NTT Research to Expand its Silicon Valley Footprint in 2020 – Yahoo Finance

Move to larger office and MEI Lab hires are high on agenda, after strong 2019 launch

NTT Research, Inc., a division of NTT (TYO:9432), today announced its plan to move to a facility in Sunnyvale in mid-2020 to better accommodate a growing number of researchers, including medical scientists it expects to hire for its Medical and Health Informatics (MEI) Lab. These priorities follow six months of progress in all three labs at NTT Research since its official launch in July 2019.

To recap, NTT Research has signed an Industrial Partnership between its Cryptography and Information Security (CIS) Lab and the Simons Institute for the Theory of Computing at UC Berkeley; set up joint research agreements between its Physics and Informatics (PHI) Lab and six universities (CalTech, Cornell, Michigan, MIT, Stanford and Swinburne), one US Federal Agency (NASAs Ames Research Center) and one private quantum computing software company (1QBit); and reached another joint research agreement between the MEI Lab and the Technical University of Munich (TUM). The need for a larger facility, in part, reflects this activity.

"We are aiming for a research-friendly space to hire more excellent scientists," said Kei Karasawa, NTT Researchs Vice President of Strategy. "We need both private offices as well as collaboration space to accelerate research with partners, whether professors, NTT colleagues or other stakeholders in our three research domains."

NTT Research has already hired more than 20 scientists, about half of whom are university professors and senior researchers. With the PHI and CIS Labs both on pace in terms of staffing, NTT Research plans to focus on talent acquisition for the MEI Lab in the new year. The ultimate target for the entire organization is about 50 scientists.

Based on the joint agreement between the MEI Lab and TUM, NTT Research will send two of its researchers to Munich in Q1 2020. The initial phase of that long-term research project involves screening and optimizing materials that can eventually be used for three-dimensionally transformable and implantable electrodes. The project leader in Germany is Dr. Bernhard Wolfrum, Professor of Neuroelectronics at TUM in the Department of Electrical and Computer Engineering and the Munich School of BioEngineering (MSB).

The MEI Lab is directed by Hitonobu Tomoike (M.D., Ph.D), former Director of the Sakakibara Heart Institute, Director Emeritus at the National Cerebral and Cardiovascular Center in Japan, and former Professor of Cardiology at Yamagata University. Dr. Tomoike is known for his work in precision medicine involving bio-sensors and analytics.

One goal of the MEI Lab is to explore the potential of "bio digital twin". Already applicable in the field of business transformation it is one of NTT Ltd.s Intelligent Business: 2020 technology trends bio digital twin in the medical domain is the idea of scanning an individual and creating a replica, which medically-guided supercomputing and artificial intelligence (AI) can then examine, diagnose and treat as a roadmap to caring for a human. "In a smart world, our digital twin will be second-nature technology," Dr. Tomoike said.

In addition to the move to Sunnyvale and the plan to hire more scientists for the MEI Lab, NTT Research expects to announce several more joint research agreements in early 2020. Throughout the year, NTT Research scientists will continue to submit papers and attend conferences in the United States and around the world.

About NTT Research

NTT Research opened its Palo Alto offices in July 2019 as a new Silicon Valley startup to conduct basic research and advance technologies that promote positive change for humankind. Currently, three labs are housed at NTT Research: the Physics and Information Science (PHI) Lab, the Cryptography and Information Security (CIS) Lab, and the Medical and Health Informatics (MEI) Lab. The organization aims to upgrade reality in three areas: 1) quantum information, neuro-science and photonics; 2) cryptographic and information security; and 3) medical and health informatics. NTT Research is part of NTT, a global technology and business solutions provider with an annual R&D budget of $3.6 billion.

NTT and the NTT logo are registered trademarks or trademarks of NIPPON TELEGRAPH AND TELEPHONE CORPORATION and/or its affiliates. All other referenced product names are trademarks of their respective owners. 2019 NIPPON TELEGRAPH AND TELEPHONE CORPORATION

View source version on businesswire.com: https://www.businesswire.com/news/home/20191220005076/en/

Contacts

NTT Communications:Chris ShawDirector of MarketingNTT Research +1-312-888-5412chris.shaw@ntt-research.com

Media:Barrett AdairWireside CommunicationsFor NTT Ltd. & NTT Research+1-804-591-0689badair@wireside.com

Link:
NTT Research to Expand its Silicon Valley Footprint in 2020 - Yahoo Finance

Edward Snowdens profits from memoir must go to US government, judge rules – The Guardian

Edward Snowden is not entitled to the profits from his memoir Permanent Record, and any money made must go to the US government, a judge has ruled.

Permanent Record, in which Snowden recounts how he came to the decision to leak the top secret documents revealing government plans for mass surveillance, was published in September. Shortly afterwards, the US government filed a civil lawsuit contending that publication was in violation of the non-disclosure agreements he signed with both the CIA and the National Security Agency (NSA), and that the release of the book without pre-publication review by the agencies was in violation of his express obligations. Snowdens lawyers had argued that if the author had believed that the government would review his book in good faith, he would have submitted it for review.

Earlier this week, district judge Liam OGrady ruled that the government is entitled to Snowdens proceeds from the book.

In response, Snowden wrote on Twitter: The government may steal a dollar, but it cannot erase the idea that earned it I wrote this book for you, and I hope the governments ruthless desperation to prevent its publication only inspires you read it and then gift it to another.

