IEET’s George Dvorsky offers course on Introduction to Transhumanism

{An interesting 2014 article demonstrating an artificially stimulated interest in transhumanism - ED].


by Institute for “Ethics” and Emerging Technologies (IEET)
(Co-founded by transhumanists James Hughes and Oxford don Nick Bostrom)

IEET’s George Dvorsky offers course on Introduction to Transhumanism

George Dvorsky, prominent futurist, writer on ethics and technology and Chairman of the IEET Board of Directors, is offering his:  Introduction to Transhumanism course during May, from May 1st to May 31st, 2014.

This course introduces the philosophy and socio-cultural movement that is transhumanism. We will survey its core ideas, history, technological requirements, potential manifestations, and ethical implications. Topics to be discussed will include the various ways humans have tried to enhance themselves throughout history, the political and social aspects of transhumanism, the technologies required to enhance humans (including cybernetics, pharmaceuticals, genetics, and nanotechnology), and the various ways humans may choose to use these technologies to modify and augment their capacities (including radical life extension, intelligence augmentation, and mind uploading). Along the way we will discuss social and ethical problems that might be posed by human enhancement.

Schedule and readings: Specific reading and discussion goals are set for each week, and students can proceed at their own pace. There are no live events planned. An assortment of resources will be used, including academic papers, online presentations, instructional videos, and popular articles. Everything about the course and all readings are provided within the PSA Moodle website. Course lectures, links to websites, and forums for discussions with the instructor and students are included in the Moodle website classroom. Visit the class anytime to contribute your posts and receive George Dvorsky’s replies in discussion forums. There is nothing “live” you can miss – log in and participate anytime day or night, 24/7, throughout May.

Ask George about this course by tweeting to him at twitter.com/dvorskyor posting on his facebook wall at www.facebook.com/gdvorsky

Canadian futurist, science writer, and ethicist George Dvorsky has written and spoken extensively about the impacts of cutting-edge science and technology—particularly as they pertain to the improvement of human performance and experience. George is a contributing editor at io9 where he writes about science, culture, and futurism. A founding member of the Institute for Ethics and Emerging Technologies, he is its Chair of the Board and the founder and program director for its Rights of Non-Human Persons program. In addition, George is the co-founder and president of the Toronto Transhumanist Association and has served on the Board of Directors for Humanity+ for two terms. His work has been featured in such publications as The Guardian, the BBC, CBC, Forbes, the New York Times, Slate, Radio Free Europe, and al-Jazeera. He is also an avid CrossFitter, an ancestral health enthusiast, and an accomplished music performer, composer, and recording engineer.




[Note:  Couldn’t be more “in their own words” and “in your face”.  Let’s remember that bioethics founder Art Caplan is on the IEET board of trustees, so we already know which “ethics” they use, including utilitarian’s “for the greater good” and the libertine bioethics principle of absolute “autonomy”:  http://ieet.org/index.php/IEET/bio/caplan/;  also,

http://ieet.org/index.php/IEET/category/C46.   And of course, see a good upfront description of transhumanism/futurism/posthumanism in the recent articles by transhumanists, at:  http://wavism.net/principles/what-is-social-futurism/, and at  http://www.psychologytoday.com/blog/the-transhumanistphilosopher/201404/transhumanist-explores-new-type-community (Bitcoin and all). The article first appeared here.

‘Unhackable’ Apple Embarrassed by Teen Who Dumped Secure Data in Folder Named ‘Hacky Hack Hack’

by Jack Davis


A 16-year-old boy was so fascinated with his favorite technology company that he hacked his way into Apple’s servers, stealing 90 gigabytes worth of files and accessing customer accounts as well.

The Children’s Court in Melbourne, Austrailia, heard the case Thursday, in which the teen pleaded guilty. The teen’s name is being withheld by the court.

His defense lawyer said the teen was so well known in the hacking community that sharing details of the case could put him at risk.

The teen said he “dreamed of” working for Apple, and decided to hack his way into their servers, something he did for about a year.

The boy’s hacking exploits came to an end last year when the Australian Federal Police executed a search warrant on his home, The Age reported.

While the attacker tried to hide his identity, Apple was able to identify the serial numbers of the laptops used to perform the attacks, and that’s how the investigation led to Australia, according to the New York Post.

Police also found a trove of hacking files and instructions in a folder titled “hacky hack hack.”

Apple trumpeted its role in eventually finding the hacker.

“At Apple, we vigilantly protect our networks and have dedicated teams of information security professionals that work to detect and respond to threats,” the company said in a statement, according to The Guardian.

“In this case, our teams discovered the unauthorized access, contained it, and reported the incident to law enforcement,” the statement said.

However, the teen also helped get himself caught by bragging about what he had done on WhatsApp, police said.

Apple insisted that despite what was said in court, no personal accounts were compromised

“We … want to assure our customers that at no point during this incident was their personal data compromised,” its statement said. .[Yeah, right! - ED]

Suelette Dreyfus, a privacy expert from the University of Melbourne, is urging that the teen be treated with leniency, saying kids push limits online just as they do everywhere else.

“I have researched a number of teen hacker cases internationally,” Dreyfus said.

“Almost all these teens grew out of the technology boundary-pushing of their youth, and then went on to live useful lives and contributing to society. Putting them in prison is often a waste of that potential,” she said.

“Young people often make mistakes when they are exploring and rule-breaking especially online — including boasting about their exploits. It’s not right, but for tech teens, it can be a part of growing up … there’s usually a really worried teen and family at the end of this sort of court case,” Dreyfus concluded.








