BIO HACKING VILLAGE - Our Evolutionary Path... in 45 Minutes

Video in TIB AV-Portal: BIO HACKING VILLAGE - Our Evolutionary Path... in 45 Minutes

Formal Metadata

BIO HACKING VILLAGE - Our Evolutionary Path... in 45 Minutes
OR: Full speed off the edge of the cliff
Title of Series
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Release Date

Content Metadata

Subject Area
Multiplication sign Twitter
Execution unit Password Bit Distance 19 (number) Wave packet Distance Wave packet Element (mathematics) Hacker (term) Right angle Quicksort Hacker (term) Information security Resultant
Mathematics Software Multiplication sign Bit Parameter (computer programming) Evolute Twitter
Slide rule Presentation of a group Software developer State of matter Bit Parameter (computer programming) Mereology Power (physics) Proof theory Logic Integrated development environment Information security Information security Electric current
Point (geometry) Number Software Password Software developer Password Demoscene
Computer virus Computer configuration Computer configuration Decision theory Point (geometry) State observer System programming Number Physical system Power (physics)
NP-hard Point (geometry) Complex (psychology) Tube (container) Group action Wärmestrahlung Diameter Demoscene Entire function Element (mathematics) Category of being Optics Telecommunication Vector graphics System programming Energy level Quicksort Implementation Rhombus
Computer virus Polymorphism (materials science) Building Computer virus Proxy server Cellular automaton Complex (psychology) Core dump Bit ACID Electronic signature Intrusion detection system Personal digital assistant Natural number Revision control Installable File System
Building Game controller Constraint (mathematics) Virtual machine ACID Port scanner Laser Formal language Frequency Mechanism design Robotics Process (computing) Organic computing Atomic nucleus Robot Scale (map) Assembly language Nuclear space Building Interface (computing) ACID Spektrum <Mathematik> Product (business) Wave Word Personal digital assistant Telecommunication Data structure
Slide rule Pulse (signal processing) Greatest element Link (knot theory) Multiplication sign Streaming media Shape (magazine) Spektrum <Mathematik> Software bug Mathematics Profil (magazine) Hacker (term) Natural number Liquid Computer architecture Physical system Turbo-Code Direction (geometry) Chemical equation Code Curvature Friction Software Personal digital assistant Function (mathematics) Einbettung <Mathematik> Right angle
Functional programming Slide rule Boolean algebra Digital electronics Algorithm Code Constraint (mathematics) Combinational logic Spektrum <Mathematik> Sequence Logic Information output Library (computing) Computer architecture Area Operations research Key (cryptography) Assembly language Code Sequence Digital electronics Wave Word Hardware description language Function (mathematics) Infinite conjugacy class property Condition number Hacker (term) Logic gate Diagram
Keyboard shortcut Proxy server Code Computer-generated imagery Workstation <Musikinstrument> Cellular automaton Virtual machine Field (computer science) Neuroinformatik Revision control Inference Frequency Computer worm Proxy server Traffic reporting Multiplication Physical system Workstation <Musikinstrument> Multiplication Moment (mathematics) Line (geometry) Word Urinary bladder Ring (mathematics) Personal digital assistant Key (cryptography) Quicksort Physical system Computer worm
Inference Game controller 1 (number) Physical system Computer architecture
Revision control Slide rule Installation art Infinite conjugacy class property Right angle Existence
Point (geometry) Metre Source code Building Moment (mathematics) Set (mathematics) Bit Mereology Process modeling Data model Inference Frequency Infinite conjugacy class property Computer hardware Connectivity (graph theory) Right angle Quicksort Musical ensemble System identification Physical system Physical system
Module (mathematics) Standard deviation Existence Texture mapping Graph (mathematics) Moment (mathematics) 1 (number) Computer Password Set (mathematics) Sequence Graph coloring Neuroinformatik Wave packet Word Different (Kate Ryan album) Personal digital assistant Logic Password System programming Object (grammar) Identity management Physical system
Point (geometry) Existence Identifiability Multiplication sign Authentication Password Set (mathematics) Electronic signature Neuroinformatik Planning Data model Cross-correlation Read-only memory Term (mathematics) Vector space Uniqueness quantification Endliche Modelltheorie Physical system Computer architecture Module (mathematics) Authentication Block (periodic table) Bit Control flow Existence Zugangsverfahren Message passing Prime ideal Software Logic Password Normal (geometry) Object (grammar) Laptop
Laptop Email Context awareness Dependent and independent variables Euler angles Open set Computer programming Neuroinformatik Element (mathematics) Architecture Energy level Position operator Graphics tablet Standard deviation Dependent and independent variables Chemical equation Moment (mathematics) Stress (mechanics) Mathematical analysis Data mining Word Gaussian elimination Visualization (computer graphics) Quicksort Musical ensemble
Point (geometry) Context awareness Metric system Machine code Hecke operator Multiplication sign Authentication Execution unit 1 (number) Set (mathematics) Mereology Field (computer science) Element (mathematics) Neuroinformatik Wave packet Sequence Bit rate Read-only memory Visualization (computer graphics) Logic output Information security Computer architecture Physical system Predictability Beat (acoustics) Noise (electronics) Chemical equation Uniqueness quantification Moment (mathematics) Mathematical analysis Sound effect Usability CAN bus Word Prediction Universe (mathematics) System programming Quicksort Information security Hacker (term) Metric system Window Reverse engineering
Point (geometry) Group action Film editing Multiplication sign Matrix (mathematics) Computer Airfoil Computer architecture Physical system
Point (geometry) Digitizing Multiplication sign Real number Projective plane Electronic mailing list 1 (number) Line (geometry) Mereology Data transmission Airfoil Twitter Sequence Mathematics Series (mathematics) Impulse response
Process (computing) Multiplication sign Workstation <Musikinstrument> 1 (number) Information security Wave packet Twitter
Slide rule Mathematics Moment (mathematics) Multiplication sign Moment (mathematics) Information security Measurement Metropolitan area network
Peer-to-peer Slide rule Word Bit Office suite Family
Graph (mathematics) Multiplication sign Data storage device Plastikkarte Set (mathematics) Price index Neuroinformatik Electronic signature Word Internetworking Different (Kate Ryan album) Semiconductor memory Video game Pattern language Right angle Quicksort Musical ensemble Computer architecture Row (database)
pleasure induced Chris don't forget a long time done lots of things together enjoyably fun enjoy a chaotic but needs absolutely no introduction to dragging chris roberts appreciate it thank you so i was over and i just got back from sky talks and so how many of this at least one two or three from sky talk so I'll apologize you'll see us up a bunch of these lights that may be similar because I don't know how many people anyway so housekeeping let's see I want to see if
I can tether myself a little bit further black and yellow and fever all right so the stuff that I'm doing here um is research that is literally being done in the basement this is hacking in the basement this is really fundamentally where we've all started off wrong and I'm hacking the brain in the basement which kind of makes like a Frankenstein hacker yeah it's gonna be fun it has been in close proximity to a lot of alcohol so we have got a little bit of drunken brain hacking as well on this whole thing and yes I've also tried posting data back through the brain which has gone mixed results my daughter came down the other day she's actually over in the SUV like this it feels really feels like there's feedback or something molesters me is that just makes alright yeah she came down the other day and I had like the the fourteen unit on and she's like what are you doing and I'm like I'm trying to send doctor into the red she's like pop are you trying to fry your brain I'm like I don't think so alright for those of you don't know me
there we go thank you you rock that's way better for those of you don't know me I'd be messing around in this industry for more years and I care to think off this is I think the 19th year I've done this lunatic asylum known as DEFCON I was here before we got kicked off the damn strip and there were like thunder which is kind of fun yeah he's exactly him too we've broken everything from trains ISS Mars rover all sorts of all things obviously in a hangout Alerus doing a bunch of stuff we're obviously trying to change you industry a lot currently doing a bunch work with humans a lot of work with humans if you look at the security in this there's a whole we keep trying to apply technology as to the solution we keep saying I'll find another Peter blinky light by something else and we keep forgetting that there's a human element to this that we need to deal with and I might have a slightly obsessive whisky collection all right
simple question we have basically spent the last 12 thousand years or so upgrading ourselves and our surroundings we have spent a lot of that time trying to improve ourselves our surroundings our lives and everything else but if you start looking at the last 10 15 20 years worth of change especially in this room so everything from biotechnology nanotechnology consciousness and everything else there's an argument to say that the tech itself is outpacing us so the question is what the hell do we do about it and then if we have to evolve how do we evolve about it it starts taking a look at where we were so
those of you that follow me on Twitter or LinkedIn I might have posted this one and I couldn't help it you know we start taking that what mother nature's done and how that damn it how mother nature's evolution takes a little bit of time and then we start taking away of the humans software
development lifecycle and that's really been the last 12,000 years give or take a bit so this is a slide I like I've
been using there are a couple of presentations this was us this is us and that is going to be us from a technology standpoint it's getting kind of interesting as to where we're going part
of the logic is obviously we're putting more and more technology into our hands you go back 15 20 25 years or something like that we had you know the portable device that we lugged around the size of a suitcase that weighed 50 pounds if we were lucky nowadays that same technology obviously we're happily sitting here with phones with devices with embedded tech there are what 50 60 plus badges being given out at Def Con this year every single one of them is a hell of a lot more powerful move and stuff that we had a while ago the problem is we're handing it to a population that doesn't necessarily fully understand or even necessarily want to understand what the hell to do with it so there's also that argument to say hack will just let technology deal with security that can get a little dystopian so what the hell do we do about it so simple proof I've been going through
these for 20 years and for 20 years we've done nothing more than bitch and scream about passwords we have blamed everybody we started off by playing you users then we blame developers and we blame the CFO then we blame the network team then we got back to blaming developers and we blame Graham while we blame kids we haven't blamed ourselves neither or we actually take them a step back and go
on holy shit this is what we keep losing this is setting the scene this is the why do we care and why do we need to care so we keep losing a lots and lots of data we keep losing almost as much data to keep reducing so at this point
we got a couple of options do we let the system evolve do we keep looking at how the system's evolving do we keep looking at what technology is doing do we keep going to a stage where the actual technology does become central and all those other wonderful things if we do then there's some interest in decisions that we all might know might not have or do we see if we can evolve as effectively as those systems are doing which is where we obviously come to nano and bio and all the other stuff and yes there is option number three which is eventually we find a power cord and kick it out personally I'd rather do some of
this I'd rather look at the evolutionary side of it so again for those of you who
were at Sky Talks you saw this one this is some stuff I'd been working on a couple of years ago and this really sets the scene for what we were talking about how many of you are familiar with the nanotech and the bio nanotech side of the world and really familiar with a couple of folks kind of familiar with it a couple of folks heard the talk earlier on today and familiar with it all right these are amazing little critters I
would highly recommend your in the bio hacking this is bio hacking combined with our world hacking nanotech novel nano carbon architectures basically a carbon-based molecular at a molecule level individual molecules you can feed them into tubes you can make them fly to doses of interesting stuff with them depending upon what you do with them their properties change conductive reactive reacting to elements you can do all sorts of interesting stuff with them and as individuals and if you're getting into the bio hacking side of the world you can do some fairly cheap electronics you don't need an entire hospital full of stuff to mess around with the stuff we've been messing around with a lot of the research that's been done with about a couple hundred dollars worth of either Arduino or we cheat a little bit and use the hack and the blade RS
we have to learn from mother nature we don't know what vaccines are whether we agree with them or disagree with them we know what they are we know how they work basically take a host try to tame it and then put what we want over the top of it and the molecular side of the world we did the same thing in the molecular research we did a couple of years ago and this is I've had this stuff out for a couple years and every now and again I come back to it and I update it and we do a few more things some of the recent stuff we've done isn't out combining this with the consciousness stuff but the basics come down we have to get the carbon nanotubes into the body we have to understand them so we really we infect something in this case we infected bird flu so we looked at ribonuclease it's what we ended up doing
is a little bit of fun we turn them into our uses in our digital world we know how to build viruses we now to build Trojans polymorphs and everything else take a leaf out of mother nature we can do exactly the same thing we can do it
two ways primarily nuclear acid robots the bio tech in the bio nanotech and no others using the body's own chemicals using a certain agents as a defense mechanism as a building mechanism the bacteria based though they're more complicated or the nanoscopic machines the assembler machines this is becoming a lot more prevalent now the costs are coming down drastically what we what used to cost like a several thousand dollars per like microgram he now looking at two or three dollars per microgram or for carbon nanotubes that we can now start messing around with so like anything you have to teach it and train it in this case this is back in
2016 EPA Fell's lab panel like it's you're going to teach them and train them basic language basic understandings in a case of what was going on with the carbon nanotubes here is like okay eventually these are going to go into the body how do we manage them how do we control them how do we have communications with them this is a lot of the work they did to teach them basics a lot of the communications here we're done basically using RF frequency waves or using MRI scans we're using lasers in other words you're inputting the control with an external interface because you can't exactly jack in the u.s. bingo hey give it a second I'm going to read it little too small for that 2017 they
told him how to had a swim by basically applying a nanotubes and then a tail to it I'll make sure these slides are available if that makes it a little easier to just hit me up afterwards I'll make sure the slides are available for those of you that know me or recognize I obviously have a fairly decent LinkedIn profile I actually have a Dropbox I will put these slides up on Dropbox just hit me up the link somehow or other I'll make sure you get it see this is 2016 it's had to tube to it basically hit a laser height or electromagnetic pulse light to it that actually causes the tail to move that friction of the move moves it through a liquid in which case you can now move it through the blood stream what you can also do as well as you know teach your basic chemical can it recognize certain chemicals inside the body answer yes why do we know this because we now fast
forward to 2018 bottom right hand side turbo Tarts bug yeah let's just make it easier this improve mother nature or not as the case may be taking a flat carbon and network basically instead of taking a carbide nanotube you take a flat paint architecture you apply a cylindrical shape to it and then you apply treatment to it and then you just heat it with a pulse which point it just turbocharged as the sperm it's quite fun to watch or not depends on how you look at it this is the one I like I came out of the military I got shot up a few times and we had when we went back in we had basically the chop guys with basically so us back up to make sure that we could get in the back that are giving yell that too badly nowadays what they're doing is they're embedding carbon architectures into some of the stitching system that way the carbon nanotubes and the actual receptors and the antennas are able to detect chemical imbalances chemical changes and more critically heat change in a wound they can monitor for septicemia way easier way simpler and you can see all the other stuff that's getting used on the body as well oxygenation hydration all this other stuff now this is all wonderful and this is done in hospitals facilities but let's face it we're a bunch of damn hackers so what do we do
we hack the damn thing as I said they slide to be available the two things you want to pull away from this very complicated slide ver in log is actually the circuit function language worse you use cello to design the sequencing so again this isn't a matter of just basically Jack Ian and have at it what we actually do picking
your leaf out of xkcd we basically do
the code hacking those of you that are used to coding we take something very similar to a combination of assembler and basic we then turn it into almost and I just can't stand that can i it's gonna get yelled up I'm doing I'll start it can I have a laser pointer I could be like proper Carmichael is civilized I say all right anyway in the middle it's basically taking that code architecture and turn it into a gated sequence in other words electromagnetic for that how many of you are on the engineering side in this world so you should understand some of that stuff it should make sense now when you do to get it in from that area into the body you've got to turn it into a wave sequence because it's got to be understood so that's the far right-hand side so again we have our keys we take
something we're hexadecimal six station ring this has been done in the lab we take the transport s RNA in this case it's bird flu we have a bypass tools we have our basically the reporting tools our payloads and our decoys does this sound like a hack that we would use on computers to anybody how many of you have messed around Polly most viruses Trojans and other sorts of interesting things yeah exactly we build them this is kind of how we build the damn things we do it on the body that's what we end
up doing it to bird flu I said the NRA we applied nanotubes to a multi walled nanotubes so we have the ability to do different things depending upon what inferences ruing fill the body intervening is good it's a vaccine propulsion system tracking system decoy delivers this is fascinating stuff 4/3 medical field itself you start taking the good drugs you start taking a actually targeted drug delivery you start taking look at what they're doing with cancer research take a look what they're doing with Alzheimer's stone breakdown the whole lot the challenges at the moment on a lot of this stuff these are still dealing with single machines what they're now working on is making those machines more complicated in other words the machine has the ability to either combine an inference frequency in which case it can break down a bladder stone but it still needs to communicate that which still means you need an antenna based system of propulsion system and everything else think of this as an early version of a car it had wheels and an engine that was kind of about it nowadays we have 150 computers in the stupid thing and 150 million lines of freaking code these are getting more complicated and more complex as we go on
we on the other hand can hack the stupid things with about 100 worth of gear we don't need an entire medical facility to do this we actually cheated we end up using not just the Arduino so we end up using the hack RS and the blade RS for these things this is where it's going no
commander control purely commander you've got to find a host or a system we are producing them I wouldn't even go down there I just buy the stupid things it's ways your way simpler and if you want to do anything on the body inference you start looking the ones that are carbon-based using gold is the base underlying molecular architecture because gold is useful inside the body whereas silver and some of the other ones can't be absorbed just as easily yeah there's some really interesting nuances should we save one our way of looking at it so anyway yeah it's coming to us yeah GMO on steroids it's not gonna be pretty which is kind of where
we have this one right so that's some background that was all the fun stuff I have been doing this is the stuff I'm
currently working on that's actually not too dissimilar from how I look in the basement sometimes yes we're gonna hack
the brain again for those who have you seen the slides I apologize this is not
how we can hack the brain you can put a USB Drive in but it really doesn't go much further than that
that's a one-time-use hack on the brain Hey but not good and this is your Musk's
or anybody else's you like your complete twonk but it is this is a better version
so this isn't something that you can just do in the lab you can grant and buy these systems the one that's on the
bottom left is one system that I have it's a fourteen point system you can pull out from all sorts of signals on the brain the one on the top right hand side there
is actually just a two-port system the one I use and I'm using at the moment is another pair of glasses my old set of glasses very similar to this that I've taken some of the EEG monitors out of a couple of these I've gone to the companies and I've gone hey what is the best quality monitor you have a dry monitor because I don't want to sit there with dunk on my face neither they want to drill them to put them in you can go buy these damn things anywhere from like a hundred bucks or if you actually buy the actual dry electrodes and solder them up yourselves if you don't add a solo go to the freaking hardware hacking village they will teach you it is lots of fun actually what I want to see next year is somebody come with a deaf combat with an EEG meter on it do it alright so you can get it with two EEG monitors just behind the ears it's effective it'll pull signals out but it's not effective enough to do some of the stuff we'll be talking about currently what I'm using is a set of four so I have two sitting on here on either side on this part and two sitting in the back here there is a bunch of research that's being put out of the moment that actually will do an inference behind and in front of it in front and also combining with the jaw I've looked at it I'm kind of liking it it still makes you look like a bit of a womble but it's getting better this is
the end goal this is mapping that's actually my brain got a year or two ago now looking at a couple of sequences I haven't put updated ones on there for a bunch of reasons one of them being because I'm actually trying to protect some of this stuff and the right-hand side those are three different sets of graphs obviously we have to train we have to baseline with scientists at the end of the day so we have to get an understanding each one of those different colors on there represents me walking up to three different objects one of them is my computer one of them is my phone one of them is a module for the car what I'm doing is I'm training the system I'm helping it to understand Who I am what I am and why I'm actually focusing on something in this case with the computer what I'm trying to do is walk up and recognize the computer have my brain recognize it in turn I also have the computer reading the signals that are coming from me and it has a baseline understanding of who I am in other words we basically and simply become our identity we don't have
to worry about passwords anymore the 20 ideas we've been bitching and screaming about them why don't we just get rid of the stupid things why can't our very simple existence become the identity that we need for logic here is simple this twofold one the object I'm looking at has that we have to recognize it it has to recognize us secondly it has to have an underlying understanding as to who or what we are and it's the right individual the way I have it at the moment is this I've tested in the lab
I've tested in the basement basically at a house which is really my lab as I walk down the stairs if I'm thinking of the computer and not tripping over my feet not blinking and not thinking of squirrels all the damn time my computer will open because it's recognizing that I'm thinking about it it's recognizing that the object I can discern is the computer that the computer recognizes that it's me thinking about the computer because it has a correlating set of software on it as well which point in time I don't need to worry about sodding passwords I have the same thing running on an Android phone my normal work phone is an actual iPhone but the phone I do all my testing on because obviously the architecture is a hell of a lot more open is the Android system and the car module works about 60 percent of the time and I've managed to start the car in the garage a few terms and almost put it in fracking gear not a good thing to do when the garage doors closed so the logic here is simple let's
get a little bit more detail on this one our thoughts our general concepts need to be we're at the stage it's well documented that the brain can be used to identify thoughts feelings ideas we can pull message blocks and we will comport concepts out of Luke and pull objects out of it but what we're now looking you're doing is defining that a lot further take us as the authentication model take us as basically our existence and everything else this is where we are
the last six months which is why I haven't put this up and it's nowhere else so obviously situational awareness becomes paramount running down the stairs going I'll put the damn computer and the QB is gonna go through that fricking hell are you I came out of Skype dog's-eared bf bombs all over the place I'm probably more civilized F who the bloody hell are you there has to be a level of situational awareness hence the drunk programming as well there has to be an awareness of stress levels and all these other things this is where there's a very fine balance between how many signals you pull out of the brain and how much you apply any filtering to them any noise reduction to them any analysis to them any mean standard deviation to them all of these other things at the moment I'm running at about a 90 to 95 percentile so the computer has to recognize recognize me in a very very narrow band not just that I'm thinking about it in other words what I don't want to do is walk down the stairs and every piece of equipment goes hi Chris how's it going I think that's not gonna work it's not gonna be pretty what I have to do is walk down the stairs and go you know either I'm thinking of my laptop I don't have to think about the word I just have to visualise the laptop that visualization is pulled in and because I'm pulling from for the main Cortex's and I'm amplifying and looking at the specific signals what I'm trying to do is not just pulling the fact I'm thinking of my laptop but I'm pulling historic data I'm pulling situational data and awareness of that laptop out so I'm basically putting myself in a position that it's mine now can somebody else walk down and do that yes but there isn't the underlying signal that is me doing it and that's where those two pieces have to come together which is where the computer looks at what it's getting in response from my signal from the EEG and then basically from the Bluetooth or a fad whichever one I'm using a goes oh it is him it's the six-foot three hairy thing coming down wants his bloody computer open it's kind of like Jarvis with a Scottish attitude basically so there's all sorts of stuff that I'm working on stresses allowances and a bunch of other stuff I'm trying to work on the humans as one-time-use pads and obviously capturing what makes us us what is this is it the consciousness thing is it a humanizing thing is it signal detection in other words on this one it's removing the squirrel element
because some of us in this industry let's face it can be a little squirrely so here's what I'm kind of messing
around with at the moment better metrics so trying to get that balance between how many data points I have to pull out from versus how many I need to get a decent signal what I'm relying on on the moment of two things one the paramedic signals that are coming out how closely can I get and pull those signals out how much noises around them and how much can I actually eliminate that noise the more the computer understands this need the more it realizes as I walk down I look at the window as I walk down I trip over my feet I'm thinking about the whiskey lap I'm thinking about other things all of those elements can be pulled out as noise so then it's focusing just on it the computer occasionally becomes a selfish signal the other thing I'm trying to figure out is how much other work I can do on this in other words basically you know anything else come up to the ATM go up to your car any of these other things anything that requires us to authenticate that we are who the hell we think we are and say we are why can't we use something similar to this if you take the concept here and you start taking a look at nanotech and bio nanotech specifically the antennas that are being built the biggest challenge we have is pulling signals out from the brain in a way that they are much more readable and usable at the moment I've got the glasses that make me look a little kind of dorky with the other ones that I have but not too much there's a couple of bloody wires running down the same of there's a little signal holding off the back of this one but that's about it if I can have something where I can basically pull carbon architecture in other words I can actually have antennas inside that are accentuating those signals then I don't have to look like quite such a womble so that's something that we're working on alright obviously security well it's me let's face it I've hacked the damn thing I'm trying to unhak it on trying to reverse engineer at some points on what I do want to try to figure out is how breakable are we as humans in other words can I be replicated can I be replayed everything I've tried so far the answer is no as a human every single time we walk up to something it is a unique set of situations we're basically walking one-time-use paths no matter what we're doing so how much of that can we use versus how much about that we have to ignore there's all sorts of interesting stuff on that one and as it says you know I go to try and patent this will do something with the damn thing at some point so we're pulling stuff out of the brain the next obvious question huh can we put something back
in that's what I'm working on what I have at the moment on the computer stand back it I can't do it coming damn it stand here what I have at the moment one of my other systems is reading what I'm doing in other words as I'm sitting at the computer as I'm looking at the computer as I'm walking towards the computer as I'm basically interacting with it with the headset on or with the glasses are typically when I'm doing this I've got a commercially available 14 unit on that I'm actually messing around with what I'm actually doing is taking like a machine language and the predictive side in other words how can the signals that are being pulled out the situational awareness of the system knowing it emerged with the machine language and go I know what he's gonna do next I know what he's getting depressed I know what systems getting depressed I know that he's getting he wants a damn cup of tea for crying out loud or whatever the hell it is that's what I'm working on at the moment at the moment I'm getting about a 75% hit rate on effectiveness so I'm training the computer to basically rail it to basically think as me we test some really fun consequences and some really scary ones again this is being done in the basement for this you know part of the reason we stand up here doing these talks isn't segoe hey this is the shit I'm doing this is like hey go play with this to go research it do analysis on it go pick all the paperwork's up from the various different universities from darker and everybody else that's working on this stuff and see what else is going on the biggest challenge on any of this is again what we can pull out from usable signals so again if you combine what's going on with consciousness and with what we're doing with this and you combine this with what's coming out of the healthcare field with the carbon architectures and signal assist it gets really interesting now for those of you that are old farts here and we're here at DEFCON in the early days I had to put this one up how
many of you remember the matrix yeah we were creeping around DEFCON 10 and DEFCON 11 over to like this place and we went through the matrix time when everybody turned up with a pair of frickin neo glasses and the damn overalls on I kid you not how many of you were here I know you were not many cut you guys are young buggers all right yeah all right don't do it it was bad but it brings into that question of what can we write back in can we write any kind of situational stuff back in at which point can we get to a point where the computer system itself is affecting our actions our reactions and our perceptions of reality answers are I don't know but I think it's going to be a yes so which point
time are we at in for a hat time I can currently pull signals from about an inch or two away from the scalp with a system that I have so don't actually have to have something I've an inch or two from the scalp I can pull signals out off we can detect signals six to eight inches from the scalp doesn't mean we can do much with them but we can detect them but again if you merge this in the architecture I'm probably not going to be too far from the tinfoil hat especially if we start letting the government play with them which is what
we have this picture which one I get a drink all right
