Σάββατο 22 Απριλίου 2017

valoll on siis tekemista energian ja massankanssa

miten valo vaikutt massaan. miten sinä vaikutat massaan miten minä vaikutanhttp://www.reumanhoito.fi/selkarankareuma/elamaa-reuman-kanssa/sairastuminen-alkuoireisto/ telee 24.5.2017 kello 12 Helsingin yliopiston kasvatustieteellisessä tiedekunnassa aiheesta "Kuvatulkinta ja maantieteellinen tarkkaavaisuus - Semioottinen ajattelutapa nuorten visuaalisen lukutaidon osana" (The Interpretation of Photographs and Geographical Vigilance: A Semiotic Way of Thinking as Part of Young People's Visual Literacy Skills). Väitöstilaisuus järjestetään osoitteessa Päärakennus, Pieni juhlasali, Fabianinkatu 33. Vastaväittäjänä on professori Janne Seppänen, Tampereen yliopisto, ja kustoksena on professori Sirpa Tani. Väitöskirja julkaistaan sarjassa Kasvatustieteellisiä tutkimuksia.Kuntosaliohjaaja: Tämä on hyvä laite ulkoreisille ja pakaroille. Minä: Onko vaarana, että alienit sieppaavat minut? #scifi #kuntoutuslive

Τρίτη 11 Απριλίου 2017

https://www.suomirakentaa.fi/omakotirakentaja/laemmitys/laemmityksen-valinta CAKE by Accelerize Continues International Momentum with Growing Revenue from the EMEA Region CAKE's SaaS Solution Tracks,

https://en.wikipedia.org/wiki/Fornj%C3%B3t https://www.facebook.com/%CE%89-%CE%9A%CE%BB%CE%B7%CE%BC%CE%B1%CF%84%CE%B1%CF%81%CE%B9%CE%AC-%CF%80%CE%B1%CF%81%CE%B1%CE%B4%CE%BF%CF%83%CE%B9%CE%B1%CE%BA%CF%8C-%CE%BA%CE%B1%CF%86%CE%B5%CE%BD%CE%B5%CE%AF%CE%BF-%CE%A4%CE%B1%CF%80%CF%80%CE%B1%CF%82-115389865158361/ ja sinulle. Olit kaikkia muita lähempänä, vaikka pystyin tavoittamaan sinut päivittäin vain puhelimella. Vähitellen myös matkamittariin kertyi kilometrejä, mutta lokakuun puolenvälin jälkeen auto vaihtui junaan, koska suru kavensi maantietä. Matkatessani luoksesi join kahvia ja tein töitä, enkä halunnut ajatella väistämätöntä. Paluumatkoilla poistin käsien vapinan yhdellä tummalla oluella ja jatkoin työskentelyä, mutta ajatukseni palasivat koko ajan sinuun. Viisaampieni mielestä olin aina väärässä paikassa. Kun istuin seurassasi, olisi minun pitänyt olla työpaikalla ja päinvastoin. Sanat lohduttavat, mutta yhtälailla ne kykenevät repimään uusia haavoja. Sinä et tuominnut, vaan huolehdit, että ehdin ajoissa junaan ja yöksi kotiin perheeni luokse. Kielsit käymästä luonasi, kun flunssa vei voimani. Ne olivat lohduttomia päiviä, koska samaan aikaan lauseesi lyhenivät entisestään. Kolmisen viikkoa sitten, lähetti VR minulle tiedon ansaitsemastani matkasetelistä ja mahdollisuudesta ostaa sarjalippuja. Muutamaa päivää aiemmin oli määränpää jo ehtinyt kadota. Nimipäiväsi vastaisena yönä kaadoin lasiin kesällä ostamaani viskiä, istuin työhuoneeni lattialle ja kuuntelin aamun asti Bruce Springsteenin live-albumia, jonka sinä ostit tukholmalaisesta levykaupasta marraskuussa 1986 joululahjaksi minulle. Et todennäköisesti tunnistanut yhtään albumin kappaleista, mutta tiesit aina, mitä lahjasi ja musiikki minulle merkitsivät. Eilen kanttorin jykevä ääni kantoi Karjalan kunnailla –laulua hallitusti eteenpäin, mutta minä en kyennyt yhtymään sanoihin kahden ensimmäisen säkeen jälkeen. Enkä voinut enää totella viimeistä antamaasi ohjetta: älä itke. Teksti heräsi eloon ja kuljetti takaisin hetkeen, jolloin nautimme venäläistä kuohuviiniä lapsuudenkotisi portailla. Sieltä historia heitti sinut loputtomalle evakkotielle ja sotalapseksi Ruotsiin. Sen jälkeen ei lähteminen ollut sinulle vaikeaa. Muuttokuormat kulkivat yhdeksällä vuosikymmenellä, ja sinä niiden mukana. Kun laskimme sinut viimeiseen leposijaasi, oli kantamuksemme kevyt, mutta paino mittaamaton. Rakas äitini, valehtelisin jos väittäisin, että jokaiseen tänään kirjoittamaani sanaan sisältyy kyynel. Niitä on paljon enemmän eikä vitsini naurata enää.

Δευτέρα 3 Απριλίου 2017

2065: "Moderate" American rebels fighting Eric Trump regime express gratitude for Chinese coalition airstrikes.

анкт-Петербурга прогремели взрывы По предварительным данным, на синей ветке петербургского метро на станции «Садовая» прогремел взрыв в вагоне. Есть жертвы. На станциях синей линии петербургского метрополитена — «Технологический институт» и «Сенная площадь» — прогремели два взрыва. Очевидцы сообщают, что закрыты станции «Маяковская», «Владимирская» и «Площадь восстания». Сотрудники силовых ведомств выехали на место, сообщает Life. Как утверждают очевидцы, много пострадавших. На появившихся в интернете фотографиях видно, что дверь вагона сильно повреждена, а платформу заволокло дымом. Об этом сообщает РосБалт. МАТЕРИАЛЫ ПО ТЕМЕ БЛОГИ Взрыв в Петербургском метро. ОНЛАЙН Не менее 10 погибших, около 20 раненых… 5 61 6 35060 7 14:57 Напомним, что в Санкт-Петербурге сейчас находится президент Владимир Путин. Он участвует в работе форума ОНФ. Закрыты три станции — «Садовая», «Площадь Восстания» и «Технологический Университет». Об этом сообщает РИА со ссылкой на источник. Со станции метро в Петербурге, где произошел взрыв, идет эвакуация, в том числе из тоннеля, сообщает ТАСС. Президенту РФ Владимиру Путину уже доложено о взрыве в метро Санкт-Петербурга, сообщил «Интерфаксу» пресс-секретарь президента Дмитрий Песков. «Да, доложено», — сказал он. На вопрос о том, может ли это происшествие отразиться на планах пребывания В.Путина в Санкт-Петербурге, Д.Песков сказал: «Президент работает в Стрельне (где у него проходит встреча с президентом Белоруссии — «Интерфакс») Правоохранительные органы подтверждают, что в вагоне на станции метро «Сенная площадь» в Санкт-Петербурге произошел взрыв. Об этом рассказал корреспондент радиостанции «Эхо Москвы». Очевидцы сообщают о большом количестве пострадавших. Платформу заволокло дымом. По некоторым данным, еще один взрыв прогремел в вагоне на станции «Технологический институт», однако официальных подтверждений этому пока нет. На данный момент обе станции закрыты на вход и выход. В Санкт-Петербурге сейчас находится президент РФ Владимир Путин. Он участвует в работе форума ОНФ. Идет эвакуация пассажиров с петербургских станций метро «Сенная площадь» и «Технологический институт», где произошли взрывы. Закрыты станции Парк Победы, Электросила, Московские ворота, Фрунзенская, Технологический институт, Сенная площадь, Гостиный двор. Следователи находятся на месте ЧП в Петербурге, организованы следственные действия. Часть пострадавших приходится извлекать из искореженного взрывом вагона при помощи спецтехники. В московском метро усиливаются меры безопасности. Это сообщили «Интерфаксу» в понедельник в пресс-службе Московского метрополитена. Путин сообщил, что правоохранительные органы выясняют причины взрыва.

