< Previous4 /9 2 /10 5 TRL /9 M ECHANICAL METAMATERIALS, which are still in the early Prototype Stage, are materials that have unique mechanical and physical characteristics that lend themselves to a myriad of interesting use cases. Recently we have seen them being used to create new kinds of allegedly unhackable data storage systems which are, to all intents and purposes, impervious to attack and this alone makes them highly interesting to select sectors. We are also starting to see an increase in the number of research groups interested in developing these special materials and, over time, it’s highly likely that they could play an increasingly important role in the development of other technologies, especially in the computing, electronics, and sensing spaces. DEFINITION Mechanical Metamaterials are engineered materials with tailored mechanical properties that imbues them with unique properties ideal for specific applications. EXAMPLE USE CASES Today we are using this technology to create unhackable solid state storage devices that require a precise sequence of temperatures to be applied to the metamaterials nanostructured surface before the data stored in them, which can be both binary and non-binary, is decoded. Additionally though these materials can also be tuned which could open up the door to new kinds of acoustic insulation, bio-medical devices, electronics, heat and shock dissipation systems, semi conductors, as well as new kinds of actuators and sensing systems. FUTURE TRAJECTORY AND REPLACABILITY Over the next decade we will continue to see interest in Mechanical Metamaterials accelerate and investment grow, albeit from a low base, primarily led by government and military grants. The undeniably unique characteristics of this technology will mean that in time it could become quite pervasive as our ability to develop new mechanical metamaterials affordably and at scale improves. While Mechanical Metamaterials are still in the Prototype Stage they could be enhanced by advances in 3D and 4D Printing, Artificial Intelligence, Materials and other Metamaterials, Nano-Manufacturing, and other technologies, however over the long term it is not clear what they could be superseded by. MATTHEW’S RECOMMENDATION In the short to medium term I suggest companies put the technology on their radars, establish a point of view, and re- visit it every few years until progress in the space accelerates. 15 SECOND SUMMARY Accessibility Affordability Competition Demonstration Desirability Investment Regulation Viability 3 3 2 7 7 2 1 7 1999 2006 2024 2042 2056 STATUS PRIMARY GLOBAL DEVELOPMENT AREAS IMPACT MECHANICAL METAMATERIALS STARBURST APPEARANCES: NONE EXPLORE MORE. Click or scan me to learn more about this emerging tech. 420311institute.com MRL3 /9 3 /10 5 TRL /9 M ORPHEUS COMPUTING PLATFORM, which is in the Concept Stage and very early Prototype Stage, is the field of research concerned with developing a unhackable computing platform that can re-configure both its hardware and software in real time in order to thwart hackers. While the platform is still early in its development cycle some of the fundamental components needed to make it a reality are already emerging, such as Artificial Intelligence programs capable of self-coding, self-evolving, and self-replicating, as well as the emergence of re-configurable electronics platforms, Robo-Hackers, and entirely new Biological Computing, Chemical Computing, DNA Computing and Molecular Computing platforms that give researchers a myriad of new technologies that can be leveraged to build such a ground breaking platform. DEFINITION Morpheus Computer Platforms can self-configure and self- reconfigure both their code and hardware components in order to create an ultra secure, unhackable computing platform. EXAMPLE USE CASES Today the first prototype Morpheus Computer Platforms are very basic and being used to test different theories and approaches. In the future the primary applications of the technology will be to secure classified and sensitive data. FUTURE TRAJECTORY AND REPLACABILITY Over the next decade interest in the field will continue to accelerate, and interest and investment will continue to grow, primarily led by support from government funding, and university grants. In time we will see the individual building blocks needed to create the first full prototype mature, after which the most difficult task, that of integrating them all into a viable commercial product, will begin. While Morpheus Computing Platforms are in the Concept Stage and very early Prototype Stage, over the long term they will be enhanced by advances in Artificial Intelligence, Biological Computing, Chemical Computing, Creative Computing, DNA Computing, Memristors, Re-Configurable Electronics, and Robo-Hackers, but at this point in time it is not clear what they will be replaced by. MATTHEW’S RECOMMENDATION In the short to medium term I suggest companies put the technology on their radars, establish a point of view, and re- visit it every few years until progress in the space accelerates. 15 SECOND SUMMARY Accessibility Affordability Competition Demonstration Desirability Investment Regulation Viability 1 1 1 5 9 3 1 7 2012 2016 2020 2035 2042 STATUS PRIMARY GLOBAL DEVELOPMENT AREAS IMPACT MORPHEUS COMPUTING PLATFORM STARBURST APPEARANCES: ‘18, ‘19, ‘20, ‘21, ‘22, ‘23, ‘24 EXPLORE MORE. Click or scan me to learn more about this emerging tech. 421311institute.com MRL8 /9 3 /10 8 TRL /9 N EURAL NETWORK WATERMARKING, which is in the early Productisation Stage, is the field of research concerned with developing new ways to protect the IP invested in neural networks, and proving their authenticity and ownership. Recently there have been a number of developments in the field from researchers who have found new and easier ways to embedded watermarks in DNN models that are robust and resilient to different counter- watermark mechanisms, such as fine-tuning, parameter pruning, and model inversion attacks, with the additional benefit that they don’t add any code bloat. DEFINITION Neural Network Watermarking is the process of watermarking neural networks in order to prove authenticity. EXAMPLE USE CASES Today we are using Neural Network Watermarking to protect neural networks from counterfeiting and theft, as well as for authentication purposes, prove ownership, and to protect the IP invested in them. In the future the primary applications of the technology will include using it to ascertain the authenticity of neural networks, especially in regulated environments, as well as protect IP and prove authenticity. FUTURE TRAJECTORY AND REPLACABILITY Over the next decade interest in the field will continue to accelerate, and interest and investment will continue to grow at an accelerating rate, primarily led by organisations in the Technology sector. In time we will see researchers develop increasingly advanced watermarking techniques, and new ways to audit and track them. While Neural Network Watermarks are in the early Productisation Stage, over the long term they will be enhanced by advances in Artificial Intelligence, but at this point in time it is not clear what they will be replaced by. MATTHEW’S RECOMMENDATION In the short to medium term I suggest companies put the technology on their radars, explore the field, establish a point of view, experiment with it, with a view to implementing it, and forecast out the potential implications of the technology. 15 SECOND SUMMARY Accessibility Affordability Competition Demonstration Desirability Investment Regulation Viability 4 3 6 7 8 4 4 8 2005 2010 2018 2022 2028 STATUS PRIMARY GLOBAL DEVELOPMENT AREAS IMPACT STARBURST APPEARANCES: ‘19, ‘20, ‘21, ‘22, ‘23, ‘24 NEURAL NETWORK WATERMARKING EXPLORE MORE. Click or scan me to learn more about this emerging tech. 422311institute.com MRL3 /9 5 /10 5 TRL /9 O NE TIME PROGRAMS, which are in the early Prototype Stage, is the field of research concerned with the development of programs that run once, and leave no traces of their existence. Recent breakthroughs include the development of the world’s first probabilistic One Time Programs that can not only run once, but that can also “expire” all evidence of their existence once they’ve run, a problem that has plagued researchers in the field for decades, especially as researchers have had to rely on traditional silicon based computers that leave data traces in cache which would allow actors to reverse engineer them. However, the breakthrough came when researchers combined the technology with the quirkiness of Quantum Computers where the principles of Quantum Mechanics allowed them to encode information in photons and process it using optical logic gates to create programs that, literally, left no trace of their existence behind. DEFINITION One Time Programs are black box functions that may be evaluated once and then self destruct. EXAMPLE USE CASES Today the first prototype One Time Programs are being used to test theories and refine the methodology. In the future the primary applications of the technology will be in cyber- security and to keep sensitive data, and instructions, secure. FUTURE TRAJECTORY AND REPLACABILITY Over the next decade interest in the field will continue to accelerate, and interest and investment will continue to grow albeit from a very low base, primarily led with support from government funding, and university grants. In time we will see the technology continue to evolve, but it’ll likely be the case that researchers will have to wait for the first commercial Quantum Computers to come online before the technology starts coming into its own. While One Time Programs are in the early Prototype Stage, over the long term they will be enhanced by advances in Quantum Computing, but at this point in time it is not clear what they will be replaced by. MATTHEW’S RECOMMENDATION In the short to medium term I suggest companies put the technology on their radars, establish a point of view, and re- visit it every few years until progress in the space accelerates. 15 SECOND SUMMARY Accessibility Affordability Competition Demonstration Desirability Investment Regulation Viability 2 2 3 5 9 2 2 7 1989 1999 2017 2028 2032 STATUS PRIMARY GLOBAL DEVELOPMENT AREAS IMPACT ONE TIME PROGRAMS STARBURST APPEARANCES: ‘18, ‘19, ‘20, ‘21, ‘22, ‘24 EXPLORE MORE. Click or scan me to learn more about this emerging tech. 423311institute.com MRL3 /9 3 /10 8 TRL /9 P OST QUANTUM CRYPTOGRAPHY, which is in the Prototype Stage and early Productisation Stage, is the field of research concerned with developing encryption systems that cannot be cracked, or easily be cracked, unlike 70 percent of today’s common encryption standards, such as RSA and Diffie-Hellman, by Quantum Computers in a “post quantum” world. Recent breakthroughs include reducing the size of encryption keys and signatures, the time required to encrypt and decrypt data, as well as verify signatures, as well as reducing the amount of information that has to be sent across the wires. Consequently there are now a multitude of suggested protocols with the leaders being those that work best with today’s existing encryption standards, which include FrodoKEM, Picnic, qTesla, and SIKE, that are all based, in one way or another, on Code based, Hash based, Lattice, Multivariate, Supersingular Elliptic Curve, and Symmetric key encryption research. DEFINITION Post Quantum Cryptography use a suite of public key cryptographic algorithms that cannot be cracked by Quantum Computers. EXAMPLE USE CASES Today the first prototype Post Quantum Cryptography products are being used to test the theories and refine the methodologies. In the future the primary applications of the technology will be to encrypt and protect information in the same way we do today, but in a post quantum world. FUTURE TRAJECTORY AND REPLACABILITY Over the next decade interest in the field will continue to accelerate, and interest and investment will continue to grow at an accelerating rate, primarily led by organisations in the Defence and Technology sectors, with support from government funding, and university grants. In time we will see the technology mature and the market consolidate around two or three winners, however one of the main risks to organisations is the fact that the transition to these new protocols will take time, in some cases up to a decade which will put organisations at risk. While Post Quantum Cryptography is in the Prototype Stage and early Productisation Stage, over the long term it will be enhanced by advances in Artificial Intelligence, and Quantum Computers, but at this point in time it is not clear what it will be replaced by. MATTHEW’S RECOMMENDATION In the short to medium term I suggest companies put the technology on their radars, explore the field, establish a point of view, experiment with it, and forecast out the potential implications of the technology. 15 SECOND SUMMARY Accessibility Affordability Competition Demonstration Desirability Investment Regulation Viability 2 3 6 7 9 5 3 7 2004 2012 2018 2027 2034 STATUS PRIMARY GLOBAL DEVELOPMENT AREAS IMPACT STARBURST APPEARANCES: ‘18, ‘19, ‘20, ‘21, ‘22, ‘23, ‘24 POST QUANTUM CRYPTOGRAPHY EXPLORE MORE. Click or scan me to learn more about this emerging tech. , 2020 424311institute.com MRL4 /9 3 /10 5 TRL /9 Q UANTUM CRYPTOGRAPHY, which is in the Prototype Stage and early Productisation Stage, is the field of research concerned with developing new quantum based encryption protocols that can be used to create unbreakable cryptographic systems. Recent breakthroughs include the development of the first commercially available Quantum Key Distribution systems, and breakthroughs in the Quantum Signal Repeaters and quantum communications satellite systems needed to relay the keys over very long distances at speed - including inter-continental. DEFINITION Quantum Cryptography exploits the properties of Quantum Mechanics and Quantum Key Distribution to create theoretically unbreakable cryptographic systems. EXAMPLE USE CASES Today we are using Quantum Encryption to protect sensitive transactions in the defence, finance, and government sectors. In the future the primary applications of the technology will include using it to protect all manner of sensitive information very much in the same way that we use encryption today. FUTURE TRAJECTORY AND REPLACABILITY Over the next decade interest in the field will continue to accelerate, and interest and investment will continue to grow at an accelerating rate, primarily led by organisations in the Defence, and Technology sectors, with support from government funding, and university grants. In time we will see the distance and speed that quantum keys can be transmitted increase to the point where they are no longer constrained, at which point the adoption of the technology will begin to accelerate. While Quantum Cryptography is in the Prototype Stage and early Productisation Stage, over the long term it will be enhanced by advances in Sensor Technology, but at this point in time it is not clear what it will be replaced by. MATTHEW’S RECOMMENDATION In the short to medium term I suggest companies put the technology on their radars, explore the field, establish a point of view, experiment with it, and forecast out the potential implications of the technology. 15 SECOND SUMMARY Accessibility Affordability Competition Demonstration Desirability Investment Regulation Viability 2 4 5 7 9 5 3 8 2003 2012 2016 2025 2032 STATUS PRIMARY GLOBAL DEVELOPMENT AREAS IMPACT QUANTUM CRYPTOGRAPHY STARBURST APPEARANCES: ‘17, ‘18, ‘19, ‘21, ‘22, ‘23, ‘24 EXPLORE MORE. Click or scan me to learn more about this emerging tech. 425311institute.com MRL1 /9 3 /10 3 TRL /9 Q UANTUM FINGERPRINTING, which is in the Prototype Stage, is the field of research concerned with trying to find new ways to use quantum phenomenon, which are in essence Physically Unclonable Functions (PUF), to perfectly identify and secure systems and users. Recently there have been a few breakthroughs in this intriguing field including the use of the transistor trap sites to uniquely identify every device. Because every trap site in a computer transistor is unique - thanks to their method of fabrication and atomic structure - they all have unique Current-Voltage Characteristics at the quantum level which are unclonable, so by using image recognition algorithms researchers were able to give each computer chip a unique fingerprint that could then be used to identify them as friend or foe. In today’s age, being able to identify devices and users at the quantum level is needless to say an incredibly powerful tool in the fight against cyber crime. DEFINITION Quantum Fingerprinting is the use of quantum signatures to uniquely identify devices, systems, and users. EXAMPLE USE CASES Being able to identify devices and users at the quantum level in an unclonable way opens the door to creating next generation cyber defense systems that are almost infallible, therefore their primary use case should be to help secure literally everything which makes this one of the most powerful security technologies in our arsenal. FUTURE TRAJECTORY AND REPLACABILITY Over the next decade we will continue to see interest in this field accelerate, albeit from a very very low base, predominantly led by government grants. The ability to identify objects at the quantum level, which cannot be cloned using today’s technologies, is an incredibly powerful step forwards for the cyber industry, but as this technology is flying under the radar it’s likely to remain niche for a long time until it is picked up by mainstream research teams. While Quantum Fingerprinting is still in the Prototype Stage it could be enhanced by advances in AI, Quantum technologies and sensors, and many other technologies, however over the long term it is not clear what it could be replaced by. MATTHEW’S RECOMMENDATION In the short to medium term I suggest companies put the technology on their radars, and re-visit it every few years until progress in the space accelerates. 15 SECOND SUMMARY Accessibility Affordability Competition Demonstration Desirability Investment Regulation Viability 3 3 2 6 9 3 2 8 1944 1965 1999 2037 2065 STATUS PRIMARY GLOBAL DEVELOPMENT AREAS IMPACT QUANTUM FINGERPRINTING STARBURST APPEARANCES: NONE 426311institute.com MRL EXPLORE MORE. Click or scan me to learn more about this emerging tech.3 /9 3 /10 5 TRL /9 Q UANTUM SAFE BLOCKCHAINS, which are in the early Prototype Stage, is the field of research concerned with developing new ways to protect Blockchains, that rely on traditional digital signatures to secure them, from being cracked and interfered with by Quantum Computers, that, according to many, pose a major security threat to the technology and the organisations using it. Recent breakthroughs include the development of new Quantum Key Distribution schemas that can be used to protect otherwise vulnerable blockchains. DEFINITION Quantum Safe Blockchains are blockchains that cannot be easily cracked using Quantum Computers. EXAMPLE USE CASES Today the first Quantum Safe Blockchain prototypes are being used to test the researchers theories and refine the technology. In the future the primary applications of the technology will be to use it to secure blockchains from attack from quantum computers. FUTURE TRAJECTORY AND REPLACABILITY Over the next decade interest in the field will continue to accelerate, and interest and investment will continue to grow albeit from a very low base, primarily led by organisations in the Technology sector, with support from university grants. In time we will see researchers refine the technology in a way that maintains the transparency and integrity of blockchain transactions, and as other complimentary technology fields mature, in time the technology will see increased adoption. While Quantum Safe Blockchains are in the early Prototype Stage, over the long term they will be enhanced by advances in Quantum Cryptography, but at this point in time it is not clear what they will be replaced by. MATTHEW’S RECOMMENDATION In the short to medium term I suggest companies put the technology on their radars, explore the field, establish a point of view, experiment with it, and forecast out the potential implications of the technology. 