the future this is what I'm working on I think one of my tag lines on LinkedIn or some thought Twitter I think it is is you know at some point time in the next 10 to 15 years I would love to build a retire an ice ax 400 in New Zealand that's what I'm working on if you think about the implications of what we're working on a listen just me in the basement this is a bunch of research projects it's a bunch of DARPA projects as a bunch of other stuff can we actually take much more advantage of what is nothing more than a bunch of basically lists or magnetic signals going on and if we can take advantage what are we doing oh by the way I keep pointing up here for those of you that know the brain it sure as hell isn't just the brain all of this other stuff that's in the rest of the body has a huge influence on what goes on not just up here but even the stuff that doesn't bother oh these things have completely independent thoughts almost let's be perfectly honest so that's part of it you start taking a look at where we can take this for the future if I can actually get to the stage where I can digitize what I am doing the consciousness guess what it's ones and zeros from a transmission standpoint that makes life real easy to be able to move consciousness around societal changes we start taking a look at who's going digital who does and why is the where falls all this other stuff so then the question becomes one how far
should we take this simple answer we're
already on the journey the train has left at the station the question is what are you gonna do are you going to get involved are you going to pick up do some research this is Def Con we kind of bucked the trend our job is to be the voice of reason a lot of times our job in to be the ones that stand up and go you might want to consider security in this shit because there's a guy on the corner with an antenna that's about the hack half the humans that's our job do it be those voices so wrap up I like this quote I've
gotten most of my slides now the measure of man is not where he stands in moments of comfort but where he stands at times of challenge and controversy we are there we are there because we have this technology tsunami that's hitting us we are there because we're basically bouldering into this whole idea of consciousness and nanotech without considering societal or security changes we're doing a lot of it without involving us therefore get involved biohacking village basically start
building some of this stuff because Colin see this should be our future if we do it right there is so much good that can come out of this but like anything in tech we fail and we screw it
up this is how and what we are facing it's going to be a little bit messy simple this is my last slide almost and
I like this one we need to work together there's 20 28 29 thousand of us here at Vegas this year that's a lot of voices collaborate work with everybody communicate peers friends families the whole office and just spreading the word this is just how can I get involved sound good okay
I'm looks like as always tribute to Douglas Adams so longer thanks for the fish all right questions everybody sat through this is fairly dry when you go through all right so the question is does it filter out emotions yes so in other words have I got the filtering in for that I actually do have some of that yeah it's actually really interesting again the cool thing about guns I would if you're interested in any of this literally go spend your money go borrow somebody else's money I'd say go grab a credit card on the internet but we're being recorded so this isn't sky talks don't steal anybody else's credit card but seriously go and do some research on this one it's actually fascinating yes as you walk up to the computer you're happy angry sad all those emotions peak and spike all the different stuff that graph that I had up there yeah there's all sorts of weird shit there's stuff in there with me with a couple of drinks inside me all you ever some fun stuff so yes it does change it because it's pulling in other signals so even though I got the full running what it's doing is there's also pulling in my history with the computer so if I'm thinking about my history of the computer and I'm not just thinking about walking up to the computer one of the key indicators that I had was actually I started to replay the memory of when I actually walked into the damn Apple store to buy it and I captured that signal architecture it's a pain in the ass to try to do it and you did the timings up the problem is you're recording yourself while you're recording yourself while you it's it's kind of fun but yes you can actually signal that out and go that is my reaction to actually the acquisition that computer and I can normalize that but you can also pull into other things as well there's this bunch of other ways of normalizing stuff yeah it's kind of fun questions what do we got like one more I got one more question yeah yes [Music] different say yeah oh no it's an entirely different set of disputes an entirely different set of patterns that's getting pulled in yeah I've had her come down off with the headset on and hers are completely different from mine so it's really nice to look at the different humans I've had a couple of other friends come over different walks of life different all sorts of other things and yeah their signatures are just so complete I mean it's like off the fucking charts different it's actually fascinating so but there's also some underlying stuff that you can normalize so some of the thoughts on the computer are almost normalized but the problem is the relationships have been with the computer and everything around them is some completely different it's kind of fun all right I need to shut up and get out here thank you very very much a very much [Applause]