The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Monthly Archives: March 2022
University of Wyoming Fall 2021 Honors | In Our Schools | wyomingnews.com – Wyoming Tribune
Posted: March 15, 2022 at 6:12 am
UW Presidents Honor Roll
The University of Wyoming recently listed 155 students from Laramie County on the 2021 fall semester Presidents Honor Roll.
The Presidents Honor Roll consists of regularly enrolled undergraduates who earned a 4.0 (A) grade-point average for the semester. To be eligible, students must have been enrolled for a minimum of 12 credit hours taken for letter grades.
Students on the list were:
Michael Bohlinger, Jack D. Ickes, Harkiran Kaur
Madison B. Adkins, Bernadette R. Aguirre, Joshua Paul Ahern, Zachary E. Allison, Tara L. Andera, Mila Anderson, Haylee Nicole Arneson, Benjamin W. Auer, Alexis R. Baca, Sierra Brooke Bates, Stephanie Benedict, Andrew J. Bishop, McKenzie R. Boltz, Riley Boltz, Michael T. Boyce, Reese E. Bradley, Baillie R. Brandt, Marcis James Bravo, Dejakai Gabriella Brown, Hannah Marie Brown, Zamboni P. Brown, Julia G. Brownell, Deianeira E. Bruce, Carlee Carter, Hailey I. Cassidy, Justyn B. Christensen, Coleden A. Church, Kaycee OShea Clark-Mellott, Julia R. Colvin, Nicolas A. Cruz, Madison Michelle Davis, Hannah Dempsey, Rachel A. Dey, Madeline H. Dillow, Kylie Dray, Cody Dugas, Lindsay J. Eldred, Annastasia M. Erdmann, Abigail Rose Erickson, Mackenzie Kay Faircloth, Erica A. Farris, Lexus R. Fermelia, Azure Flowers, Jennica Marie Fournier, Maren French, Jacquelyn Opal Gonzales, Jenna Michelle Goodrich, Kyle Grant, Kaija M. Hacker, Cassidy M. Hager, Kevin Robert Hardy, Taryn Harsy, Tayva E. Hart, Garrett Hartigan, Hayden H. Hassinger, Courtney A. Hayden, Miles Hays, Zachary Nicholas Hendricks, Mark Allen Holm, Hannah Hood, Alexandra Jaye, Andrew J. Johnson,
Averi N. Kastens, Kayla M. Ketterling, Mackenzie Klipstein, Keenan R. Kresl-Hotz, Samantha Land, Gwenevieve Ledesma, Liam R. Leslie, Aubrey L. Lieske, Rachel E. Linde, Katelynn A. Loken, Emily C. Lucero, Erika Matheney, Emily Mcilvaine, Dillon S. McLean, Emma Katherine Meese, Alexa Mejia, Aidan J. Miller, Aspen N. Miller, John T. Miller, Christian M. Moncrief, Emma M. Morris, Cole A. Munari, Anna Naig, Haley M. Neisen, Peyton R. Ojeda, Ava Olson, Logan Opsal, Anna Papadopoulos, Brianna Perry, Rachel Pietsch, Michael L. Pope, Addison M. Potts, Brooklyn R. Prince, Emily Purifoy, Haley L. Purifoy, Harrison J. Rankin, Jakob C. Rayl, Kendra C. Redding, Paige Hua Lan Ricketts, Peyton R. Rigg, Faith Alexandra Riter, Rachael Riter, Grace A. Ritschard, Taylor R. Rogers, Kaylyn R. Rollefson,
Danielle L. Sawyer, Kevin J. Sawyer, James William Schuchardt, Adrian James Seiloff, Taylen Elizabeth Sewell, Abigail Elizabeth Shameklis, Skye A. Skinner, Katelyn Dale Smith, Andrew C. Speight, Anna Lucille Steele, Austin James Stephen, Sydne Stewart, Kieli A. Stults, Blaine T. Teers, Katearie Thoms, Ryan Tingle, Amanda Trammell, Tristin E. Waggener, Morgan Wald, Tiffany R. Walker, Megan J. Weidler, Caden J. Wiederspahn, Cody Wilcox, Kassidy J. Williams, Katelyn Jeanette Williams, Ryan Louis Williams, Kacey Willyerd, Grace K. Wolfe, Jeremiah Robert Dean Wordeman, Jackson B. Yager, Breanna Young, Renee C. Young, Kristina Pauline Zaharas, Eric J. Zastoupil, Nathan James Zastoupil, Jonah Matthias Zeimens
Emily D. Keiter, Gracie Mae Keiter
Andrew R. Fornstrom, Gregory Gerald Fornstrom, Leonardo S. Garcia, Torri Long, Tucker G. Norman, Harper L. Pachel, Reagan Pachel
UW Deans and Deans Freshman Honor Rolls
The University of Wyoming lists 228 students from Laramie County on the 2021 fall semester academic Deans and Deans Freshman Honor Rolls.
The honor rolls consist of regularly enrolled undergraduates above freshman standing who earned a 3.4 or better grade-point average, and freshmen who have earned a 3.25 or better grade-point average.
To be eligible, students must have been enrolled for a minimum of 12 credit hours taken for letter grades.
Students on the list were:
Alexander J. Allison, Brittney L. Anderson, Cassadie E. Anderson, Colter Davis Anderson, Maren N. Anderson, Nicholas R. Anderson, Josephine Andrew, Blue Ayotte, Ashlyn Bailey, Brooke E. Bailey, Scarlett M. Bainbridge, Brandyn M. Banville, Andrea Becerra, Nicholas Begeman, Nolan R. Bell, Sydney Eve Bell, Ellie Beveridge, Bobbi Bierma, Hannah C. Birge, Kallianne Bliss, Sarah Boussuge, Patrick F. Boyce, Olivia Bradley, Beau Caden Brown, Shane P. Brown, Cailin L. Brugger, Joshua L. Bugg, Zachary Burd, Mercadez Burdick, Megan E. Burns, Eric J. Butler, Abigael C. Bylow, Emily H. Byrd, Kaitlyn D. Caffrey, Lucille Cawley, Brianna R. Chalifour, Brenton E. Church, Jessica L. Church, Caylie L. Coffelt, Lacy Coles, Sebastian Colwell, Abigael J. Conn, Alexander Corbin, Faith Kimberley Coslett, Sean Craig, Jefferson O. Danso, Alexa E. Daugherty, Megan H. Davidson, Braeden Davis, Gia Rene Davis, Preston Andrew Davis, Sanford A. Day, Cassidy Dellos, Kaycee Barrett Dellos, Olivia Devine, Adrienne E. Duda, Hannah Duncil, Elizabeth Ann Erickson, Aidan G. Escobedo, Katherine L. Etchepare, Abigail Fearneyhough, Gabriel P. Floud, Noah Forbes, Dane J. Frankhouser, Lauren A. French, Brenden Seth Frentheway,
Michael K. Gasner, Matthew A. Giarusso, Katelynn Gilbert, Sophia Glennie, Amelia R. Glidden, David Gohier, Carlos A. Gonzales, Jenna Gore, Adrian M. Graham, Morgan E. Graham, Madison P. Green, McKenna R. Guzman, Rhiannon V. Hammond, Mikena Hansen, Jordan S. Harris, Christian B. Hawley, Tatum O. Hayes, Caitlin R. Heddins, Oressa Heilig, Caroline Henman, Jacob L. Hepler, Val D. Herd Jr., Tracy Hicks, Hayden C. Higgins, Cassidy B. Hixon, Melissa Hoang, Christopher Augustus Howard, Makyleigh C. Howard, Samuel P. Howard, Cody C. Hunter, Ryan Huylar, Erik J. Jacobsen, Kaleigh G. Johns, Jordan Mackenzie Johnson, Rosalynne Tiffany Jones, Lily A. Joslin, Evan Kallas, Kayla J. Kant, Pheobe S. Kent, Kayla Ann Kersh, Paige A. Klipstein, Joseph C. Kostelecky, Claire M. Lake, Anna Liggett, Pierson S. Linde, Hunter L. Lissman, Jadon Lopez, Nathan J. Lundberg, Jared Christopher Marquardt, Ashley Marshall, Brenna Nicole Martin, Nicholas A. Martin, Tanner L. Martin, Courtney Mason, Kylie Elizabeth Mathews, Jay M. Matter, Aliza J. Maxwell, Enola N. Mayes, Jayden Cole McKay, Morgan Jo McKelvey, Jacquelyn Elizabeth Mead, Peter N. Mead, Nickolas Steven Meier, Philip C. Meier, Madison R. Merrell, Reese Gregory Milburn, Riley E. Milburn, Nicholas A. Mirich, Lucas J. Mizel, Jason S. Montoya, Josephine M. Mores, Haley Morrison, Ethan E. Mowery, Hannah I. Mulkey, Alicia Munguia, Damon Michael Murdock, Taylor J. Myers,