Asked by one fan if it was possible to buy the book and donate the same amount to Snowden, as an easy way to stick it to the US government, Snowden recommended that readers donate money to the families who had helped shelter him in Hong Kong after the story broke in 2013, providing a link to the charity that supports them.

Snowden said the book would continue to be sold. The courts ruling is a hack intended to circumvent first amendment limits on what the government can censor, he told his followers. They cant (yet) ban the book, so they ban profit to try and prevent such books from being written in the first place.

Snowdens lawyer, Brett Max Kaufman, told the New York Times that it was far-fetched to believe that the government would have reviewed Mr Snowdens book or anything else he submitted in good faith, and for that reason, Mr Snowden preferred to risk his future royalties than to subject his experiences to improper government censorship.

We disagree with the courts opinion and will review our options, he added.

Continued here:
Edward Snowdens profits from memoir must go to US government, judge rules - The Guardian

Federal judge rules that the US government can seize all the profits from Edward Snowden’s book – Task & Purpose

Editor's Note: This article originally appeared on Business Insider.

Edward Snowden won't see any of the proceeds from his new memoir instead, the US government is entitled to seize the profits, a federal judge ruled Tuesday.

Snowden's memoir, "Permanent Record," describes his work as a contractor for the National Security Administration and his 2013 decision to leak government secrets, including the fact that the NSA was secretly collecting citizens' phone records. Snowden has lived in Moscow since 2013, where he has been granted asylum.

The U.S. sued Snowden on the day his memoir was published in September, alleging that he violated contracts with the NSA by writing about his work there without pre-clearance.

Judge Liam O'Grady made a summary judgement in favor of the US government on Tuesday, rejecting requests from Snowden's lawyers to move the case forward into the discovery stage. O'Grady ruled that Snowden violated his contracts, both with the publication of the memoir and through other public speaking engagements in which he discussed his work for the NSA.

"Snowden admits that the speeches themselves purport to discuss intelligence-related activities," O'Grady wrote in his decision, adding that Snowden "breached the CIA and NSA Secrecy agreements."

In recent years, Snowden has maintained his criticisms of US surveillance while also turning his attention to big tech companies. In November, he decried the practice of aggregating personal data, arguing that Facebook, Google, and Amazon "are engaged in abuse."

More from Business Insider:

Excerpt from:
Federal judge rules that the US government can seize all the profits from Edward Snowden's book - Task & Purpose

Federal judge rules US government is entitled to seize proceeds from Edward Snowden’s book sales and speaking fees – World Socialist Web Site

Federal judge rules US government is entitled to seize proceeds from Edward Snowdens book sales and speaking fees By Kevin Reed 20 December 2019

A federal judge ruled on Tuesday that the US government can legally seize proceeds from whistleblower Edward Snowdens memoir Permanent Record and his paid public speeches because he is in breach of his obligations for not submitting these materials to the CIA and NSA for prepublication review.

In a 14-page decision, Judge Liam OGrady of the US Eastern District of Virginia ruled against the defendants Edward Snowden and Macmillan Publishing Group, LLC and granted the US governments motion for summary judgement. The ruling stems from a lawsuit filed by the US Justice Department against Snowden and his publisher on the same day that the former NSA contractors book was released last September.

In Permanent Record, Snowden tells the story of his life, how he became an intelligence officer and contractor and how it is that he came to realize that the CIA and NSA were engaged in a global electronic surveillance operation that was in violation of the constitutionally protected democratic rights of the public.

Snowden also explains in his book how he smuggled a massive trove of top-secret intelligence documents out of a secure facility in Hawaii and then handed them over to journalists from theGuardian in Hong Kong in May 2013. The whistleblower also recounts how he ended up gaining asylum in Moscowwhere he remains to this dayafter he was charged with violation of the Espionage Act and his passport was terminated by the US government.

The DOJ lawsuit and court ruling are predicated upon a series of six Secrecy Agreements that Edward Snowden signed between November 2005 and March 2013 while he was an employee or contractor with the CIA and NSA. According the to the ruling, these documents required Snowden to obtain prepublication review of any preparation, in any form, containing any mention of intelligence data or activities, or any other information or material which is or might be based on information that is marked classified, known to be classified, or known to be in a classification determination process.

The court ruling states, The terms of the CIA Secrecy Agreements further provide that Snowden forfeits any proceeds from disclosures that breach the Agreements. These terms continue to apply to Snowden. Although the ruling grants the government claim to Snowdens publishing earnings and speaking fees, it does not specify how or when the collection will be carried out.

As Snowden explained very clearly in Permanent Record, he acknowledges having signed the intelligence Secrecy Agreements. However, he also notes that he signed another agreement called an appointment affidavitsimilar to the Oath of Office for public officialsin which he swore to defend the Constitution of the United States against all enemies, foreign and domestic, and this oath supersedes any obligations contained in the intelligence agreements.

Along with the publication of his book, the ruling makes specific reference to several public speeches Snowden madeincluding at a Technology, Entertainment, Design (TED) conference and an Internet security trade fairwhere he displayed and discussed, among other things, at least one slide which was marked classified at the Top Secret level, and other intelligence-related activities of the CIA and NSA.

Judge OGradys decision in favor of the governments lawsuit rejected all three arguments put forward by Snowdens lawyers: (1) that the government had itself breached its own agreement by stating ahead of time that it would refuse to review the book or speeches in good faith or within a reasonable time; (2) that the DOJ lawsuit was based on animus toward Snowden and his views and that the government selectively enforced its Secrecy Agreements; and (3) there is no basis within the Secrecy Agreements for the governments claim to seize proceeds from his book and speeches.

Brett Max Kaufman, an attorney for Snowden from the ACLUs Center for Democracy, said that the legal team disagrees with the courts decision and will review our options. Kaufman also said, Its farfetched to believe that the government would have reviewed Mr. Snowdens book or anything else he submitted in good faith. For that reason, Mr. Snowden preferred to risk his future royalties than to subject his experiences to improper government censorship.

Snowdens revelations in 2013 contributed enormously to the awareness of the public both within the US and internationally that the surveillance operations of the CIA and NSAwith the cooperation of the telecommunications corporationsare collecting data on every phone call, e-mail and text message of everyone in the world. Sparking the so-called Snowden Effect, the revelations have encouraged the widespread use of end-to-end encryption that hampers or prevents government surveillance of electronic communications.

Although the US government claims to have officially ended its secret surveillance programs with the passage of the USA Freedom Act of 2015 under the Obama administration, numerous media reports, leaks and data beaches have since have revealed that similar if not the exact same programs are ongoing.

The vendetta against Snowden by the US government and its military-intelligence establishment for revealing these truths to the public will never be forgotten or forgiven. Although the state has been unableup to this pointto rendition Snowden back to the US, the recent lawsuit and federal court ruling show that every effort is being made to silence and intimidate him and set an example for anyone else who might be thinking about exposing the criminal activities of the government.

2019 has been a year of mass social upheaval. We need you to help the WSWS and ICFI make 2020 the year of international socialist revival. We must expand our work and our influence in the international working class. If you agree, donate today. Thank you.

Read the rest here:
Federal judge rules US government is entitled to seize proceeds from Edward Snowden's book sales and speaking fees - World Socialist Web Site

Snowden: A Whistle-Blower Who Lived to Tell About It – lareviewofbooks

DECEMBER 15, 2019

I GENERALLY CARE relatively little for the personal lives of people of note, but something that always nagged me just slightly about Edward Snowdens 2013 revelations that the NSA was spying on pretty much everyone was how angry was his girlfriend?

After all, we all knew Snowden had a girlfriend, since it didnt take long for the media to uncover that her name was Lindsay Mills, that (much to their infinite delight) she had photos of herself in lingerie, and that her significant other had suddenly turned up in Hong Kong halfway through a business trip and started to fill the world in on US mass surveillance without running it by her first.

It must have been quite the shock.

I therefore found it uncharacteristically satisfying that Permanent Record included a chapter composed of extracts from Lindsay Millss diary. It was genuinely interesting to get an insight into how someone might cope with this very unusual situation being thrust upon them in a more candid tone than we generally get from the guarded Snowden throughout the rest of the book. These excerpts were all the more necessary, as this really is a book about the personal no further details of public significance are released in this title, which is a work primarily of analysis and reflection.

The general schema of the book is precisely what one might expect: Snowdens childhood in North Carolina and the DC Beltway; his decision to enlist in the US Army following 9/11; his roles as a defense contractor in the United States, Switzerland, and Japan; his ultimate decision to blow the whistle on mass surveillance and subsequent temporary asylum in Russia. Prior reviews have been accompanied by a few snarky remarks: The New Yorker, for example, claimed that Snowden saw the early internet as a techno-utopia where boys and men could roam free, although I cannot recall Snowden making such exclusionary gendered distinctions. Presumably it complements Malcolm Gladwells earlier piece on why Snowden is not comparable to Pentagon Papers leaker Daniel Ellsberg (since he is a hacker not a leaker) in flat contradiction to Ellsbergs own defense of Snowden published in the Washington Post:

Many people compare Edward Snowden to me unfavorably for leaving the country and seeking asylum, rather than facing trial as I did. I dont agree. The country I stayed in was a different America, a long time ago. [] Snowden believes that he has done nothing wrong. I agree wholeheartedly.

So eager has everyone been to snipe and show their moral fiber as good little citizens, that they have rarely found the time to dig into Permanent Records main themes. Rather than spilling more facts, Snowdens aim seems to have been to contextualize his previous disclosures and explain their significance. Thus, while many parts of the book are truly gripping a goodly portion of it details how Snowden removed information detailing surveillance from his workplace under a pineapple field in Hawaii and arranged to share it with documentary filmmaker Laura Poitras and journalist Glenn Greenwald in Hong Kong it is the authors underlying themes and motivations that truly deserve our attention.

It is apparent early on that Snowden pursued two main purposes in releasing Permanent Record: 1) to convince skeptics that he acted for the good of the country and to defend the US Constitution (indeed the books release was timed to coincide with Constitution Day on September 17), and 2) to educate readers about technology, or at least that part of it related to mass surveillance.

Early on, while still describing his 80s childhood and initial fascination with what he then termed Big Masheens, Snowden recalls imbibing lessons from his Coast Guard father Lonnie about the potential for technology to bring its own form of tyranny with it. According to Snowden:

To refuse to inform yourself about the basic operation and maintenance of the equipment you depended on was to passively accept that tyranny and agree to its terms: when your equipment works, youll work, but when your equipment breaks down youll break down, too. Your possessions would possess you.

Technological tyranny is a theme Snowden comes back to later in the book, reflecting on Mary Shelleys Frankenstein he was after all posted to Geneva, where part of the novels action is set.

That may sound a bit clich, until you learn that Snowdens sales partner during his time at Dell literally nicknamed the cloud system they developed for the CIA Frankie because its a real monster. That wasnt just a private office joke, but how he tried to convince the agency to greenlight the project during a sales pitch. Its these little pieces of not-exactly-earth-shattering, but still pleasantly informative detail that help the book keep ticking over and compensate for the often distant tone of its author. Snowden frequently describes his feelings, but rarely does he make the reader feel them.

Snowden also lavishes attention on explaining how he interacted with the internet as a child and teen. While many have interpreted these lengthy passages as either nave utopianism or pathetic addiction, his point is much more important than that. Im much of an age with Snowden and therefore remember many of the things he recalls: phreaking, personal homepages, chat rooms, and the days when you could just ask perfect strangers for advice and theyd give it to you. What I think I hadnt fully considered before reading this book is that at least some people in this rather narrow cohort absorbed some knowledge of modern technology. Despite being nowhere near as interested in computers as Snowden (and having a positive antipathy to Big Masheens), I learned how to build circuits and program from Basic to Java as part of my general education. That gave me the ability to learn more later in life and to form a better (if still far from expert) understanding of the nuts and bolts of computing infrastructure.

By contrast, many people today know how to use tech, but they dont understand it. Just like few people who use money understand economics. And just like an ability to grasp finance creates an enormous power differential, so does the ability to understand tech.

Snowden is at pains to redress this balance, methodically explaining everything from SD cards, to TOR, to smart appliances, to the difference between http and https, to the fact that when you delete a file from your computer, it doesnt actually get deleted. He bestows the same attention to detail on these subjects as he does describing the labyrinthine relationships of his various employers and the intelligence agencies, and this clarity helps turn the book into a relatable story about issues rather than a jargon-stuffed, acronym-filled nightmare.

Only by understanding how technology works on a basic level, so argues Snowden, can journalists ask the right questions of power and regulators regulate effectively. He strengthens this case by noting examples of times when major announcements (construction of enormous data storage facilities; a CIA presentation in which the speaker literally admonished the journalists present to think about their rights) were simply ignored.

They did not make waves, Snowden thinks, because journalists and regulators simply didnt realize their significance. There is, as he says repeatedly in the book, a lag between technology and regulation.

It is an issue that others in a position to know, like Elon Musk and Stephen Hawking, have pointed out. Everything from advances in robotic warfare to artificial intelligence to total surveillance aided by facial recognition is dismissed as alarmist until well after it is happening, when its then dismissed in true Nineteen Eighty-Four style with a shoulder shrug as inevitable.

And when that doesnt happen, tech tends to be treated as an entirely new phenomenon requiring heavy-handed, and often counterproductive, regulation.

While it is entirely true that people are bullied on social media, for example, we shouldnt forget that people were bullied in real life in the past, too. And threatened. And the victims of fraud. And defamation. And child abuse. As a result, we shouldnt lose sight of the fact that we often do already have a well-developed arsenal of remedies that can be adjusted for the internet era without the need to jettison constitutional values in the name of protection and safety.

There are ways to apprehend criminals effectively without the total take of information that intelligence agencies so lazily demand. Vigilante pedophile-hunting groups have been quite successful in luring would-be predators to justice by posing as minors on social media sites. While it is beyond question that such activities should be left to properly trained and authorized police forces not righteous citizens who can do as much harm as good it does show that the individualized pursuit of crime can still be very effective in the social media age. Indeed, in regards to some crimes, like forms of child abuse, detection may well be easier than in earlier times with many culprits unable to resist the temptation to groom potential victims online.

Rather than veering between complacency and panic, we should be thinking about the various ways in which to update our legal framework for the modern digital age something Snowdens revelations about the warrantless mass surveillance programs he uncovered have given us a particular urgency to do.

The part of the law most significant to Snowden, and which he quotes in the book, is the US Constitutions Fourth Amendment, which reads:

The right of the people to be secure in their persons, houses, papers, and effects,against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

According to Snowden, the NSA sought to circumvent the Fourth Amendment by creating a huge database of all online activity the permanent record of the books title ideally stored in perpetuity and which they would only search when [the organizations] analysts, not its algorithms, actively queried what had already been automatically collected. Intelligence agencies also argued that because individuals have already given permission to third parties, particularly telecommunications companies, to host their data, that data no longer resided in the private sphere and thus constitutional privacy had been forfeited.

After all, the magic of what feels private sitting in front of your computer or scrolling through your phone at home can only happen by connecting to distant servers.

Those who support a living document interpretation of the Constitution may see this as an eventual opportunity to expand the scope of the terms papers, and effects for the modern era, something Snowden himself suggests; originalists might argue that only a constitutional change itself can suffice to fully address privacy rights in a digital age.

Some of the actions that Snowden describes monitoring people through their webcams in their homes via XKEYSCORE would certainly seem like unproblematic violations if committed against US citizens or persons on US soil under present wording and interpretations. Others like hunting through the vast reams of information we sign over to private companies may prove more difficult. Justice Scalia, the nations most well-known originalist prior to his death in 2016, is alleged to have refused to be drawn on whether or not computer data was an effect in the sense of the Fourth Amendment at a public lecture in 2014.

In more practical terms, the Court of Appeals for the Second Circuit decided in 2015 (ACLU v. Clapper) that bulk collection was not covered by Section 215 of the Patriot Act, stating in part, Congress cannot reasonably be said to have ratified a program of which many members of Congress and all members of the public were not aware, a decision followed shortly by the passing of the USA Freedom Act, under which telecoms companies keep records that law enforcement may then request.

