View James Drake's profile on LinkedIn

Monday, November 28, 2011

Full Body Teleportation Patent Application!

Now all we need is the research to make it work!

Here's the link -

Checking PAIR, it looks as though the application (filed September 29, 2004) was abandoned back in 2006.  But good luck getting around this prior art!  Of course, the Examiner took the easy route and rejected under Section 101, but he missed the opportunity to cite Star Trek and dozens of other science fiction sources as prior art!

Here's the full rejection for your approval:


Thursday, November 3, 2011

IP Espionage Report

From Reuters:

More grist for the mill as far as what kind of protection one can expect once IP is exported.  Instructive is not so much the cyberespionage aspect (pretty well understood), but the general mindset regarding foreign IP in these jurisdictions:
• Chinese actors are the world’s most active and persistent perpetrators of economic espionage. US private
sector firms and cybersecurity specialists have reported an onslaught of computer network intrusions that have
originated in China, but the IC cannot confirm who was responsible.
• Russia’s intelligence services are conducting a range of activities to collect economic information and
technology from US targets.
• Some US allies and partners use their broad access to US institutions to acquire sensitive US economic and
technology information, primarily through aggressive elicitation and other human intelligence (HUMINT)
tactics. Some of these states have advanced cyber capabilities.

You should consider whether ongoing training regarding IP security (laptops, mobile phones, etc.) would be useful for frequent travelers to these areas, e.g., tech services personnel.  Such training should definitely look to the best practices shown starting at page 24 of the report.  Keep in mind these important and ongoing cultural shifts:
• Over the next several years, the proliferation of portable devices that connect to the Internet and other
networks will continue to create new opportunities for malicious actors to conduct espionage. The trend in
both commercial and government organizations toward the pooling of information processing and storage will
present even greater challenges to preserving the security and integrity of sensitive information.
• The US workforce will experience a cultural shift that places greater value on access to information and less
emphasis on privacy or data protection. At the same time, deepening globalization of economic activities will
make national boundaries less of a deterrent to economic espionage than ever.
As stated in the State Department's Travel guidance for China:

Security personnel carefully watch foreign visitors and may place you under surveillance. Hotel rooms, offices, cars, taxis, telephones, internet usage, and fax machines may be monitored onsite or remotely, and personal possessions in hotel rooms, including computers, may be searched without your consent or knowledge. 

Here is a link to the report itself: