Showing posts with label ICTEC. Show all posts
Showing posts with label ICTEC. Show all posts

23 July 2018

Why is America so bad at information wars?

Are financial and cyber crises alike? Trump says he accepts evidence of Russian meddling Trump’s defence of Russia sparks outrage in US Mueller charges 12 Russian intelligence officers Opinion FT Magazine Why is America so bad at information wars? ‘Russian-backed groups began populating US social media from the autumn of 2015 onwards’ GILLIAN TETT Add to myFT Share on Twitter (opens new window) Share on Facebook (opens new window) Share on LinkedIn (opens new window) Save Save to myFT Gillian Tett JULY 18, 2018 Print this page97 While fighting al-Shabaab in 2011, Kenyan army officer Major Emmanuel Chirchir noticed that the Somali-based Islamist group was using donkeys to transport weapons. He dispatched a message via Twitter, warning the local Kenyan population: 


Camino Mortera-Martinez

The EU knows that a cyber war is happening, but not how to fight it. To be up to speed, the bloc needs to update its cyber security plans.  The EU’s cyber security plans have been in the spotlight since a series of high profile cyber attacks hit Europe in 2017. But very few people understand what a cyber war really is, how to fight cyber crime and what role, if any, the EU has in all this.  Europe’s cyber security strategy covers two things: cyber crime, such as online fraud; and cyber attacks, for instance hacking into a nuclear plant. Cyber crime is lucrative, and is expanding rapidly. Cyber attacks have become one of the weapons of choice of governments and criminal organisations around the world. Both cyber threats can come from state and non-state actors.  The EU has been good at dealing with cyber crime, by doing what it does best: passing laws. But Europe’s ability to prevent and respond to cyber attacks lags behind the offensive cyber capabilities of adversaries like Russia and North Korea. 

Hamas preparing for cyber war

Tal Shahaf

Israel has been facing incendiary kites and balloons for months along the Gaza border. A land device has been developed against terror tunnels, terror sea vessels have been blocked by a marine obstacle, and some method of countering terror balloons may also be found. At the same time, however, in the digital sphere, Hamas is trying to develop cyber capabilities that will enable it to attack Israeli civilians without having to encounter a physical barrier. In recent weeks, a series of attacks aimed at Israeli citizens and IDF soldiers has been revealed. These attacks, which bear the fingerprints of Hamas hackers, were neutralized, but it can be assumed that they are only the tip of the iceberg. They will probably recur, while utilizing far more technologically sophisticated means. Next time, they will be aimed at Israeli institutions and organizations, as well as civilians. 

WikiLeaks Reveals CIA Teams Up With Tech to Collect Ideas For Malware Development

Swati Khandelwal

As part of its ongoing Vault 7 leaks, the whistleblower organisation WikiLeaks today revealed about a CIA contractor responsible for analysing advanced malware and hacking techniques being used in the wild by cyber criminals. According to the documents leaked by WikiLeaks, Raytheon Blackbird Technologies, the Central Intelligence Agency (CIA) contractor, submitted nearly five such reports to CIA as part of UMBRAGE Component Library (UCL) project between November 2014 and September 2015. These reports contain brief analysis about proof-of-concept ideas and malware attack vectors — publically presented by security researchers and secretly developed by cyber espionage hacking groups.

US Needs Hi-Lo Mix Of ‘Exquisite’ & Affordable ISR: Intel Official


CAPITOL HILL CLUB: Under the new National Defense Strategy, the nation must invest in cutting-edge technologies to take on Russia or China in a major war. But even as we do that, we can’t neglect the lower-end, lower-cost systems that gather intelligence everyday in peacetime, a senior Pentagon intel official said. We need to strike a balance between a small number of high-tech, high-cost capabilities and a larger number of more mundane ones, Kevin Sherman told an Army signals intelligence (SIGINT) conference this morning, for three reasons: 

AI companies pledge to not develop deadly autonomous weapons

By: Kelsey Atherton 

If killer robots are coming, many prominent artificial intelligence developers want no part in it. That’s the heart of a pledge, signed by over 160 AI-related companies and organizations, released to the public July 17 in Stockholm. The pledge is short, clocking in at under 300 words, and it has at its heart a simple, if somewhat unusual, promise: If violence is to be done, so be it, but life-ending decisions should be squarely the domain of humans, not machines. “Thousands of AI researchers agree that by removing the risk, attributability, and difficulty of taking human lives, lethal autonomous weapons could become powerful instruments of violence and oppression, especially when linked to surveillance and data systems,” reads the Lethal Autonomous Weapons Pledge the pledge in part.

Marines stand up first-of-its-kind tactical cyber team

By: Mark Pomerleau  

II Marine Information Group, or MIG, held an activation ceremony July 16 for the first-ever defensive cyber operations-internal defensive measures company, according to the group. These DCO-IDM companies, which will eventually be stood up within each MIG, are designed to help defend critical digital assets at the tip of the spear. According to a Marine Corps news release, the company will perform include mission assurance actively hunting for advanced persistent threats that evade routine security measures.

The Marine Corps is building cyber defenders to deploy with its forward networks in theater.

The Pentagon Wants to Bring Mind-Controlled Tech To Troops

By Jack Corrigan,

The idea of humans controlling machines with their minds has spun off sci-fi blockbusters like “Pacific Rim” and entire subgenres of foreign film, but while today skyscraper-sized fighting robots exist only on the big screen, the Pentagon is building technology that could one day make them a reality. Today, the Defense Advanced Research Projects Agency is selecting teams to develop a “neural interface” that would both allow troops to connect to military systems using their brainwaves and let those systems transmit back information directly to users’ brains. The Next-Generation Non-Surgical Neurotechnology, or N3, program aims to combine the speed and processing power of computers with humans’ ability to adapt to complex situations, DARPA said. In other words, the technology would let people control, feel and interact with a remote machine as though it were a part of their own body.

22 July 2018

Chinese Espionage Group TEMP.Periscope Targets Cambodia Ahead of July 2018 Elections and Reveals Broad Operations Globally

by Scott Henderson, Steve Miller, Dan Perez, Marcin Siedlarz, Ben Wilson, Ben Read


FireEye has examined a range of TEMP.Periscope activity revealing extensive interest in Cambodia's politics, with active compromises of multiple Cambodian entities related to the country’s electoral system. This includes compromises of Cambodian government entities charged with overseeing the elections, as well as the targeting of opposition figures. This campaign occurs in the run up to the country’s July 29, 2018, general elections. TEMP.Periscope used the same infrastructure for a range of activity against other more traditional targets, including the defense industrial base in the United States and a chemical company based in Europe. Our previous blog post focused on the group’s targeting of engineering and maritime entities in the United States.



In February, a group of Cofán men dressed in dark tunics and bandoliers studded with forest seeds gathered around a fire pit in northeastern Ecuador. In the thin light of dawn, they prepared to set out on a patrol of the Cayambe Coca National Park, a protected area that covers more than 1,500 square miles of rainforests, wetlands, glacial lagoons, and snowcapped cordillera, the tallest peak of which belongs to the massive Cayambe volcano. The men were all members of la guardia, a unit established by the Cofán in 2017 to push back against trespassers’ growing encroachment onto their ancestral lands. 

Why cyber space matters as much to Nato as land, sea and air defence

Please use the sharing tools found via the email icon at the top of articles. Copying articles to share with others is a breach of T&Cs and Copyright Policy. Email to buy additional rights. Subscribers may share up to 10 or 20 articles per month using the gift article service. More information can be found hereJens Stoltenberg on Article 5 and why cyber defence has become core to the alliance Cyber attacks can switch off city power supplies © Max Vetrov/AFP/Getty Images Share on Twitter (opens new window) Share on Facebook (opens new window) Share on LinkedIn (opens new window) Save Save to myFT Jens Stoltenberg JULY 12, 2018 Print this page2 One night, just before Christmas in 2015, the power went out across Kiev. As apartments rapidly chilled in the sub-zero temperatures and water pipes began to freeze, Ukrainian engineers raced to turn the power back on. A year later, exactly the same thing happened again. 

Having a vision to tackle the hackers

By Andy Stout

As events last year demonstrated, cybersecurity in the media and entertainment industry is of very real concern. As the world gets ever more connected and still more vulnerabilities open up, how can broadcasters and suppliers work together to prepare for and combat threats? On 27 June 2017, the NotPetya computer malware exploded round the world targeting computers running Microsoft Windows. Unlike previous ransomware viruses, its backend mechanisms to collect bitcoins from infected sites were rather malformed and seemed almost incidental, leaving experts to conclude that it was not built to extort money but simply to infect systems and cause the maximum amount of damage possible.

Opinion: We need to decide what constitutes an ‘act of war’ in the digital age


In recent years, it’s begun to seem like cyber attacks from national level opponents are just a way of life. Reports of Russian efforts to gain access to the U.S. electrical grid or Chinese operatives seeking technical data on the U.S. defense apparatus have become so familiar that the stories themselves no longer draw a great deal of public interest. With no shots fired and no forces crossing any borders, a form of warfare is already raging — with digital security professionals squaring off against offensive operations aimed at the United States, and of course, others likely launching American offensives of our own.

An Assessment of the Likely Roles of Artificial Intelligence and Machine Learning Systems in the Near Future

Ali Crawford has an M.A. from the Patterson School of Diplomacy and International Commerce where she focused on diplomacy, intelligence, cyber policy, and cyber warfare. She tweets at @ali_craw. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. Title: An Assessment of the Likely Roles of Artificial Intelligence and Machine Learning Systems in the Near Future Summary: While the U.S. Department of Defense (DoD) continues to experiment with Artificial Intelligence (AI) as part of its Third Offset Strategy, questions regarding levels of human participation, ethics, and legality remain. Though a battlefield in the future will likely see autonomous decision-making technology as a norm, the transition between modern applications of artificial intelligence and potential applications will focus on incorporating human-machine teaming into existing frameworks.

21 July 2018

How quantum computers could steal your bitcoin


Crypto-currencies like bitcoin have recently captured the public’s imagination because they offer an exciting alternative to traditional monetary systems. Bitcoin transactions are essentially a series of puzzles stored in public on the blockchain. The puzzles used to protect bitcoin are so complex that current computer technology isn’t powerful enough to crack them. But quantum computers could crack these puzzles in coming decades. Here’s how it could happen to your bitcoin. How does the encryption behind bitcoin work? Traditional currencies rely on trusted intermediaries like banks to verify and record all monetary transactions. The crypto-currency economy instead relies on a public ledger – the blockchain, which is maintained by all honest participants of the bitcoin network.

Microsoft wants the government to regulate face recognition software

It’s the first big tech company to ask the feds to supervise how the technology is used. A view from the top: Microsoft president and chief legal officer Brad Smith wrote in a blog post Friday that the company is requesting Congress regulate AI-powered face recognition software. “There will always be debates about the details, and the details matter greatly,” says Smith. “But a world with vigorous regulation of products that are useful but potentially troubling is better than a world devoid of legal standards.” What should they regulate? Smith outlined questions he thinks officials should discuss including:  Should law enforcement’s use of facial recognition be subject to human oversight and controls? 

U.S. Needs a National Strategy for Artificial Intelligence, Lawmakers and Experts Say


The government is well-positioned to flag specific research areas that would have the biggest impact on national interests.  Policymakers and technology experts said without a broad national strategy for driving artificial intelligence forward, the U.S.risks letting global competitors direct the growth of the budding industry. The Trump administration has taken a largely hands-off approach in regards to AI, arguing it’s still too early for the government to get involved in the technology and any attempts at oversight could stifle its growth. But in a panel hosted Wednesday by Politico, experts were quick to point out the difference between burdening industry with regulations and addressing the issues at hand today.

Pentagon sees quantum computing as key weapon for war in space

by Sandra Erwin 

Michael Hayduk, chief of the computing and communications division at the Air Force Research Laboratory says quantum technology will be "disruptive" in areas like data security and GPS-denied navigation. WASHINGTON — Top Pentagon official Michael Griffin sat down a few weeks ago with Air Force scientists at Wright Patterson Air Force Base in Ohio to discuss the future of quantum computing in the U.S. military. Griffin, the undersecretary of defense for research and engineering, has listed quantum computers and related applications among the Pentagon’s must-do R&D investments.

The F-35 Is a $1.4 Trillion National Disaster


The F-35 still has a long way to go before it will be ready for combat. That was the parting message of Michael Gilmore, the now-retired Director of Operational Test and Evaluation, in his last annual reportThe Joint Strike Fighter Program has already consumed more than $100 billion and nearly 25 years. Just to finish the basic development phase will require at least an extra $1 billion and two more years. Even with this massive investment of time and money, Gilmore told Congress, the Pentagon and the public, “the operational suitability of all variants continues to be less than desired by the Services.” Gilmore detailed a range of remaining and sometimes worsening problems with the program, including hundreds of critical performance deficiencies and maintenance problems. He also raised serious questions about whether the Air Force’s F-35A can succeed in either air-to-air or air-to-ground missions, whether the Marine Corps’ F-35B can conduct even rudimentary close air support, and whether the Navy’s F-35C is suitable to operate from aircraft carriers.

The Farming Technology Revolution Bringing tech into the fields

Oculus, Amazon, Uber, and Google are the household names most associated with innovations in autonomous vehicles, virtual reality, and drones. John Deere? Not so much. But the agricultural industry has a long track record of acting as a testing ground for new technologies well before they’re a blip on consumers’ radar. The agricultural industry has always been an early adopter of technology. Prehistoric farmers practiced selective breeding to create the optimal traits in plants, otherwise known as genetic modification. In the early 1800s, Eli Whitney introduced a rifle made with interchangeable parts. Shortly after, farmers began adopting iron plows with interchangeable parts. While we might not immediately think of farmers as innovators, they’ve been ahead of the curve for centuries.