Quantcast
Channel: Popular Science | RSS
Viewing all 20161 articles
Browse latest View live

What’s the Deal with Paranormal Ectoplasm?

$
0
0

Paranormal Ectoplasm

Jason Schneider

Nineteenth-century physiologist Charles Richet first used the term ectoplasm to describe a strange material that seemed to flow from spiritual mediums during a séance. Doughy strings appeared to ooze from their bodies and assemble into ghostly faces or disembodied limbs.

Of course, these ectoplasms were a parlor trick. Mediums used sleights of hand to present gauze and animal parts as spiritual pheno­mena. As silly as this now seems, many intellectuals of the time found the shows convincing, including Richet, who won a Nobel Prize for his pioneering work on anaphylaxis. “Richet was no dummy,” says Robert Brain, a historian of science at the University of British Columbia. Yet Richet was dogged in his studies of paranormal ectoplasm. “What made ectoplasm seem plausible to otherwise rational, clear-headed scientists?” Brain asks. “There had to be an underlying logic to it.”

He’s right. By the mid-1800s, scientists had discovered a gelatinous substance or “plasm” inside plant and animal cells, which they believed to be the basis for all life on Earth. “Biologists were actively interested in protoplasm for 100 years,” Brain says. The concept was mainstream.

With this in mind, it might not have seemed so strange for the body to extrude plasm under exceptional circumstances. Or for that external protoplasm--called ectoplasm--to change form. Eventually modern molecular biology revealed that heredity is stored not in the vibrations of a cell’s jiggly plasm but in the acids of its nucleus. At that point, “protoplasm became an embarrassment to biology,” Brain says.

Have a question? Tweet your science questions and quandaries to @PopSci with the hashtag #AskAnything, or email us at AskAnything@popsci.com.

This article was originally published in the July 2015 issue of Popular Science.


Public Figures Can Now Livestream Directly To Your Facebook News Feed

$
0
0

Facebook

Dwayne "The Rock" Johnson will be one of the first public figures to use Facebook's Live feature.

Livestreaming has proven to be a huge market—event streaming like The International 2015 Dota 2 championships on Twitch received more than 49 million hits this week, and Twitter’s Periscope has created its own brand of livestreaming stars like Amanda Oleander (310,000+ Periscope followers). And if it’s social, Facebook wants to be in the game.

Facebook announced today that they are launching Live, a new feature for the social network that allows public figures to livestream themselves to all their followers. In a post about the new feature, product manager Vadim Lavrusik explains that the Live video will appear in fans’ News Feeds, allowing them to watch, comment, and share. Followers that have recently interacted with a public figure’s posts will receive a special notification.

Live video can be switched between front and rear cameras, and once they're stopped, they will be saved to the public figure’s page. (They can also then be removed by the user.)

Facebook has partnered with a laundry list of celebrities for this announcement, including Dwayne “The Rock” Johnson, Serena Williams, Ashley Tisdale, Lester Holt, Martha Stewart, and Michael Bublé. The celebrities will be Live in the upcoming few days.

Facebook Could Check Your Loan Applications Against Your Friends' Credit

$
0
0
 Facebook headquarters entrance sign

Facebook headquarters entrance sign

LPS.1, via Wikimedia Commons (CC0 1.0)

Facebook friend lists are a weird collection of your classmates, coworkers, distant relatives, former roommates, and other people you may have known at one point in your life. A new patent granted to Facebook would let lenders check those same friends' credit scores and take them into account when deciding to grant a loan. It’s totally not something straight out of a cyberpunk dystopia.

Here’s the relevant section from the patent for “Authorization and authentication based on an individual's social network”:

In a fourth embodiment of the invention, the service provider is a lender. When an individual applies for a loan, the lender examines the credit ratings of members of the individual's social network who are connected to the individual through authorized nodes. If the average credit rating of these members is at least a minimum credit score, the lender continues to process the loan application. Otherwise, the loan application is rejected.

More specifically, the technology Facebook patented looks through “an individual's social network and a black list of persons that have been determined to be untrustworthy,” and then decides whether or not to proceed with that interaction. This is billed as a way to reduce spam, or unwanted messages and solicitations, by for example not letting people send email to users if they can’t trace a path between the sender’s network to the receivers.

When it comes to evaluating loans, this makes a social network not just a set of personal connections but a gathering of potential liabilities. Want a car loan but you’re still Facebook friends with a distant cousin or former elementary classmate whose checks tend to bounce? This technology, if it judges those connections to be enough of a risk, means the lender could turn down the loan. For risk-adverse lenders, this in theory reduces liability.

It also has at least a passing resemblance to “redlining,” a now-outlawed practice that restricted housing loans to people based on their neighborhoods and explicitly the racial composition of those neighborhoods. The practice ignored the actual pertinent information about a loan-seeker, like their credit and their income, and instead denied loans to people based on where they lived, were trying to buy, and who their neighbors were. While outlawed by the Fair Housing Act of 1968, cases are still brought to court today.

Facebook connections happen on far more diverse criteria than just where a person physically lives. But that’s one factor Facebook’s use of network science takes into account when recommending friends.

And Facebook isn’t the first to try to tie lending to social networks. Earlier this year, Hong Kong’s Lenddo proposed a system for basing credit on peers. Lenddo’s system appears to be opt-in, and is billed as an alternative way for people without traditional means of proving credit to prove their worthiness for loans. That’s a marked contrast from Facebook, which could apply this method to an already extensive network of friends.

The Bug Within The Beetle That's Causing A Coffee Crisis

$
0
0

The coffee berry borer is aided by bacteria in its destruction of our beloved coffee plants

Coffee is one of if not the most popular drinks worldwide. Over half of Americans drink the black, bitter liquid, spending 40 billion dollars on it every year. As such, the supply is a matter not only for food but also economic security.

