History in 2006. Venter and his team have discovered at least 5 million new genes and 7,000 new
microbial species in waters all over the planet.

When the human genome was fully mapped in 2003, researchers around the globe began to dissect the genome's 3 billion-plus base pairs for the root causes of diseases like Alzheimer's and common cancers. But that was only the beginning. The real dream of biotechnology is not only to understand how our DNA expresses itself, but also to "write" new DNA that heals disease and repairs bodies from the inside out. J. Craig Venter, the bio-entrepreneur whose company helped map the genome, reached a new milestone in 2010 when he built the world's first synthetic, self-replicating chromosome [source: Hessel]. He loaded some homemade synthetic DNA into a bacterial cell and watched it grow and divide according to computer-generated As, Ts, Gs and Cs. By his own reckoning, he had created "life."

In the happy scenario, biologists of the near future will figure out how to program viruses and bacteria to deliver custom-made cures that shrink cancerous tumours or reverse the tide of dementia. In the super scary scenario, bioterrorists engineer deadly superbugs that target us at a genetic level. In a 2012 article, The Atlantic imagined a technologically plausible scheme in which the president of the United States is assassinated by a highly contagious cold designed to target a weak link in his specific genetic code [source: Hessel]. To keep your DNA out of enemy hands, it's best not to leave the house without a hairnet and rubber gloves.

8. Cyberwar

New Picture 76
An IT security researcher looks for computer viruses in Seoul, South Korea in 2013. A cyber attack on
the networks that ran three banks, two broadcasters and an ISP was traced to an IP address in China, but
experts think the attacks were from North Korea.

Imagine a war fought completely by computer. No, we're not talking about a scene out of the movie "War Games," we're talking an all-out attack on a nation's electronic infrastructure. What's that, you may ask? Those are the systems that control emergency response services, banks and other electronic commerce, the systems that run the electrical grid, water and fuel pipeline controls, and oh, yeah: defense weaponry. A well-executed attack could cause serious disruption and open the populace up to physical threats.

In 2013, FBI Director James Comey predicted that cyber attacks would soon overtake traditional international terrorism as the greatest threat to homeland security [source: Johnson]. In 2008,Georgia suspected Russia of denial-of-service attacks (which Russia denied) [source: Markoff]. In 2013, South Korea accused North Korea of cyber tacks. Hackers have taken on the Pentagon, and some suspect terrorist organizations of training their operatives to launch computer assaults. So how do you defend against a cyber attack? Educating people about computer viruses and Trojan horses will help, and using updated antivirus software is also important.

Cyber attacks actually might be useful tools against machines that have learned to think for themselves and chosen to eliminate humanity. It's the stuff of science fiction, but why do some people believe this could happen? Read on to learn more.

7. The Technological Singularity

New Picture 77
A user learns how to scan his palm to ensure that he cannot exchange more than US$1,000 in a single
day on the world's first bitcoin ATM at Waves Coffee House in Vancouver, B.C., in 2013.

Artificial intelligence (AI) has come a long way since computers first made the scene. Yet we're not at the edge of a dystopian society in which the machines run amok and humankind fights for its survival. At least, not yet.

In 1993, Vernor Vinge, a math professor at San Diego State University, proposed what he called the singularity - a time at which computer networks may become self-aware through advanced AI, and interfaces between people and computers help humankind evolve. Biological advancements may become so sophisticated that doctors can even engineer human intelligence. There is a possibility, however, that AI might allow machines to take over the world. There's no guarantee that such a scenario will really happen, and technological limitations may prevent it. Still, the idea that machines might someday decide we're irrelevant and arrange for our destruction is more than a little creepy.

6. Google Glass

New Picture 78
Attendees wear Google Glass while posing for a group photo during the Google I/O developer
conference in San Francisco, 2013.

Google Glass, the high-tech specs with a built-in camera and pop-up display, turns the idea of Big Brother on its head. Maybe the surveillance menace of the future won't be a fascist regime with spy cameras on every corner, but rather an army of geeks recording every waking moment of their lives with a nod of the head and the wink of an eye.