15 SECOND SUMMARY Accessibility Affordability Competition Demonstration Desirability Investment Regulation Viability 3 5 4 7 8 4 2 7 2015 2016 2017 2028 2032 STATUS PRIMARY GLOBAL DEVELOPMENT AREAS IMPACT STARBURST APPEARANCES: ‘17, ‘20, ‘21, ‘23, ‘24 QUANTUM SAFE BLOCKCHAINS EXPLORE MORE. Click or scan me to learn more about this emerging tech. 427311institute.com MRL7 /9 10 9 TRL /9 R OBO-HACKERS, which are in the Prototype Stage and Productisation Stage, is the field of research concerned with developing a range of multi-use semi-autonomous and autonomous Artificial Intelligence cyber-security and hacking platforms that are capable of identifying and patching vulnerabilities in the systems they are protecting, as well as exploiting the same in the systems they are being used to attack. Recent breakthroughs include the development and use of the world’s first commercial Robo-Hacker platforms, that can scan, identify, and patch, or exploit, Proof of Vulnerabilities in millions of lines of code within minutes, not the months or years that it has traditionally taken human analysts - a move that is described as game changing by experts in the field. DEFINITION Robo-Hackers are semi-autonomous and autonomous Artificial Intelligence platforms that are capable of analysing, exploiting and hacking code and systems. EXAMPLE USE CASES Today we are using Robo-Hackers to defend the Pentagon’s mission critical systems from cyber attack, as well as to identify and fix vulnerabilities in the code bases of autonomous vehicles, and Internet of Things devices. In the future the primary applications of the technology will be almost limitless. FUTURE TRAJECTORY AND REPLACABILITY Over the next decade interest in the field will continue to accelerate, and interest and investment will continue to grow at an accelerating rate, primarily led by organisations in the Defence and Technology sectors, with support from government funding. In time we will see the technology become self-coding and self-evolving, and become the defacto way organisations analyse their software for bugs and vulnerabilities, and protect their systems, but we will also quickly see the technology become weaponised and used for less noble purposes. While Robo-Hackers are in the Prototype Stage and Productisation Stage, over the long term they will be enhanced by advances in Artificial Intelligence, Creative Machines, Hive Minds, Quantum Computing, and Swarm Artificial Intelligence, but at this point in time it is not clear what they will be replaced by. MATTHEW’S RECOMMENDATION In the short to medium term I suggest companies put the technology on their radars, explore the field, establish a point of view, experiment with it, with a view to implementing it, and forecast out the potential implications of the technology. 15 SECOND SUMMARY Accessibility Affordability Competition Demonstration Desirability Investment Regulation Viability 3 5 3 8 9 5 2 9 1981 1994 2013 2018 2032 STATUS PRIMARY GLOBAL DEVELOPMENT AREAS IMPACT ROBO-HACKERS STARBURST APPEARANCES: ‘19, ‘20, ‘21, ‘22, ‘23, ‘24 EXPLORE MORE. Click or scan me to learn more about this emerging tech. 428311institute.com MRL1 /9 8 /10 2 TRL /9 T ELEPATHIC CYBER DEFENSE, which is in the Prototype Stage, is the field of research concerned with developing new ways to protect our rapidly growing digital ecosystems by harnessing and leveraging the power of the human mind, and, in essence, putting humans into the middle of the action inside virtual environments that represent the systems they are tasked with monitoring and protecting. Recent breakthroughs include unifying cyber security incident and response, systems architecture and design, and neural interface command and control systems to create “naturalised” virtual worlds where human cyber security analysts, that patrol the digital networks and systems in a Matrix-like fashion, are teamed with Robo-Hackers and other automated cyber defense tools to identify and eliminate threats as soon as they appear. DEFINITION Telepathic Cyber Defense systems use Brain Machine Interfaces to put human operators into the heart of computer networks and allow them to become active guardians. EXAMPLE USE CASES Today the prototypes of Telepathic Cyber Defense are being used to test the theories and simulations, and refine the methodologies. In the future the primary applications of the technology will be to defend mission critical and sensitive systems from attack, while harnessing the combined power of both humans and machines within one naturalised virtual environment. FUTURE TRAJECTORY AND REPLACABILITY Over the next decade interest in the field will continue to accelerate, and interest and investment will continue to grow, albeit from a very low base, primarily led by organisations in the Defence and Technology sectors, with support from government funding. In time we will see researchers create increasingly complex and seamless virtual environments that not only put cyber security analysts into the heart of the systems they are protecting, but that gives them a range of new and powerful tools and techniques with which to fight intruders.. While Telepathic Cyber Defense is in the Prototype Stage, over the long term it will be enhanced by advances in Artificial Intelligence, Creative Machines, Quantum Computing, Neural Interfaces, Robo-Hackers, and Virtual Reality, but at this point in time it is not clear what they will be replaced by. MATTHEW’S RECOMMENDATION In the short to medium term I suggest companies put the technology on their radars, establish a point of view, and re- visit it every few years until progress in the space accelerates. 15 SECOND SUMMARY Accessibility Affordability Competition Demonstration Desirability Investment Regulation Viability 1 2 4 2 7 4 1 7 1976 2016 2026 2034 2048 STATUS PRIMARY GLOBAL DEVELOPMENT AREAS IMPACT STARBURST APPEARANCES: ‘19, ‘20, ‘21, ‘22, ‘23 TELEPATHIC CYBER DEFENSE EXPLORE MORE. Click or scan me to learn more about this emerging tech. 429311institute.com MRLNext >