But coffee has a rather vicious enemy, the coffee berry borer. It’s an insect that was once limited to Africa but has spread across the world. Currently, losses account $500 million annually, though it is expected to rise as the insect’s range expands.

The borer’s success relies on a unique ability to resist one of the most successful toxins made by the coffee plant, caffeine. For humans, it’s a stimulant but for smaller organisms, it is a lethal neurotoxin. This allows plants to defend themselves against being consumed and eventually killed.

Many insects can metabolize low concentrations of caffeine. But the borer appears to have developed the ability to withstand levels normally considered to be lethal. How it accomplishes this, however, has been for the most part a mystery.

Now there may be an answer that lies not in the bug but in its bacteria. Last week, an international team of researchers revealed that degradation of caffeine may be mediated primarily by the beetle's gut microbiota. Their findings open the door to a new avenue of treatment where the target isn’t the insect, but the microbes found within.

The group collected specimens of the berry borer from Kenya, Indonesia, India, Puerto Rico, Hawaii, Guatemala, and Mexico. All of these regions have seen an increase in the presence of the insect and are suffering losses. When they arrived at the lab, they were first tested to see if they could break down caffeine in the gut. Some insects were fed the caffeine immediately while others were fed after an antibiotic treatment to reduce the number of microbes.

As expected, adding caffeine to the diet had little impact on the control insects as the chemical was broken down. But in those given antibiotics, there was a 95% decline in eggs and larvae. Without the bacteria in the gut, the population dropped.

Though this was enough to provide proof of gut microbiota involvement in caffeine resistance, the researchers wanted to go further. They split the insects into two groups. One was kept alive while the other was washed, killed, and eventually broken down such that the genetic material could be isolated.

From here, the goal was to identify the bacteria found in the gut. The first route was to physically isolate and culture bacterial species from within the live animals. The second was to use genetic identification to determine all of the species. This dual-pronged strategy could ensure any molecular results could be backed up by actual visual observation.

As expected, both experimental procedures revealed a rich diversity of microbes from the insect gut. One of the most populous bacteria common to insects worldwide was the pseudomonads. They are ubiquitous in the environment and were expected to be found in high numbers. They were also the most likely suspects in caffeine reduction as they had already been shown to break down caffeine.

The next step was for the scientists to prove their gut feelings by putting the bacteria to the test. They attempted to grow all the species on agar containing caffeine as the sole carbon and nitrogen source. Several species were able to survive including a non-pseudomonad, Pantoea vagans, a bacterium used in plant biocontrol. But the best survivor was Pseudomonas fulva. It’s a potential human pathogen, but in the insect, it’s a part of the normal microbial flora.

The final stage was to re-instate the caffeine depleting activity. They took antibiotic-treated insects and fed them P. fulva for a week. Although they were able to deplete the caffeine, they were unable to reproduce. This suggested the loss of the bacterium can irreversibly lead to reduction of the species by preventing proper reproduction.

The combined results suggested targeting P. fulva might be a viable option in controlling the borer. The authors suggested focusing on changing the microbiome of the insect could be an excellent means to naturally alter the insect’s population dynamics. How that could be accomplished, however, is up for debate.

Although antibiotics were used in the study, the concept of mass dissemination of these drugs in the wild is not recommended as this could lead to more resistance in the future. Other options include antimicrobial peptides and the use of competitive species of bacteria such as Pantoea vagans. But this will require future research to specifically determine the effect of these strategies. With more studies in this area, a viable option will eventually be found and everyone will be able to enjoy their cup of joe knowing the supply and security are assured.

Warmer Temperatures Could Mean More Salmonella Outbreaks

$
0
0

Vomiting, fever, and diarrhea—these nasty symptoms are the embodiment of the crippling effects that salmonella can have on the body. In the past, scientists have linked outbreaks of the bacterial infection to extreme weather. Now researchers in Maryland have looked back at salmonella data over the past 10 years to determine that global climate change—which has been linked to warmer temperatures and more extreme weather events—may make salmonella outbreaks more frequent, especially in coastal areas. The study was published recently in the journal Environment International.

Salmonella usually makes its way to human contact first from animal stool that is used as fertilizer. People become ill from the bacteria if they ingest it, often through poorly cooked meat or unwashed produce. The bacteria flourishes in warmer temperatures. Combine that with more flooding events that carry bacteria-filled feces to places where humans get their drinking water or grow their crops, and you’ve got the potential for a serious outbreak.

“Salmonella, just like any bacteria that responds well to heat, is going to spread whenever you have warmer temperatures,” study author Kristi Shaw told Climate Central. “We wanted to look past outbreaks caused by a group of people getting sick at a church cookout or something like that, to the less defined outbreaks caused by environmental variables like temperature.”

Shaw and her colleagues looked at the record of all the salmonella cases from 2002 to 2012, and compared it to weather data from the National Climatic Data Center from 1960 to 2012. They found that each period in which there were more days with temperatures over the 95th percentile, the risk of getting salmonella increased about 4 percent; in periods with the amount of precipitation over the 90th percentile, the increase was almost 6 percent. Both effects were more pronounced in coastal areas.

This is the first study to link climate change to greater risk of salmonella infection, but the results aren’t surprising, outside researchers told Climate Central. The study authors note that these results held true within the state of Maryland but may not be the same all over the country, where soil types and land use may vary. However, the researchers call for government and public health officials to put new safeguards in place to ensure the food and water that people receive is safe, at least in Maryland but likely beyond.

The Instagram For Google’s ‘DeepDream’ Is Finally Here

$
0
0

Dreamify

Levi Sharpe/ Popular Science

An image of Dave Gershgorn transformed using several of Dreamify's preset filters

I got to try out an upcoming DeepDream smartphone app, and it’s awesome.

The Dreamify app allows users to transform images on their smartphone into psychedelic nightmares by using Google’s DeepDream source code, which was released last month. Although others have created similar image generators on the web, this is the first mobile app to use the DeepDream code, as well as to give users the ability to customize how much the image is transformed.

Google’s DeepDream code is a part of their artificial neural networks, which Google Images uses to sort and categorize images online. After sifting through thousands of tagged photos, the program begins to learn what things are. Google also found that when the software is given the task of generating its own images from what it has learned, it gets confused and creates strange chimeras such as dumbbells with arms and slug dogs.

"We wanted to make something where you really had the same granularity of control as someone who could get into the code"

Once the source code was released, developers began to use the code in a variety of ways. Many created image generators on the web where users could upload pictures to be transformed in the uncanny DeepDream style. One developer took this a step further and created an animator that could apply these effects to video. Another developer even used DeepDream’s image distortion to trick Facebook’s facial recognition software, DeepFace.

The team at Dreamify wanted to bring the DeepDream software to a wider audience, and they knew the best way to do that would be to bring it to people’s pockets. The app uses Amazon web servers to run the neural network remotely. So instead of draining your battery and taking an hour to transform an image, it only takes several seconds. This is much faster than some online DeepDream image generators such as Psychic VR Lab, which has an insanely long wait time to receive an image, and no customization options.

Similar to Instagram, Dreamify has 12 preset transformation filters with names like “Iridescent Globules,” “Psychedelic Topography,” and “Dogify.” Each one alters the image in conventional DeepDream fashions.

Presets

Levi Sharpe/ Popular Science

Dreamify's 12 preset filters

I had an excellent time running a pouty-face image of Dave Gershgorn through several of the presets. This one is my favorite, where he looks extra miserable and his elbow has its own legs:

Dave Gershgorn

Levi Sharpe/ Popular Science

An image of Dave Gershgorn transformed by the Dreamify app

However, the app also gives the option to customize the “dreamification” process with four sliding parameters, each controlling different aspects of the DeepDream code. For example, the “Iterations” parameter controls the number of times the neural network goes over the image, where as the “layers” parameter controls the type of patterns that the neural network looks for.

“At the high levels it’s looking for objects that it’s been trained on, so you’ll see these sort of otherworldly creature-like things,” says Matt Jacobs, a software engineer at Dreamify. “We wanted to make something where you really had the same granularity of control as someone who could get into the code.”

This is what happens when you crank up all of the customize parameters:

Dave Gershgorn

Levi Sharpe/ Popular Science

"Wow, I am a universe," Dave Gershgorn said when he saw this image.

Photos can be kept private or automatically featured in a “Gallery” tab. Other users can “love” the featured photos and the ones that are loved the most get featured in the “Popular” tab.

Levi Sharpe/ Popular Science

The most loved Dreamify images can be seen under the "Popular" tab

Jacobs said the app will be free for both iOS and Android, and will be ready for mass consumption within a week. The team has plans to include a premium option in the future with features such as DeepDream animated gifs and high-definition photos.

“We want people to get creative with it and use it as a tool to be able to have fun with their photos without having to worry about paying for it,” said Jason Martin, another software engineer at Dreamify.

The Dreamify team obviously has fun with their app, as they attached a “dreamified” headshot of me in the email they used to reach out to me.

Levi Sharpe

Levi Sharpe/ Popular Science

A headshot of Levi Sharpe processed through the Dreamify app

You can sign up to receive an email when the app is out on the company’s website, and can find other updates on Twitter.

Graava Action Camera Edits Your Video, So You Don't Have To

$
0
0

YouTube/ Screenshot

Graava, held by a man in desperate need of fingernail maintenance.

If you’re a cycler or runner who likes to record your activity, you might have hours and hours of footage that you’ve never gotten a chance to edit down. That’s exactly what Graava was designed to avoid.

Graava is a small, helmet-mountable video camera meant to take all the legwork out of making memories. Or is it making videos? The designers of Graava don’t want there to be a difference. “What if there was a camera that could make memories just like your brain does?” ponders a bearded, vaguely hip man in the video explaining Graava.

Graava tracks things like motion, sound, and position with five sensors—a camera, microphone, accelerometer, GPS, and optional user-worn heart rate monitor. By combining data from these inputs, the camera takes the most fast-moving, heart-pounding moments of your footage and edits them together. It sorts excitement based on the user’s heart rate, when a big object moved through the frame of the video, or if there was a loud noise.

YouTube/ Screenshot

Graava's software attempts to analyze the most exciting moments of a user's video, and then edit together automatically.

The camera isn’t loaded up with the latest specs—only reaching 1080p video at 30 frames per second—but the camera’s software is what sets it apart from a GoPro or Sony Action Cams. However, Graava does have a 4K hyperlapse mode. The Graava can charge by being placed on a wireless, inductive charging stand, and used as a remote camera for the home when not being used as an adventuring tool. When connected to the charging stand, the camera also automatically backs all your raw footage up to the cloud, and goes about editing any footage you haven't seen yet.

For recording, you can also connect the camera to third-party heart rate monitors via Bluetooth. The 1100mAh battery should last for three hours while recording 1080p video, according to the manufacturers, although that’s with the Wi-Fi turned off.

Graava

The sensors and wireless capabilities of Graava.

The free Graava app, available on iPhone and Android, allows users to edit their video down to specific times, sync the video to music, and share directly to social media on the go.

The idea for Graava was born when creator Bruno Gregory was hit by a car. He even added a link to the site, so you could see it happen. (The Graava site claims the driver was put in jail following the collision.) He thought that there had to be some better way to integrate machine learning into a camera for easier editing.

But auto-editing isn’t new. The TomTom Bandit has a strange “shake-to-edit” feature which does a similar job (and shoots in 4K), and even Disney Research published a paper on automatic editing last year. GoPro also has an easy tagging feature called HiLight Tag. That means Graava is already behind the curve, because the camera won’t release until early 2016. However, the preorder price of $250 dollars is appealing, as Graava will retail for $400 dollars upon release. In 2013, Google added automatic editing to their Google+ platform.