Jack Davis is a free-lance writer. Writing as "Rusty" Davis, he is a Spur Award-nominated writer whose first two novels, “Wyoming Showdown” and “Black Wind Pass” were published by Five Star Publishing.

What You Need to Know About EPA’s New Boss Andrew Wheeler

by H Sterling Burnett


Former Administrator Scott Pruitt’s resignation from the Environmental Protection Agency (EPA) marked the end of a productive but tumultuous period for the agency. The good news? Pruitt’s replacement, Andrew Wheeler, will likely continue the needed reforms Pruitt began. In the immortal words of The Who, “Meet the New Boss, Same as the Old Boss.”

However history judges Pruitt’s tenure at EPA, critics and supporters can agree he initiated a series of efforts to fundamentally transform the antiquated agency. He ended sue-and-settle agreements; reshaped its science advisory committees; reduced graft; and rolled back myriad regulatory actions, including the Clean Power Plan, the Waters of the United States (WOTUS) rule, the massive increase in the Corporate Fuel Economy Standard (CAFE), and various energy efficiency mandates for appliances. Thanks to Pruitt, EPA is finally changing how it conducts business.

You might be concerned that Pruitt’s absence could result in a complete change in course, but fear not! President Donald Trump’s energy and environment agenda will not substantively change with Wheeler’s ascension to the agency’s top post.

Sadly, and not surprisingly, environmental zealots treated Wheeler’s appointment as though it is the end of the world. A Huffington Post headline stated, “Scott Pruitt’s Replacement Is Even Worse.” In the article, Frank O’Donnell, president of the left-wing group Clean Air Watch, stated, “This is like rearranging deck chairs on the environmental Titanic.”

The Left’s histrionic response to Wheeler mirrors its response to Trump’s nomination of Brett Kavanaugh as associate justice to the U.S. Supreme Court. Regardless of an appointee’s qualifications, anyone Trump nominates to lead the EPA will inevitably be tarred and feathered by the Left and braded a climate-change-denying polluter. 

Environmentalists dread Wheeler for the same reason small-government advocates applaud him: Wheeler could be even more effective than Pruitt at rolling back onerous regulations. EPA’s new chief has significant experience working within and outside of the agency. In fact, Wheeler won awards for his work at the agency between 1991 through 1995. Subsequently, Wheeler worked as majority staff director and chief counsel at the Senate Committee on Environment and Public Works, with EPA oversight. Wheeler will be more than capable to rein in EPA overreach.

The regulatory rollback at EPA started under Pruitt is expected to increase with Wheeler at the helm. EPA is currently working on overhauling CPP, WOTUS, and CAFE to improve transparency and ease compliance with commonsense guidelines.

In his short time as the agency’s acting administrator, there has been no shortage of statements supporting Wheeler as a more disciplined, less scandal prone replacement for Pruitt.

“We have full confidence in Andrew both from his past experience and the job he has done at EPA,” Myron Ebell, director of the Center for Energy and Environment at Competitive Enterprise Institute, told the Washington Examiner. “We think he will carry on the Trump reform agenda in a really competent way.”

“For the top people at the EPA, the various Pruitt accusations have been a real challenge and a distraction,” Ebell continued. “Once Pruitt is gone, and Andrew is in charge, people will get back to doing their jobs everyday rather than accusations.”

“With Andy Wheeler stepping in to replace Pruitt, I think we’ll see a change in style but not in substance,” Jeff Holmstead, a former deputy administrator of the EPA in the George W. Bush administration, told the Washington Examiner. “Andy probably is the ideal person to lead EPA at this point.

“Pruitt got a lot of regulatory reforms started, but he’s never worked a regulatory agency and didn’t fully understand the administrative process and what it would take to get them finalized. Andy certainly does,” Holmstead said. “He’s worked on these issues for years and may actually be more effective than Pruitt when it comes to carrying out the reforms that Pruitt started.”

No one knows exactly what Wheeler’s tenure might mean for EPA climate policy. Driven by the endangerment finding, EPA has begun the process of drafting a replacement of CPP. However, if Wheeler’s past statements are any indication of EPA’s future actions, it seems like sound science will replace climate alarmism.

The Huffington Post notes in 2010, while working for the Senate, Wheeler “accused the U.N. Intergovernmental Panel on Climate Change of blurring ‘the lines between science and advocacy’ and functioning ‘more as a political body than a scientific body,’ suggesting EPA could ‘reconsider its endangerment finding without almost exclusively relying upon the IPCC.’”

All Trump administration officials operate under an intense (and biased) media spotlight. It is difficult, if not impossible, for any Trump appointee to stay below the radar, but if anyone can remain effective and ethical, Andrew Wheeler certainly can. With his knowledge of the inner-workings of EPA’s regulatory processes and his low-key, non-confrontational style, Wheeler can complete the job Pruitt started and restore the EPA back to its mission:protect human health and the environment.



A Transhumanist Explores a New Type of Community - "Zero State"

[A 2014 article from transhumanist Amon Twyman who is an advocate of radical social and technological change leading to a zero state, no gender, no individuality, no freedom, where the majority are nothing more than engineered man-machines comprising the vast part of a one world community under autocratic control.  His statement; ".. direct democratic action to circumvent obsolete political institutions." promotes the 'social justice' of Aldous Huxley's eugenics world dream via 'mob rule' anarchy  - ED ]

Interview with Zero State founder and transhumanist Dr. Amon Twyman. [Emphasis DNI]

Rapid advances in technology are paving the way for new ideas about the future, including those of the communities we live in. I had a chance to catch up with transhumanist, Zero State founder, and cognitive scientist Dr. Amon Twyman, who is a leader of one such community that is exploring new directions for the betterment of humanity

Dr. Amon Twyman

 

Q. Dr. Twyman, What is Zero State?

A. Zero State (ZS) is a community that grew out of the transhumanist movement back in 2011. It’s now part of a broad coalition of groups and movements that we call WAVE, referring to a coming wave of radical technological and social change. The basic ZS idea is to create networks of people and resources which could evolve into a distributed, virtual State. Right now there are only a few thousand ZSers (albeit well connected to much larger networks), but in a hypothetical full-blown Zero State there would be tens of millions or more, all supporting each other and being part of a single nation no matter where they live in the world. Our motto is "positive social change through technology."

