Direct Link: https://www.captechu.edu/blog/what-privacy
www.CapTechU.edu
Jason M. Pittman, Sc.D.
Dr. Jason M. Pittman is a scholar, professor, and cybersecurity
thought leader. He currently is on the full-time faculty at Capitol
Technology University. The following is part of an ongoing series on
privacy.
I think privacy must end.
I think privacy must end if we, as a species, are going to survive in
the developing Virtual Age. To illustrate why I think so, I first
outlined why privacy is in demand right now. Specifically, I indicated
that privacy creates a perceived (but false) information parity, treats information as a currency, and implies information permanency. Knowing that privacy is in demand is to know only half of the conversation, however.
The other half of the conversation is to know what constitutes
privacy. To be sure, there are numerous definitions of privacy. Stated
another way, there is no universal meaning for privacy. More
importantly, there is no universal understanding of what is privacy.
While the legal profession has much to say in this regard, I am not at
all interested in legal debate. I am also not interested in defining
privacy in a general manner.
Instead of simply defining privacy, I want to consider the question of what privacy entails.
That is, what information can we determine to be private? I think this
is straightforward if we only consider information that we possess.
However, when we consider information in a broad context or information
that someone else possesses, the question becomes somewhat more
difficult.
Modern society operates according to a narrative whereby privacy is
something that is under constant assault. Privacy is something breached,
compromised or undermined. Privacy is something you had as
opposed to have or will have. These notions imply that privacy is a
state and, moreover, a static state. I do not think the truth could be
further from the implication.
I submit that privacy is a graduated or interval construct. Graduated
and interval refer to the ability for privacy to incrementally increase
or decrease (think about the delimiter marks on a ruler or
thermometer). Moreover, I would argue that privacy is a continuum at
both the individual and collective levels. That is, personal privacy can
increase or decrease dynamically relative to various forms of
information. Further, an individual’s privacy construct can differ from
the collective. Meanwhile, the individual’s expectations and tolerance
of privacy across the cultural collective is likewise volatile.
We must also consider whether privacy can be envisioned as one
construct in a given scenario and, later, a different construct in a
differing scenario (or, perhaps even the same scenario replayed)? My
point is that proclaiming privacy to be one construct is limiting and
possibly dangerous as conceptualizing privacy as a single, static state.
Indeed, privacy could be multiple constructs simultaneously. I highly
suspect that this is closer to reality. I’m also left wondering how
privacy, if it is such a valuable facet of human consciousness, can be
so simultaneously versatile and universal at multiple levels of
resolution.
I believe the answer exists in understanding privacy as five
different information constructs: non-intrusion, seclusion, limitation,
and control, and knowing. Thus, I want to spend some time developing a
strong understanding of what privacy is as a prerequisite to our later
questions. Please, join me as I continue to explore what is privacy.
Monday, June 25, 2018
Carbon means "Life, Maybe?" - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/carbon-means-life-maybe
www.CapTechU.edu
Photo: A self-portrait of NASA's Curiosity Mars rover. Credit: NASA/JPL-Caltech/MSSS
NASA recently announced the discovery of organic molecules – complex carbon particles – on Mars. Three years ago, Capitol students flew a high altitude balloon payload that found complex carbon particles in our upper atmosphere. We know Earth has life, but what if it didn't? If the Capitol balloon-borne TRAPSat experiment had been flown by remote aliens, could they have figured out if life existed on Earth?
The answer involves a little chemistry detective work.
The universe is full of carbon, hydrogen, nitrogen, oxygen – the elements of life. A chemist will tell you "organic molecules" just means “has carbon,” but in astrobiology it usually means something more significant. Either it's a find of methane (CH4) – a byproduct of life – or of complex carbon molecules that can lead to life, like amino acids. We've found amino acids in space dust, on comets, on asteroids. They arise naturally, but with the right combinations and added complexity, in theory you can eventually get all the way to DNA.
As a post on genomenewsnetwork.org explains, “both DNA and proteins are long molecules made from strings of shorter building blocks. While DNA is made of nucleotides, proteins are made of amino acids, a group of 20 different chemicals with names like alanine, arginine, and serine."
It's not a given that the presence of amino acids means 'life', but it's a good start. The 1950s Miller-Urey experiment showed that, given raw elements and lightning, naturally found elements can form into amino acids. Details can be found at Windows2Universe.org
This suggests the basic “Lego bricks” of life can form in a variety of environments.
The presence of organic molecules doesn't in itself mean life, but it means life is possible. If you can't find organic molecules, there isn't life, so stop looking. However, if you do find organic molecules, then you have one of three situations. Either there is life (yay!), there once was life but it's gone and we just find its remains (boo!), or there's a possibility that life could arise (yay?). The discovery of organics on Mars puts us into all three possibilities, because there are a lot of organic materials found in the crust, and planet modeling suggests Mars may have once had enough water to support life.
This is where detective-style reasoning – and a little faith – come into the picture. Some argue that having the basic blocks that can lead to life isn't enough, that life forming is a one in a billion chance. In that case, it may be unlikely life formed on other planets or moons in our solar system. Others, though, favor the principle that “life finds a way” (we could call this the Jurassic Park approach). They point out that life is ridiculously tenacious and exists even on Earth in environments where it shouldn't – near volcanoes, in frozen areas, near deep sea steam vents.
I like to call these the “recipe” vs the “ingredients” stances – do you need a fancy kitchen and recipes to make food (“life arises rarely”), or can you create a decent meal given enough ingredients even without a lot of structure (“life is tenacious”)?
Finding organics on Mars isn't evidence of life on Mars, but it tilts us more favorably towards the prospect that life did or may still exist on Mars, and thus makes it worth searching deeper. It would be the same for the what-if I proposed: if aliens did a TRAPSat-like experiment on Earth and found organics, could they prove life existed from that experiment? No, but it would support the possibility of life, and give justification to looking deeper. While no evidence can mean either “dig deeper” or “move to a new target,” once you have evidence, there's still work to do. When NASA or Capitol or any experiment finds evidence, like a good detective that means it's time to dig deeper.
Best of all, the way to dig deeper is to come up with better experiments using better equipment. When science people say “we need new data,” to me this means they need new engineers to make new systems to get new data. And that’s where Capitol comes in. Whether it’s data forensics, as taught in our cyber program, or the sensor tech used in our EE/AE programs, our students are gaining the tools and skill sets they need to advance knowledge.
Science is a motivator for technological improvement, and the results of new developments in science and engineering end up spilling over to general American life (see: weather forecasts, microtechnology – oh, and the internet). So really, the more we look for life, the more we improve life on Earth. So yay for Mars, and yay for Earth, we know one of you has life and looking for life on the other is going to be awesome!
By Sandy Antunes
Professor, Astronautical Engineering
www.CapTechU.edu
Photo: A self-portrait of NASA's Curiosity Mars rover. Credit: NASA/JPL-Caltech/MSSS
NASA recently announced the discovery of organic molecules – complex carbon particles – on Mars. Three years ago, Capitol students flew a high altitude balloon payload that found complex carbon particles in our upper atmosphere. We know Earth has life, but what if it didn't? If the Capitol balloon-borne TRAPSat experiment had been flown by remote aliens, could they have figured out if life existed on Earth?
The answer involves a little chemistry detective work.
The universe is full of carbon, hydrogen, nitrogen, oxygen – the elements of life. A chemist will tell you "organic molecules" just means “has carbon,” but in astrobiology it usually means something more significant. Either it's a find of methane (CH4) – a byproduct of life – or of complex carbon molecules that can lead to life, like amino acids. We've found amino acids in space dust, on comets, on asteroids. They arise naturally, but with the right combinations and added complexity, in theory you can eventually get all the way to DNA.
As a post on genomenewsnetwork.org explains, “both DNA and proteins are long molecules made from strings of shorter building blocks. While DNA is made of nucleotides, proteins are made of amino acids, a group of 20 different chemicals with names like alanine, arginine, and serine."
It's not a given that the presence of amino acids means 'life', but it's a good start. The 1950s Miller-Urey experiment showed that, given raw elements and lightning, naturally found elements can form into amino acids. Details can be found at Windows2Universe.org
In the warm primordial ocean, aggregates of amino acids, proteins, and other hydrocarbons came together into a form called coacervates.
Amino acids will spontaneously form coacervates in the same way that
beads of vinegar in oil come together. The Miller-Urey experiment showed
that amino acids form under conditions similar to the Earth's
primordial environment.
This suggests the basic “Lego bricks” of life can form in a variety of environments.
The presence of organic molecules doesn't in itself mean life, but it means life is possible. If you can't find organic molecules, there isn't life, so stop looking. However, if you do find organic molecules, then you have one of three situations. Either there is life (yay!), there once was life but it's gone and we just find its remains (boo!), or there's a possibility that life could arise (yay?). The discovery of organics on Mars puts us into all three possibilities, because there are a lot of organic materials found in the crust, and planet modeling suggests Mars may have once had enough water to support life.
This is where detective-style reasoning – and a little faith – come into the picture. Some argue that having the basic blocks that can lead to life isn't enough, that life forming is a one in a billion chance. In that case, it may be unlikely life formed on other planets or moons in our solar system. Others, though, favor the principle that “life finds a way” (we could call this the Jurassic Park approach). They point out that life is ridiculously tenacious and exists even on Earth in environments where it shouldn't – near volcanoes, in frozen areas, near deep sea steam vents.
I like to call these the “recipe” vs the “ingredients” stances – do you need a fancy kitchen and recipes to make food (“life arises rarely”), or can you create a decent meal given enough ingredients even without a lot of structure (“life is tenacious”)?
Finding organics on Mars isn't evidence of life on Mars, but it tilts us more favorably towards the prospect that life did or may still exist on Mars, and thus makes it worth searching deeper. It would be the same for the what-if I proposed: if aliens did a TRAPSat-like experiment on Earth and found organics, could they prove life existed from that experiment? No, but it would support the possibility of life, and give justification to looking deeper. While no evidence can mean either “dig deeper” or “move to a new target,” once you have evidence, there's still work to do. When NASA or Capitol or any experiment finds evidence, like a good detective that means it's time to dig deeper.
Best of all, the way to dig deeper is to come up with better experiments using better equipment. When science people say “we need new data,” to me this means they need new engineers to make new systems to get new data. And that’s where Capitol comes in. Whether it’s data forensics, as taught in our cyber program, or the sensor tech used in our EE/AE programs, our students are gaining the tools and skill sets they need to advance knowledge.
Science is a motivator for technological improvement, and the results of new developments in science and engineering end up spilling over to general American life (see: weather forecasts, microtechnology – oh, and the internet). So really, the more we look for life, the more we improve life on Earth. So yay for Mars, and yay for Earth, we know one of you has life and looking for life on the other is going to be awesome!
By Sandy Antunes
Professor, Astronautical Engineering
On the move: fast-growing Capitol Tech is Moxie Award finalist - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/move-fast-growing-capitol-tech-moxie-award-finalist
www.CapTechU.edu
www.CapTechU.edu
When someone has pep, spirit, or the willingness to try something new and bold, we say that person has “moxie.”
It should come as no surprise, then, that Capitol Technology University – a higher education pioneer that has launched many first-of-their-kind programs – has been selected as a finalist for the annual Moxie Award.
First launched in 2017, the award honors “companies making a difference in the marketplace with bold initiatives, strategic market moves, and more,” according to Moxie sponsor Verasolve.
With a major expansion in the works, including dozens of new academic programs in emerging, in-demand fields, Capitol fits that description closely. Moreover, the university fosters a maker culture in which students are encouraged to take the initiative, innovate, and apply their knowledge to exciting, collaborative projects in business, engineering, and technology.
The school’s motto, “find a way or make one,” conveys the can-do spirit that characterizes Capitol, a small university that offers its students big-time advantages, including post-graduation hiring rates in the 90% range.
“Our motto is very representative of what I think of as moxie,” says Melinda Bunnell-Rhyne, vice president of student engagement and university development. “We believe the Moxie Award is in line with our university culture.”
The moxie is particularly strong at Capitol this year. A brand new residence hall will be open in time for the fall semester. The university has launched a impactful new website to show the world what Capitol is all about.
And a new president, Dr. Bradford L. Sims, is spearheading the launch of academic programs in cutting-edge fields such as cyber analytics, mechatronics, and unmanned systems.
“There’s a lot of excitement. Dr. Sims is really making things happen here on campus,” Bunnell-Rhyne said.
Previous Moxie Award winners include Brainscope, Criterion Systems, GTT, and OBXtek. The winners for 2018 will be announced on October 11, during a special event at the Ritz-Carlton in Tysons Corner, Virginia.
It should come as no surprise, then, that Capitol Technology University – a higher education pioneer that has launched many first-of-their-kind programs – has been selected as a finalist for the annual Moxie Award.