Κυριακή 2 Απριλίου 2017

http://www.anthropic-principle.com/?q=book/chapter_8#8c

The World in 2050 [Broadcast by BBC Virtual Reality, August 14th, 2050] (c) 2000, Nick Bostrom SUMMARY This essay explores some of the social, political, economic and technological issues that the world may have to face in the mid-21st century. A central theme is the need to regulate molecular nanotechnology because of its immense abuse potential. Advanced nanotechnology can be used to build small self-replicating machines that can feed on organic matter - a bit like bacteria but much more versatile, and potentially more destructive than the H-bomb. The necessity to prevent irresponsible groups and individuals from getting access to nanotechnological manufacturing capability is a prime concern in 2050. The essay shows how this quest for containment shapes many aspect of society, most notably via the institution of a global surveillance network. A dialogue format is used for two reasons. First, in order to enable several conflicting views to be discussed. And second, to illustrate how public debates may be conducted at that time. [P.S. This essay was written under various external constraints, including that it should deal with the in 2050, so not too much weight should be put on the time line and some other details.] Host: Much has happened over the past fifty years, but what are the changes that really matter? Have they been for better or for worse? And where are we heading in the next fifty years? With us tonight to discuss these questions are three very distinguished polymaths: Emily Brown, CEO of Cisco Systems; Dr. Chun Ten, technology editor of The Economist; and Neil Brigge, professor of philosophy at New York University and a director of the Foresight Institute. Neil, do you think that the human condition has changed over the past half century? Neil: We live longer and healthier lives. We are much richer. We have the ability to choose our sensory experiences to a much greater extent than ever before. Right now, you are watching a smooth-skinned, well-groomed Neil, but the real physical Neil sitting here in my VR-box may be a much less appealing sight - I may not have shaved or washed for a week! Emily: People are still concerned with how they present themselves, both in physical space and in cyberspace. The fraction of our income that we spend on personal presentation has been increasing steadily throughout the century. As it becomes easier to satisfy our material needs, we seem to focus more on what we are in relation to others - there is great demand for what the economists call "positional goods". Host: We are the vainest people ever? Emily: Or the most "people-centered", depending on how you want to see it. Chun: I now see a backlash against conspicuous consumption in some communities. High-status people try to signal their superiority by shunning cosmetic filters and other conveniences that the less well endowed cannot afford to do without. But this "nudism", as they call it, is very partial. It is only a few selected enhancement-options that are being stripped off. Host: At the turn of the century, many were concerned about global warming and other ways in which humans were damaging the environment. Global warming turned out not to be a significant problem, but did this early environmentalist movement have any lasting effects on how things developed? Emily: Environmentalist thinking opened a lot of minds to the idea that we are living on this finite planet and that what is done in one part of the sphere can affect what happens on the other side. "Global conscience", was perhaps the most beneficial lasting effect. Remember that it is only in the last twenty years that widespread undernourishment has finally been eliminated. Of course, bioengineering and nanotechnology were essential tools in achieving that, and this helped reshape environmentalist thinking. At the turn of the century, many environmentalists were very suspicious of new technology. Now most people accept that it is thanks to technological progress that we are able to sustain a world population of eleven billions and still preserve significant parts of the natural environment. Neil: What also happened was that the early focus on the environment gradually widened to include all aspects of human life. Today we have the debate between transhumanists, who are enthusiastic about transforming the human condition, and naturalist conservatives who are happy about technology as long as it doesn’t change human nature too much. While most naturalists will take life-extension supplements, they don’t approve of the use of mood-drugs or cosmetic psychopharmacology. Chun: The emergence of law and order in the international plane - "global conscience" as Emily calls it - is probably the reason why we are still here today. There is still no effective global immune system that could defend against malicious self-replicating nanomachines. Without the steadily improving global surveillance network, some terrorist group or scientifically-literate madman might long ago have made their own nanotech assembler and manufactured a "virus" that could have destroyed the biosphere and eradicated intelligent life from this planet. Neil: Indeed, and this could still happen. It just takes an ill will and a single security breach somewhere. We must just hope the surveillance network improves rapidly enough that this will never happen. Host: How was it possible for the surveillance network to be put in place so quickly? Chun: Well, a lot of the infrastructure was already there. Companies monitored customers, the police monitored public places, the military monitored foreign countries. Once gnat-cameras became cheap and you could link everything up to data bases and face-recognition software, surveillance networks began covering larger and larger territories in more and more detail. The other part of the explanation is that policy-makers could become persuaded by the necessity to regulate nanotechnology. And here I think better collective decision-making institutions played a key role. Idea futures is a good example of this. As you know, idea futures is the market where speculators place bets on hypotheses about future scientific or technological breakthroughs, political events and so forth. Trading prices - the odds - in idea futures markets gradually became recognized as authoritative estimates of the probabilities of possible future events. In the twentieth century, policymakers would sometimes commission the opinion of bodies of experts that they appointed, but it turns out that the market is much better at making these predictions than politically selected committees. Such markets were once banned under anti-gambling laws in most places. Only gradually were exceptions granted, first for a stock market, then for various commodities and derivatives markets, but only in this century did we see the rise of wide-ranging free markets with low transaction costs, where speculators could trade on most any claim. It’s hard to overestimate how important this was in making society’s decision-making a bit more rational. Neil: I agree that this was important. The tragedies of the tens and twenties, where genetically engineered biological viruses were used to kill millions, also helped prepare the world. People have seen the damage that a malicious guy can do with self-replicating organisms. And nanotech is much, much more powerful. I think we have been incredibly lucky so far. Maybe we are witnessing the result of what philosophers call an observational selection effect. Maybe most civilizations in our infinite universe destroy themselves when they develop nanotechnology, but only the lucky ones remain to wonder about their luck. So our success so far should not make us complacent. Emily: It’s amazing how quickly people have got used to the idea that everything they do can now be known by anybody who is interested in finding out. When you are going on a date with someone, you can check out their previous relationships, and so on. If you had suggested this to somebody fifty years ago, they’d have been horrified! They would probably have referred to it as Brave New World, or Orwell’s 1984, with Big Brother watching you all the time. But it’s like a nudist colony: when everybody is naked, the embarrassment quickly wears off. So we had all these little secrets that we thought were so important, little vices. But when we can see that everybody has similar little vices, our standards adapt and we become more tolerant. As long as you’re not doing anything really bad or break the law, you don’t have to worry. And the streets are much safer now. Chun: The key to preventing global surveillance from turning into global suppression is to always insist on basic liberties and to keep government and law-enforcement agencies under constant scrutiny. It is crucial that we make sure that the system is transparent in both directions, so that we can watch who’s watching us. Emily: Yet there are still rumblings about it being a plot by the technologically advanced countries to monopolize the power coming from the nanotech revolution. Chun: The logic is crystal clear to every honest thinker. Since there is as yet no general defense against nanotech attacks that could potentially destroy the biosphere, such attacks must be prevented at any cost. The only way to do that is to limit the number of powers who have nanotechnology. If a single evil madman gets it, then it’s "game over". Emily: I agree that is a good argument, and that we have to limit access to nanotechnology until we have developed reliable defenses. But that doesn’t mean that the leading powers don’t derive an unfair advantage from this technological monopoly. The people who are excluded from building nano-assemblers have a right to be compensated. Current transfer payments are nowhere near what they are entitled to. Chun: It is also a problem of intellectual property laws, which has been a burning issue for quite some time now. - [Emily Brown disappears] Host: It appears that we have lost transmission from Emily - she was on her yacht. Hope she hasn’t run into bad weather - Ok, let’s turn our gaze towards the future. What lies ahead? Neil, I know that you have expressed pessimism about the future - Neil: I’m not a pessimist, but I’m concerned that we might have underestimated the risk that nanotech could proliferate before we can build defenses. There has been a series of incidents already. As technological know-how spreads, it may be harder and harder to make sure that no rogue group develops an assembler. Building an effective global immune system for self-replicating nanomachines is a very, very difficult challenge. It has to be present everywhere, on land, sea, and in the atmosphere. It must avoid attacking biological life forms. And it has to work 100% of the time. We are very far from being able to do that at the present time. Chun: Surveillance technology is improving rapidly, however. Neil: Yes, but what if someone develops a good counter-surveillance technology? Intelligence agencies are now discussing proposals for monitoring and preventing research in that field as well. But the problem is that the task is so ill-defined. Who can say what research might potentially lead to some way of tricking the global surveillance network? Host: Are there any idea futures claims that measure the probability of these things? Neil: Yes, but they don’t really tell us much. You see, who would want to bet on the hypothesis that civilization will be destroyed? If you are right, you would not get paid! It is disconcerting to note that what economists call the time discount factor seems to have been going up. (The time discount factor is a measure of how much more value people place on a present good compared to having the same good at some point later in the future.) That could be interpreted as people being worried about whether they will be around to benefit from their savings. [Emily Brown reappears] Host: Welcome back, Emily! Emily: I’m terribly sorry! I’m on a yacht here, and my son was playing with the antenna - I’m so sorry! Host: Don’t worry. My attention-meter shows that the intermezzo increased our eyeball-count. That’s why we are doing this live. Our viewers like it when things go wrong! You should give your kid a bonus! Emily: I don’t think so! Host: We were talking about the future. Neil was just trying to convince us that he is not a pessimist, and he went on to explain all the excellent reasons we have for thinking that there is a great risk that we will all be turned into gray goo by nanoreplicators running amok. Is that a fair summary, Neil? Neil: I suppose so. But on the other hand, if we do manage to avoid doomsday, things could turn out really nice. That’s why I don’t call myself a pessimist, because if we are careful we might achieve a great outcome. Chun: My grandfather is 102 years old and he is quite active. This is all thanks to life-extension. We can only dream of all the wonderful things that will become possible when we learn to redesign and expand our minds. There is more to lose than ever before. Having got this far, we really must try to make sure that we don’t destroy ourselves with rogue nanotechnology, even if it means holding some types of developments back temporarily. Neil: There are many people who won’t make it. Over a hundred thousand people deanimate everyday, many due to aging-related ailments. More than two thirds of the world’s population still don’t have a cryonics contract! When they deanimate, instead of having the information in their brains preserved by freezing or vitrification, they are just cremated or buried. For worms, there certainly are such things as free meals! And this at a time when in the idea futures market there is more than a 50% chance of reanimation of a human brain within three years! This preventable loss of human life, day after day, year after year, almost makes the two world wars or the Baghdad flu insignificant by comparison. Chun: The difference is that this is largely self-selected death. It’s a price you pay for freedom of religion. Neil: For some people that is true. But there are millions who simply cannot afford a cryonics contract, or don’t have enough education to understand what the options are. Now, I’m not suggesting that we should force anybody to have themselves frozen when they deanimate, but I think we have a duty to provide enough information and financial help so that each individual can at least make an informed decision. Host: Won’t overpopulation be a big problem if all the people who are currently in cryonic suspension are suddenly reanimated? Chun: Actually, there aren’t that many of them. About three billion people have made arrangements to have themselves suspended when they deanimate, but only about 150 million people have been suspended to date. Neil: Idea futures indicate that if these people are reanimated, it will be through being uploaded into computers. It looks much more feasible to disassemble these vitrified brains cell by cell, molecule by molecule, scanning off the neural network, and then run an emulation of that neural network on a computer. In vitro repair is harder than in silico repair - that is, doing it in a computer simulation. And I, for one, would much rather be uploaded than having my biological brain repaired. I already spend most of my time in virtual reality, and I’d like the security of being able to make a back-up copy of my mind every hour or so. If for some reason I want to manipulate physical objects, I would rent a robot body that was suitable for what I wanted to do. Emily: I can understand those who are scared of uploading. I’m scared of it myself. Who can guarantee that a brain emulation would truly be conscious? And even though our virtual reality is pretty good at vision and sound, I still think it can’t compete with the meatspace in the other sensory modalities. Virtual sex is great, but I prefer to touch my husband’s body directly. Neil: The other sensory modalities of virtual reality will work much better for uploads. It is easier to do it for uploads, because you can directly activate neurons in their sensory cortices. You don’t have to build these complicated mechanical devices we have now to stimulate our body surfaces. Emily: I still see it as a last resort. I would rather be an upload than be dead, but I think that as long as my biological body is functioning well, I’ll stick with that. Neil: There could be huge advantages to being among the first uploads. I was attending a neurocomputation conference last week, and I was talking to several groups there who are studying hypothetical ways of enhancing the intellectual abilities of an upload, by adding new neurons and new connections and so forth. If uploads could become more intelligent than humans, I would prefer to be an upload. Also, computing power increases. There is an idea futures claim that within two years of the first human upload, there will be an upload running at a clock speed one hundred times greater than a biological brain. That means the upload will think a hundred times faster than we do! Last time I checked, this claim was trading at better than even odds. Chun: Since uploads are software, they can easily make copies of themselves. We could see a population explosion with a vengeance, and we might have to brush up on Malthus again. Malthus was a late eighteenth century political economist who argued that unless population control is instituted, then population growth will eventually annihilate any improvement in the standard of living for the masses that economic growth has brought about. Even rapid space colonization, which hasn’t been economical so far, but which idea futures indicate is likely to begin within a decade, will not be able to keep up with a free-breeding population of uploads. Emily: Uploading raises huge ethical and political issues. Not to speak of the legal challenges. If you are an upload and you make a copy of yourself, so there are now two almost identical implementations of you, who is married to your husband? We have only scratched the surface of this problematique. I would like to see a moratorium on uploading experiments and some form of artificial intelligence research until we have a better understanding of where we are going. We are playing with fire. Host: I’m afraid we’re out of time. It’s been fascinating. I suppose we’ll see over the next few years how this plays out. Thank you all for participating. Neil, I leave the final word with you. Neil: We are in the process of crossing a road. The one thing we must not do is stop in the middle. We need greater-than-human intelligence to build defenses against nano-attacks. We would not reduce the danger by slowing down; on the contrary, that would make the risks even bigger. The best we can do is to press onward with all possible speed, using as much foresight as we can muster, and hope that there is an other side that we can get to.
