Skip to main content

Media and artificial intelligence



Kimmo Huosionmaa

Selective handling of data means, that in the tomorrow would be possible to use methods, what allows to filter images, what is prohibited to share from the picture, what shared in the social media. This kind of tools like very fast computers and sophisticated computer programs allow the automatized censorship for faces and other things, what danger the person's privacy.

Those systems can also be used to automatized identification of persons, and it can be used to ask people if they want to share their faces in the social media. But it needs the ability to recognize people and this might cause the leak of the security. If hackers can break the control-level of that kind of system, they can use it for tracking the persons. And another problem with this system is that it can be used with Predator- and other combat UAV, what can communicate with central computers of the Internet, and then find those persons by using the location data, and target the weapons to that target.

The system can use nuclear-powered drones for tracking that person, and when there is enough room around this person, would it open fire with missiles. The Predator is very easy to change ans the drone, what uses electric motor and RTG-generator for giving extremely long operational time,  and altitude. Computers can easily calculate the kill radius of the missiles, and open fire when the target is alone in the beach, and the support team or sensitive artificial intelligent program can call the target to the remote position by playing some drug or dealer or another business partner. The profession of the caller can use to make a profile, is the targeted person real criminal. And if the caller is some drug dealer, who calls the target, would the conclusion be, that the man is a criminal.

Only persons, who have given this permission would be seen in the social media, and others faces would be hidden behind the black box. That kind of image recognition system makes possible that person would not need to take even keys from the table when our main character will walk out. Those image recognition systems can use multiple sensors, like retina-scanners and IR-cameras, what also detect the possibility of plastic surgery. And in the wildest dreams, the system can use 3D-X-ray scanners.

Sniffer scanners can detect the form of the skull, and the chemical analyzers can also be used to detect the person. Those "people sniffer" equipment can be modified gas detectors, and they can work like the artificial nose. This kind of equipment work looks like an artificial dog, and they can carry in the wrist pocket. So they can also be used for tracking people from society. The lasers and another kind of stuff can also detect the DNA of the person by use mass-spectroscopy.

That kind of equipment can be real in the future. But when we are turning back to the people, who are denying to share their identity on the Internet, would that cause some other problems, The system can use that information for select people, who wanted to target the surveillance. One very good way to choose persons for intensive surveillance is that they would not allow sharing anything about them on the Internet. That tells the system, that this person has something to hide. And only interesting targets give something for the security service.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that