First launched in 2017, the award honors “companies making a difference in the marketplace with bold initiatives, strategic market moves, and more,” according to Moxie sponsor Verasolve.
With a major expansion in the works, including dozens of new academic programs in emerging, in-demand fields, Capitol fits that description closely. Moreover, the university fosters a maker culture in which students are encouraged to take the initiative, innovate, and apply their knowledge to exciting, collaborative projects in business, engineering, and technology.
The school’s motto, “find a way or make one,” conveys the can-do spirit that characterizes Capitol, a small university that offers its students big-time advantages, including post-graduation hiring rates in the 90% range.
“Our motto is very representative of what I think of as moxie,” says Melinda Bunnell-Rhyne, vice president of student engagement and university development. “We believe the Moxie Award is in line with our university culture.”
The moxie is particularly strong at Capitol this year. A brand new residence hall will be open in time for the fall semester. The university has launched a impactful new website to show the world what Capitol is all about.
And a new president, Dr. Bradford L. Sims, is spearheading the launch of academic programs in cutting-edge fields such as cyber analytics, mechatronics, and unmanned systems.
“There’s a lot of excitement. Dr. Sims is really making things happen here on campus,” Bunnell-Rhyne said.
Previous Moxie Award winners include Brainscope, Criterion Systems, GTT, and OBXtek. The winners for 2018 will be announced on October 11, during a special event at the Ritz-Carlton in Tysons Corner, Virginia.
How open NASA data helped to create the map of Mars - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/data-analytics-for-space-exploration
www.CapTechU.edu
Think of all of the times you’ve used your phone or computer today. How many apps have you logged in to? Have you checked Facebook, Twitter, Instagram, Reddit, or Linked-In? Do you regularly use Amazon, YouTube, Tinder, Buzzfeed, or Pinterest?
Every one of those apps, stores or websites that many of us use on a daily basis, collect user data to improve user experience and help companies to make educated business decisions.
"Information is the oil of the 21st century, and analytics is the combustion engine" says Peter Sondergaard, Senior Vice President, Gartner Research. And when we think about how companies use data or “big data” to build a way forward, we often think of businesses and how they will use information to allocate funds.
But that’s not all data can help us do.
Data analytics can be used to improve sports performance, to help us to better understand and build cures for disease, to aid in the development of artificial intelligence, to improve infrastructure in your city, and to expand the reach of what science can do.
NASA has recently used data they’ve gathered over years of exploration to launch an amazing interactive map of Mars. Called, “Mars Trek,” the map is an educational tool NASA has available to the public as part of their Mars Exploration Program.
According to NASA’s official Mars Trek site, “This portal showcases data collected by NASA at various landing sites. It features an easy-to-use browsing tool which provides layering and viewing of high resolution Mars data products in 2D and Globe view allowing users to fly over the surface of Mars. It also provides a set of tools including 3D printing, elevation profiles, sun angle calculations, Sun and Earth position, as well as bookmarks for the exploration area by … NASA missions.”
These “missions” which have supplied the majority of the data for the map to date are specifically the MSL (Mars Science Laboratory) mission, which involved the Curiosity Rover, the MER (Mars Exploration Rovers) mission, which included Spirit and Opportunity, the Phoenix mission, and the Pathfinder mission. NASA plans to continue to update the map as new data becomes available.
This is especially exciting as the Mars 2020 rover should be bringing us a whole new supply of data to add to the map by 2021. Modeled after the Curiosity, which has been a breakthrough unmanned system for NASA, the 2020 rover will explore the habitability of Mars, hopefully paving the way for NASA’s manned missions tentatively planned for 2030.
Take a moment to think about the power of this data. Humans now have an accurate 2D and 3D enabled map of another planet upon which no human has ever actually set foot. You can use this tool NASA has created using data to print 3D renderings of the planet. We have entered a world where teachers can actually hand their students a Mars shaped-ball to touch and interact with.
Think of all the future scientists that will find their passion thanks to this use of data by NASA. Data isn’t just shaping the way our businesses run, it is shaping our lives.
Are you interested in learning more about the uses of data? Check out our business analytics and data science programs here.
www.CapTechU.edu
Think of all of the times you’ve used your phone or computer today. How many apps have you logged in to? Have you checked Facebook, Twitter, Instagram, Reddit, or Linked-In? Do you regularly use Amazon, YouTube, Tinder, Buzzfeed, or Pinterest?
Every one of those apps, stores or websites that many of us use on a daily basis, collect user data to improve user experience and help companies to make educated business decisions.
"Information is the oil of the 21st century, and analytics is the combustion engine" says Peter Sondergaard, Senior Vice President, Gartner Research. And when we think about how companies use data or “big data” to build a way forward, we often think of businesses and how they will use information to allocate funds.
But that’s not all data can help us do.
Data analytics can be used to improve sports performance, to help us to better understand and build cures for disease, to aid in the development of artificial intelligence, to improve infrastructure in your city, and to expand the reach of what science can do.
NASA has recently used data they’ve gathered over years of exploration to launch an amazing interactive map of Mars. Called, “Mars Trek,” the map is an educational tool NASA has available to the public as part of their Mars Exploration Program.
According to NASA’s official Mars Trek site, “This portal showcases data collected by NASA at various landing sites. It features an easy-to-use browsing tool which provides layering and viewing of high resolution Mars data products in 2D and Globe view allowing users to fly over the surface of Mars. It also provides a set of tools including 3D printing, elevation profiles, sun angle calculations, Sun and Earth position, as well as bookmarks for the exploration area by … NASA missions.”
These “missions” which have supplied the majority of the data for the map to date are specifically the MSL (Mars Science Laboratory) mission, which involved the Curiosity Rover, the MER (Mars Exploration Rovers) mission, which included Spirit and Opportunity, the Phoenix mission, and the Pathfinder mission. NASA plans to continue to update the map as new data becomes available.
This is especially exciting as the Mars 2020 rover should be bringing us a whole new supply of data to add to the map by 2021. Modeled after the Curiosity, which has been a breakthrough unmanned system for NASA, the 2020 rover will explore the habitability of Mars, hopefully paving the way for NASA’s manned missions tentatively planned for 2030.
Take a moment to think about the power of this data. Humans now have an accurate 2D and 3D enabled map of another planet upon which no human has ever actually set foot. You can use this tool NASA has created using data to print 3D renderings of the planet. We have entered a world where teachers can actually hand their students a Mars shaped-ball to touch and interact with.
Think of all the future scientists that will find their passion thanks to this use of data by NASA. Data isn’t just shaping the way our businesses run, it is shaping our lives.
Are you interested in learning more about the uses of data? Check out our business analytics and data science programs here.
Capitol Tech Kicks Off Summer With Cyber Camp - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/capitol-tech-kicks-summer-cyber-camp
www.CapTechU.edu
School’s out – and kids and teens across the country are looking ahead to their summer activities.
For a group of middle and high school students enrolled at Capitol’s Cyber Camp, summer is starting off with exciting cyber games and hacking contests – plus additional activities that are designed to give them a break from the computer screen.
Capitol’s camp, like the Cyber Saturday program held at the university during the school year, aims to introduce young people to the cybersecurity in a fun and exciting way, says Dr. Mary-Margaret Chantré, who is leading the week-long event.
When they’re not learning how to detect and defeat network intruders, camp participants are also getting a chance to stretch their limbs and enjoy some fresh air. Basketball, volleyball, and frisbee are part of the schedule, Chantré notes, and participants are also honing their communications and presentation skills.
“It’s not only about teaching the kids how to get into computers and defending networks. We want them to be well-rounded,” she said. “With many kids these days basically hooked on social media, they’re often not getting out much. I think it’s important to incorporate physical activity into the schedule.”
Meanwhile, Chantré says, the camp also aims to boost the “soft skills” that are needed for career success – even for those going into tech-heavy fields.
“We’re having them work together in groups on small projects, and then give presentations each day,” she said.
Communication skills are particularly important in the cybersecurity profession, according to Chantré. Professionals in the field have to be able to explain what they do. They have to make other employees in an organization, as well as management, aware of what the threats are and how to counter them. With companies always striving to minimize costs, they may have to communicate clearly and effectively about the need not to take shortcuts in protecting assets and data.
A successful cybersecurity professional can’t just hide behind the computer screen, Chantré insists.
“When a company hires a cybersecurity professional, it does so because it wants its data to be secure,” she says. “They don’t want to learn our jobs – that’s why they hire us to do it. But we have to be able to brief them and keep them updated on what’s going on. We have to be able to speak to them in a way that they understand.”
Participants in the June 18-22 camp range from seventh graders to high school graduates. Jamila Parker, a rising senior at Brooke Point High School, said she signed up for the camp after learning about Capitol Tech during a college fair.
“I just became very intrigued by Capitol. The representative explained that cybersecurity is a big focus at this school and told me about the camp. I’m really enjoying it and learning about a lot of new things – metadata, for instance. I was familiar with the term but didn’t know what it really was. Here at the camp, we just did a presentation on it. This is knowledge I’ll be able to take back with me to school.”
Seventh-grader Ned Brooks, the youngest participant, says he signed up because of his interest in computers. “I’m learning about encryption, different distributions of Linux – lots off stuff,” he said.
Capitol will be holding additional camps during the summer, including Advanced Student Cyber Camp from July 9-13, Coding Camp from July 30-August 3, and Gaming Camp from August 6-10. Call (240) 965-2510 for more information or visit our summer camps page.
www.CapTechU.edu
School’s out – and kids and teens across the country are looking ahead to their summer activities.
For a group of middle and high school students enrolled at Capitol’s Cyber Camp, summer is starting off with exciting cyber games and hacking contests – plus additional activities that are designed to give them a break from the computer screen.
Capitol’s camp, like the Cyber Saturday program held at the university during the school year, aims to introduce young people to the cybersecurity in a fun and exciting way, says Dr. Mary-Margaret Chantré, who is leading the week-long event.
When they’re not learning how to detect and defeat network intruders, camp participants are also getting a chance to stretch their limbs and enjoy some fresh air. Basketball, volleyball, and frisbee are part of the schedule, Chantré notes, and participants are also honing their communications and presentation skills.
“It’s not only about teaching the kids how to get into computers and defending networks. We want them to be well-rounded,” she said. “With many kids these days basically hooked on social media, they’re often not getting out much. I think it’s important to incorporate physical activity into the schedule.”
Meanwhile, Chantré says, the camp also aims to boost the “soft skills” that are needed for career success – even for those going into tech-heavy fields.
“We’re having them work together in groups on small projects, and then give presentations each day,” she said.
Communication skills are particularly important in the cybersecurity profession, according to Chantré. Professionals in the field have to be able to explain what they do. They have to make other employees in an organization, as well as management, aware of what the threats are and how to counter them. With companies always striving to minimize costs, they may have to communicate clearly and effectively about the need not to take shortcuts in protecting assets and data.
A successful cybersecurity professional can’t just hide behind the computer screen, Chantré insists.
“When a company hires a cybersecurity professional, it does so because it wants its data to be secure,” she says. “They don’t want to learn our jobs – that’s why they hire us to do it. But we have to be able to brief them and keep them updated on what’s going on. We have to be able to speak to them in a way that they understand.”
Participants in the June 18-22 camp range from seventh graders to high school graduates. Jamila Parker, a rising senior at Brooke Point High School, said she signed up for the camp after learning about Capitol Tech during a college fair.
“I just became very intrigued by Capitol. The representative explained that cybersecurity is a big focus at this school and told me about the camp. I’m really enjoying it and learning about a lot of new things – metadata, for instance. I was familiar with the term but didn’t know what it really was. Here at the camp, we just did a presentation on it. This is knowledge I’ll be able to take back with me to school.”
Seventh-grader Ned Brooks, the youngest participant, says he signed up because of his interest in computers. “I’m learning about encryption, different distributions of Linux – lots off stuff,” he said.
Capitol will be holding additional camps during the summer, including Advanced Student Cyber Camp from July 9-13, Coding Camp from July 30-August 3, and Gaming Camp from August 6-10. Call (240) 965-2510 for more information or visit our summer camps page.
Monday, June 18, 2018
Why is an Indistinguishable Synthetic Consciousness Bad? - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/why-indistinguishable-synthetic-consciousness-bad
www.CapTechU.edu
By Jason M. Pittman, Sc.D.
Previously, I argued that the three types of consciousness were indistinguishable. I argued that this is because we cannot reliably detect any consciousness other than our own. I reasoned that an undetectable consciousness is an indistinguishable consciousness. Based on that, I made the claim that an undetectable, indistinguishable consciousness would be bad.
I left important details open, however. Bad for whom? Bad, in what way? Let’s find out.
First, I ought to clarify what I mean by bad. Bad is not a synthetic consciousness immediately seeking our destruction upon waking. You might suspect that is the worst case. However, while such an event would be existentially bad, I think there are other possibilities that are far worse. For example, bad is not knowing if a synthetic intelligence is conscious or if it is being deceptive in manner intended to get us to believe it is conscious. As well, bad is thinking that a synthetic intelligence is conscious when it is not.