Aside from the inherent dorkiness of Glass, privacy is the biggest concern with the search giant's latest foray into world domination. What's to stop a Glasshead from turning on his camera in the subway, the doctor's office or the gym locker room? Several U.S. casinos, bars and movie theatres have already banned Glass [source: Stern]. Google says that Glass isn't that creepy. For example, a small light indicates when video is being recorded and Glass wearers have to look at a subject and wink to take a picture. Yeah, that's not creepy at all.

Another scary prospect is the combination of Glass, social media and facial recognition technology. Some app developers are excited about the prospect of a Glass app that can recognize a stranger's face and pull up information about the person scoured from their Facebook and LinkedIn pages [source: Bloomberg View]. While Google rejects the idea of facial recognition on Glass, the company has patented eye-tracking technology that would record what ads you look at in the real world and charge fees to advertisers on a "pay-per-gaze" basis [source: Rieland].

While we're on the subject of scary surveillance, let's take to the skies.

5. Drones

New Picture 79
Journalists watch a quadrocopter drone with a device for marking telephone cables with artificial DNA
take off in 2013. Deutsche Telekom is releasing drones across Germany to fight cable theft, which has
shot up with the increasing value of copper.

A CIA operator in Virginia can fly a near-silent Predator drone through the night sky of Pakistan, locate his target on a video screen and rain down Hellfire missiles from the comfort of his cubicle [source: Mayer]. While counterterrorism officials and the White House defend unmanned drones as a "cleaner" alternative to military action, the use of drones raises important questions about government-sanctioned assassination and the inevitable deaths of innocent civilians.

As scary as military drones are, people are truly creeped out by the prospect of domestic spy drones. In 2012, the U.S. Congress passed a bill allowing the Federal Aviation Administration (FAA) to draw up rules for the use of commercial and police drones in U.S. airspace [source: Smithson]. And New York City mayor Michael Bloomberg commented that the presence of drones hovering over American cities was "inevitable" [source: Haq]. Law enforcement is buzzed over the idea of trailing suspects from the skies, but privacy advocates worry that it's a small step from targeted surveillance to indiscriminate 24/7 spying on everyone [source: Lowy].

For a totally different kind of creepy, let's look at the desktop technology that promises to revolutionize manufacturing if it doesn't get outlawed first.

4. 3-D Printers

New Picture 80
A 3-D printer makes an object in a fabrication laboratory (fab lab) in Strasbourg, eastern France.

The MakerBot Replicator 2 offers the remarkable ability to print out a 3-D plastic model of just about anything you can imagine: a child's toy, a gear for a wind turbine, or a perfectly rendered model of your own butt. Desktop 3-D printing is undoubtedly a great leap forward for small-scale manufacturing, but it's also a potential boon for thieves and low-budget terrorists.

In 2011, an enterprising gang of crooks used a 3-D printer to replicate the plastic front of an ATM terminal. By placing their fake terminal on top of a real cash machine, they were able to skim unsuspecting victims' ATM cards and steal more than US$400,000 from their accounts [source: Krebs].

But the real scary prospect is terrorists or fringe groups using 3-D printers to build guns, bombs and other weapons with nothing more than downloadable files. In 2013, a University of Texas law student Cody Wilson announced the creation of the Liberator, a fully functional .380 calibre handgun made entirely on a 3-D printer. The fact that it was plastic raised the fright factor, since it could conceivably elude metal detectors [source: Greenberg]. Wilson summed up the threat nicely to Forbes magazine: "Anywhere there's a computer and an Internet connection, there would be the promise of a gun."

Thanks, Cody! While we're on the topic of really great ideas with potentially horrible consequences, let's talk driverless cars.

3. Driverless Cars

New Picture 81
A bicyclist rides by a Google self-driving car at the Google headquarters in Mountain View, California, in 2012.

Worldwide, roughly 1.3 million people are killed in car accidents each year [source: Khazan]. And then there's the evil of traffic itself; the American commuter is trapped in his or her car for an average of 38 hours each year [source: Werbach]. That's a full week of lost productivity!

Enter the Google self-driving car, an autonomous vehicle that promises to steer clear of accidents and keep traffic flowing smoothly via algorithm. Powered by Google Chauffeur software, the car uses GPS and a rooftop scanner to stay on course and respond to nearby vehicles. As of 2013, the car was still in its beta testing phase, but dozens of robotic cars were already on the road in California and Nevada.

