Wednesday, August 10, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Internet Of Things

How to regulate quantum technology before everyone understands how it works

Researcher by Researcher
April 12, 2022
in Internet Of Things
0
How to regulate quantum technology before everyone understands how it works
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Lawmakers, physicists, software engineers and end users need to find a common language and set some rules.

Making laws about new technology
Image: Sikov/Adobe Stock

It’s time for researchers, legislators and regulators to start discussing quantum computing and all of the benefits and risks of this technology, according to a fellow at the Center for Quantum Networks. The challenge is to put guardrails in place to prevent illegal activity and have an informed debate without reducing the technology to a series of tubes.

Rob Heverly is an Albany Law School professor and one of nine 2022 Fellows for the National Science Foundation’s Center for Quantum Networks. He studies the regulation and legal implications of new technologies and advises policy makers on how new technologies can be regulated even when they are not fully understood. Heverly said it’s always a problem when policy makers oversimplify technology when trying to write regulations. He has already heard misconceptions about quantum computing.

More about Innovation

“People say quantum networking will let you send immediate communications regardless of distance and that’s not how it works,” he said.

The key to regulating new technology is to focus on legal and illegal behavior, not the tools used in these activities.

“Instead of focusing on the way in which fraud happens over the internet, just make a fraud law,” he said. “Look at conduct and forbid those things.”

SEE: Quantum computing ecosystem expands in all directions 

He makes a distinction between cyber crime, which requires specific laws, and more general activity such as libel.

“Breaking and entering into a computer is one thing, but if you’re talking about defamation, yes, I can libel someone in 120 characters, and it doesn’t matter if it’s on Twitter,” he said.

Setting guardrails for the quantum internet

Heverly’s work with the CQN focuses on how to regulate the quantum internet and how to explain this new technology to regulators and lawmakers so that policy choices have an accurate foundation.

He suggested the quantum fellows review how policy makers and national security officials have interacted with new technologies in the past. The Clipper Chip project provides an example of how not to approach cybersecurity. In 1993, the National Security Agency suggested that all encryption run through a particular chipset. Two government agencies would hold the keys in escrow and would have to get judicial approval to decrypt communications.

“As people were fighting back and forth about the idea, somebody essentially hacked the chip,” Heverly said. “If it had been required, there would have been a ton of tech susceptible to intercept.”

The Center’s goals are to build a quantum internet that meets these two criteria:

  • Enables physics-based communication security that cannot be compromised by any amount of computational power
  • Creates a global network of quantum computers, processors and sensors that are fundamentally more powerful than today’s technology

A quantum network uses the properties of photons to encode information. Quantum communication protocols will formalize these standards to carry information through a quantum network. Heverly suggests that regulators and law enforcement officials start discussions about quantum encryption and quantum networks with these two questions:

  1. What regulations are needed in terms of how law enforcement can access information sent across the quantum internet?
  2. How can we ensure individual countries or governments do not obtain sole jurisdiction over quantum internet regulation?

He said the key is to educate policy makers about the capabilities of a new technology and to think in terms of broad use cases.

“More people working together in good faith could maybe come up with regulations that would do the things we need them to do without having unexpected consequences,” he said.

In thinking about the history of tech regulations, Heverly also used the example of Section 230. The goal was not to protect sites that post sexual photos of a person without his or her consent, but that’s been the unintended consequence of the law.

“The law has been really broadly applied, not just to those who would make the internet less rough but those who would make it more rough,” he said. “Now, trying to dial it back is really difficult.”

The same is true with quantum computing.

“Until quantum networking is out there and entrepreneurs start doing stuff with it, we won’t be able to say what it can do,” he said. “But if you create really strong encryption to be used over networks and make it widely available, people are going to do bad stuff with it.”

Bridging the communication gap

Part of the challenge of regulating new technology is that the stakeholders–users, developers, regulators and national security experts–don’t all speak the same language.

“I was talking to a physicist about how I am looking at the legal implications of quantum networks and he said, ‘What does the law have to do with quantum networks?’” Heverly said.

Physicists and other researchers who spend decades studying complex topics like quantum computing sometimes get frustrated when trying to explain the potential and the risks to lay people.

“Sometimes they want you to appreciate all the beauty they see in it and you can’t,” he said.

One way to bridge the gap between lawmakers and researchers is to find an expert who can translate complex topics for a general audience and encourage that individual to take on a spokesperson role. That isn’t as easy as it sounds, he said.

“Being the public face is not always good for your research career,” he said, “Sometimes your colleagues ask why are you dumbing down our ideas?”



Source link

Related articles

Quantum networking: Defining the next wave of networking and communications

Quantum networking: Defining the next wave of networking and communications

August 9, 2022
Gartner identifies 25 emerging technologies in its 2022 hype cycle

Gartner identifies 25 emerging technologies in its 2022 hype cycle

August 9, 2022
Tags: quantumregulateTechnologyunderstandsworks
Share76Tweet47

Related Posts

Quantum networking: Defining the next wave of networking and communications

Quantum networking: Defining the next wave of networking and communications

August 9, 2022
0

Ed Fox, CTO of MetTel, explains quantum networking and how it will transform communications. Image: DP/Adobe Stock For many, quantum...

Gartner identifies 25 emerging technologies in its 2022 hype cycle

Gartner identifies 25 emerging technologies in its 2022 hype cycle

August 9, 2022
0

The technologies could enable immersive experiences, accelerated AI automation and optimized technologist delivery in the next two to 10 years,...

Will smart glasses replace smartphones?

Will smart glasses replace smartphones?

July 29, 2022
0

Image: Google Glass On July 19, 2022, Google announced testing for new smart glasses with augmented reality technology. Inevitably, the...

The metaverse is making significant strides in the business world

The metaverse is making significant strides in the business world

July 27, 2022
0

Two thirds of organizations are using technologies such as augmented and virtual reality, blockchain, cryptocurrencies and NFTs, according to a...

US Space Force chooses Wallaroo to help solve edge model deployment challenges in space

US Space Force chooses Wallaroo to help solve edge model deployment challenges in space

July 26, 2022
0

Use cases include satellite life extension, on-orbit refueling, active debris removal and the reuse and recycling of materials. Image: Adobe...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

August 10, 2022
How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022
Quantum networking: Defining the next wave of networking and communications

Quantum networking: Defining the next wave of networking and communications

August 9, 2022

Recent Posts

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

August 10, 2022
How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly bug Cisco critical Cyber Cybersecurity Data devices Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open Payments phishing Ransomware RoundUp scams security Software TFT Threat vulnerability warns Week Windows zeroday

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved