Doing a Startup Involving Cryptography? Get Out of the US – IEEE Spectrum

Theres no better place than Singapore to do a deep tech startup, particularly anything involving cryptography. So says Brijesh Pande, founder and managing partner of the Tembusu ICT Fund, a Singapore-based software-focused venture capital fund. Admittedly, he has a vested interest in enticing entrepreneurs to come to the island nation, but heand two founders of companies in his portfolio, Lawrence Hughes from Sixscape and Ramond Looi from Vi Dimensionsmake a solid argument.

Here in Singapore, Pande says, We have no requirement for a security back door. The fact that the NSA [National Security Agency] requires U.S. companies to provide a back door makes technology developed in the U.S. less trusted around the world.

Hughes, who before decamping to Singapore founded several companies, including U.S.-based Ciphertrust and Philippine-based Infoweapons, says its just too difficult to do cyber security products in the U.S. these days. The NSA requires weakened algorithms and back doors, so you have to assume all IT products in the U.S. are compromised. That, he says, makes it hard to market them around the world.

Sixscape, Hughes latest startup, has developed a certificate management protocol based on a distributed public key infrastructure that can manage, he says, billions of unique certificates. Web sites use server certificates to identify themselves as legitimate. In his scheme, individual users will also use client certificates, created on their own computers, as identification, instead of less secure usernames and passwords. For additional security, banks and other particularly sensitive businesses can give their clients hardware keys containing certificates to even more reliably confirm identity. Hughes says Sixscape will soon be piloting the technology, issuing some 2 million hardware tokens for a government agency in a nearby country that wishes to allow secureaccess its website, without usernames or passwords.

Meanwhile, two-year-old Vi Dimensions, Looi explained, is developing AI to mine surveillance videos for anomalies. With hundreds of millions of cameras out there, he says, the cost of human monitoring is just too high. The software, he says, can spot a big truck driving an unusual route, or a child lost in a subway station. The company, he says, has deployed the technology on 200 cameras in Sentosa, a resort island with 20 million visitors annually, has signed an agreement with one of Europes largest national railways to use the technology on its surveillance cameras, and has completed trials in an Abu Dhabi skyscraper. On Sentosa, he said, the technology was able to improve operationsby spotting too-long lines at taxi stands and identifying points where parents were having trouble navigating strollers.

Its not just escaping the NSA that makes Singapore more and more attractive to startups, these entrepreneurs say.

The potential tightening of H1B visas in the United States will push more companies to start elsewhere, says Pande. If the U.S. develops an H1B issue, he says, that will be good for Singapore.

Here, there is no limit to H1Bs, you just have to demonstrate a need, Pande says.We have Singaporeans, Americans, Iranians, Indians, Russiansa veritable United Nations working at all our companies.

And, pointed out Hughes, Singapore has zero capital gains tax, relying instead on income and value added taxes.

Starting a company in Singapore, Pande points out, is not without challenges. We dont have a deep bench, he says. So the second level of tech talent, just below the entrepreneur, can be hard to come by.

And though the local universities are solid, he says, there just arent the big tech companies doing core R&D that spit out spinoffs.And there isnt a big domestic market, says Pande,though government support helps.

Valuations for startups also tend to be low compared to those in the U.S., Hughes says, but its early days here.

IEEE Spectrums blog featuring the people, places, and passions of the world of technologists in Silicon Valley and its environs. Contact us:t.perry@ieee.org

Germany takes the lead in making the Internet local 23Jan2014

Scott Borg, director of the U.S. Cyber Consequences Unit, says hardware design engineers hold the future of cybersecurity in their hands 15May

Secretive big data company Palantir has gobbled up downtown Palo Alto 14Jan2015

HAXs Ben Joffe takes a look at whats going on in Chinas startup sector 27Jun

Derive is taking technology that lets hot rodders soup up their vehicles and using it to make drivers behave themselves 27Jun

HAX executives preview trends in hardware startups 26Jun

The Canadian company wants to use AI to rate your car insurance risk in real time 22Jun

Affectivas Rana El-Kaliouby says our devices need to get a lot more emotionally intelligent 13Jun

The Pied Piper of the TV show's fictional quest to reinvent the Internet trails the progress of MaidSafe and the University of Michigan 9Jun

Nannycams? So yesterday. Startup Lighthouse's computer vision and AI will tell you everything you miss when youre not home 6Jun

Silicon Valley startup Verdigris cloud-based analysis can tell whether youre using a Chromebook or a Mac, or whether a motor is running fine or starting to fail 3May

Enviro Powers small steam turbine could cut homeowners electricity bills by 30 percent 18Apr

Avegant is confident enough about its light-field-based mixed-reality technology that it's willing to show and tell 18Apr

The 2017 contest puts a renewed emphasis on projects that could become successful businesses 24Mar

Who needs infrared spectrometers in their phones? People who hate buying tasteless produce or mystery cheese 14Mar

Palo Alto startup twoXAR partners with Santen Pharmaceutical to identify new glaucoma drugs; efforts on rare skin disease, liver cancer, atherosclerosis, and diabetic nephropathy also under way 13Mar

As coal industry jobs are lost, likely not to return, some in coal country have turned to coding 15Feb

The next-generation kitchen ovens promise perfect cooking using solid-state RF transmitters and sensors 6Feb

Take a bit of Maker Faire, a dash of Burning Man, and a scoop of Chuck E. Cheese, add $15 million, and poof, a micro-amusement park 19Jan

$34 million in drone preorders wasn't enough to keep Lily open 12Jan

Originally posted here:
Doing a Startup Involving Cryptography? Get Out of the US - IEEE Spectrum

A brief history of GnuPG: Vital to online security but free and underfunded – GCN.com

A brief history of GnuPG: Vital to online security but free and underfunded

This article was first posted on The Conversation.

Most people have never heard of the software that makes up the machinery of the internet. Outside developer circles, its authors receive little reward for their efforts, in terms of either money or public recognition.

One example is the encryption software GNU Privacy Guard (also known as GnuPG and GPG), and its authors are regularly forcedto fundraiseto continue the project.

GnuPG is part of the GNU collection offree and open source software, but its story is an interesting one, and it begins with software engineer Phil Zimmermann.

We do not know exactly what Zimmermann felt onJanuary 11, 1996, but relief is probably a good guess. The United States government had just endedits investigationinto him and his encryption software, PGP or Pretty Good Privacy.

In the 1990s, the U.S. restricted the exportof strong cryptography, viewing it as sensitive technology that had once been the exclusive purview of the intelligence and military establishment. Zimmermann had been facing serious punishment for posting PGP on the internet in 1991, which could have been seen as a violation of theArms Export Control Act.

To circumvent U.S. export regulations and ship the software legally to other countries, hackers even printed the source codeas a book, which would allow anyone to scan it at its destination and rebuild the software from scratch.

Zimmermann later worked with the PGP Corporation, which helped define PGP as an open internet standard,OpenPGP. A number of software packages implement this standard, of which GnuPG is perhaps the best known.

What is PGP?

PGP implements a form of cryptography that is known as asymmetric cryptography or public-key cryptography.

The story of its discovery is itself worth telling. It was invented in the 1970s byresearchersat the British intelligence service GCHQ and then again byStanford University academicsin the U.S., although GCHQs results were only declassified in 1997.

Asymmetric cryptography gives users two keys. The so-called public key is meant to be distributed to everyone and is used to encrypt messages or verify a signature. The private or secret key must be known only to the user. It helps decrypt messages or sign them -- the digital equivalent of a seal to prove origin and authenticity.

Zimmermann published PGP becausehe believedthat everybody has a right to private communication. PGP was meant to be used for email, but could be used for any kind of electronic communication.

The challenge facing security software

Despite Zimmermanns work, the dream of free encryption for everyone never quite came to full bloom.

Neither Zimmermanns original PGP nor the later GnuPG managed to become entirely user friendly. Both use highly technical language, and the latter is still known for being accessible only by typing out commands -- an anachronism even in the late 1990s, when most operating systems already used the mouse.

Many users did not understand why they should encrypt their email at all, and attempts to integrate the tools with email clients were not particularly intuitive.

Big corporations such as Microsoft, Google and Apple shunned it -- to this day, they do not ship PGP with their products, although some are now implementing forms of end-to-end encryption.

Finally, there was the issue of distributing public keys -- they had to be made available to other people to be useful. Private initiatives never gathered much attention. In fact,a number ofacademic studiesin the early and late 2000s showed that these attempts never managed to attract widespread public usage.

The releaseof the Edward Snowden documents in 2013 spurred renewed interest in PGP. Crypto parties became a global phenomenon when people met in person to exchange their public keys, but this was ultimately short-lived.

PGP today

When I met Zimmermann in Silicon Valley in 2015, he admitted that he did not currently use PGP. In a more recent email, he said this is because it does not run on current versions of macOS or iOS. I may soon run GnuPG, he wrote.

By todays standards, GnuPG -- like all implementations of OpenPGP -- lacks additional security features that are provided by chat apps such as WhatsApp or Signal. Both are spiritual descendants of PGP and unthinkable without Zimmermanns invention, but they go beyond what OpenPGP can do by protecting messages even in the case of a private key being lost.

Read more:
A brief history of GnuPG: Vital to online security but free and underfunded - GCN.com

As Cryptocurrency Prices Recover, Bitcoin War May Be Averted – Futurism

In Brief After a rough weekend, Bitcoin investors, miners, and developers are cautiously optimistic: after hitting historic lows, the cryptocoin's price went back up on Monday.

After a rough weekend of historic lows, Bitcoin prices began to recoveron Monday, reachingover $2,300, signaling a crisis averted for now.Its also an optimistic sign that the potential network hard fork may be avoided, with more bitcoin shareholders, miners and developers,warming up to a proposed solution.

Bitcoin prices dropped dramatically beginning Friday and continuing well into the weekend. Economic forecasts had suggested that the most turbulent period in the cryptocoins history wasimminent. It didnt come as a complete surprise, as many were expecting the so-called Bitcoin Civil Warto ensue between miners and developers, after a deadlock in deciding what direction the cryptocurrency should take amidst increased blockchain traffic.

Miners wanted to increase Bitcoins block-size limit, while developers have proposed moving data off the main blockchain network, which would diminish the influence miners wield. The scaling solution in question is the Bitcoin Improvement Protocol (BIP) 91, which makes theSegWit2x update and the BIP 148compatible. Essentially, it would make it easier for the SegWit2x update to be adopted, while at the same time avoiding the split that BIP 148 might cause.

To lock in by July 31, BIP 91 only needs 80 percent miner support unlike BIP 148, which would require 95 percent. With increased support for BIP 91, the expected July 31 to August 2 bitcoin splitcould still be averted.

Disclosure: Several members of the Futurism team, including the editors of this piece, are personal investors in a number of cryptocurrency markets. Their personal investment perspectives have no impact on editorial content.

Continue reading here:
As Cryptocurrency Prices Recover, Bitcoin War May Be Averted - Futurism

Hackers Just Stole $7 Million in a Brazen Ethereum Cryptocurrency Heist – Fortune

Hackers hijacked cryptocurrency trading platform CoinDash on Monday just as it was in the middle of its initial coin offering, or ICO. It's the first known breach of an ICO, this season's hottest fundraising method.

CoinDash, an Israeli startup, planned to raise capital by selling its own digital tokens in exchange for the cryptocurrency Ethereum , which is similar to Bitcoin . But just 13 minutes into the token sale, which began at 9 a.m. ET Monday, an "unknown perpetrator" hacked CoinDash's website and changed the address for sending investments to a fake one, the company later announced on its website . That diverted millions of dollars in contributions to the attacker.

While the CoinDash ICO still managed to raise $6.4 million from early investors, the hacker stole $7 million worth of Ethereum before the company was forced to pull the plug on the token sale. Despite the losses, CoinDash promised to dole out its tokens accordingly to everyone who participated in the ICO before it was shut down, whether or not they sent funds to the correct address.

"Reminder: We are still under attack. Please do not send any [Ethereum] to any address, as the Token Sale has been terminated," CoinDash said in the statement.

The incident is likely to put a damper on the enthusiasm surrounding ICOs. The offerings are similar to stock market initial public offerings, or IPOs. But there are two key differences: ICO investors receive cryptocurrency instead of equity, and the offerings face far less regulation.

ICOs have had a banner year. In 2017 alone, such token sales have raised at least $540 million, my colleague Jeff John Roberts reported in a recent Fortune Magazine story, "Why Tech Investors Love ICOsand Lawyers Dont." A month ago, a single ICO raised as much as $147 million; another raised $35 million in just 30 seconds .

The CoinDash hack is reminiscent of another large-scale Ethereum heist last year, when attackers breached a blockchain organization called the DAO and stole more than $50 million that had been raised in an ICO a month earlier. But the DAO hack occurred after the token sale had already ended.

To CoinDash, which hyped its ICO with modified promotional imagery for HBO's Game of Thrones , the breach is a blow both financially and in terms of its relationship with customers, some of whom suggested on social media that the attack could have been an inside job.

For its part, CoinDash pledged to investigate the breach and move on. "This was a damaging event to both our contributors and our company but it is surely not the end of our project," the company said in its statement.