Finally, the worst kind of bad is a conscious synthetic intelligence that is indifferent to other types of consciousness.
With the definition of bad behind us, I can explain why not being able to distinguish natural from artificial from synthetic is in fact bad.
Deception is a greased slide towards pathology in the best of cases or malevolence in the worst. I think these are remote, edge possibilities though. My rationale is that such badness is an exception in natural consciousness. Yet, net effect is an important factor in risk calculations. The effect of a pathology or malevolence here ought to be self-evident as a prelude to the existential risk pondered by ethicists.
More likely, I see the strong possibility of natural consciousness inappropriately projecting a state of consciousness onto a synthetic intelligence when the latter is not conscious. The result of that will not be as catastrophic to us as a deceptive, pathological consciousness but will certainly lead us down unproductive paths. Maybe we just waste time; maybe we place trust in a false entity that is not trustworthy. What we don’t get is a productive partnership that moves our species forward.
Lastly, there is the potential for a synthetic intelligence to become truly conscious but adopt a position of indifference towards other consciousnesses. I would argue that this is actually the absolute worst-case scenario. An entity that is as capable or more capable than us, standing by while we descend towards oblivion is a nightmare made real. Such a synthetic consciousness, beyond being indistinguishable, would essentially be alien.
Accordingly, I have begun to wonder what, if any, sociological and psychological constructs a synthetic entity might manifest. Will it manifest constructs like natural consciousness? If so, perhaps the lack of indistinguishable nature means we can be conceptually equal. However, if synthetic consciousness manifests a construct set alien to us, we may need a mechanism to shield other consciousnesses from the associated risks.
www.CapTechU.edu
By Jason M. Pittman, Sc.D.
Previously, I argued that the three types of consciousness were indistinguishable. I argued that this is because we cannot reliably detect any consciousness other than our own. I reasoned that an undetectable consciousness is an indistinguishable consciousness. Based on that, I made the claim that an undetectable, indistinguishable consciousness would be bad.
I left important details open, however. Bad for whom? Bad, in what way? Let’s find out.
First, I ought to clarify what I mean by bad. Bad is not a synthetic consciousness immediately seeking our destruction upon waking. You might suspect that is the worst case. However, while such an event would be existentially bad, I think there are other possibilities that are far worse. For example, bad is not knowing if a synthetic intelligence is conscious or if it is being deceptive in manner intended to get us to believe it is conscious. As well, bad is thinking that a synthetic intelligence is conscious when it is not.
Finally, the worst kind of bad is a conscious synthetic intelligence that is indifferent to other types of consciousness.
With the definition of bad behind us, I can explain why not being able to distinguish natural from artificial from synthetic is in fact bad.
Deception is a greased slide towards pathology in the best of cases or malevolence in the worst. I think these are remote, edge possibilities though. My rationale is that such badness is an exception in natural consciousness. Yet, net effect is an important factor in risk calculations. The effect of a pathology or malevolence here ought to be self-evident as a prelude to the existential risk pondered by ethicists.
More likely, I see the strong possibility of natural consciousness inappropriately projecting a state of consciousness onto a synthetic intelligence when the latter is not conscious. The result of that will not be as catastrophic to us as a deceptive, pathological consciousness but will certainly lead us down unproductive paths. Maybe we just waste time; maybe we place trust in a false entity that is not trustworthy. What we don’t get is a productive partnership that moves our species forward.
Lastly, there is the potential for a synthetic intelligence to become truly conscious but adopt a position of indifference towards other consciousnesses. I would argue that this is actually the absolute worst-case scenario. An entity that is as capable or more capable than us, standing by while we descend towards oblivion is a nightmare made real. Such a synthetic consciousness, beyond being indistinguishable, would essentially be alien.
Accordingly, I have begun to wonder what, if any, sociological and psychological constructs a synthetic entity might manifest. Will it manifest constructs like natural consciousness? If so, perhaps the lack of indistinguishable nature means we can be conceptually equal. However, if synthetic consciousness manifests a construct set alien to us, we may need a mechanism to shield other consciousnesses from the associated risks.
Thursday, June 14, 2018
Doctor of Philosophy (PhD) in Unmanned Systems Applications - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/degrees-and-programs/doctoral-degrees/unmanned-systems-applications-phd
Students enter the program with a research idea and at least a Committee Chair. Students begin their path to success at Capitol Technology University by working with their research committee to further develop their research proposal. Under the guidance to the committee students work independently to produce a meaningful body of original research of publishable quality. The program will equip students with knowledge of the legal, political, ethical, and social dimensions of their field of research.
The following rates are in effect for the 2018-2019 academic year, beginning in Fall 2018 and continuing through Summer 2019:
Doctoral programs -- Summer 2018 rates
Doctor of Philosophy (PhD) in Unmanned Systems Applications
Earn a doctorate degree in Unmanned Systems Applications, advance both scholarly research and your career
The Doctor of Philosophy in Unmanned Systems Applications provides
students with the opportunity to conduct extensive and sustained
original research in unmanned systems.
This degree program prepares students to take on roles as leaders,
become researchers, or enter higher education as teaching
professionals.Graduates will contribute significantly to their fields
through the creation of new knowledge and ideas. Further, through this
research-based doctorate, students engage quickly in research and
publishing without the need to navigate the limitations inherent in
traditional coursework models.Students enter the program with a research idea and at least a Committee Chair. Students begin their path to success at Capitol Technology University by working with their research committee to further develop their research proposal. Under the guidance to the committee students work independently to produce a meaningful body of original research of publishable quality. The program will equip students with knowledge of the legal, political, ethical, and social dimensions of their field of research.
Why Capitol?
Our location puts you in the heart of the action
The Baltimore/Washington D.C. area has one of the largest concentrations of high-tech companies, defense contractors, and government agencies in the United States, making it easier to find interships and high-paying jobs.Learn around your busy schedule
Our low residency requirement takes in consideration the time commitment of your established career.Our classes are taught by working professionals
Capitol’s faculty are working professionals in the field – subject matter experts who apply their knowledge on a daily basis and are up to speed on emerging developments.Key Faculty
Dr. Ian McAndrew
Dean of Doctoral Programs
Dr. McAndrew has five degrees, PhD, two Master’s and two
bachelor’s degrees, he is a Professional Engineer and a member of
several institutions. He is a Fellow of the Royal Aeronautical Society
and recognized as an international leader in Aerodynamics research. He
Chairs several international conferences and Journals and is invited to
give keynote speeches all over the world. He started his career in the
automotive industry where he was an engine designer (Thermodynamics),
and has worked at several universities in Europe and all over the world.
His main passion is supervising PhD students and has over 30 PhD
successes.
Career Opportunities
Market demand for unmanned systems applications
Get the advanced education needed to become a UAS program analyst, business development manager, risk manager or policy specialist.- The UAS and Maryland Accountability document reports these jobs will be in demand.
A degree that is relevant to any and every organization
Graduates will contribute significantly to their fields in unmanned systems applications through the creation of new knowledge and ideas.Degree Details
Curriculum
The program offers 2 degree completion requirement options.- Dissertation Option: the student will produce, present, and defend a doctoral dissertation after receiving the required approvals from the student’s Committee and the PhD Review Boards.
- Publication Option: the student will produce, present, and defend doctoral research that is published as articles (3 required) in high-impact journals identified by the university and the student’s Committee. Students must receive the required approvals from the student’s Committee and the PhD Review Board prior to publication.
Tuition & Fees
Tuition rates are subject to change without notice.The following rates are in effect for the 2018-2019 academic year, beginning in Fall 2018 and continuing through Summer 2019:
- The application fee is $100
- The per-credit charge for doctorate courses is $893. This is the same for in-state and out-of-state students.
- The entrance exam fee is $100
Doctoral programs -- Summer 2018 rates
Share this:
Capitol's Project Aether team sees early successes - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/capitols-project-aether-team-sees-early-successes
www.CapTechU.edu
www.CapTechU.edu
As
summer kicks into gear, a team of Capitol Technology University
students involved in an ambitious space science project is savoring
early successes and looking ahead to further milestones in the months
ahead.
Project Aether brings together the talents and expertise of young astronautical engineers, computer scientists, and business students in a mission with multiple science objectives. It is the latest in a series of student-led projects initiated at Capitol, where opportunities for hands-on training are a key component of the school’s educational approach.
This past spring, the Project Aether team traveled to the Maryland-Pennsylvania border and tested their handiwork during a two-and-half hour balloon flight. Just a few weeks later, the project successfully passed an integrated subsystems testing review.
“We proved the viability of our power boards, software, and secondary science payload,’ says Sam Lawson, the project’s CAD designer. “Everything is working well.”
The team’s ultimate goal is send their payload into space in order to observe the effects of the Aurora Borealis on the atmosphere, while also testing the performance of a new insulation system and compare data rates from multiple sources.
Their mission already has racked up a notable achievement: it was selected for the prestigious RockSat-XN program in Norway. After it passes rigorous design reviews and requirements, Aether will travel into space aboard a sounding rocket.
“We have three science objectives that we aim to complete,” said Sophia LoSchiavo, who is co-leading the team together with Marissa Jagarnath. “We’ll be analyzing the composition of the atmosphere, since there’s a chance the rocket will fly through the Northern Lights. We’ll be comparing the data we receive to known data gathered from other flights. Our second goal is to compare the functionality of a hybrid insulation method, which we will modify, to standard multi-layer insulation.”
“Our third goal is to compare data rates from the Iridium satellite constellation to those of the rocket itself,” she said.
In addition to Lawson, LoSchiavo and Jagarnath, the Project Aether team includes Christopher Murray, Erik Schroen, Pierce Smith, and Dean Zinetti.
Capitol is one of a small group of schools around the United States, including Penn State and the University of New Hampshire, that will be participating in the Norway program together with international counterparts. The Capitol team is collaborating with students from nearby University of Maryland Baltimore County, and the Maryland Space Grant Consortium has provided funds needed to secure a berth on the sounding rocket.
As with all space engineering projects at Capitol, Aether adheres to a methodology dubbed Crawl, Walk, Run, Fly, designed to help teams stay on schedule and meet all project requirements, including funding, paperwork, and successful testing.
Students begin by fleshing out their ideas in the form of a mission statement and defined goals and objectives. They create concepts and prototypes, then begin a series of high-altitude balloon tests, in preparation for a sounding rocket launch. For many missions, the eventual goal is to secure space on an orbiting satellite.
Project Aether brings together the talents and expertise of young astronautical engineers, computer scientists, and business students in a mission with multiple science objectives. It is the latest in a series of student-led projects initiated at Capitol, where opportunities for hands-on training are a key component of the school’s educational approach.
This past spring, the Project Aether team traveled to the Maryland-Pennsylvania border and tested their handiwork during a two-and-half hour balloon flight. Just a few weeks later, the project successfully passed an integrated subsystems testing review.
“We proved the viability of our power boards, software, and secondary science payload,’ says Sam Lawson, the project’s CAD designer. “Everything is working well.”
The team’s ultimate goal is send their payload into space in order to observe the effects of the Aurora Borealis on the atmosphere, while also testing the performance of a new insulation system and compare data rates from multiple sources.
Their mission already has racked up a notable achievement: it was selected for the prestigious RockSat-XN program in Norway. After it passes rigorous design reviews and requirements, Aether will travel into space aboard a sounding rocket.
“We have three science objectives that we aim to complete,” said Sophia LoSchiavo, who is co-leading the team together with Marissa Jagarnath. “We’ll be analyzing the composition of the atmosphere, since there’s a chance the rocket will fly through the Northern Lights. We’ll be comparing the data we receive to known data gathered from other flights. Our second goal is to compare the functionality of a hybrid insulation method, which we will modify, to standard multi-layer insulation.”
“Our third goal is to compare data rates from the Iridium satellite constellation to those of the rocket itself,” she said.
In addition to Lawson, LoSchiavo and Jagarnath, the Project Aether team includes Christopher Murray, Erik Schroen, Pierce Smith, and Dean Zinetti.
Capitol is one of a small group of schools around the United States, including Penn State and the University of New Hampshire, that will be participating in the Norway program together with international counterparts. The Capitol team is collaborating with students from nearby University of Maryland Baltimore County, and the Maryland Space Grant Consortium has provided funds needed to secure a berth on the sounding rocket.
As with all space engineering projects at Capitol, Aether adheres to a methodology dubbed Crawl, Walk, Run, Fly, designed to help teams stay on schedule and meet all project requirements, including funding, paperwork, and successful testing.
Students begin by fleshing out their ideas in the form of a mission statement and defined goals and objectives. They create concepts and prototypes, then begin a series of high-altitude balloon tests, in preparation for a sounding rocket launch. For many missions, the eventual goal is to secure space on an orbiting satellite.