However, it is somewhat doubtful whether legal remedies alone will effectively stop the political-intelligence agency complex that Snowden describes so adroitly in his book. He recalls the panic he witnessed at Fort Meade and outside the Pentagon during 9/11, and later the blame as politicians emphasized the prevention of terror attacks as the standard for measuring their own competence. Intelligence agencies felt both the horror of having to develop some way to guarantee safety and the power of being able to extort huge budgets from Congress in the interests of doing so. Once an agency has the capability to engage in mass surveillance and is under significant pressure to maintain security, its difficult to imagine it failing to indulge regardless of legalities.

Snowden mentions encryption, SecureDrop, and the European Unions General Data Protection Regulation (GDPR) as potential ways for citizens to uphold their own privacy, but Im less than convinced. Encryption is not readily available to the average person working on an average budget; few people will ever have any reason to use SecureDrop, and I doubt many of the alleged positive effects of the GDPR, which has mainly led to Europeans agreeing to any and every pop-up in order to get to their content ASAP while introducing barriers to sharing and advertisement for small businesses (precisely not the threat).

In this context, perhaps the right to be forgotten (in fairness, now enshrined in Article 17 of the GDPR, although the principle derives from an earlier 2014 court case) is more relevant. After all, Snowdens main fear is the creation of the unforgiving permanent record, where every mistake, minor trespass, and ill-considered comment remains preserved for all time and just waiting to be used against one. Indeed, he contrasts this with the early days of the web, where one could develop opinions freely and cast aside identities that one had outgrown. Snowden regards this freedom as pivotal to development and maturation, as we all tend to curate our lives over the years, forming the identity we want to have at the expense of conflicting past actions.

Despite the fact that he never made it to his intended destination Ecuador Snowden remains, much like Ellsberg, a powerful example of a person who blew the whistle on state abuses and not only lived to tell about it, but is living an apparently well-adjusted life. As he lets us know at the end of the book, Lindsay eventually joined him in Moscow, refrained from slapping him silly (as Snowden admits he deserved), and agreed to marry him. Its a fitting low-key end for a book, and a story, that is more about substance than style.

Roslyn Fuller is author of Beasts and Gods: How Democracy Changed Its Meaning and Lost Its Purpose and In Defence of Democracy and is the director of the Solonian Democracy Institute.

Read more here:
Snowden: A Whistle-Blower Who Lived to Tell About It - lareviewofbooks

#SocialSec Hot takes on this week’s biggest cybersecurity news (Dec 20) – The Daily Swig

A major breach of patient data in Canada; Snowdens book hits the courtroom; and the best hacker films to watch over the holidays

A major data breach took over social media feeds this week after news broke that a Canadian medical testing lab had fallen victim to a cyber-attack.

LifeLabs, the impacted healthcare company, said on Tuesday that approximately 15 million of its customers were potentially affected by the incident, which occurred when an unknown actor gained unwarranted access to one of its systems.

Customer information including names, addresses, emails, logins, passwords, dates of birth, health card numbers, and lab test results are potentially implicated, the company said, adding that it done its due diligence by informing both the authorities and Canadas privacy commissioners.

Any customer who is concerned about this incident can receive one free year of protection that includes dark web monitoring and identity theft insurance, Charles Brown, president and CEO of LifeLabs, said in the statement.

While the investigation still appears to be underway, rumours have circulated that LifeLabs may have been subject to a ransomware attack, its CEO additionally stating that protection measures included retrieving data by making a payment.

Infosec marketing through fear, uncertainity, and doubt (FUD) is at least as old as the web itself, if not older.

One example of FUD is to suggest software vulnerabilities might enable cyber-terrorism, a best a poorly defined term and one is arguably distateful because it compares the victims of bombings and knifing rampages against those suffering from hacked PCs or smartphones.

Journalist Joseph Cox politely called Check Point out in equating a recently discovered WhatsApp vulnerability to cyber-terrorism.

Rather than beat a tactical retreat a PR rep for the firm doubled down on the analogy.

Cox reports that multiple researchers and other non marketing staff from Check Point quickly got in touch with him to distance themselves from the PR hyperbole.

And in other news, a judge has ruled that Edward Snowden, the NSA contractor turned whistleblower, will have to give the proceeds of his recently published memoir, Permanent Record, to the US government.

The ruling on Tuesday stated that Snowden, who was charged under the Espionage Act in 2013 for leaking confidential files to the worlds press, had violated his agreement with US intelligence agencies, requiring a review of any material prior to publication.

The terms of the CIA Secrecy Agreements further provide that Snowden forfeits any proceeds from disclosures that breach the Agreements, AP reports US District Judge Liam OGrady as saying.

These terms continue to apply to Snowden.

Defense lawyers argued that the book would not have received a fair review, and are currently looking at ways to appeal.

Permanent Record, an autobiography depicting Snowdens time within the military industrial complex, was published in September. The ruling this week has not impacted the books distribution.

As the winter nights close in, what better way to deter diversion for infosec folk than to enjoy a hacking-themed movie?

For your edification and entertainment,The Daily Swig has put together a feature offering a rundown of The Best Hacking Films of All Time.

Our list includes some left-field suggestions, including a TV show and a documentary, as well as old school and more recent favorites.