 Q. How does transhumanism relate to ZS?

A. Our core principles and ideas are deliberately compatible with transhumanism. That comes naturally, as ZS grew out of transhumanism and our most active “citizens” tend to self-identify as Transhumanists. That said, it’s important to stress that people don’t have to be transhumanists to join ZS. More generally, we consider ourselves to be a “Social Futurist” community, which is to say that we believe technological breakthroughs don’t happen in a social vacuum. There are social, economic, and political issues which not only stubbornly continue to exist in the face of techno-optimism, but which are sometimes greatly exacerbated by technological change. In short, we believe that technology should be applied to improving the human condition on both physiological and societal levels.

Q. How can ZS help the world?

A. In the first instance, we are focused on helping ZS’ citizens, or more accurately, helping them to help each other. An increasing number of people are finding themselves in need of help of one type or another these days, and we would like to demonstrate that mutual support is made more achievable than ever before thanks to the power of cutting-edge technologies. We tend to focus on bringing together people and ways to access current technologies such as meshnets, cryptocurrency, Virtual Reality and Artificial Intelligence, while exploring ideas such as longevity, super-intelligence & wellbeing, accelerating change, and direct democratic action to circumvent obsolete political institutions. Beyond working to help our own people, we actively work to support the wider network of like-minded groups and believe that compassionately, intelligently applied technology has the potential to improve the lives of everybody in the world.

 Q. How did you come to be the founder of ZS?

A. My background is in a combination of psychological research (consciousness and decision making, Artificial Intelligence) and digital & performing arts. Although I’d read my fair share of science fiction as a kid, I decided I was a transhumanist while studying at university, after reading “Mind Children” by Hans Moravec. Over time, my various interests in art, science, transhumanism, and contemporary social/political issues coalesced into a coherent worldview, and I eventually decided to form an organization to pursue these ideas. The result, Zero State, was heavily informed by my experience as a co-founder of the UK Transhumanist Association, which has since evolved into Humanity+ UK. I started building WAVE, the broader network ZS is part of, two years later. That was once we’d had time to realize that there was a bigger picture emerging; a large number of like-minded groups forming to address a vast array of specific issues with a common outlook. That common outlook is characterized by technological savvy, distaste for old thinking and limits, and a keen awareness of social issues.


A. What does the future hold for ZS?

Q. ZS-affiliated project groups continue to work on developing tools for our members. A lot of these projects are collaborative and many have a distinctly transhumanist flavor, such as experimentation with Transcranial Direct Current Stimulation (using electrical charge to help concentration—work being done in collaboration with Dirk Bruere and Andrew Vladimirov). Some of the projects seem more like simple fun than serious experimentation at first glance—such as the ZSers building Minecraft environments in which to test their AI software—but that’s half the point; For people to do something useful and have fun at the same time. Our most vigorous efforts are currently going into WAVE, expanding the wider, networked context in which ZS operates, doing what we can to help out like-minded groups. We’ve been establishing connections with large networks, such as The Zeitgeist Movement and an emerging coalition of online transhumanist organizations. We live in extremely exciting times, with lots of rapid change both good and bad, and it looks like Zero State will soon get its chance to help people help each other in that brave new world. If you believe in the promise of technology, the importance of social justice, and the power of community building then feel free to jump in and join the fun!


Zoltan Istvan is an award-winning journalist, philosopher, and activist. You can find him on TwitterGoogle+Facebook, and LinkedIn. Zoltan is also the author of the recently published #1 Philosophical bestseller novel The Transhumanist Wager. Available in ebook or paperback, the controversial novel is a revolutionary reading experience. You can check it out here

 



Zoltan Istvan

Zoltan Istvan is an American-Hungarian philosopher, journalist, entrepreneur, and futurist. He is best known as a leading transhumanist and the author of the controversial novel, 
The Transhumanist Wager, a #1 bestseller in both Philosophy and Science Fiction Visionary and Metaphysical on Amazon.[ He has a B.A. in philosophy and religious studies from Columbia University. The article first appeared here. If this doesn't give you reason to pause, I don't know what could - DNI]




Birth of ‘living materials’ at MIT combines synthetic biology, materials engineering

by Kenrick Vezina

Illustration by Yan Liang, via MIT News.

A team at MIT has combined techniques from synthetic biology and materials engineering to create hybrid “living materials”: bacteria engineered to take up functional nanoparticles and grow into thin layers with usable properties, like electrical conduction or light emission. This achievement is a perfect follow-up to news from earlier this month that another group at MIT had successfully created bionic plants   [Emphasis Others] (Read our Gene-ius post on the news here.)

Anne Trafton, writing for MIT News, reports: 

These “living materials” combine the advantages of live cells, which respond to their environment, produce complex biological molecules, and span multiple length scales, with the benefits of nonliving materials, which add functions such as conducting electricity or emitting light. 