Wednesday, June 13, 2018
Cybersecurity a global problem, say analysts – but global response proves elusive - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/global-challenges-to-cybersecurity
www.CapTechU.edu
www.CapTechU.edu
It’s a captivating sight -- and an alarming one, to those who understand its full import.
At Capitol Technology University’s Cyber Lab,
a pair of supersized monitors displays real-time mapping of cyber
attacks. Threads of light fan out across continents and arc over oceans.
Massive bursts engulf the major urban hubs – these attract the largest
volume of activity. The display mesmerizes first-time visitors, though
to cybersecurity students who practice their skills here, it’s business
as usual. They’ll tell you what everyone in the field knows, and keeps
close to heart: hackers and cyber adversaries never sleep.
Besides demonstrating the high volume of attacks,
the real-time display also highlights another key facet of cyberwarfare:
its global nature. The internet crosses geographical and political
boundaries; these pose no barrier to hackers, also. The transnational
nature of cybercrime, many policymakers believe, calls for a
transnational response – yet, so far, building a global consensus has
proved hard to do, adding to dealing with the global challenges of
cybersecurity.
“In a medium that does not map onto political
borders, it is impossible to manage risks successfully from just one
jurisdiction. In economic terms, cybercrime is already comparable in
size to drug trafficking, and it is highly internationalized,” writes
former NATO Secretary-General Javier Solana in a 2015 op-ed.
“But we have yet to develop fully a global governance regime. Various
initiatives have attempted to facilitate the international management of
cyberspace, but none has had more than limited success.”
According to professor Rick Hansen, who teaches in the Cyber and Information Security
program at Capitol Technology University and mentors the university’s
Cyber Battle Team, the impasse isn’t surprising, nor entirely avoidable.
“There is often a need to balance cooperation and
competition,” he points out. “Nations balance the desire to be secretive
about their vulnerabilities and their ability to detect and thwart bad
actors to better protect themselves against with the need to be a good
neighbor, and the possibility that sharing may put them at risk.”
Even so, co-operation among law enforcement agencies is taking place and resulting in arrests, says Dr. William Butler, the program’s chair. “Interpol and the FBI have had notable successes in apprehending cybercriminals,”
Butler says. “These arrests are the result of unprecedented cooperation
between partner nations that understand that cybercrime knows no
borders. We as cyber defenders and law enforcement must also operate in a
borderless manner with the proper treaties in place.”
The cybercrime challenge is best tackled by
enforcing the rule of law, rather than by sealing off parts of the
internet, according to Butler. “The most effective deterrent to
cybercrime is not a bigger firewall but putting cybercriminals on notice
that they can be found, apprehended, tried and jailed.
Dr. Mary-Margaret Chantré,
also on the cybersecurity faculty at Capitol, cautions against putting
the cart before the horse. The more immediate problem, she says, is that
adversaries are outpacing the cybersecurity profession’s ability to
catch them. And that, she says, is largely because new technologies are
being introduced at a rapid pace, often without sufficient awareness of
the security vulnerabilities.
“We are not ahead of technology,” Chantré says.
“Technology expands so quickly that we have to wait for attacks to
happen before we can put the right measures in effect to protect
ourselves from the next inevitable attack. Cybercriminals dedicate their
lives to attacking while defenders are concerned with families and
other activities other than work.”
“In other words they have a life,” she laughs.
In Chantré’s view, the global challenge must be
tackled from the ground up, by ensuring that cybersecurity is baked
into the research and development process. “All technology must
have cyber security advisors from start to finish. They must ensure that
the system architecture is secure and be an integral part of the
building or initiation phase and process -- not just the maintenance
phase.”
Passionate about the global fight against cybercrime? Find out how a degree from Capitol can get you started, or help you move to the next level. Contact us today!
Monday, June 11, 2018
Privacy: Information as Permanency - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/privacy-information-permanency
www.CapTechU.edu
By Dr. Jason M. Pittman
Earlier in this continuing series on privacy, I argued that that there were three reasons for the rising demand in privacy and that such demand is bad for our species. First, I outlined my thoughts on privacy and information parity. Most recently, I presented my view of information as currency. Now, I want to share the last reason: permanency of information.
Culturally, we are under a spell that leads us to believe that information has permanency. We watch what we do or say electronically because there will be a permanent record. Moreover, we treat public figures -- celebrities, politicians, etc. -- with deep contempt should they express information contrary to something said or written even just a year prior.
This impression raises several important questions for us. For example, why do we treat information as permanent? Is it the information that is permanent or our desire for the information?
Permanency of information is the antidote to one of the biggest weaknesses our species has – lack of memory. Without information permanency we would not be able to pass information down to future generations. Without information permanency we could not plan our future. Indeed, without information permanency we would be trapped in the fleeting present. I might suggest that without written (or stored) information mankind would not have evolved to the technological empowered marvel we are today.
However, such permanency of information does not make for an unchanging world.
Think of a rock in a river. The rock is permanent, whereas the water is ever changing. This is how information permanency exists. Now, to complete the analogy, also realize that over a long period of time the water will change the rock. The latter will be reshaped, smoothed, perhaps even uprooted if a strong water surge occurs.
A timelier example of the confusion surrounding information permanency is internet content. You can use the Wayback Machine to visit almost 300 billion (yes, billion!) pages of web content extending back 20 years. I’ll use www.microsoft.com as an example but you can use any URL. Compare the page today to that decade old page the Wayback Machine archived.
Are the pages the same? It would be silly to conclude that the pages ought to be the same, right?
And that is my point regarding information permanency. We an expectation that external information changes (websites) but that our information remains constant, permanent. Then, we invoke privacy to limit or control our information. That’s strange, no?
Privacy treats information as something immutable. This is completely antithetical to how information exists, though.
Further, permanency is simultaneously the prerequisite for information as currency and the result of that currency. There is no power in information that can change. There is no parity if information cannot be pinned down and held constant. Therefore, we demand privacy as a fixing agent, a glue or resin that can fixate information. The counterintuitive part of this facet of the demand for privacy is that technology ought to neutralize the problem (look at the Wayback Machine example) but perpetuates the confusion. But maybe we are just confused about what privacy is?
Dr. Jason M. Pittman, Sc. D., is a scholar, professor, and cybersecurity thought leader. He is on the full-time faculty at Capitol Technology University.
www.CapTechU.edu
By Dr. Jason M. Pittman
Earlier in this continuing series on privacy, I argued that that there were three reasons for the rising demand in privacy and that such demand is bad for our species. First, I outlined my thoughts on privacy and information parity. Most recently, I presented my view of information as currency. Now, I want to share the last reason: permanency of information.
Culturally, we are under a spell that leads us to believe that information has permanency. We watch what we do or say electronically because there will be a permanent record. Moreover, we treat public figures -- celebrities, politicians, etc. -- with deep contempt should they express information contrary to something said or written even just a year prior.
This impression raises several important questions for us. For example, why do we treat information as permanent? Is it the information that is permanent or our desire for the information?
Permanency of information is the antidote to one of the biggest weaknesses our species has – lack of memory. Without information permanency we would not be able to pass information down to future generations. Without information permanency we could not plan our future. Indeed, without information permanency we would be trapped in the fleeting present. I might suggest that without written (or stored) information mankind would not have evolved to the technological empowered marvel we are today.
However, such permanency of information does not make for an unchanging world.
Think of a rock in a river. The rock is permanent, whereas the water is ever changing. This is how information permanency exists. Now, to complete the analogy, also realize that over a long period of time the water will change the rock. The latter will be reshaped, smoothed, perhaps even uprooted if a strong water surge occurs.
A timelier example of the confusion surrounding information permanency is internet content. You can use the Wayback Machine to visit almost 300 billion (yes, billion!) pages of web content extending back 20 years. I’ll use www.microsoft.com as an example but you can use any URL. Compare the page today to that decade old page the Wayback Machine archived.
Are the pages the same? It would be silly to conclude that the pages ought to be the same, right?
And that is my point regarding information permanency. We an expectation that external information changes (websites) but that our information remains constant, permanent. Then, we invoke privacy to limit or control our information. That’s strange, no?
Privacy treats information as something immutable. This is completely antithetical to how information exists, though.
Further, permanency is simultaneously the prerequisite for information as currency and the result of that currency. There is no power in information that can change. There is no parity if information cannot be pinned down and held constant. Therefore, we demand privacy as a fixing agent, a glue or resin that can fixate information. The counterintuitive part of this facet of the demand for privacy is that technology ought to neutralize the problem (look at the Wayback Machine example) but perpetuates the confusion. But maybe we are just confused about what privacy is?
Dr. Jason M. Pittman, Sc. D., is a scholar, professor, and cybersecurity thought leader. He is on the full-time faculty at Capitol Technology University.
Friday, June 8, 2018
Teaming up to create opportunities: Capitol signs agreement with NSA’s National Cryptologic School - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/news-events/teaming-create-opportunities-capitol-signs-agreement-nsas-national-cryptologic-school
www.CapTechU.edu
A school within the National Security Agency that provides training in information assurance and other specialized areas has teamed up with Capitol Technology University to open up new educational opportunities for NSA employees.
Under an agreement signed this month, employees who have completed courses sponsored by the agency’s National Cryptologic School (NCS) will be able to apply a substantial amount of that coursework towards bachelor’s, master’s, or doctoral degrees at Capitol.
The agreement reflects the “complementary nature of the NSA and Capitol programs,” according to an official document.
“We’re very excited about building a relationship with the NCS and its students, both civilian and military,” says Dr. Helen G. Barker, Capitol’s vice president for academic affairs and chief academic officer. “Capitol has a long track record of educating students to meet the demand of federal agencies for specialized technology skills, including cybersecurity, and this agreement builds on that tradition.”
“What this agreement does is provide NSA employees with further opportunities to complete a degree – whether because of personal aspirations, or to advance on their career paths,” Barker said. “We’re accomplishing this by offering significant transfer options, not only into our undergraduate programs, but also our master’s and doctorates. In other words, we’re offering degree completion for all levels of individuals.
Programs of particular interest to NCS student, according to Barker, include Capitol’s bachelor degree program in cyber and information technology, bachelor’s and master’s degree programs in cyber analytics, master of science in cyber and information security, technical master of business administration in cybersecurity, and doctorates in business analytics and decision sciences, cybersecurity, and technology.
Providing more avenues for building cybersecurity skills is a high priority across many federal agencies, given increased concern about protecting sensitive information, assets, and infrastructure,” Barker noted.
“There are tremendous opportunities right now in cyber, both within and outside the federal government, and also in analytics,” she said. “Data is a critical asset, and more and more organizations recognize that securing it is absolutely essential.”
Capitol was among the first universities in the world to offer degree programs in cyber and information security, and the first to launch a doctorate in the field. The quality of its programs has been recognized with repeat designations by the Department of Homeland Security and National Security Agency as a Center of Academic Excellence. The university is based in Laurel, Maryland, between the NSA and NASA’s Goddard Space Flight Center.
Are you an NSA employee interested in learning more about transferring NCS credits to Capitol? Want more information about Capitol’s programs? Contact us at admissions@CapTechU.edu.
www.CapTechU.edu
A school within the National Security Agency that provides training in information assurance and other specialized areas has teamed up with Capitol Technology University to open up new educational opportunities for NSA employees.
Under an agreement signed this month, employees who have completed courses sponsored by the agency’s National Cryptologic School (NCS) will be able to apply a substantial amount of that coursework towards bachelor’s, master’s, or doctoral degrees at Capitol.
The agreement reflects the “complementary nature of the NSA and Capitol programs,” according to an official document.
“We’re very excited about building a relationship with the NCS and its students, both civilian and military,” says Dr. Helen G. Barker, Capitol’s vice president for academic affairs and chief academic officer. “Capitol has a long track record of educating students to meet the demand of federal agencies for specialized technology skills, including cybersecurity, and this agreement builds on that tradition.”
“What this agreement does is provide NSA employees with further opportunities to complete a degree – whether because of personal aspirations, or to advance on their career paths,” Barker said. “We’re accomplishing this by offering significant transfer options, not only into our undergraduate programs, but also our master’s and doctorates. In other words, we’re offering degree completion for all levels of individuals.
Programs of particular interest to NCS student, according to Barker, include Capitol’s bachelor degree program in cyber and information technology, bachelor’s and master’s degree programs in cyber analytics, master of science in cyber and information security, technical master of business administration in cybersecurity, and doctorates in business analytics and decision sciences, cybersecurity, and technology.
Providing more avenues for building cybersecurity skills is a high priority across many federal agencies, given increased concern about protecting sensitive information, assets, and infrastructure,” Barker noted.
“There are tremendous opportunities right now in cyber, both within and outside the federal government, and also in analytics,” she said. “Data is a critical asset, and more and more organizations recognize that securing it is absolutely essential.”