Rather than attempting to rank these films ourselves, we ran an online Twitter poll. Naturally, the resulting selections and ranking did not please everyone

Additional reporting by John Leyden.

See original here:
#SocialSec Hot takes on this week's biggest cybersecurity news (Dec 20) - The Daily Swig

10 tech trends that shaped the 2010s – Pew Research Center

The tech landscape has changed dramatically over the past decade, both in the United States and around the world. There have been notable increases in the use of social media and online platforms (including YouTube and Facebook) and technologies (like the internet, cellphones and smartphones), in some cases leading to near-saturation levels of use among major segments of the population. But digital tech also faced significant backlash in the 2010s.

Here are 10 of the top tech-related changes that Pew Research Center has studied over the past decade:

1 Social media sites have emerged as a go-to platform for connecting with others, finding news and engaging politically. When the Center first asked U.S. adults if they ever use a social media site in 2005, just 5% said they did. Today, the share is 72%, according to a survey in early 2019.

Social media has also taken hold around the world. The Centers spring 2017 global survey conducted in 17 advanced and 19 emerging economies found that a median of 53% of adults across emerging and developing countries use social media.

In the U.S. and around the world, younger adults are the most likely age group to use social media. For example, nine-in-ten Americans ages 18 to 29 report ever using a social media site, compared with 40% of those ages 65 and older.

In terms of specific platforms, YouTube and Facebook are the most widely used online platforms among U.S. adults, with roughly seven-in-ten Americans saying they use each site. The shares of adults who use Instagram and Snapchat are much smaller, but these platforms are especially popular with younger Americans.

2 Around the world and in the U.S., social media has become a key tool for activists, as well as those aligned against them. The decade began with the Arab Spring and ended with protesters in Hong Kong and elsewhere using social media to promote and organize their causes. In some cases, governments fought back by shutting down the internet, while opponents of some activists mounted social media campaigns of their own.

In the U.S., social media played a role in major social movements such as #MeToo and #BlackLivesMatter. For example, a Pew Research Center analysis of publicly available English language tweets found that the #MeToo hashtag had been used more than 19 million times on Twitter from Oct. 15, 2017 (when actress Alyssa Milano tweeted urging victims of sexual harassment to reply me too) through Sept. 30, 2018.

Still, Americans have expressed mixed views about the impact social media has on the broader political environment. Roughly two-thirds of Americans (64%) say the statement social media helps give a voice to underrepresented groups describes these sites very or somewhat well, a 2018 survey found. At the same time, 77% believe these platforms distract people from issues that are truly important, and 71% agree with the statement social media makes people think theyre making a difference when they really arent.

3 Smartphones have altered the way many Americans go online. One of the biggest digital trends of the decade has been the steady rise of mobile connectivity. Smartphone adoption has more than doubled since the Center began surveying on this topic in 2011. Then, 35% of U.S. adults reported owning a smartphone of some kind, a share that has risen to 81% today.

Teens have also become much more likely to use smartphones: More than nine-in-ten (95%) teens ages 13 to 17 report owning or having access to a smartphone, according to a 2018 survey.

Adults are increasingly likely to name their smartphone as the primary way of going online. Today, 37% of U.S. adults say they mostly use a smartphone to access the internet, up from 19% in 2013.

The 2010s, meanwhile, were also the decade that saw the advent of tablet computers, which are now used by around half (52%) of U.S. adults.

4 Growth in mobile and social media use has sparked debates about the impact of screen time on Americas youth and others. More than half of teens (54%) believe they spend too much time on their cellphone, while 41% say they spend too much time on social media and about one-quarter say the same about video games, a 2018 survey found. At the same time, about half or more of teens say they have cut back on the amount of time they spend on their cellphones (52%), and similar shares say they have tried to limit their use of social media (57%) and video games (58%).

Still, teens are not the only group who struggle with balancing their use of digital technology with other aspects of their lives. Some 36% of parents of teens say they themselves spend too much time on their cellphone, while a similar share (39%) say they at least sometimes lose focus at work because theyre checking their cellphone.

5 Data privacy and surveillance have become major concerns in the post-Snowden era. In June 2013, then-National Security Agency contractor Edward Snowden leaked information showing that the NSA had conducted widespread surveillance of Americans online and phone communications. In the aftermath of the revelations, about half of Americans (49%) said the release of the classified information served the public interest, while 44% said it harmed the public interest, according to a 2013 survey.

In the years following the leaks, there have been high-profile commercial and government data breaches, as well as revelations about how firms and governments exploit social media profiles and other data sources to target users. Surveys have consistently shown that these issues have prompted significant public concern about peoples personal data, as well as the publics lack of confidence that companies can and will keep their data safe. For instance, the majority of Americans now say that they feel they have very little or no control over the data collected about them by the government (84%), while roughly two-thirds (64%) report that they feel at least somewhat concerned about how the government is using the data it collects about them.

6 Tech platforms have given rise to a gig economy. Mobile technology has helped create new businesses and jobs, while at the same time sparking debate about regulating companies that provide services that can be ordered by apps. Ride-hailing is one of the most well-documented examples of growth in the gig economy, and more Americans are using this kind of service: As of fall 2018, 36% of U.S. adults said they had ever used a ride-hailing service such as Uber or Lyft, up from 15% in 2015. In addition to car services, the gig economy has spawned businesses ranging from home sharing to online marketplaces for homemade goods.

7 Online harassment has become a fairly common feature of online life, both for teens and adults. Roughly six-in-ten U.S. teens (59%) say they have been bullied or harassed online, with offensive name-calling being the most common type of harassment they have encountered, according to a 2018 survey of those ages 13 to 17. A similar share of teens (63%) view online harassment as a major problem for people their age.

Many adults also report being the target of some form of abusive behavior online. Some 41% of adults have experienced some form of online harassment, as measured in a 2017 survey.

8 Made-up news and misinformation has sparked growing concern. The lead-up to the 2016 U.S. presidential election brought to the surface concerns around misinformation and its ability to affect the democratic process. Half of Americans believe made-up news and misinformation is a very big problem for the country today, making it a pressing problem for more Americans than said so of terrorism, illegal immigration, sexism and racism, according to a 2019 survey. Some 68% of U.S. adults say made-up news greatly impacts Americans confidence in government institutions.

The challenge of navigating the new information environment was reflected in a 2018 survey that measured the publics ability to identify five factual statements and five opinion statements. A small share of Americans were able to correctly classify all 10 statements. About a third (35%) were able to correctly identify all five opinion statements, while around a quarter (26%) were able to correctly identify all five factual statements. Americans with high political awareness, those who are very digitally savvy and those who have high levels of trust in the news media were able to more accurately identify news-related statements as factual or opinion.

9 A majority of Americans see gender discrimination as a problem in the tech industry. Tech companies have faced criticism for their hiring practices and work cultures, including reports of discrimination on the basis of race and ethnicity and gender. A majority of Americans (73%) say discrimination against women is a problem in the tech industry, with 37% citing it as a major problem, according to a summer 2017 survey. When it comes to discrimination against black and Hispanic Americans in tech two groups that are underrepresented in the industry roughly two-thirds of Americans (68%) say this is a problem (31% say its a major problem), according to the same survey.

10 Americans views about tech companies have turned far less positive in recent years. Controversies related to digital privacy, made-up news, harassment and other issues may have taken their toll on public attitudes about tech companies. The share of Americans who say these companies are having a positive effect on the way things are going in the country has declined sharply since 2015, according to a July 2019 survey. Four years ago, the majority of U.S. adults (71%) said these companies had a positive impact on the country, compared with 50% today.

In a survey in summer 2018, roughly seven-in-ten Americans (72%) said it is likely that social media platforms actively censor political views that those companies find objectionable. Around half (51%) of the public said major tech companies should be regulated more than they are now.

See more here:
10 tech trends that shaped the 2010s - Pew Research Center

What is Machine Learning? A definition – Expert System

Machine learning is an application of artificial intelligence (AI) that provides systems the ability to automatically learn and improve from experience without being explicitly programmed. Machine learning focuses on the development of computer programs that can access data and use it learn for themselves.

The process of learning begins with observations or data, such as examples, direct experience, or instruction, in order to look for patterns in data and make better decisions in the future based on the examples that we provide. The primary aim is to allow the computers learn automatically without human intervention or assistance and adjust actions accordingly.

Machine learning algorithms are often categorized as supervised or unsupervised.

Machine learning enables analysis of massive quantities of data. While it generally delivers faster, more accurate results in order to identify profitable opportunities or dangerous risks, it may also require additional time and resources to train it properly. Combining machine learning with AI and cognitive technologies can make it even more effective in processing large volumes of information.

See the rest here:

What is Machine Learning? A definition - Expert System

Data science and machine learning: what to learn in 2020 – Packt Hub

Its hard to keep up with the pace of change in the data science and machine learning fields. And when youre under pressure to deliver projects, learning new skills and technologies might be the last thing on your mind. But if you dont have at least one eye on what you need to learn next you run the risk of falling behind. In turn this means you miss out on new solutions and new opportunities to drive change: you might miss the chance to do things differently.

Thats why we want to make it easy for you with this quick list of what you need to watch out for and learn in 2020.

TensorFlow remains the most popular deep learning framework in the world. With TensorFlow 2.0 the Google-based development team behind it have attempted to rectify a number of issues and improve overall performance. Most notably, some of the problems around usability have been addressed, which should help the projects continued growth and perhaps even lower the barrier to entry.

Relatedly TensorFlow.js is proving that the wider TensorFlow ecosystem is incredibly healthy. It will be interesting to see what projects emerge in 2020 it might even bring JavaScript web developers into the machine learning fold.

Explore Packts huge range of TensorFlow eBooks and videos on the store.

PyTorch hasnt quite managed to topple TensorFlow from its perch, but its nevertheless growing quickly. Easier to use and more accessible than TensorFlow, if you want to start building deep learning systems quickly your best bet is probably to get started on PyTorch.

Search PyTorch eBooks and videos on the Packt store.

When it comes to data analysis, one of the most pressing issues is to speed up pipelines. This is, of course, notoriously difficult even in organizations that do their best to be agile and fast, its not uncommon to find that their data is fragmented and diffuse, with little alignment across teams.

One of the opportunities for changing this is cloud. When used effectively cloud platforms can dramatically speed up analytics pipelines and make it much easier for data scientists and analysts to deliver insights quickly. This might mean that we need increased collaboration between data professionals, engineers, and architects, but if were to really deliver on the data at our disposal, then this shift could be massive.

Learn how to perform analytics on the cloud with Cloud Analytics with Microsoft Azure.