The organic analog of choice is bone. As Amina Kahn at the Los Angeles Times puts it:

 Our bones are remarkable feats of engineering; strong and yet light, shot through with holes and yet able to bear incredible loads. This super-strong natural material is built as cells incorporate hard minerals like calcium into living tissue

The MIT team, led by assistant professor of electrical engineering and biological engineering Timothy Lu, was inspired by this interplay of living cells with nonliving components.

The process Lu and his team used begins with the bacteria E. coli and genetic engineering. They chose E. coli because it naturally produces thin, slimy films that adhere to surfaces — it’s this adhesion that’s key. In order to adhere to surfaces, E. coli produces “curli fibers”, comprised of repeating protein chains.

The MIT team replaced the bacteria’s ability to produce curli fibers with an engineered genetic circuit that only produces curli fibers if given a certain molecule. Now the team essentially has an on-off switch for the bacteria and can control the formation of biofilms: supply the bacteria with the trigger molecule and they produce curli fibers and form biofilms.

On top of this, the team engineered another set of E. coli with a similar on-off switch but based on a different molecular trigger. And these bacteria were modified one step further: researchers altered the genes coding for the creation of curli fibers so that the protein chains would grab on to gold nanoparticles

So they had two varieties of engineered bacteria, both controllable via distinct molecule of their choosing, and one of the two’s ability to latch onto its environment with curli fibers has been co-opted to make the bacteria gather tiny bits of gold from its environment. 

Take both varieties, grow them together; manage their growth relative to one another with the two on-off molecules; and supply some nanoscale bits of gold. The researchers did just this and managed to coax the bacteria to build a tiny film laced through with gold nanowires: a conductive surface comprised of living cells

And the conductive biofilm is just one of several proofs-of-concept to come out of this project. 

The team was also able to embed quantum dots — semiconductor nanoparticles that glow a particular color after being illuminated by light — in their biofilm through a similar technique.

The final success lies in getting their modified cells to communicate with one another, as emphasized by the Christian Science Monitor. The molecular “on-off switches” described above don’t necessarily need to be supplied manually; in fact the researchers produced a third variety of E. coli which naturally produced the chemical trigger, activating the generation of gold-locking curli fibers in the second variety.

The potential applications for these living materials include batteries and solar cells, diagnostic devices and scaffolds for tissue engineering. According to Trafton, “The researchers are also interested in coating the biofilms with enzymes that catalyze the breakdown of cellulose, which could be useful for converting agricultural waste to biofuels.”

This latest breakthrough is sure to be one of many similar efforts that blurs the perceived boundaries between living and nonliving, artificial and organic. We’re increasingly able, as Lu and his team demonstrate, to manipulate our world at the level of molecules and atoms — whether those are DNA molecules or gold nanowiring.

 
Sources:

Additional Resources:




The article first appeared here.

How to build your very own Self-Directed Immortality Avatar for 2045!

by 2045.com


International Manifesto of the "2045" Strategic Social Initiative

Mankind has turned into a consumer society standing at the edge of a total loss of the conceptual guidelines necessary for further evolution. The majority of people are almost exclusively absorbed  in merely maintaining their own comfortable lives.

Modern civilization, with its space stations, nuclear submarines, iPhones and Segways cannot save mankind from the limitations in the physical abilities of our bodies, nor from diseases and death.

We are not satisfied with modern achievements of scientific and technical progress. Science working for the satisfaction of consumer needs will not be able to ensure a technological breakthrough towards a radically different way of life.

We believe that the world needs a different ideological paradigm. Within its framework it is necessary to form a major objective  capable of pointing out a new direction for the development of all mankind and ensuring the achievement of a scientific and technical revolution.  The new ideology should assert, as one of its priorities, the necessity of using breakthrough technology for an improvement of man himself and not only of his environment.

We believe that it is possible and necessary to eliminate aging and even death, and to overcome the fundamental limits of the physical and mental capabilities currently set by the restrictions of the physical body.

Scientists from various countries in the world are already developing technology that ensures the creation of an artificial human body prototype within the next decade. We believe the biggest technological project of our times will become the creation of such artificial human body and a subsequent transfer of individual human consciousness to such a body.

Implementation of this technological project will inevitably result in an explosive development of innovations and global changes in our civilization and will improve human life.

We believe that before 2045 an artificial body will be created that will not only surpass the existing body in terms of functionality, but will achieve perfection of form and be no less attractive than the human body. People will make independent decisions about the extension of their lives and the possibilities for personal development in a new body after the resources of the biological body have been exhausted.

The new human being will receive a huge range of abilities and will be capable of withstanding extreme external conditions easily: high temperatures, pressure, radiation, lack of oxygen, etc. Using a neural-interface humans will be able to operate several bodies of various forms and sizes remotely.

We suggest the implementation of not just a mechanistic project to create an artificial body, but a whole system of views, values and technology which will render assistance to humankind in intellectual, moral, physical, mental and spiritual development.

We invite all interested specialists: scientists, politicians, mass media personalities, philosophers, futurologists and businessmen to join the "2045" strategic social initiative. We welcome all who share our vision of the future and are ready to make the next jump.


THE AVATAR R&D NETWORK OF THE 2045 INITIATIVE

[To the right of the main page, click on “Immortality Button”:  “Click this button to start the development of your personalized immortal Avatar”]

The main objectives of our movement are:

1. To achieve the support of the International community and create conditions for international co-operation of interested specialists around the "2045" Initiative.  

2. To create an international research center for cybernetic immortality to advance practical implementations of the main technical project – the creation of the artificial body and the preparation for subsequent transfer of individual human consciousness to such a body. 
 