Letter from Utopia Nick Bostrom Oxford University (Version 1.6) www.nickbostrom.com [Studies in Ethics, Law, and Technology, Vol. 2, No. 1 (2008): pp. 1-7] A improved version (1.10) is available here (pdf) [Nexus Journal (2010), forthcoming] Translations: | | Dear Human, Greetings, and may this letter find you at peace and in prosperity! Forgive my writing to you out of the blue. Though you and I have never met, we are not strangers. We are, in a certain sense, the closest of kin… I am one of your possible futures. One day, I hope, you will become me. Should fortune grant this wish, then I am not just a possible future of yours, but your actual future: a coming phase of you, like the full moon that follows a waxing crescent, or like the flower that follows a seed. I am writing to tell you about my life – how marvelous it is – that you may choose it for yourself. Although this letter uses the singular, I am really writing on behalf of my all my contemporaries, and we are addressing ourselves to all of your contemporaries. Amongst us are many who are possible futures of your people. Some of us are possible futures of children you have not yet given birth to. Still others are possible artificial persons that you might one day create. What unites us is that we are all dependent on you to make us real. Think of this note as if it were an invitation to a ball – a ball that will take place only if people show up. We call the lives we lead here “Utopia”. * How can I tell you about Utopia and not leave you nonplussed? What words could convey the wonder? What inflections express our happiness? What points overcome your skepticism? My pen, I fear, is as unequal to the task as if I had tried to use it against a charging elephant. But the goal of understanding is so important that that we must try even against long odds. Maybe you will see through the inadequacies of my exposition. Have you ever known a moment of bliss? On the rapids of inspiration, maybe, where your hands were guided by a greater force to trace the shapes of truth and beauty? Or perhaps you found such a moment in the ecstasy of love? Or in a glorious success achieved with good friends? Or in splendid conversation on a vine-overhung terrace one star-appointed night? Or perhaps there was a song or a melody that smuggled itself into your heart, setting it alight with kaleidoscopic emotion? Or during worship? If you have experienced such a moment, experienced the best type of such a moment, then a certain idle but sincere thought may have presented itself to you: “Oh Heaven! I didn’t realize it could feel like this. This is on a different level, so very much more real and worthwhile. Why can’t it be like this always? Why must good times end? I was sleeping; now I am awake.” Yet behold, only a little later, scarcely an hour gone by, and the softly-falling soot of ordinary life is already piling up. The silver and gold of exuberance lose their shine. The marble becomes dirty. Every way you turn it’s the same: soot, casting its veil over all glamours and revelries, despoiling your epiphany, sodding up your white pressed collar and shirt. And once again that familiar beat is audible, the beat of numbing routine rolling along its tracks. The commuter trains loading and unloading their passengers… sleepwalkers, shoppers, solicitors, the ambitious and the hopeless, the contented and the wretched… like human electrons shuffling through the circuitry of civilization. We do so easily forget how good life can be at its best – and how bad at its worst. The most outstanding occasion: barely is it over before the sweepers move in to clean up the rice. Yellowing photos remain. And this is as should be. We are in the business of living, and the show must go on. Special moments are out-of-equilibrium experiences in which our puddles are stirred up and splashed about; yet when normalcy returns we are usually relieved. We are built for mundane functionality, not lasting bliss. So you allow the door that was ajar begins to close, disappearing hope’s sliver behind an insensate scab. Quick, stop that door! Look again at your yellowing photos, search for a clue. Do you not see it? Do you not feel it, the touch of the possible? You have witnessed the potential for a higher life: you hold the fading proof in your hands. Don’t throw it away. In the attic of your mind, reserve a drawer for the notion of a higher state of being, and in the furnace of your heart keep at least one aspiring ember alive. I am summoning this memory of your best experience – to what end? In the hope of kindling in you a desire to share my happiness. And yet, what you had in your best moment is not close to what I have now – a beckoning scintilla at most. If the distance between base and apex for you is eight kilometers, then to reach my dwellings would take a million light-year ascent. The altitude is outside moon and planets and all the stars your eyes can see. Beyond dreams. Beyond imagination. My consciousness is wide and deep, my life long. I have read all your authors – and much more. I have experienced life in many forms and from many angles: jungle and desert, gutter and palace, heath and suburban creek and city back alley. I have sailed on the high seas of cultures, and swum, and dived. Quite some marvelous edifice builds up over a million years by the efforts of homunculi, even as the humble polyps amass a reef in time. And I’ve seen the shoals of colored biography fishes, each one a life story, scintillate under heaving ocean waters. The whole exceeds the sum of its parts. What I have is not merely more of what is available to you now. It isn’t just the particular things, the paintings and toothpaste-tube designs, the record covers and books, the epochs, lives, leaves, rivers, and random encounters, the satellite images and the collider data – it is also the complex relationships between these particulars that make up my mind. There are ideas that can be formed only on top of such a wide experience base. There are depths that can be fathomed only with such ideas. You could say I am happy, that I feel good. You could say that I feel surpassing bliss. But these are words invented to describe human experience. What I feel is as far beyond human feelings as my thoughts are beyond human thoughts. I wish I could show you what I have in mind. If only I could share one second of my conscious life with you! But you don’t have to understand what I think and feel. If only you bear in mind what is possible within the present human realm, you will have enough to get started in the right direction, one step at a time. At no point will you encounter a wall of blinding light. At no point will you have to jettison yourself over an end-of-the-world precipice. As you advance, the horizon will recede. The transformation is profound, but it can be as gradual as the growth that made the baby you were into the adult you think you are. You will not achieve this through any magic trick or hokum, nor by the power of wishful thinking, nor by semantic acrobatics, meditation, affirmation, or incantation. I do not presume to advise you on matters theological. I urge on you nothing more, nothing less, than reconfigured physical situation. * The challenge before you: to become fully what you are now only in hope and potential. New capacities are needed if you wish to live and play on my level. To reach Utopia, you must first discover the means to three fundamental transformations. The First Transformation: Secure life! Your body is a deathtrap. This vital machine and mortal vehicle, unless it jams first or crashes, is sure to rust anon. You are lucky to get seven decades of mobility; eight if you be fortune’s darling. That is not sufficient to get started in a serious way, much less to complete the journey. Maturity of the soul takes longer. Why, even a tree-life takes longer. Death is not one but a multitude of assassins. Do you not see them? They are coming at you from every angle. Take aim at the causes of early death – infection, violence, malnutrition, heart attack, cancer. Turn your biggest gun on aging, and fire. You must seize the biochemical processes in your body in order to vanquish, by and by, illness and senescence. In time, you will discover ways to move your mind to more durable media. Then continue to improve the system, so that the risk of death and disease continues to decline. Any death prior to the heat death of the universe is premature if your life is good. Oh, it is not well to live in a self-combusting paper hut! Keep the flames at bay and be prepared with liquid nitrogen, while you construct yourself a better habitation. One day you or your children should have a secure home. Research, build, redouble your effort! The Second Transformation: Upgrade cognition! Your brain’s special faculties: music, humor, spirituality, mathematics, eroticism, art, nurturing, narration, gossip! These are fine spirits to pour into the cup of life. Blessed you are if you have a vintage bottle of any of these. Better yet, a cask! Better yet, a vineyard! Be not afraid to grow. The mind’s cellars have no ceilings! What other capacities are possible? Imagine a world with all the music dried up: what poverty, what loss. Give your thanks, not to the lyre, but to your ears for the music. And ask yourself, what other harmonies are there in the air, that you lack the ears to hear? What vaults of value are you witlessly debarred from, lacking the key sensibility? Had you but an inkling, your nails would be clawing at the padlock. Your brain must grow beyond any genius of humankind, in its special faculties as well as its general intelligence, so that you may better learn, remember, and understand, and so that you may apprehend your own beatitude. Mind is a means: for without insight you will get bogged down or lose your way, and your journey will fail. Mind is also an end: for it is in the spacetime of awareness that Utopia will exist. May the measure of your mind be vast and expanding. Oh, stupidity is a loathsome corral! Gnaw and tug at the posts, and you will slowly loosen them up. One day you’ll break the fence that held your forebears captive. Gnaw and tug, redouble your effort! The Third Transformation: Elevate well-being! What is the difference between indifference and interest, boredom and thrill, despair and bliss? Pleasure! A few grains of this magic ingredient are worth more than a king’s treasure, and we have it aplenty here in Utopia. It pervades into everything we do and everything we experience. We sprinkle it in our tea. The universe is cold. Fun is the fire that melts the blocks of hardship and creates a bubbling celebration of life. It is the birth right of every creature, a right no less sacred for having been trampled on since the beginning of time. There is a beauty and joy here that you cannot fathom. It feels so good that if the sensation were translated into tears of gratitude, rivers would overflow. I reach in vain for words to convey to you what it all amounts to… It’s like a rain of the most wonderful feeling, where every raindrop has its own unique and indescribable meaning – or rather it has a scent or essence that evokes a whole world… And each such evoked world is subtler, richer, deeper, more multidimensional than the sum total of what you have experienced in your entire life. I will not speak of the worst pain and misery that is to be got rid of; it is too horrible to dwell upon, and you are already cognizant of the urgency of palliation. My point is that in addition to the removal of the negative, there is also an upside imperative: to enable the full flourishing of enjoyments that are currently out of reach. The roots of suffering are planted deep in your brain. Weeding them out and replacing them with nutritious crops of well-being will require advanced skills and instruments for the cultivation of your neuronal soil. But take heed, the problem is multiplex! All emotions have a natural function. Prune carefully lest you accidentally reduce the fertility of your plot. Sustainable yields are possible. Yet fools will build fools’ paradises. I recommend you go easy on your paradise-engineering until you have the wisdom to do it right. Oh, what a gruesome knot suffering is! Pull and tug on those loops, and you will gradually loosen them up. One day the coils will fall, and you will stretch out in delight. Pull and tug, and be patient in your effort! May there come a time when rising suns are greeted with joy by all the living creatures they shine upon. * How do you find this place? How long will it take to get here? I can pass you no blueprint for Utopia, no timetable, no roadmap. All I can give you is my assurance that there is something here, the potential for a better life. If you could visit me here for but a day, you would henceforth call this place your home. This is the place where you belong. Ever since one hairy creature picked up two flints and began knocking them together to make a tool, this has been the direction of your unknown aspiration. Like Odysseus you must journey, and never cease to journey, until you arrive upon this shore. “Arrive?” you say; “But isn’t the journey the destination? Isn’t Utopia a place that doesn’t exist? And isn’t the quest for Utopia, as witnessed historically, a dangerous folly and an incitement to mischief?” My friend, that is not such a bad way for you to think about it. To be sure, Utopia is not a location or a form of social organization. The blush of health on a convalescent’s cheek. The sparkle of the eye in a moment of wit. The smile of a loving thought… Utopia is the hope that the scattered fragments of good that we come across from time to time in our lives can be put together, one day, to reveal the shape of a new kind of life. The kind of life that yours should have been. I fear that the pursuit of Utopia will bring out the worst in you. Many a moth has been incinerated in pursuit of a brighter future. Seek the light! But approach with care, and swerve if you smell your wingtips singeing. Light is for seeing, not dying. When you embark on this quest, you will encounter rough seas and hard problems. To prevail will take your best science, your best technology, and your best politics. Yet each problem has a solution. My existence breaks no law of nature. The materials are all there. Your people must become master builders, and then you must use these skills to build yourselves up, without crushing your cores. * What is Tragedy in Utopia? There is tragedy in Mr. Snowman’s melting. Mass murders, we have found, are not required. What is Weakness in Utopia? Weakness is spending a day gazing into your beloved’s eyes. What is Imperfection in Utopia? Imperfection is the measure of our love for things as they are. What is Dignity in Utopia? Dignity is the affirming power of “No” said discriminately. What is Suffering in Utopia? Suffering is the salt trace left on the cheeks of those who were around before. What is Courage in Utopia? Courage is the monarchy of the self, here constrained by a constitution. What is Solemnity in Utopia? Solemnity is the appreciation of the mystery of being. What is Body in Utopia? Body is a pair of legs, a pair of arms, a trunk and a head, all made of flesh. Or not, as the case may be. What is Society in Utopia? Society is a never-finished tapestry, its weavers equal to its threads; the parts and patterns an inexhaustible bourne of beauty. What is Death in Utopia? Death is the darkness that enshrouds all life, and our guilt for not having created Utopia as soon as we could have. * We love life here every instant. Every second is so good that it would blow your mind had its amperage not been previously increased. My contemporaries and I bear witness, and we are requesting your aid. Please, help us come into existence! Please, join us! Whether this tremendous possibility becomes a reality depends on your actions. If your empathy can perceive at least the outlines of the vision I am describing, then your ingenuity will find a way to make it real. Human life, at its best, is fantastic. I’m asking you to create something even greater. Life that is truly humane. Yours sincerely, Your Possible Future Self