Fox Glenn Nelson, Siera R. Nelson, George M. Nykun, Karen OHara, Alexander Oleson, Shellamae Olsen, Scott D. Orr, Megan S. Pachniak, Constantine Pappas, Makayla Paris, Andrea Perez, Ian G. Peters, Sarah A. Pollock, Edward C. Powers, Abigail L. Preston, Caleb Price, Cassidee R. Raffa, Nicole Reyes-Aguilar, Nathaniel J. Rieger, Allison Roberts, Noah Roedel, Devin M. Romberger, Jordon D. Rowe, Brenden L. Runion, Abigale Grace Salisbury, Lauren Marie Salsgiver, Michael E. Sandberg, April Rose Sandoval-Eaton, Mateya N. Sarne, Bryce E. Schlachter, Noah Shane Scott, Juliana L. Seidl, Caleb Sells, Rebecca M. Shaw, Yangji Sherpa-Young, Olivia Shoemaker, Abigail Sisneros, Chet W. Slater, Victoria R. Smale, Austana M. Smith, Eliza G. Smith, Grace Smith, Kaitlin Soden, Matthew Patrick Stacey, Trevor W. Stephen, Colby Stockton, Zachary R. Sullivan, Kaidance Taylor, Sarah Beth Thomson, Penzi L. Tran, Tyler N. Trissel, Amber L. True, Justin Valdez, Ethan C. Valentine, Ranee Lyman Valentine, Christa J. Vanlandingham, Nathaniel C. Vredenburg, Samuel L. Walker, William Wayne Ward, Jordan Weber, McKenzie J. Weber, Cassidy R. Weibel, Robert J. Wenger, Aaron Wheeler, Ronald Allison Whelan, Caroline Jane Wilhelm, Tracy K. Wilkinson, Kora Williams, Nicholis Williams, Nyira Williams, Katherine Willyerd, Casandra C. Winans, Justin T. Woolsey, Madison V. Wriborg, Katrina F. Zaharas, Mingna Zeng
Jakobi L. Mirich, Bradley D. Zimmerman
Sydnie Fornstrom, Hunter P. Jeffres, Jude M. Pachel, Hunter T. Thompson
UW Provosts Honor Roll
The University of Wyoming lists 68 students from Laramie County on the 2021 fall semester Provosts Honor Roll.
The Provosts Honor Roll consists of undergraduates who have completed at least six but fewer than 12 hours with a minimum 3.5 grade-point average for the semester.
Students on the list were:
Matthew Adams, Omotola Adewuyi, Darla D. Albright, Marisa J. Beahm, Simon Beer, Keil James Dean Bergeron, Desiree Delayne Bishop, Mackenzie Black, Xachary Bomgaars, Ashley Bray, Gretchen E. Breeden, Justin G. Brown, Sarah B. Carlson, Jennifer M. Chapman, Kelsie Condit, Raegen L. DeLancey, Samantha Jo DiJohn, Tiffani A. Dingman, Allison L. Dolph, Ashleigh L. Ellis, Marisa Evans, Cierra L. Fangman, Mercedes Raye Fermelia, Lillian Fish, Colten Gaines, Caley R. Galipeau, Nicholas Theodore Garcia, Kylie M. George, Jillian Mae Guest, Jacob Benjamin Hendricks, Luis Alberto Hernandez, Ashley N. Herrington, Kaitlyn C. Hogan, Brett Hopper, Carissa J. Isom, Lindsey Jacks, Michael James Lindman, Aran James Lovato, Baylee M. Markus, Adrian McCoy, William F. McDonald, Giamo V. Milatzo, Brandie Moulton, Angela Oliverius, Gisele Pacheco, Amy Peterson, Leandra Pfizenmaier, Samantha Kay Pierson, Puja Ranjit, Heather Roland, Ashlee D. Rooney, Jasmine N. Scott, Parid Shkoza, Toby Staley, Matthew Sylvester, Heather Tafoya, Bradley M. Taylor, Madison G. Terry, Kilee J. Thompson, Morrigan B. Wagner, Susan Wagner, Linda Lorene Walker, Corrie Weber, Kristen H. Wilhelm, Matthew Joseph Williams, Monica Benes Wilson, Desiree Wisdorf, Julia Jessica Yagi
Continue reading here:
University of Wyoming Fall 2021 Honors | In Our Schools | wyomingnews.com - Wyoming Tribune
Posted in Marie Byrd Land
Comments Off on University of Wyoming Fall 2021 Honors | In Our Schools | wyomingnews.com – Wyoming Tribune
President Biden Signs Cybersecurity National … – nsa.gov
Posted: at 6:11 am
FORT MEADE, Md. The White House announced today that President Joe Biden has signed National Security Memorandum 8, Improving the Cybersecurity of National Security, Department of Defense and Intelligence Community Systems. This Memorandum implements the cybersecurity requirements of EO 14028 for National Security Systems (NSS) - networks across the U.S. Government that contain classified information or are otherwise critical to military and intelligence activities. The Memorandum provides the Director of the NSA, General Paul M. Nakasone, in his role as the National Manager for NSS, with enhanced insight and authorities to better safeguard these systems.
We stand ready to fulfill our role, and our responsibility, in securing our nation against foreign malicious actors, and any efforts to exploit our national security systems, said General Paul M. Nakasone, Commander, U.S. Cyber Command, Director, NSA/Chief, Central Security Service.
The Memorandum provides the National Manager the authority to issue binding direction to departments and agencies operating NSS to take action against cybersecurity threats and vulnerabilities. All departments and agencies operating NSS will now report to the National Manager on both the status of mitigation actions taken in response to a specific cyber incident as well as provide assessments of the overall impact to their systems. Departments and agencies are also required to notify the National Manager of known or suspected incidents or compromises of NSS.
The new authorities will provide us with the necessary cybersecurity visibility into our most important systems, said Rob Joyce, NSA Cybersecurity Director and Deputy National Manager for national security systems. This new insight will allow us to identify vulnerabilities, detect malicious threat activity and drive mitigations to better secure all national security systems.