While cloud might help to smooth some of the friction that exists in our organizations when it comes to data analytics, theres no substitute for strong and clear leadership. The split between the engineering side of data and the more scientific or interpretive aspect has been noted, which means that there is going to be a real demand for people that have a strong understanding of what data can do, what it shows, and what it means in terms of action.

Indeed, the article just linked to also mentions that there is likely to be an increasing need for executive level understanding. That means data scientists have the opportunity to take a more senior role inside their organizations, by either working closely with execs or even moving up to that level.

Learn how to build and manage a data science team and initiative that delivers with Managing Data Science.

In the excitement about the opportunities of machine learning and artificial intelligence, its possible that weve lost sight of some of the fundamentals: the algorithms. Indeed, given the conversation around algorithmic bias, and unintended consequences it certainly makes sense to place renewed attention on the algorithms that lie right at the center of our work.

Even if youre not an experienced data analyst or data scientist, if youre a beginner its just as important to dive deep into algorithms. This will give you a robust foundation for everything else you do. And while statistics and mathematics will feel a long way from the supposed sexiness of data science, carefully considering what role they play will ensure that the models you build are accurate and perform as they should.

Get stuck into algorithms with Data Science Algorithms in a Week.

Computer vision and Natural Language Processing are two of the most exciting aspects of modern machine learning and artificial intelligence. Both can be used for analytics projects, but they also have applications in real world digital products. Indeed, with augmented reality and conversational UI becoming more and more common, businesses need to be thinking very carefully about whether this could give them an edge in how they interact with customers.

These sorts of innovations can be driven from many different departments but technologists and data professionals should be seizing the opportunity to lead the way on how innovation can transform customer relationships.

For more technology eBooks and videos to help you prepare for 2020, head to the Packt store.

More:

Data science and machine learning: what to learn in 2020 - Packt Hub

Kubernetes and containers are the perfect fit for machine learning – JAXenter

Machine learning is permeating every corner of the industry, from fraud detection to supply chain optimization to personalizing the customer experience. McKinsey has found that nearly half of enterprises have infused AI into at least one of their standard business processes, and Gartner says seven out of 10 enterpriseswill be using some form of AI by 2021. Thats a short two years away.

But for businesses to take advantage of AI, they need an infrastructure that allows data scientists to experiment and iterate with different data sets, algorithms, and computing environments without slowing them down or placing a heavy burden on the IT department. That means they need a simple, automated way to quickly deploy code in a repeatable manner across local and cloud environments and to connect to the data sources they need.

A cloud-native environment built on containers is the most effective and efficient way to support this type of rapid development, evidenced by announcements from big vendors like Googleand HPE, which have each released new software and services to enable machine learning and deep learning in containers. Much as containers can speed the deployment of enterprise applications by packaging the code in a wrapper along with its runtime requirements, these same qualities make containers highly practical for machine learning.

Broadly speaking, there are three phases of an AI project where containers are beneficial: exploration, training, and deployment. Heres a look at what each involves and how containers can assist with each by reducing costs and simplifying deployment, allowing innovation to flourish.

To build an AI model, data scientists experiment with different data sets and machine learning algorithms to find the right data and algorithms to predict outcomes with maximum accuracy and efficiency. There are various libraries and frameworksfor creating machine learning models for different problem types and industries. Speed of iteration and the ability to run tests in parallel is essential for data teams as they try to uncover new revenue streams and meet business goals in a reasonable timeframe.

Containers provide a way to package up these libraries for specific domains, point to the right data source and deploy algorithms in a consistent fashion. That way, data scientists have an isolated environment they can customize for their exploration, without needing IT to manage multiple sets of libraries and frameworks in a shared environment.

SEE ALSO:Unleash chaos engineering: Kubethanos kills half your Kubernetes pods

Once an AI model has been built, it needs to be trained against large volumes of data across different platforms to maximize accuracy and minimize resource utilization. Training is highly compute-intensive, and containers make it easy to scale workloads up and down across multiple compute nodes quickly. A scheduler identifies the optimal node based on available resources and other factors.

A distributed cloud environment also allows compute and storage to be managed separately, which cuts storage utilization and therefore costs. Traditionally, compute and storage were tightly coupled, but containers along with a modern data management plane allows compute to be scaled independently and moved close to the data, wherever it resides.

With compute and storage separate, data scientists can run their models on different types of hardware, such as GPUs and specialized processors, to determine which model will provide the greatest accuracy and efficiency. They can also work to incrementally improve accuracy by adjusting weightings, biases and other parameters.

In production, a machine learning application will often combine several models that serve different purposes. One model might summarize the text in a social post, for example, while another assesses sentiment. Containers allow each model to be deployed as a microservice an independent, lightweight program that developers can reuse in other applications.

Microservices also make it easier to deploy models in parallel in different production environments for purposes such as a/b testing, and the smaller programs allow models to be updated independently from the larger application, speeding release times, and reducing the room for error.

SEE ALSO:Artificial intelligence & machine learning: The brain of a smart city

At each stage of the process, containers allow data teams to explore, test and improve their machine learning programs more quickly and with minimal support from IT. Containers provide a portable and consistent environment that can be deployed rapidly in different environments to maximize the accuracy, performance, and efficiency of machine learning applications.

The cloud-native model has revolutionized how enterprise applications are deployed and managed by speeding innovation and reducing costs. Its time to bring these same advantages to machine learning and other forms of AI so that businesses can better serve their customers and compete more effectively.

Excerpt from:

Kubernetes and containers are the perfect fit for machine learning - JAXenter