identity automation

Because work and profession are traditionally important attributes of individual and social identity, these trends and changes in the character of employment are of considerable significance for the future of identity. People who have spent their carrier working in one profession, and achieving skill and standing in that profession, may perceive that their identity has been undermined or devalued when their profession becomes obsolete, especially when the work they did can be performed by machines. This is most likely to be an issue for those that have taken pride in their line of work and who have invested years or decades attaining a high level of mastery in their profession. Those who mainly see their work as a necessary evil that must be endured in order to earn a livelihood may be less affected provided they can secure an alternative source of income. http://www.nickbostrom.com/views/identity.pdf

Σάββατο 1 Απριλίου 2017

Advances in computer image recognition and measurement are likely to make the identity of objects detectable over distance using camera or laser systems31 even when they have not be specifically prepared. Similarly biometric identification and data fusion – the combination of evidence from several ‘senses’ – will make automatic remote identification of people easier (especially since they might carry a recognizable constellation of RFID tags and a smartphone). Thanks to rich databases and new probabilistic algorithms identity resolution (constructing a persistent identity from various records, which may be incomplete or conflict) is increasingly feasible32. Such systems are currently used in security, but are likely to spread into commercial and private use. Sources of error (and deception) will persist, but overall it is likely that in many domains 2025 the identity of actors and objects – as well as implied properties such as ownership – can be automatically monitored with a high precision. Anonymity would require deliberate social/legal decisions, cumbersome workarounds or avoiding many areas of life. This augmented world poses challenging new possibilities and demands in the force field between transparency, privacy, and secrecy. It allows unprecedented forms of transparency through automated documentation – in everyday life, in government, in business. Privacy is harder to maintain due to the ease of documentation, but might hence be regarded as a far more valuable commodity than today. By a similar token secrecy becomes harder to maintain – even the best encryption cannot protect from nearby sensors documenting passphrases and biometrics, and once something has been leaked into the public it is impossible to erase. To strike the proper balance between these factors in different domains will be a major social, legal and political undertaking for the next decade. 31 An interesting demonstration is how packaging can be ‘fingerprinted’ by the speckle pattern produced when a laser scans the individual irregularities of the surface, a pattern that persists after crumpling, scorching, wetting and being scribbled upon. James D. R. Buchanan, Russell P. Cowburn, Ana-Vanessa Jausovec, Dorothée Petit, Peter Seem, Gang Xiong, Del Atkinson, Kate Fenton, Dan A. Allwood & Matthew T. Bryan, Forgery: ‘Fingerprinting’ documents and packaging, Nature 436, 475 (28 July 2005) Russell Cowburn, Laser surface authentication - reading Nature's own security code, Contemporary Physics, Volume 49, Issue 5 September 2008 , pages 331 - 342 32 Jeff Jonas, Threat and Fraud Intelligence, Las Vegas Style, IEEE Security & Privacy, November/December 2006 28-3
Legal protections for users of online sites are often weak. To access online software and services, a user is often required to read and approve a long legal consent form that is presented on the screen. Because of the ubiquity of these forms, their length, and their obscure legal terminology, most Internet users have formed the habit of immediately scrolling to the bottom of these forms and clicking the “I accept these conditions” button, without reading or understanding the text. When the software is updated, the user is often required to indicate their agreement to a new consent form. It becomes impractical for the average user carefully to review everything they agree to in this manner. Rather than relying on these online consent forms, most users probably rely on the reputation of the service provider as the main guarantor of honesty and service reliability. Major software and Internet firms can be expected to be protective of their reputational capital, and may therefore choose to refrain from openly deceiving or exploiting their user base. However, firms that face decline will sometimes choose to “harvest” their reputational capital by reneging on their implicit contract with their users in order to eke out as much profit as possible before their time is up. Again, the ‘shadow of the future’ is a relevant problem: while current values and practices are acceptable, they might not remain so. It is interesting to consider whether the same need for maintaining openness, accountability and user rights as holds for governments applies to social space providers. While it can be argued they are merely providing a commercial service controlled by contract law, the importance of online identities and social spaces might be growing to such an extent that they are equivalent to social goods that must be protected by law. If, for example, one’s Facebook or Google identity is necessary for living a normal life in society, then being deprived of it might be equivalent to depriving somebody of a driver’s licence or Social Network Users’ Bill of Rights “We the users expect social network sites to provide us the following rights in their Terms of Service, Privacy Policies, and implementations of their system: 1. Honesty: Honor your privacy policy and terms of service 2. Clarity: Make sure that policies, terms of service, and settings are easy to find and understand 3. Freedom of speech: Do not delete or modify my data without a clear policy and justification 4. Empowerment: Support assistive technologies and universal accessibility 5. Self-protection: Support privacy-enhancing technologies 6. Data minimization: Minimize the information I am required to provide and share with others 7. Control: Let me control my data, and don’t facilitate sharing it unless I agree first 8. Predictability: Obtain my prior consent before significantly changing who can see my data. 9. Data portability: Make it easy for me to obtain a copy of my data 10. Protection: Treat my data as securely as your own confidential data unless I choose to share it, and notify me if it is compromised 11. Right to know: Show me how you are using my data and allow me to see who and what has access to it. 12. Right to self-define: Let me create more than one identity and use pseudonyms. Do not link them without my permission. 17 bank accounts – acts that properly are surrounded by legal rules and methods of appeal. Another situation in which users are vulnerable is when the use of a service creates a strong “lock-in”. Identity providers are often in a situation to create considerable lock-in for their users. Once an individual has invested years in developing an identity, adding content to their online profile and building a deep network of friends within the system, it becomes costly for that individual to quit or move to a competitor. Due to natural monopolies for social spaces there might not even be a competitor16. Governments sometimes seek to protect their citizens against the dangers of such lock-in and the opportunities for exploitation that it creates. Thus, for example, there are legal protections for tenants, who could face a degree of lock-in once they have moved their belongings and settled into a rented property. There is also legislation, aimed at protecting consumers and stimulating competition, that forces cell phone providers to cooperate with customers who wish to switch provider, making it possible for the customer to keep their telephone number. With the growing importance of online identity providers, demands may arise for similar protections for this new sphere of human activity. (An economic analysis or exploration of possible policy options is, however, beyond the scope of this paper.) The globalized identity The potential for alienation from the consequences of our actions is not an issue that pertains specifically to robotics or mediated interaction, but is rather a ubiquitous feature of modern life. To some extent, it may be counteracted by the proliferation of reporting and media, including live streaming video from all parts of the world and social media allowing international social relations. Modern man is tied into a network that spans the world. Our actions as voters, taxpayers, and consumers have consequences that reverberate across the globe; and at the same time, we are to an unprecedented degree able to become aware of this fact. The increasingly common perception of people that they are citizens not just of a city and a nation, but also of an international community is an important change in the self-perception aspect of identity. It is possible that developments in media and social networks, as well as ideological movements, will continue to give increasing salience to this dimension of our existence. Online identities are often already border-crossing: the identity providers are often foreign companies or organisations, and the actual data storage and processing increasingly occurs in widely dispersed cloud computing. This trend will continue and intensify as the world grows more globalized, barriers of language are weakened by improved automatic translation, and people find new kinds of long-range social relations to fulfil their needs and desires. However, this poses challenges for the current legal system since it tends to assume that people have their activities and identities focused in their country of residence. When these become internationalised many aspects of everyday life fall under foreign or international law, potentially causing hard problems. Besides having private citizens possibly unknowingly performing legally relevant acts in foreign jurisdictions (from trade to sedition), a wide variety of identity providers and relying parties will be handling elements of private identity that in the UK and EU enjoy special legal protections (such as medical information: both Google and Microsoft are running electronic health record services), quite possibly in jurisdictions where they lack protection. Recent instances of libel-tourism in the UK where foreign plaintiffs file libel suits in the UK against people abroad that have only tenuous links to the UK (such as an online publication accessible to the UK public) illustrate how identities and activities suddenly have become global. These issues are by no means new, but the rapid increase in globalized identities means they will likely become a key point in developing future international agreements. It might simply be that a truly transnational internet and national laws are fundamentally irreconcilable: although some conflicts can be handled (e.g. through country-of- 16 Most social spaces – games, dating sites, networking services - become more appealing the more members can be reached through them, giving the larger spaces much advantage over smaller ones. The exception is spaces based on exclusivity: here the appeal lies in being a member of a small club it is hard to get into. 18 destination approaches) the eventual choice will be between globalizing law or breaking up the globalization (and hence much of the utility) of the Internet17. Would globalized identities shaped by self-selected peer groups mean weaker loyalties to one’s country? At present there is no clear evidence for or against this possibility. Modern communications media allow both longdistance nationalism and transnational lifestyles. Historically nationalism appears to have become a weaker motivator in Western Europe for most people: while people appear to enjoy identifying with groups more than ever, this is more about social affiliation and signalling than traditional loyalty to a social group and its institutions. Everyday life and security is no longer dependent on a strong personal stake in the group, but rather on impersonal formal rules that rarely impinge on life. The challenge for the national state might be that it has to compete with numerous other affiliations on the emotional and social side, and is reduced to a guarantor of legal rights and provider of services on the practical side. It should be noted that a trend towards weaker nationalism on average does not mean it declines evenly. Some groups may become more nationalistic or loyal to various institutions. The real policy challenge may be to handle a mixture of nationalisms and loyalisms rather than a homogeneous population. The virtual worlds Virtual worlds have been predicted for a long time, but unlike the early 90’s visions of full immersion virtual reality the virtual worlds that are