Capitol was among the first universities in the world to offer degree programs in cyber and information security, and the first to launch a doctorate in the field. The quality of its programs has been recognized with repeat designations by the Department of Homeland Security and National Security Agency as a Center of Academic Excellence. The university is based in Laurel, Maryland, between the NSA and NASA’s Goddard Space Flight Center.
Are you an NSA employee interested in learning more about transferring NCS credits to Capitol? Want more information about Capitol’s programs? Contact us at admissions@CapTechU.edu.
Thursday, June 7, 2018
Student Spotlight: Giang To - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/student-spotlight-giang
www.CapTechU.edu
What is the Cyber Lab at Capitol Technology University?
What do the students do there, and how can the lab help me?
We sat down with Capitol Technology University student Giang To to learn more about the cyber opportunities at Capitol. To, a junior at Capitol, is double majoring in Computer Science and Cyber and Information Security. She also has extensive experience at the Cyber Lab, including a stint as lead lab manager.
For those people who may not be familiar with our school, can you describe what the Cyber Lab is and what I might learn there?
GT: The cyber lab is a place for you to come in and gain more hands-on experience than you might get from your classes. Capitol is very geared towards hands-on learning, but that can only go so far in a timed class. In the lab, because it is a lab environment, you get to experiment a lot more. On top of that, a lot of us as lab managers have taken more classes and worked in the field of cyber, so we can serve as peer learning resources to other students.
What I find awesome about that, is that just by hanging out in the lab you hear cyber terms and concepts being thrown around and later on you may come across those notions in your classes. And you can say, hey, I actually heard about that just by hanging out in the lab. I think it’s a great learning environment. It’s not a formal way to learn, but it’s a very effective way to learn what you don’t get to learn in classes.
What is your role in the lab?
GT: I’m the lead lab manager. This means that not only do I help students, but I also organize most things that go on in the lab. So last semester, I pulled everyone together to form a team for the National Cyber League competition. That is online based, so it’s a little bit easier to organize. I mostly sent out emails to let people know what’s coming up and what the timeline is like so that they can see if they can participate. And then I distribute codes so that they can sign up with instructions.
I also need to make sure that I know what’s going on in our infrastructure. Our servers and routers are what make us able to support the lab’s computers. So my role is both administrative and technical, which is a little bit tricky since I only work ten hours in the lab. It’s a lot of work, especially to do it well, but I’ve found it to be an intense learning experience that is giving me the ability to do both the administrative work and handle the technical side of things in the lab.
I know that the Cyber Lab does tutoring, can you speak to that?
GT: Yes, so we help students with their lab assignments. We have lab periods for at least the IAE-201 and IAE-301 classes, where students meet twice a week. For one session students are in class for a lecture with their professor, and for the other class, they are on their own or in the lab doing the lab assignments. During those lab periods, if they have issues that they run into in their lab or don’t understand something, then we will assist them with that. So we don’t do the lab for them, because that defeats the purpose, but we will help them with the concepts.
In helping other students with their labs, we also get to learn more about the material. First, we need to go through the lab first ourselves to make sure that we know what we’re talking about before handling a class. But, sometimes we haven’t thought about some of the questions that students might ask. So by helping them, we are also reinforcing our own knowledge and I think that’s pretty neat.
We talked a little bit about this, but I wanted to ask you about some of the events that the lab has, like the cyber competitions and Cyber Saturdays.
GT: Sure, so Cyber Saturday is something that we try to do about once every couple months or so. That is our way to reach out to people outside of Capitol, especially perspective students who may be interested in the field but don’t know if they want to go into it yet. We have various activities. We sometimes have mini competitions that you can do online, some challenges just to get your feet in the water and see if you’re into this kind of work. We also have a lock picking event so you can try your hand at that. Some people get a little freaked out about the idea, that, oh you’re breaking locks.
That’s cool!
GT: Right? In cybersecurity one important thing that people don’t necessarily think about is physical security. It doesn’t matter how many passwords you have or how long the passwords are that you give your accounts if you just leave your computer there and someone can just come in and take it away. There’s not much you can do about that. So learning lock picking is a way for you to know how to have better physical security, and that’s important.
We also have speakers coming in, so we have representatives who are doing the job as they speak, so students can have a sense of what it’s like and decide if that’s something they want to do in the future.
So that’s only a few of the things that we have people do during Cyber Saturdays. And then, we have two big competitions.
GT: There’s the National Cyber League, which is online based. It’s more beginner friendly, so they have challenges usually at three different levels: easy, medium, and hard. Even if you are a beginner you will be able to answer a lot of the easier questions, which I think is important because when I did my first competition it was a small one but it was not as beginner friendly. And I found that I did not know enough and I did not want to participate in more because I felt like I needed to know more in order to have fun. But with National Cyber League, you get to learn some new things, and you also have the rewarding experience of oh, I solved this challenge.
The other one we have is the Collegiate Cyber Defense Competition, and that one is a lot more intense. It has multiple rounds. The first one is online based, and is the prequalification. If you make it through that you go to the regional round and compete there with a few other teams. During that round, you have actual penetration testers who work in the field actively attacking your infrastructure and you have to defend your systems and make sure your services are up. You also have fake customers calling in on the phones. They will call in and say, I can’t get into my bank account. Then you have your managers and CEO who are asking hey, why are we down, what’s going on and what are you guys doing? So it’s a lot of pressure but it can also be a lot of fun.
A lot of the learning occurs not really in the competition, but in the preparation leading up to it. So what we’re trying to do right now is to have a cyber competition team that meets every week. We plan to study from the very basic concepts up to the complicated ones leading up to the competition next year. With all that time to prepare, I think we’ll be able to do a lot better next year.
That’s really interesting. It’s almost like a mock trial for Cyber.
Yeah.
What is your favorite thing about the lab?
What I appreciate the most is that, as a lab manager, I get to manage the actual infrastructure of the lab, and that’s invaluable experience. We have to work with real systems and make sure that they are working properly so that we can serve students who come in to do their assignments or want to experiment with things and whatnot. We get to make mistakes and learn from them in a way that doesn’t have disastrous consequences. It still sucks when things go down, but that to me is the best way to learn. Even though Capitol classes try to be as hands-on as they can, you can’t get more hands-on than actually working with the systems.
Capitol Technology University has programs in cyber security at the undergraduate, master’s, and doctoral levels. We also have programs in cyber analytics at the undergraduate and master’s levels. If you want to come in and see if cyber might be the right fit for you, check out our workshops, or sign up for a Cyber Saturday.
www.CapTechU.edu
What is the Cyber Lab at Capitol Technology University?
What do the students do there, and how can the lab help me?
We sat down with Capitol Technology University student Giang To to learn more about the cyber opportunities at Capitol. To, a junior at Capitol, is double majoring in Computer Science and Cyber and Information Security. She also has extensive experience at the Cyber Lab, including a stint as lead lab manager.
For those people who may not be familiar with our school, can you describe what the Cyber Lab is and what I might learn there?
GT: The cyber lab is a place for you to come in and gain more hands-on experience than you might get from your classes. Capitol is very geared towards hands-on learning, but that can only go so far in a timed class. In the lab, because it is a lab environment, you get to experiment a lot more. On top of that, a lot of us as lab managers have taken more classes and worked in the field of cyber, so we can serve as peer learning resources to other students.
What I find awesome about that, is that just by hanging out in the lab you hear cyber terms and concepts being thrown around and later on you may come across those notions in your classes. And you can say, hey, I actually heard about that just by hanging out in the lab. I think it’s a great learning environment. It’s not a formal way to learn, but it’s a very effective way to learn what you don’t get to learn in classes.
What is your role in the lab?
GT: I’m the lead lab manager. This means that not only do I help students, but I also organize most things that go on in the lab. So last semester, I pulled everyone together to form a team for the National Cyber League competition. That is online based, so it’s a little bit easier to organize. I mostly sent out emails to let people know what’s coming up and what the timeline is like so that they can see if they can participate. And then I distribute codes so that they can sign up with instructions.
I also need to make sure that I know what’s going on in our infrastructure. Our servers and routers are what make us able to support the lab’s computers. So my role is both administrative and technical, which is a little bit tricky since I only work ten hours in the lab. It’s a lot of work, especially to do it well, but I’ve found it to be an intense learning experience that is giving me the ability to do both the administrative work and handle the technical side of things in the lab.
I know that the Cyber Lab does tutoring, can you speak to that?
GT: Yes, so we help students with their lab assignments. We have lab periods for at least the IAE-201 and IAE-301 classes, where students meet twice a week. For one session students are in class for a lecture with their professor, and for the other class, they are on their own or in the lab doing the lab assignments. During those lab periods, if they have issues that they run into in their lab or don’t understand something, then we will assist them with that. So we don’t do the lab for them, because that defeats the purpose, but we will help them with the concepts.
In helping other students with their labs, we also get to learn more about the material. First, we need to go through the lab first ourselves to make sure that we know what we’re talking about before handling a class. But, sometimes we haven’t thought about some of the questions that students might ask. So by helping them, we are also reinforcing our own knowledge and I think that’s pretty neat.
We talked a little bit about this, but I wanted to ask you about some of the events that the lab has, like the cyber competitions and Cyber Saturdays.
GT: Sure, so Cyber Saturday is something that we try to do about once every couple months or so. That is our way to reach out to people outside of Capitol, especially perspective students who may be interested in the field but don’t know if they want to go into it yet. We have various activities. We sometimes have mini competitions that you can do online, some challenges just to get your feet in the water and see if you’re into this kind of work. We also have a lock picking event so you can try your hand at that. Some people get a little freaked out about the idea, that, oh you’re breaking locks.
That’s cool!
GT: Right? In cybersecurity one important thing that people don’t necessarily think about is physical security. It doesn’t matter how many passwords you have or how long the passwords are that you give your accounts if you just leave your computer there and someone can just come in and take it away. There’s not much you can do about that. So learning lock picking is a way for you to know how to have better physical security, and that’s important.
We also have speakers coming in, so we have representatives who are doing the job as they speak, so students can have a sense of what it’s like and decide if that’s something they want to do in the future.
So that’s only a few of the things that we have people do during Cyber Saturdays. And then, we have two big competitions.
GT: There’s the National Cyber League, which is online based. It’s more beginner friendly, so they have challenges usually at three different levels: easy, medium, and hard. Even if you are a beginner you will be able to answer a lot of the easier questions, which I think is important because when I did my first competition it was a small one but it was not as beginner friendly. And I found that I did not know enough and I did not want to participate in more because I felt like I needed to know more in order to have fun. But with National Cyber League, you get to learn some new things, and you also have the rewarding experience of oh, I solved this challenge.
The other one we have is the Collegiate Cyber Defense Competition, and that one is a lot more intense. It has multiple rounds. The first one is online based, and is the prequalification. If you make it through that you go to the regional round and compete there with a few other teams. During that round, you have actual penetration testers who work in the field actively attacking your infrastructure and you have to defend your systems and make sure your services are up. You also have fake customers calling in on the phones. They will call in and say, I can’t get into my bank account. Then you have your managers and CEO who are asking hey, why are we down, what’s going on and what are you guys doing? So it’s a lot of pressure but it can also be a lot of fun.
A lot of the learning occurs not really in the competition, but in the preparation leading up to it. So what we’re trying to do right now is to have a cyber competition team that meets every week. We plan to study from the very basic concepts up to the complicated ones leading up to the competition next year. With all that time to prepare, I think we’ll be able to do a lot better next year.
That’s really interesting. It’s almost like a mock trial for Cyber.
Yeah.
What is your favorite thing about the lab?
What I appreciate the most is that, as a lab manager, I get to manage the actual infrastructure of the lab, and that’s invaluable experience. We have to work with real systems and make sure that they are working properly so that we can serve students who come in to do their assignments or want to experiment with things and whatnot. We get to make mistakes and learn from them in a way that doesn’t have disastrous consequences. It still sucks when things go down, but that to me is the best way to learn. Even though Capitol classes try to be as hands-on as they can, you can’t get more hands-on than actually working with the systems.
Capitol Technology University has programs in cyber security at the undergraduate, master’s, and doctoral levels. We also have programs in cyber analytics at the undergraduate and master’s levels. If you want to come in and see if cyber might be the right fit for you, check out our workshops, or sign up for a Cyber Saturday.
Can We Distinguish Between Types of Consciousness? - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/can-we-distinguish-between-types-of-consciousness
www.CapTechU.edu
By Jason M. Pittman, Sc.D.
In the last part of this series, I articulated the idea that there are three potential types of consciousness. The first, natural consciousness, is the kind that you and I have. Philosophers have dedicated entire careers to an investigation of what it entails – and to demonstrating that it is not merely an illusion. Descartes, famously, journeyed into a personal Hell to establish that the individual instantiation of natural consciousness does in fact exist.
For the other two types -- artificial and synthetic—we have no direct evidence yet. However, this does not imply they do not exist or will not exist in the future. Can we distinguish among these three types of consciousness? Let’s find out!
Consciousness: On or Off?
I find little rationale for claiming that the types of consciousness are distinguishable. My reasoning rests on two propositions: (1) things either have consciousness or they don’t; and (2) we are conscious.
Let’s consider an example. I’m writing an essay. You are writing an essay as well.
Because I am conscious, and I perceive my consciousness to be the source of my ability to write (and read, by proxy), then you must be conscious too and your consciousness must be like mine in both kind and degree. Obviously, I could ask you if you’re conscious, but I’d have no way to know if you’re lying.
Most of us, in fact, would not think to ask each other such questions. Not only might it seem, rude, but we would consider it unnecessary. We assume, with good reason, that the other person writing an essay is as conscious as we are – and conscious in the same way.
In other words, consciousness is binary to the core; it’s either on or off. There is no objective difference between consciousnesses once they have been instantiated.
Our determination that something like us is conscious is implicit and subconscious. We don’t actively think that the other essay writer must also be conscious because we are; we simply operate as if all of this true. Further, we presuppose that consciousness is the origin of behavior rather than the mediation layer between sensory input and mind/cognition.
So, then, what basis do we have to think that artificial or synthetic consciousness would differ in kind?
In the case of artificial consciousness, because it is by definition imitative of us, I don’t see how we’ll be able to differentiate at all. With synthetic consciousness, there is more of a puzzle.
We perceive things like us to be conscious because they act similarly. At the same time, we seem to believe that things not like us (e.g., plants) are not conscious because those things are not like us. Plants don’t act like us, so we often assume that they do not have consciousness.
As I have noted before, however, there is growing evidence that this assumption is wrong, and that plants may indeed be conscious. Remember, though, that consciousness is binary. It’s either there or it isn’t.
That means plant consciousness ought to not be different in kind from ours. However, plants do not behave the way we do. Plants do not embody intelligence or consciousness as we do. Thus, our assumptions fall short due to the difference in form.
In other words, if we can distinguish a synthetic consciousness from other types, then it must be distinguishable. To be distinguishable, it must be detectable. We cannot reliably detect consciousnesses that are not like ours (yet).
Now that I’ve presented my answer to the question posed at the start of this post, let’s take the discussion a step further. The different types of consciousness are indistinguishable – and that’s potentially a bad thing. Tune in next time for my thoughts on why it’s a problem, and on how we might address it.
www.CapTechU.edu
By Jason M. Pittman, Sc.D.
In the last part of this series, I articulated the idea that there are three potential types of consciousness. The first, natural consciousness, is the kind that you and I have. Philosophers have dedicated entire careers to an investigation of what it entails – and to demonstrating that it is not merely an illusion. Descartes, famously, journeyed into a personal Hell to establish that the individual instantiation of natural consciousness does in fact exist.
For the other two types -- artificial and synthetic—we have no direct evidence yet. However, this does not imply they do not exist or will not exist in the future. Can we distinguish among these three types of consciousness? Let’s find out!
Consciousness: On or Off?
I find little rationale for claiming that the types of consciousness are distinguishable. My reasoning rests on two propositions: (1) things either have consciousness or they don’t; and (2) we are conscious.
Let’s consider an example. I’m writing an essay. You are writing an essay as well.
Because I am conscious, and I perceive my consciousness to be the source of my ability to write (and read, by proxy), then you must be conscious too and your consciousness must be like mine in both kind and degree. Obviously, I could ask you if you’re conscious, but I’d have no way to know if you’re lying.
Most of us, in fact, would not think to ask each other such questions. Not only might it seem, rude, but we would consider it unnecessary. We assume, with good reason, that the other person writing an essay is as conscious as we are – and conscious in the same way.
In other words, consciousness is binary to the core; it’s either on or off. There is no objective difference between consciousnesses once they have been instantiated.
Our determination that something like us is conscious is implicit and subconscious. We don’t actively think that the other essay writer must also be conscious because we are; we simply operate as if all of this true. Further, we presuppose that consciousness is the origin of behavior rather than the mediation layer between sensory input and mind/cognition.
So, then, what basis do we have to think that artificial or synthetic consciousness would differ in kind?
In the case of artificial consciousness, because it is by definition imitative of us, I don’t see how we’ll be able to differentiate at all. With synthetic consciousness, there is more of a puzzle.
We perceive things like us to be conscious because they act similarly. At the same time, we seem to believe that things not like us (e.g., plants) are not conscious because those things are not like us. Plants don’t act like us, so we often assume that they do not have consciousness.
As I have noted before, however, there is growing evidence that this assumption is wrong, and that plants may indeed be conscious. Remember, though, that consciousness is binary. It’s either there or it isn’t.
That means plant consciousness ought to not be different in kind from ours. However, plants do not behave the way we do. Plants do not embody intelligence or consciousness as we do. Thus, our assumptions fall short due to the difference in form.
In other words, if we can distinguish a synthetic consciousness from other types, then it must be distinguishable. To be distinguishable, it must be detectable. We cannot reliably detect consciousnesses that are not like ours (yet).
Now that I’ve presented my answer to the question posed at the start of this post, let’s take the discussion a step further. The different types of consciousness are indistinguishable – and that’s potentially a bad thing. Tune in next time for my thoughts on why it’s a problem, and on how we might address it.
DoD awards prestigious SMART scholarship to Capitol student Joshua Joseph - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/dod-awards-prestigious-smart-scholarship-capitol-student-joshua-joseph
www.CapTechU.edu
A Capitol student received some game-changing news this past semester: he’ll be completing the remainder of his studies tuition-free, with an additional stipend to cover room and board, and guaranteed employment after he receives his degree.
Joshua Joseph, who is double-majoring in computer science and cybersecurity, has been accepted into the Department of Defense’s Science, Mathematics And Research for Transformation (SMART) Scholarship for Service program, established in 2005 with the goal of attracting some of the best and brightest talents in science, technology, engineering, and math (STEM).
“I’m excited,” Joseph said of the award. “It will have a big impact, particularly in terms of easing my family’s financial burden. SMART pays for all your tuition, as well as your health insurance. It provides a stipend of between $25K and $35K a year for room, board and fees. You also receive a guaranteed internship over the summer, and guaranteed work after you graduate.”
The SMART program, according to its official website, aims “to increase the number of civilian scientists and engineers working at DoD facilities.” It is highly selective, with recipients earning an average GPA of over 3.7.
Joseph, who is going into his senior year, is no stranger to academic achievement, having excelled first in high school and then at Capitol. Meanwhile, he has also been active on campus, volunteering at the university’s Cyber Lab and, more recently, its newly-launched Brain-Machine Interface research center.
“I’m very interested in artificial intelligence,” he says of the latter project. “It’s something I’d like to explore further in graduate school.”
The decision to double-major came about through his involvement in the Cyber Lab, where he is now a lab manager. “I came here to study computer science, but from my first week at Capitol I started volunteering at the lab. I already had a cybersecurity background going back to high school and had done an internship in the field. As I showed [cybersecurity] professors William Butler and Rick Hansen that I knew certain things, they suggested that I add cyber as my dual major,” he explained.
With both of his majors, there are particular areas of focus that appeal to him.
“In terms of cyber, I like malware analysis,” Joseph says. “Just being able to identify different kinds of malware, then analyze it and see what it’s capable of and what it does under certain conditions – it’s really intriguing. Malware can behave almost like a life form. And malware analysis relates to my interest in artificial intelligence.”
“As for computer science, I just like coding. It’s fun, and there’s a lot of utility to it.”
SMART is among several DoD-sponsored educational initiatives that operate through the National Defense Education Program, with funding through the Office of the Secretary of Defense. The opportunity to apply to the program is offered annually to “students who have demonstrated ability and aptitude for excelling in STEM fields in disciplines of importance to DoD,” according to the official website.
www.CapTechU.edu
A Capitol student received some game-changing news this past semester: he’ll be completing the remainder of his studies tuition-free, with an additional stipend to cover room and board, and guaranteed employment after he receives his degree.
Joshua Joseph, who is double-majoring in computer science and cybersecurity, has been accepted into the Department of Defense’s Science, Mathematics And Research for Transformation (SMART) Scholarship for Service program, established in 2005 with the goal of attracting some of the best and brightest talents in science, technology, engineering, and math (STEM).
“I’m excited,” Joseph said of the award. “It will have a big impact, particularly in terms of easing my family’s financial burden. SMART pays for all your tuition, as well as your health insurance. It provides a stipend of between $25K and $35K a year for room, board and fees. You also receive a guaranteed internship over the summer, and guaranteed work after you graduate.”
The SMART program, according to its official website, aims “to increase the number of civilian scientists and engineers working at DoD facilities.” It is highly selective, with recipients earning an average GPA of over 3.7.
Joseph, who is going into his senior year, is no stranger to academic achievement, having excelled first in high school and then at Capitol. Meanwhile, he has also been active on campus, volunteering at the university’s Cyber Lab and, more recently, its newly-launched Brain-Machine Interface research center.
“I’m very interested in artificial intelligence,” he says of the latter project. “It’s something I’d like to explore further in graduate school.”
The decision to double-major came about through his involvement in the Cyber Lab, where he is now a lab manager. “I came here to study computer science, but from my first week at Capitol I started volunteering at the lab. I already had a cybersecurity background going back to high school and had done an internship in the field. As I showed [cybersecurity] professors William Butler and Rick Hansen that I knew certain things, they suggested that I add cyber as my dual major,” he explained.
With both of his majors, there are particular areas of focus that appeal to him.
“In terms of cyber, I like malware analysis,” Joseph says. “Just being able to identify different kinds of malware, then analyze it and see what it’s capable of and what it does under certain conditions – it’s really intriguing. Malware can behave almost like a life form. And malware analysis relates to my interest in artificial intelligence.”
“As for computer science, I just like coding. It’s fun, and there’s a lot of utility to it.”
SMART is among several DoD-sponsored educational initiatives that operate through the National Defense Education Program, with funding through the Office of the Secretary of Defense. The opportunity to apply to the program is offered annually to “students who have demonstrated ability and aptitude for excelling in STEM fields in disciplines of importance to DoD,” according to the official website.
Monday, June 4, 2018
Boost Your Skill Set Through Student Clubs - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/boost-your-skill-set-through-student-clubs
www.CapTechU.edu
By Sarah Alspaw, Director of Career Development and Student Success
Here at Capitol, we're very proud of all of the clubs and activities that our students participate in. They add fun and vibrancy to the campus experience and enable students explore a variety of interests, whether social, creative, athletic, or technical.
Not only that, but clubs and activities provide a way to develop additional skills that will strengthen a resume – particularly when students know how to convey the value of these experiences to prospective employers.
With some clubs at Capitol, this is straightforward, because the focus is on activities where there is a clear, easy-to-see correlation with plans for work after graduation. Cactus I, VelcroSat, and the other CubeSat and balloon payload teams are actually building and launching. The Cyber Battle Team is actually penetration testing and protecting assets. The Robotics Club is actually building robots. It is easy for students to explain in an interview exactly what they are learning from these types of activities.
It can be a little bit tougher for other types of clubs. These clubs’ activities have significant value too, but it's not as immediately obvious to the uninformed observer. But don't be discouraged! What this means, in essence, is that students involved in these activities must learn to be effective communicators. It is up to you to articulate and identify the skills you are gaining.
There are leadership clubs on campus, such as S-Lab, where students learn a variety of skills including, but not limited to, leadership, teamwork and collaboration, communication skills, and event planning. These skills can also be gained by serving as president, or in another cabinet position. Club secretaries learn budget planning, prioritization, effective written communication, and interdepartmental collaboration.
Founding a club, no matter what it is about, can demonstrate initiative, an entrepreneurial spirit, and an ability to understand and navigate bureaucratic regulations. Founders must also think through strategic vision when establishing, advertising, and building new clubs.
Even just being a member of a club requires an ability to work effectively with your peers. It requires oral and sometimes written communication skills, teaches students professionalism, and inevitably, provides an opportunity to practice effective conflict management.
These experiences are great for answering behavioral questions in an interview. I’ll be back next month to blog about what behavioral interview questions are, and how to answer them effectively in a short amount of time.
www.CapTechU.edu
By Sarah Alspaw, Director of Career Development and Student Success
Here at Capitol, we're very proud of all of the clubs and activities that our students participate in. They add fun and vibrancy to the campus experience and enable students explore a variety of interests, whether social, creative, athletic, or technical.
Not only that, but clubs and activities provide a way to develop additional skills that will strengthen a resume – particularly when students know how to convey the value of these experiences to prospective employers.
