Coffee Break with Vint Cerf

The co-father of the internet chats about an internet for the animal kingdom, improving security online, and the emerging technologies he is most looking forward to.

Photo of Coffee Break with Vint Cerf

Following “An Evening With Vint Cerf,” we asked the co-father of the internet your questions.

YOU MENTIONED YOU WERE WORKING ON THE INTERNET FOR THE ANIMAL KINGDOM, WHAT IS THAT ABOUT?

This is the Interspecies Internet. In truth, the Internet part is just to provide a communication channel between species that might otherwise not encounter a face/face engagement. Among the participants are people who are working with great apes, chimpanzees, dolphins, that show serious signs of ability to communicate. While there has been a fair amount of experience with human/non-human interaction, the notion of facilitating (experimenting with?) communication between non-human species is intriguing. The effort is still in early stages.

WHAT IS YOUR TAKE ON THE IDEA THAT THE INTERNET IS “REWIRING OUR BRAINS”? DO YOU WORRY ABOUT INCREASING CULTURAL DISTRACTION, ATTENTION DEGRADATION, ETC.?

I know only a little about this effect, but I have the impression that too early interaction with screens and games has a measurable effect on brain neural development and processing (based on PET  and fMRI scans). Whether this effect is negative or not isn’t entirely clear to me but the fact that it is detectable raises questions in my mind that should have answers.

WHAT ARE YOUR VIEWS ABOUT THE DATA LAYERS OF THE INTERNET WHERE MOST OF TODAY’S MISCHIEF TAKE PLACE – BE IT IDENTIFY THEFT, CYBER-BULLYING, OR DIGITAL DECEIT IN OUR LAST ELECTION CYCLE? HOW MIGHT TECHNOLOGISTS AND GOVERNMENT IMPROVE WAYS TO MINIMIZE THE DAMAGING ASPECTS OF GLOBAL INTERNET USE AND MAXIMIZE ITS VAST ECONOMIC, SOCIAL, AND POLITICAL POTENTIAL? 

These problems manifest at many levels in the internet architecture. In many cases, the problems arise at the application level (phishing, social engineering, false account creation using stolen credentials, etc). There are, however, ample attack vectors at lower layers using a variety of tools including some from the intelligence community that have been released by inside attackers. Your last question is the $100M question (inflation since the 1960s $64,000 question). Part of the answer is better education for users to take action to protect their privacy and interests. We also need liability for negligent software, improved software production environments, and more use of cryptographic protections including two-factor authentication and end/end encryption, encryption of stored data, etc.

WHAT KEEPS YOU MOTIVATED?

The potential to get the rest of the world up and running on the internet, contributing to its contents and protecting its users.

WHICH EMERGING TECHNOLOGIES AREYOU MOST EXCITED ABOUT?

Quantum computing; Artificial Intelligence and Machine Learning; Interplanetary Internet protocols; intra- and inter-cellular communication models; CRISPR-CAS9; self-driving cars….

Your contribution to the NSTMF not only serves to celebrate scientific advancement, ingenuity, and exploration, but also symbolizes your commitment to building a more diverse, equitable, and inclusive future in STEM.

Newsletter

For monthly updates about NSTMF's work, events, and programs.

  • This field is for validation purposes and should be left unchanged.