currently expanding in importance are based on fairly traditional ICT hardware. Social media, online gaming, teleconferencing and other software fields are de facto creating virtual worlds right now, and they are increasingly playing a key role in peoples’ lives. They are not so much virtual spaces in the sense of collections of ‘places’ where one might geometrically move around, but rather social spaces: shared environments of interaction. These can be as simple as the text messages used on online bulletin boards where people maintain local identities as discussion participants, over the fanciful characters inhabiting online games, to business avatars used for teleconferencing virtual environments (such as Second Life and Teleplace) or video meetings sustained with teleconferencing (or more cheaply, Skype). In each such space participants have at least one digital identity, more or less strongly linked to their core identity. These virtual identities, despite possibly being merely a textual description, can still hold a powerful resonance with their users. Julian Dibbel’s by now classic essay “A Rape in Cyberspace”18 describes how users of an early 17 Uta Kohl, Jurisdiction and the Internet: , Regulatory Competence over Online Activity, Cambridge University press, 2007 Who sets the Facebook rules? As a global social space, Facebook is faced with many conflicting demands. The “Saudis in the US” group, a group for Saudi Arabian students in the US was split by gender into a male and a female group after some female members wanted the extra privacy. However, not all members agreed on the split and some felt it infringed on their freedom of expression http://arabnews.com/saudiarabia/article256543.ece?com ments=all. The Facebook decency code bans exposed breasts, which have led to removing photos of breastfeeding and cancelling the accounts of mothers posting pictures. This is somewhat ironic given the less than zealous removal of a paid advertisement with a topless model. http://www.dailymail.co.uk/sciencetech/article- 1102950/Mothers-protest-Facebook-ban-offensivebreastfeeding-photos.html Overall, one of the great challenges to a service such as Facebook is that it will serve material to people from cultures that will have significantly different codes of decency, and is 19 text-based virtual environment (a “MUD”) were emotionally violated when another user forced their virtual characters into humiliating and explicit situations. “…what happens inside a MUD-made world is neither exactly real nor exactly make-believe, but nonetheless profoundly, compellingly, and emotionally true.” Maltreatment of virtual characters can matter in the real world, since there is an emotional link to the “real” person. Virtual worlds have their own rules set by the software and moderators, but also partially emergent from the social interactions of participants. Rules about identity and presentation are often important: what kind of names may be used, how easy it is to get the real identity of users, what kind of avatars that can be used and the proper procedure for dealing with breaches of the rules (Dibbel’s essay also describes the aftermath of the incident, where the virtual community debates the proper punishment for the perpetrator and the “constitutional” implications for the virtual environment). Often a good relationship between moderators and users is essential for a successful system, especially as the users need to view the actions of the moderators and owners as legitimate. These relationships are local to the particular social space, yet the participants might be widely dispersed and subjected to numerous conflicting legal, economic and cultural demands. Online economies are starting to have real-world effects; just as new forms of communication and personal identity-creation are emerging. Online gaming is becoming a massive industry. People are paying real money for virtual objects or characters. It has been estimated that virtual goods – useful only within particular digital realms – were exchanged to the value of over 2 billion dollars in 200919. Due to the demand a secondary market of “gold farming” has developed: workers in developing countries playing games in order to produce virtual goods that are then sold for real world money20. People are getting into legal wrangling over the goods – virtual thefts, property rights, inheritance, currencies and taxation are becoming pertinent issues21. Even outside games we have a sizeable number of virtual possessions – family photos, emails, texts, blogs, websites, etc.– that have important emotional value to us and form part of our online and real identities. Many are distributed in social spaces or the cloud worldwide, vulnerable to what the space providers do to them. Digital property rights will likely become a matter of popular concern simply because their aggregate value is rapidly increasing. The augmented world Current trends in ICT is leading to a world of wireless, global 24/7 broadband connectivity accessible through portable devices and smart environments where many everyday objects have been supplied with networked abilities (”the internet of things”). In the words of author Charles Stross, the generation growing up right now will “never be alone, never lost, never forget”22--- the connectivity holds together social networks regardless of location, users are always findable 18 Julian Dibbel, A rape in cyberspace, chapter 1., My tiny life: Crime and Passion in a Virtual World, Henry Holt Inc. 1998 http://www.juliandibbell.com/texts/bungle_print.html 19 Tuukka Lehtiniemi, How Big Is the RMT Market Anyway? Virtual Economy Research Network, http://virtualeconomy.org/blog/how_big_is_the_rmt_market_anyw 20 Richard Heeks, Current Analysis and Future Research Agenda on “Gold Farming”: Real- World Production in Developing Countries for the Virtual Economies of Online Games, in Development Informatics working paper, no. 32 Institute for Development Policy and Management, University of Manchester 2008, 21 See Castronova, Edward (2005). Synthetic Worlds: The Business and Culture of Online Games. Chicago: The University of Chicago Press, as well as http://blog.practicalethics.ox.ac.uk/2008/10/protectionist-deities-vs-the-economy-of-fun-ownership-of-virtual-possessions/. 22 Charles Stross, LOGIN: 2009 Seattle keynote speech. http://www.antipope.org/charlie/blog-static/2009/05/login-2009-keynotegaming-in-t.html 20 and know where they are thanks to location services such as built-in GPS, and the devices are increasingly logging and documenting everything that happens. This later property is powered by three strong trends: our devices are increasingly recording our lives without our deliberate decision, thanks to the ubiquity of cheap digital sensing and recording mechanisms from digital cameras and email over the accelerometers and other sensors in smartphones to the automatic logging of most computer systems. Cheap storage makes it easier to record everything that could ever be of interest than to try to determine what to store. Retrieval is facilitated by improved technologies for search, analysis, presentation, and sharing of the data23. The resulting extended memory is likely to have profound effects on personal identity: parts of identity will reside in a persistent “exoself” of information and software. Some people have taken up lifelogging, the use of wearable computers to capture continuous data from their lives – video feeds, location, physiological information, etc. Some lifeloggers also store and share their life events on public forums, “life caching”24, while others are living the “data-driven life”25 where the ability to measure and monitor performance allows them to become aware of or to change their habits. When the idea originated in the 1990’s it required cumbersome and expensive special equipment: today many of these functions can be done by amateurs using slightly modified smartphones; and by 2025, it will likely be an application anybody who chooses can activate. Lifelogging offers many benefits: continuous time monitoring of health, a digital memory that complements the natural memory (being photographic, searchable, and shareable), self-monitoring, and possibly producing a cognitive inheritance. 23 For a popular overview, see Gordon Bell and Jim Gemmell, Total recall: How the e-memory revolution will change everything, Dutton, 2009 24 http://trendwatching.com/trends/LIFE_CACHING.htm 25 Gary Wolf, The Data-Driven Life, New York Times, April 28 2010, https://www.nytimes.com/2010/05/02/magazine/02selfmeasurement-t.html?_r=1 Living the logged life The Microsoft research project MyLifeBits is an experiment in lifetime storage, where Gordon Bell has scanned the articles, books, cards, CDs, letters, memos, photos, presentations, home movies, videotaped lectures and voice recordings and stored them digitally. His ongoing information flows (phone calls, instant messaging, television and radio) are being added to this database. The project aims at develop software methods of managing this kind of lifetime data, making it easy to capture, annotate, and integrate it with other software. Gordon Bell, Jim Gemmell (2009). Total Recall: How the E-Memory Revolution Will Change Everything. Penguin 21 At present researchers are beginning to study the “exposome” - the air pollutants, physical activity and diet of people - using life recording devices26. Since self-reporting is notoriously unreliable, direct recording might open new possibilities for epidemiology and environmental medicine as well as self-experimentation. A perhaps even more dramatic example is Professor Deb Roy at the MIT Media Lab, who used cameras and microphones in every room in his home to document when and where every word was said in the vicinity of his infant son. Using this massive corpus of data he is able to visualize and annotate the first two years of the child’s life, demonstrating intriguing aspects of language development as well as producing a total home video27. Life recording will also likely to synergize with social networking to seamless “life sharing”. The limits of privacy are likely to be pushed as a generation grows up with this technology. Even if the average person in 2025 is not using full lifelogging many of the functions being explored today will likely exist in the background of their technology. While lifelogging may promise many desirable forms of personal enhancement and selfknowledge, it also has serious privacy implications. It makes personal lives traceable and might challenge many rules on control over personal and public information. A lifelogger walking down a street is making copies of copyrighted information, silently documenting third parties, and possibly acting as a sensor in a distributed network of whose existence he might not even be aware. Police and other authorities might have reason to demand access to part or the whole of life recordings, which might not only raise privacy concerns but actually correspond in the user’s experience to an invasion of mental privacy. Employer-mandated (or encouraged) lifelogging during work hours might be required in order to avoid liability. Issues of ownership, spreading and use of lifelog data will expand from the current problems with public photography, cellphone tracking, personal data storage and smart meters. 26 Brendan Borrell, Epidemiology: Every bite you take, Nature 470, 320-322 (2011) http://www.nature.com/news/2011/110216/full/470320a.html 27 http://web.media.mit.edu/~dkroy/ Please turn off your exoself during start or landing February 18 2002 Professor Steve Mann at University of Toronto ran afoul of the tightening of airport security in the wake of 911. Professor Mann is one of the pioneers of wearable computing and has for more than 20 years lived with an extensive rig of sensors, computers, displays, and wiring he uses to document his life. The security guards at St. John's International Airport in Newfoundland required a strip-search that led to electrodes being torn from his skin and the disassembly of many components of his rig, leading to the disruption of his “exoself”. This in turn led to psychological problems such as concentration difficulties and behaviour changes, according to Professor Mann . While in this case the conflict was triggered by the unfamiliarity of his equipment (see also (Borrell 2011) for police concerns over visible devices for measuring air pollution in subways) the increasing use and reliance on cameras, smartphones, RFID-, wifi- and Bluetooth-enabled equipment is creating struggles over who has authority to determine the standards of what augmenting technologies are allowed in a space. Since many of these technologies are going to be increasingly important for everyday life and personal identity, restrictions are going to be experienced as more cumbersome and i f i i p l lib t th i th p t Travels of one Even peopl dependent t or the intru currently are stretch to gu extended sel Identity te Identity tech essential par belonging to power electr course in m parts of the for example be automati data collect persistent vi 28 US patent ap 29 Li Yang, Am Technology, IE 30 Bruce Sterl e of the author le who are they have bec sion of an o e at backing uess that the lves. The dem echnology hnologies – rt of the pos o a category b ronics will a manufacturing circuits with e allow object ically and saf ting, self-doc irtual objects pplication 20080 min Rida, Rushi EEE transactions ling (2005). Sh rs autumn 2010 not consciou come upon e fficial reques up or securi ere will be nu mand for bei technologies stindustrial in but also as in llow very sm g parts – tagg inkjet printe ts to be self-d fely recycled. cumenting, e that can man 0068169, http:/ Vyas, and Mano s on microwave theo haping Things. C 0 to spring 2011 usly lifeloggi xternal system st (say, for ev ing their curr umerous priv ing able to in for automat nfrastructure. ndividual obj mall and chea ging individua er technology documenting In the long easily manuf nifest when n /www.freepaten os M. Tentzeris, ory and techniques, ambridge, Ma 1, automatically ing might b ms for their i verything they rent digital p vate data loss sure digital p tic detection . RFID-tags ects, possibly ap identificat al pieces of p y 29. Besides a g, stating their run many ob factured and needed30. ntsonline.com/y , RFID Tag and , vol. 55, no. 12, assachusetts: M y logged witho e de facto lif identities and experienced possessions d ses in the fut possessions w and logging allow marke y without dir tion tags that paper has bee allowing track r physical and bjects might recycled “s y2008/0068169. d RF Structures o ,p. 2894-2901 D MIT Press. out his knowled felogging. Th d everyday liv last month). despite their g ture as peopl will likely incre of who and d objects to rect touch. N t will be inco en demonstra king and iden d chemical pr become enti spimes” – le .html on a Paper Subs December 2007 dge by his sma hey might d ves when the . Given how growing valu le lose contr ease. d what is wh be identified Nanotechnolo orporated as ated28 , as we ntifying objec roperties so irely trackabl ess physical strate Using Ink 22 artphone. discover how re is a failure w bad people ue, it is not a rol over their here – are an d not just as ogy and lows a matter of ell as printing cts this might that they can le, constantly things than kjet-Printing
7 Personal names on the surface may appear to be well defined and legally regulated, but in practice they show an amazing diversity (especially in multicultural settings) that make formalizations deeply problematic. See http://www.kalzumeus.com/2010/06/17/falsehoods-programmers-believe-about-names/ for an interesting discussion about the real-world problems of assuming anything about what a personal name “is”. 2. Inform The adage “ online medi new forms o setting of hu Online id Social networ just 25 contac but it is relati they were sho Online iden accounts an addresses, a other online Many of the of different eBay profile The Facebo reflecting di persona may known to B mation an “on the Inter ia allow a hig of identificat uman face-to dentities rk of contacts a cts, they in turn ively easy to de ot, and commen ntities are bec nd online per a Facebook o e products an ese identities online servic e, showing th ook account m ifferent aspe y be less inte Blizzard Enter nd commu net nobody k gh degree of tion, docume -face commu and contacts-of n have 4442 co educe much p nts made on va coming incre rsonas. For or Google+ a nd services, s are interlinke ces. A PayPa e transaction might serve t cts of her li egrated with rtainment; an unication knows you ar anonymity a entation and unications and f-contacts of on ntacts. Within ersonal inform arious topics. easingly impo example, an account, an iT uch as the m ed. An email al account wi n history of th to tie togethe fe – hobbies an individua nd the gaming technolog re a dog” has and the possi tracking. No d private/pub ne of the autho this forum ide mation from the ortant. Man n individual Tunes accou massive multip l address may will be linked he user and t er many diffe s, sports, frie al’s offline id g persona ma gies s always been ibility to set u ormal intuitio blic environm ors on the phot entity is mostly e content of th ny people in might have unt, an eBay player online y be used as a to a bank ac he reputation erent commun ends, family, entity, but is ay itself have n of doubtful up alternate i ns about ide ments, are unr to-sharing site y defined by sh he images, loca today have a PayPal acc account, and roleplaying g a username o count, and it n she has acq nities of whic and work. at least tied e various disti l veracity. W identities, th entity, honed nreliable onlin e Flickr. While hared photogra ation and time a variety of count, a cou d subscription game World or password f t might also quired as a bu ch a person i The World d to the custo tinguishable i 10 While modern ey also allow in the social ne. the author has aphic interests, data of where distinct user uple of email ns to various of Warcraft. for a number be tied to an uyer or seller. is a member, of Warcraft omer identity dentities as a 0 n w l s , e r l s . r n . , t y a 11 participant in guilds and other friendships within the game.Some identities are deliberately fragmented. People regularly try to separate their work email account from their private account, often extending this to phone numbers and other ways of gaining access. Parents often instruct their children to never reveal their real names and addresses online. Online game characters or forum identities may be ways of ‘letting off steam’, and hence may require keeping them distant from the main social identities of their creator. This is in many ways a natural extension of our existing separate social personas, projected into online media. Maintaining this kind of separation requires not only the right technology but also some social and mental discipline, keeping the personas distinct. With the proliferation of identities – online as well as offline – growing demands are being placed on identity management systems and on the skills of the citizen. Identity management systems are the software (and institutional) systems that create and keep track of digital identities, as well as connect them to the attributes of their identity (such as resources they can access). These systems can range from simple password protections to complex systems maintaining traceability, data integrity, privacy, preferences, parental and institutional controls and interfaces to other identity management systems. However, unlike social identity management (i.e. how we act among other people) such systems are often inflexible and completely prohibit unplanned uses of identity (which often leads to users finding workarounds that might undermine security) while at the same time missing undesirable activities: they are ‘brittle’. There is little doubt that finding better forms of identity management is going to be a major research and investment area over the next decade as more and more people come online across the world and use new kinds of services. There might not just be competitive advantage in the right kind of identity management, but important social effects. For some identities, it is important that they can be tied in a verifiable way to the legal identity of a person. A PayPal account needs to be linked to a bank account, and the user must verify their identity and that they are the holder of the bank account in question. For other identities, the user might prefer that they be dissociated from their legal identity or entirely anonymous. Online anonymity can be an important component of personal privacy. For example, an individual maintaining a blog in which they expresses politically unpopular views, suffering a serious disease, or opinions that are critical of their employer may suffer grave repercussions if they lose the veil of anonymity. Hiding an identity is an aspect of privacy, but privacy is actually about controlling who can access an identity, not prevent all knowledge of it. Privacy is not absolute – there are sometimes ethical or legal reasons to limit it – but it is often highly desirable that people can control how their identity can be observed or used. Yet, from a practical standpoint enforcing privacy protection can run into the problem of getting the designers of new systems to build it in, making existing widespread systems privacy compliant, handling data that exists in a distributed but collectable form, enforcing the intended protection, avoiding making enforcement so costly that it prevents technological innovation (while Google can afford privacy compliance officers it is unlikely that a small start-up or open source hobby project can), and – perhaps most problematic – making the privacy protection fit the actual social norms of privacy. Given that actual privacy norms vary enormously between groups and develop organically it is likely that any formal system of privacy protection will be lagging social and technological change. “NightJack”: police blogger unmasked The police blog “NightJack” won the prestigious Orwell Prize for political writing 2009. The blog often expressed critical views related to the police and justice system. The author, a Lancashire detective constable, was unmasked by The Times after a landmark High Court ruling that stated that blogging was “essentially a public rather than a private activity” and that it was in the public interest to know who originated opinions and arguments. As a result, the constable was disciplined by the police force. This case illustrates the complicated relation between freedom of speech, accountability, anonymity, and risks of reprisals. 12 Trouble can also arise from inappropriate linkages between different snapshots of a single identity across time. A teenager may post pictures and make statements that later prove embarrassing – and, as recruitment officers increasingly Google job applicants, even career-hampering. In this case, a problem arises if people regard the earlier online expressions as relevant manifestations of an unchanging character. While information gleaned from researching a candidate online can often be relevant and highly useful, there is also a risk of self-fulfilling prophecies. If the person is shunned by employers because of something they have said or done, they may be unable to establish a track record to rehabilitate their reputation as a good employee. Furthermore, with the increasing persistence of identity-relevant information online, one cannot rely on the past being forgotten; it will, in some cases, instead have to be forgiven8 . These linkages also include the shadow of the future: in the future much of our present information will be available to people with vastly larger computational resources (making many current forms of encryption or security weak) and different values. While some of the uses they will put our personal information to will be neutral or positive from our perspective, others might not be so benign. Long-lived politicians today have to explain past policies that seemed to make sense at the time they were made but today appear deeply racist; in the future we might be similarly be held accountable for views or activities we currently find entirely moral. Worse, there is no guarantee that this information will not eventually be used by future governments or groups of ill intent. The claim that “if you have done nothing wrong you have nothing to worry about” presupposes that the accepted criteria for ‘wrong’ will remain the same. The response to this problem might not be to attempt to amplify privacy, but rather to recognize that the need to safeguard open societies and human rights grows with government power over individual lives. One particularly pernicious current possibility is online character assassination. The practises of libel and slander are as old the human species, but the online world offers new opportunities for their efficient implementation. It is easy to post material online anonymously, and material thus inserted may remain available for a very long time and the proficiency of the search engines will ensure that anybody who looks for information about the victim will be presented with the slanderous assertions. Even if the victim obtains a court injunction it may be difficult to remove the offending material, which might be posted on servers located in foreign jurisdictions. If the false information has spread it may even be impossible for the perpetrator to remove it from the net. There is, however, at least one important mitigating factor: just as the Internet makes it easier to disseminate slander, it also makes it easier to publish a rebuttal and to ensure that it will be seen by the relevant people. Unfortunately smears can be stickier than the truth: developing technologies and habits that help uncover slander is a major challenge for future social technology. Identity metasystems 8 The EU Commission draft framework for data protection policies famously states that people have a “right to be forgotten” (or rather, their personal data). The “Social network users’ bill of