Showing posts with label ICTEC. Show all posts
Showing posts with label ICTEC. Show all posts

14 April 2018

China As a Responsible Stakeholder: 5G, Your Toaster and the CCP (Part 2)

By Michael Shoebridge

The Australian government’s exclusion of huge Chinese telecom company Huawei from the National Broadband Network in 2012 turns out to have been a little thing hiding a bigger thing. The bigger thing is the implementation of a 5G network across Australia and whether or how Huwaei participates. 5G isn’t just a tagline for the next-generation, faster, more reliable mobile network that’ll connect your smartphone or tablet while you are away from home or the office and give you the bandwidth to watch Netflix on the move. 5G technology is the new high-speed, low-latency backbone technology that will enable the ‘internet of things’. It will allow companies to run power plants through internet-connected sensors and control systems. It will enable healthcare data to be shared electronically across multiple portable and fixed devices between patients, doctors, specialists and hospitals. It will enable your fridge to tell Woolworths when you need milk and salsa delivered, and enable you to tell your TV and toaster when to turn on and off.

Marketing and the Delegitimization of Elections

By George Friedman

Last week, I wrote about the use of marketing in elections. This week, as Facebook CEO Mark Zuckerberg faces a congressional hearing on how Facebook data was used during the 2016 presidential election, I will address one of the critical consequences of marketing. It is a tool used on a global basis to delegitimize elections and, with it, democracy. As I argued last week, the use of marketing, particularly online marketing, has been growing. But this doesn’t necessarily mean it is becoming more effective. It has been claimed that the Russians interfered in the U.S. election by spreading fake news stories to help Donald Trump get elected. It has also been revealed that consulting firm Cambridge Analytica helped run the Trump campaign’s data operations and used social media user data to target certain voters with customized content. The connection between alleged Russian interference and Cambridge Analytica is murky, but they are both being used as examples of how the internet can sway election results. This assumes that such techniques are effective enough to change voters’ minds and influence the outcome of a presidential election.


THE HEADLINES ABOUT the trade wars being touched off by President Trump’s new tariffs may telegraph plenty of bombast and shots fired, but the most consequential war being waged today is a quieter sort of conflict: It’s the new Cold War over data protection. While the Facebook/Cambridge Analytica crisis currently burns as the latest, hottest flare-up in this simmering conflict, tensions may increase even more on May 25, 2018, when the European Union’s General Data Protection Regulation comes into effect.

Minister Reveals Cyber Attack On Iranian Data Centers, Blames Foreign Hackers

Iran’s Telecommunications minister has criticized the government’s cyber-attack monitoring center for failing to detect an attack that led to the hacking of several Iranian data centers on the evening of April 6, despite a warning about the attack ten days before it took place. Mohammad Javad Azari Jahromi first said in a tweet Friday evening “Several Iranian data centers came under cyber attacks tonight. Some of the smaller routers have been changed to factory setting.” Later, in another tweet, Jahromi claimed that MAHER, Persian acronym for the Computer-related Events Operation and Coordination Center, “Has monitored and controlled the attack and the data centers’ settings have been brought back to normal.”

Cyber Needs to Be Center Stage for Every World Leader

By Christopher Painter

It seems every day brings news of another high-profile cyberattack or intrusion affecting our personal data, national security or the very integrity and availability of the institutions and infrastructure on which we depend. These cyber threats come from a range of bad actors including ordinary criminals, transnational organised criminal groups and nation-states. Indeed, in mid-February, Australia, the United States, the United Kingdom and several other countries attributed the devastating NotPetya ransomware worm—that caused billions of dollars of damage across Europe, Asia and the Americas—to the Russian military as part of the Kremlin’s efforts to destabilise the Ukraine. At the same time, special counsel Robert Mueller in Washington unveiled a remarkably detailed criminal indictment charging a range of Russian individuals and organisations with a concerted effort to undermine the 2016 U.S. elections.

13 April 2018

South China Sea: China Deploys Jamming Equipment

By Ankit Panda

According to U.S. military officials, China has deployed communications and radar jamming equipment to Fiery Cross Reef in the Spratly group in the South China Sea. The deployment took place during the last 90 days, according to U.S. intelligence. First reported by the Wall Street Journal, the deployment marks a significant capability improvement for the Chinese military in the South China Sea. Fiery Cross Reef is the site of one of China’s seven artificial island facilities in the Spratlys. The U.S. military commissioned commercial satellite imagery from DigitalGlobe to point out the deployment to reporters with the Journal. “China has deployed military jamming equipment to its Spratly Island outposts,” one Pentagon official told the reporters.

A Global Arms Race for Killer Robots Is Transforming the Battlefield


Over the weekend, experts on military artificial intelligence from more than 80 world governments converged on the U.N. offices in Geneva for the start of a week’s talks on autonomous weapons systems. Many of them fear that after gunpowder and nuclear weapons, we are now on the brink of a “third revolution in warfare,” heralded by killer robots — the fully autonomous weapons that could decide who to target and kill without human input. With autonomous technology already in development in several countries, the talks mark a crucial point for governments and activists who believe the U.N. should play a key role in regulating the technology.

Autonomous weapons and the law: the Yale and Brookings discussions


One of the hottest topics these days in the law of war is the increasing autonomy in weaponry. We are not yet seeing (and may never see) the emergence of a “Terminator” robot, but there are still plenty of complex issues to discuss. In anticipation of this week’s meeting at the UN of the Group of Governmental Experts (GGE) on Lethal Autonomous Weapons Systems (LAWS), events were held at Yale and Brookings last week. I was privileged to participate in them, and here are some observations about those discussions. At Yale Law School, the dialog was cast as a debate between my friend Professor Rebecca Crootof and myself entitled “Killer Robots: Is Existing Law Sufficient? A Debate on How Best to Regulate Autonomous Weapons.” Professor Crootof has a new paper, entitled “Autonomous Weapon Systems and the Limits of Analogy,” in which she argues that analogies often made to “weapons already in use” as well as “analogies based on unconventional entities that participate in armed conflict—namely, child soldiers and animal combatants” do not work for autonomous weapons.

Meet the scholar challenging the cyber deterrence paradigm

By: Brad D. William 

In recent years, U.S. thinking on a national cyber strategy has included, at least in part, a focus on the concept of cyber deterrence. The deterrence theme has been prevalent in civilian government and military leaders' speeches, as well as congressional hearings and scholarly literature. (See, for instance, Fifth Domain coverage While many agree on the need for a U.S. national cyber strategy, few have challenged the premise of a strategy built largely around cyber deterrence. But one scholar has recently published a series of academic papers that do exactly that — question the very premise for and the effectiveness of a deterrence strategy in cyberspace.

12 April 2018

Careful what you wish for—change and continuity in China’s cyber threat activities (part 2)

Elsa Kania

At a time when ‘cyber anarchy’ seems to prevail in the international system, the emergence in 2015 of US–China consensus against ‘cyber-enabled theft of intellectual property’ initially appeared to promise progress towards order. The nascent norm against commercial cyber espionage that emerged between Xi Jinping and Barack Obama was later reaffirmed by the G‑20. China subsequently recommitted to this proscription in a number of bilateral agreements, including reaching a parallel commitment with Australia in April 2017.

Iran Hit After Cyber Attack Exploits Cisco Router Flaw

Tom Jowitt 

Did nation state hackers target computer networks of Iran by exploiting a flaw with Cisco routers? “Advanced actors” have exploited a flaw with Cisco routers to launch an attack at the weekend that apparently hit 200,000 routers around the world. This included 3,500 switches in Iran, according to that country’s Communication and Information Technology Ministry, as reported by Iran’s official news agency IRNA. And there is a suspicion that these “advanced actors” could have been working for a nation state, after computer screens in data centres in Iran were left with the image of a US flag on screens along with a warning: “Don’t mess with our elections”.

Monitor: New Electronic Warfare in Ukraine?

Source Link

Earlier this week, the Ukrainian NGO “Come Back Alive” published a drone video showing a Russian-led separatist outpost in the Donbas. The most interesting item revealed in the footage was an electronic warfare system.

We geolocated this video footage to a gas station in non-government-controlled territory to the north of Horlivka.

by Todd South 

Cyber attacks soon will destroy infrastructure and kill people. And that might be what it takes for policy leaders to prepare for what’s coming, experts said.A panel of four experts from military , finance, cyber and strategy laid out frightening scenarios at the New America Future of War conference Monday that are not far-off possibilities but things that are happening now Peter W. Singer, author of the novel “Ghost Fleet: A Novel of the Next World War,” and New America senior fellow, told the audience in Washington, D.C. that data breaches, cyber probes and power shutdowns in other countries haven’t been given the attention they truly need. And the enemy is watching that lack of response. “We will see kinetic attacks on the Internet of Things that will break things and kill people,” Singer said…

Are Programmers Headed Toward Another Bursting Bubble?

A friend of mine recently posed a question that I’ve heard many times in varying forms and forums: “Do you think IT and some lower-level programming jobs are going to go the way of the dodo? Seems a bit like a massive job bubble that’s gonna burst. It’s my opinion that one of the only things keeping tech and lower-level computer science-related jobs “prestigious” and well-paid is ridiculous industry jargon and public ignorance about computers, which are both going to go away in the next 10 years. […]” This question is simultaneously on point about the future of technology jobs and exemplary of some pervasive misunderstandings regarding the field of software engineering. While it’s true that there is a great deal of “ridiculous industry jargon” there are equally many genuinely difficult problems waiting to be solved by those with the right skill-set. Some software jobs are definitely going away but programmers with the right experience and knowledge will continue to be prestigious and well remunerated for many years to come; as an example look at the recent explosion of AI researcher salaries and the corresponding dearth of available talent.

The Bayer-Monsanto Merger Is Bad News For The Planet

by Ellen Brown

Bayer and Monsanto have a long history of collusion to poison the ecosystem for profit. The Trump administration should veto their merger not just to protect competitors but to ensure human and planetary survival. Two new studies from Europe have found that the number of farm birds in France has crashed by a third in just 15 years, with some species being almost eradicated. The collapse in the bird population mirrors the discovery last October that over three quarters of all flying insects in Germany have vanished in just three decades. Insects are the staple food source of birds, the pollinators of fruits, and the aerators of the soil.

Space war is coming — and the U.S. is not ready

Source Link

War is coming to outer space, and the Pentagon warns it is not yet ready, following years of underinvesting while the military focused on a host of threats on Earth. Russia and China are years ahead of the United States in developing the means to destroy or disable satellites that the U.S. military depends on for everything from gathering intelligence to guiding precision bombs, missiles and drones. Now the Pentagon is trying to catch up — pouring billions more dollars into hardening its defenses against anti-satellite weapons, training troops to operate in the event their space lifeline is cut, and honing ways to retaliate against a new form of combat that experts warn could affect millions of people, cause untold collateral damage and spread to battlefields on Earth.

The next step toward digital command and control

By: Adam Stone  

U.S. Army Spc. Julio Rodriquez, with the 1014th Sapper Company, Task Force Roughneck, Task Force Sword, a combat engineer form Canovanas, Puerto Rico, teaches new reconnaissance software (Automated Route Reconnaissance Kit) to soldiers from the 190th Engineer Company, TF Roughneck, at Forward Operating Base Deh Dadi 2, Dec. 6. The 1014th Sapper Company reached out to qualify their fellow engineers with the 190th Eng. Company. The migration of command and control into the digital realm in recent years has been described as a crucial advance, but military leaders say that’s only half the game.

Microsoft’s next act

In 2014, Satya Nadella was appointed CEO of Microsoft, making him only the third leader in the software company’s 40-year history, following Bill Gates and Steve Ballmer. Since taking the top job, Nadella has doubled down on cloud computing, artificial intelligence (AI), and social networking while also pushing Microsoft to become more innovative, collaborative, and customer focused. In 2017, he published Hit Refresh: The Quest to Rediscover Microsoft’s Soul and Imagine a Better Future for Everyone, a book reflecting on his journey from a cricket-obsessed childhood in India to leadership of one of the world’s largest companies.

How the CIA made Google Inside the secret network behind mass surveillance, endless war, and Skynet—

By Nafeez Ahmed

INTELLIGENCE, a new crowd-funded investigative journalism project, breaks the exclusive story of how the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority.’ The origins of this ingenious strategy trace back to a secret Pentagon-sponsored group, that for the last two decades has functioned as a bridge between the US government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the US and around the world. The results have been catastrophic: NSA mass surveillance, a permanent state of global war, and a new initiative to transform the US military into Skynet.

More Data, More Problems

In 2007, the U.S. Federal Communications Commission (FCC) fined three mobile phone operators for failing to ensure that first responders could locate their customers if those customers were to dial 911 during an emergency. The nationwide initiative to get telecommunications companies to invest in location technologies has been difficult: each company wanted the other parties—including public safety agencies—to invest before it would make its own move. As a result, everyone held off complying with the 2005 FCC mandate.