The NSM also requires Federal departments and agencies to modernize encryption protocols used on national security systems.
As the nations leader in cryptography, NSA will play a significant role in ensuring cryptographic interoperability among national security system users through cryptographic standards for use on NSS, said Gen. Nakasone.
For more, read the full memorandumand view the accompanying fact sheet.
More here:
President Biden Signs Cybersecurity National ... - nsa.gov
Posted in NSA
Comments Off on President Biden Signs Cybersecurity National … – nsa.gov
Cybersecurity Speaker Series: Ghidra Beyond the Code – National Security Agency
Posted: at 6:11 am
The National Security Agency (NSA) Cybersecurity Collaboration Center released the fourth video in its Cybersecurity Speaker Series today, focusing on Ghidra, NSAs open source reverse engineering tool. The Speaker Series highlights subject matter experts at NSA sharing insights, lessons, and contributions of their work in cybersecurity.Ghidra Beyond the Code, is a discussion between NSA senior researcher Brian Knighton, a member of Ghidra s development team, and Cybersecurity Technical Fellow Dr. Josiah Dykstra about the decision to publicly release Ghidra in March 2019.Knighton, who was a part of the team that brought Ghidra to the open-source community, cited several reasons that drove the decision to release Ghidra publicly.We put [Ghidra] out for several reasons. One, was cybersecurity is a vital skill that folks need to have. Its important to NSA and important to our nation to ensure that folks are trained up on cybersecurity and can help analyze all of the different systems that are running software and we also sort of wanted to level the playing field, said Knighton. Heres an open source tool that anyone in high school or college can download and have access to this cutting edge cybersecurity tool.With the release of Ghidra, NSA set out to build a community of dedicated and educated users. By making the software free, students can develop the technical proficiency to work on advanced cybersecurity problems.Ghidra was publicly released at the 2019 RSA conference. Three years later, work on the software continues to evolve for the Ghidra team Knighton discusses how the unique architecture of this software allows for updates to the program.Because you can take Ghidra and extend it to support new devices as they come out, it is certainly an important place to build on research to help secure new devices as they emerge, said Knighton.Ghidra was developed and is still used as a framework for building and researching future technologies. Recently, the Ghidra team partnered with Morgan State University and used Ghidra to identify and mitigate the risks of connecting modern vehicles to Bluetooth, Wi-Fi, and cellular technology.From its onset, we built Ghidra, which has been in development now for 20 years, as a platform to do research on. It was built as a platform to grow as the cybersecurity space changed. said Knighton. As technology has become more connected, Ghidra has grown to address new cybersecurity risks as new devices are created.
Download the latest version of Ghidra at ghidra-sre.org.Already a Ghidra fan? Join the NSA Cybersecurity mission and put your skills to work to secure your nation. Apply here, at intelligencecareers.gov/NSA.
Originally posted here:
Cybersecurity Speaker Series: Ghidra Beyond the Code - National Security Agency
Posted in NSA
Comments Off on Cybersecurity Speaker Series: Ghidra Beyond the Code – National Security Agency
National Security Agency and Department of Homeland Security designate St. Marys as a National Center of Academic Excellence in Cyber Defense – St….
Posted: at 6:11 am
March 10, 2022
St. Marys Universityhas received designation as a National Center for Academic Excellence in Cyber Defense from the National Security Agency and the Department of Homeland Security.
The St. Marys Master of Science in Cybersecurity is also the first in the city to receive such validation from these agencies, said Ayad Barsoum, Ph.D., Associate Professor of Computer Science and Graduate Program Director of Cybersecurity.
Graduates coming from a program designated by NSA and DHS must know specific sets of knowledge and must have hands-on lab experience in some areas, Barsoum said.
Though there are other designated centers for excellence in the city, St. Marys University is the first to gain the prestigious validation for its Master of Science in Cybersecurity.
To receive this elite designation from NSA and DHS will open doors for the students and graduates of St. Marys University in this high-growth industry, said Ian Martines, Ph.D., Interim Dean of the St. Marys University School of Science, Engineering and Technology.
After a multi-year process, the agencies apply the designation to validate institutions with a comprehensive and robust cybersecurity program. To receive the institution-wide designation as a National Center of Academic Excellence in Cyber Defense, St. Marys demonstrated having a cybersecurity program with full-time faculty contributing research and working collaboratively across disciplines; enrolling students who master specific sets of knowledge, gain real-world experience and participate in extracurricular cybersecurity challenges; creating cooperative agreements to accept students from two-year institutions; and implementing a university-wide security plan that includes training for all employees.
Gary Bevans, a student in the Master of Science in Cybersecurity, said his career goal is to become a cybersecurity analyst and thathaving the NSA validate the masters degree is an important designation.
Its a huge thing for the NSA to give that stamp of approval, Bevans said. St. Marys working together with them is really big. Its going to help the program move forward in positive ways.
Cybersecurity experts are in demand. There is a global shortage of 2.72 million cybersecurity professionals, according to the (ISC) 2021 Cybersecurity Workforce Study. The U.S. Bureau of Labor Statistics expects the job outlook for an information security analystto increase by 33% between 2020 and 2030. The median annual pay for this role was $103,590 in 2020.
The designation is great for our students as they are entering the workforce because they have been studying a curriculum that meets a national standard, said Mitra Bokaei Hosseini, Ph.D., Assistant Professor of Computer Science. It puts our graduate students in a competitive level withthe very best.
Posted in NSA
Comments Off on National Security Agency and Department of Homeland Security designate St. Marys as a National Center of Academic Excellence in Cyber Defense – St….
Report: NSA Investigates Viasat Hack That Coincided With Ukraine Invasion – PCMag
Posted: at 6:11 am
The US National Security Agency is reportedly investigating a hack targeting Viasat that disrupted internet access in Ukraine as Russian forces prepared to invade the country.
Viasat told CNBC on Feb. 28 that it was "experiencing a partial network outage" said to be "impacting internet service for fixed broadband customers in Ukraine and elsewhere on our European KA-SAT network." The outage started on Feb. 24the day Russia invaded Ukraine.
Reuters now reports that the NSA is collaborating with ANSSI and Ukrainian intelligence to determine "whether the remote sabotage of a satellite internet provider's service was the work of Russian-state backed hackers preparing the battlefield by attempting to sever communications."
Viasat told Reuters the outage affected satellite modems owned by tens of thousands of customers in Europe. Some of those modems are still offline at time of writing, according to the report, and bringing them back online is going to be a fairly involved process.
Reuters reports that a Viasat official "said most of the affected devices would need to be reprogrammed either by a technician on site or at a repair depot and that some would have to be swapped out." Russia's ongoing attacks on Ukraine will likely complicate that process.
In the meantime, Ukraine has turned to services like Starlink to remain online, although SpaceX CEO Elon Musk has warned that Russia might attack its satellite internet service as well so it can sever Ukraine's connection to the outside world as it seeks international aid in this conflict.
Sign up for Security Watch newsletter for our top privacy and security stories delivered right to your inbox.
This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.
See the original post here:
Report: NSA Investigates Viasat Hack That Coincided With Ukraine Invasion - PCMag
Posted in NSA
Comments Off on Report: NSA Investigates Viasat Hack That Coincided With Ukraine Invasion – PCMag
Does the Free World Need a Global Cyber Alliance? – SecurityWeek
Posted: at 6:11 am
The increasing incidence of aggressive cyber activity from Russia, China, Iran and North Korea, together with heightened concerns over the war in Ukraine, raises an important question: should the free world unite with a global cyber alliance in response?