3. To engage experts in the selection and support of the most interesting projects in the quest to ensure technological breakthroughs.

4. To support innovative industries and create special scientific education programs for schools and institutes of higher education.

5. To create educational programs for television, radio and internet, to hold forums, conferences, congresses and exhibitions, and to establish awards and produce books, movies and computer games with the view of raising the profile of the initiative and spreading its ideas.

6. To form a culture connected with the ideology of the future, promoting technical progress, artificial intellect, “multi-body”, immortality, and cyborgization.


REQUIREMENTS:


For the registration of your pre-order, please answer the following questions:

Are you 18 or older?

Are you of sound mind so as to bear legal responsibility for your actions?

Do you personally -- yourself or as legal representative -- dispose of the funds required for the development (> $3M) for your avatar?

Have you decided to commission the development of your custom-made immortal avatar?

If you answer “no” to a question, you cannot proceed further 

[Note:  Guess this is yet another way to de-populate the world -- Russian-style.  Note that the Russians charge in U.S. dollars! -- DNI]


New Ways to Engineer the Germline

by Jessica Cussins


In 1998, a UCLA conference called "Engineering the Human Germline" brought together more than 1,000 people to discuss various emerging technologies and the challenges they faced. Gregory Stock, a co-organizer of the conferencetold Nature at the time that, really, the goal of the event was to make the inheritable genetic modification (IGM) of humans “acceptable” to the public

O
ver forty countries, and multiple international treaties, prohibit IGM due to the profound safety, social, and ethical implications of making permanent changes to the human germline. Opposition to IGM is widespread; the Center for Genetics and Society, for example, has long argued that “the case for allowing it is not compelling, and the potential harms of doing so are immense.” 

Disturbingly, 2013 has seen a deluge of new efforts, more explicit than any since 1998, to ease public opinion towards allowing human germline engineering. 

The big one for 2013, which I have written about before, is mitochondrial replacement. This is a technology that would in theory allow a woman with a particular kind of severe mitochondrial disease the chance to have a non-affected and mostly genetically related child. It would extract the nucleus from one of her eggs and insert it into an enucleated egg from a second woman, and then allow the resulting egg, containing nuclear DNA from the intended mother and mitochondrial DNA from a donor woman, to be fertilized. This crude technique poses severe risks to any resulting child, yet, with both the United Kingdom and the United States currently considering policy changes to allow clinical trials, it seems to be the world’s current forerunner for violating the international consensus against IGM.

But there are other developments worth keeping an eye on. One, a gene editing technique known as CRIPSR, has gotten a lot of attention recently because of its potential for permitting much more specific genetic alterations than can be accomplished with currently used methods. Researchers have had some success in mice and human stem cells, and a company called Editas that just launched intends to investigate and commercialize its human possibilities. Fortunately, the focus of CRIPSR is likely to dwell in the realm of gene therapy for critically ill consenting persons. Unfortunately, some scientists are also touting the possibilities of applying CRISPR to IVF embryos – in other words, of moving ahead to full-fledged inheritable genetic modification.  

It is still too early to know how effective and safe CRISPR could be; so called off-target mutations” caused by its high mutagenic efficiency could mean that the technique would fix one problem, but introduce others. Furthermore, epigenetic changes caused by this technique seem inevitable, and yet would be very difficult to understand or predict ahead of time. However, if it is found to be safe and effective, it would be the most powerful tool for producing “designer babies” the world has seen to date. Unlike mitochondrial replacement, with its crude wholesale swap of one woman’s mitochondrial DNA for another’s, CRISPR could make it possible at least to try to alter specific genes for specific purposes.

Another procedure that was recently in the news is a method to genetically modify sperm. Scientists from the Royal Veterinary College in the United Kingdom used a viral vector to insert genetic material into mouse spermatozoa and found that it was still functional three generations later. However, while this technique introduces another method for creating transgenic animals, it seems that any human applications are vague and hypothetical at this point.

All of these techniques are biologically extreme processes that carry unknown impacts. But it’s important to remember that, even if they can be made to work, none of them alleviate the illnesses of people alive today. Instead, they are proposals for creating new people. They are often justified as a way to help couples who desperately want a genetically related child, but are concerned about passing on a debilitating illness to their children.  ...

It remains to be seen how the policy cards will fall on these novel attempts at IGM, and whether technical limitations or the impressive outpouring of criticism from varied sources around the world this year could be enough to fight back this particular wave of enthusiasm.


Previously on Biopolitical Times:





[Note:  Again, what is rarely mentioned in terms of the injected genes and resultant damaged immunology of the future children involved, it is not just the foreign “desired” genes that are passed down through the generations, but also the foreign genes from the viral or bacterial vectors used, the genes that produce the transcription factors used (e.g., Oct4), and actually any other foreign genes the researchers might “desire” for experimental purposes.   What about all those genes and how they might function in future generations of human beings?  How do those foreign genes interact with the future children’s normal genes?  Where do those foreign genes end up after they’re injected?  They don’t know.  The current epidemic in scientific fraud is finally being met by calls even within the various scientific fields for turning such cases over for police work and jail time.  Perhaps researchers in genetic engineering/synthetic biology/nanotechnology who damage future generations of human beings because of their fraud and lack of professional credentials should also be held to legal accountability for their actions.  See: 

--  [Junk DNA] Never-Seen-Before Secret DNA Code And An 'Unusual Meaning'-Scientists Find, at: http://www.designntrend.com/articles/9627/20131214/never-seen-before-secret-dna-code-unusual-meaning-scientists-find.htm  