Google Granted Patent For Better Robo Kite Windmill

$
0
0
Makani Tethered Robo Kite

Makani Tethered Robo Kite

Screenshot by author, from YouTube

It takes a lot of electricity to be Google, so it makes sense that the internet giant is investing in renewable power sources. One of these ventures is a creative fusion of windmills and flying robots: gigantic, tethered kites that spin turbines using wind power. The project has been in the works for years. This week, they were granted a new patent for safer kite landing.

Previously, their robo-kites landed in their perch sideways, like this:

The new modification is modest; as highlighted by Leon Doitscher at Declassified, it's a perch that uses curved racks to slide the kite drone into place. This is less a complete new innovation than a fine-tuning of a working machine.

Here’s another look at the turbine kite robot in flight:


FDA Issues Warning About Hackable Medical Devices

$
0
0

An infusion pump like the one for which the FDA issued its warning.

Last week, the Food and Drug Administration issued a safety notice: an infusion pump, used in hospitals all over the country, is vulnerable to cyber attack. The FDA “strongly encourage[s]” hospitals to discontinue their use of the pump.

The infusion pump, used in hospitals to deliver a programmed amount of fluids into a patient’s body, is made by the company Hospira-- we've pointed out their pumps in the past as a possible security threat. It’s one of several kinds of devices integral to patients’ daily lives—10 million Americans use devices like pacemakers, insulin pumps, and cochlear implants. Some, like pacemakers, only send information via a wireless connection, but others both send and receive information. That means that hackers could increase or decrease the device’s function, which could spell catastrophe for the patient.

The FDA has known about the security threat for a while. It’s even infiltrated the popular psyche—in an episode of Homeland, hackers kill the vice-president by disabling his pacemaker. In real life, it would probably be less dramatic. Hackers could mess with devices, “just because they can,” the president of Consumer Watchdog, a consumer advocacy organization, Jamie Court told KQED. And though the FDA has known about the issue for some time and issued guidelines for manufacturers to make medical devices more secure, some, like Court, claim that they aren’t strict enough.

Though this is the first time the FDA has issued such a warning for a medical device based on its cyber security risk, it very likely won’t be the last. Researchers have shown that they can hack the devices, and some incidents have already occurred. Others claim that medical devices will always be imperfect and require monitoring. But at least they could be much more secure than they are now, and the FDA is expected to release updated guidelines for improvements later this year.

Burning Man Is Getting Its First Virtual Reality Tent

$
0
0

Jennifer Morrow/ CC BY 2.0

A scene of Burning Man 2013.

If actually being somewhere that resembles a Mad Max-style wasteland wasn’t enough, virtual reality will make its debut at Burning Man this year, turning the inside of a two tents into trippy 3D canvases.

Two VR enthusiasts, Shannon Norrell and Dara Bonakdar, are bringing VR to Black Rock Desert this year, setting up a total of 16 VR viewing stations alongside a 30x20 projected screen. They’re calling it VRCamp, and users will be able to check out the HTC Vive and Google’s 3D painting app called Tilt Brush. Re/code reports there will also be motion capture suits linked to giant projections of Godzilla and animated robots that will dance along with the crowd.

There was an IndieGogo to initially fund the project, and now there’s a Kickstarter that still has 10 days left to go (at time of writing). VRCamp has garnered some outside support, though. Google will be donating Cardboard VR headsets, Nvidia has offered to power the computers by donating graphics cards, and VR arcade The Void is offering tours for backers who pledge more than $1000 dollars.

Organizers say that VRCamp is definitely going to happen, but even with corporate donations and two crowdsourcing pushes they’re still about $28,000 dollars away from their initial goal of $35,000 dollars.

Rocks' Balancing Act Gives New Insight Into Earthquakes

$
0
0

Conventional wisdom in a large earthquake is that large unstable objects tend to fall down in the midst of all the shaking. But not always. In one area of California, close to the famous San Andreas fault, there are a few delicate geological formations that have weathered intense historical earthquakes without falling down.

These 'precariously balanced rocks,' known as PBR's (no relation to the beer) have been balanced for 10,000 years, a span of time during which there have been 50-100 large earthquakes in the area. So why are they still standing? In a new paper published in Seismological Research Letters researchers found that interactions between two faults, the San Andreas and the San Jacinto may be the answer to the mystery.

“It was a real scientific puzzle, a real head-scratcher,” author Lisa Grant Ludwig said in a statement. “How can you have these rocks right next to the San Andreas Fault? It’s an interesting scientific question, but it also has practical implications, because we want our seismic hazard maps to be as good as possible.”

Seismic hazard maps help city engineers and designers figure out what kinds of risks are present in an area. They can influence building codes, engineering decisions, and emergency plans.

But in order to figure out what kinds of shaking an area might be in for, geologists have to look at how much shaking has occurred there in the past. One way to do that is to look at PBR's and see how much it would take to get them to fall over, which can tell them the maximum shaking that the rocks could have endured in the past. If an earthquake came along that exceeded the force, the rocks would no longer be precariously balanced...they would just be rocks. The researchers' methods to see how much force these rock formations could withstand before they tipped were pretty direct.

"There are two methods of doing that, one of which is actually trying to tip the thing," one of the authors of the study, Lisa Grant Ludwig told the BBC. "If my mother had known I was doing that, she would not have been happy.... You never want to be on the downhill side when you tip it."

With that method, the researchers were extraordinarily careful to not actually tip over any of the 36 rocks they examined, an action that could have gotten them in serious trouble. Last year, two Boy Scout leaders were charged with felonies after knocking over a delicate geological formation in Utah.

The less risky method that the researchers used involved taking detailed measurements of the rocks and running those through detailed calculations and virtual simulations. After all the data was in, they concluded that the reason the rocks were still standing was because of the interaction between the faults. In the area the scientists were studying, there was only a small (approximately 1.2 mile) distance between the two faults. The researchers think that this gap is a fault step, or stepover, a place where an earthquake along one fault might be affected by the presence of a neighboring fault. Because the two are so close together, it is possible that the proximity of one could help derail an earthquake from continuing unchecked along the other, by transferring energy. The shifting between the two could lessen the amount of shaking in the immediate area.

But fault steps are still an area of intense study, and while the researchers think that the interaction might have prevented intense shaking in the past (as evidenced by the still-standing PBR's) it might lead to more intense shaking in other areas in the future.

“This paper suggests that we might consider the impact of a rupture that involves both the San Jacinto and San Andreas faults, which has the potential to affect more people than just the San Andreas or just the San Jacinto,” Grant Ludwig said in a statement.

Whether or not the interaction between the two faults has the potential to lessen or increase the shaking in California in the next big earthquake involving either fault depends on a vast number of factors, like the location that the quake starts, and the direction in which the quake travels among many other things. More research is needed before any predictions can be made.

In the meantime, the rocks near the San Andreas continue their balancing act.

Should Bioethicists “Get Out Of The Way” Of CRISPR Research?

$
0
0

The newly popular enzyme CRISPR-Cas9 has lots of impressive possible applications. Inevitably, it will be used to edit human DNA to fight disease. When a team of Chinese researchers tried this on human embryos for the first time last year, scientists and scientific organizations --along with a few bioethicists--declared that the experiments came too soon, and similar work would not be funded in the United States.

That was a gross overreaction, says psychologist and linguist Steven Pinker in an editorial in the Boston Globe. CRISPR is key to reducing human suffering, Pinker wrote, and bioethicists should strive to “get out of the way” of progress.

A truly ethical bioethics should not bog down research in red tape, moratoria, or threats of prosecution based on nebulous but sweeping principles such as “dignity,” “sacredness,” or “social justice.” Nor should it thwart research that has likely benefits now or in the near future by sowing panic about speculative harms in the distant future… Of course, individuals must be protected from identifiable harm, but we already have ample safeguards for the safety and informed consent of patients and research subjects.

I spoke to six bioethicists and ethics commentators to see what Pinker got right about the state of bioethics today, especially in relation to the debate surrounding CRISPR, and where he was off the mark.

Overwhelmingly, bioethicists agree with Pinker that the red tape surrounding scientific research is awful, and there’s way too much of it. Norman Fost, a professor emeritus of pediatrics and bioethics at the University of Wisconsin, mentioned a slew of cases in which scientists who conducted solid, ethical work were threatened with sanctions because the consent form was slightly unclear, or the IRB minutes didn’t note if a quorum was present. “People who promote or support that kind of oversight are not ethicists—those are bureaucrats at a federal regulatory agency with little background in ethics,” Fost says. That’s the kind of procedural over-regulation that should be eliminated—and that has nothing to do with ethicists.

But most that I spoke to agreed that Pinker took such an exaggerated stance in his piece that he distorted the bioethicists’ role. “I think that, like most op-eds, it was designed to be inflammatory and slightly troll-y to get a response. And it was successful on that front,” says Kelly Hills, an ethics blogger and commentator. Others were less diplomatic, saying that the piece is “superficial,” “overly simplistic,” and “employs the lingo of the World Wrestling Federation and is not conducive to collegial interaction or good discourse.”

Bioethicists Aren’t In The Way

Pinker conflates bioethicists’ role of discussing ethics with the role of government panels or institutional review boards (IRBs), which actually regulate research. Bioethicists can work in pretty much any industry, advising on ethical matters both small and large; IRBs consist of many different stakeholders and are expressly charged with vetting new experiments to ensure that they adhere to national, international, and institutional ethical standards. IRBs include scientists who are not affiliated with the research, members whose interests don't have anything to do with the science, and people who have nothing to do with the institution. Bioethicists can be on IRBs, or not. “If [Pinker’s] experience is that bioethics have tried to slow progress by introducing road blocks, he’s not mistaken—there is some of that. But he is mistaken if he thinks bioethics is only about that,” says Eric Meslin, the director of the Indiana University Center for Bioethics.

Steven Pinker "employs the lingo of the World Wrestling Federation."

Part of that misunderstanding is that no one—not even bioethicists—agrees on exactly what a bioethicist does. Bioethicists can come from almost any field, with expertise in a huge range of disciplines, and find jobs in universities or government or pharmaceutical companies or non-profits. “We’re still debating if we’re a full profession, if we have credentials and standards against which we can be assessed for quality,” Meslin says. While several institutions offer Masters degrees in bioethics, a bioethicists doesn't necessarily need one to work in the field.

Several of the ethicists I spoke to noted that the moral conversation around CRISPR exists in the context of the technologies and ethical debates that preceded it. “I think that Pinker is looking at this from the lens of the embryonic stem cell debate from 10 years ago,” says Jonathan Moreno, professor of Medical Ethics and Health Policy at the University of Pennsylvania. “Part of what happened—and I was heavily on one [liberal] side of that—is that bioethics was seen as an opportunity for social conservatives to wrap themselves around a number of issues.”

“We’ve been talking about manipulation of the genome for 40 years, since the 70s—and not just Asilomar [the famous conference on recombinant DNA],” Meslin says. Progressive steps like the sheep clone Dolly, patients dying from gene therapy treatments, the stem cell debate of the early 2000s—all of these echoes are present whenever the ethics of CRISPR come up.

A Question Of Culture

Most bioethicists love science and love progress. They seek to strike a balance between regulation and permission—too much permission, and researchers can ignore societal constructs of morality; too much restriction means progress slows down, and scientists start to operate outside that agreement.

CRISPR is shiny and exciting and new, as other biotechnologies once were. Some work out, but most don’t live up to our (very high) expectations. But CRISPR is different in some important ways—it’s really easy to use, and the debate about its ethics extends to the international stage. Unlike the embryonic stem cell debate, stakeholders aren’t restricted to people who come from more or less the same ethical foundation because it's happening all over the world. “I think the biggest concern I have [about CRISPR] isn’t superhuman babies taking over the world—the bigger issue is probably going to be one of cross-cultural breakdown,” Hills says. “We should [involve] people who are culturalists and religious experts to navigate that pitfall and the moral expectations that we have when we assume that Westerns are right.”

“Internationally, it’s a challenge to get people to adhere to [ethical agreements],” says David Magnus, the director of the Center for Biomedical Ethics at Stanford University. Sometimes agreements that come out of high-profile organizations like the National Academy of Sciences, can have enough heft to affect research outside the U.S. But Magnus thinks that it’ll happen on its own if ethicists can come up with just the right ethical balance.

“To get scientists to buy in, I’m a big believer in self-regulation,” Magnus says. “If we find the sweet spot [between restriction and permission in research] and make the case right, it will work. And that process has to involve input from the scientific community.” International accords exist, like the Declaration of Health and Safety set up in the 1990s from the World Health Organization, but these are very difficult to formulate and rarely have legal teeth to enforce them.

What Happens Next?

Overall the bioethicists I spoke to were split about whether it's true, as Pinker claims, that “ample safeguards” for ethical research are currently in place. Some were convinced that CRISPR could transform our world for the better; others less so. Most thought that the Chinese researchers did nothing morally reprehensible in using CRISPR on non-viable human embryos, and were quick to point out that those who were up in arms were scientists themselves, not bioethicists.

But they did agree that bioethicists need to be more--not less--involved in the conversation about CRISPR. For technologies that have the capacity to disrupt the world of research and medicine as we know it, everyone--researchers, politicians, sociologists, theologists, average citizens all over the world--must be drawn in to the discussion. On a basic level, people don't need bioethics credentials to care, or even lead a discussion.

CRISPR is still in its early days, but that’s all the more reason to think about the ethics now. “Reasonable investigators should proceed with the utmost caution,” says David Lemberg, the founding editor of Bioethics Today and associate facultyprofessor in the Department of Community Health at National University. “Dealing with harms as they arise [as Pinker suggests] is reactive, not proactive.”

We don’t need bioethicists to get out of the way. We need them to help us make the right well-balanced agreement and help guide scientists currently functioning in the Wild West of CRISPR ethics. Because for hundreds of years, we’ve seen what happens without one--researchers commit horrible human rights violations when they testhypotheses on unsuspecting or ill-informed participants, all in the name of scientific progress. And while many of these concerns don't pertain to CRISPR, some worry that changes made to human genes could have unintentional or unpredictable consequences for future generations who cannot consent.

“The role for bioethicists—and of all stakeholders representing numerous interest groups—is to oversee such research and to limit its conduct based on the precautionary principle,” Lemberg says. “Just because we can do a thing doesn’t mean we should do the thing.

In the end, Pinker is wrong. We need bioethicists--now more than ever. But discussing the ethics doesn't have to slow progress. Having more of these conversations can ensure that the progress is the kind that we, as a society, want it to be.

Drones Could Hack Wireless Networks As They Fly Overhead

$
0
0
Boeing Scan Eagle

Boeing Scan Eagle

Joseph M. Buliavac, U.S. navy Photo via Wikimedia Commons

According to emails posted by Wikileaks, aviation giant Boeing was in talks with Italian offensive cyberwar contractor Hacking Team to make a drone that could hack into computers from the sky.

The proposed hacks would allow for surveillance of online traffic. One option was having a drone fly overhead, creating a new wifi network for suspects to sign into. In this scenario, the cyber attack is nothing more complex than watching traffic on an unlocked public router; the art is in getting the new network in place, via air, so people can absentmindedly sign on to it.

Drones are ideal for this kind of operation, because they are very good at loitering over an area for a long time, and sending back lots of captured data in real time. But there’s an easy solution for anyone wanting to hide on the ground: avoid logging in to unfamiliar Wi-Fi networks when a drone is overhead.

Previously, the United States has explored other weapons that shut down computer systems from the sky. The “Counter-electronics High-powered Microwave Advanced Missile Project” or CHAMP, is a missile developed by Boeing that blasts computers and other nearby electronic systems through targeted emission of microwaves. That’s great for destroying communications, but it’s hard to spy on communications if the network is broken.

[Washington Post]

Korean Researchers Knock Drones Out Of The Air With Sound

$
0
0
Spectrogram of a police siren

Spectrogram of a police siren

Key45, via Wikimedia Commons CC SA 1.0

This week, South Korea shouted a new entry onto the list of drone countermeasures. A research project by the Korea Advanced Institute of Science and Technology (KAIST), set to be presented in DC next week, uses sound to disable the internal gyroscopes that balance drones.

The paper, entitled “Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors” targets Micro-Electro-Mechanical Systems (MEMS) gyroscopes, the tiny sensors used by drones to stay level in flight. In normal function, these gyroscopes stabilize the drone against imbalances from wind or other movement. The researchers from KAIST wanted to see if enough deliberate, hostile external vibration--in this case provided by sound--could disturb the smooth flight of the drone. The answer was a resounding “yes.”

It turns out that the resonant frequencies, or sounds that vibrate at the same frequency as the targeted object, of many of the gyroscopes used in small drones are within audible range. To find that out, the researchers attached a wireless speaker four inches above the gyroscope in a target drone, and then turned it on while the drone was in stable flight. One of the targets was largely unaffected and stayed airborne, but another became unstable on all its axes and fell down to the ground.

Attaching wireless speakers to a target drone isn’t exactly a great countermeasure, so the researchers attempted other sonic attacks on drones. In a simulation they found that, if loud enough, directional speakers could disable drones from a distance of up to 120 feet, and increasing the decibels of the sonic weapon extends its range, to a point. But without the ability to track the enemy drone, it can just steer itself clear of the attack and continue to fly normally. (The kind of equipment needed to track incoming drones is more in the realm of a defense contractor than a research institute.)

Unless costs go down or power of the countermeasure goes up, we’re unlikely to see sonic weapons protecting skyscrapers from hostile drones. Fortunately, Korea has other defenses on hand. This past spring, they showed off an anti-drone system that used other small drones to attack and disable hostile quadcopters on the ground.

[PCWorld]

Airplane Toilets Can Help Researchers Find Disease Outbreaks

$
0
0

You see a toilet; scientists see a gold mine.

Your poop can say a lot about you— what your diet is like, if you come from a place with treated drinking water, or whether or not you’re obese. And now, according to a study published recently in Scientific Reports, it can tell researchers what continent you’re from, and give them an early indication of disease outbreaks in that specific area.

In 2013, a team of Danish researchers gathered the poop from 18 airplanes that departed from nine cities and all landed at the Copenhagen airport. They sequenced the genomes of the microbes in the poop, and found some pretty interesting trends. Microbes that came from Southeast Asia had a much higher incidence of antibiotic resistance compared to those from North America—likely because antibiotics are still over-prescribed in Asia, the study authors hypothesize. Food-transmitted microbes Salmonella enterica and norovirus, both of which can cause vomiting and diarrhea, were also more frequent in the stool from Southeast Asia. That’s supported by epidemiology data from the World Health Organization, the authors note, that shows people in Southeast Asia are much more likely to get food poisoning. The killer antibiotic-resistant bacterium Clostridium difficile was more common in the samples from North America, where it infects 500,000 people per year, mostly in hospitals.

These findings led the researchers to believe that they could start to create a typical microbiome for each continent. And any big shifts that happen in their makeup—say, the concentration of C. diff rises dramatically in samples from Southeast Asia—could indicate a growing public health issue. If it’s caught early enough, public health officials could take preventative action.

This is the most recent of a number of high-profile studies about the microbiome, Wired notes. And looking at just DNA alone can be deceptive. Disease-causing bacteria share up to 90 percent of their genes with their non-pathogenic relatives, and it can be really hard to tell the difference.

Not everyone is convinced that monitoring the microbiome is the best way to catch looming outbreaks— and this study was just a proof of concept. To do that, they would need to develop a global microbiome database, which is a complex undertaking as people are increasingly mobile and can move around the world with ease. In the future, the researchers plan to further refine the microbiome data that is associated with each region to be able to detect more trends and changes.


Recreating The 'Shocking' Origin Of Life In A Lab

$
0
0

You know that scene in Frankenstein, where the doctor uses electricity to bring the monster to life? While a work of science fiction, electricity does play a key role in all life on earth. Electrical impulses are all around us, powering just about everything we think and do. But how did the first life get that vital spark?

Back when the first life originated on Earth, the planet was a hot, unwelcome place--a mix of chemicals, rocks, and not much else. Somehow, in the midst of all this unpleasantness, something came alive for the first time. To find out how, scientists recently recreated some of these primordial conditions in the lab to find out how. They built chemical gardens, tiny replicas of the conditions at hydrothermal vents on the seafloor, where life might have originated. Like their real-world counterparts, the chemical gardens resemble chimneys rising from the depths of the sea (or the depths of the test tube).

They found that the interaction of chemicals in the lab (namely, iron sulfide and iron hydroxide) were enough to generate electricity. Linked together, four of the gardens generated enough electricity to power a lightbulb.

"These chimneys can act like electrical wires on the seafloor," lead author Laurie Barge said in a statement. "We're harnessing energy as the first life on Earth might have."

Barge works at NASA's Jet Propulsion Laboratory, studying astrobiology on icy worlds. Researchers think that there might be a possibility of finding life on other planets, but in order to know where to look, they have to understand the basics of how life developed here, which is why Barge and colleagues are looking into the sources of energy that could have sparked the first life on Earth.

Thanks To This Device, Stealing Your Car Has Never Been Easier

$
0
0

Samy Kamkar

RollJam

Samy Kamkar is a car buff. The cyber security expert enjoys tinkering, particularly in the intersection of automation and the Internet of Things. "I love the new technology that car companies are introducing," he says, "but I worry whether the manufacturers are actually paying attention to the security of these connected vehicles."

That's why, last week, he unveiled a recent four-wheel hack of a friend's Chevy Volt, cracking the OnStar, which is owned by General Motors, through a device he built called OwnStar. And tomorrow, the 'white hat hacker' will unveil his latest creation, a startlingly simple device that toys with what had been considered a full-proof security system.

Today's car thieves are armed with more than a crowbar or a slim jim. Cars are now being sold based less on their horsepower or sleek exterior and more on how quickly their WiFi works. Buick's redesign includes a hotspot, while other vehicles are stocked with Bluetooth, OnStar, and various functions that help a consumer stay in touch while on the road.

In the past, a car thief needed to have access to a car's on-board diagnostics port and would technically have to be inside the car. Now, though, as soon as users connect to the Internet, which happens sometimes before the seatbelt is fastened, a thief can take control.

In late July, security researchers Charlie Miller and Chris Valasek were able to completely commandeer a Jeep Cherokee through a chip within the car's UConnect system (which provides both wireless and cellular connectivity). And the number of technologically enhanced vehicles is only growing: experts at the Intelligent Transportation Systems World Congress in Detroit last fall estimate that within the next five years, more than three-quarter of the nation's cars will be in some way connected to the Internet.