At Cybertech Tel Aviv 2022 (March 1-3, 2022), founder of VC firm JVP, Erel Margalit, called for a global cyber alliance in response to the Russian invasion of Ukraine. Leadership is required to establish a democratic cyber alliance, including NATO and other free countries, in order to lead values-based cyber that will support democracies and people, and will say enough! to dictators and to those who support them, he said.
At the same time, on March 2, 2022, Robert Silvers of the U.S. DHS and Israels National Cyber Directorate director-general Gaby Portnoy signed a cyber collaboration deal between the two countries. This followed a new agreement between the UK and Israel announced in November 2021 which was described by the UK government as something that will enable closer working in diplomacy, defense and security, cyber, science, technology, and many other areas.
Such agreements never publicly disclose the extent to which the intelligence agencies of the different countries will work together, but we can assume that it is part of the arrangement. A third new alliance, known as AUKUS, was more upfront about its design and ability to deliver offensive cyber operations, clearly focused on the Indo-Pacific region and Chinas activities.
It is important to understand what we have before asking what we need.
Israels emergence as a cyber ally
Israel is not known for its cyber relationships, but is well known for its cyber capabilities. It is generally thought that Israel worked with the NSA on the delivery of Stuxnet against the Iranian nuclear facility at Natanz in the early 2010s but it must be noted that the U.S. has never declared or admitted any involvement.
The continuous conveyor belt of new and innovative cybersecurity companies being formed by Israeli Defense Force (IDF) alumni also attests to the depth of cyber knowledge and training within the country.
The Belfer Center at the Harvard Kennedy School published a ranking of national cyber power in September 2020. It produced a list of the most comprehensive countries with the highest level of intent and capabilities comprising, in this order, the U.S., China, the UK, and Russia as the top four.
Belfer placed Israel at number 11 in the world. Its methodology was to add data to a mathematical model. The International Institute for Strategic Studies (IISS) takes a different approach, and adds qualitative assessments to Belfers quantitative approach. IISS separates cyber power into three tiers. Tier #1 has the U.S. on its own as the sole world cyber superpower. Tier #2 includes China, the UK, Russia, Canada, Australia, France and Israel.
Clearly, the addition of Israel to the free worlds cyber alliances is a good thing.
AUKUS and theFive Eyes
AUKUS was announced on September 15, 2021. There are two parts to AUKUS a vehicle to provide nuclear submarines to Australia, and the formation of defensive and offensive cyber capabilities to counter Chinese activities in the Indo-Pacific region. There was some surprise at this new alliance since the three countries are three of the five countries comprising the existingFive Eyesalliance. However, theFive Eyesis primarily signals intelligence while AUKUS is likely to deliver offensive cyber operations where necessary. It was the U.S., UK and Australia that together performed cyber operations against the Islamic State.
The Five Eyes (U.S., UK, Canada, Australia and New Zealand) evolved as an extension of the UKUSA treaty that itself grew out of the informal agreement between the U.S. and UK during World War II. The agreement was formalized in March 1946, and expanded in subsequent years to include Canada, Australia and New Zealand. Other countries, such as Germany, the Philippines and some Nordic countries, have joined as third parties but the core remains the originalFive Eyes.
The Five Eyes intelligence relationship is probably the closest and most powerful intelligence relationship in history.
At first, the existence of theFive Eyesremained secret (just, in fact, as the very existence of the NSA and GCHQ remained secret for many years). The Prime Minister of Australia didnt learn aboutFive Eyesuntil 1973; it was not disclosed to the public until 2005; and it was only in June 2010 that the full text of the UKUSA agreement was made public.
This treaty is often considered to be the basis of the so-called special relationship between the U.S. and the UK.
NSA and GCHQ
The core of theFive Eyes remains the NSA and GCHQ. This is a complex relationship that is so close that the two organizations are sometimes described as twins. This is wrong. The two organizations have very different structures and primary purposes.
The NSA is run by a military officer currently General Paul Nakasone. Nakasone is a four-star general who also heads U.S. Cyber Command. For the first he reports to the undersecretary of defense for intelligence, and for the latter he reports directly to the secretary of defense. There is a strong military theme that runs through the NSA. Officially, its purpose is to secure DOD and U.S. military networks. More directly offensive operations are conducted by U.S. Cyber Command and the CIA.
GCHQ, on the other hand, is run by a civilian reporting to the Foreign Secretary. Its responsibilities support the military but go beyond this, working closely with law enforcement to go after serious organized crime within the UK such as pedophile networks.
The two agencies are different. The relationship is complex and close, and it is difficult to think of any closer intelligence alliance. But they do not automatically share all information between themselves nor the otherFive Eyespartners. There are things the NSA will want to do without sharing it with other agencies, and GCHQ is the same.
Neither the NSA nor GCHQ are officially charged with offensive cyber operations but both have done so in the past. A more recent development in the UK has been the formation of a National Cyber Force (NCF), which brings UK cyber operations more in line with the U.S. model and for the first time acknowledges that GCHQ may have some offensive responsibilities. Plans were announced in 2018, but it wasnt effectively established until 2020.
NCF is part of the MoD, the Defense Science and Technology Laboratory, the Secret Intelligence Service, and GCHQ. The government describes it as a partnership between defense and intelligence, it is responsible for operating in and through cyberspace to disrupt, deny, degrade and contest those who would do harm to the UK and its allies, to keep the country safe and to protect and promote the UKs interests at home and abroad. It clearly has the remit to direct offensive cyber operations against the enemy in justified cases.
NCF is the equivalent of the U.S. combining the cyber operations of Cyber Command, CIA, FBI, and the cyber operations of the military forces into a single organization. But there is also an element of necessity the UK simply doesnt have the budget to maintain the separate number of 3-letter agencies that exist in the U.S.
Long-term relationships and short-term politics
There is one surprising element of the major international intelligence treaties their longevity and persistence. They survive political change with a broader collective interest that transcends the coming and going of individual politicians.
In recent years there was concern that the U.S./UK special relationship (the one based on the NSA and GCHQ relationship) might fail with the U.S. change from Trump to Biden. It was generally acknowledged that President Biden had scant regard for Prime Minister Johnson because of the mutual admiration between Trump and Johnson. And Biden even issued warnings to Johnson over the sanctity of the Good Friday Agreement in Ireland following Brexit.
The Good Friday political agreement was signed in April 1998. It brought an end to the so-called Troubles in Northern Ireland between loyalists wanting to stay within the UK, and the Irish Republic-favoring republicans. Now Northern Ireland is part of the UK while Southern Ireland is part of the EU and the potential for new tensions has returned. But despite Bidens less-favorable view of the UK, UKUSA just continues.
A similar concern now occurs for GCHQ the fear that Brexit would break the ties with EU national intelligence agencies. The European Commission has had concerns over GCHQ and personal privacy ever since Snowdens leaks about GCHQ and the NSA; and has even threatened legal action. But the individual relations between GCHQ and the individual EU member state intelligence agencies seems to be persisting aided, perhaps, by the absence of national security from the EUs political remit.
Where are we now?
Out of necessity, we have concentrated on the major international free world cyber and intelligence relationships. In reality, there is a global patchwork of individual agreements between different nations throughout the free world; many of them ultimately coalescing around theFive Eyeshub. For the most part, these are security information sharing arrangements relatively few nations have the ability or confidence or political will to engage in offensive cyber operations. In this sense, there are two separate networks: gathering intelligence (for example,Five Eyes), and responding offensively to that intelligence (for example, AUKUS).
Does the free world need a single global cyber intelligence organization? The answer is almost certainly No. Firstly, such a move would likely drive Russia and China closer together perhaps including Iran and North Korea and Russian and Chinese satellite nations into their own special relationship.
Secondly, it would be unworkable. Friends keep secrets from friends when the economic or political necessity demands. Just consider the French reaction to the AUKUS announcement. France described it as a stab in the back, and within a couple of days recalled its ambassadors to both the U.S. and Australia. France lost a multi-billion euros submarine deal over AUKUS.
Related: Russia, Ukraine and the Danger of a Global Cyberwar
Related: Russia-Ukraine: Threat of Local Cyber Ops Escalating Into Global Cyberwar
Related: Talking Global Cyberwar With Kaspersky Lab's Anton Shingarev
Related: The United States and China - A Different Kind of Cyberwar
The rest is here:
Does the Free World Need a Global Cyber Alliance? - SecurityWeek
Posted in NSA
Comments Off on Does the Free World Need a Global Cyber Alliance? – SecurityWeek
PMB, NSA and the war against terriorism, small arms, light weapons – Blueprint Newspapers Limited
Posted: at 6:11 am
Over the years, human security has been threatened, primarily by the small arms and light weapons, on a large scale, as they are distinctly inexpensive and are easy to construct, maintain and operate and conceal. States are sole legitimate source of weapon manufacturing and of their use against the anti-social and anti-national rudiments.
Sadly, these states have failed to maintain and sustain their monopoly over the manufacturing and use of such weapons. As a result, many illicit sources are producing the weapons domestically and are misusing them against mankind.
Today, these are the weapons of choice for insurgent groups who are indulged in violent struggle with the states and other groups or for the terrorists, criminals and underworld mafias. The misuse of such weapons results in the thousands of human causalities, disruptiilon of human development and creation of refugees crisis.
All these have led to human rights abuses, fuelling deadly conflicts, troubling humanitarian assistance and peace-keeping programmes. It therefore becomes imperative to control the diffusion of such weapons and misuse of such weapons to protect and promote human security and development, which again demands responsible attitudes on the part of human being as well as states.
Africa continues to bear the brunt, with heightened trafficking in small arms in West Africa and with the porous borders between different countries. It has become increasingly difficult to address the spread of these weapons. Small arms have been recycled in the West African countries of Nigeria, Gabon, Ghana, Guinea and Burkina Faso. Rebel groups and criminal groups supply each other with arms in past and present conflict situations in countries such as Cte dIvoire, Sierra Leone, Burkina Faso and Liberia.
In the end, the proliferation of these weapons has undermined security sector reform (SSR). Nigeria has been challenged with the same phemonon in the last decade and half, a development previous governments have tried unsuccessfully to contain.
But the tide changed with the assumption of office by President Muhammadu Buhari on May 29, 2015. He demonstrated his commitment to tackling insecurity and tame proliferation of small arms and light weapons with the appointment of egg heads like Gen Muhammed Babagana Monguno (rtd) to head his security architecture. The National Security Adviser (NSA) has not only proved his mettle but surpassed the expectations of his critics.
Evidence, they say, is the end of argument. In recent times, the highthened security alert in Nigeria has reduced. Even in the Noth East, North West and other parts of the Nigeria, a new lease of life is beginning to bekcon. There have not been reported cases of Boko Haram and ISWAP attacks, unlike before. This feat cannot happen in a vacuum. Credit must be given to whom it is due, in which case, the Commander in Chief of the Armed Forces of the Federal Republic of Nigeria, President Buhari.
Also, President Buharis National Security Adviser, Monguno must be generously comended for his doggedness in the war against terriorists. Most remarkable also is the containment of the proliferation of samll arms and light weapons, which poses existential threat to our collective security. The illicit proliferation and misuse of small arms and light weapons ranks among todays most pressing security threats. Tens of thousands of people are killed or wounded each year in conflicts that are fought primarily with these weapons and in crime-ridden areas outside of conflict zones.
One of strategies adopted was decentralising the operation with the creation of six zonal offces in each geopolitical zone to monitor and enforce laws against small arms proliferation. The Buhari and Mongonu-led onslaught couldnt have come at a better time than now that serious concerns are beginning to emerge, with the 2023, general elections approaching. More than ever, theres need to curb the menace of insecurity in other to conduct best democratic elections without violence
The air of hope and optimism that has characterised the Buhari presidency can be attributed to the competence of his team, especially the National Security Adviser, Gen Monguno. Without a pinch of doubt, Monguno has proven that he towers above his equals in his professional callings. Indeed, he is a deft security/intelligence czar.
For Gen Monguno, no doubt, the role of intelligence gathering in a nations security architecture cannot be overemphasised. That is where the dexterity of the Chief Spy Officer lies. As a man who has spent quality working years in the intelligence community, organising a viable security system for Nigeria is like a walk in the park. Before he took over as the National Security Adviser to President Buhari in 2015, the countrys security architecture was in a shambles but seven years down the line, the story is different.
Noose has been tightened around terror groups terrorising Nigerians and the terrorist groups have almost been defeated, even as all territorial extensions have been returned to the sovereignty of Nigeria. We must be objective; it is incontrovertible that what is obtainable today is far more than in 2014 when lives all around Nigeria were becoming poor, nasty, brutish and short. Lest we forget so soon, 17 local government areas in Borno State alone were under the control of Boko Haram, with their flag firmly hoisted.
The ingenuity and courage of the NSA must be commended for confronting and winning the fight against insurgency. From records, General Monguno is a renowned security expert and a retired Nigerian military general. He was the Chief of Defence Intelligence from July 2009 to September 2011 and the Commander of the Brigade of Guards from 2007 to 2009.
As Nigerias number one spy master, Monguno has a natural, adaptable and high functioning ability to interact with others. Social interaction as a spy will take many different forms, requiring you to be comfortable associating with the entire spectrum of personality types.
Monguno, as the National Security Adviser from 2015 to date, has acted in his best to recover the local governments controlled by the Boko Haram terrorists and ensuring that Nigerians put the nightmare of Boko Haram behind them. This is the greatest height of professionalism and it could be said of the NSA to be the best choice of President Buhari for courageously doing his work.
Each administration has always set the guidelines for intelligence activities and, within these guidelines, establish in a timely fashion specific requirements and priorities for the conduct of these activities.
Under Gen Monguno, the Nigerian intelligence community is saddled with two broad functionscollection and analysisand one relatively narrow one, covert action. An additional function, counterintelligence, is integral to the entire intelligence process. In the forthcoming general elections, we are set to see the best of these efforts as President Buhari is poised to deliver free fair and credible elections, with his NSA readily available to provide the enabling playground with adequate security.Ibrahim is director of Communications and Strategic Planning of the Presidential Support Committee (PSC).
Related
Go here to see the original:
PMB, NSA and the war against terriorism, small arms, light weapons - Blueprint Newspapers Limited
Posted in NSA
Comments Off on PMB, NSA and the war against terriorism, small arms, light weapons – Blueprint Newspapers Limited
The Central Intelligence Agency has a new CIO – The Record by Recorded Future
Posted: at 6:11 am
The Central Intelligence Agency recently tapped LaNaia J. Jones, a veteran cybersecurity leader in the U.S. spy community, to be its new chief information officer.
We are delighted by the appointment of LaNaia J. Jones as the Agencys new Chief Information Officer and Director of the Information Technology Enterprise within the Directorate of Digital Innovation, CIA Deputy Press Secretary Luis Rossello said in a statement.
Jones brings a wealth of experience in information technology and innovation in the national security sphere to the post, he added. We look forward to her leadership in leveraging emerging digital technology to advance our mission.
Jones, who replaced Juliane Gallina and whose appointment was first publicly discussed with The Record, began work in late February.
She most recently served as the National Security Agencys deputy CIO where she oversaw IT investments and acquisition efforts and as the electronic spy agencys Information Sharing and Safeguarding Executive. Prior to the NSA, Jones served as acting CIO for the U.S. clandestine community within the Office of the Director of National Intelligence, working with CIOs and other senior leaders across the communitys 18 agencies.
Before that, she was the deputy CIO for the intelligence community. Jones also worked as the chief of Transformation and Transition for a global IT service provider within the Defense Department prior to her selection.
She graduated with a bachelor of science degree in Mathematics and Computer Science from the University of Maryland Eastern Shore and received a master of science degree in Technology Management from the University of Maryland University College.
Jones joins the CIA at a time when the organization is working to keep pace with technological changes in order to better develop and employ its own espionage capabilities, including detecting cyber threats from adversaries like Russia and China.
During his confirmation hearing last year, now-CIA Director Williams Burns said the SolarWinds breach which the U.S. has been attributed to the Russian government should serve as a warning to the federal government and the countrys national security apparatus about such dangers.
If this is a harsh wakeup call, then I think its essential for the CIA to work even harder to develop capabilities to help detect these kinds of attacks when they come from foreign players, he said.
Burns stressed the importance of technology again last week during the Senate Intelligence Committees annual hearing on the greatest threats to U.S. national security.
Nothing is going to matter more to the future of the CIA and, I think, the U.S. intelligence community more broadly than our ability to compete technologically. Its the main arena for competition with China, he said, noting the CIA last year created a mission center to focus on foreign technological development and another on Beijing and established the agencys first chief technology officer.
Together, the moves reflect the enormously high priority that we will continue to attest to that set of issues, according to Burns.
Martin is a senior cybersecurity reporter for The Record. He spent the last five years at Politico, where he covered Congress, the Pentagon and the U.S. intelligence community and was a driving force behind the publication's cybersecurity newsletter.
See the original post here:
The Central Intelligence Agency has a new CIO - The Record by Recorded Future
Posted in NSA
Comments Off on The Central Intelligence Agency has a new CIO – The Record by Recorded Future
Mission – Humanity+
Posted: at 6:10 am
What does it mean to be human in a technologically enhanced world? Humanity+, also known as World Transhumanist Association, is a 501(c)3 international nonprofit membership organization that advocates the ethical use of technology, such as artificial intelligence, to expand human capacities. In other words, we want people to be better than well. This is the goal of transhumanism.
Technologies that support longevity and mitigate the disease of aging by curing disease and repairing injury have accelerated to a point in which they also can increase human performance outside the realms of what is considered to be normal for humans. These technologies are referred to as emerging and exponential and include artificial intelligence, nanotechnology, nanomedicine, biotechnology, stem cells, and gene therapy, for example. Other technologies that could extend and expand human capabilities outside physiology include AI, robotics, and brain-computer integration, which form the domain of bionics, memory transfer, and could be used for developing whole body prosthetics. Because these technologies, and their respective sciences and strategic models, such as blockchain, would take the human beyond the historical (normal) state of existence, society, including bioethicists and others who advocate the safe use of technology, have shown concern and uncertainties about the downside of these technologies and possible problematic and dangerous outcomes for our species.
We aim to impact change. We have the knowledge to equip you with the tools, resources and mindset to navigate your own transformative journey into the future. This is Humanity+s network of members, advisors, associates and partners. Areas include entrepreneurs and innovators in the fields of science, technology, philosophy, and the arts.
Humanity+ is the combined effort of earliest transhumanist organizations and global groups. Starting with Extropy Institute in the United States, and soon thereafter Aleph in Sweden and Transcedo in Europe, later the World Transhumanist Association, now known as Humanity+, have ignited the core advocacy of the life extension advocacy. For over 30 years, Transhumanism as a worldview and movement has developed a knowledge base and educational programs to learn about the sciences and technologies that are extending life, curing disease, and slowing down and reversing the damages of aging.
The pioneering conferences and publications that brought this advocacy to the mainstream also provided the ideas and foresight about life extension while fostering the increasing media coverage of superlongevity aka extreme life extension and radical life extension. No where in the world is there a stronger, more passionate group of people about life extension and the advances in biomedical research and the future of nanomedicine than within the transhumanist culture.
Humanity+ sees its role as a primary advocate for positivetranshumanistvalues. This includes healthy longevity (Extreme Life Extension) and the sciences and technologies that can create a more human humanity. Humanity+ feels that these values and the goals of thetranshumanistagenda are consequential for humanitys well-being. Humanity+wantsto inform its members and the public about the ethical uses of technologyandevidence-based science to advance human existence. The nature and scope ofhumanexistence includes the growth, aspirations, circumstances and conflictsthathumanity faces today and in the future.
Worldwide Leaders and Organizations that are preparing us for the Future are known for exploring opportunities not only within their fields, but on a broader scope. Their intellectual impact helps the forward movement of education and lifelong learning. The broader impact is the ability to connect unique ideas to projects, from the most immediate needs of society to future impacts of technology that implement a keen foresight to steer us toward a positive future. The Humanity+ Advocacy aims to impact change. We have the knowledge to equip you with the tools, resources and mindset to navigate your own transformative journey.
This is Humanity+s network of members, advisors, associates and partners. Areas include entrepreneurs and innovators in the fields of science, technology, philosophy, humanities and the arts.
Technologies that intervene with human physiology for curing disease and repairing injury have accelerated to a point in which they also can increase human performance outside the realms of what is considered to be normal for humans. These technologies are referred to as emerging and speculative and include nanotechnology, nanomedicine, biotechnology, genetic engineering, stem cell cloning, and transgenesis, for example. Other technologies that could extend and expand human capabilities outside physiology include artificial intelligence, artificial general intelligence, robotics, and brain-computer integration, which form the domain of bionics, uploading, and could be used for developing whole body prosthetics. Because these technologies, and their respective sciences, would take the human beyond the normal state of existence, society, including bioethicists and others who advocate the safe use of technology, have shown concern and uncertainties about the downside of these technologies and possible problematic and dangerous outcomes for our species. Natasha Vita-More
The human is a biological animal, which evolved approximately 200,000 years ago as the subspecies Homo sapiens sapiens (modern humans). The Western worlds consensus on what is normal for a human biology, life span, intelligence and psychology established certain precedents. Outside these precedents would mean that a human is subnormal or beyond normal. A person who is afflicted with a physical affliction, a mental condition, or degenerative disease would be considered to be outside the normal range. Likewise, a person who has increased physiological performance or cognitive abilities, or lives beyond the human maximum lifespan of 122-123 years, would be considered outside the normal range. This determination of normal has not kept up with the advances in technology or science.
Human enhancement, both therapeutic and selective, challenges the normal status and aims to expand human capabilities that further human physiological functions and extend the maximum life span. External devices such as smart phones, smart watches, wearable bio monitors, Google glasses, etc. are all expanding human capabilities. In the field of medical technology, the cochlear implant and bionic eyes have broken through the glass ceiling on biological determinism. Regenerative medicine, stem cell therapies, smart prosthetics, genetic engineering, nanomedicine, cryonics, nootropics, neuropharmacology, have already done this.
Transhumanism and the Humanity+ organization do not support anthropocentric hegemony or dogma. Transhumanism as a worldview and Humanity+ as the worlds larges transhumanist organization advocate for awareness and respect for the synergy of life in the varied characteristics and behaviors that comprise the Earths living forms.
Daily, medicine uncovers another way to make us better than well. Peoples illnesses and injuries are not only being healedthey are also being improved. There is nothing intrinsically wrong with aiming to be better than well. However, there are evident concerns and this is where ethical use of technology plays a part. While extending the human maximum life span does not cross these lines, there are other concerns that could affect humanity. Humanity+s focus is on the course of prompting good to great health. Many of our members practice physical fitness (aerobics and anaerobic exercise, Yoga, Pilates, Dance), participate in wellness diets (Paleo, Atkins, CR, vegetarian, vegan), and mental fitness (meditation, visualization, Zen, spirituality, Buddhism, and other practices). Our members also participate in projects such as Quantified Self (QS), entrepreneurial aims, and self-responsibility, paying it forward, and empathy as a way of life.
Excerpt from:
Posted in Extropy
Comments Off on Mission – Humanity+
Six Approaches to Making Ethical Decisions in Cases of …
Posted: at 6:10 am
One of the most difficult times to make ethical decisions is when there is great uncertainty about what the best decision is, or how to go about achieving that best end. Here I will present six contemporary principles, or risk standards, which are approaches for dealing with uncertainty and risk (discussions of some historical approaches can be found here: Probabilism). I will explain each principle and give examples, then discuss some themes.
A key point of connection between risk standards and ethics is that in riskier situations it often makes sense to use more stringent risk standards, and in the riskiest situations, the most stringent risk standards are more likely to be ethically justifiable. These risk standards might be helpfully connected to the Markkula Centers Framework for Ethical Decision Making when making ethical decisions in uncertain situations.
It is also worth noting that risk tolerance can vary significantly between individuals and between cultures, so it is likely that disagreements will often appear when discussing the ethics of risks. That does not make ethical decision making impossible, it just means that it might be more difficult, and that communication is very important so that all involved groups know and understand what is going on, how, and why.
1) The Prevention Principle takes a highly cautious approach towards ethical decision making because it specifically relates to situations with certainty of negative outcomes. It follows the general rule that prevention is better than cure, and therefore harms ought to be anticipated and pre-empted, rather than experienced and solved later (as in the Polluter Pays Principle).
This principle is generally uncontroversial in cases where cause and effect are clear and certain; it is when it moves towards uncertainty that more controversy appears, and the Precautionary Principle tends to be invoked instead. [1]
Examples: the Prevention Principle would promote placing safety requirements on automobiles (such as seat belts and airbags), since the certainty of accidents across a population is 100%, and it is better to prevent or reduce injuries rather than cope with them afterwards. Similarly, polluting industries might have requirements that require them to reduce or prevent certain types of pollution, as in using flue-gas desulfurization (sulfur dioxide scrubbers) on coal-fired power plants to prevent acid rain.
2) The Precautionary Principle is an approach to risk management and ethical decision making which seeks to prevent possible harms in cases where there is not yet scientific consensus on connections between cause and effect. The approach merely necessitates that there be a plausible scientific connection, not that it be certain. This approach is more likely to avoid damages, since waiting for the damage to occur (and thus establish a connection) is too late.
This is a more stringent risk standard than the prevention principle due to its acceptance of causal uncertainty. Over time, if causation becomes clearer (thereby decreasing uncertainty), this approach could be shifted towards prevention (if the connection is established), dropped (if the connection is not established), or another approach chosen (if the situation remains complicated). [2]
Examples: the Precautionary Principle is standard for the pharmaceutical approval process in most nations, where new medicines are approved slowly, under careful conditions, so as to avoid widespread social harms. Another example includes the responses of some nations towards genetically modified organisms (GMOs), where safety suspicions delayed deployment until more certainty was established.
3) Prudent Vigilance is an approach to risk which seeks to proceed with the potentially risky behavior while remaining vigilant of risks that might be developing or becoming more certain as one proceeds. It seeks to establish processes for assessing likely benefits and risks before, during, and after an undertaking, and continues to evaluate safety and security as technologies develop and diffuse into public and private sectors. [3] Prudent vigilance allows for risk-taking behavior, but with the understanding that ongoing evaluation is necessary. [3, 4]
Examples: Prudent Vigilance was a cornerstone for the United States Obama-era Presidential Commission for the Study of Bioethical Issues, in their 2010 report on the ethics of synthetic biology and other emerging technologies. It has remained a principle for discussion and consideration in this field, and has expanded to a few others, including environmental protection and international relations. [5, 6]
4) The Polluter Pays Principle is a risk standard which permits risk-taking behavior and then, if something goes wrong, assigns clean-up for the harms to those who created the harms. [1] This risk standard is responsive rather than anticipatory, and assumes that risk takers will either self-police (and not make errors), or, if self-policing fails, will be capable of making up for the harms they have produced. Ethically, Polluter Pays values freedom and responsibility, and assumes that, for the most part, people lack the power to significantly affect the future, and that those who can affect the future are meticulously careful, honorable, and benevolent.
Because of growing technological power, this principle is now obsolete in many cases, as damages sometimes can be planetary in scale, long term, and irreversible. In cases where it is difficult to hold entities responsible for their actions, or where damage is too much for them to redress, a more anticipatory strategy makes more sense. Additionally, the complexity of society can make it more likely that unscrupulous entities will not be held accountable.
Examples: the Polluter Pays Principle is at work in any situation where it is assumed that harms can be tolerated, and the agents of that harm held accountable for their actions, typically through legal or legislative recourse. Environmental dumping, even on a small scale, such as littering, sometimes shows this principle in action, as the polluter is typically fined for their misdeed.
5) The Gamblers Principle counsels risk takers to avoid risking damages which, if they occurred, would be ethically unacceptable, ranging up to the largest technological disasters, including global catastrophic and existential risks. Philosophers of technology Hans Jonas and Michael Davis have each advocated this approach, Jonas describing it as forbidding any va banque [go for broke or all in] game in the affairs of humanity, [7] and Davis as dont bet more than you can afford to lose. [8]
Davis describes this principle in more detail: If we (society at its rational best) would reject any plausible benefit in exchange for suffering that harm, we (that part of society making the decision) should, all else equal, rule out any design that risks that harm (however small the probability so long as it is finite). [8] Put another way, if a risk can be voluntarily assumed or declined, then for any unacceptable harm, if the probability is non-zero, then the risk is too high, and is therefore unethical and should not be taken. [9, 10]
This risk standard is focused only on the very largest and worst harms, while ignoring more mundane harms. It is anticipatory in nature towards these larger harms, and responsive in nature towards smaller harms. In this way, it can be viewed as more like the Prevention or Precautionary Principles with respect to larger harms and the Polluter Pays Principle with respect to smaller harms.
Examples: the Gamblers Principle would counsel rejecting the construction of a nuclear power plant, if a meltdown and subsequent radioactive pollution were deemed an unacceptable risk. Another might be the development of self-replicating nanotechnology, which could bring great benefits, but risks consuming the world if weaponized or gone out of control. In other cases, such as car accidents or more average harms, this principle permits the risky behavior and a reactive response if necessary, or it defers to another risk standard.
6) The Proactionary Principle is an approach to risk taking behavior which argues that innovation and technological progress should be pursued with speed. [11] It characterizes the current risk conditions as unacceptably bad (i.e. unethical), and therefore argues that other risks ought to be taken in order to escape the current risky state. It is an approach to risk which emphasizes action now, even in the face of possible negative effects, because if actions are not taken now, then the current unacceptable state will continue, and the future itself may be at stake.
It is optimistic in assuming that the future will be better, despite the risks taken to get there (and any possible ongoing harms from those risks), and is pessimistic about the current state of the world. The Proactionary Principle places faith in the benefits of technological progress. It does not cope well with the most disastrous and irreversible risks of technology, such as existential risks.
Examples: the Proactionary Principle is visible anytime a risk is deemed to be worth the reward, e.g. when taking a new job, buying a house, starting a business, etc. With respect to technological development, it could be used to promote certain technologies such as radical life extension, space settlement, peace-building technologies, and environmental sustainability technologies, arguing that those technologies ought to be developed as quickly as possible, because our current situation is quite dire. Historically, the Manhattan Project followed the Proactionary Principle due to fear of Nazi Germany obtaining the atomic bomb first, and in this effort was pushed forward even as significant scientists worried that it risked igniting the Earths atmosphere and destroying all life. [12, 13]
There are several ethical dimensions at play in these principles. A first is whether they are anticipatory of harms or reactive/responsive to harms. In the past, permitting harms, then reacting to them, was considered to be acceptable in many cases, since harms were often less damaging.
As a second related dimension, there is the question of whether entities can be trusted to make amends for their damages after the fact, or whether they are likely to shirk their responsibilities and go unpunished, thus contributing to social degradation and breakdown of trust. The more likely it is for damages to go unpunished and/or unredressed, the more important it is to prevent them. Given the complex interactions of entities across the globe and over time, and the rise of uncertain causal connections, lack of accountability has increased and is likely to continue to do so.
Relatedly, a third dimension is the magnitude of the harms a stake. As technology has expanded the human capacity for disaster, more need of anticipation and pre-emption has emerged. Irreversible harms such as species extinctions, and harms of massive scale both spatially and temporally, such as climate change, have necessitated new ways of looking at the ethics of risk.
A fourth dimension is the probability or uncertainty of the risk. As technology has expanded human power, it has also increased our scope of action in unpredictable ways, and therefore uncertainty about the effects of our choices has increased. Every new technology deployed is something like a socio-environmental experiment, exploring the world for effects, both anticipated and unanticipated. In this environment of enhanced uncertainty, risk is much harder to calculate, uncertainty much higher, and therefore risk ought to be avoided more carefully.
Combining some of these dimensions is possible through the Risk Equation, often written as Risk = Probability x Harm, or R = p(L), where R is risk, p is probability, and L is loss or harm. The Risk Equation informs several of the above principles and can be a useful interpretative framework for conceptualizing how some aspects of these principles relate to each other.
Lastly, these principles are not presented with the intent of advocating any particular one. Each has its uses, depending on the circumstances. However, it is worth noting that as human impact on the world has increased in past decades (due to technological harms increasing as well as overall uncertainty), societal risk tolerances could have understandably reacted. It may seem that there has been an overall shift towards more risk-averse approaches.
However, perceived in another way, it is merely that the world has changed, while societal risk tolerances have remained even, and these social preferences have gradually expressed a reaction to the shift in power in the techno-social environment. In other words, it is risk that has increased, not risk aversion. In a world where there are more dangerous choices, there is more to say no to, [14] and a greater role for ethics as well.
[1] World Commission on the Ethics of Scientific Knowledge and Technology (COMEST), The Precautionary Principle (Paris: United Nations Educational, Scientific and Cultural Organization (UNESCO), 2005) 7-8. Available at: https://unesdoc.unesco.org/ark:/48223/pf0000139578
[2] Precautionary Principle, Glossary of Summaries, EUR-Lex: Access to European Union Law, website, accessed July 6, 2016. Available at: http://eur-lex.europa.eu/summary/glossary/precautionary_principle.html
[3] Presidential Commission for the Study of Bioethical Issues, New Directions: Ethics of Synthetic Biology and Emerging Technologies, Washington, D.C, December 2010, p. 27, 123. Available at: http://bioethics.gov/sites/default/files/PCSBI-Synthetic-Biology-Report-12.16.10_0.pdf
[4] Amy Gutman, The Ethics of Synthetic Biology: Guiding Principles for Emerging Technologies, The Hastings Center Report (July-August 2011): 17-22. Available at: https://onlinelibrary.wiley.com/doi/pdf/10.1002/j.1552-146X.2011.tb00118.x
[5] Alison McLennan, Chapter 5: Environmental risk: uncertainty, precaution, prudent vigilance and adaptation, in Regulation of Synthetic Biology: BioBricks, Biopunks and Bioentrepreneurs, Elgar Studies in Law and Regulation, by Alison McLennan (Cheltenham, UK: Edward Elgar Publishing, 2018). Precis available at Elgar Online: https://www.elgaronline.com/abstract/9781785369438/14_chapter5.xhtml?
[6] Keir Giles, Russia Hit Multiple Targets with Zapad-2017, U.S.-Russia Insight, Carnegie Endowment for International Peace, January 2018. Available at: https://carnegieendowment.org/files/Giles_Zapad_web.pdf
[7] Hans Jonas, The Imperative of Responsibility, (Chicago: University of Chicago Press, 1984) 38.
[8] Michael Davis, Three nuclear disasters and a hurricane, Journal of Applied Ethics and Philosophy 4 (August 2012) 8. Available at: https://eprints.lib.hokudai.ac.jp/dspace/bitstream/2115/50468/1/jaep4-1_micael%20davis.pdf
[9] Brian Patrick Green, Transhumanism and Roman Catholicism: Imagined and Real Tensions, Theology and Science 13:2 (2015): 196.
[10] Brian Patrick Green, Little Prevention, Less Cure: Synthetic Biology, Existential Risk, and Ethics, Workshop on Research Agendas in the Societal Aspects of Synthetic Biology, Tempe, Arizona, November 4-6, 2014. Available at: https://cns.asu.edu/sites/default/files/greenp_synbiopaper_2014.pdf
[11] Max More, The Proactionary Principle, Version 1.0, Extropy.org, 2004. Available at: http://www.extropy.org/proactionaryprinciple.htm
[12] Emil Konopinski, Cloyd Margin, and Edward Teller Ignition of the Atmosphere with Nuclear Bombs, Classified US Government Report (declassified 1979), August 14, 1946. Available at: https://fas.org/sgp/othergov/doe/lanl/docs1/00329010.pdf
[13] Daniel Ellsberg, Risking Doomsday I: Atmospheric Ignition, in Daniel Ellsberg The Doomsday Machine: Confessions of a Nuclear War Planner, (New York: Bloomsbury, 2017) pp. 274-85.
[14] Brian Patrick Green, The Catholic Church and Technological Progress: Past, Present, and Future. Religions, special issue guest edited by Noreen Herzfeld, 1 June 2017, 8(106): 12. Available at: http://www.mdpi.com/2077-1444/8/6/106/htm
Continue reading here:
Posted in Extropy
Comments Off on Six Approaches to Making Ethical Decisions in Cases of …