--  Richard Smith: Should scientific fraud be a criminal offence?, at:  http://blogs.bmj.com/bmj/2013/12/09/richard-smith-should-scientific-fraud-be-a-criminal-offence/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+bmj%2Fblogs+(Latest+BMJ+blogs)  

--  Call the cops;  The long arm of the law has reached into an investigation of alleged scientific misconduct, at:  http://www.nature.com/news/call-the-cops-1.14288


See also: 

-- 'Designer Sperm' Inserts Custom Genes Into Offspring, at:  http://www.sciencedaily.com/releases/2013/12/131202171926.htm

--  Scientist create 'robotic sperm' to help with fertilisation and drug delivery, at:  http://www.independent.co.uk/news/science/scientist-create-robotic-sperm-to-help-with-fertilisation-and-drug-delivery-8999796.html;  Abstract at:  http://onlinelibrary.wiley.com/doi/10.1002/adma.201302544/abstract .

--  News from Abroad: EPO Clarifies Extent to which Methods Involving Use of Human Embryos Are Excluded from Patentability, at:  http://www.patentdocs.org/2013/12/news-from-abroad-epo-clarifies-extent-to-which-methods-involving-use-of-human-embryos-are-excluded-f.htmlThe article first appeare

The article first appeared here. --  DNI]


Beware - Web Spying Companies Recording all User Keystrokes

by Allen Williams


A few weeks ago, I decided to have a look at one of the web visitor data recording companies out there to see what kind of information they could collect.. Motherboard reports that a Princeton study revealed that over 400 companies (so far) record your every keystroke and them transmit it to a third party website.  

Typical companies providing this service are FullStory, SessionCam, SmartLookUserReplay, etc.  I opted to try SmartLook simply because the ’geniuses’ at Webnode provided a convenient widget to insert their tracking code.

It just isn’t enough today that American Intelligence agencies are spying on everyone with their Prism software, but they are partnering with major business and social media like the CIA’s 600 million contract with Amazon .com  for cloud access.  We already know that Facebook and until recently Twitter provide information to the CIA.  The bad news here is that all purchases through Amazon are retained on their cloud servers and the CIA will have access.  You can be certain that any cloud service that your application communicates with will be available to the intelligence services as well as a host of unknown third parties because the data is NOT encrypted.

It’s far better to get the ‘mark’ to provide personalized data on him or herself to the tracking recorder thinking that he’s browsing anonymously or at least ignored  but “…many of these companies have dashboards where clients can playback the recordings they collect.   Yandex, Hotjar, and Smartlook’s dashboards run non-encrypted HTTP pages, rather than much more secure, encrypted HTTPS pages.”  The biggest liability is that once the data is removed from your site all control is lost, virtually anyone could have access to this data and you’d never know.

I was curious to find out just what could be collected by SmartLook.  However, I was surprised to find that the actual service is quite haphazard.  Either SmartLook is developing their recording software ‘on the fly’ as the saying goes or you really don’t get much on the ‘free’ side.  But upgrading the service means you’re paying to have your readers spied on.

Fortunately, the SmartLook collected data is not totally accurate or reliable.  Primarily because the staff is not well organized, knowledgeable or well versed in English.  After adding their code to The Patriot’s header and getting nothing, I contacted SmartLook support where a woman named Sofie informed me by email that  “In one case Only in webnode premium you can add code directly to the HTML header of the whole website.  In webnode free, you need to install the code in all pages you wish to track.”   Anyone, who is remotely conscious or understands the language, knows that free websites don’t have custom registered URLs as we do, ergo, we are a premium user!   So this individual is likely responding with canned phrases from the company’s data forum without any understanding of what was conveyed because they can’t communicate beyond an elementary level in English.

In another case, two different users known to me personally, one residing in Kansas and the other in Ohio accessed our site but showed the same IP address in the data collection set.  Upon questioning one of the support staff as to how this could happen, I was told that “The only explanation is that it was the same person and the two different names appeared because you have wrong code settings.”  The company’s help link indicates that if you want to track a particular user, you have to type their email address directly into the tracking code and they give an example case. The SmarLook tracking code is ‘paste-in’ and Webnode provides the widget access so unless you can’t type an address within the two apostrophe markers, you can’t have wrong code settings unless either SmartLook or Webnode made them.  

Individual email identification is no better as I have seen a whole day of data collection of 6 or more people with the same email but different IP addresses. Guess the user has multiple identities so he or she switches every couple of hours throughout the day.  The responses I’ve received from their support staff are disingenuous and you can’t really trust their assessments.

After some dickering back and forth with their support personnel to get things working the way SmartLook advertised,  I indeed found that I could watch a visitor enter our site and view virtually everything he or she clicked on.  This kind of information can and will be abused down the road and It's already happening as "The CBS report suggests in no uncertain terms that the personal information pertaining to millions of Americans collected by one of the World’s largest ad agencies is sold to the CIA." 

Smartlook claimed their software only retained three days worth of data but that’s because I wasn’t paying them to collect it.  Data was collected from approximately Nov 3rd to Nov 24th obviously more than 3 days. There was no data collected beyond Nov 24th, 2017 by their system even though I still had their code installed on the site for several more days.  At first, I thought it was yet another glitch but when nothing more was recorded, I removed the code.  On Nov. 27th, all archived data subsequently disappeared from the SmartLook control panel or at least was interred somewhere where I couldn’t access it.  You can be reasonably certain that it’s still archived there even if I no longer have access to it.

UPDATE  12/12/17 Why Have you Stopped Using SmartLook?

Hi,

I have noticed you removed our code from your website. Can you tell me why did you stop using Smartlook? Just pick a letter:

A) Smartlook doesn't record my website properly
B) I don’t have time to watch the recordings / I find no added value in Smartlook
C) I just removed Smartlook temporarily - plan to use it again
D) I am missing feature X (please fill in)
E) Neither of those, let me tell you why...

I will be glad for any feedback, even if it's negative.


Best regards,


Vladimir Sandera
cofounder, optimist
Smartlook


I received this correspondence from one of the SmartLook co-founders in early December after removing their code from our header.  Why was this an issue? Could it be that they wanted me to leave the code installed to keep recording visitor data whether or not I chose to use it?


Update 1/24/2018

 “We're excited to tell you we're migrating all our data to more powerful cloud service (AWS)! Your account included. The process is time-intensive, but we're working hard to complete the migration by the end of next week.

While the long-term benefits will be great, we wanted to let you know you might experience a few bumps and minor interruptions along the way. (Might.)

The good news:

  • AWS provides us with more safety, stability, and speed
  • Your data will be better serviced and stored securely
  • Smartlook features will run faster
  • This migration is a lot of work, and we appreciate your patience during the next few days while we finish up”

Your Smartlook Team

Long term benefits for whom? This move simply presents more opportunities for data to be accessed by more persons unknown as it’s unlikely that Smarlook’s new AWS storage is any more secure than Yahoo who experienced a major hack. 

I recommend readers give serious consideration to a good AD blocker:  “If you want to block session replay scripts, popular ad-blocking tool AdBlock Plus will now protect you against all of the ones documented in the Princeton study.


Another One For The Transhumanist Scrapbook: Draconian Punishments

by Joseph P. Farrell


So many people sent me versions of this important and significant development that it was simply a kind of moral imperative that I alert readers here to it, and say something about it. In this case, there are four different articles, each of which reveals, almost immediately, what the new concern is:


Is Biotech Seeking Ways to Make People Suffer Eternally?

Should Biotech Make Life Hellish for Criminals? 

Enhanced Punishment: Can Technology Make Life Sentences Longer? 

Could we condemn criminals to suffer for hundreds of years? Biotechnology could let us extend convicts’ lives ‘indefinitely

When Dr. de Hart and I were writing Transhumanism: A Grimoire of Alchemical Agendas, one of the questions we were impelled to raise, one which the transhumanist movement itself raises repeatedly, is what does it mean to be “human”? And this, we implied, was not simply a philosophical question. Nor was it a question of biological or chemical “scientism” with its convenient, and largely useless, materialist reductionisms. It was a question of culture, society, jurisprudence, and morality

Within the transhumanist “vision” there is a common underlying theme, regardless of whether or not one accepts the “heaven scenarios” of such advocates like Ray Kurzweil, or the more sobering assessments of transhumanist researchers like Joel Garreau and their “hell scenarios”, for in both cases, the favored transhumanist “GRIN” technologies – genetics, robotics, information processing, and nano-technologies – open both favorable and horrific vistas of the future.

In this case, we are concerned with the horrific ones, for as the articles suggest, what if such technologies made life extension possible as a matter of judicial punishment? This unpleasant prospect, as the articles aver, is actually being not only entertained but its advocacy is even being implied in some circles. What if, in addition to this, other technologies are super-added to life extension, technologies of the “androgynous and alchemical fusion” of man and machine, to implant criminals with chips, to subject them to forms of “virtual torture” and suffering? Some transhumanists have envisioned the downloading and uploading of individual’s personal memories as a technique of virtual life extension. But what if such technologies could recover the memories of victims of crimes? Would criminals then be punished by making them relive in some sort of “virtual reality” the horrors of the crimes they committed on their victims? Could criminals of the future be sentenced to “life extension and ‘hard reliving’ of their crimes from the victim’s point of view” for “x” number of years, without hope of parole or reprieve? While such questions sound like science fiction, as the above articles point out, they are already being entertained, and they are being entertained, because the technologies impelling them are already under development.

Indeed, one can envision a state of development where such technologies were so advanced that a sentence of life in prison with “at hard virtual labor” would be so horrific, that the death penalty, far from being a thing to be avoided by defendants, might become a thing sought.

But there are yet other possibilities as well, possibilities that were, in fact, explored in the television science fiction series Babylon Five in the 1990s: the “death of personality.” In that series, convicted murderers are subjected to a kind of “death of the ego”: the erasure of the personality, memories, and emotions of the perpetrator

While some may view all of this favorably, and argue that it is “ethical,” I incline to the other opinion, and hold that it is barbaric, and a measure of the dehumanizing that such philosophies and technologies are inevitably bringing with them. I submit that such punishments are indeed “cruel and unusual” and little other than a form of torture.

 But whatever one’s opinion may be, the cultural transformation of culture and society that the transhumanists are championing or, in a few cases, decrying, are indeed hurtling down the tracks toward us and will force each of us to deal with the types of questions these articles are pointing out.


See you on the flip side.



The article first appeared here.


2030: You Own Nothing, Have No Privacy...

by Chris Campbell


“Welcome to 2030. I own nothing, have no privacy, and life has never been better.”

In 2017, we find ourselves caught between the incredible and Earth-shaking potential of exponential technology — and a million minds, pulling the reins, trying to tame the beast and train it to build out their particular vision of the future.

One such vision is horrifyingly articulated in an article promoted by the World Economic Forum late last year.

The article, written by young Ida Auken, was published ahead of the World Economic Forum’s Annual Meeting of the Global Future Councils.  It details a techno-utopian circular economy, which, on the surface, sounds great. In the circular economy, products are turned into services. Everything is Uber-ized. So, of course, nobody owns anything and all non-ownership is transparent.

“When products are turned into services, no one has an interest in things with a short life span. Everything is designed for durability, repairability and recyclability. The materials are flowing more quickly in our economy and can be transformed to new products pretty easily. Environmental problems seem far away, since we only use clean energy and clean production methods.”

The devil, of course, is in the details. And a tiny, unavoidable glint of darkness emerges halfway through the article:  “Once in a while I get annoyed about the fact that I have no real privacy. Nowhere I can go and not be registered. I know that, somewhere, everything I do, think and dream of is recorded. I just hope that nobody will use it against me.”

Ah, I see.

In this scenario, without privacy, forget about freedom of speech, assembly or the basic ability to form one’s own opinion about the nature of things.

If the politicos are still at the top of the food chain, if the sociopathic wolves still guard the chicken pen, we wonder, what would this society look like?

The flow of information would likely be managed to the bit. Models of reality would be shaped in real-time. Maps would be mistaken for the territory, as nobody would have a reason to think different.

“Free” education would perfect the art of brainwashing. A.I. programs would parse through text messages, emails and social media, in search of “problematic” language. And those deemed a threat to the civility and order of the “Free Society” would likely be, at best, casted out to live with the rurally deplored or, at worst, hanged (humanely as possible, of course) in the public square.

Think of all of those meandering thoughts which run through your mind, of which you cannot control.  Now imagine that any one of them could be used against you. Welcome to 2030. I own nothing, I have no privacy and life couldn’t be more terrifying.

Fortunately, privacy isn’t dead. And technology is a wild beast which might prove impossible to tame completely. In fact, for those willing to put in the work to protect themselves, there are plenty of options to keep your information safe and protected from prying  eyes. Today, to talk about one tool you should add to your privacy arsenal, we invite Simon Black of Sovereign Man.

Read on.

Here’s a FANTASTIC Security Tool You Really Should Know About

By Simon Black


Chances are you probably use a cloud service to store at least a portion of your files. Dropbox. iCloud. Microsoft’s OneDrive. Mega. Box.

There’s so many of them these days. And a few of them, like Switzerland-based Tresorit, focus heavily on privacy and security to keep your data safe.

But let’s be honest– privacy is definitely not a top priority among most of the top cloud providers.

Dropbox states right on its own website that the company has direct access to your files.  ensitive company data. Financial records. Intimate photos. Personal information. Password files. Cryptocurrency keys.And even if you delete the files, the backup copies are STILL stored on Dropbox’s servers.

(It’s not just Dropbox– most of the major cloud services operate this way.) This presents a significant amount of risk from multiple fronts.

Hacker threats are nearly ubiquitous these days. Hardly a month goes by without another announcement of some major data breach… and we only hear about the big ones in which millions of people are affected.  One of the latest hacker trends is when attackers gain control of your mobile devices by calling up your mobile carrier and convincing them that they’re you.  This allows them to reset passwords and easily gain access to your emails and files.  Then of course there are legal risks.

If you’ve never been sued, congratulations. Let’s hope it stays that way. If you have been sued, congratulations. It means that at least someone thinks you’re successful. Broke people typically don’t get sued. Bear in mind that the ‘justice’ system today has very little to do with justice.  It’s about government prosecutors or some twisted, amoral, money-hungry lawyer convincing 12 strangers on a jury that you’re a terrible person.  And during the discovery process of a lawsuit, EVERYTHING is up for grabs. A court can literally subpoena your entire life, including your emails, files, financial records, etc. Chances are they can find something in all that data to make you look bad.

Then there’s the other never-ending issue of government spying and the NSA archiving every kilobyte of data that passes across the Internet. It might be easier to simply CC the government on every email you send and add their email address as an authorized user of your Dropbox account. Despite all these known risks, though, and the constant stream of stories about hackers and government spying, few people take steps to safeguard their data.

(As an example, according to a study by Keeper Security, the most common password is 123456. Not exactly hacker-proof.)

But there are some very simple tools available that can help.

One of them is called Cryptomator, which came to my attention from a close friend of mine who works in the US Army’s cyberwarfare divison, which was established to defend government systems against foreign hackers. Cryptomator is free, simple program which encrypts every single file you store on a cloud server. Let’s say you use Dropbox to sync files between your laptop and the cloud.

Ordinarily, your files are stored unencrypted on your laptop, and they’re accessible by certain Dropbox staff through the cloud servers. Cryptomator encrypts the files on BOTH ends, i.e. the file that’s stored on the Dropbox servers is encrypted, AND the file stored locally on your laptop is encrypted.

Dropbox employees who try to access your data would see nothing but gibberish. And anyone who gains physical access to your laptop would see nothing but gibberish.  Only you have the ability to unlock the files.

Now, this sounds like a cumbersome process… having to constantly encrypt and decrypt files, enter passwords, etc.  But it’s not. Cryptomator has created a streamlined platform where you can group files together in ‘vaults’. Then you can decrypt an entire vault, attach it to your file system, and easily re-encrypt it when you’re finished. You can see an example in this video.

Try it out if you’re interested; the software is free, available on Mac OS, Windows, Linux, Android, and iPhone.  Plus it’s open-source, meaning that anyone who knows the Java programming language can download the source code and verify that the software contains no backdoors or malware.





[Ed. note: This article originally appeared on the Sovereign Man blog, right here at this link.]  Chris Campbell is the Managing editor of Laissez Faire Today. Before joining Agora Financial, he was a researcher and contributor to SilverDoctors.com.  The article is published under a creative commons license here.