One of the biggest concerns about driverless cars isn't a software glitch, but the awkward transition from robot mode to human mode. The soothing voice of Google Chauffeur alerts its human driver of upcoming situations that require hands-on control, like a tricky merge or a tollbooth [source: Fisher]. But Google engineers are still working out how much warning time is needed before the hand-off, or what to do if the driver has done something understandably human like doze off [source: Bosker]. No one wants to wake up behind the wheel of an SUV barrelling down on a tollbooth at 65 mph (105 kph). And even fewer people want to be in that tollbooth.

2. Geoengineering

New Picture 82
Splinters of ice peel off from one side of the Perito Moreno glacier in southern Argentina in 2008.
Dumping iron dust in the seas or placing smoke and mirrors in the sky to dim the sun could curb global
warming, say backers of geoengineering.

The most important engineering innovations of the industrial age - motorized vehicles, electricity generation and industrial manufacturing - are the greatest sources of CO2 emissions [source: EPA]. Since world leaders appear unwilling or unable to take meaningful action to reduce greenhouse emissions, some maverick scientists are proposing a risky solution called geoengineering.

Geoengineering uses science and technology to "hack" the planet back into shape. Since global warming is the biggest threat, scientists are proposing creatively creepy (and very expensive) ways to artificially cool the atmosphere by either blocking the sun's rays or sucking up excess CO2. Among them [sources: Bullis, Kintisch and Madrigal]:
  • Spraying chemical aerosols like sulphur dioxide into the atmosphere to bounce a fraction of sunlight back into space.
  • Pouring iron into the ocean to spur algae blooms that consume CO2.
  • Spraying a mist of seawater into low-lying clouds to make them brighter, reflecting more sunlight.
  • Planting forests of artificial trees that use chemical reactions to absorb and store CO2.
Even geoengineering promoters warn of unintended side effects. Out-of-control algae blooms could create massive dead zones in the ocean; one nation's seawater spray could cause monsoons halfway around the world; chemical reactions could cause widespread damage to natural habitats and human life. Geoengineers argue there's just as much danger in doing nothing. By researching these techniques now, at least we'll have some hard data when it's time to push the panic button.

For our last scary technology, we consider a little thing called the Internet.

1. Internet Surveillance

New Picture 83
Protesters march through downtown Washington D.C. during the Stop Watching Us Rally, protesting
surveillance by the NSA on Oct. 26, 2013.

More than 380 million people visited Web sites owned by Google and Yahoo in an average month in 2013 [source: Wohlsen]. Every e-mail sent through Gmail, every spreadsheet saved in Google Docs and every chat conversation held on Yahoo Messenger is stored in "the cloud," a global network of servers and data centres. You might assume that all of this private information and personal data is encrypted and protected from prying eyes. But now we know better.

Thanks to the leaked revelations of former National Security Agency (NSA) contractor Edward Snowden in 2013, we learned that the U.S. intelligence agency is actively sifting through e-mails, search histories and phone records of millions of innocent people, looking for potential terrorist activity. As part of a secret program called PRISM, the NSA won court approval to force companies like Google and Yahoo to turn over records on foreign Web users. If that wasn't enough, the NSA also secretly tapped into Google and Yahoo's cloud servers without the companies' knowledge or approval [source: Peterson]. Critics call it blatantly unconstitutional to submit every unwitting Web user to blanket surveillance.

As scary as it is, you should assume that all your online activities are being collected by someone, whether it's your Internet provider, Google or a secret government spying program. Sleep tight and don't let Big Brother bite!

