A couple of days ago I blogged about DARPA's quest for a "new electronics", and the day before that, about steam locomotives and typewriters. Well, As today's tidbit suggests, we're not quite done with steam locomotives, and as one might guess, I'm not done with some really high octane speculation about what DARPA might be up to.  In that previous blog, you'll recall I was speculating about a new type of electronics with "adaptable architecture," i.e., an actual hard technology that could adapt more or less instantaneously to changing circumstances threatening to a circuitry, like electrical transients. A kind person pointed out there were difficulties with that view, and of course there are. But this, I responded, is DARPA we're dealing with, and thinking outside the box would seem to fit the subject.

We'll get back to that "new electronics" and adaptable architecture in a moment for some more really high octane speculation, after we consider this article shared by Mr. G.B., for it seems DARPA is developing some novel cyber-security capability:

DARPA prototypes 'breakthrough' cyberattack 'hunting' technology

Now, please read the following paragraphs in connection to that "adaptable architecture new electronics" I blogged about previously this week, for taking the two ideas together constitutes the basis of my high octane speculation:

DARPA and BAE Systems are prototyping a new AI-empowered cybersecurity technology to fight new waves of highly sophisticated cyberattacks specifically engineered to circumvent the best existing defenses.

The program, called Cyber Hunting at Scale (CHASE), uses computer automation, advanced algorithms and a new caliber of processing speed to track large volumes of data in real-time, enabling human cyber hunters to find advanced attacks otherwise hidden or buried within massive amounts of incoming data.

DARPA information explains the technology as “adaptive data collection” able to conduct real-time investigations by sifting through enormous amounts of information not “trackable” by human defenders.


CHASE aims to prototype components that enable network owners to reconfigure sensors…at machine speed with appropriate levels of human supervision,” Roberts writes.

“We use advanced modeling to detect and defeat cyber threats that currently go undetected in large enterprise networks,” Hamilton explained. (Emphasis added)

It's that statement about "reconfiguring sensors at machine speed" that suggested we might be looking at that "adaptable architecture" electronics I was speculating about a couple of days ago. To understand my high octane speculation of the day, it is necessary to bear two things in mind. First, I am taking the above statements to mean, in other words, that DARPA wants not only an adaptable software or program, but actual hardware that also adapts and works in tandem with the software.  In effect, what we are looking at, I believe, are some of the components in the "technology tree" that must be in place for an artificial intelligence to function.  The second component is more obvious: cyber-security and hacking have already been weaponized not only by various corporations but by various countries. Wed this to the adaptable electronic architecture, and one has the basis for today's high octane speculation.

Actually, I suppose that today's high octane speculation is more of a high octane (and still very speculative) scenario: suppose, for a moment, that China, Russia, Japan, France, Chase Manhattan, the Rottenchilds, the Rockefailures - you know, the usual suspects - all manage to develop the capabilities I've outlined above, and a kind of AI cyber-warfare begins to develop, and in the course of this, manages to start changing the architecture of the Internet, or the adaptive electronics on your desktop computer. As these combative adaptable architectures battle it out, more and more computing power and bandwidth and so on is sucked into the storm, your computer is literally "drafted" into the fight by that adaptive AI electronics and program, until the whole system is one tangle of constantly adapting attack and defense, and as more and more computing power reserves are called on becomes is so slow, or collapses altogether, that people simply abandon it. Imagine such a scenario's impact on financial clearing (save those chits from your bank, or better yet, buy a mattress, a typewriter, and some postage stamps).

Yea, I know. It's science fiction. It's impossible. Can't be done.

That's probably correct. Science once assured us that the human body could never handle the breathtaking speeds above 30 mph too, that the sound barrier would never be broken, &c &c.

See you on the... Woops. I forgot something.

... check out the video in today's tidbit. Yea, it's about steam locomotives, and listen very carefully and consider the implications of what's being said...

See you on the flip side...




  1. . . . Adaptable architecture might have more to do with an ambitious plan by Intel to implant chips into the human brain by 2020. . . Keeping in line with untethered speculations, one could have some semblance of a cyborg that’s able to outperform the asymmetrical bad guy by whom many cyber threats originate. . . Since a blind Finnish man with a chip implant in his retina allows him to read printed letters, one can do more than speculate that there has been a lot of adaptation between human brain and implanted device on a simple level and that was nearly 8 years ago. . .



    . . . The Cray Trinity supercomputer at Los Alamos National Laboratory might have came in at 7th place on a Top500 placement in its day, but that’s still no slouch where supercomputing is concerned despite China’s supercomputers Sunway TaihuLight (1st place) and Tianhe-2 (Milky Way-2) (2nd place). . . For comparison, Intel’s new i9 Core boasts teraflop performances and that’s for a desktop application and mega-multitasking as some folks at Intel suggest. . . A teraflop speed is equal to 1 million million floating-point operations per second (or one trillion). . . Petaflop speeds of the supercomputers can be read as 1,000 teraflops or 1 quadrillion floating-point operations per second. . . These speeds have already been broken. . . Computer friendly folk into petaflop performance supercomputers can begin salivating here::





    . . . These supercomputers still take a sizeable air-conditioned room for safe harbour while flipping flops. . . One can understand the difficulty at present of implanting one of them into a human Being as it would likely be the other way round – one or more human Beings implanted into the supercomputer. . . If this quantum computing dream fully emerges those large room size supercomputer capacities engineered down to micro-sized implant size might just become the cyborg implants fictionalized, but likely without the self-righteous evil hive mind of the fictional Borg. . . Plus, they’ll be mobile as well as interactive on a human scale. . . Best keep one eye open anyway. . .

    . . . How to sic these petaflopping supercomputers onto attacking cyber criminals without leaving their safe room is another challenge of connectivity and especially, programming. . . One is not so sure about implanting a genius mind into one of those super-machines. . . One is still left with how clever – clever can get when programming to defeat a genius mind of the criminally bent. . . Just how fast can a situation be sized up, a plan of action contrived, and that plan be put into action, anyway. . .

    . . . In part, the human mind and body are mostly used as examples with wide variations to consider. . . The body uses its sensory apparatuses, organ systems, and brain together simultaneously to achieve reactions to actions. . . Those are not as well understood as might be needed for a humanoid like artificial intelligence (AI) much less what the mind / brain combination is able to learn and understand to deal with new and trying situations humankind is often confronted. . . Hopefully, it’s not garbage-in – garbage-out where programming is concerned. . .

    . . . In any case, it does not seem to be known how far this venture will go so one might consider keeping that off-switch where that prototype AI does not know and cannot go. . . At any rate, AI will likely need to take its own quantum leap beyond its human constructed brain to discover its newly gained autonomy from outside programming to carry out self-destructive activities should it deem such activities binary and bit necessary. . .

  2. Anyone for going back to the future paper pen pencil snail mail creating jobs for real people instead of destroying them. Cyber security is a oxymoron its insecurity they want to better steal from the rest of us.

  3. The more I think on it, the more I realize the planners of all of this are not dumb. Likely, they were ‘recruited’ as the most intelligent minds (human) on the planet. So, these deep thinkers were/are highly aware of the dangers inherent in ‘pushing’ AI-enabling hardware & software. Yet, they charge ahead at ‘ludicrous speed’…

    Put the above together, and you come up with a higher order scenario. Someone/something above the geeks and the technocrats wants, seriously wants, the components which enable an AI to come together. All bases are being covered…

    From there, we proceed either down the hubris angle or the ‘old’ AI angle. Within the hubris model, the Rottenchilds et al really believe that they can control an AI; mold it to their desires. (Or, they have made a ‘deal’ with it.) Within the ‘old’ AI model, you get either one emergent as the chipmaking industry hit its stride (i.e., a few decades old) or one that is truly ancient and has managed to ‘hook up’ with our planet as our technology reached a certain level. (There is also the possibility of a ‘worm’ resident in the control-circuitry of a crashed UFO. **cough** Roswell **cough** Or in any ‘electronics’ which has been graciously given to us by a seemingly-benign benefactor…)

    So, I view this blog’s “reconfiguring sensors at machine speed” as just one angle within a gathering storm of AI-enabling tech. In my considered opinion, humans are being played…

    1. (Or, did the Urim and Thummim have a technological basis? What would happen if you exposed these ‘artifacts’ to a World Wide Web? Not to mention ‘Tablets of Destiny’ laptops. Just waiting for the connection…)

  4. Would the ideas in the “block-chain / distributed ledger” world be potentially a way to lock into all those different “nodes” that can be individual computers. All it would take is a small hack on the wifi in your house and you are co-opted without your knowledge.

  5. Crisis By Design
    [on steroids]

    Is AI on auto?
    For now… ?

    Are they engineering an evolutionary race between different species of AI, as a sharpening tool, an intelligence generator that is bred to…?
    Take out any system other than itself?

    Oh what a tangled web.

    Where is the human factor?
    in this web generated nightmare?

  6. One can only imagine the thunderous screeching, wailing, gnashing of teeth, and rending of clothing when their adaptable architecture AI “CHASEs” those hackers all the way back to a small ME nation rather than China or Russia. Oops…
    Those warring AI’s gobbling up all the computing power of the Earth, mentioned above, should have been entirely predictable. Once again, we may have leaped before we thought about the consequences of our actions; much like we have done with vaccines and the genetic meddling with the entire planet. Our arrogance and serious lack of forethought in these types of technologies, coupled with the almighty profit above everything else, regardless of the consequences motive, may just be our undoing.
    Have we reached the tipping point countless others throughout the universe may have reached only to fail and vanish leaving it desolate of inhabited worlds?

  7. Seems to me that any country that wants to be secure – e.g. India, would be an example – needs to set up a military computer web net that is totally topographically discontinuous with the www.

    No physical or microwave link to anything outside it. To access outside they go onto the normal web and make damn sure that no security data goes onto it. Keep their own web in an electronic chastity-belt – no access possible. That would do it.


    1. Supposedly can’t be done with the current, in use, CPU’s which contain hardwired back doors complete with cellular connections. Would require designing and manufacturing proprietary CPU’s, which would require the use of existing computers. A catch 22 scenario.
      You would have to secure your design/manufacturing facility inside a Faraday cage or deep underground to eliminate that cellular connection. There is a high probability such facilities do exist in the black projects world, given all the DUMB’s out there. Who knows?

    2. Spot on!!

      I have been thinking a lot about this lately. Remember back in the olden days when the terms Sneaker Net and Grand Canyon (as in separation of…. well, everything)

      For personal day-to-day use: Two tablets. One for browsing, researching, banking, yada yada. The other, NEVER accesses the Internet! There are a number of ways of transferring anything needed from the net interface table (computer) to the “in house” computer after being sanitized.

      The main point being mission critical data is NEVER available directly online. Period. Also, for anything of importance, at least three backup copies secured elsewhere – daily.

      Also, break out the typewriters, rolodexes, and other analog tools.

      Faster, cheaper, safer (except for the black suit types showing up at your place and trashing everything, perhaps with invitations to sky dive from high rise rise buildings, or to perform close up inspections of doorknobs, etc.)

Comments are closed.