More:
Hackers Just Stole $7 Million in a Brazen Ethereum Cryptocurrency Heist - Fortune

Now could be a good time to pick up a secondhand graphics card as … – TechRadar

Cryptocurrency mining is the process of using GPUs, or graphics cards, to invest in, and profit from, the value of digital encrypted currencies. In recent times there has been something of a boom in the value of cryptocurrencies, meaning that miners have been snapping up GPUs.

However, in the last few days there has been a swift decline in the value of both Bitcoin and Etherium, leading to many miners selling their GPUs. According to CoinDesk, there have been 260 entries on Ebay for 'Etherium mining rig', all bar three of which appeared online after July 11.

That date is significant because thats the day after Etherium hit its peak of $400 to put that in context it was only worth $10 a unit on January 1. The value of cryptocurrencies plummeted after that, with the market losing $10 billion over the weekend and Etherium hitting a low of $133, although it's since recovered to around $200.

If you want to take advantage of the sudden glut of GPUs on Ebay, youre going to have to know what youre looking at, as they are definitely packaged for the purpose of mining, even though they're essentially just powerful gaming GPUs.

It's worth bearing in mind that months (or years) of mining could shorten the life expectancy of graphics cards if they've been used a lot, but the savings you get may be worth the risk. As the rigs usually contain a number of GPUs specifically calibrated for mining, it will require a few friends and a little expertize to get your cheap GPU.

If plowing through mining rigs sounds like a lot of work, you may still see a discount in the price of GPUs in the coming months as the diminishing demand may well have a knock-on effect on GPU cost.

If we see any change in GPU prices, we'll let you know.

From CoinDesk

Via PC Gamer

More here:
Now could be a good time to pick up a secondhand graphics card as ... - TechRadar

Solving the Email Spam Problem with Cryptocurrency – Finance Magnates

Billionaire venture capitalist Tim Draper announced on Monday that he has bought 10% of all tokens in the initial coin offering (ICO) of Credo, a new cryptocurrency meant to solve the problem of email spam. The CEO of BitBounce, Stewart Dennis, who is heading the project, sat down to talk with Finance Magnates about his solution and the ICO process.

Learn how to buy Bitcoin and Ethereum safely with our simple guide!

The interview was broadcast live and a video recording is available here:

Draper made tidal waves in the investor community last month by investing in the companies that created Tezos and Bancor. He was also the winner of the US Marshals Bitcoin auction, making him one of the leading owners of Bitcoin.

Token offerings allow entrepreneurs a new way to transform society. They are doing everything from banking the unbanked to streamlining how people transact business to helping secure peoples identities. Credos solve the SPAM problem, allowing legitimate advertisers to pay to connect, while allowing people to put value on their time and attention, said Draper.

Draper previously made multiple investments in Credos parent company BitBounce.

Credo and BitBounce were developed by husband-and-wife team Stewart Dennis and Alexis Roizen-Dennis. Stewart is a Stanford Computer Science graduate and leads engineering for the company. Alexis studied art at the Academy of Art University in San Francisco and leads design for the company. The team also created the SaaS product suite called Turing Cloud, which gave them their experience in developing email software.

Credos official ICO for the public is taking place on July 26th.

More here:
Solving the Email Spam Problem with Cryptocurrency - Finance Magnates

Refugees who helped Edward Snowden now look to Canada as their only hope – The Guardian

The refugee families in Hong Kong, China on Monday. Photograph: ZUMA Wire/REX/Shutterstock

For two weeks they sheltered the worlds most wanted man, ferrying Edward Snowden between tiny apartments in Hong Kongs poorest neighborhood.

Now the four refugees are at the centre of a court battle in Canada, as lawyers frantically work to bring them and their children to the country amid concerns that they face grave reprisals over their actions.

It seems like the families connection to Snowden has made them radioactive and put them in a uniquely vulnerable situation, said Michael Simkin, one of the lawyers behind a motion filed this week in federal court and aimed at expediting asylum claims for the group in Canada.

The families lived in obscurity until last year, when Oliver Stones film on the whistleblower revealed that Snowden had been protected by asylum seekers in Hong Kong.

After journalists tracked them down, the refugees three from Sri Lanka and one from the Philippines came forward, explaining that they had been introduced by their mutual lawyer and that their actions had come before the US demand for Snowdens arrest was recognised in Hong Kong.

Since then, the asylum seekers claim theyve been routinely questioned by authorities to find out what they know about Snowden. Their lawyers have spoken out about relocating their clients several times over suspicions that members of Sri Lankan security forces are attempting to find them.

In May, Hong Kong rejected their asylum claims, paving the way for deportation to their home countries, where the claimants say they could face imprisonment, torture and even death. Lawyers are now appealing the decisions; though they believe they have little hope of success.

Two weeks ago, the asylum claimants who include a former Sri Lankan soldier who alleges he was tortured by the army and a single mother from the Philippines who said she fled the country after being kidnapped and sexually assaulted were ordered to report to a detention centre in Hong Kong in early August. Their lawyers fear their children will end up in foster care as the parents await deportation.

Every development in their cases is being carefully tracked in Montreal, where a team of lawyers have launched For the Refugees, a non-profit organisation dedicated to bringing the families to Canada as privately sponsored refugees.

Using funds collected from donors to cover the expenses of settling the families, the paperwork to bring the four adults and their three children to Canada was filed in January. We are encouraged by prime minister Trudeaus commitment in taking a clear lead internationally in welcoming refugees, lawyer Marc-Andr Sguin said in April.

But months later, it appears that little progress has been made in processing the Canadian claims, said Simkin. Canada today is truly their last and only hope, added the lawyer. Once the families are arrested, it will severely compromise our ability to ever relocate them to Canada. Our clients lives are at stake, and this may be their last chance to escape a horrific fate.

In recognition of the urgency facing their cases, Simkin said that Canadas minister of immigration, Ahmed Hussen who came to Canada as a teenaged refugee from Somalia had committed in May to expedite the asylum claims. Two months later, consular officials said the files had not been fast-tracked, leaving the families at the whim of a process that could take years.

Simkin questioned why the Canadian government had seemingly changed its mind. We dont know if the US has put any kind of pressure on Canada, we dont know why Minister Hussen has reversed his decision What we do know is that the families and their three, stateless children who are under six years old are being punished, and thats just not right, he said. We cannot use these families as a proxy for punishing Edward Snowden.

After attempts to seek answers from the ministry proved fruitless, the lawyers said they were left with no other option but to file a legal challenge and hope that a federal court judge will force the Canadian government to fast-track the claims.

On Tuesday, the office of the minister of immigration said that the government is committed to ensuring every case is evaluated in a fair manner. The Minister has not made any commitment to expedite this application, said a spokesperson for the minister, declining to comment further due to privacy reasons.

The legal saga that has entangled the refugees has also attracted attention from Human Rights Watch, who noting that Hong Kong has accepted fewer than one percent of refugee claims in recent years urged Canada to open its doors to the families.

The compassionate act of letting Edward Snowden into their homes should never have landed these families in peril, the organisations Dinah PoKempner said in a statement. No one should have to risk a return to torture or persecution because they opened their door to another who feared the same.

Continue reading here:
Refugees who helped Edward Snowden now look to Canada as their only hope - The Guardian

House Democrats Are Using End-To-End Encryption To Avoid Future Hacks – ABC2 News

After being hit with a cyberattack in 2016, the Democratic Congressional Campaign Committee wants to be hack-proof. To do that, it's turning to a new messenger with end-to-end encryption.

Back in June, theDCCC migrated toencrypted messaging service Wickr, which is now the primary method of communication in the office. It's the first political committee to make the shift to end-to-end encryption.

Outside of the office, Wickr does not replace email.

End-to-end encryption services work by usingcryptographic keysthat can only be decoded and deciphered by message recipients.Wickr works byencrypting not just the messages, but also the keys themselves. Thisadded layer of encryptionkeeps communication as secure as possible.

SEE MORE: Obama Tells SXSW: Don't Be 'Absolutist' On Encryption

Some sayend-to-end encryption could help secure future political campaigns, but other offices and political figures aren't taking so kindly to the idea.

Back in July, theDCCC sent a letterto the National Republican Congressional Committee about cybersecurity. The letter called for combined non-partisan efforts to protect against future attacks. But Steve Stivers, chair of the NRCC, dismissed it as a"political stunt."

Attacking encryption has become a bipartisan effort. Last spring, Republican Sen. Richard Burr and Democratic Sen. DianneFeinstein introducedlegislation thatorders tech companiesto decrypt messages sent by terrorist groups and criminals.

The legislation was written in response toApple's refusalto help the FBI hack the iPhone of one of the San Bernardino shooters. But months later,Reuters reportedFeinstein and Burr's bill to be dead.

Governments outside of the U.S., however, have called for similar anti-encryption efforts. In response to the attacks on London Bridge, the U.K. parliament passed the "Snooper's Bill," which gives law enforcement authorities unprecedented access to web-browsing histories and data.

Earlier in July, Australian Prime Minister Malcolm Turnbull alsosupported legislationthat would obligate internet companies like Facebook to comply with law enforcement.

In regards to fears that the policy wouldn't be technically feasible, Turnbull said: "The laws of mathematics are very commendable, but the only laws that apply in Australia is the law of Australia."

One of the mainissues regarding decryption or creating a "back door" for government and law enforcement officials is that it opens the door for any hacker to intercept communications.

In other words, it would make end-to-end encryption functionally useless.

Read more:
House Democrats Are Using End-To-End Encryption To Avoid Future Hacks - ABC2 News

Overnight Cybersecurity: Dem campaign arm embraces encryption … – The Hill

Welcome to OVERNIGHT CYBERSECURITY, your daily rundown of the biggest news in the world of hacking and data privacy. We're here to connect the dots as leaders in government, policy and industry try to counter the rise in cyber threats. What lies ahead for Congress, the administration and the latest company under siege? Whether you're a consumer, a techie or a D.C. lifer, we're here to give you ...

THE BIG STORIES:

--DEMS DOCRYPTOGRAPHICCYBERCOMMUNICATIONS: The Democratic Congressional Campaign Committee (DCCC) has taken to using an encrypted messaging app called Wickr for internal communications and correspondence with the campaigns of the most vulnerable House Democrats, BuzzFeed News reported Tuesday. The DCCC was among the organizations targeted by a Russian hacking campaign during the 2016 elections -- an attack that exposed the internal documents of a handful of Democratic House campaigns. Wickr, an end-to-end encrypted messaging software, was installed at the DCCC in June, according to BuzzFeed, and is a first for political party committees on both sides of the aisle. Encrypted messaging systems prevent third parties from deciphering communications and data sent using that software, meaning that only the sender and the intended recipient can view the information. Wickr is not intended to replace email and is used to send ephemeral messages and share files.

To read the rest of our piece,click here.

--DEMS ANXIOUS ABOUT PULLING RUSSIAN SANCTIONS BILL OVER FINISH LINE: The top Democrat on the House Foreign Affairs Committee expressed pessimism on Tuesday that long-stalled Russia sanctions legislation could get done before lawmakers leave Washington for August. The bipartisan bill passed in the Senate last month by a 98-2 vote, but it has since been stuck in the House due to multiple procedural problems. The Senate subsequently approved technical changes by unanimous consent three weeks ago. But House Democrats then objected to a provision that prevents them from forcing a floor vote to block the Trump administration if it tries to lift sanctions. And on Friday, House Majority Leader Kevin McCarthy (R-Calif.) suggested that the package, which also slaps sanctions on Iran, include a bill passed by the House earlier this year to sanction North Korea. Rep. Eliot Engel (D-N.Y.), the ranking Democrat on the House Foreign Affairs panel, appeared skeptical that the sanctions package could be sent to President Trump's desk before the House is scheduled to leave for the month long August recess at the end of next week. "I would hope. But every day passes and nothing is getting done, it makes it less and less likely. But that's not our fault. That's the Republicans' fault," Engel told The Hill. Engel added that he thinks adding North Korea sanctions will make it harder to resolve the already-complicated talks to move the package. "It makes no sense to me to have a North Korea sanctions bill thrown into the mix when we apparently can't even agree on a Russia-Iran sanctions bill," Engel said.

To read the rest of our piece,click here.

A POLICY UPDATE:

HOUSE VOTES TO FUND DHS CYBER OFFICE; SLASHES FUNDING FOR RESEARCH:

House lawmakers on Tuesday advanced a spending measure that would provide roughly $1.8 billion in funding for a Department of Homeland Security (DHS) cyber unit.

The bill would allocate the money for the National Protection and Programs Directorate (NPPD), the DHS office tasked with securing critical infrastructure from cyber threats.

The House Appropriations Committee approved the fiscal 2018 funding measure for the DHS by a vote of 30-22 during a markup on Tuesday.

The allocation for NPPD is similar to fiscal 2017 spending levels and on par with the Trump administration's request for $1.8 billion in discretionary funding for the office.

NPPD, which is charged with protecting U.S. cyber and physical infrastructure, would receive nearly $1.4 billion to help secure civilian networks, prevent cyberattacks and espionage, and help modernize emergency communications infrastructure.

However, the bill would cut funds to the DHS's Science and Technology Directorate by more than $100 million, reducing its budget to $638 million and putting it in line with President Trump's budget request. Rep. Dutch Ruppersberger (D-Md.) took issue with that cut on Tuesday.

"We are drastically cutting the important cybersecurity and research and development work that happens at the Science and Technology Directorate and shifting that money to fund a border wall," said Ruppersberger.

"The president may have promised a border wall, but I explicitly remember him saying Mexico would pay for it, not saying he would gut the important research and development work at the Department of Homeland Security to fund it," he continued.

To read the rest of our piece,click here.

A LIGHTER CLICK:

EARLY FAKE NEWS."Goodnight Moon"is not scientifically accurate.

WHAT'S IN THE SPOTLIGHT:

MORE LIKE WHATSOUT:

WhatsApp users in China are reporting that the app isn't properly working across the country, sparking concerns that the Chinese government is censoring the encrypted messaging app.

Many users on the app in China have not been able to send videos, pictures and, in some cases, even texts, reports The New York Times. One Beijing-based reporter tweeted that the app had not been working since Sunday and could only be used with the help of a VPN.

Security groups reportedly confirmed that WhatsApp was being disrupted by government internet filters.

"According to the analysis that we ran today on WhatsApp's infrastructure, it seems that the Great Firewall is imposing censorship that selectively targets WhatsApp functionalities," Nadim Kobeissi, an applied cryptographer at Symbolic Software, a cryptography research startup, said to the Times.

Instagram and its parent company, Facebook, which also owns WhatsApp, are both already blocked by Chinese government censors.

To read the rest of our piece,click here.

LETTERS APLENTY:

DEMS PUSH TO UPDATE PIPELINE CYBERSECURITY:

Sen. Maria CantwellMaria CantwellOvernight Cybersecurity: Dem campaign arm embraces encryption | Panel signs off on .8B for DHS cyber office | Dems want review of pipeline security Dems call for review of pipeline cybersecurity rules 2 national monuments safe from Trump administrations review MORE (D-Wash.) and Rep. Frank Pallone Jr. (D-N.J.) asked the Government Accountability Office and Transportation Security Administration on Tuesday whether voluntary guidelines for cybersecurity defenses for fuel pipelines need to be updated or codified.

"An assessment of these guidelines and their effectiveness is needed as a number of major trends have emerged, with potentially significant implications for our energy, national and economic security," the lawmakers wrote in a letter.

Cantwell and Pallone are the ranking members of the Senate Energy and Natural Resources Committee and House Energy and Commerce Committee, respectively.

In the letter, they note that the same type of cybersecurity standards legislation protecting the energy grid is not in place for pipelines delivering natural gas and oil despite pipelines' dependence on the same types of internet-connected systems.

To read the rest of our piece,click here.

WYDEN ASKS DHS TO HELP STOP FAKE GOVERNMENT EMAILS:

A Democratic senator is pressing the Department of Homeland Security (DHS) to mandate the government-wide use of an email authentication tool "to ensure that hackers cannot send emails that impersonate federal agencies."

"I write to ask you to take immediate steps to ensure that hackers cannot send emails that impersonate federal agencies," Wyden wrote on Tuesday to Jeannette Manfra, the DHS official. "The threat posed by criminals and foreign governments impersonating U.S. government agencies is real."

Wyden asked DHS to require agencies to use a tool called the Domain-based Message Authentication, Reporting and Conformance, or DMARC, a standard developed by industry that can reroute emails that fake the sender's address to the spam folder or have them outright rejected.

Without DMARC or another authentication method, there is nothing that prevents a sender from putting whatever email address they would like in the "from" field.

To read the rest of our piece,click here.

IN CASE YOU MISSED IT:

Links from our blog, The Hill, and around the Web.

Muellergave his blessingsfor the Senate Judiciary to interview Donald TrumpDonald TrumpHouse Dems question Ivanka Trumps security clearance Dem lawmaker wears Trump, Putin 2016 hat for Made in America week Christie: Trump should 'move on' from healthcare MORE Jr. (The Hill)

The White House makes its case fordismantling net neutrality.(The Hill)

The FBI warnssmart toysmight be dumb. (The Hill)

"Far from expanding its system of biometric border screening,DHS should end it." (The Hill)

Headline of the day "Myspace fixes account security hole -but delete your account anyway." (Graham Cluley)

Lots ofsecurity camerasshare the same security flaw, inherited from a shared code library. (Motherboard)

If you'd like to receive our newsletter in your inbox,please sign up here.

View original post here:
Overnight Cybersecurity: Dem campaign arm embraces encryption ... - The Hill

Apple flies in top executives to lobby Turnbull government on encryption laws – The Sydney Morning Herald

Apple's top privacy executives have flown out to Australia twice in the past month to lobby the Turnbull government over looming changes to laws that govern access to encrypted messages.

Play Video Don't Play

Play Video Don't Play

Previous slide Next slide

The government wants to work with tech companies to ensure police and security officials can access the encrypted messages of criminals and terrorists.

Play Video Don't Play

Mario and friends join Ubisoft's Rabbids for a feel-good and modern combat adventure, coming to Nintendo Switch in August.

Play Video Don't Play

The company's project is designed to provide a rich interactive experience of the national park that can be enjoyed from anywhere around the world.

Play Video Don't Play

Disney-Pixar and Sphero have announced a robotic version of the iconic film character that talks, moves and drives just like the animated version.

Play Video Don't Play

Uber suspends its pilot program for driverless cars after a vehicle equipped with the technology crashed in Arizona.

Play Video Don't Play

Beyond Media's Shashi Fernando explains how Lenovo's Entertainment Hub can 'upscale' regular 2D movies and games into VR experiences.

Play Video Don't Play

Tech editor Tim Biggs takes a look at the three modes that make up the very first Super Mario game for smartphones.

The government wants to work with tech companies to ensure police and security officials can access the encrypted messages of criminals and terrorists.

The global technologygiant, which is on track to become the world's first trillion-dollar company, met with Attorney-General George Brandis and senior staffin Prime Minister Malcolm Turnbull's office on Tuesdayto discuss the company's concerns about the legal changes, which could see tech companies compelled to provide access to locked phones and third party messaging applications.

Apple has arguedin the meetingsthat as a starting point it does not wantthe updated laws to block tech companies fromusingencryption on their devices, nor for companies to have to provide decryption keys to allow access to secure communications.

The company has argued that if it is compelled to provide a software "back door" into its phonesto help law enforcement agencies catch criminals and terrorists, this would reduce the security for all users. It also says it has provided significant assistance to police agencies engaged in investigations, when asked.

Apple famously refused to comply with a request by the FBI to unlock the phone of one of the shooters in the San Bernardinoterrorist attack in 2016, drawing criticism from law enforcement agencies and praise from privacy advocates.

While the Turnbull government is preparing new legislation to introduce by the end of the year, it is not yet clear howit wants tech companies to facilitate access to secure devices such as phones.

Get the latest news and updates emailed straight to your inbox.

The laws will be modelled on those introduced in Britain about a year ago and the government saysit will update and enhance the obligations on tech companies that make phones and secure messaging applications such as WhatsApp to provide assistance to police and spyagencies when requested, subject to a warrant.

Just how this greater access to, for example, locked devices and encrypted messages can technically be achieved is not clear and this, in part, was the purpose of the government-Apple meeting.

A source familiar with the discussions between Turnbull government representatives and Apple saidthe company was effectivelytrying tominimise the amount ofadditional regulation and legal obligation that would be placed on it and other tech companies to hand over or facilitate access to secure information.

Another source familiar with the discussions said both sides were taking a collaborative approach, and that the Turnbull government had explicitly said it did not want agovernmentback door into people's phones, or to weaken encryption.

Last week, Senator Brandis said the government wouldwork with companies such as Apple to faciliate greater access to secure communications but warned that"we'll also ensure that the appropriate legal powers, if need be, as a last resort, coercive powers of the kind that recently were introduced into the United Kingdom under the Investigatory Powers Act...are available to Australian intelligence and law enforcement authorities as well".

The Prime Minister has been pushing for tech companies to work more closely with government and not allow "ungoverned spaces" to flourish online, and to allow easier access to encrypted information on phones and in the cloud, subject to a warrant.

Mr Turnbull has saidtech companies such as Apple and Facebook "have to face up to their responsibility. They can't just wash their hands of it and say: 'It's got nothing to do with us'."

At the G20he played a key role in drafting a section of the leaders' final statementon encryption that emphasised the law had to apply online, just as it did elsewhere.

The paragraph promised, in part, that "in line with the expectations of our peoples, we also encourage collaboration with industry to provide lawful and non-arbitrary access to available information where access is necessary for the protection of national security against terrorist threats".

Follow us on Facebook

Read the original:
Apple flies in top executives to lobby Turnbull government on encryption laws - The Sydney Morning Herald