Showing posts with label ICTEC. Show all posts
Showing posts with label ICTEC. Show all posts

24 February 2018

What Can Be Done To Smoothen Aadhaar’s Bumpy Ride

by Sanjeev Ahluwalia

Aadhaar is a great example of what India is good at — frugal innovation. Now we need to build the best-quality systems around its identification and authentication process. 

Take 1.2 billion people, mix in dollops of illiteracy and a culture of graft, heat with the oil of optimism, and garnish with faith, bung in the ability of technology to overcome man-made obstacles, and what you get is the Aadhaar system. Though, not surprisingly, just a few years down the line, the techno-magic of Aadhaar appears to be wearing thin in the face of our relentless ability to game any system for personal gain.

AI warfare is coming, and some global leaders say NATO isn’t ready

By: Jill Aitoro 

MUNICH — The future of warfare will involve artificial intelligence systems acting as lethal weapons, and much like cyber a decade ago, NATO allies are ill-equipped to manage the potential threat, said current and former European leaders speaking at the Munich Security Conference.

Kersti Kaljulaid, president of Estonia, estimated a 50 percent chance that by the middle of this century we will have an AI system capable of launching a lethal attack. And yet, just as the world was not prepared for a cyberattack when Russia first launched a cyberattack against Estonia in 2007 — bombarding websites of Estonian parliament, banks, ministries, and news outlets — there is no strategy or international law to deter such tactics of warfare.

Agencies haven’t gauged critical infrastructure cybersecurity thoroughly, says GAO

By: Jessie Bur 

Agencies lack the measurement tools to evaluate NIST cyber framework implementation in critical infrastructure sectors. 

Though most U.S. critical infrastructure sectors have taken actions to adopt the National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity, sector-specific agencies responsible for developing guidance failed to develop adequate measures for framework adoption within their cluster, a Feb. 15, 2018, Government Accountability Office report found.

Cybersecurity is not something; it is everything


Tom Wheeler

Four years ago, the Obama Administration rolled out the Cybersecurity Framework from the National Institute of Standards and Technology (NIST). It has proven to be an essential and indispensable roadmap for companies to review their cybersecurity risk and preparedness. Recently, NIST updated the document to reflect supply chain risk and additional security insights.

How Smartphone Prices Differ Across The Globe


Driven by an increase in demand for premium smartphones, the average smartphone selling price increased to $328 last year.

However, as the following chart shows, it makes sense to look at smartphone prices at a more regional level.

According to GfK point-of-sale data from 75 countries, the average selling price for smartphones ranged from $645 in developed Asia (incl. Australia, Hong Kong, Japan, New Zealand, Singapore, South Korea and Taiwan) to $183 in emerging Asia (incl. Bangladesh, India, Cambodia, Malaysia, Myanmar, Philippines, Thailand, Vietnam) last year.

Foreign Disinformation is a Threat to Military Readiness, Too

BY MATTHEW KRULLLT. CMDR

Troops — and their families — need training to spot and discard false narratives and information. 

Just as foreign actors seek to shape opinions and actions by the general American public — highlighted by Friday’s indictment of 13 Russians on conspiracy charges to influence national elections — they are also working to influence the U.S.military community. Recent research by Oxford University has revealed how foreign actors are targeting servicemembers, civilians, and their families. Immediate efforts are needed to mitigate this threat to military readiness, and to develop the information resilience of the military community.

Here’s where the Pentagon wants to invest in artificial intelligence in 2019

By: Brandon Knapp 

By 2025, the Army sees ground troops conducting foot patrols in urban terrain with robots—called Squad Multipurpose Equipment Transport vehicles—that carry rucksacks and other equipment. Unmanned aircraft could serve as spotters, according to the Army’s new strategy for robotic and autonomous systems. 

From Amazon’s Alexa to self-driving cars, artificial intelligence (AI) is rapidly improving and promises to soon transform almost every aspect of life.

23 February 2018

How to Inoculate the Public Against Fake News

BY PATRICK TUCKER

When people were given a toolbox of deceptive techniques and told to “play Russian troll,” they learned to reject disinformation. 

Friday’s indictment of 13 Russians on charges of attempting to defraud the public and influence the U.S. presidential election shows that that the United States remains vulnerable to what the indictment calls “information warfare” but what others call simply fake news. A new research paper released Monday from two Cambridge University researchers shows how to counteract it.

Lessons From A Kidnapping Gone Wrong


Fred Burton's recent interview with the author Philip Jettinspired me. Their discussion of Jett's recent book, The Death of an Heir: Adolph Coors III and the Murder That Rocked an American Brewing Dynasty, compelled me to read it for myself. Meticulously chronicling the crime, and the preparation the perpetrator conducted in advance, the book makes for a fascinating read. And although the incident it details - Adolph Coors III's tragic death during a botched kidnapping - happened more than 50 years ago, the story offers valuable lessons for personal security that ring true still today.

Smartphones Drive New Global Tech Cycle, But Is Demand Peaking?


Over a decade of spectacular growth, demand for smartphones has created a new global tech cycle that last year produced a new smartphone for every fifth person on earth.

This has created a complex and evolving supply chain across Asia, changing the export and growth performance of several countries. While our recent analysis of Chinese smartphone exports suggests that the global market may be saturated, demand for other electronics continues to support rising semiconductor production in Asia.

Noose Tightens On Bitcoin

by James Rickards

With everything that’s been happening with the stock market lately, people have forgotten about last year’s biggest investment story:

After briefly topping off near $20,000 in December, today it’s trading around $10,000.

A lot of bad news has come to the bitcoin ecosphere. China, for example, recently ordered its banks to stop providing financial services for any cryptocurrency-related transactions.

The Air Force requested $30M to develop a ‘cyber carrier’

By: Mark Pomerleau 

Much like traditional military capabilities have platforms from which to launch attacks, Cyber Command and the services’ cyber components need a comparable platform.

This effort underway is called the unified platform, which some have equated to a “cyber carrier,” and the Department of Defense’s budget request for fiscal 2019 describes a plan to develop such a program.

22 February 2018

North Korean Cyber-Attacks and Collateral Damage


WannaCry was incredibly destructive. The attackers made about $150,000 – but the total damage caused by WannaCry has been estimated in the billions of dollars.

There is strong evidence linking WannaCry to a group of hackers known as ‘Lazarus’, reportedly operating out of the DPRK (North Korea). Whilst WannaCry is perhaps the most famous attack by Lazarus, it isn’t the only ‘collateral damage’ caused by the DPRK’s cyber actions.

CYBER-WAR NIGHTMARES: HOW CAN IRAN, HEZBOLLAH USE CYBER TO FIGHT ISRAEL?

BY YONAH JEREMY BOB

With this weekend’s events shifting the country’s attention to envisioning the next potential war risks, the cyber-war playing field may once again come front and center.

Unfortunately, in estimating the cyber dangers potentially posed by Israeli adversaries, the danger list may be so long, that it might be easier to assume they can do almost anything and only mention the few things they cannot do.

The U.S. Invented the Internet. The Russians Weaponized It and Used It Against America to Help Donald J. Trump Get Elected

Nancy Scola 

The indictment released Friday by special counsel Robert Mueller makes plain how prosecutors believe Russia pursued its multiyear scheme to undermine the 2016 presidential election — by wielding the social media-driven internet that the United States itself did so much to create. 

They had help, digital experts say, from decades of accepted U.S. policy about how to help the internet thrive: The U.S. government has taken a largely hands-off approach, while the anonymity that protects people’s privacy and liberty online also allowed Russian trolls to deceive overly trusting Americans. And the same freedom to innovate that has made Silicon Valley wealthy and powerful meant that there were few eyes on the ball as Russian actors began figuring out how to manipulate the internet’s few dominant platforms, such as Facebook, Twitter and the Google-owned YouTube. 

Russia and China Racing to Get Satellite Jammers, Report Finds


A painting of a Defense Support Program satellite from the Air Force Art collection. DSP provides a variety of national security capabilities. Its flagship mission of launch detection was made famous during the Cold War. 

Weapons capable of jamming or destroying U.S. military and commercial satellites will reach initial operational capability in the next few years, according to a new intelligence report.

Winning the Digital Transformation Cyberwar


The vast majority of cybercrime we deal with is opportunistic and automated. It is the domain of criminals trolling for the unaware and vulnerable. They target unpatched systems and vulnerable applications, exploit gullible end users, break through inadequate security systems, and infect people wandering around the web in places they probably shouldn’t go.

For decades, fighting these cyber threats has been the primary job of cybersecurity professionals. Establishing controls, setting up a perimeter, hardening edge devices, inspecting traffic, regular patching and replacing protocols, and controlling access points are all security fundamentals that every security team practices, and that most traditional security devices are designed to support. Unfortunately, that didn’t always happen and we often resorted to buying the latest and greatest tools when a new threat emerged, reverted back to hard-wiring the integration of these new technologies, and then hoping it all worked together seamlessly to detect and mitigate threats. Cyber threats were real but manageable – and usually more disruptive than destructive.

No Easy Answers, Just More Questions in Major Encryption Report

By Joseph Marks

Anyone looking for a quick fix to the years-long debate over encryption systems that protect people’s personal information but frustrate law enforcement tracking criminals and terrorists won’t find it in a long-awaited study from the National Academies of Sciences, Engineering and Medicine released Thursday.

The consensus report, produced by a panel of tech industry, law enforcement and academic experts, spends roughly 100 pages laying out the problems posed by warrant-proof encryption systems and by law enforcement’s efforts to access them.

21 February 2018

International Hackers Find 106 Bugs in U.S. Air Force Websites

By Jack Corrigan

Breaking into a federal network usually gets you a one-way ticket behind bars, but sometimes hacking the government ends with a paycheck instead of a prison sentence.

The Air Force paid out nearly $104,000 to a cohort of white-hat hackers as part of Hack the Air Force 2.0, the Pentagon’s most recent bug bounty competition. During the 20-day competition, participants uncovered 106 security vulnerabilities across roughly 300 of the branch’s public-facing websites.

The debate over what Cyber Command still needs

By: Mark Pomerleau 

This is the final part of a series exploring the future of Cyber Command. For previous installments, see part one and part two.

As Cyber Command continues to mature, key government watchdogs want to ensure the organization does so in a responsible way.

As part of this effort, the House Armed Services Emerging Threats and Capabilities subcommittee, which oversees cyber, held a classified briefing with the Government Accountability Office in mid January to “discuss ongoing reviews and studies of cyberspace and cybersecurity capabilities of the Department of Defense,” a press release from the committee said.