rights” http://cfp.acm.org/wordpress/?p=495 also includes “the right to withdraw”. Both documents however assume the personal data resides within the domain of some actor who can obey legal or customer demands. If personal information can be collected or inferred from the other information available online these rights may be of little use. The current legal case against Google in Spain where plaintiffs demand references to them to be removed from the search database is a case in point: even if it succeeds, it will not remove the references from other search engines, or from emerging future tools. http://news.yahoo.com/s/ap/eu_internet_right_to_be_forgotten 13 While digital identities within single systems are useful, it is common for people to wish to maintain their identities across many systems and institutions, ideally without having to authenticate themselves in countless different ways (consider the issue of password-re-use). Identity metasystems are interoperable architectures that allow users to manage collections of digital identities. Key roles within the metasystem are identity providers (issues digital identities), relying parties (entities that require identities, such as online services) and subjects (entities about whom identity claims are made, such as users, companies and organisations)9 . Existing examples are the identification systems sponsored by Microsoft (Passport), Yahoo, Facebook and Google where a single login gives access to many web services. A possible future example would be a metasystem linking a person’s legal identity, various email addresses and a bank account so that commercial and government relying parties could transact official business (e.g. paying taxes, making official requests, signing online contracts). At present few widespread identity metasystems exist. There are economic, technical and legal problems that need to be overcome. A likely scenario is that as society becomes more integrated online the demand for identity metasystems increases (due to the cumbersomeness of fragmented digital identities) and, since there are clear economies of scale, consolidation and competition leads to a few or a single metasystem. These global metasystems could very well be under the control of private foreign companies who would have unprecedented control over digital identity. Government-sponsored metasystems also pose interesting problems, as the globalisation of the digital world would mean many non-citizens would wish to join the national metasystem, essentially becoming digital subjects. However, past attempts at creating “federate authentication” have often failed, largely due to mismatched incentives between the stakeholders. In particular identity providers need to assume some liability, relying parties need to benefit from the system and users had legitimate worries about a single point of failure – if their master online identity was subverted, they would risk significant trouble10. If these issues can be solved (perhaps more a business problem than a technological one11) we might see the emergence of global metasystems; if not, online identities will continue to be fragmented. 9 While this structure was originally proposed by Kim Cameron at Microsoft Corporation (The Laws of Identity, 2005, http://msdn.microsoft.com/en-us/library/ms996456.aspx ) and is currently used in various implementations, the concepts of identity providers, relying parties and subjects is useful for our discussion regardless of their origin. 10 Ross Anderson, Can we fix the security economics of federated authentication? http://spw.stca.herts.ac.uk/2.pdf 11 J.D. Lasica, Identity in the Age of Cloud Computing: The next-generation Internet's impact on business, governance and social interaction, The Aspen Institute, 2009 Sorry, we’ve spilled your secrets The October 2007 loss of two disks containing child benefit data is just one example of how large data breaches can occur relatively easily. The discs, containing names, addresses, dates of birth of children, National insurance numbers, and bank details of approximately 25 million people in the UK, were sent by junior staff at HM Revenue and Customs to the National Audit Office as internal mail and were lost. No data fraud or identity theft appears to have occurred as a result of the loss. In January 2009 a security breach in Heartland Payment Systems (a US company) compromised up to 130 million credit cards. In this case a computer criminal was indicted for the attack, which had a clear profit motive. Other data leaks of note are the August 2006 AOL release of 20 million Internet search keywords that could be linked to particular users, the November 2008 leak of full contact details of British National Party activists and the 2010 Wikileaks “Cablegate” of 250,000 US embassy diplomatic cables. Each of these represents the loss of control over important aspects of identity (financial, interests, political views, international association), and were due to simple Identity pro personal inf identifiable involving te and as the n Identity met increasing ri Rate of repo accidentally r Control ov Press freedo propped up television ch of the Intern under press broader issu the issue o Approximat 2010, and th current pos communicat 12 India is pla http://www.t oviders have formation. B information ens of million number grows tasystems mig isks for sudde orted data los revealed. Data ver social sp om and own p by subserv hannels that a net, online m ure will be t ues of censor of the owne tely one half his number w ssessor of w tion and for t anning to issue timesonline.co a responsibil But as shown has been ac n or more pe s of online id ght if implem en, correlated sses (worldwid from http://da paces and i ership of the vient state-o are controlled media are bec tempted to r rship, which f ership of so of the UK p was rapidly g what is per the expressio e each of its 1.2 o.uk/tol/news lity for mana n in the figu ccidentally or eople are cur dentities a per mented badly d outbreaks o de) 2005-2009 atalossdb.org/ dentities e media are i wned media d by individu coming essen egulate or m fall outside th cial space, w population cu growing). T rhaps Britain on of individu 2 billion citizen /world/asia/a aging identiti ure below, th r maliciously rrently regula rson possesse amplify such of fraud or sa where person / important iss a, and some uals who are c ntial forums f manipulate th he scope of t which is no urrently uses This makes Fa n’s largest u ual identities. ns with biome article6710764 ies appropria he number of y disseminate ar occurrence es, such large h risks, limitin abotage that c nally identifyin sues for dem times also b close to the r for political d ese online fo this paper. A ow often co Facebook (th acebook, a fo unified socia etric ID, the M .ece ately, especial f reported in ed is very hig es. As larger breaches wil ng the usabili could affect a ng information mocracy. Ma by privately regime. With debate and ac orums. We Attention mu ncentrated i he UK had 2 oreign-owned al space for Multipurpose N lly when the ncidents wher igh. Even v r databases co ll become mo ity of global i a society deep n has been s any a dictator owned new h the growing ctivism. Regi will not here ust be drawn, in a few pr 26 million use d private cor r individual National Identit 14 ey are tied to re personally vast breaches ome online12 ore common. identities and ply. stolen, lost or rial regime is wspapers and g importance imes that are e discuss the , however, to rivate hands. ers as of July rporation the and public ty Card. 4 o y s 2 . d r s d e e e o . y e c Owners are of expressio or by disallo influenced: information to prevent b Many online discussion th implicit enfo to ‘safe’ top one’s online This can inc writing incr especially in precludes de Users often to cancel pla are likely to 13 Data from 14 Greg Last freedom of sp 15 http://www free to regul on and identit owing them controls ove can be linke bullying or se e games prev hreads, uploa orcement of pics without a e identity can clude control reasingly dem n cases of un eliberately an feel strongly ans to retain be contested http://www.f owka, Virtual peech in massi w.guardian.co.uk late social spa ty14. Overt e from signing er the kind o ed to what ot xually explici vent avatars a aded materia what is perce any formal (o be threatene ls on what ki manding that nusual handle onymous or y about their user data eve d, the more so facebook.com/ l Justice, Yale U ively multiple k/technology/20 Activ aces in nume exclusion of c g up) is a cru of content th ther informat it messages b and usernam l, groups or eived to be th or legally cha d by stepping inds of identi t users prov es. This is no fragmented i online identi en after they h o the greater /press/info.ph University Pre on-line role pl 009/feb/19/fac ve Facebook us erous ways, co certain peopl ude way. Th hat can be p tion. For exa by forcing com mes seen as u users can be the unstated r allengeable) r g out of line. ities users ex ve that their ot just linking identities. ities. After st had left the n the space’s im hp?timeline ess, 2010, Pete laying games, J cebook-persona sers13. ontrolling bo le or groups here are many posted, how ample, some mmunication nsuitable or deleted if th rules of the o regulation, jus xpress. Faceb screen nam g online iden trong protest network15. Ru mportance to er S. Jenkins, Journal of inte l-data oth what valu (either by mo y more subtl identities ca social spaces n through a li copyright inf hey are seen a owners. This st the chilling ook and Goo mes correspo ntities closer ts from its us ules governin o its users. The virtual w rnet law vol. 8 ue is created, oderators rem le ways the s an be expres s for kids hav imited pre-se fringing. Th as unsuitable can limit fre g effects of k ogle+ are at ond to their to legal iden sers Faceboo ng the use of world as a com 8:1, july 2004 15 and freedom moving them space can be ssed or what ve attempted t vocabulary. he threat that e also acts an ee expression knowing that this point of real names, ntities; it also k was forced social spaces
Online identities will be growing rapidly in importance and will raise a plethora of issues. They are sometimes formalizations of social identities but are fundamentally more rigid. This (and the large number of online services) leads to people using multiple identities. Linking multiple identities to a legal identity and across time and domains can cause problems, in the form of breaches of privacy, risks of identity theft, damage to reputations, and reprisals. Gathering identities into identity metasystems can solve some of these problems but at the expense of posing new challenges such as border-crossing identity systems of unclear jurisdiction, massive data breaches, and expanding the power of identity providers over the identified and their social interactions. Virtual worlds – be they online games, social spaces or teleconferencing, will grow in reach and use. Users feel strongly about their online identities and want control over them despite weak legal protections. Successful social spaces allow negotiation between users and the maintainers. As online identities become more important it is likely that formal legal protection for them will be needed, yet it will be hard to implement effective enforcement and avoiding strangling social and entrepreneurial creativity. The augmented world and exoselves: In the words of one author, the generation growing up now will “never be alone, never lost, never forget” – the constant connectivity holds together social networks regardless of location, location services makes everything findable, and life recording allows the storage of representations of a large part of life. The resulting extended memory is likely to have significant effects on personal identity: parts of identity will reside in a persistent “exoself” of information and software. Life recording will also likely to synergize with social networking into seamless “life sharing”. The limits of privacy will be pushed as a generation grows up with this technology. Even if the average person in 2025 is not using full lifelogging, many of the functions being explored today will likely exist in the background of their technology. Identity technology: Not only humans but objects are gaining persistent, traceable identities. RFID-tags and other methods will give many objects a much richer identity, allowing them to be identified not just as belonging to a category but also as individual objects, possibly without direct touch. Similarly, biometric identification and data fusion – the combination of evidence from several “senses” – will make automatic remote identification of people easier (especially since they might carry a recognizable constellation of RFID tags and a smartphone). Thanks to rich databases and new probabilistic algorithms, identity resolution (constructing a persistent identity from various records) is increasingly feasible. Such systems can allow wide-ranging transparency and accountability, but also threaten privacy and secrecy. Finding the proper regulation and social norms for a nearly totally identifiable society will be a major process over the next 15 years. Automation and robotics will have broad but diffuse impacts on various aspects of identity, mainly by gradually changing the nature of work and impacting labour markets. These effects will represent a continuation of long-term trends that have led to urbanization and to a remarkable growth of the service sectors of advanced economies. Both IT skills and people skills will be in demand on the labour market. Careers will become 5 more fluid, and it will be important for the country to have a work force that is adaptable and that can master new skills as need arises. A major breakthrough in artificial general intelligence could have extremely profound implications for society and for many aspects of identity; however, this must be regarded as a unlikely possibility within the given 15 year timeframe. Medicine and personalized health are not only about health but also about the expression of social identities. This function will become increasingly prominent as preventive, diagnostic, and enhancement medicine grow in importance. Eating healthy and exercising – or not – are choices that people make not only because of health effects but also to maintain a certain social identity. Diagnostic medicine (and genomics) will expand the medicalization of self-conception. Enhancement medicine, too, is focused very much on social identity and self-expression rather than merely on health and biological capacity narrowly construed. It is paramount to consider these identity-related dimensions of medicine if we are to understand how and why people will be consuming health care resources in the future. Life extension may lead to new forms of age identities, where people no longer identify with traditional age groups. Genomics raises many important identity-related issues; in fact, an entire report could be written on these issues alone. Some of the main issues include: (1) changes in self-conception as a result of knowledge about the personal genome and how it correlates with life outcomes; (2) general changes in conceptions of human nature and human identity as a result of better understanding genetic causation (advances in neuroscience also act in the same direction); (3) the possibility that genomics will reveal significant differences between ethnic groups (or differences that some will interpret to be significant) - this could have important implications for ethnic identity; (4) genetic privacy will become increasingly hard to safeguard, thanks to cheaper gene sequencing and methods such as PCR amplification that allow even a small sample (such as a skin flake or a hair follicle) to produce enough genetic information. This latter implication is especially worth highlighting. The medicalization of conception, embryo selection, and (over time) genetic modification will have important effects on individuals - most obviously on individuals who would not have come into existence were it not for these procedures, but also on parents whose reproductive lifespan is extended, and eventually on wider society. The more radical possibilities of genetic modification are unlikely to come into significant use within a 15-year timeframe; however, they may become extremely important over the longer term. Drug-use will continue to be a significant identity-related issue, and it may be joined by new concerns over novel pharmaceutical neuroagents. There are speculations that e.g. neuropeptides could be developed that could be distributed as aerosol and used for neurological manipulation. Invasive brain-computer interfaces are unlikely to have widespread impacts on identity within a 15-year horizon. Non-invasive interfaces, such as various brain-scanning techniques, could have important effects if reliable and practicable techniques for detecting deception were to be developed (though this appears somewhat unlikely within the given timeframe). In addition, brain scanning technologies might have effects on public perception through fears about loss of neural privacy and as a result of mistaken “neurohype”. A long lived, multigenerational society: Longer lifespans will lead to changes in how people regard their identity as aged people, as well as increased diversity in how age-related aspects of identity are managed and in cultural expectations. Intergenerational conflicts can erupt if institutions and social norms do not adapt to a generationally, culturally and technologically diverse society. New technologies may accentuate the vulnerability of certain groups: people who are outside identity systems, people who need certain forms of privacy, people unable to handle the growing complexity of identity, people who are victims of identity theft, and people with persistently ruined reputations. Developing methods for identity rehabilitation might be important in order to reduce the risk for vulnerable groups. 6 7 1. Introduction This paper reviews some of the possible impacts on identity from three broad fields of technological advancement: biotechnology; automation and robotics; and information and communications technologies. We consider a time horizon of 15 years, with the occasional glance towards development further down the road. For each of the three areas covered, we briefly review and evaluate technological advances that might plausibly be expected within the 15 year time frame. We then seek to illuminate the potential impacts that these development might have on social identity, and we identify and highlight developments that are of particular relevance for governmental policy and that present novel risks or opportunities for policymakers. Personal identity being an extremely multifaceted concept, we will not attempt here to furnish an exact definition. We will use the term “identity” to cover a number of loosely related notions, including the selfimages and reputational capital of individuals, social and formal identifications, perceptions and prejudices related to social group membership, software representations of identity, and more broadly changing views of human nature. We will accept a degree of indeterminacy in the concept of identity itself, and put the focus on presenting what seems to us the most interesting and policy-relevant insights in the general neighbourhood of the concept of social identity. The concepts of identity Identity has many meanings in different domains, and in this report the following are relevant: Much analysis of identity has been done in philosophy, in particular focusing on identity as persistence of something, as being definable, recognizable and in particular the issues surrounding personal identity. The philosophy of personal identity is a large field, but some of the key questions include whether there is a persistent identity over time, how important personal continuity is, the relation between numerical identity (being the same person) and qualitative identity (being similar to a past or future self), the links between our minds and bodies, and whether there even exists a self. In psychology personal identity is linked to our experience of being someone (a “core self”) and our sense of being a particular person with a past, future and various attributes (a “narrative self”). The narrative identity is gradually built up over the lifespan and plays an important role both in living a meaningful life and fitting into a social context. Both kinds of selves can be impaired or modified in different ways: meditation, certain drugs and the Cotard delusion2 can change the sense of core self, while amnesia and false memories can transform the narrative self. Deliberate modification of the self, using internal and external means is an important part of human life and adapts new technologies rapidly3 . In fact, it may often be a driver for new technologies – cosmetics, plastic surgery, social media etc. Psychological identity shades over into social identity. Social identity involves aspects such as the different personas (social roles) people take on in different contexts, how people identify with group identities (as well as sexual, gender, and cultural identities) and how these are used in various forms of expression and affiliation. People maintain a rich structure of social identities, often keeping them separate. Each of these identities has attributes, roles and norms within their social contexts4 . 2 A rare neuropsychiatric disorder where the victim believes that they are dead or do not exist. 3 Robert J. Weber, The Created Self, W.W. Norton & Company, 2001. 4 Helen Nissenbaum, Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, 2009, p. 132 A particular formal rules in more than Another imp person is of fully guaran biometric p twins sharin authenticatio their freedom information Digital iden a computer that the user the online n Digital ident aspect of dig claim to be identities, a identifier. authenticatio 5 Different fa something you that for a posit J.B. Robshaw 2004, http://w 6 Kim Camero http://www.id r kind of soci s of society. n one country portant form ften taken for nteed: psycho roperties can ng DNA), an on it is also i m, making u or control o ntities are di user’s digital r can log in t name and the tities exist wi gital (and ma e 5 . This is i although typi In the term on to subject actors of authen u have, or somet tive identificatio and Scarlet Sch www.bis.gov.uk/ n, The Laws of dentityblog.com/ Digital id ial identity is An increasin y. m of identity i r granted and ological ident n sometimes d in cyberspa intrinsically li use of bodily ver the perso igital represen l identity link to the system e computer sy ithin identity any other) ide important sin ically within minology of ts, which can ntication are u thing you are” (f on at least two, hwiderski-Grosc /assets/bispartn Identity, Micro /stories/2005/0 dentities. From the legal id g number of is bodily ide d used as the tity can chan change or b ace bodies ar inked to man identity sens on. ntations of re ks a password m using the p ystem can ke y manageme entities: the a nce many of the same s “the Laws then be used sed to establish for example a pa ideally three, fa che, Identities a ners/foresight/d soft Corporatio 05/13/TheLaws m http://en.wik dentity, the c f people have entity. The as foundation f nge drasticall be confusing re not availab ny attributes sitive in many eal-world enti d, an online n password and eep track of w ent systems ability to assu f the attribut system each s of Identity d by relying h authenticity, assword, an ID actors should be and authenticati docs/cyber/iden n, 2005, sOfIdentity.pdf kipedia.org/wi concept of a e several legal ssumption th for biometric ly (e.g. fugue g (e.g. people ble. While th of the perso y application ities that link name, and ow d access the fi what activitie that keep tra ure other ent tes of digital identity nee y”6 , identity parties (enti typically expres card, or a finge e verified. For a on, Cyber Trus ntities%20and% f iki/Identity_m (natural) per l identities be hat one body c identificatio e states, som e losing their he body can b n (health, ge s because of a number of wnership of v files, other us es occur relat ack of them. tities that one l identities ca eds to have y providers ities that need ssed by the fo rprint). Security an overview of t & Crime Prev 20authenticatio management rson encomp ecause they li belongs to o on systems. Y me religious c r fingerprints be used as a enetics, drug f the possibili f attributes. F various files in sers can send ted to the dig Authentica e entity really an be shared a distinct, s supply ide d to know id ormula “someth y research has la the topic, see F vention Project on.pdf 8 passed by the ive and work one particular Yet this is not conversions), s or identical passport for use etc.) and ity of gaining For example, n such a way d messages to gital identity. ation is a key y is who they d with other recognizable entifiers and entities, such hing you know, rgely concluded Fred Piper, Matt t, UK Foresight 8 e k r t , l r d g , y o . y y r e d h , d t t 9 as online services). Many local identity management systems can work together to form an interoperable identity metasystem, allowing users to manage collections of digital identities. Although the above definitions have been developed to deal with identities in the digital world they have close ties to formal identities in the social world, e.g. the handling of names7 . As society becomes more reliant on digital processing the distinction between social and digital identities might also diminish. A key issue is whether this allows the digital identities to become as flexible as social identities, or whether there is a risk of social identities to become formal and rigid, forcing us to live in a way we might not desire. There is hence a strong public policy concern that technologies and policies that affect personal identity should allow people to maintain flexible social identities, even if it might be technologically and administratively easier to create systems that forces fixed identities.