"This is not a red herring," says Kamkar. With OwnStar, he used just a Raspberry Pi and three radios (one to provide an Internet connection, the other two were wireless) to intercept communications between an owner's mobile device and the OnStar servers, creating a loophole to access what had been private, encrypted data, such as billing information and email addresses.

"OwnStar potentially gives me anyone's critical authorization details," he says. "I could even go to a crowded area, plant the device, and when someone within wireless distance opens their OnStar app, I have access and can track their car."

When Kamkar alerted GM to the security flaw, he says the manufacturer was responsive, but didn't solve all the issues on the first go-around. A key vulnerability -- intercepting encrypted connections where the certificate wasn't handled properly -- was still a glitch for roughly 48 hours after Kamkar's notification. (The company eventually resolved the issue.) "This is likely a much greater problem," he continues. "Car thieves are already becoming more advanced, and Charlie Miller's attack, which modified how a car drove, could put people in real danger."

During this week's Def Con hacking convention in Las Vegas, Kamkar plans to display his latest car hacking device that essentially turns a key fob into a micro-controller with several radios that he has named RollJam. When a car owner presses on his fob to lock or unlock a car door, a signal, known as a rolling code, will transmit to the car. No codes are ever repeated, and once the alternating signal -- like, locking an unlocked door -- has been released, all previous codes are invalidated, which is intended to be a fool-proof safeguard.

RollJam, though, hacks the process: hidden near a car or in a garage, RollJam 'jams' a signal with a radio, blasting noise on a common frequency used by automobiles, while another radio captures the rolling code. A user will press the fob again, thinking the device hasn't performed the intended function, and RollJam simultaneously captures the second code while releasing the first one -- the car is now locked, but RollJam has the second code needed to unlock the vehicle.

According to Kamkar, whose device can potentially work on an estimated million or so cars, "I can replay the first signal, and then I have the secondary signal to use later on."Wired reached out to several manufacturers with questions about the vulnerability, and only Chrysler responded, claiming its newer lines have patches capable of dealing with a possible RollJam hack.

Kamkar is quick to note he's not going to embark on a Fast and the Furious-type spree of hacking, hijacking, and hoarding vehicles for his own gains. "I don't think security teams do enough internal research into these cars and how they fit within the Internet of Things," he says. Manufacturers are oriented to build new products quickly and reach consumers that crucial 21st century security protocols are being overlooked, he says. "Manufacturers won't solve an issue until someone demonstrates it."

Did Russia Just Hack The Pentagon?

$
0
0
The Pentagon

The Pentagon

David B. Gleason, via Wikimedia Commons CC BY-SA 2.0

Someone at the Pentagon must have clicked a bad link. According to reporting by the Daily Beast and NBC, Russia launched an attack on the unclassified email network used by America’s Joint Chiefs of Staff, the body of senior military officials that advises the president and defense secretary on military matters. The attack is believed to have been a type of “spear-phishing,” where emails that looked official launched aggressive programs that collected information from the network and sent it back to the attackers across the internet.

Spotted on Twitter by pseudonymous online cybersecurity researcher @PwnAllTheThings, it looks like the U.S. government’s Computer Emergency Readiness Team (U.S. CERT), a sort of first-responder group to cybersecurity threats, published an alert on the spearphishing attempt August 1st. U.S. CERT says they detected phishing campaigns against the government in June and July. According to the notice:

All three campaigns leveraged website links contained in emails; two sites exploited a recent Adobe Flash vulnerability (CVE-2015-5119) while the third involved the download of a compressed (i.e., ZIP) file containing a malicious executable file. Most of the websites involved are legitimate corporate or organizational sites that were compromised and are hosting malicious content.

To protect the networks against further intrusion, it appears the Defense Department has shut down the Joint Staff network.

Brain-Scanning Software Blocks Your Notifications While You’re Busy

$
0
0

In the time between when you start and finish reading this article, you might check various social media notifications, gaze at your texts, maybe read another few paragraphs of that article on potatoes you meant to read last night. You might think you’re multitasking when you do that, but your brain is actually just switching quickly between tasks, and that means that you’re probably doing all of them pretty poorly. Now computer scientists from Tufts University are developing a system that detects your brain waves and, if your mind is busy, the software can quiet the frenetic beeping of your devices so you can actually concentrate, according to the New Scientist.

The project is called "Phylter" and it uses functional near-infrared spectroscopy (fNIS), a measurement of how the blood flows in the brain. It works by attaching a monitor to the user’s forehead with a band, which shoots beams of light into the brain. The data gathered by this process is parsed with an algorithm, which tailors the device to each specific user. That way the system knows, based on the fNIS activity, if you are hard at work or simply staring into space.

In a study reported by the New Scientist, the researchers connected Phylter to Google Glass and had participants play a video game. Then they were bombarded with notifications; when they decided whether or not to take them, they taught the algorithm what was important enough to ping the players, and what could wait for later.

In the future, the researchers hope to help people weed out distractions in their everyday activities, such as navigation (if a driver seems distracted, Phylter can give him a simpler route). Others foresee that Phylter’s innovative fNIS detection system could be useful for different types of research projects that correlate other types of body measurements with brain activity.

Prehensile Robot Snake Will Sniff Out And Charge Your Tesla Car

$
0
0

Earlier this year, supervillainous Elon Musk warned us that the next model of Tesla electric car charger would come in the form of a blind, probing serpent with an electric proboscis. Now a prototype of the snake charger has been revealed via video, and it's all we dreamed of.

With the new system installed, just pull into your garage and park. The articulated, spine-like charger will waken, waggle, and languorously extend itself toward your Tesla Model S's glowing energy orifice, then slide in and charge up the car's battery.

As the electric snakes inevitably rear up, entwine us in their sinister coils, and take over, at least we humans will never again have to stoop to plug in a cord.

Viewing all 20161 articles
Browse latest View live




Latest Images