With some clubs at Capitol, this is straightforward, because the focus is on activities where there is a clear, easy-to-see correlation with plans for work after graduation. Cactus I, VelcroSat, and the other CubeSat and balloon payload teams are actually building and launching. The Cyber Battle Team is actually penetration testing and protecting assets. The Robotics Club is actually building robots. It is easy for students to explain in an interview exactly what they are learning from these types of activities.
It can be a little bit tougher for other types of clubs. These clubs’ activities have significant value too, but it's not as immediately obvious to the uninformed observer. But don't be discouraged! What this means, in essence, is that students involved in these activities must learn to be effective communicators. It is up to you to articulate and identify the skills you are gaining.
There are leadership clubs on campus, such as S-Lab, where students learn a variety of skills including, but not limited to, leadership, teamwork and collaboration, communication skills, and event planning. These skills can also be gained by serving as president, or in another cabinet position. Club secretaries learn budget planning, prioritization, effective written communication, and interdepartmental collaboration.
Founding a club, no matter what it is about, can demonstrate initiative, an entrepreneurial spirit, and an ability to understand and navigate bureaucratic regulations. Founders must also think through strategic vision when establishing, advertising, and building new clubs.
Even just being a member of a club requires an ability to work effectively with your peers. It requires oral and sometimes written communication skills, teaches students professionalism, and inevitably, provides an opportunity to practice effective conflict management.
These experiences are great for answering behavioral questions in an interview. I’ll be back next month to blog about what behavioral interview questions are, and how to answer them effectively in a short amount of time.
Friday, June 1, 2018
Privacy: Information as Currency - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/privacy-information-currency
www.CapTechU.edu
By Dr. Jason M. Pittman
Readers of this continuing series on privacy will recall that, in the last installment, I discussed the concept of information parity. When information is in a state that enables us to exchange it freely, or when others are able to access the same information as we can, without restriction, then we can say that parity exists.
I suggested the rising demand for privacy -- a topic which has come to dominate many discussions about technological innovation, particularly with regard to digital domains -- is connected to information parity.
This week, I want to introduce another attribute of information: its potential to be used as currency.
Currency and parity are related. When information is in a state of non-parity, then the opportunity exists to use it as currency. It is harder to do that when exchange of information is unrestricted. Consider academic databases, for example. They charge a fee, often a steep one, to users wishing to access a particular academic paper. Parity does not exist in this case, because access to the information is not unconstrained. If it were, no one would pay the fee.
What is information as currency then and how does it lead us to ending privacy altogether? Let’s find out!
Currency, in the privacy context, has two potential expressions. The first expression deals with currency as an object that can be exchanged.
This exchange is volatile and can modulate according to external pressures. Oddly, the exchange of information defies the apparent nature of information, in that an information exchange operates under the premise that one party gains information at the cost of the information itself (to the other party). Exchange is not an expense to information though. Rather, exchange is perceived to be at the expense of exclusivity of knowing information. We’ll come back to this point later.
Secondly, currency is a container for value. The specific value of note in this context is power. The power associated with information has two additional aspects: power over information through people and power over people through information. Yet, information as a currency is not a modern abstraction, as many proclaim. Certainly, information has been capable of exchange since the earliest form of oral transmission. Similarly, we can envision how information has served as a container for power once a method of fixation become available whether that was stone carvings or Twitter posts.
As information is exchanged, we perceive negative exchanges more strongly than positive exchanges. This is to say, the exchange of information away from our power base creates a more intense mental imprint than an incoming exchange. As such, the net perception is an information deficit. Deficits are powerful incentive pathways.
Privacy comes back into the picture because it counteracts such (negative) information exchanges. More specifically, privacy counteracts undesired information exchanges. The fact that undesired information exchanges exist strongly implies that disparity is a dominant information state. A fantastic example of information as a currency in this regard is social media.
Social media have done more to instigate the rising demand for privacy than any other system. Social media have made clear how information is brokered between entities. More importantly, the power of information serves as the access fee to these information brokerages.
Yet information is not money. We do not provide a specific quantity of information to access social media. Thus, social media reinforces the feeling of information disparity based upon information as currency. Certainly, the combined ideas of currency exchange and currency as a container for power fosters a perception of privacy being an equation balancer in some sense. This is just an illusion, however.
To dispel this illusion, I suggest that privacy must end. We need more information, and more information sharing free from the bonds of an illusionary currency. We ought to recognize the real currency of information - power- and work towards equitable exchanges thereof. Such exchange presupposes that information is around long enough to be exchangeable. Thus, tune in next time when I discuss the permanency of information.
www.CapTechU.edu
By Dr. Jason M. Pittman
Readers of this continuing series on privacy will recall that, in the last installment, I discussed the concept of information parity. When information is in a state that enables us to exchange it freely, or when others are able to access the same information as we can, without restriction, then we can say that parity exists.
I suggested the rising demand for privacy -- a topic which has come to dominate many discussions about technological innovation, particularly with regard to digital domains -- is connected to information parity.
This week, I want to introduce another attribute of information: its potential to be used as currency.
Currency and parity are related. When information is in a state of non-parity, then the opportunity exists to use it as currency. It is harder to do that when exchange of information is unrestricted. Consider academic databases, for example. They charge a fee, often a steep one, to users wishing to access a particular academic paper. Parity does not exist in this case, because access to the information is not unconstrained. If it were, no one would pay the fee.
What is information as currency then and how does it lead us to ending privacy altogether? Let’s find out!
Currency, in the privacy context, has two potential expressions. The first expression deals with currency as an object that can be exchanged.
This exchange is volatile and can modulate according to external pressures. Oddly, the exchange of information defies the apparent nature of information, in that an information exchange operates under the premise that one party gains information at the cost of the information itself (to the other party). Exchange is not an expense to information though. Rather, exchange is perceived to be at the expense of exclusivity of knowing information. We’ll come back to this point later.
Secondly, currency is a container for value. The specific value of note in this context is power. The power associated with information has two additional aspects: power over information through people and power over people through information. Yet, information as a currency is not a modern abstraction, as many proclaim. Certainly, information has been capable of exchange since the earliest form of oral transmission. Similarly, we can envision how information has served as a container for power once a method of fixation become available whether that was stone carvings or Twitter posts.
As information is exchanged, we perceive negative exchanges more strongly than positive exchanges. This is to say, the exchange of information away from our power base creates a more intense mental imprint than an incoming exchange. As such, the net perception is an information deficit. Deficits are powerful incentive pathways.
Privacy comes back into the picture because it counteracts such (negative) information exchanges. More specifically, privacy counteracts undesired information exchanges. The fact that undesired information exchanges exist strongly implies that disparity is a dominant information state. A fantastic example of information as a currency in this regard is social media.
Social media have done more to instigate the rising demand for privacy than any other system. Social media have made clear how information is brokered between entities. More importantly, the power of information serves as the access fee to these information brokerages.
Yet information is not money. We do not provide a specific quantity of information to access social media. Thus, social media reinforces the feeling of information disparity based upon information as currency. Certainly, the combined ideas of currency exchange and currency as a container for power fosters a perception of privacy being an equation balancer in some sense. This is just an illusion, however.
To dispel this illusion, I suggest that privacy must end. We need more information, and more information sharing free from the bonds of an illusionary currency. We ought to recognize the real currency of information - power- and work towards equitable exchanges thereof. Such exchange presupposes that information is around long enough to be exchangeable. Thus, tune in next time when I discuss the permanency of information.
Capitol Astronautical Engineering student projects aim for the skies…literally - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/astronautical-engineering-student-projects
www.CapTechU.edu
As summer 2018 approaches, a group of engineering and computer science students at Capitol Technology University is awaiting a NASA rocket launch that will take their project into orbit.
Another team of students, meanwhile, is celebrating an early milestone in their project: a successful balloon flight that demonstrated that things are in working order.
Both of these projects are examples of the “crawl, walk, run, fly” philosophy that drives the astronautical engineering program at Capitol – a school that emphasizes the importance of gaining practical experience in the field, in addition to learning concepts.
“We’re in the final stretch,” says Pierce Smith, lead engineer of the of the Cactus-1 student satellite project, with regard to the rocket launch. He and fellow project members are eagerly awaiting the moment when their payload – which includes two separate experiments – blasts off into space.
The student-designed experiments set to go into orbit include an aerogel-based approach to capturing space debris and a system for controlling satellites via the Iridium constellation.
As the Cactus-1 team was busy putting the final touches on their payload, members of the second team – known as Project Aether – traveled to the Maryland-Pennsylvania border and tested their handiwork during a two-and-half hour balloon flight.
“We proved the viability of our power boards, software, and secondary science payload,’ says Sam Lawson, the team’s CAD designer. “Everything is working well.”
Their mission, intended to observe the effects of the Aurora Borealis on the atmosphere while testing the performance of a new insulation system and compare data rates from multiple sources, has been selected for the prestigious RockSat-X program in Norway, as part of the international Grand Challenge Initiative, culminating in a launch aboard a sounding rocket.
“Crawl, Walk, Run, Fly,” the approach utilized for both student projects, is a standardized development cycle designed to ensure that missions can achieve all their needed requirements, including funding, paperwork, and successful testing.
Students begin by fleshing out their ideas in the form of a mission statement and defined goals and objectives. They create concepts and prototypes, then begin a series of high-altitude balloon tests.
Once they are confident of success, they move to NASA-accredited tests and sounding rocket flights. Ultimately, students aim for a full orbital mission, such as the one Cactus-1 is currently awaiting.
The emphasis on gaining experience through hands-on projects is a hallmark of Capitol’s astronautical engineering program, says Professor Angela Walters, the program chair.
“Capitol students get a wealth of practical experience that will help them build their careers,” she says. “They have the opportunity to work on a mission that’s going to fly in space.”
www.CapTechU.edu
As summer 2018 approaches, a group of engineering and computer science students at Capitol Technology University is awaiting a NASA rocket launch that will take their project into orbit.
Another team of students, meanwhile, is celebrating an early milestone in their project: a successful balloon flight that demonstrated that things are in working order.
Both of these projects are examples of the “crawl, walk, run, fly” philosophy that drives the astronautical engineering program at Capitol – a school that emphasizes the importance of gaining practical experience in the field, in addition to learning concepts.
“We’re in the final stretch,” says Pierce Smith, lead engineer of the of the Cactus-1 student satellite project, with regard to the rocket launch. He and fellow project members are eagerly awaiting the moment when their payload – which includes two separate experiments – blasts off into space.
The student-designed experiments set to go into orbit include an aerogel-based approach to capturing space debris and a system for controlling satellites via the Iridium constellation.
As the Cactus-1 team was busy putting the final touches on their payload, members of the second team – known as Project Aether – traveled to the Maryland-Pennsylvania border and tested their handiwork during a two-and-half hour balloon flight.
“We proved the viability of our power boards, software, and secondary science payload,’ says Sam Lawson, the team’s CAD designer. “Everything is working well.”
Their mission, intended to observe the effects of the Aurora Borealis on the atmosphere while testing the performance of a new insulation system and compare data rates from multiple sources, has been selected for the prestigious RockSat-X program in Norway, as part of the international Grand Challenge Initiative, culminating in a launch aboard a sounding rocket.
“Crawl, Walk, Run, Fly,” the approach utilized for both student projects, is a standardized development cycle designed to ensure that missions can achieve all their needed requirements, including funding, paperwork, and successful testing.
Students begin by fleshing out their ideas in the form of a mission statement and defined goals and objectives. They create concepts and prototypes, then begin a series of high-altitude balloon tests.
Once they are confident of success, they move to NASA-accredited tests and sounding rocket flights. Ultimately, students aim for a full orbital mission, such as the one Cactus-1 is currently awaiting.
The emphasis on gaining experience through hands-on projects is a hallmark of Capitol’s astronautical engineering program, says Professor Angela Walters, the program chair.
“Capitol students get a wealth of practical experience that will help them build their careers,” she says. “They have the opportunity to work on a mission that’s going to fly in space.”
Unmanned Aircraft Myths - Capitol Technology University (Since 1927 Located Near Washington D.C.)
Direct Link: https://www.captechu.edu/blog/unmanned-aircraft-myths
www.CapTechU.edu
With the development of unmanned systems technology comes tremendous potential, especially in the field of aviation. According to an economic report by the Association for Unmanned Vehicle Systems International, the largest growth of UAS will be in commercial applications. The FAA considers unmanned aircraft (commonly known as “drones”) to be aircraft and thus subject to regulation for safety reasons.
The complexity of the rules and regulations of the FAA and the lack of familiarity among the public at large have led to some misconceptions about flying UAS. Some of these have been told and retold to the point that they have turned into widely-believed myths. In this blog post, I hope to address some of these myths and offer information that will help clarify the reality.
Some of these myths may be more widespread than others. The numbering below does not necessarily indicate relative importance or prevalence.
Myth 1: It’s not a drone. It’s an unmanned aircraft.