Article Sources:
1. Bloomberg View. "Google Glass's Scary Vision." June 3, 2013. (Nov. 15, 2013)
2. Bosker, Bianca. "No One Understands the Scariest, Most Dangerous Part of a Self-Driving Car: Us." Huffington Post. Sept. 16, 2013. (Nov. 15, 2013)
3. Bullis, Kevin. "The Geoengineering Gambit." MIT Technology Review. Dec. 21, 2009. (Nov. 15, 2013)
4. Daw, David. "Criminals Find New Uses for 3-D Printing." PC World. Oct. 10, 2011. (Nov. 15, 2013)
5. Fisher, Adam. "Inside Google's Quest to Popularize Self-Driving Cars." Popular Science. Sept. 18, 2013. (Nov. 15, 2013)
6. Greenburg, Andy. "Meet 'The Liberator': Test-Firing the World's First Fully 3-D-Printed Gun." Forbes. May 5, 2013. (Nov. 15, 2013)
7. Hessel, Andrew; Goodman, Marc; and Kotler, Steven. "Hacking the President's DNA." The Atlantic. Oct. 24, 2012. (Nov. 15, 2013)
8. Johnson, Kevin. "FBI director: Cybercriminals are the new enemy." USA Today. Nov. 14, 2013.
9. Khazan, Olga. "A surprising map of countries that have the most traffic deaths." The Washington Post. Jan. 18, 2013. (Nov. 15, 2013)
10. Kintisch, Eli. "'Hack the Planet' Safety Card." Hack The Planet. ( Nov. 15, 2013)
11. Krebs, Brian. "Gang Used 3-D Printers for ATM Skimmers." Krebs on Security. Sept. 11, 2011. (Nov, 15, 2013)
12. Lowy, Joann. "Civilian Drones Come With Both Risk and Reward." Huffington Post. March 30, 2013. (Nov. 15, 2013)
13. Madrigal, Alexis. "Q&A: Geoengineering is 'A Bad Idea Whose Time Has Come.'" Wired. March 23, 2010. (Nov. 15, 2013)
14. Mayer, Jane. "The Predator War." The New Yorker. Oct. 26, 2009. (Nov. 15, 2013)
15. NASA. "Consensus: 97% of climate scientists agree." (Nov. 15, 2013)
16. Peterson, Andrea. "PRISM already gave NSA access to tech giants. Here's why it wanted more." The Washington Post. Oct. 30, 2013. (Nov. 15, 2013)
17. Rieland, Randy. "Will Google Glass Make Us Better People? Or Just Creepy?" Smithsonian.com. Oct. 4, 2013. (Nov. 15, 2013)
18. Smithson, S. "Drones Over U.S. Get OK by Congress." The Washington Times. Feb. 7, 2012. (Nov. 15, 2013)
19. Stern, Joanna. "Members of Congress Ask Google to Respond to a List of Glass Privacy Concerns." ABC News. May 17, 2013. (Nov. 15, 2013)
20. U.S. Environmental Protection Agency (EPA). "Overview of Greenhouse Gases." (Nov. 15, 2013)
21. Werbach, Adam. "The American Commuter Spends 38 Hours a Year Stuck in Traffic." The Atlantic. Feb. 6, 2013. (Nov. 15, 2013)
22. Wholson, Marcus. "Yahoo Takes Web Traffic Crown from Google - But Is It Winning?" Wired. Aug. 22, 2013. (Nov. 15, 2013)

Related Articles:

Top image: A protester with the group Code Pink demonstrates against the U.S. National Security Agency's practice of secretly collecting people's phone records and Internet activity data. See spy pictures. Credit: Jim Watson/AFP/Getty Images.

[Source: How Stuff Works. Edited.]


2 comments:

  1. information able post ,like this.Large website you get. Do you already digest Bitcoins? I would urge to foretoken up at who-accepts-bitcoins.com. They give create the traffic you requirement as their database is ofttimes searched by bitcoin spenders. It's disembarrass tho'!

    ReplyDelete
  2. Have you ever considered about including a little bit more than just
    your articles? I mean, what you say is fundamental and all.
    But imagine if you added some great visuals or videos to give
    your posts more, "pop"! Your content is excellent but with images and videos, this website
    could certainly be one of the greatest in its
    niche. Awesome blog!

    Feel free to surf to my website - battlefield 4 strategies

    ReplyDelete

Please adhere to proper blog etiquette when posting your comments. This blog owner will exercise his absolution discretion in allowing or rejecting any comments that are deemed seditious, defamatory, libelous, racist, vulgar, insulting, and other remarks that exhibit similar characteristics. If you insist on using anonymous comments, please write your name or other IDs at the end of your message.