A few years ago, the word “drone” was commonly used by the media and public to refer to military UAS being utilized overseas. Such connotations became disconcerting when applied to three-pound quadcopters flown by civilians in their back yards. Over time, however, many have come to understand that “drone” means any unmanned aircraft (UA), regardless of use, and the term has now become well-established. Other terms used by the industry include unmanned aerial vehicles (UAV), unmanned aircraft systems (UAS), and remotely-piloted aircraft (RPA).
In addition, “drone” is used for vehicles in other environments such as underwater or on land. Underwater drones are also referred to as remotely operated vehicles or ROVs, while ground drones are unmanned ground vehicles or UGVs.
Myth 2: There are no laws that regulate drones.
The next time you hear someone say (or post on social media) that drones are unregulated, you may want to suggest they check their facts. The Federal Aviation Administration (FAA) is responsible for the safety of people and aircraft in the National Airspace System and has broad authority over any aircraft (including drones) flying in it. Under Title 49 U.S.C. § 44701, all civil aircraft are subject to FAA regulation. Definitions found under Title 49 U.S.C. § 40102(a)(6) and Title 14 C.F.R. § 1.1 state that unmanned aircraft are aircraft, regardless of whether the operation is for recreational, hobby, business, or commercial purposes. Under these statutes, the FAA considers hobby and model aircraft to be “aircraft” and to be regulated as such. The FAA Modernization and Reform Act of 2012 (Public Law 112-95) Section 336 set specific requirements for hobbyists and model operators for safe operations.
Myth 3: A model aircraft is not a drone or unmanned aircraft
Under Section 336 of Public Law 112-95, Congress legally defined a model aircraft as a type of unmanned aircraft. Section 331(6),(8), and (9) define the terms “small unmanned aircraft,” “unmanned aircraft,” and “unmanned aircraft system” as aircraft. Model aircraft are also defined as “aircraft” per Public Law 112-95, section 336(c). Therefore, a model aircraft is an unmanned aircraft or a “drone.”
The difference between a model aircraft and a UAS is that a model aircraft is flown within visual line of sight of the person operating the aircraft and flown for hobby or recreational purposes only. If a person is operating a “model aircraft” for a commercial purpose, then it is legally a UAS and the operator must have the proper FAA authorization.
Myth 4: Drones will invade our privacy.
The unmanned systems industry (air, ground and water) is not opposed to privacy laws. However, there is opposition to legislation that focuses on one type of technology while overlooking problems and risks such as the handling of data. Privacy legislation should concentrate on the data collected regardless of method, and consider the protections provided by the First Amendment. Legislators should consider privacy with a “technology-neutral” approach because of rapid technology change. Also, current FAA safety regulations already prevent many privacy problems with drones because of limitations on proximity to structures and overflight of people.
Myth 5: Drones are armed and dangerous.
Many people still consider drones to be ominous flying objects, controlled remotely, and ready to attack at any time. Such perceptions often stem from media coverage that highlight military UAVs firing missiles. In reality, the majority of U.S. military unmanned aircraft are unarmed. They are used not to deploy weapons but to acquire imagery that often helps save the lives of troops on the ground.
The FAA’s position is that, under federal law, armed non-military aircraft (manned or unmanned) are strictly prohibited and illegal. Under Title 14 CFR Part 107.36, the carrying of hazardous materials is also forbidden. Title 49 CFR 171.8 states that items such as explosives, compressed gas, and flammable gas are prohibited. Therefore, weapons of any kind, flamethrowers, and paintball or airsoft guns cannot be attached to a UAS.
Myth 6: Drones are easy to operate.
Chances are, you’ve seen pictures or video of someone flying a drone with a hand-held controller, or even with first-person-view goggles. You may have seen drone racing. In all these cases, operating a drone can look easier than it actually is. There are numerous safety and risk management issues that should be addressed.
Every UAS operator should have training and knowledge of the system. Even though some UAS have automated safety features, piloting skills are still needed to manage unexpected problems. No one is exempt from the occasional system failure or communication interruption. Some vehicles may require extensive practice to learn their particular handling features or non-intuitive interfaces.
Learning to operate a drone correctly and effectively makes for an excellent investment. Many UAS manufacturers offer training or can advise where to obtain it. Some courses take a few days and others may take weeks. Regardless, this may be an opportunity to obtain your Part 107 remote pilot operator certificate.
Myth 7: Drones are only used for spying and military operations.
Over the past 100 years, much of our aviation technology has been developed by the military and eventually found its way to civilian applications. Over time, civil non-military applications have grown larger and more numerous than military ones. The same will be true with unmanned aircraft (“drones”). Considerable attention has been given to the use of drones by law enforcement and government agencies, but there are many other potential non-military uses.
Unmanned systems are tools that extend human capabilities and improve efficiency, and unmanned aircraft can aid commerce and industry in countless ways. As stated by AUVSI’s economic report and report on the first 1000 commercial UAS exemptions, drones are being used – or will be used in the near future -- for precision agriculture, surveying, news reporting, videography, cargo delivery, first responder support, firefighting, and utilities. They can be used on building sites, to aid in train maintenance, or as part of aircraft manufacturing. Indeed, the number of applications for unmanned aircraft is limited only by current technology and the imaginations of UAS operators in finding new ways to apply them. Since the release of the FAA’s Part 107 for small unmanned aircraft, the commercial world is seeing a profound impact.
Myth 8: Drones are toys for people to play with on the weekend
While it is true that UAVs weighing less than 250g are in high demand, particularly among hobbyists, drones in general have many purposes besides recreation (see Myth 7, above). It is estimated that the market was worth $17 billion in 2017; this figure is expected to reach $30 billion by 2022. It is also estimated that 250,000 will be employed in the sector globally within five years.
Myth 9: Drones could cause an aircraft to crash.
Exclusion zones exist around airfields in order to prevent interference with planes as they take off and land. If a large drone hit the engine intake at the critical stage of takeoff, the effect could be serious.
That said, aircraft (B-777 for example) have powerful engines that are designed to accommodate an engine loss at critical flight stages. A skilled pilot would be expected to control the aircraft and land safely.
By Richard E. Baker, PhD
www.CapTechU.edu
With the development of unmanned systems technology comes tremendous potential, especially in the field of aviation. According to an economic report by the Association for Unmanned Vehicle Systems International, the largest growth of UAS will be in commercial applications. The FAA considers unmanned aircraft (commonly known as “drones”) to be aircraft and thus subject to regulation for safety reasons.
The complexity of the rules and regulations of the FAA and the lack of familiarity among the public at large have led to some misconceptions about flying UAS. Some of these have been told and retold to the point that they have turned into widely-believed myths. In this blog post, I hope to address some of these myths and offer information that will help clarify the reality.
Some of these myths may be more widespread than others. The numbering below does not necessarily indicate relative importance or prevalence.
Myth 1: It’s not a drone. It’s an unmanned aircraft.
A few years ago, the word “drone” was commonly used by the media and public to refer to military UAS being utilized overseas. Such connotations became disconcerting when applied to three-pound quadcopters flown by civilians in their back yards. Over time, however, many have come to understand that “drone” means any unmanned aircraft (UA), regardless of use, and the term has now become well-established. Other terms used by the industry include unmanned aerial vehicles (UAV), unmanned aircraft systems (UAS), and remotely-piloted aircraft (RPA).
In addition, “drone” is used for vehicles in other environments such as underwater or on land. Underwater drones are also referred to as remotely operated vehicles or ROVs, while ground drones are unmanned ground vehicles or UGVs.
Myth 2: There are no laws that regulate drones.
The next time you hear someone say (or post on social media) that drones are unregulated, you may want to suggest they check their facts. The Federal Aviation Administration (FAA) is responsible for the safety of people and aircraft in the National Airspace System and has broad authority over any aircraft (including drones) flying in it. Under Title 49 U.S.C. § 44701, all civil aircraft are subject to FAA regulation. Definitions found under Title 49 U.S.C. § 40102(a)(6) and Title 14 C.F.R. § 1.1 state that unmanned aircraft are aircraft, regardless of whether the operation is for recreational, hobby, business, or commercial purposes. Under these statutes, the FAA considers hobby and model aircraft to be “aircraft” and to be regulated as such. The FAA Modernization and Reform Act of 2012 (Public Law 112-95) Section 336 set specific requirements for hobbyists and model operators for safe operations.
Myth 3: A model aircraft is not a drone or unmanned aircraft
Under Section 336 of Public Law 112-95, Congress legally defined a model aircraft as a type of unmanned aircraft. Section 331(6),(8), and (9) define the terms “small unmanned aircraft,” “unmanned aircraft,” and “unmanned aircraft system” as aircraft. Model aircraft are also defined as “aircraft” per Public Law 112-95, section 336(c). Therefore, a model aircraft is an unmanned aircraft or a “drone.”
The difference between a model aircraft and a UAS is that a model aircraft is flown within visual line of sight of the person operating the aircraft and flown for hobby or recreational purposes only. If a person is operating a “model aircraft” for a commercial purpose, then it is legally a UAS and the operator must have the proper FAA authorization.
Myth 4: Drones will invade our privacy.
The unmanned systems industry (air, ground and water) is not opposed to privacy laws. However, there is opposition to legislation that focuses on one type of technology while overlooking problems and risks such as the handling of data. Privacy legislation should concentrate on the data collected regardless of method, and consider the protections provided by the First Amendment. Legislators should consider privacy with a “technology-neutral” approach because of rapid technology change. Also, current FAA safety regulations already prevent many privacy problems with drones because of limitations on proximity to structures and overflight of people.
Myth 5: Drones are armed and dangerous.
Many people still consider drones to be ominous flying objects, controlled remotely, and ready to attack at any time. Such perceptions often stem from media coverage that highlight military UAVs firing missiles. In reality, the majority of U.S. military unmanned aircraft are unarmed. They are used not to deploy weapons but to acquire imagery that often helps save the lives of troops on the ground.
The FAA’s position is that, under federal law, armed non-military aircraft (manned or unmanned) are strictly prohibited and illegal. Under Title 14 CFR Part 107.36, the carrying of hazardous materials is also forbidden. Title 49 CFR 171.8 states that items such as explosives, compressed gas, and flammable gas are prohibited. Therefore, weapons of any kind, flamethrowers, and paintball or airsoft guns cannot be attached to a UAS.
Myth 6: Drones are easy to operate.
Chances are, you’ve seen pictures or video of someone flying a drone with a hand-held controller, or even with first-person-view goggles. You may have seen drone racing. In all these cases, operating a drone can look easier than it actually is. There are numerous safety and risk management issues that should be addressed.
Every UAS operator should have training and knowledge of the system. Even though some UAS have automated safety features, piloting skills are still needed to manage unexpected problems. No one is exempt from the occasional system failure or communication interruption. Some vehicles may require extensive practice to learn their particular handling features or non-intuitive interfaces.
Learning to operate a drone correctly and effectively makes for an excellent investment. Many UAS manufacturers offer training or can advise where to obtain it. Some courses take a few days and others may take weeks. Regardless, this may be an opportunity to obtain your Part 107 remote pilot operator certificate.
Myth 7: Drones are only used for spying and military operations.
Over the past 100 years, much of our aviation technology has been developed by the military and eventually found its way to civilian applications. Over time, civil non-military applications have grown larger and more numerous than military ones. The same will be true with unmanned aircraft (“drones”). Considerable attention has been given to the use of drones by law enforcement and government agencies, but there are many other potential non-military uses.
Unmanned systems are tools that extend human capabilities and improve efficiency, and unmanned aircraft can aid commerce and industry in countless ways. As stated by AUVSI’s economic report and report on the first 1000 commercial UAS exemptions, drones are being used – or will be used in the near future -- for precision agriculture, surveying, news reporting, videography, cargo delivery, first responder support, firefighting, and utilities. They can be used on building sites, to aid in train maintenance, or as part of aircraft manufacturing. Indeed, the number of applications for unmanned aircraft is limited only by current technology and the imaginations of UAS operators in finding new ways to apply them. Since the release of the FAA’s Part 107 for small unmanned aircraft, the commercial world is seeing a profound impact.
Myth 8: Drones are toys for people to play with on the weekend
While it is true that UAVs weighing less than 250g are in high demand, particularly among hobbyists, drones in general have many purposes besides recreation (see Myth 7, above). It is estimated that the market was worth $17 billion in 2017; this figure is expected to reach $30 billion by 2022. It is also estimated that 250,000 will be employed in the sector globally within five years.
Myth 9: Drones could cause an aircraft to crash.
Exclusion zones exist around airfields in order to prevent interference with planes as they take off and land. If a large drone hit the engine intake at the critical stage of takeoff, the effect could be serious.
That said, aircraft (B-777 for example) have powerful engines that are designed to accommodate an engine loss at critical flight stages. A skilled pilot would be expected to control the aircraft and land safely.
By Richard E. Baker, PhD
Subscribe to:
Posts (Atom)